Login
[x]
Log in using an account from:
Fedora Account System
Red Hat Associate
Red Hat Customer
Or login using a Red Hat Bugzilla account
Forgot Password
Login:
Hide Forgot
Create an Account
Red Hat Bugzilla – Attachment 928056 Details for
Bug 1131251
pulp-manage-db failures in 2.4 upgrade
[?]
New
Simple Search
Advanced Search
My Links
Browse
Requests
Reports
Current State
Search
Tabular reports
Graphical reports
Duplicates
Other Reports
User Changes
Plotly Reports
Bug Status
Bug Severity
Non-Defaults
|
Product Dashboard
Help
Page Help!
Bug Writing Guidelines
What's new
Browser Support Policy
5.0.4.rh83 Release notes
FAQ
Guides index
User guide
Web Services
Contact
Legal
This site requires JavaScript to be enabled to function correctly, please enable it.
output from running pulp-manage-db with extra instrumentation
pulp-manage-db-output.txt (text/plain), 3.36 MB, created by
Bryce Pier
on 2014-08-18 19:17:33 UTC
(
hide
)
Description:
output from running pulp-manage-db with extra instrumentation
Filename:
MIME Type:
Creator:
Bryce Pier
Created:
2014-08-18 19:17:33 UTC
Size:
3.36 MB
patch
obsolete
>bash-4.1$ pulp-manage-db >Loading content types. >/usr/lib/python2.6/site-packages/pulp/server/db/connection.py:140: DeprecationWarning: The safe parameter is deprecated. Please use write concern options instead. > return method(*args, **kwargs) >Content types loaded. >Ensuring the admin role and user are in place. >Admin role and user are in place. >Beginning database migrations. >Migration package pulp.server.db.migrations is up to date at version 9 >Migration package pulp_puppet.plugins.migrations is up to date at version 2 >Applying pulp_rpm.plugins.migrations version 16 >Repo.id = rhel-6-x86_64-optional >Repo.id = epel5 >Repo.id = ol5_x86_64_latest >{u'status': u'final', u'updated': u'', u'description': u" [0.3.0-8.el5]\n - Resolves: rhbz#219431 (Up arrow button in candidate window doesn't work.)\n - Resolves: rhbz#220290 (Candidate list (symbol) page change inaccuracy.)\n - Resolves: rhbz#218565 (Candidate list not cleared before re-display.)\n <<< rhbz#220288 is replaced by rhbz#218565.\n -------------- next part --------------\n An HTML attachment was scrubbed...\n URL: http://oss.oracle.com/pipermail/el-errata/attachments/20071123/21d5953a/attachment.html ", u'issued': u'2007-11-23', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELBA-2007-0984.html', u'type': u'self', u'id': None, u'title': u'ELBA-2007-0984'}], u'_content_type_id': u'erratum', u'_id': u'bfa42def-bc66-4a57-94c3-366d261964f5', u'from': u'el-errata@oss.oracle.com', u'severity': u'', u'title': u' libchewing bug fix update ', u'_ns': u'units_erratum', u'rights': u'Copyright 2007 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 5', u'reboot_suggested': False, u'type': u'bugfix', u'pkglist': [{u'packages': [{u'src': None, u'name': u'libchewing', u'sum': [u'md5', u'67f973bdff87442ebcb3efb5fa7a88b2'], u'filename': u'libchewing-0.3.0-8.el5.i386.rpm', u'epoch': u'0', u'version': u'0.3.0', u'release': u'8.el5', u'arch': u'i386'}, {u'src': None, u'name': u'libchewing', u'sum': [u'md5', u'6c879c2aad017b70a4cf2ee16c58b1fb'], u'filename': u'libchewing-0.3.0-8.el5.src.rpm', u'epoch': u'0', u'version': u'0.3.0', u'release': u'8.el5', u'arch': u'src'}, {u'src': None, u'name': u'libchewing', u'sum': [u'md5', u'18e831a55e84febcc60ae8f21c666186'], u'filename': u'libchewing-0.3.0-8.el5.x86_64.rpm', u'epoch': u'0', u'version': u'0.3.0', u'release': u'8.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'libchewing-devel', u'sum': [u'md5', u'3d17d805900827db0b292542576688ab'], u'filename': u'libchewing-devel-0.3.0-8.el5.i386.rpm', u'epoch': u'0', u'version': u'0.3.0', u'release': u'8.el5', u'arch': u'i386'}, {u'src': None, u'name': u'libchewing-devel', u'sum': [u'md5', u'a73b242e9a30f7057026fbd7bef89fb0'], u'filename': u'libchewing-devel-0.3.0-8.el5.x86_64.rpm', u'epoch': u'0', u'version': u'0.3.0', u'release': u'8.el5', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u' [1.1.0-2.2]\n - Fix problem with keyboard leds getting out of sync on VT switch (#294511).\n \n -------------- next part --------------\n An HTML attachment was scrubbed...\n URL: http://oss.oracle.com/pipermail/el-errata/attachments/20071123/d8b905eb/attachment.html ', u'issued': u'2007-11-23', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELBA-2007-1010.html', u'type': u'self', u'id': None, u'title': u'ELBA-2007-1010'}], u'_content_type_id': u'erratum', u'_id': u'c545b8f8-e6a8-43a4-88d5-8be74704f4ef', u'from': u'el-errata@oss.oracle.com', u'severity': u'', u'title': u' xorg-x11-drv-keyboard bug fix update ', u'_ns': u'units_erratum', u'rights': u'Copyright 2007 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 5', u'reboot_suggested': False, u'type': u'bugfix', u'pkglist': [{u'packages': [{u'src': None, u'name': u'xorg-x11-drv-keyboard', u'sum': [u'md5', u'd4491c77fed96f2263e935febee7df02'], u'filename': u'xorg-x11-drv-keyboard-1.1.0-3.src.rpm', u'epoch': u'0', u'version': u'1.1.0', u'release': u'3', u'arch': u'src'}, {u'src': None, u'name': u'xorg-x11-drv-keyboard', u'sum': [u'md5', u'4b3f2a84a38a69a46ea08c29e13402b1'], u'filename': u'xorg-x11-drv-keyboard-1.1.0-3.x86_64.rpm', u'epoch': u'0', u'version': u'1.1.0', u'release': u'3', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u' [1:0.17-39]\n - telnet is able accept connection when nameserver is down (#253392)\n \n -------------- next part --------------\n An HTML attachment was scrubbed...\n URL: http://oss.oracle.com/pipermail/el-errata/attachments/20071123/99b582fd/attachment.html ', u'issued': u'2007-11-23', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELBA-2007-1012.html', u'type': u'self', u'id': None, u'title': u'ELBA-2007-1012'}], u'_content_type_id': u'erratum', u'_id': u'f86210d0-8733-4b50-991f-e59b6be8d290', u'from': u'el-errata@oss.oracle.com', u'severity': u'', u'title': u' telnet-server bug fix update ', u'_ns': u'units_erratum', u'rights': u'Copyright 2007 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 5', u'reboot_suggested': False, u'type': u'bugfix', u'pkglist': [{u'packages': [{u'src': None, u'name': u'telnet', u'sum': [u'md5', u'9b1a0aa7700fb959873793fedd12f4fb'], u'filename': u'telnet-0.17-39.el5.src.rpm', u'epoch': u'1', u'version': u'0.17', u'release': u'39.el5', u'arch': u'src'}, {u'src': None, u'name': u'telnet', u'sum': [u'md5', u'7b01504b1d4c79e8951ab73647222e74'], u'filename': u'telnet-0.17-39.el5.x86_64.rpm', u'epoch': u'1', u'version': u'0.17', u'release': u'39.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'telnet-server', u'sum': [u'md5', u'f64d57f2d443033d70268de8e44f4322'], u'filename': u'telnet-server-0.17-39.el5.x86_64.rpm', u'epoch': u'1', u'version': u'0.17', u'release': u'39.el5', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u' [6.0.5-1]\n - bump version to 6.0.5\n - improved IPv6 support\n - resolved doublefree error in nsldapi_free-request ', u'issued': u'2007-12-14', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELBA-2007-1127.html', u'type': u'self', u'id': None, u'title': u'ELBA-2007-1127'}], u'_content_type_id': u'erratum', u'_id': u'6fd466ef-7e92-4295-869f-1e0adeb443f2', u'from': u'el-errata@oss.oracle.com', u'severity': u'', u'title': u' mozldap bug fix and enhancement update ', u'_ns': u'units_erratum', u'rights': u'Copyright 2007 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 5', u'reboot_suggested': False, u'type': u'bugfix', u'pkglist': [{u'packages': [{u'src': None, u'name': u'mozldap', u'sum': [u'md5', u'd5f200cc9dc0984190e042581e5508a3'], u'filename': u'mozldap-6.0.5-1.el5.src.rpm', u'epoch': u'0', u'version': u'6.0.5', u'release': u'1.el5', u'arch': u'src'}, {u'src': None, u'name': u'mozldap', u'sum': [u'md5', u'87e0e34621c0d5b4bce4837fd8b1d810'], u'filename': u'mozldap-6.0.5-1.el5.x86_64.rpm', u'epoch': u'0', u'version': u'6.0.5', u'release': u'1.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'mozldap-devel', u'sum': [u'md5', u'7e889906a9b7713c1be197d3154ee0a5'], u'filename': u'mozldap-devel-6.0.5-1.el5.i386.rpm', u'epoch': u'0', u'version': u'6.0.5', u'release': u'1.el5', u'arch': u'i386'}, {u'src': None, u'name': u'mozldap-devel', u'sum': [u'md5', u'91b4d87c6bd36fe4ef8c51ccb08708ae'], u'filename': u'mozldap-devel-6.0.5-1.el5.x86_64.rpm', u'epoch': u'0', u'version': u'6.0.5', u'release': u'1.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'mozldap-tools', u'sum': [u'md5', u'3bc15113f9dd05c4549b8f4e81006803'], u'filename': u'mozldap-tools-6.0.5-1.el5.x86_64.rpm', u'epoch': u'0', u'version': u'6.0.5', u'release': u'1.el5', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u'\n[4.17-15.el5_3.1]\n- fix #497163 - Incorrect command name from the core file', u'issued': u'2009-04-30', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELBA-2009-0456.html', u'type': u'self', u'id': None, u'title': u'ELBA-2009-0456'}], u'_content_type_id': u'erratum', u'_id': u'98900ebb-81ed-4865-b5db-6364c96538bd', u'from': u'el-errata@oss.oracle.com', u'severity': u'', u'title': u'file bug fix update', u'_ns': u'units_erratum', u'rights': u'Copyright 2009 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 5', u'reboot_suggested': False, u'type': u'bugfix', u'pkglist': [{u'packages': [{u'src': None, u'name': u'file', u'sum': [u'md5', u'b43f23e50a23c4158d936fc98381b347'], u'filename': u'file-4.17-15.el5_3.1.src.rpm', u'epoch': u'0', u'version': u'4.17', u'release': u'15.el5_3.1', u'arch': u'src'}, {u'src': None, u'name': u'file', u'sum': [u'md5', u'9ee68f5ce560f8df42466eb5ecea3690'], u'filename': u'file-4.17-15.el5_3.1.x86_64.rpm', u'epoch': u'0', u'version': u'4.17', u'release': u'15.el5_3.1', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u'\n[0.54.7-2.1.1]\n- Build in Z-stream\n\n[0.54.7-2.el5.7]\n- Fix nscd cache invalidation\n Resolves: #528644\n\n[0.54.7-2.el5.6]\n- Make tests/pwhash_test executable\n R_esolves: #439209', u'issued': u'2009-10-27', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELBA-2009-1525.html', u'type': u'self', u'id': None, u'title': u'ELBA-2009-1525'}], u'_content_type_id': u'erratum', u'_id': u'0c2d0d69-3ee0-42ed-9ee2-73229dbb047b', u'from': u'el-errata@oss.oracle.com', u'severity': u'', u'title': u'libuser bug fix update', u'_ns': u'units_erratum', u'rights': u'Copyright 2009 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 5', u'reboot_suggested': False, u'type': u'bugfix', u'pkglist': [{u'packages': [{u'src': None, u'name': u'libuser', u'sum': [u'md5', u'cdbf385b99865e235b2f4a147b45dd9d'], u'filename': u'libuser-0.54.7-2.1.el5_4.1.i386.rpm', u'epoch': u'0', u'version': u'0.54.7', u'release': u'2.1.el5_4.1', u'arch': u'i386'}, {u'src': None, u'name': u'libuser', u'sum': [u'md5', u'd41dcf17f1eff3aab9bd01bc09fdb5a8'], u'filename': u'libuser-0.54.7-2.1.el5_4.1.src.rpm', u'epoch': u'0', u'version': u'0.54.7', u'release': u'2.1.el5_4.1', u'arch': u'src'}, {u'src': None, u'name': u'libuser', u'sum': [u'md5', u'dfc4746eb67ee39f54e984bdcc06f598'], u'filename': u'libuser-0.54.7-2.1.el5_4.1.x86_64.rpm', u'epoch': u'0', u'version': u'0.54.7', u'release': u'2.1.el5_4.1', u'arch': u'x86_64'}, {u'src': None, u'name': u'libuser-devel', u'sum': [u'md5', u'bc8ac90cf7f7e6b1f85a43372ce2c656'], u'filename': u'libuser-devel-0.54.7-2.1.el5_4.1.i386.rpm', u'epoch': u'0', u'version': u'0.54.7', u'release': u'2.1.el5_4.1', u'arch': u'i386'}, {u'src': None, u'name': u'libuser-devel', u'sum': [u'md5', u'1c832b327fe16f1811c7ad0d9aefd902'], u'filename': u'libuser-devel-0.54.7-2.1.el5_4.1.x86_64.rpm', u'epoch': u'0', u'version': u'0.54.7', u'release': u'2.1.el5_4.1', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u'\n[0.70-9.el5_4]\n- Add patch to avoid tripping new container assertion in dbus 1.1.2\n- Resolves: #532142\n- Add two patches to fix build with newer dbus ', u'issued': u'2009-11-09', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELBA-2009-1559.html', u'type': u'self', u'id': None, u'title': u'ELBA-2009-1559'}], u'_content_type_id': u'erratum', u'_id': u'0eb16bab-c7d0-4f5b-9a63-59da8c752b1e', u'from': u'el-errata@oss.oracle.com', u'severity': u'', u'title': u'dbus-python bug fix available', u'_ns': u'units_erratum', u'rights': u'Copyright 2009 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 5', u'reboot_suggested': False, u'type': u'bugfix', u'pkglist': [{u'packages': [{u'src': None, u'name': u'dbus-python', u'sum': [u'md5', u'bfb4adcf42a66cce5bbaa539fe392d77'], u'filename': u'dbus-python-0.70-9.el5_4.src.rpm', u'epoch': u'0', u'version': u'0.70', u'release': u'9.el5_4', u'arch': u'src'}, {u'src': None, u'name': u'dbus-python', u'sum': [u'md5', u'0016d41e26eca089707b21872d61a632'], u'filename': u'dbus-python-0.70-9.el5_4.x86_64.rpm', u'epoch': u'0', u'version': u'0.70', u'release': u'9.el5_4', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u'\n[215-8.el5_4.1]\n- improve pointer checks (#540534)', u'issued': u'2009-11-26', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELBA-2009-1611.html', u'type': u'self', u'id': None, u'title': u'ELBA-2009-1611'}], u'_content_type_id': u'erratum', u'_id': u'974dfbec-5775-4d72-819d-f97c8dfca8c8', u'from': u'el-errata@oss.oracle.com', u'severity': u'', u'title': u'xterm bug fix update', u'_ns': u'units_erratum', u'rights': u'Copyright 2009 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 5', u'reboot_suggested': False, u'type': u'bugfix', u'pkglist': [{u'packages': [{u'src': None, u'name': u'xterm', u'sum': [u'md5', u'6c4f3dab0181ea3d9fb53bf0a346613a'], u'filename': u'xterm-215-8.el5_4.1.src.rpm', u'epoch': u'0', u'version': u'215', u'release': u'8.el5_4.1', u'arch': u'src'}, {u'src': None, u'name': u'xterm', u'sum': [u'md5', u'57c8f95485b0d27e47b39a8f481c0d21'], u'filename': u'xterm-215-8.el5_4.1.x86_64.rpm', u'epoch': u'0', u'version': u'215', u'release': u'8.el5_4.1', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u"\n[4:4.1-77]\n- fix setting of pam configuration in vixie-cron-4.1-loginuid.patch\n- move building environment between opening session and setting\nparameters of session\n- Resolves: rhbz#546568 'axp' to 'alpha'", u'issued': u'2009-12-18', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELBA-2009-1684.html', u'type': u'self', u'id': None, u'title': u'ELBA-2009-1684'}], u'_content_type_id': u'erratum', u'_id': u'3cd7c215-8609-496f-b692-28c465d60a2e', u'from': u'el-errata@oss.oracle.com', u'severity': u'', u'title': u'vixie-cron bug fix update', u'_ns': u'units_erratum', u'rights': u'Copyright 2009 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 5', u'reboot_suggested': False, u'type': u'bugfix', u'pkglist': [{u'packages': [{u'src': None, u'name': u'vixie-cron', u'sum': [u'md5', u'752c6abf0a659a589ac53c47d7a73890'], u'filename': u'vixie-cron-4.1-77.el5_4.1.src.rpm', u'epoch': u'4', u'version': u'4.1', u'release': u'77.el5_4.1', u'arch': u'src'}, {u'src': None, u'name': u'vixie-cron', u'sum': [u'md5', u'cbdc384f7cb3cbd5436036a52fa96865'], u'filename': u'vixie-cron-4.1-77.el5_4.1.x86_64.rpm', u'epoch': u'4', u'version': u'4.1', u'release': u'77.el5_4.1', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u'\n[5.52-3.0.1]\n- fix typo and fix csize to be long long [oracle bz 8185]', u'issued': u'2009-04-15', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELBA-2009-2005.html', u'type': u'self', u'id': None, u'title': u'ELBA-2009-2005'}], u'_content_type_id': u'erratum', u'_id': u'1b261567-77d3-48a0-8164-7d83fc3a5bc7', u'from': u'el-errata@oss.oracle.com', u'severity': u'', u'title': u'unzip bug fix update', u'_ns': u'units_erratum', u'rights': u'Copyright 2009 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 5', u'reboot_suggested': False, u'type': u'bugfix', u'pkglist': [{u'packages': [{u'src': None, u'name': u'unzip', u'sum': [u'md5', u'd4d692846e47bf4a39ef10d018d933f5'], u'filename': u'unzip-5.52-3.0.1.el5.src.rpm', u'epoch': u'0', u'version': u'5.52', u'release': u'3.0.1.el5', u'arch': u'src'}, {u'src': None, u'name': u'unzip', u'sum': [u'md5', u'5065fda938acaa652668780475cd3830'], u'filename': u'unzip-5.52-3.0.1.el5.x86_64.rpm', u'epoch': u'0', u'version': u'5.52', u'release': u'3.0.1.el5', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u'\n[1.0.4-9.el5_4.2]\n- Resolves: #548374 - broken trigger in acpid update', u'issued': u'2010-01-05', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELBA-2010-0004.html', u'type': u'self', u'id': None, u'title': u'ELBA-2010-0004'}], u'_content_type_id': u'erratum', u'_id': u'b6f3c604-d701-4270-ac85-2de92e6f900e', u'from': u'el-errata@oss.oracle.com', u'severity': u'', u'title': u'acpid bug fix update', u'_ns': u'units_erratum', u'rights': u'Copyright 2010 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 5', u'reboot_suggested': False, u'type': u'bugfix', u'pkglist': [{u'packages': [{u'src': None, u'name': u'acpid', u'sum': [u'md5', u'7d591e821396aba4f5abe8711d876db3'], u'filename': u'acpid-1.0.4-9.el5_4.2.src.rpm', u'epoch': u'0', u'version': u'1.0.4', u'release': u'9.el5_4.2', u'arch': u'src'}, {u'src': None, u'name': u'acpid', u'sum': [u'md5', u'4049ce3e790653296702eb7c103fac07'], u'filename': u'acpid-1.0.4-9.el5_4.2.x86_64.rpm', u'epoch': u'0', u'version': u'1.0.4', u'release': u'9.el5_4.2', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u'\n[1.8.5-5.el5_4.8]\n- Fix a regression of the fix in BigDecimal that suppress the zero after\n the decimal point in Float. (#546245)', u'issued': u'2010-01-07', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELBA-2010-0012.html', u'type': u'self', u'id': None, u'title': u'ELBA-2010-0012'}], u'_content_type_id': u'erratum', u'_id': u'ec1c4c05-9eb0-4f57-9c8d-a923ccc20e33', u'from': u'el-errata@oss.oracle.com', u'severity': u'', u'title': u'ruby bug fix update', u'_ns': u'units_erratum', u'rights': u'Copyright 2010 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 5', u'reboot_suggested': False, u'type': u'bugfix', u'pkglist': [{u'packages': [{u'src': None, u'name': u'ruby', u'sum': [u'md5', u'2d13e4a2a178633b9ed6ba10a6634a28'], u'filename': u'ruby-1.8.5-5.el5_4.8.src.rpm', u'epoch': u'0', u'version': u'1.8.5', u'release': u'5.el5_4.8', u'arch': u'src'}, {u'src': None, u'name': u'ruby', u'sum': [u'md5', u'a0e796d73ea5dfaae49dc5a9003eff50'], u'filename': u'ruby-1.8.5-5.el5_4.8.x86_64.rpm', u'epoch': u'0', u'version': u'1.8.5', u'release': u'5.el5_4.8', u'arch': u'x86_64'}, {u'src': None, u'name': u'ruby-devel', u'sum': [u'md5', u'b1eb046016de35018dc27d565972feb8'], u'filename': u'ruby-devel-1.8.5-5.el5_4.8.i386.rpm', u'epoch': u'0', u'version': u'1.8.5', u'release': u'5.el5_4.8', u'arch': u'i386'}, {u'src': None, u'name': u'ruby-devel', u'sum': [u'md5', u'fb3797cf3f8c3f506121d351b4067e88'], u'filename': u'ruby-devel-1.8.5-5.el5_4.8.x86_64.rpm', u'epoch': u'0', u'version': u'1.8.5', u'release': u'5.el5_4.8', u'arch': u'x86_64'}, {u'src': None, u'name': u'ruby-docs', u'sum': [u'md5', u'6d1240cd7eadf632f1b1196bb934eccb'], u'filename': u'ruby-docs-1.8.5-5.el5_4.8.x86_64.rpm', u'epoch': u'0', u'version': u'1.8.5', u'release': u'5.el5_4.8', u'arch': u'x86_64'}, {u'src': None, u'name': u'ruby-irb', u'sum': [u'md5', u'e541324a628d42ff0838a0fe79b5c243'], u'filename': u'ruby-irb-1.8.5-5.el5_4.8.x86_64.rpm', u'epoch': u'0', u'version': u'1.8.5', u'release': u'5.el5_4.8', u'arch': u'x86_64'}, {u'src': None, u'name': u'ruby-libs', u'sum': [u'md5', u'b3b76c822ec221530a460fc971a264f3'], u'filename': u'ruby-libs-1.8.5-5.el5_4.8.i386.rpm', u'epoch': u'0', u'version': u'1.8.5', u'release': u'5.el5_4.8', u'arch': u'i386'}, {u'src': None, u'name': u'ruby-libs', u'sum': [u'md5', u'ddfd438e0104d1f23eefd587dea50c1e'], u'filename': u'ruby-libs-1.8.5-5.el5_4.8.x86_64.rpm', u'epoch': u'0', u'version': u'1.8.5', u'release': u'5.el5_4.8', u'arch': u'x86_64'}, {u'src': None, u'name': u'ruby-mode', u'sum': [u'md5', u'caf624eb89434bcd6c60016ff6f3613d'], u'filename': u'ruby-mode-1.8.5-5.el5_4.8.x86_64.rpm', u'epoch': u'0', u'version': u'1.8.5', u'release': u'5.el5_4.8', u'arch': u'x86_64'}, {u'src': None, u'name': u'ruby-rdoc', u'sum': [u'md5', u'95e6e646b1ebbc654cc82a87583324bd'], u'filename': u'ruby-rdoc-1.8.5-5.el5_4.8.x86_64.rpm', u'epoch': u'0', u'version': u'1.8.5', u'release': u'5.el5_4.8', u'arch': u'x86_64'}, {u'src': None, u'name': u'ruby-ri', u'sum': [u'md5', u'e2edfed6274ca59dd9ac6a56106a6dac'], u'filename': u'ruby-ri-1.8.5-5.el5_4.8.x86_64.rpm', u'epoch': u'0', u'version': u'1.8.5', u'release': u'5.el5_4.8', u'arch': u'x86_64'}, {u'src': None, u'name': u'ruby-tcltk', u'sum': [u'md5', u'3fa28568c579f6eb8bbea5a396e45f0b'], u'filename': u'ruby-tcltk-1.8.5-5.el5_4.8.x86_64.rpm', u'epoch': u'0', u'version': u'1.8.5', u'release': u'5.el5_4.8', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u'\n[2.14.4-8]\n- Bump release number\n\n[2.14.4-6]\n- Add fix for 507699\n\n[2.14.4-5]\n- Add the patch\n\n[2.14.4-4]\n- Fix for bug 529068 ', u'issued': u'2010-02-10', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELBA-2010-0099.html', u'type': u'self', u'id': None, u'title': u'ELBA-2010-0099'}], u'_content_type_id': u'erratum', u'_id': u'77204171-4f8d-4305-a793-08f9a5a75a7a', u'from': u'el-errata@oss.oracle.com', u'severity': u'', u'title': u'libgtop2 bug fix update', u'_ns': u'units_erratum', u'rights': u'Copyright 2010 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 5', u'reboot_suggested': False, u'type': u'bugfix', u'pkglist': [{u'packages': [{u'src': None, u'name': u'libgtop2', u'sum': [u'md5', u'5617b01305db796d304710523098e6e6'], u'filename': u'libgtop2-2.14.4-8.el5_4.i386.rpm', u'epoch': u'0', u'version': u'2.14.4', u'release': u'8.el5_4', u'arch': u'i386'}, {u'src': None, u'name': u'libgtop2', u'sum': [u'md5', u'30c96a499c1497d91d864d610a9fff49'], u'filename': u'libgtop2-2.14.4-8.el5_4.src.rpm', u'epoch': u'0', u'version': u'2.14.4', u'release': u'8.el5_4', u'arch': u'src'}, {u'src': None, u'name': u'libgtop2', u'sum': [u'md5', u'571c35781faf845d52637f62e1fa4302'], u'filename': u'libgtop2-2.14.4-8.el5_4.x86_64.rpm', u'epoch': u'0', u'version': u'2.14.4', u'release': u'8.el5_4', u'arch': u'x86_64'}, {u'src': None, u'name': u'libgtop2-devel', u'sum': [u'md5', u'83b7f47f47af0be86d688b252878a6d9'], u'filename': u'libgtop2-devel-2.14.4-8.el5_4.i386.rpm', u'epoch': u'0', u'version': u'2.14.4', u'release': u'8.el5_4', u'arch': u'i386'}, {u'src': None, u'name': u'libgtop2-devel', u'sum': [u'md5', u'9807bdf4e56da8f82c741d8a04083308'], u'filename': u'libgtop2-devel-2.14.4-8.el5_4.x86_64.rpm', u'epoch': u'0', u'version': u'2.14.4', u'release': u'8.el5_4', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u'\n[5.97-23.2]\n- readlink cannot handle recursive symlinks(#567545) ', u'issued': u'2010-02-24', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELBA-2010-0120.html', u'type': u'self', u'id': None, u'title': u'ELBA-2010-0120'}], u'_content_type_id': u'erratum', u'_id': u'02a54dbe-1a23-4883-97b5-63bc2788c580', u'from': u'el-errata@oss.oracle.com', u'severity': u'', u'title': u'coreutils bug fix update', u'_ns': u'units_erratum', u'rights': u'Copyright 2010 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 5', u'reboot_suggested': False, u'type': u'bugfix', u'pkglist': [{u'packages': [{u'src': None, u'name': u'coreutils', u'sum': [u'md5', u'87baf8a5611b594d786ec06fde9039f4'], u'filename': u'coreutils-5.97-23.el5_4.2.src.rpm', u'epoch': u'0', u'version': u'5.97', u'release': u'23.el5_4.2', u'arch': u'src'}, {u'src': None, u'name': u'coreutils', u'sum': [u'md5', u'086030cd68de54d7f0632a9389205674'], u'filename': u'coreutils-5.97-23.el5_4.2.x86_64.rpm', u'epoch': u'0', u'version': u'5.97', u'release': u'23.el5_4.2', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u'\n[1.0.1-4.el5]\n- Add patch for bug 561060 ', u'issued': u'2010-03-01', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELBA-2010-0127.html', u'type': u'self', u'id': None, u'title': u'ELBA-2010-0127'}], u'_content_type_id': u'erratum', u'_id': u'0f346b66-cdb6-41bb-b0f0-d5e8b6a5ff52', u'from': u'el-errata@oss.oracle.com', u'severity': u'', u'title': u'libXi bug fix update', u'_ns': u'units_erratum', u'rights': u'Copyright 2010 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 5', u'reboot_suggested': False, u'type': u'bugfix', u'pkglist': [{u'packages': [{u'src': None, u'name': u'libXi', u'sum': [u'md5', u'3bd7f3d74962d94257f7e8b2d91a5512'], u'filename': u'libXi-1.0.1-4.el5_4.i386.rpm', u'epoch': u'0', u'version': u'1.0.1', u'release': u'4.el5_4', u'arch': u'i386'}, {u'src': None, u'name': u'libXi', u'sum': [u'md5', u'544f1d41b01a3360a605e86a80fed6d7'], u'filename': u'libXi-1.0.1-4.el5_4.src.rpm', u'epoch': u'0', u'version': u'1.0.1', u'release': u'4.el5_4', u'arch': u'src'}, {u'src': None, u'name': u'libXi', u'sum': [u'md5', u'4f695c769e498cd80c4135d8b915bf07'], u'filename': u'libXi-1.0.1-4.el5_4.x86_64.rpm', u'epoch': u'0', u'version': u'1.0.1', u'release': u'4.el5_4', u'arch': u'x86_64'}, {u'src': None, u'name': u'libXi-devel', u'sum': [u'md5', u'10e4bb3565b921a44d5cdb44f8c622c6'], u'filename': u'libXi-devel-1.0.1-4.el5_4.i386.rpm', u'epoch': u'0', u'version': u'1.0.1', u'release': u'4.el5_4', u'arch': u'i386'}, {u'src': None, u'name': u'libXi-devel', u'sum': [u'md5', u'a1fe953647f7c7753f2a07b0ce3fcd76'], u'filename': u'libXi-devel-1.0.1-4.el5_4.x86_64.rpm', u'epoch': u'0', u'version': u'1.0.1', u'release': u'4.el5_4', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u'\n[2.1.22-5.3]\n- solve race condition, second version with rewriten spec file for ppc64\n and with repaired autoconf macros (#568084)\n\n[2.1.22-5.2]\n- solve race condition, second version with rewriten spec file for ppc64\n (#568084)\n\n[2.1.22-5.4.1]\n- solve race condition (#568084) ', u'issued': u'2010-03-17', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELBA-2010-0151.html', u'type': u'self', u'id': None, u'title': u'ELBA-2010-0151'}], u'_content_type_id': u'erratum', u'_id': u'57a1454d-d975-4d05-a177-be594298b0ad', u'from': u'el-errata@oss.oracle.com', u'severity': u'', u'title': u'cyrus-sasl bug fix update', u'_ns': u'units_erratum', u'rights': u'Copyright 2010 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 5', u'reboot_suggested': False, u'type': u'bugfix', u'pkglist': [{u'packages': [{u'src': None, u'name': u'cyrus-sasl', u'sum': [u'md5', u'197fa143da3aaa93d39300dfaa58b2d0'], u'filename': u'cyrus-sasl-2.1.22-5.el5_4.3.i386.rpm', u'epoch': u'0', u'version': u'2.1.22', u'release': u'5.el5_4.3', u'arch': u'i386'}, {u'src': None, u'name': u'cyrus-sasl', u'sum': [u'md5', u'1e06a7fab799d06211be17a0aae1cf4f'], u'filename': u'cyrus-sasl-2.1.22-5.el5_4.3.src.rpm', u'epoch': u'0', u'version': u'2.1.22', u'release': u'5.el5_4.3', u'arch': u'src'}, {u'src': None, u'name': u'cyrus-sasl', u'sum': [u'md5', u'c2f6a9cf9a06306cc222e7aa45439516'], u'filename': u'cyrus-sasl-2.1.22-5.el5_4.3.x86_64.rpm', u'epoch': u'0', u'version': u'2.1.22', u'release': u'5.el5_4.3', u'arch': u'x86_64'}, {u'src': None, u'name': u'cyrus-sasl-devel', u'sum': [u'md5', u'a50a77e46c955ab0808f9e61bc328bcf'], u'filename': u'cyrus-sasl-devel-2.1.22-5.el5_4.3.i386.rpm', u'epoch': u'0', u'version': u'2.1.22', u'release': u'5.el5_4.3', u'arch': u'i386'}, {u'src': None, u'name': u'cyrus-sasl-devel', u'sum': [u'md5', u'aec694342701a568a035b23b9f9d287d'], u'filename': u'cyrus-sasl-devel-2.1.22-5.el5_4.3.x86_64.rpm', u'epoch': u'0', u'version': u'2.1.22', u'release': u'5.el5_4.3', u'arch': u'x86_64'}, {u'src': None, u'name': u'cyrus-sasl-gssapi', u'sum': [u'md5', u'18b703121a049c28c3c61cb4986b7fff'], u'filename': u'cyrus-sasl-gssapi-2.1.22-5.el5_4.3.i386.rpm', u'epoch': u'0', u'version': u'2.1.22', u'release': u'5.el5_4.3', u'arch': u'i386'}, {u'src': None, u'name': u'cyrus-sasl-gssapi', u'sum': [u'md5', u'957ae918d74f599abb0b41766b5c8ab0'], u'filename': u'cyrus-sasl-gssapi-2.1.22-5.el5_4.3.x86_64.rpm', u'epoch': u'0', u'version': u'2.1.22', u'release': u'5.el5_4.3', u'arch': u'x86_64'}, {u'src': None, u'name': u'cyrus-sasl-ldap', u'sum': [u'md5', u'7478c97a55d1f994b2d36fa09649b675'], u'filename': u'cyrus-sasl-ldap-2.1.22-5.el5_4.3.i386.rpm', u'epoch': u'0', u'version': u'2.1.22', u'release': u'5.el5_4.3', u'arch': u'i386'}, {u'src': None, u'name': u'cyrus-sasl-ldap', u'sum': [u'md5', u'd9928739da9c83c05cfd0780abe5c4ed'], u'filename': u'cyrus-sasl-ldap-2.1.22-5.el5_4.3.x86_64.rpm', u'epoch': u'0', u'version': u'2.1.22', u'release': u'5.el5_4.3', u'arch': u'x86_64'}, {u'src': None, u'name': u'cyrus-sasl-lib', u'sum': [u'md5', u'273f90606301d549353148168d224358'], u'filename': u'cyrus-sasl-lib-2.1.22-5.el5_4.3.i386.rpm', u'epoch': u'0', u'version': u'2.1.22', u'release': u'5.el5_4.3', u'arch': u'i386'}, {u'src': None, u'name': u'cyrus-sasl-lib', u'sum': [u'md5', u'171825cadd7118cafe6044140aeec7e9'], u'filename': u'cyrus-sasl-lib-2.1.22-5.el5_4.3.x86_64.rpm', u'epoch': u'0', u'version': u'2.1.22', u'release': u'5.el5_4.3', u'arch': u'x86_64'}, {u'src': None, u'name': u'cyrus-sasl-md5', u'sum': [u'md5', u'4da7b07072204dfd23bdaef547317c26'], u'filename': u'cyrus-sasl-md5-2.1.22-5.el5_4.3.i386.rpm', u'epoch': u'0', u'version': u'2.1.22', u'release': u'5.el5_4.3', u'arch': u'i386'}, {u'src': None, u'name': u'cyrus-sasl-md5', u'sum': [u'md5', u'eaed22133ac23029483535b3560a4afc'], u'filename': u'cyrus-sasl-md5-2.1.22-5.el5_4.3.x86_64.rpm', u'epoch': u'0', u'version': u'2.1.22', u'release': u'5.el5_4.3', u'arch': u'x86_64'}, {u'src': None, u'name': u'cyrus-sasl-ntlm', u'sum': [u'md5', u'4c019198321408dbe7e40a34de4880da'], u'filename': u'cyrus-sasl-ntlm-2.1.22-5.el5_4.3.i386.rpm', u'epoch': u'0', u'version': u'2.1.22', u'release': u'5.el5_4.3', u'arch': u'i386'}, {u'src': None, u'name': u'cyrus-sasl-ntlm', u'sum': [u'md5', u'ae3a14773c95edb5b031796f1e309a1c'], u'filename': u'cyrus-sasl-ntlm-2.1.22-5.el5_4.3.x86_64.rpm', u'epoch': u'0', u'version': u'2.1.22', u'release': u'5.el5_4.3', u'arch': u'x86_64'}, {u'src': None, u'name': u'cyrus-sasl-plain', u'sum': [u'md5', u'61a6aeb5670e921374f7ac433379bf27'], u'filename': u'cyrus-sasl-plain-2.1.22-5.el5_4.3.i386.rpm', u'epoch': u'0', u'version': u'2.1.22', u'release': u'5.el5_4.3', u'arch': u'i386'}, {u'src': None, u'name': u'cyrus-sasl-plain', u'sum': [u'md5', u'b531c489249afd8afbb7c894d3cd0e83'], u'filename': u'cyrus-sasl-plain-2.1.22-5.el5_4.3.x86_64.rpm', u'epoch': u'0', u'version': u'2.1.22', u'release': u'5.el5_4.3', u'arch': u'x86_64'}, {u'src': None, u'name': u'cyrus-sasl-sql', u'sum': [u'md5', u'fffc07e86a1c6417cc6d2e295c724403'], u'filename': u'cyrus-sasl-sql-2.1.22-5.el5_4.3.i386.rpm', u'epoch': u'0', u'version': u'2.1.22', u'release': u'5.el5_4.3', u'arch': u'i386'}, {u'src': None, u'name': u'cyrus-sasl-sql', u'sum': [u'md5', u'4b34ec6d109cb8a4502c6363b0fd2726'], u'filename': u'cyrus-sasl-sql-2.1.22-5.el5_4.3.x86_64.rpm', u'epoch': u'0', u'version': u'2.1.22', u'release': u'5.el5_4.3', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u'\n[2.0.5-16.el5_5.1]\n- Resolves: #580055 - vsftpd prematurely closes connection just before processing of post-auth command\n- Resolves: #580396 - vsftpd issues in RHEL5', u'issued': u'2010-05-17', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELBA-2010-0410.html', u'type': u'self', u'id': None, u'title': u'ELBA-2010-0410'}], u'_content_type_id': u'erratum', u'_id': u'7d946441-6ee3-48d3-867d-119b6e3ade25', u'from': u'el-errata@oss.oracle.com', u'severity': u'', u'title': u'vsftpd bug fix update', u'_ns': u'units_erratum', u'rights': u'Copyright 2010 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 5', u'reboot_suggested': False, u'type': u'bugfix', u'pkglist': [{u'packages': [{u'src': None, u'name': u'vsftpd', u'sum': [u'md5', u'9e684ef180be5d2f7ec77e62228dbc31'], u'filename': u'vsftpd-2.0.5-16.el5_5.1.src.rpm', u'epoch': u'0', u'version': u'2.0.5', u'release': u'16.el5_5.1', u'arch': u'src'}, {u'src': None, u'name': u'vsftpd', u'sum': [u'md5', u'44c72ebd8b255fcf3c79f7b05c81d5a7'], u'filename': u'vsftpd-2.0.5-16.el5_5.1.x86_64.rpm', u'epoch': u'0', u'version': u'2.0.5', u'release': u'16.el5_5.1', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u'\n[2.16.2-6.el5.1]\n- Fix same-filesystem comparison with escaped characters in paths (#589874)\n\n[2.16.2-6.el5]\n- Require separate smbclient package instead of samba-common (#555642)', u'issued': u'2010-05-24', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELBA-2010-0436.html', u'type': u'self', u'id': None, u'title': u'ELBA-2010-0436'}], u'_content_type_id': u'erratum', u'_id': u'd880cddf-ff39-4011-99f5-f5e9988fe8f2', u'from': u'el-errata@oss.oracle.com', u'severity': u'', u'title': u'gnome-vfs2 bug fix update', u'_ns': u'units_erratum', u'rights': u'Copyright 2010 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 5', u'reboot_suggested': False, u'type': u'bugfix', u'pkglist': [{u'packages': [{u'src': None, u'name': u'gnome-vfs2', u'sum': [u'md5', u'7046b92468f76dfa9530adb7582a3b5b'], u'filename': u'gnome-vfs2-2.16.2-6.el5_5.1.i386.rpm', u'epoch': u'0', u'version': u'2.16.2', u'release': u'6.el5_5.1', u'arch': u'i386'}, {u'src': None, u'name': u'gnome-vfs2', u'sum': [u'md5', u'797e9a2abb23111375a524d395b81bc1'], u'filename': u'gnome-vfs2-2.16.2-6.el5_5.1.src.rpm', u'epoch': u'0', u'version': u'2.16.2', u'release': u'6.el5_5.1', u'arch': u'src'}, {u'src': None, u'name': u'gnome-vfs2', u'sum': [u'md5', u'e9367317c30ccec23acae6c7560d8c71'], u'filename': u'gnome-vfs2-2.16.2-6.el5_5.1.x86_64.rpm', u'epoch': u'0', u'version': u'2.16.2', u'release': u'6.el5_5.1', u'arch': u'x86_64'}, {u'src': None, u'name': u'gnome-vfs2-devel', u'sum': [u'md5', u'7d29eaefb27a2bbcb44fc5ac83b98db8'], u'filename': u'gnome-vfs2-devel-2.16.2-6.el5_5.1.i386.rpm', u'epoch': u'0', u'version': u'2.16.2', u'release': u'6.el5_5.1', u'arch': u'i386'}, {u'src': None, u'name': u'gnome-vfs2-devel', u'sum': [u'md5', u'e6004b89d5366aafcb04c34f0eb922d8'], u'filename': u'gnome-vfs2-devel-2.16.2-6.el5_5.1.x86_64.rpm', u'epoch': u'0', u'version': u'2.16.2', u'release': u'6.el5_5.1', u'arch': u'x86_64'}, {u'src': None, u'name': u'gnome-vfs2-smb', u'sum': [u'md5', u'94005f69ac409f547ba9bb56600e751d'], u'filename': u'gnome-vfs2-smb-2.16.2-6.el5_5.1.x86_64.rpm', u'epoch': u'0', u'version': u'2.16.2', u'release': u'6.el5_5.1', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u'\n[1.3.0-9]\n- Removed spice-xpi from wrapped plugins ', u'issued': u'2010-05-27', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELBA-2010-0445.html', u'type': u'self', u'id': None, u'title': u'ELBA-2010-0445'}], u'_content_type_id': u'erratum', u'_id': u'2762f698-2dfe-46e0-bf24-8119890df8d2', u'from': u'el-errata@oss.oracle.com', u'severity': u'', u'title': u'nspluginwrapper bug fix update', u'_ns': u'units_erratum', u'rights': u'Copyright 2010 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 5', u'reboot_suggested': False, u'type': u'bugfix', u'pkglist': [{u'packages': [{u'src': None, u'name': u'nspluginwrapper', u'sum': [u'md5', u'11108bd0a1e2666bbaba1d71a86cdf6a'], u'filename': u'nspluginwrapper-1.3.0-9.el5.i386.rpm', u'epoch': u'0', u'version': u'1.3.0', u'release': u'9.el5', u'arch': u'i386'}, {u'src': None, u'name': u'nspluginwrapper', u'sum': [u'md5', u'49968fab9395d60cd954ccca38685bbe'], u'filename': u'nspluginwrapper-1.3.0-9.el5.src.rpm', u'epoch': u'0', u'version': u'1.3.0', u'release': u'9.el5', u'arch': u'src'}, {u'src': None, u'name': u'nspluginwrapper', u'sum': [u'md5', u'0bf70ad3f5236472616cca569cd110ab'], u'filename': u'nspluginwrapper-1.3.0-9.el5.x86_64.rpm', u'epoch': u'0', u'version': u'1.3.0', u'release': u'9.el5', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u'\n[4.5.18-5.el5_5.5]\n- Handle special ptrace signal during detach (#594616)', u'issued': u'2010-06-04', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELBA-2010-0453.html', u'type': u'self', u'id': None, u'title': u'ELBA-2010-0453'}], u'_content_type_id': u'erratum', u'_id': u'5f0f49b0-e23d-45e2-9afd-edb8f5ed88aa', u'from': u'el-errata@oss.oracle.com', u'severity': u'', u'title': u'strace bug fix update', u'_ns': u'units_erratum', u'rights': u'Copyright 2010 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 5', u'reboot_suggested': False, u'type': u'bugfix', u'pkglist': [{u'packages': [{u'src': None, u'name': u'strace', u'sum': [u'md5', u'94881f4b58aa763eeecdc249abfb6791'], u'filename': u'strace-4.5.18-5.el5_5.5.src.rpm', u'epoch': u'0', u'version': u'4.5.18', u'release': u'5.el5_5.5', u'arch': u'src'}, {u'src': None, u'name': u'strace', u'sum': [u'md5', u'5695ae4b092116a2f8a72c8d64467d6f'], u'filename': u'strace-4.5.18-5.el5_5.5.x86_64.rpm', u'epoch': u'0', u'version': u'4.5.18', u'release': u'5.el5_5.5', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u"\n[1.1.16-13.el5_4.1]\n- Add checks in yum-complete-transaction so it'll never try and delete\n- the entire system.\n- Resolves: rhbz#574388 ", u'issued': u'2010-07-08', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELBA-2010-0509.html', u'type': u'self', u'id': None, u'title': u'ELBA-2010-0509'}], u'_content_type_id': u'erratum', u'_id': u'460947c3-78ff-49f0-98e2-dbf642fbcb13', u'from': u'el-errata@oss.oracle.com', u'severity': u'', u'title': u'yum-utils bug fix update', u'_ns': u'units_erratum', u'rights': u'Copyright 2010 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 5', u'reboot_suggested': False, u'type': u'bugfix', u'pkglist': [{u'packages': [{u'src': None, u'name': u'yum-NetworkManager-dispatcher', u'sum': [u'md5', u'34dbb8112d382a3b2cdc588f2f505b0b'], u'filename': u'yum-NetworkManager-dispatcher-1.1.16-13.el5_4.1.noarch.rpm', u'epoch': u'0', u'version': u'1.1.16', u'release': u'13.el5_4.1', u'arch': u'noarch'}, {u'src': None, u'name': u'yum-aliases', u'sum': [u'md5', u'820294f25ba87b6da0e309e4c8ff612f'], u'filename': u'yum-aliases-1.1.16-13.el5_4.1.noarch.rpm', u'epoch': u'0', u'version': u'1.1.16', u'release': u'13.el5_4.1', u'arch': u'noarch'}, {u'src': None, u'name': u'yum-changelog', u'sum': [u'md5', u'58d50402a41815813b7800bd7192796d'], u'filename': u'yum-changelog-1.1.16-13.el5_4.1.noarch.rpm', u'epoch': u'0', u'version': u'1.1.16', u'release': u'13.el5_4.1', u'arch': u'noarch'}, {u'src': None, u'name': u'yum-downloadonly', u'sum': [u'md5', u'bc973d059034da6749870e7fa4ec438c'], u'filename': u'yum-downloadonly-1.1.16-13.el5_4.1.noarch.rpm', u'epoch': u'0', u'version': u'1.1.16', u'release': u'13.el5_4.1', u'arch': u'noarch'}, {u'src': None, u'name': u'yum-fastestmirror', u'sum': [u'md5', u'108446afa2d4989433ad765301ebcd36'], u'filename': u'yum-fastestmirror-1.1.16-13.el5_4.1.noarch.rpm', u'epoch': u'0', u'version': u'1.1.16', u'release': u'13.el5_4.1', u'arch': u'noarch'}, {u'src': None, u'name': u'yum-filter-data', u'sum': [u'md5', u'df5d17195f3d2441767300d2c374c4db'], u'filename': u'yum-filter-data-1.1.16-13.el5_4.1.noarch.rpm', u'epoch': u'0', u'version': u'1.1.16', u'release': u'13.el5_4.1', u'arch': u'noarch'}, {u'src': None, u'name': u'yum-keys', u'sum': [u'md5', u'87702aadb930c3c5d61a8403d265ad0b'], u'filename': u'yum-keys-1.1.16-13.el5_4.1.noarch.rpm', u'epoch': u'0', u'version': u'1.1.16', u'release': u'13.el5_4.1', u'arch': u'noarch'}, {u'src': None, u'name': u'yum-kmod', u'sum': [u'md5', u'2ba7d2443182ed2f467ef20b984f88d0'], u'filename': u'yum-kmod-1.1.16-13.el5_4.1.noarch.rpm', u'epoch': u'0', u'version': u'1.1.16', u'release': u'13.el5_4.1', u'arch': u'noarch'}, {u'src': None, u'name': u'yum-list-data', u'sum': [u'md5', u'3385c4dd4b91e6b715cf8bcc89ce39eb'], u'filename': u'yum-list-data-1.1.16-13.el5_4.1.noarch.rpm', u'epoch': u'0', u'version': u'1.1.16', u'release': u'13.el5_4.1', u'arch': u'noarch'}, {u'src': None, u'name': u'yum-protect-packages', u'sum': [u'md5', u'48a72498dbaf0519b4d7160c98ff605e'], u'filename': u'yum-protect-packages-1.1.16-13.el5_4.1.noarch.rpm', u'epoch': u'0', u'version': u'1.1.16', u'release': u'13.el5_4.1', u'arch': u'noarch'}, {u'src': None, u'name': u'yum-protectbase', u'sum': [u'md5', u'eccc34ded192ca402c75c1dae8053ce8'], u'filename': u'yum-protectbase-1.1.16-13.el5_4.1.noarch.rpm', u'epoch': u'0', u'version': u'1.1.16', u'release': u'13.el5_4.1', u'arch': u'noarch'}, {u'src': None, u'name': u'yum-security', u'sum': [u'md5', u'7a32c5d128717631d439fc8cac615b26'], u'filename': u'yum-security-1.1.16-13.el5_4.1.noarch.rpm', u'epoch': u'0', u'version': u'1.1.16', u'release': u'13.el5_4.1', u'arch': u'noarch'}, {u'src': None, u'name': u'yum-tmprepo', u'sum': [u'md5', u'3fdeb99c49e67623b5c7dcb16603fcf3'], u'filename': u'yum-tmprepo-1.1.16-13.el5_4.1.noarch.rpm', u'epoch': u'0', u'version': u'1.1.16', u'release': u'13.el5_4.1', u'arch': u'noarch'}, {u'src': None, u'name': u'yum-updateonboot', u'sum': [u'md5', u'520f9057d053eb0141e94d0b639ba3fe'], u'filename': u'yum-updateonboot-1.1.16-13.el5_4.1.noarch.rpm', u'epoch': u'0', u'version': u'1.1.16', u'release': u'13.el5_4.1', u'arch': u'noarch'}, {u'src': None, u'name': u'yum-utils', u'sum': [u'md5', u'97abf24b637894d9c1b150431e562c29'], u'filename': u'yum-utils-1.1.16-13.el5_4.1.noarch.rpm', u'epoch': u'0', u'version': u'1.1.16', u'release': u'13.el5_4.1', u'arch': u'noarch'}, {u'src': None, u'name': u'yum-utils', u'sum': [u'md5', u'cf1fbcb07c5e734e906bcfa486ac0f32'], u'filename': u'yum-utils-1.1.16-13.el5_4.1.src.rpm', u'epoch': u'0', u'version': u'1.1.16', u'release': u'13.el5_4.1', u'arch': u'src'}, {u'src': None, u'name': u'yum-verify', u'sum': [u'md5', u'e3d436392a37263961b9dc3946d6734d'], u'filename': u'yum-verify-1.1.16-13.el5_4.1.noarch.rpm', u'epoch': u'0', u'version': u'1.1.16', u'release': u'13.el5_4.1', u'arch': u'noarch'}, {u'src': None, u'name': u'yum-versionlock', u'sum': [u'md5', u'850d401440e1cf4ab9a564d79aab778c'], u'filename': u'yum-versionlock-1.1.16-13.el5_4.1.noarch.rpm', u'epoch': u'0', u'version': u'1.1.16', u'release': u'13.el5_4.1', u'arch': u'noarch'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u'\n[1.4.5-14.1]\n- fix error when decrypting certain files (#510500)', u'issued': u'2010-07-08', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELBA-2010-0513.html', u'type': u'self', u'id': None, u'title': u'ELBA-2010-0513'}], u'_content_type_id': u'erratum', u'_id': u'fbf74ab6-51ae-4a88-b9be-ab8e161905f7', u'from': u'el-errata@oss.oracle.com', u'severity': u'', u'title': u'gnupg bug fix update', u'_ns': u'units_erratum', u'rights': u'Copyright 2010 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 5', u'reboot_suggested': False, u'type': u'bugfix', u'pkglist': [{u'packages': [{u'src': None, u'name': u'gnupg', u'sum': [u'md5', u'f7f0fd09200eb25350522e74a1c3bfca'], u'filename': u'gnupg-1.4.5-14.el5_5.1.src.rpm', u'epoch': u'0', u'version': u'1.4.5', u'release': u'14.el5_5.1', u'arch': u'src'}, {u'src': None, u'name': u'gnupg', u'sum': [u'md5', u'1b3dee20c81803cc9e456081e134b3a8'], u'filename': u'gnupg-1.4.5-14.el5_5.1.x86_64.rpm', u'epoch': u'0', u'version': u'1.4.5', u'release': u'14.el5_5.1', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u'\n[4.3.29-10.el5.5.2]\n- add bt_verify patch (#589880)\n\n[4.3.29-10.el5.5.1]\n- create 5.5 z-stream branch (#589880) ', u'issued': u'2010-07-08', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELBA-2010-0517.html', u'type': u'self', u'id': None, u'title': u'ELBA-2010-0517'}], u'_content_type_id': u'erratum', u'_id': u'fadc3ffb-d8dd-4e25-bdff-a9d6dda0a5b5', u'from': u'el-errata@oss.oracle.com', u'severity': u'', u'title': u'db4 bug fix update', u'_ns': u'units_erratum', u'rights': u'Copyright 2010 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 5', u'reboot_suggested': False, u'type': u'bugfix', u'pkglist': [{u'packages': [{u'src': None, u'name': u'db4', u'sum': [u'md5', u'bf25dd371df591324a73299951e54ceb'], u'filename': u'db4-4.3.29-10.el5_5.2.i386.rpm', u'epoch': u'0', u'version': u'4.3.29', u'release': u'10.el5_5.2', u'arch': u'i386'}, {u'src': None, u'name': u'db4', u'sum': [u'md5', u'bd94c48b8119136ae0aa76dcea682951'], u'filename': u'db4-4.3.29-10.el5_5.2.src.rpm', u'epoch': u'0', u'version': u'4.3.29', u'release': u'10.el5_5.2', u'arch': u'src'}, {u'src': None, u'name': u'db4', u'sum': [u'md5', u'3bbf84f9ccc319c4182d393f25669a63'], u'filename': u'db4-4.3.29-10.el5_5.2.x86_64.rpm', u'epoch': u'0', u'version': u'4.3.29', u'release': u'10.el5_5.2', u'arch': u'x86_64'}, {u'src': None, u'name': u'db4-devel', u'sum': [u'md5', u'e61382effc511a97b9ddab9577adb926'], u'filename': u'db4-devel-4.3.29-10.el5_5.2.i386.rpm', u'epoch': u'0', u'version': u'4.3.29', u'release': u'10.el5_5.2', u'arch': u'i386'}, {u'src': None, u'name': u'db4-devel', u'sum': [u'md5', u'e20d1808721e5693712b4cc7c8c824dc'], u'filename': u'db4-devel-4.3.29-10.el5_5.2.x86_64.rpm', u'epoch': u'0', u'version': u'4.3.29', u'release': u'10.el5_5.2', u'arch': u'x86_64'}, {u'src': None, u'name': u'db4-java', u'sum': [u'md5', u'5bb455ad6bd7eb73687d2f436f22507c'], u'filename': u'db4-java-4.3.29-10.el5_5.2.x86_64.rpm', u'epoch': u'0', u'version': u'4.3.29', u'release': u'10.el5_5.2', u'arch': u'x86_64'}, {u'src': None, u'name': u'db4-tcl', u'sum': [u'md5', u'a85ca525e31065ad9de58bb92c983e26'], u'filename': u'db4-tcl-4.3.29-10.el5_5.2.x86_64.rpm', u'epoch': u'0', u'version': u'4.3.29', u'release': u'10.el5_5.2', u'arch': u'x86_64'}, {u'src': None, u'name': u'db4-utils', u'sum': [u'md5', u'ad201c938a5de3e5f067bc241596d4f9'], u'filename': u'db4-utils-4.3.29-10.el5_5.2.x86_64.rpm', u'epoch': u'0', u'version': u'4.3.29', u'release': u'10.el5_5.2', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u"\n[7.0.2-3.1]\n- Resolves: #609994\n Though function write() executed sucessful, sadc end with an error\n- Resolves: #609826\n The output of sar -I ALL/XALL is wrong in ia64 machine of RHEL5\n- Resolves: #609824\n The 'sar -d ' command outputs invalid data\n- Resolves: #609819\n March sar data was appended to February data\n- Resolves: #609821\n The sysstat's programs such as mpstat shows one extra cpu\n- Resolves: #609991\n iostat -n enhancement not report NFS client stats correctly ", u'issued': u'2010-07-22', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELBA-2010-0552.html', u'type': u'self', u'id': None, u'title': u'ELBA-2010-0552'}], u'_content_type_id': u'erratum', u'_id': u'eeacce24-8566-4aec-8b3c-57067aea4210', u'from': u'el-errata@oss.oracle.com', u'severity': u'', u'title': u'sysstat bug fix and enhancement update', u'_ns': u'units_erratum', u'rights': u'Copyright 2010 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 5', u'reboot_suggested': False, u'type': u'bugfix', u'pkglist': [{u'packages': [{u'src': None, u'name': u'sysstat', u'sum': [u'md5', u'5d08b126f309703b27a72056057136a0'], u'filename': u'sysstat-7.0.2-3.el5_5.1.src.rpm', u'epoch': u'0', u'version': u'7.0.2', u'release': u'3.el5_5.1', u'arch': u'src'}, {u'src': None, u'name': u'sysstat', u'sum': [u'md5', u'caeea9318fce247fe20711c0ca6eb508'], u'filename': u'sysstat-7.0.2-3.el5_5.1.x86_64.rpm', u'epoch': u'0', u'version': u'7.0.2', u'release': u'3.el5_5.1', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u'\n[0.4.9-0.16.20080908]\n- Resolves: rhbz#560573\n- Selinux text relocation patch ', u'issued': u'2010-07-26', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELBA-2010-0559.html', u'type': u'self', u'id': None, u'title': u'ELBA-2010-0559'}], u'_content_type_id': u'erratum', u'_id': u'addd1953-b213-409e-ac29-badc19029154', u'from': u'el-errata@oss.oracle.com', u'severity': u'', u'title': u'qffmpeg bug fix update', u'_ns': u'units_erratum', u'rights': u'Copyright 2010 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 5', u'reboot_suggested': False, u'type': u'bugfix', u'pkglist': [{u'packages': [{u'src': None, u'name': u'qffmpeg', u'sum': [u'md5', u'fa818abde9e66a750d36963a8a0cdbe7'], u'filename': u'qffmpeg-0.4.9-0.16.20080908.el5_5.src.rpm', u'epoch': u'0', u'version': u'0.4.9', u'release': u'0.16.20080908.el5_5', u'arch': u'src'}, {u'src': None, u'name': u'qffmpeg-devel', u'sum': [u'md5', u'3a0e73ea93384bb8791ba16b05552ad1'], u'filename': u'qffmpeg-devel-0.4.9-0.16.20080908.el5_5.i386.rpm', u'epoch': u'0', u'version': u'0.4.9', u'release': u'0.16.20080908.el5_5', u'arch': u'i386'}, {u'src': None, u'name': u'qffmpeg-devel', u'sum': [u'md5', u'5c1468361b29d20066552303ac56b8a3'], u'filename': u'qffmpeg-devel-0.4.9-0.16.20080908.el5_5.x86_64.rpm', u'epoch': u'0', u'version': u'0.4.9', u'release': u'0.16.20080908.el5_5', u'arch': u'x86_64'}, {u'src': None, u'name': u'qffmpeg-libs', u'sum': [u'md5', u'4f3a41e56ef20c4cad42c8381512d8a2'], u'filename': u'qffmpeg-libs-0.4.9-0.16.20080908.el5_5.i386.rpm', u'epoch': u'0', u'version': u'0.4.9', u'release': u'0.16.20080908.el5_5', u'arch': u'i386'}, {u'src': None, u'name': u'qffmpeg-libs', u'sum': [u'md5', u'ea1eb54434336e56091a85578476770b'], u'filename': u'qffmpeg-libs-0.4.9-0.16.20080908.el5_5.x86_64.rpm', u'epoch': u'0', u'version': u'0.4.9', u'release': u'0.16.20080908.el5_5', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u'\n[4.1.2-14.el5_5.4]\n- fix minor typo in previous fix for vncserver script (#494750)\n\n[4.1.2-14.el5_5.3]\n[option when specified as the first one]\n (#494750)\n- libvnc.so: wake up from DPMS sleep state when receive mouse/keyboard event\n (#581478)', u'issued': u'2010-07-27', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELBA-2010-0563.html', u'type': u'self', u'id': None, u'title': u'ELBA-2010-0563'}], u'_content_type_id': u'erratum', u'_id': u'f4ea00f5-0fa8-4897-a607-6333de38cbda', u'from': u'el-errata@oss.oracle.com', u'severity': u'', u'title': u'vnc bug fix update', u'_ns': u'units_erratum', u'rights': u'Copyright 2010 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 5', u'reboot_suggested': False, u'type': u'bugfix', u'pkglist': [{u'packages': [{u'src': None, u'name': u'vnc', u'sum': [u'md5', u'bd147d3d842a91db636ac3ee3bf3f2b9'], u'filename': u'vnc-4.1.2-14.el5_5.4.src.rpm', u'epoch': u'0', u'version': u'4.1.2', u'release': u'14.el5_5.4', u'arch': u'src'}, {u'src': None, u'name': u'vnc', u'sum': [u'md5', u'e000b1b8e56927d42830e3e38039f2f4'], u'filename': u'vnc-4.1.2-14.el5_5.4.x86_64.rpm', u'epoch': u'0', u'version': u'4.1.2', u'release': u'14.el5_5.4', u'arch': u'x86_64'}, {u'src': None, u'name': u'vnc-server', u'sum': [u'md5', u'fbf9b65ee8a30f3ecd9853953f4d86eb'], u'filename': u'vnc-server-4.1.2-14.el5_5.4.x86_64.rpm', u'epoch': u'0', u'version': u'4.1.2', u'release': u'14.el5_5.4', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u'\n[1.39.1-2.el5.2]\n- resolved warning about version\n- Resolves: rhbz#614408 ', u'issued': u'2010-08-04', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELBA-2010-0595.html', u'type': u'self', u'id': None, u'title': u'ELBA-2010-0595'}], u'_content_type_id': u'erratum', u'_id': u'063628a4-a572-4d00-9ce6-cafd22cb231d', u'from': u'el-errata@oss.oracle.com', u'severity': u'', u'title': u'perl-Archive-Tar bug fix update', u'_ns': u'units_erratum', u'rights': u'Copyright 2010 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 5', u'reboot_suggested': False, u'type': u'bugfix', u'pkglist': [{u'packages': [{u'src': None, u'name': u'perl-Archive-Tar', u'sum': [u'md5', u'87fb5ad01cb5e499bd78e5e3593e10bc'], u'filename': u'perl-Archive-Tar-1.39.1-1.el5_5.2.noarch.rpm', u'epoch': u'1', u'version': u'1.39.1', u'release': u'1.el5_5.2', u'arch': u'noarch'}, {u'src': None, u'name': u'perl-Archive-Tar', u'sum': [u'md5', u'359685791850bb5a635cb081c61cdb52'], u'filename': u'perl-Archive-Tar-1.39.1-1.el5_5.2.src.rpm', u'epoch': u'1', u'version': u'1.39.1', u'release': u'1.el5_5.2', u'arch': u'src'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u'\n[0.6.5-14.5]\n- improve the pfkey socket buffer size setting (#607361)\n\n[0.6.5-14.4]\n- fix non-exact policy matching (#606904)\n- make pfkey socket buffer size configurable (#607361)\n- use separate pfkey socket for sadb dumps (#590783)\n- do not delete phase 2 SAs when phase 1 delete notification is received (#599115) ', u'issued': u'2010-08-24', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELBA-2010-0645.html', u'type': u'self', u'id': None, u'title': u'ELBA-2010-0645'}], u'_content_type_id': u'erratum', u'_id': u'2cae655e-6622-466e-9909-5beceef97230', u'from': u'el-errata@oss.oracle.com', u'severity': u'', u'title': u'ipsec-tools bug fix update', u'_ns': u'units_erratum', u'rights': u'Copyright 2010 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 5', u'reboot_suggested': False, u'type': u'bugfix', u'pkglist': [{u'packages': [{u'src': None, u'name': u'ipsec-tools', u'sum': [u'md5', u'e2d86716999505cf3aee371f8920d15b'], u'filename': u'ipsec-tools-0.6.5-14.el5_5.5.src.rpm', u'epoch': u'0', u'version': u'0.6.5', u'release': u'14.el5_5.5', u'arch': u'src'}, {u'src': None, u'name': u'ipsec-tools', u'sum': [u'md5', u'c27c59d5e22380935c2c67620471db0a'], u'filename': u'ipsec-tools-0.6.5-14.el5_5.5.x86_64.rpm', u'epoch': u'0', u'version': u'0.6.5', u'release': u'14.el5_5.5', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u"\n[12:3.0.5-23.2]\n- The server's 'by client-id' and 'by hardware address' hash table lists\n are now sorted according to the preference to re-allocate that lease to\n returning clients. This should eliminate pool starvation problems\n arising when 'INIT' clients were given new leases rather than presently\n active ones. (RHBZ #627572) ", u'issued': u'2010-08-31', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELBA-2010-0664.html', u'type': u'self', u'id': None, u'title': u'ELBA-2010-0664'}], u'_content_type_id': u'erratum', u'_id': u'3a9f3783-3955-46d0-ba1c-d7be0df7f4ae', u'from': u'el-errata@oss.oracle.com', u'severity': u'', u'title': u'dhcp bug fix update', u'_ns': u'units_erratum', u'rights': u'Copyright 2010 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 5', u'reboot_suggested': False, u'type': u'bugfix', u'pkglist': [{u'packages': [{u'src': None, u'name': u'dhclient', u'sum': [u'md5', u'34d10ccc39d16a5985cb69d7870ca9b8'], u'filename': u'dhclient-3.0.5-23.el5_5.2.x86_64.rpm', u'epoch': u'12', u'version': u'3.0.5', u'release': u'23.el5_5.2', u'arch': u'x86_64'}, {u'src': None, u'name': u'dhcp', u'sum': [u'md5', u'04538edb007c493c8f89d7d00a76575c'], u'filename': u'dhcp-3.0.5-23.el5_5.2.src.rpm', u'epoch': u'12', u'version': u'3.0.5', u'release': u'23.el5_5.2', u'arch': u'src'}, {u'src': None, u'name': u'dhcp', u'sum': [u'md5', u'66de961f92ad56feac9264a5c9c51300'], u'filename': u'dhcp-3.0.5-23.el5_5.2.x86_64.rpm', u'epoch': u'12', u'version': u'3.0.5', u'release': u'23.el5_5.2', u'arch': u'x86_64'}, {u'src': None, u'name': u'dhcp-devel', u'sum': [u'md5', u'481aa29b0b41b77deb43e72c00ee2c91'], u'filename': u'dhcp-devel-3.0.5-23.el5_5.2.i386.rpm', u'epoch': u'12', u'version': u'3.0.5', u'release': u'23.el5_5.2', u'arch': u'i386'}, {u'src': None, u'name': u'dhcp-devel', u'sum': [u'md5', u'f3aabb859e60c97d9af8b73b3194a942'], u'filename': u'dhcp-devel-3.0.5-23.el5_5.2.x86_64.rpm', u'epoch': u'12', u'version': u'3.0.5', u'release': u'23.el5_5.2', u'arch': u'x86_64'}, {u'src': None, u'name': u'libdhcp4client', u'sum': [u'md5', u'bc84994430b8fd559f157d67b27b0eb3'], u'filename': u'libdhcp4client-3.0.5-23.el5_5.2.i386.rpm', u'epoch': u'12', u'version': u'3.0.5', u'release': u'23.el5_5.2', u'arch': u'i386'}, {u'src': None, u'name': u'libdhcp4client', u'sum': [u'md5', u'53e237332e6559d9f451b2e783ce4934'], u'filename': u'libdhcp4client-3.0.5-23.el5_5.2.x86_64.rpm', u'epoch': u'12', u'version': u'3.0.5', u'release': u'23.el5_5.2', u'arch': u'x86_64'}, {u'src': None, u'name': u'libdhcp4client-devel', u'sum': [u'md5', u'cd4faa502fcb0196673662911504a0c6'], u'filename': u'libdhcp4client-devel-3.0.5-23.el5_5.2.i386.rpm', u'epoch': u'12', u'version': u'3.0.5', u'release': u'23.el5_5.2', u'arch': u'i386'}, {u'src': None, u'name': u'libdhcp4client-devel', u'sum': [u'md5', u'7d21cb97ab8967bd50cdc584e28c1e62'], u'filename': u'libdhcp4client-devel-3.0.5-23.el5_5.2.x86_64.rpm', u'epoch': u'12', u'version': u'3.0.5', u'release': u'23.el5_5.2', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u'\n[1.95.8-8.3.3]\n- fix regression introduced by patch for CVE-2009-3560 (#618744) ', u'issued': u'2010-09-03', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELBA-2010-0672.html', u'type': u'self', u'id': None, u'title': u'ELBA-2010-0672'}], u'_content_type_id': u'erratum', u'_id': u'ffce3ce7-4178-4dcb-935b-3876e755b021', u'from': u'el-errata@oss.oracle.com', u'severity': u'', u'title': u'expat bug fix update', u'_ns': u'units_erratum', u'rights': u'Copyright 2010 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 5', u'reboot_suggested': False, u'type': u'bugfix', u'pkglist': [{u'packages': [{u'src': None, u'name': u'expat', u'sum': [u'md5', u'd335445cdd3b14f047792874df59423a'], u'filename': u'expat-1.95.8-8.3.el5_5.3.i386.rpm', u'epoch': u'0', u'version': u'1.95.8', u'release': u'8.3.el5_5.3', u'arch': u'i386'}, {u'src': None, u'name': u'expat', u'sum': [u'md5', u'2d4fc609cf34dbcf6e1a06ac9e4c2e2a'], u'filename': u'expat-1.95.8-8.3.el5_5.3.src.rpm', u'epoch': u'0', u'version': u'1.95.8', u'release': u'8.3.el5_5.3', u'arch': u'src'}, {u'src': None, u'name': u'expat', u'sum': [u'md5', u'1527c45a1527d2fa2b9ca6cba0ed3737'], u'filename': u'expat-1.95.8-8.3.el5_5.3.x86_64.rpm', u'epoch': u'0', u'version': u'1.95.8', u'release': u'8.3.el5_5.3', u'arch': u'x86_64'}, {u'src': None, u'name': u'expat-devel', u'sum': [u'md5', u'f343c37dccd8679e2b068403cfb8d077'], u'filename': u'expat-devel-1.95.8-8.3.el5_5.3.i386.rpm', u'epoch': u'0', u'version': u'1.95.8', u'release': u'8.3.el5_5.3', u'arch': u'i386'}, {u'src': None, u'name': u'expat-devel', u'sum': [u'md5', u'b7d2bebc2eed611dddd8d9bb63083bb2'], u'filename': u'expat-devel-1.95.8-8.3.el5_5.3.x86_64.rpm', u'epoch': u'0', u'version': u'1.95.8', u'release': u'8.3.el5_5.3', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u'\n[3.10.13-1.1]\n- Update to 3.10.13\n Resolves #596133 ', u'issued': u'2010-09-13', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELBA-2010-0695.html', u'type': u'self', u'id': None, u'title': u'ELBA-2010-0695'}], u'_content_type_id': u'erratum', u'_id': u'b7cda3d8-7b18-4017-9e46-2cd9ffae96b0', u'from': u'el-errata@oss.oracle.com', u'severity': u'', u'title': u'python-dmidecode bug fix update', u'_ns': u'units_erratum', u'rights': u'Copyright 2010 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 5', u'reboot_suggested': False, u'type': u'bugfix', u'pkglist': [{u'packages': [{u'src': None, u'name': u'python-dmidecode', u'sum': [u'md5', u'c01d54720c72a481eee4f06027d39d8b'], u'filename': u'python-dmidecode-3.10.13-1.el5_5.1.src.rpm', u'epoch': u'0', u'version': u'3.10.13', u'release': u'1.el5_5.1', u'arch': u'src'}, {u'src': None, u'name': u'python-dmidecode', u'sum': [u'md5', u'9b28586f97b6b12d786d484e28f426e2'], u'filename': u'python-dmidecode-3.10.13-1.el5_5.1.x86_64.rpm', u'epoch': u'0', u'version': u'3.10.13', u'release': u'1.el5_5.1', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u'\n[2.2.4-22.el5_5.1]\n- fixed session/object performance degradation (#627560)\n- Resolves: #627560', u'issued': u'2010-09-15', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELBA-2010-0699.html', u'type': u'self', u'id': None, u'title': u'ELBA-2010-0699'}], u'_content_type_id': u'erratum', u'_id': u'efb10405-0fb2-4fe7-9807-41ca46203b1a', u'from': u'el-errata@oss.oracle.com', u'severity': u'', u'title': u'openCryptoki bug fix update', u'_ns': u'units_erratum', u'rights': u'Copyright 2010 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 5', u'reboot_suggested': False, u'type': u'bugfix', u'pkglist': [{u'packages': [{u'src': None, u'name': u'openCryptoki', u'sum': [u'md5', u'ad4a668d6e260e05aa1ff4281dab9e65'], u'filename': u'openCryptoki-2.2.4-22.el5_5.1.i386.rpm', u'epoch': u'0', u'version': u'2.2.4', u'release': u'22.el5_5.1', u'arch': u'i386'}, {u'src': None, u'name': u'openCryptoki', u'sum': [u'md5', u'c9ca0776cdef01ac7150c7152823ed50'], u'filename': u'openCryptoki-2.2.4-22.el5_5.1.src.rpm', u'epoch': u'0', u'version': u'2.2.4', u'release': u'22.el5_5.1', u'arch': u'src'}, {u'src': None, u'name': u'openCryptoki', u'sum': [u'md5', u'22f84b56f0edf1e6ef3492a48e5e6fac'], u'filename': u'openCryptoki-2.2.4-22.el5_5.1.x86_64.rpm', u'epoch': u'0', u'version': u'2.2.4', u'release': u'22.el5_5.1', u'arch': u'x86_64'}, {u'src': None, u'name': u'openCryptoki-devel', u'sum': [u'md5', u'1e73f083a6b5e85dbbbbba4208b4dfda'], u'filename': u'openCryptoki-devel-2.2.4-22.el5_5.1.i386.rpm', u'epoch': u'0', u'version': u'2.2.4', u'release': u'22.el5_5.1', u'arch': u'i386'}, {u'src': None, u'name': u'openCryptoki-devel', u'sum': [u'md5', u'39afa23d02f4d704fd23d7b00ba8df40'], u'filename': u'openCryptoki-devel-2.2.4-22.el5_5.1.x86_64.rpm', u'epoch': u'0', u'version': u'2.2.4', u'release': u'22.el5_5.1', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u"\n[1.1.1-48.76.0.1.el5_5.2]\n- Added oracle-enterprise-detect.patch\n- Replaced 'Red Hat' in spec file\n\n[1.1.1-48.76.2]\n- xserver-1.1.1-dbe-validate-gc.patch: Validate DBE GCs against both\n buffers (#626328) ", u'issued': u'2010-09-29', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELBA-2010-0722.html', u'type': u'self', u'id': None, u'title': u'ELBA-2010-0722'}], u'_content_type_id': u'erratum', u'_id': u'f78231be-511f-4fe0-b2bc-268e05460455', u'from': u'el-errata@oss.oracle.com', u'severity': u'', u'title': u'xorg-x11-server bug fix update', u'_ns': u'units_erratum', u'rights': u'Copyright 2010 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 5', u'reboot_suggested': False, u'type': u'bugfix', u'pkglist': [{u'packages': [{u'src': None, u'name': u'xorg-x11-server', u'sum': [u'md5', u'681bf30eac61d299f384a767ed23989e'], u'filename': u'xorg-x11-server-1.1.1-48.76.0.1.el5_5.2.src.rpm', u'epoch': u'0', u'version': u'1.1.1', u'release': u'48.76.0.1.el5_5.2', u'arch': u'src'}, {u'src': None, u'name': u'xorg-x11-server-Xdmx', u'sum': [u'md5', u'5975c56fd1e80e191c1f20eccae32192'], u'filename': u'xorg-x11-server-Xdmx-1.1.1-48.76.0.1.el5_5.2.x86_64.rpm', u'epoch': u'0', u'version': u'1.1.1', u'release': u'48.76.0.1.el5_5.2', u'arch': u'x86_64'}, {u'src': None, u'name': u'xorg-x11-server-Xephyr', u'sum': [u'md5', u'8062a81c190c8f8f9bca289c12ab5a16'], u'filename': u'xorg-x11-server-Xephyr-1.1.1-48.76.0.1.el5_5.2.x86_64.rpm', u'epoch': u'0', u'version': u'1.1.1', u'release': u'48.76.0.1.el5_5.2', u'arch': u'x86_64'}, {u'src': None, u'name': u'xorg-x11-server-Xnest', u'sum': [u'md5', u'8a0e204567bdbdaee59c4d5c17d44362'], u'filename': u'xorg-x11-server-Xnest-1.1.1-48.76.0.1.el5_5.2.x86_64.rpm', u'epoch': u'0', u'version': u'1.1.1', u'release': u'48.76.0.1.el5_5.2', u'arch': u'x86_64'}, {u'src': None, u'name': u'xorg-x11-server-Xorg', u'sum': [u'md5', u'bb8f16d594104094524f2ee6bc5ca291'], u'filename': u'xorg-x11-server-Xorg-1.1.1-48.76.0.1.el5_5.2.x86_64.rpm', u'epoch': u'0', u'version': u'1.1.1', u'release': u'48.76.0.1.el5_5.2', u'arch': u'x86_64'}, {u'src': None, u'name': u'xorg-x11-server-Xvfb', u'sum': [u'md5', u'387807683e6947a9476b04152abea3d5'], u'filename': u'xorg-x11-server-Xvfb-1.1.1-48.76.0.1.el5_5.2.x86_64.rpm', u'epoch': u'0', u'version': u'1.1.1', u'release': u'48.76.0.1.el5_5.2', u'arch': u'x86_64'}, {u'src': None, u'name': u'xorg-x11-server-Xvnc-source', u'sum': [u'md5', u'b8b4c9741861dfc48580feac0491e819'], u'filename': u'xorg-x11-server-Xvnc-source-1.1.1-48.76.0.1.el5_5.2.x86_64.rpm', u'epoch': u'0', u'version': u'1.1.1', u'release': u'48.76.0.1.el5_5.2', u'arch': u'x86_64'}, {u'src': None, u'name': u'xorg-x11-server-sdk', u'sum': [u'md5', u'6dfeeaf36cb5d4111127391241f0bd54'], u'filename': u'xorg-x11-server-sdk-1.1.1-48.76.0.1.el5_5.2.x86_64.rpm', u'epoch': u'0', u'version': u'1.1.1', u'release': u'48.76.0.1.el5_5.2', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u'\n[3.3-0.pre3.1.60.el5_5.1]\n- Correct a problem with upgrading Driver Updates not updating symlinks.\n- Resolves: #638855 ', u'issued': u'2010-10-11', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELBA-2010-0759.html', u'type': u'self', u'id': None, u'title': u'ELBA-2010-0759'}], u'_content_type_id': u'erratum', u'_id': u'c66c9ceb-28ec-4360-97e7-9d21c4153752', u'from': u'el-errata@oss.oracle.com', u'severity': u'', u'title': u'module-init-tools bug fix update', u'_ns': u'units_erratum', u'rights': u'Copyright 2010 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 5', u'reboot_suggested': False, u'type': u'bugfix', u'pkglist': [{u'packages': [{u'src': None, u'name': u'module-init-tools', u'sum': [u'md5', u'be6b4f74828ce917dd1516fec8aeaec6'], u'filename': u'module-init-tools-3.3-0.pre3.1.60.el5_5.1.src.rpm', u'epoch': u'0', u'version': u'3.3', u'release': u'0.pre3.1.60.el5_5.1', u'arch': u'src'}, {u'src': None, u'name': u'module-init-tools', u'sum': [u'md5', u'42a436b1c67eb298c1a218da7577ab7d'], u'filename': u'module-init-tools-3.3-0.pre3.1.60.el5_5.1.x86_64.rpm', u'epoch': u'0', u'version': u'3.3', u'release': u'0.pre3.1.60.el5_5.1', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u'\n[6.2.8.0-4.el5_5.3]\n- Fix page size argument parsing (640587)', u'issued': u'2010-10-20', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELBA-2010-0784.html', u'type': u'self', u'id': None, u'title': u'ELBA-2010-0784'}], u'_content_type_id': u'erratum', u'_id': u'a97f9b39-c038-4402-8753-6a41049cb882', u'from': u'el-errata@oss.oracle.com', u'severity': u'', u'title': u'ImageMagick bug fix update', u'_ns': u'units_erratum', u'rights': u'Copyright 2010 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 5', u'reboot_suggested': False, u'type': u'bugfix', u'pkglist': [{u'packages': [{u'src': None, u'name': u'ImageMagick', u'sum': [u'md5', u'7774866dbd6372c44e062dbfc50b5a6e'], u'filename': u'ImageMagick-6.2.8.0-4.el5_5.3.i386.rpm', u'epoch': u'0', u'version': u'6.2.8.0', u'release': u'4.el5_5.3', u'arch': u'i386'}, {u'src': None, u'name': u'ImageMagick', u'sum': [u'md5', u'713ea65d7892e908067fd62fddf4ce48'], u'filename': u'ImageMagick-6.2.8.0-4.el5_5.3.src.rpm', u'epoch': u'0', u'version': u'6.2.8.0', u'release': u'4.el5_5.3', u'arch': u'src'}, {u'src': None, u'name': u'ImageMagick', u'sum': [u'md5', u'fad0bed217bb273e385634a4d5868c1c'], u'filename': u'ImageMagick-6.2.8.0-4.el5_5.3.x86_64.rpm', u'epoch': u'0', u'version': u'6.2.8.0', u'release': u'4.el5_5.3', u'arch': u'x86_64'}, {u'src': None, u'name': u'ImageMagick-c++', u'sum': [u'md5', u'022fcc13e923ba61e2ec5c055b61b0c3'], u'filename': u'ImageMagick-c++-6.2.8.0-4.el5_5.3.i386.rpm', u'epoch': u'0', u'version': u'6.2.8.0', u'release': u'4.el5_5.3', u'arch': u'i386'}, {u'src': None, u'name': u'ImageMagick-c++', u'sum': [u'md5', u'42867d01d3cc99771bea016ffc5fe617'], u'filename': u'ImageMagick-c++-6.2.8.0-4.el5_5.3.x86_64.rpm', u'epoch': u'0', u'version': u'6.2.8.0', u'release': u'4.el5_5.3', u'arch': u'x86_64'}, {u'src': None, u'name': u'ImageMagick-c++-devel', u'sum': [u'md5', u'30c3aec116082b961f2b84c8ffb93dda'], u'filename': u'ImageMagick-c++-devel-6.2.8.0-4.el5_5.3.i386.rpm', u'epoch': u'0', u'version': u'6.2.8.0', u'release': u'4.el5_5.3', u'arch': u'i386'}, {u'src': None, u'name': u'ImageMagick-c++-devel', u'sum': [u'md5', u'896d92e37cd28dc1eb4fccfa77359f09'], u'filename': u'ImageMagick-c++-devel-6.2.8.0-4.el5_5.3.x86_64.rpm', u'epoch': u'0', u'version': u'6.2.8.0', u'release': u'4.el5_5.3', u'arch': u'x86_64'}, {u'src': None, u'name': u'ImageMagick-devel', u'sum': [u'md5', u'23493fd8a1fe76d0c444e74f18198a3a'], u'filename': u'ImageMagick-devel-6.2.8.0-4.el5_5.3.i386.rpm', u'epoch': u'0', u'version': u'6.2.8.0', u'release': u'4.el5_5.3', u'arch': u'i386'}, {u'src': None, u'name': u'ImageMagick-devel', u'sum': [u'md5', u'a1fbd1baf4ddda6cf02b180bcc51fb8e'], u'filename': u'ImageMagick-devel-6.2.8.0-4.el5_5.3.x86_64.rpm', u'epoch': u'0', u'version': u'6.2.8.0', u'release': u'4.el5_5.3', u'arch': u'x86_64'}, {u'src': None, u'name': u'ImageMagick-perl', u'sum': [u'md5', u'628ddd9b1b69fcad056d8746ba32b90c'], u'filename': u'ImageMagick-perl-6.2.8.0-4.el5_5.3.x86_64.rpm', u'epoch': u'0', u'version': u'6.2.8.0', u'release': u'4.el5_5.3', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u'\n[2.16.0-1.1.el5_5.1]\n- rev release for smooth upgrade path\n\n[2.16.0-1.1]\n- Tie bonobo-activation-server to session if the\n BONOBO_ACTIVATION_RUN_SERVER_PER_SESSION environment variable\n is set.\n Resolves: #641814', u'issued': u'2010-10-22', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELBA-2010-0789.html', u'type': u'self', u'id': None, u'title': u'ELBA-2010-0789'}], u'_content_type_id': u'erratum', u'_id': u'292c1e53-6dca-4bf2-8c41-21b2be362723', u'from': u'el-errata@oss.oracle.com', u'severity': u'', u'title': u'libbonobo bug fix update', u'_ns': u'units_erratum', u'rights': u'Copyright 2010 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 5', u'reboot_suggested': False, u'type': u'bugfix', u'pkglist': [{u'packages': [{u'src': None, u'name': u'libbonobo', u'sum': [u'md5', u'6dd221d40eaa6eb61111da4e7c8fc7c6'], u'filename': u'libbonobo-2.16.0-1.1.el5_5.1.i386.rpm', u'epoch': u'0', u'version': u'2.16.0', u'release': u'1.1.el5_5.1', u'arch': u'i386'}, {u'src': None, u'name': u'libbonobo', u'sum': [u'md5', u'3f77b07cf79e5c3fc08abf508488f101'], u'filename': u'libbonobo-2.16.0-1.1.el5_5.1.src.rpm', u'epoch': u'0', u'version': u'2.16.0', u'release': u'1.1.el5_5.1', u'arch': u'src'}, {u'src': None, u'name': u'libbonobo', u'sum': [u'md5', u'467049e551510d0e334e71d65206c094'], u'filename': u'libbonobo-2.16.0-1.1.el5_5.1.x86_64.rpm', u'epoch': u'0', u'version': u'2.16.0', u'release': u'1.1.el5_5.1', u'arch': u'x86_64'}, {u'src': None, u'name': u'libbonobo-devel', u'sum': [u'md5', u'9a5a5d2ccd9eef82fca29398ce5f1228'], u'filename': u'libbonobo-devel-2.16.0-1.1.el5_5.1.i386.rpm', u'epoch': u'0', u'version': u'2.16.0', u'release': u'1.1.el5_5.1', u'arch': u'i386'}, {u'src': None, u'name': u'libbonobo-devel', u'sum': [u'md5', u'8d49e61c76e12f07246349e6b2a997b1'], u'filename': u'libbonobo-devel-2.16.0-1.1.el5_5.1.x86_64.rpm', u'epoch': u'0', u'version': u'2.16.0', u'release': u'1.1.el5_5.1', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u'\n[3.0-33.8.el5.6]\n- fix epstopdf error when converting eps with bounding box (#635666) ', u'issued': u'2010-11-01', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELBA-2010-0816.html', u'type': u'self', u'id': None, u'title': u'ELBA-2010-0816'}], u'_content_type_id': u'erratum', u'_id': u'0c4416fd-0503-4ca7-a4ef-ebe64c0e15e9', u'from': u'el-errata@oss.oracle.com', u'severity': u'', u'title': u'tetex bug fix update', u'_ns': u'units_erratum', u'rights': u'Copyright 2010 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 5', u'reboot_suggested': False, u'type': u'bugfix', u'pkglist': [{u'packages': [{u'src': None, u'name': u'tetex', u'sum': [u'md5', u'940999c4a689c74d40304224f344192b'], u'filename': u'tetex-3.0-33.8.el5_5.6.src.rpm', u'epoch': u'0', u'version': u'3.0', u'release': u'33.8.el5_5.6', u'arch': u'src'}, {u'src': None, u'name': u'tetex', u'sum': [u'md5', u'461375445eb3ff9251ec3858806057ed'], u'filename': u'tetex-3.0-33.8.el5_5.6.x86_64.rpm', u'epoch': u'0', u'version': u'3.0', u'release': u'33.8.el5_5.6', u'arch': u'x86_64'}, {u'src': None, u'name': u'tetex-afm', u'sum': [u'md5', u'abdbf21a558fefec4de7ddd74d9249b1'], u'filename': u'tetex-afm-3.0-33.8.el5_5.6.x86_64.rpm', u'epoch': u'0', u'version': u'3.0', u'release': u'33.8.el5_5.6', u'arch': u'x86_64'}, {u'src': None, u'name': u'tetex-doc', u'sum': [u'md5', u'629fafbe00e86730466e5d35690cb2f4'], u'filename': u'tetex-doc-3.0-33.8.el5_5.6.x86_64.rpm', u'epoch': u'0', u'version': u'3.0', u'release': u'33.8.el5_5.6', u'arch': u'x86_64'}, {u'src': None, u'name': u'tetex-dvips', u'sum': [u'md5', u'3565b16160195685085c327c82e2458f'], u'filename': u'tetex-dvips-3.0-33.8.el5_5.6.x86_64.rpm', u'epoch': u'0', u'version': u'3.0', u'release': u'33.8.el5_5.6', u'arch': u'x86_64'}, {u'src': None, u'name': u'tetex-fonts', u'sum': [u'md5', u'511a93d66fd2a0f0f2c796248a3c8e31'], u'filename': u'tetex-fonts-3.0-33.8.el5_5.6.x86_64.rpm', u'epoch': u'0', u'version': u'3.0', u'release': u'33.8.el5_5.6', u'arch': u'x86_64'}, {u'src': None, u'name': u'tetex-latex', u'sum': [u'md5', u'61ec920efe18dbfef607aa4fffe97ed0'], u'filename': u'tetex-latex-3.0-33.8.el5_5.6.x86_64.rpm', u'epoch': u'0', u'version': u'3.0', u'release': u'33.8.el5_5.6', u'arch': u'x86_64'}, {u'src': None, u'name': u'tetex-xdvi', u'sum': [u'md5', u'ce052c0fc1287cf0c9cb37653a522cab'], u'filename': u'tetex-xdvi-3.0-33.8.el5_5.6.x86_64.rpm', u'epoch': u'0', u'version': u'3.0', u'release': u'33.8.el5_5.6', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u'\n[2.3.1-5.dist.1]\n- fixed clipboard problem on 64 bit architectures (rhbz#647399) ', u'issued': u'2010-11-03', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELBA-2010-0822.html', u'type': u'self', u'id': None, u'title': u'ELBA-2010-0822'}], u'_content_type_id': u'erratum', u'_id': u'8471c3df-a8ac-4711-9124-64339a4757d2', u'from': u'el-errata@oss.oracle.com', u'severity': u'', u'title': u'openmotif bug fix update', u'_ns': u'units_erratum', u'rights': u'Copyright 2010 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 5', u'reboot_suggested': False, u'type': u'bugfix', u'pkglist': [{u'packages': [{u'src': None, u'name': u'openmotif', u'sum': [u'md5', u'014271eefd75170035f953609f735738'], u'filename': u'openmotif-2.3.1-5.el5_5.1.i386.rpm', u'epoch': u'0', u'version': u'2.3.1', u'release': u'5.el5_5.1', u'arch': u'i386'}, {u'src': None, u'name': u'openmotif', u'sum': [u'md5', u'b9c8f1d3d1e9ca13d73bd59226bc39c9'], u'filename': u'openmotif-2.3.1-5.el5_5.1.src.rpm', u'epoch': u'0', u'version': u'2.3.1', u'release': u'5.el5_5.1', u'arch': u'src'}, {u'src': None, u'name': u'openmotif', u'sum': [u'md5', u'9dbfdc37ba641c3b5e73a07794ea3a42'], u'filename': u'openmotif-2.3.1-5.el5_5.1.x86_64.rpm', u'epoch': u'0', u'version': u'2.3.1', u'release': u'5.el5_5.1', u'arch': u'x86_64'}, {u'src': None, u'name': u'openmotif-devel', u'sum': [u'md5', u'4faaf629c4dd6bca431c51c18feb65a7'], u'filename': u'openmotif-devel-2.3.1-5.el5_5.1.i386.rpm', u'epoch': u'0', u'version': u'2.3.1', u'release': u'5.el5_5.1', u'arch': u'i386'}, {u'src': None, u'name': u'openmotif-devel', u'sum': [u'md5', u'd5d3bd1f7cb9790c45f8b67c012cd72b'], u'filename': u'openmotif-devel-2.3.1-5.el5_5.1.x86_64.rpm', u'epoch': u'0', u'version': u'2.3.1', u'release': u'5.el5_5.1', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u'\n[6.14-17.2]\n- Fix tcsh obeys printexitvalue for back-ticks\n Resolves: #640252\n- Remove extra fork when tcsh processes backquotes\n Resolves: #640251\n\n[6.14-17.1]\n- Fix null pointer dereference crashes tcsh\n Resolves: #631815 ', u'issued': u'2010-11-03', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELBA-2010-0823.html', u'type': u'self', u'id': None, u'title': u'ELBA-2010-0823'}], u'_content_type_id': u'erratum', u'_id': u'ad2a7e10-f197-473f-9e0a-f1c605f9e285', u'from': u'el-errata@oss.oracle.com', u'severity': u'', u'title': u'tcsh bug fix update', u'_ns': u'units_erratum', u'rights': u'Copyright 2010 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 5', u'reboot_suggested': False, u'type': u'bugfix', u'pkglist': [{u'packages': [{u'src': None, u'name': u'tcsh', u'sum': [u'md5', u'45eacd365030a75de36f5d4d75bf0305'], u'filename': u'tcsh-6.14-17.el5_5.2.src.rpm', u'epoch': u'0', u'version': u'6.14', u'release': u'17.el5_5.2', u'arch': u'src'}, {u'src': None, u'name': u'tcsh', u'sum': [u'md5', u'b4ce7efeba014297744d7f027a66ae8a'], u'filename': u'tcsh-6.14-17.el5_5.2.x86_64.rpm', u'epoch': u'0', u'version': u'6.14', u'release': u'17.el5_5.2', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u'\n[3.7.4-9.el5_5.2]\n- fix #646762 - fix crash when using compressoptions in logrotate.conf', u'issued': u'2010-11-04', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELBA-2010-0827.html', u'type': u'self', u'id': None, u'title': u'ELBA-2010-0827'}], u'_content_type_id': u'erratum', u'_id': u'd1c9c8b6-87d2-4c67-8658-d6392d2e3e0f', u'from': u'el-errata@oss.oracle.com', u'severity': u'', u'title': u'logrotate bug fix update', u'_ns': u'units_erratum', u'rights': u'Copyright 2010 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 5', u'reboot_suggested': False, u'type': u'bugfix', u'pkglist': [{u'packages': [{u'src': None, u'name': u'logrotate', u'sum': [u'md5', u'b32b15b9ad3661f72bbf0158a914a69e'], u'filename': u'logrotate-3.7.4-9.el5_5.2.src.rpm', u'epoch': u'0', u'version': u'3.7.4', u'release': u'9.el5_5.2', u'arch': u'src'}, {u'src': None, u'name': u'logrotate', u'sum': [u'md5', u'9ef7b1d71f5ba497f988eb14212ba721'], u'filename': u'logrotate-3.7.4-9.el5_5.2.x86_64.rpm', u'epoch': u'0', u'version': u'3.7.4', u'release': u'9.el5_5.2', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u'\n[5.0.1-0.rc2.143.0.1.el5_5.6]\n- apply fix from NetApp to use tcp before udp\n http://www.mail-archive.com/autofs@linux.kernel.org/msg07910.html\n (Bert Barbe) [orabug 6827898]\n\n[5.0.1-0.rc2.143.el5_5.6]\n- Bug 648411 - autofs5: segfault in close_mount()\n - add mutex to serialize access to mount module handle in parse module.\n - dont check null cache on expire.\n - fix null cache race.\n - fix cache_init() on source re-read.\n- Resolves: rhbz#648411 ', u'issued': u'2010-11-08', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELBA-2010-0833.html', u'type': u'self', u'id': None, u'title': u'ELBA-2010-0833'}], u'_content_type_id': u'erratum', u'_id': u'69cf1905-e23a-4475-ae77-1be6a60230f0', u'from': u'el-errata@oss.oracle.com', u'severity': u'', u'title': u'autofs bug fix update', u'_ns': u'units_erratum', u'rights': u'Copyright 2010 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 5', u'reboot_suggested': False, u'type': u'bugfix', u'pkglist': [{u'packages': [{u'src': None, u'name': u'autofs', u'sum': [u'md5', u'296c0b9693902836ce3da725702382e9'], u'filename': u'autofs-5.0.1-0.rc2.143.0.1.el5_5.6.src.rpm', u'epoch': u'1', u'version': u'5.0.1', u'release': u'0.rc2.143.0.1.el5_5.6', u'arch': u'src'}, {u'src': None, u'name': u'autofs', u'sum': [u'md5', u'5bba7831f55800c94601a254d110c234'], u'filename': u'autofs-5.0.1-0.rc2.143.0.1.el5_5.6.x86_64.rpm', u'epoch': u'1', u'version': u'5.0.1', u'release': u'0.rc2.143.0.1.el5_5.6', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u'\n[1.39-23.1]\n- blkid: handle stale entries in blkid cache (#637920)\n- e2fsck: mark sparse journal as invalid (#580671, #621836)', u'issued': u'2010-11-10', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELBA-2010-0868.html', u'type': u'self', u'id': None, u'title': u'ELBA-2010-0868'}], u'_content_type_id': u'erratum', u'_id': u'946c538a-7e25-49da-a2be-4bfc3176c5a9', u'from': u'el-errata@oss.oracle.com', u'severity': u'', u'title': u'e2fsprogs bug fix and enhancement update', u'_ns': u'units_erratum', u'rights': u'Copyright 2010 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 5', u'reboot_suggested': False, u'type': u'bugfix', u'pkglist': [{u'packages': [{u'src': None, u'name': u'e2fsprogs', u'sum': [u'md5', u'6a7543ce7fce7e7766632e465021196b'], u'filename': u'e2fsprogs-1.39-23.el5_5.1.src.rpm', u'epoch': u'0', u'version': u'1.39', u'release': u'23.el5_5.1', u'arch': u'src'}, {u'src': None, u'name': u'e2fsprogs', u'sum': [u'md5', u'0393292eda6f0bf91b10a7f451676d5d'], u'filename': u'e2fsprogs-1.39-23.el5_5.1.x86_64.rpm', u'epoch': u'0', u'version': u'1.39', u'release': u'23.el5_5.1', u'arch': u'x86_64'}, {u'src': None, u'name': u'e2fsprogs-devel', u'sum': [u'md5', u'c6f89465425ebd658960f447342aa844'], u'filename': u'e2fsprogs-devel-1.39-23.el5_5.1.i386.rpm', u'epoch': u'0', u'version': u'1.39', u'release': u'23.el5_5.1', u'arch': u'i386'}, {u'src': None, u'name': u'e2fsprogs-devel', u'sum': [u'md5', u'49bf48c82d869e7dbb47403c691f3618'], u'filename': u'e2fsprogs-devel-1.39-23.el5_5.1.x86_64.rpm', u'epoch': u'0', u'version': u'1.39', u'release': u'23.el5_5.1', u'arch': u'x86_64'}, {u'src': None, u'name': u'e2fsprogs-libs', u'sum': [u'md5', u'2277ec453fbfff5340ff11e16877157d'], u'filename': u'e2fsprogs-libs-1.39-23.el5_5.1.i386.rpm', u'epoch': u'0', u'version': u'1.39', u'release': u'23.el5_5.1', u'arch': u'i386'}, {u'src': None, u'name': u'e2fsprogs-libs', u'sum': [u'md5', u'8f095e752ee57ce31b3e9228336da907'], u'filename': u'e2fsprogs-libs-1.39-23.el5_5.1.x86_64.rpm', u'epoch': u'0', u'version': u'1.39', u'release': u'23.el5_5.1', u'arch': u'x86_64'}, {u'src': None, u'name': u'uuidd', u'sum': [u'md5', u'd018784ea1982cc1f9b39e78efc7be66'], u'filename': u'uuidd-1.39-23.el5_5.1.x86_64.rpm', u'epoch': u'0', u'version': u'1.39', u'release': u'23.el5_5.1', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u'\n[2.9.1-2.0.1.el5_5.1]\n- Added pegasus-enterprise.patch to allow detection of enterprise-release\n\n[2:2.9.1-2.1]\n- Fix memory leak\n Resolves: #644839', u'issued': u'2010-11-10', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELBA-2010-0869.html', u'type': u'self', u'id': None, u'title': u'ELBA-2010-0869'}], u'_content_type_id': u'erratum', u'_id': u'e96931a5-2071-4f92-b037-b1bf2b5a581b', u'from': u'el-errata@oss.oracle.com', u'severity': u'', u'title': u'tog-pegasus bugfix update', u'_ns': u'units_erratum', u'rights': u'Copyright 2010 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 5', u'reboot_suggested': False, u'type': u'bugfix', u'pkglist': [{u'packages': [{u'src': None, u'name': u'tog-pegasus', u'sum': [u'md5', u'a2c1b3ead59bdb3ae7ee8e8d4c665d32'], u'filename': u'tog-pegasus-2.9.1-2.0.1.el5_5.1.i386.rpm', u'epoch': u'2', u'version': u'2.9.1', u'release': u'2.0.1.el5_5.1', u'arch': u'i386'}, {u'src': None, u'name': u'tog-pegasus', u'sum': [u'md5', u'6f1f0ca9c1646d55ac47ce787f1a8707'], u'filename': u'tog-pegasus-2.9.1-2.0.1.el5_5.1.src.rpm', u'epoch': u'2', u'version': u'2.9.1', u'release': u'2.0.1.el5_5.1', u'arch': u'src'}, {u'src': None, u'name': u'tog-pegasus', u'sum': [u'md5', u'4760e8230b24452cddf8a1646895be09'], u'filename': u'tog-pegasus-2.9.1-2.0.1.el5_5.1.x86_64.rpm', u'epoch': u'2', u'version': u'2.9.1', u'release': u'2.0.1.el5_5.1', u'arch': u'x86_64'}, {u'src': None, u'name': u'tog-pegasus-devel', u'sum': [u'md5', u'82bc12dcb106a812961d60270c982ceb'], u'filename': u'tog-pegasus-devel-2.9.1-2.0.1.el5_5.1.i386.rpm', u'epoch': u'2', u'version': u'2.9.1', u'release': u'2.0.1.el5_5.1', u'arch': u'i386'}, {u'src': None, u'name': u'tog-pegasus-devel', u'sum': [u'md5', u'4f3e9ba90393e3536d7ea06f862aff99'], u'filename': u'tog-pegasus-devel-2.9.1-2.0.1.el5_5.1.x86_64.rpm', u'epoch': u'2', u'version': u'2.9.1', u'release': u'2.0.1.el5_5.1', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u'\n[0.26-9.1]\n- fix memory leak (#641347)', u'issued': u'2010-11-11', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELBA-2010-0880.html', u'type': u'self', u'id': None, u'title': u'ELBA-2010-0880'}], u'_content_type_id': u'erratum', u'_id': u'7c839926-3f0f-4096-9cbb-d24d043cc235', u'from': u'el-errata@oss.oracle.com', u'severity': u'', u'title': u'mod_authz_ldap bug fix update', u'_ns': u'units_erratum', u'rights': u'Copyright 2010 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 5', u'reboot_suggested': False, u'type': u'bugfix', u'pkglist': [{u'packages': [{u'src': None, u'name': u'mod_authz_ldap', u'sum': [u'md5', u'6d51d844c18749c3d72cccd56f64d04e'], u'filename': u'mod_authz_ldap-0.26-9.el5_5.1.src.rpm', u'epoch': u'0', u'version': u'0.26', u'release': u'9.el5_5.1', u'arch': u'src'}, {u'src': None, u'name': u'mod_authz_ldap', u'sum': [u'md5', u'ceb6abc4b33e82423dc6a334f0d6902d'], u'filename': u'mod_authz_ldap-0.26-9.el5_5.1.x86_64.rpm', u'epoch': u'0', u'version': u'0.26', u'release': u'9.el5_5.1', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u'\n[2.0.25-2.el5.1]\n- compat-dapl-1.2.15-pipe-leak.patch\n Resolves: bz638595\n- dapl-cleanup-cr-linkings-after-dto-error-on-ep.patch\n Resolves: bz638594\n- compat-dapl-cleanup-cr-linkings-after-dto-error-on-ep.patch\n Resolves: bz638862\n- dapl-2.0.25-verbs-cq-completion-channels-leak.patch\n Resolves: bz638860', u'issued': u'2010-11-15', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELBA-2010-0886.html', u'type': u'self', u'id': None, u'title': u'ELBA-2010-0886'}], u'_content_type_id': u'erratum', u'_id': u'6db98bae-14c1-44b4-a496-ae0145305cac', u'from': u'el-errata@oss.oracle.com', u'severity': u'', u'title': u'dapl and compat-dapl bug fix update', u'_ns': u'units_erratum', u'rights': u'Copyright 2010 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 5', u'reboot_suggested': False, u'type': u'bugfix', u'pkglist': [{u'packages': [{u'src': None, u'name': u'compat-dapl', u'sum': [u'md5', u'dc19a0f353d7e1f17bb868767164405e'], u'filename': u'compat-dapl-2.0.25-2.el5_5.1.i386.rpm', u'epoch': u'0', u'version': u'2.0.25', u'release': u'2.el5_5.1', u'arch': u'i386'}, {u'src': None, u'name': u'compat-dapl', u'sum': [u'md5', u'69d5876bcd38d80429155eaa26a34b66'], u'filename': u'compat-dapl-2.0.25-2.el5_5.1.x86_64.rpm', u'epoch': u'0', u'version': u'2.0.25', u'release': u'2.el5_5.1', u'arch': u'x86_64'}, {u'src': None, u'name': u'compat-dapl-devel', u'sum': [u'md5', u'22e6948daaaffc37aad6722d325e45ed'], u'filename': u'compat-dapl-devel-2.0.25-2.el5_5.1.i386.rpm', u'epoch': u'0', u'version': u'2.0.25', u'release': u'2.el5_5.1', u'arch': u'i386'}, {u'src': None, u'name': u'compat-dapl-devel', u'sum': [u'md5', u'f83a5e508949a8ef2ea4ee68dba6411e'], u'filename': u'compat-dapl-devel-2.0.25-2.el5_5.1.x86_64.rpm', u'epoch': u'0', u'version': u'2.0.25', u'release': u'2.el5_5.1', u'arch': u'x86_64'}, {u'src': None, u'name': u'compat-dapl-static', u'sum': [u'md5', u'1983367aa67996767e1fcda5dcc6c06b'], u'filename': u'compat-dapl-static-2.0.25-2.el5_5.1.x86_64.rpm', u'epoch': u'0', u'version': u'2.0.25', u'release': u'2.el5_5.1', u'arch': u'x86_64'}, {u'src': None, u'name': u'compat-dapl-utils', u'sum': [u'md5', u'8557367f19a9bd9bc842a22376f7f28f'], u'filename': u'compat-dapl-utils-2.0.25-2.el5_5.1.x86_64.rpm', u'epoch': u'0', u'version': u'2.0.25', u'release': u'2.el5_5.1', u'arch': u'x86_64'}, {u'src': None, u'name': u'dapl', u'sum': [u'md5', u'5df56fea38e47157849ae1d41d628f06'], u'filename': u'dapl-2.0.25-2.el5_5.1.i386.rpm', u'epoch': u'0', u'version': u'2.0.25', u'release': u'2.el5_5.1', u'arch': u'i386'}, {u'src': None, u'name': u'dapl', u'sum': [u'md5', u'c2b4315c9a900a025a1d722b753ea668'], u'filename': u'dapl-2.0.25-2.el5_5.1.src.rpm', u'epoch': u'0', u'version': u'2.0.25', u'release': u'2.el5_5.1', u'arch': u'src'}, {u'src': None, u'name': u'dapl', u'sum': [u'md5', u'd9a221471100443627e62444bf38336d'], u'filename': u'dapl-2.0.25-2.el5_5.1.x86_64.rpm', u'epoch': u'0', u'version': u'2.0.25', u'release': u'2.el5_5.1', u'arch': u'x86_64'}, {u'src': None, u'name': u'dapl-devel', u'sum': [u'md5', u'2f47df582ab013364aca77e173a3db36'], u'filename': u'dapl-devel-2.0.25-2.el5_5.1.i386.rpm', u'epoch': u'0', u'version': u'2.0.25', u'release': u'2.el5_5.1', u'arch': u'i386'}, {u'src': None, u'name': u'dapl-devel', u'sum': [u'md5', u'6409462df3edaed9780b88e9aa95b022'], u'filename': u'dapl-devel-2.0.25-2.el5_5.1.x86_64.rpm', u'epoch': u'0', u'version': u'2.0.25', u'release': u'2.el5_5.1', u'arch': u'x86_64'}, {u'src': None, u'name': u'dapl-static', u'sum': [u'md5', u'013ad3a7becaa84c7e41b03315d06544'], u'filename': u'dapl-static-2.0.25-2.el5_5.1.x86_64.rpm', u'epoch': u'0', u'version': u'2.0.25', u'release': u'2.el5_5.1', u'arch': u'x86_64'}, {u'src': None, u'name': u'dapl-utils', u'sum': [u'md5', u'38388010b6db4880380539634062947a'], u'filename': u'dapl-utils-2.0.25-2.el5_5.1.x86_64.rpm', u'epoch': u'0', u'version': u'2.0.25', u'release': u'2.el5_5.1', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u'\n[2.3.43-12.3]\n- fix: connection freeze when using TLS (#653910)', u'issued': u'2010-11-29', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELBA-2010-0914.html', u'type': u'self', u'id': None, u'title': u'ELBA-2010-0914'}], u'_content_type_id': u'erratum', u'_id': u'4e9914e5-bd4a-4c28-aa4b-e22f4e2c6a68', u'from': u'el-errata@oss.oracle.com', u'severity': u'', u'title': u'openldap bug fix update', u'_ns': u'units_erratum', u'rights': u'Copyright 2010 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 5', u'reboot_suggested': False, u'type': u'bugfix', u'pkglist': [{u'packages': [{u'src': None, u'name': u'compat-openldap', u'sum': [u'md5', u'3d1741b97291cb11b40307b3e0ef268c'], u'filename': u'compat-openldap-2.3.43_2.2.29-12.el5_5.3.i386.rpm', u'epoch': u'0', u'version': u'2.3.43_2.2.29', u'release': u'12.el5_5.3', u'arch': u'i386'}, {u'src': None, u'name': u'compat-openldap', u'sum': [u'md5', u'3aaf369e95f3318f4e85cfb4cc5fc172'], u'filename': u'compat-openldap-2.3.43_2.2.29-12.el5_5.3.x86_64.rpm', u'epoch': u'0', u'version': u'2.3.43_2.2.29', u'release': u'12.el5_5.3', u'arch': u'x86_64'}, {u'src': None, u'name': u'openldap', u'sum': [u'md5', u'acd393a74c670e5fb055d86336c74b9c'], u'filename': u'openldap-2.3.43-12.el5_5.3.i386.rpm', u'epoch': u'0', u'version': u'2.3.43', u'release': u'12.el5_5.3', u'arch': u'i386'}, {u'src': None, u'name': u'openldap', u'sum': [u'md5', u'a9b2bc8f7e5e8fe81736300615ea63de'], u'filename': u'openldap-2.3.43-12.el5_5.3.src.rpm', u'epoch': u'0', u'version': u'2.3.43', u'release': u'12.el5_5.3', u'arch': u'src'}, {u'src': None, u'name': u'openldap', u'sum': [u'md5', u'ba46ce2b82e85008044a7ca8e679bf53'], u'filename': u'openldap-2.3.43-12.el5_5.3.x86_64.rpm', u'epoch': u'0', u'version': u'2.3.43', u'release': u'12.el5_5.3', u'arch': u'x86_64'}, {u'src': None, u'name': u'openldap-clients', u'sum': [u'md5', u'14dbaf9f90ac73e3f395a4147f4657d0'], u'filename': u'openldap-clients-2.3.43-12.el5_5.3.x86_64.rpm', u'epoch': u'0', u'version': u'2.3.43', u'release': u'12.el5_5.3', u'arch': u'x86_64'}, {u'src': None, u'name': u'openldap-devel', u'sum': [u'md5', u'9079f0452dd75ae5454e6ac567b4dcd7'], u'filename': u'openldap-devel-2.3.43-12.el5_5.3.i386.rpm', u'epoch': u'0', u'version': u'2.3.43', u'release': u'12.el5_5.3', u'arch': u'i386'}, {u'src': None, u'name': u'openldap-devel', u'sum': [u'md5', u'c5002503ff82c6a231efc2efdc0b335e'], u'filename': u'openldap-devel-2.3.43-12.el5_5.3.x86_64.rpm', u'epoch': u'0', u'version': u'2.3.43', u'release': u'12.el5_5.3', u'arch': u'x86_64'}, {u'src': None, u'name': u'openldap-servers', u'sum': [u'md5', u'008c26525be34da916bb105976b2470c'], u'filename': u'openldap-servers-2.3.43-12.el5_5.3.x86_64.rpm', u'epoch': u'0', u'version': u'2.3.43', u'release': u'12.el5_5.3', u'arch': u'x86_64'}, {u'src': None, u'name': u'openldap-servers-overlays', u'sum': [u'md5', u'094513a35abe35d3a020249bf9c0f20c'], u'filename': u'openldap-servers-overlays-2.3.43-12.el5_5.3.x86_64.rpm', u'epoch': u'0', u'version': u'2.3.43', u'release': u'12.el5_5.3', u'arch': u'x86_64'}, {u'src': None, u'name': u'openldap-servers-sql', u'sum': [u'md5', u'd953dfaa518f64ebbab5627256e18fd7'], u'filename': u'openldap-servers-sql-2.3.43-12.el5_5.3.x86_64.rpm', u'epoch': u'0', u'version': u'2.3.43', u'release': u'12.el5_5.3', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u'\n[12.18.1-1.1]\n- fixed aiff read bug when mark chunk present\n- Resolves: #651404', u'issued': u'2010-11-29', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELBA-2010-0916.html', u'type': u'self', u'id': None, u'title': u'ELBA-2010-0916'}], u'_content_type_id': u'erratum', u'_id': u'7b52f5ee-2d23-4b94-9680-c91686002dee', u'from': u'el-errata@oss.oracle.com', u'severity': u'', u'title': u'sox bug fix update', u'_ns': u'units_erratum', u'rights': u'Copyright 2010 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 5', u'reboot_suggested': False, u'type': u'bugfix', u'pkglist': [{u'packages': [{u'src': None, u'name': u'sox', u'sum': [u'md5', u'819e8335f8a05c0a1001933932ff492f'], u'filename': u'sox-12.18.1-1.el5_5.1.src.rpm', u'epoch': u'0', u'version': u'12.18.1', u'release': u'1.el5_5.1', u'arch': u'src'}, {u'src': None, u'name': u'sox', u'sum': [u'md5', u'd13524f56f37158f85e57850d8c04a9e'], u'filename': u'sox-12.18.1-1.el5_5.1.x86_64.rpm', u'epoch': u'0', u'version': u'12.18.1', u'release': u'1.el5_5.1', u'arch': u'x86_64'}, {u'src': None, u'name': u'sox-devel', u'sum': [u'md5', u'f2c5990ebcaf553d201ac946dd4f6bba'], u'filename': u'sox-devel-12.18.1-1.el5_5.1.i386.rpm', u'epoch': u'0', u'version': u'12.18.1', u'release': u'1.el5_5.1', u'arch': u'i386'}, {u'src': None, u'name': u'sox-devel', u'sum': [u'md5', u'1570dc7cb692795bd75731d87cdb8cba'], u'filename': u'sox-devel-12.18.1-1.el5_5.1.x86_64.rpm', u'epoch': u'0', u'version': u'12.18.1', u'release': u'1.el5_5.1', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u'\n[1:0.7.0-10.el5_5.2]\n- Fix crash when system settings service exits\n- Resolves: #653345', u'issued': u'2010-12-01', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELBA-2010-0933.html', u'type': u'self', u'id': None, u'title': u'ELBA-2010-0933'}], u'_content_type_id': u'erratum', u'_id': u'906d95bf-5e73-441a-877b-a18f83ca94d6', u'from': u'el-errata@oss.oracle.com', u'severity': u'', u'title': u'NetworkManager bug fix update', u'_ns': u'units_erratum', u'rights': u'Copyright 2010 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 5', u'reboot_suggested': False, u'type': u'bugfix', u'pkglist': [{u'packages': [{u'src': None, u'name': u'NetworkManager', u'sum': [u'md5', u'861a21943a441a5adc1f5c703bb0e04f'], u'filename': u'NetworkManager-0.7.0-10.el5_5.2.i386.rpm', u'epoch': u'1', u'version': u'0.7.0', u'release': u'10.el5_5.2', u'arch': u'i386'}, {u'src': None, u'name': u'NetworkManager', u'sum': [u'md5', u'53c33b5bc9cdbbfa641ac7fab6e43410'], u'filename': u'NetworkManager-0.7.0-10.el5_5.2.src.rpm', u'epoch': u'1', u'version': u'0.7.0', u'release': u'10.el5_5.2', u'arch': u'src'}, {u'src': None, u'name': u'NetworkManager', u'sum': [u'md5', u'a3d88aa2f490d22aa1e66e12c9226497'], u'filename': u'NetworkManager-0.7.0-10.el5_5.2.x86_64.rpm', u'epoch': u'1', u'version': u'0.7.0', u'release': u'10.el5_5.2', u'arch': u'x86_64'}, {u'src': None, u'name': u'NetworkManager-devel', u'sum': [u'md5', u'4e9dd2b5bb40a1e422acdf11aac65254'], u'filename': u'NetworkManager-devel-0.7.0-10.el5_5.2.i386.rpm', u'epoch': u'1', u'version': u'0.7.0', u'release': u'10.el5_5.2', u'arch': u'i386'}, {u'src': None, u'name': u'NetworkManager-devel', u'sum': [u'md5', u'2cea8c353525c34cb5577d1c6bcf90a6'], u'filename': u'NetworkManager-devel-0.7.0-10.el5_5.2.x86_64.rpm', u'epoch': u'1', u'version': u'0.7.0', u'release': u'10.el5_5.2', u'arch': u'x86_64'}, {u'src': None, u'name': u'NetworkManager-glib', u'sum': [u'md5', u'2dd740f92bdfa5c71a3015e6ada82835'], u'filename': u'NetworkManager-glib-0.7.0-10.el5_5.2.i386.rpm', u'epoch': u'1', u'version': u'0.7.0', u'release': u'10.el5_5.2', u'arch': u'i386'}, {u'src': None, u'name': u'NetworkManager-glib', u'sum': [u'md5', u'c2f44f12ea4561541532496866dc2264'], u'filename': u'NetworkManager-glib-0.7.0-10.el5_5.2.x86_64.rpm', u'epoch': u'1', u'version': u'0.7.0', u'release': u'10.el5_5.2', u'arch': u'x86_64'}, {u'src': None, u'name': u'NetworkManager-glib-devel', u'sum': [u'md5', u'cb78ad782bf45a01bb45fc169872dfd4'], u'filename': u'NetworkManager-glib-devel-0.7.0-10.el5_5.2.i386.rpm', u'epoch': u'1', u'version': u'0.7.0', u'release': u'10.el5_5.2', u'arch': u'i386'}, {u'src': None, u'name': u'NetworkManager-glib-devel', u'sum': [u'md5', u'0cfdfb2128120e4e0d6bdcd630cf325f'], u'filename': u'NetworkManager-glib-devel-0.7.0-10.el5_5.2.x86_64.rpm', u'epoch': u'1', u'version': u'0.7.0', u'release': u'10.el5_5.2', u'arch': u'x86_64'}, {u'src': None, u'name': u'NetworkManager-gnome', u'sum': [u'md5', u'f338c392ec59c0f818f3a65603f7cdb6'], u'filename': u'NetworkManager-gnome-0.7.0-10.el5_5.2.x86_64.rpm', u'epoch': u'1', u'version': u'0.7.0', u'release': u'10.el5_5.2', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u'\n[2.16.1-8.2]\n- Prevent hang ups caused when printing non-interactive PAM messages\n Resolves: #656924', u'issued': u'2010-12-06', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELBA-2010-0944.html', u'type': u'self', u'id': None, u'title': u'ELBA-2010-0944'}], u'_content_type_id': u'erratum', u'_id': u'b4adf7f5-0b5f-4113-876c-12693082cf44', u'from': u'el-errata@oss.oracle.com', u'severity': u'', u'title': u'gnome-screensaver bug fix update', u'_ns': u'units_erratum', u'rights': u'Copyright 2010 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 5', u'reboot_suggested': False, u'type': u'bugfix', u'pkglist': [{u'packages': [{u'src': None, u'name': u'gnome-screensaver', u'sum': [u'md5', u'65323c72cdd71029fe65e7515880aea2'], u'filename': u'gnome-screensaver-2.16.1-8.el5_5.2.src.rpm', u'epoch': u'0', u'version': u'2.16.1', u'release': u'8.el5_5.2', u'arch': u'src'}, {u'src': None, u'name': u'gnome-screensaver', u'sum': [u'md5', u'e8b8cbad999cfacc01ecfeeb07f7e899'], u'filename': u'gnome-screensaver-2.16.1-8.el5_5.2.x86_64.rpm', u'epoch': u'0', u'version': u'2.16.1', u'release': u'8.el5_5.2', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u'\n[3.22.1-3.el5_5.1]\n- add missing directives to rsyslog.conf\n Resolves: #661147, #661148, #661149', u'issued': u'2010-12-14', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELBA-2010-0980.html', u'type': u'self', u'id': None, u'title': u'ELBA-2010-0980'}], u'_content_type_id': u'erratum', u'_id': u'4b8bb6b4-b01a-4ecc-9922-38f78ed83549', u'from': u'el-errata@oss.oracle.com', u'severity': u'', u'title': u'rsyslog bug fix update', u'_ns': u'units_erratum', u'rights': u'Copyright 2010 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 5', u'reboot_suggested': False, u'type': u'bugfix', u'pkglist': [{u'packages': [{u'src': None, u'name': u'rsyslog', u'sum': [u'md5', u'0c7ec320817c043787ffe4f2ffce3374'], u'filename': u'rsyslog-3.22.1-3.el5_5.1.src.rpm', u'epoch': u'0', u'version': u'3.22.1', u'release': u'3.el5_5.1', u'arch': u'src'}, {u'src': None, u'name': u'rsyslog', u'sum': [u'md5', u'8d4de3fee96e744710802abad68a2bed'], u'filename': u'rsyslog-3.22.1-3.el5_5.1.x86_64.rpm', u'epoch': u'0', u'version': u'3.22.1', u'release': u'3.el5_5.1', u'arch': u'x86_64'}, {u'src': None, u'name': u'rsyslog-gnutls', u'sum': [u'md5', u'9579504787f8e8d150ad709eae34d549'], u'filename': u'rsyslog-gnutls-3.22.1-3.el5_5.1.x86_64.rpm', u'epoch': u'0', u'version': u'3.22.1', u'release': u'3.el5_5.1', u'arch': u'x86_64'}, {u'src': None, u'name': u'rsyslog-gssapi', u'sum': [u'md5', u'a326acc4507e334387522c41e6dafa26'], u'filename': u'rsyslog-gssapi-3.22.1-3.el5_5.1.x86_64.rpm', u'epoch': u'0', u'version': u'3.22.1', u'release': u'3.el5_5.1', u'arch': u'x86_64'}, {u'src': None, u'name': u'rsyslog-mysql', u'sum': [u'md5', u'55eabb02e0d7ae117bca0dc12d035fde'], u'filename': u'rsyslog-mysql-3.22.1-3.el5_5.1.x86_64.rpm', u'epoch': u'0', u'version': u'3.22.1', u'release': u'3.el5_5.1', u'arch': u'x86_64'}, {u'src': None, u'name': u'rsyslog-pgsql', u'sum': [u'md5', u'5ab34ec074c571284470c4205afd274c'], u'filename': u'rsyslog-pgsql-3.22.1-3.el5_5.1.x86_64.rpm', u'epoch': u'0', u'version': u'3.22.1', u'release': u'3.el5_5.1', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u'\n[2.0.115-68.el5_6.1]\n- fence-agents: Add man pages for ucs, ifmib, rhevm\n (fence_agents_add_man_pages_for_ucs,_ifmib,_rhevm.patch)\n Resolves: rhbz#664381', u'issued': u'2011-01-24', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELBA-2011-0006.html', u'type': u'self', u'id': None, u'title': u'ELBA-2011-0006'}], u'_content_type_id': u'erratum', u'_id': u'7f9bf793-bca1-407a-b665-116b9655cb66', u'from': u'el-errata@oss.oracle.com', u'severity': u'', u'title': u'cman bug-fix and enhancement update', u'_ns': u'units_erratum', u'rights': u'Copyright 2011 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 5', u'reboot_suggested': False, u'type': u'bugfix', u'pkglist': [{u'packages': [{u'src': None, u'name': u'cman', u'sum': [u'md5', u'49060ee920366f8b3730ebf025961a40'], u'filename': u'cman-2.0.115-68.el5_6.1.src.rpm', u'epoch': u'0', u'version': u'2.0.115', u'release': u'68.el5_6.1', u'arch': u'src'}, {u'src': None, u'name': u'cman', u'sum': [u'md5', u'50b8c4adc2531cf860d6f0f747c606ca'], u'filename': u'cman-2.0.115-68.el5_6.1.x86_64.rpm', u'epoch': u'0', u'version': u'2.0.115', u'release': u'68.el5_6.1', u'arch': u'x86_64'}, {u'src': None, u'name': u'cman-devel', u'sum': [u'md5', u'a320a415b0caa5fdeb5032293aa5069f'], u'filename': u'cman-devel-2.0.115-68.el5_6.1.i386.rpm', u'epoch': u'0', u'version': u'2.0.115', u'release': u'68.el5_6.1', u'arch': u'i386'}, {u'src': None, u'name': u'cman-devel', u'sum': [u'md5', u'f87259f3d845c4efedb793c36033932a'], u'filename': u'cman-devel-2.0.115-68.el5_6.1.x86_64.rpm', u'epoch': u'0', u'version': u'2.0.115', u'release': u'68.el5_6.1', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u'\n[22.2-7.el5_6.2]\n- Fixed UDP connection list in fuser\n- Resolves: rhbz#669309\n\n[22.2-7.el5_6.1]\n- Fixed unitialized memory in killall\n- Resolves: rhbz#668991', u'issued': u'2011-01-24', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELBA-2011-0168.html', u'type': u'self', u'id': None, u'title': u'ELBA-2011-0168'}], u'_content_type_id': u'erratum', u'_id': u'efec3423-7746-4bc2-b677-5f8720e16701', u'from': u'el-errata@oss.oracle.com', u'severity': u'', u'title': u'psmisc bug fix update', u'_ns': u'units_erratum', u'rights': u'Copyright 2011 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 5', u'reboot_suggested': False, u'type': u'bugfix', u'pkglist': [{u'packages': [{u'src': None, u'name': u'psmisc', u'sum': [u'md5', u'abeb8570a10d216979328771d7a50d71'], u'filename': u'psmisc-22.2-7.el5_6.2.src.rpm', u'epoch': u'0', u'version': u'22.2', u'release': u'7.el5_6.2', u'arch': u'src'}, {u'src': None, u'name': u'psmisc', u'sum': [u'md5', u'9f4c62bcaa2d04d6a2bf53104bde5bb8'], u'filename': u'psmisc-22.2-7.el5_6.2.x86_64.rpm', u'epoch': u'0', u'version': u'22.2', u'release': u'7.el5_6.2', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u'\n[1.8.0-26.2.1.el5_6.1]\n- dbm_* calls should call the underlying gdbm_* calls using then \n GDBM_NOLOCK flag (#668689)', u'issued': u'2011-01-27', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELBA-2011-0172.html', u'type': u'self', u'id': None, u'title': u'ELBA-2011-0172'}], u'_content_type_id': u'erratum', u'_id': u'6a34fd45-8d5b-4196-85c5-756ab0820adf', u'from': u'el-errata@oss.oracle.com', u'severity': u'', u'title': u'gdbm bug fix update', u'_ns': u'units_erratum', u'rights': u'Copyright 2011 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 5', u'reboot_suggested': False, u'type': u'bugfix', u'pkglist': [{u'packages': [{u'src': None, u'name': u'gdbm', u'sum': [u'md5', u'bd89a83bca46d8f042ef08d31a0b2ce0'], u'filename': u'gdbm-1.8.0-26.2.1.el5_6.1.i386.rpm', u'epoch': u'0', u'version': u'1.8.0', u'release': u'26.2.1.el5_6.1', u'arch': u'i386'}, {u'src': None, u'name': u'gdbm', u'sum': [u'md5', u'cd308941736463ac91f6b430ce2ebc49'], u'filename': u'gdbm-1.8.0-26.2.1.el5_6.1.src.rpm', u'epoch': u'0', u'version': u'1.8.0', u'release': u'26.2.1.el5_6.1', u'arch': u'src'}, {u'src': None, u'name': u'gdbm', u'sum': [u'md5', u'590fa7a14dc16a3ab3a484fcdd2957d3'], u'filename': u'gdbm-1.8.0-26.2.1.el5_6.1.x86_64.rpm', u'epoch': u'0', u'version': u'1.8.0', u'release': u'26.2.1.el5_6.1', u'arch': u'x86_64'}, {u'src': None, u'name': u'gdbm-devel', u'sum': [u'md5', u'0b25eb30c572cb7f124c0a4ac638e645'], u'filename': u'gdbm-devel-1.8.0-26.2.1.el5_6.1.i386.rpm', u'epoch': u'0', u'version': u'1.8.0', u'release': u'26.2.1.el5_6.1', u'arch': u'i386'}, {u'src': None, u'name': u'gdbm-devel', u'sum': [u'md5', u'e5d2bcc2fa36889af41c6bda6bffa209'], u'filename': u'gdbm-devel-1.8.0-26.2.1.el5_6.1.x86_64.rpm', u'epoch': u'0', u'version': u'1.8.0', u'release': u'26.2.1.el5_6.1', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u'\n[2.3.43-12.5]\n- backport: ldap_init_fd() API function (#671341)\n\n[2.3.43-12.4]\n- fix: ppolicy crash while replace-deleting userPassword attribute (#669043)', u'issued': u'2011-01-27', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELBA-2011-0178.html', u'type': u'self', u'id': None, u'title': u'ELBA-2011-0178'}], u'_content_type_id': u'erratum', u'_id': u'72d21516-2510-4f75-a959-c4cbf0a1ba9e', u'from': u'el-errata@oss.oracle.com', u'severity': u'', u'title': u'openldap bug fix update', u'_ns': u'units_erratum', u'rights': u'Copyright 2011 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 5', u'reboot_suggested': False, u'type': u'bugfix', u'pkglist': [{u'packages': [{u'src': None, u'name': u'compat-openldap', u'sum': [u'md5', u'1e1f7144c3ec06b439ff9a5494774512'], u'filename': u'compat-openldap-2.3.43_2.2.29-12.el5_6.5.i386.rpm', u'epoch': u'0', u'version': u'2.3.43_2.2.29', u'release': u'12.el5_6.5', u'arch': u'i386'}, {u'src': None, u'name': u'compat-openldap', u'sum': [u'md5', u'15b8e0926ea473d458efaf7815df461e'], u'filename': u'compat-openldap-2.3.43_2.2.29-12.el5_6.5.x86_64.rpm', u'epoch': u'0', u'version': u'2.3.43_2.2.29', u'release': u'12.el5_6.5', u'arch': u'x86_64'}, {u'src': None, u'name': u'openldap', u'sum': [u'md5', u'88fb29277397b76a9ce679a1b2782193'], u'filename': u'openldap-2.3.43-12.el5_6.5.i386.rpm', u'epoch': u'0', u'version': u'2.3.43', u'release': u'12.el5_6.5', u'arch': u'i386'}, {u'src': None, u'name': u'openldap', u'sum': [u'md5', u'bf69f5a0f5470679e8ebc2880dbba4dd'], u'filename': u'openldap-2.3.43-12.el5_6.5.src.rpm', u'epoch': u'0', u'version': u'2.3.43', u'release': u'12.el5_6.5', u'arch': u'src'}, {u'src': None, u'name': u'openldap', u'sum': [u'md5', u'caa8cecd27d87a577808be1a3a627e97'], u'filename': u'openldap-2.3.43-12.el5_6.5.x86_64.rpm', u'epoch': u'0', u'version': u'2.3.43', u'release': u'12.el5_6.5', u'arch': u'x86_64'}, {u'src': None, u'name': u'openldap-clients', u'sum': [u'md5', u'03ae8c0cc4daee46cd81639953f93d97'], u'filename': u'openldap-clients-2.3.43-12.el5_6.5.x86_64.rpm', u'epoch': u'0', u'version': u'2.3.43', u'release': u'12.el5_6.5', u'arch': u'x86_64'}, {u'src': None, u'name': u'openldap-devel', u'sum': [u'md5', u'3bb3b5e348ec8739f3c13271c7154f8a'], u'filename': u'openldap-devel-2.3.43-12.el5_6.5.i386.rpm', u'epoch': u'0', u'version': u'2.3.43', u'release': u'12.el5_6.5', u'arch': u'i386'}, {u'src': None, u'name': u'openldap-devel', u'sum': [u'md5', u'db36db83d2d60845d050650ae46ec189'], u'filename': u'openldap-devel-2.3.43-12.el5_6.5.x86_64.rpm', u'epoch': u'0', u'version': u'2.3.43', u'release': u'12.el5_6.5', u'arch': u'x86_64'}, {u'src': None, u'name': u'openldap-servers', u'sum': [u'md5', u'39da7cd3dca77f78c270842f84da1e9b'], u'filename': u'openldap-servers-2.3.43-12.el5_6.5.x86_64.rpm', u'epoch': u'0', u'version': u'2.3.43', u'release': u'12.el5_6.5', u'arch': u'x86_64'}, {u'src': None, u'name': u'openldap-servers-overlays', u'sum': [u'md5', u'd53f825e915149801eedfcf1973ab8d7'], u'filename': u'openldap-servers-overlays-2.3.43-12.el5_6.5.x86_64.rpm', u'epoch': u'0', u'version': u'2.3.43', u'release': u'12.el5_6.5', u'arch': u'x86_64'}, {u'src': None, u'name': u'openldap-servers-sql', u'sum': [u'md5', u'eea6ed72b8cd865e4dadfa27bcc99c6f'], u'filename': u'openldap-servers-sql-2.3.43-12.el5_6.5.x86_64.rpm', u'epoch': u'0', u'version': u'2.3.43', u'release': u'12.el5_6.5', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u'\n[7.15.5-9.el5_6.2]\n- avoid use of uninitialized variable on failure of a LDAP request (#670523)\n\n[7.15.5-9.el5_6.1]\n- proxy tunnel support for LDAP requests (#670523)', u'issued': u'2011-01-26', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELBA-2011-0179.html', u'type': u'self', u'id': None, u'title': u'ELBA-2011-0179'}], u'_content_type_id': u'erratum', u'_id': u'12447b5d-9324-4b18-8e40-c1331697c45a', u'from': u'el-errata@oss.oracle.com', u'severity': u'', u'title': u'curl bug fix update', u'_ns': u'units_erratum', u'rights': u'Copyright 2011 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 5', u'reboot_suggested': False, u'type': u'bugfix', u'pkglist': [{u'packages': [{u'src': None, u'name': u'curl', u'sum': [u'md5', u'138ed836e20abf9268d702f5cbd9b890'], u'filename': u'curl-7.15.5-9.el5_6.2.i386.rpm', u'epoch': u'0', u'version': u'7.15.5', u'release': u'9.el5_6.2', u'arch': u'i386'}, {u'src': None, u'name': u'curl', u'sum': [u'md5', u'02510b2f7b6e6f0ea6363087656d5576'], u'filename': u'curl-7.15.5-9.el5_6.2.src.rpm', u'epoch': u'0', u'version': u'7.15.5', u'release': u'9.el5_6.2', u'arch': u'src'}, {u'src': None, u'name': u'curl', u'sum': [u'md5', u'ccf4ad78f81b73dae58b37f2a003db1c'], u'filename': u'curl-7.15.5-9.el5_6.2.x86_64.rpm', u'epoch': u'0', u'version': u'7.15.5', u'release': u'9.el5_6.2', u'arch': u'x86_64'}, {u'src': None, u'name': u'curl-devel', u'sum': [u'md5', u'18bc8a78c04f733f053f128794b9b7b9'], u'filename': u'curl-devel-7.15.5-9.el5_6.2.i386.rpm', u'epoch': u'0', u'version': u'7.15.5', u'release': u'9.el5_6.2', u'arch': u'i386'}, {u'src': None, u'name': u'curl-devel', u'sum': [u'md5', u'846232d433530f459152c4a1d447273f'], u'filename': u'curl-devel-7.15.5-9.el5_6.2.x86_64.rpm', u'epoch': u'0', u'version': u'7.15.5', u'release': u'9.el5_6.2', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u'\n[5.0.77-4.5]\n- Add fix for crash during SHOW CREATE TABLE\nResolves: #659609\n- Add fix for corruption of large BLOB values during dump/reload\nResolves: #658863', u'issued': u'2011-01-31', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELBA-2011-0184.html', u'type': u'self', u'id': None, u'title': u'ELBA-2011-0184'}], u'_content_type_id': u'erratum', u'_id': u'5108a4f5-cb59-4f4f-b341-68a06ea2076a', u'from': u'el-errata@oss.oracle.com', u'severity': u'', u'title': u'mysql bug fix update', u'_ns': u'units_erratum', u'rights': u'Copyright 2011 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 5', u'reboot_suggested': False, u'type': u'bugfix', u'pkglist': [{u'packages': [{u'src': None, u'name': u'mysql', u'sum': [u'md5', u'0a21847531e686bfb4b1ee60df4df0d6'], u'filename': u'mysql-5.0.77-4.el5_5.5.i386.rpm', u'epoch': u'0', u'version': u'5.0.77', u'release': u'4.el5_5.5', u'arch': u'i386'}, {u'src': None, u'name': u'mysql', u'sum': [u'md5', u'3b3ede487252a36f37d1f79da821d97e'], u'filename': u'mysql-5.0.77-4.el5_5.5.src.rpm', u'epoch': u'0', u'version': u'5.0.77', u'release': u'4.el5_5.5', u'arch': u'src'}, {u'src': None, u'name': u'mysql', u'sum': [u'md5', u'a163410a609245d71490090c05b11851'], u'filename': u'mysql-5.0.77-4.el5_5.5.x86_64.rpm', u'epoch': u'0', u'version': u'5.0.77', u'release': u'4.el5_5.5', u'arch': u'x86_64'}, {u'src': None, u'name': u'mysql-bench', u'sum': [u'md5', u'2f180fd100303a4a45cf010dca3bb8ad'], u'filename': u'mysql-bench-5.0.77-4.el5_5.5.x86_64.rpm', u'epoch': u'0', u'version': u'5.0.77', u'release': u'4.el5_5.5', u'arch': u'x86_64'}, {u'src': None, u'name': u'mysql-devel', u'sum': [u'md5', u'7a18ade66c16e874e2c4f1931260efb4'], u'filename': u'mysql-devel-5.0.77-4.el5_5.5.i386.rpm', u'epoch': u'0', u'version': u'5.0.77', u'release': u'4.el5_5.5', u'arch': u'i386'}, {u'src': None, u'name': u'mysql-devel', u'sum': [u'md5', u'e71c9bdee8e545532ab0f57d0aa3fa4a'], u'filename': u'mysql-devel-5.0.77-4.el5_5.5.x86_64.rpm', u'epoch': u'0', u'version': u'5.0.77', u'release': u'4.el5_5.5', u'arch': u'x86_64'}, {u'src': None, u'name': u'mysql-server', u'sum': [u'md5', u'c61ee3f5c9718ca765afb149cf37f7bd'], u'filename': u'mysql-server-5.0.77-4.el5_5.5.x86_64.rpm', u'epoch': u'0', u'version': u'5.0.77', u'release': u'4.el5_5.5', u'arch': u'x86_64'}, {u'src': None, u'name': u'mysql-test', u'sum': [u'md5', u'8ff2531bca52e21161eded71daaf3bf5'], u'filename': u'mysql-test-5.0.77-4.el5_5.5.x86_64.rpm', u'epoch': u'0', u'version': u'5.0.77', u'release': u'4.el5_5.5', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u'\n[1:1.3.7-26.1]\n- Call avc_init() only once to not leak file descriptors (bug #670909).', u'issued': u'2011-01-31', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELBA-2011-0185.html', u'type': u'self', u'id': None, u'title': u'ELBA-2011-0185'}], u'_content_type_id': u'erratum', u'_id': u'6c02cbc9-bc27-4e11-9a59-39ef15f5c8c8', u'from': u'el-errata@oss.oracle.com', u'severity': u'', u'title': u'cups bug fix update', u'_ns': u'units_erratum', u'rights': u'Copyright 2011 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 5', u'reboot_suggested': False, u'type': u'bugfix', u'pkglist': [{u'packages': [{u'src': None, u'name': u'cups', u'sum': [u'md5', u'1020eccf3108cf43ffd1643eba79dd0a'], u'filename': u'cups-1.3.7-26.el5_6.1.src.rpm', u'epoch': u'1', u'version': u'1.3.7', u'release': u'26.el5_6.1', u'arch': u'src'}, {u'src': None, u'name': u'cups', u'sum': [u'md5', u'80524b6a53bdde4f57920a5b7aafa76d'], u'filename': u'cups-1.3.7-26.el5_6.1.x86_64.rpm', u'epoch': u'1', u'version': u'1.3.7', u'release': u'26.el5_6.1', u'arch': u'x86_64'}, {u'src': None, u'name': u'cups-devel', u'sum': [u'md5', u'0bde3e9e246fc72f3ebb8ef8df46b5ba'], u'filename': u'cups-devel-1.3.7-26.el5_6.1.i386.rpm', u'epoch': u'1', u'version': u'1.3.7', u'release': u'26.el5_6.1', u'arch': u'i386'}, {u'src': None, u'name': u'cups-devel', u'sum': [u'md5', u'022a20e9a94c712bed6b486ac1234e17'], u'filename': u'cups-devel-1.3.7-26.el5_6.1.x86_64.rpm', u'epoch': u'1', u'version': u'1.3.7', u'release': u'26.el5_6.1', u'arch': u'x86_64'}, {u'src': None, u'name': u'cups-libs', u'sum': [u'md5', u'2cf389d048258e328da415ccba9efb9e'], u'filename': u'cups-libs-1.3.7-26.el5_6.1.i386.rpm', u'epoch': u'1', u'version': u'1.3.7', u'release': u'26.el5_6.1', u'arch': u'i386'}, {u'src': None, u'name': u'cups-libs', u'sum': [u'md5', u'172d90ea2a6e7366f7a41329b4d4856d'], u'filename': u'cups-libs-1.3.7-26.el5_6.1.x86_64.rpm', u'epoch': u'1', u'version': u'1.3.7', u'release': u'26.el5_6.1', u'arch': u'x86_64'}, {u'src': None, u'name': u'cups-lpd', u'sum': [u'md5', u'7e80f90f7edfbbaf62c3290a5903c463'], u'filename': u'cups-lpd-1.3.7-26.el5_6.1.x86_64.rpm', u'epoch': u'1', u'version': u'1.3.7', u'release': u'26.el5_6.1', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u'\n[7.0.1-32.el5_6.2]\n- Adjust the %{dist} check for .el5_6.\n\n[7.0.1-32.el5_6.1]\n- Fix crash on stale bpstat (BZ 669636).', u'issued': u'2011-02-01', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELBA-2011-0186.html', u'type': u'self', u'id': None, u'title': u'ELBA-2011-0186'}], u'_content_type_id': u'erratum', u'_id': u'6ef42459-2821-44cf-aee2-ee5a991806b0', u'from': u'el-errata@oss.oracle.com', u'severity': u'', u'title': u'gdb bug fix update', u'_ns': u'units_erratum', u'rights': u'Copyright 2011 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 5', u'reboot_suggested': False, u'type': u'bugfix', u'pkglist': [{u'packages': [{u'src': None, u'name': u'gdb', u'sum': [u'md5', u'25776fd7c8d0b3308a856631d7fe395b'], u'filename': u'gdb-7.0.1-32.el5_6.2.src.rpm', u'epoch': u'0', u'version': u'7.0.1', u'release': u'32.el5_6.2', u'arch': u'src'}, {u'src': None, u'name': u'gdb', u'sum': [u'md5', u'2734c49eb08a031a5722a118e7cdcc49'], u'filename': u'gdb-7.0.1-32.el5_6.2.x86_64.rpm', u'epoch': u'0', u'version': u'7.0.1', u'release': u'32.el5_6.2', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u'\n[5.97-23.4]\n- fix exit status of terminated child processes in su with\n pam(#672863)', u'issued': u'2011-02-01', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELBA-2011-0188.html', u'type': u'self', u'id': None, u'title': u'ELBA-2011-0188'}], u'_content_type_id': u'erratum', u'_id': u'1633b398-d41e-48c3-97a0-e7e4ece77402', u'from': u'el-errata@oss.oracle.com', u'severity': u'', u'title': u'coreutils bug fix update', u'_ns': u'units_erratum', u'rights': u'Copyright 2011 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 5', u'reboot_suggested': False, u'type': u'bugfix', u'pkglist': [{u'packages': [{u'src': None, u'name': u'coreutils', u'sum': [u'md5', u'0fe35d80725db990e409f72811824408'], u'filename': u'coreutils-5.97-23.el5_6.4.src.rpm', u'epoch': u'0', u'version': u'5.97', u'release': u'23.el5_6.4', u'arch': u'src'}, {u'src': None, u'name': u'coreutils', u'sum': [u'md5', u'5c8e3c0e33aa5b6e7b189b285fd9c86f'], u'filename': u'coreutils-5.97-23.el5_6.4.x86_64.rpm', u'epoch': u'0', u'version': u'5.97', u'release': u'23.el5_6.4', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u'\n[1.6.0-3.el5_6.1]\n- Fix crash when slash is not found in path name; Related: 656199\n- RDP redirect Bug 656199', u'issued': u'2011-02-10', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELBA-2011-0207.html', u'type': u'self', u'id': None, u'title': u'ELBA-2011-0207'}], u'_content_type_id': u'erratum', u'_id': u'414f51ca-e1bc-4174-b8d0-3c050a5b9907', u'from': u'el-errata@oss.oracle.com', u'severity': u'', u'title': u'rdesktop bug fix update', u'_ns': u'units_erratum', u'rights': u'Copyright 2011 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 5', u'reboot_suggested': False, u'type': u'bugfix', u'pkglist': [{u'packages': [{u'src': None, u'name': u'rdesktop', u'sum': [u'md5', u'524ba486df2296d5faf78e825bed8c77'], u'filename': u'rdesktop-1.6.0-3.el5_6.1.src.rpm', u'epoch': u'0', u'version': u'1.6.0', u'release': u'3.el5_6.1', u'arch': u'src'}, {u'src': None, u'name': u'rdesktop', u'sum': [u'md5', u'fbc76f5b7f032e7c36012753c538cfbf'], u'filename': u'rdesktop-1.6.0-3.el5_6.1.x86_64.rpm', u'epoch': u'0', u'version': u'1.6.0', u'release': u'3.el5_6.1', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u'\n[2.16.7-7.1]\n- Set HTTP User Agent for QuickTime movies', u'issued': u'2011-02-11', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELBA-2011-0215.html', u'type': u'self', u'id': None, u'title': u'ELBA-2011-0215'}], u'_content_type_id': u'erratum', u'_id': u'68e03b59-ea0e-44f9-bd5f-55d0e34702e0', u'from': u'el-errata@oss.oracle.com', u'severity': u'', u'title': u'totem bug fix update', u'_ns': u'units_erratum', u'rights': u'Copyright 2011 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 5', u'reboot_suggested': False, u'type': u'bugfix', u'pkglist': [{u'packages': [{u'src': None, u'name': u'totem', u'sum': [u'md5', u'd9bf6b2ba076fb4df099f2dda661ba2b'], u'filename': u'totem-2.16.7-7.el5_6.1.i386.rpm', u'epoch': u'0', u'version': u'2.16.7', u'release': u'7.el5_6.1', u'arch': u'i386'}, {u'src': None, u'name': u'totem', u'sum': [u'md5', u'f856eaac4e7a0b0c183e82f0c6327ae6'], u'filename': u'totem-2.16.7-7.el5_6.1.src.rpm', u'epoch': u'0', u'version': u'2.16.7', u'release': u'7.el5_6.1', u'arch': u'src'}, {u'src': None, u'name': u'totem', u'sum': [u'md5', u'fe3fd2863d6ede601e8bed597484d9ee'], u'filename': u'totem-2.16.7-7.el5_6.1.x86_64.rpm', u'epoch': u'0', u'version': u'2.16.7', u'release': u'7.el5_6.1', u'arch': u'x86_64'}, {u'src': None, u'name': u'totem-devel', u'sum': [u'md5', u'b12f6be3f6a7b0b1f173cbe294024aca'], u'filename': u'totem-devel-2.16.7-7.el5_6.1.i386.rpm', u'epoch': u'0', u'version': u'2.16.7', u'release': u'7.el5_6.1', u'arch': u'i386'}, {u'src': None, u'name': u'totem-devel', u'sum': [u'md5', u'e2b788d9d05aef9f16e15e842dc871d0'], u'filename': u'totem-devel-2.16.7-7.el5_6.1.x86_64.rpm', u'epoch': u'0', u'version': u'2.16.7', u'release': u'7.el5_6.1', u'arch': u'x86_64'}, {u'src': None, u'name': u'totem-mozplugin', u'sum': [u'md5', u'cc5ec0fe677b8371952f378d4bae6d2a'], u'filename': u'totem-mozplugin-2.16.7-7.el5_6.1.x86_64.rpm', u'epoch': u'0', u'version': u'2.16.7', u'release': u'7.el5_6.1', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u"\n[4.1.2-14.el5_6.6]\n- Xvnc: don't crash when system has more than 256 network interfaces\n\n[4.1.2-14.el5_6.5]\n- read password file correctly when fread is interrupted", u'issued': u'2011-02-15', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELBA-2011-0216.html', u'type': u'self', u'id': None, u'title': u'ELBA-2011-0216'}], u'_content_type_id': u'erratum', u'_id': u'93075618-ab61-4f5f-b2a8-520b2fa5f26b', u'from': u'el-errata@oss.oracle.com', u'severity': u'', u'title': u'vnc bug fix update', u'_ns': u'units_erratum', u'rights': u'Copyright 2011 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 5', u'reboot_suggested': False, u'type': u'bugfix', u'pkglist': [{u'packages': [{u'src': None, u'name': u'vnc', u'sum': [u'md5', u'568729558f9e45445f9af66272211f8e'], u'filename': u'vnc-4.1.2-14.el5_6.6.src.rpm', u'epoch': u'0', u'version': u'4.1.2', u'release': u'14.el5_6.6', u'arch': u'src'}, {u'src': None, u'name': u'vnc', u'sum': [u'md5', u'3a03d1bd01b81bdda6aef3316bee83c7'], u'filename': u'vnc-4.1.2-14.el5_6.6.x86_64.rpm', u'epoch': u'0', u'version': u'4.1.2', u'release': u'14.el5_6.6', u'arch': u'x86_64'}, {u'src': None, u'name': u'vnc-server', u'sum': [u'md5', u'afa5d923d3a10765a176884a7a3f26e2'], u'filename': u'vnc-server-4.1.2-14.el5_6.6.x86_64.rpm', u'epoch': u'0', u'version': u'4.1.2', u'release': u'14.el5_6.6', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u"\n[2.16.1-8.3]\n- Don't crash with an empty Pictures folder\n Resolves: #673990", u'issued': u'2011-02-21', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELBA-2011-0286.html', u'type': u'self', u'id': None, u'title': u'ELBA-2011-0286'}], u'_content_type_id': u'erratum', u'_id': u'494745fa-9efc-4b0e-a197-6a2d24ac514f', u'from': u'el-errata@oss.oracle.com', u'severity': u'', u'title': u'gnome-screensaver bug fix update', u'_ns': u'units_erratum', u'rights': u'Copyright 2011 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 5', u'reboot_suggested': False, u'type': u'bugfix', u'pkglist': [{u'packages': [{u'src': None, u'name': u'gnome-screensaver', u'sum': [u'md5', u'e09cc53f1643d9c358cfcd754251d311'], u'filename': u'gnome-screensaver-2.16.1-8.el5_6.3.src.rpm', u'epoch': u'0', u'version': u'2.16.1', u'release': u'8.el5_6.3', u'arch': u'src'}, {u'src': None, u'name': u'gnome-screensaver', u'sum': [u'md5', u'c22feaa02c17f8c7b98623415b9b470e'], u'filename': u'gnome-screensaver-2.16.1-8.el5_6.3.x86_64.rpm', u'epoch': u'0', u'version': u'2.16.1', u'release': u'8.el5_6.3', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u'\n[2.02.74-5.el5_6.1]\n- Always use O_DIRECT when opening block devices in filters.\n- Do not scan devices unnecessarily in dev_reset_error_count().\n- Do not print lock warnings with --ignorelockingfailure.\n Resolves: #673981 #673986 #673975', u'issued': u'2011-02-22', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELBA-2011-0287.html', u'type': u'self', u'id': None, u'title': u'ELBA-2011-0287'}], u'_content_type_id': u'erratum', u'_id': u'4b336f7f-239a-4fdb-939f-60384cc975ac', u'from': u'el-errata@oss.oracle.com', u'severity': u'', u'title': u'lvm2 bug fix update', u'_ns': u'units_erratum', u'rights': u'Copyright 2011 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 5', u'reboot_suggested': False, u'type': u'bugfix', u'pkglist': [{u'packages': [{u'src': None, u'name': u'lvm2', u'sum': [u'md5', u'b34b77203feaeebe967a9bf664576300'], u'filename': u'lvm2-2.02.74-5.el5_6.1.src.rpm', u'epoch': u'0', u'version': u'2.02.74', u'release': u'5.el5_6.1', u'arch': u'src'}, {u'src': None, u'name': u'lvm2', u'sum': [u'md5', u'c08c1e3a222090c2cabbfadf1ec7fb8d'], u'filename': u'lvm2-2.02.74-5.el5_6.1.x86_64.rpm', u'epoch': u'0', u'version': u'2.02.74', u'release': u'5.el5_6.1', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u'\n[2.02.74-3.el5_6.1]\n- Always use O_DIRECT when opening block devices in filters.\n Resolves: #673980\n Related: #673986 #673981', u'issued': u'2011-02-22', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELBA-2011-0288.html', u'type': u'self', u'id': None, u'title': u'ELBA-2011-0288'}], u'_content_type_id': u'erratum', u'_id': u'ad85b3df-177a-4519-bd28-1376b8f5d707', u'from': u'el-errata@oss.oracle.com', u'severity': u'', u'title': u'lvm2-cluster bug fix update', u'_ns': u'units_erratum', u'rights': u'Copyright 2011 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 5', u'reboot_suggested': False, u'type': u'bugfix', u'pkglist': [{u'packages': [{u'src': None, u'name': u'lvm2-cluster', u'sum': [u'md5', u'58edf00a5bfe88a62cb0a36fc637b873'], u'filename': u'lvm2-cluster-2.02.74-3.el5_6.1.src.rpm', u'epoch': u'0', u'version': u'2.02.74', u'release': u'3.el5_6.1', u'arch': u'src'}, {u'src': None, u'name': u'lvm2-cluster', u'sum': [u'md5', u'6ab8242c53946339f64c60d195291d74'], u'filename': u'lvm2-cluster-2.02.74-3.el5_6.1.x86_64.rpm', u'epoch': u'0', u'version': u'2.02.74', u'release': u'3.el5_6.1', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u'\n[20100202-1.3]\n- fix crash when ksh get SIGPIPE while already executing signal handler\n- fix wrong output redirection in SIGPIPE trap\n- fix wrong typeset handling of arrays that could caused a crash\n\n[20100202-1.2]\n- fix memory leak slowing executions of scripts (#674552)', u'issued': u'2011-02-28', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELBA-2011-0304.html', u'type': u'self', u'id': None, u'title': u'ELBA-2011-0304'}], u'_content_type_id': u'erratum', u'_id': u'e4e82c8b-79ba-4e37-b91b-95d3433248bb', u'from': u'el-errata@oss.oracle.com', u'severity': u'', u'title': u'ksh bug fix update', u'_ns': u'units_erratum', u'rights': u'Copyright 2011 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 5', u'reboot_suggested': False, u'type': u'bugfix', u'pkglist': [{u'packages': [{u'src': None, u'name': u'ksh', u'sum': [u'md5', u'2460729c1bdcf95c3e2c6ec972775af6'], u'filename': u'ksh-20100202-1.el5_6.3.src.rpm', u'epoch': u'0', u'version': u'20100202', u'release': u'1.el5_6.3', u'arch': u'src'}, {u'src': None, u'name': u'ksh', u'sum': [u'md5', u'8a16298c1f425df1cd63f4325f3fea5b'], u'filename': u'ksh-20100202-1.el5_6.3.x86_64.rpm', u'epoch': u'0', u'version': u'20100202', u'release': u'1.el5_6.3', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u'\n[0.4.7-42.el5.1]\n- Added bz678991.patch\n- Resolves: bz #678991', u'issued': u'2011-03-07', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELBA-2011-0322.html', u'type': u'self', u'id': None, u'title': u'ELBA-2011-0322'}], u'_content_type_id': u'erratum', u'_id': u'bc73350e-c77c-40ee-bdc2-3c3c80dd77ec', u'from': u'el-errata@oss.oracle.com', u'severity': u'', u'title': u'device-mapper-multipath bug fix update', u'_ns': u'units_erratum', u'rights': u'Copyright 2011 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 5', u'reboot_suggested': False, u'type': u'bugfix', u'pkglist': [{u'packages': [{u'src': None, u'name': u'device-mapper-multipath', u'sum': [u'md5', u'd5967aec3366184f32560bd9f72d6620'], u'filename': u'device-mapper-multipath-0.4.7-42.el5_6.1.src.rpm', u'epoch': u'0', u'version': u'0.4.7', u'release': u'42.el5_6.1', u'arch': u'src'}, {u'src': None, u'name': u'device-mapper-multipath', u'sum': [u'md5', u'bab9e3a332312c4747d84cdc418804f3'], u'filename': u'device-mapper-multipath-0.4.7-42.el5_6.1.x86_64.rpm', u'epoch': u'0', u'version': u'0.4.7', u'release': u'42.el5_6.1', u'arch': u'x86_64'}, {u'src': None, u'name': u'kpartx', u'sum': [u'md5', u'8f9cbed4e732fad440ec3c352c94e6ca'], u'filename': u'kpartx-0.4.7-42.el5_6.1.x86_64.rpm', u'epoch': u'0', u'version': u'0.4.7', u'release': u'42.el5_6.1', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u'\n[0.5.4-17.0.2.el5_6.1]\n- Add yum-uln-po.patch\n- Add yum-uln-compat.patch (jared.greenwald@oracle.com)\n remove packages.py actions script from plugin package\n change references from RHN to ULN\n Add support for ULN.\n\n[0.5.4-17.el5_6.1]\n- Resolves: #681137 - respect metadata_expire setting from yum config', u'issued': u'2011-03-09', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELBA-2011-0331.html', u'type': u'self', u'id': None, u'title': u'ELBA-2011-0331'}], u'_content_type_id': u'erratum', u'_id': u'b891e806-46f9-4fd7-98c5-bddf2da718dc', u'from': u'el-errata@oss.oracle.com', u'severity': u'', u'title': u'yum-rhn-plugin bug fix update', u'_ns': u'units_erratum', u'rights': u'Copyright 2011 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 5', u'reboot_suggested': False, u'type': u'bugfix', u'pkglist': [{u'packages': [{u'src': None, u'name': u'yum-rhn-plugin', u'sum': [u'md5', u'402ab56b78e731f52bc114c0a2c83eef'], u'filename': u'yum-rhn-plugin-0.5.4-17.0.2.el5_6.1.noarch.rpm', u'epoch': u'0', u'version': u'0.5.4', u'release': u'17.0.2.el5_6.1', u'arch': u'noarch'}, {u'src': None, u'name': u'yum-rhn-plugin', u'sum': [u'md5', u'fcf29aad4e31f6214fcaa0a00894504c'], u'filename': u'yum-rhn-plugin-0.5.4-17.0.2.el5_6.1.src.rpm', u'epoch': u'0', u'version': u'0.5.4', u'release': u'17.0.2.el5_6.1', u'arch': u'src'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u'\n[3.0.3-120.el5_6.1]\n- Remove overhead when checking duplicate devices (rhbz 666802)\n- Delete device entry on detach (rhbz 666802)\n- Fix xenstore entry accounting (rhbz 666802)\n- Do not check disk sharing with guests in hotplug script (rhbz 680928)', u'issued': u'2011-03-10', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELBA-2011-0342.html', u'type': u'self', u'id': None, u'title': u'ELBA-2011-0342'}], u'_content_type_id': u'erratum', u'_id': u'59fd2dd5-bb7b-4a2b-acba-d81ffbb6d588', u'from': u'el-errata@oss.oracle.com', u'severity': u'', u'title': u'xen bug fix update xen bug fix update', u'_ns': u'units_erratum', u'rights': u'Copyright 2011 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 5', u'reboot_suggested': False, u'type': u'bugfix', u'pkglist': [{u'packages': [{u'src': None, u'name': u'xen', u'sum': [u'md5', u'3332ecba6d009a882cece49800eaf2ff'], u'filename': u'xen-3.0.3-120.el5_6.1.src.rpm', u'epoch': u'0', u'version': u'3.0.3', u'release': u'120.el5_6.1', u'arch': u'src'}, {u'src': None, u'name': u'xen', u'sum': [u'md5', u'693304ed6f1dd4f7e8bdea0a62f1f10c'], u'filename': u'xen-3.0.3-120.el5_6.1.x86_64.rpm', u'epoch': u'0', u'version': u'3.0.3', u'release': u'120.el5_6.1', u'arch': u'x86_64'}, {u'src': None, u'name': u'xen-devel', u'sum': [u'md5', u'1dd5d8c33804bfe4889d650cab867197'], u'filename': u'xen-devel-3.0.3-120.el5_6.1.i386.rpm', u'epoch': u'0', u'version': u'3.0.3', u'release': u'120.el5_6.1', u'arch': u'i386'}, {u'src': None, u'name': u'xen-devel', u'sum': [u'md5', u'e54df8c332da59166a29b93c6c02c46e'], u'filename': u'xen-devel-3.0.3-120.el5_6.1.x86_64.rpm', u'epoch': u'0', u'version': u'3.0.3', u'release': u'120.el5_6.1', u'arch': u'x86_64'}, {u'src': None, u'name': u'xen-libs', u'sum': [u'md5', u'193499bf6da0077e2ca05cca3f2c2fa6'], u'filename': u'xen-libs-3.0.3-120.el5_6.1.i386.rpm', u'epoch': u'0', u'version': u'3.0.3', u'release': u'120.el5_6.1', u'arch': u'i386'}, {u'src': None, u'name': u'xen-libs', u'sum': [u'md5', u'974639a3fd57481457db80c136e9b42f'], u'filename': u'xen-libs-3.0.3-120.el5_6.1.x86_64.rpm', u'epoch': u'0', u'version': u'3.0.3', u'release': u'120.el5_6.1', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u'\n[6.6-6.el5_6.1]\n- Do not loop while compiling extended class when not in UTF-8 mode', u'issued': u'2011-03-10', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELBA-2011-0344.html', u'type': u'self', u'id': None, u'title': u'ELBA-2011-0344'}], u'_content_type_id': u'erratum', u'_id': u'e9426d79-4135-4f66-9f9a-6e8d56fd099a', u'from': u'el-errata@oss.oracle.com', u'severity': u'', u'title': u'pcre bug fix update', u'_ns': u'units_erratum', u'rights': u'Copyright 2011 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 5', u'reboot_suggested': False, u'type': u'bugfix', u'pkglist': [{u'packages': [{u'src': None, u'name': u'pcre', u'sum': [u'md5', u'e8b1a8e501e6026f05449182f2b45123'], u'filename': u'pcre-6.6-6.el5_6.1.i386.rpm', u'epoch': u'0', u'version': u'6.6', u'release': u'6.el5_6.1', u'arch': u'i386'}, {u'src': None, u'name': u'pcre', u'sum': [u'md5', u'a337958a7a05c305b88ec0134a7146b7'], u'filename': u'pcre-6.6-6.el5_6.1.src.rpm', u'epoch': u'0', u'version': u'6.6', u'release': u'6.el5_6.1', u'arch': u'src'}, {u'src': None, u'name': u'pcre', u'sum': [u'md5', u'a589824743e89f940713e0e0748da0da'], u'filename': u'pcre-6.6-6.el5_6.1.x86_64.rpm', u'epoch': u'0', u'version': u'6.6', u'release': u'6.el5_6.1', u'arch': u'x86_64'}, {u'src': None, u'name': u'pcre-devel', u'sum': [u'md5', u'c23aaaeea871f9713d8732720b76a99f'], u'filename': u'pcre-devel-6.6-6.el5_6.1.i386.rpm', u'epoch': u'0', u'version': u'6.6', u'release': u'6.el5_6.1', u'arch': u'i386'}, {u'src': None, u'name': u'pcre-devel', u'sum': [u'md5', u'8a337594209908c72224139d2f222fc5'], u'filename': u'pcre-devel-6.6-6.el5_6.1.x86_64.rpm', u'epoch': u'0', u'version': u'6.6', u'release': u'6.el5_6.1', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u'\n[2.0.25-2.el5_6.1]\n- dapl-2.0.25-correct-error-mapping.patch\n Resolves: bz660256', u'issued': u'2011-03-22', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELBA-2011-0371.html', u'type': u'self', u'id': None, u'title': u'ELBA-2011-0371'}], u'_content_type_id': u'erratum', u'_id': u'a4486871-8387-4e1e-92fc-09db5f803850', u'from': u'el-errata@oss.oracle.com', u'severity': u'', u'title': u'dapl bug fix update', u'_ns': u'units_erratum', u'rights': u'Copyright 2011 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 5', u'reboot_suggested': False, u'type': u'bugfix', u'pkglist': [{u'packages': [{u'src': None, u'name': u'compat-dapl', u'sum': [u'md5', u'c027946030e2eb893c97efecade0888d'], u'filename': u'compat-dapl-2.0.25-2.el5_6.1.i386.rpm', u'epoch': u'0', u'version': u'2.0.25', u'release': u'2.el5_6.1', u'arch': u'i386'}, {u'src': None, u'name': u'compat-dapl', u'sum': [u'md5', u'd8e50d9d5032865b9e9eba011c6f6f1c'], u'filename': u'compat-dapl-2.0.25-2.el5_6.1.x86_64.rpm', u'epoch': u'0', u'version': u'2.0.25', u'release': u'2.el5_6.1', u'arch': u'x86_64'}, {u'src': None, u'name': u'compat-dapl-devel', u'sum': [u'md5', u'3dce667f2a52c8ee828163da547898ec'], u'filename': u'compat-dapl-devel-2.0.25-2.el5_6.1.i386.rpm', u'epoch': u'0', u'version': u'2.0.25', u'release': u'2.el5_6.1', u'arch': u'i386'}, {u'src': None, u'name': u'compat-dapl-devel', u'sum': [u'md5', u'4fa2872a79e13228327bf542d9473f5f'], u'filename': u'compat-dapl-devel-2.0.25-2.el5_6.1.x86_64.rpm', u'epoch': u'0', u'version': u'2.0.25', u'release': u'2.el5_6.1', u'arch': u'x86_64'}, {u'src': None, u'name': u'compat-dapl-static', u'sum': [u'md5', u'1241b5822f63ffa20f85ac8e32c456c1'], u'filename': u'compat-dapl-static-2.0.25-2.el5_6.1.x86_64.rpm', u'epoch': u'0', u'version': u'2.0.25', u'release': u'2.el5_6.1', u'arch': u'x86_64'}, {u'src': None, u'name': u'compat-dapl-utils', u'sum': [u'md5', u'36a7a31cc0634491a074e34a13fb937e'], u'filename': u'compat-dapl-utils-2.0.25-2.el5_6.1.x86_64.rpm', u'epoch': u'0', u'version': u'2.0.25', u'release': u'2.el5_6.1', u'arch': u'x86_64'}, {u'src': None, u'name': u'dapl', u'sum': [u'md5', u'6f8f235874df543451e6fe1c77107f4b'], u'filename': u'dapl-2.0.25-2.el5_6.1.i386.rpm', u'epoch': u'0', u'version': u'2.0.25', u'release': u'2.el5_6.1', u'arch': u'i386'}, {u'src': None, u'name': u'dapl', u'sum': [u'md5', u'a699e85e6b3c27eb4a4d4b218d8ae50a'], u'filename': u'dapl-2.0.25-2.el5_6.1.src.rpm', u'epoch': u'0', u'version': u'2.0.25', u'release': u'2.el5_6.1', u'arch': u'src'}, {u'src': None, u'name': u'dapl', u'sum': [u'md5', u'0a7fb76a9469ea3bab41b80c540c4b7c'], u'filename': u'dapl-2.0.25-2.el5_6.1.x86_64.rpm', u'epoch': u'0', u'version': u'2.0.25', u'release': u'2.el5_6.1', u'arch': u'x86_64'}, {u'src': None, u'name': u'dapl-devel', u'sum': [u'md5', u'a0eb87fa381c8213dc44b4ab3f8638c4'], u'filename': u'dapl-devel-2.0.25-2.el5_6.1.i386.rpm', u'epoch': u'0', u'version': u'2.0.25', u'release': u'2.el5_6.1', u'arch': u'i386'}, {u'src': None, u'name': u'dapl-devel', u'sum': [u'md5', u'cdec21f5b7de6eae00c741ec456ce0c3'], u'filename': u'dapl-devel-2.0.25-2.el5_6.1.x86_64.rpm', u'epoch': u'0', u'version': u'2.0.25', u'release': u'2.el5_6.1', u'arch': u'x86_64'}, {u'src': None, u'name': u'dapl-static', u'sum': [u'md5', u'f7334a8a7560d53ae45fb0a9bd1ccda4'], u'filename': u'dapl-static-2.0.25-2.el5_6.1.x86_64.rpm', u'epoch': u'0', u'version': u'2.0.25', u'release': u'2.el5_6.1', u'arch': u'x86_64'}, {u'src': None, u'name': u'dapl-utils', u'sum': [u'md5', u'fedb0110e4acd8c96a41cf7120a3b806'], u'filename': u'dapl-utils-2.0.25-2.el5_6.1.x86_64.rpm', u'epoch': u'0', u'version': u'2.0.25', u'release': u'2.el5_6.1', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u"\n[0.9pre-1.30.0.1.el5]\n- Don't print warnings with bogus CPU numbers\n- Back port struct mce to match both EL5 and UEK [bug 10219406]\n\n[0.9pre-1.30.el5]\n- check to see that the CPUS are actually supported prior to launching the\n cronjob [621669]", u'issued': u'2011-04-27', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELBA-2011-0377.html', u'type': u'self', u'id': None, u'title': u'ELBA-2011-0377'}], u'_content_type_id': u'erratum', u'_id': u'736d7b01-7fd4-4a70-9ef3-d268854f8f73', u'from': u'el-errata@oss.oracle.com', u'severity': u'', u'title': u'mcelog bug fix update', u'_ns': u'units_erratum', u'rights': u'Copyright 2011 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 5', u'reboot_suggested': False, u'type': u'bugfix', u'pkglist': [{u'packages': [{u'src': None, u'name': u'mcelog', u'sum': [u'md5', u'8cf89eaa8abd439fa784b3d2c1aa855a'], u'filename': u'mcelog-0.9pre-1.30.0.1.el5.src.rpm', u'epoch': u'1', u'version': u'0.9pre', u'release': u'1.30.0.1.el5', u'arch': u'src'}, {u'src': None, u'name': u'mcelog', u'sum': [u'md5', u'6a223da08004d36b6eae54d5ee0f905a'], u'filename': u'mcelog-0.9pre-1.30.0.1.el5.x86_64.rpm', u'epoch': u'1', u'version': u'0.9pre', u'release': u'1.30.0.1.el5', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u'\n[0.4.7-42.el5.2]\n- Added bz683447.patch\n- Resolves: bz#683447', u'issued': u'2011-03-24', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELBA-2011-0379.html', u'type': u'self', u'id': None, u'title': u'ELBA-2011-0379'}], u'_content_type_id': u'erratum', u'_id': u'448e08fd-a6f5-4f5b-8e6f-68271aac3795', u'from': u'el-errata@oss.oracle.com', u'severity': u'', u'title': u'device-mapper-multipath bug fix update', u'_ns': u'units_erratum', u'rights': u'Copyright 2011 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 5', u'reboot_suggested': False, u'type': u'bugfix', u'pkglist': [{u'packages': [{u'src': None, u'name': u'device-mapper-multipath', u'sum': [u'md5', u'76bbe100cd2b33c4201abe346779ddd6'], u'filename': u'device-mapper-multipath-0.4.7-42.el5_6.2.src.rpm', u'epoch': u'0', u'version': u'0.4.7', u'release': u'42.el5_6.2', u'arch': u'src'}, {u'src': None, u'name': u'device-mapper-multipath', u'sum': [u'md5', u'46dca89b29da35e3da406409588619f2'], u'filename': u'device-mapper-multipath-0.4.7-42.el5_6.2.x86_64.rpm', u'epoch': u'0', u'version': u'0.4.7', u'release': u'42.el5_6.2', u'arch': u'x86_64'}, {u'src': None, u'name': u'kpartx', u'sum': [u'md5', u'1dfcfc50ea8112ae8045b7de7314d80a'], u'filename': u'kpartx-0.4.7-42.el5_6.2.x86_64.rpm', u'epoch': u'0', u'version': u'0.4.7', u'release': u'42.el5_6.2', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u'\n[1.102pre-126.0.1.el5_6.5]\n- Add mkdumprd load firmware support [orabug 10432768]\n- updated makedumpfile to el6 version (Herbert van den Bergh) [orabug 10088607]\n- Merged UEK modification,Updated Source1 kdump.init\n Added --allow-missing for rebuilding kdump_initrd\n- Updated kexec-kdump-howto.txt with Oracle/OEL references\n\n[1.102pre-126.5]\n- Get the backup memory region dynamically. Resolve bug 682085.', u'issued': u'2011-03-25', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELBA-2011-0382.html', u'type': u'self', u'id': None, u'title': u'ELBA-2011-0382'}], u'_content_type_id': u'erratum', u'_id': u'b31deaed-3cc5-418d-b67d-1b9faff3e795', u'from': u'el-errata@oss.oracle.com', u'severity': u'', u'title': u'kexec-tools bug fix update', u'_ns': u'units_erratum', u'rights': u'Copyright 2011 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 5', u'reboot_suggested': False, u'type': u'bugfix', u'pkglist': [{u'packages': [{u'src': None, u'name': u'kexec-tools', u'sum': [u'md5', u'a7301c323fa496a350344978697993f5'], u'filename': u'kexec-tools-1.102pre-126.0.1.el5_6.5.src.rpm', u'epoch': u'0', u'version': u'1.102pre', u'release': u'126.0.1.el5_6.5', u'arch': u'src'}, {u'src': None, u'name': u'kexec-tools', u'sum': [u'md5', u'd444441b472f10b30b7ad267750d0d93'], u'filename': u'kexec-tools-1.102pre-126.0.1.el5_6.5.x86_64.rpm', u'epoch': u'0', u'version': u'1.102pre', u'release': u'126.0.1.el5_6.5', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u"\n[20100202-1.4]\n- fix crash when unsetting IFS inside a function\n- don't forget to close files including auto loaded function definition\n- fix file io race condition when file was created, but still does not exist", u'issued': u'2011-03-28', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELBA-2011-0385.html', u'type': u'self', u'id': None, u'title': u'ELBA-2011-0385'}], u'_content_type_id': u'erratum', u'_id': u'aa439499-8607-4837-b440-db45bf2e615b', u'from': u'el-errata@oss.oracle.com', u'severity': u'', u'title': u'ksh bug fix update', u'_ns': u'units_erratum', u'rights': u'Copyright 2011 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 5', u'reboot_suggested': False, u'type': u'bugfix', u'pkglist': [{u'packages': [{u'src': None, u'name': u'ksh', u'sum': [u'md5', u'a37f59d4f51cd912f77e6245bb34a09a'], u'filename': u'ksh-20100202-1.el5_6.4.src.rpm', u'epoch': u'0', u'version': u'20100202', u'release': u'1.el5_6.4', u'arch': u'src'}, {u'src': None, u'name': u'ksh', u'sum': [u'md5', u'8ae1aa91c7622538fe4352b05c020782'], u'filename': u'ksh-20100202-1.el5_6.4.x86_64.rpm', u'epoch': u'0', u'version': u'20100202', u'release': u'1.el5_6.4', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u'\n[2.6.21-5.4]\nResolves: #680044', u'issued': u'2011-03-28', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELBA-2011-0388.html', u'type': u'self', u'id': None, u'title': u'ELBA-2011-0388'}], u'_content_type_id': u'erratum', u'_id': u'c306e0c0-cf20-477c-9e8b-02c1a10d775e', u'from': u'el-errata@oss.oracle.com', u'severity': u'', u'title': u'openswan bug fix update', u'_ns': u'units_erratum', u'rights': u'Copyright 2011 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 5', u'reboot_suggested': False, u'type': u'bugfix', u'pkglist': [{u'packages': [{u'src': None, u'name': u'openswan', u'sum': [u'md5', u'44c0a9853ec4530a9b744cf6c4ad404e'], u'filename': u'openswan-2.6.21-5.el5_6.4.src.rpm', u'epoch': u'0', u'version': u'2.6.21', u'release': u'5.el5_6.4', u'arch': u'src'}, {u'src': None, u'name': u'openswan', u'sum': [u'md5', u'92f8d8f20d0e79793e342ac5ad88187c'], u'filename': u'openswan-2.6.21-5.el5_6.4.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.21', u'release': u'5.el5_6.4', u'arch': u'x86_64'}, {u'src': None, u'name': u'openswan-doc', u'sum': [u'md5', u'21a7f35217754b73897598f5431de9e3'], u'filename': u'openswan-doc-2.6.21-5.el5_6.4.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.21', u'release': u'5.el5_6.4', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u'\n[4.1.5-8]\n- Do not update sedfaq.txt file from upstream sources on every build,\n use CVS version instead.\n\n[4.1.5-7]\n- Fix multilib regression (non-equal 32/64bit content) by touching\n the generated sedfaq.txt.gz file with an exact timestamp\n\n[4.1.5-6]\n- Fix regression in handling of relative symlinks\n Resolves: #490473\n- Fix multibyte characters syntax error and possible infinite loop\n Resolves: #527427', u'issued': u'2011-04-27', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELBA-2011-0397.html', u'type': u'self', u'id': None, u'title': u'ELBA-2011-0397'}], u'_content_type_id': u'erratum', u'_id': u'9dbf89cc-6fee-4fdf-995a-f21d84a360e3', u'from': u'el-errata@oss.oracle.com', u'severity': u'', u'title': u'sed bug fix update', u'_ns': u'units_erratum', u'rights': u'Copyright 2011 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 5', u'reboot_suggested': False, u'type': u'bugfix', u'pkglist': [{u'packages': [{u'src': None, u'name': u'sed', u'sum': [u'md5', u'4921ac8f2a7203245dab68e8aefe5991'], u'filename': u'sed-4.1.5-8.el5.src.rpm', u'epoch': u'0', u'version': u'4.1.5', u'release': u'8.el5', u'arch': u'src'}, {u'src': None, u'name': u'sed', u'sum': [u'md5', u'bfe3b556666f9d6ce20244450ba537b0'], u'filename': u'sed-4.1.5-8.el5.x86_64.rpm', u'epoch': u'0', u'version': u'4.1.5', u'release': u'8.el5', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u'\n[4.1.3-7.3.3.el5]\n- fix a segfault when a GifFile does not store a global colormap. (bz# 249555)', u'issued': u'2011-04-27', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELBA-2011-0398.html', u'type': u'self', u'id': None, u'title': u'ELBA-2011-0398'}], u'_content_type_id': u'erratum', u'_id': u'755679aa-21e0-4920-956e-cdd8c5ed7293', u'from': u'el-errata@oss.oracle.com', u'severity': u'', u'title': u'giflib bug fix update', u'_ns': u'units_erratum', u'rights': u'Copyright 2011 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 5', u'reboot_suggested': False, u'type': u'bugfix', u'pkglist': [{u'packages': [{u'src': None, u'name': u'giflib', u'sum': [u'md5', u'c149d71024a51bae838f3a81efebe19f'], u'filename': u'giflib-4.1.3-7.3.3.el5.i386.rpm', u'epoch': u'0', u'version': u'4.1.3', u'release': u'7.3.3.el5', u'arch': u'i386'}, {u'src': None, u'name': u'giflib', u'sum': [u'md5', u'4d28ce87484c92de67ebd2d1d74f2e97'], u'filename': u'giflib-4.1.3-7.3.3.el5.src.rpm', u'epoch': u'0', u'version': u'4.1.3', u'release': u'7.3.3.el5', u'arch': u'src'}, {u'src': None, u'name': u'giflib', u'sum': [u'md5', u'b85a706132c4c59fdb7a749800421644'], u'filename': u'giflib-4.1.3-7.3.3.el5.x86_64.rpm', u'epoch': u'0', u'version': u'4.1.3', u'release': u'7.3.3.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'giflib-devel', u'sum': [u'md5', u'49a16bc2b5c6d875f27e23adcd16ab52'], u'filename': u'giflib-devel-4.1.3-7.3.3.el5.i386.rpm', u'epoch': u'0', u'version': u'4.1.3', u'release': u'7.3.3.el5', u'arch': u'i386'}, {u'src': None, u'name': u'giflib-devel', u'sum': [u'md5', u'422f2219b0bca5d40f13296be681d0da'], u'filename': u'giflib-devel-4.1.3-7.3.3.el5.x86_64.rpm', u'epoch': u'0', u'version': u'4.1.3', u'release': u'7.3.3.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'giflib-utils', u'sum': [u'md5', u'5cb83e4d8910e94ffd98ea9d08322677'], u'filename': u'giflib-utils-4.1.3-7.3.3.el5.x86_64.rpm', u'epoch': u'0', u'version': u'4.1.3', u'release': u'7.3.3.el5', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u'\n[1:1.4.4-7]\n- rebuid due to use of macros in specfile changelog\n\n[1:1.4.4-6]\n- Applying patch to reset variables before test.\n- Resolves: #460153', u'issued': u'2011-04-27', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELBA-2011-0399.html', u'type': u'self', u'id': None, u'title': u'ELBA-2011-0399'}], u'_content_type_id': u'erratum', u'_id': u'3fd5aa37-60f5-4bf4-a1bd-698ac63f580f', u'from': u'el-errata@oss.oracle.com', u'severity': u'', u'title': u'dejagnu bug fix update', u'_ns': u'units_erratum', u'rights': u'Copyright 2011 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 5', u'reboot_suggested': False, u'type': u'bugfix', u'pkglist': [{u'packages': [{u'src': None, u'name': u'dejagnu', u'sum': [u'md5', u'fc0546582d1c07ef982876cf5ca0bfa6'], u'filename': u'dejagnu-1.4.4-7.el5.noarch.rpm', u'epoch': u'1', u'version': u'1.4.4', u'release': u'7.el5', u'arch': u'noarch'}, {u'src': None, u'name': u'dejagnu', u'sum': [u'md5', u'2a8975d5df1ecfcaa82b764f55c5fbf4'], u'filename': u'dejagnu-1.4.4-7.el5.src.rpm', u'epoch': u'1', u'version': u'1.4.4', u'release': u'7.el5', u'arch': u'src'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u'\n[0.5.1-18.0.1.el5]\n- Add w3m-0.5.1-mkdir_p_ia64.patch to fix ia64 build\n\n[0.5.1-18]\n- Resolves:rh#615865 - Man w3m is stating incorrect program version\n- Resolves:rh#615859 - w3m spec file - config is missing noreplace', u'issued': u'2011-04-27', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELBA-2011-0400.html', u'type': u'self', u'id': None, u'title': u'ELBA-2011-0400'}], u'_content_type_id': u'erratum', u'_id': u'3a01292b-91c6-4c00-b852-ad74bd128813', u'from': u'el-errata@oss.oracle.com', u'severity': u'', u'title': u'w3m bug fix update', u'_ns': u'units_erratum', u'rights': u'Copyright 2011 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 5', u'reboot_suggested': False, u'type': u'bugfix', u'pkglist': [{u'packages': [{u'src': None, u'name': u'w3m', u'sum': [u'md5', u'541f7d0acbb4b1d2ca1254150dce48e3'], u'filename': u'w3m-0.5.1-18.0.1.el5.src.rpm', u'epoch': u'0', u'version': u'0.5.1', u'release': u'18.0.1.el5', u'arch': u'src'}, {u'src': None, u'name': u'w3m', u'sum': [u'md5', u'9515a1cce1f7db8d281a800f5507f062'], u'filename': u'w3m-0.5.1-18.0.1.el5.x86_64.rpm', u'epoch': u'0', u'version': u'0.5.1', u'release': u'18.0.1.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'w3m-img', u'sum': [u'md5', u'7eedb890bab27704d63f8ce9ec5fd39d'], u'filename': u'w3m-img-0.5.1-18.0.1.el5.x86_64.rpm', u'epoch': u'0', u'version': u'0.5.1', u'release': u'18.0.1.el5', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u'\n[4.0.3-4]\n- enable hardcopy binding in default config (#521824)\n- apply some xterm tweaks also to xterm-* and reduce duplicates\n in default config (#474064)', u'issued': u'2011-04-27', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELBA-2011-0401.html', u'type': u'self', u'id': None, u'title': u'ELBA-2011-0401'}], u'_content_type_id': u'erratum', u'_id': u'eac8baf0-86b6-4504-a2a1-4cb9e670bc3f', u'from': u'el-errata@oss.oracle.com', u'severity': u'', u'title': u'screen bug fix update', u'_ns': u'units_erratum', u'rights': u'Copyright 2011 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 5', u'reboot_suggested': False, u'type': u'bugfix', u'pkglist': [{u'packages': [{u'src': None, u'name': u'screen', u'sum': [u'md5', u'4fda9a794e52de8077f8b5e37f824e4e'], u'filename': u'screen-4.0.3-4.el5.src.rpm', u'epoch': u'0', u'version': u'4.0.3', u'release': u'4.el5', u'arch': u'src'}, {u'src': None, u'name': u'screen', u'sum': [u'md5', u'63a3f4618dac2432fe951aebc06a5a0a'], u'filename': u'screen-4.0.3-4.el5.x86_64.rpm', u'epoch': u'0', u'version': u'4.0.3', u'release': u'4.el5', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u'\n[3.3.3-1.el5_6.1]\n- Fix broken SRP client issue (bz650925)\n- Resolves: bz650925', u'issued': u'2011-04-04', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELBA-2011-0410.html', u'type': u'self', u'id': None, u'title': u'ELBA-2011-0410'}], u'_content_type_id': u'erratum', u'_id': u'12b11c04-7268-45b5-a463-3371e224bcb2', u'from': u'el-errata@oss.oracle.com', u'severity': u'', u'title': u'opensm bug fix update', u'_ns': u'units_erratum', u'rights': u'Copyright 2011 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 5', u'reboot_suggested': False, u'type': u'bugfix', u'pkglist': [{u'packages': [{u'src': None, u'name': u'opensm', u'sum': [u'md5', u'5da12a8187d7b3824b854937a251e239'], u'filename': u'opensm-3.3.3-1.el5_6.1.src.rpm', u'epoch': u'0', u'version': u'3.3.3', u'release': u'1.el5_6.1', u'arch': u'src'}, {u'src': None, u'name': u'opensm', u'sum': [u'md5', u'06da79175d5cbf907f6b451e86bbc7c5'], u'filename': u'opensm-3.3.3-1.el5_6.1.x86_64.rpm', u'epoch': u'0', u'version': u'3.3.3', u'release': u'1.el5_6.1', u'arch': u'x86_64'}, {u'src': None, u'name': u'opensm-devel', u'sum': [u'md5', u'41f7aa6de37d100304a2e184b31bf8c1'], u'filename': u'opensm-devel-3.3.3-1.el5_6.1.i386.rpm', u'epoch': u'0', u'version': u'3.3.3', u'release': u'1.el5_6.1', u'arch': u'i386'}, {u'src': None, u'name': u'opensm-devel', u'sum': [u'md5', u'79f7bc567734ee9768c99cd71920e6b4'], u'filename': u'opensm-devel-3.3.3-1.el5_6.1.x86_64.rpm', u'epoch': u'0', u'version': u'3.3.3', u'release': u'1.el5_6.1', u'arch': u'x86_64'}, {u'src': None, u'name': u'opensm-libs', u'sum': [u'md5', u'0578d83baf577e36bf25b37399838c82'], u'filename': u'opensm-libs-3.3.3-1.el5_6.1.i386.rpm', u'epoch': u'0', u'version': u'3.3.3', u'release': u'1.el5_6.1', u'arch': u'i386'}, {u'src': None, u'name': u'opensm-libs', u'sum': [u'md5', u'76b1d65041966ccdceb2f259c76af8e6'], u'filename': u'opensm-libs-3.3.3-1.el5_6.1.x86_64.rpm', u'epoch': u'0', u'version': u'3.3.3', u'release': u'1.el5_6.1', u'arch': u'x86_64'}, {u'src': None, u'name': u'opensm-static', u'sum': [u'md5', u'da31ffe9f6c80563f45e6a699eb2b694'], u'filename': u'opensm-static-3.3.3-1.el5_6.1.x86_64.rpm', u'epoch': u'0', u'version': u'3.3.3', u'release': u'1.el5_6.1', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u'\n[1.0.8-4.1]\n- Execute the postinstall script on upgrades so database ownership is\n correct (#679748)', u'issued': u'2011-04-04', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELBA-2011-0411.html', u'type': u'self', u'id': None, u'title': u'ELBA-2011-0411'}], u'_content_type_id': u'erratum', u'_id': u'06b74877-3eb7-405a-8063-237c507a1504', u'from': u'el-errata@oss.oracle.com', u'severity': u'', u'title': u'mod_nss bug fix update', u'_ns': u'units_erratum', u'rights': u'Copyright 2011 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 5', u'reboot_suggested': False, u'type': u'bugfix', u'pkglist': [{u'packages': [{u'src': None, u'name': u'mod_nss', u'sum': [u'md5', u'f5c7a52f5312456eab7641a280991209'], u'filename': u'mod_nss-1.0.8-4.el5_6.1.src.rpm', u'epoch': u'0', u'version': u'1.0.8', u'release': u'4.el5_6.1', u'arch': u'src'}, {u'src': None, u'name': u'mod_nss', u'sum': [u'md5', u'e41b6c2e7ec2ad7eca15c8a86f902ef2'], u'filename': u'mod_nss-1.0.8-4.el5_6.1.x86_64.rpm', u'epoch': u'0', u'version': u'1.0.8', u'release': u'4.el5_6.1', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u'\n[1:3.13-5]\n- Disable grace period/times remote setting (Resolves: #638578)', u'issued': u'2011-04-27', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELBA-2011-0416.html', u'type': u'self', u'id': None, u'title': u'ELBA-2011-0416'}], u'_content_type_id': u'erratum', u'_id': u'fa5ec44f-3be9-429c-9d95-8efac02f05c7', u'from': u'el-errata@oss.oracle.com', u'severity': u'', u'title': u'quota bug fix update', u'_ns': u'units_erratum', u'rights': u'Copyright 2011 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 5', u'reboot_suggested': False, u'type': u'bugfix', u'pkglist': [{u'packages': [{u'src': None, u'name': u'quota', u'sum': [u'md5', u'78a8681f0b9192b935bae77078cccefd'], u'filename': u'quota-3.13-5.el5.src.rpm', u'epoch': u'1', u'version': u'3.13', u'release': u'5.el5', u'arch': u'src'}, {u'src': None, u'name': u'quota', u'sum': [u'md5', u'd09483c0a65e01b6abbe9455b20cb20d'], u'filename': u'quota-3.13-5.el5.x86_64.rpm', u'epoch': u'1', u'version': u'3.13', u'release': u'5.el5', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u'\n[0.6.6-20]\n- Fix too-bold-output. (#504725)\n- Fix dealing with CPI parameter to be accurate. (#537450)', u'issued': u'2011-04-27', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELBA-2011-0417.html', u'type': u'self', u'id': None, u'title': u'ELBA-2011-0417'}], u'_content_type_id': u'erratum', u'_id': u'4e168f21-876e-4504-987d-ff4edffe36cc', u'from': u'el-errata@oss.oracle.com', u'severity': u'', u'title': u'paps bug fix update', u'_ns': u'units_erratum', u'rights': u'Copyright 2011 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 5', u'reboot_suggested': False, u'type': u'bugfix', u'pkglist': [{u'packages': [{u'src': None, u'name': u'paps', u'sum': [u'md5', u'fbd347b2d4b83d2970bbfbe4877ea004'], u'filename': u'paps-0.6.6-20.el5.src.rpm', u'epoch': u'0', u'version': u'0.6.6', u'release': u'20.el5', u'arch': u'src'}, {u'src': None, u'name': u'paps', u'sum': [u'md5', u'c7704b64cd2d82a2d5a077e863921a5e'], u'filename': u'paps-0.6.6-20.el5.x86_64.rpm', u'epoch': u'0', u'version': u'0.6.6', u'release': u'20.el5', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u'\n[7.1-3]\n- Fix FHS compliance issue. (#405891)', u'issued': u'2011-04-27', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELBA-2011-0418.html', u'type': u'self', u'id': None, u'title': u'ELBA-2011-0418'}], u'_content_type_id': u'erratum', u'_id': u'b3537090-fdf3-405d-8e01-99db44b899eb', u'from': u'el-errata@oss.oracle.com', u'severity': u'', u'title': u'xorg-x11-font-utils bug fix update', u'_ns': u'units_erratum', u'rights': u'Copyright 2011 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 5', u'reboot_suggested': False, u'type': u'bugfix', u'pkglist': [{u'packages': [{u'src': None, u'name': u'xorg-x11-font-utils', u'sum': [u'md5', u'b67087f69af3dadf2a9ef0bc01da544f'], u'filename': u'xorg-x11-font-utils-7.1-3.src.rpm', u'epoch': u'1', u'version': u'7.1', u'release': u'3', u'arch': u'src'}, {u'src': None, u'name': u'xorg-x11-font-utils', u'sum': [u'md5', u'fa7b9097ec2f42f79639a09ad4fa80b8'], u'filename': u'xorg-x11-font-utils-7.1-3.x86_64.rpm', u'epoch': u'1', u'version': u'7.1', u'release': u'3', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u"\n[5.1.19.6-68.0.1.el5_6.1]\n- Check for mpath in the case of LVM-on-mpath (John Sobecki) [orabug 11781507]\n- Add shared libs needed for multipath executable (John Sobecki) [orabug 10202864]\n- Change module detection logic to work with 5.x and UEK kernels (John Sobecki)\n- When using the -v option, take out the setquiet in the initrd image (John Sobecki)\n- Detect /etc/enterprise-release\n- Don't try to reload same driver [orabug 10209399] [Joe Jin]\n- Merges for UEK\n * Fix blkid scanning to prefer MD devices when we find them. If /dev/sda\n and /dev/sdb are in a MD raidset, /dev/mdX, /dev/sda and /dev/sdb will all\n have the same filesystem label and uuid. Nash has code that goes through\n all the blkid tags in sysfs order, and it will pick whichever one pops up\n first.\n This changes nash to always prefer md devices.\n It also forces a wait for scsi devices to settle, if scsi isn't compiled as a\\ module it won't autodetect that we should wait for scsi devices. [Chris Mason]\n * Add udev and firmware_helper to initrd so firmware gets loaded during boot [Guru Anbalagane]\n\n[5.1.19.6-68.1]\n- Add module options from /etc/modprobe.d/*.conf (564392)\n Resolves: rhbz#694052", u'issued': u'2011-04-12', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELBA-2011-0430.html', u'type': u'self', u'id': None, u'title': u'ELBA-2011-0430'}], u'_content_type_id': u'erratum', u'_id': u'be55cbbb-b5ac-4f89-ba0a-1c9ed87f525b', u'from': u'el-errata@oss.oracle.com', u'severity': u'', u'title': u'mkinitrd bug fix update', u'_ns': u'units_erratum', u'rights': u'Copyright 2011 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 5', u'reboot_suggested': False, u'type': u'bugfix', u'pkglist': [{u'packages': [{u'src': None, u'name': u'libbdevid-python', u'sum': [u'md5', u'3817944ebc49605e7484d9dd0c528233'], u'filename': u'libbdevid-python-5.1.19.6-68.0.1.el5_6.1.x86_64.rpm', u'epoch': u'0', u'version': u'5.1.19.6', u'release': u'68.0.1.el5_6.1', u'arch': u'x86_64'}, {u'src': None, u'name': u'mkinitrd', u'sum': [u'md5', u'4bacedffe6bd2ccb9022b8336ce330c9'], u'filename': u'mkinitrd-5.1.19.6-68.0.1.el5_6.1.i386.rpm', u'epoch': u'0', u'version': u'5.1.19.6', u'release': u'68.0.1.el5_6.1', u'arch': u'i386'}, {u'src': None, u'name': u'mkinitrd', u'sum': [u'md5', u'0010004cdf5e24b50eedf8c3a257dbf6'], u'filename': u'mkinitrd-5.1.19.6-68.0.1.el5_6.1.src.rpm', u'epoch': u'0', u'version': u'5.1.19.6', u'release': u'68.0.1.el5_6.1', u'arch': u'src'}, {u'src': None, u'name': u'mkinitrd', u'sum': [u'md5', u'6601e920ed99b093c904e9082b461b68'], u'filename': u'mkinitrd-5.1.19.6-68.0.1.el5_6.1.x86_64.rpm', u'epoch': u'0', u'version': u'5.1.19.6', u'release': u'68.0.1.el5_6.1', u'arch': u'x86_64'}, {u'src': None, u'name': u'mkinitrd-devel', u'sum': [u'md5', u'3bb9d9d9aa2dc3a8d8335ce4e404123f'], u'filename': u'mkinitrd-devel-5.1.19.6-68.0.1.el5_6.1.i386.rpm', u'epoch': u'0', u'version': u'5.1.19.6', u'release': u'68.0.1.el5_6.1', u'arch': u'i386'}, {u'src': None, u'name': u'mkinitrd-devel', u'sum': [u'md5', u'ab84ee304879f3091bf724f290a21b94'], u'filename': u'mkinitrd-devel-5.1.19.6-68.0.1.el5_6.1.x86_64.rpm', u'epoch': u'0', u'version': u'5.1.19.6', u'release': u'68.0.1.el5_6.1', u'arch': u'x86_64'}, {u'src': None, u'name': u'nash', u'sum': [u'md5', u'395861e92d9c87104150298eb1594bc5'], u'filename': u'nash-5.1.19.6-68.0.1.el5_6.1.x86_64.rpm', u'epoch': u'0', u'version': u'5.1.19.6', u'release': u'68.0.1.el5_6.1', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u'\n[2.19-5.el5_6.1]\n- Fix strcat to uninitialized memory - it led to garbage before\n login while changing password remotely\n Resolves: #688237', u'issued': u'2011-04-14', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELBA-2011-0444.html', u'type': u'self', u'id': None, u'title': u'ELBA-2011-0444'}], u'_content_type_id': u'erratum', u'_id': u'084db15f-f73b-403e-bcfe-5fa6a5c75cb7', u'from': u'el-errata@oss.oracle.com', u'severity': u'', u'title': u'ypserv bug fix update', u'_ns': u'units_erratum', u'rights': u'Copyright 2011 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 5', u'reboot_suggested': False, u'type': u'bugfix', u'pkglist': [{u'packages': [{u'src': None, u'name': u'ypserv', u'sum': [u'md5', u'1a2120ffac710946df74d5d452c57b7c'], u'filename': u'ypserv-2.19-5.el5_6.1.src.rpm', u'epoch': u'0', u'version': u'2.19', u'release': u'5.el5_6.1', u'arch': u'src'}, {u'src': None, u'name': u'ypserv', u'sum': [u'md5', u'b0de199e713effde38669d337d8772f3'], u'filename': u'ypserv-2.19-5.el5_6.1.x86_64.rpm', u'epoch': u'0', u'version': u'2.19', u'release': u'5.el5_6.1', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u'\n[7.1-5.el5_6.2]\n- cve-2011-0465.patch: Fix quoting and escaping logic to match upstream (#696316)', u'issued': u'2011-04-19', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELBA-2011-0454.html', u'type': u'self', u'id': None, u'title': u'ELBA-2011-0454'}], u'_content_type_id': u'erratum', u'_id': u'3523336e-9ecd-4f42-8b0c-028adac285de', u'from': u'el-errata@oss.oracle.com', u'severity': u'', u'title': u'xorg-x11-server-utils bug fix update', u'_ns': u'units_erratum', u'rights': u'Copyright 2011 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 5', u'reboot_suggested': False, u'type': u'bugfix', u'pkglist': [{u'packages': [{u'src': None, u'name': u'xorg-x11-server-utils', u'sum': [u'md5', u'32fc5e84f0f9d3877884f0b6b5331c00'], u'filename': u'xorg-x11-server-utils-7.1-5.el5_6.2.src.rpm', u'epoch': u'0', u'version': u'7.1', u'release': u'5.el5_6.2', u'arch': u'src'}, {u'src': None, u'name': u'xorg-x11-server-utils', u'sum': [u'md5', u'56e6430670fb31956b695f108fdb7689'], u'filename': u'xorg-x11-server-utils-7.1-5.el5_6.2.x86_64.rpm', u'epoch': u'0', u'version': u'7.1', u'release': u'5.el5_6.2', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u"\n[1.1.1-48.76.0.1.el5_5.4]\n- Added oracle-enterprise-detect.patch\n- Replaced 'Red Hat' in spec file\n\n[1.1.1-48.76.4]\n- Fix cursor confined to one screen issue (#694728)\n- Fix mouse stuck on left edge (#529717)\n\n[1.1.1-48.76.3]\n- xserver-1.1.1-bs-crash.patch: Fix crash in the backing store code. (#690270)", u'issued': u'2011-04-20', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELBA-2011-0456.html', u'type': u'self', u'id': None, u'title': u'ELBA-2011-0456'}], u'_content_type_id': u'erratum', u'_id': u'c122d44f-498a-4ff9-9c33-594880833887', u'from': u'el-errata@oss.oracle.com', u'severity': u'', u'title': u'xorg-x11-server bug fix update', u'_ns': u'units_erratum', u'rights': u'Copyright 2011 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 5', u'reboot_suggested': False, u'type': u'bugfix', u'pkglist': [{u'packages': [{u'src': None, u'name': u'xorg-x11-server', u'sum': [u'md5', u'8c87ef154456f445fd3344b2d2aa2787'], u'filename': u'xorg-x11-server-1.1.1-48.76.0.1.el5_6.4.src.rpm', u'epoch': u'0', u'version': u'1.1.1', u'release': u'48.76.0.1.el5_6.4', u'arch': u'src'}, {u'src': None, u'name': u'xorg-x11-server-Xdmx', u'sum': [u'md5', u'a170bfe47d02b1ef7709931dbc76c260'], u'filename': u'xorg-x11-server-Xdmx-1.1.1-48.76.0.1.el5_6.4.x86_64.rpm', u'epoch': u'0', u'version': u'1.1.1', u'release': u'48.76.0.1.el5_6.4', u'arch': u'x86_64'}, {u'src': None, u'name': u'xorg-x11-server-Xephyr', u'sum': [u'md5', u'1865eddd100d3b5853b7659c545d7e42'], u'filename': u'xorg-x11-server-Xephyr-1.1.1-48.76.0.1.el5_6.4.x86_64.rpm', u'epoch': u'0', u'version': u'1.1.1', u'release': u'48.76.0.1.el5_6.4', u'arch': u'x86_64'}, {u'src': None, u'name': u'xorg-x11-server-Xnest', u'sum': [u'md5', u'0c427c883d38895ecec27ddfde86a01b'], u'filename': u'xorg-x11-server-Xnest-1.1.1-48.76.0.1.el5_6.4.x86_64.rpm', u'epoch': u'0', u'version': u'1.1.1', u'release': u'48.76.0.1.el5_6.4', u'arch': u'x86_64'}, {u'src': None, u'name': u'xorg-x11-server-Xorg', u'sum': [u'md5', u'57da24bad0c5210d1cfa1c451b60821a'], u'filename': u'xorg-x11-server-Xorg-1.1.1-48.76.0.1.el5_6.4.x86_64.rpm', u'epoch': u'0', u'version': u'1.1.1', u'release': u'48.76.0.1.el5_6.4', u'arch': u'x86_64'}, {u'src': None, u'name': u'xorg-x11-server-Xvfb', u'sum': [u'md5', u'b2aa989d39c8d04cf5983969cb9dc64d'], u'filename': u'xorg-x11-server-Xvfb-1.1.1-48.76.0.1.el5_6.4.x86_64.rpm', u'epoch': u'0', u'version': u'1.1.1', u'release': u'48.76.0.1.el5_6.4', u'arch': u'x86_64'}, {u'src': None, u'name': u'xorg-x11-server-Xvnc-source', u'sum': [u'md5', u'f1fecee92c97dc11cc2b1b58ac1b5b4d'], u'filename': u'xorg-x11-server-Xvnc-source-1.1.1-48.76.0.1.el5_6.4.x86_64.rpm', u'epoch': u'0', u'version': u'1.1.1', u'release': u'48.76.0.1.el5_6.4', u'arch': u'x86_64'}, {u'src': None, u'name': u'xorg-x11-server-sdk', u'sum': [u'md5', u'4ec04203f7c267bdc2093c7b06e92bd8'], u'filename': u'xorg-x11-server-sdk-1.1.1-48.76.0.1.el5_6.4.x86_64.rpm', u'epoch': u'0', u'version': u'1.1.1', u'release': u'48.76.0.1.el5_6.4', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u'\n[1.0.2-5.1]\n- Sync xfs.init from zstream\n\n[1.0.2-3.2]\n- xfs-1.0.2-ffs.patch: Backport 64-bitness fixes from upstream. (#652633)', u'issued': u'2011-04-20', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELBA-2011-0457.html', u'type': u'self', u'id': None, u'title': u'ELBA-2011-0457'}], u'_content_type_id': u'erratum', u'_id': u'4bb2decc-5ce8-4f77-bb91-82e347b73fe2', u'from': u'el-errata@oss.oracle.com', u'severity': u'', u'title': u'xorg-x11-xfs bug fix update', u'_ns': u'units_erratum', u'rights': u'Copyright 2011 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 5', u'reboot_suggested': False, u'type': u'bugfix', u'pkglist': [{u'packages': [{u'src': None, u'name': u'xorg-x11-xfs', u'sum': [u'md5', u'5cc76c0448adda37696d1b21bf2efcf4'], u'filename': u'xorg-x11-xfs-1.0.2-5.el5_6.1.src.rpm', u'epoch': u'1', u'version': u'1.0.2', u'release': u'5.el5_6.1', u'arch': u'src'}, {u'src': None, u'name': u'xorg-x11-xfs', u'sum': [u'md5', u'08e91a0c8349ba79630bf8592e5b6d51'], u'filename': u'xorg-x11-xfs-1.0.2-5.el5_6.1.x86_64.rpm', u'epoch': u'1', u'version': u'1.0.2', u'release': u'5.el5_6.1', u'arch': u'x86_64'}, {u'src': None, u'name': u'xorg-x11-xfs-utils', u'sum': [u'md5', u'aca695e0e3be96f10fa7c7a4296e68c1'], u'filename': u'xorg-x11-xfs-utils-1.0.2-5.el5_6.1.x86_64.rpm', u'epoch': u'1', u'version': u'1.0.2', u'release': u'5.el5_6.1', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u"\n[2.5-58.el5_6.3]\n- Don't underestimate length of DST substitution (#694655)", u'issued': u'2011-04-26', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELBA-2011-0466.html', u'type': u'self', u'id': None, u'title': u'ELBA-2011-0466'}], u'_content_type_id': u'erratum', u'_id': u'c66e5a16-942b-4e70-8787-361bc7966401', u'from': u'el-errata@oss.oracle.com', u'severity': u'', u'title': u'glibc bug fix update', u'_ns': u'units_erratum', u'rights': u'Copyright 2011 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 5', u'reboot_suggested': False, u'type': u'bugfix', u'pkglist': [{u'packages': [{u'src': None, u'name': u'glibc', u'sum': [u'md5', u'42f649f2d89dd6606e8e6df56ed72d9d'], u'filename': u'glibc-2.5-58.el5_6.3.i686.rpm', u'epoch': u'0', u'version': u'2.5', u'release': u'58.el5_6.3', u'arch': u'i686'}, {u'src': None, u'name': u'glibc', u'sum': [u'md5', u'5a12bcaf4d58b8f8e969d860de156d2d'], u'filename': u'glibc-2.5-58.el5_6.3.src.rpm', u'epoch': u'0', u'version': u'2.5', u'release': u'58.el5_6.3', u'arch': u'src'}, {u'src': None, u'name': u'glibc', u'sum': [u'md5', u'3183baddce7a2306c7418a119e168776'], u'filename': u'glibc-2.5-58.el5_6.3.x86_64.rpm', u'epoch': u'0', u'version': u'2.5', u'release': u'58.el5_6.3', u'arch': u'x86_64'}, {u'src': None, u'name': u'glibc-common', u'sum': [u'md5', u'3ced8ecc3c2902ec3f2f76fcab7b5ad4'], u'filename': u'glibc-common-2.5-58.el5_6.3.x86_64.rpm', u'epoch': u'0', u'version': u'2.5', u'release': u'58.el5_6.3', u'arch': u'x86_64'}, {u'src': None, u'name': u'glibc-devel', u'sum': [u'md5', u'32e9de688969eb595329671276d5eb57'], u'filename': u'glibc-devel-2.5-58.el5_6.3.i386.rpm', u'epoch': u'0', u'version': u'2.5', u'release': u'58.el5_6.3', u'arch': u'i386'}, {u'src': None, u'name': u'glibc-devel', u'sum': [u'md5', u'04127902467334fc5e546c397919c8a5'], u'filename': u'glibc-devel-2.5-58.el5_6.3.x86_64.rpm', u'epoch': u'0', u'version': u'2.5', u'release': u'58.el5_6.3', u'arch': u'x86_64'}, {u'src': None, u'name': u'glibc-headers', u'sum': [u'md5', u'f935c4f1607a244f2cd9444c2ac78ef9'], u'filename': u'glibc-headers-2.5-58.el5_6.3.x86_64.rpm', u'epoch': u'0', u'version': u'2.5', u'release': u'58.el5_6.3', u'arch': u'x86_64'}, {u'src': None, u'name': u'glibc-utils', u'sum': [u'md5', u'3b55eeba38475311a6f5253429fb6f08'], u'filename': u'glibc-utils-2.5-58.el5_6.3.x86_64.rpm', u'epoch': u'0', u'version': u'2.5', u'release': u'58.el5_6.3', u'arch': u'x86_64'}, {u'src': None, u'name': u'nscd', u'sum': [u'md5', u'173807cfb0226581546e558b30ea7eb6'], u'filename': u'nscd-2.5-58.el5_6.3.x86_64.rpm', u'epoch': u'0', u'version': u'2.5', u'release': u'58.el5_6.3', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u'\n[2.0.115-68.el5_6.3]\n- ccs: Update manual page for ccs_tool\n (ccs_update_manual_page_for_ccs_tool.patch)\n Resolves: rhbz#677814\n\n[2.0.115-68.el5_6.2]\n- ccs: Allow ccs_tool to use alternate base ports\n (allow_ccs_tool_to_use_alternate_base_ports.patch)\n Resolves: rhbz#677814', u'issued': u'2011-04-28', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELBA-2011-0470.html', u'type': u'self', u'id': None, u'title': u'ELBA-2011-0470'}], u'_content_type_id': u'erratum', u'_id': u'a06353db-481d-48ca-b8de-22d53a05899f', u'from': u'el-errata@oss.oracle.com', u'severity': u'', u'title': u'cman bug fix update', u'_ns': u'units_erratum', u'rights': u'Copyright 2011 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 5', u'reboot_suggested': False, u'type': u'bugfix', u'pkglist': [{u'packages': [{u'src': None, u'name': u'cman', u'sum': [u'md5', u'5b1df4a00ab7ec36db57ae0099daae99'], u'filename': u'cman-2.0.115-68.el5_6.3.src.rpm', u'epoch': u'0', u'version': u'2.0.115', u'release': u'68.el5_6.3', u'arch': u'src'}, {u'src': None, u'name': u'cman', u'sum': [u'md5', u'b37fe93f6f0b9c889a4f3d5b739a9c1d'], u'filename': u'cman-2.0.115-68.el5_6.3.x86_64.rpm', u'epoch': u'0', u'version': u'2.0.115', u'release': u'68.el5_6.3', u'arch': u'x86_64'}, {u'src': None, u'name': u'cman-devel', u'sum': [u'md5', u'18d892a0f3acc48cdc67a6e6dcce08da'], u'filename': u'cman-devel-2.0.115-68.el5_6.3.i386.rpm', u'epoch': u'0', u'version': u'2.0.115', u'release': u'68.el5_6.3', u'arch': u'i386'}, {u'src': None, u'name': u'cman-devel', u'sum': [u'md5', u'968a381df0c479a18ff52661f4261a4e'], u'filename': u'cman-devel-2.0.115-68.el5_6.3.x86_64.rpm', u'epoch': u'0', u'version': u'2.0.115', u'release': u'68.el5_6.3', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u'\n[0.1.62-28.1]\n- fsck.gfs2 stuck in pass1 on i686\n- Resolves: rhbz#675911', u'issued': u'2011-05-02', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELBA-2011-0476.html', u'type': u'self', u'id': None, u'title': u'ELBA-2011-0476'}], u'_content_type_id': u'erratum', u'_id': u'455404ba-fe7b-4b29-b359-8976639625d2', u'from': u'el-errata@oss.oracle.com', u'severity': u'', u'title': u'gfs2-utils bug fix update', u'_ns': u'units_erratum', u'rights': u'Copyright 2011 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 5', u'reboot_suggested': False, u'type': u'bugfix', u'pkglist': [{u'packages': [{u'src': None, u'name': u'gfs2-utils', u'sum': [u'md5', u'36ade55beb94b51d195dca39207a469c'], u'filename': u'gfs2-utils-0.1.62-28.el5_6.1.src.rpm', u'epoch': u'0', u'version': u'0.1.62', u'release': u'28.el5_6.1', u'arch': u'src'}, {u'src': None, u'name': u'gfs2-utils', u'sum': [u'md5', u'5ddb5c5487db6755e2ddcdcdfca9c86f'], u'filename': u'gfs2-utils-0.1.62-28.el5_6.1.x86_64.rpm', u'epoch': u'0', u'version': u'0.1.62', u'release': u'28.el5_6.1', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u"\n[2.2.3-45.0.1.el5_6.1]\n- replace index.html with Oracle's index page oracle_index.html\n- update vstring and distro in specfile\n\n[2.2.3-45.1]\n- mod_ssl: fix handling of incomplete lines w/rev. proxy (#694158)", u'issued': u'2011-05-04', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELBA-2011-0480.html', u'type': u'self', u'id': None, u'title': u'ELBA-2011-0480'}], u'_content_type_id': u'erratum', u'_id': u'a926bb7d-2bc1-422c-b0a0-a936841033bd', u'from': u'el-errata@oss.oracle.com', u'severity': u'', u'title': u'httpd bug fix update', u'_ns': u'units_erratum', u'rights': u'Copyright 2011 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 5', u'reboot_suggested': False, u'type': u'bugfix', u'pkglist': [{u'packages': [{u'src': None, u'name': u'httpd', u'sum': [u'md5', u'd6085171a797204ac2088546f53b92eb'], u'filename': u'httpd-2.2.3-45.0.1.el5_6.1.src.rpm', u'epoch': u'0', u'version': u'2.2.3', u'release': u'45.0.1.el5_6.1', u'arch': u'src'}, {u'src': None, u'name': u'httpd', u'sum': [u'md5', u'5e2eecab44eb1ab639281505e274b4cd'], u'filename': u'httpd-2.2.3-45.0.1.el5_6.1.x86_64.rpm', u'epoch': u'0', u'version': u'2.2.3', u'release': u'45.0.1.el5_6.1', u'arch': u'x86_64'}, {u'src': None, u'name': u'httpd-devel', u'sum': [u'md5', u'ef0868787d2c92ad96a7dc89a36d969a'], u'filename': u'httpd-devel-2.2.3-45.0.1.el5_6.1.i386.rpm', u'epoch': u'0', u'version': u'2.2.3', u'release': u'45.0.1.el5_6.1', u'arch': u'i386'}, {u'src': None, u'name': u'httpd-devel', u'sum': [u'md5', u'cb45047badbebc07106f3b76a8fd4797'], u'filename': u'httpd-devel-2.2.3-45.0.1.el5_6.1.x86_64.rpm', u'epoch': u'0', u'version': u'2.2.3', u'release': u'45.0.1.el5_6.1', u'arch': u'x86_64'}, {u'src': None, u'name': u'httpd-manual', u'sum': [u'md5', u'b9b2442c2b7c9546c0126b7ba91ef544'], u'filename': u'httpd-manual-2.2.3-45.0.1.el5_6.1.x86_64.rpm', u'epoch': u'0', u'version': u'2.2.3', u'release': u'45.0.1.el5_6.1', u'arch': u'x86_64'}, {u'src': None, u'name': u'mod_ssl', u'sum': [u'md5', u'fe1c55fab5c2ce6692326ef2eeeeecc4'], u'filename': u'mod_ssl-2.2.3-45.0.1.el5_6.1.x86_64.rpm', u'epoch': u'1', u'version': u'2.2.3', u'release': u'45.0.1.el5_6.1', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u'\n[2.4.6-300.el5_6.1]\n- SSH_USE_STRONG_RNG is 1 which requires /dev/random', u'issued': u'2011-05-04', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELBA-2011-0481.html', u'type': u'self', u'id': None, u'title': u'ELBA-2011-0481'}], u'_content_type_id': u'erratum', u'_id': u'fc3566aa-11bc-4b1a-b03e-ac1ce984db47', u'from': u'el-errata@oss.oracle.com', u'severity': u'', u'title': u'selinux-policy bug fix update', u'_ns': u'units_erratum', u'rights': u'Copyright 2011 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 5', u'reboot_suggested': False, u'type': u'bugfix', u'pkglist': [{u'packages': [{u'src': None, u'name': u'selinux-policy', u'sum': [u'md5', u'918d47cc0cda62037d4b6a291a1dd8d4'], u'filename': u'selinux-policy-2.4.6-300.el5_6.1.noarch.rpm', u'epoch': u'0', u'version': u'2.4.6', u'release': u'300.el5_6.1', u'arch': u'noarch'}, {u'src': None, u'name': u'selinux-policy', u'sum': [u'md5', u'12ecb838acc12a34cda4faaa5f62f622'], u'filename': u'selinux-policy-2.4.6-300.el5_6.1.src.rpm', u'epoch': u'0', u'version': u'2.4.6', u'release': u'300.el5_6.1', u'arch': u'src'}, {u'src': None, u'name': u'selinux-policy-devel', u'sum': [u'md5', u'78bbd8d93d484248585a14aab907a44a'], u'filename': u'selinux-policy-devel-2.4.6-300.el5_6.1.noarch.rpm', u'epoch': u'0', u'version': u'2.4.6', u'release': u'300.el5_6.1', u'arch': u'noarch'}, {u'src': None, u'name': u'selinux-policy-minimum', u'sum': [u'md5', u'c2b6d55df31c9224175e40ade4087257'], u'filename': u'selinux-policy-minimum-2.4.6-300.el5_6.1.noarch.rpm', u'epoch': u'0', u'version': u'2.4.6', u'release': u'300.el5_6.1', u'arch': u'noarch'}, {u'src': None, u'name': u'selinux-policy-mls', u'sum': [u'md5', u'82a9fa5eb59afe58834bbc1867866555'], u'filename': u'selinux-policy-mls-2.4.6-300.el5_6.1.noarch.rpm', u'epoch': u'0', u'version': u'2.4.6', u'release': u'300.el5_6.1', u'arch': u'noarch'}, {u'src': None, u'name': u'selinux-policy-strict', u'sum': [u'md5', u'e44beea23b56f14a7ce23a98c664e9fc'], u'filename': u'selinux-policy-strict-2.4.6-300.el5_6.1.noarch.rpm', u'epoch': u'0', u'version': u'2.4.6', u'release': u'300.el5_6.1', u'arch': u'noarch'}, {u'src': None, u'name': u'selinux-policy-targeted', u'sum': [u'md5', u'35329df1625c0348dfd27d9849993cc0'], u'filename': u'selinux-policy-targeted-2.4.6-300.el5_6.1.noarch.rpm', u'epoch': u'0', u'version': u'2.4.6', u'release': u'300.el5_6.1', u'arch': u'noarch'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u'\n[3.22.1-3.el5_6.1]\n- modify rsyslog-3.22.1-unlimitedselect.patch so that\n running autoconf is not needed\n Resolves: #692954\n- remove autoconf, automake, libtool from BuildRequires', u'issued': u'2011-05-04', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELBA-2011-0484.html', u'type': u'self', u'id': None, u'title': u'ELBA-2011-0484'}], u'_content_type_id': u'erratum', u'_id': u'33e6374e-d972-4fd4-8e6a-3b65616f8562', u'from': u'el-errata@oss.oracle.com', u'severity': u'', u'title': u'rsyslog bug fix update', u'_ns': u'units_erratum', u'rights': u'Copyright 2011 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 5', u'reboot_suggested': False, u'type': u'bugfix', u'pkglist': [{u'packages': [{u'src': None, u'name': u'rsyslog', u'sum': [u'md5', u'bcf9f281541f40f17a2298ad013ea056'], u'filename': u'rsyslog-3.22.1-3.el5_6.1.src.rpm', u'epoch': u'0', u'version': u'3.22.1', u'release': u'3.el5_6.1', u'arch': u'src'}, {u'src': None, u'name': u'rsyslog', u'sum': [u'md5', u'5355f8445a62d09842e59d25d4c42560'], u'filename': u'rsyslog-3.22.1-3.el5_6.1.x86_64.rpm', u'epoch': u'0', u'version': u'3.22.1', u'release': u'3.el5_6.1', u'arch': u'x86_64'}, {u'src': None, u'name': u'rsyslog-gnutls', u'sum': [u'md5', u'52e7e0faa0165d1080d7225bf7926f1f'], u'filename': u'rsyslog-gnutls-3.22.1-3.el5_6.1.x86_64.rpm', u'epoch': u'0', u'version': u'3.22.1', u'release': u'3.el5_6.1', u'arch': u'x86_64'}, {u'src': None, u'name': u'rsyslog-gssapi', u'sum': [u'md5', u'9ff7ba91f2b29f47795f5f777eb15d9b'], u'filename': u'rsyslog-gssapi-3.22.1-3.el5_6.1.x86_64.rpm', u'epoch': u'0', u'version': u'3.22.1', u'release': u'3.el5_6.1', u'arch': u'x86_64'}, {u'src': None, u'name': u'rsyslog-mysql', u'sum': [u'md5', u'41c45bd0f2a36940eafb97c8243a0a26'], u'filename': u'rsyslog-mysql-3.22.1-3.el5_6.1.x86_64.rpm', u'epoch': u'0', u'version': u'3.22.1', u'release': u'3.el5_6.1', u'arch': u'x86_64'}, {u'src': None, u'name': u'rsyslog-pgsql', u'sum': [u'md5', u'6af73df7c26e65cdca2664b91eb96f30'], u'filename': u'rsyslog-pgsql-3.22.1-3.el5_6.1.x86_64.rpm', u'epoch': u'0', u'version': u'3.22.1', u'release': u'3.el5_6.1', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u'\n[5.0.1-0.rc2.143.0.1.el5_6.2]\n- apply fix from NetApp to use tcp before udp\n http://www.mail-archive.com/autofs@linux.kernel.org/msg07910.html\n (Bert Barbe) [orabug 6827898]\n\n[5.0.1-0.rc2.143.el5_6.2]\n- bz691311 - autofs should support paged results from ldap server\n - fix paged ldap map read.\n- Related: rhbz#691311\n\n[5.0.1-0.rc2.143.el5_6.1]\n- bz691311 - autofs should support paged results from ldap server\n - add ldap page control handling.\n - ldap paged query configure fix.\n - auto adjust ldap page size.\n- Resolves: rhbz#691311', u'issued': u'2011-05-05', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELBA-2011-0487.html', u'type': u'self', u'id': None, u'title': u'ELBA-2011-0487'}], u'_content_type_id': u'erratum', u'_id': u'89c6e18b-ad6e-4fd3-8c47-09ec35438365', u'from': u'el-errata@oss.oracle.com', u'severity': u'', u'title': u'autofs bug fix update', u'_ns': u'units_erratum', u'rights': u'Copyright 2011 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 5', u'reboot_suggested': False, u'type': u'bugfix', u'pkglist': [{u'packages': [{u'src': None, u'name': u'autofs', u'sum': [u'md5', u'd0346e6b11d4043730e9065cbd2ffb4e'], u'filename': u'autofs-5.0.1-0.rc2.143.0.1.el5_6.2.src.rpm', u'epoch': u'1', u'version': u'5.0.1', u'release': u'0.rc2.143.0.1.el5_6.2', u'arch': u'src'}, {u'src': None, u'name': u'autofs', u'sum': [u'md5', u'e35e2feab20c220b3e4b2887ba86a49a'], u'filename': u'autofs-5.0.1-0.rc2.143.0.1.el5_6.2.x86_64.rpm', u'epoch': u'1', u'version': u'5.0.1', u'release': u'0.rc2.143.0.1.el5_6.2', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u'\n[5.0.77-4.el5_6.6]\n- Add fix for regression with input lines over 1MB (caused by fix for 658863)\nResolves: #700497\n- Add fix for memory leak with DISTINCT, ORDER BY in subquery\nResolves: #692953', u'issued': u'2011-05-09', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELBA-2011-0494.html', u'type': u'self', u'id': None, u'title': u'ELBA-2011-0494'}], u'_content_type_id': u'erratum', u'_id': u'a4699851-0793-4f00-b84d-0f5e62dc8bcd', u'from': u'el-errata@oss.oracle.com', u'severity': u'', u'title': u'mysql bug fix update', u'_ns': u'units_erratum', u'rights': u'Copyright 2011 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 5', u'reboot_suggested': False, u'type': u'bugfix', u'pkglist': [{u'packages': [{u'src': None, u'name': u'mysql', u'sum': [u'md5', u'33796e8c84b1de566c5ee43d93aa734b'], u'filename': u'mysql-5.0.77-4.el5_6.6.i386.rpm', u'epoch': u'0', u'version': u'5.0.77', u'release': u'4.el5_6.6', u'arch': u'i386'}, {u'src': None, u'name': u'mysql', u'sum': [u'md5', u'a66f79728ecbb4e0afb51e0f908cf187'], u'filename': u'mysql-5.0.77-4.el5_6.6.src.rpm', u'epoch': u'0', u'version': u'5.0.77', u'release': u'4.el5_6.6', u'arch': u'src'}, {u'src': None, u'name': u'mysql', u'sum': [u'md5', u'2aadcb8785ea29b53d125819f265b03f'], u'filename': u'mysql-5.0.77-4.el5_6.6.x86_64.rpm', u'epoch': u'0', u'version': u'5.0.77', u'release': u'4.el5_6.6', u'arch': u'x86_64'}, {u'src': None, u'name': u'mysql-bench', u'sum': [u'md5', u'df70d7486b67771d902aa4eb068effb2'], u'filename': u'mysql-bench-5.0.77-4.el5_6.6.x86_64.rpm', u'epoch': u'0', u'version': u'5.0.77', u'release': u'4.el5_6.6', u'arch': u'x86_64'}, {u'src': None, u'name': u'mysql-devel', u'sum': [u'md5', u'cbe01981c82a376822639da6734c169a'], u'filename': u'mysql-devel-5.0.77-4.el5_6.6.i386.rpm', u'epoch': u'0', u'version': u'5.0.77', u'release': u'4.el5_6.6', u'arch': u'i386'}, {u'src': None, u'name': u'mysql-devel', u'sum': [u'md5', u'c44a8157df920ac2210992653d11c2d9'], u'filename': u'mysql-devel-5.0.77-4.el5_6.6.x86_64.rpm', u'epoch': u'0', u'version': u'5.0.77', u'release': u'4.el5_6.6', u'arch': u'x86_64'}, {u'src': None, u'name': u'mysql-server', u'sum': [u'md5', u'183bb334fa2d8c4ee5c71d9dc24c73b0'], u'filename': u'mysql-server-5.0.77-4.el5_6.6.x86_64.rpm', u'epoch': u'0', u'version': u'5.0.77', u'release': u'4.el5_6.6', u'arch': u'x86_64'}, {u'src': None, u'name': u'mysql-test', u'sum': [u'md5', u'5c711f4bbd225b4d948d44e292e38e8b'], u'filename': u'mysql-test-5.0.77-4.el5_6.6.x86_64.rpm', u'epoch': u'0', u'version': u'5.0.77', u'release': u'4.el5_6.6', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u"\n[0.80.6-28.1]\n- Resolves: rhbz#694180\n- Resolves: rhbz#694183\n- Resolves: rhbz#694182\n- Resolves: rhbz#694181\n- Add upstream revision 2165 - fix abort when token is lost in RECOVERY state.\n- Add upstream revision 2166 - resolve abort during simulatenous stopping of atleast 4 nodes.\n- Add upstream revision 2167 - totemsrp: Remove recv_flush code.\n- Add upstream revision 2168 - totemsrp: Only restore old ring id information one time.\n- Add upstream revision 2169 - totemsrp: free messages originated in recovery rather then rely on messages_free.\n- Add upstream revision 2170 - return error if there is no space for semaphore.\n- Add upstream revision 2171 - IPC: handle maximum use of file descriptors gracefully.\n- Add upstream revision 2172 - don't assert when ring id file is less then 8 bytes.", u'issued': u'2011-05-09', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELBA-2011-0495.html', u'type': u'self', u'id': None, u'title': u'ELBA-2011-0495'}], u'_content_type_id': u'erratum', u'_id': u'7c543af0-4ddb-4e3c-a6a1-26d97bd74482', u'from': u'el-errata@oss.oracle.com', u'severity': u'', u'title': u'openais bug fix update', u'_ns': u'units_erratum', u'rights': u'Copyright 2011 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 5', u'reboot_suggested': False, u'type': u'bugfix', u'pkglist': [{u'packages': [{u'src': None, u'name': u'openais', u'sum': [u'md5', u'be0165de3401ca66af3e24143ededa7d'], u'filename': u'openais-0.80.6-28.el5_6.1.src.rpm', u'epoch': u'0', u'version': u'0.80.6', u'release': u'28.el5_6.1', u'arch': u'src'}, {u'src': None, u'name': u'openais', u'sum': [u'md5', u'6721c25fc82971990f5a044700eb2838'], u'filename': u'openais-0.80.6-28.el5_6.1.x86_64.rpm', u'epoch': u'0', u'version': u'0.80.6', u'release': u'28.el5_6.1', u'arch': u'x86_64'}, {u'src': None, u'name': u'openais-devel', u'sum': [u'md5', u'152229d49cadbd890180039779ca1956'], u'filename': u'openais-devel-0.80.6-28.el5_6.1.i386.rpm', u'epoch': u'0', u'version': u'0.80.6', u'release': u'28.el5_6.1', u'arch': u'i386'}, {u'src': None, u'name': u'openais-devel', u'sum': [u'md5', u'a2d2fad719ce5c8ca18e438b916f3eea'], u'filename': u'openais-devel-0.80.6-28.el5_6.1.x86_64.rpm', u'epoch': u'0', u'version': u'0.80.6', u'release': u'28.el5_6.1', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u'\n[kvm-83-224.0.1.el5_6.1]\n- Added kvm-add-oracle-workaround-for-libvirt-bug.patch\n- Added kvm-Introduce-oel-machine-type.patch\n- Updated kversion to 2.6.18-238.9.1.0.1.el5 to match build environment\n\n[kvm-83-224.el5_6.1]\n- Updated kversion to 2.6.18-238.9.1.el to match build root\n- kvm-Make-migration-robust-to-trashing-workloads.patch [bz#696155]\n- Resolves: bz#696155\n (Enlarging migrate_set_speed does not raise migration network transfer rates to the real network bandwidth)', u'issued': u'2011-05-10', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELBA-2011-0499.html', u'type': u'self', u'id': None, u'title': u'ELBA-2011-0499'}], u'_content_type_id': u'erratum', u'_id': u'161ce2fb-9fa1-4377-8a0a-cc3ea1ee59f3', u'from': u'el-errata@oss.oracle.com', u'severity': u'', u'title': u'kvm bug fix update', u'_ns': u'units_erratum', u'rights': u'Copyright 2011 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 5', u'reboot_suggested': False, u'type': u'bugfix', u'pkglist': [{u'packages': [{u'src': None, u'name': u'kmod-kvm', u'sum': [u'md5', u'4b939e51d00bf624aace055cdd41be18'], u'filename': u'kmod-kvm-83-224.0.1.el5_6.1.x86_64.rpm', u'epoch': u'0', u'version': u'83', u'release': u'224.0.1.el5_6.1', u'arch': u'x86_64'}, {u'src': None, u'name': u'kmod-kvm-debug', u'sum': [u'md5', u'd9518c50a8834bd77927e859e8695f0b'], u'filename': u'kmod-kvm-debug-83-224.0.1.el5_6.1.x86_64.rpm', u'epoch': u'0', u'version': u'83', u'release': u'224.0.1.el5_6.1', u'arch': u'x86_64'}, {u'src': None, u'name': u'kvm', u'sum': [u'md5', u'5ae0c220ec008e08121e6a5640e7f45e'], u'filename': u'kvm-83-224.0.1.el5_6.1.src.rpm', u'epoch': u'0', u'version': u'83', u'release': u'224.0.1.el5_6.1', u'arch': u'src'}, {u'src': None, u'name': u'kvm', u'sum': [u'md5', u'c598c80af38f925f5e3ed5d096ef8af9'], u'filename': u'kvm-83-224.0.1.el5_6.1.x86_64.rpm', u'epoch': u'0', u'version': u'83', u'release': u'224.0.1.el5_6.1', u'arch': u'x86_64'}, {u'src': None, u'name': u'kvm-qemu-img', u'sum': [u'md5', u'4d8930286c2e7753caebb12646922973'], u'filename': u'kvm-qemu-img-83-224.0.1.el5_6.1.x86_64.rpm', u'epoch': u'0', u'version': u'83', u'release': u'224.0.1.el5_6.1', u'arch': u'x86_64'}, {u'src': None, u'name': u'kvm-tools', u'sum': [u'md5', u'3665db71a6061796f38330be37c6e17e'], u'filename': u'kvm-tools-83-224.0.1.el5_6.1.x86_64.rpm', u'epoch': u'0', u'version': u'83', u'release': u'224.0.1.el5_6.1', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u'\n[1.102pre-126.0.1.el5_6.6]\n- Add mkdumprd load firmware support [orabug 10432768]\n- updated makedumpfile to el6 version (Herbert van den Bergh) [orabug 10088607]\n- Merged UEK modification,Updated Source1 kdump.init\n Added --allow-missing for rebuilding kdump_initrd\n- Updated kexec-kdump-howto.txt with Oracle/OEL references\n\n[1.102pre-126.6]\n- Add the missing part of the previous patch. Resolve bug 700636.', u'issued': u'2011-05-11', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELBA-2011-0505.html', u'type': u'self', u'id': None, u'title': u'ELBA-2011-0505'}], u'_content_type_id': u'erratum', u'_id': u'77b9a401-1400-41c2-9687-775a655d3e42', u'from': u'el-errata@oss.oracle.com', u'severity': u'', u'title': u'kexec-tools bug fix update', u'_ns': u'units_erratum', u'rights': u'Copyright 2011 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 5', u'reboot_suggested': False, u'type': u'bugfix', u'pkglist': [{u'packages': [{u'src': None, u'name': u'kexec-tools', u'sum': [u'md5', u'48e431b4bdd859ea7d2a5d935d68d340'], u'filename': u'kexec-tools-1.102pre-126.0.1.el5_6.6.src.rpm', u'epoch': u'0', u'version': u'1.102pre', u'release': u'126.0.1.el5_6.6', u'arch': u'src'}, {u'src': None, u'name': u'kexec-tools', u'sum': [u'md5', u'e4fa03cccd1fe3b8153696b533afb2ba'], u'filename': u'kexec-tools-1.102pre-126.0.1.el5_6.6.x86_64.rpm', u'epoch': u'0', u'version': u'1.102pre', u'release': u'126.0.1.el5_6.6', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u'\n[23.7-2.2.2.el5.1]\n- Add patch for RH bug #703160 (error in PyArray_Reshape).', u'issued': u'2011-05-12', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELBA-2011-0508.html', u'type': u'self', u'id': None, u'title': u'ELBA-2011-0508'}], u'_content_type_id': u'erratum', u'_id': u'adea514c-58bb-42be-bfc3-e7cd9d74b1ae', u'from': u'el-errata@oss.oracle.com', u'severity': u'', u'title': u'python-numeric bug fix update', u'_ns': u'units_erratum', u'rights': u'Copyright 2011 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 5', u'reboot_suggested': False, u'type': u'bugfix', u'pkglist': [{u'packages': [{u'src': None, u'name': u'python-numeric', u'sum': [u'md5', u'e642da521f9dd8f955b00edfbb4302c1'], u'filename': u'python-numeric-23.7-2.2.2.el5_6.1.src.rpm', u'epoch': u'0', u'version': u'23.7', u'release': u'2.2.2.el5_6.1', u'arch': u'src'}, {u'src': None, u'name': u'python-numeric', u'sum': [u'md5', u'3d9600b9193e146bb74c1f2306440765'], u'filename': u'python-numeric-23.7-2.2.2.el5_6.1.x86_64.rpm', u'epoch': u'0', u'version': u'23.7', u'release': u'2.2.2.el5_6.1', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u'\n[2.0.52-9.el5_6.1]\n- rgmanager: Fix quotaoff handling\n (fix_quotaoff_handling.patch)\n Resolves: rhbz#694731\n- rgmanager: Fix reference count handling\n (fix_reference_count_handling.patch)\n Resolves: rhbz#701233', u'issued': u'2011-05-12', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELBA-2011-0509.html', u'type': u'self', u'id': None, u'title': u'ELBA-2011-0509'}], u'_content_type_id': u'erratum', u'_id': u'3508e9ac-3047-4848-8922-6dd791ba3e5d', u'from': u'el-errata@oss.oracle.com', u'severity': u'', u'title': u'rgmanager bug fix update', u'_ns': u'units_erratum', u'rights': u'Copyright 2011 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 5', u'reboot_suggested': False, u'type': u'bugfix', u'pkglist': [{u'packages': [{u'src': None, u'name': u'rgmanager', u'sum': [u'md5', u'ec0e741ae66447fa40f6bcfde536d93c'], u'filename': u'rgmanager-2.0.52-9.el5_6.1.src.rpm', u'epoch': u'0', u'version': u'2.0.52', u'release': u'9.el5_6.1', u'arch': u'src'}, {u'src': None, u'name': u'rgmanager', u'sum': [u'md5', u'427b47a139593e33574a8c546dc9f383'], u'filename': u'rgmanager-2.0.52-9.el5_6.1.x86_64.rpm', u'epoch': u'0', u'version': u'2.0.52', u'release': u'9.el5_6.1', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u'\n[32:9.7.0-6.P2.1]\n- work correctly when new DS is introduced in the trusted DNS tree (#675467)\n- include root zone DNSKEY (#693788)', u'issued': u'2011-05-12', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELBA-2011-0510.html', u'type': u'self', u'id': None, u'title': u'ELBA-2011-0510'}], u'_content_type_id': u'erratum', u'_id': u'a4cedbca-8664-4492-817c-7c61aa9cbd60', u'from': u'el-errata@oss.oracle.com', u'severity': u'', u'title': u'bind97 bug fix and enhancement update', u'_ns': u'units_erratum', u'rights': u'Copyright 2011 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 5', u'reboot_suggested': False, u'type': u'bugfix', u'pkglist': [{u'packages': [{u'src': None, u'name': u'bind97', u'sum': [u'md5', u'f873cde8e6bc6249bd42546d534688b5'], u'filename': u'bind97-9.7.0-6.P2.el5_6.1.src.rpm', u'epoch': u'32', u'version': u'9.7.0', u'release': u'6.P2.el5_6.1', u'arch': u'src'}, {u'src': None, u'name': u'bind97', u'sum': [u'md5', u'5516cb85edccef57fff8aa75a8d3f7ee'], u'filename': u'bind97-9.7.0-6.P2.el5_6.1.x86_64.rpm', u'epoch': u'32', u'version': u'9.7.0', u'release': u'6.P2.el5_6.1', u'arch': u'x86_64'}, {u'src': None, u'name': u'bind97-chroot', u'sum': [u'md5', u'a79be14ceb3de3799930c96bc853f64a'], u'filename': u'bind97-chroot-9.7.0-6.P2.el5_6.1.x86_64.rpm', u'epoch': u'32', u'version': u'9.7.0', u'release': u'6.P2.el5_6.1', u'arch': u'x86_64'}, {u'src': None, u'name': u'bind97-devel', u'sum': [u'md5', u'88c38a223a080917811506da54989f55'], u'filename': u'bind97-devel-9.7.0-6.P2.el5_6.1.i386.rpm', u'epoch': u'32', u'version': u'9.7.0', u'release': u'6.P2.el5_6.1', u'arch': u'i386'}, {u'src': None, u'name': u'bind97-devel', u'sum': [u'md5', u'282615bc7eccb14e31fb946664d43fbd'], u'filename': u'bind97-devel-9.7.0-6.P2.el5_6.1.x86_64.rpm', u'epoch': u'32', u'version': u'9.7.0', u'release': u'6.P2.el5_6.1', u'arch': u'x86_64'}, {u'src': None, u'name': u'bind97-libs', u'sum': [u'md5', u'1174c72640e889514aeed0c14e467891'], u'filename': u'bind97-libs-9.7.0-6.P2.el5_6.1.i386.rpm', u'epoch': u'32', u'version': u'9.7.0', u'release': u'6.P2.el5_6.1', u'arch': u'i386'}, {u'src': None, u'name': u'bind97-libs', u'sum': [u'md5', u'ac611b94e7900b9c7110de0872a2d11f'], u'filename': u'bind97-libs-9.7.0-6.P2.el5_6.1.x86_64.rpm', u'epoch': u'32', u'version': u'9.7.0', u'release': u'6.P2.el5_6.1', u'arch': u'x86_64'}, {u'src': None, u'name': u'bind97-utils', u'sum': [u'md5', u'aa086b74bc589b157ac55d4045cc2bc5'], u'filename': u'bind97-utils-9.7.0-6.P2.el5_6.1.x86_64.rpm', u'epoch': u'32', u'version': u'9.7.0', u'release': u'6.P2.el5_6.1', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u"\n[0.9pre-1.32.0.1.el5]\n- Don't print warnings with bogus CPU numbers\n- Back port struct mce to match both EL5 and UEK [bug 10219406]\n\n[0.9pre-1.32.el5]\n- BZ 642778 patch was improperly applied. Chunk missing. [BZ 642778]\n- Backport 21823b95a6bc5a9c5b1b96a66997e7f624976c47 [BZ 642778]\n- Fix length calculation of SMBIOS mapping", u'issued': u'2011-05-18', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELBA-2011-0512.html', u'type': u'self', u'id': None, u'title': u'ELBA-2011-0512'}], u'_content_type_id': u'erratum', u'_id': u'9f3f401f-517c-4cd3-9fc5-4d80093a081d', u'from': u'el-errata@oss.oracle.com', u'severity': u'', u'title': u'mcelog bug fix update', u'_ns': u'units_erratum', u'rights': u'Copyright 2011 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 5', u'reboot_suggested': False, u'type': u'bugfix', u'pkglist': [{u'packages': [{u'src': None, u'name': u'mcelog', u'sum': [u'md5', u'8d680c770ba760f03957c50d99c8c688'], u'filename': u'mcelog-0.9pre-1.32.0.1.el5.src.rpm', u'epoch': u'1', u'version': u'0.9pre', u'release': u'1.32.0.1.el5', u'arch': u'src'}, {u'src': None, u'name': u'mcelog', u'sum': [u'md5', u'accc9fb1ed365b995577c5f8b841bf72'], u'filename': u'mcelog-0.9pre-1.32.0.1.el5.x86_64.rpm', u'epoch': u'1', u'version': u'0.9pre', u'release': u'1.32.0.1.el5', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u'\n[20100202-1.5]\n- fix bug when nested sourced script did not execute all commands (#702364)', u'issued': u'2011-05-18', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELBA-2011-0513.html', u'type': u'self', u'id': None, u'title': u'ELBA-2011-0513'}], u'_content_type_id': u'erratum', u'_id': u'17f29877-6bdb-4acc-a79f-f1551fb0cead', u'from': u'el-errata@oss.oracle.com', u'severity': u'', u'title': u'ksh bug fix update', u'_ns': u'units_erratum', u'rights': u'Copyright 2011 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 5', u'reboot_suggested': False, u'type': u'bugfix', u'pkglist': [{u'packages': [{u'src': None, u'name': u'ksh', u'sum': [u'md5', u'9832b12e005b23cd72859ed629762055'], u'filename': u'ksh-20100202-1.el5_6.5.src.rpm', u'epoch': u'0', u'version': u'20100202', u'release': u'1.el5_6.5', u'arch': u'src'}, {u'src': None, u'name': u'ksh', u'sum': [u'md5', u'7c4a28ebc33738e3579cd61414d6e164'], u'filename': u'ksh-20100202-1.el5_6.5.x86_64.rpm', u'epoch': u'0', u'version': u'20100202', u'release': u'1.el5_6.5', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u'\n[253-37.1]\n- backport fixes for upstream #350 (parsing results when the connection is\n gone) and #351 (double-free of message chain) (#703831)', u'issued': u'2011-05-18', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELBA-2011-0514.html', u'type': u'self', u'id': None, u'title': u'ELBA-2011-0514'}], u'_content_type_id': u'erratum', u'_id': u'114acbb6-caa4-4604-93e2-078f741c6d17', u'from': u'el-errata@oss.oracle.com', u'severity': u'', u'title': u'nss_ldap bug fix update', u'_ns': u'units_erratum', u'rights': u'Copyright 2011 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 5', u'reboot_suggested': False, u'type': u'bugfix', u'pkglist': [{u'packages': [{u'src': None, u'name': u'nss_ldap', u'sum': [u'md5', u'059245dfd71fd9fb4ab078510382cb19'], u'filename': u'nss_ldap-253-37.el5_6.1.i386.rpm', u'epoch': u'0', u'version': u'253', u'release': u'37.el5_6.1', u'arch': u'i386'}, {u'src': None, u'name': u'nss_ldap', u'sum': [u'md5', u'fb2a37a3af066af7e8cdd0d1d61f372d'], u'filename': u'nss_ldap-253-37.el5_6.1.src.rpm', u'epoch': u'0', u'version': u'253', u'release': u'37.el5_6.1', u'arch': u'src'}, {u'src': None, u'name': u'nss_ldap', u'sum': [u'md5', u'0317ac016a2f339fcf074d449296c4d0'], u'filename': u'nss_ldap-253-37.el5_6.1.x86_64.rpm', u'epoch': u'0', u'version': u'253', u'release': u'37.el5_6.1', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u'\n[0.5.4-4.4.el5_6.17]\n- Take horizontal scaling into account when updating the font\n- Resolves: #703176\n\n[0.5.4-4.4.el5_6.16]\n- Improve text selection\n- Resolves: #703175\n\n[0.5.4-4.4.el5_6.15]\n- Modify check for overflow to allow allocation of zero bytes\n- Resolves: #698595', u'issued': u'2011-05-18', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELBA-2011-0517.html', u'type': u'self', u'id': None, u'title': u'ELBA-2011-0517'}], u'_content_type_id': u'erratum', u'_id': u'9202f1a1-61dd-40ee-b155-1ca5235aabb6', u'from': u'el-errata@oss.oracle.com', u'severity': u'', u'title': u'poppler bug fix update', u'_ns': u'units_erratum', u'rights': u'Copyright 2011 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 5', u'reboot_suggested': False, u'type': u'bugfix', u'pkglist': [{u'packages': [{u'src': None, u'name': u'poppler', u'sum': [u'md5', u'28d880e1ebc523732108731043b7bd2e'], u'filename': u'poppler-0.5.4-4.4.el5_6.17.i386.rpm', u'epoch': u'0', u'version': u'0.5.4', u'release': u'4.4.el5_6.17', u'arch': u'i386'}, {u'src': None, u'name': u'poppler', u'sum': [u'md5', u'85c4a6bc75768dddde169168b22d033c'], u'filename': u'poppler-0.5.4-4.4.el5_6.17.src.rpm', u'epoch': u'0', u'version': u'0.5.4', u'release': u'4.4.el5_6.17', u'arch': u'src'}, {u'src': None, u'name': u'poppler', u'sum': [u'md5', u'33ea4ea68b42acce95fe88265ece2453'], u'filename': u'poppler-0.5.4-4.4.el5_6.17.x86_64.rpm', u'epoch': u'0', u'version': u'0.5.4', u'release': u'4.4.el5_6.17', u'arch': u'x86_64'}, {u'src': None, u'name': u'poppler-devel', u'sum': [u'md5', u'49a7ff22e809172840b294cfbc164afd'], u'filename': u'poppler-devel-0.5.4-4.4.el5_6.17.i386.rpm', u'epoch': u'0', u'version': u'0.5.4', u'release': u'4.4.el5_6.17', u'arch': u'i386'}, {u'src': None, u'name': u'poppler-devel', u'sum': [u'md5', u'e971f6e4ebeda06dfaac49286c2a59e3'], u'filename': u'poppler-devel-0.5.4-4.4.el5_6.17.x86_64.rpm', u'epoch': u'0', u'version': u'0.5.4', u'release': u'4.4.el5_6.17', u'arch': u'x86_64'}, {u'src': None, u'name': u'poppler-utils', u'sum': [u'md5', u'1c10c96e47013087939b3967b4cf231f'], u'filename': u'poppler-utils-0.5.4-4.4.el5_6.17.x86_64.rpm', u'epoch': u'0', u'version': u'0.5.4', u'release': u'4.4.el5_6.17', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u'\n[2:4.0.17-18.el5_6.1]\n- fix sequence of arg. parsing and execution in faillog\n- fix ACL support\n- do not alter UIDs over 2147483647 in pwconv and pwunconv\n Resolves: #690829, #690830, #690831', u'issued': u'2011-05-23', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELBA-2011-0823.html', u'type': u'self', u'id': None, u'title': u'ELBA-2011-0823'}], u'_content_type_id': u'erratum', u'_id': u'85a91e19-668d-4886-bd46-b41be2587bbb', u'from': u'el-errata@oss.oracle.com', u'severity': u'', u'title': u'shadow-utils bug fix update', u'_ns': u'units_erratum', u'rights': u'Copyright 2011 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 5', u'reboot_suggested': False, u'type': u'bugfix', u'pkglist': [{u'packages': [{u'src': None, u'name': u'shadow-utils', u'sum': [u'md5', u'1262487a9da03e2f9132dd1b7ac71405'], u'filename': u'shadow-utils-4.0.17-18.el5_6.1.src.rpm', u'epoch': u'2', u'version': u'4.0.17', u'release': u'18.el5_6.1', u'arch': u'src'}, {u'src': None, u'name': u'shadow-utils', u'sum': [u'md5', u'70c8fd478e09f3be535e45daf6c0ad17'], u'filename': u'shadow-utils-4.0.17-18.el5_6.1.x86_64.rpm', u'epoch': u'2', u'version': u'4.0.17', u'release': u'18.el5_6.1', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u'\n[0.9.8-12.0.1]\n- handle larger kernel nodemask size (orabug 10114466)\n\n[0.9.8-12]\n- Fix memory corruptor (bz 702488)', u'issued': u'2011-05-24', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELBA-2011-0825.html', u'type': u'self', u'id': None, u'title': u'ELBA-2011-0825'}], u'_content_type_id': u'erratum', u'_id': u'17ac054a-41ea-4b42-87b8-08db40a74ced', u'from': u'el-errata@oss.oracle.com', u'severity': u'', u'title': u'numactl bug fix update', u'_ns': u'units_erratum', u'rights': u'Copyright 2011 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 5', u'reboot_suggested': False, u'type': u'bugfix', u'pkglist': [{u'packages': [{u'src': None, u'name': u'numactl', u'sum': [u'md5', u'e645326ff97741c61843724d2a39bd0d'], u'filename': u'numactl-0.9.8-12.0.1.el5_6.i386.rpm', u'epoch': u'0', u'version': u'0.9.8', u'release': u'12.0.1.el5_6', u'arch': u'i386'}, {u'src': None, u'name': u'numactl', u'sum': [u'md5', u'20eec263b92b83808578d8100875c47c'], u'filename': u'numactl-0.9.8-12.0.1.el5_6.src.rpm', u'epoch': u'0', u'version': u'0.9.8', u'release': u'12.0.1.el5_6', u'arch': u'src'}, {u'src': None, u'name': u'numactl', u'sum': [u'md5', u'eefcace56ef8d6a59e12a01f90dd1612'], u'filename': u'numactl-0.9.8-12.0.1.el5_6.x86_64.rpm', u'epoch': u'0', u'version': u'0.9.8', u'release': u'12.0.1.el5_6', u'arch': u'x86_64'}, {u'src': None, u'name': u'numactl-devel', u'sum': [u'md5', u'41ef8650defbd2559f8a5154d436c074'], u'filename': u'numactl-devel-0.9.8-12.0.1.el5_6.i386.rpm', u'epoch': u'0', u'version': u'0.9.8', u'release': u'12.0.1.el5_6', u'arch': u'i386'}, {u'src': None, u'name': u'numactl-devel', u'sum': [u'md5', u'262adc4e426e920a77238706907f5d4d'], u'filename': u'numactl-devel-0.9.8-12.0.1.el5_6.x86_64.rpm', u'epoch': u'0', u'version': u'0.9.8', u'release': u'12.0.1.el5_6', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u'\n[2.0-10.el5_6.1]\n- Fix OID for join and ipa-getkeytab operation (#704649)', u'issued': u'2011-06-01', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELBA-2011-0832.html', u'type': u'self', u'id': None, u'title': u'ELBA-2011-0832'}], u'_content_type_id': u'erratum', u'_id': u'165de90c-b844-4a01-a4d8-552e19d1009c', u'from': u'el-errata@oss.oracle.com', u'severity': u'', u'title': u'ipa-client bug fix update', u'_ns': u'units_erratum', u'rights': u'Copyright 2011 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 5', u'reboot_suggested': False, u'type': u'bugfix', u'pkglist': [{u'packages': [{u'src': None, u'name': u'ipa-client', u'sum': [u'md5', u'8b323947285840a2366ff99b621afd67'], u'filename': u'ipa-client-2.0-10.el5_6.1.src.rpm', u'epoch': u'0', u'version': u'2.0', u'release': u'10.el5_6.1', u'arch': u'src'}, {u'src': None, u'name': u'ipa-client', u'sum': [u'md5', u'21d6f6ea85196280e522f262416f1976'], u'filename': u'ipa-client-2.0-10.el5_6.1.x86_64.rpm', u'epoch': u'0', u'version': u'2.0', u'release': u'10.el5_6.1', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u'\n[4:5.8.8-32.0.1.el5_5.3]\n- Up release number and rebuild\n\n[4:5.8.8-32.el5.3]\n- 701631 - CGI.pm popup_menu if optgroup, is not properly escaped\n- 701632 - Perl threads leak memory when detached\n- Resolves: rhbz#701631, rhbz#701632', u'issued': u'2011-06-09', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELBA-2011-0863.html', u'type': u'self', u'id': None, u'title': u'ELBA-2011-0863'}], u'_content_type_id': u'erratum', u'_id': u'54a1b340-e6f5-4a27-a4f7-054f5ccc0a40', u'from': u'el-errata@oss.oracle.com', u'severity': u'', u'title': u'perl bug fix update', u'_ns': u'units_erratum', u'rights': u'Copyright 2011 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 5', u'reboot_suggested': False, u'type': u'bugfix', u'pkglist': [{u'packages': [{u'src': None, u'name': u'perl', u'sum': [u'md5', u'1b7183c16396ca6c215ec5a6daa53eb7'], u'filename': u'perl-5.8.8-32.0.1.el5_6.3.src.rpm', u'epoch': u'4', u'version': u'5.8.8', u'release': u'32.0.1.el5_6.3', u'arch': u'src'}, {u'src': None, u'name': u'perl', u'sum': [u'md5', u'efd680f5b6056fc7c537b7e664e1152e'], u'filename': u'perl-5.8.8-32.0.1.el5_6.3.x86_64.rpm', u'epoch': u'4', u'version': u'5.8.8', u'release': u'32.0.1.el5_6.3', u'arch': u'x86_64'}, {u'src': None, u'name': u'perl-suidperl', u'sum': [u'md5', u'b7b621f3b99dc538a2f3d032fcc93d5b'], u'filename': u'perl-suidperl-5.8.8-32.0.1.el5_6.3.x86_64.rpm', u'epoch': u'4', u'version': u'5.8.8', u'release': u'32.0.1.el5_6.3', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u'\n[0.4.7-42.el5.3]\n- Added bz704470.patch\n- Resolves: bz#704470', u'issued': u'2011-06-13', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELBA-2011-0864.html', u'type': u'self', u'id': None, u'title': u'ELBA-2011-0864'}], u'_content_type_id': u'erratum', u'_id': u'b82eabea-18f4-4b71-bab0-2a828c43610a', u'from': u'el-errata@oss.oracle.com', u'severity': u'', u'title': u'device-mapper-multipath bug fix update', u'_ns': u'units_erratum', u'rights': u'Copyright 2011 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 5', u'reboot_suggested': False, u'type': u'bugfix', u'pkglist': [{u'packages': [{u'src': None, u'name': u'device-mapper-multipath', u'sum': [u'md5', u'8a68392b6f6bf3e1b2a8c0e0429e0295'], u'filename': u'device-mapper-multipath-0.4.7-42.el5_6.3.src.rpm', u'epoch': u'0', u'version': u'0.4.7', u'release': u'42.el5_6.3', u'arch': u'src'}, {u'src': None, u'name': u'device-mapper-multipath', u'sum': [u'md5', u'e1cde7c1cf42a0156e78fb574be8450b'], u'filename': u'device-mapper-multipath-0.4.7-42.el5_6.3.x86_64.rpm', u'epoch': u'0', u'version': u'0.4.7', u'release': u'42.el5_6.3', u'arch': u'x86_64'}, {u'src': None, u'name': u'kpartx', u'sum': [u'md5', u'834bfc2ca39ca7203c59f0a51895b6fa'], u'filename': u'kpartx-0.4.7-42.el5_6.3.x86_64.rpm', u'epoch': u'0', u'version': u'0.4.7', u'release': u'42.el5_6.3', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u'\n[1.1.5-8.1]\n- Resolves: rhbz#679049 - LV appears as not mounted', u'issued': u'2011-06-23', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELBA-2011-0898.html', u'type': u'self', u'id': None, u'title': u'ELBA-2011-0898'}], u'_content_type_id': u'erratum', u'_id': u'c7b67d8d-7591-4ebd-8dfb-fcd9035262e7', u'from': u'el-errata@oss.oracle.com', u'severity': u'', u'title': u'system-config-lvm bug fix update', u'_ns': u'units_erratum', u'rights': u'Copyright 2011 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 5', u'reboot_suggested': False, u'type': u'bugfix', u'pkglist': [{u'packages': [{u'src': None, u'name': u'system-config-lvm', u'sum': [u'md5', u'0f07636d34d2b2f053846ee38015aba1'], u'filename': u'system-config-lvm-1.1.5-8.el5_6.1.noarch.rpm', u'epoch': u'0', u'version': u'1.1.5', u'release': u'8.el5_6.1', u'arch': u'noarch'}, {u'src': None, u'name': u'system-config-lvm', u'sum': [u'md5', u'6bf7a0eaf6f596056eb4f81f16e4108f'], u'filename': u'system-config-lvm-1.1.5-8.el5_6.1.src.rpm', u'epoch': u'0', u'version': u'1.1.5', u'release': u'8.el5_6.1', u'arch': u'src'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u'\n[2.0.115-68.el5_6.4]\n- qdiskd: Fix bad timer check - RHEL5\n (qdiskd_fix_bad_timer_check_rhel5.patch)\n Resolves: rhbz#707053', u'issued': u'2011-06-24', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELBA-2011-0900.html', u'type': u'self', u'id': None, u'title': u'ELBA-2011-0900'}], u'_content_type_id': u'erratum', u'_id': u'2105c03c-31a8-49ec-82f1-d242d07807cf', u'from': u'el-errata@oss.oracle.com', u'severity': u'', u'title': u'cman bug fix update', u'_ns': u'units_erratum', u'rights': u'Copyright 2011 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 5', u'reboot_suggested': False, u'type': u'bugfix', u'pkglist': [{u'packages': [{u'src': None, u'name': u'cman', u'sum': [u'md5', u'6f2a36dc160928f2f93fe476dc052979'], u'filename': u'cman-2.0.115-68.el5_6.4.src.rpm', u'epoch': u'0', u'version': u'2.0.115', u'release': u'68.el5_6.4', u'arch': u'src'}, {u'src': None, u'name': u'cman', u'sum': [u'md5', u'12394c7fa08f271c94e8379afa9b231e'], u'filename': u'cman-2.0.115-68.el5_6.4.x86_64.rpm', u'epoch': u'0', u'version': u'2.0.115', u'release': u'68.el5_6.4', u'arch': u'x86_64'}, {u'src': None, u'name': u'cman-devel', u'sum': [u'md5', u'6d03ea45b0ff5698ead3a380b467c88f'], u'filename': u'cman-devel-2.0.115-68.el5_6.4.i386.rpm', u'epoch': u'0', u'version': u'2.0.115', u'release': u'68.el5_6.4', u'arch': u'i386'}, {u'src': None, u'name': u'cman-devel', u'sum': [u'md5', u'00338b3f632a7074ccc65e3c893fb69e'], u'filename': u'cman-devel-2.0.115-68.el5_6.4.x86_64.rpm', u'epoch': u'0', u'version': u'2.0.115', u'release': u'68.el5_6.4', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u'\n[2.5-58.el5_6.4]\n- Fix ordering of DSO constructors and destructors (#604796)', u'issued': u'2011-06-27', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELBA-2011-0901.html', u'type': u'self', u'id': None, u'title': u'ELBA-2011-0901'}], u'_content_type_id': u'erratum', u'_id': u'12fc3d74-246f-44f1-b85a-e899e7317814', u'from': u'el-errata@oss.oracle.com', u'severity': u'', u'title': u'glibc bug fix update', u'_ns': u'units_erratum', u'rights': u'Copyright 2011 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 5', u'reboot_suggested': False, u'type': u'bugfix', u'pkglist': [{u'packages': [{u'src': None, u'name': u'glibc', u'sum': [u'md5', u'b47eefbb39cade8bfc79d63e04c3685f'], u'filename': u'glibc-2.5-58.el5_6.4.i686.rpm', u'epoch': u'0', u'version': u'2.5', u'release': u'58.el5_6.4', u'arch': u'i686'}, {u'src': None, u'name': u'glibc', u'sum': [u'md5', u'601d2725369cb2c628a7576b99dcb18a'], u'filename': u'glibc-2.5-58.el5_6.4.src.rpm', u'epoch': u'0', u'version': u'2.5', u'release': u'58.el5_6.4', u'arch': u'src'}, {u'src': None, u'name': u'glibc', u'sum': [u'md5', u'e90dc4b5651327b829fcda1b26950b9b'], u'filename': u'glibc-2.5-58.el5_6.4.x86_64.rpm', u'epoch': u'0', u'version': u'2.5', u'release': u'58.el5_6.4', u'arch': u'x86_64'}, {u'src': None, u'name': u'glibc-common', u'sum': [u'md5', u'270018aed4203f5017dc18fce3fe0c1c'], u'filename': u'glibc-common-2.5-58.el5_6.4.x86_64.rpm', u'epoch': u'0', u'version': u'2.5', u'release': u'58.el5_6.4', u'arch': u'x86_64'}, {u'src': None, u'name': u'glibc-devel', u'sum': [u'md5', u'bac16d0b32a27ce05c5f941deaaaf619'], u'filename': u'glibc-devel-2.5-58.el5_6.4.i386.rpm', u'epoch': u'0', u'version': u'2.5', u'release': u'58.el5_6.4', u'arch': u'i386'}, {u'src': None, u'name': u'glibc-devel', u'sum': [u'md5', u'9b4c2dcde6726070aab271669d5feecb'], u'filename': u'glibc-devel-2.5-58.el5_6.4.x86_64.rpm', u'epoch': u'0', u'version': u'2.5', u'release': u'58.el5_6.4', u'arch': u'x86_64'}, {u'src': None, u'name': u'glibc-headers', u'sum': [u'md5', u'75b1eab559ee5a4e123b8685b609d0e5'], u'filename': u'glibc-headers-2.5-58.el5_6.4.x86_64.rpm', u'epoch': u'0', u'version': u'2.5', u'release': u'58.el5_6.4', u'arch': u'x86_64'}, {u'src': None, u'name': u'glibc-utils', u'sum': [u'md5', u'7438a17ae71231f7d1770b98a0cd145f'], u'filename': u'glibc-utils-2.5-58.el5_6.4.x86_64.rpm', u'epoch': u'0', u'version': u'2.5', u'release': u'58.el5_6.4', u'arch': u'x86_64'}, {u'src': None, u'name': u'nscd', u'sum': [u'md5', u'79b6b67c0803d56c4821bef54ef901e0'], u'filename': u'nscd-2.5-58.el5_6.4.x86_64.rpm', u'epoch': u'0', u'version': u'2.5', u'release': u'58.el5_6.4', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u'\n[1.6.1-55.el5_6.2]\n- incorporate a fix to teach the file labeling bits about when replay caches\n are expunged (#714188)', u'issued': u'2011-06-27', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELBA-2011-0904.html', u'type': u'self', u'id': None, u'title': u'ELBA-2011-0904'}], u'_content_type_id': u'erratum', u'_id': u'2a61812d-53fe-45ca-8481-89f1e17a99ee', u'from': u'el-errata@oss.oracle.com', u'severity': u'', u'title': u'krb5 bug fix update', u'_ns': u'units_erratum', u'rights': u'Copyright 2011 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 5', u'reboot_suggested': False, u'type': u'bugfix', u'pkglist': [{u'packages': [{u'src': None, u'name': u'krb5', u'sum': [u'md5', u'ad5aa9c70734e694ed43e07c0670215e'], u'filename': u'krb5-1.6.1-55.el5_6.2.src.rpm', u'epoch': u'0', u'version': u'1.6.1', u'release': u'55.el5_6.2', u'arch': u'src'}, {u'src': None, u'name': u'krb5-devel', u'sum': [u'md5', u'0b8bfedf8ac7bfcf899862c4e299b456'], u'filename': u'krb5-devel-1.6.1-55.el5_6.2.i386.rpm', u'epoch': u'0', u'version': u'1.6.1', u'release': u'55.el5_6.2', u'arch': u'i386'}, {u'src': None, u'name': u'krb5-devel', u'sum': [u'md5', u'35e869dc1a1586f68808346cb6257027'], u'filename': u'krb5-devel-1.6.1-55.el5_6.2.x86_64.rpm', u'epoch': u'0', u'version': u'1.6.1', u'release': u'55.el5_6.2', u'arch': u'x86_64'}, {u'src': None, u'name': u'krb5-libs', u'sum': [u'md5', u'5ac266127cd0050ca0f33c778320bd41'], u'filename': u'krb5-libs-1.6.1-55.el5_6.2.i386.rpm', u'epoch': u'0', u'version': u'1.6.1', u'release': u'55.el5_6.2', u'arch': u'i386'}, {u'src': None, u'name': u'krb5-libs', u'sum': [u'md5', u'436d18f329236101768ee8ee46affb44'], u'filename': u'krb5-libs-1.6.1-55.el5_6.2.x86_64.rpm', u'epoch': u'0', u'version': u'1.6.1', u'release': u'55.el5_6.2', u'arch': u'x86_64'}, {u'src': None, u'name': u'krb5-server', u'sum': [u'md5', u'3214b1f8403e388224b65e3ac106930a'], u'filename': u'krb5-server-1.6.1-55.el5_6.2.x86_64.rpm', u'epoch': u'0', u'version': u'1.6.1', u'release': u'55.el5_6.2', u'arch': u'x86_64'}, {u'src': None, u'name': u'krb5-server-ldap', u'sum': [u'md5', u'cfd9ed1ef3030149cce3a427ad9e85cb'], u'filename': u'krb5-server-ldap-1.6.1-55.el5_6.2.x86_64.rpm', u'epoch': u'0', u'version': u'1.6.1', u'release': u'55.el5_6.2', u'arch': u'x86_64'}, {u'src': None, u'name': u'krb5-workstation', u'sum': [u'md5', u'1483dbdcd8fa388681e5b9cccce4fe75'], u'filename': u'krb5-workstation-1.6.1-55.el5_6.2.x86_64.rpm', u'epoch': u'0', u'version': u'1.6.1', u'release': u'55.el5_6.2', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u'\n[3:1.19-12.el5_6.1]\n- Set fastest server check interval back to 15 min - removed chunk from\n log-binds.patch\n Resolves: #714028', u'issued': u'2011-06-29', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELBA-2011-0912.html', u'type': u'self', u'id': None, u'title': u'ELBA-2011-0912'}], u'_content_type_id': u'erratum', u'_id': u'f4cc30bc-7c65-48d0-9917-11aad25bf7b6', u'from': u'el-errata@oss.oracle.com', u'severity': u'', u'title': u'ypbind bug fix update', u'_ns': u'units_erratum', u'rights': u'Copyright 2011 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 5', u'reboot_suggested': False, u'type': u'bugfix', u'pkglist': [{u'packages': [{u'src': None, u'name': u'ypbind', u'sum': [u'md5', u'055285ca4bf2502de0851d3c9bb5ebcb'], u'filename': u'ypbind-1.19-12.el5_6.1.src.rpm', u'epoch': u'3', u'version': u'1.19', u'release': u'12.el5_6.1', u'arch': u'src'}, {u'src': None, u'name': u'ypbind', u'sum': [u'md5', u'9478ddb682ff39308de5324d391427be'], u'filename': u'ypbind-1.19-12.el5_6.1.x86_64.rpm', u'epoch': u'3', u'version': u'1.19', u'release': u'12.el5_6.1', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u'\n[7:3.5.4-13.1]\n- Resolves: #715389, remote Desktop in KDE (krfb) crashes upon disconnect from remote VNC client\n\n[7:3.5.4-11.2]\n- revert CVE-2011-0904 and CVE-2011-0905 patch because libvncserver is not\n vulnerable\n\n[7:3.5.4-11.1]\n- rebase the patch for CVE-2011-0904, CVE-2011-0905, buffer overflow flaw in libvncserver\n\n[7:3.5.4-10.1]\n- fix CVE-2011-0904, CVE-2011-0905, buffer overflow flaw in libvncserver', u'issued': u'2011-06-30', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELBA-2011-0913.html', u'type': u'self', u'id': None, u'title': u'ELBA-2011-0913'}], u'_content_type_id': u'erratum', u'_id': u'1c44fb27-961b-42db-9a3e-7fab634e093f', u'from': u'el-errata@oss.oracle.com', u'severity': u'', u'title': u'kdenetwork bug fix update', u'_ns': u'units_erratum', u'rights': u'Copyright 2011 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 5', u'reboot_suggested': False, u'type': u'bugfix', u'pkglist': [{u'packages': [{u'src': None, u'name': u'kdenetwork', u'sum': [u'md5', u'73c76f8603e2054fe7ca9ad8641f3e39'], u'filename': u'kdenetwork-3.5.4-13.el5_6.1.i386.rpm', u'epoch': u'7', u'version': u'3.5.4', u'release': u'13.el5_6.1', u'arch': u'i386'}, {u'src': None, u'name': u'kdenetwork', u'sum': [u'md5', u'e63083010bd0468e9afdf3345b63edc2'], u'filename': u'kdenetwork-3.5.4-13.el5_6.1.src.rpm', u'epoch': u'7', u'version': u'3.5.4', u'release': u'13.el5_6.1', u'arch': u'src'}, {u'src': None, u'name': u'kdenetwork', u'sum': [u'md5', u'64b3484cfa79b60dc8c027f8388758b5'], u'filename': u'kdenetwork-3.5.4-13.el5_6.1.x86_64.rpm', u'epoch': u'7', u'version': u'3.5.4', u'release': u'13.el5_6.1', u'arch': u'x86_64'}, {u'src': None, u'name': u'kdenetwork-devel', u'sum': [u'md5', u'65a9cdd57e934678829e2cb2e099a0ee'], u'filename': u'kdenetwork-devel-3.5.4-13.el5_6.1.i386.rpm', u'epoch': u'7', u'version': u'3.5.4', u'release': u'13.el5_6.1', u'arch': u'i386'}, {u'src': None, u'name': u'kdenetwork-devel', u'sum': [u'md5', u'cf344b7bec0768dcb983c11d51247133'], u'filename': u'kdenetwork-devel-3.5.4-13.el5_6.1.x86_64.rpm', u'epoch': u'7', u'version': u'3.5.4', u'release': u'13.el5_6.1', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u'\n[5.5.23-0jpp.19]\n- Resolves: rhbz 717456, rhbz 717459\n\n[5.5.23-0jpp.18]\n- Resolves: rhbz 717457 - tomcat5 NPE on start ', u'issued': u'2011-07-20', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELBA-2011-0954.html', u'type': u'self', u'id': None, u'title': u'ELBA-2011-0954'}], u'_content_type_id': u'erratum', u'_id': u'18ec1f0f-957d-46ac-978c-66fc6b8d7992', u'from': u'el-errata@oss.oracle.com', u'severity': u'', u'title': u'tomcat5 bug fix update', u'_ns': u'units_erratum', u'rights': u'Copyright 2011 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 5', u'reboot_suggested': False, u'type': u'bugfix', u'pkglist': [{u'packages': [{u'src': None, u'name': u'tomcat5', u'sum': [u'md5', u'152f2be2712db83a2a60b8df4cf7d023'], u'filename': u'tomcat5-5.5.23-0jpp.19.el5_6.src.rpm', u'epoch': u'0', u'version': u'5.5.23', u'release': u'0jpp.19.el5_6', u'arch': u'src'}, {u'src': None, u'name': u'tomcat5', u'sum': [u'md5', u'dd765384879934d2d4dbf4d09d75311e'], u'filename': u'tomcat5-5.5.23-0jpp.19.el5_6.x86_64.rpm', u'epoch': u'0', u'version': u'5.5.23', u'release': u'0jpp.19.el5_6', u'arch': u'x86_64'}, {u'src': None, u'name': u'tomcat5-admin-webapps', u'sum': [u'md5', u'2be1f1556a28771cb5914640863543dc'], u'filename': u'tomcat5-admin-webapps-5.5.23-0jpp.19.el5_6.x86_64.rpm', u'epoch': u'0', u'version': u'5.5.23', u'release': u'0jpp.19.el5_6', u'arch': u'x86_64'}, {u'src': None, u'name': u'tomcat5-common-lib', u'sum': [u'md5', u'3d43a79cf71d46dcf43c0fed60c163ca'], u'filename': u'tomcat5-common-lib-5.5.23-0jpp.19.el5_6.x86_64.rpm', u'epoch': u'0', u'version': u'5.5.23', u'release': u'0jpp.19.el5_6', u'arch': u'x86_64'}, {u'src': None, u'name': u'tomcat5-jasper', u'sum': [u'md5', u'23ae45f6def2098ffc3c1d1f676f6c57'], u'filename': u'tomcat5-jasper-5.5.23-0jpp.19.el5_6.x86_64.rpm', u'epoch': u'0', u'version': u'5.5.23', u'release': u'0jpp.19.el5_6', u'arch': u'x86_64'}, {u'src': None, u'name': u'tomcat5-jasper-javadoc', u'sum': [u'md5', u'2e68e3d5a60e669c4d32b1d5dc352e52'], u'filename': u'tomcat5-jasper-javadoc-5.5.23-0jpp.19.el5_6.x86_64.rpm', u'epoch': u'0', u'version': u'5.5.23', u'release': u'0jpp.19.el5_6', u'arch': u'x86_64'}, {u'src': None, u'name': u'tomcat5-jsp-2.0-api', u'sum': [u'md5', u'da3c36b9d7cb447bb4a2b869709eeef4'], u'filename': u'tomcat5-jsp-2.0-api-5.5.23-0jpp.19.el5_6.x86_64.rpm', u'epoch': u'0', u'version': u'5.5.23', u'release': u'0jpp.19.el5_6', u'arch': u'x86_64'}, {u'src': None, u'name': u'tomcat5-jsp-2.0-api-javadoc', u'sum': [u'md5', u'0d508b5cfc8673a07ae9a58fbd8fa3f8'], u'filename': u'tomcat5-jsp-2.0-api-javadoc-5.5.23-0jpp.19.el5_6.x86_64.rpm', u'epoch': u'0', u'version': u'5.5.23', u'release': u'0jpp.19.el5_6', u'arch': u'x86_64'}, {u'src': None, u'name': u'tomcat5-server-lib', u'sum': [u'md5', u'99a03daf64f8bd74fdcd2c03d878a858'], u'filename': u'tomcat5-server-lib-5.5.23-0jpp.19.el5_6.x86_64.rpm', u'epoch': u'0', u'version': u'5.5.23', u'release': u'0jpp.19.el5_6', u'arch': u'x86_64'}, {u'src': None, u'name': u'tomcat5-servlet-2.4-api', u'sum': [u'md5', u'6047bde677b7de80b5c35b04e280fed0'], u'filename': u'tomcat5-servlet-2.4-api-5.5.23-0jpp.19.el5_6.x86_64.rpm', u'epoch': u'0', u'version': u'5.5.23', u'release': u'0jpp.19.el5_6', u'arch': u'x86_64'}, {u'src': None, u'name': u'tomcat5-servlet-2.4-api-javadoc', u'sum': [u'md5', u'9e561320a65b52d92019d860eae4c38f'], u'filename': u'tomcat5-servlet-2.4-api-javadoc-5.5.23-0jpp.19.el5_6.x86_64.rpm', u'epoch': u'0', u'version': u'5.5.23', u'release': u'0jpp.19.el5_6', u'arch': u'x86_64'}, {u'src': None, u'name': u'tomcat5-webapps', u'sum': [u'md5', u'955c213d416be26df3af12e4b474a0cf'], u'filename': u'tomcat5-webapps-5.5.23-0jpp.19.el5_6.x86_64.rpm', u'epoch': u'0', u'version': u'5.5.23', u'release': u'0jpp.19.el5_6', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u'\n[2.3.1-5.dist.2]\n- fixed crash when destroying a torn-off menu with a submenu mapped (mzbz#1535)\n (rhbz#712073)', u'issued': u'2011-07-20', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELBA-2011-0964.html', u'type': u'self', u'id': None, u'title': u'ELBA-2011-0964'}], u'_content_type_id': u'erratum', u'_id': u'1f959f27-4495-4d92-a66c-dbe2dfe7d64a', u'from': u'el-errata@oss.oracle.com', u'severity': u'', u'title': u'openmotif bug fix update', u'_ns': u'units_erratum', u'rights': u'Copyright 2011 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 5', u'reboot_suggested': False, u'type': u'bugfix', u'pkglist': [{u'packages': [{u'src': None, u'name': u'openmotif', u'sum': [u'md5', u'4fe94f28f67888c425fcd74672d73f2e'], u'filename': u'openmotif-2.3.1-5.el5_6.2.i386.rpm', u'epoch': u'0', u'version': u'2.3.1', u'release': u'5.el5_6.2', u'arch': u'i386'}, {u'src': None, u'name': u'openmotif', u'sum': [u'md5', u'a5e7a5147d507816db7f20e8b5e38dbe'], u'filename': u'openmotif-2.3.1-5.el5_6.2.src.rpm', u'epoch': u'0', u'version': u'2.3.1', u'release': u'5.el5_6.2', u'arch': u'src'}, {u'src': None, u'name': u'openmotif', u'sum': [u'md5', u'a5d5ec1fad288f89253af4c5ce1e2755'], u'filename': u'openmotif-2.3.1-5.el5_6.2.x86_64.rpm', u'epoch': u'0', u'version': u'2.3.1', u'release': u'5.el5_6.2', u'arch': u'x86_64'}, {u'src': None, u'name': u'openmotif-devel', u'sum': [u'md5', u'b203157568d8f81b2823b9f42f13f19e'], u'filename': u'openmotif-devel-2.3.1-5.el5_6.2.i386.rpm', u'epoch': u'0', u'version': u'2.3.1', u'release': u'5.el5_6.2', u'arch': u'i386'}, {u'src': None, u'name': u'openmotif-devel', u'sum': [u'md5', u'56554bb7bd932bcdc29a6215fd539dba'], u'filename': u'openmotif-devel-2.3.1-5.el5_6.2.x86_64.rpm', u'epoch': u'0', u'version': u'2.3.1', u'release': u'5.el5_6.2', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u'\n[2.16.0-5.3.1]\n- Proxy fixes, patch by\n Behdad Esfahbod <besfahbo@redhat.com>\n and\n Olivier Fourdan <ofourdan@redhat.com>\n Resolves: #719399 ', u'issued': u'2011-07-20', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELBA-2011-1082.html', u'type': u'self', u'id': None, u'title': u'ELBA-2011-1082'}], u'_content_type_id': u'erratum', u'_id': u'bcafd078-a3c4-460f-9f0d-ae9601c8872c', u'from': u'el-errata@oss.oracle.com', u'severity': u'', u'title': u'gnome-terminal bug fix update', u'_ns': u'units_erratum', u'rights': u'Copyright 2011 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 5', u'reboot_suggested': False, u'type': u'bugfix', u'pkglist': [{u'packages': [{u'src': None, u'name': u'gnome-terminal', u'sum': [u'md5', u'352b8942e52ef9d8657e964abf790e52'], u'filename': u'gnome-terminal-2.16.0-5.3.el5_6.1.src.rpm', u'epoch': u'0', u'version': u'2.16.0', u'release': u'5.3.el5_6.1', u'arch': u'src'}, {u'src': None, u'name': u'gnome-terminal', u'sum': [u'md5', u'ef3030cc65025da0e2ac0a10f09d57d9'], u'filename': u'gnome-terminal-2.16.0-5.3.el5_6.1.x86_64.rpm', u'epoch': u'0', u'version': u'2.16.0', u'release': u'5.3.el5_6.1', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u'\n[2.0.16-11.el5.2]\n- rebuilt for 5.7.z\n\n[2.0.16-11.el5.1]\n- ipmitool: disabled automatic bridging of SDR readings to IPMB\n (#722462)', u'issued': u'2011-08-01', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELBA-2011-1107.html', u'type': u'self', u'id': None, u'title': u'ELBA-2011-1107'}], u'_content_type_id': u'erratum', u'_id': u'aebca001-2d5c-4503-b53e-d8350faa0e17', u'from': u'el-errata@oss.oracle.com', u'severity': u'', u'title': u'OpenIPMI bug fix update', u'_ns': u'units_erratum', u'rights': u'Copyright 2011 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 5', u'reboot_suggested': False, u'type': u'bugfix', u'pkglist': [{u'packages': [{u'src': None, u'name': u'OpenIPMI', u'sum': [u'md5', u'ac4a5b659748972f68766b3206f51d7c'], u'filename': u'OpenIPMI-2.0.16-11.el5_7.2.src.rpm', u'epoch': u'0', u'version': u'2.0.16', u'release': u'11.el5_7.2', u'arch': u'src'}, {u'src': None, u'name': u'OpenIPMI', u'sum': [u'md5', u'9876f993541d67ed9b0a16fb3531a439'], u'filename': u'OpenIPMI-2.0.16-11.el5_7.2.x86_64.rpm', u'epoch': u'0', u'version': u'2.0.16', u'release': u'11.el5_7.2', u'arch': u'x86_64'}, {u'src': None, u'name': u'OpenIPMI-devel', u'sum': [u'md5', u'a53c35cf8934c6ee1563d48b0496dcd3'], u'filename': u'OpenIPMI-devel-2.0.16-11.el5_7.2.i386.rpm', u'epoch': u'0', u'version': u'2.0.16', u'release': u'11.el5_7.2', u'arch': u'i386'}, {u'src': None, u'name': u'OpenIPMI-devel', u'sum': [u'md5', u'51e2c81d0d70dd1f66c1099ea177aa25'], u'filename': u'OpenIPMI-devel-2.0.16-11.el5_7.2.x86_64.rpm', u'epoch': u'0', u'version': u'2.0.16', u'release': u'11.el5_7.2', u'arch': u'x86_64'}, {u'src': None, u'name': u'OpenIPMI-gui', u'sum': [u'md5', u'9c4c29edb661696c8615aae98ef62ae6'], u'filename': u'OpenIPMI-gui-2.0.16-11.el5_7.2.x86_64.rpm', u'epoch': u'0', u'version': u'2.0.16', u'release': u'11.el5_7.2', u'arch': u'x86_64'}, {u'src': None, u'name': u'OpenIPMI-libs', u'sum': [u'md5', u'21b0e2d5d7d60b16574fb4a6cc4ae566'], u'filename': u'OpenIPMI-libs-2.0.16-11.el5_7.2.i386.rpm', u'epoch': u'0', u'version': u'2.0.16', u'release': u'11.el5_7.2', u'arch': u'i386'}, {u'src': None, u'name': u'OpenIPMI-libs', u'sum': [u'md5', u'a2eb880433af78e1b9a02c194b91bb17'], u'filename': u'OpenIPMI-libs-2.0.16-11.el5_7.2.x86_64.rpm', u'epoch': u'0', u'version': u'2.0.16', u'release': u'11.el5_7.2', u'arch': u'x86_64'}, {u'src': None, u'name': u'OpenIPMI-perl', u'sum': [u'md5', u'af962cf6039d8c3a2c163478571e819b'], u'filename': u'OpenIPMI-perl-2.0.16-11.el5_7.2.x86_64.rpm', u'epoch': u'0', u'version': u'2.0.16', u'release': u'11.el5_7.2', u'arch': u'x86_64'}, {u'src': None, u'name': u'OpenIPMI-python', u'sum': [u'md5', u'a3a89b55c2add3045020ff5e77843c79'], u'filename': u'OpenIPMI-python-2.0.16-11.el5_7.2.x86_64.rpm', u'epoch': u'0', u'version': u'2.0.16', u'release': u'11.el5_7.2', u'arch': u'x86_64'}, {u'src': None, u'name': u'OpenIPMI-tools', u'sum': [u'md5', u'60ac3647f28d268625a3ce77ee1d79c3'], u'filename': u'OpenIPMI-tools-2.0.16-11.el5_7.2.x86_64.rpm', u'epoch': u'0', u'version': u'2.0.16', u'release': u'11.el5_7.2', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u'\n[3.0.6-4.1]\n- fix #726060 - fixed free-hostnames patch', u'issued': u'2011-08-02', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELBA-2011-1112.html', u'type': u'self', u'id': None, u'title': u'ELBA-2011-1112'}], u'_content_type_id': u'erratum', u'_id': u'03ece2fa-3753-4ea5-8c3f-a8b83f7565d4', u'from': u'el-errata@oss.oracle.com', u'severity': u'', u'title': u'rsync bug fix update', u'_ns': u'units_erratum', u'rights': u'Copyright 2011 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 5', u'reboot_suggested': False, u'type': u'bugfix', u'pkglist': [{u'packages': [{u'src': None, u'name': u'rsync', u'sum': [u'md5', u'8af95e4af09430d3c637de4bd8d0706a'], u'filename': u'rsync-3.0.6-4.el5_7.1.src.rpm', u'epoch': u'0', u'version': u'3.0.6', u'release': u'4.el5_7.1', u'arch': u'src'}, {u'src': None, u'name': u'rsync', u'sum': [u'md5', u'8f3a04aa3152da54f09f6ecf163af760'], u'filename': u'rsync-3.0.6-4.el5_7.1.x86_64.rpm', u'epoch': u'0', u'version': u'3.0.6', u'release': u'4.el5_7.1', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u'\n[8.13.8-8.1]\n- fix MAXHOSTNAMELEN for FQDN\n Resolves: rhbz#726094', u'issued': u'2011-08-08', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELBA-2011-1127.html', u'type': u'self', u'id': None, u'title': u'ELBA-2011-1127'}], u'_content_type_id': u'erratum', u'_id': u'5555874b-07ad-4e77-9a9b-901087425723', u'from': u'el-errata@oss.oracle.com', u'severity': u'', u'title': u'sendmail bug fix update', u'_ns': u'units_erratum', u'rights': u'Copyright 2011 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 5', u'reboot_suggested': False, u'type': u'bugfix', u'pkglist': [{u'packages': [{u'src': None, u'name': u'sendmail', u'sum': [u'md5', u'b9b8afa0c7df5eaa1dc2e12314e5b943'], u'filename': u'sendmail-8.13.8-8.1.el5_7.src.rpm', u'epoch': u'0', u'version': u'8.13.8', u'release': u'8.1.el5_7', u'arch': u'src'}, {u'src': None, u'name': u'sendmail', u'sum': [u'md5', u'b24d6f9f50639fb70394e86fcff20cc1'], u'filename': u'sendmail-8.13.8-8.1.el5_7.x86_64.rpm', u'epoch': u'0', u'version': u'8.13.8', u'release': u'8.1.el5_7', u'arch': u'x86_64'}, {u'src': None, u'name': u'sendmail-cf', u'sum': [u'md5', u'f2c3578193f121cdcc318391fb18cab1'], u'filename': u'sendmail-cf-8.13.8-8.1.el5_7.x86_64.rpm', u'epoch': u'0', u'version': u'8.13.8', u'release': u'8.1.el5_7', u'arch': u'x86_64'}, {u'src': None, u'name': u'sendmail-devel', u'sum': [u'md5', u'e6f2a53617913eb59bc23e61616200fe'], u'filename': u'sendmail-devel-8.13.8-8.1.el5_7.i386.rpm', u'epoch': u'0', u'version': u'8.13.8', u'release': u'8.1.el5_7', u'arch': u'i386'}, {u'src': None, u'name': u'sendmail-devel', u'sum': [u'md5', u'52ca70a6e7057364bdc3745a0c17d4e4'], u'filename': u'sendmail-devel-8.13.8-8.1.el5_7.x86_64.rpm', u'epoch': u'0', u'version': u'8.13.8', u'release': u'8.1.el5_7', u'arch': u'x86_64'}, {u'src': None, u'name': u'sendmail-doc', u'sum': [u'md5', u'3a52bc9d93c0d3ec526f92d1dab85a0b'], u'filename': u'sendmail-doc-8.13.8-8.1.el5_7.x86_64.rpm', u'epoch': u'0', u'version': u'8.13.8', u'release': u'8.1.el5_7', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u'\n[7.0.1-37.el5_7.1]\n- [vla] Fix regression on fields of structs in internal vars (BZ 728151).\n- archer-jankratochvil-fedora12 commit: 6e73988f653ba986e8742f208f17ec084292cbd5\n- Adjust the %{dist} check for .el5_7.', u'issued': u'2011-08-08', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELBA-2011-1129.html', u'type': u'self', u'id': None, u'title': u'ELBA-2011-1129'}], u'_content_type_id': u'erratum', u'_id': u'fc9edfdf-e09c-41fd-9889-4a197b892db9', u'from': u'el-errata@oss.oracle.com', u'severity': u'', u'title': u'gdb bug fix update', u'_ns': u'units_erratum', u'rights': u'Copyright 2011 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 5', u'reboot_suggested': False, u'type': u'bugfix', u'pkglist': [{u'packages': [{u'src': None, u'name': u'gdb', u'sum': [u'md5', u'3f2be75fb09a26ac0e8121f2cb53f81e'], u'filename': u'gdb-7.0.1-37.el5_7.1.src.rpm', u'epoch': u'0', u'version': u'7.0.1', u'release': u'37.el5_7.1', u'arch': u'src'}, {u'src': None, u'name': u'gdb', u'sum': [u'md5', u'fd175a13051902fd9bc0573ac373313e'], u'filename': u'gdb-7.0.1-37.el5_7.1.x86_64.rpm', u'epoch': u'0', u'version': u'7.0.1', u'release': u'37.el5_7.1', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u'\n[1.33.1-10.2]\n- Build with -fno-strict-aliasing due to the sheer amount of warnings\n that we get.\n- Related: #727895\n\n[1.33.1-10.1]\n- Add a fix for thread safety bug in boost::regex\n- Resolves: #727895', u'issued': u'2011-08-11', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELBA-2011-1149.html', u'type': u'self', u'id': None, u'title': u'ELBA-2011-1149'}], u'_content_type_id': u'erratum', u'_id': u'0eded34e-4096-4396-9119-eff1d41fd518', u'from': u'el-errata@oss.oracle.com', u'severity': u'', u'title': u'boost bug fix update', u'_ns': u'units_erratum', u'rights': u'Copyright 2011 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 5', u'reboot_suggested': False, u'type': u'bugfix', u'pkglist': [{u'packages': [{u'src': None, u'name': u'boost', u'sum': [u'md5', u'8a605fac3918067fb5a6ef866c3e52ef'], u'filename': u'boost-1.33.1-10.el5_7.2.i386.rpm', u'epoch': u'0', u'version': u'1.33.1', u'release': u'10.el5_7.2', u'arch': u'i386'}, {u'src': None, u'name': u'boost', u'sum': [u'md5', u'b9836626f7408833c9285d4cca14b21f'], u'filename': u'boost-1.33.1-10.el5_7.2.src.rpm', u'epoch': u'0', u'version': u'1.33.1', u'release': u'10.el5_7.2', u'arch': u'src'}, {u'src': None, u'name': u'boost', u'sum': [u'md5', u'c84d59c0e7c4864572fe1ebe0a387118'], u'filename': u'boost-1.33.1-10.el5_7.2.x86_64.rpm', u'epoch': u'0', u'version': u'1.33.1', u'release': u'10.el5_7.2', u'arch': u'x86_64'}, {u'src': None, u'name': u'boost-devel', u'sum': [u'md5', u'c91c13b32176eb969bd0cc749a0243d1'], u'filename': u'boost-devel-1.33.1-10.el5_7.2.i386.rpm', u'epoch': u'0', u'version': u'1.33.1', u'release': u'10.el5_7.2', u'arch': u'i386'}, {u'src': None, u'name': u'boost-devel', u'sum': [u'md5', u'7bac9a757c186809493477d5eb0f7994'], u'filename': u'boost-devel-1.33.1-10.el5_7.2.x86_64.rpm', u'epoch': u'0', u'version': u'1.33.1', u'release': u'10.el5_7.2', u'arch': u'x86_64'}, {u'src': None, u'name': u'boost-doc', u'sum': [u'md5', u'4124ec0bf3e79cecf13376ae4fdf556e'], u'filename': u'boost-doc-1.33.1-10.el5_7.2.x86_64.rpm', u'epoch': u'0', u'version': u'1.33.1', u'release': u'10.el5_7.2', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u'\n[0.4.7-46.el5.1]\n- Added bz728144_cciss_mp_test_fix.patch\n- Resolves: bz#728144', u'issued': u'2011-08-11', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELBA-2011-1152.html', u'type': u'self', u'id': None, u'title': u'ELBA-2011-1152'}], u'_content_type_id': u'erratum', u'_id': u'4906179d-8796-4a1a-b08e-aede6bf3357e', u'from': u'el-errata@oss.oracle.com', u'severity': u'', u'title': u'device-mapper-multipath bug fix update', u'_ns': u'units_erratum', u'rights': u'Copyright 2011 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 5', u'reboot_suggested': False, u'type': u'bugfix', u'pkglist': [{u'packages': [{u'src': None, u'name': u'device-mapper-multipath', u'sum': [u'md5', u'f263af1e0bbffb3b2dc9146874abae66'], u'filename': u'device-mapper-multipath-0.4.7-46.el5_7.1.src.rpm', u'epoch': u'0', u'version': u'0.4.7', u'release': u'46.el5_7.1', u'arch': u'src'}, {u'src': None, u'name': u'device-mapper-multipath', u'sum': [u'md5', u'ffdd5733151fd8a62d92149da7eb48ad'], u'filename': u'device-mapper-multipath-0.4.7-46.el5_7.1.x86_64.rpm', u'epoch': u'0', u'version': u'0.4.7', u'release': u'46.el5_7.1', u'arch': u'x86_64'}, {u'src': None, u'name': u'kpartx', u'sum': [u'md5', u'15622ddace189eb5b2c953de55f28899'], u'filename': u'kpartx-0.4.7-46.el5_7.1.x86_64.rpm', u'epoch': u'0', u'version': u'0.4.7', u'release': u'46.el5_7.1', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u'\n[7.15.5-9.el5_7.4]\n- add a new option CURLOPT_GSSAPI_DELEGATION (#727884)', u'issued': u'2011-08-19', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELBA-2011-1188.html', u'type': u'self', u'id': None, u'title': u'ELBA-2011-1188'}], u'_content_type_id': u'erratum', u'_id': u'c93ace9c-8362-4696-a08f-2d35d7af5d30', u'from': u'el-errata@oss.oracle.com', u'severity': u'', u'title': u'curl bug fix update', u'_ns': u'units_erratum', u'rights': u'Copyright 2011 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 5', u'reboot_suggested': False, u'type': u'bugfix', u'pkglist': [{u'packages': [{u'src': None, u'name': u'curl', u'sum': [u'md5', u'05d4e0e75a488e4ba08a3802c4d57f50'], u'filename': u'curl-7.15.5-9.el5_7.4.i386.rpm', u'epoch': u'0', u'version': u'7.15.5', u'release': u'9.el5_7.4', u'arch': u'i386'}, {u'src': None, u'name': u'curl', u'sum': [u'md5', u'db9e01a0613f9845e9d72ce9ca0426d8'], u'filename': u'curl-7.15.5-9.el5_7.4.src.rpm', u'epoch': u'0', u'version': u'7.15.5', u'release': u'9.el5_7.4', u'arch': u'src'}, {u'src': None, u'name': u'curl', u'sum': [u'md5', u'620819e48fb0704743fc8b4ac9ea2aee'], u'filename': u'curl-7.15.5-9.el5_7.4.x86_64.rpm', u'epoch': u'0', u'version': u'7.15.5', u'release': u'9.el5_7.4', u'arch': u'x86_64'}, {u'src': None, u'name': u'curl-devel', u'sum': [u'md5', u'36724130dcf67f218373358035b0868d'], u'filename': u'curl-devel-7.15.5-9.el5_7.4.i386.rpm', u'epoch': u'0', u'version': u'7.15.5', u'release': u'9.el5_7.4', u'arch': u'i386'}, {u'src': None, u'name': u'curl-devel', u'sum': [u'md5', u'a3a81bf34edeb5a969b86d876a3fea16'], u'filename': u'curl-devel-7.15.5-9.el5_7.4.x86_64.rpm', u'epoch': u'0', u'version': u'7.15.5', u'release': u'9.el5_7.4', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u'\n[0.17-26.1]\n- fix for #729306 - byte order bug', u'issued': u'2011-08-22', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELBA-2011-1190.html', u'type': u'self', u'id': None, u'title': u'ELBA-2011-1190'}], u'_content_type_id': u'erratum', u'_id': u'3e39b54e-2311-48e6-8df5-0863b537c461', u'from': u'el-errata@oss.oracle.com', u'severity': u'', u'title': u'bootparamd bug fix update', u'_ns': u'units_erratum', u'rights': u'Copyright 2011 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 5', u'reboot_suggested': False, u'type': u'bugfix', u'pkglist': [{u'packages': [{u'src': None, u'name': u'bootparamd', u'sum': [u'md5', u'41a151db3e6b735f7e4b19cd32dbb22d'], u'filename': u'bootparamd-0.17-26.el5_7.1.src.rpm', u'epoch': u'0', u'version': u'0.17', u'release': u'26.el5_7.1', u'arch': u'src'}, {u'src': None, u'name': u'bootparamd', u'sum': [u'md5', u'6a22a415c126c77da4a87e9a296e809c'], u'filename': u'bootparamd-0.17-26.el5_7.1.x86_64.rpm', u'epoch': u'0', u'version': u'0.17', u'release': u'26.el5_7.1', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u'\n[4.3p2-72.5]\n- enable pubkey auth in the fips mode (#730652)', u'issued': u'2011-08-23', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELBA-2011-1195.html', u'type': u'self', u'id': None, u'title': u'ELBA-2011-1195'}], u'_content_type_id': u'erratum', u'_id': u'cd2d62a8-e900-49e3-a5c1-b025b25f4e83', u'from': u'el-errata@oss.oracle.com', u'severity': u'', u'title': u'openssh bug fix update', u'_ns': u'units_erratum', u'rights': u'Copyright 2011 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 5', u'reboot_suggested': False, u'type': u'bugfix', u'pkglist': [{u'packages': [{u'src': None, u'name': u'openssh', u'sum': [u'md5', u'3a3ef3275bf2f9c3099853c128a35055'], u'filename': u'openssh-4.3p2-72.el5_7.5.src.rpm', u'epoch': u'0', u'version': u'4.3p2', u'release': u'72.el5_7.5', u'arch': u'src'}, {u'src': None, u'name': u'openssh', u'sum': [u'md5', u'2bc67f16c1d0e6c2c8342f2caf8f0a1f'], u'filename': u'openssh-4.3p2-72.el5_7.5.x86_64.rpm', u'epoch': u'0', u'version': u'4.3p2', u'release': u'72.el5_7.5', u'arch': u'x86_64'}, {u'src': None, u'name': u'openssh-askpass', u'sum': [u'md5', u'e49f407251ee48c754372530123974c9'], u'filename': u'openssh-askpass-4.3p2-72.el5_7.5.x86_64.rpm', u'epoch': u'0', u'version': u'4.3p2', u'release': u'72.el5_7.5', u'arch': u'x86_64'}, {u'src': None, u'name': u'openssh-clients', u'sum': [u'md5', u'5b2e767763ad7603460cdc9944642577'], u'filename': u'openssh-clients-4.3p2-72.el5_7.5.x86_64.rpm', u'epoch': u'0', u'version': u'4.3p2', u'release': u'72.el5_7.5', u'arch': u'x86_64'}, {u'src': None, u'name': u'openssh-server', u'sum': [u'md5', u'bd11445e58c43a4da2e3ca78e26a7e27'], u'filename': u'openssh-server-4.3p2-72.el5_7.5.x86_64.rpm', u'epoch': u'0', u'version': u'4.3p2', u'release': u'72.el5_7.5', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u'\n[5.3.2.2-14.0.1.el5_7.1]\n- suppress spurious asserts on 32bit [Greg Marsden]\n\n[5.3.2.2-14.1]\n- fixed reporting of UCD-SNMP-MIB::dskPercentNode missing in previous\n release (#732943)', u'issued': u'2011-08-29', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELBA-2011-1216.html', u'type': u'self', u'id': None, u'title': u'ELBA-2011-1216'}], u'_content_type_id': u'erratum', u'_id': u'e142f3fd-d011-45c1-a5e4-d95608ca0dfe', u'from': u'el-errata@oss.oracle.com', u'severity': u'', u'title': u'net-snmp bug fix update', u'_ns': u'units_erratum', u'rights': u'Copyright 2011 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 5', u'reboot_suggested': False, u'type': u'bugfix', u'pkglist': [{u'packages': [{u'src': None, u'name': u'net-snmp', u'sum': [u'md5', u'3c6ea6b6ad50c25f5494a1c39ea1f4b7'], u'filename': u'net-snmp-5.3.2.2-14.0.1.el5_7.1.src.rpm', u'epoch': u'1', u'version': u'5.3.2.2', u'release': u'14.0.1.el5_7.1', u'arch': u'src'}, {u'src': None, u'name': u'net-snmp', u'sum': [u'md5', u'e1b1d6dcc3fe4c23dd2a2fd0044f0429'], u'filename': u'net-snmp-5.3.2.2-14.0.1.el5_7.1.x86_64.rpm', u'epoch': u'1', u'version': u'5.3.2.2', u'release': u'14.0.1.el5_7.1', u'arch': u'x86_64'}, {u'src': None, u'name': u'net-snmp-devel', u'sum': [u'md5', u'd8229007e0f849e1e10ace401cfd47be'], u'filename': u'net-snmp-devel-5.3.2.2-14.0.1.el5_7.1.i386.rpm', u'epoch': u'1', u'version': u'5.3.2.2', u'release': u'14.0.1.el5_7.1', u'arch': u'i386'}, {u'src': None, u'name': u'net-snmp-devel', u'sum': [u'md5', u'205c3d9655981f8dd0caf7a3ee4b3fd2'], u'filename': u'net-snmp-devel-5.3.2.2-14.0.1.el5_7.1.x86_64.rpm', u'epoch': u'1', u'version': u'5.3.2.2', u'release': u'14.0.1.el5_7.1', u'arch': u'x86_64'}, {u'src': None, u'name': u'net-snmp-libs', u'sum': [u'md5', u'3d981e1c3612554f209f89f441decc75'], u'filename': u'net-snmp-libs-5.3.2.2-14.0.1.el5_7.1.i386.rpm', u'epoch': u'1', u'version': u'5.3.2.2', u'release': u'14.0.1.el5_7.1', u'arch': u'i386'}, {u'src': None, u'name': u'net-snmp-libs', u'sum': [u'md5', u'89bea4e91ddfb9c8487657de352ac800'], u'filename': u'net-snmp-libs-5.3.2.2-14.0.1.el5_7.1.x86_64.rpm', u'epoch': u'1', u'version': u'5.3.2.2', u'release': u'14.0.1.el5_7.1', u'arch': u'x86_64'}, {u'src': None, u'name': u'net-snmp-perl', u'sum': [u'md5', u'6e170ad20f6ef4bf5bd3195d66a7a2ce'], u'filename': u'net-snmp-perl-5.3.2.2-14.0.1.el5_7.1.x86_64.rpm', u'epoch': u'1', u'version': u'5.3.2.2', u'release': u'14.0.1.el5_7.1', u'arch': u'x86_64'}, {u'src': None, u'name': u'net-snmp-utils', u'sum': [u'md5', u'042e3fdb75cdbedbf2d4655d0580cc88'], u'filename': u'net-snmp-utils-5.3.2.2-14.0.1.el5_7.1.x86_64.rpm', u'epoch': u'1', u'version': u'5.3.2.2', u'release': u'14.0.1.el5_7.1', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u'\n[2.02.84-6.0.1.el5_7.1]\n- disable lvconvert --merge option if snapshot-merge\n- target is missing (Herbert van den Bergh) [orabug 12315079]\n\n[2.02.84-6.el5_7.1]\n- Reject allocation if number of extents is not divisible by area count.\n Resolves: #732006', u'issued': u'2011-08-31', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELBA-2011-1222.html', u'type': u'self', u'id': None, u'title': u'ELBA-2011-1222'}], u'_content_type_id': u'erratum', u'_id': u'e18986a3-2d65-4a83-a1cb-6a4e39f8efff', u'from': u'el-errata@oss.oracle.com', u'severity': u'', u'title': u'lvm2 bug fix update', u'_ns': u'units_erratum', u'rights': u'Copyright 2011 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 5', u'reboot_suggested': False, u'type': u'bugfix', u'pkglist': [{u'packages': [{u'src': None, u'name': u'lvm2', u'sum': [u'md5', u'469fcb9ee6fdba2dacdabd01eddd76e1'], u'filename': u'lvm2-2.02.84-6.0.1.el5_7.1.src.rpm', u'epoch': u'0', u'version': u'2.02.84', u'release': u'6.0.1.el5_7.1', u'arch': u'src'}, {u'src': None, u'name': u'lvm2', u'sum': [u'md5', u'2699c2bbe9fd0ba34ce86ecbe2a3ab8d'], u'filename': u'lvm2-2.02.84-6.0.1.el5_7.1.x86_64.rpm', u'epoch': u'0', u'version': u'2.02.84', u'release': u'6.0.1.el5_7.1', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u'\n[0.42-1.1]\n- correct some build failures\n\n- backport support for enabling delegation of GSSAPI credentials when we\n use Negotiate authentication for XML-RPC (#729803), and backport the\n option for making the ipa-submit helper use the current ccache, which\n makes it easier to test', u'issued': u'2011-09-06', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELBA-2011-1238.html', u'type': u'self', u'id': None, u'title': u'ELBA-2011-1238'}], u'_content_type_id': u'erratum', u'_id': u'cca86d8e-91b0-4862-9721-00d1ef5524aa', u'from': u'el-errata@oss.oracle.com', u'severity': u'', u'title': u'certmonger bug fix update', u'_ns': u'units_erratum', u'rights': u'Copyright 2011 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 5', u'reboot_suggested': False, u'type': u'bugfix', u'pkglist': [{u'packages': [{u'src': None, u'name': u'certmonger', u'sum': [u'md5', u'2704943d78d36265fe085bd99c6eea17'], u'filename': u'certmonger-0.42-1.el5_7.1.src.rpm', u'epoch': u'0', u'version': u'0.42', u'release': u'1.el5_7.1', u'arch': u'src'}, {u'src': None, u'name': u'certmonger', u'sum': [u'md5', u'757a51d2617d57c3d255cfbb39bcd935'], u'filename': u'certmonger-0.42-1.el5_7.1.x86_64.rpm', u'epoch': u'0', u'version': u'0.42', u'release': u'1.el5_7.1', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u'\n[1.33.1-10.3]\n- Fix ABI breakage\n- Resolves: #733235', u'issued': u'2011-09-01', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELBA-2011-1246.html', u'type': u'self', u'id': None, u'title': u'ELBA-2011-1246'}], u'_content_type_id': u'erratum', u'_id': u'0a14b713-9681-4b73-a065-dfcb4c268362', u'from': u'el-errata@oss.oracle.com', u'severity': u'', u'title': u'boost bug fix update', u'_ns': u'units_erratum', u'rights': u'Copyright 2011 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 5', u'reboot_suggested': False, u'type': u'bugfix', u'pkglist': [{u'packages': [{u'src': None, u'name': u'boost', u'sum': [u'md5', u'305e70598da986c0ab5dd6ff74978a26'], u'filename': u'boost-1.33.1-10.el5_7.3.i386.rpm', u'epoch': u'0', u'version': u'1.33.1', u'release': u'10.el5_7.3', u'arch': u'i386'}, {u'src': None, u'name': u'boost', u'sum': [u'md5', u'c0ca3e0b6ffda4063c5cb14b52cda11a'], u'filename': u'boost-1.33.1-10.el5_7.3.src.rpm', u'epoch': u'0', u'version': u'1.33.1', u'release': u'10.el5_7.3', u'arch': u'src'}, {u'src': None, u'name': u'boost', u'sum': [u'md5', u'94b6b8710b2e6d4cc1dc0addbefb2e4b'], u'filename': u'boost-1.33.1-10.el5_7.3.x86_64.rpm', u'epoch': u'0', u'version': u'1.33.1', u'release': u'10.el5_7.3', u'arch': u'x86_64'}, {u'src': None, u'name': u'boost-devel', u'sum': [u'md5', u'0efe35cb1a919306fbb3ca1265f423c2'], u'filename': u'boost-devel-1.33.1-10.el5_7.3.i386.rpm', u'epoch': u'0', u'version': u'1.33.1', u'release': u'10.el5_7.3', u'arch': u'i386'}, {u'src': None, u'name': u'boost-devel', u'sum': [u'md5', u'19e55f7cd6945df83e72a841dd1617e3'], u'filename': u'boost-devel-1.33.1-10.el5_7.3.x86_64.rpm', u'epoch': u'0', u'version': u'1.33.1', u'release': u'10.el5_7.3', u'arch': u'x86_64'}, {u'src': None, u'name': u'boost-doc', u'sum': [u'md5', u'e8a72a51088ab72a532e2588f3f56ecc'], u'filename': u'boost-doc-1.33.1-10.el5_7.3.x86_64.rpm', u'epoch': u'0', u'version': u'1.33.1', u'release': u'10.el5_7.3', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u"\n[0.80.6-30.1]\n- Resolves: rhbz#726624\n- Add upstream revision 2177 - Revert 'totemsrp: Remove recv_flush code'", u'issued': u'2011-09-06', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELBA-2011-1262.html', u'type': u'self', u'id': None, u'title': u'ELBA-2011-1262'}], u'_content_type_id': u'erratum', u'_id': u'292e612f-b389-4f2b-8900-39925498f6fb', u'from': u'el-errata@oss.oracle.com', u'severity': u'', u'title': u'openais bug fix update', u'_ns': u'units_erratum', u'rights': u'Copyright 2011 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 5', u'reboot_suggested': False, u'type': u'bugfix', u'pkglist': [{u'packages': [{u'src': None, u'name': u'openais', u'sum': [u'md5', u'20bf3228d1bb9008b46a767213783d79'], u'filename': u'openais-0.80.6-30.el5_7.1.src.rpm', u'epoch': u'0', u'version': u'0.80.6', u'release': u'30.el5_7.1', u'arch': u'src'}, {u'src': None, u'name': u'openais', u'sum': [u'md5', u'24eb08d2f5845256448577fe4c67e69e'], u'filename': u'openais-0.80.6-30.el5_7.1.x86_64.rpm', u'epoch': u'0', u'version': u'0.80.6', u'release': u'30.el5_7.1', u'arch': u'x86_64'}, {u'src': None, u'name': u'openais-devel', u'sum': [u'md5', u'51b132191664bb91f2fa078375a2720c'], u'filename': u'openais-devel-0.80.6-30.el5_7.1.i386.rpm', u'epoch': u'0', u'version': u'0.80.6', u'release': u'30.el5_7.1', u'arch': u'i386'}, {u'src': None, u'name': u'openais-devel', u'sum': [u'md5', u'b92ce8c9fcb8a21521b9a4e6eaa229e2'], u'filename': u'openais-devel-0.80.6-30.el5_7.1.x86_64.rpm', u'epoch': u'0', u'version': u'0.80.6', u'release': u'30.el5_7.1', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u'\n[8.70-6:.3]\n- Fixed character spacing problems using backported patch (bug #688996).\n- Match landscape page sizes when writing PXL (bug #692165).', u'issued': u'2011-09-13', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELBA-2011-1286.html', u'type': u'self', u'id': None, u'title': u'ELBA-2011-1286'}], u'_content_type_id': u'erratum', u'_id': u'c85679eb-99b6-4cd4-99d7-3bb37dcc75ec', u'from': u'el-errata@oss.oracle.com', u'severity': u'', u'title': u'ghostscript bug fix update', u'_ns': u'units_erratum', u'rights': u'Copyright 2011 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 5', u'reboot_suggested': False, u'type': u'bugfix', u'pkglist': [{u'packages': [{u'src': None, u'name': u'ghostscript', u'sum': [u'md5', u'6a1904198020d5175838891693750334'], u'filename': u'ghostscript-8.70-6.el5_7.3.i386.rpm', u'epoch': u'0', u'version': u'8.70', u'release': u'6.el5_7.3', u'arch': u'i386'}, {u'src': None, u'name': u'ghostscript', u'sum': [u'md5', u'e805b2bf58922223307a5eaf682ddc37'], u'filename': u'ghostscript-8.70-6.el5_7.3.src.rpm', u'epoch': u'0', u'version': u'8.70', u'release': u'6.el5_7.3', u'arch': u'src'}, {u'src': None, u'name': u'ghostscript', u'sum': [u'md5', u'ff188f5ddd6a5d539ecedbf945f850bf'], u'filename': u'ghostscript-8.70-6.el5_7.3.x86_64.rpm', u'epoch': u'0', u'version': u'8.70', u'release': u'6.el5_7.3', u'arch': u'x86_64'}, {u'src': None, u'name': u'ghostscript-devel', u'sum': [u'md5', u'46ceb1eee0fd58285c84de1c99e2571b'], u'filename': u'ghostscript-devel-8.70-6.el5_7.3.i386.rpm', u'epoch': u'0', u'version': u'8.70', u'release': u'6.el5_7.3', u'arch': u'i386'}, {u'src': None, u'name': u'ghostscript-devel', u'sum': [u'md5', u'66477ac057df3cbbab3570f517369d9c'], u'filename': u'ghostscript-devel-8.70-6.el5_7.3.x86_64.rpm', u'epoch': u'0', u'version': u'8.70', u'release': u'6.el5_7.3', u'arch': u'x86_64'}, {u'src': None, u'name': u'ghostscript-gtk', u'sum': [u'md5', u'201b160773d63f80257697e41a3f2a3c'], u'filename': u'ghostscript-gtk-8.70-6.el5_7.3.x86_64.rpm', u'epoch': u'0', u'version': u'8.70', u'release': u'6.el5_7.3', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u'\n[2.0-14.1]\n- Use updated xmlrpc-c API to do GSSAPI ticket delegation (#736658)\n- Set minimum curl and xmlrpc-c to pull in new delegation API (#736658)', u'issued': u'2011-09-14', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELBA-2011-1290.html', u'type': u'self', u'id': None, u'title': u'ELBA-2011-1290'}], u'_content_type_id': u'erratum', u'_id': u'f33795c6-010c-44de-87f4-267746608f4d', u'from': u'el-errata@oss.oracle.com', u'severity': u'', u'title': u'ipa-client bug fix update', u'_ns': u'units_erratum', u'rights': u'Copyright 2011 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 5', u'reboot_suggested': False, u'type': u'bugfix', u'pkglist': [{u'packages': [{u'src': None, u'name': u'ipa-client', u'sum': [u'md5', u'028ecae4a6de9aa831e185ba6f82a0a4'], u'filename': u'ipa-client-2.0-14.el5_7.1.src.rpm', u'epoch': u'0', u'version': u'2.0', u'release': u'14.el5_7.1', u'arch': u'src'}, {u'src': None, u'name': u'ipa-client', u'sum': [u'md5', u'6cf8af938945524319a195b22079c260'], u'filename': u'ipa-client-2.0-14.el5_7.1.x86_64.rpm', u'epoch': u'0', u'version': u'2.0', u'release': u'14.el5_7.1', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u'\n[5.0.1-0.rc2.156.0.1.el5_7.1]\n- apply fix from NetApp to use tcp before udp\n http://www.mail-archive.com/autofs@linux.kernel.org/msg07910.html\n (Bert Barbe) [orabug 6827898]\n\n[5.0.1-0.rc2.156.el5_7.1]\n- bz735935 - autofs mounts show IP rather than hostname after upgrade to RHEL 5.7\n - fix name list check\n- Resolves: rhbz#735935', u'issued': u'2011-09-20', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELBA-2011-1318.html', u'type': u'self', u'id': None, u'title': u'ELBA-2011-1318'}], u'_content_type_id': u'erratum', u'_id': u'48787c3a-66d7-41be-8dba-fcd2c685c6da', u'from': u'el-errata@oss.oracle.com', u'severity': u'', u'title': u'autofs bug fix update', u'_ns': u'units_erratum', u'rights': u'Copyright 2011 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 5', u'reboot_suggested': False, u'type': u'bugfix', u'pkglist': [{u'packages': [{u'src': None, u'name': u'autofs', u'sum': [u'md5', u'62f5c2d1706bdd23cd6fa4fdf674e447'], u'filename': u'autofs-5.0.1-0.rc2.156.0.1.el5_7.1.src.rpm', u'epoch': u'1', u'version': u'5.0.1', u'release': u'0.rc2.156.0.1.el5_7.1', u'arch': u'src'}, {u'src': None, u'name': u'autofs', u'sum': [u'md5', u'b1aa08e0fa5b3b2b8ff60b088f1c6c30'], u'filename': u'autofs-5.0.1-0.rc2.156.0.1.el5_7.1.x86_64.rpm', u'epoch': u'1', u'version': u'5.0.1', u'release': u'0.rc2.156.0.1.el5_7.1', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u'\n[2.4.3-44.el5_7.1]\n- backport fix for http://bugs.python.org/issue8135 to 2.4 (patch 212)\nResolves: rhbz#734005', u'issued': u'2011-09-20', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELBA-2011-1319.html', u'type': u'self', u'id': None, u'title': u'ELBA-2011-1319'}], u'_content_type_id': u'erratum', u'_id': u'1fd5de8c-43a5-460d-9430-02a6942d5ad8', u'from': u'el-errata@oss.oracle.com', u'severity': u'', u'title': u'python bug fix update', u'_ns': u'units_erratum', u'rights': u'Copyright 2011 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 5', u'reboot_suggested': False, u'type': u'bugfix', u'pkglist': [{u'packages': [{u'src': None, u'name': u'python', u'sum': [u'md5', u'62e25a29afe2ac8b3ffde1ebb06d9fc3'], u'filename': u'python-2.4.3-44.el5_7.1.src.rpm', u'epoch': u'0', u'version': u'2.4.3', u'release': u'44.el5_7.1', u'arch': u'src'}, {u'src': None, u'name': u'python', u'sum': [u'md5', u'0f767c4a36d056eabeae7b66bbecbf6f'], u'filename': u'python-2.4.3-44.el5_7.1.x86_64.rpm', u'epoch': u'0', u'version': u'2.4.3', u'release': u'44.el5_7.1', u'arch': u'x86_64'}, {u'src': None, u'name': u'python-devel', u'sum': [u'md5', u'f0812979270fa15977a03ae0b63a7bd7'], u'filename': u'python-devel-2.4.3-44.el5_7.1.i386.rpm', u'epoch': u'0', u'version': u'2.4.3', u'release': u'44.el5_7.1', u'arch': u'i386'}, {u'src': None, u'name': u'python-devel', u'sum': [u'md5', u'c7a6e653e6ed403b26bc152779b3f5aa'], u'filename': u'python-devel-2.4.3-44.el5_7.1.x86_64.rpm', u'epoch': u'0', u'version': u'2.4.3', u'release': u'44.el5_7.1', u'arch': u'x86_64'}, {u'src': None, u'name': u'python-libs', u'sum': [u'md5', u'1a9f004231a3021f750cc2d6f2986203'], u'filename': u'python-libs-2.4.3-44.el5_7.1.x86_64.rpm', u'epoch': u'0', u'version': u'2.4.3', u'release': u'44.el5_7.1', u'arch': u'x86_64'}, {u'src': None, u'name': u'python-tools', u'sum': [u'md5', u'9d5af385614d4c30d40986a84d1cdf54'], u'filename': u'python-tools-2.4.3-44.el5_7.1.x86_64.rpm', u'epoch': u'0', u'version': u'2.4.3', u'release': u'44.el5_7.1', u'arch': u'x86_64'}, {u'src': None, u'name': u'tkinter', u'sum': [u'md5', u'745dadb4d2ee1c91e1a017069c681b4e'], u'filename': u'tkinter-2.4.3-44.el5_7.1.x86_64.rpm', u'epoch': u'0', u'version': u'2.4.3', u'release': u'44.el5_7.1', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u'\n[2.0.115-85.2]\n- cman init: fix FENCED_OPTS shell escaping\n Resolves: rhbz#740181', u'issued': u'2011-09-26', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELBA-2011-1337.html', u'type': u'self', u'id': None, u'title': u'ELBA-2011-1337'}], u'_content_type_id': u'erratum', u'_id': u'5004a99a-8f9b-4ae5-8289-712d41d113c8', u'from': u'el-errata@oss.oracle.com', u'severity': u'', u'title': u'cman bug fix update', u'_ns': u'units_erratum', u'rights': u'Copyright 2011 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 5', u'reboot_suggested': False, u'type': u'bugfix', u'pkglist': [{u'packages': [{u'src': None, u'name': u'cman', u'sum': [u'md5', u'08e7cf9e6086ce47d0f37355eaffe85e'], u'filename': u'cman-2.0.115-85.el5_7.2.src.rpm', u'epoch': u'0', u'version': u'2.0.115', u'release': u'85.el5_7.2', u'arch': u'src'}, {u'src': None, u'name': u'cman', u'sum': [u'md5', u'6146914ee93d7c8be01d1cd7c1aea8c8'], u'filename': u'cman-2.0.115-85.el5_7.2.x86_64.rpm', u'epoch': u'0', u'version': u'2.0.115', u'release': u'85.el5_7.2', u'arch': u'x86_64'}, {u'src': None, u'name': u'cman-devel', u'sum': [u'md5', u'68b1afc9457b76265b968f468162766a'], u'filename': u'cman-devel-2.0.115-85.el5_7.2.i386.rpm', u'epoch': u'0', u'version': u'2.0.115', u'release': u'85.el5_7.2', u'arch': u'i386'}, {u'src': None, u'name': u'cman-devel', u'sum': [u'md5', u'2f13aa81ef42f1c6d44e52c9e1922f8c'], u'filename': u'cman-devel-2.0.115-85.el5_7.2.x86_64.rpm', u'epoch': u'0', u'version': u'2.0.115', u'release': u'85.el5_7.2', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u'\n[1.0.3-11.el5.1]\n- Add fix for bug 696519.', u'issued': u'2011-10-05', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELBA-2011-1351.html', u'type': u'self', u'id': None, u'title': u'ELBA-2011-1351'}], u'_content_type_id': u'erratum', u'_id': u'74c6981a-0fa6-40fc-a8f3-eeeafba62a4c', u'from': u'el-errata@oss.oracle.com', u'severity': u'', u'title': u'libX11 bug fix update', u'_ns': u'units_erratum', u'rights': u'Copyright 2011 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 5', u'reboot_suggested': False, u'type': u'bugfix', u'pkglist': [{u'packages': [{u'src': None, u'name': u'libX11', u'sum': [u'md5', u'051e19cd735b3e45a1e94efd3649a038'], u'filename': u'libX11-1.0.3-11.el5_7.1.i386.rpm', u'epoch': u'0', u'version': u'1.0.3', u'release': u'11.el5_7.1', u'arch': u'i386'}, {u'src': None, u'name': u'libX11', u'sum': [u'md5', u'4b0d44bc7716bb63a3d34641e8f8971e'], u'filename': u'libX11-1.0.3-11.el5_7.1.src.rpm', u'epoch': u'0', u'version': u'1.0.3', u'release': u'11.el5_7.1', u'arch': u'src'}, {u'src': None, u'name': u'libX11', u'sum': [u'md5', u'c38e8ae1eeb84637a168d852c7ddd8cb'], u'filename': u'libX11-1.0.3-11.el5_7.1.x86_64.rpm', u'epoch': u'0', u'version': u'1.0.3', u'release': u'11.el5_7.1', u'arch': u'x86_64'}, {u'src': None, u'name': u'libX11-devel', u'sum': [u'md5', u'a98a0235e7a023ffbabc37cff3353843'], u'filename': u'libX11-devel-1.0.3-11.el5_7.1.i386.rpm', u'epoch': u'0', u'version': u'1.0.3', u'release': u'11.el5_7.1', u'arch': u'i386'}, {u'src': None, u'name': u'libX11-devel', u'sum': [u'md5', u'cb9d23d3f224cfe5fd687b222aab5c60'], u'filename': u'libX11-devel-1.0.3-11.el5_7.1.x86_64.rpm', u'epoch': u'0', u'version': u'1.0.3', u'release': u'11.el5_7.1', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u'\n[5.0.1-0.rc2.156.0.1.el5_7.3]\n- apply fix from NetApp to use tcp before udp\n http://www.mail-archive.com/autofs@linux.kernel.org/msg07910.html\n (Bert Barbe) [orabug 6827898]\n\n[5.0.1-0.rc2.156.el5.el5_7.3]\n- bump version so we can replace the build with the incorrect changelog verion\n entry.\n- Related: rhbz#744698\n\n[5.0.1-0.rc2.156.el5.el5_7.2]\n- bz744698 - autofs mount access hangs after reload\n - fix prune cache valid check.\n - fix map source check in file lookup.\n- Resolves: rhbz#744698', u'issued': u'2011-10-17', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELBA-2011-1374.html', u'type': u'self', u'id': None, u'title': u'ELBA-2011-1374'}], u'_content_type_id': u'erratum', u'_id': u'f5259012-0f3e-43fb-ba22-de86bf36fbdd', u'from': u'el-errata@oss.oracle.com', u'severity': u'', u'title': u'autofs bug fix update', u'_ns': u'units_erratum', u'rights': u'Copyright 2011 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 5', u'reboot_suggested': False, u'type': u'bugfix', u'pkglist': [{u'packages': [{u'src': None, u'name': u'autofs', u'sum': [u'md5', u'6471f9768df53855152dfbc8e056bea3'], u'filename': u'autofs-5.0.1-0.rc2.156.0.1.el5_7.3.src.rpm', u'epoch': u'1', u'version': u'5.0.1', u'release': u'0.rc2.156.0.1.el5_7.3', u'arch': u'src'}, {u'src': None, u'name': u'autofs', u'sum': [u'md5', u'920ed9eedcb71bd5aaea5448f8ff60fb'], u'filename': u'autofs-5.0.1-0.rc2.156.0.1.el5_7.3.x86_64.rpm', u'epoch': u'1', u'version': u'5.0.1', u'release': u'0.rc2.156.0.1.el5_7.3', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u"\n[253-42.4]\n- revert to using a static buffer, just bump its size to 64k (#743193)\n\n[253-42.3]\n- switch to tracking string lists in config file dynamically (#743193)\n\n[253-42.2]\n- fix a regression caused by patch #39 - SRV records processing\n would crash if there was no basedn set (#743193)\n\n[253-42.1]\n- incorporate Martin Poole's patch to handle larger-than-previously-expected\n configuration files (#743193)", u'issued': u'2011-10-31', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELBA-2011-1413.html', u'type': u'self', u'id': None, u'title': u'ELBA-2011-1413'}], u'_content_type_id': u'erratum', u'_id': u'69735e74-ce15-44c4-ae62-a8640526466c', u'from': u'el-errata@oss.oracle.com', u'severity': u'', u'title': u'nss_ldap bug fix update', u'_ns': u'units_erratum', u'rights': u'Copyright 2011 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 5', u'reboot_suggested': False, u'type': u'bugfix', u'pkglist': [{u'packages': [{u'src': None, u'name': u'nss_ldap', u'sum': [u'md5', u'd46aa690e2a61b685d916ac2fdcb4a93'], u'filename': u'nss_ldap-253-42.el5_7.4.i386.rpm', u'epoch': u'0', u'version': u'253', u'release': u'42.el5_7.4', u'arch': u'i386'}, {u'src': None, u'name': u'nss_ldap', u'sum': [u'md5', u'865deb5a622dd1349b8c92af882672f6'], u'filename': u'nss_ldap-253-42.el5_7.4.src.rpm', u'epoch': u'0', u'version': u'253', u'release': u'42.el5_7.4', u'arch': u'src'}, {u'src': None, u'name': u'nss_ldap', u'sum': [u'md5', u'766ed683e52103f72333f5b67ecaf251'], u'filename': u'nss_ldap-253-42.el5_7.4.x86_64.rpm', u'epoch': u'0', u'version': u'253', u'release': u'42.el5_7.4', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u'\n[2.6.26-2.1.12.0.1.el5_7.1]\n- Add libxml2-enterprise.patch\n- Replaced docs/redhat.gif in tarball with updated image\n\n[2.6.26-2.1.12.el5_7.1]\n- we love complexity (rhbz#747865)\n\n[2.6.26-2.1.12-1]\n- fix schemas validation of empty integer values (rhbz#747865)', u'issued': u'2011-11-01', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELBA-2011-1416.html', u'type': u'self', u'id': None, u'title': u'ELBA-2011-1416'}], u'_content_type_id': u'erratum', u'_id': u'4f4f0159-7a81-43b0-bfd7-dd1544c5141d', u'from': u'el-errata@oss.oracle.com', u'severity': u'', u'title': u'libxml2 bug fix update', u'_ns': u'units_erratum', u'rights': u'Copyright 2011 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 5', u'reboot_suggested': False, u'type': u'bugfix', u'pkglist': [{u'packages': [{u'src': None, u'name': u'libxml2', u'sum': [u'md5', u'5847e1b5033185e55332c225bb654884'], u'filename': u'libxml2-2.6.26-2.1.12.0.1.el5_7.1.i386.rpm', u'epoch': u'0', u'version': u'2.6.26', u'release': u'2.1.12.0.1.el5_7.1', u'arch': u'i386'}, {u'src': None, u'name': u'libxml2', u'sum': [u'md5', u'9495afd80591fd87cc08e55e696d1c91'], u'filename': u'libxml2-2.6.26-2.1.12.0.1.el5_7.1.src.rpm', u'epoch': u'0', u'version': u'2.6.26', u'release': u'2.1.12.0.1.el5_7.1', u'arch': u'src'}, {u'src': None, u'name': u'libxml2', u'sum': [u'md5', u'0138c6f1f1adca24887c50ae446270e6'], u'filename': u'libxml2-2.6.26-2.1.12.0.1.el5_7.1.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.26', u'release': u'2.1.12.0.1.el5_7.1', u'arch': u'x86_64'}, {u'src': None, u'name': u'libxml2-devel', u'sum': [u'md5', u'27a9773bc6f236725ce4d553b43c2e07'], u'filename': u'libxml2-devel-2.6.26-2.1.12.0.1.el5_7.1.i386.rpm', u'epoch': u'0', u'version': u'2.6.26', u'release': u'2.1.12.0.1.el5_7.1', u'arch': u'i386'}, {u'src': None, u'name': u'libxml2-devel', u'sum': [u'md5', u'806a8de67cba974a26f3d9a31aaff687'], u'filename': u'libxml2-devel-2.6.26-2.1.12.0.1.el5_7.1.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.26', u'release': u'2.1.12.0.1.el5_7.1', u'arch': u'x86_64'}, {u'src': None, u'name': u'libxml2-python', u'sum': [u'md5', u'2ea99f0c5dd8ddd946daec0e943862ac'], u'filename': u'libxml2-python-2.6.26-2.1.12.0.1.el5_7.1.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.26', u'release': u'2.1.12.0.1.el5_7.1', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u'\n[0.9.1-7.3.1]\n- xgi-z9s-fix-dpms.patch: Fix DPMS-on on XG21 (Z9s and Z9m) (#736061)', u'issued': u'2011-11-02', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELBA-2011-1420.html', u'type': u'self', u'id': None, u'title': u'ELBA-2011-1420'}], u'_content_type_id': u'erratum', u'_id': u'9763d0fa-e4b9-450e-bb3c-645ab814afad', u'from': u'el-errata@oss.oracle.com', u'severity': u'', u'title': u'xorg-x11-drv-sis bug fix update', u'_ns': u'units_erratum', u'rights': u'Copyright 2011 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 5', u'reboot_suggested': False, u'type': u'bugfix', u'pkglist': [{u'packages': [{u'src': None, u'name': u'xorg-x11-drv-sis', u'sum': [u'md5', u'0b7d0ffeed39de74fd739dd470c13bf4'], u'filename': u'xorg-x11-drv-sis-0.9.1-7.3.el5_7.1.src.rpm', u'epoch': u'0', u'version': u'0.9.1', u'release': u'7.3.el5_7.1', u'arch': u'src'}, {u'src': None, u'name': u'xorg-x11-drv-sis', u'sum': [u'md5', u'8b3db0dde074105cf56773b141ae0865'], u'filename': u'xorg-x11-drv-sis-0.9.1-7.3.el5_7.1.x86_64.rpm', u'epoch': u'0', u'version': u'0.9.1', u'release': u'7.3.el5_7.1', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u'\n[0.12.2-32.0.1.el5_7.1]\n- Added conga-enterprise.patch\n- Added conga-enterprise-Carthage.patch to support OEL5\n- Recreated Data.fs in luci_db-0.12.2-2.tar.gz\n- Replaced redhat logo image in conga-0.12.2.tar.gz\n\n[0.12.2-32.1]\n- Fix bz741169 (Create new cluster fails with luci when installing packages.)', u'issued': u'2011-11-02', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELBA-2011-1421.html', u'type': u'self', u'id': None, u'title': u'ELBA-2011-1421'}], u'_content_type_id': u'erratum', u'_id': u'd846b0b6-ee27-4906-83b3-0e0fe0771d16', u'from': u'el-errata@oss.oracle.com', u'severity': u'', u'title': u'conga bug fix update', u'_ns': u'units_erratum', u'rights': u'Copyright 2011 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 5', u'reboot_suggested': False, u'type': u'bugfix', u'pkglist': [{u'packages': [{u'src': None, u'name': u'conga', u'sum': [u'md5', u'bebd3a40dcbc7ae11baac4b81fccae30'], u'filename': u'conga-0.12.2-32.0.1.el5_7.1.src.rpm', u'epoch': u'0', u'version': u'0.12.2', u'release': u'32.0.1.el5_7.1', u'arch': u'src'}, {u'src': None, u'name': u'luci', u'sum': [u'md5', u'd47e96953bd3966a0b4c62e3101cf025'], u'filename': u'luci-0.12.2-32.0.1.el5_7.1.x86_64.rpm', u'epoch': u'0', u'version': u'0.12.2', u'release': u'32.0.1.el5_7.1', u'arch': u'x86_64'}, {u'src': None, u'name': u'ricci', u'sum': [u'md5', u'31fec9315a1839bbae6604098b0a1c45'], u'filename': u'ricci-0.12.2-32.0.1.el5_7.1.x86_64.rpm', u'epoch': u'0', u'version': u'0.12.2', u'release': u'32.0.1.el5_7.1', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u"\n[0.80.6-30.2]\n- Resolves: rhbz#731460\n- Resolves: rhbz#739083\n- Resolves: rhbz#739086\n\n- Add upstream revision 2178 - Fix problem where openais will segfault if there are gaps in recovery queue\n- Add upstream revision 2179 - whitetank ipc: handle EINTR in msg_send\n- Add upstream revision 2180 - whitetank ipc: Don't deadlock in ipc_disconnect\n- Add upstream revision 2181 - Ignore memb_join messages during flush operations\n- Add upstream revision 2183 - Deliver all messages from my_high_seq_recieved to the last gap", u'issued': u'2011-11-07', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELBA-2011-1428.html', u'type': u'self', u'id': None, u'title': u'ELBA-2011-1428'}], u'_content_type_id': u'erratum', u'_id': u'0d5d9af5-08e7-4f37-ac1e-148390ac6125', u'from': u'el-errata@oss.oracle.com', u'severity': u'', u'title': u'openais bug fix update', u'_ns': u'units_erratum', u'rights': u'Copyright 2011 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 5', u'reboot_suggested': False, u'type': u'bugfix', u'pkglist': [{u'packages': [{u'src': None, u'name': u'openais', u'sum': [u'md5', u'ff23811a3f8c07ab363b4a59f44616f9'], u'filename': u'openais-0.80.6-30.el5_7.2.src.rpm', u'epoch': u'0', u'version': u'0.80.6', u'release': u'30.el5_7.2', u'arch': u'src'}, {u'src': None, u'name': u'openais', u'sum': [u'md5', u'6752988724de965c667afb496d1d1b5c'], u'filename': u'openais-0.80.6-30.el5_7.2.x86_64.rpm', u'epoch': u'0', u'version': u'0.80.6', u'release': u'30.el5_7.2', u'arch': u'x86_64'}, {u'src': None, u'name': u'openais-devel', u'sum': [u'md5', u'cb21addfdf41bb51f58757b97b02b690'], u'filename': u'openais-devel-0.80.6-30.el5_7.2.i386.rpm', u'epoch': u'0', u'version': u'0.80.6', u'release': u'30.el5_7.2', u'arch': u'i386'}, {u'src': None, u'name': u'openais-devel', u'sum': [u'md5', u'90b1545f7d3cb6704a96f11b6a19c664'], u'filename': u'openais-devel-0.80.6-30.el5_7.2.x86_64.rpm', u'epoch': u'0', u'version': u'0.80.6', u'release': u'30.el5_7.2', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u'\n[0.17-40.1]\n- remove unneeded setpwent/endpwent calls', u'issued': u'2011-11-07', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELBA-2011-1429.html', u'type': u'self', u'id': None, u'title': u'ELBA-2011-1429'}], u'_content_type_id': u'erratum', u'_id': u'ff5bbb25-0bd2-4579-b061-22a3e542c432', u'from': u'el-errata@oss.oracle.com', u'severity': u'', u'title': u'rsh bug fix update', u'_ns': u'units_erratum', u'rights': u'Copyright 2011 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 5', u'reboot_suggested': False, u'type': u'bugfix', u'pkglist': [{u'packages': [{u'src': None, u'name': u'rsh', u'sum': [u'md5', u'428d7ac0ea83270f09ffa17e6e903e3c'], u'filename': u'rsh-0.17-40.el5_7.1.src.rpm', u'epoch': u'0', u'version': u'0.17', u'release': u'40.el5_7.1', u'arch': u'src'}, {u'src': None, u'name': u'rsh', u'sum': [u'md5', u'9f48db051848f8b8565495f815daf419'], u'filename': u'rsh-0.17-40.el5_7.1.x86_64.rpm', u'epoch': u'0', u'version': u'0.17', u'release': u'40.el5_7.1', u'arch': u'x86_64'}, {u'src': None, u'name': u'rsh-server', u'sum': [u'md5', u'a48b5bfa1963bb8d1902efac4cccb08f'], u'filename': u'rsh-server-0.17-40.el5_7.1.x86_64.rpm', u'epoch': u'0', u'version': u'0.17', u'release': u'40.el5_7.1', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u'[5.0.1-0.rc2.156.0.1.el5_7.4 ]\n- apply fix from NetApp to use tcp before udp\n http://www.mail-archive.com/autofs@linux.kernel.org/msg07910.html\n (Bert Barbe) [orabug 6827898]\n\n[5.0.1-0.rc2.el5.el5_7.4]\n- bz750463 - autofs-5.0.1-0.rc2.156.el5_7.3 breaks indirect NIS maps\n - fix fix map source check in file lookup.\n- Resolves: rhbz#750463\n', u'issued': u'2011-11-08', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELBA-2011-1435.html', u'type': u'self', u'id': None, u'title': u'ELBA-2011-1435'}], u'_content_type_id': u'erratum', u'_id': u'2c53dfa5-f02c-4f56-b284-c013798165c1', u'from': u'el-errata@oss.oracle.com', u'severity': u'', u'title': u'autofs bug fix update', u'_ns': u'units_erratum', u'rights': u'Copyright 2011 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 5', u'reboot_suggested': False, u'type': u'bugfix', u'pkglist': [{u'packages': [{u'src': None, u'name': u'autofs', u'sum': [u'md5', u'3db8fe8fb4c58104bbd3bcc8001edbd6'], u'filename': u'autofs-5.0.1-0.rc2.156.0.1.el5_7.4.src.rpm', u'epoch': u'1', u'version': u'5.0.1', u'release': u'0.rc2.156.0.1.el5_7.4', u'arch': u'src'}, {u'src': None, u'name': u'autofs', u'sum': [u'md5', u'4a0c281d2055ce7dff263f1fcc8f822e'], u'filename': u'autofs-5.0.1-0.rc2.156.0.1.el5_7.4.x86_64.rpm', u'epoch': u'1', u'version': u'5.0.1', u'release': u'0.rc2.156.0.1.el5_7.4', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u'[8.1.23-1.el5_7.3]\n- Back-port upstream fix for unregistering OpenSSL callbacks at close\nResolves: #749457', u'issued': u'2011-11-14', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELBA-2011-1447.html', u'type': u'self', u'id': None, u'title': u'ELBA-2011-1447'}], u'_content_type_id': u'erratum', u'_id': u'62ba8725-b3d3-4db2-ad0a-67404a00e1c8', u'from': u'el-errata@oss.oracle.com', u'severity': u'', u'title': u'postgresql bug fix update', u'_ns': u'units_erratum', u'rights': u'Copyright 2011 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 5', u'reboot_suggested': False, u'type': u'bugfix', u'pkglist': [{u'packages': [{u'src': None, u'name': u'postgresql', u'sum': [u'md5', u'8aca86fc7cd5a791e378e573abbbe4aa'], u'filename': u'postgresql-8.1.23-1.el5_7.3.src.rpm', u'epoch': u'0', u'version': u'8.1.23', u'release': u'1.el5_7.3', u'arch': u'src'}, {u'src': None, u'name': u'postgresql', u'sum': [u'md5', u'2fef3da3722df48cc17b7be999c4296f'], u'filename': u'postgresql-8.1.23-1.el5_7.3.x86_64.rpm', u'epoch': u'0', u'version': u'8.1.23', u'release': u'1.el5_7.3', u'arch': u'x86_64'}, {u'src': None, u'name': u'postgresql-contrib', u'sum': [u'md5', u'66d47311e96bb6e105e3ecf971104ee3'], u'filename': u'postgresql-contrib-8.1.23-1.el5_7.3.x86_64.rpm', u'epoch': u'0', u'version': u'8.1.23', u'release': u'1.el5_7.3', u'arch': u'x86_64'}, {u'src': None, u'name': u'postgresql-devel', u'sum': [u'md5', u'1a2717c493bb7b4badce363d575e9292'], u'filename': u'postgresql-devel-8.1.23-1.el5_7.3.i386.rpm', u'epoch': u'0', u'version': u'8.1.23', u'release': u'1.el5_7.3', u'arch': u'i386'}, {u'src': None, u'name': u'postgresql-devel', u'sum': [u'md5', u'5a740b997d7ea50d14d3ec3a31cc7284'], u'filename': u'postgresql-devel-8.1.23-1.el5_7.3.x86_64.rpm', u'epoch': u'0', u'version': u'8.1.23', u'release': u'1.el5_7.3', u'arch': u'x86_64'}, {u'src': None, u'name': u'postgresql-docs', u'sum': [u'md5', u'b3c4bc3798e59b7755513d946bdd37cb'], u'filename': u'postgresql-docs-8.1.23-1.el5_7.3.x86_64.rpm', u'epoch': u'0', u'version': u'8.1.23', u'release': u'1.el5_7.3', u'arch': u'x86_64'}, {u'src': None, u'name': u'postgresql-libs', u'sum': [u'md5', u'40b7dd755e5945900c34d1b8223be9ff'], u'filename': u'postgresql-libs-8.1.23-1.el5_7.3.i386.rpm', u'epoch': u'0', u'version': u'8.1.23', u'release': u'1.el5_7.3', u'arch': u'i386'}, {u'src': None, u'name': u'postgresql-libs', u'sum': [u'md5', u'12144615c918d38d0197c78f08b9114d'], u'filename': u'postgresql-libs-8.1.23-1.el5_7.3.x86_64.rpm', u'epoch': u'0', u'version': u'8.1.23', u'release': u'1.el5_7.3', u'arch': u'x86_64'}, {u'src': None, u'name': u'postgresql-pl', u'sum': [u'md5', u'7a1f8dbd59a5273ab71fb5e59205ac07'], u'filename': u'postgresql-pl-8.1.23-1.el5_7.3.x86_64.rpm', u'epoch': u'0', u'version': u'8.1.23', u'release': u'1.el5_7.3', u'arch': u'x86_64'}, {u'src': None, u'name': u'postgresql-python', u'sum': [u'md5', u'0aa472d7c723ff59bc759209596261ba'], u'filename': u'postgresql-python-8.1.23-1.el5_7.3.x86_64.rpm', u'epoch': u'0', u'version': u'8.1.23', u'release': u'1.el5_7.3', u'arch': u'x86_64'}, {u'src': None, u'name': u'postgresql-server', u'sum': [u'md5', u'64d3c90f978ffda350e4f96ecec357f7'], u'filename': u'postgresql-server-8.1.23-1.el5_7.3.x86_64.rpm', u'epoch': u'0', u'version': u'8.1.23', u'release': u'1.el5_7.3', u'arch': u'x86_64'}, {u'src': None, u'name': u'postgresql-tcl', u'sum': [u'md5', u'43917af7b3206ad534cb0cffd9790bab'], u'filename': u'postgresql-tcl-8.1.23-1.el5_7.3.x86_64.rpm', u'epoch': u'0', u'version': u'8.1.23', u'release': u'1.el5_7.3', u'arch': u'x86_64'}, {u'src': None, u'name': u'postgresql-test', u'sum': [u'md5', u'514b01c1b87ddb8a708ba1efa0a340ae'], u'filename': u'postgresql-test-8.1.23-1.el5_7.3.x86_64.rpm', u'epoch': u'0', u'version': u'8.1.23', u'release': u'1.el5_7.3', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u'[095-14.27.1]\n- mark 95-pam-console.rules as config(noreplace)\nResolves: rhbz#750478', u'issued': u'2011-11-14', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELBA-2011-1448.html', u'type': u'self', u'id': None, u'title': u'ELBA-2011-1448'}], u'_content_type_id': u'erratum', u'_id': u'99e27821-cdb2-4caf-8890-7a7de69f662f', u'from': u'el-errata@oss.oracle.com', u'severity': u'', u'title': u'udev bug fix update', u'_ns': u'units_erratum', u'rights': u'Copyright 2011 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 5', u'reboot_suggested': False, u'type': u'bugfix', u'pkglist': [{u'packages': [{u'src': None, u'name': u'libvolume_id', u'sum': [u'md5', u'177d419881b9f2bdf6125a8c5d32119f'], u'filename': u'libvolume_id-095-14.27.el5_7.1.i386.rpm', u'epoch': u'0', u'version': u'095', u'release': u'14.27.el5_7.1', u'arch': u'i386'}, {u'src': None, u'name': u'libvolume_id', u'sum': [u'md5', u'cc4d17048301fd5ddda9ebc745c41ce8'], u'filename': u'libvolume_id-095-14.27.el5_7.1.x86_64.rpm', u'epoch': u'0', u'version': u'095', u'release': u'14.27.el5_7.1', u'arch': u'x86_64'}, {u'src': None, u'name': u'libvolume_id-devel', u'sum': [u'md5', u'd2c15b5f5d24c14f3440c19ed1c5454d'], u'filename': u'libvolume_id-devel-095-14.27.el5_7.1.i386.rpm', u'epoch': u'0', u'version': u'095', u'release': u'14.27.el5_7.1', u'arch': u'i386'}, {u'src': None, u'name': u'libvolume_id-devel', u'sum': [u'md5', u'35d0f372d20c65b62c64455f49bb6a6a'], u'filename': u'libvolume_id-devel-095-14.27.el5_7.1.x86_64.rpm', u'epoch': u'0', u'version': u'095', u'release': u'14.27.el5_7.1', u'arch': u'x86_64'}, {u'src': None, u'name': u'udev', u'sum': [u'md5', u'd72329b2d3aa9bd24c2a797f5fffc9f2'], u'filename': u'udev-095-14.27.el5_7.1.src.rpm', u'epoch': u'0', u'version': u'095', u'release': u'14.27.el5_7.1', u'arch': u'src'}, {u'src': None, u'name': u'udev', u'sum': [u'md5', u'f15a7ecf7d78941e31ba827731e30ab1'], u'filename': u'udev-095-14.27.el5_7.1.x86_64.rpm', u'epoch': u'0', u'version': u'095', u'release': u'14.27.el5_7.1', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u'[4.2.2p1-15.el5_7.1]\n- allow selection of cipher for private key files (#741573)', u'issued': u'2011-11-16', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELBA-2011-1454.html', u'type': u'self', u'id': None, u'title': u'ELBA-2011-1454'}], u'_content_type_id': u'erratum', u'_id': u'df1452f9-a1cf-47b7-96b7-cdcfc42a787d', u'from': u'el-errata@oss.oracle.com', u'severity': u'', u'title': u'ntp bug fix update', u'_ns': u'units_erratum', u'rights': u'Copyright 2011 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 5', u'reboot_suggested': False, u'type': u'bugfix', u'pkglist': [{u'packages': [{u'src': None, u'name': u'ntp', u'sum': [u'md5', u'509c48fc5baa8c23b4620aeec29aa793'], u'filename': u'ntp-4.2.2p1-15.el5_7.1.src.rpm', u'epoch': u'0', u'version': u'4.2.2p1', u'release': u'15.el5_7.1', u'arch': u'src'}, {u'src': None, u'name': u'ntp', u'sum': [u'md5', u'ab883e0a4be8dedf6779dd14b35ea6e3'], u'filename': u'ntp-4.2.2p1-15.el5_7.1.x86_64.rpm', u'epoch': u'0', u'version': u'4.2.2p1', u'release': u'15.el5_7.1', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u'[0.6.20-1.el5_7.1]\n- Update to 0.6.20\n- Repackage a newer version of libexif-docs\n- Convert doc files to utf-8\n- Update the license field\n- Resolves: #689614', u'issued': u'2011-11-22', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELBA-2011-1472.html', u'type': u'self', u'id': None, u'title': u'ELBA-2011-1472'}], u'_content_type_id': u'erratum', u'_id': u'd6d15098-681b-4c6d-bd49-5f6d8529f6ca', u'from': u'el-errata@oss.oracle.com', u'severity': u'', u'title': u'libexif bug fix update', u'_ns': u'units_erratum', u'rights': u'Copyright 2011 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 5', u'reboot_suggested': False, u'type': u'bugfix', u'pkglist': [{u'packages': [{u'src': None, u'name': u'libexif', u'sum': [u'md5', u'd99bd40763803f25e281cf4538e7e962'], u'filename': u'libexif-0.6.20-1.el5_7.1.i386.rpm', u'epoch': u'0', u'version': u'0.6.20', u'release': u'1.el5_7.1', u'arch': u'i386'}, {u'src': None, u'name': u'libexif', u'sum': [u'md5', u'3a5d0310974922e419a15ce7c3e5f6bc'], u'filename': u'libexif-0.6.20-1.el5_7.1.src.rpm', u'epoch': u'0', u'version': u'0.6.20', u'release': u'1.el5_7.1', u'arch': u'src'}, {u'src': None, u'name': u'libexif', u'sum': [u'md5', u'e64c8fea9e2660acd56fce08a4589a78'], u'filename': u'libexif-0.6.20-1.el5_7.1.x86_64.rpm', u'epoch': u'0', u'version': u'0.6.20', u'release': u'1.el5_7.1', u'arch': u'x86_64'}, {u'src': None, u'name': u'libexif-devel', u'sum': [u'md5', u'9276ce0865ed89e8e75fd3400c163ae6'], u'filename': u'libexif-devel-0.6.20-1.el5_7.1.i386.rpm', u'epoch': u'0', u'version': u'0.6.20', u'release': u'1.el5_7.1', u'arch': u'i386'}, {u'src': None, u'name': u'libexif-devel', u'sum': [u'md5', u'a36881806ef4c4799610befbfe2be5bb'], u'filename': u'libexif-devel-0.6.20-1.el5_7.1.x86_64.rpm', u'epoch': u'0', u'version': u'0.6.20', u'release': u'1.el5_7.1', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u'[0.5-13.45svn.12]\n- Add clone support patch that was ported by Martin Osvald\n- Rebase upstream patchset for tracing multi-threaded processes\n- Rebase upstream attach/detach fixes\n- Fix syscall detection\n- Rebase upstream patches for tracing across vfork\n- Add RHEL-6 patch for SIGTRAP masked as SIGILL\n- Resolves: #733216', u'issued': u'2011-11-22', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELBA-2011-1473.html', u'type': u'self', u'id': None, u'title': u'ELBA-2011-1473'}], u'_content_type_id': u'erratum', u'_id': u'5ac959f4-a0fb-4543-a31d-2db28df77c4f', u'from': u'el-errata@oss.oracle.com', u'severity': u'', u'title': u'ltrace bug fix update', u'_ns': u'units_erratum', u'rights': u'Copyright 2011 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 5', u'reboot_suggested': False, u'type': u'bugfix', u'pkglist': [{u'packages': [{u'src': None, u'name': u'ltrace', u'sum': [u'md5', u'007dc9fe78a076c2d762a852903a7fd3'], u'filename': u'ltrace-0.5-13.45svn.el5_7.12.src.rpm', u'epoch': u'0', u'version': u'0.5', u'release': u'13.45svn.el5_7.12', u'arch': u'src'}, {u'src': None, u'name': u'ltrace', u'sum': [u'md5', u'767bd5a2fc8e5a300f1e954a214de9b8'], u'filename': u'ltrace-0.5-13.45svn.el5_7.12.x86_64.rpm', u'epoch': u'0', u'version': u'0.5', u'release': u'13.45svn.el5_7.12', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u'[2.3.43-12.10]\n- fix: memory leaks in syncrepl and slap_sl_free (#750538)', u'issued': u'2011-11-28', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELBA-2011-1482.html', u'type': u'self', u'id': None, u'title': u'ELBA-2011-1482'}], u'_content_type_id': u'erratum', u'_id': u'005f0367-c81a-40c4-84e4-76925e7ca3c0', u'from': u'el-errata@oss.oracle.com', u'severity': u'', u'title': u'openldap bug fix update', u'_ns': u'units_erratum', u'rights': u'Copyright 2011 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 5', u'reboot_suggested': False, u'type': u'bugfix', u'pkglist': [{u'packages': [{u'src': None, u'name': u'compat-openldap', u'sum': [u'md5', u'ac430e94311a397ba688805230465bb4'], u'filename': u'compat-openldap-2.3.43_2.2.29-12.el5_7.10.i386.rpm', u'epoch': u'0', u'version': u'2.3.43_2.2.29', u'release': u'12.el5_7.10', u'arch': u'i386'}, {u'src': None, u'name': u'compat-openldap', u'sum': [u'md5', u'0e52d329082fcb98cc3b0c0a8bf6a356'], u'filename': u'compat-openldap-2.3.43_2.2.29-12.el5_7.10.x86_64.rpm', u'epoch': u'0', u'version': u'2.3.43_2.2.29', u'release': u'12.el5_7.10', u'arch': u'x86_64'}, {u'src': None, u'name': u'openldap', u'sum': [u'md5', u'ea78447403e1488a45190f1aa81656ca'], u'filename': u'openldap-2.3.43-12.el5_7.10.i386.rpm', u'epoch': u'0', u'version': u'2.3.43', u'release': u'12.el5_7.10', u'arch': u'i386'}, {u'src': None, u'name': u'openldap', u'sum': [u'md5', u'bd101061c0bba70819c02a84a3573587'], u'filename': u'openldap-2.3.43-12.el5_7.10.src.rpm', u'epoch': u'0', u'version': u'2.3.43', u'release': u'12.el5_7.10', u'arch': u'src'}, {u'src': None, u'name': u'openldap', u'sum': [u'md5', u'c645261bea4f81117172b90cb0a4e18d'], u'filename': u'openldap-2.3.43-12.el5_7.10.x86_64.rpm', u'epoch': u'0', u'version': u'2.3.43', u'release': u'12.el5_7.10', u'arch': u'x86_64'}, {u'src': None, u'name': u'openldap-clients', u'sum': [u'md5', u'0e4bc9c4963eaf007b5a522dc0a6eb6b'], u'filename': u'openldap-clients-2.3.43-12.el5_7.10.x86_64.rpm', u'epoch': u'0', u'version': u'2.3.43', u'release': u'12.el5_7.10', u'arch': u'x86_64'}, {u'src': None, u'name': u'openldap-devel', u'sum': [u'md5', u'0a78ac41d3f8214ce63faab73660b638'], u'filename': u'openldap-devel-2.3.43-12.el5_7.10.i386.rpm', u'epoch': u'0', u'version': u'2.3.43', u'release': u'12.el5_7.10', u'arch': u'i386'}, {u'src': None, u'name': u'openldap-devel', u'sum': [u'md5', u'7b166f8df3818c4adcef7b46f6883329'], u'filename': u'openldap-devel-2.3.43-12.el5_7.10.x86_64.rpm', u'epoch': u'0', u'version': u'2.3.43', u'release': u'12.el5_7.10', u'arch': u'x86_64'}, {u'src': None, u'name': u'openldap-servers', u'sum': [u'md5', u'f85f78470e899f0270e1ca6e586c868a'], u'filename': u'openldap-servers-2.3.43-12.el5_7.10.x86_64.rpm', u'epoch': u'0', u'version': u'2.3.43', u'release': u'12.el5_7.10', u'arch': u'x86_64'}, {u'src': None, u'name': u'openldap-servers-overlays', u'sum': [u'md5', u'308a8ce8b6ec649ac0a25189200d2d94'], u'filename': u'openldap-servers-overlays-2.3.43-12.el5_7.10.x86_64.rpm', u'epoch': u'0', u'version': u'2.3.43', u'release': u'12.el5_7.10', u'arch': u'x86_64'}, {u'src': None, u'name': u'openldap-servers-sql', u'sum': [u'md5', u'28c134146e4334dae915fe2931f298a1'], u'filename': u'openldap-servers-sql-2.3.43-12.el5_7.10.x86_64.rpm', u'epoch': u'0', u'version': u'2.3.43', u'release': u'12.el5_7.10', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u'[0.4.7-46.el5.2]\n- Added 752107-cciss-substitution.patch\n- Resolves: bz#752107', u'issued': u'2011-11-28', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELBA-2011-1483.html', u'type': u'self', u'id': None, u'title': u'ELBA-2011-1483'}], u'_content_type_id': u'erratum', u'_id': u'5a557087-ab73-4766-a2e3-81184c03d5ee', u'from': u'el-errata@oss.oracle.com', u'severity': u'', u'title': u'device-mapper-multipath bug fix update', u'_ns': u'units_erratum', u'rights': u'Copyright 2011 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 5', u'reboot_suggested': False, u'type': u'bugfix', u'pkglist': [{u'packages': [{u'src': None, u'name': u'device-mapper-multipath', u'sum': [u'md5', u'cd3f079a504dd97e9a80d3c66f53e291'], u'filename': u'device-mapper-multipath-0.4.7-46.el5_7.2.src.rpm', u'epoch': u'0', u'version': u'0.4.7', u'release': u'46.el5_7.2', u'arch': u'src'}, {u'src': None, u'name': u'device-mapper-multipath', u'sum': [u'md5', u'6fcd8563aa0d52e82110d55868d157de'], u'filename': u'device-mapper-multipath-0.4.7-46.el5_7.2.x86_64.rpm', u'epoch': u'0', u'version': u'0.4.7', u'release': u'46.el5_7.2', u'arch': u'x86_64'}, {u'src': None, u'name': u'kpartx', u'sum': [u'md5', u'dc542599403f7cfe1ac5eb1aba476f1b'], u'filename': u'kpartx-0.4.7-46.el5_7.2.x86_64.rpm', u'epoch': u'0', u'version': u'0.4.7', u'release': u'46.el5_7.2', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u'[0.80.6-30.4]\n- Resolves: rhbz#754717\n- Add upstream revision 2182 - Solve problems with aisexec and big time changes, by using clock_gettime\n\n[0.80.6-30.3]\n- Resolves: rhbz#752443\n- Add upstream revision 2185 - Revert revision 2162', u'issued': u'2011-11-28', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELBA-2011-1487.html', u'type': u'self', u'id': None, u'title': u'ELBA-2011-1487'}], u'_content_type_id': u'erratum', u'_id': u'0604fc91-11c2-4c80-a77a-49fed73e7e1e', u'from': u'el-errata@oss.oracle.com', u'severity': u'', u'title': u'openais bug fix update', u'_ns': u'units_erratum', u'rights': u'Copyright 2011 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 5', u'reboot_suggested': False, u'type': u'bugfix', u'pkglist': [{u'packages': [{u'src': None, u'name': u'openais', u'sum': [u'md5', u'df2460cf3c368cdbf5b32c0db5b5e8e3'], u'filename': u'openais-0.80.6-30.el5_7.4.src.rpm', u'epoch': u'0', u'version': u'0.80.6', u'release': u'30.el5_7.4', u'arch': u'src'}, {u'src': None, u'name': u'openais', u'sum': [u'md5', u'1c935e63d031fe6f5c2f5e963ce9cb35'], u'filename': u'openais-0.80.6-30.el5_7.4.x86_64.rpm', u'epoch': u'0', u'version': u'0.80.6', u'release': u'30.el5_7.4', u'arch': u'x86_64'}, {u'src': None, u'name': u'openais-devel', u'sum': [u'md5', u'870c020c0388b340d7bb52fa75c81957'], u'filename': u'openais-devel-0.80.6-30.el5_7.4.i386.rpm', u'epoch': u'0', u'version': u'0.80.6', u'release': u'30.el5_7.4', u'arch': u'i386'}, {u'src': None, u'name': u'openais-devel', u'sum': [u'md5', u'8992a553cc5b1ced869d65841be2d708'], u'filename': u'openais-devel-0.80.6-30.el5_7.4.x86_64.rpm', u'epoch': u'0', u'version': u'0.80.6', u'release': u'30.el5_7.4', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u"[2.5-65.el5_7.1]\n- Correct cycle detection during dependency sorting (#729661)\n\n[2.5-65]\n- Don't underestimate length of DST substitution (#694655)\n\n[2.5-64]\n- Don't allocate executable stack when it cannot be allocated in the\n first 4G (#448011)\n- Initialize resolver state in nscd (#676039)\n- No cancel signal in unsafe places (#684808)\n\n[2.5-63]\n- Check size of pattern in wide character representation in fnmatch\n (#681054)\n\n[2.5-62]\n- Avoid too much stack use in fnmatch (#681054, CVE-2011-1071)\n- Properly quote output of locale (#625893, CVE-2011-1095)\n- Don't leave empty element in rpath when skipping the first element,\n ignore rpath elements containing non-isolated use of when\n privileged (#667974, CVE-2011-0536)\n- Fix handling of newline in addmntent (#559579, CVE-2010-0296)\n\n[2.5-61]\n- Don't ignore in libraries (#670988)\n\n[2.5-60]\n- Fix false assertion (#604796)\n\n[2.5-59]\n- Fix ordering of DSO constructors and destructors (#604796)", u'issued': u'2011-11-29', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELBA-2011-1488.html', u'type': u'self', u'id': None, u'title': u'ELBA-2011-1488'}], u'_content_type_id': u'erratum', u'_id': u'ec2db01a-4390-417b-9d8e-90747f8997e2', u'from': u'el-errata@oss.oracle.com', u'severity': u'', u'title': u'glibc bug fix update', u'_ns': u'units_erratum', u'rights': u'Copyright 2011 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 5', u'reboot_suggested': False, u'type': u'bugfix', u'pkglist': [{u'packages': [{u'src': None, u'name': u'glibc', u'sum': [u'md5', u'e576bbc88f8ffb49f3f2af0eed469471'], u'filename': u'glibc-2.5-65.el5_7.1.i686.rpm', u'epoch': u'0', u'version': u'2.5', u'release': u'65.el5_7.1', u'arch': u'i686'}, {u'src': None, u'name': u'glibc', u'sum': [u'md5', u'6952be64feb415ba6784a03405dd9eef'], u'filename': u'glibc-2.5-65.el5_7.1.src.rpm', u'epoch': u'0', u'version': u'2.5', u'release': u'65.el5_7.1', u'arch': u'src'}, {u'src': None, u'name': u'glibc', u'sum': [u'md5', u'30ab3c5c4de07aa6bc51dfc565a134cb'], u'filename': u'glibc-2.5-65.el5_7.1.x86_64.rpm', u'epoch': u'0', u'version': u'2.5', u'release': u'65.el5_7.1', u'arch': u'x86_64'}, {u'src': None, u'name': u'glibc-common', u'sum': [u'md5', u'bacd70533d7b71a256737b834a577ccf'], u'filename': u'glibc-common-2.5-65.el5_7.1.x86_64.rpm', u'epoch': u'0', u'version': u'2.5', u'release': u'65.el5_7.1', u'arch': u'x86_64'}, {u'src': None, u'name': u'glibc-devel', u'sum': [u'md5', u'7cf285050186d65de897ae3f544e95f6'], u'filename': u'glibc-devel-2.5-65.el5_7.1.i386.rpm', u'epoch': u'0', u'version': u'2.5', u'release': u'65.el5_7.1', u'arch': u'i386'}, {u'src': None, u'name': u'glibc-devel', u'sum': [u'md5', u'3f62978c49e230d6763e3f89cbe6a419'], u'filename': u'glibc-devel-2.5-65.el5_7.1.x86_64.rpm', u'epoch': u'0', u'version': u'2.5', u'release': u'65.el5_7.1', u'arch': u'x86_64'}, {u'src': None, u'name': u'glibc-headers', u'sum': [u'md5', u'a3422a33e1a09bd4b48fad035bf29cb3'], u'filename': u'glibc-headers-2.5-65.el5_7.1.x86_64.rpm', u'epoch': u'0', u'version': u'2.5', u'release': u'65.el5_7.1', u'arch': u'x86_64'}, {u'src': None, u'name': u'glibc-utils', u'sum': [u'md5', u'85c5273f7c5045a0385ac2f1b3da0cc2'], u'filename': u'glibc-utils-2.5-65.el5_7.1.x86_64.rpm', u'epoch': u'0', u'version': u'2.5', u'release': u'65.el5_7.1', u'arch': u'x86_64'}, {u'src': None, u'name': u'nscd', u'sum': [u'md5', u'b9f5a3596af861eeae9041e7645302c0'], u'filename': u'nscd-2.5-65.el5_7.1.x86_64.rpm', u'epoch': u'0', u'version': u'2.5', u'release': u'65.el5_7.1', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u'[5.1.19.6-71.0.9.el5_7.1]\n- Fix changelog entries and rebuild\n\n[5.1.19.6-71.0.8.el5_7.1]\n- Scan for device mapper devices along with md devices in nash [bug 12992623]\n\n[5.1.19.6-71.el5_7.1]\n- Add mpath to the paths searched for DM devices (jruemker)\n Resolves: rhbz#753693', u'issued': u'2011-11-28', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELBA-2011-1491.html', u'type': u'self', u'id': None, u'title': u'ELBA-2011-1491'}], u'_content_type_id': u'erratum', u'_id': u'95eac28b-013a-4b16-9aa6-89a5f3061548', u'from': u'el-errata@oss.oracle.com', u'severity': u'', u'title': u'mkinitrd bug fix update', u'_ns': u'units_erratum', u'rights': u'Copyright 2011 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 5', u'reboot_suggested': False, u'type': u'bugfix', u'pkglist': [{u'packages': [{u'src': None, u'name': u'libbdevid-python', u'sum': [u'md5', u'186d0b401e842370c74796b975e5449b'], u'filename': u'libbdevid-python-5.1.19.6-71.0.9.el5_7.1.x86_64.rpm', u'epoch': u'0', u'version': u'5.1.19.6', u'release': u'71.0.9.el5_7.1', u'arch': u'x86_64'}, {u'src': None, u'name': u'mkinitrd', u'sum': [u'md5', u'f27529811c24af0af6b31cb0a40050f1'], u'filename': u'mkinitrd-5.1.19.6-71.0.9.el5_7.1.i386.rpm', u'epoch': u'0', u'version': u'5.1.19.6', u'release': u'71.0.9.el5_7.1', u'arch': u'i386'}, {u'src': None, u'name': u'mkinitrd', u'sum': [u'md5', u'ac829990ab1f2528a54a7ab090f42b04'], u'filename': u'mkinitrd-5.1.19.6-71.0.9.el5_7.1.src.rpm', u'epoch': u'0', u'version': u'5.1.19.6', u'release': u'71.0.9.el5_7.1', u'arch': u'src'}, {u'src': None, u'name': u'mkinitrd', u'sum': [u'md5', u'1ba0e7a46a3f309511eaed02f7a91f9b'], u'filename': u'mkinitrd-5.1.19.6-71.0.9.el5_7.1.x86_64.rpm', u'epoch': u'0', u'version': u'5.1.19.6', u'release': u'71.0.9.el5_7.1', u'arch': u'x86_64'}, {u'src': None, u'name': u'mkinitrd-devel', u'sum': [u'md5', u'1e9c59305fe1be6306c7092e91cb43e8'], u'filename': u'mkinitrd-devel-5.1.19.6-71.0.9.el5_7.1.i386.rpm', u'epoch': u'0', u'version': u'5.1.19.6', u'release': u'71.0.9.el5_7.1', u'arch': u'i386'}, {u'src': None, u'name': u'mkinitrd-devel', u'sum': [u'md5', u'012737ef6489c168065d162541886ef5'], u'filename': u'mkinitrd-devel-5.1.19.6-71.0.9.el5_7.1.x86_64.rpm', u'epoch': u'0', u'version': u'5.1.19.6', u'release': u'71.0.9.el5_7.1', u'arch': u'x86_64'}, {u'src': None, u'name': u'nash', u'sum': [u'md5', u'52280bf07c50db288353e195d6c1fd53'], u'filename': u'nash-5.1.19.6-71.0.9.el5_7.1.x86_64.rpm', u'epoch': u'0', u'version': u'5.1.19.6', u'release': u'71.0.9.el5_7.1', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u'[1.7-9.54.0.1.el5_7.1]\n- add patch to remove all sysrq echo commands from sysreport.legacy\n (John Sobecki) [orabug 11061754]\n- comment out rh-upload-core and README.rh-upload-core in specfile\n\n[1.7-9.54.el5_7.1]\n- Fix handling of TMP environment variable\nResolves: bz748804', u'issued': u'2011-12-12', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELBA-2011-1535.html', u'type': u'self', u'id': None, u'title': u'ELBA-2011-1535'}], u'_content_type_id': u'erratum', u'_id': u'a8ae0a41-6036-40fc-8c07-329214983e81', u'from': u'el-errata@oss.oracle.com', u'severity': u'', u'title': u'sos bug fix update', u'_ns': u'units_erratum', u'rights': u'Copyright 2011 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 5', u'reboot_suggested': False, u'type': u'bugfix', u'pkglist': [{u'packages': [{u'src': None, u'name': u'sos', u'sum': [u'md5', u'78e56d642a6a3e4929fd110c097694f2'], u'filename': u'sos-1.7-9.54.0.1.el5_7.1.noarch.rpm', u'epoch': u'0', u'version': u'1.7', u'release': u'9.54.0.1.el5_7.1', u'arch': u'noarch'}, {u'src': None, u'name': u'sos', u'sum': [u'md5', u'097d3e2abac740557cffd39745a73ade'], u'filename': u'sos-1.7-9.54.0.1.el5_7.1.src.rpm', u'epoch': u'0', u'version': u'1.7', u'release': u'9.54.0.1.el5_7.1', u'arch': u'src'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u'[2.10.4-21.0.1.el5_7.7]\n- Bump release number\n\n[2.10.4-21..el5_7.7]\n- Fix file chooser hanging when saving with an empty filename.\n Resolves: #758019.', u'issued': u'2011-12-08', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELBA-2011-1795.html', u'type': u'self', u'id': None, u'title': u'ELBA-2011-1795'}], u'_content_type_id': u'erratum', u'_id': u'1c62372d-df8f-493e-8042-0df6300a784a', u'from': u'el-errata@oss.oracle.com', u'severity': u'', u'title': u'gtk2 bug fix update', u'_ns': u'units_erratum', u'rights': u'Copyright 2011 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 5', u'reboot_suggested': False, u'type': u'bugfix', u'pkglist': [{u'packages': [{u'src': None, u'name': u'gtk2', u'sum': [u'md5', u'6f30ca8c463ef1b52eebaca9ec28d1d7'], u'filename': u'gtk2-2.10.4-21.0.1.el5_7.7.i386.rpm', u'epoch': u'0', u'version': u'2.10.4', u'release': u'21.0.1.el5_7.7', u'arch': u'i386'}, {u'src': None, u'name': u'gtk2', u'sum': [u'md5', u'25bfb42ed373d16de947d32f4d8494dd'], u'filename': u'gtk2-2.10.4-21.0.1.el5_7.7.src.rpm', u'epoch': u'0', u'version': u'2.10.4', u'release': u'21.0.1.el5_7.7', u'arch': u'src'}, {u'src': None, u'name': u'gtk2', u'sum': [u'md5', u'7933948dff6a9ca4aa4080fdc323680f'], u'filename': u'gtk2-2.10.4-21.0.1.el5_7.7.x86_64.rpm', u'epoch': u'0', u'version': u'2.10.4', u'release': u'21.0.1.el5_7.7', u'arch': u'x86_64'}, {u'src': None, u'name': u'gtk2-devel', u'sum': [u'md5', u'9f40b94f5850b3a3b81f02988956d4d9'], u'filename': u'gtk2-devel-2.10.4-21.0.1.el5_7.7.i386.rpm', u'epoch': u'0', u'version': u'2.10.4', u'release': u'21.0.1.el5_7.7', u'arch': u'i386'}, {u'src': None, u'name': u'gtk2-devel', u'sum': [u'md5', u'4fd389c27603efbf1c2f170e111c70d0'], u'filename': u'gtk2-devel-2.10.4-21.0.1.el5_7.7.x86_64.rpm', u'epoch': u'0', u'version': u'2.10.4', u'release': u'21.0.1.el5_7.7', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u'[2.0-14.2]\n- Send Referer HTTP header when making XML-RPC requests for CVE-2011-3636\n (#768058)', u'issued': u'2011-12-20', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELBA-2011-1841.html', u'type': u'self', u'id': None, u'title': u'ELBA-2011-1841'}], u'_content_type_id': u'erratum', u'_id': u'01ab0f14-a2c7-4574-a14c-1fbd07c297d8', u'from': u'el-errata@oss.oracle.com', u'severity': u'', u'title': u'ipa-client bug fix update', u'_ns': u'units_erratum', u'rights': u'Copyright 2011 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 5', u'reboot_suggested': False, u'type': u'bugfix', u'pkglist': [{u'packages': [{u'src': None, u'name': u'ipa-client', u'sum': [u'md5', u'66cca8dfe1e75156c6f0fe039bc53809'], u'filename': u'ipa-client-2.0-14.el5_7.2.src.rpm', u'epoch': u'0', u'version': u'2.0', u'release': u'14.el5_7.2', u'arch': u'src'}, {u'src': None, u'name': u'ipa-client', u'sum': [u'md5', u'597625e5db27d56ae065392fdabb0fdb'], u'filename': u'ipa-client-2.0-14.el5_7.2.x86_64.rpm', u'epoch': u'0', u'version': u'2.0', u'release': u'14.el5_7.2', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u'[0.42-1.2]\n- incorporate patch from Rob Crittenden to start supplying Referer:\n headers when we submit XML-RPC requests (#767573)', u'issued': u'2011-12-20', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELBA-2011-1842.html', u'type': u'self', u'id': None, u'title': u'ELBA-2011-1842'}], u'_content_type_id': u'erratum', u'_id': u'4faf3888-85e5-4d76-a158-9013f24ba80c', u'from': u'el-errata@oss.oracle.com', u'severity': u'', u'title': u'certmonger bug fix update', u'_ns': u'units_erratum', u'rights': u'Copyright 2011 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 5', u'reboot_suggested': False, u'type': u'bugfix', u'pkglist': [{u'packages': [{u'src': None, u'name': u'certmonger', u'sum': [u'md5', u'f357dc4cfb0d51ec83b99014159fac7c'], u'filename': u'certmonger-0.42-1.el5_7.2.src.rpm', u'epoch': u'0', u'version': u'0.42', u'release': u'1.el5_7.2', u'arch': u'src'}, {u'src': None, u'name': u'certmonger', u'sum': [u'md5', u'4eb2dd3bd01483fb445b541eac898071'], u'filename': u'certmonger-0.42-1.el5_7.2.x86_64.rpm', u'epoch': u'0', u'version': u'0.42', u'release': u'1.el5_7.2', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u'\n[5.1.19.6-68.0.2.el5_6.1]\n- [revert] remove mkinitrd-fix-san-boot.patch until 32bit mkiinitrd issues are resolved', u'issued': u'2011-04-14', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELBA-2011-2012.html', u'type': u'self', u'id': None, u'title': u'ELBA-2011-2012'}], u'_content_type_id': u'erratum', u'_id': u'a2db06c0-f47c-4b5b-b3a6-9c90f6d995f5', u'from': u'el-errata@oss.oracle.com', u'severity': u'', u'title': u'mkinitrd bug fix update', u'_ns': u'units_erratum', u'rights': u'Copyright 2011 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 5', u'reboot_suggested': False, u'type': u'bugfix', u'pkglist': [{u'packages': [{u'src': None, u'name': u'libbdevid-python', u'sum': [u'md5', u'84fbd5077869f47fa1b521677dbca768'], u'filename': u'libbdevid-python-5.1.19.6-68.0.2.el5_6.1.x86_64.rpm', u'epoch': u'0', u'version': u'5.1.19.6', u'release': u'68.0.2.el5_6.1', u'arch': u'x86_64'}, {u'src': None, u'name': u'mkinitrd', u'sum': [u'md5', u'2f7855c6c0e45ca7aeac4957f1d152d9'], u'filename': u'mkinitrd-5.1.19.6-68.0.2.el5_6.1.i386.rpm', u'epoch': u'0', u'version': u'5.1.19.6', u'release': u'68.0.2.el5_6.1', u'arch': u'i386'}, {u'src': None, u'name': u'mkinitrd', u'sum': [u'md5', u'2ce9b1004d1685dbbe9da10433e4721c'], u'filename': u'mkinitrd-5.1.19.6-68.0.2.el5_6.1.src.rpm', u'epoch': u'0', u'version': u'5.1.19.6', u'release': u'68.0.2.el5_6.1', u'arch': u'src'}, {u'src': None, u'name': u'mkinitrd', u'sum': [u'md5', u'8c198c6375ae8062697b03199aa13073'], u'filename': u'mkinitrd-5.1.19.6-68.0.2.el5_6.1.x86_64.rpm', u'epoch': u'0', u'version': u'5.1.19.6', u'release': u'68.0.2.el5_6.1', u'arch': u'x86_64'}, {u'src': None, u'name': u'mkinitrd-devel', u'sum': [u'md5', u'e214e380fd69f6a2dd129e3f82e88b94'], u'filename': u'mkinitrd-devel-5.1.19.6-68.0.2.el5_6.1.i386.rpm', u'epoch': u'0', u'version': u'5.1.19.6', u'release': u'68.0.2.el5_6.1', u'arch': u'i386'}, {u'src': None, u'name': u'mkinitrd-devel', u'sum': [u'md5', u'8d113df2642fb383345bbabb8db1c63d'], u'filename': u'mkinitrd-devel-5.1.19.6-68.0.2.el5_6.1.x86_64.rpm', u'epoch': u'0', u'version': u'5.1.19.6', u'release': u'68.0.2.el5_6.1', u'arch': u'x86_64'}, {u'src': None, u'name': u'nash', u'sum': [u'md5', u'c0800d826886c750189f192b0d6c2750'], u'filename': u'nash-5.1.19.6-68.0.2.el5_6.1.x86_64.rpm', u'epoch': u'0', u'version': u'5.1.19.6', u'release': u'68.0.2.el5_6.1', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u'\n[2.6.32-100.36.1.el6uek]\n- [xen] Hide mwait, TSC invariance and MTRR capability in published CPUID (Chuck Anderson)', u'issued': u'2011-06-23', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELBA-2011-2020.html', u'type': u'self', u'id': None, u'title': u'ELBA-2011-2020'}], u'_content_type_id': u'erratum', u'_id': u'eaeedeaa-08e8-4759-b7cb-200ae5d6e720', u'from': u'el-errata@oss.oracle.com', u'severity': u'', u'title': u' Oracle Linux 6 Unbreakable Enterprise kernel bug fix update', u'_ns': u'units_erratum', u'rights': u'Copyright 2011 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 6', u'reboot_suggested': False, u'type': u'bugfix', u'pkglist': [{u'packages': [{u'src': None, u'name': u'kernel-uek', u'sum': [u'md5', u'9a8b6178ef9574d7210087416113be28'], u'filename': u'kernel-uek-2.6.32-100.36.1.el6uek.src.rpm', u'epoch': u'0', u'version': u'2.6.32', u'release': u'100.36.1.el6uek', u'arch': u'src'}, {u'src': None, u'name': u'kernel-uek', u'sum': [u'md5', u'a44753288ccd3f7e96d053ff4c01dc20'], u'filename': u'kernel-uek-2.6.32-100.36.1.el6uek.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.32', u'release': u'100.36.1.el6uek', u'arch': u'x86_64'}, {u'src': None, u'name': u'kernel-uek-debug', u'sum': [u'md5', u'9f97ec514d5918183dea930a704e3abd'], u'filename': u'kernel-uek-debug-2.6.32-100.36.1.el6uek.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.32', u'release': u'100.36.1.el6uek', u'arch': u'x86_64'}, {u'src': None, u'name': u'kernel-uek-debug-devel', u'sum': [u'md5', u'8fa94ed1f0cd1e1371f7e4a21ea37548'], u'filename': u'kernel-uek-debug-devel-2.6.32-100.36.1.el6uek.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.32', u'release': u'100.36.1.el6uek', u'arch': u'x86_64'}, {u'src': None, u'name': u'kernel-uek-devel', u'sum': [u'md5', u'908d8db15af43e013512ad68425c1446'], u'filename': u'kernel-uek-devel-2.6.32-100.36.1.el6uek.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.32', u'release': u'100.36.1.el6uek', u'arch': u'x86_64'}, {u'src': None, u'name': u'kernel-uek-doc', u'sum': [u'md5', u'990da72c5fe098fbdf8d4d086c54416d'], u'filename': u'kernel-uek-doc-2.6.32-100.36.1.el6uek.noarch.rpm', u'epoch': u'0', u'version': u'2.6.32', u'release': u'100.36.1.el6uek', u'arch': u'noarch'}, {u'src': None, u'name': u'kernel-uek-firmware', u'sum': [u'md5', u'c302e5b9f3552d641b1f1fb028aa7645'], u'filename': u'kernel-uek-firmware-2.6.32-100.36.1.el6uek.noarch.rpm', u'epoch': u'0', u'version': u'2.6.32', u'release': u'100.36.1.el6uek', u'arch': u'noarch'}, {u'src': None, u'name': u'kernel-uek-headers', u'sum': [u'md5', u'8c4638af94cdc635f883bc687e88490b'], u'filename': u'kernel-uek-headers-2.6.32-100.36.1.el6uek.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.32', u'release': u'100.36.1.el6uek', u'arch': u'x86_64'}, {u'src': None, u'name': u'ofa-2.6.32-100.36.1.el6uek', u'sum': [u'md5', u'c6fa0f7bd02c79173791f3c8089eba5d'], u'filename': u'ofa-2.6.32-100.36.1.el6uek-1.5.1-4.0.47.src.rpm', u'epoch': u'0', u'version': u'1.5.1', u'release': u'4.0.47', u'arch': u'src'}, {u'src': None, u'name': u'ofa-2.6.32-100.36.1.el6uek', u'sum': [u'md5', u'8f92b747ee4425c31f7c024d372ed44e'], u'filename': u'ofa-2.6.32-100.36.1.el6uek-1.5.1-4.0.47.x86_64.rpm', u'epoch': u'0', u'version': u'1.5.1', u'release': u'4.0.47', u'arch': u'x86_64'}, {u'src': None, u'name': u'ofa-2.6.32-100.36.1.el6uekdebug', u'sum': [u'md5', u'be0da621275d9bab158361acd5d9c69e'], u'filename': u'ofa-2.6.32-100.36.1.el6uekdebug-1.5.1-4.0.47.x86_64.rpm', u'epoch': u'0', u'version': u'1.5.1', u'release': u'4.0.47', u'arch': u'x86_64'}], u'name': u'ol6_x86_64_latest', u'short': u'ol6_x86_64_latest'}, {u'packages': [{u'src': None, u'name': u'kernel-uek', u'sum': [u'md5', u'5b72ce4729e451ea60c8df00517a0b97'], u'filename': u'kernel-uek-2.6.32-100.36.1.el5uek.src.rpm', u'epoch': u'0', u'version': u'2.6.32', u'release': u'100.36.1.el5uek', u'arch': u'src'}, {u'src': None, u'name': u'kernel-uek', u'sum': [u'md5', u'79d8ccb8ae4ffdbad152955e0503e794'], u'filename': u'kernel-uek-2.6.32-100.36.1.el5uek.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.32', u'release': u'100.36.1.el5uek', u'arch': u'x86_64'}, {u'src': None, u'name': u'kernel-uek-debug', u'sum': [u'md5', u'464c7d7aade6ada7583aac5361454c62'], u'filename': u'kernel-uek-debug-2.6.32-100.36.1.el5uek.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.32', u'release': u'100.36.1.el5uek', u'arch': u'x86_64'}, {u'src': None, u'name': u'kernel-uek-debug-devel', u'sum': [u'md5', u'1fa55fae93026c7ffc58ad80392875b2'], u'filename': u'kernel-uek-debug-devel-2.6.32-100.36.1.el5uek.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.32', u'release': u'100.36.1.el5uek', u'arch': u'x86_64'}, {u'src': None, u'name': u'kernel-uek-devel', u'sum': [u'md5', u'd568f68eb050bf16ababb7bbb188d501'], u'filename': u'kernel-uek-devel-2.6.32-100.36.1.el5uek.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.32', u'release': u'100.36.1.el5uek', u'arch': u'x86_64'}, {u'src': None, u'name': u'kernel-uek-doc', u'sum': [u'md5', u'85d8bbd4749da152585b59167a1fb8d3'], u'filename': u'kernel-uek-doc-2.6.32-100.36.1.el5uek.noarch.rpm', u'epoch': u'0', u'version': u'2.6.32', u'release': u'100.36.1.el5uek', u'arch': u'noarch'}, {u'src': None, u'name': u'kernel-uek-firmware', u'sum': [u'md5', u'2395a9a882528c9135923b90f86d282a'], u'filename': u'kernel-uek-firmware-2.6.32-100.36.1.el5uek.noarch.rpm', u'epoch': u'0', u'version': u'2.6.32', u'release': u'100.36.1.el5uek', u'arch': u'noarch'}, {u'src': None, u'name': u'ofa-2.6.32-100.36.1.el5uek', u'sum': [u'md5', u'145f5be683bd2ed9d368bddce82c0239'], u'filename': u'ofa-2.6.32-100.36.1.el5uek-1.5.1-4.0.28.src.rpm', u'epoch': u'0', u'version': u'1.5.1', u'release': u'4.0.28', u'arch': u'src'}, {u'src': None, u'name': u'ofa-2.6.32-100.36.1.el5uek', u'sum': [u'md5', u'1a02eb2bce746bce8355030a97ee9bef'], u'filename': u'ofa-2.6.32-100.36.1.el5uek-1.5.1-4.0.28.x86_64.rpm', u'epoch': u'0', u'version': u'1.5.1', u'release': u'4.0.28', u'arch': u'x86_64'}, {u'src': None, u'name': u'ofa-2.6.32-100.36.1.el5uekdebug', u'sum': [u'md5', u'7cc573ce3f62489b94ad831d6606bad3'], u'filename': u'ofa-2.6.32-100.36.1.el5uekdebug-1.5.1-4.0.28.x86_64.rpm', u'epoch': u'0', u'version': u'1.5.1', u'release': u'4.0.28', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u'\n[2.6.32-200.16.1.el5uek]\n- Revert change to restore DEFAULTKERNEL\n\n[2.6.32-200.15.1.el5uek]\n- Add -u parameter to kernel_variant_post to make it work\n properly for uek [orabug 12819958]\n\n[2.6.32-200.14.1.el5uek]\n- Restore DEFAULTKERNEL value to kernel-uek [orabug 12819958] ', u'issued': u'2011-08-19', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELBA-2011-2023.html', u'type': u'self', u'id': None, u'title': u'ELBA-2011-2023'}], u'_content_type_id': u'erratum', u'_id': u'3ee476e3-9d73-4d4e-9ff6-71b602e8040c', u'from': u'el-errata@oss.oracle.com', u'severity': u'', u'title': u' Oracle Linux 5 Unbreakable Enterprise kernel bug fix update', u'_ns': u'units_erratum', u'rights': u'Copyright 2011 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 5', u'reboot_suggested': False, u'type': u'bugfix', u'pkglist': [{u'packages': [{u'src': None, u'name': u'kernel-uek', u'sum': [u'md5', u'8cf5327e74a04b756b9cd765cebadf8c'], u'filename': u'kernel-uek-2.6.32-200.16.1.el5uek.src.rpm', u'epoch': u'0', u'version': u'2.6.32', u'release': u'200.16.1.el5uek', u'arch': u'src'}, {u'src': None, u'name': u'kernel-uek', u'sum': [u'md5', u'67886d095484f5c83ff0fcd7d875ff51'], u'filename': u'kernel-uek-2.6.32-200.16.1.el5uek.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.32', u'release': u'200.16.1.el5uek', u'arch': u'x86_64'}, {u'src': None, u'name': u'kernel-uek-debug', u'sum': [u'md5', u'0ceb720201f25933d284c5e8c1de5954'], u'filename': u'kernel-uek-debug-2.6.32-200.16.1.el5uek.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.32', u'release': u'200.16.1.el5uek', u'arch': u'x86_64'}, {u'src': None, u'name': u'kernel-uek-debug-devel', u'sum': [u'md5', u'aad30cc5bda05f0f7e9c16e21013ec33'], u'filename': u'kernel-uek-debug-devel-2.6.32-200.16.1.el5uek.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.32', u'release': u'200.16.1.el5uek', u'arch': u'x86_64'}, {u'src': None, u'name': u'kernel-uek-devel', u'sum': [u'md5', u'3f6a954576adb6d37b913956fc2c345e'], u'filename': u'kernel-uek-devel-2.6.32-200.16.1.el5uek.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.32', u'release': u'200.16.1.el5uek', u'arch': u'x86_64'}, {u'src': None, u'name': u'kernel-uek-doc', u'sum': [u'md5', u'76b7e611aa302b05150b95156a0c93e1'], u'filename': u'kernel-uek-doc-2.6.32-200.16.1.el5uek.noarch.rpm', u'epoch': u'0', u'version': u'2.6.32', u'release': u'200.16.1.el5uek', u'arch': u'noarch'}, {u'src': None, u'name': u'kernel-uek-firmware', u'sum': [u'md5', u'ed561c98dd1dc805fc9b21f539855e62'], u'filename': u'kernel-uek-firmware-2.6.32-200.16.1.el5uek.noarch.rpm', u'epoch': u'0', u'version': u'2.6.32', u'release': u'200.16.1.el5uek', u'arch': u'noarch'}, {u'src': None, u'name': u'ofa-2.6.32-200.16.1.el5uek', u'sum': [u'md5', u'5c4932e1eaf5fd94a4efca451afa1e89'], u'filename': u'ofa-2.6.32-200.16.1.el5uek-1.5.1-4.0.28.src.rpm', u'epoch': u'0', u'version': u'1.5.1', u'release': u'4.0.28', u'arch': u'src'}, {u'src': None, u'name': u'ofa-2.6.32-200.16.1.el5uek', u'sum': [u'md5', u'aa2ac3b0c8a4439f3f204fd8db0d48c7'], u'filename': u'ofa-2.6.32-200.16.1.el5uek-1.5.1-4.0.28.x86_64.rpm', u'epoch': u'0', u'version': u'1.5.1', u'release': u'4.0.28', u'arch': u'x86_64'}, {u'src': None, u'name': u'ofa-2.6.32-200.16.1.el5uekdebug', u'sum': [u'md5', u'09970a44e95b33e81d72d9b772b4afb0'], u'filename': u'ofa-2.6.32-200.16.1.el5uekdebug-1.5.1-4.0.28.x86_64.rpm', u'epoch': u'0', u'version': u'1.5.1', u'release': u'4.0.28', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u'\n[2.2.3-53.0.2.el5_7.1]\n- Fix mod_ssl always performing full renegotiation (orabug 12423387)', u'issued': u'2011-10-11', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELBA-2011-2030.html', u'type': u'self', u'id': None, u'title': u'ELBA-2011-2030'}], u'_content_type_id': u'erratum', u'_id': u'a73d25a8-067c-480f-b38c-a15f18c417c5', u'from': u'el-errata@oss.oracle.com', u'severity': u'', u'title': u'httpd bug fix update', u'_ns': u'units_erratum', u'rights': u'Copyright 2011 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 5', u'reboot_suggested': False, u'type': u'bugfix', u'pkglist': [{u'packages': [{u'src': None, u'name': u'httpd', u'sum': [u'md5', u'7a3393728eb99e82b76cd591301efe0c'], u'filename': u'httpd-2.2.3-53.0.2.el5_7.1.src.rpm', u'epoch': u'0', u'version': u'2.2.3', u'release': u'53.0.2.el5_7.1', u'arch': u'src'}, {u'src': None, u'name': u'httpd', u'sum': [u'md5', u'5329491424d1f304f6f66f4bb67b5771'], u'filename': u'httpd-2.2.3-53.0.2.el5_7.1.x86_64.rpm', u'epoch': u'0', u'version': u'2.2.3', u'release': u'53.0.2.el5_7.1', u'arch': u'x86_64'}, {u'src': None, u'name': u'httpd-devel', u'sum': [u'md5', u'740091e9f6b0fe3b9882985a84e62101'], u'filename': u'httpd-devel-2.2.3-53.0.2.el5_7.1.x86_64.rpm', u'epoch': u'0', u'version': u'2.2.3', u'release': u'53.0.2.el5_7.1', u'arch': u'x86_64'}, {u'src': None, u'name': u'httpd-manual', u'sum': [u'md5', u'043540d92579ccfa3c6f20f9bee29b4d'], u'filename': u'httpd-manual-2.2.3-53.0.2.el5_7.1.x86_64.rpm', u'epoch': u'0', u'version': u'2.2.3', u'release': u'53.0.2.el5_7.1', u'arch': u'x86_64'}, {u'src': None, u'name': u'mod_ssl', u'sum': [u'md5', u'64651e6fb75ca80448bb8905af0119b7'], u'filename': u'mod_ssl-2.2.3-53.0.2.el5_7.1.x86_64.rpm', u'epoch': u'1', u'version': u'2.2.3', u'release': u'53.0.2.el5_7.1', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u'[2.7.4-8.0.1]\n- remove the serialization of read-like operations vs write-like operations\n across whole session. [Ora13031466]', u'issued': u'2011-10-17', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELBA-2011-2032.html', u'type': u'self', u'id': None, u'title': u'ELBA-2011-2032'}], u'_content_type_id': u'erratum', u'_id': u'b42d3ccb-ce19-4dc7-8de1-6f2e042fdcf8', u'from': u'el-errata@oss.oracle.com', u'severity': u'', u'title': u'fuse bug fix update', u'_ns': u'units_erratum', u'rights': u'Copyright 2011 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 5', u'reboot_suggested': False, u'type': u'bugfix', u'pkglist': [{u'packages': [{u'src': None, u'name': u'fuse', u'sum': [u'md5', u'c9942aab0e82b8ae996f57b68a8fc5e6'], u'filename': u'fuse-2.7.4-8.0.1.el5.src.rpm', u'epoch': u'0', u'version': u'2.7.4', u'release': u'8.0.1.el5', u'arch': u'src'}, {u'src': None, u'name': u'fuse', u'sum': [u'md5', u'f58ee2613a0697d00b4871522e6a2d3f'], u'filename': u'fuse-2.7.4-8.0.1.el5.x86_64.rpm', u'epoch': u'0', u'version': u'2.7.4', u'release': u'8.0.1.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'fuse-devel', u'sum': [u'md5', u'920357c971ce1d27c4b0883a8fb1d57a'], u'filename': u'fuse-devel-2.7.4-8.0.1.el5.i386.rpm', u'epoch': u'0', u'version': u'2.7.4', u'release': u'8.0.1.el5', u'arch': u'i386'}, {u'src': None, u'name': u'fuse-devel', u'sum': [u'md5', u'9ae8e71d5e0fff0beb6f232afba85509'], u'filename': u'fuse-devel-2.7.4-8.0.1.el5.x86_64.rpm', u'epoch': u'0', u'version': u'2.7.4', u'release': u'8.0.1.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'fuse-libs', u'sum': [u'md5', u'2f467e697584bc8d552e22957421946b'], u'filename': u'fuse-libs-2.7.4-8.0.1.el5.i386.rpm', u'epoch': u'0', u'version': u'2.7.4', u'release': u'8.0.1.el5', u'arch': u'i386'}, {u'src': None, u'name': u'fuse-libs', u'sum': [u'md5', u'636460f57e79b26b675190b99d622b6b'], u'filename': u'fuse-libs-2.7.4-8.0.1.el5.x86_64.rpm', u'epoch': u'0', u'version': u'2.7.4', u'release': u'8.0.1.el5', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u'[5.1.19.6-71.0.10.el5_7.1]\n- Load firmware from /lib/formware/(uname -r) directory also', u'issued': u'2011-12-20', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELBA-2011-2035.html', u'type': u'self', u'id': None, u'title': u'ELBA-2011-2035'}], u'_content_type_id': u'erratum', u'_id': u'1a17c510-412a-40fe-b347-c62b76baa9db', u'from': u'el-errata@oss.oracle.com', u'severity': u'', u'title': u'mkinitrd bug fix update', u'_ns': u'units_erratum', u'rights': u'Copyright 2011 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 5', u'reboot_suggested': False, u'type': u'bugfix', u'pkglist': [{u'packages': [{u'src': None, u'name': u'libbdevid-python', u'sum': [u'md5', u'ba0c71d68fc052a59c40278e9878e8d1'], u'filename': u'libbdevid-python-5.1.19.6-71.0.10.el5_7.1.x86_64.rpm', u'epoch': u'0', u'version': u'5.1.19.6', u'release': u'71.0.10.el5_7.1', u'arch': u'x86_64'}, {u'src': None, u'name': u'mkinitrd', u'sum': [u'md5', u'eef5df8f400e571c429ce1544ac46ba0'], u'filename': u'mkinitrd-5.1.19.6-71.0.10.el5_7.1.i386.rpm', u'epoch': u'0', u'version': u'5.1.19.6', u'release': u'71.0.10.el5_7.1', u'arch': u'i386'}, {u'src': None, u'name': u'mkinitrd', u'sum': [u'md5', u'f1c0d377068f6b6019c97b33477d7883'], u'filename': u'mkinitrd-5.1.19.6-71.0.10.el5_7.1.src.rpm', u'epoch': u'0', u'version': u'5.1.19.6', u'release': u'71.0.10.el5_7.1', u'arch': u'src'}, {u'src': None, u'name': u'mkinitrd', u'sum': [u'md5', u'786df994fb92e6cffd03d3d40598e72f'], u'filename': u'mkinitrd-5.1.19.6-71.0.10.el5_7.1.x86_64.rpm', u'epoch': u'0', u'version': u'5.1.19.6', u'release': u'71.0.10.el5_7.1', u'arch': u'x86_64'}, {u'src': None, u'name': u'mkinitrd-devel', u'sum': [u'md5', u'060ff403b41e8dfbfbca1b829f62daea'], u'filename': u'mkinitrd-devel-5.1.19.6-71.0.10.el5_7.1.i386.rpm', u'epoch': u'0', u'version': u'5.1.19.6', u'release': u'71.0.10.el5_7.1', u'arch': u'i386'}, {u'src': None, u'name': u'mkinitrd-devel', u'sum': [u'md5', u'027ae7d6f5d096d39b0a7b1fc8783dd1'], u'filename': u'mkinitrd-devel-5.1.19.6-71.0.10.el5_7.1.x86_64.rpm', u'epoch': u'0', u'version': u'5.1.19.6', u'release': u'71.0.10.el5_7.1', u'arch': u'x86_64'}, {u'src': None, u'name': u'nash', u'sum': [u'md5', u'611689b405a19e571694565d4c0c4084'], u'filename': u'nash-5.1.19.6-71.0.10.el5_7.1.x86_64.rpm', u'epoch': u'0', u'version': u'5.1.19.6', u'release': u'71.0.10.el5_7.1', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u'[ 095-14.27.0.1.el5_7.1]\n- firmware helper look to /lib/firmware/(uname -r)', u'issued': u'2011-12-20', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELBA-2011-2036.html', u'type': u'self', u'id': None, u'title': u'ELBA-2011-2036'}], u'_content_type_id': u'erratum', u'_id': u'3c6fce09-70bc-49da-b55a-eea9820f07b1', u'from': u'el-errata@oss.oracle.com', u'severity': u'', u'title': u'udev bug fix update', u'_ns': u'units_erratum', u'rights': u'Copyright 2011 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 5', u'reboot_suggested': False, u'type': u'bugfix', u'pkglist': [{u'packages': [{u'src': None, u'name': u'libvolume_id', u'sum': [u'md5', u'2cdaddbe89d59fb5c59dde0170815de4'], u'filename': u'libvolume_id-095-14.27.0.1.el5_7.1.i386.rpm', u'epoch': u'0', u'version': u'095', u'release': u'14.27.0.1.el5_7.1', u'arch': u'i386'}, {u'src': None, u'name': u'libvolume_id', u'sum': [u'md5', u'e18c4cbcbb74af33f909de868d8aca89'], u'filename': u'libvolume_id-095-14.27.0.1.el5_7.1.x86_64.rpm', u'epoch': u'0', u'version': u'095', u'release': u'14.27.0.1.el5_7.1', u'arch': u'x86_64'}, {u'src': None, u'name': u'libvolume_id-devel', u'sum': [u'md5', u'0c4358dfcfff4b7f2c821cd00716ffe5'], u'filename': u'libvolume_id-devel-095-14.27.0.1.el5_7.1.i386.rpm', u'epoch': u'0', u'version': u'095', u'release': u'14.27.0.1.el5_7.1', u'arch': u'i386'}, {u'src': None, u'name': u'libvolume_id-devel', u'sum': [u'md5', u'694cc1782a34d3f3b65c16771f7d8450'], u'filename': u'libvolume_id-devel-095-14.27.0.1.el5_7.1.x86_64.rpm', u'epoch': u'0', u'version': u'095', u'release': u'14.27.0.1.el5_7.1', u'arch': u'x86_64'}, {u'src': None, u'name': u'udev', u'sum': [u'md5', u'5e5a4eedae53d3b68776b537c27942be'], u'filename': u'udev-095-14.27.0.1.el5_7.1.src.rpm', u'epoch': u'0', u'version': u'095', u'release': u'14.27.0.1.el5_7.1', u'arch': u'src'}, {u'src': None, u'name': u'udev', u'sum': [u'md5', u'9c3180334a28b83e92363e6fc1cae6a2'], u'filename': u'udev-095-14.27.0.1.el5_7.1.x86_64.rpm', u'epoch': u'0', u'version': u'095', u'release': u'14.27.0.1.el5_7.1', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u'[2.16.1-8.4]\n- Mark PAM file as config file\n Resolves: #766799', u'issued': u'2012-01-05', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELBA-2012-0002.html', u'type': u'self', u'id': None, u'title': u'ELBA-2012-0002'}], u'_content_type_id': u'erratum', u'_id': u'fde59a57-0bbd-4f00-b42f-30d2ca9d0e64', u'from': u'el-errata@oss.oracle.com', u'severity': u'', u'title': u'gnome-screensaver bug fix update', u'_ns': u'units_erratum', u'rights': u'Copyright 2012 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 5', u'reboot_suggested': False, u'type': u'bugfix', u'pkglist': [{u'packages': [{u'src': None, u'name': u'gnome-screensaver', u'sum': [u'md5', u'40d080f715235aa5b8f5d8aac4b657f9'], u'filename': u'gnome-screensaver-2.16.1-8.el5_7.4.src.rpm', u'epoch': u'0', u'version': u'2.16.1', u'release': u'8.el5_7.4', u'arch': u'src'}, {u'src': None, u'name': u'gnome-screensaver', u'sum': [u'md5', u'e9ccf932b85ebc61cac6adcd15bf9335'], u'filename': u'gnome-screensaver-2.16.1-8.el5_7.4.x86_64.rpm', u'epoch': u'0', u'version': u'2.16.1', u'release': u'8.el5_7.4', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u'[2.16.1-8.5]\n- Give up lock without grabs\n Resolves: #771849', u'issued': u'2012-01-10', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELBA-2012-0008.html', u'type': u'self', u'id': None, u'title': u'ELBA-2012-0008'}], u'_content_type_id': u'erratum', u'_id': u'29e1549e-8f2a-4519-973e-0cd8a557fe1f', u'from': u'el-errata@oss.oracle.com', u'severity': u'', u'title': u'gnome-screensaver bug fix update', u'_ns': u'units_erratum', u'rights': u'Copyright 2012 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 5', u'reboot_suggested': False, u'type': u'bugfix', u'pkglist': [{u'packages': [{u'src': None, u'name': u'gnome-screensaver', u'sum': [u'md5', u'f90569c0b34c9c0ab798175c75ea08f0'], u'filename': u'gnome-screensaver-2.16.1-8.el5_7.5.src.rpm', u'epoch': u'0', u'version': u'2.16.1', u'release': u'8.el5_7.5', u'arch': u'src'}, {u'src': None, u'name': u'gnome-screensaver', u'sum': [u'md5', u'85c7318b1be5e3615700243a5864fafd'], u'filename': u'gnome-screensaver-2.16.1-8.el5_7.5.x86_64.rpm', u'epoch': u'0', u'version': u'2.16.1', u'release': u'8.el5_7.5', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u'[18-19.el5_7.2]\n- typo in the dist tag (spec file)\n- Resolves: rhbz#769857\n\n[18-19.el5_7.1]\n- fix #769857 - procinfo command gets buffer overflow for hms calculations\n- Resolves: rhbz#769857', u'issued': u'2012-01-16', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELBA-2012-0021.html', u'type': u'self', u'id': None, u'title': u'ELBA-2012-0021'}], u'_content_type_id': u'erratum', u'_id': u'e0d43709-5d4e-443d-86c8-983c183ed124', u'from': u'el-errata@oss.oracle.com', u'severity': u'', u'title': u'procinfo bug fix update', u'_ns': u'units_erratum', u'rights': u'Copyright 2012 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 5', u'reboot_suggested': False, u'type': u'bugfix', u'pkglist': [{u'packages': [{u'src': None, u'name': u'procinfo', u'sum': [u'md5', u'64a48bdd6d14efc09b16d4720fd246bb'], u'filename': u'procinfo-18-19.el5_7.2.src.rpm', u'epoch': u'0', u'version': u'18', u'release': u'19.el5_7.2', u'arch': u'src'}, {u'src': None, u'name': u'procinfo', u'sum': [u'md5', u'9d0e81d4928e19ce3663e5aa40782085'], u'filename': u'procinfo-18-19.el5_7.2.x86_64.rpm', u'epoch': u'0', u'version': u'18', u'release': u'19.el5_7.2', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u"[1:1.2.0-10.1]\n- Resolves: #761532\n 'Kdump fails after findfs subcommand of busybox fails'", u'issued': u'2012-01-17', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELBA-2012-0026.html', u'type': u'self', u'id': None, u'title': u'ELBA-2012-0026'}], u'_content_type_id': u'erratum', u'_id': u'e9a49f9a-1415-4ff2-9fae-7dba68498c9f', u'from': u'el-errata@oss.oracle.com', u'severity': u'', u'title': u'busybox bug fix update', u'_ns': u'units_erratum', u'rights': u'Copyright 2012 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 5', u'reboot_suggested': False, u'type': u'bugfix', u'pkglist': [{u'packages': [{u'src': None, u'name': u'busybox', u'sum': [u'md5', u'3d216005dfc687eab1a946d5b4e6684c'], u'filename': u'busybox-1.2.0-10.el5_7.1.src.rpm', u'epoch': u'1', u'version': u'1.2.0', u'release': u'10.el5_7.1', u'arch': u'src'}, {u'src': None, u'name': u'busybox', u'sum': [u'md5', u'b57cced5bc288bc69b5ea9221a186ac7'], u'filename': u'busybox-1.2.0-10.el5_7.1.x86_64.rpm', u'epoch': u'1', u'version': u'1.2.0', u'release': u'10.el5_7.1', u'arch': u'x86_64'}, {u'src': None, u'name': u'busybox-anaconda', u'sum': [u'md5', u'2455f592467fa0405ec0a7fc17eeda50'], u'filename': u'busybox-anaconda-1.2.0-10.el5_7.1.x86_64.rpm', u'epoch': u'1', u'version': u'1.2.0', u'release': u'10.el5_7.1', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u"[2.0.115-85.el5_7.3]\n- fence_rhevm: change 'UP' status to 'up' state as the REST-API has changed\n fence_rhevm: REST API URL needs to be updated to /api\n Resolves: rhbz#782833", u'issued': u'2012-01-24', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELBA-2012-0053.html', u'type': u'self', u'id': None, u'title': u'ELBA-2012-0053'}], u'_content_type_id': u'erratum', u'_id': u'8c8841a2-4a24-4853-9d0f-74e8fd270bb0', u'from': u'el-errata@oss.oracle.com', u'severity': u'', u'title': u'cman bug fix update', u'_ns': u'units_erratum', u'rights': u'Copyright 2012 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 5', u'reboot_suggested': False, u'type': u'bugfix', u'pkglist': [{u'packages': [{u'src': None, u'name': u'cman', u'sum': [u'md5', u'1e93779f18f424775b0d545d1788c3ca'], u'filename': u'cman-2.0.115-85.el5_7.3.src.rpm', u'epoch': u'0', u'version': u'2.0.115', u'release': u'85.el5_7.3', u'arch': u'src'}, {u'src': None, u'name': u'cman', u'sum': [u'md5', u'fc3283b10645d93baff8b0305c46394c'], u'filename': u'cman-2.0.115-85.el5_7.3.x86_64.rpm', u'epoch': u'0', u'version': u'2.0.115', u'release': u'85.el5_7.3', u'arch': u'x86_64'}, {u'src': None, u'name': u'cman-devel', u'sum': [u'md5', u'b44fb82be6d73a5db6f28dbf122a5198'], u'filename': u'cman-devel-2.0.115-85.el5_7.3.i386.rpm', u'epoch': u'0', u'version': u'2.0.115', u'release': u'85.el5_7.3', u'arch': u'i386'}, {u'src': None, u'name': u'cman-devel', u'sum': [u'md5', u'2624287b425ec069406a19d030739532'], u'filename': u'cman-devel-2.0.115-85.el5_7.3.x86_64.rpm', u'epoch': u'0', u'version': u'2.0.115', u'release': u'85.el5_7.3', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u'[2.02.84-6.0.1.el5_7.2]\n- disable lvconvert --merge option if snapshot-merge\n- target is missing (Herbert van den Bergh) [orabug 12315079]\n\n[2.02.84-6.el5_7.2]\n- Avoid possible endless loop when 4 or more VGs have same name.\n Resolves: #773587', u'issued': u'2012-01-24', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELBA-2012-0056.html', u'type': u'self', u'id': None, u'title': u'ELBA-2012-0056'}], u'_content_type_id': u'erratum', u'_id': u'874a52f2-87d4-4dc3-975e-1c978892d158', u'from': u'el-errata@oss.oracle.com', u'severity': u'', u'title': u'lvm2 bug fix update', u'_ns': u'units_erratum', u'rights': u'Copyright 2012 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 5', u'reboot_suggested': False, u'type': u'bugfix', u'pkglist': [{u'packages': [{u'src': None, u'name': u'lvm2', u'sum': [u'md5', u'635adc67aa36531642e7a85fc659cecb'], u'filename': u'lvm2-2.02.84-6.0.1.el5_7.2.src.rpm', u'epoch': u'0', u'version': u'2.02.84', u'release': u'6.0.1.el5_7.2', u'arch': u'src'}, {u'src': None, u'name': u'lvm2', u'sum': [u'md5', u'ddb17a2431371a7c250e727495831994'], u'filename': u'lvm2-2.02.84-6.0.1.el5_7.2.x86_64.rpm', u'epoch': u'0', u'version': u'2.02.84', u'release': u'6.0.1.el5_7.2', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u'[5.1-3.1]\n- fix thread-safety issue (#783228)', u'issued': u'2012-01-24', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELBA-2012-0057.html', u'type': u'self', u'id': None, u'title': u'ELBA-2012-0057'}], u'_content_type_id': u'erratum', u'_id': u'f18c9be5-801b-4e8a-8e0b-d0f2b64e201e', u'from': u'el-errata@oss.oracle.com', u'severity': u'', u'title': u'mod_auth_kerb bug fix update', u'_ns': u'units_erratum', u'rights': u'Copyright 2012 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 5', u'reboot_suggested': False, u'type': u'bugfix', u'pkglist': [{u'packages': [{u'src': None, u'name': u'mod_auth_kerb', u'sum': [u'md5', u'ed34662ddda16a6232964ba6e5768117'], u'filename': u'mod_auth_kerb-5.1-3.el5_7.1.src.rpm', u'epoch': u'0', u'version': u'5.1', u'release': u'3.el5_7.1', u'arch': u'src'}, {u'src': None, u'name': u'mod_auth_kerb', u'sum': [u'md5', u'69779eabf96cc57fe7816c945722eb78'], u'filename': u'mod_auth_kerb-5.1-3.el5_7.1.x86_64.rpm', u'epoch': u'0', u'version': u'5.1', u'release': u'3.el5_7.1', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u'[2.0.52-21.el5_7.1]\n- rgmanager: Resolve rare deadlock\n Resolves: rhbz#759542', u'issued': u'2012-01-30', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELBA-2012-0066.html', u'type': u'self', u'id': None, u'title': u'ELBA-2012-0066'}], u'_content_type_id': u'erratum', u'_id': u'1ea59c1e-1987-4f9f-af28-c25d7d3179bc', u'from': u'el-errata@oss.oracle.com', u'severity': u'', u'title': u'rgmanager bug fix update', u'_ns': u'units_erratum', u'rights': u'Copyright 2012 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 5', u'reboot_suggested': False, u'type': u'bugfix', u'pkglist': [{u'packages': [{u'src': None, u'name': u'rgmanager', u'sum': [u'md5', u'4e0cf938db079ec60a7c2a9e36aeccb9'], u'filename': u'rgmanager-2.0.52-21.el5_7.1.src.rpm', u'epoch': u'0', u'version': u'2.0.52', u'release': u'21.el5_7.1', u'arch': u'src'}, {u'src': None, u'name': u'rgmanager', u'sum': [u'md5', u'7504fb4fe6cffc2841fd1aac9fe8a560'], u'filename': u'rgmanager-2.0.52-21.el5_7.1.x86_64.rpm', u'epoch': u'0', u'version': u'2.0.52', u'release': u'21.el5_7.1', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u'[2.4.6-316.el5_7.1]\n- Make ssh_keygen domain as unconfined\nResolves:#784782', u'issued': u'2012-02-09', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELBA-2012-0106.html', u'type': u'self', u'id': None, u'title': u'ELBA-2012-0106'}], u'_content_type_id': u'erratum', u'_id': u'07294f7a-51fd-4def-bc86-a17b61a3a3a6', u'from': u'el-errata@oss.oracle.com', u'severity': u'', u'title': u'selinux-policy bug fix update', u'_ns': u'units_erratum', u'rights': u'Copyright 2012 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 5', u'reboot_suggested': False, u'type': u'bugfix', u'pkglist': [{u'packages': [{u'src': None, u'name': u'selinux-policy', u'sum': [u'md5', u'b93e228297e0017dd91304ea562501ed'], u'filename': u'selinux-policy-2.4.6-316.el5_7.1.noarch.rpm', u'epoch': u'0', u'version': u'2.4.6', u'release': u'316.el5_7.1', u'arch': u'noarch'}, {u'src': None, u'name': u'selinux-policy', u'sum': [u'md5', u'5ecda0646e3c2452aa34fc78d646f5bd'], u'filename': u'selinux-policy-2.4.6-316.el5_7.1.src.rpm', u'epoch': u'0', u'version': u'2.4.6', u'release': u'316.el5_7.1', u'arch': u'src'}, {u'src': None, u'name': u'selinux-policy-devel', u'sum': [u'md5', u'2b168a33417d85762efdbfc85b20005e'], u'filename': u'selinux-policy-devel-2.4.6-316.el5_7.1.noarch.rpm', u'epoch': u'0', u'version': u'2.4.6', u'release': u'316.el5_7.1', u'arch': u'noarch'}, {u'src': None, u'name': u'selinux-policy-minimum', u'sum': [u'md5', u'31d71adde0a9b0cc6d7aa183a28378f7'], u'filename': u'selinux-policy-minimum-2.4.6-316.el5_7.1.noarch.rpm', u'epoch': u'0', u'version': u'2.4.6', u'release': u'316.el5_7.1', u'arch': u'noarch'}, {u'src': None, u'name': u'selinux-policy-mls', u'sum': [u'md5', u'44f7777edaf1c627f4b5580f9d03bd34'], u'filename': u'selinux-policy-mls-2.4.6-316.el5_7.1.noarch.rpm', u'epoch': u'0', u'version': u'2.4.6', u'release': u'316.el5_7.1', u'arch': u'noarch'}, {u'src': None, u'name': u'selinux-policy-strict', u'sum': [u'md5', u'540a5907da10a8f001eecfbe8d33a828'], u'filename': u'selinux-policy-strict-2.4.6-316.el5_7.1.noarch.rpm', u'epoch': u'0', u'version': u'2.4.6', u'release': u'316.el5_7.1', u'arch': u'noarch'}, {u'src': None, u'name': u'selinux-policy-targeted', u'sum': [u'md5', u'03f69314a3b36974947d5c8c75ded3a4'], u'filename': u'selinux-policy-targeted-2.4.6-316.el5_7.1.noarch.rpm', u'epoch': u'0', u'version': u'2.4.6', u'release': u'316.el5_7.1', u'arch': u'noarch'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u'[2.0.5-5.0.1.el5_8.1]\n- Added setroubleshoot-oracle.patch\n\n[2.0.5-5.el5_8.1]\n- Fixup for memory leaks\nResolves:#789143', u'issued': u'2012-03-06', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELBA-2012-0146.html', u'type': u'self', u'id': None, u'title': u'ELBA-2012-0146'}], u'_content_type_id': u'erratum', u'_id': u'3c2bb665-bd1e-488c-ac16-7f942854190f', u'from': u'el-errata@oss.oracle.com', u'severity': u'', u'title': u'setroubleshoot bug fix update', u'_ns': u'units_erratum', u'rights': u'Copyright 2012 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 5', u'reboot_suggested': False, u'type': u'bugfix', u'pkglist': [{u'packages': [{u'src': None, u'name': u'setroubleshoot', u'sum': [u'md5', u'f4729b0d2b9ab9feb07b1905380f5658'], u'filename': u'setroubleshoot-2.0.5-5.0.1.el5_8.1.noarch.rpm', u'epoch': u'0', u'version': u'2.0.5', u'release': u'5.0.1.el5_8.1', u'arch': u'noarch'}, {u'src': None, u'name': u'setroubleshoot', u'sum': [u'md5', u'7a2e264eff5360b4771bd95b92419d5f'], u'filename': u'setroubleshoot-2.0.5-5.0.1.el5_8.1.src.rpm', u'epoch': u'0', u'version': u'2.0.5', u'release': u'5.0.1.el5_8.1', u'arch': u'src'}, {u'src': None, u'name': u'setroubleshoot-server', u'sum': [u'md5', u'bded0f89733c77d736e14c6c79cbccd6'], u'filename': u'setroubleshoot-server-2.0.5-5.0.1.el5_8.1.noarch.rpm', u'epoch': u'0', u'version': u'2.0.5', u'release': u'5.0.1.el5_8.1', u'arch': u'noarch'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u'[1.4.1-7.1]\n- fix multiple possible NULL dereferences and other problems\n that can potentially lead to segfault in the client\n\n[1.4.1-7]\n- fix safe renegotiation on SSL3 protocol\n\n[1.4.1-6]\n- implement safe renegotiation - CVE-2009-3555 (#533125)\n- do not allow MD2 in certificate signatures by default - CVE-2009-2409\n (#510197)\n\n[1.4.1-5]\n- fix NUL characters in DN and SAN cert fields issue,\n make sure gnutls_x509_crt_check_hostname() fails when certificate\n has no CN or SAN CVE-2009-2730 (#516231)\n\n[1.4.1-4]\n- fix chain verification issue CVE-2008-4989 (#470079)', u'issued': u'2012-03-06', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELBA-2012-0319.html', u'type': u'self', u'id': None, u'title': u'ELBA-2012-0319'}], u'_content_type_id': u'erratum', u'_id': u'a4a99e27-898a-47dd-aec8-c880cf8bd89f', u'from': u'el-errata@oss.oracle.com', u'severity': u'', u'title': u'gnutls bug fix update', u'_ns': u'units_erratum', u'rights': u'Copyright 2012 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 5', u'reboot_suggested': False, u'type': u'bugfix', u'pkglist': [{u'packages': [{u'src': None, u'name': u'gnutls', u'sum': [u'md5', u'6a1340827d4c04718e04828964ef7a0d'], u'filename': u'gnutls-1.4.1-7.el5_8.1.i386.rpm', u'epoch': u'0', u'version': u'1.4.1', u'release': u'7.el5_8.1', u'arch': u'i386'}, {u'src': None, u'name': u'gnutls', u'sum': [u'md5', u'601913173bc5e4530212a2f46587b3b6'], u'filename': u'gnutls-1.4.1-7.el5_8.1.src.rpm', u'epoch': u'0', u'version': u'1.4.1', u'release': u'7.el5_8.1', u'arch': u'src'}, {u'src': None, u'name': u'gnutls', u'sum': [u'md5', u'5357900a0275138f083c3db6fc25465a'], u'filename': u'gnutls-1.4.1-7.el5_8.1.x86_64.rpm', u'epoch': u'0', u'version': u'1.4.1', u'release': u'7.el5_8.1', u'arch': u'x86_64'}, {u'src': None, u'name': u'gnutls-devel', u'sum': [u'md5', u'cc4f0172ac859fb8f06911b9513f8d7a'], u'filename': u'gnutls-devel-1.4.1-7.el5_8.1.i386.rpm', u'epoch': u'0', u'version': u'1.4.1', u'release': u'7.el5_8.1', u'arch': u'i386'}, {u'src': None, u'name': u'gnutls-devel', u'sum': [u'md5', u'1acad1da262d1da620ae17d6c38a109c'], u'filename': u'gnutls-devel-1.4.1-7.el5_8.1.x86_64.rpm', u'epoch': u'0', u'version': u'1.4.1', u'release': u'7.el5_8.1', u'arch': u'x86_64'}, {u'src': None, u'name': u'gnutls-utils', u'sum': [u'md5', u'6ca498a8072738b38319a897aa2a5a97'], u'filename': u'gnutls-utils-1.4.1-7.el5_8.1.x86_64.rpm', u'epoch': u'0', u'version': u'1.4.1', u'release': u'7.el5_8.1', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u"[4.5.18.11]\n- Track personality more carefully (#768203)\n\n[4.5.18-10]\n- Handle special ptrace signal during detach (#580211)\n\n[4.5.18-9]\n- Try to use PTRACE_SETOPTIONS to handle non-ptrace SIGTRAP (#559580)\n\n[4.5.18-8]\n- Reliably detect post-execve trap on ia64 (#559580)\n\n[4.5.18-7]\n- Don't kill the process when detaching (#552964)\n\n[4.5.18-6]\n- Workaround missing SIGTRAP after execve due to being blocked on ia64.\n- Resolves: RHBZ#512692", u'issued': u'2012-02-28', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELBA-2012-0326.html', u'type': u'self', u'id': None, u'title': u'ELBA-2012-0326'}], u'_content_type_id': u'erratum', u'_id': u'b14f0299-40d0-4090-959f-47e03555382f', u'from': u'el-errata@oss.oracle.com', u'severity': u'', u'title': u'strace bug fix update', u'_ns': u'units_erratum', u'rights': u'Copyright 2012 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 5', u'reboot_suggested': False, u'type': u'bugfix', u'pkglist': [{u'packages': [{u'src': None, u'name': u'strace', u'sum': [u'md5', u'c79782f8f33a2cb92e76e8ce6f22134a'], u'filename': u'strace-4.5.18-11.el5_8.src.rpm', u'epoch': u'0', u'version': u'4.5.18', u'release': u'11.el5_8', u'arch': u'src'}, {u'src': None, u'name': u'strace', u'sum': [u'md5', u'fe7d593ca588d97252c39e25e1cf99fa'], u'filename': u'strace-4.5.18-11.el5_8.x86_64.rpm', u'epoch': u'0', u'version': u'4.5.18', u'release': u'11.el5_8', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u'nspr\n[4.8.9-3]\n- Resolves: 784489,CVE-2011-3389\n- Add partial RELRO support as a security enhancement\n\n[4.8.9-2]\n- Resolves: 784489,CVE-2011-3389\n- Update to 3.13.1\n- Run the nspr test suite in the %check section\n\nnss:\n\n[3.13.11-6.0.1.el6_2]\n- Use blank image instead of clean.gif in nss-3.13.1-stripped.tar.bz2\n- Remove chains nss test to fix build failure\n\n[3.13.1-6]\n- Add patches for bugs 783315 and 747387\n- Related: rhbz#744072 - Update to 3.13.1\n\n[3.13.1-5]\n- Related: rhbz#744070 - retagging\n\n[3.13.1-4]\n- Related: rhbz#744070 - Update to 3.13.1\n- Retagging to match git repo\n\n[3.13.1-3]\n- Resolves: rhbz#744070\n- Rebuild\n\n[3.13.1-2]\n- CVE-2011-3389 [784490]\n- Activate a patch that was left out in previous build\n\n[3.13.1-1]\n- Resolves: Bug 744070 - Update to 3.13.1\n- nss should protect against being called before nss_Init [784674]\n- CVE-2011-3389 HTTPS: block-wise chosen-plaintext attack against SSL/TLS (BEAST) [784490]\n\nnss-util:\n\n[3.13.1-3]\n- Related: Bug 773056 - Update to 3.13.1\n- Retagging\n\n[3.13.1-2]\n- Rebuild for NSPR 4.8.9\n\n[3.13.1-1]\n- Resolves: Bug 773056 - Update to 3.13.1', u'issued': u'2012-02-28', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELBA-2012-0337.html', u'type': u'self', u'id': None, u'title': u'ELBA-2012-0337'}], u'_content_type_id': u'erratum', u'_id': u'612390d5-7d33-4e58-b159-290fd20c7cce', u'from': u'el-errata@oss.oracle.com', u'severity': u'', u'title': u'nss and nspr bug fix and enhancement update', u'_ns': u'units_erratum', u'rights': u'Copyright 2012 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 6', u'reboot_suggested': False, u'type': u'bugfix', u'pkglist': [{u'packages': [{u'src': None, u'name': u'nspr', u'sum': [u'md5', u'e86a97506e0847aca6b7cdc8d1a3a401'], u'filename': u'nspr-4.8.9-3.el6_2.i686.rpm', u'epoch': u'0', u'version': u'4.8.9', u'release': u'3.el6_2', u'arch': u'i686'}, {u'src': None, u'name': u'nspr', u'sum': [u'md5', u'1e4ccaf0a2d21ca42e54d7cb7cfed65b'], u'filename': u'nspr-4.8.9-3.el6_2.src.rpm', u'epoch': u'0', u'version': u'4.8.9', u'release': u'3.el6_2', u'arch': u'src'}, {u'src': None, u'name': u'nspr', u'sum': [u'md5', u'3505095c7b8ee8d349efbe97370a8d0c'], u'filename': u'nspr-4.8.9-3.el6_2.x86_64.rpm', u'epoch': u'0', u'version': u'4.8.9', u'release': u'3.el6_2', u'arch': u'x86_64'}, {u'src': None, u'name': u'nspr-devel', u'sum': [u'md5', u'2f780c411e39ef1b5561a9fb2918634e'], u'filename': u'nspr-devel-4.8.9-3.el6_2.i686.rpm', u'epoch': u'0', u'version': u'4.8.9', u'release': u'3.el6_2', u'arch': u'i686'}, {u'src': None, u'name': u'nspr-devel', u'sum': [u'md5', u'ea7d0e7da4c4d5c126b95660e45edca6'], u'filename': u'nspr-devel-4.8.9-3.el6_2.x86_64.rpm', u'epoch': u'0', u'version': u'4.8.9', u'release': u'3.el6_2', u'arch': u'x86_64'}, {u'src': None, u'name': u'nss', u'sum': [u'md5', u'4bc8d2b244b59f7ce41ddee0fcd02114'], u'filename': u'nss-3.13.1-6.0.1.el6_2.i686.rpm', u'epoch': u'0', u'version': u'3.13.1', u'release': u'6.0.1.el6_2', u'arch': u'i686'}, {u'src': None, u'name': u'nss', u'sum': [u'md5', u'dfd4e74082b4a10087cd4e345d39dfa9'], u'filename': u'nss-3.13.1-6.0.1.el6_2.src.rpm', u'epoch': u'0', u'version': u'3.13.1', u'release': u'6.0.1.el6_2', u'arch': u'src'}, {u'src': None, u'name': u'nss', u'sum': [u'md5', u'c18108f6cf570e1333611e837ee19116'], u'filename': u'nss-3.13.1-6.0.1.el6_2.x86_64.rpm', u'epoch': u'0', u'version': u'3.13.1', u'release': u'6.0.1.el6_2', u'arch': u'x86_64'}, {u'src': None, u'name': u'nss-devel', u'sum': [u'md5', u'b2e0c4bba940bc86abb0d717ceb4df23'], u'filename': u'nss-devel-3.13.1-6.0.1.el6_2.i686.rpm', u'epoch': u'0', u'version': u'3.13.1', u'release': u'6.0.1.el6_2', u'arch': u'i686'}, {u'src': None, u'name': u'nss-devel', u'sum': [u'md5', u'ab0a415f5498f63d9ecfbad25a89caad'], u'filename': u'nss-devel-3.13.1-6.0.1.el6_2.x86_64.rpm', u'epoch': u'0', u'version': u'3.13.1', u'release': u'6.0.1.el6_2', u'arch': u'x86_64'}, {u'src': None, u'name': u'nss-pkcs11-devel', u'sum': [u'md5', u'c14425f1406f7d630ce0c3a6a467677a'], u'filename': u'nss-pkcs11-devel-3.13.1-6.0.1.el6_2.i686.rpm', u'epoch': u'0', u'version': u'3.13.1', u'release': u'6.0.1.el6_2', u'arch': u'i686'}, {u'src': None, u'name': u'nss-pkcs11-devel', u'sum': [u'md5', u'3685fcfd0af1d6bae4347514923dc18d'], u'filename': u'nss-pkcs11-devel-3.13.1-6.0.1.el6_2.x86_64.rpm', u'epoch': u'0', u'version': u'3.13.1', u'release': u'6.0.1.el6_2', u'arch': u'x86_64'}, {u'src': None, u'name': u'nss-sysinit', u'sum': [u'md5', u'd6e997ab0c4c207d29a70f7eef0c0cab'], u'filename': u'nss-sysinit-3.13.1-6.0.1.el6_2.x86_64.rpm', u'epoch': u'0', u'version': u'3.13.1', u'release': u'6.0.1.el6_2', u'arch': u'x86_64'}, {u'src': None, u'name': u'nss-tools', u'sum': [u'md5', u'84f2510b3cbe99a997832a305a4f7cfb'], u'filename': u'nss-tools-3.13.1-6.0.1.el6_2.x86_64.rpm', u'epoch': u'0', u'version': u'3.13.1', u'release': u'6.0.1.el6_2', u'arch': u'x86_64'}, {u'src': None, u'name': u'nss-util', u'sum': [u'md5', u'e9551037c1c4ca3c65f31c78daf1b996'], u'filename': u'nss-util-3.13.1-3.el6_2.i686.rpm', u'epoch': u'0', u'version': u'3.13.1', u'release': u'3.el6_2', u'arch': u'i686'}, {u'src': None, u'name': u'nss-util', u'sum': [u'md5', u'5e074c99ca4a4ed8202ed491ae0b9276'], u'filename': u'nss-util-3.13.1-3.el6_2.src.rpm', u'epoch': u'0', u'version': u'3.13.1', u'release': u'3.el6_2', u'arch': u'src'}, {u'src': None, u'name': u'nss-util', u'sum': [u'md5', u'81a0bb285dc9cf4bc85933aec1e47e67'], u'filename': u'nss-util-3.13.1-3.el6_2.x86_64.rpm', u'epoch': u'0', u'version': u'3.13.1', u'release': u'3.el6_2', u'arch': u'x86_64'}, {u'src': None, u'name': u'nss-util-devel', u'sum': [u'md5', u'0d006d4d28338dc9a64d1a0524b24881'], u'filename': u'nss-util-devel-3.13.1-3.el6_2.i686.rpm', u'epoch': u'0', u'version': u'3.13.1', u'release': u'3.el6_2', u'arch': u'i686'}, {u'src': None, u'name': u'nss-util-devel', u'sum': [u'md5', u'99e52a1b8c3b2a30ee95618e19fe1887'], u'filename': u'nss-util-devel-3.13.1-3.el6_2.x86_64.rpm', u'epoch': u'0', u'version': u'3.13.1', u'release': u'3.el6_2', u'arch': u'x86_64'}], u'name': u'ol6_x86_64_latest', u'short': u'ol6_x86_64_latest'}, {u'packages': [{u'src': None, u'name': u'nspr', u'sum': [u'md5', u'5e5461d2ece6bd4f40fc3d4df0be27a6'], u'filename': u'nspr-4.8.9-1.el5_8.i386.rpm', u'epoch': u'0', u'version': u'4.8.9', u'release': u'1.el5_8', u'arch': u'i386'}, {u'src': None, u'name': u'nspr', u'sum': [u'md5', u'f64c13cbb43141397a0fe8957b109153'], u'filename': u'nspr-4.8.9-1.el5_8.src.rpm', u'epoch': u'0', u'version': u'4.8.9', u'release': u'1.el5_8', u'arch': u'src'}, {u'src': None, u'name': u'nspr', u'sum': [u'md5', u'b2f7f206ea284ab074033ac552fadf60'], u'filename': u'nspr-4.8.9-1.el5_8.x86_64.rpm', u'epoch': u'0', u'version': u'4.8.9', u'release': u'1.el5_8', u'arch': u'x86_64'}, {u'src': None, u'name': u'nspr-devel', u'sum': [u'md5', u'ecc3621315af2c84e7fe686b3ffd82a3'], u'filename': u'nspr-devel-4.8.9-1.el5_8.i386.rpm', u'epoch': u'0', u'version': u'4.8.9', u'release': u'1.el5_8', u'arch': u'i386'}, {u'src': None, u'name': u'nspr-devel', u'sum': [u'md5', u'11375d4f068011ac0f397f4fe5ed4848'], u'filename': u'nspr-devel-4.8.9-1.el5_8.x86_64.rpm', u'epoch': u'0', u'version': u'4.8.9', u'release': u'1.el5_8', u'arch': u'x86_64'}, {u'src': None, u'name': u'nss', u'sum': [u'md5', u'5773124e4d9694dd57e535d8dd983ba7'], u'filename': u'nss-3.13.1-3.0.1.el5_8.i386.rpm', u'epoch': u'0', u'version': u'3.13.1', u'release': u'3.0.1.el5_8', u'arch': u'i386'}, {u'src': None, u'name': u'nss', u'sum': [u'md5', u'e57d5240ffa31fe6244a490314b5e086'], u'filename': u'nss-3.13.1-3.0.1.el5_8.src.rpm', u'epoch': u'0', u'version': u'3.13.1', u'release': u'3.0.1.el5_8', u'arch': u'src'}, {u'src': None, u'name': u'nss', u'sum': [u'md5', u'8db536598aa6a276a62fe79320708e08'], u'filename': u'nss-3.13.1-3.0.1.el5_8.x86_64.rpm', u'epoch': u'0', u'version': u'3.13.1', u'release': u'3.0.1.el5_8', u'arch': u'x86_64'}, {u'src': None, u'name': u'nss-devel', u'sum': [u'md5', u'1815cb7238b0bff35d95f2b97d149b95'], u'filename': u'nss-devel-3.13.1-3.0.1.el5_8.i386.rpm', u'epoch': u'0', u'version': u'3.13.1', u'release': u'3.0.1.el5_8', u'arch': u'i386'}, {u'src': None, u'name': u'nss-devel', u'sum': [u'md5', u'9db4dd6cf1374c0934af9f4b5cfd0a9b'], u'filename': u'nss-devel-3.13.1-3.0.1.el5_8.x86_64.rpm', u'epoch': u'0', u'version': u'3.13.1', u'release': u'3.0.1.el5_8', u'arch': u'x86_64'}, {u'src': None, u'name': u'nss-pkcs11-devel', u'sum': [u'md5', u'977d8f02f2349bad00853089e38e41f9'], u'filename': u'nss-pkcs11-devel-3.13.1-3.0.1.el5_8.i386.rpm', u'epoch': u'0', u'version': u'3.13.1', u'release': u'3.0.1.el5_8', u'arch': u'i386'}, {u'src': None, u'name': u'nss-pkcs11-devel', u'sum': [u'md5', u'6dd5dc37a2fe3ab0771bcfa0c82cb222'], u'filename': u'nss-pkcs11-devel-3.13.1-3.0.1.el5_8.x86_64.rpm', u'epoch': u'0', u'version': u'3.13.1', u'release': u'3.0.1.el5_8', u'arch': u'x86_64'}, {u'src': None, u'name': u'nss-tools', u'sum': [u'md5', u'6125e8883eac7fe5584218602bf2e982'], u'filename': u'nss-tools-3.13.1-3.0.1.el5_8.x86_64.rpm', u'epoch': u'0', u'version': u'3.13.1', u'release': u'3.0.1.el5_8', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u'[3.13.1-7.0.1.el6_2]\n- Use blank image instead of clean.gif in tar ball\n\n[3.13.1-7]\n- Resolves: rhbz#798461 - Protect NSS_Shutdown from clients that fail to initialize nss', u'issued': u'2012-03-05', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELBA-2012-0344.html', u'type': u'self', u'id': None, u'title': u'ELBA-2012-0344'}], u'_content_type_id': u'erratum', u'_id': u'14a3488a-6b2b-42ef-b57f-eec0b1957c40', u'from': u'el-errata@oss.oracle.com', u'severity': u'', u'title': u'nss bug fix update', u'_ns': u'units_erratum', u'rights': u'Copyright 2012 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 6', u'reboot_suggested': False, u'type': u'bugfix', u'pkglist': [{u'packages': [{u'src': None, u'name': u'nss', u'sum': [u'md5', u'd013f305267bcc39c24c3b2146ac5824'], u'filename': u'nss-3.13.1-7.0.1.el6_2.i686.rpm', u'epoch': u'0', u'version': u'3.13.1', u'release': u'7.0.1.el6_2', u'arch': u'i686'}, {u'src': None, u'name': u'nss', u'sum': [u'md5', u'b4d0f503947340243b511c49f4bc7917'], u'filename': u'nss-3.13.1-7.0.1.el6_2.src.rpm', u'epoch': u'0', u'version': u'3.13.1', u'release': u'7.0.1.el6_2', u'arch': u'src'}, {u'src': None, u'name': u'nss', u'sum': [u'md5', u'8d90cc581189380f11775efa3685a73a'], u'filename': u'nss-3.13.1-7.0.1.el6_2.x86_64.rpm', u'epoch': u'0', u'version': u'3.13.1', u'release': u'7.0.1.el6_2', u'arch': u'x86_64'}, {u'src': None, u'name': u'nss-devel', u'sum': [u'md5', u'290df5b511952a27602f9402f59257b4'], u'filename': u'nss-devel-3.13.1-7.0.1.el6_2.i686.rpm', u'epoch': u'0', u'version': u'3.13.1', u'release': u'7.0.1.el6_2', u'arch': u'i686'}, {u'src': None, u'name': u'nss-devel', u'sum': [u'md5', u'8cd8f2cbe9f8805507367f6268d9f813'], u'filename': u'nss-devel-3.13.1-7.0.1.el6_2.x86_64.rpm', u'epoch': u'0', u'version': u'3.13.1', u'release': u'7.0.1.el6_2', u'arch': u'x86_64'}, {u'src': None, u'name': u'nss-pkcs11-devel', u'sum': [u'md5', u'3ee24880b6bd0101c4ec22b20ae10f45'], u'filename': u'nss-pkcs11-devel-3.13.1-7.0.1.el6_2.i686.rpm', u'epoch': u'0', u'version': u'3.13.1', u'release': u'7.0.1.el6_2', u'arch': u'i686'}, {u'src': None, u'name': u'nss-pkcs11-devel', u'sum': [u'md5', u'cec54d0dcbceab39486252724156ac4e'], u'filename': u'nss-pkcs11-devel-3.13.1-7.0.1.el6_2.x86_64.rpm', u'epoch': u'0', u'version': u'3.13.1', u'release': u'7.0.1.el6_2', u'arch': u'x86_64'}, {u'src': None, u'name': u'nss-sysinit', u'sum': [u'md5', u'2cad4908dbd2b1f33e2ca86700999365'], u'filename': u'nss-sysinit-3.13.1-7.0.1.el6_2.x86_64.rpm', u'epoch': u'0', u'version': u'3.13.1', u'release': u'7.0.1.el6_2', u'arch': u'x86_64'}, {u'src': None, u'name': u'nss-tools', u'sum': [u'md5', u'1ec7ca9da05bc0d3228b77b99d19362e'], u'filename': u'nss-tools-3.13.1-7.0.1.el6_2.x86_64.rpm', u'epoch': u'0', u'version': u'3.13.1', u'release': u'7.0.1.el6_2', u'arch': u'x86_64'}], u'name': u'ol6_x86_64_latest', u'short': u'ol6_x86_64_latest'}, {u'packages': [{u'src': None, u'name': u'nss', u'sum': [u'md5', u'1a35d014bef6204fbe120218a28cfef4'], u'filename': u'nss-3.13.1-5.0.1.el5_8.i386.rpm', u'epoch': u'0', u'version': u'3.13.1', u'release': u'5.0.1.el5_8', u'arch': u'i386'}, {u'src': None, u'name': u'nss', u'sum': [u'md5', u'8b54b9ae710cd41e04d0c716f0c16709'], u'filename': u'nss-3.13.1-5.0.1.el5_8.src.rpm', u'epoch': u'0', u'version': u'3.13.1', u'release': u'5.0.1.el5_8', u'arch': u'src'}, {u'src': None, u'name': u'nss', u'sum': [u'md5', u'ae3aa8a45672e63fd458f60e84a551fd'], u'filename': u'nss-3.13.1-5.0.1.el5_8.x86_64.rpm', u'epoch': u'0', u'version': u'3.13.1', u'release': u'5.0.1.el5_8', u'arch': u'x86_64'}, {u'src': None, u'name': u'nss-devel', u'sum': [u'md5', u'6d958a313958d0dc6bc49d633c610b7a'], u'filename': u'nss-devel-3.13.1-5.0.1.el5_8.i386.rpm', u'epoch': u'0', u'version': u'3.13.1', u'release': u'5.0.1.el5_8', u'arch': u'i386'}, {u'src': None, u'name': u'nss-devel', u'sum': [u'md5', u'c0a8634bb4ad2f504029a9f32ed59400'], u'filename': u'nss-devel-3.13.1-5.0.1.el5_8.x86_64.rpm', u'epoch': u'0', u'version': u'3.13.1', u'release': u'5.0.1.el5_8', u'arch': u'x86_64'}, {u'src': None, u'name': u'nss-pkcs11-devel', u'sum': [u'md5', u'e640bc67c99bdb3053edea7b415be021'], u'filename': u'nss-pkcs11-devel-3.13.1-5.0.1.el5_8.i386.rpm', u'epoch': u'0', u'version': u'3.13.1', u'release': u'5.0.1.el5_8', u'arch': u'i386'}, {u'src': None, u'name': u'nss-pkcs11-devel', u'sum': [u'md5', u'09b5d1cad2f3dd53a6fb3d0d09823e28'], u'filename': u'nss-pkcs11-devel-3.13.1-5.0.1.el5_8.x86_64.rpm', u'epoch': u'0', u'version': u'3.13.1', u'release': u'5.0.1.el5_8', u'arch': u'x86_64'}, {u'src': None, u'name': u'nss-tools', u'sum': [u'md5', u'663ab81decb85e01954e69172de546e7'], u'filename': u'nss-tools-3.13.1-5.0.1.el5_8.x86_64.rpm', u'epoch': u'0', u'version': u'3.13.1', u'release': u'5.0.1.el5_8', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u'[2.6.18-308.1.1.el5]\n- Revert: [scsi] qla2xxx: avoid SCSI host_lock dep in queuecommand (Chad Dupuis) [790907 782790]\n- Revert: [scsi] qla2xxx: fix IO failure during chip reset (Chad Dupuis) [790907 782790]\n- [net] tg3: Fix 4k tx and recovery code (John Feeney) [790910 782677]\n- [net] bnx2x: make bnx2x_close static again (Michal Schmidt) [790912 782124]\n- [net] bnx2x: add fan failure event handling (Michal Schmidt) [790912 782124]\n- [usb] cdc-acm: make lock use interrupt safe (Bryn M. Reeves) [790778 789067]\n- [kernel] sysctl: restrict write access to dmesg_restrict (Phillip Lougher) [749246 749247]\n- [net] igb: reset PHY after recovering from PHY power down (Stefan Assmann) [786168 783043]\n- [fs] prevent lock contention in shrink_dcache_sb via private list (Lachlan McIlroy) [789369 746122]', u'issued': u'2012-03-07', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELBA-2012-0361.html', u'type': u'self', u'id': None, u'title': u'ELBA-2012-0361'}], u'_content_type_id': u'erratum', u'_id': u'1108eee8-e34f-4bc3-be81-c7d071112c62', u'from': u'el-errata@oss.oracle.com', u'severity': u'', u'title': u'kernel bug fix', u'_ns': u'units_erratum', u'rights': u'Copyright 2012 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 5', u'reboot_suggested': False, u'type': u'bugfix', u'pkglist': [{u'packages': [{u'src': None, u'name': u'kernel', u'sum': [u'md5', u'6f1ea941470bf091d97a1e96cf356ae3'], u'filename': u'kernel-2.6.18-308.1.1.el5.src.rpm', u'epoch': u'0', u'version': u'2.6.18', u'release': u'308.1.1.el5', u'arch': u'src'}, {u'src': None, u'name': u'kernel', u'sum': [u'md5', u'965e414f5f69b99ade7bd8b76be93ca8'], u'filename': u'kernel-2.6.18-308.1.1.el5.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.18', u'release': u'308.1.1.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'kernel-debug', u'sum': [u'md5', u'1b033613657c9b1182637c12a26201b1'], u'filename': u'kernel-debug-2.6.18-308.1.1.el5.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.18', u'release': u'308.1.1.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'kernel-debug-devel', u'sum': [u'md5', u'de733149be206d8c975b3a0a3296f04a'], u'filename': u'kernel-debug-devel-2.6.18-308.1.1.el5.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.18', u'release': u'308.1.1.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'kernel-devel', u'sum': [u'md5', u'187e7dfb74c566be5ca50d0c5214a209'], u'filename': u'kernel-devel-2.6.18-308.1.1.el5.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.18', u'release': u'308.1.1.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'kernel-doc', u'sum': [u'md5', u'298bc8e02c575d0a338a56d7eb174bf3'], u'filename': u'kernel-doc-2.6.18-308.1.1.el5.noarch.rpm', u'epoch': u'0', u'version': u'2.6.18', u'release': u'308.1.1.el5', u'arch': u'noarch'}, {u'src': None, u'name': u'kernel-headers', u'sum': [u'md5', u'5dccc37c9390796bb77e1c3e4149a736'], u'filename': u'kernel-headers-2.6.18-308.1.1.el5.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.18', u'release': u'308.1.1.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'kernel-xen', u'sum': [u'md5', u'028f17f00bf88783009c704bf71315a5'], u'filename': u'kernel-xen-2.6.18-308.1.1.el5.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.18', u'release': u'308.1.1.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'kernel-xen-devel', u'sum': [u'md5', u'5319e74009a567edcc29e20e4ab54af6'], u'filename': u'kernel-xen-devel-2.6.18-308.1.1.el5.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.18', u'release': u'308.1.1.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'ocfs2-2.6.18-308.1.1.el5', u'sum': [u'md5', u'3f9ec3230049191d20607067a2d1eddc'], u'filename': u'ocfs2-2.6.18-308.1.1.el5-1.4.9-1.el5.src.rpm', u'epoch': u'0', u'version': u'1.4.9', u'release': u'1.el5', u'arch': u'src'}, {u'src': None, u'name': u'ocfs2-2.6.18-308.1.1.el5', u'sum': [u'md5', u'1ee18ea8d592d4a07bfd7f6beab93aeb'], u'filename': u'ocfs2-2.6.18-308.1.1.el5-1.4.9-1.el5.x86_64.rpm', u'epoch': u'0', u'version': u'1.4.9', u'release': u'1.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'ocfs2-2.6.18-308.1.1.el5debug', u'sum': [u'md5', u'c5f94909a9ce9dd6276a53d17d811083'], u'filename': u'ocfs2-2.6.18-308.1.1.el5debug-1.4.9-1.el5.x86_64.rpm', u'epoch': u'0', u'version': u'1.4.9', u'release': u'1.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'ocfs2-2.6.18-308.1.1.el5xen', u'sum': [u'md5', u'4fdf4a23028e495769f66f4a905c259b'], u'filename': u'ocfs2-2.6.18-308.1.1.el5xen-1.4.9-1.el5.x86_64.rpm', u'epoch': u'0', u'version': u'1.4.9', u'release': u'1.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'oracleasm-2.6.18-308.1.1.el5', u'sum': [u'md5', u'76335f900ba24fd86869e81d23bc0b95'], u'filename': u'oracleasm-2.6.18-308.1.1.el5-2.0.5-1.el5.src.rpm', u'epoch': u'0', u'version': u'2.0.5', u'release': u'1.el5', u'arch': u'src'}, {u'src': None, u'name': u'oracleasm-2.6.18-308.1.1.el5', u'sum': [u'md5', u'7a9e1733d71ffead247ac3234f62f2a4'], u'filename': u'oracleasm-2.6.18-308.1.1.el5-2.0.5-1.el5.x86_64.rpm', u'epoch': u'0', u'version': u'2.0.5', u'release': u'1.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'oracleasm-2.6.18-308.1.1.el5debug', u'sum': [u'md5', u'a55021ead5e31e1a561ca74bae2f88fd'], u'filename': u'oracleasm-2.6.18-308.1.1.el5debug-2.0.5-1.el5.x86_64.rpm', u'epoch': u'0', u'version': u'2.0.5', u'release': u'1.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'oracleasm-2.6.18-308.1.1.el5xen', u'sum': [u'md5', u'8fc8bedb3953aceee90c5d2ac92672f9'], u'filename': u'oracleasm-2.6.18-308.1.1.el5xen-2.0.5-1.el5.x86_64.rpm', u'epoch': u'0', u'version': u'2.0.5', u'release': u'1.el5', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u"[2.6.18-308.1.1.0.1.el5]\n- [net] bonding: fix carrier detect when bond is down [orabug 12377284]\n- [mm] fix hugetlb page leak (Dave McCracken) [orabug 12375075]\n- fix ia64 build error due to add-support-above-32-vcpus.patch(Zhenzhong Duan)\n- [x86] use dynamic vcpu_info remap to support more than 32 vcpus (Zhenzhong Duan)\n- [x86] Fix lvt0 reset when hvm boot up with noapic param\n- [scsi] remove printk's when doing I/O to a dead device (John Sobecki, Chris Mason)\n [orabug 12342275]\n- [char] ipmi: Fix IPMI errors due to timing problems (Joe Jin) [orabug 12561346]\n- [scsi] Fix race when removing SCSI devices (Joe Jin) [orabug 12404566]\n- [net] net: Redo the broken redhat netconsole over bonding (Tina Yang) [orabug 12740042]\n- [fs] nfs: Fix __put_nfs_open_context() NULL pointer panic (Joe Jin) [orabug 12687646]\n- [scsi] fix scsi hotplug and rescan race [orabug 10260172]\n- fix filp_close() race (Joe Jin) [orabug 10335998]\n- make xenkbd.abs_pointer=1 by default [orabug 67188919]\n- [xen] check to see if hypervisor supports memory reservation change\n (Chuck Anderson) [orabug 7556514]\n- [net] Enable entropy for bnx2,bnx2x,e1000e,igb,ixgb,ixgbe,ixgbevf (John Sobecki)\n [orabug 10315433]\n- [NET] Add xen pv netconsole support (Tina Yang) [orabug 6993043] [bz 7258]\n- [mm] shrink_zone patch (John Sobecki,Chris Mason) [orabug 6086839]\n- fix aacraid not to reset during kexec (Joe Jin) [orabug 8516042]\n- [rds] Patch rds to 1.4.2-20 (Andy Grover) [orabug 9471572, 9344105]\n RDS: Fix BUG_ONs to not fire when in a tasklet\n ipoib: Fix lockup of the tx queue\n RDS: Do not call set_page_dirty() with irqs off (Sherman Pun)\n RDS: Properly unmap when getting a remote access error (Tina Yang)\n RDS: Fix locking in rds_send_drop_to()\n- [xen] PVHVM guest with PoD crashes under memory pressure (Chuck Anderson)\n [orabug 9107465]\n- [xen] PV guest with FC HBA hangs during shutdown (Chuck Anderson)\n [orabug 9764220]\n- Support 256GB+ memory for pv guest (Mukesh Rathor) [orabug 9450615]\n- fix overcommit memory to use percpu_counter for el5 (KOSAKI Motohiro,\n Guru Anbalagane) [orabug 6124033]\n- [ipmi] make configurable timeouts for kcs of ipmi [orabug 9752208]\n- [ib] fix memory corruption (Andy Grover) [orabug 9972346]\n\n[2.6.18-308.1.1.el5]\n- Revert: [scsi] qla2xxx: avoid SCSI host_lock dep in queuecommand (Chad Dupuis) [790907 782790]\n- Revert: [scsi] qla2xxx: fix IO failure during chip reset (Chad Dupuis) [790907 782790]\n- [net] tg3: Fix 4k tx and recovery code (John Feeney) [790910 782677]\n- [net] bnx2x: make bnx2x_close static again (Michal Schmidt) [790912 782124]\n- [net] bnx2x: add fan failure event handling (Michal Schmidt) [790912 782124]\n- [usb] cdc-acm: make lock use interrupt safe (Bryn M. Reeves) [790778 789067]\n- [kernel] sysctl: restrict write access to dmesg_restrict (Phillip Lougher) [749246 749247]\n- [net] igb: reset PHY after recovering from PHY power down (Stefan Assmann) [786168 783043]\n- [fs] prevent lock contention in shrink_dcache_sb via private list (Lachlan McIlroy) [789369 746122]", u'issued': u'2012-03-07', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELBA-2012-0361-1.html', u'type': u'self', u'id': None, u'title': u'ELBA-2012-0361-1'}], u'_content_type_id': u'erratum', u'_id': u'25760322-428b-447d-b88f-58bcb3351fa8', u'from': u'el-errata@oss.oracle.com', u'severity': u'', u'title': u'kernel bug fix', u'_ns': u'units_erratum', u'rights': u'Copyright 2012 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 5', u'reboot_suggested': False, u'type': u'bugfix', u'pkglist': [{u'packages': [{u'src': None, u'name': u'kernel', u'sum': [u'md5', u'd08ce345e003a21f908b6d7b3c029981'], u'filename': u'kernel-2.6.18-308.1.1.0.1.el5.src.rpm', u'epoch': u'0', u'version': u'2.6.18', u'release': u'308.1.1.0.1.el5', u'arch': u'src'}, {u'src': None, u'name': u'kernel', u'sum': [u'md5', u'b34c3eabd32c1e7c129e9b9b10d5fd4c'], u'filename': u'kernel-2.6.18-308.1.1.0.1.el5.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.18', u'release': u'308.1.1.0.1.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'kernel-debug', u'sum': [u'md5', u'34f8fbe91f4c9d17be2bb1123887fe54'], u'filename': u'kernel-debug-2.6.18-308.1.1.0.1.el5.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.18', u'release': u'308.1.1.0.1.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'kernel-debug-devel', u'sum': [u'md5', u'2e3827f25899304fa32ecea16c3e9861'], u'filename': u'kernel-debug-devel-2.6.18-308.1.1.0.1.el5.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.18', u'release': u'308.1.1.0.1.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'kernel-devel', u'sum': [u'md5', u'88aae21b5e2872c2ec92908da76a57f6'], u'filename': u'kernel-devel-2.6.18-308.1.1.0.1.el5.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.18', u'release': u'308.1.1.0.1.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'kernel-doc', u'sum': [u'md5', u'20173208d08bb821623ddfcfe47d854c'], u'filename': u'kernel-doc-2.6.18-308.1.1.0.1.el5.noarch.rpm', u'epoch': u'0', u'version': u'2.6.18', u'release': u'308.1.1.0.1.el5', u'arch': u'noarch'}, {u'src': None, u'name': u'kernel-headers', u'sum': [u'md5', u'77f2728ff286fc83929cf84a38a8d32d'], u'filename': u'kernel-headers-2.6.18-308.1.1.0.1.el5.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.18', u'release': u'308.1.1.0.1.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'kernel-xen', u'sum': [u'md5', u'19dc022fbf400e1fa14bbfe9f381e3bc'], u'filename': u'kernel-xen-2.6.18-308.1.1.0.1.el5.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.18', u'release': u'308.1.1.0.1.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'kernel-xen-devel', u'sum': [u'md5', u'ea6149846aad8456c24183caf6b36c43'], u'filename': u'kernel-xen-devel-2.6.18-308.1.1.0.1.el5.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.18', u'release': u'308.1.1.0.1.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'ocfs2-2.6.18-308.1.1.0.1.el5', u'sum': [u'md5', u'daed957b69feb4f0fed73120c6324ba1'], u'filename': u'ocfs2-2.6.18-308.1.1.0.1.el5-1.4.9-1.el5.src.rpm', u'epoch': u'0', u'version': u'1.4.9', u'release': u'1.el5', u'arch': u'src'}, {u'src': None, u'name': u'ocfs2-2.6.18-308.1.1.0.1.el5', u'sum': [u'md5', u'c916de3575ef43c19383b35b3ab96799'], u'filename': u'ocfs2-2.6.18-308.1.1.0.1.el5-1.4.9-1.el5.x86_64.rpm', u'epoch': u'0', u'version': u'1.4.9', u'release': u'1.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'ocfs2-2.6.18-308.1.1.0.1.el5debug', u'sum': [u'md5', u'302761884bd63308ba02af1a373d254c'], u'filename': u'ocfs2-2.6.18-308.1.1.0.1.el5debug-1.4.9-1.el5.x86_64.rpm', u'epoch': u'0', u'version': u'1.4.9', u'release': u'1.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'ocfs2-2.6.18-308.1.1.0.1.el5xen', u'sum': [u'md5', u'fa8a5e4e1ab33e132701a390c6e17f8b'], u'filename': u'ocfs2-2.6.18-308.1.1.0.1.el5xen-1.4.9-1.el5.x86_64.rpm', u'epoch': u'0', u'version': u'1.4.9', u'release': u'1.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'oracleasm-2.6.18-308.1.1.0.1.el5', u'sum': [u'md5', u'e466041823ddfa93d78b3a1c17fa4e79'], u'filename': u'oracleasm-2.6.18-308.1.1.0.1.el5-2.0.5-1.el5.src.rpm', u'epoch': u'0', u'version': u'2.0.5', u'release': u'1.el5', u'arch': u'src'}, {u'src': None, u'name': u'oracleasm-2.6.18-308.1.1.0.1.el5', u'sum': [u'md5', u'1f79f52bccd210ae4528a692b077cac1'], u'filename': u'oracleasm-2.6.18-308.1.1.0.1.el5-2.0.5-1.el5.x86_64.rpm', u'epoch': u'0', u'version': u'2.0.5', u'release': u'1.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'oracleasm-2.6.18-308.1.1.0.1.el5debug', u'sum': [u'md5', u'a4808d6aa2c0709baa529fac3606e493'], u'filename': u'oracleasm-2.6.18-308.1.1.0.1.el5debug-2.0.5-1.el5.x86_64.rpm', u'epoch': u'0', u'version': u'2.0.5', u'release': u'1.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'oracleasm-2.6.18-308.1.1.0.1.el5xen', u'sum': [u'md5', u'25b2d2dd431cb6876996df9907bc2297'], u'filename': u'oracleasm-2.6.18-308.1.1.0.1.el5xen-2.0.5-1.el5.x86_64.rpm', u'epoch': u'0', u'version': u'2.0.5', u'release': u'1.el5', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u'[2.3.1-6.1]\n- fixed include problem with mzbz#1381 (rhbz#772937)', u'issued': u'2012-03-07', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELBA-2012-0363.html', u'type': u'self', u'id': None, u'title': u'ELBA-2012-0363'}], u'_content_type_id': u'erratum', u'_id': u'8f7df744-a0b1-4f61-a40c-b2ab713bbd76', u'from': u'el-errata@oss.oracle.com', u'severity': u'', u'title': u'openmotif bug fix update', u'_ns': u'units_erratum', u'rights': u'Copyright 2012 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 5', u'reboot_suggested': False, u'type': u'bugfix', u'pkglist': [{u'packages': [{u'src': None, u'name': u'openmotif', u'sum': [u'md5', u'0d0e6faa2def4864b8d15b00fe13b928'], u'filename': u'openmotif-2.3.1-6.1.el5_8.i386.rpm', u'epoch': u'0', u'version': u'2.3.1', u'release': u'6.1.el5_8', u'arch': u'i386'}, {u'src': None, u'name': u'openmotif', u'sum': [u'md5', u'7a3a06a391028cce1227e729555fcd01'], u'filename': u'openmotif-2.3.1-6.1.el5_8.src.rpm', u'epoch': u'0', u'version': u'2.3.1', u'release': u'6.1.el5_8', u'arch': u'src'}, {u'src': None, u'name': u'openmotif', u'sum': [u'md5', u'81eee4d8600c6a2165b6164839b23b15'], u'filename': u'openmotif-2.3.1-6.1.el5_8.x86_64.rpm', u'epoch': u'0', u'version': u'2.3.1', u'release': u'6.1.el5_8', u'arch': u'x86_64'}, {u'src': None, u'name': u'openmotif-devel', u'sum': [u'md5', u'21199a9e0340726d5f2e3b7947ac5760'], u'filename': u'openmotif-devel-2.3.1-6.1.el5_8.i386.rpm', u'epoch': u'0', u'version': u'2.3.1', u'release': u'6.1.el5_8', u'arch': u'i386'}, {u'src': None, u'name': u'openmotif-devel', u'sum': [u'md5', u'7f6b58a4ddbe53eec1dc3eec732cfb5e'], u'filename': u'openmotif-devel-2.3.1-6.1.el5_8.x86_64.rpm', u'epoch': u'0', u'version': u'2.3.1', u'release': u'6.1.el5_8', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u'[2.19-9.el5_6.1]\n- Fixed returned value when all entries requested and no such \n map exists\n Resolves: #788445', u'issued': u'2012-03-13', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELBA-2012-0379.html', u'type': u'self', u'id': None, u'title': u'ELBA-2012-0379'}], u'_content_type_id': u'erratum', u'_id': u'ee163526-f125-4949-af4c-60473bdc8d04', u'from': u'el-errata@oss.oracle.com', u'severity': u'', u'title': u'ypserv bug fix update', u'_ns': u'units_erratum', u'rights': u'Copyright 2012 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 5', u'reboot_suggested': False, u'type': u'bugfix', u'pkglist': [{u'packages': [{u'src': None, u'name': u'ypserv', u'sum': [u'md5', u'5c106db270725955671a1cd065573697'], u'filename': u'ypserv-2.19-9.el5_8.1.src.rpm', u'epoch': u'0', u'version': u'2.19', u'release': u'9.el5_8.1', u'arch': u'src'}, {u'src': None, u'name': u'ypserv', u'sum': [u'md5', u'6f77f883f337d9f044fb7d5bc42aed82'], u'filename': u'ypserv-2.19-9.el5_8.1.x86_64.rpm', u'epoch': u'0', u'version': u'2.19', u'release': u'9.el5_8.1', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u'[2.0.115-96.1]\n- fence_rhevm: Incorrect power status detected when VM status is not up/down\n Resolves: rhbz#795665', u'issued': u'2012-03-19', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELBA-2012-0395.html', u'type': u'self', u'id': None, u'title': u'ELBA-2012-0395'}], u'_content_type_id': u'erratum', u'_id': u'ecf535fd-46e1-4f11-bd73-ba498348bd38', u'from': u'el-errata@oss.oracle.com', u'severity': u'', u'title': u'cman bug fix update', u'_ns': u'units_erratum', u'rights': u'Copyright 2012 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 5', u'reboot_suggested': False, u'type': u'bugfix', u'pkglist': [{u'packages': [{u'src': None, u'name': u'cman', u'sum': [u'md5', u'cce3853ee653b548dc86ae50f0b026f9'], u'filename': u'cman-2.0.115-96.el5_8.1.src.rpm', u'epoch': u'0', u'version': u'2.0.115', u'release': u'96.el5_8.1', u'arch': u'src'}, {u'src': None, u'name': u'cman', u'sum': [u'md5', u'df1492f93dbf022c451d50c686d79421'], u'filename': u'cman-2.0.115-96.el5_8.1.x86_64.rpm', u'epoch': u'0', u'version': u'2.0.115', u'release': u'96.el5_8.1', u'arch': u'x86_64'}, {u'src': None, u'name': u'cman-devel', u'sum': [u'md5', u'f10081403c36f5fb0e13f04385756495'], u'filename': u'cman-devel-2.0.115-96.el5_8.1.i386.rpm', u'epoch': u'0', u'version': u'2.0.115', u'release': u'96.el5_8.1', u'arch': u'i386'}, {u'src': None, u'name': u'cman-devel', u'sum': [u'md5', u'b616d68e1cceebf21fce3757c3c3ed12'], u'filename': u'cman-devel-2.0.115-96.el5_8.1.x86_64.rpm', u'epoch': u'0', u'version': u'2.0.115', u'release': u'96.el5_8.1', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u'[kvm-83-249.0.1.el5_8]\n- Added kvm-add-oracle-workaround-for-libvirt-bug.patch\n- Added kvm-Introduce-oel-machine-type.patch\n\n[kvm-83-249.el5_8.1]\n- kvm-posix-aio-compat-fix-thread-accounting-leak.patch [bz#802429]\n- Resolves: bz#802429\n ([RHEL5.8 Snapshot2]RHEL5.8 KVMGuest hung during Guest OS booting up)', u'issued': u'2012-03-21', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELBA-2012-0398.html', u'type': u'self', u'id': None, u'title': u'ELBA-2012-0398'}], u'_content_type_id': u'erratum', u'_id': u'89f3388b-a805-43a6-9b48-2bc12bc30a1e', u'from': u'el-errata@oss.oracle.com', u'severity': u'', u'title': u'kvm bug fix update', u'_ns': u'units_erratum', u'rights': u'Copyright 2012 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 5', u'reboot_suggested': False, u'type': u'bugfix', u'pkglist': [{u'packages': [{u'src': None, u'name': u'kmod-kvm', u'sum': [u'md5', u'07ae8b4ea5e7638c1b22532058c9898d'], u'filename': u'kmod-kvm-83-249.0.1.el5_8.x86_64.rpm', u'epoch': u'0', u'version': u'83', u'release': u'249.0.1.el5_8', u'arch': u'x86_64'}, {u'src': None, u'name': u'kmod-kvm-debug', u'sum': [u'md5', u'5994f8e482e1e9268f06e4159968cf40'], u'filename': u'kmod-kvm-debug-83-249.0.1.el5_8.x86_64.rpm', u'epoch': u'0', u'version': u'83', u'release': u'249.0.1.el5_8', u'arch': u'x86_64'}, {u'src': None, u'name': u'kvm', u'sum': [u'md5', u'899844ef8d90de2d3c02101a45345a84'], u'filename': u'kvm-83-249.0.1.el5_8.src.rpm', u'epoch': u'0', u'version': u'83', u'release': u'249.0.1.el5_8', u'arch': u'src'}, {u'src': None, u'name': u'kvm', u'sum': [u'md5', u'df8c491d67fc0f7547f8e0fdfdc0ce81'], u'filename': u'kvm-83-249.0.1.el5_8.x86_64.rpm', u'epoch': u'0', u'version': u'83', u'release': u'249.0.1.el5_8', u'arch': u'x86_64'}, {u'src': None, u'name': u'kvm-qemu-img', u'sum': [u'md5', u'39c3d66335fa8a46c1e087a015907cc6'], u'filename': u'kvm-qemu-img-83-249.0.1.el5_8.x86_64.rpm', u'epoch': u'0', u'version': u'83', u'release': u'249.0.1.el5_8', u'arch': u'x86_64'}, {u'src': None, u'name': u'kvm-tools', u'sum': [u'md5', u'db0344b6585178cfe25ace922032b604'], u'filename': u'kvm-tools-83-249.0.1.el5_8.x86_64.rpm', u'epoch': u'0', u'version': u'83', u'release': u'249.0.1.el5_8', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u'[5.97-34.1]\n- fix backup of the individual files (broken by backupdir\n patch - #803356)', u'issued': u'2012-03-21', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELBA-2012-0408.html', u'type': u'self', u'id': None, u'title': u'ELBA-2012-0408'}], u'_content_type_id': u'erratum', u'_id': u'f5a2a005-dfb1-44c1-972f-a95106f3775d', u'from': u'el-errata@oss.oracle.com', u'severity': u'', u'title': u'coreutils bug fix update', u'_ns': u'units_erratum', u'rights': u'Copyright 2012 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 5', u'reboot_suggested': False, u'type': u'bugfix', u'pkglist': [{u'packages': [{u'src': None, u'name': u'coreutils', u'sum': [u'md5', u'17df69633d3f88250deda1b4de92a200'], u'filename': u'coreutils-5.97-34.el5_8.1.src.rpm', u'epoch': u'0', u'version': u'5.97', u'release': u'34.el5_8.1', u'arch': u'src'}, {u'src': None, u'name': u'coreutils', u'sum': [u'md5', u'26aebe65ce58129cfa758543cb59cb06'], u'filename': u'coreutils-5.97-34.el5_8.1.x86_64.rpm', u'epoch': u'0', u'version': u'5.97', u'release': u'34.el5_8.1', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u'[20100621-5.1]\n- fix tilda expansion in scripts (#805459)', u'issued': u'2012-03-28', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELBA-2012-0432.html', u'type': u'self', u'id': None, u'title': u'ELBA-2012-0432'}], u'_content_type_id': u'erratum', u'_id': u'197711f9-495b-4f1f-8bbf-9b3129e4ec1f', u'from': u'el-errata@oss.oracle.com', u'severity': u'', u'title': u'ksh bug fix update', u'_ns': u'units_erratum', u'rights': u'Copyright 2012 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 5', u'reboot_suggested': False, u'type': u'bugfix', u'pkglist': [{u'packages': [{u'src': None, u'name': u'ksh', u'sum': [u'md5', u'0f5b188b67e30b537840a35fab5460c5'], u'filename': u'ksh-20100621-5.el5_8.1.src.rpm', u'epoch': u'0', u'version': u'20100621', u'release': u'5.el5_8.1', u'arch': u'src'}, {u'src': None, u'name': u'ksh', u'sum': [u'md5', u'4c2b84ba2641ffd44310beda17574e49'], u'filename': u'ksh-20100621-5.el5_8.1.x86_64.rpm', u'epoch': u'0', u'version': u'20100621', u'release': u'5.el5_8.1', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u'[0.4.7-48.el5.1]\n- Added bz803849.patch\n- Resolves: bz #806204', u'issued': u'2012-04-02', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELBA-2012-0437.html', u'type': u'self', u'id': None, u'title': u'ELBA-2012-0437'}], u'_content_type_id': u'erratum', u'_id': u'5eea7028-6ef2-4644-8227-7960854b091a', u'from': u'el-errata@oss.oracle.com', u'severity': u'', u'title': u'device-mapper-multipath bug fix update', u'_ns': u'units_erratum', u'rights': u'Copyright 2012 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 5', u'reboot_suggested': False, u'type': u'bugfix', u'pkglist': [{u'packages': [{u'src': None, u'name': u'device-mapper-multipath', u'sum': [u'md5', u'f7a305c1d592dcb80931d6c67e4fcb51'], u'filename': u'device-mapper-multipath-0.4.7-48.el5_8.1.src.rpm', u'epoch': u'0', u'version': u'0.4.7', u'release': u'48.el5_8.1', u'arch': u'src'}, {u'src': None, u'name': u'device-mapper-multipath', u'sum': [u'md5', u'8f87fa3b3fc65e6a67772e83d5b97577'], u'filename': u'device-mapper-multipath-0.4.7-48.el5_8.1.x86_64.rpm', u'epoch': u'0', u'version': u'0.4.7', u'release': u'48.el5_8.1', u'arch': u'x86_64'}, {u'src': None, u'name': u'kpartx', u'sum': [u'md5', u'fa0c0ad540df278ba9b4ef9d35cf8152'], u'filename': u'kpartx-0.4.7-48.el5_8.1.x86_64.rpm', u'epoch': u'0', u'version': u'0.4.7', u'release': u'48.el5_8.1', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u'[1.11.4-3.1]\n- fix wrong return value when server returns an error against PORT request\n\n[1.11.4-3]\n- add fix for CVE-2009-3490, \n incorrect verification of SSL certificate with NUL in name', u'issued': u'2012-04-02', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELBA-2012-0438.html', u'type': u'self', u'id': None, u'title': u'ELBA-2012-0438'}], u'_content_type_id': u'erratum', u'_id': u'2322b921-dab9-4967-b9cb-48c72830e6c6', u'from': u'el-errata@oss.oracle.com', u'severity': u'', u'title': u'wget bug fix update', u'_ns': u'units_erratum', u'rights': u'Copyright 2012 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 5', u'reboot_suggested': False, u'type': u'bugfix', u'pkglist': [{u'packages': [{u'src': None, u'name': u'wget', u'sum': [u'md5', u'0c3d58f7e6f31a5b274a56ce0882fd23'], u'filename': u'wget-1.11.4-3.el5_8.1.src.rpm', u'epoch': u'0', u'version': u'1.11.4', u'release': u'3.el5_8.1', u'arch': u'src'}, {u'src': None, u'name': u'wget', u'sum': [u'md5', u'cdc34d8b9a2e85f8b5b109a2ea54894b'], u'filename': u'wget-1.11.4-3.el5_8.1.x86_64.rpm', u'epoch': u'0', u'version': u'1.11.4', u'release': u'3.el5_8.1', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u'[1.5.1-49.1]\n- Add the ability to disable the LDAP simple paging control\n- Resolves: rhbz#806765 - Intermittent LDAP paging errors', u'issued': u'2012-04-02', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELBA-2012-0440.html', u'type': u'self', u'id': None, u'title': u'ELBA-2012-0440'}], u'_content_type_id': u'erratum', u'_id': u'7785569c-7e8e-4df5-aa31-a0189a25f440', u'from': u'el-errata@oss.oracle.com', u'severity': u'', u'title': u'sssd bug fix update', u'_ns': u'units_erratum', u'rights': u'Copyright 2012 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 5', u'reboot_suggested': False, u'type': u'bugfix', u'pkglist': [{u'packages': [{u'src': None, u'name': u'libipa_hbac', u'sum': [u'md5', u'e87c7a2fe55ee66ea3996920386d02e4'], u'filename': u'libipa_hbac-1.5.1-49.el5_8.1.i386.rpm', u'epoch': u'0', u'version': u'1.5.1', u'release': u'49.el5_8.1', u'arch': u'i386'}, {u'src': None, u'name': u'libipa_hbac', u'sum': [u'md5', u'630fc4d37f8bf414bfd3eae03e98f602'], u'filename': u'libipa_hbac-1.5.1-49.el5_8.1.x86_64.rpm', u'epoch': u'0', u'version': u'1.5.1', u'release': u'49.el5_8.1', u'arch': u'x86_64'}, {u'src': None, u'name': u'libipa_hbac-devel', u'sum': [u'md5', u'1b236d25658565f2e04167007740937d'], u'filename': u'libipa_hbac-devel-1.5.1-49.el5_8.1.i386.rpm', u'epoch': u'0', u'version': u'1.5.1', u'release': u'49.el5_8.1', u'arch': u'i386'}, {u'src': None, u'name': u'libipa_hbac-devel', u'sum': [u'md5', u'e01c61459cb79fd74cf985e2ead578a6'], u'filename': u'libipa_hbac-devel-1.5.1-49.el5_8.1.x86_64.rpm', u'epoch': u'0', u'version': u'1.5.1', u'release': u'49.el5_8.1', u'arch': u'x86_64'}, {u'src': None, u'name': u'libipa_hbac-python', u'sum': [u'md5', u'fb20843d998e38dfb55c6bd6e4f48435'], u'filename': u'libipa_hbac-python-1.5.1-49.el5_8.1.x86_64.rpm', u'epoch': u'0', u'version': u'1.5.1', u'release': u'49.el5_8.1', u'arch': u'x86_64'}, {u'src': None, u'name': u'sssd', u'sum': [u'md5', u'48cd633207d9cd755689d150f966a3ab'], u'filename': u'sssd-1.5.1-49.el5_8.1.src.rpm', u'epoch': u'0', u'version': u'1.5.1', u'release': u'49.el5_8.1', u'arch': u'src'}, {u'src': None, u'name': u'sssd', u'sum': [u'md5', u'17f5f6d85c1587ca822f8cffe1bcd82d'], u'filename': u'sssd-1.5.1-49.el5_8.1.x86_64.rpm', u'epoch': u'0', u'version': u'1.5.1', u'release': u'49.el5_8.1', u'arch': u'x86_64'}, {u'src': None, u'name': u'sssd-client', u'sum': [u'md5', u'2a38fcf493e39cca28adf1d5ca3180cd'], u'filename': u'sssd-client-1.5.1-49.el5_8.1.i386.rpm', u'epoch': u'0', u'version': u'1.5.1', u'release': u'49.el5_8.1', u'arch': u'i386'}, {u'src': None, u'name': u'sssd-client', u'sum': [u'md5', u'0c689902d90553e9911f4e53cd4976cc'], u'filename': u'sssd-client-1.5.1-49.el5_8.1.x86_64.rpm', u'epoch': u'0', u'version': u'1.5.1', u'release': u'49.el5_8.1', u'arch': u'x86_64'}, {u'src': None, u'name': u'sssd-tools', u'sum': [u'md5', u'6c05128fdb5fc950c3ccf3b088373ba2'], u'filename': u'sssd-tools-1.5.1-49.el5_8.1.x86_64.rpm', u'epoch': u'0', u'version': u'1.5.1', u'release': u'49.el5_8.1', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u'[1.1.0-13.2]\n- Resolves: #807801 - ESC crashes when an enrolled smart card is inserted.\n\n[1.1.0-13.1]\n- Resolves: #807269 - esc ceased working after Firefox/xulrunner update to 10 series', u'issued': u'2012-04-11', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELBA-2012-0471.html', u'type': u'self', u'id': None, u'title': u'ELBA-2012-0471'}], u'_content_type_id': u'erratum', u'_id': u'02935727-d0a6-4cb6-b113-cba9daed4ecd', u'from': u'el-errata@oss.oracle.com', u'severity': u'', u'title': u'esc bug fix update', u'_ns': u'units_erratum', u'rights': u'Copyright 2012 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 5', u'reboot_suggested': False, u'type': u'bugfix', u'pkglist': [{u'packages': [{u'src': None, u'name': u'esc', u'sum': [u'md5', u'73265feddd340cf5246ee7c26c3df7b0'], u'filename': u'esc-1.1.0-13.el5_8.2.src.rpm', u'epoch': u'0', u'version': u'1.1.0', u'release': u'13.el5_8.2', u'arch': u'src'}, {u'src': None, u'name': u'esc', u'sum': [u'md5', u'6b0ed892f6bd72b5e8fb3b7afb391b5b'], u'filename': u'esc-1.1.0-13.el5_8.2.x86_64.rpm', u'epoch': u'0', u'version': u'1.1.0', u'release': u'13.el5_8.2', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u'[10.0.3-2.0.1]\n- Added xulrunner-oracle-default-prefs.js and removed the corresponding\n RedHat one.\n\n[10.0.3-2]\n- Fixed mozbz#681937', u'issued': u'2012-04-19', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELBA-2012-0497.html', u'type': u'self', u'id': None, u'title': u'ELBA-2012-0497'}], u'_content_type_id': u'erratum', u'_id': u'f6c627e3-7104-4c09-8783-d06741a5d693', u'from': u'el-errata@oss.oracle.com', u'severity': u'', u'title': u'xulrunner bug fix update', u'_ns': u'units_erratum', u'rights': u'Copyright 2012 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 5', u'reboot_suggested': False, u'type': u'bugfix', u'pkglist': [{u'packages': [{u'src': None, u'name': u'xulrunner', u'sum': [u'md5', u'92b6da6500accfc3d02314d53d35c169'], u'filename': u'xulrunner-10.0.3-2.0.1.el5_8.i386.rpm', u'epoch': u'0', u'version': u'10.0.3', u'release': u'2.0.1.el5_8', u'arch': u'i386'}, {u'src': None, u'name': u'xulrunner', u'sum': [u'md5', u'ad1c0839880cfa143d202f0451cbbe8c'], u'filename': u'xulrunner-10.0.3-2.0.1.el5_8.src.rpm', u'epoch': u'0', u'version': u'10.0.3', u'release': u'2.0.1.el5_8', u'arch': u'src'}, {u'src': None, u'name': u'xulrunner', u'sum': [u'md5', u'50af4714293661dd944c8d66d0ef2b42'], u'filename': u'xulrunner-10.0.3-2.0.1.el5_8.x86_64.rpm', u'epoch': u'0', u'version': u'10.0.3', u'release': u'2.0.1.el5_8', u'arch': u'x86_64'}, {u'src': None, u'name': u'xulrunner-devel', u'sum': [u'md5', u'f18d652f2aae60eb6537502d47ed47c9'], u'filename': u'xulrunner-devel-10.0.3-2.0.1.el5_8.i386.rpm', u'epoch': u'0', u'version': u'10.0.3', u'release': u'2.0.1.el5_8', u'arch': u'i386'}, {u'src': None, u'name': u'xulrunner-devel', u'sum': [u'md5', u'11b937ffd5993351b8d58d6966273465'], u'filename': u'xulrunner-devel-10.0.3-2.0.1.el5_8.x86_64.rpm', u'epoch': u'0', u'version': u'10.0.3', u'release': u'2.0.1.el5_8', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u'[2.5-81.el5_8.2]\n- Fix memory leak in NIS endgrent (#810323)', u'issued': u'2012-04-20', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELBA-2012-0498.html', u'type': u'self', u'id': None, u'title': u'ELBA-2012-0498'}], u'_content_type_id': u'erratum', u'_id': u'91035020-101e-41be-baa2-47195c5b1607', u'from': u'el-errata@oss.oracle.com', u'severity': u'', u'title': u'glibc bug fix update', u'_ns': u'units_erratum', u'rights': u'Copyright 2012 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 5', u'reboot_suggested': False, u'type': u'bugfix', u'pkglist': [{u'packages': [{u'src': None, u'name': u'glibc', u'sum': [u'md5', u'72a4c851f91e88784437fe68e23050ac'], u'filename': u'glibc-2.5-81.el5_8.2.i686.rpm', u'epoch': u'0', u'version': u'2.5', u'release': u'81.el5_8.2', u'arch': u'i686'}, {u'src': None, u'name': u'glibc', u'sum': [u'md5', u'03bbc10bded0b5bf021264e31e60bbe6'], u'filename': u'glibc-2.5-81.el5_8.2.src.rpm', u'epoch': u'0', u'version': u'2.5', u'release': u'81.el5_8.2', u'arch': u'src'}, {u'src': None, u'name': u'glibc', u'sum': [u'md5', u'eb9e0a50d6100b8d9cb726ba47fce205'], u'filename': u'glibc-2.5-81.el5_8.2.x86_64.rpm', u'epoch': u'0', u'version': u'2.5', u'release': u'81.el5_8.2', u'arch': u'x86_64'}, {u'src': None, u'name': u'glibc-common', u'sum': [u'md5', u'a2d2b41eef9086d3880b130be8b94fa1'], u'filename': u'glibc-common-2.5-81.el5_8.2.x86_64.rpm', u'epoch': u'0', u'version': u'2.5', u'release': u'81.el5_8.2', u'arch': u'x86_64'}, {u'src': None, u'name': u'glibc-devel', u'sum': [u'md5', u'109dd9cb2ae9af445866b4cfc64cccb2'], u'filename': u'glibc-devel-2.5-81.el5_8.2.i386.rpm', u'epoch': u'0', u'version': u'2.5', u'release': u'81.el5_8.2', u'arch': u'i386'}, {u'src': None, u'name': u'glibc-devel', u'sum': [u'md5', u'02aa4ad3abd4214e4443dc252de0195b'], u'filename': u'glibc-devel-2.5-81.el5_8.2.x86_64.rpm', u'epoch': u'0', u'version': u'2.5', u'release': u'81.el5_8.2', u'arch': u'x86_64'}, {u'src': None, u'name': u'glibc-headers', u'sum': [u'md5', u'67ecebec95e4715ad13285e044ba42dc'], u'filename': u'glibc-headers-2.5-81.el5_8.2.x86_64.rpm', u'epoch': u'0', u'version': u'2.5', u'release': u'81.el5_8.2', u'arch': u'x86_64'}, {u'src': None, u'name': u'glibc-utils', u'sum': [u'md5', u'229f03c6f269dbc48d8406646d4849a5'], u'filename': u'glibc-utils-2.5-81.el5_8.2.x86_64.rpm', u'epoch': u'0', u'version': u'2.5', u'release': u'81.el5_8.2', u'arch': u'x86_64'}, {u'src': None, u'name': u'nscd', u'sum': [u'md5', u'0d923bac9270ff5323295f6adb73b7be'], u'filename': u'nscd-2.5-81.el5_8.2.x86_64.rpm', u'epoch': u'0', u'version': u'2.5', u'release': u'81.el5_8.2', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u'[0.13.1-6.2]\n- corrected z-stream versioning\n\n[0.13.1-6.1]\n- corrected BuildRequires', u'issued': u'2012-04-20', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELBA-2012-0499.html', u'type': u'self', u'id': None, u'title': u'ELBA-2012-0499'}], u'_content_type_id': u'erratum', u'_id': u'fc395f95-3f10-4330-9ec5-391bad6f2914', u'from': u'el-errata@oss.oracle.com', u'severity': u'', u'title': u'aide bug fix update', u'_ns': u'units_erratum', u'rights': u'Copyright 2012 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 5', u'reboot_suggested': False, u'type': u'bugfix', u'pkglist': [{u'packages': [{u'src': None, u'name': u'aide', u'sum': [u'md5', u'4e489433a75a9a0c681325d8452e2c91'], u'filename': u'aide-0.13.1-6.el5_8.2.src.rpm', u'epoch': u'0', u'version': u'0.13.1', u'release': u'6.el5_8.2', u'arch': u'src'}, {u'src': None, u'name': u'aide', u'sum': [u'md5', u'01ebe7b5ee7e1b414b9c216b136d3501'], u'filename': u'aide-0.13.1-6.el5_8.2.x86_64.rpm', u'epoch': u'0', u'version': u'0.13.1', u'release': u'6.el5_8.2', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u'[2.0.115-96.3]\n- fencing: if delay option is used then fencing can timeout and fail\n Resolves: rhbz#811939', u'issued': u'2012-04-20', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELBA-2012-0505.html', u'type': u'self', u'id': None, u'title': u'ELBA-2012-0505'}], u'_content_type_id': u'erratum', u'_id': u'e92af535-31ea-4bb5-b9bb-56436a47ae84', u'from': u'el-errata@oss.oracle.com', u'severity': u'', u'title': u'cman bug fix update', u'_ns': u'units_erratum', u'rights': u'Copyright 2012 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 5', u'reboot_suggested': False, u'type': u'bugfix', u'pkglist': [{u'packages': [{u'src': None, u'name': u'cman', u'sum': [u'md5', u'807e22eb52d28dc770873ae80d3cfbf0'], u'filename': u'cman-2.0.115-96.el5_8.3.src.rpm', u'epoch': u'0', u'version': u'2.0.115', u'release': u'96.el5_8.3', u'arch': u'src'}, {u'src': None, u'name': u'cman', u'sum': [u'md5', u'd471fde99f305b03826d113b0b42f040'], u'filename': u'cman-2.0.115-96.el5_8.3.x86_64.rpm', u'epoch': u'0', u'version': u'2.0.115', u'release': u'96.el5_8.3', u'arch': u'x86_64'}, {u'src': None, u'name': u'cman-devel', u'sum': [u'md5', u'eb643f638d37db12e3c66e0ce16b49ac'], u'filename': u'cman-devel-2.0.115-96.el5_8.3.i386.rpm', u'epoch': u'0', u'version': u'2.0.115', u'release': u'96.el5_8.3', u'arch': u'i386'}, {u'src': None, u'name': u'cman-devel', u'sum': [u'md5', u'0e5c940812ea80a2b70f3ce00360ecec'], u'filename': u'cman-devel-2.0.115-96.el5_8.3.x86_64.rpm', u'epoch': u'0', u'version': u'2.0.115', u'release': u'96.el5_8.3', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u'[5.0.1-0.rc2.164.0.1.el5_8 ]\n- apply fix from NetApp to use tcp before udp\n http://www.mail-archive.com/autofs@linux.kernel.org/msg07910.html\n (Bert Barbe) [orabug 6827898]\n\n[5.0.1-0.rc2.164.el5_8]\n- bz810126 - autofs-5.0.1-0.rc2.163.el5 fails to load some LDAP maps\n - fix improve mount location error reporting.\n- Resolves: rhbz#810126', u'issued': u'2012-04-20', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELBA-2012-0506.html', u'type': u'self', u'id': None, u'title': u'ELBA-2012-0506'}], u'_content_type_id': u'erratum', u'_id': u'b31f0ea5-443d-47ea-b2ac-a96a1ccf628d', u'from': u'el-errata@oss.oracle.com', u'severity': u'', u'title': u'autofs bug fix update', u'_ns': u'units_erratum', u'rights': u'Copyright 2012 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 5', u'reboot_suggested': False, u'type': u'bugfix', u'pkglist': [{u'packages': [{u'src': None, u'name': u'autofs', u'sum': [u'md5', u'f519bf1b871ae904b9b14e310b2d5748'], u'filename': u'autofs-5.0.1-0.rc2.164.0.1.el5_8.src.rpm', u'epoch': u'1', u'version': u'5.0.1', u'release': u'0.rc2.164.0.1.el5_8', u'arch': u'src'}, {u'src': None, u'name': u'autofs', u'sum': [u'md5', u'2cd196b32b7b8d8ec7f97484985ab7b3'], u'filename': u'autofs-5.0.1-0.rc2.164.0.1.el5_8.x86_64.rpm', u'epoch': u'1', u'version': u'5.0.1', u'release': u'0.rc2.164.0.1.el5_8', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u'[4.1.2-52.el5_8.1]\n- backport N2179 exception propagation support to improve\n gcc44 as well as Developer Toolset (#806394)', u'issued': u'2012-05-11', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELBA-2012-0527.html', u'type': u'self', u'id': None, u'title': u'ELBA-2012-0527'}], u'_content_type_id': u'erratum', u'_id': u'ecbfb578-f851-487f-9b83-e69979872237', u'from': u'el-errata@oss.oracle.com', u'severity': u'', u'title': u'gcc bug fix update', u'_ns': u'units_erratum', u'rights': u'Copyright 2012 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 5', u'reboot_suggested': False, u'type': u'bugfix', u'pkglist': [{u'packages': [{u'src': None, u'name': u'cpp', u'sum': [u'md5', u'84c715b3127279d41dbb61f3d2264b3e'], u'filename': u'cpp-4.1.2-52.el5_8.1.x86_64.rpm', u'epoch': u'0', u'version': u'4.1.2', u'release': u'52.el5_8.1', u'arch': u'x86_64'}, {u'src': None, u'name': u'gcc', u'sum': [u'md5', u'20137e7870c69aeee55afd87269d83ac'], u'filename': u'gcc-4.1.2-52.el5_8.1.src.rpm', u'epoch': u'0', u'version': u'4.1.2', u'release': u'52.el5_8.1', u'arch': u'src'}, {u'src': None, u'name': u'gcc', u'sum': [u'md5', u'70cf8d9d8a1b2f134f0cbf1a0dc9d7d2'], u'filename': u'gcc-4.1.2-52.el5_8.1.x86_64.rpm', u'epoch': u'0', u'version': u'4.1.2', u'release': u'52.el5_8.1', u'arch': u'x86_64'}, {u'src': None, u'name': u'gcc-c++', u'sum': [u'md5', u'2e4e8e2ed51aae08ab0f52669ab9af1a'], u'filename': u'gcc-c++-4.1.2-52.el5_8.1.x86_64.rpm', u'epoch': u'0', u'version': u'4.1.2', u'release': u'52.el5_8.1', u'arch': u'x86_64'}, {u'src': None, u'name': u'gcc-gfortran', u'sum': [u'md5', u'fdad9899b7b3df54abaec6e20a437232'], u'filename': u'gcc-gfortran-4.1.2-52.el5_8.1.x86_64.rpm', u'epoch': u'0', u'version': u'4.1.2', u'release': u'52.el5_8.1', u'arch': u'x86_64'}, {u'src': None, u'name': u'gcc-gnat', u'sum': [u'md5', u'f4c2f4576eed87f0378bfcc60bdf58aa'], u'filename': u'gcc-gnat-4.1.2-52.el5_8.1.x86_64.rpm', u'epoch': u'0', u'version': u'4.1.2', u'release': u'52.el5_8.1', u'arch': u'x86_64'}, {u'src': None, u'name': u'gcc-java', u'sum': [u'md5', u'667b12b15c7fbf2e2eb9f8df5ed26da4'], u'filename': u'gcc-java-4.1.2-52.el5_8.1.x86_64.rpm', u'epoch': u'0', u'version': u'4.1.2', u'release': u'52.el5_8.1', u'arch': u'x86_64'}, {u'src': None, u'name': u'gcc-objc', u'sum': [u'md5', u'9263562d2f9b6150b48072f75ec857c7'], u'filename': u'gcc-objc-4.1.2-52.el5_8.1.x86_64.rpm', u'epoch': u'0', u'version': u'4.1.2', u'release': u'52.el5_8.1', u'arch': u'x86_64'}, {u'src': None, u'name': u'gcc-objc++', u'sum': [u'md5', u'8a83a59027ef81f3c61b6ea4395c6bb9'], u'filename': u'gcc-objc++-4.1.2-52.el5_8.1.x86_64.rpm', u'epoch': u'0', u'version': u'4.1.2', u'release': u'52.el5_8.1', u'arch': u'x86_64'}, {u'src': None, u'name': u'libgcc', u'sum': [u'md5', u'd382d25ef848ea26fb14d6041136f826'], u'filename': u'libgcc-4.1.2-52.el5_8.1.i386.rpm', u'epoch': u'0', u'version': u'4.1.2', u'release': u'52.el5_8.1', u'arch': u'i386'}, {u'src': None, u'name': u'libgcc', u'sum': [u'md5', u'5e1621626b9899406c8d5b8c663c9390'], u'filename': u'libgcc-4.1.2-52.el5_8.1.x86_64.rpm', u'epoch': u'0', u'version': u'4.1.2', u'release': u'52.el5_8.1', u'arch': u'x86_64'}, {u'src': None, u'name': u'libgcj', u'sum': [u'md5', u'c929b166e8a106ae4d3f2768a9299c7a'], u'filename': u'libgcj-4.1.2-52.el5_8.1.i386.rpm', u'epoch': u'0', u'version': u'4.1.2', u'release': u'52.el5_8.1', u'arch': u'i386'}, {u'src': None, u'name': u'libgcj', u'sum': [u'md5', u'a3dcd38a9361378e957f7ed52312efbc'], u'filename': u'libgcj-4.1.2-52.el5_8.1.x86_64.rpm', u'epoch': u'0', u'version': u'4.1.2', u'release': u'52.el5_8.1', u'arch': u'x86_64'}, {u'src': None, u'name': u'libgcj-devel', u'sum': [u'md5', u'bfb2a0e317abb36b31295de54cefb9f6'], u'filename': u'libgcj-devel-4.1.2-52.el5_8.1.i386.rpm', u'epoch': u'0', u'version': u'4.1.2', u'release': u'52.el5_8.1', u'arch': u'i386'}, {u'src': None, u'name': u'libgcj-devel', u'sum': [u'md5', u'56c9f3f758634f48e80e2e46ba0e2d3d'], u'filename': u'libgcj-devel-4.1.2-52.el5_8.1.x86_64.rpm', u'epoch': u'0', u'version': u'4.1.2', u'release': u'52.el5_8.1', u'arch': u'x86_64'}, {u'src': None, u'name': u'libgcj-src', u'sum': [u'md5', u'd75c992a3b786b878edb0fdd30050985'], u'filename': u'libgcj-src-4.1.2-52.el5_8.1.x86_64.rpm', u'epoch': u'0', u'version': u'4.1.2', u'release': u'52.el5_8.1', u'arch': u'x86_64'}, {u'src': None, u'name': u'libgfortran', u'sum': [u'md5', u'3b6ab897272943bc02eb87910c6dbd4b'], u'filename': u'libgfortran-4.1.2-52.el5_8.1.i386.rpm', u'epoch': u'0', u'version': u'4.1.2', u'release': u'52.el5_8.1', u'arch': u'i386'}, {u'src': None, u'name': u'libgfortran', u'sum': [u'md5', u'00fad4dceee8423885fbd41a42578567'], u'filename': u'libgfortran-4.1.2-52.el5_8.1.x86_64.rpm', u'epoch': u'0', u'version': u'4.1.2', u'release': u'52.el5_8.1', u'arch': u'x86_64'}, {u'src': None, u'name': u'libgnat', u'sum': [u'md5', u'279440e44c1e2d32588f2393e5490257'], u'filename': u'libgnat-4.1.2-52.el5_8.1.i386.rpm', u'epoch': u'0', u'version': u'4.1.2', u'release': u'52.el5_8.1', u'arch': u'i386'}, {u'src': None, u'name': u'libgnat', u'sum': [u'md5', u'840ec82657b21a618b9fcf2fd4dfcb01'], u'filename': u'libgnat-4.1.2-52.el5_8.1.x86_64.rpm', u'epoch': u'0', u'version': u'4.1.2', u'release': u'52.el5_8.1', u'arch': u'x86_64'}, {u'src': None, u'name': u'libmudflap', u'sum': [u'md5', u'fbdbdaac254ec85a88c56bbbf7256cec'], u'filename': u'libmudflap-4.1.2-52.el5_8.1.i386.rpm', u'epoch': u'0', u'version': u'4.1.2', u'release': u'52.el5_8.1', u'arch': u'i386'}, {u'src': None, u'name': u'libmudflap', u'sum': [u'md5', u'e48578e213eec3bb94e6eadf874a4cca'], u'filename': u'libmudflap-4.1.2-52.el5_8.1.x86_64.rpm', u'epoch': u'0', u'version': u'4.1.2', u'release': u'52.el5_8.1', u'arch': u'x86_64'}, {u'src': None, u'name': u'libmudflap-devel', u'sum': [u'md5', u'53499d0d2c371897df3a0cd4e9ef9f65'], u'filename': u'libmudflap-devel-4.1.2-52.el5_8.1.i386.rpm', u'epoch': u'0', u'version': u'4.1.2', u'release': u'52.el5_8.1', u'arch': u'i386'}, {u'src': None, u'name': u'libmudflap-devel', u'sum': [u'md5', u'fd69c2b400abaabb1db7987b901aeb50'], u'filename': u'libmudflap-devel-4.1.2-52.el5_8.1.x86_64.rpm', u'epoch': u'0', u'version': u'4.1.2', u'release': u'52.el5_8.1', u'arch': u'x86_64'}, {u'src': None, u'name': u'libobjc', u'sum': [u'md5', u'c6f918369bd2caffc3be269eb2e3a626'], u'filename': u'libobjc-4.1.2-52.el5_8.1.i386.rpm', u'epoch': u'0', u'version': u'4.1.2', u'release': u'52.el5_8.1', u'arch': u'i386'}, {u'src': None, u'name': u'libobjc', u'sum': [u'md5', u'cbb5208485351d37c5c1b01a6ee513fa'], u'filename': u'libobjc-4.1.2-52.el5_8.1.x86_64.rpm', u'epoch': u'0', u'version': u'4.1.2', u'release': u'52.el5_8.1', u'arch': u'x86_64'}, {u'src': None, u'name': u'libstdc++', u'sum': [u'md5', u'1aab3c5f4a4cfe0ed01aa0823794f2ae'], u'filename': u'libstdc++-4.1.2-52.el5_8.1.i386.rpm', u'epoch': u'0', u'version': u'4.1.2', u'release': u'52.el5_8.1', u'arch': u'i386'}, {u'src': None, u'name': u'libstdc++', u'sum': [u'md5', u'baf371ec58d20d876fdcbab604938a0b'], u'filename': u'libstdc++-4.1.2-52.el5_8.1.x86_64.rpm', u'epoch': u'0', u'version': u'4.1.2', u'release': u'52.el5_8.1', u'arch': u'x86_64'}, {u'src': None, u'name': u'libstdc++-devel', u'sum': [u'md5', u'd6416e04497300a262f8d809fbf4692d'], u'filename': u'libstdc++-devel-4.1.2-52.el5_8.1.i386.rpm', u'epoch': u'0', u'version': u'4.1.2', u'release': u'52.el5_8.1', u'arch': u'i386'}, {u'src': None, u'name': u'libstdc++-devel', u'sum': [u'md5', u'9277ddbe05f8e159824738f499f9f92a'], u'filename': u'libstdc++-devel-4.1.2-52.el5_8.1.x86_64.rpm', u'epoch': u'0', u'version': u'4.1.2', u'release': u'52.el5_8.1', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u'[2.0.5-24.el5_8.1]\n- Resolves: #813567 - EADDRINUSE return from vsf_sysutil_listen() in handle_pasv()', u'issued': u'2012-04-30', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELBA-2012-0537.html', u'type': u'self', u'id': None, u'title': u'ELBA-2012-0537'}], u'_content_type_id': u'erratum', u'_id': u'7b0220b8-866e-433e-bc5f-0852c65e1853', u'from': u'el-errata@oss.oracle.com', u'severity': u'', u'title': u'vsftpd bug fix update', u'_ns': u'units_erratum', u'rights': u'Copyright 2012 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 5', u'reboot_suggested': False, u'type': u'bugfix', u'pkglist': [{u'packages': [{u'src': None, u'name': u'vsftpd', u'sum': [u'md5', u'fd809dca06fcf55e3c4576ee6428ba2f'], u'filename': u'vsftpd-2.0.5-24.el5_8.1.src.rpm', u'epoch': u'0', u'version': u'2.0.5', u'release': u'24.el5_8.1', u'arch': u'src'}, {u'src': None, u'name': u'vsftpd', u'sum': [u'md5', u'0c8db844330d3152773b130a995ee3db'], u'filename': u'vsftpd-2.0.5-24.el5_8.1.x86_64.rpm', u'epoch': u'0', u'version': u'2.0.5', u'release': u'24.el5_8.1', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u"[0.80.6-36.2]\n- Resolves: rhbz#817610\n\n- Add upstream revision 2187 - Handle syslog stack overflow\n\n[0.80.6-36.1]\n- Resolves: rhbz#812302\n\n- Add upstream revision 2189 - Don't check range value in update_aru", u'issued': u'2012-05-10', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELBA-2012-0553.html', u'type': u'self', u'id': None, u'title': u'ELBA-2012-0553'}], u'_content_type_id': u'erratum', u'_id': u'94d2a3e4-66b4-4102-9e10-201d4f6b74d0', u'from': u'el-errata@oss.oracle.com', u'severity': u'', u'title': u'openais bug fix update', u'_ns': u'units_erratum', u'rights': u'Copyright 2012 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 5', u'reboot_suggested': False, u'type': u'bugfix', u'pkglist': [{u'packages': [{u'src': None, u'name': u'openais', u'sum': [u'md5', u'2eb17396801c14921f64962a42f6a48c'], u'filename': u'openais-0.80.6-36.el5_8.2.src.rpm', u'epoch': u'0', u'version': u'0.80.6', u'release': u'36.el5_8.2', u'arch': u'src'}, {u'src': None, u'name': u'openais', u'sum': [u'md5', u'e5c7c588bfda2918c0a0909944573e14'], u'filename': u'openais-0.80.6-36.el5_8.2.x86_64.rpm', u'epoch': u'0', u'version': u'0.80.6', u'release': u'36.el5_8.2', u'arch': u'x86_64'}, {u'src': None, u'name': u'openais-devel', u'sum': [u'md5', u'cb4961422d8a02ca29025b5041f7df47'], u'filename': u'openais-devel-0.80.6-36.el5_8.2.i386.rpm', u'epoch': u'0', u'version': u'0.80.6', u'release': u'36.el5_8.2', u'arch': u'i386'}, {u'src': None, u'name': u'openais-devel', u'sum': [u'md5', u'd9328f7523643be25945c18784f72c13'], u'filename': u'openais-devel-0.80.6-36.el5_8.2.x86_64.rpm', u'epoch': u'0', u'version': u'0.80.6', u'release': u'36.el5_8.2', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u'[1.1.39-13.el5_8.1.1]\n- Fix incorrect status reporting that could cause cmirrors to go unrepaired\n- Resolves: rhbz#816973', u'issued': u'2012-05-10', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELBA-2012-0554.html', u'type': u'self', u'id': None, u'title': u'ELBA-2012-0554'}], u'_content_type_id': u'erratum', u'_id': u'bddaaa1e-0e2c-44ca-9750-a8a5a4861e19', u'from': u'el-errata@oss.oracle.com', u'severity': u'', u'title': u'cmirror bug fix update', u'_ns': u'units_erratum', u'rights': u'Copyright 2012 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 5', u'reboot_suggested': False, u'type': u'bugfix', u'pkglist': [{u'packages': [{u'src': None, u'name': u'cmirror', u'sum': [u'md5', u'a562173b4efd0facf31985c9a8253398'], u'filename': u'cmirror-1.1.39-13.el5_8.2.1.src.rpm', u'epoch': u'0', u'version': u'1.1.39', u'release': u'13.el5_8.2.1', u'arch': u'src'}, {u'src': None, u'name': u'cmirror', u'sum': [u'md5', u'64ab9c067fda3124422b1d54144468ea'], u'filename': u'cmirror-1.1.39-13.el5_8.2.1.x86_64.rpm', u'epoch': u'0', u'version': u'1.1.39', u'release': u'13.el5_8.2.1', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u'[1.11.4-3.2]\n- add upstream patch so that sessions can timeout when a https server\n accepts the TCP connection but does not respond to the SSL handshake', u'issued': u'2012-05-10', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELBA-2012-0560.html', u'type': u'self', u'id': None, u'title': u'ELBA-2012-0560'}], u'_content_type_id': u'erratum', u'_id': u'be33b9a2-de72-4cad-9e63-6643dcdca2af', u'from': u'el-errata@oss.oracle.com', u'severity': u'', u'title': u'wget bug fix update', u'_ns': u'units_erratum', u'rights': u'Copyright 2012 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 5', u'reboot_suggested': False, u'type': u'bugfix', u'pkglist': [{u'packages': [{u'src': None, u'name': u'wget', u'sum': [u'md5', u'c142be052cf9943e7814bfb95d3ce666'], u'filename': u'wget-1.11.4-3.el5_8.2.src.rpm', u'epoch': u'0', u'version': u'1.11.4', u'release': u'3.el5_8.2', u'arch': u'src'}, {u'src': None, u'name': u'wget', u'sum': [u'md5', u'67d79b51054ba82e73aed354f870fea1'], u'filename': u'wget-1.11.4-3.el5_8.2.x86_64.rpm', u'epoch': u'0', u'version': u'1.11.4', u'release': u'3.el5_8.2', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u'[1.01-2]\n- SSL_check_crl causes segfault due to use of X509_STORE_CTX_set_flags\n- Resolves: rhbz#815335', u'issued': u'2013-01-16', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELBA-2012-0567.html', u'type': u'self', u'id': None, u'title': u'ELBA-2012-0567'}], u'_content_type_id': u'erratum', u'_id': u'5f76211a-4d3a-496f-ae1c-59f3ad42f77e', u'from': u'el-errata@oss.oracle.com', u'severity': u'', u'title': u'perl-IO-Socket-SSL bug fix update', u'_ns': u'units_erratum', u'rights': u'Copyright 2013 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 5', u'reboot_suggested': False, u'type': u'bugfix', u'pkglist': [{u'packages': [{u'src': None, u'name': u'perl-IO-Socket-SSL', u'sum': [u'md5', u'fc09c4102eb0e19b253baac160135100'], u'filename': u'perl-IO-Socket-SSL-1.01-2.el5.noarch.rpm', u'epoch': u'0', u'version': u'1.01', u'release': u'2.el5', u'arch': u'noarch'}, {u'src': None, u'name': u'perl-IO-Socket-SSL', u'sum': [u'md5', u'1febaf36f84760f75eea9ecca9b74b52'], u'filename': u'perl-IO-Socket-SSL-1.01-2.el5.src.rpm', u'epoch': u'0', u'version': u'1.01', u'release': u'2.el5', u'arch': u'src'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u'[1.6.11-10]\n- fix regression in reintegrate merge fixes (#691375)\n\n[1.6.11-9]\n- add reintegrate merge parent dir access fixes (#691375)\n\n[1.6.11-8]\n- add security fixes for CVE-2011-1752, CVE-2011-1783 (#709219)\n- add fix for svnadmin hotcopy (#669535)\n- add security fix for CVE-2011-0715 (#681172)\n- add security fixes for CVE-2010-4644, CVE-2010-4539 (#672677)', u'issued': u'2012-05-14', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELBA-2012-0574.html', u'type': u'self', u'id': None, u'title': u'ELBA-2012-0574'}], u'_content_type_id': u'erratum', u'_id': u'f0309d12-67ea-4bd2-9e52-7a52e34923ba', u'from': u'el-errata@oss.oracle.com', u'severity': u'', u'title': u'subversion bug fix update', u'_ns': u'units_erratum', u'rights': u'Copyright 2012 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 5', u'reboot_suggested': False, u'type': u'bugfix', u'pkglist': [{u'packages': [{u'src': None, u'name': u'mod_dav_svn', u'sum': [u'md5', u'88f274cc5a1dadf5a4d256827ee53db7'], u'filename': u'mod_dav_svn-1.6.11-10.el5_8.x86_64.rpm', u'epoch': u'0', u'version': u'1.6.11', u'release': u'10.el5_8', u'arch': u'x86_64'}, {u'src': None, u'name': u'subversion', u'sum': [u'md5', u'ff2f422e9cc06fcd78998a20dac125b9'], u'filename': u'subversion-1.6.11-10.el5_8.i386.rpm', u'epoch': u'0', u'version': u'1.6.11', u'release': u'10.el5_8', u'arch': u'i386'}, {u'src': None, u'name': u'subversion', u'sum': [u'md5', u'bb7cf9f2850c1ed7a0407ad8661a3a05'], u'filename': u'subversion-1.6.11-10.el5_8.src.rpm', u'epoch': u'0', u'version': u'1.6.11', u'release': u'10.el5_8', u'arch': u'src'}, {u'src': None, u'name': u'subversion', u'sum': [u'md5', u'abb80ad426bd39f6a1026f97600600c2'], u'filename': u'subversion-1.6.11-10.el5_8.x86_64.rpm', u'epoch': u'0', u'version': u'1.6.11', u'release': u'10.el5_8', u'arch': u'x86_64'}, {u'src': None, u'name': u'subversion-devel', u'sum': [u'md5', u'79c8396fd94a927485f6050d02b93f76'], u'filename': u'subversion-devel-1.6.11-10.el5_8.i386.rpm', u'epoch': u'0', u'version': u'1.6.11', u'release': u'10.el5_8', u'arch': u'i386'}, {u'src': None, u'name': u'subversion-devel', u'sum': [u'md5', u'c82436aebbf6849283629d67ae19c7f1'], u'filename': u'subversion-devel-1.6.11-10.el5_8.x86_64.rpm', u'epoch': u'0', u'version': u'1.6.11', u'release': u'10.el5_8', u'arch': u'x86_64'}, {u'src': None, u'name': u'subversion-javahl', u'sum': [u'md5', u'433b9c3bc463e7e7832a54a5f1a09c82'], u'filename': u'subversion-javahl-1.6.11-10.el5_8.x86_64.rpm', u'epoch': u'0', u'version': u'1.6.11', u'release': u'10.el5_8', u'arch': u'x86_64'}, {u'src': None, u'name': u'subversion-perl', u'sum': [u'md5', u'790221c1975ed078f946a253b3a14a61'], u'filename': u'subversion-perl-1.6.11-10.el5_8.x86_64.rpm', u'epoch': u'0', u'version': u'1.6.11', u'release': u'10.el5_8', u'arch': u'x86_64'}, {u'src': None, u'name': u'subversion-ruby', u'sum': [u'md5', u'a07691d094707faba623c83f27ba0432'], u'filename': u'subversion-ruby-1.6.11-10.el5_8.x86_64.rpm', u'epoch': u'0', u'version': u'1.6.11', u'release': u'10.el5_8', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u"[2:1.15.1-32]\n- tar didn't list/extract files with name length divisible by block size 512\n (#810525)", u'issued': u'2012-05-14', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELBA-2012-0580.html', u'type': u'self', u'id': None, u'title': u'ELBA-2012-0580'}], u'_content_type_id': u'erratum', u'_id': u'551ab6a3-261e-41e4-aab1-950423889217', u'from': u'el-errata@oss.oracle.com', u'severity': u'', u'title': u'tar bug fix update', u'_ns': u'units_erratum', u'rights': u'Copyright 2012 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 5', u'reboot_suggested': False, u'type': u'bugfix', u'pkglist': [{u'packages': [{u'src': None, u'name': u'tar', u'sum': [u'md5', u'82952cbe3145f13eeda1cbd772f25b5b'], u'filename': u'tar-1.15.1-32.el5_8.src.rpm', u'epoch': u'2', u'version': u'1.15.1', u'release': u'32.el5_8', u'arch': u'src'}, {u'src': None, u'name': u'tar', u'sum': [u'md5', u'6b985b267cb1b6761502c4d5107775de'], u'filename': u'tar-1.15.1-32.el5_8.x86_64.rpm', u'epoch': u'2', u'version': u'1.15.1', u'release': u'32.el5_8', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u"[2.17.50.0.6-20.el5_8.3]\n- Fix 'looping in map_segments' failure in linker (#818708)", u'issued': u'2012-05-16', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELBA-2012-0672.html', u'type': u'self', u'id': None, u'title': u'ELBA-2012-0672'}], u'_content_type_id': u'erratum', u'_id': u'7fb97488-7f01-44c9-bb81-db227b011cc8', u'from': u'el-errata@oss.oracle.com', u'severity': u'', u'title': u'binutils bug fix update', u'_ns': u'units_erratum', u'rights': u'Copyright 2012 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 5', u'reboot_suggested': False, u'type': u'bugfix', u'pkglist': [{u'packages': [{u'src': None, u'name': u'binutils', u'sum': [u'md5', u'b11085dcc4e89f9cc50f3d26d2feff52'], u'filename': u'binutils-2.17.50.0.6-20.el5_8.3.src.rpm', u'epoch': u'0', u'version': u'2.17.50.0.6', u'release': u'20.el5_8.3', u'arch': u'src'}, {u'src': None, u'name': u'binutils', u'sum': [u'md5', u'ce380cc471590bcbdf31a68203b77d98'], u'filename': u'binutils-2.17.50.0.6-20.el5_8.3.x86_64.rpm', u'epoch': u'0', u'version': u'2.17.50.0.6', u'release': u'20.el5_8.3', u'arch': u'x86_64'}, {u'src': None, u'name': u'binutils-devel', u'sum': [u'md5', u'9cabf664094cd2930b689f1788a2fbbf'], u'filename': u'binutils-devel-2.17.50.0.6-20.el5_8.3.i386.rpm', u'epoch': u'0', u'version': u'2.17.50.0.6', u'release': u'20.el5_8.3', u'arch': u'i386'}, {u'src': None, u'name': u'binutils-devel', u'sum': [u'md5', u'f0cceda573a2d4e580ba2f74906b3b3d'], u'filename': u'binutils-devel-2.17.50.0.6-20.el5_8.3.x86_64.rpm', u'epoch': u'0', u'version': u'2.17.50.0.6', u'release': u'20.el5_8.3', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u'[5.3.2.2-17.0.1.el5_8.1]\n- suppress spurious asserts on 32bit [Greg Marsden]\n\n[5.3.2.2-17.1]\n- fixed Request-ID encoded in 5-bytes when it gets negative (#818259)', u'issued': u'2012-05-21', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELBA-2012-0674.html', u'type': u'self', u'id': None, u'title': u'ELBA-2012-0674'}], u'_content_type_id': u'erratum', u'_id': u'6cd3f08d-8a8c-46fc-8066-ebd7f268d631', u'from': u'el-errata@oss.oracle.com', u'severity': u'', u'title': u'net-snmp bug fix update', u'_ns': u'units_erratum', u'rights': u'Copyright 2012 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 5', u'reboot_suggested': False, u'type': u'bugfix', u'pkglist': [{u'packages': [{u'src': None, u'name': u'net-snmp', u'sum': [u'md5', u'7e6f19cbd1280f5d2f574b9b459212c5'], u'filename': u'net-snmp-5.3.2.2-17.0.1.el5_8.1.src.rpm', u'epoch': u'1', u'version': u'5.3.2.2', u'release': u'17.0.1.el5_8.1', u'arch': u'src'}, {u'src': None, u'name': u'net-snmp', u'sum': [u'md5', u'5ff9e3c655d65f29228700fd5680f404'], u'filename': u'net-snmp-5.3.2.2-17.0.1.el5_8.1.x86_64.rpm', u'epoch': u'1', u'version': u'5.3.2.2', u'release': u'17.0.1.el5_8.1', u'arch': u'x86_64'}, {u'src': None, u'name': u'net-snmp-devel', u'sum': [u'md5', u'ed8d5a31b5bcceb7da0e62415b2c1e9f'], u'filename': u'net-snmp-devel-5.3.2.2-17.0.1.el5_8.1.i386.rpm', u'epoch': u'1', u'version': u'5.3.2.2', u'release': u'17.0.1.el5_8.1', u'arch': u'i386'}, {u'src': None, u'name': u'net-snmp-devel', u'sum': [u'md5', u'9bc711738a28778b39092429643c0748'], u'filename': u'net-snmp-devel-5.3.2.2-17.0.1.el5_8.1.x86_64.rpm', u'epoch': u'1', u'version': u'5.3.2.2', u'release': u'17.0.1.el5_8.1', u'arch': u'x86_64'}, {u'src': None, u'name': u'net-snmp-libs', u'sum': [u'md5', u'd06c1107c112c3015e583a0ba5024aef'], u'filename': u'net-snmp-libs-5.3.2.2-17.0.1.el5_8.1.i386.rpm', u'epoch': u'1', u'version': u'5.3.2.2', u'release': u'17.0.1.el5_8.1', u'arch': u'i386'}, {u'src': None, u'name': u'net-snmp-libs', u'sum': [u'md5', u'0e5bdb2cb6820d4c0f94feddcf84cea3'], u'filename': u'net-snmp-libs-5.3.2.2-17.0.1.el5_8.1.x86_64.rpm', u'epoch': u'1', u'version': u'5.3.2.2', u'release': u'17.0.1.el5_8.1', u'arch': u'x86_64'}, {u'src': None, u'name': u'net-snmp-perl', u'sum': [u'md5', u'11bb1a8be587f1ee0510131f3ffa6ddc'], u'filename': u'net-snmp-perl-5.3.2.2-17.0.1.el5_8.1.x86_64.rpm', u'epoch': u'1', u'version': u'5.3.2.2', u'release': u'17.0.1.el5_8.1', u'arch': u'x86_64'}, {u'src': None, u'name': u'net-snmp-utils', u'sum': [u'md5', u'4339ebe934dd18bd9a734f39275b6ad7'], u'filename': u'net-snmp-utils-5.3.2.2-17.0.1.el5_8.1.x86_64.rpm', u'epoch': u'1', u'version': u'5.3.2.2', u'release': u'17.0.1.el5_8.1', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u"[2.1.3-2]\n- Only warn if ipa-getkeytab doesn't get all requested enctypes. (#818313)", u'issued': u'2012-05-21', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELBA-2012-0684.html', u'type': u'self', u'id': None, u'title': u'ELBA-2012-0684'}], u'_content_type_id': u'erratum', u'_id': u'b727f599-e066-49fe-9051-384c9e36520f', u'from': u'el-errata@oss.oracle.com', u'severity': u'', u'title': u'ipa-client bug fix update', u'_ns': u'units_erratum', u'rights': u'Copyright 2012 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 5', u'reboot_suggested': False, u'type': u'bugfix', u'pkglist': [{u'packages': [{u'src': None, u'name': u'ipa-client', u'sum': [u'md5', u'a89cd9ee0532b10bd3e1985fe71d9819'], u'filename': u'ipa-client-2.1.3-2.el5_8.src.rpm', u'epoch': u'0', u'version': u'2.1.3', u'release': u'2.el5_8', u'arch': u'src'}, {u'src': None, u'name': u'ipa-client', u'sum': [u'md5', u'c6e7232913f72b12eb39238aea394865'], u'filename': u'ipa-client-2.1.3-2.el5_8.x86_64.rpm', u'epoch': u'0', u'version': u'2.1.3', u'release': u'2.el5_8', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u"[2.2.3-65.0.1.el5_8]\n- Fix mod_ssl always performing full renegotiation (orabug 12423387)\n- replace index.html with Oracle's index page oracle_index.html\n- update vstring and distro in specfile\n\n[2.2.3-65]\n- mod_cache: fix handling of 304 responses (#825210)", u'issued': u'2012-06-06', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELBA-2012-0714.html', u'type': u'self', u'id': None, u'title': u'ELBA-2012-0714'}], u'_content_type_id': u'erratum', u'_id': u'29b9611c-fca1-443f-bbf3-0b6b385934f7', u'from': u'el-errata@oss.oracle.com', u'severity': u'', u'title': u'httpd bug fix update', u'_ns': u'units_erratum', u'rights': u'Copyright 2012 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 5', u'reboot_suggested': False, u'type': u'bugfix', u'pkglist': [{u'packages': [{u'src': None, u'name': u'httpd', u'sum': [u'md5', u'258d6e7f42199cb1f3d43e3c9744d72b'], u'filename': u'httpd-2.2.3-65.0.1.el5_8.src.rpm', u'epoch': u'0', u'version': u'2.2.3', u'release': u'65.0.1.el5_8', u'arch': u'src'}, {u'src': None, u'name': u'httpd', u'sum': [u'md5', u'1f7b8e9400df9ff70a6e4258bc35902f'], u'filename': u'httpd-2.2.3-65.0.1.el5_8.x86_64.rpm', u'epoch': u'0', u'version': u'2.2.3', u'release': u'65.0.1.el5_8', u'arch': u'x86_64'}, {u'src': None, u'name': u'httpd-devel', u'sum': [u'md5', u'1c1ddc70b8d1a4b4fe8056003e8fd027'], u'filename': u'httpd-devel-2.2.3-65.0.1.el5_8.i386.rpm', u'epoch': u'0', u'version': u'2.2.3', u'release': u'65.0.1.el5_8', u'arch': u'i386'}, {u'src': None, u'name': u'httpd-devel', u'sum': [u'md5', u'1772a9730179fb75090355338714f976'], u'filename': u'httpd-devel-2.2.3-65.0.1.el5_8.x86_64.rpm', u'epoch': u'0', u'version': u'2.2.3', u'release': u'65.0.1.el5_8', u'arch': u'x86_64'}, {u'src': None, u'name': u'httpd-manual', u'sum': [u'md5', u'5c44fc57fa4498d3039d7cfa599403ec'], u'filename': u'httpd-manual-2.2.3-65.0.1.el5_8.x86_64.rpm', u'epoch': u'0', u'version': u'2.2.3', u'release': u'65.0.1.el5_8', u'arch': u'x86_64'}, {u'src': None, u'name': u'mod_ssl', u'sum': [u'md5', u'a3c1d8baa69b2fbd714f1b6519c77d71'], u'filename': u'mod_ssl-2.2.3-65.0.1.el5_8.x86_64.rpm', u'epoch': u'1', u'version': u'2.2.3', u'release': u'65.0.1.el5_8', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u'[1.39-34]\n- uuidd: Fix pid file so it has the correct pid number (#707433)', u'issued': u'2012-06-20', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELBA-2012-1016.html', u'type': u'self', u'id': None, u'title': u'ELBA-2012-1016'}], u'_content_type_id': u'erratum', u'_id': u'7df4766e-d204-44f9-b1ca-1e2198c89e1c', u'from': u'el-errata@oss.oracle.com', u'severity': u'', u'title': u'e2fsprogs bug fix update', u'_ns': u'units_erratum', u'rights': u'Copyright 2012 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 5', u'reboot_suggested': False, u'type': u'bugfix', u'pkglist': [{u'packages': [{u'src': None, u'name': u'e2fsprogs', u'sum': [u'md5', u'3285a940c84e23bef070882d831337d3'], u'filename': u'e2fsprogs-1.39-34.el5_8.1.src.rpm', u'epoch': u'0', u'version': u'1.39', u'release': u'34.el5_8.1', u'arch': u'src'}, {u'src': None, u'name': u'e2fsprogs', u'sum': [u'md5', u'82816d3b1d81052841452abc5a874f1b'], u'filename': u'e2fsprogs-1.39-34.el5_8.1.x86_64.rpm', u'epoch': u'0', u'version': u'1.39', u'release': u'34.el5_8.1', u'arch': u'x86_64'}, {u'src': None, u'name': u'e2fsprogs-devel', u'sum': [u'md5', u'2f7b658850d934dc214c79dde4eb2a3d'], u'filename': u'e2fsprogs-devel-1.39-34.el5_8.1.i386.rpm', u'epoch': u'0', u'version': u'1.39', u'release': u'34.el5_8.1', u'arch': u'i386'}, {u'src': None, u'name': u'e2fsprogs-devel', u'sum': [u'md5', u'9a927bf39c3f0460a1f5008c0f09fe52'], u'filename': u'e2fsprogs-devel-1.39-34.el5_8.1.x86_64.rpm', u'epoch': u'0', u'version': u'1.39', u'release': u'34.el5_8.1', u'arch': u'x86_64'}, {u'src': None, u'name': u'e2fsprogs-libs', u'sum': [u'md5', u'3aed7e0c03e1e9622e4ba3045ea7a92d'], u'filename': u'e2fsprogs-libs-1.39-34.el5_8.1.i386.rpm', u'epoch': u'0', u'version': u'1.39', u'release': u'34.el5_8.1', u'arch': u'i386'}, {u'src': None, u'name': u'e2fsprogs-libs', u'sum': [u'md5', u'062458e84f4d38d3ceafe3dbc824f5c8'], u'filename': u'e2fsprogs-libs-1.39-34.el5_8.1.x86_64.rpm', u'epoch': u'0', u'version': u'1.39', u'release': u'34.el5_8.1', u'arch': u'x86_64'}, {u'src': None, u'name': u'uuidd', u'sum': [u'md5', u'0c135c2909d95fbcae8034f2dde01710'], u'filename': u'uuidd-1.39-34.el5_8.1.x86_64.rpm', u'epoch': u'0', u'version': u'1.39', u'release': u'34.el5_8.1', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u'[2.0.52-28.2]\n- rgmanager: add nfsdrestart option as last resource to umount fs/clustefs\n Resolves: rhbz#827390\n\n[2.0.52-28.1]\n- rgmanager: add nfsdrestart option as last resource to umount fs/clustefs\n Resolves: rhbz#827390', u'issued': u'2012-06-27', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELBA-2012-1044.html', u'type': u'self', u'id': None, u'title': u'ELBA-2012-1044'}], u'_content_type_id': u'erratum', u'_id': u'a3cf4a33-b345-4805-b6ba-a207cff54e26', u'from': u'el-errata@oss.oracle.com', u'severity': u'', u'title': u'rgmanager bug fix update', u'_ns': u'units_erratum', u'rights': u'Copyright 2012 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 5', u'reboot_suggested': False, u'type': u'bugfix', u'pkglist': [{u'packages': [{u'src': None, u'name': u'rgmanager', u'sum': [u'md5', u'7179e443b2ef0abca8ee33bbb16f5857'], u'filename': u'rgmanager-2.0.52-28.el5_8.2.src.rpm', u'epoch': u'0', u'version': u'2.0.52', u'release': u'28.el5_8.2', u'arch': u'src'}, {u'src': None, u'name': u'rgmanager', u'sum': [u'md5', u'131b3dd165c2112e9436b8e04d1e242c'], u'filename': u'rgmanager-2.0.52-28.el5_8.2.x86_64.rpm', u'epoch': u'0', u'version': u'2.0.52', u'release': u'28.el5_8.2', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u'[2.3.43-25.1]\n- fix: do not send IPv6 DNS queries when IPv6 is disabled on the host (#835444)', u'issued': u'2012-07-12', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELBA-2012-1071.html', u'type': u'self', u'id': None, u'title': u'ELBA-2012-1071'}], u'_content_type_id': u'erratum', u'_id': u'22ce406c-d1c8-45b5-a4a0-b6f4c4f01af7', u'from': u'el-errata@oss.oracle.com', u'severity': u'', u'title': u'openldap bug fix update', u'_ns': u'units_erratum', u'rights': u'Copyright 2012 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 5', u'reboot_suggested': False, u'type': u'bugfix', u'pkglist': [{u'packages': [{u'src': None, u'name': u'compat-openldap', u'sum': [u'md5', u'5e47c3b745087205425b2a7d563d4d32'], u'filename': u'compat-openldap-2.3.43_2.2.29-25.el5_8.1.i386.rpm', u'epoch': u'0', u'version': u'2.3.43_2.2.29', u'release': u'25.el5_8.1', u'arch': u'i386'}, {u'src': None, u'name': u'compat-openldap', u'sum': [u'md5', u'9e787888762ea73213f6eb2e284c40f6'], u'filename': u'compat-openldap-2.3.43_2.2.29-25.el5_8.1.x86_64.rpm', u'epoch': u'0', u'version': u'2.3.43_2.2.29', u'release': u'25.el5_8.1', u'arch': u'x86_64'}, {u'src': None, u'name': u'openldap', u'sum': [u'md5', u'a9c0452a51b8e694891ee2a71a8db4c6'], u'filename': u'openldap-2.3.43-25.el5_8.1.i386.rpm', u'epoch': u'0', u'version': u'2.3.43', u'release': u'25.el5_8.1', u'arch': u'i386'}, {u'src': None, u'name': u'openldap', u'sum': [u'md5', u'867e32661259b3fbfd92d46b47390add'], u'filename': u'openldap-2.3.43-25.el5_8.1.src.rpm', u'epoch': u'0', u'version': u'2.3.43', u'release': u'25.el5_8.1', u'arch': u'src'}, {u'src': None, u'name': u'openldap', u'sum': [u'md5', u'406920b5e85e7979218848066d620a78'], u'filename': u'openldap-2.3.43-25.el5_8.1.x86_64.rpm', u'epoch': u'0', u'version': u'2.3.43', u'release': u'25.el5_8.1', u'arch': u'x86_64'}, {u'src': None, u'name': u'openldap-clients', u'sum': [u'md5', u'4920a5faa81213257b2667eadd600074'], u'filename': u'openldap-clients-2.3.43-25.el5_8.1.x86_64.rpm', u'epoch': u'0', u'version': u'2.3.43', u'release': u'25.el5_8.1', u'arch': u'x86_64'}, {u'src': None, u'name': u'openldap-devel', u'sum': [u'md5', u'1e14d41c0bf43fdd655ec9dc82308842'], u'filename': u'openldap-devel-2.3.43-25.el5_8.1.i386.rpm', u'epoch': u'0', u'version': u'2.3.43', u'release': u'25.el5_8.1', u'arch': u'i386'}, {u'src': None, u'name': u'openldap-devel', u'sum': [u'md5', u'46b82ed60e48d5fe33fe4b4344a59da1'], u'filename': u'openldap-devel-2.3.43-25.el5_8.1.x86_64.rpm', u'epoch': u'0', u'version': u'2.3.43', u'release': u'25.el5_8.1', u'arch': u'x86_64'}, {u'src': None, u'name': u'openldap-servers', u'sum': [u'md5', u'f02a1d9663830a47906d8cb4419f9043'], u'filename': u'openldap-servers-2.3.43-25.el5_8.1.x86_64.rpm', u'epoch': u'0', u'version': u'2.3.43', u'release': u'25.el5_8.1', u'arch': u'x86_64'}, {u'src': None, u'name': u'openldap-servers-overlays', u'sum': [u'md5', u'32cc45434f3790c53c0e57ae33dfa27d'], u'filename': u'openldap-servers-overlays-2.3.43-25.el5_8.1.x86_64.rpm', u'epoch': u'0', u'version': u'2.3.43', u'release': u'25.el5_8.1', u'arch': u'x86_64'}, {u'src': None, u'name': u'openldap-servers-sql', u'sum': [u'md5', u'eb70de4989fbb74c7fa53e807823acfb'], u'filename': u'openldap-servers-sql-2.3.43-25.el5_8.1.x86_64.rpm', u'epoch': u'0', u'version': u'2.3.43', u'release': u'25.el5_8.1', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u'[2.0.52-28.3]\n- rgmanager: Fix a possible NULL pointer dereference\n Resolves: rhbz#839195', u'issued': u'2012-07-18', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELBA-2012-1092.html', u'type': u'self', u'id': None, u'title': u'ELBA-2012-1092'}], u'_content_type_id': u'erratum', u'_id': u'c50ea278-e058-4270-a632-70e2f36c8618', u'from': u'el-errata@oss.oracle.com', u'severity': u'', u'title': u'rgmanager bug fix update', u'_ns': u'units_erratum', u'rights': u'Copyright 2012 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 5', u'reboot_suggested': False, u'type': u'bugfix', u'pkglist': [{u'packages': [{u'src': None, u'name': u'rgmanager', u'sum': [u'md5', u'2d4844b2c1d1e1b0be0a43bb98f8216e'], u'filename': u'rgmanager-2.0.52-28.el5_8.3.src.rpm', u'epoch': u'0', u'version': u'2.0.52', u'release': u'28.el5_8.3', u'arch': u'src'}, {u'src': None, u'name': u'rgmanager', u'sum': [u'md5', u'cd065986646d7e7a25f097a889204bec'], u'filename': u'rgmanager-2.0.52-28.el5_8.3.x86_64.rpm', u'epoch': u'0', u'version': u'2.0.52', u'release': u'28.el5_8.3', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u'[3.5.10-0.110]\n- Fix posix acl set handling.\n- resolves: #841374', u'issued': u'2012-07-31', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELBA-2012-1126.html', u'type': u'self', u'id': None, u'title': u'ELBA-2012-1126'}], u'_content_type_id': u'erratum', u'_id': u'8681a7e0-4d55-4bf2-b534-2a6e978b4773', u'from': u'el-errata@oss.oracle.com', u'severity': u'', u'title': u'samba3x bug fix update', u'_ns': u'units_erratum', u'rights': u'Copyright 2012 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 5', u'reboot_suggested': False, u'type': u'bugfix', u'pkglist': [{u'packages': [{u'src': None, u'name': u'samba3x', u'sum': [u'md5', u'10aeeaaec91eb9359b9afb2591cedede'], u'filename': u'samba3x-3.5.10-0.110.el5_8.src.rpm', u'epoch': u'0', u'version': u'3.5.10', u'release': u'0.110.el5_8', u'arch': u'src'}, {u'src': None, u'name': u'samba3x', u'sum': [u'md5', u'34a1c72c52f07aea40c32e21a2159248'], u'filename': u'samba3x-3.5.10-0.110.el5_8.x86_64.rpm', u'epoch': u'0', u'version': u'3.5.10', u'release': u'0.110.el5_8', u'arch': u'x86_64'}, {u'src': None, u'name': u'samba3x-client', u'sum': [u'md5', u'907c161a3c17d3c0bef70833f90b676e'], u'filename': u'samba3x-client-3.5.10-0.110.el5_8.x86_64.rpm', u'epoch': u'0', u'version': u'3.5.10', u'release': u'0.110.el5_8', u'arch': u'x86_64'}, {u'src': None, u'name': u'samba3x-common', u'sum': [u'md5', u'6412f3a397b986d45eafa7f200c0eddc'], u'filename': u'samba3x-common-3.5.10-0.110.el5_8.x86_64.rpm', u'epoch': u'0', u'version': u'3.5.10', u'release': u'0.110.el5_8', u'arch': u'x86_64'}, {u'src': None, u'name': u'samba3x-doc', u'sum': [u'md5', u'ef94e8f7f81f68cf256136aa4e455b15'], u'filename': u'samba3x-doc-3.5.10-0.110.el5_8.x86_64.rpm', u'epoch': u'0', u'version': u'3.5.10', u'release': u'0.110.el5_8', u'arch': u'x86_64'}, {u'src': None, u'name': u'samba3x-domainjoin-gui', u'sum': [u'md5', u'75b6832edefe64f7542b939db3db9fae'], u'filename': u'samba3x-domainjoin-gui-3.5.10-0.110.el5_8.x86_64.rpm', u'epoch': u'0', u'version': u'3.5.10', u'release': u'0.110.el5_8', u'arch': u'x86_64'}, {u'src': None, u'name': u'samba3x-swat', u'sum': [u'md5', u'1e388e1f7ec097a2bebf63749bca9d8d'], u'filename': u'samba3x-swat-3.5.10-0.110.el5_8.x86_64.rpm', u'epoch': u'0', u'version': u'3.5.10', u'release': u'0.110.el5_8', u'arch': u'x86_64'}, {u'src': None, u'name': u'samba3x-winbind', u'sum': [u'md5', u'e671566e90b748c1fcee0cee365fe400'], u'filename': u'samba3x-winbind-3.5.10-0.110.el5_8.i386.rpm', u'epoch': u'0', u'version': u'3.5.10', u'release': u'0.110.el5_8', u'arch': u'i386'}, {u'src': None, u'name': u'samba3x-winbind', u'sum': [u'md5', u'1c5afc1828f164ec8ed0c543575142ee'], u'filename': u'samba3x-winbind-3.5.10-0.110.el5_8.x86_64.rpm', u'epoch': u'0', u'version': u'3.5.10', u'release': u'0.110.el5_8', u'arch': u'x86_64'}, {u'src': None, u'name': u'samba3x-winbind-devel', u'sum': [u'md5', u'c88a702f81c84950ae1a496b88febaad'], u'filename': u'samba3x-winbind-devel-3.5.10-0.110.el5_8.i386.rpm', u'epoch': u'0', u'version': u'3.5.10', u'release': u'0.110.el5_8', u'arch': u'i386'}, {u'src': None, u'name': u'samba3x-winbind-devel', u'sum': [u'md5', u'bdabc4df0c34571323b8b93179e6a9f8'], u'filename': u'samba3x-winbind-devel-3.5.10-0.110.el5_8.x86_64.rpm', u'epoch': u'0', u'version': u'3.5.10', u'release': u'0.110.el5_8', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u"[8.45.42-1.0.1.el5_8.1]\n- Update oracle-enterprise.patch to do detection on /etc/oracle-release \n and /etc/enterprise-release\n- Patch x86_64 sysctl.conf as well as default sysctl.conf\n- Patch sysctl.conf to default rp_filter to loose reverse path\n filtering (has no effect for pre-2.6.32 kernels) [orabug 10286227]\n- Move hwclock into udev rules\n- Update oracle-enterprise.patch to fix RedHat references in arch specific\n sysctl.conf files in source tarball\n- Add oracle-enterprise.patch and update specfile\n- Don't attempt to re-enslave already-enslaved devices (#455537) (pknirsch@redhat.com)\n\n[8.45.42-1.1]\n- added missing '-p p' for kpartx in netfs (#845246)", u'issued': u'2012-08-09', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELBA-2012-1155.html', u'type': u'self', u'id': None, u'title': u'ELBA-2012-1155'}], u'_content_type_id': u'erratum', u'_id': u'61fe4353-f0c8-4f56-8e14-e7cae2a0207f', u'from': u'el-errata@oss.oracle.com', u'severity': u'', u'title': u'initscripts bug fix update', u'_ns': u'units_erratum', u'rights': u'Copyright 2012 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 5', u'reboot_suggested': False, u'type': u'bugfix', u'pkglist': [{u'packages': [{u'src': None, u'name': u'initscripts', u'sum': [u'md5', u'ab1f3bfa4a81e2a98f3291b54bc5a997'], u'filename': u'initscripts-8.45.42-1.0.1.el5_8.1.src.rpm', u'epoch': u'0', u'version': u'8.45.42', u'release': u'1.0.1.el5_8.1', u'arch': u'src'}, {u'src': None, u'name': u'initscripts', u'sum': [u'md5', u'24d0d06afbb325800634cf1820cb338b'], u'filename': u'initscripts-8.45.42-1.0.1.el5_8.1.x86_64.rpm', u'epoch': u'0', u'version': u'8.45.42', u'release': u'1.0.1.el5_8.1', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u"[1.7.2p1-14.3]\n- don't use a temporary file when modifying nsswitch.conf\n- fix permissions on nsswitch.conf, if needed\n- sync Requires with y-stream, added policycoreutils to Requires\n Resolves: rhbz#846974", u'issued': u'2012-08-13', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELBA-2012-1160.html', u'type': u'self', u'id': None, u'title': u'ELBA-2012-1160'}], u'_content_type_id': u'erratum', u'_id': u'2a5e61a9-7d4e-4c57-a422-7a2945b23e47', u'from': u'el-errata@oss.oracle.com', u'severity': u'', u'title': u'sudo bug fix update', u'_ns': u'units_erratum', u'rights': u'Copyright 2012 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 5', u'reboot_suggested': False, u'type': u'bugfix', u'pkglist': [{u'packages': [{u'src': None, u'name': u'sudo', u'sum': [u'md5', u'008e56f7c8163ae581689ec4573be999'], u'filename': u'sudo-1.7.2p1-14.el5_8.3.src.rpm', u'epoch': u'0', u'version': u'1.7.2p1', u'release': u'14.el5_8.3', u'arch': u'src'}, {u'src': None, u'name': u'sudo', u'sum': [u'md5', u'6e5964214fa0b3749dfd307eaccf94d9'], u'filename': u'sudo-1.7.2p1-14.el5_8.3.x86_64.rpm', u'epoch': u'0', u'version': u'1.7.2p1', u'release': u'14.el5_8.3', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u"[1.1.1-48.91.0.1.el5]\n- Added oracle-enterprise-detect.patch\n- Replaced 'Red Hat' in spec file\n\n[1.1.1-48.91]\n- xserver-1.1.1-randr-select-input-endian.patch: Fix byteswapping of\n RRSelectInput. (#794810)", u'issued': u'2012-08-22', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELBA-2012-1191.html', u'type': u'self', u'id': None, u'title': u'ELBA-2012-1191'}], u'_content_type_id': u'erratum', u'_id': u'8ada45a6-3693-4d66-9d96-8a02ab2fb7ea', u'from': u'el-errata@oss.oracle.com', u'severity': u'', u'title': u'xorg-x11-server bug fix update', u'_ns': u'units_erratum', u'rights': u'Copyright 2012 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 5', u'reboot_suggested': False, u'type': u'bugfix', u'pkglist': [{u'packages': [{u'src': None, u'name': u'xorg-x11-server', u'sum': [u'md5', u'5d0f2b819b2417be673b0644d1c24461'], u'filename': u'xorg-x11-server-1.1.1-48.91.0.1.el5_8.src.rpm', u'epoch': u'0', u'version': u'1.1.1', u'release': u'48.91.0.1.el5_8', u'arch': u'src'}, {u'src': None, u'name': u'xorg-x11-server-Xdmx', u'sum': [u'md5', u'b73b139d1d1ea9c782b1d822d889bde6'], u'filename': u'xorg-x11-server-Xdmx-1.1.1-48.91.0.1.el5_8.x86_64.rpm', u'epoch': u'0', u'version': u'1.1.1', u'release': u'48.91.0.1.el5_8', u'arch': u'x86_64'}, {u'src': None, u'name': u'xorg-x11-server-Xephyr', u'sum': [u'md5', u'7349dd7156acdadc3769e6058da17130'], u'filename': u'xorg-x11-server-Xephyr-1.1.1-48.91.0.1.el5_8.x86_64.rpm', u'epoch': u'0', u'version': u'1.1.1', u'release': u'48.91.0.1.el5_8', u'arch': u'x86_64'}, {u'src': None, u'name': u'xorg-x11-server-Xnest', u'sum': [u'md5', u'b1616fe16991210018e3a75f610ed2b6'], u'filename': u'xorg-x11-server-Xnest-1.1.1-48.91.0.1.el5_8.x86_64.rpm', u'epoch': u'0', u'version': u'1.1.1', u'release': u'48.91.0.1.el5_8', u'arch': u'x86_64'}, {u'src': None, u'name': u'xorg-x11-server-Xorg', u'sum': [u'md5', u'fca6b756e29805a32ef11957da07fbc6'], u'filename': u'xorg-x11-server-Xorg-1.1.1-48.91.0.1.el5_8.x86_64.rpm', u'epoch': u'0', u'version': u'1.1.1', u'release': u'48.91.0.1.el5_8', u'arch': u'x86_64'}, {u'src': None, u'name': u'xorg-x11-server-Xvfb', u'sum': [u'md5', u'e43fe44536ccf11cdc7d37029a9ebcaf'], u'filename': u'xorg-x11-server-Xvfb-1.1.1-48.91.0.1.el5_8.x86_64.rpm', u'epoch': u'0', u'version': u'1.1.1', u'release': u'48.91.0.1.el5_8', u'arch': u'x86_64'}, {u'src': None, u'name': u'xorg-x11-server-Xvnc-source', u'sum': [u'md5', u'26c6b0a069822609a2664aeb7d0d7d6c'], u'filename': u'xorg-x11-server-Xvnc-source-1.1.1-48.91.0.1.el5_8.x86_64.rpm', u'epoch': u'0', u'version': u'1.1.1', u'release': u'48.91.0.1.el5_8', u'arch': u'x86_64'}, {u'src': None, u'name': u'xorg-x11-server-sdk', u'sum': [u'md5', u'1e6691d6cb53570b9832bea473e052e7'], u'filename': u'xorg-x11-server-sdk-1.1.1-48.91.0.1.el5_8.x86_64.rpm', u'epoch': u'0', u'version': u'1.1.1', u'release': u'48.91.0.1.el5_8', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u'[5.2.14-37.1]\n- fix wrong path in /etc/shells (#848078)', u'issued': u'2012-08-22', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELBA-2012-1193.html', u'type': u'self', u'id': None, u'title': u'ELBA-2012-1193'}], u'_content_type_id': u'erratum', u'_id': u'7bfdd032-c867-41c9-957f-5d6acdaa3b68', u'from': u'el-errata@oss.oracle.com', u'severity': u'', u'title': u'pdksh bug fix update', u'_ns': u'units_erratum', u'rights': u'Copyright 2012 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 5', u'reboot_suggested': False, u'type': u'bugfix', u'pkglist': [{u'packages': [{u'src': None, u'name': u'pdksh', u'sum': [u'md5', u'bc33020fd4c686d861375f2eba4c989c'], u'filename': u'pdksh-5.2.14-37.el5_8.1.src.rpm', u'epoch': u'0', u'version': u'5.2.14', u'release': u'37.el5_8.1', u'arch': u'src'}, {u'src': None, u'name': u'pdksh', u'sum': [u'md5', u'98459db00c5fd98e4405596c2fed1412'], u'filename': u'pdksh-5.2.14-37.el5_8.1.x86_64.rpm', u'epoch': u'0', u'version': u'5.2.14', u'release': u'37.el5_8.1', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u'[2.1.22-7.1]\n- fix several memory leaks (#837053)\n\n[2.1.22-6]\n- solve race condition (#560532)', u'issued': u'2012-09-03', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELBA-2012-1224.html', u'type': u'self', u'id': None, u'title': u'ELBA-2012-1224'}], u'_content_type_id': u'erratum', u'_id': u'a5afa434-b424-4d39-b6c9-46248ffc6d29', u'from': u'el-errata@oss.oracle.com', u'severity': u'', u'title': u'cyrus-sasl bug fix update', u'_ns': u'units_erratum', u'rights': u'Copyright 2012 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 5', u'reboot_suggested': False, u'type': u'bugfix', u'pkglist': [{u'packages': [{u'src': None, u'name': u'cyrus-sasl', u'sum': [u'md5', u'28da4e5f96c4a8c7dca79df517e53adf'], u'filename': u'cyrus-sasl-2.1.22-7.el5_8.1.i386.rpm', u'epoch': u'0', u'version': u'2.1.22', u'release': u'7.el5_8.1', u'arch': u'i386'}, {u'src': None, u'name': u'cyrus-sasl', u'sum': [u'md5', u'5ddc60ce8bb5e063c1a4fdba022eab6e'], u'filename': u'cyrus-sasl-2.1.22-7.el5_8.1.src.rpm', u'epoch': u'0', u'version': u'2.1.22', u'release': u'7.el5_8.1', u'arch': u'src'}, {u'src': None, u'name': u'cyrus-sasl', u'sum': [u'md5', u'8b14354604fe1e9f9674f3319ffe863f'], u'filename': u'cyrus-sasl-2.1.22-7.el5_8.1.x86_64.rpm', u'epoch': u'0', u'version': u'2.1.22', u'release': u'7.el5_8.1', u'arch': u'x86_64'}, {u'src': None, u'name': u'cyrus-sasl-devel', u'sum': [u'md5', u'cb7033ba4a218000e8dffc9865cf5348'], u'filename': u'cyrus-sasl-devel-2.1.22-7.el5_8.1.i386.rpm', u'epoch': u'0', u'version': u'2.1.22', u'release': u'7.el5_8.1', u'arch': u'i386'}, {u'src': None, u'name': u'cyrus-sasl-devel', u'sum': [u'md5', u'ce28129a405fbca6fb42dca6ce97a873'], u'filename': u'cyrus-sasl-devel-2.1.22-7.el5_8.1.x86_64.rpm', u'epoch': u'0', u'version': u'2.1.22', u'release': u'7.el5_8.1', u'arch': u'x86_64'}, {u'src': None, u'name': u'cyrus-sasl-gssapi', u'sum': [u'md5', u'58955b9c335f550f1cf40b4685f1fd50'], u'filename': u'cyrus-sasl-gssapi-2.1.22-7.el5_8.1.i386.rpm', u'epoch': u'0', u'version': u'2.1.22', u'release': u'7.el5_8.1', u'arch': u'i386'}, {u'src': None, u'name': u'cyrus-sasl-gssapi', u'sum': [u'md5', u'81cb425ffa5ca19fa4de677e0400a743'], u'filename': u'cyrus-sasl-gssapi-2.1.22-7.el5_8.1.x86_64.rpm', u'epoch': u'0', u'version': u'2.1.22', u'release': u'7.el5_8.1', u'arch': u'x86_64'}, {u'src': None, u'name': u'cyrus-sasl-ldap', u'sum': [u'md5', u'2708a29c2d4bc564ca620e0f8275670a'], u'filename': u'cyrus-sasl-ldap-2.1.22-7.el5_8.1.i386.rpm', u'epoch': u'0', u'version': u'2.1.22', u'release': u'7.el5_8.1', u'arch': u'i386'}, {u'src': None, u'name': u'cyrus-sasl-ldap', u'sum': [u'md5', u'796ae4794b8cfaf4f2ab9cd653bd3563'], u'filename': u'cyrus-sasl-ldap-2.1.22-7.el5_8.1.x86_64.rpm', u'epoch': u'0', u'version': u'2.1.22', u'release': u'7.el5_8.1', u'arch': u'x86_64'}, {u'src': None, u'name': u'cyrus-sasl-lib', u'sum': [u'md5', u'f63ddb378817931c0b3c73dd7092271e'], u'filename': u'cyrus-sasl-lib-2.1.22-7.el5_8.1.i386.rpm', u'epoch': u'0', u'version': u'2.1.22', u'release': u'7.el5_8.1', u'arch': u'i386'}, {u'src': None, u'name': u'cyrus-sasl-lib', u'sum': [u'md5', u'b5ed7d57571cd0680f91327fc83730e5'], u'filename': u'cyrus-sasl-lib-2.1.22-7.el5_8.1.x86_64.rpm', u'epoch': u'0', u'version': u'2.1.22', u'release': u'7.el5_8.1', u'arch': u'x86_64'}, {u'src': None, u'name': u'cyrus-sasl-md5', u'sum': [u'md5', u'83d743c91f2ad3430b69b9bfd584ff77'], u'filename': u'cyrus-sasl-md5-2.1.22-7.el5_8.1.i386.rpm', u'epoch': u'0', u'version': u'2.1.22', u'release': u'7.el5_8.1', u'arch': u'i386'}, {u'src': None, u'name': u'cyrus-sasl-md5', u'sum': [u'md5', u'd7825a2605863cc3e9cdb777c63ea0f3'], u'filename': u'cyrus-sasl-md5-2.1.22-7.el5_8.1.x86_64.rpm', u'epoch': u'0', u'version': u'2.1.22', u'release': u'7.el5_8.1', u'arch': u'x86_64'}, {u'src': None, u'name': u'cyrus-sasl-ntlm', u'sum': [u'md5', u'aa27f18405bfc741791bf5da5fad56a0'], u'filename': u'cyrus-sasl-ntlm-2.1.22-7.el5_8.1.i386.rpm', u'epoch': u'0', u'version': u'2.1.22', u'release': u'7.el5_8.1', u'arch': u'i386'}, {u'src': None, u'name': u'cyrus-sasl-ntlm', u'sum': [u'md5', u'24dc7b5c0f3c705415197b06117eca3d'], u'filename': u'cyrus-sasl-ntlm-2.1.22-7.el5_8.1.x86_64.rpm', u'epoch': u'0', u'version': u'2.1.22', u'release': u'7.el5_8.1', u'arch': u'x86_64'}, {u'src': None, u'name': u'cyrus-sasl-plain', u'sum': [u'md5', u'1f8fd9f37516142ae8c9de96feca7075'], u'filename': u'cyrus-sasl-plain-2.1.22-7.el5_8.1.i386.rpm', u'epoch': u'0', u'version': u'2.1.22', u'release': u'7.el5_8.1', u'arch': u'i386'}, {u'src': None, u'name': u'cyrus-sasl-plain', u'sum': [u'md5', u'5e81b637feaf92d8dccb3398966899ba'], u'filename': u'cyrus-sasl-plain-2.1.22-7.el5_8.1.x86_64.rpm', u'epoch': u'0', u'version': u'2.1.22', u'release': u'7.el5_8.1', u'arch': u'x86_64'}, {u'src': None, u'name': u'cyrus-sasl-sql', u'sum': [u'md5', u'a609468d6182577e93196719820444ef'], u'filename': u'cyrus-sasl-sql-2.1.22-7.el5_8.1.i386.rpm', u'epoch': u'0', u'version': u'2.1.22', u'release': u'7.el5_8.1', u'arch': u'i386'}, {u'src': None, u'name': u'cyrus-sasl-sql', u'sum': [u'md5', u'382f1f3ab156823575f69e8b0973960b'], u'filename': u'cyrus-sasl-sql-2.1.22-7.el5_8.1.x86_64.rpm', u'epoch': u'0', u'version': u'2.1.22', u'release': u'7.el5_8.1', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u'[2.0.52-28.4]\n- rgmanager: Fix for reading /proc/mounts in fs.sh\n Resolves: rhbz#852865', u'issued': u'2012-09-05', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELBA-2012-1230.html', u'type': u'self', u'id': None, u'title': u'ELBA-2012-1230'}], u'_content_type_id': u'erratum', u'_id': u'c3dbc021-a49e-4668-8575-99747485f1ba', u'from': u'el-errata@oss.oracle.com', u'severity': u'', u'title': u'rgmanager bug fix update', u'_ns': u'units_erratum', u'rights': u'Copyright 2012 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 5', u'reboot_suggested': False, u'type': u'bugfix', u'pkglist': [{u'packages': [{u'src': None, u'name': u'rgmanager', u'sum': [u'md5', u'f89d50cd13009fd235e19baf3ca25325'], u'filename': u'rgmanager-2.0.52-28.el5_8.4.src.rpm', u'epoch': u'0', u'version': u'2.0.52', u'release': u'28.el5_8.4', u'arch': u'src'}, {u'src': None, u'name': u'rgmanager', u'sum': [u'md5', u'144e9f0e136033e6187c3a26156ea0fd'], u'filename': u'rgmanager-2.0.52-28.el5_8.4.x86_64.rpm', u'epoch': u'0', u'version': u'2.0.52', u'release': u'28.el5_8.4', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u'[0.6.5-14.5]\n- do not dereference ph1 when it might be NULL\n- increase the default pfkey socket buffer size and never decrease it', u'issued': u'2012-09-11', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELBA-2012-1249.html', u'type': u'self', u'id': None, u'title': u'ELBA-2012-1249'}], u'_content_type_id': u'erratum', u'_id': u'c412e558-6595-4a59-b6c7-032038586fa4', u'from': u'el-errata@oss.oracle.com', u'severity': u'', u'title': u'ipsec-tools bug fix update', u'_ns': u'units_erratum', u'rights': u'Copyright 2012 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 5', u'reboot_suggested': False, u'type': u'bugfix', u'pkglist': [{u'packages': [{u'src': None, u'name': u'ipsec-tools', u'sum': [u'md5', u'31bffebd4310ab7e7c6f0fb417ae767c'], u'filename': u'ipsec-tools-0.6.5-14.el5_8.5.src.rpm', u'epoch': u'0', u'version': u'0.6.5', u'release': u'14.el5_8.5', u'arch': u'src'}, {u'src': None, u'name': u'ipsec-tools', u'sum': [u'md5', u'e1b8fbb7f2733cb9471d041efac1778d'], u'filename': u'ipsec-tools-0.6.5-14.el5_8.5.x86_64.rpm', u'epoch': u'0', u'version': u'0.6.5', u'release': u'14.el5_8.5', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u"[7.0.1-42.el5_8.1]\n- Fix 'GDB cannot access struct member whose offset is larger than 256MB' (BZ 837894).", u'issued': u'2012-09-12', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELBA-2012-1257.html', u'type': u'self', u'id': None, u'title': u'ELBA-2012-1257'}], u'_content_type_id': u'erratum', u'_id': u'2c7e6831-99b3-4f85-bbef-2fa9de8f4c66', u'from': u'el-errata@oss.oracle.com', u'severity': u'', u'title': u'gdb bug fix update', u'_ns': u'units_erratum', u'rights': u'Copyright 2012 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 5', u'reboot_suggested': False, u'type': u'bugfix', u'pkglist': [{u'packages': [{u'src': None, u'name': u'gdb', u'sum': [u'md5', u'e824eb7ed929216b3abd6927247fb44e'], u'filename': u'gdb-7.0.1-42.el5_8.1.src.rpm', u'epoch': u'0', u'version': u'7.0.1', u'release': u'42.el5_8.1', u'arch': u'src'}, {u'src': None, u'name': u'gdb', u'sum': [u'md5', u'b052bbc2d93be00fa1f608542a624ffb'], u'filename': u'gdb-7.0.1-42.el5_8.1.x86_64.rpm', u'epoch': u'0', u'version': u'7.0.1', u'release': u'42.el5_8.1', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u"[1.0.8-4.2]\n- Bugzilla Bug #849044 - https (with mod_nss) fails with reverse proxy when\n using with mod_proxy\n- Z-Stream patch for 'mod_nss' (RHEL 5.8)", u'issued': u'2012-09-12', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELBA-2012-1260.html', u'type': u'self', u'id': None, u'title': u'ELBA-2012-1260'}], u'_content_type_id': u'erratum', u'_id': u'256e59ab-705d-465f-8e07-15a236a19901', u'from': u'el-errata@oss.oracle.com', u'severity': u'', u'title': u'mod_nss bug fix update', u'_ns': u'units_erratum', u'rights': u'Copyright 2012 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 5', u'reboot_suggested': False, u'type': u'bugfix', u'pkglist': [{u'packages': [{u'src': None, u'name': u'mod_nss', u'sum': [u'md5', u'37964d7163c22d14c7b082d9b15bbf3c'], u'filename': u'mod_nss-1.0.8-4.el5_8.2.src.rpm', u'epoch': u'0', u'version': u'1.0.8', u'release': u'4.el5_8.2', u'arch': u'src'}, {u'src': None, u'name': u'mod_nss', u'sum': [u'md5', u'1e2762f0b4ee664edba77975fd0f4604'], u'filename': u'mod_nss-1.0.8-4.el5_8.2.x86_64.rpm', u'epoch': u'0', u'version': u'1.0.8', u'release': u'4.el5_8.2', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u'[1.7.2p1-14.4]\n- Implement a new sudoers Defaults option to restore old command exec behavior\n Resolves: rhbz#854513', u'issued': u'2012-09-16', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELBA-2012-1270.html', u'type': u'self', u'id': None, u'title': u'ELBA-2012-1270'}], u'_content_type_id': u'erratum', u'_id': u'22e2741d-6055-4288-b878-1c51e479bdf3', u'from': u'el-errata@oss.oracle.com', u'severity': u'', u'title': u'sudo bug fix update', u'_ns': u'units_erratum', u'rights': u'Copyright 2012 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 5', u'reboot_suggested': False, u'type': u'bugfix', u'pkglist': [{u'packages': [{u'src': None, u'name': u'sudo', u'sum': [u'md5', u'e843a08d558bdeccaf5fca85d1ce99e6'], u'filename': u'sudo-1.7.2p1-14.el5_8.4.src.rpm', u'epoch': u'0', u'version': u'1.7.2p1', u'release': u'14.el5_8.4', u'arch': u'src'}, {u'src': None, u'name': u'sudo', u'sum': [u'md5', u'86ce1132b985a4861d94c23d602dddd3'], u'filename': u'sudo-1.7.2p1-14.el5_8.4.x86_64.rpm', u'epoch': u'0', u'version': u'1.7.2p1', u'release': u'14.el5_8.4', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u'[0.7.8.3-11.2.el5]\n- include the proper patch to fix the maximum distance for cursor devices on\n Intuos [843859]\n\n[0.7.8.3-11.1.el5]\n- fixed maximum distance for cursor device [843859]\n- fixed initial tool value for when the server starts and the tool is in proximity [843859]', u'issued': u'2012-09-16', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELBA-2012-1271.html', u'type': u'self', u'id': None, u'title': u'ELBA-2012-1271'}], u'_content_type_id': u'erratum', u'_id': u'c854e67e-95d6-4b33-9e26-460b48a02a74', u'from': u'el-errata@oss.oracle.com', u'severity': u'', u'title': u'linuxwacom bug fix update', u'_ns': u'units_erratum', u'rights': u'Copyright 2012 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 5', u'reboot_suggested': False, u'type': u'bugfix', u'pkglist': [{u'packages': [{u'src': None, u'name': u'linuxwacom', u'sum': [u'md5', u'fe7d8f0e48f318a6f5b46e580fb806d7'], u'filename': u'linuxwacom-0.7.8.3-11.2.el5_8.src.rpm', u'epoch': u'0', u'version': u'0.7.8.3', u'release': u'11.2.el5_8', u'arch': u'src'}, {u'src': None, u'name': u'linuxwacom', u'sum': [u'md5', u'f3cc1d294bf07a4d9e0a0360bae35ca0'], u'filename': u'linuxwacom-0.7.8.3-11.2.el5_8.x86_64.rpm', u'epoch': u'0', u'version': u'0.7.8.3', u'release': u'11.2.el5_8', u'arch': u'x86_64'}, {u'src': None, u'name': u'linuxwacom-devel', u'sum': [u'md5', u'a62254e9ff847a51f33b161554a2a651'], u'filename': u'linuxwacom-devel-0.7.8.3-11.2.el5_8.i386.rpm', u'epoch': u'0', u'version': u'0.7.8.3', u'release': u'11.2.el5_8', u'arch': u'i386'}, {u'src': None, u'name': u'linuxwacom-devel', u'sum': [u'md5', u'14cfdca664c6dc241627e9813e5a193e'], u'filename': u'linuxwacom-devel-0.7.8.3-11.2.el5_8.x86_64.rpm', u'epoch': u'0', u'version': u'0.7.8.3', u'release': u'11.2.el5_8', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u'[1.102pre-154.1.0.3.el5_8.1]\n- fix mounting root fs on labeled disk (Maxim Uvarov) [orabug: 13709374]\nMerge following patches from mkinitrd:\n- mkinitrd-fix-san-boot.patch\n- mkinitrd-fix-shared-lib-library-path.patch\n- mkinitrd-5.1.19.6-libfirmware-subdir-include.patch\n- mkinitrd-fix-setquiet-for-non-verbose.patch\n- add-option-to-forceload-multipath.patch\n- Update kexec-kdump-howto.txt with Oracle references\n- Add mkdumprd load firmware support [orabug 10432768]\n- Updated makedumpfile to el6 version (Herbert van den Bergh) [orabug 10088607]\n- Merged UEK modification,Updated Source1 kdump.init\n Added --allow-missing for rebuilding kdump_initrd\n- Updated kexec-kdump-howto.txt with Oracle references\n\n[1.102pre-154.1]\n- unify network starting code for iscsi, resolve bug 822617.', u'issued': u'2012-09-20', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELBA-2012-1272.html', u'type': u'self', u'id': None, u'title': u'ELBA-2012-1272'}], u'_content_type_id': u'erratum', u'_id': u'4c4113fe-2a97-4249-ae46-a86453342b6c', u'from': u'el-errata@oss.oracle.com', u'severity': u'', u'title': u'kexec-tools bug fix update', u'_ns': u'units_erratum', u'rights': u'Copyright 2012 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 5', u'reboot_suggested': False, u'type': u'bugfix', u'pkglist': [{u'packages': [{u'src': None, u'name': u'kexec-tools', u'sum': [u'md5', u'98a0d3c6ca7c3a0f02437e9ef76e2629'], u'filename': u'kexec-tools-1.102pre-154.0.3.el5_8.1.src.rpm', u'epoch': u'0', u'version': u'1.102pre', u'release': u'154.0.3.el5_8.1', u'arch': u'src'}, {u'src': None, u'name': u'kexec-tools', u'sum': [u'md5', u'08cbe172140d31c68679238b5f9d71d6'], u'filename': u'kexec-tools-1.102pre-154.0.3.el5_8.1.x86_64.rpm', u'epoch': u'0', u'version': u'1.102pre', u'release': u'154.0.3.el5_8.1', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u'[1:0.33-4]\n- Errors in LDAP communication when sent data is too large\n- Zstream errata\n- Resolves: rhbz#858699', u'issued': u'2012-09-21', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELBA-2012-1303.html', u'type': u'self', u'id': None, u'title': u'ELBA-2012-1303'}], u'_content_type_id': u'erratum', u'_id': u'f71b5f71-9ba7-4e90-82d5-0fae2b87d147', u'from': u'el-errata@oss.oracle.com', u'severity': u'', u'title': u'perl-LDAP bug fix update', u'_ns': u'units_erratum', u'rights': u'Copyright 2012 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 5', u'reboot_suggested': False, u'type': u'bugfix', u'pkglist': [{u'packages': [{u'src': None, u'name': u'perl-LDAP', u'sum': [u'md5', u'f22a3b72e94ad39815613f4a39e8e2fa'], u'filename': u'perl-LDAP-0.33-4.el5_8.noarch.rpm', u'epoch': u'1', u'version': u'0.33', u'release': u'4.el5_8', u'arch': u'noarch'}, {u'src': None, u'name': u'perl-LDAP', u'sum': [u'md5', u'f5b66ef3a448cdec02e248f6ae0e151f'], u'filename': u'perl-LDAP-0.33-4.el5_8.src.rpm', u'epoch': u'1', u'version': u'0.33', u'release': u'4.el5_8', u'arch': u'src'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u"[2.0.52-28.5]\n- rgmanager: Don't use the resource name in tmp file names\n Resolves: rhbz#858022", u'issued': u'2012-10-04', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELBA-2012-1333.html', u'type': u'self', u'id': None, u'title': u'ELBA-2012-1333'}], u'_content_type_id': u'erratum', u'_id': u'14f20f28-723b-4b94-859a-69b4c4625b98', u'from': u'el-errata@oss.oracle.com', u'severity': u'', u'title': u'rgmanager bug fix update', u'_ns': u'units_erratum', u'rights': u'Copyright 2012 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 5', u'reboot_suggested': False, u'type': u'bugfix', u'pkglist': [{u'packages': [{u'src': None, u'name': u'rgmanager', u'sum': [u'md5', u'b6d78053ed88f0ec1b72ce62964eebba'], u'filename': u'rgmanager-2.0.52-28.el5_8.5.src.rpm', u'epoch': u'0', u'version': u'2.0.52', u'release': u'28.el5_8.5', u'arch': u'src'}, {u'src': None, u'name': u'rgmanager', u'sum': [u'md5', u'e78aaf3cd4c8c8bba0836dbcfde00b03'], u'filename': u'rgmanager-2.0.52-28.el5_8.5.x86_64.rpm', u'epoch': u'0', u'version': u'2.0.52', u'release': u'28.el5_8.5', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u'[1.1.1-48.91.0.1.el5_8.2]\n- Added oracle-enterprise-detect.patch\n- Replaced Red Hat in spec file\n\n[1.1.1-48.91.2]\n- fix prgn leak patch to use REGION_DESTROY\n\n[1.1.1-48.91.el5_8.1]\n- xserver-1.1.1-fix-prgn-leak.patch: Fix a region leak in composite wrapper (#854634)', u'issued': u'2012-10-04', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELBA-2012-1335.html', u'type': u'self', u'id': None, u'title': u'ELBA-2012-1335'}], u'_content_type_id': u'erratum', u'_id': u'61a9ad2e-0478-4859-ac17-c2dde6766645', u'from': u'el-errata@oss.oracle.com', u'severity': u'', u'title': u'xorg-x11-server bug fix update', u'_ns': u'units_erratum', u'rights': u'Copyright 2012 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 5', u'reboot_suggested': False, u'type': u'bugfix', u'pkglist': [{u'packages': [{u'src': None, u'name': u'xorg-x11-server', u'sum': [u'md5', u'9759c633878f407a2ff3e264f9084679'], u'filename': u'xorg-x11-server-1.1.1-48.91.0.1.el5_8.2.src.rpm', u'epoch': u'0', u'version': u'1.1.1', u'release': u'48.91.0.1.el5_8.2', u'arch': u'src'}, {u'src': None, u'name': u'xorg-x11-server-Xdmx', u'sum': [u'md5', u'080592d023a9ece1931d3b3d40fac232'], u'filename': u'xorg-x11-server-Xdmx-1.1.1-48.91.0.1.el5_8.2.x86_64.rpm', u'epoch': u'0', u'version': u'1.1.1', u'release': u'48.91.0.1.el5_8.2', u'arch': u'x86_64'}, {u'src': None, u'name': u'xorg-x11-server-Xephyr', u'sum': [u'md5', u'88569a58fef0111465c14ca8bebbb476'], u'filename': u'xorg-x11-server-Xephyr-1.1.1-48.91.0.1.el5_8.2.x86_64.rpm', u'epoch': u'0', u'version': u'1.1.1', u'release': u'48.91.0.1.el5_8.2', u'arch': u'x86_64'}, {u'src': None, u'name': u'xorg-x11-server-Xnest', u'sum': [u'md5', u'fa1d73a4eab4b0f849da87c2040b112c'], u'filename': u'xorg-x11-server-Xnest-1.1.1-48.91.0.1.el5_8.2.x86_64.rpm', u'epoch': u'0', u'version': u'1.1.1', u'release': u'48.91.0.1.el5_8.2', u'arch': u'x86_64'}, {u'src': None, u'name': u'xorg-x11-server-Xorg', u'sum': [u'md5', u'f17d286dc9e2cb024b576fbbde24e857'], u'filename': u'xorg-x11-server-Xorg-1.1.1-48.91.0.1.el5_8.2.x86_64.rpm', u'epoch': u'0', u'version': u'1.1.1', u'release': u'48.91.0.1.el5_8.2', u'arch': u'x86_64'}, {u'src': None, u'name': u'xorg-x11-server-Xvfb', u'sum': [u'md5', u'58d7fb5747ddac0c8e9a4af1af06550f'], u'filename': u'xorg-x11-server-Xvfb-1.1.1-48.91.0.1.el5_8.2.x86_64.rpm', u'epoch': u'0', u'version': u'1.1.1', u'release': u'48.91.0.1.el5_8.2', u'arch': u'x86_64'}, {u'src': None, u'name': u'xorg-x11-server-Xvnc-source', u'sum': [u'md5', u'bdcf40ef4adda87bed197d80ad1b7ae6'], u'filename': u'xorg-x11-server-Xvnc-source-1.1.1-48.91.0.1.el5_8.2.x86_64.rpm', u'epoch': u'0', u'version': u'1.1.1', u'release': u'48.91.0.1.el5_8.2', u'arch': u'x86_64'}, {u'src': None, u'name': u'xorg-x11-server-sdk', u'sum': [u'md5', u'39c5bc64bc6690630bf8904d2b7d6899'], u'filename': u'xorg-x11-server-sdk-1.1.1-48.91.0.1.el5_8.2.x86_64.rpm', u'epoch': u'0', u'version': u'1.1.1', u'release': u'48.91.0.1.el5_8.2', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u'[1.5.1-49.3]\n- Resolves: rhbz#860788 - After updating to sssd-1.5.1-49.el5_8.1 does not\n show up nested groups while authenticating to\n Windows AD 2008\n\n[1.5.1-49.2]\n- Resolves: rhbz#828902 - Infinite loop checking Kerberos credentials\n- Resolves: rhbz#828528 - sssd fails to use the last AD server if other AD\n servers are not reachable', u'issued': u'2012-10-07', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELBA-2012-1342.html', u'type': u'self', u'id': None, u'title': u'ELBA-2012-1342'}], u'_content_type_id': u'erratum', u'_id': u'f6e68c7b-dca0-4249-8b52-c6035fdd8163', u'from': u'el-errata@oss.oracle.com', u'severity': u'', u'title': u'sssd bug fix update', u'_ns': u'units_erratum', u'rights': u'Copyright 2012 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 5', u'reboot_suggested': False, u'type': u'bugfix', u'pkglist': [{u'packages': [{u'src': None, u'name': u'libipa_hbac', u'sum': [u'md5', u'28bba577ca408c87266745d9e237250c'], u'filename': u'libipa_hbac-1.5.1-49.el5_8.3.i386.rpm', u'epoch': u'0', u'version': u'1.5.1', u'release': u'49.el5_8.3', u'arch': u'i386'}, {u'src': None, u'name': u'libipa_hbac', u'sum': [u'md5', u'8f59e51cc66a971a8cf025ccde8b02d5'], u'filename': u'libipa_hbac-1.5.1-49.el5_8.3.x86_64.rpm', u'epoch': u'0', u'version': u'1.5.1', u'release': u'49.el5_8.3', u'arch': u'x86_64'}, {u'src': None, u'name': u'libipa_hbac-devel', u'sum': [u'md5', u'87995b838e0fdcc4bbddb28e412a92b3'], u'filename': u'libipa_hbac-devel-1.5.1-49.el5_8.3.i386.rpm', u'epoch': u'0', u'version': u'1.5.1', u'release': u'49.el5_8.3', u'arch': u'i386'}, {u'src': None, u'name': u'libipa_hbac-devel', u'sum': [u'md5', u'ded70ef561e0575ccb22d27647a9ca16'], u'filename': u'libipa_hbac-devel-1.5.1-49.el5_8.3.x86_64.rpm', u'epoch': u'0', u'version': u'1.5.1', u'release': u'49.el5_8.3', u'arch': u'x86_64'}, {u'src': None, u'name': u'libipa_hbac-python', u'sum': [u'md5', u'27cac949eedc523dc01877ed1dc49e18'], u'filename': u'libipa_hbac-python-1.5.1-49.el5_8.3.x86_64.rpm', u'epoch': u'0', u'version': u'1.5.1', u'release': u'49.el5_8.3', u'arch': u'x86_64'}, {u'src': None, u'name': u'sssd', u'sum': [u'md5', u'6749ed572fe117327caef8a961e079a5'], u'filename': u'sssd-1.5.1-49.el5_8.3.x86_64.rpm', u'epoch': u'0', u'version': u'1.5.1', u'release': u'49.el5_8.3', u'arch': u'x86_64'}, {u'src': None, u'name': u'sssd-client', u'sum': [u'md5', u'e13e628bde14d4bf1a5b3eee4d405a81'], u'filename': u'sssd-client-1.5.1-49.el5_8.3.i386.rpm', u'epoch': u'0', u'version': u'1.5.1', u'release': u'49.el5_8.3', u'arch': u'i386'}, {u'src': None, u'name': u'sssd-client', u'sum': [u'md5', u'11b2201150d50257994ba6ef31694dc6'], u'filename': u'sssd-client-1.5.1-49.el5_8.3.x86_64.rpm', u'epoch': u'0', u'version': u'1.5.1', u'release': u'49.el5_8.3', u'arch': u'x86_64'}, {u'src': None, u'name': u'sssd-tools', u'sum': [u'md5', u'a8ae4aaf7ceed28b1031342b646a7a39'], u'filename': u'sssd-tools-1.5.1-49.el5_8.3.x86_64.rpm', u'epoch': u'0', u'version': u'1.5.1', u'release': u'49.el5_8.3', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u'[2.0.115-93.4]\n- fence_vmware_soap: Improve speed of fencing and fix issues with VM without valid UUID\n Resolves: rhbz#861392', u'issued': u'2012-10-09', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELBA-2012-1348.html', u'type': u'self', u'id': None, u'title': u'ELBA-2012-1348'}], u'_content_type_id': u'erratum', u'_id': u'1a3c84bc-4e9d-428e-a770-a294f53f71b1', u'from': u'el-errata@oss.oracle.com', u'severity': u'', u'title': u'cman bug fix update', u'_ns': u'units_erratum', u'rights': u'Copyright 2012 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 5', u'reboot_suggested': False, u'type': u'bugfix', u'pkglist': [{u'packages': [{u'src': None, u'name': u'cman', u'sum': [u'md5', u'5fdb69ab7d4b720cb387db896ed0c8d7'], u'filename': u'cman-2.0.115-96.el5_8.4.src.rpm', u'epoch': u'0', u'version': u'2.0.115', u'release': u'96.el5_8.4', u'arch': u'src'}, {u'src': None, u'name': u'cman', u'sum': [u'md5', u'41a41ee036c6744f3df45532730a23f3'], u'filename': u'cman-2.0.115-96.el5_8.4.x86_64.rpm', u'epoch': u'0', u'version': u'2.0.115', u'release': u'96.el5_8.4', u'arch': u'x86_64'}, {u'src': None, u'name': u'cman-devel', u'sum': [u'md5', u'2a0465d17f1cebed4d44b0ee5ab5e8ea'], u'filename': u'cman-devel-2.0.115-96.el5_8.4.i386.rpm', u'epoch': u'0', u'version': u'2.0.115', u'release': u'96.el5_8.4', u'arch': u'i386'}, {u'src': None, u'name': u'cman-devel', u'sum': [u'md5', u'4516ae97594f3af927536e5c0d839949'], u'filename': u'cman-devel-2.0.115-96.el5_8.4.x86_64.rpm', u'epoch': u'0', u'version': u'2.0.115', u'release': u'96.el5_8.4', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u'[2.0.16-13.el5]\n- ipmitool: fix ipmi command retry shifts replies (#867008)', u'issued': u'2012-10-26', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELBA-2012-1406.html', u'type': u'self', u'id': None, u'title': u'ELBA-2012-1406'}], u'_content_type_id': u'erratum', u'_id': u'90472021-4b9a-4cd8-ba6b-2961789e38af', u'from': u'el-errata@oss.oracle.com', u'severity': u'', u'title': u'OpenIPMI bug fix update', u'_ns': u'units_erratum', u'rights': u'Copyright 2012 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 5', u'reboot_suggested': False, u'type': u'bugfix', u'pkglist': [{u'packages': [{u'src': None, u'name': u'OpenIPMI', u'sum': [u'md5', u'2c8344adcf5cd8bd8cc20ae997acf383'], u'filename': u'OpenIPMI-2.0.16-13.el5_8.src.rpm', u'epoch': u'0', u'version': u'2.0.16', u'release': u'13.el5_8', u'arch': u'src'}, {u'src': None, u'name': u'OpenIPMI', u'sum': [u'md5', u'457bf853b0d956227d1d86f456fba77f'], u'filename': u'OpenIPMI-2.0.16-13.el5_8.x86_64.rpm', u'epoch': u'0', u'version': u'2.0.16', u'release': u'13.el5_8', u'arch': u'x86_64'}, {u'src': None, u'name': u'OpenIPMI-devel', u'sum': [u'md5', u'c57b7dce82cda3838847b19d44b80506'], u'filename': u'OpenIPMI-devel-2.0.16-13.el5_8.i386.rpm', u'epoch': u'0', u'version': u'2.0.16', u'release': u'13.el5_8', u'arch': u'i386'}, {u'src': None, u'name': u'OpenIPMI-devel', u'sum': [u'md5', u'cd2124a9b58ffa1b98414d31635033e5'], u'filename': u'OpenIPMI-devel-2.0.16-13.el5_8.x86_64.rpm', u'epoch': u'0', u'version': u'2.0.16', u'release': u'13.el5_8', u'arch': u'x86_64'}, {u'src': None, u'name': u'OpenIPMI-gui', u'sum': [u'md5', u'0b29bb0dc10a20ee19d2f592dd1efb82'], u'filename': u'OpenIPMI-gui-2.0.16-13.el5_8.x86_64.rpm', u'epoch': u'0', u'version': u'2.0.16', u'release': u'13.el5_8', u'arch': u'x86_64'}, {u'src': None, u'name': u'OpenIPMI-libs', u'sum': [u'md5', u'8880695c101e666e27243ad66fe63b01'], u'filename': u'OpenIPMI-libs-2.0.16-13.el5_8.i386.rpm', u'epoch': u'0', u'version': u'2.0.16', u'release': u'13.el5_8', u'arch': u'i386'}, {u'src': None, u'name': u'OpenIPMI-libs', u'sum': [u'md5', u'bf475da499925aba1d74e909468adda8'], u'filename': u'OpenIPMI-libs-2.0.16-13.el5_8.x86_64.rpm', u'epoch': u'0', u'version': u'2.0.16', u'release': u'13.el5_8', u'arch': u'x86_64'}, {u'src': None, u'name': u'OpenIPMI-perl', u'sum': [u'md5', u'3c8ff28fab6a59030d3989400ab20e3d'], u'filename': u'OpenIPMI-perl-2.0.16-13.el5_8.x86_64.rpm', u'epoch': u'0', u'version': u'2.0.16', u'release': u'13.el5_8', u'arch': u'x86_64'}, {u'src': None, u'name': u'OpenIPMI-python', u'sum': [u'md5', u'6c8eb5c3dfde166a8987c450f4a6aa48'], u'filename': u'OpenIPMI-python-2.0.16-13.el5_8.x86_64.rpm', u'epoch': u'0', u'version': u'2.0.16', u'release': u'13.el5_8', u'arch': u'x86_64'}, {u'src': None, u'name': u'OpenIPMI-tools', u'sum': [u'md5', u'4dd13e96741c54091a74bc9368d9e959'], u'filename': u'OpenIPMI-tools-2.0.16-13.el5_8.x86_64.rpm', u'epoch': u'0', u'version': u'2.0.16', u'release': u'13.el5_8', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u'[5.8.8-38.el5_8]\n- 848156 - Reverts code of perl-5.8.8-U32019.patch\n- Resolves: rhbz#865709', u'issued': u'2012-10-29', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELBA-2012-1411.html', u'type': u'self', u'id': None, u'title': u'ELBA-2012-1411'}], u'_content_type_id': u'erratum', u'_id': u'6557fa41-1ac0-44ba-90b2-f05225628629', u'from': u'el-errata@oss.oracle.com', u'severity': u'', u'title': u'perl bug fix update', u'_ns': u'units_erratum', u'rights': u'Copyright 2012 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 5', u'reboot_suggested': False, u'type': u'bugfix', u'pkglist': [{u'packages': [{u'src': None, u'name': u'perl', u'sum': [u'md5', u'87dc65ded6824e0f2de797cd03ca5fd1'], u'filename': u'perl-5.8.8-38.el5_8.src.rpm', u'epoch': u'4', u'version': u'5.8.8', u'release': u'38.el5_8', u'arch': u'src'}, {u'src': None, u'name': u'perl', u'sum': [u'md5', u'344c5de35f9c37e1c7e0a9f739d7e322'], u'filename': u'perl-5.8.8-38.el5_8.x86_64.rpm', u'epoch': u'4', u'version': u'5.8.8', u'release': u'38.el5_8', u'arch': u'x86_64'}, {u'src': None, u'name': u'perl-suidperl', u'sum': [u'md5', u'7c2253835894adc35c0ae3bfa1100d44'], u'filename': u'perl-suidperl-5.8.8-38.el5_8.x86_64.rpm', u'epoch': u'4', u'version': u'5.8.8', u'release': u'38.el5_8', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u'[10.0.10-2.0.1.el5_8]\n- Add firefox-oracle-default-prefs.js and firefox-oracle-default-bookmarks.html\n and remove the corresponding Red Hat ones\n\n[10.0.10-2]\n- Enabled OOP for wrapped plugins (rhbz#871568)', u'issued': u'2012-11-06', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELBA-2012-1429.html', u'type': u'self', u'id': None, u'title': u'ELBA-2012-1429'}], u'_content_type_id': u'erratum', u'_id': u'99560448-93d5-438e-a64e-b544508c5999', u'from': u'el-errata@oss.oracle.com', u'severity': u'', u'title': u'firefox bug fix update', u'_ns': u'units_erratum', u'rights': u'Copyright 2012 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 5', u'reboot_suggested': False, u'type': u'bugfix', u'pkglist': [{u'packages': [{u'src': None, u'name': u'firefox', u'sum': [u'md5', u'bf2d5fbe597093a978685ebd88952c3a'], u'filename': u'firefox-10.0.10-2.0.1.el5_8.i386.rpm', u'epoch': u'0', u'version': u'10.0.10', u'release': u'2.0.1.el5_8', u'arch': u'i386'}, {u'src': None, u'name': u'firefox', u'sum': [u'md5', u'cd9dea5e936f67ca1c596b4b54a3aac6'], u'filename': u'firefox-10.0.10-2.0.1.el5_8.src.rpm', u'epoch': u'0', u'version': u'10.0.10', u'release': u'2.0.1.el5_8', u'arch': u'src'}, {u'src': None, u'name': u'firefox', u'sum': [u'md5', u'2d92d9ac03ac01a101b799c28fd52c84'], u'filename': u'firefox-10.0.10-2.0.1.el5_8.x86_64.rpm', u'epoch': u'0', u'version': u'10.0.10', u'release': u'2.0.1.el5_8', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u'[2.13-0.59.0.2.el5_8]\n- Merge UEK modification\n fix #10104470 - Import hwclock from util-linux-ng [Kris Van Hees]\n- enable audit support\n\n[2.13-0.59.el5_8]\n- fix #865791 - fdisk fails to partition disk not in use', u'issued': u'2012-11-08', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELBA-2012-1437.html', u'type': u'self', u'id': None, u'title': u'ELBA-2012-1437'}], u'_content_type_id': u'erratum', u'_id': u'ff0da1e5-562a-436c-9108-6c0d024e38ae', u'from': u'el-errata@oss.oracle.com', u'severity': u'', u'title': u'util-linux bug fix update', u'_ns': u'units_erratum', u'rights': u'Copyright 2012 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 5', u'reboot_suggested': False, u'type': u'bugfix', u'pkglist': [{u'packages': [{u'src': None, u'name': u'util-linux', u'sum': [u'md5', u'a87af3cb5d6c09fcd12a90ef395181cb'], u'filename': u'util-linux-2.13-0.59.0.2.el5_8.src.rpm', u'epoch': u'0', u'version': u'2.13', u'release': u'0.59.0.2.el5_8', u'arch': u'src'}, {u'src': None, u'name': u'util-linux', u'sum': [u'md5', u'b23fbff0206530591021da79eb4bfd44'], u'filename': u'util-linux-2.13-0.59.0.2.el5_8.x86_64.rpm', u'epoch': u'0', u'version': u'2.13', u'release': u'0.59.0.2.el5_8', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u"[2.2.3-65.0.1.el5_8.3]\n- Fix mod_ssl always performing full renegotiation (orabug 12423387)\n- replace index.html with Oracle's index page oracle_index.html\n- update vstring and distro in specfile\n\n[2.2.3-65.3]\n- mod_cache: fix header merging for 304 case (#873730)\n\n[2.2.3-65.2]\n- mod_mem_cache: fix connection abort handling (#873677)", u'issued': u'2012-11-12', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELBA-2012-1448.html', u'type': u'self', u'id': None, u'title': u'ELBA-2012-1448'}], u'_content_type_id': u'erratum', u'_id': u'b0ba383a-6148-4890-9bf2-d843df40b24a', u'from': u'el-errata@oss.oracle.com', u'severity': u'', u'title': u'httpd bug fix update', u'_ns': u'units_erratum', u'rights': u'Copyright 2012 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 5', u'reboot_suggested': False, u'type': u'bugfix', u'pkglist': [{u'packages': [{u'src': None, u'name': u'httpd', u'sum': [u'md5', u'976c8de49d8ea60f9b3d5b805cb77edc'], u'filename': u'httpd-2.2.3-65.0.1.el5_8.3.src.rpm', u'epoch': u'0', u'version': u'2.2.3', u'release': u'65.0.1.el5_8.3', u'arch': u'src'}, {u'src': None, u'name': u'httpd', u'sum': [u'md5', u'13d502ce6b3fffb51c1f921e83897975'], u'filename': u'httpd-2.2.3-65.0.1.el5_8.3.x86_64.rpm', u'epoch': u'0', u'version': u'2.2.3', u'release': u'65.0.1.el5_8.3', u'arch': u'x86_64'}, {u'src': None, u'name': u'httpd-devel', u'sum': [u'md5', u'5d90b97a112965b4e1a608177b0dd8c2'], u'filename': u'httpd-devel-2.2.3-65.0.1.el5_8.3.i386.rpm', u'epoch': u'0', u'version': u'2.2.3', u'release': u'65.0.1.el5_8.3', u'arch': u'i386'}, {u'src': None, u'name': u'httpd-devel', u'sum': [u'md5', u'bcf0c733d91b5d6ae968b10a1863233c'], u'filename': u'httpd-devel-2.2.3-65.0.1.el5_8.3.x86_64.rpm', u'epoch': u'0', u'version': u'2.2.3', u'release': u'65.0.1.el5_8.3', u'arch': u'x86_64'}, {u'src': None, u'name': u'httpd-manual', u'sum': [u'md5', u'81fe88cfab9803a56cdd304af1568862'], u'filename': u'httpd-manual-2.2.3-65.0.1.el5_8.3.x86_64.rpm', u'epoch': u'0', u'version': u'2.2.3', u'release': u'65.0.1.el5_8.3', u'arch': u'x86_64'}, {u'src': None, u'name': u'mod_ssl', u'sum': [u'md5', u'8997a135d6e39db9071439600508316c'], u'filename': u'mod_ssl-2.2.3-65.0.1.el5_8.3.x86_64.rpm', u'epoch': u'1', u'version': u'2.2.3', u'release': u'65.0.1.el5_8.3', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u'[2.0.52-29]\n- rgmanager: Fix for deadlock\n Resolves: rhbz#876962', u'issued': u'2012-11-30', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELBA-2012-1513.html', u'type': u'self', u'id': None, u'title': u'ELBA-2012-1513'}], u'_content_type_id': u'erratum', u'_id': u'bd2c71a8-80d6-450e-ae22-2c9001ca5321', u'from': u'el-errata@oss.oracle.com', u'severity': u'', u'title': u'rgmanager bug fix update', u'_ns': u'units_erratum', u'rights': u'Copyright 2012 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 5', u'reboot_suggested': False, u'type': u'bugfix', u'pkglist': [{u'packages': [{u'src': None, u'name': u'rgmanager', u'sum': [u'md5', u'bf95e856c341e861d2bb009b7f316fb6'], u'filename': u'rgmanager-2.0.52-29.el5_8.5.src.rpm', u'epoch': u'0', u'version': u'2.0.52', u'release': u'29.el5_8.5', u'arch': u'src'}, {u'src': None, u'name': u'rgmanager', u'sum': [u'md5', u'1073d27d6ae2a76d17f921206d79ee06'], u'filename': u'rgmanager-2.0.52-29.el5_8.5.x86_64.rpm', u'epoch': u'0', u'version': u'2.0.52', u'release': u'29.el5_8.5', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u'[32:9.7.0-10.P2.5]\n- improve handling of lame responses with no SOA', u'issued': u'2012-12-20', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELBA-2012-1597.html', u'type': u'self', u'id': None, u'title': u'ELBA-2012-1597'}], u'_content_type_id': u'erratum', u'_id': u'18430f0e-dd72-467c-a303-ca100e4362fe', u'from': u'el-errata@oss.oracle.com', u'severity': u'', u'title': u'bind97 bug fix update', u'_ns': u'units_erratum', u'rights': u'Copyright 2012 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 5', u'reboot_suggested': False, u'type': u'bugfix', u'pkglist': [{u'packages': [{u'src': None, u'name': u'bind97', u'sum': [u'md5', u'9c1509f713bbc8d981978a53eb29e410'], u'filename': u'bind97-9.7.0-10.P2.el5_8.5.src.rpm', u'epoch': u'32', u'version': u'9.7.0', u'release': u'10.P2.el5_8.5', u'arch': u'src'}, {u'src': None, u'name': u'bind97', u'sum': [u'md5', u'8f7dde3da0057c55ea94b68ef19565bd'], u'filename': u'bind97-9.7.0-10.P2.el5_8.5.x86_64.rpm', u'epoch': u'32', u'version': u'9.7.0', u'release': u'10.P2.el5_8.5', u'arch': u'x86_64'}, {u'src': None, u'name': u'bind97-chroot', u'sum': [u'md5', u'e4e50f7e59045b0f70c792c7d43729cb'], u'filename': u'bind97-chroot-9.7.0-10.P2.el5_8.5.x86_64.rpm', u'epoch': u'32', u'version': u'9.7.0', u'release': u'10.P2.el5_8.5', u'arch': u'x86_64'}, {u'src': None, u'name': u'bind97-devel', u'sum': [u'md5', u'4a95b44c0934885b9c20a5869dc3a88a'], u'filename': u'bind97-devel-9.7.0-10.P2.el5_8.5.i386.rpm', u'epoch': u'32', u'version': u'9.7.0', u'release': u'10.P2.el5_8.5', u'arch': u'i386'}, {u'src': None, u'name': u'bind97-devel', u'sum': [u'md5', u'ac1a70e67307ad1e410365d0a9008476'], u'filename': u'bind97-devel-9.7.0-10.P2.el5_8.5.x86_64.rpm', u'epoch': u'32', u'version': u'9.7.0', u'release': u'10.P2.el5_8.5', u'arch': u'x86_64'}, {u'src': None, u'name': u'bind97-libs', u'sum': [u'md5', u'dd7085b07347a88d79917c326f21a859'], u'filename': u'bind97-libs-9.7.0-10.P2.el5_8.5.i386.rpm', u'epoch': u'32', u'version': u'9.7.0', u'release': u'10.P2.el5_8.5', u'arch': u'i386'}, {u'src': None, u'name': u'bind97-libs', u'sum': [u'md5', u'd3ef7e17d9ebf4c700b2452b132fcbe0'], u'filename': u'bind97-libs-9.7.0-10.P2.el5_8.5.x86_64.rpm', u'epoch': u'32', u'version': u'9.7.0', u'release': u'10.P2.el5_8.5', u'arch': u'x86_64'}, {u'src': None, u'name': u'bind97-utils', u'sum': [u'md5', u'0f02b935c089e9ee96fdf5216851f645'], u'filename': u'bind97-utils-9.7.0-10.P2.el5_8.5.x86_64.rpm', u'epoch': u'32', u'version': u'9.7.0', u'release': u'10.P2.el5_8.5', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u'[0.4.7-48.el5.2]\n- Added bz769990.patch\n- Resolves: bz #858010\n', u'issued': u'2012-12-20', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELBA-2012-1599.html', u'type': u'self', u'id': None, u'title': u'ELBA-2012-1599'}], u'_content_type_id': u'erratum', u'_id': u'49ffedac-3806-416b-ae27-ed66d31d3edc', u'from': u'el-errata@oss.oracle.com', u'severity': u'', u'title': u'device-mapper-multipath bug fix update', u'_ns': u'units_erratum', u'rights': u'Copyright 2012 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 5', u'reboot_suggested': False, u'type': u'bugfix', u'pkglist': [{u'packages': [{u'src': None, u'name': u'device-mapper-multipath', u'sum': [u'md5', u'0ab5c2b262750fa032d3e4a5b5d36269'], u'filename': u'device-mapper-multipath-0.4.7-48.el5_8.2.src.rpm', u'epoch': u'0', u'version': u'0.4.7', u'release': u'48.el5_8.2', u'arch': u'src'}, {u'src': None, u'name': u'device-mapper-multipath', u'sum': [u'md5', u'977ce85382ac8e64a1b53e53acbe5938'], u'filename': u'device-mapper-multipath-0.4.7-48.el5_8.2.x86_64.rpm', u'epoch': u'0', u'version': u'0.4.7', u'release': u'48.el5_8.2', u'arch': u'x86_64'}, {u'src': None, u'name': u'kpartx', u'sum': [u'md5', u'061773889274b0e4d5783673e21e9b88'], u'filename': u'kpartx-0.4.7-48.el5_8.2.x86_64.rpm', u'epoch': u'0', u'version': u'0.4.7', u'release': u'48.el5_8.2', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u'\n[2.6.32-300.10.1.el5uek]\n- net: remove extra register in ip_gre (Guru Anbalagane) [Orabug: 13633287]\n\n[2.6.32-300.9.1.el5uek]\n- [netdrv] fnic: return zero on fnic_reset() success (Joe Jin)\n- [e1000e] Add entropy generation back for network interrupts (John Sobecki)\n- [nfs4] LINUX CLIENT TREATS NFS4ERR_GRACE AS A PERMANENT ERROR [orabug 13476821] (John Sobecki)\n- [nfs] NFS CLIENT CONNECTS TO SERVER THEN DISCONNECTS [orabug 13516759] (John Sobecki)\n- [sunrpc] Add patch for a mount crash in __rpc_create_common [orabug 13322773] (John Sobecki)\n\n[2.6.32-300.8.1.el5uek]\n- SPEC: fix dependency on firmware/mkinitrd (Guru Anbalagane) [orabug 13637902]\n- xfs: fix acl count validation in xfs_acl_from_disk() (Dan Carpenter)\n- [SCSI] scsi_dh: check queuedata pointer before proceeding further (Moger Babu) [orabug 13615419]\n\n', u'issued': u'2012-03-01', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELBA-2012-2002.html', u'type': u'self', u'id': None, u'title': u'ELBA-2012-2002'}], u'_content_type_id': u'erratum', u'_id': u'c6328ff7-697c-4f52-bf34-386a994fbec1', u'from': u'el-errata@oss.oracle.com', u'severity': u'', u'title': u' Unbreakable Enterprise kernel bug fix update', u'_ns': u'units_erratum', u'rights': u'Copyright 2012 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 5', u'reboot_suggested': False, u'type': u'bugfix', u'pkglist': [{u'packages': [{u'src': None, u'name': u'kernel-uek', u'sum': [u'md5', u'66487e4711027b209d1d8917ccdaf87a'], u'filename': u'kernel-uek-2.6.32-300.10.1.el5uek.src.rpm', u'epoch': u'0', u'version': u'2.6.32', u'release': u'300.10.1.el5uek', u'arch': u'src'}, {u'src': None, u'name': u'kernel-uek', u'sum': [u'md5', u'1a8b78ab38ad6c816d017e49f9ccaf30'], u'filename': u'kernel-uek-2.6.32-300.10.1.el5uek.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.32', u'release': u'300.10.1.el5uek', u'arch': u'x86_64'}, {u'src': None, u'name': u'kernel-uek-debug', u'sum': [u'md5', u'88a5a194e3ae43482793fc68093897db'], u'filename': u'kernel-uek-debug-2.6.32-300.10.1.el5uek.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.32', u'release': u'300.10.1.el5uek', u'arch': u'x86_64'}, {u'src': None, u'name': u'kernel-uek-debug-devel', u'sum': [u'md5', u'79a2a35117f561c64742070b2abe8160'], u'filename': u'kernel-uek-debug-devel-2.6.32-300.10.1.el5uek.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.32', u'release': u'300.10.1.el5uek', u'arch': u'x86_64'}, {u'src': None, u'name': u'kernel-uek-devel', u'sum': [u'md5', u'8f1d7877e73de9ca611500abb69bf5db'], u'filename': u'kernel-uek-devel-2.6.32-300.10.1.el5uek.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.32', u'release': u'300.10.1.el5uek', u'arch': u'x86_64'}, {u'src': None, u'name': u'kernel-uek-doc', u'sum': [u'md5', u'17e5890943aff354da511614b06f4374'], u'filename': u'kernel-uek-doc-2.6.32-300.10.1.el5uek.noarch.rpm', u'epoch': u'0', u'version': u'2.6.32', u'release': u'300.10.1.el5uek', u'arch': u'noarch'}, {u'src': None, u'name': u'kernel-uek-firmware', u'sum': [u'md5', u'd4c702e04ad5226838cc57da2c4ba643'], u'filename': u'kernel-uek-firmware-2.6.32-300.10.1.el5uek.noarch.rpm', u'epoch': u'0', u'version': u'2.6.32', u'release': u'300.10.1.el5uek', u'arch': u'noarch'}, {u'src': None, u'name': u'ofa-2.6.32-300.10.1.el5uek', u'sum': [u'md5', u'232b0d4ab0a8f2121d2f00f610111c4c'], u'filename': u'ofa-2.6.32-300.10.1.el5uek-1.5.1-4.0.53.src.rpm', u'epoch': u'0', u'version': u'1.5.1', u'release': u'4.0.53', u'arch': u'src'}, {u'src': None, u'name': u'ofa-2.6.32-300.10.1.el5uek', u'sum': [u'md5', u'a4fa698d021925b15b2251769896fa4d'], u'filename': u'ofa-2.6.32-300.10.1.el5uek-1.5.1-4.0.53.x86_64.rpm', u'epoch': u'0', u'version': u'1.5.1', u'release': u'4.0.53', u'arch': u'x86_64'}, {u'src': None, u'name': u'ofa-2.6.32-300.10.1.el5uekdebug', u'sum': [u'md5', u'22c1c7f8be90a0d5bd227c27fc7c64e5'], u'filename': u'ofa-2.6.32-300.10.1.el5uekdebug-1.5.1-4.0.53.x86_64.rpm', u'epoch': u'0', u'version': u'1.5.1', u'release': u'4.0.53', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u"kernel-uek:\n\n[2.6.32-300.20.1.el6uek]\n- revert PVHVM guests to use the balloon driver (Chuck Anderson) [Orabug: 12683669, 10124120]\n\n[2.6.32-300.19.1.el6uek]\n- mpt2sas: Do not check DIF for unwritten blocks (Martin K. Petersen) [Orabug 13928720]\n- mpt2sas: Return the correct sense key for DIF errors (Martin K. Petersen) [Orabug 13928720]\n- mpt2sas: Add a module parameter that permits overriding protection capabilities (Martin K. Petersen) [Orabug 13928720]\n\n[2.6.32-300.18.1.el6uek]\n- [scsi] mpt2sas 12.105.08.00 (Maxim Uvarov) [Bug 13928720]\n\n[2.6.32-300.17.1.el6uek]\n- NFSv4: Save the owner/group name string when doing open [Orabug 13459986] (Trond Myklebust)\n- x86-64, fpu: Fix %cs value in convert_from_fxsr [Orabug 12659098] (Brian Gerst)\n- cfq-iosched: fix cfq_cic_link() race confition [Orabug 13928285] (Yasuaki Ishimatsu)\n- cfq-iosched: don't regard requests with long distance as close [Orabug 13928285] (Shaohua Li)\n- svcrpc: fix double-free on shutdown of nfsd after changing pool mode [Orabug 13928285] (J. Bruce Fields)\n- svcrpc: avoid memory-corruption on pool shutdown [Orabug 13928285] (J. Bruce Fields)\n- svcrpc: destroy server sockets all at once [Orabug 13928285] (J. Bruce Fields)\n- svcrpc: simplify svc_close_all [Orabug 13928285] (J. Bruce Fields)\n- Improve TSC calibration using a delayed workqueue [Orabug 13928285] (John Stultz)\n- clocksource: Add clocksource_register_hz/khz interface [Orabug 13928285] (John Stultz)\n- clocksource: Provide a generic mult/shift factor calculation [Orabug 13928285] (Thomas Gleixner)\n- [nfs] fall back on normal lookup [Orabug 13928285] (Jeff Layton)\n- [changelog]: Add Chuck Lever and John Haxby for nfs fixes [Orabug 13928285] (Joe Jin)\n\n[2.6.32-300.16.1.el6uek]\n- PVHVM guests to use the balloon driver (Chuck Anderson) [Orabug: 12683669, 10124120]\n\n[2.6.32-300.15.1.el6uek]\n- x86, kdump: Change copy_oldmem_page() to use cached addressing (Cliff Wickman) [Orabug 13729957]\n- Silencing 'killing requests for dead queue' (Hannes Reinecke) [Orabug 13957059]\n\n[2.6.32-300.14.1.el6uek]\n- [DM] lvconvert: merge permitted despite no snapshot-merge support (Mikulas Patocka, Mike Snitzer) [Orabug: 13797085]\n The following commits were actually introduced in v2.6.32-300.12.1 but not\n included in the changelog:\n dm snapshot: use merge origin if snapshot invalid bug13797085\n dm snapshot: report merge failure in status\n dm snapshot: merge consecutive chunks together\n dm snapshot: trigger exceptions in remaining snapshots...\n dm snapshot: delay merging a chunk until writes to...\n dm snapshot: queue writes to chunks being merged\n dm snapshot: add merging\n dm snapshot: permit only one merge at once\n dm snapshot: support barriers in snapshot merge target\n dm snapshot: avoid allocating exceptions in merge\n dm snapshot: rework writing to origin\n dm snapshot: add merge target\n dm exception store: add merge specific methods\n dm snapshot: create function for chunk_is_tracked wait\n dm snapshot: make bio optional in __origin_write\n dm snapshot: allow live exception store handover betwee...\n dm snapshot: track suspended state in target\n dm snapshot: move cow ref from exception store to snap...\n dm snapshot: add allocated metadata to snapshot status\n dm snapshot: rename exception functions\n dm snapshot: rename exception_table to dm_exception_table\n dm snapshot: rename dm_snap_exception to dm_exception\n dm snapshot: consolidate insert exception functions\n dm snapshot: abstract minimum_chunk_size fn\n dm snapshot: avoid else clause in persistent_read_metadata\n\n[2.6.32-300.13.1.el6uek]\n- [SCSI] update mpt2sas to 12.105.06.00 (Maxim Uvarov) [Orabug: 13459691]\n- [SCSI] update mptsas to 4.24.20.03 (Maxim Uvarov) [Orabug: 13459691]\n- [SCSI] update megaraid to 00.00.06.12 (Maxim Uvarov) [Orabug: 13459691]\n- lpfc: fix null pointer lpfc_sli4_fp_intr_handler (Maxim Uvarov) [Orabug: 13856103]\n\n[2.6.32-300.12.1.el6uek]\n- Revert 'fuse: break fc spinlock' (Maxim Uvarov) [Orabug: 13847680] \n- Revert 'fuse: split queues to scale I/O throughput' (Maxim Uvarov) [Orabug: 13847680]\n- Revert 'fuse: fix fuse request unique id' (Maxim Uvarov) [Orabug: 13847680]\n\nofa:\n\n[1.5.1-4.0.58]\n- RDS: make sure rds_ib_remove_one() returns only after the device is freed.\n- RDS: make sure rds_ib_recv_refill() doesn't leave ring empty.\n\n[1.5.1-4.0.54]\n- Add ib_qib support.\n", u'issued': u'2012-04-12', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELBA-2012-2006.html', u'type': u'self', u'id': None, u'title': u'ELBA-2012-2006'}], u'_content_type_id': u'erratum', u'_id': u'5a853941-8aa2-429e-9abe-7b0f34259cda', u'from': u'el-errata@oss.oracle.com', u'severity': u'', u'title': u' Unbreakable Enterprise kernel bug fix update', u'_ns': u'units_erratum', u'rights': u'Copyright 2012 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 6', u'reboot_suggested': False, u'type': u'bugfix', u'pkglist': [{u'packages': [{u'src': None, u'name': u'kernel-uek', u'sum': [u'md5', u'5405fe2f22efd932d0170c92bf341844'], u'filename': u'kernel-uek-2.6.32-300.20.1.el6uek.src.rpm', u'epoch': u'0', u'version': u'2.6.32', u'release': u'300.20.1.el6uek', u'arch': u'src'}, {u'src': None, u'name': u'kernel-uek', u'sum': [u'md5', u'3e1d76b4ea8620467c5aeba867c16c3f'], u'filename': u'kernel-uek-2.6.32-300.20.1.el6uek.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.32', u'release': u'300.20.1.el6uek', u'arch': u'x86_64'}, {u'src': None, u'name': u'kernel-uek-debug', u'sum': [u'md5', u'3684e32a4aa2005945208dc4b6d06350'], u'filename': u'kernel-uek-debug-2.6.32-300.20.1.el6uek.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.32', u'release': u'300.20.1.el6uek', u'arch': u'x86_64'}, {u'src': None, u'name': u'kernel-uek-debug-devel', u'sum': [u'md5', u'3cd1d9cf03133c70c732ffa03e0a63b4'], u'filename': u'kernel-uek-debug-devel-2.6.32-300.20.1.el6uek.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.32', u'release': u'300.20.1.el6uek', u'arch': u'x86_64'}, {u'src': None, u'name': u'kernel-uek-devel', u'sum': [u'md5', u'c56308ea7941c155298498576c9c117d'], u'filename': u'kernel-uek-devel-2.6.32-300.20.1.el6uek.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.32', u'release': u'300.20.1.el6uek', u'arch': u'x86_64'}, {u'src': None, u'name': u'kernel-uek-doc', u'sum': [u'md5', u'f077cb7a73aba0f9fdb84351e94b57f1'], u'filename': u'kernel-uek-doc-2.6.32-300.20.1.el6uek.noarch.rpm', u'epoch': u'0', u'version': u'2.6.32', u'release': u'300.20.1.el6uek', u'arch': u'noarch'}, {u'src': None, u'name': u'kernel-uek-firmware', u'sum': [u'md5', u'80dc56637b46ae4602325da903cfbc96'], u'filename': u'kernel-uek-firmware-2.6.32-300.20.1.el6uek.noarch.rpm', u'epoch': u'0', u'version': u'2.6.32', u'release': u'300.20.1.el6uek', u'arch': u'noarch'}, {u'src': None, u'name': u'kernel-uek-headers', u'sum': [u'md5', u'76dd325395b19a6cb262a8b6266c4173'], u'filename': u'kernel-uek-headers-2.6.32-300.20.1.el6uek.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.32', u'release': u'300.20.1.el6uek', u'arch': u'x86_64'}, {u'src': None, u'name': u'mlnx_en-2.6.32-300.20.1.el6uek', u'sum': [u'md5', u'2abc3a6903966902bfae9d4a4dd9e7dd'], u'filename': u'mlnx_en-2.6.32-300.20.1.el6uek-1.5.7-0.1.src.rpm', u'epoch': u'0', u'version': u'1.5.7', u'release': u'0.1', u'arch': u'src'}, {u'src': None, u'name': u'mlnx_en-2.6.32-300.20.1.el6uek', u'sum': [u'md5', u'35dd1e768f9eb43ca4e98e8acb9853aa'], u'filename': u'mlnx_en-2.6.32-300.20.1.el6uek-1.5.7-0.1.x86_64.rpm', u'epoch': u'0', u'version': u'1.5.7', u'release': u'0.1', u'arch': u'x86_64'}, {u'src': None, u'name': u'mlnx_en-2.6.32-300.20.1.el6uekdebug', u'sum': [u'md5', u'f0bb97c5b7222373aeacee58bf77e51e'], u'filename': u'mlnx_en-2.6.32-300.20.1.el6uekdebug-1.5.7-0.1.x86_64.rpm', u'epoch': u'0', u'version': u'1.5.7', u'release': u'0.1', u'arch': u'x86_64'}, {u'src': None, u'name': u'ofa-2.6.32-300.20.1.el6uek', u'sum': [u'md5', u'2d1d5b613de50dc977f94fe6778b797a'], u'filename': u'ofa-2.6.32-300.20.1.el6uek-1.5.1-4.0.47.src.rpm', u'epoch': u'0', u'version': u'1.5.1', u'release': u'4.0.47', u'arch': u'src'}, {u'src': None, u'name': u'ofa-2.6.32-300.20.1.el6uek', u'sum': [u'md5', u'603bc0a122c6af74c218bcae839104aa'], u'filename': u'ofa-2.6.32-300.20.1.el6uek-1.5.1-4.0.47.x86_64.rpm', u'epoch': u'0', u'version': u'1.5.1', u'release': u'4.0.47', u'arch': u'x86_64'}, {u'src': None, u'name': u'ofa-2.6.32-300.20.1.el6uekdebug', u'sum': [u'md5', u'e584c978917084a94d19c6bc4cf123c3'], u'filename': u'ofa-2.6.32-300.20.1.el6uekdebug-1.5.1-4.0.47.x86_64.rpm', u'epoch': u'0', u'version': u'1.5.1', u'release': u'4.0.47', u'arch': u'x86_64'}], u'name': u'ol6_x86_64_latest', u'short': u'ol6_x86_64_latest'}, {u'packages': [{u'src': None, u'name': u'kernel-uek', u'sum': [u'md5', u'da9fa9c893156ad0665c48f1faa67555'], u'filename': u'kernel-uek-2.6.32-300.20.1.el5uek.src.rpm', u'epoch': u'0', u'version': u'2.6.32', u'release': u'300.20.1.el5uek', u'arch': u'src'}, {u'src': None, u'name': u'kernel-uek', u'sum': [u'md5', u'8c67e77d956451d7d9714a794198de8f'], u'filename': u'kernel-uek-2.6.32-300.20.1.el5uek.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.32', u'release': u'300.20.1.el5uek', u'arch': u'x86_64'}, {u'src': None, u'name': u'kernel-uek-debug', u'sum': [u'md5', u'42db1860e6d462312b9172e0181d7853'], u'filename': u'kernel-uek-debug-2.6.32-300.20.1.el5uek.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.32', u'release': u'300.20.1.el5uek', u'arch': u'x86_64'}, {u'src': None, u'name': u'kernel-uek-debug-devel', u'sum': [u'md5', u'94e7ea6df37c8e414376655329ed0b77'], u'filename': u'kernel-uek-debug-devel-2.6.32-300.20.1.el5uek.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.32', u'release': u'300.20.1.el5uek', u'arch': u'x86_64'}, {u'src': None, u'name': u'kernel-uek-devel', u'sum': [u'md5', u'65f3320aea94f25987bccec39f054a01'], u'filename': u'kernel-uek-devel-2.6.32-300.20.1.el5uek.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.32', u'release': u'300.20.1.el5uek', u'arch': u'x86_64'}, {u'src': None, u'name': u'kernel-uek-doc', u'sum': [u'md5', u'a6e4f0d266fd9d49dcde05fcf136717a'], u'filename': u'kernel-uek-doc-2.6.32-300.20.1.el5uek.noarch.rpm', u'epoch': u'0', u'version': u'2.6.32', u'release': u'300.20.1.el5uek', u'arch': u'noarch'}, {u'src': None, u'name': u'kernel-uek-firmware', u'sum': [u'md5', u'7ac94967d15bdfa04263a5917a749f8b'], u'filename': u'kernel-uek-firmware-2.6.32-300.20.1.el5uek.noarch.rpm', u'epoch': u'0', u'version': u'2.6.32', u'release': u'300.20.1.el5uek', u'arch': u'noarch'}, {u'src': None, u'name': u'mlnx_en-2.6.32-300.20.1.el5uek', u'sum': [u'md5', u'f408d016da98929757da56e6ed5a7f75'], u'filename': u'mlnx_en-2.6.32-300.20.1.el5uek-1.5.7-2.src.rpm', u'epoch': u'0', u'version': u'1.5.7', u'release': u'2', u'arch': u'src'}, {u'src': None, u'name': u'mlnx_en-2.6.32-300.20.1.el5uek', u'sum': [u'md5', u'6c8a0890b9afa153cced18a71012f6b0'], u'filename': u'mlnx_en-2.6.32-300.20.1.el5uek-1.5.7-2.x86_64.rpm', u'epoch': u'0', u'version': u'1.5.7', u'release': u'2', u'arch': u'x86_64'}, {u'src': None, u'name': u'mlnx_en-2.6.32-300.20.1.el5uekdebug', u'sum': [u'md5', u'86712a58039c502ba98c4bf4ed3359cc'], u'filename': u'mlnx_en-2.6.32-300.20.1.el5uekdebug-1.5.7-2.x86_64.rpm', u'epoch': u'0', u'version': u'1.5.7', u'release': u'2', u'arch': u'x86_64'}, {u'src': None, u'name': u'ofa-2.6.32-300.20.1.el5uek', u'sum': [u'md5', u'79907e2c84d1c1cc4d4baab8b5bcf7cc'], u'filename': u'ofa-2.6.32-300.20.1.el5uek-1.5.1-4.0.58.src.rpm', u'epoch': u'0', u'version': u'1.5.1', u'release': u'4.0.58', u'arch': u'src'}, {u'src': None, u'name': u'ofa-2.6.32-300.20.1.el5uek', u'sum': [u'md5', u'ea57823fc9fb8de9df888c8f7d8ef645'], u'filename': u'ofa-2.6.32-300.20.1.el5uek-1.5.1-4.0.58.x86_64.rpm', u'epoch': u'0', u'version': u'1.5.1', u'release': u'4.0.58', u'arch': u'x86_64'}, {u'src': None, u'name': u'ofa-2.6.32-300.20.1.el5uekdebug', u'sum': [u'md5', u'9f94871f3665af96b95d1d519d5e8d4e'], u'filename': u'ofa-2.6.32-300.20.1.el5uekdebug-1.5.1-4.0.58.x86_64.rpm', u'epoch': u'0', u'version': u'1.5.1', u'release': u'4.0.58', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u'[3.0.2.2-1]\n- orabug: 13587699 update firmware to 3.0.2.2\n', u'issued': u'2012-04-27', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELBA-2012-2009.html', u'type': u'self', u'id': None, u'title': u'ELBA-2012-2009'}], u'_content_type_id': u'erratum', u'_id': u'155f0cc8-3400-4105-ae34-8817344cd561', u'from': u'el-errata@oss.oracle.com', u'severity': u'', u'title': u'bfa-firmware bug fix update', u'_ns': u'units_erratum', u'rights': u'Copyright 2012 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 6', u'reboot_suggested': False, u'type': u'bugfix', u'pkglist': [{u'packages': [{u'src': None, u'name': u'bfa-firmware', u'sum': [u'md5', u'5377180e600d8f73c6c871575f880ae1'], u'filename': u'bfa-firmware-3.0.2.2-1.el6.noarch.rpm', u'epoch': u'0', u'version': u'3.0.2.2', u'release': u'1.el6', u'arch': u'noarch'}, {u'src': None, u'name': u'bfa-firmware', u'sum': [u'md5', u'399209d55ccc31d0eb26802a202cc9ac'], u'filename': u'bfa-firmware-3.0.2.2-1.el6.src.rpm', u'epoch': u'0', u'version': u'3.0.2.2', u'release': u'1.el6', u'arch': u'src'}], u'name': u'ol6_x86_64_latest', u'short': u'ol6_x86_64_latest'}, {u'packages': [{u'src': None, u'name': u'bfa-firmware', u'sum': [u'md5', u'30ae67ce496965be1b5307663b5f7e7b'], u'filename': u'bfa-firmware-3.0.2.2-1.el5.noarch.rpm', u'epoch': u'0', u'version': u'3.0.2.2', u'release': u'1.el5', u'arch': u'noarch'}, {u'src': None, u'name': u'bfa-firmware', u'sum': [u'md5', u'25ea5ec0f09dcdb76744e5008c19116d'], u'filename': u'bfa-firmware-3.0.2.2-1.el5.src.rpm', u'epoch': u'0', u'version': u'3.0.2.2', u'release': u'1.el5', u'arch': u'src'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u'\n[2.6.32-300.24.1.el6uek]\n- [scsi] hpsa: Remove some PCI IDs if for OL5. (Joe Jin)\n- [block] cciss: fix incorrect PCI IDs and add two new ones (Joe Jin)\n- [scsi] hpsa: add some older controllers to the kdump blacklist (Joe Jin)\n- [block] cciss: Add IRQF_SHARED back in for the non-MSI(X) interrupt handler\n (Joe Jin)\n- [block] cciss: add some older controllers to the kdump blacklist (Joe Jin)\n- cciss: add small delay when using PCI Power Management to reset for kump\n (Mike Miller)\n\n[2.6.32-300.23.1.el6uek]\n- scsi_prep_fn() check for empty queue (Maxim Uvarov) [Orabug: 13962432]\n- mm, x86: Saving vmcore with non-lazy freeing of vmas (Cliff Wickman) [Orabug: 13729957]\n- fs/proc/vmcore.c: add hook to read_from_oldmem() to check for non-ram pages \n (Olaf Hering) [Orabug: 13729957]\n- /proc/vmcore: fix seeking (Arnd Bergmann) [Orabug: 13729957]\n- procfs: Use generic_file_llseek in /proc/vmcore (Frederic Weisbecker) [Orabug: 13729957]\n- dm mpath: wait for pg_init completion when suspending (Kiyoshi Ueda) [Orabug: 13962432]\n- dm mpath: prevent io from work queue while suspended (Mike Anderson) [Orabug: 13962432]\n- dm mpath: add mutex to synchronize adding and flushing work (Mike Anderson) [Orabug: 13962432]\n- dm mpath: flush workqueues before suspend completes (Kiyoshi Ueda) [Orabug: 13962432]\n\n[2.6.32-300.22.1.el6uek]\n- KVM: Ensure all vcpus are consistent with in-kernel irqchip settings (Dan\n Carpenter) {CVE-2012-1601}\n- KVM: x86: disallow multiple KVM_CREATE_IRQCHIP (Marcelo Tosatti) {CVE-2012-1601} ', u'issued': u'2012-05-10', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELBA-2012-2012.html', u'type': u'self', u'id': None, u'title': u'ELBA-2012-2012'}], u'_content_type_id': u'erratum', u'_id': u'186581ad-7385-4f4a-bb20-dcc3df7ea97b', u'from': u'el-errata@oss.oracle.com', u'severity': u'', u'title': u' Unbreakable Enterprise kernel bug fix update', u'_ns': u'units_erratum', u'rights': u'Copyright 2012 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 6', u'reboot_suggested': False, u'type': u'bugfix', u'pkglist': [{u'packages': [{u'src': None, u'name': u'kernel-uek', u'sum': [u'md5', u'e710b4aa880660d5295430f3272a2c33'], u'filename': u'kernel-uek-2.6.32-300.24.1.el6uek.src.rpm', u'epoch': u'0', u'version': u'2.6.32', u'release': u'300.24.1.el6uek', u'arch': u'src'}, {u'src': None, u'name': u'kernel-uek', u'sum': [u'md5', u'd2ec890fcc1be0ce149e6acd5a0954a1'], u'filename': u'kernel-uek-2.6.32-300.24.1.el6uek.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.32', u'release': u'300.24.1.el6uek', u'arch': u'x86_64'}, {u'src': None, u'name': u'kernel-uek-debug', u'sum': [u'md5', u'a2de3f2ea89b7364ef4a91f0fb48155e'], u'filename': u'kernel-uek-debug-2.6.32-300.24.1.el6uek.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.32', u'release': u'300.24.1.el6uek', u'arch': u'x86_64'}, {u'src': None, u'name': u'kernel-uek-debug-devel', u'sum': [u'md5', u'eaf2c93b9838ad6c9ea482a6bd3bb28a'], u'filename': u'kernel-uek-debug-devel-2.6.32-300.24.1.el6uek.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.32', u'release': u'300.24.1.el6uek', u'arch': u'x86_64'}, {u'src': None, u'name': u'kernel-uek-devel', u'sum': [u'md5', u'b013c38e53178dc3d4e7b4b6eba9b5fa'], u'filename': u'kernel-uek-devel-2.6.32-300.24.1.el6uek.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.32', u'release': u'300.24.1.el6uek', u'arch': u'x86_64'}, {u'src': None, u'name': u'kernel-uek-doc', u'sum': [u'md5', u'87ef92e593a9a8c056cb834f90418cd6'], u'filename': u'kernel-uek-doc-2.6.32-300.24.1.el6uek.noarch.rpm', u'epoch': u'0', u'version': u'2.6.32', u'release': u'300.24.1.el6uek', u'arch': u'noarch'}, {u'src': None, u'name': u'kernel-uek-firmware', u'sum': [u'md5', u'82731eb6fe0c50de8a4146cfcc55983f'], u'filename': u'kernel-uek-firmware-2.6.32-300.24.1.el6uek.noarch.rpm', u'epoch': u'0', u'version': u'2.6.32', u'release': u'300.24.1.el6uek', u'arch': u'noarch'}, {u'src': None, u'name': u'kernel-uek-headers', u'sum': [u'md5', u'274cd308bdc06fbf4f52732b33c3e6ba'], u'filename': u'kernel-uek-headers-2.6.32-300.24.1.el6uek.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.32', u'release': u'300.24.1.el6uek', u'arch': u'x86_64'}, {u'src': None, u'name': u'mlnx_en-2.6.32-300.24.1.el6uek', u'sum': [u'md5', u'87f4e0e5e88afd1178170798c48abc02'], u'filename': u'mlnx_en-2.6.32-300.24.1.el6uek-1.5.7-0.1.src.rpm', u'epoch': u'0', u'version': u'1.5.7', u'release': u'0.1', u'arch': u'src'}, {u'src': None, u'name': u'mlnx_en-2.6.32-300.24.1.el6uek', u'sum': [u'md5', u'2f8357c7422dc2a8d89dd97043b03b9b'], u'filename': u'mlnx_en-2.6.32-300.24.1.el6uek-1.5.7-0.1.x86_64.rpm', u'epoch': u'0', u'version': u'1.5.7', u'release': u'0.1', u'arch': u'x86_64'}, {u'src': None, u'name': u'mlnx_en-2.6.32-300.24.1.el6uekdebug', u'sum': [u'md5', u'5e18b8954ef9faeb6f98e3aa7b402f49'], u'filename': u'mlnx_en-2.6.32-300.24.1.el6uekdebug-1.5.7-0.1.x86_64.rpm', u'epoch': u'0', u'version': u'1.5.7', u'release': u'0.1', u'arch': u'x86_64'}, {u'src': None, u'name': u'ofa-2.6.32-300.24.1.el6uek', u'sum': [u'md5', u'4e43435b6dc50de036db7b6370737b82'], u'filename': u'ofa-2.6.32-300.24.1.el6uek-1.5.1-4.0.47.src.rpm', u'epoch': u'0', u'version': u'1.5.1', u'release': u'4.0.47', u'arch': u'src'}, {u'src': None, u'name': u'ofa-2.6.32-300.24.1.el6uek', u'sum': [u'md5', u'68319db2d25a2c3a8cd6288b60bbecac'], u'filename': u'ofa-2.6.32-300.24.1.el6uek-1.5.1-4.0.47.x86_64.rpm', u'epoch': u'0', u'version': u'1.5.1', u'release': u'4.0.47', u'arch': u'x86_64'}, {u'src': None, u'name': u'ofa-2.6.32-300.24.1.el6uekdebug', u'sum': [u'md5', u'9e3384f05c2f77ad771148d0ee14c3cd'], u'filename': u'ofa-2.6.32-300.24.1.el6uekdebug-1.5.1-4.0.47.x86_64.rpm', u'epoch': u'0', u'version': u'1.5.1', u'release': u'4.0.47', u'arch': u'x86_64'}], u'name': u'ol6_x86_64_latest', u'short': u'ol6_x86_64_latest'}, {u'packages': [{u'src': None, u'name': u'kernel-uek', u'sum': [u'md5', u'47ee5d4be3de6642e09ffddedfd95d70'], u'filename': u'kernel-uek-2.6.32-300.24.1.el5uek.src.rpm', u'epoch': u'0', u'version': u'2.6.32', u'release': u'300.24.1.el5uek', u'arch': u'src'}, {u'src': None, u'name': u'kernel-uek', u'sum': [u'md5', u'69c9b6d4737dc98e556aa4d5a7e84b8c'], u'filename': u'kernel-uek-2.6.32-300.24.1.el5uek.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.32', u'release': u'300.24.1.el5uek', u'arch': u'x86_64'}, {u'src': None, u'name': u'kernel-uek-debug', u'sum': [u'md5', u'89f2b2b321c2198df8cb702a38e62767'], u'filename': u'kernel-uek-debug-2.6.32-300.24.1.el5uek.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.32', u'release': u'300.24.1.el5uek', u'arch': u'x86_64'}, {u'src': None, u'name': u'kernel-uek-debug-devel', u'sum': [u'md5', u'e09a24bec91a670acef5303824fbedc9'], u'filename': u'kernel-uek-debug-devel-2.6.32-300.24.1.el5uek.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.32', u'release': u'300.24.1.el5uek', u'arch': u'x86_64'}, {u'src': None, u'name': u'kernel-uek-devel', u'sum': [u'md5', u'ccbbb9eacf62b697110147c9b54a2743'], u'filename': u'kernel-uek-devel-2.6.32-300.24.1.el5uek.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.32', u'release': u'300.24.1.el5uek', u'arch': u'x86_64'}, {u'src': None, u'name': u'kernel-uek-doc', u'sum': [u'md5', u'91423d7bf80e38d74ae37d0d09a63d22'], u'filename': u'kernel-uek-doc-2.6.32-300.24.1.el5uek.noarch.rpm', u'epoch': u'0', u'version': u'2.6.32', u'release': u'300.24.1.el5uek', u'arch': u'noarch'}, {u'src': None, u'name': u'kernel-uek-firmware', u'sum': [u'md5', u'f7493aa3230cbdbeb3ee015304308665'], u'filename': u'kernel-uek-firmware-2.6.32-300.24.1.el5uek.noarch.rpm', u'epoch': u'0', u'version': u'2.6.32', u'release': u'300.24.1.el5uek', u'arch': u'noarch'}, {u'src': None, u'name': u'mlnx_en-2.6.32-300.24.1.el5uek', u'sum': [u'md5', u'0fee8a778b63f710d8339dd189d01e3f'], u'filename': u'mlnx_en-2.6.32-300.24.1.el5uek-1.5.7-2.src.rpm', u'epoch': u'0', u'version': u'1.5.7', u'release': u'2', u'arch': u'src'}, {u'src': None, u'name': u'mlnx_en-2.6.32-300.24.1.el5uek', u'sum': [u'md5', u'0abe7044688d8c5a8be43044cdca1b52'], u'filename': u'mlnx_en-2.6.32-300.24.1.el5uek-1.5.7-2.x86_64.rpm', u'epoch': u'0', u'version': u'1.5.7', u'release': u'2', u'arch': u'x86_64'}, {u'src': None, u'name': u'mlnx_en-2.6.32-300.24.1.el5uekdebug', u'sum': [u'md5', u'fffb54eab341c96306601eb6d383ad1c'], u'filename': u'mlnx_en-2.6.32-300.24.1.el5uekdebug-1.5.7-2.x86_64.rpm', u'epoch': u'0', u'version': u'1.5.7', u'release': u'2', u'arch': u'x86_64'}, {u'src': None, u'name': u'ofa-2.6.32-300.24.1.el5uek', u'sum': [u'md5', u'8c9c964e1a407f4002b31c920ac9ed13'], u'filename': u'ofa-2.6.32-300.24.1.el5uek-1.5.1-4.0.58.src.rpm', u'epoch': u'0', u'version': u'1.5.1', u'release': u'4.0.58', u'arch': u'src'}, {u'src': None, u'name': u'ofa-2.6.32-300.24.1.el5uek', u'sum': [u'md5', u'01c46c58bfbb7039ce1a2fe0cfc5fc8c'], u'filename': u'ofa-2.6.32-300.24.1.el5uek-1.5.1-4.0.58.x86_64.rpm', u'epoch': u'0', u'version': u'1.5.1', u'release': u'4.0.58', u'arch': u'x86_64'}, {u'src': None, u'name': u'ofa-2.6.32-300.24.1.el5uekdebug', u'sum': [u'md5', u'8f63e7f924b88cfa47f9a792bd00e701'], u'filename': u'ofa-2.6.32-300.24.1.el5uekdebug-1.5.1-4.0.58.x86_64.rpm', u'epoch': u'0', u'version': u'1.5.1', u'release': u'4.0.58', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u'[0.17-3.0.1]\n- Added fixes for scsi subsystem changes in 2.6.39', u'issued': u'2012-05-25', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELBA-2012-2016.html', u'type': u'self', u'id': None, u'title': u'ELBA-2012-2016'}], u'_content_type_id': u'erratum', u'_id': u'54635ca8-558c-49b4-a8ef-5107c609265b', u'from': u'el-errata@oss.oracle.com', u'severity': u'', u'title': u'lsscsi bug fix update', u'_ns': u'units_erratum', u'rights': u'Copyright 2012 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 5', u'reboot_suggested': False, u'type': u'bugfix', u'pkglist': [{u'packages': [{u'src': None, u'name': u'lsscsi', u'sum': [u'md5', u'a29214af37b40f1af88496eea074ca13'], u'filename': u'lsscsi-0.17-3.0.1.el5.src.rpm', u'epoch': u'0', u'version': u'0.17', u'release': u'3.0.1.el5', u'arch': u'src'}, {u'src': None, u'name': u'lsscsi', u'sum': [u'md5', u'68128f43c73d43624ff8129393efebc0'], u'filename': u'lsscsi-0.17-3.0.1.el5.x86_64.rpm', u'epoch': u'0', u'version': u'0.17', u'release': u'3.0.1.el5', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u"[0.4.9-46.0.4.el6]\n- Correct the check mask for PQ in rdac path checker (Chaskiel Grundman) [orabug 14061177]\n- Service mode changes for rdac storage (Babu Moger) [orabug 14061177]\n- Blacklist all the management Luns by default (Babu Moger) [orabug 14061177]\n- Lower the log level for rdac TAS messages (Babu Moger) [orabug 14061177]\n\n[0.4.9-46.0.3.el6]\n- Provide a copy of /sbin/multipath.static, as both /etc/rc.sysinit and \n /etc/init.t/netfs call it, which is no longer built by 0.4.9 (John Sobecki) \n [orabug 13817465]\n\n[0.4.9-46.0.2.el6]\n- add patch to revert mpatha to mpath0 numeric names (John Sobecki) [orabug 10282894]\n- add patch to fix 'invalid number of priority groups' error (Zhenzhong Duan) [orabug 11884664]\n- fix page 83 options for EMC and other storage. (Guru Anbalagane) [orabug 10364063]\n- revert all scsi_id callouts to el5 behavior (Guru Anbalagane) [orabug 10364063]\n- Add udev rule to create udev socket for multipathd (Xiaowei Hu) [orabug 10121864]\n- Remove path_checker from multipath.conf (Xiaowei Hu) [orabug 10121963]\n- fixed kpartx not consistently creating devices bug (Xiaowei Hu) [orabug 10250424]\n- During upgrade, restore the .rpmsave copy of multipath.conf if no config\n file is present (John Sobecki) [orabug 10275766]\n- port EL5u5 multipath rules (Chuck Anderson) [orabug 10105043]\n- Add kpartx.static back - needed for kernel 2.6-32 (John Sobecki) [orabug 10104535]\n- Add revert-scsi-id-checker-default.patch - scsi_id patch (John Sobecki) [orabug 10096746]\n- convert the '!' in cciss device names to '/' (John Sobecki) [RHBZ 729478] [orabug 13481064]\n\n[0.4.9-46.0.1.el6]\n- Add patch to remove path_checker from the multipaths section of the\n default multipath.conf.default (John Sobecki) [orabug 10650061]\n\n[-0.4.9.46]\n- Remove 0107-RHBZ-725541-01-async-tur-checker.patch\n * This patch caused a regression where, multpathd could corrupt is memory\n when a path was deleted (bz747604)\n- Refresh 0110-RHBZ-725541-04-serialize-startup.patch\n-Resolves: bz #747604\n\n[-0.4.9.45]\n- Add 0118-RHBZ-738298-revert-631009.patch\n * reverts most of 0101-RHBZ-631009-disable-udev-disk-rules-on-reload.patch\n but still allows the -u option, for compatibility\n- Resolves: bz #738298\n\n[-0.4.9.44]\n- Add 0116-RH-manpage-update.patch\n * update the manpages with new features\n- Add 0117-RHBZ-697386-logger-shutdown-crash.patch\n * The main multipathd thread was racing with the logger, now it\n waits for the logger thread to shutdown first.\n- Resolves: bz #697386\n\n[-0.4.9.43]\n- Add 0102-RHBZ-714821-dont-remove-map-twice.patch\n * multipathd was removing a map twice in one code path, causing\n double free errors\n- Add 0103-RHBZ-725541-09-no-partitions.patch\n * if a device has the 'no_partitions' feature, kpartx ignores it\n- Add 0104-RHBZ-725541-10-force-devmap.patch\n * override 'no_partitions'\n- Add 0105-RHBZ-725541-08-reset-running.patch\n * abort timed-out IO in directio checker\n- Add 0106-RHBZ-725541-07-tur-checker-reservation-conflict.patch\n * don't count a path as down if it has a reservation conflict. The\n kernel should be failing these errors up past multipath now.\n- Add 0107-RHBZ-725541-01-async-tur-checker.patch\n * Make tur checker async\n- Add 0108-RHBZ-725541-06-offline-check.patch\n * Don't get the priority of offline devies.\n- Add 0109-RHBZ-725541-05-only-count-up-and-ghost-paths.patch\n * fix path counting\n- Add 0110-RHBZ-725541-04-serialize-startup.patch\n * add the 'show daemon' multipathd command, so users can check\n that the daemon has started up completely.\n- Add 0111-RHBZ-725541-03-handle-LBA_DEPENDENT-state.patch\n * handle LBA_DEPENDENT alua state.\n- Add 0112-RHBZ-725541-02-infinite-dev-loss-tmo.patch\n * allow dev_loss_tmo to be set to 'inifinty', which sets it to\n the maximum allowed value.\n- Add 0113-RHBZ-719571-validate-guid-partitions.patch\n * don't build partition devices for invalid gpt's.\n- Add 0114-RHBZ-723168-adjust-messages.patch\n- Add 0115-RHBZ-713754-lower-minio.patch\n * add rr_min_io_rq parmeter, that sets the min_io to 1 for\n request based multipath\nResolves: bz #699577, #713754, #714821, #719571, #723168, #725541\n\n[-0.4.9.42]\n- Add 0089-RHBZ-694602-RSSM-config.patch\n- Add 0090-RHBZ-700169-fix-nr-active.patch\n * Make sure to always count ghost paths as active\n- Add 0091-RHBZ-699577-manpage-clarification.patch\n- Add 0092-RHBZ-689504-rdac-retry.patch\n * Make the rdac checker retry up to 5 times on errors that are likely\n transient.\n- Add 0093-RHBZ-677449-dont-remove-map-on-enomem.patch\n * Don't remove a multipath device if dm_map_present fails due to lack of\n memory\n- Add 0094-RHBZ-707560-check-return-value.patch\n * Don't try to update path groups on a path priority change if the \n multipath device has disappeared.\n- Add 0095-RHBZ-678673-no-path-groups.patch\n * Allow multipath devices with no path groups\n- Add 0096-RHBZ-683616-ioship-support.patch\n * Modify the rdac checker to work better storage in IOSHIP mode\n- Add 0097-RHBZ-697386-fix-shutdown-crash.patch\n * Add missing test for thread cancellation to the checker thread.\n- Add 0098-RHBZ-706555-dont-update-pgs-in-manual.patch\n * When failback is set to manual, do not automatically reconfigure the\n pgs when a path changes priority\n- Add 0099-RHBZ-705854-warn-on-bad-dev-loss-tmo.patch\n- Add 0100-RHBZ-710478-deprecate-uid-gid-mode.patch\n * uid, gid and mode are now controlled by udev.\n- Add 0101-RHBZ-631009-disable-udev-disk-rules-on-reload.patch\n- Remove 0082-RHBZ-631009-disable-udev-disk-rules-on-reload.patch\n * multipath and kpartx now have a '-u' option that forces the udev\n dm-disk rules to run.\n- Resolves: bz #694602, #700169, #689504, #677449, #707560, #678673\n- Resolves: bz #683616, #697386, #706555, #705854, #710478, #631009\n\n[-0.4.9.41]\n- Add 0088-RHBZ-693524-fix-prio-segfault.patch\n * Don't reuse the the path argument as a variable in the vector\n loop.\n- Resolves: bz# 696157\n\n[-0.4.9.40]\n- Add 0087-RHBZ-680480-skip-if-no-sysdev.patch\n * Don't check the path if it has no sysdev, since it is about to\n be removed.\n- Resoves: bz# 680480\n\n[-0.4.9.39]\n- Add 0086-RHBZ-681144-sysfs-device-cleanup.patch\n * Make sure to remove the sysfs device from cache when the path is\n removed. Also, only search the sysfs device cache under the vecs lock\n- Resolves: bz #681144\n\n[-0.4.9.38]\n- Remove 0082-RHBZ-631009-disable-udev-disk-rules-on-reload.patch\n * This patch was causing a serious regression (677937), and resolving\n it requires changes in /etc/rc.sysinit, so I'm backing it out for\n now.\n- Resolves: bz #677937\n- Related: bz #631009\n\n[-0.4.9.37]\n- Add 0085-RHBZ-645605-fix-offline-check.patch\n * Make path_offline return false if it can't deterime a paths state.\n- Rename 0080-RHBZ-622731-fix-no-config-value-segfault.patch to\n 0080-RHBZ-662731-fix-no-config-value-segfault.patch\n * accidentally used the wrong bug number\n- Resolves: bz #645605, #662731\n\n[-0.4.9.36]\n- Add 0084-RHBZ-644111-read-only-bindings.patch\n * Add -B multipath and multipathd option, to make the bindings file\n read-only. This is to be used by the initramfs\n- Resolves: bz #644111\n\n[-0.4.9.35]\n- Add 0082-RHBZ-631009-disable-udev-disk-rules-on-reload.patch\n * Set DM_UDEV_DISABLE_DISK_RULES_FLAG in dm_simplecmd to stop blkid from\n running on reloads\n- Add 0083-RHBZ-636213-633643-new-configs.patch\n * Autoconfigs for HP P2000 family and NEC Storage M Series arrays\n- Resolves: bz #631009, #636213, #636213\n\n[-0.4.9.34]\n- Add 0081-RHBZ-623644-fix-sysfs-caching.patch\n * Remove attribute value caching, and free cached parent devices on remove\n- Resolves: bz #623644\n\n[-0.4.9.33]\n- Add 0073-RHBZ-650664-clarify-error-msg.patch\n * tell users to increase max_fds, if multipath gets EMFILE trying to\n open a file.\n- Add 0074-RHBZ-602883-dont-print-change.patch\n * don't print messages for every change uevent\n- Add 0075-RHBZ-576919-log-checker-err.patch\n * add log_checker_err default config option, to control the verbosity\n of repeated checker error messages\n- Add 0076-RHBZ-599690-update-multipath-conf.patch\n- Add 0077-RHBZ-622608-nvdisk-config.patch\n- Add 0078-RHBZ-628095-config-warnings.patch\n * print warning messages for invalid config parameters\n- Add 0079-RHBZ-650797-display-iscsi-tgt-name.patch\n * get tgt name for iscsi devices\n- Add 0080-RHBZ-622731-fix-no-config-value-segfault.patch\n * check that a config option has a value before trying to get the\n strlen of the value.\n- Resolves: bz #576919, #599690, #602883, #622608, #622731, #628095, #650664\n- Resolves: bz #650797\n\n[-0.4.9.32]\n- Add 0064-RHBZ-612173-fix-reverse-lookup.patch\n * don't terminate WWID at whitespace on reverse lookup.\n- Add 0065-RHBZ-635088-update-priority.patch\n * refresh all priorities when a new path comes online\n- Add 0066-RHBZ-636071-mpathconf-variable_names.patch\n * don't use DISPLAY variable name. It configs with X. Also, unset all\n the variable names, so this doesn't happen again.\n- Add 0067-RHBZ-622569-symmetrix-config.patch\n- Add 0068-RHBZ-632734-nvdisk-config.patch\n- Add 0069-RHBZ-636246-hp-open-config.patch\n- Add 0070-RHBZ-639037-hitachi-open-config.patch\n- Add 0071-RHBZ-611779-fix-whitespace-crash.patch\n * get_cmdvec wasn't setting the passed in vector to NULL, when\n there was no command.\n- Add 0072-RHBZ-651389-change-scsi-tmo-order.patch\n * Make multipath set fast_io_fail_tmo before dev_loss_tmo, so that\n you can set dev_loss_tmo above 600.\n- Resolves: bz #651389, #611779, #639037, #636246, #632734, #622569, #636071\n- Resolves: bz #635088, #612173\n\n[-0.4.9.31]\n- Modify 0063-RHBZ-595719-udev_link_priority.patch\n * make link_priority only work on multipath devices and partitions.\n- Resolves: bz #595719\n\n[-0.4.9.30]\n- Modify 0063-RHBZ-595719-udev_link_priority.patch\n * move link_priority line up in the udev rules. Hopefully this is the\n actual fix.\n- Resolves: bz #595719\n\n[-0.4.9.29]\n- Modify 0063-RHBZ-595719-udev_link_priority.patch\n * Change link priority from 5 to 10\n- Resolves: bz #595719\n\n[-0.4.9.28]\n- Add 0064-RHBZ-612173-fix-reverse-lookup.patch\n * Fix multipath's wwid bindings file reverse lookup\n- Resolves: bz #612173\n\n[-0.4.9.27]\n- Add 0063-RHBZ-595719-udev_link_priority.patch\n * Increase the priority of multipath symlinks\n- Resolves: bz #595719\n\n[-0.4.9.26]\n- Add 0062-RHBZ-592998-hpsc-config.patch\n- Resolves: bz #592998\n\n[-0.4.9.25]\n- Add 0061-RHBZ-620479-find-rport.patch\n * multipath now will correctly set the dev_loss_tmo and fast_io_fail_tmo\n for setups where a devices rport id doesn't match its target id.\n- Resolves: bz #620479\n\n[-0.4.9.24]\n- Modify 0055-RHBZ-602257-update-on-show-topology.patch\n * fix patch so that multipath only syncs with the kernel, and doesn't\n update other features\n- Add 0060-RHBZ-606420-fix-remove-map.patch\n * multipathd will now only report a success for remove map when it\n actually succeeds.\n- Resolves: bz #602257, #606420", u'issued': u'2012-05-31', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELBA-2012-2017.html', u'type': u'self', u'id': None, u'title': u'ELBA-2012-2017'}], u'_content_type_id': u'erratum', u'_id': u'a998d332-cc1b-458a-a687-8153c9eb0a96', u'from': u'el-errata@oss.oracle.com', u'severity': u'', u'title': u'device-mapper-multipath bug fix update', u'_ns': u'units_erratum', u'rights': u'Copyright 2012 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 5', u'reboot_suggested': False, u'type': u'bugfix', u'pkglist': [{u'packages': [{u'src': None, u'name': u'device-mapper-multipath', u'sum': [u'md5', u'5c2ffad4b9ebebe51ffb9afd86683e52'], u'filename': u'device-mapper-multipath-0.4.9-46.0.4.el5.src.rpm', u'epoch': u'0', u'version': u'0.4.9', u'release': u'46.0.4.el5', u'arch': u'src'}, {u'src': None, u'name': u'device-mapper-multipath', u'sum': [u'md5', u'a0fbfee74edd29c96f8a97cb3a7acd45'], u'filename': u'device-mapper-multipath-0.4.9-46.0.4.el5.x86_64.rpm', u'epoch': u'0', u'version': u'0.4.9', u'release': u'46.0.4.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'device-mapper-multipath-libs', u'sum': [u'md5', u'c4726b47b474f980d7a3e853b81a7285'], u'filename': u'device-mapper-multipath-libs-0.4.9-46.0.4.el5.x86_64.rpm', u'epoch': u'0', u'version': u'0.4.9', u'release': u'46.0.4.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'kpartx', u'sum': [u'md5', u'835d19b631dd9c9341564bce30f7564c'], u'filename': u'kpartx-0.4.9-46.0.4.el5.x86_64.rpm', u'epoch': u'0', u'version': u'0.4.9', u'release': u'46.0.4.el5', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u"\n[2.6.32-300.29.1]\n- SPEC: fix verson for release.\n- 2.6.32.x: hrtimer: Update hrtimer base offsets each hrtimer_interrupt\n- 2.6.32.x: time: Fix leapsecond triggered hrtimer/futex load spike issue\n- 2.6.32.x: hrtimer: Fix clock_was_set so it is safe to call from irq context\n- Revert 'Fix clock_was_set so it is safe to call from atomic'\n- Revert 'Fix leapsecond triggered hrtimer/futex load spike issue'\n- Revert '2.6.32.x: hrtimer: Update hrtimer base offsets each hrtimer_interrupt'\n- Fix leapsecond triggered hrtimer/futex load spike issue(John Stultz)\n- Fix clock_was_set so it is safe to call from atomic(John Stultz)\n\n[2.6.32-300.28.1]\n- [mpt2sas] update to 12.105.11.00 (Maxim Uvarov) [Orabug: 14233879]\n", u'issued': u'2012-07-10', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELBA-2012-2024.html', u'type': u'self', u'id': None, u'title': u'ELBA-2012-2024'}], u'_content_type_id': u'erratum', u'_id': u'fc852b95-8636-49fd-b7ce-5816e525cc95', u'from': u'el-errata@oss.oracle.com', u'severity': u'', u'title': u' Unbreakable Enterprise kernel bugfix update', u'_ns': u'units_erratum', u'rights': u'Copyright 2012 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 6', u'reboot_suggested': False, u'type': u'bugfix', u'pkglist': [{u'packages': [{u'src': None, u'name': u'kernel-uek', u'sum': [u'md5', u'ead5b6bedc5b6ba9b106a5b16e2cd65b'], u'filename': u'kernel-uek-2.6.32-300.29.1.el6uek.src.rpm', u'epoch': u'0', u'version': u'2.6.32', u'release': u'300.29.1.el6uek', u'arch': u'src'}, {u'src': None, u'name': u'kernel-uek', u'sum': [u'md5', u'843bda818667830180bf7f88264a4419'], u'filename': u'kernel-uek-2.6.32-300.29.1.el6uek.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.32', u'release': u'300.29.1.el6uek', u'arch': u'x86_64'}, {u'src': None, u'name': u'kernel-uek-debug', u'sum': [u'md5', u'4c01ccd35e5a61d877ea84b02afdda30'], u'filename': u'kernel-uek-debug-2.6.32-300.29.1.el6uek.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.32', u'release': u'300.29.1.el6uek', u'arch': u'x86_64'}, {u'src': None, u'name': u'kernel-uek-debug-devel', u'sum': [u'md5', u'8a0a0b79cc751505c57d661ca103c642'], u'filename': u'kernel-uek-debug-devel-2.6.32-300.29.1.el6uek.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.32', u'release': u'300.29.1.el6uek', u'arch': u'x86_64'}, {u'src': None, u'name': u'kernel-uek-devel', u'sum': [u'md5', u'd489930ad19f90ccb0bcbbb40b207838'], u'filename': u'kernel-uek-devel-2.6.32-300.29.1.el6uek.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.32', u'release': u'300.29.1.el6uek', u'arch': u'x86_64'}, {u'src': None, u'name': u'kernel-uek-doc', u'sum': [u'md5', u'282a59e5db506a5c31419993041f1a75'], u'filename': u'kernel-uek-doc-2.6.32-300.29.1.el6uek.noarch.rpm', u'epoch': u'0', u'version': u'2.6.32', u'release': u'300.29.1.el6uek', u'arch': u'noarch'}, {u'src': None, u'name': u'kernel-uek-firmware', u'sum': [u'md5', u'7e56195f39e85607ba506988eca7ce74'], u'filename': u'kernel-uek-firmware-2.6.32-300.29.1.el6uek.noarch.rpm', u'epoch': u'0', u'version': u'2.6.32', u'release': u'300.29.1.el6uek', u'arch': u'noarch'}, {u'src': None, u'name': u'kernel-uek-headers', u'sum': [u'md5', u'8edb103a3a00b384e94f36ee4af0c360'], u'filename': u'kernel-uek-headers-2.6.32-300.29.1.el6uek.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.32', u'release': u'300.29.1.el6uek', u'arch': u'x86_64'}, {u'src': None, u'name': u'mlnx_en-2.6.32-300.29.1.el6uek', u'sum': [u'md5', u'712bf6673aad6434fa39254f3d666a5c'], u'filename': u'mlnx_en-2.6.32-300.29.1.el6uek-1.5.7-0.1.src.rpm', u'epoch': u'0', u'version': u'1.5.7', u'release': u'0.1', u'arch': u'src'}, {u'src': None, u'name': u'mlnx_en-2.6.32-300.29.1.el6uek', u'sum': [u'md5', u'efc40fdd90c79080a09b0f26bfbc3bea'], u'filename': u'mlnx_en-2.6.32-300.29.1.el6uek-1.5.7-0.1.x86_64.rpm', u'epoch': u'0', u'version': u'1.5.7', u'release': u'0.1', u'arch': u'x86_64'}, {u'src': None, u'name': u'mlnx_en-2.6.32-300.29.1.el6uekdebug', u'sum': [u'md5', u'b3ffbcc4eee77354c214acd8e2840734'], u'filename': u'mlnx_en-2.6.32-300.29.1.el6uekdebug-1.5.7-0.1.x86_64.rpm', u'epoch': u'0', u'version': u'1.5.7', u'release': u'0.1', u'arch': u'x86_64'}, {u'src': None, u'name': u'ofa-2.6.32-300.29.1.el6uek', u'sum': [u'md5', u'1b5f576dc7e95fa82805282a028a7ec4'], u'filename': u'ofa-2.6.32-300.29.1.el6uek-1.5.1-4.0.58.src.rpm', u'epoch': u'0', u'version': u'1.5.1', u'release': u'4.0.58', u'arch': u'src'}, {u'src': None, u'name': u'ofa-2.6.32-300.29.1.el6uek', u'sum': [u'md5', u'722151150ed716108ddd60817b3eabfa'], u'filename': u'ofa-2.6.32-300.29.1.el6uek-1.5.1-4.0.58.x86_64.rpm', u'epoch': u'0', u'version': u'1.5.1', u'release': u'4.0.58', u'arch': u'x86_64'}, {u'src': None, u'name': u'ofa-2.6.32-300.29.1.el6uekdebug', u'sum': [u'md5', u'94e39f81ccf5d77452d28c62a079d991'], u'filename': u'ofa-2.6.32-300.29.1.el6uekdebug-1.5.1-4.0.58.x86_64.rpm', u'epoch': u'0', u'version': u'1.5.1', u'release': u'4.0.58', u'arch': u'x86_64'}], u'name': u'ol6_x86_64_latest', u'short': u'ol6_x86_64_latest'}, {u'packages': [{u'src': None, u'name': u'kernel-uek', u'sum': [u'md5', u'b7f534a7a65cfe5419cef6aefe6bf23b'], u'filename': u'kernel-uek-2.6.32-300.29.1.el5uek.src.rpm', u'epoch': u'0', u'version': u'2.6.32', u'release': u'300.29.1.el5uek', u'arch': u'src'}, {u'src': None, u'name': u'kernel-uek', u'sum': [u'md5', u'df6b19b56a1009c3283465513a1f15a1'], u'filename': u'kernel-uek-2.6.32-300.29.1.el5uek.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.32', u'release': u'300.29.1.el5uek', u'arch': u'x86_64'}, {u'src': None, u'name': u'kernel-uek-debug', u'sum': [u'md5', u'73e7abf512df618a5d1256fda878ff56'], u'filename': u'kernel-uek-debug-2.6.32-300.29.1.el5uek.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.32', u'release': u'300.29.1.el5uek', u'arch': u'x86_64'}, {u'src': None, u'name': u'kernel-uek-debug-devel', u'sum': [u'md5', u'a2e0c6a0e55372b99366a947e39f28d0'], u'filename': u'kernel-uek-debug-devel-2.6.32-300.29.1.el5uek.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.32', u'release': u'300.29.1.el5uek', u'arch': u'x86_64'}, {u'src': None, u'name': u'kernel-uek-devel', u'sum': [u'md5', u'c6d55d45d787f8e668b2c560ee1cc5cd'], u'filename': u'kernel-uek-devel-2.6.32-300.29.1.el5uek.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.32', u'release': u'300.29.1.el5uek', u'arch': u'x86_64'}, {u'src': None, u'name': u'kernel-uek-doc', u'sum': [u'md5', u'5233eaaf596b3b93691bdef64760b0b2'], u'filename': u'kernel-uek-doc-2.6.32-300.29.1.el5uek.noarch.rpm', u'epoch': u'0', u'version': u'2.6.32', u'release': u'300.29.1.el5uek', u'arch': u'noarch'}, {u'src': None, u'name': u'kernel-uek-firmware', u'sum': [u'md5', u'563c3df197f9af7d504acb53425e8804'], u'filename': u'kernel-uek-firmware-2.6.32-300.29.1.el5uek.noarch.rpm', u'epoch': u'0', u'version': u'2.6.32', u'release': u'300.29.1.el5uek', u'arch': u'noarch'}, {u'src': None, u'name': u'mlnx_en-2.6.32-300.29.1.el5uek', u'sum': [u'md5', u'1bb96556011351c99c4a93ae6ce8ad13'], u'filename': u'mlnx_en-2.6.32-300.29.1.el5uek-1.5.7-2.src.rpm', u'epoch': u'0', u'version': u'1.5.7', u'release': u'2', u'arch': u'src'}, {u'src': None, u'name': u'mlnx_en-2.6.32-300.29.1.el5uek', u'sum': [u'md5', u'd0541f448b1eeab621c8e6ac6ea12e52'], u'filename': u'mlnx_en-2.6.32-300.29.1.el5uek-1.5.7-2.x86_64.rpm', u'epoch': u'0', u'version': u'1.5.7', u'release': u'2', u'arch': u'x86_64'}, {u'src': None, u'name': u'mlnx_en-2.6.32-300.29.1.el5uekdebug', u'sum': [u'md5', u'51d93ea7fc05ae85e7dcc15e5c1cfe5d'], u'filename': u'mlnx_en-2.6.32-300.29.1.el5uekdebug-1.5.7-2.x86_64.rpm', u'epoch': u'0', u'version': u'1.5.7', u'release': u'2', u'arch': u'x86_64'}, {u'src': None, u'name': u'ofa-2.6.32-300.29.1.el5uek', u'sum': [u'md5', u'a5274272be081428f1e54bbcc49dfe94'], u'filename': u'ofa-2.6.32-300.29.1.el5uek-1.5.1-4.0.58.src.rpm', u'epoch': u'0', u'version': u'1.5.1', u'release': u'4.0.58', u'arch': u'src'}, {u'src': None, u'name': u'ofa-2.6.32-300.29.1.el5uek', u'sum': [u'md5', u'd219125ce1ee91e315d4c0725764bf86'], u'filename': u'ofa-2.6.32-300.29.1.el5uek-1.5.1-4.0.58.x86_64.rpm', u'epoch': u'0', u'version': u'1.5.1', u'release': u'4.0.58', u'arch': u'x86_64'}, {u'src': None, u'name': u'ofa-2.6.32-300.29.1.el5uekdebug', u'sum': [u'md5', u'27ca51998abf987f1f4bb4b2a89e6ce5'], u'filename': u'ofa-2.6.32-300.29.1.el5uekdebug-1.5.1-4.0.58.x86_64.rpm', u'epoch': u'0', u'version': u'1.5.1', u'release': u'4.0.58', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u"\n[2.6.32-300.32.1]\n- futex: Fix uninterruptible loop due to gate_area (Hugh Dickins)\n- thp: update futex compound knowledge (Andrea Arcangeli)\n\n[2.6.32-300.31.1]\n- export devinet_ioctl (Maxim Uvarov) [Orabug: 14306942]\n- vmxnet3: Updated to el6-u2 (Guangyu Sun) [Orabug: 14027961]\n\n[2.6.32-300.30.1]\n- epoll: epoll_wait() should not use timespec_add_ns(Eric Dumazet)\n- epoll: clear the tfile_check_list on -ELOOP (Joe Jin) {CVE-2012-3375}\n- Dont limit non-nested epoll paths (Jason Baron)\n- epoll: kabi fixups for epoll limit wakeup paths {CVE-2011-1083}\n- epoll: limit paths (Jason Baron) {CVE-2011-1083}\n- eventpoll: fix comment typo 'evenpoll' (Paul Bolle)\n- epoll: fix compiler warning and optimize the non-blocking path (Shawn Bohrer)\n- epoll: move ready event check into proper inline (Davide Libenzi)\n- epoll: make epoll_wait() use the hrtimer range feature (Shawn Bohrer)\n- select: rename estimate_accuracy() to select_estimate_accuracy() (Andrew Morton)\n- [megaraid] fix sysfs_max_sectors_read (Maxim Uvarov)[Orabug 14263088]\n- [SCSI] libfc: fcoe_transport_create fails in single-CPU environment (Steven Clark) [Orabug 14239242]\n- [libata] Add ' 2GB ATA Flash Disk'/'ADMA428M' to DMA blacklist (Prarit Bhargava)\n- ext4: Fix overflow caused by missing cast in ext4_fallocate() (Utako Kusaka)\n- NFS: Map minor mismatch error to protocol not support error. (Steve Dickson)\n- NFSv4: Map NFS4ERR_SHARE_DENIED into an EACCES error instead of EIO (Trond Myklebust)\n- NFSv4: Propagate the error NFS4ERR_BADOWNER to nfs4_do_setattr (Trond Myklebust)\n- cred: copy_process() should clear child->replacement_session_keyring (Oleg Nesterov) {CVE-2012-2745}\n", u'issued': u'2012-07-23', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELBA-2012-2027.html', u'type': u'self', u'id': None, u'title': u'ELBA-2012-2027'}], u'_content_type_id': u'erratum', u'_id': u'45728bdc-2807-4998-aaab-9038ca9b05aa', u'from': u'el-errata@oss.oracle.com', u'severity': u'', u'title': u'Unbreakable Enterprise kernel Bug Fix update', u'_ns': u'units_erratum', u'rights': u'Copyright 2012 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 6', u'reboot_suggested': False, u'type': u'bugfix', u'pkglist': [{u'packages': [{u'src': None, u'name': u'kernel-uek', u'sum': [u'md5', u'dd84a34d6232c2b05003c6b6f609cae6'], u'filename': u'kernel-uek-2.6.32-300.32.1.el6uek.src.rpm', u'epoch': u'0', u'version': u'2.6.32', u'release': u'300.32.1.el6uek', u'arch': u'src'}, {u'src': None, u'name': u'kernel-uek', u'sum': [u'md5', u'a8befa8451d7acc6664d83a5559bd397'], u'filename': u'kernel-uek-2.6.32-300.32.1.el6uek.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.32', u'release': u'300.32.1.el6uek', u'arch': u'x86_64'}, {u'src': None, u'name': u'kernel-uek-debug', u'sum': [u'md5', u'1c71bfe8f7a8d21b3c558c59e9fbf063'], u'filename': u'kernel-uek-debug-2.6.32-300.32.1.el6uek.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.32', u'release': u'300.32.1.el6uek', u'arch': u'x86_64'}, {u'src': None, u'name': u'kernel-uek-debug-devel', u'sum': [u'md5', u'4ff2f402b9c537599d544fdb46882dd2'], u'filename': u'kernel-uek-debug-devel-2.6.32-300.32.1.el6uek.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.32', u'release': u'300.32.1.el6uek', u'arch': u'x86_64'}, {u'src': None, u'name': u'kernel-uek-devel', u'sum': [u'md5', u'47b86f4a881d043cc42c595a8d9d988b'], u'filename': u'kernel-uek-devel-2.6.32-300.32.1.el6uek.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.32', u'release': u'300.32.1.el6uek', u'arch': u'x86_64'}, {u'src': None, u'name': u'kernel-uek-doc', u'sum': [u'md5', u'49cacf09207a48cc7eae1c1bcdcc75bf'], u'filename': u'kernel-uek-doc-2.6.32-300.32.1.el6uek.noarch.rpm', u'epoch': u'0', u'version': u'2.6.32', u'release': u'300.32.1.el6uek', u'arch': u'noarch'}, {u'src': None, u'name': u'kernel-uek-firmware', u'sum': [u'md5', u'bc15c8e445c371a758237b85111bf997'], u'filename': u'kernel-uek-firmware-2.6.32-300.32.1.el6uek.noarch.rpm', u'epoch': u'0', u'version': u'2.6.32', u'release': u'300.32.1.el6uek', u'arch': u'noarch'}, {u'src': None, u'name': u'kernel-uek-headers', u'sum': [u'md5', u'b0234b388ab2d01d4e8e0efe003fca44'], u'filename': u'kernel-uek-headers-2.6.32-300.32.1.el6uek.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.32', u'release': u'300.32.1.el6uek', u'arch': u'x86_64'}, {u'src': None, u'name': u'mlnx_en-2.6.32-300.32.1.el6uek', u'sum': [u'md5', u'4599867223344a2ac3c09227ee6bad41'], u'filename': u'mlnx_en-2.6.32-300.32.1.el6uek-1.5.7-0.1.src.rpm', u'epoch': u'0', u'version': u'1.5.7', u'release': u'0.1', u'arch': u'src'}, {u'src': None, u'name': u'mlnx_en-2.6.32-300.32.1.el6uek', u'sum': [u'md5', u'9396f4b1a4e429adf73a3367b68e50fb'], u'filename': u'mlnx_en-2.6.32-300.32.1.el6uek-1.5.7-0.1.x86_64.rpm', u'epoch': u'0', u'version': u'1.5.7', u'release': u'0.1', u'arch': u'x86_64'}, {u'src': None, u'name': u'mlnx_en-2.6.32-300.32.1.el6uekdebug', u'sum': [u'md5', u'a01cc507d00ca31fabf7b89a6163a3ff'], u'filename': u'mlnx_en-2.6.32-300.32.1.el6uekdebug-1.5.7-0.1.x86_64.rpm', u'epoch': u'0', u'version': u'1.5.7', u'release': u'0.1', u'arch': u'x86_64'}, {u'src': None, u'name': u'ofa-2.6.32-300.32.1.el6uek', u'sum': [u'md5', u'5daa2066c2cfc026364ff403a6268aa2'], u'filename': u'ofa-2.6.32-300.32.1.el6uek-1.5.1-4.0.58.src.rpm', u'epoch': u'0', u'version': u'1.5.1', u'release': u'4.0.58', u'arch': u'src'}, {u'src': None, u'name': u'ofa-2.6.32-300.32.1.el6uek', u'sum': [u'md5', u'231dff8f77810e78a8a7bc558f8e9e1c'], u'filename': u'ofa-2.6.32-300.32.1.el6uek-1.5.1-4.0.58.x86_64.rpm', u'epoch': u'0', u'version': u'1.5.1', u'release': u'4.0.58', u'arch': u'x86_64'}, {u'src': None, u'name': u'ofa-2.6.32-300.32.1.el6uekdebug', u'sum': [u'md5', u'b99eb62d3080376dc25fb2d9cbb1effb'], u'filename': u'ofa-2.6.32-300.32.1.el6uekdebug-1.5.1-4.0.58.x86_64.rpm', u'epoch': u'0', u'version': u'1.5.1', u'release': u'4.0.58', u'arch': u'x86_64'}], u'name': u'ol6_x86_64_latest', u'short': u'ol6_x86_64_latest'}, {u'packages': [{u'src': None, u'name': u'kernel-uek', u'sum': [u'md5', u'566285c5f21781ea0c15d22d8840fec8'], u'filename': u'kernel-uek-2.6.32-300.32.1.el5uek.src.rpm', u'epoch': u'0', u'version': u'2.6.32', u'release': u'300.32.1.el5uek', u'arch': u'src'}, {u'src': None, u'name': u'kernel-uek', u'sum': [u'md5', u'0a8dbb628caf241334aa5e31cc815384'], u'filename': u'kernel-uek-2.6.32-300.32.1.el5uek.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.32', u'release': u'300.32.1.el5uek', u'arch': u'x86_64'}, {u'src': None, u'name': u'kernel-uek-debug', u'sum': [u'md5', u'59dea6e83499ba98c3ab3e5970582e93'], u'filename': u'kernel-uek-debug-2.6.32-300.32.1.el5uek.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.32', u'release': u'300.32.1.el5uek', u'arch': u'x86_64'}, {u'src': None, u'name': u'kernel-uek-debug-devel', u'sum': [u'md5', u'b3c21b94126520727ec608a9d0040281'], u'filename': u'kernel-uek-debug-devel-2.6.32-300.32.1.el5uek.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.32', u'release': u'300.32.1.el5uek', u'arch': u'x86_64'}, {u'src': None, u'name': u'kernel-uek-devel', u'sum': [u'md5', u'8311dc999c07ef03436f4526604e1eb5'], u'filename': u'kernel-uek-devel-2.6.32-300.32.1.el5uek.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.32', u'release': u'300.32.1.el5uek', u'arch': u'x86_64'}, {u'src': None, u'name': u'kernel-uek-doc', u'sum': [u'md5', u'fa16c369dbd4f7b9e2f34df97eacacbe'], u'filename': u'kernel-uek-doc-2.6.32-300.32.1.el5uek.noarch.rpm', u'epoch': u'0', u'version': u'2.6.32', u'release': u'300.32.1.el5uek', u'arch': u'noarch'}, {u'src': None, u'name': u'kernel-uek-firmware', u'sum': [u'md5', u'2307350dce834f7380d6ab8646e76e07'], u'filename': u'kernel-uek-firmware-2.6.32-300.32.1.el5uek.noarch.rpm', u'epoch': u'0', u'version': u'2.6.32', u'release': u'300.32.1.el5uek', u'arch': u'noarch'}, {u'src': None, u'name': u'mlnx_en-2.6.32-300.32.1.el5uek', u'sum': [u'md5', u'eedc441d9651a421e71264df9533ee10'], u'filename': u'mlnx_en-2.6.32-300.32.1.el5uek-1.5.7-2.src.rpm', u'epoch': u'0', u'version': u'1.5.7', u'release': u'2', u'arch': u'src'}, {u'src': None, u'name': u'mlnx_en-2.6.32-300.32.1.el5uek', u'sum': [u'md5', u'1c5b7801e86bb8a3750962580a81b95d'], u'filename': u'mlnx_en-2.6.32-300.32.1.el5uek-1.5.7-2.x86_64.rpm', u'epoch': u'0', u'version': u'1.5.7', u'release': u'2', u'arch': u'x86_64'}, {u'src': None, u'name': u'mlnx_en-2.6.32-300.32.1.el5uekdebug', u'sum': [u'md5', u'a3752a9ed3eb98216e00eb4a7d6f55e0'], u'filename': u'mlnx_en-2.6.32-300.32.1.el5uekdebug-1.5.7-2.x86_64.rpm', u'epoch': u'0', u'version': u'1.5.7', u'release': u'2', u'arch': u'x86_64'}, {u'src': None, u'name': u'ofa-2.6.32-300.32.1.el5uek', u'sum': [u'md5', u'406e53164e73b14cd31fd55564838572'], u'filename': u'ofa-2.6.32-300.32.1.el5uek-1.5.1-4.0.58.src.rpm', u'epoch': u'0', u'version': u'1.5.1', u'release': u'4.0.58', u'arch': u'src'}, {u'src': None, u'name': u'ofa-2.6.32-300.32.1.el5uek', u'sum': [u'md5', u'0b9be3e31ec8151de1f5416fad14c3c2'], u'filename': u'ofa-2.6.32-300.32.1.el5uek-1.5.1-4.0.58.x86_64.rpm', u'epoch': u'0', u'version': u'1.5.1', u'release': u'4.0.58', u'arch': u'x86_64'}, {u'src': None, u'name': u'ofa-2.6.32-300.32.1.el5uekdebug', u'sum': [u'md5', u'cc0a75718a7bfdd9dbf9377a0d640845'], u'filename': u'ofa-2.6.32-300.32.1.el5uekdebug-1.5.1-4.0.58.x86_64.rpm', u'epoch': u'0', u'version': u'1.5.1', u'release': u'4.0.58', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u'[0.4.9-46.0.5.el5]\n- Add 0145-RHBZ-831045-realloc-vector.patch , fix deleting items from vector,\n[[orabz 14120]]', u'issued': u'2012-08-06', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELBA-2012-2029.html', u'type': u'self', u'id': None, u'title': u'ELBA-2012-2029'}], u'_content_type_id': u'erratum', u'_id': u'ceb7c5a7-afc8-4cd0-805c-5250eb83b287', u'from': u'el-errata@oss.oracle.com', u'severity': u'', u'title': u' device-mapper-multipath bug fix update', u'_ns': u'units_erratum', u'rights': u'Copyright 2012 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 5', u'reboot_suggested': False, u'type': u'bugfix', u'pkglist': [{u'packages': [{u'src': None, u'name': u'device-mapper-multipath', u'sum': [u'md5', u'bb7a68eeb9bf678c1ccb70aec5d57eb6'], u'filename': u'device-mapper-multipath-0.4.9-46.0.5.el5.src.rpm', u'epoch': u'0', u'version': u'0.4.9', u'release': u'46.0.5.el5', u'arch': u'src'}, {u'src': None, u'name': u'device-mapper-multipath', u'sum': [u'md5', u'5cd0c1acb5b7b4f7859f442f35e17e26'], u'filename': u'device-mapper-multipath-0.4.9-46.0.5.el5.x86_64.rpm', u'epoch': u'0', u'version': u'0.4.9', u'release': u'46.0.5.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'device-mapper-multipath-libs', u'sum': [u'md5', u'186c854a247bb26db5248aa7470e729b'], u'filename': u'device-mapper-multipath-libs-0.4.9-46.0.5.el5.x86_64.rpm', u'epoch': u'0', u'version': u'0.4.9', u'release': u'46.0.5.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'kpartx', u'sum': [u'md5', u'29e59923b1e43ec08413f5fb8cfba320'], u'filename': u'kpartx-0.4.9-46.0.5.el5.x86_64.rpm', u'epoch': u'0', u'version': u'0.4.9', u'release': u'46.0.5.el5', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u'[2.6.32-300.32.2]\n- htrimer: fix kabi breakage (Joe Jin)\n- 2.6.32.x: timekeeping: Add missing update call in timekeeping_resume() (Thomas Gleixner)\n- 2.6.32.x: hrtimer: Update hrtimer base offsets each hrtimer_interrupt (John Stultz)\n- 2.6.32.x: timekeeping: Provide hrtimer update function (Thomas Gleixner)\n- 2.6.32.x: hrtimers: Move lock held region in hrtimer_interrupt() (Thomas Gleixner)\n- 2.6.32.x: timekeeping: Maintain ktime_t based offsets for hrtimers (Thomas Gleixner)\n- 2.6.32.x: timekeeping: Fix leapsecond triggered load spike issue (John Stultz)\n- 2.6.32.x: hrtimer: Provide clock_was_set_delayed() (John Stultz)\n- 2.6.32.x: time: Move common updates to a function (Thomas Gleixner)\n- 2.6.32.x: timekeeping: Fix CLOCK_MONOTONIC inconsistency during leapsecond (John Stultz)\n- 2.6.32.x: ntp: Correct TAI offset during leap second (Richard Cochran)\n- 2.6.32.x: ntp: Fix leap-second hrtimer livelock (John Stultz)\n- Revert 2.6.32.x: hrtimer: Fix clock_was_set so it is safe to call from irq context (Joe Jin)\n- Revert 2.6.32.x: time: Fix leapsecond triggered hrtimer/futex load spike issue (Joe Jin)\n- Revert 2.6.32.x: hrtimer: Update hrtimer base offsets each\n hrtimer_interrupt (Joe Jin)\n', u'issued': u'2012-08-29', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELBA-2012-2031.html', u'type': u'self', u'id': None, u'title': u'ELBA-2012-2031'}], u'_content_type_id': u'erratum', u'_id': u'73f4c31a-bb18-4142-ac67-30abe92f032d', u'from': u'el-errata@oss.oracle.com', u'severity': u'', u'title': u'Unbreakable Enterprise kernel Bug Fix update', u'_ns': u'units_erratum', u'rights': u'Copyright 2012 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 6', u'reboot_suggested': False, u'type': u'bugfix', u'pkglist': [{u'packages': [{u'src': None, u'name': u'kernel-uek', u'sum': [u'md5', u'044539ff4eb60b2646b1e2c801904925'], u'filename': u'kernel-uek-2.6.32-300.32.2.el6uek.src.rpm', u'epoch': u'0', u'version': u'2.6.32', u'release': u'300.32.2.el6uek', u'arch': u'src'}, {u'src': None, u'name': u'kernel-uek', u'sum': [u'md5', u'cb0461f37520fd6822474107e336fed5'], u'filename': u'kernel-uek-2.6.32-300.32.2.el6uek.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.32', u'release': u'300.32.2.el6uek', u'arch': u'x86_64'}, {u'src': None, u'name': u'kernel-uek-debug', u'sum': [u'md5', u'1b2124ab722b25811eef84686a7d5de6'], u'filename': u'kernel-uek-debug-2.6.32-300.32.2.el6uek.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.32', u'release': u'300.32.2.el6uek', u'arch': u'x86_64'}, {u'src': None, u'name': u'kernel-uek-debug-devel', u'sum': [u'md5', u'a1934e2216185c1af01eca1e31a2a3e7'], u'filename': u'kernel-uek-debug-devel-2.6.32-300.32.2.el6uek.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.32', u'release': u'300.32.2.el6uek', u'arch': u'x86_64'}, {u'src': None, u'name': u'kernel-uek-devel', u'sum': [u'md5', u'4ef2ab1586a31775a1e00d435db6ca8e'], u'filename': u'kernel-uek-devel-2.6.32-300.32.2.el6uek.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.32', u'release': u'300.32.2.el6uek', u'arch': u'x86_64'}, {u'src': None, u'name': u'kernel-uek-doc', u'sum': [u'md5', u'758e6cf2e489a5c98d3aa17f7ad93e9d'], u'filename': u'kernel-uek-doc-2.6.32-300.32.2.el6uek.noarch.rpm', u'epoch': u'0', u'version': u'2.6.32', u'release': u'300.32.2.el6uek', u'arch': u'noarch'}, {u'src': None, u'name': u'kernel-uek-firmware', u'sum': [u'md5', u'3478dd461817f0bf0cfacb9b14556106'], u'filename': u'kernel-uek-firmware-2.6.32-300.32.2.el6uek.noarch.rpm', u'epoch': u'0', u'version': u'2.6.32', u'release': u'300.32.2.el6uek', u'arch': u'noarch'}, {u'src': None, u'name': u'kernel-uek-headers', u'sum': [u'md5', u'f4a9f8cec3b5756bcb9d3ae5950483b5'], u'filename': u'kernel-uek-headers-2.6.32-300.32.2.el6uek.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.32', u'release': u'300.32.2.el6uek', u'arch': u'x86_64'}, {u'src': None, u'name': u'mlnx_en-2.6.32-300.32.2.el6uek', u'sum': [u'md5', u'fdc929d3f978954724462f27465d6adf'], u'filename': u'mlnx_en-2.6.32-300.32.2.el6uek-1.5.7-0.1.src.rpm', u'epoch': u'0', u'version': u'1.5.7', u'release': u'0.1', u'arch': u'src'}, {u'src': None, u'name': u'mlnx_en-2.6.32-300.32.2.el6uek', u'sum': [u'md5', u'970a3876c9102d6bffaace4346f90c1d'], u'filename': u'mlnx_en-2.6.32-300.32.2.el6uek-1.5.7-0.1.x86_64.rpm', u'epoch': u'0', u'version': u'1.5.7', u'release': u'0.1', u'arch': u'x86_64'}, {u'src': None, u'name': u'mlnx_en-2.6.32-300.32.2.el6uekdebug', u'sum': [u'md5', u'a92b4a97a2ac34d2474cbd6f2bd7d3c3'], u'filename': u'mlnx_en-2.6.32-300.32.2.el6uekdebug-1.5.7-0.1.x86_64.rpm', u'epoch': u'0', u'version': u'1.5.7', u'release': u'0.1', u'arch': u'x86_64'}, {u'src': None, u'name': u'ofa-2.6.32-300.32.2.el6uek', u'sum': [u'md5', u'c84372db7d44f81cf5a41179db7fa67c'], u'filename': u'ofa-2.6.32-300.32.2.el6uek-1.5.1-4.0.58.src.rpm', u'epoch': u'0', u'version': u'1.5.1', u'release': u'4.0.58', u'arch': u'src'}, {u'src': None, u'name': u'ofa-2.6.32-300.32.2.el6uek', u'sum': [u'md5', u'90d728c1476c91ca71ea785c0173d5e0'], u'filename': u'ofa-2.6.32-300.32.2.el6uek-1.5.1-4.0.58.x86_64.rpm', u'epoch': u'0', u'version': u'1.5.1', u'release': u'4.0.58', u'arch': u'x86_64'}, {u'src': None, u'name': u'ofa-2.6.32-300.32.2.el6uekdebug', u'sum': [u'md5', u'e7b57500855367a6f994f544261dc68b'], u'filename': u'ofa-2.6.32-300.32.2.el6uekdebug-1.5.1-4.0.58.x86_64.rpm', u'epoch': u'0', u'version': u'1.5.1', u'release': u'4.0.58', u'arch': u'x86_64'}], u'name': u'ol6_x86_64_latest', u'short': u'ol6_x86_64_latest'}, {u'packages': [{u'src': None, u'name': u'kernel-uek', u'sum': [u'md5', u'0af02a8db5bc0e6eafbdd6f071990ec2'], u'filename': u'kernel-uek-2.6.32-300.32.2.el5uek.src.rpm', u'epoch': u'0', u'version': u'2.6.32', u'release': u'300.32.2.el5uek', u'arch': u'src'}, {u'src': None, u'name': u'kernel-uek', u'sum': [u'md5', u'422181ed03834e469d38ed50c84ba009'], u'filename': u'kernel-uek-2.6.32-300.32.2.el5uek.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.32', u'release': u'300.32.2.el5uek', u'arch': u'x86_64'}, {u'src': None, u'name': u'kernel-uek-debug', u'sum': [u'md5', u'26cc6fcec0db2fe3c7743f4bf5521075'], u'filename': u'kernel-uek-debug-2.6.32-300.32.2.el5uek.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.32', u'release': u'300.32.2.el5uek', u'arch': u'x86_64'}, {u'src': None, u'name': u'kernel-uek-debug-devel', u'sum': [u'md5', u'02d4db2cb51b5b5d1aa3b43c85c42b33'], u'filename': u'kernel-uek-debug-devel-2.6.32-300.32.2.el5uek.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.32', u'release': u'300.32.2.el5uek', u'arch': u'x86_64'}, {u'src': None, u'name': u'kernel-uek-devel', u'sum': [u'md5', u'b0519617122ae0890428755b729df7c8'], u'filename': u'kernel-uek-devel-2.6.32-300.32.2.el5uek.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.32', u'release': u'300.32.2.el5uek', u'arch': u'x86_64'}, {u'src': None, u'name': u'kernel-uek-doc', u'sum': [u'md5', u'097337288433616edae27acc19abc661'], u'filename': u'kernel-uek-doc-2.6.32-300.32.2.el5uek.noarch.rpm', u'epoch': u'0', u'version': u'2.6.32', u'release': u'300.32.2.el5uek', u'arch': u'noarch'}, {u'src': None, u'name': u'kernel-uek-firmware', u'sum': [u'md5', u'1e54566039b2253e12ee6ca6380c74fe'], u'filename': u'kernel-uek-firmware-2.6.32-300.32.2.el5uek.noarch.rpm', u'epoch': u'0', u'version': u'2.6.32', u'release': u'300.32.2.el5uek', u'arch': u'noarch'}, {u'src': None, u'name': u'mlnx_en-2.6.32-300.32.2.el5uek', u'sum': [u'md5', u'04c75d4969aa410c2b23a7b486aeac5d'], u'filename': u'mlnx_en-2.6.32-300.32.2.el5uek-1.5.7-2.src.rpm', u'epoch': u'0', u'version': u'1.5.7', u'release': u'2', u'arch': u'src'}, {u'src': None, u'name': u'mlnx_en-2.6.32-300.32.2.el5uek', u'sum': [u'md5', u'acd6cfe2e1330c6b5b5bee6f6afb03df'], u'filename': u'mlnx_en-2.6.32-300.32.2.el5uek-1.5.7-2.x86_64.rpm', u'epoch': u'0', u'version': u'1.5.7', u'release': u'2', u'arch': u'x86_64'}, {u'src': None, u'name': u'mlnx_en-2.6.32-300.32.2.el5uekdebug', u'sum': [u'md5', u'02b439b4282b6987c17c05e2b68a312d'], u'filename': u'mlnx_en-2.6.32-300.32.2.el5uekdebug-1.5.7-2.x86_64.rpm', u'epoch': u'0', u'version': u'1.5.7', u'release': u'2', u'arch': u'x86_64'}, {u'src': None, u'name': u'ofa-2.6.32-300.32.2.el5uek', u'sum': [u'md5', u'28419f0397552b403f8826e1b2b25d65'], u'filename': u'ofa-2.6.32-300.32.2.el5uek-1.5.1-4.0.58.src.rpm', u'epoch': u'0', u'version': u'1.5.1', u'release': u'4.0.58', u'arch': u'src'}, {u'src': None, u'name': u'ofa-2.6.32-300.32.2.el5uek', u'sum': [u'md5', u'e171e4a4e855bb1f05a0f4459be92953'], u'filename': u'ofa-2.6.32-300.32.2.el5uek-1.5.1-4.0.58.x86_64.rpm', u'epoch': u'0', u'version': u'1.5.1', u'release': u'4.0.58', u'arch': u'x86_64'}, {u'src': None, u'name': u'ofa-2.6.32-300.32.2.el5uekdebug', u'sum': [u'md5', u'fed20934417e2baac7af25fc1602ea20'], u'filename': u'ofa-2.6.32-300.32.2.el5uekdebug-1.5.1-4.0.58.x86_64.rpm', u'epoch': u'0', u'version': u'1.5.1', u'release': u'4.0.58', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u'[3.2.22-39.0.6.el5]\n- Fix bug 14726248 by reverting fix for bug 13912945\n\n[3.2.22-39.0.5.el5]\n- Fix 14516616, cve duplicated entries\n\n[3.2.22-39.0.3.el5]\n- Add bug13912945.patch for OVM', u'issued': u'2012-10-05', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELBA-2012-2036.html', u'type': u'self', u'id': None, u'title': u'ELBA-2012-2036'}], u'_content_type_id': u'erratum', u'_id': u'5a9586e5-aaa9-4a4e-a8d0-adb26f3daf87', u'from': u'el-errata@oss.oracle.com', u'severity': u'', u'title': u' yum bug fix update', u'_ns': u'units_erratum', u'rights': u'Copyright 2012 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 5', u'reboot_suggested': False, u'type': u'bugfix', u'pkglist': [{u'packages': [{u'src': None, u'name': u'yum', u'sum': [u'md5', u'9d58f404abe074e6e310436592a3c4eb'], u'filename': u'yum-3.2.22-39.0.6.el5.noarch.rpm', u'epoch': u'0', u'version': u'3.2.22', u'release': u'39.0.6.el5', u'arch': u'noarch'}, {u'src': None, u'name': u'yum', u'sum': [u'md5', u'0b6da7023d39d2c8cdd3a74bc8e027df'], u'filename': u'yum-3.2.22-39.0.6.el5.src.rpm', u'epoch': u'0', u'version': u'3.2.22', u'release': u'39.0.6.el5', u'arch': u'src'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u'[5.10.1-41.13]\n- update ksplice support for non-premier support\n\n[5.10.1-41.12]\n- added ksplice patch. enable ksplice registration function\n\n[5.10.1-41.11]\n- added kernel-uek-firmware pkgsToInstallNotUpdate', u'issued': u'2012-12-17', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELBA-2012-2046.html', u'type': u'self', u'id': None, u'title': u'ELBA-2012-2046'}], u'_content_type_id': u'erratum', u'_id': u'8c71daf4-f3b4-4040-af35-bd3bc080109c', u'from': u'el-errata@oss.oracle.com', u'severity': u'', u'title': u' up2date bug fix update', u'_ns': u'units_erratum', u'rights': u'Copyright 2012 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 5', u'reboot_suggested': False, u'type': u'bugfix', u'pkglist': [{u'packages': [{u'src': None, u'name': u'up2date', u'sum': [u'md5', u'55bd4c8d02eb183a3cc747c4e16666ec'], u'filename': u'up2date-5.10.1-41.13.el5.src.rpm', u'epoch': u'0', u'version': u'5.10.1', u'release': u'41.13.el5', u'arch': u'src'}, {u'src': None, u'name': u'up2date', u'sum': [u'md5', u'88deceb54333e3cad786ca43a9e4815d'], u'filename': u'up2date-5.10.1-41.13.el5.x86_64.rpm', u'epoch': u'0', u'version': u'5.10.1', u'release': u'41.13.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'up2date-gnome', u'sum': [u'md5', u'1ac2c3fdc3912cea35f48844a5bf9cc9'], u'filename': u'up2date-gnome-5.10.1-41.13.el5.x86_64.rpm', u'epoch': u'0', u'version': u'5.10.1', u'release': u'41.13.el5', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u'[2.10.4-23]\n- Fix crash when drag and dropping notebook tabs\n Resolves: #847728\n\n[2.10.4-22]\n- Fix file chooser hanging when saving with an empty filename.\n Resolves: #702342.', u'issued': u'2013-01-02', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELBA-2013-0001.html', u'type': u'self', u'id': None, u'title': u'ELBA-2013-0001'}], u'_content_type_id': u'erratum', u'_id': u'2588cee3-c4a4-4641-b0d3-086b8850eae4', u'from': u'el-errata@oss.oracle.com', u'severity': u'', u'title': u'gtk2 bug fix update', u'_ns': u'units_erratum', u'rights': u'Copyright 2013 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 5', u'reboot_suggested': False, u'type': u'bugfix', u'pkglist': [{u'packages': [{u'src': None, u'name': u'gtk2', u'sum': [u'md5', u'2f7c86870965b2b022d2c8dffb85dfcc'], u'filename': u'gtk2-2.10.4-23.el5_8.i386.rpm', u'epoch': u'0', u'version': u'2.10.4', u'release': u'23.el5_8', u'arch': u'i386'}, {u'src': None, u'name': u'gtk2', u'sum': [u'md5', u'827167b7776edf4de9c05be13cfdeda4'], u'filename': u'gtk2-2.10.4-23.el5_8.src.rpm', u'epoch': u'0', u'version': u'2.10.4', u'release': u'23.el5_8', u'arch': u'src'}, {u'src': None, u'name': u'gtk2', u'sum': [u'md5', u'fece56c1899b43253e3d5f2bf3e006d6'], u'filename': u'gtk2-2.10.4-23.el5_8.x86_64.rpm', u'epoch': u'0', u'version': u'2.10.4', u'release': u'23.el5_8', u'arch': u'x86_64'}, {u'src': None, u'name': u'gtk2-devel', u'sum': [u'md5', u'3249ce48e30fc5758da67396df85d720'], u'filename': u'gtk2-devel-2.10.4-23.el5_8.i386.rpm', u'epoch': u'0', u'version': u'2.10.4', u'release': u'23.el5_8', u'arch': u'i386'}, {u'src': None, u'name': u'gtk2-devel', u'sum': [u'md5', u'f7ecc334ec0c823bb398885c974a62da'], u'filename': u'gtk2-devel-2.10.4-23.el5_8.x86_64.rpm', u'epoch': u'0', u'version': u'2.10.4', u'release': u'23.el5_8', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u'[30:9.3.6-20.P1.6]\n- fix race condition in socket module', u'issued': u'2013-01-07', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELBA-2013-0136.html', u'type': u'self', u'id': None, u'title': u'ELBA-2013-0136'}], u'_content_type_id': u'erratum', u'_id': u'c10e2be7-4dee-401d-9fc3-80c7fcc4e5ba', u'from': u'el-errata@oss.oracle.com', u'severity': u'', u'title': u'bind bug fix update', u'_ns': u'units_erratum', u'rights': u'Copyright 2013 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 5', u'reboot_suggested': False, u'type': u'bugfix', u'pkglist': [{u'packages': [{u'src': None, u'name': u'bind', u'sum': [u'md5', u'3fc0a4431fe79000e502e05c9d2749e3'], u'filename': u'bind-9.3.6-20.P1.el5_8.6.src.rpm', u'epoch': u'30', u'version': u'9.3.6', u'release': u'20.P1.el5_8.6', u'arch': u'src'}, {u'src': None, u'name': u'bind', u'sum': [u'md5', u'cf0be380719d0894bc03651da50bafbb'], u'filename': u'bind-9.3.6-20.P1.el5_8.6.x86_64.rpm', u'epoch': u'30', u'version': u'9.3.6', u'release': u'20.P1.el5_8.6', u'arch': u'x86_64'}, {u'src': None, u'name': u'bind-chroot', u'sum': [u'md5', u'66a6fa018c8a81e1237797fcc98cb412'], u'filename': u'bind-chroot-9.3.6-20.P1.el5_8.6.x86_64.rpm', u'epoch': u'30', u'version': u'9.3.6', u'release': u'20.P1.el5_8.6', u'arch': u'x86_64'}, {u'src': None, u'name': u'bind-devel', u'sum': [u'md5', u'422827de8f2d9116530618c8db251061'], u'filename': u'bind-devel-9.3.6-20.P1.el5_8.6.i386.rpm', u'epoch': u'30', u'version': u'9.3.6', u'release': u'20.P1.el5_8.6', u'arch': u'i386'}, {u'src': None, u'name': u'bind-devel', u'sum': [u'md5', u'da144a1397c9b3b1cdb097c60d18cccc'], u'filename': u'bind-devel-9.3.6-20.P1.el5_8.6.x86_64.rpm', u'epoch': u'30', u'version': u'9.3.6', u'release': u'20.P1.el5_8.6', u'arch': u'x86_64'}, {u'src': None, u'name': u'bind-libbind-devel', u'sum': [u'md5', u'41732fcabf8eb021bf0767afd487bd95'], u'filename': u'bind-libbind-devel-9.3.6-20.P1.el5_8.6.i386.rpm', u'epoch': u'30', u'version': u'9.3.6', u'release': u'20.P1.el5_8.6', u'arch': u'i386'}, {u'src': None, u'name': u'bind-libbind-devel', u'sum': [u'md5', u'd6302ccf01b2e4df0674285270b6b3e6'], u'filename': u'bind-libbind-devel-9.3.6-20.P1.el5_8.6.x86_64.rpm', u'epoch': u'30', u'version': u'9.3.6', u'release': u'20.P1.el5_8.6', u'arch': u'x86_64'}, {u'src': None, u'name': u'bind-libs', u'sum': [u'md5', u'0ea0adae5a7a1c3ce01d4423779b3170'], u'filename': u'bind-libs-9.3.6-20.P1.el5_8.6.i386.rpm', u'epoch': u'30', u'version': u'9.3.6', u'release': u'20.P1.el5_8.6', u'arch': u'i386'}, {u'src': None, u'name': u'bind-libs', u'sum': [u'md5', u'd8fdab188b4f9442a48a43343e56cd0d'], u'filename': u'bind-libs-9.3.6-20.P1.el5_8.6.x86_64.rpm', u'epoch': u'30', u'version': u'9.3.6', u'release': u'20.P1.el5_8.6', u'arch': u'x86_64'}, {u'src': None, u'name': u'bind-sdb', u'sum': [u'md5', u'4a5d1896b3b46aefac23ccd0852beb3b'], u'filename': u'bind-sdb-9.3.6-20.P1.el5_8.6.x86_64.rpm', u'epoch': u'30', u'version': u'9.3.6', u'release': u'20.P1.el5_8.6', u'arch': u'x86_64'}, {u'src': None, u'name': u'bind-utils', u'sum': [u'md5', u'51fe5ad6d09acebdd928db78bf9d1658'], u'filename': u'bind-utils-9.3.6-20.P1.el5_8.6.x86_64.rpm', u'epoch': u'30', u'version': u'9.3.6', u'release': u'20.P1.el5_8.6', u'arch': u'x86_64'}, {u'src': None, u'name': u'caching-nameserver', u'sum': [u'md5', u'b30b8ab46b8eda5c843fc6ed3ae77869'], u'filename': u'caching-nameserver-9.3.6-20.P1.el5_8.6.x86_64.rpm', u'epoch': u'30', u'version': u'9.3.6', u'release': u'20.P1.el5_8.6', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u"[2.2.3-76.0.1.el5_9]\n- fix mod_ssl always performing full renegotiation (Joe Jin) [orabug 12423387]\n- replace index.html with Oracle's index page oracle_index.html\n- update vstring and distro in specfile\n\n[2.2.3-76]\n- rebuild\n\n[2.2.3-75]\n- mod_mem_cache: fix aborted connection handling (#873678)", u'issued': u'2013-01-16', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELBA-2013-0139.html', u'type': u'self', u'id': None, u'title': u'ELBA-2013-0139'}], u'_content_type_id': u'erratum', u'_id': u'4beaccfb-04f4-4509-8627-7c0d43f1d8dc', u'from': u'el-errata@oss.oracle.com', u'severity': u'', u'title': u'httpd bug fix update', u'_ns': u'units_erratum', u'rights': u'Copyright 2013 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 5', u'reboot_suggested': False, u'type': u'bugfix', u'pkglist': [{u'packages': [{u'src': None, u'name': u'httpd', u'sum': [u'md5', u'5c180a6515ee8ddef47c557954045cff'], u'filename': u'httpd-2.2.3-76.0.1.el5_9.src.rpm', u'epoch': u'0', u'version': u'2.2.3', u'release': u'76.0.1.el5_9', u'arch': u'src'}, {u'src': None, u'name': u'httpd', u'sum': [u'md5', u'533ef525fdda7b07e327197b693ca41b'], u'filename': u'httpd-2.2.3-76.0.1.el5_9.x86_64.rpm', u'epoch': u'0', u'version': u'2.2.3', u'release': u'76.0.1.el5_9', u'arch': u'x86_64'}, {u'src': None, u'name': u'httpd-devel', u'sum': [u'md5', u'5c0d2aa7fec822b7a037b117237dba9d'], u'filename': u'httpd-devel-2.2.3-76.0.1.el5_9.i386.rpm', u'epoch': u'0', u'version': u'2.2.3', u'release': u'76.0.1.el5_9', u'arch': u'i386'}, {u'src': None, u'name': u'httpd-devel', u'sum': [u'md5', u'2349697c44995463e19bb0e68a7e42b7'], u'filename': u'httpd-devel-2.2.3-76.0.1.el5_9.x86_64.rpm', u'epoch': u'0', u'version': u'2.2.3', u'release': u'76.0.1.el5_9', u'arch': u'x86_64'}, {u'src': None, u'name': u'httpd-manual', u'sum': [u'md5', u'aef3a829495960771576c93e7d96a0b2'], u'filename': u'httpd-manual-2.2.3-76.0.1.el5_9.x86_64.rpm', u'epoch': u'0', u'version': u'2.2.3', u'release': u'76.0.1.el5_9', u'arch': u'x86_64'}, {u'src': None, u'name': u'mod_ssl', u'sum': [u'md5', u'd5369ae7a520f4437249b5367bee2d09'], u'filename': u'mod_ssl-2.2.3-76.0.1.el5_9.x86_64.rpm', u'epoch': u'1', u'version': u'2.2.3', u'release': u'76.0.1.el5_9', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u"[5.1.8-2.el5]\n- Fix to handle xen dom0 dumpfiles created with 'makedumpfile -d1' on very\n large systems, where the ELF vmcore may be mistakenly determined to be\n an old-style netdump vmcore. \n Resolves: rhbz#876046\n", u'issued': u'2013-01-16', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELBA-2013-0140.html', u'type': u'self', u'id': None, u'title': u'ELBA-2013-0140'}], u'_content_type_id': u'erratum', u'_id': u'81a4532d-459f-4bcd-a84e-9ed6ecc2107e', u'from': u'el-errata@oss.oracle.com', u'severity': u'', u'title': u'crash bug fix update', u'_ns': u'units_erratum', u'rights': u'Copyright 2013 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 5', u'reboot_suggested': False, u'type': u'bugfix', u'pkglist': [{u'packages': [{u'src': None, u'name': u'crash', u'sum': [u'md5', u'67d3c13015a729073568f01f8df7e1c2'], u'filename': u'crash-5.1.8-2.el5_9.src.rpm', u'epoch': u'0', u'version': u'5.1.8', u'release': u'2.el5_9', u'arch': u'src'}, {u'src': None, u'name': u'crash', u'sum': [u'md5', u'a8e2863a512808fc088c4f871486b2b0'], u'filename': u'crash-5.1.8-2.el5_9.x86_64.rpm', u'epoch': u'0', u'version': u'5.1.8', u'release': u'2.el5_9', u'arch': u'x86_64'}, {u'src': None, u'name': u'crash-devel', u'sum': [u'md5', u'b28f3b3de43bb0f22c44e13bdb0a7c0b'], u'filename': u'crash-devel-5.1.8-2.el5_9.i386.rpm', u'epoch': u'0', u'version': u'5.1.8', u'release': u'2.el5_9', u'arch': u'i386'}, {u'src': None, u'name': u'crash-devel', u'sum': [u'md5', u'eab0bff1f96f61adf010028b1fe4d169'], u'filename': u'crash-devel-5.1.8-2.el5_9.x86_64.rpm', u'epoch': u'0', u'version': u'5.1.8', u'release': u'2.el5_9', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u"[12:3.0.5-33]\n- exit(2) after sending DHCPDECLINE\n when dhclient has been started with '-1' (RHBZ #756490)\n\n[12:3.0.5-32]\n- An error in the handling of malformed client identifiers can\n cause a denial-of-service condition in affected servers. (CVE-2012-3571, #843125)", u'issued': u'2013-01-23', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELBA-2013-0183.html', u'type': u'self', u'id': None, u'title': u'ELBA-2013-0183'}], u'_content_type_id': u'erratum', u'_id': u'7c12f8d8-2293-4975-82fa-6539328aa5be', u'from': u'el-errata@oss.oracle.com', u'severity': u'', u'title': u'dhcp bug fix update', u'_ns': u'units_erratum', u'rights': u'Copyright 2013 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 5', u'reboot_suggested': False, u'type': u'bugfix', u'pkglist': [{u'packages': [{u'src': None, u'name': u'dhclient', u'sum': [u'md5', u'31278d5ce6aefc9cd1041e0749a93320'], u'filename': u'dhclient-3.0.5-33.el5_9.x86_64.rpm', u'epoch': u'12', u'version': u'3.0.5', u'release': u'33.el5_9', u'arch': u'x86_64'}, {u'src': None, u'name': u'dhcp', u'sum': [u'md5', u'67e6d74942ef009ed18195a7de497593'], u'filename': u'dhcp-3.0.5-33.el5_9.src.rpm', u'epoch': u'12', u'version': u'3.0.5', u'release': u'33.el5_9', u'arch': u'src'}, {u'src': None, u'name': u'dhcp', u'sum': [u'md5', u'f4a9c7690d6b138f7952cbf9fd5b2a28'], u'filename': u'dhcp-3.0.5-33.el5_9.x86_64.rpm', u'epoch': u'12', u'version': u'3.0.5', u'release': u'33.el5_9', u'arch': u'x86_64'}, {u'src': None, u'name': u'dhcp-devel', u'sum': [u'md5', u'b5bf8a13f9db3a717012c3f1edf355db'], u'filename': u'dhcp-devel-3.0.5-33.el5_9.i386.rpm', u'epoch': u'12', u'version': u'3.0.5', u'release': u'33.el5_9', u'arch': u'i386'}, {u'src': None, u'name': u'dhcp-devel', u'sum': [u'md5', u'30aa2e361a5f024b467a661c3ef78884'], u'filename': u'dhcp-devel-3.0.5-33.el5_9.x86_64.rpm', u'epoch': u'12', u'version': u'3.0.5', u'release': u'33.el5_9', u'arch': u'x86_64'}, {u'src': None, u'name': u'libdhcp4client', u'sum': [u'md5', u'68a8dfb3d6fd863cbbc68204cf862064'], u'filename': u'libdhcp4client-3.0.5-33.el5_9.i386.rpm', u'epoch': u'12', u'version': u'3.0.5', u'release': u'33.el5_9', u'arch': u'i386'}, {u'src': None, u'name': u'libdhcp4client', u'sum': [u'md5', u'fef84801067c09476ccb1f61e12dc139'], u'filename': u'libdhcp4client-3.0.5-33.el5_9.x86_64.rpm', u'epoch': u'12', u'version': u'3.0.5', u'release': u'33.el5_9', u'arch': u'x86_64'}, {u'src': None, u'name': u'libdhcp4client-devel', u'sum': [u'md5', u'73d141b697b5e5cb2d4560f813535062'], u'filename': u'libdhcp4client-devel-3.0.5-33.el5_9.i386.rpm', u'epoch': u'12', u'version': u'3.0.5', u'release': u'33.el5_9', u'arch': u'i386'}, {u'src': None, u'name': u'libdhcp4client-devel', u'sum': [u'md5', u'e0994f09d694bd095a185c005c863913'], u'filename': u'libdhcp4client-devel-3.0.5-33.el5_9.x86_64.rpm', u'epoch': u'12', u'version': u'3.0.5', u'release': u'33.el5_9', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u'[0.4.7-54.el5.1]\n- Added bz872439.patch\n- Resolves: bz #904106', u'issued': u'2013-02-04', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELBA-2013-0226.html', u'type': u'self', u'id': None, u'title': u'ELBA-2013-0226'}], u'_content_type_id': u'erratum', u'_id': u'94750c50-b988-4d03-bc75-f39c464f8210', u'from': u'el-errata@oss.oracle.com', u'severity': u'', u'title': u'device-mapper-multipath bug fix update', u'_ns': u'units_erratum', u'rights': u'Copyright 2013 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 5', u'reboot_suggested': False, u'type': u'bugfix', u'pkglist': [{u'packages': [{u'src': None, u'name': u'device-mapper-multipath', u'sum': [u'md5', u'e9176f5df6cec41071140b6496ef6b21'], u'filename': u'device-mapper-multipath-0.4.7-54.el5_9.1.src.rpm', u'epoch': u'0', u'version': u'0.4.7', u'release': u'54.el5_9.1', u'arch': u'src'}, {u'src': None, u'name': u'device-mapper-multipath', u'sum': [u'md5', u'f05106a061539b5ef15161024e4fd1ea'], u'filename': u'device-mapper-multipath-0.4.7-54.el5_9.1.x86_64.rpm', u'epoch': u'0', u'version': u'0.4.7', u'release': u'54.el5_9.1', u'arch': u'x86_64'}, {u'src': None, u'name': u'kpartx', u'sum': [u'md5', u'ab90f6e1be8a42b85a6535c708eaa7a3'], u'filename': u'kpartx-0.4.7-54.el5_9.1.x86_64.rpm', u'epoch': u'0', u'version': u'0.4.7', u'release': u'54.el5_9.1', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u'[253-51.1]\n- Add a patch by Gino LV. Ledesma to catch leaking sockets\n- Resolves: rhbz#905908 - (slow) socket leak in nss_ldap', u'issued': u'2013-02-12', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELBA-2013-0251.html', u'type': u'self', u'id': None, u'title': u'ELBA-2013-0251'}], u'_content_type_id': u'erratum', u'_id': u'1edea4cc-bdd5-4a33-bace-522c355982d7', u'from': u'el-errata@oss.oracle.com', u'severity': u'', u'title': u'nss_ldap bug fix update', u'_ns': u'units_erratum', u'rights': u'Copyright 2013 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 5', u'reboot_suggested': False, u'type': u'bugfix', u'pkglist': [{u'packages': [{u'src': None, u'name': u'nss_ldap', u'sum': [u'md5', u'59884861d5f751676f26926e95556da4'], u'filename': u'nss_ldap-253-51.el5_9.1.i386.rpm', u'epoch': u'0', u'version': u'253', u'release': u'51.el5_9.1', u'arch': u'i386'}, {u'src': None, u'name': u'nss_ldap', u'sum': [u'md5', u'89a0a1d5c4a6402425f281cbc988291d'], u'filename': u'nss_ldap-253-51.el5_9.1.src.rpm', u'epoch': u'0', u'version': u'253', u'release': u'51.el5_9.1', u'arch': u'src'}, {u'src': None, u'name': u'nss_ldap', u'sum': [u'md5', u'830d6c90e21055f299e4f890741e6829'], u'filename': u'nss_ldap-253-51.el5_9.1.x86_64.rpm', u'epoch': u'0', u'version': u'253', u'release': u'51.el5_9.1', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u'[0.8.4-25.0.1.el5_9.1]\n- Replace web/web/RedHat.gif with updated image in tarball\n\n[0.8.4-25.1]\n- Resolves: #911287 - add SIGCHLD handler to pulse for lvs mode', u'issued': u'2013-02-18', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELBA-2013-0262.html', u'type': u'self', u'id': None, u'title': u'ELBA-2013-0262'}], u'_content_type_id': u'erratum', u'_id': u'26736813-fbe3-49ee-8849-ca2096fc5c76', u'from': u'el-errata@oss.oracle.com', u'severity': u'', u'title': u'piranha bug fix update', u'_ns': u'units_erratum', u'rights': u'Copyright 2013 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 5', u'reboot_suggested': False, u'type': u'bugfix', u'pkglist': [{u'packages': [{u'src': None, u'name': u'piranha', u'sum': [u'md5', u'311858a0eab89bd5152df290f7df0fbd'], u'filename': u'piranha-0.8.4-25.0.1.el5_9.1.src.rpm', u'epoch': u'0', u'version': u'0.8.4', u'release': u'25.0.1.el5_9.1', u'arch': u'src'}, {u'src': None, u'name': u'piranha', u'sum': [u'md5', u'7056f1c8f2b489767c50d7315ca195fd'], u'filename': u'piranha-0.8.4-25.0.1.el5_9.1.x86_64.rpm', u'epoch': u'0', u'version': u'0.8.4', u'release': u'25.0.1.el5_9.1', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u'[4.4.2.3-32.0.1.el5_9]\n- Add missing files in /usr/share/doc/\n\n[4.4.2.3-32]\n- Track all install failures within a transaction (#671194)', u'issued': u'2013-02-25', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELBA-2013-0558.html', u'type': u'self', u'id': None, u'title': u'ELBA-2013-0558'}], u'_content_type_id': u'erratum', u'_id': u'6a559989-b464-4336-a6c3-3e0d2e2fb696', u'from': u'el-errata@oss.oracle.com', u'severity': u'', u'title': u'rpm bug fix update', u'_ns': u'units_erratum', u'rights': u'Copyright 2013 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 5', u'reboot_suggested': False, u'type': u'bugfix', u'pkglist': [{u'packages': [{u'src': None, u'name': u'popt', u'sum': [u'md5', u'd3a48f890836d58337566dfd6a97f009'], u'filename': u'popt-1.10.2.3-32.0.1.el5_9.i386.rpm', u'epoch': u'0', u'version': u'1.10.2.3', u'release': u'32.0.1.el5_9', u'arch': u'i386'}, {u'src': None, u'name': u'popt', u'sum': [u'md5', u'c9ceff627de065f47ed9d8ccda42a5f9'], u'filename': u'popt-1.10.2.3-32.0.1.el5_9.x86_64.rpm', u'epoch': u'0', u'version': u'1.10.2.3', u'release': u'32.0.1.el5_9', u'arch': u'x86_64'}, {u'src': None, u'name': u'rpm', u'sum': [u'md5', u'5ffa37f82244cd588815ff60a6b350a6'], u'filename': u'rpm-4.4.2.3-32.0.1.el5_9.src.rpm', u'epoch': u'0', u'version': u'4.4.2.3', u'release': u'32.0.1.el5_9', u'arch': u'src'}, {u'src': None, u'name': u'rpm', u'sum': [u'md5', u'3fcbab1884cf02c7da92b7590ca131f7'], u'filename': u'rpm-4.4.2.3-32.0.1.el5_9.x86_64.rpm', u'epoch': u'0', u'version': u'4.4.2.3', u'release': u'32.0.1.el5_9', u'arch': u'x86_64'}, {u'src': None, u'name': u'rpm-apidocs', u'sum': [u'md5', u'c2d82488a0910fce997cc75fa9d95ccb'], u'filename': u'rpm-apidocs-4.4.2.3-32.0.1.el5_9.x86_64.rpm', u'epoch': u'0', u'version': u'4.4.2.3', u'release': u'32.0.1.el5_9', u'arch': u'x86_64'}, {u'src': None, u'name': u'rpm-build', u'sum': [u'md5', u'dcdfc9e01e308aeacfa9c59193aeabe8'], u'filename': u'rpm-build-4.4.2.3-32.0.1.el5_9.x86_64.rpm', u'epoch': u'0', u'version': u'4.4.2.3', u'release': u'32.0.1.el5_9', u'arch': u'x86_64'}, {u'src': None, u'name': u'rpm-devel', u'sum': [u'md5', u'18157a4ec21afa0de300b4d355832e1b'], u'filename': u'rpm-devel-4.4.2.3-32.0.1.el5_9.i386.rpm', u'epoch': u'0', u'version': u'4.4.2.3', u'release': u'32.0.1.el5_9', u'arch': u'i386'}, {u'src': None, u'name': u'rpm-devel', u'sum': [u'md5', u'46047a896c1a3d317f43a9168ba5021d'], u'filename': u'rpm-devel-4.4.2.3-32.0.1.el5_9.x86_64.rpm', u'epoch': u'0', u'version': u'4.4.2.3', u'release': u'32.0.1.el5_9', u'arch': u'x86_64'}, {u'src': None, u'name': u'rpm-libs', u'sum': [u'md5', u'f0c6aada23f60e9092fcd87622661e87'], u'filename': u'rpm-libs-4.4.2.3-32.0.1.el5_9.i386.rpm', u'epoch': u'0', u'version': u'4.4.2.3', u'release': u'32.0.1.el5_9', u'arch': u'i386'}, {u'src': None, u'name': u'rpm-libs', u'sum': [u'md5', u'f89fffcbd01275700c8c81bbe4bddf38'], u'filename': u'rpm-libs-4.4.2.3-32.0.1.el5_9.x86_64.rpm', u'epoch': u'0', u'version': u'4.4.2.3', u'release': u'32.0.1.el5_9', u'arch': u'x86_64'}, {u'src': None, u'name': u'rpm-python', u'sum': [u'md5', u'20336c2470d1d16f4f94289869d870d5'], u'filename': u'rpm-python-4.4.2.3-32.0.1.el5_9.x86_64.rpm', u'epoch': u'0', u'version': u'4.4.2.3', u'release': u'32.0.1.el5_9', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u'[2.0.52-37.1]\n- rgmanager: Fix dependent service handling during recovery\n Resolves: rhbz#909459', u'issued': u'2013-02-25', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELBA-2013-0559.html', u'type': u'self', u'id': None, u'title': u'ELBA-2013-0559'}], u'_content_type_id': u'erratum', u'_id': u'6ec7f4fe-079b-4c54-b6d7-a8835bc71251', u'from': u'el-errata@oss.oracle.com', u'severity': u'', u'title': u'rgmanager bug fix update', u'_ns': u'units_erratum', u'rights': u'Copyright 2013 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 5', u'reboot_suggested': False, u'type': u'bugfix', u'pkglist': [{u'packages': [{u'src': None, u'name': u'rgmanager', u'sum': [u'md5', u'3596a359d70722e194b9336859ec5a69'], u'filename': u'rgmanager-2.0.52-37.el5_9.1.src.rpm', u'epoch': u'0', u'version': u'2.0.52', u'release': u'37.el5_9.1', u'arch': u'src'}, {u'src': None, u'name': u'rgmanager', u'sum': [u'md5', u'f0862582a26394ad42d7539b325ebb14'], u'filename': u'rgmanager-2.0.52-37.el5_9.1.x86_64.rpm', u'epoch': u'0', u'version': u'2.0.52', u'release': u'37.el5_9.1', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u'[0.8.2-29.0.1.el5_9.1]\n- Replaced docs/et.png in tarball\n- remove virshtest from test cases to fix failure in mock build root\n\n[0.8.2-29.el5_9.1]\n- storage: Do not use comma as seperator for lvs output (rhbz#903600)', u'issued': u'2013-02-28', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELBA-2013-0575.html', u'type': u'self', u'id': None, u'title': u'ELBA-2013-0575'}], u'_content_type_id': u'erratum', u'_id': u'c3317fc6-0cb8-4dae-8f72-d300c2ba8d5a', u'from': u'el-errata@oss.oracle.com', u'severity': u'', u'title': u'libvirt bug fix update', u'_ns': u'units_erratum', u'rights': u'Copyright 2013 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 5', u'reboot_suggested': False, u'type': u'bugfix', u'pkglist': [{u'packages': [{u'src': None, u'name': u'libvirt', u'sum': [u'md5', u'70151fc925ee3e61b8e9a71cbb78228a'], u'filename': u'libvirt-0.8.2-29.0.1.el5_9.1.i386.rpm', u'epoch': u'0', u'version': u'0.8.2', u'release': u'29.0.1.el5_9.1', u'arch': u'i386'}, {u'src': None, u'name': u'libvirt', u'sum': [u'md5', u'768641c83be5dae09cd8995ddee9cda1'], u'filename': u'libvirt-0.8.2-29.0.1.el5_9.1.src.rpm', u'epoch': u'0', u'version': u'0.8.2', u'release': u'29.0.1.el5_9.1', u'arch': u'src'}, {u'src': None, u'name': u'libvirt', u'sum': [u'md5', u'1e91357409070fe9317ab95349b74e28'], u'filename': u'libvirt-0.8.2-29.0.1.el5_9.1.x86_64.rpm', u'epoch': u'0', u'version': u'0.8.2', u'release': u'29.0.1.el5_9.1', u'arch': u'x86_64'}, {u'src': None, u'name': u'libvirt-devel', u'sum': [u'md5', u'0a66d4cc966923d35d2c0eef05f32e0b'], u'filename': u'libvirt-devel-0.8.2-29.0.1.el5_9.1.i386.rpm', u'epoch': u'0', u'version': u'0.8.2', u'release': u'29.0.1.el5_9.1', u'arch': u'i386'}, {u'src': None, u'name': u'libvirt-devel', u'sum': [u'md5', u'6d94124ef0184ac4245840e8ffb36b47'], u'filename': u'libvirt-devel-0.8.2-29.0.1.el5_9.1.x86_64.rpm', u'epoch': u'0', u'version': u'0.8.2', u'release': u'29.0.1.el5_9.1', u'arch': u'x86_64'}, {u'src': None, u'name': u'libvirt-python', u'sum': [u'md5', u'388549c578c916774518732f5bc7d3af'], u'filename': u'libvirt-python-0.8.2-29.0.1.el5_9.1.x86_64.rpm', u'epoch': u'0', u'version': u'0.8.2', u'release': u'29.0.1.el5_9.1', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u'[2.6.26-2.1.21.0.1.el5_9.2]\n- Add libxml2-enterprise.patch\n- Replaced docs/redhat.gif in tarball with updated image\n\n[2.6.26-2.1.21.el5_9.2]\n- Fix some Relax-NG and XSD validation failures (rhbz#915350)\n- xmlDOMWrapCloneNode discards namespace of the node parameter(rhbz#915837)', u'issued': u'2013-03-05', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELBA-2013-0591.html', u'type': u'self', u'id': None, u'title': u'ELBA-2013-0591'}], u'_content_type_id': u'erratum', u'_id': u'51cceda8-a963-4586-982e-131b0d60da65', u'from': u'el-errata@oss.oracle.com', u'severity': u'', u'title': u'libxml2 bug fix update', u'_ns': u'units_erratum', u'rights': u'Copyright 2013 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 5', u'reboot_suggested': False, u'type': u'bugfix', u'pkglist': [{u'packages': [{u'src': None, u'name': u'libxml2', u'sum': [u'md5', u'a48d715fd2abb25dc0ff18271d13424e'], u'filename': u'libxml2-2.6.26-2.1.21.0.1.el5_9.2.i386.rpm', u'epoch': u'0', u'version': u'2.6.26', u'release': u'2.1.21.0.1.el5_9.2', u'arch': u'i386'}, {u'src': None, u'name': u'libxml2', u'sum': [u'md5', u'a92462de91f5abec7e59386c43d6f61c'], u'filename': u'libxml2-2.6.26-2.1.21.0.1.el5_9.2.src.rpm', u'epoch': u'0', u'version': u'2.6.26', u'release': u'2.1.21.0.1.el5_9.2', u'arch': u'src'}, {u'src': None, u'name': u'libxml2', u'sum': [u'md5', u'b1b922987dd9b50324136f4dd348a58d'], u'filename': u'libxml2-2.6.26-2.1.21.0.1.el5_9.2.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.26', u'release': u'2.1.21.0.1.el5_9.2', u'arch': u'x86_64'}, {u'src': None, u'name': u'libxml2-devel', u'sum': [u'md5', u'572ad5231b58ee89a8de5cd5d8aaa5bd'], u'filename': u'libxml2-devel-2.6.26-2.1.21.0.1.el5_9.2.i386.rpm', u'epoch': u'0', u'version': u'2.6.26', u'release': u'2.1.21.0.1.el5_9.2', u'arch': u'i386'}, {u'src': None, u'name': u'libxml2-devel', u'sum': [u'md5', u'a9b2cfb1dea72c599b28bb8218da851c'], u'filename': u'libxml2-devel-2.6.26-2.1.21.0.1.el5_9.2.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.26', u'release': u'2.1.21.0.1.el5_9.2', u'arch': u'x86_64'}, {u'src': None, u'name': u'libxml2-python', u'sum': [u'md5', u'e80292f10f813714dc6210fbe02040d9'], u'filename': u'libxml2-python-2.6.26-2.1.21.0.1.el5_9.2.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.26', u'release': u'2.1.21.0.1.el5_9.2', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u'[1.7.2p1-22.1]\n- Fixed caching of user and group names\n- Backported RFC 4515 escaping of LDAP queries\n Resolves: rhbz#916232\n Resolves: rhbz#916220', u'issued': u'2013-03-08', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELBA-2013-0616.html', u'type': u'self', u'id': None, u'title': u'ELBA-2013-0616'}], u'_content_type_id': u'erratum', u'_id': u'7f7abf62-416f-4d48-8704-030a1abfb42f', u'from': u'el-errata@oss.oracle.com', u'severity': u'', u'title': u'sudo bug fix update', u'_ns': u'units_erratum', u'rights': u'Copyright 2013 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 5', u'reboot_suggested': False, u'type': u'bugfix', u'pkglist': [{u'packages': [{u'src': None, u'name': u'sudo', u'sum': [u'md5', u'44b9f544f5bec6a77bb67c5e38a18f5f'], u'filename': u'sudo-1.7.2p1-22.el5_9.1.src.rpm', u'epoch': u'0', u'version': u'1.7.2p1', u'release': u'22.el5_9.1', u'arch': u'src'}, {u'src': None, u'name': u'sudo', u'sum': [u'md5', u'65345c01185d4ec217d919a56338d166'], u'filename': u'sudo-1.7.2p1-22.el5_9.1.x86_64.rpm', u'epoch': u'0', u'version': u'1.7.2p1', u'release': u'22.el5_9.1', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u'[1.102pre-161.1]\n- Do not call findmodule ext2 for ext2 dump target, Resolves: bz915359', u'issued': u'2013-03-11', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELBA-2013-0617.html', u'type': u'self', u'id': None, u'title': u'ELBA-2013-0617'}], u'_content_type_id': u'erratum', u'_id': u'8fe4a5d6-2948-49f0-95c2-ab892d0013f5', u'from': u'el-errata@oss.oracle.com', u'severity': u'', u'title': u'kexec-tools bug fix update', u'_ns': u'units_erratum', u'rights': u'Copyright 2013 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 5', u'reboot_suggested': False, u'type': u'bugfix', u'pkglist': [{u'packages': [{u'src': None, u'name': u'kexec-tools', u'sum': [u'md5', u'5e1b5cf471775d20ef40817190b153e0'], u'filename': u'kexec-tools-1.102pre-161.el5_9.1.src.rpm', u'epoch': u'0', u'version': u'1.102pre', u'release': u'161.el5_9.1', u'arch': u'src'}, {u'src': None, u'name': u'kexec-tools', u'sum': [u'md5', u'11d102be3538c3094e7a10bdc1bce121'], u'filename': u'kexec-tools-1.102pre-161.el5_9.1.x86_64.rpm', u'epoch': u'0', u'version': u'1.102pre', u'release': u'161.el5_9.1', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u'[2.19-10.el5_9.1]\n- fix memory leak when malformed request is received\n Resolves: #920111\n\n[2.19-10]\n- Fixed returned value when all entries requested and no such\n map exists\n Resolves: #783198', u'issued': u'2013-03-19', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELBA-2013-0660.html', u'type': u'self', u'id': None, u'title': u'ELBA-2013-0660'}], u'_content_type_id': u'erratum', u'_id': u'81b1cb44-fdfa-4bf3-b72f-a79c84a740b8', u'from': u'el-errata@oss.oracle.com', u'severity': u'', u'title': u'ypserv bug fix update', u'_ns': u'units_erratum', u'rights': u'Copyright 2013 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 5', u'reboot_suggested': False, u'type': u'bugfix', u'pkglist': [{u'packages': [{u'src': None, u'name': u'ypserv', u'sum': [u'md5', u'812ab77bd138c27c0b044b2f83af0903'], u'filename': u'ypserv-2.19-10.el5_9.1.src.rpm', u'epoch': u'0', u'version': u'2.19', u'release': u'10.el5_9.1', u'arch': u'src'}, {u'src': None, u'name': u'ypserv', u'sum': [u'md5', u'7b0ba6f2a8a5d8d912e65cf964a248b4'], u'filename': u'ypserv-2.19-10.el5_9.1.x86_64.rpm', u'epoch': u'0', u'version': u'2.19', u'release': u'10.el5_9.1', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u'[2.0.115-109.1]\n- cman|fenced: Fix node killing in case of a 2node cluster that suffers\n brief network outage\n Resolves: rhbz#923861', u'issued': u'2013-03-25', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELBA-2013-0678.html', u'type': u'self', u'id': None, u'title': u'ELBA-2013-0678'}], u'_content_type_id': u'erratum', u'_id': u'a23debc1-f57f-444a-8ea5-ec0ea6548ec5', u'from': u'el-errata@oss.oracle.com', u'severity': u'', u'title': u'cman bug fix update', u'_ns': u'units_erratum', u'rights': u'Copyright 2013 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 5', u'reboot_suggested': False, u'type': u'bugfix', u'pkglist': [{u'packages': [{u'src': None, u'name': u'cman', u'sum': [u'md5', u'a9b83ae686046f863bbb070dce35aebc'], u'filename': u'cman-2.0.115-109.el5_9.1.src.rpm', u'epoch': u'0', u'version': u'2.0.115', u'release': u'109.el5_9.1', u'arch': u'src'}, {u'src': None, u'name': u'cman', u'sum': [u'md5', u'782e287789ec08be9fe8add470064942'], u'filename': u'cman-2.0.115-109.el5_9.1.x86_64.rpm', u'epoch': u'0', u'version': u'2.0.115', u'release': u'109.el5_9.1', u'arch': u'x86_64'}, {u'src': None, u'name': u'cman-devel', u'sum': [u'md5', u'fafd80397b04d9907e3bde54f18ea6d3'], u'filename': u'cman-devel-2.0.115-109.el5_9.1.i386.rpm', u'epoch': u'0', u'version': u'2.0.115', u'release': u'109.el5_9.1', u'arch': u'i386'}, {u'src': None, u'name': u'cman-devel', u'sum': [u'md5', u'96a7b5642eab788678b30d714490ac0f'], u'filename': u'cman-devel-2.0.115-109.el5_9.1.x86_64.rpm', u'epoch': u'0', u'version': u'2.0.115', u'release': u'109.el5_9.1', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u'[2.5-107.1]\n- Always demangle function before checking for NULL value. (#816647).', u'issued': u'2013-04-10', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELBA-2013-0732.html', u'type': u'self', u'id': None, u'title': u'ELBA-2013-0732'}], u'_content_type_id': u'erratum', u'_id': u'526cabfc-9db9-47a9-b2d1-74336d43469e', u'from': u'el-errata@oss.oracle.com', u'severity': u'', u'title': u'glibc bug fix update', u'_ns': u'units_erratum', u'rights': u'Copyright 2013 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 5', u'reboot_suggested': False, u'type': u'bugfix', u'pkglist': [{u'packages': [{u'src': None, u'name': u'glibc', u'sum': [u'md5', u'83c5ee7bf35fd068e636f991be0921fa'], u'filename': u'glibc-2.5-107.el5_9.1.src.rpm', u'epoch': u'0', u'version': u'2.5', u'release': u'107.el5_9.1', u'arch': u'src'}, {u'src': None, u'name': u'glibc', u'sum': [u'md5', u'37e36456ad66159750cc15788bdcb6d9'], u'filename': u'glibc-2.5-107.el5_9.1.i686.rpm', u'epoch': u'0', u'version': u'2.5', u'release': u'107.el5_9.1', u'arch': u'i686'}, {u'src': None, u'name': u'glibc', u'sum': [u'md5', u'22604873ef4cc177298eea3667716353'], u'filename': u'glibc-2.5-107.el5_9.1.x86_64.rpm', u'epoch': u'0', u'version': u'2.5', u'release': u'107.el5_9.1', u'arch': u'x86_64'}, {u'src': None, u'name': u'glibc-common', u'sum': [u'md5', u'63773dea27a948dec4e690cea7014d9e'], u'filename': u'glibc-common-2.5-107.el5_9.1.x86_64.rpm', u'epoch': u'0', u'version': u'2.5', u'release': u'107.el5_9.1', u'arch': u'x86_64'}, {u'src': None, u'name': u'glibc-devel', u'sum': [u'md5', u'1a3f2715b046b2c7825a4e39a670883c'], u'filename': u'glibc-devel-2.5-107.el5_9.1.i386.rpm', u'epoch': u'0', u'version': u'2.5', u'release': u'107.el5_9.1', u'arch': u'i386'}, {u'src': None, u'name': u'glibc-devel', u'sum': [u'md5', u'3aaa38c3b8b843fbe6f108938d9db784'], u'filename': u'glibc-devel-2.5-107.el5_9.1.x86_64.rpm', u'epoch': u'0', u'version': u'2.5', u'release': u'107.el5_9.1', u'arch': u'x86_64'}, {u'src': None, u'name': u'glibc-headers', u'sum': [u'md5', u'80e15b5035da4a44bea3ac95751731ea'], u'filename': u'glibc-headers-2.5-107.el5_9.1.x86_64.rpm', u'epoch': u'0', u'version': u'2.5', u'release': u'107.el5_9.1', u'arch': u'x86_64'}, {u'src': None, u'name': u'glibc-utils', u'sum': [u'md5', u'c2e858250c1258a04391b65991aed34e'], u'filename': u'glibc-utils-2.5-107.el5_9.1.x86_64.rpm', u'epoch': u'0', u'version': u'2.5', u'release': u'107.el5_9.1', u'arch': u'x86_64'}, {u'src': None, u'name': u'nscd', u'sum': [u'md5', u'a9b8ce129a0335dd7117bf4e9fc10e67'], u'filename': u'nscd-2.5-107.el5_9.1.x86_64.rpm', u'epoch': u'0', u'version': u'2.5', u'release': u'107.el5_9.1', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u'[1.1.0-14.1]\n- Resolves: # 920825 - esc ceased working after Firefox/xulrunner update to 17 and above series', u'issued': u'2013-04-10', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELBA-2013-0734.html', u'type': u'self', u'id': None, u'title': u'ELBA-2013-0734'}], u'_content_type_id': u'erratum', u'_id': u'97b70521-57cb-43d0-91f1-4e10dfb6f166', u'from': u'el-errata@oss.oracle.com', u'severity': u'', u'title': u'esc bug fix update', u'_ns': u'units_erratum', u'rights': u'Copyright 2013 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 5', u'reboot_suggested': False, u'type': u'bugfix', u'pkglist': [{u'packages': [{u'src': None, u'name': u'esc', u'sum': [u'md5', u'941987c830fbd3ce68af8a69a31eb3f6'], u'filename': u'esc-1.1.0-14.el5_9.1.src.rpm', u'epoch': u'0', u'version': u'1.1.0', u'release': u'14.el5_9.1', u'arch': u'src'}, {u'src': None, u'name': u'esc', u'sum': [u'md5', u'3a2a1f1aed9bfe7fc9dcfc502ea28b6e'], u'filename': u'esc-1.1.0-14.el5_9.1.x86_64.rpm', u'epoch': u'0', u'version': u'1.1.0', u'release': u'14.el5_9.1', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u'[1.33.12-14.8.el5_9]\n- Remove codec hacking\nResolves:#953167', u'issued': u'2013-04-22', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELBA-2013-0760.html', u'type': u'self', u'id': None, u'title': u'ELBA-2013-0760'}], u'_content_type_id': u'erratum', u'_id': u'de653fbf-2cfe-4111-9dce-b81f6b669838', u'from': u'el-errata@oss.oracle.com', u'severity': u'', u'title': u'policycoreutils bug fix update', u'_ns': u'units_erratum', u'rights': u'Copyright 2013 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 5', u'reboot_suggested': False, u'type': u'bugfix', u'pkglist': [{u'packages': [{u'src': None, u'name': u'policycoreutils', u'sum': [u'md5', u'759f6c220bbcc573f8ccf4e604bc9b1c'], u'filename': u'policycoreutils-1.33.12-14.8.el5_9.src.rpm', u'epoch': u'0', u'version': u'1.33.12', u'release': u'14.8.el5_9', u'arch': u'src'}, {u'src': None, u'name': u'policycoreutils', u'sum': [u'md5', u'e1eff59028774e5af4de6da7e476231b'], u'filename': u'policycoreutils-1.33.12-14.8.el5_9.x86_64.rpm', u'epoch': u'0', u'version': u'1.33.12', u'release': u'14.8.el5_9', u'arch': u'x86_64'}, {u'src': None, u'name': u'policycoreutils-gui', u'sum': [u'md5', u'89346ceeb5d47a9f85284585f2021760'], u'filename': u'policycoreutils-gui-1.33.12-14.8.el5_9.x86_64.rpm', u'epoch': u'0', u'version': u'1.33.12', u'release': u'14.8.el5_9', u'arch': u'x86_64'}, {u'src': None, u'name': u'policycoreutils-newrole', u'sum': [u'md5', u'dc644f0eb5b6c80066a670ba464b2e82'], u'filename': u'policycoreutils-newrole-1.33.12-14.8.el5_9.x86_64.rpm', u'epoch': u'0', u'version': u'1.33.12', u'release': u'14.8.el5_9', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u'[2.0.115-109.3]\n- fenced: Prevent a rare but possible spinning in poll on the cman fd\n Resolves: rhbz#951049\n\n[2.0.115-109.2]\n- fenced: Prevent a rare but possible spinning in poll on the cman fd\n Resolves: rhbz#951049', u'issued': u'2013-04-22', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELBA-2013-0761.html', u'type': u'self', u'id': None, u'title': u'ELBA-2013-0761'}], u'_content_type_id': u'erratum', u'_id': u'81bc014b-8139-4609-a7e4-b8da80b3c0e0', u'from': u'el-errata@oss.oracle.com', u'severity': u'', u'title': u'cman bug fix update', u'_ns': u'units_erratum', u'rights': u'Copyright 2013 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 5', u'reboot_suggested': False, u'type': u'bugfix', u'pkglist': [{u'packages': [{u'src': None, u'name': u'cman', u'sum': [u'md5', u'0ccaae4fe7f8d4aba97bcdb7d58cd0e2'], u'filename': u'cman-2.0.115-109.el5_9.3.src.rpm', u'epoch': u'0', u'version': u'2.0.115', u'release': u'109.el5_9.3', u'arch': u'src'}, {u'src': None, u'name': u'cman', u'sum': [u'md5', u'904361a8ebbe521a0eac0651fa07bd8f'], u'filename': u'cman-2.0.115-109.el5_9.3.x86_64.rpm', u'epoch': u'0', u'version': u'2.0.115', u'release': u'109.el5_9.3', u'arch': u'x86_64'}, {u'src': None, u'name': u'cman-devel', u'sum': [u'md5', u'1dcab4ba8485d2703df1c5f7252143c4'], u'filename': u'cman-devel-2.0.115-109.el5_9.3.i386.rpm', u'epoch': u'0', u'version': u'2.0.115', u'release': u'109.el5_9.3', u'arch': u'i386'}, {u'src': None, u'name': u'cman-devel', u'sum': [u'md5', u'388e31e352c4c8c4c8781cf800585557'], u'filename': u'cman-devel-2.0.115-109.el5_9.3.x86_64.rpm', u'epoch': u'0', u'version': u'2.0.115', u'release': u'109.el5_9.3', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u'[0.4.7-54.el5.2]\n- Added bz860185.patch\n- Resolves: bz #951435\n', u'issued': u'2013-04-29', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELBA-2013-0779.html', u'type': u'self', u'id': None, u'title': u'ELBA-2013-0779'}], u'_content_type_id': u'erratum', u'_id': u'98a02874-d67c-4802-8372-5f32800a9b77', u'from': u'el-errata@oss.oracle.com', u'severity': u'', u'title': u'device-mapper-multipath bug fix update', u'_ns': u'units_erratum', u'rights': u'Copyright 2013 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 5', u'reboot_suggested': False, u'type': u'bugfix', u'pkglist': [{u'packages': [{u'src': None, u'name': u'device-mapper-multipath', u'sum': [u'md5', u'e38fdd54f706db579edd9261669ae479'], u'filename': u'device-mapper-multipath-0.4.7-54.el5_9.2.src.rpm', u'epoch': u'0', u'version': u'0.4.7', u'release': u'54.el5_9.2', u'arch': u'src'}, {u'src': None, u'name': u'device-mapper-multipath', u'sum': [u'md5', u'edf66df12ccf296ef90682501b6fb269'], u'filename': u'device-mapper-multipath-0.4.7-54.el5_9.2.x86_64.rpm', u'epoch': u'0', u'version': u'0.4.7', u'release': u'54.el5_9.2', u'arch': u'x86_64'}, {u'src': None, u'name': u'kpartx', u'sum': [u'md5', u'147d9a563fd083fdb1eeb8b6e170341d'], u'filename': u'kpartx-0.4.7-54.el5_9.2.x86_64.rpm', u'epoch': u'0', u'version': u'0.4.7', u'release': u'54.el5_9.2', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u"[0.12.1-8.0.1.el5_9]\n- replace 'Red Hat Enterprise Linux' with 'Enterprise Linux'\n in spec file and tarball's spec file\n\n[0.12.1-8]\n- Fix bz958026 (cluster-cim: missing symbols/provider library not compiled properly)", u'issued': u'2013-05-06', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELBA-2013-0787.html', u'type': u'self', u'id': None, u'title': u'ELBA-2013-0787'}], u'_content_type_id': u'erratum', u'_id': u'deedbfde-0799-4b77-99fb-2933c9e95db4', u'from': u'el-errata@oss.oracle.com', u'severity': u'', u'title': u'clustermon bug fix update', u'_ns': u'units_erratum', u'rights': u'Copyright 2013 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 5', u'reboot_suggested': False, u'type': u'bugfix', u'pkglist': [{u'packages': [{u'src': None, u'name': u'cluster-cim', u'sum': [u'md5', u'6172a42c4e14a0b45592f32be00c1dec'], u'filename': u'cluster-cim-0.12.1-8.0.1.el5_9.x86_64.rpm', u'epoch': u'0', u'version': u'0.12.1', u'release': u'8.0.1.el5_9', u'arch': u'x86_64'}, {u'src': None, u'name': u'cluster-snmp', u'sum': [u'md5', u'b2c3ecec34b0f0796a305662711600b8'], u'filename': u'cluster-snmp-0.12.1-8.0.1.el5_9.x86_64.rpm', u'epoch': u'0', u'version': u'0.12.1', u'release': u'8.0.1.el5_9', u'arch': u'x86_64'}, {u'src': None, u'name': u'clustermon', u'sum': [u'md5', u'07470e62537f4c7172b9ac104ace0bbb'], u'filename': u'clustermon-0.12.1-8.0.1.el5_9.src.rpm', u'epoch': u'0', u'version': u'0.12.1', u'release': u'8.0.1.el5_9', u'arch': u'src'}, {u'src': None, u'name': u'modcluster', u'sum': [u'md5', u'286bee0cb3c19cbbc621c8c700ad4dd3'], u'filename': u'modcluster-0.12.1-8.0.1.el5_9.x86_64.rpm', u'epoch': u'0', u'version': u'0.12.1', u'release': u'8.0.1.el5_9', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u'[1.0.14-5]\n- add support for ext4 dump locations\n Resolves: #767216', u'issued': u'2013-05-07', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELBA-2013-0789.html', u'type': u'self', u'id': None, u'title': u'ELBA-2013-0789'}], u'_content_type_id': u'erratum', u'_id': u'fa68596f-07f9-4a61-a5bb-263f77ae8070', u'from': u'el-errata@oss.oracle.com', u'severity': u'', u'title': u'system-config-kdump bug fix update', u'_ns': u'units_erratum', u'rights': u'Copyright 2013 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 5', u'reboot_suggested': False, u'type': u'bugfix', u'pkglist': [{u'packages': [{u'src': None, u'name': u'system-config-kdump', u'sum': [u'md5', u'e8ba9af1b4bf694e7af69c94e15a61ca'], u'filename': u'system-config-kdump-1.0.14-5.el5_9.noarch.rpm', u'epoch': u'0', u'version': u'1.0.14', u'release': u'5.el5_9', u'arch': u'noarch'}, {u'src': None, u'name': u'system-config-kdump', u'sum': [u'md5', u'5598e660ecabf94cb8d9cfbac8d745ae'], u'filename': u'system-config-kdump-1.0.14-5.el5_9.src.rpm', u'epoch': u'0', u'version': u'1.0.14', u'release': u'5.el5_9', u'arch': u'src'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u"[1.39-36.0.1]\n- Add btrfs detection to libblkid, now that the disk format should be\n recognizable in the future. (Eric Sandeen) [bug 13705317] (Guangyu Sun)\n\n[1.39-36]\n- Fix use after free in libblkid's blkid_set_tag (#922567, #949435)", u'issued': u'2013-05-09', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELBA-2013-0793.html', u'type': u'self', u'id': None, u'title': u'ELBA-2013-0793'}], u'_content_type_id': u'erratum', u'_id': u'7d8084e4-4e88-4d84-bbef-03a656673206', u'from': u'el-errata@oss.oracle.com', u'severity': u'', u'title': u'e2fsprogs bug fix update', u'_ns': u'units_erratum', u'rights': u'Copyright 2013 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 5', u'reboot_suggested': False, u'type': u'bugfix', u'pkglist': [{u'packages': [{u'src': None, u'name': u'e2fsprogs', u'sum': [u'md5', u'ea378e1e34ed59f80b8f43db669c1b1e'], u'filename': u'e2fsprogs-1.39-36.0.1.el5_9.src.rpm', u'epoch': u'0', u'version': u'1.39', u'release': u'36.0.1.el5_9', u'arch': u'src'}, {u'src': None, u'name': u'e2fsprogs', u'sum': [u'md5', u'cf7380824ca6244899bc5bfcf9080283'], u'filename': u'e2fsprogs-1.39-36.0.1.el5_9.x86_64.rpm', u'epoch': u'0', u'version': u'1.39', u'release': u'36.0.1.el5_9', u'arch': u'x86_64'}, {u'src': None, u'name': u'e2fsprogs-devel', u'sum': [u'md5', u'927aa5761c3bf3563629b85d45797349'], u'filename': u'e2fsprogs-devel-1.39-36.0.1.el5_9.i386.rpm', u'epoch': u'0', u'version': u'1.39', u'release': u'36.0.1.el5_9', u'arch': u'i386'}, {u'src': None, u'name': u'e2fsprogs-devel', u'sum': [u'md5', u'8bfffade99d5fad06ccead21bdaa4745'], u'filename': u'e2fsprogs-devel-1.39-36.0.1.el5_9.x86_64.rpm', u'epoch': u'0', u'version': u'1.39', u'release': u'36.0.1.el5_9', u'arch': u'x86_64'}, {u'src': None, u'name': u'e2fsprogs-libs', u'sum': [u'md5', u'867029b1e6a37b213d1560f124d29163'], u'filename': u'e2fsprogs-libs-1.39-36.0.1.el5_9.i386.rpm', u'epoch': u'0', u'version': u'1.39', u'release': u'36.0.1.el5_9', u'arch': u'i386'}, {u'src': None, u'name': u'e2fsprogs-libs', u'sum': [u'md5', u'0e81712be3acc3cd3faf90c1e6d97c0d'], u'filename': u'e2fsprogs-libs-1.39-36.0.1.el5_9.x86_64.rpm', u'epoch': u'0', u'version': u'1.39', u'release': u'36.0.1.el5_9', u'arch': u'x86_64'}, {u'src': None, u'name': u'uuidd', u'sum': [u'md5', u'6248322d0f504bd72a4758af4d04657c'], u'filename': u'uuidd-1.39-36.0.1.el5_9.x86_64.rpm', u'epoch': u'0', u'version': u'1.39', u'release': u'36.0.1.el5_9', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u"[3.0.3-142.el55_9.3]\n- xm: Fix vcpu-pin complain for CPU number out of range (rhbz 960013)\n- libxc: Support set affinity for more than 64 CPUS (rhbz 960013)\n- libxc: Fixes for 'support affinity for more than 64 CPUS' (rhbz 960013)\n- xend: Fix bug of a cpu affinity vcpu-pin under ia32pa (rhbz 960013)\n- libxc: Fix cpu number overflow for vcpu-pin (rhbz 960013)", u'issued': u'2013-05-21', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELBA-2013-0846.html', u'type': u'self', u'id': None, u'title': u'ELBA-2013-0846'}], u'_content_type_id': u'erratum', u'_id': u'aaa75428-9574-471b-aaf4-f003a6951e5f', u'from': u'el-errata@oss.oracle.com', u'severity': u'', u'title': u'xen bug fix update xen bug fix update', u'_ns': u'units_erratum', u'rights': u'Copyright 2013 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 5', u'reboot_suggested': False, u'type': u'bugfix', u'pkglist': [{u'packages': [{u'src': None, u'name': u'xen', u'sum': [u'md5', u'c744c4cdca605ef39fbbb490fcda4eb8'], u'filename': u'xen-3.0.3-142.el5_9.3.src.rpm', u'epoch': u'0', u'version': u'3.0.3', u'release': u'142.el5_9.3', u'arch': u'src'}, {u'src': None, u'name': u'xen', u'sum': [u'md5', u'fbe16a0cfb6921a2e51115143d2fbb42'], u'filename': u'xen-3.0.3-142.el5_9.3.x86_64.rpm', u'epoch': u'0', u'version': u'3.0.3', u'release': u'142.el5_9.3', u'arch': u'x86_64'}, {u'src': None, u'name': u'xen-devel', u'sum': [u'md5', u'5c1ed364a7c726d45e40e0afbf73b707'], u'filename': u'xen-devel-3.0.3-142.el5_9.3.i386.rpm', u'epoch': u'0', u'version': u'3.0.3', u'release': u'142.el5_9.3', u'arch': u'i386'}, {u'src': None, u'name': u'xen-devel', u'sum': [u'md5', u'6c0daad9ff22bd70060d873a83746c90'], u'filename': u'xen-devel-3.0.3-142.el5_9.3.x86_64.rpm', u'epoch': u'0', u'version': u'3.0.3', u'release': u'142.el5_9.3', u'arch': u'x86_64'}, {u'src': None, u'name': u'xen-libs', u'sum': [u'md5', u'598922a3837fea0c8a876d206f40b9c2'], u'filename': u'xen-libs-3.0.3-142.el5_9.3.i386.rpm', u'epoch': u'0', u'version': u'3.0.3', u'release': u'142.el5_9.3', u'arch': u'i386'}, {u'src': None, u'name': u'xen-libs', u'sum': [u'md5', u'd40d105703d12c9a1461fee7c258a147'], u'filename': u'xen-libs-3.0.3-142.el5_9.3.x86_64.rpm', u'epoch': u'0', u'version': u'3.0.3', u'release': u'142.el5_9.3', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u'[5.1.19.6-80]\n- Rebuild with e2fsprogs-1.39-36.el5\n Resolves: rhbz#963559', u'issued': u'2013-05-27', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELBA-2013-0863.html', u'type': u'self', u'id': None, u'title': u'ELBA-2013-0863'}], u'_content_type_id': u'erratum', u'_id': u'75d5366e-e334-45a2-a6d8-4b1200e2a13d', u'from': u'el-errata@oss.oracle.com', u'severity': u'', u'title': u'mkinitrd bug fix update', u'_ns': u'units_erratum', u'rights': u'Copyright 2013 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 5', u'reboot_suggested': False, u'type': u'bugfix', u'pkglist': [{u'packages': [{u'src': None, u'name': u'libbdevid-python', u'sum': [u'md5', u'bbf5e372dc7f48bdab91951d001b7166'], u'filename': u'libbdevid-python-5.1.19.6-80.el5_9.x86_64.rpm', u'epoch': u'0', u'version': u'5.1.19.6', u'release': u'80.el5_9', u'arch': u'x86_64'}, {u'src': None, u'name': u'mkinitrd', u'sum': [u'md5', u'3312c90d603be9f15348faff9f74512d'], u'filename': u'mkinitrd-5.1.19.6-80.el5_9.i386.rpm', u'epoch': u'0', u'version': u'5.1.19.6', u'release': u'80.el5_9', u'arch': u'i386'}, {u'src': None, u'name': u'mkinitrd', u'sum': [u'md5', u'fa2ee820465af8dab289a3c74e18b6d2'], u'filename': u'mkinitrd-5.1.19.6-80.el5_9.src.rpm', u'epoch': u'0', u'version': u'5.1.19.6', u'release': u'80.el5_9', u'arch': u'src'}, {u'src': None, u'name': u'mkinitrd', u'sum': [u'md5', u'486d24f45db2f15e667b63efa3fa94b4'], u'filename': u'mkinitrd-5.1.19.6-80.el5_9.x86_64.rpm', u'epoch': u'0', u'version': u'5.1.19.6', u'release': u'80.el5_9', u'arch': u'x86_64'}, {u'src': None, u'name': u'mkinitrd-devel', u'sum': [u'md5', u'2b4aadfc28653a50d5763c1a0991ab9f'], u'filename': u'mkinitrd-devel-5.1.19.6-80.el5_9.i386.rpm', u'epoch': u'0', u'version': u'5.1.19.6', u'release': u'80.el5_9', u'arch': u'i386'}, {u'src': None, u'name': u'mkinitrd-devel', u'sum': [u'md5', u'1465ecfea8aaa909b5629cb488982345'], u'filename': u'mkinitrd-devel-5.1.19.6-80.el5_9.x86_64.rpm', u'epoch': u'0', u'version': u'5.1.19.6', u'release': u'80.el5_9', u'arch': u'x86_64'}, {u'src': None, u'name': u'nash', u'sum': [u'md5', u'0b566e942e9d8e26b707575a0def1b47'], u'filename': u'nash-5.1.19.6-80.el5_9.x86_64.rpm', u'epoch': u'0', u'version': u'5.1.19.6', u'release': u'80.el5_9', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u"[5.1.19.6-80.0.2.el5_9]\n- Rebuild\n\n[5.1.19.6-80.0.1.el5_9]\n- Add fips support for kernel-uek-2.6.39-* (John Haxby) [orabug 16709263]\n- Add /lib64/libgcc_s.so.1 to initrd for device-mapper-multipath. (Guangyu Sun) [orabug 15829409]\n- fix initrd creation for root on btrfs file systems (Maxim Uvarov) [orabug 13823284]\n- Fix scsi initialization order. mkinitrd_stab_before_usb.patch (Maxim Uvarov) [orabug 14030199]\n- Fix modinfo warning when module not existing in th kernel. (Joe Jin)\n- Fix no kerver version made modinfo show warning [orabug 13784172] (Joe Jin)\n- Fix findmodule rds recursive when installed ofa [orabug 13699238] (Joe Jin)\n- fix regression in firmware pickup [orabug 13637902] (Guru Anbalagane)\n- include Xen drivers if PCI ID 0x58530001 exists (the unplug driver) [orabug 13624626] (Konrad Rzeszutek Wilk)\n- replace deprecated oom_adj interface with oom_score_adj [orabug 13528775] (Chuck Anderson)\n- Fix mkinitrd for 2.6.39 under old 2.6.18 [orabug 13522440] (Maxim Uvarov)\n- Load firmware from /lib/formware/(uname -r) directory also (Maxim Uvarov)[13459000]\n- Scan for device mapper devices along with md devices in nash [bug 12992623]\n- Be tolerant of missing modules that are actually built-in [orabug 12814599]\n- add --with-multipath option to force load mpath in the case of LVM-on-mpath [orabug 11781507] (John Sobecki)\n- revert early patch that did auto-mpath detection. Reason: If the\n /etc/multipath.conf was not properly configured, it could result in local\n sda disks getting allocated by multipath (sda1 is busy error during boot)\n- fix setquiet warning due to verbose logic addition [orabug 12753043]\n- support for firmware files under subdir in lib/firmware [orabug 12724067]\n- More updates to support both 32 and 64 bit installs\n- Copy over the /etc/multipath/bindings file to the initrd image to try\n and preserve the old mpath0 device names [orabug 10282894] (John Sobecki)\n- Update mkinitrd to handle 32 and 64 bit shared libs for multipath [orabug 12697173] (John Sobecki)\n- Check for mpath in the case of LVM-on-mpath [orabug 11781507] (John Sobecki)\n- Add shared libs needed for multipath executable [orabug 10202864] (John Sobecki)\n- Change module detection logic to work with 5.x and UEK kernels (John Sobecki)\n- When using the -v option, take out the setquiet in the initrd image (John Sobecki)\n- Detect /etc/enterprise-release\n- Don't try to reload same driver [orabug 10209399] (Joe Jin)\n- Merges for UEK\n * Fix blkid scanning to prefer MD devices when we find them. If /dev/sda\n and /dev/sdb are in a MD raidset, /dev/mdX, /dev/sda and /dev/sdb will all\n have the same filesystem label and uuid. Nash has code that goes through\n all the blkid tags in sysfs order, and it will pick whichever one pops up\n first.\n This changes nash to always prefer md devices.\n It also forces a wait for scsi devices to settle, if scsi isn't compiled as a\\ module it won't autodetect that we should wait for scsi devices. (Chris Mason)\n * Add udev and firmware_helper to initrd so firmware gets loaded during boot (Guru Anbalagane)", u'issued': u'2013-05-28', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELBA-2013-0863-1.html', u'type': u'self', u'id': None, u'title': u'ELBA-2013-0863-1'}], u'_content_type_id': u'erratum', u'_id': u'4b3403cd-66bc-4334-97dd-9ce199143a57', u'from': u'el-errata@oss.oracle.com', u'severity': u'', u'title': u'mkinitrd bug fix update', u'_ns': u'units_erratum', u'rights': u'Copyright 2013 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 5', u'reboot_suggested': False, u'type': u'bugfix', u'pkglist': [{u'packages': [{u'src': None, u'name': u'libbdevid-python', u'sum': [u'md5', u'da810855eb10df2166c4ac8b878c861a'], u'filename': u'libbdevid-python-5.1.19.6-80.0.2.el5_9.x86_64.rpm', u'epoch': u'0', u'version': u'5.1.19.6', u'release': u'80.0.2.el5_9', u'arch': u'x86_64'}, {u'src': None, u'name': u'mkinitrd', u'sum': [u'md5', u'c10fec29ba0a491d73bd3f5da0f43628'], u'filename': u'mkinitrd-5.1.19.6-80.0.2.el5_9.i386.rpm', u'epoch': u'0', u'version': u'5.1.19.6', u'release': u'80.0.2.el5_9', u'arch': u'i386'}, {u'src': None, u'name': u'mkinitrd', u'sum': [u'md5', u'2561c95eb71c622e3dceabd5d9426389'], u'filename': u'mkinitrd-5.1.19.6-80.0.2.el5_9.src.rpm', u'epoch': u'0', u'version': u'5.1.19.6', u'release': u'80.0.2.el5_9', u'arch': u'src'}, {u'src': None, u'name': u'mkinitrd', u'sum': [u'md5', u'47bd138c568e58aed84bdf9e140d7e5c'], u'filename': u'mkinitrd-5.1.19.6-80.0.2.el5_9.x86_64.rpm', u'epoch': u'0', u'version': u'5.1.19.6', u'release': u'80.0.2.el5_9', u'arch': u'x86_64'}, {u'src': None, u'name': u'mkinitrd-devel', u'sum': [u'md5', u'883b7dcbd77333e38c6e3e7796ee2515'], u'filename': u'mkinitrd-devel-5.1.19.6-80.0.2.el5_9.i386.rpm', u'epoch': u'0', u'version': u'5.1.19.6', u'release': u'80.0.2.el5_9', u'arch': u'i386'}, {u'src': None, u'name': u'mkinitrd-devel', u'sum': [u'md5', u'a687c1f7464a37c15c06d66bde9d436f'], u'filename': u'mkinitrd-devel-5.1.19.6-80.0.2.el5_9.x86_64.rpm', u'epoch': u'0', u'version': u'5.1.19.6', u'release': u'80.0.2.el5_9', u'arch': u'x86_64'}, {u'src': None, u'name': u'nash', u'sum': [u'md5', u'a99afc2d6a97c780d7845cf504e0dbca'], u'filename': u'nash-5.1.19.6-80.0.2.el5_9.x86_64.rpm', u'epoch': u'0', u'version': u'5.1.19.6', u'release': u'80.0.2.el5_9', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u'[5:6.1.5-5]\n- bz964133 - amd command ignores -noacl mount option in RHEL 5\n - fix amd ignores noacl mount option.\n- quiet the BuildPrereq and Prereq depricated warnings.\n- Resolves: rhbz#964133', u'issued': u'2013-05-27', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELBA-2013-0864.html', u'type': u'self', u'id': None, u'title': u'ELBA-2013-0864'}], u'_content_type_id': u'erratum', u'_id': u'e6b23998-d528-4c38-a0fb-5ac641c90232', u'from': u'el-errata@oss.oracle.com', u'severity': u'', u'title': u'am-utils bug fix update', u'_ns': u'units_erratum', u'rights': u'Copyright 2013 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 5', u'reboot_suggested': False, u'type': u'bugfix', u'pkglist': [{u'packages': [{u'src': None, u'name': u'am-utils', u'sum': [u'md5', u'f73590c0c36942d183d756f417df1e7b'], u'filename': u'am-utils-6.1.5-5.el5_9.src.rpm', u'epoch': u'5', u'version': u'6.1.5', u'release': u'5.el5_9', u'arch': u'src'}, {u'src': None, u'name': u'am-utils', u'sum': [u'md5', u'74a090c720770581051c76a09d911d84'], u'filename': u'am-utils-6.1.5-5.el5_9.x86_64.rpm', u'epoch': u'5', u'version': u'6.1.5', u'release': u'5.el5_9', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u"[2.5-107.5]\n- Fix _nl_find_msg malloc failure case, and callers (#963813).\n - Test on init_fct, not result->__init_fct, after demangling (#963812).\n - Don't handle ttl == 0 specially (#962903).", u'issued': u'2013-05-30', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELBA-2013-0885.html', u'type': u'self', u'id': None, u'title': u'ELBA-2013-0885'}], u'_content_type_id': u'erratum', u'_id': u'ec067cdc-5ad4-45ee-ba4a-de028f4d3a14', u'from': u'el-errata@oss.oracle.com', u'severity': u'', u'title': u'glibc bug fix update', u'_ns': u'units_erratum', u'rights': u'Copyright 2013 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 5', u'reboot_suggested': False, u'type': u'bugfix', u'pkglist': [{u'packages': [{u'src': None, u'name': u'glibc', u'sum': [u'md5', u'4fd7fd4ed2fac7e642d7445444726c4c'], u'filename': u'glibc-2.5-107.el5_9.5.src.rpm', u'epoch': u'0', u'version': u'2.5', u'release': u'107.el5_9.5', u'arch': u'src'}, {u'src': None, u'name': u'glibc', u'sum': [u'md5', u'4a792a1f217bde6075494c9ef3648d08'], u'filename': u'glibc-2.5-107.el5_9.5.i686.rpm', u'epoch': u'0', u'version': u'2.5', u'release': u'107.el5_9.5', u'arch': u'i686'}, {u'src': None, u'name': u'glibc', u'sum': [u'md5', u'467be2750c8e34ef6b6d941eef3c2ef4'], u'filename': u'glibc-2.5-107.el5_9.5.x86_64.rpm', u'epoch': u'0', u'version': u'2.5', u'release': u'107.el5_9.5', u'arch': u'x86_64'}, {u'src': None, u'name': u'glibc-common', u'sum': [u'md5', u'c8cfcb425d087f1ca047355cd9e8c36f'], u'filename': u'glibc-common-2.5-107.el5_9.5.x86_64.rpm', u'epoch': u'0', u'version': u'2.5', u'release': u'107.el5_9.5', u'arch': u'x86_64'}, {u'src': None, u'name': u'glibc-devel', u'sum': [u'md5', u'a40da6b5326000a442f1bb616a43a162'], u'filename': u'glibc-devel-2.5-107.el5_9.5.i386.rpm', u'epoch': u'0', u'version': u'2.5', u'release': u'107.el5_9.5', u'arch': u'i386'}, {u'src': None, u'name': u'glibc-devel', u'sum': [u'md5', u'eb7c7fba721a02c19417d843c84e0ff2'], u'filename': u'glibc-devel-2.5-107.el5_9.5.x86_64.rpm', u'epoch': u'0', u'version': u'2.5', u'release': u'107.el5_9.5', u'arch': u'x86_64'}, {u'src': None, u'name': u'glibc-headers', u'sum': [u'md5', u'1bc11021091fe4ab5d374bec72e54aec'], u'filename': u'glibc-headers-2.5-107.el5_9.5.x86_64.rpm', u'epoch': u'0', u'version': u'2.5', u'release': u'107.el5_9.5', u'arch': u'x86_64'}, {u'src': None, u'name': u'glibc-utils', u'sum': [u'md5', u'ce12c6cbd30e91f18d84a4dc402127f8'], u'filename': u'glibc-utils-2.5-107.el5_9.5.x86_64.rpm', u'epoch': u'0', u'version': u'2.5', u'release': u'107.el5_9.5', u'arch': u'x86_64'}, {u'src': None, u'name': u'nscd', u'sum': [u'md5', u'443e81efd4fb44ee50462a83db9987bc'], u'filename': u'nscd-2.5-107.el5_9.5.x86_64.rpm', u'epoch': u'0', u'version': u'2.5', u'release': u'107.el5_9.5', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u"[2.0.52-37.3]\n- Don't preserve SELinux context when copying files to /var/lib/nfs/sm\n Resolves: rhbz#967456", u'issued': u'2013-06-03', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELBA-2013-0892.html', u'type': u'self', u'id': None, u'title': u'ELBA-2013-0892'}], u'_content_type_id': u'erratum', u'_id': u'6e296f63-7700-4f7e-b6a3-5ad287e514ad', u'from': u'el-errata@oss.oracle.com', u'severity': u'', u'title': u'rgmanager bug fix update', u'_ns': u'units_erratum', u'rights': u'Copyright 2013 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 5', u'reboot_suggested': False, u'type': u'bugfix', u'pkglist': [{u'packages': [{u'src': None, u'name': u'rgmanager', u'sum': [u'md5', u'992d2f7f10fa5ab922083e457bb8f8af'], u'filename': u'rgmanager-2.0.52-37.el5_9.3.src.rpm', u'epoch': u'0', u'version': u'2.0.52', u'release': u'37.el5_9.3', u'arch': u'src'}, {u'src': None, u'name': u'rgmanager', u'sum': [u'md5', u'71c6e19fddcc3439ab98b7155c21f520'], u'filename': u'rgmanager-2.0.52-37.el5_9.3.x86_64.rpm', u'epoch': u'0', u'version': u'2.0.52', u'release': u'37.el5_9.3', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u'[0.1.62-37]\n- After converting a GFS1 file system with gfs2_convert errors were detected with fsck.gfs2\n- Resolves: rhbz#956030', u'issued': u'2013-06-06', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELBA-2013-0902.html', u'type': u'self', u'id': None, u'title': u'ELBA-2013-0902'}], u'_content_type_id': u'erratum', u'_id': u'0022dabe-d916-4b03-80a6-d599bfc68ce4', u'from': u'el-errata@oss.oracle.com', u'severity': u'', u'title': u'gfs2-utils bug fix update', u'_ns': u'units_erratum', u'rights': u'Copyright 2013 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 5', u'reboot_suggested': False, u'type': u'bugfix', u'pkglist': [{u'packages': [{u'src': None, u'name': u'gfs2-utils', u'sum': [u'md5', u'7a589abfcf8ef8a05cff1c7a96e400e0'], u'filename': u'gfs2-utils-0.1.62-37.el5_9.src.rpm', u'epoch': u'0', u'version': u'0.1.62', u'release': u'37.el5_9', u'arch': u'src'}, {u'src': None, u'name': u'gfs2-utils', u'sum': [u'md5', u'415190679b126507f5de742f26723a8a'], u'filename': u'gfs2-utils-0.1.62-37.el5_9.x86_64.rpm', u'epoch': u'0', u'version': u'0.1.62', u'release': u'37.el5_9', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u'[1.0.7-8.1]\n- fix infinite loop with unstable ldap server connection (#968377)\n\n[1.0.7-8]\n- fix potential crash when parsing header names that contain NUL characters (#728671)', u'issued': u'2013-06-25', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELBA-2013-0976.html', u'type': u'self', u'id': None, u'title': u'ELBA-2013-0976'}], u'_content_type_id': u'erratum', u'_id': u'9dc2b226-549b-4e05-ab96-92a19f6bc4d6', u'from': u'el-errata@oss.oracle.com', u'severity': u'', u'title': u'dovecot bug fix update', u'_ns': u'units_erratum', u'rights': u'Copyright 2013 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 5', u'reboot_suggested': False, u'type': u'bugfix', u'pkglist': [{u'packages': [{u'src': None, u'name': u'dovecot', u'sum': [u'md5', u'e4f1e9c48852efec7b0798935aecaa3f'], u'filename': u'dovecot-1.0.7-8.el5_9.1.src.rpm', u'epoch': u'0', u'version': u'1.0.7', u'release': u'8.el5_9.1', u'arch': u'src'}, {u'src': None, u'name': u'dovecot', u'sum': [u'md5', u'14a2d367f6394e5f63b6fcf8d2441b68'], u'filename': u'dovecot-1.0.7-8.el5_9.1.x86_64.rpm', u'epoch': u'0', u'version': u'1.0.7', u'release': u'8.el5_9.1', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u"[2.2.3-81.0.1.el5_9]\n- fix mod_ssl always performing full renegotiation (Joe Jin) [orabug 12423387]\n- replace index.html with Oracle's index page oracle_index.html\n- update vstring and distro in specfile\n\n[2.2.3-81]\n- mod_mem_cache: thread-safety fixes (Jan Kaluza, #970994)", u'issued': u'2013-06-26', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELBA-2013-0984.html', u'type': u'self', u'id': None, u'title': u'ELBA-2013-0984'}], u'_content_type_id': u'erratum', u'_id': u'bf13ceb5-4511-4001-a63d-3bb2920c22af', u'from': u'el-errata@oss.oracle.com', u'severity': u'', u'title': u'httpd bug fix update', u'_ns': u'units_erratum', u'rights': u'Copyright 2013 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 5', u'reboot_suggested': False, u'type': u'bugfix', u'pkglist': [{u'packages': [{u'src': None, u'name': u'httpd', u'sum': [u'md5', u'73207ebc9f6a4dc1afb968a084c65b11'], u'filename': u'httpd-2.2.3-81.0.1.el5_9.src.rpm', u'epoch': u'0', u'version': u'2.2.3', u'release': u'81.0.1.el5_9', u'arch': u'src'}, {u'src': None, u'name': u'httpd', u'sum': [u'md5', u'11a97d0f0bd898c133f7d74bcfa9449a'], u'filename': u'httpd-2.2.3-81.0.1.el5_9.x86_64.rpm', u'epoch': u'0', u'version': u'2.2.3', u'release': u'81.0.1.el5_9', u'arch': u'x86_64'}, {u'src': None, u'name': u'httpd-devel', u'sum': [u'md5', u'cde28e8b4c0946f7db53fef1396b65ad'], u'filename': u'httpd-devel-2.2.3-81.0.1.el5_9.i386.rpm', u'epoch': u'0', u'version': u'2.2.3', u'release': u'81.0.1.el5_9', u'arch': u'i386'}, {u'src': None, u'name': u'httpd-devel', u'sum': [u'md5', u'5d286387d2ac9b5e6a09a51a97c3e4b5'], u'filename': u'httpd-devel-2.2.3-81.0.1.el5_9.x86_64.rpm', u'epoch': u'0', u'version': u'2.2.3', u'release': u'81.0.1.el5_9', u'arch': u'x86_64'}, {u'src': None, u'name': u'httpd-manual', u'sum': [u'md5', u'2e5dd38aa02259ba980d6c8329c0b2dd'], u'filename': u'httpd-manual-2.2.3-81.0.1.el5_9.x86_64.rpm', u'epoch': u'0', u'version': u'2.2.3', u'release': u'81.0.1.el5_9', u'arch': u'x86_64'}, {u'src': None, u'name': u'mod_ssl', u'sum': [u'md5', u'867eb6f0452df0b467e3e46fcc208c85'], u'filename': u'mod_ssl-2.2.3-81.0.1.el5_9.x86_64.rpm', u'epoch': u'1', u'version': u'2.2.3', u'release': u'81.0.1.el5_9', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u"[1.7.0.25-2.3.10.5.0.1.el5_9]\n- Add oracle-enterprise.patch\n- Fix DISTRO_NAME to 'Enterprise Linux'\n\n[1.7.0.25-2.3.10.5.el5]\n- Sync with upstream IcedTea7-forest 2.3.10 tag\n- Fixes regressions as introduced with 1.7.0.25-2.3.10.4.el5:\n rhbz#978005, rhbz#977979, rhbz#976693, IcedTeaBZ#1487.\n- Related: rhbz#973117 ", u'issued': u'2013-07-01', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELBA-2013-1005.html', u'type': u'self', u'id': None, u'title': u'ELBA-2013-1005'}], u'_content_type_id': u'erratum', u'_id': u'8cfab62a-8802-43bd-ba8e-d7ff4c803a7c', u'from': u'el-errata@oss.oracle.com', u'severity': u'', u'title': u'java-1.7.0-openjdk bug fix update', u'_ns': u'units_erratum', u'rights': u'Copyright 2013 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 5', u'reboot_suggested': False, u'type': u'bugfix', u'pkglist': [{u'packages': [{u'src': None, u'name': u'java-1.7.0-openjdk', u'sum': [u'md5', u'32598cf4a1924cb09ae1c0a9e761e9c9'], u'filename': u'java-1.7.0-openjdk-1.7.0.25-2.3.10.5.0.1.el5_9.src.rpm', u'epoch': u'1', u'version': u'1.7.0.25', u'release': u'2.3.10.5.0.1.el5_9', u'arch': u'src'}, {u'src': None, u'name': u'java-1.7.0-openjdk', u'sum': [u'md5', u'5302abf280583593941878dae928eda0'], u'filename': u'java-1.7.0-openjdk-1.7.0.25-2.3.10.5.0.1.el5_9.x86_64.rpm', u'epoch': u'1', u'version': u'1.7.0.25', u'release': u'2.3.10.5.0.1.el5_9', u'arch': u'x86_64'}, {u'src': None, u'name': u'java-1.7.0-openjdk-demo', u'sum': [u'md5', u'ad89d1b4f9eb24e9559d768e0244dde2'], u'filename': u'java-1.7.0-openjdk-demo-1.7.0.25-2.3.10.5.0.1.el5_9.x86_64.rpm', u'epoch': u'1', u'version': u'1.7.0.25', u'release': u'2.3.10.5.0.1.el5_9', u'arch': u'x86_64'}, {u'src': None, u'name': u'java-1.7.0-openjdk-devel', u'sum': [u'md5', u'604032d26224c373e5175c3736bb68e3'], u'filename': u'java-1.7.0-openjdk-devel-1.7.0.25-2.3.10.5.0.1.el5_9.x86_64.rpm', u'epoch': u'1', u'version': u'1.7.0.25', u'release': u'2.3.10.5.0.1.el5_9', u'arch': u'x86_64'}, {u'src': None, u'name': u'java-1.7.0-openjdk-javadoc', u'sum': [u'md5', u'19918f19c470880ad04d38df88289c90'], u'filename': u'java-1.7.0-openjdk-javadoc-1.7.0.25-2.3.10.5.0.1.el5_9.x86_64.rpm', u'epoch': u'1', u'version': u'1.7.0.25', u'release': u'2.3.10.5.0.1.el5_9', u'arch': u'x86_64'}, {u'src': None, u'name': u'java-1.7.0-openjdk-src', u'sum': [u'md5', u'586dad03cc32fdc56fa6a1cab78589d1'], u'filename': u'java-1.7.0-openjdk-src-1.7.0.25-2.3.10.5.0.1.el5_9.x86_64.rpm', u'epoch': u'1', u'version': u'1.7.0.25', u'release': u'2.3.10.5.0.1.el5_9', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u'[83-262.0.1.el5_9.4]\n- Added kvm-add-oracle-workaround-for-libvirt-bug.patch\n- Added kvm-Introduce-oel-machine-type.patch\n\n[83-262.el5_4]\n- Add missing kvm-fix-l1_map-buffer-overflow.patch [bz#958359]\n- Resolves: bz#958359\n (qemu-kvm segfault in tb_invalidate_phys_page_range())', u'issued': u'2013-07-02', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELBA-2013-1008.html', u'type': u'self', u'id': None, u'title': u'ELBA-2013-1008'}], u'_content_type_id': u'erratum', u'_id': u'37e4d2af-0a54-4b47-85fe-f4f0028a261c', u'from': u'el-errata@oss.oracle.com', u'severity': u'', u'title': u'kvm bug fix update', u'_ns': u'units_erratum', u'rights': u'Copyright 2013 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 5', u'reboot_suggested': False, u'type': u'bugfix', u'pkglist': [{u'packages': [{u'src': None, u'name': u'kmod-kvm', u'sum': [u'md5', u'27b286ff49bd35495c9f8ea7cad6ac93'], u'filename': u'kmod-kvm-83-262.0.1.el5_9.4.x86_64.rpm', u'epoch': u'0', u'version': u'83', u'release': u'262.0.1.el5_9.4', u'arch': u'x86_64'}, {u'src': None, u'name': u'kmod-kvm-debug', u'sum': [u'md5', u'2b38e58d62b6975ec5dee4b8259d4174'], u'filename': u'kmod-kvm-debug-83-262.0.1.el5_9.4.x86_64.rpm', u'epoch': u'0', u'version': u'83', u'release': u'262.0.1.el5_9.4', u'arch': u'x86_64'}, {u'src': None, u'name': u'kvm', u'sum': [u'md5', u'd529b74667b3e01ddbb19e87b9b7d61a'], u'filename': u'kvm-83-262.0.1.el5_9.4.src.rpm', u'epoch': u'0', u'version': u'83', u'release': u'262.0.1.el5_9.4', u'arch': u'src'}, {u'src': None, u'name': u'kvm', u'sum': [u'md5', u'83bf604d07a651a72eea0ac58f5c8324'], u'filename': u'kvm-83-262.0.1.el5_9.4.x86_64.rpm', u'epoch': u'0', u'version': u'83', u'release': u'262.0.1.el5_9.4', u'arch': u'x86_64'}, {u'src': None, u'name': u'kvm-qemu-img', u'sum': [u'md5', u'2261adeaf0e79c461343098fff46672f'], u'filename': u'kvm-qemu-img-83-262.0.1.el5_9.4.x86_64.rpm', u'epoch': u'0', u'version': u'83', u'release': u'262.0.1.el5_9.4', u'arch': u'x86_64'}, {u'src': None, u'name': u'kvm-tools', u'sum': [u'md5', u'3d0ebecaec516d730e6dadea4df25218'], u'filename': u'kvm-tools-83-262.0.1.el5_9.4.x86_64.rpm', u'epoch': u'0', u'version': u'83', u'release': u'262.0.1.el5_9.4', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u'[2.16.2-12.el5]\n- More complete fix for deleting files from a symlinked homedir (#905048)\n\n[2.16.2-11.el5]\n- Fix Trash directory stat (#905048)', u'issued': u'2013-07-10', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELBA-2013-1039.html', u'type': u'self', u'id': None, u'title': u'ELBA-2013-1039'}], u'_content_type_id': u'erratum', u'_id': u'5b838a67-4c34-41f0-b837-3b189784a4fd', u'from': u'el-errata@oss.oracle.com', u'severity': u'', u'title': u'gnome-vfs2 bug fix update', u'_ns': u'units_erratum', u'rights': u'Copyright 2013 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 5', u'reboot_suggested': False, u'type': u'bugfix', u'pkglist': [{u'packages': [{u'src': None, u'name': u'gnome-vfs2', u'sum': [u'md5', u'd009bab8e7a58ff08f0e1ded15dbaf23'], u'filename': u'gnome-vfs2-2.16.2-12.el5_9.i386.rpm', u'epoch': u'0', u'version': u'2.16.2', u'release': u'12.el5_9', u'arch': u'i386'}, {u'src': None, u'name': u'gnome-vfs2', u'sum': [u'md5', u'b3c786c90a29e185bb8aa9ac00b21926'], u'filename': u'gnome-vfs2-2.16.2-12.el5_9.src.rpm', u'epoch': u'0', u'version': u'2.16.2', u'release': u'12.el5_9', u'arch': u'src'}, {u'src': None, u'name': u'gnome-vfs2', u'sum': [u'md5', u'244c53e82fb23e1f0ac2491d993a3fcb'], u'filename': u'gnome-vfs2-2.16.2-12.el5_9.x86_64.rpm', u'epoch': u'0', u'version': u'2.16.2', u'release': u'12.el5_9', u'arch': u'x86_64'}, {u'src': None, u'name': u'gnome-vfs2-devel', u'sum': [u'md5', u'd0b832743c24c7e2488fafaa475c2ba4'], u'filename': u'gnome-vfs2-devel-2.16.2-12.el5_9.i386.rpm', u'epoch': u'0', u'version': u'2.16.2', u'release': u'12.el5_9', u'arch': u'i386'}, {u'src': None, u'name': u'gnome-vfs2-devel', u'sum': [u'md5', u'362c4c05cdc1cce77177191f665b43c6'], u'filename': u'gnome-vfs2-devel-2.16.2-12.el5_9.x86_64.rpm', u'epoch': u'0', u'version': u'2.16.2', u'release': u'12.el5_9', u'arch': u'x86_64'}, {u'src': None, u'name': u'gnome-vfs2-smb', u'sum': [u'md5', u'1b3fe57a9f1d4c400a8e9f8713506ba6'], u'filename': u'gnome-vfs2-smb-2.16.2-12.el5_9.x86_64.rpm', u'epoch': u'0', u'version': u'2.16.2', u'release': u'12.el5_9', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u'[3.2-32.1]\n- Fixed a bug that caused trap handlers to be executed recursively,\n corrupting internal data structures.\n Resolves: #978840', u'issued': u'2013-07-10', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELBA-2013-1040.html', u'type': u'self', u'id': None, u'title': u'ELBA-2013-1040'}], u'_content_type_id': u'erratum', u'_id': u'a4b0a617-6099-40c6-a294-bb580a784179', u'from': u'el-errata@oss.oracle.com', u'severity': u'', u'title': u'bash bug fix update', u'_ns': u'units_erratum', u'rights': u'Copyright 2013 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 5', u'reboot_suggested': False, u'type': u'bugfix', u'pkglist': [{u'packages': [{u'src': None, u'name': u'bash', u'sum': [u'md5', u'511082517053a7ae3ed46cd4f79d2976'], u'filename': u'bash-3.2-32.el5_9.1.src.rpm', u'epoch': u'0', u'version': u'3.2', u'release': u'32.el5_9.1', u'arch': u'src'}, {u'src': None, u'name': u'bash', u'sum': [u'md5', u'30a2eca2ac77eaf2eda0b976f37493fa'], u'filename': u'bash-3.2-32.el5_9.1.x86_64.rpm', u'epoch': u'0', u'version': u'3.2', u'release': u'32.el5_9.1', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u'[3.3.6-7]\n- Release bump (#982260)', u'issued': u'2013-07-18', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELBA-2013-1091.html', u'type': u'self', u'id': None, u'title': u'ELBA-2013-1091'}], u'_content_type_id': u'erratum', u'_id': u'aeeb99ba-614c-4b14-90f8-c0f9aa8416f3', u'from': u'el-errata@oss.oracle.com', u'severity': u'', u'title': u' sqlite', u'_ns': u'units_erratum', u'rights': u'Copyright 2013 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 5', u'reboot_suggested': False, u'type': u'bugfix', u'pkglist': [{u'packages': [{u'src': None, u'name': u'sqlite', u'sum': [u'md5', u'51d4625c817c70c722eb7efab4c5dd4f'], u'filename': u'sqlite-3.3.6-7.i386.rpm', u'epoch': u'0', u'version': u'3.3.6', u'release': u'7', u'arch': u'i386'}, {u'src': None, u'name': u'sqlite', u'sum': [u'md5', u'760febf52c536d011751446f3bd70773'], u'filename': u'sqlite-3.3.6-7.src.rpm', u'epoch': u'0', u'version': u'3.3.6', u'release': u'7', u'arch': u'src'}, {u'src': None, u'name': u'sqlite', u'sum': [u'md5', u'3518e1c96b6227ce17078f1c9c35812f'], u'filename': u'sqlite-3.3.6-7.x86_64.rpm', u'epoch': u'0', u'version': u'3.3.6', u'release': u'7', u'arch': u'x86_64'}, {u'src': None, u'name': u'sqlite-devel', u'sum': [u'md5', u'b20821ed41b8db6e2ab124c7f683ebf3'], u'filename': u'sqlite-devel-3.3.6-7.i386.rpm', u'epoch': u'0', u'version': u'3.3.6', u'release': u'7', u'arch': u'i386'}, {u'src': None, u'name': u'sqlite-devel', u'sum': [u'md5', u'21370130535cf6dc03b79c40aec2a12c'], u'filename': u'sqlite-devel-3.3.6-7.x86_64.rpm', u'epoch': u'0', u'version': u'3.3.6', u'release': u'7', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u'[2.6.26-2.1.21.0.1.el5_9.3]\n- Add libxml2-enterprise.patch\n- Replaced doc/redhat.gif in tarball with updated image\n\n[2.6.26-2.1.21.el5_9.3]\n- fixed one regexp bug and added a (rhbz#987321)\n- Another small change on the algorithm for the elimination of epsilon (rhbz#987321)', u'issued': u'2013-07-31', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELBA-2013-1123.html', u'type': u'self', u'id': None, u'title': u'ELBA-2013-1123'}], u'_content_type_id': u'erratum', u'_id': u'b5fc7c1d-3385-4dcb-9397-9005a332a525', u'from': u'el-errata@oss.oracle.com', u'severity': u'', u'title': u'libxml2 bug fix update', u'_ns': u'units_erratum', u'rights': u'Copyright 2013 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 5', u'reboot_suggested': False, u'type': u'bugfix', u'pkglist': [{u'packages': [{u'src': None, u'name': u'libxml2', u'sum': [u'md5', u'1a4865063ab34601e3601004ab6dec47'], u'filename': u'libxml2-2.6.26-2.1.21.0.1.el5_9.3.i386.rpm', u'epoch': u'0', u'version': u'2.6.26', u'release': u'2.1.21.0.1.el5_9.3', u'arch': u'i386'}, {u'src': None, u'name': u'libxml2', u'sum': [u'md5', u'93a69d8a913cc71bb4b5efe391e809a9'], u'filename': u'libxml2-2.6.26-2.1.21.0.1.el5_9.3.src.rpm', u'epoch': u'0', u'version': u'2.6.26', u'release': u'2.1.21.0.1.el5_9.3', u'arch': u'src'}, {u'src': None, u'name': u'libxml2', u'sum': [u'md5', u'6284cfc78247d4220447230db343fc8b'], u'filename': u'libxml2-2.6.26-2.1.21.0.1.el5_9.3.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.26', u'release': u'2.1.21.0.1.el5_9.3', u'arch': u'x86_64'}, {u'src': None, u'name': u'libxml2-devel', u'sum': [u'md5', u'9dd8dd53ac317d88d574ccd5892911fe'], u'filename': u'libxml2-devel-2.6.26-2.1.21.0.1.el5_9.3.i386.rpm', u'epoch': u'0', u'version': u'2.6.26', u'release': u'2.1.21.0.1.el5_9.3', u'arch': u'i386'}, {u'src': None, u'name': u'libxml2-devel', u'sum': [u'md5', u'67aa21011f25e0607c5d442a7b19e555'], u'filename': u'libxml2-devel-2.6.26-2.1.21.0.1.el5_9.3.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.26', u'release': u'2.1.21.0.1.el5_9.3', u'arch': u'x86_64'}, {u'src': None, u'name': u'libxml2-python', u'sum': [u'md5', u'718034bf2694b21a6907ee7b24a9e1c5'], u'filename': u'libxml2-python-2.6.26-2.1.21.0.1.el5_9.3.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.26', u'release': u'2.1.21.0.1.el5_9.3', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u'[0.5.4-19.el5_9.2]\n- Initialize variables correctly before their use\n- Resolves: #990097\n\n[0.5.4-19.el5_9.1]\n- Decode encoded streams before using them\n- Resolves: #990096', u'issued': u'2013-08-01', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELBA-2013-1128.html', u'type': u'self', u'id': None, u'title': u'ELBA-2013-1128'}], u'_content_type_id': u'erratum', u'_id': u'b630aa32-a4d2-485e-bab4-9ce34826fe5c', u'from': u'el-errata@oss.oracle.com', u'severity': u'', u'title': u'poppler bug fix update', u'_ns': u'units_erratum', u'rights': u'Copyright 2013 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 5', u'reboot_suggested': False, u'type': u'bugfix', u'pkglist': [{u'packages': [{u'src': None, u'name': u'poppler', u'sum': [u'md5', u'b9c3898afa4161845f03001e895cce22'], u'filename': u'poppler-0.5.4-19.el5_9.2.i386.rpm', u'epoch': u'0', u'version': u'0.5.4', u'release': u'19.el5_9.2', u'arch': u'i386'}, {u'src': None, u'name': u'poppler', u'sum': [u'md5', u'99ca4c1b72298226f377b5b0ebd8bb27'], u'filename': u'poppler-0.5.4-19.el5_9.2.src.rpm', u'epoch': u'0', u'version': u'0.5.4', u'release': u'19.el5_9.2', u'arch': u'src'}, {u'src': None, u'name': u'poppler', u'sum': [u'md5', u'381826bdc3fff88cc81a163b85782d43'], u'filename': u'poppler-0.5.4-19.el5_9.2.x86_64.rpm', u'epoch': u'0', u'version': u'0.5.4', u'release': u'19.el5_9.2', u'arch': u'x86_64'}, {u'src': None, u'name': u'poppler-devel', u'sum': [u'md5', u'7c4e157cf427516f888711fc6c430112'], u'filename': u'poppler-devel-0.5.4-19.el5_9.2.i386.rpm', u'epoch': u'0', u'version': u'0.5.4', u'release': u'19.el5_9.2', u'arch': u'i386'}, {u'src': None, u'name': u'poppler-devel', u'sum': [u'md5', u'2dac27093669bf8e51120c3f74ff7651'], u'filename': u'poppler-devel-0.5.4-19.el5_9.2.x86_64.rpm', u'epoch': u'0', u'version': u'0.5.4', u'release': u'19.el5_9.2', u'arch': u'x86_64'}, {u'src': None, u'name': u'poppler-utils', u'sum': [u'md5', u'7d2ce58f00585421817b788b73b8c0d5'], u'filename': u'poppler-utils-0.5.4-19.el5_9.2.x86_64.rpm', u'epoch': u'0', u'version': u'0.5.4', u'release': u'19.el5_9.2', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u'[2.0.115-109.4]\n- fencing: Solve regression with Dell DRAC 5/CMC due to invalid EOL\n Resolves: rhbz#986981', u'issued': u'2013-08-05', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELBA-2013-1131.html', u'type': u'self', u'id': None, u'title': u'ELBA-2013-1131'}], u'_content_type_id': u'erratum', u'_id': u'14797e7b-a833-4ea8-af62-79a2dbde5597', u'from': u'el-errata@oss.oracle.com', u'severity': u'', u'title': u'cman bug fix update', u'_ns': u'units_erratum', u'rights': u'Copyright 2013 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 5', u'reboot_suggested': False, u'type': u'bugfix', u'pkglist': [{u'packages': [{u'src': None, u'name': u'cman', u'sum': [u'md5', u'4a9e5550e064263e108ac39fb5c9b1fa'], u'filename': u'cman-2.0.115-109.el5_9.4.src.rpm', u'epoch': u'0', u'version': u'2.0.115', u'release': u'109.el5_9.4', u'arch': u'src'}, {u'src': None, u'name': u'cman', u'sum': [u'md5', u'cedb81ea7005b7237d2b470d444afe57'], u'filename': u'cman-2.0.115-109.el5_9.4.x86_64.rpm', u'epoch': u'0', u'version': u'2.0.115', u'release': u'109.el5_9.4', u'arch': u'x86_64'}, {u'src': None, u'name': u'cman-devel', u'sum': [u'md5', u'31d01d9000c676cf13d291e5ffa9936b'], u'filename': u'cman-devel-2.0.115-109.el5_9.4.i386.rpm', u'epoch': u'0', u'version': u'2.0.115', u'release': u'109.el5_9.4', u'arch': u'i386'}, {u'src': None, u'name': u'cman-devel', u'sum': [u'md5', u'9ec588b1622968ff44e9d64853da76de'], u'filename': u'cman-devel-2.0.115-109.el5_9.4.x86_64.rpm', u'epoch': u'0', u'version': u'2.0.115', u'release': u'109.el5_9.4', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u'[2.1.8-1]\n - Implement support for blocksize module parameter\n[2.1.7-1]\n - renamedisk should fail if label exceeds 24 char\n[2.1.6-1]\n - report error when deleting unknown\n - signal error if label size exceeds 24\n - report device name during querydisk', u'issued': u'2013-02-14', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELBA-2013-2505.html', u'type': u'self', u'id': None, u'title': u'ELBA-2013-2505'}], u'_content_type_id': u'erratum', u'_id': u'10df3755-3d35-42f6-85b1-86f1dc81d368', u'from': u'el-errata@oss.oracle.com', u'severity': u'', u'title': u' oracleasm-support bug fix update', u'_ns': u'units_erratum', u'rights': u'Copyright 2013 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 6', u'reboot_suggested': False, u'type': u'bugfix', u'pkglist': [{u'packages': [{u'src': None, u'name': u'oracleasm-support', u'sum': [u'md5', u'0867bd363f3da19fe47d8ed824314cb7'], u'filename': u'oracleasm-support-2.1.8-1.el6.src.rpm', u'epoch': u'0', u'version': u'2.1.8', u'release': u'1.el6', u'arch': u'src'}, {u'src': None, u'name': u'oracleasm-support', u'sum': [u'md5', u'ab53fd0ab89ea787db69cead2425d846'], u'filename': u'oracleasm-support-2.1.8-1.el6.x86_64.rpm', u'epoch': u'0', u'version': u'2.1.8', u'release': u'1.el6', u'arch': u'x86_64'}], u'name': u'ol6_x86_64_latest', u'short': u'ol6_x86_64_latest'}, {u'packages': [{u'src': None, u'name': u'oracleasm-support', u'sum': [u'md5', u'e40b951b4ce4edf53db4dd5c3649dcd8'], u'filename': u'oracleasm-support-2.1.8-1.el5.src.rpm', u'epoch': u'0', u'version': u'2.1.8', u'release': u'1.el5', u'arch': u'src'}, {u'src': None, u'name': u'oracleasm-support', u'sum': [u'md5', u'a959a99834ccaed18dc7f64e3f099a66'], u'filename': u'oracleasm-support-2.1.8-1.el5.x86_64.rpm', u'epoch': u'0', u'version': u'2.1.8', u'release': u'1.el5', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u'[1.8.0-11.el5]\n - support sys block symlinks.patch\n - add support for xvd devices.patch', u'issued': u'2013-04-17', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELBA-2013-2515.html', u'type': u'self', u'id': None, u'title': u'ELBA-2013-2515'}], u'_content_type_id': u'erratum', u'_id': u'bb08b8be-3695-447e-ab43-6121a9b26f76', u'from': u'el-errata@oss.oracle.com', u'severity': u'', u'title': u' ocfs2-tools bug fix update', u'_ns': u'units_erratum', u'rights': u'Copyright 2013 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 5', u'reboot_suggested': False, u'type': u'bugfix', u'pkglist': [{u'packages': [{u'src': None, u'name': u'ocfs2-tools', u'sum': [u'md5', u'25d165b6317a891f05d2dfcf8f3573b9'], u'filename': u'ocfs2-tools-1.8.0-11.el5.src.rpm', u'epoch': u'0', u'version': u'1.8.0', u'release': u'11.el5', u'arch': u'src'}, {u'src': None, u'name': u'ocfs2-tools', u'sum': [u'md5', u'0f38d5532424a2df8a1945311700590e'], u'filename': u'ocfs2-tools-1.8.0-11.el5.x86_64.rpm', u'epoch': u'0', u'version': u'1.8.0', u'release': u'11.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'ocfs2-tools-devel', u'sum': [u'md5', u'f4b58ae33e2948e00185572ca67eafc4'], u'filename': u'ocfs2-tools-devel-1.8.0-11.el5.x86_64.rpm', u'epoch': u'0', u'version': u'1.8.0', u'release': u'11.el5', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u"[2.6.32-400.26.1]\n- Merge tag 'v2.6.32-400.24.1#bug16558021.v11' (Jerry Snitselaar)\n- Revert 'xen: resetup vcpu placement for each vcpu at restore stage for hvm' (Jerry Snitselaar)\n- Add missing sysdev_suspend() and sysdev_resume() calls (Zhenzhong Duan)\n\n[2.6.32-400.25.1]\n- SPEC: v2.6.32-400.25.1 (Jerry Snitselaar)\n- xen: resetup vcpu placement for each vcpu at restore stage for hvm (Zhenzhong Duan) [Orabug: 16558021]\n- tmpfs: fix use-after-free of mempolicy object (Greg Thelen) [Orabug: 16516286] {CVE-2013-1767}\n\n[2.6.32-400.24.1]\n- UBUNTU: SAUCE: sched: Prevent divide by zero when cpu_power is 0 (Andrew\nDickinson) [Orabug: 16483310]\n- Revert 'sched: Work around sched_group::cpu_power = 0' (Todd Vierling)\n- cipso: dont follow a NULL pointer when setsockopt() is called (Paul Moore)\n[Orabug: 16387012] {CVE-2013-0310}\n- mm: thp: fix pmd_present for split_huge_page and PROT_NONE with THP (Andrea\nArcangeli) [Orabug: 16386911] {CVE-2013-0309}\n- ext4: race-condition protection for ext4_convert_unwritten_extents_endio\n(Chuck Anderson) [Orabug: 16386674] {CVE-2012-4508}\n- NLS: improve UTF8 -> UTF16 string conversion routine (Alan Stern) [Orabug:\n16425581] {CVE-2013-1773}\n- fat: Fix stat->f_namelen (Kevin Dankwardt) [Orabug: 16425581] {CVE-2013-1773}\n- [SCSI] hpsa: Use LUN reset instead of target reset (Stephen M. Cameron)\n[Orabug: 16483895]\n- [SCSI] hpsa: retry driver initiated commands on busy status (Matt Bondurant)\n[Orabug: 16483895]\n- [SCSI] hpsa: disable doorbell reset on reset_devices (Stephen M. Cameron)\n[Orabug: 16483895]\n- [SCSI] dm mpath: propagate target errors immediately (John Sobecki) [Orabug:\n14693090]\n- [SCSI] Add detailed SCSI I/O error (John Sobecki) [Orabug: 14693090]\n- dm mpath: add retain_attached_hw_handler feature (Mike Snitzer) [Orabug:\n16458686]\n- [SCSI] scsi_dh: add scsi_dh_attached_handler_name (Mike Snitzer) [Orabug:\n16458686]\n- sunrpc: assign the correct value to nwords in xdr_init_decode() (Guangyu Sun)\n[Orabug: 16457813]\n- x86/msr: Add capabilities check (Alan Cox) [Orabug: 16481233] {CVE-2013-0268}\n\n[2.6.32-400.23.1]\n- kabi: enable kabi (Guru Anbalagane)\n- pci: hotplug: fix null dereference in pci_set_payload() (Yuval Shaia)\n[Orabug: 15835542]\n- Revert 'PCI: Set PCI-E Max Payload Size on fabric' (Guru Anbalagane)\n- Revert 'Fix pointer dereference before call to pcie_bus_configure_settings'\n(Guru Anbalagane)\n- kabifix: cgroup: implement eventfd-based generic API for notifications (Maxim\nUvarov)\n\n[2.6.32-400.22.1]\n- NFSv4: Fix buffer overflow checking in __nfs4_get_acl_uncached (Trond\nMyklebust) [Orabug: 16021274]\n- NFSv4: Fix the acl cache size calculation (Trond Myklebust) [Orabug:\n16021274]\n- NFSv4: Fix range checking in __nfs4_get_acl_uncached and __nfs4_proc_set_acl\n(Trond Myklebust) [Orabug: 16021274]\n- NFS: nfs_getaclargs.acl_len is a size_t (Chuck Lever) [Orabug: 16021274]\n- NFSv4: Dont use private xdr_stream fields in decode_getacl (Trond Myklebust)\n[Orabug: 16021274]\n- NFSv4: Fix pointer arithmetic in decode_getacl (Trond Myklebust) [Orabug:\n16021274]\n- NFSv4: Simplify the GETATTR attribute length calculation (Trond Myklebust)\n[Orabug: 16021274]\n- SUNRPC: Add the helper xdr_stream_pos (Trond Myklebust) [Orabug: 16021274]\n- SUNRPC: Dont decode beyond the end of the RPC reply message (Guangyu Sun)\n[Orabug: 16021274]\n- SUNRPC: add sanity checking of 'p' inside xdr_init_decode (Guangyu Sun)\n[Orabug: 16021274]\n- Avoid beyond bounds copy while caching ACL (Sachin Prabhu) [Orabug:16021274]\n{CVE-2012-2375}\n- Avoid reading past buffer when calling GETACL (Sachin Prabhu) [Orabug:\n16021274] {CVE-2012-2375}\n- Fix length of buffer copied in __nfs4_get_acl_uncached (Sachin Prabhu)\n[Orabug: 16021274] {CVE-2012-2375}\n- NFSv4: include bitmap in nfsv4 get acl data (Andy Adamson) [Orabug: 16021274]\n{CVE-2011-4131}\n- ocfs2: unlock super lock if lockres refresh failed (Junxiao Bi) [Orabug:\n16356893]\n- [SCSI] Shorten the path length of scsi_cmd_to_driver() (Li Zhong) [Orabug:\n16391082]\n- [SCSI] Fix NULL dereferences in scsi_cmd_to_driver (Mark Rustad) [Orabug:\n16391082]\n\n[2.6.32-400.21.1]\n- This is a fix on dlm_clean_master_list() (Xiaowei.Hu) [Orabug: 12798517]\n- Remove incorrect do_vfs_lock message (Fabio Olive Leite) [Orabug: 14027893]\n- x86/xen: dont assume %ds is usable in xen_iret for 32-bit PVOPS. (Chuck\nAnderson) {CVE-2013-0228 XSA-42 CVE-2013-0190}\n- NFSv4.1: Fix the slotid initialisation in nfs_async_rename() (Trond\nMyklebust) [Orabug: 16023392]\n- NFS: Fix a use-after-free case in nfs_async_rename() (Trond Myklebust)\n[Orabug: 16023392]\n- nfs: make sillyrename an async operation (Jeff Layton) [Orabug: 16023392]\n- nfs: nfs4_sequence_done() return int. (Joe Jin) [Orabug: 16023392]\n- nfs: add nfs_restart_rpc() helper (Joe Jin) [Orabug: 16023392]\n- SUNRPC: The function rpc_restart_call() should return success/failure (Trond\nMyklebust) [Orabug: 16023392]\n- nfs: move nfs_sillyrename to unlink.c (Jeff Layton) [Orabug: 16023392]\n- nfs: standardize the rename response container (Jeff Layton) [Orabug:\n16023392]\n- nfs: standardize the rename args container (Jeff Layton) [Orabug: 16023392]\n- NFS: Reduce stack footprint of nfs3_proc_rename() and nfs4_proc_rename()\n(Trond Myklebust) [Orabug: 16023392]\n- NFS: Add helper functions for allocating filehandles and fattr structs (Trond\nMyklebust) [Orabug: 16023392]\n- nfs: handle NFSv2 -EKEYEXPIRED returns from RPC layer appropriately (Jeff\nLayton) [Orabug: 16023392]\n- nfs: handle NFSv3 -EKEYEXPIRED errors as we would -EJUKEBOX (Jeff Layton)\n[Orabug: 16023392]\n- nfs4: handle -EKEYEXPIRED errors from RPC layer (Jeff Layton) [Orabug:\n16023392]\n- nfs: change nfs4_do_setlk params to identify recovery type (Alexandros\nBatsakis) [Orabug: 16023392]\n\n[2.6.32-400.20.1]\n- sched: Work around sched_group::cpu_power = 0 (Ben Hutchings) [Orabug:\n15910222]\n\n[2.6.32-400.19.1]\n- sched: fix divide by zero at {thread_group,task}_times (Zhenzhong Duan)\n[Orabug:15956690]\n- [virt] xen-netfront: fix MTU reset after migration (Todd Vierling) [Orabug:\n16299827]\n- block: Fix queue_flag update when rq_affinity goes from 2 to 1 (Eric\nSeppanen) [Orabug: 14608013]\n- block: strict rq_affinity (Dan Williams) [Orabug: 14608013]\n- Revert 'block: improve queue_should_plug() by looking at IO depths' (Jens\nAxboe) [Orabug: 14608013]\n\n[2.6.32-400.18.1]\n- exec: do not leave bprm->interp on stack (Kees Cook) [Orabug: 16286741]\n{CVE-2012-4530}\n- exec: use -ELOOP for max recursion depth (Kees Cook) [Orabug: 16286741]\n{CVE-2012-4530}\n- Xen: Fix stack corruption in xen_failsafe_callback for 32bit PVOPS guests.\n(Frediano Ziglio) [Orabug: 16274192] {CVE-2013-0190}\n\n[2.6.32-400.17.1]\n- nfs: skip commit in releasepage if were freeing memory for fs-related\nreasons (Jeff Layton) [Orabug: 16173012]\n\n[2.6.32-400.16.1]\n- send arp of all interface of net_device when change active bond slave (Zheng\nLi) [Orabug: 14647060]\n\n[2.6.32-400.15.1]\n- Fix pointer dereference before call to pcie_bus_configure_settings (Shyam\nIyer) [Orabug: 15835542]\n- PCI: Set PCI-E Max Payload Size on fabric (Jon Mason) [Orabug:15835542]\n\n[2.6.32-400.14.1]\n- Merge tag 'v2.6.32-400.11.1#bug14663878' of git://ca-git.us.oracle.com/linux-\nmuvarov-public into uek2.6.32-400 (Maxim Uvarov)\n- tcp: fix tcp_trim_head() (Eric Dumazet) [Orabug: 14810423]\n- CVE-2012-4444: ipv6: discard overlapping fragment (Luis Henriques) [Orabug:\n16021354] {CVE-2012-4444}\n- CVE-2012-4565: Divide by zero in TCP congestion control Algorithm. (Jesper\nDangaard Brouer) [Orabug: 16020447]\n- CVE-2012-2100: ext4: fix undefined behavior in ext4_fill_flex_info() (Xi\nWang) [Orabug: 16020245] {CVE-2009-4307}\n- cgroup: introduce coalesce css_get() and css_put() (Daisuke Nishimura)\n- memcg: fix ugly initialization of return value is in caller (KAMEZAWA\nHiroyuki)\n- memcg: res_counter_read_u64(): fix potential races on 32-bit machines\n(KAMEZAWA Hiroyuki)\n- cgroup: implement eventfd-based generic API for notifications (Maxim Uvarov)\n- memcg: implement memory thresholds (Kirill A. Shutemov)\n- memcg: rework usage of stats by soft limit (Kirill A. Shutemov)\n- memcg: extract mem_group_usage() from mem_cgroup_read() (Kirill A. Shutemov)\n- memcg: add accessor to mem_cgroup.css (Wu Fengguang)\n- memcg: move charge of file pages (Daisuke Nishimura)\n- memcg: clean up move charge (Daisuke Nishimura)\n- memcg: move charges of anonymous swap (Daisuke Nishimura)\n- memcg: improve performance in moving charge (Daisuke Nishimura)\n- tree-wide: fix typos 'aquire' -> 'acquire', 'cumsumed' -> 'consumed' (Uwe\nKleine-Konig)\n- mm/memcontrol.c: fix 'integer as NULL pointer' sparse warning (Thiago Farina)\n- memcg: code clean, remove unused variable in mem_cgroup_resize_limit() (Bob\nLiu)\n- memcg: remove memcg_tasklist (Daisuke Nishimura)\n- memcg: cleanup mem_cgroup_move_parent() (Daisuke Nishimura)\n- memcg: add mem_cgroup_cancel_charge() (Daisuke Nishimura)\n- memcg: move charges of anonymous page (Daisuke Nishimura)\n\n[2.6.32-400.13.1]\n- Add set_atomicity_lock back (Zhenzhong Duan) [Orabug: 14673655]\n- mm/mempolicy.c: refix mbind_range() vma issue (KOSAKI Motohiro) [Orabug:\n14149364 14778393]\n\n[2.6.32-400.12.1]\n- xen:pvhvm: enable PVHVM VCPU placement when using more than 32 CPUs.\n(Zhenzhong Duan) [Orabug:12913287]\n- kernel posttrans remove all crashkernel=* (Jason Luan)\n- Revert 'ocfs2: Push out dropping of dentry lock to ocfs2_wq' (Maxim Uvarov)\n[Orabug: 14800825]\n- Revert 'ocfs2: Fix deadlock on umount' (Maxim Uvarov) [Orabug: 14800825]\n- Revert 'ocfs2: Dont oops in ocfs2_kill_sb on a failed mount' (Maxim Uvarov)\n[Orabug: 14800825]\n- workaround for eflag.ac set issue in pvm (Zhenzhong Duan) [Orabug: 13790201]\n- Fixed Regression in NFS Direct I/O path (Steve Dickson) [Orabug: 15909922]\n\n[2.6.32-400.11.1]\n- NFS: Ensure that the WRITE and COMMIT RPC calls are always uninterruptible\n(Trond Myklebust) [Orabug: 15898130]\n- Merge tag 'v2.6.32-400.4.1#bug12591862.v4' of git://ca-git.us.oracle.com\n/linux-zduan-public into uek2.6.32-400 (Maxim Uvarov)\n- Merge tag 'v2.6.32-400.8.1.bug15838867#build' of git://ca-git.us.oracle.com\n/linux-tvierlin-public into uek2.6.32-400 (Maxim Uvarov)\n- NFSv4: Add support for the RELEASE_LOCKOWNER operation (Trond Myklebust)\n[Orabug: 14781917]\n- NFSv4: Clean up for lockowner XDR encoding (Trond Myklebust) [Orabug:\n14781917]\n- NFSv4: Ensure that we track the NFSv4 lock state in read/write requests.\n(Trond Myklebust) [Orabug: 14781917]\n- xen: Do not enable PV IPIs when vector callback not present (Stefano\nStabellini) [Orabug:12591862]\n- Parallel mtrr init between cpus (Zhenzhong Duan)\n- xen: disable PV spinlocks on HVM (Stefano Stabellini)\n- __setup_vector_irq: handle NULL chip_data (Zhenzhong Duan) [Orabug: 12591862]\n\n[2.6.32-400.10.1]\n- block: move bd_set_size() above rescan_partitions() in __blkdev_get() (Tejun\nHeo) [Orabug: 14191474]\n- Merge tag 'v2.6.32-400.1.1.bug14712382#oprofile' of git://ca-\ngit.us.oracle.com/linux-jubi-public into uek2.6.32-400 (Maxim Uvarov)\n- highmem: dont init for early reserved regions (Zhenzhong Duan) [Orabug:\n13587835]\n- mm: fix assertion mapping->nrpages == 0 in end_writeback() (Jan Kara)\n[Orabug: 14480363]\n- CVE-2012-3400: udf: Avoid run away loop when partition table length is\ncorrupted (Chuck Anderson) [Orabug: 15843730] {CVE-2012-3400}\n- CVE-2012-3400: udf: Fortify loading of sparing table (Chuck Anderson)\n[Orabug: 15843730] {CVE-2012-3400}\n- CVE-2012-3511: mm: Hold a file reference in madvise_remove (Chuck Anderson)\n[Orabug: 15842884] {CVE-2012-2133}\n- CVE-2012-2133: hugepages: fix use after free bug in 'quota' handling (Chuck\nAnderson) [Orabug: 15842385] {CVE-2012-2133}\n- oprofile: Fix locking dependency in sync_start() (Robert Richter) [Orabug:\n14712382]\n\n[2.6.32-400.9.1]\n- [net/sfc] limit number of segments per skb on tx (Maxim Uvarov) [Orabug:\n14769994] {CVE-2012-3412}\n- CVE-2012-3430: rds: set correct msg_namelen (Chuck Anderson) [Orabug:\n14676504]\n- CVE-2012-2390: hugetlb: fix resv_map leak in error path (Chuck Anderson)\n[Orabug: 14676403]\n- CVE-2012-2313: dl2k: Clean up rio_ioctl (Chuck Anderson) [Orabug: 14675306]\n- oracleasm: Bring driver in sync with UEK2 (Martin K. Petersen)\n- Fix system hang due to bad protection module parameters (CR 130769) (Martin\nK. Petersen)\n- sd: Avoid remapping bad reference tags (Martin K. Petersen)\n- block: Fix bad range check in bio_sector_offset (Martin K. Petersen)\n- mpt2sas: Update mpt2sas to 120.105.11.00 (Guru Anbalagane) [Orabug: 14376481]\n- Revert 'mpt2sas: update to 12.105.11.00' (Maxim Uvarov)\n- mpt2sas: update to 12.105.11.00 (Maxim Uvarov) [Orabug: 14233879]\n- memcg: make memcgs file mapped consistent with global VM (KAMEZAWA Hiroyuki)\n- memcg: add interface to move charge at task migration (Daisuke Nishimura)\n- cgroup: introduce cancel_attach() (Daisuke Nishimura)\n- CVE-2012-3412 sfc: Fix maximum number of TSO segments and minimum TX queue\nsize (Chuck Anderson) [Orabug: 14769994] {CVE-2012-3412}\n- sfc: Replace some literal constants with EFX_PAGE_SIZE/EFX_BUF_SIZE (Chuck\nAnderson) [Orabug: 14769994]\n- x86/paravirt: PTE updates in k(un)map_atomic need to be synchronous,\nregardless of lazy_mmu mode (Konrad Rzeszutek Wilk) [Orabug: 14544492]\n- allow user to disable stack randomization (John Sobecki) [Orabug: 13727593]\n\n[2.6.32-400.8.1]\n- Current code serial mtrr init with set_atomicity_lock (Zhenzhong Duan)\n[Orabug: 12591862]\n- oprofile: use KM_NMI slot for kmap_atomic (Junxiao Bi) [Orabug: 10369933]\n- oprofile, x86: Fix nmi-unsafe callgraph support (Robert Richter) [Orabug:\n- oprofile, x86: Fix nmi-unsafe callgraph support (Robert Richter) [Orabug:\n10369933]\n- export __get_user_pages_fast() function (Xiao Guangrong) [Orabug: 10369933]\n\n[2.6.32-400.7.1]\n- xen/smp: Fix bringup bug in AP code. (Konrad Rzeszutek Wilk)\n- xen/smp: Fix CPU online/offline bug triggering a BUG: scheduling while\natomic. (Konrad Rzeszutek Wilk)\n- xen: disable PV spinlocks on HVM (Stefano Stabellini)\n- xen: Do not enable PV IPIs when vector callback not present (Stefano\nStabellini)\n\n[2.6.32-400.6.1]\n- 2.6.32.x: hrtimer: Update hrtimer base offsets each hrtimer_interrupt (John\nStultz)\n- Fix leapsecond triggered hrtimer/futex load spike issue (John Stultz)\n- Fix clock_was_set so it is safe to call from atomic (John Stultz)\n- futex: Fix uninterruptible loop due to gate_area (Hugh Dickins)\n- thp: update futex compound knowledge (Joe Jin)\n- epoll: epoll_wait() should not use timespec_add_ns() (Eric Dumazet)\n- epoll: clear the tfile_check_list on -ELOOP (Joe Jin) {CVE-2012-3375}\n- Dont limit non-nested epoll paths (Jason Baron)\n- Subject: [PATCH 1/4] epoll: kabi fixups for epoll limit wakeup paths (Joe\nJin)\n- epoll: limit paths (Jason Baron) {CVE-2011-1083}\n- eventpoll: fix comment typo 'evenpoll' (Paul Bolle)\n- epoll: fix compiler warning and optimize the non-blocking path (Shawn Bohrer)\n- epoll: move ready event check into proper inline (Davide Libenzi)\n- epoll: make epoll_wait() use the hrtimer range feature (Shawn Bohrer)\n- select: rename estimate_accuracy() to select_estimate_accuracy() (Andrew\nMorton)\n- [libata] Add ' 2GB ATA Flash Disk'/'ADMA428M' to DMA blacklist (Prarit\nBhargava)\n- ext4: Fix overflow caused by missing cast in ext4_fallocate() (Utako Kusaka)\n- NFS: Map minor mismatch error to protocol not support error. (Steve Dickson)\n- NFSv4: Map NFS4ERR_SHARE_DENIED into an EACCES error instead of EIO (Trond\nMyklebust)\n- NFSv4: Propagate the error NFS4ERR_BADOWNER to nfs4_do_setattr (Trond\nMyklebust)\n- cred: copy_process() should clear child->replacement_session_keyring (Oleg\nNesterov) {CVE-2012-2745}\n- [megaraid] fix sysfs_max_sectors_read (Maxim Uvarov) [Orabug: 14263088]\n- [SCSI] libfc: fcoe_transport_create fails in single-CPU environment (Steven\nClark) [Orabug: 14239242]\n- [SCSI] vmw_pvscsi: Try setting host->max_id as suggested by the device.\n(Arvind Kumar)\n\n[2.6.32-400.5.1]\n- Ingore the condition of irq_cfg == NULL when add new vcpu at PV-HVM DomU\n(Jason Luan) [Orabug: 13898210]\n\n[2.6.32-400.4.1]\n- xen: PV on HVM: support PV spinlocks and IPIs (Zhenzhong Duan) [Orabug: 12591862]\n\n[2.6.32-400.3.1]\n- export devinet_ioctl (Maxim Uvarov) [Orabug: 14306942]\n- export arp_ioctl (Maxim Uvarov) [Orabug: 14371581]\n\n[2.6.32-400.2.1]\n- audit: acquire creds selectively to reduce atomic op overhead (Tony Jones)\n\n[2.6.32-400.1.1]\n- mpt2sas: Update mpt2sas to 120.105.11.00 (Guru Anbalagane)\n- block/scsi: Allow request and error handling timeouts to be specified (Martin\nK. Petersen)\n- SCSI: Fix error handling when no ULD is attached (Martin K. Petersen)\n- [SCSI] Handle disk devices which can not process medium access commands\n(Martin K. Petersen)\n- [SCSI] Add missing scsi command definitions (Martin K. Petersen)\n", u'issued': u'2013-04-17', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELBA-2013-2516.html', u'type': u'self', u'id': None, u'title': u'ELBA-2013-2516'}], u'_content_type_id': u'erratum', u'_id': u'27678f0c-6b99-4af1-80c9-8b3b539824b6', u'from': u'el-errata@oss.oracle.com', u'severity': u'', u'title': u'Unbreakable Enterprise kernel bug fix update', u'_ns': u'units_erratum', u'rights': u'Copyright 2013 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 6', u'reboot_suggested': False, u'type': u'bugfix', u'pkglist': [{u'packages': [{u'src': None, u'name': u'kernel-uek', u'sum': [u'md5', u'46b338589a2bee4c0c5af3e05e7ff72a'], u'filename': u'kernel-uek-2.6.32-400.26.1.el6uek.src.rpm', u'epoch': u'0', u'version': u'2.6.32', u'release': u'400.26.1.el6uek', u'arch': u'src'}, {u'src': None, u'name': u'kernel-uek', u'sum': [u'md5', u'5a3265cc979b3a5a030288c2092e41e3'], u'filename': u'kernel-uek-2.6.32-400.26.1.el6uek.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.32', u'release': u'400.26.1.el6uek', u'arch': u'x86_64'}, {u'src': None, u'name': u'kernel-uek-debug', u'sum': [u'md5', u'ab720269c437528d2cd6f696126aaf1a'], u'filename': u'kernel-uek-debug-2.6.32-400.26.1.el6uek.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.32', u'release': u'400.26.1.el6uek', u'arch': u'x86_64'}, {u'src': None, u'name': u'kernel-uek-debug-devel', u'sum': [u'md5', u'3f530ddc4f590aaf340cec4cb308730e'], u'filename': u'kernel-uek-debug-devel-2.6.32-400.26.1.el6uek.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.32', u'release': u'400.26.1.el6uek', u'arch': u'x86_64'}, {u'src': None, u'name': u'kernel-uek-devel', u'sum': [u'md5', u'693b16aa22ecb5d5e6927c7b64281ffa'], u'filename': u'kernel-uek-devel-2.6.32-400.26.1.el6uek.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.32', u'release': u'400.26.1.el6uek', u'arch': u'x86_64'}, {u'src': None, u'name': u'kernel-uek-doc', u'sum': [u'md5', u'6837a433f5392fe3ba8a53bc9ca0e821'], u'filename': u'kernel-uek-doc-2.6.32-400.26.1.el6uek.noarch.rpm', u'epoch': u'0', u'version': u'2.6.32', u'release': u'400.26.1.el6uek', u'arch': u'noarch'}, {u'src': None, u'name': u'kernel-uek-firmware', u'sum': [u'md5', u'14e03066917c925baaee0d3a38d447ca'], u'filename': u'kernel-uek-firmware-2.6.32-400.26.1.el6uek.noarch.rpm', u'epoch': u'0', u'version': u'2.6.32', u'release': u'400.26.1.el6uek', u'arch': u'noarch'}, {u'src': None, u'name': u'kernel-uek-headers', u'sum': [u'md5', u'60b31d51424fb7ddce2465aff950ed3c'], u'filename': u'kernel-uek-headers-2.6.32-400.26.1.el6uek.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.32', u'release': u'400.26.1.el6uek', u'arch': u'x86_64'}, {u'src': None, u'name': u'mlnx_en-2.6.32-400.26.1.el6uek', u'sum': [u'md5', u'35db9bab40e157f169ea8717d9b3aae1'], u'filename': u'mlnx_en-2.6.32-400.26.1.el6uek-1.5.7-0.1.src.rpm', u'epoch': u'0', u'version': u'1.5.7', u'release': u'0.1', u'arch': u'src'}, {u'src': None, u'name': u'mlnx_en-2.6.32-400.26.1.el6uek', u'sum': [u'md5', u'cf994e6cf76b7ab4a101a0ab8d01f52a'], u'filename': u'mlnx_en-2.6.32-400.26.1.el6uek-1.5.7-0.1.x86_64.rpm', u'epoch': u'0', u'version': u'1.5.7', u'release': u'0.1', u'arch': u'x86_64'}, {u'src': None, u'name': u'mlnx_en-2.6.32-400.26.1.el6uekdebug', u'sum': [u'md5', u'043ac3bf676d840ceeb471804890dbcc'], u'filename': u'mlnx_en-2.6.32-400.26.1.el6uekdebug-1.5.7-0.1.x86_64.rpm', u'epoch': u'0', u'version': u'1.5.7', u'release': u'0.1', u'arch': u'x86_64'}, {u'src': None, u'name': u'ofa-2.6.32-400.26.1.el6uek', u'sum': [u'md5', u'1e849e9ef878e27ffd7b17dcbdb56d1e'], u'filename': u'ofa-2.6.32-400.26.1.el6uek-1.5.1-4.0.58.src.rpm', u'epoch': u'0', u'version': u'1.5.1', u'release': u'4.0.58', u'arch': u'src'}, {u'src': None, u'name': u'ofa-2.6.32-400.26.1.el6uek', u'sum': [u'md5', u'03faab21a88341b50cf453df1862f3be'], u'filename': u'ofa-2.6.32-400.26.1.el6uek-1.5.1-4.0.58.x86_64.rpm', u'epoch': u'0', u'version': u'1.5.1', u'release': u'4.0.58', u'arch': u'x86_64'}, {u'src': None, u'name': u'ofa-2.6.32-400.26.1.el6uekdebug', u'sum': [u'md5', u'108608c0ff97c8d66b6cfad7e5d3a1fa'], u'filename': u'ofa-2.6.32-400.26.1.el6uekdebug-1.5.1-4.0.58.x86_64.rpm', u'epoch': u'0', u'version': u'1.5.1', u'release': u'4.0.58', u'arch': u'x86_64'}], u'name': u'ol6_x86_64_latest', u'short': u'ol6_x86_64_latest'}, {u'packages': [{u'src': None, u'name': u'kernel-uek', u'sum': [u'md5', u'4e8f72e36ad570f847633ee3aa239a02'], u'filename': u'kernel-uek-2.6.32-400.26.1.el5uek.src.rpm', u'epoch': u'0', u'version': u'2.6.32', u'release': u'400.26.1.el5uek', u'arch': u'src'}, {u'src': None, u'name': u'kernel-uek', u'sum': [u'md5', u'92d5ddd797689d76995a05a7e048d265'], u'filename': u'kernel-uek-2.6.32-400.26.1.el5uek.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.32', u'release': u'400.26.1.el5uek', u'arch': u'x86_64'}, {u'src': None, u'name': u'kernel-uek-debug', u'sum': [u'md5', u'a18c2bc923b669f4ace9f061bb9b871e'], u'filename': u'kernel-uek-debug-2.6.32-400.26.1.el5uek.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.32', u'release': u'400.26.1.el5uek', u'arch': u'x86_64'}, {u'src': None, u'name': u'kernel-uek-debug-devel', u'sum': [u'md5', u'6234d1855600de59698608512e069bd4'], u'filename': u'kernel-uek-debug-devel-2.6.32-400.26.1.el5uek.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.32', u'release': u'400.26.1.el5uek', u'arch': u'x86_64'}, {u'src': None, u'name': u'kernel-uek-devel', u'sum': [u'md5', u'b4e81daaad30b48fbaa575cc3064b08d'], u'filename': u'kernel-uek-devel-2.6.32-400.26.1.el5uek.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.32', u'release': u'400.26.1.el5uek', u'arch': u'x86_64'}, {u'src': None, u'name': u'kernel-uek-doc', u'sum': [u'md5', u'9e1c04925d7ae100f6d9b7d685133de5'], u'filename': u'kernel-uek-doc-2.6.32-400.26.1.el5uek.noarch.rpm', u'epoch': u'0', u'version': u'2.6.32', u'release': u'400.26.1.el5uek', u'arch': u'noarch'}, {u'src': None, u'name': u'kernel-uek-firmware', u'sum': [u'md5', u'd644a37ebeddcf4f337895c54034f6a3'], u'filename': u'kernel-uek-firmware-2.6.32-400.26.1.el5uek.noarch.rpm', u'epoch': u'0', u'version': u'2.6.32', u'release': u'400.26.1.el5uek', u'arch': u'noarch'}, {u'src': None, u'name': u'mlnx_en-2.6.32-400.26.1.el5uek', u'sum': [u'md5', u'b22f7567d9e4eebe42535fc383ac2c4c'], u'filename': u'mlnx_en-2.6.32-400.26.1.el5uek-1.5.7-2.src.rpm', u'epoch': u'0', u'version': u'1.5.7', u'release': u'2', u'arch': u'src'}, {u'src': None, u'name': u'mlnx_en-2.6.32-400.26.1.el5uek', u'sum': [u'md5', u'71f0f582ce6ff773db33aed16910b8f9'], u'filename': u'mlnx_en-2.6.32-400.26.1.el5uek-1.5.7-2.x86_64.rpm', u'epoch': u'0', u'version': u'1.5.7', u'release': u'2', u'arch': u'x86_64'}, {u'src': None, u'name': u'mlnx_en-2.6.32-400.26.1.el5uekdebug', u'sum': [u'md5', u'e3e78d39492492578fd3fed0679ad2bd'], u'filename': u'mlnx_en-2.6.32-400.26.1.el5uekdebug-1.5.7-2.x86_64.rpm', u'epoch': u'0', u'version': u'1.5.7', u'release': u'2', u'arch': u'x86_64'}, {u'src': None, u'name': u'ofa-2.6.32-400.26.1.el5uek', u'sum': [u'md5', u'39f7ae83b7508a46bf1df5f04526e2cb'], u'filename': u'ofa-2.6.32-400.26.1.el5uek-1.5.1-4.0.58.src.rpm', u'epoch': u'0', u'version': u'1.5.1', u'release': u'4.0.58', u'arch': u'src'}, {u'src': None, u'name': u'ofa-2.6.32-400.26.1.el5uek', u'sum': [u'md5', u'b3c2a0c7a44603a884d9e8cc1eb2274a'], u'filename': u'ofa-2.6.32-400.26.1.el5uek-1.5.1-4.0.58.x86_64.rpm', u'epoch': u'0', u'version': u'1.5.1', u'release': u'4.0.58', u'arch': u'x86_64'}, {u'src': None, u'name': u'ofa-2.6.32-400.26.1.el5uekdebug', u'sum': [u'md5', u'305a6fe70da46015a1b4541afda09726'], u'filename': u'ofa-2.6.32-400.26.1.el5uekdebug-1.5.1-4.0.58.x86_64.rpm', u'epoch': u'0', u'version': u'1.5.1', u'release': u'4.0.58', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u'[4.0-2.1.4]\n- Resolves: Bug 639353 - broken symbolic link /bin/find\n\n[4.0-2.1.3]\n- Resolves: fix path to mail command using softlink\n\n[4.0-2.1.2]\n- Resolves: fix path to find command using softlink\n\n[4.0-2.1.1]\n- Resolves: Bug 570063\n\n[4.0-2.1]\n- Resolves: 506540', u'issued': u'2013-04-15', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELBA-2013-2517.html', u'type': u'self', u'id': None, u'title': u'ELBA-2013-2517'}], u'_content_type_id': u'erratum', u'_id': u'224f314a-1f73-4195-9ad7-ca1e91e03a20', u'from': u'el-errata@oss.oracle.com', u'severity': u'', u'title': u' redhat-lsb Bug Fix update', u'_ns': u'units_erratum', u'rights': u'Copyright 2013 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 5', u'reboot_suggested': False, u'type': u'bugfix', u'pkglist': [{u'packages': [{u'src': None, u'name': u'redhat-lsb', u'sum': [u'md5', u'd25e28ff86a9053f3d54211c291594f9'], u'filename': u'redhat-lsb-4.0-2.1.4.el5.i386.rpm', u'epoch': u'0', u'version': u'4.0', u'release': u'2.1.4.el5', u'arch': u'i386'}, {u'src': None, u'name': u'redhat-lsb', u'sum': [u'md5', u'b662a79d3b4c82e83a322e64a7a924bf'], u'filename': u'redhat-lsb-4.0-2.1.4.el5.src.rpm', u'epoch': u'0', u'version': u'4.0', u'release': u'2.1.4.el5', u'arch': u'src'}, {u'src': None, u'name': u'redhat-lsb', u'sum': [u'md5', u'e09e01ad8a67844af6d292297a346fb1'], u'filename': u'redhat-lsb-4.0-2.1.4.el5.x86_64.rpm', u'epoch': u'0', u'version': u'4.0', u'release': u'2.1.4.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'redhat-lsb-graphics', u'sum': [u'md5', u'c5561fcba2e7c064d041ca5cee72631f'], u'filename': u'redhat-lsb-graphics-4.0-2.1.4.el5.x86_64.rpm', u'epoch': u'0', u'version': u'4.0', u'release': u'2.1.4.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'redhat-lsb-printing', u'sum': [u'md5', u'34e2e4f55e1031946002235d06e3c21c'], u'filename': u'redhat-lsb-printing-4.0-2.1.4.el5.x86_64.rpm', u'epoch': u'0', u'version': u'4.0', u'release': u'2.1.4.el5', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u'[3.1.7-5.0.1]\n- Add Gen3 PCIe speed (8GT/s) to lspci (Mike Miller) [orabug 16857013]', u'issued': u'2013-06-11', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELBA-2013-2526.html', u'type': u'self', u'id': None, u'title': u'ELBA-2013-2526'}], u'_content_type_id': u'erratum', u'_id': u'1258d0f0-4bea-4db6-8cee-d67fb228d3b1', u'from': u'el-errata@oss.oracle.com', u'severity': u'', u'title': u' pciutils bug fix update', u'_ns': u'units_erratum', u'rights': u'Copyright 2013 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 5', u'reboot_suggested': False, u'type': u'bugfix', u'pkglist': [{u'packages': [{u'src': None, u'name': u'pciutils', u'sum': [u'md5', u'ba41d51279dbe6fcbedf3ab5e7a839c7'], u'filename': u'pciutils-3.1.7-5.0.1.el5.src.rpm', u'epoch': u'0', u'version': u'3.1.7', u'release': u'5.0.1.el5', u'arch': u'src'}, {u'src': None, u'name': u'pciutils', u'sum': [u'md5', u'0e08370c43f237e038ad8791be6d63fe'], u'filename': u'pciutils-3.1.7-5.0.1.el5.x86_64.rpm', u'epoch': u'0', u'version': u'3.1.7', u'release': u'5.0.1.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'pciutils-devel', u'sum': [u'md5', u'e0bcdbdffb5592dc2f193561cf450b8f'], u'filename': u'pciutils-devel-3.1.7-5.0.1.el5.i386.rpm', u'epoch': u'0', u'version': u'3.1.7', u'release': u'5.0.1.el5', u'arch': u'i386'}, {u'src': None, u'name': u'pciutils-devel', u'sum': [u'md5', u'064d49c4a71128dd029646d10a6af188'], u'filename': u'pciutils-devel-3.1.7-5.0.1.el5.x86_64.rpm', u'epoch': u'0', u'version': u'3.1.7', u'release': u'5.0.1.el5', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u'[0.9.4-20.0.1]\n- Added the ANY (any thread) extra bit for Intel CPUs [orabug 16770758]\n- Added event list for Intel IvyBridge and the model number [orabug 16770758]', u'issued': u'2013-06-11', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELBA-2013-2527.html', u'type': u'self', u'id': None, u'title': u'ELBA-2013-2527'}], u'_content_type_id': u'erratum', u'_id': u'eae54b5b-7965-46e9-97e0-b3693c274abb', u'from': u'el-errata@oss.oracle.com', u'severity': u'', u'title': u' oprofile bug fix update', u'_ns': u'units_erratum', u'rights': u'Copyright 2013 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 5', u'reboot_suggested': False, u'type': u'bugfix', u'pkglist': [{u'packages': [{u'src': None, u'name': u'oprofile', u'sum': [u'md5', u'0689a92cfa6736907dae6c108ccaccf9'], u'filename': u'oprofile-0.9.4-20.0.1.el5.src.rpm', u'epoch': u'0', u'version': u'0.9.4', u'release': u'20.0.1.el5', u'arch': u'src'}, {u'src': None, u'name': u'oprofile', u'sum': [u'md5', u'9be917926210857e7bc11c5cf6f3ee73'], u'filename': u'oprofile-0.9.4-20.0.1.el5.x86_64.rpm', u'epoch': u'0', u'version': u'0.9.4', u'release': u'20.0.1.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'oprofile-devel', u'sum': [u'md5', u'81865650df92bfc574aa3c2e316e073c'], u'filename': u'oprofile-devel-0.9.4-20.0.1.el5.i386.rpm', u'epoch': u'0', u'version': u'0.9.4', u'release': u'20.0.1.el5', u'arch': u'i386'}, {u'src': None, u'name': u'oprofile-devel', u'sum': [u'md5', u'7234827e875e2da3b1d965adc518a1a7'], u'filename': u'oprofile-devel-0.9.4-20.0.1.el5.x86_64.rpm', u'epoch': u'0', u'version': u'0.9.4', u'release': u'20.0.1.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'oprofile-gui', u'sum': [u'md5', u'c933851a6b389cd77183db4d9814f000'], u'filename': u'oprofile-gui-0.9.4-20.0.1.el5.x86_64.rpm', u'epoch': u'0', u'version': u'0.9.4', u'release': u'20.0.1.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'oprofile-jit', u'sum': [u'md5', u'd8adce9342125668ec24c91f2f6b1076'], u'filename': u'oprofile-jit-0.9.4-20.0.1.el5.i386.rpm', u'epoch': u'0', u'version': u'0.9.4', u'release': u'20.0.1.el5', u'arch': u'i386'}, {u'src': None, u'name': u'oprofile-jit', u'sum': [u'md5', u'd41674e09b4872d12779590967796fdd'], u'filename': u'oprofile-jit-0.9.4-20.0.1.el5.x86_64.rpm', u'epoch': u'0', u'version': u'0.9.4', u'release': u'20.0.1.el5', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u"[0.4.9-64.0.3]\n- fix error check in strlcat [orabug 16913326]\n- remove retain_hwhandler feature for compatible reason [orabug 16913326]\n\n[0.4.9-64.0.2]\n- add retry loop for getuid_callout for storage that comes online slow after\n failover/takeback [orabug 14009482]\n\n[0.4.9-64.0.1]\n- Add ora_bug16808084-update-dev_loss_tmo.patch (Guangyu Sun) [orabug 16739691]\n- Add ora_bug16808084-reload-map.patch (Guangyu Sun) [orabug 16739691]\n- Add ora_bug16808084-no-reload-prio.patch (Guangyu Sun) [orabug 16739691]\n- Add ora_bug16808084-set-def-fast_io_fail.patch (Guangyu Sun) [orabug 16739691]\n- include libaio and device-mapper as build requirement (Guangyu Sun)\n [orabug 16783526]\n- fix find_rport_id for 2.6.32 kernel (Guangyu Sun) [orabug 16547415 12850191]\n- fix flush_on_last_del config handlers (Guangyu Sun) [orabug 15837419]\n- add patch to revert mpatha to mpath0 numeric names (John Sobecki)\n [orabug 10282894]\n- add patch to fix 'invalid number of priority groups' error (Zhenzhong Duan)\n [orabug 11884664]\n- fix page 83 options for EMC and other storage. (Guru Anbalagane)\n [orabug 10364063]\n- revert all scsi_id callouts to el5 behavior (Guru Anbalagane)\n [orabug 10364063]\n- Add udev rule to create udev socket for multipathd (Xiaowei Hu)\n [orabug 10121864]\n- Remove path_checker from multipath.conf (Xiaowei Hu) [orabug 10121963]\n- fixed kpartx not consistently creating devices bug (Xiaowei Hu)\n [orabug 10250424]\n- During upgrade, restore the .rpmsave copy of multipath.conf if no config\n file is present (John Sobecki) [orabug 10275766]\n- port EL5u5 multipath rules (Chuck Anderson) [orabug 10105043]\n- Add kpartx.static back - needed for kernel 2.6-32 (John Sobecki)\n [orabug 10104535]\n- Add revert-scsi-id-checker-default.patch - scsi_id patch (John Sobecki)\n [orabug 10096746]\n- convert the '!' in cciss device names to '/' (John Sobecki) [RHBZ 729478]\n [orabug 13481064]\n- Provide a copy of /sbin/multipath.static, as both /etc/rc.sysinit and\n /etc/init.t/netfs call it, which is no longer built by 0.4.9 (John Sobecki)\n [orabug 13817465]\n\n[0.4.9.64]\n- Add 0167-RHBZ-735459-fix-mpathpersist-fns.patch\n * make reservation_key display correctly in 'multipathd show config'\n- Resolves: bz #735459\n\n[0.4.9.63]\n- Add 0166-RHBZ-880487-make-path-fd-readonly.patch\n * revert change from 0152-RHBZ-735459-mpath_persist.patch, so that\n path fds are again opened O_RDONLY\n- Resolves: bz #880487\n\n[0.4.9.62]\n- Add 0165-RHBZ-869253-disable-libdm-failback.patch\n * multipathd and kpartx now set a flag to request device-mapper\n not create devices itself.\n- Resolves: bz #869253\n\n[0.4.9.61]\n- Modify 0156-RHBZ-813963-new-alua-prio.patch\n * fix minor porting issue\n- Resolves: bz #813963\n\n[0.4.9.60]\n- Add 0161-RHBZ-836890-AIX-whitespace.patch\n- Add 0162-RHBZ-860748-early-blacklist.patch\n * blacklist devices as soon as possible\n- Add 0163-RHBZ-839386-detect-prio.patch\n * add default and device configuration option detect-prio\n- Add 0164-RHBZ-839386-netapp-config.patch\n- Modify 0153-RHBZ-839386-retain_hwhandler.patch\n * cleanup minor issues\n- Resolves: bz #836890, #860748, #839386\n\n[0.4.9.59]\n- Add 0146-RHBZ-595692-fix-cciss-names.patch\n * convert cmdline cciss names to sysfs format\n- Add 0147-RHBZ-824243-826610-833124-doc-fix.patch\n- Add 0148-RHBZ-619173-storagetek-config.patch\n- Add 0149-RHBZ-810788-remove-dups.patch\n * remove duplicates from builtin configs\n- Add 0150-RHBZ-810755-update-conf-defaults.patch\n- Add 0151-RHBZ-822389-fix-rename.patch\n * make multipath switch names on reload after disabling\n user_friendly_names\n- Add 0152-RHBZ-735459-mpath_persist.patch\n * mpathpersist allows persistent reservatoins through multipath devices\n- Add 0153-RHBZ-839386-retain_hwhandler.patch\n * add retain_attached_hw_handler default and multipaths config option\n- Add 0154-RHBZ-578114-kpartx-retry.patch\n * retry on EBUSY for loop device deletes\n- Add 0155-RHBZ-810989-load-modules.patch\n * service multipathd start loads kernel modules\n- Add 0156-RHBZ-813963-new-alua-prio.patch\n * combine the 'alua' and 'tpg_pref' prioritizers\n- Add 0157-RHBZ-816717-flush-full-paths.patch\n * make multipath accept full pathnames in -f\n- Add 0158-RHBZ-821885-check-blacklist.patch\n * make multipath -c check the device blacklisting\n- Add 0159-RHBZ-818367-829065-rdac.patch\n- Add 0160-RHBZ-841732-dont-swap-devices.patch\n- Resolves: bz #595692, #824243, #826610, #833124, #619173, #810788, #810755\n- Resolves: bz #822389, #735459, #839386, #578114, #810989, #813963, #816717\n- Resolves: bz #821885, #818367, #829065, #841732\n\n[0.4.9.58]\n- Modify multipath.conf\n * change 'selector' to 'path_selector'\n - Resolves: bz #827072\n\n[0.4.9.57]\n- Add 0145-RHBZ-831045-realloc-vector.patch\n * fix deleting items from vector, and handle error cases\n- Resolves: bz #831045\n\n[0.4.9.56]\n- Modify 0137-RHBZ-799842-change-netapp-config.patch\n * Add pg_init_retries to netapp config\n- Add 0144-RHBZ-812832-shutdown-crash.patch\n * kill waiter threads with pthread_cancel() instead of SIGUSR1\n- Resolves: bz #799842, #812832\n\n[0.4.9.55]\n- Modify 0131-RHBZ-662433-override-queue-no-daemon.patch\n * enforce queueing on condrestart as well\n- Add 0142-RHBZ-769527-fix-features-build.patch\n * remove 'queue_if_no_path' feature when flushing due to\n 'flush_on_last_del'\n- Add 0143-RHBZ-467709-followover-chkr-state.patch\n * Only failback if the path checker's reported state has changed\n- Resolves: bz #467709, #769527\n- Related: bz #662433\n", u'issued': u'2013-06-11', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELBA-2013-2528.html', u'type': u'self', u'id': None, u'title': u'ELBA-2013-2528'}], u'_content_type_id': u'erratum', u'_id': u'f249d3df-660f-4f20-bcde-e8824fa0c171', u'from': u'el-errata@oss.oracle.com', u'severity': u'', u'title': u' device-mapper-multipath bug fix update', u'_ns': u'units_erratum', u'rights': u'Copyright 2013 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 5', u'reboot_suggested': False, u'type': u'bugfix', u'pkglist': [{u'packages': [{u'src': None, u'name': u'device-mapper-multipath', u'sum': [u'md5', u'bd71833973902cc21019e7dc8e9708d2'], u'filename': u'device-mapper-multipath-0.4.9-64.0.3.el5.src.rpm', u'epoch': u'0', u'version': u'0.4.9', u'release': u'64.0.3.el5', u'arch': u'src'}, {u'src': None, u'name': u'device-mapper-multipath', u'sum': [u'md5', u'cf419c71966e707112c10f56a120d80f'], u'filename': u'device-mapper-multipath-0.4.9-64.0.3.el5.x86_64.rpm', u'epoch': u'0', u'version': u'0.4.9', u'release': u'64.0.3.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'device-mapper-multipath-libs', u'sum': [u'md5', u'f907f9f2afc3604d3804a7f7a42e09b8'], u'filename': u'device-mapper-multipath-libs-0.4.9-64.0.3.el5.x86_64.rpm', u'epoch': u'0', u'version': u'0.4.9', u'release': u'64.0.3.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'kpartx', u'sum': [u'md5', u'dcb21fe142f3bfa58aa8f1072170ef37'], u'filename': u'kpartx-0.4.9-64.0.3.el5.x86_64.rpm', u'epoch': u'0', u'version': u'0.4.9', u'release': u'64.0.3.el5', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u' [2.4.1-7]\n - Add Liberation fonts to 30-aliases-fedora.conf\n - Resolves: #243049 ', u'issued': u'2008-01-04', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELEA-2008-0001.html', u'type': u'self', u'id': None, u'title': u'ELEA-2008-0001'}], u'_content_type_id': u'erratum', u'_id': u'895081ad-1524-49d1-bae9-3b7391cda52a', u'from': u'el-errata@oss.oracle.com', u'severity': u'', u'title': u' Fontconfig Enhancement: configuration for Liberation fonts ', u'_ns': u'units_erratum', u'rights': u'Copyright 2008 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 5', u'reboot_suggested': False, u'type': u'enhancement', u'pkglist': [{u'packages': [{u'src': None, u'name': u'fontconfig', u'sum': [u'md5', u'50c2e698f8015b330eb06988a5f434bf'], u'filename': u'fontconfig-2.4.1-7.el5.i386.rpm', u'epoch': u'0', u'version': u'2.4.1', u'release': u'7.el5', u'arch': u'i386'}, {u'src': None, u'name': u'fontconfig', u'sum': [u'md5', u'e2d696ed8557ace62d99aeb53cc605b7'], u'filename': u'fontconfig-2.4.1-7.el5.src.rpm', u'epoch': u'0', u'version': u'2.4.1', u'release': u'7.el5', u'arch': u'src'}, {u'src': None, u'name': u'fontconfig', u'sum': [u'md5', u'eb9412ea69ac07ed2c7ce0985edda969'], u'filename': u'fontconfig-2.4.1-7.el5.x86_64.rpm', u'epoch': u'0', u'version': u'2.4.1', u'release': u'7.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'fontconfig-devel', u'sum': [u'md5', u'062109d6df304682a414d58864f0b41d'], u'filename': u'fontconfig-devel-2.4.1-7.el5.i386.rpm', u'epoch': u'0', u'version': u'2.4.1', u'release': u'7.el5', u'arch': u'i386'}, {u'src': None, u'name': u'fontconfig-devel', u'sum': [u'md5', u'89062a133a93cc8d30204d30289925be'], u'filename': u'fontconfig-devel-2.4.1-7.el5.x86_64.rpm', u'epoch': u'0', u'version': u'2.4.1', u'release': u'7.el5', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u'\n[2.6.21-5.3]\nResolves: #591105 ', u'issued': u'2010-05-28', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELEA-2010-0444.html', u'type': u'self', u'id': None, u'title': u'ELEA-2010-0444'}], u'_content_type_id': u'erratum', u'_id': u'91cd504a-1a75-4538-bb72-9c2ebe3373ed', u'from': u'el-errata@oss.oracle.com', u'severity': u'', u'title': u'Openswan enhancement update', u'_ns': u'units_erratum', u'rights': u'Copyright 2010 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 5', u'reboot_suggested': False, u'type': u'enhancement', u'pkglist': [{u'packages': [{u'src': None, u'name': u'openswan', u'sum': [u'md5', u'1a0e8b3d6b5fab6bb617223ab4bd1ca3'], u'filename': u'openswan-2.6.21-5.el5_5.3.src.rpm', u'epoch': u'0', u'version': u'2.6.21', u'release': u'5.el5_5.3', u'arch': u'src'}, {u'src': None, u'name': u'openswan', u'sum': [u'md5', u'3010d43df60a7ef47169c4c5edb7e717'], u'filename': u'openswan-2.6.21-5.el5_5.3.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.21', u'release': u'5.el5_5.3', u'arch': u'x86_64'}, {u'src': None, u'name': u'openswan-doc', u'sum': [u'md5', u'521150d8fa156166dea212be8865415c'], u'filename': u'openswan-doc-2.6.21-5.el5_5.3.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.21', u'release': u'5.el5_5.3', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u"\n[2010l-1.el5]\n- Upstream 2010l:\n - Change Cairo's 2010 reversion to DST from the midnight between\n September 8 and 9 to the midnight between September 9 and 10.\n - Change Gaza's 2010 return to standard time to the midnight between\n August 10 and 11.\n - Bahia de Banderas (Mexican state of Nayarit) changed time zone\n UTC-7 to new time zone UTC-6 on April 4, 2010\n- Resolves: #628637", u'issued': u'2010-09-06', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELEA-2010-0673.html', u'type': u'self', u'id': None, u'title': u'ELEA-2010-0673'}], u'_content_type_id': u'erratum', u'_id': u'9deac4d2-f615-46d8-8914-3c8f95e9fbb6', u'from': u'el-errata@oss.oracle.com', u'severity': u'', u'title': u'tzdata enhancement update', u'_ns': u'units_erratum', u'rights': u'Copyright 2010 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 5', u'reboot_suggested': False, u'type': u'enhancement', u'pkglist': [{u'packages': [{u'src': None, u'name': u'tzdata', u'sum': [u'md5', u'b899149d656df67184454de581410a6d'], u'filename': u'tzdata-2010l-1.el5.src.rpm', u'epoch': u'0', u'version': u'2010l', u'release': u'1.el5', u'arch': u'src'}, {u'src': None, u'name': u'tzdata', u'sum': [u'md5', u'84c5007cf2a3ca9e73f566eab4e730a5'], u'filename': u'tzdata-2010l-1.el5.x86_64.rpm', u'epoch': u'0', u'version': u'2010l', u'release': u'1.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'tzdata-java', u'sum': [u'md5', u'd9dff3ab54e237442b83618531e0908b'], u'filename': u'tzdata-java-2010l-1.el5.x86_64.rpm', u'epoch': u'0', u'version': u'2010l', u'release': u'1.el5', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u'\n[20100202-1.1]\n- add RLIMIT_RTPRIO and RLIMIT_NICE support to ulimit ', u'issued': u'2010-09-10', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELEA-2010-0694.html', u'type': u'self', u'id': None, u'title': u'ELEA-2010-0694'}], u'_content_type_id': u'erratum', u'_id': u'fbafcc46-5b98-476f-a2ac-b0495e024bca', u'from': u'el-errata@oss.oracle.com', u'severity': u'', u'title': u'ksh enhancement update', u'_ns': u'units_erratum', u'rights': u'Copyright 2010 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 5', u'reboot_suggested': False, u'type': u'enhancement', u'pkglist': [{u'packages': [{u'src': None, u'name': u'ksh', u'sum': [u'md5', u'e7af374e3dc9fbb4bf2979e3fc775b0d'], u'filename': u'ksh-20100202-1.el5_5.1.src.rpm', u'epoch': u'0', u'version': u'20100202', u'release': u'1.el5_5.1', u'arch': u'src'}, {u'src': None, u'name': u'ksh', u'sum': [u'md5', u'de8547aa6d4ebf9bb59575da90855760'], u'filename': u'ksh-20100202-1.el5_5.1.x86_64.rpm', u'epoch': u'0', u'version': u'20100202', u'release': u'1.el5_5.1', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u'\n[1.2.7-11.3]\n- clear errno in apr_strtoi64 (#647121) ', u'issued': u'2010-11-03', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELEA-2010-0821.html', u'type': u'self', u'id': None, u'title': u'ELEA-2010-0821'}], u'_content_type_id': u'erratum', u'_id': u'04425f9a-9a7c-461b-b525-0d784c93b0f6', u'from': u'el-errata@oss.oracle.com', u'severity': u'', u'title': u'apr bug fix update', u'_ns': u'units_erratum', u'rights': u'Copyright 2010 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 5', u'reboot_suggested': False, u'type': u'enhancement', u'pkglist': [{u'packages': [{u'src': None, u'name': u'apr', u'sum': [u'md5', u'912c411cd9fa4c7ec18cf9117bd8b0b4'], u'filename': u'apr-1.2.7-11.el5_5.3.i386.rpm', u'epoch': u'0', u'version': u'1.2.7', u'release': u'11.el5_5.3', u'arch': u'i386'}, {u'src': None, u'name': u'apr', u'sum': [u'md5', u'b7b644912700332921aaadabf3e6f6ad'], u'filename': u'apr-1.2.7-11.el5_5.3.src.rpm', u'epoch': u'0', u'version': u'1.2.7', u'release': u'11.el5_5.3', u'arch': u'src'}, {u'src': None, u'name': u'apr', u'sum': [u'md5', u'1f975e5728dc3e5dec4f0ea389cb3381'], u'filename': u'apr-1.2.7-11.el5_5.3.x86_64.rpm', u'epoch': u'0', u'version': u'1.2.7', u'release': u'11.el5_5.3', u'arch': u'x86_64'}, {u'src': None, u'name': u'apr-devel', u'sum': [u'md5', u'bcf631613c0bb1dc1751d2abe9d1d69b'], u'filename': u'apr-devel-1.2.7-11.el5_5.3.i386.rpm', u'epoch': u'0', u'version': u'1.2.7', u'release': u'11.el5_5.3', u'arch': u'i386'}, {u'src': None, u'name': u'apr-devel', u'sum': [u'md5', u'd7014bb03253f7c7237db62b82f0ae6b'], u'filename': u'apr-devel-1.2.7-11.el5_5.3.x86_64.rpm', u'epoch': u'0', u'version': u'1.2.7', u'release': u'11.el5_5.3', u'arch': u'x86_64'}, {u'src': None, u'name': u'apr-docs', u'sum': [u'md5', u'48139b7592a29d447d9869467de63096'], u'filename': u'apr-docs-1.2.7-11.el5_5.3.x86_64.rpm', u'epoch': u'0', u'version': u'1.2.7', u'release': u'11.el5_5.3', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u'\n[1.102pre-126.0.1.el5_6.4]\n- Add mkdumprd load firmware support [orabug 10432768]\n- updated makedumpfile to el6 version (Herbert van den Bergh) [orabug 10088607]\n- Merged UEK modification,Updated Source1 kdump.init\n Added --allow-missing for rebuilding kdump_initrd\n- Updated kexec-kdump-howto.txt with Oracle/OEL references\n\n[1.102pre-126.4]\n- Add ext4 module. Resolve bug 667966.\n\n[1.102pre-126.3]\nForcing brew rebuild\n\n[1.102pre-126.2]\n- Check fsck.ext4 binary before include it. Resolve bug 667966.\n\n[1.102pre-126.1]\n- Add ext4 support, from Dave Maley. Resolve bug 667966.', u'issued': u'2011-01-24', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELEA-2011-0146.html', u'type': u'self', u'id': None, u'title': u'ELEA-2011-0146'}], u'_content_type_id': u'erratum', u'_id': u'd2049245-458c-480c-a17c-b43816448fb3', u'from': u'el-errata@oss.oracle.com', u'severity': u'', u'title': u'kexec-tools enhancement update', u'_ns': u'units_erratum', u'rights': u'Copyright 2011 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 5', u'reboot_suggested': False, u'type': u'enhancement', u'pkglist': [{u'packages': [{u'src': None, u'name': u'kexec-tools', u'sum': [u'md5', u'5818062661433b4282a2fc1aeeffb3c5'], u'filename': u'kexec-tools-1.102pre-126.0.1.el5_6.4.src.rpm', u'epoch': u'0', u'version': u'1.102pre', u'release': u'126.0.1.el5_6.4', u'arch': u'src'}, {u'src': None, u'name': u'kexec-tools', u'sum': [u'md5', u'2fff516fbeec1765912563828b8e6f63'], u'filename': u'kexec-tools-1.102pre-126.0.1.el5_6.4.x86_64.rpm', u'epoch': u'0', u'version': u'1.102pre', u'release': u'126.0.1.el5_6.4', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u'\n[5.97-23.3]\n- add support for iflag=fullblock in dd (#668465)\n- fix the build with gettext-0.17', u'issued': u'2011-01-24', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELEA-2011-0165.html', u'type': u'self', u'id': None, u'title': u'ELEA-2011-0165'}], u'_content_type_id': u'erratum', u'_id': u'4f36ee7c-9b85-45a5-8200-b34001859855', u'from': u'el-errata@oss.oracle.com', u'severity': u'', u'title': u'coreutils enhancement update', u'_ns': u'units_erratum', u'rights': u'Copyright 2011 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 5', u'reboot_suggested': False, u'type': u'enhancement', u'pkglist': [{u'packages': [{u'src': None, u'name': u'coreutils', u'sum': [u'md5', u'7c06ab913840c5cf462e4d06c785eb69'], u'filename': u'coreutils-5.97-23.el5_6.3.src.rpm', u'epoch': u'0', u'version': u'5.97', u'release': u'23.el5_6.3', u'arch': u'src'}, {u'src': None, u'name': u'coreutils', u'sum': [u'md5', u'5b6d021218877d4d6c7381f1d00440bf'], u'filename': u'coreutils-5.97-23.el5_6.3.x86_64.rpm', u'epoch': u'0', u'version': u'5.97', u'release': u'23.el5_6.3', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u'\n[2011b-1]\n- Upstream 2011a:\n - Updates of historical stamps for Hawaii\n- Upstream 2011b:\n - America/North_Dakota/Beulah: Mercer County, North Dakota, changed\n from the mountain time zone to the central time zone\n- Kemerovo oblast should use OMST/OMSST abbreviation (tzdata-2011b-kemerovo.patch)\n- Resolves: #596800\n- tzdata-2011b-c.patch\n - Update of historical stamps for Juneau, Sitka, and histcurrent\n stamps for Metlakatla. Sitka and Metlakatla are new zones.\n - Delay end of DST in Chile in 2011 until first Sunday in April.\n- Resolves: #681907', u'issued': u'2011-03-11', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELEA-2011-0353.html', u'type': u'self', u'id': None, u'title': u'ELEA-2011-0353'}], u'_content_type_id': u'erratum', u'_id': u'3f2935f0-bd66-4ace-9fb2-256e8c48a0c0', u'from': u'el-errata@oss.oracle.com', u'severity': u'', u'title': u'tzdata enhancement update', u'_ns': u'units_erratum', u'rights': u'Copyright 2011 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 6', u'reboot_suggested': False, u'type': u'enhancement', u'pkglist': [{u'packages': [{u'src': None, u'name': u'tzdata', u'sum': [u'md5', u'67979607dd30c9a396977b4a2001ffc9'], u'filename': u'tzdata-2011b-1.el6.noarch.rpm', u'epoch': u'0', u'version': u'2011b', u'release': u'1.el6', u'arch': u'noarch'}, {u'src': None, u'name': u'tzdata', u'sum': [u'md5', u'33d6e65f5f13f81dd827871869a46367'], u'filename': u'tzdata-2011b-1.el6.src.rpm', u'epoch': u'0', u'version': u'2011b', u'release': u'1.el6', u'arch': u'src'}, {u'src': None, u'name': u'tzdata-java', u'sum': [u'md5', u'78bf1346e37194a15ecb180a42772905'], u'filename': u'tzdata-java-2011b-1.el6.noarch.rpm', u'epoch': u'0', u'version': u'2011b', u'release': u'1.el6', u'arch': u'noarch'}], u'name': u'ol6_x86_64_latest', u'short': u'ol6_x86_64_latest'}, {u'packages': [{u'src': None, u'name': u'tzdata', u'sum': [u'md5', u'133681b8ae69214bd9e0ff14bc4728cc'], u'filename': u'tzdata-2011b-1.el5.src.rpm', u'epoch': u'0', u'version': u'2011b', u'release': u'1.el5', u'arch': u'src'}, {u'src': None, u'name': u'tzdata', u'sum': [u'md5', u'143afc7212b9789745e5f360c855b4db'], u'filename': u'tzdata-2011b-1.el5.x86_64.rpm', u'epoch': u'0', u'version': u'2011b', u'release': u'1.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'tzdata-java', u'sum': [u'md5', u'b7c7fd7f2ba4e581e28edc8925f719e5'], u'filename': u'tzdata-java-2011b-1.el5.x86_64.rpm', u'epoch': u'0', u'version': u'2011b', u'release': u'1.el5', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u'\n[2011d-1]\n- Upstream 2011d:\n - Change end of DST in Samoa in 2011.\n - Change start of DST in Cuba in 2011.\n - Move start of DST in Turkey by one day in 2011.\n- Dropped tzdata-2011b-c.patch\n- Resolves: #684213', u'issued': u'2011-03-23', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELEA-2011-0378.html', u'type': u'self', u'id': None, u'title': u'ELEA-2011-0378'}], u'_content_type_id': u'erratum', u'_id': u'db530766-b2a1-4e08-853a-e7886fb090a1', u'from': u'el-errata@oss.oracle.com', u'severity': u'', u'title': u'tzdata enhancement update', u'_ns': u'units_erratum', u'rights': u'Copyright 2011 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 6', u'reboot_suggested': False, u'type': u'enhancement', u'pkglist': [{u'packages': [{u'src': None, u'name': u'tzdata', u'sum': [u'md5', u'2f5d5773331638e2d052bdb2775c6d2e'], u'filename': u'tzdata-2011d-1.el6.noarch.rpm', u'epoch': u'0', u'version': u'2011d', u'release': u'1.el6', u'arch': u'noarch'}, {u'src': None, u'name': u'tzdata', u'sum': [u'md5', u'8366e31fc2b41e9dd563c53859ab9b86'], u'filename': u'tzdata-2011d-1.el6.src.rpm', u'epoch': u'0', u'version': u'2011d', u'release': u'1.el6', u'arch': u'src'}, {u'src': None, u'name': u'tzdata-java', u'sum': [u'md5', u'6684c3ee693f75cc27d78d3fc840b558'], u'filename': u'tzdata-java-2011d-1.el6.noarch.rpm', u'epoch': u'0', u'version': u'2011d', u'release': u'1.el6', u'arch': u'noarch'}], u'name': u'ol6_x86_64_latest', u'short': u'ol6_x86_64_latest'}, {u'packages': [{u'src': None, u'name': u'tzdata', u'sum': [u'md5', u'8515e38dd590e88fff4479c0b007bc42'], u'filename': u'tzdata-2011d-1.el5.src.rpm', u'epoch': u'0', u'version': u'2011d', u'release': u'1.el5', u'arch': u'src'}, {u'src': None, u'name': u'tzdata', u'sum': [u'md5', u'6a0cbf29eea1101ff60b94dda28e15c8'], u'filename': u'tzdata-2011d-1.el5.x86_64.rpm', u'epoch': u'0', u'version': u'2011d', u'release': u'1.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'tzdata-java', u'sum': [u'md5', u'8dbaf89cc3b5ef3cb9400a5816f070bb'], u'filename': u'tzdata-java-2011d-1.el5.x86_64.rpm', u'epoch': u'0', u'version': u'2011d', u'release': u'1.el5', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u'\n[2011d-3]\n- Morocco introduced DST for 2011 from April 2 to July 31. (tzdata-2011d-morocco.patch)\n- Resolves: #692031\n\n[2011d-2]\n- Delay end of DST in Chile in 2011 until May 7. (tzdata-2011d-chile.patch)\n- Resolves: #691439', u'issued': u'2011-04-01', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELEA-2011-0408.html', u'type': u'self', u'id': None, u'title': u'ELEA-2011-0408'}], u'_content_type_id': u'erratum', u'_id': u'9acb6307-61f8-4457-8ede-de953020c3c1', u'from': u'el-errata@oss.oracle.com', u'severity': u'', u'title': u'tzdata enhancement update', u'_ns': u'units_erratum', u'rights': u'Copyright 2011 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 6', u'reboot_suggested': False, u'type': u'enhancement', u'pkglist': [{u'packages': [{u'src': None, u'name': u'tzdata', u'sum': [u'md5', u'20f8e794849dca7ceb2430bb5baf9d5f'], u'filename': u'tzdata-2011d-3.el6.noarch.rpm', u'epoch': u'0', u'version': u'2011d', u'release': u'3.el6', u'arch': u'noarch'}, {u'src': None, u'name': u'tzdata', u'sum': [u'md5', u'ea952c71de24628bf6bcf82ee13cb7f3'], u'filename': u'tzdata-2011d-3.el6.src.rpm', u'epoch': u'0', u'version': u'2011d', u'release': u'3.el6', u'arch': u'src'}, {u'src': None, u'name': u'tzdata-java', u'sum': [u'md5', u'391bd1350c00a3ffa64f0199b3aacedd'], u'filename': u'tzdata-java-2011d-3.el6.noarch.rpm', u'epoch': u'0', u'version': u'2011d', u'release': u'3.el6', u'arch': u'noarch'}], u'name': u'ol6_x86_64_latest', u'short': u'ol6_x86_64_latest'}, {u'packages': [{u'src': None, u'name': u'tzdata', u'sum': [u'md5', u'0dd9031832b3da1a104cdbe088387a09'], u'filename': u'tzdata-2011d-3.el5.src.rpm', u'epoch': u'0', u'version': u'2011d', u'release': u'3.el5', u'arch': u'src'}, {u'src': None, u'name': u'tzdata', u'sum': [u'md5', u'a919dbce85773e732fa71fc2cdeafbe8'], u'filename': u'tzdata-2011d-3.el5.x86_64.rpm', u'epoch': u'0', u'version': u'2011d', u'release': u'3.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'tzdata-java', u'sum': [u'md5', u'91308e22dd5b236e2938210a15a4d251'], u'filename': u'tzdata-java-2011d-3.el5.x86_64.rpm', u'epoch': u'0', u'version': u'2011d', u'release': u'3.el5', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u'\n[3.2.3-12]\n- Update jwhois.conf for dotEmarat extension\n Resolves: #663972', u'issued': u'2011-04-27', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELEA-2011-0419.html', u'type': u'self', u'id': None, u'title': u'ELEA-2011-0419'}], u'_content_type_id': u'erratum', u'_id': u'98d76cff-b4dc-4645-8f90-cd9a38955cc8', u'from': u'el-errata@oss.oracle.com', u'severity': u'', u'title': u'jwhois enhancement update', u'_ns': u'units_erratum', u'rights': u'Copyright 2011 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 5', u'reboot_suggested': False, u'type': u'enhancement', u'pkglist': [{u'packages': [{u'src': None, u'name': u'jwhois', u'sum': [u'md5', u'ef1794a5e61b44ee86541011afcb6923'], u'filename': u'jwhois-3.2.3-12.el5.src.rpm', u'epoch': u'0', u'version': u'3.2.3', u'release': u'12.el5', u'arch': u'src'}, {u'src': None, u'name': u'jwhois', u'sum': [u'md5', u'748f56316e8979ea4ef23c923925263c'], u'filename': u'jwhois-3.2.3-12.el5.x86_64.rpm', u'epoch': u'0', u'version': u'3.2.3', u'release': u'12.el5', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u'\n[4.3p2-72.3]\n- improve resseding the prng from /dev/urandom or /dev/random respectively (#690145)\n\n[4.3p2-72.1]\n- periodically ressed the prng from /dev/urandom or /dev/random respectively (#690145)', u'issued': u'2011-04-06', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELEA-2011-0420.html', u'type': u'self', u'id': None, u'title': u'ELEA-2011-0420'}], u'_content_type_id': u'erratum', u'_id': u'd6ce8dee-bc68-45b1-8637-0426451e89a9', u'from': u'el-errata@oss.oracle.com', u'severity': u'', u'title': u'openssh enhancement update', u'_ns': u'units_erratum', u'rights': u'Copyright 2011 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 5', u'reboot_suggested': False, u'type': u'enhancement', u'pkglist': [{u'packages': [{u'src': None, u'name': u'openssh', u'sum': [u'md5', u'55a41d6e3ddf37b51320a2908275d93e'], u'filename': u'openssh-4.3p2-72.el5_6.3.src.rpm', u'epoch': u'0', u'version': u'4.3p2', u'release': u'72.el5_6.3', u'arch': u'src'}, {u'src': None, u'name': u'openssh', u'sum': [u'md5', u'35b842945117f81c00456acadeb4c846'], u'filename': u'openssh-4.3p2-72.el5_6.3.x86_64.rpm', u'epoch': u'0', u'version': u'4.3p2', u'release': u'72.el5_6.3', u'arch': u'x86_64'}, {u'src': None, u'name': u'openssh-askpass', u'sum': [u'md5', u'b4eeca352c24df01c8c2fa75b3ed5175'], u'filename': u'openssh-askpass-4.3p2-72.el5_6.3.x86_64.rpm', u'epoch': u'0', u'version': u'4.3p2', u'release': u'72.el5_6.3', u'arch': u'x86_64'}, {u'src': None, u'name': u'openssh-clients', u'sum': [u'md5', u'314664d418e1e4c900f4dcd269e84dd2'], u'filename': u'openssh-clients-4.3p2-72.el5_6.3.x86_64.rpm', u'epoch': u'0', u'version': u'4.3p2', u'release': u'72.el5_6.3', u'arch': u'x86_64'}, {u'src': None, u'name': u'openssh-server', u'sum': [u'md5', u'6d94f107106bd2965ff5477d5373123c'], u'filename': u'openssh-server-4.3p2-72.el5_6.3.x86_64.rpm', u'epoch': u'0', u'version': u'4.3p2', u'release': u'72.el5_6.3', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u'\n\njava-1.6.0-openjdk:\n\n[1:1.6.0.0-1.21.b17.0.1.el5]\n- Add oracle-enterprise.patch\n\n[1:1.6.0.0-1.21.b17.el5]\n- Resolves: rhbz#694080\n- Build with rhino support\n\njline:\n\n[0.9.94-0.9]\n- Fixed release\n- Removed maven build support\n- Removed javadoc sub-package as it needed maven\n- Removed demo subpackage -- it was never built\n- Fixed defattr\n- Removed pre-built jar in prep section\n\n[0.9.94-0.8]\n- Import from el6\n- Resolves: rhbz#618839\n\nrhino:\n\n[1.7-0.7.r2.3]\n- Added License\n- Remove pre-built jars\n- Added BR on jpackage-utils\n\n[0:1.7-0.7.r2.2.el5]\n- Import from el6\n- Resolves: bz618837', u'issued': u'2011-05-04', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELEA-2011-0485.html', u'type': u'self', u'id': None, u'title': u'ELEA-2011-0485'}], u'_content_type_id': u'erratum', u'_id': u'3cc95205-4214-4d94-9a1a-0019c8194c73', u'from': u'el-errata@oss.oracle.com', u'severity': u'', u'title': u'java-1.6.0-openjdk enhancement update', u'_ns': u'units_erratum', u'rights': u'Copyright 2011 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 5', u'reboot_suggested': False, u'type': u'enhancement', u'pkglist': [{u'packages': [{u'src': None, u'name': u'java-1.6.0-openjdk', u'sum': [u'md5', u'788184d59c9777723845c693ea245205'], u'filename': u'java-1.6.0-openjdk-1.6.0.0-1.21.b17.0.1.el5.src.rpm', u'epoch': u'1', u'version': u'1.6.0.0', u'release': u'1.21.b17.0.1.el5', u'arch': u'src'}, {u'src': None, u'name': u'java-1.6.0-openjdk', u'sum': [u'md5', u'9c3902357af94bddf4d5d6644f914b24'], u'filename': u'java-1.6.0-openjdk-1.6.0.0-1.21.b17.0.1.el5.x86_64.rpm', u'epoch': u'1', u'version': u'1.6.0.0', u'release': u'1.21.b17.0.1.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'java-1.6.0-openjdk-demo', u'sum': [u'md5', u'244ba4fef9253605f4a6747666fca8d8'], u'filename': u'java-1.6.0-openjdk-demo-1.6.0.0-1.21.b17.0.1.el5.x86_64.rpm', u'epoch': u'1', u'version': u'1.6.0.0', u'release': u'1.21.b17.0.1.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'java-1.6.0-openjdk-devel', u'sum': [u'md5', u'424e2da7bde7fe6157f40ca9d8d30dbd'], u'filename': u'java-1.6.0-openjdk-devel-1.6.0.0-1.21.b17.0.1.el5.x86_64.rpm', u'epoch': u'1', u'version': u'1.6.0.0', u'release': u'1.21.b17.0.1.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'java-1.6.0-openjdk-javadoc', u'sum': [u'md5', u'95b3fd5fb878fef3a569ff12be2f592b'], u'filename': u'java-1.6.0-openjdk-javadoc-1.6.0.0-1.21.b17.0.1.el5.x86_64.rpm', u'epoch': u'1', u'version': u'1.6.0.0', u'release': u'1.21.b17.0.1.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'java-1.6.0-openjdk-src', u'sum': [u'md5', u'd0adca1228cbe917320a60fa47258146'], u'filename': u'java-1.6.0-openjdk-src-1.6.0.0-1.21.b17.0.1.el5.x86_64.rpm', u'epoch': u'1', u'version': u'1.6.0.0', u'release': u'1.21.b17.0.1.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'jline', u'sum': [u'md5', u'270fae30839cbf3f35ce775445c938a3'], u'filename': u'jline-0.9.94-0.9.el5_6.noarch.rpm', u'epoch': u'0', u'version': u'0.9.94', u'release': u'0.9.el5_6', u'arch': u'noarch'}, {u'src': None, u'name': u'jline', u'sum': [u'md5', u'38ec317305fd70bf101645cfc4ea3f70'], u'filename': u'jline-0.9.94-0.9.el5_6.src.rpm', u'epoch': u'0', u'version': u'0.9.94', u'release': u'0.9.el5_6', u'arch': u'src'}, {u'src': None, u'name': u'rhino', u'sum': [u'md5', u'db7d728b47a8732ffb82ff1d5076d360'], u'filename': u'rhino-1.7-0.7.r2.3.el5_6.noarch.rpm', u'epoch': u'0', u'version': u'1.7', u'release': u'0.7.r2.3.el5_6', u'arch': u'noarch'}, {u'src': None, u'name': u'rhino', u'sum': [u'md5', u'750a29996c145548f87013924f37a6e7'], u'filename': u'rhino-1.7-0.7.r2.3.el5_6.src.rpm', u'epoch': u'0', u'version': u'1.7', u'release': u'0.7.r2.3.el5_6', u'arch': u'src'}, {u'src': None, u'name': u'rhino-javadoc', u'sum': [u'md5', u'205d6cdf013b00afdc1845f0ca7fda85'], u'filename': u'rhino-javadoc-1.7-0.7.r2.3.el5_6.noarch.rpm', u'epoch': u'0', u'version': u'1.7', u'release': u'0.7.r2.3.el5_6', u'arch': u'noarch'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u'\n[2011g-1]\n- Upstream 2011e:\n - Morocco introduced DST for 2011 from April 2 to July 31.\n - Delay end of DST in Chile in 2011 until May 7.\n- Resolves: #694521\n- Upstream 2011f:\n - The Falkland Islands will not turn back clocks this winter, but\n stay on daylight saving time.\n- Upstream 2011g:\n - Egypt abandons DST in 2011 (and forward)\n- Resolves: #698613\n- Dropped tzdata-2011d-chile.patch\n- Dropped tzdata-2011d-morocco.patch', u'issued': u'2011-05-06', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELEA-2011-0493.html', u'type': u'self', u'id': None, u'title': u'ELEA-2011-0493'}], u'_content_type_id': u'erratum', u'_id': u'fdf0d4e8-bf6f-4e5e-9f66-95f69c43edb3', u'from': u'el-errata@oss.oracle.com', u'severity': u'', u'title': u'tzdata enhancement update', u'_ns': u'units_erratum', u'rights': u'Copyright 2011 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 6', u'reboot_suggested': False, u'type': u'enhancement', u'pkglist': [{u'packages': [{u'src': None, u'name': u'tzdata', u'sum': [u'md5', u'111a013c584075c547abad6229056ff4'], u'filename': u'tzdata-2011g-1.el6.noarch.rpm', u'epoch': u'0', u'version': u'2011g', u'release': u'1.el6', u'arch': u'noarch'}, {u'src': None, u'name': u'tzdata', u'sum': [u'md5', u'bacd0f9566736d9ba992017d5dc6982e'], u'filename': u'tzdata-2011g-1.el6.src.rpm', u'epoch': u'0', u'version': u'2011g', u'release': u'1.el6', u'arch': u'src'}, {u'src': None, u'name': u'tzdata-java', u'sum': [u'md5', u'63863f80f0506bdab0ee90098a5491dc'], u'filename': u'tzdata-java-2011g-1.el6.noarch.rpm', u'epoch': u'0', u'version': u'2011g', u'release': u'1.el6', u'arch': u'noarch'}], u'name': u'ol6_x86_64_latest', u'short': u'ol6_x86_64_latest'}, {u'packages': [{u'src': None, u'name': u'tzdata', u'sum': [u'md5', u'b2e33c9397b054788cfec77a95885e3f'], u'filename': u'tzdata-2011g-1.el5.src.rpm', u'epoch': u'0', u'version': u'2011g', u'release': u'1.el5', u'arch': u'src'}, {u'src': None, u'name': u'tzdata', u'sum': [u'md5', u'725bba87bd067f8035cf7676f9043561'], u'filename': u'tzdata-2011g-1.el5.x86_64.rpm', u'epoch': u'0', u'version': u'2011g', u'release': u'1.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'tzdata-java', u'sum': [u'md5', u'167c21b44b2a9330c245cb41a6baf860'], u'filename': u'tzdata-java-2011g-1.el5.x86_64.rpm', u'epoch': u'0', u'version': u'2011g', u'release': u'1.el5', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u'\n[2011h-2]\n- Upstream 2011h:\n - Russia abandons DST in 2011.\n - *.tab: change AN (Netherlands Antilles) to CW (Curacao)\n- Resolves: #716936', u'issued': u'2011-08-08', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELEA-2011-1128.html', u'type': u'self', u'id': None, u'title': u'ELEA-2011-1128'}], u'_content_type_id': u'erratum', u'_id': u'ca394ee4-2701-46cb-af70-d1bc21f85695', u'from': u'el-errata@oss.oracle.com', u'severity': u'', u'title': u'tzdata enhancement update', u'_ns': u'units_erratum', u'rights': u'Copyright 2011 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 6', u'reboot_suggested': False, u'type': u'enhancement', u'pkglist': [{u'packages': [{u'src': None, u'name': u'tzdata', u'sum': [u'md5', u'a5eda90defb76e97ffafbe9ff0af994c'], u'filename': u'tzdata-2011h-2.el6.noarch.rpm', u'epoch': u'0', u'version': u'2011h', u'release': u'2.el6', u'arch': u'noarch'}, {u'src': None, u'name': u'tzdata', u'sum': [u'md5', u'404bd5052fc52e8dcd787f8f8de5ee4a'], u'filename': u'tzdata-2011h-2.el6.src.rpm', u'epoch': u'0', u'version': u'2011h', u'release': u'2.el6', u'arch': u'src'}, {u'src': None, u'name': u'tzdata-java', u'sum': [u'md5', u'12d4444015491bf11d656070caa23059'], u'filename': u'tzdata-java-2011h-2.el6.noarch.rpm', u'epoch': u'0', u'version': u'2011h', u'release': u'2.el6', u'arch': u'noarch'}], u'name': u'ol6_x86_64_latest', u'short': u'ol6_x86_64_latest'}, {u'packages': [{u'src': None, u'name': u'tzdata', u'sum': [u'md5', u'35613a69b0d07eac84c1542dab1e17ab'], u'filename': u'tzdata-2011h-1.el5.src.rpm', u'epoch': u'0', u'version': u'2011h', u'release': u'1.el5', u'arch': u'src'}, {u'src': None, u'name': u'tzdata', u'sum': [u'md5', u'1992f75c0f6382805a30d44d61e68806'], u'filename': u'tzdata-2011h-1.el5.x86_64.rpm', u'epoch': u'0', u'version': u'2011h', u'release': u'1.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'tzdata-java', u'sum': [u'md5', u'7c688857df0f00a5eb3ad86f9d72997d'], u'filename': u'tzdata-java-2011h-1.el5.x86_64.rpm', u'epoch': u'0', u'version': u'2011h', u'release': u'1.el5', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u'\n[0.8-9.el5.1]\n- Add rupee symbol (#727839)', u'issued': u'2011-08-11', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELEA-2011-1153.html', u'type': u'self', u'id': None, u'title': u'ELEA-2011-1153'}], u'_content_type_id': u'erratum', u'_id': u'3b1808c0-5c7e-45f4-96c6-2208e0e0d3ec', u'from': u'el-errata@oss.oracle.com', u'severity': u'', u'title': u'xkeyboard-config enhancement update', u'_ns': u'units_erratum', u'rights': u'Copyright 2011 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 5', u'reboot_suggested': False, u'type': u'enhancement', u'pkglist': [{u'packages': [{u'src': None, u'name': u'xkeyboard-config', u'sum': [u'md5', u'06202d661d57bd2aea600fa4ed421783'], u'filename': u'xkeyboard-config-0.8-9.el5_7.1.noarch.rpm', u'epoch': u'0', u'version': u'0.8', u'release': u'9.el5_7.1', u'arch': u'noarch'}, {u'src': None, u'name': u'xkeyboard-config', u'sum': [u'md5', u'8c503a82586b5e516693b0367f45cbd1'], u'filename': u'xkeyboard-config-0.8-9.el5_7.1.src.rpm', u'epoch': u'0', u'version': u'0.8', u'release': u'9.el5_7.1', u'arch': u'src'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u'\n[2011h-3]\n- Patch for upcoming change in Newfoundland. The transition time\n changes from 12:01 AM to 2:00 AM.\n- Resolves: #729693', u'issued': u'2011-08-29', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELEA-2011-1214.html', u'type': u'self', u'id': None, u'title': u'ELEA-2011-1214'}], u'_content_type_id': u'erratum', u'_id': u'd5f79e9c-14e7-4ce5-b980-aa62df5ce117', u'from': u'el-errata@oss.oracle.com', u'severity': u'', u'title': u'tzdata enhancement update', u'_ns': u'units_erratum', u'rights': u'Copyright 2011 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 6', u'reboot_suggested': False, u'type': u'enhancement', u'pkglist': [{u'packages': [{u'src': None, u'name': u'tzdata', u'sum': [u'md5', u'3b5e2dc40fbf05218378b02ad6c35543'], u'filename': u'tzdata-2011h-3.el6.noarch.rpm', u'epoch': u'0', u'version': u'2011h', u'release': u'3.el6', u'arch': u'noarch'}, {u'src': None, u'name': u'tzdata', u'sum': [u'md5', u'cf10bb966247522b774b412a3a0d2135'], u'filename': u'tzdata-2011h-3.el6.src.rpm', u'epoch': u'0', u'version': u'2011h', u'release': u'3.el6', u'arch': u'src'}, {u'src': None, u'name': u'tzdata-java', u'sum': [u'md5', u'451e795495a437242e700d87dea5598b'], u'filename': u'tzdata-java-2011h-3.el6.noarch.rpm', u'epoch': u'0', u'version': u'2011h', u'release': u'3.el6', u'arch': u'noarch'}], u'name': u'ol6_x86_64_latest', u'short': u'ol6_x86_64_latest'}, {u'packages': [{u'src': None, u'name': u'tzdata', u'sum': [u'md5', u'6c694ca548021904d3b38c141821198a'], u'filename': u'tzdata-2011h-2.el5.src.rpm', u'epoch': u'0', u'version': u'2011h', u'release': u'2.el5', u'arch': u'src'}, {u'src': None, u'name': u'tzdata', u'sum': [u'md5', u'e3719bd45cac1c4dab6aa8ea2b616c73'], u'filename': u'tzdata-2011h-2.el5.x86_64.rpm', u'epoch': u'0', u'version': u'2011h', u'release': u'2.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'tzdata-java', u'sum': [u'md5', u'649366f5671cea3bc80e3b8f5bbbe036'], u'filename': u'tzdata-java-2011h-2.el5.x86_64.rpm', u'epoch': u'0', u'version': u'2011h', u'release': u'2.el5', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u'\n[2.0.115-85.1]\n- cman: allow init script to pass options to fenced\n Resolves: rhbz#731306', u'issued': u'2011-08-29', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELEA-2011-1217.html', u'type': u'self', u'id': None, u'title': u'ELEA-2011-1217'}], u'_content_type_id': u'erratum', u'_id': u'e845912b-ff17-42f2-ae96-58f8551c6a59', u'from': u'el-errata@oss.oracle.com', u'severity': u'', u'title': u'cman enhancement update', u'_ns': u'units_erratum', u'rights': u'Copyright 2011 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 5', u'reboot_suggested': False, u'type': u'enhancement', u'pkglist': [{u'packages': [{u'src': None, u'name': u'cman', u'sum': [u'md5', u'bcdbc312b2cb66ef9282490f2963001b'], u'filename': u'cman-2.0.115-85.el5_7.1.src.rpm', u'epoch': u'0', u'version': u'2.0.115', u'release': u'85.el5_7.1', u'arch': u'src'}, {u'src': None, u'name': u'cman', u'sum': [u'md5', u'8eecf127520b900a68c949495b411c38'], u'filename': u'cman-2.0.115-85.el5_7.1.x86_64.rpm', u'epoch': u'0', u'version': u'2.0.115', u'release': u'85.el5_7.1', u'arch': u'x86_64'}, {u'src': None, u'name': u'cman-devel', u'sum': [u'md5', u'f43ef60ddcc7a9de15e791dfb2aca765'], u'filename': u'cman-devel-2.0.115-85.el5_7.1.i386.rpm', u'epoch': u'0', u'version': u'2.0.115', u'release': u'85.el5_7.1', u'arch': u'i386'}, {u'src': None, u'name': u'cman-devel', u'sum': [u'md5', u'4795826278d46ab938ae26a3014f6e1c'], u'filename': u'cman-devel-2.0.115-85.el5_7.1.x86_64.rpm', u'epoch': u'0', u'version': u'2.0.115', u'release': u'85.el5_7.1', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u'\n[1.16.24-1206.1840.el5_7.3]\n- replace Requires for libcurl with curl.\n\n[1.16.24-1206.1840.el5_7.2]\n- fixed various RpmDiff warning messages about missing sub-packages requires\n\n[1.16.24-1206.1840.el5_7.2]\n- added Requires libcurl to the client/apps packages (.so libraries needed)\n- specified BuildRequires curl-devel version for CURLOPT_GSSAPI_DELEGATION option\n\n[1.16.24-1206.1840.el5_7.1]\n- backported GSSAPI delegation from upstream version 1.27.04 with strong attention\n to libxmlrpc++ client ABI backward compatibility (#729795)', u'issued': u'2011-08-31', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELEA-2011-1237.html', u'type': u'self', u'id': None, u'title': u'ELEA-2011-1237'}], u'_content_type_id': u'erratum', u'_id': u'92acff2f-29e3-4324-9575-9c2f2b76e45c', u'from': u'el-errata@oss.oracle.com', u'severity': u'', u'title': u'xmlrpc-c enhancement update', u'_ns': u'units_erratum', u'rights': u'Copyright 2011 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 5', u'reboot_suggested': False, u'type': u'enhancement', u'pkglist': [{u'packages': [{u'src': None, u'name': u'xmlrpc-c', u'sum': [u'md5', u'ffb10cd92b62464c0f89f325dab0e086'], u'filename': u'xmlrpc-c-1.16.24-1206.1840.el5_7.4.i386.rpm', u'epoch': u'0', u'version': u'1.16.24', u'release': u'1206.1840.el5_7.4', u'arch': u'i386'}, {u'src': None, u'name': u'xmlrpc-c', u'sum': [u'md5', u'e0260cc02c5c3339f2bf9b40a462b7dd'], u'filename': u'xmlrpc-c-1.16.24-1206.1840.el5_7.4.src.rpm', u'epoch': u'0', u'version': u'1.16.24', u'release': u'1206.1840.el5_7.4', u'arch': u'src'}, {u'src': None, u'name': u'xmlrpc-c', u'sum': [u'md5', u'a0b6fb4469e5e60c68df460162cfd835'], u'filename': u'xmlrpc-c-1.16.24-1206.1840.el5_7.4.x86_64.rpm', u'epoch': u'0', u'version': u'1.16.24', u'release': u'1206.1840.el5_7.4', u'arch': u'x86_64'}, {u'src': None, u'name': u'xmlrpc-c-apps', u'sum': [u'md5', u'91499e309dc253604ce44a9fd1a2bb06'], u'filename': u'xmlrpc-c-apps-1.16.24-1206.1840.el5_7.4.x86_64.rpm', u'epoch': u'0', u'version': u'1.16.24', u'release': u'1206.1840.el5_7.4', u'arch': u'x86_64'}, {u'src': None, u'name': u'xmlrpc-c-c++', u'sum': [u'md5', u'e9c594d9a39026786269424f5fc97fa5'], u'filename': u'xmlrpc-c-c++-1.16.24-1206.1840.el5_7.4.i386.rpm', u'epoch': u'0', u'version': u'1.16.24', u'release': u'1206.1840.el5_7.4', u'arch': u'i386'}, {u'src': None, u'name': u'xmlrpc-c-c++', u'sum': [u'md5', u'd79ffb42917693c3fde7897e78288e40'], u'filename': u'xmlrpc-c-c++-1.16.24-1206.1840.el5_7.4.x86_64.rpm', u'epoch': u'0', u'version': u'1.16.24', u'release': u'1206.1840.el5_7.4', u'arch': u'x86_64'}, {u'src': None, u'name': u'xmlrpc-c-client', u'sum': [u'md5', u'69871b85166cf2df9e556adcd4eb26f0'], u'filename': u'xmlrpc-c-client-1.16.24-1206.1840.el5_7.4.i386.rpm', u'epoch': u'0', u'version': u'1.16.24', u'release': u'1206.1840.el5_7.4', u'arch': u'i386'}, {u'src': None, u'name': u'xmlrpc-c-client', u'sum': [u'md5', u'fe7e19d75b7610bd999aaaf52bf53a2e'], u'filename': u'xmlrpc-c-client-1.16.24-1206.1840.el5_7.4.x86_64.rpm', u'epoch': u'0', u'version': u'1.16.24', u'release': u'1206.1840.el5_7.4', u'arch': u'x86_64'}, {u'src': None, u'name': u'xmlrpc-c-client++', u'sum': [u'md5', u'6cefed964740ce7cf3c2d18e5b9f91a3'], u'filename': u'xmlrpc-c-client++-1.16.24-1206.1840.el5_7.4.i386.rpm', u'epoch': u'0', u'version': u'1.16.24', u'release': u'1206.1840.el5_7.4', u'arch': u'i386'}, {u'src': None, u'name': u'xmlrpc-c-client++', u'sum': [u'md5', u'4eca8dd420907933c2e643ee1f88e08b'], u'filename': u'xmlrpc-c-client++-1.16.24-1206.1840.el5_7.4.x86_64.rpm', u'epoch': u'0', u'version': u'1.16.24', u'release': u'1206.1840.el5_7.4', u'arch': u'x86_64'}, {u'src': None, u'name': u'xmlrpc-c-devel', u'sum': [u'md5', u'3cf74fd5b803b92d757ac3759f393cf3'], u'filename': u'xmlrpc-c-devel-1.16.24-1206.1840.el5_7.4.i386.rpm', u'epoch': u'0', u'version': u'1.16.24', u'release': u'1206.1840.el5_7.4', u'arch': u'i386'}, {u'src': None, u'name': u'xmlrpc-c-devel', u'sum': [u'md5', u'f86e5a601142d1b65dce1551645bdb9b'], u'filename': u'xmlrpc-c-devel-1.16.24-1206.1840.el5_7.4.x86_64.rpm', u'epoch': u'0', u'version': u'1.16.24', u'release': u'1206.1840.el5_7.4', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u'\n[2.3.43-12.9]\n- new feature update: honor priority/weight with ldap_domain2hostlist (#734143)\n\n[2.3.43-12.8]\n- new feature: honor priority/weight with ldap_domain2hostlist (#734143)\n- fix: strict aliasing warnings during package build (#734145)\n- fix: OpenLDAP packages lack debug data (#734144)', u'issued': u'2011-09-29', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELEA-2011-1345.html', u'type': u'self', u'id': None, u'title': u'ELEA-2011-1345'}], u'_content_type_id': u'erratum', u'_id': u'e3806095-9e69-4d4a-9d43-0af6b4cce0aa', u'from': u'el-errata@oss.oracle.com', u'severity': u'', u'title': u'openldap bug fix and enhancement update', u'_ns': u'units_erratum', u'rights': u'Copyright 2011 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 5', u'reboot_suggested': False, u'type': u'enhancement', u'pkglist': [{u'packages': [{u'src': None, u'name': u'compat-openldap', u'sum': [u'md5', u'8944ac65ee543e3e8f556b91ed977437'], u'filename': u'compat-openldap-2.3.43_2.2.29-12.el5_7.9.i386.rpm', u'epoch': u'0', u'version': u'2.3.43_2.2.29', u'release': u'12.el5_7.9', u'arch': u'i386'}, {u'src': None, u'name': u'compat-openldap', u'sum': [u'md5', u'ec26ad7b3e4037f68f093c6ed09a6b82'], u'filename': u'compat-openldap-2.3.43_2.2.29-12.el5_7.9.x86_64.rpm', u'epoch': u'0', u'version': u'2.3.43_2.2.29', u'release': u'12.el5_7.9', u'arch': u'x86_64'}, {u'src': None, u'name': u'openldap', u'sum': [u'md5', u'483087293668488497068fbc5cf413ea'], u'filename': u'openldap-2.3.43-12.el5_7.9.i386.rpm', u'epoch': u'0', u'version': u'2.3.43', u'release': u'12.el5_7.9', u'arch': u'i386'}, {u'src': None, u'name': u'openldap', u'sum': [u'md5', u'2112949b4f32539f936852b54f8ee77f'], u'filename': u'openldap-2.3.43-12.el5_7.9.src.rpm', u'epoch': u'0', u'version': u'2.3.43', u'release': u'12.el5_7.9', u'arch': u'src'}, {u'src': None, u'name': u'openldap', u'sum': [u'md5', u'0e470602657233447f83401f8d2a3b20'], u'filename': u'openldap-2.3.43-12.el5_7.9.x86_64.rpm', u'epoch': u'0', u'version': u'2.3.43', u'release': u'12.el5_7.9', u'arch': u'x86_64'}, {u'src': None, u'name': u'openldap-clients', u'sum': [u'md5', u'4478ae02cb9b74bf3852077e9706a159'], u'filename': u'openldap-clients-2.3.43-12.el5_7.9.x86_64.rpm', u'epoch': u'0', u'version': u'2.3.43', u'release': u'12.el5_7.9', u'arch': u'x86_64'}, {u'src': None, u'name': u'openldap-devel', u'sum': [u'md5', u'50c92bc4a6538a322f231290d2682dce'], u'filename': u'openldap-devel-2.3.43-12.el5_7.9.i386.rpm', u'epoch': u'0', u'version': u'2.3.43', u'release': u'12.el5_7.9', u'arch': u'i386'}, {u'src': None, u'name': u'openldap-devel', u'sum': [u'md5', u'c59dd21fbadb5f2a0ca3a0e3e216c94f'], u'filename': u'openldap-devel-2.3.43-12.el5_7.9.x86_64.rpm', u'epoch': u'0', u'version': u'2.3.43', u'release': u'12.el5_7.9', u'arch': u'x86_64'}, {u'src': None, u'name': u'openldap-servers', u'sum': [u'md5', u'0d69724f6413863651ec5beb317ca1fb'], u'filename': u'openldap-servers-2.3.43-12.el5_7.9.x86_64.rpm', u'epoch': u'0', u'version': u'2.3.43', u'release': u'12.el5_7.9', u'arch': u'x86_64'}, {u'src': None, u'name': u'openldap-servers-overlays', u'sum': [u'md5', u'c19341bb76bb8e439f0f5fdff992938a'], u'filename': u'openldap-servers-overlays-2.3.43-12.el5_7.9.x86_64.rpm', u'epoch': u'0', u'version': u'2.3.43', u'release': u'12.el5_7.9', u'arch': u'x86_64'}, {u'src': None, u'name': u'openldap-servers-sql', u'sum': [u'md5', u'b0883a221b1fba1db053281c288d841b'], u'filename': u'openldap-servers-sql-2.3.43-12.el5_7.9.x86_64.rpm', u'epoch': u'0', u'version': u'2.3.43', u'release': u'12.el5_7.9', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u'\n[2011l-4]\n- Ukraine will enter Winter Time after all\n- Resolves: #740000\n\n[2011l-3]\n- State of Bahia, Brazil, to resume Summer Time on Oct 16\n- The project moved, reflect this in URL\n- Resolves: #740000\n\n[2011l-2]\n- Upstream 2011l:\n - Fix ancient stamps for America/Sitka\n - Asia/Hebron transitioned to standard time already on Sep 30, not Oct 3\n - Fiji will introduce DST on Oct 22\n- Resolves: #740000\n\n[2011k-0.1.20110921]\n- Upstream 2011i:\n - Add Africa/Juba (South Sudan) zone\n - Samoa skips over the date line on 2011-12-30\n - Use KALT as abbreviation for Europe/Kalinigrad\n - Canonical version of the Newfoundland patch\n - Change America/Resolute use of EST to 2006-2007 only\n - Assume Metlakatla abandoned use of daylight saving in 1983\n - Sync iso3166.tab and zone.tab with above\n- Upstream 2011j:\n - Fix the Samoa date line skip\n - Changes in past timestamp typos several Africa zones\n- Proposed upstream 2011k:\n - Belarus and Ukraine adopt permanent DST in 2011\n - Palestine suspends DST during Ramadan in 2011\n - Gaza and West Bank split in 2011. West Bank is tracked in the\n timezone Asia/Hebron. zone.tab update accordingly.\n- Resolves: #740000', u'issued': u'2011-11-02', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELEA-2011-1410.html', u'type': u'self', u'id': None, u'title': u'ELEA-2011-1410'}], u'_content_type_id': u'erratum', u'_id': u'2fdfb92b-9cff-447d-aba8-52f2dd9afaa8', u'from': u'el-errata@oss.oracle.com', u'severity': u'', u'title': u'tzdata enhancement update', u'_ns': u'units_erratum', u'rights': u'Copyright 2011 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 6', u'reboot_suggested': False, u'type': u'enhancement', u'pkglist': [{u'packages': [{u'src': None, u'name': u'tzdata', u'sum': [u'md5', u'16dae95755f7d1780f841d539c08e09d'], u'filename': u'tzdata-2011l-4.el6.noarch.rpm', u'epoch': u'0', u'version': u'2011l', u'release': u'4.el6', u'arch': u'noarch'}, {u'src': None, u'name': u'tzdata', u'sum': [u'md5', u'2817c3a25d85b8c53fde7e18b3759df2'], u'filename': u'tzdata-2011l-4.el6.src.rpm', u'epoch': u'0', u'version': u'2011l', u'release': u'4.el6', u'arch': u'src'}, {u'src': None, u'name': u'tzdata-java', u'sum': [u'md5', u'8e795eb55f10be5ffbee6a4747d8d003'], u'filename': u'tzdata-java-2011l-4.el6.noarch.rpm', u'epoch': u'0', u'version': u'2011l', u'release': u'4.el6', u'arch': u'noarch'}], u'name': u'ol6_x86_64_latest', u'short': u'ol6_x86_64_latest'}, {u'packages': [{u'src': None, u'name': u'tzdata', u'sum': [u'md5', u'2df9a7448f1ef2bd0a654062f9094e4c'], u'filename': u'tzdata-2011l-4.el5.src.rpm', u'epoch': u'0', u'version': u'2011l', u'release': u'4.el5', u'arch': u'src'}, {u'src': None, u'name': u'tzdata', u'sum': [u'md5', u'4ca4b813c1b6422d8fdf9bf3f49f577a'], u'filename': u'tzdata-2011l-4.el5.x86_64.rpm', u'epoch': u'0', u'version': u'2011l', u'release': u'4.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'tzdata-java', u'sum': [u'md5', u'53c3b510875dbfd6487742a1ae909902'], u'filename': u'tzdata-java-2011l-4.el5.x86_64.rpm', u'epoch': u'0', u'version': u'2011l', u'release': u'4.el5', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u'[3.119 2]\n- new build for fixed i686 error in release eng.\n\n[3.119 1]\n- tg3 DUP module', u'issued': u'2011-12-06', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELEA-2011-1789.html', u'type': u'self', u'id': None, u'title': u'ELEA-2011-1789'}], u'_content_type_id': u'erratum', u'_id': u'56931328-f4ba-4495-b38b-3a95c203ab7f', u'from': u'el-errata@oss.oracle.com', u'severity': u'', u'title': u' kmod-tg3-rhel5u7', u'_ns': u'units_erratum', u'rights': u'Copyright 2011 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 5', u'reboot_suggested': False, u'type': u'enhancement', u'pkglist': [{u'packages': [{u'src': None, u'name': u'kmod-tg3-rhel5u7', u'sum': [u'md5', u'd8b7d4c6aa0b78205432bce7f1222f76'], u'filename': u'kmod-tg3-rhel5u7-3.119-2.el5_7.x86_64.rpm', u'epoch': u'0', u'version': u'3.119', u'release': u'2.el5_7', u'arch': u'x86_64'}, {u'src': None, u'name': u'kmod-tg3-xen-rhel5u7', u'sum': [u'md5', u'eecba5531744c1331930148796d5c741'], u'filename': u'kmod-tg3-xen-rhel5u7-3.119-2.el5_7.x86_64.rpm', u'epoch': u'0', u'version': u'3.119', u'release': u'2.el5_7', u'arch': u'x86_64'}, {u'src': None, u'name': u'tg3-kmod', u'sum': [u'md5', u'c85bb1dd6ed73f4c1f3ec461ff7e0b55'], u'filename': u'tg3-kmod-3.119-2.el5_7.src.rpm', u'epoch': u'0', u'version': u'3.119', u'release': u'2.el5_7', u'arch': u'src'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u'[3.0.6_k2_1 1]\n- igb DUP module', u'issued': u'2011-12-07', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELEA-2011-1792.html', u'type': u'self', u'id': None, u'title': u'ELEA-2011-1792'}], u'_content_type_id': u'erratum', u'_id': u'd3dc05d0-cae7-4dfd-b8e2-e88bc57d1cca', u'from': u'el-errata@oss.oracle.com', u'severity': u'', u'title': u' kmod-igb-rhel5u7', u'_ns': u'units_erratum', u'rights': u'Copyright 2011 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 5', u'reboot_suggested': False, u'type': u'enhancement', u'pkglist': [{u'packages': [{u'src': None, u'name': u'igb-kmod', u'sum': [u'md5', u'9a93985cfafe9ef5c68f51ea32a11943'], u'filename': u'igb-kmod-3.0.6_k2_1-1.el5_7.src.rpm', u'epoch': u'0', u'version': u'3.0.6_k2_1', u'release': u'1.el5_7', u'arch': u'src'}, {u'src': None, u'name': u'kmod-igb-rhel5u7', u'sum': [u'md5', u'cf61ffe884af836382023236a49bc1bf'], u'filename': u'kmod-igb-rhel5u7-3.0.6_k2_1-1.el5_7.x86_64.rpm', u'epoch': u'0', u'version': u'3.0.6_k2_1', u'release': u'1.el5_7', u'arch': u'x86_64'}, {u'src': None, u'name': u'kmod-igb-xen-rhel5u7', u'sum': [u'md5', u'5e137829cd2a571f2f6ff7f6c22378b7'], u'filename': u'kmod-igb-xen-rhel5u7-3.0.6_k2_1-1.el5_7.x86_64.rpm', u'epoch': u'0', u'version': u'3.0.6_k2_1', u'release': u'1.el5_7', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u'bnx2-kmod:\n\n[2.1.11 2]\n- rebuild due to building issues\n\n[2.1.11 1]\n- bnx2 DUP module\n\nbnx2i-kmod:\n\n[ 2.7.0.3 1]\n- bnx2i DUP module\n\nbnx2x-kmod:\n\n[1.70.00_0 1]\n- bnx2x DUP module\n\ncnic-kmod:\n\n[2.5.7 1]\n- cnic DUP module\n\nuio-kmod:\n\n[1.0 2]\n- new rebuild\n\n[1.0 1]\n- uio DUP module', u'issued': u'2011-12-19', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELEA-2011-1840.html', u'type': u'self', u'id': None, u'title': u'ELEA-2011-1840'}], u'_content_type_id': u'erratum', u'_id': u'c1ab9724-f3a0-4812-bf0a-be8ddd6e6581', u'from': u'el-errata@oss.oracle.com', u'severity': u'', u'title': u' kmod-bnx2x-rhel5u7, kmod-bnx2i-rhel5u7', u'_ns': u'units_erratum', u'rights': u'Copyright 2011 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 5', u'reboot_suggested': False, u'type': u'enhancement', u'pkglist': [{u'packages': [{u'src': None, u'name': u'bnx2-kmod', u'sum': [u'md5', u'19a880bb643181dc32619714a9467f64'], u'filename': u'bnx2-kmod-2.1.11-2.el5_7.src.rpm', u'epoch': u'0', u'version': u'2.1.11', u'release': u'2.el5_7', u'arch': u'src'}, {u'src': None, u'name': u'bnx2i-kmod', u'sum': [u'md5', u'83db2d0fabf7f64555c50197ccdd2be3'], u'filename': u'bnx2i-kmod-2.7.0.3-1.el5_7.src.rpm', u'epoch': u'0', u'version': u'2.7.0.3', u'release': u'1.el5_7', u'arch': u'src'}, {u'src': None, u'name': u'bnx2x-kmod', u'sum': [u'md5', u'e463b64bf0359f602371bff73f2db808'], u'filename': u'bnx2x-kmod-1.70.00_0-1.el5_7.src.rpm', u'epoch': u'0', u'version': u'1.70.00_0', u'release': u'1.el5_7', u'arch': u'src'}, {u'src': None, u'name': u'cnic-kmod', u'sum': [u'md5', u'0ae633578a4ff8e7ce5d9a29819765da'], u'filename': u'cnic-kmod-2.5.7-1.el5_7.src.rpm', u'epoch': u'0', u'version': u'2.5.7', u'release': u'1.el5_7', u'arch': u'src'}, {u'src': None, u'name': u'kmod-bnx2-rhel5u7', u'sum': [u'md5', u'509fe2ab193afb16432a0711b4e47346'], u'filename': u'kmod-bnx2-rhel5u7-2.1.11-2.el5_7.x86_64.rpm', u'epoch': u'0', u'version': u'2.1.11', u'release': u'2.el5_7', u'arch': u'x86_64'}, {u'src': None, u'name': u'kmod-bnx2-xen-rhel5u7', u'sum': [u'md5', u'a9341500a5bbcebc5d496e865133288f'], u'filename': u'kmod-bnx2-xen-rhel5u7-2.1.11-2.el5_7.x86_64.rpm', u'epoch': u'0', u'version': u'2.1.11', u'release': u'2.el5_7', u'arch': u'x86_64'}, {u'src': None, u'name': u'kmod-bnx2i-rhel5u7', u'sum': [u'md5', u'3335b978038cada84ad49e3ab0020e67'], u'filename': u'kmod-bnx2i-rhel5u7-2.7.0.3-1.el5_7.x86_64.rpm', u'epoch': u'0', u'version': u'2.7.0.3', u'release': u'1.el5_7', u'arch': u'x86_64'}, {u'src': None, u'name': u'kmod-bnx2i-xen-rhel5u7', u'sum': [u'md5', u'a18bc97a151d1fdede5c3a57e1566e2d'], u'filename': u'kmod-bnx2i-xen-rhel5u7-2.7.0.3-1.el5_7.x86_64.rpm', u'epoch': u'0', u'version': u'2.7.0.3', u'release': u'1.el5_7', u'arch': u'x86_64'}, {u'src': None, u'name': u'kmod-bnx2x-rhel5u7', u'sum': [u'md5', u'26dbcacd093ca6515930f115aa4fe6a6'], u'filename': u'kmod-bnx2x-rhel5u7-1.70.00_0-1.el5_7.x86_64.rpm', u'epoch': u'0', u'version': u'1.70.00_0', u'release': u'1.el5_7', u'arch': u'x86_64'}, {u'src': None, u'name': u'kmod-bnx2x-xen-rhel5u7', u'sum': [u'md5', u'c587b1c2e4ca62c4e97a86f9f84de401'], u'filename': u'kmod-bnx2x-xen-rhel5u7-1.70.00_0-1.el5_7.x86_64.rpm', u'epoch': u'0', u'version': u'1.70.00_0', u'release': u'1.el5_7', u'arch': u'x86_64'}, {u'src': None, u'name': u'kmod-cnic-rhel5u7', u'sum': [u'md5', u'6e23e99a187fca64844b153842cb745a'], u'filename': u'kmod-cnic-rhel5u7-2.5.7-1.el5_7.x86_64.rpm', u'epoch': u'0', u'version': u'2.5.7', u'release': u'1.el5_7', u'arch': u'x86_64'}, {u'src': None, u'name': u'kmod-cnic-xen-rhel5u7', u'sum': [u'md5', u'c5af69a7890815930b2f3ae8bfac2269'], u'filename': u'kmod-cnic-xen-rhel5u7-2.5.7-1.el5_7.x86_64.rpm', u'epoch': u'0', u'version': u'2.5.7', u'release': u'1.el5_7', u'arch': u'x86_64'}, {u'src': None, u'name': u'kmod-uio-rhel5u7', u'sum': [u'md5', u'3a862f617db126e138306b1ba4ce9ae6'], u'filename': u'kmod-uio-rhel5u7-1.0-2.el5_7.x86_64.rpm', u'epoch': u'0', u'version': u'1.0', u'release': u'2.el5_7', u'arch': u'x86_64'}, {u'src': None, u'name': u'kmod-uio-xen-rhel5u7', u'sum': [u'md5', u'5797396ac2c2076e918b9ed4a78d1dc4'], u'filename': u'kmod-uio-xen-rhel5u7-1.0-2.el5_7.x86_64.rpm', u'epoch': u'0', u'version': u'1.0', u'release': u'2.el5_7', u'arch': u'x86_64'}, {u'src': None, u'name': u'uio-kmod', u'sum': [u'md5', u'346ebbb42eda14a997ff51b88d5ba06e'], u'filename': u'uio-kmod-1.0-2.el5_7.src.rpm', u'epoch': u'0', u'version': u'1.0', u'release': u'2.el5_7', u'arch': u'src'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u'[3.0.6_k2_1.1 1]\n- igb DUP module respin\n\n[3.0.6_k2_1 1]\n- igb DUP module', u'issued': u'2012-02-01', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELEA-2012-0088.html', u'type': u'self', u'id': None, u'title': u'ELEA-2012-0088'}], u'_content_type_id': u'erratum', u'_id': u'58ccc82e-8eb1-4529-82e3-bf3d70c0a45b', u'from': u'el-errata@oss.oracle.com', u'severity': u'', u'title': u' kmod-igb-rhel5u7', u'_ns': u'units_erratum', u'rights': u'Copyright 2012 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 5', u'reboot_suggested': False, u'type': u'enhancement', u'pkglist': [{u'packages': [{u'src': None, u'name': u'igb-kmod', u'sum': [u'md5', u'1610ffe48658c802a71f007a0a39fb1b'], u'filename': u'igb-kmod-3.0.6_k2_1.1-1.el5_7.src.rpm', u'epoch': u'0', u'version': u'3.0.6_k2_1.1', u'release': u'1.el5_7', u'arch': u'src'}, {u'src': None, u'name': u'kmod-igb-rhel5u7', u'sum': [u'md5', u'44c763d03ca1cfc7b2712128a45198d4'], u'filename': u'kmod-igb-rhel5u7-3.0.6_k2_1.1-1.el5_7.x86_64.rpm', u'epoch': u'0', u'version': u'3.0.6_k2_1.1', u'release': u'1.el5_7', u'arch': u'x86_64'}, {u'src': None, u'name': u'kmod-igb-xen-rhel5u7', u'sum': [u'md5', u'd0b68e3bb79a9995174a5c9687396f72'], u'filename': u'kmod-igb-xen-rhel5u7-3.0.6_k2_1.1-1.el5_7.x86_64.rpm', u'epoch': u'0', u'version': u'3.0.6_k2_1.1', u'release': u'1.el5_7', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u'firefox:\n\n[10.0.1-1.0.1.el6_2]\n- Add firefox-oracle-default-prefs.js and remove the corresponding Red Hat ones\n\n[10.0.1-1]\n- Update to 10.0.1 ESR\n\n[10.0-3]\n- Update to 10.0 ESR\n\n[10.0-2]\n- Update to 10.0\n\n[8.0-3]\n- Update to 8.0 Beta 3\n\n[8.0-2]\n- Update to 8.0 Beta 2\n\n[8.0-1]\n- Update to 8.0 Beta 1\n\n[7.0-4]\n- Update to 7.0\n\n[7.0-3b6]\n- Update to 7.0 Beta 6\n\n[7.0-1b4]\n- Update to 7.0 Beta 4\n\n[5.0-1]\n- Update to 5.0\n\nxulrunner:\n\n[10.0.1-2.0.1.el6_2]\n- Replace xulrunner-redhat-default-prefs.js with\n xulrunner-oracle-default-prefs.js\n\n[10.0.1-2]\n- Fixed mozbz#727401\n\n[10.0.1-1]\n- Update to 10.0.1 ESR\n\n[10.0-5]\n- Update to 10.0 ESR\n\n[10.0-4]\n- Update to 10.0\n\n[10.0-0.3.b5]\n- Update to 10.0 beta 5\n\n[10.0-0.2.b4]\n- Update to 10.0 beta 4\n\n[10.0-0.1.b3]\n- Update to 10.0 beta 3\n\n[9.0.1-1]\n- Update to 9.0.1\n\n[8.0-6]\n- Updated to 8.0\n\n[8.0-5]\n- Updated to 8.0 Beta 3\n\n[8.0-4]\n- Added gtkmozembed patch\n\n[8.0-3]\n- Updated to 8.0 Beta 2\n\n[8.0-2]\n- Updated to 8.0 Beta 1\n\n[7.0-7]\n- Updated to 7.0\n\n[7.0-6.b6]\n- Updated to 7.0 Beta 6\n- Added fix for mozbz#674522: s390x javascript freeze fix\n\n[7.0-2.b5]\n- Updated to 7.0 Beta 5\n\n[7.0-1.b4]\n- Updated to 7.0 Beta 4\n- Added ability to build with in-tree nss\n\n[5.0-2]\n- Disabled jemalloc on s390(x)\n- Fixed nss/nspr min versions\n\n[5.0-1]\n- Update to 5.0\n\nyelp:\n\n[2.28.1-13]\n- Rebuild against newer gecko\n- Fixed gecko-2.0 patch\n\n[2.28.1-10]\n- Rebuild against newer gecko', u'issued': u'2012-02-28', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELEA-2012-0327.html', u'type': u'self', u'id': None, u'title': u'ELEA-2012-0327'}], u'_content_type_id': u'erratum', u'_id': u'5745063b-920f-43f7-b014-2424524cdbf7', u'from': u'el-errata@oss.oracle.com', u'severity': u'', u'title': u'firefox enhancement update', u'_ns': u'units_erratum', u'rights': u'Copyright 2012 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 6', u'reboot_suggested': False, u'type': u'enhancement', u'pkglist': [{u'packages': [{u'src': None, u'name': u'firefox', u'sum': [u'md5', u'75e7bf15afcf327d42c65562ce3968e2'], u'filename': u'firefox-10.0.1-1.0.1.el6_2.i686.rpm', u'epoch': u'0', u'version': u'10.0.1', u'release': u'1.0.1.el6_2', u'arch': u'i686'}, {u'src': None, u'name': u'firefox', u'sum': [u'md5', u'd566379d295325566fc39752932d78b7'], u'filename': u'firefox-10.0.1-1.0.1.el6_2.src.rpm', u'epoch': u'0', u'version': u'10.0.1', u'release': u'1.0.1.el6_2', u'arch': u'src'}, {u'src': None, u'name': u'firefox', u'sum': [u'md5', u'f55ca482f2f01614f74dcb8b49527084'], u'filename': u'firefox-10.0.1-1.0.1.el6_2.x86_64.rpm', u'epoch': u'0', u'version': u'10.0.1', u'release': u'1.0.1.el6_2', u'arch': u'x86_64'}, {u'src': None, u'name': u'xulrunner', u'sum': [u'md5', u'e05af9367db890081f94d2db55128c6b'], u'filename': u'xulrunner-10.0.1-2.0.1.el6_2.i686.rpm', u'epoch': u'0', u'version': u'10.0.1', u'release': u'2.0.1.el6_2', u'arch': u'i686'}, {u'src': None, u'name': u'xulrunner', u'sum': [u'md5', u'134587923316982c8a5154c86ab2b757'], u'filename': u'xulrunner-10.0.1-2.0.1.el6_2.src.rpm', u'epoch': u'0', u'version': u'10.0.1', u'release': u'2.0.1.el6_2', u'arch': u'src'}, {u'src': None, u'name': u'xulrunner', u'sum': [u'md5', u'e1c5adfa09baa4584303d77dc3ea31de'], u'filename': u'xulrunner-10.0.1-2.0.1.el6_2.x86_64.rpm', u'epoch': u'0', u'version': u'10.0.1', u'release': u'2.0.1.el6_2', u'arch': u'x86_64'}, {u'src': None, u'name': u'xulrunner-devel', u'sum': [u'md5', u'4e79b1cd1d74930af2bdf34017f0d1e2'], u'filename': u'xulrunner-devel-10.0.1-2.0.1.el6_2.i686.rpm', u'epoch': u'0', u'version': u'10.0.1', u'release': u'2.0.1.el6_2', u'arch': u'i686'}, {u'src': None, u'name': u'xulrunner-devel', u'sum': [u'md5', u'296afd441b05cdbc0351eb938a743faa'], u'filename': u'xulrunner-devel-10.0.1-2.0.1.el6_2.x86_64.rpm', u'epoch': u'0', u'version': u'10.0.1', u'release': u'2.0.1.el6_2', u'arch': u'x86_64'}, {u'src': None, u'name': u'yelp', u'sum': [u'md5', u'910e95738db5c06e59825cbf9af09d74'], u'filename': u'yelp-2.28.1-13.el6_2.src.rpm', u'epoch': u'0', u'version': u'2.28.1', u'release': u'13.el6_2', u'arch': u'src'}, {u'src': None, u'name': u'yelp', u'sum': [u'md5', u'2224842c639cfd8cf5d951ab97346062'], u'filename': u'yelp-2.28.1-13.el6_2.x86_64.rpm', u'epoch': u'0', u'version': u'2.28.1', u'release': u'13.el6_2', u'arch': u'x86_64'}], u'name': u'ol6_x86_64_latest', u'short': u'ol6_x86_64_latest'}, {u'packages': [{u'src': None, u'name': u'devhelp', u'sum': [u'md5', u'1a27182fea529fdcc8097de66fd0ae7b'], u'filename': u'devhelp-0.12-22.el5.i386.rpm', u'epoch': u'0', u'version': u'0.12', u'release': u'22.el5', u'arch': u'i386'}, {u'src': None, u'name': u'devhelp', u'sum': [u'md5', u'bd4407e49e4987727532df9312b9d4cd'], u'filename': u'devhelp-0.12-22.el5.src.rpm', u'epoch': u'0', u'version': u'0.12', u'release': u'22.el5', u'arch': u'src'}, {u'src': None, u'name': u'devhelp', u'sum': [u'md5', u'2e44aa9982ac9dd41dd7ad127b2c62d0'], u'filename': u'devhelp-0.12-22.el5.x86_64.rpm', u'epoch': u'0', u'version': u'0.12', u'release': u'22.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'devhelp-devel', u'sum': [u'md5', u'c894a0f365d525d765501c3f315ed860'], u'filename': u'devhelp-devel-0.12-22.el5.i386.rpm', u'epoch': u'0', u'version': u'0.12', u'release': u'22.el5', u'arch': u'i386'}, {u'src': None, u'name': u'devhelp-devel', u'sum': [u'md5', u'89602763f19abbf2d6fe725be30bca64'], u'filename': u'devhelp-devel-0.12-22.el5.x86_64.rpm', u'epoch': u'0', u'version': u'0.12', u'release': u'22.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'firefox', u'sum': [u'md5', u'37fc1911c30bc449e88a17b39af2d607'], u'filename': u'firefox-10.0.1-1.0.1.el5.i386.rpm', u'epoch': u'0', u'version': u'10.0.1', u'release': u'1.0.1.el5', u'arch': u'i386'}, {u'src': None, u'name': u'firefox', u'sum': [u'md5', u'76a1e84c02eeba3cf6e834a395615b2e'], u'filename': u'firefox-10.0.1-1.0.1.el5.src.rpm', u'epoch': u'0', u'version': u'10.0.1', u'release': u'1.0.1.el5', u'arch': u'src'}, {u'src': None, u'name': u'firefox', u'sum': [u'md5', u'b8cdbec9000387969e70d6518db4a856'], u'filename': u'firefox-10.0.1-1.0.1.el5.x86_64.rpm', u'epoch': u'0', u'version': u'10.0.1', u'release': u'1.0.1.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'xulrunner', u'sum': [u'md5', u'd53ecbc697ed417472d69877bd239c49'], u'filename': u'xulrunner-10.0.1-2.0.1.el5_8.i386.rpm', u'epoch': u'0', u'version': u'10.0.1', u'release': u'2.0.1.el5_8', u'arch': u'i386'}, {u'src': None, u'name': u'xulrunner', u'sum': [u'md5', u'd21ab5aae1432984c9ff12ac295be118'], u'filename': u'xulrunner-10.0.1-2.0.1.el5_8.src.rpm', u'epoch': u'0', u'version': u'10.0.1', u'release': u'2.0.1.el5_8', u'arch': u'src'}, {u'src': None, u'name': u'xulrunner', u'sum': [u'md5', u'd7e0f23d4fdd278f936dfac41e85a388'], u'filename': u'xulrunner-10.0.1-2.0.1.el5_8.x86_64.rpm', u'epoch': u'0', u'version': u'10.0.1', u'release': u'2.0.1.el5_8', u'arch': u'x86_64'}, {u'src': None, u'name': u'xulrunner-devel', u'sum': [u'md5', u'4a7ad8d4aa90b87084251214b603c933'], u'filename': u'xulrunner-devel-10.0.1-2.0.1.el5_8.i386.rpm', u'epoch': u'0', u'version': u'10.0.1', u'release': u'2.0.1.el5_8', u'arch': u'i386'}, {u'src': None, u'name': u'xulrunner-devel', u'sum': [u'md5', u'9ade2b2ed41eda5a7d0ec6f3296b6579'], u'filename': u'xulrunner-devel-10.0.1-2.0.1.el5_8.x86_64.rpm', u'epoch': u'0', u'version': u'10.0.1', u'release': u'2.0.1.el5_8', u'arch': u'x86_64'}, {u'src': None, u'name': u'yelp', u'sum': [u'md5', u'630acf7256a320da23dce949fcdd07cb'], u'filename': u'yelp-2.16.0-29.el5.src.rpm', u'epoch': u'0', u'version': u'2.16.0', u'release': u'29.el5', u'arch': u'src'}, {u'src': None, u'name': u'yelp', u'sum': [u'md5', u'd8ce3a797be388f8a376401903fd23f4'], u'filename': u'yelp-2.16.0-29.el5.x86_64.rpm', u'epoch': u'0', u'version': u'2.16.0', u'release': u'29.el5', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u'[2011n-2]\n- The Chilean Government has decided to postpone the entrance into\nwinter time (to leave DST) from March 11 2012 to April 28th 2012\n- Resolves: #796569\n\n[2011n-1]\n- Rebase to 2011n\n- Cuba postponed DST by two weeks to Nov 13\n- Fiji will enter DST on Jan 21\n- Add a patch for the leap second that will occur this summer\n- Resolves: #773755', u'issued': u'2012-03-06', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELEA-2012-0356.html', u'type': u'self', u'id': None, u'title': u'ELEA-2012-0356'}], u'_content_type_id': u'erratum', u'_id': u'9abef593-a9f5-405a-ac2b-83753a628522', u'from': u'el-errata@oss.oracle.com', u'severity': u'', u'title': u'tzdata enhancement update', u'_ns': u'units_erratum', u'rights': u'Copyright 2012 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 6', u'reboot_suggested': False, u'type': u'enhancement', u'pkglist': [{u'packages': [{u'src': None, u'name': u'tzdata', u'sum': [u'md5', u'09f9d5b66f40a6ac11de2d478f21a3a9'], u'filename': u'tzdata-2011n-2.el6.noarch.rpm', u'epoch': u'0', u'version': u'2011n', u'release': u'2.el6', u'arch': u'noarch'}, {u'src': None, u'name': u'tzdata', u'sum': [u'md5', u'cea692ff448694420b6350ac349720ff'], u'filename': u'tzdata-2011n-2.el6.src.rpm', u'epoch': u'0', u'version': u'2011n', u'release': u'2.el6', u'arch': u'src'}, {u'src': None, u'name': u'tzdata-java', u'sum': [u'md5', u'2ef1eab531a71bbb4b2f73095ea96aa6'], u'filename': u'tzdata-java-2011n-2.el6.noarch.rpm', u'epoch': u'0', u'version': u'2011n', u'release': u'2.el6', u'arch': u'noarch'}], u'name': u'ol6_x86_64_latest', u'short': u'ol6_x86_64_latest'}, {u'packages': [{u'src': None, u'name': u'tzdata', u'sum': [u'md5', u'8340d2a2bae15f69217b276748714f16'], u'filename': u'tzdata-2011n-2.el5.src.rpm', u'epoch': u'0', u'version': u'2011n', u'release': u'2.el5', u'arch': u'src'}, {u'src': None, u'name': u'tzdata', u'sum': [u'md5', u'c15420d6e4c58a970ba3e57d23281f5a'], u'filename': u'tzdata-2011n-2.el5.x86_64.rpm', u'epoch': u'0', u'version': u'2011n', u'release': u'2.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'tzdata-java', u'sum': [u'md5', u'e3a8f75716f3c233452c8bd4b95fa505'], u'filename': u'tzdata-java-2011n-2.el5.x86_64.rpm', u'epoch': u'0', u'version': u'2011n', u'release': u'2.el5', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u'[2012b-3]\n- Morocco moved DST entry to last Sunday of April\n- Resolves: #802460\n\n[2012b-2]\n- Morocco DST starts on the last Sunday of March (March 25, 2012) and\n ends on last Sunday of September, except the month of Ramadan. It\n is currently unclear what that Ramadan bit means, so this is not\n covered by the patch as of now.\n- Resolves: #802460\n\n[2012b-1]\n- Rebase to 2012b; changes vs. 2011n-2:\n - Changes to zones for Antarctica stations\n - Armenia abolished DST in 2012 and forward\n - Cuba enters DST on 31st March\n - Falkland Islands will stay on permanent Summer Time\n - New zone for Creston Valley, Canada, which differs from Dawson\n Creek in past stamps. Changes to historical stamps in Canada.\n - Last year, Tokelau skipped over the date line together with Samoa\n- Resolves: #802460', u'issued': u'2012-03-23', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELEA-2012-0412.html', u'type': u'self', u'id': None, u'title': u'ELEA-2012-0412'}], u'_content_type_id': u'erratum', u'_id': u'56214555-9d6f-4dbc-8a3e-7e9681a0d748', u'from': u'el-errata@oss.oracle.com', u'severity': u'', u'title': u'tzdata enhancement update', u'_ns': u'units_erratum', u'rights': u'Copyright 2012 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 6', u'reboot_suggested': False, u'type': u'enhancement', u'pkglist': [{u'packages': [{u'src': None, u'name': u'tzdata', u'sum': [u'md5', u'd546d7dd75c0c6e33975915708f9097a'], u'filename': u'tzdata-2012b-3.el6.noarch.rpm', u'epoch': u'0', u'version': u'2012b', u'release': u'3.el6', u'arch': u'noarch'}, {u'src': None, u'name': u'tzdata', u'sum': [u'md5', u'cc3061fbf6d62d1b4143cd286e0e8215'], u'filename': u'tzdata-2012b-3.el6.src.rpm', u'epoch': u'0', u'version': u'2012b', u'release': u'3.el6', u'arch': u'src'}, {u'src': None, u'name': u'tzdata-java', u'sum': [u'md5', u'5ab8f32328c45a455664c86a82de7541'], u'filename': u'tzdata-java-2012b-3.el6.noarch.rpm', u'epoch': u'0', u'version': u'2012b', u'release': u'3.el6', u'arch': u'noarch'}], u'name': u'ol6_x86_64_latest', u'short': u'ol6_x86_64_latest'}, {u'packages': [{u'src': None, u'name': u'tzdata', u'sum': [u'md5', u'9fa0fc942c1f7b85d299ddbdf8b0ba62'], u'filename': u'tzdata-2012b-3.el5.src.rpm', u'epoch': u'0', u'version': u'2012b', u'release': u'3.el5', u'arch': u'src'}, {u'src': None, u'name': u'tzdata', u'sum': [u'md5', u'a42a17b62a3ddc59c396710f7cf6e41a'], u'filename': u'tzdata-2012b-3.el5.x86_64.rpm', u'epoch': u'0', u'version': u'2012b', u'release': u'3.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'tzdata-java', u'sum': [u'md5', u'7de0e9d5b34b63d6743e022a274e55bd'], u'filename': u'tzdata-java-2012b-3.el5.x86_64.rpm', u'epoch': u'0', u'version': u'2012b', u'release': u'3.el5', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u'[1.4.4-5.2]\n- Add GCRYCTL_SET_ENFORCED_FIPS_FLAG command', u'issued': u'2012-04-16', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELEA-2012-0484.html', u'type': u'self', u'id': None, u'title': u'ELEA-2012-0484'}], u'_content_type_id': u'erratum', u'_id': u'd5ca9763-ed03-445a-b8bc-56631811528a', u'from': u'el-errata@oss.oracle.com', u'severity': u'', u'title': u'libgcrypt enhancement update', u'_ns': u'units_erratum', u'rights': u'Copyright 2012 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 5', u'reboot_suggested': False, u'type': u'enhancement', u'pkglist': [{u'packages': [{u'src': None, u'name': u'libgcrypt', u'sum': [u'md5', u'bc10acb54837ff64d2ff6e18ea06b983'], u'filename': u'libgcrypt-1.4.4-5.el5_8.2.i386.rpm', u'epoch': u'0', u'version': u'1.4.4', u'release': u'5.el5_8.2', u'arch': u'i386'}, {u'src': None, u'name': u'libgcrypt', u'sum': [u'md5', u'9df738d1724cda110933d405333f592d'], u'filename': u'libgcrypt-1.4.4-5.el5_8.2.src.rpm', u'epoch': u'0', u'version': u'1.4.4', u'release': u'5.el5_8.2', u'arch': u'src'}, {u'src': None, u'name': u'libgcrypt', u'sum': [u'md5', u'c5fc736d915e5519ed062857256b6d78'], u'filename': u'libgcrypt-1.4.4-5.el5_8.2.x86_64.rpm', u'epoch': u'0', u'version': u'1.4.4', u'release': u'5.el5_8.2', u'arch': u'x86_64'}, {u'src': None, u'name': u'libgcrypt-devel', u'sum': [u'md5', u'4f9f4ee00d96fbed21da3073bb57106a'], u'filename': u'libgcrypt-devel-1.4.4-5.el5_8.2.i386.rpm', u'epoch': u'0', u'version': u'1.4.4', u'release': u'5.el5_8.2', u'arch': u'i386'}, {u'src': None, u'name': u'libgcrypt-devel', u'sum': [u'md5', u'eff588fde72ca1f0be32223e4fc5f0e5'], u'filename': u'libgcrypt-devel-1.4.4-5.el5_8.2.x86_64.rpm', u'epoch': u'0', u'version': u'1.4.4', u'release': u'5.el5_8.2', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u'[2012c-1]\n- Upstream 2012c\n - Haiti observes DST from 2012 on\n - Gaza Strip and Hebron observe DST in 2012\n - Change start of DST in Syria to last Friday in March\n- Resolves: #820732', u'issued': u'2012-05-23', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELEA-2012-0689.html', u'type': u'self', u'id': None, u'title': u'ELEA-2012-0689'}], u'_content_type_id': u'erratum', u'_id': u'f8b408c9-3ff2-45a7-a074-10cad8511e93', u'from': u'el-errata@oss.oracle.com', u'severity': u'', u'title': u'tzdata enhancement update', u'_ns': u'units_erratum', u'rights': u'Copyright 2012 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 6', u'reboot_suggested': False, u'type': u'enhancement', u'pkglist': [{u'packages': [{u'src': None, u'name': u'tzdata', u'sum': [u'md5', u'0c87b67204038da9c5a872b3a244f627'], u'filename': u'tzdata-2012c-1.el6.noarch.rpm', u'epoch': u'0', u'version': u'2012c', u'release': u'1.el6', u'arch': u'noarch'}, {u'src': None, u'name': u'tzdata', u'sum': [u'md5', u'fb0f7a7fb83afbd085c311a728bf49f9'], u'filename': u'tzdata-2012c-1.el6.src.rpm', u'epoch': u'0', u'version': u'2012c', u'release': u'1.el6', u'arch': u'src'}, {u'src': None, u'name': u'tzdata-java', u'sum': [u'md5', u'cf35f55130c99853fd8554ddddf5e07a'], u'filename': u'tzdata-java-2012c-1.el6.noarch.rpm', u'epoch': u'0', u'version': u'2012c', u'release': u'1.el6', u'arch': u'noarch'}], u'name': u'ol6_x86_64_latest', u'short': u'ol6_x86_64_latest'}, {u'packages': [{u'src': None, u'name': u'tzdata', u'sum': [u'md5', u'c3c35e1d1bdffadbe8c44e5f859c4888'], u'filename': u'tzdata-2012c-1.el5.src.rpm', u'epoch': u'0', u'version': u'2012c', u'release': u'1.el5', u'arch': u'src'}, {u'src': None, u'name': u'tzdata', u'sum': [u'md5', u'f2c98b4d6177b4bf53d4d48f05cc4892'], u'filename': u'tzdata-2012c-1.el5.x86_64.rpm', u'epoch': u'0', u'version': u'2012c', u'release': u'1.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'tzdata-java', u'sum': [u'md5', u'38ebc041eee5796288af5bd6ce8cdb6b'], u'filename': u'tzdata-java-2012c-1.el5.x86_64.rpm', u'epoch': u'0', u'version': u'2012c', u'release': u'1.el5', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u'[2012c-3]\n- Morocco will not observe DST during the month of Ramadan\n (tzdata-2012c-morocco.patch)', u'issued': u'2012-07-19', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELEA-2012-1101.html', u'type': u'self', u'id': None, u'title': u'ELEA-2012-1101'}], u'_content_type_id': u'erratum', u'_id': u'dc040d65-0601-4e26-aa50-10f8269e4069', u'from': u'el-errata@oss.oracle.com', u'severity': u'', u'title': u'tzdata enhancement update', u'_ns': u'units_erratum', u'rights': u'Copyright 2012 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 6', u'reboot_suggested': False, u'type': u'enhancement', u'pkglist': [{u'packages': [{u'src': None, u'name': u'tzdata', u'sum': [u'md5', u'811b6ce621e80ca44afebc711f306727'], u'filename': u'tzdata-2012c-3.el6.noarch.rpm', u'epoch': u'0', u'version': u'2012c', u'release': u'3.el6', u'arch': u'noarch'}, {u'src': None, u'name': u'tzdata', u'sum': [u'md5', u'f8d9d45bb188df9bb196961e51e0e867'], u'filename': u'tzdata-2012c-3.el6.src.rpm', u'epoch': u'0', u'version': u'2012c', u'release': u'3.el6', u'arch': u'src'}, {u'src': None, u'name': u'tzdata-java', u'sum': [u'md5', u'6b58e8cb27c950e25203682498f23fd1'], u'filename': u'tzdata-java-2012c-3.el6.noarch.rpm', u'epoch': u'0', u'version': u'2012c', u'release': u'3.el6', u'arch': u'noarch'}], u'name': u'ol6_x86_64_latest', u'short': u'ol6_x86_64_latest'}, {u'packages': [{u'src': None, u'name': u'tzdata', u'sum': [u'md5', u'60c06e488f611964577e72a9e2a47467'], u'filename': u'tzdata-2012c-3.el5.src.rpm', u'epoch': u'0', u'version': u'2012c', u'release': u'3.el5', u'arch': u'src'}, {u'src': None, u'name': u'tzdata', u'sum': [u'md5', u'3c1233f7f16051c7e74e73deead8b9b7'], u'filename': u'tzdata-2012c-3.el5.x86_64.rpm', u'epoch': u'0', u'version': u'2012c', u'release': u'3.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'tzdata-java', u'sum': [u'md5', u'723b19b36f295509f32d5e3402a256ae'], u'filename': u'tzdata-java-2012c-3.el5.x86_64.rpm', u'epoch': u'0', u'version': u'2012c', u'release': u'3.el5', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u'[2012f-1]\n- Upstream 2012f\n - Fiji will start daylight savings at 2 am on Sunday 21st October 2012\n and end at 3 am on Sunday 20th January 2013. Guess it will be like\n that in following years as well.\n- Upstream 2012e\n - Tokelau is in time zone UTC+13, not UTC+14 (and always was)\n- Upstream 2012d\n - Morocco will not observe DST during the month of Ramadan.\n DST cessation end date was corrected.\n - Drop tzdata-2012c-morocco.patch', u'issued': u'2012-10-04', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELEA-2012-1338.html', u'type': u'self', u'id': None, u'title': u'ELEA-2012-1338'}], u'_content_type_id': u'erratum', u'_id': u'acaf59c5-4ea1-4566-af8a-ddc0b495928f', u'from': u'el-errata@oss.oracle.com', u'severity': u'', u'title': u'tzdata enhancement update', u'_ns': u'units_erratum', u'rights': u'Copyright 2012 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 6', u'reboot_suggested': False, u'type': u'enhancement', u'pkglist': [{u'packages': [{u'src': None, u'name': u'tzdata', u'sum': [u'md5', u'2f08c8a39bfe6e5702cc3181be2d0479'], u'filename': u'tzdata-2012f-1.el6.noarch.rpm', u'epoch': u'0', u'version': u'2012f', u'release': u'1.el6', u'arch': u'noarch'}, {u'src': None, u'name': u'tzdata', u'sum': [u'md5', u'a26f1b0db3a3d8c4b54801419ba4b203'], u'filename': u'tzdata-2012f-1.el6.src.rpm', u'epoch': u'0', u'version': u'2012f', u'release': u'1.el6', u'arch': u'src'}, {u'src': None, u'name': u'tzdata-java', u'sum': [u'md5', u'05d3bd789c94104ba8bac0a7ef657f89'], u'filename': u'tzdata-java-2012f-1.el6.noarch.rpm', u'epoch': u'0', u'version': u'2012f', u'release': u'1.el6', u'arch': u'noarch'}], u'name': u'ol6_x86_64_latest', u'short': u'ol6_x86_64_latest'}, {u'packages': [{u'src': None, u'name': u'tzdata', u'sum': [u'md5', u'8e9474b59bdb6f93d4e528e6e477a296'], u'filename': u'tzdata-2012f-1.el5.src.rpm', u'epoch': u'0', u'version': u'2012f', u'release': u'1.el5', u'arch': u'src'}, {u'src': None, u'name': u'tzdata', u'sum': [u'md5', u'cd0c4e7d5471cde935cac4bf8bc077bf'], u'filename': u'tzdata-2012f-1.el5.x86_64.rpm', u'epoch': u'0', u'version': u'2012f', u'release': u'1.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'tzdata-java', u'sum': [u'md5', u'0e2dcb98378d6ca3bc75e53b5a519cd0'], u'filename': u'tzdata-java-2012f-1.el5.x86_64.rpm', u'epoch': u'0', u'version': u'2012f', u'release': u'1.el5', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u'[1.3.5-9.2.0.1.el5_8 ]\n- Add TOS syntax to support kernel 2.6.32 series\n\n[1.3.5-9.2]\n- added dscp match (rhbz#847729)', u'issued': u'2012-10-30', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELEA-2012-1415.html', u'type': u'self', u'id': None, u'title': u'ELEA-2012-1415'}], u'_content_type_id': u'erratum', u'_id': u'227a32be-1af5-40f6-b17b-d6795adfaddc', u'from': u'el-errata@oss.oracle.com', u'severity': u'', u'title': u'iptables enhancement update', u'_ns': u'units_erratum', u'rights': u'Copyright 2012 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 5', u'reboot_suggested': False, u'type': u'enhancement', u'pkglist': [{u'packages': [{u'src': None, u'name': u'iptables', u'sum': [u'md5', u'd5d53103570f7aeecdbbac5820904634'], u'filename': u'iptables-1.3.5-9.2.0.1.el5_8.src.rpm', u'epoch': u'0', u'version': u'1.3.5', u'release': u'9.2.0.1.el5_8', u'arch': u'src'}, {u'src': None, u'name': u'iptables', u'sum': [u'md5', u'71721e2ee0b7566f9aafdd21db830548'], u'filename': u'iptables-1.3.5-9.2.0.1.el5_8.x86_64.rpm', u'epoch': u'0', u'version': u'1.3.5', u'release': u'9.2.0.1.el5_8', u'arch': u'x86_64'}, {u'src': None, u'name': u'iptables-devel', u'sum': [u'md5', u'233c6857e82758cefc4a3cf0e5e22422'], u'filename': u'iptables-devel-1.3.5-9.2.0.1.el5_8.i386.rpm', u'epoch': u'0', u'version': u'1.3.5', u'release': u'9.2.0.1.el5_8', u'arch': u'i386'}, {u'src': None, u'name': u'iptables-devel', u'sum': [u'md5', u'9cbaaa23fc863df70e441b80f3af8c89'], u'filename': u'iptables-devel-1.3.5-9.2.0.1.el5_8.x86_64.rpm', u'epoch': u'0', u'version': u'1.3.5', u'release': u'9.2.0.1.el5_8', u'arch': u'x86_64'}, {u'src': None, u'name': u'iptables-ipv6', u'sum': [u'md5', u'b1b101307e939c23e0c4b98c86cbe47e'], u'filename': u'iptables-ipv6-1.3.5-9.2.0.1.el5_8.x86_64.rpm', u'epoch': u'0', u'version': u'1.3.5', u'release': u'9.2.0.1.el5_8', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u'[2012i-2]\n- Preserve hardlinks that zic leaves behind, install with cp -d\n\n[2012i-1]\n- Upstream 2012i\n - Cuba switched to DST\n\n[2012h-2]\n- Switch back to using system zic, ignore upstream Makefile at all.\n We do so for java anyway.\n- Drop Factory from distribution\n\n[2012h-1]\n- Upstream 2012h\n - Brazilian state Bahia no longer has DST.\n - Brazilian state Tocantins now has DST.\n - Israel has new DST rules next year.\n - Jordan stays on DST this winter.\n\n[2012g-1]\n- Upstream 2012g\n - Adjust the packaging for new Makefile\n - Palestine: Fall transition was Sep 21, not Sep 28\n - Samoa: Daylight Saving Time commences on Sunday 30th September\n 2012 and ends on Sunday 7th of April 2013.\n- Resolves: #868173', u'issued': u'2012-11-26', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELEA-2012-1488.html', u'type': u'self', u'id': None, u'title': u'ELEA-2012-1488'}], u'_content_type_id': u'erratum', u'_id': u'5637fa85-3612-48ea-9972-f23e040e545d', u'from': u'el-errata@oss.oracle.com', u'severity': u'', u'title': u'tzdata enhancement update', u'_ns': u'units_erratum', u'rights': u'Copyright 2012 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 6', u'reboot_suggested': False, u'type': u'enhancement', u'pkglist': [{u'packages': [{u'src': None, u'name': u'tzdata', u'sum': [u'md5', u'b90fe03ebc33843644a7e0242eda8482'], u'filename': u'tzdata-2012i-2.el6.noarch.rpm', u'epoch': u'0', u'version': u'2012i', u'release': u'2.el6', u'arch': u'noarch'}, {u'src': None, u'name': u'tzdata', u'sum': [u'md5', u'26701776a95a2238a06fb8b3158cd044'], u'filename': u'tzdata-2012i-2.el6.src.rpm', u'epoch': u'0', u'version': u'2012i', u'release': u'2.el6', u'arch': u'src'}, {u'src': None, u'name': u'tzdata-java', u'sum': [u'md5', u'd9ecb2b2a47fcf89d32cc6ec2b3dee78'], u'filename': u'tzdata-java-2012i-2.el6.noarch.rpm', u'epoch': u'0', u'version': u'2012i', u'release': u'2.el6', u'arch': u'noarch'}], u'name': u'ol6_x86_64_latest', u'short': u'ol6_x86_64_latest'}, {u'packages': [{u'src': None, u'name': u'tzdata', u'sum': [u'md5', u'5d6d3d23d50291bb08ddf78537861329'], u'filename': u'tzdata-2012i-2.el5.src.rpm', u'epoch': u'0', u'version': u'2012i', u'release': u'2.el5', u'arch': u'src'}, {u'src': None, u'name': u'tzdata', u'sum': [u'md5', u'9320275ec3f6a4cf64874c94c7af5d94'], u'filename': u'tzdata-2012i-2.el5.x86_64.rpm', u'epoch': u'0', u'version': u'2012i', u'release': u'2.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'tzdata-java', u'sum': [u'md5', u'2bf3cd0fdcff3a4d5b9f569d3cc5e85e'], u'filename': u'tzdata-java-2012i-2.el5.x86_64.rpm', u'epoch': u'0', u'version': u'2012i', u'release': u'2.el5', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u'bnx2\n[2.1.11.346 1]\n- updated to 2.1.11.346\n\nbnx2i\n[2.7.2.2 1]\n- updated to 2.7.2.2\n\nbnx2x\n[1.72.51_0 1]\n- updated to 1.72.51_0\n\ncnic\n[2.5.12 1]\n- update to 2.5.12', u'issued': u'2012-12-10', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELEA-2012-1553.html', u'type': u'self', u'id': None, u'title': u'ELEA-2012-1553'}], u'_content_type_id': u'erratum', u'_id': u'af9a8ff9-c47d-4083-9e58-5f241d6918aa', u'from': u'el-errata@oss.oracle.com', u'severity': u'', u'title': u' kmod-bnx2x, kmod-bnx2, kmod-bnx2i', u'_ns': u'units_erratum', u'rights': u'Copyright 2012 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 5', u'reboot_suggested': False, u'type': u'enhancement', u'pkglist': [{u'packages': [{u'src': None, u'name': u'bnx2', u'sum': [u'md5', u'b74abae7e1ebbe8e52a2d9a67be06791'], u'filename': u'bnx2-2.1.11.346-1.el5_8.src.rpm', u'epoch': u'0', u'version': u'2.1.11.346', u'release': u'1.el5_8', u'arch': u'src'}, {u'src': None, u'name': u'bnx2i', u'sum': [u'md5', u'd652f38057fc9c6f8782d19c1cde14de'], u'filename': u'bnx2i-2.7.2.2-1.el5_8.src.rpm', u'epoch': u'0', u'version': u'2.7.2.2', u'release': u'1.el5_8', u'arch': u'src'}, {u'src': None, u'name': u'bnx2x', u'sum': [u'md5', u'b8b060ffac19e0389fd4854ec900055a'], u'filename': u'bnx2x-1.72.51_0-1.el5_8.src.rpm', u'epoch': u'0', u'version': u'1.72.51_0', u'release': u'1.el5_8', u'arch': u'src'}, {u'src': None, u'name': u'cnic', u'sum': [u'md5', u'5f4183263d723bfbc8f8181751c6c8a2'], u'filename': u'cnic-2.5.12-1.el5_8.src.rpm', u'epoch': u'0', u'version': u'2.5.12', u'release': u'1.el5_8', u'arch': u'src'}, {u'src': None, u'name': u'kmod-bnx2', u'sum': [u'md5', u'a27f64872b056a3e732bb010bb3da595'], u'filename': u'kmod-bnx2-2.1.11.346-1.el5_8.x86_64.rpm', u'epoch': u'0', u'version': u'2.1.11.346', u'release': u'1.el5_8', u'arch': u'x86_64'}, {u'src': None, u'name': u'kmod-bnx2-xen', u'sum': [u'md5', u'c90075e1595e3d1aed894cc59f69ca12'], u'filename': u'kmod-bnx2-xen-2.1.11.346-1.el5_8.x86_64.rpm', u'epoch': u'0', u'version': u'2.1.11.346', u'release': u'1.el5_8', u'arch': u'x86_64'}, {u'src': None, u'name': u'kmod-bnx2i', u'sum': [u'md5', u'c29359b7de4a80dc892e14a112eae144'], u'filename': u'kmod-bnx2i-2.7.2.2-1.el5_8.x86_64.rpm', u'epoch': u'0', u'version': u'2.7.2.2', u'release': u'1.el5_8', u'arch': u'x86_64'}, {u'src': None, u'name': u'kmod-bnx2x', u'sum': [u'md5', u'aa28b609e64993a53b6b3a834d96b064'], u'filename': u'kmod-bnx2x-1.72.51_0-1.el5_8.x86_64.rpm', u'epoch': u'0', u'version': u'1.72.51_0', u'release': u'1.el5_8', u'arch': u'x86_64'}, {u'src': None, u'name': u'kmod-bnx2x-xen', u'sum': [u'md5', u'4aec94e936462236d0ee37da8ca297fc'], u'filename': u'kmod-bnx2x-xen-1.72.51_0-1.el5_8.x86_64.rpm', u'epoch': u'0', u'version': u'1.72.51_0', u'release': u'1.el5_8', u'arch': u'x86_64'}, {u'src': None, u'name': u'kmod-cnic', u'sum': [u'md5', u'5d49d85ca4a6644ec9a8ae31f787000f'], u'filename': u'kmod-cnic-2.5.12-1.el5_8.x86_64.rpm', u'epoch': u'0', u'version': u'2.5.12', u'release': u'1.el5_8', u'arch': u'x86_64'}, {u'src': None, u'name': u'kmod-cnic-xen', u'sum': [u'md5', u'73f2abada1bb7c523b20f6d948716f79'], u'filename': u'kmod-cnic-xen-2.5.12-1.el5_8.x86_64.rpm', u'epoch': u'0', u'version': u'2.5.12', u'release': u'1.el5_8', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u'[2012j-1]\n- Upstream 2012j\n - Libya moved to CET', u'issued': u'2013-01-23', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELEA-2013-0182.html', u'type': u'self', u'id': None, u'title': u'ELEA-2013-0182'}], u'_content_type_id': u'erratum', u'_id': u'4971281c-f7ab-4edd-b6e6-89ca40d665f2', u'from': u'el-errata@oss.oracle.com', u'severity': u'', u'title': u'tzdata enhancement update', u'_ns': u'units_erratum', u'rights': u'Copyright 2013 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 6', u'reboot_suggested': False, u'type': u'enhancement', u'pkglist': [{u'packages': [{u'src': None, u'name': u'tzdata', u'sum': [u'md5', u'98da2b612858a7f0afee85328d3c05b1'], u'filename': u'tzdata-2012j-1.el6.noarch.rpm', u'epoch': u'0', u'version': u'2012j', u'release': u'1.el6', u'arch': u'noarch'}, {u'src': None, u'name': u'tzdata', u'sum': [u'md5', u'90b4050ae2c02317e72c1eed60f005b7'], u'filename': u'tzdata-2012j-1.el6.src.rpm', u'epoch': u'0', u'version': u'2012j', u'release': u'1.el6', u'arch': u'src'}, {u'src': None, u'name': u'tzdata-java', u'sum': [u'md5', u'f9f143242874542e55439d9f6b9e12f6'], u'filename': u'tzdata-java-2012j-1.el6.noarch.rpm', u'epoch': u'0', u'version': u'2012j', u'release': u'1.el6', u'arch': u'noarch'}], u'name': u'ol6_x86_64_latest', u'short': u'ol6_x86_64_latest'}, {u'packages': [{u'src': None, u'name': u'tzdata', u'sum': [u'md5', u'0125641001504973f9810fe7d9e71162'], u'filename': u'tzdata-2012j-1.el5.src.rpm', u'epoch': u'0', u'version': u'2012j', u'release': u'1.el5', u'arch': u'src'}, {u'src': None, u'name': u'tzdata', u'sum': [u'md5', u'a7252ceacbf3e3d6f66b6098adb41614'], u'filename': u'tzdata-2012j-1.el5.x86_64.rpm', u'epoch': u'0', u'version': u'2012j', u'release': u'1.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'tzdata-java', u'sum': [u'md5', u'ffabacb6ae7c6bd3fda5abfc5ac03b07'], u'filename': u'tzdata-java-2012j-1.el5.x86_64.rpm', u'epoch': u'0', u'version': u'2012j', u'release': u'1.el5', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u'[2012j-2]\n- DTS in Chile will end on 2013-04-28\n (0016-Chile-is-changing-its-DST-rules.patch)', u'issued': u'2013-03-08', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELEA-2013-0615.html', u'type': u'self', u'id': None, u'title': u'ELEA-2013-0615'}], u'_content_type_id': u'erratum', u'_id': u'34bcea81-5162-4bb5-8266-b089fe6b7de6', u'from': u'el-errata@oss.oracle.com', u'severity': u'', u'title': u'tzdata enhancement update', u'_ns': u'units_erratum', u'rights': u'Copyright 2013 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 6', u'reboot_suggested': False, u'type': u'enhancement', u'pkglist': [{u'packages': [{u'src': None, u'name': u'tzdata', u'sum': [u'md5', u'f18c562ab55d96e579bb57c615101e29'], u'filename': u'tzdata-2012j-2.el6.noarch.rpm', u'epoch': u'0', u'version': u'2012j', u'release': u'2.el6', u'arch': u'noarch'}, {u'src': None, u'name': u'tzdata', u'sum': [u'md5', u'ea26814456e0590e3702e2ad32ade273'], u'filename': u'tzdata-2012j-2.el6.src.rpm', u'epoch': u'0', u'version': u'2012j', u'release': u'2.el6', u'arch': u'src'}, {u'src': None, u'name': u'tzdata-java', u'sum': [u'md5', u'd5065466ddd341f07b4e956a9cef59c6'], u'filename': u'tzdata-java-2012j-2.el6.noarch.rpm', u'epoch': u'0', u'version': u'2012j', u'release': u'2.el6', u'arch': u'noarch'}], u'name': u'ol6_x86_64_latest', u'short': u'ol6_x86_64_latest'}, {u'packages': [{u'src': None, u'name': u'tzdata', u'sum': [u'md5', u'bfa561b580f471e649171f21c1526961'], u'filename': u'tzdata-2012j-2.el5.src.rpm', u'epoch': u'0', u'version': u'2012j', u'release': u'2.el5', u'arch': u'src'}, {u'src': None, u'name': u'tzdata', u'sum': [u'md5', u'fe940c5af51e523cf99a75de8f54c4cb'], u'filename': u'tzdata-2012j-2.el5.x86_64.rpm', u'epoch': u'0', u'version': u'2012j', u'release': u'2.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'tzdata-java', u'sum': [u'md5', u'6d1a673e017b7747f19635ab9378307b'], u'filename': u'tzdata-java-2012j-2.el5.x86_64.rpm', u'epoch': u'0', u'version': u'2012j', u'release': u'2.el5', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u'[2013b-1]\n- Upstream 2013b\n - Paraguay will end DST on March 24 this year\n - Haiti uses US daylight-saving rules this year\n - Morocco does not observe DST during Ramadan\n- Upstream 2013a\n - Retire Chile patch, 2013a has the data\n - New Zones Asia/Khandyga, Asia/Ust-Nera, Europe/Busingen\n - Many changes in historical timestamps', u'issued': u'2013-03-22', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELEA-2013-0674.html', u'type': u'self', u'id': None, u'title': u'ELEA-2013-0674'}], u'_content_type_id': u'erratum', u'_id': u'73596e6f-d6e8-41a1-ba06-ac6dd93482ea', u'from': u'el-errata@oss.oracle.com', u'severity': u'', u'title': u'tzdata enhancement update', u'_ns': u'units_erratum', u'rights': u'Copyright 2013 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 6', u'reboot_suggested': False, u'type': u'enhancement', u'pkglist': [{u'packages': [{u'src': None, u'name': u'tzdata', u'sum': [u'md5', u'b85b2d78743934c127d50acc0289b30d'], u'filename': u'tzdata-2013b-1.el6.noarch.rpm', u'epoch': u'0', u'version': u'2013b', u'release': u'1.el6', u'arch': u'noarch'}, {u'src': None, u'name': u'tzdata', u'sum': [u'md5', u'e3699e99767d701b11fe5afcaf9ece80'], u'filename': u'tzdata-2013b-1.el6.src.rpm', u'epoch': u'0', u'version': u'2013b', u'release': u'1.el6', u'arch': u'src'}, {u'src': None, u'name': u'tzdata-java', u'sum': [u'md5', u'd486d2cbf2ad0b4cfb030cddd6787326'], u'filename': u'tzdata-java-2013b-1.el6.noarch.rpm', u'epoch': u'0', u'version': u'2013b', u'release': u'1.el6', u'arch': u'noarch'}], u'name': u'ol6_x86_64_latest', u'short': u'ol6_x86_64_latest'}, {u'packages': [{u'src': None, u'name': u'tzdata', u'sum': [u'md5', u'ec460f7474830ddd27e88c048d8528c0'], u'filename': u'tzdata-2013b-1.el5.src.rpm', u'epoch': u'0', u'version': u'2013b', u'release': u'1.el5', u'arch': u'src'}, {u'src': None, u'name': u'tzdata', u'sum': [u'md5', u'8047740bed5b5b1900da2a2c523acf9f'], u'filename': u'tzdata-2013b-1.el5.x86_64.rpm', u'epoch': u'0', u'version': u'2013b', u'release': u'1.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'tzdata-java', u'sum': [u'md5', u'7a446f5139c4c66fff70cf8415730591'], u'filename': u'tzdata-java-2013b-1.el5.x86_64.rpm', u'epoch': u'0', u'version': u'2013b', u'release': u'1.el5', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u'[2.0.52-37.2]\n- rgmanager: Update the Oracle resource agents to support Oracle 11g\n Resolves: rhbz#964991', u'issued': u'2013-05-22', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELEA-2013-0852.html', u'type': u'self', u'id': None, u'title': u'ELEA-2013-0852'}], u'_content_type_id': u'erratum', u'_id': u'eace7c13-7aff-42bd-a7eb-1721fecada10', u'from': u'el-errata@oss.oracle.com', u'severity': u'', u'title': u'rgmanager enhancement update', u'_ns': u'units_erratum', u'rights': u'Copyright 2013 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 5', u'reboot_suggested': False, u'type': u'enhancement', u'pkglist': [{u'packages': [{u'src': None, u'name': u'rgmanager', u'sum': [u'md5', u'e9faf13f8ef3440b6c28c92fa6db4128'], u'filename': u'rgmanager-2.0.52-37.el5_9.2.src.rpm', u'epoch': u'0', u'version': u'2.0.52', u'release': u'37.el5_9.2', u'arch': u'src'}, {u'src': None, u'name': u'rgmanager', u'sum': [u'md5', u'08adb13c77de8e8ca4049aa1d93fde37'], u'filename': u'rgmanager-2.0.52-37.el5_9.2.x86_64.rpm', u'epoch': u'0', u'version': u'2.0.52', u'release': u'37.el5_9.2', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u"[2013c-1]\n- Upstream 2013c\n - Sync past stamps for Palestine and West Bank with timeanddate.com\n - Assume that the recent change to Paraguay's DST rules is permanent\n - Macquarie was uninhabited between 1919 and 1948. It's also part\n of Australia (update in zone.tab).\n\n[2013b-2]\n- Palestine starts Daylight Saving Time on March 29, 2013\n (tzdata-2013b-gaza.patch)\n\n[2013b-1]\n- Upstream 2013b\n - Paraguay will end DST on March 24 this year\n - Haiti uses US daylight-saving rules this year\n - Morocco does not observe DST during Ramadan\n- Upstream 2013a\n - Retire Chile patch, 2013a has the data\n - New Zones Asia/Khandyga, Asia/Ust-Nera, Europe/Busingen\n - Many changes in historical timestamps", u'issued': u'2013-05-30', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELEA-2013-0880.html', u'type': u'self', u'id': None, u'title': u'ELEA-2013-0880'}], u'_content_type_id': u'erratum', u'_id': u'067c3a4d-b3fd-4bb8-ad00-a7d8fd1d6978', u'from': u'el-errata@oss.oracle.com', u'severity': u'', u'title': u'tzdata enhancement update', u'_ns': u'units_erratum', u'rights': u'Copyright 2013 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 5', u'reboot_suggested': False, u'type': u'enhancement', u'pkglist': [{u'packages': [{u'src': None, u'name': u'tzdata', u'sum': [u'md5', u'55ada337870860afa100130dc64d4e1f'], u'filename': u'tzdata-2013c-1.el5.src.rpm', u'epoch': u'0', u'version': u'2013c', u'release': u'1.el5', u'arch': u'src'}, {u'src': None, u'name': u'tzdata', u'sum': [u'md5', u'68e64bf27f5d39550acf3968a958c795'], u'filename': u'tzdata-2013c-1.el5.x86_64.rpm', u'epoch': u'0', u'version': u'2013c', u'release': u'1.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'tzdata-java', u'sum': [u'md5', u'df777d8182b695fc514ecbb57197cd7a'], u'filename': u'tzdata-java-2013c-1.el5.x86_64.rpm', u'epoch': u'0', u'version': u'2013c', u'release': u'1.el5', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}, {u'packages': [{u'src': None, u'name': u'tzdata', u'sum': [u'md5', u'f2570736b936258fcf1534caa2e22922'], u'filename': u'tzdata-2013c-1.el6.noarch.rpm', u'epoch': u'0', u'version': u'2013c', u'release': u'1.el6', u'arch': u'noarch'}, {u'src': None, u'name': u'tzdata', u'sum': [u'md5', u'33d8b1a51270c9020558e02902e56f78'], u'filename': u'tzdata-2013c-1.el6.src.rpm', u'epoch': u'0', u'version': u'2013c', u'release': u'1.el6', u'arch': u'src'}, {u'src': None, u'name': u'tzdata-java', u'sum': [u'md5', u'90f043e2f71b4340e10dc084027aaf20'], u'filename': u'tzdata-java-2013c-1.el6.noarch.rpm', u'epoch': u'0', u'version': u'2013c', u'release': u'1.el6', u'arch': u'noarch'}], u'name': u'ol6_x86_64_latest', u'short': u'ol6_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u"[2013c-2]\n- Update descriptions in iso3166.tab; make Jerusalem coordinates in\n zone.tab more precise\n (0001-Adjust-commentary-to-try-to-defuse-recent-issues-som.patch)\n- Update local mean time for Jerusalem to match more-precise longitude\n (0002-asia-Asia-Jerusalem-Fix-LMT-to-match-more-precise-lo.patch)\n- Move Morocco's midsummer 2013 transitions\n (0003-Move-Morocco-s-midsummer-2013-transitions.patch)\n Fixes 980805 980807 981019 981020\n- Israel now falls back on the last Sunday of October\n (0004-Israel-now-falls-back-on-the-last-Sunday-of-October.patch)", u'issued': u'2013-07-09', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELEA-2013-1025.html', u'type': u'self', u'id': None, u'title': u'ELEA-2013-1025'}], u'_content_type_id': u'erratum', u'_id': u'0e5b0664-5489-415c-b4ff-a6c613784a65', u'from': u'el-errata@oss.oracle.com', u'severity': u'', u'title': u'tzdata enhancement update', u'_ns': u'units_erratum', u'rights': u'Copyright 2013 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 5', u'reboot_suggested': False, u'type': u'enhancement', u'pkglist': [{u'packages': [{u'src': None, u'name': u'tzdata', u'sum': [u'md5', u'358c3b63b8e447da337cc09cfe4077ee'], u'filename': u'tzdata-2013c-2.el5.src.rpm', u'epoch': u'0', u'version': u'2013c', u'release': u'2.el5', u'arch': u'src'}, {u'src': None, u'name': u'tzdata', u'sum': [u'md5', u'5044b4a87d8408e554777f80bfe2b49a'], u'filename': u'tzdata-2013c-2.el5.x86_64.rpm', u'epoch': u'0', u'version': u'2013c', u'release': u'2.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'tzdata-java', u'sum': [u'md5', u'89decf60f98a5f985b3d13ad5bfdcc3d'], u'filename': u'tzdata-java-2013c-2.el5.x86_64.rpm', u'epoch': u'0', u'version': u'2013c', u'release': u'2.el5', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}, {u'packages': [{u'src': None, u'name': u'tzdata', u'sum': [u'md5', u'7a0ec12c6c0a8e23ceb312d31d0d917b'], u'filename': u'tzdata-2013c-2.el6.noarch.rpm', u'epoch': u'0', u'version': u'2013c', u'release': u'2.el6', u'arch': u'noarch'}, {u'src': None, u'name': u'tzdata', u'sum': [u'md5', u'43d846651e4f058c727040a5407f7a50'], u'filename': u'tzdata-2013c-2.el6.src.rpm', u'epoch': u'0', u'version': u'2013c', u'release': u'2.el6', u'arch': u'src'}, {u'src': None, u'name': u'tzdata-java', u'sum': [u'md5', u'717b01a378e0fb9bc7bef9f71b98c782'], u'filename': u'tzdata-java-2013c-2.el6.noarch.rpm', u'epoch': u'0', u'version': u'2013c', u'release': u'2.el6', u'arch': u'noarch'}], u'name': u'ol6_x86_64_latest', u'short': u'ol6_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u'[3.6.28 2]\n- Update spec version\n\n[3.6.28 1]\n- cciss DUP module', u'issued': u'2013-08-01', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELEA-2013-1130.html', u'type': u'self', u'id': None, u'title': u'ELEA-2013-1130'}], u'_content_type_id': u'erratum', u'_id': u'c4a682a3-98d9-41fd-babb-e3698b370c38', u'from': u'el-errata@oss.oracle.com', u'severity': u'', u'title': u' kmod-cciss', u'_ns': u'units_erratum', u'rights': u'Copyright 2013 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 5', u'reboot_suggested': False, u'type': u'enhancement', u'pkglist': [{u'packages': [{u'src': None, u'name': u'cciss', u'sum': [u'md5', u'9307beffa0de070f44a93e22d48bfde7'], u'filename': u'cciss-3.6.28-2.el5_9.src.rpm', u'epoch': u'0', u'version': u'3.6.28', u'release': u'2.el5_9', u'arch': u'src'}, {u'src': None, u'name': u'kmod-cciss', u'sum': [u'md5', u'7d12c4037347df84035bcd629dbe9f80'], u'filename': u'kmod-cciss-3.6.28-2.el5_9.x86_64.rpm', u'epoch': u'0', u'version': u'3.6.28', u'release': u'2.el5_9', u'arch': u'x86_64'}, {u'src': None, u'name': u'kmod-cciss-xen', u'sum': [u'md5', u'9e184a7d5fcc1e89238ce33ec6f033ae'], u'filename': u'kmod-cciss-xen-3.6.28-2.el5_9.x86_64.rpm', u'epoch': u'0', u'version': u'3.6.28', u'release': u'2.el5_9', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u' libX11-1.0.3-8.0.1.el5\n\n [1.0.3-8.0.1.el5]\n - Add int-overflow.patch (#231694)\n\n xorg-x11-apps-7.1-4.0.1.el5\n\n [7.1-4.0.1.el5]\n - Add int-overflow.patch (bug 231694). ', u'issued': u'2007-06-26', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELSA-2007-0157.html', u'type': u'self', u'id': None, u'title': u'ELSA-2007-0157'}, {u'href': u'http://linux.oracle.com/cve/CVE-2007-1667.html', u'type': u'cve', u'id': u'CVE-2007-1667', u'title': u'CVE-2007-1667'}], u'_content_type_id': u'erratum', u'_id': u'974ac814-ea23-40c7-a2d0-69e3ee8f57d0', u'from': u'el-errata@oss.oracle.com', u'severity': u'Moderate', u'title': u' Moderate: xorg-x11-apps/libX11 security updates ', u'_ns': u'units_erratum', u'rights': u'Copyright 2007 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 5', u'reboot_suggested': False, u'type': u'security', u'pkglist': [{u'packages': [{u'src': None, u'name': u'xorg-x11-apps', u'sum': [u'md5', u'2e47f2d084cd3744b855be89510442c9'], u'filename': u'xorg-x11-apps-7.1-4.0.1.el5.src.rpm', u'epoch': u'0', u'version': u'7.1', u'release': u'4.0.1.el5', u'arch': u'src'}, {u'src': None, u'name': u'xorg-x11-apps', u'sum': [u'md5', u'2ec8522b8f0c48007a420c4362f0e5e4'], u'filename': u'xorg-x11-apps-7.1-4.0.1.el5.x86_64.rpm', u'epoch': u'0', u'version': u'7.1', u'release': u'4.0.1.el5', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u' [5:1.4.1-12.0.3.el4]\n - fix overflow in gecos field handling (#240176, CVE-2007-2683)\n \n [5:1.4.1-12.0.2.el4]\n - buildrequire aspell\n \n [5:1.4.1-12.0.1.el4]\n - validate msgid in APOP authentication (#241201, CVE-2007-1558)\n - fix insecure temp file creation on NFS (#211085, CVE-2006-5297) ', u'issued': u'2007-06-04', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELSA-2007-0386.html', u'type': u'self', u'id': None, u'title': u'ELSA-2007-0386'}, {u'href': u'http://linux.oracle.com/cve/CVE-2007-1558.html', u'type': u'cve', u'id': u'CVE-2007-1558', u'title': u'CVE-2007-1558'}, {u'href': u'http://linux.oracle.com/cve/CVE-2007-2683.html', u'type': u'cve', u'id': u'CVE-2007-2683', u'title': u'CVE-2007-2683'}, {u'href': u'http://linux.oracle.com/cve/CVE-2006-5297.html', u'type': u'cve', u'id': u'CVE-2006-5297', u'title': u'CVE-2006-5297'}], u'_content_type_id': u'erratum', u'_id': u'1b0d4db2-b21e-411a-8088-7f0d8392f6ab', u'from': u'el-errata@oss.oracle.com', u'severity': u'Moderate', u'title': u' Moderate: mutt security update ', u'_ns': u'units_erratum', u'rights': u'Copyright 2007 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 5', u'reboot_suggested': False, u'type': u'security', u'pkglist': [{u'packages': [{u'src': None, u'name': u'mutt', u'sum': [u'md5', u'5a1310b1baeffe60bafac6775c5ecfb9'], u'filename': u'mutt-1.4.2.2-3.0.2.el5.src.rpm', u'epoch': u'5', u'version': u'1.4.2.2', u'release': u'3.0.2.el5', u'arch': u'src'}, {u'src': None, u'name': u'mutt', u'sum': [u'md5', u'62d5a9e85c7448c673ea41bc17fd336d'], u'filename': u'mutt-1.4.2.2-3.0.2.el5.x86_64.rpm', u'epoch': u'5', u'version': u'1.4.2.2', u'release': u'3.0.2.el5', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u" [1.2.3-20.9.el3]\n - validate bytesperline header field when loading PCX files (#247570)\n \n [1.2.3-20.8.el3]\n - reduce GIMP_MAX_IMAGE_SIZE to 2^18 to detect bogus image widths/heights\n (#247570)\n \n [1.2.3-20.7.el3]\n - replace gimp_error() by gimp_message()/gimp_quit() in a few plugins so \n they\n don't crash but gracefully exit when encountering error conditions\n - fix endianness issues in the PSP plugin to avoid it doing (seemingly) \n endless\n loops when loading images\n - fix endianness issues in the PCX plugin which cause it to not detect \n corrupt\n images\n \n [1.2.3-20.6.el3]\n - add ChangeLog entry to psd-invalid-dimensions patch (#247570)\n - validate size values read from files before using them to allocate \n memory in\n various file plugins (#247570, patch by Mukund Sivaraman and Rapha??l \n Quinet,\n adapted)\n - detect invalid image data when reading files in several plugins (#247570,\n patch by Sven Neumann and Rapha??l Quinet, adapted)\n - validate size values read from files before using them to allocate \n memory in\n the PSD and sunras plugins (#247570, patch by Mukund Sivaraman and Sven\n Neumann, partly adapted)\n - add safeguard to avoid crashes while loading corrupt PSD images (#247570,\n patch by Rapha??l Quinet, adapted)\n - convert spec file to UTF-8\n \n [1.2.3-20.5.el3]\n - use adapted upstream PSD fix by Sven Neumann (#244406)\n \n [1.2.3-20.4.el3]\n - refuse to open PSD files with insanely large dimensions (#244406) ", u'issued': u'2007-09-26', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELSA-2007-0513.html', u'type': u'self', u'id': None, u'title': u'ELSA-2007-0513'}, {u'href': u'http://linux.oracle.com/cve/CVE-2006-4519.html', u'type': u'cve', u'id': u'CVE-2006-4519', u'title': u'CVE-2006-4519'}, {u'href': u'http://linux.oracle.com/cve/CVE-2007-2949.html', u'type': u'cve', u'id': u'CVE-2007-2949', u'title': u'CVE-2007-2949'}, {u'href': u'http://linux.oracle.com/cve/CVE-2007-3741.html', u'type': u'cve', u'id': u'CVE-2007-3741', u'title': u'CVE-2007-3741'}], u'_content_type_id': u'erratum', u'_id': u'58e36ebd-8eb0-4615-9f6a-8bcb4c884d46', u'from': u'el-errata@oss.oracle.com', u'severity': u'Moderate', u'title': u' Moderate: gimp security update ', u'_ns': u'units_erratum', u'rights': u'Copyright 2007 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 5', u'reboot_suggested': False, u'type': u'security', u'pkglist': [{u'packages': [{u'src': None, u'name': u'gimp', u'sum': [u'md5', u'075aec8bf3483693e8b5cb7120104b81'], u'filename': u'gimp-2.2.13-2.0.7.el5.src.rpm', u'epoch': u'2', u'version': u'2.2.13', u'release': u'2.0.7.el5', u'arch': u'src'}, {u'src': None, u'name': u'gimp', u'sum': [u'md5', u'e62fff99200fc58e7da05695c9c9ae6d'], u'filename': u'gimp-2.2.13-2.0.7.el5.x86_64.rpm', u'epoch': u'2', u'version': u'2.2.13', u'release': u'2.0.7.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'gimp-devel', u'sum': [u'md5', u'3cf847e9f10974df9cbec1f20ac11f37'], u'filename': u'gimp-devel-2.2.13-2.0.7.el5.i386.rpm', u'epoch': u'2', u'version': u'2.2.13', u'release': u'2.0.7.el5', u'arch': u'i386'}, {u'src': None, u'name': u'gimp-devel', u'sum': [u'md5', u'7c2090c34e71db8ce131b1e4d3f7b2ca'], u'filename': u'gimp-devel-2.2.13-2.0.7.el5.x86_64.rpm', u'epoch': u'2', u'version': u'2.2.13', u'release': u'2.0.7.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'gimp-libs', u'sum': [u'md5', u'91714705bada2bf5d687d1dd21b4683e'], u'filename': u'gimp-libs-2.2.13-2.0.7.el5.i386.rpm', u'epoch': u'2', u'version': u'2.2.13', u'release': u'2.0.7.el5', u'arch': u'i386'}, {u'src': None, u'name': u'gimp-libs', u'sum': [u'md5', u'34be3720d788dc289899cd903304b108'], u'filename': u'gimp-libs-2.2.13-2.0.7.el5.x86_64.rpm', u'epoch': u'2', u'version': u'2.2.13', u'release': u'2.0.7.el5', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u" [1.0.2-4]\n - Fix root priv elevation bug (242903). Just don't delete the\n directory and make sure when we create the directory, that we set\n the mode using mkdir -m. ", u'issued': u'2007-07-12', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELSA-2007-0520.html', u'type': u'self', u'id': None, u'title': u'ELSA-2007-0520'}, {u'href': u'http://linux.oracle.com/cve/CVE-2007-3103.html', u'type': u'cve', u'id': u'CVE-2007-3103', u'title': u'CVE-2007-3103'}], u'_content_type_id': u'erratum', u'_id': u'cb397786-75d9-4f69-b9fb-ac27e1d09166', u'from': u'el-errata@oss.oracle.com', u'severity': u'Moderate', u'title': u' Moderate: xorg-x11-xfs security update ', u'_ns': u'units_erratum', u'rights': u'Copyright 2007 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 5', u'reboot_suggested': False, u'type': u'security', u'pkglist': [{u'packages': [{u'src': None, u'name': u'xorg-x11-xfs', u'sum': [u'md5', u'b3a228379128926767b6faecf4f5a584'], u'filename': u'xorg-x11-xfs-1.0.2-4.src.rpm', u'epoch': u'1', u'version': u'1.0.2', u'release': u'4', u'arch': u'src'}, {u'src': None, u'name': u'xorg-x11-xfs', u'sum': [u'md5', u'5a919ff06521d39cc9f4c12821893d11'], u'filename': u'xorg-x11-xfs-1.0.2-4.x86_64.rpm', u'epoch': u'1', u'version': u'1.0.2', u'release': u'4', u'arch': u'x86_64'}, {u'src': None, u'name': u'xorg-x11-xfs-utils', u'sum': [u'md5', u'95c2a0150d560627c1415300986ed35c'], u'filename': u'xorg-x11-xfs-utils-1.0.2-4.x86_64.rpm', u'epoch': u'1', u'version': u'1.0.2', u'release': u'4', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u' [0.31-4.el3]\n - Resolves: rhbz#245616\n - Backport patch to fix dn_expand looping issue\n - Backport patch to randomize ID field\n - Also allow disabling of online tests ', u'issued': u'2007-07-12', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELSA-2007-0674.html', u'type': u'self', u'id': None, u'title': u'ELSA-2007-0674'}, {u'href': u'http://linux.oracle.com/cve/CVE-2007-3377.html', u'type': u'cve', u'id': u'CVE-2007-3377', u'title': u'CVE-2007-3377'}, {u'href': u'http://linux.oracle.com/cve/CVE-2007-3409.html', u'type': u'cve', u'id': u'CVE-2007-3409', u'title': u'CVE-2007-3409'}], u'_content_type_id': u'erratum', u'_id': u'20219c14-1669-49ee-9326-f5f79e13d3dc', u'from': u'el-errata@oss.oracle.com', u'severity': u'Moderate', u'title': u' Moderate: perl-Net-DNS security update ', u'_ns': u'units_erratum', u'rights': u'Copyright 2007 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 5', u'reboot_suggested': False, u'type': u'security', u'pkglist': [{u'packages': [{u'src': None, u'name': u'perl-Net-DNS', u'sum': [u'md5', u'b9fe3cc1f4f58c4eac43de85f15afb15'], u'filename': u'perl-Net-DNS-0.59-3.el5.src.rpm', u'epoch': u'0', u'version': u'0.59', u'release': u'3.el5', u'arch': u'src'}, {u'src': None, u'name': u'perl-Net-DNS', u'sum': [u'md5', u'bae31aa55a3053fc26e6268536398ca6'], u'filename': u'perl-Net-DNS-0.59-3.el5.x86_64.rpm', u'epoch': u'0', u'version': u'0.59', u'release': u'3.el5', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u' [3.3.6-23]\n - Resolves: #277011, Qt UTF8 improper character expansion, CVE-2007-0242\n - Resolves: #269141, Qt off by one buffer overflow, CVE-2007-413 ', u'issued': u'2007-09-13', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELSA-2007-0883.html', u'type': u'self', u'id': None, u'title': u'ELSA-2007-0883'}, {u'href': u'http://linux.oracle.com/cve/CVE-2007-0242.html', u'type': u'cve', u'id': u'CVE-2007-0242', u'title': u'CVE-2007-0242'}, {u'href': u'http://linux.oracle.com/cve/CVE-2007-4137.html', u'type': u'cve', u'id': u'CVE-2007-4137', u'title': u'CVE-2007-4137'}], u'_content_type_id': u'erratum', u'_id': u'75b018ef-1546-45e1-8ef0-81402473630c', u'from': u'el-errata@oss.oracle.com', u'severity': u'Important', u'title': u' Important: qt security update ', u'_ns': u'units_erratum', u'rights': u'Copyright 2007 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 5', u'reboot_suggested': False, u'type': u'security', u'pkglist': [{u'packages': [{u'src': None, u'name': u'qt', u'sum': [u'md5', u'f5eae086f72e47bf46beea6b9aa6fb53'], u'filename': u'qt-3.3.6-23.el5.i386.rpm', u'epoch': u'1', u'version': u'3.3.6', u'release': u'23.el5', u'arch': u'i386'}, {u'src': None, u'name': u'qt', u'sum': [u'md5', u'29973bdb22aff1e9fa5fdd60186d640d'], u'filename': u'qt-3.3.6-23.el5.src.rpm', u'epoch': u'1', u'version': u'3.3.6', u'release': u'23.el5', u'arch': u'src'}, {u'src': None, u'name': u'qt', u'sum': [u'md5', u'9e9bbdc7eed92cd0ca5b315549fbe4cf'], u'filename': u'qt-3.3.6-23.el5.x86_64.rpm', u'epoch': u'1', u'version': u'3.3.6', u'release': u'23.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'qt-MySQL', u'sum': [u'md5', u'95a10a89d56777922bf93dd15f89d4f2'], u'filename': u'qt-MySQL-3.3.6-23.el5.x86_64.rpm', u'epoch': u'1', u'version': u'3.3.6', u'release': u'23.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'qt-ODBC', u'sum': [u'md5', u'73fd8a3c6b7a0651dedb3390b3a244b2'], u'filename': u'qt-ODBC-3.3.6-23.el5.x86_64.rpm', u'epoch': u'1', u'version': u'3.3.6', u'release': u'23.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'qt-PostgreSQL', u'sum': [u'md5', u'1301b06399a4a9fe602b3bc008d250a2'], u'filename': u'qt-PostgreSQL-3.3.6-23.el5.x86_64.rpm', u'epoch': u'1', u'version': u'3.3.6', u'release': u'23.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'qt-config', u'sum': [u'md5', u'e915ab9e44e3e3ff1e96f2f7f47d73fe'], u'filename': u'qt-config-3.3.6-23.el5.x86_64.rpm', u'epoch': u'1', u'version': u'3.3.6', u'release': u'23.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'qt-designer', u'sum': [u'md5', u'bd6e0dcaf6f510d61c2b5a2595eb0186'], u'filename': u'qt-designer-3.3.6-23.el5.x86_64.rpm', u'epoch': u'1', u'version': u'3.3.6', u'release': u'23.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'qt-devel', u'sum': [u'md5', u'f3bf2163af85d741afeb7e3cf3d5dbef'], u'filename': u'qt-devel-3.3.6-23.el5.i386.rpm', u'epoch': u'1', u'version': u'3.3.6', u'release': u'23.el5', u'arch': u'i386'}, {u'src': None, u'name': u'qt-devel', u'sum': [u'md5', u'12d68fb7a48dd4caeb48570f209b5571'], u'filename': u'qt-devel-3.3.6-23.el5.x86_64.rpm', u'epoch': u'1', u'version': u'3.3.6', u'release': u'23.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'qt-devel-docs', u'sum': [u'md5', u'771c39b6fedecc2c52ffc047d0aa11ab'], u'filename': u'qt-devel-docs-3.3.6-23.el5.x86_64.rpm', u'epoch': u'1', u'version': u'3.3.6', u'release': u'23.el5', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u' [1.1.0-7.el_4.2]\n - Add RHEL-5 patch to remove execstack requirement\n Related: rhbz #332591\n \n [1.1.0-7.el_4.1]\n - Add patch from Takashi Iwai to fix CVE-2007-4619\n Resolves: rhbz #332591 ', u'issued': u'2007-10-22', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELSA-2007-0975.html', u'type': u'self', u'id': None, u'title': u'ELSA-2007-0975'}, {u'href': u'http://linux.oracle.com/cve/CVE-2007-4619.html', u'type': u'cve', u'id': u'CVE-2007-4619', u'title': u'CVE-2007-4619'}, {u'href': u'http://linux.oracle.com/cve/CVE-2007-6277.html', u'type': u'cve', u'id': u'CVE-2007-6277', u'title': u'CVE-2007-6277'}], u'_content_type_id': u'erratum', u'_id': u'c59b6246-026f-4d23-a653-85e08fb63e36', u'from': u'el-errata@oss.oracle.com', u'severity': u'Important', u'title': u' Important: flac security update ', u'_ns': u'units_erratum', u'rights': u'Copyright 2007 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 5', u'reboot_suggested': False, u'type': u'security', u'pkglist': [{u'packages': [{u'src': None, u'name': u'flac', u'sum': [u'md5', u'ac476f5dc0bec78363eb172f5a5e21e1'], u'filename': u'flac-1.1.2-28.el5_0.1.i386.rpm', u'epoch': u'0', u'version': u'1.1.2', u'release': u'28.el5_0.1', u'arch': u'i386'}, {u'src': None, u'name': u'flac', u'sum': [u'md5', u'64a114a14569988cae08f4d18d1f99b1'], u'filename': u'flac-1.1.2-28.el5_0.1.src.rpm', u'epoch': u'0', u'version': u'1.1.2', u'release': u'28.el5_0.1', u'arch': u'src'}, {u'src': None, u'name': u'flac', u'sum': [u'md5', u'33dd75594f21c28e271f01797f9cdccc'], u'filename': u'flac-1.1.2-28.el5_0.1.x86_64.rpm', u'epoch': u'0', u'version': u'1.1.2', u'release': u'28.el5_0.1', u'arch': u'x86_64'}, {u'src': None, u'name': u'flac-devel', u'sum': [u'md5', u'04570d4e19e222a46e8eaf1367a3de81'], u'filename': u'flac-devel-1.1.2-28.el5_0.1.i386.rpm', u'epoch': u'0', u'version': u'1.1.2', u'release': u'28.el5_0.1', u'arch': u'i386'}, {u'src': None, u'name': u'flac-devel', u'sum': [u'md5', u'5d9f9a40f41edccfd0657e15a8f822f7'], u'filename': u'flac-devel-1.1.2-28.el5_0.1.x86_64.rpm', u'epoch': u'0', u'version': u'1.1.2', u'release': u'28.el5_0.1', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u' [0.6.13-4.0.2.el5_1.1]\n - Add patch for CVE-2007-6351. Fixes bug #425681\n - Add patch for CVE-2007-6352. Fixes bug #425681 ', u'issued': u'2007-12-19', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELSA-2007-1165.html', u'type': u'self', u'id': None, u'title': u'ELSA-2007-1165'}, {u'href': u'http://linux.oracle.com/cve/CVE-2007-6351.html', u'type': u'cve', u'id': u'CVE-2007-6351', u'title': u'CVE-2007-6351'}, {u'href': u'http://linux.oracle.com/cve/CVE-2007-6352.html', u'type': u'cve', u'id': u'CVE-2007-6352', u'title': u'CVE-2007-6352'}], u'_content_type_id': u'erratum', u'_id': u'5d0c5a9a-ccbd-466f-ae64-4f6d62019758', u'from': u'el-errata@oss.oracle.com', u'severity': u'Na', u'title': u' Moderate:libexif security update ', u'_ns': u'units_erratum', u'rights': u'Copyright 2007 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 5', u'reboot_suggested': False, u'type': u'security', u'pkglist': [{u'packages': [{u'src': None, u'name': u'libexif', u'sum': [u'md5', u'71609f57a973822e2cf870dea4b7f177'], u'filename': u'libexif-0.6.13-4.0.2.el5_1.1.i386.rpm', u'epoch': u'0', u'version': u'0.6.13', u'release': u'4.0.2.el5_1.1', u'arch': u'i386'}, {u'src': None, u'name': u'libexif', u'sum': [u'md5', u'adff399fd0770ba02b48e74bf6bfa0f7'], u'filename': u'libexif-0.6.13-4.0.2.el5_1.1.src.rpm', u'epoch': u'0', u'version': u'0.6.13', u'release': u'4.0.2.el5_1.1', u'arch': u'src'}, {u'src': None, u'name': u'libexif', u'sum': [u'md5', u'c35df5fd17255bb8ffc8d880fae92f91'], u'filename': u'libexif-0.6.13-4.0.2.el5_1.1.x86_64.rpm', u'epoch': u'0', u'version': u'0.6.13', u'release': u'4.0.2.el5_1.1', u'arch': u'x86_64'}, {u'src': None, u'name': u'libexif-devel', u'sum': [u'md5', u'cca0c1efd67fe8b2d35af130b72803fc'], u'filename': u'libexif-devel-0.6.13-4.0.2.el5_1.1.i386.rpm', u'epoch': u'0', u'version': u'0.6.13', u'release': u'4.0.2.el5_1.1', u'arch': u'i386'}, {u'src': None, u'name': u'libexif-devel', u'sum': [u'md5', u'4daf89dcb09fbd712ceebe61e99d5a8c'], u'filename': u'libexif-devel-0.6.13-4.0.2.el5_1.1.x86_64.rpm', u'epoch': u'0', u'version': u'0.6.13', u'release': u'4.0.2.el5_1.1', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u' wireshark-0.99.7-1.el5.0.1:\n \n [0.99.7-1.el5.0.1]\n - Add oracle-ocfs2-network.patch\n \n [0.99.7-1]\n - upgrade to 0.99.7\n - switch to libsmi from net-snmp\n - disable ADNS due to its lack of Ipv6 support\n - Resolves: #397411\n \n libsmi-0.4.5-2.el5:\n \n [0.4.5-2]\n - Handle rpath problems in 64-bit systems (#209522).\n \n [0.4.5-1]\n - Update to 0.4.5.\n \n [0.4.4-1]\n - Update to 0.4.4.\n \n [0.4.3-1]\n - First build. ', u'issued': u'2008-01-22', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELSA-2008-0058.html', u'type': u'self', u'id': None, u'title': u'ELSA-2008-0058'}, {u'href': u'http://linux.oracle.com/cve/CVE-2007-6111.html', u'type': u'cve', u'id': u'CVE-2007-6111', u'title': u'CVE-2007-6111'}, {u'href': u'http://linux.oracle.com/cve/CVE-2007-6112.html', u'type': u'cve', u'id': u'CVE-2007-6112', u'title': u'CVE-2007-6112'}, {u'href': u'http://linux.oracle.com/cve/CVE-2007-6113.html', u'type': u'cve', u'id': u'CVE-2007-6113', u'title': u'CVE-2007-6113'}, {u'href': u'http://linux.oracle.com/cve/CVE-2007-6114.html', u'type': u'cve', u'id': u'CVE-2007-6114', u'title': u'CVE-2007-6114'}, {u'href': u'http://linux.oracle.com/cve/CVE-2007-6115.html', u'type': u'cve', u'id': u'CVE-2007-6115', u'title': u'CVE-2007-6115'}, {u'href': u'http://linux.oracle.com/cve/CVE-2007-6116.html', u'type': u'cve', u'id': u'CVE-2007-6116', u'title': u'CVE-2007-6116'}, {u'href': u'http://linux.oracle.com/cve/CVE-2007-6117.html', u'type': u'cve', u'id': u'CVE-2007-6117', u'title': u'CVE-2007-6117'}, {u'href': u'http://linux.oracle.com/cve/CVE-2007-6118.html', u'type': u'cve', u'id': u'CVE-2007-6118', u'title': u'CVE-2007-6118'}, {u'href': u'http://linux.oracle.com/cve/CVE-2007-6119.html', u'type': u'cve', u'id': u'CVE-2007-6119', u'title': u'CVE-2007-6119'}, {u'href': u'http://linux.oracle.com/cve/CVE-2007-6120.html', u'type': u'cve', u'id': u'CVE-2007-6120', u'title': u'CVE-2007-6120'}, {u'href': u'http://linux.oracle.com/cve/CVE-2007-6121.html', u'type': u'cve', u'id': u'CVE-2007-6121', u'title': u'CVE-2007-6121'}, {u'href': u'http://linux.oracle.com/cve/CVE-2007-6438.html', u'type': u'cve', u'id': u'CVE-2007-6438', u'title': u'CVE-2007-6438'}, {u'href': u'http://linux.oracle.com/cve/CVE-2007-6439.html', u'type': u'cve', u'id': u'CVE-2007-6439', u'title': u'CVE-2007-6439'}, {u'href': u'http://linux.oracle.com/cve/CVE-2007-6441.html', u'type': u'cve', u'id': u'CVE-2007-6441', u'title': u'CVE-2007-6441'}, {u'href': u'http://linux.oracle.com/cve/CVE-2007-6450.html', u'type': u'cve', u'id': u'CVE-2007-6450', u'title': u'CVE-2007-6450'}, {u'href': u'http://linux.oracle.com/cve/CVE-2007-6451.html', u'type': u'cve', u'id': u'CVE-2007-6451', u'title': u'CVE-2007-6451'}], u'_content_type_id': u'erratum', u'_id': u'd7d8012b-7cdd-4e0f-964e-933327bd5b67', u'from': u'el-errata@oss.oracle.com', u'severity': u'Moderate', u'title': u' Moderate: wireshark security update ', u'_ns': u'units_erratum', u'rights': u'Copyright 2008 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 5', u'reboot_suggested': False, u'type': u'security', u'pkglist': [{u'packages': [{u'src': None, u'name': u'libsmi', u'sum': [u'md5', u'487175cd9d654625f3af7c730b922ada'], u'filename': u'libsmi-0.4.5-2.el5.i386.rpm', u'epoch': u'0', u'version': u'0.4.5', u'release': u'2.el5', u'arch': u'i386'}, {u'src': None, u'name': u'libsmi', u'sum': [u'md5', u'1fc5579a8da58b8574233c66db8c0d2a'], u'filename': u'libsmi-0.4.5-2.el5.src.rpm', u'epoch': u'0', u'version': u'0.4.5', u'release': u'2.el5', u'arch': u'src'}, {u'src': None, u'name': u'libsmi', u'sum': [u'md5', u'28e1b6dbbe5d716926a4b3971221ca33'], u'filename': u'libsmi-0.4.5-2.el5.x86_64.rpm', u'epoch': u'0', u'version': u'0.4.5', u'release': u'2.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'libsmi-devel', u'sum': [u'md5', u'1f411f1dd9b0c40214df8fdef91ebc48'], u'filename': u'libsmi-devel-0.4.5-2.el5.i386.rpm', u'epoch': u'0', u'version': u'0.4.5', u'release': u'2.el5', u'arch': u'i386'}, {u'src': None, u'name': u'libsmi-devel', u'sum': [u'md5', u'3c14f7aa24c279179906cc551b05ace4'], u'filename': u'libsmi-devel-0.4.5-2.el5.x86_64.rpm', u'epoch': u'0', u'version': u'0.4.5', u'release': u'2.el5', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u"setroubleshoot:\n[2.0.5-3.0.1.el5]\n- replace missed references to bugzilla.redhat.com with linux.oracle.com\n\n[2.0.5-3]\n- Resolve: bug #436564: socket.getsockopt() on ppc generates exception\n Fix typo in original setroubleshoot-get_credentials.patch\n\n[2.0.5-2]\n- Resolve: bug #437857: python error in system shutdown\n - Resolve: bug #436564: socket.getsockopt() on ppc generates exception\n\n[2.0.5-1]\n- Resolve: bug #431768: parser error in xmlParseDoc()\n\n[2.0.3-3]\n- Resolve: bug #429179: notification-daemon crashes when a notification is removed from the display\n\n[2.0.3-2]\n- remove libuser-python dependency\n - Related: bug #224351\n\n[2.0.2-1]\n- Resolve bug #428252: Problem with update/remove old version\n - Add code to validate xml database version, if file is incompatible it is not read,\n the next time the database is written it will be in the new version format.\n This means the database contents are not preserved across database version upgrades.\n - Remove postun trigger from spec file used to clear database between incompatible versions\n the new database version check during database read will handle this instead\n - bullet proof exit status in init script and rpm scriptlets\n - Resolve bug #247302: setroubleshoots autostart .desktop file fails to start under a KDE session\n - Resolve bug #376041: Cannot check setroubleshoot service status as non-root\n - Resolve bug #332281: remove obsolete translation\n - Resolve bug #344331: No description in gnome-session-properties\n - Resolve bug #358581: missing libuser-python dependency\n - Resolve bug #426586: Renaming translation po file from sr@Latn to sr@latin\n - Resolve bug #427260: German Translation\n - enhance the sealert man page\n\n[2.0.1-1]\n- make connection error message persist instead of timeout in browser\n - updated Brazilian Portuguese translation: Igor Pires Soares <igor@fedoraproject.org>\n - implement uid,username checks\n - rpc methods now check for authenticated state\n - fix html handling of summary string\n - add 'named' messages to status bar, make sure all messages either timeout or are named\n - fix ordering of menus, resolves bug #427418\n - add 'hide quiet' to browser view filtering, resolves bug #427421\n - tweak siginfo text formatting\n\n[2.0.0-1]\n- prepare for v2 test release\n - Completed most work for version 2 of setroubleshoot, prepare for test release\n - import Dans changes from the mainline\n primarily allow_postfix_local_write_mail_spool plugin\n - escape html, fix siginfo.format_html(), siginfo.format_text()\n - add async-error signal\n - change identity to just username\n - make sure set_filter user validation works and reports error in browser\n - fix generation of line numbers and host when connected to audispd\n - add permissive notification, resolves bug #231334: Wording doesnt change for permissive mode\n - resolves bug #244345: avc path information incomplete\n - get the uid,gid when a client connects to the server\n - set_filter now verifies the filter is owned by the user,\n - resolves bug #288261: setroubleshoot lack of user authentication\n - remove filter options which werent being used\n - change '@' in audit data hostname to '.'\n - remove restart dialog\n resolves bug #321171: sealerts dialog after update is higly confusing\n - fix rpc xml arg\n - fix handling of host value\n - tweak what fields are in signature\n - move data items which had been in 'avc' object into siginfo\n - clean up siginfo format\n - large parts of new audit data pipeline working, checkpoint\n - fix duplicate xml nodes when generating xml tree\n - audit event can now be xml serialized\n - switch from using ints for audit record types to strings\n - avoid conversion headaches and possibilty of not being\n able to convert a new unknown type\n - add logic to allow XmlSerialize to be subclassed and init_from_xml_node to be overridden\n - add support to xml serialize classes AuditEventID, AuditEvent, AuditRecord\n - use metaclass for xml class init\n - start adding xml support to audit data classes\n - Use metaclass to wrap class init\n - move xml serialization code from signature.py to xml_serialize.py\n - simplify aspect of the serialization code\n - add unstructured xml mapping, each xml element name has its content mapped to obj.name\n - modify xml serialization to be driven by xml contents\n - general clean up\n - checkpoint conversion of serialization to use metaclasses\n - clean up class/data specifications for XmlSerializable\n - add support for client rpc testing\n - add changelog entry\n - add SubProcess class to setroubleshootd in preparation to\n - run daemon as subprocess so we can gather results and\n compare them to the expected data we sent\n - rewrite all plugins to use new v2 audit data\n - add SubProcess class to setroubleshootd in preparation to \n run daemon as subprocess so we can gather results and\n compare them to the expected data we sent\n - add new test support: add config section 'test', add boolean 'analyze' to\n config test section, add class TestPluginReportReceiver which is installed\n if test.analyze is True, it prints analysis report. In test_setroubleshootd\n send AUDIT_EOE to assure sequential event processing so analysis results\n have same ordering as events that are sent by test_setroubleshootd\n - alert signatures now include host information, alerts will be grouped by host\n\n[1.10.7-1]\n- Fix spec file requires for opening an HTML page\n In configure.ac search for xdg-open and htmlview in priority order,\n set variable html_browser_open to the one found, in spec file require\n xdg-utils for fedora and htmlview for RHEL.\n - add 'Host' column in browser\n add 'Toggle Column Visibility' menu to toggle display of any column on/off\n - Resolves bug #310261: setroubleshoot notifications arent throttled\n - add support for AUDIT_EOE, end-of-event, if AUDIT_EOE immediately\n emit cached event. Disable timeouts used to flush events if\n AUDIT_EOE has been seen.\n\n[1.10.6-1]\n- make selinx-policy requires in spec file specific to dist tag\n\n[1.10.5-1]\n- update code for command line log file scanning to work with\n new log file scanning code introduced for the browser.\n - update Bulgarian translation (Doncho N. Gunchev (gunchev@gmail.com))\n - update Polish translation (Piotr Drag (raven@pmail.pl))\n - Resolves bug #239893: sealert wakes up very often\n This was caused by the use of threads and pygtks thread signal\n handling. The only use of threads in sealert was for log file\n scanning so that the UI would remain responsive during a\n scan. Threads in sealert have now been completely\n removed. Instead the scanning work is performed in a gobject idle\n function called from the main loop. The idle function is written\n as a python generator function which allows for the function to\n perform a small amount of work, save its execution state and\n return. The next time the idle function is called from the main\n loop it resumes execution from its last state until it decides\n to yield control again. This way the long running scan/analysis\n can be performed in small successive units of work during the\n time the application is otherwise idle and it does not interfere\n with the rest of the GUI event processing. Everything now occurs\n in an event loop, think of it as the applications process/thread\n scheduler whose event handlers execute time slices.\n - rewrote parts of the audit input pipeline to use generators\n instead of callbacks, thus permitting the logfile scanning code\n to yield control with more granularity. Also updated\n test_setroubleshootd and audisp_listen to use the new\n generator/yield logic.\n - rewrote the dialog used for scanning log files, progress bar\n updates are now in the dialog, the scan can be terminated part\n way through, errors from the scan are reported in pop-up dialog,\n one can only dismiss the dialog with success if the scan had\n been successfully run to completion, otherwise the user is only\n left with the option to cancel.\n - Relates bug #252035 bug #247469, setroubleshootd and sealert should\n exit if SELinux is disabled.\n - add utility functions escape_html() and unescape_html()\n - fix initial sort order in browser, track sort order in browser\n - modify AVC.get_path() to only return a value if the 'path' field is\n set, formerly it also considered the fields 'name' & 'file' which were\n incorrect. get_path() now also looks to see if the string begins with a\n slash for a fully qualified path, if not it looks to see if its a \n pseudo path such as 'pipe[12345]' or 'socket[12345]' and if so strips out\n the instance information inside the brackets and returns just the type of \n the pseudo path. This is done because we do not want path information\n in the signature to be unique for each instance of the denial.\n\n - modify the TimeStamp class to hide its internal datetime member,\n remove the cmp() method, the internal __cmp__ will be automatically invoked.\n\n - require selinux policy version in spec file to allow system dbus use\n \n - Resolves bug #256601: audit2allow generates incorrect syntax when comma ',' in\n denied list\n\n - update po i18n files\n\n - Add support for pruning database by age and size\n\n[1.10.4-1]\n- fix init script\n\n[1.10.3-1]\n- modify avc_audit.py to use new audit_data.py implementation\n\n - can listen for audit events on either /var/run/audit_events\n in bindary protocol mode or /var/run/audisp_events in\n text protocol mode\n\n[1.10.2-1]\n- remove all copied code from test_setroubleshootd, now we import\n from setroubleshoot\n - export ClientConnectionHandler from rpc.py as a base class.\n Derive SetroubleshootdClientConnectionHandler and\n AuditClientConnectionHandler from ClientConnectionHandler.\n - add audisp_listen as test program\n - create setroubleshoot sym link in top devel directory pointing\n to src so import setroubleshoot.foo if PYTHONPATH=topdir\n - add get_option, convert_cfg_type to config.py.in so that one\n can pass optional dict to override config file settings\n - rewrite log_init() so its easier for other programs to use it,\n fix the import logic concering log & config\n - remove log code from test_setroubleshoot, now just does import\n from setroubleshoot.\n - test_setroubleshootd can now handle audit records in both text\n and binary formats, can be selected by command line arg. It can now\n either output to clients connecting on a socket or to stdout. Can\n now optionally exit after N socket client connections.\n - remove non audit record lines from test data\n - remove config_init() and log_init() from package __init__.py\n It was the wrong place to call them, now call them when the\n process initializes before the first setroubleshoot imports\n - add parse_config_setting() and set_config() to config module\n - setroubleshootd now accepts -c --config command line arg\n - test_sectroubleshoot: add err defines & program_error exception\n add is_valid() tests to assure we read a valid audit record\n log the unrecognized line if not valid, clean up socket close()\n\n - Relates Bug #247056, update initscript to LSB standards\n Note: LSB initscripts in Fedora is not yet a resolved issue,\n the changes implemented were to add an LSB block and support\n the new LSB try-restart and force-reload commands. However\n the new /lib/lsb/init-functions are NOT currently used as this\n is the unstable part.\n\n[1.10.1-1]\n- add BuildRequires perl-XML-Parser\n\n[1.10.0-1]\n- move all plugins and their translations to independent package\n - wrap XML generation inside try/except\n - correct how access list is obtained in avc_auparse.py\n - add try/except around top level of AnalyzeThread.run so exceptions\n in the thread get reported and the analysis thread does not just die.\n - also add try/except around LogfileThread.process_logfile\n - add new function assure_file_ownership_permissions()\n - server now forces its database file permissions/ownership to be 0600 root:root\n - rpm now forces the servers database file permissions/ownership to be 0600 root:root\n - Resolves Bug #251545: Review Request: setroubleshoot-plugins - analysis plugins for setroubleshoot\n - clean up some other rpmlint warnings in setroubleshoot.spec\n - fix missing install of setroubleshoot icon and sym link to it\n - Resolves Bug #251551, setroubleshoot shows up in in wrong desktop menu\n also run desktop-file-install in rpm install\n - add /etc/dbus-1/system.d/setroubleshootd.conf dbus configuration file\n - Resolves Bug #250979, Bug #250932 Missing dependencies\n - Restore plugins/Makefile.am which got nuked somehow\n - remove dus.dbus_bindings.bus_name_has_owner(), deprecated as of F7\n - wrap rpm transactions in try/except\n\n[1.9.7-1]\n- Resolves Bug# 241739, this bug is the lead bug for several bug reports,\n all consequences of the same problem, setroubleshootd/sealert when run\n in a non latin language environment because of incompatibilities in\n i18n encoding between components.\n\n[1.9.6-1]\n- add avc_auparse.py, now has option to use audit parsing library instead of\n built-in audit parsing.\n - fix bug in log file scanning and detail display update\n - Resolves Bug# 238516, python pkg directory not owned\n\n[1.9.5-1]\n- Update translations\n - Fix mislabeled file\n\n[1.9.4-1]\n- Remove disable_trans boolean\n - Check for paths in filesystem before suggesting chcon -R \n - Remove default to listen on local ports\n\n[1.9.3-1]\n- install icon in /usr/share/icons, refer to icon by name using standard API\n - Fix performance problems in setroubleshoot browser log file scanning\n - Significant rewrite of data/view management code in setroubleshoot\n browser. data and view now cleanly separated, can easily switch\n between data views while maintaining selections, view state, with\n proper update of status information in status area\n - Resolves Bug# 227806: right click context menu resets selection\n - Logfile scans now operate in independent thread, proper asynchronous\n updates of browser during scan, browser used to appear to hang\n - Resolved Bug# 224340: Rewrite Menu/Toobar/Popup to use UIManger instead of glade\n - Add toobar support\n - Implement GUI to edit email recipient list in setroubleshoot browser\n - Added user help to setroubleshoot browser\n - Related Bug# 224343: Fix setroubleshoot browser to respond to desktop theme changes\n - improve traceback error reporting in sealert\n - rewrite AboutDialog, replacing glade version\n - Resolves bug #229849 Bug# 230115, Related bug #221850: fix uuid code to resolve\n '_uuid_generate_random' is not defined error\n\n[1.9.2-1]\n- Suck in AuditMsg since audit libs are dropping support\n\n[1.9.1-1]\n- Split into server and gui packages\n\n[1.8.19-1]\n- Remove use of ctypes in uuid, which is causing bad avc messages\n\n[1.8.18-1]\n- Remove avc from Plugin.py\n\n[1.8.17-1]\n- Remove tempfile handling in util.py. Causes lots of avcs and is not used\n\n[1.8.16-1]\n - Resolved: Bug# 224343 sealerts 'Aditional Info:' text should be in white box\n - Resolved: Bug# 224336 sealert should have GtkRadioButtons in menu View\n - Related: bug #224351\n Rewrite parts of logging support to better support changing output\n categories, output destinations. Now -v -V verbose works in sealert.\n - Resolves bug# 225161, granted AVCs incorrectly identified as a denial\n - add alert count to status bar\n - add 'Help' command to Help menu, opens web browser on wiki User FAQ\n [Dan Walsh <dwalsh@redhat.com>]\n - Make setroubleshoot.logrotate correctly\n\n[1.8.15-1]\n- Update po\n - Additional Plugins\n - Cleanup Plugins\n\n[1.8.14-1]\n- Resolved: bug# 221850\n plugin module loading was failing in python 2.5 with the message\n 'SystemError: Parent module 'plugins' not loaded'. This is due to a\n change in behavior between python 2.4 and 2.5, in python 2.4 the lack\n of a parent module was silently ignored. The fix is to load\n plugins.__init__ first.\n\n[1.8.13-1]\n- update translations\n\n - change SETroubleshootDatabase so it is optional if its backed\n by a file, this fixes the problem of us littering temporary files\n when scanning logfiles which does not require persistence.\n\n - disable the view logfile menu item if no logfile has been opened\n\n - fix redundant log messages for case where there is no log file and\n the console flag is set. When there is no log file the logging\n module opens a console stream, thus the console stream produced\n by the console flag was redundant.\n\n - add username and password command line arguments\n rework startup logic so that all command line args are processed\n before we do any real work\n \n - rework the email preferences so that each email address can\n have a filter type associated with it.\n\n add a new filter_type 'Ignore After First Alert' which filters\n after the first alert has been delivered\n\n - add UI for setting the email addresses alerts are sent to.\n Add menu item to edit email list, add email list dialog.\n Remove 'recipient' config file entry, now list is stored\n in seperate file. Add rpc to query and set the email list,\n the GUI calls this to get the current list from the server\n and set it in the server, it is the server which reads and \n writes the file. Add 'enable' flag to each email entry.\n Modify how the server iterates over the email list when it\n receives an alert. When marking an alert as having been sent\n the username is the email address but with 'email:' prepended so\n as not to collide with non-email filtering options for the same user.\n\n[1.8.12-1]\n- remove obsolte requires for python element tree\n\nsetroubleshoot-plugins:\n[2.0.4-2]\n- change requires setroubleshoot to requires setroubleshoot-server\n\n[2.0.4-1]\n- Resolve: bug #431768: parser error in xmlParseDoc()\n\n[2.0.3-2]\n- remove dependency on policycoreutils\n - Related: bug #224351\n\n[2.0.2-1]\n- Add catchall_boolean.py plugin\n\n[2.0.1-1]\n- Resolve bug #332281: remove obsolete translation\n - Resolve bug #426586: Renaming translation po file from sr@Latn to sr@latin\n\n[2.0.0-1]\n- prepare for v2 test release\n\n[1.10.4-1]\n- Add allow_postfix_local_write_mail_spool plugin\n - Fix execute typo\n\n[1.10.3-1]\n- rewrite all plugins to use new v2 audit data\n\n[1.10.3-1]\n- Resolves bug #231762: Original PO strings bugs\n\n[1.10.2-1]\n- Change priority on use_nfs_home_dir to 55\n\n[1.10.1-1]\n- add BuildRequires perl-XML-Parser\n\n[1.10.0-1]\n- move all plugins and their translations from setroubleshoot-server\n package to this new independent package to allow easier updating\n of just the plugins", u'issued': u'2008-05-30', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELSA-2008-0061.html', u'type': u'self', u'id': None, u'title': u'ELSA-2008-0061'}, {u'href': u'http://linux.oracle.com/cve/CVE-2007-5495.html', u'type': u'cve', u'id': u'CVE-2007-5495', u'title': u'CVE-2007-5495'}, {u'href': u'http://linux.oracle.com/cve/CVE-2007-5496.html', u'type': u'cve', u'id': u'CVE-2007-5496', u'title': u'CVE-2007-5496'}], u'_content_type_id': u'erratum', u'_id': u'67c4c436-dae6-4fa4-9b1f-49512f0d0270', u'from': u'el-errata@oss.oracle.com', u'severity': u'Moderate', u'title': u' setroubleshoot security and bug fix update', u'_ns': u'units_erratum', u'rights': u'Copyright 2008 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 5', u'reboot_suggested': False, u'type': u'security', u'pkglist': [{u'packages': [{u'src': None, u'name': u'setroubleshoot-plugins', u'sum': [u'md5', u'829d7c8d2fd3a010fc279f541875009c'], u'filename': u'setroubleshoot-plugins-2.0.4-2.el5.noarch.rpm', u'epoch': u'0', u'version': u'2.0.4', u'release': u'2.el5', u'arch': u'noarch'}, {u'src': None, u'name': u'setroubleshoot-plugins', u'sum': [u'md5', u'a49e555a43255d02b990bba1d5712474'], u'filename': u'setroubleshoot-plugins-2.0.4-2.el5.src.rpm', u'epoch': u'0', u'version': u'2.0.4', u'release': u'2.el5', u'arch': u'src'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u' [1.2.2-1.0.3]\n - cve-2008-0006.patch: XFS Integer Overflow Vulnerability ', u'issued': u'2008-01-17', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELSA-2008-0064.html', u'type': u'self', u'id': None, u'title': u'ELSA-2008-0064'}, {u'href': u'http://linux.oracle.com/cve/CVE-2008-0006.html', u'type': u'cve', u'id': u'CVE-2008-0006', u'title': u'CVE-2008-0006'}], u'_content_type_id': u'erratum', u'_id': u'6fb89269-e429-49c3-b74b-69fa0b4f9bdf', u'from': u'el-errata@oss.oracle.com', u'severity': u'Important', u'title': u' Important: libXfont security update ', u'_ns': u'units_erratum', u'rights': u'Copyright 2008 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 5', u'reboot_suggested': False, u'type': u'security', u'pkglist': [{u'packages': [{u'src': None, u'name': u'libXfont', u'sum': [u'md5', u'e2a31d1175e5ed602b9f04da2d1d21ab'], u'filename': u'libXfont-1.2.2-1.0.3.el5_1.i386.rpm', u'epoch': u'0', u'version': u'1.2.2', u'release': u'1.0.3.el5_1', u'arch': u'i386'}, {u'src': None, u'name': u'libXfont', u'sum': [u'md5', u'64efa2dfa1297cfbd9b1a4856a1e0f5f'], u'filename': u'libXfont-1.2.2-1.0.3.el5_1.src.rpm', u'epoch': u'0', u'version': u'1.2.2', u'release': u'1.0.3.el5_1', u'arch': u'src'}, {u'src': None, u'name': u'libXfont', u'sum': [u'md5', u'316b3fc0671631474db9a33d32f28231'], u'filename': u'libXfont-1.2.2-1.0.3.el5_1.x86_64.rpm', u'epoch': u'0', u'version': u'1.2.2', u'release': u'1.0.3.el5_1', u'arch': u'x86_64'}, {u'src': None, u'name': u'libXfont-devel', u'sum': [u'md5', u'edb922c4f604db64db10ac0446c00239'], u'filename': u'libXfont-devel-1.2.2-1.0.3.el5_1.i386.rpm', u'epoch': u'0', u'version': u'1.2.2', u'release': u'1.0.3.el5_1', u'arch': u'i386'}, {u'src': None, u'name': u'libXfont-devel', u'sum': [u'md5', u'b8bd4748afb34bcaaa5812c4d280b5da'], u'filename': u'libXfont-devel-1.2.2-1.0.3.el5_1.x86_64.rpm', u'epoch': u'0', u'version': u'1.2.2', u'release': u'1.0.3.el5_1', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u' [8.4.13-5.EL5_1.1]\n - CVE-2008-0553 CVE-2007-5378\n - GIF overflow and also GIF overflow\n Resolves: rhbz#432514 ', u'issued': u'2008-02-21', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELSA-2008-0136.html', u'type': u'self', u'id': None, u'title': u'ELSA-2008-0136'}, {u'href': u'http://linux.oracle.com/cve/CVE-2007-5137.html', u'type': u'cve', u'id': u'CVE-2007-5137', u'title': u'CVE-2007-5137'}, {u'href': u'http://linux.oracle.com/cve/CVE-2008-0553.html', u'type': u'cve', u'id': u'CVE-2008-0553', u'title': u'CVE-2008-0553'}], u'_content_type_id': u'erratum', u'_id': u'346bfcdf-d7eb-41c0-a6a7-091b16451fac', u'from': u'el-errata@oss.oracle.com', u'severity': u'Moderate', u'title': u' Moderate: tk security update ', u'_ns': u'units_erratum', u'rights': u'Copyright 2008 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 5', u'reboot_suggested': False, u'type': u'security', u'pkglist': [{u'packages': [{u'src': None, u'name': u'tk', u'sum': [u'md5', u'cb3bd782910c60f00505e7c95b8ab5e8'], u'filename': u'tk-8.4.13-5.el5_1.1.i386.rpm', u'epoch': u'0', u'version': u'8.4.13', u'release': u'5.el5_1.1', u'arch': u'i386'}, {u'src': None, u'name': u'tk', u'sum': [u'md5', u'd71cf61c8c90e038c71fe11a81bc2b2a'], u'filename': u'tk-8.4.13-5.el5_1.1.src.rpm', u'epoch': u'0', u'version': u'8.4.13', u'release': u'5.el5_1.1', u'arch': u'src'}, {u'src': None, u'name': u'tk', u'sum': [u'md5', u'a2e52ac334eeffa9a5590b7009d043fe'], u'filename': u'tk-8.4.13-5.el5_1.1.x86_64.rpm', u'epoch': u'0', u'version': u'8.4.13', u'release': u'5.el5_1.1', u'arch': u'x86_64'}, {u'src': None, u'name': u'tk-devel', u'sum': [u'md5', u'e0bc72f3c9c9ff762a4d78225831b610'], u'filename': u'tk-devel-8.4.13-5.el5_1.1.i386.rpm', u'epoch': u'0', u'version': u'8.4.13', u'release': u'5.el5_1.1', u'arch': u'i386'}, {u'src': None, u'name': u'tk-devel', u'sum': [u'md5', u'dbca32143bc5107c4477620470b27c22'], u'filename': u'tk-devel-8.4.13-5.el5_1.1.x86_64.rpm', u'epoch': u'0', u'version': u'8.4.13', u'release': u'5.el5_1.1', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u'\n[1.0.5-4.el5_1.1]\n- Check for headers with invalid mode numbers (#442037, CVE-2008-1686)', u'issued': u'2008-04-16', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELSA-2008-0235.html', u'type': u'self', u'id': None, u'title': u'ELSA-2008-0235'}, {u'href': u'http://linux.oracle.com/cve/CVE-2008-1686.html', u'type': u'cve', u'id': u'CVE-2008-1686', u'title': u'CVE-2008-1686'}], u'_content_type_id': u'erratum', u'_id': u'8b3693e1-7389-48c3-a2a3-714adb1e07e6', u'from': u'el-errata@oss.oracle.com', u'severity': u'Important', u'title': u' speex security update', u'_ns': u'units_erratum', u'rights': u'Copyright 2008 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 5', u'reboot_suggested': False, u'type': u'security', u'pkglist': [{u'packages': [{u'src': None, u'name': u'speex', u'sum': [u'md5', u'05ff867ac08a033bb06dffa98d50f63c'], u'filename': u'speex-1.0.5-4.el5_1.1.i386.rpm', u'epoch': u'0', u'version': u'1.0.5', u'release': u'4.el5_1.1', u'arch': u'i386'}, {u'src': None, u'name': u'speex', u'sum': [u'md5', u'f70882fb67376cc75e173cb911e6d417'], u'filename': u'speex-1.0.5-4.el5_1.1.src.rpm', u'epoch': u'0', u'version': u'1.0.5', u'release': u'4.el5_1.1', u'arch': u'src'}, {u'src': None, u'name': u'speex', u'sum': [u'md5', u'7c796b86fedb8d24a0a19cf86fa46730'], u'filename': u'speex-1.0.5-4.el5_1.1.x86_64.rpm', u'epoch': u'0', u'version': u'1.0.5', u'release': u'4.el5_1.1', u'arch': u'x86_64'}, {u'src': None, u'name': u'speex-devel', u'sum': [u'md5', u'1f5d3dc97f93a3edfd4f01694f97e478'], u'filename': u'speex-devel-1.0.5-4.el5_1.1.i386.rpm', u'epoch': u'0', u'version': u'1.0.5', u'release': u'4.el5_1.1', u'arch': u'i386'}, {u'src': None, u'name': u'speex-devel', u'sum': [u'md5', u'3541c8adee14097c79f8a0c2a5fc88af'], u'filename': u'speex-devel-1.0.5-4.el5_1.1.x86_64.rpm', u'epoch': u'0', u'version': u'1.0.5', u'release': u'4.el5_1.1', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u'bluez-libs:\n\n[3.7-1.1]\n- Fix CVE-2008-2374\nResolves: #452880\n\nbluez-utils:\n\n[3.7-2.2]\n- Add explicit versioned Requires and BuildRequires for new bluez-libs\n\n[3.7-2.1]\n- Fix CVE-2008-2374 (#452715) SDP payload processing vulnerability', u'issued': u'2008-07-14', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELSA-2008-0581.html', u'type': u'self', u'id': None, u'title': u'ELSA-2008-0581'}, {u'href': u'http://linux.oracle.com/cve/CVE-2008-2374.html', u'type': u'cve', u'id': u'CVE-2008-2374', u'title': u'CVE-2008-2374'}], u'_content_type_id': u'erratum', u'_id': u'82b13baf-0647-4a18-ae54-26ae1641b643', u'from': u'el-errata@oss.oracle.com', u'severity': u'Moderate', u'title': u' bluez-libs and bluez-utils security update', u'_ns': u'units_erratum', u'rights': u'Copyright 2008 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 5', u'reboot_suggested': False, u'type': u'security', u'pkglist': [{u'packages': [{u'src': None, u'name': u'bluez-libs', u'sum': [u'md5', u'850723e4d1839c976ee3b50b9f1027ef'], u'filename': u'bluez-libs-3.7-1.1.i386.rpm', u'epoch': u'0', u'version': u'3.7', u'release': u'1.1', u'arch': u'i386'}, {u'src': None, u'name': u'bluez-libs', u'sum': [u'md5', u'8c91775c274f4be51e33b3d4807bf733'], u'filename': u'bluez-libs-3.7-1.1.src.rpm', u'epoch': u'0', u'version': u'3.7', u'release': u'1.1', u'arch': u'src'}, {u'src': None, u'name': u'bluez-libs', u'sum': [u'md5', u'45be1eb48ca28ad8b723d9331703404a'], u'filename': u'bluez-libs-3.7-1.1.x86_64.rpm', u'epoch': u'0', u'version': u'3.7', u'release': u'1.1', u'arch': u'x86_64'}, {u'src': None, u'name': u'bluez-libs-devel', u'sum': [u'md5', u'e572beddf9a659d918e6d2e94f07025b'], u'filename': u'bluez-libs-devel-3.7-1.1.i386.rpm', u'epoch': u'0', u'version': u'3.7', u'release': u'1.1', u'arch': u'i386'}, {u'src': None, u'name': u'bluez-libs-devel', u'sum': [u'md5', u'4d073e0e32e02f139d2bff28917cb46f'], u'filename': u'bluez-libs-devel-3.7-1.1.x86_64.rpm', u'epoch': u'0', u'version': u'3.7', u'release': u'1.1', u'arch': u'x86_64'}, {u'src': None, u'name': u'bluez-utils', u'sum': [u'md5', u'fb77333dd90a0a8a46fab552b8fb4248'], u'filename': u'bluez-utils-3.7-2.2.src.rpm', u'epoch': u'0', u'version': u'3.7', u'release': u'2.2', u'arch': u'src'}, {u'src': None, u'name': u'bluez-utils', u'sum': [u'md5', u'e52909f6047f484a73db2ef3b97295a6'], u'filename': u'bluez-utils-3.7-2.2.x86_64.rpm', u'epoch': u'0', u'version': u'3.7', u'release': u'2.2', u'arch': u'x86_64'}, {u'src': None, u'name': u'bluez-utils-cups', u'sum': [u'md5', u'836f1c428ec10b711853703e852e93a0'], u'filename': u'bluez-utils-cups-3.7-2.2.x86_64.rpm', u'epoch': u'0', u'version': u'3.7', u'release': u'2.2', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u'\n[2.3.3-2.1]\n- fixed postfix privilege problem with symlinks in the mail spool directory\n (CVE-2008-2936)\n Resolves: rhbz#456717', u'issued': u'2008-08-14', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELSA-2008-0839.html', u'type': u'self', u'id': None, u'title': u'ELSA-2008-0839'}, {u'href': u'http://linux.oracle.com/cve/CVE-2008-2936.html', u'type': u'cve', u'id': u'CVE-2008-2936', u'title': u'CVE-2008-2936'}], u'_content_type_id': u'erratum', u'_id': u'd8f6cec4-9d6d-4bb4-a2ce-8541a8f59376', u'from': u'el-errata@oss.oracle.com', u'severity': u'Moderate', u'title': u' postfix security update', u'_ns': u'units_erratum', u'rights': u'Copyright 2008 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 5', u'reboot_suggested': False, u'type': u'security', u'pkglist': [{u'packages': [{u'src': None, u'name': u'postfix', u'sum': [u'md5', u'47f147fbd0d926b2952dd59369cbcc04'], u'filename': u'postfix-2.3.3-2.1.el5_2.src.rpm', u'epoch': u'2', u'version': u'2.3.3', u'release': u'2.1.el5_2', u'arch': u'src'}, {u'src': None, u'name': u'postfix', u'sum': [u'md5', u'c6d966bca6a7693f0ef6ec0a5434fef4'], u'filename': u'postfix-2.3.3-2.1.el5_2.x86_64.rpm', u'epoch': u'2', u'version': u'2.3.3', u'release': u'2.1.el5_2', u'arch': u'x86_64'}, {u'src': None, u'name': u'postfix-pflogsumm', u'sum': [u'md5', u'd594c6819876ae4a5137ba79109c5356'], u'filename': u'postfix-pflogsumm-2.3.3-2.1.el5_2.x86_64.rpm', u'epoch': u'2', u'version': u'2.3.3', u'release': u'2.1.el5_2', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u'\n[0.2-39]\n- add fix for CVE-2008-3916', u'issued': u'2008-10-21', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELSA-2008-0946.html', u'type': u'self', u'id': None, u'title': u'ELSA-2008-0946'}, {u'href': u'http://linux.oracle.com/cve/CVE-2008-3916.html', u'type': u'cve', u'id': u'CVE-2008-3916', u'title': u'CVE-2008-3916'}], u'_content_type_id': u'erratum', u'_id': u'805f5d20-2304-445b-9720-d2d651428c10', u'from': u'el-errata@oss.oracle.com', u'severity': u'Moderate', u'title': u' ed security update', u'_ns': u'units_erratum', u'rights': u'Copyright 2008 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 5', u'reboot_suggested': False, u'type': u'security', u'pkglist': [{u'packages': [{u'src': None, u'name': u'ed', u'sum': [u'md5', u'53a723000ff4c89c761ae67a8f0ce97e'], u'filename': u'ed-0.2-39.el5_2.src.rpm', u'epoch': u'0', u'version': u'0.2', u'release': u'39.el5_2', u'arch': u'src'}, {u'src': None, u'name': u'ed', u'sum': [u'md5', u'95b5074822edaefa1b5d8db158671cc1'], u'filename': u'ed-0.2-39.el5_2.x86_64.rpm', u'epoch': u'0', u'version': u'0.2', u'release': u'39.el5_2', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u'\n[2.8.5-28.1.1]\n- add patch for CVE-2008-4690 (rhbz#468184)\n - prompt user before executing commands from the lynxcgi: handler,\n even in the advanced user mode\n - mark all lynxcgi: URIs as untrusted in the default lynx.cfg\n- add patch to prevent lynx from opening configuration files in the\n current working directory (CVE to be assigned) (rhbz#214205)', u'issued': u'2008-10-27', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELSA-2008-0965.html', u'type': u'self', u'id': None, u'title': u'ELSA-2008-0965'}, {u'href': u'http://linux.oracle.com/cve/CVE-2006-7234.html', u'type': u'cve', u'id': u'CVE-2006-7234', u'title': u'CVE-2006-7234'}, {u'href': u'http://linux.oracle.com/cve/CVE-2008-4690.html', u'type': u'cve', u'id': u'CVE-2008-4690', u'title': u'CVE-2008-4690'}], u'_content_type_id': u'erratum', u'_id': u'22c04e8b-b11b-4700-999e-bf92cd190a60', u'from': u'el-errata@oss.oracle.com', u'severity': u'Important', u'title': u' lynx security update', u'_ns': u'units_erratum', u'rights': u'Copyright 2008 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 5', u'reboot_suggested': False, u'type': u'security', u'pkglist': [{u'packages': [{u'src': None, u'name': u'lynx', u'sum': [u'md5', u'844fb04ecff04a7486ba33c2f5434fce'], u'filename': u'lynx-2.8.5-28.1.el5_2.1.src.rpm', u'epoch': u'0', u'version': u'2.8.5', u'release': u'28.1.el5_2.1', u'arch': u'src'}, {u'src': None, u'name': u'lynx', u'sum': [u'md5', u'3d5f0e67602697567f80ec5a30f73202'], u'filename': u'lynx-2.8.5-28.1.el5_2.1.x86_64.rpm', u'epoch': u'0', u'version': u'2.8.5', u'release': u'28.1.el5_2.1', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u'\n[1.6.4-4.1.1]\n- fixed CVE-2008-3863 and CVE-2008-4306', u'issued': u'2008-12-15', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELSA-2008-1016.html', u'type': u'self', u'id': None, u'title': u'ELSA-2008-1016'}, {u'href': u'http://linux.oracle.com/cve/CVE-2008-3863.html', u'type': u'cve', u'id': u'CVE-2008-3863', u'title': u'CVE-2008-3863'}, {u'href': u'http://linux.oracle.com/cve/CVE-2008-4306.html', u'type': u'cve', u'id': u'CVE-2008-4306', u'title': u'CVE-2008-4306'}], u'_content_type_id': u'erratum', u'_id': u'acfc2795-39fc-4c4e-817a-f89b509197ad', u'from': u'el-errata@oss.oracle.com', u'severity': u'Moderate', u'title': u' enscript security update', u'_ns': u'units_erratum', u'rights': u'Copyright 2008 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 5', u'reboot_suggested': False, u'type': u'security', u'pkglist': [{u'packages': [{u'src': None, u'name': u'enscript', u'sum': [u'md5', u'287a813188d65cbfe74fc151ebaf21c3'], u'filename': u'enscript-1.6.4-4.1.1.el5_2.src.rpm', u'epoch': u'0', u'version': u'1.6.4', u'release': u'4.1.1.el5_2', u'arch': u'src'}, {u'src': None, u'name': u'enscript', u'sum': [u'md5', u'21724afb1b4f96c36e0a690d817afa39'], u'filename': u'enscript-1.6.4-4.1.1.el5_2.x86_64.rpm', u'epoch': u'0', u'version': u'1.6.4', u'release': u'4.1.1.el5_2', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u'[1.0.7-7]\n- permissions of deliver and dovecot.conf from 1.0.7-5 reverted\n- password can be stored in different file readable only for root now\n- Resolves: #436287, CVE-2008-4870\n\n[1.0.7-6]\n- added missing directory in file list\n- Resolves: #436287\n\n[1.0.7-5]\n- change permissions of deliver and dovecot.conf to prevent possible password ex\nposure\n- Resolves: #436287\n\n[1.0.7-4]\n- fix handling of negative rights in the ACL plugin\n- Resolves: #469015, CVE-2008-4577\n\n[1.0.7-3]\n- fix package ownership for /etc/pki/dovecot/private (#448089)\n- update init script (#238016)\n- ask for SSL cert password during start-up (#436287)\n- fix for illegal characters in passwd (#439369)\n- Resolves: #448089, #238016, #436287, #439369\n', u'issued': u'2009-01-27', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELSA-2009-0205.html', u'type': u'self', u'id': None, u'title': u'ELSA-2009-0205'}, {u'href': u'http://linux.oracle.com/cve/CVE-2008-4577.html', u'type': u'cve', u'id': u'CVE-2008-4577', u'title': u'CVE-2008-4577'}, {u'href': u'http://linux.oracle.com/cve/CVE-2008-4870.html', u'type': u'cve', u'id': u'CVE-2008-4870', u'title': u'CVE-2008-4870'}], u'_content_type_id': u'erratum', u'_id': u'9209f0ff-ece1-48bf-8620-ca3adba25371', u'from': u'el-errata@oss.oracle.com', u'severity': u'Low', u'title': u' dovecot security and bug fix update', u'_ns': u'units_erratum', u'rights': u'Copyright 2009 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 5', u'reboot_suggested': False, u'type': u'security', u'pkglist': [{u'packages': [{u'src': None, u'name': u'dovecot', u'sum': [u'md5', u'f4a961fe297de41f0a926f81c0506cb9'], u'filename': u'dovecot-1.0.7-7.el5.src.rpm', u'epoch': u'0', u'version': u'1.0.7', u'release': u'7.el5', u'arch': u'src'}, {u'src': None, u'name': u'dovecot', u'sum': [u'md5', u'fdfc729517952ed13bac0224f456fe72'], u'filename': u'dovecot-1.0.7-7.el5.x86_64.rpm', u'epoch': u'0', u'version': u'1.0.7', u'release': u'7.el5', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u'\n[3.0.0-3.2]\n- add security fix for CVE-2008-2384 (#480613)', u'issued': u'2009-02-11', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELSA-2009-0259.html', u'type': u'self', u'id': None, u'title': u'ELSA-2009-0259'}, {u'href': u'http://linux.oracle.com/cve/CVE-2008-2384.html', u'type': u'cve', u'id': u'CVE-2008-2384', u'title': u'CVE-2008-2384'}], u'_content_type_id': u'erratum', u'_id': u'b2fc5a89-b329-4e57-97b1-a95900cd7bf9', u'from': u'el-errata@oss.oracle.com', u'severity': u'Moderate', u'title': u' mod_auth_mysql security update', u'_ns': u'units_erratum', u'rights': u'Copyright 2009 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 5', u'reboot_suggested': False, u'type': u'security', u'pkglist': [{u'packages': [{u'src': None, u'name': u'mod_auth_mysql', u'sum': [u'md5', u'6daf9d164e5dc3afe8f55e266805f84b'], u'filename': u'mod_auth_mysql-3.0.0-3.2.el5_3.src.rpm', u'epoch': u'1', u'version': u'3.0.0', u'release': u'3.2.el5_3', u'arch': u'src'}, {u'src': None, u'name': u'mod_auth_mysql', u'sum': [u'md5', u'4ec96bf98f3ec7d7c15f8325246736f6'], u'filename': u'mod_auth_mysql-3.0.0-3.2.el5_3.x86_64.rpm', u'epoch': u'1', u'version': u'3.0.0', u'release': u'3.2.el5_3', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u'\n[2.12.3-4]\n- Build with -fno-strict-aliasing\n\n[2.12.3-3]\n- Fix CVE-2008-4316, overflows in the base64 handling functions\n- Fixes #487497 ', u'issued': u'2009-03-24', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELSA-2009-0336.html', u'type': u'self', u'id': None, u'title': u'ELSA-2009-0336'}, {u'href': u'http://linux.oracle.com/cve/CVE-2008-4316.html', u'type': u'cve', u'id': u'CVE-2008-4316', u'title': u'CVE-2008-4316'}], u'_content_type_id': u'erratum', u'_id': u'dd5ff922-e375-4b8c-9a98-23418c67a8f0', u'from': u'el-errata@oss.oracle.com', u'severity': u'Moderate', u'title': u' glib2 security update', u'_ns': u'units_erratum', u'rights': u'Copyright 2009 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 5', u'reboot_suggested': False, u'type': u'security', u'pkglist': [{u'packages': [{u'src': None, u'name': u'glib2', u'sum': [u'md5', u'f5c91f63adad93056897ada5df1eb452'], u'filename': u'glib2-2.12.3-4.el5_3.1.i386.rpm', u'epoch': u'0', u'version': u'2.12.3', u'release': u'4.el5_3.1', u'arch': u'i386'}, {u'src': None, u'name': u'glib2', u'sum': [u'md5', u'c4f915eb3e75faeaef6cee5eb3010768'], u'filename': u'glib2-2.12.3-4.el5_3.1.src.rpm', u'epoch': u'0', u'version': u'2.12.3', u'release': u'4.el5_3.1', u'arch': u'src'}, {u'src': None, u'name': u'glib2', u'sum': [u'md5', u'fd60193c880aa8564343d04e9c806edb'], u'filename': u'glib2-2.12.3-4.el5_3.1.x86_64.rpm', u'epoch': u'0', u'version': u'2.12.3', u'release': u'4.el5_3.1', u'arch': u'x86_64'}, {u'src': None, u'name': u'glib2-devel', u'sum': [u'md5', u'b3fc60ab68492bfbff5307fe8b52d845'], u'filename': u'glib2-devel-2.12.3-4.el5_3.1.i386.rpm', u'epoch': u'0', u'version': u'2.12.3', u'release': u'4.el5_3.1', u'arch': u'i386'}, {u'src': None, u'name': u'glib2-devel', u'sum': [u'md5', u'c596c5448d043018cb35e415099d8c9e'], u'filename': u'glib2-devel-2.12.3-4.el5_3.1.x86_64.rpm', u'epoch': u'0', u'version': u'2.12.3', u'release': u'4.el5_3.1', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u'\n[1.18-beta1.1.el5_3.2]\n- Add patch theoretically preventing division by zero\n\n[1.18-beta1.1.el5_3.1]\n- Rebase to upstream 1.18beta1\n- CVE-2009-0581 LittleCms memory leak\n- CVE-2009-0723 LittleCms integer overflow\n- CVE-2009-0733 LittleCms lack of upper-bounds check on sizes\n- Resolves: #487513', u'issued': u'2009-03-19', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELSA-2009-0339.html', u'type': u'self', u'id': None, u'title': u'ELSA-2009-0339'}, {u'href': u'http://linux.oracle.com/cve/CVE-2009-0581.html', u'type': u'cve', u'id': u'CVE-2009-0581', u'title': u'CVE-2009-0581'}, {u'href': u'http://linux.oracle.com/cve/CVE-2009-0723.html', u'type': u'cve', u'id': u'CVE-2009-0723', u'title': u'CVE-2009-0723'}, {u'href': u'http://linux.oracle.com/cve/CVE-2009-0733.html', u'type': u'cve', u'id': u'CVE-2009-0733', u'title': u'CVE-2009-0733'}], u'_content_type_id': u'erratum', u'_id': u'b680b7b8-54b6-4e68-844e-27b97b993c8a', u'from': u'el-errata@oss.oracle.com', u'severity': u'Moderate', u'title': u' lcms security update', u'_ns': u'units_erratum', u'rights': u'Copyright 2009 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 5', u'reboot_suggested': False, u'type': u'security', u'pkglist': [{u'packages': [{u'src': None, u'name': u'lcms', u'sum': [u'md5', u'3faa5047f1435b5199317f67a1a63857'], u'filename': u'lcms-1.18-0.1.beta1.el5_3.2.i386.rpm', u'epoch': u'0', u'version': u'1.18', u'release': u'0.1.beta1.el5_3.2', u'arch': u'i386'}, {u'src': None, u'name': u'lcms', u'sum': [u'md5', u'891b8136e165bfebc3e5245415e11206'], u'filename': u'lcms-1.18-0.1.beta1.el5_3.2.src.rpm', u'epoch': u'0', u'version': u'1.18', u'release': u'0.1.beta1.el5_3.2', u'arch': u'src'}, {u'src': None, u'name': u'lcms', u'sum': [u'md5', u'6c1f148c904b6cc8a5c094ed2a109220'], u'filename': u'lcms-1.18-0.1.beta1.el5_3.2.x86_64.rpm', u'epoch': u'0', u'version': u'1.18', u'release': u'0.1.beta1.el5_3.2', u'arch': u'x86_64'}, {u'src': None, u'name': u'lcms-devel', u'sum': [u'md5', u'd986557b12f6e249dd12edd08c7ca71a'], u'filename': u'lcms-devel-1.18-0.1.beta1.el5_3.2.i386.rpm', u'epoch': u'0', u'version': u'1.18', u'release': u'0.1.beta1.el5_3.2', u'arch': u'i386'}, {u'src': None, u'name': u'lcms-devel', u'sum': [u'md5', u'2a273aff44f200b7936027a637ba5f95'], u'filename': u'lcms-devel-1.18-0.1.beta1.el5_3.2.x86_64.rpm', u'epoch': u'0', u'version': u'1.18', u'release': u'0.1.beta1.el5_3.2', u'arch': u'x86_64'}, {u'src': None, u'name': u'python-lcms', u'sum': [u'md5', u'af34b29979311c7aac928e1f36836504'], u'filename': u'python-lcms-1.18-0.1.beta1.el5_3.2.x86_64.rpm', u'epoch': u'0', u'version': u'1.18', u'release': u'0.1.beta1.el5_3.2', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u'\n[2.2.98-2.el5.1]\n- Add patch for RH bug #488030 (CVE-2009-0585, soup_base64_encode()).', u'issued': u'2009-03-16', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELSA-2009-0344.html', u'type': u'self', u'id': None, u'title': u'ELSA-2009-0344'}, {u'href': u'http://linux.oracle.com/cve/CVE-2009-0585.html', u'type': u'cve', u'id': u'CVE-2009-0585', u'title': u'CVE-2009-0585'}], u'_content_type_id': u'erratum', u'_id': u'287f5b56-16fe-47f3-9b7d-60ed2da9b4fa', u'from': u'el-errata@oss.oracle.com', u'severity': u'Moderate', u'title': u' libsoup security update', u'_ns': u'units_erratum', u'rights': u'Copyright 2009 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 5', u'reboot_suggested': False, u'type': u'security', u'pkglist': [{u'packages': [{u'src': None, u'name': u'libsoup', u'sum': [u'md5', u'7de93b5a3a44ffd2f81658884560d290'], u'filename': u'libsoup-2.2.98-2.el5_3.1.i386.rpm', u'epoch': u'0', u'version': u'2.2.98', u'release': u'2.el5_3.1', u'arch': u'i386'}, {u'src': None, u'name': u'libsoup', u'sum': [u'md5', u'3e820adeb855ad30b371f5f4ade3caab'], u'filename': u'libsoup-2.2.98-2.el5_3.1.src.rpm', u'epoch': u'0', u'version': u'2.2.98', u'release': u'2.el5_3.1', u'arch': u'src'}, {u'src': None, u'name': u'libsoup', u'sum': [u'md5', u'454c9a7bece08def08e5f90f3192f131'], u'filename': u'libsoup-2.2.98-2.el5_3.1.x86_64.rpm', u'epoch': u'0', u'version': u'2.2.98', u'release': u'2.el5_3.1', u'arch': u'x86_64'}, {u'src': None, u'name': u'libsoup-devel', u'sum': [u'md5', u'd006f317935881da9a651faa64b4858f'], u'filename': u'libsoup-devel-2.2.98-2.el5_3.1.i386.rpm', u'epoch': u'0', u'version': u'2.2.98', u'release': u'2.el5_3.1', u'arch': u'i386'}, {u'src': None, u'name': u'libsoup-devel', u'sum': [u'md5', u'a6f77b4c7a9f10f47c5755b617e6d34b'], u'filename': u'libsoup-devel-2.2.98-2.el5_3.1.x86_64.rpm', u'epoch': u'0', u'version': u'2.2.98', u'release': u'2.el5_3.1', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u'\n[0.10.20-3.0.1]\n- CVE-2009-0586: integer overflow in gst_vorbis_tag_add_coverart (#488210) ', u'issued': u'2009-04-06', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELSA-2009-0352.html', u'type': u'self', u'id': None, u'title': u'ELSA-2009-0352'}, {u'href': u'http://linux.oracle.com/cve/CVE-2009-0586.html', u'type': u'cve', u'id': u'CVE-2009-0586', u'title': u'CVE-2009-0586'}], u'_content_type_id': u'erratum', u'_id': u'bdb19ef0-1c25-4588-b4d3-fe4f2bf81d4a', u'from': u'el-errata@oss.oracle.com', u'severity': u'Moderate', u'title': u' gstreamer-plugins-base security update', u'_ns': u'units_erratum', u'rights': u'Copyright 2009 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 5', u'reboot_suggested': False, u'type': u'security', u'pkglist': [{u'packages': [{u'src': None, u'name': u'gstreamer-plugins-base', u'sum': [u'md5', u'fff0385f2056ff7d4b867838ad55fc77'], u'filename': u'gstreamer-plugins-base-0.10.20-3.0.1.el5_3.i386.rpm', u'epoch': u'0', u'version': u'0.10.20', u'release': u'3.0.1.el5_3', u'arch': u'i386'}, {u'src': None, u'name': u'gstreamer-plugins-base', u'sum': [u'md5', u'46ac88c4784a611ceed4fef02d1043c4'], u'filename': u'gstreamer-plugins-base-0.10.20-3.0.1.el5_3.src.rpm', u'epoch': u'0', u'version': u'0.10.20', u'release': u'3.0.1.el5_3', u'arch': u'src'}, {u'src': None, u'name': u'gstreamer-plugins-base', u'sum': [u'md5', u'254c33f0b5f4299f4052f6deb620bb64'], u'filename': u'gstreamer-plugins-base-0.10.20-3.0.1.el5_3.x86_64.rpm', u'epoch': u'0', u'version': u'0.10.20', u'release': u'3.0.1.el5_3', u'arch': u'x86_64'}, {u'src': None, u'name': u'gstreamer-plugins-base-devel', u'sum': [u'md5', u'f945c74897793ec252909f44e211f068'], u'filename': u'gstreamer-plugins-base-devel-0.10.20-3.0.1.el5_3.i386.rpm', u'epoch': u'0', u'version': u'0.10.20', u'release': u'3.0.1.el5_3', u'arch': u'i386'}, {u'src': None, u'name': u'gstreamer-plugins-base-devel', u'sum': [u'md5', u'c54c95d5844f9419bf243fcd726f7bca'], u'filename': u'gstreamer-plugins-base-devel-0.10.20-3.0.1.el5_3.x86_64.rpm', u'epoch': u'0', u'version': u'0.10.20', u'release': u'3.0.1.el5_3', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u'\n[4.1.3-7.1.el5_3.1]\n- cve-2005-3350, cve-2005-2974', u'issued': u'2009-04-22', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELSA-2009-0444.html', u'type': u'self', u'id': None, u'title': u'ELSA-2009-0444'}, {u'href': u'http://linux.oracle.com/cve/CVE-2005-2974.html', u'type': u'cve', u'id': u'CVE-2005-2974', u'title': u'CVE-2005-2974'}, {u'href': u'http://linux.oracle.com/cve/CVE-2005-3350.html', u'type': u'cve', u'id': u'CVE-2005-3350', u'title': u'CVE-2005-3350'}], u'_content_type_id': u'erratum', u'_id': u'3d278f68-1d4a-417a-bf7c-de33f5f581a8', u'from': u'el-errata@oss.oracle.com', u'severity': u'Important', u'title': u' giflib security update', u'_ns': u'units_erratum', u'rights': u'Copyright 2009 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 5', u'reboot_suggested': False, u'type': u'security', u'pkglist': [{u'packages': [{u'src': None, u'name': u'giflib', u'sum': [u'md5', u'1edd636123fc1fa25f5e8365832c6dd2'], u'filename': u'giflib-4.1.3-7.1.el5_3.1.i386.rpm', u'epoch': u'0', u'version': u'4.1.3', u'release': u'7.1.el5_3.1', u'arch': u'i386'}, {u'src': None, u'name': u'giflib', u'sum': [u'md5', u'54462be60841675c4ae3c8890e858f2c'], u'filename': u'giflib-4.1.3-7.1.el5_3.1.src.rpm', u'epoch': u'0', u'version': u'4.1.3', u'release': u'7.1.el5_3.1', u'arch': u'src'}, {u'src': None, u'name': u'giflib', u'sum': [u'md5', u'1f82ce6b92d9ec81a4554abc1cd82a3e'], u'filename': u'giflib-4.1.3-7.1.el5_3.1.x86_64.rpm', u'epoch': u'0', u'version': u'4.1.3', u'release': u'7.1.el5_3.1', u'arch': u'x86_64'}, {u'src': None, u'name': u'giflib-devel', u'sum': [u'md5', u'078cc4112aefe308941c3605f1812a60'], u'filename': u'giflib-devel-4.1.3-7.1.el5_3.1.i386.rpm', u'epoch': u'0', u'version': u'4.1.3', u'release': u'7.1.el5_3.1', u'arch': u'i386'}, {u'src': None, u'name': u'giflib-devel', u'sum': [u'md5', u'ea1a94163c58d6ce6b51f2a56ace1c49'], u'filename': u'giflib-devel-4.1.3-7.1.el5_3.1.x86_64.rpm', u'epoch': u'0', u'version': u'4.1.3', u'release': u'7.1.el5_3.1', u'arch': u'x86_64'}, {u'src': None, u'name': u'giflib-utils', u'sum': [u'md5', u'e920602b14df8096a77e871c518670bb'], u'filename': u'giflib-utils-4.1.3-7.1.el5_3.1.x86_64.rpm', u'epoch': u'0', u'version': u'4.1.3', u'release': u'7.1.el5_3.1', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u'\n[0.2.8.4-10.2]\n- Resolves: rhbz#497511 CVE-2009-1364 bad realloc', u'issued': u'2009-04-30', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELSA-2009-0457.html', u'type': u'self', u'id': None, u'title': u'ELSA-2009-0457'}, {u'href': u'http://linux.oracle.com/cve/CVE-2009-1364.html', u'type': u'cve', u'id': u'CVE-2009-1364', u'title': u'CVE-2009-1364'}], u'_content_type_id': u'erratum', u'_id': u'1a239ed2-363c-4a8d-8c4e-51513971085b', u'from': u'el-errata@oss.oracle.com', u'severity': u'Moderate', u'title': u' libwmf security update', u'_ns': u'units_erratum', u'rights': u'Copyright 2009 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 5', u'reboot_suggested': False, u'type': u'security', u'pkglist': [{u'packages': [{u'src': None, u'name': u'libwmf', u'sum': [u'md5', u'49bc3a15326bc834993ed519528d536f'], u'filename': u'libwmf-0.2.8.4-10.2.i386.rpm', u'epoch': u'0', u'version': u'0.2.8.4', u'release': u'10.2', u'arch': u'i386'}, {u'src': None, u'name': u'libwmf', u'sum': [u'md5', u'abb69540ab955d720356bc74911735ad'], u'filename': u'libwmf-0.2.8.4-10.2.src.rpm', u'epoch': u'0', u'version': u'0.2.8.4', u'release': u'10.2', u'arch': u'src'}, {u'src': None, u'name': u'libwmf', u'sum': [u'md5', u'69bc774f23f8249784a04f3bc17957f9'], u'filename': u'libwmf-0.2.8.4-10.2.x86_64.rpm', u'epoch': u'0', u'version': u'0.2.8.4', u'release': u'10.2', u'arch': u'x86_64'}, {u'src': None, u'name': u'libwmf-devel', u'sum': [u'md5', u'bce030c67517900e6b7c1a2d51be56fd'], u'filename': u'libwmf-devel-0.2.8.4-10.2.i386.rpm', u'epoch': u'0', u'version': u'0.2.8.4', u'release': u'10.2', u'arch': u'i386'}, {u'src': None, u'name': u'libwmf-devel', u'sum': [u'md5', u'8ca83f9e3869f143a2a6bde34f0fce5e'], u'filename': u'libwmf-devel-0.2.8.4-10.2.x86_64.rpm', u'epoch': u'0', u'version': u'0.2.8.4', u'release': u'10.2', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u'\n[1.49-2.el5_3.1]\n- fix CVE-2009-0663 and CVE-2009-1341\n- Resolves: #498000 ', u'issued': u'2009-05-13', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELSA-2009-0479.html', u'type': u'self', u'id': None, u'title': u'ELSA-2009-0479'}, {u'href': u'http://linux.oracle.com/cve/CVE-2009-0663.html', u'type': u'cve', u'id': u'CVE-2009-0663', u'title': u'CVE-2009-0663'}, {u'href': u'http://linux.oracle.com/cve/CVE-2009-1341.html', u'type': u'cve', u'id': u'CVE-2009-1341', u'title': u'CVE-2009-1341'}], u'_content_type_id': u'erratum', u'_id': u'af5a4822-586c-483c-a8e4-21c66f47dec4', u'from': u'el-errata@oss.oracle.com', u'severity': u'Moderate', u'title': u' perl-DBD-Pg security update', u'_ns': u'units_erratum', u'rights': u'Copyright 2009 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 5', u'reboot_suggested': False, u'type': u'security', u'pkglist': [{u'packages': [{u'src': None, u'name': u'perl-DBD-Pg', u'sum': [u'md5', u'1301c07b83a556295a34b2f51c447a7b'], u'filename': u'perl-DBD-Pg-1.49-2.el5_3.1.src.rpm', u'epoch': u'0', u'version': u'1.49', u'release': u'2.el5_3.1', u'arch': u'src'}, {u'src': None, u'name': u'perl-DBD-Pg', u'sum': [u'md5', u'cfedc9102f7cae6aa87418d39108718b'], u'filename': u'perl-DBD-Pg-1.49-2.el5_3.1.x86_64.rpm', u'epoch': u'0', u'version': u'1.49', u'release': u'2.el5_3.1', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u'\n[15.5-15.1.el5_3.1]\n- Release bump to create newer nvr despite dist tag change (fc6 -> el5)\n\n[15.5-15.el5_3.4]\n- Merge incdir-overflow and snprintf patches for better readability,\n snprintf is used now with PATHLEN limit without other adjustments,\n related strlen / %.*s / *_len are no longer needed and were dropped\n- Update tempsec patch, drop extraneous s(n)printf argument\n to suppress compiler warnings\n- Update fscanf-overflows patch to perform reffile argument length\n check earlier, now also includes strlen-adjust-fix patch\n\n[15.5-15.el5_3.3]\n- Correcting buffer overflow fix (bz 499200)\n\n[15.5-15.el5_3.2]\n- Fix some buffer overflows (bz 499200)', u'issued': u'2009-06-15', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELSA-2009-1102.html', u'type': u'self', u'id': None, u'title': u'ELSA-2009-1102'}, {u'href': u'http://linux.oracle.com/cve/CVE-2009-0148.html', u'type': u'cve', u'id': u'CVE-2009-0148', u'title': u'CVE-2009-0148'}, {u'href': u'http://linux.oracle.com/cve/CVE-2004-2541.html', u'type': u'cve', u'id': u'CVE-2004-2541', u'title': u'CVE-2004-2541'}], u'_content_type_id': u'erratum', u'_id': u'c2369c67-e8e6-4476-a4d0-a75e713df26d', u'from': u'el-errata@oss.oracle.com', u'severity': u'Moderate', u'title': u' cscope security update', u'_ns': u'units_erratum', u'rights': u'Copyright 2009 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 5', u'reboot_suggested': False, u'type': u'security', u'pkglist': [{u'packages': [{u'src': None, u'name': u'cscope', u'sum': [u'md5', u'19a662ffb08fa6b09efee97e37e800e3'], u'filename': u'cscope-15.5-15.1.el5_3.1.src.rpm', u'epoch': u'0', u'version': u'15.5', u'release': u'15.1.el5_3.1', u'arch': u'src'}, {u'src': None, u'name': u'cscope', u'sum': [u'md5', u'8bd5b6ace99a3d0090c7acf82669f416'], u'filename': u'cscope-15.5-15.1.el5_3.1.x86_64.rpm', u'epoch': u'0', u'version': u'15.5', u'release': u'15.1.el5_3.1', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u'\n[0.10.9-1.el5.2]\n- CVE-2009-1932: Integer overflow in PNG decoder. ', u'issued': u'2009-06-25', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELSA-2009-1123.html', u'type': u'self', u'id': None, u'title': u'ELSA-2009-1123'}, {u'href': u'http://linux.oracle.com/cve/CVE-2009-1932.html', u'type': u'cve', u'id': u'CVE-2009-1932', u'title': u'CVE-2009-1932'}], u'_content_type_id': u'erratum', u'_id': u'7ec5447a-b89c-4867-8a89-cd77318b58ea', u'from': u'el-errata@oss.oracle.com', u'severity': u'Moderate', u'title': u' gstreamer-plugins-good security update', u'_ns': u'units_erratum', u'rights': u'Copyright 2009 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 5', u'reboot_suggested': False, u'type': u'security', u'pkglist': [{u'packages': [{u'src': None, u'name': u'gstreamer-plugins-good', u'sum': [u'md5', u'725921804f51b7463d70911480c878a0'], u'filename': u'gstreamer-plugins-good-0.10.9-1.el5_3.2.src.rpm', u'epoch': u'0', u'version': u'0.10.9', u'release': u'1.el5_3.2', u'arch': u'src'}, {u'src': None, u'name': u'gstreamer-plugins-good', u'sum': [u'md5', u'eb297bb2134f74d52996194f083d09e4'], u'filename': u'gstreamer-plugins-good-0.10.9-1.el5_3.2.x86_64.rpm', u'epoch': u'0', u'version': u'0.10.9', u'release': u'1.el5_3.2', u'arch': u'x86_64'}, {u'src': None, u'name': u'gstreamer-plugins-good-devel', u'sum': [u'md5', u'cd027e3941bc5c7331eb46c554e8b5ef'], u'filename': u'gstreamer-plugins-good-devel-0.10.9-1.el5_3.2.i386.rpm', u'epoch': u'0', u'version': u'0.10.9', u'release': u'1.el5_3.2', u'arch': u'i386'}, {u'src': None, u'name': u'gstreamer-plugins-good-devel', u'sum': [u'md5', u'e63dd4ce9bfb5b84401c96e71d2b409e'], u'filename': u'gstreamer-plugins-good-devel-0.10.9-1.el5_3.2.x86_64.rpm', u'epoch': u'0', u'version': u'0.10.9', u'release': u'1.el5_3.2', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u'\n[2.45-1.1.el5]\n- problems with strings when enabling tftp CVE-2009-2957 and CVE-2009-2957\n- Resolves: rhbg#519021 ', u'issued': u'2009-08-31', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELSA-2009-1238.html', u'type': u'self', u'id': None, u'title': u'ELSA-2009-1238'}, {u'href': u'http://linux.oracle.com/cve/CVE-2009-2957.html', u'type': u'cve', u'id': u'CVE-2009-2957', u'title': u'CVE-2009-2957'}, {u'href': u'http://linux.oracle.com/cve/CVE-2009-2958.html', u'type': u'cve', u'id': u'CVE-2009-2958', u'title': u'CVE-2009-2958'}], u'_content_type_id': u'erratum', u'_id': u'2dfb997f-a03e-4096-8520-c9c3c587f736', u'from': u'el-errata@oss.oracle.com', u'severity': u'Important', u'title': u' dnsmasq security update', u'_ns': u'units_erratum', u'rights': u'Copyright 2009 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 5', u'reboot_suggested': False, u'type': u'security', u'pkglist': [{u'packages': [{u'src': None, u'name': u'dnsmasq', u'sum': [u'md5', u'62e89f78f49db00881eb0ed2480cf0cd'], u'filename': u'dnsmasq-2.45-1.1.el5_3.src.rpm', u'epoch': u'0', u'version': u'2.45', u'release': u'1.1.el5_3', u'arch': u'src'}, {u'src': None, u'name': u'dnsmasq', u'sum': [u'md5', u'fa6be5717ba0bedf05d19077900a75d0'], u'filename': u'dnsmasq-2.45-1.1.el5_3.x86_64.rpm', u'epoch': u'0', u'version': u'2.45', u'release': u'1.1.el5_3', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u'[75-4]\n- fix EOF handling (#499367)\n- add icon to gui desktop file\n\n[75-3]\n- ask for password confirmation when creating openssl key (#500850)\n- removed executable permission from ecryptfs-dot-private (#500817)\n- ecryptfs-rewrite-file: improve of progress output (#500813)\n- dont error out when unwrapping and adding a key that already exists (#500810)\n- fix typo in ecryptfs-rewrite-file(1) (#500804)\n- add error message about full keyring (#501460)\n- gui sub-package must requires pygtk2-libglade (#500997)\n- require cryptsetup-luks for encrypted swap (#500824)\n- use blkid instead of vol_id (#500820)\n- dont rely on cryptdisks service (#500829)\n\n[75-2]\n- dont hang when used with wrong/missing stdin (#499367)\n- dont print error when key already removed (#499167)\n- refuse mounting with too small rsa key (#499175)\n- dont error out when adding key that already exists (#500361)\n- allow only working key sizes (#500352)\n- retutn nonzero when fnek is not supported (#500566)\n- add icon for Access-Your-Private-Data.desktop file (#500623)\n- fix information about openssl_passwd in openssl_passwd_file (#499128)\n- dont list mount.ecryptfs_private twice\n\n[75-1]\n- update to 75 and drop some patches\n\n[74-24]\n- add suid mount.ecryptfs_private, restrict it to ecryptfs group\n\n[74-23]\n- skip releases -2 - -22 to be sure its always newer nvr\n\n[74-22]\n- drop setuid for mount.ecryptfs_private \n- resolves: #482834\n\n[74-1]\n- update to 74\n- fix difference between apps. real names and names in usage messages (#475969)\n- describe verobse and verbosity=X in man page (#470444)\n- adding passphrase to keyring is fixed (#469662)\n- mount wont fail with wrong/empty input to yes/no questions (#466210)\n- try to load modules instead of failing when its missing (#460496)\n- fix wrong return codes (#479429)\n- resolves: #482834\n', u'issued': u'2009-09-08', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELSA-2009-1307.html', u'type': u'self', u'id': None, u'title': u'ELSA-2009-1307'}, {u'href': u'http://linux.oracle.com/cve/CVE-2008-5188.html', u'type': u'cve', u'id': u'CVE-2008-5188', u'title': u'CVE-2008-5188'}], u'_content_type_id': u'erratum', u'_id': u'2532081c-4866-4bc6-a866-76e36ab2f74f', u'from': u'el-errata@oss.oracle.com', u'severity': u'Low', u'title': u' ecryptfs-utils security, bug fix, and enhancement update', u'_ns': u'units_erratum', u'rights': u'Copyright 2009 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 5', u'reboot_suggested': False, u'type': u'security', u'pkglist': [{u'packages': [{u'src': None, u'name': u'ecryptfs-utils', u'sum': [u'md5', u'1b79bd5b827d00791057514cadbe033f'], u'filename': u'ecryptfs-utils-75-5.el5.i386.rpm', u'epoch': u'0', u'version': u'75', u'release': u'5.el5', u'arch': u'i386'}, {u'src': None, u'name': u'ecryptfs-utils', u'sum': [u'md5', u'05eac62556621bc2ea5c4cb7143446c1'], u'filename': u'ecryptfs-utils-75-5.el5.src.rpm', u'epoch': u'0', u'version': u'75', u'release': u'5.el5', u'arch': u'src'}, {u'src': None, u'name': u'ecryptfs-utils', u'sum': [u'md5', u'6b4746e6cf17220f04803408c4f3bd4a'], u'filename': u'ecryptfs-utils-75-5.el5.x86_64.rpm', u'epoch': u'0', u'version': u'75', u'release': u'5.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'ecryptfs-utils-devel', u'sum': [u'md5', u'2331be2219da09da20517e43c3154574'], u'filename': u'ecryptfs-utils-devel-75-5.el5.i386.rpm', u'epoch': u'0', u'version': u'75', u'release': u'5.el5', u'arch': u'i386'}, {u'src': None, u'name': u'ecryptfs-utils-devel', u'sum': [u'md5', u'f0d5d700f7d4e8002494c1ebf2f8f706'], u'filename': u'ecryptfs-utils-devel-75-5.el5.x86_64.rpm', u'epoch': u'0', u'version': u'75', u'release': u'5.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'ecryptfs-utils-gui', u'sum': [u'md5', u'95e954e52683b22d7419d1a33cd86038'], u'filename': u'ecryptfs-utils-gui-75-5.el5.x86_64.rpm', u'epoch': u'0', u'version': u'75', u'release': u'5.el5', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u"[1:2.16.0-56]\n- Resolves: #239818 181302\n- Fix tcp wrappers detection on 64-bit\n\n[1:2.16.0-55]\nResolves: #196054\n- Fix docs subpackage Requires\n\n[1:2.16.0-53]\nResolves: #196054\n- Add docs subpackage\n\n[1:2.16.0-52]\nResolves: #226931\n- Add te_IN translations\n\n[1:2.16.0-51]\nResolves: #441971\n- Make ctrl-alt-backspace at the login screen more robust\n\n[1:2.16.0-50]\nResolves: #458331\n- Add GDM to audio group by default.\n\n[1:2.16.0-49]\nResolves: #474588\n- Don't crash if defined extended input device is unplugged\n Patch by Olivier Fourdan.\n\n[1:2.16.0-48]\nResolves: #239818\n- Rebuild with tcp_wrappers build requires\n\n[1:2.16.0-47]\nResolves: #473262\n- Fix pointer on tablet devices.\n", u'issued': u'2009-09-08', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELSA-2009-1364.html', u'type': u'self', u'id': None, u'title': u'ELSA-2009-1364'}, {u'href': u'http://linux.oracle.com/cve/CVE-2009-2697.html', u'type': u'cve', u'id': u'CVE-2009-2697', u'title': u'CVE-2009-2697'}], u'_content_type_id': u'erratum', u'_id': u'70ca3e05-742d-446f-aa19-fbce55f67228', u'from': u'el-errata@oss.oracle.com', u'severity': u'Low', u'title': u' gdm security and bug fix update', u'_ns': u'units_erratum', u'rights': u'Copyright 2009 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 5', u'reboot_suggested': False, u'type': u'security', u'pkglist': [{u'packages': [{u'src': None, u'name': u'gdm', u'sum': [u'md5', u'5be7ac2fac6d533c80394e585e7413c1'], u'filename': u'gdm-2.16.0-56.el5.src.rpm', u'epoch': u'1', u'version': u'2.16.0', u'release': u'56.el5', u'arch': u'src'}, {u'src': None, u'name': u'gdm', u'sum': [u'md5', u'62d68e68ad11bef3af7671ea2d9608c9'], u'filename': u'gdm-2.16.0-56.el5.x86_64.rpm', u'epoch': u'1', u'version': u'2.16.0', u'release': u'56.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'gdm-docs', u'sum': [u'md5', u'3e57600f17a1e24f9dbb1701e525d292'], u'filename': u'gdm-docs-2.16.0-56.el5.x86_64.rpm', u'epoch': u'1', u'version': u'2.16.0', u'release': u'56.el5', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u'\n[6.3.6-1.1.el5_3.1]\n- Fix fetchmail various flaws (CVE-2007-4565, CVE-2008-2711, CVE-2009-2666)\n Resolves: #516269', u'issued': u'2009-09-09', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELSA-2009-1427.html', u'type': u'self', u'id': None, u'title': u'ELSA-2009-1427'}, {u'href': u'http://linux.oracle.com/cve/CVE-2007-4565.html', u'type': u'cve', u'id': u'CVE-2007-4565', u'title': u'CVE-2007-4565'}, {u'href': u'http://linux.oracle.com/cve/CVE-2008-2711.html', u'type': u'cve', u'id': u'CVE-2008-2711', u'title': u'CVE-2008-2711'}, {u'href': u'http://linux.oracle.com/cve/CVE-2009-2666.html', u'type': u'cve', u'id': u'CVE-2009-2666', u'title': u'CVE-2009-2666'}], u'_content_type_id': u'erratum', u'_id': u'532154a6-35f2-45fd-9c95-440299d53ef1', u'from': u'el-errata@oss.oracle.com', u'severity': u'Moderate', u'title': u' fetchmail security update', u'_ns': u'units_erratum', u'rights': u'Copyright 2009 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 5', u'reboot_suggested': False, u'type': u'security', u'pkglist': [{u'packages': [{u'src': None, u'name': u'fetchmail', u'sum': [u'md5', u'fe489690eaa45f046f30d9cfb5059f6c'], u'filename': u'fetchmail-6.3.6-1.1.el5_3.1.src.rpm', u'epoch': u'0', u'version': u'6.3.6', u'release': u'1.1.el5_3.1', u'arch': u'src'}, {u'src': None, u'name': u'fetchmail', u'sum': [u'md5', u'f5d84d256102f706589a26bf02bf6b28'], u'filename': u'fetchmail-6.3.6-1.1.el5_3.1.x86_64.rpm', u'epoch': u'0', u'version': u'6.3.6', u'release': u'1.1.el5_3.1', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u'\n[1.2.9-8.1.1]\n- Fix a security issue on short hmac lenght CVE-2009-0217\n- Resolves: rhbz#516724', u'issued': u'2009-09-09', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELSA-2009-1428.html', u'type': u'self', u'id': None, u'title': u'ELSA-2009-1428'}, {u'href': u'http://linux.oracle.com/cve/CVE-2009-0217.html', u'type': u'cve', u'id': u'CVE-2009-0217', u'title': u'CVE-2009-0217'}], u'_content_type_id': u'erratum', u'_id': u'24c7172b-f57a-4ffc-8c26-ec97a50733d6', u'from': u'el-errata@oss.oracle.com', u'severity': u'Moderate', u'title': u' xmlsec1 security update', u'_ns': u'units_erratum', u'rights': u'Copyright 2009 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 5', u'reboot_suggested': False, u'type': u'security', u'pkglist': [{u'packages': [{u'src': None, u'name': u'xmlsec1', u'sum': [u'md5', u'da7ed950a9a52b32ea5447e4d87ec90b'], u'filename': u'xmlsec1-1.2.9-8.1.1.i386.rpm', u'epoch': u'0', u'version': u'1.2.9', u'release': u'8.1.1', u'arch': u'i386'}, {u'src': None, u'name': u'xmlsec1', u'sum': [u'md5', u'a7cf28c88ea3117fc37cf4d0341a9d8c'], u'filename': u'xmlsec1-1.2.9-8.1.1.src.rpm', u'epoch': u'0', u'version': u'1.2.9', u'release': u'8.1.1', u'arch': u'src'}, {u'src': None, u'name': u'xmlsec1', u'sum': [u'md5', u'd16fa8bc32d609015382ad71899bf8c5'], u'filename': u'xmlsec1-1.2.9-8.1.1.x86_64.rpm', u'epoch': u'0', u'version': u'1.2.9', u'release': u'8.1.1', u'arch': u'x86_64'}, {u'src': None, u'name': u'xmlsec1-devel', u'sum': [u'md5', u'67d2201642bde8dd26f37758a5c640b4'], u'filename': u'xmlsec1-devel-1.2.9-8.1.1.i386.rpm', u'epoch': u'0', u'version': u'1.2.9', u'release': u'8.1.1', u'arch': u'i386'}, {u'src': None, u'name': u'xmlsec1-devel', u'sum': [u'md5', u'195eb5942fa5be77bd8aba38d4a15c6d'], u'filename': u'xmlsec1-devel-1.2.9-8.1.1.x86_64.rpm', u'epoch': u'0', u'version': u'1.2.9', u'release': u'8.1.1', u'arch': u'x86_64'}, {u'src': None, u'name': u'xmlsec1-gnutls', u'sum': [u'md5', u'744c4b85009bac864324572e1e8af3e0'], u'filename': u'xmlsec1-gnutls-1.2.9-8.1.1.i386.rpm', u'epoch': u'0', u'version': u'1.2.9', u'release': u'8.1.1', u'arch': u'i386'}, {u'src': None, u'name': u'xmlsec1-gnutls', u'sum': [u'md5', u'f2bb76d78c58fbf2b4d8673fe4136649'], u'filename': u'xmlsec1-gnutls-1.2.9-8.1.1.x86_64.rpm', u'epoch': u'0', u'version': u'1.2.9', u'release': u'8.1.1', u'arch': u'x86_64'}, {u'src': None, u'name': u'xmlsec1-gnutls-devel', u'sum': [u'md5', u'b51a756c0e916c4a807e302e38bdfccc'], u'filename': u'xmlsec1-gnutls-devel-1.2.9-8.1.1.i386.rpm', u'epoch': u'0', u'version': u'1.2.9', u'release': u'8.1.1', u'arch': u'i386'}, {u'src': None, u'name': u'xmlsec1-gnutls-devel', u'sum': [u'md5', u'fdb5bd57b0ee5f680160b8e23a7dec33'], u'filename': u'xmlsec1-gnutls-devel-1.2.9-8.1.1.x86_64.rpm', u'epoch': u'0', u'version': u'1.2.9', u'release': u'8.1.1', u'arch': u'x86_64'}, {u'src': None, u'name': u'xmlsec1-nss', u'sum': [u'md5', u'bf96fa5cfd4d27a4c43ba3cac066d832'], u'filename': u'xmlsec1-nss-1.2.9-8.1.1.i386.rpm', u'epoch': u'0', u'version': u'1.2.9', u'release': u'8.1.1', u'arch': u'i386'}, {u'src': None, u'name': u'xmlsec1-nss', u'sum': [u'md5', u'2ad1c980a85bb16b3afcd790f0cd35ac'], u'filename': u'xmlsec1-nss-1.2.9-8.1.1.x86_64.rpm', u'epoch': u'0', u'version': u'1.2.9', u'release': u'8.1.1', u'arch': u'x86_64'}, {u'src': None, u'name': u'xmlsec1-nss-devel', u'sum': [u'md5', u'4e7dfe4f1e27e90318ea129247e63a81'], u'filename': u'xmlsec1-nss-devel-1.2.9-8.1.1.i386.rpm', u'epoch': u'0', u'version': u'1.2.9', u'release': u'8.1.1', u'arch': u'i386'}, {u'src': None, u'name': u'xmlsec1-nss-devel', u'sum': [u'md5', u'73ac6ce03452e3c89ac2e91414b6959c'], u'filename': u'xmlsec1-nss-devel-1.2.9-8.1.1.x86_64.rpm', u'epoch': u'0', u'version': u'1.2.9', u'release': u'8.1.1', u'arch': u'x86_64'}, {u'src': None, u'name': u'xmlsec1-openssl', u'sum': [u'md5', u'ab852cf2ee6cdf772b5c87a19b5795b4'], u'filename': u'xmlsec1-openssl-1.2.9-8.1.1.i386.rpm', u'epoch': u'0', u'version': u'1.2.9', u'release': u'8.1.1', u'arch': u'i386'}, {u'src': None, u'name': u'xmlsec1-openssl', u'sum': [u'md5', u'0503a417dfbee81060c43666350c6c20'], u'filename': u'xmlsec1-openssl-1.2.9-8.1.1.x86_64.rpm', u'epoch': u'0', u'version': u'1.2.9', u'release': u'8.1.1', u'arch': u'x86_64'}, {u'src': None, u'name': u'xmlsec1-openssl-devel', u'sum': [u'md5', u'b08fb2e4d048fe7ec77d2e124ac84d9f'], u'filename': u'xmlsec1-openssl-devel-1.2.9-8.1.1.i386.rpm', u'epoch': u'0', u'version': u'1.2.9', u'release': u'8.1.1', u'arch': u'i386'}, {u'src': None, u'name': u'xmlsec1-openssl-devel', u'sum': [u'md5', u'8423c2f5a39f363fb4eccf1be1c51ec8'], u'filename': u'xmlsec1-openssl-devel-1.2.9-8.1.1.x86_64.rpm', u'epoch': u'0', u'version': u'1.2.9', u'release': u'8.1.1', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u'\n[0.25.5-10.el5_4.1]\n- add security fixes for CVE-2009-2473 CVE-2009-2474 (#521788)', u'issued': u'2009-09-21', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELSA-2009-1452.html', u'type': u'self', u'id': None, u'title': u'ELSA-2009-1452'}, {u'href': u'http://linux.oracle.com/cve/CVE-2009-2473.html', u'type': u'cve', u'id': u'CVE-2009-2473', u'title': u'CVE-2009-2473'}, {u'href': u'http://linux.oracle.com/cve/CVE-2009-2474.html', u'type': u'cve', u'id': u'CVE-2009-2474', u'title': u'CVE-2009-2474'}], u'_content_type_id': u'erratum', u'_id': u'05764e15-39bf-491d-a3f5-6016232f04f3', u'from': u'el-errata@oss.oracle.com', u'severity': u'Moderate', u'title': u' neon security update', u'_ns': u'units_erratum', u'rights': u'Copyright 2009 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 5', u'reboot_suggested': False, u'type': u'security', u'pkglist': [{u'packages': [{u'src': None, u'name': u'neon', u'sum': [u'md5', u'54525a4c3a739bdef76c24d5f6fa2f0f'], u'filename': u'neon-0.25.5-10.el5_4.1.i386.rpm', u'epoch': u'0', u'version': u'0.25.5', u'release': u'10.el5_4.1', u'arch': u'i386'}, {u'src': None, u'name': u'neon', u'sum': [u'md5', u'7b02e0075932805e3a48c17815e79f20'], u'filename': u'neon-0.25.5-10.el5_4.1.src.rpm', u'epoch': u'0', u'version': u'0.25.5', u'release': u'10.el5_4.1', u'arch': u'src'}, {u'src': None, u'name': u'neon', u'sum': [u'md5', u'a9e8f0e1ab67d6e9eed88759ae94bfe3'], u'filename': u'neon-0.25.5-10.el5_4.1.x86_64.rpm', u'epoch': u'0', u'version': u'0.25.5', u'release': u'10.el5_4.1', u'arch': u'x86_64'}, {u'src': None, u'name': u'neon-devel', u'sum': [u'md5', u'53c90a7ef7393cd240c6d9bbf77ef81e'], u'filename': u'neon-devel-0.25.5-10.el5_4.1.i386.rpm', u'epoch': u'0', u'version': u'0.25.5', u'release': u'10.el5_4.1', u'arch': u'i386'}, {u'src': None, u'name': u'neon-devel', u'sum': [u'md5', u'814939a7059d20f88f695812681443cd'], u'filename': u'neon-devel-0.25.5-10.el5_4.1.x86_64.rpm', u'epoch': u'0', u'version': u'0.25.5', u'release': u'10.el5_4.1', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u'\n[2.3.7-7.0.1.el5_4.3]\n- Enabled lm_sensors-devel build dependency for x86 and x86_64 only\n\n[2.3.7-7.3]\n- fix more buffer overflows in cyrus sieve (CVE-2009-3235)\n\n[2.3.7-7.2]\n- bump release for rebuild\n\n[2.3.7-7.1]\n- fix buffer overflow in cyrus sieve (#521011) ', u'issued': u'2009-09-23', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELSA-2009-1459.html', u'type': u'self', u'id': None, u'title': u'ELSA-2009-1459'}, {u'href': u'http://linux.oracle.com/cve/CVE-2009-2632.html', u'type': u'cve', u'id': u'CVE-2009-2632', u'title': u'CVE-2009-2632'}, {u'href': u'http://linux.oracle.com/cve/CVE-2009-3235.html', u'type': u'cve', u'id': u'CVE-2009-3235', u'title': u'CVE-2009-3235'}], u'_content_type_id': u'erratum', u'_id': u'52bdb302-fcfc-46e2-afc2-3e349d20b990', u'from': u'el-errata@oss.oracle.com', u'severity': u'Important', u'title': u' cyrus-imapd security update', u'_ns': u'units_erratum', u'rights': u'Copyright 2009 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 5', u'reboot_suggested': False, u'type': u'security', u'pkglist': [{u'packages': [{u'src': None, u'name': u'cyrus-imapd', u'sum': [u'md5', u'cc4b2ae6291023386da9ca7f703fd6d7'], u'filename': u'cyrus-imapd-2.3.7-7.0.1.el5_4.3.src.rpm', u'epoch': u'0', u'version': u'2.3.7', u'release': u'7.0.1.el5_4.3', u'arch': u'src'}, {u'src': None, u'name': u'cyrus-imapd', u'sum': [u'md5', u'04a97c62c76851657afef77977a86a0f'], u'filename': u'cyrus-imapd-2.3.7-7.0.1.el5_4.3.x86_64.rpm', u'epoch': u'0', u'version': u'2.3.7', u'release': u'7.0.1.el5_4.3', u'arch': u'x86_64'}, {u'src': None, u'name': u'cyrus-imapd-devel', u'sum': [u'md5', u'c869386fa11cfb4e9c64c557ddf6706d'], u'filename': u'cyrus-imapd-devel-2.3.7-7.0.1.el5_4.3.i386.rpm', u'epoch': u'0', u'version': u'2.3.7', u'release': u'7.0.1.el5_4.3', u'arch': u'i386'}, {u'src': None, u'name': u'cyrus-imapd-devel', u'sum': [u'md5', u'51271b670d9d58fe65ec429da7fa0214'], u'filename': u'cyrus-imapd-devel-2.3.7-7.0.1.el5_4.3.x86_64.rpm', u'epoch': u'0', u'version': u'2.3.7', u'release': u'7.0.1.el5_4.3', u'arch': u'x86_64'}, {u'src': None, u'name': u'cyrus-imapd-perl', u'sum': [u'md5', u'cfce5bfb26e066f18f8bbc3d8bbfe0de'], u'filename': u'cyrus-imapd-perl-2.3.7-7.0.1.el5_4.3.x86_64.rpm', u'epoch': u'0', u'version': u'2.3.7', u'release': u'7.0.1.el5_4.3', u'arch': u'x86_64'}, {u'src': None, u'name': u'cyrus-imapd-utils', u'sum': [u'md5', u'91c2e18c75927b02437f5e25a04eb17a'], u'filename': u'cyrus-imapd-utils-2.3.7-7.0.1.el5_4.3.x86_64.rpm', u'epoch': u'0', u'version': u'2.3.7', u'release': u'7.0.1.el5_4.3', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u'\n[0.11.1-6.1]\n- fix #235411 - CVE-2007-2027 - elinks tries to load .po files\n from non-absolute path\n- fix #523258 - CVE-2008-7224 - entity_cache static array buffer\n overflow ', u'issued': u'2009-10-01', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELSA-2009-1471.html', u'type': u'self', u'id': None, u'title': u'ELSA-2009-1471'}, {u'href': u'http://linux.oracle.com/cve/CVE-2007-2027.html', u'type': u'cve', u'id': u'CVE-2007-2027', u'title': u'CVE-2007-2027'}, {u'href': u'http://linux.oracle.com/cve/CVE-2008-7224.html', u'type': u'cve', u'id': u'CVE-2008-7224', u'title': u'CVE-2008-7224'}], u'_content_type_id': u'erratum', u'_id': u'7d9ba6c2-e8c5-4aaf-9aa5-76d0ee004fc5', u'from': u'el-errata@oss.oracle.com', u'severity': u'Important', u'title': u' elinks security update', u'_ns': u'units_erratum', u'rights': u'Copyright 2009 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 5', u'reboot_suggested': False, u'type': u'security', u'pkglist': [{u'packages': [{u'src': None, u'name': u'elinks', u'sum': [u'md5', u'e7409b51007291614b6856813a354ccc'], u'filename': u'elinks-0.11.1-6.el5_4.1.src.rpm', u'epoch': u'0', u'version': u'0.11.1', u'release': u'6.el5_4.1', u'arch': u'src'}, {u'src': None, u'name': u'elinks', u'sum': [u'md5', u'60fe8e0285568787db107df4032bc95f'], u'filename': u'elinks-0.11.1-6.el5_4.1.x86_64.rpm', u'epoch': u'0', u'version': u'0.11.1', u'release': u'6.el5_4.1', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u'\n[1.4.8-5.0.1.el5_4.10]\n- Remove Redhat splash screen images\n\n[1.4.8-5.10]\n- fix: CVE-2009-2964 : CSRF issues in all forms - extend to all forms\n\n[1.4.8-5.9]\n- fix: CVE-2009-2964 : CSRF issues in all forms - add missing parts\n\n[1.4.8-5.8]\n- fix: CVE-2009-2964 : CSRF issues in all forms ', u'issued': u'2009-10-08', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELSA-2009-1490.html', u'type': u'self', u'id': None, u'title': u'ELSA-2009-1490'}, {u'href': u'http://linux.oracle.com/cve/CVE-2009-2964.html', u'type': u'cve', u'id': u'CVE-2009-2964', u'title': u'CVE-2009-2964'}], u'_content_type_id': u'erratum', u'_id': u'fd809e11-9f95-4c40-aafa-0912fee81f97', u'from': u'el-errata@oss.oracle.com', u'severity': u'Moderate', u'title': u' squirrelmail security update', u'_ns': u'units_erratum', u'rights': u'Copyright 2009 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 5', u'reboot_suggested': False, u'type': u'security', u'pkglist': [{u'packages': [{u'src': None, u'name': u'squirrelmail', u'sum': [u'md5', u'1b1a5710bff9a9a8b02579314fc755d7'], u'filename': u'squirrelmail-1.4.8-5.0.1.el5_4.10.noarch.rpm', u'epoch': u'0', u'version': u'1.4.8', u'release': u'5.0.1.el5_4.10', u'arch': u'noarch'}, {u'src': None, u'name': u'squirrelmail', u'sum': [u'md5', u'8f1ab508fbcaa8602e5fe9f265073b56'], u'filename': u'squirrelmail-1.4.8-5.0.1.el5_4.10.src.rpm', u'epoch': u'0', u'version': u'1.4.8', u'release': u'5.0.1.el5_4.10', u'arch': u'src'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u'\n[1.11.4-3]\n- add fix for CVE-2009-3490,\n incorrect verification of SSL certificate with NUL in name ', u'issued': u'2009-11-03', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELSA-2009-1549.html', u'type': u'self', u'id': None, u'title': u'ELSA-2009-1549'}, {u'href': u'http://linux.oracle.com/cve/CVE-2009-3490.html', u'type': u'cve', u'id': u'CVE-2009-3490', u'title': u'CVE-2009-3490'}], u'_content_type_id': u'erratum', u'_id': u'910a76b9-b268-4799-b37c-04d46579f000', u'from': u'el-errata@oss.oracle.com', u'severity': u'Moderate', u'title': u' wget security update', u'_ns': u'units_erratum', u'rights': u'Copyright 2009 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 5', u'reboot_suggested': False, u'type': u'security', u'pkglist': [{u'packages': [{u'src': None, u'name': u'wget', u'sum': [u'md5', u'abcd0cc8261699efcc06937e5cc42739'], u'filename': u'wget-1.11.4-2.el5_4.1.src.rpm', u'epoch': u'0', u'version': u'1.11.4', u'release': u'2.el5_4.1', u'arch': u'src'}, {u'src': None, u'name': u'wget', u'sum': [u'md5', u'922366dda79216bca83f522b015eb895'], u'filename': u'wget-1.11.4-2.el5_4.1.x86_64.rpm', u'epoch': u'0', u'version': u'1.11.4', u'release': u'2.el5_4.1', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u'\n[1:1.1.2-3.el5.4]\n- fix CVE-CVE-2009-3379\nResolves: #532418 ', u'issued': u'2009-11-09', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELSA-2009-1561.html', u'type': u'self', u'id': None, u'title': u'ELSA-2009-1561'}, {u'href': u'http://linux.oracle.com/cve/CVE-2009-3379.html', u'type': u'cve', u'id': u'CVE-2009-3379', u'title': u'CVE-2009-3379'}], u'_content_type_id': u'erratum', u'_id': u'ae8ad03e-1580-41f1-8380-cf30e8a11304', u'from': u'el-errata@oss.oracle.com', u'severity': u'Important', u'title': u' libvorbis security update', u'_ns': u'units_erratum', u'rights': u'Copyright 2009 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 5', u'reboot_suggested': False, u'type': u'security', u'pkglist': [{u'packages': [{u'src': None, u'name': u'libvorbis', u'sum': [u'md5', u'0e8ca4ea09c889ff57dc19aa58c4b2db'], u'filename': u'libvorbis-1.1.2-3.el5_4.4.i386.rpm', u'epoch': u'1', u'version': u'1.1.2', u'release': u'3.el5_4.4', u'arch': u'i386'}, {u'src': None, u'name': u'libvorbis', u'sum': [u'md5', u'c1013ceff8fedbaa1cc827587fd56831'], u'filename': u'libvorbis-1.1.2-3.el5_4.4.src.rpm', u'epoch': u'1', u'version': u'1.1.2', u'release': u'3.el5_4.4', u'arch': u'src'}, {u'src': None, u'name': u'libvorbis', u'sum': [u'md5', u'f97328ffd1e69ed764a6dff721d50dbb'], u'filename': u'libvorbis-1.1.2-3.el5_4.4.x86_64.rpm', u'epoch': u'1', u'version': u'1.1.2', u'release': u'3.el5_4.4', u'arch': u'x86_64'}, {u'src': None, u'name': u'libvorbis-devel', u'sum': [u'md5', u'cd0a09c71e0c6c5dc03e0d9a534d8ffa'], u'filename': u'libvorbis-devel-1.1.2-3.el5_4.4.i386.rpm', u'epoch': u'1', u'version': u'1.1.2', u'release': u'3.el5_4.4', u'arch': u'i386'}, {u'src': None, u'name': u'libvorbis-devel', u'sum': [u'md5', u'63b1b04a82e7d25ee808daffdae40c88'], u'filename': u'libvorbis-devel-1.1.2-3.el5_4.4.x86_64.rpm', u'epoch': u'1', u'version': u'1.1.2', u'release': u'3.el5_4.4', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u'\n[3.5.4-25.0.1.el5_4.1]\n- Remove Version branding\n- Maximum rpm trademark logos removed (pics/crystalsvg/*-mime-rpm*) in tarball\n\n[3.5.4-25.1]\n- bump release\n\n[3.5.4-22.2]\n- Resolves: #539716,\n CVE-2009-0689, kdelibs remote array overrun ', u'issued': u'2009-11-24', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELSA-2009-1601.html', u'type': u'self', u'id': None, u'title': u'ELSA-2009-1601'}, {u'href': u'http://linux.oracle.com/cve/CVE-2009-0689.html', u'type': u'cve', u'id': u'CVE-2009-0689', u'title': u'CVE-2009-0689'}], u'_content_type_id': u'erratum', u'_id': u'99bc1da3-fda1-4f21-bb79-e2c54a9d2025', u'from': u'el-errata@oss.oracle.com', u'severity': u'Critical', u'title': u' kdelibs security update', u'_ns': u'units_erratum', u'rights': u'Copyright 2009 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 5', u'reboot_suggested': False, u'type': u'security', u'pkglist': [{u'packages': [{u'src': None, u'name': u'kdelibs', u'sum': [u'md5', u'046032089cec44a2901aad1beaa7d95a'], u'filename': u'kdelibs-3.5.4-25.0.1.el5_4.1.i386.rpm', u'epoch': u'6', u'version': u'3.5.4', u'release': u'25.0.1.el5_4.1', u'arch': u'i386'}, {u'src': None, u'name': u'kdelibs', u'sum': [u'md5', u'2fdb63f0efa284719c72bd9ae25c1b67'], u'filename': u'kdelibs-3.5.4-25.0.1.el5_4.1.src.rpm', u'epoch': u'6', u'version': u'3.5.4', u'release': u'25.0.1.el5_4.1', u'arch': u'src'}, {u'src': None, u'name': u'kdelibs', u'sum': [u'md5', u'66b5d4d278c427ac08fb33fd7b2db2e7'], u'filename': u'kdelibs-3.5.4-25.0.1.el5_4.1.x86_64.rpm', u'epoch': u'6', u'version': u'3.5.4', u'release': u'25.0.1.el5_4.1', u'arch': u'x86_64'}, {u'src': None, u'name': u'kdelibs-apidocs', u'sum': [u'md5', u'12bdea3b96f998ea3a6a0d68aec7e4a4'], u'filename': u'kdelibs-apidocs-3.5.4-25.0.1.el5_4.1.x86_64.rpm', u'epoch': u'6', u'version': u'3.5.4', u'release': u'25.0.1.el5_4.1', u'arch': u'x86_64'}, {u'src': None, u'name': u'kdelibs-devel', u'sum': [u'md5', u'bd0287f1b972e26cf1f48400767d536a'], u'filename': u'kdelibs-devel-3.5.4-25.0.1.el5_4.1.i386.rpm', u'epoch': u'6', u'version': u'3.5.4', u'release': u'25.0.1.el5_4.1', u'arch': u'i386'}, {u'src': None, u'name': u'kdelibs-devel', u'sum': [u'md5', u'73f7fba8fddc52ae757e4c6560f0691e'], u'filename': u'kdelibs-devel-3.5.4-25.0.1.el5_4.1.x86_64.rpm', u'epoch': u'6', u'version': u'3.5.4', u'release': u'25.0.1.el5_4.1', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u'\n[0:2.7.1-7jpp.2.2]\n- Specifies target=1.3 for compilation\n Resolves: rhbz#526017\n\n[0:2.7.1-7jpp.2.1]\n- Add patch for CVE-2009-2625\n Resolves: rhbz#526017', u'issued': u'2009-11-30', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELSA-2009-1615.html', u'type': u'self', u'id': None, u'title': u'ELSA-2009-1615'}, {u'href': u'http://linux.oracle.com/cve/CVE-2009-2625.html', u'type': u'cve', u'id': u'CVE-2009-2625', u'title': u'CVE-2009-2625'}], u'_content_type_id': u'erratum', u'_id': u'f4456619-42a7-468b-b019-3186a6cdd46b', u'from': u'el-errata@oss.oracle.com', u'severity': u'Moderate', u'title': u' xerces-j2 security update', u'_ns': u'units_erratum', u'rights': u'Copyright 2009 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 5', u'reboot_suggested': False, u'type': u'security', u'pkglist': [{u'packages': [{u'src': None, u'name': u'xerces-j2', u'sum': [u'md5', u'2fff4ceac21711200da4e2bb48859577'], u'filename': u'xerces-j2-2.7.1-7jpp.2.el5_4.2.src.rpm', u'epoch': u'0', u'version': u'2.7.1', u'release': u'7jpp.2.el5_4.2', u'arch': u'src'}, {u'src': None, u'name': u'xerces-j2', u'sum': [u'md5', u'6627a8df5674c73f22532a3fd3207159'], u'filename': u'xerces-j2-2.7.1-7jpp.2.el5_4.2.x86_64.rpm', u'epoch': u'0', u'version': u'2.7.1', u'release': u'7jpp.2.el5_4.2', u'arch': u'x86_64'}, {u'src': None, u'name': u'xerces-j2-demo', u'sum': [u'md5', u'aea74a2c4ecd6b9fe4486e14bb5b9a63'], u'filename': u'xerces-j2-demo-2.7.1-7jpp.2.el5_4.2.x86_64.rpm', u'epoch': u'0', u'version': u'2.7.1', u'release': u'7jpp.2.el5_4.2', u'arch': u'x86_64'}, {u'src': None, u'name': u'xerces-j2-javadoc-apis', u'sum': [u'md5', u'f348a62c3939e7fba0e08c1843e2a9cb'], u'filename': u'xerces-j2-javadoc-apis-2.7.1-7jpp.2.el5_4.2.x86_64.rpm', u'epoch': u'0', u'version': u'2.7.1', u'release': u'7jpp.2.el5_4.2', u'arch': u'x86_64'}, {u'src': None, u'name': u'xerces-j2-javadoc-impl', u'sum': [u'md5', u'113588044e7cf3e4f4807b0f82eba525'], u'filename': u'xerces-j2-javadoc-impl-2.7.1-7jpp.2.el5_4.2.x86_64.rpm', u'epoch': u'0', u'version': u'2.7.1', u'release': u'7jpp.2.el5_4.2', u'arch': u'x86_64'}, {u'src': None, u'name': u'xerces-j2-javadoc-other', u'sum': [u'md5', u'cd68ecd1f27fca062420a5a63faf3395'], u'filename': u'xerces-j2-javadoc-other-2.7.1-7jpp.2.el5_4.2.x86_64.rpm', u'epoch': u'0', u'version': u'2.7.1', u'release': u'7jpp.2.el5_4.2', u'arch': u'x86_64'}, {u'src': None, u'name': u'xerces-j2-javadoc-xni', u'sum': [u'md5', u'1dd43f974da3ce013b05ff7474763ebb'], u'filename': u'xerces-j2-javadoc-xni-2.7.1-7jpp.2.el5_4.2.x86_64.rpm', u'epoch': u'0', u'version': u'2.7.1', u'release': u'7jpp.2.el5_4.2', u'arch': u'x86_64'}, {u'src': None, u'name': u'xerces-j2-scripts', u'sum': [u'md5', u'17af6758bcc75ccf3f8fbe7cc18e4c0e'], u'filename': u'xerces-j2-scripts-2.7.1-7jpp.2.el5_4.2.x86_64.rpm', u'epoch': u'0', u'version': u'2.7.1', u'release': u'7jpp.2.el5_4.2', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u'\n[0.6.6-3.1]\n- removed . and ./plugins from module loading path (#538469) ', u'issued': u'2009-11-30', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELSA-2009-1619.html', u'type': u'self', u'id': None, u'title': u'ELSA-2009-1619'}, {u'href': u'http://linux.oracle.com/cve/CVE-2009-3894.html', u'type': u'cve', u'id': u'CVE-2009-3894', u'title': u'CVE-2009-3894'}], u'_content_type_id': u'erratum', u'_id': u'af58f18d-7790-4b93-a29c-7da88fcb35e8', u'from': u'el-errata@oss.oracle.com', u'severity': u'Moderate', u'title': u' dstat security update', u'_ns': u'units_erratum', u'rights': u'Copyright 2009 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 5', u'reboot_suggested': False, u'type': u'security', u'pkglist': [{u'packages': [{u'src': None, u'name': u'dstat', u'sum': [u'md5', u'0668e37497860aab90acb6a97fa3b576'], u'filename': u'dstat-0.6.6-3.el5_4.1.noarch.rpm', u'epoch': u'0', u'version': u'0.6.6', u'release': u'3.el5_4.1', u'arch': u'noarch'}, {u'src': None, u'name': u'dstat', u'sum': [u'md5', u'1d19166154587d9390be209f03b7513d'], u'filename': u'dstat-0.6.6-3.el5_4.1.src.rpm', u'epoch': u'0', u'version': u'0.6.6', u'release': u'3.el5_4.1', u'arch': u'src'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u'\n[1.5.22-7]\n- add fix for CVE-2009-3736,\n libltdl may load and execute code from a library in the current directory', u'issued': u'2009-12-08', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELSA-2009-1646.html', u'type': u'self', u'id': None, u'title': u'ELSA-2009-1646'}, {u'href': u'http://linux.oracle.com/cve/CVE-2009-3736.html', u'type': u'cve', u'id': u'CVE-2009-3736', u'title': u'CVE-2009-3736'}], u'_content_type_id': u'erratum', u'_id': u'a5d9a942-838f-4d61-95d7-5ad2dfb5acbd', u'from': u'el-errata@oss.oracle.com', u'severity': u'Moderate', u'title': u' libtool security update', u'_ns': u'units_erratum', u'rights': u'Copyright 2009 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 5', u'reboot_suggested': False, u'type': u'security', u'pkglist': [{u'packages': [{u'src': None, u'name': u'libtool', u'sum': [u'md5', u'4548f74d57c6af96ef750fee623cf728'], u'filename': u'libtool-1.5.22-7.el5_4.src.rpm', u'epoch': u'0', u'version': u'1.5.22', u'release': u'7.el5_4', u'arch': u'src'}, {u'src': None, u'name': u'libtool', u'sum': [u'md5', u'239dce6367441a33d496a11a2204466f'], u'filename': u'libtool-1.5.22-7.el5_4.x86_64.rpm', u'epoch': u'0', u'version': u'1.5.22', u'release': u'7.el5_4', u'arch': u'x86_64'}, {u'src': None, u'name': u'libtool-ltdl', u'sum': [u'md5', u'f83bbc7092072d2a0607724671244fcc'], u'filename': u'libtool-ltdl-1.5.22-7.el5_4.i386.rpm', u'epoch': u'0', u'version': u'1.5.22', u'release': u'7.el5_4', u'arch': u'i386'}, {u'src': None, u'name': u'libtool-ltdl', u'sum': [u'md5', u'15dd843dba2692ba69c221eb71c2fe01'], u'filename': u'libtool-ltdl-1.5.22-7.el5_4.x86_64.rpm', u'epoch': u'0', u'version': u'1.5.22', u'release': u'7.el5_4', u'arch': u'x86_64'}, {u'src': None, u'name': u'libtool-ltdl-devel', u'sum': [u'md5', u'3f69d1c053356995140508c6216eb5fa'], u'filename': u'libtool-ltdl-devel-1.5.22-7.el5_4.i386.rpm', u'epoch': u'0', u'version': u'1.5.22', u'release': u'7.el5_4', u'arch': u'i386'}, {u'src': None, u'name': u'libtool-ltdl-devel', u'sum': [u'md5', u'11b6eda49171fd8252f1157eb1e8dadf'], u'filename': u'libtool-ltdl-devel-1.5.22-7.el5_4.x86_64.rpm', u'epoch': u'0', u'version': u'1.5.22', u'release': u'7.el5_4', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u'\n[4.2.2p1-9.el5_4.1]\n- fix DoS with mode 7 packets (#532639, CVE-2009-3563)\n- compile with -fno-strict-aliasing', u'issued': u'2009-12-08', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELSA-2009-1648.html', u'type': u'self', u'id': None, u'title': u'ELSA-2009-1648'}, {u'href': u'http://linux.oracle.com/cve/CVE-2009-3563.html', u'type': u'cve', u'id': u'CVE-2009-3563', u'title': u'CVE-2009-3563'}], u'_content_type_id': u'erratum', u'_id': u'1b1dd900-9bfb-4bbd-b261-184b8c0aa559', u'from': u'el-errata@oss.oracle.com', u'severity': u'Moderate', u'title': u' ntp security update', u'_ns': u'units_erratum', u'rights': u'Copyright 2009 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 5', u'reboot_suggested': False, u'type': u'security', u'pkglist': [{u'packages': [{u'src': None, u'name': u'ntp', u'sum': [u'md5', u'1e2ca4a1f4dabcd6bc7864b4bb180b41'], u'filename': u'ntp-4.2.2p1-9.el5_4.1.src.rpm', u'epoch': u'0', u'version': u'4.2.2p1', u'release': u'9.el5_4.1', u'arch': u'src'}, {u'src': None, u'name': u'ntp', u'sum': [u'md5', u'3629aa0afda100ebc71f328a703ce76f'], u'filename': u'ntp-4.2.2p1-9.el5_4.1.x86_64.rpm', u'epoch': u'0', u'version': u'4.2.2p1', u'release': u'9.el5_4.1', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u'\n[0.8.4-4.2]\n- Use system expat library\n Resolves: #531852\n\n[0.8.4-4.1]\n- Fix buffer over read\n Resolves: #531852', u'issued': u'2010-01-04', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELSA-2010-0002.html', u'type': u'self', u'id': None, u'title': u'ELSA-2010-0002'}, {u'href': u'http://linux.oracle.com/cve/CVE-2009-3720.html', u'type': u'cve', u'id': u'CVE-2009-3720', u'title': u'CVE-2009-3720'}], u'_content_type_id': u'erratum', u'_id': u'223e722b-3052-4ecc-a972-0ee9a4641204', u'from': u'el-errata@oss.oracle.com', u'severity': u'Moderate', u'title': u' PyXML security update', u'_ns': u'units_erratum', u'rights': u'Copyright 2010 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 5', u'reboot_suggested': False, u'type': u'security', u'pkglist': [{u'packages': [{u'src': None, u'name': u'PyXML', u'sum': [u'md5', u'8e3f35a360b259a58729f47dff11f5b7'], u'filename': u'PyXML-0.8.4-4.el5_4.2.src.rpm', u'epoch': u'0', u'version': u'0.8.4', u'release': u'4.el5_4.2', u'arch': u'src'}, {u'src': None, u'name': u'PyXML', u'sum': [u'md5', u'3f604c256cf1cebf38733a9b3dea8299'], u'filename': u'PyXML-0.8.4-4.el5_4.2.x86_64.rpm', u'epoch': u'0', u'version': u'0.8.4', u'release': u'4.el5_4.2', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u'\n[2.0.33-9.4.el5_4.2]\n- rpmdiff fixes\n- Resolves: #541632\n\n[2.0.33-9.4.el5_4.1]\n- security fixes\n- CVE-2009-3546 gd: insufficient input validation in _gdGetColors() ', u'issued': u'2010-01-04', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELSA-2010-0003.html', u'type': u'self', u'id': None, u'title': u'ELSA-2010-0003'}, {u'href': u'http://linux.oracle.com/cve/CVE-2009-3546.html', u'type': u'cve', u'id': u'CVE-2009-3546', u'title': u'CVE-2009-3546'}], u'_content_type_id': u'erratum', u'_id': u'2c59b41c-eb0f-44ab-ac1b-37312276103d', u'from': u'el-errata@oss.oracle.com', u'severity': u'Moderate', u'title': u' gd security update', u'_ns': u'units_erratum', u'rights': u'Copyright 2010 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 5', u'reboot_suggested': False, u'type': u'security', u'pkglist': [{u'packages': [{u'src': None, u'name': u'gd', u'sum': [u'md5', u'67d718b3a22f69963f89bf57b2422c6c'], u'filename': u'gd-2.0.33-9.4.el5_4.2.i386.rpm', u'epoch': u'0', u'version': u'2.0.33', u'release': u'9.4.el5_4.2', u'arch': u'i386'}, {u'src': None, u'name': u'gd', u'sum': [u'md5', u'dd2a33716b5b8eedacdcca487fae9acd'], u'filename': u'gd-2.0.33-9.4.el5_4.2.src.rpm', u'epoch': u'0', u'version': u'2.0.33', u'release': u'9.4.el5_4.2', u'arch': u'src'}, {u'src': None, u'name': u'gd', u'sum': [u'md5', u'e7e24238e6b3f46ffc0efeef7a787b07'], u'filename': u'gd-2.0.33-9.4.el5_4.2.x86_64.rpm', u'epoch': u'0', u'version': u'2.0.33', u'release': u'9.4.el5_4.2', u'arch': u'x86_64'}, {u'src': None, u'name': u'gd-devel', u'sum': [u'md5', u'cfa4bf4db5f4c2caec91256dd25e8201'], u'filename': u'gd-devel-2.0.33-9.4.el5_4.2.i386.rpm', u'epoch': u'0', u'version': u'2.0.33', u'release': u'9.4.el5_4.2', u'arch': u'i386'}, {u'src': None, u'name': u'gd-devel', u'sum': [u'md5', u'8d1e5cd8efa90df6da821dc7b0735d29'], u'filename': u'gd-devel-2.0.33-9.4.el5_4.2.x86_64.rpm', u'epoch': u'0', u'version': u'2.0.33', u'release': u'9.4.el5_4.2', u'arch': u'x86_64'}, {u'src': None, u'name': u'gd-progs', u'sum': [u'md5', u'1e8d36d8385fa3fd1b0c3a8a30536a7f'], u'filename': u'gd-progs-2.0.33-9.4.el5_4.2.x86_64.rpm', u'epoch': u'0', u'version': u'2.0.33', u'release': u'9.4.el5_4.2', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u'\n[1.3.5-11.0.1.el5_4.1]\n- Updated description in specfile to be product neutral\n\n[1.3.5-11:.1]\n- Added fix for CVE-2010-0001: (64 bit) Integer underflow by decompressing\n LZW format files\n Resolves: rhbz#555088 ', u'issued': u'2010-01-20', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELSA-2010-0061.html', u'type': u'self', u'id': None, u'title': u'ELSA-2010-0061'}, {u'href': u'http://linux.oracle.com/cve/CVE-2010-0001.html', u'type': u'cve', u'id': u'CVE-2010-0001', u'title': u'CVE-2010-0001'}], u'_content_type_id': u'erratum', u'_id': u'17bc99a7-c8e3-46a3-890a-3cf3eb7f4d6c', u'from': u'el-errata@oss.oracle.com', u'severity': u'Moderate', u'title': u' gzip security update', u'_ns': u'units_erratum', u'rights': u'Copyright 2010 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 5', u'reboot_suggested': False, u'type': u'security', u'pkglist': [{u'packages': [{u'src': None, u'name': u'gzip', u'sum': [u'md5', u'2ad1f5616893d84e1887a04decae5dc7'], u'filename': u'gzip-1.3.5-11.0.1.el5_4.1.src.rpm', u'epoch': u'0', u'version': u'1.3.5', u'release': u'11.0.1.el5_4.1', u'arch': u'src'}, {u'src': None, u'name': u'gzip', u'sum': [u'md5', u'1680df517ae339b4d7831da4b21aff09'], u'filename': u'gzip-1.3.5-11.0.1.el5_4.1.x86_64.rpm', u'epoch': u'0', u'version': u'1.3.5', u'release': u'11.0.1.el5_4.1', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u'\n[2.6-23.1]\n- CVE-2010-0624 fix heap-based buffer overflow by expanding\n a specially-crafted archive\n- CVE-2007-4476 fix stack crashing in safer_name_suffix ', u'issued': u'2010-03-15', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELSA-2010-0144.html', u'type': u'self', u'id': None, u'title': u'ELSA-2010-0144'}, {u'href': u'http://linux.oracle.com/cve/CVE-2007-4476.html', u'type': u'cve', u'id': u'CVE-2007-4476', u'title': u'CVE-2007-4476'}, {u'href': u'http://linux.oracle.com/cve/CVE-2010-0624.html', u'type': u'cve', u'id': u'CVE-2010-0624', u'title': u'CVE-2010-0624'}], u'_content_type_id': u'erratum', u'_id': u'abecd68f-ad9e-473e-a74d-960c200619ec', u'from': u'el-errata@oss.oracle.com', u'severity': u'Moderate', u'title': u' cpio security update', u'_ns': u'units_erratum', u'rights': u'Copyright 2010 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 5', u'reboot_suggested': False, u'type': u'security', u'pkglist': [{u'packages': [{u'src': None, u'name': u'cpio', u'sum': [u'md5', u'8b5acabc33b090cfd7fc669ae02d021d'], u'filename': u'cpio-2.6-23.el5_4.1.src.rpm', u'epoch': u'0', u'version': u'2.6', u'release': u'23.el5_4.1', u'arch': u'src'}, {u'src': None, u'name': u'cpio', u'sum': [u'md5', u'9ed4584cd2ec2ed56a867bb9101a00d7'], u'filename': u'cpio-2.6-23.el5_4.1.x86_64.rpm', u'epoch': u'0', u'version': u'2.6', u'release': u'23.el5_4.1', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u'\n[0.9.7a-9.2]\n- CVE-2009-3555 - support the secure renegotiation RFC (#533125) ', u'issued': u'2010-03-25', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELSA-2010-0164.html', u'type': u'self', u'id': None, u'title': u'ELSA-2010-0164'}, {u'href': u'http://linux.oracle.com/cve/CVE-2009-3555.html', u'type': u'cve', u'id': u'CVE-2009-3555', u'title': u'CVE-2009-3555'}], u'_content_type_id': u'erratum', u'_id': u'505d9028-1adb-487a-b58e-ffa3f779296e', u'from': u'el-errata@oss.oracle.com', u'severity': u'Moderate', u'title': u' openssl097a security update', u'_ns': u'units_erratum', u'rights': u'Copyright 2010 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 5', u'reboot_suggested': False, u'type': u'security', u'pkglist': [{u'packages': [{u'src': None, u'name': u'openssl097a', u'sum': [u'md5', u'52e2c81d13b62fc491b97c9bc0e427b2'], u'filename': u'openssl097a-0.9.7a-9.el5_4.2.i386.rpm', u'epoch': u'0', u'version': u'0.9.7a', u'release': u'9.el5_4.2', u'arch': u'i386'}, {u'src': None, u'name': u'openssl097a', u'sum': [u'md5', u'68a8daafc7631bba60cd8958e7ed7113'], u'filename': u'openssl097a-0.9.7a-9.el5_4.2.src.rpm', u'epoch': u'0', u'version': u'0.9.7a', u'release': u'9.el5_4.2', u'arch': u'src'}, {u'src': None, u'name': u'openssl097a', u'sum': [u'md5', u'369614b7a24fbbfedde9102c6a858b08'], u'filename': u'openssl097a-0.9.7a-9.el5_4.2.x86_64.rpm', u'epoch': u'0', u'version': u'0.9.7a', u'release': u'9.el5_4.2', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u'\n[1.4.1-3.8]\n- fix safe renegotiation on SSL3 protocol\n\n[1.4.1-3.7]\n- implement safe renegotiation - CVE-2009-3555 (#533125)\n- do not allow MD2 in certificate signatures by default - CVE-2009-2409\n (#510197) ', u'issued': u'2010-03-25', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELSA-2010-0166.html', u'type': u'self', u'id': None, u'title': u'ELSA-2010-0166'}, {u'href': u'http://linux.oracle.com/cve/CVE-2009-2409.html', u'type': u'cve', u'id': u'CVE-2009-2409', u'title': u'CVE-2009-2409'}, {u'href': u'http://linux.oracle.com/cve/CVE-2009-3555.html', u'type': u'cve', u'id': u'CVE-2009-3555', u'title': u'CVE-2009-3555'}], u'_content_type_id': u'erratum', u'_id': u'd2021d23-0029-451e-aa05-5d788c5ee732', u'from': u'el-errata@oss.oracle.com', u'severity': u'Moderate', u'title': u' gnutls security update', u'_ns': u'units_erratum', u'rights': u'Copyright 2010 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 5', u'reboot_suggested': False, u'type': u'security', u'pkglist': [{u'packages': [{u'src': None, u'name': u'gnutls', u'sum': [u'md5', u'a949fa8633413a47fe2a08fe988a51ce'], u'filename': u'gnutls-1.4.1-3.el5_4.8.i386.rpm', u'epoch': u'0', u'version': u'1.4.1', u'release': u'3.el5_4.8', u'arch': u'i386'}, {u'src': None, u'name': u'gnutls', u'sum': [u'md5', u'57511004da8503957dbd4e33497d5db9'], u'filename': u'gnutls-1.4.1-3.el5_4.8.src.rpm', u'epoch': u'0', u'version': u'1.4.1', u'release': u'3.el5_4.8', u'arch': u'src'}, {u'src': None, u'name': u'gnutls', u'sum': [u'md5', u'14670b568622ebf92ad3e57919997a45'], u'filename': u'gnutls-1.4.1-3.el5_4.8.x86_64.rpm', u'epoch': u'0', u'version': u'1.4.1', u'release': u'3.el5_4.8', u'arch': u'x86_64'}, {u'src': None, u'name': u'gnutls-devel', u'sum': [u'md5', u'59e87f8c216b72d0b54a5b959ef495ed'], u'filename': u'gnutls-devel-1.4.1-3.el5_4.8.i386.rpm', u'epoch': u'0', u'version': u'1.4.1', u'release': u'3.el5_4.8', u'arch': u'i386'}, {u'src': None, u'name': u'gnutls-devel', u'sum': [u'md5', u'afcb1af3b78d84c510e10ce561d9bef8'], u'filename': u'gnutls-devel-1.4.1-3.el5_4.8.x86_64.rpm', u'epoch': u'0', u'version': u'1.4.1', u'release': u'3.el5_4.8', u'arch': u'x86_64'}, {u'src': None, u'name': u'gnutls-utils', u'sum': [u'md5', u'f3b95085a8d4d9c88e1aef34e19080bd'], u'filename': u'gnutls-utils-1.4.1-3.el5_4.8.x86_64.rpm', u'epoch': u'0', u'version': u'1.4.1', u'release': u'3.el5_4.8', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u'[3.7.2-4]\n- use rpm macros more consistently\n- add manual page for brltty.conf\n- add more documentation\n- install the default brltty-pm.conf to docdir only\n- Resolves: #530554\n- silence the postinstall scriptlet\n- Resolves: #529163\n\n[3.7.2-3]\n- escape rpm macros in the rpm change log\n- remove bogus rpath from libbrlttybba.so (CVE-2008-3279, #457942)\n- add dependencies to bind the subpackages from one build together\n\n[3.7.2-2]\n- fix building with newer kernel-headers (#456247)\n- do not strip debug info during install (#500545)\n- Resolves: rhbz #456247 #500545\n', u'issued': u'2010-04-05', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELSA-2010-0181.html', u'type': u'self', u'id': None, u'title': u'ELSA-2010-0181'}, {u'href': u'http://linux.oracle.com/cve/CVE-2008-3279.html', u'type': u'cve', u'id': u'CVE-2008-3279', u'title': u'CVE-2008-3279'}], u'_content_type_id': u'erratum', u'_id': u'972b649e-2bcf-4caf-bc0d-57a968f57941', u'from': u'el-errata@oss.oracle.com', u'severity': u'Low', u'title': u' brltty security and bug fix update', u'_ns': u'units_erratum', u'rights': u'Copyright 2010 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 5', u'reboot_suggested': False, u'type': u'security', u'pkglist': [{u'packages': [{u'src': None, u'name': u'brlapi', u'sum': [u'md5', u'3e7f3e3909b0e0233b665ca21669206d'], u'filename': u'brlapi-0.4.1-4.el5.i386.rpm', u'epoch': u'0', u'version': u'0.4.1', u'release': u'4.el5', u'arch': u'i386'}, {u'src': None, u'name': u'brlapi', u'sum': [u'md5', u'2f4e0c4af368ef105f2af53368702b40'], u'filename': u'brlapi-0.4.1-4.el5.x86_64.rpm', u'epoch': u'0', u'version': u'0.4.1', u'release': u'4.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'brlapi-devel', u'sum': [u'md5', u'd8e19763866bc740b718e3d5c4961e51'], u'filename': u'brlapi-devel-0.4.1-4.el5.i386.rpm', u'epoch': u'0', u'version': u'0.4.1', u'release': u'4.el5', u'arch': u'i386'}, {u'src': None, u'name': u'brlapi-devel', u'sum': [u'md5', u'e0360e4c2a377421d043a0cfb584aa00'], u'filename': u'brlapi-devel-0.4.1-4.el5.x86_64.rpm', u'epoch': u'0', u'version': u'0.4.1', u'release': u'4.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'brltty', u'sum': [u'md5', u'5a962492359621d07a35de9fb4b32020'], u'filename': u'brltty-3.7.2-4.el5.src.rpm', u'epoch': u'0', u'version': u'3.7.2', u'release': u'4.el5', u'arch': u'src'}, {u'src': None, u'name': u'brltty', u'sum': [u'md5', u'37848d9e5b484091c423e242794f79fb'], u'filename': u'brltty-3.7.2-4.el5.x86_64.rpm', u'epoch': u'0', u'version': u'3.7.2', u'release': u'4.el5', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u"[7:2.6.STABLE21-6]\n- Resolves: #561828 - CVE-2009-2855 CVE-2010-0308 squid various flaws [rhel-5.5]\n\n[7:2.6.STABLE21-5]\n- Resolves: #538738 - improved patch\n\n[7:2.6.STABLE21-4]\n- Resolves: #521926 - squid 'stop after stop' is not LSB compliant\n- Resolves: #496170 - Add arp filter option\n- Resolves: #516245 - negotiate support not enabled in squid\n- Resolves: #538738 - Squid accelerator mode works only if port 80 is opened\n- Resolves: #470843 - Squid 'error_map' does not work when used 'Accep-Encoding: gzip'\n", u'issued': u'2010-04-05', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELSA-2010-0221.html', u'type': u'self', u'id': None, u'title': u'ELSA-2010-0221'}, {u'href': u'http://linux.oracle.com/cve/CVE-2009-2855.html', u'type': u'cve', u'id': u'CVE-2009-2855', u'title': u'CVE-2009-2855'}, {u'href': u'http://linux.oracle.com/cve/CVE-2010-0308.html', u'type': u'cve', u'id': u'CVE-2010-0308', u'title': u'CVE-2010-0308'}], u'_content_type_id': u'erratum', u'_id': u'7e9df8c5-f4b0-4977-b30f-1223707a7ff7', u'from': u'el-errata@oss.oracle.com', u'severity': u'Low', u'title': u' squid security and bug fix update', u'_ns': u'units_erratum', u'rights': u'Copyright 2010 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 5', u'reboot_suggested': False, u'type': u'security', u'pkglist': [{u'packages': [{u'src': None, u'name': u'squid', u'sum': [u'md5', u'f43a17a7154894926434f2a21621a0dd'], u'filename': u'squid-2.6.STABLE21-6.el5.src.rpm', u'epoch': u'7', u'version': u'2.6.STABLE21', u'release': u'6.el5', u'arch': u'src'}, {u'src': None, u'name': u'squid', u'sum': [u'md5', u'7078da988c626b5b45dc4d114e28040c'], u'filename': u'squid-2.6.STABLE21-6.el5.x86_64.rpm', u'epoch': u'7', u'version': u'2.6.STABLE21', u'release': u'6.el5', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u"[8.13.8-8]\n\n- rpm attributes S,5,T not recorded for statistics file\n\n[8.13.8-7]\n- fix specfile for passing rpm -V test (#555277)\n\n[8.13.8-6.el5]\n- fix verification of SSL certificate with NUL in name (#553618, CVE-2009-4565)\n- do not accept localhost.localdomain as valid address from smtp (#449391)\n- skip colon separator when parsing service name in ServiceSwitchFile (#512871)\n- exit with non-zero error code when free space is low (#299951)\n- fix -qG description in man page (#250552)\n- fix comments in sendmail.mc to use correct certs path (#244012)\n- add MTA to provides (#494408)\n- fix %dist macro use (#440616)\n- compile with -fno-strict-aliasing\n- skip t-sem test as it doesn't allow parallel testing\n", u'issued': u'2010-04-05', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELSA-2010-0237.html', u'type': u'self', u'id': None, u'title': u'ELSA-2010-0237'}, {u'href': u'http://linux.oracle.com/cve/CVE-2006-7176.html', u'type': u'cve', u'id': u'CVE-2006-7176', u'title': u'CVE-2006-7176'}, {u'href': u'http://linux.oracle.com/cve/CVE-2009-4565.html', u'type': u'cve', u'id': u'CVE-2009-4565', u'title': u'CVE-2009-4565'}], u'_content_type_id': u'erratum', u'_id': u'4740c4ce-d806-4203-bb4e-8b8cff548d43', u'from': u'el-errata@oss.oracle.com', u'severity': u'Low', u'title': u' sendmail security and bug fix update', u'_ns': u'units_erratum', u'rights': u'Copyright 2010 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 5', u'reboot_suggested': False, u'type': u'security', u'pkglist': [{u'packages': [{u'src': None, u'name': u'sendmail', u'sum': [u'md5', u'107b306a604d04f869ae15db7bf8b7fc'], u'filename': u'sendmail-8.13.8-8.el5.src.rpm', u'epoch': u'0', u'version': u'8.13.8', u'release': u'8.el5', u'arch': u'src'}, {u'src': None, u'name': u'sendmail', u'sum': [u'md5', u'ee74ec6b972132373f6d4d2adfd9eafe'], u'filename': u'sendmail-8.13.8-8.el5.x86_64.rpm', u'epoch': u'0', u'version': u'8.13.8', u'release': u'8.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'sendmail-cf', u'sum': [u'md5', u'a1a58e79cacdd2468600b741499d9da9'], u'filename': u'sendmail-cf-8.13.8-8.el5.x86_64.rpm', u'epoch': u'0', u'version': u'8.13.8', u'release': u'8.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'sendmail-devel', u'sum': [u'md5', u'd1278209cef11149436e10e7efe189db'], u'filename': u'sendmail-devel-8.13.8-8.el5.i386.rpm', u'epoch': u'0', u'version': u'8.13.8', u'release': u'8.el5', u'arch': u'i386'}, {u'src': None, u'name': u'sendmail-devel', u'sum': [u'md5', u'4df78469740714ee55cbd4be18406b28'], u'filename': u'sendmail-devel-8.13.8-8.el5.x86_64.rpm', u'epoch': u'0', u'version': u'8.13.8', u'release': u'8.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'sendmail-doc', u'sum': [u'md5', u'ab3d7362c30ad381709c2708768c2139'], u'filename': u'sendmail-doc-8.13.8-8.el5.x86_64.rpm', u'epoch': u'0', u'version': u'8.13.8', u'release': u'8.el5', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u'[7.15.5-9]\n- http://curl.haxx.se/docs/adv_20100209.html (#565408)\n\n[7.15.5-8]\n- mention lack of IPv6, FTPS and LDAP support while using a socks proxy\n (#473128)\n- avoid tight loop if an upload connection is broken (#479967)\n- add options --ftp-account and --ftp-alternative-to-user to program help\n (#517084)\n- fix crash when reusing connection after negotiate-auth (#517199)\n- support for CRL loading from a PEM file (#532069)\n\n[7.15.5-7]\n- sync patch for CVE-2007-0037 with 5.3.Z\nRelated: #485290\n\n[7.15.5-6]\n- fix CVE-2009-2417\nResolves: #516258\n\n[7.15.5-5]\n- forwardport one hunk from upstream curl-7.15.1\nRelated: #485290\n\n[7.15.5-4]\n- fix hunk applied to wrong place due to nonzero patch fuzz\nRelated: #485290\n\n[7.15.5-3]\n- fix CVE-2007-0037\nResolves: #485290\n', u'issued': u'2010-04-05', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELSA-2010-0273.html', u'type': u'self', u'id': None, u'title': u'ELSA-2010-0273'}, {u'href': u'http://linux.oracle.com/cve/CVE-2010-0734.html', u'type': u'cve', u'id': u'CVE-2010-0734', u'title': u'CVE-2010-0734'}], u'_content_type_id': u'erratum', u'_id': u'9a43c596-74a7-42a8-92e6-c81d44162825', u'from': u'el-errata@oss.oracle.com', u'severity': u'Moderate', u'title': u' curl security, bug fix and enhancement update', u'_ns': u'units_erratum', u'rights': u'Copyright 2010 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 5', u'reboot_suggested': False, u'type': u'security', u'pkglist': [{u'packages': [{u'src': None, u'name': u'curl', u'sum': [u'md5', u'529baec147250dd6d2a8a4c61ef09c94'], u'filename': u'curl-7.15.5-9.el5.i386.rpm', u'epoch': u'0', u'version': u'7.15.5', u'release': u'9.el5', u'arch': u'i386'}, {u'src': None, u'name': u'curl', u'sum': [u'md5', u'26d4d47a804b417d028d26d08cffddfb'], u'filename': u'curl-7.15.5-9.el5.src.rpm', u'epoch': u'0', u'version': u'7.15.5', u'release': u'9.el5', u'arch': u'src'}, {u'src': None, u'name': u'curl', u'sum': [u'md5', u'f1ab065cdb95dc1ab9ec9a47dfb99a35'], u'filename': u'curl-7.15.5-9.el5.x86_64.rpm', u'epoch': u'0', u'version': u'7.15.5', u'release': u'9.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'curl-devel', u'sum': [u'md5', u'4cffa93cbcd5cf8cd14451d69180dd07'], u'filename': u'curl-devel-7.15.5-9.el5.i386.rpm', u'epoch': u'0', u'version': u'7.15.5', u'release': u'9.el5', u'arch': u'i386'}, {u'src': None, u'name': u'curl-devel', u'sum': [u'md5', u'18391363780869efd83fc0995c200414'], u'filename': u'curl-devel-7.15.5-9.el5.x86_64.rpm', u'epoch': u'0', u'version': u'7.15.5', u'release': u'9.el5', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u'[1.9.6-2.3]\n- increase delay in self checks\n- add delays in aclocal7 self check\n http://osdir.com/ml/sysutils.automake.bugs/2006-09/msg00012.html\n- preserve timestamps of configure files\n\n[1.9.6-2.2]\n- add fix for CVE-2009-4029\n', u'issued': u'2010-04-05', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELSA-2010-0321.html', u'type': u'self', u'id': None, u'title': u'ELSA-2010-0321'}, {u'href': u'http://linux.oracle.com/cve/CVE-2009-4029.html', u'type': u'cve', u'id': u'CVE-2009-4029', u'title': u'CVE-2009-4029'}], u'_content_type_id': u'erratum', u'_id': u'4150b225-3988-4ef1-bd7c-43701b1592de', u'from': u'el-errata@oss.oracle.com', u'severity': u'Low', u'title': u' automake security update', u'_ns': u'units_erratum', u'rights': u'Copyright 2010 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 5', u'reboot_suggested': False, u'type': u'security', u'pkglist': [{u'packages': [{u'src': None, u'name': u'automake', u'sum': [u'md5', u'f5c986b93bde3e76e78922a2f359cab6'], u'filename': u'automake-1.9.6-2.3.el5.noarch.rpm', u'epoch': u'0', u'version': u'1.9.6', u'release': u'2.3.el5', u'arch': u'noarch'}, {u'src': None, u'name': u'automake', u'sum': [u'md5', u'67667758739f9c5ced2f6d92be586ccc'], u'filename': u'automake-1.9.6-2.3.el5.src.rpm', u'epoch': u'0', u'version': u'1.9.6', u'release': u'2.3.el5', u'arch': u'src'}, {u'src': None, u'name': u'automake14', u'sum': [u'md5', u'892c77bf3beccb3c24d4013858d35ac6'], u'filename': u'automake14-1.4p6-13.el5.1.noarch.rpm', u'epoch': u'0', u'version': u'1.4p6', u'release': u'13.el5.1', u'arch': u'noarch'}, {u'src': None, u'name': u'automake14', u'sum': [u'md5', u'723301132f825cfa624f4cf913cd049f'], u'filename': u'automake14-1.4p6-13.el5.1.src.rpm', u'epoch': u'0', u'version': u'1.4p6', u'release': u'13.el5.1', u'arch': u'src'}, {u'src': None, u'name': u'automake15', u'sum': [u'md5', u'd75f7de58b6991d29b4634be9d0a5b74'], u'filename': u'automake15-1.5-16.el5.2.noarch.rpm', u'epoch': u'0', u'version': u'1.5', u'release': u'16.el5.2', u'arch': u'noarch'}, {u'src': None, u'name': u'automake15', u'sum': [u'md5', u'8c1bfc51483a1d30e5510eff6103ea73'], u'filename': u'automake15-1.5-16.el5.2.src.rpm', u'epoch': u'0', u'version': u'1.5', u'release': u'16.el5.2', u'arch': u'src'}, {u'src': None, u'name': u'automake16', u'sum': [u'md5', u'e8ce05957fb9391b58443c52fb2b5581'], u'filename': u'automake16-1.6.3-8.el5.1.noarch.rpm', u'epoch': u'0', u'version': u'1.6.3', u'release': u'8.el5.1', u'arch': u'noarch'}, {u'src': None, u'name': u'automake16', u'sum': [u'md5', u'eb7e9e57f0bd30b01d67869cfeb8b8b7'], u'filename': u'automake16-1.6.3-8.el5.1.src.rpm', u'epoch': u'0', u'version': u'1.6.3', u'release': u'8.el5.1', u'arch': u'src'}, {u'src': None, u'name': u'automake17', u'sum': [u'md5', u'18e6d033057eb45edce6639cb6ef0d45'], u'filename': u'automake17-1.7.9-7.el5.2.noarch.rpm', u'epoch': u'0', u'version': u'1.7.9', u'release': u'7.el5.2', u'arch': u'noarch'}, {u'src': None, u'name': u'automake17', u'sum': [u'md5', u'e856d6ec447ac18dff3ae0a5cec873d2'], u'filename': u'automake17-1.7.9-7.el5.2.src.rpm', u'epoch': u'0', u'version': u'1.7.9', u'release': u'7.el5.2', u'arch': u'src'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u"\n[2.2-35.4]\n- import Kees Cook's patch to fix accidental leakage of part of ./DB_CONFIG\n (#580542, CVE-2010-0826)", u'issued': u'2010-04-13', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELSA-2010-0347.html', u'type': u'self', u'id': None, u'title': u'ELSA-2010-0347'}, {u'href': u'http://linux.oracle.com/cve/CVE-2010-0826.html', u'type': u'cve', u'id': u'CVE-2010-0826', u'title': u'CVE-2010-0826'}], u'_content_type_id': u'erratum', u'_id': u'259d5bc7-98d0-461e-b1c9-4002a07bb838', u'from': u'el-errata@oss.oracle.com', u'severity': u'Moderate', u'title': u' nss_db security update', u'_ns': u'units_erratum', u'rights': u'Copyright 2010 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 5', u'reboot_suggested': False, u'type': u'security', u'pkglist': [{u'packages': [{u'src': None, u'name': u'nss_db', u'sum': [u'md5', u'054a353607e54f6e9acd5109f6a08ad6'], u'filename': u'nss_db-2.2-35.4.el5_5.i386.rpm', u'epoch': u'0', u'version': u'2.2', u'release': u'35.4.el5_5', u'arch': u'i386'}, {u'src': None, u'name': u'nss_db', u'sum': [u'md5', u'579a81d078d272bfc7b671307657e469'], u'filename': u'nss_db-2.2-35.4.el5_5.src.rpm', u'epoch': u'0', u'version': u'2.2', u'release': u'35.4.el5_5', u'arch': u'src'}, {u'src': None, u'name': u'nss_db', u'sum': [u'md5', u'9565bfa0f6ec72c5a506f52be9dbf4f3'], u'filename': u'nss_db-2.2-35.4.el5_5.x86_64.rpm', u'epoch': u'0', u'version': u'2.2', u'release': u'35.4.el5_5', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u"\n\ndevhelp:\n\n[0.12-21]\n- Rebuild against xulrunner\n\nesc:\n\n[1.1.0-12]\n- Rebuild for xulrunner update\n\nfirefox:\n\n[3.6.4-8.0.1.el5]\n- Add firefox-oracle-default-prefs.js and firefox-oracle-default-bookmarks.html\n and remove the corresponding Red Hat ones\n\n[3.6.4-8]\n- Fixing NVR\n\n[3.6.4-7]\n- Update to 3.6.4 build7\n- Disable checking for updates since they can't be applied\n\n[3.6.4-6]\n- Update to 3.6.4 build6\n\n[3.6.4-5]\n- Update to 3.6.4 build5\n\n[3.6.4-4]\n- Update to 3.6.4 build4\n\n[3.6.4-3]\n- Update to 3.6.4 build 3\n\n[3.6.4-2]\n- Update to 3.6.4 build 2\n\n[3.6.4-1]\n- Update to 3.6.4\n\n[3.6.3-3]\n- Fixed language packs (#581392)\n\n[3.6.3-2]\n- Fixed multilib conflict\n\n[3.6.3-1]\n- Rebase to 3.6.3\n\ngnome-python2-extras:\n\n[2.14.2-7]\n- rebuild agains xulrunner\n\ntotem:\n\n[2.16.7-7]\n- rebuild against new xulrunner\n\nxulrunner:\n\n[1.9.2.4-9.0.1]\n- Added xulrunner-oracle-default-prefs.js and removed the corresponding\n RedHat one.\n\n[1.9.2.4-9]\n- Update to 1.9.2.4 build 7\n\n[1.9.2.4-8]\n- Update to 1.9.2.4 build 6\n\n[1.9.2.4-7]\n- Update to 1.9.2.4 build 5\n\n[1.9.2.4-6]\n- Update to 1.9.2.4 build 4\n- Fixed mozbz#546270 patch\n\n[1.9.2.4-5]\n- Update to 1.9.2.4 build 3\n\n[1.9.2.4-4]\n- Update to 1.9.2.4 build 2\n- Enabled oopp\n\n[1.9.2.4-3]\n- Disabled libnotify\n\n[1.9.2.4-2]\n- Disabled oopp, causes TEXTREL\n\n[1.9.2.4-1]\n- Update to 1.9.2.4\n\n[1.9.2.3-3]\n- fixed js-config.h multilib conflict\n- fixed file list\n\n[1.9.2.3-2]\n- Added fix for rhbz#555760 - Firefox Javascript anomily, \n landscape print orientation reverts to portrait (mozbz#546270)\n\n[1.9.2.3-1]\n- Update to 1.9.2.3\n\n[1.9.2.2-1]\n- Rebase to 1.9.2.2\n\nyelp:\n\n[2.16.0-26]\n- rebuild against xulrunner\n\n[2.16.0-25]\n- rebuild against xulrunner\n- added xulrunner fix\n- added -fno-strict-aliasing to build flags", u'issued': u'2010-06-23', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELSA-2010-0501.html', u'type': u'self', u'id': None, u'title': u'ELSA-2010-0501'}, {u'href': u'http://linux.oracle.com/cve/CVE-2008-5913.html', u'type': u'cve', u'id': u'CVE-2008-5913', u'title': u'CVE-2008-5913'}, {u'href': u'http://linux.oracle.com/cve/CVE-2009-5017.html', u'type': u'cve', u'id': u'CVE-2009-5017', u'title': u'CVE-2009-5017'}, {u'href': u'http://linux.oracle.com/cve/CVE-2010-0182.html', u'type': u'cve', u'id': u'CVE-2010-0182', u'title': u'CVE-2010-0182'}, {u'href': u'http://linux.oracle.com/cve/CVE-2010-1121.html', u'type': u'cve', u'id': u'CVE-2010-1121', u'title': u'CVE-2010-1121'}, {u'href': u'http://linux.oracle.com/cve/CVE-2010-1125.html', u'type': u'cve', u'id': u'CVE-2010-1125', u'title': u'CVE-2010-1125'}, {u'href': u'http://linux.oracle.com/cve/CVE-2010-1196.html', u'type': u'cve', u'id': u'CVE-2010-1196', u'title': u'CVE-2010-1196'}, {u'href': u'http://linux.oracle.com/cve/CVE-2010-1197.html', u'type': u'cve', u'id': u'CVE-2010-1197', u'title': u'CVE-2010-1197'}, {u'href': u'http://linux.oracle.com/cve/CVE-2010-1198.html', u'type': u'cve', u'id': u'CVE-2010-1198', u'title': u'CVE-2010-1198'}, {u'href': u'http://linux.oracle.com/cve/CVE-2010-1199.html', u'type': u'cve', u'id': u'CVE-2010-1199', u'title': u'CVE-2010-1199'}, {u'href': u'http://linux.oracle.com/cve/CVE-2010-1200.html', u'type': u'cve', u'id': u'CVE-2010-1200', u'title': u'CVE-2010-1200'}, {u'href': u'http://linux.oracle.com/cve/CVE-2010-1202.html', u'type': u'cve', u'id': u'CVE-2010-1202', u'title': u'CVE-2010-1202'}, {u'href': u'http://linux.oracle.com/cve/CVE-2010-1203.html', u'type': u'cve', u'id': u'CVE-2010-1203', u'title': u'CVE-2010-1203'}], u'_content_type_id': u'erratum', u'_id': u'4163e9e6-c2d4-4b6d-b06a-8008d80067c7', u'from': u'el-errata@oss.oracle.com', u'severity': u'Critical', u'title': u' firefox security, bug fix, and enhancement update', u'_ns': u'units_erratum', u'rights': u'Copyright 2010 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 5', u'reboot_suggested': False, u'type': u'security', u'pkglist': [{u'packages': [{u'src': None, u'name': u'devhelp', u'sum': [u'md5', u'e1045984937946253d85256f4f9e379a'], u'filename': u'devhelp-0.12-21.el5.i386.rpm', u'epoch': u'0', u'version': u'0.12', u'release': u'21.el5', u'arch': u'i386'}, {u'src': None, u'name': u'devhelp', u'sum': [u'md5', u'6a9f09d1cbec6ed1b81e28e4e3668226'], u'filename': u'devhelp-0.12-21.el5.src.rpm', u'epoch': u'0', u'version': u'0.12', u'release': u'21.el5', u'arch': u'src'}, {u'src': None, u'name': u'devhelp', u'sum': [u'md5', u'7a0639c045ebc28cc1da598f59a918da'], u'filename': u'devhelp-0.12-21.el5.x86_64.rpm', u'epoch': u'0', u'version': u'0.12', u'release': u'21.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'devhelp-devel', u'sum': [u'md5', u'32297cdd3b1ab1d332d3d19922926867'], u'filename': u'devhelp-devel-0.12-21.el5.i386.rpm', u'epoch': u'0', u'version': u'0.12', u'release': u'21.el5', u'arch': u'i386'}, {u'src': None, u'name': u'devhelp-devel', u'sum': [u'md5', u'0b0c4f6b64bd041347e69d0ee9e02cf3'], u'filename': u'devhelp-devel-0.12-21.el5.x86_64.rpm', u'epoch': u'0', u'version': u'0.12', u'release': u'21.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'esc', u'sum': [u'md5', u'6ebdfe1c47573fc8366573cb00a99914'], u'filename': u'esc-1.1.0-12.el5.src.rpm', u'epoch': u'0', u'version': u'1.1.0', u'release': u'12.el5', u'arch': u'src'}, {u'src': None, u'name': u'esc', u'sum': [u'md5', u'ee9ec0952e38463456c442019f22c294'], u'filename': u'esc-1.1.0-12.el5.x86_64.rpm', u'epoch': u'0', u'version': u'1.1.0', u'release': u'12.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'gnome-python2-extras', u'sum': [u'md5', u'5f3632be49eb0b7b4cfa2f3061c8f05d'], u'filename': u'gnome-python2-extras-2.14.2-7.el5.src.rpm', u'epoch': u'0', u'version': u'2.14.2', u'release': u'7.el5', u'arch': u'src'}, {u'src': None, u'name': u'gnome-python2-extras', u'sum': [u'md5', u'901582f0d7404ac9dafd093416a427cb'], u'filename': u'gnome-python2-extras-2.14.2-7.el5.x86_64.rpm', u'epoch': u'0', u'version': u'2.14.2', u'release': u'7.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'gnome-python2-gtkhtml2', u'sum': [u'md5', u'a97dea59a0ddebf74d3f8089ea02d9e3'], u'filename': u'gnome-python2-gtkhtml2-2.14.2-7.el5.x86_64.rpm', u'epoch': u'0', u'version': u'2.14.2', u'release': u'7.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'gnome-python2-gtkmozembed', u'sum': [u'md5', u'642983feba686737032b6dfe1e63b512'], u'filename': u'gnome-python2-gtkmozembed-2.14.2-7.el5.x86_64.rpm', u'epoch': u'0', u'version': u'2.14.2', u'release': u'7.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'gnome-python2-gtkspell', u'sum': [u'md5', u'b4164fe8960d18c2bf21fa7e8ad8f5e7'], u'filename': u'gnome-python2-gtkspell-2.14.2-7.el5.x86_64.rpm', u'epoch': u'0', u'version': u'2.14.2', u'release': u'7.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'gnome-python2-libegg', u'sum': [u'md5', u'8024e9d4e860ae77cf60241108ab85eb'], u'filename': u'gnome-python2-libegg-2.14.2-7.el5.x86_64.rpm', u'epoch': u'0', u'version': u'2.14.2', u'release': u'7.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'totem', u'sum': [u'md5', u'351ad68c3747554cf99bbd1b07d7f862'], u'filename': u'totem-2.16.7-7.el5.i386.rpm', u'epoch': u'0', u'version': u'2.16.7', u'release': u'7.el5', u'arch': u'i386'}, {u'src': None, u'name': u'totem', u'sum': [u'md5', u'be404121cabb765c3fa9d021aea954b0'], u'filename': u'totem-2.16.7-7.el5.src.rpm', u'epoch': u'0', u'version': u'2.16.7', u'release': u'7.el5', u'arch': u'src'}, {u'src': None, u'name': u'totem', u'sum': [u'md5', u'f5d6025a7199f95808735024049c79f4'], u'filename': u'totem-2.16.7-7.el5.x86_64.rpm', u'epoch': u'0', u'version': u'2.16.7', u'release': u'7.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'totem-devel', u'sum': [u'md5', u'6a2b5ef8f37700665b17c67e8e8300bc'], u'filename': u'totem-devel-2.16.7-7.el5.i386.rpm', u'epoch': u'0', u'version': u'2.16.7', u'release': u'7.el5', u'arch': u'i386'}, {u'src': None, u'name': u'totem-devel', u'sum': [u'md5', u'c535fa6788036a7d9598aa0461ccf1c0'], u'filename': u'totem-devel-2.16.7-7.el5.x86_64.rpm', u'epoch': u'0', u'version': u'2.16.7', u'release': u'7.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'totem-mozplugin', u'sum': [u'md5', u'e2a7e76ed7f0443412c62a0430979387'], u'filename': u'totem-mozplugin-2.16.7-7.el5.x86_64.rpm', u'epoch': u'0', u'version': u'2.16.7', u'release': u'7.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'yelp', u'sum': [u'md5', u'fef777535ef0975146b7145ab990c175'], u'filename': u'yelp-2.16.0-26.el5.src.rpm', u'epoch': u'0', u'version': u'2.16.0', u'release': u'26.el5', u'arch': u'src'}, {u'src': None, u'name': u'yelp', u'sum': [u'md5', u'743953bccd2a485322abcced2f5a126d'], u'filename': u'yelp-2.16.0-26.el5.x86_64.rpm', u'epoch': u'0', u'version': u'2.16.0', u'release': u'26.el5', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u'\n[3.8.2-7.el5.5]\n- Add fixes for multiple SIGSEGV problems, including CVE-2010-1411\nResolves: #602552 ', u'issued': u'2010-07-08', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELSA-2010-0519.html', u'type': u'self', u'id': None, u'title': u'ELSA-2010-0519'}, {u'href': u'http://linux.oracle.com/cve/CVE-2010-1411.html', u'type': u'cve', u'id': u'CVE-2010-1411', u'title': u'CVE-2010-1411'}, {u'href': u'http://linux.oracle.com/cve/CVE-2010-2481.html', u'type': u'cve', u'id': u'CVE-2010-2481', u'title': u'CVE-2010-2481'}, {u'href': u'http://linux.oracle.com/cve/CVE-2010-2483.html', u'type': u'cve', u'id': u'CVE-2010-2483', u'title': u'CVE-2010-2483'}, {u'href': u'http://linux.oracle.com/cve/CVE-2010-2595.html', u'type': u'cve', u'id': u'CVE-2010-2595', u'title': u'CVE-2010-2595'}, {u'href': u'http://linux.oracle.com/cve/CVE-2010-2597.html', u'type': u'cve', u'id': u'CVE-2010-2597', u'title': u'CVE-2010-2597'}, {u'href': u'http://linux.oracle.com/cve/CVE-2010-4665.html', u'type': u'cve', u'id': u'CVE-2010-4665', u'title': u'CVE-2010-4665'}], u'_content_type_id': u'erratum', u'_id': u'76416f52-0092-4039-9a61-b0f7ce1798bd', u'from': u'el-errata@oss.oracle.com', u'severity': u'Important', u'title': u' libtiff security update', u'_ns': u'units_erratum', u'rights': u'Copyright 2010 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 5', u'reboot_suggested': False, u'type': u'security', u'pkglist': [{u'packages': [{u'src': None, u'name': u'libtiff', u'sum': [u'md5', u'a31fee17eacff02de15a1aadd5867802'], u'filename': u'libtiff-3.8.2-7.el5_5.5.i386.rpm', u'epoch': u'0', u'version': u'3.8.2', u'release': u'7.el5_5.5', u'arch': u'i386'}, {u'src': None, u'name': u'libtiff', u'sum': [u'md5', u'e5b7eb525970795b2b51afe440581943'], u'filename': u'libtiff-3.8.2-7.el5_5.5.src.rpm', u'epoch': u'0', u'version': u'3.8.2', u'release': u'7.el5_5.5', u'arch': u'src'}, {u'src': None, u'name': u'libtiff', u'sum': [u'md5', u'7d515e7280198fe2da49319a1d3818a8'], u'filename': u'libtiff-3.8.2-7.el5_5.5.x86_64.rpm', u'epoch': u'0', u'version': u'3.8.2', u'release': u'7.el5_5.5', u'arch': u'x86_64'}, {u'src': None, u'name': u'libtiff-devel', u'sum': [u'md5', u'7bfb3a5ec9c38d769f22ea7b6a5c36ab'], u'filename': u'libtiff-devel-3.8.2-7.el5_5.5.i386.rpm', u'epoch': u'0', u'version': u'3.8.2', u'release': u'7.el5_5.5', u'arch': u'i386'}, {u'src': None, u'name': u'libtiff-devel', u'sum': [u'md5', u'8091ff9bea97a45946e74803dd282bfc'], u'filename': u'libtiff-devel-3.8.2-7.el5_5.5.x86_64.rpm', u'epoch': u'0', u'version': u'3.8.2', u'release': u'7.el5_5.5', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u'\n[0.6.16-9.el5]\n- Related: #609318 \n- Fixes CVE-2010-2244\n\n[0.6.16-8.el5]\n- Related: #609318 \n- Fixes CVE-2010-2244', u'issued': u'2010-07-13', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELSA-2010-0528.html', u'type': u'self', u'id': None, u'title': u'ELSA-2010-0528'}, {u'href': u'http://linux.oracle.com/cve/CVE-2009-0758.html', u'type': u'cve', u'id': u'CVE-2009-0758', u'title': u'CVE-2009-0758'}, {u'href': u'http://linux.oracle.com/cve/CVE-2010-2244.html', u'type': u'cve', u'id': u'CVE-2010-2244', u'title': u'CVE-2010-2244'}], u'_content_type_id': u'erratum', u'_id': u'bf21cf08-2788-498b-b2f6-03bbae4a7d64', u'from': u'el-errata@oss.oracle.com', u'severity': u'Moderate', u'title': u' avahi security update', u'_ns': u'units_erratum', u'rights': u'Copyright 2010 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 5', u'reboot_suggested': False, u'type': u'security', u'pkglist': [{u'packages': [{u'src': None, u'name': u'avahi', u'sum': [u'md5', u'90775e18a1cd3f508764630f4bba1d79'], u'filename': u'avahi-0.6.16-9.el5_5.i386.rpm', u'epoch': u'0', u'version': u'0.6.16', u'release': u'9.el5_5', u'arch': u'i386'}, {u'src': None, u'name': u'avahi', u'sum': [u'md5', u'519a33e3931e772518a29b5e98524532'], u'filename': u'avahi-0.6.16-9.el5_5.src.rpm', u'epoch': u'0', u'version': u'0.6.16', u'release': u'9.el5_5', u'arch': u'src'}, {u'src': None, u'name': u'avahi', u'sum': [u'md5', u'b0f438b53d667ee2d5e28a3c2445e19a'], u'filename': u'avahi-0.6.16-9.el5_5.x86_64.rpm', u'epoch': u'0', u'version': u'0.6.16', u'release': u'9.el5_5', u'arch': u'x86_64'}, {u'src': None, u'name': u'avahi-compat-howl', u'sum': [u'md5', u'71007eb4a3523a564053e4254ab9606b'], u'filename': u'avahi-compat-howl-0.6.16-9.el5_5.i386.rpm', u'epoch': u'0', u'version': u'0.6.16', u'release': u'9.el5_5', u'arch': u'i386'}, {u'src': None, u'name': u'avahi-compat-howl', u'sum': [u'md5', u'3590044185814dd3bb8e152917cd00e0'], u'filename': u'avahi-compat-howl-0.6.16-9.el5_5.x86_64.rpm', u'epoch': u'0', u'version': u'0.6.16', u'release': u'9.el5_5', u'arch': u'x86_64'}, {u'src': None, u'name': u'avahi-compat-howl-devel', u'sum': [u'md5', u'e5722cae4dfa0b4a7d2d1120e92b93bf'], u'filename': u'avahi-compat-howl-devel-0.6.16-9.el5_5.i386.rpm', u'epoch': u'0', u'version': u'0.6.16', u'release': u'9.el5_5', u'arch': u'i386'}, {u'src': None, u'name': u'avahi-compat-howl-devel', u'sum': [u'md5', u'38048f3a27419df02fb8653cbeb30f2d'], u'filename': u'avahi-compat-howl-devel-0.6.16-9.el5_5.x86_64.rpm', u'epoch': u'0', u'version': u'0.6.16', u'release': u'9.el5_5', u'arch': u'x86_64'}, {u'src': None, u'name': u'avahi-compat-libdns_sd', u'sum': [u'md5', u'c370f37631c0ba524dfdd6563ff9083b'], u'filename': u'avahi-compat-libdns_sd-0.6.16-9.el5_5.i386.rpm', u'epoch': u'0', u'version': u'0.6.16', u'release': u'9.el5_5', u'arch': u'i386'}, {u'src': None, u'name': u'avahi-compat-libdns_sd', u'sum': [u'md5', u'37003f15ccd58bf7054a49c6380236ca'], u'filename': u'avahi-compat-libdns_sd-0.6.16-9.el5_5.x86_64.rpm', u'epoch': u'0', u'version': u'0.6.16', u'release': u'9.el5_5', u'arch': u'x86_64'}, {u'src': None, u'name': u'avahi-compat-libdns_sd-devel', u'sum': [u'md5', u'473136c18c9bd6d637c9a1c15ca03a10'], u'filename': u'avahi-compat-libdns_sd-devel-0.6.16-9.el5_5.i386.rpm', u'epoch': u'0', u'version': u'0.6.16', u'release': u'9.el5_5', u'arch': u'i386'}, {u'src': None, u'name': u'avahi-compat-libdns_sd-devel', u'sum': [u'md5', u'8e536d2f0e45b8d311546f242f76a1b9'], u'filename': u'avahi-compat-libdns_sd-devel-0.6.16-9.el5_5.x86_64.rpm', u'epoch': u'0', u'version': u'0.6.16', u'release': u'9.el5_5', u'arch': u'x86_64'}, {u'src': None, u'name': u'avahi-devel', u'sum': [u'md5', u'2f78cbc20b4bfc7f3e40a7f5d94a51fe'], u'filename': u'avahi-devel-0.6.16-9.el5_5.i386.rpm', u'epoch': u'0', u'version': u'0.6.16', u'release': u'9.el5_5', u'arch': u'i386'}, {u'src': None, u'name': u'avahi-devel', u'sum': [u'md5', u'18e1f0a4c9d50e51f610341325eb5be0'], u'filename': u'avahi-devel-0.6.16-9.el5_5.x86_64.rpm', u'epoch': u'0', u'version': u'0.6.16', u'release': u'9.el5_5', u'arch': u'x86_64'}, {u'src': None, u'name': u'avahi-glib', u'sum': [u'md5', u'fca5c0950a443456e83a294482b76527'], u'filename': u'avahi-glib-0.6.16-9.el5_5.i386.rpm', u'epoch': u'0', u'version': u'0.6.16', u'release': u'9.el5_5', u'arch': u'i386'}, {u'src': None, u'name': u'avahi-glib', u'sum': [u'md5', u'c178a24c44aa2c4a3a6093c4ab97a718'], u'filename': u'avahi-glib-0.6.16-9.el5_5.x86_64.rpm', u'epoch': u'0', u'version': u'0.6.16', u'release': u'9.el5_5', u'arch': u'x86_64'}, {u'src': None, u'name': u'avahi-glib-devel', u'sum': [u'md5', u'1ec4f062a44c547baa3d2bb6f8ee0468'], u'filename': u'avahi-glib-devel-0.6.16-9.el5_5.i386.rpm', u'epoch': u'0', u'version': u'0.6.16', u'release': u'9.el5_5', u'arch': u'i386'}, {u'src': None, u'name': u'avahi-glib-devel', u'sum': [u'md5', u'6f92f73c6506f1a6625087e9a0d1c519'], u'filename': u'avahi-glib-devel-0.6.16-9.el5_5.x86_64.rpm', u'epoch': u'0', u'version': u'0.6.16', u'release': u'9.el5_5', u'arch': u'x86_64'}, {u'src': None, u'name': u'avahi-qt3', u'sum': [u'md5', u'895a719d4f5c6c5afaf7137d656f3006'], u'filename': u'avahi-qt3-0.6.16-9.el5_5.i386.rpm', u'epoch': u'0', u'version': u'0.6.16', u'release': u'9.el5_5', u'arch': u'i386'}, {u'src': None, u'name': u'avahi-qt3', u'sum': [u'md5', u'551ec41c3b34541952aae21257929142'], u'filename': u'avahi-qt3-0.6.16-9.el5_5.x86_64.rpm', u'epoch': u'0', u'version': u'0.6.16', u'release': u'9.el5_5', u'arch': u'x86_64'}, {u'src': None, u'name': u'avahi-qt3-devel', u'sum': [u'md5', u'172bbd93b10e41b205f90e76beade7d6'], u'filename': u'avahi-qt3-devel-0.6.16-9.el5_5.i386.rpm', u'epoch': u'0', u'version': u'0.6.16', u'release': u'9.el5_5', u'arch': u'i386'}, {u'src': None, u'name': u'avahi-qt3-devel', u'sum': [u'md5', u'0d8aba3db488d9719c33ff6cb7885d89'], u'filename': u'avahi-qt3-devel-0.6.16-9.el5_5.x86_64.rpm', u'epoch': u'0', u'version': u'0.6.16', u'release': u'9.el5_5', u'arch': u'x86_64'}, {u'src': None, u'name': u'avahi-tools', u'sum': [u'md5', u'79eaa6593a9668f2718172667d4ad516'], u'filename': u'avahi-tools-0.6.16-9.el5_5.x86_64.rpm', u'epoch': u'0', u'version': u'0.6.16', u'release': u'9.el5_5', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u'\n[1.4.4-4]\n- Fix second typo in overflow patch from upstream\n\n[1.4.4-3]\n- Fix typo in patch\n\n[1.4.4-2]\n- Fix buffer overflow issues ', u'issued': u'2010-07-14', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELSA-2010-0533.html', u'type': u'self', u'id': None, u'title': u'ELSA-2010-0533'}, {u'href': u'http://linux.oracle.com/cve/CVE-2009-4901.html', u'type': u'cve', u'id': u'CVE-2009-4901', u'title': u'CVE-2009-4901'}, {u'href': u'http://linux.oracle.com/cve/CVE-2010-0407.html', u'type': u'cve', u'id': u'CVE-2010-0407', u'title': u'CVE-2010-0407'}], u'_content_type_id': u'erratum', u'_id': u'c15953b4-633c-430f-acc1-d9c2df91aaf3', u'from': u'el-errata@oss.oracle.com', u'severity': u'Moderate', u'title': u' pcsc-lite security update', u'_ns': u'units_erratum', u'rights': u'Copyright 2010 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 5', u'reboot_suggested': False, u'type': u'security', u'pkglist': [{u'packages': [{u'src': None, u'name': u'pcsc-lite', u'sum': [u'md5', u'f712eae17354965afe43e84f3a8fdb3e'], u'filename': u'pcsc-lite-1.4.4-4.el5_5.src.rpm', u'epoch': u'0', u'version': u'1.4.4', u'release': u'4.el5_5', u'arch': u'src'}, {u'src': None, u'name': u'pcsc-lite', u'sum': [u'md5', u'6bcb4a93ef7c7fd04f7282a538932680'], u'filename': u'pcsc-lite-1.4.4-4.el5_5.x86_64.rpm', u'epoch': u'0', u'version': u'1.4.4', u'release': u'4.el5_5', u'arch': u'x86_64'}, {u'src': None, u'name': u'pcsc-lite-devel', u'sum': [u'md5', u'3677933f7b734bb88f15374eadb83002'], u'filename': u'pcsc-lite-devel-1.4.4-4.el5_5.i386.rpm', u'epoch': u'0', u'version': u'1.4.4', u'release': u'4.el5_5', u'arch': u'i386'}, {u'src': None, u'name': u'pcsc-lite-devel', u'sum': [u'md5', u'5f3230367c7f476bc8073eb6cc53256b'], u'filename': u'pcsc-lite-devel-1.4.4-4.el5_5.x86_64.rpm', u'epoch': u'0', u'version': u'1.4.4', u'release': u'4.el5_5', u'arch': u'x86_64'}, {u'src': None, u'name': u'pcsc-lite-doc', u'sum': [u'md5', u'b5990ff80ca7062bec2b4d02ecd6a88e'], u'filename': u'pcsc-lite-doc-1.4.4-4.el5_5.x86_64.rpm', u'epoch': u'0', u'version': u'1.4.4', u'release': u'4.el5_5', u'arch': u'x86_64'}, {u'src': None, u'name': u'pcsc-lite-libs', u'sum': [u'md5', u'd14dd9f44d6186f01bddf7bb271f04c3'], u'filename': u'pcsc-lite-libs-1.4.4-4.el5_5.i386.rpm', u'epoch': u'0', u'version': u'1.4.4', u'release': u'4.el5_5', u'arch': u'i386'}, {u'src': None, u'name': u'pcsc-lite-libs', u'sum': [u'md5', u'0188dc1fcaa479e1d7e274648c87a22b'], u'filename': u'pcsc-lite-libs-1.4.4-4.el5_5.x86_64.rpm', u'epoch': u'0', u'version': u'1.4.4', u'release': u'4.el5_5', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u'\n[2:1.2.10-7.1.el5_5.3]\n- Back-port fixes for CVE-2009-2042, CVE-2010-0205, CVE-2010-1205,\n CVE-2010-2249\nResolves: #609921', u'issued': u'2010-07-14', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELSA-2010-0534.html', u'type': u'self', u'id': None, u'title': u'ELSA-2010-0534'}, {u'href': u'http://linux.oracle.com/cve/CVE-2009-2042.html', u'type': u'cve', u'id': u'CVE-2009-2042', u'title': u'CVE-2009-2042'}, {u'href': u'http://linux.oracle.com/cve/CVE-2010-0205.html', u'type': u'cve', u'id': u'CVE-2010-0205', u'title': u'CVE-2010-0205'}, {u'href': u'http://linux.oracle.com/cve/CVE-2010-1205.html', u'type': u'cve', u'id': u'CVE-2010-1205', u'title': u'CVE-2010-1205'}, {u'href': u'http://linux.oracle.com/cve/CVE-2010-2249.html', u'type': u'cve', u'id': u'CVE-2010-2249', u'title': u'CVE-2010-2249'}], u'_content_type_id': u'erratum', u'_id': u'd030fccb-8fe7-4138-843f-f5f4efa9da88', u'from': u'el-errata@oss.oracle.com', u'severity': u'Important', u'title': u' libpng security update', u'_ns': u'units_erratum', u'rights': u'Copyright 2010 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 5', u'reboot_suggested': False, u'type': u'security', u'pkglist': [{u'packages': [{u'src': None, u'name': u'libpng', u'sum': [u'md5', u'94c86af22491120870515e2a2a78daba'], u'filename': u'libpng-1.2.10-7.1.el5_5.3.i386.rpm', u'epoch': u'2', u'version': u'1.2.10', u'release': u'7.1.el5_5.3', u'arch': u'i386'}, {u'src': None, u'name': u'libpng', u'sum': [u'md5', u'5c260b9617fc4002793294b52c5797e3'], u'filename': u'libpng-1.2.10-7.1.el5_5.3.src.rpm', u'epoch': u'2', u'version': u'1.2.10', u'release': u'7.1.el5_5.3', u'arch': u'src'}, {u'src': None, u'name': u'libpng', u'sum': [u'md5', u'1f7619a4c6965a24a8bb8b61ae41a697'], u'filename': u'libpng-1.2.10-7.1.el5_5.3.x86_64.rpm', u'epoch': u'2', u'version': u'1.2.10', u'release': u'7.1.el5_5.3', u'arch': u'x86_64'}, {u'src': None, u'name': u'libpng-devel', u'sum': [u'md5', u'592a8f35602a96118892289bbba08b98'], u'filename': u'libpng-devel-1.2.10-7.1.el5_5.3.i386.rpm', u'epoch': u'2', u'version': u'1.2.10', u'release': u'7.1.el5_5.3', u'arch': u'i386'}, {u'src': None, u'name': u'libpng-devel', u'sum': [u'md5', u'fa91097d1572027025199951962d43b2'], u'filename': u'libpng-devel-1.2.10-7.1.el5_5.3.x86_64.rpm', u'epoch': u'2', u'version': u'1.2.10', u'release': u'7.1.el5_5.3', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u"\n[0.5.1-17]\n- Resolves:rh#604861:Clear execstack requirement also for ia64 architecture\n\n[0.5.1-16]\n- Resolves:rh#604861:CVE-2010-2074 w3m: doesn't handle NULL in Common Name properly ", u'issued': u'2010-07-27', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELSA-2010-0565.html', u'type': u'self', u'id': None, u'title': u'ELSA-2010-0565'}, {u'href': u'http://linux.oracle.com/cve/CVE-2010-2074.html', u'type': u'cve', u'id': u'CVE-2010-2074', u'title': u'CVE-2010-2074'}], u'_content_type_id': u'erratum', u'_id': u'fe7f34e1-f1a8-4259-83ec-56ee80935a90', u'from': u'el-errata@oss.oracle.com', u'severity': u'Moderate', u'title': u' w3m security update', u'_ns': u'units_erratum', u'rights': u'Copyright 2010 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 5', u'reboot_suggested': False, u'type': u'security', u'pkglist': [{u'packages': [{u'src': None, u'name': u'w3m', u'sum': [u'md5', u'ae128412c0fded6c53b59621aab2d9cf'], u'filename': u'w3m-0.5.1-17.el5_5.src.rpm', u'epoch': u'0', u'version': u'0.5.1', u'release': u'17.el5_5', u'arch': u'src'}, {u'src': None, u'name': u'w3m', u'sum': [u'md5', u'd569f2afb3f2ed087cdd0675fdee0dce'], u'filename': u'w3m-0.5.1-17.el5_5.x86_64.rpm', u'epoch': u'0', u'version': u'0.5.1', u'release': u'17.el5_5', u'arch': u'x86_64'}, {u'src': None, u'name': u'w3m-img', u'sum': [u'md5', u'0a4acd2525e2fbf24341d471304457ff'], u'filename': u'w3m-img-0.5.1-17.el5_5.x86_64.rpm', u'epoch': u'0', u'version': u'0.5.1', u'release': u'17.el5_5', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u'\n[3.7.11-4.el5_5.3]\n- Related: CVE-2010-2251 - document change of xfer:clobber default\n value in manpage, respect xfer:clobber on with xfer:auto-rename on\n (old behaviour)\n\n[3.7.11-4.el5_5.2]\n- Related: CVE-2010-2251 - describe new option xfer:auto-rename\n which could restore old behaviour in manpage\n\n[3.7.11-4.el5_5.1]\n- Resolves: CVE-2010-2251 - multiple HTTP client download filename\n vulnerability (#617870) ', u'issued': u'2010-08-02', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELSA-2010-0585.html', u'type': u'self', u'id': None, u'title': u'ELSA-2010-0585'}, {u'href': u'http://linux.oracle.com/cve/CVE-2010-2251.html', u'type': u'cve', u'id': u'CVE-2010-2251', u'title': u'CVE-2010-2251'}], u'_content_type_id': u'erratum', u'_id': u'5831da06-96ab-4427-a25f-6ffffa7659eb', u'from': u'el-errata@oss.oracle.com', u'severity': u'Moderate', u'title': u' lftp security update', u'_ns': u'units_erratum', u'rights': u'Copyright 2010 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 5', u'reboot_suggested': False, u'type': u'security', u'pkglist': [{u'packages': [{u'src': None, u'name': u'lftp', u'sum': [u'md5', u'45d9b67643f8bc31bc340bd6a1ea8648'], u'filename': u'lftp-3.7.11-4.el5_5.3.src.rpm', u'epoch': u'0', u'version': u'3.7.11', u'release': u'4.el5_5.3', u'arch': u'src'}, {u'src': None, u'name': u'lftp', u'sum': [u'md5', u'82395e1821ce54ae31228a1dda88f13f'], u'filename': u'lftp-3.7.11-4.el5_5.3.x86_64.rpm', u'epoch': u'0', u'version': u'3.7.11', u'release': u'4.el5_5.3', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u'\n[2.0.10-3.1]\n- fix use after free when importing certain X509 certificates\n CVE-2010-2547 (#618156) ', u'issued': u'2010-08-04', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELSA-2010-0603.html', u'type': u'self', u'id': None, u'title': u'ELSA-2010-0603'}, {u'href': u'http://linux.oracle.com/cve/CVE-2010-2547.html', u'type': u'cve', u'id': u'CVE-2010-2547', u'title': u'CVE-2010-2547'}], u'_content_type_id': u'erratum', u'_id': u'31b15cef-4143-4df9-a307-cd1984193f3a', u'from': u'el-errata@oss.oracle.com', u'severity': u'Moderate', u'title': u' gnupg2 security update', u'_ns': u'units_erratum', u'rights': u'Copyright 2010 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 5', u'reboot_suggested': False, u'type': u'security', u'pkglist': [{u'packages': [{u'src': None, u'name': u'gnupg2', u'sum': [u'md5', u'5cadadbcd306e2da6665b0db6a3757dc'], u'filename': u'gnupg2-2.0.10-3.el5_5.1.src.rpm', u'epoch': u'0', u'version': u'2.0.10', u'release': u'3.el5_5.1', u'arch': u'src'}, {u'src': None, u'name': u'gnupg2', u'sum': [u'md5', u'7cbc8540b3131bfaed41a9890543b303'], u'filename': u'gnupg2-2.0.10-3.el5_5.1.x86_64.rpm', u'epoch': u'0', u'version': u'2.0.10', u'release': u'3.el5_5.1', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u'\n\nNetworkManager:\n\n[1:0.7.0-10.el5_5.1]\n- Rebuild to fix D-Bus property access (for dbus-glib CVE-2010-1172)\n\ndbus-glib:\n\n[0.73-10]\n- Add patch to fix CVE-2010-1172\n Drop broken-xml.patch which this one now incorporates\n Resolves: #588397\n (and #585395) ', u'issued': u'2010-08-10', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELSA-2010-0616.html', u'type': u'self', u'id': None, u'title': u'ELSA-2010-0616'}, {u'href': u'http://linux.oracle.com/cve/CVE-2010-1172.html', u'type': u'cve', u'id': u'CVE-2010-1172', u'title': u'CVE-2010-1172'}], u'_content_type_id': u'erratum', u'_id': u'28f80c9e-9999-4ac5-a1ea-d4cbb23d4188', u'from': u'el-errata@oss.oracle.com', u'severity': u'Moderate', u'title': u' dbus-glib security update', u'_ns': u'units_erratum', u'rights': u'Copyright 2010 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 5', u'reboot_suggested': False, u'type': u'security', u'pkglist': [{u'packages': [{u'src': None, u'name': u'dbus-glib', u'sum': [u'md5', u'bbbf5840be6eab8ec79a061da479b7c0'], u'filename': u'dbus-glib-0.73-10.el5_5.i386.rpm', u'epoch': u'0', u'version': u'0.73', u'release': u'10.el5_5', u'arch': u'i386'}, {u'src': None, u'name': u'dbus-glib', u'sum': [u'md5', u'98de60c3e943e3cca3bbd61b56151115'], u'filename': u'dbus-glib-0.73-10.el5_5.src.rpm', u'epoch': u'0', u'version': u'0.73', u'release': u'10.el5_5', u'arch': u'src'}, {u'src': None, u'name': u'dbus-glib', u'sum': [u'md5', u'84e114cbbdda363cfdd8901de271a983'], u'filename': u'dbus-glib-0.73-10.el5_5.x86_64.rpm', u'epoch': u'0', u'version': u'0.73', u'release': u'10.el5_5', u'arch': u'x86_64'}, {u'src': None, u'name': u'dbus-glib-devel', u'sum': [u'md5', u'42682177d11e8954f4558b6bc0aabd66'], u'filename': u'dbus-glib-devel-0.73-10.el5_5.i386.rpm', u'epoch': u'0', u'version': u'0.73', u'release': u'10.el5_5', u'arch': u'i386'}, {u'src': None, u'name': u'dbus-glib-devel', u'sum': [u'md5', u'efa96badf910d398105067ed4139a37d'], u'filename': u'dbus-glib-devel-0.73-10.el5_5.x86_64.rpm', u'epoch': u'0', u'version': u'0.73', u'release': u'10.el5_5', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u'\n[1.0.15-1.0.1.el5_5.1]\n- Add oracle-ocfs2-network.patch\n\n[1.0.15-1]\n- upgrade to 1.0.15\n- http://www.wireshark.org/docs/relnotes/wireshark-1.0.15.html\n- fixes CVE-2010-2287 CVE-2010-2284\n- Related: #612239\n\n[1.0.14-1.2]\n- fix corner case in CVE-2010-2284\n- Related: #612239\n\n[1.0.14-1]\n- upgrade to 1.0.14\n- http://www.wireshark.org/docs/relnotes/wireshark-1.0.14.html\n- fixes CVE-2010-1455 CVE-2010-2283 CVE-2010-2284 CVE-2010-2286 CVE-2010-2287\n- Resolves: #612239 ', u'issued': u'2010-08-11', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELSA-2010-0625.html', u'type': u'self', u'id': None, u'title': u'ELSA-2010-0625'}, {u'href': u'http://linux.oracle.com/cve/CVE-2010-1455.html', u'type': u'cve', u'id': u'CVE-2010-1455', u'title': u'CVE-2010-1455'}, {u'href': u'http://linux.oracle.com/cve/CVE-2010-2283.html', u'type': u'cve', u'id': u'CVE-2010-2283', u'title': u'CVE-2010-2283'}, {u'href': u'http://linux.oracle.com/cve/CVE-2010-2284.html', u'type': u'cve', u'id': u'CVE-2010-2284', u'title': u'CVE-2010-2284'}, {u'href': u'http://linux.oracle.com/cve/CVE-2010-2286.html', u'type': u'cve', u'id': u'CVE-2010-2286', u'title': u'CVE-2010-2286'}, {u'href': u'http://linux.oracle.com/cve/CVE-2010-2287.html', u'type': u'cve', u'id': u'CVE-2010-2287', u'title': u'CVE-2010-2287'}, {u'href': u'http://linux.oracle.com/cve/CVE-2010-2995.html', u'type': u'cve', u'id': u'CVE-2010-2995', u'title': u'CVE-2010-2995'}], u'_content_type_id': u'erratum', u'_id': u'27e0178f-e63d-4170-86fd-d35b4df4bb1b', u'from': u'el-errata@oss.oracle.com', u'severity': u'Moderate', u'title': u' wireshark security update', u'_ns': u'units_erratum', u'rights': u'Copyright 2010 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 5', u'reboot_suggested': False, u'type': u'security', u'pkglist': [{u'packages': [{u'src': None, u'name': u'wireshark', u'sum': [u'md5', u'1e8a7c16b5e2bf5c56bf86e52604000d'], u'filename': u'wireshark-1.0.15-1.0.1.el5_5.1.src.rpm', u'epoch': u'0', u'version': u'1.0.15', u'release': u'1.0.1.el5_5.1', u'arch': u'src'}, {u'src': None, u'name': u'wireshark', u'sum': [u'md5', u'f336bb8b6a4479c8009ec3217e081c88'], u'filename': u'wireshark-1.0.15-1.0.1.el5_5.1.x86_64.rpm', u'epoch': u'0', u'version': u'1.0.15', u'release': u'1.0.1.el5_5.1', u'arch': u'x86_64'}, {u'src': None, u'name': u'wireshark-gnome', u'sum': [u'md5', u'a5245e416a497b8280f3e53f9815950c'], u'filename': u'wireshark-gnome-1.0.15-1.0.1.el5_5.1.x86_64.rpm', u'epoch': u'0', u'version': u'1.0.15', u'release': u'1.0.1.el5_5.1', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u'\n[0.3.0-54.el5_5.2]\n- Fix unsafe accesses\n + spice: drop libpng from windows components (537849)\n + libspice: fix unsafe guest data accessing\nResolves: #568719\n + fix unsafe free() call.\nResolves: #568723\n + spice server: fix unsafe cursor items handling.\nResolves: #568719 ', u'issued': u'2010-08-19', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELSA-2010-0633.html', u'type': u'self', u'id': None, u'title': u'ELSA-2010-0633'}, {u'href': u'http://linux.oracle.com/cve/CVE-2010-0428.html', u'type': u'cve', u'id': u'CVE-2010-0428', u'title': u'CVE-2010-0428'}, {u'href': u'http://linux.oracle.com/cve/CVE-2010-0429.html', u'type': u'cve', u'id': u'CVE-2010-0429', u'title': u'CVE-2010-0429'}], u'_content_type_id': u'erratum', u'_id': u'4a17d8ca-937b-4b34-ae1f-03cd409ccc8e', u'from': u'el-errata@oss.oracle.com', u'severity': u'Important', u'title': u' qspice security update', u'_ns': u'units_erratum', u'rights': u'Copyright 2010 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 5', u'reboot_suggested': False, u'type': u'security', u'pkglist': [{u'packages': [{u'src': None, u'name': u'qspice', u'sum': [u'md5', u'4fd5a63c744010a952f1caf95ace68a1'], u'filename': u'qspice-0.3.0-54.el5_5.2.src.rpm', u'epoch': u'0', u'version': u'0.3.0', u'release': u'54.el5_5.2', u'arch': u'src'}, {u'src': None, u'name': u'qspice', u'sum': [u'md5', u'9ca231d1496333b85d38d95fbb879338'], u'filename': u'qspice-0.3.0-54.el5_5.2.x86_64.rpm', u'epoch': u'0', u'version': u'0.3.0', u'release': u'54.el5_5.2', u'arch': u'x86_64'}, {u'src': None, u'name': u'qspice-libs', u'sum': [u'md5', u'67237c79b4d82cc5b222db7dac73001e'], u'filename': u'qspice-libs-0.3.0-54.el5_5.2.x86_64.rpm', u'epoch': u'0', u'version': u'0.3.0', u'release': u'54.el5_5.2', u'arch': u'x86_64'}, {u'src': None, u'name': u'qspice-libs-devel', u'sum': [u'md5', u'117ea0c59dd57235181f0507d0097e32'], u'filename': u'qspice-libs-devel-0.3.0-54.el5_5.2.x86_64.rpm', u'epoch': u'0', u'version': u'0.3.0', u'release': u'54.el5_5.2', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u'\n\nfirefox:\n\n[3.6.9-2.0.1.el5]\n- Add firefox-oracle-default-prefs.js and firefox-oracle-default-bookmarks.html\n and remove the corresponding Red Hat ones\n\n[3.6.9-2]\n- Fixed xulrunner version\n\n[3.6.9-1]\n- Update to 3.6.9\n\nnspr:\n\n[4.8.6-1]\n- update to 4.8.6\n\nnss:\n\n[3.12.7-2.0.1.el5_5]\n- Update clean.gif in the nss-3.12.7-stripped.tar.bz2 tarball\n\n[3.12.7-2]\n- fix dependencies, undo previous change\n\n[3.12.7-1]\n- Update to 3.12.7\n\nxulrunner:\n\n[1.9.2.9-1.0.1.el5]\n- Added xulrunner-oracle-default-prefs.js and removed the corresponding\n RedHat one.\n\n[1.9.2.9-1]\n- Update to 1.9.2.9 ', u'issued': u'2010-09-08', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELSA-2010-0681.html', u'type': u'self', u'id': None, u'title': u'ELSA-2010-0681'}, {u'href': u'http://linux.oracle.com/cve/CVE-2010-2760.html', u'type': u'cve', u'id': u'CVE-2010-2760', u'title': u'CVE-2010-2760'}, {u'href': u'http://linux.oracle.com/cve/CVE-2010-2762.html', u'type': u'cve', u'id': u'CVE-2010-2762', u'title': u'CVE-2010-2762'}, {u'href': u'http://linux.oracle.com/cve/CVE-2010-2764.html', u'type': u'cve', u'id': u'CVE-2010-2764', u'title': u'CVE-2010-2764'}, {u'href': u'http://linux.oracle.com/cve/CVE-2010-2765.html', u'type': u'cve', u'id': u'CVE-2010-2765', u'title': u'CVE-2010-2765'}, {u'href': u'http://linux.oracle.com/cve/CVE-2010-2766.html', u'type': u'cve', u'id': u'CVE-2010-2766', u'title': u'CVE-2010-2766'}, {u'href': u'http://linux.oracle.com/cve/CVE-2010-2767.html', u'type': u'cve', u'id': u'CVE-2010-2767', u'title': u'CVE-2010-2767'}, {u'href': u'http://linux.oracle.com/cve/CVE-2010-2768.html', u'type': u'cve', u'id': u'CVE-2010-2768', u'title': u'CVE-2010-2768'}, {u'href': u'http://linux.oracle.com/cve/CVE-2010-2769.html', u'type': u'cve', u'id': u'CVE-2010-2769', u'title': u'CVE-2010-2769'}, {u'href': u'http://linux.oracle.com/cve/CVE-2010-3166.html', u'type': u'cve', u'id': u'CVE-2010-3166', u'title': u'CVE-2010-3166'}, {u'href': u'http://linux.oracle.com/cve/CVE-2010-3167.html', u'type': u'cve', u'id': u'CVE-2010-3167', u'title': u'CVE-2010-3167'}, {u'href': u'http://linux.oracle.com/cve/CVE-2010-3168.html', u'type': u'cve', u'id': u'CVE-2010-3168', u'title': u'CVE-2010-3168'}, {u'href': u'http://linux.oracle.com/cve/CVE-2010-3169.html', u'type': u'cve', u'id': u'CVE-2010-3169', u'title': u'CVE-2010-3169'}], u'_content_type_id': u'erratum', u'_id': u'9771f279-8726-43dc-aeab-3bf0591be4c1', u'from': u'el-errata@oss.oracle.com', u'severity': u'Critical', u'title': u' firefox security update', u'_ns': u'units_erratum', u'rights': u'Copyright 2010 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 5', u'reboot_suggested': False, u'type': u'security', u'pkglist': [{u'packages': [{u'src': None, u'name': u'nspr', u'sum': [u'md5', u'5ce304a42850f421e6276d440b774d50'], u'filename': u'nspr-4.8.6-1.el5.i386.rpm', u'epoch': u'0', u'version': u'4.8.6', u'release': u'1.el5', u'arch': u'i386'}, {u'src': None, u'name': u'nspr', u'sum': [u'md5', u'6bbc1140926c4b883634ee5594e2f7ac'], u'filename': u'nspr-4.8.6-1.el5.src.rpm', u'epoch': u'0', u'version': u'4.8.6', u'release': u'1.el5', u'arch': u'src'}, {u'src': None, u'name': u'nspr', u'sum': [u'md5', u'4578e9348085438f566309d2b8a555eb'], u'filename': u'nspr-4.8.6-1.el5.x86_64.rpm', u'epoch': u'0', u'version': u'4.8.6', u'release': u'1.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'nspr-devel', u'sum': [u'md5', u'07d645b07013fa012a0470c16e73ff82'], u'filename': u'nspr-devel-4.8.6-1.el5.i386.rpm', u'epoch': u'0', u'version': u'4.8.6', u'release': u'1.el5', u'arch': u'i386'}, {u'src': None, u'name': u'nspr-devel', u'sum': [u'md5', u'bd7c78d70800a160ede41f2dd6c11448'], u'filename': u'nspr-devel-4.8.6-1.el5.x86_64.rpm', u'epoch': u'0', u'version': u'4.8.6', u'release': u'1.el5', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u'\n[3.0.33-3.29.el5.1]\n- Security Release, fixes CVE-2010-3069\n- resolves: #632229 ', u'issued': u'2010-09-14', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELSA-2010-0697.html', u'type': u'self', u'id': None, u'title': u'ELSA-2010-0697'}, {u'href': u'http://linux.oracle.com/cve/CVE-2010-3069.html', u'type': u'cve', u'id': u'CVE-2010-3069', u'title': u'CVE-2010-3069'}], u'_content_type_id': u'erratum', u'_id': u'20883016-979f-4f61-85ce-acb5f5b32f68', u'from': u'el-errata@oss.oracle.com', u'severity': u'Critical', u'title': u' samba security and bug fix update', u'_ns': u'units_erratum', u'rights': u'Copyright 2010 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 5', u'reboot_suggested': False, u'type': u'security', u'pkglist': [{u'packages': [{u'src': None, u'name': u'libsmbclient', u'sum': [u'md5', u'380b80823ec612de09ed42316b01abf6'], u'filename': u'libsmbclient-3.0.33-3.29.el5_5.1.i386.rpm', u'epoch': u'0', u'version': u'3.0.33', u'release': u'3.29.el5_5.1', u'arch': u'i386'}, {u'src': None, u'name': u'libsmbclient', u'sum': [u'md5', u'699e2612381028df105612f9bbc9aa84'], u'filename': u'libsmbclient-3.0.33-3.29.el5_5.1.x86_64.rpm', u'epoch': u'0', u'version': u'3.0.33', u'release': u'3.29.el5_5.1', u'arch': u'x86_64'}, {u'src': None, u'name': u'libsmbclient-devel', u'sum': [u'md5', u'526b13a1f7df29c150e90a5443851075'], u'filename': u'libsmbclient-devel-3.0.33-3.29.el5_5.1.i386.rpm', u'epoch': u'0', u'version': u'3.0.33', u'release': u'3.29.el5_5.1', u'arch': u'i386'}, {u'src': None, u'name': u'libsmbclient-devel', u'sum': [u'md5', u'f2f3f2a3c9835c62e25aeff3a8c5e79c'], u'filename': u'libsmbclient-devel-3.0.33-3.29.el5_5.1.x86_64.rpm', u'epoch': u'0', u'version': u'3.0.33', u'release': u'3.29.el5_5.1', u'arch': u'x86_64'}, {u'src': None, u'name': u'samba', u'sum': [u'md5', u'dc5e130e7613f30410cae71740a0b0a2'], u'filename': u'samba-3.0.33-3.29.el5_5.1.src.rpm', u'epoch': u'0', u'version': u'3.0.33', u'release': u'3.29.el5_5.1', u'arch': u'src'}, {u'src': None, u'name': u'samba', u'sum': [u'md5', u'fe2e053456edd56c0e68339669c4d857'], u'filename': u'samba-3.0.33-3.29.el5_5.1.x86_64.rpm', u'epoch': u'0', u'version': u'3.0.33', u'release': u'3.29.el5_5.1', u'arch': u'x86_64'}, {u'src': None, u'name': u'samba-client', u'sum': [u'md5', u'f6df8278696a982b466779e5347458eb'], u'filename': u'samba-client-3.0.33-3.29.el5_5.1.x86_64.rpm', u'epoch': u'0', u'version': u'3.0.33', u'release': u'3.29.el5_5.1', u'arch': u'x86_64'}, {u'src': None, u'name': u'samba-common', u'sum': [u'md5', u'c3c70546313abeaa40d6523c482db025'], u'filename': u'samba-common-3.0.33-3.29.el5_5.1.i386.rpm', u'epoch': u'0', u'version': u'3.0.33', u'release': u'3.29.el5_5.1', u'arch': u'i386'}, {u'src': None, u'name': u'samba-common', u'sum': [u'md5', u'e2dd5df2a30d613a1d4b60c528bed543'], u'filename': u'samba-common-3.0.33-3.29.el5_5.1.x86_64.rpm', u'epoch': u'0', u'version': u'3.0.33', u'release': u'3.29.el5_5.1', u'arch': u'x86_64'}, {u'src': None, u'name': u'samba-swat', u'sum': [u'md5', u'b7a83d7e825bb440c9b382ea8d79b454'], u'filename': u'samba-swat-3.0.33-3.29.el5_5.1.x86_64.rpm', u'epoch': u'0', u'version': u'3.0.33', u'release': u'3.29.el5_5.1', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u'\n[1.0.3-6]\n- Related: #632173\n use the upstream patch\n\n[1.0.3-5]\n- Resolves: #632173\n integer overflow flaw in BZ2_decompress - CVE-2010-0405 ', u'issued': u'2010-09-20', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELSA-2010-0703.html', u'type': u'self', u'id': None, u'title': u'ELSA-2010-0703'}, {u'href': u'http://linux.oracle.com/cve/CVE-2010-0405.html', u'type': u'cve', u'id': u'CVE-2010-0405', u'title': u'CVE-2010-0405'}], u'_content_type_id': u'erratum', u'_id': u'4f2c3e0b-5e26-4a1d-9a54-dbc56ba7b576', u'from': u'el-errata@oss.oracle.com', u'severity': u'Important', u'title': u' bzip2 security update', u'_ns': u'units_erratum', u'rights': u'Copyright 2010 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 5', u'reboot_suggested': False, u'type': u'security', u'pkglist': [{u'packages': [{u'src': None, u'name': u'bzip2', u'sum': [u'md5', u'27e501ffd20f68ca114f2cb564f8cae5'], u'filename': u'bzip2-1.0.3-6.el5_5.src.rpm', u'epoch': u'0', u'version': u'1.0.3', u'release': u'6.el5_5', u'arch': u'src'}, {u'src': None, u'name': u'bzip2', u'sum': [u'md5', u'3ed6c04083b2a418ecbd41d096a1e810'], u'filename': u'bzip2-1.0.3-6.el5_5.x86_64.rpm', u'epoch': u'0', u'version': u'1.0.3', u'release': u'6.el5_5', u'arch': u'x86_64'}, {u'src': None, u'name': u'bzip2-devel', u'sum': [u'md5', u'26edba90d3badd69f327d30124fba4c7'], u'filename': u'bzip2-devel-1.0.3-6.el5_5.i386.rpm', u'epoch': u'0', u'version': u'1.0.3', u'release': u'6.el5_5', u'arch': u'i386'}, {u'src': None, u'name': u'bzip2-devel', u'sum': [u'md5', u'4321ac0db5ef9c508bd636c6efb95d29'], u'filename': u'bzip2-devel-1.0.3-6.el5_5.x86_64.rpm', u'epoch': u'0', u'version': u'1.0.3', u'release': u'6.el5_5', u'arch': u'x86_64'}, {u'src': None, u'name': u'bzip2-libs', u'sum': [u'md5', u'b89a7e94e7b4fbcaf599e629ca3afbdf'], u'filename': u'bzip2-libs-1.0.3-6.el5_5.i386.rpm', u'epoch': u'0', u'version': u'1.0.3', u'release': u'6.el5_5', u'arch': u'i386'}, {u'src': None, u'name': u'bzip2-libs', u'sum': [u'md5', u'cfcf670935ba041d9729a7a13ddadf9c'], u'filename': u'bzip2-libs-1.0.3-6.el5_5.x86_64.rpm', u'epoch': u'0', u'version': u'1.0.3', u'release': u'6.el5_5', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u'\n[3.1.6-39.el5_5.1]\n- fix CVE-2007-6720, CVE-2009-3995,3996 (#617486)', u'issued': u'2010-09-28', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELSA-2010-0720.html', u'type': u'self', u'id': None, u'title': u'ELSA-2010-0720'}, {u'href': u'http://linux.oracle.com/cve/CVE-2007-6720.html', u'type': u'cve', u'id': u'CVE-2007-6720', u'title': u'CVE-2007-6720'}, {u'href': u'http://linux.oracle.com/cve/CVE-2009-3995.html', u'type': u'cve', u'id': u'CVE-2009-3995', u'title': u'CVE-2009-3995'}, {u'href': u'http://linux.oracle.com/cve/CVE-2009-3996.html', u'type': u'cve', u'id': u'CVE-2009-3996', u'title': u'CVE-2009-3996'}], u'_content_type_id': u'erratum', u'_id': u'0bd5d16a-52b6-49d6-baf3-cd9b7984fd64', u'from': u'el-errata@oss.oracle.com', u'severity': u'Moderate', u'title': u' mikmod security update', u'_ns': u'units_erratum', u'rights': u'Copyright 2010 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 5', u'reboot_suggested': False, u'type': u'security', u'pkglist': [{u'packages': [{u'src': None, u'name': u'mikmod', u'sum': [u'md5', u'9fb769c839ce33fe9ccfeef86ac0f817'], u'filename': u'mikmod-3.1.6-39.el5_5.1.i386.rpm', u'epoch': u'0', u'version': u'3.1.6', u'release': u'39.el5_5.1', u'arch': u'i386'}, {u'src': None, u'name': u'mikmod', u'sum': [u'md5', u'c58e70abe24c1e98650bdda1b88ee5d1'], u'filename': u'mikmod-3.1.6-39.el5_5.1.src.rpm', u'epoch': u'0', u'version': u'3.1.6', u'release': u'39.el5_5.1', u'arch': u'src'}, {u'src': None, u'name': u'mikmod', u'sum': [u'md5', u'209632f63ca9663e24bc355b367c5b8e'], u'filename': u'mikmod-3.1.6-39.el5_5.1.x86_64.rpm', u'epoch': u'0', u'version': u'3.1.6', u'release': u'39.el5_5.1', u'arch': u'x86_64'}, {u'src': None, u'name': u'mikmod-devel', u'sum': [u'md5', u'37c22b3a4d4e9aa275b92bb1ed1789f5'], u'filename': u'mikmod-devel-3.1.6-39.el5_5.1.i386.rpm', u'epoch': u'0', u'version': u'3.1.6', u'release': u'39.el5_5.1', u'arch': u'i386'}, {u'src': None, u'name': u'mikmod-devel', u'sum': [u'md5', u'b76f3dabad4fa2a681d65b3291e9c580'], u'filename': u'mikmod-devel-3.1.6-39.el5_5.1.x86_64.rpm', u'epoch': u'0', u'version': u'3.1.6', u'release': u'39.el5_5.1', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u'\n\npostgresql:\n\n[8.1.22-1.el5_5.1]\n- Update to PostgreSQL 8.1.22, for various fixes described at\n http://www.postgresql.org/docs/8.1/static/release.html\n including the fix for CVE-2010-3433\nResolves: #639931\n\npostgresql84:\n\n[8.4.5-1.el5_5.1]\n- Update to PostgreSQL 8.4.5, for various fixes described at\n http://www.postgresql.org/docs/8.4/static/release-8-4-5.html\n including the fix for CVE-2010-3433\nResolves: #639933', u'issued': u'2010-10-06', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELSA-2010-0742.html', u'type': u'self', u'id': None, u'title': u'ELSA-2010-0742'}, {u'href': u'http://linux.oracle.com/cve/CVE-2010-3433.html', u'type': u'cve', u'id': u'CVE-2010-3433', u'title': u'CVE-2010-3433'}], u'_content_type_id': u'erratum', u'_id': u'caed7599-3642-4e6a-be5c-194f5559513e', u'from': u'el-errata@oss.oracle.com', u'severity': u'Moderate', u'title': u' postgresql and postgresql84 security update', u'_ns': u'units_erratum', u'rights': u'Copyright 2010 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 5', u'reboot_suggested': False, u'type': u'security', u'pkglist': [{u'packages': [{u'src': None, u'name': u'postgresql', u'sum': [u'md5', u'cba5582e8030f8ce65aebb1678304289'], u'filename': u'postgresql-8.1.22-1.el5_5.1.src.rpm', u'epoch': u'0', u'version': u'8.1.22', u'release': u'1.el5_5.1', u'arch': u'src'}, {u'src': None, u'name': u'postgresql', u'sum': [u'md5', u'f1d2424cae8d4cdb8d631f8783829f50'], u'filename': u'postgresql-8.1.22-1.el5_5.1.x86_64.rpm', u'epoch': u'0', u'version': u'8.1.22', u'release': u'1.el5_5.1', u'arch': u'x86_64'}, {u'src': None, u'name': u'postgresql-contrib', u'sum': [u'md5', u'be5f110d9fe40e38b46c660883d4844d'], u'filename': u'postgresql-contrib-8.1.22-1.el5_5.1.x86_64.rpm', u'epoch': u'0', u'version': u'8.1.22', u'release': u'1.el5_5.1', u'arch': u'x86_64'}, {u'src': None, u'name': u'postgresql-devel', u'sum': [u'md5', u'd1ab076e82e335e91ae92fc06b4b5086'], u'filename': u'postgresql-devel-8.1.22-1.el5_5.1.i386.rpm', u'epoch': u'0', u'version': u'8.1.22', u'release': u'1.el5_5.1', u'arch': u'i386'}, {u'src': None, u'name': u'postgresql-devel', u'sum': [u'md5', u'7876b21e638cebefd27e6a477736ef71'], u'filename': u'postgresql-devel-8.1.22-1.el5_5.1.x86_64.rpm', u'epoch': u'0', u'version': u'8.1.22', u'release': u'1.el5_5.1', u'arch': u'x86_64'}, {u'src': None, u'name': u'postgresql-docs', u'sum': [u'md5', u'3b1c4343dc11edc723f908c607959872'], u'filename': u'postgresql-docs-8.1.22-1.el5_5.1.x86_64.rpm', u'epoch': u'0', u'version': u'8.1.22', u'release': u'1.el5_5.1', u'arch': u'x86_64'}, {u'src': None, u'name': u'postgresql-libs', u'sum': [u'md5', u'4c63b159eadadb7df552a54dc4c5f51a'], u'filename': u'postgresql-libs-8.1.22-1.el5_5.1.i386.rpm', u'epoch': u'0', u'version': u'8.1.22', u'release': u'1.el5_5.1', u'arch': u'i386'}, {u'src': None, u'name': u'postgresql-libs', u'sum': [u'md5', u'b0258f339bbcc7f165ad3868831137cc'], u'filename': u'postgresql-libs-8.1.22-1.el5_5.1.x86_64.rpm', u'epoch': u'0', u'version': u'8.1.22', u'release': u'1.el5_5.1', u'arch': u'x86_64'}, {u'src': None, u'name': u'postgresql-pl', u'sum': [u'md5', u'bd5ff856377b07864b41803c6b565bcd'], u'filename': u'postgresql-pl-8.1.22-1.el5_5.1.x86_64.rpm', u'epoch': u'0', u'version': u'8.1.22', u'release': u'1.el5_5.1', u'arch': u'x86_64'}, {u'src': None, u'name': u'postgresql-python', u'sum': [u'md5', u'bf5e0e5a271cf489964da089250c17af'], u'filename': u'postgresql-python-8.1.22-1.el5_5.1.x86_64.rpm', u'epoch': u'0', u'version': u'8.1.22', u'release': u'1.el5_5.1', u'arch': u'x86_64'}, {u'src': None, u'name': u'postgresql-server', u'sum': [u'md5', u'c369adb78633c756d526081f6d6432fc'], u'filename': u'postgresql-server-8.1.22-1.el5_5.1.x86_64.rpm', u'epoch': u'0', u'version': u'8.1.22', u'release': u'1.el5_5.1', u'arch': u'x86_64'}, {u'src': None, u'name': u'postgresql-tcl', u'sum': [u'md5', u'a775c89e2e30bc1ad4a89b008d1dfd26'], u'filename': u'postgresql-tcl-8.1.22-1.el5_5.1.x86_64.rpm', u'epoch': u'0', u'version': u'8.1.22', u'release': u'1.el5_5.1', u'arch': u'x86_64'}, {u'src': None, u'name': u'postgresql-test', u'sum': [u'md5', u'efdea3514f9b4548377b2e8d7e310ccc'], u'filename': u'postgresql-test-8.1.22-1.el5_5.1.x86_64.rpm', u'epoch': u'0', u'version': u'8.1.22', u'release': u'1.el5_5.1', u'arch': u'x86_64'}, {u'src': None, u'name': u'postgresql84', u'sum': [u'md5', u'29a147a5c5e469999e953bd4de759764'], u'filename': u'postgresql84-8.4.5-1.el5_5.1.src.rpm', u'epoch': u'0', u'version': u'8.4.5', u'release': u'1.el5_5.1', u'arch': u'src'}, {u'src': None, u'name': u'postgresql84', u'sum': [u'md5', u'e316c42066b7cb71b4236c71fcd7f3eb'], u'filename': u'postgresql84-8.4.5-1.el5_5.1.x86_64.rpm', u'epoch': u'0', u'version': u'8.4.5', u'release': u'1.el5_5.1', u'arch': u'x86_64'}, {u'src': None, u'name': u'postgresql84-contrib', u'sum': [u'md5', u'ed783194a164da0c0c50e9ad7ed6a192'], u'filename': u'postgresql84-contrib-8.4.5-1.el5_5.1.x86_64.rpm', u'epoch': u'0', u'version': u'8.4.5', u'release': u'1.el5_5.1', u'arch': u'x86_64'}, {u'src': None, u'name': u'postgresql84-devel', u'sum': [u'md5', u'974ce8de93bb0924cf57992c7481375b'], u'filename': u'postgresql84-devel-8.4.5-1.el5_5.1.i386.rpm', u'epoch': u'0', u'version': u'8.4.5', u'release': u'1.el5_5.1', u'arch': u'i386'}, {u'src': None, u'name': u'postgresql84-devel', u'sum': [u'md5', u'312d0b3fc48c651a773b05323bb495a7'], u'filename': u'postgresql84-devel-8.4.5-1.el5_5.1.x86_64.rpm', u'epoch': u'0', u'version': u'8.4.5', u'release': u'1.el5_5.1', u'arch': u'x86_64'}, {u'src': None, u'name': u'postgresql84-docs', u'sum': [u'md5', u'56950331db3f05776a5d8a7af704cfcf'], u'filename': u'postgresql84-docs-8.4.5-1.el5_5.1.x86_64.rpm', u'epoch': u'0', u'version': u'8.4.5', u'release': u'1.el5_5.1', u'arch': u'x86_64'}, {u'src': None, u'name': u'postgresql84-libs', u'sum': [u'md5', u'c86460512b492cc71d58680d7573b169'], u'filename': u'postgresql84-libs-8.4.5-1.el5_5.1.i386.rpm', u'epoch': u'0', u'version': u'8.4.5', u'release': u'1.el5_5.1', u'arch': u'i386'}, {u'src': None, u'name': u'postgresql84-libs', u'sum': [u'md5', u'e45bf0af1a3b54df7131387c6c2ea766'], u'filename': u'postgresql84-libs-8.4.5-1.el5_5.1.x86_64.rpm', u'epoch': u'0', u'version': u'8.4.5', u'release': u'1.el5_5.1', u'arch': u'x86_64'}, {u'src': None, u'name': u'postgresql84-plperl', u'sum': [u'md5', u'c3e1ba5377acb4885d9ef131ca20c29c'], u'filename': u'postgresql84-plperl-8.4.5-1.el5_5.1.x86_64.rpm', u'epoch': u'0', u'version': u'8.4.5', u'release': u'1.el5_5.1', u'arch': u'x86_64'}, {u'src': None, u'name': u'postgresql84-plpython', u'sum': [u'md5', u'3772c28e5cd5075d6dec81c15ef6cb07'], u'filename': u'postgresql84-plpython-8.4.5-1.el5_5.1.x86_64.rpm', u'epoch': u'0', u'version': u'8.4.5', u'release': u'1.el5_5.1', u'arch': u'x86_64'}, {u'src': None, u'name': u'postgresql84-pltcl', u'sum': [u'md5', u'01332b5c3e75b34ea89b5be8cf6b878d'], u'filename': u'postgresql84-pltcl-8.4.5-1.el5_5.1.x86_64.rpm', u'epoch': u'0', u'version': u'8.4.5', u'release': u'1.el5_5.1', u'arch': u'x86_64'}, {u'src': None, u'name': u'postgresql84-python', u'sum': [u'md5', u'7de053c6ca7634a4a12f50beedb75c93'], u'filename': u'postgresql84-python-8.4.5-1.el5_5.1.x86_64.rpm', u'epoch': u'0', u'version': u'8.4.5', u'release': u'1.el5_5.1', u'arch': u'x86_64'}, {u'src': None, u'name': u'postgresql84-server', u'sum': [u'md5', u'c7883aed4c52c41806be1518e7659ff4'], u'filename': u'postgresql84-server-8.4.5-1.el5_5.1.x86_64.rpm', u'epoch': u'0', u'version': u'8.4.5', u'release': u'1.el5_5.1', u'arch': u'x86_64'}, {u'src': None, u'name': u'postgresql84-tcl', u'sum': [u'md5', u'c2e0f5c4566863494c80b22944a09408'], u'filename': u'postgresql84-tcl-8.4.5-1.el5_5.1.x86_64.rpm', u'epoch': u'0', u'version': u'8.4.5', u'release': u'1.el5_5.1', u'arch': u'x86_64'}, {u'src': None, u'name': u'postgresql84-test', u'sum': [u'md5', u'54fde1f4ab3885c7c8686bf094e78a1d'], u'filename': u'postgresql84-test-8.4.5-1.el5_5.1.x86_64.rpm', u'epoch': u'0', u'version': u'8.4.5', u'release': u'1.el5_5.1', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u'\n[0.5.4-4.4.el5_5.14]\n- Add poppler-0.5.4-CVE-2010-3702.patch\n (Properly initialize parser)\n- Add poppler-0.5.4-CVE-2010-3704.patch\n (Fix crash in broken pdf (code < 0))\n- Resolves: #639839', u'issued': u'2010-10-07', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELSA-2010-0749.html', u'type': u'self', u'id': None, u'title': u'ELSA-2010-0749'}, {u'href': u'http://linux.oracle.com/cve/CVE-2010-3702.html', u'type': u'cve', u'id': u'CVE-2010-3702', u'title': u'CVE-2010-3702'}, {u'href': u'http://linux.oracle.com/cve/CVE-2010-3704.html', u'type': u'cve', u'id': u'CVE-2010-3704', u'title': u'CVE-2010-3704'}], u'_content_type_id': u'erratum', u'_id': u'de33096a-677a-4c9d-97f8-940148a27c6e', u'from': u'el-errata@oss.oracle.com', u'severity': u'Important', u'title': u' poppler security update', u'_ns': u'units_erratum', u'rights': u'Copyright 2010 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 5', u'reboot_suggested': False, u'type': u'security', u'pkglist': [{u'packages': [{u'src': None, u'name': u'poppler', u'sum': [u'md5', u'12f161eeae565d7966d46ab41d67131d'], u'filename': u'poppler-0.5.4-4.4.el5_5.14.i386.rpm', u'epoch': u'0', u'version': u'0.5.4', u'release': u'4.4.el5_5.14', u'arch': u'i386'}, {u'src': None, u'name': u'poppler', u'sum': [u'md5', u'd2857d5a3565d94993af512e42e17c78'], u'filename': u'poppler-0.5.4-4.4.el5_5.14.src.rpm', u'epoch': u'0', u'version': u'0.5.4', u'release': u'4.4.el5_5.14', u'arch': u'src'}, {u'src': None, u'name': u'poppler', u'sum': [u'md5', u'66e4c551493b1bdee70067599acaf060'], u'filename': u'poppler-0.5.4-4.4.el5_5.14.x86_64.rpm', u'epoch': u'0', u'version': u'0.5.4', u'release': u'4.4.el5_5.14', u'arch': u'x86_64'}, {u'src': None, u'name': u'poppler-devel', u'sum': [u'md5', u'eaae57abf2a16644a1af562a96ce65ff'], u'filename': u'poppler-devel-0.5.4-4.4.el5_5.14.i386.rpm', u'epoch': u'0', u'version': u'0.5.4', u'release': u'4.4.el5_5.14', u'arch': u'i386'}, {u'src': None, u'name': u'poppler-devel', u'sum': [u'md5', u'ab5fcc68b7b8c4c963b04bb9e3706829'], u'filename': u'poppler-devel-0.5.4-4.4.el5_5.14.x86_64.rpm', u'epoch': u'0', u'version': u'0.5.4', u'release': u'4.4.el5_5.14', u'arch': u'x86_64'}, {u'src': None, u'name': u'poppler-utils', u'sum': [u'md5', u'3fb20650b098d5fc5c94eca44349cc70'], u'filename': u'poppler-utils-0.5.4-4.4.el5_5.14.x86_64.rpm', u'epoch': u'0', u'version': u'0.5.4', u'release': u'4.4.el5_5.14', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u'\n[1.6.0.0-1.16.b17.0.1.el5]\n- Add oracle-enterprise.patch\n\n[1.6.0.0-1.16.b17.el5]\n- Updated 1.7.5 tarball (contains additional security fixes)\n- Resolves: bz639951\n\n[1.6.0.0-1.15.b17.el5]\n- Rebuild\n- Resolves: bz639951\n\n[1.6.0.0-1.14.b17.el5]\n- Synched with el6 branch\n- Updated to IcedTea 1.7.5\n- Resolves: bz639951\n- Also resolves 619800 and 621303 ', u'issued': u'2010-10-13', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELSA-2010-0768.html', u'type': u'self', u'id': None, u'title': u'ELSA-2010-0768'}, {u'href': u'http://linux.oracle.com/cve/CVE-2009-3555.html', u'type': u'cve', u'id': u'CVE-2009-3555', u'title': u'CVE-2009-3555'}, {u'href': u'http://linux.oracle.com/cve/CVE-2010-3541.html', u'type': u'cve', u'id': u'CVE-2010-3541', u'title': u'CVE-2010-3541'}, {u'href': u'http://linux.oracle.com/cve/CVE-2010-3548.html', u'type': u'cve', u'id': u'CVE-2010-3548', u'title': u'CVE-2010-3548'}, {u'href': u'http://linux.oracle.com/cve/CVE-2010-3549.html', u'type': u'cve', u'id': u'CVE-2010-3549', u'title': u'CVE-2010-3549'}, {u'href': u'http://linux.oracle.com/cve/CVE-2010-3551.html', u'type': u'cve', u'id': u'CVE-2010-3551', u'title': u'CVE-2010-3551'}, {u'href': u'http://linux.oracle.com/cve/CVE-2010-3553.html', u'type': u'cve', u'id': u'CVE-2010-3553', u'title': u'CVE-2010-3553'}, {u'href': u'http://linux.oracle.com/cve/CVE-2010-3554.html', u'type': u'cve', u'id': u'CVE-2010-3554', u'title': u'CVE-2010-3554'}, {u'href': u'http://linux.oracle.com/cve/CVE-2010-3557.html', u'type': u'cve', u'id': u'CVE-2010-3557', u'title': u'CVE-2010-3557'}, {u'href': u'http://linux.oracle.com/cve/CVE-2010-3561.html', u'type': u'cve', u'id': u'CVE-2010-3561', u'title': u'CVE-2010-3561'}, {u'href': u'http://linux.oracle.com/cve/CVE-2010-3562.html', u'type': u'cve', u'id': u'CVE-2010-3562', u'title': u'CVE-2010-3562'}, {u'href': u'http://linux.oracle.com/cve/CVE-2010-3564.html', u'type': u'cve', u'id': u'CVE-2010-3564', u'title': u'CVE-2010-3564'}, {u'href': u'http://linux.oracle.com/cve/CVE-2010-3565.html', u'type': u'cve', u'id': u'CVE-2010-3565', u'title': u'CVE-2010-3565'}, {u'href': u'http://linux.oracle.com/cve/CVE-2010-3567.html', u'type': u'cve', u'id': u'CVE-2010-3567', u'title': u'CVE-2010-3567'}, {u'href': u'http://linux.oracle.com/cve/CVE-2010-3568.html', u'type': u'cve', u'id': u'CVE-2010-3568', u'title': u'CVE-2010-3568'}, {u'href': u'http://linux.oracle.com/cve/CVE-2010-3569.html', u'type': u'cve', u'id': u'CVE-2010-3569', u'title': u'CVE-2010-3569'}, {u'href': u'http://linux.oracle.com/cve/CVE-2010-3573.html', u'type': u'cve', u'id': u'CVE-2010-3573', u'title': u'CVE-2010-3573'}, {u'href': u'http://linux.oracle.com/cve/CVE-2010-3574.html', u'type': u'cve', u'id': u'CVE-2010-3574', u'title': u'CVE-2010-3574'}], u'_content_type_id': u'erratum', u'_id': u'ede8d51b-8f72-4b68-b00f-a30afa14ade9', u'from': u'el-errata@oss.oracle.com', u'severity': u'Important', u'title': u' java-1.6.0-openjdk security and bug fix update', u'_ns': u'units_erratum', u'rights': u'Copyright 2010 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 5', u'reboot_suggested': False, u'type': u'security', u'pkglist': [{u'packages': [{u'src': None, u'name': u'java-1.6.0-openjdk', u'sum': [u'md5', u'e96d1b066d7e4d4350543ed25096300e'], u'filename': u'java-1.6.0-openjdk-1.6.0.0-1.16.b17.0.1.el5.src.rpm', u'epoch': u'1', u'version': u'1.6.0.0', u'release': u'1.16.b17.0.1.el5', u'arch': u'src'}, {u'src': None, u'name': u'java-1.6.0-openjdk', u'sum': [u'md5', u'9c6abfe4669e39ed2cfc0e11bf853125'], u'filename': u'java-1.6.0-openjdk-1.6.0.0-1.16.b17.0.1.el5.x86_64.rpm', u'epoch': u'1', u'version': u'1.6.0.0', u'release': u'1.16.b17.0.1.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'java-1.6.0-openjdk-demo', u'sum': [u'md5', u'339badfd23d89c115ee529a8232686d2'], u'filename': u'java-1.6.0-openjdk-demo-1.6.0.0-1.16.b17.0.1.el5.x86_64.rpm', u'epoch': u'1', u'version': u'1.6.0.0', u'release': u'1.16.b17.0.1.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'java-1.6.0-openjdk-devel', u'sum': [u'md5', u'1ea582be26870714c0929c8340a29f70'], u'filename': u'java-1.6.0-openjdk-devel-1.6.0.0-1.16.b17.0.1.el5.x86_64.rpm', u'epoch': u'1', u'version': u'1.6.0.0', u'release': u'1.16.b17.0.1.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'java-1.6.0-openjdk-javadoc', u'sum': [u'md5', u'6bad8860f313625ee238313ed1c68baf'], u'filename': u'java-1.6.0-openjdk-javadoc-1.6.0.0-1.16.b17.0.1.el5.x86_64.rpm', u'epoch': u'1', u'version': u'1.6.0.0', u'release': u'1.16.b17.0.1.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'java-1.6.0-openjdk-src', u'sum': [u'md5', u'fa79123003624c3dd658a66586198145'], u'filename': u'java-1.6.0-openjdk-src-1.6.0.0-1.16.b17.0.1.el5.x86_64.rpm', u'epoch': u'1', u'version': u'1.6.0.0', u'release': u'1.16.b17.0.1.el5', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u'\nfirefox:\n\n[3.6.11-2.0.1.el5]\n- Add firefox-oracle-default-prefs.js and firefox-oracle-default-bookmarks.html\n and remove the corresponding Red Hat ones\n\n[3.6.11-2]\n- Update to 3.6.11 Build 2\n\n[3.6.11-1]\n- Update to 3.6.11\n\nnss:\n\n[3.12.8-1.0.1.el5]\n- Update clean.gif in the nss-3.12.8-stripped.tar.bz2 tarball\n\n[3.12.8-1]\n- Update to 3.12.8\n\nxulrunner:\n\n[1.9.2.11-2.0.1.el5]\n- Added xulrunner-oracle-default-prefs.js and removed the corresponding\n RedHat one.\n\n[1.9.2.11-2]\n- Update to 1.9.2.11 Build 2\n\n[1.9.2.11-1]\n- Update to 1.9.2.11', u'issued': u'2010-10-20', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELSA-2010-0782.html', u'type': u'self', u'id': None, u'title': u'ELSA-2010-0782'}, {u'href': u'http://linux.oracle.com/cve/CVE-2010-3170.html', u'type': u'cve', u'id': u'CVE-2010-3170', u'title': u'CVE-2010-3170'}, {u'href': u'http://linux.oracle.com/cve/CVE-2010-3173.html', u'type': u'cve', u'id': u'CVE-2010-3173', u'title': u'CVE-2010-3173'}, {u'href': u'http://linux.oracle.com/cve/CVE-2010-3175.html', u'type': u'cve', u'id': u'CVE-2010-3175', u'title': u'CVE-2010-3175'}, {u'href': u'http://linux.oracle.com/cve/CVE-2010-3176.html', u'type': u'cve', u'id': u'CVE-2010-3176', u'title': u'CVE-2010-3176'}, {u'href': u'http://linux.oracle.com/cve/CVE-2010-3177.html', u'type': u'cve', u'id': u'CVE-2010-3177', u'title': u'CVE-2010-3177'}, {u'href': u'http://linux.oracle.com/cve/CVE-2010-3178.html', u'type': u'cve', u'id': u'CVE-2010-3178', u'title': u'CVE-2010-3178'}, {u'href': u'http://linux.oracle.com/cve/CVE-2010-3179.html', u'type': u'cve', u'id': u'CVE-2010-3179', u'title': u'CVE-2010-3179'}, {u'href': u'http://linux.oracle.com/cve/CVE-2010-3180.html', u'type': u'cve', u'id': u'CVE-2010-3180', u'title': u'CVE-2010-3180'}, {u'href': u'http://linux.oracle.com/cve/CVE-2010-3182.html', u'type': u'cve', u'id': u'CVE-2010-3182', u'title': u'CVE-2010-3182'}, {u'href': u'http://linux.oracle.com/cve/CVE-2010-3183.html', u'type': u'cve', u'id': u'CVE-2010-3183', u'title': u'CVE-2010-3183'}], u'_content_type_id': u'erratum', u'_id': u'5b5e0082-5ed4-4ff8-8d92-189c87522003', u'from': u'el-errata@oss.oracle.com', u'severity': u'Critical', u'title': u' firefox security update', u'_ns': u'units_erratum', u'rights': u'Copyright 2010 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 5', u'reboot_suggested': False, u'type': u'security', u'pkglist': [{u'packages': [{u'src': None, u'name': u'nss', u'sum': [u'md5', u'2000722ef489af541a8d5dd97dc0693f'], u'filename': u'nss-3.12.8-1.0.1.el5.i386.rpm', u'epoch': u'0', u'version': u'3.12.8', u'release': u'1.0.1.el5', u'arch': u'i386'}, {u'src': None, u'name': u'nss', u'sum': [u'md5', u'326de52f7a131050f45d3fe7089225c6'], u'filename': u'nss-3.12.8-1.0.1.el5.src.rpm', u'epoch': u'0', u'version': u'3.12.8', u'release': u'1.0.1.el5', u'arch': u'src'}, {u'src': None, u'name': u'nss', u'sum': [u'md5', u'a2e066c1faa497743c52163434c61f7e'], u'filename': u'nss-3.12.8-1.0.1.el5.x86_64.rpm', u'epoch': u'0', u'version': u'3.12.8', u'release': u'1.0.1.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'nss-devel', u'sum': [u'md5', u'97d95203e5251762ce38ee781499e3d5'], u'filename': u'nss-devel-3.12.8-1.0.1.el5.i386.rpm', u'epoch': u'0', u'version': u'3.12.8', u'release': u'1.0.1.el5', u'arch': u'i386'}, {u'src': None, u'name': u'nss-devel', u'sum': [u'md5', u'40ee7519ffa42a36b7c8031f2b9b08a5'], u'filename': u'nss-devel-3.12.8-1.0.1.el5.x86_64.rpm', u'epoch': u'0', u'version': u'3.12.8', u'release': u'1.0.1.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'nss-pkcs11-devel', u'sum': [u'md5', u'b3d79d1f425ee0f51209dd6533d62dda'], u'filename': u'nss-pkcs11-devel-3.12.8-1.0.1.el5.i386.rpm', u'epoch': u'0', u'version': u'3.12.8', u'release': u'1.0.1.el5', u'arch': u'i386'}, {u'src': None, u'name': u'nss-pkcs11-devel', u'sum': [u'md5', u'c3f3b27bc8f86209e9f528be48103318'], u'filename': u'nss-pkcs11-devel-3.12.8-1.0.1.el5.x86_64.rpm', u'epoch': u'0', u'version': u'3.12.8', u'release': u'1.0.1.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'nss-tools', u'sum': [u'md5', u'4805277c771d21ca6af903e87fd41e48'], u'filename': u'nss-tools-3.12.8-1.0.1.el5.x86_64.rpm', u'epoch': u'0', u'version': u'3.12.8', u'release': u'1.0.1.el5', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u'\n[0.98.6-5.el5_5.2]\n- Resolves: #638627 - CVE-2007-4826 CVE-2010-2948 quagga: various flaws', u'issued': u'2010-10-20', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELSA-2010-0785.html', u'type': u'self', u'id': None, u'title': u'ELSA-2010-0785'}, {u'href': u'http://linux.oracle.com/cve/CVE-2007-4826.html', u'type': u'cve', u'id': u'CVE-2007-4826', u'title': u'CVE-2007-4826'}, {u'href': u'http://linux.oracle.com/cve/CVE-2010-2948.html', u'type': u'cve', u'id': u'CVE-2010-2948', u'title': u'CVE-2010-2948'}], u'_content_type_id': u'erratum', u'_id': u'af974442-66a3-4fde-b1b6-ca19df66c999', u'from': u'el-errata@oss.oracle.com', u'severity': u'Moderate', u'title': u' quagga security update', u'_ns': u'units_erratum', u'rights': u'Copyright 2010 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 5', u'reboot_suggested': False, u'type': u'security', u'pkglist': [{u'packages': [{u'src': None, u'name': u'quagga', u'sum': [u'md5', u'1a677ba177d51d8220a3bc5e3d0e0974'], u'filename': u'quagga-0.98.6-5.el5_5.2.src.rpm', u'epoch': u'0', u'version': u'0.98.6', u'release': u'5.el5_5.2', u'arch': u'src'}, {u'src': None, u'name': u'quagga', u'sum': [u'md5', u'914e29f16c92aa5b7546863a5057132b'], u'filename': u'quagga-0.98.6-5.el5_5.2.x86_64.rpm', u'epoch': u'0', u'version': u'0.98.6', u'release': u'5.el5_5.2', u'arch': u'x86_64'}, {u'src': None, u'name': u'quagga-contrib', u'sum': [u'md5', u'0163a5a8f78bd0740c5ed479396af7c1'], u'filename': u'quagga-contrib-0.98.6-5.el5_5.2.x86_64.rpm', u'epoch': u'0', u'version': u'0.98.6', u'release': u'5.el5_5.2', u'arch': u'x86_64'}, {u'src': None, u'name': u'quagga-devel', u'sum': [u'md5', u'dcae53a25dde68ee0bba5c31fe1c206b'], u'filename': u'quagga-devel-0.98.6-5.el5_5.2.i386.rpm', u'epoch': u'0', u'version': u'0.98.6', u'release': u'5.el5_5.2', u'arch': u'i386'}, {u'src': None, u'name': u'quagga-devel', u'sum': [u'md5', u'e3c433b4913c080bb284992e82037b4f'], u'filename': u'quagga-devel-0.98.6-5.el5_5.2.x86_64.rpm', u'epoch': u'0', u'version': u'0.98.6', u'release': u'5.el5_5.2', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u'\n[0.99.6.2-6.2]\n- fix insecure dropping of priviledges in pam_xauth\n and pam_mail - CVE-2010-3316 (#637898), CVE-2010-3435 (#641335)\n- fix insecure executing of scripts with user supplied environment\n variables in pam_namespace - CVE-2010-3853 (#643043) ', u'issued': u'2010-11-01', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELSA-2010-0819.html', u'type': u'self', u'id': None, u'title': u'ELSA-2010-0819'}, {u'href': u'http://linux.oracle.com/cve/CVE-2010-3316.html', u'type': u'cve', u'id': u'CVE-2010-3316', u'title': u'CVE-2010-3316'}, {u'href': u'http://linux.oracle.com/cve/CVE-2010-3435.html', u'type': u'cve', u'id': u'CVE-2010-3435', u'title': u'CVE-2010-3435'}, {u'href': u'http://linux.oracle.com/cve/CVE-2010-3853.html', u'type': u'cve', u'id': u'CVE-2010-3853', u'title': u'CVE-2010-3853'}, {u'href': u'http://linux.oracle.com/cve/CVE-2010-4707.html', u'type': u'cve', u'id': u'CVE-2010-4707', u'title': u'CVE-2010-4707'}], u'_content_type_id': u'erratum', u'_id': u'472fe10e-31d1-4c81-ad03-09db5a6a1484', u'from': u'el-errata@oss.oracle.com', u'severity': u'Moderate', u'title': u' pam security update', u'_ns': u'units_erratum', u'rights': u'Copyright 2010 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 5', u'reboot_suggested': False, u'type': u'security', u'pkglist': [{u'packages': [{u'src': None, u'name': u'pam', u'sum': [u'md5', u'428de6967c54a4d952792307a2e4d998'], u'filename': u'pam-0.99.6.2-6.el5_5.2.i386.rpm', u'epoch': u'0', u'version': u'0.99.6.2', u'release': u'6.el5_5.2', u'arch': u'i386'}, {u'src': None, u'name': u'pam', u'sum': [u'md5', u'0b40d05cc778daac1a784b12cf08e579'], u'filename': u'pam-0.99.6.2-6.el5_5.2.src.rpm', u'epoch': u'0', u'version': u'0.99.6.2', u'release': u'6.el5_5.2', u'arch': u'src'}, {u'src': None, u'name': u'pam', u'sum': [u'md5', u'c8b049876b61dc1399c09c1f41971776'], u'filename': u'pam-0.99.6.2-6.el5_5.2.x86_64.rpm', u'epoch': u'0', u'version': u'0.99.6.2', u'release': u'6.el5_5.2', u'arch': u'x86_64'}, {u'src': None, u'name': u'pam-devel', u'sum': [u'md5', u'e919d81b6c4bdc317e5d3afd83345028'], u'filename': u'pam-devel-0.99.6.2-6.el5_5.2.i386.rpm', u'epoch': u'0', u'version': u'0.99.6.2', u'release': u'6.el5_5.2', u'arch': u'i386'}, {u'src': None, u'name': u'pam-devel', u'sum': [u'md5', u'8ae07d86e583161185437a02183efc64'], u'filename': u'pam-devel-0.99.6.2-6.el5_5.2.x86_64.rpm', u'epoch': u'0', u'version': u'0.99.6.2', u'release': u'6.el5_5.2', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u'\n[5.0.77-4.4]\n- Add fixes for CVE-2010-3677, CVE-2010-3680, CVE-2010-3681, CVE-2010-3682,\n CVE-2010-3833, CVE-2010-3835, CVE-2010-3836, CVE-2010-3837, CVE-2010-3838,\n CVE-2010-3839, CVE-2010-3840\nResolves: #645642\n- Backpatch strmov fix so that code can be tested on more recent platforms ', u'issued': u'2010-11-03', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELSA-2010-0825.html', u'type': u'self', u'id': None, u'title': u'ELSA-2010-0825'}, {u'href': u'http://linux.oracle.com/cve/CVE-2010-3677.html', u'type': u'cve', u'id': u'CVE-2010-3677', u'title': u'CVE-2010-3677'}, {u'href': u'http://linux.oracle.com/cve/CVE-2010-3680.html', u'type': u'cve', u'id': u'CVE-2010-3680', u'title': u'CVE-2010-3680'}, {u'href': u'http://linux.oracle.com/cve/CVE-2010-3681.html', u'type': u'cve', u'id': u'CVE-2010-3681', u'title': u'CVE-2010-3681'}, {u'href': u'http://linux.oracle.com/cve/CVE-2010-3682.html', u'type': u'cve', u'id': u'CVE-2010-3682', u'title': u'CVE-2010-3682'}, {u'href': u'http://linux.oracle.com/cve/CVE-2010-3833.html', u'type': u'cve', u'id': u'CVE-2010-3833', u'title': u'CVE-2010-3833'}, {u'href': u'http://linux.oracle.com/cve/CVE-2010-3835.html', u'type': u'cve', u'id': u'CVE-2010-3835', u'title': u'CVE-2010-3835'}, {u'href': u'http://linux.oracle.com/cve/CVE-2010-3836.html', u'type': u'cve', u'id': u'CVE-2010-3836', u'title': u'CVE-2010-3836'}, {u'href': u'http://linux.oracle.com/cve/CVE-2010-3837.html', u'type': u'cve', u'id': u'CVE-2010-3837', u'title': u'CVE-2010-3837'}, {u'href': u'http://linux.oracle.com/cve/CVE-2010-3838.html', u'type': u'cve', u'id': u'CVE-2010-3838', u'title': u'CVE-2010-3838'}, {u'href': u'http://linux.oracle.com/cve/CVE-2010-3839.html', u'type': u'cve', u'id': u'CVE-2010-3839', u'title': u'CVE-2010-3839'}, {u'href': u'http://linux.oracle.com/cve/CVE-2010-3840.html', u'type': u'cve', u'id': u'CVE-2010-3840', u'title': u'CVE-2010-3840'}], u'_content_type_id': u'erratum', u'_id': u'62612b6a-2cee-4480-82ca-a36a34ebfea9', u'from': u'el-errata@oss.oracle.com', u'severity': u'Moderate', u'title': u' mysql security update', u'_ns': u'units_erratum', u'rights': u'Copyright 2010 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 5', u'reboot_suggested': False, u'type': u'security', u'pkglist': [{u'packages': [{u'src': None, u'name': u'mysql', u'sum': [u'md5', u'097f2a79506c689df255df5e82675dbc'], u'filename': u'mysql-5.0.77-4.el5_5.4.i386.rpm', u'epoch': u'0', u'version': u'5.0.77', u'release': u'4.el5_5.4', u'arch': u'i386'}, {u'src': None, u'name': u'mysql', u'sum': [u'md5', u'2bfabb936a3f1fda6425519b827144da'], u'filename': u'mysql-5.0.77-4.el5_5.4.src.rpm', u'epoch': u'0', u'version': u'5.0.77', u'release': u'4.el5_5.4', u'arch': u'src'}, {u'src': None, u'name': u'mysql', u'sum': [u'md5', u'62c410ddcdf1b92790773997eccb9083'], u'filename': u'mysql-5.0.77-4.el5_5.4.x86_64.rpm', u'epoch': u'0', u'version': u'5.0.77', u'release': u'4.el5_5.4', u'arch': u'x86_64'}, {u'src': None, u'name': u'mysql-bench', u'sum': [u'md5', u'9a6e83bafcc9abb3d517dcb567d48283'], u'filename': u'mysql-bench-5.0.77-4.el5_5.4.x86_64.rpm', u'epoch': u'0', u'version': u'5.0.77', u'release': u'4.el5_5.4', u'arch': u'x86_64'}, {u'src': None, u'name': u'mysql-devel', u'sum': [u'md5', u'c548bd74e8e630aca09b2871d9d6f4f9'], u'filename': u'mysql-devel-5.0.77-4.el5_5.4.i386.rpm', u'epoch': u'0', u'version': u'5.0.77', u'release': u'4.el5_5.4', u'arch': u'i386'}, {u'src': None, u'name': u'mysql-devel', u'sum': [u'md5', u'c946edb0c238eacb10d94c7a79bb957b'], u'filename': u'mysql-devel-5.0.77-4.el5_5.4.x86_64.rpm', u'epoch': u'0', u'version': u'5.0.77', u'release': u'4.el5_5.4', u'arch': u'x86_64'}, {u'src': None, u'name': u'mysql-server', u'sum': [u'md5', u'eb72ffbecaed2bc195c3153c8344aa63'], u'filename': u'mysql-server-5.0.77-4.el5_5.4.x86_64.rpm', u'epoch': u'0', u'version': u'5.0.77', u'release': u'4.el5_5.4', u'arch': u'x86_64'}, {u'src': None, u'name': u'mysql-test', u'sum': [u'md5', u'b741ddba09f522a164dbca4fc2c1d154'], u'filename': u'mysql-test-5.0.77-4.el5_5.4.x86_64.rpm', u'epoch': u'0', u'version': u'5.0.77', u'release': u'4.el5_5.4', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u'[2.3.11-6.el6_0.2]\n- Add freetype-2.3.11-CVE-2010-3855.patch\n (Protect against invalid runcnt values.)\n- Resolves: #651761\n\n[2.3.11-6.el6_0.1]\n- Add freetype-2.3.11-CVE-2010-2805.patch\n (Fix comparison.)\n- Add freetype-2.3.11-CVE-2010-2806.patch\n (Protect against negative string_size. Fix comparison.)\n- Add freetype-2.3.11-CVE-2010-2808.patch\n (Check the total length of collected POST segments.)\n- Add freetype-2.3.11-CVE-2010-3311.patch\n (Dont seek behind end of stream.)\n- Resolves: #638838', u'issued': u'2010-11-16', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELSA-2010-0889.html', u'type': u'self', u'id': None, u'title': u'ELSA-2010-0889'}, {u'href': u'http://linux.oracle.com/cve/CVE-2010-2805.html', u'type': u'cve', u'id': u'CVE-2010-2805', u'title': u'CVE-2010-2805'}, {u'href': u'http://linux.oracle.com/cve/CVE-2010-2806.html', u'type': u'cve', u'id': u'CVE-2010-2806', u'title': u'CVE-2010-2806'}, {u'href': u'http://linux.oracle.com/cve/CVE-2010-2808.html', u'type': u'cve', u'id': u'CVE-2010-2808', u'title': u'CVE-2010-2808'}, {u'href': u'http://linux.oracle.com/cve/CVE-2010-3311.html', u'type': u'cve', u'id': u'CVE-2010-3311', u'title': u'CVE-2010-3311'}, {u'href': u'http://linux.oracle.com/cve/CVE-2010-3855.html', u'type': u'cve', u'id': u'CVE-2010-3855', u'title': u'CVE-2010-3855'}], u'_content_type_id': u'erratum', u'_id': u'97971dc5-b0e4-40d5-9fec-603efa2d3308', u'from': u'el-errata@oss.oracle.com', u'severity': u'Important', u'title': u' freetype security update', u'_ns': u'units_erratum', u'rights': u'Copyright 2010 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 6', u'reboot_suggested': False, u'type': u'security', u'pkglist': [{u'packages': [{u'src': None, u'name': u'freetype', u'sum': [u'md5', u'26d42ed67708a0b54af9b6a288bf912e'], u'filename': u'freetype-2.3.11-6.el6_0.2.i686.rpm', u'epoch': u'0', u'version': u'2.3.11', u'release': u'6.el6_0.2', u'arch': u'i686'}, {u'src': None, u'name': u'freetype', u'sum': [u'md5', u'7be7e30dfda515e6da679286e9159898'], u'filename': u'freetype-2.3.11-6.el6_0.2.src.rpm', u'epoch': u'0', u'version': u'2.3.11', u'release': u'6.el6_0.2', u'arch': u'src'}, {u'src': None, u'name': u'freetype', u'sum': [u'md5', u'e335eda6de36e6ba1fcc7f6bc838b084'], u'filename': u'freetype-2.3.11-6.el6_0.2.x86_64.rpm', u'epoch': u'0', u'version': u'2.3.11', u'release': u'6.el6_0.2', u'arch': u'x86_64'}, {u'src': None, u'name': u'freetype-demos', u'sum': [u'md5', u'c56ce1603d7474fa0ce0858c8e74cb01'], u'filename': u'freetype-demos-2.3.11-6.el6_0.2.x86_64.rpm', u'epoch': u'0', u'version': u'2.3.11', u'release': u'6.el6_0.2', u'arch': u'x86_64'}, {u'src': None, u'name': u'freetype-devel', u'sum': [u'md5', u'50e5725a641b3be3d14a4d5e6aeab24f'], u'filename': u'freetype-devel-2.3.11-6.el6_0.2.i686.rpm', u'epoch': u'0', u'version': u'2.3.11', u'release': u'6.el6_0.2', u'arch': u'i686'}, {u'src': None, u'name': u'freetype-devel', u'sum': [u'md5', u'0670c75800a2032de12126315b53b0a0'], u'filename': u'freetype-devel-2.3.11-6.el6_0.2.x86_64.rpm', u'epoch': u'0', u'version': u'2.3.11', u'release': u'6.el6_0.2', u'arch': u'x86_64'}], u'name': u'ol6_x86_64_latest', u'short': u'ol6_x86_64_latest'}, {u'packages': [{u'src': None, u'name': u'freetype', u'sum': [u'md5', u'43ea89f606c008dc4333e3edc27d601d'], u'filename': u'freetype-2.2.1-28.el5_5.1.i386.rpm', u'epoch': u'0', u'version': u'2.2.1', u'release': u'28.el5_5.1', u'arch': u'i386'}, {u'src': None, u'name': u'freetype', u'sum': [u'md5', u'330c97dfd73adab5679d7e7538a13611'], u'filename': u'freetype-2.2.1-28.el5_5.1.src.rpm', u'epoch': u'0', u'version': u'2.2.1', u'release': u'28.el5_5.1', u'arch': u'src'}, {u'src': None, u'name': u'freetype', u'sum': [u'md5', u'5f5e581b33c500c3d2a74fcdb17da34b'], u'filename': u'freetype-2.2.1-28.el5_5.1.x86_64.rpm', u'epoch': u'0', u'version': u'2.2.1', u'release': u'28.el5_5.1', u'arch': u'x86_64'}, {u'src': None, u'name': u'freetype-demos', u'sum': [u'md5', u'46ebf567647d4f4a55ccafaa2e36e0df'], u'filename': u'freetype-demos-2.2.1-28.el5_5.1.x86_64.rpm', u'epoch': u'0', u'version': u'2.2.1', u'release': u'28.el5_5.1', u'arch': u'x86_64'}, {u'src': None, u'name': u'freetype-devel', u'sum': [u'md5', u'8cb4654b66fadaccd07f38272a4a1d06'], u'filename': u'freetype-devel-2.2.1-28.el5_5.1.i386.rpm', u'epoch': u'0', u'version': u'2.2.1', u'release': u'28.el5_5.1', u'arch': u'i386'}, {u'src': None, u'name': u'freetype-devel', u'sum': [u'md5', u'51a85ed939d8ae96bcd72a7866520106'], u'filename': u'freetype-devel-2.2.1-28.el5_5.1.x86_64.rpm', u'epoch': u'0', u'version': u'2.2.1', u'release': u'28.el5_5.1', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u'\n[5.1.6-27.3]\n- add security fix for CVE-2010-3870 (#626735)\n\n[5.1.6-27.2]\n- fix var_export test cases (#626735)\n\n[5.1.6-27.1]\n- add security fixes for CVE-2010-1917, CVE-2010-3065, CVE-2010-2531,\n CVE-2010-1128, CVE-2010-0397 (#626735)', u'issued': u'2010-11-29', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELSA-2010-0919.html', u'type': u'self', u'id': None, u'title': u'ELSA-2010-0919'}, {u'href': u'http://linux.oracle.com/cve/CVE-2009-5016.html', u'type': u'cve', u'id': u'CVE-2009-5016', u'title': u'CVE-2009-5016'}, {u'href': u'http://linux.oracle.com/cve/CVE-2010-0397.html', u'type': u'cve', u'id': u'CVE-2010-0397', u'title': u'CVE-2010-0397'}, {u'href': u'http://linux.oracle.com/cve/CVE-2010-1128.html', u'type': u'cve', u'id': u'CVE-2010-1128', u'title': u'CVE-2010-1128'}, {u'href': u'http://linux.oracle.com/cve/CVE-2010-1917.html', u'type': u'cve', u'id': u'CVE-2010-1917', u'title': u'CVE-2010-1917'}, {u'href': u'http://linux.oracle.com/cve/CVE-2010-2531.html', u'type': u'cve', u'id': u'CVE-2010-2531', u'title': u'CVE-2010-2531'}, {u'href': u'http://linux.oracle.com/cve/CVE-2010-3065.html', u'type': u'cve', u'id': u'CVE-2010-3065', u'title': u'CVE-2010-3065'}, {u'href': u'http://linux.oracle.com/cve/CVE-2010-3870.html', u'type': u'cve', u'id': u'CVE-2010-3870', u'title': u'CVE-2010-3870'}], u'_content_type_id': u'erratum', u'_id': u'9867cd29-0eb0-4389-9e8c-44e739e016d8', u'from': u'el-errata@oss.oracle.com', u'severity': u'Moderate', u'title': u' php security update', u'_ns': u'units_erratum', u'rights': u'Copyright 2010 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 5', u'reboot_suggested': False, u'type': u'security', u'pkglist': [{u'packages': [{u'src': None, u'name': u'php', u'sum': [u'md5', u'b75dd19f87c14c43b0a18703fad12a02'], u'filename': u'php-5.1.6-27.el5_5.3.src.rpm', u'epoch': u'0', u'version': u'5.1.6', u'release': u'27.el5_5.3', u'arch': u'src'}, {u'src': None, u'name': u'php', u'sum': [u'md5', u'a8787f455c6b3650bb4005584074ae12'], u'filename': u'php-5.1.6-27.el5_5.3.x86_64.rpm', u'epoch': u'0', u'version': u'5.1.6', u'release': u'27.el5_5.3', u'arch': u'x86_64'}, {u'src': None, u'name': u'php-bcmath', u'sum': [u'md5', u'cf32bfd76fca70840dbf34b1db718f46'], u'filename': u'php-bcmath-5.1.6-27.el5_5.3.x86_64.rpm', u'epoch': u'0', u'version': u'5.1.6', u'release': u'27.el5_5.3', u'arch': u'x86_64'}, {u'src': None, u'name': u'php-cli', u'sum': [u'md5', u'cb8fe590d2f52fe2ff010cbbbb081d12'], u'filename': u'php-cli-5.1.6-27.el5_5.3.x86_64.rpm', u'epoch': u'0', u'version': u'5.1.6', u'release': u'27.el5_5.3', u'arch': u'x86_64'}, {u'src': None, u'name': u'php-common', u'sum': [u'md5', u'be8574ddf6707f5630a8df7f849ca675'], u'filename': u'php-common-5.1.6-27.el5_5.3.x86_64.rpm', u'epoch': u'0', u'version': u'5.1.6', u'release': u'27.el5_5.3', u'arch': u'x86_64'}, {u'src': None, u'name': u'php-dba', u'sum': [u'md5', u'5cdf29f7c9cd1ba4a2af361f843fd80f'], u'filename': u'php-dba-5.1.6-27.el5_5.3.x86_64.rpm', u'epoch': u'0', u'version': u'5.1.6', u'release': u'27.el5_5.3', u'arch': u'x86_64'}, {u'src': None, u'name': u'php-devel', u'sum': [u'md5', u'f6b224789a2bfe804c62157f9aa8a77d'], u'filename': u'php-devel-5.1.6-27.el5_5.3.x86_64.rpm', u'epoch': u'0', u'version': u'5.1.6', u'release': u'27.el5_5.3', u'arch': u'x86_64'}, {u'src': None, u'name': u'php-gd', u'sum': [u'md5', u'adbfdc0e0da7579e5b663890e79e746e'], u'filename': u'php-gd-5.1.6-27.el5_5.3.x86_64.rpm', u'epoch': u'0', u'version': u'5.1.6', u'release': u'27.el5_5.3', u'arch': u'x86_64'}, {u'src': None, u'name': u'php-imap', u'sum': [u'md5', u'5efb7aecbd931fbc0d9f8a7e139a1f3a'], u'filename': u'php-imap-5.1.6-27.el5_5.3.x86_64.rpm', u'epoch': u'0', u'version': u'5.1.6', u'release': u'27.el5_5.3', u'arch': u'x86_64'}, {u'src': None, u'name': u'php-ldap', u'sum': [u'md5', u'4c2898ffc985afc232e3783d32879f2a'], u'filename': u'php-ldap-5.1.6-27.el5_5.3.x86_64.rpm', u'epoch': u'0', u'version': u'5.1.6', u'release': u'27.el5_5.3', u'arch': u'x86_64'}, {u'src': None, u'name': u'php-mbstring', u'sum': [u'md5', u'55ef65835c9928bfce8ad9d840e375b2'], u'filename': u'php-mbstring-5.1.6-27.el5_5.3.x86_64.rpm', u'epoch': u'0', u'version': u'5.1.6', u'release': u'27.el5_5.3', u'arch': u'x86_64'}, {u'src': None, u'name': u'php-mysql', u'sum': [u'md5', u'd8a092e643733fd14934ea849aa4210c'], u'filename': u'php-mysql-5.1.6-27.el5_5.3.x86_64.rpm', u'epoch': u'0', u'version': u'5.1.6', u'release': u'27.el5_5.3', u'arch': u'x86_64'}, {u'src': None, u'name': u'php-ncurses', u'sum': [u'md5', u'17209cf9f39e097a1eed3d5c7df53c76'], u'filename': u'php-ncurses-5.1.6-27.el5_5.3.x86_64.rpm', u'epoch': u'0', u'version': u'5.1.6', u'release': u'27.el5_5.3', u'arch': u'x86_64'}, {u'src': None, u'name': u'php-odbc', u'sum': [u'md5', u'ed6994c83eb4fddb0d2b34cd3e8a32e6'], u'filename': u'php-odbc-5.1.6-27.el5_5.3.x86_64.rpm', u'epoch': u'0', u'version': u'5.1.6', u'release': u'27.el5_5.3', u'arch': u'x86_64'}, {u'src': None, u'name': u'php-pdo', u'sum': [u'md5', u'0a50864a6e9188913cbf22c2ed5c862d'], u'filename': u'php-pdo-5.1.6-27.el5_5.3.x86_64.rpm', u'epoch': u'0', u'version': u'5.1.6', u'release': u'27.el5_5.3', u'arch': u'x86_64'}, {u'src': None, u'name': u'php-pgsql', u'sum': [u'md5', u'6399cbbbad556ad90e6d39ab6e655a1b'], u'filename': u'php-pgsql-5.1.6-27.el5_5.3.x86_64.rpm', u'epoch': u'0', u'version': u'5.1.6', u'release': u'27.el5_5.3', u'arch': u'x86_64'}, {u'src': None, u'name': u'php-snmp', u'sum': [u'md5', u'5a4d4624485bd9cfa337f10318606749'], u'filename': u'php-snmp-5.1.6-27.el5_5.3.x86_64.rpm', u'epoch': u'0', u'version': u'5.1.6', u'release': u'27.el5_5.3', u'arch': u'x86_64'}, {u'src': None, u'name': u'php-soap', u'sum': [u'md5', u'086003d6cb8edf0748fb3bcc66f315b5'], u'filename': u'php-soap-5.1.6-27.el5_5.3.x86_64.rpm', u'epoch': u'0', u'version': u'5.1.6', u'release': u'27.el5_5.3', u'arch': u'x86_64'}, {u'src': None, u'name': u'php-xml', u'sum': [u'md5', u'facd2a7ad21adee494148787605c08dc'], u'filename': u'php-xml-5.1.6-27.el5_5.3.x86_64.rpm', u'epoch': u'0', u'version': u'5.1.6', u'release': u'27.el5_5.3', u'arch': u'x86_64'}, {u'src': None, u'name': u'php-xmlrpc', u'sum': [u'md5', u'f1f70c7367aabda694ee504febff4613'], u'filename': u'php-xmlrpc-5.1.6-27.el5_5.3.x86_64.rpm', u'epoch': u'0', u'version': u'5.1.6', u'release': u'27.el5_5.3', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u'[1.3.9-3.1]\n- add security fix for CVE-2010-1623 (#659253)', u'issued': u'2010-12-07', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELSA-2010-0950.html', u'type': u'self', u'id': None, u'title': u'ELSA-2010-0950'}, {u'href': u'http://linux.oracle.com/cve/CVE-2010-1623.html', u'type': u'cve', u'id': u'CVE-2010-1623', u'title': u'CVE-2010-1623'}], u'_content_type_id': u'erratum', u'_id': u'70a8cdca-413a-4c36-8d58-cdca94105ca6', u'from': u'el-errata@oss.oracle.com', u'severity': u'Moderate', u'title': u' apr-util security update', u'_ns': u'units_erratum', u'rights': u'Copyright 2010 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 6', u'reboot_suggested': False, u'type': u'security', u'pkglist': [{u'packages': [{u'src': None, u'name': u'apr-util', u'sum': [u'md5', u'120ade8bcdb054614a54e9caec9894dd'], u'filename': u'apr-util-1.3.9-3.el6_0.1.i686.rpm', u'epoch': u'0', u'version': u'1.3.9', u'release': u'3.el6_0.1', u'arch': u'i686'}, {u'src': None, u'name': u'apr-util', u'sum': [u'md5', u'6043f651d1e3384ebcda656896f42499'], u'filename': u'apr-util-1.3.9-3.el6_0.1.src.rpm', u'epoch': u'0', u'version': u'1.3.9', u'release': u'3.el6_0.1', u'arch': u'src'}, {u'src': None, u'name': u'apr-util', u'sum': [u'md5', u'4e1658b4849f0711494963cf15d5882d'], u'filename': u'apr-util-1.3.9-3.el6_0.1.x86_64.rpm', u'epoch': u'0', u'version': u'1.3.9', u'release': u'3.el6_0.1', u'arch': u'x86_64'}, {u'src': None, u'name': u'apr-util-devel', u'sum': [u'md5', u'7f9e90dc35bb0ac88e43ed16090042be'], u'filename': u'apr-util-devel-1.3.9-3.el6_0.1.i686.rpm', u'epoch': u'0', u'version': u'1.3.9', u'release': u'3.el6_0.1', u'arch': u'i686'}, {u'src': None, u'name': u'apr-util-devel', u'sum': [u'md5', u'6419888c624c8dcde8cd7de5ae20fc42'], u'filename': u'apr-util-devel-1.3.9-3.el6_0.1.x86_64.rpm', u'epoch': u'0', u'version': u'1.3.9', u'release': u'3.el6_0.1', u'arch': u'x86_64'}, {u'src': None, u'name': u'apr-util-ldap', u'sum': [u'md5', u'4aaa31119dc8f0763a5c87c987058e03'], u'filename': u'apr-util-ldap-1.3.9-3.el6_0.1.x86_64.rpm', u'epoch': u'0', u'version': u'1.3.9', u'release': u'3.el6_0.1', u'arch': u'x86_64'}, {u'src': None, u'name': u'apr-util-mysql', u'sum': [u'md5', u'31ba09718464220220b0a7656c2298a3'], u'filename': u'apr-util-mysql-1.3.9-3.el6_0.1.x86_64.rpm', u'epoch': u'0', u'version': u'1.3.9', u'release': u'3.el6_0.1', u'arch': u'x86_64'}, {u'src': None, u'name': u'apr-util-odbc', u'sum': [u'md5', u'0f88ab09816078b3babb0f18cac69c02'], u'filename': u'apr-util-odbc-1.3.9-3.el6_0.1.x86_64.rpm', u'epoch': u'0', u'version': u'1.3.9', u'release': u'3.el6_0.1', u'arch': u'x86_64'}, {u'src': None, u'name': u'apr-util-pgsql', u'sum': [u'md5', u'76fc1e9a7210259409896d34395c38b6'], u'filename': u'apr-util-pgsql-1.3.9-3.el6_0.1.x86_64.rpm', u'epoch': u'0', u'version': u'1.3.9', u'release': u'3.el6_0.1', u'arch': u'x86_64'}, {u'src': None, u'name': u'apr-util-sqlite', u'sum': [u'md5', u'bae7f848cfa06ad9f1834faa83266b94'], u'filename': u'apr-util-sqlite-1.3.9-3.el6_0.1.x86_64.rpm', u'epoch': u'0', u'version': u'1.3.9', u'release': u'3.el6_0.1', u'arch': u'x86_64'}], u'name': u'ol6_x86_64_latest', u'short': u'ol6_x86_64_latest'}, {u'packages': [{u'src': None, u'name': u'apr-util', u'sum': [u'md5', u'632a6bff185babb84fd538e7bd23dfd6'], u'filename': u'apr-util-1.2.7-11.el5_5.2.i386.rpm', u'epoch': u'0', u'version': u'1.2.7', u'release': u'11.el5_5.2', u'arch': u'i386'}, {u'src': None, u'name': u'apr-util', u'sum': [u'md5', u'66daa21c28e7bdc50633540439591382'], u'filename': u'apr-util-1.2.7-11.el5_5.2.src.rpm', u'epoch': u'0', u'version': u'1.2.7', u'release': u'11.el5_5.2', u'arch': u'src'}, {u'src': None, u'name': u'apr-util', u'sum': [u'md5', u'cc1903304c157cfcd9a778c612ad6bd3'], u'filename': u'apr-util-1.2.7-11.el5_5.2.x86_64.rpm', u'epoch': u'0', u'version': u'1.2.7', u'release': u'11.el5_5.2', u'arch': u'x86_64'}, {u'src': None, u'name': u'apr-util-devel', u'sum': [u'md5', u'fb7428185dddd477a4b250ffa58179d3'], u'filename': u'apr-util-devel-1.2.7-11.el5_5.2.i386.rpm', u'epoch': u'0', u'version': u'1.2.7', u'release': u'11.el5_5.2', u'arch': u'i386'}, {u'src': None, u'name': u'apr-util-devel', u'sum': [u'md5', u'f62e46c9bef2a9e35a07cd8d5e02547f'], u'filename': u'apr-util-devel-1.2.7-11.el5_5.2.x86_64.rpm', u'epoch': u'0', u'version': u'1.2.7', u'release': u'11.el5_5.2', u'arch': u'x86_64'}, {u'src': None, u'name': u'apr-util-docs', u'sum': [u'md5', u'942f556ac850c75b8bc3748f0539ad5a'], u'filename': u'apr-util-docs-1.2.7-11.el5_5.2.x86_64.rpm', u'epoch': u'0', u'version': u'1.2.7', u'release': u'11.el5_5.2', u'arch': u'x86_64'}, {u'src': None, u'name': u'apr-util-mysql', u'sum': [u'md5', u'2ee5a722fa5a265ca4a39361b1dd4c07'], u'filename': u'apr-util-mysql-1.2.7-11.el5_5.2.x86_64.rpm', u'epoch': u'0', u'version': u'1.2.7', u'release': u'11.el5_5.2', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u'\nfirefox:\n\n[3.6.13-1.0.1.el6_0]\n- Added firefox-oracle-default-prefs.js and removed firefox-redhat-default-prefs.js\n [bugz 11762]\n\n[3.6.13-2]\n- Update to 3.6.13 build3\n\n[3.6.13-1]\n- Update to 3.6.13\n\n[3.6.12-1]\n- Update to 3.6.12\n\n[3.6.11-1]\n- Update to 3.6.11\n\nxulrunner:\n\n[1.9.2.13-3.0.1.el6_0]\n- Added xulrunner-oracle-default-prefs.js and removed the corresponding\n RedHat one. Bug#11487\n\n[1.9.2.13-3]\n- Update to 1.9.2.13 build3\n\n[1.9.2.13-2]\n- Update to 1.9.2.13 build2\n\n[1.9.2.13-1]\n- Update to 1.9.2.13\n\n[1.9.2.12-1]\n- Update to 1.9.2.12\n\n[1.9.2.11-1]\n- Update to 1.9.2.1', u'issued': u'2010-12-10', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELSA-2010-0966.html', u'type': u'self', u'id': None, u'title': u'ELSA-2010-0966'}, {u'href': u'http://linux.oracle.com/cve/CVE-2010-3766.html', u'type': u'cve', u'id': u'CVE-2010-3766', u'title': u'CVE-2010-3766'}, {u'href': u'http://linux.oracle.com/cve/CVE-2010-3767.html', u'type': u'cve', u'id': u'CVE-2010-3767', u'title': u'CVE-2010-3767'}, {u'href': u'http://linux.oracle.com/cve/CVE-2010-3768.html', u'type': u'cve', u'id': u'CVE-2010-3768', u'title': u'CVE-2010-3768'}, {u'href': u'http://linux.oracle.com/cve/CVE-2010-3770.html', u'type': u'cve', u'id': u'CVE-2010-3770', u'title': u'CVE-2010-3770'}, {u'href': u'http://linux.oracle.com/cve/CVE-2010-3771.html', u'type': u'cve', u'id': u'CVE-2010-3771', u'title': u'CVE-2010-3771'}, {u'href': u'http://linux.oracle.com/cve/CVE-2010-3772.html', u'type': u'cve', u'id': u'CVE-2010-3772', u'title': u'CVE-2010-3772'}, {u'href': u'http://linux.oracle.com/cve/CVE-2010-3773.html', u'type': u'cve', u'id': u'CVE-2010-3773', u'title': u'CVE-2010-3773'}, {u'href': u'http://linux.oracle.com/cve/CVE-2010-3774.html', u'type': u'cve', u'id': u'CVE-2010-3774', u'title': u'CVE-2010-3774'}, {u'href': u'http://linux.oracle.com/cve/CVE-2010-3775.html', u'type': u'cve', u'id': u'CVE-2010-3775', u'title': u'CVE-2010-3775'}, {u'href': u'http://linux.oracle.com/cve/CVE-2010-3776.html', u'type': u'cve', u'id': u'CVE-2010-3776', u'title': u'CVE-2010-3776'}, {u'href': u'http://linux.oracle.com/cve/CVE-2010-3777.html', u'type': u'cve', u'id': u'CVE-2010-3777', u'title': u'CVE-2010-3777'}], u'_content_type_id': u'erratum', u'_id': u'64d71d0a-5637-448c-a947-ee67332f6a38', u'from': u'el-errata@oss.oracle.com', u'severity': u'Critical', u'title': u' firefox security update', u'_ns': u'units_erratum', u'rights': u'Copyright 2010 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 6', u'reboot_suggested': False, u'type': u'security', u'pkglist': [{u'packages': [{u'src': None, u'name': u'firefox', u'sum': [u'md5', u'4c876cb7df6e39dc456b40cc6c8c742c'], u'filename': u'firefox-3.6.13-2.0.1.el6_0.src.rpm', u'epoch': u'0', u'version': u'3.6.13', u'release': u'2.0.1.el6_0', u'arch': u'src'}, {u'src': None, u'name': u'firefox', u'sum': [u'md5', u'39abe16414aeef1936a1ead00b24421a'], u'filename': u'firefox-3.6.13-2.0.1.el6_0.x86_64.rpm', u'epoch': u'0', u'version': u'3.6.13', u'release': u'2.0.1.el6_0', u'arch': u'x86_64'}, {u'src': None, u'name': u'xulrunner', u'sum': [u'md5', u'07dc27bada886358d35a6774790cb6fa'], u'filename': u'xulrunner-1.9.2.13-3.0.1.el6_0.i686.rpm', u'epoch': u'0', u'version': u'1.9.2.13', u'release': u'3.0.1.el6_0', u'arch': u'i686'}, {u'src': None, u'name': u'xulrunner', u'sum': [u'md5', u'47de97fb9c48c9b653e1ef7374111c11'], u'filename': u'xulrunner-1.9.2.13-3.0.1.el6_0.src.rpm', u'epoch': u'0', u'version': u'1.9.2.13', u'release': u'3.0.1.el6_0', u'arch': u'src'}, {u'src': None, u'name': u'xulrunner', u'sum': [u'md5', u'f1b37d5e74875fa4e470661712114b83'], u'filename': u'xulrunner-1.9.2.13-3.0.1.el6_0.x86_64.rpm', u'epoch': u'0', u'version': u'1.9.2.13', u'release': u'3.0.1.el6_0', u'arch': u'x86_64'}, {u'src': None, u'name': u'xulrunner-devel', u'sum': [u'md5', u'60df8d51e7957eefa49a5b33088379c7'], u'filename': u'xulrunner-devel-1.9.2.13-3.0.1.el6_0.i686.rpm', u'epoch': u'0', u'version': u'1.9.2.13', u'release': u'3.0.1.el6_0', u'arch': u'i686'}, {u'src': None, u'name': u'xulrunner-devel', u'sum': [u'md5', u'c750b438058f34fe9628b5d1a46523b7'], u'filename': u'xulrunner-devel-1.9.2.13-3.0.1.el6_0.x86_64.rpm', u'epoch': u'0', u'version': u'1.9.2.13', u'release': u'3.0.1.el6_0', u'arch': u'x86_64'}], u'name': u'ol6_x86_64_latest', u'short': u'ol6_x86_64_latest'}, {u'packages': [{u'src': None, u'name': u'firefox', u'sum': [u'md5', u'7132ffd57d25b816e49b4e8facbdfdbd'], u'filename': u'firefox-3.6.13-2.0.1.el5.i386.rpm', u'epoch': u'0', u'version': u'3.6.13', u'release': u'2.0.1.el5', u'arch': u'i386'}, {u'src': None, u'name': u'firefox', u'sum': [u'md5', u'a380401c35dfaa466d1aef397251ead7'], u'filename': u'firefox-3.6.13-2.0.1.el5.src.rpm', u'epoch': u'0', u'version': u'3.6.13', u'release': u'2.0.1.el5', u'arch': u'src'}, {u'src': None, u'name': u'firefox', u'sum': [u'md5', u'91f6029a58273d79ff6908ee408b4af9'], u'filename': u'firefox-3.6.13-2.0.1.el5.x86_64.rpm', u'epoch': u'0', u'version': u'3.6.13', u'release': u'2.0.1.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'xulrunner', u'sum': [u'md5', u'2051c968b6be757a6bc29b2d0aa785c2'], u'filename': u'xulrunner-1.9.2.13-3.0.1.el5.i386.rpm', u'epoch': u'0', u'version': u'1.9.2.13', u'release': u'3.0.1.el5', u'arch': u'i386'}, {u'src': None, u'name': u'xulrunner', u'sum': [u'md5', u'322c9807874b36f821a1718cc7275702'], u'filename': u'xulrunner-1.9.2.13-3.0.1.el5.src.rpm', u'epoch': u'0', u'version': u'1.9.2.13', u'release': u'3.0.1.el5', u'arch': u'src'}, {u'src': None, u'name': u'xulrunner', u'sum': [u'md5', u'483634336b7c256aa75905340d37b39d'], u'filename': u'xulrunner-1.9.2.13-3.0.1.el5.x86_64.rpm', u'epoch': u'0', u'version': u'1.9.2.13', u'release': u'3.0.1.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'xulrunner-devel', u'sum': [u'md5', u'fd2796512eb14e6016f305beb2aecf01'], u'filename': u'xulrunner-devel-1.9.2.13-3.0.1.el5.i386.rpm', u'epoch': u'0', u'version': u'1.9.2.13', u'release': u'3.0.1.el5', u'arch': u'i386'}, {u'src': None, u'name': u'xulrunner-devel', u'sum': [u'md5', u'f655d57f77809bb13d265d16392e9b8b'], u'filename': u'xulrunner-devel-1.9.2.13-3.0.1.el5.x86_64.rpm', u'epoch': u'0', u'version': u'1.9.2.13', u'release': u'3.0.1.el5', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u'\n[4.63-3.el5_5.2]\n- fix buffer overflow in string_format (CVE-2010-4344, #662019)', u'issued': u'2010-12-10', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELSA-2010-0970.html', u'type': u'self', u'id': None, u'title': u'ELSA-2010-0970'}, {u'href': u'http://linux.oracle.com/cve/CVE-2010-4344.html', u'type': u'cve', u'id': u'CVE-2010-4344', u'title': u'CVE-2010-4344'}], u'_content_type_id': u'erratum', u'_id': u'0f8a4a37-9b91-4ceb-93f5-1ec8fa26463e', u'from': u'el-errata@oss.oracle.com', u'severity': u'Critical', u'title': u' exim security update', u'_ns': u'units_erratum', u'rights': u'Copyright 2010 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 5', u'reboot_suggested': False, u'type': u'security', u'pkglist': [{u'packages': [{u'src': None, u'name': u'exim', u'sum': [u'md5', u'd231c09e5bb27800a680819b3e2bbe44'], u'filename': u'exim-4.63-5.el5_5.2.src.rpm', u'epoch': u'0', u'version': u'4.63', u'release': u'5.el5_5.2', u'arch': u'src'}, {u'src': None, u'name': u'exim', u'sum': [u'md5', u'73095eddf3fb4838c04b81ff495d6d95'], u'filename': u'exim-4.63-5.el5_5.2.x86_64.rpm', u'epoch': u'0', u'version': u'4.63', u'release': u'5.el5_5.2', u'arch': u'x86_64'}, {u'src': None, u'name': u'exim-mon', u'sum': [u'md5', u'db9c5a77776fa59f12e4834820fe6d43'], u'filename': u'exim-mon-4.63-5.el5_5.2.x86_64.rpm', u'epoch': u'0', u'version': u'4.63', u'release': u'5.el5_5.2', u'arch': u'x86_64'}, {u'src': None, u'name': u'exim-sa', u'sum': [u'md5', u'9b9ba1525d18278d3147f761ae22ce3f'], u'filename': u'exim-sa-4.63-5.el5_5.2.x86_64.rpm', u'epoch': u'0', u'version': u'4.63', u'release': u'5.el5_5.2', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u'\n[0.9.8e-12.7]\n- fix CVE-2010-4180 - completely disable code for\n SSL_OP_NETSCAPE_REUSE_CIPHER_CHANGE_BUG (#659462)', u'issued': u'2010-12-13', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELSA-2010-0978.html', u'type': u'self', u'id': None, u'title': u'ELSA-2010-0978'}, {u'href': u'http://linux.oracle.com/cve/CVE-2008-7270.html', u'type': u'cve', u'id': u'CVE-2008-7270', u'title': u'CVE-2008-7270'}, {u'href': u'http://linux.oracle.com/cve/CVE-2010-4180.html', u'type': u'cve', u'id': u'CVE-2010-4180', u'title': u'CVE-2010-4180'}], u'_content_type_id': u'erratum', u'_id': u'f0aaf6da-009b-48f9-8992-410617d856ef', u'from': u'el-errata@oss.oracle.com', u'severity': u'Moderate', u'title': u' openssl security update', u'_ns': u'units_erratum', u'rights': u'Copyright 2010 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 5', u'reboot_suggested': False, u'type': u'security', u'pkglist': [{u'packages': [{u'src': None, u'name': u'openssl', u'sum': [u'md5', u'bdff55503f4f73b7fa7d7a1ba9b95e1d'], u'filename': u'openssl-0.9.8e-12.el5_5.7.src.rpm', u'epoch': u'0', u'version': u'0.9.8e', u'release': u'12.el5_5.7', u'arch': u'src'}, {u'src': None, u'name': u'openssl', u'sum': [u'md5', u'bab5a7caba7b7194b1864fabb7bd5859'], u'filename': u'openssl-0.9.8e-12.el5_5.7.i686.rpm', u'epoch': u'0', u'version': u'0.9.8e', u'release': u'12.el5_5.7', u'arch': u'i686'}, {u'src': None, u'name': u'openssl', u'sum': [u'md5', u'339b3a8e3ecd36b9822dc4f5980315ff'], u'filename': u'openssl-0.9.8e-12.el5_5.7.x86_64.rpm', u'epoch': u'0', u'version': u'0.9.8e', u'release': u'12.el5_5.7', u'arch': u'x86_64'}, {u'src': None, u'name': u'openssl-devel', u'sum': [u'md5', u'9247ff23dd6a777e7fcf09c03a148435'], u'filename': u'openssl-devel-0.9.8e-12.el5_5.7.i386.rpm', u'epoch': u'0', u'version': u'0.9.8e', u'release': u'12.el5_5.7', u'arch': u'i386'}, {u'src': None, u'name': u'openssl-devel', u'sum': [u'md5', u'd84f36a384b9b6145805cf0e29db2b46'], u'filename': u'openssl-devel-0.9.8e-12.el5_5.7.x86_64.rpm', u'epoch': u'0', u'version': u'0.9.8e', u'release': u'12.el5_5.7', u'arch': u'x86_64'}, {u'src': None, u'name': u'openssl-perl', u'sum': [u'md5', u'4b73137c09d8ac84e0aec5910e1afaeb'], u'filename': u'openssl-perl-0.9.8e-12.el5_5.7.x86_64.rpm', u'epoch': u'0', u'version': u'0.9.8e', u'release': u'12.el5_5.7', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u"\n[2.6.18-238.el5]\n- [net] bnx2: remove extra call to pci_map_page (John Feeney) [663509]\n- [fs] nfs: set lock_context field in nfs_readpage_sync (Jeff Layton) [663853]\n\n[2.6.18-237.el5]\n- [block] fully zeroize request struct in rq_init (Rob Evers) [662154]\n- [scsi] qla4xxx: update to 5.02.04.02.05.06-d0 (Chad Dupuis) [656999]\n- [scsi] qla4xxx: make get_sys_info function return void (Chad Dupuis) [656999]\n- [scsi] qla4xxx: dont default device to FAILED state (Chad Dupuis) [656999]\n- [scsi] qla4xxx: mask bits in F/W Options during init (Chad Dupuis) [656999]\n- [scsi] qla4xxx: update to 5.02.04.01.05.06-d0 (Chad Dupuis) [661768]\n- [scsi] qla4xxx: disable irq instead of req pci_slot_reset (Chad Dupuis) [661768]\n- [scsi] qla4xxx: no device add until scsi_add_host success (Chad Dupuis) [661768]\n- [fs] nfs: set lock_context field in nfs_writepage_sync (Jeff Layton) [660580]\n- [scsi] bfa: fix crash reading driver sysfs statistics (Rob Evers) [659880] {CVE-2010-4343}\n- [misc] cpufeature: avoid corrupting cpuid vendor id (Matthew Garrett) [568751]\n- [char] drm: dont set signal blocker on master process (Dave Airlie) [570604]\n- [fs] nfs: remove problematic calls to nfs_clear_request (Jeff Layton) [656492]\n- [fs] nfs: handle alloc failures in nfs_create_request (Jeff Layton) [656492]\n- [fs] nfs: clean up nfs_create_request (Jeff Layton) [656492]\n- [net] forcedeth: fix race condition in latest backport (Ivan Vecera) [658434]\n- [net] cxgb3: fix read of uninitialized stack memory (Jay Fenlason) [633155] {CVE-2010-3296}\n- [net] tg3: increase jumbo flag threshold (John Feeney) [660506]\n- [net] s2io: fix netdev initialization failure (Bob Picco) [654948]\n- [net] igb: only use vlan_gro_receive if vlans registered (Stefan Assmann) [660190] {CVE-2010-4263}\n- [net] ipv6: try all routers with unknown reachable state (Thomas Graf) [661393]\n- [misc] kernel: fix address limit override in OOPS path (Dave Anderson) [659571] {CVE-2010-4258}\n\n[2.6.18-236.el5]\n- [powerpc] support DLPAR remove operations (Steve Best) [655089]\n- [net] igb: fix tx packet count (Stefan Assmann) [658801]\n- [usb] serial: new driver MosChip MCS7840 (Stefan Assmann) [574507]\n- [fs] exec: copy fixes into compat_do_execve paths (Oleg Nesterov) [625694] {CVE-2010-4243}\n- [fs] exec: make argv/envp memory visible to oom-killer (Oleg Nesterov) [625694] {CVE-2010-4243}\n- [misc] binfmts: kill bprm->argv_len (Oleg Nesterov) [625694] {CVE-2010-4243}\n- [mm] backport upstream stack guard page /proc reporting (Larry Woodman) [643426]\n- [mm] add guard page for stacks that grow upwards (Johannes Weiner) [630563]\n- [net] tipc: fix information leak to userland (Jiri Pirko) [649892] {CVE-2010-3877}\n- [sound] ALSA: fix sysfs unload and OSS mixer mutex issues (Jaroslav Kysela) [652165]\n- [net] tg3: fix 5719 bugs (John Feeney) [657097]\n- [net] bnx2: update firmware to 6.0.x (John Feeney) [644438]\n- [redhat] configs: add CONFIG_SECURITY_DMESG_RESTRICT (Frantisek Hrbata) [653250]\n- [misc] kernel: restrict unprivileged access to dmesg (Frantisek Hrbata) [653250]\n- [virt] xen: dont allow blkback virtual CDROM device (Andrew Jones) [635638] {CVE-2010-4238}\n- Revert: [xen] cd-rom drive does not recognize new media (Andrew Jones) [635638] {CVE-2010-4238}\n- [net] qlge: fix deadlock when interface is going down (Chad Dupuis) [654420]\n- [net] qlge: reset chip before freeing buffers (Chad Dupuis) [654420]\n- [net] qlge: restore vlan setting during ql_adapter_up (Chad Dupuis) [654420]\n- [scsi] qla4xxx: Update version to V5.02.04.00.05.06-d0 (Chad Dupuis) [656999]\n- [scsi] qla4xxx: Document Driver Versioning Scheme (Chad Dupuis) [656999]\n- [scsi] qla4xxx: Updated the Copyright header to 2010 (Chad Dupuis) [656999]\n- [scsi] qla4xxx: dont process devices untill probe done (Chad Dupuis) [656999]\n- [scsi] qla4xxx: free DDB when application calls for it (Chad Dupuis) [656999]\n- [scsi] qla4xxx: memory wedge with peg_halt test in loop (Chad Dupuis) [656999]\n- [scsi] qla4xxx: clear AF_FW_RECOVERY flag after reset (Chad Dupuis) [656999]\n- [scsi] qla4xxx: fix new IP address caching (Chad Dupuis) [656999]\n- [scsi] qla4xxx: replace hard coded values with macros (Chad Dupuis) [656999]\n- [scsi] qla4xxx: mark dev FAILED on 82XX init failure (Chad Dupuis) [656999]\n- [scsi] qla4xxx: fail init if pci mem write fails (Chad Dupuis) [656999]\n- [scsi] qla4xxx: ensure proper qla4xxx_conn_start state (Chad Dupuis) [656999]\n- [scsi] qla4xxx: do not process interrupts unconditionally (Chad Dupuis) [656999]\n- [scsi] qla4xxx: fix add w/iscsi2_create_conn not done yet (Chad Dupuis) [656999]\n- [scsi] qla4xxx: no fw hung if reset retry is in progress (Chad Dupuis) [656999]\n- [scsi] qla4xxx: correct use of cmd->host_scribble (Chad Dupuis) [656999]\n- [scsi] qla4xxx: msi init request_irq parameter usage fix (Chad Dupuis) [656999]\n- [scsi] qla4xxx: cleanup qla4xxx_wait_for_hba_online (Chad Dupuis) [656999]\n- [scsi] qla4xxx: grab hardware_lock before accessing srb (Chad Dupuis) [656999]\n- [scsi] qla4xxx: remove unwanted check for bad spd (Chad Dupuis) [656999]\n- [scsi] qla4xxx: update AER support for ISP82XX (Chad Dupuis) [656999]\n- [scsi] qla4xxx: clear rom lock if firmware died holding (Chad Dupuis) [656999]\n- [scsi] qla4xxx: CRB Register for Request Queue in-pointer (Chad Dupuis) [656999]\n- [scsi] qla4xxx: dump mailbox registers on System Error (Chad Dupuis) [656999]\n- [scsi] qla4xxx: add support for 8130/8131 AENs (Chad Dupuis) [656999]\n- [scsi] qla4xxx: fix seconds_since_last_heartbeat reset (Chad Dupuis) [656999]\n- [scsi] qla4xxx: no wait for outstanding command complete (Chad Dupuis) [656999]\n- [scsi] qla4xxx: free_irqs on failed initialize_adapter (Chad Dupuis) [656999]\n- [virt] xen: fix netback hotplug regression in xenbus fix (Laszlo Ersek) [635999]\n- [xen] fix 64-bit PV guest user mode segv crashing host (Paolo Bonzini) [658354] {CVE-2010-4255}\n\n[2.6.18-235.el5]\n- [net] filter: fix backport error in prior filter fix (Jarod Wilson) [651703]\n\n[2.6.18-234.el5]\n- [s390] vmlogrdr: purge after recording is switched off (Hendrik Brueckner) [653479]\n- [wireless] ieee80211: fix deauthentication (Stanislaw Gruszka) [644367]\n- [wireless] zd1211rw: fix associate after disassociate (Stanislaw Gruszka) [644367]\n- [fs] proc: fix NULL ->i_fop oops (Steve Best) [655083]\n- [scsi] lpfc: Update version to 8.2.0.87.1p (Rob Evers) [655119]\n- [scsi] lpfc: set heartbeat timer off by default (Rob Evers) [655119]\n- [scsi] lpfc: fix NULL deref duing allocation failure (Rob Evers) [655119]\n- [scsi] lpfc: fix remote SLI4 firmware download data bug (Rob Evers) [655119]\n- [scsi] lpfc: fix FDMI_DID login failure after link bounce (Rob Evers) [655119]\n- [scsi] lpfc: handle CVL after nameserver PLOGI timeouts (Rob Evers) [655119]\n- [scsi] lpfc: cleanup mbox cmds in mboxq_cmpl if CVL rcvd (Rob Evers) [655119]\n- [misc] posix-cpu-timers: workaround for mt exec problems (Oleg Nesterov) [656266]\n- [fs] setup_arg_pages: diagnose excessive argument size (Oleg Nesterov) [645227]\n- [net] bnx2x: force interrupt mode for iscsi unset mac (Michal Schmidt) [655885]\n- [scsi] bnx2i: allow to abort connect if request times out (Mike Christie) [653991]\n- [scsi] bnx2i: fix remote TCP RST handling for 570X (1g) (Mike Christie) [653991]\n- [scsi] bnx2i: fix a cid leak issue for 5771X (10g) (Mike Christie) [653991]\n- [scsi] bnx2i: fix endian bug in TMF LUN cmd send (Mike Christie) [653991]\n- [misc] prevent divide by 0 in the kernel during boot (Larry Woodman) [508140]\n- [net] filter: make sure filters dont read uninit memory (Jiri Pirko) [651703] {CVE-2010-4158}\n- [net] inet_diag: make sure we run audited bytecode (Jiri Pirko) [651267]\n- [net] limit sendto/recvfrom/iovec total length to INT_MAX (Jiri Pirko) [645872] {CVE-2010-3859}\n- [bluetooth] hci_ldisc: fix missing NULL check (Jarod Wilson) [655666]\n- [net] be2net: avoid firmware update if interface not open (Ivan Vecera) [651948]\n- [ipc] shm: fix information leak to userland (Danny Feng) [648687] {CVE-2010-4072}\n- [ipc] initialize struct memory to 0 for compat functions (Danny Feng) [648693] {CVE-2010-4073}\n- [net] netxen: dont use reset_devices, it may go away (Chad Dupuis) [643254]\n- [net] netxen: fix kdump (Chad Dupuis) [643254]\n- [net] qlcnic: avoid reset_devices, it may become obsolete (Chad Dupuis) [656008]\n- [net] qlcnic: fix for kdump (Chad Dupuis) [656008]\n- [pci] block on access to temporarily unavailable device (Chad Dupuis) [656008]\n- [serial] serial_core: clean data before filling it (Mauro Carvalho Chehab) [648701] {CVE-2010-4075}\n- [edac] i7core_edac: return -ENODEV if dev already probed (Mauro Carvalho Chehab) [651869]\n- [edac] i7core_edac: properly terminate pci_dev_table (Mauro Carvalho Chehab) [651869]\n- [edac] i7core_edac: fix PCI refcounting on reloads (Mauro Carvalho Chehab) [651869]\n- [edac] i7core_edac: fix refcount error at PCI devices (Mauro Carvalho Chehab) [651869]\n- [edac] i7core_edac: safe to unregister mci when mci NULL (Mauro Carvalho Chehab) [651869]\n- [edac] i7core_edac: fix an oops at i7core probe (Mauro Carvalho Chehab) [651869]\n- [edac] i7core_edac: remove unused member in i7core_pvt (Mauro Carvalho Chehab) [651869]\n- [edac] i7core_edac: remove unused arg in get_dimm_config (Mauro Carvalho Chehab) [651869]\n- [edac] i7core_edac: reduce args of i7core_register_mci (Mauro Carvalho Chehab) [651869]\n- [edac] i7core_edac: use saved pointers (Mauro Carvalho Chehab) [651869]\n- [edac] i7core_edac: check probe counter in i7core_remove (Mauro Carvalho Chehab) [651869]\n- [edac] i7core_edac: call pci_dev_put on alloc failure (Mauro Carvalho Chehab) [651869]\n- [edac] i7core_edac: fix error path of i7core_register_mci (Mauro Carvalho Chehab) [651869]\n- [edac] i7core_edac: fix line order in i7core_register_mci (Mauro Carvalho Chehab) [651869]\n- [edac] i7core_edac: always do get/put for all devices (Mauro Carvalho Chehab) [651869]\n- [edac] i7core_edac: ensure edac pci handler release (Mauro Carvalho Chehab) [651869]\n- [edac] i7core_edac: introduce free_i7core_dev (Mauro Carvalho Chehab) [651869]\n- [edac] i7core_edac: introduce alloc_i7core_dev (Mauro Carvalho Chehab) [651869]\n- [edac] i7core_edac: reduce args of i7core_get_onedevice (Mauro Carvalho Chehab) [651869]\n- [edac] i7core_edac: fix the logic in i7core_remove (Mauro Carvalho Chehab) [651869]\n- [edac] i7core_edac: dont do legacy PCI probe by default (Mauro Carvalho Chehab) [651869]\n- [edac] edac_core: print debug messages at release calls (Mauro Carvalho Chehab) [651869]\n- [edac] i7core_edac: remove PCI devices from devices list (Mauro Carvalho Chehab) [651869]\n- [edac] i7core_edac: MCE NMI handling should stop first (Mauro Carvalho Chehab) [651869]\n- [edac] i7core_edac: improve debug register/remove errors (Mauro Carvalho Chehab) [651869]\n- [edac] i7core_edac: move #if PAGE_SHIFT to edac_core.h (Mauro Carvalho Chehab) [651869]\n- [edac] i7core_edac: terminate the group of udimm counters (Mauro Carvalho Chehab) [651869]\n- [edac] i7core_edac: mark const static vars as such (Mauro Carvalho Chehab) [651869]\n- [edac] i7core_edac: move static vars to the top of file (Mauro Carvalho Chehab) [651869]\n- [virt] xen: add bounds req-process loop in blkback/blktap (Laszlo Ersek) [654546] {CVE-2010-4247}\n- [virt] xen: dont leak dev refs on bad xenbus transitions (Laszlo Ersek) [635999] {CVE-2010-3699}\n- [mm] fix possible integer overflow in mm/fremap.c (Larry Woodman) [637047]\n- [misc] futex: replace LOCK_PREFIX in futex.h (Jiri Pirko) [633176] {CVE-2010-3086}\n\n[2.6.18-233.el5]\n- [scsi] mpt2sas: use sas device list for enclosure id (Tomas Henzl) [652284]\n- [scsi] ipr: fix mailbox register definition and add delay (Steve Best) [654446]\n- [scsi] ipr: fix lun assignment and comparison (Steve Best) [654446]\n- [powerpc] add AT_BASE_PLATFORM to Aux Vector and power7 (Steve Best) [652279]\n- [infiniband] ehea: use shca_list_lock spinlock (Steve Best) [613797]\n- [powerpc] kdump: CPUs assume context of oopsing CPU (Steve Best) [509792]\n- [scsi] lpfc: Update version for 8.2.0.87 driver release (Rob Evers) [649489]\n- [scsi] lpfc: add handling SLI4 unsolicted ELS RTV (Rob Evers) [649489]\n- [scsi] lpfc: add handling ECHO response support (Rob Evers) [649489]\n- [scsi] lpfc: add handling of SLI4 unsolicted ELS (Rob Evers) [649489]\n- [scsi] lpfc: fix locking for security mailbox commands (Rob Evers) [649489]\n- [scsi] lpfc: abort I/Os and wait on XRI in SLI4 unload (Rob Evers) [649489]\n- [scsi] lpfc: handle devloss timeout in FIP engine (Rob Evers) [649489]\n- [scsi] lpfc: fix crashes on NULL pnode dereference (Rob Evers) [649489]\n- [net] cnic: Add cnic_free_uio (Mike Christie) [651287]\n- [net] cnic: Add cnic_uio_dev struct (Mike Christie) [651287]\n- [net] cnic: Add cnic_free_uio (Mike Christie) [651287]\n- [net] cnic: Fine-tune ring init code (Mike Christie) [651287]\n- [misc] fix dirty_bytes sysctl name (Larry Woodman) [635782]\n- [fs] procfs: acquire inode mutex around llseek operation (Lachlan McIlroy) [644726]\n- [virt] netfront: default to copying instead of flipping (Laszlo Ersek) [653262]\n- [virt] netback: dont balloon up for copying receivers (Laszlo Ersek) [653501]\n- [net] rds: fix rds_iovec page count overflow (Jiri Pirko) [647422]\n- [net] virtio_net: add link status handling (Jason Wang) [649573]\n- [net] be2net: Update be2net to version 2.102.512r (Ivan Vecera) [647259]\n- [char] watchdog: another LPC Controller ID for Patsburg (David Milburn) [570868]\n- [misc] another LPC Controller ID for Intel Patsburg PCH (David Milburn) [570868]\n- [i2c] i2c-i801: Add Intel Patsburg device ID (David Milburn) [570868]\n- [misc] pci: update Intel Patsburg defines (David Milburn) [570868]\n- [misc] x86/PCI irq and pci_ids for Intel Patsburg Devices (David Milburn) [570868]\n- [sound] ALSA HD Audio for Intel Patsburg DeviceIDs (David Milburn) [570868]\n- [char] watchdog: TCO Watchdog for Intel Patsburg Devices (David Milburn) [570868]\n- [ata] ahci: AHCI and RAID mode for Intel Patsburg Devices (David Milburn) [570868]\n- [ata] ata_piix: IDE Mode SATA for Intel Patsburg Devices (David Milburn) [570868]\n- [net] fix deadlock in sock_queue_rcv_skb (Danny Feng) [652537]\n- [scsi] qla2xxx: check null fcport in _queuecommands (Chad Dupuis) [644863]\n- [net] qlcnic: Fix missing error codes (Chad Dupuis) [637194]\n- [usb] wacom: add support for Cintiq 21UX2 (Aristeu Rozanski) [652731]\n- [xen] hvm: add HVMOP_get_time hypercall (Paolo Bonzini) [638082]\n\n[2.6.18-232.el5]\n- [scsi] mpt2sas: use correct pci_resource_flag for compare (Tomas Henzl) [649885]\n- [sound] rme9652: prevent reading uninitialized stack mem (Stanislaw Gruszka) [648709 648714] {CVE-2010-4080 CVE-2010-4081}\n- [net] packet: fix information leak to userland (Jiri Pirko) [649898]\n- [ipc] sys_semctl: fix kernel stack leakage (Danny Feng) [648722] {CVE-2010-4083}\n- [misc] kernel: remove yield from stop_machine paths (Oleg Nesterov) [634454]\n- [fs] dlm: reduce cond_resched during send (David Teigland) [604139]\n- [fs] dlm: use TCP_NODELAY (David Teigland) [604139]\n- [fs] nfs: fix a referral error Oops (Steve Dickson) [556886]\n- [fs] gfs2: fix race in unlinked inode deallocation (Robert S Peterson) [643165]\n- [scsi] retry on DID_REQUEUE errors (Mike Christie) [627836]\n- [net] sctp: do not reset packet during sctp_packet_config (Jiri Pirko) [637867]\n- [net] bnx2: add AER support (John Feeney) [617024]\n- [net] bonding: no lock on copy/clear VLAN list on slave (Andy Gospodarek) [627974]\n- [scsi] gdth: prevent integer overflow in ioc_general (Frantisek Hrbata) [651176]\n\n[2.6.18-231.el5]\n- [scsi] scsi_dh_alua: remove IBM Power Virtual SCSI ALUA (Steve Best) [567292]\n- [fs] gfs2: flock (LOCK_EX|LOCK_NB) blocks (Robert S Peterson) [648602]\n- [scsi] lpfc: update version for 8.2.0.86 driver release (Rob Evers) [645881]\n- [scsi] lpfc: fix race sending FDISC to un-init VPI (Rob Evers) [645881]\n- [scsi] lpfc: fix mailbox handling for UNREG_RPI_ALL case (Rob Evers) [645881]\n- [kernel] add stop_machine barrier to fix lock contention (Prarit Bhargava) [634454]\n- [scsi] bnx2i: fix ip address formatting and oops (Mike Christie) [646708]\n- [scsi] be2iscsi: remove premature free of cid (Mike Christie) [640029]\n- [fs] proc: make proc pid limits world readable (Jiri Olsa) [611535]\n- [ide] atiixp: fix locking hang in ide layer ATIIXP driver (James Leddy) [586482]\n- [security] only check mmap_min_addr perms for write (Eric Paris) [623519]\n- [ata] sata_sil24: add DID for another adaptec flavor (David Milburn) [640586]\n- [s390] cio: prevent panic in I/O cancel function (Hendrik Brueckner) [647807]\n- [s390] cio: prevent panic after unexpected I/O interrupt (Hendrik Brueckner) [647502]\n\n[2.6.18-230.el5]\n- [fs] nfs: fix regression in NFS Direct I/O path (Steve Dickson) [647297]\n- [fs] nfs: allow different protocol mounts to same server (Steve Dickson) [460659]\n- [scsi] lpfc: update version for 8.2.0.85 driver release (Rob Evers) [639028]\n- [scsi] lpfc: fix a BUG_ON in lpfc_abort_handler (Rob Evers) [639028]\n- [scsi] lpfc: use pci reset function on driver unload (Rob Evers) [639028]\n- [scsi] lpfc: replace some spin_lock_irqs w/spin_locks (Rob Evers) [639028]\n- [scsi] lpfc: fail io w/lost frame and target check cond (Rob Evers) [639028]\n- [scsi] lpfc: fix abort WQEs for FIP frames (Rob Evers) [639028]\n- [scsi] lpfc: update version for 8.2.0.84 driver release (Rob Evers) [639028]\n- [scsi] lpfc: unreg all rpi mbox command before unreg vpi (Rob Evers) [639028]\n- [scsi] lpfc: make all error values negative (Rob Evers) [639028]\n- [scsi] lpfc: remove duplicate code from lpfc_els_retry (Rob Evers) [639028]\n- [scsi] lpfc: fix circular spinlock dep w/scsi midlayer (Rob Evers) [639028]\n- [scsi] lpfc: update version for 8.2.0.83 driver release (Rob Evers) [639028]\n- [scsi] lpfc: fix FLOGI issue with McData4700 FC switch (Rob Evers) [639028]\n- [scsi] lpfc: fix possible roundrobin failover failure (Rob Evers) [639028]\n- [scsi] lpfc: fix unregister of unused FCF on timeout (Rob Evers) [639028]\n- [scsi] lpfc: fix heartbeat timeout during pause test (Rob Evers) [639028]\n- [scsi] lpfc: update version for 8.2.0.82 driver release (Rob Evers) [639028]\n- [scsi] lpfc: fix lpfc_els_retry delay/retry for PLOGI (Rob Evers) [639028]\n- [scsi] lpfc: streamline some spin locks (Rob Evers) [639028]\n- [scsi] lpfc: fix lpfc_initial_flogi return on failure (Rob Evers) [639028]\n- [scsi] lpfc: fix stray state update issue with new FCF (Rob Evers) [639028]\n- [scsi] lpfc: treat FCF prop with different index as error (Rob Evers) [639028]\n- [scsi] lpfc: fix misc auth issues on EmulexSecure FC HBA (Rob Evers) [639028]\n- [scsi] lpfc: update version for 8.2.0.81 driver release (Rob Evers) [639028]\n- [scsi] lpfc: move unload flag earlier in vport delete (Rob Evers) [639028]\n- [scsi] lpfc: fix IOCB leak on FDISC completion (Rob Evers) [639028]\n- [scsi] lpfc: fix possible crash on non-SLI4 hba (Rob Evers) [639028]\n- [scsi] mpt2sas: fix panic w/direct attached SEP (Jarod Wilson) [641086]\n- [redhat] spec: clean up rpmbuild kabideps detritus (Jarod Wilson) [644129]\n- [net] bnx2: Increase max rx ring size from 1K to 2K (Andy Gospodarek) [640026]\n- [net] bnx2: fixup broken NAPI accounting (Andy Gospodarek) [640026]\n- [s390] qeth: portno 1 support for OSM-device insufficient (Hendrik Brueckner) [644008]\n\n[2.6.18-229.el5]\n- [pci] include DL580 G7 in bfsort whitelist (Tony Camuso) [644879]\n- [net] igb: fix TX hang when loading igb with max_vfs > 7 (Stefan Assmann) [645284]\n- [virt] fix timekeeping_use_tsc check in init_tsc_timer (Prarit Bhargava) [643926]\n- [net] bonding: support netconsole over bonded link (Neil Horman) [235343]\n- [virt] xen: increase txqueuelen of netback vif devices (Miroslav Rezanina) [539626]\n- [sound] core: prevent heap corruption in snd_ctl_new (Jerome Marchand) [638484] {CVE-2010-3442}\n- [net] updated drivers need version string updates too (Andy Gospodarek) [635027]\n- [misc] softlockup: increase timeout to 60 seconds (Don Zickus) [643707]\n- [virt] xen: fix vdso failure under xen pv environment (Danny Feng) [644860]\n- [scsi] qla2xxx: fix zero test on array in ql_fc_loopback (Chad Dupuis) [644136]\n- [usb] net/catc: change NICs TX_MAX_BURST, fixes probe (Bob Picco) [637826]\n- [virt] console: dont block guest if host doesnt read (Amit Shah) [644735]\n- [media] video: remove compat code for VIDIOCSMICROCODE (Mauro Carvalho Chehab) [642471] {CVE-2010-2963}\n- [xen] vtd: let IOMMU use another IRQ without conflict (Don Dugger) [575790]\n- [net] bonding: correctly process non-linear skbs (Andy Gospodarek) [619070]\n- [net] rds: fix local privilege escalation (Eugene Teo) [642898] {CVE-2010-3904}\n\n[2.6.18-228.el5]\n- [char] tpm: pay attention to IRQ info from PNP in tpm_tis (Stefan Assmann) [636760]\n- [misc] cpufreq: add missing cpufreq_cpu_put (Prarit Bhargava) [643080]\n- [md] fix softlockup issue waiting for resync to finish (James Paradis) [573106]\n- [s390] dasd_eckd: remove PSF order/suborder ioctl check (John Feeney) [565973]\n- [fs] xfs: fix speculative allocation beyond eof (Dave Chinner) [638753]\n\n[2.6.18-227.el5]\n- [net] ixgbe: add option to control interrupt mode (Andy Gospodarek) [571495]\n- [md] raid0: fix data corruption on 32-bit w/large storage (Stanislaw Gruszka) [573185]\n- [scsi] fix write buffer length in scsi_req_map_sg (Steve Best) [637235]\n- [scsi] ipr: back out isr optimization changes (Steve Best) [634213]\n- [scsi] ipr: fix rsrc addr format and add attr for dev ID (Steve Best) [634213]\n- [fs] jbd2: properly align sized slab caches (Eric Sandeen) [638961]\n- [fs] ext4: dont scan/accumulate too many pages (Eric Sandeen) [572930]\n- [fs] gfs2: fix fatal filesystem consistency error (Robert S Peterson) [529914]\n- [scsi] lpfc: update version for 8.2.0.80 driver release (Rob Evers) [619917]\n- [scsi] lpfc: add Security Crypto support to CONFIG_PORT (Rob Evers) [619917]\n- [scsi] lpfc: remove unused variables (Rob Evers) [619917]\n- [scsi] lpfc: log msg 0318 is a warning, not an error (Rob Evers) [619917]\n- [scsi] lpfc: fix bug w/cable swap and non-empty nodelist (Rob Evers) [619917]\n- [scsi] lpfc: fix a failure to roundrobin on all FCFs (Rob Evers) [619917]\n- [scsi] lpfc: fix heartbeat timeout during fabric reconfig (Rob Evers) [619917]\n- [scsi] lpfc: update version for 8.2.0.79 driver release (Rob Evers) [619917]\n- [scsi] lpfc: fix a Clear Virtual Link recovery failure (Rob Evers) [619917]\n- [scsi] lpfc: clear VFI_REGISTERED flag after UNREG_VFI (Rob Evers) [619917]\n- [scsi] lpfc: ignore failure of REG_VPI mbox w/UPD bit set (Rob Evers) [619917]\n- [scsi] lpfc: fix ioctl using inactive ndlp for ct resp (Rob Evers) [619917]\n- [scsi] lpfc: fix bug w/ndlp not activated post-cable swap (Rob Evers) [619917]\n- [scsi] lpfc: add support UPD bit of REG_VPI mailbox cmd (Rob Evers) [619917]\n- [scsi] lpfc: fix driver discovery issue after link bounce (Rob Evers) [619917]\n- [scsi] lpfc: fix VLAN ID 0xFFF set to reg_fcfi mbox cmd (Rob Evers) [619917]\n- [scsi] lpfc: update version for 8.2.0.78 driver release (Rob Evers) [619917]\n- [scsi] lpfc: fix race condition causing >1 FLOGI commands (Rob Evers) [619917]\n- [scsi] lpfc: enhance round-robin FCF failover algorithm (Rob Evers) [619917]\n- [scsi] lpfc: clear Ignore Reg Login when purging mailbox (Rob Evers) [619917]\n- [scsi] lpfc: fix for ELS commands stuck on txq (Rob Evers) [619917]\n- [scsi] lpfc: added target queuedepth module parameter (Rob Evers) [619917]\n- [scsi] lpfc: fix RoundRobin FCF failover issue (Rob Evers) [619917]\n- [scsi] re-enable transistions from OFFLINE to RUNNING (Mike Christie) [641193]\n- [edac] i7300_edac: properly init per-csrow memory size (Mauro Carvalho Chehab) [487428]\n- [edac] i7300_edac: better initialize page counts (Mauro Carvalho Chehab) [487428]\n- [redhat] configs: enable edac debugging debug kernels (Mauro Carvalho Chehab) [487428]\n- [edac] i7300_edac: backport driver to RHEL5.6 codebase (Mauro Carvalho Chehab) [487428]\n- [edac] i7300_edac: add appropriate MAINTAINERS info (Mauro Carvalho Chehab) [487428]\n- [edac] i7300_edac: coding style cleanups (Mauro Carvalho Chehab) [487428]\n- [edac] i7300_edac: improve inline comments/documentation (Mauro Carvalho Chehab) [487428]\n- [edac] i7300_edac: reorganize file contents (Mauro Carvalho Chehab) [487428]\n- [edac] i7300_edac: properly detect channel on CE errors (Mauro Carvalho Chehab) [487428]\n- [edac] i7300_edac: enrich FBD info for corrected errors (Mauro Carvalho Chehab) [487428]\n- [edac] i7300_edac: enrich FBD error info for fatal errors (Mauro Carvalho Chehab) [487428]\n- [edac] i7300_edac: pre-allocate buffer for error messages (Mauro Carvalho Chehab) [487428]\n- [edac] i7300_edac: fix MTR x4/x8 detection logic (Mauro Carvalho Chehab) [487428]\n- [edac] i7300_edac: make debug messages consistent (Mauro Carvalho Chehab) [487428]\n- [edac] i7300_edac: remove stale get_error_info logic (Mauro Carvalho Chehab) [487428]\n- [edac] i7300_edac: add error registers cleanup support (Mauro Carvalho Chehab) [487428]\n- [edac] i7300_edac: add support for reporting FBD errors (Mauro Carvalho Chehab) [487428]\n- [edac] i7300_edac: properly detect error correction type (Mauro Carvalho Chehab) [487428]\n- [edac] i7300_edac: detect if device is in single mode (Mauro Carvalho Chehab) [487428]\n- [edac] i7300_edac: add detection of enhanced scrub mode (Mauro Carvalho Chehab) [487428]\n- [edac] i7300_edac: clear error bit after reading (Mauro Carvalho Chehab) [487428]\n- [edac] i7300_edac: add error detection for global errors (Mauro Carvalho Chehab) [487428]\n- [edac] i7300_edac: better PCI device names (Mauro Carvalho Chehab) [487428]\n- [edac] i7300_edac: Add FIXME about error correction type (Mauro Carvalho Chehab) [487428]\n- [edac] i7300_edac: add global error registers (Mauro Carvalho Chehab) [487428]\n- [edac] i7300_edac: display info if ECC is enabled or not (Mauro Carvalho Chehab) [487428]\n- [edac] i7300_edac: new driver for Intel i7300 chipset (Mauro Carvalho Chehab) [487428]\n- [mm] kswapd: dont get stuck in D state w/fragmented mem (Larry Woodman) [609668]\n- [misc] x86_64: fix hang at Booting processor 1/8 APIC (John Villalovos) [639851]\n- [misc] oprofile: add backtraces for compat mode processes (Jiri Olsa) [622024]\n- [net] tg3: re-enable 5717 B0 support (John Feeney) [634320]\n- [net] tg3: fix 5717/57765/5719 memory leak (John Feeney) [631963]\n- [net] tg3: display FW version, handle FW events correctly (John Feeney) [634325]\n- [net] bnx2: improve tx fast path performance (John Feeney) [632057]\n- [net] enic: update to upstream version 1.4.1.2 (Andy Gospodarek) [568111]\n- [net] ixgbe: fix 82598 link issue and panic w/shared irq (Andy Gospodarek) [637331]\n- [net] mlx4: bump max log_mtts_per_seg memory reservation (Jay Fenlason) [636198]\n- [usb] net: add support for CDC EEM (Don Zickus) [572519]\n- [scsi] qla2xxx: clear post-uncorrectable non-fatal errors (Chad Dupuis) [572258]\n- [net] qlcnic: fix poll implementation (Chad Dupuis) [625084]\n- [net] qlcnic: TSO feature added for vlan devices (Chad Dupuis) [625084]\n- [net] qlcnic: fix diag resource allocation (Chad Dupuis) [625084]\n- [net] qlcnic: fix loopback test (Chad Dupuis) [625084]\n- [net] qlcnic: fix bandwidth check (Chad Dupuis) [625084]\n- [net] qlcnic: fix gro support (Chad Dupuis) [625084]\n- [s390] kernel: fix fork vs /proc/stat race (Hendrik Brueckner) [627298]\n- [misc] amd_iommu: fix kdump OOM issue seen with iommu=pt (Bhavna Sarathy) [627663]\n- [fs] execve: fix interactivity and response to SIGKILL (Dave Anderson) [629176]\n- [virt] virtio_console: fix userspace NULL buffer submits (Amit Shah) [636046]\n- [virt] virtio_console: fix poll blocking when data ready (Amit Shah) [636020]\n- [virt] virtio_console: send SIGIO as needed for host evts (Amit Shah) [636053]\n- [virt] virtio_console: make hot-unplug safe (Amit Shah) [628828]\n- [net] virtio_net: defer skb allocation in receive path (Anthony Liguori) [565560]\n- [misc] increase logbuf size to 512K (Don Zickus) [563535]\n- [xen] hvm: correct accuracy of pmtimer (Andrew Jones) [633028]\n- [xen] fix guest crash on non-EPT machine may crash host (Paolo Bonzini) [621430] {CVE-2010-2938}\n\n[2.6.18-226.el5]\n- [net] bonding: fix IGMP report on slave during failover (Flavio Leitner) [637764]\n\n[2.6.18-225.el5]\n- [usb] serial/pl2303: add id for HP LD220-HP POS display (Don Zickus) [580698]\n\n[2.6.18-224.el5]\n- [scsi] mpt2sas: recover from injected PCIe bus errors (Tomas Henzl) [568281]\n- [message] fusion: remove unnecessary printk flooding logs (Tomas Henzl) [629081]\n- [scsi] scsi_dh_alua: handle transitioning state correctly (Mike Snitzer) [619361]\n- [scsi] lpfc: fix ioctl crash in lpfc_nlp_put (Rob Evers) [625841]\n- [net] trace: fix sk_buff typo in network tracepoints (Neil Horman) [568614]\n- [net] sched: fix info leak in traffic policing (Neil Horman) [636392]\n- [md] dm: fix deadlock with fsync vs. resize in lvm (Mikulas Patocka) [624068]\n- [misc] amd_iommu: fix slab corruption with iommu enabled (Larry Woodman) [530619]\n- [mm] add dirty_background_bytes and dirty_bytes sysctls (Larry Woodman) [635782]\n- [scsi] add scsi_dispatch_* tracepoints (Jiri Olsa) [568290]\n- [misc] oprofile: support Intel CPU Family 6, Model 22, 29 (Jiri Olsa) [493047]\n- [fs] aio: fix flush_workqueue deadlock (Jeff Moyer) [546700]\n- [net] be2net: use generated MAC addr for VFs, fix BUG_ON (Ivan Vecera) [630680]\n- [fs] sysfs: add labeling support for sysfs (Eric Paris) [582374]\n- [selinux] inode_*secctx hooks to access security ctx info (Eric Paris) [582374]\n- [fs] xattr: refactor vfs_setxattr for SELinux hook use (Eric Paris) [582374]\n- [redhat] configs: compile TCG modules for kernel-xen (Andrew Jones) [636100]\n- [net] netxen: fix poll implementation (Chad Dupuis) [625079]\n- [net] netxen: fix a race in netxen_nic_get_stats() (Chad Dupuis) [625079]\n- [net] netxen: update version 4.0.74 (Chad Dupuis) [625079]\n- [net] netxen: fix feature setting for vlan devices (Chad Dupuis) [625079]\n- [net] netxen: fix tx csum setting (Chad Dupuis) [625079]\n- [scsi] qla2xxx: recover on mmio_enable function for 82XX (Chad Dupuis) [613134]\n- [scsi] qla2xxx: add AER support for 82XX (Chad Dupuis) [613134]\n- [misc] amd_iommu: change default to passthrough mode (Bhavna Sarathy) [628018]\n- [misc] amd_iommu: add passthrough mode support (Bhavna Sarathy) [561127]\n- [misc] amd: dont use mwait_idle on AMD CPUs (Bhavna Sarathy) [610199]\n- [misc] amd: show L3 cache info for all CPU families (Bhavna Sarathy) [610199]\n- [misc] amd: unify L3 cache index disable checking (Bhavna Sarathy) [610199]\n- [misc] amd: avoid dupe sysfs bits for thresholding banks (Bhavna Sarathy) [610199]\n- [misc] amd: remove superfluous CPU family/model check (Bhavna Sarathy) [610199]\n- [misc] fix race in pid generation causing immediate reuse (Dave Anderson) [634850]\n\n[2.6.18-223.el5]\n- [redhat] kabi: add net symbols for RHEL5.6 (Jon Masters) [547689 555708 558999 568558 569606 613193]\n- [redhat] kabi: add Block and SCSI symbols for RHEL5.6 (Jon Masters) [547689 558999 566767 569606 574557]\n- [redhat] kabi: add PCI kernel symbols for RHEL5.6 (Jon Masters) [547689 555708 566767 568558 569606 597143 613193]\n- [redhat] kabi: add core kernel symbols for RHEL5.6 (Jon Masters) [545218 562242]\n- [net] ipvs: add one-packet scheduler (Thomas Graf) [578836]\n- [pci] fix pci_mmcfg_init making some memory uncacheable (Shyam Iyer) [581933]\n- [virt] xen: fix crashing of x86 hvm guest on x86_64 (Radim Krcmar) [605697]\n- [scsi] fix disk spinup for shorter path restore times (Rob Evers) [608109]\n- [scsi] aacraid: fix file system falsely going read-only (Rob Evers) [523920]\n- [misc] x86: fix cpuid_level on Intel pre-model 13 cpus (Prarit Bhargava) [606851]\n- [net] cxgb3: alt buffer freeing strategy when xen dom0 (Paolo Bonzini) [488882]\n- [net] bonding: enable output slave selection (Neil Horman) [516289]\n- [md] dm-raid1: fix data lost at mirror log failure (Mikulas Patocka) [555197]\n- [md] kcopyd: dm snapshot performance improvement (Mikulas Patocka) [466088]\n- [scsi] increase sync cache timeout (Mike Christie) [592322]\n- [scsi] log msg when getting Unit Attention (Mike Christie) [585431]\n- [virt] xen: add dummy mwait for xen to make it compile (Luming Yu) [573514]\n- [x86_64] use apic as main timer if non-stop-apic timer (Luming Yu) [573514]\n- [acpi] cpu: use MWAIT for C-state (Luming Yu) [573514]\n- [net] ipv4/defrag: check socket type before reference (Jiri Olsa) [632266]\n- [net] ipv4: prevent chained skb destined to UFO device (Jiri Olsa) [633450]\n- [block] cfq: no merges for queues w/no process references (Jeff Moyer) [605265]\n- [fs] aio: check for multiplication overflow in io_submit (Jeff Moyer) [629449] {CVE-2010-3067}\n- [misc] make compat_alloc_user_space incorporate access_ok (Don Howard) [634464] {CVE-2010-3081}\n- [fs] xfs: prevent reading uninitialized stack memory (Dave Chinner) [630807] {CVE-2010-3078}\n- [fs] aio: fix cleanup in io_submit_one (Jeff Moyer) [631721] {CVE-2010-3066}\n\n[2.6.18-222.el5]\n- [cpufreq] powernow-k8: fix per core frequency control (Bhavna Sarathy) [502397]\n- [misc] uid/gid: fix integer overflow in groups_search (Jerome Marchand) [629626]\n- [virt] xen: remove dead code (Paolo Bonzini) [507846]\n- [virt] xen: dont give up ballooning under mem pressure (Paolo Bonzini) [507846]\n- [net] ipv4: fix oops in writing to forwarding sysctl (Neil Horman) [629638]\n- [net] trace: backport some networking tracepoints (Neil Horman) [568614]\n- [misc] rename topology_*_cpumask back to *_siblings (Michal Schmidt) [633388]\n- [scsi] 3w_sas: add new 3ware SAS driver (Tomas Henzl) [572011]\n- [scsi] 3w-9xxx: update to 2.26.08.007-2.6.18RH (Tomas Henzl) [572004]\n- [scsi] megaraid: fix suspend function (Tomas Henzl) [630927]\n- [net] ipv6: add modes to do RA/RS when in forwarding mode (Thomas Graf) [614064]\n- [fs] nfsv4: fix bug when server returns NFS4ERR_RESOURCE (Steve Dickson) [620502]\n- [fs] nfsv4: ensure lockowners are labelled correctly (Steve Dickson) [620502]\n- [fs] nfsv4: add support for RELEASE_LOCKOWNER operation (Steve Dickson) [620502]\n- [fs] nfsv4: clean up for lockowner XDR encoding (Steve Dickson) [620502]\n- [fs] nfsv4: ensure we track lock state in r/w requests (Steve Dickson) [620502]\n- [scsi] qla4xxx: add PCIe AER support (Chad Dupuis) [624710]\n- [scsi] qla4xxx: update version to 5.02.03.00.05.06-d1 (Chad Dupuis) [623675]\n- [scsi] qla4xxx: resolve name space error with qla2xxx (Chad Dupuis) [623675]\n- [net] qlcnic: add AER support and miscellaneous fixes (Chad Dupuis) [614281]\n- [net] qlcnic: add NIC partitioning and other misc fixes (Chad Dupuis) [614281]\n- [net] qlcnic: misc upstream fixes for RHEL5.6 (Chad Dupuis) [614281]\n- [net] ipv4: fix buffer overflow in icmpmsg_put (Frantisek Hrbata) [601391]\n- [proc] allow access to /proc//fd after setuid (Danny Feng) [617707]\n- [fs] xfs: fix missing untrusted inode lookup tag (Dave Chinner) [607032]\n- [wireless] fixes from 2.6.32.18 (Stanislaw Gruszka) [621105]\n- [wireless] fixes from 2.6.32.17 (Stanislaw Gruszka) [621105]\n- [wireless] fixes from 2.6.32.16 (Stanislaw Gruszka) [621105]\n- [wireless] fixes from 2.6.32.14 (Stanislaw Gruszka) [621105]\n- [wireless] fixes from 2.6.32.13 (Stanislaw Gruszka) [621105]\n- [wireless] fixes from 2.6.32.12 (Stanislaw Gruszka) [621105]\n- [wireless] fixes from 2.6.32.11 (Stanislaw Gruszka) [621105]\n- [wireless] fixes from 2.6.32.10 (Stanislaw Gruszka) [621105]\n- [wireless] fixes from 2.6.32.9 (Stanislaw Gruszka) [621105]\n- [wireless] fixes from 2.6.32.8 (Stanislaw Gruszka) [621105]\n- [xen] emulate task switching (Paolo Bonzini) [625903]\n- [xen] introduce hvm_set_cr3 (Paolo Bonzini) [625903]\n- [xen] introduce hvm_virtual_to_linear_addr (Paolo Bonzini) [625903]\n- [xen] introduce hvm_set_segment_register (Paolo Bonzini) [625903]\n- [xen] hvm: big cleanups and fixes to event deliver logic (Paolo Bonzini) [625903]\n- [xen] vmx: simplify event-injection logic (Paolo Bonzini) [625903]\n- [xen] xm trigger NMI support for HVM guests (Paolo Bonzini) [625902]\n- [xen] virtual NMI support (Paolo Bonzini) [625902]\n- [xen] emulate injection of guest NMI (Paolo Bonzini) [625902]\n- [xen] introduce get_isa_irq_vector and is_isa_irq_masked (Paolo Bonzini) [625902]\n- [xen] hvm: fix UP suspend/resume/migration w/PV drivers (Miroslav Rezanina) [629773]\n\n[2.6.18-221.el5]\n- [acpi] check _PPC state on cpufreq start (Matthew Garrett) [581037]\n- [fs] aio: bump i_count instead of using igrab (Jeff Moyer) [626963]\n- [redhat] dont generate kABI deps when building w/o kABI (Jon Masters) [456765]\n- [watchdog] support for iTCO on Ibex Peak and Cougar Point (John Villalovos) [534152]\n- [edac] amd64_edac: whitespace cleanups (Bhavna Sarathy) [568576]\n- [edac] amd64_edac: minor formatting fix (Bhavna Sarathy) [568576]\n- [edac] amd64_edac: fix operator precedence error (Bhavna Sarathy) [568576]\n- [edac] amd64_edac: fix syndrome calculation on K8 (Bhavna Sarathy) [568576]\n- [edac] amd64_edac: simplify ECC override handling (Bhavna Sarathy) [568576]\n- [edac] amd64_edac: do not falsely trigger kerneloops (Bhavna Sarathy) [568576]\n- [edac] amd64_edac: restrict PCI config space access (Bhavna Sarathy) [568576]\n- [edac] amd64_edac: fix forcing module load/unload (Bhavna Sarathy) [568576]\n- [edac] amd64_edac: fix driver instance freeing (Bhavna Sarathy) [568576]\n- [edac] amd64_edac: fix k8 chip select reporting (Bhavna Sarathy) [568576]\n- [edac] amd64_edac: add leaner syndrome decoding algorithm (Bhavna Sarathy) [568576]\n- [scsi] bnx2i: link hba and cnic device before device reg (Mike Christie) [578005]\n- [scsi] bnx2i: make fw use statsn field to build header (Mike Christie) [578005]\n- [net] cnic: select bug fixes from upstream for RHEL5.6 (Mike Christie) [595548 619767]\n- [scsi] bnx2i: update version to bnx2i-2.1.3 (Mike Christie) [568606]\n- [scsi] bnx2i: add chip cleanup for remove module path (Mike Christie) [568606]\n- [scsi] bnx2i: rebind CFC cleanup to cm_abort/close comp (Mike Christie) [568606]\n- [scsi] bnx2i: add support for additional TMFs (Mike Christie) [568606]\n- [scsi] bnx2i: fix protocol violation on nopout responses (Mike Christie) [568606]\n- [scsi] bnx2i: fix response panic on unsolicited NOP-In (Mike Christie) [568606]\n- [scsi] bnx2i: fix bugs in handling of unsolicited NOP-Ins (Mike Christie) [568606]\n- [scsi] bnx2i: add host param ISCSI_HOST_PARAM_IPADDRESS (Mike Christie) [568606]\n- [scsi] bnx2i: fix TCP graceful termination initiation (Mike Christie) [568606]\n- [scsi] bnx2i: fine tune misc destroy timeout values (Mike Christie) [568606]\n- [scsi] bnx2i: optimize bnx2i_stop connection clean up (Mike Christie) [568606]\n- [scsi] bnx2i: create active linklist holding endpoints (Mike Christie) [568606]\n- [scsi] bnx2i: split hardware cleanup from ep_disconnect (Mike Christie) [568606]\n- [fs] dlm: fix try 1cb failure, part 2 (Abhijith Das) [504188]\n- [fs] dlm: no node callback when try 1cb lock req fails (David Teigland) [504188]\n- [misc] crypto: add Intel x86_64 hardware CRC32 support (Prarit Bhargava) [626018]\n- [net] bnx2: update to v2.0.8+ with new 5709 firmware j15 (John Feeney) [568601]\n- [net] tg3: update to 3.108+ and add 5718 B0, 5719 support (John Feeney) [567462]\n- [misc] move dev_name to device.h (John Feeney) [568551]\n- [misc] add WARN_ONCE macro (John Feeney) [568551]\n- [dma_v3] update I/O AT and DCA drivers (John Feeney) [568551]\n- [net] forcedeth: update to latest upstream for RHEL5.6 (Ivan Vecera) [628831]\n- [net] e1000e: update to upstream version 1.2.7-k2 (Andy Gospodarek) [566021]\n- [net] qla2xxx: fix display of link down state (Chad Dupuis) [627612]\n- [scsi] qla2xxx: rom lock recover if fw hangs holding lock (Chad Dupuis) [619814]\n- [scsi] qla2xxx: update AER support, do early abort cmds (Chad Dupuis) [619814]\n- [scsi] qla2xxx: add IS_QLA82XX check in update_fw_options (Chad Dupuis) [619814]\n- [scsi] qla2xxx: cover UNDERRUN case where SCSI status set (Chad Dupuis) [619814]\n- [scsi] qla2xxx: fix set fw hung and complete waiting mbx (Chad Dupuis) [619814]\n- [scsi] qla2xxx: fix seconds_since_last_heartbeat reset (Chad Dupuis) [619814]\n- [scsi] qla2xxx: correct extended sense-data handling (Chad Dupuis) [619814]\n- [scsi] qla2xxx: dont {s,g}et port MBC if invalid port id (Chad Dupuis) [619814]\n- [scsi] qla2xxx: stop firmware before doing init firmware (Chad Dupuis) [619814]\n- [xen] oprofile: force use of architectural perfmon (Don Dugger) [538564]\n- [xen] oprofile: support Intels arch perfmon registers (Don Dugger) [538564]\n- [xen] oprofile: add support for Core i7 and Atom (Don Dugger) [538564]\n\n[2.6.18-220.el5]\n- [block] cciss: version string to 3.6.22.RH1 (Tomas Henzl) [568830]\n- [block] cciss: bus_unregister_once not once per hba (Tomas Henzl) [568830]\n- [block] cciss: rename cciss_sector_size (Tomas Henzl) [568830]\n- [block] cciss: make log_unit_to_scsi3addr an inline (Tomas Henzl) [568830]\n- [block] cciss: fix enxio weirdness (Tomas Henzl) [568830]\n- [block] cciss: reorder functions (Tomas Henzl) [568830]\n- [block] cciss: fix raid level sysfs permissions (Tomas Henzl) [568830]\n- [block] cciss: make device attributes static (Tomas Henzl) [568830]\n- [block] cciss: make cciss_seq_show handle drv_array holes (Tomas Henzl) [568830]\n- [block] cciss: add via_ioctl param to rebuild_lun_table (Tomas Henzl) [568830]\n- [block] cciss: add support for multi-lun tape devices (Tomas Henzl) [568830]\n- [block] cciss: notify scsi midlayer of device changes (Tomas Henzl) [568830]\n- [block] cciss: fix scatter-gather on scsi side (Tomas Henzl) [568830]\n- [block] cciss: add more commands for tapes (Tomas Henzl) [568830]\n- [block] cciss: factor out scsi dma code (Tomas Henzl) [568830]\n- [block] cciss: eliminate unnecessary pointer use (Tomas Henzl) [568830]\n- [block] cciss: dont use void pointer for hba (Tomas Henzl) [568830]\n- [block] cciss: detect bad alignment (Tomas Henzl) [568830]\n- [block] cciss: factor out sg chain block mapping code (Tomas Henzl) [568830]\n- [block] cciss: fix DMA direction kludge (Tomas Henzl) [568830]\n- [block] cciss: simplify scatter gather code (Tomas Henzl) [568830]\n- [block] cciss: factor out scatter gather alloc and free (Tomas Henzl) [568830]\n- [block] cciss: enhanced scatter-gather support (Tomas Henzl) [568830]\n- [block] cciss: remove the scan thread (Tomas Henzl) [568830]\n- [block] cciss: fix scsi status typo (Tomas Henzl) [568830]\n- [block] cciss: remove sendcmd (Tomas Henzl) [568830]\n- [block] cciss: clean up code in cciss_shutdown (Tomas Henzl) [568830]\n- [block] cciss: retry driver cmds with unit attention cond (Tomas Henzl) [568830]\n- [block] cciss: no pci_release_regions on regions not held (Tomas Henzl) [568830]\n- [block] cciss: fix memory leak in cciss_init_one (Tomas Henzl) [568830]\n- [block] cciss: dynamically allocate drive info struct (Tomas Henzl) [568830]\n- [block] cciss: fix raid label related magic number (Tomas Henzl) [568830]\n- [block] cciss: no check busy initializing in cciss open (Tomas Henzl) [568830]\n- [block] cciss: add usage_count attribute to logical drive (Tomas Henzl) [568830]\n- [block] cciss: add raid_level attribute to logical drives (Tomas Henzl) [568830]\n- [block] cciss: add lunid attribute to log drives in /sys (Tomas Henzl) [568830]\n- [block] cciss: dont call putdisk excessively (Tomas Henzl) [568830]\n- [block] cciss: zero out drive info on removal (Tomas Henzl) [568830]\n- [block] cciss: handle special case for /dev/cciss/c0d0 (Tomas Henzl) [568830]\n- [block] cciss: handle cases when cciss_add_disk fails (Tomas Henzl) [568830]\n- [block] cciss: fix and rearrange logical drive sysfs code (Tomas Henzl) [568830]\n- [block] cciss: dynamic allocate struct device for logical (Tomas Henzl) [568830]\n- [block] cciss: Use helper functions to access drive_data (Tomas Henzl) [568830]\n- [block] cciss: remove withirq parameter where possible (Tomas Henzl) [568830]\n- [block] cciss: remove sysfs entries during driver cleanup (Tomas Henzl) [568830]\n- [block] cciss: add cciss_sysfs_stat_inquiry function (Tomas Henzl) [568830]\n- [block] cciss: add CTLR_LUNID define (Tomas Henzl) [568830]\n- [block] cciss: Remove unused was_only_controller_node (Tomas Henzl) [568830]\n- [block] cciss: fix problem with LUN addressing (Tomas Henzl) [568830]\n- [block] cciss: fix problem with SG_IO completions (Tomas Henzl) [568830]\n- [block] cciss: retry commands from within sendcmd_withirq (Tomas Henzl) [568830]\n- [block] cciss: change SCSI error handling code (Tomas Henzl) [568830]\n- [block] cciss: remove sendcmd reject processing (Tomas Henzl) [568830]\n- [block] cciss: let scsi error handling work w/interrupts (Tomas Henzl) [568830]\n- [block] cciss: factor out error processing code (Tomas Henzl) [568830]\n- [block] cciss: factor out target status code (Tomas Henzl) [568830]\n- [block] cciss: simplify device addressing methods (Tomas Henzl) [568830]\n- [block] cciss: factor out sendcmd_withirq core (Tomas Henzl) [568830]\n- [block] cciss: use uninterruptible timeout when waiting (Tomas Henzl) [568830]\n- [block] cciss: fix lun reset code (Tomas Henzl) [568830]\n- [block] cciss: factor out sendcmd core for sane interface (Tomas Henzl) [568830]\n- [block] cciss: remove double setting of h->busy (Tomas Henzl) [568830]\n- [block] cciss: disable scan thread, it prevents rmmod (Tomas Henzl) [568830]\n- [net] netxen: fix inconsistent lock state (Chad Dupuis) [562937]\n- [net] netxen: protect tx timeout recovery by rtnl lock (Chad Dupuis) [562937]\n- [net] netxen: fix for kdump (Chad Dupuis) [562937]\n- [net] netxen: fix caching window register (Chad Dupuis) [562937]\n- [net] netxen: fix rcv buffer leak (Chad Dupuis) [562937]\n- [net] netxen: fix memory leaks in error path (Chad Dupuis) [562937]\n- [net] netxen: remove unnecessary returns (Chad Dupuis) [562937]\n- [net] netxen: handle queue manager access (Chad Dupuis) [562937]\n- [net] netxen: to fix onchip memory access. (Chad Dupuis) [562937]\n- [net] netxen: remove unnecessary size checks (Chad Dupuis) [562937]\n- [net] netxen: fix register usage (Chad Dupuis) [562937]\n- [net] netxen: fix deadlock in aer (Chad Dupuis) [562937]\n- [net] netxen: fix interrupt for NX2031 (Chad Dupuis) [562937]\n- [net] netxen: fix fw load from file (Chad Dupuis) [562937]\n- [net] netxen: validate unified romimage (Chad Dupuis) [562937]\n- [net] netxen: fix corner cases of firmware recovery (Chad Dupuis) [562937]\n- [net] netxen: update version to 4.0.73 (Chad Dupuis) [562937]\n- [net] netxen: fix tx csum status (Chad Dupuis) [562937]\n- [net] netxen: added sanity check for pci map (Chad Dupuis) [562937]\n- [net] netxen: fix warning in ioaddr for NX3031 chip (Chad Dupuis) [562937]\n- [net] netxen: fix bios version calculation (Chad Dupuis) [562937]\n- [net] netxen: disable on NX_P3_B1 hardware (Chad Dupuis) [562937]\n- [net] netxen: protect resource cleanup by rtnl lock (Chad Dupuis) [562937]\n- [net] netxen: fix tx timeout recovery for NX2031 chip (Chad Dupuis) [562937]\n- [net] netxen: fix sparse warning (Chad Dupuis) [562937]\n- [net] netxen: fix license header (Chad Dupuis) [562937]\n- [net] netxen: fix endianness intr coalesce (Chad Dupuis) [562937]\n- [net] netxen: fix endianness read mac address (Chad Dupuis) [562937]\n- [net] netxen: use DEFINE_PCI_DEVICE_TABLE() (Chad Dupuis) [562937]\n- [net] netxen: update version to 4.0.72 (Chad Dupuis) [562937]\n- [net] netxen: fix set mac addr (Chad Dupuis) [562937]\n- [net] netxen: fix smatch warning (Chad Dupuis) [562937]\n- [net] netxen: fix tx ring memory leak (Chad Dupuis) [562937]\n- [net] netxen: fix ethtool link test (Chad Dupuis) [562937]\n- [net] netxen: move && and || to end of previous line (Chad Dupuis) [562937]\n- [net] netxen: fix ethtool register dump (Chad Dupuis) [562937]\n- [net] netxen: fix unified fw size check (Chad Dupuis) [562937]\n- [net] netxen: support pci error handlers (Chad Dupuis) [562937]\n- [net] netxen: fix tx timeout recovery (Chad Dupuis) [562937]\n- [net] netxen: minor suspend resume fixes (Chad Dupuis) [562937]\n- [net] netxen: use module parameter correctly (Chad Dupuis) [562937]\n- [net] netxen: fix firmware type check (Chad Dupuis) [562937]\n- [net] netxen: fix napi intr enable check (Chad Dupuis) [562937]\n- [net] netxen: protect device reset by rtnl_lock (Chad Dupuis) [562937]\n- [net] netxen: fix failure cases for fw hang recovery (Chad Dupuis) [562937]\n- [net] netxen: fix debug tools access for NX2031 (Chad Dupuis) [562937]\n- [misc] clone: fix race between copy_process and de_thread (Jiri Olsa) [590864]\n- [s390] dasd: let recovery cqr get flags from failed cqr (Hendrik Brueckner) [628838]\n- [net] ipv4: fix leak, rcu and length in route cache gc (Thomas Graf) [541224]\n- [net] tcp: zero out rx_opt in tcp_disconnect (Thomas Graf) [539560]\n- [net] ipv6: Update Neighbor Cache when IPv6 RA received (Thomas Graf) [560870]\n- [net] ipv6: Plug sk_buff leak in ipv6_rcv (Thomas Graf) [574913]\n- [redhat] configs: enable building k10temp sensor driver (Michal Schmidt) [443745]\n- [hwmon] add k10temp sensor driver (Michal Schmidt) [443745]\n- [pci] add AMD 10h, 11h PCI IDs to pci_ids.h (Michal Schmidt) [443745]\n- [net] vxge: fix multicast issues (Michal Schmidt) [608598]\n- [net] vxge: show startup message with KERN_INFO (Michal Schmidt) [608598]\n- [net] vxge: fix memory leak in vxge_alloc_msix error path (Michal Schmidt) [608598]\n- [net] vxge: fix checkstack warning in vxge_probe (Michal Schmidt) [608598]\n- [net] vxge: remove unnecessary returns from void functs (Michal Schmidt) [608598]\n- [net] vxge: version update (Michal Schmidt) [608598]\n- [net] vxge: pass correct number of VFs value to sriov (Michal Schmidt) [608598]\n- [net] vxge: allow load for all enumerated pci functions (Michal Schmidt) [608598]\n- [net] vxge: fix possible memory leak in device init (Michal Schmidt) [608598]\n- [net] vxge: add missing vlan_rx_kill_vid method (Michal Schmidt) [594404 608598]\n- [net] vxge: remove trailing space in messages (Michal Schmidt) [608598]\n- [net] vxge: use pci_dma_mapping_error to test return val (Michal Schmidt) [608598]\n- [net] vxge: use DEFINE_PCI_DEVICE_TABLE (Michal Schmidt) [608598]\n- [net] vxge: use DMA_BIT_MASK instead of plain values (Michal Schmidt) [608598]\n- [net] vxge: move && and || to end of previous line (Michal Schmidt) [608598]\n- [net] bnx2x: fix wrong return from bnx2x_trylock_hw_lock (Michal Schmidt) [572012]\n- [net] bnx2x: small fix in stats handling (Michal Schmidt) [572012]\n- [net] bnx2x: update bnx2x version to 1.52.53-4 (Michal Schmidt) [572012]\n- [net] bnx2x: fix PHY locking problem (Michal Schmidt) [572012]\n- [net] bnx2x: adjust confusing if indentation (Michal Schmidt) [572012]\n- [net] bnx2x: load firmware in open instead of probe (Michal Schmidt) [572012]\n- [net] bnx2x: fix net/ip6_checksum.h include (Michal Schmidt) [572012]\n- [net] bnx2x: update driver version to 1.52.53-3 (Michal Schmidt) [572012]\n- [net] bnx2x: move statistics handling code to own files (Michal Schmidt) [572012]\n- [net] bnx2x: create separate file for ethtool routines (Michal Schmidt) [572012]\n- [net] bnx2x: create bnx2x_cmn.* files (Michal Schmidt) [572012]\n- [net] bnx2x: main netdev does not need ->poll, ->weight (Michal Schmidt) [572012]\n- [net] bnx2x: move global variable load_count to bnx2x.h (Michal Schmidt) [572012]\n- [net] bnx2x: store module parameters in main structure (Michal Schmidt) [572012]\n- [net] bnx2x: create separate folder for bnx2x driver (Michal Schmidt) [572012]\n- [net] bnx2x: set RXHASH for LRO packets (Michal Schmidt) [572012]\n- [net] bnx2x: return -EINVAL for unsupported flags (Michal Schmidt) [572012]\n- [net] bnx2x: fail when trying to setup unsupported features (Michal Schmidt) [572012]\n- [net] bnx2x: fix link problem with some DACs (Michal Schmidt) [572012]\n- [net] bnx2x: protect a SM state change (Michal Schmidt) [572012]\n- [net] bnx2x: avoid TX timeout when stopping device (Michal Schmidt) [572012]\n- [net] bnx2x: fix check to get RX hash (Michal Schmidt) [572012]\n- [net] bnx2x: remove two unneeded prefetch calls (Michal Schmidt) [572012]\n- [net] bnx2x: add support for receive hashing (Michal Schmidt) [572012]\n- [net] bnx2x: update date and version to 1.52.53-1 (Michal Schmidt) [572012]\n- [net] bnx2x: dont report link down if already down (Michal Schmidt) [572012]\n- [net] bnx2x: rework power state handling code (Michal Schmidt) [572012]\n- [net] bnx2x: use register mask to avoid parity error (Michal Schmidt) [572012]\n- [net] bnx2x: fix MSI-X enabling flow (Michal Schmidt) [572012]\n- [net] bnx2x: add new statistics (Michal Schmidt) [572012]\n- [net] bnx2x: white space and formatting fixups (Michal Schmidt) [572012]\n- [net] bnx2x: protect code with NOMCP (Michal Schmidt) [572012]\n- [net] bnx2x: increase DMAE max write size for 57711 (Michal Schmidt) [572012]\n- [net] bnx2x: add skeleton VPD firmware version read code (Michal Schmidt) [572012]\n- [net] bnx2x: parity error handling for 57710 and 57711 (Michal Schmidt) [572012]\n- [net] bnx2x: use DEFINE_PCI_DEVICE_TABLE() (Michal Schmidt) [572012]\n- [net] bnx2x: move && and || to end of previous line (Michal Schmidt) [572012]\n- [net] bnx2x: remove trailing space in messages (Michal Schmidt) [572012]\n- [net] bnx2x: clean up debug prints (Michal Schmidt) [572012]\n- [net] bnx2x: use macro for phy address (Michal Schmidt) [572012]\n- [net] bnx2x: convert more to %pM (Michal Schmidt) [572012]\n- [net] bnx2x: use pci_ioremap_bar (Michal Schmidt) [572012]\n- [net] bnx2x: make NAPI poll routine closer to upstream (Michal Schmidt) [572012]\n- [net] bnx2x: typo fixes (Michal Schmidt) [572012]\nmacro helpers (Michal Schmidt) [572012]\n- [net] bnx2x: use DMA_BIT_MASK(64) over DMA_64BIT_MASK (Michal Schmidt) [572012]\n- [net] sfc: update to upstream version 2.6.36-rc1 code (Michal Schmidt) [556476]\n- [net] sfc: undo now unnecessary RHEL workqueue changes (Michal Schmidt) [556476]\n- [net] netdevice: add netdev_for_each_mc_addr (Michal Schmidt) [556476]\n- [misc] add round_jiffies_up and related routines (Michal Schmidt) [556476]\n- [net] core: bug fix for vlan + gro issue (Michal Schmidt) [556476]\n- [net] vlan/bridge: fix skb_pull_rcsum fatal exception (Michal Schmidt) [556476]\n- [fs] proc: add file position and flags info in /proc (Jerome Marchand) [498081]\n- [net] e100*/igb*/ixgb*: add missing read memory barrier (Andy Gospodarek) [629761]\n- [net] igb/igbvf: turn on TSO for VLAN interfaces (Andy Gospodarek) [629457]\n- [net] vlan: control vlan device TSO status with ethtool (Andy Gospodarek) [629457]\n- [xen] vtd: fix parameter iommu=no-intremap (Paolo Bonzini) [576478]\n\n[2.6.18-219.el5]\n- [net] udp: fix bogus UFO packet generation (Jarod Wilson) [632266]\n- [virt] xen: fix xennet driver to not corrupt data (Neil Horman) [630129]\n- [virt] fix 64-bit compile issue in VMWare TSC update (Prarit Bhargava) [538022]\n\n[2.6.18-218.el5]\n- [net] tcp: prevent sending past receiver window with TSO (Thomas Graf) [494400]\n- [misc] netdevice: add printk helpers for net drivers (Michal Schmidt) [629634]\n- [misc] drivers: remove private definitions of pr_* macros (Michal Schmidt) [629634]\n- [misc] kernel: add pr_* family of printk helper macros (Michal Schmidt) [629634]\n- [infiniband] iw_cxgb3: always define states[] (Michal Schmidt) [629634]\n- [net] ifb: fix syntax error in pr_debug usage (Michal Schmidt) [629634]\n- [net] tg3: disable PME bit during resume (John Feeney) [598530]\n- [net] netfilter: fix crashes caused by fragment jumps (Jiri Pirko) [617268]\n- [virt] update VMWare TSC code (Prarit Bhargava) [538022]\n\n[2.6.18-217.el5]\n- [time] implement fine grained accounting for PM timer (Ulrich Obergfell) [586285]\n- [time] initialize tick_nsec based on kernel parameters (Ulrich Obergfell) [586285]\n- [time] introduce 'pmtimer_fine_grained' kernel parameter (Ulrich Obergfell) [586285]\n- [scsi] ibmvfc: Fix terminate_rport_io (Steve Best) [628615]\n- [fs] ext3: flush disk caches on fsync when needed (Eric Sandeen) [592961]\n- [fs] ext4: move aio completion after unwritten extent con (Eric Sandeen) [617690]\n- [fs] xfs: move aio completion after unwritten extent conv (Eric Sandeen) [617690]\n- [fs] direct-io: move aio_complete into ->end_io (Eric Sandeen) [617690]\n- [fs] ext4: quota updates for RHEL5.6 (Eric Sandeen) [457153]\n- [fs] ext4: quota infrastructure updates for RHEL5.6 (Eric Sandeen) [457153]\n- [fs] ext4: core updates for RHEL5.6 (Eric Sandeen) [457153]\n- [fs] ext4: add new kernel helpers for RHEL5.6 (Eric Sandeen) [457153]\n- [infiniband] sync iser driver with upstream for RHEL5.6 (Mike Christie) [623595]\n- [net] cxgb3: dont flush workqueue if called from wq (Doug Ledford) [630124]\n- [net] cxgb3: get fatal parity error status on interrupt (Doug Ledford) [630124]\n- [net] cxgb3: clear fatal parity error register on init (Doug Ledford) [630124]\n- [net] cxgb3: add define for fatal parity error bit (Doug Ledford) [630124]\n- [net] qlge: update driver version to 1.00.00.25 (Chad Dupuis) [567402]\n- [net] qlge: fix a eeh handler to not add a pending timer (Chad Dupuis) [567402]\n- [net] qlge: update driver version to 1.00.00.24 (Chad Dupuis) [567402]\n- [net] qlge: remove error pkt flags, enable net csum error (Chad Dupuis) [567402]\n- [net] qlge: restore promiscuous setting in ql_adapter_up (Chad Dupuis) [567402]\n- [net] qlge: change cpu_to_be16 to htons for udp checksum (Chad Dupuis) [567402]\n- [net] qlge: remove firmware dependency for MPI coredump (Chad Dupuis) [567402]\n- [net] qlge: adding ndev->last_rx = jiffies (Chad Dupuis) [567402]\n- [net] qlge: fix pktgen issue reported by Cisco (Chad Dupuis) [567402]\n- [virtio] fix balloon without VIRTIO_BALLOON_F_STATS_VQ (Amit Shah) [601692]\n- [virtio] fix sched while atomic in virtio_balloon stats (Amit Shah) [601692]\n- [virtio] add memory stat reporting to balloon driver (Amit Shah) [601692]\n\n[2.6.18-216.el5]\n- [net] hashlimit: check allocation before freeing memory (Wade Mealing) [615229]\n- [net] clusterip: check allocation before freeing memory (Wade Mealing) [615227]\n- [ia64] mca: save I-resources when INIT is sent (Takao Indoh) [471136]\n- [scsi] mpt2sas: update to 05.101.00.02 (Tomas Henzl) [568281]\n- [scsi] ipr: bump the version number and date (Steve Best) [626566]\n- [scsi] ipr: fix resource type update and add attributes (Steve Best) [626566]\n- [scsi] ipr: fix transition to operational on new adapters (Steve Best) [626566]\n- [scsi] ipr: change endian swap key for hw spec change (Steve Best) [626566]\n- [scsi] ipr: add support for Obsidian-E embedded adapter (Steve Best) [626566]\n- [scsi] ipr: add MMIO write for BIST on 64-bit adapters (Steve Best) [626566]\n- [scsi] ipr: move setting of allow_restart flag (Steve Best) [626566]\n- [scsi] ipr: add writeq definition if needed (Steve Best) [626566]\n- [scsi] ipr: add endian swap enable for 64-bit adapters (Steve Best) [626566]\n- [scsi] ipr: fix resource path display and formatting (Steve Best) [626566]\n- [scsi] ipr: improve interrupt service routine performance (Steve Best) [626566]\n- [scsi] ipr: set data list length in request control block (Steve Best) [626566]\n- [scsi] ipr: fix register read address on 64-bit adapters (Steve Best) [626566]\n- [scsi] ipr: add resource path to IOA status area struct (Steve Best) [626566]\n- [scsi] ipr: implement fixes for 64-bit adapter support (Steve Best) [626566]\n- [scsi] ipr: fix compile warning (Steve Best) [626566]\n- [fs] ext4: allocate ->s_blockgroup_lock separately (Eric Sandeen) [614957]\n- [pci] xen: disable broken msi/msix on ia64 xen (Radim Krcmar) [518463]\n- [misc] fix non-CONFIG_NUMA x86_64 compile (Prarit Bhargava) [583673]\n- [pnp] ignore both UNSET and DISABLED ioresources (Prarit Bhargava) [560540]\n- [pnp] reserve system board iomem and ioport resources (Prarit Bhargava) [560540]\n- [net] ipv4: add IP_NODEFRAG option for IPv4 socket (Jiri Olsa) [562220]\n- [nfs] sunrpc: cancel task_cleanup work in xprt_destroy (Jeff Layton) [611938]\n- [fs] nfs: fix file create failure with HPUX client (Jeff Layton) [605720]\n- [net] ixgbe: update to upstream version 2.0.84-k2 (Andy Gospodarek) [568602]\n- [net] vlan: add VLAN bitfield defines (Andy Gospodarek) [566027]\n- [net] igb: actually support self_test ethtool command (Andy Gospodarek) [593862]\n- [net] ixgbe: actually support self_test ethtool command (Andy Gospodarek) [593862]\n- [net] ixgbevf: update to version 1.0.0-k1 (Andy Gospodarek) [566027]\n- [net] bonding: fix ALB mode to balance traffic on VLANs (Andy Gospodarek) [578531]\n- [net] igb: do register dump just before resetting adapter (Andy Gospodarek) [568602]\n- [kernel] nmi_watchdog: output count during check on boot (Don Zickus) [613667]\n- [misc] nmi: fix bogus nmi watchdog stuck messages (Don Zickus) [455323]\n- [virt] nmi: dont print NMI stuck messages on guests (Don Zickus) [455323]\n- [misc] nmi_watchdog: add /proc/sys/kernel/nmi_watchdog (Don Zickus) [455323]\n- [misc] scripts: use system python instead of env (Don Zickus) [521878]\n- [pci] sr-iov: fix broken resource alignment calculations (Don Dutile) [523341]\n- [pci] clean up resource alignment management (Don Dutile) [523341]\n- [pci] sr-iov: assign pci resources earlier (Don Dutile) [523341]\n- [net] vxge: update version to reflect RHEL5.6 changes (Bob Picco) [580413]\n- [net] vxge: set func_id 0 as privileged for normal func (Bob Picco) [580413]\n- [net] vxge: fix MSIX interrupt configuration (Bob Picco) [580413]\n- [net] vxge: fix ethtool -d output (Bob Picco) [580413]\n- [net] vxge: align tmemory only if misaligned (Bob Picco) [580413]\n- [net] vxge: fix hw buffer starvation from short packets (Bob Picco) [580413]\n- [net] vxge: fix receive stall w/ driver/chip out-of-sync (Bob Picco) [580413]\n- [cpufreq] add APERF/MPERF support for AMD processors (Bhavna Sarathy) [621335]\n- [xen] vmx: fix handling of FS/GS base MSRs (Michal Novotny) [613187]\n- [xen] hv: improve backtrace support on ia64 (Andrew Jones) [499553]\n- [xen] support new AMD family 0x15 CPU and NB hardware (Bhavna Sarathy) [619092]\n- [xen] allow dom0 to control core performance boost (Bhavna Sarathy) [568771]\n- [xen] add support for dom0 to access APERF/MPERF for AMD (Bhavna Sarathy) [568772]\n\n[2.6.18-215.el5]\n- [sound] ALSA HDA driver update for RHEL5.6 (Jaroslav Kysela) [592199]\n- [net] igbvf: update to latest upstream for RHEL5.6 (Stefan Assmann) [566028]\n- [net] igb: update igb driver to support Portville ACS (Stefan Assmann) [566024]\n- [net] igb: fix error in igb AER code (Stefan Assmann) [612212]\n- [ata] libata: fix suspend/resume for ATA SEMB devices (David Milburn) [622559]\n- [ata] sata_mv: msi masking fix (David Milburn) [554872]\n- [ata] sata_mv: Properly initialize main irq mask (David Milburn) [554872]\n- [ata] sata_mv: remove bogus nsect restriction (David Milburn) [554872]\n- [ata] sata_mv: dont read hc_irq_cause (David Milburn) [554872]\n- [ata] sata_mv: add the Gen IIE flag to the SoC devices (David Milburn) [554872]\n- [ata] sata_mv: dont issue two DMA commands concurrently (David Milburn) [554872]\n- [ata] sata_mv: safer logic for limit warnings (David Milburn) [554872]\n- [ata] sata_mv: warn on PIO with multiple DRQs (David Milburn) [554872]\n- [ata] sata_mv: enable async_notify for 60x1 Rev.C0 and up (David Milburn) [554872]\n- [s390] zfcp: Do not print bit mask as link speed (Hendrik Brueckner) [619857]\n- [s390] dasd: force online does not work (Hendrik Brueckner) [619466]\n- [s390] dasd: allocate fallback cqr for reserve/release (Hendrik Brueckner) [619465]\n- [s390] qeth: wait for finished recovery (Hendrik Brueckner) [619456]\n- [s390] qeth: avoid loop if ipa command response missing (Hendrik Brueckner) [619451]\n- [s390] zfcp: no force close when port is already closed (Hendrik Brueckner) [612263]\n- [s390] zfcp: Do not unblock rport from REOPEN_PORT_FORCED (Hendrik Brueckner) [612266]\n- [s390] zfcp: Fail erp after timeout (Hendrik Brueckner) [612261]\n- [message] fusion: update to 3.4.15 (Tomas Henzl) [568292]\n- [net] ipv6: reroute packets after netfilter mangling (Thomas Graf) [517327]\n- [scsi] lpfc: update driver from 8.2.0.76.1p to 8.2.0.77 (Rob Evers) [603806]\n- [virt] xenbus: avoid deadlock unregistering xenbus watch (Paolo Bonzini) [429102]\n- [ia64] kdump: prevent hang on INIT interrupt during boot (Neil Horman) [506694]\n- [net] qla3xxx: fix oops on too-long netdev priv structure (Neil Horman) [620508]\n- [kprobes] kretprobe: set status to fix fault handling (Josh Stone) [615121]\n- [net] bonding: fix a race in calls to slave MII ioctls (Flavio Leitner) [621280]\n- [virt] xen-kernel: improve backtrace support on ia64 (Andrew Jones) [499553]\n- [acpi] thinkpad-acpi: lock down video output state access (Don Howard) [607037]\n- [fs] xfs: fix untrusted inode number lookup (Dave Chinner) [624862]\n\n[2.6.18-214.el5]\n- [mm] accept an abutting stack segment (Jiri Pirko) [607858] {CVE-2010-2240}\n- [fs] fix dcache accounting bug (Josef Bacik) [596548]\n- [scsi] mptsas: enable TLR for SSP TAPE drives (Tomas Henzl) [599420]\n- [scsi] sas: add transport layer retry support (Tomas Henzl) [599420]\n- [scsi] fix potential kmalloc failure in scsi_get_vpd_page (Tomas Henzl) [599420]\n- [scsi] fix bugs in scsi_vpd_inquiry (Tomas Henzl) [599420]\n- [scsi] add VPD helper (Tomas Henzl) [599420]\n- [x86_64] implement vDSO randomization (Danny Feng) [459763]\n- [virt] xen: dont adjust time for ntp clock slowing (Bretislav Kabele) [553407]\n- [net] ibmveth: fix lost IRQ that leads to service loss (Steve Best) [626841]\n- [scsi] cxgb3i: sync driver with upstream for RHEL5.6 (Mike Christie) [567444]\n- [net] sched: fix some kernel memory leaks (Jiri Pirko) [624638] {CVE-2010-2942}\n- [tpm] autoload tpm_tis driver (John Feeney) [530123]\n- [usb] fix usbfs information leak (Eugene Teo) [566629] {CVE-2010-1083}\n- [virtio] console: Backport driver for RHEL 5.6 (Amit Shah) [620037]\n- [virtio] add virtqueue_ vq_ops wrappers (Amit Shah) [620037]\n- [virtio] initialize vq->data entries to NULL (Amit Shah) [620037]\n- [virtio] add ability to detach unused buffers from vrings (Amit Shah) [620037]\n- [virtio] make add_buf return capacity remaining (Amit Shah) [620037]\n- [virtio] find_vqs/del_vqs virtio operations (Amit Shah) [620037]\n- [virtio] add names to virtqueue struct (Amit Shah) [620037]\n- [virtio] more neatening of virtio_ring macros (Amit Shah) [620037]\n- [virtio] fix BAD_RING, START_US and END_USE macros (Amit Shah) [620037]\n\n[2.6.18-213.el5]\n- [mm] pass correct mm when growing stack (Jiri Pirko) [607858] {CVE-2010-2240}\n- [mm] fix up some user-visible effects of stack guard page (Jiri Pirko) [607858] {CVE-2010-2240}\n- [mm] fix page table unmap for stack guard page properly (Jiri Pirko) [607858] {CVE-2010-2240}\n- [mm] fix missing unmap for stack guard page failure case (Jiri Pirko) [607858] {CVE-2010-2240}\n- [mm] keep a guard page below a grow-down stack segment (Jiri Pirko) [607858] {CVE-2010-2240}\n- [net] tcp: fix div by zero in congestion control protos (Neil Horman) [608641]\n- [net] tcp: tcp_vegas ssthresh bug fix (Thomas Graf) [612709]\n- [net] tcp: tcp_vegas cong avoid fix (Thomas Graf) [612709]\n- [net] tcp: fix overflow bug in Vegas (Thomas Graf) [612709]\n- [net] tcp: fix Vegas bug in disabling slow start (Thomas Graf) [612709]\n- [net] tcp: increase Vegas default alpha and beta params (Thomas Graf) [612709]\n- [net] tcp: tcp_hybla zero congestion window growth fix (Thomas Graf) [612709]\n- [net] tcp: htcp last_cong bug fix (Thomas Graf) [612709]\n- [net] tcp: TCP cubic v2.2 (Thomas Graf) [612709]\n- [net] tcp: faster cube root (Thomas Graf) [612709]\n- [net] tcp: backport cubic update for net-2.6.22 (Thomas Graf) [612709]\n- [net] tcp: set Cubic and BIC default thresholds to zero (Thomas Graf) [612709]\n- [net] tcp: congestion control initialization (Thomas Graf) [612709]\n- [net] tcp: uninline tcp_is_cwnd_limited (Thomas Graf) [612709]\n- [net] tcp: move prior_in_flight collect to better spot (Thomas Graf) [612709]\n- [fs] ext4: consolidate in_range definitions (Eric Sandeen) [624332] {CVE-2010-3015}\n- [net] dont double count UDP_INERRORS (Neil Horman) [618818]\n- [scsi] be2iscsi: sync with upstream for RHEL5.6 (Mike Christie) [569643]\n- [mmc] sdhci: fix system cannot enter S4 with SD card (Matthew Garrett) [606899]\n- [cpufreq] powernow-k8: support AMD Core Performance Boost (Matthew Garrett) [568751]\n- [fs] cifs: remove force parm from cifs_unix_info_to_inode (Jeff Layton) [619112]\n- [fs] nfs: fix NFS4ERR_FILE_OPEN handling in Linux/NFS (Jeff Layton) [604044]\n- [usb] fix test of wrong variable in create_by_name (Don Howard) [594635]\n- [s390] cio: fix cause of unexpected recovery actions (Hendrik Brueckner) [621330]\n\n[2.6.18-212.el5]\n- [ipmi] add parameter to limit CPU usage in kipmid (Takao Indoh) [494680]\n- [net] bnx2x: Added GRO support (Stanislaw Gruszka) [573114]\n- [net] bnx2x: fix memory barriers (Stanislaw Gruszka) [569370]\n- [ppc] partition hibernation support (Steve Best) [565570]\n- [ppc] Add resume handler to powerpc time management code (Steve Best) [565570]\n- [scsi] ibmvscsi: Fix soft lockup on resume (Steve Best) [565570]\n- [scsi] ibmvfc: Fix soft lockup on resume (Steve Best) [565570]\n- [scsi] ibmvfc: Add suspend/resume support (Steve Best) [565570]\n- [scsi] ibmvscsi: Add suspend/resume support (Steve Best) [565570]\n- [net] ibmveth: Add suspend/resume support (Steve Best) [565570]\n- [ppc] vio: add power management support (Steve Best) [565570]\n- [ppc] add hooks to put CPU in appropriate offline state (Steve Best) [565570]\n- [virt] xen: fix passthrough of SR-IOV VF (Paolo Bonzini) [582886]\n- [mm] add option to skip ZERO_PAGE mmap of /dev/zero (Larry Woodman) [619541]\n- [net] bonding: check if clients MAC addr has changed (Flavio Leitner) [610234]\n- [virt] xen: fix pud_present compile warnings (Don Zickus) [590760]\n- [xen] CPU synchronization during MTRR register update (Don Dugger) [594546]\n\n[2.6.18-211.el5]\n- [pci] fix remove of proc entry for hotplug devices (Wade Mealing) [618114]\n- [ide]: atiixp: no pio autotune on AMD Hudson2 (Prarit Bhargava) [618075]\n- [pci] msi: add option for lockless interrupt mode (Prarit Bhargava) [599295]\n- [virt] xenbus: implement O_NONBLOCK (Paolo Bonzini) [470801]\n- [net] ip4v/tcp: no additional reset on closed sockets (Neil Horman) [605259]\n- [misc] xen: fix migration using xen-vnif in smp hvm guest (Miroslav Rezanina) [555910]\n- [edac] fix i7core_edac in multi-socket systems (Mauro Carvalho Chehab) [468877]\n- [net] arp_tables: fix unaligned accesses (Jiri Pirko) [582268]\n- [fs] ext3: handle journal_start failure properly (Josef Bacik) [588599]\n- [misc] handle dead hung uninterruptible tasks correctly (Jerome Marchand) [582237]\n- [fs] ecryptfs: fix ecryptfs_uid_hash buffer overflow (Jerome Marchand) [611387] {CVE-2010-2492}\n- [infiniband] check local reserved ports (Jerome Marchand) [557884]\n- [infiniband] randomize local port allocation (Jerome Marchand) [557884]\n- [net] reserve ports for apps using fixed port numbers (Jerome Marchand) [557884]\n- [kernel] sysctl: add proc_do_large_bitmap (Jerome Marchand) [557884]\n- [scsi] lpfc: use kernel-provided random32 (Jarod Wilson) [605816]\n- [lib] make tausworthe random32 generator available to all (Jarod Wilson) [605816]\n- [net] be2net: increase POST timeout for EEH recovery (Ivan Vecera) [616512]\n- [hwmon] coretemp: get TjMax value from MSR (Dean Nelson) [580699]\n- [hwmon] coretemp: detect the thermal sensors by CPUID (Dean Nelson) [580699]\n- [fs] xfs: rename XFS_IGET_BULKSTAT to XFS_IGET_UNTRUSTED (Dave Chinner) [607032]\n- [fs] xfs: validate untrusted inode numbers during lookup (Dave Chinner) [607032]\n- [fs] xfs: always use iget in bulkstat (Dave Chinner) [607032]\n- [s390] qeth: support for OSA CHPID types OSX and OSM (Hendrik Brueckner) [599644]\n- [s390] qeth: dont allow layer switch with open interface (Hendrik Brueckner) [612195]\n- [s390] zfcp: fix reference counting on adisc (Hendrik Brueckner) [610089]\n- [s390] kernel: initrd vs bootmem bitmap (Hendrik Brueckner) [610837]\n- [s390] hypfs: fix high cpu time output (Hendrik Brueckner) [589282]\n- [s390] dasd: fix race between tasklet and dasd_sleep_on (Hendrik Brueckner) [593756]\n- [s390] cmm: fix module unload handling (Hendrik Brueckner) [598549]\n- [fs] gfs: clean up stuffed file data copy handling (Abhijith Das) [580867]\n\n[2.6.18-210.el5]\n- [scsi] ips driver sleeps while holding spin_lock (Steve Best) [616961]\n- [net] fix lockups and dupe addresses w/bonding and ipv6 (Shyam Iyer) [516985]\n- [scsi] megaraid_sas: update driver to version 4.31 (Tomas Henzl) [564249]\n- [scsi] megaraid_sas: update driver to version 4.27 (Rob Evers) [564249]\n- [net] nat: avoid rerouting packets if only key changed (Jiri Pirko) [566144]\n- [fs] cifs: remove bogus check in NTLM session setup code (Jeff Layton) [479418]\n- [ata] ahci: add em_buffer attribute for AHCI hosts (David Milburn) [568364]\n- [scsi] qla4xxx: add support for ISP82XX (Chad Dupuis) [546592]\n- [scsi] qla4xxx: Fixes from upstream for 5.6 (Chad Dupuis) [546592]\n- [scsi] qla2xxx: more upstream updates for RHEL 5.6 (Chad Dupuis) [567428]\n- [scsi] qla2xxx: add support for ISP82XX (Chad Dupuis) [567428]\n- [scsi] qla2xxx: more updates from upstream for RHEL 5.6 (Chad Dupuis) [567428]\n- [scsi] qla2xxx: update to 8.03.01.05.05.06-k (Chad Dupuis) [567428]\n- [xen] correct bitsize calculation for 32-on-64 (Andrew Jones) [616827]\n\n[2.6.18-209.el5]\n- [net] r8169: fix for broken register writes (Ivan Vecera) [581654]\n- [serial] remove contact info for ite887x chip support (Dean Nelson) [563271]\n- [serial] fix modpost warning in ite887x driver (Dean Nelson) [563271]\n- [serial] add support for ite887x chips (Dean Nelson) [563271]\n- [parport] increase ite887xs I/O port range (Dean Nelson) [563271]\n- [scsi] qla2xxx: update firmware to version 5.03.02 (Chad Dupuis) [578444 598946]\n- [fs] cifs: reject DNS upcall add_key req from userspace (Jeff Layton) [612171] {CVE-2010-2524}\n- [security] keys: new key flag for add_key from userspace (Jeff Layton) [612171] {CVE-2010-2524}\n\n[2.6.18-208.el5]\n- [fs] gfs2: fix rename causing kernel oops (Robert S Peterson) [602025]\n- [misc] io_apic: skip timer_irq_works check when on VMware (Prarit Bhargava) [575309]\n- [scsi] be2iscsi: fix for 64k data length sge (Mike Christie) [608801]\n- [mm] fix excessive memory reclaim from zones w/lots free (Larry Woodman) [604779]\n- [mm] properly release all hugepages on database shutdown (Larry Woodman) [593131]\n- [net] fix accept_local handling for dev with no xattrs (Jiri Olsa) [601370]\n- [fs] nfs: i_nlinks changes must set NFS_INO_INVALID_ATTR (Jeff Layton) [601800]\n- [fs] nfs: fix resolution in nfs_inode_attrs_need_update (Jeff Layton) [601800]\n- [fs] nfs: fix compiler warnings introduced recently (Jeff Layton) [601800]\n- [fs] nfs: fix attribute updates even more (Jeff Layton) [601800]\n- [fs] nfs: fix the NFS attribute update (Jeff Layton) [601800]\n- [fs] nfs: clean up inode handling functions (Jeff Layton) [601800]\n- [fs] nfs: nfs_refresh_inode should clear cache_validity (Jeff Layton) [601800]\n- [fs] nfs: use nfs_refresh_inode in __nfs_revalidate_inode (Jeff Layton) [601800]\n- [ata] ahci, pata_marvell: fixup competition for PATA port (David Milburn) [237372]\n- [net] qlcnic: Add QLCNIC to Kconfig and Makefile (Chad Dupuis) [562723]\n- [net] qlcnic: enable building driver module (Chad Dupuis) [562723]\n- [net] qlcnic: remove extra space from board names (Chad Dupuis) [562723]\n- [net] qlcnic: fix bios version check (Chad Dupuis) [562723]\n- [net] qlcnic: validate unified fw image (Chad Dupuis) [562723]\n- [net] qlcnic: fix multicast handling (Chad Dupuis) [562723]\n- [net] qlcnic: additional driver statistics. (Chad Dupuis) [562723]\n- [net] qlcnic: fix tx csum status (Chad Dupuis) [562723]\n- [net] qlcnic: add loopback diagnostic test (Chad Dupuis) [562723]\n- [net] qlcnic: add interrupt diagnostic test (Chad Dupuis) [562723]\n- [net] qlcnic: support LED blink for device identification (Chad Dupuis) [562723]\n- [net] qlcnic: protect resoruce cleanup by rtnl lock (Chad Dupuis) [562723]\n- [net] qlcnic: clear device reset state after fw recovery (Chad Dupuis) [562723]\n- [net] qlcnic: add ethernet identifier in board info (Chad Dupuis) [562723]\n- [net] qlcnic: use DEFINE_PCI_DEVICE_TABLE (Chad Dupuis) [562723]\n- [net] qlcnic: add Qlogic ethernet driver for CNA devices (Chad Dupuis) [562723]\n- Revert: [fs] cifs: reject DNS upcall add_key req from userspace (Jeff Layton) [612171] {CVE-2010-2524}\n- Revert: [security] keys: new key flag for add_key from userspace (Jeff Layton) [612171] {CVE-2010-2524}\n\n[2.6.18-207.el5]\n- [usb] uhci: fix oops in uhci_scan_schedule (Pete Zaitcev) [516851]\n- [wireless] rtl818x: use cancel_work_sync (Stanislaw Gruszka) [582191]\n- [wireless] iwlwifi: use cancel_work_sync (Stanislaw Gruszka) [582191]\n- [wireless] ath9k: use cancel_work_sync (Stanislaw Gruszka) [582191]\n- [wireless] rt2x00: use cancel_work_sync (Stanislaw Gruszka) [582191]\n- Revert: [wireless] rt2x00: fix work cancel race condition (Stanislaw Gruszka) [582191]\n- [wireless] use cancel_work_sync in mac80211 and core (Stanislaw Gruszka) [582191]\n- [misc] workqueue: add cancel_work_sync to include (Stanislaw Gruszka) [582191]\n- [net] igb: drop support for UDP hashing w/ RSS (Stefan Assmann) [613780]\n- [misc] signals: avoid unnecessary credentials check (Oleg Nesterov) [459901]\n- [acpi] tell platformthat we support fixed hw T-states (Matthew Garrett) [569590]\n- [edac] i7core_edac: Backport driver to RHEL5 (Mauro Carvalho Chehab) [468877]\n- [edac] i7core_edac: add driver for new Nehalem (Mauro Carvalho Chehab) [468877]\n- [x86_64] mce: fix misplaced 'continue' in mce.c (Mauro Carvalho Chehab) [468877]\n- [pci] Add a probing code that seeks for an specific bus (Mauro Carvalho Chehab) [468877]\n- [edac] add support for DDR3 at EDAC core (Mauro Carvalho Chehab) [468877]\n- [wireless] Kconfig: select WIRELESS_COMPAT as needed (John Linville) [583767]\n- [i386] oprofile: fix detection of Intel CPU family 6 (John Villalovos) [581919]\n- [misc] intel: support for Intel Cougar Point Chipset (John Villalovos) [566854]\n- [fs] xfs: dont let swapext operate on write-only files (Jiri Pirko) [605161] {CVE-2010-2226}\n- [fs] nfs: fix bug in nfsd4 read_buf (Jiri Olsa) [612035] {CVE-2010-2521}\n- [fs] nfsd: add lockdep annotation to nfsd4 recover code (Jeff Layton) [567092]\n- [fs] nfs: wait for close before silly-renaming (Jeff Layton) [565974]\n- [fs] cifs: enable CONFIG_CIFS_STATS (Jeff Layton) [574795]\n- [net] sunrpc: translate an -ENETUNREACH to -ENOTCONN (Jeff Layton) [481372]\n- [fs] cifs: merge CIFSSMBQueryEA with CIFSSMBQAllEAs (Jeff Layton) [527268]\n- [fs] cifs: verify lengths of QueryAllEAs reply (Jeff Layton) [527268]\n- [fs] cifs: increase maximum buffer size in CIFSSMBQAllEAs (Jeff Layton) [527268]\n- [fs] cifs: rename name_len to list_len in CIFSSMBQAllEAs (Jeff Layton) [527268]\n- [fs] cifs: clean up indentation in CIFSSMBQAllEAs (Jeff Layton) [527268]\n- [fs] cifs: reject DNS upcall add_key req from userspace (Jeff Layton) [612171] {CVE-2010-2524}\n- [fs] cifs: add parens around smb_var in BCC macros (Jeff Layton) [527268]\n- [security] keys: new key flag for add_key from userspace (Jeff Layton) [612171] {CVE-2010-2524}\n- [specfile] skip xen tarball and patching if building w/o xen (Jarod Wilson)\n- [specfile] replace ancient and deprecated rpm syntax (Jarod Wilson)\n- [virt] xen: remove sysdata hack from irq-xen.c (Paolo Bonzini) [561390]\n- [xen] msi fixmap cleanup and vector teardown (Don Dugger) [516236]\n\n[2.6.18-206.el5]\n- [x86] kprobes: introduce kprobes jump optimization (Masami Hiramatsu) [516313]\n- [x86] add x86_64 alternatives_text_reserved interface (Masami Hiramatsu) [516313]\n- [x86_64] kprobes: upstream update for rhel5.6 (Masami Hiramatsu) [516313]\n- [x86_64] add instruction decoder API (Masami Hiramatsu) [516313]\n- [fusion] mpt: fix deregister calls in exit path (hiro muneda) [581523]\n- [net] cxgb3: wait longer for control packets on init (Steve Best) [587670]\n- [scsi] scsi_dh_alua: add IBM Power Virtual SCSI ALUA dev (Steve Best) [567292]\n- [fs] gfs2: fix stuck in inode wait, no glocks stuck (Robert S Peterson) [595397]\n- [message] mptsas: fix disk add failing due to timeout (Rob Evers) [542892]\n- [scsi] lpfc: update from 8.2.0.73.1p to 8.2.0.76.1p (Rob Evers) [591674]\n- [scsi] lpfc: update from 8.2.0.63.p3 to 8.2.0.73.1p (Rob Evers) [571862]\n- [i2c] fix exports types for recently added i2c symbols (Prarit Bhargava) [611774]\n- [virt] xen: fix 32-bit syscalls on 64-bit kernel (Paolo Bonzini) [561394]\n- [virt] xen: add tracepoint for kernel pagefault event (Paolo Bonzini) [561385]\n- [security] selinux: fix race with re-parenting (Oleg Nesterov) [556675]\n- [net] sctp: fix length checks (Neil Horman) [605305]\n- [acpi] intel: avoid skipping ARB_DISABLE on model 0x0e (Matthew Garrett) [602846]\n- [block] cfq-iosched: fix bad locking in changed_ioprio (Jeff Moyer) [582435]\n- [block] cfq-iosched: kill cfq_exit_lock (Jeff Moyer) [582435]\n- [fs] cifs: fix kernel BUG with remote OS/2 server (Jeff Layton) [608588] {CVE-2010-2248}\n- [fs] cifs: dont try busy-file rename unless in same dir (Jeff Layton) [603706]\n- [fs] nfsd: dont break lease while servicing COMMIT call (Jeff Layton) [575817]\n- [fs] force target reval when following LAST_BIND symlinks (Jeff Layton) [571518]\n- [net] be2net: update to v2.102.348r with SR-IOV support (Ivan Vecera) [568388]\n- [net] virtio_net: add set_multicast_list (Herbert Xu) [552574]\n- [net] gro: fix bogus gso_size on the first fraglist entry (Herbert Xu) [588015]\n- [time] fix softlockups in RHEL5 virt guests (Glauber Costa) [607443]\n- [time] count ticks when loss gt cycle_accounted_limit (Glauber Costa) [584679]\n- [net] e1000e: dont inadvertently re-set INTX_DISABLE (Dean Nelson) [496127]\n- [scsi] fixup size on read capacity failure (David Milburn) [569654]\n- [s390] smsgiucv: add missing check for z/VM (Hendrik Brueckner) [590737]\n- [s390] zcore: fix reipl device detection (Hendrik Brueckner) [587027]\n- [s390] zcrypt: print error message for 8/72 error (Hendrik Brueckner) [563545]\n- [s390] kernel: fix dump indicator (Hendrik Brueckner) [546288]\n- [net] bluetooth: fix possible bad memory access via sysfs (Mauro Carvalho Chehab) [576021] {CVE-2010-1084}\n\n[2.6.18-205.el5]\n- [scsi] ipr: adds PCI ID definitions for new adapters (Steve Best) [563589]\n- [scsi] ipr: add support for new IOASCs (Steve Best) [563589]\n- [scsi] ipr: add support for multiple stages of init (Steve Best) [563589]\n- [scsi] ipr: implement shutdown changes (Steve Best) [563589]\n- [scsi] ipr: hardware assisted smart dump functionality (Steve Best) [563589]\n- [scsi] ipr: add error handling updates for next gen chip (Steve Best) [563589]\n- [scsi] ipr: update the config table for next gen chip (Steve Best) [563589]\n- [scsi] ipr: define register offsets for next gen chip (Steve Best) [563589]\n- [scsi] ipr: add command structures for next gen chip (Steve Best) [563589]\n- [scsi] ipr: differentiate pci-x and pci-e based adapters (Steve Best) [563589]\n- [scsi] ipr: add test for MSI interrupt support (Steve Best) [563589]\n- [scsi] ipr: add message to error table (Steve Best) [563589]\n- [scsi] ipr: handle logically bad block write errors (Steve Best) [563589]\n- [scsi] ipr: convert to use the data buffer accessors (Steve Best) [563589]\n- [scsi] ipr: add some defines that are missing in RHEL5.5 (Steve Best) [563589]\n- [scsi] ipr: add workaround for MSI interrupts on P7 (Steve Best) [572333]\n- [net] tcp: fix rcv mss estimate for lro (Stanislaw Gruszka) [593801]\n- [virt] xen netback: copy skbuffs if head crosses pages (Paolo Bonzini) [578259]\n- [virt] xen: handle softirqs at end of event processing (Paolo Bonzini) [564523]\n- [virt] fix tsccount clocksource under kvm guests (Glauber Costa) [581396]\n- [net] benet: compat header cleanups, part 2 (Ivan Vecera) [546740]\n- [net] benet: compat header cleanups, part 1 (Prarit Bhargava) [546740]\n- [net] bnx2: compat header cleanups (Prarit Bhargava) [546740]\n- [net] e1000/e1000e: compat header cleanup (Prarit Bhargava) [546740]\n- [net] enic: compat header cleanup (Prarit Bhargava) [546740]\n- [net] forcedeth: compat header cleanup (Prarit Bhargava) [546740]\n- [net] igb: compat header cleanups (Prarit Bhargava) [546740]\n- [net] ixgbe: compat header cleanups (Prarit Bhargava) [546740]\n- [net] myri10ge: compat header cleanups (Prarit Bhargava) [546740]\n- [net] netxen: compat header cleanup (Prarit Bhargava) [546740]\n- [net] niu: compat header cleanup (Prarit Bhargava) [546740]\n- [net] qlge: compat header cleanup (Prarit Bhargava) [546740]\n- [net] r8169: compat header cleanups, part 2 (Ivan Vecera) [546740]\n- [net] r8169: compat header cleanups, part 1 (Prarit Bhargava) [546740]\n- [net] sfc: compat header cleanups (Prarit Bhargava) [546740]\n- [net] sky2: compat header cleanup (Prarit Bhargava) [546740]\n- [net] tg3: compat header cleanup (Prarit Bhargava) [546740]\n- [net] bonding: compat header cleanup (Prarit Bhargava) [546740]\n- [net] move compat header file contents to proper includes (Prarit Bhargava) [546740]\n- [net] ethernet: compat header cleanups (Prarit Bhargava) [546740]\n- [net] chelsio: compat header cleanups (Prarit Bhargava) [546740]\n- [net] s2io: compat header cleanups (Prarit Bhargava) [546740]\n- [net] vxge: compat header cleanup (Prarit Bhargava) [546740]\n- [infiniband] compat header cleanups (Prarit Bhargava) [546740]\n- [scsi] compat header cleanups (Prarit Bhargava) [546740]\n- [misc] readq/writeq compat header cleanup (Prarit Bhargava) [546740]\n- [pci] compat header cleanups (Prarit Bhargava) [546740]\n- [misc] compat.h cleanup: add cancel_delayed_work_sync (Prarit Bhargava) [546740]\n- [i2c] compat header cleanups (Prarit Bhargava) [546740]\n- [fs] nfs: fix memory leak when using -onolock on nfs v2/3 (Jeff Layton) [592908]\n\n[2.6.18-204.el5]\n- [fs] gfs2: fix ordering of ordered writes (Steven Whitehouse) [581013]\n- [net] cnic: fix bnx2x panic w/multiple interfaces enabled (Stanislaw Gruszka) [602402]\n- [x86_64] unify apic mapping code (Prarit Bhargava) [573858]\n- [virt] xen: fix Connected state after netback dev closed (Paolo Bonzini) [591548]\n- [net] ipv4: add sysctl to accept packets w/local source (Jiri Olsa) [601370]\n- [nfs] fix unitialized list head on error exit in recovery (Jeff Layton) [569342]\n- [virt] virtio_blk: add support for cache flushes (Christoph Hellwig) [571735]\n- [xen] ia64: unset be from the task psr (Andrew Jones) [587477] {CVE-2010-2070}\n\n[2.6.18-203.el5]\n- [misc] permit larger than 2TB USB and FW drives (Pete Zaitcev) [503864]\n- [net] cnic: fix panic when nl msg rcvd when device down (Stanislaw Gruszka) [595862]\n- [infiniband] ehca: require in_wc in process_mad (Steve Best) [571517]\n- [net] igb: Add support for pci-e Advanced Error Reporting (Stefan Assmann) [568221]\n- [fs] ext4: MOVE_EXT cant overwrite append-only files (Eric Sandeen) [601008] {CVE-2010-2066}\n- [net] wireless: convert reg_regdb_search_lock to mutex (John Linville) [597334]\n- [net] tcp: dont send keepalive probes if receiving data (Flavio Leitner) [593040]\n- [hwmon] add support for additional CPU models to coretemp (Dean Nelson) [559228]\n- [fs] gfs2: use -EUSERS when mounting w/o enough journals (Abhijith Das) [600387]\n- [misc] workqueue: make cancel_work_sync EXPORT_SYMBOL_GPL (Oleg Nesterov) [596626]\n\n[2.6.18-202.el5]\n- [fs] gfs2: fix permissions checking for setflags ioctl (Steven Whitehouse) [595399] {CVE-2010-1641}\n- [mm] clear page errors when issuing a fresh read of page (Rik van Riel) [590763]\n- [misc] keys: do not find already freed keyrings (Vitaly Mayatskikh) [585100] {CVE-2010-1437}\n- [misc] workqueue: silence kabi checker (Stanislaw Gruszka) [596626]\n- [misc] workqueue: implement cancel_work_sync (Oleg Nesterov) [596626]\n- [misc] workqueue: implement try_to_grab_pending (Oleg Nesterov) [596626]\n- [misc] workqueue: prep flush_cpu_workqueue for additions (Oleg Nesterov) [596626]\n- [misc] workqueue: implement wait_on_work (Oleg Nesterov) [596626]\n- [misc] workqueue: add set_wq_data and get_wq_data helpers (Oleg Nesterov) [596626]\n- [misc] workqueue: cwq instead of wq where appropriate (Oleg Nesterov) [596626]\n- [misc] workqueue: initial prep for cancel_work_sync (Oleg Nesterov) [596626]\n- [net] sctp: file must be valid before setting timeout (Jiri Pirko) [578261]\n- [net] tg3: fix panic in tg3_interrupt (John Feeney) [569106]\n- [net] e1000/e1000e: implement simple interrupt moderation (Andy Gospodarek) [586416]\n- [virt] dont compute pvclock adjustments if we trust tsc (Glauber Costa) [570824]\n- [virt] add a global synchronization point for pvclock (Glauber Costa) [570824]\n- [virt] enable pvclock flags in vcpu_time_info structure (Glauber Costa) [570824]\n- [misc] add atomic64_cmpxcgh to x86_64 include files (Glauber Costa) [570824]\n- [x86] grab atomic64 types from upstream (Glauber Costa) [570824]\n- [pci] cleanup error return for pcix get/set mmrbc calls (Dean Nelson) [578492]\n- [pci] fix pcix access of PCI_X_CMD get/set mmrbc calls (Dean Nelson) [578492]\n- [pci] fix return value from pcix_get_max_mmrbc() (Dean Nelson) [578492]\n- [pci] prepare for backport of upstream fixes and cleanup (Dean Nelson) [578492]\n- [net] ipv6: fix more memory leaks when ndisc_init fails (Amerigo Wang) [555338]\n- [xen] bring back VMXE/SVME flags (Andrew Jones) [570091]\n\n[2.6.18-201.el5]\n- [s390] qdio: continue polling for buffer state ERROR (Hendrik Brueckner) [565531]\n- [pci] acpiphp: fix missing acpiphp_glue_exit (Prarit Bhargava) [515556]\n- [net] cnic: Fix crash during bnx2x MTU change (Stanislaw Gruszka) [582367]\n- [net] bxn2x: add dynamic lro disable support (Stanislaw Gruszka) [582367]\n- [net] implement dev_disable_lro api for RHEL5 (Stanislaw Gruszka) [582367]\n\n[2.6.18-200.el5]\n- [fs] getrusage: fill ru_maxrss value (Amerigo Wang) [466157]\n- [net] bonding: fix broken multicast with round-robin mode (Andy Gospodarek) [570645]\n- [usb] input: fix keyboard LEDs on all the time (Pete Zaitcev) [513934]\n- [x86_64] fix time drift due to faulty lost tick tracking (Ulrich Obergfell) [579711]\n- [cciss] remove extraneous printk (Tomas Henzl) [582465]\n- [sunrpc] fix AUTH_SYS using sec=sys export option (Sachin Prabhu) [573652]\n- [misc] fix itimers periodic tics precision (Stanislaw Gruszka) [441134]\n- [net] tg3: fix INTx fallback when MSI fails (Steve Best) [587666]\n- [fs] quota: fix possible infinite loop in quota code (Eric Sandeen) [546060]\n- [misc] add {thread,core}_siblings_list to /sys (Prarit Bhargava) [570610]\n- [misc] add /sys/devices/system/node/nodeX/cpulist files (Prarit Bhargava) [572285]\n- [net] tun: orphan an skb on tx (Michael S. Tsirkin) [584412]\n- [edac] fix panic when a corrected error happens on i5000 (Mauro Carvalho Chehab) [533391]\n- [net] iwlwifi: re-enable IWLWIFI_LEDS (John Linville) [582003]\n- [net] calc TCPs connection closethreshold as time value (Jiri Pirko) [582722]\n- [net] sched: fix SFQ qdisc crash w/limit of 2 packets (Jiri Pirko) [579774]\n- [net] missed and reordered checks in {arp,ip,ip6}_tables (Jiri Pirko) [554563]\n- [net] neigh: fix state transitions via Netlink request (Jiri Pirko) [485903]\n- [net] route: fix BUG_ON in rt_secret_rebuild_oneshot (Jiri Olsa) [566104]\n- [net] netfilter: fix vmalloc ENOMEM caused by iptables (Jiri Olsa) [570491]\n- [block] cciss: fix multi-line printk log level (Jerome Marchand) [556921]\n- [nfs] revert retcode check in nfs_revalidate_mapping() (Jeff Layton) [557423]\n- [nfs] dont decode GETATTR if DELEGRETURN returned error (Jeff Layton) [551028]\n- [md] dm-log: fix bad log status after failure (Jonathan E Brassow) [570583]\n- [net] igmp: fix ip_mc_sf_allow race (Flavio Leitner) [552886]\n- [hwmon] add 0x prefix to hex coretemp module output (Dean Nelson) [571864]\n- [net] e1000e: fix WoL init when WoL disabled in EEPROM (Dean Nelson) [568562]\n- [ata] libata: handle semb signature (David Milburn) [533093]\n- [ata] libata-acpi: missing _SDD is not an error (David Milburn) [559815]\n- [scsi] sg: rate limit warning (Doug Ledford) [536937]\n- [net] tun: check supplemental groups in TUN/TAP driver (Danny Feng) [540786]\n- [s390] nss: add missing .previous call to asm function (Hendrik Brueckner) [581522]\n- [misc] lockdep: dump stack when hitting a limit (Amerigo Wang) [546554]\n- [net] ipv6: dont panic when kmem_cache_create fails (Amerigo Wang) [555338]\n- [misc] ipc: HARD_MSGMAX should be higher on 64bit (Amerigo Wang) [548334]\n- [fs] gfs2: make quota file size a multiple of gfs2_quota (Abhijith Das) [546455]\n\n[2.6.18-199.el5]\n- [mm] fix hugepage corruption using vm.drop_caches (Larry Woodman) [579469]\n- [misc] taskstats: enable CONFIG_TASK_XACCT (Jiri Olsa) [516961]\n- [misc] taskstats: new structure/cmd to avoid KABI break (Jiri Olsa) [516961]\n- [misc] taskstats: common fix for KABI breakage (Jiri Olsa) [516961]\n- [misc] taskstats: upgrade to version 4 (Jiri Olsa) [516961]\n- [misc] futex: handle futex value corruption gracefully (Jerome Marchand) [480396] {CVE-2010-0622}\n- [misc] futex: handle user space corruption gracefully (Jerome Marchand) [480396] {CVE-2010-0622}\n- [misc] futex: fix fault handling in futex_lock_pi (Jerome Marchand) [480396] {CVE-2010-0622}\n- [x86] utrace: block-step fix (Jerome Marchand) [463950]\n- [nfs] dont unhash dentry in nfs_lookup_revalidate (Jeff Layton) [582321]\n- [net] sunrpc: fix panic when reloading rpcsec_gss_krb5 (Harshula Jayasuriya) [570044]\n- [net] bonding: fix updating of speed/duplex changes (Andy Gospodarek) [567604]\n- [net] e1000: fix WoL init when WoL disabled in EEPROM (Dean Nelson) [568561]\n- [ata] ahci: support FIS-based switching (David Milburn) [474294]\n- [audit] make sure filterkey rules are reported (Alexander Viro) [579479]\n- [audit] clean up rule ordering, part 2 (Alexander Viro) [579479]\n- [audit] clean up rule ordering, part 1 (Alexander Viro) [579479]\n- [audit] fix selinux_audit_rule_update w/audit_inode_hash (Alexander Viro) [579479]\n- [virtio] fix GFP flags passed by virtio balloon driver (Amit Shah) [584683]\n- [net] sctp: fix skb_over_panic w/too many unknown params (Neil Horman) [584658] {CVE-2010-1173}\n- [xen] arpl on MMIO area crashes the guest (Paolo Bonzini) [572982] {CVE-2010-0730}\n\n[2.6.18-198.el5]\n- [acpi] warn on hot-add of memory exceeding 4G boundary (Prarit Bhargava) [571544]\n- [net] tipc: fix various oopses in uninitialized code (Neil Horman) [558693] {CVE-2010-1187}\n- [acpi] fix WARN on unregister in power meter driver (Matthew Garrett) [576246]\n- [block] cfq-iosched: fix IOPRIO_CLASS_IDLE accounting (Jeff Moyer) [574285]\n- [block] cfq-iosched: async queue allocation per priority (Jeff Moyer) [574285]\n- [block] cfq-iosched: fix async queue behaviour (Jeff Moyer) [574285]\n- [block] cfq-iosched: propagate down request sync flag (Jeff Moyer) [574285]\n- [block] introduce the rq_is_sync macro (Jeff Moyer) [574285]\n- [fs] vfs: fix LOOKUP_FOLLOW on automount symlinks (Jeff Layton) [567816] {CVE-2010-1088}\n- [nfs] fix an oops when truncating a file (Jeff Layton) [567195] {CVE-2010-1087}\n- [net] bnx2: fix lost MSI-X problem on 5709 NICs (John Feeney) [511368]\n- [misc] make the keyring quotas controllable via /proc/sys (Amerigo Wang) [441243]\n- [fs] fix kernel oops while copying from ext3 to gfs2 (Abhijith Das) [555754] {CVE-2010-1436}\n\n[2.6.18-197.el5]\n- [cpu] fix boot crash in 32-bit install on AMD cpus (Bhavna Sarathy) [575799]\n\n[2.6.18-196.el5]\n- [mm] fix boot on s390x after bootmem overlap patch (Amerigo Wang) [550974]\n- [net] bnx2: avoid restarting cnic in some contexts (Andy Gospodarek) [554706]\n- [misc] add missing CVE labels for entries in 2.6.18-195.el5 (Jarod Wilson)\n\n[2.6.18-195.el5]\n- [redhat] make sha512hmac sig failure more obvious (Jarod Wilson)\n- [mm] keep get_unmapped_area_prot functional (Danny Feng) [556710] {CVE-2010-0291}\n- [mm] switch do_brk to get_unmapped_area (Danny Feng) [556710] {CVE-2010-0291}\n- [mm] take arch_mmap_check into get_unmapped_area (Danny Feng) [556710] {CVE-2010-0291}\n- [mm] get rid of open-coding in ia64_brk (Danny Feng) [556710] {CVE-2010-0291}\n- [mm] unify sys_mmap* functions (Danny Feng) [556710] {CVE-2010-0291}\n- [mm] kill ancient cruft in s390 compat mmap (Danny Feng) [556710] {CVE-2010-0291}\n- [mm] fix pgoff in have to relocate case of mremap (Danny Feng) [556710] {CVE-2010-0291}\n- [mm] fix the arch checks in MREMAP_FIXED case (Danny Feng) [556710] {CVE-2010-0291}\n- [mm] fix checks for expand-in-place mremap (Danny Feng) [556710] {CVE-2010-0291}\n- [mm] add new vma_expandable helper function (Danny Feng) [556710] {CVE-2010-0291}\n- [mm] move MREMAP_FIXED into its own header (Danny Feng) [556710] {CVE-2010-0291}\n- [mm] move locating vma code and checks on it (Danny Feng) [556710] {CVE-2010-0291}\n- [iscsi] fix slow failover times (Mike Christie) [570681]\n- [misc] kernel: fix elf load DoS on x86_64 (Danny Feng) [560553] {CVE-2010-0307}\n- [netlink] connector: delete buggy notification code (Jiri Olsa) [561685] {CVE-2010-0410}\n- [sound] hda_intel: avoid divide by zero in azx devices (Jaroslav Kysela) [567172] {CVE-2010-1085}\n- [dvb] fix endless loop when decoding ULE at dvb-core (Mauro Carvalho Chehab) [569242] {CVE-2010-1086}\n- [scsi] fnic: fix tx queue handling (Mike Christie) [576709]\n- [fusion] mptsas: fix event_data alignment (Tomas Henzl) [570000]\n- [edac] fix internal error message in amd64_edac driver (Bhavna Sarathy) [569938]\n- [fs] remove unneccessary f_ep_lock from fasync_helper (Lachlan McIlroy) [567479]\n- [x86_64] fix floating point state corruption after signal (Oleg Nesterov) [560891]\n- [mm] dont let reserved memory overlap bootmem_map (Amerigo Wang) [550974]\n- [s390] kernel: correct TLB flush of page table entries (Hendrik Brueckner) [545527]\n- [xen] iommu: clear IO-APIC pins on boot and shutdown (Paolo Bonzini) [548201]\n- [xen] vtd: fix ioapic pin array (Don Dugger) [563546]\n- [xen] set hypervisor present CPUID bit (Paolo Bonzini) [573771]\n\n[2.6.18-194.el5]\n- [net] mlx4: pass attributes down to vlan interfaces (Doug Ledford) [573098]\n- [block] cfq-iosched: fix sequential read perf regression (Jeff Moyer) [571818]\n\n[2.6.18-193.el5]\n- [fs] gfs2: locking fix for potential dos (Steven Whitehouse) [572390] {CVE-2010-0727}\n- [acpi] power_meter: avoid oops on driver load (Matthew Garrett) [566575]\n- [net] r8169: fix assignments in backported net_device_ops (Ivan Vecera) [568040]\n- [net] virtio_net: refill rx buffer on out-of-memory (Herbert Xu) [554078]\n", u'issued': u'2011-01-20', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELSA-2011-0017.html', u'type': u'self', u'id': None, u'title': u'ELSA-2011-0017'}, {u'href': u'http://linux.oracle.com/cve/CVE-2010-3296.html', u'type': u'cve', u'id': u'CVE-2010-3296', u'title': u'CVE-2010-3296'}, {u'href': u'http://linux.oracle.com/cve/CVE-2010-3877.html', u'type': u'cve', u'id': u'CVE-2010-3877', u'title': u'CVE-2010-3877'}, {u'href': u'http://linux.oracle.com/cve/CVE-2010-4072.html', u'type': u'cve', u'id': u'CVE-2010-4072', u'title': u'CVE-2010-4072'}, {u'href': u'http://linux.oracle.com/cve/CVE-2010-4073.html', u'type': u'cve', u'id': u'CVE-2010-4073', u'title': u'CVE-2010-4073'}, {u'href': u'http://linux.oracle.com/cve/CVE-2010-4075.html', u'type': u'cve', u'id': u'CVE-2010-4075', u'title': u'CVE-2010-4075'}, {u'href': u'http://linux.oracle.com/cve/CVE-2010-4080.html', u'type': u'cve', u'id': u'CVE-2010-4080', u'title': u'CVE-2010-4080'}, {u'href': u'http://linux.oracle.com/cve/CVE-2010-4081.html', u'type': u'cve', u'id': u'CVE-2010-4081', u'title': u'CVE-2010-4081'}, {u'href': u'http://linux.oracle.com/cve/CVE-2010-4158.html', u'type': u'cve', u'id': u'CVE-2010-4158', u'title': u'CVE-2010-4158'}, {u'href': u'http://linux.oracle.com/cve/CVE-2010-4238.html', u'type': u'cve', u'id': u'CVE-2010-4238', u'title': u'CVE-2010-4238'}, {u'href': u'http://linux.oracle.com/cve/CVE-2010-4243.html', u'type': u'cve', u'id': u'CVE-2010-4243', u'title': u'CVE-2010-4243'}, {u'href': u'http://linux.oracle.com/cve/CVE-2010-4255.html', u'type': u'cve', u'id': u'CVE-2010-4255', u'title': u'CVE-2010-4255'}, {u'href': u'http://linux.oracle.com/cve/CVE-2010-4263.html', u'type': u'cve', u'id': u'CVE-2010-4263', u'title': u'CVE-2010-4263'}, {u'href': u'http://linux.oracle.com/cve/CVE-2010-4343.html', u'type': u'cve', u'id': u'CVE-2010-4343', u'title': u'CVE-2010-4343'}], u'_content_type_id': u'erratum', u'_id': u'abedaa81-cbf7-441f-8ece-e490835660ee', u'from': u'el-errata@oss.oracle.com', u'severity': u'Important', u'title': u' Oracle Linux 5.6 kernel security and bug fix update', u'_ns': u'units_erratum', u'rights': u'Copyright 2011 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 5', u'reboot_suggested': False, u'type': u'security', u'pkglist': [{u'packages': [{u'src': None, u'name': u'kernel', u'sum': [u'md5', u'83c40688495a7371174a6c4d1e8207f6'], u'filename': u'kernel-2.6.18-238.el5.src.rpm', u'epoch': u'0', u'version': u'2.6.18', u'release': u'238.el5', u'arch': u'src'}, {u'src': None, u'name': u'kernel', u'sum': [u'md5', u'b52cad0577c000994c7f8c9e4e30f7e7'], u'filename': u'kernel-2.6.18-238.el5.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.18', u'release': u'238.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'kernel-debug', u'sum': [u'md5', u'7cf753bfe7b6d323fd3f628f8fbc9172'], u'filename': u'kernel-debug-2.6.18-238.el5.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.18', u'release': u'238.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'kernel-debug-devel', u'sum': [u'md5', u'69eaa1698780a99aef0733404bafab33'], u'filename': u'kernel-debug-devel-2.6.18-238.el5.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.18', u'release': u'238.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'kernel-devel', u'sum': [u'md5', u'aef49fea7cfb4332d0eefaebeccccafd'], u'filename': u'kernel-devel-2.6.18-238.el5.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.18', u'release': u'238.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'kernel-doc', u'sum': [u'md5', u'54c2f32fbbe5bdd2dcbcb573d5d6dc4a'], u'filename': u'kernel-doc-2.6.18-238.el5.noarch.rpm', u'epoch': u'0', u'version': u'2.6.18', u'release': u'238.el5', u'arch': u'noarch'}, {u'src': None, u'name': u'kernel-headers', u'sum': [u'md5', u'e9c8639a23ba84f86290356f77e7486e'], u'filename': u'kernel-headers-2.6.18-238.el5.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.18', u'release': u'238.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'kernel-xen', u'sum': [u'md5', u'a12bc22d7e1f65113815516bb9e36da9'], u'filename': u'kernel-xen-2.6.18-238.el5.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.18', u'release': u'238.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'kernel-xen-devel', u'sum': [u'md5', u'8275638608f1e16b9c9a21e6a8753fb0'], u'filename': u'kernel-xen-devel-2.6.18-238.el5.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.18', u'release': u'238.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'ocfs2-2.6.18-238.el5', u'sum': [u'md5', u'4a3c5eaa8f819beaab883cd2e9515f4a'], u'filename': u'ocfs2-2.6.18-238.el5-1.4.8-2.el5.src.rpm', u'epoch': u'0', u'version': u'1.4.8', u'release': u'2.el5', u'arch': u'src'}, {u'src': None, u'name': u'ocfs2-2.6.18-238.el5', u'sum': [u'md5', u'94d6338a7d1beba59825679884dcc62b'], u'filename': u'ocfs2-2.6.18-238.el5-1.4.8-2.el5.x86_64.rpm', u'epoch': u'0', u'version': u'1.4.8', u'release': u'2.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'ocfs2-2.6.18-238.el5debug', u'sum': [u'md5', u'c1479e6308d897e1d50a7acc7e111187'], u'filename': u'ocfs2-2.6.18-238.el5debug-1.4.8-2.el5.x86_64.rpm', u'epoch': u'0', u'version': u'1.4.8', u'release': u'2.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'ocfs2-2.6.18-238.el5xen', u'sum': [u'md5', u'788a3c385b07dc169a90d3723397acff'], u'filename': u'ocfs2-2.6.18-238.el5xen-1.4.8-2.el5.x86_64.rpm', u'epoch': u'0', u'version': u'1.4.8', u'release': u'2.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'oracleasm-2.6.18-238.el5', u'sum': [u'md5', u'23ce983031cb8b68451e27fad6117431'], u'filename': u'oracleasm-2.6.18-238.el5-2.0.5-1.el5.src.rpm', u'epoch': u'0', u'version': u'2.0.5', u'release': u'1.el5', u'arch': u'src'}, {u'src': None, u'name': u'oracleasm-2.6.18-238.el5', u'sum': [u'md5', u'586d59836a09bced330990c2ed05c74e'], u'filename': u'oracleasm-2.6.18-238.el5-2.0.5-1.el5.x86_64.rpm', u'epoch': u'0', u'version': u'2.0.5', u'release': u'1.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'oracleasm-2.6.18-238.el5debug', u'sum': [u'md5', u'07de52a38a4dae4ec704d3feaa4fa441'], u'filename': u'oracleasm-2.6.18-238.el5debug-2.0.5-1.el5.x86_64.rpm', u'epoch': u'0', u'version': u'2.0.5', u'release': u'1.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'oracleasm-2.6.18-238.el5xen', u'sum': [u'md5', u'c1705d0977d703de1e6ea5ca97d53ab2'], u'filename': u'oracleasm-2.6.18-238.el5xen-2.0.5-1.el5.x86_64.rpm', u'epoch': u'0', u'version': u'2.0.5', u'release': u'1.el5', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u'[4.1.2-50.el5]\n- fix up fastjar directory traversal bugs (CVE-2010-0831)\n\n[4.1.2-49.el5]\n- fix ICE in set_uids_in_ptset (#605803)\n- fix ICE in make_rtl_for_nonlocal_decl (#582682, #508735, #503565,\n PR c++/33094)\n- dont build gcjwebplugin (#596097)\n- fix IPP handling in libgcj (#578382)\n- document -print-multi-os-directory (#529659, PR other/25507)\n- fix ICE in output_die with function local types (#527510, PR debug/41063)\n- speed up locale::locale() ctor if _S_global hasnt been changed\n (#635708, PR libstdc++/40088)\n', u'issued': u'2011-01-20', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELSA-2011-0025.html', u'type': u'self', u'id': None, u'title': u'ELSA-2011-0025'}, {u'href': u'http://linux.oracle.com/cve/CVE-2010-0831.html', u'type': u'cve', u'id': u'CVE-2010-0831', u'title': u'CVE-2010-0831'}, {u'href': u'http://linux.oracle.com/cve/CVE-2010-2322.html', u'type': u'cve', u'id': u'CVE-2010-2322', u'title': u'CVE-2010-2322'}], u'_content_type_id': u'erratum', u'_id': u'116fb298-b5f2-494f-b2a9-1b56a021cf38', u'from': u'el-errata@oss.oracle.com', u'severity': u'Low', u'title': u' gcc security and bug fix update', u'_ns': u'units_erratum', u'rights': u'Copyright 2011 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 5', u'reboot_suggested': False, u'type': u'security', u'pkglist': [{u'packages': [{u'src': None, u'name': u'cpp', u'sum': [u'md5', u'7cddbaf6ffe216b884af719d8eb10de3'], u'filename': u'cpp-4.1.2-50.el5.x86_64.rpm', u'epoch': u'0', u'version': u'4.1.2', u'release': u'50.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'gcc', u'sum': [u'md5', u'453e0ceb784adbe3e7eb1f47f2ebf8b4'], u'filename': u'gcc-4.1.2-50.el5.src.rpm', u'epoch': u'0', u'version': u'4.1.2', u'release': u'50.el5', u'arch': u'src'}, {u'src': None, u'name': u'gcc', u'sum': [u'md5', u'5ae3f8c8f91e468b6545fe478c2fd62c'], u'filename': u'gcc-4.1.2-50.el5.x86_64.rpm', u'epoch': u'0', u'version': u'4.1.2', u'release': u'50.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'gcc-c++', u'sum': [u'md5', u'feed5329f234e24b308a0c5e291c8de3'], u'filename': u'gcc-c++-4.1.2-50.el5.x86_64.rpm', u'epoch': u'0', u'version': u'4.1.2', u'release': u'50.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'gcc-gfortran', u'sum': [u'md5', u'dea76954fa01bc32414f623ffd4cb4ee'], u'filename': u'gcc-gfortran-4.1.2-50.el5.x86_64.rpm', u'epoch': u'0', u'version': u'4.1.2', u'release': u'50.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'gcc-gnat', u'sum': [u'md5', u'67851629d94539cdf67c878c40869bf4'], u'filename': u'gcc-gnat-4.1.2-50.el5.x86_64.rpm', u'epoch': u'0', u'version': u'4.1.2', u'release': u'50.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'gcc-java', u'sum': [u'md5', u'cdc05222213128ed353a973c66522bd6'], u'filename': u'gcc-java-4.1.2-50.el5.x86_64.rpm', u'epoch': u'0', u'version': u'4.1.2', u'release': u'50.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'gcc-objc', u'sum': [u'md5', u'e946b135122804261419d5b6f4e71aa2'], u'filename': u'gcc-objc-4.1.2-50.el5.x86_64.rpm', u'epoch': u'0', u'version': u'4.1.2', u'release': u'50.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'gcc-objc++', u'sum': [u'md5', u'14e3c7a60d8e3c1ce207ff3f936695e6'], u'filename': u'gcc-objc++-4.1.2-50.el5.x86_64.rpm', u'epoch': u'0', u'version': u'4.1.2', u'release': u'50.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'libgcc', u'sum': [u'md5', u'7d6e09e09522df2d2040f2d453f57771'], u'filename': u'libgcc-4.1.2-50.el5.i386.rpm', u'epoch': u'0', u'version': u'4.1.2', u'release': u'50.el5', u'arch': u'i386'}, {u'src': None, u'name': u'libgcc', u'sum': [u'md5', u'4c02d32e76897dfff1cda80c55e85f6e'], u'filename': u'libgcc-4.1.2-50.el5.x86_64.rpm', u'epoch': u'0', u'version': u'4.1.2', u'release': u'50.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'libgcj', u'sum': [u'md5', u'8fb072416b118a56b519f50810734420'], u'filename': u'libgcj-4.1.2-50.el5.i386.rpm', u'epoch': u'0', u'version': u'4.1.2', u'release': u'50.el5', u'arch': u'i386'}, {u'src': None, u'name': u'libgcj', u'sum': [u'md5', u'04b830cfff9700e7854a69786a59719a'], u'filename': u'libgcj-4.1.2-50.el5.x86_64.rpm', u'epoch': u'0', u'version': u'4.1.2', u'release': u'50.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'libgcj-devel', u'sum': [u'md5', u'7fe46188fc6c8b045f03d56ace0c8103'], u'filename': u'libgcj-devel-4.1.2-50.el5.i386.rpm', u'epoch': u'0', u'version': u'4.1.2', u'release': u'50.el5', u'arch': u'i386'}, {u'src': None, u'name': u'libgcj-devel', u'sum': [u'md5', u'c6e11044dd470929079ddd93bef43d90'], u'filename': u'libgcj-devel-4.1.2-50.el5.x86_64.rpm', u'epoch': u'0', u'version': u'4.1.2', u'release': u'50.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'libgcj-src', u'sum': [u'md5', u'15921c4c9ec8fb331bf69010d5fa699f'], u'filename': u'libgcj-src-4.1.2-50.el5.x86_64.rpm', u'epoch': u'0', u'version': u'4.1.2', u'release': u'50.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'libgfortran', u'sum': [u'md5', u'12fe01aa4a3dd8ad41f820acdf21a86c'], u'filename': u'libgfortran-4.1.2-50.el5.i386.rpm', u'epoch': u'0', u'version': u'4.1.2', u'release': u'50.el5', u'arch': u'i386'}, {u'src': None, u'name': u'libgfortran', u'sum': [u'md5', u'0b6699402a9e0b5ef33fb65461f7aece'], u'filename': u'libgfortran-4.1.2-50.el5.x86_64.rpm', u'epoch': u'0', u'version': u'4.1.2', u'release': u'50.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'libgnat', u'sum': [u'md5', u'25b1c009ee5e6dd744108c6e1be7eb64'], u'filename': u'libgnat-4.1.2-50.el5.i386.rpm', u'epoch': u'0', u'version': u'4.1.2', u'release': u'50.el5', u'arch': u'i386'}, {u'src': None, u'name': u'libgnat', u'sum': [u'md5', u'a01724bfaf134fdbea2416ccb45abb60'], u'filename': u'libgnat-4.1.2-50.el5.x86_64.rpm', u'epoch': u'0', u'version': u'4.1.2', u'release': u'50.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'libmudflap', u'sum': [u'md5', u'936c6deb0bc914f04a148456284ca785'], u'filename': u'libmudflap-4.1.2-50.el5.i386.rpm', u'epoch': u'0', u'version': u'4.1.2', u'release': u'50.el5', u'arch': u'i386'}, {u'src': None, u'name': u'libmudflap', u'sum': [u'md5', u'b6ff24ccd30439a4474f03ac8d6fa8c8'], u'filename': u'libmudflap-4.1.2-50.el5.x86_64.rpm', u'epoch': u'0', u'version': u'4.1.2', u'release': u'50.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'libmudflap-devel', u'sum': [u'md5', u'7a928924e6bd724ef67f499bf8ebbdbf'], u'filename': u'libmudflap-devel-4.1.2-50.el5.i386.rpm', u'epoch': u'0', u'version': u'4.1.2', u'release': u'50.el5', u'arch': u'i386'}, {u'src': None, u'name': u'libmudflap-devel', u'sum': [u'md5', u'cbf227df93495ec8312ed788c7a2d76d'], u'filename': u'libmudflap-devel-4.1.2-50.el5.x86_64.rpm', u'epoch': u'0', u'version': u'4.1.2', u'release': u'50.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'libobjc', u'sum': [u'md5', u'cf56418cb9d7ee7222c4b1069d231c23'], u'filename': u'libobjc-4.1.2-50.el5.i386.rpm', u'epoch': u'0', u'version': u'4.1.2', u'release': u'50.el5', u'arch': u'i386'}, {u'src': None, u'name': u'libobjc', u'sum': [u'md5', u'51f66b31097e56482840ad1334b787ee'], u'filename': u'libobjc-4.1.2-50.el5.x86_64.rpm', u'epoch': u'0', u'version': u'4.1.2', u'release': u'50.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'libstdc++', u'sum': [u'md5', u'ef167fbd6b0aa17dfbb9bbb39cee50b1'], u'filename': u'libstdc++-4.1.2-50.el5.i386.rpm', u'epoch': u'0', u'version': u'4.1.2', u'release': u'50.el5', u'arch': u'i386'}, {u'src': None, u'name': u'libstdc++', u'sum': [u'md5', u'8d644b87f29faf1b6e8f65523a86fcaf'], u'filename': u'libstdc++-4.1.2-50.el5.x86_64.rpm', u'epoch': u'0', u'version': u'4.1.2', u'release': u'50.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'libstdc++-devel', u'sum': [u'md5', u'5a805f2bef00c9dc41f599906859d742'], u'filename': u'libstdc++-devel-4.1.2-50.el5.i386.rpm', u'epoch': u'0', u'version': u'4.1.2', u'release': u'50.el5', u'arch': u'i386'}, {u'src': None, u'name': u'libstdc++-devel', u'sum': [u'md5', u'97f76931efd7358153f012b429eaf9f4'], u'filename': u'libstdc++-devel-4.1.2-50.el5.x86_64.rpm', u'epoch': u'0', u'version': u'4.1.2', u'release': u'50.el5', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u"[2.4.3-43]\n- add missing patch 206\nRelated: rhbz#549372\n\n[2.4.3-42]\n- fix test_pyclbr to match the urllib change in patch 204 (patch 206)\n- allow the 'no_proxy' environment variable to override 'ftp_proxy' in\nurllib2 (patch 207)\n- fix typos in names of patches 204 and 205\nRelated: rhbz#549372\n\n[2.4.3-41]\n- backport support for the 'no_proxy' environment variable to the urllib and\nurllib2 modules (patches 204 and 205, respectively)\nResolves: rhbz#549372\n\n[2.4.3-40]\n- backport fixes for arena allocator from 2.5a1\n- disable arena allocator when run under valgrind on x86, x86_64, ppc, ppc64\n(patch 203)\n- add patch to add sys._debugmallocstats() hook (patch 202)\nResolves: rhbz#569093\n\n[2.4.3-39]\n- fix various flaws in the 'audioop' module\n- Resolves: CVE-2010-1634 CVE-2010-2089\n- backport the new PySys_SetArgvEx libpython entrypoint from 2.6\n- Related: CVE-2008-5983\n- restrict creation of the .relocation-tag files to i386 builds\n- Related: rhbz#644761\n- move the python-optik metadata from the core subpackage to the python-libs\nsubpackage\n- Related: rhbz#625372\n\n[2.4.3-38]\n- add metadata to ensure that 'yum install python-libs' works\n- Related: rhbz#625372\n\n[2.4.3-37]\n- create dummy ELF file '.relocation-tag' to force RPM directory coloring,\nfixing i386 on ia64 compat\n- Resolves: rhbz#644761\n\n[2.4.3-36]\n- Backport fix for http://bugs.python.org/issue7082 to 2.4.3\n- Resolves: rhbz#644147\n\n[2.4.3-35]\n- Rework rgbimgmodule fix for CVE-2008-3143\n- Resolves: rhbz#644425 CVE-2009-4134 CVE-2010-1449 CVE-2010-1450\n\n[2.4.3-34]\n- fix stray 'touch' command\n- Related: rhbz#625372\n\n[2.4.3-33]\n- Preserve timestamps when fixing shebangs (patch 104) and when installing, to\nminimize .pyc/.pyo differences across architectures (due to the embedded mtime\nin .pyc/.pyo headers)\n- Related: rhbz#625372\n\n[2.4.3-32]\n- introduce libs subpackage as a dependency of the core package, moving the\nshared libraries and python standard libraries there\n- Resolves: rhbz#625372\n\n[2.4.3-31]\n- dont use -b when applying patch 103\n- Related: rhbz#263401\n\n[2.4.3-30]\n- add missing patch\n- Resolves: rhbz#263401\n\n[2.4.3-29]\n- Backport Python 2.5s tarfile module (0.8.0) to 2.4.3\n- Resolves: rhbz#263401\n\n[2.4.3-28]\n- Backport fix for leaking filedescriptors in subprocess error-handling path\nfrom Python 2.6\n- Resolves: rhbz#609017\n- Backport usage of 'poll' within the subprocess module to 2.4.3\n- Resolves: rhbz#609020\n", u'issued': u'2011-01-20', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELSA-2011-0027.html', u'type': u'self', u'id': None, u'title': u'ELSA-2011-0027'}, {u'href': u'http://linux.oracle.com/cve/CVE-2008-5983.html', u'type': u'cve', u'id': u'CVE-2008-5983', u'title': u'CVE-2008-5983'}, {u'href': u'http://linux.oracle.com/cve/CVE-2009-4134.html', u'type': u'cve', u'id': u'CVE-2009-4134', u'title': u'CVE-2009-4134'}, {u'href': u'http://linux.oracle.com/cve/CVE-2010-1449.html', u'type': u'cve', u'id': u'CVE-2010-1449', u'title': u'CVE-2010-1449'}, {u'href': u'http://linux.oracle.com/cve/CVE-2010-1450.html', u'type': u'cve', u'id': u'CVE-2010-1450', u'title': u'CVE-2010-1450'}, {u'href': u'http://linux.oracle.com/cve/CVE-2010-1634.html', u'type': u'cve', u'id': u'CVE-2010-1634', u'title': u'CVE-2010-1634'}, {u'href': u'http://linux.oracle.com/cve/CVE-2010-2089.html', u'type': u'cve', u'id': u'CVE-2010-2089', u'title': u'CVE-2010-2089'}], u'_content_type_id': u'erratum', u'_id': u'6990641f-758b-46c9-aade-26ff2c12dfbc', u'from': u'el-errata@oss.oracle.com', u'severity': u'Low', u'title': u' python security, bug fix, and enhancement update', u'_ns': u'units_erratum', u'rights': u'Copyright 2011 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 5', u'reboot_suggested': False, u'type': u'security', u'pkglist': [{u'packages': [{u'src': None, u'name': u'python', u'sum': [u'md5', u'bbd57a51d0562603bf20027e0b084581'], u'filename': u'python-2.4.3-43.el5.src.rpm', u'epoch': u'0', u'version': u'2.4.3', u'release': u'43.el5', u'arch': u'src'}, {u'src': None, u'name': u'python', u'sum': [u'md5', u'bba0d6f737dd82c3a0fc788a0f7b07ff'], u'filename': u'python-2.4.3-43.el5.x86_64.rpm', u'epoch': u'0', u'version': u'2.4.3', u'release': u'43.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'python-devel', u'sum': [u'md5', u'65fafd10a69885f72930097c7eefb543'], u'filename': u'python-devel-2.4.3-43.el5.i386.rpm', u'epoch': u'0', u'version': u'2.4.3', u'release': u'43.el5', u'arch': u'i386'}, {u'src': None, u'name': u'python-devel', u'sum': [u'md5', u'bb7ab2e4bd0f82fa4afe089cc4348d44'], u'filename': u'python-devel-2.4.3-43.el5.x86_64.rpm', u'epoch': u'0', u'version': u'2.4.3', u'release': u'43.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'python-libs', u'sum': [u'md5', u'2da63a4a376aee27ddfa5ecbb984972c'], u'filename': u'python-libs-2.4.3-43.el5.x86_64.rpm', u'epoch': u'0', u'version': u'2.4.3', u'release': u'43.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'python-tools', u'sum': [u'md5', u'cb2eebe34801f0a0edf6d4502243bf95'], u'filename': u'python-tools-2.4.3-43.el5.x86_64.rpm', u'epoch': u'0', u'version': u'2.4.3', u'release': u'43.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'tkinter', u'sum': [u'md5', u'fc691ff5170a2f33bdcecdab1d402eb8'], u'filename': u'tkinter-2.4.3-43.el5.x86_64.rpm', u'epoch': u'0', u'version': u'2.4.3', u'release': u'43.el5', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u"[kvm-83-224.0.1]\n- Added kvm-add-oracle-workaround-for-libvirt-bug.patch\n- Added kvm-Introduce-oel-machine-type.patch\n\n[kvm-83-224.el5]\n- kvm-kernel-KVM-x86-zero-kvm_vcpu_events-interrupt.pad.patch [bz#665407]\n- Resolves: bz#665407\n (kvm_vcpu_events.interrupt.pad must be zeroed)\n- CVE: CVE-2010-4525\n\n[kvm-83-223.el5]\n- Updated kversion to 2.6.18-237.el to match build root\n- Reverting patches for bz#608709 as they are not complete\n - kvm-kernel-Revert-KVM-VMX-Return-0-from-a-failed-VMREAD.patch [bz#608709]\n - kvm-kernel-Revert-KVM-Don-t-spin-on-virt-instruction-faults-dur.patch [bz#608709]\n- bz#608709: reboot(RB_AUTOBOOT) fails if kvm instance is running\n- Related: bz#661117\n\n[kvm-83-222.el5]\n- kvm-kernel-kvm-change-signed-int-to-unsigned-in-mmu_shrink.patch [bz#661117]\n- Resolves: bz#661117\n ([RHEL5.6 CC] mmu_shrink patch)\n\n[kvm-83-221.el5]\n- Updated kversion to 2.6.18-236.el to match build root\n- kvm-kernel-KVM-Don-t-spin-on-virt-instruction-faults-during-reb.patch [bz#608709]\n- kvm-kernel-KVM-VMX-Return-0-from-a-failed-VMREAD.patch [bz#608709]\n- Resolves: bz#608709\n (reboot(RB_AUTOBOOT) fails if kvm instance is running)\n\n[kvm-83-220.el5]\n- Updated kversion to 2.6.18-235.el to match build root\n- kvm-load-registers-after-restoring-pvclock-msrs.patch [bz#655990]\n- Resolves: bz#655990\n (clock drift when migrating a guest between mis-matched CPU clock speed)\n\n[kvm-83-219.el5]\n- kvm-kernel-KVM-fix-AMD-initial-TSC-offset-problems-additional-f.patch [bz#642659]\n- Resolves: bz#642659\n (TSC offset of virtual machines is not initialized correctly by 'kvm_amd' kernel module.)\n\n[kvm-83-218.el5]\n- kvm-vnc-fix-key-event-processing.patch [bz#643317]\n- Resolves: bz#643317\n ('sendkey ctrl-alt-delete' dont work via VNC)\n\n[kvm-83-217.el5]\n- kvm-kernel-fix-null-pointer-dereference.patch [bz#570532]\n- Resolves: bz#570532\n (CVE-2010-0435 kvm: vmx null pointer dereference)\n- CVE: CVE-2010-0435\n\n[kvm-83-216.el5]\n- Updated kversion to 2.6.18-233.el to match build root\n- kvm-kernel-KVM-fix-AMD-initial-TSC-offset-problems.patch [bz#642659]\n- Resolves: bz#642659\n (TSC offset of virtual machines is not initialized correctly by 'kvm_amd' kernel module.)\n\n[kvm-83-215.el5]\n- Reverts previous patch (it doesnt build)\n- kvm-kernel-Revert-KVM-fix-AMD-initial-TSC-bugs.patch [bz#642659]\n- Related: bz#642659\n (TSC offset of virtual machines is not initialized correctly by 'kvm_amd' kernel module.)\n\n[kvm-83-214.el5]\n- kvm-kernel-KVM-fix-AMD-initial-TSC-bugs.patch [bz#642659]\n- Resolves: bz#642659\n (TSC offset of virtual machines is not initialized correctly by 'kvm_amd' kernel module.)\n\n[kvm-83-213.el5]\n- kvm-No-need-to-iterate-if-we-already-are-over-the-limit.patch [bz#513765 bz#589017]\n- kvm-don-t-care-about-TLB-handling.patch [bz#513765 bz#589017]\n- kvm-Fix-transferred-memory-calculation.patch [bz#513765 bz#589017]\n- kvm-Maintaing-number-of-dirty-pages.patch [bz#513765 bz#589017]\n- kvm-Exit-loop-if-we-have-been-there-too-long.patch [bz#513765 bz#589017]\n- kvm-Change-calculation-to-exit-live-migration.patch [bz#513765 bz#589017]\n- Resolves: bz#513765\n (Large guest ( 256G RAM + 16 vcpu ) hang during live migration)\n- Resolves: bz#589017\n ([rhel5.5] [kvm] dead lock in qemu during off-line migration)\n\n[kvm-83-212.el5]\n- kvm-implement-dummy-PnP-support.patch [bz#652671]\n- Resolves: bz#652671\n (If VM boot seq. is set up as nc (PXE then disk) the VM is always stuck on trying to PXE boot)\n\n[kvm-83-211.el5]\n- Dont try build kvmctl\n- Resolves: bz#632707\n\n[kvm-83-210.el5]\n- Adding load_gs_index to kmod symbol greylist\n- Related: bz#639887\n (CVE-2010-3698 kvm: invalid selector in fs/gs causes kernel panic [rhel-5.6])\n\n[kvm-83-209.el5]\n- kvm-kernel-KVM-Fix-fs-gs-reload-oops-with-invalid-ldt.patch [bz#639887]\n- Resolves: bz#639887\n (CVE-2010-3698 kvm: invalid selector in fs/gs causes kernel panic [rhel-5.6])\n\n[kvm-83-208.el5]\n- Updated kversion to 2.6.18-232.el5 to match build root\n- kvm-kernel-KVM-x86-fix-information-leak-to-userland.patch [bz#649929]\n- Resolves: bz#649929\n (CVE-2010-3881 kvm: arch/x86/kvm/x86.c: reading uninitialized stack memory [5.6])\n- kvm-usb-linux-increase-buffer-for-USB-control-requests.patch [bz#627343]\n- kvm-e1000-Fix-TCP-checksum-overflow-with-TSO.patch [bz#648328]\n- kvm-fix-help-string-to-reflect-the-fact-that-cpu-topolog.patch [bz#611785]\n- kvm-VGA-Don-t-register-deprecated-VBE-range.patch [bz#651715]\n- Resolves: bz#611785\n ([RFE] Support cores/sockets/threads topology configuration)\n- Resolves: bz#627343\n (husb: ctrl buffer too small error received for passthrough usb device, fixed upstream)\n- Resolves: bz#648328\n (TCP checksum overflows in qemus e1000 emulation code when TSO is enabled in guest OS)\n- Resolves: bz#651715\n (qemu-kvm aborted when installing the driver for the newly hotplugged rtl8139 nic)\n\n[kvm-83-207.el5]\n- kvm-Add-drive-readonly-option-to-help-output.patch [bz#645798]\n- Resolves: bz#645798\n (Add drive readonly option to help output)\n\n[kvm-83-206.el5]\n- Updated kversion to 2.6.18-227.el5 to match build root\n- spec: fix/hack dependencies of kvm-kmod-debug\n- Resolves: bz#643272\n- create qemu user/group on %post\n- Resolves: bz#643525\n\n[kvm-83-205.el5]\n- Require right gcrypt version\n- Resolves: bz#503118\n- spec: fix the kmod kernel version checking code\n- Resolves: bz#637267\n- spec: fix module dir name on %install\n- Resolves: bz#517565\n- Build kmod-kvm for kernel-debug too\n- Resolves: bz#517565\n\n[kvm-83-204.el5]\n- kvm-don-t-link-qemu-tools-against-spice-libs.patch [bz#514578]\n- kvm-block-Fix-image-re-open-in-bdrv_commit.patch [bz#640949]\n- Resolves: bz#514578\n (kvm-qemu-img subpackage has dependency on qspice-libs)\n- Resolves: bz#640949\n (Can not commit copy-on-write images data to raw backing-image)\n\n[kvm-83-203.el5]\n- Updated kversion to 2.6.18-226.el5 to match build root\n- Add pci_get_domain_bus_and_slot to kmod symbol greylist\n- Related: bz#539642\n (use native pci_get_bus_and_slot function)\n\n[kvm-83-202.el5]\n- kvm-fix-and-on-russian-keymap.patch [bz#580637]\n- Resolves: bz#580637\n (Incorrect russian vnc keymap)\n\n[kvm-83-201.el5]\n- kvm-kernel-KVM-Fix-reboot-on-Intel-hosts.patch [bz#608709]\n- Resolves: bz#608709\n (reboot(RB_AUTOBOOT) fails if kvm instance is running)\n- kvm-kmod-move-cancel_work_sync-availability-test-to-conf.patch [bz#539642]\n- kvm-kmod-use-native-pci_get_bus_and_slot-if-available.patch [bz#539642]\n- Resolves: bz#539642\n (use native pci_get_bus_and_slot function)\n\n[kvm-83-200.el5]\n- Updated kversion to 2.6.18-225.el5 to match build root\n- kvm-qemu-fix-unsafe-ring-handling.patch [bz#568817]\n- CVE: CVE-2010-0431\n- Resolves: bz#568817\n (CVE-2010-0431 qemu: Insufficient guest provided pointers validation)\n\n[kvm-83-199.el5]\n- Updated kversion to 2.6.18-221.el5 to match build root\n- kvm-kernel-KVM-Prevent-kvm_init-from-corrupting-debugfs-structu.patch [bz#619268]\n- Resolves: bz#619268\n (rmmod kvm modules cause host kernel panic)\n\n[kvm-83-198.el5]\n- run 'make sync' before final ./configure line on build\n- Resolves: bz#632707\n (fix kvm build warnings and enable -Werror)\n\n[kvm-83-197.el5]\n- Updated kversion to 2.6.18-219.el5 to match build root\n- kvm-kill-bogus-return-ret-on-spawn_thread.patch [bz#632707]\n- kvm-virtio-net-fix-format-strings-on-virtio_net_receive2.patch [bz#632707]\n- kvm-kvmtrace-check-for-ftruncate-errors.patch [bz#632707]\n- Add --enable-werror to ./configure command-line [bz#632707]\n- Add ./configure arguments: --enable-kvm-cap-pit --enable-kvm-cap-device-assignment\n- Remove duplicate --enable-spice arg from ./configure \n- Resolves: bz#632707\n (fix kvm build warnings and enable -Werror)\n\n[kvm-83-196.el5]\n- Updated kversion to 2.6.18-215.el5 to match build root\n- kvm-introduce-__rhel5-marker-into-the-migration-save-dat.patch [bz#603026]\n- kvm-block-raw-posix-Factor-out-cdrom_probe_device.patch [bz#609472]\n- kvm-raw-posix-Detect-CDROM-via-ioctl-on-linux.patch [bz#609472]\n- kvm-raw-posix-Don-t-use-file-name-for-host_cdrom-detecti.patch [bz#609472]\n- Resolves: bz#603026\n (CPU save version is now 9, but the format is _very_ different from non-RHEL5 version 9)\n- Resolves: bz#609472\n (qemu-kvm misclassifies a /dev/cd*/* disk device as a CD-ROM)\n\n[kvm-83-195.el5]\n- Updated kversion to 2.6.18-211.el5 to match build root\n- kvm-use-native-cancel_work_sync-function-if-available.patch [bz#629334]\n- Resolves: bz#629334\n (use native cancel_work_sync() function)\n\n[kvm-83-194.el5]\n- Updated kversion to 2.6.18-212.el5 to match build root\n- kvm-Add-cache-unsafe-parameter-to-drive.patch [bz#623484]\n- kvm-qemu-img-convert-Use-cache-unsafe-for-output-image.patch [bz#623484]\n- kvm-fix-cancel_work_sync-conflict-on-compat-code.patch [bz#629333]\n- kvm-bz-547276-e1000-secrc-support.patch [bz#547276]\n- kvm-Use-native-smp_call_function_single-on-RHEL-5.5.patch [bz#533078]\n- kvm-use-native-smp_call_function_many.patch [bz#533078]\n- kvm-qemu-don-t-strip-qemu-img-and-qemu-io-in-make-instal.patch [bz#606394]\n- Resolves: bz#533078\n (use native smp_call_function_many/single functions)\n- Resolves: bz#547276\n (Vmcore cannot be captured by netdump when RHEL3.9 was installed as guest OS on KVM.)\n- Resolves: bz#606394\n ([kvm] debug-info missing from kvm-qemu-img-83-164.el5_5.12)\n- Resolves: bz#623484\n (KVM: qemu-img convert poor performance ( on NFS storage ))\n- Resolves: bz#629333\n (fix build against kernel-devel-2.6.18-214.el5.x86_64: (cancel_work_sync() conflict))\n\n[kvm-83-193.el5]\n- kvm-virtio-net-correct-packet-length-checks.patch [bz#606238]\n- kvm-Fix-segfault-in-mmio-subpage-handling-code.patch [bz#619413]\n- Resolves: bz#606238\n (Virtio: Transfer file caused guest in same vlan abnormally quit)\n- Resolves: bz#619413\n (CVE-2010-2784 qemu: insufficient constraints checking in exec.c:subpage_register() [rhel-5.6])\n\n[kvm-83-192.el5]\n- kvm-Fix-changing-password-using-monitor-over-VNC.patch [bz#569743]\n- kvm-qcow2-Fix-qemu-img-check-segfault-on-corrupted-image.patch [bz#606434]\n- kvm-qcow2-Don-t-try-to-check-tables-that-couldn-t-be-loa.patch [bz#606434]\n- kvm-qemu-img-check-Distinguish-different-kinds-of-errors.patch [bz#606651]\n- kvm-qcow2-Change-check-to-distinguish-error-cases.patch [bz#606651]\n- Resolves: bz#569743\n (Change vnc password caused 'Segmentation fault')\n- Resolves: bz#606434\n ([kvm] segmentation fault when running qemu-img check on faulty image)\n- Resolves: bz#606651\n ([kvm] qemu image check returns cluster errors when using virtIO block (thinly provisioned) during e_no_space events (along with EIO errors))\n\n[kvm-83-191.el5]\n- kvm-kernel-KVM-MMU-fix-conflict-access-permissions-in-direct-sp.patch [bz#615225]\n- Resolves: bz#615225\n (KVM uses wrong permissions for large guest pages)\n\n[kvm-83-190.el5]\n- kvm-New-slots-need-dirty-tracking-enabled-when-migrating.patch [bz#567046]\n- Resolves: bz#567046\n (SPICE - race in KVM/Spice would cause migration to fail (slots are not registered properly?))\n\n[kvm-83-189.el5]\n- kvm-Monitor-Check-for-error-in-do_change.patch [bz#611982]\n- Resolves: bz#611982\n (Monitor doesnt check for 'change' command failure)\n\n[kvm-83-188.el5]\n- kvm-qcow2-Fix-access-after-end-of-array.patch [bz#605701]\n- kvm-qcow2-Don-t-ignore-immediate-read-write-failures.patch [bz#605701]\n- kvm-qcow2-Return-0-errno-in-write_l2_entries.patch [bz#605701]\n- kvm-qcow2-Fix-error-return-code-in-qcow2_alloc_cluster_l.patch [bz#605701]\n- kvm-qcow2-Return-0-errno-in-write_l1_entry.patch [bz#605701]\n- kvm-qcow2-Return-0-errno-in-l2_allocate.patch [bz#605701]\n- kvm-qcow2-Allow-qcow2_get_cluster_offset-to-return-error.patch [bz#605701]\n- kvm-qcow2-Change-l2_load-to-return-0-errno.patch [bz#605701]\n- kvm-qcow2-Return-right-error-code-in-write_refcount_bloc.patch [bz#605701]\n- kvm-qcow2-Fix-corruption-after-error-in-update_refcount.patch [bz#605701]\n- kvm-qcow2-Clear-L2-table-cache-after-write-error.patch [bz#605701]\n- kvm-qcow2-Fix-error-handling-in-l2_allocate.patch [bz#605701]\n- kvm-qcow2-Restore-L1-entry-on-l2_allocate-failure.patch [bz#605701]\n- kvm-qcow2-Allow-get_refcount-to-return-errors.patch [bz#605701]\n- kvm-qcow2-Allow-alloc_clusters_noref-to-return-errors.patch [bz#605701]\n- kvm-qcow2-Return-real-error-code-in-load_refcount_block.patch [bz#605701]\n- kvm-block-Add-bdrv_-p-write_sync.patch [bz#572825]\n- kvm-qcow2-Use-bdrv_-p-write_sync-for-metadata-writes.patch [bz#572825]\n- Resolves: bz#572825\n (qcow2 image corruption when using cache=writeback)\n- Resolves: bz#605701\n (Backport qcow2 fixes to RHEL 5)\n\n[kvm-83-187.el5]\n- kvm-Error-checking.patch [bz#587049]\n- kvm-Avoid-thundering-herd-problem.patch [bz#587049]\n- Resolves: bz#587049\n (qemu posix_aio use pthread_cond_signal instead of broadcast to prevent lock storm)\n\n[kvm-83-186.el5]\n- Updated kversion to 2.6.18-203.el5 to match build root\n- kvm-kernel-KVM-Keep-slot-ID-in-memory-slot-structure.patch [bz#606953]\n- kvm-kernel-KVM-Prevent-internal-slots-from-being-COWed.patch [bz#606953]\n- Resolves: bz#606953\n (fork causes trouble for vcpu threads)\n\n[kvm-83-185.el5]\n- kvm-turn-off-kvmclock-when-resetting-cpu.patch [bz#588878]\n- kvm-raw-posix-Use-pread-pwrite-instead-of-lseek-read-wri.patch [bz#600375]\n- kvm-block-Cache-total_sectors-to-reduce-bdrv_getlength-c.patch [bz#600375]\n- Resolves: bz#588878\n (Rebooting a kernel with kvmclock enabled, into a kernel with kvmclock disabled, causes random crashes)\n- Resolves: bz#600375\n (Excessive lseek() causes severe performance issues with vm disk images over NFS)\n\n[kvm-83-184.el5]\n- kvm-virtio-net-truncating-packet.patch [bz#606238]\n- Resolves: bz#606238\n (Virtio: Transfer file caused guest in same vlan abnormally quit)\n\n[kvm-83-183.el5]\n- kvm-virtio-blk.c-avoid-zero-every-request-structure.patch [bz#598042]\n- kvm-qemu-io-Open-files-read-write-again.patch [bz#601494]\n- Resolves: bz#598042\n (virtio-blk: Avoid zeroing every request structure)\n- Resolves: bz#601494\n (qemu-io: No permission to write image)\n\n[kvm-83-182.el5]\n- kvm-kernel-KVM-Fix-wallclock-version-writing-race.patch [bz#592021]\n- Resolves: bz#592021\n (race condition in pvclock wallclock calculation)\n- kvm-qcow2-Fix-corruption-after-refblock-allocation.patch [bz#598488]\n- Resolves: bz#598488\n (qcow2 corruption bug in refcount table growth)\n\n[kvm-83-181.el5]\n- kvm-kernel-KVM-MMU-bail-out-pagewalk-on-kvm_read_guest-error.patch [bz#588251]\n- Resolves: bz#588251\n (kvm spinning updating a guest pte, unkillable)\n- kvm-qemu-img-rebase-Fix-output-image-corruption.patch [bz#587278]\n- kvm-block-Fix-bdrv_commit.patch [bz#587604]\n- Resolves: bz#587278\n (After re-base snapshot, the file in the snapshot disappeared)\n- Resolves: bz#587604\n (Qcow2 snapshot got corruption after commit using block device)\n\n[kvm-83-180.el5]\n- kvm-qemu-img-open-file-to-be-rebased-with-read-write-per.patch [bz#587605]\n- Resolves: bz#587605\n (Failed to re-base qcow2 snapshot)\n\n[kvm-83-179.el5]\n- Renumber kvm module patches from 501-625 to 1501-1625\n (so the userspace patch numbers can use slots 501 to 1500)\n- kvm-qcow2-Export-synchronous-qcow_read-write-to-avoid-br.patch [bz#542954]\n- Resolves: bz#542954\n (Guest suffers kernel panic when save snapshot then restart guest)\n\n[kvm-83-178.el5]\n- Remove bios-nohotplug.bin from package\n- Related: bz#498774\n (QEMU: Too many devices are available for unplug in Windows XP (and we dont support that))\n\n[kvm-83-177.el5]\n- kvm-Bail-out-when-VCPU_CREATE-fails.patch [bz#587661]\n- Resolves: bz#587661\n (Fix segfault when creating more vcpus than allowed.)\n\n[kvm-83-176.el5]\n- kvm-Revert-fix-wrong-acpi-mapping-rhel5.x-kvm-userspace.patch [bz#576554]\n - patch causes issues when using Spice without QXL on some guest OSes\n [bz#581758 comment 8]\n- Related: bz#576554\n (Win7/32 stuck on 100% CPU (in testing VDI driver unclassified WHQL tests))\n\n[kvm-83-175.el5]\n- kvm-kernel-EPT-accessed-bit-emulation-fixed.patch [bz#582038]\n- Resolves: bz#582038\n (backport EPT accessed bit emulation)\n\n[kvm-83-174.el5]\n- kvm-kernel-Revert-EPT-accessed-bit-emulation.patch [bz#582038]\n (patch fails to build)\n- Related: bz#582038\n (backport EPT accessed bit emulation)\n\n[kvm-83-173.el5]\n- kvm-kernel-EPT-accessed-bit-emulation.patch [bz#582038]\n- Resolves: bz#582038\n (backport EPT accessed bit emulation)\n\n[kvm-83-172.el5]\n- kvm-qcow2-Remove-abort-on-free_clusters-failure.patch [bz#583947]\n- Resolves: bz#583947\n (Guest aborted when make guest stop on write error)\n\n[kvm-83-171.el5]\n- kvm-pcnet-make-subsystem-vendor-id-match-hardware.patch [bz#521247]\n- kvm-read-only-add-RO-feature-macro.patch [bz#510630]\n- kvm-read-only-Pass-the-read-only-attribute-to-the-Guest.patch [bz#510630]\n- kvm-read-only-BDRV_O_FLAGS-changes-default-now-is-read-o.patch [bz#510630]\n- kvm-read-only-qemu-img-Allow-opening-an-image-with-read-.patch [bz#510630]\n- kvm-read-only-Added-readonly-option-to-drive-s-command-l.patch [bz#510630]\n- kvm-read-only-Make-CDROM-a-read-only-drive.patch [bz#510630]\n- kvm-read-only-Disable-fall-back-to-read-only.patch [bz#510630]\n- kvm-read-only-Open-backing-file-read-only-where-possible.patch [bz#510630]\n- kvm-read-only-don-t-rely-on-CDROM-hint-for-read_only-att.patch [bz#510630]\n- kvm-read-only-open-for-read-only-where-possible.patch [bz#510630]\n- kvm-read-only-allow-read-only-CDROM-with-any-interface.patch [bz#510630]\n- Resolves: bz#510630\n (-drive arg has no way to request a read only disk)\n- Resolves: bz#521247\n (emulated pcnet nic in qemu-kvm has wrong PCI subsystem ID for Windows XP driver)\n\n[kvm-83-170.el5]\n- kvm-fix-wrong-acpi-mapping-rhel5.x-kvm-userspace.patch [bz#576554]\n- Resolves: bz#576554\n (Win7/32 stuck on 100% CPU (in testing VDI driver unclassified WHQL tests))\n\n[kvm-83-169.el5]\n- kvm-qcow2-Factor-next_refcount_table_size-out.patch [bz#577225]\n- kvm-qcow2-Rewrite-alloc_refcount_block-grow_refcount_tab.patch [bz#577225]\n- kvm-qcow2-More-checks-for-qemu-img-check.patch [bz#577225]\n- Resolves: bz#577225\n (qcow2 corruption with I/O error during refcount block allocation)\n- Added register_kprobe and unregister_kprobe to the ignored ksyms list\n- Resolves: bz#580410\n (Failed to install kvm for failed dependencies: ksym)\n\n[kvm-83-168.el5]\n- Fix build warnings:\n- kvm-Revert-avoid-leaving-orphaned-swapcache-in-ksm.patch [bz#575585]\n- Related: bz#575585\n (memory reported as used (by SwapCache and by Cache) though no process holds it.)\n- kvm-avoid-leaving-orphaned-swapcache-in-ksm-v2.patch.patch [bz#575585]\n- Resolves: bz#575585\n (memory reported as used (by SwapCache and by Cache) though no process holds it.)\n\n[kvm-83-167.el5]\n- kvm-avoid-leaving-orphaned-swapcache-in-ksm.patch [bz#575585]\n- Resolves: bz#575585\n (memory reported as used (by SwapCache and by Cache) though no process holds it.)\n\n[kvm-83-166.el5]\n- kvm-Build-an-additional-bios-without-hotplug-support.patch [bz#498774]\n- Resolves: bz#498774\n (QEMU: Too many devices are available for unplug in Windows XP (and we dont support that))\n\n[kvm-83-165.el5]\n- Updated kversion to 2.6.18-194.el5 to match build root\n- kvm-kernel-account-only-for-IRQ-injected-into-vcpu0.patch [bz#555727]\n- kvm-kernel-Backport-KVM-fix-irq_source_id-size-verification.patch [bz#520572]\n- kvm-kernel-KVM-x86-disable-paravirt-mmu-reporting.patch [bz#574621]\n- Resolves: bz#520572\n (SR-IOV -- Guest exit and host hang on if boot VM with 8 VFs assigned)\n- Resolves: bz#555727\n (Time drift in win2k3-64bit and win2k8-64bit smp guest)\n- Resolves: bz#574621\n (Linux pvmmu guests (FC11, FC12, etc) crash on boot on AMD hosts with NPT disabled)\n- kvm-kbd-leds-infrastructure.patch [bz#517814]\n- kvm-kbd-leds-ps-2-kbd.patch [bz#517814]\n- kvm-kbd-leds-usb-kbd.patch [bz#517814]\n- kvm-kbd-keds-vnc.patch [bz#517814]\n- Resolves: bz#517814\n (Caps Lock the keys appearance of guest is not synchronous as hosts --view kvm with vnc)\n", u'issued': u'2011-01-20', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELSA-2011-0028.html', u'type': u'self', u'id': None, u'title': u'ELSA-2011-0028'}, {u'href': u'http://linux.oracle.com/cve/CVE-2010-4525.html', u'type': u'cve', u'id': u'CVE-2010-4525', u'title': u'CVE-2010-4525'}], u'_content_type_id': u'erratum', u'_id': u'0b097e50-e510-4832-acce-a17b138942b1', u'from': u'el-errata@oss.oracle.com', u'severity': u'Low', u'title': u' kvm security and bug fix update', u'_ns': u'units_erratum', u'rights': u'Copyright 2011 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 5', u'reboot_suggested': False, u'type': u'security', u'pkglist': [{u'packages': [{u'src': None, u'name': u'kmod-kvm', u'sum': [u'md5', u'0596095dbed7e8e453151f699068bac8'], u'filename': u'kmod-kvm-83-224.0.1.el5.x86_64.rpm', u'epoch': u'0', u'version': u'83', u'release': u'224.0.1.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'kmod-kvm-debug', u'sum': [u'md5', u'f4837e7b25f345e16e94c7f678bfc736'], u'filename': u'kmod-kvm-debug-83-224.0.1.el5.x86_64.rpm', u'epoch': u'0', u'version': u'83', u'release': u'224.0.1.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'kvm', u'sum': [u'md5', u'15f4289ecb604797dab00cc3fa42123c'], u'filename': u'kvm-83-224.0.1.el5.src.rpm', u'epoch': u'0', u'version': u'83', u'release': u'224.0.1.el5', u'arch': u'src'}, {u'src': None, u'name': u'kvm', u'sum': [u'md5', u'a39599646ee4dc8ee2fe9bdd1482ac00'], u'filename': u'kvm-83-224.0.1.el5.x86_64.rpm', u'epoch': u'0', u'version': u'83', u'release': u'224.0.1.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'kvm-qemu-img', u'sum': [u'md5', u'd1762585874960749faaa76a12744142'], u'filename': u'kvm-qemu-img-83-224.0.1.el5.x86_64.rpm', u'epoch': u'0', u'version': u'83', u'release': u'224.0.1.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'kvm-tools', u'sum': [u'md5', u'9e50ae88d10524f2f2eeef90ed4295bd'], u'filename': u'kvm-tools-83-224.0.1.el5.x86_64.rpm', u'epoch': u'0', u'version': u'83', u'release': u'224.0.1.el5', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u'[4.63-5.el5_6.2]\n- fix privilege escalation (CVE-2010-4345, #662012)', u'issued': u'2011-01-17', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELSA-2011-0153.html', u'type': u'self', u'id': None, u'title': u'ELSA-2011-0153'}, {u'href': u'http://linux.oracle.com/cve/CVE-2010-4345.html', u'type': u'cve', u'id': u'CVE-2010-4345', u'title': u'CVE-2010-4345'}], u'_content_type_id': u'erratum', u'_id': u'dda943b8-65d6-4e9d-b198-bf5ae69277b0', u'from': u'el-errata@oss.oracle.com', u'severity': u'Moderate', u'title': u' exim security update', u'_ns': u'units_erratum', u'rights': u'Copyright 2011 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 5', u'reboot_suggested': False, u'type': u'security', u'pkglist': [{u'packages': [{u'src': None, u'name': u'exim', u'sum': [u'md5', u'97c81367f2b5ee5e5fea9d1fda704466'], u'filename': u'exim-4.63-5.el5_6.2.src.rpm', u'epoch': u'0', u'version': u'4.63', u'release': u'5.el5_6.2', u'arch': u'src'}, {u'src': None, u'name': u'exim', u'sum': [u'md5', u'4e7da2f2683669c056abfe0ca8ddba34'], u'filename': u'exim-4.63-5.el5_6.2.x86_64.rpm', u'epoch': u'0', u'version': u'4.63', u'release': u'5.el5_6.2', u'arch': u'x86_64'}, {u'src': None, u'name': u'exim-mon', u'sum': [u'md5', u'd042bd459131206bcfb89552e32ea6f1'], u'filename': u'exim-mon-4.63-5.el5_6.2.x86_64.rpm', u'epoch': u'0', u'version': u'4.63', u'release': u'5.el5_6.2', u'arch': u'x86_64'}, {u'src': None, u'name': u'exim-sa', u'sum': [u'md5', u'24a2037efee9b66bb2990a160abc2c40'], u'filename': u'exim-sa-4.63-5.el5_6.2.x86_64.rpm', u'epoch': u'0', u'version': u'4.63', u'release': u'5.el5_6.2', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u'[3.9.8-33:.1]\n- Applied patch to fix CVE-2010-4267, remote stack overflow\n vulnerability (bug #662740).', u'issued': u'2011-01-24', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELSA-2011-0154.html', u'type': u'self', u'id': None, u'title': u'ELSA-2011-0154'}, {u'href': u'http://linux.oracle.com/cve/CVE-2010-4267.html', u'type': u'cve', u'id': u'CVE-2010-4267', u'title': u'CVE-2010-4267'}], u'_content_type_id': u'erratum', u'_id': u'589ab9e1-e86a-47d8-8e43-a685c29c7a14', u'from': u'el-errata@oss.oracle.com', u'severity': u'Moderate', u'title': u' hplip security update', u'_ns': u'units_erratum', u'rights': u'Copyright 2011 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 6', u'reboot_suggested': False, u'type': u'security', u'pkglist': [{u'packages': [{u'src': None, u'name': u'hpijs', u'sum': [u'md5', u'f8bba772970ba63e7fe11725bb82ba33'], u'filename': u'hpijs-3.9.8-33.el6_0.1.x86_64.rpm', u'epoch': u'1', u'version': u'3.9.8', u'release': u'33.el6_0.1', u'arch': u'x86_64'}, {u'src': None, u'name': u'hplip', u'sum': [u'md5', u'0629e6ec4d08536bca6d450053547379'], u'filename': u'hplip-3.9.8-33.el6_0.1.src.rpm', u'epoch': u'0', u'version': u'3.9.8', u'release': u'33.el6_0.1', u'arch': u'src'}, {u'src': None, u'name': u'hplip', u'sum': [u'md5', u'00d8372fae636fc239d3e02332768a40'], u'filename': u'hplip-3.9.8-33.el6_0.1.x86_64.rpm', u'epoch': u'0', u'version': u'3.9.8', u'release': u'33.el6_0.1', u'arch': u'x86_64'}, {u'src': None, u'name': u'hplip-common', u'sum': [u'md5', u'513855e1215ece3f2d1d4821b251ed8c'], u'filename': u'hplip-common-3.9.8-33.el6_0.1.x86_64.rpm', u'epoch': u'0', u'version': u'3.9.8', u'release': u'33.el6_0.1', u'arch': u'x86_64'}, {u'src': None, u'name': u'hplip-gui', u'sum': [u'md5', u'6f48cb6cdf15f7b843a041b36fe23b2b'], u'filename': u'hplip-gui-3.9.8-33.el6_0.1.x86_64.rpm', u'epoch': u'0', u'version': u'3.9.8', u'release': u'33.el6_0.1', u'arch': u'x86_64'}, {u'src': None, u'name': u'hplip-libs', u'sum': [u'md5', u'cb76c69a6ca1aa6a4b2f9379c127b3a4'], u'filename': u'hplip-libs-3.9.8-33.el6_0.1.i686.rpm', u'epoch': u'0', u'version': u'3.9.8', u'release': u'33.el6_0.1', u'arch': u'i686'}, {u'src': None, u'name': u'hplip-libs', u'sum': [u'md5', u'e74537a83010a9c741a8745a865462f2'], u'filename': u'hplip-libs-3.9.8-33.el6_0.1.x86_64.rpm', u'epoch': u'0', u'version': u'3.9.8', u'release': u'33.el6_0.1', u'arch': u'x86_64'}, {u'src': None, u'name': u'libsane-hpaio', u'sum': [u'md5', u'bef79ddd03035f8537b2b797088c5a03'], u'filename': u'libsane-hpaio-3.9.8-33.el6_0.1.x86_64.rpm', u'epoch': u'0', u'version': u'3.9.8', u'release': u'33.el6_0.1', u'arch': u'x86_64'}], u'name': u'ol6_x86_64_latest', u'short': u'ol6_x86_64_latest'}, {u'packages': [{u'src': None, u'name': u'hpijs', u'sum': [u'md5', u'be01ffe209a671987c425d4438c29693'], u'filename': u'hpijs-1.6.7-6.el5_6.1.x86_64.rpm', u'epoch': u'1', u'version': u'1.6.7', u'release': u'6.el5_6.1', u'arch': u'x86_64'}, {u'src': None, u'name': u'hpijs3', u'sum': [u'md5', u'1e2e4622482a4326bfbe0c77d19dc61d'], u'filename': u'hpijs3-3.9.8-11.el5_6.1.x86_64.rpm', u'epoch': u'1', u'version': u'3.9.8', u'release': u'11.el5_6.1', u'arch': u'x86_64'}, {u'src': None, u'name': u'hplip', u'sum': [u'md5', u'a425aafee3f92b877ced7a05d99293b5'], u'filename': u'hplip-1.6.7-6.el5_6.1.src.rpm', u'epoch': u'0', u'version': u'1.6.7', u'release': u'6.el5_6.1', u'arch': u'src'}, {u'src': None, u'name': u'hplip', u'sum': [u'md5', u'44c42eb157fa59eb830bf146981f1a53'], u'filename': u'hplip-1.6.7-6.el5_6.1.x86_64.rpm', u'epoch': u'0', u'version': u'1.6.7', u'release': u'6.el5_6.1', u'arch': u'x86_64'}, {u'src': None, u'name': u'hplip3', u'sum': [u'md5', u'edd0f48e2b2fd543113ac3db601eb7f5'], u'filename': u'hplip3-3.9.8-11.el5_6.1.src.rpm', u'epoch': u'0', u'version': u'3.9.8', u'release': u'11.el5_6.1', u'arch': u'src'}, {u'src': None, u'name': u'hplip3', u'sum': [u'md5', u'b7972f9b4dc8fd83583968344ad37570'], u'filename': u'hplip3-3.9.8-11.el5_6.1.x86_64.rpm', u'epoch': u'0', u'version': u'3.9.8', u'release': u'11.el5_6.1', u'arch': u'x86_64'}, {u'src': None, u'name': u'hplip3-common', u'sum': [u'md5', u'fe8ecdbc35d63c31ee86ce058b7f46f7'], u'filename': u'hplip3-common-3.9.8-11.el5_6.1.x86_64.rpm', u'epoch': u'0', u'version': u'3.9.8', u'release': u'11.el5_6.1', u'arch': u'x86_64'}, {u'src': None, u'name': u'hplip3-gui', u'sum': [u'md5', u'd983ef1dc36fa94e65cb5264564e558d'], u'filename': u'hplip3-gui-3.9.8-11.el5_6.1.x86_64.rpm', u'epoch': u'0', u'version': u'3.9.8', u'release': u'11.el5_6.1', u'arch': u'x86_64'}, {u'src': None, u'name': u'hplip3-libs', u'sum': [u'md5', u'344cdcdc4914aed5dc73e7fcab42bd08'], u'filename': u'hplip3-libs-3.9.8-11.el5_6.1.x86_64.rpm', u'epoch': u'0', u'version': u'3.9.8', u'release': u'11.el5_6.1', u'arch': u'x86_64'}, {u'src': None, u'name': u'libsane-hpaio', u'sum': [u'md5', u'eb8f3249f355446cc82b175d8b964455'], u'filename': u'libsane-hpaio-1.6.7-6.el5_6.1.x86_64.rpm', u'epoch': u'0', u'version': u'1.6.7', u'release': u'6.el5_6.1', u'arch': u'x86_64'}, {u'src': None, u'name': u'libsane-hpaio3', u'sum': [u'md5', u'e4f8ea65e3c9f365ed2f718562d067fb'], u'filename': u'libsane-hpaio3-3.9.8-11.el5_6.1.x86_64.rpm', u'epoch': u'0', u'version': u'3.9.8', u'release': u'11.el5_6.1', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u'\n[2.6.18-238.1.1.0.1.el5]\n- fix filp_close() race (Joe Jin) [orabug 10335998]\n- fix missing aio_complete() in end_io (Joel Becker) [orabug 10365195]\n- make xenkbd.abs_pointer=1 by default [orabug 67188919]\n- [xen] check to see if hypervisor supports memory reservation change\n (Chuck Anderson) [orabug 7556514]\n- [net] Enable entropy for bnx2,bnx2x,e1000e,igb,ixgb,ixgbe,ixgbevf (John Sobecki)\n [orabug 10315433]\n- [NET] Add xen pv netconsole support (Tina Yang) [orabug 6993043] [bz 7258]\n- [mm] shrink_zone patch (John Sobecki,Chris Mason) [orabug 6086839]\n- fix aacraid not to reset during kexec (Joe Jin) [orabug 8516042]\n- [rds] Patch rds to 1.4.2-20 (Andy Grover) [orabug 9471572, 9344105]\n RDS: Fix BUG_ONs to not fire when in a tasklet\n ipoib: Fix lockup of the tx queue\n RDS: Do not call set_page_dirty() with irqs off (Sherman Pun)\n RDS: Properly unmap when getting a remote access error (Tina Yang)\n RDS: Fix locking in rds_send_drop_to()\n- [qla] fix qla not to query hccr (Guru Anbalagane) [Orabug 8746702]\n- [nfs] too many getattr and access calls after direct I/O [orabug 9348191]\n- [xen] PVHVM guest with PoD crashes under memory pressure (Chuck Anderson)\n [orabug 9107465]\n- [xen] PV guest with FC HBA hangs during shutdown (Chuck Anderson)\n [orabug 9764220]\n- Support 256GB+ memory for pv guest (Mukesh Rathor) [orabug 9450615]\n- fix overcommit memory to use percpu_counter for el5 (KOSAKI Motohiro,\n Guru Anbalagane) [orabug 6124033]\n- [ipmi] make configurable timeouts for kcs of ipmi [orabug 9752208]\n- [ib] fix memory corruption (Andy Grover) [orabug 9972346]\n- [aio] patch removes limit on number of retries (Srinivas Eeda) [orabug 10044782]\n- [loop] Do not call loop_unplug for not configured loop device (orabug 10314497)\n\n[2.6.18-238.1.1.el5]\n- [scsi] megaraid: give FW more time to recover from reset (Tomas Henzl) [667141 665427]\n- [fs] gfs2: fix statfs error after gfs2_grow (Robert S Peterson) [666792 660661]\n- [mm] prevent file lock corruption using popen(3) (Larry Woodman) [667050 664931]\n- [net] sctp: fix panic from bad socket lock on icmp error (Neil Horman) [665476 665477] {CVE-2010-4526}', u'issued': u'2011-02-04', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELSA-2011-0163.html', u'type': u'self', u'id': None, u'title': u'ELSA-2011-0163'}, {u'href': u'http://linux.oracle.com/cve/CVE-2010-4526.html', u'type': u'cve', u'id': u'CVE-2010-4526', u'title': u'CVE-2010-4526'}], u'_content_type_id': u'erratum', u'_id': u'83341e48-02f0-4a35-9e38-cf1daaf07754', u'from': u'el-errata@oss.oracle.com', u'severity': u'Important', u'title': u' kernel security and bug fix update', u'_ns': u'units_erratum', u'rights': u'Copyright 2011 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 5', u'reboot_suggested': False, u'type': u'security', u'pkglist': [{u'packages': [{u'src': None, u'name': u'kernel', u'sum': [u'md5', u'd5baf2b09ed3429680053cb5d313ca50'], u'filename': u'kernel-2.6.18-238.1.1.0.1.el5.src.rpm', u'epoch': u'0', u'version': u'2.6.18', u'release': u'238.1.1.0.1.el5', u'arch': u'src'}, {u'src': None, u'name': u'kernel', u'sum': [u'md5', u'6ce334df6ab1552c1f9d261049038e3e'], u'filename': u'kernel-2.6.18-238.1.1.0.1.el5.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.18', u'release': u'238.1.1.0.1.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'kernel-debug', u'sum': [u'md5', u'014a06a62bb00f6da6cea51a92c22eb0'], u'filename': u'kernel-debug-2.6.18-238.1.1.0.1.el5.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.18', u'release': u'238.1.1.0.1.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'kernel-debug-devel', u'sum': [u'md5', u'88888277b31ec0bf345da873c0b84b49'], u'filename': u'kernel-debug-devel-2.6.18-238.1.1.0.1.el5.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.18', u'release': u'238.1.1.0.1.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'kernel-devel', u'sum': [u'md5', u'b0b6ca95ad21d7d8d360304b42abf472'], u'filename': u'kernel-devel-2.6.18-238.1.1.0.1.el5.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.18', u'release': u'238.1.1.0.1.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'kernel-doc', u'sum': [u'md5', u'2e452fc33a69e12173c3a16d2c8e4c99'], u'filename': u'kernel-doc-2.6.18-238.1.1.0.1.el5.noarch.rpm', u'epoch': u'0', u'version': u'2.6.18', u'release': u'238.1.1.0.1.el5', u'arch': u'noarch'}, {u'src': None, u'name': u'kernel-headers', u'sum': [u'md5', u'24b0f407549d9aac2830c08712d9e543'], u'filename': u'kernel-headers-2.6.18-238.1.1.0.1.el5.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.18', u'release': u'238.1.1.0.1.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'kernel-xen', u'sum': [u'md5', u'097cb9ba22f1ade9e2bbf5d74d318ae9'], u'filename': u'kernel-xen-2.6.18-238.1.1.0.1.el5.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.18', u'release': u'238.1.1.0.1.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'kernel-xen-devel', u'sum': [u'md5', u'771c956133cd809300465ca23e04c487'], u'filename': u'kernel-xen-devel-2.6.18-238.1.1.0.1.el5.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.18', u'release': u'238.1.1.0.1.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'ocfs2-2.6.18-238.1.1.0.1.el5', u'sum': [u'md5', u'a8e598e00dbe6e00aea50fd9462790c6'], u'filename': u'ocfs2-2.6.18-238.1.1.0.1.el5-1.4.8-2.el5.src.rpm', u'epoch': u'0', u'version': u'1.4.8', u'release': u'2.el5', u'arch': u'src'}, {u'src': None, u'name': u'ocfs2-2.6.18-238.1.1.0.1.el5', u'sum': [u'md5', u'eaff8b8b6db7d4b10db08cb86d0613d1'], u'filename': u'ocfs2-2.6.18-238.1.1.0.1.el5-1.4.8-2.el5.x86_64.rpm', u'epoch': u'0', u'version': u'1.4.8', u'release': u'2.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'ocfs2-2.6.18-238.1.1.0.1.el5debug', u'sum': [u'md5', u'dc9a48aa7f55607ab2c2c359a2eeadcd'], u'filename': u'ocfs2-2.6.18-238.1.1.0.1.el5debug-1.4.8-2.el5.x86_64.rpm', u'epoch': u'0', u'version': u'1.4.8', u'release': u'2.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'ocfs2-2.6.18-238.1.1.0.1.el5xen', u'sum': [u'md5', u'ec63d2bf5dae2d5f8f12dbea061c28a0'], u'filename': u'ocfs2-2.6.18-238.1.1.0.1.el5xen-1.4.8-2.el5.x86_64.rpm', u'epoch': u'0', u'version': u'1.4.8', u'release': u'2.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'oracleasm-2.6.18-238.1.1.0.1.el5', u'sum': [u'md5', u'fb456703eae54846b10b2566ec9d2722'], u'filename': u'oracleasm-2.6.18-238.1.1.0.1.el5-2.0.5-1.el5.src.rpm', u'epoch': u'0', u'version': u'2.0.5', u'release': u'1.el5', u'arch': u'src'}, {u'src': None, u'name': u'oracleasm-2.6.18-238.1.1.0.1.el5', u'sum': [u'md5', u'af3fa23f35c23e93183fa1494381270c'], u'filename': u'oracleasm-2.6.18-238.1.1.0.1.el5-2.0.5-1.el5.x86_64.rpm', u'epoch': u'0', u'version': u'2.0.5', u'release': u'1.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'oracleasm-2.6.18-238.1.1.0.1.el5debug', u'sum': [u'md5', u'e15539d82eb0ca2c6ef0da5f2525ca84'], u'filename': u'oracleasm-2.6.18-238.1.1.0.1.el5debug-2.0.5-1.el5.x86_64.rpm', u'epoch': u'0', u'version': u'2.0.5', u'release': u'1.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'oracleasm-2.6.18-238.1.1.0.1.el5xen', u'sum': [u'md5', u'3e8b09618c146ba027fd45d7ac709c3f'], u'filename': u'oracleasm-2.6.18-238.1.1.0.1.el5xen-2.0.5-1.el5.x86_64.rpm', u'epoch': u'0', u'version': u'2.0.5', u'release': u'1.el5', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u'[0.56.13-4]\n- Correctly mark the LDAP default password value as encrypted (CVE-2011-0002)\n Resolves: #668020', u'issued': u'2011-01-20', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELSA-2011-0170.html', u'type': u'self', u'id': None, u'title': u'ELSA-2011-0170'}, {u'href': u'http://linux.oracle.com/cve/CVE-2011-0002.html', u'type': u'cve', u'id': u'CVE-2011-0002', u'title': u'CVE-2011-0002'}], u'_content_type_id': u'erratum', u'_id': u'4e4e6d02-a75c-4899-bcaf-2f9f30b6db92', u'from': u'el-errata@oss.oracle.com', u'severity': u'Moderate', u'title': u' libuser security update', u'_ns': u'units_erratum', u'rights': u'Copyright 2011 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 6', u'reboot_suggested': False, u'type': u'security', u'pkglist': [{u'packages': [{u'src': None, u'name': u'libuser', u'sum': [u'md5', u'398f1a24a2df4cf5d9b52f747e8c3b0f'], u'filename': u'libuser-0.56.13-4.el6_0.1.i686.rpm', u'epoch': u'0', u'version': u'0.56.13', u'release': u'4.el6_0.1', u'arch': u'i686'}, {u'src': None, u'name': u'libuser', u'sum': [u'md5', u'1d1424444008c256a5ca1a7a46683ab4'], u'filename': u'libuser-0.56.13-4.el6_0.1.src.rpm', u'epoch': u'0', u'version': u'0.56.13', u'release': u'4.el6_0.1', u'arch': u'src'}, {u'src': None, u'name': u'libuser', u'sum': [u'md5', u'60d0e37029a43931a727c3de3ce85da1'], u'filename': u'libuser-0.56.13-4.el6_0.1.x86_64.rpm', u'epoch': u'0', u'version': u'0.56.13', u'release': u'4.el6_0.1', u'arch': u'x86_64'}, {u'src': None, u'name': u'libuser-devel', u'sum': [u'md5', u'095e4ecc4f811856f6beab51cf44ba65'], u'filename': u'libuser-devel-0.56.13-4.el6_0.1.i686.rpm', u'epoch': u'0', u'version': u'0.56.13', u'release': u'4.el6_0.1', u'arch': u'i686'}, {u'src': None, u'name': u'libuser-devel', u'sum': [u'md5', u'dc1b91351fa77887b98a9bcef5577619'], u'filename': u'libuser-devel-0.56.13-4.el6_0.1.x86_64.rpm', u'epoch': u'0', u'version': u'0.56.13', u'release': u'4.el6_0.1', u'arch': u'x86_64'}, {u'src': None, u'name': u'libuser-python', u'sum': [u'md5', u'b2adeae9be7c4f744f6d9fe2acd1cc6c'], u'filename': u'libuser-python-0.56.13-4.el6_0.1.x86_64.rpm', u'epoch': u'0', u'version': u'0.56.13', u'release': u'4.el6_0.1', u'arch': u'x86_64'}], u'name': u'ol6_x86_64_latest', u'short': u'ol6_x86_64_latest'}, {u'packages': [{u'src': None, u'name': u'libuser', u'sum': [u'md5', u'8b103da5c9207247a83b33943ff93fe1'], u'filename': u'libuser-0.54.7-2.1.el5_5.2.i386.rpm', u'epoch': u'0', u'version': u'0.54.7', u'release': u'2.1.el5_5.2', u'arch': u'i386'}, {u'src': None, u'name': u'libuser', u'sum': [u'md5', u'79cbdac1f3f006022407d299479bc2b3'], u'filename': u'libuser-0.54.7-2.1.el5_5.2.src.rpm', u'epoch': u'0', u'version': u'0.54.7', u'release': u'2.1.el5_5.2', u'arch': u'src'}, {u'src': None, u'name': u'libuser', u'sum': [u'md5', u'621446d5c8d138de6eba45bba77c07de'], u'filename': u'libuser-0.54.7-2.1.el5_5.2.x86_64.rpm', u'epoch': u'0', u'version': u'0.54.7', u'release': u'2.1.el5_5.2', u'arch': u'x86_64'}, {u'src': None, u'name': u'libuser-devel', u'sum': [u'md5', u'c07171bca9cdde6cadd46160ecf3c494'], u'filename': u'libuser-devel-0.54.7-2.1.el5_5.2.i386.rpm', u'epoch': u'0', u'version': u'0.54.7', u'release': u'2.1.el5_5.2', u'arch': u'i386'}, {u'src': None, u'name': u'libuser-devel', u'sum': [u'md5', u'20dc7354bb1e4448ed9b102900812da1'], u'filename': u'libuser-devel-0.54.7-2.1.el5_5.2.x86_64.rpm', u'epoch': u'0', u'version': u'0.54.7', u'release': u'2.1.el5_5.2', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u'\n[1:1.6.0.0-1.17.b17.0.1.el5]\n- Add oracle-enterprise.patch\n\n[1:1.6.0.0-1.17.b17.el5]\n- Updated to 1.7.7 tarball\n- Resolves: bz668487\n- Also resolves bz668488', u'issued': u'2011-01-25', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELSA-2011-0176.html', u'type': u'self', u'id': None, u'title': u'ELSA-2011-0176'}, {u'href': u'http://linux.oracle.com/cve/CVE-2010-3860.html', u'type': u'cve', u'id': u'CVE-2010-3860', u'title': u'CVE-2010-3860'}, {u'href': u'http://linux.oracle.com/cve/CVE-2010-4351.html', u'type': u'cve', u'id': u'CVE-2010-4351', u'title': u'CVE-2010-4351'}], u'_content_type_id': u'erratum', u'_id': u'a813ce5d-6d73-4058-b7e7-272bde2eed15', u'from': u'el-errata@oss.oracle.com', u'severity': u'Moderate', u'title': u' java-1.6.0-openjdk security update', u'_ns': u'units_erratum', u'rights': u'Copyright 2011 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 5', u'reboot_suggested': False, u'type': u'security', u'pkglist': [{u'packages': [{u'src': None, u'name': u'java-1.6.0-openjdk', u'sum': [u'md5', u'4058f5f46fc3996e96728ad090b09f54'], u'filename': u'java-1.6.0-openjdk-1.6.0.0-1.17.b17.0.1.el5.src.rpm', u'epoch': u'1', u'version': u'1.6.0.0', u'release': u'1.17.b17.0.1.el5', u'arch': u'src'}, {u'src': None, u'name': u'java-1.6.0-openjdk', u'sum': [u'md5', u'cc076b4f1a4b3ad44e7efbdde5aa7029'], u'filename': u'java-1.6.0-openjdk-1.6.0.0-1.17.b17.0.1.el5.x86_64.rpm', u'epoch': u'1', u'version': u'1.6.0.0', u'release': u'1.17.b17.0.1.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'java-1.6.0-openjdk-demo', u'sum': [u'md5', u'b095e2691021f1a8ba445074131f2b59'], u'filename': u'java-1.6.0-openjdk-demo-1.6.0.0-1.17.b17.0.1.el5.x86_64.rpm', u'epoch': u'1', u'version': u'1.6.0.0', u'release': u'1.17.b17.0.1.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'java-1.6.0-openjdk-devel', u'sum': [u'md5', u'4de865204ecaf560ac57367b0b2a55d9'], u'filename': u'java-1.6.0-openjdk-devel-1.6.0.0-1.17.b17.0.1.el5.x86_64.rpm', u'epoch': u'1', u'version': u'1.6.0.0', u'release': u'1.17.b17.0.1.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'java-1.6.0-openjdk-javadoc', u'sum': [u'md5', u'17f9c69f335a5e75edac8bffc1905ef4'], u'filename': u'java-1.6.0-openjdk-javadoc-1.6.0.0-1.17.b17.0.1.el5.x86_64.rpm', u'epoch': u'1', u'version': u'1.6.0.0', u'release': u'1.17.b17.0.1.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'java-1.6.0-openjdk-src', u'sum': [u'md5', u'a58d21a74e52acdc9a748e789cb899a1'], u'filename': u'java-1.6.0-openjdk-src-1.6.0.0-1.17.b17.0.1.el5.x86_64.rpm', u'epoch': u'1', u'version': u'1.6.0.0', u'release': u'1.17.b17.0.1.el5', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u'[1.28.1-3.el6_0.3]\n- Fix a division by zero found in testing\n\n[1.28.1-3.el6_0.2]\n- Use -fno-strict-aliasing for C++, too\n- Escape macros in %changelog\n\n[1.28.1-3.el6_0.1]\n- Prevent heap corruption with malformed fonts. (CVE-2011-0020)\n- Resolves: #671529', u'issued': u'2011-01-27', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELSA-2011-0180.html', u'type': u'self', u'id': None, u'title': u'ELSA-2011-0180'}, {u'href': u'http://linux.oracle.com/cve/CVE-2011-0020.html', u'type': u'cve', u'id': u'CVE-2011-0020', u'title': u'CVE-2011-0020'}], u'_content_type_id': u'erratum', u'_id': u'a35a5e76-9f0d-4289-98ed-e2415d3a1739', u'from': u'el-errata@oss.oracle.com', u'severity': u'Moderate', u'title': u' pango security update', u'_ns': u'units_erratum', u'rights': u'Copyright 2011 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 6', u'reboot_suggested': False, u'type': u'security', u'pkglist': [{u'packages': [{u'src': None, u'name': u'pango', u'sum': [u'md5', u'09e618da495bc22f9b89dfe9406ec3f2'], u'filename': u'pango-1.28.1-3.el6_0.3.i686.rpm', u'epoch': u'0', u'version': u'1.28.1', u'release': u'3.el6_0.3', u'arch': u'i686'}, {u'src': None, u'name': u'pango', u'sum': [u'md5', u'7d87d752bbf2c4f20abae66a9a4443b5'], u'filename': u'pango-1.28.1-3.el6_0.3.src.rpm', u'epoch': u'0', u'version': u'1.28.1', u'release': u'3.el6_0.3', u'arch': u'src'}, {u'src': None, u'name': u'pango', u'sum': [u'md5', u'c24c2a4785d178870c3a541752747c3e'], u'filename': u'pango-1.28.1-3.el6_0.3.x86_64.rpm', u'epoch': u'0', u'version': u'1.28.1', u'release': u'3.el6_0.3', u'arch': u'x86_64'}, {u'src': None, u'name': u'pango-devel', u'sum': [u'md5', u'3e18d7495b99704f2a916d747aa94e7b'], u'filename': u'pango-devel-1.28.1-3.el6_0.3.i686.rpm', u'epoch': u'0', u'version': u'1.28.1', u'release': u'3.el6_0.3', u'arch': u'i686'}, {u'src': None, u'name': u'pango-devel', u'sum': [u'md5', u'46deedd061335f793d98f4f33a2da7d7'], u'filename': u'pango-devel-1.28.1-3.el6_0.3.x86_64.rpm', u'epoch': u'0', u'version': u'1.28.1', u'release': u'3.el6_0.3', u'arch': u'x86_64'}], u'name': u'ol6_x86_64_latest', u'short': u'ol6_x86_64_latest'}, {u'packages': [{u'src': None, u'name': u'pango', u'sum': [u'md5', u'5e87ff730c9790f43e1f6356eb109571'], u'filename': u'pango-1.14.9-8.0.1.el5_6.2.i386.rpm', u'epoch': u'0', u'version': u'1.14.9', u'release': u'8.0.1.el5_6.2', u'arch': u'i386'}, {u'src': None, u'name': u'pango', u'sum': [u'md5', u'8c5928af9e409f7f14d71cc3bcdf468d'], u'filename': u'pango-1.14.9-8.0.1.el5_6.2.src.rpm', u'epoch': u'0', u'version': u'1.14.9', u'release': u'8.0.1.el5_6.2', u'arch': u'src'}, {u'src': None, u'name': u'pango', u'sum': [u'md5', u'c5e4f772c438a3f1ad0a34edda766e55'], u'filename': u'pango-1.14.9-8.0.1.el5_6.2.x86_64.rpm', u'epoch': u'0', u'version': u'1.14.9', u'release': u'8.0.1.el5_6.2', u'arch': u'x86_64'}, {u'src': None, u'name': u'pango-devel', u'sum': [u'md5', u'085504aa93a9c35d66096aa81e8e1422'], u'filename': u'pango-devel-1.14.9-8.0.1.el5_6.2.i386.rpm', u'epoch': u'0', u'version': u'1.14.9', u'release': u'8.0.1.el5_6.2', u'arch': u'i386'}, {u'src': None, u'name': u'pango-devel', u'sum': [u'md5', u'264cf337659a7be10bbe255a2ddb77c4'], u'filename': u'pango-devel-1.14.9-8.0.1.el5_6.2.x86_64.rpm', u'epoch': u'0', u'version': u'1.14.9', u'release': u'8.0.1.el5_6.2', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u'\n[5.3.3-1.1]\n- add security fixes for CVE-2010-3710, CVE-2010-4156,\n CVE-2010-4645 (#670463)', u'issued': u'2011-02-03', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELSA-2011-0196.html', u'type': u'self', u'id': None, u'title': u'ELSA-2011-0196'}, {u'href': u'http://linux.oracle.com/cve/CVE-2010-3710.html', u'type': u'cve', u'id': u'CVE-2010-3710', u'title': u'CVE-2010-3710'}, {u'href': u'http://linux.oracle.com/cve/CVE-2010-4156.html', u'type': u'cve', u'id': u'CVE-2010-4156', u'title': u'CVE-2010-4156'}, {u'href': u'http://linux.oracle.com/cve/CVE-2010-4645.html', u'type': u'cve', u'id': u'CVE-2010-4645', u'title': u'CVE-2010-4645'}], u'_content_type_id': u'erratum', u'_id': u'20d56622-6b0f-4c08-9b4e-a0cd5b152d6b', u'from': u'el-errata@oss.oracle.com', u'severity': u'Moderate', u'title': u' php53 security update', u'_ns': u'units_erratum', u'rights': u'Copyright 2011 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 5', u'reboot_suggested': False, u'type': u'security', u'pkglist': [{u'packages': [{u'src': None, u'name': u'php53', u'sum': [u'md5', u'69eb2016b74fa85e1293e5d2c1b07306'], u'filename': u'php53-5.3.3-1.el5_6.1.src.rpm', u'epoch': u'0', u'version': u'5.3.3', u'release': u'1.el5_6.1', u'arch': u'src'}, {u'src': None, u'name': u'php53', u'sum': [u'md5', u'6993f01d4a3a9981bb3cdb08f7c57f3b'], u'filename': u'php53-5.3.3-1.el5_6.1.x86_64.rpm', u'epoch': u'0', u'version': u'5.3.3', u'release': u'1.el5_6.1', u'arch': u'x86_64'}, {u'src': None, u'name': u'php53-bcmath', u'sum': [u'md5', u'e75517136d6b366b6540897a59a2ecd1'], u'filename': u'php53-bcmath-5.3.3-1.el5_6.1.x86_64.rpm', u'epoch': u'0', u'version': u'5.3.3', u'release': u'1.el5_6.1', u'arch': u'x86_64'}, {u'src': None, u'name': u'php53-cli', u'sum': [u'md5', u'f2a1308dbfa8cc7e992ace9ea7b1c49c'], u'filename': u'php53-cli-5.3.3-1.el5_6.1.x86_64.rpm', u'epoch': u'0', u'version': u'5.3.3', u'release': u'1.el5_6.1', u'arch': u'x86_64'}, {u'src': None, u'name': u'php53-common', u'sum': [u'md5', u'77f1ab2cc9f01e64502b98b0731f9cea'], u'filename': u'php53-common-5.3.3-1.el5_6.1.x86_64.rpm', u'epoch': u'0', u'version': u'5.3.3', u'release': u'1.el5_6.1', u'arch': u'x86_64'}, {u'src': None, u'name': u'php53-dba', u'sum': [u'md5', u'c429eb6c3b77e73039de1ad819b5833a'], u'filename': u'php53-dba-5.3.3-1.el5_6.1.x86_64.rpm', u'epoch': u'0', u'version': u'5.3.3', u'release': u'1.el5_6.1', u'arch': u'x86_64'}, {u'src': None, u'name': u'php53-devel', u'sum': [u'md5', u'31eeaac1a2c55fab3b8d5e160fe4c954'], u'filename': u'php53-devel-5.3.3-1.el5_6.1.x86_64.rpm', u'epoch': u'0', u'version': u'5.3.3', u'release': u'1.el5_6.1', u'arch': u'x86_64'}, {u'src': None, u'name': u'php53-gd', u'sum': [u'md5', u'7269e21251e783a8d4e1afa0cbdfcfc1'], u'filename': u'php53-gd-5.3.3-1.el5_6.1.x86_64.rpm', u'epoch': u'0', u'version': u'5.3.3', u'release': u'1.el5_6.1', u'arch': u'x86_64'}, {u'src': None, u'name': u'php53-imap', u'sum': [u'md5', u'dc0b2b57d47db277949527440b1359dd'], u'filename': u'php53-imap-5.3.3-1.el5_6.1.x86_64.rpm', u'epoch': u'0', u'version': u'5.3.3', u'release': u'1.el5_6.1', u'arch': u'x86_64'}, {u'src': None, u'name': u'php53-intl', u'sum': [u'md5', u'7851389bb8bf62dca0c14fd697ad5ea9'], u'filename': u'php53-intl-5.3.3-1.el5_6.1.x86_64.rpm', u'epoch': u'0', u'version': u'5.3.3', u'release': u'1.el5_6.1', u'arch': u'x86_64'}, {u'src': None, u'name': u'php53-ldap', u'sum': [u'md5', u'16e47964896f15f70d400237bbae822f'], u'filename': u'php53-ldap-5.3.3-1.el5_6.1.x86_64.rpm', u'epoch': u'0', u'version': u'5.3.3', u'release': u'1.el5_6.1', u'arch': u'x86_64'}, {u'src': None, u'name': u'php53-mbstring', u'sum': [u'md5', u'342d064615999fe41db252adaff86953'], u'filename': u'php53-mbstring-5.3.3-1.el5_6.1.x86_64.rpm', u'epoch': u'0', u'version': u'5.3.3', u'release': u'1.el5_6.1', u'arch': u'x86_64'}, {u'src': None, u'name': u'php53-mysql', u'sum': [u'md5', u'417bf91c2d81579e82e0f544d6aa5f3a'], u'filename': u'php53-mysql-5.3.3-1.el5_6.1.x86_64.rpm', u'epoch': u'0', u'version': u'5.3.3', u'release': u'1.el5_6.1', u'arch': u'x86_64'}, {u'src': None, u'name': u'php53-odbc', u'sum': [u'md5', u'7905d03db968bf192973fd6d1bf08bf8'], u'filename': u'php53-odbc-5.3.3-1.el5_6.1.x86_64.rpm', u'epoch': u'0', u'version': u'5.3.3', u'release': u'1.el5_6.1', u'arch': u'x86_64'}, {u'src': None, u'name': u'php53-pdo', u'sum': [u'md5', u'03aacc705a36e42fc1e5fe1b5c4cf6b0'], u'filename': u'php53-pdo-5.3.3-1.el5_6.1.x86_64.rpm', u'epoch': u'0', u'version': u'5.3.3', u'release': u'1.el5_6.1', u'arch': u'x86_64'}, {u'src': None, u'name': u'php53-pgsql', u'sum': [u'md5', u'734519253b9241b0ee6e0c1a8d8e061c'], u'filename': u'php53-pgsql-5.3.3-1.el5_6.1.x86_64.rpm', u'epoch': u'0', u'version': u'5.3.3', u'release': u'1.el5_6.1', u'arch': u'x86_64'}, {u'src': None, u'name': u'php53-process', u'sum': [u'md5', u'be1bd90718b7005abd981d2e5a8745c2'], u'filename': u'php53-process-5.3.3-1.el5_6.1.x86_64.rpm', u'epoch': u'0', u'version': u'5.3.3', u'release': u'1.el5_6.1', u'arch': u'x86_64'}, {u'src': None, u'name': u'php53-pspell', u'sum': [u'md5', u'2478831a97709f261db589b8fe1cc930'], u'filename': u'php53-pspell-5.3.3-1.el5_6.1.x86_64.rpm', u'epoch': u'0', u'version': u'5.3.3', u'release': u'1.el5_6.1', u'arch': u'x86_64'}, {u'src': None, u'name': u'php53-snmp', u'sum': [u'md5', u'03a7aa28f76bcfa201c03214c364d993'], u'filename': u'php53-snmp-5.3.3-1.el5_6.1.x86_64.rpm', u'epoch': u'0', u'version': u'5.3.3', u'release': u'1.el5_6.1', u'arch': u'x86_64'}, {u'src': None, u'name': u'php53-soap', u'sum': [u'md5', u'd699beae6eeeb129e156192ac48473ac'], u'filename': u'php53-soap-5.3.3-1.el5_6.1.x86_64.rpm', u'epoch': u'0', u'version': u'5.3.3', u'release': u'1.el5_6.1', u'arch': u'x86_64'}, {u'src': None, u'name': u'php53-xml', u'sum': [u'md5', u'aa464fd31517f5c4896b8de575659b80'], u'filename': u'php53-xml-5.3.3-1.el5_6.1.x86_64.rpm', u'epoch': u'0', u'version': u'5.3.3', u'release': u'1.el5_6.1', u'arch': u'x86_64'}, {u'src': None, u'name': u'php53-xmlrpc', u'sum': [u'md5', u'57bf7d7462b5fd4c3ef0a8a1bb719a2c'], u'filename': u'php53-xmlrpc-5.3.3-1.el5_6.1.x86_64.rpm', u'epoch': u'0', u'version': u'5.3.3', u'release': u'1.el5_6.1', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u"[8.4.7-1.el6_0.1]\n- Update to PostgreSQL 8.4.7, for various fixes described at\n http://www.postgresql.org/docs/8.4/static/release-8-4-7.html\n http://www.postgresql.org/docs/8.4/static/release-8-4-6.html\n including the fix for CVE-2010-4015\nResolves: #672634\n\n[8.4.5-1.el6_0.2]\n- Ensure we don't package any .gitignore files from the source tarball (650913)\n\n[8.4.5-1.el6_0.1]\n- Update to PostgreSQL 8.4.5, for various fixes described at\n http://www.postgresql.org/docs/8.4/static/release-8-4-5.html\n including the fix for CVE-2010-3433\nResolves: #640069\n- Duplicate COPYRIGHT in -libs subpackage, per revised packaging guidelines", u'issued': u'2011-02-03', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELSA-2011-0197.html', u'type': u'self', u'id': None, u'title': u'ELSA-2011-0197'}, {u'href': u'http://linux.oracle.com/cve/CVE-2010-4015.html', u'type': u'cve', u'id': u'CVE-2010-4015', u'title': u'CVE-2010-4015'}], u'_content_type_id': u'erratum', u'_id': u'3c5fda02-31e3-448e-aa58-178678d3553b', u'from': u'el-errata@oss.oracle.com', u'severity': u'Moderate', u'title': u' postgresql security update', u'_ns': u'units_erratum', u'rights': u'Copyright 2011 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 6', u'reboot_suggested': False, u'type': u'security', u'pkglist': [{u'packages': [{u'src': None, u'name': u'postgresql', u'sum': [u'md5', u'88e969ced020ecc621170560247cb1d3'], u'filename': u'postgresql-8.4.7-1.el6_0.1.src.rpm', u'epoch': u'0', u'version': u'8.4.7', u'release': u'1.el6_0.1', u'arch': u'src'}, {u'src': None, u'name': u'postgresql', u'sum': [u'md5', u'ea1aa711f1ae7d007eaba0a3658a317e'], u'filename': u'postgresql-8.4.7-1.el6_0.1.x86_64.rpm', u'epoch': u'0', u'version': u'8.4.7', u'release': u'1.el6_0.1', u'arch': u'x86_64'}, {u'src': None, u'name': u'postgresql-contrib', u'sum': [u'md5', u'c347cf40a178caad1b0c04ec4a6915c2'], u'filename': u'postgresql-contrib-8.4.7-1.el6_0.1.x86_64.rpm', u'epoch': u'0', u'version': u'8.4.7', u'release': u'1.el6_0.1', u'arch': u'x86_64'}, {u'src': None, u'name': u'postgresql-devel', u'sum': [u'md5', u'1509b091533359d0f2270367e73cc530'], u'filename': u'postgresql-devel-8.4.7-1.el6_0.1.i686.rpm', u'epoch': u'0', u'version': u'8.4.7', u'release': u'1.el6_0.1', u'arch': u'i686'}, {u'src': None, u'name': u'postgresql-devel', u'sum': [u'md5', u'f7375e41d1b708d8064e1ae85c27d533'], u'filename': u'postgresql-devel-8.4.7-1.el6_0.1.x86_64.rpm', u'epoch': u'0', u'version': u'8.4.7', u'release': u'1.el6_0.1', u'arch': u'x86_64'}, {u'src': None, u'name': u'postgresql-docs', u'sum': [u'md5', u'750e98967000f04be141de24ac0cbdd1'], u'filename': u'postgresql-docs-8.4.7-1.el6_0.1.x86_64.rpm', u'epoch': u'0', u'version': u'8.4.7', u'release': u'1.el6_0.1', u'arch': u'x86_64'}, {u'src': None, u'name': u'postgresql-libs', u'sum': [u'md5', u'60b0960b5f8df229f217c03398f44153'], u'filename': u'postgresql-libs-8.4.7-1.el6_0.1.i686.rpm', u'epoch': u'0', u'version': u'8.4.7', u'release': u'1.el6_0.1', u'arch': u'i686'}, {u'src': None, u'name': u'postgresql-libs', u'sum': [u'md5', u'84366cf199a92348ca8fea62518fd375'], u'filename': u'postgresql-libs-8.4.7-1.el6_0.1.x86_64.rpm', u'epoch': u'0', u'version': u'8.4.7', u'release': u'1.el6_0.1', u'arch': u'x86_64'}, {u'src': None, u'name': u'postgresql-plperl', u'sum': [u'md5', u'bf0e71221b2d64ac0de8d68a37c26717'], u'filename': u'postgresql-plperl-8.4.7-1.el6_0.1.x86_64.rpm', u'epoch': u'0', u'version': u'8.4.7', u'release': u'1.el6_0.1', u'arch': u'x86_64'}, {u'src': None, u'name': u'postgresql-plpython', u'sum': [u'md5', u'53a8b8ecdd36ac4c2007a77a96900033'], u'filename': u'postgresql-plpython-8.4.7-1.el6_0.1.x86_64.rpm', u'epoch': u'0', u'version': u'8.4.7', u'release': u'1.el6_0.1', u'arch': u'x86_64'}, {u'src': None, u'name': u'postgresql-pltcl', u'sum': [u'md5', u'56763ca358456bf180218ec7805b4f18'], u'filename': u'postgresql-pltcl-8.4.7-1.el6_0.1.x86_64.rpm', u'epoch': u'0', u'version': u'8.4.7', u'release': u'1.el6_0.1', u'arch': u'x86_64'}, {u'src': None, u'name': u'postgresql-server', u'sum': [u'md5', u'c5106538c8bdc6733aa30cc0b72ab92a'], u'filename': u'postgresql-server-8.4.7-1.el6_0.1.x86_64.rpm', u'epoch': u'0', u'version': u'8.4.7', u'release': u'1.el6_0.1', u'arch': u'x86_64'}, {u'src': None, u'name': u'postgresql-test', u'sum': [u'md5', u'a26d4d384954d624cec804b29e949fb0'], u'filename': u'postgresql-test-8.4.7-1.el6_0.1.x86_64.rpm', u'epoch': u'0', u'version': u'8.4.7', u'release': u'1.el6_0.1', u'arch': u'x86_64'}], u'name': u'ol6_x86_64_latest', u'short': u'ol6_x86_64_latest'}, {u'packages': [{u'src': None, u'name': u'postgresql', u'sum': [u'md5', u'cf53b5e6a8ca0eb117ec44e9255fa2f7'], u'filename': u'postgresql-8.1.23-1.el5_6.1.src.rpm', u'epoch': u'0', u'version': u'8.1.23', u'release': u'1.el5_6.1', u'arch': u'src'}, {u'src': None, u'name': u'postgresql', u'sum': [u'md5', u'3ca4115ef8fe1c376bf1630124944166'], u'filename': u'postgresql-8.1.23-1.el5_6.1.x86_64.rpm', u'epoch': u'0', u'version': u'8.1.23', u'release': u'1.el5_6.1', u'arch': u'x86_64'}, {u'src': None, u'name': u'postgresql-contrib', u'sum': [u'md5', u'75f9df0cd8f50e1601afea72329191b2'], u'filename': u'postgresql-contrib-8.1.23-1.el5_6.1.x86_64.rpm', u'epoch': u'0', u'version': u'8.1.23', u'release': u'1.el5_6.1', u'arch': u'x86_64'}, {u'src': None, u'name': u'postgresql-devel', u'sum': [u'md5', u'c9b20d085356f640580f8ceb2de0106d'], u'filename': u'postgresql-devel-8.1.23-1.el5_6.1.i386.rpm', u'epoch': u'0', u'version': u'8.1.23', u'release': u'1.el5_6.1', u'arch': u'i386'}, {u'src': None, u'name': u'postgresql-devel', u'sum': [u'md5', u'0efa46e93ce52cb600e6a85aa24d33a2'], u'filename': u'postgresql-devel-8.1.23-1.el5_6.1.x86_64.rpm', u'epoch': u'0', u'version': u'8.1.23', u'release': u'1.el5_6.1', u'arch': u'x86_64'}, {u'src': None, u'name': u'postgresql-docs', u'sum': [u'md5', u'd14338262626184f89c0c1d6db8932cc'], u'filename': u'postgresql-docs-8.1.23-1.el5_6.1.x86_64.rpm', u'epoch': u'0', u'version': u'8.1.23', u'release': u'1.el5_6.1', u'arch': u'x86_64'}, {u'src': None, u'name': u'postgresql-libs', u'sum': [u'md5', u'd6f8a9ed4798555aec202c51b241a621'], u'filename': u'postgresql-libs-8.1.23-1.el5_6.1.i386.rpm', u'epoch': u'0', u'version': u'8.1.23', u'release': u'1.el5_6.1', u'arch': u'i386'}, {u'src': None, u'name': u'postgresql-libs', u'sum': [u'md5', u'a5e93475bd032a68ef68895c97d2ec39'], u'filename': u'postgresql-libs-8.1.23-1.el5_6.1.x86_64.rpm', u'epoch': u'0', u'version': u'8.1.23', u'release': u'1.el5_6.1', u'arch': u'x86_64'}, {u'src': None, u'name': u'postgresql-pl', u'sum': [u'md5', u'96f6050a2cd367930f101bcf77ca8593'], u'filename': u'postgresql-pl-8.1.23-1.el5_6.1.x86_64.rpm', u'epoch': u'0', u'version': u'8.1.23', u'release': u'1.el5_6.1', u'arch': u'x86_64'}, {u'src': None, u'name': u'postgresql-python', u'sum': [u'md5', u'dfd19358bbd365f1575ce40eb035cedf'], u'filename': u'postgresql-python-8.1.23-1.el5_6.1.x86_64.rpm', u'epoch': u'0', u'version': u'8.1.23', u'release': u'1.el5_6.1', u'arch': u'x86_64'}, {u'src': None, u'name': u'postgresql-server', u'sum': [u'md5', u'53f23b2a863c64bbd7ecdecd23e15ab5'], u'filename': u'postgresql-server-8.1.23-1.el5_6.1.x86_64.rpm', u'epoch': u'0', u'version': u'8.1.23', u'release': u'1.el5_6.1', u'arch': u'x86_64'}, {u'src': None, u'name': u'postgresql-tcl', u'sum': [u'md5', u'902315dbd2a98c2531ca74a11f83036e'], u'filename': u'postgresql-tcl-8.1.23-1.el5_6.1.x86_64.rpm', u'epoch': u'0', u'version': u'8.1.23', u'release': u'1.el5_6.1', u'arch': u'x86_64'}, {u'src': None, u'name': u'postgresql-test', u'sum': [u'md5', u'25bf894b29e3dc5decad991922de3b38'], u'filename': u'postgresql-test-8.1.23-1.el5_6.1.x86_64.rpm', u'epoch': u'0', u'version': u'8.1.23', u'release': u'1.el5_6.1', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u"\n[8.4.7-1.el5_6.1]\n- Update to PostgreSQL 8.4.7, for various fixes described at\n http://www.postgresql.org/docs/8.4/static/release-8-4-7.html\n http://www.postgresql.org/docs/8.4/static/release-8-4-6.html\n including the fix for CVE-2010-4015\nResolves: #672636\n- Ensure we don't package any .gitignore files from the source tarball", u'issued': u'2011-02-03', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELSA-2011-0198.html', u'type': u'self', u'id': None, u'title': u'ELSA-2011-0198'}, {u'href': u'http://linux.oracle.com/cve/CVE-2010-4015.html', u'type': u'cve', u'id': u'CVE-2010-4015', u'title': u'CVE-2010-4015'}], u'_content_type_id': u'erratum', u'_id': u'ec55c30d-33ba-43b4-9b75-be07eb23ac8e', u'from': u'el-errata@oss.oracle.com', u'severity': u'Moderate', u'title': u' postgresql84 security update', u'_ns': u'units_erratum', u'rights': u'Copyright 2011 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 5', u'reboot_suggested': False, u'type': u'security', u'pkglist': [{u'packages': [{u'src': None, u'name': u'postgresql84', u'sum': [u'md5', u'28135d7fc8dacb70506a19ce6798bc55'], u'filename': u'postgresql84-8.4.7-1.el5_6.1.src.rpm', u'epoch': u'0', u'version': u'8.4.7', u'release': u'1.el5_6.1', u'arch': u'src'}, {u'src': None, u'name': u'postgresql84', u'sum': [u'md5', u'd1461626919c4adca65bb82018ddf561'], u'filename': u'postgresql84-8.4.7-1.el5_6.1.x86_64.rpm', u'epoch': u'0', u'version': u'8.4.7', u'release': u'1.el5_6.1', u'arch': u'x86_64'}, {u'src': None, u'name': u'postgresql84-contrib', u'sum': [u'md5', u'54f2cb3ec67190adeedddf43a959d185'], u'filename': u'postgresql84-contrib-8.4.7-1.el5_6.1.x86_64.rpm', u'epoch': u'0', u'version': u'8.4.7', u'release': u'1.el5_6.1', u'arch': u'x86_64'}, {u'src': None, u'name': u'postgresql84-devel', u'sum': [u'md5', u'21448559c5c457d914310c30f96c0f70'], u'filename': u'postgresql84-devel-8.4.7-1.el5_6.1.i386.rpm', u'epoch': u'0', u'version': u'8.4.7', u'release': u'1.el5_6.1', u'arch': u'i386'}, {u'src': None, u'name': u'postgresql84-devel', u'sum': [u'md5', u'4c673f89c2133e22cbcd506b9aa52c05'], u'filename': u'postgresql84-devel-8.4.7-1.el5_6.1.x86_64.rpm', u'epoch': u'0', u'version': u'8.4.7', u'release': u'1.el5_6.1', u'arch': u'x86_64'}, {u'src': None, u'name': u'postgresql84-docs', u'sum': [u'md5', u'30e496a7e524fb9e51c8204611c574b0'], u'filename': u'postgresql84-docs-8.4.7-1.el5_6.1.x86_64.rpm', u'epoch': u'0', u'version': u'8.4.7', u'release': u'1.el5_6.1', u'arch': u'x86_64'}, {u'src': None, u'name': u'postgresql84-libs', u'sum': [u'md5', u'3c52702e91662fd5b384ec44f4a51640'], u'filename': u'postgresql84-libs-8.4.7-1.el5_6.1.i386.rpm', u'epoch': u'0', u'version': u'8.4.7', u'release': u'1.el5_6.1', u'arch': u'i386'}, {u'src': None, u'name': u'postgresql84-libs', u'sum': [u'md5', u'436cbd6b4af4c2cfd9a961fa7955530e'], u'filename': u'postgresql84-libs-8.4.7-1.el5_6.1.x86_64.rpm', u'epoch': u'0', u'version': u'8.4.7', u'release': u'1.el5_6.1', u'arch': u'x86_64'}, {u'src': None, u'name': u'postgresql84-plperl', u'sum': [u'md5', u'8baf0704bf77a5368fd11bfea4d622ae'], u'filename': u'postgresql84-plperl-8.4.7-1.el5_6.1.x86_64.rpm', u'epoch': u'0', u'version': u'8.4.7', u'release': u'1.el5_6.1', u'arch': u'x86_64'}, {u'src': None, u'name': u'postgresql84-plpython', u'sum': [u'md5', u'2c43d8506f3536f83ea388ea65d15e67'], u'filename': u'postgresql84-plpython-8.4.7-1.el5_6.1.x86_64.rpm', u'epoch': u'0', u'version': u'8.4.7', u'release': u'1.el5_6.1', u'arch': u'x86_64'}, {u'src': None, u'name': u'postgresql84-pltcl', u'sum': [u'md5', u'198e09ad8ec48d0bc1a7f07eefd3e461'], u'filename': u'postgresql84-pltcl-8.4.7-1.el5_6.1.x86_64.rpm', u'epoch': u'0', u'version': u'8.4.7', u'release': u'1.el5_6.1', u'arch': u'x86_64'}, {u'src': None, u'name': u'postgresql84-python', u'sum': [u'md5', u'5ef1293d04f1af157954b26863988e69'], u'filename': u'postgresql84-python-8.4.7-1.el5_6.1.x86_64.rpm', u'epoch': u'0', u'version': u'8.4.7', u'release': u'1.el5_6.1', u'arch': u'x86_64'}, {u'src': None, u'name': u'postgresql84-server', u'sum': [u'md5', u'96b567c1d2cee38fd98ff3b20294fb02'], u'filename': u'postgresql84-server-8.4.7-1.el5_6.1.x86_64.rpm', u'epoch': u'0', u'version': u'8.4.7', u'release': u'1.el5_6.1', u'arch': u'x86_64'}, {u'src': None, u'name': u'postgresql84-tcl', u'sum': [u'md5', u'cdf18d9e6770267861628c2725eb4f30'], u'filename': u'postgresql84-tcl-8.4.7-1.el5_6.1.x86_64.rpm', u'epoch': u'0', u'version': u'8.4.7', u'release': u'1.el5_6.1', u'arch': u'x86_64'}, {u'src': None, u'name': u'postgresql84-test', u'sum': [u'md5', u'e7418c42f4c777ad0e22616768b26767'], u'filename': u'postgresql84-test-8.4.7-1.el5_6.1.x86_64.rpm', u'epoch': u'0', u'version': u'8.4.7', u'release': u'1.el5_6.1', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u'\n- add upstream patch to fix hang or crash in the KDC when using the LDAP kdb\n backend (CVE-2011-0281, CVE-2011-0282, #671096)', u'issued': u'2011-02-08', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELSA-2011-0199.html', u'type': u'self', u'id': None, u'title': u'ELSA-2011-0199'}, {u'href': u'http://linux.oracle.com/cve/CVE-2011-0281.html', u'type': u'cve', u'id': u'CVE-2011-0281', u'title': u'CVE-2011-0281'}, {u'href': u'http://linux.oracle.com/cve/CVE-2011-0282.html', u'type': u'cve', u'id': u'CVE-2011-0282', u'title': u'CVE-2011-0282'}], u'_content_type_id': u'erratum', u'_id': u'cc079ec3-ebbc-4b4b-a2e1-c02adc48bcd9', u'from': u'el-errata@oss.oracle.com', u'severity': u'Important', u'title': u' krb5 security update', u'_ns': u'units_erratum', u'rights': u'Copyright 2011 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 5', u'reboot_suggested': False, u'type': u'security', u'pkglist': [{u'packages': [{u'src': None, u'name': u'krb5', u'sum': [u'md5', u'307ea249f2122cecf620ed2f6ef17e7e'], u'filename': u'krb5-1.6.1-55.el5_6.1.src.rpm', u'epoch': u'0', u'version': u'1.6.1', u'release': u'55.el5_6.1', u'arch': u'src'}, {u'src': None, u'name': u'krb5-devel', u'sum': [u'md5', u'b4076a61fcc68f9fdfe365f21feebb57'], u'filename': u'krb5-devel-1.6.1-55.el5_6.1.i386.rpm', u'epoch': u'0', u'version': u'1.6.1', u'release': u'55.el5_6.1', u'arch': u'i386'}, {u'src': None, u'name': u'krb5-devel', u'sum': [u'md5', u'2850266126bf284b31243d631072948e'], u'filename': u'krb5-devel-1.6.1-55.el5_6.1.x86_64.rpm', u'epoch': u'0', u'version': u'1.6.1', u'release': u'55.el5_6.1', u'arch': u'x86_64'}, {u'src': None, u'name': u'krb5-libs', u'sum': [u'md5', u'48e8a46c01ce94f87aa46f0a821fb648'], u'filename': u'krb5-libs-1.6.1-55.el5_6.1.i386.rpm', u'epoch': u'0', u'version': u'1.6.1', u'release': u'55.el5_6.1', u'arch': u'i386'}, {u'src': None, u'name': u'krb5-libs', u'sum': [u'md5', u'2ef2360ec0ff373fdf803ef69ef76a44'], u'filename': u'krb5-libs-1.6.1-55.el5_6.1.x86_64.rpm', u'epoch': u'0', u'version': u'1.6.1', u'release': u'55.el5_6.1', u'arch': u'x86_64'}, {u'src': None, u'name': u'krb5-server', u'sum': [u'md5', u'e570c53ec6ef17b1cfc4f76735da4b89'], u'filename': u'krb5-server-1.6.1-55.el5_6.1.x86_64.rpm', u'epoch': u'0', u'version': u'1.6.1', u'release': u'55.el5_6.1', u'arch': u'x86_64'}, {u'src': None, u'name': u'krb5-server-ldap', u'sum': [u'md5', u'4239f8de1f7f05e3112df58e571f0742'], u'filename': u'krb5-server-ldap-1.6.1-55.el5_6.1.x86_64.rpm', u'epoch': u'0', u'version': u'1.6.1', u'release': u'55.el5_6.1', u'arch': u'x86_64'}, {u'src': None, u'name': u'krb5-workstation', u'sum': [u'md5', u'97874348c0abb7afc8a04e9029c7d8d6'], u'filename': u'krb5-workstation-1.6.1-55.el5_6.1.x86_64.rpm', u'epoch': u'0', u'version': u'1.6.1', u'release': u'55.el5_6.1', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u'[1.6.0.0-1.36.b17]\n- removed plugin. How it comes in?!\n- Resolves: rhbz#676295\n\n[1.6.0.0-1.33.b17]\n- bumped release number, it was accidentaly reduced, and now lower version then last one was released.\n- Resolves: rhbz#676295\n\n[1.6.0.0-1.22.b17]\n- Updated to 1.7.9 tarball\n- removed patch6, fixed upstrream\n- Resolves: rhbz#676295', u'issued': u'2011-02-11', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELSA-2011-0214.html', u'type': u'self', u'id': None, u'title': u'ELSA-2011-0214'}, {u'href': u'http://linux.oracle.com/cve/CVE-2010-4476.html', u'type': u'cve', u'id': u'CVE-2010-4476', u'title': u'CVE-2010-4476'}], u'_content_type_id': u'erratum', u'_id': u'9fef34e2-002f-43df-86cb-524eb27528a8', u'from': u'el-errata@oss.oracle.com', u'severity': u'Moderate', u'title': u' java-1.6.0-openjdk security update', u'_ns': u'units_erratum', u'rights': u'Copyright 2011 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 6', u'reboot_suggested': False, u'type': u'security', u'pkglist': [{u'packages': [{u'src': None, u'name': u'java-1.6.0-openjdk', u'sum': [u'md5', u'a52baf9d55245847d201714999240992'], u'filename': u'java-1.6.0-openjdk-1.6.0.0-1.36.b17.el6_0.src.rpm', u'epoch': u'1', u'version': u'1.6.0.0', u'release': u'1.36.b17.el6_0', u'arch': u'src'}, {u'src': None, u'name': u'java-1.6.0-openjdk', u'sum': [u'md5', u'd8c2a5014faefc2dd56f6f0fd9ce39ce'], u'filename': u'java-1.6.0-openjdk-1.6.0.0-1.36.b17.el6_0.x86_64.rpm', u'epoch': u'1', u'version': u'1.6.0.0', u'release': u'1.36.b17.el6_0', u'arch': u'x86_64'}, {u'src': None, u'name': u'java-1.6.0-openjdk-demo', u'sum': [u'md5', u'be464c349847a930fcd93004e534a884'], u'filename': u'java-1.6.0-openjdk-demo-1.6.0.0-1.36.b17.el6_0.x86_64.rpm', u'epoch': u'1', u'version': u'1.6.0.0', u'release': u'1.36.b17.el6_0', u'arch': u'x86_64'}, {u'src': None, u'name': u'java-1.6.0-openjdk-devel', u'sum': [u'md5', u'e8aeeb6facf03a3c87002fe064001e79'], u'filename': u'java-1.6.0-openjdk-devel-1.6.0.0-1.36.b17.el6_0.x86_64.rpm', u'epoch': u'1', u'version': u'1.6.0.0', u'release': u'1.36.b17.el6_0', u'arch': u'x86_64'}, {u'src': None, u'name': u'java-1.6.0-openjdk-javadoc', u'sum': [u'md5', u'2f31b5c27d7986c71d547cd29fd0f841'], u'filename': u'java-1.6.0-openjdk-javadoc-1.6.0.0-1.36.b17.el6_0.x86_64.rpm', u'epoch': u'1', u'version': u'1.6.0.0', u'release': u'1.36.b17.el6_0', u'arch': u'x86_64'}, {u'src': None, u'name': u'java-1.6.0-openjdk-src', u'sum': [u'md5', u'70b5567f105286b38e063561c8ec77b4'], u'filename': u'java-1.6.0-openjdk-src-1.6.0.0-1.36.b17.el6_0.x86_64.rpm', u'epoch': u'1', u'version': u'1.6.0.0', u'release': u'1.36.b17.el6_0', u'arch': u'x86_64'}], u'name': u'ol6_x86_64_latest', u'short': u'ol6_x86_64_latest'}, {u'packages': [{u'src': None, u'name': u'java-1.6.0-openjdk', u'sum': [u'md5', u'6df9780405a3938037c10167e80033ce'], u'filename': u'java-1.6.0-openjdk-1.6.0.0-1.18.b17.0.1.el5.src.rpm', u'epoch': u'1', u'version': u'1.6.0.0', u'release': u'1.18.b17.0.1.el5', u'arch': u'src'}, {u'src': None, u'name': u'java-1.6.0-openjdk', u'sum': [u'md5', u'4ae01fe71cd512a9d65e500ad20294ce'], u'filename': u'java-1.6.0-openjdk-1.6.0.0-1.18.b17.0.1.el5.x86_64.rpm', u'epoch': u'1', u'version': u'1.6.0.0', u'release': u'1.18.b17.0.1.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'java-1.6.0-openjdk-demo', u'sum': [u'md5', u'7eb66a5966426745ff5e268552c7aac7'], u'filename': u'java-1.6.0-openjdk-demo-1.6.0.0-1.18.b17.0.1.el5.x86_64.rpm', u'epoch': u'1', u'version': u'1.6.0.0', u'release': u'1.18.b17.0.1.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'java-1.6.0-openjdk-devel', u'sum': [u'md5', u'303b454cfb19cfd64c02e2aa6da65832'], u'filename': u'java-1.6.0-openjdk-devel-1.6.0.0-1.18.b17.0.1.el5.x86_64.rpm', u'epoch': u'1', u'version': u'1.6.0.0', u'release': u'1.18.b17.0.1.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'java-1.6.0-openjdk-javadoc', u'sum': [u'md5', u'141206d60c17b958c8e6e9e08c2aad0c'], u'filename': u'java-1.6.0-openjdk-javadoc-1.6.0.0-1.18.b17.0.1.el5.x86_64.rpm', u'epoch': u'1', u'version': u'1.6.0.0', u'release': u'1.18.b17.0.1.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'java-1.6.0-openjdk-src', u'sum': [u'md5', u'1ee5247caaad4dddd82141233e568759'], u'filename': u'java-1.6.0-openjdk-src-1.6.0.0-1.18.b17.0.1.el5.x86_64.rpm', u'epoch': u'1', u'version': u'1.6.0.0', u'release': u'1.18.b17.0.1.el5', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u'\n[1.6.11-7.1]\n- add security fixes for CVE-2010-4644, CVE-2010-4539 (#672676)', u'issued': u'2011-02-15', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELSA-2011-0257.html', u'type': u'self', u'id': None, u'title': u'ELSA-2011-0257'}, {u'href': u'http://linux.oracle.com/cve/CVE-2010-4539.html', u'type': u'cve', u'id': u'CVE-2010-4539', u'title': u'CVE-2010-4539'}, {u'href': u'http://linux.oracle.com/cve/CVE-2010-4644.html', u'type': u'cve', u'id': u'CVE-2010-4644', u'title': u'CVE-2010-4644'}], u'_content_type_id': u'erratum', u'_id': u'1b02978f-36ef-4ebe-9040-883ab4720f5a', u'from': u'el-errata@oss.oracle.com', u'severity': u'Moderate', u'title': u' subversion security update', u'_ns': u'units_erratum', u'rights': u'Copyright 2011 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 5', u'reboot_suggested': False, u'type': u'security', u'pkglist': [{u'packages': [{u'src': None, u'name': u'mod_dav_svn', u'sum': [u'md5', u'b9b3c8383d91741097a49a560b982803'], u'filename': u'mod_dav_svn-1.6.11-7.el5_6.1.x86_64.rpm', u'epoch': u'0', u'version': u'1.6.11', u'release': u'7.el5_6.1', u'arch': u'x86_64'}, {u'src': None, u'name': u'subversion', u'sum': [u'md5', u'701c8e4edd54eae13cb789016b8b0f82'], u'filename': u'subversion-1.6.11-7.el5_6.1.i386.rpm', u'epoch': u'0', u'version': u'1.6.11', u'release': u'7.el5_6.1', u'arch': u'i386'}, {u'src': None, u'name': u'subversion', u'sum': [u'md5', u'9fc7ee444c7ef9783184f9c41244111c'], u'filename': u'subversion-1.6.11-7.el5_6.1.src.rpm', u'epoch': u'0', u'version': u'1.6.11', u'release': u'7.el5_6.1', u'arch': u'src'}, {u'src': None, u'name': u'subversion', u'sum': [u'md5', u'8f680b0fdcc2dc26f6c8ab9be86c7589'], u'filename': u'subversion-1.6.11-7.el5_6.1.x86_64.rpm', u'epoch': u'0', u'version': u'1.6.11', u'release': u'7.el5_6.1', u'arch': u'x86_64'}, {u'src': None, u'name': u'subversion-devel', u'sum': [u'md5', u'bdf082dabe8045bfee6cf768b3770e4c'], u'filename': u'subversion-devel-1.6.11-7.el5_6.1.i386.rpm', u'epoch': u'0', u'version': u'1.6.11', u'release': u'7.el5_6.1', u'arch': u'i386'}, {u'src': None, u'name': u'subversion-devel', u'sum': [u'md5', u'54bc84e2dd8c8d3188cbece72051e12a'], u'filename': u'subversion-devel-1.6.11-7.el5_6.1.x86_64.rpm', u'epoch': u'0', u'version': u'1.6.11', u'release': u'7.el5_6.1', u'arch': u'x86_64'}, {u'src': None, u'name': u'subversion-javahl', u'sum': [u'md5', u'fa7177f1e109bfd4655dd01f27a8ac93'], u'filename': u'subversion-javahl-1.6.11-7.el5_6.1.x86_64.rpm', u'epoch': u'0', u'version': u'1.6.11', u'release': u'7.el5_6.1', u'arch': u'x86_64'}, {u'src': None, u'name': u'subversion-perl', u'sum': [u'md5', u'4aba7bba2a350009584a47ae7fe9dca3'], u'filename': u'subversion-perl-1.6.11-7.el5_6.1.x86_64.rpm', u'epoch': u'0', u'version': u'1.6.11', u'release': u'7.el5_6.1', u'arch': u'x86_64'}, {u'src': None, u'name': u'subversion-ruby', u'sum': [u'md5', u'11627dc42376378dfaf0cb39f93b6ab4'], u'filename': u'subversion-ruby-1.6.11-7.el5_6.1.x86_64.rpm', u'epoch': u'0', u'version': u'1.6.11', u'release': u'7.el5_6.1', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u'\n[1.6.0.0-1.39.b17]\n- respin of IcedTea6 1.7.10\n- Resolves: rhbz#676276\n\n[1.6.0.0-1.37.b17]\n- Updated to IcedTea6 1.7.10\n- Resolves: rhbz#676276', u'issued': u'2011-02-17', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELSA-2011-0281.html', u'type': u'self', u'id': None, u'title': u'ELSA-2011-0281'}, {u'href': u'http://linux.oracle.com/cve/CVE-2010-4448.html', u'type': u'cve', u'id': u'CVE-2010-4448', u'title': u'CVE-2010-4448'}, {u'href': u'http://linux.oracle.com/cve/CVE-2010-4450.html', u'type': u'cve', u'id': u'CVE-2010-4450', u'title': u'CVE-2010-4450'}, {u'href': u'http://linux.oracle.com/cve/CVE-2010-4465.html', u'type': u'cve', u'id': u'CVE-2010-4465', u'title': u'CVE-2010-4465'}, {u'href': u'http://linux.oracle.com/cve/CVE-2010-4469.html', u'type': u'cve', u'id': u'CVE-2010-4469', u'title': u'CVE-2010-4469'}, {u'href': u'http://linux.oracle.com/cve/CVE-2010-4470.html', u'type': u'cve', u'id': u'CVE-2010-4470', u'title': u'CVE-2010-4470'}, {u'href': u'http://linux.oracle.com/cve/CVE-2010-4472.html', u'type': u'cve', u'id': u'CVE-2010-4472', u'title': u'CVE-2010-4472'}], u'_content_type_id': u'erratum', u'_id': u'112e4383-c60a-4462-97ac-c57e5b9338bf', u'from': u'el-errata@oss.oracle.com', u'severity': u'Important', u'title': u' java-1.6.0-openjdk security update', u'_ns': u'units_erratum', u'rights': u'Copyright 2011 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 6', u'reboot_suggested': False, u'type': u'security', u'pkglist': [{u'packages': [{u'src': None, u'name': u'java-1.6.0-openjdk', u'sum': [u'md5', u'2cd046d44fae9bc186cb66738e86168a'], u'filename': u'java-1.6.0-openjdk-1.6.0.0-1.39.b17.el6_0.src.rpm', u'epoch': u'1', u'version': u'1.6.0.0', u'release': u'1.39.b17.el6_0', u'arch': u'src'}, {u'src': None, u'name': u'java-1.6.0-openjdk', u'sum': [u'md5', u'38d39176f13afb9699c85b1d9bc0b673'], u'filename': u'java-1.6.0-openjdk-1.6.0.0-1.39.b17.el6_0.x86_64.rpm', u'epoch': u'1', u'version': u'1.6.0.0', u'release': u'1.39.b17.el6_0', u'arch': u'x86_64'}, {u'src': None, u'name': u'java-1.6.0-openjdk-demo', u'sum': [u'md5', u'113d91abb12fee6913d767cb882dd547'], u'filename': u'java-1.6.0-openjdk-demo-1.6.0.0-1.39.b17.el6_0.x86_64.rpm', u'epoch': u'1', u'version': u'1.6.0.0', u'release': u'1.39.b17.el6_0', u'arch': u'x86_64'}, {u'src': None, u'name': u'java-1.6.0-openjdk-devel', u'sum': [u'md5', u'e78fbb8c79ad31a34f47c84651543351'], u'filename': u'java-1.6.0-openjdk-devel-1.6.0.0-1.39.b17.el6_0.x86_64.rpm', u'epoch': u'1', u'version': u'1.6.0.0', u'release': u'1.39.b17.el6_0', u'arch': u'x86_64'}, {u'src': None, u'name': u'java-1.6.0-openjdk-javadoc', u'sum': [u'md5', u'4fcad357b0924c4fcba694c47183edf6'], u'filename': u'java-1.6.0-openjdk-javadoc-1.6.0.0-1.39.b17.el6_0.x86_64.rpm', u'epoch': u'1', u'version': u'1.6.0.0', u'release': u'1.39.b17.el6_0', u'arch': u'x86_64'}, {u'src': None, u'name': u'java-1.6.0-openjdk-src', u'sum': [u'md5', u'c6771c787b1bdafe20252e440a673997'], u'filename': u'java-1.6.0-openjdk-src-1.6.0.0-1.39.b17.el6_0.x86_64.rpm', u'epoch': u'1', u'version': u'1.6.0.0', u'release': u'1.39.b17.el6_0', u'arch': u'x86_64'}], u'name': u'ol6_x86_64_latest', u'short': u'ol6_x86_64_latest'}, {u'packages': [{u'src': None, u'name': u'java-1.6.0-openjdk', u'sum': [u'md5', u'aa849f6d29fd3bb32825b70b02de3ee4'], u'filename': u'java-1.6.0-openjdk-1.6.0.0-1.20.b17.0.1.el5.src.rpm', u'epoch': u'1', u'version': u'1.6.0.0', u'release': u'1.20.b17.0.1.el5', u'arch': u'src'}, {u'src': None, u'name': u'java-1.6.0-openjdk', u'sum': [u'md5', u'410bec27f82b1be6810136c06235a6c6'], u'filename': u'java-1.6.0-openjdk-1.6.0.0-1.20.b17.0.1.el5.x86_64.rpm', u'epoch': u'1', u'version': u'1.6.0.0', u'release': u'1.20.b17.0.1.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'java-1.6.0-openjdk-demo', u'sum': [u'md5', u'72137cafe57ce8ddbeac4bfb67c1cb35'], u'filename': u'java-1.6.0-openjdk-demo-1.6.0.0-1.20.b17.0.1.el5.x86_64.rpm', u'epoch': u'1', u'version': u'1.6.0.0', u'release': u'1.20.b17.0.1.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'java-1.6.0-openjdk-devel', u'sum': [u'md5', u'0b92c13fab6d43e6cd0ed24e096cf5ba'], u'filename': u'java-1.6.0-openjdk-devel-1.6.0.0-1.20.b17.0.1.el5.x86_64.rpm', u'epoch': u'1', u'version': u'1.6.0.0', u'release': u'1.20.b17.0.1.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'java-1.6.0-openjdk-javadoc', u'sum': [u'md5', u'5736567737b317fee23bd12a147ff64f'], u'filename': u'java-1.6.0-openjdk-javadoc-1.6.0.0-1.20.b17.0.1.el5.x86_64.rpm', u'epoch': u'1', u'version': u'1.6.0.0', u'release': u'1.20.b17.0.1.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'java-1.6.0-openjdk-src', u'sum': [u'md5', u'43322c7fdf9c735edd30e968d990095a'], u'filename': u'java-1.6.0-openjdk-src-1.6.0.0-1.20.b17.0.1.el5.x86_64.rpm', u'epoch': u'1', u'version': u'1.6.0.0', u'release': u'1.20.b17.0.1.el5', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u'\n[2.6.18-238.5.1.0.1.el5]\n- [scsi] fix scsi hotplug and rescan race [orabug 10260172]\n- fix filp_close() race (Joe Jin) [orabug 10335998]\n- fix missing aio_complete() in end_io (Joel Becker) [orabug 10365195]\n- make xenkbd.abs_pointer=1 by default [orabug 67188919]\n- [xen] check to see if hypervisor supports memory reservation change\n (Chuck Anderson) [orabug 7556514]\n- [net] Enable entropy for bnx2,bnx2x,e1000e,igb,ixgb,ixgbe,ixgbevf (John Sobecki)\n [orabug 10315433]\n- [NET] Add xen pv netconsole support (Tina Yang) [orabug 6993043] [bz 7258]\n- [mm] shrink_zone patch (John Sobecki,Chris Mason) [orabug 6086839]\n- fix aacraid not to reset during kexec (Joe Jin) [orabug 8516042]\n- [rds] Patch rds to 1.4.2-20 (Andy Grover) [orabug 9471572, 9344105]\n RDS: Fix BUG_ONs to not fire when in a tasklet\n ipoib: Fix lockup of the tx queue\n RDS: Do not call set_page_dirty() with irqs off (Sherman Pun)\n RDS: Properly unmap when getting a remote access error (Tina Yang)\n RDS: Fix locking in rds_send_drop_to()\n- [qla] fix qla not to query hccr (Guru Anbalagane) [Orabug 8746702]\n- [nfs] too many getattr and access calls after direct I/O [orabug 9348191]\n- [xen] PVHVM guest with PoD crashes under memory pressure (Chuck Anderson)\n [orabug 9107465]\n- [xen] PV guest with FC HBA hangs during shutdown (Chuck Anderson)\n [orabug 9764220]\n- Support 256GB+ memory for pv guest (Mukesh Rathor) [orabug 9450615]\n- fix overcommit memory to use percpu_counter for el5 (KOSAKI Motohiro,\n Guru Anbalagane) [orabug 6124033]\n- [ipmi] make configurable timeouts for kcs of ipmi [orabug 9752208]\n- [ib] fix memory corruption (Andy Grover) [orabug 9972346]\n- [aio] patch removes limit on number of retries (Srinivas Eeda) [orabug 10044782]\n- [loop] Do not call loop_unplug for not configured loop device (orabug 10314497)\n\n[2.6.18-238.5.1.el5]\n- [x86_64] vdso: fix gtod via export of sysctl_vsyscall (Prarit Bhargava) [678613 673616]\n\n[2.6.18-238.4.1.el5]\n- [net] be2net: fix missing trans_start update (Ivan Vecera) [674273 671595]\n- [net] fix unix socket local dos (Neil Horman) [656759 656760] {CVE-2010-4249}\n- [net] core: clear allocs for privileged ethtool actions (Jiri Pirko) [672432 672433] {CVE-2010-4655}\n- [net] limit socket backlog add operation to prevent DoS (Jiri Pirko) [657308 657309] {CVE-2010-4251}\n- [block] fix accounting bug on cross partition merges (Jerome Marchand) [672253 646816]\n- [char] virtio: Wake console outvq on host notifications (Amit Shah) [673983 673459]\n- [char] virtio: make console port names a KOBJ_ADD event (Amit Shah) [673984 669909]\n\n[2.6.18-238.3.1.el5]\n- [net] tcp: fix shrinking windows with window scaling (Jiri Pirko) [669300 627496]\n- [virt] xen: no enable extended PCI cfg space via IOports (Don Dutile) [671340 661478]\n- [net] e1000: Avoid unhandled IRQ (Dean Nelson) [670807 651512]\n- [net] e1000: fix screaming IRQ (Dean Nelson) [670807 651512]\n\n[2.6.18-238.2.1.el5]\n- [acpi] bus: check if list is empty before kfree()ing it (Matthew Garrett) [670797 670373]\n- [net] ipv6: fragment local tunnel IPSec6 pkts if needed (Herbert Xu) [670824 661110]\n- [block] cciss: fix null pointer problem in tur usage (Tomas Henzl) [668976 664592]', u'issued': u'2011-03-02', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELSA-2011-0303.html', u'type': u'self', u'id': None, u'title': u'ELSA-2011-0303'}, {u'href': u'http://linux.oracle.com/cve/CVE-2010-4249.html', u'type': u'cve', u'id': u'CVE-2010-4249', u'title': u'CVE-2010-4249'}, {u'href': u'http://linux.oracle.com/cve/CVE-2010-4251.html', u'type': u'cve', u'id': u'CVE-2010-4251', u'title': u'CVE-2010-4251'}, {u'href': u'http://linux.oracle.com/cve/CVE-2010-4655.html', u'type': u'cve', u'id': u'CVE-2010-4655', u'title': u'CVE-2010-4655'}, {u'href': u'http://linux.oracle.com/cve/CVE-2010-4805.html', u'type': u'cve', u'id': u'CVE-2010-4805', u'title': u'CVE-2010-4805'}], u'_content_type_id': u'erratum', u'_id': u'13b3c359-dfc8-4bee-900d-a01dd214f2e2', u'from': u'el-errata@oss.oracle.com', u'severity': u'Moderate', u'title': u' kernel security and bug fix update', u'_ns': u'units_erratum', u'rights': u'Copyright 2011 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 5', u'reboot_suggested': False, u'type': u'security', u'pkglist': [{u'packages': [{u'src': None, u'name': u'kernel', u'sum': [u'md5', u'2b45125be110f59ad4959acab3138345'], u'filename': u'kernel-2.6.18-238.5.1.0.1.el5.src.rpm', u'epoch': u'0', u'version': u'2.6.18', u'release': u'238.5.1.0.1.el5', u'arch': u'src'}, {u'src': None, u'name': u'kernel', u'sum': [u'md5', u'f47279447a0903b609d163a44fb6f99a'], u'filename': u'kernel-2.6.18-238.5.1.0.1.el5.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.18', u'release': u'238.5.1.0.1.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'kernel-debug', u'sum': [u'md5', u'0e689130d49b083549f07ef77139dcce'], u'filename': u'kernel-debug-2.6.18-238.5.1.0.1.el5.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.18', u'release': u'238.5.1.0.1.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'kernel-debug-devel', u'sum': [u'md5', u'490b8c8da8dc9fe0820c7771a0e914f7'], u'filename': u'kernel-debug-devel-2.6.18-238.5.1.0.1.el5.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.18', u'release': u'238.5.1.0.1.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'kernel-devel', u'sum': [u'md5', u'cc288b1b8dc0be5f8395d5bbc87bf9a2'], u'filename': u'kernel-devel-2.6.18-238.5.1.0.1.el5.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.18', u'release': u'238.5.1.0.1.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'kernel-doc', u'sum': [u'md5', u'ed51809e2d86f84a7546d4703497e20e'], u'filename': u'kernel-doc-2.6.18-238.5.1.0.1.el5.noarch.rpm', u'epoch': u'0', u'version': u'2.6.18', u'release': u'238.5.1.0.1.el5', u'arch': u'noarch'}, {u'src': None, u'name': u'kernel-headers', u'sum': [u'md5', u'59ac6c9dbd827ed8cb035b1ed4e7f88f'], u'filename': u'kernel-headers-2.6.18-238.5.1.0.1.el5.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.18', u'release': u'238.5.1.0.1.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'kernel-xen', u'sum': [u'md5', u'b9a42f9104af2ef8678225174e3c7e2e'], u'filename': u'kernel-xen-2.6.18-238.5.1.0.1.el5.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.18', u'release': u'238.5.1.0.1.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'kernel-xen-devel', u'sum': [u'md5', u'9c6b13cc703517d6419c051979729a36'], u'filename': u'kernel-xen-devel-2.6.18-238.5.1.0.1.el5.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.18', u'release': u'238.5.1.0.1.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'ocfs2-2.6.18-238.5.1.0.1.el5', u'sum': [u'md5', u'eb0d7ff818f49e2b42cc1a4e548bd70f'], u'filename': u'ocfs2-2.6.18-238.5.1.0.1.el5-1.4.8-2.el5.src.rpm', u'epoch': u'0', u'version': u'1.4.8', u'release': u'2.el5', u'arch': u'src'}, {u'src': None, u'name': u'ocfs2-2.6.18-238.5.1.0.1.el5', u'sum': [u'md5', u'6aae0cea248575c8ce77f98b81c4da80'], u'filename': u'ocfs2-2.6.18-238.5.1.0.1.el5-1.4.8-2.el5.x86_64.rpm', u'epoch': u'0', u'version': u'1.4.8', u'release': u'2.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'ocfs2-2.6.18-238.5.1.0.1.el5debug', u'sum': [u'md5', u'3d7d04201daa4a6dd88208050d0c46a0'], u'filename': u'ocfs2-2.6.18-238.5.1.0.1.el5debug-1.4.8-2.el5.x86_64.rpm', u'epoch': u'0', u'version': u'1.4.8', u'release': u'2.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'ocfs2-2.6.18-238.5.1.0.1.el5xen', u'sum': [u'md5', u'7fd5570da8cd183e7e3ebacc1832058c'], u'filename': u'ocfs2-2.6.18-238.5.1.0.1.el5xen-1.4.8-2.el5.x86_64.rpm', u'epoch': u'0', u'version': u'1.4.8', u'release': u'2.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'oracleasm-2.6.18-238.5.1.0.1.el5', u'sum': [u'md5', u'737025dda8d51d6c81b8fe017998ce26'], u'filename': u'oracleasm-2.6.18-238.5.1.0.1.el5-2.0.5-1.el5.src.rpm', u'epoch': u'0', u'version': u'2.0.5', u'release': u'1.el5', u'arch': u'src'}, {u'src': None, u'name': u'oracleasm-2.6.18-238.5.1.0.1.el5', u'sum': [u'md5', u'e0cca477a0960f6efc9893bfa37b6641'], u'filename': u'oracleasm-2.6.18-238.5.1.0.1.el5-2.0.5-1.el5.x86_64.rpm', u'epoch': u'0', u'version': u'2.0.5', u'release': u'1.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'oracleasm-2.6.18-238.5.1.0.1.el5debug', u'sum': [u'md5', u'4ff91b67ba22ae39634ac9425878a185'], u'filename': u'oracleasm-2.6.18-238.5.1.0.1.el5debug-2.0.5-1.el5.x86_64.rpm', u'epoch': u'0', u'version': u'2.0.5', u'release': u'1.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'oracleasm-2.6.18-238.5.1.0.1.el5xen', u'sum': [u'md5', u'664fcad98cf569bb8125751abcae5f43'], u'filename': u'oracleasm-2.6.18-238.5.1.0.1.el5xen-2.0.5-1.el5.x86_64.rpm', u'epoch': u'0', u'version': u'2.0.5', u'release': u'1.el5', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u'\n[3.5.4-68.2]\n- Security Release, fixes CVE-2011-0719\n- resolves: #678334', u'issued': u'2011-03-01', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELSA-2011-0305.html', u'type': u'self', u'id': None, u'title': u'ELSA-2011-0305'}, {u'href': u'http://linux.oracle.com/cve/CVE-2011-0719.html', u'type': u'cve', u'id': u'CVE-2011-0719', u'title': u'CVE-2011-0719'}], u'_content_type_id': u'erratum', u'_id': u'6c1da305-55e7-45b6-8303-bf96193f36e7', u'from': u'el-errata@oss.oracle.com', u'severity': u'Important', u'title': u' samba security update', u'_ns': u'units_erratum', u'rights': u'Copyright 2011 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 6', u'reboot_suggested': False, u'type': u'security', u'pkglist': [{u'packages': [{u'src': None, u'name': u'libsmbclient', u'sum': [u'md5', u'f00d6237b561287d4e10c269cbafbcd0'], u'filename': u'libsmbclient-3.5.4-68.el6_0.2.i686.rpm', u'epoch': u'0', u'version': u'3.5.4', u'release': u'68.el6_0.2', u'arch': u'i686'}, {u'src': None, u'name': u'libsmbclient', u'sum': [u'md5', u'2c66a4b542726e808641b9a8789b70ad'], u'filename': u'libsmbclient-3.5.4-68.el6_0.2.x86_64.rpm', u'epoch': u'0', u'version': u'3.5.4', u'release': u'68.el6_0.2', u'arch': u'x86_64'}, {u'src': None, u'name': u'libsmbclient-devel', u'sum': [u'md5', u'701fc80d21cfcca4ef3d3811116bdfbd'], u'filename': u'libsmbclient-devel-3.5.4-68.el6_0.2.i686.rpm', u'epoch': u'0', u'version': u'3.5.4', u'release': u'68.el6_0.2', u'arch': u'i686'}, {u'src': None, u'name': u'libsmbclient-devel', u'sum': [u'md5', u'4b8984c0033f8b12c15f727627c7f057'], u'filename': u'libsmbclient-devel-3.5.4-68.el6_0.2.x86_64.rpm', u'epoch': u'0', u'version': u'3.5.4', u'release': u'68.el6_0.2', u'arch': u'x86_64'}, {u'src': None, u'name': u'samba', u'sum': [u'md5', u'2d523bddf571f82f9f1d46c7ddebb371'], u'filename': u'samba-3.5.4-68.el6_0.2.src.rpm', u'epoch': u'0', u'version': u'3.5.4', u'release': u'68.el6_0.2', u'arch': u'src'}, {u'src': None, u'name': u'samba', u'sum': [u'md5', u'63b091ddb0d4c4ec9f08ef91583782e1'], u'filename': u'samba-3.5.4-68.el6_0.2.x86_64.rpm', u'epoch': u'0', u'version': u'3.5.4', u'release': u'68.el6_0.2', u'arch': u'x86_64'}, {u'src': None, u'name': u'samba-client', u'sum': [u'md5', u'b4c46523532216608326dfd53eb85f35'], u'filename': u'samba-client-3.5.4-68.el6_0.2.x86_64.rpm', u'epoch': u'0', u'version': u'3.5.4', u'release': u'68.el6_0.2', u'arch': u'x86_64'}, {u'src': None, u'name': u'samba-common', u'sum': [u'md5', u'121e9ab934abd3de1c7723b274d291f0'], u'filename': u'samba-common-3.5.4-68.el6_0.2.i686.rpm', u'epoch': u'0', u'version': u'3.5.4', u'release': u'68.el6_0.2', u'arch': u'i686'}, {u'src': None, u'name': u'samba-common', u'sum': [u'md5', u'5b99a97bab7bf6c2a1e3bc2c72039585'], u'filename': u'samba-common-3.5.4-68.el6_0.2.x86_64.rpm', u'epoch': u'0', u'version': u'3.5.4', u'release': u'68.el6_0.2', u'arch': u'x86_64'}, {u'src': None, u'name': u'samba-doc', u'sum': [u'md5', u'1999126ce3f59a5860b767943ba0ab3a'], u'filename': u'samba-doc-3.5.4-68.el6_0.2.x86_64.rpm', u'epoch': u'0', u'version': u'3.5.4', u'release': u'68.el6_0.2', u'arch': u'x86_64'}, {u'src': None, u'name': u'samba-domainjoin-gui', u'sum': [u'md5', u'ba1736cd1c25e074958816abb16e2763'], u'filename': u'samba-domainjoin-gui-3.5.4-68.el6_0.2.x86_64.rpm', u'epoch': u'0', u'version': u'3.5.4', u'release': u'68.el6_0.2', u'arch': u'x86_64'}, {u'src': None, u'name': u'samba-swat', u'sum': [u'md5', u'3e1801acdb10862c585e6c8847a6d493'], u'filename': u'samba-swat-3.5.4-68.el6_0.2.x86_64.rpm', u'epoch': u'0', u'version': u'3.5.4', u'release': u'68.el6_0.2', u'arch': u'x86_64'}, {u'src': None, u'name': u'samba-winbind', u'sum': [u'md5', u'8963308a98339af67c82e8695dbfc717'], u'filename': u'samba-winbind-3.5.4-68.el6_0.2.x86_64.rpm', u'epoch': u'0', u'version': u'3.5.4', u'release': u'68.el6_0.2', u'arch': u'x86_64'}, {u'src': None, u'name': u'samba-winbind-clients', u'sum': [u'md5', u'06b08c4fc5d70c57e53b68cf32d4a333'], u'filename': u'samba-winbind-clients-3.5.4-68.el6_0.2.i686.rpm', u'epoch': u'0', u'version': u'3.5.4', u'release': u'68.el6_0.2', u'arch': u'i686'}, {u'src': None, u'name': u'samba-winbind-clients', u'sum': [u'md5', u'6a3e6f69e219c39966f0e6f65746027c'], u'filename': u'samba-winbind-clients-3.5.4-68.el6_0.2.x86_64.rpm', u'epoch': u'0', u'version': u'3.5.4', u'release': u'68.el6_0.2', u'arch': u'x86_64'}, {u'src': None, u'name': u'samba-winbind-devel', u'sum': [u'md5', u'c681aa7b120e675b63d0c03ec0c89467'], u'filename': u'samba-winbind-devel-3.5.4-68.el6_0.2.i686.rpm', u'epoch': u'0', u'version': u'3.5.4', u'release': u'68.el6_0.2', u'arch': u'i686'}, {u'src': None, u'name': u'samba-winbind-devel', u'sum': [u'md5', u'bbf4c0b74d0315e40c9ba9b5eb36b84d'], u'filename': u'samba-winbind-devel-3.5.4-68.el6_0.2.x86_64.rpm', u'epoch': u'0', u'version': u'3.5.4', u'release': u'68.el6_0.2', u'arch': u'x86_64'}], u'name': u'ol6_x86_64_latest', u'short': u'ol6_x86_64_latest'}, {u'packages': [{u'src': None, u'name': u'libsmbclient', u'sum': [u'md5', u'be60dc5d05d1da47b4891e3b0fcae752'], u'filename': u'libsmbclient-3.0.33-3.29.el5_6.2.i386.rpm', u'epoch': u'0', u'version': u'3.0.33', u'release': u'3.29.el5_6.2', u'arch': u'i386'}, {u'src': None, u'name': u'libsmbclient', u'sum': [u'md5', u'b5759e43ae0348259d58a7ddcd49a7e2'], u'filename': u'libsmbclient-3.0.33-3.29.el5_6.2.x86_64.rpm', u'epoch': u'0', u'version': u'3.0.33', u'release': u'3.29.el5_6.2', u'arch': u'x86_64'}, {u'src': None, u'name': u'libsmbclient-devel', u'sum': [u'md5', u'56107cab332cd292e25c05225e376370'], u'filename': u'libsmbclient-devel-3.0.33-3.29.el5_6.2.i386.rpm', u'epoch': u'0', u'version': u'3.0.33', u'release': u'3.29.el5_6.2', u'arch': u'i386'}, {u'src': None, u'name': u'libsmbclient-devel', u'sum': [u'md5', u'75a586ce810f06de5b62ff529483a503'], u'filename': u'libsmbclient-devel-3.0.33-3.29.el5_6.2.x86_64.rpm', u'epoch': u'0', u'version': u'3.0.33', u'release': u'3.29.el5_6.2', u'arch': u'x86_64'}, {u'src': None, u'name': u'samba', u'sum': [u'md5', u'8240894eb2d16690a4ba7abd9c7d2557'], u'filename': u'samba-3.0.33-3.29.el5_6.2.src.rpm', u'epoch': u'0', u'version': u'3.0.33', u'release': u'3.29.el5_6.2', u'arch': u'src'}, {u'src': None, u'name': u'samba', u'sum': [u'md5', u'2b5f164e23e319d640d8be7547a4b15a'], u'filename': u'samba-3.0.33-3.29.el5_6.2.x86_64.rpm', u'epoch': u'0', u'version': u'3.0.33', u'release': u'3.29.el5_6.2', u'arch': u'x86_64'}, {u'src': None, u'name': u'samba-client', u'sum': [u'md5', u'2e82cd820868516f563d0ee95d162b74'], u'filename': u'samba-client-3.0.33-3.29.el5_6.2.x86_64.rpm', u'epoch': u'0', u'version': u'3.0.33', u'release': u'3.29.el5_6.2', u'arch': u'x86_64'}, {u'src': None, u'name': u'samba-common', u'sum': [u'md5', u'd4596a2dd06f44f1823f88f2e239480d'], u'filename': u'samba-common-3.0.33-3.29.el5_6.2.i386.rpm', u'epoch': u'0', u'version': u'3.0.33', u'release': u'3.29.el5_6.2', u'arch': u'i386'}, {u'src': None, u'name': u'samba-common', u'sum': [u'md5', u'39ee3e1e35bfc931cded7a36ab2d76b2'], u'filename': u'samba-common-3.0.33-3.29.el5_6.2.x86_64.rpm', u'epoch': u'0', u'version': u'3.0.33', u'release': u'3.29.el5_6.2', u'arch': u'x86_64'}, {u'src': None, u'name': u'samba-swat', u'sum': [u'md5', u'27e981f0b69fdcfb0313de7285580968'], u'filename': u'samba-swat-3.0.33-3.29.el5_6.2.x86_64.rpm', u'epoch': u'0', u'version': u'3.0.33', u'release': u'3.29.el5_6.2', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u'\n[3.5.4-0.70.1]\n- Security Release, fixes CVE-2011-0719\n- resolves: #678332', u'issued': u'2011-03-02', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELSA-2011-0306.html', u'type': u'self', u'id': None, u'title': u'ELSA-2011-0306'}, {u'href': u'http://linux.oracle.com/cve/CVE-2011-0719.html', u'type': u'cve', u'id': u'CVE-2011-0719', u'title': u'CVE-2011-0719'}], u'_content_type_id': u'erratum', u'_id': u'bc4f1dc2-fff9-49d4-a395-a6ea2910a87b', u'from': u'el-errata@oss.oracle.com', u'severity': u'Important', u'title': u' samba3x security update', u'_ns': u'units_erratum', u'rights': u'Copyright 2011 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 5', u'reboot_suggested': False, u'type': u'security', u'pkglist': [{u'packages': [{u'src': None, u'name': u'samba3x', u'sum': [u'md5', u'04c243a0345aa2c8167b3d938770bbc3'], u'filename': u'samba3x-3.5.4-0.70.el5_6.1.src.rpm', u'epoch': u'0', u'version': u'3.5.4', u'release': u'0.70.el5_6.1', u'arch': u'src'}, {u'src': None, u'name': u'samba3x', u'sum': [u'md5', u'dacb7e6fb654f7a39bace5daa330e3a9'], u'filename': u'samba3x-3.5.4-0.70.el5_6.1.x86_64.rpm', u'epoch': u'0', u'version': u'3.5.4', u'release': u'0.70.el5_6.1', u'arch': u'x86_64'}, {u'src': None, u'name': u'samba3x-client', u'sum': [u'md5', u'ba9e56982b3f27c233357b4a7b887a4c'], u'filename': u'samba3x-client-3.5.4-0.70.el5_6.1.x86_64.rpm', u'epoch': u'0', u'version': u'3.5.4', u'release': u'0.70.el5_6.1', u'arch': u'x86_64'}, {u'src': None, u'name': u'samba3x-common', u'sum': [u'md5', u'f78cad534cab69bc9fa49efd01a65f30'], u'filename': u'samba3x-common-3.5.4-0.70.el5_6.1.x86_64.rpm', u'epoch': u'0', u'version': u'3.5.4', u'release': u'0.70.el5_6.1', u'arch': u'x86_64'}, {u'src': None, u'name': u'samba3x-doc', u'sum': [u'md5', u'aad1471c7339caa5d131baa8014f02bf'], u'filename': u'samba3x-doc-3.5.4-0.70.el5_6.1.x86_64.rpm', u'epoch': u'0', u'version': u'3.5.4', u'release': u'0.70.el5_6.1', u'arch': u'x86_64'}, {u'src': None, u'name': u'samba3x-domainjoin-gui', u'sum': [u'md5', u'fafb655f2d06134dcac6be5914e5cc1e'], u'filename': u'samba3x-domainjoin-gui-3.5.4-0.70.el5_6.1.x86_64.rpm', u'epoch': u'0', u'version': u'3.5.4', u'release': u'0.70.el5_6.1', u'arch': u'x86_64'}, {u'src': None, u'name': u'samba3x-swat', u'sum': [u'md5', u'018e63db99379473834ffd7940eee779'], u'filename': u'samba3x-swat-3.5.4-0.70.el5_6.1.x86_64.rpm', u'epoch': u'0', u'version': u'3.5.4', u'release': u'0.70.el5_6.1', u'arch': u'x86_64'}, {u'src': None, u'name': u'samba3x-winbind', u'sum': [u'md5', u'2f28765ad0db6ea46851103907cd3133'], u'filename': u'samba3x-winbind-3.5.4-0.70.el5_6.1.i386.rpm', u'epoch': u'0', u'version': u'3.5.4', u'release': u'0.70.el5_6.1', u'arch': u'i386'}, {u'src': None, u'name': u'samba3x-winbind', u'sum': [u'md5', u'7760034fa529fe2cb714856b0e209186'], u'filename': u'samba3x-winbind-3.5.4-0.70.el5_6.1.x86_64.rpm', u'epoch': u'0', u'version': u'3.5.4', u'release': u'0.70.el5_6.1', u'arch': u'x86_64'}, {u'src': None, u'name': u'samba3x-winbind-devel', u'sum': [u'md5', u'13ce634f0e6c6c3d42d22775e34e1bbd'], u'filename': u'samba3x-winbind-devel-3.5.4-0.70.el5_6.1.i386.rpm', u'epoch': u'0', u'version': u'3.5.4', u'release': u'0.70.el5_6.1', u'arch': u'i386'}, {u'src': None, u'name': u'samba3x-winbind-devel', u'sum': [u'md5', u'cc6ae55f1619093687d9f010c3199c06'], u'filename': u'samba3x-winbind-devel-3.5.4-0.70.el5_6.1.x86_64.rpm', u'epoch': u'0', u'version': u'3.5.4', u'release': u'0.70.el5_6.1', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u'\n[3:2.1.9-6.1]\n- fix #677845 - fixed CVE-2008-0564, CVE-2010-3089 and CVE-2011-0707', u'issued': u'2011-03-02', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELSA-2011-0307.html', u'type': u'self', u'id': None, u'title': u'ELSA-2011-0307'}, {u'href': u'http://linux.oracle.com/cve/CVE-2008-0564.html', u'type': u'cve', u'id': u'CVE-2008-0564', u'title': u'CVE-2008-0564'}, {u'href': u'http://linux.oracle.com/cve/CVE-2010-3089.html', u'type': u'cve', u'id': u'CVE-2010-3089', u'title': u'CVE-2010-3089'}, {u'href': u'http://linux.oracle.com/cve/CVE-2011-0707.html', u'type': u'cve', u'id': u'CVE-2011-0707', u'title': u'CVE-2011-0707'}], u'_content_type_id': u'erratum', u'_id': u'd5688733-a2cd-4085-8add-2af5a45936b9', u'from': u'el-errata@oss.oracle.com', u'severity': u'Moderate', u'title': u' mailman security update', u'_ns': u'units_erratum', u'rights': u'Copyright 2011 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 5', u'reboot_suggested': False, u'type': u'security', u'pkglist': [{u'packages': [{u'src': None, u'name': u'mailman', u'sum': [u'md5', u'1d1ef915e4c1448d7deafbca7db8c52d'], u'filename': u'mailman-2.1.9-6.el5_6.1.src.rpm', u'epoch': u'3', u'version': u'2.1.9', u'release': u'6.el5_6.1', u'arch': u'src'}, {u'src': None, u'name': u'mailman', u'sum': [u'md5', u'4f4e5318bc2380bc070da3457baca351'], u'filename': u'mailman-2.1.9-6.el5_6.1.x86_64.rpm', u'epoch': u'3', u'version': u'2.1.9', u'release': u'6.el5_6.1', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u'\n\nfirefox:\n\n[3.6.14-4.0.1.el6_0]\n- Added firefox-oracle-default-prefs.js and removed firefox-redhat-default-prefs.js\n\n[3.6.14-4]\n- Update to build3\n\n[3.6.14-3]\n- Update to build2\n\n[3.6.14-2]\n- Update to 3.6.14\n\nxulrunner:\n\n[1.9.2.14-3.0.1.el6_0]\n- Added xulrunner-oracle-default-prefs.js and removed the corresponding\n RedHat one. Bug#11487\n\n[1.9.2.14-3]\n- Update to build3\n\n[1.9.2.14-2]\n- Update to build2\n\n[1.9.2.14-1]\n- Update to 1.9.2.14', u'issued': u'2011-03-02', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELSA-2011-0310.html', u'type': u'self', u'id': None, u'title': u'ELSA-2011-0310'}, {u'href': u'http://linux.oracle.com/cve/CVE-2010-1585.html', u'type': u'cve', u'id': u'CVE-2010-1585', u'title': u'CVE-2010-1585'}, {u'href': u'http://linux.oracle.com/cve/CVE-2011-0051.html', u'type': u'cve', u'id': u'CVE-2011-0051', u'title': u'CVE-2011-0051'}, {u'href': u'http://linux.oracle.com/cve/CVE-2011-0053.html', u'type': u'cve', u'id': u'CVE-2011-0053', u'title': u'CVE-2011-0053'}, {u'href': u'http://linux.oracle.com/cve/CVE-2011-0054.html', u'type': u'cve', u'id': u'CVE-2011-0054', u'title': u'CVE-2011-0054'}, {u'href': u'http://linux.oracle.com/cve/CVE-2011-0055.html', u'type': u'cve', u'id': u'CVE-2011-0055', u'title': u'CVE-2011-0055'}, {u'href': u'http://linux.oracle.com/cve/CVE-2011-0056.html', u'type': u'cve', u'id': u'CVE-2011-0056', u'title': u'CVE-2011-0056'}, {u'href': u'http://linux.oracle.com/cve/CVE-2011-0057.html', u'type': u'cve', u'id': u'CVE-2011-0057', u'title': u'CVE-2011-0057'}, {u'href': u'http://linux.oracle.com/cve/CVE-2011-0058.html', u'type': u'cve', u'id': u'CVE-2011-0058', u'title': u'CVE-2011-0058'}, {u'href': u'http://linux.oracle.com/cve/CVE-2011-0059.html', u'type': u'cve', u'id': u'CVE-2011-0059', u'title': u'CVE-2011-0059'}, {u'href': u'http://linux.oracle.com/cve/CVE-2011-0061.html', u'type': u'cve', u'id': u'CVE-2011-0061', u'title': u'CVE-2011-0061'}, {u'href': u'http://linux.oracle.com/cve/CVE-2011-0062.html', u'type': u'cve', u'id': u'CVE-2011-0062', u'title': u'CVE-2011-0062'}], u'_content_type_id': u'erratum', u'_id': u'472a6fc2-d68f-4de4-9056-1fe8944a5968', u'from': u'el-errata@oss.oracle.com', u'severity': u'Critical', u'title': u' firefox security and bug fix update', u'_ns': u'units_erratum', u'rights': u'Copyright 2011 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 6', u'reboot_suggested': False, u'type': u'security', u'pkglist': [{u'packages': [{u'src': None, u'name': u'firefox', u'sum': [u'md5', u'27ee59d40575962b05f5d276a79435ed'], u'filename': u'firefox-3.6.14-4.0.1.el6_0.src.rpm', u'epoch': u'0', u'version': u'3.6.14', u'release': u'4.0.1.el6_0', u'arch': u'src'}, {u'src': None, u'name': u'firefox', u'sum': [u'md5', u'208dedec8026272171600d7ad40809e9'], u'filename': u'firefox-3.6.14-4.0.1.el6_0.x86_64.rpm', u'epoch': u'0', u'version': u'3.6.14', u'release': u'4.0.1.el6_0', u'arch': u'x86_64'}, {u'src': None, u'name': u'xulrunner', u'sum': [u'md5', u'4a8cd342c21e82ec6c15c9b029b94968'], u'filename': u'xulrunner-1.9.2.14-3.0.1.el6_0.i686.rpm', u'epoch': u'0', u'version': u'1.9.2.14', u'release': u'3.0.1.el6_0', u'arch': u'i686'}, {u'src': None, u'name': u'xulrunner', u'sum': [u'md5', u'7d1fe3efa7211c6ed5e8023a0fd3242b'], u'filename': u'xulrunner-1.9.2.14-3.0.1.el6_0.src.rpm', u'epoch': u'0', u'version': u'1.9.2.14', u'release': u'3.0.1.el6_0', u'arch': u'src'}, {u'src': None, u'name': u'xulrunner', u'sum': [u'md5', u'5270c094a2773931fbf00ed65235f389'], u'filename': u'xulrunner-1.9.2.14-3.0.1.el6_0.x86_64.rpm', u'epoch': u'0', u'version': u'1.9.2.14', u'release': u'3.0.1.el6_0', u'arch': u'x86_64'}, {u'src': None, u'name': u'xulrunner-devel', u'sum': [u'md5', u'92de5129a0e4318bfe4c0f7ab2d54a12'], u'filename': u'xulrunner-devel-1.9.2.14-3.0.1.el6_0.i686.rpm', u'epoch': u'0', u'version': u'1.9.2.14', u'release': u'3.0.1.el6_0', u'arch': u'i686'}, {u'src': None, u'name': u'xulrunner-devel', u'sum': [u'md5', u'520419d30fbafd744f11d710f1e4017e'], u'filename': u'xulrunner-devel-1.9.2.14-3.0.1.el6_0.x86_64.rpm', u'epoch': u'0', u'version': u'1.9.2.14', u'release': u'3.0.1.el6_0', u'arch': u'x86_64'}], u'name': u'ol6_x86_64_latest', u'short': u'ol6_x86_64_latest'}, {u'packages': [{u'src': None, u'name': u'firefox', u'sum': [u'md5', u'd07647998b5d494b7e8420d035435f46'], u'filename': u'firefox-3.6.14-4.0.1.el5_6.i386.rpm', u'epoch': u'0', u'version': u'3.6.14', u'release': u'4.0.1.el5_6', u'arch': u'i386'}, {u'src': None, u'name': u'firefox', u'sum': [u'md5', u'f156577590b9d51f46da952f3a822e2d'], u'filename': u'firefox-3.6.14-4.0.1.el5_6.src.rpm', u'epoch': u'0', u'version': u'3.6.14', u'release': u'4.0.1.el5_6', u'arch': u'src'}, {u'src': None, u'name': u'firefox', u'sum': [u'md5', u'b28ef74f6a46aa9984a58ca87fc15a23'], u'filename': u'firefox-3.6.14-4.0.1.el5_6.x86_64.rpm', u'epoch': u'0', u'version': u'3.6.14', u'release': u'4.0.1.el5_6', u'arch': u'x86_64'}, {u'src': None, u'name': u'xulrunner', u'sum': [u'md5', u'10461d232b95f85d7cebee3b36e15b38'], u'filename': u'xulrunner-1.9.2.14-4.0.1.el5_6.i386.rpm', u'epoch': u'0', u'version': u'1.9.2.14', u'release': u'4.0.1.el5_6', u'arch': u'i386'}, {u'src': None, u'name': u'xulrunner', u'sum': [u'md5', u'4f0f086cd86a894bb8e09a2c45dc5b18'], u'filename': u'xulrunner-1.9.2.14-4.0.1.el5_6.src.rpm', u'epoch': u'0', u'version': u'1.9.2.14', u'release': u'4.0.1.el5_6', u'arch': u'src'}, {u'src': None, u'name': u'xulrunner', u'sum': [u'md5', u'c292cdc7b432373acbab8c89d3869c10'], u'filename': u'xulrunner-1.9.2.14-4.0.1.el5_6.x86_64.rpm', u'epoch': u'0', u'version': u'1.9.2.14', u'release': u'4.0.1.el5_6', u'arch': u'x86_64'}, {u'src': None, u'name': u'xulrunner-devel', u'sum': [u'md5', u'3f7c4502ec1f17a9e1e2de1ad13b07f7'], u'filename': u'xulrunner-devel-1.9.2.14-4.0.1.el5_6.i386.rpm', u'epoch': u'0', u'version': u'1.9.2.14', u'release': u'4.0.1.el5_6', u'arch': u'i386'}, {u'src': None, u'name': u'xulrunner-devel', u'sum': [u'md5', u'5bd198e7c6d358e676563976fa5ba0ef'], u'filename': u'xulrunner-devel-1.9.2.14-4.0.1.el5_6.x86_64.rpm', u'epoch': u'0', u'version': u'1.9.2.14', u'release': u'4.0.1.el5_6', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u'\n[3.9.4-1.el6_0.1]\n- Add fix for CVE-2011-0192\nResolves: #679298', u'issued': u'2011-03-03', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELSA-2011-0318.html', u'type': u'self', u'id': None, u'title': u'ELSA-2011-0318'}, {u'href': u'http://linux.oracle.com/cve/CVE-2011-0192.html', u'type': u'cve', u'id': u'CVE-2011-0192', u'title': u'CVE-2011-0192'}], u'_content_type_id': u'erratum', u'_id': u'4d7e4406-863a-45ee-a847-bfe34476657a', u'from': u'el-errata@oss.oracle.com', u'severity': u'Important', u'title': u' libtiff security update', u'_ns': u'units_erratum', u'rights': u'Copyright 2011 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 6', u'reboot_suggested': False, u'type': u'security', u'pkglist': [{u'packages': [{u'src': None, u'name': u'libtiff', u'sum': [u'md5', u'a4984a14b9315289747de0b2a62079d9'], u'filename': u'libtiff-3.9.4-1.el6_0.1.i686.rpm', u'epoch': u'0', u'version': u'3.9.4', u'release': u'1.el6_0.1', u'arch': u'i686'}, {u'src': None, u'name': u'libtiff', u'sum': [u'md5', u'dc8b7b9a966d2bb7aa502d3b0700e659'], u'filename': u'libtiff-3.9.4-1.el6_0.1.src.rpm', u'epoch': u'0', u'version': u'3.9.4', u'release': u'1.el6_0.1', u'arch': u'src'}, {u'src': None, u'name': u'libtiff', u'sum': [u'md5', u'b61bf482c8457f627b4987fe860f1846'], u'filename': u'libtiff-3.9.4-1.el6_0.1.x86_64.rpm', u'epoch': u'0', u'version': u'3.9.4', u'release': u'1.el6_0.1', u'arch': u'x86_64'}, {u'src': None, u'name': u'libtiff-devel', u'sum': [u'md5', u'8241de943306419c5130e2d6ba492b4a'], u'filename': u'libtiff-devel-3.9.4-1.el6_0.1.i686.rpm', u'epoch': u'0', u'version': u'3.9.4', u'release': u'1.el6_0.1', u'arch': u'i686'}, {u'src': None, u'name': u'libtiff-devel', u'sum': [u'md5', u'd71ef35d40d1133159dcc3b673b581a7'], u'filename': u'libtiff-devel-3.9.4-1.el6_0.1.x86_64.rpm', u'epoch': u'0', u'version': u'3.9.4', u'release': u'1.el6_0.1', u'arch': u'x86_64'}, {u'src': None, u'name': u'libtiff-static', u'sum': [u'md5', u'4961881afe2981f559f054828f731213'], u'filename': u'libtiff-static-3.9.4-1.el6_0.1.x86_64.rpm', u'epoch': u'0', u'version': u'3.9.4', u'release': u'1.el6_0.1', u'arch': u'x86_64'}], u'name': u'ol6_x86_64_latest', u'short': u'ol6_x86_64_latest'}, {u'packages': [{u'src': None, u'name': u'libtiff', u'sum': [u'md5', u'b9980e9299994d8100dec37ec221c43b'], u'filename': u'libtiff-3.8.2-7.el5_6.6.i386.rpm', u'epoch': u'0', u'version': u'3.8.2', u'release': u'7.el5_6.6', u'arch': u'i386'}, {u'src': None, u'name': u'libtiff', u'sum': [u'md5', u'2ea07aa0d624301066b7961f5aa8190a'], u'filename': u'libtiff-3.8.2-7.el5_6.6.src.rpm', u'epoch': u'0', u'version': u'3.8.2', u'release': u'7.el5_6.6', u'arch': u'src'}, {u'src': None, u'name': u'libtiff', u'sum': [u'md5', u'64432cc7f31550bfb4e0c5aaa85a1a8f'], u'filename': u'libtiff-3.8.2-7.el5_6.6.x86_64.rpm', u'epoch': u'0', u'version': u'3.8.2', u'release': u'7.el5_6.6', u'arch': u'x86_64'}, {u'src': None, u'name': u'libtiff-devel', u'sum': [u'md5', u'e022e729fa540c1e23b3fd76ce9de765'], u'filename': u'libtiff-devel-3.8.2-7.el5_6.6.i386.rpm', u'epoch': u'0', u'version': u'3.8.2', u'release': u'7.el5_6.6', u'arch': u'i386'}, {u'src': None, u'name': u'libtiff-devel', u'sum': [u'md5', u'd1fedb6daa1fc9aaa022ce94b1e2af3e'], u'filename': u'libtiff-devel-3.8.2-7.el5_6.6.x86_64.rpm', u'epoch': u'0', u'version': u'3.8.2', u'release': u'7.el5_6.6', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u'\n[7.3.6-49]\n- Added fix for CVE-2011-1018: Privilege escalation due improper\n sanitization of special characters in log file names\n Resolves: #680304', u'issued': u'2011-03-07', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELSA-2011-0324.html', u'type': u'self', u'id': None, u'title': u'ELSA-2011-0324'}, {u'href': u'http://linux.oracle.com/cve/CVE-2011-1018.html', u'type': u'cve', u'id': u'CVE-2011-1018', u'title': u'CVE-2011-1018'}], u'_content_type_id': u'erratum', u'_id': u'1fe3a6a5-3c1b-4b9f-93af-73d4ace6ba99', u'from': u'el-errata@oss.oracle.com', u'severity': u'Important', u'title': u' logwatch security update', u'_ns': u'units_erratum', u'rights': u'Copyright 2011 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 6', u'reboot_suggested': False, u'type': u'security', u'pkglist': [{u'packages': [{u'src': None, u'name': u'logwatch', u'sum': [u'md5', u'14f6ee895ac28361df959a4a0bac16b8'], u'filename': u'logwatch-7.3.6-49.el6.noarch.rpm', u'epoch': u'0', u'version': u'7.3.6', u'release': u'49.el6', u'arch': u'noarch'}, {u'src': None, u'name': u'logwatch', u'sum': [u'md5', u'c555418cabad1147060b1f589b2dd789'], u'filename': u'logwatch-7.3.6-49.el6.src.rpm', u'epoch': u'0', u'version': u'7.3.6', u'release': u'49.el6', u'arch': u'src'}], u'name': u'ol6_x86_64_latest', u'short': u'ol6_x86_64_latest'}, {u'packages': [{u'src': None, u'name': u'logwatch', u'sum': [u'md5', u'549484e51fbd16f0280c14f169d3b50b'], u'filename': u'logwatch-7.3-9.el5_6.noarch.rpm', u'epoch': u'0', u'version': u'7.3', u'release': u'9.el5_6', u'arch': u'noarch'}, {u'src': None, u'name': u'logwatch', u'sum': [u'md5', u'c6e638e224c586b2420b548d4d5a0d19'], u'filename': u'logwatch-7.3-9.el5_6.src.rpm', u'epoch': u'0', u'version': u'7.3', u'release': u'9.el5_6', u'arch': u'src'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u'\n[1.6.11-7.3]\n- add fix for svnadmin hotcopy (#681522)\n\n[1.6.11-7.2]\n- add security fix for CVE-2011-0715 (#681171)', u'issued': u'2011-03-08', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELSA-2011-0327.html', u'type': u'self', u'id': None, u'title': u'ELSA-2011-0327'}, {u'href': u'http://linux.oracle.com/cve/CVE-2011-0715.html', u'type': u'cve', u'id': u'CVE-2011-0715', u'title': u'CVE-2011-0715'}], u'_content_type_id': u'erratum', u'_id': u'822260cb-6f7d-4180-a7ca-30c21dfe70f5', u'from': u'el-errata@oss.oracle.com', u'severity': u'Moderate', u'title': u' subversion security and bug fix update', u'_ns': u'units_erratum', u'rights': u'Copyright 2011 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 5', u'reboot_suggested': False, u'type': u'security', u'pkglist': [{u'packages': [{u'src': None, u'name': u'mod_dav_svn', u'sum': [u'md5', u'9fdfe953af5cd5a123b37869ab26ae5c'], u'filename': u'mod_dav_svn-1.6.11-7.el5_6.3.x86_64.rpm', u'epoch': u'0', u'version': u'1.6.11', u'release': u'7.el5_6.3', u'arch': u'x86_64'}, {u'src': None, u'name': u'subversion', u'sum': [u'md5', u'5f07f53069a020eed31a7ab17d05333e'], u'filename': u'subversion-1.6.11-7.el5_6.3.i386.rpm', u'epoch': u'0', u'version': u'1.6.11', u'release': u'7.el5_6.3', u'arch': u'i386'}, {u'src': None, u'name': u'subversion', u'sum': [u'md5', u'c821f892fa0928269cc3281d63177a5f'], u'filename': u'subversion-1.6.11-7.el5_6.3.src.rpm', u'epoch': u'0', u'version': u'1.6.11', u'release': u'7.el5_6.3', u'arch': u'src'}, {u'src': None, u'name': u'subversion', u'sum': [u'md5', u'7d3f35ed3c201745e9e9e042bc4f5c92'], u'filename': u'subversion-1.6.11-7.el5_6.3.x86_64.rpm', u'epoch': u'0', u'version': u'1.6.11', u'release': u'7.el5_6.3', u'arch': u'x86_64'}, {u'src': None, u'name': u'subversion-devel', u'sum': [u'md5', u'4c243d0e6862ddc318196575c745a8bc'], u'filename': u'subversion-devel-1.6.11-7.el5_6.3.i386.rpm', u'epoch': u'0', u'version': u'1.6.11', u'release': u'7.el5_6.3', u'arch': u'i386'}, {u'src': None, u'name': u'subversion-devel', u'sum': [u'md5', u'faf4f42db045c0af43a5e542dbdff02e'], u'filename': u'subversion-devel-1.6.11-7.el5_6.3.x86_64.rpm', u'epoch': u'0', u'version': u'1.6.11', u'release': u'7.el5_6.3', u'arch': u'x86_64'}, {u'src': None, u'name': u'subversion-javahl', u'sum': [u'md5', u'38223e88515ff9e6c71258b5477f3700'], u'filename': u'subversion-javahl-1.6.11-7.el5_6.3.x86_64.rpm', u'epoch': u'0', u'version': u'1.6.11', u'release': u'7.el5_6.3', u'arch': u'x86_64'}, {u'src': None, u'name': u'subversion-perl', u'sum': [u'md5', u'e7ca0dd1f37863245b630b1f3a18e689'], u'filename': u'subversion-perl-1.6.11-7.el5_6.3.x86_64.rpm', u'epoch': u'0', u'version': u'1.6.11', u'release': u'7.el5_6.3', u'arch': u'x86_64'}, {u'src': None, u'name': u'subversion-ruby', u'sum': [u'md5', u'dde8ba6cb3455a14c14f8aec2797d184'], u'filename': u'subversion-ruby-1.6.11-7.el5_6.3.x86_64.rpm', u'epoch': u'0', u'version': u'1.6.11', u'release': u'7.el5_6.3', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u'\n[1.0.4-3.1]\n- fix the buffer overflow bug before iscsi login (CVE-2011-0001)', u'issued': u'2011-03-09', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELSA-2011-0332.html', u'type': u'self', u'id': None, u'title': u'ELSA-2011-0332'}, {u'href': u'http://linux.oracle.com/cve/CVE-2011-0001.html', u'type': u'cve', u'id': u'CVE-2011-0001', u'title': u'CVE-2011-0001'}], u'_content_type_id': u'erratum', u'_id': u'b9c7918b-8e09-4e07-acda-453b1b8a1c09', u'from': u'el-errata@oss.oracle.com', u'severity': u'Important', u'title': u' scsi-target-utils security update', u'_ns': u'units_erratum', u'rights': u'Copyright 2011 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 6', u'reboot_suggested': False, u'type': u'security', u'pkglist': [{u'packages': [{u'src': None, u'name': u'scsi-target-utils', u'sum': [u'md5', u'8fdb398da7ea9c22d5f709bc7559c4c2'], u'filename': u'scsi-target-utils-1.0.4-3.el6_0.1.src.rpm', u'epoch': u'0', u'version': u'1.0.4', u'release': u'3.el6_0.1', u'arch': u'src'}, {u'src': None, u'name': u'scsi-target-utils', u'sum': [u'md5', u'217801267499fd01507a160080b8c1aa'], u'filename': u'scsi-target-utils-1.0.4-3.el6_0.1.x86_64.rpm', u'epoch': u'0', u'version': u'1.0.4', u'release': u'3.el6_0.1', u'arch': u'x86_64'}], u'name': u'ol6_x86_64_latest', u'short': u'ol6_x86_64_latest'}, {u'packages': [{u'src': None, u'name': u'scsi-target-utils', u'sum': [u'md5', u'5986b340f83ffa72f273795deb09eaf6'], u'filename': u'scsi-target-utils-1.0.8-0.el5_6.1.src.rpm', u'epoch': u'0', u'version': u'1.0.8', u'release': u'0.el5_6.1', u'arch': u'src'}, {u'src': None, u'name': u'scsi-target-utils', u'sum': [u'md5', u'296a284c4403e7c60b6486f624cd718e'], u'filename': u'scsi-target-utils-1.0.8-0.el5_6.1.x86_64.rpm', u'epoch': u'0', u'version': u'1.0.8', u'release': u'0.el5_6.1', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u'\n[0:5.5.23-0jpp.17]\n- Resolves: rhbz 674599 JDK Double.parseDouble DoS', u'issued': u'2011-03-09', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELSA-2011-0336.html', u'type': u'self', u'id': None, u'title': u'ELSA-2011-0336'}, {u'href': u'http://linux.oracle.com/cve/CVE-2010-4476.html', u'type': u'cve', u'id': u'CVE-2010-4476', u'title': u'CVE-2010-4476'}], u'_content_type_id': u'erratum', u'_id': u'808729bb-6428-42f9-b91c-261f8eb5fd2e', u'from': u'el-errata@oss.oracle.com', u'severity': u'Important', u'title': u' tomcat5 security update', u'_ns': u'units_erratum', u'rights': u'Copyright 2011 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 5', u'reboot_suggested': False, u'type': u'security', u'pkglist': [{u'packages': [{u'src': None, u'name': u'tomcat5', u'sum': [u'md5', u'186646333f7a10043ce2be7778a8e95f'], u'filename': u'tomcat5-5.5.23-0jpp.17.el5_6.src.rpm', u'epoch': u'0', u'version': u'5.5.23', u'release': u'0jpp.17.el5_6', u'arch': u'src'}, {u'src': None, u'name': u'tomcat5', u'sum': [u'md5', u'5904d7b606b2ba6ee3b107d95eb929b1'], u'filename': u'tomcat5-5.5.23-0jpp.17.el5_6.x86_64.rpm', u'epoch': u'0', u'version': u'5.5.23', u'release': u'0jpp.17.el5_6', u'arch': u'x86_64'}, {u'src': None, u'name': u'tomcat5-admin-webapps', u'sum': [u'md5', u'58492eaf92e689d27f098eef77dbbf5b'], u'filename': u'tomcat5-admin-webapps-5.5.23-0jpp.17.el5_6.x86_64.rpm', u'epoch': u'0', u'version': u'5.5.23', u'release': u'0jpp.17.el5_6', u'arch': u'x86_64'}, {u'src': None, u'name': u'tomcat5-common-lib', u'sum': [u'md5', u'a76807b236a42c054c37dbad6c7b9f4b'], u'filename': u'tomcat5-common-lib-5.5.23-0jpp.17.el5_6.x86_64.rpm', u'epoch': u'0', u'version': u'5.5.23', u'release': u'0jpp.17.el5_6', u'arch': u'x86_64'}, {u'src': None, u'name': u'tomcat5-jasper', u'sum': [u'md5', u'17e47e0cf94487352f0a61dc4b349dfa'], u'filename': u'tomcat5-jasper-5.5.23-0jpp.17.el5_6.x86_64.rpm', u'epoch': u'0', u'version': u'5.5.23', u'release': u'0jpp.17.el5_6', u'arch': u'x86_64'}, {u'src': None, u'name': u'tomcat5-jasper-javadoc', u'sum': [u'md5', u'5f20c245b07e7c05fede1d20d7569883'], u'filename': u'tomcat5-jasper-javadoc-5.5.23-0jpp.17.el5_6.x86_64.rpm', u'epoch': u'0', u'version': u'5.5.23', u'release': u'0jpp.17.el5_6', u'arch': u'x86_64'}, {u'src': None, u'name': u'tomcat5-jsp-2.0-api', u'sum': [u'md5', u'322950ecf9fe62733d7d7a7a7d4dda8c'], u'filename': u'tomcat5-jsp-2.0-api-5.5.23-0jpp.17.el5_6.x86_64.rpm', u'epoch': u'0', u'version': u'5.5.23', u'release': u'0jpp.17.el5_6', u'arch': u'x86_64'}, {u'src': None, u'name': u'tomcat5-jsp-2.0-api-javadoc', u'sum': [u'md5', u'12188be785ee6a363d0e5828c4316e08'], u'filename': u'tomcat5-jsp-2.0-api-javadoc-5.5.23-0jpp.17.el5_6.x86_64.rpm', u'epoch': u'0', u'version': u'5.5.23', u'release': u'0jpp.17.el5_6', u'arch': u'x86_64'}, {u'src': None, u'name': u'tomcat5-server-lib', u'sum': [u'md5', u'3b9407fbce356f54a19fe51934e24cee'], u'filename': u'tomcat5-server-lib-5.5.23-0jpp.17.el5_6.x86_64.rpm', u'epoch': u'0', u'version': u'5.5.23', u'release': u'0jpp.17.el5_6', u'arch': u'x86_64'}, {u'src': None, u'name': u'tomcat5-servlet-2.4-api', u'sum': [u'md5', u'e81c2982cfdd5d15636be3b173e13171'], u'filename': u'tomcat5-servlet-2.4-api-5.5.23-0jpp.17.el5_6.x86_64.rpm', u'epoch': u'0', u'version': u'5.5.23', u'release': u'0jpp.17.el5_6', u'arch': u'x86_64'}, {u'src': None, u'name': u'tomcat5-servlet-2.4-api-javadoc', u'sum': [u'md5', u'9a7a0f0f469461291dd4062ba82cc1c2'], u'filename': u'tomcat5-servlet-2.4-api-javadoc-5.5.23-0jpp.17.el5_6.x86_64.rpm', u'epoch': u'0', u'version': u'5.5.23', u'release': u'0jpp.17.el5_6', u'arch': u'x86_64'}, {u'src': None, u'name': u'tomcat5-webapps', u'sum': [u'md5', u'4ff1111bcc9aac0ebe9273a4897387d3'], u'filename': u'tomcat5-webapps-5.5.23-0jpp.17.el5_6.x86_64.rpm', u'epoch': u'0', u'version': u'5.5.23', u'release': u'0jpp.17.el5_6', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u'\n[2.2.2-6.el6_0.1]\n- Resolves: #681891 - CVE-2011-0762 vsftpd: remote DoS via crafted glob pattern', u'issued': u'2011-03-09', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELSA-2011-0337.html', u'type': u'self', u'id': None, u'title': u'ELSA-2011-0337'}, {u'href': u'http://linux.oracle.com/cve/CVE-2011-0762.html', u'type': u'cve', u'id': u'CVE-2011-0762', u'title': u'CVE-2011-0762'}], u'_content_type_id': u'erratum', u'_id': u'c41c933c-e650-4e0e-8057-580f23b633df', u'from': u'el-errata@oss.oracle.com', u'severity': u'Important', u'title': u' vsftpd security update', u'_ns': u'units_erratum', u'rights': u'Copyright 2011 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 6', u'reboot_suggested': False, u'type': u'security', u'pkglist': [{u'packages': [{u'src': None, u'name': u'vsftpd', u'sum': [u'md5', u'bd44366e0392da2f3e1b400cc518c581'], u'filename': u'vsftpd-2.2.2-6.el6_0.1.src.rpm', u'epoch': u'0', u'version': u'2.2.2', u'release': u'6.el6_0.1', u'arch': u'src'}, {u'src': None, u'name': u'vsftpd', u'sum': [u'md5', u'45734c0aefdef1ea87ebce5f4bf47b96'], u'filename': u'vsftpd-2.2.2-6.el6_0.1.x86_64.rpm', u'epoch': u'0', u'version': u'2.2.2', u'release': u'6.el6_0.1', u'arch': u'x86_64'}], u'name': u'ol6_x86_64_latest', u'short': u'ol6_x86_64_latest'}, {u'packages': [{u'src': None, u'name': u'vsftpd', u'sum': [u'md5', u'ccaf15c5417849c96429b392f5300b52'], u'filename': u'vsftpd-2.0.5-16.el5_6.1.src.rpm', u'epoch': u'0', u'version': u'2.0.5', u'release': u'16.el5_6.1', u'arch': u'src'}, {u'src': None, u'name': u'vsftpd', u'sum': [u'md5', u'4fda2a4da33b6c1072f53f28734e9996'], u'filename': u'vsftpd-2.0.5-16.el5_6.1.x86_64.rpm', u'epoch': u'0', u'version': u'2.0.5', u'release': u'16.el5_6.1', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u'\n[2.3.43-12.7]\n- fix: CVE-2011-1024 ppolicy forwarded bind failure messages cause success (#680484)\n\n[2.3.43-12.6]\n- fix: slapd concurrent access to connections causes slapd to silently die (#677611)', u'issued': u'2011-03-10', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELSA-2011-0346.html', u'type': u'self', u'id': None, u'title': u'ELSA-2011-0346'}, {u'href': u'http://linux.oracle.com/cve/CVE-2011-1024.html', u'type': u'cve', u'id': u'CVE-2011-1024', u'title': u'CVE-2011-1024'}], u'_content_type_id': u'erratum', u'_id': u'506ba73d-d389-45cd-a9a2-07b6ea25b583', u'from': u'el-errata@oss.oracle.com', u'severity': u'Moderate', u'title': u' openldap security and bug fix update', u'_ns': u'units_erratum', u'rights': u'Copyright 2011 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 5', u'reboot_suggested': False, u'type': u'security', u'pkglist': [{u'packages': [{u'src': None, u'name': u'compat-openldap', u'sum': [u'md5', u'7e69cb7316cdaf796ffaa89572b75051'], u'filename': u'compat-openldap-2.3.43_2.2.29-12.el5_6.7.i386.rpm', u'epoch': u'0', u'version': u'2.3.43_2.2.29', u'release': u'12.el5_6.7', u'arch': u'i386'}, {u'src': None, u'name': u'compat-openldap', u'sum': [u'md5', u'3a8ebe94a86d8f4c852d3fc55837d462'], u'filename': u'compat-openldap-2.3.43_2.2.29-12.el5_6.7.x86_64.rpm', u'epoch': u'0', u'version': u'2.3.43_2.2.29', u'release': u'12.el5_6.7', u'arch': u'x86_64'}, {u'src': None, u'name': u'openldap', u'sum': [u'md5', u'5f01fffc6182db52f28b5a6fff0c717d'], u'filename': u'openldap-2.3.43-12.el5_6.7.i386.rpm', u'epoch': u'0', u'version': u'2.3.43', u'release': u'12.el5_6.7', u'arch': u'i386'}, {u'src': None, u'name': u'openldap', u'sum': [u'md5', u'e6a88c4b0015647b70f6a3b0cb8f56a2'], u'filename': u'openldap-2.3.43-12.el5_6.7.src.rpm', u'epoch': u'0', u'version': u'2.3.43', u'release': u'12.el5_6.7', u'arch': u'src'}, {u'src': None, u'name': u'openldap', u'sum': [u'md5', u'3ad2dc5717c17340b2f9c26f95dd9c47'], u'filename': u'openldap-2.3.43-12.el5_6.7.x86_64.rpm', u'epoch': u'0', u'version': u'2.3.43', u'release': u'12.el5_6.7', u'arch': u'x86_64'}, {u'src': None, u'name': u'openldap-clients', u'sum': [u'md5', u'9bb0d8f82a2d576441b68a3229925c7b'], u'filename': u'openldap-clients-2.3.43-12.el5_6.7.x86_64.rpm', u'epoch': u'0', u'version': u'2.3.43', u'release': u'12.el5_6.7', u'arch': u'x86_64'}, {u'src': None, u'name': u'openldap-devel', u'sum': [u'md5', u'0409f6995be0421ee90afa3f541206de'], u'filename': u'openldap-devel-2.3.43-12.el5_6.7.i386.rpm', u'epoch': u'0', u'version': u'2.3.43', u'release': u'12.el5_6.7', u'arch': u'i386'}, {u'src': None, u'name': u'openldap-devel', u'sum': [u'md5', u'09ef6c4ce8b9cbca7257ab28dc84bb6e'], u'filename': u'openldap-devel-2.3.43-12.el5_6.7.x86_64.rpm', u'epoch': u'0', u'version': u'2.3.43', u'release': u'12.el5_6.7', u'arch': u'x86_64'}, {u'src': None, u'name': u'openldap-servers', u'sum': [u'md5', u'198b16eaba56768b45bf272ca3bb36d4'], u'filename': u'openldap-servers-2.3.43-12.el5_6.7.x86_64.rpm', u'epoch': u'0', u'version': u'2.3.43', u'release': u'12.el5_6.7', u'arch': u'x86_64'}, {u'src': None, u'name': u'openldap-servers-overlays', u'sum': [u'md5', u'2221a53336b8ee465cf393153516af4e'], u'filename': u'openldap-servers-overlays-2.3.43-12.el5_6.7.x86_64.rpm', u'epoch': u'0', u'version': u'2.3.43', u'release': u'12.el5_6.7', u'arch': u'x86_64'}, {u'src': None, u'name': u'openldap-servers-sql', u'sum': [u'md5', u'185408680e8848e2774dc97d8d5abb1f'], u'filename': u'openldap-servers-sql-2.3.43-12.el5_6.7.x86_64.rpm', u'epoch': u'0', u'version': u'2.3.43', u'release': u'12.el5_6.7', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u'\n[1.0.15-1.0.1.el5_6.4]\n- Added oracle-ocfs2-network.patch\n\n[1.0.15-1.4]\n- fix few security issues\n- Resolves: CVE -2011-0024 CVE-2011-0538 CVE-2011-1139 CVE-2011-1140\n CVE-2011-1141 CVE-2011-1143 #612240\n\n[1.0.15-1.3]\n- recompile with -fno-strict-aliasing\n\n[1.0.15-1.2]\n- fix buffer overflow in ENTTEC dissector\n- Resolves: #667335', u'issued': u'2011-03-21', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELSA-2011-0370.html', u'type': u'self', u'id': None, u'title': u'ELSA-2011-0370'}, {u'href': u'http://linux.oracle.com/cve/CVE-2010-3445.html', u'type': u'cve', u'id': u'CVE-2010-3445', u'title': u'CVE-2010-3445'}, {u'href': u'http://linux.oracle.com/cve/CVE-2011-0024.html', u'type': u'cve', u'id': u'CVE-2011-0024', u'title': u'CVE-2011-0024'}, {u'href': u'http://linux.oracle.com/cve/CVE-2011-0538.html', u'type': u'cve', u'id': u'CVE-2011-0538', u'title': u'CVE-2011-0538'}, {u'href': u'http://linux.oracle.com/cve/CVE-2011-1139.html', u'type': u'cve', u'id': u'CVE-2011-1139', u'title': u'CVE-2011-1139'}, {u'href': u'http://linux.oracle.com/cve/CVE-2011-1140.html', u'type': u'cve', u'id': u'CVE-2011-1140', u'title': u'CVE-2011-1140'}, {u'href': u'http://linux.oracle.com/cve/CVE-2011-1141.html', u'type': u'cve', u'id': u'CVE-2011-1141', u'title': u'CVE-2011-1141'}, {u'href': u'http://linux.oracle.com/cve/CVE-2011-1143.html', u'type': u'cve', u'id': u'CVE-2011-1143', u'title': u'CVE-2011-1143'}], u'_content_type_id': u'erratum', u'_id': u'5c91dc74-20d9-4ebc-bbb0-e07252708f49', u'from': u'el-errata@oss.oracle.com', u'severity': u'Moderate', u'title': u' wireshark security update', u'_ns': u'units_erratum', u'rights': u'Copyright 2011 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 5', u'reboot_suggested': False, u'type': u'security', u'pkglist': [{u'packages': [{u'src': None, u'name': u'wireshark', u'sum': [u'md5', u'24df455f68cee84e7f2c415cf653cd80'], u'filename': u'wireshark-1.0.15-1.0.1.el5_6.4.src.rpm', u'epoch': u'0', u'version': u'1.0.15', u'release': u'1.0.1.el5_6.4', u'arch': u'src'}, {u'src': None, u'name': u'wireshark', u'sum': [u'md5', u'cd4dd4934b595868f4ba7eb7ef246c27'], u'filename': u'wireshark-1.0.15-1.0.1.el5_6.4.x86_64.rpm', u'epoch': u'0', u'version': u'1.0.15', u'release': u'1.0.1.el5_6.4', u'arch': u'x86_64'}, {u'src': None, u'name': u'wireshark-gnome', u'sum': [u'md5', u'ee1082f36c914485d489a43911bc080a'], u'filename': u'wireshark-gnome-1.0.15-1.0.1.el5_6.4.x86_64.rpm', u'epoch': u'0', u'version': u'1.0.15', u'release': u'1.0.1.el5_6.4', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u'\n[1.9.2.15-2.0.1.el6_0]\n- Replace xulrunner-redhat-default-prefs.js with\n xulrunner-oracle-default-prefs.js\n\n[1.9.2.15-2]\n- Fixed mozbz#642395', u'issued': u'2011-03-22', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELSA-2011-0373.html', u'type': u'self', u'id': None, u'title': u'ELSA-2011-0373'}], u'_content_type_id': u'erratum', u'_id': u'7baf0a09-bbbd-4b9e-ae8b-aae941d75847', u'from': u'el-errata@oss.oracle.com', u'severity': u'Important', u'title': u' firefox security update', u'_ns': u'units_erratum', u'rights': u'Copyright 2011 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 6', u'reboot_suggested': False, u'type': u'security', u'pkglist': [{u'packages': [{u'src': None, u'name': u'xulrunner', u'sum': [u'md5', u'c1f4dbd1b3e0785081ebded669959fca'], u'filename': u'xulrunner-1.9.2.15-2.0.1.el6_0.i686.rpm', u'epoch': u'0', u'version': u'1.9.2.15', u'release': u'2.0.1.el6_0', u'arch': u'i686'}, {u'src': None, u'name': u'xulrunner', u'sum': [u'md5', u'd92ecc06b4415e8d695070159401d1c2'], u'filename': u'xulrunner-1.9.2.15-2.0.1.el6_0.src.rpm', u'epoch': u'0', u'version': u'1.9.2.15', u'release': u'2.0.1.el6_0', u'arch': u'src'}, {u'src': None, u'name': u'xulrunner', u'sum': [u'md5', u'b1e90999851774370af41751b2e326c1'], u'filename': u'xulrunner-1.9.2.15-2.0.1.el6_0.x86_64.rpm', u'epoch': u'0', u'version': u'1.9.2.15', u'release': u'2.0.1.el6_0', u'arch': u'x86_64'}, {u'src': None, u'name': u'xulrunner-devel', u'sum': [u'md5', u'f33c162986c208f6cf8a58cf0ded38c9'], u'filename': u'xulrunner-devel-1.9.2.15-2.0.1.el6_0.i686.rpm', u'epoch': u'0', u'version': u'1.9.2.15', u'release': u'2.0.1.el6_0', u'arch': u'i686'}, {u'src': None, u'name': u'xulrunner-devel', u'sum': [u'md5', u'6d905337bf2d0bf3025a60abcba4dda8'], u'filename': u'xulrunner-devel-1.9.2.15-2.0.1.el6_0.x86_64.rpm', u'epoch': u'0', u'version': u'1.9.2.15', u'release': u'2.0.1.el6_0', u'arch': u'x86_64'}], u'name': u'ol6_x86_64_latest', u'short': u'ol6_x86_64_latest'}, {u'packages': [{u'src': None, u'name': u'xulrunner', u'sum': [u'md5', u'4646d3af376e269f676aac021aaa799d'], u'filename': u'xulrunner-1.9.2.15-2.0.1.el5_6.i386.rpm', u'epoch': u'0', u'version': u'1.9.2.15', u'release': u'2.0.1.el5_6', u'arch': u'i386'}, {u'src': None, u'name': u'xulrunner', u'sum': [u'md5', u'd2593ec5000d4ca9218fbb21255ecbfa'], u'filename': u'xulrunner-1.9.2.15-2.0.1.el5_6.src.rpm', u'epoch': u'0', u'version': u'1.9.2.15', u'release': u'2.0.1.el5_6', u'arch': u'src'}, {u'src': None, u'name': u'xulrunner', u'sum': [u'md5', u'59b38ae95abdba6bc5eb5c72627e2e64'], u'filename': u'xulrunner-1.9.2.15-2.0.1.el5_6.x86_64.rpm', u'epoch': u'0', u'version': u'1.9.2.15', u'release': u'2.0.1.el5_6', u'arch': u'x86_64'}, {u'src': None, u'name': u'xulrunner-devel', u'sum': [u'md5', u'32d3c1d21d98099989f28f39fb7ff805'], u'filename': u'xulrunner-devel-1.9.2.15-2.0.1.el5_6.i386.rpm', u'epoch': u'0', u'version': u'1.9.2.15', u'release': u'2.0.1.el5_6', u'arch': u'i386'}, {u'src': None, u'name': u'xulrunner-devel', u'sum': [u'md5', u'20bf02895bdfedc1b57bc99acd9f45d6'], u'filename': u'xulrunner-devel-1.9.2.15-2.0.1.el5_6.x86_64.rpm', u'epoch': u'0', u'version': u'1.9.2.15', u'release': u'2.0.1.el5_6', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u'\n[1:1.2.24-4]\n- Apply patch for CVE-2010-4352\n- Resolves: #684852', u'issued': u'2011-03-22', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELSA-2011-0376.html', u'type': u'self', u'id': None, u'title': u'ELSA-2011-0376'}, {u'href': u'http://linux.oracle.com/cve/CVE-2010-4352.html', u'type': u'cve', u'id': u'CVE-2010-4352', u'title': u'CVE-2010-4352'}], u'_content_type_id': u'erratum', u'_id': u'25ade668-8342-4c01-bddc-320f3a7f56f5', u'from': u'el-errata@oss.oracle.com', u'severity': u'Moderate', u'title': u' dbus security update', u'_ns': u'units_erratum', u'rights': u'Copyright 2011 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 6', u'reboot_suggested': False, u'type': u'security', u'pkglist': [{u'packages': [{u'src': None, u'name': u'dbus', u'sum': [u'md5', u'0a42bf16ed3b9feb5cf96d73c8befa13'], u'filename': u'dbus-1.2.24-4.el6_0.src.rpm', u'epoch': u'1', u'version': u'1.2.24', u'release': u'4.el6_0', u'arch': u'src'}, {u'src': None, u'name': u'dbus', u'sum': [u'md5', u'f3dfc3d24cbf5f1d9a5a947787a9feed'], u'filename': u'dbus-1.2.24-4.el6_0.x86_64.rpm', u'epoch': u'1', u'version': u'1.2.24', u'release': u'4.el6_0', u'arch': u'x86_64'}, {u'src': None, u'name': u'dbus-devel', u'sum': [u'md5', u'f10ff3672f0ace6d580b5d18b0f452fe'], u'filename': u'dbus-devel-1.2.24-4.el6_0.i686.rpm', u'epoch': u'1', u'version': u'1.2.24', u'release': u'4.el6_0', u'arch': u'i686'}, {u'src': None, u'name': u'dbus-devel', u'sum': [u'md5', u'06b9eabfb3d726260c8ff89417aa0db8'], u'filename': u'dbus-devel-1.2.24-4.el6_0.x86_64.rpm', u'epoch': u'1', u'version': u'1.2.24', u'release': u'4.el6_0', u'arch': u'x86_64'}, {u'src': None, u'name': u'dbus-doc', u'sum': [u'md5', u'7732697100bf13276e75a08769e8c61c'], u'filename': u'dbus-doc-1.2.24-4.el6_0.noarch.rpm', u'epoch': u'1', u'version': u'1.2.24', u'release': u'4.el6_0', u'arch': u'noarch'}, {u'src': None, u'name': u'dbus-libs', u'sum': [u'md5', u'302bd76b02af8876ebd32daa46e55e8b'], u'filename': u'dbus-libs-1.2.24-4.el6_0.i686.rpm', u'epoch': u'1', u'version': u'1.2.24', u'release': u'4.el6_0', u'arch': u'i686'}, {u'src': None, u'name': u'dbus-libs', u'sum': [u'md5', u'aca9db34eb499397efabf9e63adc9604'], u'filename': u'dbus-libs-1.2.24-4.el6_0.x86_64.rpm', u'epoch': u'1', u'version': u'1.2.24', u'release': u'4.el6_0', u'arch': u'x86_64'}, {u'src': None, u'name': u'dbus-x11', u'sum': [u'md5', u'33542b585db6f1bce2796245a13877a4'], u'filename': u'dbus-x11-1.2.24-4.el6_0.x86_64.rpm', u'epoch': u'1', u'version': u'1.2.24', u'release': u'4.el6_0', u'arch': u'x86_64'}], u'name': u'ol6_x86_64_latest', u'short': u'ol6_x86_64_latest'}, {u'packages': [{u'src': None, u'name': u'dbus', u'sum': [u'md5', u'3e9230fdaee72eea85af21dcdb2625bb'], u'filename': u'dbus-1.1.2-15.el5_6.i386.rpm', u'epoch': u'0', u'version': u'1.1.2', u'release': u'15.el5_6', u'arch': u'i386'}, {u'src': None, u'name': u'dbus', u'sum': [u'md5', u'd9e50fd5d9ad52693809e6e1d15cd5dd'], u'filename': u'dbus-1.1.2-15.el5_6.src.rpm', u'epoch': u'0', u'version': u'1.1.2', u'release': u'15.el5_6', u'arch': u'src'}, {u'src': None, u'name': u'dbus', u'sum': [u'md5', u'8a0e9ccb333341b5b1cc4034607a6e10'], u'filename': u'dbus-1.1.2-15.el5_6.x86_64.rpm', u'epoch': u'0', u'version': u'1.1.2', u'release': u'15.el5_6', u'arch': u'x86_64'}, {u'src': None, u'name': u'dbus-devel', u'sum': [u'md5', u'5606570b9fbc99a7c4c098960170a523'], u'filename': u'dbus-devel-1.1.2-15.el5_6.i386.rpm', u'epoch': u'0', u'version': u'1.1.2', u'release': u'15.el5_6', u'arch': u'i386'}, {u'src': None, u'name': u'dbus-devel', u'sum': [u'md5', u'e82e428192d804730822e5e0d0df5b34'], u'filename': u'dbus-devel-1.1.2-15.el5_6.x86_64.rpm', u'epoch': u'0', u'version': u'1.1.2', u'release': u'15.el5_6', u'arch': u'x86_64'}, {u'src': None, u'name': u'dbus-libs', u'sum': [u'md5', u'9b787a2d22a08f2fbc90ad8434df6ab0'], u'filename': u'dbus-libs-1.1.2-15.el5_6.i386.rpm', u'epoch': u'0', u'version': u'1.1.2', u'release': u'15.el5_6', u'arch': u'i386'}, {u'src': None, u'name': u'dbus-libs', u'sum': [u'md5', u'735157c391222ad31d84e37cbd79572e'], u'filename': u'dbus-libs-1.1.2-15.el5_6.x86_64.rpm', u'epoch': u'0', u'version': u'1.1.2', u'release': u'15.el5_6', u'arch': u'x86_64'}, {u'src': None, u'name': u'dbus-x11', u'sum': [u'md5', u'9d4cf04364678ea6084a29376019596b'], u'filename': u'dbus-x11-1.1.2-15.el5_6.x86_64.rpm', u'epoch': u'0', u'version': u'1.1.2', u'release': u'15.el5_6', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u'\n[0.8.1-27.0.1.el6_0.5]\n- Replace docs/et.png in tarball with blank image\n\n[0.8.1-27.el6_0.5]\n- Properly report error in virConnectDomainXMLToNative (CVE-2011-1146)\n\n[0.8.1-27.el6_0.4]\n- Add missing checks for read-only connections (CVE-2011-1146)\n\n[0.8.1-27.el6_0.3]\n- Remove patches not suitable for proper Z-stream:\n - Export host information through SMBIOS to guests (rhbz#652678)\n - Support forcing a CDROM eject (rhbz#658147)\n- Plug several memory leaks (rhbz#672549)\n- Avoid memory overhead of matchpathcon (rhbz#672554)\n- Do not start libvirt-guests if that service is off (rhbz#668694)\n\n[0.8.1-27.el6_0.2]\n- spec file cleanups (rhbz#662045)\n- Fix deadlock on concurrent multiple bidirectional migration (rhbz#662043)\n- Fix off-by-one error in clock-variable (rhbz#662046)\n- Export host information through SMBIOS to guests (rhbz#652678)\n- Ensure device is deleted from guest after unplug (rhbz#662041)\n- Distinguish between QEMU domain shutdown and crash (rhbz#662042)\n\n[0.8.1-27.el6_0.1]\n- Fix JSON migrate_set_downtime command (rhbz#658143)\n- Make SASL work over UNIX domain sockets (rhbz#658144)\n- Let qemu group look below /var/lib/libvirt/qemu/ (rhbz#656972)\n- Fix save/restore on root_squashed NFS (rhbz#656355)\n- Fix race on multiple migration (rhbz#658141)\n- Export host information through SMBIOS to guests (rhbz#652678)\n- Support forcing a CDROM eject (rhbz#658147)', u'issued': u'2011-03-28', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELSA-2011-0391.html', u'type': u'self', u'id': None, u'title': u'ELSA-2011-0391'}, {u'href': u'http://linux.oracle.com/cve/CVE-2011-1146.html', u'type': u'cve', u'id': u'CVE-2011-1146', u'title': u'CVE-2011-1146'}], u'_content_type_id': u'erratum', u'_id': u'ab0779eb-bb6d-4b16-be88-58a77f6bbd4d', u'from': u'el-errata@oss.oracle.com', u'severity': u'Important', u'title': u' libvirt security update', u'_ns': u'units_erratum', u'rights': u'Copyright 2011 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 6', u'reboot_suggested': False, u'type': u'security', u'pkglist': [{u'packages': [{u'src': None, u'name': u'libvirt', u'sum': [u'md5', u'1fcfa62ee904e4ffe6384906ecf93f34'], u'filename': u'libvirt-0.8.1-27.0.1.el6_0.5.src.rpm', u'epoch': u'0', u'version': u'0.8.1', u'release': u'27.0.1.el6_0.5', u'arch': u'src'}, {u'src': None, u'name': u'libvirt', u'sum': [u'md5', u'e649aaebef414d7dd9c55875f762c8ae'], u'filename': u'libvirt-0.8.1-27.0.1.el6_0.5.x86_64.rpm', u'epoch': u'0', u'version': u'0.8.1', u'release': u'27.0.1.el6_0.5', u'arch': u'x86_64'}, {u'src': None, u'name': u'libvirt-client', u'sum': [u'md5', u'73b175b7e452fca44aa87ba03f08aa4d'], u'filename': u'libvirt-client-0.8.1-27.0.1.el6_0.5.i686.rpm', u'epoch': u'0', u'version': u'0.8.1', u'release': u'27.0.1.el6_0.5', u'arch': u'i686'}, {u'src': None, u'name': u'libvirt-client', u'sum': [u'md5', u'543cd13c9da012bd63d547abec111f66'], u'filename': u'libvirt-client-0.8.1-27.0.1.el6_0.5.x86_64.rpm', u'epoch': u'0', u'version': u'0.8.1', u'release': u'27.0.1.el6_0.5', u'arch': u'x86_64'}, {u'src': None, u'name': u'libvirt-devel', u'sum': [u'md5', u'5402b47d6f8bff1ff325a589d034bfda'], u'filename': u'libvirt-devel-0.8.1-27.0.1.el6_0.5.i686.rpm', u'epoch': u'0', u'version': u'0.8.1', u'release': u'27.0.1.el6_0.5', u'arch': u'i686'}, {u'src': None, u'name': u'libvirt-devel', u'sum': [u'md5', u'aec7bc10305ef66a1af735d902bde758'], u'filename': u'libvirt-devel-0.8.1-27.0.1.el6_0.5.x86_64.rpm', u'epoch': u'0', u'version': u'0.8.1', u'release': u'27.0.1.el6_0.5', u'arch': u'x86_64'}, {u'src': None, u'name': u'libvirt-python', u'sum': [u'md5', u'8e5af553e5e41db98625a32fe187e8ca'], u'filename': u'libvirt-python-0.8.1-27.0.1.el6_0.5.x86_64.rpm', u'epoch': u'0', u'version': u'0.8.1', u'release': u'27.0.1.el6_0.5', u'arch': u'x86_64'}], u'name': u'ol6_x86_64_latest', u'short': u'ol6_x86_64_latest'}, {u'packages': [{u'src': None, u'name': u'libvirt', u'sum': [u'md5', u'65b00ff2f5577fadf7ed6b7c02146887'], u'filename': u'libvirt-0.8.2-15.0.1.el5_6.3.i386.rpm', u'epoch': u'0', u'version': u'0.8.2', u'release': u'15.0.1.el5_6.3', u'arch': u'i386'}, {u'src': None, u'name': u'libvirt', u'sum': [u'md5', u'66e813ed31a0e31619674bab9be09a05'], u'filename': u'libvirt-0.8.2-15.0.1.el5_6.3.src.rpm', u'epoch': u'0', u'version': u'0.8.2', u'release': u'15.0.1.el5_6.3', u'arch': u'src'}, {u'src': None, u'name': u'libvirt', u'sum': [u'md5', u'42274914f66e3c0752f69582165dff29'], u'filename': u'libvirt-0.8.2-15.0.1.el5_6.3.x86_64.rpm', u'epoch': u'0', u'version': u'0.8.2', u'release': u'15.0.1.el5_6.3', u'arch': u'x86_64'}, {u'src': None, u'name': u'libvirt-devel', u'sum': [u'md5', u'ba01c23f78521f614c6869b74ba4b447'], u'filename': u'libvirt-devel-0.8.2-15.0.1.el5_6.3.i386.rpm', u'epoch': u'0', u'version': u'0.8.2', u'release': u'15.0.1.el5_6.3', u'arch': u'i386'}, {u'src': None, u'name': u'libvirt-devel', u'sum': [u'md5', u'5746744475a3908e10fe04327ca4d37d'], u'filename': u'libvirt-devel-0.8.2-15.0.1.el5_6.3.x86_64.rpm', u'epoch': u'0', u'version': u'0.8.2', u'release': u'15.0.1.el5_6.3', u'arch': u'x86_64'}, {u'src': None, u'name': u'libvirt-python', u'sum': [u'md5', u'cf4c706d4d66de7c6bb8a5979c3bbf19'], u'filename': u'libvirt-python-0.8.2-15.0.1.el5_6.3.x86_64.rpm', u'epoch': u'0', u'version': u'0.8.2', u'release': u'15.0.1.el5_6.3', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u'\n[3.9.4-1.el6_0.2]\n- Fix incorrect fix for CVE-2011-0192\nResolves: #688829\n- Add fix for CVE-2011-1167\nResolves: #688742', u'issued': u'2011-03-28', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELSA-2011-0392.html', u'type': u'self', u'id': None, u'title': u'ELSA-2011-0392'}, {u'href': u'http://linux.oracle.com/cve/CVE-2011-1167.html', u'type': u'cve', u'id': u'CVE-2011-1167', u'title': u'CVE-2011-1167'}], u'_content_type_id': u'erratum', u'_id': u'ca819ebd-a30b-4b24-b82e-1adb97f9f32d', u'from': u'el-errata@oss.oracle.com', u'severity': u'Important', u'title': u' libtiff security and bug fix update', u'_ns': u'units_erratum', u'rights': u'Copyright 2011 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 6', u'reboot_suggested': False, u'type': u'security', u'pkglist': [{u'packages': [{u'src': None, u'name': u'libtiff', u'sum': [u'md5', u'f1a7a6622f4b3173548a7d40d8bec3bd'], u'filename': u'libtiff-3.9.4-1.el6_0.2.i686.rpm', u'epoch': u'0', u'version': u'3.9.4', u'release': u'1.el6_0.2', u'arch': u'i686'}, {u'src': None, u'name': u'libtiff', u'sum': [u'md5', u'5408a4ae56aab33af53b7c8a417cf2fb'], u'filename': u'libtiff-3.9.4-1.el6_0.2.src.rpm', u'epoch': u'0', u'version': u'3.9.4', u'release': u'1.el6_0.2', u'arch': u'src'}, {u'src': None, u'name': u'libtiff', u'sum': [u'md5', u'efe46b67bc5893691732ce62ea768400'], u'filename': u'libtiff-3.9.4-1.el6_0.2.x86_64.rpm', u'epoch': u'0', u'version': u'3.9.4', u'release': u'1.el6_0.2', u'arch': u'x86_64'}, {u'src': None, u'name': u'libtiff-devel', u'sum': [u'md5', u'93a35ac8998d8a1e9a28cad107fef871'], u'filename': u'libtiff-devel-3.9.4-1.el6_0.2.i686.rpm', u'epoch': u'0', u'version': u'3.9.4', u'release': u'1.el6_0.2', u'arch': u'i686'}, {u'src': None, u'name': u'libtiff-devel', u'sum': [u'md5', u'8598b4ed4c9ff361b0836338443f9b2b'], u'filename': u'libtiff-devel-3.9.4-1.el6_0.2.x86_64.rpm', u'epoch': u'0', u'version': u'3.9.4', u'release': u'1.el6_0.2', u'arch': u'x86_64'}, {u'src': None, u'name': u'libtiff-static', u'sum': [u'md5', u'43378c49512d5b42acb285ae0925c90f'], u'filename': u'libtiff-static-3.9.4-1.el6_0.2.x86_64.rpm', u'epoch': u'0', u'version': u'3.9.4', u'release': u'1.el6_0.2', u'arch': u'x86_64'}], u'name': u'ol6_x86_64_latest', u'short': u'ol6_x86_64_latest'}, {u'packages': [{u'src': None, u'name': u'libtiff', u'sum': [u'md5', u'9f224f515e2941d15c0b289349c12f6c'], u'filename': u'libtiff-3.8.2-7.el5_6.7.i386.rpm', u'epoch': u'0', u'version': u'3.8.2', u'release': u'7.el5_6.7', u'arch': u'i386'}, {u'src': None, u'name': u'libtiff', u'sum': [u'md5', u'4a1f03674744c5d964840d94d0c70ab1'], u'filename': u'libtiff-3.8.2-7.el5_6.7.src.rpm', u'epoch': u'0', u'version': u'3.8.2', u'release': u'7.el5_6.7', u'arch': u'src'}, {u'src': None, u'name': u'libtiff', u'sum': [u'md5', u'a431793bea739c332213bc5a3c2a740b'], u'filename': u'libtiff-3.8.2-7.el5_6.7.x86_64.rpm', u'epoch': u'0', u'version': u'3.8.2', u'release': u'7.el5_6.7', u'arch': u'x86_64'}, {u'src': None, u'name': u'libtiff-devel', u'sum': [u'md5', u'8873229c805c69fe57369e4f67b44ed5'], u'filename': u'libtiff-devel-3.8.2-7.el5_6.7.i386.rpm', u'epoch': u'0', u'version': u'3.8.2', u'release': u'7.el5_6.7', u'arch': u'i386'}, {u'src': None, u'name': u'libtiff-devel', u'sum': [u'md5', u'f9c698ce4c42984f590d32d3217673ce'], u'filename': u'libtiff-devel-3.8.2-7.el5_6.7.x86_64.rpm', u'epoch': u'0', u'version': u'3.8.2', u'release': u'7.el5_6.7', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u'\n[0.12.2-24.0.1.el5_6.1]\n- Added conga-enterprise.patch\n- Added conga-enterprise-Carthage.patch to support OEL5\n- Recreated Data.fs in luci_db.tar.gz\n- Replaced redhat logo image in conga-0.12.2.tar.gz\n\n[0.12.2-24.1]\n- Fix bz680515 (CVE-2011-0720 plone: unauthorized remote administrative access)', u'issued': u'2011-03-28', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELSA-2011-0394.html', u'type': u'self', u'id': None, u'title': u'ELSA-2011-0394'}, {u'href': u'http://linux.oracle.com/cve/CVE-2011-0720.html', u'type': u'cve', u'id': u'CVE-2011-0720', u'title': u'CVE-2011-0720'}], u'_content_type_id': u'erratum', u'_id': u'14f53b98-b00b-4220-810b-526d3cbe2a35', u'from': u'el-errata@oss.oracle.com', u'severity': u'Important', u'title': u' conga security update', u'_ns': u'units_erratum', u'rights': u'Copyright 2011 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 5', u'reboot_suggested': False, u'type': u'security', u'pkglist': [{u'packages': [{u'src': None, u'name': u'conga', u'sum': [u'md5', u'6eab4cd5df92e6df84988f47159c3022'], u'filename': u'conga-0.12.2-24.0.1.el5_6.1.src.rpm', u'epoch': u'0', u'version': u'0.12.2', u'release': u'24.0.1.el5_6.1', u'arch': u'src'}, {u'src': None, u'name': u'luci', u'sum': [u'md5', u'85475db92b5e6fedb3dbe7d09981c81e'], u'filename': u'luci-0.12.2-24.0.1.el5_6.1.x86_64.rpm', u'epoch': u'0', u'version': u'0.12.2', u'release': u'24.0.1.el5_6.1', u'arch': u'x86_64'}, {u'src': None, u'name': u'ricci', u'sum': [u'md5', u'ffa9118d61ef12c4eb5047c52502f4fc'], u'filename': u'ricci-0.12.2-24.0.1.el5_6.1.x86_64.rpm', u'epoch': u'0', u'version': u'0.12.2', u'release': u'24.0.1.el5_6.1', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u"\n[2.5-58.el5_6.2]\n- Avoid too much stack use in fnmatch (#681054, CVE-2011-1071)\n- Properly quote output of locale (#625893, CVE-2011-1095)\n- Don't leave empty element in rpath when skipping the first element,\n ignore rpath elements containing non-isolated use of when\n privileged (#667974, CVE-2011-0536)\n- Fix handling of newline in addmntent (#559579, CVE-2010-0296)\n\n[2.5-58.el5_6.1]\n- Don't ignore in libraries (#682991)", u'issued': u'2011-04-04', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELSA-2011-0412.html', u'type': u'self', u'id': None, u'title': u'ELSA-2011-0412'}, {u'href': u'http://linux.oracle.com/cve/CVE-2010-0296.html', u'type': u'cve', u'id': u'CVE-2010-0296', u'title': u'CVE-2010-0296'}, {u'href': u'http://linux.oracle.com/cve/CVE-2011-0536.html', u'type': u'cve', u'id': u'CVE-2011-0536', u'title': u'CVE-2011-0536'}, {u'href': u'http://linux.oracle.com/cve/CVE-2011-1071.html', u'type': u'cve', u'id': u'CVE-2011-1071', u'title': u'CVE-2011-1071'}, {u'href': u'http://linux.oracle.com/cve/CVE-2011-1095.html', u'type': u'cve', u'id': u'CVE-2011-1095', u'title': u'CVE-2011-1095'}, {u'href': u'http://linux.oracle.com/cve/CVE-2011-1658.html', u'type': u'cve', u'id': u'CVE-2011-1658', u'title': u'CVE-2011-1658'}, {u'href': u'http://linux.oracle.com/cve/CVE-2011-1659.html', u'type': u'cve', u'id': u'CVE-2011-1659', u'title': u'CVE-2011-1659'}], u'_content_type_id': u'erratum', u'_id': u'759990c6-0a81-4a72-a16a-63406e0e47d0', u'from': u'el-errata@oss.oracle.com', u'severity': u'Important', u'title': u' glibc security update', u'_ns': u'units_erratum', u'rights': u'Copyright 2011 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 5', u'reboot_suggested': False, u'type': u'security', u'pkglist': [{u'packages': [{u'src': None, u'name': u'glibc', u'sum': [u'md5', u'ff87467e1fb9d9348e33f4745da7d334'], u'filename': u'glibc-2.5-58.el5_6.2.i686.rpm', u'epoch': u'0', u'version': u'2.5', u'release': u'58.el5_6.2', u'arch': u'i686'}, {u'src': None, u'name': u'glibc', u'sum': [u'md5', u'ea44acb31e44095538e02bb64250cf54'], u'filename': u'glibc-2.5-58.el5_6.2.src.rpm', u'epoch': u'0', u'version': u'2.5', u'release': u'58.el5_6.2', u'arch': u'src'}, {u'src': None, u'name': u'glibc', u'sum': [u'md5', u'03b338c34c145950e2c0dd0adc32696f'], u'filename': u'glibc-2.5-58.el5_6.2.x86_64.rpm', u'epoch': u'0', u'version': u'2.5', u'release': u'58.el5_6.2', u'arch': u'x86_64'}, {u'src': None, u'name': u'glibc-common', u'sum': [u'md5', u'183a2135bb7d1db1b24570b95a7488c1'], u'filename': u'glibc-common-2.5-58.el5_6.2.x86_64.rpm', u'epoch': u'0', u'version': u'2.5', u'release': u'58.el5_6.2', u'arch': u'x86_64'}, {u'src': None, u'name': u'glibc-devel', u'sum': [u'md5', u'6a4c0c51d4eaac5f0d68eb995900fd1d'], u'filename': u'glibc-devel-2.5-58.el5_6.2.i386.rpm', u'epoch': u'0', u'version': u'2.5', u'release': u'58.el5_6.2', u'arch': u'i386'}, {u'src': None, u'name': u'glibc-devel', u'sum': [u'md5', u'3ec4a5e11446619056518731df333c34'], u'filename': u'glibc-devel-2.5-58.el5_6.2.x86_64.rpm', u'epoch': u'0', u'version': u'2.5', u'release': u'58.el5_6.2', u'arch': u'x86_64'}, {u'src': None, u'name': u'glibc-headers', u'sum': [u'md5', u'6b734cf19b785957c00c57b2ace1e207'], u'filename': u'glibc-headers-2.5-58.el5_6.2.x86_64.rpm', u'epoch': u'0', u'version': u'2.5', u'release': u'58.el5_6.2', u'arch': u'x86_64'}, {u'src': None, u'name': u'glibc-utils', u'sum': [u'md5', u'a22df4dece1f7ceb027187d5b2ba6f71'], u'filename': u'glibc-utils-2.5-58.el5_6.2.x86_64.rpm', u'epoch': u'0', u'version': u'2.5', u'release': u'58.el5_6.2', u'arch': u'x86_64'}, {u'src': None, u'name': u'nscd', u'sum': [u'md5', u'b9bd61b07a144be13a2a0cf94a5e53e2'], u'filename': u'nscd-2.5-58.el5_6.2.x86_64.rpm', u'epoch': u'0', u'version': u'2.5', u'release': u'58.el5_6.2', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u'\n[2:2.3.3-2.2]\n- fix CVE-2011-0411 (#683387)\n- fix CVE-2008-2937 (#683387)\n- defuzzification of patches', u'issued': u'2011-04-06', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELSA-2011-0422.html', u'type': u'self', u'id': None, u'title': u'ELSA-2011-0422'}, {u'href': u'http://linux.oracle.com/cve/CVE-2008-2937.html', u'type': u'cve', u'id': u'CVE-2008-2937', u'title': u'CVE-2008-2937'}, {u'href': u'http://linux.oracle.com/cve/CVE-2011-0411.html', u'type': u'cve', u'id': u'CVE-2011-0411', u'title': u'CVE-2011-0411'}], u'_content_type_id': u'erratum', u'_id': u'95a75e17-f17b-480d-ac45-42cd63535132', u'from': u'el-errata@oss.oracle.com', u'severity': u'Moderate', u'title': u' postfix security update', u'_ns': u'units_erratum', u'rights': u'Copyright 2011 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 5', u'reboot_suggested': False, u'type': u'security', u'pkglist': [{u'packages': [{u'src': None, u'name': u'postfix', u'sum': [u'md5', u'b7a14be584afe160d2327a33ec0d79bb'], u'filename': u'postfix-2.3.3-2.2.el5_6.src.rpm', u'epoch': u'2', u'version': u'2.3.3', u'release': u'2.2.el5_6', u'arch': u'src'}, {u'src': None, u'name': u'postfix', u'sum': [u'md5', u'cdd7ef800ecd479be4f3b5c9c38cb594'], u'filename': u'postfix-2.3.3-2.2.el5_6.x86_64.rpm', u'epoch': u'2', u'version': u'2.3.3', u'release': u'2.2.el5_6', u'arch': u'x86_64'}, {u'src': None, u'name': u'postfix-pflogsumm', u'sum': [u'md5', u'8279bfc763df268599a0ca6aa3765eb6'], u'filename': u'postfix-pflogsumm-2.3.3-2.2.el5_6.x86_64.rpm', u'epoch': u'2', u'version': u'2.3.3', u'release': u'2.2.el5_6', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u'\n[12:4.1.1-12.P1.4]\n- Better fix for CVE-2011-0997: making domain-name check more lenient (#690578)\n\n[12:4.1.1-12.P1.3]\n- dhclient: insufficient sanitization of certain DHCP response values\n (CVE-2011-0997, #690578)', u'issued': u'2011-04-08', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELSA-2011-0428.html', u'type': u'self', u'id': None, u'title': u'ELSA-2011-0428'}, {u'href': u'http://linux.oracle.com/cve/CVE-2011-0997.html', u'type': u'cve', u'id': u'CVE-2011-0997', u'title': u'CVE-2011-0997'}], u'_content_type_id': u'erratum', u'_id': u'd8233c75-4a63-41c6-b287-ae46cd05f49b', u'from': u'el-errata@oss.oracle.com', u'severity': u'Important', u'title': u' dhcp security update', u'_ns': u'units_erratum', u'rights': u'Copyright 2011 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 6', u'reboot_suggested': False, u'type': u'security', u'pkglist': [{u'packages': [{u'src': None, u'name': u'dhclient', u'sum': [u'md5', u'7e252270d2b65d24a8fcdaf31350dc59'], u'filename': u'dhclient-4.1.1-12.P1.el6_0.4.x86_64.rpm', u'epoch': u'12', u'version': u'4.1.1', u'release': u'12.P1.el6_0.4', u'arch': u'x86_64'}, {u'src': None, u'name': u'dhcp', u'sum': [u'md5', u'07d03d677ef11106e823085bcf76bb06'], u'filename': u'dhcp-4.1.1-12.P1.el6_0.4.src.rpm', u'epoch': u'12', u'version': u'4.1.1', u'release': u'12.P1.el6_0.4', u'arch': u'src'}, {u'src': None, u'name': u'dhcp', u'sum': [u'md5', u'ed2c319f85418f7dc5b627ed45a16efb'], u'filename': u'dhcp-4.1.1-12.P1.el6_0.4.x86_64.rpm', u'epoch': u'12', u'version': u'4.1.1', u'release': u'12.P1.el6_0.4', u'arch': u'x86_64'}, {u'src': None, u'name': u'dhcp-devel', u'sum': [u'md5', u'5521acfe33837670153f70d57ef25bdf'], u'filename': u'dhcp-devel-4.1.1-12.P1.el6_0.4.i686.rpm', u'epoch': u'12', u'version': u'4.1.1', u'release': u'12.P1.el6_0.4', u'arch': u'i686'}, {u'src': None, u'name': u'dhcp-devel', u'sum': [u'md5', u'989377bba4096d0406ec660d69a2735f'], u'filename': u'dhcp-devel-4.1.1-12.P1.el6_0.4.x86_64.rpm', u'epoch': u'12', u'version': u'4.1.1', u'release': u'12.P1.el6_0.4', u'arch': u'x86_64'}], u'name': u'ol6_x86_64_latest', u'short': u'ol6_x86_64_latest'}, {u'packages': [{u'src': None, u'name': u'dhclient', u'sum': [u'md5', u'2358b365631e4a25148fd6c4a4f39bc3'], u'filename': u'dhclient-3.0.5-23.el5_6.4.x86_64.rpm', u'epoch': u'12', u'version': u'3.0.5', u'release': u'23.el5_6.4', u'arch': u'x86_64'}, {u'src': None, u'name': u'dhcp', u'sum': [u'md5', u'5f5c1ffcb524fd916d760a51e51da606'], u'filename': u'dhcp-3.0.5-23.el5_6.4.src.rpm', u'epoch': u'12', u'version': u'3.0.5', u'release': u'23.el5_6.4', u'arch': u'src'}, {u'src': None, u'name': u'dhcp', u'sum': [u'md5', u'79b8bf748d96a4d39ec24fcf6daf27cd'], u'filename': u'dhcp-3.0.5-23.el5_6.4.x86_64.rpm', u'epoch': u'12', u'version': u'3.0.5', u'release': u'23.el5_6.4', u'arch': u'x86_64'}, {u'src': None, u'name': u'dhcp-devel', u'sum': [u'md5', u'72203f518a214523801b30e3759de986'], u'filename': u'dhcp-devel-3.0.5-23.el5_6.4.i386.rpm', u'epoch': u'12', u'version': u'3.0.5', u'release': u'23.el5_6.4', u'arch': u'i386'}, {u'src': None, u'name': u'dhcp-devel', u'sum': [u'md5', u'3a6e0bfa73ec47398299fa754e044b7c'], u'filename': u'dhcp-devel-3.0.5-23.el5_6.4.x86_64.rpm', u'epoch': u'12', u'version': u'3.0.5', u'release': u'23.el5_6.4', u'arch': u'x86_64'}, {u'src': None, u'name': u'libdhcp4client', u'sum': [u'md5', u'28a394266d6f852f9ed0f723bf3b14fc'], u'filename': u'libdhcp4client-3.0.5-23.el5_6.4.i386.rpm', u'epoch': u'12', u'version': u'3.0.5', u'release': u'23.el5_6.4', u'arch': u'i386'}, {u'src': None, u'name': u'libdhcp4client', u'sum': [u'md5', u'0dd8ef50cb9640bd80fcc4297d91d1e2'], u'filename': u'libdhcp4client-3.0.5-23.el5_6.4.x86_64.rpm', u'epoch': u'12', u'version': u'3.0.5', u'release': u'23.el5_6.4', u'arch': u'x86_64'}, {u'src': None, u'name': u'libdhcp4client-devel', u'sum': [u'md5', u'b230b0c72f70bd1bac8f8efe610816d3'], u'filename': u'libdhcp4client-devel-3.0.5-23.el5_6.4.i386.rpm', u'epoch': u'12', u'version': u'3.0.5', u'release': u'23.el5_6.4', u'arch': u'i386'}, {u'src': None, u'name': u'libdhcp4client-devel', u'sum': [u'md5', u'6fdf545ad3e3183c2ba8bd05761178c6'], u'filename': u'libdhcp4client-devel-3.0.5-23.el5_6.4.x86_64.rpm', u'epoch': u'12', u'version': u'3.0.5', u'release': u'23.el5_6.4', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u"\n[2.6.18-238.9.1.0.1.el5]\n- [scsi] fix scsi hotplug and rescan race [orabug 10260172]\n- fix filp_close() race (Joe Jin) [orabug 10335998]\n- fix missing aio_complete() in end_io (Joel Becker) [orabug 10365195]\n- make xenkbd.abs_pointer=1 by default [orabug 67188919]\n- [xen] check to see if hypervisor supports memory reservation change\n (Chuck Anderson) [orabug 7556514]\n- [net] Enable entropy for bnx2,bnx2x,e1000e,igb,ixgb,ixgbe,ixgbevf (John Sobecki)\n [orabug 10315433]\n- [NET] Add xen pv netconsole support (Tina Yang) [orabug 6993043] [bz 7258]\n- [mm] shrink_zone patch (John Sobecki,Chris Mason) [orabug 6086839]\n- fix aacraid not to reset during kexec (Joe Jin) [orabug 8516042]\n- [rds] Patch rds to 1.4.2-20 (Andy Grover) [orabug 9471572, 9344105]\n RDS: Fix BUG_ONs to not fire when in a tasklet\n ipoib: Fix lockup of the tx queue\n RDS: Do not call set_page_dirty() with irqs off (Sherman Pun)\n RDS: Properly unmap when getting a remote access error (Tina Yang)\n RDS: Fix locking in rds_send_drop_to()\n- [qla] fix qla not to query hccr (Guru Anbalagane) [Orabug 8746702]\n- [nfs] too many getattr and access calls after direct I/O [orabug 9348191]\n- [xen] PVHVM guest with PoD crashes under memory pressure (Chuck Anderson)\n [orabug 9107465]\n- [xen] PV guest with FC HBA hangs during shutdown (Chuck Anderson)\n [orabug 9764220]\n- Support 256GB+ memory for pv guest (Mukesh Rathor) [orabug 9450615]\n- fix overcommit memory to use percpu_counter for el5 (KOSAKI Motohiro,\n Guru Anbalagane) [orabug 6124033]\n- [ipmi] make configurable timeouts for kcs of ipmi [orabug 9752208]\n- [ib] fix memory corruption (Andy Grover) [orabug 9972346]\n- [aio] patch removes limit on number of retries (Srinivas Eeda) [orabug 10044782]\n- [loop] Do not call loop_unplug for not configured loop device (orabug 10314497)\n\n[2.6.18-238.9.1.el5]\n- [md] dm-mpath: fix NULL deref when path parameter missing (Mike Snitzer) [683443 673058]\n- [md] dm-mpath: wait for pg_init completion on suspend (Mike Snitzer) [683443 673058]\n- [md] dm-mpath: hold io until all pg_inits completed (Mike Snitzer) [683443 673058]\n- [md] dm-mpath: skip activate_path for failed paths (Mike Snitzer) [683443 673058]\n- [md] dm-mpath: pass struct pgpath to pg init done (Mike Snitzer) [683443 673058]\n- [md] dm-mpath: prevent io from work queue while suspended (Mike Snitzer) [683443 673058]\n- [md] dm-mpath: add mutex to sync adding and flushing work (Mike Snitzer) [683443 673058]\n- [md] dm-mpath: flush workqueues before suspend completes (Mike Snitzer) [683443 673058]\n\n[2.6.18-238.8.1.el5]\n- [message] mptfusion: fix msgContext in mptctl_hp_hostinfo (Tomas Henzl) [684128 646513]\n- [fs] nfs: fix use of slab alloc'd pages in skb frag list (Neil Horman) [682642 682643] {CVE-2011-1090}\n- [s390] remove task_show_regs (Danny Feng) [677852 677853] {CVE-2011-0710}\n- [misc] vdso: export wall_to_monotonic (Prarit Bhargava) [688312 675727]\n- [x86_64] Use u32, not long, to set reset vector back to 0 (Don Zickus) [682673 675258]\n- [misc] vmware: increase apic_calibration_diff to 10000 (Prarit Bhargava) [680350 665197]\n\n[2.6.18-238.7.1.el5]\n- [fs] partitions: Validate map_count in Mac part tables (Danny Feng) [679283 679284] {CVE-2011-1010}\n- [x86] fix AMD family 0x15 guest boot issue on 64-bit host (Frank Arnold) [679747 667234]\n- [sound] alsa: cache mixer values on usb-audio devices (Don Zickus) [680043 678074]\n- [media] dvb: fix av7110 negative array offset (Mauro Carvalho Chehab) [672401 672402] {CVE-2011-0521}\n- [message] mptfusion: add required mptctl_release call (Tomas Henzl) [677173 660871]\n- [fs] nfs: pure nfs client performance using odirect (Jeff Layton) [677172 643441]\n- [mm] fix install_special_mapping skips security_file_mmap (Frantisek Hrbata) [662196 662197] {CVE-2010-4346}\n- [scsi] device_handler: fix alua_rtpg port group id check (Mike Snitzer) [681795 669961]\n- [net] cnic: fix big endian bug with device page tables (Steve Best) [674774 669527]\n- [net] gro: reset dev pointer on reuse (Andy Gospodarek) [674588 600350]\n- [misc] add ignore_loglevel kernel parameter (Amerigo Wang) [675665 662102]\n- [misc] add bootmem_debug kernel parameter (Amerigo Wang) [675665 662102]\n- [fs] gfs2: remove iopen glocks from cache on delete fail (Benjamin Marzinski) [675909 666080]\n\n[2.6.18-238.6.1.el5]\n- [net] bonding: convert netpoll tx blocking to a counter (Neil Horman) [675664 659594]", u'issued': u'2011-04-13', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELSA-2011-0429.html', u'type': u'self', u'id': None, u'title': u'ELSA-2011-0429'}, {u'href': u'http://linux.oracle.com/cve/CVE-2010-4346.html', u'type': u'cve', u'id': u'CVE-2010-4346', u'title': u'CVE-2010-4346'}, {u'href': u'http://linux.oracle.com/cve/CVE-2011-0521.html', u'type': u'cve', u'id': u'CVE-2011-0521', u'title': u'CVE-2011-0521'}, {u'href': u'http://linux.oracle.com/cve/CVE-2011-0710.html', u'type': u'cve', u'id': u'CVE-2011-0710', u'title': u'CVE-2011-0710'}, {u'href': u'http://linux.oracle.com/cve/CVE-2011-1010.html', u'type': u'cve', u'id': u'CVE-2011-1010', u'title': u'CVE-2011-1010'}, {u'href': u'http://linux.oracle.com/cve/CVE-2011-1090.html', u'type': u'cve', u'id': u'CVE-2011-1090', u'title': u'CVE-2011-1090'}, {u'href': u'http://linux.oracle.com/cve/CVE-2011-1478.html', u'type': u'cve', u'id': u'CVE-2011-1478', u'title': u'CVE-2011-1478'}], u'_content_type_id': u'erratum', u'_id': u'0d26c9db-807a-4f4e-98e7-bf3022bbc197', u'from': u'el-errata@oss.oracle.com', u'severity': u'Important', u'title': u' kernel security and bug fix update', u'_ns': u'units_erratum', u'rights': u'Copyright 2011 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 5', u'reboot_suggested': False, u'type': u'security', u'pkglist': [{u'packages': [{u'src': None, u'name': u'kernel', u'sum': [u'md5', u'cf14e09f651dc22bc23b2dec403ff926'], u'filename': u'kernel-2.6.18-238.9.1.0.1.el5.src.rpm', u'epoch': u'0', u'version': u'2.6.18', u'release': u'238.9.1.0.1.el5', u'arch': u'src'}, {u'src': None, u'name': u'kernel', u'sum': [u'md5', u'4ac5e2b853d66ad3b6d18b58ef133be4'], u'filename': u'kernel-2.6.18-238.9.1.0.1.el5.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.18', u'release': u'238.9.1.0.1.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'kernel-debug', u'sum': [u'md5', u'6102f174f7685aa81ba68d7e33c4b349'], u'filename': u'kernel-debug-2.6.18-238.9.1.0.1.el5.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.18', u'release': u'238.9.1.0.1.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'kernel-debug-devel', u'sum': [u'md5', u'cf5a20e401a81eea25de66cce1efb25b'], u'filename': u'kernel-debug-devel-2.6.18-238.9.1.0.1.el5.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.18', u'release': u'238.9.1.0.1.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'kernel-devel', u'sum': [u'md5', u'0a80c01ae4951543b62a6571da7d64e8'], u'filename': u'kernel-devel-2.6.18-238.9.1.0.1.el5.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.18', u'release': u'238.9.1.0.1.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'kernel-doc', u'sum': [u'md5', u'eb085bf63033d400de41adbe2d1b36c7'], u'filename': u'kernel-doc-2.6.18-238.9.1.0.1.el5.noarch.rpm', u'epoch': u'0', u'version': u'2.6.18', u'release': u'238.9.1.0.1.el5', u'arch': u'noarch'}, {u'src': None, u'name': u'kernel-headers', u'sum': [u'md5', u'd3ed34cec076cd00d1b61e5de6101176'], u'filename': u'kernel-headers-2.6.18-238.9.1.0.1.el5.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.18', u'release': u'238.9.1.0.1.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'kernel-xen', u'sum': [u'md5', u'567a895b62039811901dd6c64883d29c'], u'filename': u'kernel-xen-2.6.18-238.9.1.0.1.el5.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.18', u'release': u'238.9.1.0.1.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'kernel-xen-devel', u'sum': [u'md5', u'7c04e2de52a36779f66616abfbe071fb'], u'filename': u'kernel-xen-devel-2.6.18-238.9.1.0.1.el5.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.18', u'release': u'238.9.1.0.1.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'ocfs2-2.6.18-238.9.1.0.1.el5', u'sum': [u'md5', u'1badea02fd6a002de25b13812a5e29a4'], u'filename': u'ocfs2-2.6.18-238.9.1.0.1.el5-1.4.8-2.el5.src.rpm', u'epoch': u'0', u'version': u'1.4.8', u'release': u'2.el5', u'arch': u'src'}, {u'src': None, u'name': u'ocfs2-2.6.18-238.9.1.0.1.el5', u'sum': [u'md5', u'70858040bcbacd17645c8c0ca1ae9242'], u'filename': u'ocfs2-2.6.18-238.9.1.0.1.el5-1.4.8-2.el5.x86_64.rpm', u'epoch': u'0', u'version': u'1.4.8', u'release': u'2.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'ocfs2-2.6.18-238.9.1.0.1.el5debug', u'sum': [u'md5', u'bc48baf5c0f1998526022ecce76532ef'], u'filename': u'ocfs2-2.6.18-238.9.1.0.1.el5debug-1.4.8-2.el5.x86_64.rpm', u'epoch': u'0', u'version': u'1.4.8', u'release': u'2.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'ocfs2-2.6.18-238.9.1.0.1.el5xen', u'sum': [u'md5', u'9b6173bf343f4658d36de43b6b8deaaa'], u'filename': u'ocfs2-2.6.18-238.9.1.0.1.el5xen-1.4.8-2.el5.x86_64.rpm', u'epoch': u'0', u'version': u'1.4.8', u'release': u'2.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'oracleasm-2.6.18-238.9.1.0.1.el5', u'sum': [u'md5', u'3258a0c7195be430b53a49dfa6d4f92f'], u'filename': u'oracleasm-2.6.18-238.9.1.0.1.el5-2.0.5-1.el5.src.rpm', u'epoch': u'0', u'version': u'2.0.5', u'release': u'1.el5', u'arch': u'src'}, {u'src': None, u'name': u'oracleasm-2.6.18-238.9.1.0.1.el5', u'sum': [u'md5', u'e78134591a0461950994dd75b385a96a'], u'filename': u'oracleasm-2.6.18-238.9.1.0.1.el5-2.0.5-1.el5.x86_64.rpm', u'epoch': u'0', u'version': u'2.0.5', u'release': u'1.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'oracleasm-2.6.18-238.9.1.0.1.el5debug', u'sum': [u'md5', u'628c7cc3ea60b92c322283319b715ef1'], u'filename': u'oracleasm-2.6.18-238.9.1.0.1.el5debug-2.0.5-1.el5.x86_64.rpm', u'epoch': u'0', u'version': u'2.0.5', u'release': u'1.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'oracleasm-2.6.18-238.9.1.0.1.el5xen', u'sum': [u'md5', u'a6b98f0b8de4f832284a2f270747a7e8'], u'filename': u'oracleasm-2.6.18-238.9.1.0.1.el5xen-2.0.5-1.el5.x86_64.rpm', u'epoch': u'0', u'version': u'2.0.5', u'release': u'1.el5', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u'\n[7.4-15.el6_0.1]\n- cve-2011-0465: Sanitize cpp macro expansion. (CVE 2011-0465)', u'issued': u'2011-04-12', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELSA-2011-0433.html', u'type': u'self', u'id': None, u'title': u'ELSA-2011-0433'}, {u'href': u'http://linux.oracle.com/cve/CVE-2011-0465.html', u'type': u'cve', u'id': u'CVE-2011-0465', u'title': u'CVE-2011-0465'}], u'_content_type_id': u'erratum', u'_id': u'f10a23c9-2dd9-4302-9241-4a69a1435d74', u'from': u'el-errata@oss.oracle.com', u'severity': u'Moderate', u'title': u' xorg-x11-server-utils security update', u'_ns': u'units_erratum', u'rights': u'Copyright 2011 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 6', u'reboot_suggested': False, u'type': u'security', u'pkglist': [{u'packages': [{u'src': None, u'name': u'xorg-x11-server-utils', u'sum': [u'md5', u'7bf6b14f2b662b17b824a11daddb379f'], u'filename': u'xorg-x11-server-utils-7.4-15.el6_0.1.src.rpm', u'epoch': u'0', u'version': u'7.4', u'release': u'15.el6_0.1', u'arch': u'src'}, {u'src': None, u'name': u'xorg-x11-server-utils', u'sum': [u'md5', u'62e9addd8aefdabe03762ada9ea6ea78'], u'filename': u'xorg-x11-server-utils-7.4-15.el6_0.1.x86_64.rpm', u'epoch': u'0', u'version': u'7.4', u'release': u'15.el6_0.1', u'arch': u'x86_64'}], u'name': u'ol6_x86_64_latest', u'short': u'ol6_x86_64_latest'}, {u'packages': [{u'src': None, u'name': u'xorg-x11-server-utils', u'sum': [u'md5', u'7f53435fdabb0ed755561dade99652ae'], u'filename': u'xorg-x11-server-utils-7.1-5.el5_6.1.src.rpm', u'epoch': u'0', u'version': u'7.1', u'release': u'5.el5_6.1', u'arch': u'src'}, {u'src': None, u'name': u'xorg-x11-server-utils', u'sum': [u'md5', u'8832082a495a7a395c4beab7591cb746'], u'filename': u'xorg-x11-server-utils-7.1-5.el5_6.1.x86_64.rpm', u'epoch': u'0', u'version': u'7.1', u'release': u'5.el5_6.1', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u'\n[0.6.16-10]\n- Fix for CVE-2011-1002\n- Resolves: #684884', u'issued': u'2011-04-12', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELSA-2011-0436.html', u'type': u'self', u'id': None, u'title': u'ELSA-2011-0436'}, {u'href': u'http://linux.oracle.com/cve/CVE-2011-1002.html', u'type': u'cve', u'id': u'CVE-2011-1002', u'title': u'CVE-2011-1002'}], u'_content_type_id': u'erratum', u'_id': u'5c433010-fafb-4535-892e-f9e86cc0c7d6', u'from': u'el-errata@oss.oracle.com', u'severity': u'Moderate', u'title': u' avahi security update', u'_ns': u'units_erratum', u'rights': u'Copyright 2011 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 5', u'reboot_suggested': False, u'type': u'security', u'pkglist': [{u'packages': [{u'src': None, u'name': u'avahi', u'sum': [u'md5', u'b97a5278f1c2efe959cd2a01b669e5fc'], u'filename': u'avahi-0.6.16-10.el5_6.i386.rpm', u'epoch': u'0', u'version': u'0.6.16', u'release': u'10.el5_6', u'arch': u'i386'}, {u'src': None, u'name': u'avahi', u'sum': [u'md5', u'212983c90fb9ee9918c9287df1344702'], u'filename': u'avahi-0.6.16-10.el5_6.src.rpm', u'epoch': u'0', u'version': u'0.6.16', u'release': u'10.el5_6', u'arch': u'src'}, {u'src': None, u'name': u'avahi', u'sum': [u'md5', u'584f16aeddfc885aca95f44705946dd5'], u'filename': u'avahi-0.6.16-10.el5_6.x86_64.rpm', u'epoch': u'0', u'version': u'0.6.16', u'release': u'10.el5_6', u'arch': u'x86_64'}, {u'src': None, u'name': u'avahi-compat-howl', u'sum': [u'md5', u'21614a4976d2a4392c7feff4ae85dd5b'], u'filename': u'avahi-compat-howl-0.6.16-10.el5_6.i386.rpm', u'epoch': u'0', u'version': u'0.6.16', u'release': u'10.el5_6', u'arch': u'i386'}, {u'src': None, u'name': u'avahi-compat-howl', u'sum': [u'md5', u'2b579456bd87c30e615053e1c6fe8456'], u'filename': u'avahi-compat-howl-0.6.16-10.el5_6.x86_64.rpm', u'epoch': u'0', u'version': u'0.6.16', u'release': u'10.el5_6', u'arch': u'x86_64'}, {u'src': None, u'name': u'avahi-compat-howl-devel', u'sum': [u'md5', u'3c56192fa3055dbb10c0015ed9d9356e'], u'filename': u'avahi-compat-howl-devel-0.6.16-10.el5_6.i386.rpm', u'epoch': u'0', u'version': u'0.6.16', u'release': u'10.el5_6', u'arch': u'i386'}, {u'src': None, u'name': u'avahi-compat-howl-devel', u'sum': [u'md5', u'99353b0a1c32fd6c0142d06e8ac2626b'], u'filename': u'avahi-compat-howl-devel-0.6.16-10.el5_6.x86_64.rpm', u'epoch': u'0', u'version': u'0.6.16', u'release': u'10.el5_6', u'arch': u'x86_64'}, {u'src': None, u'name': u'avahi-compat-libdns_sd', u'sum': [u'md5', u'04b6fe45ac0775505df35f0a799c7487'], u'filename': u'avahi-compat-libdns_sd-0.6.16-10.el5_6.i386.rpm', u'epoch': u'0', u'version': u'0.6.16', u'release': u'10.el5_6', u'arch': u'i386'}, {u'src': None, u'name': u'avahi-compat-libdns_sd', u'sum': [u'md5', u'f6a48b6c0e14b3b37da4703878204c0d'], u'filename': u'avahi-compat-libdns_sd-0.6.16-10.el5_6.x86_64.rpm', u'epoch': u'0', u'version': u'0.6.16', u'release': u'10.el5_6', u'arch': u'x86_64'}, {u'src': None, u'name': u'avahi-compat-libdns_sd-devel', u'sum': [u'md5', u'b9307042d26d002f2ebb885243304851'], u'filename': u'avahi-compat-libdns_sd-devel-0.6.16-10.el5_6.i386.rpm', u'epoch': u'0', u'version': u'0.6.16', u'release': u'10.el5_6', u'arch': u'i386'}, {u'src': None, u'name': u'avahi-compat-libdns_sd-devel', u'sum': [u'md5', u'dbbce3efe0dacfb265ab3f75cabdb94c'], u'filename': u'avahi-compat-libdns_sd-devel-0.6.16-10.el5_6.x86_64.rpm', u'epoch': u'0', u'version': u'0.6.16', u'release': u'10.el5_6', u'arch': u'x86_64'}, {u'src': None, u'name': u'avahi-devel', u'sum': [u'md5', u'ecc237f78493387ed632795e1538e25c'], u'filename': u'avahi-devel-0.6.16-10.el5_6.i386.rpm', u'epoch': u'0', u'version': u'0.6.16', u'release': u'10.el5_6', u'arch': u'i386'}, {u'src': None, u'name': u'avahi-devel', u'sum': [u'md5', u'75d7bb1450031ebcd01a6a20b0ae3eb7'], u'filename': u'avahi-devel-0.6.16-10.el5_6.x86_64.rpm', u'epoch': u'0', u'version': u'0.6.16', u'release': u'10.el5_6', u'arch': u'x86_64'}, {u'src': None, u'name': u'avahi-glib', u'sum': [u'md5', u'79fd95d6166decaf989adc24e050d3f2'], u'filename': u'avahi-glib-0.6.16-10.el5_6.i386.rpm', u'epoch': u'0', u'version': u'0.6.16', u'release': u'10.el5_6', u'arch': u'i386'}, {u'src': None, u'name': u'avahi-glib', u'sum': [u'md5', u'c1703afb5cb740b82195f2a7d876f1be'], u'filename': u'avahi-glib-0.6.16-10.el5_6.x86_64.rpm', u'epoch': u'0', u'version': u'0.6.16', u'release': u'10.el5_6', u'arch': u'x86_64'}, {u'src': None, u'name': u'avahi-glib-devel', u'sum': [u'md5', u'd43a5dc93855a3859d80e3272f900bf0'], u'filename': u'avahi-glib-devel-0.6.16-10.el5_6.i386.rpm', u'epoch': u'0', u'version': u'0.6.16', u'release': u'10.el5_6', u'arch': u'i386'}, {u'src': None, u'name': u'avahi-glib-devel', u'sum': [u'md5', u'05364563f6f31dea92c81ad333d08e10'], u'filename': u'avahi-glib-devel-0.6.16-10.el5_6.x86_64.rpm', u'epoch': u'0', u'version': u'0.6.16', u'release': u'10.el5_6', u'arch': u'x86_64'}, {u'src': None, u'name': u'avahi-qt3', u'sum': [u'md5', u'47145dd9ac4fa2750410c9e358e5ee99'], u'filename': u'avahi-qt3-0.6.16-10.el5_6.i386.rpm', u'epoch': u'0', u'version': u'0.6.16', u'release': u'10.el5_6', u'arch': u'i386'}, {u'src': None, u'name': u'avahi-qt3', u'sum': [u'md5', u'29a8e31751b6621f4c116ac38b02853c'], u'filename': u'avahi-qt3-0.6.16-10.el5_6.x86_64.rpm', u'epoch': u'0', u'version': u'0.6.16', u'release': u'10.el5_6', u'arch': u'x86_64'}, {u'src': None, u'name': u'avahi-qt3-devel', u'sum': [u'md5', u'5cfafa0ed5f7f9af736a7175311b63ee'], u'filename': u'avahi-qt3-devel-0.6.16-10.el5_6.i386.rpm', u'epoch': u'0', u'version': u'0.6.16', u'release': u'10.el5_6', u'arch': u'i386'}, {u'src': None, u'name': u'avahi-qt3-devel', u'sum': [u'md5', u'284b65341b6f4b037029e4416ca8672e'], u'filename': u'avahi-qt3-devel-0.6.16-10.el5_6.x86_64.rpm', u'epoch': u'0', u'version': u'0.6.16', u'release': u'10.el5_6', u'arch': u'x86_64'}, {u'src': None, u'name': u'avahi-tools', u'sum': [u'md5', u'8a8fb0e0d085bef8b47f8a367934da94'], u'filename': u'avahi-tools-0.6.16-10.el5_6.x86_64.rpm', u'epoch': u'0', u'version': u'0.6.16', u'release': u'10.el5_6', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u'\n\nfirefox:\n\n[3.6.17-1.0.1.el6_0]\n- Added firefox-oracle-default-prefs.js and removed firefox-redhat-default-prefs.js\n\n[3.6.17-1]\n- Update to 3.6.17\n\nxulrunner:\n\n[1.9.2.17-4.0.1.el6_0]\n- Replace xulrunner-redhat-default-prefs.js with\n xulrunner-oracle-default-prefs.js\n\n[1.9.2.17-4]\n- Rebuild\n\n[1.9.2.17-3]\n- Update to 1.9.2.17', u'issued': u'2011-04-29', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELSA-2011-0471.html', u'type': u'self', u'id': None, u'title': u'ELSA-2011-0471'}, {u'href': u'http://linux.oracle.com/cve/CVE-2011-0065.html', u'type': u'cve', u'id': u'CVE-2011-0065', u'title': u'CVE-2011-0065'}, {u'href': u'http://linux.oracle.com/cve/CVE-2011-0066.html', u'type': u'cve', u'id': u'CVE-2011-0066', u'title': u'CVE-2011-0066'}, {u'href': u'http://linux.oracle.com/cve/CVE-2011-0067.html', u'type': u'cve', u'id': u'CVE-2011-0067', u'title': u'CVE-2011-0067'}, {u'href': u'http://linux.oracle.com/cve/CVE-2011-0069.html', u'type': u'cve', u'id': u'CVE-2011-0069', u'title': u'CVE-2011-0069'}, {u'href': u'http://linux.oracle.com/cve/CVE-2011-0070.html', u'type': u'cve', u'id': u'CVE-2011-0070', u'title': u'CVE-2011-0070'}, {u'href': u'http://linux.oracle.com/cve/CVE-2011-0071.html', u'type': u'cve', u'id': u'CVE-2011-0071', u'title': u'CVE-2011-0071'}, {u'href': u'http://linux.oracle.com/cve/CVE-2011-0072.html', u'type': u'cve', u'id': u'CVE-2011-0072', u'title': u'CVE-2011-0072'}, {u'href': u'http://linux.oracle.com/cve/CVE-2011-0073.html', u'type': u'cve', u'id': u'CVE-2011-0073', u'title': u'CVE-2011-0073'}, {u'href': u'http://linux.oracle.com/cve/CVE-2011-0074.html', u'type': u'cve', u'id': u'CVE-2011-0074', u'title': u'CVE-2011-0074'}, {u'href': u'http://linux.oracle.com/cve/CVE-2011-0075.html', u'type': u'cve', u'id': u'CVE-2011-0075', u'title': u'CVE-2011-0075'}, {u'href': u'http://linux.oracle.com/cve/CVE-2011-0077.html', u'type': u'cve', u'id': u'CVE-2011-0077', u'title': u'CVE-2011-0077'}, {u'href': u'http://linux.oracle.com/cve/CVE-2011-0078.html', u'type': u'cve', u'id': u'CVE-2011-0078', u'title': u'CVE-2011-0078'}, {u'href': u'http://linux.oracle.com/cve/CVE-2011-0080.html', u'type': u'cve', u'id': u'CVE-2011-0080', u'title': u'CVE-2011-0080'}, {u'href': u'http://linux.oracle.com/cve/CVE-2011-0081.html', u'type': u'cve', u'id': u'CVE-2011-0081', u'title': u'CVE-2011-0081'}, {u'href': u'http://linux.oracle.com/cve/CVE-2011-1202.html', u'type': u'cve', u'id': u'CVE-2011-1202', u'title': u'CVE-2011-1202'}], u'_content_type_id': u'erratum', u'_id': u'a69ee0da-b2ee-40bb-b2dc-41582bd07b4e', u'from': u'el-errata@oss.oracle.com', u'severity': u'Critical', u'title': u' firefox security update', u'_ns': u'units_erratum', u'rights': u'Copyright 2011 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 6', u'reboot_suggested': False, u'type': u'security', u'pkglist': [{u'packages': [{u'src': None, u'name': u'firefox', u'sum': [u'md5', u'94433b55073d53ad7469b7f6cd2111a4'], u'filename': u'firefox-3.6.17-1.0.1.el6_0.i686.rpm', u'epoch': u'0', u'version': u'3.6.17', u'release': u'1.0.1.el6_0', u'arch': u'i686'}, {u'src': None, u'name': u'firefox', u'sum': [u'md5', u'68aab284cf57e1d2a1eba0875ac2f1d4'], u'filename': u'firefox-3.6.17-1.0.1.el6_0.src.rpm', u'epoch': u'0', u'version': u'3.6.17', u'release': u'1.0.1.el6_0', u'arch': u'src'}, {u'src': None, u'name': u'firefox', u'sum': [u'md5', u'c2f0975fe48ff34570ecbe8a399b17fb'], u'filename': u'firefox-3.6.17-1.0.1.el6_0.x86_64.rpm', u'epoch': u'0', u'version': u'3.6.17', u'release': u'1.0.1.el6_0', u'arch': u'x86_64'}, {u'src': None, u'name': u'xulrunner', u'sum': [u'md5', u'ebc3bb829d13cbdc7296625379d4fd43'], u'filename': u'xulrunner-1.9.2.17-4.0.1.el6_0.i686.rpm', u'epoch': u'0', u'version': u'1.9.2.17', u'release': u'4.0.1.el6_0', u'arch': u'i686'}, {u'src': None, u'name': u'xulrunner', u'sum': [u'md5', u'68f806ed9e7419a712346c81759bde98'], u'filename': u'xulrunner-1.9.2.17-4.0.1.el6_0.src.rpm', u'epoch': u'0', u'version': u'1.9.2.17', u'release': u'4.0.1.el6_0', u'arch': u'src'}, {u'src': None, u'name': u'xulrunner', u'sum': [u'md5', u'8d4965537f672c93cc48718ce74c574c'], u'filename': u'xulrunner-1.9.2.17-4.0.1.el6_0.x86_64.rpm', u'epoch': u'0', u'version': u'1.9.2.17', u'release': u'4.0.1.el6_0', u'arch': u'x86_64'}, {u'src': None, u'name': u'xulrunner-devel', u'sum': [u'md5', u'1599d2b672fbefc46fa2e39354710f77'], u'filename': u'xulrunner-devel-1.9.2.17-4.0.1.el6_0.i686.rpm', u'epoch': u'0', u'version': u'1.9.2.17', u'release': u'4.0.1.el6_0', u'arch': u'i686'}, {u'src': None, u'name': u'xulrunner-devel', u'sum': [u'md5', u'25144769aff1459ecf00113c982919ec'], u'filename': u'xulrunner-devel-1.9.2.17-4.0.1.el6_0.x86_64.rpm', u'epoch': u'0', u'version': u'1.9.2.17', u'release': u'4.0.1.el6_0', u'arch': u'x86_64'}], u'name': u'ol6_x86_64_latest', u'short': u'ol6_x86_64_latest'}, {u'packages': [{u'src': None, u'name': u'firefox', u'sum': [u'md5', u'3011f47cb51830ca43db12a615ead541'], u'filename': u'firefox-3.6.17-1.0.1.el5_6.i386.rpm', u'epoch': u'0', u'version': u'3.6.17', u'release': u'1.0.1.el5_6', u'arch': u'i386'}, {u'src': None, u'name': u'firefox', u'sum': [u'md5', u'a9b956b57b6b3f133ebe5bbd11f9d7e9'], u'filename': u'firefox-3.6.17-1.0.1.el5_6.src.rpm', u'epoch': u'0', u'version': u'3.6.17', u'release': u'1.0.1.el5_6', u'arch': u'src'}, {u'src': None, u'name': u'firefox', u'sum': [u'md5', u'09e078e0e4cfe0f19c9f8f02f93b53a4'], u'filename': u'firefox-3.6.17-1.0.1.el5_6.x86_64.rpm', u'epoch': u'0', u'version': u'3.6.17', u'release': u'1.0.1.el5_6', u'arch': u'x86_64'}, {u'src': None, u'name': u'xulrunner', u'sum': [u'md5', u'f757907626257c4ee39654bcc1f8b54e'], u'filename': u'xulrunner-1.9.2.17-3.0.1.el5_6.i386.rpm', u'epoch': u'0', u'version': u'1.9.2.17', u'release': u'3.0.1.el5_6', u'arch': u'i386'}, {u'src': None, u'name': u'xulrunner', u'sum': [u'md5', u'd312970e40ff24072ed87ed999063426'], u'filename': u'xulrunner-1.9.2.17-3.0.1.el5_6.src.rpm', u'epoch': u'0', u'version': u'1.9.2.17', u'release': u'3.0.1.el5_6', u'arch': u'src'}, {u'src': None, u'name': u'xulrunner', u'sum': [u'md5', u'c69a941703cd18a32e6da33a23e5fd21'], u'filename': u'xulrunner-1.9.2.17-3.0.1.el5_6.x86_64.rpm', u'epoch': u'0', u'version': u'1.9.2.17', u'release': u'3.0.1.el5_6', u'arch': u'x86_64'}, {u'src': None, u'name': u'xulrunner-devel', u'sum': [u'md5', u'144e93be9ab67ffb3a8b0dfc37883993'], u'filename': u'xulrunner-devel-1.9.2.17-3.0.1.el5_6.i386.rpm', u'epoch': u'0', u'version': u'1.9.2.17', u'release': u'3.0.1.el5_6', u'arch': u'i386'}, {u'src': None, u'name': u'xulrunner-devel', u'sum': [u'md5', u'1d9212aba122cc83f508036ffd4cab98'], u'filename': u'xulrunner-devel-1.9.2.17-3.0.1.el5_6.x86_64.rpm', u'epoch': u'0', u'version': u'1.9.2.17', u'release': u'3.0.1.el5_6', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u'\n[3.12.8-3.0.1.el6_0]\n- Use blank image instead of clean.gif in nss-3.12.8-stripped.tar.bz2\n- Update expired PayPalEE.cert to fix build failure\n\n[3.12.8-3]\n- Update builtin certs to NSS_3.12.9_WITH_CKBI_1_82_RTM via a patch\n\n[3.12.8-2]\n- Update to builtin certs from NSS_3.12.9_WITH_CKBI_1_82_RTM', u'issued': u'2011-04-29', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELSA-2011-0472.html', u'type': u'self', u'id': None, u'title': u'ELSA-2011-0472'}], u'_content_type_id': u'erratum', u'_id': u'4dd2b511-17c1-4ca0-bc58-251e2b28824d', u'from': u'el-errata@oss.oracle.com', u'severity': u'Important', u'title': u' nss security update', u'_ns': u'units_erratum', u'rights': u'Copyright 2011 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 6', u'reboot_suggested': False, u'type': u'security', u'pkglist': [{u'packages': [{u'src': None, u'name': u'nss', u'sum': [u'md5', u'7bbce2ce2cbf0764da3516f2d7dd2679'], u'filename': u'nss-3.12.8-3.0.1.el6_0.i686.rpm', u'epoch': u'0', u'version': u'3.12.8', u'release': u'3.0.1.el6_0', u'arch': u'i686'}, {u'src': None, u'name': u'nss', u'sum': [u'md5', u'3a2b185437d3c897b8fb3f11d9c964a8'], u'filename': u'nss-3.12.8-3.0.1.el6_0.src.rpm', u'epoch': u'0', u'version': u'3.12.8', u'release': u'3.0.1.el6_0', u'arch': u'src'}, {u'src': None, u'name': u'nss', u'sum': [u'md5', u'8691dff016ff42e9dd9fd014e51b02c5'], u'filename': u'nss-3.12.8-3.0.1.el6_0.x86_64.rpm', u'epoch': u'0', u'version': u'3.12.8', u'release': u'3.0.1.el6_0', u'arch': u'x86_64'}, {u'src': None, u'name': u'nss-devel', u'sum': [u'md5', u'ae04ddaff19173cc95496cd2cc01ab70'], u'filename': u'nss-devel-3.12.8-3.0.1.el6_0.i686.rpm', u'epoch': u'0', u'version': u'3.12.8', u'release': u'3.0.1.el6_0', u'arch': u'i686'}, {u'src': None, u'name': u'nss-devel', u'sum': [u'md5', u'4f15ec86f0fa2cd4d7c5f137dfef347e'], u'filename': u'nss-devel-3.12.8-3.0.1.el6_0.x86_64.rpm', u'epoch': u'0', u'version': u'3.12.8', u'release': u'3.0.1.el6_0', u'arch': u'x86_64'}, {u'src': None, u'name': u'nss-pkcs11-devel', u'sum': [u'md5', u'0ebbe796d593dced1dddec2e3dc51074'], u'filename': u'nss-pkcs11-devel-3.12.8-3.0.1.el6_0.i686.rpm', u'epoch': u'0', u'version': u'3.12.8', u'release': u'3.0.1.el6_0', u'arch': u'i686'}, {u'src': None, u'name': u'nss-pkcs11-devel', u'sum': [u'md5', u'd7d455fa8ffd76a9b013c10c0db50519'], u'filename': u'nss-pkcs11-devel-3.12.8-3.0.1.el6_0.x86_64.rpm', u'epoch': u'0', u'version': u'3.12.8', u'release': u'3.0.1.el6_0', u'arch': u'x86_64'}, {u'src': None, u'name': u'nss-sysinit', u'sum': [u'md5', u'dcfb23976a88d3f6b2d8924b9cd994e8'], u'filename': u'nss-sysinit-3.12.8-3.0.1.el6_0.x86_64.rpm', u'epoch': u'0', u'version': u'3.12.8', u'release': u'3.0.1.el6_0', u'arch': u'x86_64'}, {u'src': None, u'name': u'nss-tools', u'sum': [u'md5', u'618d003c0116f03dbfe1887ba72076b7'], u'filename': u'nss-tools-3.12.8-3.0.1.el6_0.x86_64.rpm', u'epoch': u'0', u'version': u'3.12.8', u'release': u'3.0.1.el6_0', u'arch': u'x86_64'}], u'name': u'ol6_x86_64_latest', u'short': u'ol6_x86_64_latest'}, {u'packages': [{u'src': None, u'name': u'nss', u'sum': [u'md5', u'a7b093b8485d2980226fc9dfdbfb3202'], u'filename': u'nss-3.12.8-4.0.1.el5_6.i386.rpm', u'epoch': u'0', u'version': u'3.12.8', u'release': u'4.0.1.el5_6', u'arch': u'i386'}, {u'src': None, u'name': u'nss', u'sum': [u'md5', u'd1fb8e26f6c9ba32e3c54ca490747855'], u'filename': u'nss-3.12.8-4.0.1.el5_6.src.rpm', u'epoch': u'0', u'version': u'3.12.8', u'release': u'4.0.1.el5_6', u'arch': u'src'}, {u'src': None, u'name': u'nss', u'sum': [u'md5', u'c7cbcf67333f1f0651371daddd216291'], u'filename': u'nss-3.12.8-4.0.1.el5_6.x86_64.rpm', u'epoch': u'0', u'version': u'3.12.8', u'release': u'4.0.1.el5_6', u'arch': u'x86_64'}, {u'src': None, u'name': u'nss-devel', u'sum': [u'md5', u'6e788350d70bb7330424da395cbbf2f1'], u'filename': u'nss-devel-3.12.8-4.0.1.el5_6.i386.rpm', u'epoch': u'0', u'version': u'3.12.8', u'release': u'4.0.1.el5_6', u'arch': u'i386'}, {u'src': None, u'name': u'nss-devel', u'sum': [u'md5', u'eb87a850395462b93feee0c0a3a96f88'], u'filename': u'nss-devel-3.12.8-4.0.1.el5_6.x86_64.rpm', u'epoch': u'0', u'version': u'3.12.8', u'release': u'4.0.1.el5_6', u'arch': u'x86_64'}, {u'src': None, u'name': u'nss-pkcs11-devel', u'sum': [u'md5', u'9ade39ebf99a080e96eeacb1995908bf'], u'filename': u'nss-pkcs11-devel-3.12.8-4.0.1.el5_6.i386.rpm', u'epoch': u'0', u'version': u'3.12.8', u'release': u'4.0.1.el5_6', u'arch': u'i386'}, {u'src': None, u'name': u'nss-pkcs11-devel', u'sum': [u'md5', u'77f5223dd082e52a2c8f4b1b1c14c75e'], u'filename': u'nss-pkcs11-devel-3.12.8-4.0.1.el5_6.x86_64.rpm', u'epoch': u'0', u'version': u'3.12.8', u'release': u'4.0.1.el5_6', u'arch': u'x86_64'}, {u'src': None, u'name': u'nss-tools', u'sum': [u'md5', u'f3ba32387be759badf20402b6a2a606a'], u'filename': u'nss-tools-3.12.8-4.0.1.el5_6.x86_64.rpm', u'epoch': u'0', u'version': u'3.12.8', u'release': u'4.0.1.el5_6', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u'\n[0.8.2-15.0.1.el5_6.4]\n- Replaced docs/et.png in tarball\n\n[0.8.2-15.el5_6.4]\n- Make error reporting in libvirtd thread safe (CVE-2011-1486)', u'issued': u'2011-05-02', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELSA-2011-0478.html', u'type': u'self', u'id': None, u'title': u'ELSA-2011-0478'}, {u'href': u'http://linux.oracle.com/cve/CVE-2011-1486.html', u'type': u'cve', u'id': u'CVE-2011-1486', u'title': u'CVE-2011-1486'}], u'_content_type_id': u'erratum', u'_id': u'87f2a3ba-dd46-475b-8466-0f276d7947cf', u'from': u'el-errata@oss.oracle.com', u'severity': u'Moderate', u'title': u' libvirt security update', u'_ns': u'units_erratum', u'rights': u'Copyright 2011 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 5', u'reboot_suggested': False, u'type': u'security', u'pkglist': [{u'packages': [{u'src': None, u'name': u'libvirt', u'sum': [u'md5', u'36f48fc0a7861aaa2ee55d18f31036cf'], u'filename': u'libvirt-0.8.2-15.0.1.el5_6.4.i386.rpm', u'epoch': u'0', u'version': u'0.8.2', u'release': u'15.0.1.el5_6.4', u'arch': u'i386'}, {u'src': None, u'name': u'libvirt', u'sum': [u'md5', u'4eea12b2e38533986ac97434b37e44ba'], u'filename': u'libvirt-0.8.2-15.0.1.el5_6.4.src.rpm', u'epoch': u'0', u'version': u'0.8.2', u'release': u'15.0.1.el5_6.4', u'arch': u'src'}, {u'src': None, u'name': u'libvirt', u'sum': [u'md5', u'e12a73b15912d37629724fb72f16fee3'], u'filename': u'libvirt-0.8.2-15.0.1.el5_6.4.x86_64.rpm', u'epoch': u'0', u'version': u'0.8.2', u'release': u'15.0.1.el5_6.4', u'arch': u'x86_64'}, {u'src': None, u'name': u'libvirt-devel', u'sum': [u'md5', u'6f130c7a7db132720bf84de7b52a28a2'], u'filename': u'libvirt-devel-0.8.2-15.0.1.el5_6.4.i386.rpm', u'epoch': u'0', u'version': u'0.8.2', u'release': u'15.0.1.el5_6.4', u'arch': u'i386'}, {u'src': None, u'name': u'libvirt-devel', u'sum': [u'md5', u'45bf24e8855d94d3d9529964fdcda4b7'], u'filename': u'libvirt-devel-0.8.2-15.0.1.el5_6.4.x86_64.rpm', u'epoch': u'0', u'version': u'0.8.2', u'release': u'15.0.1.el5_6.4', u'arch': u'x86_64'}, {u'src': None, u'name': u'libvirt-python', u'sum': [u'md5', u'33305e68345d0c1d5ac84fa9b01c30eb'], u'filename': u'libvirt-python-0.8.2-15.0.1.el5_6.4.x86_64.rpm', u'epoch': u'0', u'version': u'0.8.2', u'release': u'15.0.1.el5_6.4', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u'\n[1.2.9-8.1.2]\n- disable xslt i/o support in library, tools and examples, CVE-2011-1425\n- Resolves: rhbz#694124\n- limit the paths used for searching the security library loaded dynamically', u'issued': u'2011-05-04', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELSA-2011-0486.html', u'type': u'self', u'id': None, u'title': u'ELSA-2011-0486'}, {u'href': u'http://linux.oracle.com/cve/CVE-2011-1425.html', u'type': u'cve', u'id': u'CVE-2011-1425', u'title': u'CVE-2011-1425'}], u'_content_type_id': u'erratum', u'_id': u'4c3efc77-af17-48c5-969a-03d80828a8e8', u'from': u'el-errata@oss.oracle.com', u'severity': u'Moderate', u'title': u' xmlsec1 security and bug fix update', u'_ns': u'units_erratum', u'rights': u'Copyright 2011 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 5', u'reboot_suggested': False, u'type': u'security', u'pkglist': [{u'packages': [{u'src': None, u'name': u'xmlsec1', u'sum': [u'md5', u'6bf547fcc50f24a4bf0e4239a3af927f'], u'filename': u'xmlsec1-1.2.9-8.1.2.i386.rpm', u'epoch': u'0', u'version': u'1.2.9', u'release': u'8.1.2', u'arch': u'i386'}, {u'src': None, u'name': u'xmlsec1', u'sum': [u'md5', u'd4566ba06c94664a06967562a86bab45'], u'filename': u'xmlsec1-1.2.9-8.1.2.src.rpm', u'epoch': u'0', u'version': u'1.2.9', u'release': u'8.1.2', u'arch': u'src'}, {u'src': None, u'name': u'xmlsec1', u'sum': [u'md5', u'83d76be1017fdcd94c8991cb7ef34d0c'], u'filename': u'xmlsec1-1.2.9-8.1.2.x86_64.rpm', u'epoch': u'0', u'version': u'1.2.9', u'release': u'8.1.2', u'arch': u'x86_64'}, {u'src': None, u'name': u'xmlsec1-devel', u'sum': [u'md5', u'40aba316773e219f972dc619526fc13f'], u'filename': u'xmlsec1-devel-1.2.9-8.1.2.i386.rpm', u'epoch': u'0', u'version': u'1.2.9', u'release': u'8.1.2', u'arch': u'i386'}, {u'src': None, u'name': u'xmlsec1-devel', u'sum': [u'md5', u'a15b80f5a4a0a76ba9712664cd4c938e'], u'filename': u'xmlsec1-devel-1.2.9-8.1.2.x86_64.rpm', u'epoch': u'0', u'version': u'1.2.9', u'release': u'8.1.2', u'arch': u'x86_64'}, {u'src': None, u'name': u'xmlsec1-gnutls', u'sum': [u'md5', u'5633546d71d9924d1171e45fc7233936'], u'filename': u'xmlsec1-gnutls-1.2.9-8.1.2.i386.rpm', u'epoch': u'0', u'version': u'1.2.9', u'release': u'8.1.2', u'arch': u'i386'}, {u'src': None, u'name': u'xmlsec1-gnutls', u'sum': [u'md5', u'c943e52e239fd459e6f96f6a0e8156a2'], u'filename': u'xmlsec1-gnutls-1.2.9-8.1.2.x86_64.rpm', u'epoch': u'0', u'version': u'1.2.9', u'release': u'8.1.2', u'arch': u'x86_64'}, {u'src': None, u'name': u'xmlsec1-gnutls-devel', u'sum': [u'md5', u'811b9772389703bc55f76cea04c855eb'], u'filename': u'xmlsec1-gnutls-devel-1.2.9-8.1.2.i386.rpm', u'epoch': u'0', u'version': u'1.2.9', u'release': u'8.1.2', u'arch': u'i386'}, {u'src': None, u'name': u'xmlsec1-gnutls-devel', u'sum': [u'md5', u'52ea204c78070e46366691d43dac02c0'], u'filename': u'xmlsec1-gnutls-devel-1.2.9-8.1.2.x86_64.rpm', u'epoch': u'0', u'version': u'1.2.9', u'release': u'8.1.2', u'arch': u'x86_64'}, {u'src': None, u'name': u'xmlsec1-nss', u'sum': [u'md5', u'5e2b40e0ead71fa913b27b4ae0082e6b'], u'filename': u'xmlsec1-nss-1.2.9-8.1.2.i386.rpm', u'epoch': u'0', u'version': u'1.2.9', u'release': u'8.1.2', u'arch': u'i386'}, {u'src': None, u'name': u'xmlsec1-nss', u'sum': [u'md5', u'0ad2eaa1c89f6f11552a103020548944'], u'filename': u'xmlsec1-nss-1.2.9-8.1.2.x86_64.rpm', u'epoch': u'0', u'version': u'1.2.9', u'release': u'8.1.2', u'arch': u'x86_64'}, {u'src': None, u'name': u'xmlsec1-nss-devel', u'sum': [u'md5', u'cacb334d09ed1f059b287b3a9b90c710'], u'filename': u'xmlsec1-nss-devel-1.2.9-8.1.2.i386.rpm', u'epoch': u'0', u'version': u'1.2.9', u'release': u'8.1.2', u'arch': u'i386'}, {u'src': None, u'name': u'xmlsec1-nss-devel', u'sum': [u'md5', u'4056ad929219c0fd1ef34d4ac7f95f40'], u'filename': u'xmlsec1-nss-devel-1.2.9-8.1.2.x86_64.rpm', u'epoch': u'0', u'version': u'1.2.9', u'release': u'8.1.2', u'arch': u'x86_64'}, {u'src': None, u'name': u'xmlsec1-openssl', u'sum': [u'md5', u'5e59d91529e8a573a4231f7e3713ccbe'], u'filename': u'xmlsec1-openssl-1.2.9-8.1.2.i386.rpm', u'epoch': u'0', u'version': u'1.2.9', u'release': u'8.1.2', u'arch': u'i386'}, {u'src': None, u'name': u'xmlsec1-openssl', u'sum': [u'md5', u'eec09a8960514bf6273fd16470ec9d26'], u'filename': u'xmlsec1-openssl-1.2.9-8.1.2.x86_64.rpm', u'epoch': u'0', u'version': u'1.2.9', u'release': u'8.1.2', u'arch': u'x86_64'}, {u'src': None, u'name': u'xmlsec1-openssl-devel', u'sum': [u'md5', u'd15ecc9c2385413401cc3036af906025'], u'filename': u'xmlsec1-openssl-devel-1.2.9-8.1.2.i386.rpm', u'epoch': u'0', u'version': u'1.2.9', u'release': u'8.1.2', u'arch': u'i386'}, {u'src': None, u'name': u'xmlsec1-openssl-devel', u'sum': [u'md5', u'6832ef7849048a276f6d0ab4ced77b26'], u'filename': u'xmlsec1-openssl-devel-1.2.9-8.1.2.x86_64.rpm', u'epoch': u'0', u'version': u'1.2.9', u'release': u'8.1.2', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u'\n[2.4.3-44]\n- add patch adapted from upstream (patch 208) to add support for building\nagainst system expat; add --with-system-expat to configure invocation; remove\nembedded copy of expat-1.95.8 from the source tree during prep\n- ensure pyexpat.so gets built by explicitly listing all C modules in the\npayload in %files, rather than using dynfiles\nResolves: CVE-2009-3720\n- backport three security fixes to 2.4 (patches 209, 210, 211):\nResolves: CVE-2011-1521\nResolves: CVE-2011-1015\nResolves: CVE-2010-3493', u'issued': u'2011-05-05', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELSA-2011-0492.html', u'type': u'self', u'id': None, u'title': u'ELSA-2011-0492'}, {u'href': u'http://linux.oracle.com/cve/CVE-2009-3720.html', u'type': u'cve', u'id': u'CVE-2009-3720', u'title': u'CVE-2009-3720'}, {u'href': u'http://linux.oracle.com/cve/CVE-2010-3493.html', u'type': u'cve', u'id': u'CVE-2010-3493', u'title': u'CVE-2010-3493'}, {u'href': u'http://linux.oracle.com/cve/CVE-2011-1015.html', u'type': u'cve', u'id': u'CVE-2011-1015', u'title': u'CVE-2011-1015'}, {u'href': u'http://linux.oracle.com/cve/CVE-2011-1521.html', u'type': u'cve', u'id': u'CVE-2011-1521', u'title': u'CVE-2011-1521'}], u'_content_type_id': u'erratum', u'_id': u'0980367d-5f3d-4911-939c-07c30840f4e5', u'from': u'el-errata@oss.oracle.com', u'severity': u'Moderate', u'title': u' python security update', u'_ns': u'units_erratum', u'rights': u'Copyright 2011 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 5', u'reboot_suggested': False, u'type': u'security', u'pkglist': [{u'packages': [{u'src': None, u'name': u'python', u'sum': [u'md5', u'08c451c9a64def6b921e31bdf7b15cbe'], u'filename': u'python-2.4.3-44.el5.src.rpm', u'epoch': u'0', u'version': u'2.4.3', u'release': u'44.el5', u'arch': u'src'}, {u'src': None, u'name': u'python', u'sum': [u'md5', u'7206fd556d8bd705fa1d26d79b9bc88e'], u'filename': u'python-2.4.3-44.el5.x86_64.rpm', u'epoch': u'0', u'version': u'2.4.3', u'release': u'44.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'python-devel', u'sum': [u'md5', u'104e3e9c50cbea433ed732613acb3c32'], u'filename': u'python-devel-2.4.3-44.el5.i386.rpm', u'epoch': u'0', u'version': u'2.4.3', u'release': u'44.el5', u'arch': u'i386'}, {u'src': None, u'name': u'python-devel', u'sum': [u'md5', u'e7479bb7655eb87b42a8e91dbfb9ce28'], u'filename': u'python-devel-2.4.3-44.el5.x86_64.rpm', u'epoch': u'0', u'version': u'2.4.3', u'release': u'44.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'python-libs', u'sum': [u'md5', u'3bfff8b0e9ca408da9c75ab1f8372654'], u'filename': u'python-libs-2.4.3-44.el5.x86_64.rpm', u'epoch': u'0', u'version': u'2.4.3', u'release': u'44.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'python-tools', u'sum': [u'md5', u'073065b6a9a645a73d80fb42be823ca7'], u'filename': u'python-tools-2.4.3-44.el5.x86_64.rpm', u'epoch': u'0', u'version': u'2.4.3', u'release': u'44.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'tkinter', u'sum': [u'md5', u'30150af8345caaeb5f86fd3733531db2'], u'filename': u'tkinter-2.4.3-44.el5.x86_64.rpm', u'epoch': u'0', u'version': u'2.4.3', u'release': u'44.el5', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u'\n[3.0.3-120.el5_6.2]\n- Fix logic and integer overflow in xc_try_bzip2_decode() (rhbz 696938)\n- Fix logic and integer overflow in xc_try_lzma_decode() (rhbz 696938)\n- Fix integer and buffer overflows in xc_dom_probe_bzimage_kernel() (rhbz 696938)', u'issued': u'2011-05-09', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELSA-2011-0496.html', u'type': u'self', u'id': None, u'title': u'ELSA-2011-0496'}, {u'href': u'http://linux.oracle.com/cve/CVE-2011-1583.html', u'type': u'cve', u'id': u'CVE-2011-1583', u'title': u'CVE-2011-1583'}, {u'href': u'http://linux.oracle.com/cve/CVE-2011-3262.html', u'type': u'cve', u'id': u'CVE-2011-3262', u'title': u'CVE-2011-3262'}], u'_content_type_id': u'erratum', u'_id': u'c16cac20-6b41-4992-ba45-d30ba1b50eb9', u'from': u'el-errata@oss.oracle.com', u'severity': u'Important', u'title': u' xen security update', u'_ns': u'units_erratum', u'rights': u'Copyright 2011 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 5', u'reboot_suggested': False, u'type': u'security', u'pkglist': [{u'packages': [{u'src': None, u'name': u'xen', u'sum': [u'md5', u'f6cd15aa5610d47070ac7ef8b4b25927'], u'filename': u'xen-3.0.3-120.el5_6.2.src.rpm', u'epoch': u'0', u'version': u'3.0.3', u'release': u'120.el5_6.2', u'arch': u'src'}, {u'src': None, u'name': u'xen', u'sum': [u'md5', u'6acec4f826e4b2bd8555443a527f2c67'], u'filename': u'xen-3.0.3-120.el5_6.2.x86_64.rpm', u'epoch': u'0', u'version': u'3.0.3', u'release': u'120.el5_6.2', u'arch': u'x86_64'}, {u'src': None, u'name': u'xen-devel', u'sum': [u'md5', u'e3e84222ce414eaaa460cfad2ff2a10f'], u'filename': u'xen-devel-3.0.3-120.el5_6.2.i386.rpm', u'epoch': u'0', u'version': u'3.0.3', u'release': u'120.el5_6.2', u'arch': u'i386'}, {u'src': None, u'name': u'xen-devel', u'sum': [u'md5', u'2e30fc43f406fe584aadf2f546df452d'], u'filename': u'xen-devel-3.0.3-120.el5_6.2.x86_64.rpm', u'epoch': u'0', u'version': u'3.0.3', u'release': u'120.el5_6.2', u'arch': u'x86_64'}, {u'src': None, u'name': u'xen-libs', u'sum': [u'md5', u'c71bd16d67617a5d6bb9b61a9fefe368'], u'filename': u'xen-libs-3.0.3-120.el5_6.2.i386.rpm', u'epoch': u'0', u'version': u'3.0.3', u'release': u'120.el5_6.2', u'arch': u'i386'}, {u'src': None, u'name': u'xen-libs', u'sum': [u'md5', u'e0126581114212c3314826958bc38ced'], u'filename': u'xen-libs-3.0.3-120.el5_6.2.x86_64.rpm', u'epoch': u'0', u'version': u'3.0.3', u'release': u'120.el5_6.2', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u'\n[1.6.0-8.1]\n- Prevent remote file access (#676252)', u'issued': u'2011-05-11', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELSA-2011-0506.html', u'type': u'self', u'id': None, u'title': u'ELSA-2011-0506'}, {u'href': u'http://linux.oracle.com/cve/CVE-2011-1595.html', u'type': u'cve', u'id': u'CVE-2011-1595', u'title': u'CVE-2011-1595'}], u'_content_type_id': u'erratum', u'_id': u'33d3767f-f5a5-4e17-a2e8-2c35b9c7b0c8', u'from': u'el-errata@oss.oracle.com', u'severity': u'Moderate', u'title': u' rdesktop security update', u'_ns': u'units_erratum', u'rights': u'Copyright 2011 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 6', u'reboot_suggested': False, u'type': u'security', u'pkglist': [{u'packages': [{u'src': None, u'name': u'rdesktop', u'sum': [u'md5', u'3d41f92edece5e189ee100036ca0f05b'], u'filename': u'rdesktop-1.6.0-8.el6_0.1.src.rpm', u'epoch': u'0', u'version': u'1.6.0', u'release': u'8.el6_0.1', u'arch': u'src'}, {u'src': None, u'name': u'rdesktop', u'sum': [u'md5', u'77f3e0e96edc325f1c6e49939ceb456d'], u'filename': u'rdesktop-1.6.0-8.el6_0.1.x86_64.rpm', u'epoch': u'0', u'version': u'1.6.0', u'release': u'8.el6_0.1', u'arch': u'x86_64'}], u'name': u'ol6_x86_64_latest', u'short': u'ol6_x86_64_latest'}, {u'packages': [{u'src': None, u'name': u'rdesktop', u'sum': [u'md5', u'3a3053ba849460f54ff55e26ae57beef'], u'filename': u'rdesktop-1.6.0-3.el5_6.2.src.rpm', u'epoch': u'0', u'version': u'1.6.0', u'release': u'3.el5_6.2', u'arch': u'src'}, {u'src': None, u'name': u'rdesktop', u'sum': [u'md5', u'078617be2189b226e039f2dcaa8b735f'], u'filename': u'rdesktop-1.6.0-3.el5_6.2.x86_64.rpm', u'epoch': u'0', u'version': u'1.6.0', u'release': u'3.el5_6.2', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u'\n[1.3.9-3.1]\n- add fix for CVE-2011-0419 (#703520)', u'issued': u'2011-05-11', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELSA-2011-0507.html', u'type': u'self', u'id': None, u'title': u'ELSA-2011-0507'}, {u'href': u'http://linux.oracle.com/cve/CVE-2011-0419.html', u'type': u'cve', u'id': u'CVE-2011-0419', u'title': u'CVE-2011-0419'}], u'_content_type_id': u'erratum', u'_id': u'bc83c16b-701a-4cde-b074-0bc97e8c2e1f', u'from': u'el-errata@oss.oracle.com', u'severity': u'Moderate', u'title': u' apr security update', u'_ns': u'units_erratum', u'rights': u'Copyright 2011 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 6', u'reboot_suggested': False, u'type': u'security', u'pkglist': [{u'packages': [{u'src': None, u'name': u'apr', u'sum': [u'md5', u'dc831cfd141d87c9a055b983be823b49'], u'filename': u'apr-1.3.9-3.el6_0.1.i686.rpm', u'epoch': u'0', u'version': u'1.3.9', u'release': u'3.el6_0.1', u'arch': u'i686'}, {u'src': None, u'name': u'apr', u'sum': [u'md5', u'0e60c1ba9c4e4cd7f4c0a9e4282d7da7'], u'filename': u'apr-1.3.9-3.el6_0.1.src.rpm', u'epoch': u'0', u'version': u'1.3.9', u'release': u'3.el6_0.1', u'arch': u'src'}, {u'src': None, u'name': u'apr', u'sum': [u'md5', u'5bd1142f49c9ae11e9d83ebe0a8b91ea'], u'filename': u'apr-1.3.9-3.el6_0.1.x86_64.rpm', u'epoch': u'0', u'version': u'1.3.9', u'release': u'3.el6_0.1', u'arch': u'x86_64'}, {u'src': None, u'name': u'apr-devel', u'sum': [u'md5', u'542e15395b8b88c7cfc9b8bd34de8a7f'], u'filename': u'apr-devel-1.3.9-3.el6_0.1.i686.rpm', u'epoch': u'0', u'version': u'1.3.9', u'release': u'3.el6_0.1', u'arch': u'i686'}, {u'src': None, u'name': u'apr-devel', u'sum': [u'md5', u'24456eb74b0a402f746256ef0db1fff0'], u'filename': u'apr-devel-1.3.9-3.el6_0.1.x86_64.rpm', u'epoch': u'0', u'version': u'1.3.9', u'release': u'3.el6_0.1', u'arch': u'x86_64'}], u'name': u'ol6_x86_64_latest', u'short': u'ol6_x86_64_latest'}, {u'packages': [{u'src': None, u'name': u'apr', u'sum': [u'md5', u'a2bd589dc74ed1fe2180ea27094f1aec'], u'filename': u'apr-1.2.7-11.el5_6.4.i386.rpm', u'epoch': u'0', u'version': u'1.2.7', u'release': u'11.el5_6.4', u'arch': u'i386'}, {u'src': None, u'name': u'apr', u'sum': [u'md5', u'6e03e9ccc4555605d6235762986fe727'], u'filename': u'apr-1.2.7-11.el5_6.4.src.rpm', u'epoch': u'0', u'version': u'1.2.7', u'release': u'11.el5_6.4', u'arch': u'src'}, {u'src': None, u'name': u'apr', u'sum': [u'md5', u'cf09bf20be22a439a82aad48b68d029f'], u'filename': u'apr-1.2.7-11.el5_6.4.x86_64.rpm', u'epoch': u'0', u'version': u'1.2.7', u'release': u'11.el5_6.4', u'arch': u'x86_64'}, {u'src': None, u'name': u'apr-devel', u'sum': [u'md5', u'c00684ae470c3223c4fc415eb5a63b89'], u'filename': u'apr-devel-1.2.7-11.el5_6.4.i386.rpm', u'epoch': u'0', u'version': u'1.2.7', u'release': u'11.el5_6.4', u'arch': u'i386'}, {u'src': None, u'name': u'apr-devel', u'sum': [u'md5', u'fe1f6cdad606fb086a4bc025c72fe701'], u'filename': u'apr-devel-1.2.7-11.el5_6.4.x86_64.rpm', u'epoch': u'0', u'version': u'1.2.7', u'release': u'11.el5_6.4', u'arch': u'x86_64'}, {u'src': None, u'name': u'apr-docs', u'sum': [u'md5', u'8535f2e9e48c3f60a767937261d32d98'], u'filename': u'apr-docs-1.2.7-11.el5_6.4.x86_64.rpm', u'epoch': u'0', u'version': u'1.2.7', u'release': u'11.el5_6.4', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u'\n[2.6.18-238.12.1.0.1.el5]\n- [scsi] fix scsi hotplug and rescan race [orabug 10260172]\n- fix filp_close() race (Joe Jin) [orabug 10335998]\n- fix missing aio_complete() in end_io (Joel Becker) [orabug 10365195]\n- make xenkbd.abs_pointer=1 by default [orabug 67188919]\n- [xen] check to see if hypervisor supports memory reservation change\n (Chuck Anderson) [orabug 7556514]\n- [net] Enable entropy for bnx2,bnx2x,e1000e,igb,ixgb,ixgbe,ixgbevf (John Sobecki)\n [orabug 10315433]\n- [NET] Add xen pv netconsole support (Tina Yang) [orabug 6993043] [bz 7258]\n- [mm] shrink_zone patch (John Sobecki,Chris Mason) [orabug 6086839]\n- fix aacraid not to reset during kexec (Joe Jin) [orabug 8516042]\n- [rds] Patch rds to 1.4.2-20 (Andy Grover) [orabug 9471572, 9344105]\n RDS: Fix BUG_ONs to not fire when in a tasklet\n ipoib: Fix lockup of the tx queue\n RDS: Do not call set_page_dirty() with irqs off (Sherman Pun)\n RDS: Properly unmap when getting a remote access error (Tina Yang)\n RDS: Fix locking in rds_send_drop_to()\n- [qla] fix qla not to query hccr (Guru Anbalagane) [Orabug 8746702]\n- [nfs] too many getattr and access calls after direct I/O [orabug 9348191]\n- [xen] PVHVM guest with PoD crashes under memory pressure (Chuck Anderson)\n [orabug 9107465]\n- [xen] PV guest with FC HBA hangs during shutdown (Chuck Anderson)\n [orabug 9764220]\n- Support 256GB+ memory for pv guest (Mukesh Rathor) [orabug 9450615]\n- fix overcommit memory to use percpu_counter for el5 (KOSAKI Motohiro,\n Guru Anbalagane) [orabug 6124033]\n- [ipmi] make configurable timeouts for kcs of ipmi [orabug 9752208]\n- [ib] fix memory corruption (Andy Grover) [orabug 9972346]\n- [aio] patch removes limit on number of retries (Srinivas Eeda) [orabug 10044782]\n- [loop] Do not call loop_unplug for not configured loop device (orabug 10314497)\n\n[2.6.18-238.12.1.el5]\n- [x86_64] Ignore spurious IPIs left over from crash kernel (Myron Stowe) [699610 692921]\n- [i386] Ignore spurious IPIs left over from crash kernel (Myron Stowe) [699610 692921]\n- [xen] fix MAX_EVTCHNS definition (Laszlo Ersek) [701242 701240]\n- [net] ixgbe: fix for link failure on SFP+ DA cables (Don Howard) [696181 653236]\n- [net] netxen: limit skb frags for non tso packet (Phillip Lougher) [699609 672368]\n- [block] cciss: fix lost command problem (Phillip Lougher) [696503 696153]\n- [fs] gfs2: fix filesystem hang caused by incorrect lock order (Robert S Peterson) [688855 656032]\n- [fs] gfs2: restructure reclaim of unlinked dinodes (Phillip Lougher) [688855 656032]\n- [fs] gfs2: unlock on gfs2_trans_begin error (Robert S Peterson) [688855 656032]\n- [scsi] mpt2sas: prevent heap overflows and unchecked access (Tomas Henzl) [694526 694527] {CVE-2011-1495 CVE-2011-1494}\n- [net] bridge/netfilter: fix ebtables information leak (Don Howard) [681325 681326] {CVE-2011-1080}\n- [net] bluetooth: fix sco information leak to userspace (Don Howard) [681310 681311] {CVE-2011-1078}\n- [fs] fix corrupted GUID partition table kernel oops (Jerome Marchand) [695979 695980] {CVE-2011-1577}\n- [xen] x86/domain: fix error checks in arch_set_info_guest (Laszlo Ersek) [688581 688582] {CVE-2011-1166}\n- [net] bridge: fix initial packet flood if !STP (Jiri Pirko) [701222 695369]\n- [fs] nfsd: fix auth_domain reference leak on nlm operations (J. Bruce Fields) [697448 589512]\n- [scsi] qla2xxx: no reset/fw-dump on CT/ELS pt req timeout (Chad Dupuis) [689700 660386]\n- [mm] set barrier and send tlb flush to all affected cpus (Prarit Bhargava) [696908 675793]\n\n[2.6.18-238.11.1.el5]\n- [s390] dasd: fix race between open and offline (Hendrik Brueckner) [699808 695357]\n\n[2.6.18-238.10.1.el5]\n- [fs] gfs2: creating large files suddenly slow to a crawl (Robert S Peterson) [690239 683155]\n- [virt] hypervisor: Overflow fix for clocks > 4GHz (Zachary Amsden) [690134 673242]\n- [usb] fix usbfs isochronous data transfer regression (Don Zickus) [696136 688926]\n- [fs] partitions: Fix corrupted OSF partition table parsing (Danny Feng) [688022 688023] {CVE-2011-1163}\n- [misc] pm: add comment explaining is_registered kabi work-around (Don Zickus) [689699 637930]\n- [media] sn9c102: fix world-wirtable sysfs files (Don Howard) [679304 679305]\n- [scsi] scsi_dh_rdac: Add two new IBM devices to rdac_dev_list (Rob Evers) [692370 691460]\n- [fs] block: fix submit_bh discarding barrier flag on sync write (Lukas Czerner) [690795 667673]\n- [net] netfilter/ipt_CLUSTERIP: fix buffer overflow (Jiri Pirko) [689339 689340]\n- [net] netfilter: ip6_tables: fix infoleak to userspace (Jiri Pirko) [689348 689349] {CVE-2011-1172}\n- [net] netfilter/ip_tables: fix infoleak to userspace (Jiri Pirko) [689331 689332] {CVE-2011-1171}\n- [net] netfilter/arp_tables: fix infoleak to userspace (Jiri Pirko) [689322 689323] {CVE-2011-1170}\n- [base] Fix potential deadlock in driver core (Don Zickus) [689699 637930]\n- [net] forcedeth/r8169: call netif_carrier_off at end of probe (Ivan Vecera) [689808 689805 664705 664707]\n- [net] ixgbe: fix for 82599 erratum on Header Splitting (Andy Gospodarek) [693751 680531]\n- [net] ixgbe: limit VF access to network traffic (Andy Gospodarek) [693751 680531]\n- [fs] lockd: make lockd_down wait for lockd to come down (Jeff Layton) [688156 653286]\n- [fs] proc: protect mm start_/end_code in /proc/pid/stat (Eugene Teo) [684570 684571] {CVE-2011-0726}\n- [net] dccp: fix oops in dccp_rcv_state_process (Eugene Teo) [682955 682956] {CVE-2011-1093}\n- [net] bluetooth: fix bnep buffer overflow (Don Howard) [681318 681319] {CVE-2011-1079}\n- [fs] nfs: break nfsd v4 lease on unlink, link, and rename (J. Bruce Fields) [693755 610093]\n- [fs] nfs: break lease on nfsd v4 setattr (J. Bruce Fields) [693755 610093]', u'issued': u'2011-05-31', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELSA-2011-0833.html', u'type': u'self', u'id': None, u'title': u'ELSA-2011-0833'}, {u'href': u'http://linux.oracle.com/cve/CVE-2011-0726.html', u'type': u'cve', u'id': u'CVE-2011-0726', u'title': u'CVE-2011-0726'}, {u'href': u'http://linux.oracle.com/cve/CVE-2011-1078.html', u'type': u'cve', u'id': u'CVE-2011-1078', u'title': u'CVE-2011-1078'}, {u'href': u'http://linux.oracle.com/cve/CVE-2011-1079.html', u'type': u'cve', u'id': u'CVE-2011-1079', u'title': u'CVE-2011-1079'}, {u'href': u'http://linux.oracle.com/cve/CVE-2011-1080.html', u'type': u'cve', u'id': u'CVE-2011-1080', u'title': u'CVE-2011-1080'}, {u'href': u'http://linux.oracle.com/cve/CVE-2011-1093.html', u'type': u'cve', u'id': u'CVE-2011-1093', u'title': u'CVE-2011-1093'}, {u'href': u'http://linux.oracle.com/cve/CVE-2011-1163.html', u'type': u'cve', u'id': u'CVE-2011-1163', u'title': u'CVE-2011-1163'}, {u'href': u'http://linux.oracle.com/cve/CVE-2011-1166.html', u'type': u'cve', u'id': u'CVE-2011-1166', u'title': u'CVE-2011-1166'}, {u'href': u'http://linux.oracle.com/cve/CVE-2011-1170.html', u'type': u'cve', u'id': u'CVE-2011-1170', u'title': u'CVE-2011-1170'}, {u'href': u'http://linux.oracle.com/cve/CVE-2011-1171.html', u'type': u'cve', u'id': u'CVE-2011-1171', u'title': u'CVE-2011-1171'}, {u'href': u'http://linux.oracle.com/cve/CVE-2011-1172.html', u'type': u'cve', u'id': u'CVE-2011-1172', u'title': u'CVE-2011-1172'}, {u'href': u'http://linux.oracle.com/cve/CVE-2011-1494.html', u'type': u'cve', u'id': u'CVE-2011-1494', u'title': u'CVE-2011-1494'}, {u'href': u'http://linux.oracle.com/cve/CVE-2011-1495.html', u'type': u'cve', u'id': u'CVE-2011-1495', u'title': u'CVE-2011-1495'}, {u'href': u'http://linux.oracle.com/cve/CVE-2011-1577.html', u'type': u'cve', u'id': u'CVE-2011-1577', u'title': u'CVE-2011-1577'}, {u'href': u'http://linux.oracle.com/cve/CVE-2011-1763.html', u'type': u'cve', u'id': u'CVE-2011-1763', u'title': u'CVE-2011-1763'}], u'_content_type_id': u'erratum', u'_id': u'b0aecd6d-f1cc-4130-bc55-75b76134a0a9', u'from': u'el-errata@oss.oracle.com', u'severity': u'Important', u'title': u' kernel security and bug fix update', u'_ns': u'units_erratum', u'rights': u'Copyright 2011 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 5', u'reboot_suggested': False, u'type': u'security', u'pkglist': [{u'packages': [{u'src': None, u'name': u'kernel', u'sum': [u'md5', u'bf2af055c458c9ee4d1bcea5bcb84e2a'], u'filename': u'kernel-2.6.18-238.12.1.0.1.el5.src.rpm', u'epoch': u'0', u'version': u'2.6.18', u'release': u'238.12.1.0.1.el5', u'arch': u'src'}, {u'src': None, u'name': u'kernel', u'sum': [u'md5', u'2139b0329df834031300dda58ea71998'], u'filename': u'kernel-2.6.18-238.12.1.0.1.el5.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.18', u'release': u'238.12.1.0.1.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'kernel-debug', u'sum': [u'md5', u'871879f9ba725d1fb0d5ea53a7fcd1ee'], u'filename': u'kernel-debug-2.6.18-238.12.1.0.1.el5.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.18', u'release': u'238.12.1.0.1.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'kernel-debug-devel', u'sum': [u'md5', u'29fd3cbfe36c5203e23429960b020d50'], u'filename': u'kernel-debug-devel-2.6.18-238.12.1.0.1.el5.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.18', u'release': u'238.12.1.0.1.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'kernel-devel', u'sum': [u'md5', u'ca43cb41e98206857b4ab2539d74fe34'], u'filename': u'kernel-devel-2.6.18-238.12.1.0.1.el5.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.18', u'release': u'238.12.1.0.1.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'kernel-doc', u'sum': [u'md5', u'c9b58004cfd42844d599d1c69b90f0b9'], u'filename': u'kernel-doc-2.6.18-238.12.1.0.1.el5.noarch.rpm', u'epoch': u'0', u'version': u'2.6.18', u'release': u'238.12.1.0.1.el5', u'arch': u'noarch'}, {u'src': None, u'name': u'kernel-headers', u'sum': [u'md5', u'fbb9c53cd8f42e97de39763fe5d2c6b3'], u'filename': u'kernel-headers-2.6.18-238.12.1.0.1.el5.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.18', u'release': u'238.12.1.0.1.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'kernel-xen', u'sum': [u'md5', u'a77588285064aad08dfe3d5feccfc4e3'], u'filename': u'kernel-xen-2.6.18-238.12.1.0.1.el5.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.18', u'release': u'238.12.1.0.1.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'kernel-xen-devel', u'sum': [u'md5', u'f2c8fdeff17da99744f15072b99cb16e'], u'filename': u'kernel-xen-devel-2.6.18-238.12.1.0.1.el5.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.18', u'release': u'238.12.1.0.1.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'ocfs2-2.6.18-238.12.1.0.1.el5', u'sum': [u'md5', u'5e53be1ac2e87b9b7fe5a5fc0ced09e0'], u'filename': u'ocfs2-2.6.18-238.12.1.0.1.el5-1.4.8-2.el5.src.rpm', u'epoch': u'0', u'version': u'1.4.8', u'release': u'2.el5', u'arch': u'src'}, {u'src': None, u'name': u'ocfs2-2.6.18-238.12.1.0.1.el5', u'sum': [u'md5', u'3a05f63d62503bd1515d66712c1d3843'], u'filename': u'ocfs2-2.6.18-238.12.1.0.1.el5-1.4.8-2.el5.x86_64.rpm', u'epoch': u'0', u'version': u'1.4.8', u'release': u'2.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'ocfs2-2.6.18-238.12.1.0.1.el5debug', u'sum': [u'md5', u'a407383d47a803591a172f78cf993dc7'], u'filename': u'ocfs2-2.6.18-238.12.1.0.1.el5debug-1.4.8-2.el5.x86_64.rpm', u'epoch': u'0', u'version': u'1.4.8', u'release': u'2.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'ocfs2-2.6.18-238.12.1.0.1.el5xen', u'sum': [u'md5', u'fc8c5e301b47d88e70f09b8b65bf8a1f'], u'filename': u'ocfs2-2.6.18-238.12.1.0.1.el5xen-1.4.8-2.el5.x86_64.rpm', u'epoch': u'0', u'version': u'1.4.8', u'release': u'2.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'oracleasm-2.6.18-238.12.1.0.1.el5', u'sum': [u'md5', u'1bbfe0f663341486851989cf27ed5c5d'], u'filename': u'oracleasm-2.6.18-238.12.1.0.1.el5-2.0.5-1.el5.src.rpm', u'epoch': u'0', u'version': u'2.0.5', u'release': u'1.el5', u'arch': u'src'}, {u'src': None, u'name': u'oracleasm-2.6.18-238.12.1.0.1.el5', u'sum': [u'md5', u'b5d044671fb9f041b40d4da20d66722c'], u'filename': u'oracleasm-2.6.18-238.12.1.0.1.el5-2.0.5-1.el5.x86_64.rpm', u'epoch': u'0', u'version': u'2.0.5', u'release': u'1.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'oracleasm-2.6.18-238.12.1.0.1.el5debug', u'sum': [u'md5', u'0c6f5a0bbccbb7573d50206e411d5824'], u'filename': u'oracleasm-2.6.18-238.12.1.0.1.el5debug-2.0.5-1.el5.x86_64.rpm', u'epoch': u'0', u'version': u'2.0.5', u'release': u'1.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'oracleasm-2.6.18-238.12.1.0.1.el5xen', u'sum': [u'md5', u'ef8acd206ec540521d538740c503eada'], u'filename': u'oracleasm-2.6.18-238.12.1.0.1.el5xen-2.0.5-1.el5.x86_64.rpm', u'epoch': u'0', u'version': u'2.0.5', u'release': u'1.el5', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u'\n[2:2.2.13-2.0.7.2]\n- fix various overflows (#537356, #666793, #689831, #703403, #703405, #703407,\n - unfuzz gimphelpmissing, icontheme patches', u'issued': u'2011-05-31', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELSA-2011-0838.html', u'type': u'self', u'id': None, u'title': u'ELSA-2011-0838'}, {u'href': u'http://linux.oracle.com/cve/CVE-2009-1570.html', u'type': u'cve', u'id': u'CVE-2009-1570', u'title': u'CVE-2009-1570'}, {u'href': u'http://linux.oracle.com/cve/CVE-2010-4540.html', u'type': u'cve', u'id': u'CVE-2010-4540', u'title': u'CVE-2010-4540'}, {u'href': u'http://linux.oracle.com/cve/CVE-2010-4541.html', u'type': u'cve', u'id': u'CVE-2010-4541', u'title': u'CVE-2010-4541'}, {u'href': u'http://linux.oracle.com/cve/CVE-2010-4542.html', u'type': u'cve', u'id': u'CVE-2010-4542', u'title': u'CVE-2010-4542'}, {u'href': u'http://linux.oracle.com/cve/CVE-2010-4543.html', u'type': u'cve', u'id': u'CVE-2010-4543', u'title': u'CVE-2010-4543'}, {u'href': u'http://linux.oracle.com/cve/CVE-2011-1178.html', u'type': u'cve', u'id': u'CVE-2011-1178', u'title': u'CVE-2011-1178'}], u'_content_type_id': u'erratum', u'_id': u'eba2d101-d265-4370-be71-1c9cf9195318', u'from': u'el-errata@oss.oracle.com', u'severity': u'Moderate', u'title': u' gimp security update', u'_ns': u'units_erratum', u'rights': u'Copyright 2011 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 5', u'reboot_suggested': False, u'type': u'security', u'pkglist': [{u'packages': [{u'src': None, u'name': u'gimp', u'sum': [u'md5', u'479878d198df13e2dc18fda0b937a488'], u'filename': u'gimp-2.2.13-2.0.7.el5_6.2.src.rpm', u'epoch': u'2', u'version': u'2.2.13', u'release': u'2.0.7.el5_6.2', u'arch': u'src'}, {u'src': None, u'name': u'gimp', u'sum': [u'md5', u'b043fe781c08c02514dd581c52043765'], u'filename': u'gimp-2.2.13-2.0.7.el5_6.2.x86_64.rpm', u'epoch': u'2', u'version': u'2.2.13', u'release': u'2.0.7.el5_6.2', u'arch': u'x86_64'}, {u'src': None, u'name': u'gimp-devel', u'sum': [u'md5', u'0fe50f2dd506840881df3e25c868a314'], u'filename': u'gimp-devel-2.2.13-2.0.7.el5_6.2.i386.rpm', u'epoch': u'2', u'version': u'2.2.13', u'release': u'2.0.7.el5_6.2', u'arch': u'i386'}, {u'src': None, u'name': u'gimp-devel', u'sum': [u'md5', u'b26ead401ec65ec401dc8a0f5237ed1f'], u'filename': u'gimp-devel-2.2.13-2.0.7.el5_6.2.x86_64.rpm', u'epoch': u'2', u'version': u'2.2.13', u'release': u'2.0.7.el5_6.2', u'arch': u'x86_64'}, {u'src': None, u'name': u'gimp-libs', u'sum': [u'md5', u'cc5c9330574ce84c95073559610e6e46'], u'filename': u'gimp-libs-2.2.13-2.0.7.el5_6.2.i386.rpm', u'epoch': u'2', u'version': u'2.2.13', u'release': u'2.0.7.el5_6.2', u'arch': u'i386'}, {u'src': None, u'name': u'gimp-libs', u'sum': [u'md5', u'14afe8db691e422226d24a355db75050'], u'filename': u'gimp-libs-2.2.13-2.0.7.el5_6.2.x86_64.rpm', u'epoch': u'2', u'version': u'2.2.13', u'release': u'2.0.7.el5_6.2', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u'\n[1.3-4.1]\n- bz702687 (patch)', u'issued': u'2011-05-31', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELSA-2011-0841.html', u'type': u'self', u'id': None, u'title': u'ELSA-2011-0841'}, {u'href': u'http://linux.oracle.com/cve/CVE-2011-1769.html', u'type': u'cve', u'id': u'CVE-2011-1769', u'title': u'CVE-2011-1769'}], u'_content_type_id': u'erratum', u'_id': u'031de13f-c483-46db-843d-083fcb9c91b2', u'from': u'el-errata@oss.oracle.com', u'severity': u'Moderate', u'title': u' systemtap security update', u'_ns': u'units_erratum', u'rights': u'Copyright 2011 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 5', u'reboot_suggested': False, u'type': u'security', u'pkglist': [{u'packages': [{u'src': None, u'name': u'systemtap', u'sum': [u'md5', u'cd97a3fafde2372b92ae105b7191fbce'], u'filename': u'systemtap-1.3-4.el5_6.1.src.rpm', u'epoch': u'0', u'version': u'1.3', u'release': u'4.el5_6.1', u'arch': u'src'}, {u'src': None, u'name': u'systemtap', u'sum': [u'md5', u'd364c545a2a92249e0e5a65923d63494'], u'filename': u'systemtap-1.3-4.el5_6.1.x86_64.rpm', u'epoch': u'0', u'version': u'1.3', u'release': u'4.el5_6.1', u'arch': u'x86_64'}, {u'src': None, u'name': u'systemtap-client', u'sum': [u'md5', u'325b75bc1919b6fb062991c795f00a9f'], u'filename': u'systemtap-client-1.3-4.el5_6.1.x86_64.rpm', u'epoch': u'0', u'version': u'1.3', u'release': u'4.el5_6.1', u'arch': u'x86_64'}, {u'src': None, u'name': u'systemtap-initscript', u'sum': [u'md5', u'7cab5ebc44a9502e9a9c3826dd619295'], u'filename': u'systemtap-initscript-1.3-4.el5_6.1.x86_64.rpm', u'epoch': u'0', u'version': u'1.3', u'release': u'4.el5_6.1', u'arch': u'x86_64'}, {u'src': None, u'name': u'systemtap-runtime', u'sum': [u'md5', u'9bbb5b3d74029dad6749effceb964f06'], u'filename': u'systemtap-runtime-1.3-4.el5_6.1.x86_64.rpm', u'epoch': u'0', u'version': u'1.3', u'release': u'4.el5_6.1', u'arch': u'x86_64'}, {u'src': None, u'name': u'systemtap-sdt-devel', u'sum': [u'md5', u'8baab53e1ee741f9549b009bfb414d6d'], u'filename': u'systemtap-sdt-devel-1.3-4.el5_6.1.i386.rpm', u'epoch': u'0', u'version': u'1.3', u'release': u'4.el5_6.1', u'arch': u'i386'}, {u'src': None, u'name': u'systemtap-sdt-devel', u'sum': [u'md5', u'44482d036ea6512d83065d3ee5c28353'], u'filename': u'systemtap-sdt-devel-1.3-4.el5_6.1.x86_64.rpm', u'epoch': u'0', u'version': u'1.3', u'release': u'4.el5_6.1', u'arch': u'x86_64'}, {u'src': None, u'name': u'systemtap-server', u'sum': [u'md5', u'375ec33f65efdfd6546bf59ccb3e14a0'], u'filename': u'systemtap-server-1.3-4.el5_6.1.x86_64.rpm', u'epoch': u'0', u'version': u'1.3', u'release': u'4.el5_6.1', u'arch': u'x86_64'}, {u'src': None, u'name': u'systemtap-testsuite', u'sum': [u'md5', u'f4293bc0a41c50e137d2dd7748a857c6'], u'filename': u'systemtap-testsuite-1.3-4.el5_6.1.x86_64.rpm', u'epoch': u'0', u'version': u'1.3', u'release': u'4.el5_6.1', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u'\n[2:2.6.6-2.2]\n- fix CVE-2011-1720 (#704136)\n Resolves: rhbz#704136', u'issued': u'2011-05-31', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELSA-2011-0843.html', u'type': u'self', u'id': None, u'title': u'ELSA-2011-0843'}, {u'href': u'http://linux.oracle.com/cve/CVE-2011-1720.html', u'type': u'cve', u'id': u'CVE-2011-1720', u'title': u'CVE-2011-1720'}], u'_content_type_id': u'erratum', u'_id': u'cbff2565-c734-4bb9-acf6-99e922c5f1b6', u'from': u'el-errata@oss.oracle.com', u'severity': u'Moderate', u'title': u' postfix security update', u'_ns': u'units_erratum', u'rights': u'Copyright 2011 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 6', u'reboot_suggested': False, u'type': u'security', u'pkglist': [{u'packages': [{u'src': None, u'name': u'postfix', u'sum': [u'md5', u'af9d019e3ce5fb57a401808e2574d573'], u'filename': u'postfix-2.6.6-2.2.el6_1.src.rpm', u'epoch': u'2', u'version': u'2.6.6', u'release': u'2.2.el6_1', u'arch': u'src'}, {u'src': None, u'name': u'postfix', u'sum': [u'md5', u'5c38afa3b3f7c9c31af7072b216da152'], u'filename': u'postfix-2.6.6-2.2.el6_1.x86_64.rpm', u'epoch': u'2', u'version': u'2.6.6', u'release': u'2.2.el6_1', u'arch': u'x86_64'}, {u'src': None, u'name': u'postfix-perl-scripts', u'sum': [u'md5', u'd24e0a2cc72356a0344a8feb12a75a59'], u'filename': u'postfix-perl-scripts-2.6.6-2.2.el6_1.x86_64.rpm', u'epoch': u'2', u'version': u'2.6.6', u'release': u'2.2.el6_1', u'arch': u'x86_64'}], u'name': u'ol6_x86_64_latest', u'short': u'ol6_x86_64_latest'}, {u'packages': [{u'src': None, u'name': u'postfix', u'sum': [u'md5', u'de2108a525e8fa9279bb9f046ca2125b'], u'filename': u'postfix-2.3.3-2.3.el5_6.src.rpm', u'epoch': u'2', u'version': u'2.3.3', u'release': u'2.3.el5_6', u'arch': u'src'}, {u'src': None, u'name': u'postfix', u'sum': [u'md5', u'c3a49af12cc8c2e66e9efc3a48efd60f'], u'filename': u'postfix-2.3.3-2.3.el5_6.x86_64.rpm', u'epoch': u'2', u'version': u'2.3.3', u'release': u'2.3.el5_6', u'arch': u'x86_64'}, {u'src': None, u'name': u'postfix-pflogsumm', u'sum': [u'md5', u'558d9b7260b754ad2c5e91a63300cd74'], u'filename': u'postfix-pflogsumm-2.3.3-2.3.el5_6.x86_64.rpm', u'epoch': u'2', u'version': u'2.3.3', u'release': u'2.3.el5_6', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u'\n[1.3.9-3.2]\n- add fix for apr_fnmatch() regression (CVE-2011-1928, #706352)', u'issued': u'2011-05-31', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELSA-2011-0844.html', u'type': u'self', u'id': None, u'title': u'ELSA-2011-0844'}, {u'href': u'http://linux.oracle.com/cve/CVE-2011-1928.html', u'type': u'cve', u'id': u'CVE-2011-1928', u'title': u'CVE-2011-1928'}], u'_content_type_id': u'erratum', u'_id': u'90c1b551-780e-4673-9ac5-320ca9108c92', u'from': u'el-errata@oss.oracle.com', u'severity': u'Low', u'title': u' apr security update', u'_ns': u'units_erratum', u'rights': u'Copyright 2011 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 6', u'reboot_suggested': False, u'type': u'security', u'pkglist': [{u'packages': [{u'src': None, u'name': u'apr', u'sum': [u'md5', u'ae3c2109ef58791715e942f725092c09'], u'filename': u'apr-1.3.9-3.el6_1.2.i686.rpm', u'epoch': u'0', u'version': u'1.3.9', u'release': u'3.el6_1.2', u'arch': u'i686'}, {u'src': None, u'name': u'apr', u'sum': [u'md5', u'90c72a1a1aa486f6e990b79ce33c62a9'], u'filename': u'apr-1.3.9-3.el6_1.2.src.rpm', u'epoch': u'0', u'version': u'1.3.9', u'release': u'3.el6_1.2', u'arch': u'src'}, {u'src': None, u'name': u'apr', u'sum': [u'md5', u'ea61552ea89f1331fc87b792fb1b3729'], u'filename': u'apr-1.3.9-3.el6_1.2.x86_64.rpm', u'epoch': u'0', u'version': u'1.3.9', u'release': u'3.el6_1.2', u'arch': u'x86_64'}, {u'src': None, u'name': u'apr-devel', u'sum': [u'md5', u'd4c1a95c3fc76c82a89afe0b153536b3'], u'filename': u'apr-devel-1.3.9-3.el6_1.2.i686.rpm', u'epoch': u'0', u'version': u'1.3.9', u'release': u'3.el6_1.2', u'arch': u'i686'}, {u'src': None, u'name': u'apr-devel', u'sum': [u'md5', u'f273ddc371246822d834d5eb7529568f'], u'filename': u'apr-devel-1.3.9-3.el6_1.2.x86_64.rpm', u'epoch': u'0', u'version': u'1.3.9', u'release': u'3.el6_1.2', u'arch': u'x86_64'}], u'name': u'ol6_x86_64_latest', u'short': u'ol6_x86_64_latest'}, {u'packages': [{u'src': None, u'name': u'apr', u'sum': [u'md5', u'be4844a46876337e17eb59e4abfd679c'], u'filename': u'apr-1.2.7-11.el5_6.5.i386.rpm', u'epoch': u'0', u'version': u'1.2.7', u'release': u'11.el5_6.5', u'arch': u'i386'}, {u'src': None, u'name': u'apr', u'sum': [u'md5', u'2f2073777ae99608853a5dc6509c182d'], u'filename': u'apr-1.2.7-11.el5_6.5.src.rpm', u'epoch': u'0', u'version': u'1.2.7', u'release': u'11.el5_6.5', u'arch': u'src'}, {u'src': None, u'name': u'apr', u'sum': [u'md5', u'84de4d846d1368e3ffa4f66ecb0c7b6b'], u'filename': u'apr-1.2.7-11.el5_6.5.x86_64.rpm', u'epoch': u'0', u'version': u'1.2.7', u'release': u'11.el5_6.5', u'arch': u'x86_64'}, {u'src': None, u'name': u'apr-devel', u'sum': [u'md5', u'4b875e209e7937b02b0be112d118ce26'], u'filename': u'apr-devel-1.2.7-11.el5_6.5.i386.rpm', u'epoch': u'0', u'version': u'1.2.7', u'release': u'11.el5_6.5', u'arch': u'i386'}, {u'src': None, u'name': u'apr-devel', u'sum': [u'md5', u'8c6d1ed2e8ff3470fc857052a981447c'], u'filename': u'apr-devel-1.2.7-11.el5_6.5.x86_64.rpm', u'epoch': u'0', u'version': u'1.2.7', u'release': u'11.el5_6.5', u'arch': u'x86_64'}, {u'src': None, u'name': u'apr-docs', u'sum': [u'md5', u'1ba0ef865a1a35dc72116e66f7d65168'], u'filename': u'apr-docs-1.2.7-11.el5_6.5.x86_64.rpm', u'epoch': u'0', u'version': u'1.2.7', u'release': u'11.el5_6.5', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u'[32:9.7.3-2.1.P1]\n- update to 9.7.3-P1 (CVE-2011-1910)', u'issued': u'2011-05-31', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELSA-2011-0845.html', u'type': u'self', u'id': None, u'title': u'ELSA-2011-0845'}, {u'href': u'http://linux.oracle.com/cve/CVE-2011-1910.html', u'type': u'cve', u'id': u'CVE-2011-1910', u'title': u'CVE-2011-1910'}], u'_content_type_id': u'erratum', u'_id': u'c696bb8b-2d37-4609-b2fc-ea9a328ea7a1', u'from': u'el-errata@oss.oracle.com', u'severity': u'Important', u'title': u' bind security update', u'_ns': u'units_erratum', u'rights': u'Copyright 2011 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 6', u'reboot_suggested': False, u'type': u'security', u'pkglist': [{u'packages': [{u'src': None, u'name': u'bind', u'sum': [u'md5', u'2fcf98daab3064cbbbb1d48fc9fa5382'], u'filename': u'bind-9.7.3-2.el6_1.P1.1.src.rpm', u'epoch': u'32', u'version': u'9.7.3', u'release': u'2.el6_1.P1.1', u'arch': u'src'}, {u'src': None, u'name': u'bind', u'sum': [u'md5', u'd092a041fe983a0fb73369ed13463090'], u'filename': u'bind-9.7.3-2.el6_1.P1.1.x86_64.rpm', u'epoch': u'32', u'version': u'9.7.3', u'release': u'2.el6_1.P1.1', u'arch': u'x86_64'}, {u'src': None, u'name': u'bind-chroot', u'sum': [u'md5', u'c75bd9025ce99ba10e9c2b635233299b'], u'filename': u'bind-chroot-9.7.3-2.el6_1.P1.1.x86_64.rpm', u'epoch': u'32', u'version': u'9.7.3', u'release': u'2.el6_1.P1.1', u'arch': u'x86_64'}, {u'src': None, u'name': u'bind-devel', u'sum': [u'md5', u'e789f5c9126dcecbb9a5f9c6f5a2cfab'], u'filename': u'bind-devel-9.7.3-2.el6_1.P1.1.i686.rpm', u'epoch': u'32', u'version': u'9.7.3', u'release': u'2.el6_1.P1.1', u'arch': u'i686'}, {u'src': None, u'name': u'bind-devel', u'sum': [u'md5', u'9fea1bedd04e2c0321b87e8da35d3ce3'], u'filename': u'bind-devel-9.7.3-2.el6_1.P1.1.x86_64.rpm', u'epoch': u'32', u'version': u'9.7.3', u'release': u'2.el6_1.P1.1', u'arch': u'x86_64'}, {u'src': None, u'name': u'bind-libs', u'sum': [u'md5', u'31034ae78587e2266e1d83184568ff23'], u'filename': u'bind-libs-9.7.3-2.el6_1.P1.1.i686.rpm', u'epoch': u'32', u'version': u'9.7.3', u'release': u'2.el6_1.P1.1', u'arch': u'i686'}, {u'src': None, u'name': u'bind-libs', u'sum': [u'md5', u'd433c229ca6001902e7df36092b56988'], u'filename': u'bind-libs-9.7.3-2.el6_1.P1.1.x86_64.rpm', u'epoch': u'32', u'version': u'9.7.3', u'release': u'2.el6_1.P1.1', u'arch': u'x86_64'}, {u'src': None, u'name': u'bind-sdb', u'sum': [u'md5', u'59eac694b020252e6ed0d1a2b7b01ec1'], u'filename': u'bind-sdb-9.7.3-2.el6_1.P1.1.x86_64.rpm', u'epoch': u'32', u'version': u'9.7.3', u'release': u'2.el6_1.P1.1', u'arch': u'x86_64'}, {u'src': None, u'name': u'bind-utils', u'sum': [u'md5', u'5352f9df4207fbf844a28ce410390352'], u'filename': u'bind-utils-9.7.3-2.el6_1.P1.1.x86_64.rpm', u'epoch': u'32', u'version': u'9.7.3', u'release': u'2.el6_1.P1.1', u'arch': u'x86_64'}], u'name': u'ol6_x86_64_latest', u'short': u'ol6_x86_64_latest'}, {u'packages': [{u'src': None, u'name': u'bind97', u'sum': [u'md5', u'bcdc052969b0dc302c330c2105ce3bfd'], u'filename': u'bind97-9.7.0-6.P2.el5_6.2.src.rpm', u'epoch': u'32', u'version': u'9.7.0', u'release': u'6.P2.el5_6.2', u'arch': u'src'}, {u'src': None, u'name': u'bind97', u'sum': [u'md5', u'dca56c8e30ef864f1be4465148f72481'], u'filename': u'bind97-9.7.0-6.P2.el5_6.2.x86_64.rpm', u'epoch': u'32', u'version': u'9.7.0', u'release': u'6.P2.el5_6.2', u'arch': u'x86_64'}, {u'src': None, u'name': u'bind97-chroot', u'sum': [u'md5', u'd20b8c4c7356285035990b119087939b'], u'filename': u'bind97-chroot-9.7.0-6.P2.el5_6.2.x86_64.rpm', u'epoch': u'32', u'version': u'9.7.0', u'release': u'6.P2.el5_6.2', u'arch': u'x86_64'}, {u'src': None, u'name': u'bind97-devel', u'sum': [u'md5', u'a7e35016ab6fe808f75958fa0172ea32'], u'filename': u'bind97-devel-9.7.0-6.P2.el5_6.2.i386.rpm', u'epoch': u'32', u'version': u'9.7.0', u'release': u'6.P2.el5_6.2', u'arch': u'i386'}, {u'src': None, u'name': u'bind97-devel', u'sum': [u'md5', u'e8fcb34b667a5722ed0e436bd6b6988c'], u'filename': u'bind97-devel-9.7.0-6.P2.el5_6.2.x86_64.rpm', u'epoch': u'32', u'version': u'9.7.0', u'release': u'6.P2.el5_6.2', u'arch': u'x86_64'}, {u'src': None, u'name': u'bind97-libs', u'sum': [u'md5', u'0fe7b08d0667d1e45f2211aaa1a0b835'], u'filename': u'bind97-libs-9.7.0-6.P2.el5_6.2.i386.rpm', u'epoch': u'32', u'version': u'9.7.0', u'release': u'6.P2.el5_6.2', u'arch': u'i386'}, {u'src': None, u'name': u'bind97-libs', u'sum': [u'md5', u'63e1756785fc60e5914cbcf0a03d5e3f'], u'filename': u'bind97-libs-9.7.0-6.P2.el5_6.2.x86_64.rpm', u'epoch': u'32', u'version': u'9.7.0', u'release': u'6.P2.el5_6.2', u'arch': u'x86_64'}, {u'src': None, u'name': u'bind97-utils', u'sum': [u'md5', u'db970310d1c750ab63dbb2e4e657fe66'], u'filename': u'bind97-utils-9.7.0-6.P2.el5_6.2.x86_64.rpm', u'epoch': u'32', u'version': u'9.7.0', u'release': u'6.P2.el5_6.2', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u'\n[1:1.6.0.0-1.22.1.9.8.0.1.el5_6]\n- Add oracle-enterprise.patch\n\n[1:1.6.0.0-1.22.1.9.8]\n- Resolves: rhbz#668488\n- Bumped to IcedTea6 1.9.8\n- RH706250, S6213702, CVE-2011-0872: (so) non-blocking sockets with TCP urgent\n disabled get still selected for read ops (win)\n- RH706106, S6618658, CVE-2011-0865: Vulnerability in deserialization\n- RH706111, S7012520, CVE-2011-0815: Heap overflow vulnerability in\n FileDialog.show()\n- RH706139, S7013519, CVE-2011-0822, CVE-2011-0862: Integer overflows in 2D\n code\n- RH706153, S7013969, CVE-2011-0867: NetworkInterface.toString can reveal\n bindings\n- RH706234, S7013971, CVE-2011-0869: Vulnerability in SAAJ\n- RH706239, S7016340, CVE-2011-0870: Vulnerability in SAAJ\n- RH706241, S7016495, CVE-2011-0868: Crash in Java 2D transforming an image\n with scale close to zero\n- RH706248, S7020198, CVE-2011-0871: ImageIcon creates Component with null acc\n- RH706245, S7020373, CVE-2011-0864: JSR rewriting can overflow memory address\n size variables\n\n[1:1.6.0.0-1.22.1.9.7]\n- Resolves bz690289\n- Import from RHEL-5_6-Z\n- Updated to IcedTea6 1.9.7\n- Removed all plugin/webstart related commented lines\n- Modified bz entry format in previous logs to get around cvs ack checking bug', u'issued': u'2011-06-08', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELSA-2011-0857.html', u'type': u'self', u'id': None, u'title': u'ELSA-2011-0857'}, {u'href': u'http://linux.oracle.com/cve/CVE-2011-0862.html', u'type': u'cve', u'id': u'CVE-2011-0862', u'title': u'CVE-2011-0862'}, {u'href': u'http://linux.oracle.com/cve/CVE-2011-0864.html', u'type': u'cve', u'id': u'CVE-2011-0864', u'title': u'CVE-2011-0864'}, {u'href': u'http://linux.oracle.com/cve/CVE-2011-0865.html', u'type': u'cve', u'id': u'CVE-2011-0865', u'title': u'CVE-2011-0865'}, {u'href': u'http://linux.oracle.com/cve/CVE-2011-0867.html', u'type': u'cve', u'id': u'CVE-2011-0867', u'title': u'CVE-2011-0867'}, {u'href': u'http://linux.oracle.com/cve/CVE-2011-0868.html', u'type': u'cve', u'id': u'CVE-2011-0868', u'title': u'CVE-2011-0868'}, {u'href': u'http://linux.oracle.com/cve/CVE-2011-0869.html', u'type': u'cve', u'id': u'CVE-2011-0869', u'title': u'CVE-2011-0869'}, {u'href': u'http://linux.oracle.com/cve/CVE-2011-0871.html', u'type': u'cve', u'id': u'CVE-2011-0871', u'title': u'CVE-2011-0871'}], u'_content_type_id': u'erratum', u'_id': u'76ad2084-0fda-4eb9-aec3-0654c7a477a2', u'from': u'el-errata@oss.oracle.com', u'severity': u'Important', u'title': u' java-1.6.0-openjdk security update', u'_ns': u'units_erratum', u'rights': u'Copyright 2011 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 5', u'reboot_suggested': False, u'type': u'security', u'pkglist': [{u'packages': [{u'src': None, u'name': u'java-1.6.0-openjdk', u'sum': [u'md5', u'113e29d4361caaebb6f688ab811acf12'], u'filename': u'java-1.6.0-openjdk-1.6.0.0-1.22.1.9.8.0.1.el5_6.src.rpm', u'epoch': u'1', u'version': u'1.6.0.0', u'release': u'1.22.1.9.8.0.1.el5_6', u'arch': u'src'}, {u'src': None, u'name': u'java-1.6.0-openjdk', u'sum': [u'md5', u'162880b9070159f9252025736db1cbc7'], u'filename': u'java-1.6.0-openjdk-1.6.0.0-1.22.1.9.8.0.1.el5_6.x86_64.rpm', u'epoch': u'1', u'version': u'1.6.0.0', u'release': u'1.22.1.9.8.0.1.el5_6', u'arch': u'x86_64'}, {u'src': None, u'name': u'java-1.6.0-openjdk-demo', u'sum': [u'md5', u'6b34a91df408885089c1bda718807d84'], u'filename': u'java-1.6.0-openjdk-demo-1.6.0.0-1.22.1.9.8.0.1.el5_6.x86_64.rpm', u'epoch': u'1', u'version': u'1.6.0.0', u'release': u'1.22.1.9.8.0.1.el5_6', u'arch': u'x86_64'}, {u'src': None, u'name': u'java-1.6.0-openjdk-devel', u'sum': [u'md5', u'a9d71c7511274cfd1945d696a6803568'], u'filename': u'java-1.6.0-openjdk-devel-1.6.0.0-1.22.1.9.8.0.1.el5_6.x86_64.rpm', u'epoch': u'1', u'version': u'1.6.0.0', u'release': u'1.22.1.9.8.0.1.el5_6', u'arch': u'x86_64'}, {u'src': None, u'name': u'java-1.6.0-openjdk-javadoc', u'sum': [u'md5', u'4330c8fbed71d3177c6d28211ff81436'], u'filename': u'java-1.6.0-openjdk-javadoc-1.6.0.0-1.22.1.9.8.0.1.el5_6.x86_64.rpm', u'epoch': u'1', u'version': u'1.6.0.0', u'release': u'1.22.1.9.8.0.1.el5_6', u'arch': u'x86_64'}, {u'src': None, u'name': u'java-1.6.0-openjdk-src', u'sum': [u'md5', u'0ae2ede20fe3a7144122e8de2bad59ca'], u'filename': u'java-1.6.0-openjdk-src-1.6.0.0-1.22.1.9.8.0.1.el5_6.x86_64.rpm', u'epoch': u'1', u'version': u'1.6.0.0', u'release': u'1.22.1.9.8.0.1.el5_6', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u'\n[2.3.16-6.2]\n- do not use strict aliasing\n\n[2.3.16-6.1]\n- fix CVE-2011-1926: STARTTLS plaintext command injection vulnerability', u'issued': u'2011-06-08', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELSA-2011-0859.html', u'type': u'self', u'id': None, u'title': u'ELSA-2011-0859'}, {u'href': u'http://linux.oracle.com/cve/CVE-2011-1926.html', u'type': u'cve', u'id': u'CVE-2011-1926', u'title': u'CVE-2011-1926'}], u'_content_type_id': u'erratum', u'_id': u'5024c123-9cfe-4d91-b344-0ad1005a0ae0', u'from': u'el-errata@oss.oracle.com', u'severity': u'Moderate', u'title': u' cyrus-imapd security update', u'_ns': u'units_erratum', u'rights': u'Copyright 2011 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 6', u'reboot_suggested': False, u'type': u'security', u'pkglist': [{u'packages': [{u'src': None, u'name': u'cyrus-imapd', u'sum': [u'md5', u'35aa0fbf4a2a4ab440da35bb187a4627'], u'filename': u'cyrus-imapd-2.3.16-6.el6_1.2.src.rpm', u'epoch': u'0', u'version': u'2.3.16', u'release': u'6.el6_1.2', u'arch': u'src'}, {u'src': None, u'name': u'cyrus-imapd', u'sum': [u'md5', u'bfdc5fb90f728d75849547a696529eac'], u'filename': u'cyrus-imapd-2.3.16-6.el6_1.2.x86_64.rpm', u'epoch': u'0', u'version': u'2.3.16', u'release': u'6.el6_1.2', u'arch': u'x86_64'}, {u'src': None, u'name': u'cyrus-imapd-devel', u'sum': [u'md5', u'66c1069557f0f276d436ab2de4116f48'], u'filename': u'cyrus-imapd-devel-2.3.16-6.el6_1.2.i686.rpm', u'epoch': u'0', u'version': u'2.3.16', u'release': u'6.el6_1.2', u'arch': u'i686'}, {u'src': None, u'name': u'cyrus-imapd-devel', u'sum': [u'md5', u'2eeb4153b32751cd9ce242878c2cee8d'], u'filename': u'cyrus-imapd-devel-2.3.16-6.el6_1.2.x86_64.rpm', u'epoch': u'0', u'version': u'2.3.16', u'release': u'6.el6_1.2', u'arch': u'x86_64'}, {u'src': None, u'name': u'cyrus-imapd-utils', u'sum': [u'md5', u'63cea116479542a6b95230f3b0a1a13b'], u'filename': u'cyrus-imapd-utils-2.3.16-6.el6_1.2.x86_64.rpm', u'epoch': u'0', u'version': u'2.3.16', u'release': u'6.el6_1.2', u'arch': u'x86_64'}], u'name': u'ol6_x86_64_latest', u'short': u'ol6_x86_64_latest'}, {u'packages': [{u'src': None, u'name': u'cyrus-imapd', u'sum': [u'md5', u'c826c3540fd2e90094850bd84d323569'], u'filename': u'cyrus-imapd-2.3.7-7.0.1.el5_6.4.src.rpm', u'epoch': u'0', u'version': u'2.3.7', u'release': u'7.0.1.el5_6.4', u'arch': u'src'}, {u'src': None, u'name': u'cyrus-imapd', u'sum': [u'md5', u'09959c2e0216f964b95bbda3946112d5'], u'filename': u'cyrus-imapd-2.3.7-7.0.1.el5_6.4.x86_64.rpm', u'epoch': u'0', u'version': u'2.3.7', u'release': u'7.0.1.el5_6.4', u'arch': u'x86_64'}, {u'src': None, u'name': u'cyrus-imapd-devel', u'sum': [u'md5', u'fd9eeea5465d6baf457f97198393e66f'], u'filename': u'cyrus-imapd-devel-2.3.7-7.0.1.el5_6.4.i386.rpm', u'epoch': u'0', u'version': u'2.3.7', u'release': u'7.0.1.el5_6.4', u'arch': u'i386'}, {u'src': None, u'name': u'cyrus-imapd-devel', u'sum': [u'md5', u'e08235c2723cb1ea73a3ef63d0ae8e33'], u'filename': u'cyrus-imapd-devel-2.3.7-7.0.1.el5_6.4.x86_64.rpm', u'epoch': u'0', u'version': u'2.3.7', u'release': u'7.0.1.el5_6.4', u'arch': u'x86_64'}, {u'src': None, u'name': u'cyrus-imapd-perl', u'sum': [u'md5', u'bc1f167545bc87046a6519575c88f45b'], u'filename': u'cyrus-imapd-perl-2.3.7-7.0.1.el5_6.4.x86_64.rpm', u'epoch': u'0', u'version': u'2.3.7', u'release': u'7.0.1.el5_6.4', u'arch': u'x86_64'}, {u'src': None, u'name': u'cyrus-imapd-utils', u'sum': [u'md5', u'9f21127574a4cc0caac9270881c9ae6d'], u'filename': u'cyrus-imapd-utils-2.3.7-7.0.1.el5_6.4.x86_64.rpm', u'epoch': u'0', u'version': u'2.3.7', u'release': u'7.0.1.el5_6.4', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u'\n[1.6.11-2.4]\n- add security fixes for CVE-2011-1752, CVE-2011-1783, CVE-2011-1921 (#709220)', u'issued': u'2011-06-08', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELSA-2011-0862.html', u'type': u'self', u'id': None, u'title': u'ELSA-2011-0862'}, {u'href': u'http://linux.oracle.com/cve/CVE-2011-1752.html', u'type': u'cve', u'id': u'CVE-2011-1752', u'title': u'CVE-2011-1752'}, {u'href': u'http://linux.oracle.com/cve/CVE-2011-1783.html', u'type': u'cve', u'id': u'CVE-2011-1783', u'title': u'CVE-2011-1783'}, {u'href': u'http://linux.oracle.com/cve/CVE-2011-1921.html', u'type': u'cve', u'id': u'CVE-2011-1921', u'title': u'CVE-2011-1921'}], u'_content_type_id': u'erratum', u'_id': u'75d336ff-f8b5-420f-b985-aad66864e2eb', u'from': u'el-errata@oss.oracle.com', u'severity': u'Moderate', u'title': u' subversion security update', u'_ns': u'units_erratum', u'rights': u'Copyright 2011 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 6', u'reboot_suggested': False, u'type': u'security', u'pkglist': [{u'packages': [{u'src': None, u'name': u'mod_dav_svn', u'sum': [u'md5', u'e6943a0aa6309286e3ba3ad62dfb5984'], u'filename': u'mod_dav_svn-1.6.11-2.el6_1.4.x86_64.rpm', u'epoch': u'0', u'version': u'1.6.11', u'release': u'2.el6_1.4', u'arch': u'x86_64'}, {u'src': None, u'name': u'subversion', u'sum': [u'md5', u'54db45bc4ec0020e7609ad9ce34b1000'], u'filename': u'subversion-1.6.11-2.el6_1.4.i686.rpm', u'epoch': u'0', u'version': u'1.6.11', u'release': u'2.el6_1.4', u'arch': u'i686'}, {u'src': None, u'name': u'subversion', u'sum': [u'md5', u'e74525b5bbaa9e637fe818f3f5777c02'], u'filename': u'subversion-1.6.11-2.el6_1.4.src.rpm', u'epoch': u'0', u'version': u'1.6.11', u'release': u'2.el6_1.4', u'arch': u'src'}, {u'src': None, u'name': u'subversion', u'sum': [u'md5', u'9c499295a83f94b68509d799c610d3a1'], u'filename': u'subversion-1.6.11-2.el6_1.4.x86_64.rpm', u'epoch': u'0', u'version': u'1.6.11', u'release': u'2.el6_1.4', u'arch': u'x86_64'}, {u'src': None, u'name': u'subversion-devel', u'sum': [u'md5', u'a28706ea200110129c6854124a3f9500'], u'filename': u'subversion-devel-1.6.11-2.el6_1.4.i686.rpm', u'epoch': u'0', u'version': u'1.6.11', u'release': u'2.el6_1.4', u'arch': u'i686'}, {u'src': None, u'name': u'subversion-devel', u'sum': [u'md5', u'd0f53c5d1e685dec1078ef569b4547e3'], u'filename': u'subversion-devel-1.6.11-2.el6_1.4.x86_64.rpm', u'epoch': u'0', u'version': u'1.6.11', u'release': u'2.el6_1.4', u'arch': u'x86_64'}, {u'src': None, u'name': u'subversion-gnome', u'sum': [u'md5', u'd9084ebcf3855ac002dc5d69106f65a9'], u'filename': u'subversion-gnome-1.6.11-2.el6_1.4.i686.rpm', u'epoch': u'0', u'version': u'1.6.11', u'release': u'2.el6_1.4', u'arch': u'i686'}, {u'src': None, u'name': u'subversion-gnome', u'sum': [u'md5', u'3f3e1faddfa0b4300369a566b0537dfe'], u'filename': u'subversion-gnome-1.6.11-2.el6_1.4.x86_64.rpm', u'epoch': u'0', u'version': u'1.6.11', u'release': u'2.el6_1.4', u'arch': u'x86_64'}, {u'src': None, u'name': u'subversion-javahl', u'sum': [u'md5', u'4917718b6c5aedfcb2a2e80cdcb82a28'], u'filename': u'subversion-javahl-1.6.11-2.el6_1.4.i686.rpm', u'epoch': u'0', u'version': u'1.6.11', u'release': u'2.el6_1.4', u'arch': u'i686'}, {u'src': None, u'name': u'subversion-javahl', u'sum': [u'md5', u'0b0ee26b28aa569f2cd4594833f17990'], u'filename': u'subversion-javahl-1.6.11-2.el6_1.4.x86_64.rpm', u'epoch': u'0', u'version': u'1.6.11', u'release': u'2.el6_1.4', u'arch': u'x86_64'}, {u'src': None, u'name': u'subversion-kde', u'sum': [u'md5', u'6524e3f5095ddaa7c8f1394b27f82baa'], u'filename': u'subversion-kde-1.6.11-2.el6_1.4.i686.rpm', u'epoch': u'0', u'version': u'1.6.11', u'release': u'2.el6_1.4', u'arch': u'i686'}, {u'src': None, u'name': u'subversion-kde', u'sum': [u'md5', u'ad57af12203c0d204852ce3c77e3d31a'], u'filename': u'subversion-kde-1.6.11-2.el6_1.4.x86_64.rpm', u'epoch': u'0', u'version': u'1.6.11', u'release': u'2.el6_1.4', u'arch': u'x86_64'}, {u'src': None, u'name': u'subversion-perl', u'sum': [u'md5', u'4f393fb74d48f1a4f129001a529b9cfc'], u'filename': u'subversion-perl-1.6.11-2.el6_1.4.i686.rpm', u'epoch': u'0', u'version': u'1.6.11', u'release': u'2.el6_1.4', u'arch': u'i686'}, {u'src': None, u'name': u'subversion-perl', u'sum': [u'md5', u'ebbf46a2c8601dcbf530ec272a18754b'], u'filename': u'subversion-perl-1.6.11-2.el6_1.4.x86_64.rpm', u'epoch': u'0', u'version': u'1.6.11', u'release': u'2.el6_1.4', u'arch': u'x86_64'}, {u'src': None, u'name': u'subversion-ruby', u'sum': [u'md5', u'c9339162cff415a8c40effc8f4e83407'], u'filename': u'subversion-ruby-1.6.11-2.el6_1.4.i686.rpm', u'epoch': u'0', u'version': u'1.6.11', u'release': u'2.el6_1.4', u'arch': u'i686'}, {u'src': None, u'name': u'subversion-ruby', u'sum': [u'md5', u'974427f0883de2281a6444cd372edf5b'], u'filename': u'subversion-ruby-1.6.11-2.el6_1.4.x86_64.rpm', u'epoch': u'0', u'version': u'1.6.11', u'release': u'2.el6_1.4', u'arch': u'x86_64'}, {u'src': None, u'name': u'subversion-svn2cl', u'sum': [u'md5', u'56755b5516859a487d730bfe830c4a4f'], u'filename': u'subversion-svn2cl-1.6.11-2.el6_1.4.noarch.rpm', u'epoch': u'0', u'version': u'1.6.11', u'release': u'2.el6_1.4', u'arch': u'noarch'}], u'name': u'ol6_x86_64_latest', u'short': u'ol6_x86_64_latest'}, {u'packages': [{u'src': None, u'name': u'mod_dav_svn', u'sum': [u'md5', u'f72d9a553c97988dc6829fd69633487d'], u'filename': u'mod_dav_svn-1.6.11-7.el5_6.4.x86_64.rpm', u'epoch': u'0', u'version': u'1.6.11', u'release': u'7.el5_6.4', u'arch': u'x86_64'}, {u'src': None, u'name': u'subversion', u'sum': [u'md5', u'ac871ce9152d3b146db33c912794d9bc'], u'filename': u'subversion-1.6.11-7.el5_6.4.i386.rpm', u'epoch': u'0', u'version': u'1.6.11', u'release': u'7.el5_6.4', u'arch': u'i386'}, {u'src': None, u'name': u'subversion', u'sum': [u'md5', u'14070d8a65e5aba912e1811d9627f2d1'], u'filename': u'subversion-1.6.11-7.el5_6.4.src.rpm', u'epoch': u'0', u'version': u'1.6.11', u'release': u'7.el5_6.4', u'arch': u'src'}, {u'src': None, u'name': u'subversion', u'sum': [u'md5', u'5a120ae3da84f6c3e294f409ceb5ce06'], u'filename': u'subversion-1.6.11-7.el5_6.4.x86_64.rpm', u'epoch': u'0', u'version': u'1.6.11', u'release': u'7.el5_6.4', u'arch': u'x86_64'}, {u'src': None, u'name': u'subversion-devel', u'sum': [u'md5', u'e26b3ddb0c98e0188d3e9a242363efaf'], u'filename': u'subversion-devel-1.6.11-7.el5_6.4.i386.rpm', u'epoch': u'0', u'version': u'1.6.11', u'release': u'7.el5_6.4', u'arch': u'i386'}, {u'src': None, u'name': u'subversion-devel', u'sum': [u'md5', u'42f9c36f09942cf72046b52eed41775d'], u'filename': u'subversion-devel-1.6.11-7.el5_6.4.x86_64.rpm', u'epoch': u'0', u'version': u'1.6.11', u'release': u'7.el5_6.4', u'arch': u'x86_64'}, {u'src': None, u'name': u'subversion-javahl', u'sum': [u'md5', u'8504b2bca1fbee086ca3a51d71ceb617'], u'filename': u'subversion-javahl-1.6.11-7.el5_6.4.x86_64.rpm', u'epoch': u'0', u'version': u'1.6.11', u'release': u'7.el5_6.4', u'arch': u'x86_64'}, {u'src': None, u'name': u'subversion-perl', u'sum': [u'md5', u'067a7f07949546bc2d583345c74da9f8'], u'filename': u'subversion-perl-1.6.11-7.el5_6.4.x86_64.rpm', u'epoch': u'0', u'version': u'1.6.11', u'release': u'7.el5_6.4', u'arch': u'x86_64'}, {u'src': None, u'name': u'subversion-ruby', u'sum': [u'md5', u'23192a1c0d8db94a2d7aefef041aa422'], u'filename': u'subversion-ruby-1.6.11-7.el5_6.4.x86_64.rpm', u'epoch': u'0', u'version': u'1.6.11', u'release': u'7.el5_6.4', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u'\n\nfirefox:\n\n[3.6.18-1.0.1.el6_1]\n- Added firefox-oracle-default-prefs.js and removed firefox-redhat-default-prefs.js\n\n[3.6.18-1]\n- Update to 3.6.18\n\nxulrunner:\n\n[1.9.2.18-2.0.1.el6_1]\n- Replace xulrunner-redhat-default-prefs.js with\n xulrunner-oracle-default-prefs.js\n\n[1.9.2.18-2]\n- Update to 1.9.2.18', u'issued': u'2011-06-21', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELSA-2011-0885.html', u'type': u'self', u'id': None, u'title': u'ELSA-2011-0885'}, {u'href': u'http://linux.oracle.com/cve/CVE-2011-0083.html', u'type': u'cve', u'id': u'CVE-2011-0083', u'title': u'CVE-2011-0083'}, {u'href': u'http://linux.oracle.com/cve/CVE-2011-0085.html', u'type': u'cve', u'id': u'CVE-2011-0085', u'title': u'CVE-2011-0085'}, {u'href': u'http://linux.oracle.com/cve/CVE-2011-2362.html', u'type': u'cve', u'id': u'CVE-2011-2362', u'title': u'CVE-2011-2362'}, {u'href': u'http://linux.oracle.com/cve/CVE-2011-2363.html', u'type': u'cve', u'id': u'CVE-2011-2363', u'title': u'CVE-2011-2363'}, {u'href': u'http://linux.oracle.com/cve/CVE-2011-2364.html', u'type': u'cve', u'id': u'CVE-2011-2364', u'title': u'CVE-2011-2364'}, {u'href': u'http://linux.oracle.com/cve/CVE-2011-2365.html', u'type': u'cve', u'id': u'CVE-2011-2365', u'title': u'CVE-2011-2365'}, {u'href': u'http://linux.oracle.com/cve/CVE-2011-2371.html', u'type': u'cve', u'id': u'CVE-2011-2371', u'title': u'CVE-2011-2371'}, {u'href': u'http://linux.oracle.com/cve/CVE-2011-2373.html', u'type': u'cve', u'id': u'CVE-2011-2373', u'title': u'CVE-2011-2373'}, {u'href': u'http://linux.oracle.com/cve/CVE-2011-2374.html', u'type': u'cve', u'id': u'CVE-2011-2374', u'title': u'CVE-2011-2374'}, {u'href': u'http://linux.oracle.com/cve/CVE-2011-2375.html', u'type': u'cve', u'id': u'CVE-2011-2375', u'title': u'CVE-2011-2375'}, {u'href': u'http://linux.oracle.com/cve/CVE-2011-2376.html', u'type': u'cve', u'id': u'CVE-2011-2376', u'title': u'CVE-2011-2376'}, {u'href': u'http://linux.oracle.com/cve/CVE-2011-2377.html', u'type': u'cve', u'id': u'CVE-2011-2377', u'title': u'CVE-2011-2377'}, {u'href': u'http://linux.oracle.com/cve/CVE-2011-2605.html', u'type': u'cve', u'id': u'CVE-2011-2605', u'title': u'CVE-2011-2605'}], u'_content_type_id': u'erratum', u'_id': u'28965298-eea8-41a5-984b-6b53dbea7f84', u'from': u'el-errata@oss.oracle.com', u'severity': u'Critical', u'title': u' firefox security and bug fix update', u'_ns': u'units_erratum', u'rights': u'Copyright 2011 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 6', u'reboot_suggested': False, u'type': u'security', u'pkglist': [{u'packages': [{u'src': None, u'name': u'firefox', u'sum': [u'md5', u'69d2ca5097551e890fadb6bf7d2e7daa'], u'filename': u'firefox-3.6.18-1.0.1.el6_1.i686.rpm', u'epoch': u'0', u'version': u'3.6.18', u'release': u'1.0.1.el6_1', u'arch': u'i686'}, {u'src': None, u'name': u'firefox', u'sum': [u'md5', u'8fb3ae8b1cb5eee953c5975624ff62ae'], u'filename': u'firefox-3.6.18-1.0.1.el6_1.src.rpm', u'epoch': u'0', u'version': u'3.6.18', u'release': u'1.0.1.el6_1', u'arch': u'src'}, {u'src': None, u'name': u'firefox', u'sum': [u'md5', u'b5b0b86269b1a753c0e778f0bc99d3f5'], u'filename': u'firefox-3.6.18-1.0.1.el6_1.x86_64.rpm', u'epoch': u'0', u'version': u'3.6.18', u'release': u'1.0.1.el6_1', u'arch': u'x86_64'}, {u'src': None, u'name': u'xulrunner', u'sum': [u'md5', u'cd321ed25e34aefd56070c1c5e164074'], u'filename': u'xulrunner-1.9.2.18-2.0.1.el6_1.i686.rpm', u'epoch': u'0', u'version': u'1.9.2.18', u'release': u'2.0.1.el6_1', u'arch': u'i686'}, {u'src': None, u'name': u'xulrunner', u'sum': [u'md5', u'868c1977b5246f216a81a8d66070fe0c'], u'filename': u'xulrunner-1.9.2.18-2.0.1.el6_1.src.rpm', u'epoch': u'0', u'version': u'1.9.2.18', u'release': u'2.0.1.el6_1', u'arch': u'src'}, {u'src': None, u'name': u'xulrunner', u'sum': [u'md5', u'9a4778b57bff155917d32303e7a69fe5'], u'filename': u'xulrunner-1.9.2.18-2.0.1.el6_1.x86_64.rpm', u'epoch': u'0', u'version': u'1.9.2.18', u'release': u'2.0.1.el6_1', u'arch': u'x86_64'}, {u'src': None, u'name': u'xulrunner-devel', u'sum': [u'md5', u'd3fe917aa98d9b895c710dd8449a79f3'], u'filename': u'xulrunner-devel-1.9.2.18-2.0.1.el6_1.i686.rpm', u'epoch': u'0', u'version': u'1.9.2.18', u'release': u'2.0.1.el6_1', u'arch': u'i686'}, {u'src': None, u'name': u'xulrunner-devel', u'sum': [u'md5', u'c955119974ded7de15d52f6538262953'], u'filename': u'xulrunner-devel-1.9.2.18-2.0.1.el6_1.x86_64.rpm', u'epoch': u'0', u'version': u'1.9.2.18', u'release': u'2.0.1.el6_1', u'arch': u'x86_64'}], u'name': u'ol6_x86_64_latest', u'short': u'ol6_x86_64_latest'}, {u'packages': [{u'src': None, u'name': u'firefox', u'sum': [u'md5', u'93cc3ab0ed2a01f172c5a3a0af2e67e8'], u'filename': u'firefox-3.6.18-1.0.1.el5_6.i386.rpm', u'epoch': u'0', u'version': u'3.6.18', u'release': u'1.0.1.el5_6', u'arch': u'i386'}, {u'src': None, u'name': u'firefox', u'sum': [u'md5', u'8e8ac04354031d56bfd40323ddeb56fd'], u'filename': u'firefox-3.6.18-1.0.1.el5_6.src.rpm', u'epoch': u'0', u'version': u'3.6.18', u'release': u'1.0.1.el5_6', u'arch': u'src'}, {u'src': None, u'name': u'firefox', u'sum': [u'md5', u'26f9d7bf768fb0290387601f7ff6a19e'], u'filename': u'firefox-3.6.18-1.0.1.el5_6.x86_64.rpm', u'epoch': u'0', u'version': u'3.6.18', u'release': u'1.0.1.el5_6', u'arch': u'x86_64'}, {u'src': None, u'name': u'xulrunner', u'sum': [u'md5', u'dfaf3eee5c3b76654cc8030ad6a1fdb9'], u'filename': u'xulrunner-1.9.2.18-2.0.1.el5_6.i386.rpm', u'epoch': u'0', u'version': u'1.9.2.18', u'release': u'2.0.1.el5_6', u'arch': u'i386'}, {u'src': None, u'name': u'xulrunner', u'sum': [u'md5', u'56641945907db84fc232af3149ce6d43'], u'filename': u'xulrunner-1.9.2.18-2.0.1.el5_6.src.rpm', u'epoch': u'0', u'version': u'1.9.2.18', u'release': u'2.0.1.el5_6', u'arch': u'src'}, {u'src': None, u'name': u'xulrunner', u'sum': [u'md5', u'5f0c8d5b8195fa6c2d83ea07d1f90cf4'], u'filename': u'xulrunner-1.9.2.18-2.0.1.el5_6.x86_64.rpm', u'epoch': u'0', u'version': u'1.9.2.18', u'release': u'2.0.1.el5_6', u'arch': u'x86_64'}, {u'src': None, u'name': u'xulrunner-devel', u'sum': [u'md5', u'31af0462adfb98440559586f69853de6'], u'filename': u'xulrunner-devel-1.9.2.18-2.0.1.el5_6.i386.rpm', u'epoch': u'0', u'version': u'1.9.2.18', u'release': u'2.0.1.el5_6', u'arch': u'i386'}, {u'src': None, u'name': u'xulrunner-devel', u'sum': [u'md5', u'8be0f2206247bfebd11bdbc197430ea3'], u'filename': u'xulrunner-devel-1.9.2.18-2.0.1.el5_6.x86_64.rpm', u'epoch': u'0', u'version': u'1.9.2.18', u'release': u'2.0.1.el5_6', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u"\n[1.8.5-19.el5_6.1]\n- Address CVE-2011-1004 'Symlink race condition by removing directory trees in\n fileutils module'\n * ruby-1.8.7-CVE-2011-1004.patch\n- Address CVE-2011-1005 'Untrusted codes able to modify arbitrary strings'\n * ruby-1.8.7-CVE-2011-1005.patch\n- Address CVE-2011-0188 'memory corruption in BigDecimal on 64bit platforms'\n * ruby-1.8.7-CVE-2011-0188.patch\n- Address CVE-CVE-2010-0541 'Ruby WEBrick javascript injection flaw'\n * ruby-1.8.7-CVE-2010-0541.patch\n- Address CVE-CVE-2009-4492 'ruby WEBrick log escape sequence'\n * ruby-1.8.6-CVE-2009-4492.patch\n- Resolves: rhbz#709957", u'issued': u'2011-06-28', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELSA-2011-0909.html', u'type': u'self', u'id': None, u'title': u'ELSA-2011-0909'}, {u'href': u'http://linux.oracle.com/cve/CVE-2009-4492.html', u'type': u'cve', u'id': u'CVE-2009-4492', u'title': u'CVE-2009-4492'}, {u'href': u'http://linux.oracle.com/cve/CVE-2010-0541.html', u'type': u'cve', u'id': u'CVE-2010-0541', u'title': u'CVE-2010-0541'}, {u'href': u'http://linux.oracle.com/cve/CVE-2011-0188.html', u'type': u'cve', u'id': u'CVE-2011-0188', u'title': u'CVE-2011-0188'}, {u'href': u'http://linux.oracle.com/cve/CVE-2011-1004.html', u'type': u'cve', u'id': u'CVE-2011-1004', u'title': u'CVE-2011-1004'}, {u'href': u'http://linux.oracle.com/cve/CVE-2011-1005.html', u'type': u'cve', u'id': u'CVE-2011-1005', u'title': u'CVE-2011-1005'}], u'_content_type_id': u'erratum', u'_id': u'dd7b3559-7d6e-413a-8f85-174cd5c6cf1b', u'from': u'el-errata@oss.oracle.com', u'severity': u'Moderate', u'title': u' ruby security update', u'_ns': u'units_erratum', u'rights': u'Copyright 2011 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 5', u'reboot_suggested': False, u'type': u'security', u'pkglist': [{u'packages': [{u'src': None, u'name': u'ruby', u'sum': [u'md5', u'4ef38873766c2be52781fa71943fc528'], u'filename': u'ruby-1.8.5-19.el5_6.1.src.rpm', u'epoch': u'0', u'version': u'1.8.5', u'release': u'19.el5_6.1', u'arch': u'src'}, {u'src': None, u'name': u'ruby', u'sum': [u'md5', u'0f0f22c93025d11ac62d0070d3dd5128'], u'filename': u'ruby-1.8.5-19.el5_6.1.x86_64.rpm', u'epoch': u'0', u'version': u'1.8.5', u'release': u'19.el5_6.1', u'arch': u'x86_64'}, {u'src': None, u'name': u'ruby-devel', u'sum': [u'md5', u'ae483ee557c56c4c2665534fc9924189'], u'filename': u'ruby-devel-1.8.5-19.el5_6.1.i386.rpm', u'epoch': u'0', u'version': u'1.8.5', u'release': u'19.el5_6.1', u'arch': u'i386'}, {u'src': None, u'name': u'ruby-devel', u'sum': [u'md5', u'97697e4a0866bf99af4e7c2beb4bb49c'], u'filename': u'ruby-devel-1.8.5-19.el5_6.1.x86_64.rpm', u'epoch': u'0', u'version': u'1.8.5', u'release': u'19.el5_6.1', u'arch': u'x86_64'}, {u'src': None, u'name': u'ruby-docs', u'sum': [u'md5', u'69573200db1f94f5fb2180abd82bd47c'], u'filename': u'ruby-docs-1.8.5-19.el5_6.1.x86_64.rpm', u'epoch': u'0', u'version': u'1.8.5', u'release': u'19.el5_6.1', u'arch': u'x86_64'}, {u'src': None, u'name': u'ruby-irb', u'sum': [u'md5', u'e5b898d6d17153403ab2bff39c451e23'], u'filename': u'ruby-irb-1.8.5-19.el5_6.1.x86_64.rpm', u'epoch': u'0', u'version': u'1.8.5', u'release': u'19.el5_6.1', u'arch': u'x86_64'}, {u'src': None, u'name': u'ruby-libs', u'sum': [u'md5', u'1d5d9b15f5dd94fadff2fbcc01362331'], u'filename': u'ruby-libs-1.8.5-19.el5_6.1.i386.rpm', u'epoch': u'0', u'version': u'1.8.5', u'release': u'19.el5_6.1', u'arch': u'i386'}, {u'src': None, u'name': u'ruby-libs', u'sum': [u'md5', u'4ecb7ff81e09d598efe06bab16de8da9'], u'filename': u'ruby-libs-1.8.5-19.el5_6.1.x86_64.rpm', u'epoch': u'0', u'version': u'1.8.5', u'release': u'19.el5_6.1', u'arch': u'x86_64'}, {u'src': None, u'name': u'ruby-mode', u'sum': [u'md5', u'f223afaeb2d2bd7490146b96038ddf3e'], u'filename': u'ruby-mode-1.8.5-19.el5_6.1.x86_64.rpm', u'epoch': u'0', u'version': u'1.8.5', u'release': u'19.el5_6.1', u'arch': u'x86_64'}, {u'src': None, u'name': u'ruby-rdoc', u'sum': [u'md5', u'd12765a73a532dee71e673b5b1d85ca3'], u'filename': u'ruby-rdoc-1.8.5-19.el5_6.1.x86_64.rpm', u'epoch': u'0', u'version': u'1.8.5', u'release': u'19.el5_6.1', u'arch': u'x86_64'}, {u'src': None, u'name': u'ruby-ri', u'sum': [u'md5', u'4df0250ef4596a328d77bd2537829868'], u'filename': u'ruby-ri-1.8.5-19.el5_6.1.x86_64.rpm', u'epoch': u'0', u'version': u'1.8.5', u'release': u'19.el5_6.1', u'arch': u'x86_64'}, {u'src': None, u'name': u'ruby-tcltk', u'sum': [u'md5', u'2cf7c6a910d0b18cb09749bc52a5d046'], u'filename': u'ruby-tcltk-1.8.5-19.el5_6.1.x86_64.rpm', u'epoch': u'0', u'version': u'1.8.5', u'release': u'19.el5_6.1', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u'\n[7.19.7-26.el6_1.1]\n- do not delegate GSSAPI credentials (CVE-2011-2192)', u'issued': u'2011-07-05', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELSA-2011-0918.html', u'type': u'self', u'id': None, u'title': u'ELSA-2011-0918'}, {u'href': u'http://linux.oracle.com/cve/CVE-2011-2192.html', u'type': u'cve', u'id': u'CVE-2011-2192', u'title': u'CVE-2011-2192'}], u'_content_type_id': u'erratum', u'_id': u'4e536cb6-30d5-406c-a976-5fb73bacd821', u'from': u'el-errata@oss.oracle.com', u'severity': u'Moderate', u'title': u' curl security update', u'_ns': u'units_erratum', u'rights': u'Copyright 2011 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 6', u'reboot_suggested': False, u'type': u'security', u'pkglist': [{u'packages': [{u'src': None, u'name': u'curl', u'sum': [u'md5', u'85d3873476a205f2aed21e920fda3b65'], u'filename': u'curl-7.19.7-26.el6_1.1.src.rpm', u'epoch': u'0', u'version': u'7.19.7', u'release': u'26.el6_1.1', u'arch': u'src'}, {u'src': None, u'name': u'curl', u'sum': [u'md5', u'c96c0c6b09129bfd99fb4dfb0cc049ed'], u'filename': u'curl-7.19.7-26.el6_1.1.x86_64.rpm', u'epoch': u'0', u'version': u'7.19.7', u'release': u'26.el6_1.1', u'arch': u'x86_64'}, {u'src': None, u'name': u'libcurl', u'sum': [u'md5', u'02deedb036601623f048184bce2f0ddf'], u'filename': u'libcurl-7.19.7-26.el6_1.1.i686.rpm', u'epoch': u'0', u'version': u'7.19.7', u'release': u'26.el6_1.1', u'arch': u'i686'}, {u'src': None, u'name': u'libcurl', u'sum': [u'md5', u'757122422f592201cf4fa1bb57d0c8ef'], u'filename': u'libcurl-7.19.7-26.el6_1.1.x86_64.rpm', u'epoch': u'0', u'version': u'7.19.7', u'release': u'26.el6_1.1', u'arch': u'x86_64'}, {u'src': None, u'name': u'libcurl-devel', u'sum': [u'md5', u'61ea0e66c369dac0f8fe7cf614d7f8be'], u'filename': u'libcurl-devel-7.19.7-26.el6_1.1.i686.rpm', u'epoch': u'0', u'version': u'7.19.7', u'release': u'26.el6_1.1', u'arch': u'i686'}, {u'src': None, u'name': u'libcurl-devel', u'sum': [u'md5', u'05d4535feb3ce0267067638671b1ac2f'], u'filename': u'libcurl-devel-7.19.7-26.el6_1.1.x86_64.rpm', u'epoch': u'0', u'version': u'7.19.7', u'release': u'26.el6_1.1', u'arch': u'x86_64'}], u'name': u'ol6_x86_64_latest', u'short': u'ol6_x86_64_latest'}, {u'packages': [{u'src': None, u'name': u'curl', u'sum': [u'md5', u'5994ce170172873fc11d223624f09b63'], u'filename': u'curl-7.15.5-9.el5_6.3.i386.rpm', u'epoch': u'0', u'version': u'7.15.5', u'release': u'9.el5_6.3', u'arch': u'i386'}, {u'src': None, u'name': u'curl', u'sum': [u'md5', u'06c4fa12fb6ae421a9aa87dd10f3cd6d'], u'filename': u'curl-7.15.5-9.el5_6.3.src.rpm', u'epoch': u'0', u'version': u'7.15.5', u'release': u'9.el5_6.3', u'arch': u'src'}, {u'src': None, u'name': u'curl', u'sum': [u'md5', u'8e22a0a0900882077b76c111f1b7e924'], u'filename': u'curl-7.15.5-9.el5_6.3.x86_64.rpm', u'epoch': u'0', u'version': u'7.15.5', u'release': u'9.el5_6.3', u'arch': u'x86_64'}, {u'src': None, u'name': u'curl-devel', u'sum': [u'md5', u'45dfa44c39957f1eaca5620c4cb52a22'], u'filename': u'curl-devel-7.15.5-9.el5_6.3.i386.rpm', u'epoch': u'0', u'version': u'7.15.5', u'release': u'9.el5_6.3', u'arch': u'i386'}, {u'src': None, u'name': u'curl-devel', u'sum': [u'md5', u'f928ac87bf0ffd27d7d7eb53ba8786b4'], u'filename': u'curl-devel-7.15.5-9.el5_6.3.x86_64.rpm', u'epoch': u'0', u'version': u'7.15.5', u'release': u'9.el5_6.3', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u'[32:9.7.3-2.2.P3]\n- update to 9.7.3-P3 (CVE-2011-2464)', u'issued': u'2011-07-07', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELSA-2011-0926.html', u'type': u'self', u'id': None, u'title': u'ELSA-2011-0926'}, {u'href': u'http://linux.oracle.com/cve/CVE-2011-2464.html', u'type': u'cve', u'id': u'CVE-2011-2464', u'title': u'CVE-2011-2464'}], u'_content_type_id': u'erratum', u'_id': u'c4fbb8cb-937c-482d-be85-ace6c9b76af6', u'from': u'el-errata@oss.oracle.com', u'severity': u'Important', u'title': u' bind security update', u'_ns': u'units_erratum', u'rights': u'Copyright 2011 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 6', u'reboot_suggested': False, u'type': u'security', u'pkglist': [{u'packages': [{u'src': None, u'name': u'bind', u'sum': [u'md5', u'6abc76f8925a26da6fa8e3b9cfa9e35d'], u'filename': u'bind-9.7.3-2.el6_1.P3.2.src.rpm', u'epoch': u'32', u'version': u'9.7.3', u'release': u'2.el6_1.P3.2', u'arch': u'src'}, {u'src': None, u'name': u'bind', u'sum': [u'md5', u'28bb9194e0df329b5edf2e5baae0df40'], u'filename': u'bind-9.7.3-2.el6_1.P3.2.x86_64.rpm', u'epoch': u'32', u'version': u'9.7.3', u'release': u'2.el6_1.P3.2', u'arch': u'x86_64'}, {u'src': None, u'name': u'bind-chroot', u'sum': [u'md5', u'748128bc5517000f8003c9cc321fc33e'], u'filename': u'bind-chroot-9.7.3-2.el6_1.P3.2.x86_64.rpm', u'epoch': u'32', u'version': u'9.7.3', u'release': u'2.el6_1.P3.2', u'arch': u'x86_64'}, {u'src': None, u'name': u'bind-devel', u'sum': [u'md5', u'dabf2fe83bcd0c7fde9a1ee5c30b21e6'], u'filename': u'bind-devel-9.7.3-2.el6_1.P3.2.i686.rpm', u'epoch': u'32', u'version': u'9.7.3', u'release': u'2.el6_1.P3.2', u'arch': u'i686'}, {u'src': None, u'name': u'bind-devel', u'sum': [u'md5', u'94a13ec5cd8fe68a2ef38c2a59096c63'], u'filename': u'bind-devel-9.7.3-2.el6_1.P3.2.x86_64.rpm', u'epoch': u'32', u'version': u'9.7.3', u'release': u'2.el6_1.P3.2', u'arch': u'x86_64'}, {u'src': None, u'name': u'bind-libs', u'sum': [u'md5', u'bdd47f6d5ce15daf5d4478e7cf153d5f'], u'filename': u'bind-libs-9.7.3-2.el6_1.P3.2.i686.rpm', u'epoch': u'32', u'version': u'9.7.3', u'release': u'2.el6_1.P3.2', u'arch': u'i686'}, {u'src': None, u'name': u'bind-libs', u'sum': [u'md5', u'9777d190d59436dd91805feed2bceefc'], u'filename': u'bind-libs-9.7.3-2.el6_1.P3.2.x86_64.rpm', u'epoch': u'32', u'version': u'9.7.3', u'release': u'2.el6_1.P3.2', u'arch': u'x86_64'}, {u'src': None, u'name': u'bind-sdb', u'sum': [u'md5', u'8ebba8c236188a5daa1bc37c76e57c7e'], u'filename': u'bind-sdb-9.7.3-2.el6_1.P3.2.x86_64.rpm', u'epoch': u'32', u'version': u'9.7.3', u'release': u'2.el6_1.P3.2', u'arch': u'x86_64'}, {u'src': None, u'name': u'bind-utils', u'sum': [u'md5', u'3cfc1d022e65b0b49d22eafe41f433f1'], u'filename': u'bind-utils-9.7.3-2.el6_1.P3.2.x86_64.rpm', u'epoch': u'32', u'version': u'9.7.3', u'release': u'2.el6_1.P3.2', u'arch': u'x86_64'}], u'name': u'ol6_x86_64_latest', u'short': u'ol6_x86_64_latest'}, {u'packages': [{u'src': None, u'name': u'bind97', u'sum': [u'md5', u'5f48a8acb13811f8737eb2683ecc9d9b'], u'filename': u'bind97-9.7.0-6.P2.el5_6.3.src.rpm', u'epoch': u'32', u'version': u'9.7.0', u'release': u'6.P2.el5_6.3', u'arch': u'src'}, {u'src': None, u'name': u'bind97', u'sum': [u'md5', u'faed9339146f034c5d678f0a83872d25'], u'filename': u'bind97-9.7.0-6.P2.el5_6.3.x86_64.rpm', u'epoch': u'32', u'version': u'9.7.0', u'release': u'6.P2.el5_6.3', u'arch': u'x86_64'}, {u'src': None, u'name': u'bind97-chroot', u'sum': [u'md5', u'3446a52d8dad50f4890d954ce0738fe0'], u'filename': u'bind97-chroot-9.7.0-6.P2.el5_6.3.x86_64.rpm', u'epoch': u'32', u'version': u'9.7.0', u'release': u'6.P2.el5_6.3', u'arch': u'x86_64'}, {u'src': None, u'name': u'bind97-devel', u'sum': [u'md5', u'091eaa3ba79f7275d4597966ac07f70b'], u'filename': u'bind97-devel-9.7.0-6.P2.el5_6.3.i386.rpm', u'epoch': u'32', u'version': u'9.7.0', u'release': u'6.P2.el5_6.3', u'arch': u'i386'}, {u'src': None, u'name': u'bind97-devel', u'sum': [u'md5', u'9d0120aafb0fb7ab3daf402d22182aa8'], u'filename': u'bind97-devel-9.7.0-6.P2.el5_6.3.x86_64.rpm', u'epoch': u'32', u'version': u'9.7.0', u'release': u'6.P2.el5_6.3', u'arch': u'x86_64'}, {u'src': None, u'name': u'bind97-libs', u'sum': [u'md5', u'eff39510ddadd2d22b43ecbb82012148'], u'filename': u'bind97-libs-9.7.0-6.P2.el5_6.3.i386.rpm', u'epoch': u'32', u'version': u'9.7.0', u'release': u'6.P2.el5_6.3', u'arch': u'i386'}, {u'src': None, u'name': u'bind97-libs', u'sum': [u'md5', u'8ddf04b4a94927cd7185f0e2b8eb180e'], u'filename': u'bind97-libs-9.7.0-6.P2.el5_6.3.x86_64.rpm', u'epoch': u'32', u'version': u'9.7.0', u'release': u'6.P2.el5_6.3', u'arch': u'x86_64'}, {u'src': None, u'name': u'bind97-utils', u'sum': [u'md5', u'440d2d89cc709ce3a907a65244a0f3c5'], u'filename': u'bind97-utils-9.7.0-6.P2.el5_6.3.x86_64.rpm', u'epoch': u'32', u'version': u'9.7.0', u'release': u'6.P2.el5_6.3', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u"\n[2.6.18-238.19.1.0.1.el5]\n- [scsi] remove printk's when doing I/O to a dead device (John Sobecki, Chris Mason)\n [orabug 12342275]\n- [char] ipmi: Fix IPMI errors due to timing problems (Joe Jin) [orabug 12561346]\n- [scsi] Fix race when removing SCSI devices (Joe Jin) [orabug 12404566]\n- bonding: reread information about speed and duplex when interface goes up (John Haxby) [orabug 11890822]\n- [scsi] fix scsi hotplug and rescan race [orabug 10260172]\n- fix filp_close() race (Joe Jin) [orabug 10335998]\n- fix missing aio_complete() in end_io (Joel Becker) [orabug 10365195]\n- make xenkbd.abs_pointer=1 by default [orabug 67188919]\n- [xen] check to see if hypervisor supports memory reservation change\n (Chuck Anderson) [orabug 7556514]\n- [net] Enable entropy for bnx2,bnx2x,e1000e,igb,ixgb,ixgbe,ixgbevf (John Sobecki)\n [orabug 10315433]\n- [NET] Add xen pv netconsole support (Tina Yang) [orabug 6993043] [bz 7258]\n- [mm] shrink_zone patch (John Sobecki,Chris Mason) [orabug 6086839]\n- fix aacraid not to reset during kexec (Joe Jin) [orabug 8516042]\n- [rds] Patch rds to 1.4.2-20 (Andy Grover) [orabug 9471572, 9344105]\n RDS: Fix BUG_ONs to not fire when in a tasklet\n ipoib: Fix lockup of the tx queue\n RDS: Do not call set_page_dirty() with irqs off (Sherman Pun)\n RDS: Properly unmap when getting a remote access error (Tina Yang)\n RDS: Fix locking in rds_send_drop_to()\n- [qla] fix qla not to query hccr (Guru Anbalagane) [Orabug 8746702]\n- [nfs] too many getattr and access calls after direct I/O [orabug 9348191]\n- [xen] PVHVM guest with PoD crashes under memory pressure (Chuck Anderson)\n [orabug 9107465]\n- [xen] PV guest with FC HBA hangs during shutdown (Chuck Anderson)\n [orabug 9764220]\n- Support 256GB+ memory for pv guest (Mukesh Rathor) [orabug 9450615]\n- fix overcommit memory to use percpu_counter for el5 (KOSAKI Motohiro,\n Guru Anbalagane) [orabug 6124033]\n- [ipmi] make configurable timeouts for kcs of ipmi [orabug 9752208]\n- [ib] fix memory corruption (Andy Grover) [orabug 9972346]\n- [aio] patch removes limit on number of retries (Srinivas Eeda) [orabug 10044782]\n- [loop] Do not call loop_unplug for not configured loop device (orabug 10314497)\n\n[2.6.18-238.19.1.el5]\n- Revert: [xen] hvm: svm support cleanups (Andrew Jones) [703715 702657] {CVE-2011-1780}\n- Revert: [xen] hvm: secure svm_cr_access (Andrew Jones) [703715 702657] {CVE-2011-1780}\n- Revert: [xen] let __get_instruction_length always read into own buffer (Paolo Bonzini) [719066 717742]\n- Revert: [xen] remove unused argument to __get_instruction_length (Phillip Lougher) [719066 717742]\n- Revert: [xen] prep __get_instruction_length_from_list for partial buffers (Paolo Bonzini) [719066 717742]\n- Revert: [xen] disregard trailing bytes in an invalid page (Paolo Bonzini) [719066 717742]\n\n[2.6.18-238.18.1.el5]\n- [xen] disregard trailing bytes in an invalid page (Paolo Bonzini) [719066 717742]\n- [xen] prep __get_instruction_length_from_list for partial buffers (Paolo Bonzini) [719066 717742]\n- [xen] remove unused argument to __get_instruction_length (Phillip Lougher) [719066 717742]\n- [xen] let __get_instruction_length always read into own buffer (Paolo Bonzini) [719066 717742]\n\n[2.6.18-238.17.1.el5]\n- [net] bluetooth: l2cap and rfcomm: fix info leak to userspace (Thomas Graf) [703020 703021] {CVE-2011-2492}\n- [net] inet_diag: fix inet_diag_bc_audit data validation (Thomas Graf) [714538 714539] {CVE-2011-2213}\n- [misc] signal: fix kill signal spoofing issue (Oleg Nesterov) [690030 690031] {CVE-2011-1182}\n- [fs] proc: fix signedness issue in next_pidmap (Oleg Nesterov) [697826 697827] {CVE-2011-1593}\n- [char] agp: fix OOM and buffer overflow (Jerome Marchand) [699009 699010] {CVE-2011-1746}\n- [char] agp: fix arbitrary kernel memory writes (Jerome Marchand) [699005 699006] {CVE-2011-2022 CVE-2011-1745}\n- [infiniband] core: Handle large number of entries in poll CQ (Jay Fenlason) [668370 668371] {CVE-2011-1044 CVE-2010-4649}\n- [infiniband] core: fix panic in ib_cm:cm_work_handler (Jay Fenlason) [679995 679996] {CVE-2011-0695}\n- [fs] validate size of EFI GUID partition entries (Anton Arapov) [703027 703028] {CVE-2011-1776}\n\n[2.6.18-238.16.1.el5]\n- [xen] hvm: secure vmx cpuid (Andrew Jones) [706324 706323] {CVE-2011-1936}\n- [xen] hvm: secure svm_cr_access (Andrew Jones) [703715 702657] {CVE-2011-1780}\n- [xen] hvm: svm support cleanups (Andrew Jones) [703715 702657] {CVE-2011-1780}\n\n[2.6.18-238.15.1.el5]\n- [block] cciss: reading a write only register causes a hang (Phillip Lougher) [713948 696153]\n- [fs] gfs2: fix resource group bitmap corruption (Robert S Peterson) [711519 690555]\n- [net] sctp: fix calc of INIT/INIT-ACK chunk length to set (Thomas Graf) [695384 695385] {CVE-2011-1573}\n- [fs] xfs: prevent leaking uninit stack memory in FSGEOMETRY_V1 p2 (Phillip Lougher) [677265 677266] {CVE-2011-0711}\n- [fs] xfs: prevent leaking uninit stack memory in FSGEOMETRY_V1 (Phillip Lougher) [677265 677266] {CVE-2011-0711}\n- [net] core: Fix memory leak/corruption on VLAN GRO_DROP (Herbert Xu) [695174 691565] {CVE-2011-1576}\n- [pci] SRIOV: release VF BAR resources when device is hot unplug (Don Dutile) [707899 698879]\n- [scsi] iscsi_tcp: fix iscsi's sk_user_data access (Mike Christie) [703056 677703]\n- [message] mptfusion: add ioc_reset_in_progress reset in SoftReset (Tomas Henzl) [712034 662160]\n\n[2.6.18-238.14.1.el5]\n- [input] evdev: implement proper locking (Marc Milgram) [710426 680561]\n- [input] evdev: rename list to client in handlers (Marc Milgram) [710426 680561]\n\n[2.6.18-238.13.1.el5]\n- [fs] gfs2: fix processes waiting on already-available inode glock (Phillip Lougher) [709767 694669]", u'issued': u'2011-07-18', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELSA-2011-0927.html', u'type': u'self', u'id': None, u'title': u'ELSA-2011-0927'}, {u'href': u'http://linux.oracle.com/cve/CVE-2010-4649.html', u'type': u'cve', u'id': u'CVE-2010-4649', u'title': u'CVE-2010-4649'}, {u'href': u'http://linux.oracle.com/cve/CVE-2011-0695.html', u'type': u'cve', u'id': u'CVE-2011-0695', u'title': u'CVE-2011-0695'}, {u'href': u'http://linux.oracle.com/cve/CVE-2011-0711.html', u'type': u'cve', u'id': u'CVE-2011-0711', u'title': u'CVE-2011-0711'}, {u'href': u'http://linux.oracle.com/cve/CVE-2011-1044.html', u'type': u'cve', u'id': u'CVE-2011-1044', u'title': u'CVE-2011-1044'}, {u'href': u'http://linux.oracle.com/cve/CVE-2011-1182.html', u'type': u'cve', u'id': u'CVE-2011-1182', u'title': u'CVE-2011-1182'}, {u'href': u'http://linux.oracle.com/cve/CVE-2011-1573.html', u'type': u'cve', u'id': u'CVE-2011-1573', u'title': u'CVE-2011-1573'}, {u'href': u'http://linux.oracle.com/cve/CVE-2011-1576.html', u'type': u'cve', u'id': u'CVE-2011-1576', u'title': u'CVE-2011-1576'}, {u'href': u'http://linux.oracle.com/cve/CVE-2011-1593.html', u'type': u'cve', u'id': u'CVE-2011-1593', u'title': u'CVE-2011-1593'}, {u'href': u'http://linux.oracle.com/cve/CVE-2011-1745.html', u'type': u'cve', u'id': u'CVE-2011-1745', u'title': u'CVE-2011-1745'}, {u'href': u'http://linux.oracle.com/cve/CVE-2011-1746.html', u'type': u'cve', u'id': u'CVE-2011-1746', u'title': u'CVE-2011-1746'}, {u'href': u'http://linux.oracle.com/cve/CVE-2011-1776.html', u'type': u'cve', u'id': u'CVE-2011-1776', u'title': u'CVE-2011-1776'}, {u'href': u'http://linux.oracle.com/cve/CVE-2011-1936.html', u'type': u'cve', u'id': u'CVE-2011-1936', u'title': u'CVE-2011-1936'}, {u'href': u'http://linux.oracle.com/cve/CVE-2011-2022.html', u'type': u'cve', u'id': u'CVE-2011-2022', u'title': u'CVE-2011-2022'}, {u'href': u'http://linux.oracle.com/cve/CVE-2011-2213.html', u'type': u'cve', u'id': u'CVE-2011-2213', u'title': u'CVE-2011-2213'}, {u'href': u'http://linux.oracle.com/cve/CVE-2011-2492.html', u'type': u'cve', u'id': u'CVE-2011-2492', u'title': u'CVE-2011-2492'}], u'_content_type_id': u'erratum', u'_id': u'77afeec9-cb23-4f2f-a62a-192c79164184', u'from': u'el-errata@oss.oracle.com', u'severity': u'Important', u'title': u' kernel security and bug fix update', u'_ns': u'units_erratum', u'rights': u'Copyright 2011 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 5', u'reboot_suggested': False, u'type': u'security', u'pkglist': [{u'packages': [{u'src': None, u'name': u'kernel', u'sum': [u'md5', u'62ea87f2f140e115f2bb353ed76258d0'], u'filename': u'kernel-2.6.18-238.19.1.0.1.el5.src.rpm', u'epoch': u'0', u'version': u'2.6.18', u'release': u'238.19.1.0.1.el5', u'arch': u'src'}, {u'src': None, u'name': u'kernel', u'sum': [u'md5', u'7f07611cdb014b5074001a6c19b101d0'], u'filename': u'kernel-2.6.18-238.19.1.0.1.el5.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.18', u'release': u'238.19.1.0.1.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'kernel-debug', u'sum': [u'md5', u'6ecf59597ac33c2e1555f38eb37c3b28'], u'filename': u'kernel-debug-2.6.18-238.19.1.0.1.el5.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.18', u'release': u'238.19.1.0.1.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'kernel-debug-devel', u'sum': [u'md5', u'09f5a57b761c31034d5f4d79d0ef06e6'], u'filename': u'kernel-debug-devel-2.6.18-238.19.1.0.1.el5.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.18', u'release': u'238.19.1.0.1.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'kernel-devel', u'sum': [u'md5', u'c26406df6b76aed7876f3326d1856f36'], u'filename': u'kernel-devel-2.6.18-238.19.1.0.1.el5.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.18', u'release': u'238.19.1.0.1.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'kernel-doc', u'sum': [u'md5', u'4e32ecb4fe52023cdc6fa363cd07c842'], u'filename': u'kernel-doc-2.6.18-238.19.1.0.1.el5.noarch.rpm', u'epoch': u'0', u'version': u'2.6.18', u'release': u'238.19.1.0.1.el5', u'arch': u'noarch'}, {u'src': None, u'name': u'kernel-headers', u'sum': [u'md5', u'4c00c13a5b7708badf65266c09841200'], u'filename': u'kernel-headers-2.6.18-238.19.1.0.1.el5.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.18', u'release': u'238.19.1.0.1.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'kernel-xen', u'sum': [u'md5', u'af0c893f9a325627fe585f55bde55037'], u'filename': u'kernel-xen-2.6.18-238.19.1.0.1.el5.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.18', u'release': u'238.19.1.0.1.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'kernel-xen-devel', u'sum': [u'md5', u'51f7990ec4d609ea5a922a4e086039ee'], u'filename': u'kernel-xen-devel-2.6.18-238.19.1.0.1.el5.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.18', u'release': u'238.19.1.0.1.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'ocfs2-2.6.18-238.19.1.0.1.el5', u'sum': [u'md5', u'ac9dbec453d7ee0b3c634384e037fe56'], u'filename': u'ocfs2-2.6.18-238.19.1.0.1.el5-1.4.8-2.el5.src.rpm', u'epoch': u'0', u'version': u'1.4.8', u'release': u'2.el5', u'arch': u'src'}, {u'src': None, u'name': u'ocfs2-2.6.18-238.19.1.0.1.el5', u'sum': [u'md5', u'0f1cf528af1063d0b2f0e198734ff277'], u'filename': u'ocfs2-2.6.18-238.19.1.0.1.el5-1.4.8-2.el5.x86_64.rpm', u'epoch': u'0', u'version': u'1.4.8', u'release': u'2.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'ocfs2-2.6.18-238.19.1.0.1.el5debug', u'sum': [u'md5', u'a2dd955e2d953c6883a45c7d9dea60f9'], u'filename': u'ocfs2-2.6.18-238.19.1.0.1.el5debug-1.4.8-2.el5.x86_64.rpm', u'epoch': u'0', u'version': u'1.4.8', u'release': u'2.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'ocfs2-2.6.18-238.19.1.0.1.el5xen', u'sum': [u'md5', u'c90935d74358c8ee3c705cd3e9a354c6'], u'filename': u'ocfs2-2.6.18-238.19.1.0.1.el5xen-1.4.8-2.el5.x86_64.rpm', u'epoch': u'0', u'version': u'1.4.8', u'release': u'2.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'oracleasm-2.6.18-238.19.1.0.1.el5', u'sum': [u'md5', u'02681eb948dbc02fa2267c087296f8e7'], u'filename': u'oracleasm-2.6.18-238.19.1.0.1.el5-2.0.5-1.el5.src.rpm', u'epoch': u'0', u'version': u'2.0.5', u'release': u'1.el5', u'arch': u'src'}, {u'src': None, u'name': u'oracleasm-2.6.18-238.19.1.0.1.el5', u'sum': [u'md5', u'5175230d4793756e5148afba7e75549a'], u'filename': u'oracleasm-2.6.18-238.19.1.0.1.el5-2.0.5-1.el5.x86_64.rpm', u'epoch': u'0', u'version': u'2.0.5', u'release': u'1.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'oracleasm-2.6.18-238.19.1.0.1.el5debug', u'sum': [u'md5', u'fa3c11a0b6eb72739499911c5992d877'], u'filename': u'oracleasm-2.6.18-238.19.1.0.1.el5debug-2.0.5-1.el5.x86_64.rpm', u'epoch': u'0', u'version': u'2.0.5', u'release': u'1.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'oracleasm-2.6.18-238.19.1.0.1.el5xen', u'sum': [u'md5', u'1e4c45f4603bb1cd74a35ebdd5a6cc19'], u'filename': u'oracleasm-2.6.18-238.19.1.0.1.el5xen-2.0.5-1.el5.x86_64.rpm', u'epoch': u'0', u'version': u'2.0.5', u'release': u'1.el5', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u"[1.5.1-37]\n- Reverts: rhbz#680443 - Dynamic DNS update fails if multiple servers are\n- given in ipa_server config option\n\n[1.5.1-36]\n- Resolves: rhbz#709333 - sssd. should require sssd-client.\n\n[1.5.1-35]\n- Resolves: rhbz#707340 - latest sssd fails if ldap_default_authtok_type is\n- not mentioned\n- Resolves: rhbz#707574 - SSSD's async resolver only tries the first\n- nameserver in /etc/resolv.conf\n\n[1.5.1-34]\n- Resolves: rhbz#701702 - sssd client libraries use select() but should use\n- poll() instead\n\n[1.5.1-33]\n- Related: rhbz#700858 - Automatic TGT renewal overwrites cached password\n- Fix segfault in TGT renewal\n\n[1.5.1-32]\n- Resolves: rhbz#700858 - Automatic TGT renewal overwrites cached password\n\n[1.5.1-30]\n- Resolves: rhbz#696979 - Filters not honoured against fully-qualified users\n\n[1.5.1-29]\n- Resolves: rhbz#694149 - SSSD consumes GBs of RAM, possible memory leak\n\n[1.5.1-28]\n- Related: rhbz#691900 - SSSD needs to fall back to 'cn' for GECOS\n- information\n\n[1.5.1-27]\n- Related: rhbz#694853 - SSSD crashes during getent when anonymous bind is\n- disabled\n\n[1.5.1-26]\n- Resolves: rhbz#695476 - Unable to resolve SRV record when called with\n[in ldap_uri]\n- Related: rhbz#694853 - SSSD crashes during getent when anonymous bind is\n- disabled\n\n[1.5.1-25]\n- Resolves: rhbz#694853 - SSSD crashes during getent when anonymous bind is\n- disabled\n\n[1.5.1-24]\n- Resolves: rhbz#692960 - Process /usr/libexec/sssd/sssd_be was killed by\n- signal 11 (SIGSEGV)\n- Fix is to not attempt to resolve nameless servers\n\n[1.5.1-23]\n- Resolves: rhbz#691900 - SSSD needs to fall back to 'cn' for GECOS\n- information\n\n[1.5.1-21]\n- Resolves: rhbz#690867 - Groups with a zero-length memberuid attribute can\n- cause SSSD to stop caching and responding to\n- requests\n\n[1.5.1-20]\n- Resolves: rhbz#690287 - Traceback messages seen while interrupting\n- sss_obfuscate using ctrl+d\n- Resolves: rhbz#690814 - [abrt] sssd-1.2.1-28.el6_0.4: _talloc_free: Process\n- /usr/libexec/sssd/sssd_be was killed by signal 11\n- (SIGSEGV)\n\n[1.5.1-19]\n- Related: rhbz#690096 - SSSD should skip over groups with multiple names\n\n[1.5.1-18]\n- Resolves: rhbz#690093 - SSSD breaks on RDNs with a comma in them\n- Resolves: rhbz#690096 - SSSD should skip over groups with multiple names\n- Resolves: rhbz#689887 - group memberships are not populated correctly during\n- IPA provider initgroups\n- Resolves: rhbz#688697 - Skip users and groups that have incomplete contents\n- Resolves: rhbz#688694 - authconfig fails when access_provider is set as krb5\n- in sssd.conf\n\n[1.5.1-17]\n- Resolves: rhbz#688677 - Build SSSD in RHEL 5.7 against openldap24-libs\n- Adds support for following LDAP referrals and using Mozilla NSS for crypto\n- support\n\n[1.5.1-16]\n- Resolves: rhbz#683260 - sudo/ldap lookup via sssd gets stuck for 5min\n- waiting on netgroup\n- Resolves: rhbz#683585 - sssd consumes 100% CPU\n- Related: rhbz#680441 - sssd does not handle kerberos server IP change\n\n[1.5.1-15]\n- Related: rhbz#680441 - sssd does not handle kerberos server IP change\n- SSSD was staying with the old server if it was still online\n\n[1.5.1-14]\n- Resolves: rhbz#682853 - IPA provider should use realm instead of ipa_domain\n- for base DN\n\n[1.5.1-13]\n- Resolves: rhbz#682803 - sssd-be segmentation fault - ipa-client on\n- ipa-server\n- Resolves: rhbz#680441 - sssd does not handle kerberos server IP change\n- Resolves: rhbz#680443 - Dynamic DNS update fails if multiple servers are\n- given in ipa_server config option\n- Resolves: rhbz#680933 - Do not delete sysdb memberOf if there is no memberOf\n- attribute on the server\n- Resolves: rhbz#682808 - sssd_nss core dumps with certain lookups\n\n[1.5.1-12]\n- Related: rhbz#679087 - SSSD IPA provider should honor the krb5_realm option\n- Related: rhbz#678615 - SSSD needs to look at IPA's compat tree for netgroups\n\n[1.5.1-11]\n- Resolves: rhbz#679087 - SSSD IPA provider should honor the krb5_realm option\n- Resolves: rhbz#679097 - Does not read renewable ccache at startup\n\n[1.5.1-10]\n- Resolves: rhbz#678606 - User information not updated on login for secondary\n- domains\n- Resolves: rhbz#678778 - IPA provider does not update removed group\n- memberships on initgroups\n\n[1.5.1-9]\n- Resolves: rhbz#678780 - sssd crashes at the next tgt renewals it tries\n- Resolves: rhbz#678412 - name service caches names, so id command shows\n- recently deleted users\n- Resolves: rhbz#678615 - SSSD needs to look at IPA's compat tree for\n- netgroups\n\n[1.5.1-8]\n- Related: rhbz#665314 - Rebase SSSD to 1.5 in RHEL 5.7\n- Fix generation of translated manpages\n\n[1.5.1-7]\n- Resolves: rhbz#665314 - Rebase SSSD to 1.5 in RHEL 5.7\n- Resolves: rhbz#676027 - sssd segfault when first entry of ldap_uri is\n- unreachable\n- Resolves: rhbz#678032 - Remove HBAC time rules from SSSD\n- Resolves: rhbz#675007 - sssd corrupts group cache\n- Resolves: rhbz#608864 - [RFE] Support obfuscated passwords in the SSSD\n- configuration", u'issued': u'2011-07-31', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELSA-2011-0975.html', u'type': u'self', u'id': None, u'title': u'ELSA-2011-0975'}, {u'href': u'http://linux.oracle.com/cve/CVE-2010-4341.html', u'type': u'cve', u'id': u'CVE-2010-4341', u'title': u'CVE-2010-4341'}], u'_content_type_id': u'erratum', u'_id': u'14abca3f-8e57-4260-b356-7780d476a9d0', u'from': u'el-errata@oss.oracle.com', u'severity': u'Low', u'title': u' sssd security, bug fix, and enhancement update', u'_ns': u'units_erratum', u'rights': u'Copyright 2011 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 5', u'reboot_suggested': False, u'type': u'security', u'pkglist': [{u'packages': [{u'src': None, u'name': u'sssd', u'sum': [u'md5', u'93ccf21a821e57fad278e03b2216e0e7'], u'filename': u'sssd-1.5.1-37.el5.src.rpm', u'epoch': u'0', u'version': u'1.5.1', u'release': u'37.el5', u'arch': u'src'}, {u'src': None, u'name': u'sssd', u'sum': [u'md5', u'e3bd5954e3f5f08153c20fd18b809a00'], u'filename': u'sssd-1.5.1-37.el5.x86_64.rpm', u'epoch': u'0', u'version': u'1.5.1', u'release': u'37.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'sssd-client', u'sum': [u'md5', u'647ee03bb97558c2859677e9c0c3b9a2'], u'filename': u'sssd-client-1.5.1-37.el5.i386.rpm', u'epoch': u'0', u'version': u'1.5.1', u'release': u'37.el5', u'arch': u'i386'}, {u'src': None, u'name': u'sssd-client', u'sum': [u'md5', u'ec0a21d694e43f1a655040c8b04347ba'], u'filename': u'sssd-client-1.5.1-37.el5.x86_64.rpm', u'epoch': u'0', u'version': u'1.5.1', u'release': u'37.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'sssd-tools', u'sum': [u'md5', u'bdfa8e18f80afc4bf5453cdaa04965fe'], u'filename': u'sssd-tools-1.5.1-37.el5.x86_64.rpm', u'epoch': u'0', u'version': u'1.5.1', u'release': u'37.el5', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u"[3.0.6-4]\n- fix #700450 - free parsed hostnames\n- fix #575022 - set TZ variable after chroot\n\n[3.0.6-3]\n- Add upstream patch to fix CVE-2011-1097 - Incremental file-list\n corruption due to temporary file_extra_cnt increments\n Resolves: #688923\n\n[3.0.6-2]\n- Remove BuildRequires dependency on popt-devel, until the package\n is being shipped with RHEL-5 (resolve build issues)\n\n[3.0.6-1]\n- Rebase to upstream version 3.0.6\n Resolves: #339971, #471182, #575022, #616093\n- Make '-d, --dirs options' behaviour backward-compatible with 2.6.8\n Resolves: #339971 (comment #5)\n- Truncate a copied sparse file at the end of transaction (-S, --sparse option)\n Resolves: #530866\n- Add -fno-strict-aliasing to CFLAGS\n- Remove obsolete rsync-2.6.8-xattr_bug.patch\n- Switch license to GPLv3+ (upstream change beginning with 3.0.0)\n", u'issued': u'2011-07-31', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELSA-2011-0999.html', u'type': u'self', u'id': None, u'title': u'ELSA-2011-0999'}, {u'href': u'http://linux.oracle.com/cve/CVE-2007-6200.html', u'type': u'cve', u'id': u'CVE-2007-6200', u'title': u'CVE-2007-6200'}], u'_content_type_id': u'erratum', u'_id': u'd6faa8a6-615d-4be9-bdee-4301da68bae0', u'from': u'el-errata@oss.oracle.com', u'severity': u'Moderate', u'title': u' rsync security, bug fix, and enhancement update', u'_ns': u'units_erratum', u'rights': u'Copyright 2011 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 5', u'reboot_suggested': False, u'type': u'security', u'pkglist': [{u'packages': [{u'src': None, u'name': u'rsync', u'sum': [u'md5', u'54c137ce0c9beca4215a3d845f55ed60'], u'filename': u'rsync-3.0.6-4.el5.src.rpm', u'epoch': u'0', u'version': u'3.0.6', u'release': u'4.el5', u'arch': u'src'}, {u'src': None, u'name': u'rsync', u'sum': [u'md5', u'78d7bf60809d6039805ac6d91e01a026'], u'filename': u'rsync-3.0.6-4.el5.x86_64.rpm', u'epoch': u'0', u'version': u'3.0.6', u'release': u'4.el5', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u"[2.0.52-21]\n- rgmanager: Fix bad passing of SFL_FAILURE up\n (fix_bad_passing_of_sfl_failure_up.patch)\n Resolves: rhbz#711521\n\n[2.0.52-20]\n- resource-agents: Improve LD_LIBRARY_PATH handling by SAP*\n (resource_agents_improve_ld_library_path_handling_by_sap*.patch)\n Resolves: rhbz#710637\n\n[2.0.52-19]\n- Fix changelog format\n- rgmanager: Fix reference count handling\n (fix_reference_count_handling.patch)\n Resolves: rhbz#692771\n\n[2.0.52-18]\n- resource-agents: postgres-8 resource agent does not detect a failed\n start of postgres server \n (postgres-8-Fix_pid_files.patch)\n Resolves: rhbz#663827\n\n[2.0.52-16]\n- rgmanager: Allow non-root clustat\n (allow_non_root_clustat.patch)\n Resolves: rhbz#510300\n- rgmanager: Initial commit of central proc + migration support\n (central_proc_+_migration_support.patch)\n Resolves: rhbz#525271\n- rgmanager: Make clufindhostname -i predictable\n (make_clufindhostname_i_predictable.patch)\n Resolves: rhbz#592613\n- resource-agents: Trim trailing slash for nfs clients\n (trim_trailing_slash_for_nfs_clients.patch)\n Resolves: rhbz#592624\n- rgmanager: Update last_owner on failover\n (update_last_owner_on_failover.patch)\n Resolves: rhbz#610483\n- rgmanager: Pause during exit if we stopped services\n (pause_during_exit_if_we_stopped_services.patch)\n Resolves: rhbz#619468\n- rgmanager: Fix quotaoff handling\n (fix_quotaoff_handling.patch)\n Resolves: rhbz#637678\n- resource-agents: Try force-unmount before fuser for netfs.sh\n (try_force_unmount_before_fuser_for_netfs_sh.patch)\n Resolves: rhbz#678494\n- rgmanager: Improve rgmanager's exclusive prioritization handling\n (improve_rgmanager_s_exclusive_prioritization_handling.patch)\n Resolves: rhbz#680256\n\n[2.0.52-15]\n- resource-agents: postgres-8 resource agent does not detect a failed\n start of postgres server \n (postgres-8-Do-not-send-TERM-signal-when-killing-post.patch)\n (postgres-8-Improve-testing-if-postgres-started-succe.patch)\n Resolves: rhbz#663827\n\n[2.0.52-14]\n- resource-agents: Fix problems when generating XML configuration file\n (rgmanager-Fix-problems-in-generated-XML-config-file.patch)\n Resolves: rhbz#637802\n\n[2.0.52-13]\n- resource-agents: Use literal quotes for tr calls\n (resource_agents_use_literal_quotes_for_tr_calls.patch)\n Resolves: rhbz#637154\n\n[2.0.52-12]\n- resource-agents: Use shutdown immediate in oracledb.sh\n (use_shutdown_immediate_in_oracledb_sh.patch)\n Resolves: rhbz#633992\n- rgmanager: Add path to rhev-check.sh\n (add_path_to_rhev_check_sh.patch)\n Resolves: rhbz#634225\n- rgmanager: Make clustat report correct version\n (make_clustat_report_correct_version.patch)\n Resolves: rhbz#654160\n\n[2.0.52-11]\n- resource-agents: Listen line in generated httpd.conf incorrect\n (resource-agents-Remove-netmask-from-IP-address-when.patch)\n Resolves: rhbz#675739\n- resource-agents: Disable updates to static routes by RHCS IP tooling\n (resource-agents-Add-option-disable_rdisc-to-ip.sh.patch)\n Resolves: rhbz#620700\n\n[2.0.52-10.1]\n- rgmanager: Fix nofailback when service is in 'starting' state\n (fix_nofailback_when_service_is_in_starting_state.patch)\n Resolves: rhbz#669440\n\n[2.0.52-10]\n- resource-agents: Problem with whitespace in mysql resource name\n (resource_agents_fix_whitespace_in_names.patch)\n Resolves: rhbz#632704", u'issued': u'2011-07-31', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELSA-2011-1000.html', u'type': u'self', u'id': None, u'title': u'ELSA-2011-1000'}, {u'href': u'http://linux.oracle.com/cve/CVE-2010-3389.html', u'type': u'cve', u'id': u'CVE-2010-3389', u'title': u'CVE-2010-3389'}], u'_content_type_id': u'erratum', u'_id': u'1ebb0bc9-1033-4f2b-b24e-f0e2818472aa', u'from': u'el-errata@oss.oracle.com', u'severity': u'Low', u'title': u' rgmanager security, bug fix, and enhancement update', u'_ns': u'units_erratum', u'rights': u'Copyright 2011 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 5', u'reboot_suggested': False, u'type': u'security', u'pkglist': [{u'packages': [{u'src': None, u'name': u'rgmanager', u'sum': [u'md5', u'6646b71307017a2d3200bdbc40413efe'], u'filename': u'rgmanager-2.0.52-21.el5.src.rpm', u'epoch': u'0', u'version': u'2.0.52', u'release': u'21.el5', u'arch': u'src'}, {u'src': None, u'name': u'rgmanager', u'sum': [u'md5', u'd0f608a8a60dbe65bc134b350252fda1'], u'filename': u'rgmanager-2.0.52-21.el5.x86_64.rpm', u'epoch': u'0', u'version': u'2.0.52', u'release': u'21.el5', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u"[7.0.2-11]\n- Related: #716959 \n fix cve-2007-3852 - sysstat insecure temporary file usage\n\n[7.0.2-10]\n- Resolves: #716959\n fix cve-2007-3852 - sysstat insecure temporary file usage\n\n[7.0.2-9]\n- Related: #622557\n sar interrupt count goes backward\n\n[7.0.2-8]\n- Resolves: #694767\n iostat doesn't report statistics for shares with long names\n- Related: #703095\n iostat -n - values in output overflows - problem with long device names on\n i386\n\n[7.0.2-7]\n- Resolves: #706095\n iostat -n - values in output overflows\n\n[7.0.2-6]\n- Resolves: #696672\n cifsstat resource leak\n\n[7.0.2-5]\n- Resolves: #604637\n extraneous newline in iostat report for long device names\n- Resolves: #630559\n 'sar -P ALL -f xxxx' does not display activity information\n- Resolves: #591530\n add cifsiostat tool\n- Resolves: #598794\n Enable parametrization of sadc arguments\n- Resolves: #675058\n iostat: bogus value appears when device is unmounted/mounted\n- Resolves: #622557\n sar interrupt count goes backward\n\n[7.0.2-4]\n- Resolves: #454617\n Though function write() executed sucessful, sadc end with an error\n- Resolves: #468340\n The output of sar -I ALL/XALL is wrong in ia64 machine of RHEL5\n- Resolves: #517490\n The 'sar -d ' command outputs invalid data\n- Resolves: #578929\n March sar data was appended to February data\n- Resolves: #579409\n The sysstat's programs such as mpstat shows one extra cpu\n- Resolves: #484439\n iostat -n enhancement not report NFS client stats correctly", u'issued': u'2011-07-31', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELSA-2011-1005.html', u'type': u'self', u'id': None, u'title': u'ELSA-2011-1005'}, {u'href': u'http://linux.oracle.com/cve/CVE-2007-3852.html', u'type': u'cve', u'id': u'CVE-2007-3852', u'title': u'CVE-2007-3852'}], u'_content_type_id': u'erratum', u'_id': u'41e805ed-27a6-47ff-a84e-eb4eb07802f3', u'from': u'el-errata@oss.oracle.com', u'severity': u'Low', u'title': u' sysstat security, bug fix, and enhancement update', u'_ns': u'units_erratum', u'rights': u'Copyright 2011 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 5', u'reboot_suggested': False, u'type': u'security', u'pkglist': [{u'packages': [{u'src': None, u'name': u'sysstat', u'sum': [u'md5', u'd0cf2c781086cce1c2539ba94d4e09b9'], u'filename': u'sysstat-7.0.2-11.el5.src.rpm', u'epoch': u'0', u'version': u'7.0.2', u'release': u'11.el5', u'arch': u'src'}, {u'src': None, u'name': u'sysstat', u'sum': [u'md5', u'187d4eff4c6ebafa1f3f44b476708f29'], u'filename': u'sysstat-7.0.2-11.el5.x86_64.rpm', u'epoch': u'0', u'version': u'7.0.2', u'release': u'11.el5', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u"[0.8.2-22.0.1.el5]\n- Replaced docs/et.png in tarball\n\n[libvirt-0.8.2-22.el5]\n- Fix auditing of disk hotunplug operations (rhbz#710151)\n\n[libvirt-0.8.2-21.el5]\n- remote: Protect against integer overflow (rhbz#717207)\n\n[0.8.2-20.el5]\n- Support enabling or disabling the HPET for Xen domains (rhbz#703193)\n- SMBIOS support (rhbz#661365)\n\n[0.8.2-19.el5]\n- xen: Plug memory leak in multiple serial ports support (rhbz#670789)\n- Manually kill gzip if restore fails before starting qemu (rhbz#681623)\n- qemu: Avoid double close on domain restore (rhbz#681623)\n- virterror: Avoid API breakage with vmware (rhbz#665075)\n- nwfilter: Resolve deadlock between VM ops and filter update (rhbz#697749)\n\n[0.8.2-18.el5]\n- xen: Prevent updating device when attaching a device (rhbz#662908)\n- Add PCI sysfs reset access (rhbz#689880)\n- xencapstest: Don't fail when Xen is installed (rhbz#690459)\n- Make error reporting in libvirtd thread safe (rhbz#690733)\n\n[0.8.2-17.el5]\n- Fix event-handling data race (rhbz#671569)\n- Add support for multiple serial ports into the Xen driver (rhbz#670789)\n- Add missing checks for read only connections (CVE-2011-1146)\n- Guess rhel macro based on dist macro (rhbz#665325)\n\n[0.8.2-16.el5]\n- Fix possible crash in virExec (rhbz#665549)\n", u'issued': u'2011-07-31', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELSA-2011-1019.html', u'type': u'self', u'id': None, u'title': u'ELSA-2011-1019'}, {u'href': u'http://linux.oracle.com/cve/CVE-2011-2511.html', u'type': u'cve', u'id': u'CVE-2011-2511', u'title': u'CVE-2011-2511'}], u'_content_type_id': u'erratum', u'_id': u'5c71185d-7ac8-4fac-aaaa-0f7b6686a0fe', u'from': u'el-errata@oss.oracle.com', u'severity': u'Moderate', u'title': u' libvirt security, bug fix, and enhancement update', u'_ns': u'units_erratum', u'rights': u'Copyright 2011 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 5', u'reboot_suggested': False, u'type': u'security', u'pkglist': [{u'packages': [{u'src': None, u'name': u'libvirt', u'sum': [u'md5', u'5460a778cf832c81a1203b38af4dc168'], u'filename': u'libvirt-0.8.2-22.0.1.el5.i386.rpm', u'epoch': u'0', u'version': u'0.8.2', u'release': u'22.0.1.el5', u'arch': u'i386'}, {u'src': None, u'name': u'libvirt', u'sum': [u'md5', u'b206ea346555fe212e16f449a02444fa'], u'filename': u'libvirt-0.8.2-22.0.1.el5.src.rpm', u'epoch': u'0', u'version': u'0.8.2', u'release': u'22.0.1.el5', u'arch': u'src'}, {u'src': None, u'name': u'libvirt', u'sum': [u'md5', u'1563ef5920d341394a592ee928597718'], u'filename': u'libvirt-0.8.2-22.0.1.el5.x86_64.rpm', u'epoch': u'0', u'version': u'0.8.2', u'release': u'22.0.1.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'libvirt-devel', u'sum': [u'md5', u'101007ed3b59218b886072f815d30f24'], u'filename': u'libvirt-devel-0.8.2-22.0.1.el5.i386.rpm', u'epoch': u'0', u'version': u'0.8.2', u'release': u'22.0.1.el5', u'arch': u'i386'}, {u'src': None, u'name': u'libvirt-devel', u'sum': [u'md5', u'bca6d8c988396f808ba8d7aa69ed5906'], u'filename': u'libvirt-devel-0.8.2-22.0.1.el5.x86_64.rpm', u'epoch': u'0', u'version': u'0.8.2', u'release': u'22.0.1.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'libvirt-python', u'sum': [u'md5', u'a598c8dbe190ff300ee32f5864eb92af'], u'filename': u'libvirt-python-0.8.2-22.0.1.el5.x86_64.rpm', u'epoch': u'0', u'version': u'0.8.2', u'release': u'22.0.1.el5', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u"\n[2.6.18-274.el5]\n- [xen] svm: fix invlpg emulator regression (Paolo Bonzini) [719894]\n\n[2.6.18-273.el5]\n- Revert: [fs] proc: Fix rmmod/read/write races in /proc entries (Jarod Wilson) [717068]\n- [xen] disregard trailing bytes in an invalid page (Paolo Bonzini) [717742]\n- [xen] prep __get_instruction_length_from_list for partial buffers (Paolo Bonzini) [717742]\n- [xen] remove unused argument to __get_instruction_length (Paolo Bonzini) [717742]\n- [xen] let __get_instruction_length always read into own buffer (Paolo Bonzini) [717742]\n\n[2.6.18-272.el5]\n- [xen] x86: spinlock support for up to 255 CPUs (Laszlo Ersek) [713123]\n- [xen] remove block scope mtrr identifiers shadowing file scope (Laszlo Ersek) [713123]\n- [xen] Actually hold back MTRR init while booting secondary CPUs (Laszlo Ersek) [713123]\n- [xen] remove unused mtrr_bp_restore (Laszlo Ersek) [713123]\n- [xen] x86: Fix crash on amd iommu systems (Igor Mammedov) [714275]\n\n[2.6.18-271.el5]\n- [net] igmp: ip_mc_clear_src only when we no users of ip_mc_list (Veaceslav Falico) [707179]\n- [scsi] cxgb3i: fix programing of dma page sizes (Neil Horman) [710498]\n- [xen] hvm: secure vmx cpuid (Andrew Jones) [706325] {CVE-2011-1936}\n- [xen] hvm: secure svm_cr_access (Andrew Jones) [703716] {CVE-2011-1780}\n- [xen] hvm: svm support cleanups (Andrew Jones) [703716] {CVE-2011-1780}\n\n[2.6.18-270.el5]\n- [fs] proc: fix compile warning in pdeaux addition (Jarod Wilson) [675781]\n- [net] bluetooth: l2cap and rfcomm: fix info leak to userspace (Thomas Graf) [703021]\n- [net] inet_diag: fix inet_diag_bc_audit data validation (Thomas Graf) [714539] {CVE-2011-2213}\n- [misc] signal: fix kill signal spoofing issue (Oleg Nesterov) [690031] {CVE-2011-1182}\n- [fs] proc: fix signedness issue in next_pidmap (Oleg Nesterov) [697827] {CVE-2011-1593}\n- [char] agp: fix OOM and buffer overflow (Jerome Marchand) [699010] {CVE-2011-1746}\n- [char] agp: fix arbitrary kernel memory writes (Jerome Marchand) [699006] {CVE-2011-1745 CVE-2011-2022}\n- [net] be2net: fix queue creation order and pci error recovery (Ivan Vecera) [711653]\n- [infiniband] core: Handle large number of entries in poll CQ (Jay Fenlason) [668371] {CVE-2010-4649 CVE-2011-1044}\n- [infiniband] core: fix panic in ib_cm:cm_work_handler (Jay Fenlason) [679996] {CVE-2011-0695}\n- [fs] validate size of EFI GUID partition entries (Anton Arapov) [703026] {CVE-2011-1776}\n\n[2.6.18-269.el5]\n- [mm] only throttle page dirtying for specially marked BDIs (Jeff Layton) [711450]\n- Revert: [base] Fix potential deadlock in driver core (Don Zickus) [703084]\n- [fs] proc: Fix rmmod/read/write races in /proc entries (David Howells) [675781]\n- [scsi] qla4xxx: Update driver version to V5.02.04.01.05.07-d0 (Chad Dupuis) [704153]\n- [scsi] qla4xxx: clear SCSI COMPLETION INTR bit during F/W init (Chad Dupuis) [704153]\n- [usb] wacom: add support for DTU-2231 (Aristeu Rozanski) [683549]\n- [xen] fix MAX_EVTCHNS definition (Laszlo Ersek) [701243] {CVE-2011-1763}\n\n[2.6.18-268.el5]\n- [net] sctp: fix calc of INIT/INIT-ACK chunk length to set (Thomas Graf) [695385] {CVE-2011-1573}\n- [scsi] ibmvfc: Fix Virtual I/O failover hang (Steve Best) [710477]\n- [kernel] irq: Note and disable spurious interrupts on kexec (Prarit Bhargava) [611407]\n- [net] bnx2x: Update firmware to 6.2.9 (Michal Schmidt) [711079]\n- [net] bnx2x: Update bnx2x_firmware.h to version 6.2.9 (Michal Schmidt) [711079]\n- [net] xt_hashlimit: fix race between htable_destroy and htable_gc (Jiri Pirko) [705905]\n- [fs] cifs: clear write bits if ATTR_READONLY is set (Justin Payne) [700263]\n- [net] bna: clear some statistics before filling them (Ivan Vecera) [711990]\n- [net] ixgbe: Disable RSC by default (Herbert Xu) [703416]\n- [scsi] isci: fix scattergather list handling for smp commands (David Milburn) [710584]\n- [net] netconsole: prevent setup netconsole on a slave device (Amerigo Wang) [698873]\n\n[2.6.18-267.el5]\n- [fs] xfs: prevent leaking uninit stack memory in FSGEOMETRY_V1 p2 (Phillip Lougher) [677266] {CVE-2011-0711}\n- [fs] xfs: prevent leaking uninit stack memory in FSGEOMETRY_V1 (Phillip Lougher) [677266] {CVE-2011-0711}\n- [net] core: Fix memory leak/corruption on VLAN GRO_DROP (Herbert Xu) [691565] {CVE-2011-1576}\n\n[2.6.18-266.el5]\n- [scsi] megaraid: update to driver version 5.38-rh1 (Tomas Henzl) [706244]\n- [block] cciss: fix mapping of config table (Tomas Henzl) [695493]\n- [block] cciss: fix dev_info null pointer deref after freeing h (Tomas Henzl) [695493]\n- [block] cciss: do not call request_irq with spinlocks held (Tomas Henzl) [695493]\n- [block] cciss: prototype cciss_sent_reset to fix error (Tomas Henzl) [695493]\n- [block] cciss: mark functions as dev_init to clean up warnings (Tomas Henzl) [695493]\n- [block] cciss: timeout if soft reset fails (Tomas Henzl) [695493]\n- [block] cciss: use cmd_alloc for kdump (Tomas Henzl) [695493]\n- [block] cciss: Use cciss not hpsa in init_driver_version (Tomas Henzl) [695493]\n- [block] cciss: reduce stack usage a reset verifying code (Tomas Henzl) [695493]\n- [block] cciss: do not store pci state on stack (Tomas Henzl) [695493]\n- [block] cciss: no PCI power management reset method if known bad (Tomas Henzl) [695493]\n- [block] cciss: increase timeouts for post-reset no-ops (Tomas Henzl) [695493]\n- [block] cciss: remove superfluous sleeps around reset code (Tomas Henzl) [695493]\n- [block] cciss: do soft reset if hard reset is broken (Tomas Henzl) [695493]\n- [block] cciss: flush writes in interrupt mask setting code (Tomas Henzl) [695493]\n- [block] cciss: clarify messages around reset behavior (Tomas Henzl) [695493]\n- [block] cciss: increase time to wait for board reset to start (Tomas Henzl) [695493]\n- [block] cciss: get rid of message related magic numbers (Tomas Henzl) [695493]\n- [block] cciss: factor out irq request code (Tomas Henzl) [695493]\n- [block] cciss: factor out scatterlist allocation functions (Tomas Henzl) [695493]\n- [block] cciss: factor out command pool allocation functions (Tomas Henzl) [695493]\n- [block] cciss: Define print_cmd even without tape support (Tomas Henzl) [695493]\n- [block] cciss: do not use bit 2 doorbell reset (Tomas Henzl) [695493]\n- [block] cciss: use new doorbell-bit-5 reset method (Tomas Henzl) [695493]\n- [block] cciss: improve controller reset failure detection (Tomas Henzl) [695493]\n- [block] cciss: wait longer after resetting controller (Tomas Henzl) [695493]\n- [infiniband] cxgb4: Use completion objects for event blocking (Steve Best) [708081]\n- [fs] ext4: fix quota deadlock (Eric Sandeen) [702197]\n- [fs] ext3, ext4: update ctime when changing permission by setfacl (Eric Sandeen) [709224]\n- [scsi] bfa: properly reinitialize adapter during kdump (Rob Evers) [710300]\n- [scsi] lpfc: Update for 8.2.0.96.2p release (Rob Evers) [707336]\n- [scsi] lpfc: Fix back to back Flogis sent without logo (Rob Evers) [707336]\n- [scsi] lpfc: Fix not updating wwnn and wwpn after name change (Rob Evers) [707336]\n- [scsi] lpfc: Fix CT command never completing on Big Endian host (Rob Evers) [707336]\n- [scsi] lpfc: Revert fix that introduced a race condition (Rob Evers) [707336]\n- [scsi] lpfc: Fix crash in rpi clean when driver load fails (Rob Evers) [707336]\n- [scsi] lpfc: fix limiting RPI Count to a minimum of 64 (Rob Evers) [707336]\n- [scsi] lpfc: fix overriding CT field for SLI4 IF type 2 (Rob Evers) [707336]\n- [scsi] lpfc: force retry in queuecommand when port transitioning (Rob Evers) [707336]\n- [scsi] lpfc: Update version for 8.2.0.96.1p release (Rob Evers) [698432]\n- [scsi] lpfc: Fix double byte swap on received RRQ (Rob Evers) [698432]\n- [scsi] lpfc: Fix Vports not sending FDISC after lips (Rob Evers) [698432]\n- [scsi] lpfc: Fix system crash during driver unload (Rob Evers) [698432]\n- [scsi] lpfc: Fix FCFI incorrect on received unsolicited frames (Rob Evers) [698432]\n- [scsi] lpfc: Fix driver sending FLOGI to a disconnected FCF (Rob Evers) [698432]\n- [scsi] lpfc: Fix bug with incorrect BLS Response to BLS Abort (Rob Evers) [698432]\n- [scsi] lpfc: Fix adapter on Powerpc unable to login into Fabric (Rob Evers) [698432]\n- [pci] export msi_desc struct and msi_desc array (Prarit Bhargava) [697666]\n- [net] bonding: prevent deadlock on slave store with alb mode (Neil Horman) [706414]\n- [net] mlx4: Fix dropped promiscuity flag (Michael S. Tsirkin) [592370]\n- [edac] amd64_edac: Fix NULL pointer on Interlagos (Mauro Carvalho Chehab) [705040 709529]\n- [scsi] ses: fix ses_set_fault() to set the fault LED function (James Takahashi) [682351]\n- [redhat] configs: config file changes for SES Enablement (James Takahashi) [682351]\n- [misc] enclosure: return ERR_PTR() on error (James Takahashi) [682351]\n- [misc] enclosure: fix oops while iterating enclosure_status array (James Takahashi) [682351]\n- [scsi] ses: fix VPD inquiry overrun (James Takahashi) [682351]\n- [scsi] ses: Fix timeout (James Takahashi) [682351]\n- [scsi] ses: fix data corruption (James Takahashi) [682351]\n- [scsi] ses: fix memory leaks (James Takahashi) [682351]\n- [scsi] ses: add new Enclosure ULD (James Takahashi) [682351]\n- [misc] enclosure: add support for enclosure services (James Takahashi) [682351]\n- [net] tg3: Include support for Broadcom 5719/5720 (John Feeney) [654956 696182 707299]\n- [misc] module: remove over-zealous check in __module_get() (Jon Masters) [616125]\n- [redhat] kabi: Add pci_ioremap_bar and pci_reset_function to kABI (Jon Masters) [677683]\n- [redhat] kabi: Add dm_put to kABI (Jon Masters) [707003]\n- [redhat] kabi: Add compat_alloc_user_space to kABI (Jon Masters) [703167]\n- [redhat] kabi: Add random32 and srandom32 to kABI (Jon Masters) [668815]\n- [redhat] kabi: Add cancel_work_sync to kABI (Jon Masters) [664991]\n- [net] bna: add r suffix to the driver version (Ivan Vecera) [709951]\n- [net] bna: fix for clean fw re-initialization (Ivan Vecera) [709951]\n- [net] bna: fix memory leak during RX path cleanup (Ivan Vecera) [709951]\n- [net] bridge: Disable multicast snooping by default (Herbert Xu) [506630]\n- [net] bonding: fix block_netpoll_tx imbalance (Andy Gospodarek) [704426]\n- [scsi] qla2xxx: Fix virtual port login failure after chip reset (Chad Dupuis) [703879]\n- [scsi] qla2xxx: fix dsd_list_len for dsd_chaining in cmd type 6 (Chad Dupuis) [703879]\n- [net] force new skbs to allocate a minimum of 16 frags (Amerigo Wang) [694308]\n- [pci] intel-iommu: Flush unmaps at domain_exit (Alex Williamson) [705455]\n- [pci] intel-iommu: Only unlink device domains from iommu (Alex Williamson) [705455]\n\n[2.6.18-265.el5]\n- [scsi] be2iscsi: Fix MSIX interrupt names (Prarit Bhargava) [704735]\n- [misc] signal: fix SIGPROF keeps large task from completing fork (Oleg Nesterov) [645528]\n- [fs] gfs2: fix processes waiting on already-available inode glock (Robert S Peterson) [694669]\n- Revert: [pci] msi: remove infiniband compat code (Prarit Bhargava) [636260]\n- Revert: [pci] msi: use msi_desc save areas in drivers/pci code (Prarit Bhargava) [636260]\n- Revert: [pci] msi: use msi_desc save areas in msi state functions (Prarit Bhargava) [636260]\n- Revert: [pci] msi: remove pci_save_msi|x_state() functions (Prarit Bhargava) [636260]\n- [s390] mm: diagnose 10 does not release memory above 2GB (Hendrik Brueckner) [701275]\n- [input] evdev: implement proper locking (Marc Milgram) [680561]\n- [input] evdev: rename list to client in handlers (Marc Milgram) [680561]\n- [net] netpoll: disable netpoll when enslave a device (Amerigo Wang) [698873]\n- [net] disable lro on phys device when dev is a vlan (Neil Horman) [696374]\n- [scsi] qla2xxx: Update version number to 8.03.07.03.05.07-k (Chad Dupuis) [686462]\n- [scsi] qla2xxx: Free firmware PCB on logout request (Chad Dupuis) [686462]\n- [scsi] qla2xxx: dump registers for more info about ISP82xx errors (Chad Dupuis) [686462]\n- [scsi] qla2xxx: Updated the reset sequence for ISP82xx (Chad Dupuis) [686462]\n- [scsi] qla2xxx: Update copyright banner (Chad Dupuis) [686462]\n- [scsi] qla2xxx: Perform FCoE context reset before adapter reset (Chad Dupuis) [686462]\n- [scsi] qla2xxx: Limit logs in case device state does not change (Chad Dupuis) [686462]\n- [scsi] qla2xxx: Abort pending commands for faster reset recovery (Chad Dupuis) [686462]\n- [scsi] qla2xxx: Check for match before setting FCP-priority info (Chad Dupuis) [686462]\n- [scsi] qla2xxx: Display PortID info during FCP command-status (Chad Dupuis) [686462]\n\n[2.6.18-264.el5]\n- [misc] Introduce pci_map_biosrom, kernel-xen variant (David Milburn) [651837]\n\n[2.6.18-263.el5]\n- [misc] vsyscall: remove code changing syscall instructions to nop (Ulrich Obergfell) [689546]\n- [scsi] mpt2sas: move fault event handling into process context (Tomas Henzl) [705398]\n- [scsi] ibmvscsi: Improve CRQ reset reliability (Steve Best) [704963]\n- [infiniband] cxgb4: Reset wait condition atomically (Steve Best) [703925]\n- [infiniband] cxgb4: fix driver hang on EEH error (Steve Best) [703925]\n- [fs] xfs: serialise unaligned direct IOs (Eric Sandeen) [689830]\n- [fs] ext4: serialize unaligned asynchronous DIO (Eric Sandeen) [689830]\n- [misc] Add printk_timed_ratelimit (Eric Sandeen) [689830]\n- [fs] set stats st_blksize to fs blocksize not page size (Eric Sandeen) [695168]\n- [pci] Disable PCI MSI/X on portable hardware (Prarit Bhargava) [703340]\n- [usb] ehci: Disable disconnect/connect wakeups (Matthew Garrett) [703344]\n- [fs] cifs: fix cifsConvertToUCS for the mapchars case (Jeff Layton) [705324]\n- [fs] nfs: set d_op on newly allocated dentries in nfs_rename (Jeff Layton) [702533]\n- [fs] nfs: Fix build break with CONFIG_NFS_V4=n (Harshula Jayasuriya) [702355]\n- [scsi] isci: enable building driver (David Milburn) [651837]\n- [scsi] libsas: flush initial device discovery before completing (David Milburn) [651837]\n- [scsi] libsas: fix up device gone notification in sas_deform_port (David Milburn) [651837]\n- [scsi] libsas: fix runaway error handler problem (David Milburn) [651837]\n- [scsi] isci: validate oem parameters early, and fallback (David Milburn) [651837]\n- [scsi] isci: fix oem parameter header definition (David Milburn) [651837]\n- [scsi] isci: fix fragile/conditional isci_host lookups (David Milburn) [651837]\n- [scsi] isci: cleanup isci_remote_device[_not]_ready interface (David Milburn) [651837]\n- [scsi] isci: Qualify when lock managed for STP/SATA callbacks (David Milburn) [651837]\n- [scsi] isci: Fix use of SATA soft reset state machine (David Milburn) [651837]\n- [scsi] isci: Free lock for abort escalation at submit time (David Milburn) [651837]\n- [scsi] isci: Properly handle requests in aborting state (David Milburn) [651837]\n- [scsi] isci: Remove screaming data types (David Milburn) [651837]\n- [scsi] isci: remove unused remote_device_started (David Milburn) [651837]\n- [scsi] isci: namespacecheck cleanups (David Milburn) [651837]\n- [scsi] isci: kill some long macros (David Milburn) [651837]\n- [scsi] isci: reorder init to cleanup unneeded declarations (David Milburn) [651837]\n- [scsi] isci: Remove event_* calls as they are just wrappers (David Milburn) [651837]\n- [scsi] isci: fix apc mode definition (David Milburn) [651837]\n- [scsi] isci: Revert task gating change handled by libsas (David Milburn) [651837]\n- [scsi] isci: reset hardware at init (David Milburn) [651837]\n- [scsi] isci: Revert unneeded error path fixes (David Milburn) [651837]\n- [scsi] isci: misc fixes (David Milburn) [651837]\n- [scsi] isci: add firmware support (David Milburn) [651837]\n- [scsi] isci: lldd support (David Milburn) [651837]\n- [scsi] isci: add core common definitions and utility functions (David Milburn) [651837]\n- [scsi] isci: add core base state machine and memory descriptors (David Milburn) [651837]\n- [scsi] isci: add core unsolicited frame handling and registers (David Milburn) [651837]\n- [scsi] isci: add core request support (David Milburn) [651837]\n- [scsi] isci: add core stp support (David Milburn) [651837]\n- [scsi] isci: add core remote node context support (David Milburn) [651837]\n- [scsi] isci: add core remote device support (David Milburn) [651837]\n- [scsi] isci: add core port support (David Milburn) [651837]\n- [scsi] isci: add core phy support (David Milburn) [651837]\n- [scsi] isci: add core controller support (David Milburn) [651837]\n- [scsi] isci: BZ 651837 Introduce pci_map_biosrom() (David Milburn) [651837]\n- [scsi] qla4xxx: update version to V5.02.04.00.05.07-d0 (Chad Dupuis) [660388]\n- [scsi] qla4xxx: set status_srb NULL if sense_len is 0 (Chad Dupuis) [660388]\n- [scsi] qla4xxx: Initialize host fw_ddb_index_map list (Chad Dupuis) [660388]\n- [scsi] qla4xxx: reuse qla4xxx_mailbox_premature_completion (Chad Dupuis) [660388]\n- [scsi] qla4xxx: check for all reset flags (Chad Dupuis) [660388]\n- [scsi] qla4xxx: added new function qla4xxx_relogin_all_devices (Chad Dupuis) [660388]\n- [scsi] qla4xxx: add support for ql4xkeepalive module parameter (Chad Dupuis) [660388]\n- [scsi] qla4xxx: Add support for ql4xmaxqdepth module parameter (Chad Dupuis) [660388]\n- [scsi] qla4xxx: skip core clock so firmware can increase clock (Chad Dupuis) [660388]\n- [scsi] qla4xxx: copy ipv4 opts and address state to host struct (Chad Dupuis) [660388]\n- [scsi] qla4xxx: check AF_FW_RECOVERY flag for 8022 adapter only (Chad Dupuis) [660388]\n- [scsi] qla4xxx: Change hard coded values to macros (Chad Dupuis) [660388]\n- [scsi] qla4xxx: Change hard coded value of Sense buffer (Chad Dupuis) [660388]\n- [scsi] qla4xxx: Remove stale references to ISP3031 and NetXen (Chad Dupuis) [660388]\n- [scsi] qla4xxx: Correct file header for iscsi (Chad Dupuis) [660388]\n- [scsi] qla4xxx: Add scsi_{,un}block_request while reading flash (Chad Dupuis) [660388]\n- [scsi] qla4xxx: Remove unused code from qla4xxx_send_tgts (Chad Dupuis) [660388]\n- [scsi] qla4xxx: Add proper locking around cmd->host_scribble (Chad Dupuis) [660388]\n- [scsi] qla4xxx: use return status DID_TRANSPORT_DISRUPTED (Chad Dupuis) [660388]\n- [scsi] qla4xxx: remove unused functions and struct parameters (Chad Dupuis) [660388]\n- [scsi] qla4xxx: change char string to static char (Chad Dupuis) [660388]\n- [scsi] qla4xxx: change spin_lock to spin_lock_irqsave (Chad Dupuis) [660388]\n- [scsi] qla4xxx: change hard coded value to a macro (Chad Dupuis) [660388]\n- [scsi] qla4xxx: move qla4xxx_free_ddb_list and scsi_remove_host (Chad Dupuis) [660388]\n- [scsi] qla4xxx: get status from initialize_adapter (Chad Dupuis) [660388]\n- [scsi] qla4xxx: remove extra pci_disable_device call (Chad Dupuis) [660388]\n- [scsi] qla4xxx: Remove unused argument from function prototype (Chad Dupuis) [660388]\n- [scsi] qla4xxx: call qla4xxx_mark_all_devices_missing (Chad Dupuis) [660388]\n- [scsi] qla4xxx: call scsi_scan_target only if AF_ONLINE set (Chad Dupuis) [660388]\n- [scsi] qla4xxx: call scsi_block_request before clearing AF_ONLINE (Chad Dupuis) [660388]\n- [scsi] qla4xxx: Add timer debug print (Chad Dupuis) [660388]\n- [scsi] qla4xxx: use iscsi class session state check ready (Chad Dupuis) [660388]\n- [scsi] qla4xxx: set device state missing only if non-dead state (Chad Dupuis) [660388]\n- [scsi] libiscsi: fix shutdown (Chad Dupuis) [660388]\n- [scsi] qla4xxx: Change function prototype to static (Chad Dupuis) [660388]\n- [scsi] qla4xxx: Fix panic while loading with corrupted 4032 card (Chad Dupuis) [660388]\n- [scsi] qla4xxx: no other port reinit during remove_adapter (Chad Dupuis) [660388]\n- [scsi] qla4xxx: unblock iscsi session before scsi_scan_target (Chad Dupuis) [660388]\n- [scsi] qla4xxx: Fix for dropping of AENs during init time (Chad Dupuis) [660388]\n- [scsi] qla4xxx: Free allocated memory only once (Chad Dupuis) [660388]\n- [scsi] qla4xxx: ignore existing interrupt during mailbox command (Chad Dupuis) [660388]\n- [scsi] qla4xxx: Check connection active before unblocking session (Chad Dupuis) [660388]\n- [scsi] qla4xxx: Poll for Disable Interrupt Mailbox Completion (Chad Dupuis) [660388]\n- [scsi] qla4xxx: fix request_irq to avoid spurious interrupts (Chad Dupuis) [660388]\n- [net] bridge: make bridge address settings sticky (Amerigo Wang) [705997]\n- [net] bridge: allow changing hardware addr to any valid address (Amerigo Wang) [705997]\n- [xen] hvm: build guest timers on monotonic system time (Paolo Bonzini) [705725]\n- [xen] hvm: explicitly use the TSC as the base for the hpet (Paolo Bonzini) [705725]\n- [xen] x86: allow Dom0 to drive PC speaker (Igor Mammedov) [501314]\n- [xen] vtd: Fix resource leaks on error paths in intremap code (Igor Mammedov) [704497]\n\n[2.6.18-262.el5]\n- [block] cciss: reading a write only register causes a hang (Tomas Henzl) [696153]\n\n[2.6.18-261.el5]\n- [message] mptfusion: inline data padding support for TAPE drives (Tomas Henzl) [698073]\n- [powerpc] fix VDSO gettimeofday called with NULL struct timeval (Steve Best) [700203]\n- [fs] gfs2: fix resource group bitmap corruption (Robert S Peterson) [690555]\n- [fs] gfs2: Add dlm callback owed glock flag (Robert S Peterson) [703213]\n- [net] cxgb4: fix some backport bugs (Neil Horman) [700947]\n- [scsi] fnic: fix stats memory leak (Mike Christie) [688459]\n- [block]: fix missing bio back/front segment size setting (Milan Broz) [700546]\n- [net] mlx4: Add CX3 PCI IDs (Jay Fenlason) [660671]\n- [pci] SRIOV: release VF BAR resources when device is hot unplug (Don Dutile) [698879]\n- [virtio] virtio_ring: Decrement avail idx on buffer detach (Amit Shah) [699426]\n- [virtio] virtio_pci: fix double-free of pci regions on unplug (Amit Shah) [701918]\n- Revert: [virtio] console: no device_destroy on port device (Amit Shah) [701918]\n- [xen] hvm: provide param to disable HPET in HVM guests (Paolo Bonzini) [702652]\n- [xen] vtd: Free unused interrupt remapping table entry (Don Dugger) [571410]\n\n[2.6.18-260.el5]\n- [scsi] mpt2sas: prevent heap overflows and unchecked access (Tomas Henzl) [694527] {CVE-2011-1494 CVE-2011-1495}\n- [block] cciss: fix export resettable host attribute fix (Tomas Henzl) [690511]\n- [fs] gfs2: Tag all metadata with jid of last node to change it (Steven Whitehouse) [701577]\n- [fs] nfsd: permit unauthenticated stat of export root (Steve Dickson) [491740]\n- [net] myri10ge: add dynamic LRO disabling (Stanislaw Gruszka) [688897]\n- [wireless] ath5k: disable ASPM L0s for all cards (Stanislaw Gruszka) [666866]\n- [net] igb: work-around for 82576 EEPROMs reporting invalid size (Stefan Assmann) [693934]\n- [pci] aerdrv: use correct bits and add delay to aer_root_reset (Stefan Assmann) [700386]\n- [fs] jbd: fix write_metadata_buffer and get_write_access race (Eric Sandeen) [494927 696843]\n- [x86_64] Disable Advanced RAS/MCE on newer Intel processors (Prarit Bhargava) [697508]\n- [x86_64] vdso: fix gettimeofday segfault when tv == NULL (Prarit Bhargava) [700782]\n- [x86_64] Ignore spurious IPIs left over from crash kernel (Myron Stowe) [692921]\n- [i386] Ignore spurious IPIs left over from crash kernel (Myron Stowe) [692921]\n- [scsi] iscsi_tcp: fix iscsis sk_user_data access (Mike Christie) [677703]\n- [edac] i7core_edac: return -ENODEV if no MC is found (Mauro Carvalho Chehab) [658418]\n- [char] vcs: hook sysfs devices to object lifetime (Mauro Carvalho Chehab) [622542]\n- [char] vt_ioctl: fix VT ioctl race (Mauro Carvalho Chehab) [622542]\n- [fs] avoid vmalloc space error opening many files on x86 (Larry Woodman) [681586]\n- [fs] nfs: Tighten up the attribute update code (Jeff Layton) [672981]\n- [net] bna: Avoid kernel panic in case of FW heartbeat failure (Ivan Vecera) [700488]\n- [net] benet: increment work_counter in be_worker (Ivan Vecera) [695197]\n- [net] benet: be_poll_tx_mcc_compat should always return zero (Ivan Vecera) [690755]\n- [net] benet: Fix be_get_stats_count return value (Ivan Vecera) [690755]\n- [net] tcp: Fix tcp_prequeue to get correct rto_min value (Herbert Xu) [696411]\n- [net] bonding: unshare skbs prior to calling pskb_may_pull (Andy Gospodarek) [607114]\n- [misc] x86: Sync CPU feature flag additions from Xen (Frank Arnold) [687994]\n- [misc] mark various drivers/features as tech preview (Don Zickus) [701722]\n- [hwmon] i5k_amb: Fix compile warning (Dean Nelson) [603345]\n- [hwmon] i5k_amb: Load automatically on all 5000/5400 chipsets (Dean Nelson) [603345]\n- [hwmon] i5k_amb: provide labels for temperature sensors (Dean Nelson) [603345]\n- [hwmod] i5k_amb: support Intel 5400 chipset (Dean Nelson) [603345]\n- [net] bridge/netfilter: fix ebtables information leak (Don Howard) [681326] {CVE-2011-1080}\n- [net] bluetooth: fix sco information leak to userspace (Don Howard) [681311] {CVE-2011-1078}\n- [fs] gfs2: make sure fallocate bytes is a multiple of blksize (Benjamin Marzinski) [699741]\n- [fs] fix corrupted GUID partition table kernel oops (Jerome Marchand) [695980] {CVE-2011-1577}\n- [xen] x86: Enable K8 NOPS for future AMD CPU Families (Frank Arnold) [687994]\n- [xen] x86: Blacklist new AMD CPUID bits for PV domains (Frank Arnold) [687994]\n- [xen] x86: Handle new AMD CPUID bits for HVM guests (Frank Arnold) [687994]\n- [xen] x86: Update AMD CPU feature flags (Frank Arnold) [687994]\n- [xen] x86/domain: fix error checks in arch_set_info_guest (Laszlo Ersek) [688582] {CVE-2011-1166}\n\n[2.6.18-259.el5]\n- [net] bridge: fix initial packet flood if !STP (Jiri Pirko) [695369]\n- [edac] amd64_edac: Fix potential memleak (Mauro Carvalho Chehab) [610235]\n- [edac] amd64_edac, amd64_mce: Revert printk changes (Mauro Carvalho Chehab) [610235]\n- [x86] amd: Fix init_amd build warnings (Frank Arnold) [610235]\n- [edac] amd64_edac: Enable PCI dev detection on F15h (Frank Arnold) [610235]\n- [edac] amd64_edac: Fix decode_syndrome types (Frank Arnold) [610235]\n- [edac] amd64_edac: Fix DCT argument type (Frank Arnold) [610235]\n- [edac] amd64_edac: Fix ranges signedness (Frank Arnold) [610235]\n- [edac] amd64_edac: Drop local variable (Frank Arnold) [610235]\n- [edac] amd64_edac: Fix PCI config addressing types (Frank Arnold) [610235]\n- [edac] amd64_edac: Fix DRAM base macros (Frank Arnold) [610235]\n- [edac] amd64_edac: Fix node id signedness (Frank Arnold) [610235]\n- [edac] amd64_edac: Enable driver on F15h (Frank Arnold) [610235]\n- [edac] amd64_edac: Adjust ECC symbol size to F15h (Frank Arnold) [610235]\n- [edac] amd64_edac: Improve DRAM address mapping (Frank Arnold) [610235]\n- [edac] amd64_edac: Sanitize ->read_dram_ctl_register (Frank Arnold) [610235]\n- [edac] amd64_edac: fix up chip select conversion routine to F15h (Frank Arnold) [610235]\n- [edac] amd64_edac: Beef up early exit reporting (Frank Arnold) [610235]\n- [edac] amd64_edac: Revamp online spare handling (Frank Arnold) [610235]\n- [edac] amd64_edac: Fix channel interleave removal (Frank Arnold) [610235]\n- [edac] amd64_edac: Correct node interleaving removal (Frank Arnold) [610235]\n- [edac] amd64_edac: Add support for interleaved region swapping (Frank Arnold) [610235]\n- [edac] amd64_edac: Unify get_error_address (Frank Arnold) [610235]\n- [edac] amd64_edac: Simplify decoding path (Frank Arnold) [610235]\n- [edac] amd64_edac: Adjust channel counting to F15h (Frank Arnold) [610235]\n- [edac] amd64_edac: Cleanup old defines cruft (Frank Arnold) [610235]\n- [edac] amd64_edac: Cleanup NBSH cruft (Frank Arnold) [610235]\n- [edac] amd64_edac: Cleanup NBCFG handling (Frank Arnold) [610235]\n- [edac] amd64_edac: Cleanup NBCTL code (Frank Arnold) [610235]\n- [edac] amd64_edac: Cleanup DCT Select Low/High code (Frank Arnold) [610235]\n- [edac] amd64_edac: Cleanup Dram Configuration registers handling (Frank Arnold) [610235]\n- [edac] amd64_edac: Cleanup DBAM handling (Frank Arnold) [610235]\n- [edac] amd64_edac: Replace huge bitmasks with a macro (Frank Arnold) [610235]\n- [edac] amd64_edac: Sanitize f10_get_base_addr_offset (Frank Arnold) [610235]\n- [edac] amd64_edac: Sanitize channel extraction (Frank Arnold) [610235]\n- [edac] amd64_edac: Cleanup chipselect handling (Frank Arnold) [610235]\n- [edac] amd64_edac: Cleanup DHAR handling (Frank Arnold) [610235]\n- [edac] amd64_edac: Remove DRAM base/limit subfields caching (Frank Arnold) [610235]\n- [edac] amd64_edac: Add support for F15h DCT PCI config accesses (Frank Arnold) [610235]\n- [edac] amd64_edac: Fix DIMMs per DCTs output (Frank Arnold) [610235]\n- [edac] amd64_edac: Remove two-stage initialization (Frank Arnold) [610235]\n- [edac] amd64_edac: Check ECC capabilities initially (Frank Arnold) [610235]\n- [edac] amd64_edac: Carve out ECC-related hw settings (Frank Arnold) [610235]\n- [edac] amd64_edac: Allocate driver instances dynamically (Frank Arnold) [610235]\n- [edac] amd64_edac: Rework printk macros (Frank Arnold) [610235]\n- [edac] amd64_edac: Rename CPU PCI devices (Frank Arnold) [610235]\n- [edac] amd64_edac: Concentrate per-family init even more (Frank Arnold) [610235]\n- [edac] amd64_edac: Cleanup the CPU PCI device reservation (Frank Arnold) [610235]\n- [edac] amd64_edac: Add per-family init function (Frank Arnold) [610235]\n- [edac] amd64_edac: Remove F11h support (Frank Arnold) [610235]\n- [edac] amd64_edac: Fix interleaving check (Frank Arnold) [610235]\n- [edac] amd64_edac: Fix DCT base address selector (Frank Arnold) [610235]\n- [edac] amd64_edac: Sanitize syndrome extraction (Frank Arnold) [610235]\n- [edac] amd64_edac: fix forcing module load/unload (Frank Arnold) [610235]\n- [edac] amd64_edac: add memory types strings for debugging (Frank Arnold) [610235]\n- [edac] amd64_edac: remove unneeded extract_error_address wrapper (Frank Arnold) [610235]\n- [edac] amd64_edac: rename StinkyIdentifier (Frank Arnold) [610235]\n- [edac] amd64_edac: remove superfluous dbg printk (Frank Arnold) [610235]\n- [edac] amd64_edac: cleanup f10_early_channel_count (Frank Arnold) [610235]\n- [edac] amd64_edac: dump DIMM sizes on K8 too (Frank Arnold) [610235]\n- [edac] amd64_edac: cleanup rest of amd64_dump_misc_regs (Frank Arnold) [610235]\n- [edac] amd64_edac: cleanup DRAM cfg low debug output (Frank Arnold) [610235]\n- [edac] amd64_edac: wrap-up pci config read error handling (Frank Arnold) [610235]\n- [edac] amd64_edac: make DRAM regions output more human-readable (Frank Arnold) [610235]\n- [edac] amd64_edac: clarify DRAM CTL debug reporting (Frank Arnold) [610235]\n- [edac] mce_amd: Fix NB error formatting (Frank Arnold) [659693]\n- [edac] mce_amd: Use BIT_64() to eliminate warnings on 32-bit (Frank Arnold) [659693]\n- [edac] mce_amd: Enable MCE decoding on F15h (Frank Arnold) [659693]\n- [edac] mce_amd: Shorten error report formatting (Frank Arnold) [659693]\n- [edac] mce_amd: Overhaul error fields extraction macros (Frank Arnold) [659693]\n- [edac] mce_amd: Add F15h FP MCE decoder (Frank Arnold) [659693]\n- [edac] mce_amd: Add F15 EX MCE decoder (Frank Arnold) [659693]\n- [edac] mce_amd: Add an F15h NB MCE decoder (Frank Arnold) [659693]\n- [edac] mce_amd: No F15h LS MCE decoder (Frank Arnold) [659693]\n- [edac] mce_amd: Add F15h CU MCE decoder (Frank Arnold) [659693]\n- [edac] mce_amd: Add F15h IC MCE decoder (Frank Arnold) [659693]\n- [edac] mce_amd: Add F15h DC MCE decoder (Frank Arnold) [659693]\n- [edac] mce_amd: Select extended error code mask (Frank Arnold) [659693]\n- [edac] mce_amd: Fix shift warning on 32-bit (Frank Arnold) [659693]\n- [edac] mce_amd: Add a BIT_64() macro (Frank Arnold) [659693]\n- [edac] mce_amd: Enable MCE decoding on F12h (Frank Arnold) [659693]\n- [edac] mce_amd: Add F12h NB MCE decoder (Frank Arnold) [659693]\n- [edac] mce_amd: Add F12h IC MCE decoder (Frank Arnold) [659693]\n- [edac] mce_amd: Add F12h DC MCE decoder (Frank Arnold) [659693]\n- [edac] mce_amd: Add support for F11h MCEs (Frank Arnold) [659693]\n- [edac] mce_amd: Enable MCE decoding on F14h (Frank Arnold) [659693]\n- [edac] mce_amd: Fix FR MCEs decoding (Frank Arnold) [659693]\n- [edac] mce_amd: Complete NB MCE decoders (Frank Arnold) [659693]\n- [edac] mce_amd: Warn about LS MCEs on F14h (Frank Arnold) [659693]\n- [edac] mce_amd: Adjust IC decoders to F14h (Frank Arnold) [659693]\n- [edac] mce_amd: Adjust DC decoders to F14h (Frank Arnold) [659693]\n- [edac] mce_amd: Rename files (Frank Arnold) [659693]\n- [edac] mce_amd: Pass complete MCE info to decoders (Frank Arnold) [659693]\n- [edac] mce_amd: Sanitize error codes (Frank Arnold) [659693]\n- [edac] mce_amd: Remove unused function parameter (Frank Arnold) [659693]\n- [edac] mce_amd: Do not report error overflow as a separate error (Frank Arnold) [659693]\n- [edac] mce_amd: Limit MCE decoding to current families for now (Frank Arnold) [659693]\n- [edac] mce_amd: Fix wrong mask and macro usage (Frank Arnold) [659693]\n- [edac] mce_amd: Filter out invalid values (Frank Arnold) [659693]\n- [edac] mce_amd: silence GART TLB errors (Frank Arnold) [659693]\n- [edac] mce_amd: correct corenum reporting (Frank Arnold) [659693]\n- [edac] mce_amd: update AMD F10h revD check (Frank Arnold) [659693]\n- [edac] mce_amd: Use an atomic notifier for MCEs decoding (Frank Arnold) [659693]\n- [edac] mce_amd: carve out AMD MCE decoding logic (Frank Arnold) [659693]\n- [edac] mce_amd: Fix MCE decoding callback logic (Frank Arnold) [659693]\n\n[2.6.18-258.el5]\n- [block] cciss: fix lost command problem (Tomas Henzl) [696153]\n- [block] cciss: export resettable host attribute (Tomas Henzl) [690511]\n- [powerpc] mm/numa: Disable VPNH feature on pseries (Steve Best) [696328]\n- [wireless] iwlagn: re-enable MSI on resume (Prarit Bhargava) [694672]\n- [fs] cifs: clean up various nits in unicode routines (Jeff Layton) [659715]\n- [fs] cifs: fix unaligned accesses in cifsConvertToUCS (Jeff Layton) [659715]\n- [fs] cifs: clean up unaligned accesses in cifs_unicode.c (Jeff Layton) [659715]\n- [fs] cifs: fix unaligned access in check2ndT2 and coalesce_t2 (Jeff Layton) [659715]\n- [fs] cifs: clean up unaligned accesses in validate_t2 (Jeff Layton) [659715]\n- [fs] cifs: use get/put_unaligned functions to access ByteCount (Jeff Layton) [659715]\n- [net] bridge: fix build warning in br_device (Jarod Wilson) [556811]\n- [scsi] arcmsr: fix broken CONFIG_XEN conditional (Jarod Wilson) [635992]\n- [net] cxgb4: clean up dma_mapping_error usage (Jarod Wilson) [567446]\n- [fs] dcache: Close a race-opportunity in d_splice_alias (David Howells) [646359]\n- [md] dm-crypt: support more encryption modes (Milan Broz) [660368]\n- [crypto] add XTS blockcipher mode support (Danny Feng) [553411]\n- [s390] dasd: fix race between open and offline (Hendrik Brueckner) [695357]\n- [net] netxen: limit skb frags for non tso packet (Chad Dupuis) [672368]\n- [net] qlcnic: limit skb frags for non tso packet (Bob Picco) [695490]\n\n[2.6.18-257.el5]\n- [char] ipmi: dont poll non-existant IPMI Event Message Buffer (Tony Camuso) [578913]\n- [char] ipmi: fix platform return check (Tony Camuso) [578913]\n- [fs] gfs: Never try to deallocate an inode on a read-only mount (Steven Whitehouse) [689943]\n- [infiniband] cxgb4: Initial import of driver to RHEL5 (Steve Best) [567449]\n- [net] cxgb4: Initial import of driver to RHEL5 (Neil Horman) [567446]\n- [net] bond: fix link up after restart (Neil Horman) [659558]\n- [infiniband] cxgb3: Dont free skbs on NET_XMIT_* from LLD (Neil Horman) [516956]\n- [infiniband] cxgb3: Wait 1+ schedule cycle during device removal (Neil Horman) [516956]\n- [infiniband] cxgb3: Mark device with CXIO_ERROR_FATAL on remove (Neil Horman) [516956]\n- [infiniband] cxgb3: Dont allocate the SW queue for user mode CQs (Neil Horman) [516956]\n- [infiniband] cxgb3: Increase the max CQ depth (Neil Horman) [516956]\n- [infiniband] cxgb3: Doorbell overflow avoidance and recovery (Neil Horman) [516956]\n- [infiniband] cxgb3: Remove BUG_ON() on CQ rearm failure (Neil Horman) [516956]\n- [infiniband] cxgb3: Fix error paths in post_send and post_recv (Neil Horman) [516956]\n- [infiniband] cxgb3: Handle NULL inetdev ptr in iwch_query_port (Neil Horman) [516956]\n- [infiniband] cxgb3: Clean up properly on FW mismatch failures (Neil Horman) [516956]\n- [infiniband] cxgb3: Dont ignore insert_handle() failures (Neil Horman) [516956]\n- [infiniband] cxgb3: Wake up any waiters on peer close/abort (Neil Horman) [516956]\n- [infiniband] cxgb3: Dont free endpoints early (Neil Horman) [516956]\n- [net] cxgb3: Handle port events properly (Mike Christie) [516956]\n- [fs] cifs: prevent infinite recursion in cifs_reconnect_tcon (Jeff Layton) [667454]\n- [fs] cifs: consolidate reconnect logic in smb_init routines (Jeff Layton) [667454]\n- [fs] dcache: allow __d_obtain_alias to return unhashed dentries (J. Bruce Fields) [613736]\n\n[2.6.18-256.el5]\n- [scsi] mpt2sas: fix _scsih_is_raid test in _scsih_qcmd (Tomas Henzl) [683806]\n- [scsi] megaraid_sas: add a reset_devices condition (Tomas Henzl) [692099]\n- [net] add socket API recvmmsg, receive multiple messages (Thomas Graf) [582653]\n- [scsi] device_handler: fix ref counting in error path (Mike Snitzer) [645343]\n- [scsi] device_handler: propagate SCSI device deletion (Mike Snitzer) [645343]\n- [net] 8021q: fix VLAN RX stats counting (Stefan Assmann) [579858]\n- [x86_64] vdso: Fix typo in vclock_gettime code (Prarit Bhargava) [691735]\n- [firmware] dmi_scan: Display system information in dmesg (Prarit Bhargava) [692860]\n- [fs] debugfs: Implement debugfs_remove_recursive (Neil Horman) [692946]\n- [redhat] configs: enable building CXGB4_ISCSI (Mike Christie) [567452]\n- [scsi] cxgbi: get rid of gl_skb in cxgbi_ddp_info (Mike Christie) [567452]\n- [scsi] cxgbi: set ulpmode only if digest is on (Mike Christie) [567452]\n- [scsi] cxgb4i: ignore informational act-open-rpl message (Mike Christie) [567452]\n- [scsi] cxgb4i: connection and ddp setting update (Mike Christie) [567452]\n- [scsi] cxgb3i: fixed connection over vlan (Mike Christie) [567452]\n- [scsi] libcxgbi: pdu read fixes (Mike Christie) [567452]\n- [scsi] cxgbi: rename alloc_cpl to alloc_wr (Mike Christie) [567452]\n- [scsi] cxgb3i: change cxgb3i to use libcxgbi (Mike Christie) [567452]\n- [scsi] cxgbi: add cxgb4i iscsi driver (Mike Christie) [567452]\n- [net] bonding: re-read speed and duplex when interface goes up (Andy Gospodarek) [677902]\n- [net] ipv4/tcp_timer: honor sysctl tcp_syn_retries (Flavio Leitner) [688989]\n- [usb] fix usbfs isochronous data transfer regression (Don Zickus) [688926]\n- [fs] partitions: Fix corrupted OSF partition table parsing (Danny Feng) [688023]\n- [misc] add param to change default coredump_filter setup (Dave Anderson) [488840]\n- Revert: [md] dm-crypt: support more encryption modes (Jarod Wilson) [660368]\n- [xen] allow delivery of timer interrupts to VCPU != 0 (Paolo Bonzini) [418501]\n- [xen] x86/hvm: Enable delivering 8259 interrupts to VCPUs != 0 (Paolo Bonzini) [418501]\n- [xen] get rid of the vcpu state in HPET (Paolo Bonzini) [418501]\n- [xen] add accessors for arch/x86/hvm/hpet.c (Paolo Bonzini) [418501]\n\n[2.6.18-255.el5]\n- [net] htb: Make HTB scheduler work with TSO (Thomas Graf) [481546]\n- [fs] cifs: map NT_STATUS_ERROR_WRITE_PROTECTED to -EROFS (Jeff Layton) [516102]\n- [pci] Ensure devices are resumed on system resume (Matthew Garrett) [644440]\n- [fs] ext2, ext3: copy i_flags to inode flags on write (Eric Sandeen) [431738]\n- [fs] gfs2: fix filesystem hang caused by incorrect lock order (Robert S Peterson) [656032]\n- [fs] gfs2: restructure reclaiming of unlinked dinodes (Robert S Peterson) [656032]\n- [fs] gfs2: unlock on gfs2_trans_begin error (Robert S Peterson) [656032]\n- [pci] Add HP BL620c G7 to pci=bfsort whitelist (Prarit Bhargava) [680946]\n- [pci] msi: simplify the msi irq limit policy (Prarit Bhargava) [652799]\n- [scsi] scsi_dh: allow scsi_dh_detach to detach when attached (Mike Christie) [666304]\n- [net] bonding: fix test for presence of VLANs (Jiri Pirko) [654878]\n- [net] 8021q: VLAN 0 should be treated as no vlan tag (Jiri Pirko) [654878]\n- [kernel] module: add sysctl to block module loading (Jerome Marchand) [645221]\n- [fs] nfs: Make close(2) async when closing O_DIRECT files (Jeff Layton) [626977]\n- [fs] nfs: Optimise NFS close() (Jeff Layton) [626977]\n- [fs] nfs: Fix nfsv4 atomic open for execute... (Jeff Layton) [626977]\n- [misc] pm: add comment explaining is_registered kabi work-around (Don Zickus) [637930]\n- [misc] sunrpc: only call get_seconds once in sunrpc_invalidate (David Howells) [589512]\n\n[2.6.18-254.el5]\n- [scsi] mpt2sas: Added customer specific display support (Tomas Henzl) [684842]\n- [scsi] mpt2sas: Add support for WarpDrive SSS-6200 (Tomas Henzl) [683806]\n- [scsi] megaraid: update driver to v5.34 (Tomas Henzl) [660728]\n- [scsi] arcmsr: driver update for RHEL5.7 (Tomas Henzl) [635992]\n- [scsi] scsi_dh_alua: add scalable ONTAP lun to dev list (Mike Snitzer) [667660]\n- [pci] Enable pci=bfsort by default on future Dell systems (Shyam Iyer) [689047]\n- [net] enic: update driver to 2.1.1.9 (Stefan Assmann) [661306]\n- [scsi] bfa: rebase for RHEL5.7 to current scsi-misc version (Rob Evers) [660545]\n- [pci] Enable PCI bus rescan for PPC64 only (Prarit Bhargava) [683461]\n- [net] enable VLAN SG on additional drivers (Paolo Bonzini) [668934]\n- [net] add ethtool -k sg off support for vlans (Paolo Bonzini) [668934]\n- [net] explicitly enable VLAN SG when already in use (Paolo Bonzini) [668934]\n- [net] enable SG on vlan devices if supported on the NIC (Paolo Bonzini) [668934]\n- [net] fix NETIF_F_GSO_MASK to exclude VLAN features (Paolo Bonzini) [668934]\n- [ata] ata_piix: honor ide=disable (Paolo Bonzini) [460821]\n- [scsi] be2iscsi: update driver version string (Mike Christie) [691899]\n- [scsi] be2iscsi: fix null ptr when accessing task hdr (Mike Christie) [660392]\n- [scsi] be2iscsi: fix gfp use in alloc_pdu (Mike Christie) [660392]\n- [scsi] be2iscsi: allow more time for FW to respond (Mike Christie) [660392]\n- [net] ixgbe: restore erratum 45 fix and whitespace (Andy Gospodarek) [568312 568557 570366 571254 651467 653236 653359 653469 655022]\n- [usb] ehci: AMD periodic frame list table quirk (Don Zickus) [651333]\n- [scsi] qla2xxx: Upgrade 24xx and 25xx firmware to 5.03.16 (Chad Dupuis) [682305]\n- [fs] nfsd: fix auth_domain reference leak on nlm operations (J. Bruce Fields) [589512]\n- [net] sunrpc: ensure cache_check caller sees updated entry (J. Bruce Fields) [589512]\n- [net] sunrpc: take lock on turning entry NEGATIVE in cache_check (J. Bruce Fields) [589512]\n- [net] sunrpc: move cache validity check into helper function (J. Bruce Fields) [589512]\n- [net] sunrpc: modifying valid sunrpc cache entries is racy (J. Bruce Fields) [589512]\n- [fs] nfs: extract some common sunrpc_cache code from nfsd (J. Bruce Fields) [589512]\n- [pci] return correct value when writing to reset attribute (Alex Williamson) [689860]\n- [pci] expose function reset capability in sysfs (Alex Williamson) [689860]\n\n[2.6.18-253.el5]\n- [media] sn9c102: fix world-wirtable sysfs files (Don Howard) [679305]\n- [scsi] scsi_dh_rdac: Add two new IBM devices to rdac_dev_list (Rob Evers) [691460]\n- [misc] support for marking code as tech preview (Don Zickus) [645431]\n- [misc] taint: Add taint padding (Don Zickus) [645431]\n- [scsi] lpfc: Update version for 8.2.0.96 driver release (Rob Evers) [660396]\n- [scsi] lpfc: Update version for 8.2.0.95 driver release (Rob Evers) [660396]\n- [scsi] lpfc: Fix rrq cleanup for vport delete (Rob Evers) [660396]\n- [scsi] lpfc: dont ignore lpfc_suppress_link_up on SLI-4 (Rob Evers) [660396]\n- [scsi] lpfc: LOGO completion must invalidate both RPI and D_ID (Rob Evers) [660396]\n- [scsi] lpfc: adds a comment (Rob Evers) [660396]\n- [scsi] lpfc: Do not take lock when clearing rrq active (Rob Evers) [660396]\n- [scsi] lpfc: Fix non-empty nodelist after sli3 driver remove (Rob Evers) [660396]\n- [scsi] lpfc: Save IRQ level when taking host_lock in findnode_did (Rob Evers) [660396]\n- [scsi] lpfc: Fixed hang in lpfc_get_scsi_buf_s4 (Rob Evers) [660396]\n- [scsi] lpfc: Fix xri lookup for received rrq (Rob Evers) [660396]\n- [scsi] lpfc: Fix setting of RRQ active for target aborted IOs (Rob Evers) [660396]\n- [scsi] lpfc: Modified lpfc_delay_discovery implementation (Rob Evers) [660396]\n- [scsi] lpfc: Fix bug with fc_vport symbolic_name not being generated (Rob Evers) [660396]\n- [scsi] lpfc: Update lpfc for 8.2.0.94 driver release (Rob Evers) [660396]\n- [scsi] lpfc: Fixed fdisc sent with invalid VPI (Rob Evers) [660396]\n- [scsi] lpfc: warn if the link_speed is not supported by this adapter (Rob Evers) [660396]\n- [scsi] lpfc: Fixed UE error on UCNA BE2 hba during reboot (Rob Evers) [660396]\n- [scsi] lpfc: Update version for 8.2.0.93 driver release (Rob Evers) [660396]\n- [scsi] lpfc: Added support for clean address bit (Rob Evers) [660396]\n- [scsi] lpfc: Fixed XRI reuse issue (Rob Evers) [660396]\n- [scsi] lpfc: Update version for 8.2.0.92 driver release (Rob Evers) [660396]\n- [scsi] lpfc: Unreg login when PLOGI received from logged in port (Rob Evers) [660396]\n- [scsi] lpfc: Fixed crashes for NULL vport dereference (Rob Evers) [660396]\n- [scsi] lpfc: Update version for 8.2.0.91 driver release (Rob Evers) [660396]\n- [scsi] lpfc: Fix for kmalloc failures in lpfc_workq_post_event (Rob Evers) [660396]\n- [scsi] lpfc: Adjust lengths for sli4_config mailbox commands (Rob Evers) [660396]\n- [scsi] lpfc: set parity and serr bits on after performing sli4 reset (Rob Evers) [660396]\n- [scsi] lpfc: VPI for ALL ELS commands and alloc RPIs at node creation (Rob Evers) [660396]\n- [scsi] lpfc: Correct bit-definitions in SLI4 data structures (Rob Evers) [660396]\n- [scsi] lpfc: Update version for 8.2.0.90 driver release (Rob Evers) [660396]\n- [scsi] lpfc: new SLI4 initialization procedures based on if_type (Rob Evers) [660396]\n- [scsi] lpfc: Implement FC and SLI async event handlers (Rob Evers) [660396]\n- [scsi] lpfc: Fix management command context setting (Rob Evers) [660396]\n- [scsi] lpfc: Fix panic in __lpfc_sli_get_sglq (Rob Evers) [660396]\n- [scsi] lpfc: Update version for 8.2.0.89 driver release (Rob Evers) [660396]\n- [scsi] lpfc: Fix compiler warning (Rob Evers) [660396]\n- [scsi] lpfc: Added support for ELS RRQ command (Rob Evers) [660396]\n- [scsi] lpfc: Init VFI and VPI for physical port (Rob Evers) [660396]\n- [scsi] lpfc: Update version for 8.2.0.88 driver release (Rob Evers) [660396]\n- [scsi] lpfc: add READ_TOPOLOGY mailbox command and new speed definition (Rob Evers) [660396]\n- [scsi] lpfc: Modified return status of unsupport ELS commands (Rob Evers) [660396]\n- [scsi] lpfc: Implement doorbell register changes for new hardware (Rob Evers) [660396]\n- [scsi] lpfc: Implement new SLI 4 SLI_INTF register definitions (Rob Evers) [660396]\n- [scsi] lpfc: Add PCI ID definitions for new hardware support (Rob Evers) [660396]\n- [scsi] lpfc: Add new SLI4 WQE support (Rob Evers) [660396]\n- [net] myri10ge: update to 1.5.2 (Stanislaw Gruszka) [481629]\n- [pci] make pcie_get_readrq visible in pci.h (Stanislaw Gruszka) [481629]\n- [net] igb: AER fix recover from PCIe Uncorrectable Error (Stefan Assmann) [568211]\n- [net] igb: driver update for RHEL5.7 (Stefan Assmann) [653238]\n- [fs] quota: do not allow setting quota limits too high (Eric Sandeen) [594609]\n- [fs] block: fix submit_bh discarding barrier flag on sync write (Lukas Czerner) [667673]\n- [net] netfilter/ipt_CLUSTERIP: fix buffer overflow (Jiri Pirko) [689340]\n- [net] netfilter: ip6_tables: fix infoleak to userspace (Jiri Pirko) [689349] {CVE-2011-1172}\n- [net] netfilter/ip_tables: fix infoleak to userspace (Jiri Pirko) [689332] {CVE-2011-1171}\n- [net] netfilter/arp_tables: fix infoleak to userspace (Jiri Pirko) [689323] {CVE-2011-1170}\n- [sound] alsa: hda driver update for RHEL5.7 (Jaroslav Kysela) [688539]\n- [sound] alsa: add snd-aloop driver (Jaroslav Kysela) [647094]\n- [mmc] sdhci: Add support for O2Micro Card Reader (John Feeney) [659318]\n- [base] Fix potential deadlock in driver core (Don Zickus) [637930]\n- Revert: [crypto] add XTS blockcipher mode support (Jarod Wilson) [553411]\n\n[2.6.18-252.el5]\n- [scsi] add new Dell Powervault controllers to RDAC device list (Shyam Iyer) [688981]\n- [ata] ahci: AHCI mode for Intel Patsburg SATA RAID controller (David Milburn) [684361]\n- [md] dm-crypt: support more encryption modes (Milan Broz) [660368]\n- [crypto] add XTS blockcipher mode support (Danny Feng) [553411]\n- [virt] hypervisor: Overflow fix for clocks > 4GHz (Zachary Amsden) [673242]\n- [net] tg3: Restrict phy ioctl access (John Feeney) [660397]\n- [net] tg3: Update version to 3.116 (John Feeney) [660397]\n- [net] tg3: Minor EEE code tweaks (John Feeney) [660397]\n- [net] tg3: Relax EEE thresholds (John Feeney) [660397]\n- [net] tg3: Fix 57765 EEE support (John Feeney) [660397]\n- [net] tg3: Move EEE definitions into mdio.h (John Feeney) [660397]\n- [net] tg3: Enable phy APD for 5717 and later asic revs (John Feeney) [660397]\n- [net] tg3: use dma_alloc_coherent() instead of pci_alloc_consistent() (John Feeney) [660397]\n- [net] tg3: Reenable TSS for 5719 (John Feeney) [660397]\n- [net] tg3: Enable mult rd DMA engine on 5719 (John Feeney) [660397]\n- [net] tg3: Always turn on APE features in mac_mode reg (John Feeney) [660397]\n- [net] tg3: Dont check for vlan group before vlan_tx_tag_present (John Feeney) [660397]\n- [net] tg3: Update version to 3.115 (John Feeney) [660397]\n- [net] tg3: Report invalid link from tg3_get_settings() (John Feeney) [660397]\n- [net] tg3: Dont allocate jumbo ring for 5780 class devs (John Feeney) [660397]\n- [net] tg3: Cleanup tg3_alloc_rx_skb() (John Feeney) [660397]\n- [net] tg3: Add EEE support (John Feeney) [660397]\n- [net] tg3: Add clause 45 register accessor methods (John Feeney) [660397]\n- [net] tg3: Disable unused transmit rings (John Feeney) [660397]\n- [net] tg3: Add support for selfboot format 1 v6 (John Feeney) [660397]\n- [net] tg3: Update version to 3.114 (John Feeney) [660397]\n- [net] tg3: Add extend rx ring sizes for 5717 and 5719 (John Feeney) [660397]\n- [net] tg3: Prepare for larger rx ring sizes (John Feeney) [660397]\n- [net] tg3: Futureproof the loopback test (John Feeney) [660397]\n- [net] tg3: Cleanup missing VPD partno section (John Feeney) [660397]\n- [net] tg3: Remove 5724 device ID (John Feeney) [660397]\n- [net] tg3: return operator cleanup (John Feeney) [660397]\n- [net] tg3: phy tmp variable roundup (John Feeney) [660397]\n- [net] tg3: Dynamically allocate VPD data memory (John Feeney) [660397]\n- [net] tg3: Use skb_is_gso_v6() (John Feeney) [660397]\n- [net] tg3: Move producer ring struct to tg3_napi (John Feeney) [660397]\n- [net] tg3: Clarify semantics of TG3_IRQ_MAX_VECS (John Feeney) [660397]\n- [net] tg3: Disable TSS (John Feeney) [660397]\n- [net] tg3: Update version to 3.113 (John Feeney) [660397]\n- [net] tg3: Migrate tg3_flags to phy_flags (John Feeney) [660397]\n- [net] tg3: Create phy_flags and migrate phy_is_low_power (John Feeney) [660397]\n- [net] tg3: Add phy-related preprocessor constants (John Feeney) [660397]\n- [net] tg3: Add error reporting to tg3_phydsp_write() (John Feeney) [660397]\n- [net] tg3: Improve small packet performance (John Feeney) [660397]\n- [net] tg3: Remove 5720, 5750, and 5750M (John Feeney) [660397]\n- [net] tg3: Restrict ASPM workaround devlist (John Feeney) [660397]\n- [net] tg3: Manage gphy power for CPMU-less devs only (John Feeney) [660397]\n- [net] tg3: Disable TSS also during tg3_close() (John Feeney) [660397]\n- [net] tg3: Add 5784 ASIC rev to earlier PCIe MPS fix (John Feeney) [660397]\n- [net] tg3: Update version to 3.112 (John Feeney) [660397]\n- [net] tg3: Fix some checkpatch errors (John Feeney) [660397]\n- [net] tg3: Revert PCIe tx glitch fix (John Feeney) [660397]\n- [net] tg3: Report driver version to firmware (John Feeney) [660397]\n- [net] tg3: Relax 5717 serdes restriction (John Feeney) [660397]\n- [net] tg3: Fix single MSI-X vector coalescing (John Feeney) [660397]\n- [net] tg3: Update version to 3.111 (John Feeney) [660397]\n- [net] tg3: Allow 5717 serdes link via parallel detect (John Feeney) [660397]\n- [net] tg3: Allow single MSI-X vector allocations (John Feeney) [660397]\n- [net] tg3: Update version to 3.110 (John Feeney) [660397]\n- [net] tg3: Remove function errors flagged by checkpatch (John Feeney) [660397]\n- [net] tg3: Unify max pkt size preprocessor constants (John Feeney) [660397]\n- [net] tg3: Re-inline VLAN tags when appropriate (John Feeney) [660397]\n- [net] tg3: Optimize rx double copy test (John Feeney) [660397]\n- [net] tg3: Update version to 3.109 (John Feeney) [660397]\n- [net] tg3: Remove tg3_dump_state() (John Feeney) [660397]\n- [net] tg3: Cleanup if codestyle (John Feeney) [660397]\n- [net] tg3: The case of switches (John Feeney) [660397]\n- [net] tg3: Whitespace, constant, and comment updates (John Feeney) [660397]\n- [net] tg3: Use VPD fw version when present (John Feeney) [660397]\n- [net] tg3: Prepare FW version code for VPD versioning (John Feeney) [660397]\n- [net] tg3: Fix message 80 char violations (John Feeney) [660397]\n- [net] tg3: netdev_err() => dev_err() (John Feeney) [660397]\n- [net] tg3: Replace pr_err with sensible alternatives (John Feeney) [660397]\n- [net] tg3: change field used with TG3_FLAG_10_100_ONLY constant (John Feeney) [660397]\n- [net] tg3: Remove now useless VPD code (John Feeney) [660397]\n- [net] tg3: use helper to search for VPD keywords (John Feeney) [660397]\n- [net] tg3: use VPD information field helper functions (John Feeney) [660397]\n- [net] tg3: use helper to find VPD resource data type (John Feeney) [660397]\n- [net] tg3: Add large and small resource data type code (John Feeney) [660397]\n- [net] tg3: Add PCI LRDT tag size and section size (John Feeney) [660397]\n- [net] tg3: convert to use netdev_for_each_mc_addr, part6 (John Feeney) [660397]\nmacro helpers (John Feeney) [660397]\n- [net] bna: Include embedded firmware for RHEL5 (Ivan Vecera) [475690]\n- [net] bna: use device model DMA API (Ivan Vecera) [475690]\n- [net] bna: Remove unnecessary memset 0 (Ivan Vecera) [475690]\n- [net] bna: Update the driver version to 2.3.2.3 (Ivan Vecera) [475690]\n- [net] bna: IOC failure auto recovery fix (Ivan Vecera) [475690]\n- [net] bna: Restore VLAN filter table (Ivan Vecera) [475690]\n- [net] bna: Removed unused code (Ivan Vecera) [475690]\n- [net] bna: IOC uninit check and misc cleanup (Ivan Vecera) [475690]\n- [net] bna: Fix for TX queue (Ivan Vecera) [475690]\n- [net] bna: Enable pure priority tagged packet reception and rxf uninit cleanup fix (Ivan Vecera) [475690]\n- [net] bna: Fix ethtool register dump and reordered an API (Ivan Vecera) [475690]\n- [net] bna: Port enable disable sync and txq priority fix (Ivan Vecera) [475690]\n- [net] bna: TxRx and datapath fix (Ivan Vecera) [475690]\n- [net] bna: scope and dead code cleanup (Ivan Vecera) [475690]\n- [net] bna: fix interrupt handling (Ivan Vecera) [475690]\n- [net] bna: off by one (Ivan Vecera) [475690]\n- [net] bna: Check for NULL before deref in bnad_cb_tx_cleanup (Ivan Vecera) [475690]\n- [net] bna: fix lock imbalance (Ivan Vecera) [475690]\n- [net] bna: fix stats handling (Ivan Vecera) [475690]\n- [net] bna: Fixed build break for allyesconfig (Ivan Vecera) [475690]\n- [net] bna: Brocade 10Gb Ethernet device driver (Ivan Vecera) [475690]\n- [s390] tape: deadlock on global work queue (Hendrik Brueckner) [681329]\n- [s390] qeth: remove needless IPA-commands in offline (Hendrik Brueckner) [679120]\n- [s390] qeth: allow channel path changes in recovery (Hendrik Brueckner) [678073]\n- [s390] qeth: wrong MAC-address displayed in error message (Hendrik Brueckner) [675747]\n- [s390] dasd: Improve handling of stolen DASD reservation (Hendrik Brueckner) [651141]\n- [s390] dasd: provide a Sense Path Group ID ioctl (Hendrik Brueckner) [651135]\n- [s390] qeth: tolerate OLM-limitation (Hendrik Brueckner) [651161]\n- [s390] sclp_vt220: console message may cause deadlock (Hendrik Brueckner) [675751]\n- [s390] uaccess: missing sacf in uaccess error handling (Hendrik Brueckner) [670234]\n- [x86_64] nmi_watchdog: modify default to perf counter 1 (Don Zickus) [633196 659816]\n- [net] qlcnic: Remove validation for max tx and max rx queues (Chad Dupuis) [660390]\n- [net] qlcnic: fix checks for auto_fw_reset (Chad Dupuis) [660390]\n- [net] qlcnic: change module parameter permissions (Chad Dupuis) [660390]\n- [net] qlcnic: fix ethtool diagnostics test (Chad Dupuis) [660390]\n- [net] qlcnic: fix flash fw version read (Chad Dupuis) [660390]\n- [net] qlcnic: Use static const (Chad Dupuis) [660390]\n- [net] qlcnic: reset pci function unconditionally during probe (Chad Dupuis) [660390]\n- [net] qlcnic: fix ocm window register offset calculation (Chad Dupuis) [660390]\n- [net] qlcnic: fix LED test when interface is down. (Chad Dupuis) [660390]\n- [net] qlcnic: Updated driver version to 5.0.13 (Chad Dupuis) [660390]\n- [net] qlcnic: LICENSE file for qlcnic (Chad Dupuis) [660390]\n- [net] qlcnic: validate eswitch config values for PF (Chad Dupuis) [660390]\n- [net] qlcnic: Disable loopback support (Chad Dupuis) [660390]\n- [net] qlcnic: Bumped up driver version to 5.0.12 (Chad Dupuis) [660390]\n- [net] qlcnic: lro module parameter (Chad Dupuis) [660390]\n- [net] qlcnic: Fix driver hang while using qcc application (Chad Dupuis) [660390]\n- [net] qlcnic: lro off message log from set rx checsum (Chad Dupuis) [660390]\n- [net] qlcnic: Add description for CN1000Q adapter (Chad Dupuis) [660390]\n- [net] qlcnic: Allow minimum bandwidth of zero (Chad Dupuis) [660390]\n- [net] qlcnic: fix panic on load (Chad Dupuis) [660390]\n- [net] qlcnic: define valid vlan id range (Chad Dupuis) [660390]\n- [net] qlcnic: reduce rx ring size (Chad Dupuis) [660390]\n- [net] qlcnic: fix mac learning (Chad Dupuis) [660390]\n- [net] qlcnic: update ethtool stats (Chad Dupuis) [660390]\n- [net] qlcnic: update driver version 5.0.11 (Chad Dupuis) [660390]\n- [net] qlcnic: change all P3 references to P3P (Chad Dupuis) [660390]\n- [net] qlcnic: fix promiscous mode for VF (Chad Dupuis) [660390]\n- [net] qlcnic: fix board description (Chad Dupuis) [660390]\n- [net] qlcnic: remove private LRO flag (Chad Dupuis) [660390]\n- [net] qlcnic: support quiescent mode (Chad Dupuis) [660390]\n- [net] qlcnic: remove dead code (Chad Dupuis) [660390]\n- [net] qlcnic: set mtu lower limit (Chad Dupuis) [660390]\n- [net] qlcnic: cleanup port mode setting (Chad Dupuis) [660390]\n- [net] qlcnic: sparse warning fixes (Chad Dupuis) [660390]\n- [net] qlcnic: fix vlan TSO on big endian machine (Chad Dupuis) [660390]\n- [net] qlcnic: fix endianess for lro (Chad Dupuis) [660390]\n- [net] qlcnic: fix diag register (Chad Dupuis) [660390]\n- [net] qlcnic: fix eswitch stats (Chad Dupuis) [660390]\n- [net] qlcnic: fix internal loopback test (Chad Dupuis) [660390]\n- [net] qlcnic: return operator cleanup (Chad Dupuis) [660390]\n- [net] qlcnic: dont set skb->truesize (Chad Dupuis) [660390]\n- [net] qlcnic: dont assume NET_IP_ALIGN is 2 (Chad Dupuis) [660390]\n- [net] qlcnic: update version 5.0.10 (Chad Dupuis) [660390]\n- [net] qlcnic: remove fw version check (Chad Dupuis) [660390]\n- [net] qlcnic: vlan lro support (Chad Dupuis) [660390]\n- [net] qlcnic: vlan gro support (Chad Dupuis) [660390]\n- [net] qlcnic: support vlan rx accleration (Chad Dupuis) [660390]\n- [net] qlcnic: add cksum flag (Chad Dupuis) [660390]\n- [net] qlcnic: mac vlan learning support (Chad Dupuis) [660390]\n- [net] qlcnic: support mac learning (Chad Dupuis) [660390]\n- [net] qlcnic: fix mac override capability (Chad Dupuis) [660390]\n- [net] qlcnic: fix panic while using eth_hdr (Chad Dupuis) [660390]\n- [net] qlcnic: fix mac anti spoof policy (Chad Dupuis) [660390]\n- [net] qlcnic: fix for setting default eswitch config (Chad Dupuis) [660390]\n- [net] qlcnic: fix mac addr read (Chad Dupuis) [660390]\n- [net] qlcnic: add api version in reg dump (Chad Dupuis) [660390]\n- [net] qlcnic: backout firmware initialization update (Chad Dupuis) [660390]\n- [net] qlnic: fix a race in qlcnic_get_stats (Chad Dupuis) [660390]\n- [net] qlcnic: PCI ID addition (Chad Dupuis) [660390]\n- [net] qlcnic: Fix driver load issue in FW hang (Chad Dupuis) [660390]\n- [net] qlcnic: change reg name (Chad Dupuis) [660390]\n- [net] qlcnic: fix fw recovery for PF (Chad Dupuis) [660390]\n- [net] qlcnic: support port vlan id (Chad Dupuis) [660390]\n- [net] qlcnic: eswitch config fixes (Chad Dupuis) [660390]\n- [net] qlcnic: update version 5.0.8 (Chad Dupuis) [660390]\n- [net] qlcnic: rom lock recovery (Chad Dupuis) [660390]\n- [net] qlcnic: firmware initialization update (Chad Dupuis) [660390]\n- [net] qlcnic: fix endiness in eswitch statistics (Chad Dupuis) [660390]\n- [net] qlcnic: mark device state as failed (Chad Dupuis) [660390]\n- [net] qlcnic: fix npar state (Chad Dupuis) [660390]\n- [net] qlcnic: support anti mac spoofing (Chad Dupuis) [660390]\n- [net] qlcnic: configure offload setting on eswitch (Chad Dupuis) [660390]\n- [net] qlcnic: configure port on eswitch (Chad Dupuis) [660390]\n- [net] qlcnic: replace magic numbers with defines (Chad Dupuis) [660390]\n- [net] qlcnic: remove unused code (Chad Dupuis) [660390]\n- [net] qlcnic: fix inconsistent lock state (Chad Dupuis) [660390]\n- [net] qlcnic: Use available error codes (Chad Dupuis) [660390]\n- [net] qlcnic: turn off lro when rxcsum is disabled (Chad Dupuis) [660390]\n- [net] qlcnic: fix link diag test (Chad Dupuis) [660390]\n- [net] qlcnic: fix link status message (Chad Dupuis) [660390]\n- [net] qlcnic: add eswitch statistics support (Chad Dupuis) [660390]\n- [net] qlcnic: fix for setting function modes (Chad Dupuis) [660390]\n- [net] qlcnic: device state management fixes for virtual func (Chad Dupuis) [660390]\n- [net] qlcnic: fix aer for virtual func (Chad Dupuis) [660390]\n- [net] qlcnic: using too much stack (Chad Dupuis) [660390]\n- [net] qlcnic: clean up qlcnic_init_pci_info (Chad Dupuis) [660390]\n- [net] qlcnic: fix copyright for pci searching function (Chad Dupuis) [660390]\n- [net] netxen: support for GbE port settings (Chad Dupuis) [660437]\n- [net] netxen: Notify firmware of Flex-10 interface down (Chad Dupuis) [660437]\n- [net] netxen: update driver version 4.0.75 (Chad Dupuis) [660437]\n- [net] netxen: enable LRO based on NETIF_F_LRO (Chad Dupuis) [660437]\n- [net] netxen: update module description (Chad Dupuis) [660437]\n- [net] netxen: Use static const (Chad Dupuis) [660437]\n- [net] netxen: remove unused firmware exports (Chad Dupuis) [660437]\n- [net] netxen: Fix tx queue manipulation bug in netxen_nic_probe (Chad Dupuis) [660437]\n- [net] netxen: make local function static (Chad Dupuis) [660437]\n- [net] netxen: mask correctable error (Chad Dupuis) [660437]\n- [net] netxen: fix race in tx stop queue (Chad Dupuis) [660437]\n- [net] netxen: return operator cleanup (Chad Dupuis) [660437]\n- [net] netxen: dont set skb->truesize (Chad Dupuis) [660437]\n\n[2.6.18-251.el5]\n- [net] benet: Bump up the version number (Ivan Vecera) [660389]\n- [net] benet: Copyright notice change. Update to Emulex instead of ServerEngines (Ivan Vecera) [660389]\n- [net] benet: Fix UDP packet detected status in RX compl (Ivan Vecera) [660389]\n- [net] benet: changes for BE3 native mode support (Ivan Vecera) [660389]\n- [net] benet: Add multicast filter capability for Lancer (Ivan Vecera) [660389]\n- [net] benet: Disarm CQ and EQ to disable interrupt in Lancer (Ivan Vecera) [660389]\n- [net] benet: Remove TX Queue stop in close (Ivan Vecera) [660389]\n- [net] benet: Change f/w command versions for Lancer (Ivan Vecera) [660389]\n- [net] benet: Add error recovery during load for Lancer (Ivan Vecera) [660389]\n- [net] benet: Checksum field valid only for TCP/UDP (Ivan Vecera) [660389]\n- [net] benet: Remove ERR compl workaround for Lancer (Ivan Vecera) [660389]\n- [net] benet: use GFP_KERNEL allocations when possible (Ivan Vecera) [660389]\n- [net] benet: use hba_port_num instead of port_num (Ivan Vecera) [660389]\n- [net] benet: add code to display temperature of ASIC (Ivan Vecera) [660389]\n- [net] benet: fix to ignore transparent vlan ids wrongly indicated by NIC (Ivan Vecera) [660389]\n- [net] benet: variable name change (Ivan Vecera) [660389]\n- [net] benet: fixes in ethtool selftest (Ivan Vecera) [660389]\n- [net] benet: add new counters to display via ethtool stats (Ivan Vecera) [660389]\n- [net] benet: restrict WOL to PFs only. (Ivan Vecera) [660389]\n- [net] benet: detect a UE even when a interface is down. (Ivan Vecera) [660389]\n- [net] benet: gracefully handle situations when UE is detected (Ivan Vecera) [660389]\n- [net] benet: fix be_suspend/resume/shutdown (Ivan Vecera) [660389]\n- [net] benet: pass proper hdr_size while flashing redboot. (Ivan Vecera) [660389]\n- [net] benet: Fix broken priority setting when vlan tagging is enabled. (Ivan Vecera) [660389]\n- [net] benet: Allow VFs to call be_cmd_reset_function. (Ivan Vecera) [660389]\n- [net] benet: pass domain numbers for pmac_add/del functions (Ivan Vecera) [660389]\n- [net] benet: For the VF MAC, use the OUI from current MAC address (Ivan Vecera) [660389]\n- [net] benet: Cleanup the VF interface handles (Ivan Vecera) [660389]\n- [net] benet: call be_vf_eth_addr_config() after register_netdev (Ivan Vecera) [660389]\n- [net] benet: Initialize and cleanup sriov resources only if pci_enable_sriov has succeeded. (Ivan Vecera) [660389]\n- [net] benet: Use domain id when be_cmd_if_destroy is called. (Ivan Vecera) [660389]\n- [net] benet: Avoid null deref in be_cmd_get_seeprom_data (Ivan Vecera) [660389]\n- [net] benet: use device model DMA API (Ivan Vecera) [660389]\n- [net] benet: remove netif_stop_queue being called before register_netdev. (Ivan Vecera) [660389]\n- [net] benet: fix a crash seen during insmod/rmmod test (Ivan Vecera) [660389]\n- [net] benet: Use static const (Ivan Vecera) [660389]\n- [net] benet: use mutex instead of spin lock for mbox_lock (Ivan Vecera) [660389]\n- [net] benet: Handle out of buffer completions for lancer (Ivan Vecera) [660389]\n- [net] benet: FW init cmd fix for lancer (Ivan Vecera) [660389]\n- [net] benet: Fix be_dev_family_check() return value check (Ivan Vecera) [660389]\n- [net] benet: Fix too optimistic NETIF_F_HW_CSUM features (Ivan Vecera) [660389]\n- [net] benet: adding support for Lancer family of CNAs (Ivan Vecera) [660389]\n- [net] benet: remove dead code (Ivan Vecera) [660389]\n- [net] benet: Changes to use only priority codes allowed by f/w (Ivan Vecera) [660389]\n- [net] benet: add multiple RX queue support (Ivan Vecera) [660389]\n- [net] benet: fix tx completion polling (Ivan Vecera) [660389]\n- [net] benet: use Rx and Tx queues like upstream (Ivan Vecera) [660389]\n- [net] benet: return operator cleanup (Ivan Vecera) [660389]\n- [net] benet: fix a bug in UE detection logic (Ivan Vecera) [660389]\n- [net] benet: fix net-snmp error because of wrong packet stats (Ivan Vecera) [660389]\n- [net] benet: stats for packets received due to internal switching in ASIC. (Ivan Vecera) [660389]\n- [net] benet: fix to avoid sending get_stats request if one is already being processed. (Ivan Vecera) [660389]\n- [net] benet: change to show correct physical link status (Ivan Vecera) [660389]\n- [net] benet: add code to dump registers for debug (Ivan Vecera) [660389]\n- [net] benet: bump the driver version number (Ivan Vecera) [660389]\n- [net] benet: variable name changes (Ivan Vecera) [660389]\n- [net] benet: supress printing error when mac query fails for VF (Ivan Vecera) [660389]\n- [net] benet: Patch to determine if function is VF while running in guest OS. (Ivan Vecera) [660389]\n- [net] benet: enable ipv6 tso support (Ivan Vecera) [660389]\n- [net] benet: fix typos concerning management (Ivan Vecera) [660389]\n- [net] benet: Remove unnecessary returns from void functions (Ivan Vecera) [660389]\n- [net] benet: use skb_headlen() (Ivan Vecera) [660389]\n- [net] benet: clarify promiscuous cmd with a comment (Ivan Vecera) [660389]\n- [net] benet: Fix compile warnnings in drivers/net/benet/be_ethtool.c (Ivan Vecera) [660389]\n- [net] ixgbe: update to upstream version 3.2.9-k2 (Andy Gospodarek) [568312 568557 570366 571254 651467 653236 653359 653469 655022]\n- [misc] vlan: Add function to get EtherType from vlan packets (Andy Gospodarek) [568312 568557 570366 571254 651467 653236 653359 653469 655022]\n- [net] support for NETIF_F_HIGHDMA on vlan interfaces (Andy Gospodarek) [568312 568557 570366 571254 651467 653236 653359 653469 655022]\n- [scsi] bnx2i: Updated to version 2.6.2.3 (Mike Christie) [660406]\n- [scsi] bnx2i: Updated version to 2.6.2.2 (Mike Christie) [660406]\n- [scsi] bnx2i: Added iSCSI text pdu support for iSCSI offload (Mike Christie) [660406]\n- [scsi] bnx2i: Added jumbo MTU support for the no shost case (Mike Christie) [660406]\n- [scsi] bnx2i: Added support for the 57712(E) devices (Mike Christie) [660406]\n- [scsi] bnx2i: Added handling for unsupported iSCSI offload hba (Mike Christie) [660406]\n- [scsi] bnx2i: Fixed the 32-bit swapping of the LUN field for nopouts for 5771X (Mike Christie) [660406]\n- [scsi] bnx2i: Allow ep CONNECT_FAILED condition to go through proper cleanup (Mike Christie) [660406]\n- [scsi] bnx2i: Added reconnect fix connecting against Lefthand targets (Mike Christie) [660406]\n- [scsi] bnx2i: Cleaned up various error conditions in ep_connect/disconnect (Mike Christie) [660406]\n- [scsi] bnx2i: Added return code check for chip kwqe submission request (Mike Christie) [660406]\n- [scsi] bnx2i: Modified the bnx2i stop path to compensate for in progress ops (Mike Christie) [660406]\n- [scsi] bnx2i: Removed the dynamic registration of CNIC (Mike Christie) [660406]\n- [scsi] bnx2i: Added mutex lock protection to conn_get_param (Mike Christie) [660406]\n- [net] cnic: Fix lost interrupt on bnx2x (Mike Christie) [660430]\n- [net] cnic: Prevent status block race conditions with hardware (Mike Christie) [660430]\n- [net] bnx2x, cnic: Consolidate iSCSI/FCoE shared mem logic in bnx2x (Mike Christie) [660430]\n- [net] cnic: Fix the type field in SPQ messages (Mike Christie) [660430]\n- [net] cnic: Do not call bnx2i when bnx2i is calling cnic_unregister_driver() (Mike Christie) [660430]\n- [net] cnic: Do not allow iSCSI and FCoE on bnx2x multi-function mode (Mike Christie) [660430]\n- [net] cnic: fix mem leak on alloc fail in cnic_alloc_uio_rings (Mike Christie) [660430]\n- [net] cnic: Add FCoE support on 57712 (Mike Christie) [660430]\n- [net] cnic: Add kcq2 support on 57712 (Mike Christie) [660430]\n- [net] cnic: Call cm_connect_complete() immediately on error (Mike Christie) [660430]\n- [net] cnic: Check device state before reading the kcq pointer in IRQ (Mike Christie) [660430]\n- [net] cnic: Support NIC Partition mode (Mike Christie) [660430]\n- [net] cnic: Use proper client and connection IDs on iSCSI ring (Mike Christie) [660430]\n- [net] cnic: Improve ->iscsi_nl_msg_send() (Mike Christie) [660430]\n- [net] cnic: Prevent 'scheduling while atomic' when calling ->cnic_init() (Mike Christie) [660430]\n- [net] cnic: Fix iSCSI TCP port endian order. (Mike Christie) [660430]\n- [net] cnic: Remove unnecessary semicolons (Mike Christie) [660430]\n- [net] cnic: Add support for 57712 device (Mike Christie) [660430]\n- [net] cnic: Decouple uio close from cnic shutdown (Mike Christie) [660430]\n- [net] cnic: Add cnic_uio_dev struct (Mike Christie) [660430]\n- [net] cnic: Add cnic_free_uio() (Mike Christie) [660430]\n- [net] cnic: Defer iscsi connection cleanup (Mike Christie) [660430]\n- [net] cnic: Add cnic_bnx2x_destroy_ramrod() (Mike Christie) [660430]\n- [net] cnic: Convert ctx_flags to bit fields (Mike Christie) [660430]\n- [net] cnic: Add common cnic_request_irq() (Mike Christie) [660430]\n- [net] bnx2x, cnic: Fix SPQ return credit (Mike Christie) [660430]\n- [char] Enable and extend Legacy PTY support for 4096 device pairs (Mauro Carvalho Chehab) [582776]\n- [fs] ioctl: make fiemap map at least a blocksize amount (Josef Bacik) [663041]\n- [net] forcedeth/r8169: call netif_carrier_off at end of probe (Ivan Vecera) [664705 664707]\n- [net] ixgbevf: update to upstream version 2.0.0-k2 (Andy Gospodarek) [653237]\n- [net] e1000e: update to upstream version 1.3.10 (Andy Gospodarek) [653242 653548]\n- [x86] amd: Extend support to future families (Frank Arnold) [682835]\n- [x86] smpboot: Use compute unit info to determine thread siblings (Frank Arnold) [682835]\n- [x86] amd: Extract compute unit information for AMD CPUs (Frank Arnold) [682835]\n- [x86] amd: Add support for CPUID topology extension of AMD CPUs (Frank Arnold) [682835]\n- [x86] cpufeature: Update AMD CPUID feature bits (Frank Arnold) [682835]\n- [x86_64] Support NMI watchdog on newer AMD CPU families (Frank Arnold) [682835]\n- [net] ixgbe: fix for 82599 erratum on Header Splitting (Andy Gospodarek) [680531]\n- [net] ixgbe: limit VF access to network traffic (Andy Gospodarek) [680531]\n- [net] igbvf driver update for RHEL5.7 (Stefan Assmann) [653241]\n- [fs] ext3: Always set dx_nodes fake_dirent explicitly (Eric Sandeen) [662838]\n- [virt] xen/netback: signal front-end close event via udev (Paolo Bonzini) [661985]\n- [net] bnx2x: fix swap of rx-ticks and tx-ticks parameters in interrupt coalescing flow (Michal Schmidt) [629609 651546 653357 656360]\n- [net] bnx2x: fix MaxBW configuration (Michal Schmidt) [629609 651546 653357 656360]\n- [net] bnx2x: (NPAR) prevent HW access in D3 state (Michal Schmidt) [629609 651546 653357 656360]\n- [net] bnx2x: fix link notification (Michal Schmidt) [629609 651546 653357 656360]\n- [net] bnx2x: fix non-pmf device load flow (Michal Schmidt) [629609 651546 653357 656360]\n- [net] bnx2x: update driver version to 1.62.00-6 (Michal Schmidt) [629609 651546 653357 656360]\n- [net] bnx2x: properly calculate lro_mss (Michal Schmidt) [629609 651546 653357 656360]\n- [net] bnx2x: perform statistics 'action' before state transition. (Michal Schmidt) [629609 651546 653357 656360]\n- [net] bnx2x: properly configure coefficients for MinBW algorithm (NPAR mode). (Michal Schmidt) [629609 651546 653357 656360]\n- [net] bnx2x: Fix ethtool -t link test for MF (non-pmf) devices. (Michal Schmidt) [629609 651546 653357 656360]\n- [net] bnx2x: Fix nvram test for single port devices. (Michal Schmidt) [629609 651546 653357 656360]\n- [net] bnx2x: (NPAR mode) Fix FW initialization (Michal Schmidt) [629609 651546 653357 656360]\n- [net] bnx2x: Add a missing bit for PXP parity register of 57712. (Michal Schmidt) [629609 651546 653357 656360]\n- [net] bnx2x: Duplication in promisc mode (Michal Schmidt) [629609 651546 653357 656360]\n- [net] bnx2x: multicasts in NPAR mode (Michal Schmidt) [629609 651546 653357 656360]\n- [net] bnx2x: Update bnx2x version to 1.62.00-5 (Michal Schmidt) [629609 651546 653357 656360]\n- [net] bnx2x: Fix potential link loss in multi-function mode (Michal Schmidt) [629609 651546 653357 656360]\n- [net] bnx2x: Fix port swap for BCM8073 (Michal Schmidt) [629609 651546 653357 656360]\n- [net] bnx2x: Fix LED blink rate on BCM84823 (Michal Schmidt) [629609 651546 653357 656360]\n- [net] bnx2x: Remove setting XAUI low-power for BCM8073 (Michal Schmidt) [629609 651546 653357 656360]\n- [net] bnx2x: Update bnx2x version to 1.62.00-4 (Michal Schmidt) [629609 651546 653357 656360]\n- [net] bnx2x: Fix AER setting for BCM57712 (Michal Schmidt) [629609 651546 653357 656360]\n- [net] bnx2x: Fix BCM84823 LED behavior (Michal Schmidt) [629609 651546 653357 656360]\n- [net] bnx2x: Mark full duplex on some external PHYs (Michal Schmidt) [629609 651546 653357 656360]\n- [net] bnx2x: Fix BCM8073/BCM8727 microcode loading (Michal Schmidt) [629609 651546 653357 656360]\n- [net] bnx2x: LED fix for BCM8727 over BCM57712 (Michal Schmidt) [629609 651546 653357 656360]\n- [net] bnx2x: Common init will be executed only once after POR (Michal Schmidt) [629609 651546 653357 656360]\n- [net] bnx2x: Swap BCM8073 PHY polarity if required (Michal Schmidt) [629609 651546 653357 656360]\n- [net] bnx2x: fix typos (Michal Schmidt) [629609 651546 653357 656360]\n- [net] bnx2x: Fix the race on bp->stats_pending. (Michal Schmidt) [629609 651546 653357 656360]\n- [net] bnx2x: Move to D0 before clearing MSI/MSI-X configuration. (Michal Schmidt) [629609 651546 653357 656360]\n- [net] bnx2x: registers dump fixes (Michal Schmidt) [629609 651546 653357 656360]\n- [net] bnx2x: Dont prevent RSS configuration in INT#x and MSI interrupt modes. (Michal Schmidt) [629609 651546 653357 656360]\n- [net] bnx2x: adding dcbnl support (Michal Schmidt) [629609 651546 653357 656360]\n- [net] bnx2x: Use static const (Michal Schmidt) [629609 651546 653357 656360]\n- [net] bnx2x: remove bogus check (Michal Schmidt) [629609 651546 653357 656360]\n- [net] bnx2x: update version to 1.62.00-2 (Michal Schmidt) [629609 651546 653357 656360]\n- [net] bnx2x: update firmware to 6.2.5.0 (Michal Schmidt) [629609 651546 653357 656360]\n- [net] bnx2x: bnx2x_request_firmware update for 6.2.5.0 (Michal Schmidt) [629609 651546 653357 656360]\n- [net] bnx2x: replace FW to 6.2.5 (Michal Schmidt) [629609 651546 653357 656360]\n- [net] bnx2x: Add DCB/PFC support - link layer (Michal Schmidt) [629609 651546 653357 656360]\n- [net] bnx2x: add DCB support (Michal Schmidt) [629609 651546 653357 656360]\n- [net] bnx2x: Disable FCoE ring, NETDEV_HW_ADDR_T_SAN for RHEL5.7. (Michal Schmidt) [629609 651546 653357 656360]\n- [net] bnx2x: add FCoE ring (Michal Schmidt) [629609 651546 653357 656360]\n- [net] bnx2x: Update version number and a date. (Michal Schmidt) [629609 651546 653357 656360]\n- [net] bnx2x: Fixed a compilation warning (Michal Schmidt) [629609 651546 653357 656360]\n- [net] bnx2x: Use dma_alloc_coherent() semantics for ILT memory allocation (Michal Schmidt) [629609 651546 653357 656360]\n- [net] bnx2x: LSO code was broken on BE platforms (Michal Schmidt) [629609 651546 653357 656360]\n- [net] bnx2x: Add Nic partitioning mode (57712 devices) (Michal Schmidt) [629609 651546 653357 656360]\n- [net] bnx2x: Use helpers instead of direct access to the shinfo(skb) fields (Michal Schmidt) [629609 651546 653357 656360]\n- [net] bnx2x: Do interrupt mode initialization and NAPIs adding before register_netdev() (Michal Schmidt) [629609 651546 653357 656360]\n- [net] bnx2x: Disable local BHes to prevent a dead-lock situation (Michal Schmidt) [629609 651546 653357 656360]\n- [net] bnx2x: fix error value sign (Michal Schmidt) [629609 651546 653357 656360]\n- [net] bnx2x: Remove unnecessary semicolons (Michal Schmidt) [629609 651546 653357 656360]\n- [net] bnx2x: Update version number (Michal Schmidt) [629609 651546 653357 656360]\n- [net] bnx2x: Reset 8073 phy during common init (Michal Schmidt) [629609 651546 653357 656360]\n- [net] bnx2x: Do not enable CL37 BAM unless it is explicitly enabled (Michal Schmidt) [629609 651546 653357 656360]\n- [net] bnx2x: Fix resetting BCM8726 PHY during common init (Michal Schmidt) [629609 651546 653357 656360]\n- [net] bnx2x: Clear latch indication on link reset (Michal Schmidt) [629609 651546 653357 656360]\n- [net] bnx2x: Fix port selection in case of E2 (Michal Schmidt) [629609 651546 653357 656360]\n- [net] bnx2x: Fix waiting for reset complete on BCM848x3 PHYs (Michal Schmidt) [629609 651546 653357 656360]\n- [net] bnx2x: Restore appropriate delay during BMAC reset (Michal Schmidt) [629609 651546 653357 656360]\n- [net] bnx2x: make local function static and remove dead code (Michal Schmidt) [629609 651546 653357 656360]\n- [net] bnx2x: remove BCM_VLAN (Michal Schmidt) [629609 651546 653357 656360]\n- [net] bnx2x: Dont check for vlan group before vlan_tx_tag_present. (Michal Schmidt) [629609 651546 653357 656360]\n- [net] bnx2x: update version to 1.60.00-3 (Michal Schmidt) [629609 651546 653357 656360]\n- [net] bnx2x: prevent false parity error in MSI-X memory of HC block (Michal Schmidt) [629609 651546 653357 656360]\n- [net] bnx2x: fix possible deadlock in HC hw block (Michal Schmidt) [629609 651546 653357 656360]\n- [net] bnx2x: update version to 1.60.00-2 (Michal Schmidt) [629609 651546 653357 656360]\n- [net] bnx2x: remove unnecessary FUNC_FLG_RSS flag and related (Michal Schmidt) [629609 651546 653357 656360]\n- [net] bnx2x: Use correct FW constant for header padding (Michal Schmidt) [629609 651546 653357 656360]\n- [net] bnx2x: do not deal with power if no capability (Michal Schmidt) [629609 651546 653357 656360]\n- [net] bnx2x: remove redundant commands during error handling (Michal Schmidt) [629609 651546 653357 656360]\n- [net] bnx2x: Optimized the branching in the bnx2x_rx_int() (Michal Schmidt) [629609 651546 653357 656360]\n- [net] bnx2x: Fixing a typo: added a missing RSS enablement (Michal Schmidt) [629609 651546 653357 656360]\n- [net] bnx2x: update version to 1.60.00-1 (Michal Schmidt) [629609 651546 653357 656360]\n- [net] bnx2x: properly initialize FW stats (Michal Schmidt) [629609 651546 653357 656360]\n- [net] bnx2x: code beautify (Michal Schmidt) [629609 651546 653357 656360]\n- [net] bnx2x: Fix SPQ return credit (Michal Schmidt) [629609 651546 653357 656360]\n- [net] bnx2x: move msix table initialization to probe() (Michal Schmidt) [629609 651546 653357 656360]\n- [net] bnx2x: use L1_CACHE_BYTES instead of magic number (Michal Schmidt) [629609 651546 653357 656360]\n- [net] bnx2x: remove unused fields in main driver structure (Michal Schmidt) [629609 651546 653357 656360]\n- [net] bnx2x: remove unused parameter in reuse_rx_skb() (Michal Schmidt) [629609 651546 653357 656360]\n- [net] bnx2x: Add 57712 support (Michal Schmidt) [629609 651546 653357 656360]\n- [net] bnx2x: change type of spq_left to atomic (Michal Schmidt) [629609 651546 653357 656360]\n- [net] bnx2x: Protect statistics ramrod and sequence number (Michal Schmidt) [629609 651546 653357 656360]\n- [net] bnx2x: rename MF related fields (Michal Schmidt) [629609 651546 653357 656360]\n- [net] bnx2x: firmware naming from upstream (Michal Schmidt) [629609 651546 653357 656360]\n- [net] bnx2x: whitespaces like in upstream, remove some #if0 lines (Michal Schmidt) [629609 651546 653357 656360]\n- [net] bnx2x: use netdev_for_each_mc_addr (Michal Schmidt) [629609 651546 653357 656360]\n- [misc] netdevice.h: add netdev_mc_count (Michal Schmidt) [629609 651546 653357 656360]\n- [net] bnx2x: use trivial wrappers around get_sset_count (Michal Schmidt) [629609 651546 653357 656360]\n- [net] bnx2x: remove a few pointless differences from upstream (Michal Schmidt) [629609 651546 653357 656360]\n- [net] bnx2x: bnx2x_alloc_napi cleanup, caller more similar to upstream (Michal Schmidt) [629609 651546 653357 656360]\n- [net] bnx2x: remove bnx2x_init_values.h (Michal Schmidt) [629609 651546 653357 656360]\n- [net] bnx2x, cnic, bnx2i: use new FW/HSI (Michal Schmidt) [629609 651546 653357 656360]\n- [net] bnx2x: Moved enabling of MSI to the bnx2x_set_num_queues() (Michal Schmidt) [629609 651546 653357 656360]\n- [net] bnx2x: Use netif_set_real_num_{rx, tx}_queues() (Michal Schmidt) [629609 651546 653357 656360]\n- [net] bnx2x: return operator cleanup (Michal Schmidt) [629609 651546 653357 656360]\n- [net] bnx2x: Spread rx buffers between allocated queues (Michal Schmidt) [629609 651546 653357 656360]\n- [net] bnx2x: use ARRAY_SIZE macro in bnx2x_main.c (Michal Schmidt) [629609 651546 653357 656360]\n- [net] bnx2x: Update bnx2x version to 1.52.53-6 (Michal Schmidt) [629609 651546 653357 656360]\n- [net] bnx2x: Change LED scheme for dual-media (Michal Schmidt) [629609 651546 653357 656360]\n- [net] bnx2x: Add dual-media changes (Michal Schmidt) [629609 651546 653357 656360]\n- [net] bnx2x: Organize PHY functions (Michal Schmidt) [629609 651546 653357 656360]\n- [net] bnx2x: Apply logic changes for the new scheme (Michal Schmidt) [629609 651546 653357 656360]\n- [net] bnx2x: Move common function into aggregated function (Michal Schmidt) [629609 651546 653357 656360]\n- [net] bnx2x: Adjust flow-control with the new scheme (Michal Schmidt) [629609 651546 653357 656360]\n- [net] bnx2x: Adjust alignment of split PHY functions (Michal Schmidt) [629609 651546 653357 656360]\n- [net] bnx2x: Split PHY functions (Michal Schmidt) [629609 651546 653357 656360]\n- [net] bnx2x: Unify PHY attributes (Michal Schmidt) [629609 651546 653357 656360]\n- [net] bnx2x: avoid skb->ip_summed initialization (Michal Schmidt) [629609 651546 653357 656360]\n- [net] skbuff: add skb_checksum_none_assert (Michal Schmidt) [629609 651546 653357 656360]\n- [net] bnx2x: Update version to 1.52.53-5 (Michal Schmidt) [629609 651546 653357 656360]\n- [net] bnx2x: Add BCM84823 to the supported PHYs (Michal Schmidt) [629609 651546 653357 656360]\n- [net] bnx2x: Change BCM848xx LED configuration (Michal Schmidt) [629609 651546 653357 656360]\n- [net] bnx2x: Remove unneeded setting of XAUI low power to BCM8727 (Michal Schmidt) [629609 651546 653357 656360]\n- [net] bnx2x: Change BCM848xx configuration according to IEEE (Michal Schmidt) [629609 651546 653357 656360]\n- [net] bnx2x: Reset link before any new link settings (Michal Schmidt) [629609 651546 653357 656360]\n- [net] bnx2x: Fix potential link issue In BCM8727 based boards (Michal Schmidt) [629609 651546 653357 656360]\n- [net] bnx2x: Fix potential link issue of BCM8073/BCM8727 (Michal Schmidt) [629609 651546 653357 656360]\n- Revert: [net] bnx2x: force interrupt mode for iscsi unset mac (Michal Schmidt) [629609 651546 653357 656360]\n- [net] ipv4: make accept_local writeable for loopback (Neil Horman) [672570]\n- [net] bnx2: Update to latest upstream for RHEL5.7 (Neil Horman) [651438 660375]\n- [pci] backport common vpd support functions (Neil Horman) [683978]\n- [net] e1000: fix sparse warning (Dean Nelson) [571889 653248 653546]\n- [net] e1000: add support for Marvell Alaska M88E1118R PHY (Dean Nelson) [571889 653248 653546]\n- [net] e1000: Add support for the CE4100 reference platform (Dean Nelson) [571889 653248 653546]\n- [net] e1000: fix return value not set on error (Dean Nelson) [571889 653248 653546]\n- [net] e1000: fix Tx hangs by disabling 64-bit DMA (Dean Nelson) [571889 653248 653546]\n- [net] e1000: allow option to limit number of descriptors down to 48 per ring (Dean Nelson) [571889 653248 653546]\n- [net] e1000: Use new function for copybreak tests (Dean Nelson) [571889 653248 653546]\n- [net] e1000: do not modify tx_queue_len on link speed change (Dean Nelson) [571889 653248 653546]\n- [net] e1000: Fix DMA mapping error handling on RX (Dean Nelson) [571889 653248 653546]\n- [net] e1000: call pci_save_state after pci_restore_state (Dean Nelson) [571889 653248 653546]\n- [net] e1000: dont use small hardware rx buffers (Dean Nelson) [571889 653248 653546]\n- [fs] gfs2: directly write blocks past i_size (Benjamin Marzinski) [684371]\n- [fs] gfs2: fix block allocation check for fallocate (Benjamin Marzinski) [684024]\n- [redhat] spec: trim srpm size and vastly improve prep time (Jarod Wilson) [687950]\n\n[2.6.18-250.el5]\n- [block] cciss: use short tags where supported (Tomas Henzl) [656343]\n- [block] cciss: Fix memory leak in cciss_sysfs_stat_inquiry (Tomas Henzl) [656343]\n- [block] cciss: do not reorder commands in internal queue (Tomas Henzl) [656343]\n- [block] cciss: add another controller 0x103C3356 (Tomas Henzl) [656343]\n- [block] cciss: fix panic in cciss_revalidate (Tomas Henzl) [656343]\n- [block] cciss: Do not remove /proc entry if we never created it (Tomas Henzl) [656343]\n- [block] cciss: do not leak stack to userland (Tomas Henzl) [656343]\n- [block] cciss: catch kmalloc failure of h->scatter_list (Tomas Henzl) [656343]\n- [block] cciss: fix missed command status value CMD_UNABORTABLE (Tomas Henzl) [656343]\n- [block] cciss: remove ifdefed out interrupt_not_for_us (Tomas Henzl) [656343]\n- [block] cciss: change printks to dev_warn (Tomas Henzl) [656343]\n- [block] cciss: use consistent variable names (Tomas Henzl) [656343]\n- [block] cciss: mark performant mode function as __devinit (Tomas Henzl) [656343]\n- [block] cciss: cleanup some debug ifdefs (Tomas Henzl) [656343]\n- [block] cciss: fix leak of ioremapped memory in init error path (Tomas Henzl) [656343]\n- [block] cciss: Fix panic in multipath configurations (Tomas Henzl) [656343]\n- [message] mptfusion: version update to 3.04.18rh (Tomas Henzl) [662160]\n- [message] mptfusion: Incorrect return value in mptscsih_dev_reset (Tomas Henzl) [662160]\n- [message] mptfusion: remove bus reset (Tomas Henzl) [662160]\n- [message] mptfusion: 3gbps - 6gbps (Tomas Henzl) [662160]\n- [message] mptfusion: sysfs sas addr handle (Tomas Henzl) [662160]\n- [message] mptfusion: Fix 32 bit platforms with 64 bit resources (Tomas Henzl) [662160]\n- [message] mptfusion: use module_param correctly (Tomas Henzl) [662160]\n- [message] mptfusion: Adjust confusing if indentation (Tomas Henzl) [662160]\n- [message] mptfusion: print Doorbell reg on hard reset and timeout (Tomas Henzl) [662160]\n- [message] mptfusion: Cleanup some duplicate calls in mptbase.c (Tomas Henzl) [662160]\n- [message] mptfusion: Extra DMD error handling debug prints (Tomas Henzl) [662160]\n- [message] mptfusion: block errors if deleting devices or DMD (Tomas Henzl) [662160]\n- [message] mptfusion: add ioc_reset_in_progress reset in SoftReset (Tomas Henzl) [662160]\n- [message] mptfusion: handle SATA hotplug failure (Tomas Henzl) [662160]\n- [message] mptfusion: schedule_target_reset from all Reset context (Tomas Henzl) [662160]\n- [message] mptfusion: sanity check for device before adding to OS (Tomas Henzl) [662160]\n- [message] mptfusion: fix declaration of device_missing_delay (Tomas Henzl) [662160]\n- [message] mptfusion: DID_TRANSPORT_DISRUPTED, not DID_BUS_BUSY (Tomas Henzl) [662160]\n- [message] mptfusion: Set fw_events_off to 1 at driver load time (Tomas Henzl) [662160]\n- [scsi] mpt2sas: version change to 08.101.00.00 (Tomas Henzl) [662153]\n- [scsi] mpt2sas: Call _scsih_ir_shutdown before reporting to OS (Tomas Henzl) [662153]\n- [scsi] mpt2sas: Basic Code Cleanup in mpt2sas_base (Tomas Henzl) [662153]\n- [scsi] mpt2sas: fix access to freed memory from port enable (Tomas Henzl) [662153]\n- [scsi] mpt2sas: Fix race between broadcast asyn event (Tomas Henzl) [662153]\n- [scsi] mpt2sas: support for Customer specific branding messages (Tomas Henzl) [662153]\n- [scsi] mpt2sas: Revision P MPI Header Update (Tomas Henzl) [662153]\n- [scsi] mpt2sas: Correct resizing calculation for max_queue_depth (Tomas Henzl) [662153]\n- [scsi] mpt2sas: device reset event not supported on old firmware (Tomas Henzl) [662153]\n- [scsi] mpt2sas: fix device removal handshake with vacant bit set (Tomas Henzl) [662153]\n- [scsi] mpt2sas: Debug string changes from target to device (Tomas Henzl) [662153]\n- [scsi] mpt2sas: Remove code for TASK_SET_FULL from driver (Tomas Henzl) [662153]\n- [scsi] mpt2sas: MPI2.0 Header updated (Tomas Henzl) [662153]\n- [scsi] mpt2sas: Modify code to support Expander switch (Tomas Henzl) [662153]\n- [scsi] mpt2sas: create pool of chain buffers for IO (Tomas Henzl) [662153]\n- [scsi] mpt2sas: add loadtime params for IOMissingDelay and params (Tomas Henzl) [662153]\n- [scsi] mpt2sas: add sanity check for cb_idx and smid access (Tomas Henzl) [662153]\n- [scsi] mpt2sas: remov compiler warnnings when logging is disabled (Tomas Henzl) [662153]\n- [scsi] mpt2sas: Copy message frame before releasing (Tomas Henzl) [662153]\n- [scsi] mpt2sas: Copy sense buffer to work on it (Tomas Henzl) [662153]\n- [scsi] mpt2sas: Add message to error escalation callback (Tomas Henzl) [662153]\n- [scsi] mpt2sas: Add check for responding volumes after Host Reset (Tomas Henzl) [662153]\n- [scsi] mpt2sas: add ENOMEM return type when allocation fails (Tomas Henzl) [662153]\n- [scsi] mpt2sas: device event handling using pd_handles per HBA (Tomas Henzl) [662153]\n- [scsi] mpt2sas: Tie a log info message to a specific PHY (Tomas Henzl) [662153]\n- [scsi] mpt2sas: print level KERN_DEBUG is replaced by KERN_INFO (Tomas Henzl) [662153]\n- [scsi] mpt2sas: add sysfs support for tracebuffer (Tomas Henzl) [662153]\n- [scsi] mpt2sas: MPI header version N is updated (Tomas Henzl) [662153]\n- [scsi] mpt2sas: add sysfs counter for ioc reset (Tomas Henzl) [662153]\n- [scsi] mpt2sas: add expander phy control support (Tomas Henzl) [662153]\n- [scsi] mpt2sas: add expander phy counter support (Tomas Henzl) [662153]\n- [scsi] mpt2sas: add disable_discovery module parameter (Tomas Henzl) [662153]\n- [scsi] mpt2sas: dont reset when another reset is in progress (Tomas Henzl) [662153]\n- [net] ip_conntrack_ftp: fix tracking of sequence numbers (Thomas Graf) [642388]\n- [fs] gfs2: add missing unlock_page in gfs2_write_begin (Steven Whitehouse) [684795]\n- [powerpc] numa: improved kABI breakage fix in paca struct (Steve Best) [651167]\n- [fs] gfs2: Make delayed workqueues submit immediately if delay 0 (Robert S Peterson) [650494]\n- [fs] gfs2: improve performance with bouncing locks in a cluster (Robert S Peterson) [650494]\n- [net] s2io: rx_ring_sz bounds checking (Michal Schmidt) [491786]\n- [net] s2io: resolve statistics issues (Michal Schmidt) [598650]\n- [scsi] iscsi: use kmap instead of kmap_atomic (Mike Christie) [672115]\n- [block] reduce stack footprint of blk_recount_segments() (Jeff Moyer) [638988]\n- [block] fix nr_phys_segments miscalculation bug (Jeff Moyer) [638988]\n- [block] raid fixups for removal of bi_hw_segments (Jeff Moyer) [638988]\n- [block] drop vmerge accounting (Jeff Moyer) [638988]\n- [block] drop virtual merging accounting (Jeff Moyer) [638988]\n- [block] Introduce rq_for_each_segment replacing rq_for_each_bio (Jeff Moyer) [638988]\n- [block] Merge blk_recount_segments into blk_recalc_rq_segments (Jeff Moyer) [638988]\n- [fs] Fix over-zealous flush_disk changing device size (Jeff Moyer) [678359]\n- [fs] lockd: make lockd_down wait for lockd to come down (Jeff Layton) [653286]\n- [net] sunrpc: Dont disconnect if connection in progress (Jeff Layton) [680329]\n- [fs] fix block based fiemap (Josef Bacik) [675986]\n- [fs] proc: protect mm start_/end_code in /proc/pid/stat (Eugene Teo) [684571] {CVE-2011-0726}\n- [net] dccp: fix oops in dccp_rcv_state_process (Eugene Teo) [682956] {CVE-2011-1093}\n- [scsi] libsas: fix bug for vacant phy (David Milburn) [676423]\n- [scsi] libsas: do not set res = 0 in sas_ex_discover_dev (David Milburn) [676423]\n- [scsi] libsas: fix wide port hotplug issues (David Milburn) [676423]\n- [scsi] libsas: fixup kABI breakage (David Milburn) [676423]\n- [scsi] libsas: no commands to hot-removed devices (David Milburn) [676423]\n- [scsi] libsas: transport-level facility to req SAS addrs (David Milburn) [676423]\n- [scsi] libsas: misc fixes to the eh path (David Milburn) [676423]\n- [scsi] libsas: correctly flush LU queue on error recovery (David Milburn) [676423]\n- [scsi] libsas: fix error handling (David Milburn) [676423]\n- [scsi] libsas: fix sense_buffer overrun (David Milburn) [676423]\n- [scsi] libsas: reuse orig port hotplugging phys wide port (David Milburn) [676423]\n- [scsi] libsas: fix NCQ mixing with non-NCQ (David Milburn) [676423]\n- [scsi] libsas: fix endianness bug in sas_ata (David Milburn) [676423]\n- [scsi] libsas: dont use made up error codes (David Milburn) [676423]\n- [net] bluetooth: fix bnep buffer overflow (Don Howard) [681319] {CVE-2011-1079}\n- [pci] intel-iommu: Fix get_domain_for_dev() error path (Alex Williamson) [688646]\n- [pci] intel-iommu: Unlink domain from iommu (Alex Williamson) [688646]\n- [redhat] spec: assorted cleanup and streamlining\n\n[2.6.18-249.el5]\n- [md] dm-mpath: avoid storing private suspended state (Mike Snitzer) [678670]\n- [md] dm-mpath: reject messages when device is suspended (Mike Snitzer) [678670]\n- [md] dm: export suspended state to targets (Mike Snitzer) [678670]\n- [md] dm: rename dm_suspended to dm_suspended_md (Mike Snitzer) [678670]\n- [md] dm: swap postsuspend call and setting suspended flag (Mike Snitzer) [678670]\n- [md] dm-ioctl: retrieve status from inactive table (Mike Snitzer) [678670]\n- [md] dm: rename dm_get_table to dm_get_live_table (Mike Snitzer) [678670]\n- [md] dm-stripe: avoid div by 0 with invalid stripe count (Mike Snitzer) [678670]\n- [md] dm-ioctl: forbid messages to devices being deleted (Mike Snitzer) [678670]\n- [md] dm: add dm_deleting_md function (Mike Snitzer) [678670]\n- [md] dm: dec_pending needs locking to save error value (Mike Snitzer) [678670]\n- [md] dm-raid1: keep retrying alloc if mempool_alloc fails (Mike Snitzer) [678670]\n- [md] dm-table: fix upgrade mode race (Mike Snitzer) [678670]\n- [md] dm-io: respect BIO_MAX_PAGES limit (Mike Snitzer) [678670]\n- [md] dm-ioctl: validate name length when renaming (Mike Snitzer) [678670]\n- [md] dm-log: fix dm_io_client leak on error paths (Mike Snitzer) [678670]\n- [md] dm: avoid destroying table in dm_any_congested (Mike Snitzer) [678670]\n- [md] dm-raid1: fix leakage (Mike Snitzer) [678670]\n- [md] dm-mpath: validate hw_handler argument count (Mike Snitzer) [678670]\n- [md] dm-mpath: validate table argument count (Mike Snitzer) [678670]\n- [md] dm-mpath: fix NULL deref when path parameter missing (Mike Snitzer) [673058]\n- [md] dm-mpath: wait for pg_init completion on suspend (Mike Snitzer) [673058]\n- [md] dm-mpath: hold io until all pg_inits completed (Mike Snitzer) [673058]\n- [md] dm-mpath: skip activate_path for failed paths (Mike Snitzer) [673058]\n- [md] dm-mpath: pass struct pgpath to pg init done (Mike Snitzer) [673058]\n- [md] dm-mpath: prevent io from work queue while suspended (Mike Snitzer) [673058]\n- [md] dm-mpath: add mutex to sync adding and flushing work (Mike Snitzer) [673058]\n- [md] dm-mpath: flush workqueues before suspend completes (Mike Snitzer) [673058]\n- [powerpc] numa: Fix kABI breakage in paca struct (Steve Best) [651167]\n- [powerpc] Disable VPHN polling during a suspend operation (Steve Best) [651167]\n- [powerpc] mm: Poll VPA for topo changes, update NUMA maps (Steve Best) [651167]\n- [powerpc] Add VPHN firmware feature (Steve Best) [651167]\nwith external journal (Lukas Czerner) [652321]\n- [fs] nfs: wait for COMMIT RPC complete before task put (Jeff Layton) [441730]\n- [fs] nfs: ->flush and ->fsync should use FLUSH_SYNC (Jeff Layton) [441730]\n- [net] sunrpc: fix race in __rpc_wait_for_completion_task (Jeff Layton) [441730]\n- [fs] nfs: Ensure proper cleanup on rpc_run_task fail (Jeff Layton) [441730]\n- [fs] nfs: clean up the unstable write code (Jeff Layton) [441730]\n- [fs] nfs: Dont use ClearPageUptodate if writeback fails (Jeff Layton) [441730]\n- [fs] nfs: Fix an unstable write data integrity race (Jeff Layton) [441730]\n- [fs] nfs: make sure WRITE and COMMIT are uninterruptible (Jeff Layton) [441730]\n- [fs] nfs: change how FLUSH_STABLE flag is used (Jeff Layton) [441730]\n- [mm] writeback: fix queue handling in blk_congestion_wait (Jeff Layton) [516490]\n- [fs] nfs: clean up nfs congestion control (Jeff Layton) [516490]\n- [block] Add real API for dealing with blk_congestion_wait (Jeff Layton) [516490]\n- [fs] nfs: kswapd must not block in nfs_release_page (Jeff Layton) [516490]\n- [fs] nfs: Prevent another deadlock in nfs_release_page (Jeff Layton) [516490]\n- [fs] nfs: Try commit unstable writes in nfs_release_page (Jeff Layton) [516490]\n- [fs] nfs: Add debugging facility for NFS aops (Jeff Layton) [516490]\n- [fs] nfs: Fix race in nfs_release_page() (Jeff Layton) [516490]\n- [fs] nfs: Fix nfs_release_page (Jeff Layton) [516490]\n- [fs] nfs: reduce number of unnecessary commit calls (Jeff Layton) [516490]\n- [fs] nfs: nfs_writepages() cleanup (Jeff Layton) [516490]\n\n[2.6.18-248.el5]\n- [virt] xen: make more room for event channel IRQs (Paolo Bonzini) [650838]\n- [message] mptfusion: fix msgContext in mptctl_hp_hostinfo (Tomas Henzl) [646513]\n- [net] ipv6: Add GSO support on forwarding path (Thomas Graf) [648572]\n- [net] tc: Ignore noqueue_qdisc default qdisc when dumping (Thomas Graf) [627850]\n- [serial] 8250_pci: add support for PowerPC PLX 8250 (Steve Best) [651431]\n- [scsi] ibmveth: Free irq on error path (Steve Best) [651872]\n- [scsi] ibmveth: Cleanup error handling in ibmveth_open (Steve Best) [651872]\n- [scsi] ibmveth: Remove some unnecessary include files (Steve Best) [651872]\n- [scsi] ibmveth: Convert driver specific assert to BUG_ON (Steve Best) [651872]\n- [scsi] ibmveth: Return -EINVAL on all ->probe errors (Steve Best) [651872]\n- [scsi] ibmveth: Some formatting fixes (Steve Best) [651872]\n- [scsi] ibmveth: Remove redundant function prototypes (Steve Best) [651872]\n- [scsi] ibmveth: Convert to netdev_alloc_skb (Steve Best) [651872]\n- [scsi] ibmveth: Remove dupe checksum offload setup code (Steve Best) [651872]\n- [scsi] ibmveth: Add optional flush of rx buffer (Steve Best) [651872]\n- [scsi] ibmveth: Add scatter-gather support (Steve Best) [651872]\n- [scsi] ibmveth: Add rx_copybreak (Steve Best) [651872]\n- [scsi] ibmveth: Add tx_copybreak (Steve Best) [651872]\n- [scsi] ibmveth: Remove LLTX (Steve Best) [651872]\n- [scsi] ibmveth: batch rx buffer replacement (Steve Best) [651872]\n- [scsi] ibmveth: Remove integer divide caused by modulus (Steve Best) [651872]\n- [fs] gfs2: creating large files suddenly slow to a crawl (Robert S Peterson) [683155]\n- [virt] xen: performance improvement for 32-bit domains (Paolo Bonzini) [390451]\n- [fs] nfs: fix use of slab allocd pages in skb frag list (Neil Horman) [682643] {CVE-2011-1090}\n- [net] af_packet: allow multicast traffic on bond ORIGDEV (Jiri Pirko) [579000]\n- [net] af_packet: option to return orig_dev to userspace (Jiri Pirko) [579000]\n- [fs] nfs: back out the FS-Cache patches (Jeff Layton) [631950]\n- [x86_64]: fix section mismatches in kernel setup (Frank Arnold) [683078]\n- [char] tty_audit: fix live lock on audit disabled (Danny Feng) [679563]\n- [s390] remove task_show_regs (Danny Feng) [677853] {CVE-2011-0710}\n- [scsi] qla2xxx: Query proper reg bits to determine state (Chad Dupuis) [537277]\n- [scsi] qla2xxx: update version to 8.03.07.00.05.07 (Chad Dupuis) [660386]\n- [scsi] qla2xxx: online ISP82XX for commands completion (Chad Dupuis) [660386]\n- [scsi] qla2xxx: fix tagging modifier while executing IOs (Chad Dupuis) [660386]\n- [scsi] qla2xxx: fix FCP_RSP response-info check after TMF (Chad Dupuis) [660386]\n- [scsi] qla2xxx: no reset/fw-dump on CT/ELS pt req timeout (Chad Dupuis) [660386]\n- [scsi] qla2xxx: return all loopback mbox out regs to API (Chad Dupuis) [660386]\n- [scsi] qla2xxx: fix IO failure during chip reset (Chad Dupuis) [660386]\n- [scsi] qla2xxx: show mbox reg 4 in 8012 AEN on ISP82XX (Chad Dupuis) [660386]\n- [scsi] qla2xxx: show more mailbox regs during AEN handle (Chad Dupuis) [660386]\n- [scsi] qla2xxx: no BIG_HAMMER if 0x20 cmd fails on CNAs (Chad Dupuis) [660386]\n- [scsi] qla2xxx: Remove redundant modparam permission bits (Chad Dupuis) [660386]\n- [scsi] qla2xxx: set right ret val in qla2xxx_eh_abort (Chad Dupuis) [660386]\n- [scsi] qla2xxx: set FCP prio info to firmware before IOs (Chad Dupuis) [660386]\n- [scsi] qla2xxx: Memory wedge with peg_halt test in loop (Chad Dupuis) [660386]\n- [scsi] qla2xxx: populate FCP_PRIO loc for no flt case (Chad Dupuis) [660386]\n- [scsi] qla2xxx: avoid SCSI host_lock dep in queuecommand (Chad Dupuis) [660386]\n- [scsi] qla2xxx: drop srb ref before wait for completion (Chad Dupuis) [660386]\n- [scsi] qla2xxx: log FCP priority data messages (Chad Dupuis) [660386]\n- [scsi] qla2xxx: add sysfs node for board temperature (Chad Dupuis) [660386]\n- [scsi] qla2xxx: fix check for need quiescence state (Chad Dupuis) [660386]\n- [scsi] qla2xxx: clear local rport refs on timeout from FC (Chad Dupuis) [660386]\n- [scsi] qla2xxx: remove unwanted check for bad spd (Chad Dupuis) [660386]\n- [scsi] qla2xxx: no continuous log when dontreset is set (Chad Dupuis) [660386]\n- [scsi] qla2xxx: quiescence mode support for ISP82xx (Chad Dupuis) [660386]\n- [virtio] console: no device_destroy on port device (Amit Shah) [681179]\n- [virtio] console: dont access vqs if device unplugged (Amit Shah) [681179]\n- [virtio] pci: fix config change oops w/no driver loaded (Amit Shah) [681179]\n- [xen] hap: preserve domain context (Radim Krcmar) [678571]\n\n[2.6.18-247.el5]\n- [mm] set barrier and send tlb flush to all affected cpus (Prarit Bhargava) [675793]\n- [misc] vdso: export wall_to_monotonic (Prarit Bhargava) [675727]\n- [mm] add vzalloc and vzalloc_node helpers (Neil Horman) [681303]\n- [fs] add lockd endianness annotations (Jeff Layton) [526829]\n- [misc] add key_revoke() dummy for KEYS=n (Jeff Layton) [640891]\n- [fs] nfs: Fix a use-after-free case in nfs_async_rename() (Jeff Layton) [511901]\n- [fs] nfs: make sillyrename an async operation (Jeff Layton) [511901]\n- [fs] nfs: move nfs_sillyrename to unlink.c (Jeff Layton) [511901]\n- [fs] nfs: standardize the rename response container (Jeff Layton) [511901]\n- [fs] nfs: standardize the rename args container (Jeff Layton) [511901]\n- [scsi] scsi_dh_emc: Set request flags consistently (Dave Wysochanski) [670367]\n- [i2c] i2c-i801: Add PCI idents for Patsburg 'IDF' devices (David Milburn) [651513]\n- [i2c] i2c-i801: Handle multiple instances properly (David Milburn) [651513]\n- [i2c] i2c-i801: Dont use block buffer for block writes (David Milburn) [651513]\n- [i2c] i2c-i801: Fix handling of error conditions (David Milburn) [651513]\n- [i2c] i2c-i801: Rename local variable temp to status (David Milburn) [651513]\n- [i2c] i2c-i801: Properly report bus arbitration loss (David Milburn) [651513]\n- [i2c] i2c-i801: Remove verbose debugging messages (David Milburn) [651513]\n- [i2c] i2c-i801: Implement I2C block read support (David Milburn) [651513]\n- [i2c] i2c-i801: Clear special mode bits as needed (David Milburn) [651513]\n- [i2c] i2c-i801: More explicit names for chip features (David Milburn) [651513]\n- [i2c] i2c-i801: Use the internal 32-byte buffer on ICH4+ (David Milburn) [651513]\n- [i2c] i2c-i801: Various cleanups (David Milburn) [651513]\n- [fs] xfs: disable CONFIG_XFS_DEBUG on kernel-debug (Dave Chinner) [658012]\n- [fs] xfs: remove cmn_err log buffer and lock (Dave Chinner) [658012]\n- [fs] fix select/poll timeout overflow (Bob Picco) [591607]\n- [x86_64] Use u32, not long, to set reset vector back to 0 (Don Zickus) [675258]\n- [net] sctp: fix race allowing access before full init (Neil Horman) [465876]\n- [xen] gdbsx: hypervisor part backport (Radim Krcmar) [678618]\n- [xen] add arch/x86/debug.c, debugger routines (Radim Krcmar) [678618]\n- [xen] x86/vmx: making TRAP_debug and TRAP_int3 useful (Radim Krcmar) [678618]\n\n[2.6.18-246.el5]\n- [net] bridge: restore ebt ksym versions (Herbert Xu) [626659]\n- [net] bridge: Fix mglist corruption (Herbert Xu) [506630]\n- [net] Fix IGMP3 report parsing (Herbert Xu) [506630]\n- [net] bridge: Fix IGMPv3 report parsing (Herbert Xu) [506630]\n- [net] bridge: Fix skb leak in multicast TX parse fail (Herbert Xu) [506630]\n- [net] bridge: Fix OOM crash in deliver_clone (Herbert Xu) [506630]\n- [net] bridge: Make first arg to deliver_clone const (Herbert Xu) [506630]\n- [net] bridge: Fix build error w/IGMP_SNOOPING not enabled (Herbert Xu) [506630]\n- [net] bridge: Add multicast count/interval sysfs entries (Herbert Xu) [506630]\n- [net] bridge: Add hash elasticity/max sysfs entries (Herbert Xu) [506630]\n- [net] bridge: Add multicast_snooping sysfs toggle (Herbert Xu) [506630]\n- [net] bridge: Add multicast_router sysfs entries (Herbert Xu) [506630]\n- [net] bridge: Add multicast data-path hooks (Herbert Xu) [506630]\n- [net] bridge: Add multicast start/stop hooks (Herbert Xu) [506630]\n- [net] bridge: Add multicast forwarding functions (Herbert Xu) [506630]\n- [net] bridge: Move NULL mdb check into br_mdb_ip_get (Herbert Xu) [506630]\n- [net] bridge: ensure br_multicast_query error path unlock (Herbert Xu) [506630]\n- [net] bridge: Fix RCU race in br_multicast_stop (Herbert Xu) [506630]\n- [net] bridge: Use RCU list primitive in __br_mdb_ip_get (Herbert Xu) [506630]\n- [net] bridge: cleanup: remove unneed check (Herbert Xu) [506630]\n- [net] bridge: depends on INET (Herbert Xu) [506630]\n- [net] bridge: Make IGMP snooping depend upon BRIDGE. (Herbert Xu) [506630]\n- [net] bridge: Add core IGMP snooping support (Herbert Xu) [506630]\n- [net] bridge: Fix br_forward crash in promiscuous mode (Herbert Xu) [506630]\n- [net] bridge: Split may_deliver/deliver_clone out (Herbert Xu) [506630]\n- [net] bridge: Use BR_INPUT_SKB_CB on xmit path (Herbert Xu) [506630]\n- [net] bridge: Avoid unnecessary clone on forward path (Herbert Xu) [506630]\n- [net] bridge: Allow tail-call on br_pass_frame_up (Herbert Xu) [506630]\n- [net] bridge: Do br_pass_frame_up after other ports (Herbert Xu) [506630]\n- [net] bridge: Kill clone argument to br_flood_* (Herbert Xu) [506630]\n- [net] Add netdev_alloc_skb_ip_align() helper (Herbert Xu) [506630]\n- [fs] partitions: Validate map_count in Mac part tables (Danny Feng) [679284] {CVE-2011-1010}\n- [fs] nfs: Only increment seqid for cmds seen by server (Sachin Prabhu) [651409]\n- [scsi] ipr: fix a race on multiple configuration changes (Steve Best) [651429]\n- [misc] vmware: increase apic_calibration_diff to 10000 (Prarit Bhargava) [665197]\n- [net] tun: introduce tun_file (Michael S. Tsirkin) [672619]\n- [virt] xen blktap: bump MAX_TAP_DEV from 100 to 256 (Laszlo Ersek) [452650]\n- [fs] nfs: Too many GETATTR/ACCESS calls after direct I/O (Jeff Layton) [626974]\n- [net] bonding: fix add/remove of slaves when master down (Flavio Leitner) [671238]\n- [net] sctp: make sctp_ctl_sock_init try IPv4 if v6 fails (Jiri Pirko) [674175]\n- [net] Fix netdev_run_todo dead-lock (Jiri Pirko) [679487]\n- [net] niu: Fix races between up/down and get_stats (Jiri Pirko) [679407]\n- [misc] introduce ACCESS_ONCE (Jiri Pirko) [679407]\n- [x86] fix AMD family 0x15 guest boot issue on 64-bit host (Frank Arnold) [667234]\n- [sound] alsa: cache mixer values on usb-audio devices (Don Zickus) [678074]\n- [xen] prevent cross-vendor migration of HVM domains (Paolo Bonzini) [621916]\n- [xen] new domctl to get 1 record from HVM save context (Michal Novotny) [674514]\n\n[2.6.18-245.el5]\n- [block] cciss: version bump (Tomas Henzl) [635143]\n- [block] cciss: add option to enforce simple mode (Tomas Henzl) [635143]\n- [block] cciss: patch to make kdump work in rhel5 (Tomas Henzl) [635143]\n- [block] cciss: cleanup warnings (Tomas Henzl) [635143]\n- [block] cciss: patch to support kdump on new controllers (Tomas Henzl) [635143]\n- [block] cciss: factor out code to find max commands (Tomas Henzl) [635143]\n- [block] cciss: split out cciss_defs (Tomas Henzl) [635143]\n- [block] cciss: scsi tape updates (Tomas Henzl) [635143]\n- [block] cciss: remove fail_all_cmds (Tomas Henzl) [635143]\n- [block] cciss: factor out cciss_passthru (Tomas Henzl) [635143]\n- [block] cciss: factor out cciss_getdrivver (Tomas Henzl) [635143]\n- [block] cciss: factor out cciss_getfirmver (Tomas Henzl) [635143]\n- [block] cciss: factor out cciss_getbustypes (Tomas Henzl) [635143]\n- [block] cciss: factor out cciss_getheartbeat (Tomas Henzl) [635143]\n- [block] cciss: factor out cciss_setnodename (Tomas Henzl) [635143]\n- [block] cciss: factor out cciss_getnodename (Tomas Henzl) [635143]\n- [block] cciss: factor out cciss_setintinfo (Tomas Henzl) [635143]\n- [block] cciss: factor out cciss_getintinfo (Tomas Henzl) [635143]\n- [block] cciss: factor out cciss_getpciinfo (Tomas Henzl) [635143]\n- [block] cciss: factor out cciss_reset_devices (Tomas Henzl) [635143]\n- [block] cciss: factor out cciss_find_cfg_addrs (Tomas Henzl) [635143]\n- [block] cciss: factor out cciss_wait_for_mode_change_ack (Tomas Henzl) [635143]\n- [block] cciss: factor out cciss_p600_dma_prefetch_quirk (Tomas Henzl) [635143]\n- [block] cciss: factor out cciss_enable_scsi_prefetch (Tomas Henzl) [635143]\n- [block] cciss: factor out CISS_signature_present (Tomas Henzl) [635143]\n- [block] cciss: factor out cciss_find_board_params (Tomas Henzl) [635143]\n- [block] cciss: factor out cciss_find_cfgtables (Tomas Henzl) [635143]\n- [block] cciss: factor out wait_for_board_ready (Tomas Henzl) [635143]\n- [block] cciss: factor out cciss_find_memory_BAR (Tomas Henzl) [635143]\n- [block] cciss: remove board_id from cciss_interrupt_mode (Tomas Henzl) [635143]\n- [block] cciss: factor out cciss_board_disabled (Tomas Henzl) [635143]\n- [block] cciss: factor out cciss_lookup_board_id (Tomas Henzl) [635143]\n- [block] cciss: save off pdev struct early (Tomas Henzl) [635143]\n- [block] cciss: add performant mode support (Tomas Henzl) [635143]\n- [block] cciss: new controller support (Tomas Henzl) [635143]\n- [block] cciss: remove generic sa support (Tomas Henzl) [635143]\n- [block] cciss: copyright update (Tomas Henzl) [635143]\n- [x86_64] vdso: fix gtod via export of sysctl_vsyscall (Prarit Bhargava) [673616]\n- [pci] msi: remove infiniband compat code (Prarit Bhargava) [636260]\n- [pci] msi: remove pci_save_msi|x_state() functions (Prarit Bhargava) [636260]\n- [pci] msi: use msi_desc save areas in msi state functions (Prarit Bhargava) [636260]\n- [pci] msi: use msi_desc save areas in drivers/pci code (Prarit Bhargava) [636260]\n- [misc] kdump: fixup mcp55 quick to skip non HT devices (Neil Horman) [477032]\n- [security] selinux: properly handle empty tty_files list (Lachlan McIlroy) [674226]\n- [fs] xfs: fix double free of log tickets (Lachlan McIlroy) [657166]\n- [fs] ext4: protect inode bitmap clearing w/ spinlock (Lukas Czerner) [663563]\n- [fs] procfs: fix numbering in /proc/locks (Jerome Marchand) [622647]\n- [fs] seq_file: Introduce the seq_open_private() (Jerome Marchand) [622647]\n- [fs] Rework /proc/locks w/seq_files and seq_list helpers (Jerome Marchand) [622647]\n- [fs] common helpers for seq_files working with list_heads (Jerome Marchand) [622647]\n- [fs] nfs: Remove incorrect do_vfs_lock message (Jeff Layton) [632399]\n- [fs] nfs: allow redirtying of a completed unstable write (Jeff Layton) [648657]\n- [fs] nfsd4: fix seqid on lock req incompat w/open mode (Jeff Layton) [517629]\n- [net] sunrpc: a better way to set tcp_slot_table_entries (Harshula Jayasuriya) [654293]\n- [x86] Convert BUG() to use unreachable() (Dean Nelson) [677396]\n- [s390] Convert BUG() to use unreachable() (Dean Nelson) [677396]\n- [powerpc] Convert BUG() to use unreachable() (Dean Nelson) [677396]\n- [misc] add support for __builtin_unreachable (Dean Nelson) [677396]\n- [fs] xfs: more swap extent fixes for dynamic fork offsets (Dave Chinner) [661300]\n- [fs] xfs: handle dynamic fork offsets in xfs_swap_extents (Dave Chinner) [661300]\n- [lib] fix vscnprintf() if @size is == 0 (Anton Arapov) [667327]\n- [net] netpoll: fix use after free (Amerigo Wang) [556811]\n- [net] netpoll: fix a softirq warning (Amerigo Wang) [556811]\n- [net] netconsole: Introduce netconsole netdev notifier (Amerigo Wang) [556811]\n- [net] bridge: support netpoll over bridge (Amerigo Wang) [556811]\n- [net] netconsole: Use netif_running() in write_msg() (Amerigo Wang) [556811]\n- [net] netconsole: Simplify boot/module option setup logic (Amerigo Wang) [556811]\n- [net] netconsole: Remove bogus check (Amerigo Wang) [556811]\n- [net] netconsole: Cleanups, codingstyle, prettyfication (Amerigo Wang) [556811]\n- [net] netpoll: setup error handling (Amerigo Wang) [556811]\n- [char] virtio_console: fix memory leak (Amit Shah) [656836]\n- [media] dvb: fix av7110 negative array offset (Mauro Carvalho Chehab) [672402] {CVE-2011-0521}\n\n[2.6.18-244.el5]\n- [message] mptfusion: add required mptctl_release call (Tomas Henzl) [660871]\n- [fs] gfs2: no exclusive glocks on mmapped read-only fs (Steven Whitehouse) [672724]\n- [scsi] ibmvfc: Driver version 1.0.9 (Steve Best) [651885]\n- [scsi] ibmvfc: Handle Virtual I/O Server reboot (Steve Best) [651885]\n- [scsi] ibmvfc: Log link up/down events (Steve Best) [651885]\n- [scsi] ibmvfc: Fix rport add/delete race oops (Steve Best) [651885]\n- [scsi] ibmvfc: Remove stale param to ibmvfc_init_host (Steve Best) [651885]\n- [scsi] ibmvfc: Fix locking in ibmvfc_remove (Steve Best) [651885]\n- [scsi] ibmvfc: Fixup TMF response handling (Steve Best) [651885]\n- [fs] nfs: pure nfs client performance using odirect (Jeff Layton) [643441]\n- [mm] fix install_special_mapping skips security_file_mmap (Frantisek Hrbata) [662197] {CVE-2010-4346}\n- [virt] xen: setup memory zones the same way as native (Andrew Jones) [525898]\n- [s390] qeth: wait for recovery finish in open function (Hendrik Brueckner) [668844]\n- [s390] cio: fix unuseable device after offline operation (Hendrik Brueckner) [668842]\n- [s390] qdio: use proper QEBSM operand for SIGA-{R,S} (Hendrik Brueckner) [668464]\n- [s390] qdio: zfcp stall with > 63 active qdio devices (Hendrik Brueckner) [662134]\n- [s390] qeth: enable VIPA add/remove for offline devices (Hendrik Brueckner) [661106]\n- [s390] hvc_iucv: no iucv_unregister if register failed (Hendrik Brueckner) [661021]\n- [s390] qeth: l3 add vlan hdr in passthru frames (Hendrik Brueckner) [659822]\n- [s390] cio: suppress chpid event in case of config error (Hendrik Brueckner) [668838]\n- [xen] x86: fix guest memmove in __pirq_guest_unbind (Yufang Zhang) [659642]\n\n[2.6.18-243.el5]\n- [scsi] device_handler: fix alua_rtpg port group id check (Mike Snitzer) [669961]\n- [net] cnic: fix big endian bug with device page tables (Steve Best) [669527]\n- [fs] only return EIO once on msync/fsync after IO failure (Rik van Riel) [652369]\n- [net] bonding: convert netpoll tx blocking to a counter (Neil Horman) [659594]\n- [net] conntrack: fix oops specify hashsize module option (Neil Horman) [667810]\n- [misc] mce: reduce thermal throttle message severity (Matthew Garrett) [666972]\n- [acpi] reduce the number of resched IPIs (Matthew Garrett) [653398]\n- [virt] xen: make netfront driver return info to ethtool (Laszlo Ersek) [643292]\n- [virt] xen: synch arch/i386/pci/irq-xen.c (Laszlo Ersek) [623979]\n- [virt] netback: take lock when removing entry from list (Laszlo Ersek) [648854]\n- [virt] xen: make netloop permanent (Laszlo Ersek) [567540]\n- [net] virtio: add get_drvinfo support to virtio_net (Laszlo Ersek) [645646]\n- [virt] xen: implement get_drvinfo for netloop driver (Laszlo Ersek) [643872]\n- [virt] xen: implement get_drvinfo for netback driver (Laszlo Ersek) [643872]\n- [net] virtio_net: update trans_start properly (Jiri Olsa) [653828]\n- [net] gro: reset dev pointer on reuse (Andy Gospodarek) [600350]\n- [net] atl1e: add new Atheros GbE NIC driver (Bob Picco) [465379]\n- [fs] gfs2: support for growing a full filesytem (Benjamin Marzinski) [661904]\n- [fs] gfs2: reserve more blocks for transactions (Benjamin Marzinski) [637970]\n- [fs] gfs2: add fallocate support (Benjamin Marzinski) [626585]\n- [fs] nfs: break nfsd v4 lease on unlink, link, and rename (J. Bruce Fields) [610093]\n- [fs] nfs: break lease on nfsd v4 setattr (J. Bruce Fields) [610093]\n- [net] ipv6: add missing support for local_reserved_ports (Amerigo Wang) [669603]\n- [misc] add ignore_loglevel kernel parameter (Amerigo Wang) [662102]\n- [misc] add bootmem_debug kernel parameter (Amerigo Wang) [662102]\n- [xen] unmask ISVM bit on SVM guests (Paolo Bonzini) [665972]\n- [xen] add MSR_IA32_THERM_CONTROL for dom0 CPU throttling (Laszlo Ersek) [614007]\n\n[2.6.18-242.el5]\n- [net] be2net: fix missing trans_start update (Ivan Vecera) [671595]\n- [message] mptfusion: release resources in error path (Tomas Henzl) [648413]\n- [fs] gfs2: fix recovery stuck on transaction lock (Robert S Peterson) [553803]\n- [net] fix unix socket local dos (Neil Horman) [656760] {CVE-2010-4249}\n- [net] core: clear allocs for privileged ethtool actions (Jiri Pirko) [672433] {CVE-2010-4655}\n- [net] limit socket backlog add operation to prevent DoS (Jiri Pirko) [657309] {CVE-2010-4251}\n- [block] fix accounting bug on cross partition merges (Jerome Marchand) [646816]\n- [fs] nfs: fix units bug causing hang on nfsv4 recovery (J. Bruce Fields) [659243]\n- [fs] nfs: set source addr when v4 callback is generated (J. Bruce Fields) [659255]\n- [char] virtio: Wake console outvq on host notifications (Amit Shah) [673459]\n- [net] ipv4: fix IGMP behavior on v2/v3 query responses (Jiri Pirko) [634276]\n- [net] ipv6: honor SO_BINDTODEVICE parameter when routing (Jiri Olsa) [568881]\n\n[2.6.18-241.el5]\n- [net] tcp: fix shrinking windows with window scaling (Jiri Pirko) [627496]\n- [virt] xen: no enable extended PCI cfg space via IOports (Don Dutile) [661478]\n- [fs] gfs2: remove iopen glocks from cache on delete fail (Benjamin Marzinski) [666080]\n- [char] virtio: make console port names a KOBJ_ADD event (Amit Shah) [669909]\n- [net] e1000: Avoid unhandled IRQ (Dean Nelson) [651512]\n- [net] e1000: fix screaming IRQ (Dean Nelson) [651512]\n\n[2.6.18-240.el5]\n- [acpi] bus: check if list is empty before kfree()ing it (Matthew Garrett) [670373]\n- [net] ipv6: fragment local tunnel IPSec6 pkts if needed (Herbert Xu) [661110]\n- [block] cciss: fix null pointer problem in tur usage (Tomas Henzl) [664592]\n\n[2.6.18-239.el5]\n- [scsi] megaraid: give FW more time to recover from reset (Tomas Henzl) [665427]\n- [fs] gfs2: fix statfs error after gfs2_grow (Robert S Peterson) [660661]\n- [mm] prevent file lock corruption using popen(3) (Larry Woodman) [664931]\n- [net] sctp: fix panic from bad socket lock on icmp error (Neil Horman) [665477] {CVE-2010-4526}\n", u'issued': u'2011-07-31', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELSA-2011-1065.html', u'type': u'self', u'id': None, u'title': u'ELSA-2011-1065'}, {u'href': u'http://linux.oracle.com/cve/CVE-2011-1780.html', u'type': u'cve', u'id': u'CVE-2011-1780', u'title': u'CVE-2011-1780'}, {u'href': u'http://linux.oracle.com/cve/CVE-2011-2525.html', u'type': u'cve', u'id': u'CVE-2011-2525', u'title': u'CVE-2011-2525'}, {u'href': u'http://linux.oracle.com/cve/CVE-2011-2689.html', u'type': u'cve', u'id': u'CVE-2011-2689', u'title': u'CVE-2011-2689'}], u'_content_type_id': u'erratum', u'_id': u'642163fd-c6f4-46fc-8622-8dc886ff54cb', u'from': u'el-errata@oss.oracle.com', u'severity': u'Important', u'title': u' Oracle Linux 5.7 kernel security and bug fix update', u'_ns': u'units_erratum', u'rights': u'Copyright 2011 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 5', u'reboot_suggested': False, u'type': u'security', u'pkglist': [{u'packages': [{u'src': None, u'name': u'kernel', u'sum': [u'md5', u'd060504529f936212f6829f8e02c475c'], u'filename': u'kernel-2.6.18-274.el5.src.rpm', u'epoch': u'0', u'version': u'2.6.18', u'release': u'274.el5', u'arch': u'src'}, {u'src': None, u'name': u'kernel', u'sum': [u'md5', u'48a602d7453ef8f7a888edf1ae77d697'], u'filename': u'kernel-2.6.18-274.el5.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.18', u'release': u'274.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'kernel-debug', u'sum': [u'md5', u'c2632a297d678de4819613816a459741'], u'filename': u'kernel-debug-2.6.18-274.el5.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.18', u'release': u'274.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'kernel-debug-devel', u'sum': [u'md5', u'233348a8bb33ac2862cf3219a8a14a12'], u'filename': u'kernel-debug-devel-2.6.18-274.el5.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.18', u'release': u'274.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'kernel-devel', u'sum': [u'md5', u'865fc4ee071208293540cd55e1615bd0'], u'filename': u'kernel-devel-2.6.18-274.el5.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.18', u'release': u'274.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'kernel-doc', u'sum': [u'md5', u'218c0c8c6f8d2502dccdb792dd180790'], u'filename': u'kernel-doc-2.6.18-274.el5.noarch.rpm', u'epoch': u'0', u'version': u'2.6.18', u'release': u'274.el5', u'arch': u'noarch'}, {u'src': None, u'name': u'kernel-headers', u'sum': [u'md5', u'b5e4e359b2b7ff7ef96de53ecb2efa09'], u'filename': u'kernel-headers-2.6.18-274.el5.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.18', u'release': u'274.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'kernel-xen', u'sum': [u'md5', u'940c90c2eb18bd114f0b36ac0ce5ecec'], u'filename': u'kernel-xen-2.6.18-274.el5.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.18', u'release': u'274.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'kernel-xen-devel', u'sum': [u'md5', u'3b6ceb21f201caf7db2e19e84f4cc8b2'], u'filename': u'kernel-xen-devel-2.6.18-274.el5.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.18', u'release': u'274.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'ocfs2-2.6.18-274.el5', u'sum': [u'md5', u'ccd26246dbe18b7a0ccc19f90feb897c'], u'filename': u'ocfs2-2.6.18-274.el5-1.4.8-2.el5.src.rpm', u'epoch': u'0', u'version': u'1.4.8', u'release': u'2.el5', u'arch': u'src'}, {u'src': None, u'name': u'ocfs2-2.6.18-274.el5', u'sum': [u'md5', u'fa95788ad69624467ed00fc018c7f559'], u'filename': u'ocfs2-2.6.18-274.el5-1.4.8-2.el5.x86_64.rpm', u'epoch': u'0', u'version': u'1.4.8', u'release': u'2.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'ocfs2-2.6.18-274.el5debug', u'sum': [u'md5', u'fb129c7dd1ba1e960a67c77ddba4a8dd'], u'filename': u'ocfs2-2.6.18-274.el5debug-1.4.8-2.el5.x86_64.rpm', u'epoch': u'0', u'version': u'1.4.8', u'release': u'2.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'ocfs2-2.6.18-274.el5xen', u'sum': [u'md5', u'd68b1c0f5b43e3253a6eaee3eb4819ff'], u'filename': u'ocfs2-2.6.18-274.el5xen-1.4.8-2.el5.x86_64.rpm', u'epoch': u'0', u'version': u'1.4.8', u'release': u'2.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'oracleasm-2.6.18-274.el5', u'sum': [u'md5', u'a84207832479ce37c61ed199cb6fc87a'], u'filename': u'oracleasm-2.6.18-274.el5-2.0.5-1.el5.src.rpm', u'epoch': u'0', u'version': u'2.0.5', u'release': u'1.el5', u'arch': u'src'}, {u'src': None, u'name': u'oracleasm-2.6.18-274.el5', u'sum': [u'md5', u'dbe435659d31a1baf1a4a0b7e447896a'], u'filename': u'oracleasm-2.6.18-274.el5-2.0.5-1.el5.x86_64.rpm', u'epoch': u'0', u'version': u'2.0.5', u'release': u'1.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'oracleasm-2.6.18-274.el5debug', u'sum': [u'md5', u'd53b9bfb4960a86876e9d979d44fba53'], u'filename': u'oracleasm-2.6.18-274.el5debug-2.0.5-1.el5.x86_64.rpm', u'epoch': u'0', u'version': u'2.0.5', u'release': u'1.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'oracleasm-2.6.18-274.el5xen', u'sum': [u'md5', u'fbc2f61e9a53bd3c74f778e947edd9f8'], u'filename': u'oracleasm-2.6.18-274.el5xen-2.0.5-1.el5.x86_64.rpm', u'epoch': u'0', u'version': u'2.0.5', u'release': u'1.el5', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u"[3.2-32]\n- Dont include backup files\n Resolves: #700157\n\n[3.2-31]\n- Use 'mktemp' for temporary files\n Resolves: #700157\n\n[3.2-30]\n- Added man page references to systemwide .bash_logout\n Resolves: #592979\n\n[3.2-29]\n- Readline glitch, when editing line with more spaces and resizing window\n Resolves: #525474\n\n[3.2-28]\n- Fix the memory leak in read builtin\n Resolves: #618393\n- Dont append slash to non-directories\n Resolves: #583919\n\n[3.2-27]\n- Test .dynamic section if has PROGBITS or NOBITS\n Resolves: #484809\n- Better random number generator\n Resolves: #492908\n- Allow to source scripts with embeded NULL chars\n Resolves: #503701\n\n[3.2-26]\n- vi mode redo insert fixed\n Resolves: #575076\n- Dont show broken pipe messages for builtins\n Resolves: #546529\n- Dont include loadables in doc dir\n Resolves: #663656\n- Enable system-wide .bash_logout for login shells\n Resolves: #592979\n\n[3.2-25]\n- Dont abort source builtin\n Resolves: #448508\n- Correctly place cursor\n Resolves: #463880\n- Minor man page clarification for trap builtin\n Resolves: #504904", u'issued': u'2011-07-31', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELSA-2011-1073.html', u'type': u'self', u'id': None, u'title': u'ELSA-2011-1073'}, {u'href': u'http://linux.oracle.com/cve/CVE-2008-5374.html', u'type': u'cve', u'id': u'CVE-2008-5374', u'title': u'CVE-2008-5374'}], u'_content_type_id': u'erratum', u'_id': u'495aafef-ad3c-47fd-a5e9-486630aa2fac', u'from': u'el-errata@oss.oracle.com', u'severity': u'Low', u'title': u' bash security, bug fix, and enhancement update', u'_ns': u'units_erratum', u'rights': u'Copyright 2011 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 5', u'reboot_suggested': False, u'type': u'security', u'pkglist': [{u'packages': [{u'src': None, u'name': u'bash', u'sum': [u'md5', u'8288d2825876caf3f776747a40787a83'], u'filename': u'bash-3.2-32.el5.src.rpm', u'epoch': u'0', u'version': u'3.2', u'release': u'32.el5', u'arch': u'src'}, {u'src': None, u'name': u'bash', u'sum': [u'md5', u'5b064894b60ac81e6eec3b1a070a9872'], u'filename': u'bash-3.2-32.el5.x86_64.rpm', u'epoch': u'0', u'version': u'3.2', u'release': u'32.el5', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u'\n[1.3-9]\n- bz716489 (patch)', u'issued': u'2011-08-01', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELSA-2011-1089.html', u'type': u'self', u'id': None, u'title': u'ELSA-2011-1089'}, {u'href': u'http://linux.oracle.com/cve/CVE-2011-2503.html', u'type': u'cve', u'id': u'CVE-2011-2503', u'title': u'CVE-2011-2503'}], u'_content_type_id': u'erratum', u'_id': u'15ae6f7e-3551-42f9-952a-5dd55c10a295', u'from': u'el-errata@oss.oracle.com', u'severity': u'Moderate', u'title': u' systemtap security update', u'_ns': u'units_erratum', u'rights': u'Copyright 2011 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 5', u'reboot_suggested': False, u'type': u'security', u'pkglist': [{u'packages': [{u'src': None, u'name': u'systemtap', u'sum': [u'md5', u'f36c3928de2d1c0c9ee2aaebc6457f17'], u'filename': u'systemtap-1.3-9.el5.src.rpm', u'epoch': u'0', u'version': u'1.3', u'release': u'9.el5', u'arch': u'src'}, {u'src': None, u'name': u'systemtap', u'sum': [u'md5', u'd3887f1f4498ec04df84e988ad38805a'], u'filename': u'systemtap-1.3-9.el5.x86_64.rpm', u'epoch': u'0', u'version': u'1.3', u'release': u'9.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'systemtap-client', u'sum': [u'md5', u'f851463e66ddc9d253d01d96a4dbb5cd'], u'filename': u'systemtap-client-1.3-9.el5.x86_64.rpm', u'epoch': u'0', u'version': u'1.3', u'release': u'9.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'systemtap-initscript', u'sum': [u'md5', u'cf9c60b48781ab082dd64be0f04f9ba2'], u'filename': u'systemtap-initscript-1.3-9.el5.x86_64.rpm', u'epoch': u'0', u'version': u'1.3', u'release': u'9.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'systemtap-runtime', u'sum': [u'md5', u'56ccbe6c0736e4af0edea3049b2204aa'], u'filename': u'systemtap-runtime-1.3-9.el5.x86_64.rpm', u'epoch': u'0', u'version': u'1.3', u'release': u'9.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'systemtap-sdt-devel', u'sum': [u'md5', u'e8ffe5ea8c8450c4ad9e0b2566d3303d'], u'filename': u'systemtap-sdt-devel-1.3-9.el5.i386.rpm', u'epoch': u'0', u'version': u'1.3', u'release': u'9.el5', u'arch': u'i386'}, {u'src': None, u'name': u'systemtap-sdt-devel', u'sum': [u'md5', u'31827dac8927ebec564e725f47fca54b'], u'filename': u'systemtap-sdt-devel-1.3-9.el5.x86_64.rpm', u'epoch': u'0', u'version': u'1.3', u'release': u'9.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'systemtap-server', u'sum': [u'md5', u'a687c517aa2c262d7780b093ee93e1e8'], u'filename': u'systemtap-server-1.3-9.el5.x86_64.rpm', u'epoch': u'0', u'version': u'1.3', u'release': u'9.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'systemtap-testsuite', u'sum': [u'md5', u'2e86364fcfde2b4248a6895e5591e43f'], u'filename': u'systemtap-testsuite-1.3-9.el5.x86_64.rpm', u'epoch': u'0', u'version': u'1.3', u'release': u'9.el5', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u'\n[2:1.2.10-7.1.el5_7.5]\n- Install the correct fix for CVE-2011-2690\nResolves: #721303\n\n[2:1.2.10-7.1.el5_7.4]\n- Back-port fixes for CVE-2011-2690, CVE-2011-2692\n Note: CVE-2011-2691, announced at the same time, does not apply to 1.2.10;\n likewise for CVE-2011-2501\nResolves: #721303', u'issued': u'2011-08-01', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELSA-2011-1104.html', u'type': u'self', u'id': None, u'title': u'ELSA-2011-1104'}, {u'href': u'http://linux.oracle.com/cve/CVE-2011-2690.html', u'type': u'cve', u'id': u'CVE-2011-2690', u'title': u'CVE-2011-2690'}, {u'href': u'http://linux.oracle.com/cve/CVE-2011-2692.html', u'type': u'cve', u'id': u'CVE-2011-2692', u'title': u'CVE-2011-2692'}], u'_content_type_id': u'erratum', u'_id': u'202ad42b-11aa-4d13-bd55-6c464f1c7b50', u'from': u'el-errata@oss.oracle.com', u'severity': u'Moderate', u'title': u' libpng security update', u'_ns': u'units_erratum', u'rights': u'Copyright 2011 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 5', u'reboot_suggested': False, u'type': u'security', u'pkglist': [{u'packages': [{u'src': None, u'name': u'libpng', u'sum': [u'md5', u'6dccba829f19a5305aee86dd31fef891'], u'filename': u'libpng-1.2.10-7.1.el5_7.5.i386.rpm', u'epoch': u'2', u'version': u'1.2.10', u'release': u'7.1.el5_7.5', u'arch': u'i386'}, {u'src': None, u'name': u'libpng', u'sum': [u'md5', u'ea32ccdbd7a7c9059dc891977211f774'], u'filename': u'libpng-1.2.10-7.1.el5_7.5.src.rpm', u'epoch': u'2', u'version': u'1.2.10', u'release': u'7.1.el5_7.5', u'arch': u'src'}, {u'src': None, u'name': u'libpng', u'sum': [u'md5', u'88ba02ab0d47eaf0c710bca390fb1c88'], u'filename': u'libpng-1.2.10-7.1.el5_7.5.x86_64.rpm', u'epoch': u'2', u'version': u'1.2.10', u'release': u'7.1.el5_7.5', u'arch': u'x86_64'}, {u'src': None, u'name': u'libpng-devel', u'sum': [u'md5', u'f67d9ed3ca03a4ff6539b08988d5d65d'], u'filename': u'libpng-devel-1.2.10-7.1.el5_7.5.i386.rpm', u'epoch': u'2', u'version': u'1.2.10', u'release': u'7.1.el5_7.5', u'arch': u'i386'}, {u'src': None, u'name': u'libpng-devel', u'sum': [u'md5', u'7e757fb6d9825d6ac5c032f55a89547d'], u'filename': u'libpng-devel-1.2.10-7.1.el5_7.5.x86_64.rpm', u'epoch': u'2', u'version': u'1.2.10', u'release': u'7.1.el5_7.5', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u'[3.0.2-38.3:.1]\n- Applied patch to fix improper sanitization of command line options\n (CVE-2011-2697, bug #721001).', u'issued': u'2011-08-01', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELSA-2011-1109.html', u'type': u'self', u'id': None, u'title': u'ELSA-2011-1109'}, {u'href': u'http://linux.oracle.com/cve/CVE-2011-2697.html', u'type': u'cve', u'id': u'CVE-2011-2697', u'title': u'CVE-2011-2697'}], u'_content_type_id': u'erratum', u'_id': u'c213930f-2f1b-4bcd-8e6b-e9326c217eb7', u'from': u'el-errata@oss.oracle.com', u'severity': u'Moderate', u'title': u' foomatic security update', u'_ns': u'units_erratum', u'rights': u'Copyright 2011 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 5', u'reboot_suggested': False, u'type': u'security', u'pkglist': [{u'packages': [{u'src': None, u'name': u'foomatic', u'sum': [u'md5', u'f4214d13207b21f01d4d7439e530b0db'], u'filename': u'foomatic-3.0.2-38.3.el5_7.1.src.rpm', u'epoch': u'0', u'version': u'3.0.2', u'release': u'38.3.el5_7.1', u'arch': u'src'}, {u'src': None, u'name': u'foomatic', u'sum': [u'md5', u'2435014cd7329774c470af05e8ae38e1'], u'filename': u'foomatic-3.0.2-38.3.el5_7.1.x86_64.rpm', u'epoch': u'0', u'version': u'3.0.2', u'release': u'38.3.el5_7.1', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u'\n[1:1.2.24-5]\n- Merge changes from RHEL-6 branch:\n * Drop default patch fuzz\n * Merge CVE-2010-4352.patch from RHEL-6_0-Z\n- Apply patches for CVE-2011-2200\n- Resolves: #725313', u'issued': u'2011-08-09', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELSA-2011-1132.html', u'type': u'self', u'id': None, u'title': u'ELSA-2011-1132'}, {u'href': u'http://linux.oracle.com/cve/CVE-2011-2200.html', u'type': u'cve', u'id': u'CVE-2011-2200', u'title': u'CVE-2011-2200'}], u'_content_type_id': u'erratum', u'_id': u'95399bdf-ce8e-4ebb-b8a3-40cb46346d94', u'from': u'el-errata@oss.oracle.com', u'severity': u'Moderate', u'title': u' dbus security update', u'_ns': u'units_erratum', u'rights': u'Copyright 2011 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 6', u'reboot_suggested': False, u'type': u'security', u'pkglist': [{u'packages': [{u'src': None, u'name': u'dbus', u'sum': [u'md5', u'3884cf441c7a87e778d9b7d9b5fbe382'], u'filename': u'dbus-1.2.24-5.el6_1.src.rpm', u'epoch': u'1', u'version': u'1.2.24', u'release': u'5.el6_1', u'arch': u'src'}, {u'src': None, u'name': u'dbus', u'sum': [u'md5', u'7ad82c37723cdb519f37148bb1be1d0a'], u'filename': u'dbus-1.2.24-5.el6_1.x86_64.rpm', u'epoch': u'1', u'version': u'1.2.24', u'release': u'5.el6_1', u'arch': u'x86_64'}, {u'src': None, u'name': u'dbus-devel', u'sum': [u'md5', u'80bf065beda429448e19c8e2bc577d99'], u'filename': u'dbus-devel-1.2.24-5.el6_1.i686.rpm', u'epoch': u'1', u'version': u'1.2.24', u'release': u'5.el6_1', u'arch': u'i686'}, {u'src': None, u'name': u'dbus-devel', u'sum': [u'md5', u'4906762ec637dbf5f3b28b1b29a813de'], u'filename': u'dbus-devel-1.2.24-5.el6_1.x86_64.rpm', u'epoch': u'1', u'version': u'1.2.24', u'release': u'5.el6_1', u'arch': u'x86_64'}, {u'src': None, u'name': u'dbus-doc', u'sum': [u'md5', u'895e73d4fcf04c98115a14138f692724'], u'filename': u'dbus-doc-1.2.24-5.el6_1.noarch.rpm', u'epoch': u'1', u'version': u'1.2.24', u'release': u'5.el6_1', u'arch': u'noarch'}, {u'src': None, u'name': u'dbus-libs', u'sum': [u'md5', u'e5e3c9fdbd2cfb24a0def99f5e151b0e'], u'filename': u'dbus-libs-1.2.24-5.el6_1.i686.rpm', u'epoch': u'1', u'version': u'1.2.24', u'release': u'5.el6_1', u'arch': u'i686'}, {u'src': None, u'name': u'dbus-libs', u'sum': [u'md5', u'1ee77005824a3c402511a2f13500720c'], u'filename': u'dbus-libs-1.2.24-5.el6_1.x86_64.rpm', u'epoch': u'1', u'version': u'1.2.24', u'release': u'5.el6_1', u'arch': u'x86_64'}, {u'src': None, u'name': u'dbus-x11', u'sum': [u'md5', u'fef87630159ac86ec53cd5e20bd95884'], u'filename': u'dbus-x11-1.2.24-5.el6_1.x86_64.rpm', u'epoch': u'1', u'version': u'1.2.24', u'release': u'5.el6_1', u'arch': u'x86_64'}], u'name': u'ol6_x86_64_latest', u'short': u'ol6_x86_64_latest'}, {u'packages': [{u'src': None, u'name': u'dbus', u'sum': [u'md5', u'6dabfaf000c65517393bfa0614dc7ca5'], u'filename': u'dbus-1.1.2-16.el5_7.i386.rpm', u'epoch': u'0', u'version': u'1.1.2', u'release': u'16.el5_7', u'arch': u'i386'}, {u'src': None, u'name': u'dbus', u'sum': [u'md5', u'82425d20c947808744b2aa1dc8df88d6'], u'filename': u'dbus-1.1.2-16.el5_7.src.rpm', u'epoch': u'0', u'version': u'1.1.2', u'release': u'16.el5_7', u'arch': u'src'}, {u'src': None, u'name': u'dbus', u'sum': [u'md5', u'3fce06d0b0b7738f73c32a45ad50676a'], u'filename': u'dbus-1.1.2-16.el5_7.x86_64.rpm', u'epoch': u'0', u'version': u'1.1.2', u'release': u'16.el5_7', u'arch': u'x86_64'}, {u'src': None, u'name': u'dbus-devel', u'sum': [u'md5', u'85d8b5de9a4c9e1c05cea8215c6b6c66'], u'filename': u'dbus-devel-1.1.2-16.el5_7.i386.rpm', u'epoch': u'0', u'version': u'1.1.2', u'release': u'16.el5_7', u'arch': u'i386'}, {u'src': None, u'name': u'dbus-devel', u'sum': [u'md5', u'b87d9839cf064bca66708819b15a7f4f'], u'filename': u'dbus-devel-1.1.2-16.el5_7.x86_64.rpm', u'epoch': u'0', u'version': u'1.1.2', u'release': u'16.el5_7', u'arch': u'x86_64'}, {u'src': None, u'name': u'dbus-libs', u'sum': [u'md5', u'729ea10c57a902409edbe6838ffd8078'], u'filename': u'dbus-libs-1.1.2-16.el5_7.i386.rpm', u'epoch': u'0', u'version': u'1.1.2', u'release': u'16.el5_7', u'arch': u'i386'}, {u'src': None, u'name': u'dbus-libs', u'sum': [u'md5', u'6360b18f7dc317230da0b1fe874debc2'], u'filename': u'dbus-libs-1.1.2-16.el5_7.x86_64.rpm', u'epoch': u'0', u'version': u'1.1.2', u'release': u'16.el5_7', u'arch': u'x86_64'}, {u'src': None, u'name': u'dbus-x11', u'sum': [u'md5', u'6c2ec79b8e3d381668939ebca64b700b'], u'filename': u'dbus-x11-1.1.2-16.el5_7.x86_64.rpm', u'epoch': u'0', u'version': u'1.1.2', u'release': u'16.el5_7', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u'\n[1.4.1-2]\n- cve-2011-2895.patch: LZW decompression heap corruption', u'issued': u'2011-08-11', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELSA-2011-1154.html', u'type': u'self', u'id': None, u'title': u'ELSA-2011-1154'}, {u'href': u'http://linux.oracle.com/cve/CVE-2011-2895.html', u'type': u'cve', u'id': u'CVE-2011-2895', u'title': u'CVE-2011-2895'}], u'_content_type_id': u'erratum', u'_id': u'00558fb2-c383-455a-bd06-40285502df12', u'from': u'el-errata@oss.oracle.com', u'severity': u'Important', u'title': u' libXfont security update', u'_ns': u'units_erratum', u'rights': u'Copyright 2011 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 6', u'reboot_suggested': False, u'type': u'security', u'pkglist': [{u'packages': [{u'src': None, u'name': u'libXfont', u'sum': [u'md5', u'db346d4a0ddc89e0fd08af6e70e6ce1c'], u'filename': u'libXfont-1.4.1-2.el6_1.i686.rpm', u'epoch': u'0', u'version': u'1.4.1', u'release': u'2.el6_1', u'arch': u'i686'}, {u'src': None, u'name': u'libXfont', u'sum': [u'md5', u'1c34bff68b8161692457f9eb132cd601'], u'filename': u'libXfont-1.4.1-2.el6_1.src.rpm', u'epoch': u'0', u'version': u'1.4.1', u'release': u'2.el6_1', u'arch': u'src'}, {u'src': None, u'name': u'libXfont', u'sum': [u'md5', u'ec2b45e0d6da4500267b25aba0408173'], u'filename': u'libXfont-1.4.1-2.el6_1.x86_64.rpm', u'epoch': u'0', u'version': u'1.4.1', u'release': u'2.el6_1', u'arch': u'x86_64'}, {u'src': None, u'name': u'libXfont-devel', u'sum': [u'md5', u'323d0ba8398de4b3eaa82368d00eaba4'], u'filename': u'libXfont-devel-1.4.1-2.el6_1.i686.rpm', u'epoch': u'0', u'version': u'1.4.1', u'release': u'2.el6_1', u'arch': u'i686'}, {u'src': None, u'name': u'libXfont-devel', u'sum': [u'md5', u'81918b30c1ca98218bbfecb06167923b'], u'filename': u'libXfont-devel-1.4.1-2.el6_1.x86_64.rpm', u'epoch': u'0', u'version': u'1.4.1', u'release': u'2.el6_1', u'arch': u'x86_64'}], u'name': u'ol6_x86_64_latest', u'short': u'ol6_x86_64_latest'}, {u'packages': [{u'src': None, u'name': u'libXfont', u'sum': [u'md5', u'570d09b8524fbe69ec97c97d51613db0'], u'filename': u'libXfont-1.2.2-1.0.4.el5_7.i386.rpm', u'epoch': u'0', u'version': u'1.2.2', u'release': u'1.0.4.el5_7', u'arch': u'i386'}, {u'src': None, u'name': u'libXfont', u'sum': [u'md5', u'd185fe2a567e490baf0c16fd0fe44684'], u'filename': u'libXfont-1.2.2-1.0.4.el5_7.src.rpm', u'epoch': u'0', u'version': u'1.2.2', u'release': u'1.0.4.el5_7', u'arch': u'src'}, {u'src': None, u'name': u'libXfont', u'sum': [u'md5', u'bd237ba392ff335da618e154e3a93936'], u'filename': u'libXfont-1.2.2-1.0.4.el5_7.x86_64.rpm', u'epoch': u'0', u'version': u'1.2.2', u'release': u'1.0.4.el5_7', u'arch': u'x86_64'}, {u'src': None, u'name': u'libXfont-devel', u'sum': [u'md5', u'b75e0a97365ac13ad3a9c0927ebe0ab6'], u'filename': u'libXfont-devel-1.2.2-1.0.4.el5_7.i386.rpm', u'epoch': u'0', u'version': u'1.2.2', u'release': u'1.0.4.el5_7', u'arch': u'i386'}, {u'src': None, u'name': u'libXfont-devel', u'sum': [u'md5', u'54b4f98d880754689706b11055dfdf20'], u'filename': u'libXfont-devel-1.2.2-1.0.4.el5_7.x86_64.rpm', u'epoch': u'0', u'version': u'1.2.2', u'release': u'1.0.4.el5_7', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u'\n[12:4.1.1-19.P1.1]\n- A pair of defects cause the server to halt upon processing certain packets\n (CVE-2011-2748, CVE-2011-2749, #729883)', u'issued': u'2011-08-15', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELSA-2011-1160.html', u'type': u'self', u'id': None, u'title': u'ELSA-2011-1160'}, {u'href': u'http://linux.oracle.com/cve/CVE-2011-2748.html', u'type': u'cve', u'id': u'CVE-2011-2748', u'title': u'CVE-2011-2748'}, {u'href': u'http://linux.oracle.com/cve/CVE-2011-2749.html', u'type': u'cve', u'id': u'CVE-2011-2749', u'title': u'CVE-2011-2749'}], u'_content_type_id': u'erratum', u'_id': u'c77df327-5223-4848-ac6c-95a6725fcacd', u'from': u'el-errata@oss.oracle.com', u'severity': u'Moderate', u'title': u' dhcp security update', u'_ns': u'units_erratum', u'rights': u'Copyright 2011 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 6', u'reboot_suggested': False, u'type': u'security', u'pkglist': [{u'packages': [{u'src': None, u'name': u'dhclient', u'sum': [u'md5', u'ad21370438023f99d08f462256669763'], u'filename': u'dhclient-4.1.1-19.P1.el6_1.1.x86_64.rpm', u'epoch': u'12', u'version': u'4.1.1', u'release': u'19.P1.el6_1.1', u'arch': u'x86_64'}, {u'src': None, u'name': u'dhcp', u'sum': [u'md5', u'2bf5a4818d7ba75da183ccbbbe58c526'], u'filename': u'dhcp-4.1.1-19.P1.el6_1.1.src.rpm', u'epoch': u'12', u'version': u'4.1.1', u'release': u'19.P1.el6_1.1', u'arch': u'src'}, {u'src': None, u'name': u'dhcp', u'sum': [u'md5', u'16cbcf2e63c837a25d5a7b073737fe1c'], u'filename': u'dhcp-4.1.1-19.P1.el6_1.1.x86_64.rpm', u'epoch': u'12', u'version': u'4.1.1', u'release': u'19.P1.el6_1.1', u'arch': u'x86_64'}, {u'src': None, u'name': u'dhcp-devel', u'sum': [u'md5', u'085e24fb3e2017f31f333db387f56691'], u'filename': u'dhcp-devel-4.1.1-19.P1.el6_1.1.i686.rpm', u'epoch': u'12', u'version': u'4.1.1', u'release': u'19.P1.el6_1.1', u'arch': u'i686'}, {u'src': None, u'name': u'dhcp-devel', u'sum': [u'md5', u'7c9c0e3f96a4aa8733043aa31cbededf'], u'filename': u'dhcp-devel-4.1.1-19.P1.el6_1.1.x86_64.rpm', u'epoch': u'12', u'version': u'4.1.1', u'release': u'19.P1.el6_1.1', u'arch': u'x86_64'}], u'name': u'ol6_x86_64_latest', u'short': u'ol6_x86_64_latest'}, {u'packages': [{u'src': None, u'name': u'dhclient', u'sum': [u'md5', u'a13748e928b1bee6d4e217afa6dd23d9'], u'filename': u'dhclient-3.0.5-29.el5_7.1.x86_64.rpm', u'epoch': u'12', u'version': u'3.0.5', u'release': u'29.el5_7.1', u'arch': u'x86_64'}, {u'src': None, u'name': u'dhcp', u'sum': [u'md5', u'615d8020f38ddbe9c4750bbcd00b2ad6'], u'filename': u'dhcp-3.0.5-29.el5_7.1.src.rpm', u'epoch': u'12', u'version': u'3.0.5', u'release': u'29.el5_7.1', u'arch': u'src'}, {u'src': None, u'name': u'dhcp', u'sum': [u'md5', u'c2144da44292eabf4bfd10c8817f3d78'], u'filename': u'dhcp-3.0.5-29.el5_7.1.x86_64.rpm', u'epoch': u'12', u'version': u'3.0.5', u'release': u'29.el5_7.1', u'arch': u'x86_64'}, {u'src': None, u'name': u'dhcp-devel', u'sum': [u'md5', u'b81b1c755b1ec4067836302a613ac7c1'], u'filename': u'dhcp-devel-3.0.5-29.el5_7.1.i386.rpm', u'epoch': u'12', u'version': u'3.0.5', u'release': u'29.el5_7.1', u'arch': u'i386'}, {u'src': None, u'name': u'dhcp-devel', u'sum': [u'md5', u'c16da57b0daf0f82992e64ec58b1833d'], u'filename': u'dhcp-devel-3.0.5-29.el5_7.1.x86_64.rpm', u'epoch': u'12', u'version': u'3.0.5', u'release': u'29.el5_7.1', u'arch': u'x86_64'}, {u'src': None, u'name': u'libdhcp4client', u'sum': [u'md5', u'94d68ec5fcbbe1e8c62a41b050c4c7b8'], u'filename': u'libdhcp4client-3.0.5-29.el5_7.1.i386.rpm', u'epoch': u'12', u'version': u'3.0.5', u'release': u'29.el5_7.1', u'arch': u'i386'}, {u'src': None, u'name': u'libdhcp4client', u'sum': [u'md5', u'c890835803705b0297cacb0725c54262'], u'filename': u'libdhcp4client-3.0.5-29.el5_7.1.x86_64.rpm', u'epoch': u'12', u'version': u'3.0.5', u'release': u'29.el5_7.1', u'arch': u'x86_64'}, {u'src': None, u'name': u'libdhcp4client-devel', u'sum': [u'md5', u'e4b666834568197381e04cb053bc38e7'], u'filename': u'libdhcp4client-devel-3.0.5-29.el5_7.1.i386.rpm', u'epoch': u'12', u'version': u'3.0.5', u'release': u'29.el5_7.1', u'arch': u'i386'}, {u'src': None, u'name': u'libdhcp4client-devel', u'sum': [u'md5', u'4d93014bdcbd382167391569d93c21e9'], u'filename': u'libdhcp4client-devel-3.0.5-29.el5_7.1.x86_64.rpm', u'epoch': u'12', u'version': u'3.0.5', u'release': u'29.el5_7.1', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u'\nfirefox:\n\n[3.6.20-2.0.1.el6_1]\n- Add firefox-oracle-default-prefs.js and remove the corresponding Red Hat ones\n\n[3.6.20-2]\n- Update to 3.6.20\n\nxulrunner:\n\n[1.9.2.20-2.0.1.el6_1]\n- Replace xulrunner-redhat-default-prefs.js with\n xulrunner-oracle-default-prefs.js\n\n[1.9.2.20-2]\n- Update to 1.9.2.20', u'issued': u'2011-08-16', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELSA-2011-1164.html', u'type': u'self', u'id': None, u'title': u'ELSA-2011-1164'}, {u'href': u'http://linux.oracle.com/cve/CVE-2011-0084.html', u'type': u'cve', u'id': u'CVE-2011-0084', u'title': u'CVE-2011-0084'}, {u'href': u'http://linux.oracle.com/cve/CVE-2011-2378.html', u'type': u'cve', u'id': u'CVE-2011-2378', u'title': u'CVE-2011-2378'}, {u'href': u'http://linux.oracle.com/cve/CVE-2011-2981.html', u'type': u'cve', u'id': u'CVE-2011-2981', u'title': u'CVE-2011-2981'}, {u'href': u'http://linux.oracle.com/cve/CVE-2011-2982.html', u'type': u'cve', u'id': u'CVE-2011-2982', u'title': u'CVE-2011-2982'}, {u'href': u'http://linux.oracle.com/cve/CVE-2011-2983.html', u'type': u'cve', u'id': u'CVE-2011-2983', u'title': u'CVE-2011-2983'}, {u'href': u'http://linux.oracle.com/cve/CVE-2011-2984.html', u'type': u'cve', u'id': u'CVE-2011-2984', u'title': u'CVE-2011-2984'}], u'_content_type_id': u'erratum', u'_id': u'd9acfede-571c-4c0e-95a7-61dc31fad395', u'from': u'el-errata@oss.oracle.com', u'severity': u'Critical', u'title': u' firefox security update', u'_ns': u'units_erratum', u'rights': u'Copyright 2011 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 6', u'reboot_suggested': False, u'type': u'security', u'pkglist': [{u'packages': [{u'src': None, u'name': u'firefox', u'sum': [u'md5', u'04529b922c0996914630686f97aaf237'], u'filename': u'firefox-3.6.20-2.0.1.el6_1.i686.rpm', u'epoch': u'0', u'version': u'3.6.20', u'release': u'2.0.1.el6_1', u'arch': u'i686'}, {u'src': None, u'name': u'firefox', u'sum': [u'md5', u'cd06ebd016a5b406f9a57551ad5d1ae3'], u'filename': u'firefox-3.6.20-2.0.1.el6_1.src.rpm', u'epoch': u'0', u'version': u'3.6.20', u'release': u'2.0.1.el6_1', u'arch': u'src'}, {u'src': None, u'name': u'firefox', u'sum': [u'md5', u'ab3c1d3bc3d1404935f56845f1641edb'], u'filename': u'firefox-3.6.20-2.0.1.el6_1.x86_64.rpm', u'epoch': u'0', u'version': u'3.6.20', u'release': u'2.0.1.el6_1', u'arch': u'x86_64'}, {u'src': None, u'name': u'xulrunner', u'sum': [u'md5', u'0e09ca198cdcc20dbfe0e04d21e1ea61'], u'filename': u'xulrunner-1.9.2.20-2.0.1.el6_1.i686.rpm', u'epoch': u'0', u'version': u'1.9.2.20', u'release': u'2.0.1.el6_1', u'arch': u'i686'}, {u'src': None, u'name': u'xulrunner', u'sum': [u'md5', u'a4781a11080f11f8bd6057569ddbe662'], u'filename': u'xulrunner-1.9.2.20-2.0.1.el6_1.src.rpm', u'epoch': u'0', u'version': u'1.9.2.20', u'release': u'2.0.1.el6_1', u'arch': u'src'}, {u'src': None, u'name': u'xulrunner', u'sum': [u'md5', u'7a8abcc49fdd013a19e81d562ab7916d'], u'filename': u'xulrunner-1.9.2.20-2.0.1.el6_1.x86_64.rpm', u'epoch': u'0', u'version': u'1.9.2.20', u'release': u'2.0.1.el6_1', u'arch': u'x86_64'}, {u'src': None, u'name': u'xulrunner-devel', u'sum': [u'md5', u'0404ad3c3a1f03e21fe5a8a17b4d776e'], u'filename': u'xulrunner-devel-1.9.2.20-2.0.1.el6_1.i686.rpm', u'epoch': u'0', u'version': u'1.9.2.20', u'release': u'2.0.1.el6_1', u'arch': u'i686'}, {u'src': None, u'name': u'xulrunner-devel', u'sum': [u'md5', u'54942a8461aa115784b7b903d78f6e6f'], u'filename': u'xulrunner-devel-1.9.2.20-2.0.1.el6_1.x86_64.rpm', u'epoch': u'0', u'version': u'1.9.2.20', u'release': u'2.0.1.el6_1', u'arch': u'x86_64'}], u'name': u'ol6_x86_64_latest', u'short': u'ol6_x86_64_latest'}, {u'packages': [{u'src': None, u'name': u'firefox', u'sum': [u'md5', u'45852d3a7bffe95aa9142633dd0daca4'], u'filename': u'firefox-3.6.20-2.0.1.el5.i386.rpm', u'epoch': u'0', u'version': u'3.6.20', u'release': u'2.0.1.el5', u'arch': u'i386'}, {u'src': None, u'name': u'firefox', u'sum': [u'md5', u'0503ac6357b7b621aa672ca9bc812acd'], u'filename': u'firefox-3.6.20-2.0.1.el5.src.rpm', u'epoch': u'0', u'version': u'3.6.20', u'release': u'2.0.1.el5', u'arch': u'src'}, {u'src': None, u'name': u'firefox', u'sum': [u'md5', u'8e36d411bee0ea371c2fb44074aab1df'], u'filename': u'firefox-3.6.20-2.0.1.el5.x86_64.rpm', u'epoch': u'0', u'version': u'3.6.20', u'release': u'2.0.1.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'xulrunner', u'sum': [u'md5', u'4c9821e47e8dc8ea0a62badd9c6507c0'], u'filename': u'xulrunner-1.9.2.20-2.0.1.el5.i386.rpm', u'epoch': u'0', u'version': u'1.9.2.20', u'release': u'2.0.1.el5', u'arch': u'i386'}, {u'src': None, u'name': u'xulrunner', u'sum': [u'md5', u'b718d0bb23a6536c4a142268bfb2afc2'], u'filename': u'xulrunner-1.9.2.20-2.0.1.el5.src.rpm', u'epoch': u'0', u'version': u'1.9.2.20', u'release': u'2.0.1.el5', u'arch': u'src'}, {u'src': None, u'name': u'xulrunner', u'sum': [u'md5', u'8c6199559513f32b9a8cd57ea6153b52'], u'filename': u'xulrunner-1.9.2.20-2.0.1.el5.x86_64.rpm', u'epoch': u'0', u'version': u'1.9.2.20', u'release': u'2.0.1.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'xulrunner-devel', u'sum': [u'md5', u'2cdf1e945276ceeafffe408fa70240bb'], u'filename': u'xulrunner-devel-1.9.2.20-2.0.1.el5.i386.rpm', u'epoch': u'0', u'version': u'1.9.2.20', u'release': u'2.0.1.el5', u'arch': u'i386'}, {u'src': None, u'name': u'xulrunner-devel', u'sum': [u'md5', u'c7e5f87cf835c43091a1be7467e2e95c'], u'filename': u'xulrunner-devel-1.9.2.20-2.0.1.el5.x86_64.rpm', u'epoch': u'0', u'version': u'1.9.2.20', u'release': u'2.0.1.el5', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u'\n[1:2.0.9-2.1]\n- fix potential crash when parsing header names that contain NUL characters (#728672)', u'issued': u'2011-08-18', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELSA-2011-1187.html', u'type': u'self', u'id': None, u'title': u'ELSA-2011-1187'}, {u'href': u'http://linux.oracle.com/cve/CVE-2011-1929.html', u'type': u'cve', u'id': u'CVE-2011-1929', u'title': u'CVE-2011-1929'}], u'_content_type_id': u'erratum', u'_id': u'ec913572-c90a-4f74-ae47-c8c63b9ca4c8', u'from': u'el-errata@oss.oracle.com', u'severity': u'Moderate', u'title': u' dovecot security update', u'_ns': u'units_erratum', u'rights': u'Copyright 2011 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 6', u'reboot_suggested': False, u'type': u'security', u'pkglist': [{u'packages': [{u'src': None, u'name': u'dovecot', u'sum': [u'md5', u'bb832f0c9ea0917b689a264b93a3ebe4'], u'filename': u'dovecot-2.0.9-2.el6_1.1.i686.rpm', u'epoch': u'1', u'version': u'2.0.9', u'release': u'2.el6_1.1', u'arch': u'i686'}, {u'src': None, u'name': u'dovecot', u'sum': [u'md5', u'77b5595a04df6c5e1b9c93352cfd7d35'], u'filename': u'dovecot-2.0.9-2.el6_1.1.src.rpm', u'epoch': u'1', u'version': u'2.0.9', u'release': u'2.el6_1.1', u'arch': u'src'}, {u'src': None, u'name': u'dovecot', u'sum': [u'md5', u'05418f411b15e8ecb07ed0a4bbb022dd'], u'filename': u'dovecot-2.0.9-2.el6_1.1.x86_64.rpm', u'epoch': u'1', u'version': u'2.0.9', u'release': u'2.el6_1.1', u'arch': u'x86_64'}, {u'src': None, u'name': u'dovecot-devel', u'sum': [u'md5', u'3f35ad71a98f3a52261e666ab3697a3a'], u'filename': u'dovecot-devel-2.0.9-2.el6_1.1.i686.rpm', u'epoch': u'1', u'version': u'2.0.9', u'release': u'2.el6_1.1', u'arch': u'i686'}, {u'src': None, u'name': u'dovecot-devel', u'sum': [u'md5', u'ab4be835bc61a3fd9e765445407f8ba4'], u'filename': u'dovecot-devel-2.0.9-2.el6_1.1.x86_64.rpm', u'epoch': u'1', u'version': u'2.0.9', u'release': u'2.el6_1.1', u'arch': u'x86_64'}, {u'src': None, u'name': u'dovecot-mysql', u'sum': [u'md5', u'ee71402f9bf5c3b29519e3846d797848'], u'filename': u'dovecot-mysql-2.0.9-2.el6_1.1.x86_64.rpm', u'epoch': u'1', u'version': u'2.0.9', u'release': u'2.el6_1.1', u'arch': u'x86_64'}, {u'src': None, u'name': u'dovecot-pgsql', u'sum': [u'md5', u'6f4790fdbee12e400bbeb72560cb8f8f'], u'filename': u'dovecot-pgsql-2.0.9-2.el6_1.1.x86_64.rpm', u'epoch': u'1', u'version': u'2.0.9', u'release': u'2.el6_1.1', u'arch': u'x86_64'}, {u'src': None, u'name': u'dovecot-pigeonhole', u'sum': [u'md5', u'a6ed15e523e05ff424caecd0551188d6'], u'filename': u'dovecot-pigeonhole-2.0.9-2.el6_1.1.x86_64.rpm', u'epoch': u'1', u'version': u'2.0.9', u'release': u'2.el6_1.1', u'arch': u'x86_64'}], u'name': u'ol6_x86_64_latest', u'short': u'ol6_x86_64_latest'}, {u'packages': [{u'src': None, u'name': u'dovecot', u'sum': [u'md5', u'a11070ce33971df9b0ff88053b19cf5c'], u'filename': u'dovecot-1.0.7-7.el5_7.1.src.rpm', u'epoch': u'0', u'version': u'1.0.7', u'release': u'7.el5_7.1', u'arch': u'src'}, {u'src': None, u'name': u'dovecot', u'sum': [u'md5', u'0611f7ae13913a02b00c3dd60b032e82'], u'filename': u'dovecot-1.0.7-7.el5_7.1.x86_64.rpm', u'epoch': u'0', u'version': u'1.0.7', u'release': u'7.el5_7.1', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u'\n[0.7.32.10-1.0.1.el5_7.1]\n- Add oracle-bug-reporting.patch\n\n[0.7.32.10-1:.1]\n- Applied patch to fix CVE-2011-2899 (bug #728348).', u'issued': u'2011-08-23', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELSA-2011-1196.html', u'type': u'self', u'id': None, u'title': u'ELSA-2011-1196'}, {u'href': u'http://linux.oracle.com/cve/CVE-2011-2899.html', u'type': u'cve', u'id': u'CVE-2011-2899', u'title': u'CVE-2011-2899'}], u'_content_type_id': u'erratum', u'_id': u'ffdda7eb-6942-40e1-88e9-47e17b83bd51', u'from': u'el-errata@oss.oracle.com', u'severity': u'Moderate', u'title': u' system-config-printer security update', u'_ns': u'units_erratum', u'rights': u'Copyright 2011 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 5', u'reboot_suggested': False, u'type': u'security', u'pkglist': [{u'packages': [{u'src': None, u'name': u'system-config-printer', u'sum': [u'md5', u'0f774aa680e6cbac6239deb74bee60a1'], u'filename': u'system-config-printer-0.7.32.10-1.0.1.el5_7.1.src.rpm', u'epoch': u'0', u'version': u'0.7.32.10', u'release': u'1.0.1.el5_7.1', u'arch': u'src'}, {u'src': None, u'name': u'system-config-printer', u'sum': [u'md5', u'f996a40d22d446836ebc618f12d33bd0'], u'filename': u'system-config-printer-0.7.32.10-1.0.1.el5_7.1.x86_64.rpm', u'epoch': u'0', u'version': u'0.7.32.10', u'release': u'1.0.1.el5_7.1', u'arch': u'x86_64'}, {u'src': None, u'name': u'system-config-printer-libs', u'sum': [u'md5', u'01d0c9cdc10f409de8a9a3e4068448c1'], u'filename': u'system-config-printer-libs-0.7.32.10-1.0.1.el5_7.1.x86_64.rpm', u'epoch': u'0', u'version': u'0.7.32.10', u'release': u'1.0.1.el5_7.1', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u"\n[2.6.18-274.3.1.0.1.el5]\n- [fs] nfs: Fix __put_nfs_open_context() NULL pointer panic (Joe Jin) [orabug 12687646]\n- [scsi] fix scsi hotplug and rescan race [orabug 10260172]\n- fix filp_close() race (Joe Jin) [orabug 10335998]\n- fix missing aio_complete() in end_io (Joel Becker) [orabug 10365195]\n- make xenkbd.abs_pointer=1 by default [orabug 67188919]\n- [xen] check to see if hypervisor supports memory reservation change\n (Chuck Anderson) [orabug 7556514]\n- [net] Enable entropy for bnx2,bnx2x,e1000e,igb,ixgb,ixgbe,ixgbevf (John Sobecki)\n [orabug 10315433]\n- [NET] Add xen pv netconsole support (Tina Yang) [orabug 6993043] [bz 7258]\n- [mm] shrink_zone patch (John Sobecki,Chris Mason) [orabug 6086839]\n- fix aacraid not to reset during kexec (Joe Jin) [orabug 8516042]\n- [rds] Patch rds to 1.4.2-20 (Andy Grover) [orabug 9471572, 9344105]\n RDS: Fix BUG_ONs to not fire when in a tasklet\n ipoib: Fix lockup of the tx queue\n RDS: Do not call set_page_dirty() with irqs off (Sherman Pun)\n RDS: Properly unmap when getting a remote access error (Tina Yang)\n RDS: Fix locking in rds_send_drop_to()\n- [xen] PVHVM guest with PoD crashes under memory pressure (Chuck Anderson)\n [orabug 9107465]\n- [xen] PV guest with FC HBA hangs during shutdown (Chuck Anderson)\n [orabug 9764220]\n- Support 256GB+ memory for pv guest (Mukesh Rathor) [orabug 9450615]\n- fix overcommit memory to use percpu_counter for el5 (KOSAKI Motohiro,\n Guru Anbalagane) [orabug 6124033]\n- [ipmi] make configurable timeouts for kcs of ipmi [orabug 9752208]\n- [ib] fix memory corruption (Andy Grover) [orabug 9972346]\n- [aio] patch removes limit on number of retries (Srinivas Eeda) [orabug 10044782]\n- [loop] Do not call loop_unplug for not configured loop device (orabug 10314497)\n\n[2.6.18-274.3.1.el5]\n- [xen] fix off-by-one shift in x86_64 __addr_ok (Laszlo Ersek) [728043 719850] {CVE-2011-2901}\n\n[2.6.18-274.2.1.el5]\n- Fix up some fallout from RHEL5.7 kernel package structure changes\n\n[2.6.18-274.1.1.el5]\n- [net] sctp: fix memory reclaim and panic in sctp_sock_rfree (Thomas Graf) [714869 714867]\n- [x86_64] Revert ACPI APIC mode test (Prarit Bhargava) [728163 721361]\n- [net] sctp: reset packet information after packet transmit (Thomas Graf) [727592 725573]\n- [fs] block: initialise bd_super in bdget (Lachlan McIlroy) [726628 707425]\n- [fs] nfs: Remove bogus call to nfs4_drop_state_owner (Jeff Layton) [726625 724923]\n- [net] be2net: clear interrupt bit in be_probe (Ivan Vecera) [723552 713703]\n- [net] be2net: remove certain cmd failure logging (Ivan Vecera) [726619 716821]\n- [wireless] nl80211: check for valid SSID size in scan operation (Stanislaw Gruszka) [718154 718155] {CVE-2011-2517}\n- [fs] xfs: handle NULL mount struct in error reports (Eric Sandeen) [727835 720551]\n- [fs] proc: restrict access to /proc/PID/io (Oleg Nesterov) [716827 716828] {CVE-2011-2495}\n- [fs] lockd: don't use file's credentials on RPCSEC_GSS mounts (Max Matveev) [722855 701574]\n- [fs] xfs: add a missing mutex_unlock to a dio error path (Jeff Moyer) [727590 718232]\n- [net] sunrpc: Don't hang forever on NLM unlock requests (Jeff Layton) [709546 709547] {CVE-2011-2491}\n- [xen] x86_emulate: Fix SAHF emulation (Igor Mammedov) [718883 718884]\n- [xen] Fix x86_emulate handling of imul with immediate operands (Igor Mammedov) [712885 700565]\n- [fs] Fix wrongly vfree'ing a kmalloc'ed area (Larry Woodman) [721300 719495]\n- [fs] dlm: bump default hash table and maximum allocatable sizes (Bryn M. Reeves) [719930 715603]\n- [net] tipc: Overhaul of socket locking logic (Max Matveev) [719746 704192]", u'issued': u'2011-09-07', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELSA-2011-1212.html', u'type': u'self', u'id': None, u'title': u'ELSA-2011-1212'}, {u'href': u'http://linux.oracle.com/cve/CVE-2011-2482.html', u'type': u'cve', u'id': u'CVE-2011-2482', u'title': u'CVE-2011-2482'}, {u'href': u'http://linux.oracle.com/cve/CVE-2011-2491.html', u'type': u'cve', u'id': u'CVE-2011-2491', u'title': u'CVE-2011-2491'}, {u'href': u'http://linux.oracle.com/cve/CVE-2011-2495.html', u'type': u'cve', u'id': u'CVE-2011-2495', u'title': u'CVE-2011-2495'}, {u'href': u'http://linux.oracle.com/cve/CVE-2011-2517.html', u'type': u'cve', u'id': u'CVE-2011-2517', u'title': u'CVE-2011-2517'}, {u'href': u'http://linux.oracle.com/cve/CVE-2011-2519.html', u'type': u'cve', u'id': u'CVE-2011-2519', u'title': u'CVE-2011-2519'}, {u'href': u'http://linux.oracle.com/cve/CVE-2011-2901.html', u'type': u'cve', u'id': u'CVE-2011-2901', u'title': u'CVE-2011-2901'}], u'_content_type_id': u'erratum', u'_id': u'be919f46-24fe-421c-90e9-d8b8af87eca5', u'from': u'el-errata@oss.oracle.com', u'severity': u'Important', u'title': u' kernel security and bug fix update', u'_ns': u'units_erratum', u'rights': u'Copyright 2011 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 5', u'reboot_suggested': False, u'type': u'security', u'pkglist': [{u'packages': [{u'src': None, u'name': u'kernel', u'sum': [u'md5', u'672c8a6405257db7872cb786315e65c0'], u'filename': u'kernel-2.6.18-274.3.1.0.1.el5.src.rpm', u'epoch': u'0', u'version': u'2.6.18', u'release': u'274.3.1.0.1.el5', u'arch': u'src'}, {u'src': None, u'name': u'kernel', u'sum': [u'md5', u'b45b7ce826f54a72232ea6f07f169873'], u'filename': u'kernel-2.6.18-274.3.1.0.1.el5.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.18', u'release': u'274.3.1.0.1.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'kernel-debug', u'sum': [u'md5', u'bfbe408d0905d8380296d0c743094041'], u'filename': u'kernel-debug-2.6.18-274.3.1.0.1.el5.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.18', u'release': u'274.3.1.0.1.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'kernel-debug-devel', u'sum': [u'md5', u'4687bd32be22edb33b1546c060f071ad'], u'filename': u'kernel-debug-devel-2.6.18-274.3.1.0.1.el5.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.18', u'release': u'274.3.1.0.1.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'kernel-devel', u'sum': [u'md5', u'e7193c92baf629c74d71d21d0d81ad1f'], u'filename': u'kernel-devel-2.6.18-274.3.1.0.1.el5.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.18', u'release': u'274.3.1.0.1.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'kernel-doc', u'sum': [u'md5', u'772615cb6cfbfd50e6c437c2e6dff9d0'], u'filename': u'kernel-doc-2.6.18-274.3.1.0.1.el5.noarch.rpm', u'epoch': u'0', u'version': u'2.6.18', u'release': u'274.3.1.0.1.el5', u'arch': u'noarch'}, {u'src': None, u'name': u'kernel-headers', u'sum': [u'md5', u'e13a3658ceaf0729c9396f2543be7316'], u'filename': u'kernel-headers-2.6.18-274.3.1.0.1.el5.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.18', u'release': u'274.3.1.0.1.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'kernel-xen', u'sum': [u'md5', u'5705e04e2a94b882cffa73a7c8666a04'], u'filename': u'kernel-xen-2.6.18-274.3.1.0.1.el5.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.18', u'release': u'274.3.1.0.1.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'kernel-xen-devel', u'sum': [u'md5', u'bc66896a7af2a190f72e99a09f8e2096'], u'filename': u'kernel-xen-devel-2.6.18-274.3.1.0.1.el5.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.18', u'release': u'274.3.1.0.1.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'ocfs2-2.6.18-274.3.1.0.1.el5', u'sum': [u'md5', u'047ed9621b13d83d1bdda2e9995730bb'], u'filename': u'ocfs2-2.6.18-274.3.1.0.1.el5-1.4.8-2.el5.src.rpm', u'epoch': u'0', u'version': u'1.4.8', u'release': u'2.el5', u'arch': u'src'}, {u'src': None, u'name': u'ocfs2-2.6.18-274.3.1.0.1.el5', u'sum': [u'md5', u'29de44ec4cc95eb6d011442237832b05'], u'filename': u'ocfs2-2.6.18-274.3.1.0.1.el5-1.4.8-2.el5.x86_64.rpm', u'epoch': u'0', u'version': u'1.4.8', u'release': u'2.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'ocfs2-2.6.18-274.3.1.0.1.el5debug', u'sum': [u'md5', u'770f3b6fad3ba852e7cd821e65dbfe34'], u'filename': u'ocfs2-2.6.18-274.3.1.0.1.el5debug-1.4.8-2.el5.x86_64.rpm', u'epoch': u'0', u'version': u'1.4.8', u'release': u'2.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'ocfs2-2.6.18-274.3.1.0.1.el5xen', u'sum': [u'md5', u'324a5618c400d7b7087576da761a483d'], u'filename': u'ocfs2-2.6.18-274.3.1.0.1.el5xen-1.4.8-2.el5.x86_64.rpm', u'epoch': u'0', u'version': u'1.4.8', u'release': u'2.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'oracleasm-2.6.18-274.3.1.0.1.el5', u'sum': [u'md5', u'857a0982f43d5d840c7cf4bd43ee2c62'], u'filename': u'oracleasm-2.6.18-274.3.1.0.1.el5-2.0.5-1.el5.src.rpm', u'epoch': u'0', u'version': u'2.0.5', u'release': u'1.el5', u'arch': u'src'}, {u'src': None, u'name': u'oracleasm-2.6.18-274.3.1.0.1.el5', u'sum': [u'md5', u'6ca83ac04204957f3e49ea14e561e656'], u'filename': u'oracleasm-2.6.18-274.3.1.0.1.el5-2.0.5-1.el5.x86_64.rpm', u'epoch': u'0', u'version': u'2.0.5', u'release': u'1.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'oracleasm-2.6.18-274.3.1.0.1.el5debug', u'sum': [u'md5', u'dd88ae5a36051d054f54685c44676deb'], u'filename': u'oracleasm-2.6.18-274.3.1.0.1.el5debug-2.0.5-1.el5.x86_64.rpm', u'epoch': u'0', u'version': u'2.0.5', u'release': u'1.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'oracleasm-2.6.18-274.3.1.0.1.el5xen', u'sum': [u'md5', u'8f3cf603c8c8ee3de5622314c1a3c3b3'], u'filename': u'oracleasm-2.6.18-274.3.1.0.1.el5xen-2.0.5-1.el5.x86_64.rpm', u'epoch': u'0', u'version': u'2.0.5', u'release': u'1.el5', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u'\n[3.0.33-3.29.el5.4]\n- Security Release, Add fix also for CVE-2011-2724\n- related: #722552\n\n[3.0.33-3.29.el5.3]\n- Security Release, fixes CVE-2010-0547, CVE-2010-0787, CVE-2011-2694,\n CVE-2011-2522, CVE-2011-1678\n- resolves: #722552', u'issued': u'2011-08-29', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELSA-2011-1219.html', u'type': u'self', u'id': None, u'title': u'ELSA-2011-1219'}, {u'href': u'http://linux.oracle.com/cve/CVE-2010-0547.html', u'type': u'cve', u'id': u'CVE-2010-0547', u'title': u'CVE-2010-0547'}, {u'href': u'http://linux.oracle.com/cve/CVE-2010-0787.html', u'type': u'cve', u'id': u'CVE-2010-0787', u'title': u'CVE-2010-0787'}, {u'href': u'http://linux.oracle.com/cve/CVE-2011-1678.html', u'type': u'cve', u'id': u'CVE-2011-1678', u'title': u'CVE-2011-1678'}, {u'href': u'http://linux.oracle.com/cve/CVE-2011-2522.html', u'type': u'cve', u'id': u'CVE-2011-2522', u'title': u'CVE-2011-2522'}, {u'href': u'http://linux.oracle.com/cve/CVE-2011-2694.html', u'type': u'cve', u'id': u'CVE-2011-2694', u'title': u'CVE-2011-2694'}, {u'href': u'http://linux.oracle.com/cve/CVE-2011-3585.html', u'type': u'cve', u'id': u'CVE-2011-3585', u'title': u'CVE-2011-3585'}], u'_content_type_id': u'erratum', u'_id': u'7e662d3f-6ab2-45c7-90e4-17c3e5e0ab95', u'from': u'el-errata@oss.oracle.com', u'severity': u'Moderate', u'title': u' samba security update', u'_ns': u'units_erratum', u'rights': u'Copyright 2011 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 5', u'reboot_suggested': False, u'type': u'security', u'pkglist': [{u'packages': [{u'src': None, u'name': u'libsmbclient', u'sum': [u'md5', u'f924f282c0bc5cac68798efab0778cc7'], u'filename': u'libsmbclient-3.0.33-3.29.el5_7.4.i386.rpm', u'epoch': u'0', u'version': u'3.0.33', u'release': u'3.29.el5_7.4', u'arch': u'i386'}, {u'src': None, u'name': u'libsmbclient', u'sum': [u'md5', u'49bcf0dee78599c2e8b31be8553b86b2'], u'filename': u'libsmbclient-3.0.33-3.29.el5_7.4.x86_64.rpm', u'epoch': u'0', u'version': u'3.0.33', u'release': u'3.29.el5_7.4', u'arch': u'x86_64'}, {u'src': None, u'name': u'libsmbclient-devel', u'sum': [u'md5', u'116828a1ec7864f08d7fa18e199d0bb8'], u'filename': u'libsmbclient-devel-3.0.33-3.29.el5_7.4.i386.rpm', u'epoch': u'0', u'version': u'3.0.33', u'release': u'3.29.el5_7.4', u'arch': u'i386'}, {u'src': None, u'name': u'libsmbclient-devel', u'sum': [u'md5', u'e70e0e26a910c08572b162bad1d200a6'], u'filename': u'libsmbclient-devel-3.0.33-3.29.el5_7.4.x86_64.rpm', u'epoch': u'0', u'version': u'3.0.33', u'release': u'3.29.el5_7.4', u'arch': u'x86_64'}, {u'src': None, u'name': u'samba', u'sum': [u'md5', u'2f3c5ee5d9ed5c622d93defc4bbfce9c'], u'filename': u'samba-3.0.33-3.29.el5_7.4.src.rpm', u'epoch': u'0', u'version': u'3.0.33', u'release': u'3.29.el5_7.4', u'arch': u'src'}, {u'src': None, u'name': u'samba', u'sum': [u'md5', u'28fed491ccbf6aea4ceda41ddbe7a9a8'], u'filename': u'samba-3.0.33-3.29.el5_7.4.x86_64.rpm', u'epoch': u'0', u'version': u'3.0.33', u'release': u'3.29.el5_7.4', u'arch': u'x86_64'}, {u'src': None, u'name': u'samba-client', u'sum': [u'md5', u'caae272966fa4b485b367f3c2e9d7c5a'], u'filename': u'samba-client-3.0.33-3.29.el5_7.4.x86_64.rpm', u'epoch': u'0', u'version': u'3.0.33', u'release': u'3.29.el5_7.4', u'arch': u'x86_64'}, {u'src': None, u'name': u'samba-common', u'sum': [u'md5', u'a3bb76e3b2adfbac76cf01220b6270bb'], u'filename': u'samba-common-3.0.33-3.29.el5_7.4.i386.rpm', u'epoch': u'0', u'version': u'3.0.33', u'release': u'3.29.el5_7.4', u'arch': u'i386'}, {u'src': None, u'name': u'samba-common', u'sum': [u'md5', u'befaa9845c79faaa4c32870dc21242c9'], u'filename': u'samba-common-3.0.33-3.29.el5_7.4.x86_64.rpm', u'epoch': u'0', u'version': u'3.0.33', u'release': u'3.29.el5_7.4', u'arch': u'x86_64'}, {u'src': None, u'name': u'samba-swat', u'sum': [u'md5', u'57c4dd8db3dfa3730db9adc3660dfe87'], u'filename': u'samba-swat-3.0.33-3.29.el5_7.4.x86_64.rpm', u'epoch': u'0', u'version': u'3.0.33', u'release': u'3.29.el5_7.4', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u'\n[3.5.4-0.83.2]\n- Security Release, add fix for CVE-2011-2724\n- related: #722555\n\n[3.5.4-0.83.1]\n- Security Release, fixes CVE-2011-2694, CVE-2011-2522, CVE-2011-1678\n- resolves: #722555', u'issued': u'2011-08-29', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELSA-2011-1220.html', u'type': u'self', u'id': None, u'title': u'ELSA-2011-1220'}, {u'href': u'http://linux.oracle.com/cve/CVE-2011-1678.html', u'type': u'cve', u'id': u'CVE-2011-1678', u'title': u'CVE-2011-1678'}, {u'href': u'http://linux.oracle.com/cve/CVE-2011-2522.html', u'type': u'cve', u'id': u'CVE-2011-2522', u'title': u'CVE-2011-2522'}, {u'href': u'http://linux.oracle.com/cve/CVE-2011-2694.html', u'type': u'cve', u'id': u'CVE-2011-2694', u'title': u'CVE-2011-2694'}, {u'href': u'http://linux.oracle.com/cve/CVE-2011-2724.html', u'type': u'cve', u'id': u'CVE-2011-2724', u'title': u'CVE-2011-2724'}], u'_content_type_id': u'erratum', u'_id': u'4e45dbbd-1929-4d1f-8569-ed773bfb2b9d', u'from': u'el-errata@oss.oracle.com', u'severity': u'Moderate', u'title': u' samba3x security update', u'_ns': u'units_erratum', u'rights': u'Copyright 2011 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 5', u'reboot_suggested': False, u'type': u'security', u'pkglist': [{u'packages': [{u'src': None, u'name': u'samba3x', u'sum': [u'md5', u'06efd75bf7e2a50e2fba94704667eb13'], u'filename': u'samba3x-3.5.4-0.83.el5_7.2.src.rpm', u'epoch': u'0', u'version': u'3.5.4', u'release': u'0.83.el5_7.2', u'arch': u'src'}, {u'src': None, u'name': u'samba3x', u'sum': [u'md5', u'385d7d64269ee4e373e5c377a8606221'], u'filename': u'samba3x-3.5.4-0.83.el5_7.2.x86_64.rpm', u'epoch': u'0', u'version': u'3.5.4', u'release': u'0.83.el5_7.2', u'arch': u'x86_64'}, {u'src': None, u'name': u'samba3x-client', u'sum': [u'md5', u'44b8fc34c0bd5878df85f2c9ea14ef43'], u'filename': u'samba3x-client-3.5.4-0.83.el5_7.2.x86_64.rpm', u'epoch': u'0', u'version': u'3.5.4', u'release': u'0.83.el5_7.2', u'arch': u'x86_64'}, {u'src': None, u'name': u'samba3x-common', u'sum': [u'md5', u'd4217af83be5508be1a1b3880859d9d2'], u'filename': u'samba3x-common-3.5.4-0.83.el5_7.2.x86_64.rpm', u'epoch': u'0', u'version': u'3.5.4', u'release': u'0.83.el5_7.2', u'arch': u'x86_64'}, {u'src': None, u'name': u'samba3x-doc', u'sum': [u'md5', u'd9b0bf47751cb1273bec7bb359896970'], u'filename': u'samba3x-doc-3.5.4-0.83.el5_7.2.x86_64.rpm', u'epoch': u'0', u'version': u'3.5.4', u'release': u'0.83.el5_7.2', u'arch': u'x86_64'}, {u'src': None, u'name': u'samba3x-domainjoin-gui', u'sum': [u'md5', u'8e42dbfe9fccb8e07431348de8c8ee2e'], u'filename': u'samba3x-domainjoin-gui-3.5.4-0.83.el5_7.2.x86_64.rpm', u'epoch': u'0', u'version': u'3.5.4', u'release': u'0.83.el5_7.2', u'arch': u'x86_64'}, {u'src': None, u'name': u'samba3x-swat', u'sum': [u'md5', u'57118d911e80d262f1f2cd8c4cd9042b'], u'filename': u'samba3x-swat-3.5.4-0.83.el5_7.2.x86_64.rpm', u'epoch': u'0', u'version': u'3.5.4', u'release': u'0.83.el5_7.2', u'arch': u'x86_64'}, {u'src': None, u'name': u'samba3x-winbind', u'sum': [u'md5', u'1acbc4dfb347aefc0700e05ef18fe36b'], u'filename': u'samba3x-winbind-3.5.4-0.83.el5_7.2.i386.rpm', u'epoch': u'0', u'version': u'3.5.4', u'release': u'0.83.el5_7.2', u'arch': u'i386'}, {u'src': None, u'name': u'samba3x-winbind', u'sum': [u'md5', u'fa36bd37a4f33d555ed1b8fd4451200a'], u'filename': u'samba3x-winbind-3.5.4-0.83.el5_7.2.x86_64.rpm', u'epoch': u'0', u'version': u'3.5.4', u'release': u'0.83.el5_7.2', u'arch': u'x86_64'}, {u'src': None, u'name': u'samba3x-winbind-devel', u'sum': [u'md5', u'69f2cfc3d904b38cd998cf3f8a7b2134'], u'filename': u'samba3x-winbind-devel-3.5.4-0.83.el5_7.2.i386.rpm', u'epoch': u'0', u'version': u'3.5.4', u'release': u'0.83.el5_7.2', u'arch': u'i386'}, {u'src': None, u'name': u'samba3x-winbind-devel', u'sum': [u'md5', u'd571aff1ceebdaae8d77f29317289068'], u'filename': u'samba3x-winbind-devel-3.5.4-0.83.el5_7.2.x86_64.rpm', u'epoch': u'0', u'version': u'3.5.4', u'release': u'0.83.el5_7.2', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u'\n[82-6.3]\n- do not forget to set the group id in mount.ecryptfs_private\n\n[82-6.2]\n- fix regression in ecryptfs-setup-private\n\n[82-6.1]\n- security fixes:\n- privilege escalation via mountpoint race conditions (CVE-2011-1831, CVE-2011-1832)\n- race condition when checking source during mount (CVE-2011-1833)\n- mtab corruption via improper handling (CVE-2011-1834)\n- key poisoning via insecure temp directory handling (CVE-2011-1835)\n- arbitrary file overwrite via lock counter race (CVE-2011-1837)', u'issued': u'2011-08-31', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELSA-2011-1241.html', u'type': u'self', u'id': None, u'title': u'ELSA-2011-1241'}, {u'href': u'http://linux.oracle.com/cve/CVE-2011-1831.html', u'type': u'cve', u'id': u'CVE-2011-1831', u'title': u'CVE-2011-1831'}, {u'href': u'http://linux.oracle.com/cve/CVE-2011-1832.html', u'type': u'cve', u'id': u'CVE-2011-1832', u'title': u'CVE-2011-1832'}, {u'href': u'http://linux.oracle.com/cve/CVE-2011-1834.html', u'type': u'cve', u'id': u'CVE-2011-1834', u'title': u'CVE-2011-1834'}, {u'href': u'http://linux.oracle.com/cve/CVE-2011-1835.html', u'type': u'cve', u'id': u'CVE-2011-1835', u'title': u'CVE-2011-1835'}, {u'href': u'http://linux.oracle.com/cve/CVE-2011-1837.html', u'type': u'cve', u'id': u'CVE-2011-1837', u'title': u'CVE-2011-1837'}, {u'href': u'http://linux.oracle.com/cve/CVE-2011-3145.html', u'type': u'cve', u'id': u'CVE-2011-3145', u'title': u'CVE-2011-3145'}], u'_content_type_id': u'erratum', u'_id': u'8b98270f-c91c-4616-b801-62b95f1eef48', u'from': u'el-errata@oss.oracle.com', u'severity': u'Moderate', u'title': u' ecryptfs-utils security update', u'_ns': u'units_erratum', u'rights': u'Copyright 2011 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 6', u'reboot_suggested': False, u'type': u'security', u'pkglist': [{u'packages': [{u'src': None, u'name': u'ecryptfs-utils', u'sum': [u'md5', u'a2a8f30f2f399163ee1d60f92402b0c0'], u'filename': u'ecryptfs-utils-82-6.el6_1.3.i686.rpm', u'epoch': u'0', u'version': u'82', u'release': u'6.el6_1.3', u'arch': u'i686'}, {u'src': None, u'name': u'ecryptfs-utils', u'sum': [u'md5', u'354e57b76361951a254f0f66bb00aad2'], u'filename': u'ecryptfs-utils-82-6.el6_1.3.src.rpm', u'epoch': u'0', u'version': u'82', u'release': u'6.el6_1.3', u'arch': u'src'}, {u'src': None, u'name': u'ecryptfs-utils', u'sum': [u'md5', u'faf038b41875f09c8f8f19b6b04ee5f0'], u'filename': u'ecryptfs-utils-82-6.el6_1.3.x86_64.rpm', u'epoch': u'0', u'version': u'82', u'release': u'6.el6_1.3', u'arch': u'x86_64'}, {u'src': None, u'name': u'ecryptfs-utils-devel', u'sum': [u'md5', u'1757200cea283b93cfc38924df103aed'], u'filename': u'ecryptfs-utils-devel-82-6.el6_1.3.i686.rpm', u'epoch': u'0', u'version': u'82', u'release': u'6.el6_1.3', u'arch': u'i686'}, {u'src': None, u'name': u'ecryptfs-utils-devel', u'sum': [u'md5', u'81cf6a78492a87d8a15527a5893d8061'], u'filename': u'ecryptfs-utils-devel-82-6.el6_1.3.x86_64.rpm', u'epoch': u'0', u'version': u'82', u'release': u'6.el6_1.3', u'arch': u'x86_64'}, {u'src': None, u'name': u'ecryptfs-utils-python', u'sum': [u'md5', u'b9857dd3df4d6952d1f02751c2460b40'], u'filename': u'ecryptfs-utils-python-82-6.el6_1.3.x86_64.rpm', u'epoch': u'0', u'version': u'82', u'release': u'6.el6_1.3', u'arch': u'x86_64'}], u'name': u'ol6_x86_64_latest', u'short': u'ol6_x86_64_latest'}, {u'packages': [{u'src': None, u'name': u'ecryptfs-utils', u'sum': [u'md5', u'96de0c5e1dcfcec648b77fc64a3c3388'], u'filename': u'ecryptfs-utils-75-5.el5_7.2.i386.rpm', u'epoch': u'0', u'version': u'75', u'release': u'5.el5_7.2', u'arch': u'i386'}, {u'src': None, u'name': u'ecryptfs-utils', u'sum': [u'md5', u'67df1651922008ee7abe8b5ce6bf0f44'], u'filename': u'ecryptfs-utils-75-5.el5_7.2.src.rpm', u'epoch': u'0', u'version': u'75', u'release': u'5.el5_7.2', u'arch': u'src'}, {u'src': None, u'name': u'ecryptfs-utils', u'sum': [u'md5', u'f3378baad78ec9814380793ed1401a93'], u'filename': u'ecryptfs-utils-75-5.el5_7.2.x86_64.rpm', u'epoch': u'0', u'version': u'75', u'release': u'5.el5_7.2', u'arch': u'x86_64'}, {u'src': None, u'name': u'ecryptfs-utils-devel', u'sum': [u'md5', u'2b7212d84d10a4353a45d75c5f4d9631'], u'filename': u'ecryptfs-utils-devel-75-5.el5_7.2.i386.rpm', u'epoch': u'0', u'version': u'75', u'release': u'5.el5_7.2', u'arch': u'i386'}, {u'src': None, u'name': u'ecryptfs-utils-devel', u'sum': [u'md5', u'5cde1a4d2274c3d6c9e9fdc1b060680c'], u'filename': u'ecryptfs-utils-devel-75-5.el5_7.2.x86_64.rpm', u'epoch': u'0', u'version': u'75', u'release': u'5.el5_7.2', u'arch': u'x86_64'}, {u'src': None, u'name': u'ecryptfs-utils-gui', u'sum': [u'md5', u'1566cd5f33864ab793f00d1b9dbda873'], u'filename': u'ecryptfs-utils-gui-75-5.el5_7.2.x86_64.rpm', u'epoch': u'0', u'version': u'75', u'release': u'5.el5_7.2', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u'\n[1.9.2.20-3.0.1.el6_1]\n- Replace xulrunner-redhat-default-prefs.js with\n xulrunner-oracle-default-prefs.js\n\n[1.9.2.20-3]\n- Distrust a specific Certificate Authority', u'issued': u'2011-08-31', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELSA-2011-1242.html', u'type': u'self', u'id': None, u'title': u'ELSA-2011-1242'}], u'_content_type_id': u'erratum', u'_id': u'2ee065b3-e3ff-43dc-a0e4-d257fa9b6f86', u'from': u'el-errata@oss.oracle.com', u'severity': u'Important', u'title': u' firefox security update', u'_ns': u'units_erratum', u'rights': u'Copyright 2011 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 6', u'reboot_suggested': False, u'type': u'security', u'pkglist': [{u'packages': [{u'src': None, u'name': u'xulrunner', u'sum': [u'md5', u'1bbab3940799d9a46e1fa1889cbb9174'], u'filename': u'xulrunner-1.9.2.20-3.0.1.el6_1.i686.rpm', u'epoch': u'0', u'version': u'1.9.2.20', u'release': u'3.0.1.el6_1', u'arch': u'i686'}, {u'src': None, u'name': u'xulrunner', u'sum': [u'md5', u'5af1ed066612b941c748b3d229c82d45'], u'filename': u'xulrunner-1.9.2.20-3.0.1.el6_1.src.rpm', u'epoch': u'0', u'version': u'1.9.2.20', u'release': u'3.0.1.el6_1', u'arch': u'src'}, {u'src': None, u'name': u'xulrunner', u'sum': [u'md5', u'ce8dfd322d4056d620432ce760171d99'], u'filename': u'xulrunner-1.9.2.20-3.0.1.el6_1.x86_64.rpm', u'epoch': u'0', u'version': u'1.9.2.20', u'release': u'3.0.1.el6_1', u'arch': u'x86_64'}, {u'src': None, u'name': u'xulrunner-devel', u'sum': [u'md5', u'ec0772054024f35c03a35497dcee245d'], u'filename': u'xulrunner-devel-1.9.2.20-3.0.1.el6_1.i686.rpm', u'epoch': u'0', u'version': u'1.9.2.20', u'release': u'3.0.1.el6_1', u'arch': u'i686'}, {u'src': None, u'name': u'xulrunner-devel', u'sum': [u'md5', u'ca899e2fdae76f480686025c8786e6fe'], u'filename': u'xulrunner-devel-1.9.2.20-3.0.1.el6_1.x86_64.rpm', u'epoch': u'0', u'version': u'1.9.2.20', u'release': u'3.0.1.el6_1', u'arch': u'x86_64'}], u'name': u'ol6_x86_64_latest', u'short': u'ol6_x86_64_latest'}, {u'packages': [{u'src': None, u'name': u'xulrunner', u'sum': [u'md5', u'6d004e7ccc7fd5e5734f3bbd703d2e44'], u'filename': u'xulrunner-1.9.2.20-3.0.1.el5_7.i386.rpm', u'epoch': u'0', u'version': u'1.9.2.20', u'release': u'3.0.1.el5_7', u'arch': u'i386'}, {u'src': None, u'name': u'xulrunner', u'sum': [u'md5', u'31834e24c5d78e4135d0f7cde4ea0d27'], u'filename': u'xulrunner-1.9.2.20-3.0.1.el5_7.src.rpm', u'epoch': u'0', u'version': u'1.9.2.20', u'release': u'3.0.1.el5_7', u'arch': u'src'}, {u'src': None, u'name': u'xulrunner', u'sum': [u'md5', u'b5809f01b0de1940ac72e12305e546d1'], u'filename': u'xulrunner-1.9.2.20-3.0.1.el5_7.x86_64.rpm', u'epoch': u'0', u'version': u'1.9.2.20', u'release': u'3.0.1.el5_7', u'arch': u'x86_64'}, {u'src': None, u'name': u'xulrunner-devel', u'sum': [u'md5', u'70214a096b82af95fcbe485e87b581fb'], u'filename': u'xulrunner-devel-1.9.2.20-3.0.1.el5_7.i386.rpm', u'epoch': u'0', u'version': u'1.9.2.20', u'release': u'3.0.1.el5_7', u'arch': u'i386'}, {u'src': None, u'name': u'xulrunner-devel', u'sum': [u'md5', u'd9f7e1b8911fb7ed7854ff382e431d9a'], u'filename': u'xulrunner-devel-1.9.2.20-3.0.1.el5_7.x86_64.rpm', u'epoch': u'0', u'version': u'1.9.2.20', u'release': u'3.0.1.el5_7', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u"\n[2.2.15-9.0.1.el6_1.2]\n- replace index.html with Oracle's index page\n- update vstring in specfile\n\n[2.2.15-9.2,]\n- updated patch for CVE-2011-3192 from upstream (#733062)\n\n[2.2.15-9.1]\n- fix #733062 - backported CVE-2011-3192 fix from httpd trunk", u'issued': u'2011-08-31', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELSA-2011-1245.html', u'type': u'self', u'id': None, u'title': u'ELSA-2011-1245'}, {u'href': u'http://linux.oracle.com/cve/CVE-2011-3192.html', u'type': u'cve', u'id': u'CVE-2011-3192', u'title': u'CVE-2011-3192'}], u'_content_type_id': u'erratum', u'_id': u'8a010a10-abf1-4753-99c8-d0c67e27794e', u'from': u'el-errata@oss.oracle.com', u'severity': u'Important', u'title': u' httpd security update', u'_ns': u'units_erratum', u'rights': u'Copyright 2011 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 6', u'reboot_suggested': False, u'type': u'security', u'pkglist': [{u'packages': [{u'src': None, u'name': u'httpd', u'sum': [u'md5', u'5996adfd2f6418d282315c20cffb6169'], u'filename': u'httpd-2.2.15-9.0.1.el6_1.2.src.rpm', u'epoch': u'0', u'version': u'2.2.15', u'release': u'9.0.1.el6_1.2', u'arch': u'src'}, {u'src': None, u'name': u'httpd', u'sum': [u'md5', u'cf50c27597b1bcb86d243cd685064266'], u'filename': u'httpd-2.2.15-9.0.1.el6_1.2.x86_64.rpm', u'epoch': u'0', u'version': u'2.2.15', u'release': u'9.0.1.el6_1.2', u'arch': u'x86_64'}, {u'src': None, u'name': u'httpd-devel', u'sum': [u'md5', u'371670cb7c32059b9d36eb2543df425f'], u'filename': u'httpd-devel-2.2.15-9.0.1.el6_1.2.i686.rpm', u'epoch': u'0', u'version': u'2.2.15', u'release': u'9.0.1.el6_1.2', u'arch': u'i686'}, {u'src': None, u'name': u'httpd-devel', u'sum': [u'md5', u'41483810d557582f58cf53fee0ffc70e'], u'filename': u'httpd-devel-2.2.15-9.0.1.el6_1.2.x86_64.rpm', u'epoch': u'0', u'version': u'2.2.15', u'release': u'9.0.1.el6_1.2', u'arch': u'x86_64'}, {u'src': None, u'name': u'httpd-manual', u'sum': [u'md5', u'29efc28341ecc5a78966bda9fc40c42d'], u'filename': u'httpd-manual-2.2.15-9.0.1.el6_1.2.noarch.rpm', u'epoch': u'0', u'version': u'2.2.15', u'release': u'9.0.1.el6_1.2', u'arch': u'noarch'}, {u'src': None, u'name': u'httpd-tools', u'sum': [u'md5', u'718b6cbd19c751ef3d5ca33641cefcb6'], u'filename': u'httpd-tools-2.2.15-9.0.1.el6_1.2.x86_64.rpm', u'epoch': u'0', u'version': u'2.2.15', u'release': u'9.0.1.el6_1.2', u'arch': u'x86_64'}, {u'src': None, u'name': u'mod_ssl', u'sum': [u'md5', u'b1f6a6f6e73b2f183965440cd70f3a54'], u'filename': u'mod_ssl-2.2.15-9.0.1.el6_1.2.x86_64.rpm', u'epoch': u'1', u'version': u'2.2.15', u'release': u'9.0.1.el6_1.2', u'arch': u'x86_64'}], u'name': u'ol6_x86_64_latest', u'short': u'ol6_x86_64_latest'}, {u'packages': [{u'src': None, u'name': u'httpd', u'sum': [u'md5', u'af00473b65c2f659ddb45ff09e35fb8d'], u'filename': u'httpd-2.2.3-53.0.1.el5_7.1.src.rpm', u'epoch': u'0', u'version': u'2.2.3', u'release': u'53.0.1.el5_7.1', u'arch': u'src'}, {u'src': None, u'name': u'httpd', u'sum': [u'md5', u'6f8155104fe7aa9e60f76f0b2b98d00a'], u'filename': u'httpd-2.2.3-53.0.1.el5_7.1.x86_64.rpm', u'epoch': u'0', u'version': u'2.2.3', u'release': u'53.0.1.el5_7.1', u'arch': u'x86_64'}, {u'src': None, u'name': u'httpd-devel', u'sum': [u'md5', u'd0d467daad074ad35f44244e3895c620'], u'filename': u'httpd-devel-2.2.3-53.0.1.el5_7.1.i386.rpm', u'epoch': u'0', u'version': u'2.2.3', u'release': u'53.0.1.el5_7.1', u'arch': u'i386'}, {u'src': None, u'name': u'httpd-devel', u'sum': [u'md5', u'ef2857a79c46195c100c17702689b4e8'], u'filename': u'httpd-devel-2.2.3-53.0.1.el5_7.1.x86_64.rpm', u'epoch': u'0', u'version': u'2.2.3', u'release': u'53.0.1.el5_7.1', u'arch': u'x86_64'}, {u'src': None, u'name': u'httpd-manual', u'sum': [u'md5', u'fd9353f2d0f613349705678039f767c4'], u'filename': u'httpd-manual-2.2.3-53.0.1.el5_7.1.x86_64.rpm', u'epoch': u'0', u'version': u'2.2.3', u'release': u'53.0.1.el5_7.1', u'arch': u'x86_64'}, {u'src': None, u'name': u'mod_ssl', u'sum': [u'md5', u'33ffd66e9dcbc9a54f5bad08508b53de'], u'filename': u'mod_ssl-2.2.3-53.0.1.el5_7.1.x86_64.rpm', u'epoch': u'1', u'version': u'2.2.3', u'release': u'53.0.1.el5_7.1', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u'\n\nfirefox:\n\n[3.6.22-1.0.1.el6_1]\n- Add firefox-oracle-default-prefs.js and remove the corresponding Red Hat ones\n\n[3.6.22-1]\n- Update to 3.6.22\n\nxulrunner:\n\n[1.9.2.22-1.0.1.el6_1]\n- Replace xulrunner-redhat-default-prefs.js with\n xulrunner-oracle-default-prefs.js\n\n[- 1.9.2.22-1]\n- Update to 1.9.2.22', u'issued': u'2011-09-07', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELSA-2011-1268.html', u'type': u'self', u'id': None, u'title': u'ELSA-2011-1268'}], u'_content_type_id': u'erratum', u'_id': u'f75c14c9-f2d3-4bf2-a04e-b603712dd02b', u'from': u'el-errata@oss.oracle.com', u'severity': u'Important', u'title': u' firefox security update', u'_ns': u'units_erratum', u'rights': u'Copyright 2011 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 6', u'reboot_suggested': False, u'type': u'security', u'pkglist': [{u'packages': [{u'src': None, u'name': u'firefox', u'sum': [u'md5', u'7e0a79402813f02c8d2fed3cbfb0db42'], u'filename': u'firefox-3.6.22-1.0.1.el6_1.i686.rpm', u'epoch': u'0', u'version': u'3.6.22', u'release': u'1.0.1.el6_1', u'arch': u'i686'}, {u'src': None, u'name': u'firefox', u'sum': [u'md5', u'af40598f9b19b6c95caa6247bfb6f7f3'], u'filename': u'firefox-3.6.22-1.0.1.el6_1.src.rpm', u'epoch': u'0', u'version': u'3.6.22', u'release': u'1.0.1.el6_1', u'arch': u'src'}, {u'src': None, u'name': u'firefox', u'sum': [u'md5', u'424ce02a9bf43193ac93683004c67358'], u'filename': u'firefox-3.6.22-1.0.1.el6_1.x86_64.rpm', u'epoch': u'0', u'version': u'3.6.22', u'release': u'1.0.1.el6_1', u'arch': u'x86_64'}, {u'src': None, u'name': u'xulrunner', u'sum': [u'md5', u'ddac4d03fd78a6b64ee7c9d2e9075ac4'], u'filename': u'xulrunner-1.9.2.22-1.0.1.el6_1.i686.rpm', u'epoch': u'0', u'version': u'1.9.2.22', u'release': u'1.0.1.el6_1', u'arch': u'i686'}, {u'src': None, u'name': u'xulrunner', u'sum': [u'md5', u'6b8c5fa3a8333369099f253467402f57'], u'filename': u'xulrunner-1.9.2.22-1.0.1.el6_1.src.rpm', u'epoch': u'0', u'version': u'1.9.2.22', u'release': u'1.0.1.el6_1', u'arch': u'src'}, {u'src': None, u'name': u'xulrunner', u'sum': [u'md5', u'77f8ac9f0238f629a10209a88f9d1686'], u'filename': u'xulrunner-1.9.2.22-1.0.1.el6_1.x86_64.rpm', u'epoch': u'0', u'version': u'1.9.2.22', u'release': u'1.0.1.el6_1', u'arch': u'x86_64'}, {u'src': None, u'name': u'xulrunner-devel', u'sum': [u'md5', u'9d93cd9ce19a62cfff2ca2f28414022a'], u'filename': u'xulrunner-devel-1.9.2.22-1.0.1.el6_1.i686.rpm', u'epoch': u'0', u'version': u'1.9.2.22', u'release': u'1.0.1.el6_1', u'arch': u'i686'}, {u'src': None, u'name': u'xulrunner-devel', u'sum': [u'md5', u'b640f8b0bc723c37c5314feb5fd1d5b5'], u'filename': u'xulrunner-devel-1.9.2.22-1.0.1.el6_1.x86_64.rpm', u'epoch': u'0', u'version': u'1.9.2.22', u'release': u'1.0.1.el6_1', u'arch': u'x86_64'}], u'name': u'ol6_x86_64_latest', u'short': u'ol6_x86_64_latest'}, {u'packages': [{u'src': None, u'name': u'firefox', u'sum': [u'md5', u'4628966e475d4351548c581242f78c8c'], u'filename': u'firefox-3.6.22-1.0.1.el5_7.i386.rpm', u'epoch': u'0', u'version': u'3.6.22', u'release': u'1.0.1.el5_7', u'arch': u'i386'}, {u'src': None, u'name': u'firefox', u'sum': [u'md5', u'389498ae62f5fd994820d4a012f7af56'], u'filename': u'firefox-3.6.22-1.0.1.el5_7.src.rpm', u'epoch': u'0', u'version': u'3.6.22', u'release': u'1.0.1.el5_7', u'arch': u'src'}, {u'src': None, u'name': u'firefox', u'sum': [u'md5', u'47305facc3486260cc791a4b760b48fc'], u'filename': u'firefox-3.6.22-1.0.1.el5_7.x86_64.rpm', u'epoch': u'0', u'version': u'3.6.22', u'release': u'1.0.1.el5_7', u'arch': u'x86_64'}, {u'src': None, u'name': u'xulrunner', u'sum': [u'md5', u'35704bcd11462364144620a660695c1e'], u'filename': u'xulrunner-1.9.2.22-1.0.1.el5_7.i386.rpm', u'epoch': u'0', u'version': u'1.9.2.22', u'release': u'1.0.1.el5_7', u'arch': u'i386'}, {u'src': None, u'name': u'xulrunner', u'sum': [u'md5', u'92de9a27ef24aca2e9556792071ced01'], u'filename': u'xulrunner-1.9.2.22-1.0.1.el5_7.src.rpm', u'epoch': u'0', u'version': u'1.9.2.22', u'release': u'1.0.1.el5_7', u'arch': u'src'}, {u'src': None, u'name': u'xulrunner', u'sum': [u'md5', u'65ffc53e0f5e4f19f25046271e778ef8'], u'filename': u'xulrunner-1.9.2.22-1.0.1.el5_7.x86_64.rpm', u'epoch': u'0', u'version': u'1.9.2.22', u'release': u'1.0.1.el5_7', u'arch': u'x86_64'}, {u'src': None, u'name': u'xulrunner-devel', u'sum': [u'md5', u'd68f03100570e5767fa8c5d033339c56'], u'filename': u'xulrunner-devel-1.9.2.22-1.0.1.el5_7.i386.rpm', u'epoch': u'0', u'version': u'1.9.2.22', u'release': u'1.0.1.el5_7', u'arch': u'i386'}, {u'src': None, u'name': u'xulrunner-devel', u'sum': [u'md5', u'cc8392e88701bbccac4a8e0caee1325f'], u'filename': u'xulrunner-devel-1.9.2.22-1.0.1.el5_7.x86_64.rpm', u'epoch': u'0', u'version': u'1.9.2.22', u'release': u'1.0.1.el5_7', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u'\n[3.12.9-12.0.1.el6_1]\n- Use blank image instead of clean.gif in nss-3.12.9-stripped.tar.bz2\n\n[3.12.9-12]\n- Retagging\n\n[3.12.10-12]\n- Update builtins certs to those from NSSCKBI_1_87_RTM\n\n[3.12.9-11]\n- Update builtins certs to those from NSSCKBI_1_86_RTM\n\n[3.12.9-10]\n- Update builtins certs to NSSCKBI_1_85_RTM', u'issued': u'2011-09-12', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELSA-2011-1282.html', u'type': u'self', u'id': None, u'title': u'ELSA-2011-1282'}], u'_content_type_id': u'erratum', u'_id': u'cf860f03-af6f-4c05-af3d-1fda52370a6c', u'from': u'el-errata@oss.oracle.com', u'severity': u'Important', u'title': u' nss and nspr security update', u'_ns': u'units_erratum', u'rights': u'Copyright 2011 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 6', u'reboot_suggested': False, u'type': u'security', u'pkglist': [{u'packages': [{u'src': None, u'name': u'nss', u'sum': [u'md5', u'f4a5dfb828b6f6120fcdc8371fa9414f'], u'filename': u'nss-3.12.9-12.0.1.el6_1.i686.rpm', u'epoch': u'0', u'version': u'3.12.9', u'release': u'12.0.1.el6_1', u'arch': u'i686'}, {u'src': None, u'name': u'nss', u'sum': [u'md5', u'c903aa9ac0a1fdc3c78e6444d202bada'], u'filename': u'nss-3.12.9-12.0.1.el6_1.src.rpm', u'epoch': u'0', u'version': u'3.12.9', u'release': u'12.0.1.el6_1', u'arch': u'src'}, {u'src': None, u'name': u'nss', u'sum': [u'md5', u'927c3cb4b35405b8ab9e1195e94adb8c'], u'filename': u'nss-3.12.9-12.0.1.el6_1.x86_64.rpm', u'epoch': u'0', u'version': u'3.12.9', u'release': u'12.0.1.el6_1', u'arch': u'x86_64'}, {u'src': None, u'name': u'nss-devel', u'sum': [u'md5', u'7ae79b784f8bf6af0abb657136c20826'], u'filename': u'nss-devel-3.12.9-12.0.1.el6_1.i686.rpm', u'epoch': u'0', u'version': u'3.12.9', u'release': u'12.0.1.el6_1', u'arch': u'i686'}, {u'src': None, u'name': u'nss-devel', u'sum': [u'md5', u'f82a1959ece8963f921e7b892fc47c3a'], u'filename': u'nss-devel-3.12.9-12.0.1.el6_1.x86_64.rpm', u'epoch': u'0', u'version': u'3.12.9', u'release': u'12.0.1.el6_1', u'arch': u'x86_64'}, {u'src': None, u'name': u'nss-pkcs11-devel', u'sum': [u'md5', u'6eac7edd3eba3724a7fc89d737d3ceaa'], u'filename': u'nss-pkcs11-devel-3.12.9-12.0.1.el6_1.i686.rpm', u'epoch': u'0', u'version': u'3.12.9', u'release': u'12.0.1.el6_1', u'arch': u'i686'}, {u'src': None, u'name': u'nss-pkcs11-devel', u'sum': [u'md5', u'688d4b9c0a9f881488f8a4d98c7c4590'], u'filename': u'nss-pkcs11-devel-3.12.9-12.0.1.el6_1.x86_64.rpm', u'epoch': u'0', u'version': u'3.12.9', u'release': u'12.0.1.el6_1', u'arch': u'x86_64'}, {u'src': None, u'name': u'nss-sysinit', u'sum': [u'md5', u'7d4c54294c13ca300797cb2c0286a623'], u'filename': u'nss-sysinit-3.12.9-12.0.1.el6_1.x86_64.rpm', u'epoch': u'0', u'version': u'3.12.9', u'release': u'12.0.1.el6_1', u'arch': u'x86_64'}, {u'src': None, u'name': u'nss-tools', u'sum': [u'md5', u'49205ececcc78b4745ac6477a71f7850'], u'filename': u'nss-tools-3.12.9-12.0.1.el6_1.x86_64.rpm', u'epoch': u'0', u'version': u'3.12.9', u'release': u'12.0.1.el6_1', u'arch': u'x86_64'}], u'name': u'ol6_x86_64_latest', u'short': u'ol6_x86_64_latest'}, {u'packages': [{u'src': None, u'name': u'nspr', u'sum': [u'md5', u'9757c0b9bed874d16a420e69a0774954'], u'filename': u'nspr-4.8.8-1.el5_7.i386.rpm', u'epoch': u'0', u'version': u'4.8.8', u'release': u'1.el5_7', u'arch': u'i386'}, {u'src': None, u'name': u'nspr', u'sum': [u'md5', u'd80400a707dcf5ed6d2cef1c05a95b6e'], u'filename': u'nspr-4.8.8-1.el5_7.src.rpm', u'epoch': u'0', u'version': u'4.8.8', u'release': u'1.el5_7', u'arch': u'src'}, {u'src': None, u'name': u'nspr', u'sum': [u'md5', u'c17996e505559d8388e3c1f6a2f0dd65'], u'filename': u'nspr-4.8.8-1.el5_7.x86_64.rpm', u'epoch': u'0', u'version': u'4.8.8', u'release': u'1.el5_7', u'arch': u'x86_64'}, {u'src': None, u'name': u'nspr-devel', u'sum': [u'md5', u'8bf9d6d643bf341b15472e72c64190d6'], u'filename': u'nspr-devel-4.8.8-1.el5_7.i386.rpm', u'epoch': u'0', u'version': u'4.8.8', u'release': u'1.el5_7', u'arch': u'i386'}, {u'src': None, u'name': u'nspr-devel', u'sum': [u'md5', u'd9c2c35ac51935368479eb7ebc0a8788'], u'filename': u'nspr-devel-4.8.8-1.el5_7.x86_64.rpm', u'epoch': u'0', u'version': u'4.8.8', u'release': u'1.el5_7', u'arch': u'x86_64'}, {u'src': None, u'name': u'nss', u'sum': [u'md5', u'c794f42dc1928831323d4692aa3ec9b4'], u'filename': u'nss-3.12.10-4.0.1.el5_7.i386.rpm', u'epoch': u'0', u'version': u'3.12.10', u'release': u'4.0.1.el5_7', u'arch': u'i386'}, {u'src': None, u'name': u'nss', u'sum': [u'md5', u'11cb2c6fbfd427a579395025f49963d9'], u'filename': u'nss-3.12.10-4.0.1.el5_7.src.rpm', u'epoch': u'0', u'version': u'3.12.10', u'release': u'4.0.1.el5_7', u'arch': u'src'}, {u'src': None, u'name': u'nss', u'sum': [u'md5', u'50b1c96f5527b6f422ec0a4265930185'], u'filename': u'nss-3.12.10-4.0.1.el5_7.x86_64.rpm', u'epoch': u'0', u'version': u'3.12.10', u'release': u'4.0.1.el5_7', u'arch': u'x86_64'}, {u'src': None, u'name': u'nss-devel', u'sum': [u'md5', u'cc75b8131c27918321404fd87399288e'], u'filename': u'nss-devel-3.12.10-4.0.1.el5_7.i386.rpm', u'epoch': u'0', u'version': u'3.12.10', u'release': u'4.0.1.el5_7', u'arch': u'i386'}, {u'src': None, u'name': u'nss-devel', u'sum': [u'md5', u'79a647fda0926837c0a3c73fc6107f3c'], u'filename': u'nss-devel-3.12.10-4.0.1.el5_7.x86_64.rpm', u'epoch': u'0', u'version': u'3.12.10', u'release': u'4.0.1.el5_7', u'arch': u'x86_64'}, {u'src': None, u'name': u'nss-pkcs11-devel', u'sum': [u'md5', u'ed91a4a151fb930c42ee12bf8248eeaf'], u'filename': u'nss-pkcs11-devel-3.12.10-4.0.1.el5_7.i386.rpm', u'epoch': u'0', u'version': u'3.12.10', u'release': u'4.0.1.el5_7', u'arch': u'i386'}, {u'src': None, u'name': u'nss-pkcs11-devel', u'sum': [u'md5', u'34cd71b80fb9730f7749f7a931ea817a'], u'filename': u'nss-pkcs11-devel-3.12.10-4.0.1.el5_7.x86_64.rpm', u'epoch': u'0', u'version': u'3.12.10', u'release': u'4.0.1.el5_7', u'arch': u'x86_64'}, {u'src': None, u'name': u'nss-tools', u'sum': [u'md5', u'2faee7f35610e33512d9362c89cc4b80'], u'filename': u'nss-tools-3.12.10-4.0.1.el5_7.x86_64.rpm', u'epoch': u'0', u'version': u'3.12.10', u'release': u'4.0.1.el5_7', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u'\n[2.3.16-6.3]\n- Resolves: #735391 - CVE-2011-3208 nntpd buffer overflow', u'issued': u'2011-09-19', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELSA-2011-1317.html', u'type': u'self', u'id': None, u'title': u'ELSA-2011-1317'}, {u'href': u'http://linux.oracle.com/cve/CVE-2011-3208.html', u'type': u'cve', u'id': u'CVE-2011-3208', u'title': u'CVE-2011-3208'}], u'_content_type_id': u'erratum', u'_id': u'45ac411e-0451-4d47-97a5-6d6efe137c89', u'from': u'el-errata@oss.oracle.com', u'severity': u'Important', u'title': u' cyrus-imapd security update', u'_ns': u'units_erratum', u'rights': u'Copyright 2011 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 6', u'reboot_suggested': False, u'type': u'security', u'pkglist': [{u'packages': [{u'src': None, u'name': u'cyrus-imapd', u'sum': [u'md5', u'b0d54c2704a2ed32b2e33577016dcebe'], u'filename': u'cyrus-imapd-2.3.16-6.el6_1.3.src.rpm', u'epoch': u'0', u'version': u'2.3.16', u'release': u'6.el6_1.3', u'arch': u'src'}, {u'src': None, u'name': u'cyrus-imapd', u'sum': [u'md5', u'5f1a98445c6ef4400f1d19f6a1a9301c'], u'filename': u'cyrus-imapd-2.3.16-6.el6_1.3.x86_64.rpm', u'epoch': u'0', u'version': u'2.3.16', u'release': u'6.el6_1.3', u'arch': u'x86_64'}, {u'src': None, u'name': u'cyrus-imapd-devel', u'sum': [u'md5', u'2c62212b294e5365dd1e391f63a015a0'], u'filename': u'cyrus-imapd-devel-2.3.16-6.el6_1.3.i686.rpm', u'epoch': u'0', u'version': u'2.3.16', u'release': u'6.el6_1.3', u'arch': u'i686'}, {u'src': None, u'name': u'cyrus-imapd-devel', u'sum': [u'md5', u'1c629583af186a933f7e4e9011168247'], u'filename': u'cyrus-imapd-devel-2.3.16-6.el6_1.3.x86_64.rpm', u'epoch': u'0', u'version': u'2.3.16', u'release': u'6.el6_1.3', u'arch': u'x86_64'}, {u'src': None, u'name': u'cyrus-imapd-utils', u'sum': [u'md5', u'14601f76484ce7a566d2d9c9bc8614c4'], u'filename': u'cyrus-imapd-utils-2.3.16-6.el6_1.3.x86_64.rpm', u'epoch': u'0', u'version': u'2.3.16', u'release': u'6.el6_1.3', u'arch': u'x86_64'}], u'name': u'ol6_x86_64_latest', u'short': u'ol6_x86_64_latest'}, {u'packages': [{u'src': None, u'name': u'cyrus-imapd', u'sum': [u'md5', u'6637669fc19175188900f147af69be6e'], u'filename': u'cyrus-imapd-2.3.7-12.0.1.el5_7.1.src.rpm', u'epoch': u'0', u'version': u'2.3.7', u'release': u'12.0.1.el5_7.1', u'arch': u'src'}, {u'src': None, u'name': u'cyrus-imapd', u'sum': [u'md5', u'acd76608d1d66dbd5a408d265276928d'], u'filename': u'cyrus-imapd-2.3.7-12.0.1.el5_7.1.x86_64.rpm', u'epoch': u'0', u'version': u'2.3.7', u'release': u'12.0.1.el5_7.1', u'arch': u'x86_64'}, {u'src': None, u'name': u'cyrus-imapd-devel', u'sum': [u'md5', u'6ca9d35d242eafb02dfebebf8dccf73c'], u'filename': u'cyrus-imapd-devel-2.3.7-12.0.1.el5_7.1.i386.rpm', u'epoch': u'0', u'version': u'2.3.7', u'release': u'12.0.1.el5_7.1', u'arch': u'i386'}, {u'src': None, u'name': u'cyrus-imapd-devel', u'sum': [u'md5', u'6055f64c9202d6abb108be338010b8eb'], u'filename': u'cyrus-imapd-devel-2.3.7-12.0.1.el5_7.1.x86_64.rpm', u'epoch': u'0', u'version': u'2.3.7', u'release': u'12.0.1.el5_7.1', u'arch': u'x86_64'}, {u'src': None, u'name': u'cyrus-imapd-perl', u'sum': [u'md5', u'674887b136e4e20dafc6cb559d003dbb'], u'filename': u'cyrus-imapd-perl-2.3.7-12.0.1.el5_7.1.x86_64.rpm', u'epoch': u'0', u'version': u'2.3.7', u'release': u'12.0.1.el5_7.1', u'arch': u'x86_64'}, {u'src': None, u'name': u'cyrus-imapd-utils', u'sum': [u'md5', u'fa2fb45a1e0c1cbecad2fb985a1a8a42'], u'filename': u'cyrus-imapd-utils-2.3.7-12.0.1.el5_7.1.x86_64.rpm', u'epoch': u'0', u'version': u'2.3.7', u'release': u'12.0.1.el5_7.1', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u'\n[4.2.1-1.1]\n- Resolves: #737815, qt/harfbuzz buffer overflow, CVE-2011-3193\n- Resolves: #234633, UTF-8 overlong sequence decoding vulnerability, CVE-2007-0242', u'issued': u'2011-09-21', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELSA-2011-1324.html', u'type': u'self', u'id': None, u'title': u'ELSA-2011-1324'}, {u'href': u'http://linux.oracle.com/cve/CVE-2007-0242.html', u'type': u'cve', u'id': u'CVE-2007-0242', u'title': u'CVE-2007-0242'}, {u'href': u'http://linux.oracle.com/cve/CVE-2011-3193.html', u'type': u'cve', u'id': u'CVE-2011-3193', u'title': u'CVE-2011-3193'}], u'_content_type_id': u'erratum', u'_id': u'f2a64998-2018-4e8b-8dc2-88c4f6ee6d44', u'from': u'el-errata@oss.oracle.com', u'severity': u'Moderate', u'title': u' qt4 security update', u'_ns': u'units_erratum', u'rights': u'Copyright 2011 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 5', u'reboot_suggested': False, u'type': u'security', u'pkglist': [{u'packages': [{u'src': None, u'name': u'qt4', u'sum': [u'md5', u'b8779d80fb22fe64aa5b2ebe123d33d0'], u'filename': u'qt4-4.2.1-1.el5_7.1.i386.rpm', u'epoch': u'0', u'version': u'4.2.1', u'release': u'1.el5_7.1', u'arch': u'i386'}, {u'src': None, u'name': u'qt4', u'sum': [u'md5', u'42ecd60307d78f7eaba0599ee79fed84'], u'filename': u'qt4-4.2.1-1.el5_7.1.src.rpm', u'epoch': u'0', u'version': u'4.2.1', u'release': u'1.el5_7.1', u'arch': u'src'}, {u'src': None, u'name': u'qt4', u'sum': [u'md5', u'bf9ec068a33cb23633972800a954d8da'], u'filename': u'qt4-4.2.1-1.el5_7.1.x86_64.rpm', u'epoch': u'0', u'version': u'4.2.1', u'release': u'1.el5_7.1', u'arch': u'x86_64'}, {u'src': None, u'name': u'qt4-devel', u'sum': [u'md5', u'f812fcb0a47ddf807ef290b86ae1f3b5'], u'filename': u'qt4-devel-4.2.1-1.el5_7.1.i386.rpm', u'epoch': u'0', u'version': u'4.2.1', u'release': u'1.el5_7.1', u'arch': u'i386'}, {u'src': None, u'name': u'qt4-devel', u'sum': [u'md5', u'b754c5a3ed44994f45fd0a7bb236a0cb'], u'filename': u'qt4-devel-4.2.1-1.el5_7.1.x86_64.rpm', u'epoch': u'0', u'version': u'4.2.1', u'release': u'1.el5_7.1', u'arch': u'x86_64'}, {u'src': None, u'name': u'qt4-doc', u'sum': [u'md5', u'f3965473af7f7d4071c781f260a8accd'], u'filename': u'qt4-doc-4.2.1-1.el5_7.1.x86_64.rpm', u'epoch': u'0', u'version': u'4.2.1', u'release': u'1.el5_7.1', u'arch': u'x86_64'}, {u'src': None, u'name': u'qt4-mysql', u'sum': [u'md5', u'dad939051844d9f908024dd208597e30'], u'filename': u'qt4-mysql-4.2.1-1.el5_7.1.x86_64.rpm', u'epoch': u'0', u'version': u'4.2.1', u'release': u'1.el5_7.1', u'arch': u'x86_64'}, {u'src': None, u'name': u'qt4-odbc', u'sum': [u'md5', u'e3b8456190ca5746f38f43f21ec817b8'], u'filename': u'qt4-odbc-4.2.1-1.el5_7.1.x86_64.rpm', u'epoch': u'0', u'version': u'4.2.1', u'release': u'1.el5_7.1', u'arch': u'x86_64'}, {u'src': None, u'name': u'qt4-postgresql', u'sum': [u'md5', u'e0d53e27456e261d936e66ab2ccf43fa'], u'filename': u'qt4-postgresql-4.2.1-1.el5_7.1.x86_64.rpm', u'epoch': u'0', u'version': u'4.2.1', u'release': u'1.el5_7.1', u'arch': u'x86_64'}, {u'src': None, u'name': u'qt4-sqlite', u'sum': [u'md5', u'59cf4df0e53ca213345e8b921404b813'], u'filename': u'qt4-sqlite-4.2.1-1.el5_7.1.x86_64.rpm', u'epoch': u'0', u'version': u'4.2.1', u'release': u'1.el5_7.1', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u'\n[1.14.9.8.0.1.el5_7.3]\n- Bump release\n\n[1.14.9.8.el5_1.3]\n- Prevent buffer overflow errors in harfbuzz module (CVE-2011-3193)\n- Resolves: #737819', u'issued': u'2011-09-21', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELSA-2011-1326.html', u'type': u'self', u'id': None, u'title': u'ELSA-2011-1326'}, {u'href': u'http://linux.oracle.com/cve/CVE-2011-3193.html', u'type': u'cve', u'id': u'CVE-2011-3193', u'title': u'CVE-2011-3193'}], u'_content_type_id': u'erratum', u'_id': u'1eba574f-a280-42ba-ae59-d62494081975', u'from': u'el-errata@oss.oracle.com', u'severity': u'Moderate', u'title': u' pango security update', u'_ns': u'units_erratum', u'rights': u'Copyright 2011 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 5', u'reboot_suggested': False, u'type': u'security', u'pkglist': [{u'packages': [{u'src': None, u'name': u'pango', u'sum': [u'md5', u'b3b7f383c63a1adfb7d0b0e0e125cec5'], u'filename': u'pango-1.14.9-8.0.1.el5_7.3.i386.rpm', u'epoch': u'0', u'version': u'1.14.9', u'release': u'8.0.1.el5_7.3', u'arch': u'i386'}, {u'src': None, u'name': u'pango', u'sum': [u'md5', u'22d821c9b66b78b4109b7d3436d1057e'], u'filename': u'pango-1.14.9-8.0.1.el5_7.3.src.rpm', u'epoch': u'0', u'version': u'1.14.9', u'release': u'8.0.1.el5_7.3', u'arch': u'src'}, {u'src': None, u'name': u'pango', u'sum': [u'md5', u'37e8f4ce0d4828aab11d0ac7f282f00f'], u'filename': u'pango-1.14.9-8.0.1.el5_7.3.x86_64.rpm', u'epoch': u'0', u'version': u'1.14.9', u'release': u'8.0.1.el5_7.3', u'arch': u'x86_64'}, {u'src': None, u'name': u'pango-devel', u'sum': [u'md5', u'531adb4abfa28179d9a25d90f15bbf9b'], u'filename': u'pango-devel-1.14.9-8.0.1.el5_7.3.i386.rpm', u'epoch': u'0', u'version': u'1.14.9', u'release': u'8.0.1.el5_7.3', u'arch': u'i386'}, {u'src': None, u'name': u'pango-devel', u'sum': [u'md5', u'dd240e7ae87c9447669ae9d52081e5ec'], u'filename': u'pango-devel-1.14.9-8.0.1.el5_7.3.x86_64.rpm', u'epoch': u'0', u'version': u'1.14.9', u'release': u'8.0.1.el5_7.3', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u'\n\nfirefox:\n\n[3.6.23-2.0.1.el6_1]\n- Add firefox-oracle-default-prefs.js and remove the corresponding Red Hat ones\n\n[3.6.23-2]\n- Update to 3.6.23\n\nxulrunner:\n\n[1.9.2.23-1.0.1.el6_1.1]\n- Replace xulrunner-redhat-default-prefs.js with\n xulrunner-oracle-default-prefs.js\n\n[1.9.2.23-1.1]\n- Rebuild.\n\n[1.9.2.23-1]\n- Update to 1.9.2.23', u'issued': u'2011-09-28', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELSA-2011-1341.html', u'type': u'self', u'id': None, u'title': u'ELSA-2011-1341'}, {u'href': u'http://linux.oracle.com/cve/CVE-2011-2372.html', u'type': u'cve', u'id': u'CVE-2011-2372', u'title': u'CVE-2011-2372'}, {u'href': u'http://linux.oracle.com/cve/CVE-2011-2995.html', u'type': u'cve', u'id': u'CVE-2011-2995', u'title': u'CVE-2011-2995'}, {u'href': u'http://linux.oracle.com/cve/CVE-2011-2998.html', u'type': u'cve', u'id': u'CVE-2011-2998', u'title': u'CVE-2011-2998'}, {u'href': u'http://linux.oracle.com/cve/CVE-2011-2999.html', u'type': u'cve', u'id': u'CVE-2011-2999', u'title': u'CVE-2011-2999'}, {u'href': u'http://linux.oracle.com/cve/CVE-2011-3000.html', u'type': u'cve', u'id': u'CVE-2011-3000', u'title': u'CVE-2011-3000'}], u'_content_type_id': u'erratum', u'_id': u'd89ebdf4-bda4-45cb-b832-54fa85c001c5', u'from': u'el-errata@oss.oracle.com', u'severity': u'Critical', u'title': u' firefox security update', u'_ns': u'units_erratum', u'rights': u'Copyright 2011 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 6', u'reboot_suggested': False, u'type': u'security', u'pkglist': [{u'packages': [{u'src': None, u'name': u'firefox', u'sum': [u'md5', u'd0c0f4a998d03b0a400b51f7c410f769'], u'filename': u'firefox-3.6.23-2.0.1.el6_1.i686.rpm', u'epoch': u'0', u'version': u'3.6.23', u'release': u'2.0.1.el6_1', u'arch': u'i686'}, {u'src': None, u'name': u'firefox', u'sum': [u'md5', u'4366f6a061a5552391ecee47673094d2'], u'filename': u'firefox-3.6.23-2.0.1.el6_1.src.rpm', u'epoch': u'0', u'version': u'3.6.23', u'release': u'2.0.1.el6_1', u'arch': u'src'}, {u'src': None, u'name': u'firefox', u'sum': [u'md5', u'65178dfef6f0e58eb1927319bce9bd48'], u'filename': u'firefox-3.6.23-2.0.1.el6_1.x86_64.rpm', u'epoch': u'0', u'version': u'3.6.23', u'release': u'2.0.1.el6_1', u'arch': u'x86_64'}, {u'src': None, u'name': u'xulrunner', u'sum': [u'md5', u'1824e2f6564fb90aba82e90a14aff7b8'], u'filename': u'xulrunner-1.9.2.23-1.0.1.el6_1.1.i686.rpm', u'epoch': u'0', u'version': u'1.9.2.23', u'release': u'1.0.1.el6_1.1', u'arch': u'i686'}, {u'src': None, u'name': u'xulrunner', u'sum': [u'md5', u'1d0442c22a518e9b1d51530466dcb9cf'], u'filename': u'xulrunner-1.9.2.23-1.0.1.el6_1.1.src.rpm', u'epoch': u'0', u'version': u'1.9.2.23', u'release': u'1.0.1.el6_1.1', u'arch': u'src'}, {u'src': None, u'name': u'xulrunner', u'sum': [u'md5', u'980f792606c022b7b7ffffe81628f795'], u'filename': u'xulrunner-1.9.2.23-1.0.1.el6_1.1.x86_64.rpm', u'epoch': u'0', u'version': u'1.9.2.23', u'release': u'1.0.1.el6_1.1', u'arch': u'x86_64'}, {u'src': None, u'name': u'xulrunner-devel', u'sum': [u'md5', u'80b02b287f1249c2d4c1a150bba3bf83'], u'filename': u'xulrunner-devel-1.9.2.23-1.0.1.el6_1.1.i686.rpm', u'epoch': u'0', u'version': u'1.9.2.23', u'release': u'1.0.1.el6_1.1', u'arch': u'i686'}, {u'src': None, u'name': u'xulrunner-devel', u'sum': [u'md5', u'bf2786c47d030f1ed6c4c5863da50549'], u'filename': u'xulrunner-devel-1.9.2.23-1.0.1.el6_1.1.x86_64.rpm', u'epoch': u'0', u'version': u'1.9.2.23', u'release': u'1.0.1.el6_1.1', u'arch': u'x86_64'}], u'name': u'ol6_x86_64_latest', u'short': u'ol6_x86_64_latest'}, {u'packages': [{u'src': None, u'name': u'firefox', u'sum': [u'md5', u'7fd99cfc570a549a9ac081e0c9d7f6a8'], u'filename': u'firefox-3.6.23-2.0.1.el5_7.i386.rpm', u'epoch': u'0', u'version': u'3.6.23', u'release': u'2.0.1.el5_7', u'arch': u'i386'}, {u'src': None, u'name': u'firefox', u'sum': [u'md5', u'1d9aaaba54bf70fb97a5043836e856ce'], u'filename': u'firefox-3.6.23-2.0.1.el5_7.src.rpm', u'epoch': u'0', u'version': u'3.6.23', u'release': u'2.0.1.el5_7', u'arch': u'src'}, {u'src': None, u'name': u'firefox', u'sum': [u'md5', u'93d8e8679d100e797fc33422c6634343'], u'filename': u'firefox-3.6.23-2.0.1.el5_7.x86_64.rpm', u'epoch': u'0', u'version': u'3.6.23', u'release': u'2.0.1.el5_7', u'arch': u'x86_64'}, {u'src': None, u'name': u'xulrunner', u'sum': [u'md5', u'd5f434c6d3bebe68012e0c43f8368b2b'], u'filename': u'xulrunner-1.9.2.23-1.0.1.el5_7.i386.rpm', u'epoch': u'0', u'version': u'1.9.2.23', u'release': u'1.0.1.el5_7', u'arch': u'i386'}, {u'src': None, u'name': u'xulrunner', u'sum': [u'md5', u'16c48d7543a8889e738b225486582836'], u'filename': u'xulrunner-1.9.2.23-1.0.1.el5_7.src.rpm', u'epoch': u'0', u'version': u'1.9.2.23', u'release': u'1.0.1.el5_7', u'arch': u'src'}, {u'src': None, u'name': u'xulrunner', u'sum': [u'md5', u'6d645008e5a595fb9a78a6524492f7ab'], u'filename': u'xulrunner-1.9.2.23-1.0.1.el5_7.x86_64.rpm', u'epoch': u'0', u'version': u'1.9.2.23', u'release': u'1.0.1.el5_7', u'arch': u'x86_64'}, {u'src': None, u'name': u'xulrunner-devel', u'sum': [u'md5', u'2e265037c10817704ebcc0012f89f752'], u'filename': u'xulrunner-devel-1.9.2.23-1.0.1.el5_7.i386.rpm', u'epoch': u'0', u'version': u'1.9.2.23', u'release': u'1.0.1.el5_7', u'arch': u'i386'}, {u'src': None, u'name': u'xulrunner-devel', u'sum': [u'md5', u'105f1107fb6cdf0e46f6748716002432'], u'filename': u'xulrunner-devel-1.9.2.23-1.0.1.el5_7.x86_64.rpm', u'epoch': u'0', u'version': u'1.9.2.23', u'release': u'1.0.1.el5_7', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u'\n[4.8.0-16.1]\n- fix CVE-2011-3378 (#742154)', u'issued': u'2011-10-04', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELSA-2011-1349.html', u'type': u'self', u'id': None, u'title': u'ELSA-2011-1349'}, {u'href': u'http://linux.oracle.com/cve/CVE-2011-3378.html', u'type': u'cve', u'id': u'CVE-2011-3378', u'title': u'CVE-2011-3378'}], u'_content_type_id': u'erratum', u'_id': u'54b1887b-3061-4e56-b334-12d9951aa197', u'from': u'el-errata@oss.oracle.com', u'severity': u'Important', u'title': u' rpm security update', u'_ns': u'units_erratum', u'rights': u'Copyright 2011 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 6', u'reboot_suggested': False, u'type': u'security', u'pkglist': [{u'packages': [{u'src': None, u'name': u'rpm', u'sum': [u'md5', u'170f069e15fa1f838c038ce6adb830f7'], u'filename': u'rpm-4.8.0-16.el6_1.1.src.rpm', u'epoch': u'0', u'version': u'4.8.0', u'release': u'16.el6_1.1', u'arch': u'src'}, {u'src': None, u'name': u'rpm', u'sum': [u'md5', u'd40cc8113a7aa5c4f43ea5100a2759c4'], u'filename': u'rpm-4.8.0-16.el6_1.1.x86_64.rpm', u'epoch': u'0', u'version': u'4.8.0', u'release': u'16.el6_1.1', u'arch': u'x86_64'}, {u'src': None, u'name': u'rpm-apidocs', u'sum': [u'md5', u'c258c32816783adb292b73b4a1f20215'], u'filename': u'rpm-apidocs-4.8.0-16.el6_1.1.noarch.rpm', u'epoch': u'0', u'version': u'4.8.0', u'release': u'16.el6_1.1', u'arch': u'noarch'}, {u'src': None, u'name': u'rpm-build', u'sum': [u'md5', u'8b6e119dbf6c3df6b5d2ca56f39ae705'], u'filename': u'rpm-build-4.8.0-16.el6_1.1.x86_64.rpm', u'epoch': u'0', u'version': u'4.8.0', u'release': u'16.el6_1.1', u'arch': u'x86_64'}, {u'src': None, u'name': u'rpm-cron', u'sum': [u'md5', u'7179ed8a46cca335c25bdf0fa304cda4'], u'filename': u'rpm-cron-4.8.0-16.el6_1.1.noarch.rpm', u'epoch': u'0', u'version': u'4.8.0', u'release': u'16.el6_1.1', u'arch': u'noarch'}, {u'src': None, u'name': u'rpm-devel', u'sum': [u'md5', u'c2c8b731dad79bdc23507ed3443ba9c7'], u'filename': u'rpm-devel-4.8.0-16.el6_1.1.i686.rpm', u'epoch': u'0', u'version': u'4.8.0', u'release': u'16.el6_1.1', u'arch': u'i686'}, {u'src': None, u'name': u'rpm-devel', u'sum': [u'md5', u'ab709b36e39fbda706fcabb5c588831b'], u'filename': u'rpm-devel-4.8.0-16.el6_1.1.x86_64.rpm', u'epoch': u'0', u'version': u'4.8.0', u'release': u'16.el6_1.1', u'arch': u'x86_64'}, {u'src': None, u'name': u'rpm-libs', u'sum': [u'md5', u'eb270de77cfb5a581611a0cc61cc5ef9'], u'filename': u'rpm-libs-4.8.0-16.el6_1.1.i686.rpm', u'epoch': u'0', u'version': u'4.8.0', u'release': u'16.el6_1.1', u'arch': u'i686'}, {u'src': None, u'name': u'rpm-libs', u'sum': [u'md5', u'3ba79dc3ea38a693c70bea5e7bb88470'], u'filename': u'rpm-libs-4.8.0-16.el6_1.1.x86_64.rpm', u'epoch': u'0', u'version': u'4.8.0', u'release': u'16.el6_1.1', u'arch': u'x86_64'}, {u'src': None, u'name': u'rpm-python', u'sum': [u'md5', u'38c0a707572d2f2e18a8964a661e4064'], u'filename': u'rpm-python-4.8.0-16.el6_1.1.x86_64.rpm', u'epoch': u'0', u'version': u'4.8.0', u'release': u'16.el6_1.1', u'arch': u'x86_64'}], u'name': u'ol6_x86_64_latest', u'short': u'ol6_x86_64_latest'}, {u'packages': [{u'src': None, u'name': u'popt', u'sum': [u'md5', u'3d8c4ef7cf58007475575a923e6290e3'], u'filename': u'popt-1.10.2.3-22.0.1.el5_7.2.i386.rpm', u'epoch': u'0', u'version': u'1.10.2.3', u'release': u'22.0.1.el5_7.2', u'arch': u'i386'}, {u'src': None, u'name': u'popt', u'sum': [u'md5', u'1050643b551a06b506039cc59e2bcbc6'], u'filename': u'popt-1.10.2.3-22.0.1.el5_7.2.x86_64.rpm', u'epoch': u'0', u'version': u'1.10.2.3', u'release': u'22.0.1.el5_7.2', u'arch': u'x86_64'}, {u'src': None, u'name': u'rpm', u'sum': [u'md5', u'e8191d7ff94c6b7abf163a22125d8c78'], u'filename': u'rpm-4.4.2.3-22.0.1.el5_7.2.src.rpm', u'epoch': u'0', u'version': u'4.4.2.3', u'release': u'22.0.1.el5_7.2', u'arch': u'src'}, {u'src': None, u'name': u'rpm', u'sum': [u'md5', u'ae064c5cd1ede346e5c877bb56dbde3e'], u'filename': u'rpm-4.4.2.3-22.0.1.el5_7.2.x86_64.rpm', u'epoch': u'0', u'version': u'4.4.2.3', u'release': u'22.0.1.el5_7.2', u'arch': u'x86_64'}, {u'src': None, u'name': u'rpm-apidocs', u'sum': [u'md5', u'e072799fd10e262276252310e34309e6'], u'filename': u'rpm-apidocs-4.4.2.3-22.0.1.el5_7.2.x86_64.rpm', u'epoch': u'0', u'version': u'4.4.2.3', u'release': u'22.0.1.el5_7.2', u'arch': u'x86_64'}, {u'src': None, u'name': u'rpm-build', u'sum': [u'md5', u'c27dd59538a089b22c899ddfd6d5340b'], u'filename': u'rpm-build-4.4.2.3-22.0.1.el5_7.2.x86_64.rpm', u'epoch': u'0', u'version': u'4.4.2.3', u'release': u'22.0.1.el5_7.2', u'arch': u'x86_64'}, {u'src': None, u'name': u'rpm-devel', u'sum': [u'md5', u'2b922f6047d074cbbbec32f0bbd301bd'], u'filename': u'rpm-devel-4.4.2.3-22.0.1.el5_7.2.i386.rpm', u'epoch': u'0', u'version': u'4.4.2.3', u'release': u'22.0.1.el5_7.2', u'arch': u'i386'}, {u'src': None, u'name': u'rpm-devel', u'sum': [u'md5', u'14d9bb7edcf5770aee05496ed93b9e2a'], u'filename': u'rpm-devel-4.4.2.3-22.0.1.el5_7.2.x86_64.rpm', u'epoch': u'0', u'version': u'4.4.2.3', u'release': u'22.0.1.el5_7.2', u'arch': u'x86_64'}, {u'src': None, u'name': u'rpm-libs', u'sum': [u'md5', u'5c0c269a69c2da9dbf71009cc94125b2'], u'filename': u'rpm-libs-4.4.2.3-22.0.1.el5_7.2.i386.rpm', u'epoch': u'0', u'version': u'4.4.2.3', u'release': u'22.0.1.el5_7.2', u'arch': u'i386'}, {u'src': None, u'name': u'rpm-libs', u'sum': [u'md5', u'd56a544309000f133963aad93799d581'], u'filename': u'rpm-libs-4.4.2.3-22.0.1.el5_7.2.x86_64.rpm', u'epoch': u'0', u'version': u'4.4.2.3', u'release': u'22.0.1.el5_7.2', u'arch': u'x86_64'}, {u'src': None, u'name': u'rpm-python', u'sum': [u'md5', u'743535b300e08149dcb77b807b4e54e0'], u'filename': u'rpm-python-4.4.2.3-22.0.1.el5_7.2.x86_64.rpm', u'epoch': u'0', u'version': u'4.4.2.3', u'release': u'22.0.1.el5_7.2', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u'\n[1.7.7-29.2]\n- cve-2011-4818.patch: Multiple input sanitization flaws in GLX and Render', u'issued': u'2011-10-06', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELSA-2011-1359.html', u'type': u'self', u'id': None, u'title': u'ELSA-2011-1359'}, {u'href': u'http://linux.oracle.com/cve/CVE-2010-4818.html', u'type': u'cve', u'id': u'CVE-2010-4818', u'title': u'CVE-2010-4818'}, {u'href': u'http://linux.oracle.com/cve/CVE-2010-4819.html', u'type': u'cve', u'id': u'CVE-2010-4819', u'title': u'CVE-2010-4819'}], u'_content_type_id': u'erratum', u'_id': u'08cb82d0-3d10-40e5-913c-24463c7b449a', u'from': u'el-errata@oss.oracle.com', u'severity': u'Moderate', u'title': u' xorg-x11-server security update', u'_ns': u'units_erratum', u'rights': u'Copyright 2011 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 6', u'reboot_suggested': False, u'type': u'security', u'pkglist': [{u'packages': [{u'src': None, u'name': u'xorg-x11-server', u'sum': [u'md5', u'ccfa0ee6dfe42a4b6324522bd506923b'], u'filename': u'xorg-x11-server-1.7.7-29.el6_1.2.src.rpm', u'epoch': u'0', u'version': u'1.7.7', u'release': u'29.el6_1.2', u'arch': u'src'}, {u'src': None, u'name': u'xorg-x11-server-Xdmx', u'sum': [u'md5', u'3437d108eb7f40078ae3243d79769c48'], u'filename': u'xorg-x11-server-Xdmx-1.7.7-29.el6_1.2.x86_64.rpm', u'epoch': u'0', u'version': u'1.7.7', u'release': u'29.el6_1.2', u'arch': u'x86_64'}, {u'src': None, u'name': u'xorg-x11-server-Xephyr', u'sum': [u'md5', u'8de6f2a4a8e3070f1625520585d69246'], u'filename': u'xorg-x11-server-Xephyr-1.7.7-29.el6_1.2.x86_64.rpm', u'epoch': u'0', u'version': u'1.7.7', u'release': u'29.el6_1.2', u'arch': u'x86_64'}, {u'src': None, u'name': u'xorg-x11-server-Xnest', u'sum': [u'md5', u'eb9ec71b4f504d82cd295ddce86fff3f'], u'filename': u'xorg-x11-server-Xnest-1.7.7-29.el6_1.2.x86_64.rpm', u'epoch': u'0', u'version': u'1.7.7', u'release': u'29.el6_1.2', u'arch': u'x86_64'}, {u'src': None, u'name': u'xorg-x11-server-Xorg', u'sum': [u'md5', u'd3963d5c0f73d50d6b7f7589242c8dad'], u'filename': u'xorg-x11-server-Xorg-1.7.7-29.el6_1.2.x86_64.rpm', u'epoch': u'0', u'version': u'1.7.7', u'release': u'29.el6_1.2', u'arch': u'x86_64'}, {u'src': None, u'name': u'xorg-x11-server-Xvfb', u'sum': [u'md5', u'ef7d50d0278d731a68790bea8f3cc1ac'], u'filename': u'xorg-x11-server-Xvfb-1.7.7-29.el6_1.2.x86_64.rpm', u'epoch': u'0', u'version': u'1.7.7', u'release': u'29.el6_1.2', u'arch': u'x86_64'}, {u'src': None, u'name': u'xorg-x11-server-common', u'sum': [u'md5', u'c9f208046e3f782690901115f28e6cff'], u'filename': u'xorg-x11-server-common-1.7.7-29.el6_1.2.x86_64.rpm', u'epoch': u'0', u'version': u'1.7.7', u'release': u'29.el6_1.2', u'arch': u'x86_64'}, {u'src': None, u'name': u'xorg-x11-server-devel', u'sum': [u'md5', u'28f3d3f0e2406bdbd6dafda68f293230'], u'filename': u'xorg-x11-server-devel-1.7.7-29.el6_1.2.i686.rpm', u'epoch': u'0', u'version': u'1.7.7', u'release': u'29.el6_1.2', u'arch': u'i686'}, {u'src': None, u'name': u'xorg-x11-server-devel', u'sum': [u'md5', u'e041bb080df670bd5bf0940de2ef69a8'], u'filename': u'xorg-x11-server-devel-1.7.7-29.el6_1.2.x86_64.rpm', u'epoch': u'0', u'version': u'1.7.7', u'release': u'29.el6_1.2', u'arch': u'x86_64'}, {u'src': None, u'name': u'xorg-x11-server-source', u'sum': [u'md5', u'e0d18207b70b33704640c6c4649671e5'], u'filename': u'xorg-x11-server-source-1.7.7-29.el6_1.2.noarch.rpm', u'epoch': u'0', u'version': u'1.7.7', u'release': u'29.el6_1.2', u'arch': u'noarch'}], u'name': u'ol6_x86_64_latest', u'short': u'ol6_x86_64_latest'}, {u'packages': [{u'src': None, u'name': u'xorg-x11-server', u'sum': [u'md5', u'ba514bd8a4ada5983c4dad74fc65d0c0'], u'filename': u'xorg-x11-server-1.1.1-48.76.0.1.el5_7.5.src.rpm', u'epoch': u'0', u'version': u'1.1.1', u'release': u'48.76.0.1.el5_7.5', u'arch': u'src'}, {u'src': None, u'name': u'xorg-x11-server-Xdmx', u'sum': [u'md5', u'a0333e864bfdbdc985045df4d759d1eb'], u'filename': u'xorg-x11-server-Xdmx-1.1.1-48.76.0.1.el5_7.5.x86_64.rpm', u'epoch': u'0', u'version': u'1.1.1', u'release': u'48.76.0.1.el5_7.5', u'arch': u'x86_64'}, {u'src': None, u'name': u'xorg-x11-server-Xephyr', u'sum': [u'md5', u'ae281a32436dad0aff987c2550d8a062'], u'filename': u'xorg-x11-server-Xephyr-1.1.1-48.76.0.1.el5_7.5.x86_64.rpm', u'epoch': u'0', u'version': u'1.1.1', u'release': u'48.76.0.1.el5_7.5', u'arch': u'x86_64'}, {u'src': None, u'name': u'xorg-x11-server-Xnest', u'sum': [u'md5', u'c6e4088b8b28342ab3fc504951ac20a5'], u'filename': u'xorg-x11-server-Xnest-1.1.1-48.76.0.1.el5_7.5.x86_64.rpm', u'epoch': u'0', u'version': u'1.1.1', u'release': u'48.76.0.1.el5_7.5', u'arch': u'x86_64'}, {u'src': None, u'name': u'xorg-x11-server-Xorg', u'sum': [u'md5', u'355da58ed0d0899946e5bd47d35a2ed8'], u'filename': u'xorg-x11-server-Xorg-1.1.1-48.76.0.1.el5_7.5.x86_64.rpm', u'epoch': u'0', u'version': u'1.1.1', u'release': u'48.76.0.1.el5_7.5', u'arch': u'x86_64'}, {u'src': None, u'name': u'xorg-x11-server-Xvfb', u'sum': [u'md5', u'4dd399cafee4713e69b10504d6d89db8'], u'filename': u'xorg-x11-server-Xvfb-1.1.1-48.76.0.1.el5_7.5.x86_64.rpm', u'epoch': u'0', u'version': u'1.1.1', u'release': u'48.76.0.1.el5_7.5', u'arch': u'x86_64'}, {u'src': None, u'name': u'xorg-x11-server-Xvnc-source', u'sum': [u'md5', u'f9ba4858bfb738f19c7a37da2ffc47ca'], u'filename': u'xorg-x11-server-Xvnc-source-1.1.1-48.76.0.1.el5_7.5.x86_64.rpm', u'epoch': u'0', u'version': u'1.1.1', u'release': u'48.76.0.1.el5_7.5', u'arch': u'x86_64'}, {u'src': None, u'name': u'xorg-x11-server-sdk', u'sum': [u'md5', u'5ffac99aa82d3b2f2c192250ba709def'], u'filename': u'xorg-x11-server-sdk-1.1.1-48.76.0.1.el5_7.5.x86_64.rpm', u'epoch': u'0', u'version': u'1.1.1', u'release': u'48.76.0.1.el5_7.5', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u'\n[8.4.9-1]\n- Update to PostgreSQL 8.4.9, for various fixes described at\n http://www.postgresql.org/docs/8.4/static/release-8-4-9.html\n http://www.postgresql.org/docs/8.4/static/release-8-4-8.html\n including the fix for CVE-2011-2483\nResolves: #740735', u'issued': u'2011-10-17', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELSA-2011-1377.html', u'type': u'self', u'id': None, u'title': u'ELSA-2011-1377'}, {u'href': u'http://linux.oracle.com/cve/CVE-2011-2483.html', u'type': u'cve', u'id': u'CVE-2011-2483', u'title': u'CVE-2011-2483'}], u'_content_type_id': u'erratum', u'_id': u'e1c65a1e-b6f9-4dc9-b035-335c40ce4dc5', u'from': u'el-errata@oss.oracle.com', u'severity': u'Moderate', u'title': u' postgresql security update', u'_ns': u'units_erratum', u'rights': u'Copyright 2011 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 6', u'reboot_suggested': False, u'type': u'security', u'pkglist': [{u'packages': [{u'src': None, u'name': u'postgresql', u'sum': [u'md5', u'dee20f3aa53f9ba4c977969d270734bb'], u'filename': u'postgresql-8.4.9-1.el6_1.1.i686.rpm', u'epoch': u'0', u'version': u'8.4.9', u'release': u'1.el6_1.1', u'arch': u'i686'}, {u'src': None, u'name': u'postgresql', u'sum': [u'md5', u'eacd0167062ab23a675e2517b171e0f9'], u'filename': u'postgresql-8.4.9-1.el6_1.1.src.rpm', u'epoch': u'0', u'version': u'8.4.9', u'release': u'1.el6_1.1', u'arch': u'src'}, {u'src': None, u'name': u'postgresql', u'sum': [u'md5', u'60c7aae71b4396591decc76c7f87f87b'], u'filename': u'postgresql-8.4.9-1.el6_1.1.x86_64.rpm', u'epoch': u'0', u'version': u'8.4.9', u'release': u'1.el6_1.1', u'arch': u'x86_64'}, {u'src': None, u'name': u'postgresql-contrib', u'sum': [u'md5', u'460647f06b114c028a18f9fcf7fa2dc6'], u'filename': u'postgresql-contrib-8.4.9-1.el6_1.1.x86_64.rpm', u'epoch': u'0', u'version': u'8.4.9', u'release': u'1.el6_1.1', u'arch': u'x86_64'}, {u'src': None, u'name': u'postgresql-devel', u'sum': [u'md5', u'07055519bbd5f58237703a00e9f9eb58'], u'filename': u'postgresql-devel-8.4.9-1.el6_1.1.i686.rpm', u'epoch': u'0', u'version': u'8.4.9', u'release': u'1.el6_1.1', u'arch': u'i686'}, {u'src': None, u'name': u'postgresql-devel', u'sum': [u'md5', u'5c9497099fbea0985cc32fbe79effed5'], u'filename': u'postgresql-devel-8.4.9-1.el6_1.1.x86_64.rpm', u'epoch': u'0', u'version': u'8.4.9', u'release': u'1.el6_1.1', u'arch': u'x86_64'}, {u'src': None, u'name': u'postgresql-docs', u'sum': [u'md5', u'3f5ad1a1b2340c2de995ab896731edb9'], u'filename': u'postgresql-docs-8.4.9-1.el6_1.1.x86_64.rpm', u'epoch': u'0', u'version': u'8.4.9', u'release': u'1.el6_1.1', u'arch': u'x86_64'}, {u'src': None, u'name': u'postgresql-libs', u'sum': [u'md5', u'307ad08305246fcb7c86db5db8fbd30d'], u'filename': u'postgresql-libs-8.4.9-1.el6_1.1.i686.rpm', u'epoch': u'0', u'version': u'8.4.9', u'release': u'1.el6_1.1', u'arch': u'i686'}, {u'src': None, u'name': u'postgresql-libs', u'sum': [u'md5', u'9b57d878408590b977eaf636b279702d'], u'filename': u'postgresql-libs-8.4.9-1.el6_1.1.x86_64.rpm', u'epoch': u'0', u'version': u'8.4.9', u'release': u'1.el6_1.1', u'arch': u'x86_64'}, {u'src': None, u'name': u'postgresql-plperl', u'sum': [u'md5', u'1d68a46bfe0e73329662541ffab242e4'], u'filename': u'postgresql-plperl-8.4.9-1.el6_1.1.x86_64.rpm', u'epoch': u'0', u'version': u'8.4.9', u'release': u'1.el6_1.1', u'arch': u'x86_64'}, {u'src': None, u'name': u'postgresql-plpython', u'sum': [u'md5', u'e834dcaca06579f57511959863568ee9'], u'filename': u'postgresql-plpython-8.4.9-1.el6_1.1.x86_64.rpm', u'epoch': u'0', u'version': u'8.4.9', u'release': u'1.el6_1.1', u'arch': u'x86_64'}, {u'src': None, u'name': u'postgresql-pltcl', u'sum': [u'md5', u'65005e8635678aaebfb2fd9ced61d6aa'], u'filename': u'postgresql-pltcl-8.4.9-1.el6_1.1.x86_64.rpm', u'epoch': u'0', u'version': u'8.4.9', u'release': u'1.el6_1.1', u'arch': u'x86_64'}, {u'src': None, u'name': u'postgresql-server', u'sum': [u'md5', u'7ec5d24994aad41e40acea146e602eb7'], u'filename': u'postgresql-server-8.4.9-1.el6_1.1.x86_64.rpm', u'epoch': u'0', u'version': u'8.4.9', u'release': u'1.el6_1.1', u'arch': u'x86_64'}, {u'src': None, u'name': u'postgresql-test', u'sum': [u'md5', u'a8253f94100f336eec617bd7040dc94f'], u'filename': u'postgresql-test-8.4.9-1.el6_1.1.x86_64.rpm', u'epoch': u'0', u'version': u'8.4.9', u'release': u'1.el6_1.1', u'arch': u'x86_64'}], u'name': u'ol6_x86_64_latest', u'short': u'ol6_x86_64_latest'}, {u'packages': [{u'src': None, u'name': u'postgresql', u'sum': [u'md5', u'971385d19a7fef1f1bcc2cda76a8887c'], u'filename': u'postgresql-8.1.23-1.el5_7.2.src.rpm', u'epoch': u'0', u'version': u'8.1.23', u'release': u'1.el5_7.2', u'arch': u'src'}, {u'src': None, u'name': u'postgresql', u'sum': [u'md5', u'9cb4cb0d3692ae95d9b39d886e993fce'], u'filename': u'postgresql-8.1.23-1.el5_7.2.x86_64.rpm', u'epoch': u'0', u'version': u'8.1.23', u'release': u'1.el5_7.2', u'arch': u'x86_64'}, {u'src': None, u'name': u'postgresql-contrib', u'sum': [u'md5', u'3af4b618bea043c1f5a7e665f2a1b4f1'], u'filename': u'postgresql-contrib-8.1.23-1.el5_7.2.x86_64.rpm', u'epoch': u'0', u'version': u'8.1.23', u'release': u'1.el5_7.2', u'arch': u'x86_64'}, {u'src': None, u'name': u'postgresql-devel', u'sum': [u'md5', u'af9765a3b620f62231662df0a2c0c897'], u'filename': u'postgresql-devel-8.1.23-1.el5_7.2.i386.rpm', u'epoch': u'0', u'version': u'8.1.23', u'release': u'1.el5_7.2', u'arch': u'i386'}, {u'src': None, u'name': u'postgresql-devel', u'sum': [u'md5', u'1c3f103ef3c0043157a23b7283b11482'], u'filename': u'postgresql-devel-8.1.23-1.el5_7.2.x86_64.rpm', u'epoch': u'0', u'version': u'8.1.23', u'release': u'1.el5_7.2', u'arch': u'x86_64'}, {u'src': None, u'name': u'postgresql-docs', u'sum': [u'md5', u'6c34409dd0bd701bb0548fd64447e10a'], u'filename': u'postgresql-docs-8.1.23-1.el5_7.2.x86_64.rpm', u'epoch': u'0', u'version': u'8.1.23', u'release': u'1.el5_7.2', u'arch': u'x86_64'}, {u'src': None, u'name': u'postgresql-libs', u'sum': [u'md5', u'cf9828157791b3a1c0ee50d7544e38a4'], u'filename': u'postgresql-libs-8.1.23-1.el5_7.2.i386.rpm', u'epoch': u'0', u'version': u'8.1.23', u'release': u'1.el5_7.2', u'arch': u'i386'}, {u'src': None, u'name': u'postgresql-libs', u'sum': [u'md5', u'73290b7eafb89fa52be44453ab6d0663'], u'filename': u'postgresql-libs-8.1.23-1.el5_7.2.x86_64.rpm', u'epoch': u'0', u'version': u'8.1.23', u'release': u'1.el5_7.2', u'arch': u'x86_64'}, {u'src': None, u'name': u'postgresql-pl', u'sum': [u'md5', u'28bb4f56edb288e85a6a078959a948d5'], u'filename': u'postgresql-pl-8.1.23-1.el5_7.2.x86_64.rpm', u'epoch': u'0', u'version': u'8.1.23', u'release': u'1.el5_7.2', u'arch': u'x86_64'}, {u'src': None, u'name': u'postgresql-python', u'sum': [u'md5', u'9165f75ec9904d7014621dd7fb83bb1d'], u'filename': u'postgresql-python-8.1.23-1.el5_7.2.x86_64.rpm', u'epoch': u'0', u'version': u'8.1.23', u'release': u'1.el5_7.2', u'arch': u'x86_64'}, {u'src': None, u'name': u'postgresql-server', u'sum': [u'md5', u'554409c63349f37eb226c581682c56ef'], u'filename': u'postgresql-server-8.1.23-1.el5_7.2.x86_64.rpm', u'epoch': u'0', u'version': u'8.1.23', u'release': u'1.el5_7.2', u'arch': u'x86_64'}, {u'src': None, u'name': u'postgresql-tcl', u'sum': [u'md5', u'bd7c41bbca5b19d15e8bdd054c66163a'], u'filename': u'postgresql-tcl-8.1.23-1.el5_7.2.x86_64.rpm', u'epoch': u'0', u'version': u'8.1.23', u'release': u'1.el5_7.2', u'arch': u'x86_64'}, {u'src': None, u'name': u'postgresql-test', u'sum': [u'md5', u'a612bd30bfb31b8370cfacd7eb585de1'], u'filename': u'postgresql-test-8.1.23-1.el5_7.2.x86_64.rpm', u'epoch': u'0', u'version': u'8.1.23', u'release': u'1.el5_7.2', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u'\n[8.4.9-1.el5_7.1]\n- Update to PostgreSQL 8.4.9, for various fixes described at\n http://www.postgresql.org/docs/8.4/static/release-8-4-9.html\n http://www.postgresql.org/docs/8.4/static/release-8-4-8.html\n including the fix for CVE-2011-2483\nResolves: #740739', u'issued': u'2011-10-17', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELSA-2011-1378.html', u'type': u'self', u'id': None, u'title': u'ELSA-2011-1378'}, {u'href': u'http://linux.oracle.com/cve/CVE-2011-2483.html', u'type': u'cve', u'id': u'CVE-2011-2483', u'title': u'CVE-2011-2483'}], u'_content_type_id': u'erratum', u'_id': u'fdba436c-5498-484a-bdcc-e04a8dd3240f', u'from': u'el-errata@oss.oracle.com', u'severity': u'Moderate', u'title': u' postgresql84 security update', u'_ns': u'units_erratum', u'rights': u'Copyright 2011 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 5', u'reboot_suggested': False, u'type': u'security', u'pkglist': [{u'packages': [{u'src': None, u'name': u'postgresql84', u'sum': [u'md5', u'f042b57a4dfaf18a42aa781d38a2e56b'], u'filename': u'postgresql84-8.4.9-1.el5_7.1.src.rpm', u'epoch': u'0', u'version': u'8.4.9', u'release': u'1.el5_7.1', u'arch': u'src'}, {u'src': None, u'name': u'postgresql84', u'sum': [u'md5', u'b315010e836837b120047a9a19f68814'], u'filename': u'postgresql84-8.4.9-1.el5_7.1.x86_64.rpm', u'epoch': u'0', u'version': u'8.4.9', u'release': u'1.el5_7.1', u'arch': u'x86_64'}, {u'src': None, u'name': u'postgresql84-contrib', u'sum': [u'md5', u'cace321fdd41b4f625025fb484736e35'], u'filename': u'postgresql84-contrib-8.4.9-1.el5_7.1.x86_64.rpm', u'epoch': u'0', u'version': u'8.4.9', u'release': u'1.el5_7.1', u'arch': u'x86_64'}, {u'src': None, u'name': u'postgresql84-devel', u'sum': [u'md5', u'4bac2a14a47a12562bbddbfa4389db1f'], u'filename': u'postgresql84-devel-8.4.9-1.el5_7.1.i386.rpm', u'epoch': u'0', u'version': u'8.4.9', u'release': u'1.el5_7.1', u'arch': u'i386'}, {u'src': None, u'name': u'postgresql84-devel', u'sum': [u'md5', u'6eb977be107a78c4cacc5f33d456b543'], u'filename': u'postgresql84-devel-8.4.9-1.el5_7.1.x86_64.rpm', u'epoch': u'0', u'version': u'8.4.9', u'release': u'1.el5_7.1', u'arch': u'x86_64'}, {u'src': None, u'name': u'postgresql84-docs', u'sum': [u'md5', u'9398c1930082fb6b2e281d7702aac388'], u'filename': u'postgresql84-docs-8.4.9-1.el5_7.1.x86_64.rpm', u'epoch': u'0', u'version': u'8.4.9', u'release': u'1.el5_7.1', u'arch': u'x86_64'}, {u'src': None, u'name': u'postgresql84-libs', u'sum': [u'md5', u'cc72f475158d3a13245525ef6cc32ca7'], u'filename': u'postgresql84-libs-8.4.9-1.el5_7.1.i386.rpm', u'epoch': u'0', u'version': u'8.4.9', u'release': u'1.el5_7.1', u'arch': u'i386'}, {u'src': None, u'name': u'postgresql84-libs', u'sum': [u'md5', u'09c0bc4ec3341739ca7af22f4388cbe5'], u'filename': u'postgresql84-libs-8.4.9-1.el5_7.1.x86_64.rpm', u'epoch': u'0', u'version': u'8.4.9', u'release': u'1.el5_7.1', u'arch': u'x86_64'}, {u'src': None, u'name': u'postgresql84-plperl', u'sum': [u'md5', u'9fa31357c665884c12a6ebbdb54516ff'], u'filename': u'postgresql84-plperl-8.4.9-1.el5_7.1.x86_64.rpm', u'epoch': u'0', u'version': u'8.4.9', u'release': u'1.el5_7.1', u'arch': u'x86_64'}, {u'src': None, u'name': u'postgresql84-plpython', u'sum': [u'md5', u'7c3533c854cba25097f7fddac6e9f284'], u'filename': u'postgresql84-plpython-8.4.9-1.el5_7.1.x86_64.rpm', u'epoch': u'0', u'version': u'8.4.9', u'release': u'1.el5_7.1', u'arch': u'x86_64'}, {u'src': None, u'name': u'postgresql84-pltcl', u'sum': [u'md5', u'a9b95096307bcd40233647b885d45d37'], u'filename': u'postgresql84-pltcl-8.4.9-1.el5_7.1.x86_64.rpm', u'epoch': u'0', u'version': u'8.4.9', u'release': u'1.el5_7.1', u'arch': u'x86_64'}, {u'src': None, u'name': u'postgresql84-python', u'sum': [u'md5', u'218e40986011749e8d5d9225c7f9b092'], u'filename': u'postgresql84-python-8.4.9-1.el5_7.1.x86_64.rpm', u'epoch': u'0', u'version': u'8.4.9', u'release': u'1.el5_7.1', u'arch': u'x86_64'}, {u'src': None, u'name': u'postgresql84-server', u'sum': [u'md5', u'96784ddbd49ceb9db89977054a43281a'], u'filename': u'postgresql84-server-8.4.9-1.el5_7.1.x86_64.rpm', u'epoch': u'0', u'version': u'8.4.9', u'release': u'1.el5_7.1', u'arch': u'x86_64'}, {u'src': None, u'name': u'postgresql84-tcl', u'sum': [u'md5', u'd1e44dbbf18295c87269cefcffe222be'], u'filename': u'postgresql84-tcl-8.4.9-1.el5_7.1.x86_64.rpm', u'epoch': u'0', u'version': u'8.4.9', u'release': u'1.el5_7.1', u'arch': u'x86_64'}, {u'src': None, u'name': u'postgresql84-test', u'sum': [u'md5', u'62b77f2bd541a648307272c6478b4c56'], u'filename': u'postgresql84-test-8.4.9-1.el5_7.1.x86_64.rpm', u'epoch': u'0', u'version': u'8.4.9', u'release': u'1.el5_7.1', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u'\n[1:1.6.0.0-1.40.1.9.10]\n- Resolves: rhbz#744788\n- Bumped to IcedTea6 1.9.8\n-removed font copying\n Security fixes\n - S7000600, CVE-2011-3547: InputStream skip() information leak\n - S7019773, CVE-2011-3548: mutable static AWTKeyStroke.ctor\n - S7023640, CVE-2011-3551: Java2D TransformHelper integer overflow\n - S7032417, CVE-2011-3552: excessive default UDP socket limit under SecurityManager\n - S7046823, CVE-2011-3544: missing SecurityManager checks in scripting engine\n - S7055902, CVE-2011-3521: IIOP deserialization code execution\n - S7057857, CVE-2011-3554: insufficient pack200 JAR files uncompress error checks\n - S7064341, CVE-2011-3389: JSSE\n - S7070134, CVE-2011-3558: Hotspot unspecified issue\n - S7077466, CVE-2011-3556: RMI DGC server remote code execution\n - S7083012, CVE-2011-3557: RMI registry privileged code execution\n - S7096936, CVE-2011-3560: missing checkSetFactory calls in HttpsURLConnection\n NetX\n - PR794: javaws does not work if a Web Start app jar has a Class-Path element in the manifest', u'issued': u'2011-10-18', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELSA-2011-1380.html', u'type': u'self', u'id': None, u'title': u'ELSA-2011-1380'}, {u'href': u'http://linux.oracle.com/cve/CVE-2011-3389.html', u'type': u'cve', u'id': u'CVE-2011-3389', u'title': u'CVE-2011-3389'}, {u'href': u'http://linux.oracle.com/cve/CVE-2011-3521.html', u'type': u'cve', u'id': u'CVE-2011-3521', u'title': u'CVE-2011-3521'}, {u'href': u'http://linux.oracle.com/cve/CVE-2011-3544.html', u'type': u'cve', u'id': u'CVE-2011-3544', u'title': u'CVE-2011-3544'}, {u'href': u'http://linux.oracle.com/cve/CVE-2011-3547.html', u'type': u'cve', u'id': u'CVE-2011-3547', u'title': u'CVE-2011-3547'}, {u'href': u'http://linux.oracle.com/cve/CVE-2011-3548.html', u'type': u'cve', u'id': u'CVE-2011-3548', u'title': u'CVE-2011-3548'}, {u'href': u'http://linux.oracle.com/cve/CVE-2011-3551.html', u'type': u'cve', u'id': u'CVE-2011-3551', u'title': u'CVE-2011-3551'}, {u'href': u'http://linux.oracle.com/cve/CVE-2011-3552.html', u'type': u'cve', u'id': u'CVE-2011-3552', u'title': u'CVE-2011-3552'}, {u'href': u'http://linux.oracle.com/cve/CVE-2011-3553.html', u'type': u'cve', u'id': u'CVE-2011-3553', u'title': u'CVE-2011-3553'}, {u'href': u'http://linux.oracle.com/cve/CVE-2011-3554.html', u'type': u'cve', u'id': u'CVE-2011-3554', u'title': u'CVE-2011-3554'}, {u'href': u'http://linux.oracle.com/cve/CVE-2011-3556.html', u'type': u'cve', u'id': u'CVE-2011-3556', u'title': u'CVE-2011-3556'}, {u'href': u'http://linux.oracle.com/cve/CVE-2011-3557.html', u'type': u'cve', u'id': u'CVE-2011-3557', u'title': u'CVE-2011-3557'}, {u'href': u'http://linux.oracle.com/cve/CVE-2011-3558.html', u'type': u'cve', u'id': u'CVE-2011-3558', u'title': u'CVE-2011-3558'}, {u'href': u'http://linux.oracle.com/cve/CVE-2011-3560.html', u'type': u'cve', u'id': u'CVE-2011-3560', u'title': u'CVE-2011-3560'}], u'_content_type_id': u'erratum', u'_id': u'bad3bd01-62b4-4ed6-b542-31fd39ea2133', u'from': u'el-errata@oss.oracle.com', u'severity': u'Critical', u'title': u' java-1.6.0-openjdk security update', u'_ns': u'units_erratum', u'rights': u'Copyright 2011 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 6', u'reboot_suggested': False, u'type': u'security', u'pkglist': [{u'packages': [{u'src': None, u'name': u'java-1.6.0-openjdk', u'sum': [u'md5', u'c120394997e6ea501d193c59ff2aa4ad'], u'filename': u'java-1.6.0-openjdk-1.6.0.0-1.40.1.9.10.el6_1.src.rpm', u'epoch': u'1', u'version': u'1.6.0.0', u'release': u'1.40.1.9.10.el6_1', u'arch': u'src'}, {u'src': None, u'name': u'java-1.6.0-openjdk', u'sum': [u'md5', u'c589f72caa98fbefbe905a1a05c06cc1'], u'filename': u'java-1.6.0-openjdk-1.6.0.0-1.40.1.9.10.el6_1.x86_64.rpm', u'epoch': u'1', u'version': u'1.6.0.0', u'release': u'1.40.1.9.10.el6_1', u'arch': u'x86_64'}, {u'src': None, u'name': u'java-1.6.0-openjdk-demo', u'sum': [u'md5', u'50250625aec77c713da93c09ac330765'], u'filename': u'java-1.6.0-openjdk-demo-1.6.0.0-1.40.1.9.10.el6_1.x86_64.rpm', u'epoch': u'1', u'version': u'1.6.0.0', u'release': u'1.40.1.9.10.el6_1', u'arch': u'x86_64'}, {u'src': None, u'name': u'java-1.6.0-openjdk-devel', u'sum': [u'md5', u'06d89a4a7bc83516fad0dffc4332073c'], u'filename': u'java-1.6.0-openjdk-devel-1.6.0.0-1.40.1.9.10.el6_1.x86_64.rpm', u'epoch': u'1', u'version': u'1.6.0.0', u'release': u'1.40.1.9.10.el6_1', u'arch': u'x86_64'}, {u'src': None, u'name': u'java-1.6.0-openjdk-javadoc', u'sum': [u'md5', u'532ab0b43c9b6618bb152d3975a71504'], u'filename': u'java-1.6.0-openjdk-javadoc-1.6.0.0-1.40.1.9.10.el6_1.x86_64.rpm', u'epoch': u'1', u'version': u'1.6.0.0', u'release': u'1.40.1.9.10.el6_1', u'arch': u'x86_64'}, {u'src': None, u'name': u'java-1.6.0-openjdk-src', u'sum': [u'md5', u'3813fb7c58e3860c3b398758e3910413'], u'filename': u'java-1.6.0-openjdk-src-1.6.0.0-1.40.1.9.10.el6_1.x86_64.rpm', u'epoch': u'1', u'version': u'1.6.0.0', u'release': u'1.40.1.9.10.el6_1', u'arch': u'x86_64'}], u'name': u'ol6_x86_64_latest', u'short': u'ol6_x86_64_latest'}, {u'packages': [{u'src': None, u'name': u'java-1.6.0-openjdk', u'sum': [u'md5', u'8bf6b1286d2b90739b283a19a0502c83'], u'filename': u'java-1.6.0-openjdk-1.6.0.0-1.23.1.9.10.0.1.el5_7.src.rpm', u'epoch': u'1', u'version': u'1.6.0.0', u'release': u'1.23.1.9.10.0.1.el5_7', u'arch': u'src'}, {u'src': None, u'name': u'java-1.6.0-openjdk', u'sum': [u'md5', u'c3aebd40b393983362f3d61339e7df9b'], u'filename': u'java-1.6.0-openjdk-1.6.0.0-1.23.1.9.10.0.1.el5_7.x86_64.rpm', u'epoch': u'1', u'version': u'1.6.0.0', u'release': u'1.23.1.9.10.0.1.el5_7', u'arch': u'x86_64'}, {u'src': None, u'name': u'java-1.6.0-openjdk-demo', u'sum': [u'md5', u'2f040242caaecc089ca10d16c8ceaba7'], u'filename': u'java-1.6.0-openjdk-demo-1.6.0.0-1.23.1.9.10.0.1.el5_7.x86_64.rpm', u'epoch': u'1', u'version': u'1.6.0.0', u'release': u'1.23.1.9.10.0.1.el5_7', u'arch': u'x86_64'}, {u'src': None, u'name': u'java-1.6.0-openjdk-devel', u'sum': [u'md5', u'c23e961db4db57bb2cb158546ee09825'], u'filename': u'java-1.6.0-openjdk-devel-1.6.0.0-1.23.1.9.10.0.1.el5_7.x86_64.rpm', u'epoch': u'1', u'version': u'1.6.0.0', u'release': u'1.23.1.9.10.0.1.el5_7', u'arch': u'x86_64'}, {u'src': None, u'name': u'java-1.6.0-openjdk-javadoc', u'sum': [u'md5', u'83c7274a6ba1e68c5cd2667c73853a8c'], u'filename': u'java-1.6.0-openjdk-javadoc-1.6.0.0-1.23.1.9.10.0.1.el5_7.x86_64.rpm', u'epoch': u'1', u'version': u'1.6.0.0', u'release': u'1.23.1.9.10.0.1.el5_7', u'arch': u'x86_64'}, {u'src': None, u'name': u'java-1.6.0-openjdk-src', u'sum': [u'md5', u'77a849cd548d9b05c10a07e93d2bff7f'], u'filename': u'java-1.6.0-openjdk-src-1.6.0.0-1.23.1.9.10.0.1.el5_7.x86_64.rpm', u'epoch': u'1', u'version': u'1.6.0.0', u'release': u'1.23.1.9.10.0.1.el5_7', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u'\n[3.5.10-24.1]\n- Resolves: bz#746160, CVE-2011-3365, input validation failure in KSSL', u'issued': u'2011-10-19', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELSA-2011-1385.html', u'type': u'self', u'id': None, u'title': u'ELSA-2011-1385'}, {u'href': u'http://linux.oracle.com/cve/CVE-2011-3365.html', u'type': u'cve', u'id': u'CVE-2011-3365', u'title': u'CVE-2011-3365'}], u'_content_type_id': u'erratum', u'_id': u'1ca9ed45-40a5-476c-80b5-1e66ef21c1e5', u'from': u'el-errata@oss.oracle.com', u'severity': u'Moderate', u'title': u' kdelibs and kdelibs3 security update', u'_ns': u'units_erratum', u'rights': u'Copyright 2011 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 6', u'reboot_suggested': False, u'type': u'security', u'pkglist': [{u'packages': [{u'src': None, u'name': u'kdelibs3', u'sum': [u'md5', u'4984ce9e565e178163cc2ddbb603972b'], u'filename': u'kdelibs3-3.5.10-24.el6_1.1.i686.rpm', u'epoch': u'0', u'version': u'3.5.10', u'release': u'24.el6_1.1', u'arch': u'i686'}, {u'src': None, u'name': u'kdelibs3', u'sum': [u'md5', u'4403289045b96994e00f50b3d77a460a'], u'filename': u'kdelibs3-3.5.10-24.el6_1.1.src.rpm', u'epoch': u'0', u'version': u'3.5.10', u'release': u'24.el6_1.1', u'arch': u'src'}, {u'src': None, u'name': u'kdelibs3', u'sum': [u'md5', u'bb0fb323205fe2d1b70c0aaa256acd71'], u'filename': u'kdelibs3-3.5.10-24.el6_1.1.x86_64.rpm', u'epoch': u'0', u'version': u'3.5.10', u'release': u'24.el6_1.1', u'arch': u'x86_64'}, {u'src': None, u'name': u'kdelibs3-apidocs', u'sum': [u'md5', u'de1f3eed3017a0434ec5d5d4bc1959c7'], u'filename': u'kdelibs3-apidocs-3.5.10-24.el6_1.1.noarch.rpm', u'epoch': u'0', u'version': u'3.5.10', u'release': u'24.el6_1.1', u'arch': u'noarch'}, {u'src': None, u'name': u'kdelibs3-devel', u'sum': [u'md5', u'c2338cbe140eea04b0945b8939a74176'], u'filename': u'kdelibs3-devel-3.5.10-24.el6_1.1.i686.rpm', u'epoch': u'0', u'version': u'3.5.10', u'release': u'24.el6_1.1', u'arch': u'i686'}, {u'src': None, u'name': u'kdelibs3-devel', u'sum': [u'md5', u'71dd6e7acc08e097d08165a4ae5ca112'], u'filename': u'kdelibs3-devel-3.5.10-24.el6_1.1.x86_64.rpm', u'epoch': u'0', u'version': u'3.5.10', u'release': u'24.el6_1.1', u'arch': u'x86_64'}], u'name': u'ol6_x86_64_latest', u'short': u'ol6_x86_64_latest'}, {u'packages': [{u'src': None, u'name': u'kdelibs', u'sum': [u'md5', u'b1ea3316bad63c4e28425cdf56686608'], u'filename': u'kdelibs-3.5.4-26.0.1.el5_7.1.i386.rpm', u'epoch': u'6', u'version': u'3.5.4', u'release': u'26.0.1.el5_7.1', u'arch': u'i386'}, {u'src': None, u'name': u'kdelibs', u'sum': [u'md5', u'6c81a925443f76bb7086973d8411a358'], u'filename': u'kdelibs-3.5.4-26.0.1.el5_7.1.src.rpm', u'epoch': u'6', u'version': u'3.5.4', u'release': u'26.0.1.el5_7.1', u'arch': u'src'}, {u'src': None, u'name': u'kdelibs', u'sum': [u'md5', u'eafa2fc27f2252279c106d7805d27a5f'], u'filename': u'kdelibs-3.5.4-26.0.1.el5_7.1.x86_64.rpm', u'epoch': u'6', u'version': u'3.5.4', u'release': u'26.0.1.el5_7.1', u'arch': u'x86_64'}, {u'src': None, u'name': u'kdelibs-apidocs', u'sum': [u'md5', u'83eb6bdf0d5a70d3af43943c6a6342c4'], u'filename': u'kdelibs-apidocs-3.5.4-26.0.1.el5_7.1.x86_64.rpm', u'epoch': u'6', u'version': u'3.5.4', u'release': u'26.0.1.el5_7.1', u'arch': u'x86_64'}, {u'src': None, u'name': u'kdelibs-devel', u'sum': [u'md5', u'de5f794c24b3ca056b039fd33280f93e'], u'filename': u'kdelibs-devel-3.5.4-26.0.1.el5_7.1.i386.rpm', u'epoch': u'6', u'version': u'3.5.4', u'release': u'26.0.1.el5_7.1', u'arch': u'i386'}, {u'src': None, u'name': u'kdelibs-devel', u'sum': [u'md5', u'3a2bf6f85814ca8e060c2d39530d0981'], u'filename': u'kdelibs-devel-3.5.4-26.0.1.el5_7.1.x86_64.rpm', u'epoch': u'6', u'version': u'3.5.4', u'release': u'26.0.1.el5_7.1', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u"\nkernel:\n\n[2.6.18-274.7.1.0.1.el5]\n- fix ia64 build error due to add-support-above-32-vcpus.patch(Zhenzhong Duan)\n- [x86] use dynamic vcpu_info remap to support more than 32 vcpus (Zhenzhong Duan)\n- [scsi] add additional scsi medium error handling (John Sobecki) [orabug 12904887]\n- [x86] Fix lvt0 reset when hvm boot up with noapic param\n- [scsi] remove printk's when doing I/O to a dead device (John Sobecki, Chris Mason)\n [orabug 12342275]\n- [char] ipmi: Fix IPMI errors due to timing problems (Joe Jin) [orabug 12561346]\n- [scsi] Fix race when removing SCSI devices (Joe Jin) [orabug 12404566]\n- bonding: reread information about speed and duplex when interface goes up (John Haxby) [orabug 11890822]\n- [fs] nfs: Fix __put_nfs_open_context() NULL pointer panic (Joe Jin) [orabug 12687646]\n- [scsi] fix scsi hotplug and rescan race [orabug 10260172]\n- fix filp_close() race (Joe Jin) [orabug 10335998]\n- make xenkbd.abs_pointer=1 by default [orabug 67188919]\n- [xen] check to see if hypervisor supports memory reservation change\n (Chuck Anderson) [orabug 7556514]\n- [net] Enable entropy for bnx2,bnx2x,e1000e,igb,ixgb,ixgbe,ixgbevf (John Sobecki)\n [orabug 10315433]\n- [NET] Add xen pv netconsole support (Tina Yang) [orabug 6993043] [bz 7258]\n- [mm] shrink_zone patch (John Sobecki,Chris Mason) [orabug 6086839]\n- fix aacraid not to reset during kexec (Joe Jin) [orabug 8516042]\n- [rds] Patch rds to 1.4.2-20 (Andy Grover) [orabug 9471572, 9344105]\n RDS: Fix BUG_ONs to not fire when in a tasklet\n ipoib: Fix lockup of the tx queue\n RDS: Do not call set_page_dirty() with irqs off (Sherman Pun)\n RDS: Properly unmap when getting a remote access error (Tina Yang)\n RDS: Fix locking in rds_send_drop_to()\n- [xen] PVHVM guest with PoD crashes under memory pressure (Chuck Anderson)\n [orabug 9107465]\n- [xen] PV guest with FC HBA hangs during shutdown (Chuck Anderson)\n [orabug 9764220]\n- Support 256GB+ memory for pv guest (Mukesh Rathor) [orabug 9450615]\n- fix overcommit memory to use percpu_counter for el5 (KOSAKI Motohiro,\n Guru Anbalagane) [orabug 6124033]\n- [ipmi] make configurable timeouts for kcs of ipmi [orabug 9752208]\n- [ib] fix memory corruption (Andy Grover) [orabug 9972346]\n- [aio] patch removes limit on number of retries (Srinivas Eeda) [orabug 10044782]\n- [loop] Do not call loop_unplug for not configured loop device (orabug 10314497)\n\n[2.6.18-274.7.1.el5]\n- Revert: [xen] passthrough: block VT-d MSI trap injection (Paolo Bonzini) [716301 716302] {CVE-2011-1898}\n\n[2.6.18-274.6.1.el5]\n- [net] bridge: fix use after free in __br_deliver (Amerigo Wang) [730949 703045] {CVE-2011-2942}\n- [misc] remove\tdiv_long_long_rem (Prarit Bhargava) [732879 732614] {CVE-2011-3209}\n- [net] be2net: fix crash receiving non-member VLAN packets (Ivan Vecera) [736430 730239] {CVE-2011-3347}\n- [net] be2net: Use NTWK_RX_FILTER command for promiscous mode (Ivan Vecera) [736430 730239] {CVE-2011-3347}\n- [net] be2net: non-member vlan pkts not received in promisc mode (Ivan Vecera) [736430 730239] {CVE-2011-3347}\n- [net] be2net: remove bogus unlikely on vlan check (Ivan Vecera) [736430 730239] {CVE-2011-3347}\n- [x86] nmi: make NMI_NONE default watchdog in x86_64 hvm guests (Laszlo Ersek) [739823 707966]\n\n[2.6.18-274.5.1.el5]\n- [fs] proc: fix compile warning in pdeaux addition (Jarod Wilson) [732775 675781]\n- [fs] proc: Fix procfs race vs rmmod or hot-remove (David Howells) [732775 675781]\n- [net] Compute protocol seq numbers and fragment IDs using MD5 (Jiri Pirko) [732662 732663] {CVE-2011-3188}\n- [crypto] Move md5_transform to lib/md5.c (Jiri Pirko) [732662 732663] {CVE-2011-3188}\n- [fs] nfs: Fix client not honoring nosharecache mount option (David Jeffery) [734772 730097]\n- [mm] avoid wrapping vm_pgoff in mremap and stack expansion (Jerome Marchand) [716543 716544] {CVE-2011-2496}\n- [mm] Fix incorrect off-by-one centisec dirty values (Larry Woodman) [733665 691087]\n- [net] bnx2x: fix bringup of BCM57710 (Michal Schmidt) [737475 680411]\n- [virt] xen/netfront: no disable s/g when renegotiating features (Paolo Bonzini) [738392 733416]\n- [fs] aio: fix aio+dio completion path regression w/3rd-party bits (Jeff Moyer) [734157 727504]\n- [virt] xen: Allow arbitrary mtu size until frontend connected (Paolo Bonzini) [738389 697021]\n- [misc] hypervisor: fix race in interrupt hook code (Prarit Bhargava) [730689 692966]\n- [net] cnic, bnx2: Check iSCSI support early in bnx2_init_one (Neil Horman) [734761 710272]\n- [net] igb: fix WOL on 2nd port on i350 (Stefan Assmann) [730682 718988]\n- [misc] irq: fix interrupt handling for kdump under high load (Stefan Assmann) [728521 720212]\n\n[2.6.18-274.4.1.el5]\n- [serial] ifdef for powerpc, to only add functionality to this arch (Steve Best) [732377 707051]\n- [serial] 8250: Fix capabilities when changing the port type (Steve Best) [732377 707051]\n- [serial] 8250_pci EEH support for IBM/Digi PCIe 2-port Adapter (Steve Best) [732377 707051]\n- [serial] 8250_pci: Add support for Digi/IBM PCIe 2-port Adapter (Steve Best) [732377 707051]\n- [fs] ecryptfs: Add mount option to check uid of mounting device (Eric Sandeen) [731173 731174] {CVE-2011-1833}\n- [scsi] qla2xxx: Re-add checks for null fcport references (Chad Dupuis) [736275 728219]\n- [net] ipv6: make fragment identifications less predictable (Jiri Pirko) [723430 723431] {CVE-2011-2699}\n- [net] ipv6: Remove unused skb argument of ipv6_select_ident (Jiri Pirko) [723430 723431] {CVE-2011-2699}\n- [misc] taskstats: don't allow duplicate entries in listener mode (Jerome Marchand) [715449 715450] {CVE-2011-2484}\n- [net] gro: Only reset frag0 when skb can be pulled (Herbert Xu) [726553 679682] {CVE-2011-2723}\n- [xen] passthrough: block VT-d MSI trap injection (Paolo Bonzini) [716301 716302] {CVE-2011-1898}\n- [xen] iommu: disable bus-mastering on hw that causes IOMMU fault (Laszlo Ersek) [730342 730343] {CVE-2011-3131}\n- [usb] auerswald: fix buffer overflow (Don Zickus) [722395 722396] {CVE-2009-4067}\n- [fs] cifs: fix possible memory corruption in CIFSFindNext (Jeff Layton) [732870 736654 732869 732471] {CVE-2011-3191}\n- [fs] cifs: revert special handling for matching krb5 sessions (Jeff Layton) [697395 697396] {CVE-2011-1585}\n- [fs] cifs: check for NULL session password (Jeff Layton) [697395 697396] {CVE-2011-1585}\n- [fs] cifs: fix NULL pointer dereference in cifs_find_smb_ses (Jeff Layton) [697395 697396] {CVE-2011-1585}\n- [fs] cifs: clean up cifs_find_smb_ses (Jeff Layton) [697395 697396] {CVE-2011-1585}\n- [net] be2net: account for skb allocation failures (Ivan Vecera) [733152 730108]\n- [net] bnx2x: downgrade Max BW error message to debug (Michal Schmidt) [732440 727614]\n- [net] sock: do not change prot->obj_size (Jiri Pirko) [736742 725713]\n- [net] be2net: Fix Tx stall issue (Ivan Vecera) [732946 722549]\n- [net] be2net: rx-dropped wraparound fix (Ivan Vecera) [732945 722302]\n- [net] be2net: fix netdev_stats_update (Ivan Vecera) [732945 722302]\n- [char] tpm: Fix uninitialized usage of data buffer (Stanislaw Gruszka) [684672 684673] {CVE-2011-1160}\n- [fs] ext4: Fix max size and logical block counting of extent file (Lukas Czerner) [722562 722563] {CVE-2011-2695}\n- [fs] nfs: have nfs_flush_list issue FLUSH_SYNC writes in parallel (Jeff Layton) [730686 728508]\n- [xen] mm: fix race with ept_entry management (Andrew Jones) [730685 729529]\n- [xen] hvm: support more opcodes for MMIO (Paolo Bonzini) [728518 723755]\n\nocfs2:\n\n[1.4.9-1.el5]\n- Backport the discontig block group features from mainline ocfs2\n into EL5.x kernels\n", u'issued': u'2011-10-21', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELSA-2011-1386.html', u'type': u'self', u'id': None, u'title': u'ELSA-2011-1386'}, {u'href': u'http://linux.oracle.com/cve/CVE-2009-4067.html', u'type': u'cve', u'id': u'CVE-2009-4067', u'title': u'CVE-2009-4067'}, {u'href': u'http://linux.oracle.com/cve/CVE-2011-1160.html', u'type': u'cve', u'id': u'CVE-2011-1160', u'title': u'CVE-2011-1160'}, {u'href': u'http://linux.oracle.com/cve/CVE-2011-1585.html', u'type': u'cve', u'id': u'CVE-2011-1585', u'title': u'CVE-2011-1585'}, {u'href': u'http://linux.oracle.com/cve/CVE-2011-1833.html', u'type': u'cve', u'id': u'CVE-2011-1833', u'title': u'CVE-2011-1833'}, {u'href': u'http://linux.oracle.com/cve/CVE-2011-2484.html', u'type': u'cve', u'id': u'CVE-2011-2484', u'title': u'CVE-2011-2484'}, {u'href': u'http://linux.oracle.com/cve/CVE-2011-2496.html', u'type': u'cve', u'id': u'CVE-2011-2496', u'title': u'CVE-2011-2496'}, {u'href': u'http://linux.oracle.com/cve/CVE-2011-2695.html', u'type': u'cve', u'id': u'CVE-2011-2695', u'title': u'CVE-2011-2695'}, {u'href': u'http://linux.oracle.com/cve/CVE-2011-2699.html', u'type': u'cve', u'id': u'CVE-2011-2699', u'title': u'CVE-2011-2699'}, {u'href': u'http://linux.oracle.com/cve/CVE-2011-2723.html', u'type': u'cve', u'id': u'CVE-2011-2723', u'title': u'CVE-2011-2723'}, {u'href': u'http://linux.oracle.com/cve/CVE-2011-2942.html', u'type': u'cve', u'id': u'CVE-2011-2942', u'title': u'CVE-2011-2942'}, {u'href': u'http://linux.oracle.com/cve/CVE-2011-3131.html', u'type': u'cve', u'id': u'CVE-2011-3131', u'title': u'CVE-2011-3131'}, {u'href': u'http://linux.oracle.com/cve/CVE-2011-3188.html', u'type': u'cve', u'id': u'CVE-2011-3188', u'title': u'CVE-2011-3188'}, {u'href': u'http://linux.oracle.com/cve/CVE-2011-3191.html', u'type': u'cve', u'id': u'CVE-2011-3191', u'title': u'CVE-2011-3191'}, {u'href': u'http://linux.oracle.com/cve/CVE-2011-3209.html', u'type': u'cve', u'id': u'CVE-2011-3209', u'title': u'CVE-2011-3209'}, {u'href': u'http://linux.oracle.com/cve/CVE-2011-3347.html', u'type': u'cve', u'id': u'CVE-2011-3347', u'title': u'CVE-2011-3347'}], u'_content_type_id': u'erratum', u'_id': u'afdc0066-2656-41aa-a776-90280b2737e5', u'from': u'el-errata@oss.oracle.com', u'severity': u'Important', u'title': u' kernel security, bug fix, and enhancement update', u'_ns': u'units_erratum', u'rights': u'Copyright 2011 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 5', u'reboot_suggested': False, u'type': u'security', u'pkglist': [{u'packages': [{u'src': None, u'name': u'kernel', u'sum': [u'md5', u'6a7cd3ba5828e690d8173b16b3b763ba'], u'filename': u'kernel-2.6.18-274.7.1.0.1.el5.src.rpm', u'epoch': u'0', u'version': u'2.6.18', u'release': u'274.7.1.0.1.el5', u'arch': u'src'}, {u'src': None, u'name': u'kernel', u'sum': [u'md5', u'6497dafb0c641e59b19e9712a0be3579'], u'filename': u'kernel-2.6.18-274.7.1.0.1.el5.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.18', u'release': u'274.7.1.0.1.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'kernel-debug', u'sum': [u'md5', u'447b3e3f479511cb99f857ba2b6f42f4'], u'filename': u'kernel-debug-2.6.18-274.7.1.0.1.el5.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.18', u'release': u'274.7.1.0.1.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'kernel-debug-devel', u'sum': [u'md5', u'8334f6caf26e1834989e44cf581baa1d'], u'filename': u'kernel-debug-devel-2.6.18-274.7.1.0.1.el5.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.18', u'release': u'274.7.1.0.1.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'kernel-devel', u'sum': [u'md5', u'ae460246a9be01393b1c63c0aefd24e2'], u'filename': u'kernel-devel-2.6.18-274.7.1.0.1.el5.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.18', u'release': u'274.7.1.0.1.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'kernel-doc', u'sum': [u'md5', u'2f0ef7d71de2bb30a59d2593ec51be2a'], u'filename': u'kernel-doc-2.6.18-274.7.1.0.1.el5.noarch.rpm', u'epoch': u'0', u'version': u'2.6.18', u'release': u'274.7.1.0.1.el5', u'arch': u'noarch'}, {u'src': None, u'name': u'kernel-headers', u'sum': [u'md5', u'f35c8570451ea22bd881a7f90ed2a584'], u'filename': u'kernel-headers-2.6.18-274.7.1.0.1.el5.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.18', u'release': u'274.7.1.0.1.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'kernel-xen', u'sum': [u'md5', u'9fcb143a51fe97654200cfd0edc31106'], u'filename': u'kernel-xen-2.6.18-274.7.1.0.1.el5.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.18', u'release': u'274.7.1.0.1.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'kernel-xen-devel', u'sum': [u'md5', u'a3a47a7a38a9982a45e4c3f03a9c2ad7'], u'filename': u'kernel-xen-devel-2.6.18-274.7.1.0.1.el5.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.18', u'release': u'274.7.1.0.1.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'ocfs2-2.6.18-274.7.1.0.1.el5', u'sum': [u'md5', u'6d7b578b8dcc7082796aa1f37e407610'], u'filename': u'ocfs2-2.6.18-274.7.1.0.1.el5-1.4.9-1.el5.src.rpm', u'epoch': u'0', u'version': u'1.4.9', u'release': u'1.el5', u'arch': u'src'}, {u'src': None, u'name': u'ocfs2-2.6.18-274.7.1.0.1.el5', u'sum': [u'md5', u'99561db64a3ae5f346e38fdbb3745cc8'], u'filename': u'ocfs2-2.6.18-274.7.1.0.1.el5-1.4.9-1.el5.x86_64.rpm', u'epoch': u'0', u'version': u'1.4.9', u'release': u'1.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'ocfs2-2.6.18-274.7.1.0.1.el5debug', u'sum': [u'md5', u'70e57c20382b52cf52d68bd37ad62e73'], u'filename': u'ocfs2-2.6.18-274.7.1.0.1.el5debug-1.4.9-1.el5.x86_64.rpm', u'epoch': u'0', u'version': u'1.4.9', u'release': u'1.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'ocfs2-2.6.18-274.7.1.0.1.el5xen', u'sum': [u'md5', u'60b2e03820e9688580cf4c1b976b59c6'], u'filename': u'ocfs2-2.6.18-274.7.1.0.1.el5xen-1.4.9-1.el5.x86_64.rpm', u'epoch': u'0', u'version': u'1.4.9', u'release': u'1.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'oracleasm-2.6.18-274.7.1.0.1.el5', u'sum': [u'md5', u'4b3461dfe71ad7249c29a6053fb77d62'], u'filename': u'oracleasm-2.6.18-274.7.1.0.1.el5-2.0.5-1.el5.src.rpm', u'epoch': u'0', u'version': u'2.0.5', u'release': u'1.el5', u'arch': u'src'}, {u'src': None, u'name': u'oracleasm-2.6.18-274.7.1.0.1.el5', u'sum': [u'md5', u'22e70093d87895d712152323a9a7eaa8'], u'filename': u'oracleasm-2.6.18-274.7.1.0.1.el5-2.0.5-1.el5.x86_64.rpm', u'epoch': u'0', u'version': u'2.0.5', u'release': u'1.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'oracleasm-2.6.18-274.7.1.0.1.el5debug', u'sum': [u'md5', u'2aac9095db94c19489ef792e953952d5'], u'filename': u'oracleasm-2.6.18-274.7.1.0.1.el5debug-2.0.5-1.el5.x86_64.rpm', u'epoch': u'0', u'version': u'2.0.5', u'release': u'1.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'oracleasm-2.6.18-274.7.1.0.1.el5xen', u'sum': [u'md5', u'90a2cd02ed82f7c6df7b1f4e512072f1'], u'filename': u'oracleasm-2.6.18-274.7.1.0.1.el5xen-2.0.5-1.el5.x86_64.rpm', u'epoch': u'0', u'version': u'2.0.5', u'release': u'1.el5', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u"[2.2.3-53.0.2.el5_7.3]\n- Fix mod_ssl always performing full renegotiation (orabug 12423387)\n- replace index.html with Oracle's index page oracle_index.html\n- update vstring and distro in specfile\n\n[2.2.3-53.3]\n- add security fix for CVE-2011-3368 (#743903)\n- fix regressions in byterange handling (#736593)", u'issued': u'2011-10-20', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELSA-2011-1392.html', u'type': u'self', u'id': None, u'title': u'ELSA-2011-1392'}, {u'href': u'http://linux.oracle.com/cve/CVE-2011-3368.html', u'type': u'cve', u'id': u'CVE-2011-3368', u'title': u'CVE-2011-3368'}], u'_content_type_id': u'erratum', u'_id': u'4e422476-6fea-42c6-a787-8651ea528ffc', u'from': u'el-errata@oss.oracle.com', u'severity': u'Moderate', u'title': u' httpd security and bug fix update', u'_ns': u'units_erratum', u'rights': u'Copyright 2011 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 5', u'reboot_suggested': False, u'type': u'security', u'pkglist': [{u'packages': [{u'src': None, u'name': u'httpd', u'sum': [u'md5', u'd1858dea6c6940e29af9cf57242df0e1'], u'filename': u'httpd-2.2.3-53.0.2.el5_7.3.src.rpm', u'epoch': u'0', u'version': u'2.2.3', u'release': u'53.0.2.el5_7.3', u'arch': u'src'}, {u'src': None, u'name': u'httpd', u'sum': [u'md5', u'5cea7957c2669ae97b86a5368f9ce7f5'], u'filename': u'httpd-2.2.3-53.0.2.el5_7.3.x86_64.rpm', u'epoch': u'0', u'version': u'2.2.3', u'release': u'53.0.2.el5_7.3', u'arch': u'x86_64'}, {u'src': None, u'name': u'httpd-devel', u'sum': [u'md5', u'51a0a565ccfa4886348cb919406eb5f6'], u'filename': u'httpd-devel-2.2.3-53.0.2.el5_7.3.i386.rpm', u'epoch': u'0', u'version': u'2.2.3', u'release': u'53.0.2.el5_7.3', u'arch': u'i386'}, {u'src': None, u'name': u'httpd-devel', u'sum': [u'md5', u'45f1628df2dafd406e09665fb8dadf60'], u'filename': u'httpd-devel-2.2.3-53.0.2.el5_7.3.x86_64.rpm', u'epoch': u'0', u'version': u'2.2.3', u'release': u'53.0.2.el5_7.3', u'arch': u'x86_64'}, {u'src': None, u'name': u'httpd-manual', u'sum': [u'md5', u'3b174928014909e6865db85f655f7ef1'], u'filename': u'httpd-manual-2.2.3-53.0.2.el5_7.3.x86_64.rpm', u'epoch': u'0', u'version': u'2.2.3', u'release': u'53.0.2.el5_7.3', u'arch': u'x86_64'}, {u'src': None, u'name': u'mod_ssl', u'sum': [u'md5', u'6ac9cc69ac46315faed42c67ed0ced35'], u'filename': u'mod_ssl-2.2.3-53.0.2.el5_7.3.x86_64.rpm', u'epoch': u'1', u'version': u'2.2.3', u'release': u'53.0.2.el5_7.3', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u'\n[3.0.3-132.el5_7.2]\n- Release device backends before restarting guest on the destination machine (rhbz 743850)\n- Fix SCSI buffer overflow and disable SCSI CD-ROMs (rhbz 736289)\n\n[3.0.3-132.el5_7.1]\n- hotplug: set netback/tap MTU to the same value as the bridge MTU (rhbz 738608)\n- copy the MTU of the physical interface to the Xen bridge (rhbz 738610)', u'issued': u'2011-10-24', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELSA-2011-1401.html', u'type': u'self', u'id': None, u'title': u'ELSA-2011-1401'}, {u'href': u'http://linux.oracle.com/cve/CVE-2011-3346.html', u'type': u'cve', u'id': u'CVE-2011-3346', u'title': u'CVE-2011-3346'}], u'_content_type_id': u'erratum', u'_id': u'a9daca88-9543-4d73-ab3a-71d512a7819d', u'from': u'el-errata@oss.oracle.com', u'severity': u'Moderate', u'title': u' xen security and bug fix update', u'_ns': u'units_erratum', u'rights': u'Copyright 2011 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 5', u'reboot_suggested': False, u'type': u'security', u'pkglist': [{u'packages': [{u'src': None, u'name': u'xen', u'sum': [u'md5', u'2cab397078733cbd13c36e9dcd976525'], u'filename': u'xen-3.0.3-132.el5_7.2.src.rpm', u'epoch': u'0', u'version': u'3.0.3', u'release': u'132.el5_7.2', u'arch': u'src'}, {u'src': None, u'name': u'xen', u'sum': [u'md5', u'fdcd215991ad17269c5ddd7470e6fb56'], u'filename': u'xen-3.0.3-132.el5_7.2.x86_64.rpm', u'epoch': u'0', u'version': u'3.0.3', u'release': u'132.el5_7.2', u'arch': u'x86_64'}, {u'src': None, u'name': u'xen-devel', u'sum': [u'md5', u'637ff4163e779ed0a9b8c7e0c6618e5a'], u'filename': u'xen-devel-3.0.3-132.el5_7.2.i386.rpm', u'epoch': u'0', u'version': u'3.0.3', u'release': u'132.el5_7.2', u'arch': u'i386'}, {u'src': None, u'name': u'xen-devel', u'sum': [u'md5', u'2d73233ce7d7ab6aa55cbe9aa113a30c'], u'filename': u'xen-devel-3.0.3-132.el5_7.2.x86_64.rpm', u'epoch': u'0', u'version': u'3.0.3', u'release': u'132.el5_7.2', u'arch': u'x86_64'}, {u'src': None, u'name': u'xen-libs', u'sum': [u'md5', u'11a44763fd1b05f58db8bb7d17327e48'], u'filename': u'xen-libs-3.0.3-132.el5_7.2.i386.rpm', u'epoch': u'0', u'version': u'3.0.3', u'release': u'132.el5_7.2', u'arch': u'i386'}, {u'src': None, u'name': u'xen-libs', u'sum': [u'md5', u'959f3e64bb1d9ef4275fe34a50ca3434'], u'filename': u'xen-libs-3.0.3-132.el5_7.2.x86_64.rpm', u'epoch': u'0', u'version': u'3.0.3', u'release': u'132.el5_7.2', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u'\n[2.3.11-6.el6_1.7]\n- Add freetype-2.3.11-CVE-2011-3256.patch\n (Handle some border cases.)\n- Resolves: #747083', u'issued': u'2011-10-25', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELSA-2011-1402.html', u'type': u'self', u'id': None, u'title': u'ELSA-2011-1402'}, {u'href': u'http://linux.oracle.com/cve/CVE-2011-3256.html', u'type': u'cve', u'id': u'CVE-2011-3256', u'title': u'CVE-2011-3256'}], u'_content_type_id': u'erratum', u'_id': u'b86089cc-b993-4035-b1d3-801d7d05e1b0', u'from': u'el-errata@oss.oracle.com', u'severity': u'Important', u'title': u' freetype security update', u'_ns': u'units_erratum', u'rights': u'Copyright 2011 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 6', u'reboot_suggested': False, u'type': u'security', u'pkglist': [{u'packages': [{u'src': None, u'name': u'freetype', u'sum': [u'md5', u'f108855c2d5bfa506049b97f14957274'], u'filename': u'freetype-2.3.11-6.el6_1.7.i686.rpm', u'epoch': u'0', u'version': u'2.3.11', u'release': u'6.el6_1.7', u'arch': u'i686'}, {u'src': None, u'name': u'freetype', u'sum': [u'md5', u'1122c1333e25ad27a4536d56e7f75a79'], u'filename': u'freetype-2.3.11-6.el6_1.7.src.rpm', u'epoch': u'0', u'version': u'2.3.11', u'release': u'6.el6_1.7', u'arch': u'src'}, {u'src': None, u'name': u'freetype', u'sum': [u'md5', u'f1ad7b7908ad8841623c2552075bcae5'], u'filename': u'freetype-2.3.11-6.el6_1.7.x86_64.rpm', u'epoch': u'0', u'version': u'2.3.11', u'release': u'6.el6_1.7', u'arch': u'x86_64'}, {u'src': None, u'name': u'freetype-demos', u'sum': [u'md5', u'3d6398795dc80c7d20425a5ee199e5bb'], u'filename': u'freetype-demos-2.3.11-6.el6_1.7.x86_64.rpm', u'epoch': u'0', u'version': u'2.3.11', u'release': u'6.el6_1.7', u'arch': u'x86_64'}, {u'src': None, u'name': u'freetype-devel', u'sum': [u'md5', u'ba85ea797a1720486e681b5c381a74d6'], u'filename': u'freetype-devel-2.3.11-6.el6_1.7.i686.rpm', u'epoch': u'0', u'version': u'2.3.11', u'release': u'6.el6_1.7', u'arch': u'i686'}, {u'src': None, u'name': u'freetype-devel', u'sum': [u'md5', u'8ba5da5310c77e45e2b9123822b35ec5'], u'filename': u'freetype-devel-2.3.11-6.el6_1.7.x86_64.rpm', u'epoch': u'0', u'version': u'2.3.11', u'release': u'6.el6_1.7', u'arch': u'x86_64'}], u'name': u'ol6_x86_64_latest', u'short': u'ol6_x86_64_latest'}, {u'packages': [{u'src': None, u'name': u'freetype', u'sum': [u'md5', u'd9a054a226e0f6cd29ee47c39e124f59'], u'filename': u'freetype-2.2.1-28.el5_7.1.i386.rpm', u'epoch': u'0', u'version': u'2.2.1', u'release': u'28.el5_7.1', u'arch': u'i386'}, {u'src': None, u'name': u'freetype', u'sum': [u'md5', u'20bce1d4926ede58b7d370525b4aeee1'], u'filename': u'freetype-2.2.1-28.el5_7.1.src.rpm', u'epoch': u'0', u'version': u'2.2.1', u'release': u'28.el5_7.1', u'arch': u'src'}, {u'src': None, u'name': u'freetype', u'sum': [u'md5', u'823187e727d6d8d92e4dcee7ba46ca67'], u'filename': u'freetype-2.2.1-28.el5_7.1.x86_64.rpm', u'epoch': u'0', u'version': u'2.2.1', u'release': u'28.el5_7.1', u'arch': u'x86_64'}, {u'src': None, u'name': u'freetype-demos', u'sum': [u'md5', u'34ba6f924897e0510390653b4c75dfe1'], u'filename': u'freetype-demos-2.2.1-28.el5_7.1.x86_64.rpm', u'epoch': u'0', u'version': u'2.2.1', u'release': u'28.el5_7.1', u'arch': u'x86_64'}, {u'src': None, u'name': u'freetype-devel', u'sum': [u'md5', u'c683cdf6c3a88053eef2f4f48d54a756'], u'filename': u'freetype-devel-2.2.1-28.el5_7.1.i386.rpm', u'epoch': u'0', u'version': u'2.2.1', u'release': u'28.el5_7.1', u'arch': u'i386'}, {u'src': None, u'name': u'freetype-devel', u'sum': [u'md5', u'7acf09e76fa8ddd2c0a8d109b0193b94'], u'filename': u'freetype-devel-2.2.1-28.el5_7.1.x86_64.rpm', u'epoch': u'0', u'version': u'2.2.1', u'release': u'28.el5_7.1', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u'\n[2.6.32-4.4]\nResolves: #748969 CVE-2011-4073 updated patch by upstream\n\n[2.6.32-4.3]\nResolves: #748969 CVE-2011-4073', u'issued': u'2011-11-02', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELSA-2011-1422.html', u'type': u'self', u'id': None, u'title': u'ELSA-2011-1422'}, {u'href': u'http://linux.oracle.com/cve/CVE-2011-4073.html', u'type': u'cve', u'id': u'CVE-2011-4073', u'title': u'CVE-2011-4073'}], u'_content_type_id': u'erratum', u'_id': u'a4f334eb-a7a6-4b76-8b59-ec18556d3cb0', u'from': u'el-errata@oss.oracle.com', u'severity': u'Moderate', u'title': u' openswan security update', u'_ns': u'units_erratum', u'rights': u'Copyright 2011 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 6', u'reboot_suggested': False, u'type': u'security', u'pkglist': [{u'packages': [{u'src': None, u'name': u'openswan', u'sum': [u'md5', u'7593eed7ac54173be47495971969d423'], u'filename': u'openswan-2.6.32-4.el6_1.4.src.rpm', u'epoch': u'0', u'version': u'2.6.32', u'release': u'4.el6_1.4', u'arch': u'src'}, {u'src': None, u'name': u'openswan', u'sum': [u'md5', u'618a59d022961d61df69dc3037dd969e'], u'filename': u'openswan-2.6.32-4.el6_1.4.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.32', u'release': u'4.el6_1.4', u'arch': u'x86_64'}, {u'src': None, u'name': u'openswan-doc', u'sum': [u'md5', u'c3e732342918232f6aed7dcebfe2eef7'], u'filename': u'openswan-doc-2.6.32-4.el6_1.4.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.32', u'release': u'4.el6_1.4', u'arch': u'x86_64'}], u'name': u'ol6_x86_64_latest', u'short': u'ol6_x86_64_latest'}, {u'packages': [{u'src': None, u'name': u'openswan', u'sum': [u'md5', u'adf1805317206c819cb6a98e972af500'], u'filename': u'openswan-2.6.21-5.el5_7.6.src.rpm', u'epoch': u'0', u'version': u'2.6.21', u'release': u'5.el5_7.6', u'arch': u'src'}, {u'src': None, u'name': u'openswan', u'sum': [u'md5', u'5096679747f7f641bfca472333efb8ed'], u'filename': u'openswan-2.6.21-5.el5_7.6.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.21', u'release': u'5.el5_7.6', u'arch': u'x86_64'}, {u'src': None, u'name': u'openswan-doc', u'sum': [u'md5', u'5656b322815c9e16e5078031652d1f81'], u'filename': u'openswan-doc-2.6.21-5.el5_7.6.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.21', u'release': u'5.el5_7.6', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u'\n[5.3.3-3.3]\n- improve CVE-2011-1466 fix to cover CAL_GREGORIAN, CAL_JEWISH\n\n[5.3.3-3.1]\n- add security fixes for CVE-2011-2483, CVE-2011-0708, CVE-2011-1148,\n CVE-2011-1466, CVE-2011-1468, CVE-2011-1469, CVE-2011-1470,\n CVE-2011-1471, CVE-2011-1938, and CVE-2011-2202 (#740731)', u'issued': u'2011-11-02', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELSA-2011-1423.html', u'type': u'self', u'id': None, u'title': u'ELSA-2011-1423'}, {u'href': u'http://linux.oracle.com/cve/CVE-2011-0708.html', u'type': u'cve', u'id': u'CVE-2011-0708', u'title': u'CVE-2011-0708'}, {u'href': u'http://linux.oracle.com/cve/CVE-2011-1148.html', u'type': u'cve', u'id': u'CVE-2011-1148', u'title': u'CVE-2011-1148'}, {u'href': u'http://linux.oracle.com/cve/CVE-2011-1466.html', u'type': u'cve', u'id': u'CVE-2011-1466', u'title': u'CVE-2011-1466'}, {u'href': u'http://linux.oracle.com/cve/CVE-2011-1468.html', u'type': u'cve', u'id': u'CVE-2011-1468', u'title': u'CVE-2011-1468'}, {u'href': u'http://linux.oracle.com/cve/CVE-2011-1469.html', u'type': u'cve', u'id': u'CVE-2011-1469', u'title': u'CVE-2011-1469'}, {u'href': u'http://linux.oracle.com/cve/CVE-2011-1471.html', u'type': u'cve', u'id': u'CVE-2011-1471', u'title': u'CVE-2011-1471'}, {u'href': u'http://linux.oracle.com/cve/CVE-2011-1938.html', u'type': u'cve', u'id': u'CVE-2011-1938', u'title': u'CVE-2011-1938'}, {u'href': u'http://linux.oracle.com/cve/CVE-2011-2202.html', u'type': u'cve', u'id': u'CVE-2011-2202', u'title': u'CVE-2011-2202'}, {u'href': u'http://linux.oracle.com/cve/CVE-2011-2483.html', u'type': u'cve', u'id': u'CVE-2011-2483', u'title': u'CVE-2011-2483'}], u'_content_type_id': u'erratum', u'_id': u'ec896568-a6be-4368-8a4a-b047c17a114d', u'from': u'el-errata@oss.oracle.com', u'severity': u'Moderate', u'title': u' php53 and php security update', u'_ns': u'units_erratum', u'rights': u'Copyright 2011 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 6', u'reboot_suggested': False, u'type': u'security', u'pkglist': [{u'packages': [{u'src': None, u'name': u'php', u'sum': [u'md5', u'5e20527a67ade8d7ea06fc36a4ca0d45'], u'filename': u'php-5.3.3-3.el6_1.3.src.rpm', u'epoch': u'0', u'version': u'5.3.3', u'release': u'3.el6_1.3', u'arch': u'src'}, {u'src': None, u'name': u'php', u'sum': [u'md5', u'05302e5ac04fd879c1ccd8c57d321a63'], u'filename': u'php-5.3.3-3.el6_1.3.x86_64.rpm', u'epoch': u'0', u'version': u'5.3.3', u'release': u'3.el6_1.3', u'arch': u'x86_64'}, {u'src': None, u'name': u'php-bcmath', u'sum': [u'md5', u'acc237bc58458fe0c5fce255d3c12527'], u'filename': u'php-bcmath-5.3.3-3.el6_1.3.x86_64.rpm', u'epoch': u'0', u'version': u'5.3.3', u'release': u'3.el6_1.3', u'arch': u'x86_64'}, {u'src': None, u'name': u'php-cli', u'sum': [u'md5', u'df3888aadb4191e807f1e537959c46ec'], u'filename': u'php-cli-5.3.3-3.el6_1.3.x86_64.rpm', u'epoch': u'0', u'version': u'5.3.3', u'release': u'3.el6_1.3', u'arch': u'x86_64'}, {u'src': None, u'name': u'php-common', u'sum': [u'md5', u'baa2b72aeaafdf678530f8573ebea13d'], u'filename': u'php-common-5.3.3-3.el6_1.3.x86_64.rpm', u'epoch': u'0', u'version': u'5.3.3', u'release': u'3.el6_1.3', u'arch': u'x86_64'}, {u'src': None, u'name': u'php-dba', u'sum': [u'md5', u'68c0574979021d22cf4286098b66da51'], u'filename': u'php-dba-5.3.3-3.el6_1.3.x86_64.rpm', u'epoch': u'0', u'version': u'5.3.3', u'release': u'3.el6_1.3', u'arch': u'x86_64'}, {u'src': None, u'name': u'php-devel', u'sum': [u'md5', u'5bb30f76ab8a6d438cbbb5b7a7fa59f7'], u'filename': u'php-devel-5.3.3-3.el6_1.3.x86_64.rpm', u'epoch': u'0', u'version': u'5.3.3', u'release': u'3.el6_1.3', u'arch': u'x86_64'}, {u'src': None, u'name': u'php-embedded', u'sum': [u'md5', u'8ed6e6e8aae164203279ca89c1f9ee1b'], u'filename': u'php-embedded-5.3.3-3.el6_1.3.x86_64.rpm', u'epoch': u'0', u'version': u'5.3.3', u'release': u'3.el6_1.3', u'arch': u'x86_64'}, {u'src': None, u'name': u'php-enchant', u'sum': [u'md5', u'fcb798127e862ac66212d41bd992ed2b'], u'filename': u'php-enchant-5.3.3-3.el6_1.3.x86_64.rpm', u'epoch': u'0', u'version': u'5.3.3', u'release': u'3.el6_1.3', u'arch': u'x86_64'}, {u'src': None, u'name': u'php-gd', u'sum': [u'md5', u'fcb69bb7473ec0417e5957736c0707fa'], u'filename': u'php-gd-5.3.3-3.el6_1.3.x86_64.rpm', u'epoch': u'0', u'version': u'5.3.3', u'release': u'3.el6_1.3', u'arch': u'x86_64'}, {u'src': None, u'name': u'php-imap', u'sum': [u'md5', u'82a1a8b6e6b7f09da3db3d0969572915'], u'filename': u'php-imap-5.3.3-3.el6_1.3.x86_64.rpm', u'epoch': u'0', u'version': u'5.3.3', u'release': u'3.el6_1.3', u'arch': u'x86_64'}, {u'src': None, u'name': u'php-intl', u'sum': [u'md5', u'4e8d375b6a9cec4432afcd2aee87f1c4'], u'filename': u'php-intl-5.3.3-3.el6_1.3.x86_64.rpm', u'epoch': u'0', u'version': u'5.3.3', u'release': u'3.el6_1.3', u'arch': u'x86_64'}, {u'src': None, u'name': u'php-ldap', u'sum': [u'md5', u'77040689af4e627a19cde594894876f9'], u'filename': u'php-ldap-5.3.3-3.el6_1.3.x86_64.rpm', u'epoch': u'0', u'version': u'5.3.3', u'release': u'3.el6_1.3', u'arch': u'x86_64'}, {u'src': None, u'name': u'php-mbstring', u'sum': [u'md5', u'794a47bf8731f7b9658230d0376c012f'], u'filename': u'php-mbstring-5.3.3-3.el6_1.3.x86_64.rpm', u'epoch': u'0', u'version': u'5.3.3', u'release': u'3.el6_1.3', u'arch': u'x86_64'}, {u'src': None, u'name': u'php-mysql', u'sum': [u'md5', u'633785d1c033ee547e1a86792b6fc50d'], u'filename': u'php-mysql-5.3.3-3.el6_1.3.x86_64.rpm', u'epoch': u'0', u'version': u'5.3.3', u'release': u'3.el6_1.3', u'arch': u'x86_64'}, {u'src': None, u'name': u'php-odbc', u'sum': [u'md5', u'b7e5cbe442e0c214b8c47147db2e0164'], u'filename': u'php-odbc-5.3.3-3.el6_1.3.x86_64.rpm', u'epoch': u'0', u'version': u'5.3.3', u'release': u'3.el6_1.3', u'arch': u'x86_64'}, {u'src': None, u'name': u'php-pdo', u'sum': [u'md5', u'47ba9c61f8480887cad7a1a05eb1d93c'], u'filename': u'php-pdo-5.3.3-3.el6_1.3.x86_64.rpm', u'epoch': u'0', u'version': u'5.3.3', u'release': u'3.el6_1.3', u'arch': u'x86_64'}, {u'src': None, u'name': u'php-pgsql', u'sum': [u'md5', u'63175fa0a19272f74def8f37e26a51af'], u'filename': u'php-pgsql-5.3.3-3.el6_1.3.x86_64.rpm', u'epoch': u'0', u'version': u'5.3.3', u'release': u'3.el6_1.3', u'arch': u'x86_64'}, {u'src': None, u'name': u'php-process', u'sum': [u'md5', u'd9e309b68cb252d9363024a012a417b0'], u'filename': u'php-process-5.3.3-3.el6_1.3.x86_64.rpm', u'epoch': u'0', u'version': u'5.3.3', u'release': u'3.el6_1.3', u'arch': u'x86_64'}, {u'src': None, u'name': u'php-pspell', u'sum': [u'md5', u'c8cc8e2b4396e3e73769f612a7a44b37'], u'filename': u'php-pspell-5.3.3-3.el6_1.3.x86_64.rpm', u'epoch': u'0', u'version': u'5.3.3', u'release': u'3.el6_1.3', u'arch': u'x86_64'}, {u'src': None, u'name': u'php-recode', u'sum': [u'md5', u'5c4e5a69b759dcd095d0531f3f96d0ea'], u'filename': u'php-recode-5.3.3-3.el6_1.3.x86_64.rpm', u'epoch': u'0', u'version': u'5.3.3', u'release': u'3.el6_1.3', u'arch': u'x86_64'}, {u'src': None, u'name': u'php-snmp', u'sum': [u'md5', u'7a43c2d8987e4ebeaac318497c9b0562'], u'filename': u'php-snmp-5.3.3-3.el6_1.3.x86_64.rpm', u'epoch': u'0', u'version': u'5.3.3', u'release': u'3.el6_1.3', u'arch': u'x86_64'}, {u'src': None, u'name': u'php-soap', u'sum': [u'md5', u'd524560d027ac18f0a2c55c35eed439b'], u'filename': u'php-soap-5.3.3-3.el6_1.3.x86_64.rpm', u'epoch': u'0', u'version': u'5.3.3', u'release': u'3.el6_1.3', u'arch': u'x86_64'}, {u'src': None, u'name': u'php-tidy', u'sum': [u'md5', u'7065b1ce67ca7f9bb44c95e13fdbc0f8'], u'filename': u'php-tidy-5.3.3-3.el6_1.3.x86_64.rpm', u'epoch': u'0', u'version': u'5.3.3', u'release': u'3.el6_1.3', u'arch': u'x86_64'}, {u'src': None, u'name': u'php-xml', u'sum': [u'md5', u'e28aeb3df90f285357e10bac23d91781'], u'filename': u'php-xml-5.3.3-3.el6_1.3.x86_64.rpm', u'epoch': u'0', u'version': u'5.3.3', u'release': u'3.el6_1.3', u'arch': u'x86_64'}, {u'src': None, u'name': u'php-xmlrpc', u'sum': [u'md5', u'44f07b194a69b69be249ac465e172cc3'], u'filename': u'php-xmlrpc-5.3.3-3.el6_1.3.x86_64.rpm', u'epoch': u'0', u'version': u'5.3.3', u'release': u'3.el6_1.3', u'arch': u'x86_64'}, {u'src': None, u'name': u'php-zts', u'sum': [u'md5', u'7f467e5e7a0002c75be27f7185d2baa1'], u'filename': u'php-zts-5.3.3-3.el6_1.3.x86_64.rpm', u'epoch': u'0', u'version': u'5.3.3', u'release': u'3.el6_1.3', u'arch': u'x86_64'}], u'name': u'ol6_x86_64_latest', u'short': u'ol6_x86_64_latest'}, {u'packages': [{u'src': None, u'name': u'php53', u'sum': [u'md5', u'18ab04236fcce89fe1c3d0b1ca7c8fbe'], u'filename': u'php53-5.3.3-1.el5_7.3.src.rpm', u'epoch': u'0', u'version': u'5.3.3', u'release': u'1.el5_7.3', u'arch': u'src'}, {u'src': None, u'name': u'php53', u'sum': [u'md5', u'd4be72934aa826bcbb8d20827e9a3ff4'], u'filename': u'php53-5.3.3-1.el5_7.3.x86_64.rpm', u'epoch': u'0', u'version': u'5.3.3', u'release': u'1.el5_7.3', u'arch': u'x86_64'}, {u'src': None, u'name': u'php53-bcmath', u'sum': [u'md5', u'122e6ea9bacea8164502de9d829352b1'], u'filename': u'php53-bcmath-5.3.3-1.el5_7.3.x86_64.rpm', u'epoch': u'0', u'version': u'5.3.3', u'release': u'1.el5_7.3', u'arch': u'x86_64'}, {u'src': None, u'name': u'php53-cli', u'sum': [u'md5', u'94059834476acf0679d9cea9a9e944bc'], u'filename': u'php53-cli-5.3.3-1.el5_7.3.x86_64.rpm', u'epoch': u'0', u'version': u'5.3.3', u'release': u'1.el5_7.3', u'arch': u'x86_64'}, {u'src': None, u'name': u'php53-common', u'sum': [u'md5', u'9f7a287814ea81814c5cd7387cbe6d50'], u'filename': u'php53-common-5.3.3-1.el5_7.3.x86_64.rpm', u'epoch': u'0', u'version': u'5.3.3', u'release': u'1.el5_7.3', u'arch': u'x86_64'}, {u'src': None, u'name': u'php53-dba', u'sum': [u'md5', u'5c7ef42458d01c7b61ec0d885e508df1'], u'filename': u'php53-dba-5.3.3-1.el5_7.3.x86_64.rpm', u'epoch': u'0', u'version': u'5.3.3', u'release': u'1.el5_7.3', u'arch': u'x86_64'}, {u'src': None, u'name': u'php53-devel', u'sum': [u'md5', u'9a4fe1c333bcbf1632335c10b69045a0'], u'filename': u'php53-devel-5.3.3-1.el5_7.3.x86_64.rpm', u'epoch': u'0', u'version': u'5.3.3', u'release': u'1.el5_7.3', u'arch': u'x86_64'}, {u'src': None, u'name': u'php53-gd', u'sum': [u'md5', u'85de5c3c0258c54f1c0b854c45c9c868'], u'filename': u'php53-gd-5.3.3-1.el5_7.3.x86_64.rpm', u'epoch': u'0', u'version': u'5.3.3', u'release': u'1.el5_7.3', u'arch': u'x86_64'}, {u'src': None, u'name': u'php53-imap', u'sum': [u'md5', u'62128b85eefc899cec608239d769822b'], u'filename': u'php53-imap-5.3.3-1.el5_7.3.x86_64.rpm', u'epoch': u'0', u'version': u'5.3.3', u'release': u'1.el5_7.3', u'arch': u'x86_64'}, {u'src': None, u'name': u'php53-intl', u'sum': [u'md5', u'bbb5c43ac3101adfebbeeee300b07fe0'], u'filename': u'php53-intl-5.3.3-1.el5_7.3.x86_64.rpm', u'epoch': u'0', u'version': u'5.3.3', u'release': u'1.el5_7.3', u'arch': u'x86_64'}, {u'src': None, u'name': u'php53-ldap', u'sum': [u'md5', u'86c6ca5bc50b9f8301391a875766e7f8'], u'filename': u'php53-ldap-5.3.3-1.el5_7.3.x86_64.rpm', u'epoch': u'0', u'version': u'5.3.3', u'release': u'1.el5_7.3', u'arch': u'x86_64'}, {u'src': None, u'name': u'php53-mbstring', u'sum': [u'md5', u'9914390962a3e4636fdfac8c0c2c94f9'], u'filename': u'php53-mbstring-5.3.3-1.el5_7.3.x86_64.rpm', u'epoch': u'0', u'version': u'5.3.3', u'release': u'1.el5_7.3', u'arch': u'x86_64'}, {u'src': None, u'name': u'php53-mysql', u'sum': [u'md5', u'590d91a09438eb4b57ab96826cf7bcf4'], u'filename': u'php53-mysql-5.3.3-1.el5_7.3.x86_64.rpm', u'epoch': u'0', u'version': u'5.3.3', u'release': u'1.el5_7.3', u'arch': u'x86_64'}, {u'src': None, u'name': u'php53-odbc', u'sum': [u'md5', u'da0f9f9d1e82d9a5138640567e94f5c4'], u'filename': u'php53-odbc-5.3.3-1.el5_7.3.x86_64.rpm', u'epoch': u'0', u'version': u'5.3.3', u'release': u'1.el5_7.3', u'arch': u'x86_64'}, {u'src': None, u'name': u'php53-pdo', u'sum': [u'md5', u'013ace13400fc073808c0239d70d1635'], u'filename': u'php53-pdo-5.3.3-1.el5_7.3.x86_64.rpm', u'epoch': u'0', u'version': u'5.3.3', u'release': u'1.el5_7.3', u'arch': u'x86_64'}, {u'src': None, u'name': u'php53-pgsql', u'sum': [u'md5', u'fb45f6b9e1b1397340dd292e41a1ab11'], u'filename': u'php53-pgsql-5.3.3-1.el5_7.3.x86_64.rpm', u'epoch': u'0', u'version': u'5.3.3', u'release': u'1.el5_7.3', u'arch': u'x86_64'}, {u'src': None, u'name': u'php53-process', u'sum': [u'md5', u'0caf933860d362c678f1063b0e8e8f3e'], u'filename': u'php53-process-5.3.3-1.el5_7.3.x86_64.rpm', u'epoch': u'0', u'version': u'5.3.3', u'release': u'1.el5_7.3', u'arch': u'x86_64'}, {u'src': None, u'name': u'php53-pspell', u'sum': [u'md5', u'e2c4a367718039361baa7765911a4282'], u'filename': u'php53-pspell-5.3.3-1.el5_7.3.x86_64.rpm', u'epoch': u'0', u'version': u'5.3.3', u'release': u'1.el5_7.3', u'arch': u'x86_64'}, {u'src': None, u'name': u'php53-snmp', u'sum': [u'md5', u'9d33a8c74525d543e6cddb1646875c29'], u'filename': u'php53-snmp-5.3.3-1.el5_7.3.x86_64.rpm', u'epoch': u'0', u'version': u'5.3.3', u'release': u'1.el5_7.3', u'arch': u'x86_64'}, {u'src': None, u'name': u'php53-soap', u'sum': [u'md5', u'6588763fe4e403e570f9fd7967512f62'], u'filename': u'php53-soap-5.3.3-1.el5_7.3.x86_64.rpm', u'epoch': u'0', u'version': u'5.3.3', u'release': u'1.el5_7.3', u'arch': u'x86_64'}, {u'src': None, u'name': u'php53-xml', u'sum': [u'md5', u'531b1cddb4ec63a34797bff3ac323c75'], u'filename': u'php53-xml-5.3.3-1.el5_7.3.x86_64.rpm', u'epoch': u'0', u'version': u'5.3.3', u'release': u'1.el5_7.3', u'arch': u'x86_64'}, {u'src': None, u'name': u'php53-xmlrpc', u'sum': [u'md5', u'7c6ef01b941c4faa7d6dc5c1778dcf31'], u'filename': u'php53-xmlrpc-5.3.3-1.el5_7.3.x86_64.rpm', u'epoch': u'0', u'version': u'5.3.3', u'release': u'1.el5_7.3', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u'firefox:\n[3.6.24-3.0.1.el6_1]\n- Add firefox-oracle-default-prefs.js and remove the corresponding Red Hat ones\n\n[3.6.24-3]\n- Update to 3.6.24\n\nxulrunner:\n[1.9.2.24-2.0.1.el6_1.1]\n- Replace xulrunner-redhat-default-prefs.js with\n xulrunner-oracle-default-prefs.js\n\n[1.9.2.24-2]\n- Update to 1.9.2.24', u'issued': u'2011-11-09', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELSA-2011-1437.html', u'type': u'self', u'id': None, u'title': u'ELSA-2011-1437'}, {u'href': u'http://linux.oracle.com/cve/CVE-2011-3647.html', u'type': u'cve', u'id': u'CVE-2011-3647', u'title': u'CVE-2011-3647'}, {u'href': u'http://linux.oracle.com/cve/CVE-2011-3648.html', u'type': u'cve', u'id': u'CVE-2011-3648', u'title': u'CVE-2011-3648'}, {u'href': u'http://linux.oracle.com/cve/CVE-2011-3650.html', u'type': u'cve', u'id': u'CVE-2011-3650', u'title': u'CVE-2011-3650'}], u'_content_type_id': u'erratum', u'_id': u'7336ae53-7833-425b-9959-283781e2f5f2', u'from': u'el-errata@oss.oracle.com', u'severity': u'Critical', u'title': u' firefox security update', u'_ns': u'units_erratum', u'rights': u'Copyright 2011 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 6', u'reboot_suggested': False, u'type': u'security', u'pkglist': [{u'packages': [{u'src': None, u'name': u'firefox', u'sum': [u'md5', u'325f4ccb03a07829686387099658b921'], u'filename': u'firefox-3.6.24-3.0.1.el6_1.i686.rpm', u'epoch': u'0', u'version': u'3.6.24', u'release': u'3.0.1.el6_1', u'arch': u'i686'}, {u'src': None, u'name': u'firefox', u'sum': [u'md5', u'6f8d148ee6fa42b06e5ad74dafe3bcf5'], u'filename': u'firefox-3.6.24-3.0.1.el6_1.src.rpm', u'epoch': u'0', u'version': u'3.6.24', u'release': u'3.0.1.el6_1', u'arch': u'src'}, {u'src': None, u'name': u'firefox', u'sum': [u'md5', u'4cbda08f850efdae04c91f39fe9c2c35'], u'filename': u'firefox-3.6.24-3.0.1.el6_1.x86_64.rpm', u'epoch': u'0', u'version': u'3.6.24', u'release': u'3.0.1.el6_1', u'arch': u'x86_64'}, {u'src': None, u'name': u'xulrunner', u'sum': [u'md5', u'08904f92b18d207482913e793abc23d4'], u'filename': u'xulrunner-1.9.2.24-2.0.1.el6_1.1.i686.rpm', u'epoch': u'0', u'version': u'1.9.2.24', u'release': u'2.0.1.el6_1.1', u'arch': u'i686'}, {u'src': None, u'name': u'xulrunner', u'sum': [u'md5', u'3d253ef76f081adca163b5f351034554'], u'filename': u'xulrunner-1.9.2.24-2.0.1.el6_1.1.src.rpm', u'epoch': u'0', u'version': u'1.9.2.24', u'release': u'2.0.1.el6_1.1', u'arch': u'src'}, {u'src': None, u'name': u'xulrunner', u'sum': [u'md5', u'78432529f986364aa06940ed1f972ddc'], u'filename': u'xulrunner-1.9.2.24-2.0.1.el6_1.1.x86_64.rpm', u'epoch': u'0', u'version': u'1.9.2.24', u'release': u'2.0.1.el6_1.1', u'arch': u'x86_64'}, {u'src': None, u'name': u'xulrunner-devel', u'sum': [u'md5', u'ab7db959a5b54a1a7b6576edea82313d'], u'filename': u'xulrunner-devel-1.9.2.24-2.0.1.el6_1.1.i686.rpm', u'epoch': u'0', u'version': u'1.9.2.24', u'release': u'2.0.1.el6_1.1', u'arch': u'i686'}, {u'src': None, u'name': u'xulrunner-devel', u'sum': [u'md5', u'2e68870612f7e8bb84b3946a1c3353dc'], u'filename': u'xulrunner-devel-1.9.2.24-2.0.1.el6_1.1.x86_64.rpm', u'epoch': u'0', u'version': u'1.9.2.24', u'release': u'2.0.1.el6_1.1', u'arch': u'x86_64'}], u'name': u'ol6_x86_64_latest', u'short': u'ol6_x86_64_latest'}, {u'packages': [{u'src': None, u'name': u'firefox', u'sum': [u'md5', u'f5c96cd2dfc4b91c45fb1275a338a56b'], u'filename': u'firefox-3.6.24-3.0.1.el5_7.i386.rpm', u'epoch': u'0', u'version': u'3.6.24', u'release': u'3.0.1.el5_7', u'arch': u'i386'}, {u'src': None, u'name': u'firefox', u'sum': [u'md5', u'cc4d86f638d139a315089139a2362270'], u'filename': u'firefox-3.6.24-3.0.1.el5_7.src.rpm', u'epoch': u'0', u'version': u'3.6.24', u'release': u'3.0.1.el5_7', u'arch': u'src'}, {u'src': None, u'name': u'firefox', u'sum': [u'md5', u'9ac29b4500d55897072614ae0148b0f8'], u'filename': u'firefox-3.6.24-3.0.1.el5_7.x86_64.rpm', u'epoch': u'0', u'version': u'3.6.24', u'release': u'3.0.1.el5_7', u'arch': u'x86_64'}, {u'src': None, u'name': u'xulrunner', u'sum': [u'md5', u'facb9a53ee4a9e3d3bb753a04d67172a'], u'filename': u'xulrunner-1.9.2.24-2.0.1.el5_7.i386.rpm', u'epoch': u'0', u'version': u'1.9.2.24', u'release': u'2.0.1.el5_7', u'arch': u'i386'}, {u'src': None, u'name': u'xulrunner', u'sum': [u'md5', u'feb257f9f83e6e36c00774b7f8ba8cf4'], u'filename': u'xulrunner-1.9.2.24-2.0.1.el5_7.src.rpm', u'epoch': u'0', u'version': u'1.9.2.24', u'release': u'2.0.1.el5_7', u'arch': u'src'}, {u'src': None, u'name': u'xulrunner', u'sum': [u'md5', u'426e6ae8c411378efdc2b563249dde71'], u'filename': u'xulrunner-1.9.2.24-2.0.1.el5_7.x86_64.rpm', u'epoch': u'0', u'version': u'1.9.2.24', u'release': u'2.0.1.el5_7', u'arch': u'x86_64'}, {u'src': None, u'name': u'xulrunner-devel', u'sum': [u'md5', u'88a0f8d14da8c25610a4df876473a106'], u'filename': u'xulrunner-devel-1.9.2.24-2.0.1.el5_7.i386.rpm', u'epoch': u'0', u'version': u'1.9.2.24', u'release': u'2.0.1.el5_7', u'arch': u'i386'}, {u'src': None, u'name': u'xulrunner-devel', u'sum': [u'md5', u'9a626439e111af5d0e5e67d411d9dea4'], u'filename': u'xulrunner-devel-1.9.2.24-2.0.1.el5_7.x86_64.rpm', u'epoch': u'0', u'version': u'1.9.2.24', u'release': u'2.0.1.el5_7', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u'nspr:\n[4.8.7-2]\n- Update to 4.8.8\n\nnss:\n[3.12.10-2.0.1.el6_1]\n- Update clean.gif in the nss-3.12.10-stripped.tar.bz2 tarball\n\n[3.12.10-2]\n- Update builtins certs to those from NSSCKBI_1_88_RTM\n\n[3.12.10-1]\n- Update to 3.12.10\n\nnss-util:\n[3.12.10-1]\n- Update to 3.12.10', u'issued': u'2011-11-09', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELSA-2011-1444.html', u'type': u'self', u'id': None, u'title': u'ELSA-2011-1444'}], u'_content_type_id': u'erratum', u'_id': u'63628657-f13f-4ce4-9938-4fa3e3119263', u'from': u'el-errata@oss.oracle.com', u'severity': u'Important', u'title': u' nss security update', u'_ns': u'units_erratum', u'rights': u'Copyright 2011 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 6', u'reboot_suggested': False, u'type': u'security', u'pkglist': [{u'packages': [{u'src': None, u'name': u'nspr', u'sum': [u'md5', u'e1ee3ae8fac4833be66af6c04bff1473'], u'filename': u'nspr-4.8.8-1.el6_1.i686.rpm', u'epoch': u'0', u'version': u'4.8.8', u'release': u'1.el6_1', u'arch': u'i686'}, {u'src': None, u'name': u'nspr', u'sum': [u'md5', u'acf24b0323ceb8dae3544ad7fc312bf5'], u'filename': u'nspr-4.8.8-1.el6_1.src.rpm', u'epoch': u'0', u'version': u'4.8.8', u'release': u'1.el6_1', u'arch': u'src'}, {u'src': None, u'name': u'nspr', u'sum': [u'md5', u'eac72a7d960e066df69e7bf37bcf2394'], u'filename': u'nspr-4.8.8-1.el6_1.x86_64.rpm', u'epoch': u'0', u'version': u'4.8.8', u'release': u'1.el6_1', u'arch': u'x86_64'}, {u'src': None, u'name': u'nspr-devel', u'sum': [u'md5', u'b609067b0d570bef0b2f4b38dfdbf127'], u'filename': u'nspr-devel-4.8.8-1.el6_1.i686.rpm', u'epoch': u'0', u'version': u'4.8.8', u'release': u'1.el6_1', u'arch': u'i686'}, {u'src': None, u'name': u'nspr-devel', u'sum': [u'md5', u'8a3d4b356afb7bb6d0160904b9c58cfa'], u'filename': u'nspr-devel-4.8.8-1.el6_1.x86_64.rpm', u'epoch': u'0', u'version': u'4.8.8', u'release': u'1.el6_1', u'arch': u'x86_64'}, {u'src': None, u'name': u'nss', u'sum': [u'md5', u'9ec78557de0da78889be671d27f2a73b'], u'filename': u'nss-3.12.10-2.0.1.el6_1.i686.rpm', u'epoch': u'0', u'version': u'3.12.10', u'release': u'2.0.1.el6_1', u'arch': u'i686'}, {u'src': None, u'name': u'nss', u'sum': [u'md5', u'cb2e3c035ac814b3c5ffb029a4169436'], u'filename': u'nss-3.12.10-2.0.1.el6_1.src.rpm', u'epoch': u'0', u'version': u'3.12.10', u'release': u'2.0.1.el6_1', u'arch': u'src'}, {u'src': None, u'name': u'nss', u'sum': [u'md5', u'6031ae85d3a4018bf617181bb7ffd81d'], u'filename': u'nss-3.12.10-2.0.1.el6_1.x86_64.rpm', u'epoch': u'0', u'version': u'3.12.10', u'release': u'2.0.1.el6_1', u'arch': u'x86_64'}, {u'src': None, u'name': u'nss-devel', u'sum': [u'md5', u'00af15a38bb21848a7be8f22923b61a3'], u'filename': u'nss-devel-3.12.10-2.0.1.el6_1.i686.rpm', u'epoch': u'0', u'version': u'3.12.10', u'release': u'2.0.1.el6_1', u'arch': u'i686'}, {u'src': None, u'name': u'nss-devel', u'sum': [u'md5', u'c8b123808bd912ba1798c33cf474875b'], u'filename': u'nss-devel-3.12.10-2.0.1.el6_1.x86_64.rpm', u'epoch': u'0', u'version': u'3.12.10', u'release': u'2.0.1.el6_1', u'arch': u'x86_64'}, {u'src': None, u'name': u'nss-pkcs11-devel', u'sum': [u'md5', u'605e2fdfe82e69472317f6ac066cdbd7'], u'filename': u'nss-pkcs11-devel-3.12.10-2.0.1.el6_1.i686.rpm', u'epoch': u'0', u'version': u'3.12.10', u'release': u'2.0.1.el6_1', u'arch': u'i686'}, {u'src': None, u'name': u'nss-pkcs11-devel', u'sum': [u'md5', u'2c5f1c30757f64c4c1e78a3ee29f565f'], u'filename': u'nss-pkcs11-devel-3.12.10-2.0.1.el6_1.x86_64.rpm', u'epoch': u'0', u'version': u'3.12.10', u'release': u'2.0.1.el6_1', u'arch': u'x86_64'}, {u'src': None, u'name': u'nss-sysinit', u'sum': [u'md5', u'4ac508b3d67e8d94bb61cfaa311a4b76'], u'filename': u'nss-sysinit-3.12.10-2.0.1.el6_1.x86_64.rpm', u'epoch': u'0', u'version': u'3.12.10', u'release': u'2.0.1.el6_1', u'arch': u'x86_64'}, {u'src': None, u'name': u'nss-tools', u'sum': [u'md5', u'a9293b6447a25ada78cce997c22ae4eb'], u'filename': u'nss-tools-3.12.10-2.0.1.el6_1.x86_64.rpm', u'epoch': u'0', u'version': u'3.12.10', u'release': u'2.0.1.el6_1', u'arch': u'x86_64'}, {u'src': None, u'name': u'nss-util', u'sum': [u'md5', u'6a02ebb0ae1c83a9c3e59841ab69ae54'], u'filename': u'nss-util-3.12.10-1.el6_1.i686.rpm', u'epoch': u'0', u'version': u'3.12.10', u'release': u'1.el6_1', u'arch': u'i686'}, {u'src': None, u'name': u'nss-util', u'sum': [u'md5', u'18f99568599d6f246c17f1883c9265fb'], u'filename': u'nss-util-3.12.10-1.el6_1.src.rpm', u'epoch': u'0', u'version': u'3.12.10', u'release': u'1.el6_1', u'arch': u'src'}, {u'src': None, u'name': u'nss-util', u'sum': [u'md5', u'172bb59fab2fa3999a233e5a82d2779c'], u'filename': u'nss-util-3.12.10-1.el6_1.x86_64.rpm', u'epoch': u'0', u'version': u'3.12.10', u'release': u'1.el6_1', u'arch': u'x86_64'}, {u'src': None, u'name': u'nss-util-devel', u'sum': [u'md5', u'4d7858b52b8da5ab532698ca9f3f6e86'], u'filename': u'nss-util-devel-3.12.10-1.el6_1.i686.rpm', u'epoch': u'0', u'version': u'3.12.10', u'release': u'1.el6_1', u'arch': u'i686'}, {u'src': None, u'name': u'nss-util-devel', u'sum': [u'md5', u'5a0ab2b2a31964226c30f5b208c88b03'], u'filename': u'nss-util-devel-3.12.10-1.el6_1.x86_64.rpm', u'epoch': u'0', u'version': u'3.12.10', u'release': u'1.el6_1', u'arch': u'x86_64'}], u'name': u'ol6_x86_64_latest', u'short': u'ol6_x86_64_latest'}, {u'packages': [{u'src': None, u'name': u'nss', u'sum': [u'md5', u'6b4ab3d58e9a7455122b4873e11f3ef9'], u'filename': u'nss-3.12.10-7.0.1.el5_7.i386.rpm', u'epoch': u'0', u'version': u'3.12.10', u'release': u'7.0.1.el5_7', u'arch': u'i386'}, {u'src': None, u'name': u'nss', u'sum': [u'md5', u'fd558e5a69da566b0db1e37f0764ee38'], u'filename': u'nss-3.12.10-7.0.1.el5_7.src.rpm', u'epoch': u'0', u'version': u'3.12.10', u'release': u'7.0.1.el5_7', u'arch': u'src'}, {u'src': None, u'name': u'nss', u'sum': [u'md5', u'9736ec836a33cfef7a4f84bd1ab2cca6'], u'filename': u'nss-3.12.10-7.0.1.el5_7.x86_64.rpm', u'epoch': u'0', u'version': u'3.12.10', u'release': u'7.0.1.el5_7', u'arch': u'x86_64'}, {u'src': None, u'name': u'nss-devel', u'sum': [u'md5', u'90f260bb22c3ca9f47439ded456afeaf'], u'filename': u'nss-devel-3.12.10-7.0.1.el5_7.i386.rpm', u'epoch': u'0', u'version': u'3.12.10', u'release': u'7.0.1.el5_7', u'arch': u'i386'}, {u'src': None, u'name': u'nss-devel', u'sum': [u'md5', u'7d700efbc7f35ae474623b4fca658fc1'], u'filename': u'nss-devel-3.12.10-7.0.1.el5_7.x86_64.rpm', u'epoch': u'0', u'version': u'3.12.10', u'release': u'7.0.1.el5_7', u'arch': u'x86_64'}, {u'src': None, u'name': u'nss-pkcs11-devel', u'sum': [u'md5', u'8dfdcdc0dccc05170ec40b42a3052e2e'], u'filename': u'nss-pkcs11-devel-3.12.10-7.0.1.el5_7.i386.rpm', u'epoch': u'0', u'version': u'3.12.10', u'release': u'7.0.1.el5_7', u'arch': u'i386'}, {u'src': None, u'name': u'nss-pkcs11-devel', u'sum': [u'md5', u'65e2fb71f18a4f3a8bf422348ba611e6'], u'filename': u'nss-pkcs11-devel-3.12.10-7.0.1.el5_7.x86_64.rpm', u'epoch': u'0', u'version': u'3.12.10', u'release': u'7.0.1.el5_7', u'arch': u'x86_64'}, {u'src': None, u'name': u'nss-tools', u'sum': [u'md5', u'aa1096e62a742c5809d81fb1f0a1e7e5'], u'filename': u'nss-tools-3.12.10-7.0.1.el5_7.x86_64.rpm', u'epoch': u'0', u'version': u'3.12.10', u'release': u'7.0.1.el5_7', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u'[2.3.11-6.el6_1.8]\n- Add freetype-2.3.11-CVE-2011-3439.patch\n (Various loading fixes.)\n- Resolves: #754011', u'issued': u'2011-11-16', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELSA-2011-1455.html', u'type': u'self', u'id': None, u'title': u'ELSA-2011-1455'}, {u'href': u'http://linux.oracle.com/cve/CVE-2011-3439.html', u'type': u'cve', u'id': u'CVE-2011-3439', u'title': u'CVE-2011-3439'}], u'_content_type_id': u'erratum', u'_id': u'119b3e25-2dc3-4aa5-8e25-9b53d9c57549', u'from': u'el-errata@oss.oracle.com', u'severity': u'Important', u'title': u' freetype security update', u'_ns': u'units_erratum', u'rights': u'Copyright 2011 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 6', u'reboot_suggested': False, u'type': u'security', u'pkglist': [{u'packages': [{u'src': None, u'name': u'freetype', u'sum': [u'md5', u'd26997d4923caa8498956bbc3b2675f8'], u'filename': u'freetype-2.3.11-6.el6_1.8.i686.rpm', u'epoch': u'0', u'version': u'2.3.11', u'release': u'6.el6_1.8', u'arch': u'i686'}, {u'src': None, u'name': u'freetype', u'sum': [u'md5', u'0498db8cb8166341aae5b28e616b7ea2'], u'filename': u'freetype-2.3.11-6.el6_1.8.src.rpm', u'epoch': u'0', u'version': u'2.3.11', u'release': u'6.el6_1.8', u'arch': u'src'}, {u'src': None, u'name': u'freetype', u'sum': [u'md5', u'406bd00ce649182629c5b6833a694505'], u'filename': u'freetype-2.3.11-6.el6_1.8.x86_64.rpm', u'epoch': u'0', u'version': u'2.3.11', u'release': u'6.el6_1.8', u'arch': u'x86_64'}, {u'src': None, u'name': u'freetype-demos', u'sum': [u'md5', u'2e8dd2ff5d5f4605de312303df6e8605'], u'filename': u'freetype-demos-2.3.11-6.el6_1.8.x86_64.rpm', u'epoch': u'0', u'version': u'2.3.11', u'release': u'6.el6_1.8', u'arch': u'x86_64'}, {u'src': None, u'name': u'freetype-devel', u'sum': [u'md5', u'9c62e35678d32a1737a9b34afdc15204'], u'filename': u'freetype-devel-2.3.11-6.el6_1.8.i686.rpm', u'epoch': u'0', u'version': u'2.3.11', u'release': u'6.el6_1.8', u'arch': u'i686'}, {u'src': None, u'name': u'freetype-devel', u'sum': [u'md5', u'ebb0239afdbe3ded4f5ca1d507b63414'], u'filename': u'freetype-devel-2.3.11-6.el6_1.8.x86_64.rpm', u'epoch': u'0', u'version': u'2.3.11', u'release': u'6.el6_1.8', u'arch': u'x86_64'}], u'name': u'ol6_x86_64_latest', u'short': u'ol6_x86_64_latest'}, {u'packages': [{u'src': None, u'name': u'freetype', u'sum': [u'md5', u'36423e42f2d51257c0e7adc2a7dd6902'], u'filename': u'freetype-2.2.1-28.el5_7.2.i386.rpm', u'epoch': u'0', u'version': u'2.2.1', u'release': u'28.el5_7.2', u'arch': u'i386'}, {u'src': None, u'name': u'freetype', u'sum': [u'md5', u'6034f45f5526961c81736450772c1adc'], u'filename': u'freetype-2.2.1-28.el5_7.2.src.rpm', u'epoch': u'0', u'version': u'2.2.1', u'release': u'28.el5_7.2', u'arch': u'src'}, {u'src': None, u'name': u'freetype', u'sum': [u'md5', u'fee80d811134d50469dadd6236362cf2'], u'filename': u'freetype-2.2.1-28.el5_7.2.x86_64.rpm', u'epoch': u'0', u'version': u'2.2.1', u'release': u'28.el5_7.2', u'arch': u'x86_64'}, {u'src': None, u'name': u'freetype-demos', u'sum': [u'md5', u'59cfe7d4622b53d65b425c00d53ebcc3'], u'filename': u'freetype-demos-2.2.1-28.el5_7.2.x86_64.rpm', u'epoch': u'0', u'version': u'2.2.1', u'release': u'28.el5_7.2', u'arch': u'x86_64'}, {u'src': None, u'name': u'freetype-devel', u'sum': [u'md5', u'a209c51b12f2cbf28c47a01dfb5d55ac'], u'filename': u'freetype-devel-2.2.1-28.el5_7.2.i386.rpm', u'epoch': u'0', u'version': u'2.2.1', u'release': u'28.el5_7.2', u'arch': u'i386'}, {u'src': None, u'name': u'freetype-devel', u'sum': [u'md5', u'0ec50ee6b443ce1c2cd85af3091a740d'], u'filename': u'freetype-devel-2.2.1-28.el5_7.2.x86_64.rpm', u'epoch': u'0', u'version': u'2.2.1', u'release': u'28.el5_7.2', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u'[32:9.7.3-2.3.P3]\n- fix DOS against recursive servers (#754398)\n\n[32:9.7.3-2.2.P3]\n- update to 9.7.3-P3 (CVE-2011-2464)\n\n[32:9.7.3-2.1.P1]\n- update to 9.7.3-P1 (CVE-2011-1910)', u'issued': u'2011-11-17', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELSA-2011-1458.html', u'type': u'self', u'id': None, u'title': u'ELSA-2011-1458'}, {u'href': u'http://linux.oracle.com/cve/CVE-2011-4313.html', u'type': u'cve', u'id': u'CVE-2011-4313', u'title': u'CVE-2011-4313'}], u'_content_type_id': u'erratum', u'_id': u'9235b415-3a60-43b7-8b88-7fdb1b6c2cdb', u'from': u'el-errata@oss.oracle.com', u'severity': u'Important', u'title': u' bind security update', u'_ns': u'units_erratum', u'rights': u'Copyright 2011 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 6', u'reboot_suggested': False, u'type': u'security', u'pkglist': [{u'packages': [{u'src': None, u'name': u'bind', u'sum': [u'md5', u'c339d1fe51ab08dacc924d3f5bb0f69b'], u'filename': u'bind-9.7.3-2.el6_1.P3.3.src.rpm', u'epoch': u'32', u'version': u'9.7.3', u'release': u'2.el6_1.P3.3', u'arch': u'src'}, {u'src': None, u'name': u'bind', u'sum': [u'md5', u'291f0d80f7febb999058479e4726f4d5'], u'filename': u'bind-9.7.3-2.el6_1.P3.3.x86_64.rpm', u'epoch': u'32', u'version': u'9.7.3', u'release': u'2.el6_1.P3.3', u'arch': u'x86_64'}, {u'src': None, u'name': u'bind-chroot', u'sum': [u'md5', u'fabe3202f155b6a963ddd5ed36e820c4'], u'filename': u'bind-chroot-9.7.3-2.el6_1.P3.3.x86_64.rpm', u'epoch': u'32', u'version': u'9.7.3', u'release': u'2.el6_1.P3.3', u'arch': u'x86_64'}, {u'src': None, u'name': u'bind-devel', u'sum': [u'md5', u'6ef38df37b9a481d527a96699e10a633'], u'filename': u'bind-devel-9.7.3-2.el6_1.P3.3.i686.rpm', u'epoch': u'32', u'version': u'9.7.3', u'release': u'2.el6_1.P3.3', u'arch': u'i686'}, {u'src': None, u'name': u'bind-devel', u'sum': [u'md5', u'be066cdfd8722ee06efb1cde9209eaac'], u'filename': u'bind-devel-9.7.3-2.el6_1.P3.3.x86_64.rpm', u'epoch': u'32', u'version': u'9.7.3', u'release': u'2.el6_1.P3.3', u'arch': u'x86_64'}, {u'src': None, u'name': u'bind-libs', u'sum': [u'md5', u'15224706b0ea6e51f31860b6b14f012a'], u'filename': u'bind-libs-9.7.3-2.el6_1.P3.3.i686.rpm', u'epoch': u'32', u'version': u'9.7.3', u'release': u'2.el6_1.P3.3', u'arch': u'i686'}, {u'src': None, u'name': u'bind-libs', u'sum': [u'md5', u'4d4ed4fb77ce2cb62169a555b2d385c1'], u'filename': u'bind-libs-9.7.3-2.el6_1.P3.3.x86_64.rpm', u'epoch': u'32', u'version': u'9.7.3', u'release': u'2.el6_1.P3.3', u'arch': u'x86_64'}, {u'src': None, u'name': u'bind-sdb', u'sum': [u'md5', u'42dc40cb39e02a7760ed12e98656d50e'], u'filename': u'bind-sdb-9.7.3-2.el6_1.P3.3.x86_64.rpm', u'epoch': u'32', u'version': u'9.7.3', u'release': u'2.el6_1.P3.3', u'arch': u'x86_64'}, {u'src': None, u'name': u'bind-utils', u'sum': [u'md5', u'3f0b2e8bc71b460b1e6bf2bc05bff650'], u'filename': u'bind-utils-9.7.3-2.el6_1.P3.3.x86_64.rpm', u'epoch': u'32', u'version': u'9.7.3', u'release': u'2.el6_1.P3.3', u'arch': u'x86_64'}], u'name': u'ol6_x86_64_latest', u'short': u'ol6_x86_64_latest'}, {u'packages': [{u'src': None, u'name': u'bind', u'sum': [u'md5', u'3f8b3cf8976a703c8cb19672ce47cf02'], u'filename': u'bind-9.3.6-16.P1.el5_7.1.src.rpm', u'epoch': u'30', u'version': u'9.3.6', u'release': u'16.P1.el5_7.1', u'arch': u'src'}, {u'src': None, u'name': u'bind', u'sum': [u'md5', u'3a58b1967d5581749d4e652517366617'], u'filename': u'bind-9.3.6-16.P1.el5_7.1.x86_64.rpm', u'epoch': u'30', u'version': u'9.3.6', u'release': u'16.P1.el5_7.1', u'arch': u'x86_64'}, {u'src': None, u'name': u'bind-chroot', u'sum': [u'md5', u'668fb54b27bfe640dd46bf14f7b0b0e6'], u'filename': u'bind-chroot-9.3.6-16.P1.el5_7.1.x86_64.rpm', u'epoch': u'30', u'version': u'9.3.6', u'release': u'16.P1.el5_7.1', u'arch': u'x86_64'}, {u'src': None, u'name': u'bind-devel', u'sum': [u'md5', u'173d2488e7d16c2cb7aa68d816f50956'], u'filename': u'bind-devel-9.3.6-16.P1.el5_7.1.i386.rpm', u'epoch': u'30', u'version': u'9.3.6', u'release': u'16.P1.el5_7.1', u'arch': u'i386'}, {u'src': None, u'name': u'bind-devel', u'sum': [u'md5', u'6870f9954e95f235e4a7c21fafef309a'], u'filename': u'bind-devel-9.3.6-16.P1.el5_7.1.x86_64.rpm', u'epoch': u'30', u'version': u'9.3.6', u'release': u'16.P1.el5_7.1', u'arch': u'x86_64'}, {u'src': None, u'name': u'bind-libbind-devel', u'sum': [u'md5', u'7b3d5a41b41f69fb41582ea8dfd0c1ba'], u'filename': u'bind-libbind-devel-9.3.6-16.P1.el5_7.1.i386.rpm', u'epoch': u'30', u'version': u'9.3.6', u'release': u'16.P1.el5_7.1', u'arch': u'i386'}, {u'src': None, u'name': u'bind-libbind-devel', u'sum': [u'md5', u'a36ddf49e73c498901e08f1c28ab4bee'], u'filename': u'bind-libbind-devel-9.3.6-16.P1.el5_7.1.x86_64.rpm', u'epoch': u'30', u'version': u'9.3.6', u'release': u'16.P1.el5_7.1', u'arch': u'x86_64'}, {u'src': None, u'name': u'bind-libs', u'sum': [u'md5', u'2b909dd65b45966f6f19f4f38d2a9fa3'], u'filename': u'bind-libs-9.3.6-16.P1.el5_7.1.i386.rpm', u'epoch': u'30', u'version': u'9.3.6', u'release': u'16.P1.el5_7.1', u'arch': u'i386'}, {u'src': None, u'name': u'bind-libs', u'sum': [u'md5', u'e68c8726c58cb0ef168528feb8ae962a'], u'filename': u'bind-libs-9.3.6-16.P1.el5_7.1.x86_64.rpm', u'epoch': u'30', u'version': u'9.3.6', u'release': u'16.P1.el5_7.1', u'arch': u'x86_64'}, {u'src': None, u'name': u'bind-sdb', u'sum': [u'md5', u'acc826020e76f9872453dbaf3557e08c'], u'filename': u'bind-sdb-9.3.6-16.P1.el5_7.1.x86_64.rpm', u'epoch': u'30', u'version': u'9.3.6', u'release': u'16.P1.el5_7.1', u'arch': u'x86_64'}, {u'src': None, u'name': u'bind-utils', u'sum': [u'md5', u'e317b0a6f1cea5989596a45ea4244a4b'], u'filename': u'bind-utils-9.3.6-16.P1.el5_7.1.x86_64.rpm', u'epoch': u'30', u'version': u'9.3.6', u'release': u'16.P1.el5_7.1', u'arch': u'x86_64'}, {u'src': None, u'name': u'caching-nameserver', u'sum': [u'md5', u'c30d013dccbffcdf536701126e5331c6'], u'filename': u'caching-nameserver-9.3.6-16.P1.el5_7.1.x86_64.rpm', u'epoch': u'30', u'version': u'9.3.6', u'release': u'16.P1.el5_7.1', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u'[32:9.7.0-6.P2.4]\n- fix DOS against recursive servers (#754398)', u'issued': u'2011-11-17', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELSA-2011-1459.html', u'type': u'self', u'id': None, u'title': u'ELSA-2011-1459'}, {u'href': u'http://linux.oracle.com/cve/CVE-2011-4313.html', u'type': u'cve', u'id': u'CVE-2011-4313', u'title': u'CVE-2011-4313'}], u'_content_type_id': u'erratum', u'_id': u'43d7ce49-bd95-4ac6-8586-e6239b9046e1', u'from': u'el-errata@oss.oracle.com', u'severity': u'Important', u'title': u' bind97 security update', u'_ns': u'units_erratum', u'rights': u'Copyright 2011 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 5', u'reboot_suggested': False, u'type': u'security', u'pkglist': [{u'packages': [{u'src': None, u'name': u'bind97', u'sum': [u'md5', u'cc75ea52d062ebb571345b188b86343d'], u'filename': u'bind97-9.7.0-6.P2.el5_7.4.src.rpm', u'epoch': u'32', u'version': u'9.7.0', u'release': u'6.P2.el5_7.4', u'arch': u'src'}, {u'src': None, u'name': u'bind97', u'sum': [u'md5', u'5297ad9b7fd9a581d6ff45ac07dca8af'], u'filename': u'bind97-9.7.0-6.P2.el5_7.4.x86_64.rpm', u'epoch': u'32', u'version': u'9.7.0', u'release': u'6.P2.el5_7.4', u'arch': u'x86_64'}, {u'src': None, u'name': u'bind97-chroot', u'sum': [u'md5', u'2d44409c8551b365ebeb7cc616558e41'], u'filename': u'bind97-chroot-9.7.0-6.P2.el5_7.4.x86_64.rpm', u'epoch': u'32', u'version': u'9.7.0', u'release': u'6.P2.el5_7.4', u'arch': u'x86_64'}, {u'src': None, u'name': u'bind97-devel', u'sum': [u'md5', u'45f1fb60c8abd044d4c1a08280270323'], u'filename': u'bind97-devel-9.7.0-6.P2.el5_7.4.i386.rpm', u'epoch': u'32', u'version': u'9.7.0', u'release': u'6.P2.el5_7.4', u'arch': u'i386'}, {u'src': None, u'name': u'bind97-devel', u'sum': [u'md5', u'773900e25f2e80951999a023a16b9ccd'], u'filename': u'bind97-devel-9.7.0-6.P2.el5_7.4.x86_64.rpm', u'epoch': u'32', u'version': u'9.7.0', u'release': u'6.P2.el5_7.4', u'arch': u'x86_64'}, {u'src': None, u'name': u'bind97-libs', u'sum': [u'md5', u'50a5f472a60fbaa068b989712a9c869c'], u'filename': u'bind97-libs-9.7.0-6.P2.el5_7.4.i386.rpm', u'epoch': u'32', u'version': u'9.7.0', u'release': u'6.P2.el5_7.4', u'arch': u'i386'}, {u'src': None, u'name': u'bind97-libs', u'sum': [u'md5', u'a676ef6275e747f1a8d2dbbb8889579f'], u'filename': u'bind97-libs-9.7.0-6.P2.el5_7.4.x86_64.rpm', u'epoch': u'32', u'version': u'9.7.0', u'release': u'6.P2.el5_7.4', u'arch': u'x86_64'}, {u'src': None, u'name': u'bind97-utils', u'sum': [u'md5', u'9106bcac8a04d60cad197721ffdd41e5'], u'filename': u'bind97-utils-9.7.0-6.P2.el5_7.4.x86_64.rpm', u'epoch': u'32', u'version': u'9.7.0', u'release': u'6.P2.el5_7.4', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u"kernel\n[2.6.18-274.12.1.0.1.el5]\n- fix ia64 build error due to add-support-above-32-vcpus.patch(Zhenzhong Duan)\n- [x86] use dynamic vcpu_info remap to support more than 32 vcpus (Zhenzhong Duan)\n- [scsi] add additional scsi medium error handling (John Sobecki) [orabug 12904887]\n- [x86] Fix lvt0 reset when hvm boot up with noapic param\n- [scsi] remove printk's when doing I/O to a dead device (John Sobecki, Chris Mason)\n [orabug 12342275]\n- [char] ipmi: Fix IPMI errors due to timing problems (Joe Jin) [orabug 12561346]\n- [scsi] Fix race when removing SCSI devices (Joe Jin) [orabug 12404566]\n- bonding: reread information about speed and duplex when interface goes up (John Haxby) [orabug 11890822]\n- [fs] nfs: Fix __put_nfs_open_context() NULL pointer panic (Joe Jin) [orabug 12687646]\n- [scsi] fix scsi hotplug and rescan race [orabug 10260172]\n- fix filp_close() race (Joe Jin) [orabug 10335998]\n- make xenkbd.abs_pointer=1 by default [orabug 67188919]\n- [xen] check to see if hypervisor supports memory reservation change\n (Chuck Anderson) [orabug 7556514]\n- [net] Enable entropy for bnx2,bnx2x,e1000e,igb,ixgb,ixgbe,ixgbevf (John Sobecki)\n [orabug 10315433]\n- [NET] Add xen pv netconsole support (Tina Yang) [orabug 6993043] [bz 7258]\n- [mm] shrink_zone patch (John Sobecki,Chris Mason) [orabug 6086839]\n- fix aacraid not to reset during kexec (Joe Jin) [orabug 8516042]\n- [rds] Patch rds to 1.4.2-20 (Andy Grover) [orabug 9471572, 9344105]\n RDS: Fix BUG_ONs to not fire when in a tasklet\n ipoib: Fix lockup of the tx queue\n RDS: Do not call set_page_dirty() with irqs off (Sherman Pun)\n RDS: Properly unmap when getting a remote access error (Tina Yang)\n RDS: Fix locking in rds_send_drop_to()\n- [xen] PVHVM guest with PoD crashes under memory pressure (Chuck Anderson)\n [orabug 9107465]\n- [xen] PV guest with FC HBA hangs during shutdown (Chuck Anderson)\n [orabug 9764220]\n- Support 256GB+ memory for pv guest (Mukesh Rathor) [orabug 9450615]\n- fix overcommit memory to use percpu_counter for el5 (KOSAKI Motohiro,\n Guru Anbalagane) [orabug 6124033]\n- [ipmi] make configurable timeouts for kcs of ipmi [orabug 9752208]\n- [ib] fix memory corruption (Andy Grover) [orabug 9972346]\n- [aio] patch removes limit on number of retries (Srinivas Eeda) [orabug 10044782]\n- [loop] Do not call loop_unplug for not configured loop device (orabug 10314497)\n\n[2.6.18-274.12.1.el5]\n- Revert: [virt] kvm: fix lost tick accounting for 32 bit kvm-clock (Rik van Riel) [747875 731599]\n\n[2.6.18-274.11.1.el5]\n- [fs] gfs2: speed up large file delete/unlink (Robert S Peterson) [743806 738440]\n- [fs] cifs: fix wrong buffer length returned by SendReceive (Sachin Prabhu) [750842 720363]\n- [virt] kvm: fix lost tick accounting for 32 bit kvm-clock (Rik van Riel) [747875 731599]\n- [virt] xen/netback: disable features not supported by netfront (Paolo Bonzini) [746600 746225]\n- [fs] nfs: don't redirty inodes with no outstanding commits (Jeff Layton) [750477 739665]\n- [net] tg3: call netif_carrier_off to initialize operstate value (John Feeney) [744700 635982]\n- [xen] make test_assign_device domctl dependent on intremap hw (Laszlo Ersek) [745726 740203]\n- [xen] Propagate target dom within XEN_DOMCTL_test_assign_device (Laszlo Ersek) [745726 740203]\n- [net] sctp: encode PROTOCOL VIOLATION error cause correctly (Thomas Graf) [750457 636828]\n- [fs] cifs: always do is_path_accessible check in cifs_mount (Jeff Layton) [738299 738300] {CVE-2011-3363}\n- [fs] cifs: add fallback in is_path_accessible for old servers (Jeff Layton) [738299 738300] {CVE-2011-3363}\n- [char] tpm: Zero buffer after copying to userspace (Jiri Benc) [732630 732631] {CVE-2011-1162}\n- [fs] hfs: fix hfs_find_init() sb->ext_tree NULL ptr oops (Phillip Lougher) [712775 712776] {CVE-2011-2203}\n- [net] sctp: Set correct error cause value for missing parameters (Thomas Graf) [750451 629938]\n- [misc] kernel: plug taskstats io infoleak (Jerome Marchand) [716845 716846] {CVE-2011-2494}\n- [usb] Make device reset stop retrying after disconnect (Don Zickus) [750841 709699]\n- [net] ipv6: properly use ICMP6MSGOUT_INC_STATS in ndisc_send_skb (Jiri Pirko) [743611 698728]\n- [scsi] Reduce error recovery time by reducing use of TURs (Mike Christie) [741273 694625]\n- [mm] s390: fix first time swap use results in heavy swapping (Hendrik Brueckner) [747876 722482]\n- [virt] xen: fix GFP mask handling in dma_alloc_coherent (Laszlo Ersek) [742282 730247]\n- [s390] kernel: fix system hang if hangcheck timer expires (Hendrik Brueckner) [747872 730313]\n- [usb] fix interface sysfs file-creation bug (Don Zickus) [750848 637930]\n- [usb] don't touch sysfs stuff when altsetting is unchanged (Don Zickus) [750848 637930]\n- [base] Fix potential deadlock in driver core (Don Zickus) [750848 637930]\n- [security] keys: Fix NULL deref in user-defined key type (David Howells) [751300 751301]\n- [xen] passthrough: block VT-d MSI trap injection (Paolo Bonzini) [716301 716302] {CVE-2011-1898}\n\n[2.6.18-274.10.1.el5]\n- [net] be2net: enable NETIF_F_LLTX and add own locking of Tx path (Ivan Vecera) [750912 731806]\n- [net] be2net: fix multicast filter programming (Ivan Vecera) [750912 731806]\n- [net] be2net: fix cmd-rx-filter not notifying MCC (Ivan Vecera) [750912 731806]\n- [net] be2net: use RX_FILTER cmd to program multicast addresses (Ivan Vecera) [750912 731806]\n\n[2.6.18-274.9.1.el5]\n- [fs] nfs: re-add call to filemap_fdatawrite (David Jeffery) [750508 748999]\n\n[2.6.18-274.8.1.el5]\n- [fs] nfs: Don't call iput holding nfs_access_cache_shrinker lock (Steve Dickson) [749459 585935]", u'issued': u'2011-11-29', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELSA-2011-1479.html', u'type': u'self', u'id': None, u'title': u'ELSA-2011-1479'}, {u'href': u'http://linux.oracle.com/cve/CVE-2011-1162.html', u'type': u'cve', u'id': u'CVE-2011-1162', u'title': u'CVE-2011-1162'}, {u'href': u'http://linux.oracle.com/cve/CVE-2011-1898.html', u'type': u'cve', u'id': u'CVE-2011-1898', u'title': u'CVE-2011-1898'}, {u'href': u'http://linux.oracle.com/cve/CVE-2011-2203.html', u'type': u'cve', u'id': u'CVE-2011-2203', u'title': u'CVE-2011-2203'}, {u'href': u'http://linux.oracle.com/cve/CVE-2011-2494.html', u'type': u'cve', u'id': u'CVE-2011-2494', u'title': u'CVE-2011-2494'}, {u'href': u'http://linux.oracle.com/cve/CVE-2011-3363.html', u'type': u'cve', u'id': u'CVE-2011-3363', u'title': u'CVE-2011-3363'}, {u'href': u'http://linux.oracle.com/cve/CVE-2011-4110.html', u'type': u'cve', u'id': u'CVE-2011-4110', u'title': u'CVE-2011-4110'}], u'_content_type_id': u'erratum', u'_id': u'44e68857-ad3a-41c2-bd73-43cb52cf5193', u'from': u'el-errata@oss.oracle.com', u'severity': u'Important', u'title': u' kernel security, bug fix, and enhancement update', u'_ns': u'units_erratum', u'rights': u'Copyright 2011 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 5', u'reboot_suggested': False, u'type': u'security', u'pkglist': [{u'packages': [{u'src': None, u'name': u'kernel', u'sum': [u'md5', u'f259cd7cd4427e8eed5572eb670e06a2'], u'filename': u'kernel-2.6.18-274.12.1.0.1.el5.src.rpm', u'epoch': u'0', u'version': u'2.6.18', u'release': u'274.12.1.0.1.el5', u'arch': u'src'}, {u'src': None, u'name': u'kernel', u'sum': [u'md5', u'289e5a896311822e7d35c355f7ffd5c3'], u'filename': u'kernel-2.6.18-274.12.1.0.1.el5.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.18', u'release': u'274.12.1.0.1.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'kernel-debug', u'sum': [u'md5', u'68258aea9922cacde3ef0b4b429aeb55'], u'filename': u'kernel-debug-2.6.18-274.12.1.0.1.el5.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.18', u'release': u'274.12.1.0.1.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'kernel-debug-devel', u'sum': [u'md5', u'8f6795ac13f1dc5036609cd15a4dc84e'], u'filename': u'kernel-debug-devel-2.6.18-274.12.1.0.1.el5.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.18', u'release': u'274.12.1.0.1.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'kernel-devel', u'sum': [u'md5', u'd1d4ba53f88b842a2471ddf1277d50d2'], u'filename': u'kernel-devel-2.6.18-274.12.1.0.1.el5.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.18', u'release': u'274.12.1.0.1.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'kernel-doc', u'sum': [u'md5', u'e8840a73535a54a078c5a4af0b5d7f13'], u'filename': u'kernel-doc-2.6.18-274.12.1.0.1.el5.noarch.rpm', u'epoch': u'0', u'version': u'2.6.18', u'release': u'274.12.1.0.1.el5', u'arch': u'noarch'}, {u'src': None, u'name': u'kernel-headers', u'sum': [u'md5', u'ed5e3be6c2888fc1c9d695ad0e31f10c'], u'filename': u'kernel-headers-2.6.18-274.12.1.0.1.el5.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.18', u'release': u'274.12.1.0.1.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'kernel-xen', u'sum': [u'md5', u'abf3959f7ba129e5e04fc63b3396aa97'], u'filename': u'kernel-xen-2.6.18-274.12.1.0.1.el5.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.18', u'release': u'274.12.1.0.1.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'kernel-xen-devel', u'sum': [u'md5', u'8bb3f4f6b9a9a41116e7b549ad1f7313'], u'filename': u'kernel-xen-devel-2.6.18-274.12.1.0.1.el5.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.18', u'release': u'274.12.1.0.1.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'ocfs2-2.6.18-274.12.1.0.1.el5', u'sum': [u'md5', u'bdeac7aa56e429adaf1603b0ac4b7b1e'], u'filename': u'ocfs2-2.6.18-274.12.1.0.1.el5-1.4.9-1.el5.src.rpm', u'epoch': u'0', u'version': u'1.4.9', u'release': u'1.el5', u'arch': u'src'}, {u'src': None, u'name': u'ocfs2-2.6.18-274.12.1.0.1.el5', u'sum': [u'md5', u'48b0859e82616f637298d4db773e3f62'], u'filename': u'ocfs2-2.6.18-274.12.1.0.1.el5-1.4.9-1.el5.x86_64.rpm', u'epoch': u'0', u'version': u'1.4.9', u'release': u'1.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'ocfs2-2.6.18-274.12.1.0.1.el5debug', u'sum': [u'md5', u'1c0ff05e8eaf3f684194962824847823'], u'filename': u'ocfs2-2.6.18-274.12.1.0.1.el5debug-1.4.9-1.el5.x86_64.rpm', u'epoch': u'0', u'version': u'1.4.9', u'release': u'1.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'ocfs2-2.6.18-274.12.1.0.1.el5xen', u'sum': [u'md5', u'06cedb7af95a58d0cda5e12405ee4390'], u'filename': u'ocfs2-2.6.18-274.12.1.0.1.el5xen-1.4.9-1.el5.x86_64.rpm', u'epoch': u'0', u'version': u'1.4.9', u'release': u'1.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'oracleasm-2.6.18-274.12.1.0.1.el5', u'sum': [u'md5', u'6198b97f6fcdcb64562332b557b6b0b8'], u'filename': u'oracleasm-2.6.18-274.12.1.0.1.el5-2.0.5-1.el5.src.rpm', u'epoch': u'0', u'version': u'2.0.5', u'release': u'1.el5', u'arch': u'src'}, {u'src': None, u'name': u'oracleasm-2.6.18-274.12.1.0.1.el5', u'sum': [u'md5', u'db32e682074857b7e5602a56ecb87148'], u'filename': u'oracleasm-2.6.18-274.12.1.0.1.el5-2.0.5-1.el5.x86_64.rpm', u'epoch': u'0', u'version': u'2.0.5', u'release': u'1.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'oracleasm-2.6.18-274.12.1.0.1.el5debug', u'sum': [u'md5', u'466d861fce76e28b6f5039a205cb25a2'], u'filename': u'oracleasm-2.6.18-274.12.1.0.1.el5debug-2.0.5-1.el5.x86_64.rpm', u'epoch': u'0', u'version': u'2.0.5', u'release': u'1.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'oracleasm-2.6.18-274.12.1.0.1.el5xen', u'sum': [u'md5', u'c5854940546d16853486a8c64a135181'], u'filename': u'oracleasm-2.6.18-274.12.1.0.1.el5xen-2.0.5-1.el5.x86_64.rpm', u'epoch': u'0', u'version': u'2.0.5', u'release': u'1.el5', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u'[2.3.16-6.4]\n- fix CVE-2011-3481: NULL pointer dereference via crafted \n References header in email (#738391)\n- fix CVE-2011-3372: nntpd authentication bypass (#740822)', u'issued': u'2011-12-01', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELSA-2011-1508.html', u'type': u'self', u'id': None, u'title': u'ELSA-2011-1508'}, {u'href': u'http://linux.oracle.com/cve/CVE-2011-3372.html', u'type': u'cve', u'id': u'CVE-2011-3372', u'title': u'CVE-2011-3372'}, {u'href': u'http://linux.oracle.com/cve/CVE-2011-3481.html', u'type': u'cve', u'id': u'CVE-2011-3481', u'title': u'CVE-2011-3481'}], u'_content_type_id': u'erratum', u'_id': u'4e5ded46-ff21-4a15-adce-44f11ff6ec5e', u'from': u'el-errata@oss.oracle.com', u'severity': u'Moderate', u'title': u' cyrus-imapd security update', u'_ns': u'units_erratum', u'rights': u'Copyright 2011 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 6', u'reboot_suggested': False, u'type': u'security', u'pkglist': [{u'packages': [{u'src': None, u'name': u'cyrus-imapd', u'sum': [u'md5', u'e768c66f1bf5a6f5319042c763907219'], u'filename': u'cyrus-imapd-2.3.16-6.el6_1.4.src.rpm', u'epoch': u'0', u'version': u'2.3.16', u'release': u'6.el6_1.4', u'arch': u'src'}, {u'src': None, u'name': u'cyrus-imapd', u'sum': [u'md5', u'8a0b02c371d8969df6c25728841b9f75'], u'filename': u'cyrus-imapd-2.3.16-6.el6_1.4.x86_64.rpm', u'epoch': u'0', u'version': u'2.3.16', u'release': u'6.el6_1.4', u'arch': u'x86_64'}, {u'src': None, u'name': u'cyrus-imapd-devel', u'sum': [u'md5', u'772ea4bc3a2a96d7ae7c9fb441abc09e'], u'filename': u'cyrus-imapd-devel-2.3.16-6.el6_1.4.i686.rpm', u'epoch': u'0', u'version': u'2.3.16', u'release': u'6.el6_1.4', u'arch': u'i686'}, {u'src': None, u'name': u'cyrus-imapd-devel', u'sum': [u'md5', u'd076bb138cd2de433b99d04b55d3969b'], u'filename': u'cyrus-imapd-devel-2.3.16-6.el6_1.4.x86_64.rpm', u'epoch': u'0', u'version': u'2.3.16', u'release': u'6.el6_1.4', u'arch': u'x86_64'}, {u'src': None, u'name': u'cyrus-imapd-utils', u'sum': [u'md5', u'98b21f834da6f7a584fbc535262f734b'], u'filename': u'cyrus-imapd-utils-2.3.16-6.el6_1.4.x86_64.rpm', u'epoch': u'0', u'version': u'2.3.16', u'release': u'6.el6_1.4', u'arch': u'x86_64'}], u'name': u'ol6_x86_64_latest', u'short': u'ol6_x86_64_latest'}, {u'packages': [{u'src': None, u'name': u'cyrus-imapd', u'sum': [u'md5', u'bb83b277a91b5b9b249aa9921a26b140'], u'filename': u'cyrus-imapd-2.3.7-12.0.1.el5_7.2.src.rpm', u'epoch': u'0', u'version': u'2.3.7', u'release': u'12.0.1.el5_7.2', u'arch': u'src'}, {u'src': None, u'name': u'cyrus-imapd', u'sum': [u'md5', u'25f1967047cdf99480a87aa40d75bad9'], u'filename': u'cyrus-imapd-2.3.7-12.0.1.el5_7.2.x86_64.rpm', u'epoch': u'0', u'version': u'2.3.7', u'release': u'12.0.1.el5_7.2', u'arch': u'x86_64'}, {u'src': None, u'name': u'cyrus-imapd-devel', u'sum': [u'md5', u'af24d22e11996588f6d8c87b9d334779'], u'filename': u'cyrus-imapd-devel-2.3.7-12.0.1.el5_7.2.i386.rpm', u'epoch': u'0', u'version': u'2.3.7', u'release': u'12.0.1.el5_7.2', u'arch': u'i386'}, {u'src': None, u'name': u'cyrus-imapd-devel', u'sum': [u'md5', u'33263fa967fe7bfbc0625096630582af'], u'filename': u'cyrus-imapd-devel-2.3.7-12.0.1.el5_7.2.x86_64.rpm', u'epoch': u'0', u'version': u'2.3.7', u'release': u'12.0.1.el5_7.2', u'arch': u'x86_64'}, {u'src': None, u'name': u'cyrus-imapd-perl', u'sum': [u'md5', u'b785291581db5d3c05ca0ddc272341ae'], u'filename': u'cyrus-imapd-perl-2.3.7-12.0.1.el5_7.2.x86_64.rpm', u'epoch': u'0', u'version': u'2.3.7', u'release': u'12.0.1.el5_7.2', u'arch': u'x86_64'}, {u'src': None, u'name': u'cyrus-imapd-utils', u'sum': [u'md5', u'9920b191aca56f4ae1fa0ee9b95328e3'], u'filename': u'cyrus-imapd-utils-2.3.7-12.0.1.el5_7.2.x86_64.rpm', u'epoch': u'0', u'version': u'2.3.7', u'release': u'12.0.1.el5_7.2', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u'[4:5.8.8-32.0.1.el5_7.6]\n- Up release number and rebuild\n\n[4:5.8.8-32.el5.6]\n- CVE-2010-2761 CVE-2010-4410 perl: CGI module multiple issues fixed by security\n patch based on commit from version 3.50\n- Related: rhbz#743626\n\n[4:5.8.8-32.el5.5]\n- CVE-2010-2761 CVE-2010-4410 perl: CGI module multiple issues fixed by update\n of CGI module to 3.54\n- Resolves: rhbz#743626\n\n[4:5.8.8-32.el5.4]\n- 743010 - perl: code injection vulnerability in Digest->new()\n- Resolves: rhbz#743094', u'issued': u'2011-12-08', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELSA-2011-1797.html', u'type': u'self', u'id': None, u'title': u'ELSA-2011-1797'}, {u'href': u'http://linux.oracle.com/cve/CVE-2010-2761.html', u'type': u'cve', u'id': u'CVE-2010-2761', u'title': u'CVE-2010-2761'}, {u'href': u'http://linux.oracle.com/cve/CVE-2010-4410.html', u'type': u'cve', u'id': u'CVE-2010-4410', u'title': u'CVE-2010-4410'}, {u'href': u'http://linux.oracle.com/cve/CVE-2011-3597.html', u'type': u'cve', u'id': u'CVE-2011-3597', u'title': u'CVE-2011-3597'}], u'_content_type_id': u'erratum', u'_id': u'87b4d89c-bc63-405e-a458-f3e144307506', u'from': u'el-errata@oss.oracle.com', u'severity': u'Moderate', u'title': u' perl security update', u'_ns': u'units_erratum', u'rights': u'Copyright 2011 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 5', u'reboot_suggested': False, u'type': u'security', u'pkglist': [{u'packages': [{u'src': None, u'name': u'perl', u'sum': [u'md5', u'33c4508581e0639aad76938f356eed9f'], u'filename': u'perl-5.8.8-32.0.1.el5_7.6.src.rpm', u'epoch': u'4', u'version': u'5.8.8', u'release': u'32.0.1.el5_7.6', u'arch': u'src'}, {u'src': None, u'name': u'perl', u'sum': [u'md5', u'497d8a2a07ff35a45af2696eeff5f485'], u'filename': u'perl-5.8.8-32.0.1.el5_7.6.x86_64.rpm', u'epoch': u'4', u'version': u'5.8.8', u'release': u'32.0.1.el5_7.6', u'arch': u'x86_64'}, {u'src': None, u'name': u'perl-suidperl', u'sum': [u'md5', u'cba69e5662c082c7c4491e091df75ca4'], u'filename': u'perl-suidperl-5.8.8-32.0.1.el5_7.6.x86_64.rpm', u'epoch': u'4', u'version': u'5.8.8', u'release': u'32.0.1.el5_7.6', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u'[10.35.58-8.el5.3]\n- Actually apply the patch for - CVE-2009-4274 #760849\n\n[10.35.58-8.el5.2]\n- fix xpmtoppm overfow - CVE-2009-4274 (#760849)\n\n[10.35.58-8.el5.1]\n- fix libjasper heap buffer overflow CVE-2011-4516 CVE-2011-4517 (#760849)', u'issued': u'2011-12-12', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELSA-2011-1811.html', u'type': u'self', u'id': None, u'title': u'ELSA-2011-1811'}, {u'href': u'http://linux.oracle.com/cve/CVE-2009-4274.html', u'type': u'cve', u'id': u'CVE-2009-4274', u'title': u'CVE-2009-4274'}, {u'href': u'http://linux.oracle.com/cve/CVE-2011-4516.html', u'type': u'cve', u'id': u'CVE-2011-4516', u'title': u'CVE-2011-4516'}, {u'href': u'http://linux.oracle.com/cve/CVE-2011-4517.html', u'type': u'cve', u'id': u'CVE-2011-4517', u'title': u'CVE-2011-4517'}], u'_content_type_id': u'erratum', u'_id': u'4aa8bef5-5a67-4707-a257-cdd687e67352', u'from': u'el-errata@oss.oracle.com', u'severity': u'Important', u'title': u' netpbm security update', u'_ns': u'units_erratum', u'rights': u'Copyright 2011 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 5', u'reboot_suggested': False, u'type': u'security', u'pkglist': [{u'packages': [{u'src': None, u'name': u'netpbm', u'sum': [u'md5', u'217fe9a8950fdd920d69e2a96841640b'], u'filename': u'netpbm-10.35.58-8.el5_7.3.i386.rpm', u'epoch': u'0', u'version': u'10.35.58', u'release': u'8.el5_7.3', u'arch': u'i386'}, {u'src': None, u'name': u'netpbm', u'sum': [u'md5', u'640d63321a6ac259c0e18ecaae929f90'], u'filename': u'netpbm-10.35.58-8.el5_7.3.src.rpm', u'epoch': u'0', u'version': u'10.35.58', u'release': u'8.el5_7.3', u'arch': u'src'}, {u'src': None, u'name': u'netpbm', u'sum': [u'md5', u'267b8fbd01028c393eb645a8840a36bd'], u'filename': u'netpbm-10.35.58-8.el5_7.3.x86_64.rpm', u'epoch': u'0', u'version': u'10.35.58', u'release': u'8.el5_7.3', u'arch': u'x86_64'}, {u'src': None, u'name': u'netpbm-devel', u'sum': [u'md5', u'8452eda2caab9e6c7f782fdf05d4ef6e'], u'filename': u'netpbm-devel-10.35.58-8.el5_7.3.i386.rpm', u'epoch': u'0', u'version': u'10.35.58', u'release': u'8.el5_7.3', u'arch': u'i386'}, {u'src': None, u'name': u'netpbm-devel', u'sum': [u'md5', u'f1fae5001672d79638cb7e845b7aad93'], u'filename': u'netpbm-devel-10.35.58-8.el5_7.3.x86_64.rpm', u'epoch': u'0', u'version': u'10.35.58', u'release': u'8.el5_7.3', u'arch': u'x86_64'}, {u'src': None, u'name': u'netpbm-progs', u'sum': [u'md5', u'83d41b469e0583c37a6d4fa0d0dcc7b0'], u'filename': u'netpbm-progs-10.35.58-8.el5_7.3.x86_64.rpm', u'epoch': u'0', u'version': u'10.35.58', u'release': u'8.el5_7.3', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u'[4.2.1-9.1]\n- Resolves: rhbz#766539 CVE-2011-4599 localeID overflow', u'issued': u'2011-12-13', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELSA-2011-1815.html', u'type': u'self', u'id': None, u'title': u'ELSA-2011-1815'}, {u'href': u'http://linux.oracle.com/cve/CVE-2011-4599.html', u'type': u'cve', u'id': u'CVE-2011-4599', u'title': u'CVE-2011-4599'}], u'_content_type_id': u'erratum', u'_id': u'20c1223d-fde3-4994-8084-cddc78dc323a', u'from': u'el-errata@oss.oracle.com', u'severity': u'Moderate', u'title': u' icu security update', u'_ns': u'units_erratum', u'rights': u'Copyright 2011 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 6', u'reboot_suggested': False, u'type': u'security', u'pkglist': [{u'packages': [{u'src': None, u'name': u'icu', u'sum': [u'md5', u'04708e9d42572ccbf90b36bb347d96af'], u'filename': u'icu-4.2.1-9.1.el6_2.src.rpm', u'epoch': u'0', u'version': u'4.2.1', u'release': u'9.1.el6_2', u'arch': u'src'}, {u'src': None, u'name': u'icu', u'sum': [u'md5', u'd7df4afb17c36c7394fb280d43466558'], u'filename': u'icu-4.2.1-9.1.el6_2.x86_64.rpm', u'epoch': u'0', u'version': u'4.2.1', u'release': u'9.1.el6_2', u'arch': u'x86_64'}, {u'src': None, u'name': u'libicu', u'sum': [u'md5', u'95861cdd4333d54ccd29b893281b9faf'], u'filename': u'libicu-4.2.1-9.1.el6_2.i686.rpm', u'epoch': u'0', u'version': u'4.2.1', u'release': u'9.1.el6_2', u'arch': u'i686'}, {u'src': None, u'name': u'libicu', u'sum': [u'md5', u'69af4fe836ea13d01076c361c71eb048'], u'filename': u'libicu-4.2.1-9.1.el6_2.x86_64.rpm', u'epoch': u'0', u'version': u'4.2.1', u'release': u'9.1.el6_2', u'arch': u'x86_64'}, {u'src': None, u'name': u'libicu-devel', u'sum': [u'md5', u'1c0dc384905e3f36e2af1e95ff0049c2'], u'filename': u'libicu-devel-4.2.1-9.1.el6_2.i686.rpm', u'epoch': u'0', u'version': u'4.2.1', u'release': u'9.1.el6_2', u'arch': u'i686'}, {u'src': None, u'name': u'libicu-devel', u'sum': [u'md5', u'462ab313ef89b164b754673068d9fe3f'], u'filename': u'libicu-devel-4.2.1-9.1.el6_2.x86_64.rpm', u'epoch': u'0', u'version': u'4.2.1', u'release': u'9.1.el6_2', u'arch': u'x86_64'}, {u'src': None, u'name': u'libicu-doc', u'sum': [u'md5', u'8a813045e259013926da147d4cadd526'], u'filename': u'libicu-doc-4.2.1-9.1.el6_2.noarch.rpm', u'epoch': u'0', u'version': u'4.2.1', u'release': u'9.1.el6_2', u'arch': u'noarch'}], u'name': u'ol6_x86_64_latest', u'short': u'ol6_x86_64_latest'}, {u'packages': [{u'src': None, u'name': u'icu', u'sum': [u'md5', u'aaaac611bd55d5636cbc5cca5542f541'], u'filename': u'icu-3.6-5.16.1.src.rpm', u'epoch': u'0', u'version': u'3.6', u'release': u'5.16.1', u'arch': u'src'}, {u'src': None, u'name': u'icu', u'sum': [u'md5', u'b07c3e77172cc31524433f21233103c3'], u'filename': u'icu-3.6-5.16.1.x86_64.rpm', u'epoch': u'0', u'version': u'3.6', u'release': u'5.16.1', u'arch': u'x86_64'}, {u'src': None, u'name': u'libicu', u'sum': [u'md5', u'ddae1fbe0e90d0615f8f728a45f2f8d2'], u'filename': u'libicu-3.6-5.16.1.i386.rpm', u'epoch': u'0', u'version': u'3.6', u'release': u'5.16.1', u'arch': u'i386'}, {u'src': None, u'name': u'libicu', u'sum': [u'md5', u'a42e6692640765a82c4a93ff3316d144'], u'filename': u'libicu-3.6-5.16.1.x86_64.rpm', u'epoch': u'0', u'version': u'3.6', u'release': u'5.16.1', u'arch': u'x86_64'}, {u'src': None, u'name': u'libicu-devel', u'sum': [u'md5', u'ccfbd811b3ce5a151ff157b30bc36cdc'], u'filename': u'libicu-devel-3.6-5.16.1.i386.rpm', u'epoch': u'0', u'version': u'3.6', u'release': u'5.16.1', u'arch': u'i386'}, {u'src': None, u'name': u'libicu-devel', u'sum': [u'md5', u'be70c74838fa0cf4dc004d0497fb90bb'], u'filename': u'libicu-devel-3.6-5.16.1.x86_64.rpm', u'epoch': u'0', u'version': u'3.6', u'release': u'5.16.1', u'arch': u'x86_64'}, {u'src': None, u'name': u'libicu-doc', u'sum': [u'md5', u'33c2eab501b2974166712638145adace'], u'filename': u'libicu-doc-3.6-5.16.1.x86_64.rpm', u'epoch': u'0', u'version': u'3.6', u'release': u'5.16.1', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u'[0:5.5.23-0jpp.22]\n- Resolves: CVE-2011-0013 rhbz 675931\n- Resolves: CVE-2010-3718 rhbz 675931\n- Resolves: CVE-2011-1184 rhbz 744983\n- Resolves: CVE-2011-2204 rhbz 719181', u'issued': u'2011-12-20', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELSA-2011-1845.html', u'type': u'self', u'id': None, u'title': u'ELSA-2011-1845'}, {u'href': u'http://linux.oracle.com/cve/CVE-2010-3718.html', u'type': u'cve', u'id': u'CVE-2010-3718', u'title': u'CVE-2010-3718'}, {u'href': u'http://linux.oracle.com/cve/CVE-2011-0013.html', u'type': u'cve', u'id': u'CVE-2011-0013', u'title': u'CVE-2011-0013'}, {u'href': u'http://linux.oracle.com/cve/CVE-2011-1184.html', u'type': u'cve', u'id': u'CVE-2011-1184', u'title': u'CVE-2011-1184'}, {u'href': u'http://linux.oracle.com/cve/CVE-2011-2204.html', u'type': u'cve', u'id': u'CVE-2011-2204', u'title': u'CVE-2011-2204'}, {u'href': u'http://linux.oracle.com/cve/CVE-2011-5062.html', u'type': u'cve', u'id': u'CVE-2011-5062', u'title': u'CVE-2011-5062'}, {u'href': u'http://linux.oracle.com/cve/CVE-2011-5063.html', u'type': u'cve', u'id': u'CVE-2011-5063', u'title': u'CVE-2011-5063'}, {u'href': u'http://linux.oracle.com/cve/CVE-2011-5064.html', u'type': u'cve', u'id': u'CVE-2011-5064', u'title': u'CVE-2011-5064'}], u'_content_type_id': u'erratum', u'_id': u'ae228337-1203-46aa-9120-5f43cc915056', u'from': u'el-errata@oss.oracle.com', u'severity': u'Moderate', u'title': u' tomcat5 security update', u'_ns': u'units_erratum', u'rights': u'Copyright 2011 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 5', u'reboot_suggested': False, u'type': u'security', u'pkglist': [{u'packages': [{u'src': None, u'name': u'tomcat5', u'sum': [u'md5', u'd2bf07283dd48ad8e74df55499e0e4bb'], u'filename': u'tomcat5-5.5.23-0jpp.22.el5_7.src.rpm', u'epoch': u'0', u'version': u'5.5.23', u'release': u'0jpp.22.el5_7', u'arch': u'src'}, {u'src': None, u'name': u'tomcat5', u'sum': [u'md5', u'41317754ea50f5870c33ad676fbfaab1'], u'filename': u'tomcat5-5.5.23-0jpp.22.el5_7.x86_64.rpm', u'epoch': u'0', u'version': u'5.5.23', u'release': u'0jpp.22.el5_7', u'arch': u'x86_64'}, {u'src': None, u'name': u'tomcat5-admin-webapps', u'sum': [u'md5', u'74f50331c01c58ad5d87093f41d164f6'], u'filename': u'tomcat5-admin-webapps-5.5.23-0jpp.22.el5_7.x86_64.rpm', u'epoch': u'0', u'version': u'5.5.23', u'release': u'0jpp.22.el5_7', u'arch': u'x86_64'}, {u'src': None, u'name': u'tomcat5-common-lib', u'sum': [u'md5', u'17bd5dfa16c64a22fe1e828ef2cdb191'], u'filename': u'tomcat5-common-lib-5.5.23-0jpp.22.el5_7.x86_64.rpm', u'epoch': u'0', u'version': u'5.5.23', u'release': u'0jpp.22.el5_7', u'arch': u'x86_64'}, {u'src': None, u'name': u'tomcat5-jasper', u'sum': [u'md5', u'bae5e357ee00d992513c2debe124af13'], u'filename': u'tomcat5-jasper-5.5.23-0jpp.22.el5_7.x86_64.rpm', u'epoch': u'0', u'version': u'5.5.23', u'release': u'0jpp.22.el5_7', u'arch': u'x86_64'}, {u'src': None, u'name': u'tomcat5-jasper-javadoc', u'sum': [u'md5', u'afd52169a2c931b2ff9d6b5531ee3732'], u'filename': u'tomcat5-jasper-javadoc-5.5.23-0jpp.22.el5_7.x86_64.rpm', u'epoch': u'0', u'version': u'5.5.23', u'release': u'0jpp.22.el5_7', u'arch': u'x86_64'}, {u'src': None, u'name': u'tomcat5-jsp-2.0-api', u'sum': [u'md5', u'692435fc83e2e7398264f9c073855339'], u'filename': u'tomcat5-jsp-2.0-api-5.5.23-0jpp.22.el5_7.x86_64.rpm', u'epoch': u'0', u'version': u'5.5.23', u'release': u'0jpp.22.el5_7', u'arch': u'x86_64'}, {u'src': None, u'name': u'tomcat5-jsp-2.0-api-javadoc', u'sum': [u'md5', u'252227a6d721eeed9012fa915310cdd3'], u'filename': u'tomcat5-jsp-2.0-api-javadoc-5.5.23-0jpp.22.el5_7.x86_64.rpm', u'epoch': u'0', u'version': u'5.5.23', u'release': u'0jpp.22.el5_7', u'arch': u'x86_64'}, {u'src': None, u'name': u'tomcat5-server-lib', u'sum': [u'md5', u'3c2192a79f5a5a9b3d7854dfc65991f6'], u'filename': u'tomcat5-server-lib-5.5.23-0jpp.22.el5_7.x86_64.rpm', u'epoch': u'0', u'version': u'5.5.23', u'release': u'0jpp.22.el5_7', u'arch': u'x86_64'}, {u'src': None, u'name': u'tomcat5-servlet-2.4-api', u'sum': [u'md5', u'aab00ef84391c08ef6d2f44b970b5534'], u'filename': u'tomcat5-servlet-2.4-api-5.5.23-0jpp.22.el5_7.x86_64.rpm', u'epoch': u'0', u'version': u'5.5.23', u'release': u'0jpp.22.el5_7', u'arch': u'x86_64'}, {u'src': None, u'name': u'tomcat5-servlet-2.4-api-javadoc', u'sum': [u'md5', u'c4e170deaedc42e576a75e4ef3a0f75d'], u'filename': u'tomcat5-servlet-2.4-api-javadoc-5.5.23-0jpp.22.el5_7.x86_64.rpm', u'epoch': u'0', u'version': u'5.5.23', u'release': u'0jpp.22.el5_7', u'arch': u'x86_64'}, {u'src': None, u'name': u'tomcat5-webapps', u'sum': [u'md5', u'c5e9d7f7cf536aa5f519232b35ba655b'], u'filename': u'tomcat5-webapps-5.5.23-0jpp.22.el5_7.x86_64.rpm', u'epoch': u'0', u'version': u'5.5.23', u'release': u'0jpp.22.el5_7', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u'[1.6.1-63.el5_7]\n- Fix for CVE-2011-4862', u'issued': u'2011-12-27', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELSA-2011-1851.html', u'type': u'self', u'id': None, u'title': u'ELSA-2011-1851'}, {u'href': u'http://linux.oracle.com/cve/CVE-2011-4862.html', u'type': u'cve', u'id': u'CVE-2011-4862', u'title': u'CVE-2011-4862'}], u'_content_type_id': u'erratum', u'_id': u'85b5963e-5bef-4315-ac61-5b2e507b3166', u'from': u'el-errata@oss.oracle.com', u'severity': u'Critical', u'title': u' krb5 security update', u'_ns': u'units_erratum', u'rights': u'Copyright 2011 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 5', u'reboot_suggested': False, u'type': u'security', u'pkglist': [{u'packages': [{u'src': None, u'name': u'krb5', u'sum': [u'md5', u'688e7a939fb5ef4fc88d0a8d292fd4d2'], u'filename': u'krb5-1.6.1-63.el5_7.src.rpm', u'epoch': u'0', u'version': u'1.6.1', u'release': u'63.el5_7', u'arch': u'src'}, {u'src': None, u'name': u'krb5-devel', u'sum': [u'md5', u'412e3209fe907e6d2c82eb14812695e5'], u'filename': u'krb5-devel-1.6.1-63.el5_7.i386.rpm', u'epoch': u'0', u'version': u'1.6.1', u'release': u'63.el5_7', u'arch': u'i386'}, {u'src': None, u'name': u'krb5-devel', u'sum': [u'md5', u'ce3b31a470db9d0c77b596e46ea7f1b0'], u'filename': u'krb5-devel-1.6.1-63.el5_7.x86_64.rpm', u'epoch': u'0', u'version': u'1.6.1', u'release': u'63.el5_7', u'arch': u'x86_64'}, {u'src': None, u'name': u'krb5-libs', u'sum': [u'md5', u'3df01db042fca59e723913d7057bd5c4'], u'filename': u'krb5-libs-1.6.1-63.el5_7.i386.rpm', u'epoch': u'0', u'version': u'1.6.1', u'release': u'63.el5_7', u'arch': u'i386'}, {u'src': None, u'name': u'krb5-libs', u'sum': [u'md5', u'287ba233c44040e07dc5d7b1e894b1ab'], u'filename': u'krb5-libs-1.6.1-63.el5_7.x86_64.rpm', u'epoch': u'0', u'version': u'1.6.1', u'release': u'63.el5_7', u'arch': u'x86_64'}, {u'src': None, u'name': u'krb5-server', u'sum': [u'md5', u'2cd62b7046d870c8bc57dd0f603ace63'], u'filename': u'krb5-server-1.6.1-63.el5_7.x86_64.rpm', u'epoch': u'0', u'version': u'1.6.1', u'release': u'63.el5_7', u'arch': u'x86_64'}, {u'src': None, u'name': u'krb5-server-ldap', u'sum': [u'md5', u'7f1e0aea4e91ddfd4cf1206ae4f8c166'], u'filename': u'krb5-server-ldap-1.6.1-63.el5_7.x86_64.rpm', u'epoch': u'0', u'version': u'1.6.1', u'release': u'63.el5_7', u'arch': u'x86_64'}, {u'src': None, u'name': u'krb5-workstation', u'sum': [u'md5', u'3209cca9f71255f09d33272eda2c41aa'], u'filename': u'krb5-workstation-1.6.1-63.el5_7.x86_64.rpm', u'epoch': u'0', u'version': u'1.6.1', u'release': u'63.el5_7', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u'[2.6.32-100.28.9.el6]\n- sync up the version\n\n[2.6.32-100.28.8.el6]\n- [block] check for proper length of iov entries earlier in blk_rq_map_user_iov\n (Xiaotian Feng) {CVE-2010-4668}\n- scm: lower SCM_MAX_FD (Eric Dumazet) {CVE-2010-4249}\n- perf_events: Fix perf_counter_mmap() hook in mprotect() (Pekka Enberg)\n {CVE-2010-4169}\n- tcp: Increase TCP_MAXSEG socket option minimum (David S. Miller)\n {CVE-2010-4165}\n- Enable module force load option [orabug 11782146]\n- Enable vmw balloon and pvscsi (Guru Anbalagane) [orabug 11697522]\n\n[2.6.32-100.28.7.el6]\n- build from git\n\n[2.6.32-100.28.6.el6]\n- Remove crashkernel option if it is present [bug 11714928]', u'issued': u'2011-03-16', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELSA-2011-2010.html', u'type': u'self', u'id': None, u'title': u'ELSA-2011-2010'}, {u'href': u'http://linux.oracle.com/cve/CVE-2010-4165.html', u'type': u'cve', u'id': u'CVE-2010-4165', u'title': u'CVE-2010-4165'}, {u'href': u'http://linux.oracle.com/cve/CVE-2010-4169.html', u'type': u'cve', u'id': u'CVE-2010-4169', u'title': u'CVE-2010-4169'}, {u'href': u'http://linux.oracle.com/cve/CVE-2010-4249.html', u'type': u'cve', u'id': u'CVE-2010-4249', u'title': u'CVE-2010-4249'}, {u'href': u'http://linux.oracle.com/cve/CVE-2010-4668.html', u'type': u'cve', u'id': u'CVE-2010-4668', u'title': u'CVE-2010-4668'}], u'_content_type_id': u'erratum', u'_id': u'c1576823-69f5-4437-a191-d5b607f150bc', u'from': u'el-errata@oss.oracle.com', u'severity': u'Important', u'title': u' Oracle Linux 6 Unbreakable Enterprise kernel security fix update', u'_ns': u'units_erratum', u'rights': u'Copyright 2011 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 6', u'reboot_suggested': False, u'type': u'security', u'pkglist': [{u'packages': [{u'src': None, u'name': u'kernel-uek', u'sum': [u'md5', u'493a923bd0260aaabc266771f40e1ad6'], u'filename': u'kernel-uek-2.6.32-100.28.9.el6.src.rpm', u'epoch': u'0', u'version': u'2.6.32', u'release': u'100.28.9.el6', u'arch': u'src'}, {u'src': None, u'name': u'kernel-uek', u'sum': [u'md5', u'a3eea418ca309ab20deaab17cf9ac293'], u'filename': u'kernel-uek-2.6.32-100.28.9.el6.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.32', u'release': u'100.28.9.el6', u'arch': u'x86_64'}, {u'src': None, u'name': u'kernel-uek-debug', u'sum': [u'md5', u'6ba440423678848b149f896ca23d1c19'], u'filename': u'kernel-uek-debug-2.6.32-100.28.9.el6.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.32', u'release': u'100.28.9.el6', u'arch': u'x86_64'}, {u'src': None, u'name': u'kernel-uek-debug-devel', u'sum': [u'md5', u'b33b20ecbb21687e9d0db8058d2329a6'], u'filename': u'kernel-uek-debug-devel-2.6.32-100.28.9.el6.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.32', u'release': u'100.28.9.el6', u'arch': u'x86_64'}, {u'src': None, u'name': u'kernel-uek-devel', u'sum': [u'md5', u'b7fea7a7ce564f775c73582fd6a9135f'], u'filename': u'kernel-uek-devel-2.6.32-100.28.9.el6.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.32', u'release': u'100.28.9.el6', u'arch': u'x86_64'}, {u'src': None, u'name': u'kernel-uek-doc', u'sum': [u'md5', u'e63750600958ac6b11ebb9bb4b4722a8'], u'filename': u'kernel-uek-doc-2.6.32-100.28.9.el6.noarch.rpm', u'epoch': u'0', u'version': u'2.6.32', u'release': u'100.28.9.el6', u'arch': u'noarch'}, {u'src': None, u'name': u'kernel-uek-firmware', u'sum': [u'md5', u'3b280968363f7cdc0213713199cf2ca3'], u'filename': u'kernel-uek-firmware-2.6.32-100.28.9.el6.noarch.rpm', u'epoch': u'0', u'version': u'2.6.32', u'release': u'100.28.9.el6', u'arch': u'noarch'}, {u'src': None, u'name': u'kernel-uek-headers', u'sum': [u'md5', u'cc49353fc9627afb8308e12228c56930'], u'filename': u'kernel-uek-headers-2.6.32-100.28.9.el6.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.32', u'release': u'100.28.9.el6', u'arch': u'x86_64'}], u'name': u'ol6_x86_64_latest', u'short': u'ol6_x86_64_latest'}, {u'packages': [{u'src': None, u'name': u'kernel-uek', u'sum': [u'md5', u'586d538ce9e55b124f44e89c7496979b'], u'filename': u'kernel-uek-2.6.32-100.28.9.el5.src.rpm', u'epoch': u'0', u'version': u'2.6.32', u'release': u'100.28.9.el5', u'arch': u'src'}, {u'src': None, u'name': u'kernel-uek', u'sum': [u'md5', u'f040c04746aae1ce56d72d2bc555e87d'], u'filename': u'kernel-uek-2.6.32-100.28.9.el5.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.32', u'release': u'100.28.9.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'kernel-uek-debug', u'sum': [u'md5', u'd85f37c3b58dfaaa34c1e6e49eb94f59'], u'filename': u'kernel-uek-debug-2.6.32-100.28.9.el5.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.32', u'release': u'100.28.9.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'kernel-uek-debug-devel', u'sum': [u'md5', u'13bf7a33b46c07525190f9373ae87d1b'], u'filename': u'kernel-uek-debug-devel-2.6.32-100.28.9.el5.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.32', u'release': u'100.28.9.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'kernel-uek-devel', u'sum': [u'md5', u'baad6188e6f364e40b5f470c2ed0b1b0'], u'filename': u'kernel-uek-devel-2.6.32-100.28.9.el5.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.32', u'release': u'100.28.9.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'kernel-uek-doc', u'sum': [u'md5', u'42b4ffe1c97b490125df30874239393d'], u'filename': u'kernel-uek-doc-2.6.32-100.28.9.el5.noarch.rpm', u'epoch': u'0', u'version': u'2.6.32', u'release': u'100.28.9.el5', u'arch': u'noarch'}, {u'src': None, u'name': u'kernel-uek-firmware', u'sum': [u'md5', u'ae2b54da59c18a66fbdf75c86698aaf6'], u'filename': u'kernel-uek-firmware-2.6.32-100.28.9.el5.noarch.rpm', u'epoch': u'0', u'version': u'2.6.32', u'release': u'100.28.9.el5', u'arch': u'noarch'}, {u'src': None, u'name': u'ofa-2.6.32-100.28.9.el5', u'sum': [u'md5', u'ef08e2e33dd436760a1b7bb65bea570d'], u'filename': u'ofa-2.6.32-100.28.9.el5-1.5.1-4.0.28.src.rpm', u'epoch': u'0', u'version': u'1.5.1', u'release': u'4.0.28', u'arch': u'src'}, {u'src': None, u'name': u'ofa-2.6.32-100.28.9.el5', u'sum': [u'md5', u'e72d4a0775e343fce62b3e383f3e4bcf'], u'filename': u'ofa-2.6.32-100.28.9.el5-1.5.1-4.0.28.x86_64.rpm', u'epoch': u'0', u'version': u'1.5.1', u'release': u'4.0.28', u'arch': u'x86_64'}, {u'src': None, u'name': u'ofa-2.6.32-100.28.9.el5debug', u'sum': [u'md5', u'd36b175139f5ef60e68a346ade9d418c'], u'filename': u'ofa-2.6.32-100.28.9.el5debug-1.5.1-4.0.28.x86_64.rpm', u'epoch': u'0', u'version': u'1.5.1', u'release': u'4.0.28', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u"\n[2.6.32-100.28.11.el6]\n- fs/partitions: Validate map_count in Mac partition tables {CVE-2011-1010}\n- nfs4: Ensure that ACL pages sent over NFS were not allocated from\n the slab (v3) {CVE-2011-1090}\n\n[2.6.32-100.28.10.el6]\n- Use cciss for some Smart Array controller for OL5 [orabug 11899706]\n- CVEs from RHSA-2011-0421\n- install_special_mapping skips security_file_mmap check {CVE-2010-4346}\n- orinoco: fix TKIP countermeasure behaviour {CVE-2010-4648}\n- net: clear heap allocation for ethtool_get_regs() {CVE-2010-4655}\n- usb: iowarrior: don't trust report_size for buffer size {CVE-2010-4656}\n- [media] [v3,media] av7110: check for negative array offset {CVE-2011-0521}\n- RDMA/cma: Fix crash in request handlers {CVE-2011-0695}\n- IB/cm: Bump reference count on cm_id before invoking callback {CVE-2011-0695}\n- gro: reset skb_iif on reuse {CVE-2011-1478}", u'issued': u'2011-04-14', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELSA-2011-2014.html', u'type': u'self', u'id': None, u'title': u'ELSA-2011-2014'}, {u'href': u'http://linux.oracle.com/cve/CVE-2010-4346.html', u'type': u'cve', u'id': u'CVE-2010-4346', u'title': u'CVE-2010-4346'}, {u'href': u'http://linux.oracle.com/cve/CVE-2010-4648.html', u'type': u'cve', u'id': u'CVE-2010-4648', u'title': u'CVE-2010-4648'}, {u'href': u'http://linux.oracle.com/cve/CVE-2010-4655.html', u'type': u'cve', u'id': u'CVE-2010-4655', u'title': u'CVE-2010-4655'}, {u'href': u'http://linux.oracle.com/cve/CVE-2010-4656.html', u'type': u'cve', u'id': u'CVE-2010-4656', u'title': u'CVE-2010-4656'}, {u'href': u'http://linux.oracle.com/cve/CVE-2011-0521.html', u'type': u'cve', u'id': u'CVE-2011-0521', u'title': u'CVE-2011-0521'}, {u'href': u'http://linux.oracle.com/cve/CVE-2011-0695.html', u'type': u'cve', u'id': u'CVE-2011-0695', u'title': u'CVE-2011-0695'}, {u'href': u'http://linux.oracle.com/cve/CVE-2011-1010.html', u'type': u'cve', u'id': u'CVE-2011-1010', u'title': u'CVE-2011-1010'}, {u'href': u'http://linux.oracle.com/cve/CVE-2011-1090.html', u'type': u'cve', u'id': u'CVE-2011-1090', u'title': u'CVE-2011-1090'}, {u'href': u'http://linux.oracle.com/cve/CVE-2011-1478.html', u'type': u'cve', u'id': u'CVE-2011-1478', u'title': u'CVE-2011-1478'}], u'_content_type_id': u'erratum', u'_id': u'3c5e13aa-f540-4a5a-baeb-96977b0e1204', u'from': u'el-errata@oss.oracle.com', u'severity': u'Important', u'title': u' Oracle Linux 6 Unbreakable Enterprise kernel security fix update', u'_ns': u'units_erratum', u'rights': u'Copyright 2011 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 6', u'reboot_suggested': False, u'type': u'security', u'pkglist': [{u'packages': [{u'src': None, u'name': u'kernel-uek', u'sum': [u'md5', u'e8e6a7d0eb1ae903ade836d078971775'], u'filename': u'kernel-uek-2.6.32-100.28.11.el6.src.rpm', u'epoch': u'0', u'version': u'2.6.32', u'release': u'100.28.11.el6', u'arch': u'src'}, {u'src': None, u'name': u'kernel-uek', u'sum': [u'md5', u'a8bee7f982e664e35a9baafaea5011b8'], u'filename': u'kernel-uek-2.6.32-100.28.11.el6.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.32', u'release': u'100.28.11.el6', u'arch': u'x86_64'}, {u'src': None, u'name': u'kernel-uek-debug', u'sum': [u'md5', u'657b37b4ad3c226a8de659c0ee9f0438'], u'filename': u'kernel-uek-debug-2.6.32-100.28.11.el6.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.32', u'release': u'100.28.11.el6', u'arch': u'x86_64'}, {u'src': None, u'name': u'kernel-uek-debug-devel', u'sum': [u'md5', u'56184e245e64aecaaf045f855f11df50'], u'filename': u'kernel-uek-debug-devel-2.6.32-100.28.11.el6.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.32', u'release': u'100.28.11.el6', u'arch': u'x86_64'}, {u'src': None, u'name': u'kernel-uek-devel', u'sum': [u'md5', u'c23ce04516f54776bbbbfbf2b963703e'], u'filename': u'kernel-uek-devel-2.6.32-100.28.11.el6.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.32', u'release': u'100.28.11.el6', u'arch': u'x86_64'}, {u'src': None, u'name': u'kernel-uek-doc', u'sum': [u'md5', u'b034964da31cc63faa707c4ec36046a6'], u'filename': u'kernel-uek-doc-2.6.32-100.28.11.el6.noarch.rpm', u'epoch': u'0', u'version': u'2.6.32', u'release': u'100.28.11.el6', u'arch': u'noarch'}, {u'src': None, u'name': u'kernel-uek-firmware', u'sum': [u'md5', u'b7e12728a0e40b18aa8028b9224d4f73'], u'filename': u'kernel-uek-firmware-2.6.32-100.28.11.el6.noarch.rpm', u'epoch': u'0', u'version': u'2.6.32', u'release': u'100.28.11.el6', u'arch': u'noarch'}, {u'src': None, u'name': u'kernel-uek-headers', u'sum': [u'md5', u'e870b76cad74b4f8ba21b0e848012fe3'], u'filename': u'kernel-uek-headers-2.6.32-100.28.11.el6.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.32', u'release': u'100.28.11.el6', u'arch': u'x86_64'}], u'name': u'ol6_x86_64_latest', u'short': u'ol6_x86_64_latest'}, {u'packages': [{u'src': None, u'name': u'kernel-uek', u'sum': [u'md5', u'8be44018ce123d6ee9f8e67810912b0a'], u'filename': u'kernel-uek-2.6.32-100.28.11.el5.src.rpm', u'epoch': u'0', u'version': u'2.6.32', u'release': u'100.28.11.el5', u'arch': u'src'}, {u'src': None, u'name': u'kernel-uek', u'sum': [u'md5', u'bbfeac89d53def92d5c9361a33803bc2'], u'filename': u'kernel-uek-2.6.32-100.28.11.el5.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.32', u'release': u'100.28.11.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'kernel-uek-debug', u'sum': [u'md5', u'7890d220fc81e01208d5fe2057b22a3e'], u'filename': u'kernel-uek-debug-2.6.32-100.28.11.el5.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.32', u'release': u'100.28.11.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'kernel-uek-debug-devel', u'sum': [u'md5', u'258744bc7cd4bc7d0a97828643677780'], u'filename': u'kernel-uek-debug-devel-2.6.32-100.28.11.el5.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.32', u'release': u'100.28.11.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'kernel-uek-devel', u'sum': [u'md5', u'45dab26a2cd3c4ab93c8c4d145878479'], u'filename': u'kernel-uek-devel-2.6.32-100.28.11.el5.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.32', u'release': u'100.28.11.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'kernel-uek-doc', u'sum': [u'md5', u'a3a5c49f6ee52f18b346f939db6ab1e9'], u'filename': u'kernel-uek-doc-2.6.32-100.28.11.el5.noarch.rpm', u'epoch': u'0', u'version': u'2.6.32', u'release': u'100.28.11.el5', u'arch': u'noarch'}, {u'src': None, u'name': u'kernel-uek-firmware', u'sum': [u'md5', u'74aa5578a3bb61d725e54ee5fddb2ef0'], u'filename': u'kernel-uek-firmware-2.6.32-100.28.11.el5.noarch.rpm', u'epoch': u'0', u'version': u'2.6.32', u'release': u'100.28.11.el5', u'arch': u'noarch'}, {u'src': None, u'name': u'ofa-2.6.32-100.28.11.el5', u'sum': [u'md5', u'675c0a5fe6928b81b2f803f0b1b379d1'], u'filename': u'ofa-2.6.32-100.28.11.el5-1.5.1-4.0.28.src.rpm', u'epoch': u'0', u'version': u'1.5.1', u'release': u'4.0.28', u'arch': u'src'}, {u'src': None, u'name': u'ofa-2.6.32-100.28.11.el5', u'sum': [u'md5', u'e8a1ff59dc81ade6e462d33ec544baf4'], u'filename': u'ofa-2.6.32-100.28.11.el5-1.5.1-4.0.28.x86_64.rpm', u'epoch': u'0', u'version': u'1.5.1', u'release': u'4.0.28', u'arch': u'x86_64'}, {u'src': None, u'name': u'ofa-2.6.32-100.28.11.el5debug', u'sum': [u'md5', u'00fee16e9df28e9d6aefb6fdc38e532d'], u'filename': u'ofa-2.6.32-100.28.11.el5debug-1.5.1-4.0.28.x86_64.rpm', u'epoch': u'0', u'version': u'1.5.1', u'release': u'4.0.28', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u"\n[2.6.32-100.28.15.el6]\n- sctp: fix to calc the INIT/INIT-ACK chunk length correctly is set {CVE-2011-1573}\n- dccp: fix oops on Reset after close {CVE-2011-1093}\n- bridge: netfilter: fix information leak {CVE-2011-1080}\n- Bluetooth: bnep: fix buffer overflow {CVE-2011-1079}\n- net: don't allow CAP_NET_ADMIN to load non-netdev kernel modules {CVE-2011-1019}\n- ipip: add module alias for tunl0 tunnel device\n- gre: add module alias for gre0 tunnel device\n- drm/radeon/kms: check AA resolve registers on r300 {CVE-2011-1016}\n- drm/radeon: fix regression with AA resolve checking {CVE-2011-1016}\n- drm: fix unsigned vs signed comparison issue in modeset ctl ioctl {CVE-2011-1013}\n- proc: protect mm start_code/end_code in /proc/pid/stat {CVE-2011-0726}\n- ALSA: caiaq - Fix possible string-buffer overflow {CVE-2011-0712}\n- xfs: zero proper structure size for geometry calls {CVE-2011-0711}\n- xfs: prevent leaking uninitialized stack memory in FSGEOMETRY_V1 {CVE-2011-0711}\n- ima: fix add LSM rule bug {CVE-2011-0006}\n- IB/uverbs: Handle large number of entries in poll CQ {CVE-2010-4649, CVE-2011-1044}\n- CAN: Use inode instead of kernel address for /proc file {CVE-2010-4565}\n\n[2.6.32-100.28.14.el6]\n- IB/qib: fix qib compile warning.\n- IB/core: Allow device-specific per-port sysfs files.\n- dm crypt: add plain64 iv.\n- firmware: add firmware for qib.\n- Infiniband: Add QLogic PCIe QLE InfiniBand host channel adapters support.", u'issued': u'2011-05-11', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELSA-2011-2015.html', u'type': u'self', u'id': None, u'title': u'ELSA-2011-2015'}, {u'href': u'http://linux.oracle.com/cve/CVE-2010-4565.html', u'type': u'cve', u'id': u'CVE-2010-4565', u'title': u'CVE-2010-4565'}, {u'href': u'http://linux.oracle.com/cve/CVE-2010-4649.html', u'type': u'cve', u'id': u'CVE-2010-4649', u'title': u'CVE-2010-4649'}, {u'href': u'http://linux.oracle.com/cve/CVE-2011-0006.html', u'type': u'cve', u'id': u'CVE-2011-0006', u'title': u'CVE-2011-0006'}, {u'href': u'http://linux.oracle.com/cve/CVE-2011-0711.html', u'type': u'cve', u'id': u'CVE-2011-0711', u'title': u'CVE-2011-0711'}, {u'href': u'http://linux.oracle.com/cve/CVE-2011-0712.html', u'type': u'cve', u'id': u'CVE-2011-0712', u'title': u'CVE-2011-0712'}, {u'href': u'http://linux.oracle.com/cve/CVE-2011-0726.html', u'type': u'cve', u'id': u'CVE-2011-0726', u'title': u'CVE-2011-0726'}, {u'href': u'http://linux.oracle.com/cve/CVE-2011-1013.html', u'type': u'cve', u'id': u'CVE-2011-1013', u'title': u'CVE-2011-1013'}, {u'href': u'http://linux.oracle.com/cve/CVE-2011-1016.html', u'type': u'cve', u'id': u'CVE-2011-1016', u'title': u'CVE-2011-1016'}, {u'href': u'http://linux.oracle.com/cve/CVE-2011-1019.html', u'type': u'cve', u'id': u'CVE-2011-1019', u'title': u'CVE-2011-1019'}, {u'href': u'http://linux.oracle.com/cve/CVE-2011-1044.html', u'type': u'cve', u'id': u'CVE-2011-1044', u'title': u'CVE-2011-1044'}, {u'href': u'http://linux.oracle.com/cve/CVE-2011-1079.html', u'type': u'cve', u'id': u'CVE-2011-1079', u'title': u'CVE-2011-1079'}, {u'href': u'http://linux.oracle.com/cve/CVE-2011-1080.html', u'type': u'cve', u'id': u'CVE-2011-1080', u'title': u'CVE-2011-1080'}, {u'href': u'http://linux.oracle.com/cve/CVE-2011-1093.html', u'type': u'cve', u'id': u'CVE-2011-1093', u'title': u'CVE-2011-1093'}, {u'href': u'http://linux.oracle.com/cve/CVE-2011-1573.html', u'type': u'cve', u'id': u'CVE-2011-1573', u'title': u'CVE-2011-1573'}], u'_content_type_id': u'erratum', u'_id': u'a56e5a1e-c23c-4957-a6e5-a69aace34cdf', u'from': u'el-errata@oss.oracle.com', u'severity': u'Important', u'title': u' Oracle Linux 6 Unbreakable Enterprise kernel security fix update', u'_ns': u'units_erratum', u'rights': u'Copyright 2011 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 6', u'reboot_suggested': False, u'type': u'security', u'pkglist': [{u'packages': [{u'src': None, u'name': u'kernel-uek', u'sum': [u'md5', u'f987f4e8f6ec64d115c5ea7c71096ea9'], u'filename': u'kernel-uek-2.6.32-100.28.15.el6.src.rpm', u'epoch': u'0', u'version': u'2.6.32', u'release': u'100.28.15.el6', u'arch': u'src'}, {u'src': None, u'name': u'kernel-uek', u'sum': [u'md5', u'7809b1f136c12341aa56303b433045cc'], u'filename': u'kernel-uek-2.6.32-100.28.15.el6.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.32', u'release': u'100.28.15.el6', u'arch': u'x86_64'}, {u'src': None, u'name': u'kernel-uek-debug', u'sum': [u'md5', u'a6540e6a021fca4684fc3b96f7392ab4'], u'filename': u'kernel-uek-debug-2.6.32-100.28.15.el6.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.32', u'release': u'100.28.15.el6', u'arch': u'x86_64'}, {u'src': None, u'name': u'kernel-uek-debug-devel', u'sum': [u'md5', u'76e8b937d913634fbdc2af96c83d50b4'], u'filename': u'kernel-uek-debug-devel-2.6.32-100.28.15.el6.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.32', u'release': u'100.28.15.el6', u'arch': u'x86_64'}, {u'src': None, u'name': u'kernel-uek-devel', u'sum': [u'md5', u'7c7a5f4980886a7c74089d3e460b0c6b'], u'filename': u'kernel-uek-devel-2.6.32-100.28.15.el6.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.32', u'release': u'100.28.15.el6', u'arch': u'x86_64'}, {u'src': None, u'name': u'kernel-uek-doc', u'sum': [u'md5', u'19499dcefe999e075c5eaa298efb3ba5'], u'filename': u'kernel-uek-doc-2.6.32-100.28.15.el6.noarch.rpm', u'epoch': u'0', u'version': u'2.6.32', u'release': u'100.28.15.el6', u'arch': u'noarch'}, {u'src': None, u'name': u'kernel-uek-firmware', u'sum': [u'md5', u'79513f6c32ddaaf8e687ae3dce62ba2d'], u'filename': u'kernel-uek-firmware-2.6.32-100.28.15.el6.noarch.rpm', u'epoch': u'0', u'version': u'2.6.32', u'release': u'100.28.15.el6', u'arch': u'noarch'}, {u'src': None, u'name': u'kernel-uek-headers', u'sum': [u'md5', u'6bfcef1c61d645cd4cbfa051c12b3f01'], u'filename': u'kernel-uek-headers-2.6.32-100.28.15.el6.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.32', u'release': u'100.28.15.el6', u'arch': u'x86_64'}], u'name': u'ol6_x86_64_latest', u'short': u'ol6_x86_64_latest'}, {u'packages': [{u'src': None, u'name': u'kernel-uek', u'sum': [u'md5', u'541346fe4c26182ef13ecd3d50209197'], u'filename': u'kernel-uek-2.6.32-100.28.15.el5.src.rpm', u'epoch': u'0', u'version': u'2.6.32', u'release': u'100.28.15.el5', u'arch': u'src'}, {u'src': None, u'name': u'kernel-uek', u'sum': [u'md5', u'9ad0ad1ea77a8bfa4f03a3bc2a63a6c1'], u'filename': u'kernel-uek-2.6.32-100.28.15.el5.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.32', u'release': u'100.28.15.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'kernel-uek-debug', u'sum': [u'md5', u'23d3ef92112e581ceb918cb2084a374a'], u'filename': u'kernel-uek-debug-2.6.32-100.28.15.el5.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.32', u'release': u'100.28.15.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'kernel-uek-debug-devel', u'sum': [u'md5', u'6b399577272455ee2b58585387c407f7'], u'filename': u'kernel-uek-debug-devel-2.6.32-100.28.15.el5.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.32', u'release': u'100.28.15.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'kernel-uek-devel', u'sum': [u'md5', u'c6f54567221d13439c1e8a37c653ae82'], u'filename': u'kernel-uek-devel-2.6.32-100.28.15.el5.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.32', u'release': u'100.28.15.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'kernel-uek-doc', u'sum': [u'md5', u'baf46ca82b7066f34c784765c25a903f'], u'filename': u'kernel-uek-doc-2.6.32-100.28.15.el5.noarch.rpm', u'epoch': u'0', u'version': u'2.6.32', u'release': u'100.28.15.el5', u'arch': u'noarch'}, {u'src': None, u'name': u'kernel-uek-firmware', u'sum': [u'md5', u'c321054a68da5a56f40686312fa624bc'], u'filename': u'kernel-uek-firmware-2.6.32-100.28.15.el5.noarch.rpm', u'epoch': u'0', u'version': u'2.6.32', u'release': u'100.28.15.el5', u'arch': u'noarch'}, {u'src': None, u'name': u'ofa-2.6.32-100.28.15.el5', u'sum': [u'md5', u'8aafb9e24f3b4acf5a0838ab5d219fb9'], u'filename': u'ofa-2.6.32-100.28.15.el5-1.5.1-4.0.28.src.rpm', u'epoch': u'0', u'version': u'1.5.1', u'release': u'4.0.28', u'arch': u'src'}, {u'src': None, u'name': u'ofa-2.6.32-100.28.15.el5', u'sum': [u'md5', u'f3609cc8dbd699a4387742fd5e7f6521'], u'filename': u'ofa-2.6.32-100.28.15.el5-1.5.1-4.0.28.x86_64.rpm', u'epoch': u'0', u'version': u'1.5.1', u'release': u'4.0.28', u'arch': u'x86_64'}, {u'src': None, u'name': u'ofa-2.6.32-100.28.15.el5debug', u'sum': [u'md5', u'8c9d8ee0a4af9b021f6891023240779f'], u'filename': u'ofa-2.6.32-100.28.15.el5debug-1.5.1-4.0.28.x86_64.rpm', u'epoch': u'0', u'version': u'1.5.1', u'release': u'4.0.28', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u'A\n[2.6.32-100.28.17.el6]\n- [net] Extend prot->slab size when add sock extend fields.\n\n[2.6.32-100.28.16.el6]\n- kernel: Fix unlimited socket backlog DoS {CVE-2010-4251}\n- RDS: Fix congestion issues for loopback\n- rds: prevent BUG_ON triggering on congestion map updates {CVE-2011-1023}\n- epoll: prevent creating circular epoll structures {CVE-2011-1082}\n- fs: fix corrupted OSF partition table parsing {CVE-2011-1163}\n- fs: Increase OSF partition limit from 8 to 18 {CVE-2011-1163}\n- netfilter: arp_tables: fix infoleak to userspace {CVE-2011-1170}\n- netfilter: ip_tables: fix infoleak to userspace {CVE-2011-1171}\n- ipv6: netfilter: ip6_tables: fix infoleak to userspace {CVE-2011-1172}\n- [SCSI] mpt2sas: prevent heap overflows and unchecked reads {CVE-2011-1494, CVE-2011-1495}', u'issued': u'2011-05-23', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELSA-2011-2016.html', u'type': u'self', u'id': None, u'title': u'ELSA-2011-2016'}, {u'href': u'http://linux.oracle.com/cve/CVE-2010-4251.html', u'type': u'cve', u'id': u'CVE-2010-4251', u'title': u'CVE-2010-4251'}, {u'href': u'http://linux.oracle.com/cve/CVE-2011-1023.html', u'type': u'cve', u'id': u'CVE-2011-1023', u'title': u'CVE-2011-1023'}, {u'href': u'http://linux.oracle.com/cve/CVE-2011-1082.html', u'type': u'cve', u'id': u'CVE-2011-1082', u'title': u'CVE-2011-1082'}, {u'href': u'http://linux.oracle.com/cve/CVE-2011-1163.html', u'type': u'cve', u'id': u'CVE-2011-1163', u'title': u'CVE-2011-1163'}, {u'href': u'http://linux.oracle.com/cve/CVE-2011-1170.html', u'type': u'cve', u'id': u'CVE-2011-1170', u'title': u'CVE-2011-1170'}, {u'href': u'http://linux.oracle.com/cve/CVE-2011-1171.html', u'type': u'cve', u'id': u'CVE-2011-1171', u'title': u'CVE-2011-1171'}, {u'href': u'http://linux.oracle.com/cve/CVE-2011-1172.html', u'type': u'cve', u'id': u'CVE-2011-1172', u'title': u'CVE-2011-1172'}, {u'href': u'http://linux.oracle.com/cve/CVE-2011-1494.html', u'type': u'cve', u'id': u'CVE-2011-1494', u'title': u'CVE-2011-1494'}, {u'href': u'http://linux.oracle.com/cve/CVE-2011-1495.html', u'type': u'cve', u'id': u'CVE-2011-1495', u'title': u'CVE-2011-1495'}], u'_content_type_id': u'erratum', u'_id': u'1658bd79-73e3-4161-9e77-b99c5e58a482', u'from': u'el-errata@oss.oracle.com', u'severity': u'Important', u'title': u'Unbreakable Enterprise kernel security fix update', u'_ns': u'units_erratum', u'rights': u'Copyright 2011 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 6', u'reboot_suggested': False, u'type': u'security', u'pkglist': [{u'packages': [{u'src': None, u'name': u'kernel-uek', u'sum': [u'md5', u'775719d98c0b344dbae08909c56e1b38'], u'filename': u'kernel-uek-2.6.32-100.28.17.el6.src.rpm', u'epoch': u'0', u'version': u'2.6.32', u'release': u'100.28.17.el6', u'arch': u'src'}, {u'src': None, u'name': u'kernel-uek', u'sum': [u'md5', u'b73ae86bd2b7e345c87ac6de94db11a3'], u'filename': u'kernel-uek-2.6.32-100.28.17.el6.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.32', u'release': u'100.28.17.el6', u'arch': u'x86_64'}, {u'src': None, u'name': u'kernel-uek-debug', u'sum': [u'md5', u'2708daa097ec9d6b7faf01b0f0783fba'], u'filename': u'kernel-uek-debug-2.6.32-100.28.17.el6.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.32', u'release': u'100.28.17.el6', u'arch': u'x86_64'}, {u'src': None, u'name': u'kernel-uek-debug-devel', u'sum': [u'md5', u'f81cbbed84d430e00d9d4db0e63ace64'], u'filename': u'kernel-uek-debug-devel-2.6.32-100.28.17.el6.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.32', u'release': u'100.28.17.el6', u'arch': u'x86_64'}, {u'src': None, u'name': u'kernel-uek-devel', u'sum': [u'md5', u'eca9db09e74f288aa3583f1bd71e630a'], u'filename': u'kernel-uek-devel-2.6.32-100.28.17.el6.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.32', u'release': u'100.28.17.el6', u'arch': u'x86_64'}, {u'src': None, u'name': u'kernel-uek-doc', u'sum': [u'md5', u'ccbbe370575810c3ba99c3fd70ef7486'], u'filename': u'kernel-uek-doc-2.6.32-100.28.17.el6.noarch.rpm', u'epoch': u'0', u'version': u'2.6.32', u'release': u'100.28.17.el6', u'arch': u'noarch'}, {u'src': None, u'name': u'kernel-uek-firmware', u'sum': [u'md5', u'a52d926e0cb45426e16f1746a9c345cd'], u'filename': u'kernel-uek-firmware-2.6.32-100.28.17.el6.noarch.rpm', u'epoch': u'0', u'version': u'2.6.32', u'release': u'100.28.17.el6', u'arch': u'noarch'}, {u'src': None, u'name': u'kernel-uek-headers', u'sum': [u'md5', u'5af4d854456bd5410d691e44c56332a9'], u'filename': u'kernel-uek-headers-2.6.32-100.28.17.el6.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.32', u'release': u'100.28.17.el6', u'arch': u'x86_64'}], u'name': u'ol6_x86_64_latest', u'short': u'ol6_x86_64_latest'}, {u'packages': [{u'src': None, u'name': u'kernel-uek', u'sum': [u'md5', u'5535bd1567cb991cb0a3464edb16de3b'], u'filename': u'kernel-uek-2.6.32-100.28.17.el5.src.rpm', u'epoch': u'0', u'version': u'2.6.32', u'release': u'100.28.17.el5', u'arch': u'src'}, {u'src': None, u'name': u'kernel-uek', u'sum': [u'md5', u'4e500481a0ca04fbfc3281e85f3854a9'], u'filename': u'kernel-uek-2.6.32-100.28.17.el5.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.32', u'release': u'100.28.17.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'kernel-uek-debug', u'sum': [u'md5', u'f0ff94a6817cb9d2345d3e7fb518da9f'], u'filename': u'kernel-uek-debug-2.6.32-100.28.17.el5.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.32', u'release': u'100.28.17.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'kernel-uek-debug-devel', u'sum': [u'md5', u'a9c0dfc7699d3c33d09a24ba05c57d81'], u'filename': u'kernel-uek-debug-devel-2.6.32-100.28.17.el5.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.32', u'release': u'100.28.17.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'kernel-uek-devel', u'sum': [u'md5', u'59cb2bb4d8bf69bfff424dcb3404e8d5'], u'filename': u'kernel-uek-devel-2.6.32-100.28.17.el5.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.32', u'release': u'100.28.17.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'kernel-uek-doc', u'sum': [u'md5', u'027cc6a37e8bc691777e882e04d27eee'], u'filename': u'kernel-uek-doc-2.6.32-100.28.17.el5.noarch.rpm', u'epoch': u'0', u'version': u'2.6.32', u'release': u'100.28.17.el5', u'arch': u'noarch'}, {u'src': None, u'name': u'kernel-uek-firmware', u'sum': [u'md5', u'3fad3e179833154c26a11c048322caac'], u'filename': u'kernel-uek-firmware-2.6.32-100.28.17.el5.noarch.rpm', u'epoch': u'0', u'version': u'2.6.32', u'release': u'100.28.17.el5', u'arch': u'noarch'}, {u'src': None, u'name': u'ofa-2.6.32-100.28.17.el5', u'sum': [u'md5', u'9858f57c00de19233d8135a5a0229e74'], u'filename': u'ofa-2.6.32-100.28.17.el5-1.5.1-4.0.28.src.rpm', u'epoch': u'0', u'version': u'1.5.1', u'release': u'4.0.28', u'arch': u'src'}, {u'src': None, u'name': u'ofa-2.6.32-100.28.17.el5', u'sum': [u'md5', u'5ca5328e7c73b2118d53d980e68b0a07'], u'filename': u'ofa-2.6.32-100.28.17.el5-1.5.1-4.0.28.x86_64.rpm', u'epoch': u'0', u'version': u'1.5.1', u'release': u'4.0.28', u'arch': u'x86_64'}, {u'src': None, u'name': u'ofa-2.6.32-100.28.17.el5debug', u'sum': [u'md5', u'f3c6b4efc700985ed77fdecf47892e71'], u'filename': u'ofa-2.6.32-100.28.17.el5debug-1.5.1-4.0.28.x86_64.rpm', u'epoch': u'0', u'version': u'1.5.1', u'release': u'4.0.28', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u'\n[2.6.32-100.35.1.el6uek]\n- [net] dccp: handle invalid feature options length {CVE-2011-1770}\n- [net] can: add missing socket check in can/raw release {CVE-2011-1748}\n- [net] can: Add missing socket check in can/bcm release {CVE-2011-1598}', u'issued': u'2011-06-02', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELSA-2011-2019.html', u'type': u'self', u'id': None, u'title': u'ELSA-2011-2019'}, {u'href': u'http://linux.oracle.com/cve/CVE-2011-1598.html', u'type': u'cve', u'id': u'CVE-2011-1598', u'title': u'CVE-2011-1598'}, {u'href': u'http://linux.oracle.com/cve/CVE-2011-1748.html', u'type': u'cve', u'id': u'CVE-2011-1748', u'title': u'CVE-2011-1748'}, {u'href': u'http://linux.oracle.com/cve/CVE-2011-1770.html', u'type': u'cve', u'id': u'CVE-2011-1770', u'title': u'CVE-2011-1770'}], u'_content_type_id': u'erratum', u'_id': u'c494a688-6923-4db7-9f3f-7c996da42e69', u'from': u'el-errata@oss.oracle.com', u'severity': u'Important', u'title': u' Oracle Linux 6 Unbreakable Enterprise kernel security fix update', u'_ns': u'units_erratum', u'rights': u'Copyright 2011 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 6', u'reboot_suggested': False, u'type': u'security', u'pkglist': [{u'packages': [{u'src': None, u'name': u'kernel-uek', u'sum': [u'md5', u'da2e516c3e1db6db43f8ff2263626108'], u'filename': u'kernel-uek-2.6.32-100.35.1.el6uek.src.rpm', u'epoch': u'0', u'version': u'2.6.32', u'release': u'100.35.1.el6uek', u'arch': u'src'}, {u'src': None, u'name': u'kernel-uek', u'sum': [u'md5', u'3daedbcec1d5e94c76a9b1bbe38275c9'], u'filename': u'kernel-uek-2.6.32-100.35.1.el6uek.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.32', u'release': u'100.35.1.el6uek', u'arch': u'x86_64'}, {u'src': None, u'name': u'kernel-uek-debug', u'sum': [u'md5', u'ea40139d6ac8e119d9249a63a251b2f6'], u'filename': u'kernel-uek-debug-2.6.32-100.35.1.el6uek.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.32', u'release': u'100.35.1.el6uek', u'arch': u'x86_64'}, {u'src': None, u'name': u'kernel-uek-debug-devel', u'sum': [u'md5', u'35ec412ce6af00a939877197f8242145'], u'filename': u'kernel-uek-debug-devel-2.6.32-100.35.1.el6uek.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.32', u'release': u'100.35.1.el6uek', u'arch': u'x86_64'}, {u'src': None, u'name': u'kernel-uek-devel', u'sum': [u'md5', u'aa2c36c9390e2ef0f6b59f50a16651a5'], u'filename': u'kernel-uek-devel-2.6.32-100.35.1.el6uek.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.32', u'release': u'100.35.1.el6uek', u'arch': u'x86_64'}, {u'src': None, u'name': u'kernel-uek-doc', u'sum': [u'md5', u'a8fd913e41d7a6de2119bf55470df859'], u'filename': u'kernel-uek-doc-2.6.32-100.35.1.el6uek.noarch.rpm', u'epoch': u'0', u'version': u'2.6.32', u'release': u'100.35.1.el6uek', u'arch': u'noarch'}, {u'src': None, u'name': u'kernel-uek-firmware', u'sum': [u'md5', u'8ff593aebea0b95f9c96efd1a9e67cb9'], u'filename': u'kernel-uek-firmware-2.6.32-100.35.1.el6uek.noarch.rpm', u'epoch': u'0', u'version': u'2.6.32', u'release': u'100.35.1.el6uek', u'arch': u'noarch'}, {u'src': None, u'name': u'kernel-uek-headers', u'sum': [u'md5', u'2feb40b2e265f6000be86805ce4a9e60'], u'filename': u'kernel-uek-headers-2.6.32-100.35.1.el6uek.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.32', u'release': u'100.35.1.el6uek', u'arch': u'x86_64'}, {u'src': None, u'name': u'ofa-2.6.32-100.35.1.el6uek', u'sum': [u'md5', u'11f3319f0ce9485281abce8844e98c5b'], u'filename': u'ofa-2.6.32-100.35.1.el6uek-1.5.1-4.0.47.src.rpm', u'epoch': u'0', u'version': u'1.5.1', u'release': u'4.0.47', u'arch': u'src'}, {u'src': None, u'name': u'ofa-2.6.32-100.35.1.el6uek', u'sum': [u'md5', u'791d4ff87a0a8f55b0f89189e5843fff'], u'filename': u'ofa-2.6.32-100.35.1.el6uek-1.5.1-4.0.47.x86_64.rpm', u'epoch': u'0', u'version': u'1.5.1', u'release': u'4.0.47', u'arch': u'x86_64'}, {u'src': None, u'name': u'ofa-2.6.32-100.35.1.el6uekdebug', u'sum': [u'md5', u'f1213880eb17fad9cbcae23d54c0ca31'], u'filename': u'ofa-2.6.32-100.35.1.el6uekdebug-1.5.1-4.0.47.x86_64.rpm', u'epoch': u'0', u'version': u'1.5.1', u'release': u'4.0.47', u'arch': u'x86_64'}], u'name': u'ol6_x86_64_latest', u'short': u'ol6_x86_64_latest'}, {u'packages': [{u'src': None, u'name': u'kernel-uek', u'sum': [u'md5', u'a39cd506c309e6bc027db909d1bb9161'], u'filename': u'kernel-uek-2.6.32-100.35.1.el5uek.src.rpm', u'epoch': u'0', u'version': u'2.6.32', u'release': u'100.35.1.el5uek', u'arch': u'src'}, {u'src': None, u'name': u'kernel-uek', u'sum': [u'md5', u'5ee79d335bc7a9828abc6f7005db1c04'], u'filename': u'kernel-uek-2.6.32-100.35.1.el5uek.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.32', u'release': u'100.35.1.el5uek', u'arch': u'x86_64'}, {u'src': None, u'name': u'kernel-uek-debug', u'sum': [u'md5', u'ae8f69435bc920b2129f41c241d0e08f'], u'filename': u'kernel-uek-debug-2.6.32-100.35.1.el5uek.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.32', u'release': u'100.35.1.el5uek', u'arch': u'x86_64'}, {u'src': None, u'name': u'kernel-uek-debug-devel', u'sum': [u'md5', u'f79fa6907d155b4b2c8498c4545ab67f'], u'filename': u'kernel-uek-debug-devel-2.6.32-100.35.1.el5uek.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.32', u'release': u'100.35.1.el5uek', u'arch': u'x86_64'}, {u'src': None, u'name': u'kernel-uek-devel', u'sum': [u'md5', u'c4749a1cd52296728f3c296692b46135'], u'filename': u'kernel-uek-devel-2.6.32-100.35.1.el5uek.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.32', u'release': u'100.35.1.el5uek', u'arch': u'x86_64'}, {u'src': None, u'name': u'kernel-uek-doc', u'sum': [u'md5', u'4d610e3f60f20d637766adb449e8ef1c'], u'filename': u'kernel-uek-doc-2.6.32-100.35.1.el5uek.noarch.rpm', u'epoch': u'0', u'version': u'2.6.32', u'release': u'100.35.1.el5uek', u'arch': u'noarch'}, {u'src': None, u'name': u'kernel-uek-firmware', u'sum': [u'md5', u'80dbb409b88e143021350ecb53579edc'], u'filename': u'kernel-uek-firmware-2.6.32-100.35.1.el5uek.noarch.rpm', u'epoch': u'0', u'version': u'2.6.32', u'release': u'100.35.1.el5uek', u'arch': u'noarch'}, {u'src': None, u'name': u'ofa-2.6.32-100.35.1.el5uek', u'sum': [u'md5', u'52e319b3bce80fb4f3af988845809c14'], u'filename': u'ofa-2.6.32-100.35.1.el5uek-1.5.1-4.0.28.src.rpm', u'epoch': u'0', u'version': u'1.5.1', u'release': u'4.0.28', u'arch': u'src'}, {u'src': None, u'name': u'ofa-2.6.32-100.35.1.el5uek', u'sum': [u'md5', u'5ec81827d31ed8936aae43c0c4dcd0f9'], u'filename': u'ofa-2.6.32-100.35.1.el5uek-1.5.1-4.0.28.x86_64.rpm', u'epoch': u'0', u'version': u'1.5.1', u'release': u'4.0.28', u'arch': u'x86_64'}, {u'src': None, u'name': u'ofa-2.6.32-100.35.1.el5uekdebug', u'sum': [u'md5', u'd7ff65e010a889f2904253172ae10500'], u'filename': u'ofa-2.6.32-100.35.1.el5uekdebug-1.5.1-4.0.28.x86_64.rpm', u'epoch': u'0', u'version': u'1.5.1', u'release': u'4.0.28', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u'\n[2.6.32-100.37.1.el6uek]\n- [net] gre: fix netns vs proto registration ordering {CVE-2011-1767}\n- [net] tunnels: fix netns vs proto registration ordering {CVE-2011-1768}', u'issued': u'2011-07-13', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELSA-2011-2021.html', u'type': u'self', u'id': None, u'title': u'ELSA-2011-2021'}, {u'href': u'http://linux.oracle.com/cve/CVE-2011-1767.html', u'type': u'cve', u'id': u'CVE-2011-1767', u'title': u'CVE-2011-1767'}, {u'href': u'http://linux.oracle.com/cve/CVE-2011-1768.html', u'type': u'cve', u'id': u'CVE-2011-1768', u'title': u'CVE-2011-1768'}], u'_content_type_id': u'erratum', u'_id': u'eba23e0f-177c-4c10-bbea-4fd2db6c72dd', u'from': u'el-errata@oss.oracle.com', u'severity': u'Moderate', u'title': u' Oracle Linux 6 Unbreakable Enterprise kernel security fix update', u'_ns': u'units_erratum', u'rights': u'Copyright 2011 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 6', u'reboot_suggested': False, u'type': u'security', u'pkglist': [{u'packages': [{u'src': None, u'name': u'kernel-uek', u'sum': [u'md5', u'bc7f3fb0433316916fd46345bf2d6643'], u'filename': u'kernel-uek-2.6.32-100.37.1.el6uek.src.rpm', u'epoch': u'0', u'version': u'2.6.32', u'release': u'100.37.1.el6uek', u'arch': u'src'}, {u'src': None, u'name': u'kernel-uek', u'sum': [u'md5', u'751631e8ca35b415b66db51202b0470b'], u'filename': u'kernel-uek-2.6.32-100.37.1.el6uek.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.32', u'release': u'100.37.1.el6uek', u'arch': u'x86_64'}, {u'src': None, u'name': u'kernel-uek-debug', u'sum': [u'md5', u'bce49ae4d2e35b0a6e71a1f1bd911199'], u'filename': u'kernel-uek-debug-2.6.32-100.37.1.el6uek.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.32', u'release': u'100.37.1.el6uek', u'arch': u'x86_64'}, {u'src': None, u'name': u'kernel-uek-debug-devel', u'sum': [u'md5', u'948d92ab509109f82ea71196dee5d208'], u'filename': u'kernel-uek-debug-devel-2.6.32-100.37.1.el6uek.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.32', u'release': u'100.37.1.el6uek', u'arch': u'x86_64'}, {u'src': None, u'name': u'kernel-uek-devel', u'sum': [u'md5', u'5e3e60634ef1c4c216b32b00d6c54d73'], u'filename': u'kernel-uek-devel-2.6.32-100.37.1.el6uek.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.32', u'release': u'100.37.1.el6uek', u'arch': u'x86_64'}, {u'src': None, u'name': u'kernel-uek-doc', u'sum': [u'md5', u'1cfed459b7f72c46eab6c6ed2e463f1d'], u'filename': u'kernel-uek-doc-2.6.32-100.37.1.el6uek.noarch.rpm', u'epoch': u'0', u'version': u'2.6.32', u'release': u'100.37.1.el6uek', u'arch': u'noarch'}, {u'src': None, u'name': u'kernel-uek-firmware', u'sum': [u'md5', u'e07bc9da889dbe65a28083de32fab264'], u'filename': u'kernel-uek-firmware-2.6.32-100.37.1.el6uek.noarch.rpm', u'epoch': u'0', u'version': u'2.6.32', u'release': u'100.37.1.el6uek', u'arch': u'noarch'}, {u'src': None, u'name': u'kernel-uek-headers', u'sum': [u'md5', u'd2c6b8f9f1d6d21974aff655f46aa4c2'], u'filename': u'kernel-uek-headers-2.6.32-100.37.1.el6uek.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.32', u'release': u'100.37.1.el6uek', u'arch': u'x86_64'}, {u'src': None, u'name': u'ofa-2.6.32-100.37.1.el6uek', u'sum': [u'md5', u'bfd12c991ef8885fc921d1cbdcb197d4'], u'filename': u'ofa-2.6.32-100.37.1.el6uek-1.5.1-4.0.47.src.rpm', u'epoch': u'0', u'version': u'1.5.1', u'release': u'4.0.47', u'arch': u'src'}, {u'src': None, u'name': u'ofa-2.6.32-100.37.1.el6uek', u'sum': [u'md5', u'bff7f5b52588c091d87b5acefb12300f'], u'filename': u'ofa-2.6.32-100.37.1.el6uek-1.5.1-4.0.47.x86_64.rpm', u'epoch': u'0', u'version': u'1.5.1', u'release': u'4.0.47', u'arch': u'x86_64'}, {u'src': None, u'name': u'ofa-2.6.32-100.37.1.el6uekdebug', u'sum': [u'md5', u'cc5c8438a7c7a2beb75d22596bc77760'], u'filename': u'ofa-2.6.32-100.37.1.el6uekdebug-1.5.1-4.0.47.x86_64.rpm', u'epoch': u'0', u'version': u'1.5.1', u'release': u'4.0.47', u'arch': u'x86_64'}], u'name': u'ol6_x86_64_latest', u'short': u'ol6_x86_64_latest'}, {u'packages': [{u'src': None, u'name': u'kernel-uek', u'sum': [u'md5', u'ef18039f55dde3476cbb491ae278c440'], u'filename': u'kernel-uek-2.6.32-100.37.1.el5uek.src.rpm', u'epoch': u'0', u'version': u'2.6.32', u'release': u'100.37.1.el5uek', u'arch': u'src'}, {u'src': None, u'name': u'kernel-uek', u'sum': [u'md5', u'77c5742232605d710f0d51945fbdd7b4'], u'filename': u'kernel-uek-2.6.32-100.37.1.el5uek.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.32', u'release': u'100.37.1.el5uek', u'arch': u'x86_64'}, {u'src': None, u'name': u'kernel-uek-debug', u'sum': [u'md5', u'f5b50ac0d8b5d9ab88fd593ca274b333'], u'filename': u'kernel-uek-debug-2.6.32-100.37.1.el5uek.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.32', u'release': u'100.37.1.el5uek', u'arch': u'x86_64'}, {u'src': None, u'name': u'kernel-uek-debug-devel', u'sum': [u'md5', u'03f4e7521d36f84860f6c53425610fbe'], u'filename': u'kernel-uek-debug-devel-2.6.32-100.37.1.el5uek.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.32', u'release': u'100.37.1.el5uek', u'arch': u'x86_64'}, {u'src': None, u'name': u'kernel-uek-devel', u'sum': [u'md5', u'4ee70b06e64419036175af824ae7821e'], u'filename': u'kernel-uek-devel-2.6.32-100.37.1.el5uek.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.32', u'release': u'100.37.1.el5uek', u'arch': u'x86_64'}, {u'src': None, u'name': u'kernel-uek-doc', u'sum': [u'md5', u'47d2af743634df512081f8e2d1360795'], u'filename': u'kernel-uek-doc-2.6.32-100.37.1.el5uek.noarch.rpm', u'epoch': u'0', u'version': u'2.6.32', u'release': u'100.37.1.el5uek', u'arch': u'noarch'}, {u'src': None, u'name': u'kernel-uek-firmware', u'sum': [u'md5', u'e9b9d65411f83dcd460c76173f359443'], u'filename': u'kernel-uek-firmware-2.6.32-100.37.1.el5uek.noarch.rpm', u'epoch': u'0', u'version': u'2.6.32', u'release': u'100.37.1.el5uek', u'arch': u'noarch'}, {u'src': None, u'name': u'ofa-2.6.32-100.37.1.el5uek', u'sum': [u'md5', u'4e28108de2b1fb0c5b64bd2e83839dca'], u'filename': u'ofa-2.6.32-100.37.1.el5uek-1.5.1-4.0.28.src.rpm', u'epoch': u'0', u'version': u'1.5.1', u'release': u'4.0.28', u'arch': u'src'}, {u'src': None, u'name': u'ofa-2.6.32-100.37.1.el5uek', u'sum': [u'md5', u'13e2e6fc3f74fdf62faa53d3dcc7f6b0'], u'filename': u'ofa-2.6.32-100.37.1.el5uek-1.5.1-4.0.28.x86_64.rpm', u'epoch': u'0', u'version': u'1.5.1', u'release': u'4.0.28', u'arch': u'x86_64'}, {u'src': None, u'name': u'ofa-2.6.32-100.37.1.el5uekdebug', u'sum': [u'md5', u'4be66eea9095114e5ab74e37628f8c7d'], u'filename': u'ofa-2.6.32-100.37.1.el5uekdebug-1.5.1-4.0.28.x86_64.rpm', u'epoch': u'0', u'version': u'1.5.1', u'release': u'4.0.28', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u"\n[2.6.32-200.19.1.el6uek]\n- Apply new fix for CVE-2011-1576.\n\n[2.6.32-200.18.1.el6uek]\n- Revert 'proc: fix a race in do_io_accounting'\n\n[2.6.32-200.17.1.el6uek]\n- net: Fix memory leak/corruption on VLAN GRO_DROP {CVE-2011-1576}\n- iommu-api: Extension to check for interrupt remapping {CVE-2011-1898}\n- KVM: IOMMU: Disable device assignment without interrupt remapping {CVE-2011-1898}\n- ext4: Fix max file size and logical block counting of extent format file {CVE-2011-2695}\n- nl80211: fix overflow in ssid_len {CVE-2011-2517}\n- Bluetooth: Prevent buffer overflow in l2cap config request {CVE-2011-2497}\n- proc: fix a race in do_io_accounting() {CVE-2011-2495}\n- proc: restrict access to /proc/PID/io {CVE-2011-2495}\n- Bluetooth: l2cap and rfcomm: fix 1 byte infoleak to userspace {CVE-2011-2492}\n- NLM: Don't hang forever on NLM unlock requests {CVE-2011-2491}\n- ksm: fix NULL pointer dereference in scan_get_next_rmap_item() {CVE-2011-2183}", u'issued': u'2011-08-24', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELSA-2011-2025.html', u'type': u'self', u'id': None, u'title': u'ELSA-2011-2025'}, {u'href': u'http://linux.oracle.com/cve/CVE-2011-1576.html', u'type': u'cve', u'id': u'CVE-2011-1576', u'title': u'CVE-2011-1576'}, {u'href': u'http://linux.oracle.com/cve/CVE-2011-1898.html', u'type': u'cve', u'id': u'CVE-2011-1898', u'title': u'CVE-2011-1898'}, {u'href': u'http://linux.oracle.com/cve/CVE-2011-2183.html', u'type': u'cve', u'id': u'CVE-2011-2183', u'title': u'CVE-2011-2183'}, {u'href': u'http://linux.oracle.com/cve/CVE-2011-2491.html', u'type': u'cve', u'id': u'CVE-2011-2491', u'title': u'CVE-2011-2491'}, {u'href': u'http://linux.oracle.com/cve/CVE-2011-2492.html', u'type': u'cve', u'id': u'CVE-2011-2492', u'title': u'CVE-2011-2492'}, {u'href': u'http://linux.oracle.com/cve/CVE-2011-2495.html', u'type': u'cve', u'id': u'CVE-2011-2495', u'title': u'CVE-2011-2495'}, {u'href': u'http://linux.oracle.com/cve/CVE-2011-2497.html', u'type': u'cve', u'id': u'CVE-2011-2497', u'title': u'CVE-2011-2497'}, {u'href': u'http://linux.oracle.com/cve/CVE-2011-2517.html', u'type': u'cve', u'id': u'CVE-2011-2517', u'title': u'CVE-2011-2517'}, {u'href': u'http://linux.oracle.com/cve/CVE-2011-2695.html', u'type': u'cve', u'id': u'CVE-2011-2695', u'title': u'CVE-2011-2695'}], u'_content_type_id': u'erratum', u'_id': u'3e84aa02-edce-480f-8967-c880154a3335', u'from': u'el-errata@oss.oracle.com', u'severity': u'Important', u'title': u' Unbreakable Enterprise kernel security and bug fix update', u'_ns': u'units_erratum', u'rights': u'Copyright 2011 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 6', u'reboot_suggested': False, u'type': u'security', u'pkglist': [{u'packages': [{u'src': None, u'name': u'kernel-uek', u'sum': [u'md5', u'7174fd1202527d4049befcd8f9cdad63'], u'filename': u'kernel-uek-2.6.32-200.19.1.el6uek.src.rpm', u'epoch': u'0', u'version': u'2.6.32', u'release': u'200.19.1.el6uek', u'arch': u'src'}, {u'src': None, u'name': u'kernel-uek', u'sum': [u'md5', u'01e42243991bf0495328747ef93b43a0'], u'filename': u'kernel-uek-2.6.32-200.19.1.el6uek.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.32', u'release': u'200.19.1.el6uek', u'arch': u'x86_64'}, {u'src': None, u'name': u'kernel-uek-debug', u'sum': [u'md5', u'cc6636fe915763ed396e466ea04ce4a6'], u'filename': u'kernel-uek-debug-2.6.32-200.19.1.el6uek.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.32', u'release': u'200.19.1.el6uek', u'arch': u'x86_64'}, {u'src': None, u'name': u'kernel-uek-debug-devel', u'sum': [u'md5', u'90bbb10ec63d952535ff805a35285875'], u'filename': u'kernel-uek-debug-devel-2.6.32-200.19.1.el6uek.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.32', u'release': u'200.19.1.el6uek', u'arch': u'x86_64'}, {u'src': None, u'name': u'kernel-uek-devel', u'sum': [u'md5', u'c1908dc4597f8949b8570dcbc21ad41e'], u'filename': u'kernel-uek-devel-2.6.32-200.19.1.el6uek.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.32', u'release': u'200.19.1.el6uek', u'arch': u'x86_64'}, {u'src': None, u'name': u'kernel-uek-doc', u'sum': [u'md5', u'5c8574c33122d7568ff5a19926314fa3'], u'filename': u'kernel-uek-doc-2.6.32-200.19.1.el6uek.noarch.rpm', u'epoch': u'0', u'version': u'2.6.32', u'release': u'200.19.1.el6uek', u'arch': u'noarch'}, {u'src': None, u'name': u'kernel-uek-firmware', u'sum': [u'md5', u'f42c525cbbe74b203acd7eca7603d202'], u'filename': u'kernel-uek-firmware-2.6.32-200.19.1.el6uek.noarch.rpm', u'epoch': u'0', u'version': u'2.6.32', u'release': u'200.19.1.el6uek', u'arch': u'noarch'}, {u'src': None, u'name': u'kernel-uek-headers', u'sum': [u'md5', u'297a9774168a246a9298cce27df54fd2'], u'filename': u'kernel-uek-headers-2.6.32-200.19.1.el6uek.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.32', u'release': u'200.19.1.el6uek', u'arch': u'x86_64'}, {u'src': None, u'name': u'ofa-2.6.32-200.19.1.el6uek', u'sum': [u'md5', u'ff39e02682b42baf5875344f5c4fedac'], u'filename': u'ofa-2.6.32-200.19.1.el6uek-1.5.1-4.0.47.src.rpm', u'epoch': u'0', u'version': u'1.5.1', u'release': u'4.0.47', u'arch': u'src'}, {u'src': None, u'name': u'ofa-2.6.32-200.19.1.el6uek', u'sum': [u'md5', u'751f2226123f59e2e2363c85f52c197c'], u'filename': u'ofa-2.6.32-200.19.1.el6uek-1.5.1-4.0.47.x86_64.rpm', u'epoch': u'0', u'version': u'1.5.1', u'release': u'4.0.47', u'arch': u'x86_64'}, {u'src': None, u'name': u'ofa-2.6.32-200.19.1.el6uekdebug', u'sum': [u'md5', u'4b4627c9148beabe2a1ac3a9653185d5'], u'filename': u'ofa-2.6.32-200.19.1.el6uekdebug-1.5.1-4.0.47.x86_64.rpm', u'epoch': u'0', u'version': u'1.5.1', u'release': u'4.0.47', u'arch': u'x86_64'}], u'name': u'ol6_x86_64_latest', u'short': u'ol6_x86_64_latest'}, {u'packages': [{u'src': None, u'name': u'kernel-uek', u'sum': [u'md5', u'1d9fa78099ecfdf8ff877881ba3905fd'], u'filename': u'kernel-uek-2.6.32-200.19.1.el5uek.src.rpm', u'epoch': u'0', u'version': u'2.6.32', u'release': u'200.19.1.el5uek', u'arch': u'src'}, {u'src': None, u'name': u'kernel-uek', u'sum': [u'md5', u'9cd08e2a083b274a30848f2c0265c31d'], u'filename': u'kernel-uek-2.6.32-200.19.1.el5uek.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.32', u'release': u'200.19.1.el5uek', u'arch': u'x86_64'}, {u'src': None, u'name': u'kernel-uek-debug', u'sum': [u'md5', u'5d787f57af016573d60e357b993dec47'], u'filename': u'kernel-uek-debug-2.6.32-200.19.1.el5uek.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.32', u'release': u'200.19.1.el5uek', u'arch': u'x86_64'}, {u'src': None, u'name': u'kernel-uek-debug-devel', u'sum': [u'md5', u'59d84e3444cc93eb03b7d691f49d992c'], u'filename': u'kernel-uek-debug-devel-2.6.32-200.19.1.el5uek.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.32', u'release': u'200.19.1.el5uek', u'arch': u'x86_64'}, {u'src': None, u'name': u'kernel-uek-devel', u'sum': [u'md5', u'52de0229ba030a76f9f8ffb27568ea3b'], u'filename': u'kernel-uek-devel-2.6.32-200.19.1.el5uek.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.32', u'release': u'200.19.1.el5uek', u'arch': u'x86_64'}, {u'src': None, u'name': u'kernel-uek-doc', u'sum': [u'md5', u'1190e0a15bdb70811ba350f626d74adf'], u'filename': u'kernel-uek-doc-2.6.32-200.19.1.el5uek.noarch.rpm', u'epoch': u'0', u'version': u'2.6.32', u'release': u'200.19.1.el5uek', u'arch': u'noarch'}, {u'src': None, u'name': u'kernel-uek-firmware', u'sum': [u'md5', u'2ab03105e992718b1a5d60f61145953b'], u'filename': u'kernel-uek-firmware-2.6.32-200.19.1.el5uek.noarch.rpm', u'epoch': u'0', u'version': u'2.6.32', u'release': u'200.19.1.el5uek', u'arch': u'noarch'}, {u'src': None, u'name': u'ofa-2.6.32-200.19.1.el5uek', u'sum': [u'md5', u'59fe85579aa25456362412a5bd174b5e'], u'filename': u'ofa-2.6.32-200.19.1.el5uek-1.5.1-4.0.28.src.rpm', u'epoch': u'0', u'version': u'1.5.1', u'release': u'4.0.28', u'arch': u'src'}, {u'src': None, u'name': u'ofa-2.6.32-200.19.1.el5uek', u'sum': [u'md5', u'2b727e9cda5354f2c2ce559adf80107c'], u'filename': u'ofa-2.6.32-200.19.1.el5uek-1.5.1-4.0.28.x86_64.rpm', u'epoch': u'0', u'version': u'1.5.1', u'release': u'4.0.28', u'arch': u'x86_64'}, {u'src': None, u'name': u'ofa-2.6.32-200.19.1.el5uekdebug', u'sum': [u'md5', u'0ac64bcead76e7c42cf1f4c9520422e2'], u'filename': u'ofa-2.6.32-200.19.1.el5uekdebug-1.5.1-4.0.28.x86_64.rpm', u'epoch': u'0', u'version': u'1.5.1', u'release': u'4.0.28', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u"\n[2.6.32-200.20.1.el6uek]\n- af_packet: prevent information leak {CVE-2011-2898}\n- gro: Only reset frag0 when skb can be pulled {CVE-2011-2723}\n- vm: fix vm_pgoff wrap in stack expansion {CVE-2011-2496}\n- vm: fix vm_pgoff wrap in upward expansion {CVE-2011-2496}\n- taskstats: don't allow duplicate entries in listener mode {CVE-2011-2484}\n- Ecryptfs: Add mount option to check uid of device being mounted {CVE-2011-1833}", u'issued': u'2011-10-07', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELSA-2011-2029.html', u'type': u'self', u'id': None, u'title': u'ELSA-2011-2029'}, {u'href': u'http://linux.oracle.com/cve/CVE-2011-1833.html', u'type': u'cve', u'id': u'CVE-2011-1833', u'title': u'CVE-2011-1833'}, {u'href': u'http://linux.oracle.com/cve/CVE-2011-2484.html', u'type': u'cve', u'id': u'CVE-2011-2484', u'title': u'CVE-2011-2484'}, {u'href': u'http://linux.oracle.com/cve/CVE-2011-2496.html', u'type': u'cve', u'id': u'CVE-2011-2496', u'title': u'CVE-2011-2496'}, {u'href': u'http://linux.oracle.com/cve/CVE-2011-2723.html', u'type': u'cve', u'id': u'CVE-2011-2723', u'title': u'CVE-2011-2723'}, {u'href': u'http://linux.oracle.com/cve/CVE-2011-2898.html', u'type': u'cve', u'id': u'CVE-2011-2898', u'title': u'CVE-2011-2898'}], u'_content_type_id': u'erratum', u'_id': u'ade87266-3ccc-4c3f-a11c-8a08339e0493', u'from': u'el-errata@oss.oracle.com', u'severity': u'Important', u'title': u' Unbreakable Enterprise kernel security update', u'_ns': u'units_erratum', u'rights': u'Copyright 2011 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 6', u'reboot_suggested': False, u'type': u'security', u'pkglist': [{u'packages': [{u'src': None, u'name': u'kernel-uek', u'sum': [u'md5', u'c0462ed9a87122423ca17c78d544ae43'], u'filename': u'kernel-uek-2.6.32-200.20.1.el6uek.src.rpm', u'epoch': u'0', u'version': u'2.6.32', u'release': u'200.20.1.el6uek', u'arch': u'src'}, {u'src': None, u'name': u'kernel-uek', u'sum': [u'md5', u'22f8fa3982b0149bbef906c26d0b00f0'], u'filename': u'kernel-uek-2.6.32-200.20.1.el6uek.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.32', u'release': u'200.20.1.el6uek', u'arch': u'x86_64'}, {u'src': None, u'name': u'kernel-uek-debug', u'sum': [u'md5', u'9bc3c89e589345016dca3f3b69d0993d'], u'filename': u'kernel-uek-debug-2.6.32-200.20.1.el6uek.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.32', u'release': u'200.20.1.el6uek', u'arch': u'x86_64'}, {u'src': None, u'name': u'kernel-uek-debug-devel', u'sum': [u'md5', u'f6cdf6b12c2a478ff9412c299a8e278e'], u'filename': u'kernel-uek-debug-devel-2.6.32-200.20.1.el6uek.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.32', u'release': u'200.20.1.el6uek', u'arch': u'x86_64'}, {u'src': None, u'name': u'kernel-uek-devel', u'sum': [u'md5', u'3a215a363f93fed6353af32d652347a4'], u'filename': u'kernel-uek-devel-2.6.32-200.20.1.el6uek.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.32', u'release': u'200.20.1.el6uek', u'arch': u'x86_64'}, {u'src': None, u'name': u'kernel-uek-doc', u'sum': [u'md5', u'c031ec8779871107fa6cb577618226e5'], u'filename': u'kernel-uek-doc-2.6.32-200.20.1.el6uek.noarch.rpm', u'epoch': u'0', u'version': u'2.6.32', u'release': u'200.20.1.el6uek', u'arch': u'noarch'}, {u'src': None, u'name': u'kernel-uek-firmware', u'sum': [u'md5', u'ffb48d7f7503932b01be8bd2e6d220e5'], u'filename': u'kernel-uek-firmware-2.6.32-200.20.1.el6uek.noarch.rpm', u'epoch': u'0', u'version': u'2.6.32', u'release': u'200.20.1.el6uek', u'arch': u'noarch'}, {u'src': None, u'name': u'kernel-uek-headers', u'sum': [u'md5', u'c9e5caefa4d4acecbe9933b56d22ac9e'], u'filename': u'kernel-uek-headers-2.6.32-200.20.1.el6uek.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.32', u'release': u'200.20.1.el6uek', u'arch': u'x86_64'}, {u'src': None, u'name': u'ofa-2.6.32-200.20.1.el6uek', u'sum': [u'md5', u'54d6f7b025f6c41a7bfa8e712d949323'], u'filename': u'ofa-2.6.32-200.20.1.el6uek-1.5.1-4.0.47.src.rpm', u'epoch': u'0', u'version': u'1.5.1', u'release': u'4.0.47', u'arch': u'src'}, {u'src': None, u'name': u'ofa-2.6.32-200.20.1.el6uek', u'sum': [u'md5', u'af6331bca851bdd846a2331e46ff0f67'], u'filename': u'ofa-2.6.32-200.20.1.el6uek-1.5.1-4.0.47.x86_64.rpm', u'epoch': u'0', u'version': u'1.5.1', u'release': u'4.0.47', u'arch': u'x86_64'}, {u'src': None, u'name': u'ofa-2.6.32-200.20.1.el6uekdebug', u'sum': [u'md5', u'b63680dde89c31a112c4cdd924657237'], u'filename': u'ofa-2.6.32-200.20.1.el6uekdebug-1.5.1-4.0.47.x86_64.rpm', u'epoch': u'0', u'version': u'1.5.1', u'release': u'4.0.47', u'arch': u'x86_64'}], u'name': u'ol6_x86_64_latest', u'short': u'ol6_x86_64_latest'}, {u'packages': [{u'src': None, u'name': u'kernel-uek', u'sum': [u'md5', u'7b60c561821f75459ac837b5071dfc52'], u'filename': u'kernel-uek-2.6.32-200.20.1.el5uek.src.rpm', u'epoch': u'0', u'version': u'2.6.32', u'release': u'200.20.1.el5uek', u'arch': u'src'}, {u'src': None, u'name': u'kernel-uek', u'sum': [u'md5', u'e8e79422cb998a7b66f24aa9b124c40a'], u'filename': u'kernel-uek-2.6.32-200.20.1.el5uek.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.32', u'release': u'200.20.1.el5uek', u'arch': u'x86_64'}, {u'src': None, u'name': u'kernel-uek-debug', u'sum': [u'md5', u'32652bea1cf695e023fa0540b104822b'], u'filename': u'kernel-uek-debug-2.6.32-200.20.1.el5uek.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.32', u'release': u'200.20.1.el5uek', u'arch': u'x86_64'}, {u'src': None, u'name': u'kernel-uek-debug-devel', u'sum': [u'md5', u'200807d33d838ce60ff68ed02ed1197e'], u'filename': u'kernel-uek-debug-devel-2.6.32-200.20.1.el5uek.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.32', u'release': u'200.20.1.el5uek', u'arch': u'x86_64'}, {u'src': None, u'name': u'kernel-uek-devel', u'sum': [u'md5', u'b96ec7f33cacfd0c0993026cbdbb917f'], u'filename': u'kernel-uek-devel-2.6.32-200.20.1.el5uek.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.32', u'release': u'200.20.1.el5uek', u'arch': u'x86_64'}, {u'src': None, u'name': u'kernel-uek-doc', u'sum': [u'md5', u'4a4f1c866b81cb0f01848645ea7068f2'], u'filename': u'kernel-uek-doc-2.6.32-200.20.1.el5uek.noarch.rpm', u'epoch': u'0', u'version': u'2.6.32', u'release': u'200.20.1.el5uek', u'arch': u'noarch'}, {u'src': None, u'name': u'kernel-uek-firmware', u'sum': [u'md5', u'b8a33424060f62d2bb7812e0d5721042'], u'filename': u'kernel-uek-firmware-2.6.32-200.20.1.el5uek.noarch.rpm', u'epoch': u'0', u'version': u'2.6.32', u'release': u'200.20.1.el5uek', u'arch': u'noarch'}, {u'src': None, u'name': u'ofa-2.6.32-200.20.1.el5uek', u'sum': [u'md5', u'd60ea52e8ba44b04250ce8d80f2f4a93'], u'filename': u'ofa-2.6.32-200.20.1.el5uek-1.5.1-4.0.53.src.rpm', u'epoch': u'0', u'version': u'1.5.1', u'release': u'4.0.53', u'arch': u'src'}, {u'src': None, u'name': u'ofa-2.6.32-200.20.1.el5uek', u'sum': [u'md5', u'2413873d1a42a244684fabc19050a239'], u'filename': u'ofa-2.6.32-200.20.1.el5uek-1.5.1-4.0.53.x86_64.rpm', u'epoch': u'0', u'version': u'1.5.1', u'release': u'4.0.53', u'arch': u'x86_64'}, {u'src': None, u'name': u'ofa-2.6.32-200.20.1.el5uekdebug', u'sum': [u'md5', u'22c050f096716dbecbc20e57c64ac454'], u'filename': u'ofa-2.6.32-200.20.1.el5uekdebug-1.5.1-4.0.53.x86_64.rpm', u'epoch': u'0', u'version': u'1.5.1', u'release': u'4.0.53', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u"\n[2.6.32-200.23.1.el6uek]\n- net: Remove atmclip.h to prevent break kabi check.\n- KConfig: add CONFIG_UEK5=n to ol6/config-generic\n\n[2.6.32-200.22.1.el6uek]\n- ipv6: make fragment identifications less predictable (Joe Jin) {CVE-2011-2699}\n- vlan: fix panic when handling priority tagged frames (Joe Jin) {CVE-2011-3593}\n- ipv6: udp: fix the wrong headroom check (Maxim Uvarov) {CVE-2011-4326}\n- b43: allocate receive buffers big enough for max frame len + offset (Maxim Uvarov) {CVE-2011-3359}\n- fuse: check size of FUSE_NOTIFY_INVAL_ENTRY message (Maxim Uvarov) {CVE-2011-3353}\n- cifs: fix possible memory corruption in CIFSFindNext (Maxim Uvarov) {CVE-2011-3191}\n- crypto: md5 - Add export support (Maxim Uvarov) {CVE-2011-2699}\n- fs/partitions/efi.c: corrupted GUID partition tables can cause kernel oops (Maxim Uvarov) {CVE-2011-1577}\n- block: use struct parsed_partitions *state universally in partition check code (Maxim Uvarov)\n- net: Compute protocol sequence numbers and fragment IDs using MD5. (Maxim Uvarov) {CVE-2011-3188}\n- crypto: Move md5_transform to lib/md5.c (Maxim Uvarov) {CVE-2011-3188}\n- perf tools: do not look at ./config for configuration (Maxim Uvarov) {CVE-2011-2905}\n- Make TASKSTATS require root access (Maxim Uvarov) {CVE-2011-2494}\n- TPM: Zero buffer after copying to userspace (Maxim Uvarov) {CVE-2011-1162}\n- TPM: Call tpm_transmit with correct size (Maxim Uvarov){CVE-2011-1161}\n- fnic: fix panic while booting in fnic(Xiaowei Hu)\n- Revert 'PCI hotplug: acpiphp: set current_state to D0 in register_slot' (Guru Anbalagane)\n- xen: drop xen_sched_clock in favour of using plain wallclock time (Jeremy Fitzhardinge)\n\n[2.6.32-200.21.1.el6uek]\n- PCI: Set device power state to PCI_D0 for device without native PM support\n (Ajaykumar Hotchandani) [orabug 13033435]", u'issued': u'2011-11-25', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELSA-2011-2033.html', u'type': u'self', u'id': None, u'title': u'ELSA-2011-2033'}, {u'href': u'http://linux.oracle.com/cve/CVE-2011-1162.html', u'type': u'cve', u'id': u'CVE-2011-1162', u'title': u'CVE-2011-1162'}, {u'href': u'http://linux.oracle.com/cve/CVE-2011-1577.html', u'type': u'cve', u'id': u'CVE-2011-1577', u'title': u'CVE-2011-1577'}, {u'href': u'http://linux.oracle.com/cve/CVE-2011-2494.html', u'type': u'cve', u'id': u'CVE-2011-2494', u'title': u'CVE-2011-2494'}, {u'href': u'http://linux.oracle.com/cve/CVE-2011-2699.html', u'type': u'cve', u'id': u'CVE-2011-2699', u'title': u'CVE-2011-2699'}, {u'href': u'http://linux.oracle.com/cve/CVE-2011-3188.html', u'type': u'cve', u'id': u'CVE-2011-3188', u'title': u'CVE-2011-3188'}, {u'href': u'http://linux.oracle.com/cve/CVE-2011-3191.html', u'type': u'cve', u'id': u'CVE-2011-3191', u'title': u'CVE-2011-3191'}, {u'href': u'http://linux.oracle.com/cve/CVE-2011-3353.html', u'type': u'cve', u'id': u'CVE-2011-3353', u'title': u'CVE-2011-3353'}, {u'href': u'http://linux.oracle.com/cve/CVE-2011-3593.html', u'type': u'cve', u'id': u'CVE-2011-3593', u'title': u'CVE-2011-3593'}, {u'href': u'http://linux.oracle.com/cve/CVE-2011-4326.html', u'type': u'cve', u'id': u'CVE-2011-4326', u'title': u'CVE-2011-4326'}], u'_content_type_id': u'erratum', u'_id': u'72f9862f-33df-4439-aa40-d8cf66b7864c', u'from': u'el-errata@oss.oracle.com', u'severity': u'Important', u'title': u' Unbreakable Enterprise kernel security update', u'_ns': u'units_erratum', u'rights': u'Copyright 2011 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 6', u'reboot_suggested': False, u'type': u'security', u'pkglist': [{u'packages': [{u'src': None, u'name': u'kernel-uek', u'sum': [u'md5', u'f10323f1dd9a0764d4ca27a91a1d8257'], u'filename': u'kernel-uek-2.6.32-200.23.1.el6uek.src.rpm', u'epoch': u'0', u'version': u'2.6.32', u'release': u'200.23.1.el6uek', u'arch': u'src'}, {u'src': None, u'name': u'kernel-uek', u'sum': [u'md5', u'd45a428e6b2b5f00c0ebfc6c9f051bbc'], u'filename': u'kernel-uek-2.6.32-200.23.1.el6uek.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.32', u'release': u'200.23.1.el6uek', u'arch': u'x86_64'}, {u'src': None, u'name': u'kernel-uek-debug', u'sum': [u'md5', u'67f85a837c2d5f06fb600fc918020b46'], u'filename': u'kernel-uek-debug-2.6.32-200.23.1.el6uek.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.32', u'release': u'200.23.1.el6uek', u'arch': u'x86_64'}, {u'src': None, u'name': u'kernel-uek-debug-devel', u'sum': [u'md5', u'af450f91f60d56c49f5fced4def2c278'], u'filename': u'kernel-uek-debug-devel-2.6.32-200.23.1.el6uek.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.32', u'release': u'200.23.1.el6uek', u'arch': u'x86_64'}, {u'src': None, u'name': u'kernel-uek-devel', u'sum': [u'md5', u'cbb90d399a4842418aae2c79181c0c9a'], u'filename': u'kernel-uek-devel-2.6.32-200.23.1.el6uek.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.32', u'release': u'200.23.1.el6uek', u'arch': u'x86_64'}, {u'src': None, u'name': u'kernel-uek-doc', u'sum': [u'md5', u'f426c44460e0b5df1eaa06bcb864ae5b'], u'filename': u'kernel-uek-doc-2.6.32-200.23.1.el6uek.noarch.rpm', u'epoch': u'0', u'version': u'2.6.32', u'release': u'200.23.1.el6uek', u'arch': u'noarch'}, {u'src': None, u'name': u'kernel-uek-firmware', u'sum': [u'md5', u'ac02204353de00f74e6a83bedc5687ab'], u'filename': u'kernel-uek-firmware-2.6.32-200.23.1.el6uek.noarch.rpm', u'epoch': u'0', u'version': u'2.6.32', u'release': u'200.23.1.el6uek', u'arch': u'noarch'}, {u'src': None, u'name': u'kernel-uek-headers', u'sum': [u'md5', u'046f2352b9fc049f14785a77e116478f'], u'filename': u'kernel-uek-headers-2.6.32-200.23.1.el6uek.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.32', u'release': u'200.23.1.el6uek', u'arch': u'x86_64'}, {u'src': None, u'name': u'ofa-2.6.32-200.23.1.el6uek', u'sum': [u'md5', u'fba85c96b7b911bfaccd38800e0e6c29'], u'filename': u'ofa-2.6.32-200.23.1.el6uek-1.5.1-4.0.47.src.rpm', u'epoch': u'0', u'version': u'1.5.1', u'release': u'4.0.47', u'arch': u'src'}, {u'src': None, u'name': u'ofa-2.6.32-200.23.1.el6uek', u'sum': [u'md5', u'98aa544a27652f6666e4d0944aa7f805'], u'filename': u'ofa-2.6.32-200.23.1.el6uek-1.5.1-4.0.47.x86_64.rpm', u'epoch': u'0', u'version': u'1.5.1', u'release': u'4.0.47', u'arch': u'x86_64'}, {u'src': None, u'name': u'ofa-2.6.32-200.23.1.el6uekdebug', u'sum': [u'md5', u'fe06d0c76863bda587b9817b6e730280'], u'filename': u'ofa-2.6.32-200.23.1.el6uekdebug-1.5.1-4.0.47.x86_64.rpm', u'epoch': u'0', u'version': u'1.5.1', u'release': u'4.0.47', u'arch': u'x86_64'}], u'name': u'ol6_x86_64_latest', u'short': u'ol6_x86_64_latest'}, {u'packages': [{u'src': None, u'name': u'kernel-uek', u'sum': [u'md5', u'c030314f17295981973ed7772ff8613b'], u'filename': u'kernel-uek-2.6.32-200.23.1.el5uek.src.rpm', u'epoch': u'0', u'version': u'2.6.32', u'release': u'200.23.1.el5uek', u'arch': u'src'}, {u'src': None, u'name': u'kernel-uek', u'sum': [u'md5', u'0a1317322e0c7741b447363822330c7c'], u'filename': u'kernel-uek-2.6.32-200.23.1.el5uek.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.32', u'release': u'200.23.1.el5uek', u'arch': u'x86_64'}, {u'src': None, u'name': u'kernel-uek-debug', u'sum': [u'md5', u'8c23dec5829620802fb39d98553e6058'], u'filename': u'kernel-uek-debug-2.6.32-200.23.1.el5uek.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.32', u'release': u'200.23.1.el5uek', u'arch': u'x86_64'}, {u'src': None, u'name': u'kernel-uek-debug-devel', u'sum': [u'md5', u'1e99f76ee3a423e834b4b06441db5d75'], u'filename': u'kernel-uek-debug-devel-2.6.32-200.23.1.el5uek.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.32', u'release': u'200.23.1.el5uek', u'arch': u'x86_64'}, {u'src': None, u'name': u'kernel-uek-devel', u'sum': [u'md5', u'81fab456149556414d9bf634f4f2f558'], u'filename': u'kernel-uek-devel-2.6.32-200.23.1.el5uek.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.32', u'release': u'200.23.1.el5uek', u'arch': u'x86_64'}, {u'src': None, u'name': u'kernel-uek-doc', u'sum': [u'md5', u'4237134c79b473e3bfb03e18378fa256'], u'filename': u'kernel-uek-doc-2.6.32-200.23.1.el5uek.noarch.rpm', u'epoch': u'0', u'version': u'2.6.32', u'release': u'200.23.1.el5uek', u'arch': u'noarch'}, {u'src': None, u'name': u'kernel-uek-firmware', u'sum': [u'md5', u'5f71b9f8e5fd0614b54b58e4d5493e9f'], u'filename': u'kernel-uek-firmware-2.6.32-200.23.1.el5uek.noarch.rpm', u'epoch': u'0', u'version': u'2.6.32', u'release': u'200.23.1.el5uek', u'arch': u'noarch'}, {u'src': None, u'name': u'ofa-2.6.32-200.23.1.el5uek', u'sum': [u'md5', u'60c4ac997a51a48061e6b682654e0ed9'], u'filename': u'ofa-2.6.32-200.23.1.el5uek-1.5.1-4.0.53.src.rpm', u'epoch': u'0', u'version': u'1.5.1', u'release': u'4.0.53', u'arch': u'src'}, {u'src': None, u'name': u'ofa-2.6.32-200.23.1.el5uek', u'sum': [u'md5', u'514d715bccb9c47d6bf18f4146d5c696'], u'filename': u'ofa-2.6.32-200.23.1.el5uek-1.5.1-4.0.53.x86_64.rpm', u'epoch': u'0', u'version': u'1.5.1', u'release': u'4.0.53', u'arch': u'x86_64'}, {u'src': None, u'name': u'ofa-2.6.32-200.23.1.el5uekdebug', u'sum': [u'md5', u'73afd0595984c29129376a39687e77a1'], u'filename': u'ofa-2.6.32-200.23.1.el5uekdebug-1.5.1-4.0.53.x86_64.rpm', u'epoch': u'0', u'version': u'1.5.1', u'release': u'4.0.53', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u"\n[2.6.32-300.3.1.el6uek]\n- proc: fix oops on invalid /proc/<pid>/maps access (Linux Torvalds)\n- Revert 'capabilities: do not grant full privs for setuid w/ file caps + no\n effective caps' (Joe Jin)\n- [mm]: Use MMF_COMPAT instead ia32_compat to prevent kabi be broken (Joe Jin)\n- proc: enable writing to /proc/pid/mem (Stephen Wilson)\n- proc: make check_mem_permission() return an mm_struct on success (Stephen Wilson)\n- proc: hold cred_guard_mutex in check_mem_permission() (Joe Jin)\n- proc: disable mem_write after exec (Stephen Wilson)\n- mm: implement access_remote_vm (Stephen Wilson)\n- mm: factor out main logic of access_process_vm (Stephen Wilson)\n- mm: use mm_struct to resolve gate vma's in __get_user_pages (Stephen Wilson)\n- mm: arch: rename in_gate_area_no_task to in_gate_area_no_mm (Stephen Wilson)\n- mm: arch: make in_gate_area take an mm_struct instead of a task_struct\n (Stephen Wilson)\n- mm: arch: make get_gate_vma take an mm_struct instead of a task_struct\n (Stephen Wilson)\n- x86: mark associated mm when running a task in 32 bit compatibility mode\n (Stephen Wilson)\n- x86: add context tag to mark mm when running a task in 32-bit compatibility\n mode (Stephen Wilson)\n- auxv: require the target to be tracable (or yourself) (Al Viro)\n- close race in /proc/*/environ (Al Viro)\n- report errors in /proc/*/*map* sanely (Al Viro)\n- pagemap: close races with suid execve (Al Viro)\n- make sessionid permissions in /proc/*/task/* match those in /proc/* (Al Viro)\n- Revert 'report errors in /proc/*/*map* sanely' (Joe Jin)\n- Revert 'proc: fix oops on invalid /proc/<pid>/maps access' (Joe Jin)\n\n[2.6.32-300.2.1.el6uek]\n- [kabi] Add missing kabi (Srinivas Maturi)\n- report errors in /proc/*/*map* sanely (Joe Jin)\n\n[2.6.32-300.1.1.el6uek]\n- [SCSI] qla4xxx: fix build error for OL6 (Joe Jin)\n- Ecryptfs: Add mount option to check uid of device being mounted = expect uid (Maxim Uvarov)\n- proc: fix oops on invalid /proc/<pid>/maps access (Linus Torvalds)\n- x86/mm: Fix pgd_lock deadlock (Joe Jin)\n- x86, mm: Hold mm->page_table_lock while doing vmalloc_sync (Joe Jin)\n- proc: restrict access to /proc/PID/io (Vasiliy Kulikov)\n- futex: Fix regression with read only mappings (Shawn Bohrer)\n- x86-32, vdso: On system call restart after SYSENTER, use int db_5.ELSA-2011-2037x80 (H. Peter Anvin)\n- x86, UV: Remove UV delay in starting slave cpus (Jack Steiner)\n- Include several Xen pv hugepage fixes. (Dave McCracken)\n- GRO: fix merging a paged skb after non-paged skbs (Michal Schmidt)\n- md/linear: avoid corrupting structure while waiting for rcu_free to complete. (NeilBrown)\n- xen: x86_32: do not enable iterrupts when returning from exception in interrupt context (Igor Mammedov)\n- xen/smp: Warn user why they keel over - nosmp or noapic and what to use instead. (Konrad Rzeszutek Wilk)\n- hvc_console: Improve tty/console put_chars handling (Hendrik Brueckner)\n- 3w-9xxx: fix iommu_iova leak (James Bottomley)\n- aacraid: reset should disable MSI interrupt (Vasily Averin)\n- libsas: fix failure to revalidate domain for anything but the first expander child. (Mark Salyzyn)\n- splice: direct_splice_actor() should not use pos in sd (Changli Gao)\n- libsas: fix panic when single phy is disabled on a wide port (Mark Salyzyn)\n- epoll: fix spurious lockdep warnings (Nelson Elhage)\n- kobj_uevent: Ignore if some listeners cannot handle message (Milan Broz)\n- kmod: prevent kmod_loop_msg overflow in __request_module() (Jiri Kosina)\n- nfsd4: ignore WANT bits in open downgrade (J. Bruce Fields)\n- nfsd4: Remove check for a 32-bit cookie in nfsd4_readdir() (Bernd Schubert)\n- iommu/amd: Fix wrong shift direction (Joerg Roedel)\n- cfq: Don't allow queue merges for queues that have no process references (Jeff Moyer)\n- cfq-iosched: get rid of the coop_preempt flag (Jens Axboe)\n- cfq: break apart merged cfqqs if they stop cooperating (Jeff Moyer)\n- cfq: change the meaning of the cfqq_coop flag (Jeff Moyer)\n- cfq: merge cooperating cfq_queues (Jeff Moyer)\n- cfq: calculate the seek_mean per cfq_queue not per cfq_io_context (Jeff Moyer)\n- kcore: fix test for end of list (Dan Carpenter)\n- deal with races in /proc/*/{syscall,stack,personality} (Al Viro)\n- NLM: Don't hang forever on NLM unlock requests (Maxim Uvarov)\n- vm: fix vm_pgoff wrap in upward expansion (Hugh Dickins)\n- vm: fix vm_pgoff wrap in stack expansion (Linus Torvalds)\n- net_sched: Fix qdisc_notify() (Eric Dumazet)\n- drivers/net/rionet.c: fix ethernet address macros for LE platforms (Alexandre Bounine)\n- ext2,ext3,ext4: don't inherit APPEND_FL or IMMUTABLE_FL for new inodes (Theodore Ts'o)\n- st: fix race in st_scsi_execute_end (Petr Uzel)\n- Make scsi_free_queue() kill pending SCSI commands (Bart Van Assche)\n- NFS/sunrpc: don't use a credential with extra groups. (NeilBrown)\n- netlink: validate NLA_MSECS length (Johannes Berg)\n- mtd: mtdchar: add missing initializer on raw write (Peter Wippich)\n- PM / Suspend: Off by one in pm_suspend() (Dan Carpenter)\n- hfs: add sanity check for file name length (Dan Carpenter)\n- md/raid5: abort any pending parity operations when array fails. (NeilBrown)\n- mm: avoid null pointer access in vm_struct via /proc/vmallocinfo (Mitsuo Hayasaka)\n- USB: Fix Corruption issue in USB ftdi driver ftdi_sio.c (Andrew Worsley)\n- usb-storage: Accept 8020i-protocol commands longer than 12 bytes (Alan Stern)\n- [SCSI] ql4xxx: upgrade to 5.02.14.00.32.01-c0 (Joe Jin)\n- [netdrv] be2net: Merge fixes for CVE-2011-3347 (Joe Jin)\n- ext4: fix BUG_ON() in ext4_ext_insert_extent() (Zheng Liu)\n- proc: fix a race in do_io_accounting() (Vasiliy Kulikov)\n- capabilities: do not grant full privs for setuid w/ file caps + no effective caps (Zhi Li)\n- KEYS: Fix a NULL pointer deref in the user-defined key type (Maxim Uvarov)\n- igb: Fix for Alt MAC Address feature on 82580 and later devices (Joe Jin)\n- [netdrv] enic: fix accidental GRO off by default (Joe Jin)\n- Fixing use of netif_set_real_num_tx_queues in cxgb4_main.c (Joe Jin)\n- firmware: Update cxgb4 NIC driver firmware (Joe Jin)\n- firmware Add latest cxgb3 firmware (Joe Jin)\n- [netdrv] cxgb3: misc fixes. (Joe Jin)\n- bnx2x: upgrade bnx2x (Joe Jin)\n- dcb: add DCBX mode to event notifier attributes (John Fastabend)\n- dcb: Use ifindex instead of ifname (Mark Rustad)\n- dcbnl: unlock on an error path in dcbnl_cee_fill() (Dan Carpenter)\n- dcbnl: Add CEE notification (Shmulik Ravid)\n- dcbnl: Aggregated CEE GET operation (Shmulik Ravid)\n- dcb: use nlmsg_free() instead of kfree() (Dan Carpenter)\n- dcb: Add missing error check in dcb_ieee_set() (John Fastabend)\n- dcb: fix return type on dcb_setapp() (John Fastabend)\n- dcb: Add dcb_ieee_getapp_mask() for drivers to query APP settings (John Fastabend)\n- dcb: Add ieee_dcb_delapp() and dcb op to delete app entry (John Fastabend)\n- dcb: Add ieee_dcb_setapp() to be used for IEEE 802.1Qaz APP data (John Fastabend)\n- net: dcbnl, add multicast group for DCB (John Fastabend)\n- dcb: Add DCBX capabilities bitmask to the get_ieee response (John Fastabend)\n- dcbnl: add support for retrieving peer configuration - cee (Shmulik Ravid)\n- dcbnl: add support for retrieving peer configuration - ieee (Shmulik Ravid)\n- net: dcbnl: check correct ops in dcbnl_ieee_set() (John Fastabend)\n- Don't potentially dereference NULL in net/dcb/dcbnl.c:dcbnl_getapp() (Jesper Juhl)\n- net: dcb: application priority is per net_device (John Fastabend)\n- dcbnl: make get_app handling symmetric for IEEE and CEE DCBx (John Fastabend)\n- dcb: use after free in dcb_flushapp() (Dan Carpenter)\n- dcb: unlock on error in dcbnl_ieee_get() (Dan Carpenter)\n- dcbnl: more informed return values for new dcbnl routines (Shmulik Ravid)\n- dcbnl: cleanup (Shmulik Ravid)\n- net_dcb: add application notifiers (John Fastabend)\n- [netdrv] firmware: add bnx2x FW 7.0.23 (Joe Jin)\n- [netdrv] Fixing use of netif_set_real_num_tx_queues in bnx2.c (Joe Jin)\n- [netdrv] tg3: drver update. (Joe Jin)\n- tg3: negate USE_PHYLIB flag check (Jiri Pirko)\n- [netdrv] e1000e: fix WoL on 82578DM and 82567V3 (Joe Jin)\n- e1000: don't enable dma receives until after dma address has been setup (Dean Nelson)\n- [SCSI] bnx2i: Fixed the endian on TTT for NOP out transmission (Eddie Wai)\n- [SCSI] bnx2fc: upgrade to 1.0.8 (Joe Jin)\n- [scsi] hpsa: add heartbeat sysfs host attribute (Joe Jin)\n- [SCSI] move PCI_DEVICE_ID_HP_CISSE to include/linux/pci_ids.h (Joe Jin)\n- [SCSI] lpfc: update to 8.3.5.45.4p (Joe Jin)\n- [SCSI] be2iscsi: upgrade to 4.1.239.0 (Joe Jin)\n- fcoe/libfcoe: Move common code for fcoe_get_lesb to fcoe_transport (Joe Jin)\n- libfc: Prevent race that causes panic during FCoE port destroy via sysfs (Joe Jin)\n- [SCSI] isci: dynamic interrupt coalescing (Dan Williams)\n- megaraid_sas: trim the space and tab. (Joe Jin)\n- megaraid_sas: Add driver workaround for PERC5/1068 kdump kernel panic (Joe Jin)\n- scsi_transport_fc: Fix deadlock during fc_remove_host (Joe Jin)\n- [SCSI] libfc: improve flogi retries to avoid lport stuck (Vasu Dev)\n- [SCSI] libfc: avoid exchanges collision during lport reset (Vasu Dev)\n- [SCSI] libfc: fix checking FC_TYPE_BLS (Vasu Dev)\n- [SCSI] libsas: fix warnings when checking sata/stp protocol (Dan Williams)\n- [SCSI] libsas: disable scanning lun > 0 on ata devices (Dan Williams)\n- [SCSI] libsas: Allow expander T-T attachments (Luben Tuikov)\n- [SCSI] isci: atapi support (Dan Williams)\n- isci: export phy events via ->lldd_control_phy() (Dan Williams)\n- [SCSI] isci: The port state should be set to stopping on the last phy. (Jeff Skirvin)\n- [SCSI] isci: fix decode of DONE_CRC_ERR TC completion status (Jeff Skirvin)\n- [SCSI] isci: SATA/STP I/O is only returned in the normal path to libsas (Jeff Skirvin)\n- [SCSI] isci: fix support for large smp requests (Dan Williams)\n- [SCSI] isci: fix missed unlock in apc_agent_timeout() (Jeff Skirvin)\n- [SCSI] isci: fix event-get pointer increment (Dan Williams)\n- [SCSI] isci: add version number (Dan Williams)\n- [SCSI] isci: fix sata response handling (Dan Williams)\n- [SCSI] isci: Leave requests alone if already terminating. (Jeff Skirvin)\n- [SCSI] isci: initial sgpio write support (Dan Williams)\n- [SCSI] isci: fix sgpio register definitions (Dan Williams)\n- [SCSI] libsas: sgpio write support (Dan Williams)\n- [SCSI] scsi scan: don't fail scans when host is in recovery (Mike Christie)\n- net: Remove atmclip.h to prevent break kabi check (Joe Jin)\n- SPEC: ol6 req dracut-kernel-004-242.0.3 (Maxim Uvarov)\n- SPEC: req udev-095-14.27.0.1.el5_7.1 or more (Maxim Uvarov)\n- SPEC: el5 mkinird more then 5.1.19.6-71.0.10 (Maxim Uvarov)\n- ipv6: make fragment identifications less predictable (Joe Jin)\n- vlan: fix panic when handling priority tagged frames (Joe Jin)\n- ipv6: udp: fix the wrong headroom check (Shan Wei)\n- b43: allocate receive buffers big enough for max frame len + offset (Maxim Uvarov)\n- fuse: check size of FUSE_NOTIFY_INVAL_ENTRY message (Miklos Szeredi)\n- cifs: fix possible memory corruption in CIFSFindNext (Jeff Layton)\n- crypto: md5 - Add export support (Maxim Uvarov)\n- fs/partitions/efi.c: corrupted GUID partition tables can cause kernel oops (Timo Warns)\n- block: use struct parsed_partitions *state universally in partition check code (Maxim Uvarov)\n- net: Compute protocol sequence numbers and fragment IDs using MD5 (Maxim Uvarov)\n- perf tools: do not look at ./config for configuration (Jonathan Nieder)\n- Make TASKSTATS require root access (Linus Torvalds)\n- TPM: Zero buffer after copying to userspace (Peter Huewe)\n- TPM: Call tpm_transmit with correct size (Peter Huewe)\n- PCI: Set device power state to PCI_D0 for device without native PM support (Ajaykumar Hotchandani)\n\n[2.6.32-300.0.12.el6uek]\n- Install include/drm headers (Maxim Uvarov) [orabug 13260234]\n- qla2xxx: Double check for command completion if abort mailbox command fails (Chad Dupuis)\n- Ensure full IOC buffer can be mapped (Martin K. Petersen)\n- Fix incorrect timeout handling (Martin K. Petersen)\n\n[2.6.32-300.0.11.el6uek]\n- fix pgoff in mbind vma merge (Caspar Zhang) [orabug 13370691]\n\n[2.6.32-300.0.10.el6uek]\n- compat_ioct: move initialization before use in sg_ioctl_trans() (Dan Carpenter)\n- genirq: Add IRQF_RESUME_EARLY and resume such IRQs earlier (Dan Carpenter)\n- xen/timer: Missing IRQF_NO_SUSPEND in timer code broke suspend [orabug 13359907]\n- pids: fix a race in pid generation that causes pids to be reused immediately (Salman) [orabug 13370594]\n- Revert 'mlx4: Updated the driver version from 1.5.1.6 August 2010 to 1.5.4.1 March 2011 update' (Maxim Uvarov) [orabug 13322248]\n\n[2.6.32-300.0.9.el6uek]\n- [firmware] bnx2x 7.0.20 (Maxim Uvarov) [orabug 13354737]\n- Revert 'qla2xxx: Double check for command completion if abort mailbox [orabug 13339986]\n- SPEC: fixes for spec file [orabugs 13359985, 13339700, 13348381]\n- kabi: Modify Kabi and enable kabicheck\n\n[2.6.32-300.0.8.el6uek]\n- ipv6: add a missing unregister_pernet_subsys call (Neil Horman)\n- SPEC: hwcap set to 1 for nosegneg (Guru Anbalagane) [orabug 13321811]\n- put firmware to kernel version specific location (Maxim Uvarov) [orabug 13254457]\n- xen: drop xen_sched_clock in favour of using plain wallclock time (Jeremy Fitzhardinge)\n- Revert '[scsi] add lockless to improve queuecommand performance'\n- fix fnic init panic and san disks are not visible (Xiaowei Hu)\n- SPEC: Add debug to the list of kernels that kernel-uek should replace in\n /etc/sysconfig/kernel (Kevin Lyons) [bug 13260459,13339700]\n- bfa: cleanup Makefile. (Joe Jin)\n- fc class: add fc host default default dev loss setting (Mike Christie)\n- fc class: add fc host dev loss sysfs file (Mike Christie)\n- add dev_loss_tmo support for lpfc, fnic and ibmvfc (Joe Jin)\n- scsi_transport_fc: Protect against overflow in dev_loss_tmo (Hannes Reinecke)\n- [netdrv] bna: cleanup Makefile. (Joe Jin)\n- PCI/e1000e: Add and use pci_disable_link_state_locked() (Yinghai Lu)\n- tracepoint: Move signal sending tracepoint to events/signal.h (Masami Hiramatsu)\n- perf_event, x86, mce: Use TRACE_EVENT() for MCE logging (Hidetoshi Seto)\n- xen: Add support for hugepages on Xen pv domains, including support for hugepages\n in the balloon driver. (Dave Mccracken)\n\n[2.6.32-300.0.7.el6uek]\n- Add entropy generation to NIC drivers\n- [netdrv] bnx2x: replace pci_find_capability to pci_pcie_cap\n- [pci] dma-mapping: dma-mapping.h: add dma_set_coherent_mask\n- PCI: introduce pci_is_pcie()\n- PCI: introduce pci_pcie_cap()\n- PCI: cache PCIe capability offset\n- [scsi] add lockless to improve queuecommand performance\n\n[2.6.32-300.0.6.el6uek]\n- [netdrv] ixgbe: correct Makefile.\n\n[2.6.32-300.0.5.el6uek]\nbnx2: upgrade to 2.1.11\nvlan: allow null VLAN ID to be used\nethtool: Add 20G bit definitions\nethtool: Add Direct Attach support to connector port reporting\nbnx2i: add pci_id for brocadcom\nfcoe: Prevent creation of an NPIV port with duplicate WWPN\nbnx2i: upgrade to 2.7.0.3\nbnx2fc: upgrade to 1.0.6\nlpfc: upgrade to 0:8.3.5.45.3p\nmptsas: upgrade to 3.04.19\nnetdev: ethtool RXHASH flag\nbe2net: upgrade to 4.0.160r\nbe2iscsi: upgrade to 4.0.160r\nvmxnet3: upgrade to 1.1.18.0-k\nadd vmxnet3 support\ne100: merge misc fixes.\nigb: upgrade to 3.0.6-k\nigbvf: upgrade to 2.0.0-k\ne1000: upgrade to 7.3.21-k6-1-NAPI\ne1000e: upgrade to 1.4.4-k\nixgbevf: upgrade to 2.1.0-k\n[netdrv] bnx2x: upgrade to 1.70.00-0]\n[block] cciss: upgrade to 3.6.28]\n[scsi] hpsa: upgrade to 2.0.2-3]\n[scsi] arcmsr: upgrade to 1.20.00.15.el6u2 2010/08/05]\n[scsi] megaraid: minor update megaraid]\nfcoe: correct checking for bonding\n[scsi] ipr: upgrade to 2.5.2]\n[SCSI] sd: Combine DIF/DIX error handling]\n[SCSI] Fix printing of failed 32-byte commands]\n[SCSI] sd: Logical Block Provisioning update]\n[SCSI] sd: retry read_capacity on UNIT_ATTENTION]\n[SCSI] libfc: fix mm leak in handling incoming request for target discovery]\n[SCSI] libfc: release DDP context if frame_send() fails]\n[SCSI] libfc: don't call resp handler after FC_EX_TIMEOUT]\n[SCSI] libfc: fix race in SRR response]\n[SCSI] libfc: do not immediately retry the cmd when seq_send fails in fc_fcp_send_data]\n[SCSI] libfcoe: Remove unnecessary module state checks]\n[SCSI] libfc: Enhancement to RPORT state machine applicable only for VN2VN mode]\n[SCSI] fcoe: Unable to select the exchangeID from offload pool for storage targets]\n[SCSI] fcoe: Round-robin based selection of CPU for post-processing of incoming commands]\n[SCSI] fcoe: Amends previous patch, Round-robin based selection of CPU for post processing of incoming request for FCoE target]\n[SCSI] libfc:Fix for exchange/seq loopup failure when FCoE stack is used as target and connected to windows initaitor]\n[SCSI] libfc: post reset event on lport reset]\n[SCSI] fcoe: cleanup cpu selection for incoming requests]\n[SCSI] scsi_dh_alua: Attach to UNAVAILABLE/OFFLINE AAS devices]\n[SCSI] iscsi: add module alias]\n[SCSI] iscsi: fix iscsi_endpoint leak]\n[SCSI] libiscsi: add helper to convert addr to string]\n[SCSI] iscsi_tcp: use iscsi_conn_get_addr_param libiscsi function]\n[SCSI] iscsi class: add callout to get iscsi_endpoint values]\n[SCSI] libiscsi_tcp: use kmap in xmit path]\n[SCSI] iscsi_tcp: fix locking around iscsi sk user data]\n[SCSI] libiscsi_tcp: fix LLD data allocation]\n[SCSI] libsas: remove spurious sata control register read/write]\n[SCSI] libsas: fix SATA NCQ error]\n[SCSI] libsas: fix loopback topology bug during discovery]\n[SCSI] fcoe: remove unused ptype field in fcoe_rcv_info]\n[SCSI] libfc: use FC_MAX_ERROR_CNT]\n[SCSI] libfc: Remove the reference to FCP packet from scsi_cmnd in case of error]\n[SCSI] libfc: release exchg cache]\n[SCSI] libfc, fcoe: ignore rx frame with wrong xid info]\n[SCSI] libfc: two minor changes in comments]\n[SCSI] libfc: cleanup sending SRR request]\n[SCSI] libfc: fix warn on in lport retry]\n[SCSI] fcoe: add fip retry to avoid missing critical keep alive]\nlibfc: fix fc_eh_host_reset\n[SCSI] libfc: block SCSI eh thread for blocked rports]\n[SCSI] libfc: fix referencing to fc_fcp_pkt from the frame pointer via fr_fsp()]\n[SCSI] scsi_lib: pause between error retries]\nKConfig: add CONFIG_UEK5=n to ol6/config-generic\n[SCSI] Fix race when removing SCSI devices]\nipmi: reduce polling when interrupts are available\nipmi: reduce polling\nipmi: Fix IPMI errors due to timing problems\n[SCSI] scsi_dh: Make alua hardware handler's activate() async]\n[SCSI] scsi_dh_alua: Handle all states correctly]\n[SCSI] scsi_dh_alua: fix submit_stpg return]\n[SCSI] scsi_dh_alua: fix deadlock in stpg_endio]\n[SCSI] scsi_dh_alua: fix stpg_endio group state reporting]\n[SCSI] scsi_dh: cosmetic change to sizeof()]\n[SCSI] scsi_dh_rdac : Add definitions for different RDAC operating modes]\n[SCSI] scsi_dh_rdac : decide whether to send mode select based on operating mode]\n[SCSI] dh_rdac: Use WWID from C8 page instead of Subsystem id from C4 page to identify storage]\n[SCSI] dh_rdac: Associate HBA and storage in rdac_controller to support partitions in storage]\n[SCSI] scsi_dh: Make hp hardware handler's activate() async]\n[SCSI] scsi_dh_hp_sw: fix deadlock in start_stop_endio]\ncnic: upgrade to 2.5.7\nupdate enic to 2.1.1.24\nenic: remove VF\n[SCSI] libiscsi: use bh locking instead of irq with session lock]\n[SCSI] libiscsi: Check TMF state before sending PDU]\niscsi: Use struct scsi_lun in iscsi structs instead of u8[8]\n[SCSI] fix id computation in scsi_eh_target_reset()]\n[SCSI] Reduce error recovery time by reducing use of TURs]\n[scsi] mpt2sas: upgrade 09.101.00.00]\n[SCSI] fcoe: Rearrange fcoe port and NPIV port cleanup]\n[SCSI] fcoe: Fix deadlock between fip's recv_work and rtnl]\n[SCSI] Add missing SPC-4 CDB and MAINTENANCE_[IN,OUT] service action definitions]\n[SCSI] scsi_debug: Thin provisioning support]\n[SCSI] scsi_debug: fix Thin provisioning support]\n[SCSI] scsi_debug: add max_queue + no_uld parameters]\n[SCSI] scsi_debug: Block Limits VPD page fixes]\n[SCSI] scsi_debug: fix map_region and unmap_region oops]\n[SCSI] scsi_debug: Update thin provisioning support]\n[SCSI] scsi_debug: Convert to use root_device_register() and root_device_unregister()]\n[SCSI] scsi_debug: set resid to indicate no data-in when medium error]\n[SCSI] scsi_debug: Fix 32-bit overflow in do_device_access causing memory corruption]\n[SCSI] scsi_debug: Logical Block Provisioning (SBC3r26)]\n[SCSI] scsi_debug: add consecutive medium errors]\ndrivers/firmware/iscsi_ibft.c: use %pM to show MAC address\ndrivers/firmware/iscsi_ibft.c: remove NIPQUAD_FMT, use %pI4\nx86: Make sure wakeup trampoline code is below 1MB\nibft, x86: Change reserve_ibft_region() to find_ibft_region()\nibft: Update iBFT handling for v1.03 of the spec.\n[xen] remove unused functions.]\nbitmap: introduce bitmap_set, bitmap_clear, bitmap_find_next_zero_area\n[netdrv] s2io: upgrade to 2.0.26.28]\n[watchdog] hpwdt: upgrade to 1.3.0]\nqla2xxx: During loopdown perform Diagnostic loopback.\nqla2xxx: Save and restore irq in the response queue interrupt handler.\nqla2xxx: Prevent CPU lockups when 'ql2xdontresethba' module param is set.\nqla2xxx: Fix array out of bound warning.\nqla2xxx: Acquire hardware lock while manipulating dsd list.\nqla2xxx: check for marker IOCB during response queue processing.\nqla2xxx: Fix qla24xx revision check while enabling interrupts.\nqla2xxx: Implemeted beacon on/off for ISP82XX.\nqla2xxx: Double check for command completion if abort mailbox command fails.\nqla2xxx: T10 DIF - Convert HBA specific checks to capability based.\nqla2xxx: Add support for ISP82xx to capture dump (minidump) on failure.\nqla2xxx: Enable write permission to some debug related module parameters to be changed dynamically.\nqla2xxx: Provide method for updating I2C attached VPD.\nqla2xxx: Set the task attributes after memsetting fcp cmnd.\nqla2xxx: Update to the beacon implementation.\nqla2xxx: Correct inadvertent loop state transitions during port-update handling.\nqla2xxx: Return sysfs error codes appropriate to conditions.\nqla2xxx: Issue mailbox command only when firmware hung bit is reset for ISP82xx.\nqla2xxx: Don't call alloc_fw_dump for ISP82XX.\nqla2xxx: Remove qla2x00_wait_for_loop_ready function.\nqla2xxx: Display FCP_CMND priority on update.\nqla2xxx: Check for SCSI status on underruns.\nqla2xxx: Fix for active_mask warning.\nqla2xxx: Updated the driver version to 8.03.07.08.32.1-k.\nixgbe-3.4.24\nkernel.h: add BUILD_BUG_ON_NOT_POWER_OF_2()\nisci update\nisci firmware update\ntg3: Updated the driver version from 3.113 to 3.119\nmlx4: Updated the driver version from 1.5.1.6 August 2010 to 1.5.4.1\n\n[2.6.32-300.0.4.el6uek]\n- Add 32-bit value for MAX_LOCAL_APIC to fix i386-i686 build error after a9da091\n\n[2.6.32-300.0.3.el6uek]\n- [NET] Update qlcnic driver to 5.0.24 [orabug 13005421]\n- [NET] Update netxen NIC driver to 4.0.76 [orabug 13005427]\n- [SCSI] Update megaraid_sas driver to v5.40-rc1 [orabug 13005432]\n- [NET] Update Brocade BNA driver to 3.0.2.2 [orabug 13005438]\n- [SCSI] Update Brocade BFA driver to 3.0.2.2 [orabug 13005441]\n- [NET] Update qlge driver to v1.00.00.29.00.00-01 [orabug 13005443]\n- [SCSI] mpt2sas: Add a module parameter that permits overriding protection capabilities (Martin K. Petersen)\n- [SCSI] mpt2sas: Return the correct sense key for DIF errors (Martin K. Petersen)\n- [SCSI] mpt2sas: Do not check DIF for unwritten blocks (Martin K. Petersen)\n- [NET] bnx2x: prevent flooded warning kernel info [orabug 12687487] (Joe Jin)\n- [SCSI] fix lport uninitalized bug in fnic [orabug 12866385] (Xiaowei Hu)\n- acpi: Handle xapic/x2apic entries in MADT at same time (Yinghai Lu yinghai@kernel.org)\n\n[2.6.32-300.0.2.el6uek]\n- Revert 'netns xfrm: fixup xfrm6_tunnel error propagation'\n- block: export blk_{get,put}_queue()\n- Revert 'block: export blk_{get,put}_queue()'\n\n[2.6.32-300.0.1.el6uek]\n- [SCSI] mpt2sas: Fix missing reference tag seed with Type 2 devices (Martin K. Petersen)\n- stable tree merge to 2.6.32.45\n", u'issued': u'2011-12-14', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELSA-2011-2037.html', u'type': u'self', u'id': None, u'title': u'ELSA-2011-2037'}, {u'href': u'http://linux.oracle.com/cve/CVE-2011-1020.html', u'type': u'cve', u'id': u'CVE-2011-1020', u'title': u'CVE-2011-1020'}, {u'href': u'http://linux.oracle.com/cve/CVE-2011-1577.html', u'type': u'cve', u'id': u'CVE-2011-1577', u'title': u'CVE-2011-1577'}, {u'href': u'http://linux.oracle.com/cve/CVE-2011-1585.html', u'type': u'cve', u'id': u'CVE-2011-1585', u'title': u'CVE-2011-1585'}, {u'href': u'http://linux.oracle.com/cve/CVE-2011-2495.html', u'type': u'cve', u'id': u'CVE-2011-2495', u'title': u'CVE-2011-2495'}, {u'href': u'http://linux.oracle.com/cve/CVE-2011-2525.html', u'type': u'cve', u'id': u'CVE-2011-2525', u'title': u'CVE-2011-2525'}, {u'href': u'http://linux.oracle.com/cve/CVE-2011-3638.html', u'type': u'cve', u'id': u'CVE-2011-3638', u'title': u'CVE-2011-3638'}, {u'href': u'http://linux.oracle.com/cve/CVE-2011-4110.html', u'type': u'cve', u'id': u'CVE-2011-4110', u'title': u'CVE-2011-4110'}, {u'href': u'http://linux.oracle.com/cve/CVE-2011-4330.html', u'type': u'cve', u'id': u'CVE-2011-4330', u'title': u'CVE-2011-4330'}, {u'href': u'http://linux.oracle.com/cve/CVE-2011-2707.html', u'type': u'cve', u'id': u'CVE-2011-2707', u'title': u'CVE-2011-2707'}], u'_content_type_id': u'erratum', u'_id': u'610c83d7-0a9a-49c4-be66-c8121f17b444', u'from': u'el-errata@oss.oracle.com', u'severity': u'Moderate', u'title': u' Unbreakable Enterprise kernel security and bug fix update', u'_ns': u'units_erratum', u'rights': u'Copyright 2011 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 6', u'reboot_suggested': False, u'type': u'security', u'pkglist': [{u'packages': [{u'src': None, u'name': u'kernel-uek', u'sum': [u'md5', u'896f13889aac09fb78690b254a4239cf'], u'filename': u'kernel-uek-2.6.32-300.3.1.el6uek.src.rpm', u'epoch': u'0', u'version': u'2.6.32', u'release': u'300.3.1.el6uek', u'arch': u'src'}, {u'src': None, u'name': u'kernel-uek', u'sum': [u'md5', u'c4c42e601c8e1a9a953c427366b26314'], u'filename': u'kernel-uek-2.6.32-300.3.1.el6uek.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.32', u'release': u'300.3.1.el6uek', u'arch': u'x86_64'}, {u'src': None, u'name': u'kernel-uek-debug', u'sum': [u'md5', u'b7216083f48fabbaa5cfe48b3ee2f197'], u'filename': u'kernel-uek-debug-2.6.32-300.3.1.el6uek.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.32', u'release': u'300.3.1.el6uek', u'arch': u'x86_64'}, {u'src': None, u'name': u'kernel-uek-debug-devel', u'sum': [u'md5', u'dd5e01da67393b7433a583246d7d8527'], u'filename': u'kernel-uek-debug-devel-2.6.32-300.3.1.el6uek.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.32', u'release': u'300.3.1.el6uek', u'arch': u'x86_64'}, {u'src': None, u'name': u'kernel-uek-devel', u'sum': [u'md5', u'cfc1088777e9a82a7a63c9ba40b88ffd'], u'filename': u'kernel-uek-devel-2.6.32-300.3.1.el6uek.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.32', u'release': u'300.3.1.el6uek', u'arch': u'x86_64'}, {u'src': None, u'name': u'kernel-uek-doc', u'sum': [u'md5', u'9eaa0435708d530d18f7af2107af608b'], u'filename': u'kernel-uek-doc-2.6.32-300.3.1.el6uek.noarch.rpm', u'epoch': u'0', u'version': u'2.6.32', u'release': u'300.3.1.el6uek', u'arch': u'noarch'}, {u'src': None, u'name': u'kernel-uek-firmware', u'sum': [u'md5', u'22ed087d1b0e0fa3ebe6250e7daf8a4e'], u'filename': u'kernel-uek-firmware-2.6.32-300.3.1.el6uek.noarch.rpm', u'epoch': u'0', u'version': u'2.6.32', u'release': u'300.3.1.el6uek', u'arch': u'noarch'}, {u'src': None, u'name': u'kernel-uek-headers', u'sum': [u'md5', u'd7ded61b4190f50c97803026c9f52742'], u'filename': u'kernel-uek-headers-2.6.32-300.3.1.el6uek.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.32', u'release': u'300.3.1.el6uek', u'arch': u'x86_64'}, {u'src': None, u'name': u'ofa-2.6.32-300.3.1.el6uek', u'sum': [u'md5', u'd5413aa9ba292bd161e85255606094dd'], u'filename': u'ofa-2.6.32-300.3.1.el6uek-1.5.1-4.0.47.src.rpm', u'epoch': u'0', u'version': u'1.5.1', u'release': u'4.0.47', u'arch': u'src'}, {u'src': None, u'name': u'ofa-2.6.32-300.3.1.el6uek', u'sum': [u'md5', u'2f1bd36eb6fd27cf1272548018de8b08'], u'filename': u'ofa-2.6.32-300.3.1.el6uek-1.5.1-4.0.47.x86_64.rpm', u'epoch': u'0', u'version': u'1.5.1', u'release': u'4.0.47', u'arch': u'x86_64'}, {u'src': None, u'name': u'ofa-2.6.32-300.3.1.el6uekdebug', u'sum': [u'md5', u'3ac62a031c60d6ee0b3501d5d52a9477'], u'filename': u'ofa-2.6.32-300.3.1.el6uekdebug-1.5.1-4.0.47.x86_64.rpm', u'epoch': u'0', u'version': u'1.5.1', u'release': u'4.0.47', u'arch': u'x86_64'}], u'name': u'ol6_x86_64_latest', u'short': u'ol6_x86_64_latest'}, {u'packages': [{u'src': None, u'name': u'kernel-uek', u'sum': [u'md5', u'5b21593bdb11cedd291237cc75519aa8'], u'filename': u'kernel-uek-2.6.32-300.3.1.el5uek.src.rpm', u'epoch': u'0', u'version': u'2.6.32', u'release': u'300.3.1.el5uek', u'arch': u'src'}, {u'src': None, u'name': u'kernel-uek', u'sum': [u'md5', u'947d8f2f8e45b19744048b0f1d0335bd'], u'filename': u'kernel-uek-2.6.32-300.3.1.el5uek.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.32', u'release': u'300.3.1.el5uek', u'arch': u'x86_64'}, {u'src': None, u'name': u'kernel-uek-debug', u'sum': [u'md5', u'51de1eb85bd3e548d9f0ffd4e9feebc5'], u'filename': u'kernel-uek-debug-2.6.32-300.3.1.el5uek.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.32', u'release': u'300.3.1.el5uek', u'arch': u'x86_64'}, {u'src': None, u'name': u'kernel-uek-debug-devel', u'sum': [u'md5', u'a0aaf92a93f27e370ed9d11c6e39c598'], u'filename': u'kernel-uek-debug-devel-2.6.32-300.3.1.el5uek.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.32', u'release': u'300.3.1.el5uek', u'arch': u'x86_64'}, {u'src': None, u'name': u'kernel-uek-devel', u'sum': [u'md5', u'76714da3cd700d706ba081ab6f7b51c6'], u'filename': u'kernel-uek-devel-2.6.32-300.3.1.el5uek.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.32', u'release': u'300.3.1.el5uek', u'arch': u'x86_64'}, {u'src': None, u'name': u'kernel-uek-doc', u'sum': [u'md5', u'2ac6244634679d284dd6235da511dea2'], u'filename': u'kernel-uek-doc-2.6.32-300.3.1.el5uek.noarch.rpm', u'epoch': u'0', u'version': u'2.6.32', u'release': u'300.3.1.el5uek', u'arch': u'noarch'}, {u'src': None, u'name': u'kernel-uek-firmware', u'sum': [u'md5', u'60a133b718f92aed90b8256be41c97a3'], u'filename': u'kernel-uek-firmware-2.6.32-300.3.1.el5uek.noarch.rpm', u'epoch': u'0', u'version': u'2.6.32', u'release': u'300.3.1.el5uek', u'arch': u'noarch'}, {u'src': None, u'name': u'ofa-2.6.32-300.3.1.el5uek', u'sum': [u'md5', u'e75138da9a6fb1144906896e73b6c4ce'], u'filename': u'ofa-2.6.32-300.3.1.el5uek-1.5.1-4.0.53.src.rpm', u'epoch': u'0', u'version': u'1.5.1', u'release': u'4.0.53', u'arch': u'src'}, {u'src': None, u'name': u'ofa-2.6.32-300.3.1.el5uek', u'sum': [u'md5', u'25d599d077db8005dbf152d3f9c6fad5'], u'filename': u'ofa-2.6.32-300.3.1.el5uek-1.5.1-4.0.53.x86_64.rpm', u'epoch': u'0', u'version': u'1.5.1', u'release': u'4.0.53', u'arch': u'x86_64'}, {u'src': None, u'name': u'ofa-2.6.32-300.3.1.el5uekdebug', u'sum': [u'md5', u'08faa41a3c47463732d0219c538f76aa'], u'filename': u'ofa-2.6.32-300.3.1.el5uekdebug-1.5.1-4.0.53.x86_64.rpm', u'epoch': u'0', u'version': u'1.5.1', u'release': u'4.0.53', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u'kernel-uek\n[2.6.32-300.4.1.el6uek]\n- [pci] intel-iommu: Default to non-coherent for domains unattached to iommus (Joe Jin)\n- [dm] do not forward ioctls from logical volumes to the underlying device (Joe Jin) {CVE-2011-4127}\n- [block] fail SCSI passthrough ioctls on partition devices (Joe Jin) {CVE-2011-4127}\n- [block] add and use scsi_blk_cmd_ioctl (Joe Jin) {CVE-2011-4127}\n- [net] gro: reset vlan_tci on reuse (Dan Carpenter) {CVE-2011-1576}\n- [net] rose: Add length checks to CALL_REQUEST parsing (Ben Hutchings) {CVE-2011-1493}\n- [net] rose_loopback_timer sets VC number <= ROSE_DEFAULT_MAXVC (Bernard Pidoux F6BVP) {CVE-2011-1493}', u'issued': u'2011-12-23', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELSA-2011-2038.html', u'type': u'self', u'id': None, u'title': u'ELSA-2011-2038'}, {u'href': u'http://linux.oracle.com/cve/CVE-2011-1576.html', u'type': u'cve', u'id': u'CVE-2011-1576', u'title': u'CVE-2011-1576'}, {u'href': u'http://linux.oracle.com/cve/CVE-2011-4127.html', u'type': u'cve', u'id': u'CVE-2011-4127', u'title': u'CVE-2011-4127'}, {u'href': u'http://linux.oracle.com/cve/CVE-2011-1493.html', u'type': u'cve', u'id': u'CVE-2011-1493', u'title': u'CVE-2011-1493'}], u'_content_type_id': u'erratum', u'_id': u'75324c78-f102-4760-8373-9cb0aa43b519', u'from': u'el-errata@oss.oracle.com', u'severity': u'Important', u'title': u' Unbreakable Enterprise kernel security update', u'_ns': u'units_erratum', u'rights': u'Copyright 2011 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 6', u'reboot_suggested': False, u'type': u'security', u'pkglist': [{u'packages': [{u'src': None, u'name': u'kernel-uek', u'sum': [u'md5', u'44d1a49f7ab10c59ba69d8bb4e99f61f'], u'filename': u'kernel-uek-2.6.32-300.4.1.el6uek.src.rpm', u'epoch': u'0', u'version': u'2.6.32', u'release': u'300.4.1.el6uek', u'arch': u'src'}, {u'src': None, u'name': u'kernel-uek', u'sum': [u'md5', u'd7e38d25a5fec5887790012a34812b7b'], u'filename': u'kernel-uek-2.6.32-300.4.1.el6uek.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.32', u'release': u'300.4.1.el6uek', u'arch': u'x86_64'}, {u'src': None, u'name': u'kernel-uek-debug', u'sum': [u'md5', u'c969166ec8e7eaf30f42156724940487'], u'filename': u'kernel-uek-debug-2.6.32-300.4.1.el6uek.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.32', u'release': u'300.4.1.el6uek', u'arch': u'x86_64'}, {u'src': None, u'name': u'kernel-uek-debug-devel', u'sum': [u'md5', u'c4ba714d15b6cd09229041ecb90fcb8d'], u'filename': u'kernel-uek-debug-devel-2.6.32-300.4.1.el6uek.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.32', u'release': u'300.4.1.el6uek', u'arch': u'x86_64'}, {u'src': None, u'name': u'kernel-uek-devel', u'sum': [u'md5', u'426e0ddce434695002cfeccb1532c4f7'], u'filename': u'kernel-uek-devel-2.6.32-300.4.1.el6uek.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.32', u'release': u'300.4.1.el6uek', u'arch': u'x86_64'}, {u'src': None, u'name': u'kernel-uek-doc', u'sum': [u'md5', u'3c8ebe8d157db30fa6186defde144964'], u'filename': u'kernel-uek-doc-2.6.32-300.4.1.el6uek.noarch.rpm', u'epoch': u'0', u'version': u'2.6.32', u'release': u'300.4.1.el6uek', u'arch': u'noarch'}, {u'src': None, u'name': u'kernel-uek-firmware', u'sum': [u'md5', u'6057563439ee2b2b98b3b722a70f736c'], u'filename': u'kernel-uek-firmware-2.6.32-300.4.1.el6uek.noarch.rpm', u'epoch': u'0', u'version': u'2.6.32', u'release': u'300.4.1.el6uek', u'arch': u'noarch'}, {u'src': None, u'name': u'kernel-uek-headers', u'sum': [u'md5', u'491cf20917949b653ac9852909900882'], u'filename': u'kernel-uek-headers-2.6.32-300.4.1.el6uek.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.32', u'release': u'300.4.1.el6uek', u'arch': u'x86_64'}, {u'src': None, u'name': u'mlnx_en-2.6.32-300.4.1.el6uek', u'sum': [u'md5', u'5e30e76d146aeb9e6a7472d749e9328b'], u'filename': u'mlnx_en-2.6.32-300.4.1.el6uek-1.5.7-0.1.src.rpm', u'epoch': u'0', u'version': u'1.5.7', u'release': u'0.1', u'arch': u'src'}, {u'src': None, u'name': u'mlnx_en-2.6.32-300.4.1.el6uek', u'sum': [u'md5', u'd9de52b56d84d653aca008bf7f6082cc'], u'filename': u'mlnx_en-2.6.32-300.4.1.el6uek-1.5.7-0.1.x86_64.rpm', u'epoch': u'0', u'version': u'1.5.7', u'release': u'0.1', u'arch': u'x86_64'}, {u'src': None, u'name': u'mlnx_en-2.6.32-300.4.1.el6uekdebug', u'sum': [u'md5', u'291ef2af94efd18b16c31a508e296e42'], u'filename': u'mlnx_en-2.6.32-300.4.1.el6uekdebug-1.5.7-0.1.x86_64.rpm', u'epoch': u'0', u'version': u'1.5.7', u'release': u'0.1', u'arch': u'x86_64'}, {u'src': None, u'name': u'ofa-2.6.32-300.4.1.el6uek', u'sum': [u'md5', u'8c339288fb9f90ce6736e0851ab19d56'], u'filename': u'ofa-2.6.32-300.4.1.el6uek-1.5.1-4.0.47.src.rpm', u'epoch': u'0', u'version': u'1.5.1', u'release': u'4.0.47', u'arch': u'src'}, {u'src': None, u'name': u'ofa-2.6.32-300.4.1.el6uek', u'sum': [u'md5', u'4dfd0858478d0b04a6e66130eed86453'], u'filename': u'ofa-2.6.32-300.4.1.el6uek-1.5.1-4.0.47.x86_64.rpm', u'epoch': u'0', u'version': u'1.5.1', u'release': u'4.0.47', u'arch': u'x86_64'}, {u'src': None, u'name': u'ofa-2.6.32-300.4.1.el6uekdebug', u'sum': [u'md5', u'9293701e60c0f07f660e4a6d0f0a9bbc'], u'filename': u'ofa-2.6.32-300.4.1.el6uekdebug-1.5.1-4.0.47.x86_64.rpm', u'epoch': u'0', u'version': u'1.5.1', u'release': u'4.0.47', u'arch': u'x86_64'}], u'name': u'ol6_x86_64_latest', u'short': u'ol6_x86_64_latest'}, {u'packages': [{u'src': None, u'name': u'kernel-uek', u'sum': [u'md5', u'd7120e53935c308a6bf4d5e21a9bb790'], u'filename': u'kernel-uek-2.6.32-300.4.1.el5uek.src.rpm', u'epoch': u'0', u'version': u'2.6.32', u'release': u'300.4.1.el5uek', u'arch': u'src'}, {u'src': None, u'name': u'kernel-uek', u'sum': [u'md5', u'd0587d18db92b66dd696479987b0fc0e'], u'filename': u'kernel-uek-2.6.32-300.4.1.el5uek.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.32', u'release': u'300.4.1.el5uek', u'arch': u'x86_64'}, {u'src': None, u'name': u'kernel-uek-debug', u'sum': [u'md5', u'b8874ac07a094ed23416b577a74e8e4a'], u'filename': u'kernel-uek-debug-2.6.32-300.4.1.el5uek.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.32', u'release': u'300.4.1.el5uek', u'arch': u'x86_64'}, {u'src': None, u'name': u'kernel-uek-debug-devel', u'sum': [u'md5', u'a07f92ab36afb4f58e67f36a15027dfb'], u'filename': u'kernel-uek-debug-devel-2.6.32-300.4.1.el5uek.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.32', u'release': u'300.4.1.el5uek', u'arch': u'x86_64'}, {u'src': None, u'name': u'kernel-uek-devel', u'sum': [u'md5', u'0da57d4ec0e54a23b50f3c594e828f19'], u'filename': u'kernel-uek-devel-2.6.32-300.4.1.el5uek.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.32', u'release': u'300.4.1.el5uek', u'arch': u'x86_64'}, {u'src': None, u'name': u'kernel-uek-doc', u'sum': [u'md5', u'916f647dcc5cee64c42f57166350201b'], u'filename': u'kernel-uek-doc-2.6.32-300.4.1.el5uek.noarch.rpm', u'epoch': u'0', u'version': u'2.6.32', u'release': u'300.4.1.el5uek', u'arch': u'noarch'}, {u'src': None, u'name': u'kernel-uek-firmware', u'sum': [u'md5', u'e936f6ff4af562450649bce46eaa4184'], u'filename': u'kernel-uek-firmware-2.6.32-300.4.1.el5uek.noarch.rpm', u'epoch': u'0', u'version': u'2.6.32', u'release': u'300.4.1.el5uek', u'arch': u'noarch'}, {u'src': None, u'name': u'ofa-2.6.32-300.4.1.el5uek', u'sum': [u'md5', u'93391084c32fcc1894e383e278717b98'], u'filename': u'ofa-2.6.32-300.4.1.el5uek-1.5.1-4.0.53.src.rpm', u'epoch': u'0', u'version': u'1.5.1', u'release': u'4.0.53', u'arch': u'src'}, {u'src': None, u'name': u'ofa-2.6.32-300.4.1.el5uek', u'sum': [u'md5', u'd6004ffd9de81ac17f1b7da0beb4d4a7'], u'filename': u'ofa-2.6.32-300.4.1.el5uek-1.5.1-4.0.53.x86_64.rpm', u'epoch': u'0', u'version': u'1.5.1', u'release': u'4.0.53', u'arch': u'x86_64'}, {u'src': None, u'name': u'ofa-2.6.32-300.4.1.el5uekdebug', u'sum': [u'md5', u'290e312704dbcb26ecb1f49c89fb98b4'], u'filename': u'ofa-2.6.32-300.4.1.el5uekdebug-1.5.1-4.0.53.x86_64.rpm', u'epoch': u'0', u'version': u'1.5.1', u'release': u'4.0.53', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u"\n[2.6.18-274.17.1.0.1.el5]\n- fix ia64 build error due to add-support-above-32-vcpus.patch(Zhenzhong Duan)\n- [x86] use dynamic vcpu_info remap to support more than 32 vcpus (Zhenzhong Duan)\n- [scsi] add additional scsi medium error handling (John Sobecki) [orabug 12904887]\n- [x86] Fix lvt0 reset when hvm boot up with noapic param\n- [scsi] remove printk's when doing I/O to a dead device (John Sobecki, Chris Mason)\n [orabug 12342275]\n- [char] ipmi: Fix IPMI errors due to timing problems (Joe Jin) [orabug 12561346]\n- [scsi] Fix race when removing SCSI devices (Joe Jin) [orabug 12404566]\n- bonding: reread information about speed and duplex when interface goes up (John Haxby) [orabug 11890822]\n- [fs] nfs: Fix __put_nfs_open_context() NULL pointer panic (Joe Jin) [orabug 12687646]\n- [scsi] fix scsi hotplug and rescan race [orabug 10260172]\n- fix filp_close() race (Joe Jin) [orabug 10335998]\n- make xenkbd.abs_pointer=1 by default [orabug 67188919]\n- [xen] check to see if hypervisor supports memory reservation change\n (Chuck Anderson) [orabug 7556514]\n- [net] Enable entropy for bnx2,bnx2x,e1000e,igb,ixgb,ixgbe,ixgbevf (John Sobecki)\n [orabug 10315433]\n- [NET] Add xen pv netconsole support (Tina Yang) [orabug 6993043] [bz 7258]\n- [mm] shrink_zone patch (John Sobecki,Chris Mason) [orabug 6086839]\n- fix aacraid not to reset during kexec (Joe Jin) [orabug 8516042]\n- [rds] Patch rds to 1.4.2-20 (Andy Grover) [orabug 9471572, 9344105]\n RDS: Fix BUG_ONs to not fire when in a tasklet\n ipoib: Fix lockup of the tx queue\n RDS: Do not call set_page_dirty() with irqs off (Sherman Pun)\n RDS: Properly unmap when getting a remote access error (Tina Yang)\n RDS: Fix locking in rds_send_drop_to()\n- [xen] PVHVM guest with PoD crashes under memory pressure (Chuck Anderson)\n [orabug 9107465]\n- [xen] PV guest with FC HBA hangs during shutdown (Chuck Anderson)\n [orabug 9764220]\n- Support 256GB+ memory for pv guest (Mukesh Rathor) [orabug 9450615]\n- fix overcommit memory to use percpu_counter for el5 (KOSAKI Motohiro,\n Guru Anbalagane) [orabug 6124033]\n- [ipmi] make configurable timeouts for kcs of ipmi [orabug 9752208]\n- [ib] fix memory corruption (Andy Grover) [orabug 9972346]\n- [aio] patch removes limit on number of retries (Srinivas Eeda) [orabug 10044782]\n- [loop] Do not call loop_unplug for not configured loop device (orabug 10314497)\n\n[2.6.18-274.17.1.el5]\n- Revert: [block] add and use scsi_blk_cmd_ioctl (Paolo Bonzini) [752385 752386] {CVE-2011-4127}\n- Revert: [block] fail SCSI passthrough ioctls on partition devices (Paolo Bonzini) [752385 752386] {CVE-2011-4127}\n- Revert: [dm] do not forward ioctls from logical volumes to the underlying device (Paolo Bonzini) [752385 752386] {CVE-2011-4127}\n- Revert: [scsi] fix 32-on-64 block device ioctls (Paolo Bonzini) [752385 752386] {CVE-2011-4127}\n\n[2.6.18-274.16.1.el5]\n- [scsi] fix 32-on-64 block device ioctls (Paolo Bonzini) [752385 752386] {CVE-2011-4127}\n\n[2.6.18-274.15.1.el5]\n- [net] e1000e: Avoid wrong check on TX hang (Dean Nelson) [766485 746272]\n- [fs] xfs: Fix memory corruption in xfs_readlink (Carlos Maiolino) [749159 749160] {CVE-2011-4077}\n- [pci] intel-iommu: Default to non-coherent for unattached domains (Don Dutile) [766803 753924]\n- [fs] nfs: remove BUG() from encode_share_access() (Jeff Layton) [755442 754901] {CVE-2011-4324}\n- [misc] irq: Check for spurious IRQ only on disabled IRQs (Prarit Bhargava) [759387 756412]\n- [fs] hfs: add sanity check for file name length (Eric Sandeen) [755432 755433] {CVE-2011-4330}\n- [fs] proc: Fix select on /proc files without ->poll (David Howells) [755483 751214]\n- [fs] nfs: Ensure we mark inode as dirty if early exit from commit (Jeff Layton) [755482 714020]\n- [x86] apic: ack all pending irqs when crashed/on kexec (hiro muneda) [750460 742079]\n- [virt] kvm: fix regression w/ 32 bit KVM clock (Rik van Riel) [747875 753789 751742 731599]\n- [virt] kvm: fix lost tick accounting for 32 bit kvm-clock (Rik van Riel) [747875 731599]\n- [fs] jbd/jbd2: validate sb->s_first in journal_get_superblock (Eryu Guan) [753343 706810] {CVE-2011-4132}\n- [net] igb: enable link power down (Stefan Assmann) [752735 742514]\n- [fs] proc: fix oops on invalid /proc/<pid>/maps access (Johannes Weiner) [747851 747699] {CVE-2011-3637}\n- [block] cciss: bump driver version (Tomas Henzl) [758024 714129]\n- [block] cciss: need to delay after a PCI Power Management reset (Tomas Henzl) [758024 714129]\n- [block] cciss: auto engage scsi susbsystem (Tomas Henzl) [758024 714129]\n- [block] cciss: store pdev in hba struct (Tomas Henzl) [758024 714129]\n- [block] cciss: use consistent variable names (Tomas Henzl) [758024 714129]\n- [block] cciss: add a commandline switch for simple mode (Tomas Henzl) [758024 714129]\n- [fs] proc: close race with exec in mem_read() (Johannes Weiner) [692041 692042] {CVE-2011-1020}\n- [mm] implement access_remote_vm (Johannes Weiner) [692041 692042] {CVE-2011-1020}\n- [mm] factor out main logic of access_process_vm (Johannes Weiner) [692041 692042] {CVE-2011-1020}\n- [mm] use mm_struct to resolve gate vma's in __get_user_pages (Johannes Weiner) [692041 692042] {CVE-2011-1020}\n- [mm] make in_gate_area take mm_struct instead of a task_struct (Johannes Weiner) [692041 692042] {CVE-2011-1020}\n- [mm] make get_gate_vma take mm_struct instead of task_struct (Johannes Weiner) [692041 692042] {CVE-2011-1020}\n- [x86_64] mark assoc mm when running task in 32 bit compat mode (Johannes Weiner) [692041 692042] {CVE-2011-1020}\n- [misc] sched: add ctx tag to mm running task in ia32 compat mode (Johannes Weiner) [692041 692042] {CVE-2011-1020}\n- [fs] proc: require the target to be tracable (or yourself) (Johannes Weiner) [692041 692042] {CVE-2011-1020}\n- [fs] proc: close race in /proc/*/environ (Johannes Weiner) [692041 692042] {CVE-2011-1020}\n- [fs] proc: report errors in /proc/*/*map* sanely (Johannes Weiner) [692041 692042] {CVE-2011-1020}\n- [fs] proc: shift down_read(mmap_sem) to the caller (Johannes Weiner) [692041 692042] {CVE-2011-1020}\n- [fs] detect exec transition phase with new mm but old creds (Johannes Weiner) [692041 692042] {CVE-2011-1020}\n- [net] igb: fix i350 SR-IOV failture (Stefan Assmann) [741877 714313]\n- [dm] do not forward ioctls from logical volumes to the underlying device (Paolo Bonzini) [752385 752386] {CVE-2011-4127}\n- [block] fail SCSI passthrough ioctls on partition devices (Paolo Bonzini) [752385 752386] {CVE-2011-4127}\n- [block] add and use scsi_blk_cmd_ioctl (Paolo Bonzini) [752385 752386] {CVE-2011-4127}\n- [fs] nfs: Fix an O_DIRECT Oops (Jeff Layton) [755457 754620] {CVE-2011-4325}\n- [net] sctp: Fix another race during accept/peeloff (Thomas Graf) [757146 714870] {CVE-2011-4348}\n- [scsi] isci: fix 32-bit operation when CONFIG_HIGHMEM64G=n (Phillip Lougher) [750458 713904]\n- [net] tg3: Only allow phy ioctls while netif_running (Phillip Lougher) [746343 683393]\n\n[2.6.18-274.14.1.el5]\n- [input] evdev: Fix spin lock context in evdev_pass_event() (Don Zickus) [744147 734900]\n- [fs] dcache: Fix dentry loop detection deadlock (David Howells) [754129 717959]\n- [input] evdev: disable interrupts when processing events (Don Zickus) [744147 734900]\n\n[2.6.18-274.13.1.el5]\n- [fs] dcache: Log ELOOP rather than creating a loop (David Howells) [754129 717959]\n- [fs] dcache: Fix loop checks in d_materialise_unique (David Howells) [754129 717959]", u'issued': u'2012-01-11', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELSA-2012-0007.html', u'type': u'self', u'id': None, u'title': u'ELSA-2012-0007'}, {u'href': u'http://linux.oracle.com/cve/CVE-2011-1020.html', u'type': u'cve', u'id': u'CVE-2011-1020', u'title': u'CVE-2011-1020'}, {u'href': u'http://linux.oracle.com/cve/CVE-2011-3637.html', u'type': u'cve', u'id': u'CVE-2011-3637', u'title': u'CVE-2011-3637'}, {u'href': u'http://linux.oracle.com/cve/CVE-2011-4077.html', u'type': u'cve', u'id': u'CVE-2011-4077', u'title': u'CVE-2011-4077'}, {u'href': u'http://linux.oracle.com/cve/CVE-2011-4132.html', u'type': u'cve', u'id': u'CVE-2011-4132', u'title': u'CVE-2011-4132'}, {u'href': u'http://linux.oracle.com/cve/CVE-2011-4324.html', u'type': u'cve', u'id': u'CVE-2011-4324', u'title': u'CVE-2011-4324'}, {u'href': u'http://linux.oracle.com/cve/CVE-2011-4325.html', u'type': u'cve', u'id': u'CVE-2011-4325', u'title': u'CVE-2011-4325'}, {u'href': u'http://linux.oracle.com/cve/CVE-2011-4330.html', u'type': u'cve', u'id': u'CVE-2011-4330', u'title': u'CVE-2011-4330'}, {u'href': u'http://linux.oracle.com/cve/CVE-2011-4348.html', u'type': u'cve', u'id': u'CVE-2011-4348', u'title': u'CVE-2011-4348'}], u'_content_type_id': u'erratum', u'_id': u'bab6d8df-69e9-48a1-9a76-44f4353fcf3a', u'from': u'el-errata@oss.oracle.com', u'severity': u'Important', u'title': u' kernel security, bug fix, and enhancement update', u'_ns': u'units_erratum', u'rights': u'Copyright 2012 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 5', u'reboot_suggested': False, u'type': u'security', u'pkglist': [{u'packages': [{u'src': None, u'name': u'kernel', u'sum': [u'md5', u'195407b67581b46884a8d14a4467baf3'], u'filename': u'kernel-2.6.18-274.17.1.0.1.el5.src.rpm', u'epoch': u'0', u'version': u'2.6.18', u'release': u'274.17.1.0.1.el5', u'arch': u'src'}, {u'src': None, u'name': u'kernel', u'sum': [u'md5', u'ab4232dff76bf46923bbbabc626ca3dc'], u'filename': u'kernel-2.6.18-274.17.1.0.1.el5.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.18', u'release': u'274.17.1.0.1.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'kernel-debug', u'sum': [u'md5', u'90042e3f28ac1b2112af30214789cbc8'], u'filename': u'kernel-debug-2.6.18-274.17.1.0.1.el5.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.18', u'release': u'274.17.1.0.1.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'kernel-debug-devel', u'sum': [u'md5', u'5d00b84dfea80078a8f43573a7c1728b'], u'filename': u'kernel-debug-devel-2.6.18-274.17.1.0.1.el5.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.18', u'release': u'274.17.1.0.1.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'kernel-devel', u'sum': [u'md5', u'00cecfb1dcdc8f52cebf6bdc776f1c31'], u'filename': u'kernel-devel-2.6.18-274.17.1.0.1.el5.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.18', u'release': u'274.17.1.0.1.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'kernel-doc', u'sum': [u'md5', u'08c0ecfe1bbee62eda666c2d5b700c4e'], u'filename': u'kernel-doc-2.6.18-274.17.1.0.1.el5.noarch.rpm', u'epoch': u'0', u'version': u'2.6.18', u'release': u'274.17.1.0.1.el5', u'arch': u'noarch'}, {u'src': None, u'name': u'kernel-headers', u'sum': [u'md5', u'3fc4a0a4559b02ba504bcab604dd6a2c'], u'filename': u'kernel-headers-2.6.18-274.17.1.0.1.el5.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.18', u'release': u'274.17.1.0.1.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'kernel-xen', u'sum': [u'md5', u'442455edfa377e37dd38e1ee925cb06c'], u'filename': u'kernel-xen-2.6.18-274.17.1.0.1.el5.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.18', u'release': u'274.17.1.0.1.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'kernel-xen-devel', u'sum': [u'md5', u'c95498f7ee6fa1f9705a666a04b92bc1'], u'filename': u'kernel-xen-devel-2.6.18-274.17.1.0.1.el5.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.18', u'release': u'274.17.1.0.1.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'ocfs2-2.6.18-274.17.1.0.1.el5', u'sum': [u'md5', u'e20bca4a8ef23521f041a48f70eba779'], u'filename': u'ocfs2-2.6.18-274.17.1.0.1.el5-1.4.9-1.el5.src.rpm', u'epoch': u'0', u'version': u'1.4.9', u'release': u'1.el5', u'arch': u'src'}, {u'src': None, u'name': u'ocfs2-2.6.18-274.17.1.0.1.el5', u'sum': [u'md5', u'4559eff0ab1117ab8b02cf035675bc31'], u'filename': u'ocfs2-2.6.18-274.17.1.0.1.el5-1.4.9-1.el5.x86_64.rpm', u'epoch': u'0', u'version': u'1.4.9', u'release': u'1.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'ocfs2-2.6.18-274.17.1.0.1.el5debug', u'sum': [u'md5', u'4d199cb8db61fcccd140c70d65568ed3'], u'filename': u'ocfs2-2.6.18-274.17.1.0.1.el5debug-1.4.9-1.el5.x86_64.rpm', u'epoch': u'0', u'version': u'1.4.9', u'release': u'1.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'ocfs2-2.6.18-274.17.1.0.1.el5xen', u'sum': [u'md5', u'5e39491f764e11d424cd62ccb76f3c70'], u'filename': u'ocfs2-2.6.18-274.17.1.0.1.el5xen-1.4.9-1.el5.x86_64.rpm', u'epoch': u'0', u'version': u'1.4.9', u'release': u'1.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'oracleasm-2.6.18-274.17.1.0.1.el5', u'sum': [u'md5', u'f25c9bfd6c7ce1d3c6247974735e59c9'], u'filename': u'oracleasm-2.6.18-274.17.1.0.1.el5-2.0.5-1.el5.src.rpm', u'epoch': u'0', u'version': u'2.0.5', u'release': u'1.el5', u'arch': u'src'}, {u'src': None, u'name': u'oracleasm-2.6.18-274.17.1.0.1.el5', u'sum': [u'md5', u'60eed7ef306416be28e8d0e0aeea06c5'], u'filename': u'oracleasm-2.6.18-274.17.1.0.1.el5-2.0.5-1.el5.x86_64.rpm', u'epoch': u'0', u'version': u'2.0.5', u'release': u'1.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'oracleasm-2.6.18-274.17.1.0.1.el5debug', u'sum': [u'md5', u'a9a5170a92a1f8408d0d49037e164314'], u'filename': u'oracleasm-2.6.18-274.17.1.0.1.el5debug-2.0.5-1.el5.x86_64.rpm', u'epoch': u'0', u'version': u'2.0.5', u'release': u'1.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'oracleasm-2.6.18-274.17.1.0.1.el5xen', u'sum': [u'md5', u'c50db9eda15eb46255bf6893fbd7ef9b'], u'filename': u'oracleasm-2.6.18-274.17.1.0.1.el5xen-2.0.5-1.el5.x86_64.rpm', u'epoch': u'0', u'version': u'2.0.5', u'release': u'1.el5', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u'[2.6.26-2.1.12.0.1.el5_7.2]\n- Add libxml2-enterprise.patch\n- Replaced docs/redhat.gif in tarball with updated image\n\n[2.6.26-2.1.12.el5_7.2]\n- Fix the semantic of XPath axis for namespace/attribute nodes CVE-2010-4008\n- Fix an off by one error in encoding CVE-2011-0216\n- Fix some potential problems on reallocation failures CVE-2011-1944\n- Fix missing error status in XPath evaluation CVE-2011-2834\n- Make sure the parser returns when getting a Stop order CVE-2011-3905\n- Fix an allocation error when copying entities CVE-2011-3919.patch\n- Resolves: rhbz#771906', u'issued': u'2012-01-11', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELSA-2012-0017.html', u'type': u'self', u'id': None, u'title': u'ELSA-2012-0017'}, {u'href': u'http://linux.oracle.com/cve/CVE-2010-4008.html', u'type': u'cve', u'id': u'CVE-2010-4008', u'title': u'CVE-2010-4008'}, {u'href': u'http://linux.oracle.com/cve/CVE-2011-0216.html', u'type': u'cve', u'id': u'CVE-2011-0216', u'title': u'CVE-2011-0216'}, {u'href': u'http://linux.oracle.com/cve/CVE-2011-1944.html', u'type': u'cve', u'id': u'CVE-2011-1944', u'title': u'CVE-2011-1944'}, {u'href': u'http://linux.oracle.com/cve/CVE-2011-2834.html', u'type': u'cve', u'id': u'CVE-2011-2834', u'title': u'CVE-2011-2834'}, {u'href': u'http://linux.oracle.com/cve/CVE-2011-3905.html', u'type': u'cve', u'id': u'CVE-2011-3905', u'title': u'CVE-2011-3905'}, {u'href': u'http://linux.oracle.com/cve/CVE-2011-3919.html', u'type': u'cve', u'id': u'CVE-2011-3919', u'title': u'CVE-2011-3919'}], u'_content_type_id': u'erratum', u'_id': u'858cbda8-4396-44b6-aad5-807f9215096d', u'from': u'el-errata@oss.oracle.com', u'severity': u'Important', u'title': u' libxml2 security update', u'_ns': u'units_erratum', u'rights': u'Copyright 2012 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 5', u'reboot_suggested': False, u'type': u'security', u'pkglist': [{u'packages': [{u'src': None, u'name': u'libxml2', u'sum': [u'md5', u'383973c7673e4fc23913bd03e1741a6a'], u'filename': u'libxml2-2.6.26-2.1.12.0.1.el5_7.2.i386.rpm', u'epoch': u'0', u'version': u'2.6.26', u'release': u'2.1.12.0.1.el5_7.2', u'arch': u'i386'}, {u'src': None, u'name': u'libxml2', u'sum': [u'md5', u'6ebf583198421d1eaf1a358c887bfa1c'], u'filename': u'libxml2-2.6.26-2.1.12.0.1.el5_7.2.src.rpm', u'epoch': u'0', u'version': u'2.6.26', u'release': u'2.1.12.0.1.el5_7.2', u'arch': u'src'}, {u'src': None, u'name': u'libxml2', u'sum': [u'md5', u'e4c958d5aa107a0b631d523987e39098'], u'filename': u'libxml2-2.6.26-2.1.12.0.1.el5_7.2.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.26', u'release': u'2.1.12.0.1.el5_7.2', u'arch': u'x86_64'}, {u'src': None, u'name': u'libxml2-devel', u'sum': [u'md5', u'7399fdfd5513e298220265eab6d48096'], u'filename': u'libxml2-devel-2.6.26-2.1.12.0.1.el5_7.2.i386.rpm', u'epoch': u'0', u'version': u'2.6.26', u'release': u'2.1.12.0.1.el5_7.2', u'arch': u'i386'}, {u'src': None, u'name': u'libxml2-devel', u'sum': [u'md5', u'cb669842af0aee9198dc3e5445dc127f'], u'filename': u'libxml2-devel-2.6.26-2.1.12.0.1.el5_7.2.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.26', u'release': u'2.1.12.0.1.el5_7.2', u'arch': u'x86_64'}, {u'src': None, u'name': u'libxml2-python', u'sum': [u'md5', u'bbe57440b444f787cf74ae9006b8713a'], u'filename': u'libxml2-python-2.6.26-2.1.12.0.1.el5_7.2.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.26', u'release': u'2.1.12.0.1.el5_7.2', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u'[5.3.3-3.5]\n- remove extra php.ini-prod/devel files caused by %patch -b\n\n[5.3.3-3.4]\n- add security fixes for CVE-2011-4885, CVE-2011-4566 (#769754)', u'issued': u'2012-01-11', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELSA-2012-0019.html', u'type': u'self', u'id': None, u'title': u'ELSA-2012-0019'}, {u'href': u'http://linux.oracle.com/cve/CVE-2011-4566.html', u'type': u'cve', u'id': u'CVE-2011-4566', u'title': u'CVE-2011-4566'}, {u'href': u'http://linux.oracle.com/cve/CVE-2011-4885.html', u'type': u'cve', u'id': u'CVE-2011-4885', u'title': u'CVE-2011-4885'}], u'_content_type_id': u'erratum', u'_id': u'1154f09e-f901-41c3-b27b-917b955b0cfd', u'from': u'el-errata@oss.oracle.com', u'severity': u'Moderate', u'title': u' php53 and php security update', u'_ns': u'units_erratum', u'rights': u'Copyright 2012 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 6', u'reboot_suggested': False, u'type': u'security', u'pkglist': [{u'packages': [{u'src': None, u'name': u'php', u'sum': [u'md5', u'cfdc43fb9446322b536894163027baef'], u'filename': u'php-5.3.3-3.el6_2.5.src.rpm', u'epoch': u'0', u'version': u'5.3.3', u'release': u'3.el6_2.5', u'arch': u'src'}, {u'src': None, u'name': u'php', u'sum': [u'md5', u'dc4ba73877988f05cd21a2269e7df46a'], u'filename': u'php-5.3.3-3.el6_2.5.x86_64.rpm', u'epoch': u'0', u'version': u'5.3.3', u'release': u'3.el6_2.5', u'arch': u'x86_64'}, {u'src': None, u'name': u'php-bcmath', u'sum': [u'md5', u'ce646d7b7a1199a4a28c0260a1f7f242'], u'filename': u'php-bcmath-5.3.3-3.el6_2.5.x86_64.rpm', u'epoch': u'0', u'version': u'5.3.3', u'release': u'3.el6_2.5', u'arch': u'x86_64'}, {u'src': None, u'name': u'php-cli', u'sum': [u'md5', u'c0d6d9c0f1cf382d9212693714d3579a'], u'filename': u'php-cli-5.3.3-3.el6_2.5.x86_64.rpm', u'epoch': u'0', u'version': u'5.3.3', u'release': u'3.el6_2.5', u'arch': u'x86_64'}, {u'src': None, u'name': u'php-common', u'sum': [u'md5', u'99d5ac24b610fa500cde5cb9f6001f8e'], u'filename': u'php-common-5.3.3-3.el6_2.5.x86_64.rpm', u'epoch': u'0', u'version': u'5.3.3', u'release': u'3.el6_2.5', u'arch': u'x86_64'}, {u'src': None, u'name': u'php-dba', u'sum': [u'md5', u'71e1f9560df8fec55897256996131d3c'], u'filename': u'php-dba-5.3.3-3.el6_2.5.x86_64.rpm', u'epoch': u'0', u'version': u'5.3.3', u'release': u'3.el6_2.5', u'arch': u'x86_64'}, {u'src': None, u'name': u'php-devel', u'sum': [u'md5', u'8faa73115d432518f2471c0fa41d4469'], u'filename': u'php-devel-5.3.3-3.el6_2.5.x86_64.rpm', u'epoch': u'0', u'version': u'5.3.3', u'release': u'3.el6_2.5', u'arch': u'x86_64'}, {u'src': None, u'name': u'php-embedded', u'sum': [u'md5', u'0852edd08133d3a0e6f4f324d9277f4a'], u'filename': u'php-embedded-5.3.3-3.el6_2.5.x86_64.rpm', u'epoch': u'0', u'version': u'5.3.3', u'release': u'3.el6_2.5', u'arch': u'x86_64'}, {u'src': None, u'name': u'php-enchant', u'sum': [u'md5', u'e158ad925542a6a1feec6c100c6e4537'], u'filename': u'php-enchant-5.3.3-3.el6_2.5.x86_64.rpm', u'epoch': u'0', u'version': u'5.3.3', u'release': u'3.el6_2.5', u'arch': u'x86_64'}, {u'src': None, u'name': u'php-gd', u'sum': [u'md5', u'7c0f4f2afffa0b467d5d30b17fef9e42'], u'filename': u'php-gd-5.3.3-3.el6_2.5.x86_64.rpm', u'epoch': u'0', u'version': u'5.3.3', u'release': u'3.el6_2.5', u'arch': u'x86_64'}, {u'src': None, u'name': u'php-imap', u'sum': [u'md5', u'db53377346def39a64fa2a1edbf49672'], u'filename': u'php-imap-5.3.3-3.el6_2.5.x86_64.rpm', u'epoch': u'0', u'version': u'5.3.3', u'release': u'3.el6_2.5', u'arch': u'x86_64'}, {u'src': None, u'name': u'php-intl', u'sum': [u'md5', u'a4fcd3c1d91b9c80fcc3426dfa9b255f'], u'filename': u'php-intl-5.3.3-3.el6_2.5.x86_64.rpm', u'epoch': u'0', u'version': u'5.3.3', u'release': u'3.el6_2.5', u'arch': u'x86_64'}, {u'src': None, u'name': u'php-ldap', u'sum': [u'md5', u'4871930bd12c4fb82585f6906eaae4b0'], u'filename': u'php-ldap-5.3.3-3.el6_2.5.x86_64.rpm', u'epoch': u'0', u'version': u'5.3.3', u'release': u'3.el6_2.5', u'arch': u'x86_64'}, {u'src': None, u'name': u'php-mbstring', u'sum': [u'md5', u'ea0ac130cd39cbd9b674a762147afe58'], u'filename': u'php-mbstring-5.3.3-3.el6_2.5.x86_64.rpm', u'epoch': u'0', u'version': u'5.3.3', u'release': u'3.el6_2.5', u'arch': u'x86_64'}, {u'src': None, u'name': u'php-mysql', u'sum': [u'md5', u'0a5233d86a4e7d515593da3fae5bf9a3'], u'filename': u'php-mysql-5.3.3-3.el6_2.5.x86_64.rpm', u'epoch': u'0', u'version': u'5.3.3', u'release': u'3.el6_2.5', u'arch': u'x86_64'}, {u'src': None, u'name': u'php-odbc', u'sum': [u'md5', u'e76aa072f224a0b7155892ec8b1e308c'], u'filename': u'php-odbc-5.3.3-3.el6_2.5.x86_64.rpm', u'epoch': u'0', u'version': u'5.3.3', u'release': u'3.el6_2.5', u'arch': u'x86_64'}, {u'src': None, u'name': u'php-pdo', u'sum': [u'md5', u'9dac35c3e57d227bd22ba146f647ef68'], u'filename': u'php-pdo-5.3.3-3.el6_2.5.x86_64.rpm', u'epoch': u'0', u'version': u'5.3.3', u'release': u'3.el6_2.5', u'arch': u'x86_64'}, {u'src': None, u'name': u'php-pgsql', u'sum': [u'md5', u'3b46b714fd58a2ff44171545ea36fee7'], u'filename': u'php-pgsql-5.3.3-3.el6_2.5.x86_64.rpm', u'epoch': u'0', u'version': u'5.3.3', u'release': u'3.el6_2.5', u'arch': u'x86_64'}, {u'src': None, u'name': u'php-process', u'sum': [u'md5', u'5e47c57100daac626fc85e2a28c84d87'], u'filename': u'php-process-5.3.3-3.el6_2.5.x86_64.rpm', u'epoch': u'0', u'version': u'5.3.3', u'release': u'3.el6_2.5', u'arch': u'x86_64'}, {u'src': None, u'name': u'php-pspell', u'sum': [u'md5', u'c0b9581c516a76e9e0892589d0caecfe'], u'filename': u'php-pspell-5.3.3-3.el6_2.5.x86_64.rpm', u'epoch': u'0', u'version': u'5.3.3', u'release': u'3.el6_2.5', u'arch': u'x86_64'}, {u'src': None, u'name': u'php-recode', u'sum': [u'md5', u'7eb99f3ad334573fbbb0efb71077eb14'], u'filename': u'php-recode-5.3.3-3.el6_2.5.x86_64.rpm', u'epoch': u'0', u'version': u'5.3.3', u'release': u'3.el6_2.5', u'arch': u'x86_64'}, {u'src': None, u'name': u'php-snmp', u'sum': [u'md5', u'8cf38d9da59abeac442173a5e5bd5a4f'], u'filename': u'php-snmp-5.3.3-3.el6_2.5.x86_64.rpm', u'epoch': u'0', u'version': u'5.3.3', u'release': u'3.el6_2.5', u'arch': u'x86_64'}, {u'src': None, u'name': u'php-soap', u'sum': [u'md5', u'c248d750761a4e89d194b2c9444be1e2'], u'filename': u'php-soap-5.3.3-3.el6_2.5.x86_64.rpm', u'epoch': u'0', u'version': u'5.3.3', u'release': u'3.el6_2.5', u'arch': u'x86_64'}, {u'src': None, u'name': u'php-tidy', u'sum': [u'md5', u'44266d374602cf2014b2831848ed415a'], u'filename': u'php-tidy-5.3.3-3.el6_2.5.x86_64.rpm', u'epoch': u'0', u'version': u'5.3.3', u'release': u'3.el6_2.5', u'arch': u'x86_64'}, {u'src': None, u'name': u'php-xml', u'sum': [u'md5', u'adc915d990f2ae83baac1ed9e05959fc'], u'filename': u'php-xml-5.3.3-3.el6_2.5.x86_64.rpm', u'epoch': u'0', u'version': u'5.3.3', u'release': u'3.el6_2.5', u'arch': u'x86_64'}, {u'src': None, u'name': u'php-xmlrpc', u'sum': [u'md5', u'031f02215ede1c9cabfc68087d75d415'], u'filename': u'php-xmlrpc-5.3.3-3.el6_2.5.x86_64.rpm', u'epoch': u'0', u'version': u'5.3.3', u'release': u'3.el6_2.5', u'arch': u'x86_64'}, {u'src': None, u'name': u'php-zts', u'sum': [u'md5', u'2c2df6c39526a25addc081d29f354ffc'], u'filename': u'php-zts-5.3.3-3.el6_2.5.x86_64.rpm', u'epoch': u'0', u'version': u'5.3.3', u'release': u'3.el6_2.5', u'arch': u'x86_64'}], u'name': u'ol6_x86_64_latest', u'short': u'ol6_x86_64_latest'}, {u'packages': [{u'src': None, u'name': u'php53', u'sum': [u'md5', u'c331b86ffd39652bf3e694a83f9a0aea'], u'filename': u'php53-5.3.3-1.el5_7.5.src.rpm', u'epoch': u'0', u'version': u'5.3.3', u'release': u'1.el5_7.5', u'arch': u'src'}, {u'src': None, u'name': u'php53', u'sum': [u'md5', u'884cd1a5d2dfb3af47e54b4f77834720'], u'filename': u'php53-5.3.3-1.el5_7.5.x86_64.rpm', u'epoch': u'0', u'version': u'5.3.3', u'release': u'1.el5_7.5', u'arch': u'x86_64'}, {u'src': None, u'name': u'php53-bcmath', u'sum': [u'md5', u'b43626aa76863736c2bf027d5c0df81e'], u'filename': u'php53-bcmath-5.3.3-1.el5_7.5.x86_64.rpm', u'epoch': u'0', u'version': u'5.3.3', u'release': u'1.el5_7.5', u'arch': u'x86_64'}, {u'src': None, u'name': u'php53-cli', u'sum': [u'md5', u'784529d469e728552fd4de261d301fc1'], u'filename': u'php53-cli-5.3.3-1.el5_7.5.x86_64.rpm', u'epoch': u'0', u'version': u'5.3.3', u'release': u'1.el5_7.5', u'arch': u'x86_64'}, {u'src': None, u'name': u'php53-common', u'sum': [u'md5', u'4aeb201335929f5792d34fbe6ec6be3e'], u'filename': u'php53-common-5.3.3-1.el5_7.5.x86_64.rpm', u'epoch': u'0', u'version': u'5.3.3', u'release': u'1.el5_7.5', u'arch': u'x86_64'}, {u'src': None, u'name': u'php53-dba', u'sum': [u'md5', u'78c643f7db3003077c3c0fcee7fa1e9f'], u'filename': u'php53-dba-5.3.3-1.el5_7.5.x86_64.rpm', u'epoch': u'0', u'version': u'5.3.3', u'release': u'1.el5_7.5', u'arch': u'x86_64'}, {u'src': None, u'name': u'php53-devel', u'sum': [u'md5', u'f2508bbd1a6ee0d786c8c742e6da55e8'], u'filename': u'php53-devel-5.3.3-1.el5_7.5.x86_64.rpm', u'epoch': u'0', u'version': u'5.3.3', u'release': u'1.el5_7.5', u'arch': u'x86_64'}, {u'src': None, u'name': u'php53-gd', u'sum': [u'md5', u'7caa942aaa32eb54c5b3ed1290f40940'], u'filename': u'php53-gd-5.3.3-1.el5_7.5.x86_64.rpm', u'epoch': u'0', u'version': u'5.3.3', u'release': u'1.el5_7.5', u'arch': u'x86_64'}, {u'src': None, u'name': u'php53-imap', u'sum': [u'md5', u'e1fbbbb0422500d301e8e839b9644f75'], u'filename': u'php53-imap-5.3.3-1.el5_7.5.x86_64.rpm', u'epoch': u'0', u'version': u'5.3.3', u'release': u'1.el5_7.5', u'arch': u'x86_64'}, {u'src': None, u'name': u'php53-intl', u'sum': [u'md5', u'2166335bffa2b4a57d2d57a40bc97126'], u'filename': u'php53-intl-5.3.3-1.el5_7.5.x86_64.rpm', u'epoch': u'0', u'version': u'5.3.3', u'release': u'1.el5_7.5', u'arch': u'x86_64'}, {u'src': None, u'name': u'php53-ldap', u'sum': [u'md5', u'cd9e6d54400e96fff45742768bbcb243'], u'filename': u'php53-ldap-5.3.3-1.el5_7.5.x86_64.rpm', u'epoch': u'0', u'version': u'5.3.3', u'release': u'1.el5_7.5', u'arch': u'x86_64'}, {u'src': None, u'name': u'php53-mbstring', u'sum': [u'md5', u'102dc7fe47e37ccd043f22486ce94a56'], u'filename': u'php53-mbstring-5.3.3-1.el5_7.5.x86_64.rpm', u'epoch': u'0', u'version': u'5.3.3', u'release': u'1.el5_7.5', u'arch': u'x86_64'}, {u'src': None, u'name': u'php53-mysql', u'sum': [u'md5', u'50bb7580770666216be591059bf17375'], u'filename': u'php53-mysql-5.3.3-1.el5_7.5.x86_64.rpm', u'epoch': u'0', u'version': u'5.3.3', u'release': u'1.el5_7.5', u'arch': u'x86_64'}, {u'src': None, u'name': u'php53-odbc', u'sum': [u'md5', u'9a90100a39793bf1fc3d5b86379e2b12'], u'filename': u'php53-odbc-5.3.3-1.el5_7.5.x86_64.rpm', u'epoch': u'0', u'version': u'5.3.3', u'release': u'1.el5_7.5', u'arch': u'x86_64'}, {u'src': None, u'name': u'php53-pdo', u'sum': [u'md5', u'7dcd3e453bbbda7113d64ec2dbe5661a'], u'filename': u'php53-pdo-5.3.3-1.el5_7.5.x86_64.rpm', u'epoch': u'0', u'version': u'5.3.3', u'release': u'1.el5_7.5', u'arch': u'x86_64'}, {u'src': None, u'name': u'php53-pgsql', u'sum': [u'md5', u'e0fa55225f74ec3ddcc2dbb8d000556a'], u'filename': u'php53-pgsql-5.3.3-1.el5_7.5.x86_64.rpm', u'epoch': u'0', u'version': u'5.3.3', u'release': u'1.el5_7.5', u'arch': u'x86_64'}, {u'src': None, u'name': u'php53-process', u'sum': [u'md5', u'd1921e334cb5f319eca5dd6b9e15e651'], u'filename': u'php53-process-5.3.3-1.el5_7.5.x86_64.rpm', u'epoch': u'0', u'version': u'5.3.3', u'release': u'1.el5_7.5', u'arch': u'x86_64'}, {u'src': None, u'name': u'php53-pspell', u'sum': [u'md5', u'912df3734ac2dc72f1da293dffecc311'], u'filename': u'php53-pspell-5.3.3-1.el5_7.5.x86_64.rpm', u'epoch': u'0', u'version': u'5.3.3', u'release': u'1.el5_7.5', u'arch': u'x86_64'}, {u'src': None, u'name': u'php53-snmp', u'sum': [u'md5', u'778e67c0a2e192ba4e30c82a47123ac3'], u'filename': u'php53-snmp-5.3.3-1.el5_7.5.x86_64.rpm', u'epoch': u'0', u'version': u'5.3.3', u'release': u'1.el5_7.5', u'arch': u'x86_64'}, {u'src': None, u'name': u'php53-soap', u'sum': [u'md5', u'812b5d82d65ceeb13811c68b18df1f70'], u'filename': u'php53-soap-5.3.3-1.el5_7.5.x86_64.rpm', u'epoch': u'0', u'version': u'5.3.3', u'release': u'1.el5_7.5', u'arch': u'x86_64'}, {u'src': None, u'name': u'php53-xml', u'sum': [u'md5', u'10b5617bc351f48be6a934637668240d'], u'filename': u'php53-xml-5.3.3-1.el5_7.5.x86_64.rpm', u'epoch': u'0', u'version': u'5.3.3', u'release': u'1.el5_7.5', u'arch': u'x86_64'}, {u'src': None, u'name': u'php53-xmlrpc', u'sum': [u'md5', u'963c5ec76c01462e9b52a2c63eb776ce'], u'filename': u'php53-xmlrpc-5.3.3-1.el5_7.5.x86_64.rpm', u'epoch': u'0', u'version': u'5.3.3', u'release': u'1.el5_7.5', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u'[5.1.6-27.4]\n- add security fixes for CVE-2011-4885, CVE-2011-4566, CVE-2011-0708,\n CVE-2011-1148, CVE-2011-1466, CVE-2011-1469, CVE-2011-2202 (#769756)', u'issued': u'2012-01-18', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELSA-2012-0033.html', u'type': u'self', u'id': None, u'title': u'ELSA-2012-0033'}, {u'href': u'http://linux.oracle.com/cve/CVE-2011-0708.html', u'type': u'cve', u'id': u'CVE-2011-0708', u'title': u'CVE-2011-0708'}, {u'href': u'http://linux.oracle.com/cve/CVE-2011-1148.html', u'type': u'cve', u'id': u'CVE-2011-1148', u'title': u'CVE-2011-1148'}, {u'href': u'http://linux.oracle.com/cve/CVE-2011-1466.html', u'type': u'cve', u'id': u'CVE-2011-1466', u'title': u'CVE-2011-1466'}, {u'href': u'http://linux.oracle.com/cve/CVE-2011-1469.html', u'type': u'cve', u'id': u'CVE-2011-1469', u'title': u'CVE-2011-1469'}, {u'href': u'http://linux.oracle.com/cve/CVE-2011-2202.html', u'type': u'cve', u'id': u'CVE-2011-2202', u'title': u'CVE-2011-2202'}, {u'href': u'http://linux.oracle.com/cve/CVE-2011-4566.html', u'type': u'cve', u'id': u'CVE-2011-4566', u'title': u'CVE-2011-4566'}, {u'href': u'http://linux.oracle.com/cve/CVE-2011-4885.html', u'type': u'cve', u'id': u'CVE-2011-4885', u'title': u'CVE-2011-4885'}], u'_content_type_id': u'erratum', u'_id': u'65267e1b-77e3-4234-a94c-b43cf48c66a8', u'from': u'el-errata@oss.oracle.com', u'severity': u'Moderate', u'title': u' php security update', u'_ns': u'units_erratum', u'rights': u'Copyright 2012 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 5', u'reboot_suggested': False, u'type': u'security', u'pkglist': [{u'packages': [{u'src': None, u'name': u'php', u'sum': [u'md5', u'49011e31fc24162ba4eef4d1e4a17bae'], u'filename': u'php-5.1.6-27.el5_7.4.src.rpm', u'epoch': u'0', u'version': u'5.1.6', u'release': u'27.el5_7.4', u'arch': u'src'}, {u'src': None, u'name': u'php', u'sum': [u'md5', u'3f8501bf5ce2d5f8ec4e2b3fa7e5e78f'], u'filename': u'php-5.1.6-27.el5_7.4.x86_64.rpm', u'epoch': u'0', u'version': u'5.1.6', u'release': u'27.el5_7.4', u'arch': u'x86_64'}, {u'src': None, u'name': u'php-bcmath', u'sum': [u'md5', u'7f35343d39c37b33f5e1f8b2c843aefe'], u'filename': u'php-bcmath-5.1.6-27.el5_7.4.x86_64.rpm', u'epoch': u'0', u'version': u'5.1.6', u'release': u'27.el5_7.4', u'arch': u'x86_64'}, {u'src': None, u'name': u'php-cli', u'sum': [u'md5', u'c12438cb00da5073a29778c733fba79c'], u'filename': u'php-cli-5.1.6-27.el5_7.4.x86_64.rpm', u'epoch': u'0', u'version': u'5.1.6', u'release': u'27.el5_7.4', u'arch': u'x86_64'}, {u'src': None, u'name': u'php-common', u'sum': [u'md5', u'83c139e60d794d8f1f93a192f834c6c4'], u'filename': u'php-common-5.1.6-27.el5_7.4.x86_64.rpm', u'epoch': u'0', u'version': u'5.1.6', u'release': u'27.el5_7.4', u'arch': u'x86_64'}, {u'src': None, u'name': u'php-dba', u'sum': [u'md5', u'e2ec153f8be9c5006d11f9184e8b1873'], u'filename': u'php-dba-5.1.6-27.el5_7.4.x86_64.rpm', u'epoch': u'0', u'version': u'5.1.6', u'release': u'27.el5_7.4', u'arch': u'x86_64'}, {u'src': None, u'name': u'php-devel', u'sum': [u'md5', u'97e585650fd0bf0e96893f5aa01facea'], u'filename': u'php-devel-5.1.6-27.el5_7.4.x86_64.rpm', u'epoch': u'0', u'version': u'5.1.6', u'release': u'27.el5_7.4', u'arch': u'x86_64'}, {u'src': None, u'name': u'php-gd', u'sum': [u'md5', u'663259b83533a022d30fd5d877d0b255'], u'filename': u'php-gd-5.1.6-27.el5_7.4.x86_64.rpm', u'epoch': u'0', u'version': u'5.1.6', u'release': u'27.el5_7.4', u'arch': u'x86_64'}, {u'src': None, u'name': u'php-imap', u'sum': [u'md5', u'09f1f1104f1eef444423fd7f8e485528'], u'filename': u'php-imap-5.1.6-27.el5_7.4.x86_64.rpm', u'epoch': u'0', u'version': u'5.1.6', u'release': u'27.el5_7.4', u'arch': u'x86_64'}, {u'src': None, u'name': u'php-ldap', u'sum': [u'md5', u'107c743d4856646226da064906313a5a'], u'filename': u'php-ldap-5.1.6-27.el5_7.4.x86_64.rpm', u'epoch': u'0', u'version': u'5.1.6', u'release': u'27.el5_7.4', u'arch': u'x86_64'}, {u'src': None, u'name': u'php-mbstring', u'sum': [u'md5', u'3c838cf6e1e0ff8b19abb5bf501d6c51'], u'filename': u'php-mbstring-5.1.6-27.el5_7.4.x86_64.rpm', u'epoch': u'0', u'version': u'5.1.6', u'release': u'27.el5_7.4', u'arch': u'x86_64'}, {u'src': None, u'name': u'php-mysql', u'sum': [u'md5', u'738257842e7faafc203741997451a776'], u'filename': u'php-mysql-5.1.6-27.el5_7.4.x86_64.rpm', u'epoch': u'0', u'version': u'5.1.6', u'release': u'27.el5_7.4', u'arch': u'x86_64'}, {u'src': None, u'name': u'php-ncurses', u'sum': [u'md5', u'1a4e57344b1f72d3f3d35056e8b1eb81'], u'filename': u'php-ncurses-5.1.6-27.el5_7.4.x86_64.rpm', u'epoch': u'0', u'version': u'5.1.6', u'release': u'27.el5_7.4', u'arch': u'x86_64'}, {u'src': None, u'name': u'php-odbc', u'sum': [u'md5', u'b0d78c247de010e00dccef596040f793'], u'filename': u'php-odbc-5.1.6-27.el5_7.4.x86_64.rpm', u'epoch': u'0', u'version': u'5.1.6', u'release': u'27.el5_7.4', u'arch': u'x86_64'}, {u'src': None, u'name': u'php-pdo', u'sum': [u'md5', u'4983772dc0f92b643afece4daf8527d6'], u'filename': u'php-pdo-5.1.6-27.el5_7.4.x86_64.rpm', u'epoch': u'0', u'version': u'5.1.6', u'release': u'27.el5_7.4', u'arch': u'x86_64'}, {u'src': None, u'name': u'php-pgsql', u'sum': [u'md5', u'1509422cb5324c49804bde75b66b653f'], u'filename': u'php-pgsql-5.1.6-27.el5_7.4.x86_64.rpm', u'epoch': u'0', u'version': u'5.1.6', u'release': u'27.el5_7.4', u'arch': u'x86_64'}, {u'src': None, u'name': u'php-snmp', u'sum': [u'md5', u'193a92bc0f596a89a276825673a63b24'], u'filename': u'php-snmp-5.1.6-27.el5_7.4.x86_64.rpm', u'epoch': u'0', u'version': u'5.1.6', u'release': u'27.el5_7.4', u'arch': u'x86_64'}, {u'src': None, u'name': u'php-soap', u'sum': [u'md5', u'36a93120aa29fb4d42457ae0d3321e1c'], u'filename': u'php-soap-5.1.6-27.el5_7.4.x86_64.rpm', u'epoch': u'0', u'version': u'5.1.6', u'release': u'27.el5_7.4', u'arch': u'x86_64'}, {u'src': None, u'name': u'php-xml', u'sum': [u'md5', u'bf8927bcb6945c74a16d70bad82af036'], u'filename': u'php-xml-5.1.6-27.el5_7.4.x86_64.rpm', u'epoch': u'0', u'version': u'5.1.6', u'release': u'27.el5_7.4', u'arch': u'x86_64'}, {u'src': None, u'name': u'php-xmlrpc', u'sum': [u'md5', u'0690050c399eb026a43ed26d0f761e30'], u'filename': u'php-xmlrpc-5.1.6-27.el5_7.4.x86_64.rpm', u'epoch': u'0', u'version': u'5.1.6', u'release': u'27.el5_7.4', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u'[kvm-83-239.0.1.el5_7.1]\n- Added kvm-add-oracle-workaround-for-libvirt-bug.patch\n- Added kvm-Introduce-oel-machine-type.patch\n\n[kvm-83-239.el5_7.1]\n- kvm-e1000-prevent-buffer-overflow-when-processing-legacy.patch [bz#772079]\n- Resolves: bz#772079\n (EMBARGOED CVE-2012-0029 qemu-kvm: e1000: process_tx_desc legacy mode packets heap overflow [rhel-5.7.z])\n- kvm-Fix-external-module-compat.c-not-to-use-unsupported-.patch [bz#753860]\n (build fix)\n- kvm-kernel-KVM-x86-Prevent-starting-PIT-timers-in-the-absence-o.patch [bz#770100]\n- Resolves: bz#770100\n (CVE-2011-4622 kernel: kvm: pit timer with no irqchip crashes the system [rhel-5.7.z])\n\n[kvm-83-239.el5_7.1]\n- Updated kversion to 2.6.18-274.17.1.el5 to match build root', u'issued': u'2012-01-23', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELSA-2012-0051.html', u'type': u'self', u'id': None, u'title': u'ELSA-2012-0051'}, {u'href': u'http://linux.oracle.com/cve/CVE-2012-0029.html', u'type': u'cve', u'id': u'CVE-2012-0029', u'title': u'CVE-2012-0029'}, {u'href': u'http://linux.oracle.com/cve/CVE-2011-4622.html', u'type': u'cve', u'id': u'CVE-2011-4622', u'title': u'CVE-2011-4622'}], u'_content_type_id': u'erratum', u'_id': u'7ab9bc60-6110-4f80-96b1-4eff936352a4', u'from': u'el-errata@oss.oracle.com', u'severity': u'Important', u'title': u' kvm security update', u'_ns': u'units_erratum', u'rights': u'Copyright 2012 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 5', u'reboot_suggested': False, u'type': u'security', u'pkglist': [{u'packages': [{u'src': None, u'name': u'kmod-kvm', u'sum': [u'md5', u'8f88e8e2a7021b526e15c53567f5a43e'], u'filename': u'kmod-kvm-83-239.0.1.el5_7.1.x86_64.rpm', u'epoch': u'0', u'version': u'83', u'release': u'239.0.1.el5_7.1', u'arch': u'x86_64'}, {u'src': None, u'name': u'kmod-kvm-debug', u'sum': [u'md5', u'55ce1ba3c0ea66402b226c1d95faaf4c'], u'filename': u'kmod-kvm-debug-83-239.0.1.el5_7.1.x86_64.rpm', u'epoch': u'0', u'version': u'83', u'release': u'239.0.1.el5_7.1', u'arch': u'x86_64'}, {u'src': None, u'name': u'kvm', u'sum': [u'md5', u'3365dde3b163f00081237a92955a7d10'], u'filename': u'kvm-83-239.0.1.el5_7.1.src.rpm', u'epoch': u'0', u'version': u'83', u'release': u'239.0.1.el5_7.1', u'arch': u'src'}, {u'src': None, u'name': u'kvm', u'sum': [u'md5', u'9bfd4a2230d8a1f27f77e7a6505b6dfe'], u'filename': u'kvm-83-239.0.1.el5_7.1.x86_64.rpm', u'epoch': u'0', u'version': u'83', u'release': u'239.0.1.el5_7.1', u'arch': u'x86_64'}, {u'src': None, u'name': u'kvm-qemu-img', u'sum': [u'md5', u'dfbe1e6df5138a67a345e81c38a18753'], u'filename': u'kvm-qemu-img-83-239.0.1.el5_7.1.x86_64.rpm', u'epoch': u'0', u'version': u'83', u'release': u'239.0.1.el5_7.1', u'arch': u'x86_64'}, {u'src': None, u'name': u'kvm-tools', u'sum': [u'md5', u'0097acac15f20ac3e7ccbff3c0043473'], u'filename': u'kvm-tools-83-239.0.1.el5_7.1.x86_64.rpm', u'epoch': u'0', u'version': u'83', u'release': u'239.0.1.el5_7.1', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u'[0.9.8e-20.1]\n- fix for CVE-2011-4108 & CVE-2012-0050 - DTLS plaintext recovery\n vulnerability and additional DTLS fixes (#771770)\n- fix for CVE-2011-4109 - double free in policy checks (#771771)\n- fix for CVE-2011-4576 - uninitialized SSL 3.0 padding (#771775)\n- fix for CVE-2011-4619 - SGC restart DoS attack (#771780)', u'issued': u'2012-01-24', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELSA-2012-0060.html', u'type': u'self', u'id': None, u'title': u'ELSA-2012-0060'}, {u'href': u'http://linux.oracle.com/cve/CVE-2011-4108.html', u'type': u'cve', u'id': u'CVE-2011-4108', u'title': u'CVE-2011-4108'}, {u'href': u'http://linux.oracle.com/cve/CVE-2011-4109.html', u'type': u'cve', u'id': u'CVE-2011-4109', u'title': u'CVE-2011-4109'}, {u'href': u'http://linux.oracle.com/cve/CVE-2011-4576.html', u'type': u'cve', u'id': u'CVE-2011-4576', u'title': u'CVE-2011-4576'}, {u'href': u'http://linux.oracle.com/cve/CVE-2011-4619.html', u'type': u'cve', u'id': u'CVE-2011-4619', u'title': u'CVE-2011-4619'}], u'_content_type_id': u'erratum', u'_id': u'72d6e911-b65b-47de-901e-6bc66610afa3', u'from': u'el-errata@oss.oracle.com', u'severity': u'Moderate', u'title': u' openssl security update', u'_ns': u'units_erratum', u'rights': u'Copyright 2012 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 5', u'reboot_suggested': False, u'type': u'security', u'pkglist': [{u'packages': [{u'src': None, u'name': u'openssl', u'sum': [u'md5', u'120f6baf76a62a6785eb623ba94cc4e8'], u'filename': u'openssl-0.9.8e-20.el5_7.1.src.rpm', u'epoch': u'0', u'version': u'0.9.8e', u'release': u'20.el5_7.1', u'arch': u'src'}, {u'src': None, u'name': u'openssl', u'sum': [u'md5', u'e9b27370aa69ae1a0a4d8330f2d19968'], u'filename': u'openssl-0.9.8e-20.el5_7.1.i686.rpm', u'epoch': u'0', u'version': u'0.9.8e', u'release': u'20.el5_7.1', u'arch': u'i686'}, {u'src': None, u'name': u'openssl', u'sum': [u'md5', u'8b357ec648e09b7c50e6281a92be38da'], u'filename': u'openssl-0.9.8e-20.el5_7.1.x86_64.rpm', u'epoch': u'0', u'version': u'0.9.8e', u'release': u'20.el5_7.1', u'arch': u'x86_64'}, {u'src': None, u'name': u'openssl-devel', u'sum': [u'md5', u'95019579f49d6d35bfe22dbf4dc57aab'], u'filename': u'openssl-devel-0.9.8e-20.el5_7.1.i386.rpm', u'epoch': u'0', u'version': u'0.9.8e', u'release': u'20.el5_7.1', u'arch': u'i386'}, {u'src': None, u'name': u'openssl-devel', u'sum': [u'md5', u'80b09ae48ee1f56d54dc6995bbc37fb4'], u'filename': u'openssl-devel-0.9.8e-20.el5_7.1.x86_64.rpm', u'epoch': u'0', u'version': u'0.9.8e', u'release': u'20.el5_7.1', u'arch': u'x86_64'}, {u'src': None, u'name': u'openssl-perl', u'sum': [u'md5', u'e6f9652befee592c18b3c02ebaa3324c'], u'filename': u'openssl-perl-0.9.8e-20.el5_7.1.x86_64.rpm', u'epoch': u'0', u'version': u'0.9.8e', u'release': u'20.el5_7.1', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u'[1.8.5-22.1]\n- Properly initialize the random number generator when forking new process\n * ruby-1.8.7-CVE-2011-3009.patch\n - Related: rhbz#768829\n\n[1.8.5-21.1]\n- Revert accidential move of tcl/tk libraries.\n - Related: rhbz#768829\n\n[1.8.5-20.1]\n- Address CVE-2011-4815 "DoS (excessive CPU use) via hash meet-in-the-middle\n attacks (oCERT-2011-003)"\n * ruby-1.8.7-CVE-2011-4815.patch\n - Resolves: rhbz#768829', u'issued': u'2012-01-30', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELSA-2012-0070.html', u'type': u'self', u'id': None, u'title': u'ELSA-2012-0070'}, {u'href': u'http://linux.oracle.com/cve/CVE-2011-3009.html', u'type': u'cve', u'id': u'CVE-2011-3009', u'title': u'CVE-2011-3009'}, {u'href': u'http://linux.oracle.com/cve/CVE-2011-4815.html', u'type': u'cve', u'id': u'CVE-2011-4815', u'title': u'CVE-2011-4815'}], u'_content_type_id': u'erratum', u'_id': u'1dbd82ed-0aeb-4baa-8330-9351a049a5ba', u'from': u'el-errata@oss.oracle.com', u'severity': u'Moderate', u'title': u' ruby security update', u'_ns': u'units_erratum', u'rights': u'Copyright 2012 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 5', u'reboot_suggested': False, u'type': u'security', u'pkglist': [{u'packages': [{u'src': None, u'name': u'ruby', u'sum': [u'md5', u'e78258a97f3cb15bc2def95c36687098'], u'filename': u'ruby-1.8.5-22.el5_7.1.src.rpm', u'epoch': u'0', u'version': u'1.8.5', u'release': u'22.el5_7.1', u'arch': u'src'}, {u'src': None, u'name': u'ruby', u'sum': [u'md5', u'167f32f639fc34c4c1337ff0732f6f2d'], u'filename': u'ruby-1.8.5-22.el5_7.1.x86_64.rpm', u'epoch': u'0', u'version': u'1.8.5', u'release': u'22.el5_7.1', u'arch': u'x86_64'}, {u'src': None, u'name': u'ruby-devel', u'sum': [u'md5', u'693f86b41398b48de1cd4923954cce54'], u'filename': u'ruby-devel-1.8.5-22.el5_7.1.i386.rpm', u'epoch': u'0', u'version': u'1.8.5', u'release': u'22.el5_7.1', u'arch': u'i386'}, {u'src': None, u'name': u'ruby-devel', u'sum': [u'md5', u'95068392f47129e0bf6b85e2cd179182'], u'filename': u'ruby-devel-1.8.5-22.el5_7.1.x86_64.rpm', u'epoch': u'0', u'version': u'1.8.5', u'release': u'22.el5_7.1', u'arch': u'x86_64'}, {u'src': None, u'name': u'ruby-docs', u'sum': [u'md5', u'95f746adb5119454ff66628b82c6c9f6'], u'filename': u'ruby-docs-1.8.5-22.el5_7.1.x86_64.rpm', u'epoch': u'0', u'version': u'1.8.5', u'release': u'22.el5_7.1', u'arch': u'x86_64'}, {u'src': None, u'name': u'ruby-irb', u'sum': [u'md5', u'3317c4bf808835adb48c105db73a6962'], u'filename': u'ruby-irb-1.8.5-22.el5_7.1.x86_64.rpm', u'epoch': u'0', u'version': u'1.8.5', u'release': u'22.el5_7.1', u'arch': u'x86_64'}, {u'src': None, u'name': u'ruby-libs', u'sum': [u'md5', u'3793403838050c2b55c093b4bee6c1f4'], u'filename': u'ruby-libs-1.8.5-22.el5_7.1.i386.rpm', u'epoch': u'0', u'version': u'1.8.5', u'release': u'22.el5_7.1', u'arch': u'i386'}, {u'src': None, u'name': u'ruby-libs', u'sum': [u'md5', u'ec815068422af91afe46f2225c0f1d76'], u'filename': u'ruby-libs-1.8.5-22.el5_7.1.x86_64.rpm', u'epoch': u'0', u'version': u'1.8.5', u'release': u'22.el5_7.1', u'arch': u'x86_64'}, {u'src': None, u'name': u'ruby-mode', u'sum': [u'md5', u'ac193c9766eb47ddb32a572e138526c2'], u'filename': u'ruby-mode-1.8.5-22.el5_7.1.x86_64.rpm', u'epoch': u'0', u'version': u'1.8.5', u'release': u'22.el5_7.1', u'arch': u'x86_64'}, {u'src': None, u'name': u'ruby-rdoc', u'sum': [u'md5', u'04dad5543a532e9347ad7a418008495c'], u'filename': u'ruby-rdoc-1.8.5-22.el5_7.1.x86_64.rpm', u'epoch': u'0', u'version': u'1.8.5', u'release': u'22.el5_7.1', u'arch': u'x86_64'}, {u'src': None, u'name': u'ruby-ri', u'sum': [u'md5', u'2fb05458925d662a3c69a2b11c025ad7'], u'filename': u'ruby-ri-1.8.5-22.el5_7.1.x86_64.rpm', u'epoch': u'0', u'version': u'1.8.5', u'release': u'22.el5_7.1', u'arch': u'x86_64'}, {u'src': None, u'name': u'ruby-tcltk', u'sum': [u'md5', u'7bebfb944bd23d8fe9849f1bf53fa8c9'], u'filename': u'ruby-tcltk-1.8.5-22.el5_7.1.x86_64.rpm', u'epoch': u'0', u'version': u'1.8.5', u'release': u'22.el5_7.1', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u'firefox:\n[3.6.26-1.0.1.el6_2]\n- Add firefox-oracle-default-prefs.js and remove the corresponding Red Hat ones\n\n[3.6.26-1]\n- Update to 3.6.26\n\nxulrunner:\n\n[1.9.2.26-1.0.1.el6_2]\n- Replace xulrunner-redhat-default-prefs.js with\n xulrunner-oracle-default-prefs.js\n\n[1.9.2.26-1]\n- Update to 1.9.2.26', u'issued': u'2012-01-31', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELSA-2012-0079.html', u'type': u'self', u'id': None, u'title': u'ELSA-2012-0079'}, {u'href': u'http://linux.oracle.com/cve/CVE-2011-3659.html', u'type': u'cve', u'id': u'CVE-2011-3659', u'title': u'CVE-2011-3659'}, {u'href': u'http://linux.oracle.com/cve/CVE-2011-3670.html', u'type': u'cve', u'id': u'CVE-2011-3670', u'title': u'CVE-2011-3670'}, {u'href': u'http://linux.oracle.com/cve/CVE-2012-0442.html', u'type': u'cve', u'id': u'CVE-2012-0442', u'title': u'CVE-2012-0442'}, {u'href': u'http://linux.oracle.com/cve/CVE-2012-0444.html', u'type': u'cve', u'id': u'CVE-2012-0444', u'title': u'CVE-2012-0444'}, {u'href': u'http://linux.oracle.com/cve/CVE-2012-0449.html', u'type': u'cve', u'id': u'CVE-2012-0449', u'title': u'CVE-2012-0449'}], u'_content_type_id': u'erratum', u'_id': u'152bbed0-7681-4779-be99-5322790a49e9', u'from': u'el-errata@oss.oracle.com', u'severity': u'Critical', u'title': u' firefox security update', u'_ns': u'units_erratum', u'rights': u'Copyright 2012 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 6', u'reboot_suggested': False, u'type': u'security', u'pkglist': [{u'packages': [{u'src': None, u'name': u'firefox', u'sum': [u'md5', u'382d6acfa3e4eb46e7a0b5328e0e3d3a'], u'filename': u'firefox-3.6.26-1.0.1.el6_2.i686.rpm', u'epoch': u'0', u'version': u'3.6.26', u'release': u'1.0.1.el6_2', u'arch': u'i686'}, {u'src': None, u'name': u'firefox', u'sum': [u'md5', u'3199c4c1b222d0514f89cb386c66a298'], u'filename': u'firefox-3.6.26-1.0.1.el6_2.src.rpm', u'epoch': u'0', u'version': u'3.6.26', u'release': u'1.0.1.el6_2', u'arch': u'src'}, {u'src': None, u'name': u'firefox', u'sum': [u'md5', u'7f91e3fb02636e2d64e1dd905d239ef5'], u'filename': u'firefox-3.6.26-1.0.1.el6_2.x86_64.rpm', u'epoch': u'0', u'version': u'3.6.26', u'release': u'1.0.1.el6_2', u'arch': u'x86_64'}, {u'src': None, u'name': u'xulrunner', u'sum': [u'md5', u'1f7370dbd8256d1dd5d8c40ff2fd9248'], u'filename': u'xulrunner-1.9.2.26-1.0.1.el6_2.i686.rpm', u'epoch': u'0', u'version': u'1.9.2.26', u'release': u'1.0.1.el6_2', u'arch': u'i686'}, {u'src': None, u'name': u'xulrunner', u'sum': [u'md5', u'e00e77567149462465a7ad5297fe61a6'], u'filename': u'xulrunner-1.9.2.26-1.0.1.el6_2.src.rpm', u'epoch': u'0', u'version': u'1.9.2.26', u'release': u'1.0.1.el6_2', u'arch': u'src'}, {u'src': None, u'name': u'xulrunner', u'sum': [u'md5', u'e999fd782318eb56b25de2e38c859443'], u'filename': u'xulrunner-1.9.2.26-1.0.1.el6_2.x86_64.rpm', u'epoch': u'0', u'version': u'1.9.2.26', u'release': u'1.0.1.el6_2', u'arch': u'x86_64'}, {u'src': None, u'name': u'xulrunner-devel', u'sum': [u'md5', u'ce489352a45f6526357bd39ec099d015'], u'filename': u'xulrunner-devel-1.9.2.26-1.0.1.el6_2.i686.rpm', u'epoch': u'0', u'version': u'1.9.2.26', u'release': u'1.0.1.el6_2', u'arch': u'i686'}, {u'src': None, u'name': u'xulrunner-devel', u'sum': [u'md5', u'86a99b33faad2ecda9a19a53a88dfa1e'], u'filename': u'xulrunner-devel-1.9.2.26-1.0.1.el6_2.x86_64.rpm', u'epoch': u'0', u'version': u'1.9.2.26', u'release': u'1.0.1.el6_2', u'arch': u'x86_64'}], u'name': u'ol6_x86_64_latest', u'short': u'ol6_x86_64_latest'}, {u'packages': [{u'src': None, u'name': u'firefox', u'sum': [u'md5', u'29026e615e2a9a1afebb980ad2be488f'], u'filename': u'firefox-3.6.26-1.0.1.el5_7.i386.rpm', u'epoch': u'0', u'version': u'3.6.26', u'release': u'1.0.1.el5_7', u'arch': u'i386'}, {u'src': None, u'name': u'firefox', u'sum': [u'md5', u'550d132f4df869f95056ca8e662fb7a1'], u'filename': u'firefox-3.6.26-1.0.1.el5_7.src.rpm', u'epoch': u'0', u'version': u'3.6.26', u'release': u'1.0.1.el5_7', u'arch': u'src'}, {u'src': None, u'name': u'firefox', u'sum': [u'md5', u'c9474e98efe7b6310f1be3efbaf69e3a'], u'filename': u'firefox-3.6.26-1.0.1.el5_7.x86_64.rpm', u'epoch': u'0', u'version': u'3.6.26', u'release': u'1.0.1.el5_7', u'arch': u'x86_64'}, {u'src': None, u'name': u'xulrunner', u'sum': [u'md5', u'64cef88b2c28929c3b23dbe3b5dc080a'], u'filename': u'xulrunner-1.9.2.26-1.0.1.el5_7.i386.rpm', u'epoch': u'0', u'version': u'1.9.2.26', u'release': u'1.0.1.el5_7', u'arch': u'i386'}, {u'src': None, u'name': u'xulrunner', u'sum': [u'md5', u'7181ff6311625236f823c9c91499d15d'], u'filename': u'xulrunner-1.9.2.26-1.0.1.el5_7.src.rpm', u'epoch': u'0', u'version': u'1.9.2.26', u'release': u'1.0.1.el5_7', u'arch': u'src'}, {u'src': None, u'name': u'xulrunner', u'sum': [u'md5', u'53dbfecca90105c924f6c1d293988e5c'], u'filename': u'xulrunner-1.9.2.26-1.0.1.el5_7.x86_64.rpm', u'epoch': u'0', u'version': u'1.9.2.26', u'release': u'1.0.1.el5_7', u'arch': u'x86_64'}, {u'src': None, u'name': u'xulrunner-devel', u'sum': [u'md5', u'0a93031ad240ac8d761bec6147c68ddb'], u'filename': u'xulrunner-devel-1.9.2.26-1.0.1.el5_7.i386.rpm', u'epoch': u'0', u'version': u'1.9.2.26', u'release': u'1.0.1.el5_7', u'arch': u'i386'}, {u'src': None, u'name': u'xulrunner-devel', u'sum': [u'md5', u'f5a223835ac510e5bd88f5c078dd6ca1'], u'filename': u'xulrunner-devel-1.9.2.26-1.0.1.el5_7.x86_64.rpm', u'epoch': u'0', u'version': u'1.9.2.26', u'release': u'1.0.1.el5_7', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u'[5.3.3-1.6]\n- add security fix for CVE-2012-0830 (#786757)', u'issued': u'2012-02-02', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELSA-2012-0092.html', u'type': u'self', u'id': None, u'title': u'ELSA-2012-0092'}, {u'href': u'http://linux.oracle.com/cve/CVE-2012-0830.html', u'type': u'cve', u'id': u'CVE-2012-0830', u'title': u'CVE-2012-0830'}], u'_content_type_id': u'erratum', u'_id': u'bebab2b5-9ec6-4c50-a5e9-7f00ed2527da', u'from': u'el-errata@oss.oracle.com', u'severity': u'Critical', u'title': u' php53 security update', u'_ns': u'units_erratum', u'rights': u'Copyright 2012 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 5', u'reboot_suggested': False, u'type': u'security', u'pkglist': [{u'packages': [{u'src': None, u'name': u'php53', u'sum': [u'md5', u'86c4050e07b38411aecb098d3eccc7c6'], u'filename': u'php53-5.3.3-1.el5_7.6.src.rpm', u'epoch': u'0', u'version': u'5.3.3', u'release': u'1.el5_7.6', u'arch': u'src'}, {u'src': None, u'name': u'php53', u'sum': [u'md5', u'e11ce0edbbbde2ba95b5a1daab61df2b'], u'filename': u'php53-5.3.3-1.el5_7.6.x86_64.rpm', u'epoch': u'0', u'version': u'5.3.3', u'release': u'1.el5_7.6', u'arch': u'x86_64'}, {u'src': None, u'name': u'php53-bcmath', u'sum': [u'md5', u'b4f49f3d64f1abf47a0b1af974ff0b45'], u'filename': u'php53-bcmath-5.3.3-1.el5_7.6.x86_64.rpm', u'epoch': u'0', u'version': u'5.3.3', u'release': u'1.el5_7.6', u'arch': u'x86_64'}, {u'src': None, u'name': u'php53-cli', u'sum': [u'md5', u'cf86ba71cce94d9fd6b50369c8f85252'], u'filename': u'php53-cli-5.3.3-1.el5_7.6.x86_64.rpm', u'epoch': u'0', u'version': u'5.3.3', u'release': u'1.el5_7.6', u'arch': u'x86_64'}, {u'src': None, u'name': u'php53-common', u'sum': [u'md5', u'53f56ee40149875f41f9d3ca5ac22ce3'], u'filename': u'php53-common-5.3.3-1.el5_7.6.x86_64.rpm', u'epoch': u'0', u'version': u'5.3.3', u'release': u'1.el5_7.6', u'arch': u'x86_64'}, {u'src': None, u'name': u'php53-dba', u'sum': [u'md5', u'fb1d40139905a8e8390b95c773080923'], u'filename': u'php53-dba-5.3.3-1.el5_7.6.x86_64.rpm', u'epoch': u'0', u'version': u'5.3.3', u'release': u'1.el5_7.6', u'arch': u'x86_64'}, {u'src': None, u'name': u'php53-devel', u'sum': [u'md5', u'39ef08db1045b3c0db3147264d5b729f'], u'filename': u'php53-devel-5.3.3-1.el5_7.6.x86_64.rpm', u'epoch': u'0', u'version': u'5.3.3', u'release': u'1.el5_7.6', u'arch': u'x86_64'}, {u'src': None, u'name': u'php53-gd', u'sum': [u'md5', u'45c9d26916f73b88d847e9f13b2dd37d'], u'filename': u'php53-gd-5.3.3-1.el5_7.6.x86_64.rpm', u'epoch': u'0', u'version': u'5.3.3', u'release': u'1.el5_7.6', u'arch': u'x86_64'}, {u'src': None, u'name': u'php53-imap', u'sum': [u'md5', u'894a5b47d6f4fd27e089bde2c3e89be3'], u'filename': u'php53-imap-5.3.3-1.el5_7.6.x86_64.rpm', u'epoch': u'0', u'version': u'5.3.3', u'release': u'1.el5_7.6', u'arch': u'x86_64'}, {u'src': None, u'name': u'php53-intl', u'sum': [u'md5', u'02567cebdbeb49b784eeca0dab1ceebb'], u'filename': u'php53-intl-5.3.3-1.el5_7.6.x86_64.rpm', u'epoch': u'0', u'version': u'5.3.3', u'release': u'1.el5_7.6', u'arch': u'x86_64'}, {u'src': None, u'name': u'php53-ldap', u'sum': [u'md5', u'68d1d0db47ac9ba1589ccec11bcc4937'], u'filename': u'php53-ldap-5.3.3-1.el5_7.6.x86_64.rpm', u'epoch': u'0', u'version': u'5.3.3', u'release': u'1.el5_7.6', u'arch': u'x86_64'}, {u'src': None, u'name': u'php53-mbstring', u'sum': [u'md5', u'595166f93d821ebc874ead7aa451c8c8'], u'filename': u'php53-mbstring-5.3.3-1.el5_7.6.x86_64.rpm', u'epoch': u'0', u'version': u'5.3.3', u'release': u'1.el5_7.6', u'arch': u'x86_64'}, {u'src': None, u'name': u'php53-mysql', u'sum': [u'md5', u'253734ea95f7043f5b9aa7c11cfbe2bb'], u'filename': u'php53-mysql-5.3.3-1.el5_7.6.x86_64.rpm', u'epoch': u'0', u'version': u'5.3.3', u'release': u'1.el5_7.6', u'arch': u'x86_64'}, {u'src': None, u'name': u'php53-odbc', u'sum': [u'md5', u'21c556793e4c9963d5cefbb85c179819'], u'filename': u'php53-odbc-5.3.3-1.el5_7.6.x86_64.rpm', u'epoch': u'0', u'version': u'5.3.3', u'release': u'1.el5_7.6', u'arch': u'x86_64'}, {u'src': None, u'name': u'php53-pdo', u'sum': [u'md5', u'54ca8b401b455c4aaf797a50470ff375'], u'filename': u'php53-pdo-5.3.3-1.el5_7.6.x86_64.rpm', u'epoch': u'0', u'version': u'5.3.3', u'release': u'1.el5_7.6', u'arch': u'x86_64'}, {u'src': None, u'name': u'php53-pgsql', u'sum': [u'md5', u'e1c55c1f88c91c21d201dc0699d8710b'], u'filename': u'php53-pgsql-5.3.3-1.el5_7.6.x86_64.rpm', u'epoch': u'0', u'version': u'5.3.3', u'release': u'1.el5_7.6', u'arch': u'x86_64'}, {u'src': None, u'name': u'php53-process', u'sum': [u'md5', u'bf6419cff4f5b6b6c0caf896d2e417e2'], u'filename': u'php53-process-5.3.3-1.el5_7.6.x86_64.rpm', u'epoch': u'0', u'version': u'5.3.3', u'release': u'1.el5_7.6', u'arch': u'x86_64'}, {u'src': None, u'name': u'php53-pspell', u'sum': [u'md5', u'a1752e99a269ee15874c8125de3c7279'], u'filename': u'php53-pspell-5.3.3-1.el5_7.6.x86_64.rpm', u'epoch': u'0', u'version': u'5.3.3', u'release': u'1.el5_7.6', u'arch': u'x86_64'}, {u'src': None, u'name': u'php53-snmp', u'sum': [u'md5', u'f0857b7390daeebee7f7862249c32dd1'], u'filename': u'php53-snmp-5.3.3-1.el5_7.6.x86_64.rpm', u'epoch': u'0', u'version': u'5.3.3', u'release': u'1.el5_7.6', u'arch': u'x86_64'}, {u'src': None, u'name': u'php53-soap', u'sum': [u'md5', u'5c529b055eafde5c3d0132225f8e768d'], u'filename': u'php53-soap-5.3.3-1.el5_7.6.x86_64.rpm', u'epoch': u'0', u'version': u'5.3.3', u'release': u'1.el5_7.6', u'arch': u'x86_64'}, {u'src': None, u'name': u'php53-xml', u'sum': [u'md5', u'33409ce11d19134722c4bf260aeafb09'], u'filename': u'php53-xml-5.3.3-1.el5_7.6.x86_64.rpm', u'epoch': u'0', u'version': u'5.3.3', u'release': u'1.el5_7.6', u'arch': u'x86_64'}, {u'src': None, u'name': u'php53-xmlrpc', u'sum': [u'md5', u'16e4069667c76c9da45a369f172927b9'], u'filename': u'php53-xmlrpc-5.3.3-1.el5_7.6.x86_64.rpm', u'epoch': u'0', u'version': u'5.3.3', u'release': u'1.el5_7.6', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u'[5.3.3-3.6]\n- add security fix for CVE-2012-0830 (#786743)', u'issued': u'2012-02-02', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELSA-2012-0093.html', u'type': u'self', u'id': None, u'title': u'ELSA-2012-0093'}, {u'href': u'http://linux.oracle.com/cve/CVE-2012-0830.html', u'type': u'cve', u'id': u'CVE-2012-0830', u'title': u'CVE-2012-0830'}], u'_content_type_id': u'erratum', u'_id': u'b29c209c-90bc-451a-b8b9-800fed290633', u'from': u'el-errata@oss.oracle.com', u'severity': u'Critical', u'title': u' php security update', u'_ns': u'units_erratum', u'rights': u'Copyright 2012 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 6', u'reboot_suggested': False, u'type': u'security', u'pkglist': [{u'packages': [{u'src': None, u'name': u'php', u'sum': [u'md5', u'a31e2d1a9e7f78d83e60a9353169f4b7'], u'filename': u'php-5.3.3-3.el6_2.6.src.rpm', u'epoch': u'0', u'version': u'5.3.3', u'release': u'3.el6_2.6', u'arch': u'src'}, {u'src': None, u'name': u'php', u'sum': [u'md5', u'5fe6aaae3abf30f95021d3f66f118529'], u'filename': u'php-5.3.3-3.el6_2.6.x86_64.rpm', u'epoch': u'0', u'version': u'5.3.3', u'release': u'3.el6_2.6', u'arch': u'x86_64'}, {u'src': None, u'name': u'php-bcmath', u'sum': [u'md5', u'f218024c8917a89aea9f7e3ff6b6a817'], u'filename': u'php-bcmath-5.3.3-3.el6_2.6.x86_64.rpm', u'epoch': u'0', u'version': u'5.3.3', u'release': u'3.el6_2.6', u'arch': u'x86_64'}, {u'src': None, u'name': u'php-cli', u'sum': [u'md5', u'4c148be0b50c9f3a26802cc723eec48a'], u'filename': u'php-cli-5.3.3-3.el6_2.6.x86_64.rpm', u'epoch': u'0', u'version': u'5.3.3', u'release': u'3.el6_2.6', u'arch': u'x86_64'}, {u'src': None, u'name': u'php-common', u'sum': [u'md5', u'bbf2f9248804a09603547c44eb8aaf17'], u'filename': u'php-common-5.3.3-3.el6_2.6.x86_64.rpm', u'epoch': u'0', u'version': u'5.3.3', u'release': u'3.el6_2.6', u'arch': u'x86_64'}, {u'src': None, u'name': u'php-dba', u'sum': [u'md5', u'd7b6691b83cf173a5c9c92d95244dff8'], u'filename': u'php-dba-5.3.3-3.el6_2.6.x86_64.rpm', u'epoch': u'0', u'version': u'5.3.3', u'release': u'3.el6_2.6', u'arch': u'x86_64'}, {u'src': None, u'name': u'php-devel', u'sum': [u'md5', u'23d03efabebc2565519e8a27a34a535e'], u'filename': u'php-devel-5.3.3-3.el6_2.6.x86_64.rpm', u'epoch': u'0', u'version': u'5.3.3', u'release': u'3.el6_2.6', u'arch': u'x86_64'}, {u'src': None, u'name': u'php-embedded', u'sum': [u'md5', u'ed95af6c5f62a0a55b1d59704459b7da'], u'filename': u'php-embedded-5.3.3-3.el6_2.6.x86_64.rpm', u'epoch': u'0', u'version': u'5.3.3', u'release': u'3.el6_2.6', u'arch': u'x86_64'}, {u'src': None, u'name': u'php-enchant', u'sum': [u'md5', u'd2cd8b1c0625827f04843bb46341aef1'], u'filename': u'php-enchant-5.3.3-3.el6_2.6.x86_64.rpm', u'epoch': u'0', u'version': u'5.3.3', u'release': u'3.el6_2.6', u'arch': u'x86_64'}, {u'src': None, u'name': u'php-gd', u'sum': [u'md5', u'd87795d2c8cd07704bd6f029c5e1fb23'], u'filename': u'php-gd-5.3.3-3.el6_2.6.x86_64.rpm', u'epoch': u'0', u'version': u'5.3.3', u'release': u'3.el6_2.6', u'arch': u'x86_64'}, {u'src': None, u'name': u'php-imap', u'sum': [u'md5', u'52578e413908e289043c2c000e58f5d0'], u'filename': u'php-imap-5.3.3-3.el6_2.6.x86_64.rpm', u'epoch': u'0', u'version': u'5.3.3', u'release': u'3.el6_2.6', u'arch': u'x86_64'}, {u'src': None, u'name': u'php-intl', u'sum': [u'md5', u'1ef64d0207b8ae3e2d5b347a34d43a90'], u'filename': u'php-intl-5.3.3-3.el6_2.6.x86_64.rpm', u'epoch': u'0', u'version': u'5.3.3', u'release': u'3.el6_2.6', u'arch': u'x86_64'}, {u'src': None, u'name': u'php-ldap', u'sum': [u'md5', u'784b7da02b0d81293ee2e6c8fe3c2d69'], u'filename': u'php-ldap-5.3.3-3.el6_2.6.x86_64.rpm', u'epoch': u'0', u'version': u'5.3.3', u'release': u'3.el6_2.6', u'arch': u'x86_64'}, {u'src': None, u'name': u'php-mbstring', u'sum': [u'md5', u'5147423f9ecc1e65c6628134ceecc3c3'], u'filename': u'php-mbstring-5.3.3-3.el6_2.6.x86_64.rpm', u'epoch': u'0', u'version': u'5.3.3', u'release': u'3.el6_2.6', u'arch': u'x86_64'}, {u'src': None, u'name': u'php-mysql', u'sum': [u'md5', u'da89ae9dc786d2d835b8f366becfef04'], u'filename': u'php-mysql-5.3.3-3.el6_2.6.x86_64.rpm', u'epoch': u'0', u'version': u'5.3.3', u'release': u'3.el6_2.6', u'arch': u'x86_64'}, {u'src': None, u'name': u'php-odbc', u'sum': [u'md5', u'aa691f252f28f4628511a57dae382ff7'], u'filename': u'php-odbc-5.3.3-3.el6_2.6.x86_64.rpm', u'epoch': u'0', u'version': u'5.3.3', u'release': u'3.el6_2.6', u'arch': u'x86_64'}, {u'src': None, u'name': u'php-pdo', u'sum': [u'md5', u'6b095647c6f417f815a34273000834d7'], u'filename': u'php-pdo-5.3.3-3.el6_2.6.x86_64.rpm', u'epoch': u'0', u'version': u'5.3.3', u'release': u'3.el6_2.6', u'arch': u'x86_64'}, {u'src': None, u'name': u'php-pgsql', u'sum': [u'md5', u'77754f215f2d68f3434fb83ffa154399'], u'filename': u'php-pgsql-5.3.3-3.el6_2.6.x86_64.rpm', u'epoch': u'0', u'version': u'5.3.3', u'release': u'3.el6_2.6', u'arch': u'x86_64'}, {u'src': None, u'name': u'php-process', u'sum': [u'md5', u'05af0ae85108f9ac1d34bd1dbd4f582b'], u'filename': u'php-process-5.3.3-3.el6_2.6.x86_64.rpm', u'epoch': u'0', u'version': u'5.3.3', u'release': u'3.el6_2.6', u'arch': u'x86_64'}, {u'src': None, u'name': u'php-pspell', u'sum': [u'md5', u'fa4772d01e3c0836cb8610ff70aa02dd'], u'filename': u'php-pspell-5.3.3-3.el6_2.6.x86_64.rpm', u'epoch': u'0', u'version': u'5.3.3', u'release': u'3.el6_2.6', u'arch': u'x86_64'}, {u'src': None, u'name': u'php-recode', u'sum': [u'md5', u'bea2e75d8547cf12ff8e265741d1730e'], u'filename': u'php-recode-5.3.3-3.el6_2.6.x86_64.rpm', u'epoch': u'0', u'version': u'5.3.3', u'release': u'3.el6_2.6', u'arch': u'x86_64'}, {u'src': None, u'name': u'php-snmp', u'sum': [u'md5', u'2748897345841b9aefc8ee991dc3fe66'], u'filename': u'php-snmp-5.3.3-3.el6_2.6.x86_64.rpm', u'epoch': u'0', u'version': u'5.3.3', u'release': u'3.el6_2.6', u'arch': u'x86_64'}, {u'src': None, u'name': u'php-soap', u'sum': [u'md5', u'df6ee3eddf820b5378e37d3727702c47'], u'filename': u'php-soap-5.3.3-3.el6_2.6.x86_64.rpm', u'epoch': u'0', u'version': u'5.3.3', u'release': u'3.el6_2.6', u'arch': u'x86_64'}, {u'src': None, u'name': u'php-tidy', u'sum': [u'md5', u'74896b5eb8f75802ff2fa0e7511c9231'], u'filename': u'php-tidy-5.3.3-3.el6_2.6.x86_64.rpm', u'epoch': u'0', u'version': u'5.3.3', u'release': u'3.el6_2.6', u'arch': u'x86_64'}, {u'src': None, u'name': u'php-xml', u'sum': [u'md5', u'5d19c1d1febfb3f2c9575d0507975a72'], u'filename': u'php-xml-5.3.3-3.el6_2.6.x86_64.rpm', u'epoch': u'0', u'version': u'5.3.3', u'release': u'3.el6_2.6', u'arch': u'x86_64'}, {u'src': None, u'name': u'php-xmlrpc', u'sum': [u'md5', u'4ef7e7fcce062eaffb465cd879effc0c'], u'filename': u'php-xmlrpc-5.3.3-3.el6_2.6.x86_64.rpm', u'epoch': u'0', u'version': u'5.3.3', u'release': u'3.el6_2.6', u'arch': u'x86_64'}, {u'src': None, u'name': u'php-zts', u'sum': [u'md5', u'10bb8ca31978039789de3e2e748c63e6'], u'filename': u'php-zts-5.3.3-3.el6_2.6.x86_64.rpm', u'epoch': u'0', u'version': u'5.3.3', u'release': u'3.el6_2.6', u'arch': u'x86_64'}], u'name': u'ol6_x86_64_latest', u'short': u'ol6_x86_64_latest'}, {u'packages': [{u'src': None, u'name': u'php', u'sum': [u'md5', u'9e3e7bbda3b625fe0c7f53c962354aa1'], u'filename': u'php-5.1.6-27.el5_7.5.src.rpm', u'epoch': u'0', u'version': u'5.1.6', u'release': u'27.el5_7.5', u'arch': u'src'}, {u'src': None, u'name': u'php', u'sum': [u'md5', u'46ed5a066f7ac7d1e95522d89708131b'], u'filename': u'php-5.1.6-27.el5_7.5.x86_64.rpm', u'epoch': u'0', u'version': u'5.1.6', u'release': u'27.el5_7.5', u'arch': u'x86_64'}, {u'src': None, u'name': u'php-bcmath', u'sum': [u'md5', u'b836628f334470313e40ef3478e6be9e'], u'filename': u'php-bcmath-5.1.6-27.el5_7.5.x86_64.rpm', u'epoch': u'0', u'version': u'5.1.6', u'release': u'27.el5_7.5', u'arch': u'x86_64'}, {u'src': None, u'name': u'php-cli', u'sum': [u'md5', u'a1a1e25e5e96a69693f25dec2b8c7a23'], u'filename': u'php-cli-5.1.6-27.el5_7.5.x86_64.rpm', u'epoch': u'0', u'version': u'5.1.6', u'release': u'27.el5_7.5', u'arch': u'x86_64'}, {u'src': None, u'name': u'php-common', u'sum': [u'md5', u'1989dbd18ad16d73b37800597d855f4b'], u'filename': u'php-common-5.1.6-27.el5_7.5.x86_64.rpm', u'epoch': u'0', u'version': u'5.1.6', u'release': u'27.el5_7.5', u'arch': u'x86_64'}, {u'src': None, u'name': u'php-dba', u'sum': [u'md5', u'dae84f3caf777fb0010c06c19aaed3e9'], u'filename': u'php-dba-5.1.6-27.el5_7.5.x86_64.rpm', u'epoch': u'0', u'version': u'5.1.6', u'release': u'27.el5_7.5', u'arch': u'x86_64'}, {u'src': None, u'name': u'php-devel', u'sum': [u'md5', u'ec0c920beab584ce5f5e0e5a5eb30d5e'], u'filename': u'php-devel-5.1.6-27.el5_7.5.x86_64.rpm', u'epoch': u'0', u'version': u'5.1.6', u'release': u'27.el5_7.5', u'arch': u'x86_64'}, {u'src': None, u'name': u'php-gd', u'sum': [u'md5', u'dbfa7811e44ad200a9ebd9ca55346213'], u'filename': u'php-gd-5.1.6-27.el5_7.5.x86_64.rpm', u'epoch': u'0', u'version': u'5.1.6', u'release': u'27.el5_7.5', u'arch': u'x86_64'}, {u'src': None, u'name': u'php-imap', u'sum': [u'md5', u'ed21a299dbe918af5c1c09dca2cc3f3b'], u'filename': u'php-imap-5.1.6-27.el5_7.5.x86_64.rpm', u'epoch': u'0', u'version': u'5.1.6', u'release': u'27.el5_7.5', u'arch': u'x86_64'}, {u'src': None, u'name': u'php-ldap', u'sum': [u'md5', u'd8beafed2dcd2e4010d93eb959d97054'], u'filename': u'php-ldap-5.1.6-27.el5_7.5.x86_64.rpm', u'epoch': u'0', u'version': u'5.1.6', u'release': u'27.el5_7.5', u'arch': u'x86_64'}, {u'src': None, u'name': u'php-mbstring', u'sum': [u'md5', u'4ef5365c31b0229a212869320e46c2d2'], u'filename': u'php-mbstring-5.1.6-27.el5_7.5.x86_64.rpm', u'epoch': u'0', u'version': u'5.1.6', u'release': u'27.el5_7.5', u'arch': u'x86_64'}, {u'src': None, u'name': u'php-mysql', u'sum': [u'md5', u'7dad0ea2e0c260c16c1969870bcbf080'], u'filename': u'php-mysql-5.1.6-27.el5_7.5.x86_64.rpm', u'epoch': u'0', u'version': u'5.1.6', u'release': u'27.el5_7.5', u'arch': u'x86_64'}, {u'src': None, u'name': u'php-ncurses', u'sum': [u'md5', u'5460577fba42e047f697a793a2c1cc94'], u'filename': u'php-ncurses-5.1.6-27.el5_7.5.x86_64.rpm', u'epoch': u'0', u'version': u'5.1.6', u'release': u'27.el5_7.5', u'arch': u'x86_64'}, {u'src': None, u'name': u'php-odbc', u'sum': [u'md5', u'9fc4a9d6d996a7183fa34ff76f75ab96'], u'filename': u'php-odbc-5.1.6-27.el5_7.5.x86_64.rpm', u'epoch': u'0', u'version': u'5.1.6', u'release': u'27.el5_7.5', u'arch': u'x86_64'}, {u'src': None, u'name': u'php-pdo', u'sum': [u'md5', u'df34c0dd13d248c9c6d6e7c9018ef86e'], u'filename': u'php-pdo-5.1.6-27.el5_7.5.x86_64.rpm', u'epoch': u'0', u'version': u'5.1.6', u'release': u'27.el5_7.5', u'arch': u'x86_64'}, {u'src': None, u'name': u'php-pgsql', u'sum': [u'md5', u'25dbd66de409f44b064dd4816cefa2b2'], u'filename': u'php-pgsql-5.1.6-27.el5_7.5.x86_64.rpm', u'epoch': u'0', u'version': u'5.1.6', u'release': u'27.el5_7.5', u'arch': u'x86_64'}, {u'src': None, u'name': u'php-snmp', u'sum': [u'md5', u'a839250bb2afbd519a2e9872f7178417'], u'filename': u'php-snmp-5.1.6-27.el5_7.5.x86_64.rpm', u'epoch': u'0', u'version': u'5.1.6', u'release': u'27.el5_7.5', u'arch': u'x86_64'}, {u'src': None, u'name': u'php-soap', u'sum': [u'md5', u'6f5789088805b70e8b08a592e38464a7'], u'filename': u'php-soap-5.1.6-27.el5_7.5.x86_64.rpm', u'epoch': u'0', u'version': u'5.1.6', u'release': u'27.el5_7.5', u'arch': u'x86_64'}, {u'src': None, u'name': u'php-xml', u'sum': [u'md5', u'6f676097d87af4a5f18da30f077611a5'], u'filename': u'php-xml-5.1.6-27.el5_7.5.x86_64.rpm', u'epoch': u'0', u'version': u'5.1.6', u'release': u'27.el5_7.5', u'arch': u'x86_64'}, {u'src': None, u'name': u'php-xmlrpc', u'sum': [u'md5', u'986b2ae9fdad7cda5b8bc4d35825d9fd'], u'filename': u'php-xmlrpc-5.1.6-27.el5_7.5.x86_64.rpm', u'epoch': u'0', u'version': u'5.1.6', u'release': u'27.el5_7.5', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u"[8.70-11:.6]\n- Applied upstream fix to last patch (CVE-2010-4054, bug #646086).\n\n[8.70-11:.5]\n- Applied patch to prevent null pointer dereference (CVE-2010-4054,\n bug #646086).\n\n[8.70-11:.4]\n- Don't ship patch backup files for CVE-2010-2055.\n\n[8.70-11:.3]\n- Applied patch to prevent integer underflow in TrueType bytecode\n interpreter (CVE-2009-3743, bug #627902).\n- Applied patch to avoid reading initialization files from CWD\n (CVE-2010-2055, bug #599564).", u'issued': u'2012-02-02', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELSA-2012-0095.html', u'type': u'self', u'id': None, u'title': u'ELSA-2012-0095'}, {u'href': u'http://linux.oracle.com/cve/CVE-2009-3743.html', u'type': u'cve', u'id': u'CVE-2009-3743', u'title': u'CVE-2009-3743'}, {u'href': u'http://linux.oracle.com/cve/CVE-2010-2055.html', u'type': u'cve', u'id': u'CVE-2010-2055', u'title': u'CVE-2010-2055'}, {u'href': u'http://linux.oracle.com/cve/CVE-2010-4054.html', u'type': u'cve', u'id': u'CVE-2010-4054', u'title': u'CVE-2010-4054'}, {u'href': u'http://linux.oracle.com/cve/CVE-2010-4820.html', u'type': u'cve', u'id': u'CVE-2010-4820', u'title': u'CVE-2010-4820'}], u'_content_type_id': u'erratum', u'_id': u'6a7ff7dc-a122-4658-acd5-fb6d7612d1bc', u'from': u'el-errata@oss.oracle.com', u'severity': u'Moderate', u'title': u' ghostscript security update', u'_ns': u'units_erratum', u'rights': u'Copyright 2012 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 6', u'reboot_suggested': False, u'type': u'security', u'pkglist': [{u'packages': [{u'src': None, u'name': u'ghostscript', u'sum': [u'md5', u'44986931f257c4ec9acbc9231488427e'], u'filename': u'ghostscript-8.70-11.el6_2.6.i686.rpm', u'epoch': u'0', u'version': u'8.70', u'release': u'11.el6_2.6', u'arch': u'i686'}, {u'src': None, u'name': u'ghostscript', u'sum': [u'md5', u'fa6c54cacabd04581a9266f5d270e67a'], u'filename': u'ghostscript-8.70-11.el6_2.6.src.rpm', u'epoch': u'0', u'version': u'8.70', u'release': u'11.el6_2.6', u'arch': u'src'}, {u'src': None, u'name': u'ghostscript', u'sum': [u'md5', u'af1b620d02e1bd078c5391b8f14fa5c0'], u'filename': u'ghostscript-8.70-11.el6_2.6.x86_64.rpm', u'epoch': u'0', u'version': u'8.70', u'release': u'11.el6_2.6', u'arch': u'x86_64'}, {u'src': None, u'name': u'ghostscript-devel', u'sum': [u'md5', u'3d4c4a2a7b94f4856f75e1ea1e6c7c93'], u'filename': u'ghostscript-devel-8.70-11.el6_2.6.i686.rpm', u'epoch': u'0', u'version': u'8.70', u'release': u'11.el6_2.6', u'arch': u'i686'}, {u'src': None, u'name': u'ghostscript-devel', u'sum': [u'md5', u'9484a75833650bea6e880f76c23af783'], u'filename': u'ghostscript-devel-8.70-11.el6_2.6.x86_64.rpm', u'epoch': u'0', u'version': u'8.70', u'release': u'11.el6_2.6', u'arch': u'x86_64'}, {u'src': None, u'name': u'ghostscript-doc', u'sum': [u'md5', u'701d142dc33bc4ad0c1df0987c38dc21'], u'filename': u'ghostscript-doc-8.70-11.el6_2.6.x86_64.rpm', u'epoch': u'0', u'version': u'8.70', u'release': u'11.el6_2.6', u'arch': u'x86_64'}, {u'src': None, u'name': u'ghostscript-gtk', u'sum': [u'md5', u'2fc204cdf7b770c1073597530fb5eabd'], u'filename': u'ghostscript-gtk-8.70-11.el6_2.6.x86_64.rpm', u'epoch': u'0', u'version': u'8.70', u'release': u'11.el6_2.6', u'arch': u'x86_64'}], u'name': u'ol6_x86_64_latest', u'short': u'ol6_x86_64_latest'}, {u'packages': [{u'src': None, u'name': u'ghostscript', u'sum': [u'md5', u'e2e915acd29709d09271529d1a23cbd1'], u'filename': u'ghostscript-8.70-6.el5_7.6.i386.rpm', u'epoch': u'0', u'version': u'8.70', u'release': u'6.el5_7.6', u'arch': u'i386'}, {u'src': None, u'name': u'ghostscript', u'sum': [u'md5', u'b50538e75cb796e8093b9973397c1b95'], u'filename': u'ghostscript-8.70-6.el5_7.6.src.rpm', u'epoch': u'0', u'version': u'8.70', u'release': u'6.el5_7.6', u'arch': u'src'}, {u'src': None, u'name': u'ghostscript', u'sum': [u'md5', u'5d78d45b1005d31d0ccd1a45ca105488'], u'filename': u'ghostscript-8.70-6.el5_7.6.x86_64.rpm', u'epoch': u'0', u'version': u'8.70', u'release': u'6.el5_7.6', u'arch': u'x86_64'}, {u'src': None, u'name': u'ghostscript-devel', u'sum': [u'md5', u'b58e79767902f4db1782c7a6f0839065'], u'filename': u'ghostscript-devel-8.70-6.el5_7.6.i386.rpm', u'epoch': u'0', u'version': u'8.70', u'release': u'6.el5_7.6', u'arch': u'i386'}, {u'src': None, u'name': u'ghostscript-devel', u'sum': [u'md5', u'737cd076fe39cbadfb4d3de6c856742a'], u'filename': u'ghostscript-devel-8.70-6.el5_7.6.x86_64.rpm', u'epoch': u'0', u'version': u'8.70', u'release': u'6.el5_7.6', u'arch': u'x86_64'}, {u'src': None, u'name': u'ghostscript-gtk', u'sum': [u'md5', u'9c3d1a12ee5b170431d88a9a65a1e655'], u'filename': u'ghostscript-gtk-8.70-6.el5_7.6.x86_64.rpm', u'epoch': u'0', u'version': u'8.70', u'release': u'6.el5_7.6', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u'[1.4.8-5.0.1.el5_7.13]\n- Remove Redhat splash screen images\n\n[1.4.8-5.13]\n- fix typo in CVE-20210-4555 patch\n\n[1.4.8-5.12]\n- patch for CVE-2010-2813 was not complete\n\n[1.4.8-5.11]\n- fix: CVE-2010-1637 : Port-scans via non-standard POP3 server ports in \n Mail Fetch plugin\n- fix: CVE-2010-2813 : DoS (disk space consumption) by random IMAP login \n attempts with 8-bit characters in the password\n- fix: CVE-2010-4554 : Prone to clickjacking attacks\n- fix: CVE-2010-4555 : Multiple XSS flaws\n[tag handling]\n- fix: CVE-2011-2752 : CRLF injection vulnerability\n- fix: CVE-2011-2753 : CSRF in the empty trash feature and in Index Order page', u'issued': u'2012-02-08', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELSA-2012-0103.html', u'type': u'self', u'id': None, u'title': u'ELSA-2012-0103'}, {u'href': u'http://linux.oracle.com/cve/CVE-2010-1637.html', u'type': u'cve', u'id': u'CVE-2010-1637', u'title': u'CVE-2010-1637'}, {u'href': u'http://linux.oracle.com/cve/CVE-2010-2813.html', u'type': u'cve', u'id': u'CVE-2010-2813', u'title': u'CVE-2010-2813'}, {u'href': u'http://linux.oracle.com/cve/CVE-2010-4554.html', u'type': u'cve', u'id': u'CVE-2010-4554', u'title': u'CVE-2010-4554'}, {u'href': u'http://linux.oracle.com/cve/CVE-2010-4555.html', u'type': u'cve', u'id': u'CVE-2010-4555', u'title': u'CVE-2010-4555'}, {u'href': u'http://linux.oracle.com/cve/CVE-2011-2023.html', u'type': u'cve', u'id': u'CVE-2011-2023', u'title': u'CVE-2011-2023'}, {u'href': u'http://linux.oracle.com/cve/CVE-2011-2752.html', u'type': u'cve', u'id': u'CVE-2011-2752', u'title': u'CVE-2011-2752'}, {u'href': u'http://linux.oracle.com/cve/CVE-2011-2753.html', u'type': u'cve', u'id': u'CVE-2011-2753', u'title': u'CVE-2011-2753'}], u'_content_type_id': u'erratum', u'_id': u'18effda2-0951-4da3-9b26-25319bfa8c0a', u'from': u'el-errata@oss.oracle.com', u'severity': u'Moderate', u'title': u' squirrelmail security update', u'_ns': u'units_erratum', u'rights': u'Copyright 2012 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 5', u'reboot_suggested': False, u'type': u'security', u'pkglist': [{u'packages': [{u'src': None, u'name': u'squirrelmail', u'sum': [u'md5', u'60713f164f468d17bb009a65835f6ca2'], u'filename': u'squirrelmail-1.4.8-5.0.1.el5_7.13.noarch.rpm', u'epoch': u'0', u'version': u'1.4.8', u'release': u'5.0.1.el5_7.13', u'arch': u'noarch'}, {u'src': None, u'name': u'squirrelmail', u'sum': [u'md5', u'533e3e864cd549c6b3dd7a715358def9'], u'filename': u'squirrelmail-1.4.8-5.0.1.el5_7.13.src.rpm', u'epoch': u'0', u'version': u'1.4.8', u'release': u'5.0.1.el5_7.13', u'arch': u'src'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u"[2.6.18-274.18.1.0.1.el5] \n- [net] bonding: fix carrier detect when bond is down (John Haxby) [orabug 13652598]\n- fix ia64 build error due to add-support-above-32-vcpus.patch(Zhenzhong Duan)\n- [x86] use dynamic vcpu_info remap to support more than 32 vcpus (Zhenzhong Duan)\n- [scsi] add additional scsi medium error handling (John Sobecki) [orabug 12904887]\n- [x86] Fix lvt0 reset when hvm boot up with noapic param\n- [scsi] remove printk's when doing I/O to a dead device (John Sobecki, Chris Mason)\n [orabug 12342275]\n- [char] ipmi: Fix IPMI errors due to timing problems (Joe Jin) [orabug 12561346]\n- [scsi] Fix race when removing SCSI devices (Joe Jin) [orabug 12404566]\n- [fs] nfs: Fix __put_nfs_open_context() NULL pointer panic (Joe Jin) [orabug 12687646]\n- [scsi] fix scsi hotplug and rescan race [orabug 10260172]\n- fix filp_close() race (Joe Jin) [orabug 10335998]\n- make xenkbd.abs_pointer=1 by default [orabug 67188919]\n- [xen] check to see if hypervisor supports memory reservation change\n (Chuck Anderson) [orabug 7556514]\n- [net] Enable entropy for bnx2,bnx2x,e1000e,igb,ixgb,ixgbe,ixgbevf (John Sobecki)\n [orabug 10315433]\n- [NET] Add xen pv netconsole support (Tina Yang) [orabug 6993043] [bz 7258]\n- [mm] shrink_zone patch (John Sobecki,Chris Mason) [orabug 6086839]\n- fix aacraid not to reset during kexec (Joe Jin) [orabug 8516042]\n- [rds] Patch rds to 1.4.2-20 (Andy Grover) [orabug 9471572, 9344105]\n RDS: Fix BUG_ONs to not fire when in a tasklet\n ipoib: Fix lockup of the tx queue\n RDS: Do not call set_page_dirty() with irqs off (Sherman Pun)\n RDS: Properly unmap when getting a remote access error (Tina Yang)\n RDS: Fix locking in rds_send_drop_to()\n- [xen] PVHVM guest with PoD crashes under memory pressure (Chuck Anderson)\n [orabug 9107465]\n- [xen] PV guest with FC HBA hangs during shutdown (Chuck Anderson)\n [orabug 9764220]\n- Support 256GB+ memory for pv guest (Mukesh Rathor) [orabug 9450615]\n- fix overcommit memory to use percpu_counter for el5 (KOSAKI Motohiro,\n Guru Anbalagane) [orabug 6124033]\n- [ipmi] make configurable timeouts for kcs of ipmi [orabug 9752208]\n- [ib] fix memory corruption (Andy Grover) [orabug 9972346]\n- [aio] patch removes limit on number of retries (Srinivas Eeda) [orabug 10044782]\n- [loop] Do not call loop_unplug for not configured loop device (orabug 10314497)\n\n[2.6.18-274.18.1.el5]\n- [misc] Move exit_robust_list to mm_release, null lists on cleanup (Laszlo Ersek) [771774 750283] {CVE-2012-0028}\n- [block] disable SG_IO ioctls on virtio-blk devices (Paolo Bonzini) [773322 771592]\n- [scsi] fix 32-on-64 block device ioctls (Paolo Bonzini) [752385 752386] {CVE-2011-4127}\n- [dm] do not forward ioctls from logical volumes to the underlying device (Paolo Bonzini) [752385 752386] {CVE-2011-4127}\n- [block] fail SCSI passthrough ioctls on partition devices (Paolo Bonzini) [752385 752386] {CVE-2011-4127}\n- [block] add and use scsi_blk_cmd_ioctl (Paolo Bonzini) [752385 752386] {CVE-2011-4127}\n- [fs] ext4: fix BUG_ON() in ext4_ext_insert_extent() (Lukas Czerner) [747943 747946] {CVE-2011-3638}\n- [scsi] don't fail scans when host is in recovery (Rob Evers) [772162 657345]\n- [fs] jbd2: clear BH_Delay & BH_Unwritten in journal_unmap_buffer (Eric Sandeen) [783477 783284] {CVE-2011-4086}\n- [net] igmp: Avoid zero delay when receiving odd mixture of IGMP queries (Jiri Pirko) [772868 772869] {CVE-2012-0207}", u'issued': u'2012-02-09', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELSA-2012-0107.html', u'type': u'self', u'id': None, u'title': u'ELSA-2012-0107'}, {u'href': u'http://linux.oracle.com/cve/CVE-2011-3638.html', u'type': u'cve', u'id': u'CVE-2011-3638', u'title': u'CVE-2011-3638'}, {u'href': u'http://linux.oracle.com/cve/CVE-2011-4127.html', u'type': u'cve', u'id': u'CVE-2011-4127', u'title': u'CVE-2011-4127'}, {u'href': u'http://linux.oracle.com/cve/CVE-2012-0207.html', u'type': u'cve', u'id': u'CVE-2012-0207', u'title': u'CVE-2012-0207'}, {u'href': u'http://linux.oracle.com/cve/CVE-2011-4086.html', u'type': u'cve', u'id': u'CVE-2011-4086', u'title': u'CVE-2011-4086'}, {u'href': u'http://linux.oracle.com/cve/CVE-2012-0028.html', u'type': u'cve', u'id': u'CVE-2012-0028', u'title': u'CVE-2012-0028'}], u'_content_type_id': u'erratum', u'_id': u'c96566d0-7659-4107-9968-fdaa7aa127e6', u'from': u'el-errata@oss.oracle.com', u'severity': u'Important', u'title': u' kernel security and bug fix update', u'_ns': u'units_erratum', u'rights': u'Copyright 2012 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 5', u'reboot_suggested': False, u'type': u'security', u'pkglist': [{u'packages': [{u'src': None, u'name': u'kernel', u'sum': [u'md5', u'96c65ad23684bd511c3a793d4f438dab'], u'filename': u'kernel-2.6.18-274.18.1.0.1.el5.src.rpm', u'epoch': u'0', u'version': u'2.6.18', u'release': u'274.18.1.0.1.el5', u'arch': u'src'}, {u'src': None, u'name': u'kernel', u'sum': [u'md5', u'fa2ee2ff818e0130aea31599bb354f99'], u'filename': u'kernel-2.6.18-274.18.1.0.1.el5.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.18', u'release': u'274.18.1.0.1.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'kernel-debug', u'sum': [u'md5', u'4fe3b7957836e4047826db22b74e265b'], u'filename': u'kernel-debug-2.6.18-274.18.1.0.1.el5.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.18', u'release': u'274.18.1.0.1.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'kernel-debug-devel', u'sum': [u'md5', u'6007057e2761cd8780a6d306cd9f9513'], u'filename': u'kernel-debug-devel-2.6.18-274.18.1.0.1.el5.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.18', u'release': u'274.18.1.0.1.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'kernel-devel', u'sum': [u'md5', u'3b9fff41f0c036f4598254a9dad59e03'], u'filename': u'kernel-devel-2.6.18-274.18.1.0.1.el5.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.18', u'release': u'274.18.1.0.1.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'kernel-doc', u'sum': [u'md5', u'62571043411355e7d857bbb09e2254d1'], u'filename': u'kernel-doc-2.6.18-274.18.1.0.1.el5.noarch.rpm', u'epoch': u'0', u'version': u'2.6.18', u'release': u'274.18.1.0.1.el5', u'arch': u'noarch'}, {u'src': None, u'name': u'kernel-headers', u'sum': [u'md5', u'f8270fedcfd8ad19891bab979a420414'], u'filename': u'kernel-headers-2.6.18-274.18.1.0.1.el5.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.18', u'release': u'274.18.1.0.1.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'kernel-xen', u'sum': [u'md5', u'c87180c6821b2f1c6e7e066b7efc3ca9'], u'filename': u'kernel-xen-2.6.18-274.18.1.0.1.el5.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.18', u'release': u'274.18.1.0.1.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'kernel-xen-devel', u'sum': [u'md5', u'4d6d0dc9a99a9e03cf6325c7d3f958c6'], u'filename': u'kernel-xen-devel-2.6.18-274.18.1.0.1.el5.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.18', u'release': u'274.18.1.0.1.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'ocfs2-2.6.18-274.18.1.0.1.el5', u'sum': [u'md5', u'c595875d9475454d73e62eb9b544b3e5'], u'filename': u'ocfs2-2.6.18-274.18.1.0.1.el5-1.4.9-1.el5.src.rpm', u'epoch': u'0', u'version': u'1.4.9', u'release': u'1.el5', u'arch': u'src'}, {u'src': None, u'name': u'ocfs2-2.6.18-274.18.1.0.1.el5', u'sum': [u'md5', u'6ec066a61c250c6390996467f0bd4986'], u'filename': u'ocfs2-2.6.18-274.18.1.0.1.el5-1.4.9-1.el5.x86_64.rpm', u'epoch': u'0', u'version': u'1.4.9', u'release': u'1.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'ocfs2-2.6.18-274.18.1.0.1.el5debug', u'sum': [u'md5', u'b665b16f44c8170bb311beaa51e81d85'], u'filename': u'ocfs2-2.6.18-274.18.1.0.1.el5debug-1.4.9-1.el5.x86_64.rpm', u'epoch': u'0', u'version': u'1.4.9', u'release': u'1.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'ocfs2-2.6.18-274.18.1.0.1.el5xen', u'sum': [u'md5', u'0c62b4f3f503cc45fa9269f4b5cf9167'], u'filename': u'ocfs2-2.6.18-274.18.1.0.1.el5xen-1.4.9-1.el5.x86_64.rpm', u'epoch': u'0', u'version': u'1.4.9', u'release': u'1.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'oracleasm-2.6.18-274.18.1.0.1.el5', u'sum': [u'md5', u'bc6747a9e68ffca5569e36bf9ef60d07'], u'filename': u'oracleasm-2.6.18-274.18.1.0.1.el5-2.0.5-1.el5.src.rpm', u'epoch': u'0', u'version': u'2.0.5', u'release': u'1.el5', u'arch': u'src'}, {u'src': None, u'name': u'oracleasm-2.6.18-274.18.1.0.1.el5', u'sum': [u'md5', u'578f8e45ce0b77667d37823ec341417c'], u'filename': u'oracleasm-2.6.18-274.18.1.0.1.el5-2.0.5-1.el5.x86_64.rpm', u'epoch': u'0', u'version': u'2.0.5', u'release': u'1.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'oracleasm-2.6.18-274.18.1.0.1.el5debug', u'sum': [u'md5', u'd85563ef645a36f3db5d5a062c5fafd1'], u'filename': u'oracleasm-2.6.18-274.18.1.0.1.el5debug-2.0.5-1.el5.x86_64.rpm', u'epoch': u'0', u'version': u'2.0.5', u'release': u'1.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'oracleasm-2.6.18-274.18.1.0.1.el5xen', u'sum': [u'md5', u'11734e6fa15cb3b4b2896ea7d86cf175'], u'filename': u'oracleasm-2.6.18-274.18.1.0.1.el5xen-2.0.5-1.el5.x86_64.rpm', u'epoch': u'0', u'version': u'2.0.5', u'release': u'1.el5', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u'[2.5-65.el5_7.3]\n- Use correct type when casting d_tag (#767687)\n- Report write error in addmnt even for cached streams (#767687)\n- ldd: Never run file directly (#767687).\n- Workaround misconfigured system (#767687)\n\n[2.5-65.el5_7.2]\n- Check values from TZ file header (#767687)', u'issued': u'2012-02-13', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELSA-2012-0126.html', u'type': u'self', u'id': None, u'title': u'ELSA-2012-0126'}, {u'href': u'http://linux.oracle.com/cve/CVE-2009-5064.html', u'type': u'cve', u'id': u'CVE-2009-5064', u'title': u'CVE-2009-5064'}, {u'href': u'http://linux.oracle.com/cve/CVE-2011-1089.html', u'type': u'cve', u'id': u'CVE-2011-1089', u'title': u'CVE-2011-1089'}, {u'href': u'http://linux.oracle.com/cve/CVE-2010-0830.html', u'type': u'cve', u'id': u'CVE-2010-0830', u'title': u'CVE-2010-0830'}, {u'href': u'http://linux.oracle.com/cve/CVE-2009-5029.html', u'type': u'cve', u'id': u'CVE-2009-5029', u'title': u'CVE-2009-5029'}, {u'href': u'http://linux.oracle.com/cve/CVE-2011-4609.html', u'type': u'cve', u'id': u'CVE-2011-4609', u'title': u'CVE-2011-4609'}], u'_content_type_id': u'erratum', u'_id': u'649f9334-8cd9-4ae5-a789-1b1a49fdc908', u'from': u'el-errata@oss.oracle.com', u'severity': u'Moderate', u'title': u' glibc security update', u'_ns': u'units_erratum', u'rights': u'Copyright 2012 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 5', u'reboot_suggested': False, u'type': u'security', u'pkglist': [{u'packages': [{u'src': None, u'name': u'glibc', u'sum': [u'md5', u'07dd0f38ee8c8feadbad076fbb62ef97'], u'filename': u'glibc-2.5-65.el5_7.3.i686.rpm', u'epoch': u'0', u'version': u'2.5', u'release': u'65.el5_7.3', u'arch': u'i686'}, {u'src': None, u'name': u'glibc', u'sum': [u'md5', u'6de5a954d70a8ab496f51a315d1c5acc'], u'filename': u'glibc-2.5-65.el5_7.3.src.rpm', u'epoch': u'0', u'version': u'2.5', u'release': u'65.el5_7.3', u'arch': u'src'}, {u'src': None, u'name': u'glibc', u'sum': [u'md5', u'f6fb27cf015dc002408e94f6c2af5b40'], u'filename': u'glibc-2.5-65.el5_7.3.x86_64.rpm', u'epoch': u'0', u'version': u'2.5', u'release': u'65.el5_7.3', u'arch': u'x86_64'}, {u'src': None, u'name': u'glibc-common', u'sum': [u'md5', u'5a70a78ffaa7078ce78445b9b46b6364'], u'filename': u'glibc-common-2.5-65.el5_7.3.x86_64.rpm', u'epoch': u'0', u'version': u'2.5', u'release': u'65.el5_7.3', u'arch': u'x86_64'}, {u'src': None, u'name': u'glibc-devel', u'sum': [u'md5', u'71da93dbd9d61ababbfa13aac3099e15'], u'filename': u'glibc-devel-2.5-65.el5_7.3.i386.rpm', u'epoch': u'0', u'version': u'2.5', u'release': u'65.el5_7.3', u'arch': u'i386'}, {u'src': None, u'name': u'glibc-devel', u'sum': [u'md5', u'5417f037c32249cf5e83c5c8d8c709ea'], u'filename': u'glibc-devel-2.5-65.el5_7.3.x86_64.rpm', u'epoch': u'0', u'version': u'2.5', u'release': u'65.el5_7.3', u'arch': u'x86_64'}, {u'src': None, u'name': u'glibc-headers', u'sum': [u'md5', u'40150fbfe0f8257b50ff164d74e8919e'], u'filename': u'glibc-headers-2.5-65.el5_7.3.x86_64.rpm', u'epoch': u'0', u'version': u'2.5', u'release': u'65.el5_7.3', u'arch': u'x86_64'}, {u'src': None, u'name': u'glibc-utils', u'sum': [u'md5', u'742b8ae745537a4b77862dda93b4d549'], u'filename': u'glibc-utils-2.5-65.el5_7.3.x86_64.rpm', u'epoch': u'0', u'version': u'2.5', u'release': u'65.el5_7.3', u'arch': u'x86_64'}, {u'src': None, u'name': u'nscd', u'sum': [u'md5', u'24d8fab7dee20e8bc43c01597bfc0478'], u'filename': u'nscd-2.5-65.el5_7.3.x86_64.rpm', u'epoch': u'0', u'version': u'2.5', u'release': u'65.el5_7.3', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u'[5.0.95-1.el5_7.1]\n- Update to 5.0.95, to get the last upstream bugfixes in this release series\n including numerous CVEs announced in January 2012\nResolves: #787140', u'issued': u'2012-02-13', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELSA-2012-0127.html', u'type': u'self', u'id': None, u'title': u'ELSA-2012-0127'}, {u'href': u'http://linux.oracle.com/cve/CVE-2012-0075.html', u'type': u'cve', u'id': u'CVE-2012-0075', u'title': u'CVE-2012-0075'}, {u'href': u'http://linux.oracle.com/cve/CVE-2012-0087.html', u'type': u'cve', u'id': u'CVE-2012-0087', u'title': u'CVE-2012-0087'}, {u'href': u'http://linux.oracle.com/cve/CVE-2012-0101.html', u'type': u'cve', u'id': u'CVE-2012-0101', u'title': u'CVE-2012-0101'}, {u'href': u'http://linux.oracle.com/cve/CVE-2012-0102.html', u'type': u'cve', u'id': u'CVE-2012-0102', u'title': u'CVE-2012-0102'}, {u'href': u'http://linux.oracle.com/cve/CVE-2012-0114.html', u'type': u'cve', u'id': u'CVE-2012-0114', u'title': u'CVE-2012-0114'}, {u'href': u'http://linux.oracle.com/cve/CVE-2012-0484.html', u'type': u'cve', u'id': u'CVE-2012-0484', u'title': u'CVE-2012-0484'}, {u'href': u'http://linux.oracle.com/cve/CVE-2012-0490.html', u'type': u'cve', u'id': u'CVE-2012-0490', u'title': u'CVE-2012-0490'}, {u'href': u'http://linux.oracle.com/cve/CVE-2010-1849.html', u'type': u'cve', u'id': u'CVE-2010-1849', u'title': u'CVE-2010-1849'}], u'_content_type_id': u'erratum', u'_id': u'b190c9c5-53f4-4511-8eda-9e0b3f9fddf5', u'from': u'el-errata@oss.oracle.com', u'severity': u'Moderate', u'title': u' mysql security update', u'_ns': u'units_erratum', u'rights': u'Copyright 2012 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 5', u'reboot_suggested': False, u'type': u'security', u'pkglist': [{u'packages': [{u'src': None, u'name': u'mysql', u'sum': [u'md5', u'2234537ddd09b61b70a2ad524d004711'], u'filename': u'mysql-5.0.95-1.el5_7.1.i386.rpm', u'epoch': u'0', u'version': u'5.0.95', u'release': u'1.el5_7.1', u'arch': u'i386'}, {u'src': None, u'name': u'mysql', u'sum': [u'md5', u'e4ae7cf881dc285546564950426efe5f'], u'filename': u'mysql-5.0.95-1.el5_7.1.src.rpm', u'epoch': u'0', u'version': u'5.0.95', u'release': u'1.el5_7.1', u'arch': u'src'}, {u'src': None, u'name': u'mysql', u'sum': [u'md5', u'54e385ed867dec091c9f83bdc82d5eab'], u'filename': u'mysql-5.0.95-1.el5_7.1.x86_64.rpm', u'epoch': u'0', u'version': u'5.0.95', u'release': u'1.el5_7.1', u'arch': u'x86_64'}, {u'src': None, u'name': u'mysql-bench', u'sum': [u'md5', u'9c2509f6d99a50e09db58a8b081954df'], u'filename': u'mysql-bench-5.0.95-1.el5_7.1.x86_64.rpm', u'epoch': u'0', u'version': u'5.0.95', u'release': u'1.el5_7.1', u'arch': u'x86_64'}, {u'src': None, u'name': u'mysql-devel', u'sum': [u'md5', u'b14cace50466f99d92db4f9604bf8887'], u'filename': u'mysql-devel-5.0.95-1.el5_7.1.i386.rpm', u'epoch': u'0', u'version': u'5.0.95', u'release': u'1.el5_7.1', u'arch': u'i386'}, {u'src': None, u'name': u'mysql-devel', u'sum': [u'md5', u'1a01e7225dfd07cdc3b30b028895cc2b'], u'filename': u'mysql-devel-5.0.95-1.el5_7.1.x86_64.rpm', u'epoch': u'0', u'version': u'5.0.95', u'release': u'1.el5_7.1', u'arch': u'x86_64'}, {u'src': None, u'name': u'mysql-server', u'sum': [u'md5', u'aee7e0d49b8af6826b47d303ce832c34'], u'filename': u'mysql-server-5.0.95-1.el5_7.1.x86_64.rpm', u'epoch': u'0', u'version': u'5.0.95', u'release': u'1.el5_7.1', u'arch': u'x86_64'}, {u'src': None, u'name': u'mysql-test', u'sum': [u'md5', u'2c81b31d88724f205d114770ee710a31'], u'filename': u'mysql-test-5.0.95-1.el5_7.1.x86_64.rpm', u'epoch': u'0', u'version': u'5.0.95', u'release': u'1.el5_7.1', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u'[1.2.3-4.1]\n- fix CVE-2012-0444 (#787076)', u'issued': u'2012-02-15', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELSA-2012-0136.html', u'type': u'self', u'id': None, u'title': u'ELSA-2012-0136'}, {u'href': u'http://linux.oracle.com/cve/CVE-2012-0444.html', u'type': u'cve', u'id': u'CVE-2012-0444', u'title': u'CVE-2012-0444'}], u'_content_type_id': u'erratum', u'_id': u'b8850405-3032-4a73-aa87-511d54984be8', u'from': u'el-errata@oss.oracle.com', u'severity': u'Important', u'title': u' libvorbis security update', u'_ns': u'units_erratum', u'rights': u'Copyright 2012 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 6', u'reboot_suggested': False, u'type': u'security', u'pkglist': [{u'packages': [{u'src': None, u'name': u'libvorbis', u'sum': [u'md5', u'21671ecc4e9f278343d454c38c8befb2'], u'filename': u'libvorbis-1.2.3-4.el6_2.1.i686.rpm', u'epoch': u'1', u'version': u'1.2.3', u'release': u'4.el6_2.1', u'arch': u'i686'}, {u'src': None, u'name': u'libvorbis', u'sum': [u'md5', u'ed1ceaaca540415540e69a50d9ed7f23'], u'filename': u'libvorbis-1.2.3-4.el6_2.1.src.rpm', u'epoch': u'1', u'version': u'1.2.3', u'release': u'4.el6_2.1', u'arch': u'src'}, {u'src': None, u'name': u'libvorbis', u'sum': [u'md5', u'c0e3131efecd6ee3790ee9b3d611f69c'], u'filename': u'libvorbis-1.2.3-4.el6_2.1.x86_64.rpm', u'epoch': u'1', u'version': u'1.2.3', u'release': u'4.el6_2.1', u'arch': u'x86_64'}, {u'src': None, u'name': u'libvorbis-devel', u'sum': [u'md5', u'fda95bc5009ca6d7818ecc1126f038f7'], u'filename': u'libvorbis-devel-1.2.3-4.el6_2.1.i686.rpm', u'epoch': u'1', u'version': u'1.2.3', u'release': u'4.el6_2.1', u'arch': u'i686'}, {u'src': None, u'name': u'libvorbis-devel', u'sum': [u'md5', u'ba17f7225bbe8b5ff3306f149ed83f05'], u'filename': u'libvorbis-devel-1.2.3-4.el6_2.1.x86_64.rpm', u'epoch': u'1', u'version': u'1.2.3', u'release': u'4.el6_2.1', u'arch': u'x86_64'}, {u'src': None, u'name': u'libvorbis-devel-docs', u'sum': [u'md5', u'fffa03616862a8b299f581d8e9a16aa9'], u'filename': u'libvorbis-devel-docs-1.2.3-4.el6_2.1.noarch.rpm', u'epoch': u'1', u'version': u'1.2.3', u'release': u'4.el6_2.1', u'arch': u'noarch'}], u'name': u'ol6_x86_64_latest', u'short': u'ol6_x86_64_latest'}, {u'packages': [{u'src': None, u'name': u'libvorbis', u'sum': [u'md5', u'a311d1306cd274bde3bf3dc656d5b37c'], u'filename': u'libvorbis-1.1.2-3.el5_7.6.i386.rpm', u'epoch': u'1', u'version': u'1.1.2', u'release': u'3.el5_7.6', u'arch': u'i386'}, {u'src': None, u'name': u'libvorbis', u'sum': [u'md5', u'8f92616e054df92ad60d2690bbf8caf8'], u'filename': u'libvorbis-1.1.2-3.el5_7.6.src.rpm', u'epoch': u'1', u'version': u'1.1.2', u'release': u'3.el5_7.6', u'arch': u'src'}, {u'src': None, u'name': u'libvorbis', u'sum': [u'md5', u'6938b3e56a816d0f2c797a06da6cf44f'], u'filename': u'libvorbis-1.1.2-3.el5_7.6.x86_64.rpm', u'epoch': u'1', u'version': u'1.1.2', u'release': u'3.el5_7.6', u'arch': u'x86_64'}, {u'src': None, u'name': u'libvorbis-devel', u'sum': [u'md5', u'281f0336a55559d3767e29f1131fd281'], u'filename': u'libvorbis-devel-1.1.2-3.el5_7.6.i386.rpm', u'epoch': u'1', u'version': u'1.1.2', u'release': u'3.el5_7.6', u'arch': u'i386'}, {u'src': None, u'name': u'libvorbis-devel', u'sum': [u'md5', u'bf8e0039f1d5f3c42068cabd31b2c095'], u'filename': u'libvorbis-devel-1.1.2-3.el5_7.6.x86_64.rpm', u'epoch': u'1', u'version': u'1.1.2', u'release': u'3.el5_7.6', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u'[1.9.2.26-2.0.1.el6_2]\n- Replace xulrunner-redhat-default-prefs.js with\n xulrunner-oracle-default-prefs.js\n\n[1.9.2.26-2]\n- added fix for mozbz#727401', u'issued': u'2012-02-16', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELSA-2012-0143.html', u'type': u'self', u'id': None, u'title': u'ELSA-2012-0143'}, {u'href': u'http://linux.oracle.com/cve/CVE-2011-3026.html', u'type': u'cve', u'id': u'CVE-2011-3026', u'title': u'CVE-2011-3026'}], u'_content_type_id': u'erratum', u'_id': u'687f524b-b275-45fe-8ba8-cd21391396a3', u'from': u'el-errata@oss.oracle.com', u'severity': u'Critical', u'title': u' xulrunner security update', u'_ns': u'units_erratum', u'rights': u'Copyright 2012 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 6', u'reboot_suggested': False, u'type': u'security', u'pkglist': [{u'packages': [{u'src': None, u'name': u'xulrunner', u'sum': [u'md5', u'6f66cf66b2c2defbd2e70a433d0edbb3'], u'filename': u'xulrunner-1.9.2.26-2.0.1.el6_2.i686.rpm', u'epoch': u'0', u'version': u'1.9.2.26', u'release': u'2.0.1.el6_2', u'arch': u'i686'}, {u'src': None, u'name': u'xulrunner', u'sum': [u'md5', u'7597c5e6c274d73c3326981232c7757e'], u'filename': u'xulrunner-1.9.2.26-2.0.1.el6_2.src.rpm', u'epoch': u'0', u'version': u'1.9.2.26', u'release': u'2.0.1.el6_2', u'arch': u'src'}, {u'src': None, u'name': u'xulrunner', u'sum': [u'md5', u'87a8d0ab628ccbaaf15bc57a7f2f146c'], u'filename': u'xulrunner-1.9.2.26-2.0.1.el6_2.x86_64.rpm', u'epoch': u'0', u'version': u'1.9.2.26', u'release': u'2.0.1.el6_2', u'arch': u'x86_64'}, {u'src': None, u'name': u'xulrunner-devel', u'sum': [u'md5', u'a50757510e75361c8a1251705659b985'], u'filename': u'xulrunner-devel-1.9.2.26-2.0.1.el6_2.i686.rpm', u'epoch': u'0', u'version': u'1.9.2.26', u'release': u'2.0.1.el6_2', u'arch': u'i686'}, {u'src': None, u'name': u'xulrunner-devel', u'sum': [u'md5', u'02715c984ef428356844caa02af45d28'], u'filename': u'xulrunner-devel-1.9.2.26-2.0.1.el6_2.x86_64.rpm', u'epoch': u'0', u'version': u'1.9.2.26', u'release': u'2.0.1.el6_2', u'arch': u'x86_64'}], u'name': u'ol6_x86_64_latest', u'short': u'ol6_x86_64_latest'}, {u'packages': [{u'src': None, u'name': u'xulrunner', u'sum': [u'md5', u'34be3439bfe95987fde43d2f353ee9e7'], u'filename': u'xulrunner-1.9.2.26-2.0.1.el5_7.i386.rpm', u'epoch': u'0', u'version': u'1.9.2.26', u'release': u'2.0.1.el5_7', u'arch': u'i386'}, {u'src': None, u'name': u'xulrunner', u'sum': [u'md5', u'10a2a40a6394f39039161f4bd4a17dc6'], u'filename': u'xulrunner-1.9.2.26-2.0.1.el5_7.src.rpm', u'epoch': u'0', u'version': u'1.9.2.26', u'release': u'2.0.1.el5_7', u'arch': u'src'}, {u'src': None, u'name': u'xulrunner', u'sum': [u'md5', u'd7d0416793e454393fb378a9f172772f'], u'filename': u'xulrunner-1.9.2.26-2.0.1.el5_7.x86_64.rpm', u'epoch': u'0', u'version': u'1.9.2.26', u'release': u'2.0.1.el5_7', u'arch': u'x86_64'}, {u'src': None, u'name': u'xulrunner-devel', u'sum': [u'md5', u'ae624e204c55ce83b75c5ae8c12217ca'], u'filename': u'xulrunner-devel-1.9.2.26-2.0.1.el5_7.i386.rpm', u'epoch': u'0', u'version': u'1.9.2.26', u'release': u'2.0.1.el5_7', u'arch': u'i386'}, {u'src': None, u'name': u'xulrunner-devel', u'sum': [u'md5', u'a2cbfc07af448b9c6642ce3105c76c49'], u'filename': u'xulrunner-devel-1.9.2.26-2.0.1.el5_7.x86_64.rpm', u'epoch': u'0', u'version': u'1.9.2.26', u'release': u'2.0.1.el5_7', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u'[kvm-83-249.0.1.el5]\n- Added kvm-add-oracle-workaround-for-libvirt-bug.patch\n- Added kvm-Introduce-oel-machine-type.patch\n- modify kversion to fix build failure\n\n[kvm-83-249.el5]\n- kvm-kernel-KVM-x86-Prevent-starting-PIT-timers-in-the-absence-o.patch [bz#770101]\n- CVE: CVE-2011-4622\n- Resolves: bz#770101\n (CVE-2011-4622 kernel: kvm: pit timer with no irqchip crashes the system [rhel-5.8])\n\n[kvm-83-248.el5]\n- kvm-e1000-prevent-buffer-overflow-when-processing-legacy.patch [bz#772080]\n- CVE: CVE-2012-0029\n- Resolves: bz#772080\n (EMBARGOED CVE-2012-0029 qemu-kvm: e1000: process_tx_desc legacy mode packets heap overflow [rhel-5.8])\n\n[kvm-83-247.el5]\n- kvm-kernel-KVM-Remove-ability-to-assign-a-device-without-iommu-.patch [bz#770095]\n- kvm-kernel-KVM-Device-assignment-permission-checks.patch [bz#770095]\n- Resolves: bz#770095\n (CVE-2011-4347 kernel: kvm: device assignment DoS [rhel-5.8])\n\n[kvm-83-246.el5]\n- kvm-Fix-SIGFPE-for-vnc-display-of-width-height-1.patch [bz#751482]\n- Resolves: bz#751482\n (Backport SIGFPE fix in qemu-kvm VNC to RHEL5.x)\n\n[kvm-83-245.el5]\n- kvm-Fix-external-module-compat.c-not-to-use-unsupported-.patch [bz#753860]\n- Resolves: bz#753860\n (Fix kvm userspace compilation on RHEL-5 to match the kernel changes)\n\n[kvm-83-244.el5]\n- kvm-do-not-change-RTC-stored-time-accidentally.patch [bz#703335]\n- Resolves: bz#703335\n (KVM guest clocks jump forward one hour on reboot)\n\n[kvm-83-243.el5]\n- kvm-e1000-multi-buffer-packet-support.patch [bz#703446]\n- kvm-e1000-clear-EOP-for-multi-buffer-descriptors.patch [bz#703446]\n- kvm-e1000-verify-we-have-buffers-upfront.patch [bz#703446]\n- kvm-BZ725876-make-RTC-alarm-work.patch [bz#725876]\n- kvm-BZ725876-fix-RTC-polling-mode.patch [bz#725876]\n- Resolves: bz#703446\n (Failed to ping guest after MTU is changed)\n- Resolves: bz#725876\n (RTC interrupt problems with RHEL5 qemu/kvm (0.10 based) on 2.6.38+ guest kernels.)\n\n[kvm-83-242.el5]\n- kvm-posix-aio-compat-fix-latency-issues.patch [bz#725629]\n- Resolves: bz#725629\n (RHEL5.5 KVM VMs freezing for a few seconds)\n\n[kvm-83-241.el5]\n- kvm-pci-assign-limit-number-of-assigned-devices-via-hotp.patch [bz#701616]\n- kvm-pci-assign-Cleanup-file-descriptors.patch [bz#700281]\n- Resolves: bz#700281\n ([Intel 5.8 Bug] Fail to attach/detach NIC more than 250 times)\n- Resolves: bz#701616\n (limitation on max number of assigned devices does not take effect if hot-plug pci devices)\n\n[kvm-83-240.el5]\n- Updated kversion to 2.6.18-275.el to match build root\n- kvm-Fix-vga-segfaults-or-screen-corruption-with-large-me.patch [bz#704081]\n- Resolves: bz#704081\n (mouse responds very slowly with huge memory)\n', u'issued': u'2012-03-01', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELSA-2012-0149.html', u'type': u'self', u'id': None, u'title': u'ELSA-2012-0149'}, {u'href': u'http://linux.oracle.com/cve/CVE-2011-4347.html', u'type': u'cve', u'id': u'CVE-2011-4347', u'title': u'CVE-2011-4347'}], u'_content_type_id': u'erratum', u'_id': u'00a03434-05d2-4b68-b408-17c00b6dd583', u'from': u'el-errata@oss.oracle.com', u'severity': u'Moderate', u'title': u' kvm security and bug fix update', u'_ns': u'units_erratum', u'rights': u'Copyright 2012 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 5', u'reboot_suggested': False, u'type': u'security', u'pkglist': [{u'packages': [{u'src': None, u'name': u'kmod-kvm', u'sum': [u'md5', u'73b81253d71b6883c659422f2f44f67b'], u'filename': u'kmod-kvm-83-249.0.1.el5.x86_64.rpm', u'epoch': u'0', u'version': u'83', u'release': u'249.0.1.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'kmod-kvm-debug', u'sum': [u'md5', u'21a3ebd219fd9202c72cbaa6989120f8'], u'filename': u'kmod-kvm-debug-83-249.0.1.el5.x86_64.rpm', u'epoch': u'0', u'version': u'83', u'release': u'249.0.1.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'kvm', u'sum': [u'md5', u'1fcb9f7c8a9be108232137757be6e1a6'], u'filename': u'kvm-83-249.0.1.el5.src.rpm', u'epoch': u'0', u'version': u'83', u'release': u'249.0.1.el5', u'arch': u'src'}, {u'src': None, u'name': u'kvm', u'sum': [u'md5', u'8f2216f53bdc3fb9fd937dbd731875fd'], u'filename': u'kvm-83-249.0.1.el5.x86_64.rpm', u'epoch': u'0', u'version': u'83', u'release': u'249.0.1.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'kvm-qemu-img', u'sum': [u'md5', u'dda17d43b9bf7d5804609272012061b1'], u'filename': u'kvm-qemu-img-83-249.0.1.el5.x86_64.rpm', u'epoch': u'0', u'version': u'83', u'release': u'249.0.1.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'kvm-tools', u'sum': [u'md5', u'6d17a06cd2c31216ad70bc19bbdb0aad'], u'filename': u'kvm-tools-83-249.0.1.el5.x86_64.rpm', u'epoch': u'0', u'version': u'83', u'release': u'249.0.1.el5', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u"kernel\n[2.6.18-308.el5]\n- [scsi] lpfc: Update lpfc version for 8.2.0.108.4p driver release (Rob Evers) [784073]\n- [scsi] lpfc: Fix FCP EQ memory check init w/single int vector (Rob Evers) [784073]\n\n[2.6.18-307.el5]\n- [s390] crypto: Reset sha2 index after processing partial block (David Howells) [677860]\n- Revert: [fs] xfs: implement ->dirty_inode to fix timestamp (Eric Sandeen) [653215]\n\n[2.6.18-306.el5]\n- [s390] pfault: ignore leftover completion interrupts (Jarod Wilson) [753194]\n- [cpufreq] powernow-k8: Fix indexing issue (Frank Arnold) [782773]\n- [scsi] device_handler: optimize transition retries (Rob Evers) [733635]\n- [net] qlge: fix size of external list for TX address descriptors (Chad Dupuis) [772696]\n- [net] igmp: Avoid zero delay when rx'ing odd mix of IGMP queries (Jiri Pirko) [772869]\n- [net] be2net: create RSS rings even in multi-channel configs (Ivan Vecera) [773114]\n- [net] ipv6: track device renames in snmp6 (Andy Gospodarek) [758923]\n- [fs] jbd2: clear BH_Delay & BH_Unwritten in journal_unmap_buffer (Eric Sandeen) [783284] {CVE-2011-4086}\n- [fs] epoll: workarounds to preserve kernel ABI (Jason Baron) [681692] {CVE-2011-1083}\n- [fs] epoll: limit paths (Jason Baron) [681692] {CVE-2011-1083}\n- [fs] epoll: prevent creating circular epoll structures (Jason Baron) [681692] {CVE-2011-1083}\n- [fs] epoll: add ep_call_nested() (Jason Baron) [681692] {CVE-2011-1083}\n- [fs] gfs2: additional fix for inode allocation error path (Robert S Peterson) [767377]\n- [fs] gfs2: Revert clean up fsync changes (Robert S Peterson) [767377]\n- [fs] ext4: ignore EXT4_INODE_JOURNAL_DATA flag with delalloc (Lukas Czerner) [769386]\n- [mm] filemap: Make write(2) interruptible by a fatal signal (Lukas Czerner) [740898]\n- [mm] Make task in balance_dirty_pages killable (Lukas Czerner) [740898]\n- [fs] ext4: fix the deadlock in mpage_da_map_and_submit (Lukas Czerner) [740898]\n- [fs] ext4: fix deadlock in ext4_ordered_write_end (Lukas Czerner) [740898]\n- [fs] ext4: mark multi-page IO complete on mapping failure (Lukas Czerner) [740898]\n- [fs] ext4: make invalidate pages handle page range properly (Lukas Czerner) [740898]\n- [fs] ext4: call mpage_da_submit_io from mpage_da_map_blocks (Lukas Czerner) [740898]\n- [fs] nfsd: Avoid excess stack usage in svc_tcp_recvfrom (J. Bruce Fields) [765751]\n- [fs] nfsd: Replace two page lists in struct svc_rqst with one (J. Bruce Fields) [765751]\n\n[2.6.18-305.el5]\n- [edac] i5000: don't crash before showing the edac error (Mauro Carvalho Chehab) [713034]\n- [Documentation] Add pci=noseg to kernel-parameters.txt (Prarit Bhargava) [743168]\n- [net] ipv6: fix tcp_v6_conn_request (Jiri Benc) [714670]\n- [redhat] update RHEL_MINOR to 8 for 5.8 release (Jarod Wilson) [773033]\n- [misc] Move exit_robust_list to mm_release, null lists on cleanup (Laszlo Ersek) [750283] {CVE-2012-0028}\n- [fs] nfs: Fix an O_DIRECT Oops (Jeff Layton) [754620] {CVE-2011-4325}\n- [xen] x86: fix a few 32-on-64 compat mode issues (Igor Mammedov) [700752]\n\n[2.6.18-304.el5]\n- [fs] gfs2: Fix inode allocation error path (Robert S Peterson) [767377]\n- [fs] gfs2: Clean up fsync (Robert S Peterson) [767377]\n- [misc] fix list_head userspace export regression error (Jarod Wilson) [772663]\n- [block] disable SG_IO ioctls on virtio-blk devices (Paolo Bonzini) [771592]\n- [net] cxgb4: fix firmware corruption (Neil Horman) [756661]\n- [net] be2net: remove incorrect calls to netif_carrier_off (Ivan Vecera) [771391]\n- [scsi] lpfc: Update lpfc version for 8.2.0.108.3p driver release (Rob Evers) [769385]\n- [scsi] lpfc: Fix panic during EEH recovery on SLI4 FC port (Rob Evers) [769385]\n- [scsi] lpfc: Fix a crash while deleting 256 vports (Rob Evers) [769385]\n- [scsi] lpfc: Fixed OCM failing *_OBJECT mailbox pass-through (Rob Evers) [769385]\n- [scsi] lpfc: Fixed firmware download regression (Rob Evers) [769385]\n- [scsi] lpfc: Fix system crash when LPe16000 fails to initialize (Rob Evers) [769385]\n\n[2.6.18-303.el5]\n- [scsi] qla2xxx: Update FC-transport port_state translation matrix (Chad Dupuis) [765866]\n- [scsi] qla2xxx: Don't call alloc_fw_dump for ISP82XX (Chad Dupuis) [765866]\n- [scsi] qla2xxx: Remove qla2x00_wait_for_loop_ready function (Chad Dupuis) [765866]\n- [scsi] qla2xxx: Display FCP_CMND priority on update (Chad Dupuis) [765866]\n- [scsi] qla2xxx: Check for SCSI status on underruns (Chad Dupuis) [765866]\n- [scsi] qla4xxx: v5.02.04.02.05.08-d0 (Chad Dupuis) [769019]\n- [scsi] qla4xxx: clear the RISC interrupt bit during firmware init (Chad Dupuis) [769019]\n- [scsi] qla4xxx: v5.02.04.01.05.08-d0 (Chad Dupuis) [758762]\n- [scsi] qla4xxx: Fix panic due to incorrect tag_value_stride (Chad Dupuis) [758762]\n- [fs] xfs: implement ->dirty_inode to fix timestamp handling (Carlos Maiolino) [653215]\n- [net] drop_monitor: return -EAGAIN on duplicate state changes (Neil Horman) [688791]\n- [net] ipv6: make disable_ipv6 work (Weiping Pan) [760199]\n- [net] bnx2x: fix failure to bring link up on BCM57810 (Michal Schmidt) [751025]\n- [scsi] isci: link speeds default to gen2 (David Milburn) [768151]\n- [fs] jbd: fix race in buffer processing in commit code (Josef Bacik) [756643]\n- [s390] kernel: cpu hotplug vs missing pfault completion interrupt (Hendrik Brueckner) [753194]\n- [block] loop: Don't call loop_unplug on non-configured device (Veaceslav Falico) [617668]\n- [virt] xen/netback: Clear IFF_TX_SKB_SHARING flags (Neil Horman) [753173]\n- [scsi] sd: fix 32-on-64 block device ioctls (Paolo Bonzini) [752386] {CVE-2011-4127}\n- [md] dm: do not forward ioctls from LVs to the underlying devices (Paolo Bonzini) [752386] {CVE-2011-4127}\n- [block] fail SCSI passthrough ioctls on partition devices (Paolo Bonzini) [752386] {CVE-2011-4127}\n- [block] add and use scsi_blk_cmd_ioctl (Paolo Bonzini) [752386] {CVE-2011-4127}\n\n[2.6.18-302.el5]\n- [redhat] configs: Include generic ppc64 opts on all ppc64 configs (Alexander Gordeev) [748426]\n- [fs] xfs: don't block on buffer read errors (Boris Ranto) [709223]\n- [fs] nfs: Display lookupcache option in /proc/mounts (Sachin Prabhu) [706305]\n- [net] bonding: Don't allow mode change via sysfs w/slaves present (Veaceslav Falico) [768208]\n- [net] be2net: Fix disabling multicast promiscuous mode (Ivan Vecera) [751998]\n- [net] be2net: Fix endian issue in RX filter command (Ivan Vecera) [751998]\n- [net] be2net: Changing MAC Address of a VF was broken (Ivan Vecera) [751998]\n- [net] be2net: don't create multiple rings in multi channel mode (Ivan Vecera) [751998]\n- [net] be2net: Making die temperature ioctl call async (Ivan Vecera) [751998]\n- [net] be2net: Fix Endian issues in response read log length field (Ivan Vecera) [751998]\n- [net] be2net: Change data type of on die temperature stat (Ivan Vecera) [751998]\n- [net] be2net: Add 60 second delay for dump on recovery from EEH (Ivan Vecera) [751998]\n- [net] be2net: Show newly flashed FW ver in ethtool (Ivan Vecera) [751998]\n- [net] be2net: increase FW update completion timeout (Ivan Vecera) [751998]\n- [net] be2net: Fix race in posting rx buffers (Ivan Vecera) [751998]\n- [net] be2net: Store vid from grp5 event instead of vlan_tag (Ivan Vecera) [751998]\n- [net] be2net: drop pkts that do not belong to the port (Ivan Vecera) [751998]\n- [fs] ext4: fix BUG_ON() in ext4_ext_insert_extent() (Lukas Czerner) [747946] {CVE-2011-3638}\n\n[2.6.18-301.el5]\n- [net] e1000e: Avoid wrong check on TX hang (Dean Nelson) [746272]\n- [net] tg3: Fix TSO loopback test (John Feeney) [755202]\n- [net] ipvs: Fix memory leak when using one packet scheduler (Thomas Graf) [757882]\n- [net] ipv6: Defer device init until valid qdisc specified (Neil Horman) [758736]\n- [block] nbd: prevent sock_xmit from attempting to use NULL socket (Jeff Moyer) [676491]\n- [net] tg3: Scale back code that modifies MRRS (John Feeney) [758882]\n- [fs] xfs: Fix memory corruption in xfs_readlink (Carlos Maiolino) [749160] {CVE-2011-4077}\n- [net] cxgb3: key cxgb3 driver to work based on NETIF_F_GRO (Neil Horman) [754709]\n- [net] cxgb3: fix vfree BUG halt in rcu calback (Neil Horman) [756410]\n- [net] ipv4: fix IN_DEV_ACCEPT_LOCAL() (Weiping Pan) [758993]\n- [misc] cpu: Fix APIC calibration issues on VMware (Prarit Bhargava) [743368]\n- [net] igb: Loopback functionality support for i350 devices (Stefan Assmann) [758059]\n\n[2.6.18-300.el5]\n- [pci] intel-iommu: Default to non-coherent for unattached domains (Don Dutile) [753924]\n- [scsi] bfa: update driver embedded firmware to 3.0.0.0 (Rob Evers) [752972]\n- [scsi] bnx2i: Fix endian on TTT for NOP out transmission (Mike Christie) [752626]\n- [input] evdev: Fix spin lock context in evdev_pass_event() (Don Zickus) [734900]\n- [net] bnx2x: Add new PHY BCM54616 (Michal Schmidt) [733889]\n- [scsi] ipr: add definitions for additional adapter (Steve Best) [753910]\n- [scsi] ipr: Fix BUG on adapter dump timeout (Steve Best) [753910]\n- [scsi] ipr: Add support to flash FPGA and flash back DRAM images (Steve Best) [753910]\n- [scsi] ipr: Stop reading adapter dump prematurely (Steve Best) [753910]\n- [char] rtc: fix reported IRQ rate for when HPET is enabled (Prarit Bhargava) [740299]\n- [block] cciss: add Smart Array 5i to the kdump blacklist (Tomas Henzl) [752690]\n- [scsi] qla4xxx: Update version number to V5.02.04.00.05.08-d0 (Chad Dupuis) [714214]\n- [scsi] qla4xxx: Do not recover adapter if in FAILED state (Chad Dupuis) [714214]\n- [scsi] qla4xxx: Fix duplicate targets in BIOS do not show up (Chad Dupuis) [714214]\n- [scsi] qla4xxx: Fix rmmod kernel trace with ql4xdontresethba=1 (Chad Dupuis) [714214]\n- [scsi] qla4xxx: Add ql4xmaxcmds Command Line Parameter (Chad Dupuis) [714214]\n- [scsi] qla4xxx: Correct the locking mechanism (Chad Dupuis) [714214]\n- [scsi] qla4xxx: Minidump implementation (Chad Dupuis) [714214]\n- [scsi] qla4xxx: Device quiescent and loopback changes (Chad Dupuis) [714214]\n- [scsi] qla4xxx: Add new FLT firmware region (Chad Dupuis) [714214]\n- [scsi] qla4xxx: Prevent CPU lockups when ql4xdontresethba is set (Chad Dupuis) [714214]\n- [scsi] qla4xxx: Updated the reset sequence for ISP82xx (Chad Dupuis) [714214]\n- [scsi] qla4xxx: set set_ddb_entry with correct dma buffer (Chad Dupuis) [714214]\n- [scsi] qla4xxx: Reset retry_relogin_timer to trigger a relogin (Chad Dupuis) [714214]\n- [scsi] qla4xxx: Update ddb_entry on fw_ddb_index changes (Chad Dupuis) [714214]\n- [scsi] qla4xxx: BFS issue when same target devices added twice (Chad Dupuis) [714214]\n- [scsi] qla4xxx: mark device missing in recover adapter (Chad Dupuis) [714214]\n- [scsi] qla4xxx: Perform context resets on context failures (Chad Dupuis) [714214]\n- [scsi] qla4xxx: show hardware/firmware regs for more debug info (Chad Dupuis) [714214]\n- [scsi] qla4xxx: Pass correct fw_ddb_index to abort_task (Chad Dupuis) [714214]\n- [scsi] qla4xxx: check command already completed when abort issued (Chad Dupuis) [714214]\n- [scsi] qla4xxx: Use os_target_id to identify a session (Chad Dupuis) [714214]\n- [fs] dcache: Fix dentry loop detection deadlock (David Howells) [717959]\n- [net] cxgb4: fix ability to disable tx cksum and change tso (Neil Horman) [754711]\n- [fs] nfs: when attempting dir open, fall back on normal lookup (Jeff Layton) [740162]\n- [fs] nfs: remove BUG() from encode_share_access() (Jeff Layton) [754901]\n- [fs] epoll: use up all the timeout (Jason Baron) [705138]\n- [s390] qdio: avoid race leading to stall if CQ is used (Hendrik Brueckner) [753193]\n- [scsi] libsas: disable scanning lun > 0 on ata devices (David Milburn) [749309]\n- [scsi] isci: atapi support (David Milburn) [749309]\n- [scsi] isci: initial sgpio write support (David Milburn) [743965]\n- [scsi] isci: fix sgpio register definitions (David Milburn) [743965]\n- [scsi] isci: export phy events via ->lldd_control_phy() (David Milburn) [747670]\n- [scsi] isci: port state should be set to stopping on last phy (David Milburn) [747670]\n- [scsi] isci: fix decode of DONE_CRC_ERR TC completion status (David Milburn) [747670]\n- [scsi] isci: SATA/STP I/O only returned in normal path to libsas (David Milburn) [747670]\n- [scsi] isci: fix support for large smp requests (David Milburn) [747670]\n- [scsi] isci: fix missed unlock in apc_agent_timeout() (David Milburn) [747670]\n- [scsi] isci: fix event-get pointer increment (David Milburn) [747670]\n- [scsi] isci: add version number (David Milburn) [747670]\n- [scsi] isci: dynamic interrupt coalescing (David Milburn) [747670]\n- [scsi] isci: fix sata response handling (David Milburn) [747670]\n- [scsi] isci: Leave requests alone if already terminating (David Milburn) [747670]\n- [misc] irq: Check for spurious IRQ only on disabled IRQs (Prarit Bhargava) [756412]\n- [net] sctp: Fix another race during accept/peeloff (Thomas Graf) [714870]\n- [net] bonding: change slave->speed from u16 to u32 (Weiping Pan) [747547]\n- [scsi] bnx2i: set PF_NOFREEZE in IO thread (Mike Christie) [753729]\n- [fs] hfs: add sanity check for file name length (Eric Sandeen) [755433] {CVE-2011-4330}\n- [fs] aio: remove upper bound on retries (Jeff Moyer) [753271]\n\n[2.6.18-299.el5]\n- [scsi] be2iscsi: Move driver Version to 4.1.239.0 (Mike Christie) [744343]\n- [scsi] be2iscsi: memset wrb for ring create (Mike Christie) [744343]\n- [scsi] be2iscsi: Fix for when task->sc was cleaned up earlier (Mike Christie) [744343]\n- [scsi] be2iscsi: Fix for wrong dmsg setting in wrb (Mike Christie) [744343]\n- [scsi] be2iscsi: Fix for kdump failure (Mike Christie) [744343]\n- [net] ethtool: Support large register dumps (Neil Horman) [753200]\n- [fs] proc: Fix select on /proc files without ->poll (David Howells) [751214]\n- [net] igb: bump version to reflect RHEL5.8 updates (Stefan Assmann) [754359]\n- [fs] dcache: Log ELOOP rather than creating a loop (David Howells) [717959]\n- [fs] dcache: Fix loop checks in d_materialise_unique (David Howells) [717959]\n- [fs] nfs: Ensure we mark inode as dirty if early exit from commit (Jeff Layton) [714020]\n- [scsi] qla2xxx: Update the 4G and 8G firmware to 5.06.03 (Chad Dupuis) [750362]\n- [x86] apic: ack all pending irqs when crashed/on kexec (hiro muneda) [742079]\n- [net] cxgb3: Fix VLAN over Jumbo frames (Neil Horman) [753053]\n- [net] cxgb3: Fix out of bounds index of adapter_info (Neil Horman) [753044]\n\n[2.6.18-298.el5]\n- [security] keys: Fix NULL deref in user-defined key type (David Howells) [751301] {CVE-2011-4110}\n- [fs] dlm: delayed reply message warning (David Teigland) [677413]\n- [virt] kvm: fix regression w/ 32 bit KVM clock (Rik van Riel) [731599 751742]\n- [net] bonding: update speed/duplex for NETDEV_CHANGE (Weiping Pan) [747547]\n\n[2.6.18-297.el5]\n- [scsi] megaraid_sas: add workaround for PERC5/1068 kdump panic (Tomas Henzl) [745964]\n- [fs] jbd/jbd2: validate sb->s_first in journal_get_superblock (Eryu Guan) [706810]\n- [net] tg3: Remove 5719 jumbo frames and TSO blocks (John Feeney) [743117]\n- [net] tg3: Break larger frags into 4k chunks for 5719 (John Feeney) [743117]\n- [net] tg3: Add tx BD budgeting code (John Feeney) [743117]\n- [net] tg3: Consolidate code that calls tg3_tx_set_bd() (John Feeney) [743117]\n- [net] tg3: Add partial fragment unmapping code (John Feeney) [743117]\n- [net] tg3: Generalize tg3_skb_error_unmap() (John Feeney) [743117]\n- [net] tg3: Simplify tx bd assignments (John Feeney) [743117]\n- [net] tg3: Reintroduce tg3_tx_ring_info (John Feeney) [743117]\n- [net] tg3: Add TSO loopback test (John Feeney) [743117]\n- [net] tg3: Cleanup transmit error path (John Feeney) [743117]\n- [scsi] lpfc: Update lpfc version for 8.2.0.108.2p driver release (Rob Evers) [747348]\n- [scsi] lpfc: Fix kernel build warnings (Rob Evers) [747348]\n- [scsi] lpfc: Fix crash when cfg_fcp_eq_count is zero (Rob Evers) [747348]\n- [scsi] lpfc: Fix COMMON_GET_CNTL_ATTR mbox cmd failure (Rob Evers) [747348]\n- [scsi] lpfc: Fix SLI4 device detecting physical port name (Rob Evers) [747348]\n- [scsi] lpfc: Fix reporting of firmware versions that contain an X (Rob Evers) [747348]\n- [scsi] lpfc: Fix kernel crash during boot with SLI4 card (Rob Evers) [747348]\n- [scsi] lpfc: Fixed RPI leaks in ELS protocol handling (Rob Evers) [747348]\n- [scsi] lpfc: Properly clean up EQ and CQ child lists (Rob Evers) [747348]\n- [scsi] lpfc: Fixed NPIV FDISC failure on SLI4 if-type 2 ports (Rob Evers) [747348]\n- [scsi] lpfc: Fixed failure to do IP reset on SLI4 error (Rob Evers) [747348]\n- [scsi] lpfc: Fixed fcp underrun reporting (Rob Evers) [747348]\n- [scsi] lpfc: Fix sysfs lists fabric name for disconnected port (Rob Evers) [747348]\n- [scsi] lpfc: change SLI_CONFIG mailbox cmd timeout to 300 seconds (Rob Evers) [747348]\n- [scsi] lpfc: Fix handling IP reset when PCI read return error (Rob Evers) [747348]\n- [scsi] lpfc: Fixed casting problem (Rob Evers) [747348]\n- [scsi] lpfc: Fix error code return for management API (Rob Evers) [747348]\n- [scsi] lpfc: Fix sli4 mailbox status code (Rob Evers) [747348]\n- [scsi] lpfc: Fixed incomplete scsi messages displayed (Rob Evers) [747348]\n- [net] igb: Fix for Alt MAC Address feature on 82580 and later (Stefan Assmann) [748792]\n- [net] igb: enable link power down (Stefan Assmann) [742514]\n- [net] netfilter: Search all chains if drop due to max conntrack (Thomas Graf) [713222]\n- [x86] hwmon: enable i5k_amb driver to get memory resource (Dean Nelson) [736032]\n- [xen] ia64: fix compile warning added by watchdog timers (Laszlo Ersek) [742880]\n\n[2.6.18-296.el5]\n- [net] bonding: Have bond_check_dev_link examine netif_running (Ivan Vecera) [736172]\n- [net] be2net: enable NETIF_F_LLTX and add own locking of Tx path (Ivan Vecera) [731806]\n- [net] be2net: fix multicast filter programming (Ivan Vecera) [731806]\n- [net] be2net: fix cmd-rx-filter not notifying MCC (Ivan Vecera) [731806]\n- [net] be2net: use RX_FILTER cmd to program multicast addresses (Ivan Vecera) [731806]\n- [fs] cifs: fix wrong buffer length returned by SendReceive (Sachin Prabhu) [720363]\n- [net] ipv6: allow DAD to be disabled (Jiri Benc) [709271]\n- [xen] Watchdog timers for domains (Laszlo Ersek) [742880]\n\n[2.6.18-295.el5]\n- [net] tg3: put back 5717_PLUS for 5719 and 5720 (John Feeney) [749866]\n- [s390] qdio: EQBS retry after CCQ 96 (Hendrik Brueckner) [749058]\n- [fs] nfs: re-add call to filemap_fdatawrite (David Jeffery) [748999]\n- [x86] Add missing CPU feature flags for AMD Bulldozer (Frank Arnold) [712517]\n- [usb] input/wacom: add support for Bamboo MTE-450A (Aristeu Rozanski) [710066]\n- [fs] gfs2: Add readahead to sequential directory traversal (Robert S Peterson) [681902]\n- [fs] gfs2: Cache dir hash table in a contiguous buffer (Robert S Peterson) [681902]\n\n[2.6.18-294.el5]\n- [misc] modsign: Clean up canonlist properly during sig verify (Jiri Olsa) [485173]\n- [virt] kvm: fix lost tick accounting for 32 bit kvm-clock (Rik van Riel) [731599]\n- [fs] epoll: fix integer overflow warning (Jason Baron) [705138]\n- [net] bonding: allow all slave speeds (Jiri Pirko) [699661]\n- [net] bonding: fix string comparison errors (Andy Gospodarek) [680332]\n- [fs] vfs: fix automount should ignore LOOKUP_FOLLOW (Ian Kent) [560103]\n- [fs] proc: fix oops on invalid /proc/<pid>/maps access (Johannes Weiner) [747699] {CVE-2011-3637}\n- [fs] file: do not kfree vmalloc'd file table arrays (Johannes Weiner) [738238]\n- [net] bnx2x: fix bad pointer arithmetic causing memory corruption (Michal Schmidt) [747579]\n- [net] bnx2x: restore bnx2x/cnic/bnx2i update (Jarod Wilson) [715383 715388 715604]\n- [misc] remove div_long_long_rem (Prarit Bhargava) [732614] {CVE-2011-3209}\n- [net] bridge: fix use after free in __br_deliver (Amerigo Wang) [703045] {CVE-2011-2942}\n\n[2.6.18-293.el5]\n- [redhat] configs: Increase the maximum allowed number of UART's (Mauro Carvalho Chehab) [684874]\n- [net] igb: add entropy support option (Stefan Assmann) [605703]\n- [net] bnx2x: revert bnx2x/cnic/bnx2i update (Jarod Wilson) [715383 715388 715604]\n- [virt] xen/netback: disable features not supported by netfront (Paolo Bonzini) [746225]\n- [fs] jbd: Fix forever sleeping process in do_get_write_access (Harshula Jayasuriya) [745345]\n- [fs] jbd2: Fix forever sleeping process in do_get_write_access (Harshula Jayasuriya) [745345]\n- [s390] crypto: Toleration for ap bus devices with device type 10 (Hendrik Brueckner) [744859]\n- [cpufreq] powernow-k8: add missing unregister_cpu_notifier (Prarit Bhargava) [743961]\n- [misc] cpu: make set_mtrr disable interrupts before sending IPI (Shyam Iyer) [739631]\n- [net] cxgb3: Update to latest upstream for rhel5.8 (Neil Horman) [717807]\n- [infiniband] cxgb3: backport upstream fixes for rhel5.8 (Neil Horman) [717433]\n- [net] mlx4: remove duplicate rounddown_pow_of_two (Jarod Wilson) [714232]\n- [x86] Fix suspend/resume on AMD IOMMUs (Matthew Garrett) [712296]\n- [acpi] Backport pm_qos support to rhel5 (Matthew Garrett) [691954]\n- [ipc] shm: add RSS and swap size information to /proc/sysvipc/shm (Jerome Marchand) [638652]\n- [ipc] shm: fix 32-bit truncation of segment sizes (Jerome Marchand) [638652]\n- [usb] host: slow down ehci ITD reuse (Don Zickus) [571737]\n- [usb] host: Fix EHCI ISO transfer bug (Don Zickus) [571737]\n- [usb] host: fix bug in ehci Iso scheduling (Don Zickus) [571737]\n- [usb] host: ehci completes high speed ISO URBs sooner (Don Zickus) [571737]\n- [xen] x86: introduce cpuid whitelist (Andrew Jones) [526862 711070]\n\n[2.6.18-292.el5]\n- [scsi] megaraid: fix FastPath and update to v5.40 (Tomas Henzl) [717698]\n- [net] netxen: Add pcie fw load perf drop workaround (Chad Dupuis) [714239]\n- [net] netxen: add vlan LRO support (Chad Dupuis) [714239]\n- [net] netxen: add fw version compatibility check (Chad Dupuis) [714239]\n- [net] netxen: Remove casts of void * (Chad Dupuis) [714239]\n- [net] netxen: fix race in skb->len access (Chad Dupuis) [714239]\n- [net] netxen: Remove unnecessary semicolons (Chad Dupuis) [714239]\n- [net] netxen: suppress false lro warning messages (Chad Dupuis) [714239]\n- [net] netxen: Fix common misspellings (Chad Dupuis) [714239]\n- [net] netxen: Add support for VLAN RX HW acceleration (Chad Dupuis) [714239]\n- [scsi] qla2xxx: Update the 4G and 8G firmware to 5.06.01 (Chad Dupuis) [714236]\n- [scsi] qla2xxx: Updated the driver version to 8.03.07.09.05.08-k. (Chad Dupuis) [714206]\n- [scsi] qla2xxx: properly set the port number. (Chad Dupuis) [714206]\n- [scsi] qla2xxx: Check for marker IOCB during response queue processing. (Chad Dupuis) [714206]\n- [scsi] qla2xxx: Retrun sysfs error codes appropriate to conditions (Chad Dupuis) [714206]\n- [scsi] qla2xxx: Handle MPI timeout indicated by AE8002 (Chad Dupuis) [714206]\n- [scsi] qla2xxx: Use port number to compute nvram/vpd parameter offsets. (Chad Dupuis) [714206]\n- [scsi] qla2xxx: Change from irq to irqsave with host_lock (Chad Dupuis) [714206]\n- [scsi] qla2xxx: Check for golden firmware and show version if available. (Chad Dupuis) [714206]\n- [scsi] qla2xxx: Issue mailbox command only when firmware hung bit is reset for ISP82xx. (Chad Dupuis) [714206]\n- [scsi] qla2xxx: Correct inadvertent loop state transitions during port-update handling. (Chad Dupuis) [714206]\n- [scsi] qla2xxx: Update to the beacon implementation. (Chad Dupuis) [714206]\n- [scsi] qla2xxx: Add support for ISP82xx to capture dump (minidump) on failure. (Chad Dupuis) [714206]\n- [scsi] qla2xxx: Check for marker IOCB during response queue processing. (Chad Dupuis) [714206]\n- [scsi] qla2xxx: Fix qla24xx revision check while enabling interrupts. (Chad Dupuis) [714206]\n- [scsi] qla2xxx: Check to see if a request has completed before calling qla2x00_block_error_handler() in the abort handler. (Chad Dupuis) [714206]\n- [scsi] qla2xxx: Acquire hardware lock while manipulating dsd list. (Chad Dupuis) [714206]\n- [scsi] qla2xxx: Double check for command completion if abort mailbox command fails. (Chad Dupuis) [714206]\n- [scsi] qla2xxx: Fix array out of bound warning. (Chad Dupuis) [714206]\n- [scsi] qla2xxx: Prevent CPU lockups when module param is set. (Chad Dupuis) [714206]\n- [scsi] qla2xxx: Provide method for updating I2C attached VPD. (Chad Dupuis) [714206]\n- [scsi] qla2xxx: Enable write permission to some debug related module parameters to be changed dynamically. (Chad Dupuis) [714206]\n- [scsi] qla2xxx: Implemented beacon on/off for ISP82XX. (Chad Dupuis) [714206]\n- [scsi] qla2xxx: Check alterante 'reason' code during GPSC status handling. (Chad Dupuis) [714206]\n- [scsi] qla2xxx: During loopdown perform Diagnostic loopback. (Chad Dupuis) [714206]\n- [scsi] qla2xxx: Refactor call to qla2xxx_read_sfp for thermal temperature. (Chad Dupuis) [714206]\n- [scsi] qla2xxx: Unify the read/write sfp mailbox command routines (Chad Dupuis) [714206]\n- [scsi] qla2xxx: Correct read sfp single byte mailbox register. (Chad Dupuis) [714206]\n- [scsi] qla2xxx: Clear complete initialization control block. (Chad Dupuis) [714206]\n- [scsi] qla2xxx: Allow an override of the registered maximum LUN. (Chad Dupuis) [714206]\n- [scsi] qla2xxx: Add host number in reset and quiescent message logs. (Chad Dupuis) [714206]\n- [scsi] qla2xxx: Correct buffer start in edc sysfs debug print. (Chad Dupuis) [714206]\n- [scsi] qla2xxx: Correction to sysfs edc interface. (Chad Dupuis) [714206]\n- [scsi] qla2xxx: Improve logging of exception conditions when creating NPIV ports. (Chad Dupuis) [714206]\n- [scsi] qla2xxx: Log if firmware fails to load from flash for ISP82xx. (Chad Dupuis) [714206]\n- [scsi] qla2xxx: Add test for valid loop id on fabric relogin. (Chad Dupuis) [714206]\n- [scsi] qla2xxx: Don't wait for active mailbox command completion when firmware is hung. (Chad Dupuis) [714206]\n- [misc] dcache: exclude new automount functions from kabi (Ian Kent) [560103]\n- [fs] autofs4: rename follow_down_one to follow_down for kabi (Ian Kent) [560103]\n- [fs] autofs4: rename d_managed to d_mounted to preserve kabi (Ian Kent) [560103]\n- [fs] vfs: remove LOOKUP_NO_AUTOMOUNT flag (Ian Kent) [560103]\n- [fs] vfs: Fix the remaining automounter semantics regressions (Ian Kent) [560103]\n- [fs] vfs: Add LOOKUP_AUTOMOUNT flag for pathname lookup (Ian Kent) [560103]\n- [fs] vfs: automount should ignore LOOKUP_FOLLOW (Ian Kent) [560103]\n- [fs] vfs: Fix automount for negative autofs dentries (Ian Kent) [560103]\n- [fs] vfs: Remove a further kludge from __do_follow_link (Ian Kent) [560103]\n- [fs] autofs4: bump version (Ian Kent) [560103]\n- [fs] autofs4: reinstate last used update on access (Ian Kent) [560103]\n- [fs] autofs4: add v4 pseudo direct mount support (Ian Kent) [560103]\n- [fs] autofs4: fix wait validation (Ian Kent) [560103]\n- [fs] autofs4: cleanup autofs4_free_ino (Ian Kent) [560103]\n- [fs] autofs4: cleanup dentry operations (Ian Kent) [560103]\n- [fs] autofs4: cleanup inode operations (Ian Kent) [560103]\n- [fs] autofs4: removed unused code (Ian Kent) [560103]\n- [fs] autofs4: add d_manage dentry operation (Ian Kent) [560103]\n- [fs] autofs4: add d_automount dentry operation (Ian Kent) [560103]\n- [fs] vfs: Make follow_down handle d_manage (Ian Kent) [560103]\n- [fs] vfs: Make d_mounted a more general field for special functs (Ian Kent) [560103]\n- [fs] vfs: Add AT_NO_AUTOMOUNT flag to suppress terminal automount (Ian Kent) [560103]\n- [fs] cifs: Use d_automount rather than abusing follow_link (Ian Kent) [560103]\n- [fs] nfs: Use d_automount rather than abusing follow_link (Ian Kent) [560103]\n- [fs] namei: Add dentry op for automount, don't use follow_link (Ian Kent) [560103]\n- [fs] namei: rename struct path to vfs_path (Ian Kent) [560103]\n- [fs] autofs4: rename dentry to expiring in _lookup_expiring (Ian Kent) [560103]\n- [fs] autofs4: rename dentry to active in autofs4_lookup_active() (Ian Kent) [560103]\n- [fs] autofs4: eliminate d_unhashed in path walk checks (Ian Kent) [560103]\n- [fs] autofs4: cleanup active and expire lookup (Ian Kent) [560103]\n- [fs] autofs4: rename unhashed to active in autofs4_lookup() (Ian Kent) [560103]\n- [fs] autofs4: use autofs_info for pending flag (Ian Kent) [560103]\n- [fs] autofs4: use helper for need mount check (Ian Kent) [560103]\n- [fs] autofs4: use helpers for expiring list (Ian Kent) [560103]\n- [fs] autofs4: use helpers for active list handling (Ian Kent) [560103]\n\n[2.6.18-291.el5]\n- [fs] nfs: don't redirty inodes with no outstanding commits (Jeff Layton) [739665]\n- [edac] i7core_edac: Init memory name with cpu, channel, bank (Mauro Carvalho Chehab) [731824]\n- [message] mptsas: upgrade version string to 3.04.20rh (Tomas Henzl) [717707]\n- [message] mptsas: Fix device offline from aggressive HBA reset (Tomas Henzl) [717707]\n- [message] mptsas: Better handling of DEAD IOC PCI-E Link down err (Tomas Henzl) [717707]\n- [message] mptsas: Set max_sector count from module parameter (Tomas Henzl) [717707]\n- [message] mptsas: check SILI bit in READ_6 CDB for DATA UNDERRUN (Tomas Henzl) [717707]\n- [message] mptsas: Fix annoying warning (Tomas Henzl) [717707]\n- [message] mptsas: Remove debug print from mptscsih_qcmd() (Tomas Henzl) [717707]\n- [message] mptsas: do not check serial_number in the abort handler (Tomas Henzl) [717707]\n- [scsi] lpfc: Update version for 8.2.0.108.1p driver release (Rob Evers) [714290]\n- [scsi] lpfc: Fix stall when fw reset to port without privs (Rob Evers) [714290]\n- [scsi] lpfc: Fix uninit local var portstat_reg compiler warning (Rob Evers) [714290]\n- [scsi] lpfc: Fix request fw support for little endian systems (Rob Evers) [714290]\n- [scsi] lpfc: Fix default adapter name for the OCe15100 (Rob Evers) [714290]\n- [scsi] lpfc: Fix proper error code return value for hba resets (Rob Evers) [714290]\n- [scsi] lpfc: Fix cable pull failure on intf type 2 SLI-4 adapters (Rob Evers) [714290]\n- [scsi] lpfc: Fix omission of fcf priority failover sysfs entry (Rob Evers) [714290]\n- [scsi] lpfc: Fix SLI port recovery error attention with RN set (Rob Evers) [714290]\n- [scsi] lpfc: Fix crashes when unsolicted ELS ECHO_CMD received (Rob Evers) [714290]\n- [scsi] lpfc: Fix direct connect not coming up for SLI4 FC ports (Rob Evers) [714290]\n- [scsi] lpfc: Update version for 8.2.0.108 driver release (Rob Evers) [714290]\n- [scsi] lpfc: Fix fw update to match new firmware image format (Rob Evers) [714290]\n- [scsi] lpfc: Fix SLI4 CT handling for sequences > 4K (Rob Evers) [714290]\n- [scsi] lpfc: Fixed handling of unsolicited frames for vports (Rob Evers) [714290]\n- [scsi] lpfc: Fixed crash when aborting els IOs (Rob Evers) [714290]\n- [scsi] lpfc: Fixed handling of CVL for vports (Rob Evers) [714290]\n- [scsi] lpfc: Fix up CT and oxid/rxid for unsol rcv frames (Rob Evers) [714290]\n- [scsi] lpfc: Fix duplicate log numbers caused by merge (Rob Evers) [714290]\n- [scsi] lpfc: Fixed compiler warning with file_operations struct (Rob Evers) [714290]\n- [scsi] lpfc: Added fcf priority record selection for fcf failover (Rob Evers) [714290]\n- [scsi] lpfc: Fix excess memory on stack compiler warning (Rob Evers) [714290]\n- [scsi] lpfc: Update version for 8.2.0.107 driver release (Rob Evers) [714290]\n- [scsi] lpfc: Fix listhbas stall w/remote initiators in zone (Rob Evers) [714290]\n- [scsi] lpfc: Fix not building in debugfs if CONFIG_DEBUG_FS=y (Rob Evers) [714290]\n- [scsi] lpfc: Fix FC/FCoE Async Receive CQE not scaling (Rob Evers) [714290]\n- [scsi] lpfc: iDiag added SLI4 PCI BAR reigster access methods (Rob Evers) [714290]\n- [scsi] lpfc: iDiag cmd structure indexing by using macro defines (Rob Evers) [714290]\n- [scsi] lpfc: iDiag multi-buffer mbox command capture and dump ext (Rob Evers) [714290]\n- [scsi] lpfc: SLI4 loopback test and link diagnostic support (Rob Evers) [714290]\n- [scsi] lpfc: FLOGI payload has Multiple IDs on enable_npiv clear (Rob Evers) [714290]\n- [scsi] lpfc: log when writeable parameters are changed (Rob Evers) [714290]\n- [scsi] lpfc: Fix ASIC SYSFS failed multi-buffer fw download (Rob Evers) [714290]\n- [scsi] lpfc: Fix mbox cmd release memory leak (Rob Evers) [714290]\n- [scsi] lpfc: merge debugfs ASIC extents info into iDiag framework (Rob Evers) [714290]\n- [scsi] lpfc: wait for port status reg for ready after fw reset (Rob Evers) [714290]\n- [scsi] lpfc: Consolidated duplicating macro definitions (Rob Evers) [714290]\n- [scsi] lpfc: Remove sharp define from codebase (Rob Evers) [714290]\n- [scsi] lpfc: Implement debugfs support for resource extents (Rob Evers) [714290]\n- [scsi] lpfc: iDiag r/w bitset/clear access to new ASIC ctl regs (Rob Evers) [714290]\n- [scsi] lpfc: Fix mbox command failure with multiple large buffers (Rob Evers) [714290]\n- [scsi] lpfc: iDiag endian explicit dumping (Rob Evers) [714290]\n- [scsi] lpfc: iDiag debugfs method for dumping mbox from SLI4 (Rob Evers) [714290]\n- [scsi] lpfc: request PCI reset to support EEH recover on P7 (Rob Evers) [714290]\n- [scsi] lpfc: iDiag debugfs inline mbox cmd capture and dump (Rob Evers) [714290]\n- [scsi] lpfc: Fix enabling of PCIe AER (Rob Evers) [714290]\n- [scsi] lpfc: Fix EEH recovery to save state after SLI4 PCI reset (Rob Evers) [714290]\n- [scsi] lpfc: INIT_LIST_HEAD to lpfc_mgmt_issue_sli_cfg_ext_mbox (Rob Evers) [714290]\n- [scsi] lpfc: new ASIC mgmt pass-through mbox multi-buffer ext (Rob Evers) [714290]\n- [scsi] lpfc: Fix FC Port swap on SLI3 adapters (Rob Evers) [714290]\n- [scsi] lpfc: Fix Virtual link loss during failover test (Rob Evers) [714290]\n- [scsi] lpfc: Fix vpi initialization in lpfc_init_vfi (Rob Evers) [714290]\n- [scsi] lpfc: show 16 Gbit in FC host supported_speeds sysfs entry (Rob Evers) [714290]\n- [scsi] lpfc: support reseting firmware and device from sysfs entry (Rob Evers) [714290]\n- [scsi] lpfc: support firmware dump obj file to flash filesystem (Rob Evers) [714290]\n- [scsi] lpfc: Add firmware upgrade code to driver (Rob Evers) [714290]\n- [scsi] lpfc: add delay following IF_TYPE_2 function reset (Rob Evers) [714290]\n- [scsi] lpfc: Fragment ELS & SCSI SGE lists via Extent regions (Rob Evers) [714290]\n- [scsi] lpfc: Fixed potential missed SLI4 init failure conditions (Rob Evers) [714290]\n- [scsi] lpfc: Add model names for new hardware (Rob Evers) [714290]\n- [scsi] lpfc: Set max SGE size to 0x80000000 where possible (Rob Evers) [714290]\n- [scsi] lpfc: Fix discovery failure in private loop (Rob Evers) [714290]\n- [scsi] lpfc: Fix SLI3 and non-NPIV crashes with new extent code (Rob Evers) [714290]\n- [scsi] lpfc: Refactor lpfc_sli4_alloc_extent some more (Rob Evers) [714290]\n- [scsi] lpfc: Restore mbox can fail as nonerror functionality (Rob Evers) [714290]\n- [scsi] lpfc: Fix build warnings in 8.2.0.102 (Rob Evers) [714290]\n- [scsi] lpfc: Use HDRR bit to determine if RPI headers are needed (Rob Evers) [714290]\n- [scsi] lpfc: Don't post RPI Headers if port supports extents (Rob Evers) [714290]\n- [scsi] lpfc: ASIC mgmt multi-buffer mbox passthrough support (Rob Evers) [714290]\n- [scsi] lpfc: Update version for 8.2.0.102 driver release (Rob Evers) [714290]\n- [scsi] lpfc: Add MAILBOX_MGMT_MAX define (Rob Evers) [714290]\n- [scsi] lpfc: Refactor code in lpfc_sli4_alloc_extent (Rob Evers) [714290]\n- [scsi] lpfc: start new ASIC device management support work (Rob Evers) [714290]\n- [scsi] lpfc: Fix port capabilities and get parameters mbox calls (Rob Evers) [714290]\n- [scsi] lpfc: Fix SLI2 crashes with new extent code (Rob Evers) [714290]\n- [scsi] lpfc: Fix mbox processing to not overwrite status codes (Rob Evers) [714290]\n- [scsi] lpfc: enumerate members starting from none zero value (Rob Evers) [714290]\n- [scsi] lpfc: Remove workaround for extents endian issue (Rob Evers) [714290]\n- [scsi] lpfc: Call correct mbox cleanup routine after extent alloc (Rob Evers) [714290]\n- [scsi] lpfc: extent block list cleanup and free memory resources (Rob Evers) [714290]\n- [scsi] lpfc: Fix memory leak in extent block lists (Rob Evers) [714290]\n- [scsi] lpfc: Modified variables for XRIs to be unsigned variable (Rob Evers) [714290]\n- [scsi] lpfc: support for nonembedded Extent mailbox IOCTLs (Rob Evers) [714290]\n- [scsi] lpfc: Fixed compilation error/warning in sli code (Rob Evers) [714290]\n- [scsi] lpfc: Rework SLI4 Extents code (Rob Evers) [714290]\n- [scsi] lpfc: Update version for 8.2.0.101 driver release (Rob Evers) [714290]\n- [scsi] lpfc: Fixed mask size for the wq_id mask (Rob Evers) [714290]\n- [scsi] lpfc: Fix Port Error detected during POST (Rob Evers) [714290]\n- [scsi] lpfc: Apply dropped patch from initial new ASIC bring up (Rob Evers) [714290]\n- [scsi] lpfc: Rework SLI4 Extents code (Rob Evers) [714290]\n- [scsi] lpfc: Reorganize CQ and EQ usage to comply with SLI4 Specs (Rob Evers) [714290]\n- [scsi] lpfc: Fix KERN levels on log messages 3008, 2903, 0383 (Rob Evers) [714290]\n- [scsi] lpfc: Initial checkin of SLI4 Extents code (Rob Evers) [714290]\n- [scsi] lpfc: Fix ASIC mbox queue id collision with work queue id (Rob Evers) [714290]\n- [scsi] lpfc: work on systems with Page Size Larger than 4k (Rob Evers) [714290]\n- [scsi] lpfc: set constant sysfs passthrough mbox cmd maximum size (Rob Evers) [714290]\n- [scsi] lpfc: Fix FCFI incorrect on received unsolicited frames (Rob Evers) [714290]\n- [scsi] lpfc: Update version for 8.2.0.100 driver release (Rob Evers) [714290]\n- [scsi] lpfc: Add LOG_ELS message to NPIV LOGO (Rob Evers) [714290]\n- [scsi] lpfc: move multi-buffer macros into shared IOCTL header (Rob Evers) [714290]\n- [scsi] lpfc: Update version for 8.2.0.99 driver release (Rob Evers) [714290]\n- [scsi] lpfc: Fix build warning in debugfs code (Rob Evers) [714290]\n- [scsi] lpfc: iDiag debugfs SLI4 doorbell reigster access methods (Rob Evers) [714290]\n- [scsi] lpfc: Fix RQ_CREATE version 1 fails (Rob Evers) [714290]\n- [scsi] lpfc: Add Temporary RPI field to the ELS request WQE (Rob Evers) [714290]\n- [scsi] lpfc: Allow SLI4 with FCOE_MODE not set on new FC adapters (Rob Evers) [714290]\n- [scsi] lpfc: only look at BAR2 or BAR4 only for if_type 0 (Rob Evers) [714290]\n- [scsi] lpfc: iDiag debugfs SLI4 display index info in decimal (Rob Evers) [714290]\n- [scsi] lpfc: iDiag debugfs SLI4 device queue entry access methods (Rob Evers) [714290]\n- [scsi] lpfc: Update copyright date for all changed files (Rob Evers) [714290]\n- [scsi] lpfc: Update version for 8.2.0.98 driver release (Rob Evers) [714290]\n- [scsi] lpfc: Fixed the compiler warning in current code (Rob Evers) [714290]\n- [scsi] lpfc: handle PCI Link drop detection failure (Rob Evers) [714290]\n- [scsi] lpfc: Add selective reset jump table entry (Rob Evers) [714290]\n- [scsi] lpfc: Update version for 8.2.0.97 driver release (Rob Evers) [714290]\n- [scsi] lpfc: lower stack use in lpfc_fc_frame_check (Rob Evers) [714290]\n- [scsi] lpfc: fix comment typo diable -> disable (Rob Evers) [714290]\n- [scsi] lpfc: fix comment/printk typos (Rob Evers) [714290]\n- [scsi] lpfc: Add new Queue create Mailbox versions for new ASIC (Rob Evers) [714290]\n- [scsi] lpfc: Place LPFC driver module parameters in sysfs (Rob Evers) [714290]\n- [scsi] lpfc: Fix compile warning for iDiag (Rob Evers) [714290]\n- [scsi] lpfc: Performance Hints support (Rob Evers) [714290]\n- [scsi] lpfc: Add new driver interfaces for encryption products (Rob Evers) [714290]\n- [scsi] lpfc: iDiag driver support debugfs queue information get (Rob Evers) [714290]\n- [scsi] lpfc: iDiag debugfs PCI cfg reg bits set/clear methods (Rob Evers) [714290]\n- [scsi] lpfc: iDiag debugfs framework and r/w PCI cfg space regs (Rob Evers) [714290]\n- [block] cciss: bump driver version (Tomas Henzl) [714129]\n- [block] cciss: need to delay after a PCI Power Management reset (Tomas Henzl) [714129]\n- [block] cciss: auto engage scsi susbsystem (Tomas Henzl) [714129]\n- [block] cciss: store pdev in hba struct (Tomas Henzl) [714129]\n- [block] cciss: use consistent variable names (Tomas Henzl) [714129]\n- [block] cciss: add a commandline switch for simple mode (Tomas Henzl) [714129]\n- [fs] proc: close race with exec in mem_read() (Johannes Weiner) [692042] {CVE-2011-1020}\n- [mm] implement access_remote_vm (Johannes Weiner) [692042] {CVE-2011-1020}\n- [mm] factor out main logic of access_process_vm (Johannes Weiner) [692042] {CVE-2011-1020}\n- [mm] use mm_struct to resolve gate vma's in __get_user_pages (Johannes Weiner) [692042] {CVE-2011-1020}\n- [mm] make in_gate_area take mm_struct instead of a task_struct (Johannes Weiner) [692042] {CVE-2011-1020}\n- [mm] make get_gate_vma take mm_struct instead of task_struct (Johannes Weiner) [692042] {CVE-2011-1020}\n- [x86_64] mark assoc mm when running task in 32 bit compat mode (Johannes Weiner) [692042] {CVE-2011-1020}\n- [misc] sched: add ctx tag to mm running task in ia32 compat mode (Johannes Weiner) [692042] {CVE-2011-1020}\n- [fs] proc: require the target to be tracable (or yourself) (Johannes Weiner) [692042] {CVE-2011-1020}\n- [fs] proc: close race in /proc/*/environ (Johannes Weiner) [692042] {CVE-2011-1020}\n- [fs] proc: report errors in /proc/*/*map* sanely (Johannes Weiner) [692042] {CVE-2011-1020}\n- [fs] proc: shift down_read(mmap_sem) to the caller (Johannes Weiner) [692042] {CVE-2011-1020}\n- [fs] detect exec transition phase with new mm but old creds (Johannes Weiner) [692042] {CVE-2011-1020}\n- [net] tg3: call netif_carrier_off to initialize operstate value (John Feeney) [635982]\n- [net] tg3: Update to plus (John Feeney) [715409]\n- [net] tg3: Update to 3.119 (John Feeney) [715409]\n- [net] tg3: Update to 3.118 (John Feeney) [683393 699545]\n- [net] tg3: Update to 3.117 (John Feeney) [715409]\n- [xen] make test_assign_device domctl dependent on intremap hw (Laszlo Ersek) [740203]\n- [xen] Propagate target dom within XEN_DOMCTL_test_assign_device (Laszlo Ersek) [740203]\n\n[2.6.18-290.el5]\n- [net] e1000: don't enable dma rx until after dma address setup (Dean Nelson) [714318]\n- [net] e1000: save skb counts in TX to avoid cache misses (Dean Nelson) [714318 742124]\n- [net] e1000: Fix driver to be used on PA RISC C8000 workstations (Dean Nelson) [714318]\n- [net] e1000: repair missing flush operations (Dean Nelson) [714318]\n- [net] e1000: always do e1000_check_for_link on e1000_ce4100 MACs (Dean Nelson) [714318]\n- [scsi] be2iscsi: Add pci_disable device (Mike Christie) [714292]\n- [scsi] be2iscsi: Adding a shutdown Routine (Mike Christie) [713816 714292]\n- [scsi] be2iscsi: Fix /proc/interrupts problem (Mike Christie) [714292]\n- [scsi] be2iscsi: remove host and session casts (Mike Christie) [714292]\n- [scsi] be2iscsi: Use struct scsi_lun in iscsi structs (Mike Christie) [714292]\n- [scsi] be2iscsi: fix chip cleanup (Mike Christie) [714292]\n- [scsi] be2iscsi: fix boot hang due to interrupts not rearmed (Mike Christie) [714292]\n- [scsi] be2iscsi: Fix for proper setting of FW (Mike Christie) [714292]\n- [scsi] be2iscsi: Set a timeout to FW (Mike Christie) [714292]\n- [scsi] be2iscsi: remove extra semicolons (Mike Christie) [714292]\n- [scsi] be2iscsi: Fix common misspellings (Mike Christie) [714292]\n- [scsi] be2iscsi: tmp revert Fix MSIX interrupt names fix (Mike Christie) [714292]\n- [infiniband] cxgb4: Fail RDMA initialization on unsupported cards (Steve Best) [713943]\n- [infiniband] cxgb4: Couple of abort fixes (Steve Best) [713943]\n- [infiniband] cxgb4: Don't truncate MR lengths (Steve Best) [713943]\n- [infiniband] cxgb4: Don't exceed hw IQ depth limit for user CQs (Steve Best) [713943]\n- [hwmon] lm78: Make ISA interface depend on CONFIG_ISA (Dean Nelson) [713815]\n- [hwmon] lm78: Avoid forward declarations (Dean Nelson) [713815]\n- [hwmon] lm78: Stop abusing struct i2c_client for ISA devices (Dean Nelson) [713815]\n- [hwmon] lm78: Detect alias chips (Dean Nelson) [713815]\n- [hwmon] don't build drivers for ppc that touch ISA addresses (Dean Nelson) [713815]\n- [char] CONFIG_TELCLOCK depends on X86 (Dean Nelson) [713815]\n- [misc] add oprofile support for Sandy Bridge (John Villalovos) [713666]\n- [net] ixgbe: update to upstream version 3.4.8-k (Andy Gospodarek) [713110 714013 714314]\n- [net] e1000e: fix WoL on 82578DM and 82567V3 (Andy Gospodarek) [712773]\n- [fs] gfs2: Call gfs2_meta_wipe for directory hash blocks (Abhijith Das) [706616]\n- [net] bonding: resolve failover problems related to jiffy wrap (Andy Gospodarek) [693258]\n- [fs] nfs: Don't call iput holding nfs_access_cache_shrinker lock (Steve Dickson) [585935]\n- [block] improve detail in I/O error messages (Mike Snitzer) [516170]\n- [md] dm-mpath: propagate target errors immediately (Mike Snitzer) [516170]\n- [scsi] Correctly handle thin provisioning write error (Mike Snitzer) [516170]\n- [md] dm-mpath: sync pushback code with upstream (Mike Snitzer) [516170]\n- [scsi] Add detailed SCSI I/O errors (Mike Snitzer) [516170]\n- [scsi] Fix sense key MEDIUM ERROR processing and retry (Mike Snitzer) [516170]\n- [scsi] fix error propagation (Mike Snitzer) [516170]\n- [scsi] fix recovered error handling (Mike Snitzer) [516170]\n- [scsi] simplify scsi_io_completion() (Mike Snitzer) [516170]\n- [scsi] fix barrier failure and error propagation issues (Mike Snitzer) [516170]\n\n[2.6.18-289.el5]\n- [scsi] libsas: amend device gone notification in sas_deform_port (David Milburn) [742356]\n- [scsi] libsas: fix up device gone notification in sas_deform_port (David Milburn) [742356]\n- [scsi] libsas: fix loopback topology bug during discovery (David Milburn) [742356]\n- [scsi] libsas: fix SATA NCQ error (David Milburn) [742356]\n- [scsi] libsas: fix ATAPI check condition termination (David Milburn) [742356]\n- [net] fix low throughput when using vlan over bonding (Flavio Leitner) [742318]\n- [net] core/netpoll: clean skb->next before pushing it down (Flavio Leitner) [741374]\n- [net] sfc: Use MCDI RX_BAD_FCS_PKTS count as MAC rx_bad count (Michal Schmidt) [739077]\n- [md] raid5: fix raid6 resync corruption bug (Doug Ledford) [738984]\n- [scsi] scsi_lib: pause between error retries (Rob Evers) [736809]\n- [md] return an error code when we don't fail a drive (Doug Ledford) [736697]\n- [fs] nfs: update nfs4_fattr_bitmap_maxsz (Steve Dickson) [735477]\n- [net] ipv6: fix refcnt problem related to POSTDAD state (Weiping Pan) [723411]\n- [net] bnx2x: update FW to 7.0.23 (Michal Schmidt) [715383 715388 715604]\n- [scsi] bnx2i: driver update for 5.8 (Michal Schmidt) [715383 715388 715604]\n- [net] cnic: driver update for 5.8, part 2 (Michal Schmidt) [715383 715388 715604]\n- [net] bnx2x: fix undesired VLAN stripping (Michal Schmidt) [715383 715388 715604]\n- [net] bnx2x: driver update for 5.8, part 3 (Michal Schmidt) [715383 715388 715604]\n- [net] bnx2x: 57712 parity handling (Michal Schmidt) [715383 715388 715604]\n- [net] bnx2x, cnic, bnx2i: New 7.0 Firmware (Michal Schmidt) [715383 715388 715604]\n- [net] bnx2x: driver update for 5.8, part 2 (Michal Schmidt) [715383 715388 715604]\n- [net] cnic: driver update for 5.8, part 1 (Michal Schmidt) [715383 715388 715604]\n- [net] bnx2x, cnic: Disable iSCSI if DCBX negotiation succeeds (Michal Schmidt) [715383 715388 715604]\n- [net] bnx2x: driver update for 5.8, part 1 (Michal Schmidt) [715383 715388 715604]\n- [net] bnx2x: temporarily revert BCM57710 bringup fix (Michal Schmidt) [715383 715388 715604]\n- [misc] ethtool: Add 20G bit definitions (Michal Schmidt) [715383 715388 715604]\ninclude (Dean Nelson) [714318]\n- [net] ixgbevf: update to upstream version 2.1.0-k (Andy Gospodarek) [714317]\n- [net] e1000e: update to upstream version 1.4.4 (Andy Gospodarek) [714315]\n- [net] bna: Multiple Definition and Interface Setup Fix (Ivan Vecera) [714019]\n- [net] bna: Driver Version changed to 3.0.2.2 (Ivan Vecera) [714019]\n- [net] bna: Add Callback to Fix RXQ Stop (Ivan Vecera) [714019]\n- [net] bna: PLL Init Fix and Add Stats Attributes (Ivan Vecera) [714019]\n- [net] bna: Brocade 1860 HW Enablement (Ivan Vecera) [714019]\n- [net] bna: new firmware for new hardware (Ivan Vecera) [714019]\n- [net] bna: Implement FW Download for New HW (Ivan Vecera) [714019]\n- [net] bna: Capability Map and MFG Block Changes for New HW (Ivan Vecera) [714019]\n- [net] bna: Brocade 1860 IOC PLL, Reg Defs and ASIC Mode Changes (Ivan Vecera) [714019]\n- [net] bna: PCI Probe Conf Lock Fix (Ivan Vecera) [714019]\n- [net] bna: Semaphore Lock Fix (Ivan Vecera) [714019]\n- [net] bna: Set Ring Param Fix (Ivan Vecera) [714019]\n- [net] bna: Eliminate Small Race Condition Window in RX Path (Ivan Vecera) [714019]\n- [net] bna: make function tables cont (Ivan Vecera) [714019]\n- [net] bna: Driver Version changed to 3.0.2.1 (Ivan Vecera) [714019]\n- [net] bna: MBOX IRQ Flag Check after Locking (Ivan Vecera) [714019]\n- [net] bna: Initialization and Locking Fix (Ivan Vecera) [714019]\n- [net] bna: Ethtool Enhancements and Fix (Ivan Vecera) [714019]\n- [net] bna: Async Mode Tx Rx Init Fix (Ivan Vecera) [714019]\n- [net] bna: Formatting and Code Cleanup (Ivan Vecera) [714019]\n- [net] bna: TX Path and RX Path Changes (Ivan Vecera) [714019]\n- [net] bna: Interrupt Polling and NAPI Init Changes (Ivan Vecera) [714019]\n- [net] bna: PCI Probe Fix (Ivan Vecera) [714019]\n- [net] bna: Naming Change and Minor Macro Fix (Ivan Vecera) [714019]\n- [net] bna: off by one in bfa_msgq_rspq_pi_update() (Ivan Vecera) [714019]\n- [net] bna: unlock on error path in pnad_pci_probe() (Ivan Vecera) [714019]\n- [net] bna: Driver Version changed to 3.0.2.0 (Ivan Vecera) [714019]\n- [net] bna: Remove Obsolete Files (Ivan Vecera) [714019]\n- [net] bna: Remove Unused Code (Ivan Vecera) [714019]\n- [net] bna: firmware update for new (v3) bna driver (Ivan Vecera) [714019]\n- [net] bna: ENET and Tx Rx Redesign Enablement (Ivan Vecera) [714019]\n- [net] bna: Add New HW Defs (Ivan Vecera) [714019]\n- [net] bna: Tx and Rx Redesign (Ivan Vecera) [714019]\n- [net] bna: Introduce ENET as New Driver and FW Interface (Ivan Vecera) [714019]\n- [net] bna: MSGQ Implementation (Ivan Vecera) [714019]\n- [net] bna: Remove Obsolete File bfi_ctreg.h (Ivan Vecera) [714019]\n- [net] bna: Consolidated HW Registers for Supported HWs (Ivan Vecera) [714019]\n- [net] bna: Remove get_regs Ethtool Support (Ivan Vecera) [714019]\n- [net] bna: HW Interface Init Update (Ivan Vecera) [714019]\n- [net] bna: Remove Unnecessary CNA Check (Ivan Vecera) [714019]\n- [net] bna: Header File Consolidation (Ivan Vecera) [714019]\n- [net] bna: HW Error Counter Fix (Ivan Vecera) [714019]\n- [net] bna: Add HW Semaphore Unlock Logic (Ivan Vecera) [714019]\n- [net] bna: IOC Event Name Change (Ivan Vecera) [714019]\n- [net] bna: Mboxq Flush When IOC Disabled (Ivan Vecera) [714019]\n- [net] bna: Minor IRQ Index and Definition Change (Ivan Vecera) [714019]\n- [net] bna: State Machine Fault Handling Cleanup (Ivan Vecera) [714019]\n- [net] bna: IOC Event Notification Enhancement (Ivan Vecera) [714019]\n- [net] bna: CheckPatch Cleanup (Ivan Vecera) [714019]\n- [net] bna: Print Driver Version (Ivan Vecera) [714019]\n- [net] bna: Separate irq type flags from request_irq variable (Ivan Vecera) [714019]\n- [net] bna: use netdev_alloc_skb_ip_align() (Ivan Vecera) [714019]\n- [net] bna: Fix bad kzalloc call with interrupts disabled (Ivan Vecera) [714019]\n- [net] bna: Remove casts of void * (Ivan Vecera) [714019]\n- [net] bna: fix warning bfa_ioc_smem_pgoff defined but not used (Ivan Vecera) [714019]\n- [net] bna: Fix set-but-unused variables (Ivan Vecera) [714019]\n- [net] bna: convert to hw_features (Ivan Vecera) [714019]\n- [scsi] bfa: update firmware to version 3.0.2.2 (Rob Evers) [714017]\n- [scsi] bfa: Update the driver version to 3.0.2.2 (Rob Evers) [714017]\n- [scsi] bfa: Add support to store driver configuration in flash (Rob Evers) [714017]\n- [scsi] bfa: Added support to configure QOS and collect stats (Rob Evers) [714017]\n- [scsi] bfa: Added support to collect and reset fcport stats (Rob Evers) [714017]\n- [scsi] bfa: Add support for IO profiling (Rob Evers) [714017]\n- [scsi] bfa: Check supported speed based on port mode (Rob Evers) [714017]\n- [scsi] bfa: Update RME interrupt handling (Rob Evers) [714017]\n- [scsi] bfa: Add FC-transport Async Event Notification support (Rob Evers) [714017]\n- [scsi] bfa: Update the driver version to 3.0.2.1 (Rob Evers) [714017]\n- [scsi] bfa: Driver enhancements (Rob Evers) [714017]\n- [scsi] bfa: Added support to query PHY (Rob Evers) [714017]\n- [scsi] bfa: Added HBA diagnostics support (Rob Evers) [714017]\n- [scsi] bfa: Added support for flash configuration (Rob Evers) [714017]\n- [scsi] bfa: Added support to obtain SFP info (Rob Evers) [714017]\n- [scsi] bfa: Added support for CEE info and stats query (Rob Evers) [714017]\n- [scsi] bfa: Add IOCFC enable cbfn and stats changes (Rob Evers) [714017]\n- [scsi] bfa: FCS bug fixes (Rob Evers) [714017]\n- [scsi] bfa: DMA memory allocation enhancement (Rob Evers) [714017]\n- [scsi] bfa: Brocade-1860 Fabric Adapter vHBA support (Rob Evers) [714017]\n- [scsi] bfa: Brocade-1860 Fabric Adapter PLL init fixes (Rob Evers) [714017]\n- [scsi] bfa: Added Fabric Assigned Address(FAA) support (Rob Evers) [714017]\n- [scsi] bfa: IOC bug fixes (Rob Evers) [714017]\n- [scsi] bfa: Enable ASIC block configuration and query (Rob Evers) [714017]\n- [scsi] bfa: Update the driver version to 3.0.2.0 (Rob Evers) [714017]\n- [scsi] bfa: Driver initialization and model description fix (Rob Evers) [714017]\n- [scsi] bfa: Enhancement for fcpim and IO tag handling (Rob Evers) [714017]\n- [scsi] bfa: FC credit recovery and misc bug fixes (Rob Evers) [714017]\n- [scsi] bfa: 1860 Adapter 16Gbs support and flash controller fixes (Rob Evers) [714017]\n- [scsi] bfa: IOC and PLL init changes for Brocade-1860 Adapter (Rob Evers) [714017]\n- [scsi] bfa: support vport disable and enable operations (Rob Evers) [714017]\n- [scsi] bfa: Brocade-1860 Fabric Adapter Hardware Enablement (Rob Evers) [714017]\n- [scsi] bfa: Add pbc port disable check and fix LPS message name (Rob Evers) [714017]\n- [scsi] bfa: Introduce IOC event notification mechanism (Rob Evers) [714017]\n- [scsi] bfa: add generic address len pair for DMA memory chunk (Rob Evers) [714017]\n- [scsi] bfa: Move debugfs initialization before bfa init (Rob Evers) [714017]\n- [net] cxgb4: driver update for RHEL5.8 (Neil Horman) [713905]\n- [net] enic: update driver to version 2.1.1.24 (Stefan Assmann) [713536]\n- [edac] i7300_edac: Fix error cleanup logic (Mauro Carvalho Chehab) [712948]\n- [usb] input/hid: backport hidraw support (Aristeu Rozanski) [705453]\n- [fs] eventpoll: fix epoll_wait overly constraining wait times (Jason Baron) [705138]\n- [md] update superblocks properly when adding a spare (Doug Ledford) [668529]\n- [scsi] Fix out of spec CD-ROM problem with media change (Don Zickus) [664653]\n- [net] sctp: encode PROTOCOL VIOLATION error cause correctly (Thomas Graf) [636828]\n- [xen] vmx: Print advanced features during boot (Paolo Bonzini) [712440]\n\n[2.6.18-288.el5]\n- [scsi] mpt2sas: Bump version 09.100.00.00 (Tomas Henzl) [717581]\n- [scsi] mpt2sas: add missing mpt2sas_base_detach to scsih_remove (Tomas Henzl) [717581]\n- [scsi] mpt2sas: fix WarpDrive Infinite command retries on bad cmd (Tomas Henzl) [717581]\n- [scsi] mpt2sas: Adding support for customer specific branding (Tomas Henzl) [717581]\n- [scsi] mpt2sas: set DID_NO_CONNECT on remove and avoid shutdown (Tomas Henzl) [717581]\n- [scsi] mpt2sas: fix broadcast AEN and task management issue (Tomas Henzl) [717581]\n- [scsi] mpt2sas: Set max_sector count from module parameter (Tomas Henzl) [717581]\n- [scsi] mpt2sas: MPI next revision header update (Tomas Henzl) [717581]\n- [scsi] mpt2sas: Fixed Big Endian Issues on 32 bit PPC (Tomas Henzl) [717581]\n- [scsi] mpt2sas: do not check serial_number in the abort handler (Tomas Henzl) [717581]\n- [scsi] mpt2sas: remove flush_scheduled_work usages (Tomas Henzl) [717581]\n- [net] ipv6: Do not assign non-valid address on interface (Jiri Benc) [741511]\n- [fs] cifs: always do is_path_accessible check in cifs_mount (Jeff Layton) [738300] {CVE-2011-3363}\n- [fs] cifs: add fallback in is_path_accessible for old servers (Jeff Layton) [738300] {CVE-2011-3363}\n- [md] raid1: don't retry recovery when the last drive fails (Doug Ledford) [736693]\n- [input] evdev: disable interrupts when processing events (Don Zickus) [734900]\n- [char] tpm: Zero buffer after copying to userspace (Jiri Benc) [732631] {CVE-2011-1162}\n- [md] bitmap: fix BUG triggered due to slow devices (Doug Ledford) [725358]\n- [char] sysrq: Fix panic executing 'echo f > /proc/sysrq-trigger' (Larry Woodman) [718645]\n- [scsi] isci: fix 32-bit operation when CONFIG_HIGHMEM64G=n (David Milburn) [713904]\n- [scsi] isci: Remove reserved device IDS from isci_id_table (David Milburn) [718341]\n- [scsi] isci: fix checkpatch errors (David Milburn) [718341]\n- [scsi] isci: Device reset should request sas_phy_reset(phy, true) (David Milburn) [718341]\n- [scsi] isci: pare back error messsages (David Milburn) [718341]\n- [scsi] isci: cleanup silicon revision detection (David Milburn) [718341]\n- [scsi] isci: refactor scu_unsolicited_frame.h (David Milburn) [718341]\n- [scsi] isci: merge sata.[ch] into request.c (David Milburn) [718341]\n- [scsi] isci: kill 'get/set' macros (David Milburn) [718341]\n- [scsi] isci: retire scic_sds_ and scic_ prefixes (David Milburn) [718341]\n- [scsi] isci: unify isci_host and scic_sds_controller (David Milburn) [718341]\n- [scsi] isci: unify isci_remote_device and scic_sds_remote_device (David Milburn) [718341]\n- [scsi] isci: unify isci_port and scic_sds_port (David Milburn) [718341]\n- [scsi] isci: fix scic_sds_remote_device_terminate_requests (David Milburn) [718341]\n- [scsi] isci: unify isci_phy and scic_sds_phy (David Milburn) [718341]\n- [scsi] isci: unify isci_request and scic_sds_request (David Milburn) [718341]\n- [scsi] isci: rename / clean up scic_sds_stp_request (David Milburn) [718341]\n- [scsi] isci: preallocate requests (David Milburn) [718341]\n- [scsi] isci: combine request flags (David Milburn) [718341]\n- [scsi] isci: unify can_queue tracking on the tci_pool (David Milburn) [718341]\n- [scsi] isci: Terminate dev requests on FIS err bit rx in NCQ (David Milburn) [718341]\n- [scsi] isci: fix frame received locking (David Milburn) [718341]\n- [scsi] isci: fix buffer overflow in isci_parse_oem_parameters (David Milburn) [718341]\n- [scsi] isci: fix isci_task_execute_tmf completion (David Milburn) [718341]\n- [scsi] isci: fix support for arbitrarily large smp requests (David Milburn) [718341]\n- [scsi] isci: fix dma_unmap_sg usage (David Milburn) [718341]\n- [scsi] isci: fix smp response frame overrun (David Milburn) [718341]\n- [scsi] isci: kill device_sequence (David Milburn) [718341]\n- [scsi] isci: kill isci_remote_device_change_state() (David Milburn) [718341]\n- [scsi] isci: atomic device lookup and reference counting (David Milburn) [718341]\n- [scsi] isci: fix ssp response iu buffer size in isci_tmf (David Milburn) [718341]\n- [scsi] isci: cleanup request allocation (David Milburn) [718341]\n- [scsi] isci: cleanup/optimize queue increment macros (David Milburn) [718341]\n- [scsi] isci: cleanup tag macros (David Milburn) [718341]\n- [scsi] isci: cleanup/optimize pool implementation (David Milburn) [718341]\n- [scsi] isci: Disable link layer hang detection (David Milburn) [718341]\n- [scsi] isci: Hard reset failure link resets all phys in the port (David Milburn) [718341]\n- [scsi] isci: decode remote node ready and suspended states (David Milburn) [718341]\n- [scsi] isci: fix isci_terminate_pending() list management (David Milburn) [718341]\n- [scsi] isci: Handle timed-out request terminations correctly (David Milburn) [718341]\n- [scsi] isci: Requests that do not start must be set to complete (David Milburn) [718341]\n- [scsi] isci: Add decode for SMP request retry error condition (David Milburn) [718341]\n- [scsi] isci: filter broadcast change notifications on phy resets (David Milburn) [718341]\n- [scsi] isci: Move reset delay after remote node resumption (David Milburn) [718341]\n- [scsi] isci: remove 'min memory' infrastructure (David Milburn) [718341]\n- [scsi] isci: Added support for C0 to SCU Driver (David Milburn) [718341]\n- [scsi] isci: additional state machine cleanup (David Milburn) [718341]\n- [scsi] isci: state machine cleanup (David Milburn) [718341]\n- [scsi] isci: Removing unused variables compiler warnings (David Milburn) [718341]\n- [scsi] isci: removing the kmalloc in smp request construct (David Milburn) [718341]\n- [scsi] isci: remove isci_timer interface (David Milburn) [718341]\n- [scsi] isci: Remove tmf timeout_timer (David Milburn) [718341]\n- [scsi] isci: convert phy_startup_timer to sci_timer (David Milburn) [718341]\n- [scsi] isci: convert scic_timeout_timer to sci_timer (David Milburn) [718341]\n- [scsi] isci: convert power control timer to sci_timer (David Milburn) [718341]\n- [scsi] isci: convert phy sata_timeout_timer to sci_timer (David Milburn) [718341]\n- [scsi] isci: convert port config agent timer to sci_timer (David Milburn) [718341]\n- [scsi] isci: replace isci_timer list with proper embedded timers (David Milburn) [718341]\n- [scsi] isci: add some type safety to the state machine interface (David Milburn) [718341]\n- [scsi] isci: unify rnc start{io|task} handlers (David Milburn) [718341]\n- [scsi] isci: unify rnc destruct handlers (David Milburn) [718341]\n- [scsi] isci: unify rnc destruct handlers (David Milburn) [718341]\n- [scsi] isci: unify rnc event handlers (David Milburn) [718341]\n- [scsi] isci: unify port start_io and complete_io handlers (David Milburn) [718341]\n- [scsi] isci: unify port link_up and link_down handlers (David Milburn) [718341]\n- [scsi] isci: remove port frame and event handlers (David Milburn) [718341]\n- [scsi] isci: unify port reset, add_phy, and remove_phy handlers (David Milburn) [718341]\n- [scsi] isci: remove port destruct handler (David Milburn) [718341]\n- [scsi] isci: unify port stop handlers (David Milburn) [718341]\n- [scsi] isci: remove port start handler (David Milburn) [718341]\n- [scsi] isci: merge port ready substates into main state machine (David Milburn) [718341]\n- [scsi] isci: c99 port state handlers (David Milburn) [718341]\n- [scsi] isci: clarify phy to port lookups (David Milburn) [718341]\n- [scsi] isci: unify phy consume_power handlers (David Milburn) [718341]\n- [scsi] isci: unify phy event handlers (David Milburn) [718341]\n- [scsi] isci: unify phy frame handlers (David Milburn) [718341]\n- [scsi] isci: remove phy destruct handlers (David Milburn) [718341]\n- [scsi] isci: unify phy reset handlers (David Milburn) [718341]\n- [scsi] isci: unify phy stop handlers (David Milburn) [718341]\n- [scsi] isci: unify phy start handlers (David Milburn) [718341]\n- [scsi] isci: merge phy substates (David Milburn) [718341]\n- [scsi] isci: remove the completion and event state handlers (David Milburn) [718341]\n- [scsi] isci: remove request task context completion state handler (David Milburn) [718341]\n- [scsi] isci: unify request frame handlers (David Milburn) [718341]\n- [scsi] isci: unify request start handlers (David Milburn) [718341]\n- [scsi] isci: unify request abort handlers (David Milburn) [718341]\n- [scsi] isci: merge stp req substates into primary state machine (David Milburn) [718341]\n- [scsi] isci: merge smp req substates into primary state machine (David Milburn) [718341]\n- [scsi] isci: merge stp req substates into primary state machine (David Milburn) [718341]\n- [scsi] isci: uplevel port infrastructure (David Milburn) [718341]\n- [scsi] isci: uplevel phy infrastructure (David Milburn) [718341]\n- [scsi] isci: uplevel request infrastructure (David Milburn) [718341]\n- [scsi] isci: uplevel state machine (David Milburn) [718341]\n- [scsi] isci: uplevel reg hw data structs and frame handling (David Milburn) [718341]\n- [scsi] isci: move core/controller to host (David Milburn) [718341]\n- [scsi] isci: unify constants (David Milburn) [718341]\n- [scsi] isci: unify request data structures (David Milburn) [718341]\n- [scsi] isci: make command/response iu explicit req object members (David Milburn) [718341]\n- [scsi] isci: move task context alignment to compile time (David Milburn) [718341]\n- [scsi] isci: make sgl explicit/aligned request object member (David Milburn) [718341]\n- [scsi] isci: move stp request info to scic_sds_request (David Milburn) [718341]\n- [scsi] isci: unify phy data structures (David Milburn) [718341]\n- [scsi] isci: unify phy data structures (David Milburn) [718341]\n- [scsi] isci: rnc state machine table c99 conversion (David Milburn) [718341]\n- [scsi] isci: remove scic_sds_port_increment_request_count (David Milburn) [718341]\n- [scsi] isci: kill scic_controller_get_port_handle function (David Milburn) [718341]\n- [scsi] isci: Removing unnecessary functions in request.c (David Milburn) [718341]\n- [scsi] isci: unify isci_host data structures (David Milburn) [718341]\n- [scsi] isci: implement I_T_nexus_reset (David Milburn) [718341]\n- [scsi] isci: fix ata locking (David Milburn) [718341]\n- [scsi] isci: removing intel_*.h headers (David Milburn) [718341]\n- [scsi] isci: Using Linux SSP frame header (David Milburn) [718341]\n- [scsi] isci: Remove SCIC_SWAP_DWORD() (David Milburn) [718341]\n- [scsi] isci: fixup SAS iaf protocols data structure (David Milburn) [718341]\n- [scsi] isci: remove redundant copies of IAF (David Milburn) [718341]\n- [scsi] isci: Converting smp_response to Linux native smp_resp (David Milburn) [718341]\n- [scsi] isci: Fixup of smp request (David Milburn) [718341]\n- [scsi] isci: Convert of sci_ssp_response_iu to ssp_response_iu (David Milburn) [718341]\n- [scsi] isci: Fixup SSP command IU and task IU (David Milburn) [718341]\n- [scsi] isci: renaming sas_capabilities to scic_phy_cap (David Milburn) [718341]\n- [scsi] isci: Collapsing of phy_type data structure (David Milburn) [718341]\n- [scsi] isci: Convert SAS identify address frame to native format (David Milburn) [718341]\n- [scsi] isci: Convert ATA defines to Linux native defines (David Milburn) [718341]\n- [scsi] isci: Convert SATA fis data structures to Linux native (David Milburn) [718341]\n- [scsi] isci: remove compile-time (Kconfig) silicon configuration (David Milburn) [718341]\n- [scsi] isci: Removing unused define SCIC_SDS_4_ENABLED (David Milburn) [718341]\n- [scsi] isci: kill scic_sds_remote_device.state_handlers (David Milburn) [718341]\n- [scsi] isci: unify remote_device frame_handlers (David Milburn) [718341]\n- [scsi] isci: unify remote_device event_handlers (David Milburn) [718341]\n- [scsi] isci: kill remote_device resume_handler (David Milburn) [718341]\n- [scsi] isci: unify remote_device suspend_handlers (David Milburn) [718341]\n- [scsi] isci: kill remote_device complete_task_handler (David Milburn) [718341]\n- [scsi] isci: unify remote_device start_task_handlers (David Milburn) [718341]\n- [scsi] isci: kill remote_device continue_io_handler (David Milburn) [718341]\n- [scsi] isci: unify remote_device complete_io_handlers (David Milburn) [718341]\n- [scsi] isci: unify remote_device start_io_handlers (David Milburn) [718341]\n- [scsi] isci: unify remote_device reset_complete_handlers (David Milburn) [718341]\n- [scsi] isci: unify remote_device reset_handlers (David Milburn) [718341]\n- [scsi] isci: unify remote_device destruct_handlers (David Milburn) [718341]\n- [scsi] isci: kill remote_device fail_handler (David Milburn) [718341]\n- [scsi] isci: unify remote_device stop_handlers (David Milburn) [718341]\n- [scsi] isci: unify remote_device start_handlers (David Milburn) [718341]\n- [scsi] isci: fix remote_device start_io regressions (David Milburn) [718341]\n- [scsi] isci: kill scic_remote_device_get_connection_rate (David Milburn) [718341]\n- [scsi] isci: merge remote_device substates into one state machine (David Milburn) [718341]\n- [scsi] isci: Removed sci_object.h from project (David Milburn) [718341]\n- [scsi] isci: Removed sci_base_object from scic_sds_request (David Milburn) [718341]\n- [scsi] isci: no sci_base_object in scic_sds_remote_node_context (David Milburn) [718341]\n- [scsi] isci: Removed sci_base_object from scic_sds_remote_device (David Milburn) [718341]\n- [scsi] isci: Removed sci_base_object from scic_sds_port (David Milburn) [718341]\n- [scsi] isci: Removed sci_base_object from scic_sds_phy (David Milburn) [718341]\n- [scsi] isci: Removed sci_base_object from scic_sds_controller (David Milburn) [718341]\n- [scsi] isci: Removed struct sci_base_object from state machine (David Milburn) [718341]\n- [scsi] isci: Implement SCU AFE recipe 10. (David Milburn) [718341]\n- [scsi] isci: Remove excessive log noise with expander hot-unplug (David Milburn) [718341]\n- [scsi] isci: removing non-working ATAPI code (David Milburn) [718341]\n- [scsi] isci: remove scic_sds_remote_device_get_port_index (David Milburn) [718341]\n- [scsi] isci: remove sci_sas_address in scic_sds_remote_device (David Milburn) [718341]\n- [scsi] isci: kill smp_discover_response (David Milburn) [718341]\n- [scsi] isci: kill smp_discover_response_protocols (David Milburn) [718341]\n- [scsi] isci: cleanup remote device construction and comments (David Milburn) [718341]\n- [scsi] isci: move remote_device handling out of the core (David Milburn) [718341]\n- [scsi] isci: unify remote_device data structures (David Milburn) [718341]\n- [scsi] isci: remove rnc->device back pointer (David Milburn) [718341]\n- [scsi] isci: make remote_node_context member of remote_device (David Milburn) [718341]\n- [scsi] isci: rely on irq core for intx muxing, silence screamer (David Milburn) [718341]\n- [scsi] isci: give this_* and the_* vars more meaningful names (David Milburn) [718341]\n- [scsi] isci: audit usage of BUG_ON macro in isci driver (David Milburn) [718341]\n- [scsi] isci: sparse warnings cleanup (David Milburn) [718341]\n- [scsi] isci: replace sci_sas_link_rate with sas_linkrate (David Milburn) [718341]\n- [scsi] isci: remove base_phy abstraction (David Milburn) [718341]\n- [scsi] isci: remove base_port abstraction (David Milburn) [718341]\n- [scsi] isci: remove base_remote_device abstraction (David Milburn) [718341]\n- [scsi] isci: remove scic_controller state handlers (David Milburn) [718341]\n- [scsi] isci: simplify dma coherent allocation (David Milburn) [718341]\n- [scsi] isci: simplify request state handlers (David Milburn) [718341]\n- [scsi] isci: kill dead data structurs in scic_io_request.h (David Milburn) [718341]\n- [scsi] isci: remove base_request abstraction (David Milburn) [718341]\n- [scsi] isci: remove base_controller abstraction (David Milburn) [718341]\n- [misc] kernel: add BUILD_BUG_ON_NOT_POWER_OF_2 (David Milburn) [718341]\n- [misc] jiffies: add time_is_after_jiffies (David Milburn) [718341]\n- [net] igbvf: driver update for RHEL5.8 (Stefan Assmann) [714316]\n- [net] igb: driver update for RHEL5.8 (Stefan Assmann) [714313]\n- [net] qlge: Version change to v1.00.00.29 (Chad Dupuis) [714242]\n- [net] qlge: Adding LICENSE file for qlge (Chad Dupuis) [714242]\n- [net] qlge: Fix printk prio so fatal errors always reported (Chad Dupuis) [714242]\n- [net] qlge: Fix crash caused by mailbox execution on wedged chip (Chad Dupuis) [714242]\n- [net] qlge: make nic_operations struct const (Chad Dupuis) [714242]\n- [net] qlge: Fix incorrect use of modparams and netdev msg level (Chad Dupuis) [714242]\n- [net] qlge: Remove unnecessary casts of netdev_priv (Chad Dupuis) [714242]\n- [net] qlge: Generate the coredump to ethtool user buffer (Chad Dupuis) [714242]\n- [net] qlcnic: Change CDRP function (Chad Dupuis) [714232]\n- [net] qlcnic: Added error logging for firmware abort (Chad Dupuis) [714232]\n- [net] qlcnic: add beacon test support (Chad Dupuis) [714232]\n- [net] qlcnic: fix cdrp race condition (Chad Dupuis) [714232]\n- [net] qlcnic: Change debug messages in loopback path (Chad Dupuis) [714232]\n- [net] qlcnic: Add FLT entry for CO cards FW image region (Chad Dupuis) [714232]\n- [net] qlcnic: detect fan failure (Chad Dupuis) [714232]\n- [net] qlcnic: Add NETIF_F_VLAN_SG flag (Chad Dupuis) [714232]\n- [net] qlcnic: fix ethtool link status (Chad Dupuis) [714232]\n- [net] qlcnic: Added debug info (Chad Dupuis) [714232]\n- [net] qlcnic: Move get template from probe to start fw (Chad Dupuis) [714232]\n- [net] qlcnic: Fix delay in reset path (Chad Dupuis) [714232]\n- [net] qlcnic: FW dump related changes (Chad Dupuis) [714232]\n- [net] qlcnic: Fix env var for udev event during FW dump (Chad Dupuis) [714232]\n- [net] qlcnic: change capture mask for FW dump (Chad Dupuis) [714232]\n- [net] qlcnic: define error code for loopback test (Chad Dupuis) [714232]\n- [net] qlcnic: fix race in skb->len access (Chad Dupuis) [714232]\n- [net] qlcnic: enable mac-learning in promiscous mode (Chad Dupuis) [714232]\n- [net] qlcnic: updated supported cards information (Chad Dupuis) [714232]\n- [net] qlcnic: fix chip reset logic (Chad Dupuis) [714232]\n- [net] qlcnic: add external loopback support through sysfs (Chad Dupuis) [714232]\n- [net] qlcnic: multi protocol internal loopback support added (Chad Dupuis) [714232]\n- [net] qlcnic: Add support to enable/disable FW dump capability (Chad Dupuis) [714232]\n- [net] qlcnic: fix default operating state of interface (Chad Dupuis) [714232]\n- [net] qlcnic: fix initial number of msix entries in adapter (Chad Dupuis) [714232]\n- [net] qlcnic: Add code to tune FW dump (Chad Dupuis) [714232]\n- [net] qlcnic: Remove holding api lock while taking the dump (Chad Dupuis) [714232]\n- [net] qlcnic: Add capability to take FW dump deterministically (Chad Dupuis) [714232]\n- [net] qlcnic: Added sysfs node support (Chad Dupuis) [714232]\n- [net] qlcnic: Remove casts of void * (Chad Dupuis) [714232]\n- [net] qlcnic: Avoid double free of skb in tx path (Chad Dupuis) [714232]\n- [net] qlcnic: Fix bug in FW queue dump (Chad Dupuis) [714232]\n- [net] qlcnic: Bumped up version number to 5.0.18 (Chad Dupuis) [714232]\n- [net] qlcnic: FW dump support (Chad Dupuis) [714232]\n- [net] qlcnic: Support for GBE port settings (Chad Dupuis) [714232]\n- [net] qlcnic: configure number of RSS rings using sysfs (Chad Dupuis) [714232]\n- [net] qlcnic: Update version number to 5.0.16 (Chad Dupuis) [714232]\n- [net] qlcnic: Fix LRO disable (Chad Dupuis) [714232]\n- [net] qlcnic: Use flt method to determine flash fw region (Chad Dupuis) [714232]\n- [net] qlcnic: Remove unused code (Chad Dupuis) [714232]\n- [net] qlcnic: Code optimization patch (Chad Dupuis) [714232]\n- [net] qlcnic: Cleanup patch (Chad Dupuis) [714232]\n- [net] qlcnic: Memory leak fix (Chad Dupuis) [714232]\n- [net] qlcnic: Make PCI info available in all modes (Chad Dupuis) [714232]\n- [misc] Add rounddown_pow_of_two routine to log2.h (Chad Dupuis) [714232]\n- [pci] add latency tolerance reporting enable/disable support (Myron Stowe) [714171]\n- [pci] Assign values to pci_obff_signal_type enumeration (Myron Stowe) [714171]\n- [pci] add OBFF enable/disable support (Myron Stowe) [714171]\n- [pci] add ID-based ordering enable/disable support (Myron Stowe) [714171]\n- [pci] introduce pci_is_pcie (Myron Stowe) [714171]\n- [pci] introduce pci_pcie_cap (Myron Stowe) [714171]\n- [sound] hda: ALSA Panther Point Audio Support (Jaroslav Kysela) [713663]\n- [sound] hda: Enable snoop bit for AMD controllers (Jaroslav Kysela) [713366]\n- [fs] hfs: fix hfs_find_init() sb->ext_tree NULL ptr oops (Phillip Lougher) [712776]\n- [fs] nfs: return error in callback if encode/decode fails (Dave Wysochanski) [709515]\n- [net] tcp: Shrink syncookie_secret by 8 bytes (Thomas Graf) [705484]\n- [scsi] device_handler: Attach to UNAVAILABLE/OFFLINE AAS devices (Mike Christie) [700082]\n- [net] cxgb3: Apply interrupt coalescing settings to all queues (Neil Horman) [694583]\n- [mm] page-writeback: fix calculation of oldest_jif in wb_kupdate (Jarod Wilson) [691087]\n- [block] nbd: add a user-settable timeout for I/O (Jeff Moyer) [676491]\n- [net] ipv6: ignore looped-back NA while dad is running (Thomas Graf) [668027]\n- [net] sctp: Set correct error cause value for missing parameters (Thomas Graf) [629938]\n- [net] Prevent pktgen from sending shared skbs (Neil Horman) [575938]\n- [md] raid10: fix far resync data corruptor (Doug Ledford) [468379]\n- [xen] x86: Clear IRQ_GUEST when setting action to NULL (Igor Mammedov) [713221]\n- [xen] x86: check for NULL desc->action when unbinding guest pirq (Igor Mammedov) [713221]\n- [xen] x86: fix msi_free_irq (Igor Mammedov) [713221]\n- [xen] x86: teardown_msi_irq is not needed (Igor Mammedov) [713221]\n- [xen] x86: irq removal rewrite (Igor Mammedov) [713221]\n- [xen] x86: Move interrupt vector management to irq.c (Igor Mammedov) [713221]\n\n[2.6.18-287.el5]\n- [parport] Enable StarTech PEX1P Parallel Port (Prarit Bhargava) [739758]\n- [crypto] padlock: Fix spurious ECB page fault (Milan Broz) [739468]\n- [fs] gfs2: speed up large file delete/unlink (Robert S Peterson) [738440]\n- [virt] xen: don't hardcode is_running_on_xen for PV-on-HVM (Laszlo Ersek) [734708]\n- [s390] kernel: remove code to handle topology interrupts (Hendrik Brueckner) [732736]\n- [net] cxgb3: Fix NULL pointer dereference in t3_l2t_get (Neil Horman) [721173]\n- [misc] kernel: plug taskstats io infoleak (Jerome Marchand) [716846] {CVE-2011-2494}\n- [x86_64] io_apic: only scan the root bus in early PCI quirks (Dave Maley) [716552]\n- [net] bnx2: Update to latest upstream version 2.1.11 (Neil Horman) [715392]\n- [usb] Make device reset stop retrying after disconnect (Don Zickus) [709699]\n- [acpi] Call _PDC before retrieving CPU information (Matthew Garrett) [707642]\n- [net] tg3: Fix io failures after chip reset (John Feeney) [702346 731098]\n- [net] ipv6: properly use ICMP6MSGOUT_INC_STATS in ndisc_send_skb (Jiri Pirko) [698728]\n- [net] sctp: Mark tsn as received after all allocations finish (Max Matveev) [696430]\n- [scsi] Reduce error recovery time by reducing use of TURs (Mike Christie) [694625]\n- [scsi] don't fail scans when host is in recovery (Rob Evers) [657345]\n- [video] radeonfb: block use of low refresh 800x600-43 on pseries (Dave Airlie) [638576]\n\n[2.6.18-286.el5]\n- [net] benet: Add missing comma between constant string array (Ivan Vecera) [714291]\n- [net] be2net: create/destroy rx-queues on interface open/close (Ivan Vecera) [714291]\n- [net] be2net: fix initialization of vlan_prio_bmap (Ivan Vecera) [714291]\n- [net] be2net: Remove casts of void pointers (Ivan Vecera) [714291]\n- [net] be2net: Fix Rx pause counter for lancer (Ivan Vecera) [714291]\n- [net] be2net: use older opcode if MCC_CREATE_EXT not supported (Ivan Vecera) [714291]\n- [net] be2net: fix set but unused var in lancer_fw_download (Ivan Vecera) [714291]\n- [net] be2net: Enable SR-IOV for Lancer hardware (Ivan Vecera) [714291]\n- [net] be2net: FW download for Lancer hardware (Ivan Vecera) [714291]\n- [net] be2net: implement stats for Lancer hardware (Ivan Vecera) [714291]\n- [net] be2net: Support for version 1 of stats for BE3 (Ivan Vecera) [714291]\n- [net] be2net: fix mbox polling for signal reception (Ivan Vecera) [714291]\n- [net] be2net: handle signal reception while waiting for POST (Ivan Vecera) [714291]\n- [net] be2net: Fix to prevent flooding of TX queue (Ivan Vecera) [714291]\n- [net] be2net: In case of UE, do not dump registers for Lancer (Ivan Vecera) [714291]\n- [net] be2net: Disable coalesce water mark mode of CQ for Lancer (Ivan Vecera) [714291]\n- [net] be2net: Handle error completion in Lancer (Ivan Vecera) [714291]\n- [net] be2net: fix bugs related to PVID (Ivan Vecera) [714291]\n- [net] be2net: fix wrb reuse and misc bugs in be_cmd_get_regs (Ivan Vecera) [714291]\n- [net] be2net: pass domain id to be_cmd_link_status_query (Ivan Vecera) [714291]\n- [net] be2net: fix be_mcc_compl_process to id eth_get_stat command (Ivan Vecera) [714291]\n- [net] be2net: display nic speeds other than 1Gbps/10Gbps (Ivan Vecera) [714291]\n- [net] be2net: allow register dump only for PFs (Ivan Vecera) [714291]\n- [net] be2net: Fix unused-but-set variables (Ivan Vecera) [714291]\n- [net] be2net: Use netdev_alloc_skb_ip_align (Ivan Vecera) [714291]\n- [net] be2net: call FLR after setup wol in be_shutdown (Ivan Vecera) [714291]\n- [net] be2net: dynamically allocate adapter->vf_cfg (Ivan Vecera) [714291]\n- [net] be2net: fix to get max VFs supported from adapter (Ivan Vecera) [714291]\n- [net] be2net: use common method to check for sriov function type (Ivan Vecera) [714291]\n- [net] be2net: Fix a potential crash during shutdown (Ivan Vecera) [714291]\n- [net] be2net: remove one useless line (Ivan Vecera) [714291]\n- [net] be2net: cancel be_worker on shutdown even when i/f is down (Ivan Vecera) [714291]\n- [net] be2net: remove redundant code in be_worker (Ivan Vecera) [714291]\n- [net] be2net: parse vid/vtm rx-compl fields only if vlanf bit set (Ivan Vecera) [714291]\n- [net] be2net: refactor code that decides adapter->num_rx_queues (Ivan Vecera) [714291]\n- [net] be2net: add ethtool FAT dump retrieval support (Ivan Vecera) [714291]\n- [mm] s390: fix first time swap use results in heavy swapping (Hendrik Brueckner) [722482]\n- [mm] fix rotate_reclaimable_page deadlock and clean up (Jerome Marchand) [699549]\n\n[2.6.18-285.el5]\n- [ata] ahci: Add missing Panther Point SATA RAID DeviceID (Prarit Bhargava) [735369]\n- [scsi] megaraid: remove obsolete megaraid_sas.c (Tomas Henzl) [735120]\n- [net] Compute protocol seq numbers and fragment IDs using MD5 (Jiri Pirko) [732663]\n- [crypto] Move md5_transform to lib/md5.c (Jiri Pirko) [732663]\n- [s390] kernel: fix NSS creation with initrd (Hendrik Brueckner) [730779]\n- [virt] xen: fix GFP mask handling in dma_alloc_coherent (Laszlo Ersek) [730247]\n- [fs] nfs: Fix client not honoring nosharecache mount option (David Jeffery) [730097]\n- [pci] check pm support before looking at individual power states (Stefan Assmann) [716834]\n- [mm] avoid wrapping vm_pgoff in mremap and stack expansion (Jerome Marchand) [716544] {CVE-2011-2496}\n- [md] bitmap: protect against bitmap removal while being updated (Stanislaw Gruszka) [711536]\n- [scsi] scsi_dh_rdac: link HBA and storage to support partitions (Mike Snitzer) [710014]\n- [scsi] scsi_dh_rdac: use WWID from C8 page to identify storage (Mike Snitzer) [710014]\n- [x86] nmi: make NMI_NONE default watchdog in x86_64 hvm guests (Laszlo Ersek) [707966]\n- [mm] Fix incorrect off-by-one centisec dirty values (Larry Woodman) [691087]\n- [net] bnx2x: fix bringup of BCM57710 (Michal Schmidt) [680411]\n- [fs] ext{2,3}: fix file date underflow on fs on 64 bit systems (Eric Sandeen) [655174]\n- [xen] fix nodes' memory parsing with future-hotplug memory range (Laszlo Ersek) [543064]\n\n[2.6.18-284.el5]\n- [net] be2net: request native mode each time the card is reset (Ivan Vecera) [720501]\n- [net] be2net: fix the ethtool op to set Tx CSUM (Ivan Vecera) [718187]\n- [net] be2net: remove bogus unlikely on vlan check (Ivan Vecera) [730239]\n- [net] be2net: non-member vlan pkts not received in promisc mode (Ivan Vecera) [730239]\n- [net] be2net: Use NTWK_RX_FILTER command for promiscous mode (Ivan Vecera) [730239]\n- [net] be2net: fix crash receiving non-member VLAN packets (Ivan Vecera) [730239]\n- [virt] xen/netfront: no disable s/g when renegotiating features (Paolo Bonzini) [733416]\n- [fs] ecryptfs: Add mount option to check uid of mounting device (Eric Sandeen) [731174] {CVE-2011-1833}\n- [s390] kernel: fix system hang if hangcheck timer expires (Hendrik Brueckner) [730313]\n- [s390] qeth: fix wrong number of output queues for HiperSockets (Hendrik Brueckner) [730319]\n- [scsi] qla2xxx: Re-add checks for null fcport references (Chad Dupuis) [728219]\n- [fs] aio: fix aio+dio completion path regression w/3rd-party bits (Jeff Moyer) [727504]\n- [net] ipv6: make fragment identifications less predictable (Jiri Pirko) [723431]\n- [net] ipv6: Remove unused skb argument of ipv6_select_ident (Jiri Pirko) [723431]\n- [s390] dasd: fix bug in dasd initialization cleanup (Hendrik Brueckner) [723491]\n- [virt] xen: attach host CD-ROM to PV guest as vbd (Laszlo Ersek) [717434]\n- [misc] taskstats: don't allow duplicate entries in listener mode (Jerome Marchand) [715450] {CVE-2011-2484}\n- [scsi] ipr: bump the version number (Steve Best) [714258]\n- [scsi] ipr: remove unneeded volatile declarations (Steve Best) [714258]\n- [scsi] ipr: fix synchronous request flags for better performance (Steve Best) [714258]\n- [scsi] ipr: fix buffer overflow (Steve Best) [714258]\n- [s390] qdio: reset error states immediately (Hendrik Brueckner) [709712]\n- [usb] fix interface sysfs file-creation bug (Don Zickus) [637930]\n- [usb] don't touch sysfs stuff when altsetting is unchanged (Don Zickus) [637930]\n- [base] Fix potential deadlock in driver core (Don Zickus) [637930]\n- [virt] xen: more informative messages after resize (Laszlo Ersek) [618317]\n- [virt] xen: support online dynamic resize of guest virtual disks (Laszlo Ersek) [618317]\n- [virt] xen: Move definition of struct backend_info to common spot (Laszlo Ersek) [618317]\n- [net] bonding: fix panic if initialization fails (Andy Gospodarek) [608156]\n- [net] gro: Only reset frag0 when skb can be pulled (Herbert Xu) [679682] {CVE-2011-2723}\n- [net] sctp: fix memory reclaim and panic in sctp_sock_rfree (Thomas Graf) [714870] {CVE-2011-2482}\n- [xen] lower BOOT_TRAMPOLINE, sync early stack & trampoline_gdt (Laszlo Ersek) [716788]\n- [xen] x86_64: bump default NR_CPUS to 256 and trim debug log spam (Laszlo Ersek) [714053]\n- [xen] passthrough: block VT-d MSI trap injection (Paolo Bonzini) [716302]\n- [xen] hvm/svm: fix task switch (Paolo Bonzini) [720936]\n- [xen] hvm: exclude VMX_PROCBASED_CTL2 from MSRs guest can access (Paolo Bonzini) [732752]\n- [xen] iommu: disable bus-mastering on hw that causes IOMMU fault (Laszlo Ersek) [730343] {CVE-2011-3131}\n- [xen] x86_emulate: Fix SAHF emulation (Igor Mammedov) [718884] {CVE-2011-2519}\n- [xen] fix off-by-one shift in x86_64 __addr_ok (Laszlo Ersek) [719850] {CVE-2011-2901}\n\n[2.6.18-283.el5]\n- [fs] nfsd: don't allow fl_break callback to sleep (Jeff Layton) [721200]\n- [fs] locks: move lease lock alloc earlier in generic_setlease (Jeff Layton) [721200]\n- [fs] locks: when unlocking lease, skip locking-related steps (Jeff Layton) [721200]\n- [fs] locks: fix a lease return-value mixup (Jeff Layton) [721200]\n- [fs] locks: Fix potential OOPS in generic_setlease (Jeff Layton) [721200]\n- [usb] auerswald: fix buffer overflow (Don Zickus) [722396] {CVE-2009-4067}\n- [fs] cifs: fix possible memory corruption in CIFSFindNext (Jeff Layton) [732471]\n- [fs] cifs: revert special handling for matching krb5 sessions (Jeff Layton) [697396]\n- [fs] cifs: check for NULL session password (Jeff Layton) [697396]\n- [fs] cifs: fix NULL pointer dereference in cifs_find_smb_ses (Jeff Layton) [697396]\n- [fs] cifs: clean up cifs_find_smb_ses (Jeff Layton) [697396]\n- [net] be2net: account for skb allocation failures (Ivan Vecera) [730108]\n- [fs] mbcache: Limit the maximum number of cache entries (Eric Sandeen) [729261]\n- [net] bnx2x: downgrade Max BW error message to debug (Michal Schmidt) [727614]\n- [net] sock: do not change prot->obj_size (Jiri Pirko) [725713]\n- [net] be2net: Fix Tx stall issue (Ivan Vecera) [722549]\n- [net] be2net: rx-dropped wraparound fix (Ivan Vecera) [722302]\n- [net] be2net: fix netdev_stats_update (Ivan Vecera) [722302]\n- [net] bonding: make 802.3ad use latest lacp_rate (Jiri Pirko) [718641]\n- [net] bonding: Rename rx_machine_lock to state_machine_lock (Jiri Pirko) [718641]\n- [net] bonding: Fix 802.3ad state machine locking (Jiri Pirko) [718641]\n- [net] bonding: add missing xmit_hash_policy=layer2+3 info (Weiping Pan) [717850]\n- [powerpc] eeh: Display eeh error location for bus and device (Steve Best) [712418]\n- [powerpc] eeh: Handle functional reset on non-PCIe device (Steve Best) [712418]\n- [powerpc] eeh: Propagate needs_freset flag to device at PE (Steve Best) [712418]\n- [powerpc] eeh: Add support for ibm, configure-pe RTAS call (Steve Best) [712418]\n- [fs] cifs: don't allow cifs_reconnect exit w/NULL socket pointer (Jeff Layton) [704921]\n- [fs] cifs: clarify the meaning of tcpStatus == CifsGood (Jeff Layton) [704921]\n- [fs] cifs: split posix open/mkdir from legacy mkdir in stats (Jeff Layton) [706339]\n- [virt] xen: plug leaks in netfront::setup_device (Laszlo Ersek) [703150]\n- [virt] xen: ensure dynamic IRQ allocation success (Laszlo Ersek) [703150]\n- [net] vlan: correct pkt_type if it matches changed mac (Weiping Pan) [698928]\n- [virt] xen: Allow arbitrary mtu size until frontend connected (Paolo Bonzini) [697021]\n- [fs] proc: Fix procfs race vs rmmod or hot-remove (David Howells) [675781]\n- [virt] xen: empty stale MSI-X vector set when resetting device (Laszlo Ersek) [688673]\n- [virt] xen: msi cleanup after destroyed domain (Laszlo Ersek) [688673]\n- [xen] unsigned int corrections (Laszlo Ersek) [648596]\n\n[2.6.18-282.el5]\n- Fix infrastructure error that led to recent xen patches not applying\n\n[2.6.18-281.el5]\n- Bump NVR due to buildsystem problems during prior build\n\n[2.6.18-280.el5]\n- Revert: [virt] xen/netback: Remove auto/premature netif queue (Jarod Wilson) [714283]\n\n[2.6.18-279.el5]\n- [char] tpm: Fix uninitialized usage of data buffer (Stanislaw Gruszka) [684673] {CVE-2011-1160}\n- [serial] 8250: Fix capabilities when changing the port type (Steve Best) [707051]\n- [serial] 8250_pci: EEH support for IBM/Digi PCIe 2-port Adapter (Steve Best) [707051]\n- [serial] 8250_pci: add support for Digi/IBM PCIe 2-port Adapter (Steve Best) [707051]\n- [misc] hypervisor: fix race in interrupt hook code (Prarit Bhargava) [692966]\n- [sound] alsa: enable snoop for Intel Cougar Point in hda_intel (Prarit Bhargava) [699451]\n- [char] watchdog: TCO Watchdog support for Intel Panther Point PCH (Prarit Bhargava) [699451]\n- [i2c] i2c-i801: SMBus support for Intel Panther Point DeviceIDs (Prarit Bhargava) [699451]\n- [ata] ahci: AHCI mode for Intel Panther Point Device IDs (Prarit Bhargava) [699451]\n- [ata] ata_piix: IDE mode for Intel Panther Point Device IDs (Prarit Bhargava) [699451]\n- [misc] irq and pci_ids for Intel DH89xxCC DeviceIDs (Prarit Bhargava) [699451]\n- [misc] Identify IBM x3850 as multi-chassis (Prarit Bhargava) [700886]\n- [net] cnic, bnx2: Check iSCSI support early in bnx2_init_one (Neil Horman) [710272]\n- [virt] xen/netback: Remove auto/premature netif queue restart (Laszlo Ersek) [714283]\n- [fs] ext4: Fix max size and logical block counting of extent file (Lukas Czerner) [722563] {CVE-2011-2695}\n- [fs] nfs: don't use d_move in nfs_async_rename_done (Jeff Layton) [729446]\n- [fs] nfs: have nfs_flush_list issue FLUSH_SYNC writes in parallel (Jeff Layton) [728508]\n- [s390] crypto: fix prng error in initial seed calculation (Hendrik Brueckner) [709711]\n- [fs] nfsd: fix auto-sizing of nfsd request/reply buffers (J. Bruce Fields) [691927]\n- [fs] nfsd: Allow max size of NFSd payload to be configured (J. Bruce Fields) [691927]\n- [fs] nfsd: Prep knfsd to support rsize/wsize of 1MB, over TCP (J. Bruce Fields) [691927]\n- [misc] svcrpc: prepare svc_rqst for kabi-safe modification (J. Bruce Fields) [691927]\n- [xen] amd-iommu: Fix an interrupt remapping issue (Frank Arnold) [717976]\n- [xen] hvm: Fix possible guest tick losing after save/restore (Paolo Bonzini) [674663]\n- [xen] mm: fix race with ept_entry management (Andrew Jones) [729529]\n\n[2.6.18-278.el5]\n- [scsi] ipr: increase the dump size for 64 bit adapters (Steve Best) [710324]\n- [scsi] ipr: fix possible false positive detected stuck interrupt (Steve Best) [710324]\n- [scsi] ipr: improve interrupt service routine performance (Steve Best) [710324]\n- [scsi] ipr: add definitions for a new adapter (Steve Best) [710324]\n- [scsi] ipr: fix array error logging (Steve Best) [710324]\n- [net] igb: fix WOL on 2nd port on i350 (Stefan Assmann) [718988]\n- [misc] irq: fix interrupt handling for kdump under high load (Stefan Assmann) [720212]\n- [fs] xfs: fix overflow in xfs_growfs_data_private (Eric Sandeen) [652494]\n- [fs] ext4: Don't error out fs if user tries to make file too big (Eric Sandeen) [715501]\n- [x86_64] vdso: Fix possible sign extension/overflow (Prarit Bhargava) [703505]\n- [x86_64] Revert ACPI APIC mode test (Prarit Bhargava) [721361]\n- [net] ipv6: configure bond slaves to allow NA frames on failover (Neil Horman) [694435]\n- [virt] xen: plug evtchn leak in PV-on-HVM device detach (Laszlo Ersek) [697927]\n- [virt] xen/netback: wait for hotplug complete before Connected (Laszlo Ersek) [720347]\n- [virt] xen: Partially revert the netback side of 14bee682 (Laszlo Ersek) [720347]\n- [fs] ext4: Allow indirect-block file to grow to max file size (Lukas Czerner) [715493]\n- [fs] nfs: Fix nfs_compat_user_ino64 with high bits set in fileid (Jeff Layton) [664829]\n- [fs] nfs: Open O_CREAT fails existing files on non writable dirs (J. Bruce Fields) [683372]\n- [xen] vmx: Accelerate VLAPIC EOI writes (Paolo Bonzini) [720986]\n- [xen] x86/hvm: fix off-by-one errors in vcpuid range checks (Paolo Bonzini) [712441]\n- [xen] x86: extend debug key t to collect useful clock skew info (Paolo Bonzini) [712439]\n- [xen] svm: Reported SS.DPL must equal CPL, as assumed by HVM (Paolo Bonzini) [605617]\n- [xen] hvm: support more opcodes for MMIO (Paolo Bonzini) [723755]\n- [xen] x86: Disable writeback if BSF/BSR are passed zero input (Igor Mammedov) [713702]\n- [xen] x86: BT instruction does not write to its dest operand (Igor Mammedov) [713702]\n- [xen] x86: INS/OUTS need Mov attribute to force writeback (Igor Mammedov) [713702]\n- [xen] x86: Fix IMUL r/m8 emulation (Igor Mammedov) [713702]\n- [xen] x86: Fix MUL emulation (Igor Mammedov) [713702]\n- [xen] x86: fix side-effect macro call (Igor Mammedov) [713702]\n- [xen] x86: Fix CLTS emulation (Igor Mammedov) [713702]\n- [xen] x86: Near JMP (Grp5 /3) shouldn't write back to its operand (Igor Mammedov) [713702]\n- [xen] x86: Certain opcodes are only valid with a memory operand (Igor Mammedov) [713702]\n- [xen] x86: Correct RIP-relative addr offset w/immediate byte op (Igor Mammedov) [713702]\n\n[2.6.18-277.el5]\n- [net] sctp: reset packet information after packet transmit (Thomas Graf) [725573]\n- [fs] block: initialise bd_super in bdget (Lachlan McIlroy) [707425]\n- [fs] nfs: Remove bogus call to nfs4_drop_state_owner (Jeff Layton) [724923]\n- [net] be2net: hash key for rss-config cmd not set (Ivan Vecera) [714244]\n- [net] be2net: enable SG, CSO and TSO with VLAN offloading (Ivan Vecera) [714272]\n- [net] be2net: clear interrupt bit in be_probe (Ivan Vecera) [713703]\n- [net] be2net: remove certain cmd failure logging (Ivan Vecera) [716821]\n\n[2.6.18-276.el5]\n- [wireless] nl80211: check for valid SSID size in scan operation (Stanislaw Gruszka) [718155] {CVE-2011-2517}\n- [fs] xfs: handle NULL mount struct in error reports (Eric Sandeen) [720551]\n- [fs] proc: restrict access to /proc/PID/io (Oleg Nesterov) [716828] {CVE-2011-2495}\n- [fs] lockd: don't use file's credentials on RPCSEC_GSS mounts (Max Matveev) [701574]\n- [fs] xfs: add a missing mutex_unlock to a dio error path (Jeff Moyer) [718232]\n- [net] sunrpc: Don't hang forever on NLM unlock requests (Jeff Layton) [709547] {CVE-2011-2491}\n- [fs] gfs2: force a log flush when invalidating the rindex glock (Benjamin Marzinski) [713229]\n- [x86] io_apic: Convert tick to interrupt when checking timer irq (Amos Kong) [698842]\n- [x86] io_apic: Make kernel option 'no_timer_check' always work (Amos Kong) [698842]\n- [x86] io_apic: Compare jiffies with other values by time_after (Amos Kong) [698842]\n- [xen] Fix x86_emulate handling of imul with immediate operands (Igor Mammedov) [700565]\n\n[2.6.18-275.el5]\n- [fs] Fix wrongly vfree'ing a kmalloc'ed area (Larry Woodman) [719495]\n- [fs] dlm: bump default hash table and maximum allocatable sizes (Bryn M. Reeves) [715603]\n- [net] tipc: Overhaul of socket locking logic (Max Matveev) [704192]\n", u'issued': u'2012-03-01', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELSA-2012-0150.html', u'type': u'self', u'id': None, u'title': u'ELSA-2012-0150'}, {u'href': u'http://linux.oracle.com/cve/CVE-2011-1083.html', u'type': u'cve', u'id': u'CVE-2011-1083', u'title': u'CVE-2011-1083'}], u'_content_type_id': u'erratum', u'_id': u'd4620d2c-736e-4746-a3ca-691e4d10368c', u'from': u'el-errata@oss.oracle.com', u'severity': u'Moderate', u'title': u' Oracle Linux 5.8 kernel security and bug update ', u'_ns': u'units_erratum', u'rights': u'Copyright 2012 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 5', u'reboot_suggested': False, u'type': u'security', u'pkglist': [{u'packages': [{u'src': None, u'name': u'kernel', u'sum': [u'md5', u'f16ab9a11178f8058e1400f5d8fed398'], u'filename': u'kernel-2.6.18-308.el5.src.rpm', u'epoch': u'0', u'version': u'2.6.18', u'release': u'308.el5', u'arch': u'src'}, {u'src': None, u'name': u'kernel', u'sum': [u'md5', u'e4a8f6d043a6724c506fdb4f7da8aa5d'], u'filename': u'kernel-2.6.18-308.el5.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.18', u'release': u'308.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'kernel-debug', u'sum': [u'md5', u'8db1c2d52e25a9879bd0043f16168c27'], u'filename': u'kernel-debug-2.6.18-308.el5.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.18', u'release': u'308.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'kernel-debug-devel', u'sum': [u'md5', u'5d3b225c0e69451f391933a3fd8c928e'], u'filename': u'kernel-debug-devel-2.6.18-308.el5.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.18', u'release': u'308.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'kernel-devel', u'sum': [u'md5', u'9571c728021436e5296771d22f2b2720'], u'filename': u'kernel-devel-2.6.18-308.el5.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.18', u'release': u'308.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'kernel-doc', u'sum': [u'md5', u'0435ed5923aa2a4f2e41e76a9ec4acbd'], u'filename': u'kernel-doc-2.6.18-308.el5.noarch.rpm', u'epoch': u'0', u'version': u'2.6.18', u'release': u'308.el5', u'arch': u'noarch'}, {u'src': None, u'name': u'kernel-headers', u'sum': [u'md5', u'19e9b9a5cd92c3dd38c3de21d6b27862'], u'filename': u'kernel-headers-2.6.18-308.el5.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.18', u'release': u'308.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'kernel-xen', u'sum': [u'md5', u'3569dee5f60c6f5ac141538b322c66e0'], u'filename': u'kernel-xen-2.6.18-308.el5.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.18', u'release': u'308.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'kernel-xen-devel', u'sum': [u'md5', u'704f846550f0004395f831a2e5fc0178'], u'filename': u'kernel-xen-devel-2.6.18-308.el5.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.18', u'release': u'308.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'ocfs2-2.6.18-308.el5', u'sum': [u'md5', u'af90b6479e5fece4eaf9884fa04ec39c'], u'filename': u'ocfs2-2.6.18-308.el5-1.4.9-1.el5.src.rpm', u'epoch': u'0', u'version': u'1.4.9', u'release': u'1.el5', u'arch': u'src'}, {u'src': None, u'name': u'ocfs2-2.6.18-308.el5', u'sum': [u'md5', u'f75c02d6aa5f9278bf9392acfa2336ca'], u'filename': u'ocfs2-2.6.18-308.el5-1.4.9-1.el5.x86_64.rpm', u'epoch': u'0', u'version': u'1.4.9', u'release': u'1.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'ocfs2-2.6.18-308.el5debug', u'sum': [u'md5', u'780923447e9680e42fa2ae37e698198b'], u'filename': u'ocfs2-2.6.18-308.el5debug-1.4.9-1.el5.x86_64.rpm', u'epoch': u'0', u'version': u'1.4.9', u'release': u'1.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'ocfs2-2.6.18-308.el5xen', u'sum': [u'md5', u'cc991b9b5b90c43caaedf8fd49262ca9'], u'filename': u'ocfs2-2.6.18-308.el5xen-1.4.9-1.el5.x86_64.rpm', u'epoch': u'0', u'version': u'1.4.9', u'release': u'1.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'oracleasm-2.6.18-308.el5', u'sum': [u'md5', u'6022f0e920ab3e07dd806f3e83002318'], u'filename': u'oracleasm-2.6.18-308.el5-2.0.5-1.el5.src.rpm', u'epoch': u'0', u'version': u'2.0.5', u'release': u'1.el5', u'arch': u'src'}, {u'src': None, u'name': u'oracleasm-2.6.18-308.el5', u'sum': [u'md5', u'542191047dae28b4c2878e8274a11a03'], u'filename': u'oracleasm-2.6.18-308.el5-2.0.5-1.el5.x86_64.rpm', u'epoch': u'0', u'version': u'2.0.5', u'release': u'1.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'oracleasm-2.6.18-308.el5debug', u'sum': [u'md5', u'4958251ce4e1d0d2d738f8a3d992b658'], u'filename': u'oracleasm-2.6.18-308.el5debug-2.0.5-1.el5.x86_64.rpm', u'epoch': u'0', u'version': u'2.0.5', u'release': u'1.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'oracleasm-2.6.18-308.el5xen', u'sum': [u'md5', u'edec0dd934be6cb8f612cc94966668b9'], u'filename': u'oracleasm-2.6.18-308.el5xen-2.0.5-1.el5.x86_64.rpm', u'epoch': u'0', u'version': u'2.0.5', u'release': u'1.el5', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u"kernel\n- 2.6.18-308.0.0.0.1.el5\n- [net] bonding: fix carrier detect when bond is down [orabug 12377284]\n- [mm] fix hugetlb page leak (Dave McCracken) [orabug 12375075]\n- fix ia64 build error due to add-support-above-32-vcpus.patch(Zhenzhong Duan)\n- [x86] use dynamic vcpu_info remap to support more than 32 vcpus (Zhenzhong Duan)\n- [x86] Fix lvt0 reset when hvm boot up with noapic param\n- [scsi] remove printk's when doing I/O to a dead device (John Sobecki, Chris Mason)\n [orabug 12342275]\n- [char] ipmi: Fix IPMI errors due to timing problems (Joe Jin) [orabug 12561346]\n- [scsi] Fix race when removing SCSI devices (Joe Jin) [orabug 12404566]\n- [net] net: Redo the broken redhat netconsole over bonding (Tina Yang) [orabug 12740042]\n- [fs] nfs: Fix __put_nfs_open_context() NULL pointer panic (Joe Jin) [orabug 12687646]\n- [scsi] fix scsi hotplug and rescan race [orabug 10260172]\n- fix filp_close() race (Joe Jin) [orabug 10335998]\n- make xenkbd.abs_pointer=1 by default [orabug 67188919]\n- [xen] check to see if hypervisor supports memory reservation change\n (Chuck Anderson) [orabug 7556514]\n- [net] Enable entropy for bnx2,bnx2x,e1000e,igb,ixgb,ixgbe,ixgbevf (John Sobecki)\n [orabug 10315433]\n- [NET] Add xen pv netconsole support (Tina Yang) [orabug 6993043] [bz 7258]\n- [mm] shrink_zone patch (John Sobecki,Chris Mason) [orabug 6086839]\n- fix aacraid not to reset during kexec (Joe Jin) [orabug 8516042]\n- [rds] Patch rds to 1.4.2-20 (Andy Grover) [orabug 9471572, 9344105]\n RDS: Fix BUG_ONs to not fire when in a tasklet\n ipoib: Fix lockup of the tx queue\n RDS: Do not call set_page_dirty() with irqs off (Sherman Pun)\n RDS: Properly unmap when getting a remote access error (Tina Yang)\n RDS: Fix locking in rds_send_drop_to()\n- [xen] PVHVM guest with PoD crashes under memory pressure (Chuck Anderson)\n [orabug 9107465]\n- [xen] PV guest with FC HBA hangs during shutdown (Chuck Anderson)\n [orabug 9764220]\n- Support 256GB+ memory for pv guest (Mukesh Rathor) [orabug 9450615]\n- fix overcommit memory to use percpu_counter for el5 (KOSAKI Motohiro,\n Guru Anbalagane) [orabug 6124033]\n- [ipmi] make configurable timeouts for kcs of ipmi [orabug 9752208]\n- [ib] fix memory corruption (Andy Grover) [orabug 9972346]", u'issued': u'2012-03-01', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELSA-2012-0150-1.html', u'type': u'self', u'id': None, u'title': u'ELSA-2012-0150-1'}, {u'href': u'http://linux.oracle.com/cve/CVE-2011-1083.html', u'type': u'cve', u'id': u'CVE-2011-1083', u'title': u'CVE-2011-1083'}], u'_content_type_id': u'erratum', u'_id': u'9b62190d-231e-4753-a055-4ac3b830abc7', u'from': u'el-errata@oss.oracle.com', u'severity': u'Moderate', u'title': u' Oracle Linux 5.8 kernel security and bug update ', u'_ns': u'units_erratum', u'rights': u'Copyright 2012 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 5', u'reboot_suggested': False, u'type': u'security', u'pkglist': [{u'packages': [{u'src': None, u'name': u'kernel', u'sum': [u'md5', u'f0f18d509879fc8cc1a5ba846968a74f'], u'filename': u'kernel-2.6.18-308.0.0.0.1.el5.src.rpm', u'epoch': u'0', u'version': u'2.6.18', u'release': u'308.0.0.0.1.el5', u'arch': u'src'}, {u'src': None, u'name': u'kernel', u'sum': [u'md5', u'35476f36602f25752f7e0785835d6edd'], u'filename': u'kernel-2.6.18-308.0.0.0.1.el5.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.18', u'release': u'308.0.0.0.1.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'kernel-debug', u'sum': [u'md5', u'711faab3edca22b23c5885edcfe04dd3'], u'filename': u'kernel-debug-2.6.18-308.0.0.0.1.el5.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.18', u'release': u'308.0.0.0.1.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'kernel-debug-devel', u'sum': [u'md5', u'59915a8f80405fa30ea8d9c6a49c4109'], u'filename': u'kernel-debug-devel-2.6.18-308.0.0.0.1.el5.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.18', u'release': u'308.0.0.0.1.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'kernel-devel', u'sum': [u'md5', u'1def190c1d337437139d3f7715179568'], u'filename': u'kernel-devel-2.6.18-308.0.0.0.1.el5.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.18', u'release': u'308.0.0.0.1.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'kernel-doc', u'sum': [u'md5', u'8393680e1eceb35548d71c641b8a6359'], u'filename': u'kernel-doc-2.6.18-308.0.0.0.1.el5.noarch.rpm', u'epoch': u'0', u'version': u'2.6.18', u'release': u'308.0.0.0.1.el5', u'arch': u'noarch'}, {u'src': None, u'name': u'kernel-headers', u'sum': [u'md5', u'18f9711004cb4db717f39fff11bd42d1'], u'filename': u'kernel-headers-2.6.18-308.0.0.0.1.el5.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.18', u'release': u'308.0.0.0.1.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'kernel-xen', u'sum': [u'md5', u'78292b362fccee2a9e3c94f82d1e0f93'], u'filename': u'kernel-xen-2.6.18-308.0.0.0.1.el5.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.18', u'release': u'308.0.0.0.1.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'kernel-xen-devel', u'sum': [u'md5', u'e5c9ea19d1c8de460fa9c1829b71e8bd'], u'filename': u'kernel-xen-devel-2.6.18-308.0.0.0.1.el5.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.18', u'release': u'308.0.0.0.1.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'ocfs2-2.6.18-308.0.0.0.1.el5', u'sum': [u'md5', u'52bf644f63f76b835216294ed8f73f98'], u'filename': u'ocfs2-2.6.18-308.0.0.0.1.el5-1.4.9-1.el5.src.rpm', u'epoch': u'0', u'version': u'1.4.9', u'release': u'1.el5', u'arch': u'src'}, {u'src': None, u'name': u'ocfs2-2.6.18-308.0.0.0.1.el5', u'sum': [u'md5', u'84063a3784a56419c8e7a1d6d604446f'], u'filename': u'ocfs2-2.6.18-308.0.0.0.1.el5-1.4.9-1.el5.x86_64.rpm', u'epoch': u'0', u'version': u'1.4.9', u'release': u'1.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'ocfs2-2.6.18-308.0.0.0.1.el5debug', u'sum': [u'md5', u'b6f40dcf8fa1d40569d84f5045237ae3'], u'filename': u'ocfs2-2.6.18-308.0.0.0.1.el5debug-1.4.9-1.el5.x86_64.rpm', u'epoch': u'0', u'version': u'1.4.9', u'release': u'1.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'ocfs2-2.6.18-308.0.0.0.1.el5xen', u'sum': [u'md5', u'99f1e5fd36cf73a417cf8478906e1c5c'], u'filename': u'ocfs2-2.6.18-308.0.0.0.1.el5xen-1.4.9-1.el5.x86_64.rpm', u'epoch': u'0', u'version': u'1.4.9', u'release': u'1.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'oracleasm-2.6.18-308.0.0.0.1.el5', u'sum': [u'md5', u'421c52ec1f320192c981795f7ad8aaac'], u'filename': u'oracleasm-2.6.18-308.0.0.0.1.el5-2.0.5-1.el5.src.rpm', u'epoch': u'0', u'version': u'2.0.5', u'release': u'1.el5', u'arch': u'src'}, {u'src': None, u'name': u'oracleasm-2.6.18-308.0.0.0.1.el5', u'sum': [u'md5', u'7d26d807b1472f9a3fa625b76c408884'], u'filename': u'oracleasm-2.6.18-308.0.0.0.1.el5-2.0.5-1.el5.x86_64.rpm', u'epoch': u'0', u'version': u'2.0.5', u'release': u'1.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'oracleasm-2.6.18-308.0.0.0.1.el5debug', u'sum': [u'md5', u'e4b2c6b95485cf5599ee9e794d8027fe'], u'filename': u'oracleasm-2.6.18-308.0.0.0.1.el5debug-2.0.5-1.el5.x86_64.rpm', u'epoch': u'0', u'version': u'2.0.5', u'release': u'1.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'oracleasm-2.6.18-308.0.0.0.1.el5xen', u'sum': [u'md5', u'd7824a31f6b042e7fac50c5281c40bae'], u'filename': u'oracleasm-2.6.18-308.0.0.0.1.el5xen-2.0.5-1.el5.x86_64.rpm', u'epoch': u'0', u'version': u'2.0.5', u'release': u'1.el5', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u"[0.12.2-51.0.1.el5]\n- Added conga-enterprise.patch\n- Added conga-enterprise-Carthage.patch to support OEL5\n- Replaced redhat logo image in conga-0.12.2.tar.gz\n\n[0.12.2-51]\n- Fix bz711494 (CVE-2011-1948 plone: reflected XSS vulnerability)\n- Fix bz771920 (CVE-2011-4924 Zope: Incomplete upstream patch for CVE-2010-1104/bz577019)\n\n[0.12.2-45]\n- Fix bz751359 (Add luci support for fence_ipmilan's -L option)\n\n[0.12.2-44]\n- Fix bz577019 (CVE-2010-1104 zope: XSS on error page)\n\n[0.12.2-42]\n- Fix bz755935 (luci_admin man page is misleading)\n- Fix bz755941 (luci_admin restore is not consistent)\n\n[0.12.2-40]\n- Fix excluding busy nodes not working properly in luci internals.\n\n[0.12.2-38]\n- Additional fix for bz734562 (Improve Luci's resource name validation)\n\n[0.12.2-37]\n- Additional fix for bz734562 (Improve Luci's resource name validation)\n\n[0.12.2-36]\n- Bump version of the luci database.\n\n[0.12.2-35]\n- Fix bz739600 (conga allows erroneous characters in resource)\n- Fix bz734562 (Improve Luci's resource name validation)\n\n[0.12.2-34]\n- Fix bz709478 (Ricci fails to detect if host if virtual machine capable)\n- Fix bz723000 (Modifying an existing shared resource will not update the reference in the cluster.conf)\n- Fix bz723188 (Luci does not allow to modify __max_restarts and __restart_expire_time for independent subtrees, only for non-critical resources)\n\n[0.12.2-33]\n- Fix bz732483 (Create new cluster fails with luci when installing packages.)", u'issued': u'2012-03-01', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELSA-2012-0151.html', u'type': u'self', u'id': None, u'title': u'ELSA-2012-0151'}, {u'href': u'http://linux.oracle.com/cve/CVE-2010-1104.html', u'type': u'cve', u'id': u'CVE-2010-1104', u'title': u'CVE-2010-1104'}, {u'href': u'http://linux.oracle.com/cve/CVE-2011-1948.html', u'type': u'cve', u'id': u'CVE-2011-1948', u'title': u'CVE-2011-1948'}], u'_content_type_id': u'erratum', u'_id': u'9af2a19e-45d6-4d69-b1a2-73ae7a8d2b48', u'from': u'el-errata@oss.oracle.com', u'severity': u'Moderate', u'title': u' conga security, bug fix, and enhancement update', u'_ns': u'units_erratum', u'rights': u'Copyright 2012 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 5', u'reboot_suggested': False, u'type': u'security', u'pkglist': [{u'packages': [{u'src': None, u'name': u'conga', u'sum': [u'md5', u'03b1f90f109954a3946462d0d1260014'], u'filename': u'conga-0.12.2-51.0.1.el5.src.rpm', u'epoch': u'0', u'version': u'0.12.2', u'release': u'51.0.1.el5', u'arch': u'src'}, {u'src': None, u'name': u'luci', u'sum': [u'md5', u'f7d337e76c478cf851dbc5c904db9342'], u'filename': u'luci-0.12.2-51.0.1.el5.x86_64.rpm', u'epoch': u'0', u'version': u'0.12.2', u'release': u'51.0.1.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'ricci', u'sum': [u'md5', u'74454fc95db2dab60b43e250a4ec2be5'], u'filename': u'ricci-0.12.2-51.0.1.el5.x86_64.rpm', u'epoch': u'0', u'version': u'0.12.2', u'release': u'51.0.1.el5', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u"[1.102pre-154.0.3]\n- mkdumprd.orig get packed, remove it.\n\n[1.102pre-154.0.2]\n- fix mounting root fs on labeled disk (Maxim Uvarov) [orabug: 13709374]\n\n[1.102pre-154.0.1]\nMerge following patches from mkinitrd:\n- mkinitrd-fix-san-boot.patch\n- mkinitrd-fix-shared-lib-library-path.patch\n- mkinitrd-5.1.19.6-libfirmware-subdir-include.patch\n- mkinitrd-fix-setquiet-for-non-verbose.patch\n- add-option-to-forceload-multipath.patch\n- Update kexec-kdump-howto.txt with Oracle references\n- Add mkdumprd load firmware support [orabug 10432768]\n- Updated makedumpfile to el6 version (Herbert van den Bergh) [orabug 10088607]\n- Merged UEK modification,Updated Source1 kdump.init\n Added --allow-missing for rebuilding kdump_initrd\n- Updated kexec-kdump-howto.txt with Oracle references\n\n[1.102pre-154]\n- Add xfs support, resolve bug 668706.\n\n[1.102pre-153]\n- Avoid recursive directory deletion when unmount failed, from Cai Qian.\n Resolve bug 781907.\n\n[1.102pre-152]\n- Replace sed with awk in interface-mapping code,\n resolve bug 765702.\n\n[1.102pre-151]\n- Set pipefail to catch errors in a pipe, resolve bug 761336.\n\n[1.102pre-150]\n- Remove the restriction for Xen HVM guests, resolve bug 743217.\n\n[1.102pre-149]\n- Honor the resettable flag, resolve bug 761048.\n\n[1.102pre-148]\n- Revert the patch in -144, resolve bug 755781. From Cai Qian.\n\n[1.102pre-147]\n- Poll every ifcfg file to get bridge members, resolve bug 760844.\n\n[1.102pre-146]\n- Don't add default gateway when there is none. Resolve bug 759006.\n\n[1.102pre-145]\n- Bypass blacklist option for target checking. Resolve bug 690678.\n\n[1.102pre-144]\n- Change the default core_collector for raw dump to makedumpfile.\n Resolve bug 755781.\n\n[1.102pre-143]\n- Support static route. Resolve bug 715531.\n\n[1.102pre-142]\n- Fix some security flaws. Resolve bug 743163.\n\n[1.102pre-141]\n- Remove two unused patches.\n\n[1.102pre-140]\n- Fix link_delay regression since -135, resolve bug 753684.\n\n[1.102pre-139]\n- Improve debugfs mounting code, from Dave Young. Resolve bug 748749.\n\n[1.102pre-138]\n- Backport blacklist option. Resolve bug 690678.\n\n[1.102pre-137]\n- Fix link_delay handling code. Resolve bug 682359.\n\n[1.102pre-136]\n- Add /etc/fstab into initrd, resolve Bug 748319.\n\n[1.102pre-135]\n- Support dump over vlan tagged bond. Resolve bug 682359.\n\n[1.102pre-134]\n- Fix two trivial bugs, Bug 709622 and Bug 662530.\n\n[1.102pre-133]\n- Support software iscsi as dump target, from Vivek Goyal.\n Resolve bug 719384.\n\n[1.102pre-132]\n- Add the missing part of the previous patch. Resolve bug 696547.\n\n[1.102pre-131]\n- Get the backup memory region dynamically. Resolve bug 678308.\n\n[1.102pre-130]\n- Add ext4 module. Resolve bug 667791.\n\n[1.102pre-129]\n- Updating release to force brew rebuild\n\n[1.102pre-128]\n- Check fsck.ext4 binary before include it. Resolve bug 667791.\n\n[1.102pre-127]\n- Add ext4 support, from Dave Maley. Resolve bug 667791.", u'issued': u'2012-03-01', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELSA-2012-0152.html', u'type': u'self', u'id': None, u'title': u'ELSA-2012-0152'}, {u'href': u'http://linux.oracle.com/cve/CVE-2011-3588.html', u'type': u'cve', u'id': u'CVE-2011-3588', u'title': u'CVE-2011-3588'}, {u'href': u'http://linux.oracle.com/cve/CVE-2011-3589.html', u'type': u'cve', u'id': u'CVE-2011-3589', u'title': u'CVE-2011-3589'}, {u'href': u'http://linux.oracle.com/cve/CVE-2011-3590.html', u'type': u'cve', u'id': u'CVE-2011-3590', u'title': u'CVE-2011-3590'}], u'_content_type_id': u'erratum', u'_id': u'8f06b574-79aa-456a-96a9-c40abcb78d08', u'from': u'el-errata@oss.oracle.com', u'severity': u'Moderate', u'title': u' kexec-tools security, bug fix, and enhancement update', u'_ns': u'units_erratum', u'rights': u'Copyright 2012 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 5', u'reboot_suggested': False, u'type': u'security', u'pkglist': [{u'packages': [{u'src': None, u'name': u'kexec-tools', u'sum': [u'md5', u'4ab7f4ec10855f708b39e89785fe7da5'], u'filename': u'kexec-tools-1.102pre-154.0.3.el5.src.rpm', u'epoch': u'0', u'version': u'1.102pre', u'release': u'154.0.3.el5', u'arch': u'src'}, {u'src': None, u'name': u'kexec-tools', u'sum': [u'md5', u'cfcbe64ad33ee5dcd47ece4d16be00e5'], u'filename': u'kexec-tools-1.102pre-154.0.3.el5.x86_64.rpm', u'epoch': u'0', u'version': u'1.102pre', u'release': u'154.0.3.el5', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u'[1.7-9.62.0.1.el5]\n- add patch to remove all sysrq echo commands from sysreport.legacy\n (John Sobecki) [orabug 11061754]\n- comment out rh-upload-core and README.rh-upload-core in specfile\n\n[1.7-9.62]\n- Always log plugin exceptions that are not raised to the interpreter\n Resolves: bz717480\n- Ensure relative symlink targets are correctly handled when copying\n Resolves: bz717962\n- Correctly handle libxml2 parser exceptions when reading cluster.conf\n Resolves: bz750573\n- Update Red Hat Certificate System plugin for current versions\n Resolves: bz627416\n\n[1.7-9.61]\n- Make single threaded operation default and add --multithread to override\n Resolves: bz708346\n- Support multiple possible locations of VRTSexplorer script\n Resolves: bz565996\n- Collect wallaby dump and inventory information in mrggrid plugin\n Resolves: bz641020\n\n[1.7-9.60]\n- Add ethtool pause, coalesce and ring (-a, -c, -g) options to network plugin\n Resolves: bz726421\n- Update MRG grid plugin to collect additional logs and configuration\n Resolves: bz641020\n\n[1.7-9.59]\n- Fix collection of symlink destinations when copying directory trees\n Resolves: bz717962\n- Allow plugins to specify non-root symlinks for collected command output\n Resolves: bz716987\n- Ensure custom rsyslog destinations are captured and log size limits applied\n Resolves: bz717167\n\n[1.7-9.58]\n- Add basic plugin for Veritas products\n Resolves: bz565996\n- Do not collect subscription manager keys in general plugin\n Resolves: bz750606\n- Fix gfs2 plugin use of callExtProg API\n Resolves: bz667783\n\n[1.7-9.57]\n- Fix exceptions and file naming in gfs2 plugin\n Resolves: bz667783\n\n[1.7-9.56]\n- Fix translation for fr locale\n Resolves: bz641020\n\n[1.7-9.55]\n- Add basic Infiniband plugin\n Resolves: bz673246\n- Add plugin for scsi-target-utils iSCSI target\n Resolves: bz677123\n- Fix handling of TMP environment variable\n Resolves: bz733133\n- Correctly determine kernel version in cluster plugin\n Resolves: bz742567\n- Add libvirt plugin\n Resolves: bz568635\n- Add gfs2 plugin to supplement cluster data collection\n Resolves: bz667783\n', u'issued': u'2012-03-01', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELSA-2012-0153.html', u'type': u'self', u'id': None, u'title': u'ELSA-2012-0153'}, {u'href': u'http://linux.oracle.com/cve/CVE-2011-4083.html', u'type': u'cve', u'id': u'CVE-2011-4083', u'title': u'CVE-2011-4083'}], u'_content_type_id': u'erratum', u'_id': u'5da6dc40-2369-411a-a2d1-6e2ddc65af11', u'from': u'el-errata@oss.oracle.com', u'severity': u'Low', u'title': u' sos security, bug fix, and enhancement update', u'_ns': u'units_erratum', u'rights': u'Copyright 2012 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 5', u'reboot_suggested': False, u'type': u'security', u'pkglist': [{u'packages': [{u'src': None, u'name': u'sos', u'sum': [u'md5', u'b4d91afa47a34c2fa69b9c4ae36dd625'], u'filename': u'sos-1.7-9.62.0.1.el5.noarch.rpm', u'epoch': u'0', u'version': u'1.7', u'release': u'9.62.0.1.el5', u'arch': u'noarch'}, {u'src': None, u'name': u'sos', u'sum': [u'md5', u'4fdd3060a246ede70ae3077e9242bd2d'], u'filename': u'sos-1.7-9.62.0.1.el5.src.rpm', u'epoch': u'0', u'version': u'1.7', u'release': u'9.62.0.1.el5', u'arch': u'src'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u"[6.2.8.0-12.el5]\n- Add fix for CVE-2010-4167 (767142)\n\n[6.2.8.0-11.el5]\nFix assertion failed when using 'identify -verbose' when theres no\n image information available (502626)\n\n[6.2.8.0-10.el5]\nFix memory allocation failure when using color option (616538)\n Fix hang when converting broken GIF (693989)\n Fix conversion of rotated landscape PDF (694922)\n\n[6.2.8.0-9.el5]\nFix a deadlock with semaphore (530592)\n\n[6.2.8.0-8.el5]\n- Fix page size argument parsing (580535)\n\n[6.2.8.0-7.el5]\n- Fix SGI image decoding (498063)\n\n[6.2.8.0-6.el5]\n- Add fix for CVE-2009-1882 (504305)\n\n[6.2.8.0-5.el5]\n- update quantum memory patch (necessary for CVE fixes)\n- backport functionality for SetImageExtent (necessary for CVE fixes)\n- Add patch for CVE-2008-1096 (#286411)\n- Add patch for CVE-2008-1097 (#285861)\n- update patch for CVE-2007-4986\n", u'issued': u'2012-03-01', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELSA-2012-0301.html', u'type': u'self', u'id': None, u'title': u'ELSA-2012-0301'}, {u'href': u'http://linux.oracle.com/cve/CVE-2010-4167.html', u'type': u'cve', u'id': u'CVE-2010-4167', u'title': u'CVE-2010-4167'}], u'_content_type_id': u'erratum', u'_id': u'ea9fefc8-ae7d-4704-84b0-54ade673b6ae', u'from': u'el-errata@oss.oracle.com', u'severity': u'Low', u'title': u' ImageMagick security and bug fix update', u'_ns': u'units_erratum', u'rights': u'Copyright 2012 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 5', u'reboot_suggested': False, u'type': u'security', u'pkglist': [{u'packages': [{u'src': None, u'name': u'ImageMagick', u'sum': [u'md5', u'a0e05a5f40f261a88d7ccbd5733a95ec'], u'filename': u'ImageMagick-6.2.8.0-12.el5.i386.rpm', u'epoch': u'0', u'version': u'6.2.8.0', u'release': u'12.el5', u'arch': u'i386'}, {u'src': None, u'name': u'ImageMagick', u'sum': [u'md5', u'0ea250ee152f788480563ae539f7fa87'], u'filename': u'ImageMagick-6.2.8.0-12.el5.src.rpm', u'epoch': u'0', u'version': u'6.2.8.0', u'release': u'12.el5', u'arch': u'src'}, {u'src': None, u'name': u'ImageMagick', u'sum': [u'md5', u'e6402389be9d0d0bfbc6e1516fca1050'], u'filename': u'ImageMagick-6.2.8.0-12.el5.x86_64.rpm', u'epoch': u'0', u'version': u'6.2.8.0', u'release': u'12.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'ImageMagick-c++', u'sum': [u'md5', u'44ad3ccaeb5a5b78a265095bb9216975'], u'filename': u'ImageMagick-c++-6.2.8.0-12.el5.i386.rpm', u'epoch': u'0', u'version': u'6.2.8.0', u'release': u'12.el5', u'arch': u'i386'}, {u'src': None, u'name': u'ImageMagick-c++', u'sum': [u'md5', u'93ca9c0d4ea7771d945853155ee92cec'], u'filename': u'ImageMagick-c++-6.2.8.0-12.el5.x86_64.rpm', u'epoch': u'0', u'version': u'6.2.8.0', u'release': u'12.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'ImageMagick-c++-devel', u'sum': [u'md5', u'be300883296058ea2be3268bab71072b'], u'filename': u'ImageMagick-c++-devel-6.2.8.0-12.el5.i386.rpm', u'epoch': u'0', u'version': u'6.2.8.0', u'release': u'12.el5', u'arch': u'i386'}, {u'src': None, u'name': u'ImageMagick-c++-devel', u'sum': [u'md5', u'be14c62abde67f3fe0a80517cbe1448f'], u'filename': u'ImageMagick-c++-devel-6.2.8.0-12.el5.x86_64.rpm', u'epoch': u'0', u'version': u'6.2.8.0', u'release': u'12.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'ImageMagick-devel', u'sum': [u'md5', u'57a08fe2c38708ffcbdff9af3138ec68'], u'filename': u'ImageMagick-devel-6.2.8.0-12.el5.i386.rpm', u'epoch': u'0', u'version': u'6.2.8.0', u'release': u'12.el5', u'arch': u'i386'}, {u'src': None, u'name': u'ImageMagick-devel', u'sum': [u'md5', u'e5b335cacf9ba9b081a38d09b9604c21'], u'filename': u'ImageMagick-devel-6.2.8.0-12.el5.x86_64.rpm', u'epoch': u'0', u'version': u'6.2.8.0', u'release': u'12.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'ImageMagick-perl', u'sum': [u'md5', u'903da43479f5667744eab147454fde8c'], u'filename': u'ImageMagick-perl-6.2.8.0-12.el5.x86_64.rpm', u'epoch': u'0', u'version': u'6.2.8.0', u'release': u'12.el5', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u"[1:1.3.7-30]\n- Backported patch to fix transcoding for ASCII (bug #759081, STR #3832).\n\n[1:1.3.7-29]\n- The imageto* filters could crash with bad GIF files\n (CVE-2011-2896, STR #3867, STR #3914, bug #752118).\n\n[1:1.3.7-28]\n- Web interface didn't show completed jobs for printer (STR #3436, bug #625900)\n- Serial backend didn't allow a raw job to be canceled (STR #3649, bug #625955)\n- Fixed condition in textonly filter to create temporary file\n regardless of the number of copies specified. (bug #660518)\n\n[1:1.3.7-27]\n- Call avc_init() only once to not leak file descriptors (bug #668009).", u'issued': u'2012-03-01', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELSA-2012-0302.html', u'type': u'self', u'id': None, u'title': u'ELSA-2012-0302'}, {u'href': u'http://linux.oracle.com/cve/CVE-2011-2896.html', u'type': u'cve', u'id': u'CVE-2011-2896', u'title': u'CVE-2011-2896'}], u'_content_type_id': u'erratum', u'_id': u'29a3d924-3ce1-4b9f-94e1-327b2ce090a6', u'from': u'el-errata@oss.oracle.com', u'severity': u'Low', u'title': u' cups security and bug fix update', u'_ns': u'units_erratum', u'rights': u'Copyright 2012 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 5', u'reboot_suggested': False, u'type': u'security', u'pkglist': [{u'packages': [{u'src': None, u'name': u'cups', u'sum': [u'md5', u'674c5fdb7b707b92fa4942751a365ed5'], u'filename': u'cups-1.3.7-30.el5.src.rpm', u'epoch': u'1', u'version': u'1.3.7', u'release': u'30.el5', u'arch': u'src'}, {u'src': None, u'name': u'cups', u'sum': [u'md5', u'1ac4bc143d08a75470167ff9341971ab'], u'filename': u'cups-1.3.7-30.el5.x86_64.rpm', u'epoch': u'1', u'version': u'1.3.7', u'release': u'30.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'cups-devel', u'sum': [u'md5', u'e20012310c877f547df6e961fb5c90e3'], u'filename': u'cups-devel-1.3.7-30.el5.i386.rpm', u'epoch': u'1', u'version': u'1.3.7', u'release': u'30.el5', u'arch': u'i386'}, {u'src': None, u'name': u'cups-devel', u'sum': [u'md5', u'866a9973cc887c16e7146257e5d9be62'], u'filename': u'cups-devel-1.3.7-30.el5.x86_64.rpm', u'epoch': u'1', u'version': u'1.3.7', u'release': u'30.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'cups-libs', u'sum': [u'md5', u'967287e4eb920de5c4d1fdf96ff7db22'], u'filename': u'cups-libs-1.3.7-30.el5.i386.rpm', u'epoch': u'1', u'version': u'1.3.7', u'release': u'30.el5', u'arch': u'i386'}, {u'src': None, u'name': u'cups-libs', u'sum': [u'md5', u'aae4d101500f7c0d235276562997571d'], u'filename': u'cups-libs-1.3.7-30.el5.x86_64.rpm', u'epoch': u'1', u'version': u'1.3.7', u'release': u'30.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'cups-lpd', u'sum': [u'md5', u'78aed37fe5488b7939058d0946610185'], u'filename': u'cups-lpd-1.3.7-30.el5.x86_64.rpm', u'epoch': u'1', u'version': u'1.3.7', u'release': u'30.el5', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u"[1.1.1-48.90.0.1.el5]\n- Added oracle-enterprise-detect.patch\n- Replaced 'Red Hat' in spec file\n\n[1.1.1-48.90]\n- cve-2011-4028.patch: File existence disclosure vulnerability.\n\n[1.1.1-48.88]\n- cve-2011-4818.patch: Multiple input sanitization flaws in Render and GLX\n- xorg-x11-server-1.1.0-mesa-copy-sub-buffer.patch: Likewise.\n\n[1.1.1-48.87]\n- xserver-1.1.1-fbdev-iterate-modes.patch: fix fbdev driver not iterating\n across all modes of a certain dimension (#740497)\n\n[1.1.1-48.86]\n- xserver-1.1.1-midc-double-free.patch: Don't double-free the picture for\n the root window when using the mi (software) cursor path. (#674741)\n\n[1.1.1-48.85]\n- xserver-1.1.1-bigreqs-buffer-size.patch: Fix BIG-REQUESTS buffer size\n (#555000)\n\n[1.1.1-48.84]\n- xserver-1.1.1-xinerama-crash.patch: Fix a crash in XineramaQueryScreens\n when client is swapped (#588346)\n\n[1.1.1-48.83]\n- xserver-1.1.1-xephyr-keymap.patch: Fix types in Xephyr keymap setup (#454409)\n\n[1.1.1-48.82]\n- xserver-1.1.1-wideline-overflow.patch: Fix integer overflow in wide line\n renderer (#649810)\n\n[1.1.1-48.81]\n- Fix mouse stuck on edge (#529717)\n\n[1.1.1-48.80]\n- xserver-1.1.1-bs-crash.patch: Fix a crash in backing store. (#676270)\n\n[1.1.1-48.79]\n- xserver-1.1.1-randr-fix-mouse-crossing.patch: fix zaphod mouse crossing (#559964)\n\n[1.1.1-48.78]\n- cve-2010-1166.patch: Fix broken modulo math in Render and arc code.\n Identical to xserver-1.1.1-mod-macro-parens.patch in 5.5.z. (#582651)\n\n[1.1.1-48.77]\n- xserver-1.1.1-dbe-validate-gc.patch: Validate the GC against both front\n and back buffers (#596899)\n", u'issued': u'2012-03-01', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELSA-2012-0303.html', u'type': u'self', u'id': None, u'title': u'ELSA-2012-0303'}, {u'href': u'http://linux.oracle.com/cve/CVE-2011-4028.html', u'type': u'cve', u'id': u'CVE-2011-4028', u'title': u'CVE-2011-4028'}], u'_content_type_id': u'erratum', u'_id': u'8d7ed60a-f5bd-4f3b-aa1e-ed102ac1b312', u'from': u'el-errata@oss.oracle.com', u'severity': u'Low', u'title': u' xorg-x11-server security and bug fix update', u'_ns': u'units_erratum', u'rights': u'Copyright 2012 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 5', u'reboot_suggested': False, u'type': u'security', u'pkglist': [{u'packages': [{u'src': None, u'name': u'xorg-x11-server', u'sum': [u'md5', u'c19bdb06451802ca47d2e633b3187ba1'], u'filename': u'xorg-x11-server-1.1.1-48.90.0.1.el5.src.rpm', u'epoch': u'0', u'version': u'1.1.1', u'release': u'48.90.0.1.el5', u'arch': u'src'}, {u'src': None, u'name': u'xorg-x11-server-Xdmx', u'sum': [u'md5', u'10ea3c11175f91bb920e2f23e60e46e4'], u'filename': u'xorg-x11-server-Xdmx-1.1.1-48.90.0.1.el5.x86_64.rpm', u'epoch': u'0', u'version': u'1.1.1', u'release': u'48.90.0.1.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'xorg-x11-server-Xephyr', u'sum': [u'md5', u'735272680f63a02885b978e26e073056'], u'filename': u'xorg-x11-server-Xephyr-1.1.1-48.90.0.1.el5.x86_64.rpm', u'epoch': u'0', u'version': u'1.1.1', u'release': u'48.90.0.1.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'xorg-x11-server-Xnest', u'sum': [u'md5', u'4c32821819efd6203993161dc2d97ecc'], u'filename': u'xorg-x11-server-Xnest-1.1.1-48.90.0.1.el5.x86_64.rpm', u'epoch': u'0', u'version': u'1.1.1', u'release': u'48.90.0.1.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'xorg-x11-server-Xorg', u'sum': [u'md5', u'798b71e0e050f8d9ce7f556056c88403'], u'filename': u'xorg-x11-server-Xorg-1.1.1-48.90.0.1.el5.x86_64.rpm', u'epoch': u'0', u'version': u'1.1.1', u'release': u'48.90.0.1.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'xorg-x11-server-Xvfb', u'sum': [u'md5', u'5412130892a1478f67b98d72cd371935'], u'filename': u'xorg-x11-server-Xvfb-1.1.1-48.90.0.1.el5.x86_64.rpm', u'epoch': u'0', u'version': u'1.1.1', u'release': u'48.90.0.1.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'xorg-x11-server-Xvnc-source', u'sum': [u'md5', u'a10a70d60127c03b22a4c4c11ac86f6e'], u'filename': u'xorg-x11-server-Xvnc-source-1.1.1-48.90.0.1.el5.x86_64.rpm', u'epoch': u'0', u'version': u'1.1.1', u'release': u'48.90.0.1.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'xorg-x11-server-sdk', u'sum': [u'md5', u'639ed9f96371e1346b891d78994b2487'], u'filename': u'xorg-x11-server-sdk-1.1.1-48.90.0.1.el5.x86_64.rpm', u'epoch': u'0', u'version': u'1.1.1', u'release': u'48.90.0.1.el5', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u"[4:4.1-81]\n- 455664 adoptions of crontab orphans, forgot add buffer for list of\n orphans\n- Related: rhbz#455664\n\n[4:4.1-80]\n- 654961 crond process ignores the changes of user's home directory needs\n bigger changes of code. The fix wasn't applied, detail in comment#11.\n- Related: rhbz#249512\n\n[4:4.1-79]\n- CVE-2010-0424 vixie-cron, cronie: Race condition by setting timestamp \n of user's crontab file, when editing the file\n- Resolves: rhbz#741534\n\n[4:4.1-78]\n- 625016 - crond requires a restart if mcstransd is stopped \n- Resolves: rhbz#625016\n\n[4:4.1-78]\n- 460070 entries in cronjobs in /etc/cron.d are checked for valid syntax\n- Resolves: rhbz#460070\n\n[4:4.1-78]\n- 455664 adoptions of crontab orphans\n- 249512 crontab should verify a user's access to PAM cron service\n- Resolves: rhbz#455664, rhbz#249512\n\n[4:4.1-78]\n- 699621 and 699620 man page fix\n- 529632 service crond status return correct status\n- 480930 set correct pie options in CFLAGS and LDFLAGS\n- 476972 crontab error with @reboot entry\n- Resolves: rhbz#699621, rhbz#699620, rhbz#529632, rhbz#480930, rhbz#476972", u'issued': u'2012-03-01', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELSA-2012-0304.html', u'type': u'self', u'id': None, u'title': u'ELSA-2012-0304'}, {u'href': u'http://linux.oracle.com/cve/CVE-2010-0424.html', u'type': u'cve', u'id': u'CVE-2010-0424', u'title': u'CVE-2010-0424'}], u'_content_type_id': u'erratum', u'_id': u'3dad3c06-0e9c-4ba7-b96e-0265596012dc', u'from': u'el-errata@oss.oracle.com', u'severity': u'Low', u'title': u' vixie-cron security, bug fix, and enhancement update', u'_ns': u'units_erratum', u'rights': u'Copyright 2012 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 5', u'reboot_suggested': False, u'type': u'security', u'pkglist': [{u'packages': [{u'src': None, u'name': u'vixie-cron', u'sum': [u'md5', u'2799b0006379ba8e05d286a9562702be'], u'filename': u'vixie-cron-4.1-81.el5.src.rpm', u'epoch': u'4', u'version': u'4.1', u'release': u'81.el5', u'arch': u'src'}, {u'src': None, u'name': u'vixie-cron', u'sum': [u'md5', u'a5e52a9f6307c867e7650b4ded1c7839'], u'filename': u'vixie-cron-4.1-81.el5.x86_64.rpm', u'epoch': u'4', u'version': u'4.1', u'release': u'81.el5', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u'[1.33.1-15]\n- Fix bugs in parsing invalid regexps\n- Resolves: #766755\n\n[1.33.1-14]\n- Delete leftover .orig files after patches are successfully applied\n\n[1.33.1-13]\n- GCC 4.4 fixes\n- Resolves: #567722\n\n[1.33.1-11]\n- Add a fix for thread safety bug in boost::regex\n- Build with -fno-strict-aliasing due to the sheer amount of warnings\n that we get.\n- Resolves: #472384', u'issued': u'2012-03-01', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELSA-2012-0305.html', u'type': u'self', u'id': None, u'title': u'ELSA-2012-0305'}, {u'href': u'http://linux.oracle.com/cve/CVE-2008-0171.html', u'type': u'cve', u'id': u'CVE-2008-0171', u'title': u'CVE-2008-0171'}, {u'href': u'http://linux.oracle.com/cve/CVE-2008-0172.html', u'type': u'cve', u'id': u'CVE-2008-0172', u'title': u'CVE-2008-0172'}], u'_content_type_id': u'erratum', u'_id': u'6aa4c8ab-9977-4d86-8aac-f12c92f841f1', u'from': u'el-errata@oss.oracle.com', u'severity': u'Low', u'title': u' boost security and bug fix update', u'_ns': u'units_erratum', u'rights': u'Copyright 2012 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 5', u'reboot_suggested': False, u'type': u'security', u'pkglist': [{u'packages': [{u'src': None, u'name': u'boost', u'sum': [u'md5', u'10392eba6c3f7d13a3b7152fc57a56af'], u'filename': u'boost-1.33.1-15.el5.i386.rpm', u'epoch': u'0', u'version': u'1.33.1', u'release': u'15.el5', u'arch': u'i386'}, {u'src': None, u'name': u'boost', u'sum': [u'md5', u'bceedf09811fc11825427fb57d235944'], u'filename': u'boost-1.33.1-15.el5.src.rpm', u'epoch': u'0', u'version': u'1.33.1', u'release': u'15.el5', u'arch': u'src'}, {u'src': None, u'name': u'boost', u'sum': [u'md5', u'389d610b8295691deea559eebcd5d9a8'], u'filename': u'boost-1.33.1-15.el5.x86_64.rpm', u'epoch': u'0', u'version': u'1.33.1', u'release': u'15.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'boost-devel', u'sum': [u'md5', u'e221206643b3c80d36a1caadee788381'], u'filename': u'boost-devel-1.33.1-15.el5.i386.rpm', u'epoch': u'0', u'version': u'1.33.1', u'release': u'15.el5', u'arch': u'i386'}, {u'src': None, u'name': u'boost-devel', u'sum': [u'md5', u'9d921f62b11fcafc113206224c8ac5f3'], u'filename': u'boost-devel-1.33.1-15.el5.x86_64.rpm', u'epoch': u'0', u'version': u'1.33.1', u'release': u'15.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'boost-doc', u'sum': [u'md5', u'c6aaa0fece6e124356b0fa839e88b826'], u'filename': u'boost-doc-1.33.1-15.el5.x86_64.rpm', u'epoch': u'0', u'version': u'1.33.1', u'release': u'15.el5', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u"[1.6.1-70.el5]\n- add upstream patch for telnetd buffer overflow (CVE-2011-4862, #770351)\n\n[1.6.1-69.el5]\n- ftp: fix a static analysis should-never-happen NULL dereference (#750823)\n\n[1.6.1-68.el5]\n- backport fixes to teach libkrb5 to use descriptors higher than FD_SETSIZE\n to talk to a KDC by using poll() if it's detected at compile-time, revised\n (#701444, RT#6905)\n\n[1.6.1-67.el5]\n- add backported patch by way of jbarbuc to free subkeys created by the\n KDC while processing TGS requests (#708516)\n\n[1.6.1-66.el5]\n- add backported patch by way of several people to better avoid false\n detection of replay attacks when talking to systems with coarse time\n resolution (#713500)\n\n[1.6.1-65.el5]\n- ftpd: add backported patch to check for errors when calling setegid\n (MITKRB5-SA-2011-005, CVE-2011-1526, #719098)\n\n[1.6.1-64.el5]\n- klist: don't trip over referral entries when invoked with -s (#729067,\n RT#6915)\n", u'issued': u'2012-03-01', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELSA-2012-0306.html', u'type': u'self', u'id': None, u'title': u'ELSA-2012-0306'}, {u'href': u'http://linux.oracle.com/cve/CVE-2011-1526.html', u'type': u'cve', u'id': u'CVE-2011-1526', u'title': u'CVE-2011-1526'}], u'_content_type_id': u'erratum', u'_id': u'c5de0341-c94b-41e7-a6e0-8a724f1fab3a', u'from': u'el-errata@oss.oracle.com', u'severity': u'Low', u'title': u' krb5 security and bug fix update', u'_ns': u'units_erratum', u'rights': u'Copyright 2012 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 5', u'reboot_suggested': False, u'type': u'security', u'pkglist': [{u'packages': [{u'src': None, u'name': u'krb5', u'sum': [u'md5', u'5a391785eed4548c0d0db3cc0da9909f'], u'filename': u'krb5-1.6.1-70.el5.src.rpm', u'epoch': u'0', u'version': u'1.6.1', u'release': u'70.el5', u'arch': u'src'}, {u'src': None, u'name': u'krb5-devel', u'sum': [u'md5', u'3d7ee5f90f28f3c67e9ae7a59fcdce13'], u'filename': u'krb5-devel-1.6.1-70.el5.i386.rpm', u'epoch': u'0', u'version': u'1.6.1', u'release': u'70.el5', u'arch': u'i386'}, {u'src': None, u'name': u'krb5-devel', u'sum': [u'md5', u'5c8d51095ae43f60f2c7c3274fbb09c7'], u'filename': u'krb5-devel-1.6.1-70.el5.x86_64.rpm', u'epoch': u'0', u'version': u'1.6.1', u'release': u'70.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'krb5-libs', u'sum': [u'md5', u'421c877f72df67f821c55abd634a3a36'], u'filename': u'krb5-libs-1.6.1-70.el5.i386.rpm', u'epoch': u'0', u'version': u'1.6.1', u'release': u'70.el5', u'arch': u'i386'}, {u'src': None, u'name': u'krb5-libs', u'sum': [u'md5', u'692be1ea2bf350039a337ab88b97adf4'], u'filename': u'krb5-libs-1.6.1-70.el5.x86_64.rpm', u'epoch': u'0', u'version': u'1.6.1', u'release': u'70.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'krb5-server', u'sum': [u'md5', u'baf636ad1715ee6e313732163007da9e'], u'filename': u'krb5-server-1.6.1-70.el5.x86_64.rpm', u'epoch': u'0', u'version': u'1.6.1', u'release': u'70.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'krb5-server-ldap', u'sum': [u'md5', u'4e5a978df6b5d51b121f087afd703d3d'], u'filename': u'krb5-server-ldap-1.6.1-70.el5.x86_64.rpm', u'epoch': u'0', u'version': u'1.6.1', u'release': u'70.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'krb5-workstation', u'sum': [u'md5', u'2570d3aaac9aeb7a2a22a9de4c4335d1'], u'filename': u'krb5-workstation-1.6.1-70.el5.x86_64.rpm', u'epoch': u'0', u'version': u'1.6.1', u'release': u'70.el5', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u"[2.13-0.59.0.1.el5]\n- Merge UEK modification\n fix #10104470 - Import hwclock from util-linux-ng [Kris Van Hees]\n\n[2.13-0.59]\n- fix #768382 - CVE-2011-1675 CVE-2011-1677 util-linux various flaws\n\n[2.13-0.58]\n- fix #677452 - util-linux fails to build with gettext-0.17\n\n[2.13-0.57]\n- fix #646300 - login doesn't update /var/run/utmp properly\n- fix #726572 - import missing fsfreeze into util-linux \n- fix #678430 - fdisk should not report error on 1gB LUNs\n- fix #699639 - mount man page is missing support for ext4/xfs\n- fix #650937 - blockdev man page missing information\n- fix #678407 - ipcs and ipcrm in wrong man section\n ", u'issued': u'2012-03-01', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELSA-2012-0307.html', u'type': u'self', u'id': None, u'title': u'ELSA-2012-0307'}, {u'href': u'http://linux.oracle.com/cve/CVE-2011-1675.html', u'type': u'cve', u'id': u'CVE-2011-1675', u'title': u'CVE-2011-1675'}, {u'href': u'http://linux.oracle.com/cve/CVE-2011-1677.html', u'type': u'cve', u'id': u'CVE-2011-1677', u'title': u'CVE-2011-1677'}], u'_content_type_id': u'erratum', u'_id': u'b1ffcc18-96c1-4081-83fc-ae0da4274045', u'from': u'el-errata@oss.oracle.com', u'severity': u'Low', u'title': u' util-linux security, bug fix, and enhancement update', u'_ns': u'units_erratum', u'rights': u'Copyright 2012 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 5', u'reboot_suggested': False, u'type': u'security', u'pkglist': [{u'packages': [{u'src': None, u'name': u'util-linux', u'sum': [u'md5', u'7b12fd6a35428fc295ca04d17adfea8e'], u'filename': u'util-linux-2.13-0.59.0.1.el5.src.rpm', u'epoch': u'0', u'version': u'2.13', u'release': u'0.59.0.1.el5', u'arch': u'src'}, {u'src': None, u'name': u'util-linux', u'sum': [u'md5', u'93ffac225c09f4db4c753ad53df7a62c'], u'filename': u'util-linux-2.13-0.59.0.1.el5.x86_64.rpm', u'epoch': u'0', u'version': u'2.13', u'release': u'0.59.0.1.el5', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u"[1:1.2.0-13]\n- Resolves: #768083 'busybox various flaws' including:\n 'buffer underflow in decompression'\n 'udhcpc insufficient checking of DHCP options'\n\n[1:1.2.0-12]\n- Resolves: #756723\n 'Kdump fails after findfs subcommand of busybox fails'\n\n[1:1.2.0-11]\n- Resolves: #689659\n ''busybox cp' does not return a correct exit code when 'No space left on device''", u'issued': u'2012-03-01', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELSA-2012-0308.html', u'type': u'self', u'id': None, u'title': u'ELSA-2012-0308'}, {u'href': u'http://linux.oracle.com/cve/CVE-2006-1168.html', u'type': u'cve', u'id': u'CVE-2006-1168', u'title': u'CVE-2006-1168'}, {u'href': u'http://linux.oracle.com/cve/CVE-2011-2716.html', u'type': u'cve', u'id': u'CVE-2011-2716', u'title': u'CVE-2011-2716'}], u'_content_type_id': u'erratum', u'_id': u'6cad92b8-ba0d-4fd0-b14d-c31ccae37f20', u'from': u'el-errata@oss.oracle.com', u'severity': u'Low', u'title': u' busybox security and bug fix update', u'_ns': u'units_erratum', u'rights': u'Copyright 2012 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 5', u'reboot_suggested': False, u'type': u'security', u'pkglist': [{u'packages': [{u'src': None, u'name': u'busybox', u'sum': [u'md5', u'eecc317790febf24bd1043fb8987be81'], u'filename': u'busybox-1.2.0-13.el5.src.rpm', u'epoch': u'1', u'version': u'1.2.0', u'release': u'13.el5', u'arch': u'src'}, {u'src': None, u'name': u'busybox', u'sum': [u'md5', u'5b20007737ebecb55cfe9c5afa124164'], u'filename': u'busybox-1.2.0-13.el5.x86_64.rpm', u'epoch': u'1', u'version': u'1.2.0', u'release': u'13.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'busybox-anaconda', u'sum': [u'md5', u'ee2fb594b92fd92037f6cf58f2a11ec8'], u'filename': u'busybox-anaconda-1.2.0-13.el5.x86_64.rpm', u'epoch': u'1', u'version': u'1.2.0', u'release': u'13.el5', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u"[1.7.2p1-13]\n- patch: parse ldap.conf more closely to nss_ldap\n Resolves: rhbz#750318\n\n[1.7.2p1-12]\n- added patch for CVE-2011-0010\n Resolves: rhbz#757157\n\n[1.7.2p1-11]\n- backported selinux support from 1.7.4p5 (#477185, #673157)\n- fixed bug in Runas_Spec group matching (#627543)\n- disable 'sudo -l' output word wrapping if the output\n is piped (#697111)\n- fixed overwriting of errno after execve failure (#673157)\n- fixed segmentation fault (#673072)\n- add a sudoers entry to the nsswitch.conf file\n on install (and delete it on uninstall) (#617061)\n Resolves: rhbz#697111\n Resolves: rhbz#673157\n Resolves: rhbz#673072\n Resolves: rhbz#627543\n Resolves: rhbz#617061\n Resolves: rhbz#477185", u'issued': u'2012-03-01', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELSA-2012-0309.html', u'type': u'self', u'id': None, u'title': u'ELSA-2012-0309'}, {u'href': u'http://linux.oracle.com/cve/CVE-2011-0010.html', u'type': u'cve', u'id': u'CVE-2011-0010', u'title': u'CVE-2011-0010'}], u'_content_type_id': u'erratum', u'_id': u'28af8dd9-c068-488a-b032-8ed964e5a301', u'from': u'el-errata@oss.oracle.com', u'severity': u'Low', u'title': u' sudo security and bug fix update', u'_ns': u'units_erratum', u'rights': u'Copyright 2012 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 5', u'reboot_suggested': False, u'type': u'security', u'pkglist': [{u'packages': [{u'src': None, u'name': u'sudo', u'sum': [u'md5', u'b7acf23ff82b67c89e937c00558e04bc'], u'filename': u'sudo-1.7.2p1-13.el5.src.rpm', u'epoch': u'0', u'version': u'1.7.2p1', u'release': u'13.el5', u'arch': u'src'}, {u'src': None, u'name': u'sudo', u'sum': [u'md5', u'697937b5acc28b62b68cfcc1ab48107f'], u'filename': u'sudo-1.7.2p1-13.el5.x86_64.rpm', u'epoch': u'0', u'version': u'1.7.2p1', u'release': u'13.el5', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u"[1.0.9-60.0.1.el5]\n- Add support for resvport for unmonting [orabug 13567018]\n\n[1.0.9-60]\n- Updated idmapd.conf and idmapd.conf.man to reflect the \n static user name mapping (502707)\n- Fixed an umount regression introduced by bz 513094 (bz 781931)\n\n[1.0.9-59]\n- gss: turned of even more excessive syslogs (bz 593097)\n- mount.nfs: Ignored the SIGXFSZ when handling RLIMIT_FSIZE changes (bz 697979)\n\n[1.0.9-58]\n- gss: turned off more excessive syslogs (bz 593097)\n- initfiles: more initscripts improvements (bz 710020)\n- specfile: correct typo when nfsnobodys gid already exists (bz 729603)\n\n[1.0.9-57]\n- Mount fails to anticipate RLIMIT_FSIZE (bz 697979,CVE-2011-1749)\n\n[1.0.9-56]\n- Removed sim crash support (bz 600497)\n- initfiles: more initscripts improvements (bz 710020)\n- mount: Don't wait for TCP to timeout twice (bz 736677)\n\n[1.0.9-55]\n- mount: fixed the -o retry option to retry the given amount (bz 736677)\n- manpage: removed the -o fsc option (bz 715523)\n- nfsstat: show v4 mounts with -m flag (bz 712438)\n- mount: allow insecure ports with mounts (bz 513094)\n- gss: turned off excessive syslogs (bz 593097)\n- mountd: allow v2 and v3 to be disabled (bz 529588)\n- specfile: make sure nfsnobodys gid changes when it exists (bz 729603)\n- initfiles: initscripts improvements (bz 710020)", u'issued': u'2012-03-01', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELSA-2012-0310.html', u'type': u'self', u'id': None, u'title': u'ELSA-2012-0310'}, {u'href': u'http://linux.oracle.com/cve/CVE-2011-1749.html', u'type': u'cve', u'id': u'CVE-2011-1749', u'title': u'CVE-2011-1749'}], u'_content_type_id': u'erratum', u'_id': u'43d409fa-f5ea-4b02-adf5-1c4561ee32f5', u'from': u'el-errata@oss.oracle.com', u'severity': u'Low', u'title': u' nfs-utils security, bug fix, and enhancement update', u'_ns': u'units_erratum', u'rights': u'Copyright 2012 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 5', u'reboot_suggested': False, u'type': u'security', u'pkglist': [{u'packages': [{u'src': None, u'name': u'nfs-utils', u'sum': [u'md5', u'ea2bd4e1d69f1e8dd29edeadf81d7e82'], u'filename': u'nfs-utils-1.0.9-60.0.1.el5.src.rpm', u'epoch': u'1', u'version': u'1.0.9', u'release': u'60.0.1.el5', u'arch': u'src'}, {u'src': None, u'name': u'nfs-utils', u'sum': [u'md5', u'73dc2e3b0055ef32665ce9f415d21c4f'], u'filename': u'nfs-utils-1.0.9-60.0.1.el5.x86_64.rpm', u'epoch': u'1', u'version': u'1.0.9', u'release': u'60.0.1.el5', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u'[1.2-11.2.0.1.el5]\n- Fix double malloc and free problem in CrdLoopPrepare and CrdLoopCleanup\n\n[1.2-11.2.el5]\n- Added Requires lines for ibutils-libs to make rpmdiff happier.\n- Add patch for CVE-2008-3277\n Resolves: bz768400\n\n[1.2-11.1.el5]\n- Add ibutils-1.2-invalid-delete.patch to close\n Resolves: bz711779\n', u'issued': u'2012-03-01', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELSA-2012-0311.html', u'type': u'self', u'id': None, u'title': u'ELSA-2012-0311'}, {u'href': u'http://linux.oracle.com/cve/CVE-2008-3277.html', u'type': u'cve', u'id': u'CVE-2008-3277', u'title': u'CVE-2008-3277'}], u'_content_type_id': u'erratum', u'_id': u'6515ee41-c89b-4b1c-91a0-32d77134e8ce', u'from': u'el-errata@oss.oracle.com', u'severity': u'Low', u'title': u' ibutils security and bug fix update', u'_ns': u'units_erratum', u'rights': u'Copyright 2012 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 5', u'reboot_suggested': False, u'type': u'security', u'pkglist': [{u'packages': [{u'src': None, u'name': u'ibutils', u'sum': [u'md5', u'349ece6364cd3d05622cf94b103f5d1e'], u'filename': u'ibutils-1.2-11.2.0.1.el5.src.rpm', u'epoch': u'0', u'version': u'1.2', u'release': u'11.2.0.1.el5', u'arch': u'src'}, {u'src': None, u'name': u'ibutils', u'sum': [u'md5', u'50ac83c82777c342c921d223a5fd2ba6'], u'filename': u'ibutils-1.2-11.2.0.1.el5.x86_64.rpm', u'epoch': u'0', u'version': u'1.2', u'release': u'11.2.0.1.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'ibutils-devel', u'sum': [u'md5', u'eaf284cc32f7ff36c604c116fca72f07'], u'filename': u'ibutils-devel-1.2-11.2.0.1.el5.i386.rpm', u'epoch': u'0', u'version': u'1.2', u'release': u'11.2.0.1.el5', u'arch': u'i386'}, {u'src': None, u'name': u'ibutils-devel', u'sum': [u'md5', u'376e999c4c95a190810f2f40afb9cf1e'], u'filename': u'ibutils-devel-1.2-11.2.0.1.el5.x86_64.rpm', u'epoch': u'0', u'version': u'1.2', u'release': u'11.2.0.1.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'ibutils-libs', u'sum': [u'md5', u'c364bace7f24de47010a21a1523e6cb1'], u'filename': u'ibutils-libs-1.2-11.2.0.1.el5.i386.rpm', u'epoch': u'0', u'version': u'1.2', u'release': u'11.2.0.1.el5', u'arch': u'i386'}, {u'src': None, u'name': u'ibutils-libs', u'sum': [u'md5', u'faab94b4bacef5fa2d8a0d096ffac732'], u'filename': u'ibutils-libs-1.2-11.2.0.1.el5.x86_64.rpm', u'epoch': u'0', u'version': u'1.2', u'release': u'11.2.0.1.el5', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u"[8.45.42-1.0.1.el5]\n- Update oracle-enterprise.patch to do detection on /etc/oracle-release \n and /etc/enterprise-release\n- Patch x86_64 sysctl.conf as well as default sysctl.conf\n- Patch sysctl.conf to default rp_filter to loose reverse path\n filtering (has no effect for pre-2.6.32 kernels) [orabug 10286227]\n- Move hwclock into udev rules\n- Update oracle-enterprise.patch to fix RedHat references in arch specific\n sysctl.conf files in source tarball\n- Add oracle-enterprise.patch and update specfile\n- Don't attempt to re-enslave already-enslaved devices (#455537) (pknirsch@redhat.com)\n\n[8.45.42-1]\n- changed exchange_mode to 'main, aggressive' (#435274)\n\n[8.45.41-1]\n- fix check for dhcp6c pid (#568896)\n\n[8.45.40-1]\n- exit arping on first response (#744734)\n\n[8.45.39-1]\n- suppress remove error message during boot (#679998)\n- fix logic error with removing arp_ip_target (#745681)", u'issued': u'2012-03-01', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELSA-2012-0312.html', u'type': u'self', u'id': None, u'title': u'ELSA-2012-0312'}, {u'href': u'http://linux.oracle.com/cve/CVE-2008-1198.html', u'type': u'cve', u'id': u'CVE-2008-1198', u'title': u'CVE-2008-1198'}], u'_content_type_id': u'erratum', u'_id': u'633f8477-bf5b-47a7-9313-63ec676783fb', u'from': u'el-errata@oss.oracle.com', u'severity': u'Low', u'title': u' initscripts security and bug fix update', u'_ns': u'units_erratum', u'rights': u'Copyright 2012 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 5', u'reboot_suggested': False, u'type': u'security', u'pkglist': [{u'packages': [{u'src': None, u'name': u'initscripts', u'sum': [u'md5', u'c67e78a8a41cdf7967518e8db8dc082e'], u'filename': u'initscripts-8.45.42-1.0.1.el5.src.rpm', u'epoch': u'0', u'version': u'8.45.42', u'release': u'1.0.1.el5', u'arch': u'src'}, {u'src': None, u'name': u'initscripts', u'sum': [u'md5', u'51e5126f73c1d30bbc6fbf17c6195221'], u'filename': u'initscripts-8.45.42-1.0.1.el5.x86_64.rpm', u'epoch': u'0', u'version': u'8.45.42', u'release': u'1.0.1.el5', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u"[3.0.33-3.37.el5]\n- Regenerate manpage for 'wide links' and 'unix extensions' sections\n- related: #722553\n\n[3.0.33-3.36.el5]\n- Security Release, fixes CVE-2010-0926\n- resolves: #722553\n\n[3.0.33-3.35.el5]\n- Fix smbclient return code\n- resolves: #768908\n\n[3.0.33-3.34.el5]\n- Fix support for Windows 2008 R2 domains\n- resolves: #736124\n\n[3.0.33-3.33.el5]\n- Security Release, fixes CVE-2010-0547, CVE-2010-0787, CVE-2011-2694,\n CVE-2011-2522, CVE-2011-1678, CVE-2011-2724\n- resolves: #722553\n\n[3.0.33-3.32.el5]\n- Security Release, fixes CVE-2011-0719\n- resolves: #678331\n\n[3.0.33-3.30.el5]\n- Security Release, fixes CVE-2010-3069\n- resolves: #632230\n", u'issued': u'2012-03-01', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELSA-2012-0313.html', u'type': u'self', u'id': None, u'title': u'ELSA-2012-0313'}, {u'href': u'http://linux.oracle.com/cve/CVE-2010-0926.html', u'type': u'cve', u'id': u'CVE-2010-0926', u'title': u'CVE-2010-0926'}], u'_content_type_id': u'erratum', u'_id': u'ee81457c-dc21-4e7e-86bc-bdee8c23c0a7', u'from': u'el-errata@oss.oracle.com', u'severity': u'Low', u'title': u' samba security, bug fix, and enhancement update', u'_ns': u'units_erratum', u'rights': u'Copyright 2012 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 5', u'reboot_suggested': False, u'type': u'security', u'pkglist': [{u'packages': [{u'src': None, u'name': u'libsmbclient', u'sum': [u'md5', u'c7b204fb7555f119b34acb1eaba486f3'], u'filename': u'libsmbclient-3.0.33-3.37.el5.i386.rpm', u'epoch': u'0', u'version': u'3.0.33', u'release': u'3.37.el5', u'arch': u'i386'}, {u'src': None, u'name': u'libsmbclient', u'sum': [u'md5', u'a2ac7279b9543941457c105b07f6b2bb'], u'filename': u'libsmbclient-3.0.33-3.37.el5.x86_64.rpm', u'epoch': u'0', u'version': u'3.0.33', u'release': u'3.37.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'libsmbclient-devel', u'sum': [u'md5', u'e16e9e1c542e73eaf34dc1d9349bc40c'], u'filename': u'libsmbclient-devel-3.0.33-3.37.el5.i386.rpm', u'epoch': u'0', u'version': u'3.0.33', u'release': u'3.37.el5', u'arch': u'i386'}, {u'src': None, u'name': u'libsmbclient-devel', u'sum': [u'md5', u'794eba59263972d5854a99d56d421094'], u'filename': u'libsmbclient-devel-3.0.33-3.37.el5.x86_64.rpm', u'epoch': u'0', u'version': u'3.0.33', u'release': u'3.37.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'samba', u'sum': [u'md5', u'0f789ae2011e9701696d5962e3d41d67'], u'filename': u'samba-3.0.33-3.37.el5.src.rpm', u'epoch': u'0', u'version': u'3.0.33', u'release': u'3.37.el5', u'arch': u'src'}, {u'src': None, u'name': u'samba', u'sum': [u'md5', u'de505a565143dc62f45ee544c6e6f93b'], u'filename': u'samba-3.0.33-3.37.el5.x86_64.rpm', u'epoch': u'0', u'version': u'3.0.33', u'release': u'3.37.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'samba-client', u'sum': [u'md5', u'6e30cd2d3615b84aa0d5067a2912da15'], u'filename': u'samba-client-3.0.33-3.37.el5.x86_64.rpm', u'epoch': u'0', u'version': u'3.0.33', u'release': u'3.37.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'samba-common', u'sum': [u'md5', u'729e887c04d575f340259002e5d32990'], u'filename': u'samba-common-3.0.33-3.37.el5.i386.rpm', u'epoch': u'0', u'version': u'3.0.33', u'release': u'3.37.el5', u'arch': u'i386'}, {u'src': None, u'name': u'samba-common', u'sum': [u'md5', u'e5f73e3047da01da011009c2cd7e3c87'], u'filename': u'samba-common-3.0.33-3.37.el5.x86_64.rpm', u'epoch': u'0', u'version': u'3.0.33', u'release': u'3.37.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'samba-swat', u'sum': [u'md5', u'0a08a62ee5e65b1541b20ed6ca0d0759'], u'filename': u'samba-swat-3.0.33-3.37.el5.x86_64.rpm', u'epoch': u'0', u'version': u'3.0.33', u'release': u'3.37.el5', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u'[2:1.2.46-2]\n- Fix CVE-2011-3026\nResolves: #791007', u'issued': u'2012-02-20', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELSA-2012-0317.html', u'type': u'self', u'id': None, u'title': u'ELSA-2012-0317'}, {u'href': u'http://linux.oracle.com/cve/CVE-2011-3026.html', u'type': u'cve', u'id': u'CVE-2011-3026', u'title': u'CVE-2011-3026'}], u'_content_type_id': u'erratum', u'_id': u'4cf917bf-ece0-4fce-b46d-f4437ec44f30', u'from': u'el-errata@oss.oracle.com', u'severity': u'Important', u'title': u' libpng security update', u'_ns': u'units_erratum', u'rights': u'Copyright 2012 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 6', u'reboot_suggested': False, u'type': u'security', u'pkglist': [{u'packages': [{u'src': None, u'name': u'libpng', u'sum': [u'md5', u'199dd414b2538edaabf55a26fe3d6272'], u'filename': u'libpng-1.2.46-2.el6_2.i686.rpm', u'epoch': u'2', u'version': u'1.2.46', u'release': u'2.el6_2', u'arch': u'i686'}, {u'src': None, u'name': u'libpng', u'sum': [u'md5', u'591de2fa80f7fc2a20fae914e0307466'], u'filename': u'libpng-1.2.46-2.el6_2.src.rpm', u'epoch': u'2', u'version': u'1.2.46', u'release': u'2.el6_2', u'arch': u'src'}, {u'src': None, u'name': u'libpng', u'sum': [u'md5', u'dac8494ef5d6d832bc18fa40c7415029'], u'filename': u'libpng-1.2.46-2.el6_2.x86_64.rpm', u'epoch': u'2', u'version': u'1.2.46', u'release': u'2.el6_2', u'arch': u'x86_64'}, {u'src': None, u'name': u'libpng-devel', u'sum': [u'md5', u'6b193592d7abf042d2a69ee292fe4ecd'], u'filename': u'libpng-devel-1.2.46-2.el6_2.i686.rpm', u'epoch': u'2', u'version': u'1.2.46', u'release': u'2.el6_2', u'arch': u'i686'}, {u'src': None, u'name': u'libpng-devel', u'sum': [u'md5', u'f081630d0de75b631bb9e1a7870766fa'], u'filename': u'libpng-devel-1.2.46-2.el6_2.x86_64.rpm', u'epoch': u'2', u'version': u'1.2.46', u'release': u'2.el6_2', u'arch': u'x86_64'}, {u'src': None, u'name': u'libpng-static', u'sum': [u'md5', u'8eb7817733e46dc0401dd0c354ffa5d9'], u'filename': u'libpng-static-1.2.46-2.el6_2.x86_64.rpm', u'epoch': u'2', u'version': u'1.2.46', u'release': u'2.el6_2', u'arch': u'x86_64'}], u'name': u'ol6_x86_64_latest', u'short': u'ol6_x86_64_latest'}, {u'packages': [{u'src': None, u'name': u'libpng', u'sum': [u'md5', u'0502e19b7649df7ed8bde5e259235fdf'], u'filename': u'libpng-1.2.10-15.el5_7.i386.rpm', u'epoch': u'2', u'version': u'1.2.10', u'release': u'15.el5_7', u'arch': u'i386'}, {u'src': None, u'name': u'libpng', u'sum': [u'md5', u'dd445c6d600dc265a334c4ac22afcb84'], u'filename': u'libpng-1.2.10-15.el5_7.src.rpm', u'epoch': u'2', u'version': u'1.2.10', u'release': u'15.el5_7', u'arch': u'src'}, {u'src': None, u'name': u'libpng', u'sum': [u'md5', u'6a0cad8f4b7e9a58aec9213365d0b774'], u'filename': u'libpng-1.2.10-15.el5_7.x86_64.rpm', u'epoch': u'2', u'version': u'1.2.10', u'release': u'15.el5_7', u'arch': u'x86_64'}, {u'src': None, u'name': u'libpng-devel', u'sum': [u'md5', u'0047835487d9f89f67438e29f6b8beb5'], u'filename': u'libpng-devel-1.2.10-15.el5_7.i386.rpm', u'epoch': u'2', u'version': u'1.2.10', u'release': u'15.el5_7', u'arch': u'i386'}, {u'src': None, u'name': u'libpng-devel', u'sum': [u'md5', u'72f3dee050f9e862a4b53e9083a27f54'], u'filename': u'libpng-devel-1.2.10-15.el5_7.x86_64.rpm', u'epoch': u'2', u'version': u'1.2.10', u'release': u'15.el5_7', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u'[1.11.23-11.el6_2.1]\n- Fix CVE-2012-0804 (Resolves: #784338)', u'issued': u'2012-02-21', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELSA-2012-0321.html', u'type': u'self', u'id': None, u'title': u'ELSA-2012-0321'}, {u'href': u'http://linux.oracle.com/cve/CVE-2012-0804.html', u'type': u'cve', u'id': u'CVE-2012-0804', u'title': u'CVE-2012-0804'}], u'_content_type_id': u'erratum', u'_id': u'33621d14-ef59-4fd7-af21-0ac803c4dcef', u'from': u'el-errata@oss.oracle.com', u'severity': u'Moderate', u'title': u' cvs security update', u'_ns': u'units_erratum', u'rights': u'Copyright 2012 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 6', u'reboot_suggested': False, u'type': u'security', u'pkglist': [{u'packages': [{u'src': None, u'name': u'cvs', u'sum': [u'md5', u'50356ac8494ed85cd22bf295d4ff9e83'], u'filename': u'cvs-1.11.23-11.el6_2.1.src.rpm', u'epoch': u'0', u'version': u'1.11.23', u'release': u'11.el6_2.1', u'arch': u'src'}, {u'src': None, u'name': u'cvs', u'sum': [u'md5', u'6817d2d79036c2d0a549ec818c831654'], u'filename': u'cvs-1.11.23-11.el6_2.1.x86_64.rpm', u'epoch': u'0', u'version': u'1.11.23', u'release': u'11.el6_2.1', u'arch': u'x86_64'}], u'name': u'ol6_x86_64_latest', u'short': u'ol6_x86_64_latest'}, {u'packages': [{u'src': None, u'name': u'cvs', u'sum': [u'md5', u'84c0dcaa0384b3e23c1f41323a4d5662'], u'filename': u'cvs-1.11.22-11.el5_8.1.src.rpm', u'epoch': u'0', u'version': u'1.11.22', u'release': u'11.el5_8.1', u'arch': u'src'}, {u'src': None, u'name': u'cvs', u'sum': [u'md5', u'cdfc2af979f4d12986524c4c188ed23f'], u'filename': u'cvs-1.11.22-11.el5_8.1.x86_64.rpm', u'epoch': u'0', u'version': u'1.11.22', u'release': u'11.el5_8.1', u'arch': u'x86_64'}, {u'src': None, u'name': u'cvs-inetd', u'sum': [u'md5', u'a3e6225b426939a1d71be62b7c871dea'], u'filename': u'cvs-inetd-1.11.22-11.el5_8.1.x86_64.rpm', u'epoch': u'0', u'version': u'1.11.22', u'release': u'11.el5_8.1', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u'[1.6.0.0-1.25.1.10.6.0.1.el5_8]\n- Add oracle-enterprise.patch\n\n[1:1.6.0.0-1.25.1.10.6]\n- Updated to IcedTea6 1.10.6\n- Resolves: rhbz#787142\n- Security fixes\n - S7082299: Fix in AtomicReferenceArray\n - S7088367: Fix issues in java sound\n - S7110683: Issues with some KeyboardFocusManager method\n - S7110687: Issues with TimeZone class\n - S7110700: Enhance exception throwing mechanism in ObjectStreamClass\n - S7110704: Issues with some method in corba\n - S7112642: Incorrect checking for graphics rendering object\n - S7118283: Better input parameter checking in zip file processing\n - S7126960: Add property to limit number of request headers to the HTTP Server\n- Bug fixes\n - RH580478: Desktop files should not use hardcoded path\n- Removed and deleted upstreamed patch7 - name-rmi-fix.patch\n- Removed and deleted upstreamed Hugepages patches:\n - Source100: 7034464-hugepage.patch\n - Source101: 7037939-hugepage.patch\n - Source102: 7043564-hugepage.patch', u'issued': u'2012-02-28', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELSA-2012-0322.html', u'type': u'self', u'id': None, u'title': u'ELSA-2012-0322'}, {u'href': u'http://linux.oracle.com/cve/CVE-2011-3563.html', u'type': u'cve', u'id': u'CVE-2011-3563', u'title': u'CVE-2011-3563'}, {u'href': u'http://linux.oracle.com/cve/CVE-2012-0497.html', u'type': u'cve', u'id': u'CVE-2012-0497', u'title': u'CVE-2012-0497'}, {u'href': u'http://linux.oracle.com/cve/CVE-2012-0501.html', u'type': u'cve', u'id': u'CVE-2012-0501', u'title': u'CVE-2012-0501'}, {u'href': u'http://linux.oracle.com/cve/CVE-2012-0502.html', u'type': u'cve', u'id': u'CVE-2012-0502', u'title': u'CVE-2012-0502'}, {u'href': u'http://linux.oracle.com/cve/CVE-2012-0503.html', u'type': u'cve', u'id': u'CVE-2012-0503', u'title': u'CVE-2012-0503'}, {u'href': u'http://linux.oracle.com/cve/CVE-2012-0505.html', u'type': u'cve', u'id': u'CVE-2012-0505', u'title': u'CVE-2012-0505'}, {u'href': u'http://linux.oracle.com/cve/CVE-2012-0506.html', u'type': u'cve', u'id': u'CVE-2012-0506', u'title': u'CVE-2012-0506'}, {u'href': u'http://linux.oracle.com/cve/CVE-2011-3571.html', u'type': u'cve', u'id': u'CVE-2011-3571', u'title': u'CVE-2011-3571'}, {u'href': u'http://linux.oracle.com/cve/CVE-2011-5035.html', u'type': u'cve', u'id': u'CVE-2011-5035', u'title': u'CVE-2011-5035'}, {u'href': u'http://linux.oracle.com/cve/CVE-2012-0507.html', u'type': u'cve', u'id': u'CVE-2012-0507', u'title': u'CVE-2012-0507'}], u'_content_type_id': u'erratum', u'_id': u'9adc5f81-6c57-4956-98d0-e7b238ccfa04', u'from': u'el-errata@oss.oracle.com', u'severity': u'Important', u'title': u' java-1.6.0-openjdk security update', u'_ns': u'units_erratum', u'rights': u'Copyright 2012 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 5', u'reboot_suggested': False, u'type': u'security', u'pkglist': [{u'packages': [{u'src': None, u'name': u'java-1.6.0-openjdk', u'sum': [u'md5', u'9b4a987ca9122a2a992c68d87a149dc2'], u'filename': u'java-1.6.0-openjdk-1.6.0.0-1.25.1.10.6.0.1.el5_8.src.rpm', u'epoch': u'1', u'version': u'1.6.0.0', u'release': u'1.25.1.10.6.0.1.el5_8', u'arch': u'src'}, {u'src': None, u'name': u'java-1.6.0-openjdk', u'sum': [u'md5', u'5ca40cfbcd14688adfddb8cc4aa4924e'], u'filename': u'java-1.6.0-openjdk-1.6.0.0-1.25.1.10.6.0.1.el5_8.x86_64.rpm', u'epoch': u'1', u'version': u'1.6.0.0', u'release': u'1.25.1.10.6.0.1.el5_8', u'arch': u'x86_64'}, {u'src': None, u'name': u'java-1.6.0-openjdk-demo', u'sum': [u'md5', u'8443318383ef8eb7279958fcc32103b0'], u'filename': u'java-1.6.0-openjdk-demo-1.6.0.0-1.25.1.10.6.0.1.el5_8.x86_64.rpm', u'epoch': u'1', u'version': u'1.6.0.0', u'release': u'1.25.1.10.6.0.1.el5_8', u'arch': u'x86_64'}, {u'src': None, u'name': u'java-1.6.0-openjdk-devel', u'sum': [u'md5', u'cb13ae4139088e727019ca61a354ceed'], u'filename': u'java-1.6.0-openjdk-devel-1.6.0.0-1.25.1.10.6.0.1.el5_8.x86_64.rpm', u'epoch': u'1', u'version': u'1.6.0.0', u'release': u'1.25.1.10.6.0.1.el5_8', u'arch': u'x86_64'}, {u'src': None, u'name': u'java-1.6.0-openjdk-javadoc', u'sum': [u'md5', u'1595664b3b1aefb474943ba588bff7b5'], u'filename': u'java-1.6.0-openjdk-javadoc-1.6.0.0-1.25.1.10.6.0.1.el5_8.x86_64.rpm', u'epoch': u'1', u'version': u'1.6.0.0', u'release': u'1.25.1.10.6.0.1.el5_8', u'arch': u'x86_64'}, {u'src': None, u'name': u'java-1.6.0-openjdk-src', u'sum': [u'md5', u'e465d34dad875cdf5c52841dee62854d'], u'filename': u'java-1.6.0-openjdk-src-1.6.0.0-1.25.1.10.6.0.1.el5_8.x86_64.rpm', u'epoch': u'1', u'version': u'1.6.0.0', u'release': u'1.25.1.10.6.0.1.el5_8', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u"[2.2.3-63.0.1.el5_8.1]\n- Fix mod_ssl always performing full renegotiation (orabug 12423387)\n- replace index.html with Oracle's index page oracle_index.html\n- update vstring and distro in specfile\n\n[2.2.3-63.1]\n- add security fixes for CVE-2012-0053, CVE-2012-0031, CVE-2011-3607 (#787596)\t\n- remove patch for CVE-2011-3638, obviated by fix for CVE-2011-3639", u'issued': u'2012-02-28', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELSA-2012-0323.html', u'type': u'self', u'id': None, u'title': u'ELSA-2012-0323'}, {u'href': u'http://linux.oracle.com/cve/CVE-2011-3607.html', u'type': u'cve', u'id': u'CVE-2011-3607', u'title': u'CVE-2011-3607'}, {u'href': u'http://linux.oracle.com/cve/CVE-2011-3639.html', u'type': u'cve', u'id': u'CVE-2011-3639', u'title': u'CVE-2011-3639'}, {u'href': u'http://linux.oracle.com/cve/CVE-2012-0031.html', u'type': u'cve', u'id': u'CVE-2012-0031', u'title': u'CVE-2012-0031'}, {u'href': u'http://linux.oracle.com/cve/CVE-2012-0053.html', u'type': u'cve', u'id': u'CVE-2012-0053', u'title': u'CVE-2012-0053'}], u'_content_type_id': u'erratum', u'_id': u'47c1fadd-689f-43ae-b64a-104537428328', u'from': u'el-errata@oss.oracle.com', u'severity': u'Moderate', u'title': u' httpd security update', u'_ns': u'units_erratum', u'rights': u'Copyright 2012 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 5', u'reboot_suggested': False, u'type': u'security', u'pkglist': [{u'packages': [{u'src': None, u'name': u'httpd', u'sum': [u'md5', u'c575673506c3913505b8efddb49ebfa1'], u'filename': u'httpd-2.2.3-63.0.1.el5_8.1.src.rpm', u'epoch': u'0', u'version': u'2.2.3', u'release': u'63.0.1.el5_8.1', u'arch': u'src'}, {u'src': None, u'name': u'httpd', u'sum': [u'md5', u'e70ffec978d1e6f9624169c6fc735fa6'], u'filename': u'httpd-2.2.3-63.0.1.el5_8.1.x86_64.rpm', u'epoch': u'0', u'version': u'2.2.3', u'release': u'63.0.1.el5_8.1', u'arch': u'x86_64'}, {u'src': None, u'name': u'httpd-devel', u'sum': [u'md5', u'380d549acc79c2d0f2cb162e508f1fbd'], u'filename': u'httpd-devel-2.2.3-63.0.1.el5_8.1.i386.rpm', u'epoch': u'0', u'version': u'2.2.3', u'release': u'63.0.1.el5_8.1', u'arch': u'i386'}, {u'src': None, u'name': u'httpd-devel', u'sum': [u'md5', u'85faba25a8a1a1d64fc388c8fc2e8f49'], u'filename': u'httpd-devel-2.2.3-63.0.1.el5_8.1.x86_64.rpm', u'epoch': u'0', u'version': u'2.2.3', u'release': u'63.0.1.el5_8.1', u'arch': u'x86_64'}, {u'src': None, u'name': u'httpd-manual', u'sum': [u'md5', u'c0452f81e9ebc686915990399ac2db2c'], u'filename': u'httpd-manual-2.2.3-63.0.1.el5_8.1.x86_64.rpm', u'epoch': u'0', u'version': u'2.2.3', u'release': u'63.0.1.el5_8.1', u'arch': u'x86_64'}, {u'src': None, u'name': u'mod_ssl', u'sum': [u'md5', u'242048c5018c026ae9652dc1e610c827'], u'filename': u'mod_ssl-2.2.3-63.0.1.el5_8.1.x86_64.rpm', u'epoch': u'1', u'version': u'2.2.3', u'release': u'63.0.1.el5_8.1', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u'[2.7.6-4.0.1.el6_2.4]\n- Update doc/redhat.gif in tarball\n- Add libxml2-oracle-enterprise.patch and update logos in tarball\n\n[2.7.6-4.el6_2.4]\n- remove chunk in patch related to configure.in as it breaks rebuild\n- Resolves: rhbz#788845\n\n[2.7.6-4.el6_2.3]\n- fix previous build to force compilation of randomization code\n- Resolves: rhbz#788845\n\n[2.7.6-4.el6_2.2]\n- adds randomization to hash and dict structures CVE-2012-0841\n- Resolves: rhbz#788845', u'issued': u'2012-02-21', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELSA-2012-0324.html', u'type': u'self', u'id': None, u'title': u'ELSA-2012-0324'}, {u'href': u'http://linux.oracle.com/cve/CVE-2012-0841.html', u'type': u'cve', u'id': u'CVE-2012-0841', u'title': u'CVE-2012-0841'}], u'_content_type_id': u'erratum', u'_id': u'cd156bf6-f9fe-4801-9f29-245ff36bbfaa', u'from': u'el-errata@oss.oracle.com', u'severity': u'Moderate', u'title': u' libxml2 security update', u'_ns': u'units_erratum', u'rights': u'Copyright 2012 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 6', u'reboot_suggested': False, u'type': u'security', u'pkglist': [{u'packages': [{u'src': None, u'name': u'libxml2', u'sum': [u'md5', u'b672d75f9a09833592d068507f6f8823'], u'filename': u'libxml2-2.7.6-4.0.1.el6_2.4.i686.rpm', u'epoch': u'0', u'version': u'2.7.6', u'release': u'4.0.1.el6_2.4', u'arch': u'i686'}, {u'src': None, u'name': u'libxml2', u'sum': [u'md5', u'e8f0d089d85d4528f154357e1467585a'], u'filename': u'libxml2-2.7.6-4.0.1.el6_2.4.src.rpm', u'epoch': u'0', u'version': u'2.7.6', u'release': u'4.0.1.el6_2.4', u'arch': u'src'}, {u'src': None, u'name': u'libxml2', u'sum': [u'md5', u'1006a9369df3f6cbb292721ebbd21410'], u'filename': u'libxml2-2.7.6-4.0.1.el6_2.4.x86_64.rpm', u'epoch': u'0', u'version': u'2.7.6', u'release': u'4.0.1.el6_2.4', u'arch': u'x86_64'}, {u'src': None, u'name': u'libxml2-devel', u'sum': [u'md5', u'9373fee7891485697a84a3b840f0a8ca'], u'filename': u'libxml2-devel-2.7.6-4.0.1.el6_2.4.i686.rpm', u'epoch': u'0', u'version': u'2.7.6', u'release': u'4.0.1.el6_2.4', u'arch': u'i686'}, {u'src': None, u'name': u'libxml2-devel', u'sum': [u'md5', u'937be13f2a8ff3682939666ce71de45e'], u'filename': u'libxml2-devel-2.7.6-4.0.1.el6_2.4.x86_64.rpm', u'epoch': u'0', u'version': u'2.7.6', u'release': u'4.0.1.el6_2.4', u'arch': u'x86_64'}, {u'src': None, u'name': u'libxml2-python', u'sum': [u'md5', u'7305b176a3772242a1f7f0942854e944'], u'filename': u'libxml2-python-2.7.6-4.0.1.el6_2.4.x86_64.rpm', u'epoch': u'0', u'version': u'2.7.6', u'release': u'4.0.1.el6_2.4', u'arch': u'x86_64'}, {u'src': None, u'name': u'libxml2-static', u'sum': [u'md5', u'cf90a9b60a38d4e53dc4f02eabe90f43'], u'filename': u'libxml2-static-2.7.6-4.0.1.el6_2.4.x86_64.rpm', u'epoch': u'0', u'version': u'2.7.6', u'release': u'4.0.1.el6_2.4', u'arch': u'x86_64'}], u'name': u'ol6_x86_64_latest', u'short': u'ol6_x86_64_latest'}, {u'packages': [{u'src': None, u'name': u'libxml2', u'sum': [u'md5', u'06468ea896fed0bdf33cd964f476dadb'], u'filename': u'libxml2-2.6.26-2.1.15.0.1.el5_8.2.i386.rpm', u'epoch': u'0', u'version': u'2.6.26', u'release': u'2.1.15.0.1.el5_8.2', u'arch': u'i386'}, {u'src': None, u'name': u'libxml2', u'sum': [u'md5', u'8159952d73de93dc38194792f7da5748'], u'filename': u'libxml2-2.6.26-2.1.15.0.1.el5_8.2.src.rpm', u'epoch': u'0', u'version': u'2.6.26', u'release': u'2.1.15.0.1.el5_8.2', u'arch': u'src'}, {u'src': None, u'name': u'libxml2', u'sum': [u'md5', u'0481b87b7812f1f30483449cb4f3e9d0'], u'filename': u'libxml2-2.6.26-2.1.15.0.1.el5_8.2.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.26', u'release': u'2.1.15.0.1.el5_8.2', u'arch': u'x86_64'}, {u'src': None, u'name': u'libxml2-devel', u'sum': [u'md5', u'98aae7ff13b3e80ea51dfcce37cbcbd9'], u'filename': u'libxml2-devel-2.6.26-2.1.15.0.1.el5_8.2.i386.rpm', u'epoch': u'0', u'version': u'2.6.26', u'release': u'2.1.15.0.1.el5_8.2', u'arch': u'i386'}, {u'src': None, u'name': u'libxml2-devel', u'sum': [u'md5', u'77b463ab65144fbd148762a2bf8cd3fe'], u'filename': u'libxml2-devel-2.6.26-2.1.15.0.1.el5_8.2.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.26', u'release': u'2.1.15.0.1.el5_8.2', u'arch': u'x86_64'}, {u'src': None, u'name': u'libxml2-python', u'sum': [u'md5', u'ec84424aea077afbc14bbeea34f02d04'], u'filename': u'libxml2-python-2.6.26-2.1.15.0.1.el5_8.2.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.26', u'release': u'2.1.15.0.1.el5_8.2', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u'[3.0.33-3.38.el5]\n- Security release, fixes CVE-2012-0870\n- resolves: #795718', u'issued': u'2012-02-28', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELSA-2012-0332.html', u'type': u'self', u'id': None, u'title': u'ELSA-2012-0332'}, {u'href': u'http://linux.oracle.com/cve/CVE-2012-0870.html', u'type': u'cve', u'id': u'CVE-2012-0870', u'title': u'CVE-2012-0870'}], u'_content_type_id': u'erratum', u'_id': u'38bbea87-1f98-48af-b1fa-b1a56ed19b17', u'from': u'el-errata@oss.oracle.com', u'severity': u'Critical', u'title': u' samba security update', u'_ns': u'units_erratum', u'rights': u'Copyright 2012 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 5', u'reboot_suggested': False, u'type': u'security', u'pkglist': [{u'packages': [{u'src': None, u'name': u'libsmbclient', u'sum': [u'md5', u'58bb3d84bf5fad067d17c0de39f8640c'], u'filename': u'libsmbclient-3.0.33-3.38.el5_8.i386.rpm', u'epoch': u'0', u'version': u'3.0.33', u'release': u'3.38.el5_8', u'arch': u'i386'}, {u'src': None, u'name': u'libsmbclient', u'sum': [u'md5', u'745820cf008c4ade29da4cc845f5fbaa'], u'filename': u'libsmbclient-3.0.33-3.38.el5_8.x86_64.rpm', u'epoch': u'0', u'version': u'3.0.33', u'release': u'3.38.el5_8', u'arch': u'x86_64'}, {u'src': None, u'name': u'libsmbclient-devel', u'sum': [u'md5', u'80ab5c23bf1f23262aca0cd79f979b14'], u'filename': u'libsmbclient-devel-3.0.33-3.38.el5_8.i386.rpm', u'epoch': u'0', u'version': u'3.0.33', u'release': u'3.38.el5_8', u'arch': u'i386'}, {u'src': None, u'name': u'libsmbclient-devel', u'sum': [u'md5', u'7235e557d197a7ba074a5e42f01c175c'], u'filename': u'libsmbclient-devel-3.0.33-3.38.el5_8.x86_64.rpm', u'epoch': u'0', u'version': u'3.0.33', u'release': u'3.38.el5_8', u'arch': u'x86_64'}, {u'src': None, u'name': u'samba', u'sum': [u'md5', u'101a841613ae469aa11d365a322a11f0'], u'filename': u'samba-3.0.33-3.38.el5_8.src.rpm', u'epoch': u'0', u'version': u'3.0.33', u'release': u'3.38.el5_8', u'arch': u'src'}, {u'src': None, u'name': u'samba', u'sum': [u'md5', u'de6380d29a0dbe849ae780d5859152c1'], u'filename': u'samba-3.0.33-3.38.el5_8.x86_64.rpm', u'epoch': u'0', u'version': u'3.0.33', u'release': u'3.38.el5_8', u'arch': u'x86_64'}, {u'src': None, u'name': u'samba-client', u'sum': [u'md5', u'1176b4932a8e84ca3cde67786418cbc9'], u'filename': u'samba-client-3.0.33-3.38.el5_8.x86_64.rpm', u'epoch': u'0', u'version': u'3.0.33', u'release': u'3.38.el5_8', u'arch': u'x86_64'}, {u'src': None, u'name': u'samba-common', u'sum': [u'md5', u'd0cceccfcbffcbebe88bc44c380036e6'], u'filename': u'samba-common-3.0.33-3.38.el5_8.i386.rpm', u'epoch': u'0', u'version': u'3.0.33', u'release': u'3.38.el5_8', u'arch': u'i386'}, {u'src': None, u'name': u'samba-common', u'sum': [u'md5', u'56ba7277b51f75e5aebf30f2b4f0579e'], u'filename': u'samba-common-3.0.33-3.38.el5_8.x86_64.rpm', u'epoch': u'0', u'version': u'3.0.33', u'release': u'3.38.el5_8', u'arch': u'x86_64'}, {u'src': None, u'name': u'samba-swat', u'sum': [u'md5', u'aea45296a1eba1485fed137c6fed5c2b'], u'filename': u'samba-swat-3.0.33-3.38.el5_8.x86_64.rpm', u'epoch': u'0', u'version': u'3.0.33', u'release': u'3.38.el5_8', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u'[3.0.3-135.el5_8.2]\n- Fix broken timestamp log (rhbz 797836)\n\n[3.0.3-135.el5_8.1]\n- qemu-dm/e1000: bounds packet size against buffer size (rhbz 786862)\n- Use correct expansion in xen-network-common.sh (rhbz 797191)', u'issued': u'2012-03-07', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELSA-2012-0370.html', u'type': u'self', u'id': None, u'title': u'ELSA-2012-0370'}, {u'href': u'http://linux.oracle.com/cve/CVE-2012-0029.html', u'type': u'cve', u'id': u'CVE-2012-0029', u'title': u'CVE-2012-0029'}], u'_content_type_id': u'erratum', u'_id': u'd88d9131-0faa-4f50-ba4d-4d70aa7022d5', u'from': u'el-errata@oss.oracle.com', u'severity': u'Important', u'title': u' xen security and bug fix update', u'_ns': u'units_erratum', u'rights': u'Copyright 2012 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 5', u'reboot_suggested': False, u'type': u'security', u'pkglist': [{u'packages': [{u'src': None, u'name': u'xen', u'sum': [u'md5', u'37ac5d104b762ce3abd971844ab4a029'], u'filename': u'xen-3.0.3-135.el5_8.2.src.rpm', u'epoch': u'0', u'version': u'3.0.3', u'release': u'135.el5_8.2', u'arch': u'src'}, {u'src': None, u'name': u'xen', u'sum': [u'md5', u'98de0dc86faaa303581160a5fb2022fa'], u'filename': u'xen-3.0.3-135.el5_8.2.x86_64.rpm', u'epoch': u'0', u'version': u'3.0.3', u'release': u'135.el5_8.2', u'arch': u'x86_64'}, {u'src': None, u'name': u'xen-devel', u'sum': [u'md5', u'0f6f61739d5fd4e9ba5f6f98ed605263'], u'filename': u'xen-devel-3.0.3-135.el5_8.2.i386.rpm', u'epoch': u'0', u'version': u'3.0.3', u'release': u'135.el5_8.2', u'arch': u'i386'}, {u'src': None, u'name': u'xen-devel', u'sum': [u'md5', u'1e19b0064978e3ddb3aec840928550ae'], u'filename': u'xen-devel-3.0.3-135.el5_8.2.x86_64.rpm', u'epoch': u'0', u'version': u'3.0.3', u'release': u'135.el5_8.2', u'arch': u'x86_64'}, {u'src': None, u'name': u'xen-libs', u'sum': [u'md5', u'8af043415233bc03e30910534e55f137'], u'filename': u'xen-libs-3.0.3-135.el5_8.2.i386.rpm', u'epoch': u'0', u'version': u'3.0.3', u'release': u'135.el5_8.2', u'arch': u'i386'}, {u'src': None, u'name': u'xen-libs', u'sum': [u'md5', u'37c5d27f28a48e6fc87710708a30ba03'], u'filename': u'xen-libs-3.0.3-135.el5_8.2.x86_64.rpm', u'epoch': u'0', u'version': u'3.0.3', u'release': u'135.el5_8.2', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u'\t[1.6-5.0.1.el6_2]\n- remove doc/SystemTap_Beginners_Guide/en-US in tarball\n- comment bz683569.patch in specfile\n- remove buildtime dependency on package publican-redhat\n\n[1.6-5]\n- CVE-2012-0875', u'issued': u'2012-03-08', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELSA-2012-0376.html', u'type': u'self', u'id': None, u'title': u'ELSA-2012-0376'}, {u'href': u'http://linux.oracle.com/cve/CVE-2012-0875.html', u'type': u'cve', u'id': u'CVE-2012-0875', u'title': u'CVE-2012-0875'}], u'_content_type_id': u'erratum', u'_id': u'1024e4b8-b7a7-441f-90a3-1a3c4de46596', u'from': u'el-errata@oss.oracle.com', u'severity': u'Moderate', u'title': u' systemtap security update', u'_ns': u'units_erratum', u'rights': u'Copyright 2012 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 6', u'reboot_suggested': False, u'type': u'security', u'pkglist': [{u'packages': [{u'src': None, u'name': u'systemtap', u'sum': [u'md5', u'41b1697390da882bed96f897964686c0'], u'filename': u'systemtap-1.6-5.0.1.el6_2.src.rpm', u'epoch': u'0', u'version': u'1.6', u'release': u'5.0.1.el6_2', u'arch': u'src'}, {u'src': None, u'name': u'systemtap', u'sum': [u'md5', u'08e0f50e98e6b84ff5dc7495fbd2e786'], u'filename': u'systemtap-1.6-5.0.1.el6_2.x86_64.rpm', u'epoch': u'0', u'version': u'1.6', u'release': u'5.0.1.el6_2', u'arch': u'x86_64'}, {u'src': None, u'name': u'systemtap-grapher', u'sum': [u'md5', u'7d25dda5a7247390c299bf2a96bccbcf'], u'filename': u'systemtap-grapher-1.6-5.0.1.el6_2.x86_64.rpm', u'epoch': u'0', u'version': u'1.6', u'release': u'5.0.1.el6_2', u'arch': u'x86_64'}, {u'src': None, u'name': u'systemtap-initscript', u'sum': [u'md5', u'7b482ae8a53a44cdd47f97851003b135'], u'filename': u'systemtap-initscript-1.6-5.0.1.el6_2.x86_64.rpm', u'epoch': u'0', u'version': u'1.6', u'release': u'5.0.1.el6_2', u'arch': u'x86_64'}, {u'src': None, u'name': u'systemtap-runtime', u'sum': [u'md5', u'560fd938119ac619341d049c64c99f4a'], u'filename': u'systemtap-runtime-1.6-5.0.1.el6_2.x86_64.rpm', u'epoch': u'0', u'version': u'1.6', u'release': u'5.0.1.el6_2', u'arch': u'x86_64'}, {u'src': None, u'name': u'systemtap-sdt-devel', u'sum': [u'md5', u'1b3da56d2aa905038e77daf981e11163'], u'filename': u'systemtap-sdt-devel-1.6-5.0.1.el6_2.i686.rpm', u'epoch': u'0', u'version': u'1.6', u'release': u'5.0.1.el6_2', u'arch': u'i686'}, {u'src': None, u'name': u'systemtap-sdt-devel', u'sum': [u'md5', u'84a60f9179af5210101db8269d0aa861'], u'filename': u'systemtap-sdt-devel-1.6-5.0.1.el6_2.x86_64.rpm', u'epoch': u'0', u'version': u'1.6', u'release': u'5.0.1.el6_2', u'arch': u'x86_64'}, {u'src': None, u'name': u'systemtap-server', u'sum': [u'md5', u'aba67b2df6d6fdfe31bba8b137510af6'], u'filename': u'systemtap-server-1.6-5.0.1.el6_2.x86_64.rpm', u'epoch': u'0', u'version': u'1.6', u'release': u'5.0.1.el6_2', u'arch': u'x86_64'}, {u'src': None, u'name': u'systemtap-testsuite', u'sum': [u'md5', u'0deef852f48a1c3c7b63d38b6ee2c248'], u'filename': u'systemtap-testsuite-1.6-5.0.1.el6_2.x86_64.rpm', u'epoch': u'0', u'version': u'1.6', u'release': u'5.0.1.el6_2', u'arch': u'x86_64'}], u'name': u'ol6_x86_64_latest', u'short': u'ol6_x86_64_latest'}, {u'packages': [{u'src': None, u'name': u'systemtap', u'sum': [u'md5', u'bcedd0255947dc3ba702db89bb662b27'], u'filename': u'systemtap-1.6-7.el5_8.src.rpm', u'epoch': u'0', u'version': u'1.6', u'release': u'7.el5_8', u'arch': u'src'}, {u'src': None, u'name': u'systemtap', u'sum': [u'md5', u'a385eb06ae3aa43e96e7dbe8e6fbbd17'], u'filename': u'systemtap-1.6-7.el5_8.x86_64.rpm', u'epoch': u'0', u'version': u'1.6', u'release': u'7.el5_8', u'arch': u'x86_64'}, {u'src': None, u'name': u'systemtap-initscript', u'sum': [u'md5', u'2bed58307f2b21e9e0c5a172cf88d3cf'], u'filename': u'systemtap-initscript-1.6-7.el5_8.x86_64.rpm', u'epoch': u'0', u'version': u'1.6', u'release': u'7.el5_8', u'arch': u'x86_64'}, {u'src': None, u'name': u'systemtap-runtime', u'sum': [u'md5', u'ac65dd8f7f331df515bdf2d7b09fe9d3'], u'filename': u'systemtap-runtime-1.6-7.el5_8.x86_64.rpm', u'epoch': u'0', u'version': u'1.6', u'release': u'7.el5_8', u'arch': u'x86_64'}, {u'src': None, u'name': u'systemtap-sdt-devel', u'sum': [u'md5', u'f988283a0af22cc59fcd937ebbe09edf'], u'filename': u'systemtap-sdt-devel-1.6-7.el5_8.i386.rpm', u'epoch': u'0', u'version': u'1.6', u'release': u'7.el5_8', u'arch': u'i386'}, {u'src': None, u'name': u'systemtap-sdt-devel', u'sum': [u'md5', u'16600065d94242a303ecc131bab410a4'], u'filename': u'systemtap-sdt-devel-1.6-7.el5_8.x86_64.rpm', u'epoch': u'0', u'version': u'1.6', u'release': u'7.el5_8', u'arch': u'x86_64'}, {u'src': None, u'name': u'systemtap-server', u'sum': [u'md5', u'e489fab284c63fafd67289f5bcbc527a'], u'filename': u'systemtap-server-1.6-7.el5_8.x86_64.rpm', u'epoch': u'0', u'version': u'1.6', u'release': u'7.el5_8', u'arch': u'x86_64'}, {u'src': None, u'name': u'systemtap-testsuite', u'sum': [u'md5', u'1eb051db45212042120e69fed56fe978'], u'filename': u'systemtap-testsuite-1.6-7.el5_8.x86_64.rpm', u'epoch': u'0', u'version': u'1.6', u'release': u'7.el5_8', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u'firefox:\n\n[10.0.3-1.0.1.el6_2]\n- Add firefox-oracle-default-prefs.js and remove the corresponding Red Hat ones\n\n[10.0.3-1]\n- Update to 10.0.3 ESR\n\nxulrunner:\n\n[10.0.3-1.0.1.el6_2]\n- Replace xulrunner-redhat-default-prefs.js with\n- xulrunner-oracle-default-prefs.js\n\n[10.0.3-1]\n- Update to 10.0.3 ESR', u'issued': u'2012-03-14', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELSA-2012-0387.html', u'type': u'self', u'id': None, u'title': u'ELSA-2012-0387'}, {u'href': u'http://linux.oracle.com/cve/CVE-2012-0451.html', u'type': u'cve', u'id': u'CVE-2012-0451', u'title': u'CVE-2012-0451'}, {u'href': u'http://linux.oracle.com/cve/CVE-2012-0455.html', u'type': u'cve', u'id': u'CVE-2012-0455', u'title': u'CVE-2012-0455'}, {u'href': u'http://linux.oracle.com/cve/CVE-2012-0456.html', u'type': u'cve', u'id': u'CVE-2012-0456', u'title': u'CVE-2012-0456'}, {u'href': u'http://linux.oracle.com/cve/CVE-2012-0457.html', u'type': u'cve', u'id': u'CVE-2012-0457', u'title': u'CVE-2012-0457'}, {u'href': u'http://linux.oracle.com/cve/CVE-2012-0458.html', u'type': u'cve', u'id': u'CVE-2012-0458', u'title': u'CVE-2012-0458'}, {u'href': u'http://linux.oracle.com/cve/CVE-2012-0459.html', u'type': u'cve', u'id': u'CVE-2012-0459', u'title': u'CVE-2012-0459'}, {u'href': u'http://linux.oracle.com/cve/CVE-2012-0460.html', u'type': u'cve', u'id': u'CVE-2012-0460', u'title': u'CVE-2012-0460'}, {u'href': u'http://linux.oracle.com/cve/CVE-2012-0461.html', u'type': u'cve', u'id': u'CVE-2012-0461', u'title': u'CVE-2012-0461'}, {u'href': u'http://linux.oracle.com/cve/CVE-2012-0462.html', u'type': u'cve', u'id': u'CVE-2012-0462', u'title': u'CVE-2012-0462'}, {u'href': u'http://linux.oracle.com/cve/CVE-2012-0464.html', u'type': u'cve', u'id': u'CVE-2012-0464', u'title': u'CVE-2012-0464'}], u'_content_type_id': u'erratum', u'_id': u'ff4847a2-b2c1-454a-acca-e15e107d3767', u'from': u'el-errata@oss.oracle.com', u'severity': u'Critical', u'title': u' firefox security and bug fix update', u'_ns': u'units_erratum', u'rights': u'Copyright 2012 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 6', u'reboot_suggested': False, u'type': u'security', u'pkglist': [{u'packages': [{u'src': None, u'name': u'firefox', u'sum': [u'md5', u'874d9f551e75998103c3495697f0c107'], u'filename': u'firefox-10.0.3-1.0.1.el6_2.i686.rpm', u'epoch': u'0', u'version': u'10.0.3', u'release': u'1.0.1.el6_2', u'arch': u'i686'}, {u'src': None, u'name': u'firefox', u'sum': [u'md5', u'582e54a4a6b713691c214c619acedd91'], u'filename': u'firefox-10.0.3-1.0.1.el6_2.src.rpm', u'epoch': u'0', u'version': u'10.0.3', u'release': u'1.0.1.el6_2', u'arch': u'src'}, {u'src': None, u'name': u'firefox', u'sum': [u'md5', u'e1eb6857925aa45ac02746ecce000d7d'], u'filename': u'firefox-10.0.3-1.0.1.el6_2.x86_64.rpm', u'epoch': u'0', u'version': u'10.0.3', u'release': u'1.0.1.el6_2', u'arch': u'x86_64'}, {u'src': None, u'name': u'xulrunner', u'sum': [u'md5', u'113053e62d3c31ac10fc09cd10daa2f1'], u'filename': u'xulrunner-10.0.3-1.0.1.el6_2.i686.rpm', u'epoch': u'0', u'version': u'10.0.3', u'release': u'1.0.1.el6_2', u'arch': u'i686'}, {u'src': None, u'name': u'xulrunner', u'sum': [u'md5', u'fdcb75031a9cb51c84edebf5fe4d7cde'], u'filename': u'xulrunner-10.0.3-1.0.1.el6_2.src.rpm', u'epoch': u'0', u'version': u'10.0.3', u'release': u'1.0.1.el6_2', u'arch': u'src'}, {u'src': None, u'name': u'xulrunner', u'sum': [u'md5', u'008d1914d6399ea3544836b768904891'], u'filename': u'xulrunner-10.0.3-1.0.1.el6_2.x86_64.rpm', u'epoch': u'0', u'version': u'10.0.3', u'release': u'1.0.1.el6_2', u'arch': u'x86_64'}, {u'src': None, u'name': u'xulrunner-devel', u'sum': [u'md5', u'62dfe4aed60e72285cbd98d745062467'], u'filename': u'xulrunner-devel-10.0.3-1.0.1.el6_2.i686.rpm', u'epoch': u'0', u'version': u'10.0.3', u'release': u'1.0.1.el6_2', u'arch': u'i686'}, {u'src': None, u'name': u'xulrunner-devel', u'sum': [u'md5', u'cbce87cdd7e51ea3baccd771d2fcc4af'], u'filename': u'xulrunner-devel-10.0.3-1.0.1.el6_2.x86_64.rpm', u'epoch': u'0', u'version': u'10.0.3', u'release': u'1.0.1.el6_2', u'arch': u'x86_64'}], u'name': u'ol6_x86_64_latest', u'short': u'ol6_x86_64_latest'}, {u'packages': [{u'src': None, u'name': u'firefox', u'sum': [u'md5', u'56b3f5008a8afb28cc30e724ed5c0899'], u'filename': u'firefox-10.0.3-1.0.1.el5_8.i386.rpm', u'epoch': u'0', u'version': u'10.0.3', u'release': u'1.0.1.el5_8', u'arch': u'i386'}, {u'src': None, u'name': u'firefox', u'sum': [u'md5', u'a7f163ac8577591fa9d13854ccea4900'], u'filename': u'firefox-10.0.3-1.0.1.el5_8.src.rpm', u'epoch': u'0', u'version': u'10.0.3', u'release': u'1.0.1.el5_8', u'arch': u'src'}, {u'src': None, u'name': u'firefox', u'sum': [u'md5', u'32aeb598f92173a133e4a6b343938d18'], u'filename': u'firefox-10.0.3-1.0.1.el5_8.x86_64.rpm', u'epoch': u'0', u'version': u'10.0.3', u'release': u'1.0.1.el5_8', u'arch': u'x86_64'}, {u'src': None, u'name': u'xulrunner', u'sum': [u'md5', u'7cc2ad11bf918c3bcfe14b6ccc41fa6b'], u'filename': u'xulrunner-10.0.3-1.0.1.el5_8.i386.rpm', u'epoch': u'0', u'version': u'10.0.3', u'release': u'1.0.1.el5_8', u'arch': u'i386'}, {u'src': None, u'name': u'xulrunner', u'sum': [u'md5', u'5908fb15cd3198c9af6928ea71eeb0ba'], u'filename': u'xulrunner-10.0.3-1.0.1.el5_8.src.rpm', u'epoch': u'0', u'version': u'10.0.3', u'release': u'1.0.1.el5_8', u'arch': u'src'}, {u'src': None, u'name': u'xulrunner', u'sum': [u'md5', u'ceeae36655991173eebf16ac287c8b4d'], u'filename': u'xulrunner-10.0.3-1.0.1.el5_8.x86_64.rpm', u'epoch': u'0', u'version': u'10.0.3', u'release': u'1.0.1.el5_8', u'arch': u'x86_64'}, {u'src': None, u'name': u'xulrunner-devel', u'sum': [u'md5', u'a6950343469bb086dbf8e9bd0fd18b5e'], u'filename': u'xulrunner-devel-10.0.3-1.0.1.el5_8.i386.rpm', u'epoch': u'0', u'version': u'10.0.3', u'release': u'1.0.1.el5_8', u'arch': u'i386'}, {u'src': None, u'name': u'xulrunner-devel', u'sum': [u'md5', u'af56ae72628c19db13790563b0acfd85'], u'filename': u'xulrunner-devel-10.0.3-1.0.1.el5_8.x86_64.rpm', u'epoch': u'0', u'version': u'10.0.3', u'release': u'1.0.1.el5_8', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u'[2.5-81.el5_8.1]\n- Add dist tag\n[when building file lists (#784646).]\n- Avoid nargs integer overflow which could be used to bypass FORTIFY_SOURCE (#794813)', u'issued': u'2012-03-19', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELSA-2012-0397.html', u'type': u'self', u'id': None, u'title': u'ELSA-2012-0397'}, {u'href': u'http://linux.oracle.com/cve/CVE-2012-0864.html', u'type': u'cve', u'id': u'CVE-2012-0864', u'title': u'CVE-2012-0864'}], u'_content_type_id': u'erratum', u'_id': u'99cd39db-a8b4-4e48-b980-d6fd6368d4d8', u'from': u'el-errata@oss.oracle.com', u'severity': u'Moderate', u'title': u' glibc security update', u'_ns': u'units_erratum', u'rights': u'Copyright 2012 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 5', u'reboot_suggested': False, u'type': u'security', u'pkglist': [{u'packages': [{u'src': None, u'name': u'glibc', u'sum': [u'md5', u'86eee071101d7610667706506aa90858'], u'filename': u'glibc-2.5-81.el5_8.1.i686.rpm', u'epoch': u'0', u'version': u'2.5', u'release': u'81.el5_8.1', u'arch': u'i686'}, {u'src': None, u'name': u'glibc', u'sum': [u'md5', u'956f259d01339be75aa63e0700c924a1'], u'filename': u'glibc-2.5-81.el5_8.1.src.rpm', u'epoch': u'0', u'version': u'2.5', u'release': u'81.el5_8.1', u'arch': u'src'}, {u'src': None, u'name': u'glibc', u'sum': [u'md5', u'fb535456f722bba3141bd381b75f6abd'], u'filename': u'glibc-2.5-81.el5_8.1.x86_64.rpm', u'epoch': u'0', u'version': u'2.5', u'release': u'81.el5_8.1', u'arch': u'x86_64'}, {u'src': None, u'name': u'glibc-common', u'sum': [u'md5', u'e54585de6982ada97189c1746963ee67'], u'filename': u'glibc-common-2.5-81.el5_8.1.x86_64.rpm', u'epoch': u'0', u'version': u'2.5', u'release': u'81.el5_8.1', u'arch': u'x86_64'}, {u'src': None, u'name': u'glibc-devel', u'sum': [u'md5', u'96b67da7ddcfb3a29e60c3079527738e'], u'filename': u'glibc-devel-2.5-81.el5_8.1.i386.rpm', u'epoch': u'0', u'version': u'2.5', u'release': u'81.el5_8.1', u'arch': u'i386'}, {u'src': None, u'name': u'glibc-devel', u'sum': [u'md5', u'a51cae34292ea2c5ca868a59fe673fa1'], u'filename': u'glibc-devel-2.5-81.el5_8.1.x86_64.rpm', u'epoch': u'0', u'version': u'2.5', u'release': u'81.el5_8.1', u'arch': u'x86_64'}, {u'src': None, u'name': u'glibc-headers', u'sum': [u'md5', u'9d4abb5cfea0b3aac0477048fab19251'], u'filename': u'glibc-headers-2.5-81.el5_8.1.x86_64.rpm', u'epoch': u'0', u'version': u'2.5', u'release': u'81.el5_8.1', u'arch': u'x86_64'}, {u'src': None, u'name': u'glibc-utils', u'sum': [u'md5', u'9b4413c7274559fc7d96383c5ff532a3'], u'filename': u'glibc-utils-2.5-81.el5_8.1.x86_64.rpm', u'epoch': u'0', u'version': u'2.5', u'release': u'81.el5_8.1', u'arch': u'x86_64'}, {u'src': None, u'name': u'nscd', u'sum': [u'md5', u'0c4848b224f8bf62f44f29343d90a6d1'], u'filename': u'nscd-2.5-81.el5_8.1.x86_64.rpm', u'epoch': u'0', u'version': u'2.5', u'release': u'81.el5_8.1', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u'[2:1.2.48-1]\n- Update to libpng 1.2.48, for minor security issues (CVE-2011-3045)\nResolves: #801663', u'issued': u'2012-03-20', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELSA-2012-0407.html', u'type': u'self', u'id': None, u'title': u'ELSA-2012-0407'}, {u'href': u'http://linux.oracle.com/cve/CVE-2011-3045.html', u'type': u'cve', u'id': u'CVE-2011-3045', u'title': u'CVE-2011-3045'}], u'_content_type_id': u'erratum', u'_id': u'c1c8d556-d319-460e-bcad-da96136d7ab4', u'from': u'el-errata@oss.oracle.com', u'severity': u'Moderate', u'title': u' libpng security update', u'_ns': u'units_erratum', u'rights': u'Copyright 2012 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 6', u'reboot_suggested': False, u'type': u'security', u'pkglist': [{u'packages': [{u'src': None, u'name': u'libpng', u'sum': [u'md5', u'904dca5cf9cfb981c854e1a9f5a74b89'], u'filename': u'libpng-1.2.48-1.el6_2.i686.rpm', u'epoch': u'2', u'version': u'1.2.48', u'release': u'1.el6_2', u'arch': u'i686'}, {u'src': None, u'name': u'libpng', u'sum': [u'md5', u'223bf0510739f348b14317250d017733'], u'filename': u'libpng-1.2.48-1.el6_2.src.rpm', u'epoch': u'2', u'version': u'1.2.48', u'release': u'1.el6_2', u'arch': u'src'}, {u'src': None, u'name': u'libpng', u'sum': [u'md5', u'eef280818c93f9cbd632703dc1c59390'], u'filename': u'libpng-1.2.48-1.el6_2.x86_64.rpm', u'epoch': u'2', u'version': u'1.2.48', u'release': u'1.el6_2', u'arch': u'x86_64'}, {u'src': None, u'name': u'libpng-devel', u'sum': [u'md5', u'02bf8740b68114143b25b38968ad14f9'], u'filename': u'libpng-devel-1.2.48-1.el6_2.i686.rpm', u'epoch': u'2', u'version': u'1.2.48', u'release': u'1.el6_2', u'arch': u'i686'}, {u'src': None, u'name': u'libpng-devel', u'sum': [u'md5', u'f37028569386775d5f6744748b601b19'], u'filename': u'libpng-devel-1.2.48-1.el6_2.x86_64.rpm', u'epoch': u'2', u'version': u'1.2.48', u'release': u'1.el6_2', u'arch': u'x86_64'}, {u'src': None, u'name': u'libpng-static', u'sum': [u'md5', u'045b272819d68516aee727011117e18d'], u'filename': u'libpng-static-1.2.48-1.el6_2.x86_64.rpm', u'epoch': u'2', u'version': u'1.2.48', u'release': u'1.el6_2', u'arch': u'x86_64'}], u'name': u'ol6_x86_64_latest', u'short': u'ol6_x86_64_latest'}, {u'packages': [{u'src': None, u'name': u'libpng', u'sum': [u'md5', u'5c485506d11c01d8d286e0ba04d7462b'], u'filename': u'libpng-1.2.10-16.el5_8.i386.rpm', u'epoch': u'2', u'version': u'1.2.10', u'release': u'16.el5_8', u'arch': u'i386'}, {u'src': None, u'name': u'libpng', u'sum': [u'md5', u'5a9d40edfca1040096fd9fb0ba5b20ff'], u'filename': u'libpng-1.2.10-16.el5_8.src.rpm', u'epoch': u'2', u'version': u'1.2.10', u'release': u'16.el5_8', u'arch': u'src'}, {u'src': None, u'name': u'libpng', u'sum': [u'md5', u'd65330e100e95d14a5249943b3c6e03b'], u'filename': u'libpng-1.2.10-16.el5_8.x86_64.rpm', u'epoch': u'2', u'version': u'1.2.10', u'release': u'16.el5_8', u'arch': u'x86_64'}, {u'src': None, u'name': u'libpng-devel', u'sum': [u'md5', u'c84cf0105ba55f9a65042125cdbde994'], u'filename': u'libpng-devel-1.2.10-16.el5_8.i386.rpm', u'epoch': u'2', u'version': u'1.2.10', u'release': u'16.el5_8', u'arch': u'i386'}, {u'src': None, u'name': u'libpng-devel', u'sum': [u'md5', u'8efd1568bfb04754b68ef01712fbe964'], u'filename': u'libpng-devel-1.2.10-16.el5_8.x86_64.rpm', u'epoch': u'2', u'version': u'1.2.10', u'release': u'16.el5_8', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u'[1.0.0-20.3]\n- fix problem with the SGC restart patch that might terminate handshake\n incorrectly\n- fix for CVE-2012-0884 - MMA weakness in CMS and PKCS#7 code (#802725)\n- fix for CVE-2012-1165 - NULL read dereference on bad MIME headers (#802489)', u'issued': u'2012-03-27', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELSA-2012-0426.html', u'type': u'self', u'id': None, u'title': u'ELSA-2012-0426'}, {u'href': u'http://linux.oracle.com/cve/CVE-2012-0884.html', u'type': u'cve', u'id': u'CVE-2012-0884', u'title': u'CVE-2012-0884'}, {u'href': u'http://linux.oracle.com/cve/CVE-2012-1165.html', u'type': u'cve', u'id': u'CVE-2012-1165', u'title': u'CVE-2012-1165'}], u'_content_type_id': u'erratum', u'_id': u'780fd539-2cbd-4db6-856d-5ab908ebc7e9', u'from': u'el-errata@oss.oracle.com', u'severity': u'Moderate', u'title': u' openssl security and bug fix update', u'_ns': u'units_erratum', u'rights': u'Copyright 2012 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 6', u'reboot_suggested': False, u'type': u'security', u'pkglist': [{u'packages': [{u'src': None, u'name': u'openssl', u'sum': [u'md5', u'1f1deccef1b61e989885a49dac1adc02'], u'filename': u'openssl-1.0.0-20.el6_2.3.i686.rpm', u'epoch': u'0', u'version': u'1.0.0', u'release': u'20.el6_2.3', u'arch': u'i686'}, {u'src': None, u'name': u'openssl', u'sum': [u'md5', u'c3837a6be827a3499df39a54e362efa2'], u'filename': u'openssl-1.0.0-20.el6_2.3.src.rpm', u'epoch': u'0', u'version': u'1.0.0', u'release': u'20.el6_2.3', u'arch': u'src'}, {u'src': None, u'name': u'openssl', u'sum': [u'md5', u'0dc63322718da7688b009939553c46dd'], u'filename': u'openssl-1.0.0-20.el6_2.3.x86_64.rpm', u'epoch': u'0', u'version': u'1.0.0', u'release': u'20.el6_2.3', u'arch': u'x86_64'}, {u'src': None, u'name': u'openssl-devel', u'sum': [u'md5', u'2b20249c99348b7f3a9a67389d7b6362'], u'filename': u'openssl-devel-1.0.0-20.el6_2.3.i686.rpm', u'epoch': u'0', u'version': u'1.0.0', u'release': u'20.el6_2.3', u'arch': u'i686'}, {u'src': None, u'name': u'openssl-devel', u'sum': [u'md5', u'f9f064660c499612e77fde1ffdd1bafd'], u'filename': u'openssl-devel-1.0.0-20.el6_2.3.x86_64.rpm', u'epoch': u'0', u'version': u'1.0.0', u'release': u'20.el6_2.3', u'arch': u'x86_64'}, {u'src': None, u'name': u'openssl-perl', u'sum': [u'md5', u'25733e5180d0c7b250d0815db4bce928'], u'filename': u'openssl-perl-1.0.0-20.el6_2.3.x86_64.rpm', u'epoch': u'0', u'version': u'1.0.0', u'release': u'20.el6_2.3', u'arch': u'x86_64'}, {u'src': None, u'name': u'openssl-static', u'sum': [u'md5', u'71dd4d98dfe1616e7b668f9d9efdad4c'], u'filename': u'openssl-static-1.0.0-20.el6_2.3.x86_64.rpm', u'epoch': u'0', u'version': u'1.0.0', u'release': u'20.el6_2.3', u'arch': u'x86_64'}], u'name': u'ol6_x86_64_latest', u'short': u'ol6_x86_64_latest'}, {u'packages': [{u'src': None, u'name': u'openssl', u'sum': [u'md5', u'7ba7ef202f881a44f890a5bfb420273d'], u'filename': u'openssl-0.9.8e-22.el5_8.1.src.rpm', u'epoch': u'0', u'version': u'0.9.8e', u'release': u'22.el5_8.1', u'arch': u'src'}, {u'src': None, u'name': u'openssl', u'sum': [u'md5', u'2087a501e532d4a55317f7491ac3dc8b'], u'filename': u'openssl-0.9.8e-22.el5_8.1.i686.rpm', u'epoch': u'0', u'version': u'0.9.8e', u'release': u'22.el5_8.1', u'arch': u'i686'}, {u'src': None, u'name': u'openssl', u'sum': [u'md5', u'19765a86b818c8a5dc512e008781f947'], u'filename': u'openssl-0.9.8e-22.el5_8.1.x86_64.rpm', u'epoch': u'0', u'version': u'0.9.8e', u'release': u'22.el5_8.1', u'arch': u'x86_64'}, {u'src': None, u'name': u'openssl-devel', u'sum': [u'md5', u'b5b065c193a1897eab163705292b4d70'], u'filename': u'openssl-devel-0.9.8e-22.el5_8.1.i386.rpm', u'epoch': u'0', u'version': u'0.9.8e', u'release': u'22.el5_8.1', u'arch': u'i386'}, {u'src': None, u'name': u'openssl-devel', u'sum': [u'md5', u'07d17fcde17c05b6c857328efc73e656'], u'filename': u'openssl-devel-0.9.8e-22.el5_8.1.x86_64.rpm', u'epoch': u'0', u'version': u'0.9.8e', u'release': u'22.el5_8.1', u'arch': u'x86_64'}, {u'src': None, u'name': u'openssl-perl', u'sum': [u'md5', u'fd69ef11990f764a166e27af9b5abbac'], u'filename': u'openssl-perl-0.9.8e-22.el5_8.1.x86_64.rpm', u'epoch': u'0', u'version': u'0.9.8e', u'release': u'22.el5_8.1', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u'[1.4.1-7.2]\n- fix CVE-2011-4128 - buffer overflow in gnutls_session_get_data() (#752308)\n- fix CVE-2012-1569 - missing length check when decoding DER lengths (#804920)\n- fix CVE-2012-1573 - security issue in packet parsing (#805432)', u'issued': u'2012-03-27', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELSA-2012-0428.html', u'type': u'self', u'id': None, u'title': u'ELSA-2012-0428'}, {u'href': u'http://linux.oracle.com/cve/CVE-2011-4128.html', u'type': u'cve', u'id': u'CVE-2011-4128', u'title': u'CVE-2011-4128'}, {u'href': u'http://linux.oracle.com/cve/CVE-2012-1569.html', u'type': u'cve', u'id': u'CVE-2012-1569', u'title': u'CVE-2012-1569'}, {u'href': u'http://linux.oracle.com/cve/CVE-2012-1573.html', u'type': u'cve', u'id': u'CVE-2012-1573', u'title': u'CVE-2012-1573'}], u'_content_type_id': u'erratum', u'_id': u'4ec39c4e-3ae0-4b66-972f-5e3b66c51ef9', u'from': u'el-errata@oss.oracle.com', u'severity': u'Important', u'title': u' gnutls security update', u'_ns': u'units_erratum', u'rights': u'Copyright 2012 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 5', u'reboot_suggested': False, u'type': u'security', u'pkglist': [{u'packages': [{u'src': None, u'name': u'gnutls', u'sum': [u'md5', u'344c6de16724513b46e405b6045a7811'], u'filename': u'gnutls-1.4.1-7.el5_8.2.i386.rpm', u'epoch': u'0', u'version': u'1.4.1', u'release': u'7.el5_8.2', u'arch': u'i386'}, {u'src': None, u'name': u'gnutls', u'sum': [u'md5', u'b4c83cfad8b9c1d0b7a297618273a583'], u'filename': u'gnutls-1.4.1-7.el5_8.2.src.rpm', u'epoch': u'0', u'version': u'1.4.1', u'release': u'7.el5_8.2', u'arch': u'src'}, {u'src': None, u'name': u'gnutls', u'sum': [u'md5', u'cbe5e4ff0338f4cc8409c867ccb7bd11'], u'filename': u'gnutls-1.4.1-7.el5_8.2.x86_64.rpm', u'epoch': u'0', u'version': u'1.4.1', u'release': u'7.el5_8.2', u'arch': u'x86_64'}, {u'src': None, u'name': u'gnutls-devel', u'sum': [u'md5', u'e9f9298799db9ff38d76158d89b8021b'], u'filename': u'gnutls-devel-1.4.1-7.el5_8.2.i386.rpm', u'epoch': u'0', u'version': u'1.4.1', u'release': u'7.el5_8.2', u'arch': u'i386'}, {u'src': None, u'name': u'gnutls-devel', u'sum': [u'md5', u'c4c2379e46cb72aa73f82bc462a1678b'], u'filename': u'gnutls-devel-1.4.1-7.el5_8.2.x86_64.rpm', u'epoch': u'0', u'version': u'1.4.1', u'release': u'7.el5_8.2', u'arch': u'x86_64'}, {u'src': None, u'name': u'gnutls-utils', u'sum': [u'md5', u'4ed02ecc16b2f3e580c35e95980649bd'], u'filename': u'gnutls-utils-1.4.1-7.el5_8.2.x86_64.rpm', u'epoch': u'0', u'version': u'1.4.1', u'release': u'7.el5_8.2', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u'[4.8.0-19.1]\n- Proper region tag validation on package/header read (CVE-2012-0060)\n- Double-check region size against header size (CVE-2012-0061)\n- Validate negated offsets too in headerVerifyInfo() (CVE-2012-0815)', u'issued': u'2012-04-03', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELSA-2012-0451.html', u'type': u'self', u'id': None, u'title': u'ELSA-2012-0451'}, {u'href': u'http://linux.oracle.com/cve/CVE-2012-0060.html', u'type': u'cve', u'id': u'CVE-2012-0060', u'title': u'CVE-2012-0060'}, {u'href': u'http://linux.oracle.com/cve/CVE-2012-0061.html', u'type': u'cve', u'id': u'CVE-2012-0061', u'title': u'CVE-2012-0061'}, {u'href': u'http://linux.oracle.com/cve/CVE-2012-0815.html', u'type': u'cve', u'id': u'CVE-2012-0815', u'title': u'CVE-2012-0815'}], u'_content_type_id': u'erratum', u'_id': u'c607145f-d1cc-49d4-8b1a-ade33fd2855c', u'from': u'el-errata@oss.oracle.com', u'severity': u'Important', u'title': u' rpm security update', u'_ns': u'units_erratum', u'rights': u'Copyright 2012 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 6', u'reboot_suggested': False, u'type': u'security', u'pkglist': [{u'packages': [{u'src': None, u'name': u'rpm', u'sum': [u'md5', u'366ddeb1b626d23978295f14574e807c'], u'filename': u'rpm-4.8.0-19.el6_2.1.src.rpm', u'epoch': u'0', u'version': u'4.8.0', u'release': u'19.el6_2.1', u'arch': u'src'}, {u'src': None, u'name': u'rpm', u'sum': [u'md5', u'caf8ba4b12facdaea939d5e4f7cd3c6b'], u'filename': u'rpm-4.8.0-19.el6_2.1.x86_64.rpm', u'epoch': u'0', u'version': u'4.8.0', u'release': u'19.el6_2.1', u'arch': u'x86_64'}, {u'src': None, u'name': u'rpm-apidocs', u'sum': [u'md5', u'6694f92349b0fbe556fffc016170f3a2'], u'filename': u'rpm-apidocs-4.8.0-19.el6_2.1.noarch.rpm', u'epoch': u'0', u'version': u'4.8.0', u'release': u'19.el6_2.1', u'arch': u'noarch'}, {u'src': None, u'name': u'rpm-build', u'sum': [u'md5', u'80c3b9817088dc4cbbd2dd9f106d3069'], u'filename': u'rpm-build-4.8.0-19.el6_2.1.x86_64.rpm', u'epoch': u'0', u'version': u'4.8.0', u'release': u'19.el6_2.1', u'arch': u'x86_64'}, {u'src': None, u'name': u'rpm-cron', u'sum': [u'md5', u'dc4e2ebc783b3b9f59aad3bc74324ed9'], u'filename': u'rpm-cron-4.8.0-19.el6_2.1.noarch.rpm', u'epoch': u'0', u'version': u'4.8.0', u'release': u'19.el6_2.1', u'arch': u'noarch'}, {u'src': None, u'name': u'rpm-devel', u'sum': [u'md5', u'05b9d531f5e6cd38ca7a47528ce30307'], u'filename': u'rpm-devel-4.8.0-19.el6_2.1.i686.rpm', u'epoch': u'0', u'version': u'4.8.0', u'release': u'19.el6_2.1', u'arch': u'i686'}, {u'src': None, u'name': u'rpm-devel', u'sum': [u'md5', u'850be1cf97e1e3fbf2a4991b6278de69'], u'filename': u'rpm-devel-4.8.0-19.el6_2.1.x86_64.rpm', u'epoch': u'0', u'version': u'4.8.0', u'release': u'19.el6_2.1', u'arch': u'x86_64'}, {u'src': None, u'name': u'rpm-libs', u'sum': [u'md5', u'91fc13d53fa14376c9afe0e760a27795'], u'filename': u'rpm-libs-4.8.0-19.el6_2.1.i686.rpm', u'epoch': u'0', u'version': u'4.8.0', u'release': u'19.el6_2.1', u'arch': u'i686'}, {u'src': None, u'name': u'rpm-libs', u'sum': [u'md5', u'66c1d8d4c4ec7d1e98a487b47a1a3cf7'], u'filename': u'rpm-libs-4.8.0-19.el6_2.1.x86_64.rpm', u'epoch': u'0', u'version': u'4.8.0', u'release': u'19.el6_2.1', u'arch': u'x86_64'}, {u'src': None, u'name': u'rpm-python', u'sum': [u'md5', u'78ea130b71e2d4502bd661922aad4fa9'], u'filename': u'rpm-python-4.8.0-19.el6_2.1.x86_64.rpm', u'epoch': u'0', u'version': u'4.8.0', u'release': u'19.el6_2.1', u'arch': u'x86_64'}], u'name': u'ol6_x86_64_latest', u'short': u'ol6_x86_64_latest'}, {u'packages': [{u'src': None, u'name': u'popt', u'sum': [u'md5', u'e634a3362ddb70be190ad4e20de3ee49'], u'filename': u'popt-1.10.2.3-28.0.1.el5_8.i386.rpm', u'epoch': u'0', u'version': u'1.10.2.3', u'release': u'28.0.1.el5_8', u'arch': u'i386'}, {u'src': None, u'name': u'popt', u'sum': [u'md5', u'1c27d7efe2deaf416c28c3e940e00a31'], u'filename': u'popt-1.10.2.3-28.0.1.el5_8.x86_64.rpm', u'epoch': u'0', u'version': u'1.10.2.3', u'release': u'28.0.1.el5_8', u'arch': u'x86_64'}, {u'src': None, u'name': u'rpm', u'sum': [u'md5', u'931a7e42d32a749da8d179dbdf91b2e7'], u'filename': u'rpm-4.4.2.3-28.0.1.el5_8.src.rpm', u'epoch': u'0', u'version': u'4.4.2.3', u'release': u'28.0.1.el5_8', u'arch': u'src'}, {u'src': None, u'name': u'rpm', u'sum': [u'md5', u'7c561acb0aeca6a2b9e85bcb6961bd5c'], u'filename': u'rpm-4.4.2.3-28.0.1.el5_8.x86_64.rpm', u'epoch': u'0', u'version': u'4.4.2.3', u'release': u'28.0.1.el5_8', u'arch': u'x86_64'}, {u'src': None, u'name': u'rpm-apidocs', u'sum': [u'md5', u'8b79a1b2e86b39fbbbfa3821561807ac'], u'filename': u'rpm-apidocs-4.4.2.3-28.0.1.el5_8.x86_64.rpm', u'epoch': u'0', u'version': u'4.4.2.3', u'release': u'28.0.1.el5_8', u'arch': u'x86_64'}, {u'src': None, u'name': u'rpm-build', u'sum': [u'md5', u'cee0f19a3bf5a221106655a37dc0691a'], u'filename': u'rpm-build-4.4.2.3-28.0.1.el5_8.x86_64.rpm', u'epoch': u'0', u'version': u'4.4.2.3', u'release': u'28.0.1.el5_8', u'arch': u'x86_64'}, {u'src': None, u'name': u'rpm-devel', u'sum': [u'md5', u'155eb10762f09a1128269a243bbbae33'], u'filename': u'rpm-devel-4.4.2.3-28.0.1.el5_8.i386.rpm', u'epoch': u'0', u'version': u'4.4.2.3', u'release': u'28.0.1.el5_8', u'arch': u'i386'}, {u'src': None, u'name': u'rpm-devel', u'sum': [u'md5', u'9c5b76d7585ac680dd3977b136161809'], u'filename': u'rpm-devel-4.4.2.3-28.0.1.el5_8.x86_64.rpm', u'epoch': u'0', u'version': u'4.4.2.3', u'release': u'28.0.1.el5_8', u'arch': u'x86_64'}, {u'src': None, u'name': u'rpm-libs', u'sum': [u'md5', u'cda956689149b74212fdaed3bee9f9e6'], u'filename': u'rpm-libs-4.4.2.3-28.0.1.el5_8.i386.rpm', u'epoch': u'0', u'version': u'4.4.2.3', u'release': u'28.0.1.el5_8', u'arch': u'i386'}, {u'src': None, u'name': u'rpm-libs', u'sum': [u'md5', u'f66456b06006a20031505cc8d7d012b0'], u'filename': u'rpm-libs-4.4.2.3-28.0.1.el5_8.x86_64.rpm', u'epoch': u'0', u'version': u'4.4.2.3', u'release': u'28.0.1.el5_8', u'arch': u'x86_64'}, {u'src': None, u'name': u'rpm-python', u'sum': [u'md5', u'40669ccfaa946ceb844cd9505ff20ee8'], u'filename': u'rpm-python-4.4.2.3-28.0.1.el5_8.x86_64.rpm', u'epoch': u'0', u'version': u'4.4.2.3', u'release': u'28.0.1.el5_8', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u'[3.5.10-115]\n- Security Release, fixes CVE-2012-1182\n- resolves: #804644', u'issued': u'2012-04-10', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELSA-2012-0465.html', u'type': u'self', u'id': None, u'title': u'ELSA-2012-0465'}, {u'href': u'http://linux.oracle.com/cve/CVE-2012-1182.html', u'type': u'cve', u'id': u'CVE-2012-1182', u'title': u'CVE-2012-1182'}], u'_content_type_id': u'erratum', u'_id': u'b55ccf49-43ed-4e3c-8975-4bf33b61963b', u'from': u'el-errata@oss.oracle.com', u'severity': u'Critical', u'title': u' samba security update', u'_ns': u'units_erratum', u'rights': u'Copyright 2012 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 6', u'reboot_suggested': False, u'type': u'security', u'pkglist': [{u'packages': [{u'src': None, u'name': u'libsmbclient', u'sum': [u'md5', u'430c8a8c1bf02f5c2d6048f8d1401473'], u'filename': u'libsmbclient-3.5.10-115.el6_2.i686.rpm', u'epoch': u'0', u'version': u'3.5.10', u'release': u'115.el6_2', u'arch': u'i686'}, {u'src': None, u'name': u'libsmbclient', u'sum': [u'md5', u'a05d536afdf97fe0dafecdbc0499015d'], u'filename': u'libsmbclient-3.5.10-115.el6_2.x86_64.rpm', u'epoch': u'0', u'version': u'3.5.10', u'release': u'115.el6_2', u'arch': u'x86_64'}, {u'src': None, u'name': u'libsmbclient-devel', u'sum': [u'md5', u'98eb5be3e44b76bf8a9a7f495088cd1b'], u'filename': u'libsmbclient-devel-3.5.10-115.el6_2.i686.rpm', u'epoch': u'0', u'version': u'3.5.10', u'release': u'115.el6_2', u'arch': u'i686'}, {u'src': None, u'name': u'libsmbclient-devel', u'sum': [u'md5', u'c5a631c603a11e42187a05c0b33e57ff'], u'filename': u'libsmbclient-devel-3.5.10-115.el6_2.x86_64.rpm', u'epoch': u'0', u'version': u'3.5.10', u'release': u'115.el6_2', u'arch': u'x86_64'}, {u'src': None, u'name': u'samba', u'sum': [u'md5', u'2e4bb6459775aa44aae6373ec2be9dfe'], u'filename': u'samba-3.5.10-115.el6_2.src.rpm', u'epoch': u'0', u'version': u'3.5.10', u'release': u'115.el6_2', u'arch': u'src'}, {u'src': None, u'name': u'samba', u'sum': [u'md5', u'fe007d135ebd4cf070977d780ef2fb1d'], u'filename': u'samba-3.5.10-115.el6_2.x86_64.rpm', u'epoch': u'0', u'version': u'3.5.10', u'release': u'115.el6_2', u'arch': u'x86_64'}, {u'src': None, u'name': u'samba-client', u'sum': [u'md5', u'5f5bbf48e0fbe0a03189ed49bbbdd0dd'], u'filename': u'samba-client-3.5.10-115.el6_2.x86_64.rpm', u'epoch': u'0', u'version': u'3.5.10', u'release': u'115.el6_2', u'arch': u'x86_64'}, {u'src': None, u'name': u'samba-common', u'sum': [u'md5', u'f2617c514afb53e6ca643583ec47de16'], u'filename': u'samba-common-3.5.10-115.el6_2.i686.rpm', u'epoch': u'0', u'version': u'3.5.10', u'release': u'115.el6_2', u'arch': u'i686'}, {u'src': None, u'name': u'samba-common', u'sum': [u'md5', u'c0b681ea09a390f0c4b804ed3ecb8ce5'], u'filename': u'samba-common-3.5.10-115.el6_2.x86_64.rpm', u'epoch': u'0', u'version': u'3.5.10', u'release': u'115.el6_2', u'arch': u'x86_64'}, {u'src': None, u'name': u'samba-doc', u'sum': [u'md5', u'1973a557dc472209fef1d667466748f2'], u'filename': u'samba-doc-3.5.10-115.el6_2.x86_64.rpm', u'epoch': u'0', u'version': u'3.5.10', u'release': u'115.el6_2', u'arch': u'x86_64'}, {u'src': None, u'name': u'samba-domainjoin-gui', u'sum': [u'md5', u'8389200d7acb1a6a8d8d12df480a5ff0'], u'filename': u'samba-domainjoin-gui-3.5.10-115.el6_2.x86_64.rpm', u'epoch': u'0', u'version': u'3.5.10', u'release': u'115.el6_2', u'arch': u'x86_64'}, {u'src': None, u'name': u'samba-swat', u'sum': [u'md5', u'0d28a6416d0530c1b452df23448b5d9e'], u'filename': u'samba-swat-3.5.10-115.el6_2.x86_64.rpm', u'epoch': u'0', u'version': u'3.5.10', u'release': u'115.el6_2', u'arch': u'x86_64'}, {u'src': None, u'name': u'samba-winbind', u'sum': [u'md5', u'd0bd60d6c17980a93d5807a212084873'], u'filename': u'samba-winbind-3.5.10-115.el6_2.x86_64.rpm', u'epoch': u'0', u'version': u'3.5.10', u'release': u'115.el6_2', u'arch': u'x86_64'}, {u'src': None, u'name': u'samba-winbind-clients', u'sum': [u'md5', u'326082fe4027f1b3a1ee0ad1ccdcef0f'], u'filename': u'samba-winbind-clients-3.5.10-115.el6_2.i686.rpm', u'epoch': u'0', u'version': u'3.5.10', u'release': u'115.el6_2', u'arch': u'i686'}, {u'src': None, u'name': u'samba-winbind-clients', u'sum': [u'md5', u'de7a69c2731f8ecd35ada549e11affc7'], u'filename': u'samba-winbind-clients-3.5.10-115.el6_2.x86_64.rpm', u'epoch': u'0', u'version': u'3.5.10', u'release': u'115.el6_2', u'arch': u'x86_64'}, {u'src': None, u'name': u'samba-winbind-devel', u'sum': [u'md5', u'063e6e051bf4b6eb6b9604d15a4ad8d5'], u'filename': u'samba-winbind-devel-3.5.10-115.el6_2.i686.rpm', u'epoch': u'0', u'version': u'3.5.10', u'release': u'115.el6_2', u'arch': u'i686'}, {u'src': None, u'name': u'samba-winbind-devel', u'sum': [u'md5', u'4b3dad304b27887aa55b2be483266b36'], u'filename': u'samba-winbind-devel-3.5.10-115.el6_2.x86_64.rpm', u'epoch': u'0', u'version': u'3.5.10', u'release': u'115.el6_2', u'arch': u'x86_64'}, {u'src': None, u'name': u'samba-winbind-krb5-locator', u'sum': [u'md5', u'a95c1fc61c57669f7ecd324c8d1b7d79'], u'filename': u'samba-winbind-krb5-locator-3.5.10-115.el6_2.x86_64.rpm', u'epoch': u'0', u'version': u'3.5.10', u'release': u'115.el6_2', u'arch': u'x86_64'}], u'name': u'ol6_x86_64_latest', u'short': u'ol6_x86_64_latest'}, {u'packages': [{u'src': None, u'name': u'libsmbclient', u'sum': [u'md5', u'8e102c5444e3357967fe10d078619d35'], u'filename': u'libsmbclient-3.0.33-3.39.el5_8.i386.rpm', u'epoch': u'0', u'version': u'3.0.33', u'release': u'3.39.el5_8', u'arch': u'i386'}, {u'src': None, u'name': u'libsmbclient', u'sum': [u'md5', u'eb9843cc30ca3d5c8d02502aa4da3eae'], u'filename': u'libsmbclient-3.0.33-3.39.el5_8.x86_64.rpm', u'epoch': u'0', u'version': u'3.0.33', u'release': u'3.39.el5_8', u'arch': u'x86_64'}, {u'src': None, u'name': u'libsmbclient-devel', u'sum': [u'md5', u'f773d82b51fc459c447ad5f4629cc7f5'], u'filename': u'libsmbclient-devel-3.0.33-3.39.el5_8.i386.rpm', u'epoch': u'0', u'version': u'3.0.33', u'release': u'3.39.el5_8', u'arch': u'i386'}, {u'src': None, u'name': u'libsmbclient-devel', u'sum': [u'md5', u'5ef004611afd8b4c47ab8a189b630419'], u'filename': u'libsmbclient-devel-3.0.33-3.39.el5_8.x86_64.rpm', u'epoch': u'0', u'version': u'3.0.33', u'release': u'3.39.el5_8', u'arch': u'x86_64'}, {u'src': None, u'name': u'samba', u'sum': [u'md5', u'59aaad07338978125e0b90c06a985201'], u'filename': u'samba-3.0.33-3.39.el5_8.src.rpm', u'epoch': u'0', u'version': u'3.0.33', u'release': u'3.39.el5_8', u'arch': u'src'}, {u'src': None, u'name': u'samba', u'sum': [u'md5', u'8dc87be468443790bf39df200e979cf0'], u'filename': u'samba-3.0.33-3.39.el5_8.x86_64.rpm', u'epoch': u'0', u'version': u'3.0.33', u'release': u'3.39.el5_8', u'arch': u'x86_64'}, {u'src': None, u'name': u'samba-client', u'sum': [u'md5', u'11fb8e511edc6eb8358f3b6d8c2590af'], u'filename': u'samba-client-3.0.33-3.39.el5_8.x86_64.rpm', u'epoch': u'0', u'version': u'3.0.33', u'release': u'3.39.el5_8', u'arch': u'x86_64'}, {u'src': None, u'name': u'samba-common', u'sum': [u'md5', u'b30f21111df9d9c7186b4386f4f17ab3'], u'filename': u'samba-common-3.0.33-3.39.el5_8.i386.rpm', u'epoch': u'0', u'version': u'3.0.33', u'release': u'3.39.el5_8', u'arch': u'i386'}, {u'src': None, u'name': u'samba-common', u'sum': [u'md5', u'3ff0558c14b0ba6b0ec5728aacdc834c'], u'filename': u'samba-common-3.0.33-3.39.el5_8.x86_64.rpm', u'epoch': u'0', u'version': u'3.0.33', u'release': u'3.39.el5_8', u'arch': u'x86_64'}, {u'src': None, u'name': u'samba-swat', u'sum': [u'md5', u'aa54c994a97e069033ec3cf3e337fa9a'], u'filename': u'samba-swat-3.0.33-3.39.el5_8.x86_64.rpm', u'epoch': u'0', u'version': u'3.0.33', u'release': u'3.39.el5_8', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u'[3.5.10-0.108]\n- Security Release, fixes CVE-2012-1182\n- resolves: #804650', u'issued': u'2012-04-10', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELSA-2012-0466.html', u'type': u'self', u'id': None, u'title': u'ELSA-2012-0466'}, {u'href': u'http://linux.oracle.com/cve/CVE-2012-1182.html', u'type': u'cve', u'id': u'CVE-2012-1182', u'title': u'CVE-2012-1182'}], u'_content_type_id': u'erratum', u'_id': u'2d74209a-7656-4ba6-8d16-1db9bccc5da0', u'from': u'el-errata@oss.oracle.com', u'severity': u'Critical', u'title': u' samba3x security update', u'_ns': u'units_erratum', u'rights': u'Copyright 2012 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 5', u'reboot_suggested': False, u'type': u'security', u'pkglist': [{u'packages': [{u'src': None, u'name': u'samba3x', u'sum': [u'md5', u'64f7c52a1630993b73e483ab132b0c27'], u'filename': u'samba3x-3.5.10-0.108.el5_8.src.rpm', u'epoch': u'0', u'version': u'3.5.10', u'release': u'0.108.el5_8', u'arch': u'src'}, {u'src': None, u'name': u'samba3x', u'sum': [u'md5', u'ebe84a0c223743b397597ec68e9d4bfc'], u'filename': u'samba3x-3.5.10-0.108.el5_8.x86_64.rpm', u'epoch': u'0', u'version': u'3.5.10', u'release': u'0.108.el5_8', u'arch': u'x86_64'}, {u'src': None, u'name': u'samba3x-client', u'sum': [u'md5', u'c72d59dbb093eea491ad7d1891c9259e'], u'filename': u'samba3x-client-3.5.10-0.108.el5_8.x86_64.rpm', u'epoch': u'0', u'version': u'3.5.10', u'release': u'0.108.el5_8', u'arch': u'x86_64'}, {u'src': None, u'name': u'samba3x-common', u'sum': [u'md5', u'6cc2b878d426a4a3f03efc3d621b7674'], u'filename': u'samba3x-common-3.5.10-0.108.el5_8.x86_64.rpm', u'epoch': u'0', u'version': u'3.5.10', u'release': u'0.108.el5_8', u'arch': u'x86_64'}, {u'src': None, u'name': u'samba3x-doc', u'sum': [u'md5', u'b4cffa70ff8bce1098fd1897503b70e0'], u'filename': u'samba3x-doc-3.5.10-0.108.el5_8.x86_64.rpm', u'epoch': u'0', u'version': u'3.5.10', u'release': u'0.108.el5_8', u'arch': u'x86_64'}, {u'src': None, u'name': u'samba3x-domainjoin-gui', u'sum': [u'md5', u'6c07712e652b53b309df42b751040676'], u'filename': u'samba3x-domainjoin-gui-3.5.10-0.108.el5_8.x86_64.rpm', u'epoch': u'0', u'version': u'3.5.10', u'release': u'0.108.el5_8', u'arch': u'x86_64'}, {u'src': None, u'name': u'samba3x-swat', u'sum': [u'md5', u'93cf98f0469a35bd59d7643ed81796bc'], u'filename': u'samba3x-swat-3.5.10-0.108.el5_8.x86_64.rpm', u'epoch': u'0', u'version': u'3.5.10', u'release': u'0.108.el5_8', u'arch': u'x86_64'}, {u'src': None, u'name': u'samba3x-winbind', u'sum': [u'md5', u'29cbb444534913546e7532a09b708dda'], u'filename': u'samba3x-winbind-3.5.10-0.108.el5_8.i386.rpm', u'epoch': u'0', u'version': u'3.5.10', u'release': u'0.108.el5_8', u'arch': u'i386'}, {u'src': None, u'name': u'samba3x-winbind', u'sum': [u'md5', u'5873cad8c0cbfa5f0efb6764f647cb1f'], u'filename': u'samba3x-winbind-3.5.10-0.108.el5_8.x86_64.rpm', u'epoch': u'0', u'version': u'3.5.10', u'release': u'0.108.el5_8', u'arch': u'x86_64'}, {u'src': None, u'name': u'samba3x-winbind-devel', u'sum': [u'md5', u'c48dfdef2eeb9ab0ba66db0bfa3c942f'], u'filename': u'samba3x-winbind-devel-3.5.10-0.108.el5_8.i386.rpm', u'epoch': u'0', u'version': u'3.5.10', u'release': u'0.108.el5_8', u'arch': u'i386'}, {u'src': None, u'name': u'samba3x-winbind-devel', u'sum': [u'md5', u'2458315c8669978b3a82dd87f158d1b7'], u'filename': u'samba3x-winbind-devel-3.5.10-0.108.el5_8.x86_64.rpm', u'epoch': u'0', u'version': u'3.5.10', u'release': u'0.108.el5_8', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u"[2.3.11-6.el6_2.9]\n- Fix CVE-2012-{1126, 1127, 1130, 1131, 1132, 1134, 1136,\n 1137, 1139, 1140, 1141, 1142, 1143, 1144}\n- Properly initialize array 'result' in\n FT_Outline_Get_Orientation()\n- Check bytes per row for overflow in _bdf_parse_glyphs()\n- Resolves: #806268", u'issued': u'2012-04-10', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELSA-2012-0467.html', u'type': u'self', u'id': None, u'title': u'ELSA-2012-0467'}, {u'href': u'http://linux.oracle.com/cve/CVE-2012-1126.html', u'type': u'cve', u'id': u'CVE-2012-1126', u'title': u'CVE-2012-1126'}, {u'href': u'http://linux.oracle.com/cve/CVE-2012-1127.html', u'type': u'cve', u'id': u'CVE-2012-1127', u'title': u'CVE-2012-1127'}, {u'href': u'http://linux.oracle.com/cve/CVE-2012-1130.html', u'type': u'cve', u'id': u'CVE-2012-1130', u'title': u'CVE-2012-1130'}, {u'href': u'http://linux.oracle.com/cve/CVE-2012-1131.html', u'type': u'cve', u'id': u'CVE-2012-1131', u'title': u'CVE-2012-1131'}, {u'href': u'http://linux.oracle.com/cve/CVE-2012-1132.html', u'type': u'cve', u'id': u'CVE-2012-1132', u'title': u'CVE-2012-1132'}, {u'href': u'http://linux.oracle.com/cve/CVE-2012-1134.html', u'type': u'cve', u'id': u'CVE-2012-1134', u'title': u'CVE-2012-1134'}, {u'href': u'http://linux.oracle.com/cve/CVE-2012-1136.html', u'type': u'cve', u'id': u'CVE-2012-1136', u'title': u'CVE-2012-1136'}, {u'href': u'http://linux.oracle.com/cve/CVE-2012-1137.html', u'type': u'cve', u'id': u'CVE-2012-1137', u'title': u'CVE-2012-1137'}, {u'href': u'http://linux.oracle.com/cve/CVE-2012-1139.html', u'type': u'cve', u'id': u'CVE-2012-1139', u'title': u'CVE-2012-1139'}, {u'href': u'http://linux.oracle.com/cve/CVE-2012-1140.html', u'type': u'cve', u'id': u'CVE-2012-1140', u'title': u'CVE-2012-1140'}, {u'href': u'http://linux.oracle.com/cve/CVE-2012-1141.html', u'type': u'cve', u'id': u'CVE-2012-1141', u'title': u'CVE-2012-1141'}, {u'href': u'http://linux.oracle.com/cve/CVE-2012-1142.html', u'type': u'cve', u'id': u'CVE-2012-1142', u'title': u'CVE-2012-1142'}, {u'href': u'http://linux.oracle.com/cve/CVE-2012-1143.html', u'type': u'cve', u'id': u'CVE-2012-1143', u'title': u'CVE-2012-1143'}, {u'href': u'http://linux.oracle.com/cve/CVE-2012-1144.html', u'type': u'cve', u'id': u'CVE-2012-1144', u'title': u'CVE-2012-1144'}], u'_content_type_id': u'erratum', u'_id': u'3f860488-26a4-47e4-ab13-576562f39cf5', u'from': u'el-errata@oss.oracle.com', u'severity': u'Important', u'title': u' freetype security update', u'_ns': u'units_erratum', u'rights': u'Copyright 2012 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 6', u'reboot_suggested': False, u'type': u'security', u'pkglist': [{u'packages': [{u'src': None, u'name': u'freetype', u'sum': [u'md5', u'771d03783d11edcc2c99ef723f5ec51a'], u'filename': u'freetype-2.3.11-6.el6_2.9.i686.rpm', u'epoch': u'0', u'version': u'2.3.11', u'release': u'6.el6_2.9', u'arch': u'i686'}, {u'src': None, u'name': u'freetype', u'sum': [u'md5', u'842ed10160ac7919ec86b44fd5bb2300'], u'filename': u'freetype-2.3.11-6.el6_2.9.src.rpm', u'epoch': u'0', u'version': u'2.3.11', u'release': u'6.el6_2.9', u'arch': u'src'}, {u'src': None, u'name': u'freetype', u'sum': [u'md5', u'f8411dcc09e143a802d93a162326cfda'], u'filename': u'freetype-2.3.11-6.el6_2.9.x86_64.rpm', u'epoch': u'0', u'version': u'2.3.11', u'release': u'6.el6_2.9', u'arch': u'x86_64'}, {u'src': None, u'name': u'freetype-demos', u'sum': [u'md5', u'fd44aeafb0caeaa85d4971b2013c2b06'], u'filename': u'freetype-demos-2.3.11-6.el6_2.9.x86_64.rpm', u'epoch': u'0', u'version': u'2.3.11', u'release': u'6.el6_2.9', u'arch': u'x86_64'}, {u'src': None, u'name': u'freetype-devel', u'sum': [u'md5', u'e8fcc65aeb1776ed8a94b60bfeef18bd'], u'filename': u'freetype-devel-2.3.11-6.el6_2.9.i686.rpm', u'epoch': u'0', u'version': u'2.3.11', u'release': u'6.el6_2.9', u'arch': u'i686'}, {u'src': None, u'name': u'freetype-devel', u'sum': [u'md5', u'f87ef3e25d55ca74e370f0d510af298d'], u'filename': u'freetype-devel-2.3.11-6.el6_2.9.x86_64.rpm', u'epoch': u'0', u'version': u'2.3.11', u'release': u'6.el6_2.9', u'arch': u'x86_64'}], u'name': u'ol6_x86_64_latest', u'short': u'ol6_x86_64_latest'}, {u'packages': [{u'src': None, u'name': u'freetype', u'sum': [u'md5', u'c3357e4c54617e578185cba9cc9fee07'], u'filename': u'freetype-2.2.1-31.el5_8.1.i386.rpm', u'epoch': u'0', u'version': u'2.2.1', u'release': u'31.el5_8.1', u'arch': u'i386'}, {u'src': None, u'name': u'freetype', u'sum': [u'md5', u'529d41324979a6424e6dd006839d7bf4'], u'filename': u'freetype-2.2.1-31.el5_8.1.src.rpm', u'epoch': u'0', u'version': u'2.2.1', u'release': u'31.el5_8.1', u'arch': u'src'}, {u'src': None, u'name': u'freetype', u'sum': [u'md5', u'3e89c09379c703a5a084b212f923f904'], u'filename': u'freetype-2.2.1-31.el5_8.1.x86_64.rpm', u'epoch': u'0', u'version': u'2.2.1', u'release': u'31.el5_8.1', u'arch': u'x86_64'}, {u'src': None, u'name': u'freetype-demos', u'sum': [u'md5', u'2db25e4cc2322b1f96f5780310d4e8cc'], u'filename': u'freetype-demos-2.2.1-31.el5_8.1.x86_64.rpm', u'epoch': u'0', u'version': u'2.2.1', u'release': u'31.el5_8.1', u'arch': u'x86_64'}, {u'src': None, u'name': u'freetype-devel', u'sum': [u'md5', u'6eb34fc4b7adee9cf319addd173d0e32'], u'filename': u'freetype-devel-2.2.1-31.el5_8.1.i386.rpm', u'epoch': u'0', u'version': u'2.2.1', u'release': u'31.el5_8.1', u'arch': u'i386'}, {u'src': None, u'name': u'freetype-devel', u'sum': [u'md5', u'7307d69fdf1992032d77a40d63494a25'], u'filename': u'freetype-devel-2.2.1-31.el5_8.1.x86_64.rpm', u'epoch': u'0', u'version': u'2.2.1', u'release': u'31.el5_8.1', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u'[3.9.4-5]\n- Add fix for CVE-2012-1173\nResolves: #CVE-2012-1173', u'issued': u'2012-04-10', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELSA-2012-0468.html', u'type': u'self', u'id': None, u'title': u'ELSA-2012-0468'}, {u'href': u'http://linux.oracle.com/cve/CVE-2012-1173.html', u'type': u'cve', u'id': u'CVE-2012-1173', u'title': u'CVE-2012-1173'}], u'_content_type_id': u'erratum', u'_id': u'30a091b2-5768-4bb4-8482-81fa192bc6fd', u'from': u'el-errata@oss.oracle.com', u'severity': u'Important', u'title': u' libtiff security update', u'_ns': u'units_erratum', u'rights': u'Copyright 2012 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 6', u'reboot_suggested': False, u'type': u'security', u'pkglist': [{u'packages': [{u'src': None, u'name': u'libtiff', u'sum': [u'md5', u'bec43bfb22681def1c16a6dc96f8d722'], u'filename': u'libtiff-3.9.4-5.el6_2.i686.rpm', u'epoch': u'0', u'version': u'3.9.4', u'release': u'5.el6_2', u'arch': u'i686'}, {u'src': None, u'name': u'libtiff', u'sum': [u'md5', u'23cabe6f120fbf38484d8288476cd66b'], u'filename': u'libtiff-3.9.4-5.el6_2.src.rpm', u'epoch': u'0', u'version': u'3.9.4', u'release': u'5.el6_2', u'arch': u'src'}, {u'src': None, u'name': u'libtiff', u'sum': [u'md5', u'42436ef6c046571f14310119f43983bd'], u'filename': u'libtiff-3.9.4-5.el6_2.x86_64.rpm', u'epoch': u'0', u'version': u'3.9.4', u'release': u'5.el6_2', u'arch': u'x86_64'}, {u'src': None, u'name': u'libtiff-devel', u'sum': [u'md5', u'dbe71d8382202090a01be6ecfb16a883'], u'filename': u'libtiff-devel-3.9.4-5.el6_2.i686.rpm', u'epoch': u'0', u'version': u'3.9.4', u'release': u'5.el6_2', u'arch': u'i686'}, {u'src': None, u'name': u'libtiff-devel', u'sum': [u'md5', u'c4247036dad96ba87aebce6be0057b67'], u'filename': u'libtiff-devel-3.9.4-5.el6_2.x86_64.rpm', u'epoch': u'0', u'version': u'3.9.4', u'release': u'5.el6_2', u'arch': u'x86_64'}, {u'src': None, u'name': u'libtiff-static', u'sum': [u'md5', u'8999b28cdb4cd6b0a859090e85b2d1ad'], u'filename': u'libtiff-static-3.9.4-5.el6_2.x86_64.rpm', u'epoch': u'0', u'version': u'3.9.4', u'release': u'5.el6_2', u'arch': u'x86_64'}], u'name': u'ol6_x86_64_latest', u'short': u'ol6_x86_64_latest'}, {u'packages': [{u'src': None, u'name': u'libtiff', u'sum': [u'md5', u'aa8fc5c673c7688e1846df82e25f5500'], u'filename': u'libtiff-3.8.2-14.el5_8.i386.rpm', u'epoch': u'0', u'version': u'3.8.2', u'release': u'14.el5_8', u'arch': u'i386'}, {u'src': None, u'name': u'libtiff', u'sum': [u'md5', u'68136a438ad133501fa2ec7b0e01fb1d'], u'filename': u'libtiff-3.8.2-14.el5_8.src.rpm', u'epoch': u'0', u'version': u'3.8.2', u'release': u'14.el5_8', u'arch': u'src'}, {u'src': None, u'name': u'libtiff', u'sum': [u'md5', u'bd384b7eb1c0cd9e9f7fd259c5cc6085'], u'filename': u'libtiff-3.8.2-14.el5_8.x86_64.rpm', u'epoch': u'0', u'version': u'3.8.2', u'release': u'14.el5_8', u'arch': u'x86_64'}, {u'src': None, u'name': u'libtiff-devel', u'sum': [u'md5', u'd3025b257243724147624ddb1e4ad1c5'], u'filename': u'libtiff-devel-3.8.2-14.el5_8.i386.rpm', u'epoch': u'0', u'version': u'3.8.2', u'release': u'14.el5_8', u'arch': u'i386'}, {u'src': None, u'name': u'libtiff-devel', u'sum': [u'md5', u'9af00f1a8720508443eab199541d7577'], u'filename': u'libtiff-devel-3.8.2-14.el5_8.x86_64.rpm', u'epoch': u'0', u'version': u'3.8.2', u'release': u'14.el5_8', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u'[0:5.5.23-0jpp.31]\n- Resolves: CVE-2012 regression. Changed patch file.\n\n[0:5.5.23-0jpp.30]\n- Resolves: CVE-2012-0022, CVE-2011-4858\n\n[0:5.5.23-0jpp.27]\n- Resolves CVE-2011-0013 rhbz 675933\n- Resolves CVE-2011-3718 rhbz 675933\n\n[0:5.5.23-0jpp.23]\n- Resolves CVE-2011-1184 rhbz 744984\n- Resolves CVE-2011-2204 rhbz 719188', u'issued': u'2012-04-11', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELSA-2012-0474.html', u'type': u'self', u'id': None, u'title': u'ELSA-2012-0474'}, {u'href': u'http://linux.oracle.com/cve/CVE-2011-4858.html', u'type': u'cve', u'id': u'CVE-2011-4858', u'title': u'CVE-2011-4858'}, {u'href': u'http://linux.oracle.com/cve/CVE-2012-0022.html', u'type': u'cve', u'id': u'CVE-2012-0022', u'title': u'CVE-2012-0022'}], u'_content_type_id': u'erratum', u'_id': u'7a6aefe8-e319-4fd5-a1e5-254429fee16c', u'from': u'el-errata@oss.oracle.com', u'severity': u'Moderate', u'title': u' tomcat5 security update', u'_ns': u'units_erratum', u'rights': u'Copyright 2012 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 5', u'reboot_suggested': False, u'type': u'security', u'pkglist': [{u'packages': [{u'src': None, u'name': u'tomcat5', u'sum': [u'md5', u'5d6fc5a1d336a8624f3be26c560f39d6'], u'filename': u'tomcat5-5.5.23-0jpp.31.el5_8.src.rpm', u'epoch': u'0', u'version': u'5.5.23', u'release': u'0jpp.31.el5_8', u'arch': u'src'}, {u'src': None, u'name': u'tomcat5', u'sum': [u'md5', u'05555ad37fd9df20a01f8c46e55605be'], u'filename': u'tomcat5-5.5.23-0jpp.31.el5_8.x86_64.rpm', u'epoch': u'0', u'version': u'5.5.23', u'release': u'0jpp.31.el5_8', u'arch': u'x86_64'}, {u'src': None, u'name': u'tomcat5-admin-webapps', u'sum': [u'md5', u'0408b50454f2078b19c9c273d69c03ca'], u'filename': u'tomcat5-admin-webapps-5.5.23-0jpp.31.el5_8.x86_64.rpm', u'epoch': u'0', u'version': u'5.5.23', u'release': u'0jpp.31.el5_8', u'arch': u'x86_64'}, {u'src': None, u'name': u'tomcat5-common-lib', u'sum': [u'md5', u'7c47a8e97e43bda2b8f6112f1797318d'], u'filename': u'tomcat5-common-lib-5.5.23-0jpp.31.el5_8.x86_64.rpm', u'epoch': u'0', u'version': u'5.5.23', u'release': u'0jpp.31.el5_8', u'arch': u'x86_64'}, {u'src': None, u'name': u'tomcat5-jasper', u'sum': [u'md5', u'b2a1d93ec8a5582a85a06ae7334197be'], u'filename': u'tomcat5-jasper-5.5.23-0jpp.31.el5_8.x86_64.rpm', u'epoch': u'0', u'version': u'5.5.23', u'release': u'0jpp.31.el5_8', u'arch': u'x86_64'}, {u'src': None, u'name': u'tomcat5-jasper-javadoc', u'sum': [u'md5', u'df5ca7db47712305ee0174b1d2adcc01'], u'filename': u'tomcat5-jasper-javadoc-5.5.23-0jpp.31.el5_8.x86_64.rpm', u'epoch': u'0', u'version': u'5.5.23', u'release': u'0jpp.31.el5_8', u'arch': u'x86_64'}, {u'src': None, u'name': u'tomcat5-jsp-2.0-api', u'sum': [u'md5', u'0c1e00c9cb20622c7cf4b0734236e18b'], u'filename': u'tomcat5-jsp-2.0-api-5.5.23-0jpp.31.el5_8.x86_64.rpm', u'epoch': u'0', u'version': u'5.5.23', u'release': u'0jpp.31.el5_8', u'arch': u'x86_64'}, {u'src': None, u'name': u'tomcat5-jsp-2.0-api-javadoc', u'sum': [u'md5', u'd6d424d4ae04cae08953d0cb7e3c3aba'], u'filename': u'tomcat5-jsp-2.0-api-javadoc-5.5.23-0jpp.31.el5_8.x86_64.rpm', u'epoch': u'0', u'version': u'5.5.23', u'release': u'0jpp.31.el5_8', u'arch': u'x86_64'}, {u'src': None, u'name': u'tomcat5-server-lib', u'sum': [u'md5', u'50708f9d8a0c47b72172d8a0ced81363'], u'filename': u'tomcat5-server-lib-5.5.23-0jpp.31.el5_8.x86_64.rpm', u'epoch': u'0', u'version': u'5.5.23', u'release': u'0jpp.31.el5_8', u'arch': u'x86_64'}, {u'src': None, u'name': u'tomcat5-servlet-2.4-api', u'sum': [u'md5', u'489834e7adac8340023cdd6e33aa65a4'], u'filename': u'tomcat5-servlet-2.4-api-5.5.23-0jpp.31.el5_8.x86_64.rpm', u'epoch': u'0', u'version': u'5.5.23', u'release': u'0jpp.31.el5_8', u'arch': u'x86_64'}, {u'src': None, u'name': u'tomcat5-servlet-2.4-api-javadoc', u'sum': [u'md5', u'4464e7213c26bf1c3e91a04085b79282'], u'filename': u'tomcat5-servlet-2.4-api-javadoc-5.5.23-0jpp.31.el5_8.x86_64.rpm', u'epoch': u'0', u'version': u'5.5.23', u'release': u'0jpp.31.el5_8', u'arch': u'x86_64'}, {u'src': None, u'name': u'tomcat5-webapps', u'sum': [u'md5', u'06c0ff5446c3a365b7182cb189636b43'], u'filename': u'tomcat5-webapps-5.5.23-0jpp.31.el5_8.x86_64.rpm', u'epoch': u'0', u'version': u'5.5.23', u'release': u'0jpp.31.el5_8', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u"[2.6.18-308.4.1.el5]\n- [net] ipv6: fix skb double free in xfrm6_tunnel (Jiri Benc) [752305 743375] {CVE-2012-1583}\n\n[2.6.18-308.3.1.el5]\n- [net] be2net: cancel be_worker during EEH recovery (Ivan Vecera) [805462 773735]\n- [net] be2net: add vlan/rx-mode/flow-control config to be_setup (Ivan Vecera) [805462 773735]\n- [x86] disable TSC synchronization when using kvmclock (Marcelo Tosatti) [805460 799170]\n- [fs] vfs: fix LOOKUP_DIRECTORY not propagated to managed_dentry (Ian Kent) [801726 798809]\n- [fs] vfs: fix d_instantiate_unique (Ian Kent) [801726 798809]\n- [fs] nfs: allow high priority COMMITs to bypass inode commit lock (Jeff Layton) [799941 773777]\n- [fs] nfs: don't skip COMMITs if system under is mem pressure (Jeff Layton) [799941 773777]\n- [scsi] qla2xxx: Read the HCCR register to flush any PCIe writes (Chad Dupuis) [798748 772192]\n- [scsi] qla2xxx: Complete mbox cmd timeout before next reset cycle (Chad Dupuis) [798748 772192]\n- [s390] qdio: wrong buffers-used counter for ERROR buffers (Hendrik Brueckner) [801724 790840]\n- [net] bridge: Reset IPCB when entering IP stack (Herbert Xu) [804721 749813]\n- [fs] procfs: add hidepid= and gid= mount options (Jerome Marchand) [770649 770650]\n- [fs] procfs: parse mount options (Jerome Marchand) [770649 770650]\n\n[2.6.18-308.2.1.el5]\n- [fs] nfs: nfs_fhget should wait on I_NEW instead of I_LOCK (Sachin Prabhu) [795664 785062]", u'issued': u'2012-04-17', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELSA-2012-0480.html', u'type': u'self', u'id': None, u'title': u'ELSA-2012-0480'}, {u'href': u'http://linux.oracle.com/cve/CVE-2012-1583.html', u'type': u'cve', u'id': u'CVE-2012-1583', u'title': u'CVE-2012-1583'}], u'_content_type_id': u'erratum', u'_id': u'63926350-2714-4506-a899-bd6530515afb', u'from': u'el-errata@oss.oracle.com', u'severity': u'Important', u'title': u' kernel security, bug fix, and enhancement update', u'_ns': u'units_erratum', u'rights': u'Copyright 2012 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 5', u'reboot_suggested': False, u'type': u'security', u'pkglist': [{u'packages': [{u'src': None, u'name': u'kernel', u'sum': [u'md5', u'f1410cc9522c8078868a7c90bc48e889'], u'filename': u'kernel-2.6.18-308.4.1.el5.src.rpm', u'epoch': u'0', u'version': u'2.6.18', u'release': u'308.4.1.el5', u'arch': u'src'}, {u'src': None, u'name': u'kernel', u'sum': [u'md5', u'5400b8c9807635764724946388688219'], u'filename': u'kernel-2.6.18-308.4.1.el5.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.18', u'release': u'308.4.1.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'kernel-debug', u'sum': [u'md5', u'bb279691bcd3f2b4ec1f093455268cca'], u'filename': u'kernel-debug-2.6.18-308.4.1.el5.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.18', u'release': u'308.4.1.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'kernel-debug-devel', u'sum': [u'md5', u'9c9186b914b1f36a4afa829dbc3de6b5'], u'filename': u'kernel-debug-devel-2.6.18-308.4.1.el5.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.18', u'release': u'308.4.1.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'kernel-devel', u'sum': [u'md5', u'9c067706088fe628372e0025e5aa8346'], u'filename': u'kernel-devel-2.6.18-308.4.1.el5.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.18', u'release': u'308.4.1.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'kernel-doc', u'sum': [u'md5', u'3817ca05314a36d16e18d20aa8524092'], u'filename': u'kernel-doc-2.6.18-308.4.1.el5.noarch.rpm', u'epoch': u'0', u'version': u'2.6.18', u'release': u'308.4.1.el5', u'arch': u'noarch'}, {u'src': None, u'name': u'kernel-headers', u'sum': [u'md5', u'05c22225fc9b35cbc6785a8f748d158a'], u'filename': u'kernel-headers-2.6.18-308.4.1.el5.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.18', u'release': u'308.4.1.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'kernel-xen', u'sum': [u'md5', u'ab90d58d713b558dbdd54cf09dcc8b3a'], u'filename': u'kernel-xen-2.6.18-308.4.1.el5.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.18', u'release': u'308.4.1.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'kernel-xen-devel', u'sum': [u'md5', u'3a1dfb289eea7e06150fc2c47664c178'], u'filename': u'kernel-xen-devel-2.6.18-308.4.1.el5.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.18', u'release': u'308.4.1.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'ocfs2-2.6.18-308.4.1.el5', u'sum': [u'md5', u'59d10f0bbe8056f5d4ff5087ac454319'], u'filename': u'ocfs2-2.6.18-308.4.1.el5-1.4.9-1.el5.src.rpm', u'epoch': u'0', u'version': u'1.4.9', u'release': u'1.el5', u'arch': u'src'}, {u'src': None, u'name': u'ocfs2-2.6.18-308.4.1.el5', u'sum': [u'md5', u'01964adca766640b07b54bb86f7daacb'], u'filename': u'ocfs2-2.6.18-308.4.1.el5-1.4.9-1.el5.x86_64.rpm', u'epoch': u'0', u'version': u'1.4.9', u'release': u'1.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'ocfs2-2.6.18-308.4.1.el5debug', u'sum': [u'md5', u'7c77e99badc62d76f46e0336fa276b57'], u'filename': u'ocfs2-2.6.18-308.4.1.el5debug-1.4.9-1.el5.x86_64.rpm', u'epoch': u'0', u'version': u'1.4.9', u'release': u'1.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'ocfs2-2.6.18-308.4.1.el5xen', u'sum': [u'md5', u'37d389285f42856b71a0fd1242260285'], u'filename': u'ocfs2-2.6.18-308.4.1.el5xen-1.4.9-1.el5.x86_64.rpm', u'epoch': u'0', u'version': u'1.4.9', u'release': u'1.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'oracleasm-2.6.18-308.4.1.el5', u'sum': [u'md5', u'022efb9f1f053108dee56bca1493109d'], u'filename': u'oracleasm-2.6.18-308.4.1.el5-2.0.5-1.el5.src.rpm', u'epoch': u'0', u'version': u'2.0.5', u'release': u'1.el5', u'arch': u'src'}, {u'src': None, u'name': u'oracleasm-2.6.18-308.4.1.el5', u'sum': [u'md5', u'580b751795a4f1111eabd99bbede8389'], u'filename': u'oracleasm-2.6.18-308.4.1.el5-2.0.5-1.el5.x86_64.rpm', u'epoch': u'0', u'version': u'2.0.5', u'release': u'1.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'oracleasm-2.6.18-308.4.1.el5debug', u'sum': [u'md5', u'c33e420503eb6bc04aa7097d58a8299e'], u'filename': u'oracleasm-2.6.18-308.4.1.el5debug-2.0.5-1.el5.x86_64.rpm', u'epoch': u'0', u'version': u'2.0.5', u'release': u'1.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'oracleasm-2.6.18-308.4.1.el5xen', u'sum': [u'md5', u'cfdefc043a5cf1a6a22722ac9468d26c'], u'filename': u'oracleasm-2.6.18-308.4.1.el5xen-2.0.5-1.el5.x86_64.rpm', u'epoch': u'0', u'version': u'2.0.5', u'release': u'1.el5', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u"[2.6.18-308.4.1.0.1.el5]\n- [net] bonding: fix carrier detect when bond is down [orabug 12377284]\n- [mm] fix hugetlb page leak (Dave McCracken) [orabug 12375075]\n- fix ia64 build error due to add-support-above-32-vcpus.patch(Zhenzhong Duan)\n- [x86] use dynamic vcpu_info remap to support more than 32 vcpus (Zhenzhong Duan)\n- [x86] Fix lvt0 reset when hvm boot up with noapic param\n- [scsi] remove printk's when doing I/O to a dead device (John Sobecki, Chris Mason)\n [orabug 12342275]\n- [char] ipmi: Fix IPMI errors due to timing problems (Joe Jin) [orabug 12561346]\n- [scsi] Fix race when removing SCSI devices (Joe Jin) [orabug 12404566]\n- [net] net: Redo the broken redhat netconsole over bonding (Tina Yang) [orabug 12740042]\n- [fs] nfs: Fix __put_nfs_open_context() NULL pointer panic (Joe Jin) [orabug 12687646]\n- [scsi] fix scsi hotplug and rescan race [orabug 10260172]\n- fix filp_close() race (Joe Jin) [orabug 10335998]\n- make xenkbd.abs_pointer=1 by default [orabug 67188919]\n- [xen] check to see if hypervisor supports memory reservation change\n (Chuck Anderson) [orabug 7556514]\n- [net] Enable entropy for bnx2,bnx2x,e1000e,igb,ixgb,ixgbe,ixgbevf (John Sobecki)\n [orabug 10315433]\n- [NET] Add xen pv netconsole support (Tina Yang) [orabug 6993043] [bz 7258]\n- [mm] shrink_zone patch (John Sobecki,Chris Mason) [orabug 6086839]\n- fix aacraid not to reset during kexec (Joe Jin) [orabug 8516042]\n- [rds] Patch rds to 1.4.2-20 (Andy Grover) [orabug 9471572, 9344105]\n RDS: Fix BUG_ONs to not fire when in a tasklet\n ipoib: Fix lockup of the tx queue\n RDS: Do not call set_page_dirty() with irqs off (Sherman Pun)\n RDS: Properly unmap when getting a remote access error (Tina Yang)\n RDS: Fix locking in rds_send_drop_to()\n- [xen] PVHVM guest with PoD crashes under memory pressure (Chuck Anderson)\n [orabug 9107465]\n- [xen] PV guest with FC HBA hangs during shutdown (Chuck Anderson)\n [orabug 9764220]\n- Support 256GB+ memory for pv guest (Mukesh Rathor) [orabug 9450615]\n- fix overcommit memory to use percpu_counter for el5 (KOSAKI Motohiro,\n Guru Anbalagane) [orabug 6124033]\n- [ipmi] make configurable timeouts for kcs of ipmi [orabug 9752208]\n- [ib] fix memory corruption (Andy Grover) [orabug 9972346]\n\n[2.6.18-308.4.1.el5]\n- [net] ipv6: fix skb double free in xfrm6_tunnel (Jiri Benc) [752305 743375] {CVE-2012-1583}\n\n[2.6.18-308.3.1.el5]\n- [net] be2net: cancel be_worker during EEH recovery (Ivan Vecera) [805462 773735]\n- [net] be2net: add vlan/rx-mode/flow-control config to be_setup (Ivan Vecera) [805462 773735]\n- [x86] disable TSC synchronization when using kvmclock (Marcelo Tosatti) [805460 799170]\n- [fs] vfs: fix LOOKUP_DIRECTORY not propagated to managed_dentry (Ian Kent) [801726 798809]\n- [fs] vfs: fix d_instantiate_unique (Ian Kent) [801726 798809]\n- [fs] nfs: allow high priority COMMITs to bypass inode commit lock (Jeff Layton) [799941 773777]\n- [fs] nfs: don't skip COMMITs if system under is mem pressure (Jeff Layton) [799941 773777]\n- [scsi] qla2xxx: Read the HCCR register to flush any PCIe writes (Chad Dupuis) [798748 772192]\n- [scsi] qla2xxx: Complete mbox cmd timeout before next reset cycle (Chad Dupuis) [798748 772192]\n- [s390] qdio: wrong buffers-used counter for ERROR buffers (Hendrik Brueckner) [801724 790840]\n- [net] bridge: Reset IPCB when entering IP stack (Herbert Xu) [804721 749813]\n- [fs] procfs: add hidepid= and gid= mount options (Jerome Marchand) [770649 770650]\n- [fs] procfs: parse mount options (Jerome Marchand) [770649 770650]\n\n[2.6.18-308.2.1.el5]\n- [fs] nfs: nfs_fhget should wait on I_NEW instead of I_LOCK (Sachin Prabhu) [795664 785062]", u'issued': u'2012-04-17', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELSA-2012-0480-1.html', u'type': u'self', u'id': None, u'title': u'ELSA-2012-0480-1'}, {u'href': u'http://linux.oracle.com/cve/CVE-2012-1583.html', u'type': u'cve', u'id': u'CVE-2012-1583', u'title': u'CVE-2012-1583'}], u'_content_type_id': u'erratum', u'_id': u'f1f9a20f-11f8-4311-b9b4-7b2e73c79dd1', u'from': u'el-errata@oss.oracle.com', u'severity': u'Important', u'title': u' kernel security, bug fix, and enhancement update', u'_ns': u'units_erratum', u'rights': u'Copyright 2012 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 5', u'reboot_suggested': False, u'type': u'security', u'pkglist': [{u'packages': [{u'src': None, u'name': u'kernel', u'sum': [u'md5', u'a4ce7b338ed813c79374f2c1854b7c79'], u'filename': u'kernel-2.6.18-308.4.1.0.1.el5.src.rpm', u'epoch': u'0', u'version': u'2.6.18', u'release': u'308.4.1.0.1.el5', u'arch': u'src'}, {u'src': None, u'name': u'kernel', u'sum': [u'md5', u'176a4d5f449fc9961edae89fd4d97f90'], u'filename': u'kernel-2.6.18-308.4.1.0.1.el5.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.18', u'release': u'308.4.1.0.1.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'kernel-debug', u'sum': [u'md5', u'6dc1880bae0949771b96a91bb25b6cd3'], u'filename': u'kernel-debug-2.6.18-308.4.1.0.1.el5.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.18', u'release': u'308.4.1.0.1.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'kernel-debug-devel', u'sum': [u'md5', u'3c85e619d974ca58184f7fd240350325'], u'filename': u'kernel-debug-devel-2.6.18-308.4.1.0.1.el5.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.18', u'release': u'308.4.1.0.1.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'kernel-devel', u'sum': [u'md5', u'bf7ea486d47f583510df77ffc1871b7a'], u'filename': u'kernel-devel-2.6.18-308.4.1.0.1.el5.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.18', u'release': u'308.4.1.0.1.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'kernel-doc', u'sum': [u'md5', u'ff27433435985ac2403347fac5879c45'], u'filename': u'kernel-doc-2.6.18-308.4.1.0.1.el5.noarch.rpm', u'epoch': u'0', u'version': u'2.6.18', u'release': u'308.4.1.0.1.el5', u'arch': u'noarch'}, {u'src': None, u'name': u'kernel-headers', u'sum': [u'md5', u'926954c3d410b9975305fafd828a4c12'], u'filename': u'kernel-headers-2.6.18-308.4.1.0.1.el5.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.18', u'release': u'308.4.1.0.1.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'kernel-xen', u'sum': [u'md5', u'654c8def5cba8747acdc589ecf0f0c6b'], u'filename': u'kernel-xen-2.6.18-308.4.1.0.1.el5.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.18', u'release': u'308.4.1.0.1.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'kernel-xen-devel', u'sum': [u'md5', u'687389fbcb5dcfb1a6ea03397002923e'], u'filename': u'kernel-xen-devel-2.6.18-308.4.1.0.1.el5.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.18', u'release': u'308.4.1.0.1.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'ocfs2-2.6.18-308.4.1.0.1.el5', u'sum': [u'md5', u'8dc927846c5c8bcd5d1bce4f3c28315c'], u'filename': u'ocfs2-2.6.18-308.4.1.0.1.el5-1.4.9-1.el5.src.rpm', u'epoch': u'0', u'version': u'1.4.9', u'release': u'1.el5', u'arch': u'src'}, {u'src': None, u'name': u'ocfs2-2.6.18-308.4.1.0.1.el5', u'sum': [u'md5', u'e92ccff55cb4babd9f5ed028fd889c7e'], u'filename': u'ocfs2-2.6.18-308.4.1.0.1.el5-1.4.9-1.el5.x86_64.rpm', u'epoch': u'0', u'version': u'1.4.9', u'release': u'1.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'ocfs2-2.6.18-308.4.1.0.1.el5debug', u'sum': [u'md5', u'04c93062a913b742c096a5104579a956'], u'filename': u'ocfs2-2.6.18-308.4.1.0.1.el5debug-1.4.9-1.el5.x86_64.rpm', u'epoch': u'0', u'version': u'1.4.9', u'release': u'1.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'ocfs2-2.6.18-308.4.1.0.1.el5xen', u'sum': [u'md5', u'61d18df8da7b9687fd5806ade62608ee'], u'filename': u'ocfs2-2.6.18-308.4.1.0.1.el5xen-1.4.9-1.el5.x86_64.rpm', u'epoch': u'0', u'version': u'1.4.9', u'release': u'1.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'oracleasm-2.6.18-308.4.1.0.1.el5', u'sum': [u'md5', u'2e9f4ad11a1d0c2bea3e0b980b6ee028'], u'filename': u'oracleasm-2.6.18-308.4.1.0.1.el5-2.0.5-1.el5.src.rpm', u'epoch': u'0', u'version': u'2.0.5', u'release': u'1.el5', u'arch': u'src'}, {u'src': None, u'name': u'oracleasm-2.6.18-308.4.1.0.1.el5', u'sum': [u'md5', u'0b3d443b0d1dd3505887968a716f27ca'], u'filename': u'oracleasm-2.6.18-308.4.1.0.1.el5-2.0.5-1.el5.x86_64.rpm', u'epoch': u'0', u'version': u'2.0.5', u'release': u'1.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'oracleasm-2.6.18-308.4.1.0.1.el5debug', u'sum': [u'md5', u'c94a3f3a4471756a90ba179166d79361'], u'filename': u'oracleasm-2.6.18-308.4.1.0.1.el5debug-2.0.5-1.el5.x86_64.rpm', u'epoch': u'0', u'version': u'2.0.5', u'release': u'1.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'oracleasm-2.6.18-308.4.1.0.1.el5xen', u'sum': [u'md5', u'749fff814314fba3e17c52b38658b93c'], u'filename': u'oracleasm-2.6.18-308.4.1.0.1.el5xen-2.0.5-1.el5.x86_64.rpm', u'epoch': u'0', u'version': u'2.0.5', u'release': u'1.el5', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u'firefox:\n[10.0.4-1.0.1.el6_2]\n- Replace firefox-redhat-default-prefs.js with firefox-oracle-default-prefs.js\n\n[10.0.4-1]\n- Update to 10.0.4 ESR\n\nxulrunner:\n[10.0.4-1.0.1.el6_2]\n- Replace xulrunner-redhat-default-prefs.js with xulrunner-oracle-default-prefs.js\n\n[10.0.4-1]\n- Update to 10.0.4 ESR\n\n[10.0.3-3]\n- Fixed mozbz#746112 - ppc(64) freeze\n\n[10.0.3-2]\n- Fixed mozbz#681937', u'issued': u'2012-04-25', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELSA-2012-0515.html', u'type': u'self', u'id': None, u'title': u'ELSA-2012-0515'}, {u'href': u'http://linux.oracle.com/cve/CVE-2012-0467.html', u'type': u'cve', u'id': u'CVE-2012-0467', u'title': u'CVE-2012-0467'}, {u'href': u'http://linux.oracle.com/cve/CVE-2012-0468.html', u'type': u'cve', u'id': u'CVE-2012-0468', u'title': u'CVE-2012-0468'}, {u'href': u'http://linux.oracle.com/cve/CVE-2012-0469.html', u'type': u'cve', u'id': u'CVE-2012-0469', u'title': u'CVE-2012-0469'}, {u'href': u'http://linux.oracle.com/cve/CVE-2012-0470.html', u'type': u'cve', u'id': u'CVE-2012-0470', u'title': u'CVE-2012-0470'}, {u'href': u'http://linux.oracle.com/cve/CVE-2012-0471.html', u'type': u'cve', u'id': u'CVE-2012-0471', u'title': u'CVE-2012-0471'}, {u'href': u'http://linux.oracle.com/cve/CVE-2012-0472.html', u'type': u'cve', u'id': u'CVE-2012-0472', u'title': u'CVE-2012-0472'}, {u'href': u'http://linux.oracle.com/cve/CVE-2012-0473.html', u'type': u'cve', u'id': u'CVE-2012-0473', u'title': u'CVE-2012-0473'}, {u'href': u'http://linux.oracle.com/cve/CVE-2012-0474.html', u'type': u'cve', u'id': u'CVE-2012-0474', u'title': u'CVE-2012-0474'}, {u'href': u'http://linux.oracle.com/cve/CVE-2012-0477.html', u'type': u'cve', u'id': u'CVE-2012-0477', u'title': u'CVE-2012-0477'}, {u'href': u'http://linux.oracle.com/cve/CVE-2012-0478.html', u'type': u'cve', u'id': u'CVE-2012-0478', u'title': u'CVE-2012-0478'}, {u'href': u'http://linux.oracle.com/cve/CVE-2012-0479.html', u'type': u'cve', u'id': u'CVE-2012-0479', u'title': u'CVE-2012-0479'}, {u'href': u'http://linux.oracle.com/cve/CVE-2011-3062.html', u'type': u'cve', u'id': u'CVE-2011-3062', u'title': u'CVE-2011-3062'}], u'_content_type_id': u'erratum', u'_id': u'28aada24-1ec0-4913-8ab7-81adfe9e6df7', u'from': u'el-errata@oss.oracle.com', u'severity': u'Critical', u'title': u' firefox security update', u'_ns': u'units_erratum', u'rights': u'Copyright 2012 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 6', u'reboot_suggested': False, u'type': u'security', u'pkglist': [{u'packages': [{u'src': None, u'name': u'firefox', u'sum': [u'md5', u'22dea015ad9b3f3e41203f6aac5f36b5'], u'filename': u'firefox-10.0.4-1.0.1.el6_2.i686.rpm', u'epoch': u'0', u'version': u'10.0.4', u'release': u'1.0.1.el6_2', u'arch': u'i686'}, {u'src': None, u'name': u'firefox', u'sum': [u'md5', u'db70a42886ea01a0b161ee183316d15c'], u'filename': u'firefox-10.0.4-1.0.1.el6_2.src.rpm', u'epoch': u'0', u'version': u'10.0.4', u'release': u'1.0.1.el6_2', u'arch': u'src'}, {u'src': None, u'name': u'firefox', u'sum': [u'md5', u'd1e5862ca783f4df9ea3f53d390ca2d2'], u'filename': u'firefox-10.0.4-1.0.1.el6_2.x86_64.rpm', u'epoch': u'0', u'version': u'10.0.4', u'release': u'1.0.1.el6_2', u'arch': u'x86_64'}, {u'src': None, u'name': u'xulrunner', u'sum': [u'md5', u'9a0b7149d1d37f16c7724f30a5c15cc3'], u'filename': u'xulrunner-10.0.4-1.0.1.el6_2.i686.rpm', u'epoch': u'0', u'version': u'10.0.4', u'release': u'1.0.1.el6_2', u'arch': u'i686'}, {u'src': None, u'name': u'xulrunner', u'sum': [u'md5', u'010350ec450c45eab8b18e185de9367e'], u'filename': u'xulrunner-10.0.4-1.0.1.el6_2.src.rpm', u'epoch': u'0', u'version': u'10.0.4', u'release': u'1.0.1.el6_2', u'arch': u'src'}, {u'src': None, u'name': u'xulrunner', u'sum': [u'md5', u'25865ee3c702e1adb12f26743f979092'], u'filename': u'xulrunner-10.0.4-1.0.1.el6_2.x86_64.rpm', u'epoch': u'0', u'version': u'10.0.4', u'release': u'1.0.1.el6_2', u'arch': u'x86_64'}, {u'src': None, u'name': u'xulrunner-devel', u'sum': [u'md5', u'6e38fba6c2c3387049fb070b31601910'], u'filename': u'xulrunner-devel-10.0.4-1.0.1.el6_2.i686.rpm', u'epoch': u'0', u'version': u'10.0.4', u'release': u'1.0.1.el6_2', u'arch': u'i686'}, {u'src': None, u'name': u'xulrunner-devel', u'sum': [u'md5', u'0971d6c66e46c587d6d31512c2c105dc'], u'filename': u'xulrunner-devel-10.0.4-1.0.1.el6_2.x86_64.rpm', u'epoch': u'0', u'version': u'10.0.4', u'release': u'1.0.1.el6_2', u'arch': u'x86_64'}], u'name': u'ol6_x86_64_latest', u'short': u'ol6_x86_64_latest'}, {u'packages': [{u'src': None, u'name': u'firefox', u'sum': [u'md5', u'01deae56cad5276c65db6e130c4a0141'], u'filename': u'firefox-10.0.4-1.0.1.el5_8.i386.rpm', u'epoch': u'0', u'version': u'10.0.4', u'release': u'1.0.1.el5_8', u'arch': u'i386'}, {u'src': None, u'name': u'firefox', u'sum': [u'md5', u'019deb8d3a83ed79463fe062fc3eddf7'], u'filename': u'firefox-10.0.4-1.0.1.el5_8.src.rpm', u'epoch': u'0', u'version': u'10.0.4', u'release': u'1.0.1.el5_8', u'arch': u'src'}, {u'src': None, u'name': u'firefox', u'sum': [u'md5', u'ca6f93193b9406920a93ae1ff062b217'], u'filename': u'firefox-10.0.4-1.0.1.el5_8.x86_64.rpm', u'epoch': u'0', u'version': u'10.0.4', u'release': u'1.0.1.el5_8', u'arch': u'x86_64'}, {u'src': None, u'name': u'xulrunner', u'sum': [u'md5', u'b34df2382e6f9b2093c6eaa17992618d'], u'filename': u'xulrunner-10.0.4-1.0.1.el5_8.i386.rpm', u'epoch': u'0', u'version': u'10.0.4', u'release': u'1.0.1.el5_8', u'arch': u'i386'}, {u'src': None, u'name': u'xulrunner', u'sum': [u'md5', u'c5d6a5b9bf71c9c76dee42b5d854059a'], u'filename': u'xulrunner-10.0.4-1.0.1.el5_8.src.rpm', u'epoch': u'0', u'version': u'10.0.4', u'release': u'1.0.1.el5_8', u'arch': u'src'}, {u'src': None, u'name': u'xulrunner', u'sum': [u'md5', u'721fa1ef7a68dee575c2ea49d2a9ece7'], u'filename': u'xulrunner-10.0.4-1.0.1.el5_8.x86_64.rpm', u'epoch': u'0', u'version': u'10.0.4', u'release': u'1.0.1.el5_8', u'arch': u'x86_64'}, {u'src': None, u'name': u'xulrunner-devel', u'sum': [u'md5', u'cfba2a474634c24a00d15b540dec1316'], u'filename': u'xulrunner-devel-10.0.4-1.0.1.el5_8.i386.rpm', u'epoch': u'0', u'version': u'10.0.4', u'release': u'1.0.1.el5_8', u'arch': u'i386'}, {u'src': None, u'name': u'xulrunner-devel', u'sum': [u'md5', u'21c1b4ad8bb0f27220ec3b78638b2c89'], u'filename': u'xulrunner-devel-10.0.4-1.0.1.el5_8.x86_64.rpm', u'epoch': u'0', u'version': u'10.0.4', u'release': u'1.0.1.el5_8', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u'openssl:\n[1.0.0-20.4]\n- fix for CVE-2012-2110 - memory corruption in asn1_d2i_read_bio() (#814185)\n\nopenssl098e:\n[0.9.8e-17.el6_2.2]\n- Updated the description\n\n[0.9.8e-17.2]\n- fix for CVE-2012-2110 - memory corruption in asn1_d2i_read_bio() (#814185)\n', u'issued': u'2012-04-25', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELSA-2012-0518.html', u'type': u'self', u'id': None, u'title': u'ELSA-2012-0518'}, {u'href': u'http://linux.oracle.com/cve/CVE-2012-2110.html', u'type': u'cve', u'id': u'CVE-2012-2110', u'title': u'CVE-2012-2110'}], u'_content_type_id': u'erratum', u'_id': u'fb29949d-b75f-4bab-b2fa-1332803b7038', u'from': u'el-errata@oss.oracle.com', u'severity': u'Important', u'title': u' openssl security update', u'_ns': u'units_erratum', u'rights': u'Copyright 2012 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 6', u'reboot_suggested': False, u'type': u'security', u'pkglist': [{u'packages': [{u'src': None, u'name': u'openssl', u'sum': [u'md5', u'313815079ee574f1ceab399fc6ca7915'], u'filename': u'openssl-1.0.0-20.el6_2.4.i686.rpm', u'epoch': u'0', u'version': u'1.0.0', u'release': u'20.el6_2.4', u'arch': u'i686'}, {u'src': None, u'name': u'openssl', u'sum': [u'md5', u'4aa59780fbeeb93cb3eb41fdc4126dd7'], u'filename': u'openssl-1.0.0-20.el6_2.4.src.rpm', u'epoch': u'0', u'version': u'1.0.0', u'release': u'20.el6_2.4', u'arch': u'src'}, {u'src': None, u'name': u'openssl', u'sum': [u'md5', u'ece531469302088ac577db14f311339e'], u'filename': u'openssl-1.0.0-20.el6_2.4.x86_64.rpm', u'epoch': u'0', u'version': u'1.0.0', u'release': u'20.el6_2.4', u'arch': u'x86_64'}, {u'src': None, u'name': u'openssl-devel', u'sum': [u'md5', u'4dec3649f7a3f01542c54553599059fc'], u'filename': u'openssl-devel-1.0.0-20.el6_2.4.i686.rpm', u'epoch': u'0', u'version': u'1.0.0', u'release': u'20.el6_2.4', u'arch': u'i686'}, {u'src': None, u'name': u'openssl-devel', u'sum': [u'md5', u'fe5c5490e119443d79fad1110fce702d'], u'filename': u'openssl-devel-1.0.0-20.el6_2.4.x86_64.rpm', u'epoch': u'0', u'version': u'1.0.0', u'release': u'20.el6_2.4', u'arch': u'x86_64'}, {u'src': None, u'name': u'openssl-perl', u'sum': [u'md5', u'27a2b8df36bf7ecd83b4eb2e748cb68f'], u'filename': u'openssl-perl-1.0.0-20.el6_2.4.x86_64.rpm', u'epoch': u'0', u'version': u'1.0.0', u'release': u'20.el6_2.4', u'arch': u'x86_64'}, {u'src': None, u'name': u'openssl-static', u'sum': [u'md5', u'2b9abd4c221aee130ce5b9baaf77c3fb'], u'filename': u'openssl-static-1.0.0-20.el6_2.4.x86_64.rpm', u'epoch': u'0', u'version': u'1.0.0', u'release': u'20.el6_2.4', u'arch': u'x86_64'}, {u'src': None, u'name': u'openssl098e', u'sum': [u'md5', u'9103b0febc1e09d11976b8e2ba539125'], u'filename': u'openssl098e-0.9.8e-17.0.1.el6_2.2.i686.rpm', u'epoch': u'0', u'version': u'0.9.8e', u'release': u'17.0.1.el6_2.2', u'arch': u'i686'}, {u'src': None, u'name': u'openssl098e', u'sum': [u'md5', u'6f0d454b103218e8fa235fd8e7b4994f'], u'filename': u'openssl098e-0.9.8e-17.0.1.el6_2.2.src.rpm', u'epoch': u'0', u'version': u'0.9.8e', u'release': u'17.0.1.el6_2.2', u'arch': u'src'}, {u'src': None, u'name': u'openssl098e', u'sum': [u'md5', u'5ade14c140eb7bf55d236af7181fa605'], u'filename': u'openssl098e-0.9.8e-17.0.1.el6_2.2.x86_64.rpm', u'epoch': u'0', u'version': u'0.9.8e', u'release': u'17.0.1.el6_2.2', u'arch': u'x86_64'}], u'name': u'ol6_x86_64_latest', u'short': u'ol6_x86_64_latest'}, {u'packages': [{u'src': None, u'name': u'openssl', u'sum': [u'md5', u'fe854e03f8da10fb43c5023250dbf3df'], u'filename': u'openssl-0.9.8e-22.el5_8.3.src.rpm', u'epoch': u'0', u'version': u'0.9.8e', u'release': u'22.el5_8.3', u'arch': u'src'}, {u'src': None, u'name': u'openssl', u'sum': [u'md5', u'87258d05808aafea6e56186663314251'], u'filename': u'openssl-0.9.8e-22.el5_8.3.i686.rpm', u'epoch': u'0', u'version': u'0.9.8e', u'release': u'22.el5_8.3', u'arch': u'i686'}, {u'src': None, u'name': u'openssl', u'sum': [u'md5', u'3ff6654c807a3da0a20f6bba9c694660'], u'filename': u'openssl-0.9.8e-22.el5_8.3.x86_64.rpm', u'epoch': u'0', u'version': u'0.9.8e', u'release': u'22.el5_8.3', u'arch': u'x86_64'}, {u'src': None, u'name': u'openssl-devel', u'sum': [u'md5', u'fac4ee389169adea39601c801f7f7c7e'], u'filename': u'openssl-devel-0.9.8e-22.el5_8.3.i386.rpm', u'epoch': u'0', u'version': u'0.9.8e', u'release': u'22.el5_8.3', u'arch': u'i386'}, {u'src': None, u'name': u'openssl-devel', u'sum': [u'md5', u'a9f043c0ef738c354bd87fbf71a17b3d'], u'filename': u'openssl-devel-0.9.8e-22.el5_8.3.x86_64.rpm', u'epoch': u'0', u'version': u'0.9.8e', u'release': u'22.el5_8.3', u'arch': u'x86_64'}, {u'src': None, u'name': u'openssl-perl', u'sum': [u'md5', u'7b6ff4f20b6c65059ae5a3af2d042ffe'], u'filename': u'openssl-perl-0.9.8e-22.el5_8.3.x86_64.rpm', u'epoch': u'0', u'version': u'0.9.8e', u'release': u'22.el5_8.3', u'arch': u'x86_64'}, {u'src': None, u'name': u'openssl097a', u'sum': [u'md5', u'19932ce71be989914b9a03ad74c9557b'], u'filename': u'openssl097a-0.9.7a-11.el5_8.2.i386.rpm', u'epoch': u'0', u'version': u'0.9.7a', u'release': u'11.el5_8.2', u'arch': u'i386'}, {u'src': None, u'name': u'openssl097a', u'sum': [u'md5', u'a201bbba06e1305a266568090e248158'], u'filename': u'openssl097a-0.9.7a-11.el5_8.2.src.rpm', u'epoch': u'0', u'version': u'0.9.7a', u'release': u'11.el5_8.2', u'arch': u'src'}, {u'src': None, u'name': u'openssl097a', u'sum': [u'md5', u'6e960fae6cd271d25a3540c2e0f150ea'], u'filename': u'openssl097a-0.9.7a-11.el5_8.2.x86_64.rpm', u'epoch': u'0', u'version': u'0.9.7a', u'release': u'11.el5_8.2', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u'[2:1.2.49-1]\n- Update to libpng 1.2.49, for minor security issues (CVE-2011-3048)\nResolves: #812714\n', u'issued': u'2012-04-25', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELSA-2012-0523.html', u'type': u'self', u'id': None, u'title': u'ELSA-2012-0523'}, {u'href': u'http://linux.oracle.com/cve/CVE-2011-3048.html', u'type': u'cve', u'id': u'CVE-2011-3048', u'title': u'CVE-2011-3048'}], u'_content_type_id': u'erratum', u'_id': u'da292377-f6bb-423f-b1d5-bf5fcac480d1', u'from': u'el-errata@oss.oracle.com', u'severity': u'Moderate', u'title': u' libpng security update', u'_ns': u'units_erratum', u'rights': u'Copyright 2012 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 6', u'reboot_suggested': False, u'type': u'security', u'pkglist': [{u'packages': [{u'src': None, u'name': u'libpng', u'sum': [u'md5', u'a49b71dd854b574808e36bd98ed37f47'], u'filename': u'libpng-1.2.49-1.el6_2.i686.rpm', u'epoch': u'2', u'version': u'1.2.49', u'release': u'1.el6_2', u'arch': u'i686'}, {u'src': None, u'name': u'libpng', u'sum': [u'md5', u'ee579c5c11d40114c797a696512795e4'], u'filename': u'libpng-1.2.49-1.el6_2.src.rpm', u'epoch': u'2', u'version': u'1.2.49', u'release': u'1.el6_2', u'arch': u'src'}, {u'src': None, u'name': u'libpng', u'sum': [u'md5', u'ef634834450e8707001f8e9de872c885'], u'filename': u'libpng-1.2.49-1.el6_2.x86_64.rpm', u'epoch': u'2', u'version': u'1.2.49', u'release': u'1.el6_2', u'arch': u'x86_64'}, {u'src': None, u'name': u'libpng-devel', u'sum': [u'md5', u'3fe5602d110d6cc805df57cc0138a096'], u'filename': u'libpng-devel-1.2.49-1.el6_2.i686.rpm', u'epoch': u'2', u'version': u'1.2.49', u'release': u'1.el6_2', u'arch': u'i686'}, {u'src': None, u'name': u'libpng-devel', u'sum': [u'md5', u'b10ca1d824fc504ccd26da3420d834e0'], u'filename': u'libpng-devel-1.2.49-1.el6_2.x86_64.rpm', u'epoch': u'2', u'version': u'1.2.49', u'release': u'1.el6_2', u'arch': u'x86_64'}, {u'src': None, u'name': u'libpng-static', u'sum': [u'md5', u'53d2f2cd597503c3172e2ec21969067e'], u'filename': u'libpng-static-1.2.49-1.el6_2.x86_64.rpm', u'epoch': u'2', u'version': u'1.2.49', u'release': u'1.el6_2', u'arch': u'x86_64'}], u'name': u'ol6_x86_64_latest', u'short': u'ol6_x86_64_latest'}, {u'packages': [{u'src': None, u'name': u'libpng', u'sum': [u'md5', u'6d65eafa75a1a2c40000f7955726f6e0'], u'filename': u'libpng-1.2.10-17.el5_8.i386.rpm', u'epoch': u'2', u'version': u'1.2.10', u'release': u'17.el5_8', u'arch': u'i386'}, {u'src': None, u'name': u'libpng', u'sum': [u'md5', u'fc184abc5e88b4e8ec9698b990174ab8'], u'filename': u'libpng-1.2.10-17.el5_8.src.rpm', u'epoch': u'2', u'version': u'1.2.10', u'release': u'17.el5_8', u'arch': u'src'}, {u'src': None, u'name': u'libpng', u'sum': [u'md5', u'683eee63b89f40c93a26c5804f948dbb'], u'filename': u'libpng-1.2.10-17.el5_8.x86_64.rpm', u'epoch': u'2', u'version': u'1.2.10', u'release': u'17.el5_8', u'arch': u'x86_64'}, {u'src': None, u'name': u'libpng-devel', u'sum': [u'md5', u'df7d4963149850b063611eb960404046'], u'filename': u'libpng-devel-1.2.10-17.el5_8.i386.rpm', u'epoch': u'2', u'version': u'1.2.10', u'release': u'17.el5_8', u'arch': u'i386'}, {u'src': None, u'name': u'libpng-devel', u'sum': [u'md5', u'493de3d0ba29b6f0e4cfd46177b4a472'], u'filename': u'libpng-devel-1.2.10-17.el5_8.x86_64.rpm', u'epoch': u'2', u'version': u'1.2.10', u'release': u'17.el5_8', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u'[3.5.10-116]\n- Security Release, fixes CVE-2012-2111\n- resolves: #815688', u'issued': u'2012-04-30', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELSA-2012-0533.html', u'type': u'self', u'id': None, u'title': u'ELSA-2012-0533'}, {u'href': u'http://linux.oracle.com/cve/CVE-2012-2111.html', u'type': u'cve', u'id': u'CVE-2012-2111', u'title': u'CVE-2012-2111'}], u'_content_type_id': u'erratum', u'_id': u'917a96bb-9c57-4133-9ff3-07545028dbcf', u'from': u'el-errata@oss.oracle.com', u'severity': u'Important', u'title': u' samba and samba3x security update', u'_ns': u'units_erratum', u'rights': u'Copyright 2012 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 6', u'reboot_suggested': False, u'type': u'security', u'pkglist': [{u'packages': [{u'src': None, u'name': u'libsmbclient', u'sum': [u'md5', u'5cee02ca93aabe4b9381b50cb2d2cf2d'], u'filename': u'libsmbclient-3.5.10-116.el6_2.i686.rpm', u'epoch': u'0', u'version': u'3.5.10', u'release': u'116.el6_2', u'arch': u'i686'}, {u'src': None, u'name': u'libsmbclient', u'sum': [u'md5', u'ada06d58fcf572e06399fefd76e5e7cb'], u'filename': u'libsmbclient-3.5.10-116.el6_2.x86_64.rpm', u'epoch': u'0', u'version': u'3.5.10', u'release': u'116.el6_2', u'arch': u'x86_64'}, {u'src': None, u'name': u'libsmbclient-devel', u'sum': [u'md5', u'354c3c6385a86faafc061676e635a137'], u'filename': u'libsmbclient-devel-3.5.10-116.el6_2.i686.rpm', u'epoch': u'0', u'version': u'3.5.10', u'release': u'116.el6_2', u'arch': u'i686'}, {u'src': None, u'name': u'libsmbclient-devel', u'sum': [u'md5', u'2ee83254754647693802699d635bc08f'], u'filename': u'libsmbclient-devel-3.5.10-116.el6_2.x86_64.rpm', u'epoch': u'0', u'version': u'3.5.10', u'release': u'116.el6_2', u'arch': u'x86_64'}, {u'src': None, u'name': u'samba', u'sum': [u'md5', u'7b35187ec17ecd166012f51f8c68ecba'], u'filename': u'samba-3.5.10-116.el6_2.src.rpm', u'epoch': u'0', u'version': u'3.5.10', u'release': u'116.el6_2', u'arch': u'src'}, {u'src': None, u'name': u'samba', u'sum': [u'md5', u'2b14fbf452d25a5edf09bde88345706f'], u'filename': u'samba-3.5.10-116.el6_2.x86_64.rpm', u'epoch': u'0', u'version': u'3.5.10', u'release': u'116.el6_2', u'arch': u'x86_64'}, {u'src': None, u'name': u'samba-client', u'sum': [u'md5', u'fb434af846028581712023bd1cd73766'], u'filename': u'samba-client-3.5.10-116.el6_2.x86_64.rpm', u'epoch': u'0', u'version': u'3.5.10', u'release': u'116.el6_2', u'arch': u'x86_64'}, {u'src': None, u'name': u'samba-common', u'sum': [u'md5', u'25310a5422ca7eba7d6fd693ffd83284'], u'filename': u'samba-common-3.5.10-116.el6_2.i686.rpm', u'epoch': u'0', u'version': u'3.5.10', u'release': u'116.el6_2', u'arch': u'i686'}, {u'src': None, u'name': u'samba-common', u'sum': [u'md5', u'8e39207aaa4a97863bb04a2ae0a2bcb8'], u'filename': u'samba-common-3.5.10-116.el6_2.x86_64.rpm', u'epoch': u'0', u'version': u'3.5.10', u'release': u'116.el6_2', u'arch': u'x86_64'}, {u'src': None, u'name': u'samba-doc', u'sum': [u'md5', u'855735009d3be4d9fccd39f9451c604e'], u'filename': u'samba-doc-3.5.10-116.el6_2.x86_64.rpm', u'epoch': u'0', u'version': u'3.5.10', u'release': u'116.el6_2', u'arch': u'x86_64'}, {u'src': None, u'name': u'samba-domainjoin-gui', u'sum': [u'md5', u'e51dc3cf03fb14ce94e1835a7858d12d'], u'filename': u'samba-domainjoin-gui-3.5.10-116.el6_2.x86_64.rpm', u'epoch': u'0', u'version': u'3.5.10', u'release': u'116.el6_2', u'arch': u'x86_64'}, {u'src': None, u'name': u'samba-swat', u'sum': [u'md5', u'15ee1e9af7a693e4118f5b7d238e6e59'], u'filename': u'samba-swat-3.5.10-116.el6_2.x86_64.rpm', u'epoch': u'0', u'version': u'3.5.10', u'release': u'116.el6_2', u'arch': u'x86_64'}, {u'src': None, u'name': u'samba-winbind', u'sum': [u'md5', u'f0e7e2f194d0571bb040a12a978e6f96'], u'filename': u'samba-winbind-3.5.10-116.el6_2.x86_64.rpm', u'epoch': u'0', u'version': u'3.5.10', u'release': u'116.el6_2', u'arch': u'x86_64'}, {u'src': None, u'name': u'samba-winbind-clients', u'sum': [u'md5', u'abc19dd62e2f63359c49ee154bde012f'], u'filename': u'samba-winbind-clients-3.5.10-116.el6_2.i686.rpm', u'epoch': u'0', u'version': u'3.5.10', u'release': u'116.el6_2', u'arch': u'i686'}, {u'src': None, u'name': u'samba-winbind-clients', u'sum': [u'md5', u'1f21c63c39591dbefc5119c0a82debbb'], u'filename': u'samba-winbind-clients-3.5.10-116.el6_2.x86_64.rpm', u'epoch': u'0', u'version': u'3.5.10', u'release': u'116.el6_2', u'arch': u'x86_64'}, {u'src': None, u'name': u'samba-winbind-devel', u'sum': [u'md5', u'3a05b58a9e41a0b1fe4210359e317752'], u'filename': u'samba-winbind-devel-3.5.10-116.el6_2.i686.rpm', u'epoch': u'0', u'version': u'3.5.10', u'release': u'116.el6_2', u'arch': u'i686'}, {u'src': None, u'name': u'samba-winbind-devel', u'sum': [u'md5', u'2f2a62b08fafb3105d1bbf6756d7222e'], u'filename': u'samba-winbind-devel-3.5.10-116.el6_2.x86_64.rpm', u'epoch': u'0', u'version': u'3.5.10', u'release': u'116.el6_2', u'arch': u'x86_64'}, {u'src': None, u'name': u'samba-winbind-krb5-locator', u'sum': [u'md5', u'3007a2fca3d8e9b9c51630e72b0ab3eb'], u'filename': u'samba-winbind-krb5-locator-3.5.10-116.el6_2.x86_64.rpm', u'epoch': u'0', u'version': u'3.5.10', u'release': u'116.el6_2', u'arch': u'x86_64'}], u'name': u'ol6_x86_64_latest', u'short': u'ol6_x86_64_latest'}, {u'packages': [{u'src': None, u'name': u'samba3x', u'sum': [u'md5', u'ac6657afc145e6573f793e6d55b4c283'], u'filename': u'samba3x-3.5.10-0.109.el5_8.src.rpm', u'epoch': u'0', u'version': u'3.5.10', u'release': u'0.109.el5_8', u'arch': u'src'}, {u'src': None, u'name': u'samba3x', u'sum': [u'md5', u'91c59a6646a4353ee2ba1d9b99fd3350'], u'filename': u'samba3x-3.5.10-0.109.el5_8.x86_64.rpm', u'epoch': u'0', u'version': u'3.5.10', u'release': u'0.109.el5_8', u'arch': u'x86_64'}, {u'src': None, u'name': u'samba3x-client', u'sum': [u'md5', u'7810f3a4990b7d481512fe967966594b'], u'filename': u'samba3x-client-3.5.10-0.109.el5_8.x86_64.rpm', u'epoch': u'0', u'version': u'3.5.10', u'release': u'0.109.el5_8', u'arch': u'x86_64'}, {u'src': None, u'name': u'samba3x-common', u'sum': [u'md5', u'fb3b9886b4294d1394a3f947acd6d21c'], u'filename': u'samba3x-common-3.5.10-0.109.el5_8.x86_64.rpm', u'epoch': u'0', u'version': u'3.5.10', u'release': u'0.109.el5_8', u'arch': u'x86_64'}, {u'src': None, u'name': u'samba3x-doc', u'sum': [u'md5', u'de2cb217a7c862a66acf7cbdbac43f6e'], u'filename': u'samba3x-doc-3.5.10-0.109.el5_8.x86_64.rpm', u'epoch': u'0', u'version': u'3.5.10', u'release': u'0.109.el5_8', u'arch': u'x86_64'}, {u'src': None, u'name': u'samba3x-domainjoin-gui', u'sum': [u'md5', u'22ff56a0805a26603fa0053a455b2f5b'], u'filename': u'samba3x-domainjoin-gui-3.5.10-0.109.el5_8.x86_64.rpm', u'epoch': u'0', u'version': u'3.5.10', u'release': u'0.109.el5_8', u'arch': u'x86_64'}, {u'src': None, u'name': u'samba3x-swat', u'sum': [u'md5', u'ef215334c5a3ca86976b61ec179689ad'], u'filename': u'samba3x-swat-3.5.10-0.109.el5_8.x86_64.rpm', u'epoch': u'0', u'version': u'3.5.10', u'release': u'0.109.el5_8', u'arch': u'x86_64'}, {u'src': None, u'name': u'samba3x-winbind', u'sum': [u'md5', u'57ad2d3a492716027f067ce4d486febb'], u'filename': u'samba3x-winbind-3.5.10-0.109.el5_8.i386.rpm', u'epoch': u'0', u'version': u'3.5.10', u'release': u'0.109.el5_8', u'arch': u'i386'}, {u'src': None, u'name': u'samba3x-winbind', u'sum': [u'md5', u'6dda64756adf068e84ff5a1371dd9266'], u'filename': u'samba3x-winbind-3.5.10-0.109.el5_8.x86_64.rpm', u'epoch': u'0', u'version': u'3.5.10', u'release': u'0.109.el5_8', u'arch': u'x86_64'}, {u'src': None, u'name': u'samba3x-winbind-devel', u'sum': [u'md5', u'3e1a8bdeead516497c0089856029ba8c'], u'filename': u'samba3x-winbind-devel-3.5.10-0.109.el5_8.i386.rpm', u'epoch': u'0', u'version': u'3.5.10', u'release': u'0.109.el5_8', u'arch': u'i386'}, {u'src': None, u'name': u'samba3x-winbind-devel', u'sum': [u'md5', u'091e68e9ae59fd69d3e0544ff84618ae'], u'filename': u'samba3x-winbind-devel-3.5.10-0.109.el5_8.x86_64.rpm', u'epoch': u'0', u'version': u'3.5.10', u'release': u'0.109.el5_8', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u'[6.2.8.0-15.el5]\n- Fix for PostScript conversion was incomplete, as larger documents\n would end up being cropped without the -g option (797364)\n\n[6.2.8.0-14.el5]\n- Add fix for CVE-2012-0247 CVE-2012-0248 CVE-2012-1185 CVE-2012-1186\n- Add fix for CVE-2012-0259 CVE-2012-0260 CVE-2012-1798\n\n[6.2.8.0-13.el5]\n- Fix PostScript conversion failing with /undefinedfilename (797364)', u'issued': u'2012-05-07', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELSA-2012-0545.html', u'type': u'self', u'id': None, u'title': u'ELSA-2012-0545'}, {u'href': u'http://linux.oracle.com/cve/CVE-2012-0247.html', u'type': u'cve', u'id': u'CVE-2012-0247', u'title': u'CVE-2012-0247'}, {u'href': u'http://linux.oracle.com/cve/CVE-2012-0248.html', u'type': u'cve', u'id': u'CVE-2012-0248', u'title': u'CVE-2012-0248'}, {u'href': u'http://linux.oracle.com/cve/CVE-2012-0260.html', u'type': u'cve', u'id': u'CVE-2012-0260', u'title': u'CVE-2012-0260'}], u'_content_type_id': u'erratum', u'_id': u'bf799cde-777c-409f-8664-71982ecfe010', u'from': u'el-errata@oss.oracle.com', u'severity': u'Moderate', u'title': u' ImageMagick security and bug fix update', u'_ns': u'units_erratum', u'rights': u'Copyright 2012 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 5', u'reboot_suggested': False, u'type': u'security', u'pkglist': [{u'packages': [{u'src': None, u'name': u'ImageMagick', u'sum': [u'md5', u'212563ec8a66d0ccc0c0300a90d5a26c'], u'filename': u'ImageMagick-6.2.8.0-15.el5_8.i386.rpm', u'epoch': u'0', u'version': u'6.2.8.0', u'release': u'15.el5_8', u'arch': u'i386'}, {u'src': None, u'name': u'ImageMagick', u'sum': [u'md5', u'527e8c2ec6584ea51c7fec26215a7666'], u'filename': u'ImageMagick-6.2.8.0-15.el5_8.src.rpm', u'epoch': u'0', u'version': u'6.2.8.0', u'release': u'15.el5_8', u'arch': u'src'}, {u'src': None, u'name': u'ImageMagick', u'sum': [u'md5', u'5de8cabbc2c842328426630b1a3f1742'], u'filename': u'ImageMagick-6.2.8.0-15.el5_8.x86_64.rpm', u'epoch': u'0', u'version': u'6.2.8.0', u'release': u'15.el5_8', u'arch': u'x86_64'}, {u'src': None, u'name': u'ImageMagick-c++', u'sum': [u'md5', u'e7dfb5cbe0c8baa9050d8b182fd851bc'], u'filename': u'ImageMagick-c++-6.2.8.0-15.el5_8.i386.rpm', u'epoch': u'0', u'version': u'6.2.8.0', u'release': u'15.el5_8', u'arch': u'i386'}, {u'src': None, u'name': u'ImageMagick-c++', u'sum': [u'md5', u'9710887a79066b220a8450ee1d9e94f2'], u'filename': u'ImageMagick-c++-6.2.8.0-15.el5_8.x86_64.rpm', u'epoch': u'0', u'version': u'6.2.8.0', u'release': u'15.el5_8', u'arch': u'x86_64'}, {u'src': None, u'name': u'ImageMagick-c++-devel', u'sum': [u'md5', u'e32e798e9aad4abb51cd3bdd41a3049a'], u'filename': u'ImageMagick-c++-devel-6.2.8.0-15.el5_8.i386.rpm', u'epoch': u'0', u'version': u'6.2.8.0', u'release': u'15.el5_8', u'arch': u'i386'}, {u'src': None, u'name': u'ImageMagick-c++-devel', u'sum': [u'md5', u'8e778d1781639f51d17731f7f586c87f'], u'filename': u'ImageMagick-c++-devel-6.2.8.0-15.el5_8.x86_64.rpm', u'epoch': u'0', u'version': u'6.2.8.0', u'release': u'15.el5_8', u'arch': u'x86_64'}, {u'src': None, u'name': u'ImageMagick-devel', u'sum': [u'md5', u'b081b18c2b85a7a86948b9f1c21842dd'], u'filename': u'ImageMagick-devel-6.2.8.0-15.el5_8.i386.rpm', u'epoch': u'0', u'version': u'6.2.8.0', u'release': u'15.el5_8', u'arch': u'i386'}, {u'src': None, u'name': u'ImageMagick-devel', u'sum': [u'md5', u'2c614c4218e59242038186606a9b7487'], u'filename': u'ImageMagick-devel-6.2.8.0-15.el5_8.x86_64.rpm', u'epoch': u'0', u'version': u'6.2.8.0', u'release': u'15.el5_8', u'arch': u'x86_64'}, {u'src': None, u'name': u'ImageMagick-perl', u'sum': [u'md5', u'0246569af3b358f8c0325f8741ad57a0'], u'filename': u'ImageMagick-perl-6.2.8.0-15.el5_8.x86_64.rpm', u'epoch': u'0', u'version': u'6.2.8.0', u'release': u'15.el5_8', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u'[5.3.3-3.8]\n- correct detection of = in CVE-2012-1823 fix (#818607)\n\n[5.3.3-3.7]\n- add security fix for CVE-2012-1823 (#818607)', u'issued': u'2012-05-07', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELSA-2012-0546.html', u'type': u'self', u'id': None, u'title': u'ELSA-2012-0546'}, {u'href': u'http://linux.oracle.com/cve/CVE-2012-1823.html', u'type': u'cve', u'id': u'CVE-2012-1823', u'title': u'CVE-2012-1823'}], u'_content_type_id': u'erratum', u'_id': u'ef253a50-2bac-4489-b0b4-ec8e871145f4', u'from': u'el-errata@oss.oracle.com', u'severity': u'Critical', u'title': u' php security update', u'_ns': u'units_erratum', u'rights': u'Copyright 2012 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 6', u'reboot_suggested': False, u'type': u'security', u'pkglist': [{u'packages': [{u'src': None, u'name': u'php', u'sum': [u'md5', u'c0b6b1839999a278a2e504407bcd8ec0'], u'filename': u'php-5.3.3-3.el6_2.8.src.rpm', u'epoch': u'0', u'version': u'5.3.3', u'release': u'3.el6_2.8', u'arch': u'src'}, {u'src': None, u'name': u'php', u'sum': [u'md5', u'9821c31a3ae2ce40ce18c8bef8f81b89'], u'filename': u'php-5.3.3-3.el6_2.8.x86_64.rpm', u'epoch': u'0', u'version': u'5.3.3', u'release': u'3.el6_2.8', u'arch': u'x86_64'}, {u'src': None, u'name': u'php-bcmath', u'sum': [u'md5', u'a03cdcfed96c6b9f9f51a044af14c14a'], u'filename': u'php-bcmath-5.3.3-3.el6_2.8.x86_64.rpm', u'epoch': u'0', u'version': u'5.3.3', u'release': u'3.el6_2.8', u'arch': u'x86_64'}, {u'src': None, u'name': u'php-cli', u'sum': [u'md5', u'b0a1c306d5f1b95d389b78e5710e2c16'], u'filename': u'php-cli-5.3.3-3.el6_2.8.x86_64.rpm', u'epoch': u'0', u'version': u'5.3.3', u'release': u'3.el6_2.8', u'arch': u'x86_64'}, {u'src': None, u'name': u'php-common', u'sum': [u'md5', u'9a1954e09179e6726396090d5f170c28'], u'filename': u'php-common-5.3.3-3.el6_2.8.x86_64.rpm', u'epoch': u'0', u'version': u'5.3.3', u'release': u'3.el6_2.8', u'arch': u'x86_64'}, {u'src': None, u'name': u'php-dba', u'sum': [u'md5', u'a08f648f1ac5409f33c30f675cbfc280'], u'filename': u'php-dba-5.3.3-3.el6_2.8.x86_64.rpm', u'epoch': u'0', u'version': u'5.3.3', u'release': u'3.el6_2.8', u'arch': u'x86_64'}, {u'src': None, u'name': u'php-devel', u'sum': [u'md5', u'415f2fc39bcf201ac33ef8d2876f5aea'], u'filename': u'php-devel-5.3.3-3.el6_2.8.x86_64.rpm', u'epoch': u'0', u'version': u'5.3.3', u'release': u'3.el6_2.8', u'arch': u'x86_64'}, {u'src': None, u'name': u'php-embedded', u'sum': [u'md5', u'0734fbd212b7f786795b76387fb5f4c2'], u'filename': u'php-embedded-5.3.3-3.el6_2.8.x86_64.rpm', u'epoch': u'0', u'version': u'5.3.3', u'release': u'3.el6_2.8', u'arch': u'x86_64'}, {u'src': None, u'name': u'php-enchant', u'sum': [u'md5', u'962829404e2c8fee73bd8a4537181884'], u'filename': u'php-enchant-5.3.3-3.el6_2.8.x86_64.rpm', u'epoch': u'0', u'version': u'5.3.3', u'release': u'3.el6_2.8', u'arch': u'x86_64'}, {u'src': None, u'name': u'php-gd', u'sum': [u'md5', u'62967a0dba9834210ad294b18dc08e5a'], u'filename': u'php-gd-5.3.3-3.el6_2.8.x86_64.rpm', u'epoch': u'0', u'version': u'5.3.3', u'release': u'3.el6_2.8', u'arch': u'x86_64'}, {u'src': None, u'name': u'php-imap', u'sum': [u'md5', u'c22ef8184dcbb5294ba1165c0460641c'], u'filename': u'php-imap-5.3.3-3.el6_2.8.x86_64.rpm', u'epoch': u'0', u'version': u'5.3.3', u'release': u'3.el6_2.8', u'arch': u'x86_64'}, {u'src': None, u'name': u'php-intl', u'sum': [u'md5', u'1991e87cd9002bd8a150fdcedece9d7d'], u'filename': u'php-intl-5.3.3-3.el6_2.8.x86_64.rpm', u'epoch': u'0', u'version': u'5.3.3', u'release': u'3.el6_2.8', u'arch': u'x86_64'}, {u'src': None, u'name': u'php-ldap', u'sum': [u'md5', u'c3ff046d1ac96d5a5ec0979b2b1792a2'], u'filename': u'php-ldap-5.3.3-3.el6_2.8.x86_64.rpm', u'epoch': u'0', u'version': u'5.3.3', u'release': u'3.el6_2.8', u'arch': u'x86_64'}, {u'src': None, u'name': u'php-mbstring', u'sum': [u'md5', u'0d2613975976ae6c284ed1f396adbf0a'], u'filename': u'php-mbstring-5.3.3-3.el6_2.8.x86_64.rpm', u'epoch': u'0', u'version': u'5.3.3', u'release': u'3.el6_2.8', u'arch': u'x86_64'}, {u'src': None, u'name': u'php-mysql', u'sum': [u'md5', u'4d5b8d021fd2e667706533044e4b5ada'], u'filename': u'php-mysql-5.3.3-3.el6_2.8.x86_64.rpm', u'epoch': u'0', u'version': u'5.3.3', u'release': u'3.el6_2.8', u'arch': u'x86_64'}, {u'src': None, u'name': u'php-odbc', u'sum': [u'md5', u'c480c0be1d36e07a086aa98f8b5b4717'], u'filename': u'php-odbc-5.3.3-3.el6_2.8.x86_64.rpm', u'epoch': u'0', u'version': u'5.3.3', u'release': u'3.el6_2.8', u'arch': u'x86_64'}, {u'src': None, u'name': u'php-pdo', u'sum': [u'md5', u'97f3b0d522449096395ce452b30852e9'], u'filename': u'php-pdo-5.3.3-3.el6_2.8.x86_64.rpm', u'epoch': u'0', u'version': u'5.3.3', u'release': u'3.el6_2.8', u'arch': u'x86_64'}, {u'src': None, u'name': u'php-pgsql', u'sum': [u'md5', u'2da86e64f89ea90f2e109cd380f06046'], u'filename': u'php-pgsql-5.3.3-3.el6_2.8.x86_64.rpm', u'epoch': u'0', u'version': u'5.3.3', u'release': u'3.el6_2.8', u'arch': u'x86_64'}, {u'src': None, u'name': u'php-process', u'sum': [u'md5', u'ded54593b120ce4455527f9a5bfd1370'], u'filename': u'php-process-5.3.3-3.el6_2.8.x86_64.rpm', u'epoch': u'0', u'version': u'5.3.3', u'release': u'3.el6_2.8', u'arch': u'x86_64'}, {u'src': None, u'name': u'php-pspell', u'sum': [u'md5', u'c36c4802cadf4c771c26e9dce1ddd336'], u'filename': u'php-pspell-5.3.3-3.el6_2.8.x86_64.rpm', u'epoch': u'0', u'version': u'5.3.3', u'release': u'3.el6_2.8', u'arch': u'x86_64'}, {u'src': None, u'name': u'php-recode', u'sum': [u'md5', u'df1b3c555563589f59476f5800a902ac'], u'filename': u'php-recode-5.3.3-3.el6_2.8.x86_64.rpm', u'epoch': u'0', u'version': u'5.3.3', u'release': u'3.el6_2.8', u'arch': u'x86_64'}, {u'src': None, u'name': u'php-snmp', u'sum': [u'md5', u'dea7d462b72ab68900c1ef0876198ac4'], u'filename': u'php-snmp-5.3.3-3.el6_2.8.x86_64.rpm', u'epoch': u'0', u'version': u'5.3.3', u'release': u'3.el6_2.8', u'arch': u'x86_64'}, {u'src': None, u'name': u'php-soap', u'sum': [u'md5', u'965a124aa8212657e0edd298c93d572a'], u'filename': u'php-soap-5.3.3-3.el6_2.8.x86_64.rpm', u'epoch': u'0', u'version': u'5.3.3', u'release': u'3.el6_2.8', u'arch': u'x86_64'}, {u'src': None, u'name': u'php-tidy', u'sum': [u'md5', u'736ac4fe632cb557448ab7b57f53bb09'], u'filename': u'php-tidy-5.3.3-3.el6_2.8.x86_64.rpm', u'epoch': u'0', u'version': u'5.3.3', u'release': u'3.el6_2.8', u'arch': u'x86_64'}, {u'src': None, u'name': u'php-xml', u'sum': [u'md5', u'f5f7417ef603ddf20edd606059f25bdd'], u'filename': u'php-xml-5.3.3-3.el6_2.8.x86_64.rpm', u'epoch': u'0', u'version': u'5.3.3', u'release': u'3.el6_2.8', u'arch': u'x86_64'}, {u'src': None, u'name': u'php-xmlrpc', u'sum': [u'md5', u'11940a3012a9ce2c16475bf8a0a8ba46'], u'filename': u'php-xmlrpc-5.3.3-3.el6_2.8.x86_64.rpm', u'epoch': u'0', u'version': u'5.3.3', u'release': u'3.el6_2.8', u'arch': u'x86_64'}, {u'src': None, u'name': u'php-zts', u'sum': [u'md5', u'60a94b4c3af60849dca42af7f2c70085'], u'filename': u'php-zts-5.3.3-3.el6_2.8.x86_64.rpm', u'epoch': u'0', u'version': u'5.3.3', u'release': u'3.el6_2.8', u'arch': u'x86_64'}], u'name': u'ol6_x86_64_latest', u'short': u'ol6_x86_64_latest'}, {u'packages': [{u'src': None, u'name': u'php', u'sum': [u'md5', u'88495bb9317334890f3da90a37033d77'], u'filename': u'php-5.1.6-34.el5_8.src.rpm', u'epoch': u'0', u'version': u'5.1.6', u'release': u'34.el5_8', u'arch': u'src'}, {u'src': None, u'name': u'php', u'sum': [u'md5', u'5f243a7b0fddd7ebc27df93f19fd91e9'], u'filename': u'php-5.1.6-34.el5_8.x86_64.rpm', u'epoch': u'0', u'version': u'5.1.6', u'release': u'34.el5_8', u'arch': u'x86_64'}, {u'src': None, u'name': u'php-bcmath', u'sum': [u'md5', u'9554114f7ba0a4870f786faa9bd09429'], u'filename': u'php-bcmath-5.1.6-34.el5_8.x86_64.rpm', u'epoch': u'0', u'version': u'5.1.6', u'release': u'34.el5_8', u'arch': u'x86_64'}, {u'src': None, u'name': u'php-cli', u'sum': [u'md5', u'9ede29694ee91c84796865db01e3c950'], u'filename': u'php-cli-5.1.6-34.el5_8.x86_64.rpm', u'epoch': u'0', u'version': u'5.1.6', u'release': u'34.el5_8', u'arch': u'x86_64'}, {u'src': None, u'name': u'php-common', u'sum': [u'md5', u'827dabaac5c5c65740f6a87d9b185306'], u'filename': u'php-common-5.1.6-34.el5_8.x86_64.rpm', u'epoch': u'0', u'version': u'5.1.6', u'release': u'34.el5_8', u'arch': u'x86_64'}, {u'src': None, u'name': u'php-dba', u'sum': [u'md5', u'74274b12b3325940222dace99afe58cc'], u'filename': u'php-dba-5.1.6-34.el5_8.x86_64.rpm', u'epoch': u'0', u'version': u'5.1.6', u'release': u'34.el5_8', u'arch': u'x86_64'}, {u'src': None, u'name': u'php-devel', u'sum': [u'md5', u'fc59d0da65a822b5453c93d686de2f93'], u'filename': u'php-devel-5.1.6-34.el5_8.x86_64.rpm', u'epoch': u'0', u'version': u'5.1.6', u'release': u'34.el5_8', u'arch': u'x86_64'}, {u'src': None, u'name': u'php-gd', u'sum': [u'md5', u'd98ecd4eb8f5d4c09703c678f14830dc'], u'filename': u'php-gd-5.1.6-34.el5_8.x86_64.rpm', u'epoch': u'0', u'version': u'5.1.6', u'release': u'34.el5_8', u'arch': u'x86_64'}, {u'src': None, u'name': u'php-imap', u'sum': [u'md5', u'cae93f0adba21c2a66a63fa9f5600816'], u'filename': u'php-imap-5.1.6-34.el5_8.x86_64.rpm', u'epoch': u'0', u'version': u'5.1.6', u'release': u'34.el5_8', u'arch': u'x86_64'}, {u'src': None, u'name': u'php-ldap', u'sum': [u'md5', u'8869346de5ca7fee00b615eeb1e3d153'], u'filename': u'php-ldap-5.1.6-34.el5_8.x86_64.rpm', u'epoch': u'0', u'version': u'5.1.6', u'release': u'34.el5_8', u'arch': u'x86_64'}, {u'src': None, u'name': u'php-mbstring', u'sum': [u'md5', u'9c4c159bac9f56907eb5577c103d3cd2'], u'filename': u'php-mbstring-5.1.6-34.el5_8.x86_64.rpm', u'epoch': u'0', u'version': u'5.1.6', u'release': u'34.el5_8', u'arch': u'x86_64'}, {u'src': None, u'name': u'php-mysql', u'sum': [u'md5', u'684c25365832c0dbe20baa55273fd2ed'], u'filename': u'php-mysql-5.1.6-34.el5_8.x86_64.rpm', u'epoch': u'0', u'version': u'5.1.6', u'release': u'34.el5_8', u'arch': u'x86_64'}, {u'src': None, u'name': u'php-ncurses', u'sum': [u'md5', u'4923194a0274592b583658bb241068b6'], u'filename': u'php-ncurses-5.1.6-34.el5_8.x86_64.rpm', u'epoch': u'0', u'version': u'5.1.6', u'release': u'34.el5_8', u'arch': u'x86_64'}, {u'src': None, u'name': u'php-odbc', u'sum': [u'md5', u'1f15ba8db5a30fd63fc3742e512305e5'], u'filename': u'php-odbc-5.1.6-34.el5_8.x86_64.rpm', u'epoch': u'0', u'version': u'5.1.6', u'release': u'34.el5_8', u'arch': u'x86_64'}, {u'src': None, u'name': u'php-pdo', u'sum': [u'md5', u'7cec3ce249b132a318621c666b804e3c'], u'filename': u'php-pdo-5.1.6-34.el5_8.x86_64.rpm', u'epoch': u'0', u'version': u'5.1.6', u'release': u'34.el5_8', u'arch': u'x86_64'}, {u'src': None, u'name': u'php-pgsql', u'sum': [u'md5', u'e2853281039412cf5476bc576ce8ada8'], u'filename': u'php-pgsql-5.1.6-34.el5_8.x86_64.rpm', u'epoch': u'0', u'version': u'5.1.6', u'release': u'34.el5_8', u'arch': u'x86_64'}, {u'src': None, u'name': u'php-snmp', u'sum': [u'md5', u'3265f4feeb14e1fc99a46ec8123b5485'], u'filename': u'php-snmp-5.1.6-34.el5_8.x86_64.rpm', u'epoch': u'0', u'version': u'5.1.6', u'release': u'34.el5_8', u'arch': u'x86_64'}, {u'src': None, u'name': u'php-soap', u'sum': [u'md5', u'9a34961ac70ef2b108479e15320aef89'], u'filename': u'php-soap-5.1.6-34.el5_8.x86_64.rpm', u'epoch': u'0', u'version': u'5.1.6', u'release': u'34.el5_8', u'arch': u'x86_64'}, {u'src': None, u'name': u'php-xml', u'sum': [u'md5', u'f0a6d2ab2e1161a248c00cde6389708f'], u'filename': u'php-xml-5.1.6-34.el5_8.x86_64.rpm', u'epoch': u'0', u'version': u'5.1.6', u'release': u'34.el5_8', u'arch': u'x86_64'}, {u'src': None, u'name': u'php-xmlrpc', u'sum': [u'md5', u'4f2977ed42d6d645bcb9f2fd33e6aa28'], u'filename': u'php-xmlrpc-5.1.6-34.el5_8.x86_64.rpm', u'epoch': u'0', u'version': u'5.1.6', u'release': u'34.el5_8', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u'[5.3.3-7]\n- correct detection of = in CVE-2012-1823 fix (#818607)\n\n[5.3.3-6]\n- add security fix for CVE-2012-1823 (#818607)', u'issued': u'2012-05-07', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELSA-2012-0547.html', u'type': u'self', u'id': None, u'title': u'ELSA-2012-0547'}, {u'href': u'http://linux.oracle.com/cve/CVE-2012-1823.html', u'type': u'cve', u'id': u'CVE-2012-1823', u'title': u'CVE-2012-1823'}], u'_content_type_id': u'erratum', u'_id': u'22c0d214-74d8-4c47-ae1c-16b9d21e753f', u'from': u'el-errata@oss.oracle.com', u'severity': u'Critical', u'title': u' php53 security update', u'_ns': u'units_erratum', u'rights': u'Copyright 2012 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 5', u'reboot_suggested': False, u'type': u'security', u'pkglist': [{u'packages': [{u'src': None, u'name': u'php53', u'sum': [u'md5', u'7b8decb8db2e737413e7ae3cfd7aeccb'], u'filename': u'php53-5.3.3-7.el5_8.src.rpm', u'epoch': u'0', u'version': u'5.3.3', u'release': u'7.el5_8', u'arch': u'src'}, {u'src': None, u'name': u'php53', u'sum': [u'md5', u'1b22cae8c76b6f9bd76092013e53241c'], u'filename': u'php53-5.3.3-7.el5_8.x86_64.rpm', u'epoch': u'0', u'version': u'5.3.3', u'release': u'7.el5_8', u'arch': u'x86_64'}, {u'src': None, u'name': u'php53-bcmath', u'sum': [u'md5', u'4c1172d75e2578fadd28e4bbc85c0219'], u'filename': u'php53-bcmath-5.3.3-7.el5_8.x86_64.rpm', u'epoch': u'0', u'version': u'5.3.3', u'release': u'7.el5_8', u'arch': u'x86_64'}, {u'src': None, u'name': u'php53-cli', u'sum': [u'md5', u'dffd437eeec40613d31a36a46903c69b'], u'filename': u'php53-cli-5.3.3-7.el5_8.x86_64.rpm', u'epoch': u'0', u'version': u'5.3.3', u'release': u'7.el5_8', u'arch': u'x86_64'}, {u'src': None, u'name': u'php53-common', u'sum': [u'md5', u'56a215aacc2597a13629ba599bfc3a65'], u'filename': u'php53-common-5.3.3-7.el5_8.x86_64.rpm', u'epoch': u'0', u'version': u'5.3.3', u'release': u'7.el5_8', u'arch': u'x86_64'}, {u'src': None, u'name': u'php53-dba', u'sum': [u'md5', u'f236b9d56c3c1bcbbaf2b1e54b5fa534'], u'filename': u'php53-dba-5.3.3-7.el5_8.x86_64.rpm', u'epoch': u'0', u'version': u'5.3.3', u'release': u'7.el5_8', u'arch': u'x86_64'}, {u'src': None, u'name': u'php53-devel', u'sum': [u'md5', u'20c612372c037f666bb4727137afe1ab'], u'filename': u'php53-devel-5.3.3-7.el5_8.x86_64.rpm', u'epoch': u'0', u'version': u'5.3.3', u'release': u'7.el5_8', u'arch': u'x86_64'}, {u'src': None, u'name': u'php53-gd', u'sum': [u'md5', u'424525d14ff70086027d54ea3159499a'], u'filename': u'php53-gd-5.3.3-7.el5_8.x86_64.rpm', u'epoch': u'0', u'version': u'5.3.3', u'release': u'7.el5_8', u'arch': u'x86_64'}, {u'src': None, u'name': u'php53-imap', u'sum': [u'md5', u'daba0fb6bfdef43c3c473bbb7de7db5b'], u'filename': u'php53-imap-5.3.3-7.el5_8.x86_64.rpm', u'epoch': u'0', u'version': u'5.3.3', u'release': u'7.el5_8', u'arch': u'x86_64'}, {u'src': None, u'name': u'php53-intl', u'sum': [u'md5', u'c98d7962e3eea34810fa89a7a76c6274'], u'filename': u'php53-intl-5.3.3-7.el5_8.x86_64.rpm', u'epoch': u'0', u'version': u'5.3.3', u'release': u'7.el5_8', u'arch': u'x86_64'}, {u'src': None, u'name': u'php53-ldap', u'sum': [u'md5', u'8e61f42783d7e9ff9b1ece64b5c707d2'], u'filename': u'php53-ldap-5.3.3-7.el5_8.x86_64.rpm', u'epoch': u'0', u'version': u'5.3.3', u'release': u'7.el5_8', u'arch': u'x86_64'}, {u'src': None, u'name': u'php53-mbstring', u'sum': [u'md5', u'113d06ca5271c2acdf1de89fe686eb1a'], u'filename': u'php53-mbstring-5.3.3-7.el5_8.x86_64.rpm', u'epoch': u'0', u'version': u'5.3.3', u'release': u'7.el5_8', u'arch': u'x86_64'}, {u'src': None, u'name': u'php53-mysql', u'sum': [u'md5', u'46ffcd7d79634bf98c5c5eb54f1a9952'], u'filename': u'php53-mysql-5.3.3-7.el5_8.x86_64.rpm', u'epoch': u'0', u'version': u'5.3.3', u'release': u'7.el5_8', u'arch': u'x86_64'}, {u'src': None, u'name': u'php53-odbc', u'sum': [u'md5', u'42ff882388504cef51d248d02f0b51f6'], u'filename': u'php53-odbc-5.3.3-7.el5_8.x86_64.rpm', u'epoch': u'0', u'version': u'5.3.3', u'release': u'7.el5_8', u'arch': u'x86_64'}, {u'src': None, u'name': u'php53-pdo', u'sum': [u'md5', u'6c14151bdb4fb6d0486e58ed8ac301c9'], u'filename': u'php53-pdo-5.3.3-7.el5_8.x86_64.rpm', u'epoch': u'0', u'version': u'5.3.3', u'release': u'7.el5_8', u'arch': u'x86_64'}, {u'src': None, u'name': u'php53-pgsql', u'sum': [u'md5', u'2c581b613756e400d3f186a8f3e04aa9'], u'filename': u'php53-pgsql-5.3.3-7.el5_8.x86_64.rpm', u'epoch': u'0', u'version': u'5.3.3', u'release': u'7.el5_8', u'arch': u'x86_64'}, {u'src': None, u'name': u'php53-process', u'sum': [u'md5', u'787842d8bf3cc13ab07c6f13ca5278ba'], u'filename': u'php53-process-5.3.3-7.el5_8.x86_64.rpm', u'epoch': u'0', u'version': u'5.3.3', u'release': u'7.el5_8', u'arch': u'x86_64'}, {u'src': None, u'name': u'php53-pspell', u'sum': [u'md5', u'0d195cbbd6159a2d2aa8263516038edf'], u'filename': u'php53-pspell-5.3.3-7.el5_8.x86_64.rpm', u'epoch': u'0', u'version': u'5.3.3', u'release': u'7.el5_8', u'arch': u'x86_64'}, {u'src': None, u'name': u'php53-snmp', u'sum': [u'md5', u'df9b388f0e71cd44d89b4942d58aab58'], u'filename': u'php53-snmp-5.3.3-7.el5_8.x86_64.rpm', u'epoch': u'0', u'version': u'5.3.3', u'release': u'7.el5_8', u'arch': u'x86_64'}, {u'src': None, u'name': u'php53-soap', u'sum': [u'md5', u'e109e5382f70103ad319802fa1ad6b15'], u'filename': u'php53-soap-5.3.3-7.el5_8.x86_64.rpm', u'epoch': u'0', u'version': u'5.3.3', u'release': u'7.el5_8', u'arch': u'x86_64'}, {u'src': None, u'name': u'php53-xml', u'sum': [u'md5', u'0b990aeac98414dd344e692eb2f64c2e'], u'filename': u'php53-xml-5.3.3-7.el5_8.x86_64.rpm', u'epoch': u'0', u'version': u'5.3.3', u'release': u'7.el5_8', u'arch': u'x86_64'}, {u'src': None, u'name': u'php53-xmlrpc', u'sum': [u'md5', u'e0446986e6266f384300ed5e4fc51b0c'], u'filename': u'php53-xmlrpc-5.3.3-7.el5_8.x86_64.rpm', u'epoch': u'0', u'version': u'5.3.3', u'release': u'7.el5_8', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u'[kvm-83-249.0.1.el5_8.4]\n- Added kvm-add-oracle-workaround-for-libvirt-bug.patch\n- Added kvm-Introduce-oel-machine-type.patch\n\n[kvm-83-249.el5_8.4]\n- kvm-kernel-KVM-unmap-pages-from-the-iommu-when-slots-are-remove.patch [bz#814151]\n- CVE: CVE-2012-2121\n- Resolves: bz#814151\n (CVE-2012-2121 kvm: device assignment page leak [rhel-5.8])\n\n[kvm-83-249.el5_8.3]\n- kvm-fix-l1_map-buffer-overflow.patch [bz#816207]\n- Resolves: bz#816207\n (qemu-kvm segfault in tb_invalidate_phys_page_range())\n\n[kvm-83-249.el5_8.2]\n- kvm-kernel-KVM-Ensure-all-vcpus-are-consistent-with-in-kernel-i.patch [bz#808205]\n- Resolves: bz#808205\n (CVE-2012-1601 kernel: kvm: irqchip_in_kernel() and vcpu->arch.apic inconsistency [rhel-5.8.z])\n\n[kvm-83-249.el5_8.1]\n- kvm-posix-aio-compat-fix-thread-accounting-leak.patch [bz#802429]\n- Resolves: bz#802429\n ([RHEL5.8 Snapshot2]RHEL5.8 KVMGuest hung during Guest OS booting up)', u'issued': u'2012-05-21', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELSA-2012-0676.html', u'type': u'self', u'id': None, u'title': u'ELSA-2012-0676'}, {u'href': u'http://linux.oracle.com/cve/CVE-2012-1601.html', u'type': u'cve', u'id': u'CVE-2012-1601', u'title': u'CVE-2012-1601'}, {u'href': u'http://linux.oracle.com/cve/CVE-2012-2121.html', u'type': u'cve', u'id': u'CVE-2012-2121', u'title': u'CVE-2012-2121'}], u'_content_type_id': u'erratum', u'_id': u'8f684753-7021-4c35-8cbf-73d823f08151', u'from': u'el-errata@oss.oracle.com', u'severity': u'Moderate', u'title': u' kvm security and bug fix update', u'_ns': u'units_erratum', u'rights': u'Copyright 2012 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 5', u'reboot_suggested': False, u'type': u'security', u'pkglist': [{u'packages': [{u'src': None, u'name': u'kmod-kvm', u'sum': [u'md5', u'6ac8421ab922c5d06fddd3abbe5819bd'], u'filename': u'kmod-kvm-83-249.0.1.el5_8.4.x86_64.rpm', u'epoch': u'0', u'version': u'83', u'release': u'249.0.1.el5_8.4', u'arch': u'x86_64'}, {u'src': None, u'name': u'kmod-kvm-debug', u'sum': [u'md5', u'b7bd66ba5387eb5496bd90b5d0794275'], u'filename': u'kmod-kvm-debug-83-249.0.1.el5_8.4.x86_64.rpm', u'epoch': u'0', u'version': u'83', u'release': u'249.0.1.el5_8.4', u'arch': u'x86_64'}, {u'src': None, u'name': u'kvm', u'sum': [u'md5', u'50071e38f82fe85f7d562e7d631269aa'], u'filename': u'kvm-83-249.0.1.el5_8.4.src.rpm', u'epoch': u'0', u'version': u'83', u'release': u'249.0.1.el5_8.4', u'arch': u'src'}, {u'src': None, u'name': u'kvm', u'sum': [u'md5', u'23d0105a288887cc129f184f421dabbd'], u'filename': u'kvm-83-249.0.1.el5_8.4.x86_64.rpm', u'epoch': u'0', u'version': u'83', u'release': u'249.0.1.el5_8.4', u'arch': u'x86_64'}, {u'src': None, u'name': u'kvm-qemu-img', u'sum': [u'md5', u'ab1165f5b3c9bd7c771bbc0fe0e4590c'], u'filename': u'kvm-qemu-img-83-249.0.1.el5_8.4.x86_64.rpm', u'epoch': u'0', u'version': u'83', u'release': u'249.0.1.el5_8.4', u'arch': u'x86_64'}, {u'src': None, u'name': u'kvm-tools', u'sum': [u'md5', u'7b8c220b12b70b46db4f9d227e61e7b9'], u'filename': u'kvm-tools-83-249.0.1.el5_8.4.x86_64.rpm', u'epoch': u'0', u'version': u'83', u'release': u'249.0.1.el5_8.4', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u'[8.1.23-4]\n- Back-port upstream fixes for CVE-2012-0866 and CVE-2012-0868\nResolves: #812070\n\n[8.1.23-3]\n- Back-port upstream fix for unregistering OpenSSL callbacks at close\nResolves: #728828\n\n[8.1.23-2]\n- Back-port upstream fix for CVE-2011-2483\nResolves: #740738', u'issued': u'2012-05-21', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELSA-2012-0677.html', u'type': u'self', u'id': None, u'title': u'ELSA-2012-0677'}, {u'href': u'http://linux.oracle.com/cve/CVE-2012-0866.html', u'type': u'cve', u'id': u'CVE-2012-0866', u'title': u'CVE-2012-0866'}, {u'href': u'http://linux.oracle.com/cve/CVE-2012-0868.html', u'type': u'cve', u'id': u'CVE-2012-0868', u'title': u'CVE-2012-0868'}], u'_content_type_id': u'erratum', u'_id': u'e9314bec-1549-412a-a2ad-218ddf9ccaa7', u'from': u'el-errata@oss.oracle.com', u'severity': u'Moderate', u'title': u' postgresql security update', u'_ns': u'units_erratum', u'rights': u'Copyright 2012 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 5', u'reboot_suggested': False, u'type': u'security', u'pkglist': [{u'packages': [{u'src': None, u'name': u'postgresql', u'sum': [u'md5', u'88564414c04b78239c94dae641ac1c81'], u'filename': u'postgresql-8.1.23-4.el5_8.src.rpm', u'epoch': u'0', u'version': u'8.1.23', u'release': u'4.el5_8', u'arch': u'src'}, {u'src': None, u'name': u'postgresql', u'sum': [u'md5', u'6d841f80033cd7a26fdf98821ba42d04'], u'filename': u'postgresql-8.1.23-4.el5_8.x86_64.rpm', u'epoch': u'0', u'version': u'8.1.23', u'release': u'4.el5_8', u'arch': u'x86_64'}, {u'src': None, u'name': u'postgresql-contrib', u'sum': [u'md5', u'63c01e659a50ccdee3e66de5e42ed949'], u'filename': u'postgresql-contrib-8.1.23-4.el5_8.x86_64.rpm', u'epoch': u'0', u'version': u'8.1.23', u'release': u'4.el5_8', u'arch': u'x86_64'}, {u'src': None, u'name': u'postgresql-devel', u'sum': [u'md5', u'b6b491a444948243f2cf4bd657ae624e'], u'filename': u'postgresql-devel-8.1.23-4.el5_8.i386.rpm', u'epoch': u'0', u'version': u'8.1.23', u'release': u'4.el5_8', u'arch': u'i386'}, {u'src': None, u'name': u'postgresql-devel', u'sum': [u'md5', u'477d0ff50d1818c3e6d7e7ab0d120aaf'], u'filename': u'postgresql-devel-8.1.23-4.el5_8.x86_64.rpm', u'epoch': u'0', u'version': u'8.1.23', u'release': u'4.el5_8', u'arch': u'x86_64'}, {u'src': None, u'name': u'postgresql-docs', u'sum': [u'md5', u'038c76b252ea10b2dd852939cb136eeb'], u'filename': u'postgresql-docs-8.1.23-4.el5_8.x86_64.rpm', u'epoch': u'0', u'version': u'8.1.23', u'release': u'4.el5_8', u'arch': u'x86_64'}, {u'src': None, u'name': u'postgresql-libs', u'sum': [u'md5', u'2ce748061687de98e57bc378b781b48a'], u'filename': u'postgresql-libs-8.1.23-4.el5_8.i386.rpm', u'epoch': u'0', u'version': u'8.1.23', u'release': u'4.el5_8', u'arch': u'i386'}, {u'src': None, u'name': u'postgresql-libs', u'sum': [u'md5', u'b500a966bf288a1fa798a40be91ec063'], u'filename': u'postgresql-libs-8.1.23-4.el5_8.x86_64.rpm', u'epoch': u'0', u'version': u'8.1.23', u'release': u'4.el5_8', u'arch': u'x86_64'}, {u'src': None, u'name': u'postgresql-pl', u'sum': [u'md5', u'ef987d9846c5afb7a4eab9932d028112'], u'filename': u'postgresql-pl-8.1.23-4.el5_8.x86_64.rpm', u'epoch': u'0', u'version': u'8.1.23', u'release': u'4.el5_8', u'arch': u'x86_64'}, {u'src': None, u'name': u'postgresql-python', u'sum': [u'md5', u'68ab46f5f482f3345590f2745da4d9cf'], u'filename': u'postgresql-python-8.1.23-4.el5_8.x86_64.rpm', u'epoch': u'0', u'version': u'8.1.23', u'release': u'4.el5_8', u'arch': u'x86_64'}, {u'src': None, u'name': u'postgresql-server', u'sum': [u'md5', u'8a3c5c131b5b7ac8a288a012be8d7c3f'], u'filename': u'postgresql-server-8.1.23-4.el5_8.x86_64.rpm', u'epoch': u'0', u'version': u'8.1.23', u'release': u'4.el5_8', u'arch': u'x86_64'}, {u'src': None, u'name': u'postgresql-tcl', u'sum': [u'md5', u'6edb01f618a229131c9a709de2429046'], u'filename': u'postgresql-tcl-8.1.23-4.el5_8.x86_64.rpm', u'epoch': u'0', u'version': u'8.1.23', u'release': u'4.el5_8', u'arch': u'x86_64'}, {u'src': None, u'name': u'postgresql-test', u'sum': [u'md5', u'eb3e4f9defbd9237f3edb8b33c17e4db'], u'filename': u'postgresql-test-8.1.23-4.el5_8.x86_64.rpm', u'epoch': u'0', u'version': u'8.1.23', u'release': u'4.el5_8', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u'[8.4.11-1]\n- Update to PostgreSQL 8.4.11, for various fixes described at\n http://www.postgresql.org/docs/8.4/static/release-8-4-11.html\n http://www.postgresql.org/docs/8.4/static/release-8-4-10.html\n including the fixes for CVE-2012-0866, CVE-2012-0867, CVE-2012-0868\nResolves: #812081', u'issued': u'2012-05-21', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELSA-2012-0678.html', u'type': u'self', u'id': None, u'title': u'ELSA-2012-0678'}, {u'href': u'http://linux.oracle.com/cve/CVE-2012-0867.html', u'type': u'cve', u'id': u'CVE-2012-0867', u'title': u'CVE-2012-0867'}, {u'href': u'http://linux.oracle.com/cve/CVE-2012-0866.html', u'type': u'cve', u'id': u'CVE-2012-0866', u'title': u'CVE-2012-0866'}, {u'href': u'http://linux.oracle.com/cve/CVE-2012-0868.html', u'type': u'cve', u'id': u'CVE-2012-0868', u'title': u'CVE-2012-0868'}], u'_content_type_id': u'erratum', u'_id': u'7b0f9984-534c-478b-bce6-ad528aef34c0', u'from': u'el-errata@oss.oracle.com', u'severity': u'Moderate', u'title': u' postgresql and postgresql84 security update', u'_ns': u'units_erratum', u'rights': u'Copyright 2012 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 6', u'reboot_suggested': False, u'type': u'security', u'pkglist': [{u'packages': [{u'src': None, u'name': u'postgresql', u'sum': [u'md5', u'7aa499411a128bd2fe34086485b14c64'], u'filename': u'postgresql-8.4.11-1.el6_2.i686.rpm', u'epoch': u'0', u'version': u'8.4.11', u'release': u'1.el6_2', u'arch': u'i686'}, {u'src': None, u'name': u'postgresql', u'sum': [u'md5', u'f669cf2f15d12f28eae969e9e9c890ee'], u'filename': u'postgresql-8.4.11-1.el6_2.src.rpm', u'epoch': u'0', u'version': u'8.4.11', u'release': u'1.el6_2', u'arch': u'src'}, {u'src': None, u'name': u'postgresql', u'sum': [u'md5', u'2d4d2d5189257da1299f206d4579c29d'], u'filename': u'postgresql-8.4.11-1.el6_2.x86_64.rpm', u'epoch': u'0', u'version': u'8.4.11', u'release': u'1.el6_2', u'arch': u'x86_64'}, {u'src': None, u'name': u'postgresql-contrib', u'sum': [u'md5', u'f1c7491ec6bb8e43a71a8343e380244a'], u'filename': u'postgresql-contrib-8.4.11-1.el6_2.x86_64.rpm', u'epoch': u'0', u'version': u'8.4.11', u'release': u'1.el6_2', u'arch': u'x86_64'}, {u'src': None, u'name': u'postgresql-devel', u'sum': [u'md5', u'81a7f7012f1bb9c5259be8dac30948c7'], u'filename': u'postgresql-devel-8.4.11-1.el6_2.i686.rpm', u'epoch': u'0', u'version': u'8.4.11', u'release': u'1.el6_2', u'arch': u'i686'}, {u'src': None, u'name': u'postgresql-devel', u'sum': [u'md5', u'bc7007663cab187fdeb885455a9f1b76'], u'filename': u'postgresql-devel-8.4.11-1.el6_2.x86_64.rpm', u'epoch': u'0', u'version': u'8.4.11', u'release': u'1.el6_2', u'arch': u'x86_64'}, {u'src': None, u'name': u'postgresql-docs', u'sum': [u'md5', u'b0a6f563c1e10682c246b462d2cacfed'], u'filename': u'postgresql-docs-8.4.11-1.el6_2.x86_64.rpm', u'epoch': u'0', u'version': u'8.4.11', u'release': u'1.el6_2', u'arch': u'x86_64'}, {u'src': None, u'name': u'postgresql-libs', u'sum': [u'md5', u'acff950533ac80c3199ab8dfc08a3632'], u'filename': u'postgresql-libs-8.4.11-1.el6_2.i686.rpm', u'epoch': u'0', u'version': u'8.4.11', u'release': u'1.el6_2', u'arch': u'i686'}, {u'src': None, u'name': u'postgresql-libs', u'sum': [u'md5', u'7cecf25572eef5973582c2e42a482e45'], u'filename': u'postgresql-libs-8.4.11-1.el6_2.x86_64.rpm', u'epoch': u'0', u'version': u'8.4.11', u'release': u'1.el6_2', u'arch': u'x86_64'}, {u'src': None, u'name': u'postgresql-plperl', u'sum': [u'md5', u'326159cce51fa19b1db936c2df8e1d21'], u'filename': u'postgresql-plperl-8.4.11-1.el6_2.x86_64.rpm', u'epoch': u'0', u'version': u'8.4.11', u'release': u'1.el6_2', u'arch': u'x86_64'}, {u'src': None, u'name': u'postgresql-plpython', u'sum': [u'md5', u'87d4b040efdb73de5d2a90cd88a7b7ec'], u'filename': u'postgresql-plpython-8.4.11-1.el6_2.x86_64.rpm', u'epoch': u'0', u'version': u'8.4.11', u'release': u'1.el6_2', u'arch': u'x86_64'}, {u'src': None, u'name': u'postgresql-pltcl', u'sum': [u'md5', u'67e0b21e37dfe8243bf8cbb17d82f548'], u'filename': u'postgresql-pltcl-8.4.11-1.el6_2.x86_64.rpm', u'epoch': u'0', u'version': u'8.4.11', u'release': u'1.el6_2', u'arch': u'x86_64'}, {u'src': None, u'name': u'postgresql-server', u'sum': [u'md5', u'fb8444c65f5a89b3ddff0c64497399e4'], u'filename': u'postgresql-server-8.4.11-1.el6_2.x86_64.rpm', u'epoch': u'0', u'version': u'8.4.11', u'release': u'1.el6_2', u'arch': u'x86_64'}, {u'src': None, u'name': u'postgresql-test', u'sum': [u'md5', u'90383777df1cdce162c4b8db2b3f816c'], u'filename': u'postgresql-test-8.4.11-1.el6_2.x86_64.rpm', u'epoch': u'0', u'version': u'8.4.11', u'release': u'1.el6_2', u'arch': u'x86_64'}], u'name': u'ol6_x86_64_latest', u'short': u'ol6_x86_64_latest'}, {u'packages': [{u'src': None, u'name': u'postgresql84', u'sum': [u'md5', u'5e6351737c466a449afbfab3858a8c0a'], u'filename': u'postgresql84-8.4.11-1.el5_8.src.rpm', u'epoch': u'0', u'version': u'8.4.11', u'release': u'1.el5_8', u'arch': u'src'}, {u'src': None, u'name': u'postgresql84', u'sum': [u'md5', u'62133a773f4700bea40dfea01d187b96'], u'filename': u'postgresql84-8.4.11-1.el5_8.x86_64.rpm', u'epoch': u'0', u'version': u'8.4.11', u'release': u'1.el5_8', u'arch': u'x86_64'}, {u'src': None, u'name': u'postgresql84-contrib', u'sum': [u'md5', u'ab8aef956eecf26955cfa4164e54c5a8'], u'filename': u'postgresql84-contrib-8.4.11-1.el5_8.x86_64.rpm', u'epoch': u'0', u'version': u'8.4.11', u'release': u'1.el5_8', u'arch': u'x86_64'}, {u'src': None, u'name': u'postgresql84-devel', u'sum': [u'md5', u'a31d15a7ef63bcab7800d085ddf9530e'], u'filename': u'postgresql84-devel-8.4.11-1.el5_8.i386.rpm', u'epoch': u'0', u'version': u'8.4.11', u'release': u'1.el5_8', u'arch': u'i386'}, {u'src': None, u'name': u'postgresql84-devel', u'sum': [u'md5', u'df52634ef6309fac945e66a9457b3582'], u'filename': u'postgresql84-devel-8.4.11-1.el5_8.x86_64.rpm', u'epoch': u'0', u'version': u'8.4.11', u'release': u'1.el5_8', u'arch': u'x86_64'}, {u'src': None, u'name': u'postgresql84-docs', u'sum': [u'md5', u'c59687a06fc1d1f5b5d225b206b02466'], u'filename': u'postgresql84-docs-8.4.11-1.el5_8.x86_64.rpm', u'epoch': u'0', u'version': u'8.4.11', u'release': u'1.el5_8', u'arch': u'x86_64'}, {u'src': None, u'name': u'postgresql84-libs', u'sum': [u'md5', u'eae14f07e7d97df018d441986a2aca28'], u'filename': u'postgresql84-libs-8.4.11-1.el5_8.i386.rpm', u'epoch': u'0', u'version': u'8.4.11', u'release': u'1.el5_8', u'arch': u'i386'}, {u'src': None, u'name': u'postgresql84-libs', u'sum': [u'md5', u'ef36318dbaed8aeee3f5b62f62a7a689'], u'filename': u'postgresql84-libs-8.4.11-1.el5_8.x86_64.rpm', u'epoch': u'0', u'version': u'8.4.11', u'release': u'1.el5_8', u'arch': u'x86_64'}, {u'src': None, u'name': u'postgresql84-plperl', u'sum': [u'md5', u'cc22502871dcd1daf3960dfe113f581f'], u'filename': u'postgresql84-plperl-8.4.11-1.el5_8.x86_64.rpm', u'epoch': u'0', u'version': u'8.4.11', u'release': u'1.el5_8', u'arch': u'x86_64'}, {u'src': None, u'name': u'postgresql84-plpython', u'sum': [u'md5', u'93bdd80761dc5d77de148f79dd199115'], u'filename': u'postgresql84-plpython-8.4.11-1.el5_8.x86_64.rpm', u'epoch': u'0', u'version': u'8.4.11', u'release': u'1.el5_8', u'arch': u'x86_64'}, {u'src': None, u'name': u'postgresql84-pltcl', u'sum': [u'md5', u'5e64f1ce83605978fabc972a5dee732b'], u'filename': u'postgresql84-pltcl-8.4.11-1.el5_8.x86_64.rpm', u'epoch': u'0', u'version': u'8.4.11', u'release': u'1.el5_8', u'arch': u'x86_64'}, {u'src': None, u'name': u'postgresql84-python', u'sum': [u'md5', u'de31c55cf5f51c19b7ef35d9de4873b5'], u'filename': u'postgresql84-python-8.4.11-1.el5_8.x86_64.rpm', u'epoch': u'0', u'version': u'8.4.11', u'release': u'1.el5_8', u'arch': u'x86_64'}, {u'src': None, u'name': u'postgresql84-server', u'sum': [u'md5', u'5206bbef40b98d301fc634eaedba9ac8'], u'filename': u'postgresql84-server-8.4.11-1.el5_8.x86_64.rpm', u'epoch': u'0', u'version': u'8.4.11', u'release': u'1.el5_8', u'arch': u'x86_64'}, {u'src': None, u'name': u'postgresql84-tcl', u'sum': [u'md5', u'38dfc5ea380db1ed96da774d2fb367b6'], u'filename': u'postgresql84-tcl-8.4.11-1.el5_8.x86_64.rpm', u'epoch': u'0', u'version': u'8.4.11', u'release': u'1.el5_8', u'arch': u'x86_64'}, {u'src': None, u'name': u'postgresql84-test', u'sum': [u'md5', u'992f666a03b348bc1cb228887f31d8e2'], u'filename': u'postgresql84-test-8.4.11-1.el5_8.x86_64.rpm', u'epoch': u'0', u'version': u'8.4.11', u'release': u'1.el5_8', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u"[2.6.18-308.8.1.el5]\n- [net] sock: validate data_len before allocating skb in sock_alloc_send_pskb() (Jason Wang) [816290 816106] {CVE-2012-2136}\n- [net] tg3: Fix VLAN tagging assignments (John Feeney) [817691 797011]\n- [net] ixgbe: do not stop stripping VLAN tags in promiscuous mode (Andy Gospodarek) [809791 804800]\n- [s390] zcrypt: Fix parameter checking for ZSECSENDCPRB ioctl (Hendrik Brueckner) [810123 808489]\n- [x86] unwind information fix for the vsyscall DSO (Prarit Bhargava) [807930 805799]\n\n[2.6.18-308.7.1.el5]\n- [fs] epoll: Don't limit non-nested epoll paths (Jason Baron) [809380 804778]\n\n[2.6.18-308.6.1.el5]\n- [scsi] fc class: fix scanning when devs are offline (Mike Christie) [816684 799530]\n- [md] dm-multipath: delay retry of bypassed pg (Mike Christie) [816684 799530]\n- [net] bonding: properly unset current_arp_slave on slave link up (Veaceslav Falico) [811927 800575]\n- [net] bonding: remove {master,vlan}_ip and query devices instead (Andy Gospodarek) [810321 772216]\n\n[2.6.18-308.5.1.el5]\n- [scsi] skip sense logging for some ATA PASS-THROUGH cdbs (David Milburn) [807265 788777]", u'issued': u'2012-05-30', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELSA-2012-0690.html', u'type': u'self', u'id': None, u'title': u'ELSA-2012-0690'}, {u'href': u'http://linux.oracle.com/cve/CVE-2012-2136.html', u'type': u'cve', u'id': u'CVE-2012-2136', u'title': u'CVE-2012-2136'}], u'_content_type_id': u'erratum', u'_id': u'56da0707-868a-4c97-9ef0-7c88bf8b508c', u'from': u'el-errata@oss.oracle.com', u'severity': u'Important', u'title': u' kernel security and bug fix update', u'_ns': u'units_erratum', u'rights': u'Copyright 2012 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 5', u'reboot_suggested': False, u'type': u'security', u'pkglist': [{u'packages': [{u'src': None, u'name': u'kernel', u'sum': [u'md5', u'7e98948ad6163f0568546ef1220413f2'], u'filename': u'kernel-2.6.18-308.8.1.el5.src.rpm', u'epoch': u'0', u'version': u'2.6.18', u'release': u'308.8.1.el5', u'arch': u'src'}, {u'src': None, u'name': u'kernel', u'sum': [u'md5', u'7d84697f732d8c01459ad829c34abaf6'], u'filename': u'kernel-2.6.18-308.8.1.el5.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.18', u'release': u'308.8.1.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'kernel-debug', u'sum': [u'md5', u'add0c21ed3d7b233398b408101cc994c'], u'filename': u'kernel-debug-2.6.18-308.8.1.el5.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.18', u'release': u'308.8.1.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'kernel-debug-devel', u'sum': [u'md5', u'3b876397ede2f341cbb2fc9da14513d6'], u'filename': u'kernel-debug-devel-2.6.18-308.8.1.el5.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.18', u'release': u'308.8.1.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'kernel-devel', u'sum': [u'md5', u'4c33a25e6ef25e5543a5caa4f2822e34'], u'filename': u'kernel-devel-2.6.18-308.8.1.el5.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.18', u'release': u'308.8.1.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'kernel-doc', u'sum': [u'md5', u'7ac5c49c0592ce8c926539de9ba91ccf'], u'filename': u'kernel-doc-2.6.18-308.8.1.el5.noarch.rpm', u'epoch': u'0', u'version': u'2.6.18', u'release': u'308.8.1.el5', u'arch': u'noarch'}, {u'src': None, u'name': u'kernel-headers', u'sum': [u'md5', u'1d8026db9eea638e31d99c91304d039a'], u'filename': u'kernel-headers-2.6.18-308.8.1.el5.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.18', u'release': u'308.8.1.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'kernel-xen', u'sum': [u'md5', u'3d98b3d38893d49d58c37d95005de631'], u'filename': u'kernel-xen-2.6.18-308.8.1.el5.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.18', u'release': u'308.8.1.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'kernel-xen-devel', u'sum': [u'md5', u'b862bd463ab57a602f06d9899e6c468a'], u'filename': u'kernel-xen-devel-2.6.18-308.8.1.el5.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.18', u'release': u'308.8.1.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'ocfs2-2.6.18-308.8.1.el5', u'sum': [u'md5', u'ef5c5229df360198927f0a7218cf8447'], u'filename': u'ocfs2-2.6.18-308.8.1.el5-1.4.9-1.el5.src.rpm', u'epoch': u'0', u'version': u'1.4.9', u'release': u'1.el5', u'arch': u'src'}, {u'src': None, u'name': u'ocfs2-2.6.18-308.8.1.el5', u'sum': [u'md5', u'2d46f3d8036a256c1e1c090b209ae4ee'], u'filename': u'ocfs2-2.6.18-308.8.1.el5-1.4.9-1.el5.x86_64.rpm', u'epoch': u'0', u'version': u'1.4.9', u'release': u'1.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'ocfs2-2.6.18-308.8.1.el5debug', u'sum': [u'md5', u'1e2ecc091fd96cd12e6a6248b72f0981'], u'filename': u'ocfs2-2.6.18-308.8.1.el5debug-1.4.9-1.el5.x86_64.rpm', u'epoch': u'0', u'version': u'1.4.9', u'release': u'1.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'ocfs2-2.6.18-308.8.1.el5xen', u'sum': [u'md5', u'97b3038cfc50351d93568627feee3ed9'], u'filename': u'ocfs2-2.6.18-308.8.1.el5xen-1.4.9-1.el5.x86_64.rpm', u'epoch': u'0', u'version': u'1.4.9', u'release': u'1.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'oracleasm-2.6.18-308.8.1.el5', u'sum': [u'md5', u'a9547467177502ad960fcf347babce5f'], u'filename': u'oracleasm-2.6.18-308.8.1.el5-2.0.5-1.el5.src.rpm', u'epoch': u'0', u'version': u'2.0.5', u'release': u'1.el5', u'arch': u'src'}, {u'src': None, u'name': u'oracleasm-2.6.18-308.8.1.el5', u'sum': [u'md5', u'd2f3e734bc4529b0b967d9f9094917e2'], u'filename': u'oracleasm-2.6.18-308.8.1.el5-2.0.5-1.el5.x86_64.rpm', u'epoch': u'0', u'version': u'2.0.5', u'release': u'1.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'oracleasm-2.6.18-308.8.1.el5debug', u'sum': [u'md5', u'99fdb711d14b3a9b31a626e056cdceee'], u'filename': u'oracleasm-2.6.18-308.8.1.el5debug-2.0.5-1.el5.x86_64.rpm', u'epoch': u'0', u'version': u'2.0.5', u'release': u'1.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'oracleasm-2.6.18-308.8.1.el5xen', u'sum': [u'md5', u'30fa3699307691763fa9df8f59dc50ae'], u'filename': u'oracleasm-2.6.18-308.8.1.el5xen-2.0.5-1.el5.x86_64.rpm', u'epoch': u'0', u'version': u'2.0.5', u'release': u'1.el5', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u"[2.6.18-308.8.1.0.1.el5]\n- [net] bonding: fix carrier detect when bond is down [orabug 12377284]\n- [mm] fix hugetlb page leak (Dave McCracken) [orabug 12375075]\n- fix ia64 build error due to add-support-above-32-vcpus.patch(Zhenzhong Duan)\n- [x86] use dynamic vcpu_info remap to support more than 32 vcpus (Zhenzhong Duan)\n- [x86] Fix lvt0 reset when hvm boot up with noapic param\n- [scsi] remove printk's when doing I/O to a dead device (John Sobecki, Chris Mason)\n [orabug 12342275]\n- [char] ipmi: Fix IPMI errors due to timing problems (Joe Jin) [orabug 12561346]\n- [scsi] Fix race when removing SCSI devices (Joe Jin) [orabug 12404566]\n- [net] net: Redo the broken redhat netconsole over bonding (Tina Yang) [orabug 12740042]\n- [fs] nfs: Fix __put_nfs_open_context() NULL pointer panic (Joe Jin) [orabug 12687646]\n- [scsi] fix scsi hotplug and rescan race [orabug 10260172]\n- fix filp_close() race (Joe Jin) [orabug 10335998]\n- make xenkbd.abs_pointer=1 by default [orabug 67188919]\n- [xen] check to see if hypervisor supports memory reservation change\n (Chuck Anderson) [orabug 7556514]\n- [net] Enable entropy for bnx2,bnx2x,e1000e,igb,ixgb,ixgbe,ixgbevf (John Sobecki)\n [orabug 10315433]\n- [NET] Add xen pv netconsole support (Tina Yang) [orabug 6993043] [bz 7258]\n- [mm] shrink_zone patch (John Sobecki,Chris Mason) [orabug 6086839]\n- fix aacraid not to reset during kexec (Joe Jin) [orabug 8516042]\n- [rds] Patch rds to 1.4.2-20 (Andy Grover) [orabug 9471572, 9344105]\n RDS: Fix BUG_ONs to not fire when in a tasklet\n ipoib: Fix lockup of the tx queue\n RDS: Do not call set_page_dirty() with irqs off (Sherman Pun)\n RDS: Properly unmap when getting a remote access error (Tina Yang)\n RDS: Fix locking in rds_send_drop_to()\n- [xen] PVHVM guest with PoD crashes under memory pressure (Chuck Anderson)\n [orabug 9107465]\n- [xen] PV guest with FC HBA hangs during shutdown (Chuck Anderson)\n [orabug 9764220]\n- Support 256GB+ memory for pv guest (Mukesh Rathor) [orabug 9450615]\n- fix overcommit memory to use percpu_counter for el5 (KOSAKI Motohiro,\n Guru Anbalagane) [orabug 6124033]\n- [ipmi] make configurable timeouts for kcs of ipmi [orabug 9752208]\n- [ib] fix memory corruption (Andy Grover) [orabug 9972346]\n\n[2.6.18-308.8.1.el5]\n- [net] sock: validate data_len before allocating skb in sock_alloc_send_pskb() (Jason Wang) [816290 816106] {CVE-2012-2136}\n- [net] tg3: Fix VLAN tagging assignments (John Feeney) [817691 797011]\n- [net] ixgbe: do not stop stripping VLAN tags in promiscuous mode (Andy Gospodarek) [809791 804800]\n- [s390] zcrypt: Fix parameter checking for ZSECSENDCPRB ioctl (Hendrik Brueckner) [810123 808489]\n- [x86] unwind information fix for the vsyscall DSO (Prarit Bhargava) [807930 805799]\n\n[2.6.18-308.7.1.el5]\n- [fs] epoll: Don't limit non-nested epoll paths (Jason Baron) [809380 804778]\n\n[2.6.18-308.6.1.el5]\n- [scsi] fc class: fix scanning when devs are offline (Mike Christie) [816684 799530]\n- [md] dm-multipath: delay retry of bypassed pg (Mike Christie) [816684 799530]\n- [net] bonding: properly unset current_arp_slave on slave link up (Veaceslav Falico) [811927 800575]\n- [net] bonding: remove {master,vlan}_ip and query devices instead (Andy Gospodarek) [810321 772216]\n\n[2.6.18-308.5.1.el5]\n- [scsi] skip sense logging for some ATA PASS-THROUGH cdbs (David Milburn) [807265 788777]", u'issued': u'2012-05-30', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELSA-2012-0690-1.html', u'type': u'self', u'id': None, u'title': u'ELSA-2012-0690-1'}, {u'href': u'http://linux.oracle.com/cve/CVE-2012-2136.html', u'type': u'cve', u'id': u'CVE-2012-2136', u'title': u'CVE-2012-2136'}], u'_content_type_id': u'erratum', u'_id': u'4ff98c18-1435-4555-aa0a-28a8e1d5b6b2', u'from': u'el-errata@oss.oracle.com', u'severity': u'Important', u'title': u' kernel security and bug fix update', u'_ns': u'units_erratum', u'rights': u'Copyright 2012 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 5', u'reboot_suggested': False, u'type': u'security', u'pkglist': [{u'packages': [{u'src': None, u'name': u'kernel', u'sum': [u'md5', u'3225b80541c0f7d4f4581d718ef09584'], u'filename': u'kernel-2.6.18-308.8.1.0.1.el5.src.rpm', u'epoch': u'0', u'version': u'2.6.18', u'release': u'308.8.1.0.1.el5', u'arch': u'src'}, {u'src': None, u'name': u'kernel', u'sum': [u'md5', u'a742163d95dc47ae7cc5fb87634fba09'], u'filename': u'kernel-2.6.18-308.8.1.0.1.el5.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.18', u'release': u'308.8.1.0.1.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'kernel-debug', u'sum': [u'md5', u'185f4674e0bb29fc13fa08b183768bbe'], u'filename': u'kernel-debug-2.6.18-308.8.1.0.1.el5.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.18', u'release': u'308.8.1.0.1.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'kernel-debug-devel', u'sum': [u'md5', u'b71db5acb231298405924795f7916440'], u'filename': u'kernel-debug-devel-2.6.18-308.8.1.0.1.el5.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.18', u'release': u'308.8.1.0.1.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'kernel-devel', u'sum': [u'md5', u'b89267cd5dabb5db9e5d9a402bfa11e7'], u'filename': u'kernel-devel-2.6.18-308.8.1.0.1.el5.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.18', u'release': u'308.8.1.0.1.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'kernel-doc', u'sum': [u'md5', u'09b018b1cf29b4622428243fbd0c073e'], u'filename': u'kernel-doc-2.6.18-308.8.1.0.1.el5.noarch.rpm', u'epoch': u'0', u'version': u'2.6.18', u'release': u'308.8.1.0.1.el5', u'arch': u'noarch'}, {u'src': None, u'name': u'kernel-headers', u'sum': [u'md5', u'a0deb3ac5975df29158eb2c4f6928531'], u'filename': u'kernel-headers-2.6.18-308.8.1.0.1.el5.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.18', u'release': u'308.8.1.0.1.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'kernel-xen', u'sum': [u'md5', u'a4bf1f06f6bd0319d043b76526594ccc'], u'filename': u'kernel-xen-2.6.18-308.8.1.0.1.el5.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.18', u'release': u'308.8.1.0.1.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'kernel-xen-devel', u'sum': [u'md5', u'e913de53f77e109df865ad998706879e'], u'filename': u'kernel-xen-devel-2.6.18-308.8.1.0.1.el5.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.18', u'release': u'308.8.1.0.1.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'ocfs2-2.6.18-308.8.1.0.1.el5', u'sum': [u'md5', u'fd1603be179d0415ff424b75436f3fdb'], u'filename': u'ocfs2-2.6.18-308.8.1.0.1.el5-1.4.9-1.el5.src.rpm', u'epoch': u'0', u'version': u'1.4.9', u'release': u'1.el5', u'arch': u'src'}, {u'src': None, u'name': u'ocfs2-2.6.18-308.8.1.0.1.el5', u'sum': [u'md5', u'0593fd32a594a26fbcaac36788aa35d3'], u'filename': u'ocfs2-2.6.18-308.8.1.0.1.el5-1.4.9-1.el5.x86_64.rpm', u'epoch': u'0', u'version': u'1.4.9', u'release': u'1.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'ocfs2-2.6.18-308.8.1.0.1.el5debug', u'sum': [u'md5', u'427c7774d78fb1344a80ad3e33bc9ae1'], u'filename': u'ocfs2-2.6.18-308.8.1.0.1.el5debug-1.4.9-1.el5.x86_64.rpm', u'epoch': u'0', u'version': u'1.4.9', u'release': u'1.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'ocfs2-2.6.18-308.8.1.0.1.el5xen', u'sum': [u'md5', u'e0821f848fe1b7d77b714197069cc604'], u'filename': u'ocfs2-2.6.18-308.8.1.0.1.el5xen-1.4.9-1.el5.x86_64.rpm', u'epoch': u'0', u'version': u'1.4.9', u'release': u'1.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'oracleasm-2.6.18-308.8.1.0.1.el5', u'sum': [u'md5', u'4bed483f02f8cffe66e568deb6dd5c3a'], u'filename': u'oracleasm-2.6.18-308.8.1.0.1.el5-2.0.5-1.el5.src.rpm', u'epoch': u'0', u'version': u'2.0.5', u'release': u'1.el5', u'arch': u'src'}, {u'src': None, u'name': u'oracleasm-2.6.18-308.8.1.0.1.el5', u'sum': [u'md5', u'ae11120dc449e2418b408921a98f8cdf'], u'filename': u'oracleasm-2.6.18-308.8.1.0.1.el5-2.0.5-1.el5.x86_64.rpm', u'epoch': u'0', u'version': u'2.0.5', u'release': u'1.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'oracleasm-2.6.18-308.8.1.0.1.el5debug', u'sum': [u'md5', u'89dd4f89c7cc5568d29a191803d2558c'], u'filename': u'oracleasm-2.6.18-308.8.1.0.1.el5debug-2.0.5-1.el5.x86_64.rpm', u'epoch': u'0', u'version': u'2.0.5', u'release': u'1.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'oracleasm-2.6.18-308.8.1.0.1.el5xen', u'sum': [u'md5', u'012ccbdb2fb80f0d2d65c27a14797a04'], u'filename': u'oracleasm-2.6.18-308.8.1.0.1.el5xen-2.0.5-1.el5.x86_64.rpm', u'epoch': u'0', u'version': u'2.0.5', u'release': u'1.el5', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u'[1.0.0-20.5]\n- fix for CVE-2012-2333 - improper checking for record length in DTLS (#820686)\n- properly initialize tkeylen in the CVE-2012-0884 fix', u'issued': u'2012-05-29', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELSA-2012-0699.html', u'type': u'self', u'id': None, u'title': u'ELSA-2012-0699'}, {u'href': u'http://linux.oracle.com/cve/CVE-2012-2333.html', u'type': u'cve', u'id': u'CVE-2012-2333', u'title': u'CVE-2012-2333'}], u'_content_type_id': u'erratum', u'_id': u'b23a869e-0e32-4b88-99b2-47b1f5419d99', u'from': u'el-errata@oss.oracle.com', u'severity': u'Moderate', u'title': u' openssl security and bug fix update', u'_ns': u'units_erratum', u'rights': u'Copyright 2012 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 6', u'reboot_suggested': False, u'type': u'security', u'pkglist': [{u'packages': [{u'src': None, u'name': u'openssl', u'sum': [u'md5', u'96221867a67e4485486cd9c38174791e'], u'filename': u'openssl-1.0.0-20.el6_2.5.i686.rpm', u'epoch': u'0', u'version': u'1.0.0', u'release': u'20.el6_2.5', u'arch': u'i686'}, {u'src': None, u'name': u'openssl', u'sum': [u'md5', u'e5771c8f77f051a9da708689c35b28c9'], u'filename': u'openssl-1.0.0-20.el6_2.5.src.rpm', u'epoch': u'0', u'version': u'1.0.0', u'release': u'20.el6_2.5', u'arch': u'src'}, {u'src': None, u'name': u'openssl', u'sum': [u'md5', u'7982992715b3960dcd2bde5bf6523340'], u'filename': u'openssl-1.0.0-20.el6_2.5.x86_64.rpm', u'epoch': u'0', u'version': u'1.0.0', u'release': u'20.el6_2.5', u'arch': u'x86_64'}, {u'src': None, u'name': u'openssl-devel', u'sum': [u'md5', u'f277584299f4516ee3e211e2c7e3e389'], u'filename': u'openssl-devel-1.0.0-20.el6_2.5.i686.rpm', u'epoch': u'0', u'version': u'1.0.0', u'release': u'20.el6_2.5', u'arch': u'i686'}, {u'src': None, u'name': u'openssl-devel', u'sum': [u'md5', u'7dc06bf6108c62c7fe4eca3a7ec8e1b1'], u'filename': u'openssl-devel-1.0.0-20.el6_2.5.x86_64.rpm', u'epoch': u'0', u'version': u'1.0.0', u'release': u'20.el6_2.5', u'arch': u'x86_64'}, {u'src': None, u'name': u'openssl-perl', u'sum': [u'md5', u'bc4bb4c85b4d58ba70e3e208b71d5dbe'], u'filename': u'openssl-perl-1.0.0-20.el6_2.5.x86_64.rpm', u'epoch': u'0', u'version': u'1.0.0', u'release': u'20.el6_2.5', u'arch': u'x86_64'}, {u'src': None, u'name': u'openssl-static', u'sum': [u'md5', u'741b2fd26e35693b8bbaa8cfb541c115'], u'filename': u'openssl-static-1.0.0-20.el6_2.5.x86_64.rpm', u'epoch': u'0', u'version': u'1.0.0', u'release': u'20.el6_2.5', u'arch': u'x86_64'}], u'name': u'ol6_x86_64_latest', u'short': u'ol6_x86_64_latest'}, {u'packages': [{u'src': None, u'name': u'openssl', u'sum': [u'md5', u'fc9fa50c81a01511f210d9f613684842'], u'filename': u'openssl-0.9.8e-22.el5_8.4.src.rpm', u'epoch': u'0', u'version': u'0.9.8e', u'release': u'22.el5_8.4', u'arch': u'src'}, {u'src': None, u'name': u'openssl', u'sum': [u'md5', u'50f0b46595937a828b8e562ad2e4a620'], u'filename': u'openssl-0.9.8e-22.el5_8.4.i686.rpm', u'epoch': u'0', u'version': u'0.9.8e', u'release': u'22.el5_8.4', u'arch': u'i686'}, {u'src': None, u'name': u'openssl', u'sum': [u'md5', u'6332b431dd4aec5cc3bfb170a3f99eb2'], u'filename': u'openssl-0.9.8e-22.el5_8.4.x86_64.rpm', u'epoch': u'0', u'version': u'0.9.8e', u'release': u'22.el5_8.4', u'arch': u'x86_64'}, {u'src': None, u'name': u'openssl-devel', u'sum': [u'md5', u'8f61ac635d71f14f84621ff86ed952df'], u'filename': u'openssl-devel-0.9.8e-22.el5_8.4.i386.rpm', u'epoch': u'0', u'version': u'0.9.8e', u'release': u'22.el5_8.4', u'arch': u'i386'}, {u'src': None, u'name': u'openssl-devel', u'sum': [u'md5', u'7cdda9bd303bdec4cd9cbb7fed1799e2'], u'filename': u'openssl-devel-0.9.8e-22.el5_8.4.x86_64.rpm', u'epoch': u'0', u'version': u'0.9.8e', u'release': u'22.el5_8.4', u'arch': u'x86_64'}, {u'src': None, u'name': u'openssl-perl', u'sum': [u'md5', u'b16e47f8e9d98d2e7b768b0dbaa844a2'], u'filename': u'openssl-perl-0.9.8e-22.el5_8.4.x86_64.rpm', u'epoch': u'0', u'version': u'0.9.8e', u'release': u'22.el5_8.4', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u'firefox:\n\n[10.0.5-1.0.1.el6_2]\n- Replace firefox-redhat-default-prefs.js with firefox-oracle-default-prefs.js\n\n[10.0.5-1]\n- Update to 10.0.5 ESR\n\nxulrunner:\n\n[10.0.5-1.0.1.el6_2]\n- Replace xulrunner-redhat-default-prefs.js with xulrunner-oracle-default-prefs.js\n\n[10.0.5-1]\n- Update to 10.0.5 ESR\n\n[10.0.4-2]\n- Added patch for mozbz#703633', u'issued': u'2012-06-05', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELSA-2012-0710.html', u'type': u'self', u'id': None, u'title': u'ELSA-2012-0710'}, {u'href': u'http://linux.oracle.com/cve/CVE-2011-3101.html', u'type': u'cve', u'id': u'CVE-2011-3101', u'title': u'CVE-2011-3101'}, {u'href': u'http://linux.oracle.com/cve/CVE-2012-1937.html', u'type': u'cve', u'id': u'CVE-2012-1937', u'title': u'CVE-2012-1937'}, {u'href': u'http://linux.oracle.com/cve/CVE-2012-1938.html', u'type': u'cve', u'id': u'CVE-2012-1938', u'title': u'CVE-2012-1938'}, {u'href': u'http://linux.oracle.com/cve/CVE-2012-1939.html', u'type': u'cve', u'id': u'CVE-2012-1939', u'title': u'CVE-2012-1939'}, {u'href': u'http://linux.oracle.com/cve/CVE-2012-1940.html', u'type': u'cve', u'id': u'CVE-2012-1940', u'title': u'CVE-2012-1940'}, {u'href': u'http://linux.oracle.com/cve/CVE-2012-1941.html', u'type': u'cve', u'id': u'CVE-2012-1941', u'title': u'CVE-2012-1941'}, {u'href': u'http://linux.oracle.com/cve/CVE-2012-1944.html', u'type': u'cve', u'id': u'CVE-2012-1944', u'title': u'CVE-2012-1944'}, {u'href': u'http://linux.oracle.com/cve/CVE-2012-1945.html', u'type': u'cve', u'id': u'CVE-2012-1945', u'title': u'CVE-2012-1945'}, {u'href': u'http://linux.oracle.com/cve/CVE-2012-1946.html', u'type': u'cve', u'id': u'CVE-2012-1946', u'title': u'CVE-2012-1946'}, {u'href': u'http://linux.oracle.com/cve/CVE-2012-1947.html', u'type': u'cve', u'id': u'CVE-2012-1947', u'title': u'CVE-2012-1947'}], u'_content_type_id': u'erratum', u'_id': u'cf7119fd-08ed-4687-8e9d-74772e770ed9', u'from': u'el-errata@oss.oracle.com', u'severity': u'Critical', u'title': u' firefox security update', u'_ns': u'units_erratum', u'rights': u'Copyright 2012 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 6', u'reboot_suggested': False, u'type': u'security', u'pkglist': [{u'packages': [{u'src': None, u'name': u'firefox', u'sum': [u'md5', u'1c4b501c28843f8b365d5658dccd2b4e'], u'filename': u'firefox-10.0.5-1.0.1.el6_2.i686.rpm', u'epoch': u'0', u'version': u'10.0.5', u'release': u'1.0.1.el6_2', u'arch': u'i686'}, {u'src': None, u'name': u'firefox', u'sum': [u'md5', u'4881e873974701d847c36e80c942d9d9'], u'filename': u'firefox-10.0.5-1.0.1.el6_2.src.rpm', u'epoch': u'0', u'version': u'10.0.5', u'release': u'1.0.1.el6_2', u'arch': u'src'}, {u'src': None, u'name': u'firefox', u'sum': [u'md5', u'7103c8539d48e67e4397a2f90abfaa4c'], u'filename': u'firefox-10.0.5-1.0.1.el6_2.x86_64.rpm', u'epoch': u'0', u'version': u'10.0.5', u'release': u'1.0.1.el6_2', u'arch': u'x86_64'}, {u'src': None, u'name': u'xulrunner', u'sum': [u'md5', u'b412dac7a8ecd448d11a8ea2144b26f8'], u'filename': u'xulrunner-10.0.5-1.0.1.el6_2.i686.rpm', u'epoch': u'0', u'version': u'10.0.5', u'release': u'1.0.1.el6_2', u'arch': u'i686'}, {u'src': None, u'name': u'xulrunner', u'sum': [u'md5', u'8a05815d765520fe399fa24c52696bf4'], u'filename': u'xulrunner-10.0.5-1.0.1.el6_2.src.rpm', u'epoch': u'0', u'version': u'10.0.5', u'release': u'1.0.1.el6_2', u'arch': u'src'}, {u'src': None, u'name': u'xulrunner', u'sum': [u'md5', u'f506e8d1f8b315cf80022e04cf568adc'], u'filename': u'xulrunner-10.0.5-1.0.1.el6_2.x86_64.rpm', u'epoch': u'0', u'version': u'10.0.5', u'release': u'1.0.1.el6_2', u'arch': u'x86_64'}, {u'src': None, u'name': u'xulrunner-devel', u'sum': [u'md5', u'b0615ac3f105ff11ad11859bc324080b'], u'filename': u'xulrunner-devel-10.0.5-1.0.1.el6_2.i686.rpm', u'epoch': u'0', u'version': u'10.0.5', u'release': u'1.0.1.el6_2', u'arch': u'i686'}, {u'src': None, u'name': u'xulrunner-devel', u'sum': [u'md5', u'3df52e78bad58afe6e12acac1b1ac920'], u'filename': u'xulrunner-devel-10.0.5-1.0.1.el6_2.x86_64.rpm', u'epoch': u'0', u'version': u'10.0.5', u'release': u'1.0.1.el6_2', u'arch': u'x86_64'}], u'name': u'ol6_x86_64_latest', u'short': u'ol6_x86_64_latest'}, {u'packages': [{u'src': None, u'name': u'firefox', u'sum': [u'md5', u'00ea1a52f600045ebe88e40cefd099a8'], u'filename': u'firefox-10.0.5-1.0.1.el5_8.i386.rpm', u'epoch': u'0', u'version': u'10.0.5', u'release': u'1.0.1.el5_8', u'arch': u'i386'}, {u'src': None, u'name': u'firefox', u'sum': [u'md5', u'74084d754f9a8e9ac8c532890f7735ab'], u'filename': u'firefox-10.0.5-1.0.1.el5_8.src.rpm', u'epoch': u'0', u'version': u'10.0.5', u'release': u'1.0.1.el5_8', u'arch': u'src'}, {u'src': None, u'name': u'firefox', u'sum': [u'md5', u'32289941597a9f16f7f0143f30e73b35'], u'filename': u'firefox-10.0.5-1.0.1.el5_8.x86_64.rpm', u'epoch': u'0', u'version': u'10.0.5', u'release': u'1.0.1.el5_8', u'arch': u'x86_64'}, {u'src': None, u'name': u'xulrunner', u'sum': [u'md5', u'cf25a6f52f232f734fbc63b1d051896c'], u'filename': u'xulrunner-10.0.5-1.0.1.el5_8.i386.rpm', u'epoch': u'0', u'version': u'10.0.5', u'release': u'1.0.1.el5_8', u'arch': u'i386'}, {u'src': None, u'name': u'xulrunner', u'sum': [u'md5', u'3f60fae193877d9bfdba8a8ddd294e64'], u'filename': u'xulrunner-10.0.5-1.0.1.el5_8.src.rpm', u'epoch': u'0', u'version': u'10.0.5', u'release': u'1.0.1.el5_8', u'arch': u'src'}, {u'src': None, u'name': u'xulrunner', u'sum': [u'md5', u'c01f1e763e08130696b9efa8a7dda4da'], u'filename': u'xulrunner-10.0.5-1.0.1.el5_8.x86_64.rpm', u'epoch': u'0', u'version': u'10.0.5', u'release': u'1.0.1.el5_8', u'arch': u'x86_64'}, {u'src': None, u'name': u'xulrunner-devel', u'sum': [u'md5', u'db12ce6b48b4bcd44c8098df0f4f8ec4'], u'filename': u'xulrunner-devel-10.0.5-1.0.1.el5_8.i386.rpm', u'epoch': u'0', u'version': u'10.0.5', u'release': u'1.0.1.el5_8', u'arch': u'i386'}, {u'src': None, u'name': u'xulrunner-devel', u'sum': [u'md5', u'63caf3826b418596bcd1aa5951145584'], u'filename': u'xulrunner-devel-10.0.5-1.0.1.el5_8.x86_64.rpm', u'epoch': u'0', u'version': u'10.0.5', u'release': u'1.0.1.el5_8', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u'[32:9.7.3-8.P3.3]\n- fix CVE-2012-1667 and CVE-2012-1033', u'issued': u'2012-06-07', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELSA-2012-0716.html', u'type': u'self', u'id': None, u'title': u'ELSA-2012-0716'}, {u'href': u'http://linux.oracle.com/cve/CVE-2012-1033.html', u'type': u'cve', u'id': u'CVE-2012-1033', u'title': u'CVE-2012-1033'}, {u'href': u'http://linux.oracle.com/cve/CVE-2012-1667.html', u'type': u'cve', u'id': u'CVE-2012-1667', u'title': u'CVE-2012-1667'}], u'_content_type_id': u'erratum', u'_id': u'7db60da6-5229-4903-b7e0-082ca5c0dd3d', u'from': u'el-errata@oss.oracle.com', u'severity': u'Important', u'title': u' bind security update', u'_ns': u'units_erratum', u'rights': u'Copyright 2012 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 6', u'reboot_suggested': False, u'type': u'security', u'pkglist': [{u'packages': [{u'src': None, u'name': u'bind', u'sum': [u'md5', u'307e54ef5053d3fe5a34d01f52d06377'], u'filename': u'bind-9.7.3-8.P3.el6_2.3.src.rpm', u'epoch': u'32', u'version': u'9.7.3', u'release': u'8.P3.el6_2.3', u'arch': u'src'}, {u'src': None, u'name': u'bind', u'sum': [u'md5', u'd8ab5a51b57eb4e327becd7a793e8f2e'], u'filename': u'bind-9.7.3-8.P3.el6_2.3.x86_64.rpm', u'epoch': u'32', u'version': u'9.7.3', u'release': u'8.P3.el6_2.3', u'arch': u'x86_64'}, {u'src': None, u'name': u'bind-chroot', u'sum': [u'md5', u'97e9c0c231b3b3ff7c50ed112bcb4c2f'], u'filename': u'bind-chroot-9.7.3-8.P3.el6_2.3.x86_64.rpm', u'epoch': u'32', u'version': u'9.7.3', u'release': u'8.P3.el6_2.3', u'arch': u'x86_64'}, {u'src': None, u'name': u'bind-devel', u'sum': [u'md5', u'6319d593b7e9aefa7a68f007e281a20c'], u'filename': u'bind-devel-9.7.3-8.P3.el6_2.3.i686.rpm', u'epoch': u'32', u'version': u'9.7.3', u'release': u'8.P3.el6_2.3', u'arch': u'i686'}, {u'src': None, u'name': u'bind-devel', u'sum': [u'md5', u'6930b51f198a5c9730a277d2660a86e9'], u'filename': u'bind-devel-9.7.3-8.P3.el6_2.3.x86_64.rpm', u'epoch': u'32', u'version': u'9.7.3', u'release': u'8.P3.el6_2.3', u'arch': u'x86_64'}, {u'src': None, u'name': u'bind-libs', u'sum': [u'md5', u'87b0b06f150298c27fb87c4bdc1313d9'], u'filename': u'bind-libs-9.7.3-8.P3.el6_2.3.i686.rpm', u'epoch': u'32', u'version': u'9.7.3', u'release': u'8.P3.el6_2.3', u'arch': u'i686'}, {u'src': None, u'name': u'bind-libs', u'sum': [u'md5', u'47692a9486a4fc63143deb3050bd4ac4'], u'filename': u'bind-libs-9.7.3-8.P3.el6_2.3.x86_64.rpm', u'epoch': u'32', u'version': u'9.7.3', u'release': u'8.P3.el6_2.3', u'arch': u'x86_64'}, {u'src': None, u'name': u'bind-sdb', u'sum': [u'md5', u'72de8eefa4d16d0ba3b38d816b13df11'], u'filename': u'bind-sdb-9.7.3-8.P3.el6_2.3.x86_64.rpm', u'epoch': u'32', u'version': u'9.7.3', u'release': u'8.P3.el6_2.3', u'arch': u'x86_64'}, {u'src': None, u'name': u'bind-utils', u'sum': [u'md5', u'd5e0ed4bdbe9180123d4dbef5e235eb6'], u'filename': u'bind-utils-9.7.3-8.P3.el6_2.3.x86_64.rpm', u'epoch': u'32', u'version': u'9.7.3', u'release': u'8.P3.el6_2.3', u'arch': u'x86_64'}], u'name': u'ol6_x86_64_latest', u'short': u'ol6_x86_64_latest'}, {u'packages': [{u'src': None, u'name': u'bind', u'sum': [u'md5', u'031e3cbd1aa9478fc7b246901686775e'], u'filename': u'bind-9.3.6-20.P1.el5_8.1.src.rpm', u'epoch': u'30', u'version': u'9.3.6', u'release': u'20.P1.el5_8.1', u'arch': u'src'}, {u'src': None, u'name': u'bind', u'sum': [u'md5', u'eb4f69a32cd96aa1cec40a2297c98db6'], u'filename': u'bind-9.3.6-20.P1.el5_8.1.x86_64.rpm', u'epoch': u'30', u'version': u'9.3.6', u'release': u'20.P1.el5_8.1', u'arch': u'x86_64'}, {u'src': None, u'name': u'bind-chroot', u'sum': [u'md5', u'907a2e69f843c90413e0395d8a0d18f5'], u'filename': u'bind-chroot-9.3.6-20.P1.el5_8.1.x86_64.rpm', u'epoch': u'30', u'version': u'9.3.6', u'release': u'20.P1.el5_8.1', u'arch': u'x86_64'}, {u'src': None, u'name': u'bind-devel', u'sum': [u'md5', u'aed484e405f163909b7e8fd9b3a2ddb1'], u'filename': u'bind-devel-9.3.6-20.P1.el5_8.1.i386.rpm', u'epoch': u'30', u'version': u'9.3.6', u'release': u'20.P1.el5_8.1', u'arch': u'i386'}, {u'src': None, u'name': u'bind-devel', u'sum': [u'md5', u'21aba070e4d5baed17a33abbd567d85e'], u'filename': u'bind-devel-9.3.6-20.P1.el5_8.1.x86_64.rpm', u'epoch': u'30', u'version': u'9.3.6', u'release': u'20.P1.el5_8.1', u'arch': u'x86_64'}, {u'src': None, u'name': u'bind-libbind-devel', u'sum': [u'md5', u'6c0d30f00ca4326816364d6097410ebd'], u'filename': u'bind-libbind-devel-9.3.6-20.P1.el5_8.1.i386.rpm', u'epoch': u'30', u'version': u'9.3.6', u'release': u'20.P1.el5_8.1', u'arch': u'i386'}, {u'src': None, u'name': u'bind-libbind-devel', u'sum': [u'md5', u'ed275c67497d39af925dcacffd117361'], u'filename': u'bind-libbind-devel-9.3.6-20.P1.el5_8.1.x86_64.rpm', u'epoch': u'30', u'version': u'9.3.6', u'release': u'20.P1.el5_8.1', u'arch': u'x86_64'}, {u'src': None, u'name': u'bind-libs', u'sum': [u'md5', u'4fc2efae6617f5a1c961cb3f550fb8e7'], u'filename': u'bind-libs-9.3.6-20.P1.el5_8.1.i386.rpm', u'epoch': u'30', u'version': u'9.3.6', u'release': u'20.P1.el5_8.1', u'arch': u'i386'}, {u'src': None, u'name': u'bind-libs', u'sum': [u'md5', u'eb82ac40aa451ec03b1725606b6ea66d'], u'filename': u'bind-libs-9.3.6-20.P1.el5_8.1.x86_64.rpm', u'epoch': u'30', u'version': u'9.3.6', u'release': u'20.P1.el5_8.1', u'arch': u'x86_64'}, {u'src': None, u'name': u'bind-sdb', u'sum': [u'md5', u'c5988ea91dd757bcf77f1c90a5710734'], u'filename': u'bind-sdb-9.3.6-20.P1.el5_8.1.x86_64.rpm', u'epoch': u'30', u'version': u'9.3.6', u'release': u'20.P1.el5_8.1', u'arch': u'x86_64'}, {u'src': None, u'name': u'bind-utils', u'sum': [u'md5', u'8eef25b5dcd30fe27c72537733520394'], u'filename': u'bind-utils-9.3.6-20.P1.el5_8.1.x86_64.rpm', u'epoch': u'30', u'version': u'9.3.6', u'release': u'20.P1.el5_8.1', u'arch': u'x86_64'}, {u'src': None, u'name': u'caching-nameserver', u'sum': [u'md5', u'0d07b1d3ae2fecebe6094ec898ec5337'], u'filename': u'caching-nameserver-9.3.6-20.P1.el5_8.1.x86_64.rpm', u'epoch': u'30', u'version': u'9.3.6', u'release': u'20.P1.el5_8.1', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u'[32:9.7.0-10.P2.1]\n- fix CVE-2012-1667 and CVE-2012-1033', u'issued': u'2012-06-07', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELSA-2012-0717.html', u'type': u'self', u'id': None, u'title': u'ELSA-2012-0717'}, {u'href': u'http://linux.oracle.com/cve/CVE-2012-1033.html', u'type': u'cve', u'id': u'CVE-2012-1033', u'title': u'CVE-2012-1033'}, {u'href': u'http://linux.oracle.com/cve/CVE-2012-1667.html', u'type': u'cve', u'id': u'CVE-2012-1667', u'title': u'CVE-2012-1667'}], u'_content_type_id': u'erratum', u'_id': u'd2fba679-c0bf-49b2-aa1b-5f3258463aa2', u'from': u'el-errata@oss.oracle.com', u'severity': u'Important', u'title': u' bind97 security update', u'_ns': u'units_erratum', u'rights': u'Copyright 2012 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 5', u'reboot_suggested': False, u'type': u'security', u'pkglist': [{u'packages': [{u'src': None, u'name': u'bind97', u'sum': [u'md5', u'b88f4604a38f208878c7a2ca14df290d'], u'filename': u'bind97-9.7.0-10.P2.el5_8.1.src.rpm', u'epoch': u'32', u'version': u'9.7.0', u'release': u'10.P2.el5_8.1', u'arch': u'src'}, {u'src': None, u'name': u'bind97', u'sum': [u'md5', u'4e68140f2616bb3843a5872f5ac17341'], u'filename': u'bind97-9.7.0-10.P2.el5_8.1.x86_64.rpm', u'epoch': u'32', u'version': u'9.7.0', u'release': u'10.P2.el5_8.1', u'arch': u'x86_64'}, {u'src': None, u'name': u'bind97-chroot', u'sum': [u'md5', u'ee122243023b588db99fc2939b3b5f85'], u'filename': u'bind97-chroot-9.7.0-10.P2.el5_8.1.x86_64.rpm', u'epoch': u'32', u'version': u'9.7.0', u'release': u'10.P2.el5_8.1', u'arch': u'x86_64'}, {u'src': None, u'name': u'bind97-devel', u'sum': [u'md5', u'baefcf5cf1289ce16ec8c2cc834a4490'], u'filename': u'bind97-devel-9.7.0-10.P2.el5_8.1.i386.rpm', u'epoch': u'32', u'version': u'9.7.0', u'release': u'10.P2.el5_8.1', u'arch': u'i386'}, {u'src': None, u'name': u'bind97-devel', u'sum': [u'md5', u'51e15ad514be23d0a174a7b1c14cc34c'], u'filename': u'bind97-devel-9.7.0-10.P2.el5_8.1.x86_64.rpm', u'epoch': u'32', u'version': u'9.7.0', u'release': u'10.P2.el5_8.1', u'arch': u'x86_64'}, {u'src': None, u'name': u'bind97-libs', u'sum': [u'md5', u'37cbd585667fd13d490ce6020ddf4e0a'], u'filename': u'bind97-libs-9.7.0-10.P2.el5_8.1.i386.rpm', u'epoch': u'32', u'version': u'9.7.0', u'release': u'10.P2.el5_8.1', u'arch': u'i386'}, {u'src': None, u'name': u'bind97-libs', u'sum': [u'md5', u'33d8c9b0405a78f3d915084251e86edb'], u'filename': u'bind97-libs-9.7.0-10.P2.el5_8.1.x86_64.rpm', u'epoch': u'32', u'version': u'9.7.0', u'release': u'10.P2.el5_8.1', u'arch': u'x86_64'}, {u'src': None, u'name': u'bind97-utils', u'sum': [u'md5', u'a87a65c1b99d30a4c311c01e55d866ed'], u'filename': u'bind97-utils-9.7.0-10.P2.el5_8.1.x86_64.rpm', u'epoch': u'32', u'version': u'9.7.0', u'release': u'10.P2.el5_8.1', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u'kernel:\n\n[2.6.18-308.8.2.el5]\n- [xen] x86_64: check address on trap handlers or guest callbacks (Paolo Bonzini) [813430 813431] {CVE-2012-0217}\n- [xen] x86_64: Do not execute sysret with a non-canonical return address (Paolo Bonzini) [813430 813431] {CVE-2012-0217}\n- [xen] x86: prevent hv boot on AMD CPUs with Erratum 121 (Laszlo Ersek) [824969 824970]\n\nocfs2:\n\n[1.4.10]\n- ocfs2/dlm: Cleanup mlogs in dlmthread.c dlmast.c and dlmdomain.c\n- ocfs2/dlm: make existing convertion precedent over new lock\n- ocfs2/dlm: Cleanup dlmdebug.c\n- ocfs2/dlm: Minor cleanup\n- ocfs2/dlm: Hard code the values for enums\n- ocfs2: Wakeup down convert thread just after clearing OCFS2 LOCK UPCONVERT FINISHING\n- ocfs2/dlm: Take inflight reference count for remotely mastered resources too\n- ocfs2/dlm: dlmlock remote needs to account for remastery\n- ocfs2: Add some trace log for orphan scan\n- ocfs2: Remove unused old id in ocfs2_commit_cache\n- ocfs2: Remove obsolete comments before ocfs2_start_trans\n- ocfs2: Initialize the bktcnt variable properly and call it bucket_count\n- ocfs2: Use cpu to le16 for e leaf clusters in ocfs2_bg_discontig_add_extent\n- ocfs2: validate bg free bits count after update\n- ocfs2: cluster Pin the remote node item in configfs\n- ocfs2: Release buffer head in case of error in ocfs2_double_lock\n- ocfs2: optimize ocfs2 check dir entry with unlikely() annotations\n- ocfs2: Little refactoring against ocfs2 iget\n- ocfs2: Initialize data ac might be used uninitializ\n- ocfs2 Skip mount recovery for hard ro mounts\n- ocfs2: make direntry invalid when deleting it\n- ocfs2: commit trans in error\n- ocfs2: Fix deadlock when allocating page\n- ocfs2: Avoid livelock in ocfs2 readpage', u'issued': u'2012-06-12', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELSA-2012-0721.html', u'type': u'self', u'id': None, u'title': u'ELSA-2012-0721'}, {u'href': u'http://linux.oracle.com/cve/CVE-2012-0217.html', u'type': u'cve', u'id': u'CVE-2012-0217', u'title': u'CVE-2012-0217'}, {u'href': u'http://linux.oracle.com/cve/CVE-2012-2934.html', u'type': u'cve', u'id': u'CVE-2012-2934', u'title': u'CVE-2012-2934'}], u'_content_type_id': u'erratum', u'_id': u'61f67c21-60cf-463b-bcc3-8137b1e0cd0a', u'from': u'el-errata@oss.oracle.com', u'severity': u'Important', u'title': u' kernel security update', u'_ns': u'units_erratum', u'rights': u'Copyright 2012 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 5', u'reboot_suggested': False, u'type': u'security', u'pkglist': [{u'packages': [{u'src': None, u'name': u'kernel', u'sum': [u'md5', u'f623ad233baff634b3f199272b8f6b62'], u'filename': u'kernel-2.6.18-308.8.2.el5.src.rpm', u'epoch': u'0', u'version': u'2.6.18', u'release': u'308.8.2.el5', u'arch': u'src'}, {u'src': None, u'name': u'kernel', u'sum': [u'md5', u'a72e0bcc420b04f94a83a5b51985ee2a'], u'filename': u'kernel-2.6.18-308.8.2.el5.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.18', u'release': u'308.8.2.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'kernel-debug', u'sum': [u'md5', u'5b8b550a328fb17d36601f66d7c7ca3a'], u'filename': u'kernel-debug-2.6.18-308.8.2.el5.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.18', u'release': u'308.8.2.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'kernel-debug-devel', u'sum': [u'md5', u'4195441485ec35b4583e2f53ccff3b66'], u'filename': u'kernel-debug-devel-2.6.18-308.8.2.el5.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.18', u'release': u'308.8.2.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'kernel-devel', u'sum': [u'md5', u'a6299db363b157d44836eb66ff9d27b3'], u'filename': u'kernel-devel-2.6.18-308.8.2.el5.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.18', u'release': u'308.8.2.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'kernel-doc', u'sum': [u'md5', u'8d1cc73cb6598646c03b9199559fe423'], u'filename': u'kernel-doc-2.6.18-308.8.2.el5.noarch.rpm', u'epoch': u'0', u'version': u'2.6.18', u'release': u'308.8.2.el5', u'arch': u'noarch'}, {u'src': None, u'name': u'kernel-headers', u'sum': [u'md5', u'1a26b701d0a7cf406b4141686c85a8ea'], u'filename': u'kernel-headers-2.6.18-308.8.2.el5.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.18', u'release': u'308.8.2.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'kernel-xen', u'sum': [u'md5', u'ed31042262a105beb6550f1ddda358f5'], u'filename': u'kernel-xen-2.6.18-308.8.2.el5.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.18', u'release': u'308.8.2.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'kernel-xen-devel', u'sum': [u'md5', u'60a1b34e359eca6b41907c87f626ae29'], u'filename': u'kernel-xen-devel-2.6.18-308.8.2.el5.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.18', u'release': u'308.8.2.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'ocfs2-2.6.18-308.8.2.el5', u'sum': [u'md5', u'5911cb6115025d7ae6c99fdf833472dd'], u'filename': u'ocfs2-2.6.18-308.8.2.el5-1.4.10-1.el5.src.rpm', u'epoch': u'0', u'version': u'1.4.10', u'release': u'1.el5', u'arch': u'src'}, {u'src': None, u'name': u'ocfs2-2.6.18-308.8.2.el5', u'sum': [u'md5', u'b25ae799fa5d6a19099a52f930d69cc5'], u'filename': u'ocfs2-2.6.18-308.8.2.el5-1.4.10-1.el5.x86_64.rpm', u'epoch': u'0', u'version': u'1.4.10', u'release': u'1.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'ocfs2-2.6.18-308.8.2.el5debug', u'sum': [u'md5', u'00925db900f2b3367c11f9ad3236fa01'], u'filename': u'ocfs2-2.6.18-308.8.2.el5debug-1.4.10-1.el5.x86_64.rpm', u'epoch': u'0', u'version': u'1.4.10', u'release': u'1.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'ocfs2-2.6.18-308.8.2.el5xen', u'sum': [u'md5', u'36830f161e6bb2e136b6dfddf3758a3b'], u'filename': u'ocfs2-2.6.18-308.8.2.el5xen-1.4.10-1.el5.x86_64.rpm', u'epoch': u'0', u'version': u'1.4.10', u'release': u'1.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'oracleasm-2.6.18-308.8.2.el5', u'sum': [u'md5', u'dc47c4642fcb7a6e68f00377fb517a51'], u'filename': u'oracleasm-2.6.18-308.8.2.el5-2.0.5-1.el5.src.rpm', u'epoch': u'0', u'version': u'2.0.5', u'release': u'1.el5', u'arch': u'src'}, {u'src': None, u'name': u'oracleasm-2.6.18-308.8.2.el5', u'sum': [u'md5', u'4c67e2abf3dfb63907f57f7e292b12db'], u'filename': u'oracleasm-2.6.18-308.8.2.el5-2.0.5-1.el5.x86_64.rpm', u'epoch': u'0', u'version': u'2.0.5', u'release': u'1.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'oracleasm-2.6.18-308.8.2.el5debug', u'sum': [u'md5', u'1cecf28db4f0c2fd60a1a59fec88f14f'], u'filename': u'oracleasm-2.6.18-308.8.2.el5debug-2.0.5-1.el5.x86_64.rpm', u'epoch': u'0', u'version': u'2.0.5', u'release': u'1.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'oracleasm-2.6.18-308.8.2.el5xen', u'sum': [u'md5', u'44389070414c6bbc2babe81b4aacf23f'], u'filename': u'oracleasm-2.6.18-308.8.2.el5xen-2.0.5-1.el5.x86_64.rpm', u'epoch': u'0', u'version': u'2.0.5', u'release': u'1.el5', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u"kernel:\n\n[2.6.18-308.8.2.0.1.el5]\n- [net] bonding: fix carrier detect when bond is down [orabug 12377284]\n- [mm] fix hugetlb page leak (Dave McCracken) [orabug 12375075]\n- fix ia64 build error due to add-support-above-32-vcpus.patch(Zhenzhong Duan)\n- [x86] use dynamic vcpu_info remap to support more than 32 vcpus (Zhenzhong Duan)\n- [x86] Fix lvt0 reset when hvm boot up with noapic param\n- [scsi] remove printk's when doing I/O to a dead device (John Sobecki, Chris Mason)\n [orabug 12342275]\n- [char] ipmi: Fix IPMI errors due to timing problems (Joe Jin) [orabug 12561346]\n- [scsi] Fix race when removing SCSI devices (Joe Jin) [orabug 12404566]\n- [net] net: Redo the broken redhat netconsole over bonding (Tina Yang) [orabug 12740042]\n- [fs] nfs: Fix __put_nfs_open_context() NULL pointer panic (Joe Jin) [orabug 12687646]\n- [scsi] fix scsi hotplug and rescan race [orabug 10260172]\n- fix filp_close() race (Joe Jin) [orabug 10335998]\n- make xenkbd.abs_pointer=1 by default [orabug 67188919]\n- [xen] check to see if hypervisor supports memory reservation change\n (Chuck Anderson) [orabug 7556514]\n- [net] Enable entropy for bnx2,bnx2x,e1000e,igb,ixgb,ixgbe,ixgbevf (John Sobecki)\n [orabug 10315433]\n- [NET] Add xen pv netconsole support (Tina Yang) [orabug 6993043] [bz 7258]\n- [mm] shrink_zone patch (John Sobecki,Chris Mason) [orabug 6086839]\n- fix aacraid not to reset during kexec (Joe Jin) [orabug 8516042]\n- [rds] Patch rds to 1.4.2-20 (Andy Grover) [orabug 9471572, 9344105]\n RDS: Fix BUG_ONs to not fire when in a tasklet\n ipoib: Fix lockup of the tx queue\n RDS: Do not call set_page_dirty() with irqs off (Sherman Pun)\n RDS: Properly unmap when getting a remote access error (Tina Yang)\n RDS: Fix locking in rds_send_drop_to()\n- [xen] PVHVM guest with PoD crashes under memory pressure (Chuck Anderson)\n [orabug 9107465]\n+- [xen] PV guest with FC HBA hangs during shutdown (Chuck Anderson)\n [orabug 9764220]\n- Support 256GB+ memory for pv guest (Mukesh Rathor) [orabug 9450615]\n- fix overcommit memory to use percpu_counter for el5 (KOSAKI Motohiro,\n Guru Anbalagane) [orabug 6124033]\n- [ipmi] make configurable timeouts for kcs of ipmi [orabug 9752208]\n- [ib] fix memory corruption (Andy Grover) [orabug 9972346]\n\n[2.6.18-308.8.2.el5]\n- [xen] x86_64: check address on trap handlers or guest callbacks (Paolo Bonzini) [813430 813431] {CVE-2012-0217}\n- [xen] x86_64: Do not execute sysret with a non-canonical return address (Paolo Bonzini) [813430 813431] {CVE-2012-0217}\n- [xen] x86: prevent hv boot on AMD CPUs with Erratum 121 (Laszlo Ersek) [824969 824970]\n\nocfs2:\n\n[1.4.10]\n- ocfs2/dlm: Cleanup mlogs in dlmthread.c dlmast.c and dlmdomain.c\n- ocfs2/dlm: make existing convertion precedent over new lock\n- ocfs2/dlm: Cleanup dlmdebug.c\n- ocfs2/dlm: Minor cleanup\n- ocfs2/dlm: Hard code the values for enums\n- ocfs2: Wakeup down convert thread just after clearing OCFS2 LOCK UPCONVERT FINISHING\n- ocfs2/dlm: Take inflight reference count for remotely mastered resources too\n- ocfs2/dlm: dlmlock remote needs to account for remastery\n- ocfs2: Add some trace log for orphan scan\n- ocfs2: Remove unused old id in ocfs2_commit_cache\n- ocfs2: Remove obsolete comments before ocfs2_start_trans\n- ocfs2: Initialize the bktcnt variable properly and call it bucket_count\n- ocfs2: Use cpu to le16 for e leaf clusters in ocfs2_bg_discontig_add_extent\n- ocfs2: validate bg free bits count after update\n- ocfs2: cluster Pin the remote node item in configfs\n- ocfs2: Release buffer head in case of error in ocfs2_double_lock\n- ocfs2: optimize ocfs2 check dir entry with unlikely() annotations\n- ocfs2: Little refactoring against ocfs2 iget\n- ocfs2: Initialize data ac might be used uninitializ\n- ocfs2 Skip mount recovery for hard ro mounts\n- ocfs2: make direntry invalid when deleting it\n- ocfs2: commit trans in error\n- ocfs2: Fix deadlock when allocating page\n- ocfs2: Avoid livelock in ocfs2 readpage", u'issued': u'2012-06-12', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELSA-2012-0721-1.html', u'type': u'self', u'id': None, u'title': u'ELSA-2012-0721-1'}, {u'href': u'http://linux.oracle.com/cve/CVE-2012-0217.html', u'type': u'cve', u'id': u'CVE-2012-0217', u'title': u'CVE-2012-0217'}, {u'href': u'http://linux.oracle.com/cve/CVE-2012-2934.html', u'type': u'cve', u'id': u'CVE-2012-2934', u'title': u'CVE-2012-2934'}], u'_content_type_id': u'erratum', u'_id': u'ac51794b-2ec3-43e3-911a-54e0f0d9e41b', u'from': u'el-errata@oss.oracle.com', u'severity': u'Important', u'title': u' kernel security update', u'_ns': u'units_erratum', u'rights': u'Copyright 2012 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 5', u'reboot_suggested': False, u'type': u'security', u'pkglist': [{u'packages': [{u'src': None, u'name': u'kernel', u'sum': [u'md5', u'c562bbe6ac56fd674f92dc19f375f214'], u'filename': u'kernel-2.6.18-308.8.2.0.1.el5.src.rpm', u'epoch': u'0', u'version': u'2.6.18', u'release': u'308.8.2.0.1.el5', u'arch': u'src'}, {u'src': None, u'name': u'kernel', u'sum': [u'md5', u'21fe0224e0cfa2bdc05a16ca5f045847'], u'filename': u'kernel-2.6.18-308.8.2.0.1.el5.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.18', u'release': u'308.8.2.0.1.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'kernel-debug', u'sum': [u'md5', u'af5e0d6e6e1bcc9b119c16dc4f23a818'], u'filename': u'kernel-debug-2.6.18-308.8.2.0.1.el5.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.18', u'release': u'308.8.2.0.1.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'kernel-debug-devel', u'sum': [u'md5', u'd797a690d2f8cdaebfca0e0612bc3596'], u'filename': u'kernel-debug-devel-2.6.18-308.8.2.0.1.el5.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.18', u'release': u'308.8.2.0.1.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'kernel-devel', u'sum': [u'md5', u'764a624b64e4c94926fd400429e32d11'], u'filename': u'kernel-devel-2.6.18-308.8.2.0.1.el5.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.18', u'release': u'308.8.2.0.1.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'kernel-doc', u'sum': [u'md5', u'9ab029640aee5566a55d93b81a629eac'], u'filename': u'kernel-doc-2.6.18-308.8.2.0.1.el5.noarch.rpm', u'epoch': u'0', u'version': u'2.6.18', u'release': u'308.8.2.0.1.el5', u'arch': u'noarch'}, {u'src': None, u'name': u'kernel-headers', u'sum': [u'md5', u'd60b5d348593e172ec4c78b6c185fb32'], u'filename': u'kernel-headers-2.6.18-308.8.2.0.1.el5.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.18', u'release': u'308.8.2.0.1.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'kernel-xen', u'sum': [u'md5', u'e60f164fb1663233d9ff229c0a0848b3'], u'filename': u'kernel-xen-2.6.18-308.8.2.0.1.el5.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.18', u'release': u'308.8.2.0.1.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'kernel-xen-devel', u'sum': [u'md5', u'50695755ea43972ccdb8ff967fc44a49'], u'filename': u'kernel-xen-devel-2.6.18-308.8.2.0.1.el5.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.18', u'release': u'308.8.2.0.1.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'ocfs2-2.6.18-308.8.2.0.1.el5', u'sum': [u'md5', u'280376ccf0b2d7d4d586b679df166a24'], u'filename': u'ocfs2-2.6.18-308.8.2.0.1.el5-1.4.10-1.el5.src.rpm', u'epoch': u'0', u'version': u'1.4.10', u'release': u'1.el5', u'arch': u'src'}, {u'src': None, u'name': u'ocfs2-2.6.18-308.8.2.0.1.el5', u'sum': [u'md5', u'9299d6a1b136379258e2207bb1790e7d'], u'filename': u'ocfs2-2.6.18-308.8.2.0.1.el5-1.4.10-1.el5.x86_64.rpm', u'epoch': u'0', u'version': u'1.4.10', u'release': u'1.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'ocfs2-2.6.18-308.8.2.0.1.el5debug', u'sum': [u'md5', u'0092bb00d1945b7f6e8f69cfae89ca5e'], u'filename': u'ocfs2-2.6.18-308.8.2.0.1.el5debug-1.4.10-1.el5.x86_64.rpm', u'epoch': u'0', u'version': u'1.4.10', u'release': u'1.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'ocfs2-2.6.18-308.8.2.0.1.el5xen', u'sum': [u'md5', u'748d059abc3afc757dd9789a6ecbaf9d'], u'filename': u'ocfs2-2.6.18-308.8.2.0.1.el5xen-1.4.10-1.el5.x86_64.rpm', u'epoch': u'0', u'version': u'1.4.10', u'release': u'1.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'oracleasm-2.6.18-308.8.2.0.1.el5', u'sum': [u'md5', u'07de1ea817f3fcf1f2fbfb23640f7198'], u'filename': u'oracleasm-2.6.18-308.8.2.0.1.el5-2.0.5-1.el5.src.rpm', u'epoch': u'0', u'version': u'2.0.5', u'release': u'1.el5', u'arch': u'src'}, {u'src': None, u'name': u'oracleasm-2.6.18-308.8.2.0.1.el5', u'sum': [u'md5', u'c2f9a34147d4e748b8e669ffe70037a1'], u'filename': u'oracleasm-2.6.18-308.8.2.0.1.el5-2.0.5-1.el5.x86_64.rpm', u'epoch': u'0', u'version': u'2.0.5', u'release': u'1.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'oracleasm-2.6.18-308.8.2.0.1.el5debug', u'sum': [u'md5', u'95dfa639399dda96a59fa6e6784b49b4'], u'filename': u'oracleasm-2.6.18-308.8.2.0.1.el5debug-2.0.5-1.el5.x86_64.rpm', u'epoch': u'0', u'version': u'2.0.5', u'release': u'1.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'oracleasm-2.6.18-308.8.2.0.1.el5xen', u'sum': [u'md5', u'a51ddb7d2b47ea308f896b7959af487a'], u'filename': u'oracleasm-2.6.18-308.8.2.0.1.el5xen-2.0.5-1.el5.x86_64.rpm', u'epoch': u'0', u'version': u'2.0.5', u'release': u'1.el5', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u'[1.6.0.0-1.27.1.10.8.0.1.el5_8]\n- Add oracle-enterprise.patch\n\n[1:1.6.0.0-1.27.1.10.8]\n- Modified patch3, java-1.6.0-openjdk-java-access-bridge-security.patch:\n - com.sun.org.apache.xerces.internal.utils.,com.sun.org.apache.xalan.internal.utils.\n - packages added also to package.definition\n- Resolves: rhbz#828749\n\n[1:1.6.0.0-1.26.1.10.8]\n- Updated to IcedTea6 1.10.8\n- Modified patch3, java-1.6.0-openjdk-java-access-bridge-security.patch:\n - com.sun.org.apache.xerces.internal.utils.,com.sun.org.apache.xalan.internal.utils.\n - packages added to patch\n- Resolves: rhbz#828749', u'issued': u'2012-06-13', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELSA-2012-0730.html', u'type': u'self', u'id': None, u'title': u'ELSA-2012-0730'}, {u'href': u'http://linux.oracle.com/cve/CVE-2012-1711.html', u'type': u'cve', u'id': u'CVE-2012-1711', u'title': u'CVE-2012-1711'}, {u'href': u'http://linux.oracle.com/cve/CVE-2012-1713.html', u'type': u'cve', u'id': u'CVE-2012-1713', u'title': u'CVE-2012-1713'}, {u'href': u'http://linux.oracle.com/cve/CVE-2012-1716.html', u'type': u'cve', u'id': u'CVE-2012-1716', u'title': u'CVE-2012-1716'}, {u'href': u'http://linux.oracle.com/cve/CVE-2012-1717.html', u'type': u'cve', u'id': u'CVE-2012-1717', u'title': u'CVE-2012-1717'}, {u'href': u'http://linux.oracle.com/cve/CVE-2012-1718.html', u'type': u'cve', u'id': u'CVE-2012-1718', u'title': u'CVE-2012-1718'}, {u'href': u'http://linux.oracle.com/cve/CVE-2012-1719.html', u'type': u'cve', u'id': u'CVE-2012-1719', u'title': u'CVE-2012-1719'}, {u'href': u'http://linux.oracle.com/cve/CVE-2012-1723.html', u'type': u'cve', u'id': u'CVE-2012-1723', u'title': u'CVE-2012-1723'}, {u'href': u'http://linux.oracle.com/cve/CVE-2012-1724.html', u'type': u'cve', u'id': u'CVE-2012-1724', u'title': u'CVE-2012-1724'}, {u'href': u'http://linux.oracle.com/cve/CVE-2012-1725.html', u'type': u'cve', u'id': u'CVE-2012-1725', u'title': u'CVE-2012-1725'}], u'_content_type_id': u'erratum', u'_id': u'2755285b-5b95-4e7a-b6ce-748f60aa4adc', u'from': u'el-errata@oss.oracle.com', u'severity': u'Important', u'title': u' java-1.6.0-openjdk security update', u'_ns': u'units_erratum', u'rights': u'Copyright 2012 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 5', u'reboot_suggested': False, u'type': u'security', u'pkglist': [{u'packages': [{u'src': None, u'name': u'java-1.6.0-openjdk', u'sum': [u'md5', u'e77f498122075d32c082da127c4c9f1c'], u'filename': u'java-1.6.0-openjdk-1.6.0.0-1.27.1.10.8.0.1.el5_8.src.rpm', u'epoch': u'1', u'version': u'1.6.0.0', u'release': u'1.27.1.10.8.0.1.el5_8', u'arch': u'src'}, {u'src': None, u'name': u'java-1.6.0-openjdk', u'sum': [u'md5', u'279cbe1b2a9e5951765c8166e392db1c'], u'filename': u'java-1.6.0-openjdk-1.6.0.0-1.27.1.10.8.0.1.el5_8.x86_64.rpm', u'epoch': u'1', u'version': u'1.6.0.0', u'release': u'1.27.1.10.8.0.1.el5_8', u'arch': u'x86_64'}, {u'src': None, u'name': u'java-1.6.0-openjdk-demo', u'sum': [u'md5', u'5f2747c338cbcad16742c934edbf5a52'], u'filename': u'java-1.6.0-openjdk-demo-1.6.0.0-1.27.1.10.8.0.1.el5_8.x86_64.rpm', u'epoch': u'1', u'version': u'1.6.0.0', u'release': u'1.27.1.10.8.0.1.el5_8', u'arch': u'x86_64'}, {u'src': None, u'name': u'java-1.6.0-openjdk-devel', u'sum': [u'md5', u'164b0ba4e3765ffcd38bf02bb339bf17'], u'filename': u'java-1.6.0-openjdk-devel-1.6.0.0-1.27.1.10.8.0.1.el5_8.x86_64.rpm', u'epoch': u'1', u'version': u'1.6.0.0', u'release': u'1.27.1.10.8.0.1.el5_8', u'arch': u'x86_64'}, {u'src': None, u'name': u'java-1.6.0-openjdk-javadoc', u'sum': [u'md5', u'ddbfee70667bbea284095e9191af60e3'], u'filename': u'java-1.6.0-openjdk-javadoc-1.6.0.0-1.27.1.10.8.0.1.el5_8.x86_64.rpm', u'epoch': u'1', u'version': u'1.6.0.0', u'release': u'1.27.1.10.8.0.1.el5_8', u'arch': u'x86_64'}, {u'src': None, u'name': u'java-1.6.0-openjdk-src', u'sum': [u'md5', u'22df1f6589e29bc1bc472ff9041e0898'], u'filename': u'java-1.6.0-openjdk-src-1.6.0.0-1.27.1.10.8.0.1.el5_8.x86_64.rpm', u'epoch': u'1', u'version': u'1.6.0.0', u'release': u'1.27.1.10.8.0.1.el5_8', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u'[2.0.1-11]\n- use symbol version for XML_SetHashSalt (CVE-2012-0876, #816306)\n\n[2.0.1-10]\n- add security fix for CVE-2012-1148 (#811825)\n- add security fix for CVE-2012-0876 (#811833)', u'issued': u'2012-06-13', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELSA-2012-0731.html', u'type': u'self', u'id': None, u'title': u'ELSA-2012-0731'}, {u'href': u'http://linux.oracle.com/cve/CVE-2012-0876.html', u'type': u'cve', u'id': u'CVE-2012-0876', u'title': u'CVE-2012-0876'}, {u'href': u'http://linux.oracle.com/cve/CVE-2012-1148.html', u'type': u'cve', u'id': u'CVE-2012-1148', u'title': u'CVE-2012-1148'}], u'_content_type_id': u'erratum', u'_id': u'2011ae1d-71df-415b-9ee2-a651ab208804', u'from': u'el-errata@oss.oracle.com', u'severity': u'Moderate', u'title': u' expat security update', u'_ns': u'units_erratum', u'rights': u'Copyright 2012 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 6', u'reboot_suggested': False, u'type': u'security', u'pkglist': [{u'packages': [{u'src': None, u'name': u'expat', u'sum': [u'md5', u'2e34a767fabd8b8178d2c44207ef99a8'], u'filename': u'expat-2.0.1-11.el6_2.i686.rpm', u'epoch': u'0', u'version': u'2.0.1', u'release': u'11.el6_2', u'arch': u'i686'}, {u'src': None, u'name': u'expat', u'sum': [u'md5', u'12950fa9176dd0de882d53f6111d4873'], u'filename': u'expat-2.0.1-11.el6_2.src.rpm', u'epoch': u'0', u'version': u'2.0.1', u'release': u'11.el6_2', u'arch': u'src'}, {u'src': None, u'name': u'expat', u'sum': [u'md5', u'7452705913e7d1edadb5af077bc907ad'], u'filename': u'expat-2.0.1-11.el6_2.x86_64.rpm', u'epoch': u'0', u'version': u'2.0.1', u'release': u'11.el6_2', u'arch': u'x86_64'}, {u'src': None, u'name': u'expat-devel', u'sum': [u'md5', u'd19192fac5234856b0c7f6cfb083f2ee'], u'filename': u'expat-devel-2.0.1-11.el6_2.i686.rpm', u'epoch': u'0', u'version': u'2.0.1', u'release': u'11.el6_2', u'arch': u'i686'}, {u'src': None, u'name': u'expat-devel', u'sum': [u'md5', u'627dd40e05e4774baaf0fa4ccf574c53'], u'filename': u'expat-devel-2.0.1-11.el6_2.x86_64.rpm', u'epoch': u'0', u'version': u'2.0.1', u'release': u'11.el6_2', u'arch': u'x86_64'}], u'name': u'ol6_x86_64_latest', u'short': u'ol6_x86_64_latest'}, {u'packages': [{u'src': None, u'name': u'expat', u'sum': [u'md5', u'e29afd5132159329c52c3032fca9c732'], u'filename': u'expat-1.95.8-11.el5_8.i386.rpm', u'epoch': u'0', u'version': u'1.95.8', u'release': u'11.el5_8', u'arch': u'i386'}, {u'src': None, u'name': u'expat', u'sum': [u'md5', u'f8fa55c190dd1bd682aa5956fbad000f'], u'filename': u'expat-1.95.8-11.el5_8.src.rpm', u'epoch': u'0', u'version': u'1.95.8', u'release': u'11.el5_8', u'arch': u'src'}, {u'src': None, u'name': u'expat', u'sum': [u'md5', u'9874395072d8eb3bc7e7320dfc3e84cd'], u'filename': u'expat-1.95.8-11.el5_8.x86_64.rpm', u'epoch': u'0', u'version': u'1.95.8', u'release': u'11.el5_8', u'arch': u'x86_64'}, {u'src': None, u'name': u'expat-devel', u'sum': [u'md5', u'9d586a77cb6c9982a2f517dc50f773d1'], u'filename': u'expat-devel-1.95.8-11.el5_8.i386.rpm', u'epoch': u'0', u'version': u'1.95.8', u'release': u'11.el5_8', u'arch': u'i386'}, {u'src': None, u'name': u'expat-devel', u'sum': [u'md5', u'be2dec72d3cf1e864a40005c687d25e6'], u'filename': u'expat-devel-1.95.8-11.el5_8.x86_64.rpm', u'epoch': u'0', u'version': u'1.95.8', u'release': u'11.el5_8', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u'[2.4.3-46.el5_8.2]\n- if hash randomization is enabled, also enable it within pyexpat\nResolves: CVE-2012-0876\n\n[2.4.3-46.el5_8.1]\n- distutils.commands.register: create ~/.pypirc securely\nResolves: CVE-2011-4944\n- send encoding in SimpleHTTPServer.list_directory to protect IE7 against\npotential XSS attacks\nResolves: CVE-2011-4940\n- oCERT-2011-003: add -R command-line option and PYTHONHASHSEED environment\nvariable, to provide an opt-in way to protect against denial of service\nattacks due to hash collisions within the dict and set types\nResolves: CVE-2012-1150', u'issued': u'2012-06-18', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELSA-2012-0745.html', u'type': u'self', u'id': None, u'title': u'ELSA-2012-0745'}, {u'href': u'http://linux.oracle.com/cve/CVE-2011-4940.html', u'type': u'cve', u'id': u'CVE-2011-4940', u'title': u'CVE-2011-4940'}, {u'href': u'http://linux.oracle.com/cve/CVE-2011-4944.html', u'type': u'cve', u'id': u'CVE-2011-4944', u'title': u'CVE-2011-4944'}, {u'href': u'http://linux.oracle.com/cve/CVE-2012-1150.html', u'type': u'cve', u'id': u'CVE-2012-1150', u'title': u'CVE-2012-1150'}], u'_content_type_id': u'erratum', u'_id': u'b920f82b-a05c-4b7f-be0b-5443f1090fed', u'from': u'el-errata@oss.oracle.com', u'severity': u'Moderate', u'title': u' python security update', u'_ns': u'units_erratum', u'rights': u'Copyright 2012 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 5', u'reboot_suggested': False, u'type': u'security', u'pkglist': [{u'packages': [{u'src': None, u'name': u'python', u'sum': [u'md5', u'460d006650f9ca7e2743e2da14b2c050'], u'filename': u'python-2.4.3-46.el5_8.2.src.rpm', u'epoch': u'0', u'version': u'2.4.3', u'release': u'46.el5_8.2', u'arch': u'src'}, {u'src': None, u'name': u'python', u'sum': [u'md5', u'01eb55911471b979084dbc383f86dd74'], u'filename': u'python-2.4.3-46.el5_8.2.x86_64.rpm', u'epoch': u'0', u'version': u'2.4.3', u'release': u'46.el5_8.2', u'arch': u'x86_64'}, {u'src': None, u'name': u'python-devel', u'sum': [u'md5', u'4683a87c465b0b4b534487f368a147ef'], u'filename': u'python-devel-2.4.3-46.el5_8.2.i386.rpm', u'epoch': u'0', u'version': u'2.4.3', u'release': u'46.el5_8.2', u'arch': u'i386'}, {u'src': None, u'name': u'python-devel', u'sum': [u'md5', u'a67ceffe0640929239e49fcae815b6ef'], u'filename': u'python-devel-2.4.3-46.el5_8.2.x86_64.rpm', u'epoch': u'0', u'version': u'2.4.3', u'release': u'46.el5_8.2', u'arch': u'x86_64'}, {u'src': None, u'name': u'python-libs', u'sum': [u'md5', u'88a443ee48bf5f85d420aff80f121a3d'], u'filename': u'python-libs-2.4.3-46.el5_8.2.x86_64.rpm', u'epoch': u'0', u'version': u'2.4.3', u'release': u'46.el5_8.2', u'arch': u'x86_64'}, {u'src': None, u'name': u'python-tools', u'sum': [u'md5', u'b812dfdda4ed62ab8f44570ccc9515ae'], u'filename': u'python-tools-2.4.3-46.el5_8.2.x86_64.rpm', u'epoch': u'0', u'version': u'2.4.3', u'release': u'46.el5_8.2', u'arch': u'x86_64'}, {u'src': None, u'name': u'tkinter', u'sum': [u'md5', u'0762cdc381636513ec2657277a70e8e6'], u'filename': u'tkinter-2.4.3-46.el5_8.2.x86_64.rpm', u'epoch': u'0', u'version': u'2.4.3', u'release': u'46.el5_8.2', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u'[8.1.23-5]\n- Back-port upstream fix for CVE-2012-2143\nResolves: #830721', u'issued': u'2012-06-25', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELSA-2012-1036.html', u'type': u'self', u'id': None, u'title': u'ELSA-2012-1036'}, {u'href': u'http://linux.oracle.com/cve/CVE-2012-2143.html', u'type': u'cve', u'id': u'CVE-2012-2143', u'title': u'CVE-2012-2143'}], u'_content_type_id': u'erratum', u'_id': u'af47958b-859e-4d1b-8ee9-dccd0f8be917', u'from': u'el-errata@oss.oracle.com', u'severity': u'Moderate', u'title': u' postgresql security update', u'_ns': u'units_erratum', u'rights': u'Copyright 2012 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 5', u'reboot_suggested': False, u'type': u'security', u'pkglist': [{u'packages': [{u'src': None, u'name': u'postgresql', u'sum': [u'md5', u'af954e5339fa8b9d268a12a1d0684de0'], u'filename': u'postgresql-8.1.23-5.el5_8.src.rpm', u'epoch': u'0', u'version': u'8.1.23', u'release': u'5.el5_8', u'arch': u'src'}, {u'src': None, u'name': u'postgresql', u'sum': [u'md5', u'337527d25e14d1e6e8d67f0085051e08'], u'filename': u'postgresql-8.1.23-5.el5_8.x86_64.rpm', u'epoch': u'0', u'version': u'8.1.23', u'release': u'5.el5_8', u'arch': u'x86_64'}, {u'src': None, u'name': u'postgresql-contrib', u'sum': [u'md5', u'8f0bd0e596fdf36200ec35071524e91d'], u'filename': u'postgresql-contrib-8.1.23-5.el5_8.x86_64.rpm', u'epoch': u'0', u'version': u'8.1.23', u'release': u'5.el5_8', u'arch': u'x86_64'}, {u'src': None, u'name': u'postgresql-devel', u'sum': [u'md5', u'6601684ebd9bc7f5d0bb4d3f5e39c2c0'], u'filename': u'postgresql-devel-8.1.23-5.el5_8.i386.rpm', u'epoch': u'0', u'version': u'8.1.23', u'release': u'5.el5_8', u'arch': u'i386'}, {u'src': None, u'name': u'postgresql-devel', u'sum': [u'md5', u'0f1e455769965c04181d1d4255a47ad1'], u'filename': u'postgresql-devel-8.1.23-5.el5_8.x86_64.rpm', u'epoch': u'0', u'version': u'8.1.23', u'release': u'5.el5_8', u'arch': u'x86_64'}, {u'src': None, u'name': u'postgresql-docs', u'sum': [u'md5', u'ef2072d1dc90d032e718942092637ea1'], u'filename': u'postgresql-docs-8.1.23-5.el5_8.x86_64.rpm', u'epoch': u'0', u'version': u'8.1.23', u'release': u'5.el5_8', u'arch': u'x86_64'}, {u'src': None, u'name': u'postgresql-libs', u'sum': [u'md5', u'89ec4b3be4765499da3691354b76b7bf'], u'filename': u'postgresql-libs-8.1.23-5.el5_8.i386.rpm', u'epoch': u'0', u'version': u'8.1.23', u'release': u'5.el5_8', u'arch': u'i386'}, {u'src': None, u'name': u'postgresql-libs', u'sum': [u'md5', u'd7297cd1d66dd9b0a39aee76b9a3f25b'], u'filename': u'postgresql-libs-8.1.23-5.el5_8.x86_64.rpm', u'epoch': u'0', u'version': u'8.1.23', u'release': u'5.el5_8', u'arch': u'x86_64'}, {u'src': None, u'name': u'postgresql-pl', u'sum': [u'md5', u'2a6aefb244f6662ec24038fc01ec7aaa'], u'filename': u'postgresql-pl-8.1.23-5.el5_8.x86_64.rpm', u'epoch': u'0', u'version': u'8.1.23', u'release': u'5.el5_8', u'arch': u'x86_64'}, {u'src': None, u'name': u'postgresql-python', u'sum': [u'md5', u'ed2828399fbd6e9933cf7eb224b0eb8c'], u'filename': u'postgresql-python-8.1.23-5.el5_8.x86_64.rpm', u'epoch': u'0', u'version': u'8.1.23', u'release': u'5.el5_8', u'arch': u'x86_64'}, {u'src': None, u'name': u'postgresql-server', u'sum': [u'md5', u'7eab44e445dfab86da9dd7b6cc0c9fa7'], u'filename': u'postgresql-server-8.1.23-5.el5_8.x86_64.rpm', u'epoch': u'0', u'version': u'8.1.23', u'release': u'5.el5_8', u'arch': u'x86_64'}, {u'src': None, u'name': u'postgresql-tcl', u'sum': [u'md5', u'c875c21a968fcecf8f05f11d3f945c4c'], u'filename': u'postgresql-tcl-8.1.23-5.el5_8.x86_64.rpm', u'epoch': u'0', u'version': u'8.1.23', u'release': u'5.el5_8', u'arch': u'x86_64'}, {u'src': None, u'name': u'postgresql-test', u'sum': [u'md5', u'10017ffe0401e0638e04704bb7f5d81d'], u'filename': u'postgresql-test-8.1.23-5.el5_8.x86_64.rpm', u'epoch': u'0', u'version': u'8.1.23', u'release': u'5.el5_8', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u'[8.4.12-1]\n- Update to PostgreSQL 8.4.12, for various fixes described at\n http://www.postgresql.org/docs/8.4/static/release-8-4-12.html\n including the fixes for CVE-2012-2143, CVE-2012-2655\nResolves: #830723\n\n[8.4.11-2]\n- Add patches for CVE-2012-2143, CVE-2012-2655\nResolves: #830723\n\n[8.4.11-1]\n- Update to PostgreSQL 8.4.11, for various fixes described at\n http://www.postgresql.org/docs/8.4/static/release-8-4-11.html\n http://www.postgresql.org/docs/8.4/static/release-8-4-10.html\n including the fixes for CVE-2012-0866, CVE-2012-0867, CVE-2012-0868\nResolves: #812077', u'issued': u'2012-06-25', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELSA-2012-1037.html', u'type': u'self', u'id': None, u'title': u'ELSA-2012-1037'}, {u'href': u'http://linux.oracle.com/cve/CVE-2012-2143.html', u'type': u'cve', u'id': u'CVE-2012-2143', u'title': u'CVE-2012-2143'}, {u'href': u'http://linux.oracle.com/cve/CVE-2012-2655.html', u'type': u'cve', u'id': u'CVE-2012-2655', u'title': u'CVE-2012-2655'}], u'_content_type_id': u'erratum', u'_id': u'7c815896-a5aa-4e04-95c3-7f0a8002cff7', u'from': u'el-errata@oss.oracle.com', u'severity': u'Moderate', u'title': u' postgresql and postgresql84 security update', u'_ns': u'units_erratum', u'rights': u'Copyright 2012 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 6', u'reboot_suggested': False, u'type': u'security', u'pkglist': [{u'packages': [{u'src': None, u'name': u'postgresql', u'sum': [u'md5', u'5ebe44b30ff1bdf737acbddef014e7dc'], u'filename': u'postgresql-8.4.12-1.el6_2.i686.rpm', u'epoch': u'0', u'version': u'8.4.12', u'release': u'1.el6_2', u'arch': u'i686'}, {u'src': None, u'name': u'postgresql', u'sum': [u'md5', u'72fd374f39a8389adc2ce647419c2a27'], u'filename': u'postgresql-8.4.12-1.el6_2.src.rpm', u'epoch': u'0', u'version': u'8.4.12', u'release': u'1.el6_2', u'arch': u'src'}, {u'src': None, u'name': u'postgresql', u'sum': [u'md5', u'96acb00db634440f47b9dc0d7a809d09'], u'filename': u'postgresql-8.4.12-1.el6_2.x86_64.rpm', u'epoch': u'0', u'version': u'8.4.12', u'release': u'1.el6_2', u'arch': u'x86_64'}, {u'src': None, u'name': u'postgresql-contrib', u'sum': [u'md5', u'890f6f19393d9935889f5f6631090453'], u'filename': u'postgresql-contrib-8.4.12-1.el6_2.x86_64.rpm', u'epoch': u'0', u'version': u'8.4.12', u'release': u'1.el6_2', u'arch': u'x86_64'}, {u'src': None, u'name': u'postgresql-devel', u'sum': [u'md5', u'7638820f4ca7b5e55932f2eee34a531a'], u'filename': u'postgresql-devel-8.4.12-1.el6_2.i686.rpm', u'epoch': u'0', u'version': u'8.4.12', u'release': u'1.el6_2', u'arch': u'i686'}, {u'src': None, u'name': u'postgresql-devel', u'sum': [u'md5', u'e5ce337aa99fb0ac4721d4f5574d14d2'], u'filename': u'postgresql-devel-8.4.12-1.el6_2.x86_64.rpm', u'epoch': u'0', u'version': u'8.4.12', u'release': u'1.el6_2', u'arch': u'x86_64'}, {u'src': None, u'name': u'postgresql-docs', u'sum': [u'md5', u'c9210337bd1e1dc281a8b649e6fdf508'], u'filename': u'postgresql-docs-8.4.12-1.el6_2.x86_64.rpm', u'epoch': u'0', u'version': u'8.4.12', u'release': u'1.el6_2', u'arch': u'x86_64'}, {u'src': None, u'name': u'postgresql-libs', u'sum': [u'md5', u'60a5dbd163ad0a56335e450b4a7a79b0'], u'filename': u'postgresql-libs-8.4.12-1.el6_2.i686.rpm', u'epoch': u'0', u'version': u'8.4.12', u'release': u'1.el6_2', u'arch': u'i686'}, {u'src': None, u'name': u'postgresql-libs', u'sum': [u'md5', u'48526c7ca6a901eb4221ba7c714e197d'], u'filename': u'postgresql-libs-8.4.12-1.el6_2.x86_64.rpm', u'epoch': u'0', u'version': u'8.4.12', u'release': u'1.el6_2', u'arch': u'x86_64'}, {u'src': None, u'name': u'postgresql-plperl', u'sum': [u'md5', u'b5eb30cf29f906e9045fcb2ed5d37283'], u'filename': u'postgresql-plperl-8.4.12-1.el6_2.x86_64.rpm', u'epoch': u'0', u'version': u'8.4.12', u'release': u'1.el6_2', u'arch': u'x86_64'}, {u'src': None, u'name': u'postgresql-plpython', u'sum': [u'md5', u'f79de55e62a9041b89deea5fa4842978'], u'filename': u'postgresql-plpython-8.4.12-1.el6_2.x86_64.rpm', u'epoch': u'0', u'version': u'8.4.12', u'release': u'1.el6_2', u'arch': u'x86_64'}, {u'src': None, u'name': u'postgresql-pltcl', u'sum': [u'md5', u'a916cf8e0e3f80e5ca60de7751c7d0e0'], u'filename': u'postgresql-pltcl-8.4.12-1.el6_2.x86_64.rpm', u'epoch': u'0', u'version': u'8.4.12', u'release': u'1.el6_2', u'arch': u'x86_64'}, {u'src': None, u'name': u'postgresql-server', u'sum': [u'md5', u'cc4d488cbfac1fb3126876245de470ce'], u'filename': u'postgresql-server-8.4.12-1.el6_2.x86_64.rpm', u'epoch': u'0', u'version': u'8.4.12', u'release': u'1.el6_2', u'arch': u'x86_64'}, {u'src': None, u'name': u'postgresql-test', u'sum': [u'md5', u'98d6096ddfd8848e58429c9a4e16f1d3'], u'filename': u'postgresql-test-8.4.12-1.el6_2.x86_64.rpm', u'epoch': u'0', u'version': u'8.4.12', u'release': u'1.el6_2', u'arch': u'x86_64'}], u'name': u'ol6_x86_64_latest', u'short': u'ol6_x86_64_latest'}, {u'packages': [{u'src': None, u'name': u'postgresql84', u'sum': [u'md5', u'7b87a23a9b445532d90e72e8060b13a1'], u'filename': u'postgresql84-8.4.12-1.el5_8.src.rpm', u'epoch': u'0', u'version': u'8.4.12', u'release': u'1.el5_8', u'arch': u'src'}, {u'src': None, u'name': u'postgresql84', u'sum': [u'md5', u'9f9643d34b98a49a3b8fd0ba112eb831'], u'filename': u'postgresql84-8.4.12-1.el5_8.x86_64.rpm', u'epoch': u'0', u'version': u'8.4.12', u'release': u'1.el5_8', u'arch': u'x86_64'}, {u'src': None, u'name': u'postgresql84-contrib', u'sum': [u'md5', u'af7043150a4e38dfb09cc8283f2fd84b'], u'filename': u'postgresql84-contrib-8.4.12-1.el5_8.x86_64.rpm', u'epoch': u'0', u'version': u'8.4.12', u'release': u'1.el5_8', u'arch': u'x86_64'}, {u'src': None, u'name': u'postgresql84-devel', u'sum': [u'md5', u'fe9badd4a15796f79d6d4cc2d633a99c'], u'filename': u'postgresql84-devel-8.4.12-1.el5_8.i386.rpm', u'epoch': u'0', u'version': u'8.4.12', u'release': u'1.el5_8', u'arch': u'i386'}, {u'src': None, u'name': u'postgresql84-devel', u'sum': [u'md5', u'cded3ed2c2cd7878e33c665b9fcf44d2'], u'filename': u'postgresql84-devel-8.4.12-1.el5_8.x86_64.rpm', u'epoch': u'0', u'version': u'8.4.12', u'release': u'1.el5_8', u'arch': u'x86_64'}, {u'src': None, u'name': u'postgresql84-docs', u'sum': [u'md5', u'637b0a4304215dfd44f49b4dccfe6f7c'], u'filename': u'postgresql84-docs-8.4.12-1.el5_8.x86_64.rpm', u'epoch': u'0', u'version': u'8.4.12', u'release': u'1.el5_8', u'arch': u'x86_64'}, {u'src': None, u'name': u'postgresql84-libs', u'sum': [u'md5', u'b4d87e19d5cb019dc7876d3f01659ebe'], u'filename': u'postgresql84-libs-8.4.12-1.el5_8.i386.rpm', u'epoch': u'0', u'version': u'8.4.12', u'release': u'1.el5_8', u'arch': u'i386'}, {u'src': None, u'name': u'postgresql84-libs', u'sum': [u'md5', u'10a683ce5cf24c203f30986e66deb40a'], u'filename': u'postgresql84-libs-8.4.12-1.el5_8.x86_64.rpm', u'epoch': u'0', u'version': u'8.4.12', u'release': u'1.el5_8', u'arch': u'x86_64'}, {u'src': None, u'name': u'postgresql84-plperl', u'sum': [u'md5', u'8a29ba8ac9064c3c4fd01269cc2da906'], u'filename': u'postgresql84-plperl-8.4.12-1.el5_8.x86_64.rpm', u'epoch': u'0', u'version': u'8.4.12', u'release': u'1.el5_8', u'arch': u'x86_64'}, {u'src': None, u'name': u'postgresql84-plpython', u'sum': [u'md5', u'7c3a444e2cd83e09d374eae280141b1f'], u'filename': u'postgresql84-plpython-8.4.12-1.el5_8.x86_64.rpm', u'epoch': u'0', u'version': u'8.4.12', u'release': u'1.el5_8', u'arch': u'x86_64'}, {u'src': None, u'name': u'postgresql84-pltcl', u'sum': [u'md5', u'2ba005c16caa31f031d04feb1ec67679'], u'filename': u'postgresql84-pltcl-8.4.12-1.el5_8.x86_64.rpm', u'epoch': u'0', u'version': u'8.4.12', u'release': u'1.el5_8', u'arch': u'x86_64'}, {u'src': None, u'name': u'postgresql84-python', u'sum': [u'md5', u'03ed45c41da25f18c8195bc5951cb8fb'], u'filename': u'postgresql84-python-8.4.12-1.el5_8.x86_64.rpm', u'epoch': u'0', u'version': u'8.4.12', u'release': u'1.el5_8', u'arch': u'x86_64'}, {u'src': None, u'name': u'postgresql84-server', u'sum': [u'md5', u'ae62eee04a559ca6a408fd6f3d84464b'], u'filename': u'postgresql84-server-8.4.12-1.el5_8.x86_64.rpm', u'epoch': u'0', u'version': u'8.4.12', u'release': u'1.el5_8', u'arch': u'x86_64'}, {u'src': None, u'name': u'postgresql84-tcl', u'sum': [u'md5', u'c0ca5057558360cdcfbff5d39d735c64'], u'filename': u'postgresql84-tcl-8.4.12-1.el5_8.x86_64.rpm', u'epoch': u'0', u'version': u'8.4.12', u'release': u'1.el5_8', u'arch': u'x86_64'}, {u'src': None, u'name': u'postgresql84-test', u'sum': [u'md5', u'04aa66d4689445c583fc7084225706da'], u'filename': u'postgresql84-test-8.4.12-1.el5_8.x86_64.rpm', u'epoch': u'0', u'version': u'8.4.12', u'release': u'1.el5_8', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u'[5.1.6-39]\n- fix issue in CVE-2012-0057 patch\n\n[5.1.6-38]\n- fix memory handling in CVE-2012-0789 patch\n\n[5.1.6-37]\n- add security fixes for CVE-2012-0057, CVE-2011-4153, CVE-2012-0789,\n CVE-2012-1172\n\n[5.1.6-36]\n- add security fix for CVE-2012-2336', u'issued': u'2012-06-27', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELSA-2012-1045.html', u'type': u'self', u'id': None, u'title': u'ELSA-2012-1045'}, {u'href': u'http://linux.oracle.com/cve/CVE-2011-4153.html', u'type': u'cve', u'id': u'CVE-2011-4153', u'title': u'CVE-2011-4153'}, {u'href': u'http://linux.oracle.com/cve/CVE-2012-0057.html', u'type': u'cve', u'id': u'CVE-2012-0057', u'title': u'CVE-2012-0057'}, {u'href': u'http://linux.oracle.com/cve/CVE-2012-0789.html', u'type': u'cve', u'id': u'CVE-2012-0789', u'title': u'CVE-2012-0789'}, {u'href': u'http://linux.oracle.com/cve/CVE-2012-1172.html', u'type': u'cve', u'id': u'CVE-2012-1172', u'title': u'CVE-2012-1172'}, {u'href': u'http://linux.oracle.com/cve/CVE-2012-2336.html', u'type': u'cve', u'id': u'CVE-2012-2336', u'title': u'CVE-2012-2336'}], u'_content_type_id': u'erratum', u'_id': u'8136bd70-e379-457a-afb7-84a73319e4e4', u'from': u'el-errata@oss.oracle.com', u'severity': u'Moderate', u'title': u' php security update', u'_ns': u'units_erratum', u'rights': u'Copyright 2012 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 5', u'reboot_suggested': False, u'type': u'security', u'pkglist': [{u'packages': [{u'src': None, u'name': u'php', u'sum': [u'md5', u'eabb453180580a7d5cafd958acffea17'], u'filename': u'php-5.1.6-39.el5_8.src.rpm', u'epoch': u'0', u'version': u'5.1.6', u'release': u'39.el5_8', u'arch': u'src'}, {u'src': None, u'name': u'php', u'sum': [u'md5', u'6c307c3ab70144d25f4b04cf34206474'], u'filename': u'php-5.1.6-39.el5_8.x86_64.rpm', u'epoch': u'0', u'version': u'5.1.6', u'release': u'39.el5_8', u'arch': u'x86_64'}, {u'src': None, u'name': u'php-bcmath', u'sum': [u'md5', u'8f598f014121f2ad3b0b885b7bee28d0'], u'filename': u'php-bcmath-5.1.6-39.el5_8.x86_64.rpm', u'epoch': u'0', u'version': u'5.1.6', u'release': u'39.el5_8', u'arch': u'x86_64'}, {u'src': None, u'name': u'php-cli', u'sum': [u'md5', u'b5b7519ae797b67a04d9c09cabe8762b'], u'filename': u'php-cli-5.1.6-39.el5_8.x86_64.rpm', u'epoch': u'0', u'version': u'5.1.6', u'release': u'39.el5_8', u'arch': u'x86_64'}, {u'src': None, u'name': u'php-common', u'sum': [u'md5', u'5bcdcfda2c1155de72ab2f3652803da3'], u'filename': u'php-common-5.1.6-39.el5_8.x86_64.rpm', u'epoch': u'0', u'version': u'5.1.6', u'release': u'39.el5_8', u'arch': u'x86_64'}, {u'src': None, u'name': u'php-dba', u'sum': [u'md5', u'1586130217dd090460578189d75ac292'], u'filename': u'php-dba-5.1.6-39.el5_8.x86_64.rpm', u'epoch': u'0', u'version': u'5.1.6', u'release': u'39.el5_8', u'arch': u'x86_64'}, {u'src': None, u'name': u'php-devel', u'sum': [u'md5', u'ac5933d824998ff6660c05d3300547fe'], u'filename': u'php-devel-5.1.6-39.el5_8.x86_64.rpm', u'epoch': u'0', u'version': u'5.1.6', u'release': u'39.el5_8', u'arch': u'x86_64'}, {u'src': None, u'name': u'php-gd', u'sum': [u'md5', u'dc2add551ac78fca9cc2d7072be4b838'], u'filename': u'php-gd-5.1.6-39.el5_8.x86_64.rpm', u'epoch': u'0', u'version': u'5.1.6', u'release': u'39.el5_8', u'arch': u'x86_64'}, {u'src': None, u'name': u'php-imap', u'sum': [u'md5', u'd11d86bfcfc639aef79bdceb4bf29dde'], u'filename': u'php-imap-5.1.6-39.el5_8.x86_64.rpm', u'epoch': u'0', u'version': u'5.1.6', u'release': u'39.el5_8', u'arch': u'x86_64'}, {u'src': None, u'name': u'php-ldap', u'sum': [u'md5', u'c16d34e7a3db01051c143059d7ffcfe3'], u'filename': u'php-ldap-5.1.6-39.el5_8.x86_64.rpm', u'epoch': u'0', u'version': u'5.1.6', u'release': u'39.el5_8', u'arch': u'x86_64'}, {u'src': None, u'name': u'php-mbstring', u'sum': [u'md5', u'8a7160fddba0f3d19e45536230f005ee'], u'filename': u'php-mbstring-5.1.6-39.el5_8.x86_64.rpm', u'epoch': u'0', u'version': u'5.1.6', u'release': u'39.el5_8', u'arch': u'x86_64'}, {u'src': None, u'name': u'php-mysql', u'sum': [u'md5', u'f606b19c6e24054f35b34811b38b4507'], u'filename': u'php-mysql-5.1.6-39.el5_8.x86_64.rpm', u'epoch': u'0', u'version': u'5.1.6', u'release': u'39.el5_8', u'arch': u'x86_64'}, {u'src': None, u'name': u'php-ncurses', u'sum': [u'md5', u'45474e6a014b76ddba28df007373de37'], u'filename': u'php-ncurses-5.1.6-39.el5_8.x86_64.rpm', u'epoch': u'0', u'version': u'5.1.6', u'release': u'39.el5_8', u'arch': u'x86_64'}, {u'src': None, u'name': u'php-odbc', u'sum': [u'md5', u'29d0f75783f71b05ba8fce391c9dfdb8'], u'filename': u'php-odbc-5.1.6-39.el5_8.x86_64.rpm', u'epoch': u'0', u'version': u'5.1.6', u'release': u'39.el5_8', u'arch': u'x86_64'}, {u'src': None, u'name': u'php-pdo', u'sum': [u'md5', u'40edae3fca934d6a2233179de5aa2235'], u'filename': u'php-pdo-5.1.6-39.el5_8.x86_64.rpm', u'epoch': u'0', u'version': u'5.1.6', u'release': u'39.el5_8', u'arch': u'x86_64'}, {u'src': None, u'name': u'php-pgsql', u'sum': [u'md5', u'62c0c22f35cc1d136695208c96ae54a0'], u'filename': u'php-pgsql-5.1.6-39.el5_8.x86_64.rpm', u'epoch': u'0', u'version': u'5.1.6', u'release': u'39.el5_8', u'arch': u'x86_64'}, {u'src': None, u'name': u'php-snmp', u'sum': [u'md5', u'45685f4d6b49ec11754082c678f87f57'], u'filename': u'php-snmp-5.1.6-39.el5_8.x86_64.rpm', u'epoch': u'0', u'version': u'5.1.6', u'release': u'39.el5_8', u'arch': u'x86_64'}, {u'src': None, u'name': u'php-soap', u'sum': [u'md5', u'8cd6c663010dea33aa73f01c02d8d99e'], u'filename': u'php-soap-5.1.6-39.el5_8.x86_64.rpm', u'epoch': u'0', u'version': u'5.1.6', u'release': u'39.el5_8', u'arch': u'x86_64'}, {u'src': None, u'name': u'php-xml', u'sum': [u'md5', u'150e881c978f7c072c16853228c23b66'], u'filename': u'php-xml-5.1.6-39.el5_8.x86_64.rpm', u'epoch': u'0', u'version': u'5.1.6', u'release': u'39.el5_8', u'arch': u'x86_64'}, {u'src': None, u'name': u'php-xmlrpc', u'sum': [u'md5', u'7f1e666cbde4d6b2c625f604314c504b'], u'filename': u'php-xmlrpc-5.1.6-39.el5_8.x86_64.rpm', u'epoch': u'0', u'version': u'5.1.6', u'release': u'39.el5_8', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u'[5.3.3-13]\n- add security fix for CVE-2010-2950\n\n[5.3.3-11]\n- fix tests for CVE-2012-2143, CVE-2012-0789\n\n[5.3.3-10]\n- add security fix for CVE-2012-2336\n\n[5.3.3-9]\n- add security fixes for CVE-2011-4153, CVE-2012-0057, CVE-2012-0789,\n CVE-2012-1172, CVE-2012-2143, CVE-2012-2386', u'issued': u'2012-06-27', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELSA-2012-1047.html', u'type': u'self', u'id': None, u'title': u'ELSA-2012-1047'}, {u'href': u'http://linux.oracle.com/cve/CVE-2012-2143.html', u'type': u'cve', u'id': u'CVE-2012-2143', u'title': u'CVE-2012-2143'}, {u'href': u'http://linux.oracle.com/cve/CVE-2011-4153.html', u'type': u'cve', u'id': u'CVE-2011-4153', u'title': u'CVE-2011-4153'}, {u'href': u'http://linux.oracle.com/cve/CVE-2012-0057.html', u'type': u'cve', u'id': u'CVE-2012-0057', u'title': u'CVE-2012-0057'}, {u'href': u'http://linux.oracle.com/cve/CVE-2012-0789.html', u'type': u'cve', u'id': u'CVE-2012-0789', u'title': u'CVE-2012-0789'}, {u'href': u'http://linux.oracle.com/cve/CVE-2012-1172.html', u'type': u'cve', u'id': u'CVE-2012-1172', u'title': u'CVE-2012-1172'}, {u'href': u'http://linux.oracle.com/cve/CVE-2012-2336.html', u'type': u'cve', u'id': u'CVE-2012-2336', u'title': u'CVE-2012-2336'}, {u'href': u'http://linux.oracle.com/cve/CVE-2010-2950.html', u'type': u'cve', u'id': u'CVE-2010-2950', u'title': u'CVE-2010-2950'}, {u'href': u'http://linux.oracle.com/cve/CVE-2012-2386.html', u'type': u'cve', u'id': u'CVE-2012-2386', u'title': u'CVE-2012-2386'}], u'_content_type_id': u'erratum', u'_id': u'4229ad88-567c-40f5-b0b8-81e381bfa170', u'from': u'el-errata@oss.oracle.com', u'severity': u'Moderate', u'title': u' php53 security update', u'_ns': u'units_erratum', u'rights': u'Copyright 2012 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 5', u'reboot_suggested': False, u'type': u'security', u'pkglist': [{u'packages': [{u'src': None, u'name': u'php53', u'sum': [u'md5', u'7a4ba17828760fec4582e0645264237d'], u'filename': u'php53-5.3.3-13.el5_8.src.rpm', u'epoch': u'0', u'version': u'5.3.3', u'release': u'13.el5_8', u'arch': u'src'}, {u'src': None, u'name': u'php53', u'sum': [u'md5', u'96e66d81f13cdc6f0dc74f3944817741'], u'filename': u'php53-5.3.3-13.el5_8.x86_64.rpm', u'epoch': u'0', u'version': u'5.3.3', u'release': u'13.el5_8', u'arch': u'x86_64'}, {u'src': None, u'name': u'php53-bcmath', u'sum': [u'md5', u'360726729cf07cb9a4a24acaf83d3226'], u'filename': u'php53-bcmath-5.3.3-13.el5_8.x86_64.rpm', u'epoch': u'0', u'version': u'5.3.3', u'release': u'13.el5_8', u'arch': u'x86_64'}, {u'src': None, u'name': u'php53-cli', u'sum': [u'md5', u'e300f825cbb7cc3dc9bec6626536e893'], u'filename': u'php53-cli-5.3.3-13.el5_8.x86_64.rpm', u'epoch': u'0', u'version': u'5.3.3', u'release': u'13.el5_8', u'arch': u'x86_64'}, {u'src': None, u'name': u'php53-common', u'sum': [u'md5', u'f5c0a139410fb6fcc21cbeec16940c9e'], u'filename': u'php53-common-5.3.3-13.el5_8.x86_64.rpm', u'epoch': u'0', u'version': u'5.3.3', u'release': u'13.el5_8', u'arch': u'x86_64'}, {u'src': None, u'name': u'php53-dba', u'sum': [u'md5', u'7dd88b0a3d9a50b8f5b3672ad545a647'], u'filename': u'php53-dba-5.3.3-13.el5_8.x86_64.rpm', u'epoch': u'0', u'version': u'5.3.3', u'release': u'13.el5_8', u'arch': u'x86_64'}, {u'src': None, u'name': u'php53-devel', u'sum': [u'md5', u'9b1d2006ccfa2b2711d449401a54d1de'], u'filename': u'php53-devel-5.3.3-13.el5_8.x86_64.rpm', u'epoch': u'0', u'version': u'5.3.3', u'release': u'13.el5_8', u'arch': u'x86_64'}, {u'src': None, u'name': u'php53-gd', u'sum': [u'md5', u'6eb47798f54c43ef79eff4ce788847b5'], u'filename': u'php53-gd-5.3.3-13.el5_8.x86_64.rpm', u'epoch': u'0', u'version': u'5.3.3', u'release': u'13.el5_8', u'arch': u'x86_64'}, {u'src': None, u'name': u'php53-imap', u'sum': [u'md5', u'c16330874faa3eaef4b33e02cc7b1726'], u'filename': u'php53-imap-5.3.3-13.el5_8.x86_64.rpm', u'epoch': u'0', u'version': u'5.3.3', u'release': u'13.el5_8', u'arch': u'x86_64'}, {u'src': None, u'name': u'php53-intl', u'sum': [u'md5', u'112ea8f95c1e6158886a1ece4540cafb'], u'filename': u'php53-intl-5.3.3-13.el5_8.x86_64.rpm', u'epoch': u'0', u'version': u'5.3.3', u'release': u'13.el5_8', u'arch': u'x86_64'}, {u'src': None, u'name': u'php53-ldap', u'sum': [u'md5', u'864feb675570d0de605968a5a405653e'], u'filename': u'php53-ldap-5.3.3-13.el5_8.x86_64.rpm', u'epoch': u'0', u'version': u'5.3.3', u'release': u'13.el5_8', u'arch': u'x86_64'}, {u'src': None, u'name': u'php53-mbstring', u'sum': [u'md5', u'f0d25bb2cc42f5600e120455fad63e38'], u'filename': u'php53-mbstring-5.3.3-13.el5_8.x86_64.rpm', u'epoch': u'0', u'version': u'5.3.3', u'release': u'13.el5_8', u'arch': u'x86_64'}, {u'src': None, u'name': u'php53-mysql', u'sum': [u'md5', u'5a1da445f2b711f56bba0f3f83ee9dbe'], u'filename': u'php53-mysql-5.3.3-13.el5_8.x86_64.rpm', u'epoch': u'0', u'version': u'5.3.3', u'release': u'13.el5_8', u'arch': u'x86_64'}, {u'src': None, u'name': u'php53-odbc', u'sum': [u'md5', u'a35eece40bef8218affcd318e9f01d75'], u'filename': u'php53-odbc-5.3.3-13.el5_8.x86_64.rpm', u'epoch': u'0', u'version': u'5.3.3', u'release': u'13.el5_8', u'arch': u'x86_64'}, {u'src': None, u'name': u'php53-pdo', u'sum': [u'md5', u'0ffe7787d23c227d7f5830f466ff6371'], u'filename': u'php53-pdo-5.3.3-13.el5_8.x86_64.rpm', u'epoch': u'0', u'version': u'5.3.3', u'release': u'13.el5_8', u'arch': u'x86_64'}, {u'src': None, u'name': u'php53-pgsql', u'sum': [u'md5', u'4e722a924f103eed2e9df1b3c27c9585'], u'filename': u'php53-pgsql-5.3.3-13.el5_8.x86_64.rpm', u'epoch': u'0', u'version': u'5.3.3', u'release': u'13.el5_8', u'arch': u'x86_64'}, {u'src': None, u'name': u'php53-process', u'sum': [u'md5', u'9a2dd669c92b30fbc384eeefe3f530e0'], u'filename': u'php53-process-5.3.3-13.el5_8.x86_64.rpm', u'epoch': u'0', u'version': u'5.3.3', u'release': u'13.el5_8', u'arch': u'x86_64'}, {u'src': None, u'name': u'php53-pspell', u'sum': [u'md5', u'259f1b9e14274c8a7304fced130d7639'], u'filename': u'php53-pspell-5.3.3-13.el5_8.x86_64.rpm', u'epoch': u'0', u'version': u'5.3.3', u'release': u'13.el5_8', u'arch': u'x86_64'}, {u'src': None, u'name': u'php53-snmp', u'sum': [u'md5', u'a6fb705d3ae5b239af00ee7448d275a7'], u'filename': u'php53-snmp-5.3.3-13.el5_8.x86_64.rpm', u'epoch': u'0', u'version': u'5.3.3', u'release': u'13.el5_8', u'arch': u'x86_64'}, {u'src': None, u'name': u'php53-soap', u'sum': [u'md5', u'a83b1f376095fa088d58553718707ac3'], u'filename': u'php53-soap-5.3.3-13.el5_8.x86_64.rpm', u'epoch': u'0', u'version': u'5.3.3', u'release': u'13.el5_8', u'arch': u'x86_64'}, {u'src': None, u'name': u'php53-xml', u'sum': [u'md5', u'ea9569d905c14785f1535a712e5818ad'], u'filename': u'php53-xml-5.3.3-13.el5_8.x86_64.rpm', u'epoch': u'0', u'version': u'5.3.3', u'release': u'13.el5_8', u'arch': u'x86_64'}, {u'src': None, u'name': u'php53-xmlrpc', u'sum': [u'md5', u'57ce4bbb6c2289347d0b7b6082aaff08'], u'filename': u'php53-xmlrpc-5.3.3-13.el5_8.x86_64.rpm', u'epoch': u'0', u'version': u'5.3.3', u'release': u'13.el5_8', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u'[3.9.4-6]\n- Add fixes for CVE-2012-2088, CVE-2012-2113\nResolves: #835748', u'issued': u'2012-07-03', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELSA-2012-1054.html', u'type': u'self', u'id': None, u'title': u'ELSA-2012-1054'}, {u'href': u'http://linux.oracle.com/cve/CVE-2012-2088.html', u'type': u'cve', u'id': u'CVE-2012-2088', u'title': u'CVE-2012-2088'}, {u'href': u'http://linux.oracle.com/cve/CVE-2012-2113.html', u'type': u'cve', u'id': u'CVE-2012-2113', u'title': u'CVE-2012-2113'}], u'_content_type_id': u'erratum', u'_id': u'752fc6a9-bc35-4da1-b7a0-e33e9b9f7d33', u'from': u'el-errata@oss.oracle.com', u'severity': u'Important', u'title': u' libtiff security update', u'_ns': u'units_erratum', u'rights': u'Copyright 2012 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 6', u'reboot_suggested': False, u'type': u'security', u'pkglist': [{u'packages': [{u'src': None, u'name': u'libtiff', u'sum': [u'md5', u'7c5837e0c9ea9599335d37c1df96ee39'], u'filename': u'libtiff-3.9.4-6.el6_3.i686.rpm', u'epoch': u'0', u'version': u'3.9.4', u'release': u'6.el6_3', u'arch': u'i686'}, {u'src': None, u'name': u'libtiff', u'sum': [u'md5', u'4c0b2aa28fb14e40b1f112eaace9a6a3'], u'filename': u'libtiff-3.9.4-6.el6_3.src.rpm', u'epoch': u'0', u'version': u'3.9.4', u'release': u'6.el6_3', u'arch': u'src'}, {u'src': None, u'name': u'libtiff', u'sum': [u'md5', u'6ee12a9a7903d7111f85d3a7b1ef3da3'], u'filename': u'libtiff-3.9.4-6.el6_3.x86_64.rpm', u'epoch': u'0', u'version': u'3.9.4', u'release': u'6.el6_3', u'arch': u'x86_64'}, {u'src': None, u'name': u'libtiff-devel', u'sum': [u'md5', u'637b812d01c051c9260466be335f6693'], u'filename': u'libtiff-devel-3.9.4-6.el6_3.i686.rpm', u'epoch': u'0', u'version': u'3.9.4', u'release': u'6.el6_3', u'arch': u'i686'}, {u'src': None, u'name': u'libtiff-devel', u'sum': [u'md5', u'c42eae11affbc54480458835e0515672'], u'filename': u'libtiff-devel-3.9.4-6.el6_3.x86_64.rpm', u'epoch': u'0', u'version': u'3.9.4', u'release': u'6.el6_3', u'arch': u'x86_64'}, {u'src': None, u'name': u'libtiff-static', u'sum': [u'md5', u'5b925a09e9b5885b0caf9b81bb1a0a3c'], u'filename': u'libtiff-static-3.9.4-6.el6_3.x86_64.rpm', u'epoch': u'0', u'version': u'3.9.4', u'release': u'6.el6_3', u'arch': u'x86_64'}], u'name': u'ol6_x86_64_latest', u'short': u'ol6_x86_64_latest'}, {u'packages': [{u'src': None, u'name': u'libtiff', u'sum': [u'md5', u'aff077cbae86767af9115b7eeae25ff7'], u'filename': u'libtiff-3.8.2-15.el5_8.i386.rpm', u'epoch': u'0', u'version': u'3.8.2', u'release': u'15.el5_8', u'arch': u'i386'}, {u'src': None, u'name': u'libtiff', u'sum': [u'md5', u'1a5a21c440d2e01d97b99ec27244daa5'], u'filename': u'libtiff-3.8.2-15.el5_8.src.rpm', u'epoch': u'0', u'version': u'3.8.2', u'release': u'15.el5_8', u'arch': u'src'}, {u'src': None, u'name': u'libtiff', u'sum': [u'md5', u'57599d2c1e6760f242053277827cb38b'], u'filename': u'libtiff-3.8.2-15.el5_8.x86_64.rpm', u'epoch': u'0', u'version': u'3.8.2', u'release': u'15.el5_8', u'arch': u'x86_64'}, {u'src': None, u'name': u'libtiff-devel', u'sum': [u'md5', u'5ca17dd2bda468a36f6142ba1a5b3b04'], u'filename': u'libtiff-devel-3.8.2-15.el5_8.i386.rpm', u'epoch': u'0', u'version': u'3.8.2', u'release': u'15.el5_8', u'arch': u'i386'}, {u'src': None, u'name': u'libtiff-devel', u'sum': [u'md5', u'd353e14ea4d8cc84abd783208570ebb6'], u'filename': u'libtiff-devel-3.8.2-15.el5_8.x86_64.rpm', u'epoch': u'0', u'version': u'3.8.2', u'release': u'15.el5_8', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u"\n[2.6.18-308.11.1.el5]\n- [net] ixgbe: remove flow director stats (Andy Gospodarek) [832169 830226]\n- [net] ixgbe: fix default return value for ixgbe_cache_ring_fdir (Andy Gospodarek) [832169 830226]\n- [net] ixgbe: reverting setup redirection table for multiple packet buffers (Andy Gospodarek) [832169 830226]\n\n[2.6.18-308.10.1.el5]\n- [xen] x86_64: check address on trap handlers or guest callbacks (Paolo Bonzini) [813430 813431] {CVE-2012-0217}\n- [xen] x86_64: Do not execute sysret with a non-canonical return address (Paolo Bonzini) [813430 813431] {CVE-2012-0217}\n- [xen] x86: prevent hv boot on AMD CPUs with Erratum 121 (Laszlo Ersek) [824969 824970] {CVE-2012-2934}\n- [scsi] qla2xxx: Use ha->pdev->revision in 4Gbps MSI-X check. (Chad Dupuis) [816373 800653]\n- [fs] sunrpc: do array overrun check in svc_recv before page alloc (J. Bruce Fields) [820358 814626]\n- [fs] knfsd: fix an NFSD bug with full size non-page-aligned reads (J. Bruce Fields) [820358 814626]\n- [fs] sunrpc: fix oops due to overrunning server's page array (J. Bruce Fields) [820358 814626]\n- [fs] epoll: clear the tfile_check_list on -ELOOP (Jason Baron) [829670 817131]\n- [x86_64] sched: Avoid unnecessary overflow in sched_clock (Prarit Bhargava) [824654 818787]\n- [net] sunrpc: Don't use list_for_each_entry_safe in rpc_wake_up (Steve Dickson) [817571 809937]\n- [s390] qeth: add missing wake_up call (Hendrik Brueckner) [829059 790900]\n\n[2.6.18-308.9.1.el5]\n- [fs] jbd: clear b_modified before moving the jh to a different transaction (Josef Bacik) [827205 563247]\n", u'issued': u'2012-07-10', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELSA-2012-1061.html', u'type': u'self', u'id': None, u'title': u'ELSA-2012-1061'}, {u'href': u'http://linux.oracle.com/cve/CVE-2012-3375.html', u'type': u'cve', u'id': u'CVE-2012-3375', u'title': u'CVE-2012-3375'}], u'_content_type_id': u'erratum', u'_id': u'df78e20c-6e89-405c-89b5-9dc4e41b1582', u'from': u'el-errata@oss.oracle.com', u'severity': u'Moderate', u'title': u' kernel security and bug fix update', u'_ns': u'units_erratum', u'rights': u'Copyright 2012 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 5', u'reboot_suggested': False, u'type': u'security', u'pkglist': [{u'packages': [{u'src': None, u'name': u'kernel', u'sum': [u'md5', u'd07d355df45f0c6eb2ed01877f8b8083'], u'filename': u'kernel-2.6.18-308.11.1.el5.src.rpm', u'epoch': u'0', u'version': u'2.6.18', u'release': u'308.11.1.el5', u'arch': u'src'}, {u'src': None, u'name': u'kernel', u'sum': [u'md5', u'870f4b1074b1ff507976e5e5b522a9d7'], u'filename': u'kernel-2.6.18-308.11.1.el5.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.18', u'release': u'308.11.1.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'kernel-debug', u'sum': [u'md5', u'e3ee9c7b9a2f2a393cf61af7068309b4'], u'filename': u'kernel-debug-2.6.18-308.11.1.el5.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.18', u'release': u'308.11.1.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'kernel-debug-devel', u'sum': [u'md5', u'c84fe206bf93e632242464b8dc933041'], u'filename': u'kernel-debug-devel-2.6.18-308.11.1.el5.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.18', u'release': u'308.11.1.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'kernel-devel', u'sum': [u'md5', u'f0eb83659a27d876e80040bffb51d4f8'], u'filename': u'kernel-devel-2.6.18-308.11.1.el5.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.18', u'release': u'308.11.1.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'kernel-doc', u'sum': [u'md5', u'0fd9bfa5cb43f75595be3f7ef1bd1b14'], u'filename': u'kernel-doc-2.6.18-308.11.1.el5.noarch.rpm', u'epoch': u'0', u'version': u'2.6.18', u'release': u'308.11.1.el5', u'arch': u'noarch'}, {u'src': None, u'name': u'kernel-headers', u'sum': [u'md5', u'9518dbd0bebb88311494c142d143dd53'], u'filename': u'kernel-headers-2.6.18-308.11.1.el5.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.18', u'release': u'308.11.1.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'kernel-xen', u'sum': [u'md5', u'dc8f5142176cf95030acf424cdd0a663'], u'filename': u'kernel-xen-2.6.18-308.11.1.el5.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.18', u'release': u'308.11.1.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'kernel-xen-devel', u'sum': [u'md5', u'7377c9f9d975d74d6e97b4d27865c39a'], u'filename': u'kernel-xen-devel-2.6.18-308.11.1.el5.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.18', u'release': u'308.11.1.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'ocfs2-2.6.18-308.11.1.el5', u'sum': [u'md5', u'17221120384641ad4dcb6f92c61afb6a'], u'filename': u'ocfs2-2.6.18-308.11.1.el5-1.4.10-1.el5.src.rpm', u'epoch': u'0', u'version': u'1.4.10', u'release': u'1.el5', u'arch': u'src'}, {u'src': None, u'name': u'ocfs2-2.6.18-308.11.1.el5', u'sum': [u'md5', u'cd2853d98856a046ef506005c7697589'], u'filename': u'ocfs2-2.6.18-308.11.1.el5-1.4.10-1.el5.x86_64.rpm', u'epoch': u'0', u'version': u'1.4.10', u'release': u'1.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'ocfs2-2.6.18-308.11.1.el5debug', u'sum': [u'md5', u'318053453d360ebbc8f0136661c4173a'], u'filename': u'ocfs2-2.6.18-308.11.1.el5debug-1.4.10-1.el5.x86_64.rpm', u'epoch': u'0', u'version': u'1.4.10', u'release': u'1.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'ocfs2-2.6.18-308.11.1.el5xen', u'sum': [u'md5', u'b8feee2e6d9ebfce24cc205d060326c3'], u'filename': u'ocfs2-2.6.18-308.11.1.el5xen-1.4.10-1.el5.x86_64.rpm', u'epoch': u'0', u'version': u'1.4.10', u'release': u'1.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'oracleasm-2.6.18-308.11.1.el5', u'sum': [u'md5', u'a34f2f3ffd9631249f61460020a58c98'], u'filename': u'oracleasm-2.6.18-308.11.1.el5-2.0.5-1.el5.src.rpm', u'epoch': u'0', u'version': u'2.0.5', u'release': u'1.el5', u'arch': u'src'}, {u'src': None, u'name': u'oracleasm-2.6.18-308.11.1.el5', u'sum': [u'md5', u'b03abec7593b429fa62fc3dabdc8486c'], u'filename': u'oracleasm-2.6.18-308.11.1.el5-2.0.5-1.el5.x86_64.rpm', u'epoch': u'0', u'version': u'2.0.5', u'release': u'1.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'oracleasm-2.6.18-308.11.1.el5debug', u'sum': [u'md5', u'52a4656606417a6813e722c8c212f695'], u'filename': u'oracleasm-2.6.18-308.11.1.el5debug-2.0.5-1.el5.x86_64.rpm', u'epoch': u'0', u'version': u'2.0.5', u'release': u'1.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'oracleasm-2.6.18-308.11.1.el5xen', u'sum': [u'md5', u'916a58393482238bac2b546a6f81bc49'], u'filename': u'oracleasm-2.6.18-308.11.1.el5xen-2.0.5-1.el5.x86_64.rpm', u'epoch': u'0', u'version': u'2.0.5', u'release': u'1.el5', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u"\n[2.6.18-308.11.1.0.1.el5]\n- [net] bonding: fix carrier detect when bond is down [orabug 12377284]\n- [mm] fix hugetlb page leak (Dave McCracken) [orabug 12375075]\n- fix ia64 build error due to add-support-above-32-vcpus.patch(Zhenzhong Duan)\n- [x86] use dynamic vcpu_info remap to support more than 32 vcpus (Zhenzhong Duan)\n- [x86] Fix lvt0 reset when hvm boot up with noapic param\n- [scsi] remove printk's when doing I/O to a dead device (John Sobecki, Chris Mason)\n [orabug 12342275]\n- [char] ipmi: Fix IPMI errors due to timing problems (Joe Jin) [orabug 12561346]\n- [scsi] Fix race when removing SCSI devices (Joe Jin) [orabug 12404566]\n- [net] net: Redo the broken redhat netconsole over bonding (Tina Yang) [orabug 12740042]\n- [fs] nfs: Fix __put_nfs_open_context() NULL pointer panic (Joe Jin) [orabug 12687646]\n- [scsi] fix scsi hotplug and rescan race [orabug 10260172]\n- fix filp_close() race (Joe Jin) [orabug 10335998]\n- make xenkbd.abs_pointer=1 by default [orabug 67188919]\n- [xen] check to see if hypervisor supports memory reservation change\n (Chuck Anderson) [orabug 7556514]\n- [net] Enable entropy for bnx2,bnx2x,e1000e,igb,ixgb,ixgbe,ixgbevf (John Sobecki)\n [orabug 10315433]\n- [NET] Add xen pv netconsole support (Tina Yang) [orabug 6993043] [bz 7258]\n- [mm] shrink_zone patch (John Sobecki,Chris Mason) [orabug 6086839]\n- fix aacraid not to reset during kexec (Joe Jin) [orabug 8516042]\n- [rds] Patch rds to 1.4.2-20 (Andy Grover) [orabug 9471572, 9344105]\n RDS: Fix BUG_ONs to not fire when in a tasklet\n ipoib: Fix lockup of the tx queue\n RDS: Do not call set_page_dirty() with irqs off (Sherman Pun)\n RDS: Properly unmap when getting a remote access error (Tina Yang)\n RDS: Fix locking in rds_send_drop_to()\n- [xen] PVHVM guest with PoD crashes under memory pressure (Chuck Anderson)\n [orabug 9107465]\n+- [xen] PV guest with FC HBA hangs during shutdown (Chuck Anderson)\n [orabug 9764220]\n- Support 256GB+ memory for pv guest (Mukesh Rathor) [orabug 9450615]\n- fix overcommit memory to use percpu_counter for el5 (KOSAKI Motohiro,\n Guru Anbalagane) [orabug 6124033]\n- [ipmi] make configurable timeouts for kcs of ipmi [orabug 9752208]\n- [ib] fix memory corruption (Andy Grover) [orabug 9972346]\n\n[2.6.18-308.11.1.el5]\n- [net] ixgbe: remove flow director stats (Andy Gospodarek) [832169 830226]\n- [net] ixgbe: fix default return value for ixgbe_cache_ring_fdir (Andy Gospodarek) [832169 830226]\n- [net] ixgbe: reverting setup redirection table for multiple packet buffers (Andy Gospodarek) [832169 830226]\n\n[2.6.18-308.10.1.el5]\n- [xen] x86_64: check address on trap handlers or guest callbacks (Paolo Bonzini) [813430 813431] {CVE-2012-0217}\n- [xen] x86_64: Do not execute sysret with a non-canonical return address (Paolo Bonzini) [813430 813431] {CVE-2012-0217}\n- [xen] x86: prevent hv boot on AMD CPUs with Erratum 121 (Laszlo Ersek) [824969 824970] {CVE-2012-2934}\n- [scsi] qla2xxx: Use ha->pdev->revision in 4Gbps MSI-X check. (Chad Dupuis) [816373 800653]\n- [fs] sunrpc: do array overrun check in svc_recv before page alloc (J. Bruce Fields) [820358 814626]\n- [fs] knfsd: fix an NFSD bug with full size non-page-aligned reads (J. Bruce Fields) [820358 814626]\n- [fs] sunrpc: fix oops due to overrunning server's page array (J. Bruce Fields) [820358 814626]\n- [fs] epoll: clear the tfile_check_list on -ELOOP (Jason Baron) [829670 817131]\n- [x86_64] sched: Avoid unnecessary overflow in sched_clock (Prarit Bhargava) [824654 818787]\n- [net] sunrpc: Don't use list_for_each_entry_safe in rpc_wake_up (Steve Dickson) [817571 809937]\n- [s390] qeth: add missing wake_up call (Hendrik Brueckner) [829059 790900]\n\n[2.6.18-308.9.1.el5]\n- [fs] jbd: clear b_modified before moving the jh to a different transaction (Josef Bacik) [827205 563247]\n", u'issued': u'2012-07-10', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELSA-2012-1061-1.html', u'type': u'self', u'id': None, u'title': u'ELSA-2012-1061-1'}, {u'href': u'http://linux.oracle.com/cve/CVE-2012-3375.html', u'type': u'cve', u'id': u'CVE-2012-3375', u'title': u'CVE-2012-3375'}], u'_content_type_id': u'erratum', u'_id': u'5f794f11-0545-49b4-b970-dbf49e4f54e6', u'from': u'el-errata@oss.oracle.com', u'severity': u'Moderate', u'title': u' kernel security and bug fix update', u'_ns': u'units_erratum', u'rights': u'Copyright 2012 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 5', u'reboot_suggested': False, u'type': u'security', u'pkglist': [{u'packages': [{u'src': None, u'name': u'kernel', u'sum': [u'md5', u'e2efb80b442d025f0c44828b26ac683a'], u'filename': u'kernel-2.6.18-308.11.1.0.1.el5.src.rpm', u'epoch': u'0', u'version': u'2.6.18', u'release': u'308.11.1.0.1.el5', u'arch': u'src'}, {u'src': None, u'name': u'kernel', u'sum': [u'md5', u'419007e8679d799c0e8fda1fb7ab9150'], u'filename': u'kernel-2.6.18-308.11.1.0.1.el5.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.18', u'release': u'308.11.1.0.1.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'kernel-debug', u'sum': [u'md5', u'04423b34812514ddfacae8c017f1256a'], u'filename': u'kernel-debug-2.6.18-308.11.1.0.1.el5.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.18', u'release': u'308.11.1.0.1.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'kernel-debug-devel', u'sum': [u'md5', u'f85e796ccc48905ca69ada9c69c1fbb6'], u'filename': u'kernel-debug-devel-2.6.18-308.11.1.0.1.el5.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.18', u'release': u'308.11.1.0.1.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'kernel-devel', u'sum': [u'md5', u'9340e908fe998991d6f8abbe4539bd58'], u'filename': u'kernel-devel-2.6.18-308.11.1.0.1.el5.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.18', u'release': u'308.11.1.0.1.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'kernel-doc', u'sum': [u'md5', u'f77da9d566815684c6e9e224fd41a41c'], u'filename': u'kernel-doc-2.6.18-308.11.1.0.1.el5.noarch.rpm', u'epoch': u'0', u'version': u'2.6.18', u'release': u'308.11.1.0.1.el5', u'arch': u'noarch'}, {u'src': None, u'name': u'kernel-headers', u'sum': [u'md5', u'08e34b848a8121d3893c5fbb90e8742a'], u'filename': u'kernel-headers-2.6.18-308.11.1.0.1.el5.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.18', u'release': u'308.11.1.0.1.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'kernel-xen', u'sum': [u'md5', u'a50b39551d1222529375ca33e8d02430'], u'filename': u'kernel-xen-2.6.18-308.11.1.0.1.el5.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.18', u'release': u'308.11.1.0.1.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'kernel-xen-devel', u'sum': [u'md5', u'efbd718c37c0c1adb1cc0ab5ce14d9f4'], u'filename': u'kernel-xen-devel-2.6.18-308.11.1.0.1.el5.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.18', u'release': u'308.11.1.0.1.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'ocfs2-2.6.18-308.11.1.0.1.el5', u'sum': [u'md5', u'62855952fc00f2d763740d3d377d16de'], u'filename': u'ocfs2-2.6.18-308.11.1.0.1.el5-1.4.10-1.el5.src.rpm', u'epoch': u'0', u'version': u'1.4.10', u'release': u'1.el5', u'arch': u'src'}, {u'src': None, u'name': u'ocfs2-2.6.18-308.11.1.0.1.el5', u'sum': [u'md5', u'3f473b9c33f23dd481467f1d602ec4af'], u'filename': u'ocfs2-2.6.18-308.11.1.0.1.el5-1.4.10-1.el5.x86_64.rpm', u'epoch': u'0', u'version': u'1.4.10', u'release': u'1.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'ocfs2-2.6.18-308.11.1.0.1.el5debug', u'sum': [u'md5', u'79feea2062eb2615bdcdd68d2f704f1c'], u'filename': u'ocfs2-2.6.18-308.11.1.0.1.el5debug-1.4.10-1.el5.x86_64.rpm', u'epoch': u'0', u'version': u'1.4.10', u'release': u'1.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'ocfs2-2.6.18-308.11.1.0.1.el5xen', u'sum': [u'md5', u'04cf229072e39161f2c6811974db1096'], u'filename': u'ocfs2-2.6.18-308.11.1.0.1.el5xen-1.4.10-1.el5.x86_64.rpm', u'epoch': u'0', u'version': u'1.4.10', u'release': u'1.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'oracleasm-2.6.18-308.11.1.0.1.el5', u'sum': [u'md5', u'0c9108d4cfdff6c63c9a2798b62a33ed'], u'filename': u'oracleasm-2.6.18-308.11.1.0.1.el5-2.0.5-1.el5.src.rpm', u'epoch': u'0', u'version': u'2.0.5', u'release': u'1.el5', u'arch': u'src'}, {u'src': None, u'name': u'oracleasm-2.6.18-308.11.1.0.1.el5', u'sum': [u'md5', u'943897471bdcf742124a847bc05d002b'], u'filename': u'oracleasm-2.6.18-308.11.1.0.1.el5-2.0.5-1.el5.x86_64.rpm', u'epoch': u'0', u'version': u'2.0.5', u'release': u'1.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'oracleasm-2.6.18-308.11.1.0.1.el5debug', u'sum': [u'md5', u'7dbf78c7453b79dd245389cde70eab3a'], u'filename': u'oracleasm-2.6.18-308.11.1.0.1.el5debug-2.0.5-1.el5.x86_64.rpm', u'epoch': u'0', u'version': u'2.0.5', u'release': u'1.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'oracleasm-2.6.18-308.11.1.0.1.el5xen', u'sum': [u'md5', u'd96ebbf2d59dc423a057d1a1a0322b4d'], u'filename': u'oracleasm-2.6.18-308.11.1.0.1.el5xen-2.0.5-1.el5.x86_64.rpm', u'epoch': u'0', u'version': u'2.0.5', u'release': u'1.el5', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u'[1.7.4p5-12]\n- added patch for CVE-2012-2337\n Resolves: rhbz#829756', u'issued': u'2012-07-16', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELSA-2012-1081.html', u'type': u'self', u'id': None, u'title': u'ELSA-2012-1081'}, {u'href': u'http://linux.oracle.com/cve/CVE-2012-2337.html', u'type': u'cve', u'id': u'CVE-2012-2337', u'title': u'CVE-2012-2337'}], u'_content_type_id': u'erratum', u'_id': u'64f4f757-83cf-4ed9-89d3-b4dd55a248b5', u'from': u'el-errata@oss.oracle.com', u'severity': u'Moderate', u'title': u' sudo security update', u'_ns': u'units_erratum', u'rights': u'Copyright 2012 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 6', u'reboot_suggested': False, u'type': u'security', u'pkglist': [{u'packages': [{u'src': None, u'name': u'sudo', u'sum': [u'md5', u'984f0934e41f07f0d336cd067c154a6d'], u'filename': u'sudo-1.7.4p5-12.el6_3.src.rpm', u'epoch': u'0', u'version': u'1.7.4p5', u'release': u'12.el6_3', u'arch': u'src'}, {u'src': None, u'name': u'sudo', u'sum': [u'md5', u'a25e5787a688ab4ff11410f4cff66498'], u'filename': u'sudo-1.7.4p5-12.el6_3.x86_64.rpm', u'epoch': u'0', u'version': u'1.7.4p5', u'release': u'12.el6_3', u'arch': u'x86_64'}], u'name': u'ol6_x86_64_latest', u'short': u'ol6_x86_64_latest'}, {u'packages': [{u'src': None, u'name': u'sudo', u'sum': [u'md5', u'b331c58a286dd83eb40dbf80ae39f7fc'], u'filename': u'sudo-1.7.2p1-14.el5_8.src.rpm', u'epoch': u'0', u'version': u'1.7.2p1', u'release': u'14.el5_8', u'arch': u'src'}, {u'src': None, u'name': u'sudo', u'sum': [u'md5', u'7620ca286a4cd3f03296a5d592868b46'], u'filename': u'sudo-1.7.2p1-14.el5_8.x86_64.rpm', u'epoch': u'0', u'version': u'1.7.2p1', u'release': u'14.el5_8', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u'firefox\n[10.0.6-1.0.1.el6_3]\n- Replace firefox-redhat-default-prefs.js with firefox-oracle-default-prefs.js\n\n[10.0.6-1]\n- Update to 10.0.6 ESR\n\n[10.0.5-3]\n- Enabled WebM\n\n[10.0.5-2]\n- Added fix for mozbz#703633, rhbz#818341\n\nxulrunner\n[10.0.6-1.0.1.el6_3]\n- Replace xulrunner-redhat-default-prefs.js with xulrunner-oracle-default-prefs.js\n\n[10.0.6-1]\n- Update to 10.0.6 ESR\n\n[10.0.5-3]\n- Added fix for rhbz#808136 (mozbz#762301)\n\n[10.0.5-2]\n- Enabled WebM (rhbz#798880)', u'issued': u'2012-07-17', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELSA-2012-1088.html', u'type': u'self', u'id': None, u'title': u'ELSA-2012-1088'}, {u'href': u'http://linux.oracle.com/cve/CVE-2012-1948.html', u'type': u'cve', u'id': u'CVE-2012-1948', u'title': u'CVE-2012-1948'}, {u'href': u'http://linux.oracle.com/cve/CVE-2012-1950.html', u'type': u'cve', u'id': u'CVE-2012-1950', u'title': u'CVE-2012-1950'}, {u'href': u'http://linux.oracle.com/cve/CVE-2012-1951.html', u'type': u'cve', u'id': u'CVE-2012-1951', u'title': u'CVE-2012-1951'}, {u'href': u'http://linux.oracle.com/cve/CVE-2012-1952.html', u'type': u'cve', u'id': u'CVE-2012-1952', u'title': u'CVE-2012-1952'}, {u'href': u'http://linux.oracle.com/cve/CVE-2012-1953.html', u'type': u'cve', u'id': u'CVE-2012-1953', u'title': u'CVE-2012-1953'}, {u'href': u'http://linux.oracle.com/cve/CVE-2012-1954.html', u'type': u'cve', u'id': u'CVE-2012-1954', u'title': u'CVE-2012-1954'}, {u'href': u'http://linux.oracle.com/cve/CVE-2012-1955.html', u'type': u'cve', u'id': u'CVE-2012-1955', u'title': u'CVE-2012-1955'}, {u'href': u'http://linux.oracle.com/cve/CVE-2012-1957.html', u'type': u'cve', u'id': u'CVE-2012-1957', u'title': u'CVE-2012-1957'}, {u'href': u'http://linux.oracle.com/cve/CVE-2012-1958.html', u'type': u'cve', u'id': u'CVE-2012-1958', u'title': u'CVE-2012-1958'}, {u'href': u'http://linux.oracle.com/cve/CVE-2012-1959.html', u'type': u'cve', u'id': u'CVE-2012-1959', u'title': u'CVE-2012-1959'}, {u'href': u'http://linux.oracle.com/cve/CVE-2012-1961.html', u'type': u'cve', u'id': u'CVE-2012-1961', u'title': u'CVE-2012-1961'}, {u'href': u'http://linux.oracle.com/cve/CVE-2012-1962.html', u'type': u'cve', u'id': u'CVE-2012-1962', u'title': u'CVE-2012-1962'}, {u'href': u'http://linux.oracle.com/cve/CVE-2012-1963.html', u'type': u'cve', u'id': u'CVE-2012-1963', u'title': u'CVE-2012-1963'}, {u'href': u'http://linux.oracle.com/cve/CVE-2012-1964.html', u'type': u'cve', u'id': u'CVE-2012-1964', u'title': u'CVE-2012-1964'}, {u'href': u'http://linux.oracle.com/cve/CVE-2012-1965.html', u'type': u'cve', u'id': u'CVE-2012-1965', u'title': u'CVE-2012-1965'}, {u'href': u'http://linux.oracle.com/cve/CVE-2012-1966.html', u'type': u'cve', u'id': u'CVE-2012-1966', u'title': u'CVE-2012-1966'}, {u'href': u'http://linux.oracle.com/cve/CVE-2012-1967.html', u'type': u'cve', u'id': u'CVE-2012-1967', u'title': u'CVE-2012-1967'}], u'_content_type_id': u'erratum', u'_id': u'010be7d2-13f3-4203-835f-e23b424061bb', u'from': u'el-errata@oss.oracle.com', u'severity': u'Critical', u'title': u' firefox security update', u'_ns': u'units_erratum', u'rights': u'Copyright 2012 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 6', u'reboot_suggested': False, u'type': u'security', u'pkglist': [{u'packages': [{u'src': None, u'name': u'firefox', u'sum': [u'md5', u'ff25f792c06b29ff39eaad68efa063bd'], u'filename': u'firefox-10.0.6-1.0.1.el6_3.i686.rpm', u'epoch': u'0', u'version': u'10.0.6', u'release': u'1.0.1.el6_3', u'arch': u'i686'}, {u'src': None, u'name': u'firefox', u'sum': [u'md5', u'1b5f74a4ba7735a27f96972b1f63d0dc'], u'filename': u'firefox-10.0.6-1.0.1.el6_3.src.rpm', u'epoch': u'0', u'version': u'10.0.6', u'release': u'1.0.1.el6_3', u'arch': u'src'}, {u'src': None, u'name': u'firefox', u'sum': [u'md5', u'348f63df56dd35b85a9513ca7b0ec3a7'], u'filename': u'firefox-10.0.6-1.0.1.el6_3.x86_64.rpm', u'epoch': u'0', u'version': u'10.0.6', u'release': u'1.0.1.el6_3', u'arch': u'x86_64'}, {u'src': None, u'name': u'xulrunner', u'sum': [u'md5', u'aed948fbb110fca5101b43fabb640fd7'], u'filename': u'xulrunner-10.0.6-1.0.1.el6_3.i686.rpm', u'epoch': u'0', u'version': u'10.0.6', u'release': u'1.0.1.el6_3', u'arch': u'i686'}, {u'src': None, u'name': u'xulrunner', u'sum': [u'md5', u'0690570165463bb9a32a980ceead5bb7'], u'filename': u'xulrunner-10.0.6-1.0.1.el6_3.src.rpm', u'epoch': u'0', u'version': u'10.0.6', u'release': u'1.0.1.el6_3', u'arch': u'src'}, {u'src': None, u'name': u'xulrunner', u'sum': [u'md5', u'1323beda29511775891e6d0e240e59de'], u'filename': u'xulrunner-10.0.6-1.0.1.el6_3.x86_64.rpm', u'epoch': u'0', u'version': u'10.0.6', u'release': u'1.0.1.el6_3', u'arch': u'x86_64'}, {u'src': None, u'name': u'xulrunner-devel', u'sum': [u'md5', u'a7e772a2cad4adfb56903f53460f2760'], u'filename': u'xulrunner-devel-10.0.6-1.0.1.el6_3.i686.rpm', u'epoch': u'0', u'version': u'10.0.6', u'release': u'1.0.1.el6_3', u'arch': u'i686'}, {u'src': None, u'name': u'xulrunner-devel', u'sum': [u'md5', u'e5b483d1506df0ee55c9fab960abcb8b'], u'filename': u'xulrunner-devel-10.0.6-1.0.1.el6_3.x86_64.rpm', u'epoch': u'0', u'version': u'10.0.6', u'release': u'1.0.1.el6_3', u'arch': u'x86_64'}], u'name': u'ol6_x86_64_latest', u'short': u'ol6_x86_64_latest'}, {u'packages': [{u'src': None, u'name': u'firefox', u'sum': [u'md5', u'aed82f05ea941d95eef55e03374ca20c'], u'filename': u'firefox-10.0.6-1.0.1.el5_8.i386.rpm', u'epoch': u'0', u'version': u'10.0.6', u'release': u'1.0.1.el5_8', u'arch': u'i386'}, {u'src': None, u'name': u'firefox', u'sum': [u'md5', u'4b8ca5b1870c989545ef04d9c86685b4'], u'filename': u'firefox-10.0.6-1.0.1.el5_8.src.rpm', u'epoch': u'0', u'version': u'10.0.6', u'release': u'1.0.1.el5_8', u'arch': u'src'}, {u'src': None, u'name': u'firefox', u'sum': [u'md5', u'b52c9ce6341a263d64294e4a2d0a52b6'], u'filename': u'firefox-10.0.6-1.0.1.el5_8.x86_64.rpm', u'epoch': u'0', u'version': u'10.0.6', u'release': u'1.0.1.el5_8', u'arch': u'x86_64'}, {u'src': None, u'name': u'xulrunner', u'sum': [u'md5', u'da9188fa41f6424a5876b5a111d0f3e6'], u'filename': u'xulrunner-10.0.6-2.0.1.el5_8.i386.rpm', u'epoch': u'0', u'version': u'10.0.6', u'release': u'2.0.1.el5_8', u'arch': u'i386'}, {u'src': None, u'name': u'xulrunner', u'sum': [u'md5', u'17e3ce8b0c5982cc566ddc00a6107c45'], u'filename': u'xulrunner-10.0.6-2.0.1.el5_8.src.rpm', u'epoch': u'0', u'version': u'10.0.6', u'release': u'2.0.1.el5_8', u'arch': u'src'}, {u'src': None, u'name': u'xulrunner', u'sum': [u'md5', u'7bc2f49f1712fdfd6625880af3dcbd39'], u'filename': u'xulrunner-10.0.6-2.0.1.el5_8.x86_64.rpm', u'epoch': u'0', u'version': u'10.0.6', u'release': u'2.0.1.el5_8', u'arch': u'x86_64'}, {u'src': None, u'name': u'xulrunner-devel', u'sum': [u'md5', u'12a19880ec3d7f846022fb0d031e5847'], u'filename': u'xulrunner-devel-10.0.6-2.0.1.el5_8.i386.rpm', u'epoch': u'0', u'version': u'10.0.6', u'release': u'2.0.1.el5_8', u'arch': u'i386'}, {u'src': None, u'name': u'xulrunner-devel', u'sum': [u'md5', u'9f16fd9b388d40a2aadb6d550746a48a'], u'filename': u'xulrunner-devel-10.0.6-2.0.1.el5_8.x86_64.rpm', u'epoch': u'0', u'version': u'10.0.6', u'release': u'2.0.1.el5_8', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u'nspr\n[4.9.1-4]\n- Resolves: rhbz#834219 - Fix postinstall scriptlet failures\n- Fix %post and %postun lines per packaging guidelines\n- Updated License: to MPLv2.0 per upstream\n\n[4.9.1-3]\n- Resolves: rhbz#834219 - Ensure nspr-config.in changes get applied\n\n[4.9.1-2]\n- Resolves: rhbz#834219 - restore top section of nspr-config-pc.patch\n- Needed to prevent multilib regressions\n\nnss\n[3.13.5-4.0.1.el5_8 ]\n- Update clean.gif in the tarball\n\n[3.13.5-4]\n- Related: rhbz#834219 - Fix ia64 / i386 multilib nss install failure\n- Remove no longer needed %pre and %preun scriplets meant for nss updates from RHEL-5.0\n\n[3.13.5-3]\n- Resolves: rhbz#834219 - Fix the changes to the %post line\n- Having multiple commands requires that /sbin/lconfig be the beginning of the scriptlet\n\n[3.13.5-2]\n- Resolves: rhbz#834219 - Fix multilib and scriptlet problems\n- Fix %post and %postun lines per packaging guildelines\n- Add %{?_isa} to tools Requires: per packaging guidelines\n- Fix explicit-lib-dependency zlib error reported by rpmlint\n\n[3.13.5-1]\n- Resolves: rhbz#834219 - Update RHEL 5.x to NSS 3.13.5 and NSPR 4.9.1 for Mozilla 10.0.6', u'issued': u'2012-07-17', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELSA-2012-1090.html', u'type': u'self', u'id': None, u'title': u'ELSA-2012-1090'}, {u'href': u'http://linux.oracle.com/cve/CVE-2012-0441.html', u'type': u'cve', u'id': u'CVE-2012-0441', u'title': u'CVE-2012-0441'}], u'_content_type_id': u'erratum', u'_id': u'4469d441-b3cf-462a-a5e5-7465eb79493a', u'from': u'el-errata@oss.oracle.com', u'severity': u'Moderate', u'title': u' nss and nspr security, bug fix, and enhancement update', u'_ns': u'units_erratum', u'rights': u'Copyright 2012 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 5', u'reboot_suggested': False, u'type': u'security', u'pkglist': [{u'packages': [{u'src': None, u'name': u'nspr', u'sum': [u'md5', u'12b79349842996367c06ef1f61a7fee4'], u'filename': u'nspr-4.9.1-4.el5_8.i386.rpm', u'epoch': u'0', u'version': u'4.9.1', u'release': u'4.el5_8', u'arch': u'i386'}, {u'src': None, u'name': u'nspr', u'sum': [u'md5', u'976f5a0b8ed9ff64d45e1b2bfa3b1baf'], u'filename': u'nspr-4.9.1-4.el5_8.src.rpm', u'epoch': u'0', u'version': u'4.9.1', u'release': u'4.el5_8', u'arch': u'src'}, {u'src': None, u'name': u'nspr', u'sum': [u'md5', u'67ff80429fc10b04ba98f97e4d6db17f'], u'filename': u'nspr-4.9.1-4.el5_8.x86_64.rpm', u'epoch': u'0', u'version': u'4.9.1', u'release': u'4.el5_8', u'arch': u'x86_64'}, {u'src': None, u'name': u'nspr-devel', u'sum': [u'md5', u'86e1f9f9a20d0ac4fee34d5fe97e523c'], u'filename': u'nspr-devel-4.9.1-4.el5_8.i386.rpm', u'epoch': u'0', u'version': u'4.9.1', u'release': u'4.el5_8', u'arch': u'i386'}, {u'src': None, u'name': u'nspr-devel', u'sum': [u'md5', u'1b54791ec188e76cdf17c8e9bc62559b'], u'filename': u'nspr-devel-4.9.1-4.el5_8.x86_64.rpm', u'epoch': u'0', u'version': u'4.9.1', u'release': u'4.el5_8', u'arch': u'x86_64'}, {u'src': None, u'name': u'nss', u'sum': [u'md5', u'9ffb52cea1d2256681822fd03d86ac66'], u'filename': u'nss-3.13.5-4.0.1.el5_8.i386.rpm', u'epoch': u'0', u'version': u'3.13.5', u'release': u'4.0.1.el5_8', u'arch': u'i386'}, {u'src': None, u'name': u'nss', u'sum': [u'md5', u'36fef46518bf88957f2ec14f3dcf7d21'], u'filename': u'nss-3.13.5-4.0.1.el5_8.src.rpm', u'epoch': u'0', u'version': u'3.13.5', u'release': u'4.0.1.el5_8', u'arch': u'src'}, {u'src': None, u'name': u'nss', u'sum': [u'md5', u'eed8fe5e5aae7fa76f1f35c2d7b15b48'], u'filename': u'nss-3.13.5-4.0.1.el5_8.x86_64.rpm', u'epoch': u'0', u'version': u'3.13.5', u'release': u'4.0.1.el5_8', u'arch': u'x86_64'}, {u'src': None, u'name': u'nss-devel', u'sum': [u'md5', u'dbc80605eb93dcf6df10a79bafd714e1'], u'filename': u'nss-devel-3.13.5-4.0.1.el5_8.i386.rpm', u'epoch': u'0', u'version': u'3.13.5', u'release': u'4.0.1.el5_8', u'arch': u'i386'}, {u'src': None, u'name': u'nss-devel', u'sum': [u'md5', u'49df2fa58ccc95289b38033b2eba9869'], u'filename': u'nss-devel-3.13.5-4.0.1.el5_8.x86_64.rpm', u'epoch': u'0', u'version': u'3.13.5', u'release': u'4.0.1.el5_8', u'arch': u'x86_64'}, {u'src': None, u'name': u'nss-pkcs11-devel', u'sum': [u'md5', u'230a43636f7211a5c572837071b3bf5e'], u'filename': u'nss-pkcs11-devel-3.13.5-4.0.1.el5_8.i386.rpm', u'epoch': u'0', u'version': u'3.13.5', u'release': u'4.0.1.el5_8', u'arch': u'i386'}, {u'src': None, u'name': u'nss-pkcs11-devel', u'sum': [u'md5', u'f639d4cc52ef703fee838e93b3ab9b6a'], u'filename': u'nss-pkcs11-devel-3.13.5-4.0.1.el5_8.x86_64.rpm', u'epoch': u'0', u'version': u'3.13.5', u'release': u'4.0.1.el5_8', u'arch': u'x86_64'}, {u'src': None, u'name': u'nss-tools', u'sum': [u'md5', u'0e8e2f44154a8b5107fe92ade8ce7c7e'], u'filename': u'nss-tools-3.13.5-4.0.1.el5_8.x86_64.rpm', u'epoch': u'0', u'version': u'3.13.5', u'release': u'4.0.1.el5_8', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u'[2.5-81.el5_8.4]\n- Fix iconv() segfault if the invalid multibyte character 0xffff is input when converting from IBM930 (#837896)\n\n[2.5-81.el5_8.3]\n- Fix unbound alloca in vfprintf (#833720)', u'issued': u'2012-07-18', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELSA-2012-1097.html', u'type': u'self', u'id': None, u'title': u'ELSA-2012-1097'}, {u'href': u'http://linux.oracle.com/cve/CVE-2012-3406.html', u'type': u'cve', u'id': u'CVE-2012-3406', u'title': u'CVE-2012-3406'}], u'_content_type_id': u'erratum', u'_id': u'c8dde20f-d920-4938-938d-016bf306eb7d', u'from': u'el-errata@oss.oracle.com', u'severity': u'Moderate', u'title': u' glibc security and bug fix update', u'_ns': u'units_erratum', u'rights': u'Copyright 2012 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 5', u'reboot_suggested': False, u'type': u'security', u'pkglist': [{u'packages': [{u'src': None, u'name': u'glibc', u'sum': [u'md5', u'dd30b0c898d5b1787836961201c5c036'], u'filename': u'glibc-2.5-81.el5_8.4.src.rpm', u'epoch': u'0', u'version': u'2.5', u'release': u'81.el5_8.4', u'arch': u'src'}, {u'src': None, u'name': u'glibc', u'sum': [u'md5', u'8d9f8449c6a632c1dd427e53decdca5e'], u'filename': u'glibc-2.5-81.el5_8.4.i686.rpm', u'epoch': u'0', u'version': u'2.5', u'release': u'81.el5_8.4', u'arch': u'i686'}, {u'src': None, u'name': u'glibc', u'sum': [u'md5', u'8abc2f56a365aa03e908e2cb2e86e95f'], u'filename': u'glibc-2.5-81.el5_8.4.x86_64.rpm', u'epoch': u'0', u'version': u'2.5', u'release': u'81.el5_8.4', u'arch': u'x86_64'}, {u'src': None, u'name': u'glibc-common', u'sum': [u'md5', u'2e80ea84cb3bb22799ddd9f4f6a3871b'], u'filename': u'glibc-common-2.5-81.el5_8.4.x86_64.rpm', u'epoch': u'0', u'version': u'2.5', u'release': u'81.el5_8.4', u'arch': u'x86_64'}, {u'src': None, u'name': u'glibc-devel', u'sum': [u'md5', u'a27e83c675bae77d7bdd6e6709121550'], u'filename': u'glibc-devel-2.5-81.el5_8.4.i386.rpm', u'epoch': u'0', u'version': u'2.5', u'release': u'81.el5_8.4', u'arch': u'i386'}, {u'src': None, u'name': u'glibc-devel', u'sum': [u'md5', u'2490a9a7ffb85c0f9cc6d3b958de40eb'], u'filename': u'glibc-devel-2.5-81.el5_8.4.x86_64.rpm', u'epoch': u'0', u'version': u'2.5', u'release': u'81.el5_8.4', u'arch': u'x86_64'}, {u'src': None, u'name': u'glibc-headers', u'sum': [u'md5', u'88831064ef3f863f1292c7ec485f92b1'], u'filename': u'glibc-headers-2.5-81.el5_8.4.x86_64.rpm', u'epoch': u'0', u'version': u'2.5', u'release': u'81.el5_8.4', u'arch': u'x86_64'}, {u'src': None, u'name': u'glibc-utils', u'sum': [u'md5', u'6b16dd2433c047d94694d8b21cc8cb44'], u'filename': u'glibc-utils-2.5-81.el5_8.4.x86_64.rpm', u'epoch': u'0', u'version': u'2.5', u'release': u'81.el5_8.4', u'arch': u'x86_64'}, {u'src': None, u'name': u'nscd', u'sum': [u'md5', u'f3e63729b5be21097f491bf99eda7037'], u'filename': u'nscd-2.5-81.el5_8.4.x86_64.rpm', u'epoch': u'0', u'version': u'2.5', u'release': u'81.el5_8.4', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u'[2.15.1-4]\n- Resolves: rhbz#841131 (CVE-2012-1151)', u'issued': u'2012-07-25', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELSA-2012-1116.html', u'type': u'self', u'id': None, u'title': u'ELSA-2012-1116'}, {u'href': u'http://linux.oracle.com/cve/CVE-2012-1151.html', u'type': u'cve', u'id': u'CVE-2012-1151', u'title': u'CVE-2012-1151'}], u'_content_type_id': u'erratum', u'_id': u'ab2131fd-9618-44b0-b6a6-6ad474e55f99', u'from': u'el-errata@oss.oracle.com', u'severity': u'Moderate', u'title': u' perl-DBD-Pg security update', u'_ns': u'units_erratum', u'rights': u'Copyright 2012 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 6', u'reboot_suggested': False, u'type': u'security', u'pkglist': [{u'packages': [{u'src': None, u'name': u'perl-DBD-Pg', u'sum': [u'md5', u'e91ee743de863a4e6fca79ff87bea0c1'], u'filename': u'perl-DBD-Pg-2.15.1-4.el6_3.src.rpm', u'epoch': u'0', u'version': u'2.15.1', u'release': u'4.el6_3', u'arch': u'src'}, {u'src': None, u'name': u'perl-DBD-Pg', u'sum': [u'md5', u'dbe27ec96486821e22ac56b4728e924a'], u'filename': u'perl-DBD-Pg-2.15.1-4.el6_3.x86_64.rpm', u'epoch': u'0', u'version': u'2.15.1', u'release': u'4.el6_3', u'arch': u'x86_64'}], u'name': u'ol6_x86_64_latest', u'short': u'ol6_x86_64_latest'}, {u'packages': [{u'src': None, u'name': u'perl-DBD-Pg', u'sum': [u'md5', u'6a00c0e81962f23084f3d1d86c27e972'], u'filename': u'perl-DBD-Pg-1.49-4.el5_8.src.rpm', u'epoch': u'0', u'version': u'1.49', u'release': u'4.el5_8', u'arch': u'src'}, {u'src': None, u'name': u'perl-DBD-Pg', u'sum': [u'md5', u'7cd2a31345badc9e7d030e341aab9917'], u'filename': u'perl-DBD-Pg-1.49-4.el5_8.x86_64.rpm', u'epoch': u'0', u'version': u'1.49', u'release': u'4.el5_8', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u'[32:9.8.2-0.10.rc1.2]\n- fix CVE-2012-3817', u'issued': u'2012-07-30', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELSA-2012-1123.html', u'type': u'self', u'id': None, u'title': u'ELSA-2012-1123'}, {u'href': u'http://linux.oracle.com/cve/CVE-2012-3817.html', u'type': u'cve', u'id': u'CVE-2012-3817', u'title': u'CVE-2012-3817'}], u'_content_type_id': u'erratum', u'_id': u'66664892-4c76-4d31-8578-ee50359d9bde', u'from': u'el-errata@oss.oracle.com', u'severity': u'Important', u'title': u' bind security update', u'_ns': u'units_erratum', u'rights': u'Copyright 2012 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 6', u'reboot_suggested': False, u'type': u'security', u'pkglist': [{u'packages': [{u'src': None, u'name': u'bind', u'sum': [u'md5', u'db74762d957f1e8eddf824abbfe458c4'], u'filename': u'bind-9.8.2-0.10.rc1.el6_3.2.src.rpm', u'epoch': u'32', u'version': u'9.8.2', u'release': u'0.10.rc1.el6_3.2', u'arch': u'src'}, {u'src': None, u'name': u'bind', u'sum': [u'md5', u'41c244c1c5d9beb71ecd524f1382a015'], u'filename': u'bind-9.8.2-0.10.rc1.el6_3.2.x86_64.rpm', u'epoch': u'32', u'version': u'9.8.2', u'release': u'0.10.rc1.el6_3.2', u'arch': u'x86_64'}, {u'src': None, u'name': u'bind-chroot', u'sum': [u'md5', u'996873d50dc1b20143a3c62c6e0c304d'], u'filename': u'bind-chroot-9.8.2-0.10.rc1.el6_3.2.x86_64.rpm', u'epoch': u'32', u'version': u'9.8.2', u'release': u'0.10.rc1.el6_3.2', u'arch': u'x86_64'}, {u'src': None, u'name': u'bind-devel', u'sum': [u'md5', u'af54ebea78fac540395e8a42fc10f483'], u'filename': u'bind-devel-9.8.2-0.10.rc1.el6_3.2.i686.rpm', u'epoch': u'32', u'version': u'9.8.2', u'release': u'0.10.rc1.el6_3.2', u'arch': u'i686'}, {u'src': None, u'name': u'bind-devel', u'sum': [u'md5', u'bb34580d3eecb0e4e3311cffa4d45c9b'], u'filename': u'bind-devel-9.8.2-0.10.rc1.el6_3.2.x86_64.rpm', u'epoch': u'32', u'version': u'9.8.2', u'release': u'0.10.rc1.el6_3.2', u'arch': u'x86_64'}, {u'src': None, u'name': u'bind-libs', u'sum': [u'md5', u'68bf4bc03abd1d55560440cde57fc72c'], u'filename': u'bind-libs-9.8.2-0.10.rc1.el6_3.2.i686.rpm', u'epoch': u'32', u'version': u'9.8.2', u'release': u'0.10.rc1.el6_3.2', u'arch': u'i686'}, {u'src': None, u'name': u'bind-libs', u'sum': [u'md5', u'5ed525a5d2f97ba1c9c8c6e38ef8f958'], u'filename': u'bind-libs-9.8.2-0.10.rc1.el6_3.2.x86_64.rpm', u'epoch': u'32', u'version': u'9.8.2', u'release': u'0.10.rc1.el6_3.2', u'arch': u'x86_64'}, {u'src': None, u'name': u'bind-sdb', u'sum': [u'md5', u'dc51b1f916508671c4e07115cf9d8d51'], u'filename': u'bind-sdb-9.8.2-0.10.rc1.el6_3.2.x86_64.rpm', u'epoch': u'32', u'version': u'9.8.2', u'release': u'0.10.rc1.el6_3.2', u'arch': u'x86_64'}, {u'src': None, u'name': u'bind-utils', u'sum': [u'md5', u'a1c126b1750f950c9a87e05e71fce46a'], u'filename': u'bind-utils-9.8.2-0.10.rc1.el6_3.2.x86_64.rpm', u'epoch': u'32', u'version': u'9.8.2', u'release': u'0.10.rc1.el6_3.2', u'arch': u'x86_64'}], u'name': u'ol6_x86_64_latest', u'short': u'ol6_x86_64_latest'}, {u'packages': [{u'src': None, u'name': u'bind', u'sum': [u'md5', u'29768a7b34c4c5763a442dbfc7443ae1'], u'filename': u'bind-9.3.6-20.P1.el5_8.2.src.rpm', u'epoch': u'30', u'version': u'9.3.6', u'release': u'20.P1.el5_8.2', u'arch': u'src'}, {u'src': None, u'name': u'bind', u'sum': [u'md5', u'a55278fd9a849fed910e1ee35467e7f5'], u'filename': u'bind-9.3.6-20.P1.el5_8.2.x86_64.rpm', u'epoch': u'30', u'version': u'9.3.6', u'release': u'20.P1.el5_8.2', u'arch': u'x86_64'}, {u'src': None, u'name': u'bind-chroot', u'sum': [u'md5', u'75c7c76ecc892401112517e4ab6f5815'], u'filename': u'bind-chroot-9.3.6-20.P1.el5_8.2.x86_64.rpm', u'epoch': u'30', u'version': u'9.3.6', u'release': u'20.P1.el5_8.2', u'arch': u'x86_64'}, {u'src': None, u'name': u'bind-devel', u'sum': [u'md5', u'aed0ac4638a87af8099a1f4fe28f74a8'], u'filename': u'bind-devel-9.3.6-20.P1.el5_8.2.i386.rpm', u'epoch': u'30', u'version': u'9.3.6', u'release': u'20.P1.el5_8.2', u'arch': u'i386'}, {u'src': None, u'name': u'bind-devel', u'sum': [u'md5', u'fd33add249e1a53eae7faebee89d3c33'], u'filename': u'bind-devel-9.3.6-20.P1.el5_8.2.x86_64.rpm', u'epoch': u'30', u'version': u'9.3.6', u'release': u'20.P1.el5_8.2', u'arch': u'x86_64'}, {u'src': None, u'name': u'bind-libbind-devel', u'sum': [u'md5', u'de3a3785e8698f5d2e979715fb34636b'], u'filename': u'bind-libbind-devel-9.3.6-20.P1.el5_8.2.i386.rpm', u'epoch': u'30', u'version': u'9.3.6', u'release': u'20.P1.el5_8.2', u'arch': u'i386'}, {u'src': None, u'name': u'bind-libbind-devel', u'sum': [u'md5', u'0fe8dcb0de1d759d520c57afd5edc0d9'], u'filename': u'bind-libbind-devel-9.3.6-20.P1.el5_8.2.x86_64.rpm', u'epoch': u'30', u'version': u'9.3.6', u'release': u'20.P1.el5_8.2', u'arch': u'x86_64'}, {u'src': None, u'name': u'bind-libs', u'sum': [u'md5', u'f37edff58ec22cf77b00a01e21c5d653'], u'filename': u'bind-libs-9.3.6-20.P1.el5_8.2.i386.rpm', u'epoch': u'30', u'version': u'9.3.6', u'release': u'20.P1.el5_8.2', u'arch': u'i386'}, {u'src': None, u'name': u'bind-libs', u'sum': [u'md5', u'f96c9d1321e7199ca17c5cf8bab1a27f'], u'filename': u'bind-libs-9.3.6-20.P1.el5_8.2.x86_64.rpm', u'epoch': u'30', u'version': u'9.3.6', u'release': u'20.P1.el5_8.2', u'arch': u'x86_64'}, {u'src': None, u'name': u'bind-sdb', u'sum': [u'md5', u'655c0d6ba84b297da59c81e29e5fe47d'], u'filename': u'bind-sdb-9.3.6-20.P1.el5_8.2.x86_64.rpm', u'epoch': u'30', u'version': u'9.3.6', u'release': u'20.P1.el5_8.2', u'arch': u'x86_64'}, {u'src': None, u'name': u'bind-utils', u'sum': [u'md5', u'f7331497ae1e10e1048a7ffe628e5f54'], u'filename': u'bind-utils-9.3.6-20.P1.el5_8.2.x86_64.rpm', u'epoch': u'30', u'version': u'9.3.6', u'release': u'20.P1.el5_8.2', u'arch': u'x86_64'}, {u'src': None, u'name': u'caching-nameserver', u'sum': [u'md5', u'd1f39119fb75eddb7836b4fcd092cbf2'], u'filename': u'caching-nameserver-9.3.6-20.P1.el5_8.2.x86_64.rpm', u'epoch': u'30', u'version': u'9.3.6', u'release': u'20.P1.el5_8.2', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u'[3.0.3-135.el5_8.4]\n- pygrub: Improve handling of big files (rhbz 821704)', u'issued': u'2012-07-31', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELSA-2012-1130.html', u'type': u'self', u'id': None, u'title': u'ELSA-2012-1130'}, {u'href': u'http://linux.oracle.com/cve/CVE-2012-2625.html', u'type': u'cve', u'id': u'CVE-2012-2625', u'title': u'CVE-2012-2625'}], u'_content_type_id': u'erratum', u'_id': u'c0d716b7-1bea-421b-a7d7-5817ef4e36eb', u'from': u'el-errata@oss.oracle.com', u'severity': u'Moderate', u'title': u' xen security update', u'_ns': u'units_erratum', u'rights': u'Copyright 2012 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 5', u'reboot_suggested': False, u'type': u'security', u'pkglist': [{u'packages': [{u'src': None, u'name': u'xen', u'sum': [u'md5', u'923d494d4714a89552790b99861bf895'], u'filename': u'xen-3.0.3-135.el5_8.4.src.rpm', u'epoch': u'0', u'version': u'3.0.3', u'release': u'135.el5_8.4', u'arch': u'src'}, {u'src': None, u'name': u'xen', u'sum': [u'md5', u'026d27ee414ec58fccfc8ee345111918'], u'filename': u'xen-3.0.3-135.el5_8.4.x86_64.rpm', u'epoch': u'0', u'version': u'3.0.3', u'release': u'135.el5_8.4', u'arch': u'x86_64'}, {u'src': None, u'name': u'xen-devel', u'sum': [u'md5', u'0be24301d366016ca5d85eb3fbd7d7d0'], u'filename': u'xen-devel-3.0.3-135.el5_8.4.i386.rpm', u'epoch': u'0', u'version': u'3.0.3', u'release': u'135.el5_8.4', u'arch': u'i386'}, {u'src': None, u'name': u'xen-devel', u'sum': [u'md5', u'ad7d1540e56cede3054c8fc35690d371'], u'filename': u'xen-devel-3.0.3-135.el5_8.4.x86_64.rpm', u'epoch': u'0', u'version': u'3.0.3', u'release': u'135.el5_8.4', u'arch': u'x86_64'}, {u'src': None, u'name': u'xen-libs', u'sum': [u'md5', u'b601f981b5d0c33f2546c879565c7685'], u'filename': u'xen-libs-3.0.3-135.el5_8.4.i386.rpm', u'epoch': u'0', u'version': u'3.0.3', u'release': u'135.el5_8.4', u'arch': u'i386'}, {u'src': None, u'name': u'xen-libs', u'sum': [u'md5', u'64ac55fdd272dc50c11c4ec2b2350842'], u'filename': u'xen-libs-3.0.3-135.el5_8.4.x86_64.rpm', u'epoch': u'0', u'version': u'3.0.3', u'release': u'135.el5_8.4', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u'[12:3.0.5-31.1]\n- An error in the handling of malformed client identifiers can\n cause a denial-of-service condition in affected servers. (CVE-2012-3571, #843124)', u'issued': u'2012-08-02', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELSA-2012-1140.html', u'type': u'self', u'id': None, u'title': u'ELSA-2012-1140'}, {u'href': u'http://linux.oracle.com/cve/CVE-2012-3571.html', u'type': u'cve', u'id': u'CVE-2012-3571', u'title': u'CVE-2012-3571'}], u'_content_type_id': u'erratum', u'_id': u'2f9876c0-7a56-414b-8b56-05c85f2511a3', u'from': u'el-errata@oss.oracle.com', u'severity': u'Moderate', u'title': u' dhcp security update', u'_ns': u'units_erratum', u'rights': u'Copyright 2012 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 5', u'reboot_suggested': False, u'type': u'security', u'pkglist': [{u'packages': [{u'src': None, u'name': u'dhclient', u'sum': [u'md5', u'1f5922aeceb3472f55a75f676b54320e'], u'filename': u'dhclient-3.0.5-31.el5_8.1.x86_64.rpm', u'epoch': u'12', u'version': u'3.0.5', u'release': u'31.el5_8.1', u'arch': u'x86_64'}, {u'src': None, u'name': u'dhcp', u'sum': [u'md5', u'dad01e441c357a0cc7798455f4083a5f'], u'filename': u'dhcp-3.0.5-31.el5_8.1.src.rpm', u'epoch': u'12', u'version': u'3.0.5', u'release': u'31.el5_8.1', u'arch': u'src'}, {u'src': None, u'name': u'dhcp', u'sum': [u'md5', u'0a7deaf89ff8b36530db6ae50701a928'], u'filename': u'dhcp-3.0.5-31.el5_8.1.x86_64.rpm', u'epoch': u'12', u'version': u'3.0.5', u'release': u'31.el5_8.1', u'arch': u'x86_64'}, {u'src': None, u'name': u'dhcp-devel', u'sum': [u'md5', u'6766fe26c3ec053033f0fa8e572f28a0'], u'filename': u'dhcp-devel-3.0.5-31.el5_8.1.i386.rpm', u'epoch': u'12', u'version': u'3.0.5', u'release': u'31.el5_8.1', u'arch': u'i386'}, {u'src': None, u'name': u'dhcp-devel', u'sum': [u'md5', u'1688417fefbe4c46deb47086d893a53b'], u'filename': u'dhcp-devel-3.0.5-31.el5_8.1.x86_64.rpm', u'epoch': u'12', u'version': u'3.0.5', u'release': u'31.el5_8.1', u'arch': u'x86_64'}, {u'src': None, u'name': u'libdhcp4client', u'sum': [u'md5', u'79db5cc557317e807fcc19f4b041809c'], u'filename': u'libdhcp4client-3.0.5-31.el5_8.1.i386.rpm', u'epoch': u'12', u'version': u'3.0.5', u'release': u'31.el5_8.1', u'arch': u'i386'}, {u'src': None, u'name': u'libdhcp4client', u'sum': [u'md5', u'36dfd15dfff3a58c2abaa13077e71b86'], u'filename': u'libdhcp4client-3.0.5-31.el5_8.1.x86_64.rpm', u'epoch': u'12', u'version': u'3.0.5', u'release': u'31.el5_8.1', u'arch': u'x86_64'}, {u'src': None, u'name': u'libdhcp4client-devel', u'sum': [u'md5', u'de7c0015de00436085b1dec772a61e6f'], u'filename': u'libdhcp4client-devel-3.0.5-31.el5_8.1.i386.rpm', u'epoch': u'12', u'version': u'3.0.5', u'release': u'31.el5_8.1', u'arch': u'i386'}, {u'src': None, u'name': u'libdhcp4client-devel', u'sum': [u'md5', u'8562bc138a1a022d47b3284b9993d94e'], u'filename': u'libdhcp4client-devel-3.0.5-31.el5_8.1.x86_64.rpm', u'epoch': u'12', u'version': u'3.0.5', u'release': u'31.el5_8.1', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u'[1.7.2p1-14.2]\n- added a workaround for a race condition in handling child processes \n Resolves: rhbz#844978\n\n[1.7.2p1-14.1]\n- dont remove the sudoers: line from nsswitch.conf on update\n- use safe temporary file for nsswitch.conf\n- call restorecon after modifying nsswitch.conf\n- fixed command escaping\n- patch: Use SIG_SETMASK when resetting signal mask instead of SIG_UNBLOCK\n Resolves: rhbz#842759\n Resolves: rhbz#844420\n Resolves: rhbz#844419\n Resolves: rhbz#844418\n Resolves: rhbz#844443', u'issued': u'2012-08-07', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELSA-2012-1149.html', u'type': u'self', u'id': None, u'title': u'ELSA-2012-1149'}, {u'href': u'http://linux.oracle.com/cve/CVE-2012-3440.html', u'type': u'cve', u'id': u'CVE-2012-3440', u'title': u'CVE-2012-3440'}], u'_content_type_id': u'erratum', u'_id': u'7f2750b7-22aa-4f97-9604-634919c35fa6', u'from': u'el-errata@oss.oracle.com', u'severity': u'Moderate', u'title': u' sudo security and bug fix update', u'_ns': u'units_erratum', u'rights': u'Copyright 2012 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 5', u'reboot_suggested': False, u'type': u'security', u'pkglist': [{u'packages': [{u'src': None, u'name': u'sudo', u'sum': [u'md5', u'625bd113f2bdeced491dd58399b3ecd2'], u'filename': u'sudo-1.7.2p1-14.el5_8.2.src.rpm', u'epoch': u'0', u'version': u'1.7.2p1', u'release': u'14.el5_8.2', u'arch': u'src'}, {u'src': None, u'name': u'sudo', u'sum': [u'md5', u'0a78973202d615e09a1699cc02d60459'], u'filename': u'sudo-1.7.2p1-14.el5_8.2.x86_64.rpm', u'epoch': u'0', u'version': u'1.7.2p1', u'release': u'14.el5_8.2', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u"kernel\n[2.6.18-308.13.1.el5]\n- [net] e1000e: Cleanup logic in e1000_check_for_serdes_link_82571 (Dean Nelson) [841370 771366]\n- [net] e1000e: Correct link check logic for 82571 serdes (Dean Nelson) [841370 771366]\n- [mm] NULL pointer dereference in __vm_enough_memory (Jerome Marchand) [840077 836244]\n- [fs] dlm: fix slow rsb search in dir recovery (David Teigland) [838140 753244]\n- [fs] autofs: propogate LOOKUP_DIRECTORY flag only for last comp (Ian Kent) [830264 814418]\n- [fs] ext4: properly dirty split extent nodes (Eric Sandeen) [840946 839770]\n- [scsi] don't offline devices with a reservation conflict (David Jeffery) [839196 835660]\n- [fs] ext4: Fix overflow caused by missing cast in ext4_fallocate (Lukas Czerner) [837226 830351]\n- [net] dl2k: Clean up rio_ioctl (Weiping Pan) [818822 818823] {CVE-2012-2313}\n- [x86] sched: Avoid unnecessary overflow in sched_clock (Prarit Bhargava) [835450 834562]\n- [net] tg3: Fix TSO handling (John Feeney) [833182 795672]\n- [input] evdev: use after free from open/disconnect race (David Jeffery) [832448 822166]\n\n[2.6.18-308.12.1.el5]\n- [fs] nfs: Don't allow multiple mounts on same mntpnt with -o noac (Sachin Prabhu) [839806 839753]", u'issued': u'2012-08-22', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELSA-2012-1174.html', u'type': u'self', u'id': None, u'title': u'ELSA-2012-1174'}, {u'href': u'http://linux.oracle.com/cve/CVE-2012-2313.html', u'type': u'cve', u'id': u'CVE-2012-2313', u'title': u'CVE-2012-2313'}], u'_content_type_id': u'erratum', u'_id': u'f16f48af-5484-4e39-b27f-dbb54cf4b9e2', u'from': u'el-errata@oss.oracle.com', u'severity': u'Low', u'title': u' kernel security and bug fix update', u'_ns': u'units_erratum', u'rights': u'Copyright 2012 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 5', u'reboot_suggested': False, u'type': u'security', u'pkglist': [{u'packages': [{u'src': None, u'name': u'kernel', u'sum': [u'md5', u'f5b7625d6a7a713779a2668a6c89e45a'], u'filename': u'kernel-2.6.18-308.13.1.el5.src.rpm', u'epoch': u'0', u'version': u'2.6.18', u'release': u'308.13.1.el5', u'arch': u'src'}, {u'src': None, u'name': u'kernel', u'sum': [u'md5', u'bca738f379880e255ed31f35e1465a39'], u'filename': u'kernel-2.6.18-308.13.1.el5.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.18', u'release': u'308.13.1.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'kernel-debug', u'sum': [u'md5', u'a7666708e750d7fa176c766e6ee737f7'], u'filename': u'kernel-debug-2.6.18-308.13.1.el5.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.18', u'release': u'308.13.1.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'kernel-debug-devel', u'sum': [u'md5', u'88277b62c12b4fac9593b1c1e0483c48'], u'filename': u'kernel-debug-devel-2.6.18-308.13.1.el5.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.18', u'release': u'308.13.1.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'kernel-devel', u'sum': [u'md5', u'1540b3cbdcdb3f6216f4c45f35824e7c'], u'filename': u'kernel-devel-2.6.18-308.13.1.el5.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.18', u'release': u'308.13.1.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'kernel-doc', u'sum': [u'md5', u'f701c41c0b318bcbba7dee1796548ad2'], u'filename': u'kernel-doc-2.6.18-308.13.1.el5.noarch.rpm', u'epoch': u'0', u'version': u'2.6.18', u'release': u'308.13.1.el5', u'arch': u'noarch'}, {u'src': None, u'name': u'kernel-headers', u'sum': [u'md5', u'38f79387a5f6961e321004c48fc62be4'], u'filename': u'kernel-headers-2.6.18-308.13.1.el5.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.18', u'release': u'308.13.1.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'kernel-xen', u'sum': [u'md5', u'eb0b3a70c43d0bbfedd464ef5759cfb1'], u'filename': u'kernel-xen-2.6.18-308.13.1.el5.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.18', u'release': u'308.13.1.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'kernel-xen-devel', u'sum': [u'md5', u'a6ee1ea507c69be83f42a5e36dde1c7f'], u'filename': u'kernel-xen-devel-2.6.18-308.13.1.el5.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.18', u'release': u'308.13.1.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'ocfs2-2.6.18-308.13.1.el5', u'sum': [u'md5', u'21996f5497e4e7bc3797d308a5fa3775'], u'filename': u'ocfs2-2.6.18-308.13.1.el5-1.4.10-1.el5.src.rpm', u'epoch': u'0', u'version': u'1.4.10', u'release': u'1.el5', u'arch': u'src'}, {u'src': None, u'name': u'ocfs2-2.6.18-308.13.1.el5', u'sum': [u'md5', u'1e3125a509fbaa06024b332e9f81af4b'], u'filename': u'ocfs2-2.6.18-308.13.1.el5-1.4.10-1.el5.x86_64.rpm', u'epoch': u'0', u'version': u'1.4.10', u'release': u'1.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'ocfs2-2.6.18-308.13.1.el5debug', u'sum': [u'md5', u'c82f69058c3b21b5c35f3b40b8ea0aca'], u'filename': u'ocfs2-2.6.18-308.13.1.el5debug-1.4.10-1.el5.x86_64.rpm', u'epoch': u'0', u'version': u'1.4.10', u'release': u'1.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'ocfs2-2.6.18-308.13.1.el5xen', u'sum': [u'md5', u'2a7d13833e43d6cc53cc983cf0314cb6'], u'filename': u'ocfs2-2.6.18-308.13.1.el5xen-1.4.10-1.el5.x86_64.rpm', u'epoch': u'0', u'version': u'1.4.10', u'release': u'1.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'oracleasm-2.6.18-308.13.1.el5', u'sum': [u'md5', u'aed35eaec5ce8ff038ef3b0efc2fe79b'], u'filename': u'oracleasm-2.6.18-308.13.1.el5-2.0.5-1.el5.src.rpm', u'epoch': u'0', u'version': u'2.0.5', u'release': u'1.el5', u'arch': u'src'}, {u'src': None, u'name': u'oracleasm-2.6.18-308.13.1.el5', u'sum': [u'md5', u'0902d926b8aa9d386397e3dad6912db2'], u'filename': u'oracleasm-2.6.18-308.13.1.el5-2.0.5-1.el5.x86_64.rpm', u'epoch': u'0', u'version': u'2.0.5', u'release': u'1.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'oracleasm-2.6.18-308.13.1.el5debug', u'sum': [u'md5', u'3ba54b94122a9e79636846ec7e42ee55'], u'filename': u'oracleasm-2.6.18-308.13.1.el5debug-2.0.5-1.el5.x86_64.rpm', u'epoch': u'0', u'version': u'2.0.5', u'release': u'1.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'oracleasm-2.6.18-308.13.1.el5xen', u'sum': [u'md5', u'3e793bf08717c9c88dc002bb2f2ad8db'], u'filename': u'oracleasm-2.6.18-308.13.1.el5xen-2.0.5-1.el5.x86_64.rpm', u'epoch': u'0', u'version': u'2.0.5', u'release': u'1.el5', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u"kernel\n[2.6.18-308.13.1.0.1.el5]\n- [kernel] Initialize the local uninitialized variable stats. [orabug 14051367]\n- [fs] JBD:make jbd support 512B blocks correctly for ocfs2. [orabug 13477763]\n- [x86 ] fix fpu context corrupt when preempt in signal context [orabug 14038272]\n- [net] bonding: fix carrier detect when bond is down [orabug 12377284]\n- [mm] fix hugetlb page leak (Dave McCracken) [orabug 12375075]\n- fix ia64 build error due to add-support-above-32-vcpus.patch(Zhenzhong Duan)\n- [x86] use dynamic vcpu_info remap to support more than 32 vcpus (Zhenzhong Duan)\n- [x86] Fix lvt0 reset when hvm boot up with noapic param\n- [scsi] remove printk's when doing I/O to a dead device (John Sobecki, Chris Mason)\n [orabug 12342275]\n- [char] ipmi: Fix IPMI errors due to timing problems (Joe Jin) [orabug 12561346]\n- [scsi] Fix race when removing SCSI devices (Joe Jin) [orabug 12404566]\n- [net] net: Redo the broken redhat netconsole over bonding (Tina Yang) [orabug 12740042]\n- [fs] nfs: Fix __put_nfs_open_context() NULL pointer panic (Joe Jin) [orabug 12687646]\n- [scsi] fix scsi hotplug and rescan race [orabug 10260172]\n- fix filp_close() race (Joe Jin) [orabug 10335998]\n- make xenkbd.abs_pointer=1 by default [orabug 67188919]\n- [xen] check to see if hypervisor supports memory reservation change\n (Chuck Anderson) [orabug 7556514]\n- [net] Enable entropy for bnx2,bnx2x,e1000e,igb,ixgb,ixgbe,ixgbevf (John Sobecki)\n [orabug 10315433]\n- [NET] Add xen pv netconsole support (Tina Yang) [orabug 6993043] [bz 7258]\n- [mm] shrink_zone patch (John Sobecki,Chris Mason) [orabug 6086839]\n- fix aacraid not to reset during kexec (Joe Jin) [orabug 8516042]\n- [rds] Patch rds to 1.4.2-20 (Andy Grover) [orabug 9471572, 9344105]\n RDS: Fix BUG_ONs to not fire when in a tasklet\n ipoib: Fix lockup of the tx queue\n RDS: Do not call set_page_dirty() with irqs off (Sherman Pun)\n RDS: Properly unmap when getting a remote access error (Tina Yang)\n RDS: Fix locking in rds_send_drop_to()\n- [xen] PVHVM guest with PoD crashes under memory pressure (Chuck Anderson)\n [orabug 9107465]\n- [xen] PV guest with FC HBA hangs during shutdown (Chuck Anderson)\n [orabug 9764220]\n- Support 256GB+ memory for pv guest (Mukesh Rathor) [orabug 9450615]\n- fix overcommit memory to use percpu_counter for el5 (KOSAKI Motohiro,\n Guru Anbalagane) [orabug 6124033]\n- [ipmi] make configurable timeouts for kcs of ipmi [orabug 9752208]\n- [ib] fix memory corruption (Andy Grover) [orabug 9972346]\n\n[2.6.18-308.13.1.el5]\n- [net] e1000e: Cleanup logic in e1000_check_for_serdes_link_82571 (Dean Nelson) [841370 771366]\n- [net] e1000e: Correct link check logic for 82571 serdes (Dean Nelson) [841370 771366]\n- [mm] NULL pointer dereference in __vm_enough_memory (Jerome Marchand) [840077 836244]\n- [fs] dlm: fix slow rsb search in dir recovery (David Teigland) [838140 753244]\n- [fs] autofs: propogate LOOKUP_DIRECTORY flag only for last comp (Ian Kent) [830264 814418]\n- [fs] ext4: properly dirty split extent nodes (Eric Sandeen) [840946 839770]\n- [scsi] don't offline devices with a reservation conflict (David Jeffery) [839196 835660]\n- [fs] ext4: Fix overflow caused by missing cast in ext4_fallocate (Lukas Czerner) [837226 830351]\n- [net] dl2k: Clean up rio_ioctl (Weiping Pan) [818822 818823] {CVE-2012-2313}\n- [x86] sched: Avoid unnecessary overflow in sched_clock (Prarit Bhargava) [835450 834562]\n- [net] tg3: Fix TSO handling (John Feeney) [833182 795672]\n- [input] evdev: use after free from open/disconnect race (David Jeffery) [832448 822166]\n\n[2.6.18-308.12.1.el5]\n- [fs] nfs: Don't allow multiple mounts on same mntpnt with -o noac (Sachin Prabhu) [839806 839753]", u'issued': u'2012-08-22', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELSA-2012-1174-1.html', u'type': u'self', u'id': None, u'title': u'ELSA-2012-1174-1'}, {u'href': u'http://linux.oracle.com/cve/CVE-2012-2313.html', u'type': u'cve', u'id': u'CVE-2012-2313', u'title': u'CVE-2012-2313'}], u'_content_type_id': u'erratum', u'_id': u'4e689eef-17f2-470b-9052-79cda01d17cc', u'from': u'el-errata@oss.oracle.com', u'severity': u'Low', u'title': u' kernel security and bug fix update', u'_ns': u'units_erratum', u'rights': u'Copyright 2012 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 5', u'reboot_suggested': False, u'type': u'security', u'pkglist': [{u'packages': [{u'src': None, u'name': u'kernel', u'sum': [u'md5', u'e55b88c54e06bca8cdbde79be1c66637'], u'filename': u'kernel-2.6.18-308.13.1.0.1.el5.src.rpm', u'epoch': u'0', u'version': u'2.6.18', u'release': u'308.13.1.0.1.el5', u'arch': u'src'}, {u'src': None, u'name': u'kernel', u'sum': [u'md5', u'd48512f5719c850c7762b138d13c5980'], u'filename': u'kernel-2.6.18-308.13.1.0.1.el5.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.18', u'release': u'308.13.1.0.1.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'kernel-debug', u'sum': [u'md5', u'7bd39fb7cb7965bceab1461d0bf6846e'], u'filename': u'kernel-debug-2.6.18-308.13.1.0.1.el5.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.18', u'release': u'308.13.1.0.1.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'kernel-debug-devel', u'sum': [u'md5', u'6f07ad33a12fc2078c340877c80573b0'], u'filename': u'kernel-debug-devel-2.6.18-308.13.1.0.1.el5.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.18', u'release': u'308.13.1.0.1.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'kernel-devel', u'sum': [u'md5', u'7e515b79f7e6fc084ef54751e795e1cd'], u'filename': u'kernel-devel-2.6.18-308.13.1.0.1.el5.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.18', u'release': u'308.13.1.0.1.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'kernel-doc', u'sum': [u'md5', u'9c9aa10f41643d849d6783b3cffc0c68'], u'filename': u'kernel-doc-2.6.18-308.13.1.0.1.el5.noarch.rpm', u'epoch': u'0', u'version': u'2.6.18', u'release': u'308.13.1.0.1.el5', u'arch': u'noarch'}, {u'src': None, u'name': u'kernel-headers', u'sum': [u'md5', u'559d08252e85b8c2dadeae5a0030e335'], u'filename': u'kernel-headers-2.6.18-308.13.1.0.1.el5.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.18', u'release': u'308.13.1.0.1.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'kernel-xen', u'sum': [u'md5', u'232331c389c4eb84c4903035f64e66e2'], u'filename': u'kernel-xen-2.6.18-308.13.1.0.1.el5.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.18', u'release': u'308.13.1.0.1.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'kernel-xen-devel', u'sum': [u'md5', u'8c4f33cef16846720b9661316a144ec3'], u'filename': u'kernel-xen-devel-2.6.18-308.13.1.0.1.el5.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.18', u'release': u'308.13.1.0.1.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'ocfs2-2.6.18-308.13.1.0.1.el5', u'sum': [u'md5', u'426a2e0e78a6d546a6bbbdb037e2bfa0'], u'filename': u'ocfs2-2.6.18-308.13.1.0.1.el5-1.4.10-1.el5.src.rpm', u'epoch': u'0', u'version': u'1.4.10', u'release': u'1.el5', u'arch': u'src'}, {u'src': None, u'name': u'ocfs2-2.6.18-308.13.1.0.1.el5', u'sum': [u'md5', u'8755518cc5fc9073d4f54a544b5548fe'], u'filename': u'ocfs2-2.6.18-308.13.1.0.1.el5-1.4.10-1.el5.x86_64.rpm', u'epoch': u'0', u'version': u'1.4.10', u'release': u'1.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'ocfs2-2.6.18-308.13.1.0.1.el5debug', u'sum': [u'md5', u'1551ed3ed803bf7ecdc0d2c0829d0d2a'], u'filename': u'ocfs2-2.6.18-308.13.1.0.1.el5debug-1.4.10-1.el5.x86_64.rpm', u'epoch': u'0', u'version': u'1.4.10', u'release': u'1.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'ocfs2-2.6.18-308.13.1.0.1.el5xen', u'sum': [u'md5', u'5976d441345353d71bdb8213d2615108'], u'filename': u'ocfs2-2.6.18-308.13.1.0.1.el5xen-1.4.10-1.el5.x86_64.rpm', u'epoch': u'0', u'version': u'1.4.10', u'release': u'1.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'oracleasm-2.6.18-308.13.1.0.1.el5', u'sum': [u'md5', u'dc911d0f27824f080d7296b35a66f757'], u'filename': u'oracleasm-2.6.18-308.13.1.0.1.el5-2.0.5-1.el5.src.rpm', u'epoch': u'0', u'version': u'2.0.5', u'release': u'1.el5', u'arch': u'src'}, {u'src': None, u'name': u'oracleasm-2.6.18-308.13.1.0.1.el5', u'sum': [u'md5', u'52ba6264d149a8cb70dcc4caa498eb51'], u'filename': u'oracleasm-2.6.18-308.13.1.0.1.el5-2.0.5-1.el5.x86_64.rpm', u'epoch': u'0', u'version': u'2.0.5', u'release': u'1.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'oracleasm-2.6.18-308.13.1.0.1.el5debug', u'sum': [u'md5', u'c5b84285e83f16caebe1fda9b20c20f7'], u'filename': u'oracleasm-2.6.18-308.13.1.0.1.el5debug-2.0.5-1.el5.x86_64.rpm', u'epoch': u'0', u'version': u'2.0.5', u'release': u'1.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'oracleasm-2.6.18-308.13.1.0.1.el5xen', u'sum': [u'md5', u'3845918dbb46b1e183d39eb159ff59e0'], u'filename': u'oracleasm-2.6.18-308.13.1.0.1.el5xen-2.0.5-1.el5.x86_64.rpm', u'epoch': u'0', u'version': u'2.0.5', u'release': u'1.el5', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u'[2:2.2.13-2.0.7.el5_8.5]\n- fix overflow in GIF loader (CVE-2012-3481)\n\n[2:2.2.13-2.0.7.el5_8.4]\n- fix overflows in PSD plugin (CVE-2009-3909, CVE-2012-3402)\n- fix heap corruption and overflow in GIF plug-in (CVE-2011-2896)\n- fix overflow in CEL plug-in (CVE-2012-3403)', u'issued': u'2012-08-20', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELSA-2012-1181.html', u'type': u'self', u'id': None, u'title': u'ELSA-2012-1181'}, {u'href': u'http://linux.oracle.com/cve/CVE-2011-2896.html', u'type': u'cve', u'id': u'CVE-2011-2896', u'title': u'CVE-2011-2896'}, {u'href': u'http://linux.oracle.com/cve/CVE-2009-3909.html', u'type': u'cve', u'id': u'CVE-2009-3909', u'title': u'CVE-2009-3909'}, {u'href': u'http://linux.oracle.com/cve/CVE-2012-3402.html', u'type': u'cve', u'id': u'CVE-2012-3402', u'title': u'CVE-2012-3402'}, {u'href': u'http://linux.oracle.com/cve/CVE-2012-3403.html', u'type': u'cve', u'id': u'CVE-2012-3403', u'title': u'CVE-2012-3403'}, {u'href': u'http://linux.oracle.com/cve/CVE-2012-3481.html', u'type': u'cve', u'id': u'CVE-2012-3481', u'title': u'CVE-2012-3481'}], u'_content_type_id': u'erratum', u'_id': u'f16df7fd-e61e-4314-82e1-bb698590c339', u'from': u'el-errata@oss.oracle.com', u'severity': u'Moderate', u'title': u' gimp security update', u'_ns': u'units_erratum', u'rights': u'Copyright 2012 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 5', u'reboot_suggested': False, u'type': u'security', u'pkglist': [{u'packages': [{u'src': None, u'name': u'gimp', u'sum': [u'md5', u'e84564a2ef338063f5ca48d0f6e7b751'], u'filename': u'gimp-2.2.13-2.0.7.el5_8.5.src.rpm', u'epoch': u'2', u'version': u'2.2.13', u'release': u'2.0.7.el5_8.5', u'arch': u'src'}, {u'src': None, u'name': u'gimp', u'sum': [u'md5', u'643def4195cfd00b395b2443870190fd'], u'filename': u'gimp-2.2.13-2.0.7.el5_8.5.x86_64.rpm', u'epoch': u'2', u'version': u'2.2.13', u'release': u'2.0.7.el5_8.5', u'arch': u'x86_64'}, {u'src': None, u'name': u'gimp-devel', u'sum': [u'md5', u'c05ec92de9b00638a4b81c13e01789e3'], u'filename': u'gimp-devel-2.2.13-2.0.7.el5_8.5.i386.rpm', u'epoch': u'2', u'version': u'2.2.13', u'release': u'2.0.7.el5_8.5', u'arch': u'i386'}, {u'src': None, u'name': u'gimp-devel', u'sum': [u'md5', u'2632ebbe1f596e23dd7fd312f94d543d'], u'filename': u'gimp-devel-2.2.13-2.0.7.el5_8.5.x86_64.rpm', u'epoch': u'2', u'version': u'2.2.13', u'release': u'2.0.7.el5_8.5', u'arch': u'x86_64'}, {u'src': None, u'name': u'gimp-libs', u'sum': [u'md5', u'30517fec55484141050845c83501e6a1'], u'filename': u'gimp-libs-2.2.13-2.0.7.el5_8.5.i386.rpm', u'epoch': u'2', u'version': u'2.2.13', u'release': u'2.0.7.el5_8.5', u'arch': u'i386'}, {u'src': None, u'name': u'gimp-libs', u'sum': [u'md5', u'42884d0dc3b6cf92a2ee871d12f8418e'], u'filename': u'gimp-libs-2.2.13-2.0.7.el5_8.5.x86_64.rpm', u'epoch': u'2', u'version': u'2.2.13', u'release': u'2.0.7.el5_8.5', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u'[3.0-33.15.el5_9.1]\n- more robust fix for CVE-2010-3702 (#773178)\n\n[3.0-33.15]\n- apply patch for CVE-2010-3702,3704 (#773180)\n\n[3.0-33.14]\n- fix CVE-2010-2642 CVE-2011-0433 CVE-2011-0764 CVE-2011-1552\n CVE-2011-1553 CVE-2011-1554, texlive various flaws (#773180)', u'issued': u'2012-08-23', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELSA-2012-1201.html', u'type': u'self', u'id': None, u'title': u'ELSA-2012-1201'}, {u'href': u'http://linux.oracle.com/cve/CVE-2010-2642.html', u'type': u'cve', u'id': u'CVE-2010-2642', u'title': u'CVE-2010-2642'}, {u'href': u'http://linux.oracle.com/cve/CVE-2010-3702.html', u'type': u'cve', u'id': u'CVE-2010-3702', u'title': u'CVE-2010-3702'}, {u'href': u'http://linux.oracle.com/cve/CVE-2010-3704.html', u'type': u'cve', u'id': u'CVE-2010-3704', u'title': u'CVE-2010-3704'}, {u'href': u'http://linux.oracle.com/cve/CVE-2011-0433.html', u'type': u'cve', u'id': u'CVE-2011-0433', u'title': u'CVE-2011-0433'}, {u'href': u'http://linux.oracle.com/cve/CVE-2011-0764.html', u'type': u'cve', u'id': u'CVE-2011-0764', u'title': u'CVE-2011-0764'}, {u'href': u'http://linux.oracle.com/cve/CVE-2011-1552.html', u'type': u'cve', u'id': u'CVE-2011-1552', u'title': u'CVE-2011-1552'}, {u'href': u'http://linux.oracle.com/cve/CVE-2011-1553.html', u'type': u'cve', u'id': u'CVE-2011-1553', u'title': u'CVE-2011-1553'}, {u'href': u'http://linux.oracle.com/cve/CVE-2011-1554.html', u'type': u'cve', u'id': u'CVE-2011-1554', u'title': u'CVE-2011-1554'}], u'_content_type_id': u'erratum', u'_id': u'29657c75-c957-4743-aa20-55b0b8a2d4f6', u'from': u'el-errata@oss.oracle.com', u'severity': u'Moderate', u'title': u' tetex security update', u'_ns': u'units_erratum', u'rights': u'Copyright 2012 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 5', u'reboot_suggested': False, u'type': u'security', u'pkglist': [{u'packages': [{u'src': None, u'name': u'tetex', u'sum': [u'md5', u'5e6c4cc07ec744dfc8234f4f383b6fde'], u'filename': u'tetex-3.0-33.15.el5_8.1.src.rpm', u'epoch': u'0', u'version': u'3.0', u'release': u'33.15.el5_8.1', u'arch': u'src'}, {u'src': None, u'name': u'tetex', u'sum': [u'md5', u'ca2bfb855fc1b0eee672e61b6b54afed'], u'filename': u'tetex-3.0-33.15.el5_8.1.x86_64.rpm', u'epoch': u'0', u'version': u'3.0', u'release': u'33.15.el5_8.1', u'arch': u'x86_64'}, {u'src': None, u'name': u'tetex-afm', u'sum': [u'md5', u'44dad6ff5dcf3839d5a90516cb140b88'], u'filename': u'tetex-afm-3.0-33.15.el5_8.1.x86_64.rpm', u'epoch': u'0', u'version': u'3.0', u'release': u'33.15.el5_8.1', u'arch': u'x86_64'}, {u'src': None, u'name': u'tetex-doc', u'sum': [u'md5', u'5a6ca71c3d6e8ad6b2d9f1ccca11fb87'], u'filename': u'tetex-doc-3.0-33.15.el5_8.1.x86_64.rpm', u'epoch': u'0', u'version': u'3.0', u'release': u'33.15.el5_8.1', u'arch': u'x86_64'}, {u'src': None, u'name': u'tetex-dvips', u'sum': [u'md5', u'a8fef31769019a7ff32153973e10b41c'], u'filename': u'tetex-dvips-3.0-33.15.el5_8.1.x86_64.rpm', u'epoch': u'0', u'version': u'3.0', u'release': u'33.15.el5_8.1', u'arch': u'x86_64'}, {u'src': None, u'name': u'tetex-fonts', u'sum': [u'md5', u'848debce0e7d4b90ac7f019fc8ea4ddd'], u'filename': u'tetex-fonts-3.0-33.15.el5_8.1.x86_64.rpm', u'epoch': u'0', u'version': u'3.0', u'release': u'33.15.el5_8.1', u'arch': u'x86_64'}, {u'src': None, u'name': u'tetex-latex', u'sum': [u'md5', u'33278e4a967341f31c146cd58cf5688a'], u'filename': u'tetex-latex-3.0-33.15.el5_8.1.x86_64.rpm', u'epoch': u'0', u'version': u'3.0', u'release': u'33.15.el5_8.1', u'arch': u'x86_64'}, {u'src': None, u'name': u'tetex-xdvi', u'sum': [u'md5', u'40fb6f1e0890b5e7445f5ae4feb54e6b'], u'filename': u'tetex-xdvi-3.0-33.15.el5_8.1.x86_64.rpm', u'epoch': u'0', u'version': u'3.0', u'release': u'33.15.el5_8.1', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u'[2.5-81.el5_8.7]\n- Fix out of bounds array access in strto* exposed by 847929 patch.\n\n[2.5-81.el5_8.6]\n- Fix integer overflow leading to buffer overflow in strto* (#847929)\n\n[2.5-81.el5_8.5]\n- Do not use PT_IEEE_IP ptrace calls (#839411)\n- Update ULPs (#839411)\n- Fix various transcendentals in non-default rounding modes (#839411)', u'issued': u'2012-08-27', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELSA-2012-1207.html', u'type': u'self', u'id': None, u'title': u'ELSA-2012-1207'}, {u'href': u'http://linux.oracle.com/cve/CVE-2012-3480.html', u'type': u'cve', u'id': u'CVE-2012-3480', u'title': u'CVE-2012-3480'}], u'_content_type_id': u'erratum', u'_id': u'ad538946-6522-4ba8-b9c9-b54d8106f276', u'from': u'el-errata@oss.oracle.com', u'severity': u'Moderate', u'title': u' glibc security and bug fix update', u'_ns': u'units_erratum', u'rights': u'Copyright 2012 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 5', u'reboot_suggested': False, u'type': u'security', u'pkglist': [{u'packages': [{u'src': None, u'name': u'glibc', u'sum': [u'md5', u'be274cba14fc50543dd2066954fafd25'], u'filename': u'glibc-2.5-81.el5_8.7.src.rpm', u'epoch': u'0', u'version': u'2.5', u'release': u'81.el5_8.7', u'arch': u'src'}, {u'src': None, u'name': u'glibc', u'sum': [u'md5', u'9340c5346a613bef463e7d44cd824145'], u'filename': u'glibc-2.5-81.el5_8.7.i686.rpm', u'epoch': u'0', u'version': u'2.5', u'release': u'81.el5_8.7', u'arch': u'i686'}, {u'src': None, u'name': u'glibc', u'sum': [u'md5', u'be83e4d1483d1e57d4eca216a9d5b14c'], u'filename': u'glibc-2.5-81.el5_8.7.x86_64.rpm', u'epoch': u'0', u'version': u'2.5', u'release': u'81.el5_8.7', u'arch': u'x86_64'}, {u'src': None, u'name': u'glibc-common', u'sum': [u'md5', u'111bfe619843352e544a91f030d27f1d'], u'filename': u'glibc-common-2.5-81.el5_8.7.x86_64.rpm', u'epoch': u'0', u'version': u'2.5', u'release': u'81.el5_8.7', u'arch': u'x86_64'}, {u'src': None, u'name': u'glibc-devel', u'sum': [u'md5', u'399f3d9150c3b0194b5412ce47367613'], u'filename': u'glibc-devel-2.5-81.el5_8.7.i386.rpm', u'epoch': u'0', u'version': u'2.5', u'release': u'81.el5_8.7', u'arch': u'i386'}, {u'src': None, u'name': u'glibc-devel', u'sum': [u'md5', u'dc4878095fda912e60dfdf828623e81f'], u'filename': u'glibc-devel-2.5-81.el5_8.7.x86_64.rpm', u'epoch': u'0', u'version': u'2.5', u'release': u'81.el5_8.7', u'arch': u'x86_64'}, {u'src': None, u'name': u'glibc-headers', u'sum': [u'md5', u'457664f694123ff9b9e692d00e979b26'], u'filename': u'glibc-headers-2.5-81.el5_8.7.x86_64.rpm', u'epoch': u'0', u'version': u'2.5', u'release': u'81.el5_8.7', u'arch': u'x86_64'}, {u'src': None, u'name': u'glibc-utils', u'sum': [u'md5', u'ec7e910ede898afbce55d5005891b96b'], u'filename': u'glibc-utils-2.5-81.el5_8.7.x86_64.rpm', u'epoch': u'0', u'version': u'2.5', u'release': u'81.el5_8.7', u'arch': u'x86_64'}, {u'src': None, u'name': u'nscd', u'sum': [u'md5', u'ee7069346b7b13b714c644becd245708'], u'filename': u'nscd-2.5-81.el5_8.7.x86_64.rpm', u'epoch': u'0', u'version': u'2.5', u'release': u'81.el5_8.7', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u'firefox\n[10.0.7-1.0.1.el6_3]\n- Replace firefox-redhat-default-prefs.js with firefox-oracle-default-prefs.js\n\n[10.0.7-1]\n- Update to 10.0.7 ESR\n\nxulrunner\n[10.0.7-1.0.1.el6_3]\n- Replace xulrunner-redhat-default-prefs.js with xulrunner-oracle-default-prefs.js\n\n[10.0.7-1]\n- Update to 10.0.7 ESR\n\n[10.0.6-2]\n- Added fix for rhbz#770276 - Firefox segfaults, should\n have a font dependency', u'issued': u'2012-08-29', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELSA-2012-1210.html', u'type': u'self', u'id': None, u'title': u'ELSA-2012-1210'}, {u'href': u'http://linux.oracle.com/cve/CVE-2012-1970.html', u'type': u'cve', u'id': u'CVE-2012-1970', u'title': u'CVE-2012-1970'}, {u'href': u'http://linux.oracle.com/cve/CVE-2012-1972.html', u'type': u'cve', u'id': u'CVE-2012-1972', u'title': u'CVE-2012-1972'}, {u'href': u'http://linux.oracle.com/cve/CVE-2012-1973.html', u'type': u'cve', u'id': u'CVE-2012-1973', u'title': u'CVE-2012-1973'}, {u'href': u'http://linux.oracle.com/cve/CVE-2012-1974.html', u'type': u'cve', u'id': u'CVE-2012-1974', u'title': u'CVE-2012-1974'}, {u'href': u'http://linux.oracle.com/cve/CVE-2012-1975.html', u'type': u'cve', u'id': u'CVE-2012-1975', u'title': u'CVE-2012-1975'}, {u'href': u'http://linux.oracle.com/cve/CVE-2012-1976.html', u'type': u'cve', u'id': u'CVE-2012-1976', u'title': u'CVE-2012-1976'}, {u'href': u'http://linux.oracle.com/cve/CVE-2012-3956.html', u'type': u'cve', u'id': u'CVE-2012-3956', u'title': u'CVE-2012-3956'}, {u'href': u'http://linux.oracle.com/cve/CVE-2012-3957.html', u'type': u'cve', u'id': u'CVE-2012-3957', u'title': u'CVE-2012-3957'}, {u'href': u'http://linux.oracle.com/cve/CVE-2012-3958.html', u'type': u'cve', u'id': u'CVE-2012-3958', u'title': u'CVE-2012-3958'}, {u'href': u'http://linux.oracle.com/cve/CVE-2012-3959.html', u'type': u'cve', u'id': u'CVE-2012-3959', u'title': u'CVE-2012-3959'}, {u'href': u'http://linux.oracle.com/cve/CVE-2012-3960.html', u'type': u'cve', u'id': u'CVE-2012-3960', u'title': u'CVE-2012-3960'}, {u'href': u'http://linux.oracle.com/cve/CVE-2012-3961.html', u'type': u'cve', u'id': u'CVE-2012-3961', u'title': u'CVE-2012-3961'}, {u'href': u'http://linux.oracle.com/cve/CVE-2012-3962.html', u'type': u'cve', u'id': u'CVE-2012-3962', u'title': u'CVE-2012-3962'}, {u'href': u'http://linux.oracle.com/cve/CVE-2012-3963.html', u'type': u'cve', u'id': u'CVE-2012-3963', u'title': u'CVE-2012-3963'}, {u'href': u'http://linux.oracle.com/cve/CVE-2012-3964.html', u'type': u'cve', u'id': u'CVE-2012-3964', u'title': u'CVE-2012-3964'}, {u'href': u'http://linux.oracle.com/cve/CVE-2012-3966.html', u'type': u'cve', u'id': u'CVE-2012-3966', u'title': u'CVE-2012-3966'}, {u'href': u'http://linux.oracle.com/cve/CVE-2012-3967.html', u'type': u'cve', u'id': u'CVE-2012-3967', u'title': u'CVE-2012-3967'}, {u'href': u'http://linux.oracle.com/cve/CVE-2012-3968.html', u'type': u'cve', u'id': u'CVE-2012-3968', u'title': u'CVE-2012-3968'}, {u'href': u'http://linux.oracle.com/cve/CVE-2012-3969.html', u'type': u'cve', u'id': u'CVE-2012-3969', u'title': u'CVE-2012-3969'}, {u'href': u'http://linux.oracle.com/cve/CVE-2012-3970.html', u'type': u'cve', u'id': u'CVE-2012-3970', u'title': u'CVE-2012-3970'}, {u'href': u'http://linux.oracle.com/cve/CVE-2012-3972.html', u'type': u'cve', u'id': u'CVE-2012-3972', u'title': u'CVE-2012-3972'}, {u'href': u'http://linux.oracle.com/cve/CVE-2012-3976.html', u'type': u'cve', u'id': u'CVE-2012-3976', u'title': u'CVE-2012-3976'}, {u'href': u'http://linux.oracle.com/cve/CVE-2012-3978.html', u'type': u'cve', u'id': u'CVE-2012-3978', u'title': u'CVE-2012-3978'}, {u'href': u'http://linux.oracle.com/cve/CVE-2012-3980.html', u'type': u'cve', u'id': u'CVE-2012-3980', u'title': u'CVE-2012-3980'}], u'_content_type_id': u'erratum', u'_id': u'f18406b6-76fd-4868-8da4-02b3b7a96511', u'from': u'el-errata@oss.oracle.com', u'severity': u'Critical', u'title': u' firefox security update', u'_ns': u'units_erratum', u'rights': u'Copyright 2012 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 6', u'reboot_suggested': False, u'type': u'security', u'pkglist': [{u'packages': [{u'src': None, u'name': u'firefox', u'sum': [u'md5', u'feed76c7eddee51da54fda6daaf3ff81'], u'filename': u'firefox-10.0.7-1.0.1.el6_3.i686.rpm', u'epoch': u'0', u'version': u'10.0.7', u'release': u'1.0.1.el6_3', u'arch': u'i686'}, {u'src': None, u'name': u'firefox', u'sum': [u'md5', u'089a31b59e168c1d9268e1094711f62b'], u'filename': u'firefox-10.0.7-1.0.1.el6_3.src.rpm', u'epoch': u'0', u'version': u'10.0.7', u'release': u'1.0.1.el6_3', u'arch': u'src'}, {u'src': None, u'name': u'firefox', u'sum': [u'md5', u'84e2166e26a961042fa16d0d79153aa7'], u'filename': u'firefox-10.0.7-1.0.1.el6_3.x86_64.rpm', u'epoch': u'0', u'version': u'10.0.7', u'release': u'1.0.1.el6_3', u'arch': u'x86_64'}, {u'src': None, u'name': u'xulrunner', u'sum': [u'md5', u'44985715071d808d0d4671e0441defb7'], u'filename': u'xulrunner-10.0.7-1.0.1.el6_3.i686.rpm', u'epoch': u'0', u'version': u'10.0.7', u'release': u'1.0.1.el6_3', u'arch': u'i686'}, {u'src': None, u'name': u'xulrunner', u'sum': [u'md5', u'd673a592761b3ce1876feb1ec0c7f3b0'], u'filename': u'xulrunner-10.0.7-1.0.1.el6_3.src.rpm', u'epoch': u'0', u'version': u'10.0.7', u'release': u'1.0.1.el6_3', u'arch': u'src'}, {u'src': None, u'name': u'xulrunner', u'sum': [u'md5', u'57f05855e3c98ee205dfa4b53162e9cd'], u'filename': u'xulrunner-10.0.7-1.0.1.el6_3.x86_64.rpm', u'epoch': u'0', u'version': u'10.0.7', u'release': u'1.0.1.el6_3', u'arch': u'x86_64'}, {u'src': None, u'name': u'xulrunner-devel', u'sum': [u'md5', u'de82f5f4faea4eb990a7890700d894af'], u'filename': u'xulrunner-devel-10.0.7-1.0.1.el6_3.i686.rpm', u'epoch': u'0', u'version': u'10.0.7', u'release': u'1.0.1.el6_3', u'arch': u'i686'}, {u'src': None, u'name': u'xulrunner-devel', u'sum': [u'md5', u'20b7ef76ae90af3ae8452cd652bca5f4'], u'filename': u'xulrunner-devel-10.0.7-1.0.1.el6_3.x86_64.rpm', u'epoch': u'0', u'version': u'10.0.7', u'release': u'1.0.1.el6_3', u'arch': u'x86_64'}], u'name': u'ol6_x86_64_latest', u'short': u'ol6_x86_64_latest'}, {u'packages': [{u'src': None, u'name': u'firefox', u'sum': [u'md5', u'890a8041eda95e52259c066bed0b9fa4'], u'filename': u'firefox-10.0.7-1.0.1.el5_8.i386.rpm', u'epoch': u'0', u'version': u'10.0.7', u'release': u'1.0.1.el5_8', u'arch': u'i386'}, {u'src': None, u'name': u'firefox', u'sum': [u'md5', u'd5f4b9a6541690682f8d2cad8ad66cb9'], u'filename': u'firefox-10.0.7-1.0.1.el5_8.src.rpm', u'epoch': u'0', u'version': u'10.0.7', u'release': u'1.0.1.el5_8', u'arch': u'src'}, {u'src': None, u'name': u'firefox', u'sum': [u'md5', u'fdabbc536be176f482294ccfeeca0920'], u'filename': u'firefox-10.0.7-1.0.1.el5_8.x86_64.rpm', u'epoch': u'0', u'version': u'10.0.7', u'release': u'1.0.1.el5_8', u'arch': u'x86_64'}, {u'src': None, u'name': u'xulrunner', u'sum': [u'md5', u'd369c1941dc3170990a29710283ad3a1'], u'filename': u'xulrunner-10.0.7-2.0.1.el5_8.i386.rpm', u'epoch': u'0', u'version': u'10.0.7', u'release': u'2.0.1.el5_8', u'arch': u'i386'}, {u'src': None, u'name': u'xulrunner', u'sum': [u'md5', u'd6ba105a2e727a0418af14ca6bc3fea1'], u'filename': u'xulrunner-10.0.7-2.0.1.el5_8.src.rpm', u'epoch': u'0', u'version': u'10.0.7', u'release': u'2.0.1.el5_8', u'arch': u'src'}, {u'src': None, u'name': u'xulrunner', u'sum': [u'md5', u'62cf6ab7d263de011ee2fc3c87269e91'], u'filename': u'xulrunner-10.0.7-2.0.1.el5_8.x86_64.rpm', u'epoch': u'0', u'version': u'10.0.7', u'release': u'2.0.1.el5_8', u'arch': u'x86_64'}, {u'src': None, u'name': u'xulrunner-devel', u'sum': [u'md5', u'bb67eaed36faa13a7cca44dcb7fc60b4'], u'filename': u'xulrunner-devel-10.0.7-2.0.1.el5_8.i386.rpm', u'epoch': u'0', u'version': u'10.0.7', u'release': u'2.0.1.el5_8', u'arch': u'i386'}, {u'src': None, u'name': u'xulrunner-devel', u'sum': [u'md5', u'4dd65ef7a9a1f70ed836a050d6c15863'], u'filename': u'xulrunner-devel-10.0.7-2.0.1.el5_8.x86_64.rpm', u'epoch': u'0', u'version': u'10.0.7', u'release': u'2.0.1.el5_8', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u'[1.6.0.0-1.28.1.10.9.0.1.el5_8]\n- Add oracle-enterprise.patch\n\n[1:1.6.0.0-1.28.1.10.9]\n- Updated to latest IcedTea6 1.10.9\n- Resolves: rhbz#846709\n- Resolves: rhbz#853114\n\n[1:1.6.0.0-1.27.1.10.8]\n- Access gnome bridge jar is forced to have 644 permissions\n- Resolves: rhbz#828749', u'issued': u'2012-09-03', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELSA-2012-1222.html', u'type': u'self', u'id': None, u'title': u'ELSA-2012-1222'}, {u'href': u'http://linux.oracle.com/cve/CVE-2012-0547.html', u'type': u'cve', u'id': u'CVE-2012-0547', u'title': u'CVE-2012-0547'}, {u'href': u'http://linux.oracle.com/cve/CVE-2012-1682.html', u'type': u'cve', u'id': u'CVE-2012-1682', u'title': u'CVE-2012-1682'}], u'_content_type_id': u'erratum', u'_id': u'e3146b0a-6f9c-4b82-b862-3ad2c6c32f32', u'from': u'el-errata@oss.oracle.com', u'severity': u'Important', u'title': u' java-1.6.0-openjdk security update', u'_ns': u'units_erratum', u'rights': u'Copyright 2012 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 5', u'reboot_suggested': False, u'type': u'security', u'pkglist': [{u'packages': [{u'src': None, u'name': u'java-1.6.0-openjdk', u'sum': [u'md5', u'ff1ff7b73b1adb0966d73d95e02f2474'], u'filename': u'java-1.6.0-openjdk-1.6.0.0-1.28.1.10.9.0.1.el5_8.src.rpm', u'epoch': u'1', u'version': u'1.6.0.0', u'release': u'1.28.1.10.9.0.1.el5_8', u'arch': u'src'}, {u'src': None, u'name': u'java-1.6.0-openjdk', u'sum': [u'md5', u'5ab3dc1aeda457e05a8ccfdcc0fa5ba2'], u'filename': u'java-1.6.0-openjdk-1.6.0.0-1.28.1.10.9.0.1.el5_8.x86_64.rpm', u'epoch': u'1', u'version': u'1.6.0.0', u'release': u'1.28.1.10.9.0.1.el5_8', u'arch': u'x86_64'}, {u'src': None, u'name': u'java-1.6.0-openjdk-demo', u'sum': [u'md5', u'04a093d8ac314c74268e609c9fe60046'], u'filename': u'java-1.6.0-openjdk-demo-1.6.0.0-1.28.1.10.9.0.1.el5_8.x86_64.rpm', u'epoch': u'1', u'version': u'1.6.0.0', u'release': u'1.28.1.10.9.0.1.el5_8', u'arch': u'x86_64'}, {u'src': None, u'name': u'java-1.6.0-openjdk-devel', u'sum': [u'md5', u'ba0787513f91fd8ca632771628046180'], u'filename': u'java-1.6.0-openjdk-devel-1.6.0.0-1.28.1.10.9.0.1.el5_8.x86_64.rpm', u'epoch': u'1', u'version': u'1.6.0.0', u'release': u'1.28.1.10.9.0.1.el5_8', u'arch': u'x86_64'}, {u'src': None, u'name': u'java-1.6.0-openjdk-javadoc', u'sum': [u'md5', u'4b72a96eed37b83e5fe92bddad115c72'], u'filename': u'java-1.6.0-openjdk-javadoc-1.6.0.0-1.28.1.10.9.0.1.el5_8.x86_64.rpm', u'epoch': u'1', u'version': u'1.6.0.0', u'release': u'1.28.1.10.9.0.1.el5_8', u'arch': u'x86_64'}, {u'src': None, u'name': u'java-1.6.0-openjdk-src', u'sum': [u'md5', u'20616eac9258be0109d1505cefb7bd45'], u'filename': u'java-1.6.0-openjdk-src-1.6.0.0-1.28.1.10.9.0.1.el5_8.x86_64.rpm', u'epoch': u'1', u'version': u'1.6.0.0', u'release': u'1.28.1.10.9.0.1.el5_8', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u'[83-249.0.1.el5_8.5]\n- Added kvm-add-oracle-workaround-for-libvirt-bug.patch\n- Added kvm-Introduce-oel-machine-type.patch\n\n[83-249.el5_8.5]\n- kvm-console-bounds-check-whenever-changing-the-cursor-du-58.patch [bz#851255]\n- CVE: CVE-2012-3515\n- Resolves: bz#851255\n (EMBARGOED CVE-2012-3515 qemu/kvm: VT100 emulation vulnerability [rhel-5.8.z])', u'issued': u'2012-09-05', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELSA-2012-1235.html', u'type': u'self', u'id': None, u'title': u'ELSA-2012-1235'}, {u'href': u'http://linux.oracle.com/cve/CVE-2012-3515.html', u'type': u'cve', u'id': u'CVE-2012-3515', u'title': u'CVE-2012-3515'}], u'_content_type_id': u'erratum', u'_id': u'b01bc195-9664-430c-888e-e5b1e010d4a2', u'from': u'el-errata@oss.oracle.com', u'severity': u'Important', u'title': u' kvm security update', u'_ns': u'units_erratum', u'rights': u'Copyright 2012 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 5', u'reboot_suggested': False, u'type': u'security', u'pkglist': [{u'packages': [{u'src': None, u'name': u'kmod-kvm', u'sum': [u'md5', u'16357dfb7c54bff864662759e771fc7c'], u'filename': u'kmod-kvm-83-249.0.1.el5_8.5.x86_64.rpm', u'epoch': u'0', u'version': u'83', u'release': u'249.0.1.el5_8.5', u'arch': u'x86_64'}, {u'src': None, u'name': u'kmod-kvm-debug', u'sum': [u'md5', u'1cd1ff7ecd36acd2ac60006f5b8ffdfe'], u'filename': u'kmod-kvm-debug-83-249.0.1.el5_8.5.x86_64.rpm', u'epoch': u'0', u'version': u'83', u'release': u'249.0.1.el5_8.5', u'arch': u'x86_64'}, {u'src': None, u'name': u'kvm', u'sum': [u'md5', u'8246153444b2158f393c7f19e27caeae'], u'filename': u'kvm-83-249.0.1.el5_8.5.src.rpm', u'epoch': u'0', u'version': u'83', u'release': u'249.0.1.el5_8.5', u'arch': u'src'}, {u'src': None, u'name': u'kvm', u'sum': [u'md5', u'4346cb9bce1ceb78f1690e3772a34afb'], u'filename': u'kvm-83-249.0.1.el5_8.5.x86_64.rpm', u'epoch': u'0', u'version': u'83', u'release': u'249.0.1.el5_8.5', u'arch': u'x86_64'}, {u'src': None, u'name': u'kvm-qemu-img', u'sum': [u'md5', u'8f04abafae7b6561862b37f3076ac27c'], u'filename': u'kvm-qemu-img-83-249.0.1.el5_8.5.x86_64.rpm', u'epoch': u'0', u'version': u'83', u'release': u'249.0.1.el5_8.5', u'arch': u'x86_64'}, {u'src': None, u'name': u'kvm-tools', u'sum': [u'md5', u'ca27b133b2d8f791af927fe97c18d451'], u'filename': u'kvm-tools-83-249.0.1.el5_8.5.x86_64.rpm', u'epoch': u'0', u'version': u'83', u'release': u'249.0.1.el5_8.5', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u'[3.0.3-135.el5_8.5]\n- console: Prevent escape sequence length overflow (rhbz 851253)', u'issued': u'2012-09-05', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELSA-2012-1236.html', u'type': u'self', u'id': None, u'title': u'ELSA-2012-1236'}, {u'href': u'http://linux.oracle.com/cve/CVE-2012-3515.html', u'type': u'cve', u'id': u'CVE-2012-3515', u'title': u'CVE-2012-3515'}], u'_content_type_id': u'erratum', u'_id': u'ec9aa761-806b-4f08-b92e-be0a17ef00e8', u'from': u'el-errata@oss.oracle.com', u'severity': u'Important', u'title': u' xen security update', u'_ns': u'units_erratum', u'rights': u'Copyright 2012 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 5', u'reboot_suggested': False, u'type': u'security', u'pkglist': [{u'packages': [{u'src': None, u'name': u'xen', u'sum': [u'md5', u'a46d9a7f874ba74b3813cef3edd9d943'], u'filename': u'xen-3.0.3-135.el5_8.5.src.rpm', u'epoch': u'0', u'version': u'3.0.3', u'release': u'135.el5_8.5', u'arch': u'src'}, {u'src': None, u'name': u'xen', u'sum': [u'md5', u'4f4ec7fb4102bb0709a7c6e564e99241'], u'filename': u'xen-3.0.3-135.el5_8.5.x86_64.rpm', u'epoch': u'0', u'version': u'3.0.3', u'release': u'135.el5_8.5', u'arch': u'x86_64'}, {u'src': None, u'name': u'xen-devel', u'sum': [u'md5', u'3aba2da6af89e03b29ddd41e21406c23'], u'filename': u'xen-devel-3.0.3-135.el5_8.5.i386.rpm', u'epoch': u'0', u'version': u'3.0.3', u'release': u'135.el5_8.5', u'arch': u'i386'}, {u'src': None, u'name': u'xen-devel', u'sum': [u'md5', u'78785431714250153f484dbe7d2f3a4d'], u'filename': u'xen-devel-3.0.3-135.el5_8.5.x86_64.rpm', u'epoch': u'0', u'version': u'3.0.3', u'release': u'135.el5_8.5', u'arch': u'x86_64'}, {u'src': None, u'name': u'xen-libs', u'sum': [u'md5', u'a09d753559f01945f5eeade6f82e4d14'], u'filename': u'xen-libs-3.0.3-135.el5_8.5.i386.rpm', u'epoch': u'0', u'version': u'3.0.3', u'release': u'135.el5_8.5', u'arch': u'i386'}, {u'src': None, u'name': u'xen-libs', u'sum': [u'md5', u'30a28f163cefa4677ee3538052a0798c'], u'filename': u'xen-libs-3.0.3-135.el5_8.5.x86_64.rpm', u'epoch': u'0', u'version': u'3.0.3', u'release': u'135.el5_8.5', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u'[0.6.21-5]\n- Update to version 0.6.21 fixing many bugs and CVEs\n- Remove upstreamed patches\n- Resolves: #839915', u'issued': u'2012-09-11', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELSA-2012-1255.html', u'type': u'self', u'id': None, u'title': u'ELSA-2012-1255'}, {u'href': u'http://linux.oracle.com/cve/CVE-2012-2812.html', u'type': u'cve', u'id': u'CVE-2012-2812', u'title': u'CVE-2012-2812'}, {u'href': u'http://linux.oracle.com/cve/CVE-2012-2813.html', u'type': u'cve', u'id': u'CVE-2012-2813', u'title': u'CVE-2012-2813'}, {u'href': u'http://linux.oracle.com/cve/CVE-2012-2814.html', u'type': u'cve', u'id': u'CVE-2012-2814', u'title': u'CVE-2012-2814'}, {u'href': u'http://linux.oracle.com/cve/CVE-2012-2836.html', u'type': u'cve', u'id': u'CVE-2012-2836', u'title': u'CVE-2012-2836'}, {u'href': u'http://linux.oracle.com/cve/CVE-2012-2837.html', u'type': u'cve', u'id': u'CVE-2012-2837', u'title': u'CVE-2012-2837'}, {u'href': u'http://linux.oracle.com/cve/CVE-2012-2840.html', u'type': u'cve', u'id': u'CVE-2012-2840', u'title': u'CVE-2012-2840'}, {u'href': u'http://linux.oracle.com/cve/CVE-2012-2841.html', u'type': u'cve', u'id': u'CVE-2012-2841', u'title': u'CVE-2012-2841'}], u'_content_type_id': u'erratum', u'_id': u'd9724fd3-5eab-48cb-8aee-7d1aabcadd0e', u'from': u'el-errata@oss.oracle.com', u'severity': u'Moderate', u'title': u' libexif security update', u'_ns': u'units_erratum', u'rights': u'Copyright 2012 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 6', u'reboot_suggested': False, u'type': u'security', u'pkglist': [{u'packages': [{u'src': None, u'name': u'libexif', u'sum': [u'md5', u'4cf9c2b941d2e166b9a413c97d5d70b7'], u'filename': u'libexif-0.6.21-5.el6_3.i686.rpm', u'epoch': u'0', u'version': u'0.6.21', u'release': u'5.el6_3', u'arch': u'i686'}, {u'src': None, u'name': u'libexif', u'sum': [u'md5', u'36451d5ef4792fa2f5593dde659fe7f1'], u'filename': u'libexif-0.6.21-5.el6_3.src.rpm', u'epoch': u'0', u'version': u'0.6.21', u'release': u'5.el6_3', u'arch': u'src'}, {u'src': None, u'name': u'libexif', u'sum': [u'md5', u'bed2acd2fbdf3770e74f6e1600fb400d'], u'filename': u'libexif-0.6.21-5.el6_3.x86_64.rpm', u'epoch': u'0', u'version': u'0.6.21', u'release': u'5.el6_3', u'arch': u'x86_64'}, {u'src': None, u'name': u'libexif-devel', u'sum': [u'md5', u'96c3806d7a0abb6bd46ecced769f6941'], u'filename': u'libexif-devel-0.6.21-5.el6_3.i686.rpm', u'epoch': u'0', u'version': u'0.6.21', u'release': u'5.el6_3', u'arch': u'i686'}, {u'src': None, u'name': u'libexif-devel', u'sum': [u'md5', u'15c7bc252a29ddd12247711b6af598aa'], u'filename': u'libexif-devel-0.6.21-5.el6_3.x86_64.rpm', u'epoch': u'0', u'version': u'0.6.21', u'release': u'5.el6_3', u'arch': u'x86_64'}], u'name': u'ol6_x86_64_latest', u'short': u'ol6_x86_64_latest'}, {u'packages': [{u'src': None, u'name': u'libexif', u'sum': [u'md5', u'35c5f6c22cd6dc1f8941a8e4a6ae1eb5'], u'filename': u'libexif-0.6.21-1.el5_8.i386.rpm', u'epoch': u'0', u'version': u'0.6.21', u'release': u'1.el5_8', u'arch': u'i386'}, {u'src': None, u'name': u'libexif', u'sum': [u'md5', u'25ec63f464ae9c20164e1b3871652578'], u'filename': u'libexif-0.6.21-1.el5_8.src.rpm', u'epoch': u'0', u'version': u'0.6.21', u'release': u'1.el5_8', u'arch': u'src'}, {u'src': None, u'name': u'libexif', u'sum': [u'md5', u'e00ddc37bba717d60d109a52c3972db6'], u'filename': u'libexif-0.6.21-1.el5_8.x86_64.rpm', u'epoch': u'0', u'version': u'0.6.21', u'release': u'1.el5_8', u'arch': u'x86_64'}, {u'src': None, u'name': u'libexif-devel', u'sum': [u'md5', u'1b30c751c32f7505aafd89f1bae4076f'], u'filename': u'libexif-devel-0.6.21-1.el5_8.i386.rpm', u'epoch': u'0', u'version': u'0.6.21', u'release': u'1.el5_8', u'arch': u'i386'}, {u'src': None, u'name': u'libexif-devel', u'sum': [u'md5', u'005973e78b1f97f9ee47c1c12ec7e6b3'], u'filename': u'libexif-devel-0.6.21-1.el5_8.x86_64.rpm', u'epoch': u'0', u'version': u'0.6.21', u'release': u'1.el5_8', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u'[8.70-14:.1]\n- Added inputChan lower-bounds checking to icclib (bug #854227,\n CVE-2012-4405).', u'issued': u'2012-09-11', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELSA-2012-1256.html', u'type': u'self', u'id': None, u'title': u'ELSA-2012-1256'}, {u'href': u'http://linux.oracle.com/cve/CVE-2012-4405.html', u'type': u'cve', u'id': u'CVE-2012-4405', u'title': u'CVE-2012-4405'}], u'_content_type_id': u'erratum', u'_id': u'f776b6f2-7829-4a15-99d9-51a7151d2dc7', u'from': u'el-errata@oss.oracle.com', u'severity': u'Moderate', u'title': u' ghostscript security update', u'_ns': u'units_erratum', u'rights': u'Copyright 2012 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 6', u'reboot_suggested': False, u'type': u'security', u'pkglist': [{u'packages': [{u'src': None, u'name': u'ghostscript', u'sum': [u'md5', u'67541bfd27a1e81ff2f4d99523e7d5c5'], u'filename': u'ghostscript-8.70-14.el6_3.1.i686.rpm', u'epoch': u'0', u'version': u'8.70', u'release': u'14.el6_3.1', u'arch': u'i686'}, {u'src': None, u'name': u'ghostscript', u'sum': [u'md5', u'c244a5ad88d0379648b0871ef2872c94'], u'filename': u'ghostscript-8.70-14.el6_3.1.src.rpm', u'epoch': u'0', u'version': u'8.70', u'release': u'14.el6_3.1', u'arch': u'src'}, {u'src': None, u'name': u'ghostscript', u'sum': [u'md5', u'6034cd23d6d24fb5e66544c909012178'], u'filename': u'ghostscript-8.70-14.el6_3.1.x86_64.rpm', u'epoch': u'0', u'version': u'8.70', u'release': u'14.el6_3.1', u'arch': u'x86_64'}, {u'src': None, u'name': u'ghostscript-devel', u'sum': [u'md5', u'6ff01de89cef1e367e29ca5187299d43'], u'filename': u'ghostscript-devel-8.70-14.el6_3.1.i686.rpm', u'epoch': u'0', u'version': u'8.70', u'release': u'14.el6_3.1', u'arch': u'i686'}, {u'src': None, u'name': u'ghostscript-devel', u'sum': [u'md5', u'59b4f6275cc535bd6021b24387d2cdbe'], u'filename': u'ghostscript-devel-8.70-14.el6_3.1.x86_64.rpm', u'epoch': u'0', u'version': u'8.70', u'release': u'14.el6_3.1', u'arch': u'x86_64'}, {u'src': None, u'name': u'ghostscript-doc', u'sum': [u'md5', u'e205a57b784c30ebee7e1cfd50a5652a'], u'filename': u'ghostscript-doc-8.70-14.el6_3.1.x86_64.rpm', u'epoch': u'0', u'version': u'8.70', u'release': u'14.el6_3.1', u'arch': u'x86_64'}, {u'src': None, u'name': u'ghostscript-gtk', u'sum': [u'md5', u'45fec16d50c37c7e073a9cfe6b677cd6'], u'filename': u'ghostscript-gtk-8.70-14.el6_3.1.x86_64.rpm', u'epoch': u'0', u'version': u'8.70', u'release': u'14.el6_3.1', u'arch': u'x86_64'}], u'name': u'ol6_x86_64_latest', u'short': u'ol6_x86_64_latest'}, {u'packages': [{u'src': None, u'name': u'ghostscript', u'sum': [u'md5', u'81aec407daa67e1c1c3fe14fad29bc0f'], u'filename': u'ghostscript-8.70-14.el5_8.1.i386.rpm', u'epoch': u'0', u'version': u'8.70', u'release': u'14.el5_8.1', u'arch': u'i386'}, {u'src': None, u'name': u'ghostscript', u'sum': [u'md5', u'00bf7226f7ed81cb8d5621ac843b37ff'], u'filename': u'ghostscript-8.70-14.el5_8.1.src.rpm', u'epoch': u'0', u'version': u'8.70', u'release': u'14.el5_8.1', u'arch': u'src'}, {u'src': None, u'name': u'ghostscript', u'sum': [u'md5', u'6896514730a07f05383afbc392c55596'], u'filename': u'ghostscript-8.70-14.el5_8.1.x86_64.rpm', u'epoch': u'0', u'version': u'8.70', u'release': u'14.el5_8.1', u'arch': u'x86_64'}, {u'src': None, u'name': u'ghostscript-devel', u'sum': [u'md5', u'a2c454f76b43fc79f1a684e9f3488979'], u'filename': u'ghostscript-devel-8.70-14.el5_8.1.i386.rpm', u'epoch': u'0', u'version': u'8.70', u'release': u'14.el5_8.1', u'arch': u'i386'}, {u'src': None, u'name': u'ghostscript-devel', u'sum': [u'md5', u'4fe60b1e2b1d2ae1cba009f11157a606'], u'filename': u'ghostscript-devel-8.70-14.el5_8.1.x86_64.rpm', u'epoch': u'0', u'version': u'8.70', u'release': u'14.el5_8.1', u'arch': u'x86_64'}, {u'src': None, u'name': u'ghostscript-gtk', u'sum': [u'md5', u'7c902dcb6ca0931423ec7d84ecc4942d'], u'filename': u'ghostscript-gtk-8.70-14.el5_8.1.x86_64.rpm', u'epoch': u'0', u'version': u'8.70', u'release': u'14.el5_8.1', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u'[0.98.6-7.1]\n- fix CVE-2011-3323\n- fix CVE-2011-3324\n- fix CVE-2011-3325\n- fix CVE-2011-3326\n- fix CVE-2011-3327\n- fix CVE-2012-0249\n- fix CVE-2010-1674\n\n[0.98.6-7]\n- Resolves: #638628 - CVE-2007-4826 CVE-2010-2948 quagga: various flaws\n\n[0.98.6-6]\n- Resolves: #528583 - Missing declarations cause zebra to segfault', u'issued': u'2012-09-12', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELSA-2012-1258.html', u'type': u'self', u'id': None, u'title': u'ELSA-2012-1258'}, {u'href': u'http://linux.oracle.com/cve/CVE-2010-1674.html', u'type': u'cve', u'id': u'CVE-2010-1674', u'title': u'CVE-2010-1674'}, {u'href': u'http://linux.oracle.com/cve/CVE-2011-3323.html', u'type': u'cve', u'id': u'CVE-2011-3323', u'title': u'CVE-2011-3323'}, {u'href': u'http://linux.oracle.com/cve/CVE-2011-3324.html', u'type': u'cve', u'id': u'CVE-2011-3324', u'title': u'CVE-2011-3324'}, {u'href': u'http://linux.oracle.com/cve/CVE-2011-3325.html', u'type': u'cve', u'id': u'CVE-2011-3325', u'title': u'CVE-2011-3325'}, {u'href': u'http://linux.oracle.com/cve/CVE-2011-3326.html', u'type': u'cve', u'id': u'CVE-2011-3326', u'title': u'CVE-2011-3326'}, {u'href': u'http://linux.oracle.com/cve/CVE-2011-3327.html', u'type': u'cve', u'id': u'CVE-2011-3327', u'title': u'CVE-2011-3327'}, {u'href': u'http://linux.oracle.com/cve/CVE-2012-0249.html', u'type': u'cve', u'id': u'CVE-2012-0249', u'title': u'CVE-2012-0249'}, {u'href': u'http://linux.oracle.com/cve/CVE-2012-0250.html', u'type': u'cve', u'id': u'CVE-2012-0250', u'title': u'CVE-2012-0250'}], u'_content_type_id': u'erratum', u'_id': u'2f73fca2-da60-4539-bb6e-c90e0c4d3ea5', u'from': u'el-errata@oss.oracle.com', u'severity': u'Moderate', u'title': u' quagga security update', u'_ns': u'units_erratum', u'rights': u'Copyright 2012 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 5', u'reboot_suggested': False, u'type': u'security', u'pkglist': [{u'packages': [{u'src': None, u'name': u'quagga', u'sum': [u'md5', u'1a27e147f77a7604d084fb0773b43312'], u'filename': u'quagga-0.98.6-7.el5_8.1.src.rpm', u'epoch': u'0', u'version': u'0.98.6', u'release': u'7.el5_8.1', u'arch': u'src'}, {u'src': None, u'name': u'quagga', u'sum': [u'md5', u'f8015d10aec2aa3989484af1d867fcfe'], u'filename': u'quagga-0.98.6-7.el5_8.1.x86_64.rpm', u'epoch': u'0', u'version': u'0.98.6', u'release': u'7.el5_8.1', u'arch': u'x86_64'}, {u'src': None, u'name': u'quagga-contrib', u'sum': [u'md5', u'548443087f240075e1ec369a16ee0436'], u'filename': u'quagga-contrib-0.98.6-7.el5_8.1.x86_64.rpm', u'epoch': u'0', u'version': u'0.98.6', u'release': u'7.el5_8.1', u'arch': u'x86_64'}, {u'src': None, u'name': u'quagga-devel', u'sum': [u'md5', u'efe900e3879fff78eda58c05e63f46c5'], u'filename': u'quagga-devel-0.98.6-7.el5_8.1.i386.rpm', u'epoch': u'0', u'version': u'0.98.6', u'release': u'7.el5_8.1', u'arch': u'i386'}, {u'src': None, u'name': u'quagga-devel', u'sum': [u'md5', u'28f3ea361207a36d1b6c00b6d21e64c8'], u'filename': u'quagga-devel-0.98.6-7.el5_8.1.x86_64.rpm', u'epoch': u'0', u'version': u'0.98.6', u'release': u'7.el5_8.1', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u'[8.4.13-1]\n- Update to PostgreSQL 8.4.13, for various fixes described at\n http://www.postgresql.org/docs/8.4/static/release-8-4-13.html\n including the fixes for CVE-2012-3488, CVE-2012-3489\nResolves: #852020', u'issued': u'2012-09-13', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELSA-2012-1263.html', u'type': u'self', u'id': None, u'title': u'ELSA-2012-1263'}, {u'href': u'http://linux.oracle.com/cve/CVE-2012-3488.html', u'type': u'cve', u'id': u'CVE-2012-3488', u'title': u'CVE-2012-3488'}, {u'href': u'http://linux.oracle.com/cve/CVE-2012-3489.html', u'type': u'cve', u'id': u'CVE-2012-3489', u'title': u'CVE-2012-3489'}], u'_content_type_id': u'erratum', u'_id': u'a7aa5a2a-4a4e-43cf-90a8-e69389d1d3c2', u'from': u'el-errata@oss.oracle.com', u'severity': u'Moderate', u'title': u' postgresql and postgresql84 security update', u'_ns': u'units_erratum', u'rights': u'Copyright 2012 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 6', u'reboot_suggested': False, u'type': u'security', u'pkglist': [{u'packages': [{u'src': None, u'name': u'postgresql', u'sum': [u'md5', u'e2379bdd426842cf9f753e41134e8ad2'], u'filename': u'postgresql-8.4.13-1.el6_3.i686.rpm', u'epoch': u'0', u'version': u'8.4.13', u'release': u'1.el6_3', u'arch': u'i686'}, {u'src': None, u'name': u'postgresql', u'sum': [u'md5', u'67abbe024747e8e975bba6e215dc447a'], u'filename': u'postgresql-8.4.13-1.el6_3.src.rpm', u'epoch': u'0', u'version': u'8.4.13', u'release': u'1.el6_3', u'arch': u'src'}, {u'src': None, u'name': u'postgresql', u'sum': [u'md5', u'c859fea5924e1823d95c0d7142b849d7'], u'filename': u'postgresql-8.4.13-1.el6_3.x86_64.rpm', u'epoch': u'0', u'version': u'8.4.13', u'release': u'1.el6_3', u'arch': u'x86_64'}, {u'src': None, u'name': u'postgresql-contrib', u'sum': [u'md5', u'245d72485d51450032af90dde0595265'], u'filename': u'postgresql-contrib-8.4.13-1.el6_3.x86_64.rpm', u'epoch': u'0', u'version': u'8.4.13', u'release': u'1.el6_3', u'arch': u'x86_64'}, {u'src': None, u'name': u'postgresql-devel', u'sum': [u'md5', u'04fc647b5a317f70d54c5844b65f73f2'], u'filename': u'postgresql-devel-8.4.13-1.el6_3.i686.rpm', u'epoch': u'0', u'version': u'8.4.13', u'release': u'1.el6_3', u'arch': u'i686'}, {u'src': None, u'name': u'postgresql-devel', u'sum': [u'md5', u'8ce2e351d99e43eb208f9793d3e233dd'], u'filename': u'postgresql-devel-8.4.13-1.el6_3.x86_64.rpm', u'epoch': u'0', u'version': u'8.4.13', u'release': u'1.el6_3', u'arch': u'x86_64'}, {u'src': None, u'name': u'postgresql-docs', u'sum': [u'md5', u'8bb89240d62c0670b65d679eacab261c'], u'filename': u'postgresql-docs-8.4.13-1.el6_3.x86_64.rpm', u'epoch': u'0', u'version': u'8.4.13', u'release': u'1.el6_3', u'arch': u'x86_64'}, {u'src': None, u'name': u'postgresql-libs', u'sum': [u'md5', u'ed37e074715d7565f576e8dafd41d017'], u'filename': u'postgresql-libs-8.4.13-1.el6_3.i686.rpm', u'epoch': u'0', u'version': u'8.4.13', u'release': u'1.el6_3', u'arch': u'i686'}, {u'src': None, u'name': u'postgresql-libs', u'sum': [u'md5', u'412d51d96396043e4747d12a96bce858'], u'filename': u'postgresql-libs-8.4.13-1.el6_3.x86_64.rpm', u'epoch': u'0', u'version': u'8.4.13', u'release': u'1.el6_3', u'arch': u'x86_64'}, {u'src': None, u'name': u'postgresql-plperl', u'sum': [u'md5', u'24d693096a6d7e2a4487fec0830ba55f'], u'filename': u'postgresql-plperl-8.4.13-1.el6_3.x86_64.rpm', u'epoch': u'0', u'version': u'8.4.13', u'release': u'1.el6_3', u'arch': u'x86_64'}, {u'src': None, u'name': u'postgresql-plpython', u'sum': [u'md5', u'3dbedb29d4e208c7d2fdd6281af42805'], u'filename': u'postgresql-plpython-8.4.13-1.el6_3.x86_64.rpm', u'epoch': u'0', u'version': u'8.4.13', u'release': u'1.el6_3', u'arch': u'x86_64'}, {u'src': None, u'name': u'postgresql-pltcl', u'sum': [u'md5', u'9e798363804557c381e16b3e9d86aba2'], u'filename': u'postgresql-pltcl-8.4.13-1.el6_3.x86_64.rpm', u'epoch': u'0', u'version': u'8.4.13', u'release': u'1.el6_3', u'arch': u'x86_64'}, {u'src': None, u'name': u'postgresql-server', u'sum': [u'md5', u'8a1f78b38696b905e14746adde9aa83b'], u'filename': u'postgresql-server-8.4.13-1.el6_3.x86_64.rpm', u'epoch': u'0', u'version': u'8.4.13', u'release': u'1.el6_3', u'arch': u'x86_64'}, {u'src': None, u'name': u'postgresql-test', u'sum': [u'md5', u'7d14b2144a7b2846b915eb7a5d7ad919'], u'filename': u'postgresql-test-8.4.13-1.el6_3.x86_64.rpm', u'epoch': u'0', u'version': u'8.4.13', u'release': u'1.el6_3', u'arch': u'x86_64'}], u'name': u'ol6_x86_64_latest', u'short': u'ol6_x86_64_latest'}, {u'packages': [{u'src': None, u'name': u'postgresql84', u'sum': [u'md5', u'2261b520d03a32482d0250e296f4cb43'], u'filename': u'postgresql84-8.4.13-1.el5_8.src.rpm', u'epoch': u'0', u'version': u'8.4.13', u'release': u'1.el5_8', u'arch': u'src'}, {u'src': None, u'name': u'postgresql84', u'sum': [u'md5', u'9b4a12d23f30a7cb491d58fd2fc4d0a0'], u'filename': u'postgresql84-8.4.13-1.el5_8.x86_64.rpm', u'epoch': u'0', u'version': u'8.4.13', u'release': u'1.el5_8', u'arch': u'x86_64'}, {u'src': None, u'name': u'postgresql84-contrib', u'sum': [u'md5', u'852716792b19c164ec18604ab1750735'], u'filename': u'postgresql84-contrib-8.4.13-1.el5_8.x86_64.rpm', u'epoch': u'0', u'version': u'8.4.13', u'release': u'1.el5_8', u'arch': u'x86_64'}, {u'src': None, u'name': u'postgresql84-devel', u'sum': [u'md5', u'f1fc1cb3094aeeda6a7e3abfd4fc0924'], u'filename': u'postgresql84-devel-8.4.13-1.el5_8.i386.rpm', u'epoch': u'0', u'version': u'8.4.13', u'release': u'1.el5_8', u'arch': u'i386'}, {u'src': None, u'name': u'postgresql84-devel', u'sum': [u'md5', u'66e4298b73e65df433b91853f7f49498'], u'filename': u'postgresql84-devel-8.4.13-1.el5_8.x86_64.rpm', u'epoch': u'0', u'version': u'8.4.13', u'release': u'1.el5_8', u'arch': u'x86_64'}, {u'src': None, u'name': u'postgresql84-docs', u'sum': [u'md5', u'd4aaf9a967f2fa850cf34abe4168e18c'], u'filename': u'postgresql84-docs-8.4.13-1.el5_8.x86_64.rpm', u'epoch': u'0', u'version': u'8.4.13', u'release': u'1.el5_8', u'arch': u'x86_64'}, {u'src': None, u'name': u'postgresql84-libs', u'sum': [u'md5', u'357cd0433ca62edc65a562eb831121d1'], u'filename': u'postgresql84-libs-8.4.13-1.el5_8.i386.rpm', u'epoch': u'0', u'version': u'8.4.13', u'release': u'1.el5_8', u'arch': u'i386'}, {u'src': None, u'name': u'postgresql84-libs', u'sum': [u'md5', u'e113de833095d75aa261b6576de1dfb3'], u'filename': u'postgresql84-libs-8.4.13-1.el5_8.x86_64.rpm', u'epoch': u'0', u'version': u'8.4.13', u'release': u'1.el5_8', u'arch': u'x86_64'}, {u'src': None, u'name': u'postgresql84-plperl', u'sum': [u'md5', u'aa34292335235381e1cd38c5ac4ce2da'], u'filename': u'postgresql84-plperl-8.4.13-1.el5_8.x86_64.rpm', u'epoch': u'0', u'version': u'8.4.13', u'release': u'1.el5_8', u'arch': u'x86_64'}, {u'src': None, u'name': u'postgresql84-plpython', u'sum': [u'md5', u'dead71bc526cec616d89a823b0040189'], u'filename': u'postgresql84-plpython-8.4.13-1.el5_8.x86_64.rpm', u'epoch': u'0', u'version': u'8.4.13', u'release': u'1.el5_8', u'arch': u'x86_64'}, {u'src': None, u'name': u'postgresql84-pltcl', u'sum': [u'md5', u'34d40689b8829d0c5b67984cb19660d1'], u'filename': u'postgresql84-pltcl-8.4.13-1.el5_8.x86_64.rpm', u'epoch': u'0', u'version': u'8.4.13', u'release': u'1.el5_8', u'arch': u'x86_64'}, {u'src': None, u'name': u'postgresql84-python', u'sum': [u'md5', u'bdf5a502d2662e5738e8dc28a5c5ebf2'], u'filename': u'postgresql84-python-8.4.13-1.el5_8.x86_64.rpm', u'epoch': u'0', u'version': u'8.4.13', u'release': u'1.el5_8', u'arch': u'x86_64'}, {u'src': None, u'name': u'postgresql84-server', u'sum': [u'md5', u'9894cd230cd52e50737100a1a301069b'], u'filename': u'postgresql84-server-8.4.13-1.el5_8.x86_64.rpm', u'epoch': u'0', u'version': u'8.4.13', u'release': u'1.el5_8', u'arch': u'x86_64'}, {u'src': None, u'name': u'postgresql84-tcl', u'sum': [u'md5', u'225fe523226128f3619f9b25b5c94138'], u'filename': u'postgresql84-tcl-8.4.13-1.el5_8.x86_64.rpm', u'epoch': u'0', u'version': u'8.4.13', u'release': u'1.el5_8', u'arch': u'x86_64'}, {u'src': None, u'name': u'postgresql84-test', u'sum': [u'md5', u'060d03cc6c2149be2e95bdaf0445fb12'], u'filename': u'postgresql84-test-8.4.13-1.el5_8.x86_64.rpm', u'epoch': u'0', u'version': u'8.4.13', u'release': u'1.el5_8', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u'[8.1.23-6]\n- Back-port upstream fix for CVE-2012-3488\nResolves: #852015', u'issued': u'2012-09-13', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELSA-2012-1264.html', u'type': u'self', u'id': None, u'title': u'ELSA-2012-1264'}, {u'href': u'http://linux.oracle.com/cve/CVE-2012-3488.html', u'type': u'cve', u'id': u'CVE-2012-3488', u'title': u'CVE-2012-3488'}], u'_content_type_id': u'erratum', u'_id': u'10dbb9f9-c365-4794-8ecd-09615903feab', u'from': u'el-errata@oss.oracle.com', u'severity': u'Moderate', u'title': u' postgresql security update', u'_ns': u'units_erratum', u'rights': u'Copyright 2012 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 5', u'reboot_suggested': False, u'type': u'security', u'pkglist': [{u'packages': [{u'src': None, u'name': u'postgresql', u'sum': [u'md5', u'ebd5eb75c7fb9f3b11ed75c06941e50d'], u'filename': u'postgresql-8.1.23-6.el5_8.src.rpm', u'epoch': u'0', u'version': u'8.1.23', u'release': u'6.el5_8', u'arch': u'src'}, {u'src': None, u'name': u'postgresql', u'sum': [u'md5', u'd33a7f946f9990d48b6913f6d4b51e48'], u'filename': u'postgresql-8.1.23-6.el5_8.x86_64.rpm', u'epoch': u'0', u'version': u'8.1.23', u'release': u'6.el5_8', u'arch': u'x86_64'}, {u'src': None, u'name': u'postgresql-contrib', u'sum': [u'md5', u'c2ec0978e0d1e0a0c5e603d386039f58'], u'filename': u'postgresql-contrib-8.1.23-6.el5_8.x86_64.rpm', u'epoch': u'0', u'version': u'8.1.23', u'release': u'6.el5_8', u'arch': u'x86_64'}, {u'src': None, u'name': u'postgresql-devel', u'sum': [u'md5', u'98e2bac6ec8766bfa4cf91af4fb340f4'], u'filename': u'postgresql-devel-8.1.23-6.el5_8.i386.rpm', u'epoch': u'0', u'version': u'8.1.23', u'release': u'6.el5_8', u'arch': u'i386'}, {u'src': None, u'name': u'postgresql-devel', u'sum': [u'md5', u'4131915e4b6a1afff9c691b3335e9876'], u'filename': u'postgresql-devel-8.1.23-6.el5_8.x86_64.rpm', u'epoch': u'0', u'version': u'8.1.23', u'release': u'6.el5_8', u'arch': u'x86_64'}, {u'src': None, u'name': u'postgresql-docs', u'sum': [u'md5', u'bcef68fcc93a90cf8c41bbbe4fbf5380'], u'filename': u'postgresql-docs-8.1.23-6.el5_8.x86_64.rpm', u'epoch': u'0', u'version': u'8.1.23', u'release': u'6.el5_8', u'arch': u'x86_64'}, {u'src': None, u'name': u'postgresql-libs', u'sum': [u'md5', u'cae38659a121114a8ff30a87f6725012'], u'filename': u'postgresql-libs-8.1.23-6.el5_8.i386.rpm', u'epoch': u'0', u'version': u'8.1.23', u'release': u'6.el5_8', u'arch': u'i386'}, {u'src': None, u'name': u'postgresql-libs', u'sum': [u'md5', u'3acc2b5518f0baff6e35439fd284752c'], u'filename': u'postgresql-libs-8.1.23-6.el5_8.x86_64.rpm', u'epoch': u'0', u'version': u'8.1.23', u'release': u'6.el5_8', u'arch': u'x86_64'}, {u'src': None, u'name': u'postgresql-pl', u'sum': [u'md5', u'ca58ee7b7e0a7123927da292b6b702a3'], u'filename': u'postgresql-pl-8.1.23-6.el5_8.x86_64.rpm', u'epoch': u'0', u'version': u'8.1.23', u'release': u'6.el5_8', u'arch': u'x86_64'}, {u'src': None, u'name': u'postgresql-python', u'sum': [u'md5', u'd67bb839495a67402eec25486a30ca7b'], u'filename': u'postgresql-python-8.1.23-6.el5_8.x86_64.rpm', u'epoch': u'0', u'version': u'8.1.23', u'release': u'6.el5_8', u'arch': u'x86_64'}, {u'src': None, u'name': u'postgresql-server', u'sum': [u'md5', u'9a63fde8eb68b741867cce3762f2912b'], u'filename': u'postgresql-server-8.1.23-6.el5_8.x86_64.rpm', u'epoch': u'0', u'version': u'8.1.23', u'release': u'6.el5_8', u'arch': u'x86_64'}, {u'src': None, u'name': u'postgresql-tcl', u'sum': [u'md5', u'a3aba28c52d12416a390f6829989797a'], u'filename': u'postgresql-tcl-8.1.23-6.el5_8.x86_64.rpm', u'epoch': u'0', u'version': u'8.1.23', u'release': u'6.el5_8', u'arch': u'x86_64'}, {u'src': None, u'name': u'postgresql-test', u'sum': [u'md5', u'b101f985d6287b5f06838baeffc5fccc'], u'filename': u'postgresql-test-8.1.23-6.el5_8.x86_64.rpm', u'epoch': u'0', u'version': u'8.1.23', u'release': u'6.el5_8', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u'[1.1.26-2.0.2.el6_3.1]\n- Increment release to avoid ULN conflict with previous release.\n\n[1.1.26-2.0.1.el6_3.1]\n- Added libxslt-oracle-enterprise.patch and replaced doc/redhat.gif in tarball\n\n[1.1.26-2.el6_3.1]\n- fixes CVE-2011-1202 CVE-2011-3970 CVE-2012-2825 CVE-2012-2871 CVE-2012-2870\n- Fix direct pattern matching bug\n- Fix popping of vars in xsltCompilerNodePop\n- Fix bug 602515\n- Fix generate-id() to not expose object addresses (CVE-2011-1202)\n- Fix some case of pattern parsing errors (CVE-2011-3970)\n- Fix a bug in selecting XSLT elements (CVE-2012-2825)\n- Fix portability to upcoming libxml2-2.9.0\n- Fix default template processing on namespace nodes (CVE-2012-2871)\n- Cleanup of the pattern compilation code (CVE-2012-2870)\n- Hardening of code checking node types in various entry point (CVE-2012-2870)\n- Hardening of code checking node types in EXSLT (CVE-2012-2870)\n- Fix system-property with unknown namespace\n- Xsltproc should return an error code if xinclude fails\n- Fix a dictionary string usage\n- Avoid a heap use after free error', u'issued': u'2012-09-13', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELSA-2012-1265.html', u'type': u'self', u'id': None, u'title': u'ELSA-2012-1265'}, {u'href': u'http://linux.oracle.com/cve/CVE-2011-1202.html', u'type': u'cve', u'id': u'CVE-2011-1202', u'title': u'CVE-2011-1202'}, {u'href': u'http://linux.oracle.com/cve/CVE-2011-3970.html', u'type': u'cve', u'id': u'CVE-2011-3970', u'title': u'CVE-2011-3970'}, {u'href': u'http://linux.oracle.com/cve/CVE-2012-2825.html', u'type': u'cve', u'id': u'CVE-2012-2825', u'title': u'CVE-2012-2825'}, {u'href': u'http://linux.oracle.com/cve/CVE-2012-2870.html', u'type': u'cve', u'id': u'CVE-2012-2870', u'title': u'CVE-2012-2870'}, {u'href': u'http://linux.oracle.com/cve/CVE-2012-2871.html', u'type': u'cve', u'id': u'CVE-2012-2871', u'title': u'CVE-2012-2871'}], u'_content_type_id': u'erratum', u'_id': u'fda9c652-a1be-4d27-9656-711f26317041', u'from': u'el-errata@oss.oracle.com', u'severity': u'Important', u'title': u' libxslt security update', u'_ns': u'units_erratum', u'rights': u'Copyright 2012 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 6', u'reboot_suggested': False, u'type': u'security', u'pkglist': [{u'packages': [{u'src': None, u'name': u'libxslt', u'sum': [u'md5', u'7df997b7292c956b8200168a7b5cec87'], u'filename': u'libxslt-1.1.26-2.0.2.el6_3.1.i686.rpm', u'epoch': u'0', u'version': u'1.1.26', u'release': u'2.0.2.el6_3.1', u'arch': u'i686'}, {u'src': None, u'name': u'libxslt', u'sum': [u'md5', u'b18cf81ebd93e2c8e8a94abf689112a6'], u'filename': u'libxslt-1.1.26-2.0.2.el6_3.1.src.rpm', u'epoch': u'0', u'version': u'1.1.26', u'release': u'2.0.2.el6_3.1', u'arch': u'src'}, {u'src': None, u'name': u'libxslt', u'sum': [u'md5', u'f02eede420a61483cf7f65daf66d538e'], u'filename': u'libxslt-1.1.26-2.0.2.el6_3.1.x86_64.rpm', u'epoch': u'0', u'version': u'1.1.26', u'release': u'2.0.2.el6_3.1', u'arch': u'x86_64'}, {u'src': None, u'name': u'libxslt-devel', u'sum': [u'md5', u'f8e7edff01cb5d057b19086883c74d2d'], u'filename': u'libxslt-devel-1.1.26-2.0.2.el6_3.1.i686.rpm', u'epoch': u'0', u'version': u'1.1.26', u'release': u'2.0.2.el6_3.1', u'arch': u'i686'}, {u'src': None, u'name': u'libxslt-devel', u'sum': [u'md5', u'b3728353e9b8c0f6cf8ee4427633fa0b'], u'filename': u'libxslt-devel-1.1.26-2.0.2.el6_3.1.x86_64.rpm', u'epoch': u'0', u'version': u'1.1.26', u'release': u'2.0.2.el6_3.1', u'arch': u'x86_64'}, {u'src': None, u'name': u'libxslt-python', u'sum': [u'md5', u'ac392273743a6dc5670283f54176bee4'], u'filename': u'libxslt-python-1.1.26-2.0.2.el6_3.1.x86_64.rpm', u'epoch': u'0', u'version': u'1.1.26', u'release': u'2.0.2.el6_3.1', u'arch': u'x86_64'}], u'name': u'ol6_x86_64_latest', u'short': u'ol6_x86_64_latest'}, {u'packages': [{u'src': None, u'name': u'libxslt', u'sum': [u'md5', u'a6e1ee9344cdb62cbfc66ac051f1004a'], u'filename': u'libxslt-1.1.17-4.0.1.el5_8.3.i386.rpm', u'epoch': u'0', u'version': u'1.1.17', u'release': u'4.0.1.el5_8.3', u'arch': u'i386'}, {u'src': None, u'name': u'libxslt', u'sum': [u'md5', u'e65d44c59889b5291607df2521eecde0'], u'filename': u'libxslt-1.1.17-4.0.1.el5_8.3.src.rpm', u'epoch': u'0', u'version': u'1.1.17', u'release': u'4.0.1.el5_8.3', u'arch': u'src'}, {u'src': None, u'name': u'libxslt', u'sum': [u'md5', u'819e87f42ed06a00ebc3137ad2b25e3f'], u'filename': u'libxslt-1.1.17-4.0.1.el5_8.3.x86_64.rpm', u'epoch': u'0', u'version': u'1.1.17', u'release': u'4.0.1.el5_8.3', u'arch': u'x86_64'}, {u'src': None, u'name': u'libxslt-devel', u'sum': [u'md5', u'87a37151711db525d6c9c71b41304eed'], u'filename': u'libxslt-devel-1.1.17-4.0.1.el5_8.3.i386.rpm', u'epoch': u'0', u'version': u'1.1.17', u'release': u'4.0.1.el5_8.3', u'arch': u'i386'}, {u'src': None, u'name': u'libxslt-devel', u'sum': [u'md5', u'0763cb046cf3822c57d5809570222943'], u'filename': u'libxslt-devel-1.1.17-4.0.1.el5_8.3.x86_64.rpm', u'epoch': u'0', u'version': u'1.1.17', u'release': u'4.0.1.el5_8.3', u'arch': u'x86_64'}, {u'src': None, u'name': u'libxslt-python', u'sum': [u'md5', u'c73f7515f50e48bcda5278ce297e631a'], u'filename': u'libxslt-python-1.1.17-4.0.1.el5_8.3.x86_64.rpm', u'epoch': u'0', u'version': u'1.1.17', u'release': u'4.0.1.el5_8.3', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u'[32:9.7.0-10.P2.3]\n- fix CVE-2012-4244', u'issued': u'2012-09-14', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELSA-2012-1266.html', u'type': u'self', u'id': None, u'title': u'ELSA-2012-1266'}, {u'href': u'http://linux.oracle.com/cve/CVE-2012-4244.html', u'type': u'cve', u'id': u'CVE-2012-4244', u'title': u'CVE-2012-4244'}], u'_content_type_id': u'erratum', u'_id': u'2d925c2b-fe5c-4749-95cc-82622e6bf863', u'from': u'el-errata@oss.oracle.com', u'severity': u'Important', u'title': u' bind97 security update', u'_ns': u'units_erratum', u'rights': u'Copyright 2012 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 5', u'reboot_suggested': False, u'type': u'security', u'pkglist': [{u'packages': [{u'src': None, u'name': u'bind97', u'sum': [u'md5', u'1f6ba01d86d54b5e1d4590b43979a71c'], u'filename': u'bind97-9.7.0-10.P2.el5_8.3.src.rpm', u'epoch': u'32', u'version': u'9.7.0', u'release': u'10.P2.el5_8.3', u'arch': u'src'}, {u'src': None, u'name': u'bind97', u'sum': [u'md5', u'e8ce13ac7eb7f27d55788ec9d4254fa5'], u'filename': u'bind97-9.7.0-10.P2.el5_8.3.x86_64.rpm', u'epoch': u'32', u'version': u'9.7.0', u'release': u'10.P2.el5_8.3', u'arch': u'x86_64'}, {u'src': None, u'name': u'bind97-chroot', u'sum': [u'md5', u'67c88456e84be8fa072bee66040d9194'], u'filename': u'bind97-chroot-9.7.0-10.P2.el5_8.3.x86_64.rpm', u'epoch': u'32', u'version': u'9.7.0', u'release': u'10.P2.el5_8.3', u'arch': u'x86_64'}, {u'src': None, u'name': u'bind97-devel', u'sum': [u'md5', u'f167ecb985bac73b594926c157fd4cbe'], u'filename': u'bind97-devel-9.7.0-10.P2.el5_8.3.i386.rpm', u'epoch': u'32', u'version': u'9.7.0', u'release': u'10.P2.el5_8.3', u'arch': u'i386'}, {u'src': None, u'name': u'bind97-devel', u'sum': [u'md5', u'64b2503a3cf3e5813d76750690312845'], u'filename': u'bind97-devel-9.7.0-10.P2.el5_8.3.x86_64.rpm', u'epoch': u'32', u'version': u'9.7.0', u'release': u'10.P2.el5_8.3', u'arch': u'x86_64'}, {u'src': None, u'name': u'bind97-libs', u'sum': [u'md5', u'9925540e4c656f300dbf840f4ee070fd'], u'filename': u'bind97-libs-9.7.0-10.P2.el5_8.3.i386.rpm', u'epoch': u'32', u'version': u'9.7.0', u'release': u'10.P2.el5_8.3', u'arch': u'i386'}, {u'src': None, u'name': u'bind97-libs', u'sum': [u'md5', u'ec4a4f2d4322c1695f8bbb3064f930db'], u'filename': u'bind97-libs-9.7.0-10.P2.el5_8.3.x86_64.rpm', u'epoch': u'32', u'version': u'9.7.0', u'release': u'10.P2.el5_8.3', u'arch': u'x86_64'}, {u'src': None, u'name': u'bind97-utils', u'sum': [u'md5', u'bf28175c2f8d79d217e335f4364fbf5f'], u'filename': u'bind97-utils-9.7.0-10.P2.el5_8.3.x86_64.rpm', u'epoch': u'32', u'version': u'9.7.0', u'release': u'10.P2.el5_8.3', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u'[30:9.3.6-20.P1.4]\n- bind-chroot-admin: set correct permissions on /etc/named.conf during update\n\n[30:9.3.6-20.P1.3]\n- fix CVE-2012-4244', u'issued': u'2012-09-14', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELSA-2012-1267.html', u'type': u'self', u'id': None, u'title': u'ELSA-2012-1267'}, {u'href': u'http://linux.oracle.com/cve/CVE-2012-4244.html', u'type': u'cve', u'id': u'CVE-2012-4244', u'title': u'CVE-2012-4244'}], u'_content_type_id': u'erratum', u'_id': u'c7cd0de6-32ad-49d7-8444-886e1e7893f8', u'from': u'el-errata@oss.oracle.com', u'severity': u'Important', u'title': u' bind security and bug fix update', u'_ns': u'units_erratum', u'rights': u'Copyright 2012 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 5', u'reboot_suggested': False, u'type': u'security', u'pkglist': [{u'packages': [{u'src': None, u'name': u'bind', u'sum': [u'md5', u'd22bbbe769c2a9f6ec397faec358f250'], u'filename': u'bind-9.3.6-20.P1.el5_8.4.src.rpm', u'epoch': u'30', u'version': u'9.3.6', u'release': u'20.P1.el5_8.4', u'arch': u'src'}, {u'src': None, u'name': u'bind', u'sum': [u'md5', u'7c24391ff6dc77635f4cc77a786ce2bf'], u'filename': u'bind-9.3.6-20.P1.el5_8.4.x86_64.rpm', u'epoch': u'30', u'version': u'9.3.6', u'release': u'20.P1.el5_8.4', u'arch': u'x86_64'}, {u'src': None, u'name': u'bind-chroot', u'sum': [u'md5', u'187cb4a112602c59b8bae202b0d497de'], u'filename': u'bind-chroot-9.3.6-20.P1.el5_8.4.x86_64.rpm', u'epoch': u'30', u'version': u'9.3.6', u'release': u'20.P1.el5_8.4', u'arch': u'x86_64'}, {u'src': None, u'name': u'bind-devel', u'sum': [u'md5', u'393a8e16d19cb995f1e3d523d4d814f2'], u'filename': u'bind-devel-9.3.6-20.P1.el5_8.4.i386.rpm', u'epoch': u'30', u'version': u'9.3.6', u'release': u'20.P1.el5_8.4', u'arch': u'i386'}, {u'src': None, u'name': u'bind-devel', u'sum': [u'md5', u'8398937f442fc46f3f57f6b5b686b8df'], u'filename': u'bind-devel-9.3.6-20.P1.el5_8.4.x86_64.rpm', u'epoch': u'30', u'version': u'9.3.6', u'release': u'20.P1.el5_8.4', u'arch': u'x86_64'}, {u'src': None, u'name': u'bind-libbind-devel', u'sum': [u'md5', u'62d86a965baad30673f84ae446485ec1'], u'filename': u'bind-libbind-devel-9.3.6-20.P1.el5_8.4.i386.rpm', u'epoch': u'30', u'version': u'9.3.6', u'release': u'20.P1.el5_8.4', u'arch': u'i386'}, {u'src': None, u'name': u'bind-libbind-devel', u'sum': [u'md5', u'd5b51799cb786d26ee5a1d35fb6cfc16'], u'filename': u'bind-libbind-devel-9.3.6-20.P1.el5_8.4.x86_64.rpm', u'epoch': u'30', u'version': u'9.3.6', u'release': u'20.P1.el5_8.4', u'arch': u'x86_64'}, {u'src': None, u'name': u'bind-libs', u'sum': [u'md5', u'3cdbff26be935373c24b609a35b33563'], u'filename': u'bind-libs-9.3.6-20.P1.el5_8.4.i386.rpm', u'epoch': u'30', u'version': u'9.3.6', u'release': u'20.P1.el5_8.4', u'arch': u'i386'}, {u'src': None, u'name': u'bind-libs', u'sum': [u'md5', u'ce644773fce13bc2bfe5fa529d443cbe'], u'filename': u'bind-libs-9.3.6-20.P1.el5_8.4.x86_64.rpm', u'epoch': u'30', u'version': u'9.3.6', u'release': u'20.P1.el5_8.4', u'arch': u'x86_64'}, {u'src': None, u'name': u'bind-sdb', u'sum': [u'md5', u'4ed67873ace069f99aa18eb1589fafe5'], u'filename': u'bind-sdb-9.3.6-20.P1.el5_8.4.x86_64.rpm', u'epoch': u'30', u'version': u'9.3.6', u'release': u'20.P1.el5_8.4', u'arch': u'x86_64'}, {u'src': None, u'name': u'bind-utils', u'sum': [u'md5', u'5e828b7009e6117c4930dfcaa2068944'], u'filename': u'bind-utils-9.3.6-20.P1.el5_8.4.x86_64.rpm', u'epoch': u'30', u'version': u'9.3.6', u'release': u'20.P1.el5_8.4', u'arch': u'x86_64'}, {u'src': None, u'name': u'caching-nameserver', u'sum': [u'md5', u'910217fb6481ad74db3287f3e70ab97d'], u'filename': u'caching-nameserver-9.3.6-20.P1.el5_8.4.x86_64.rpm', u'epoch': u'30', u'version': u'9.3.6', u'release': u'20.P1.el5_8.4', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u'[2.7.6-8.0.1.el6_3.3 ]\n- Update doc/redhat.gif in tarball\n- Add libxml2-oracle-enterprise.patch and update logos in tarball\n\n[2.7.6-8.el6_3.3]\n- Change the XPath code to percolate allocation error (CVE-2011-1944)\n\n[2.7.6-8.el6_3.2]\n- Fix an off by one pointer access (CVE-2011-3102)\n\n[2.7.6-8.el6_3.1]\n- Fix a failure to report xmlreader parsing failures\n- Fix parser local buffers size problems (rhbz#843741)\n- Fix entities local buffers size problems (rhbz#843741)\n- Fix an error in previous commit (rhbz#843741)\n- Do not fetch external parsed entities\n- Impose a reasonable limit on attribute size (rhbz#843741)\n- Impose a reasonable limit on comment size (rhbz#843741)\n- Impose a reasonable limit on PI size (rhbz#843741)\n- Cleanups and new limit APIs for dictionaries (rhbz#843741)\n- Introduce some default parser limits (rhbz#843741)\n- Implement some default limits in the XPath module\n- Fixup limits parser (rhbz#843741)\n- Enforce XML_PARSER_EOF state handling through the parser\n- Avoid quadratic behaviour in some push parsing cases (rhbz#843741)\n- More avoid quadratic behaviour (rhbz#843741)\n- Strengthen behaviour of the push parser in problematic situations (rhbz#843741)\n- More fixups on the push parser behaviour (rhbz#843741)\n- Fix a segfault on XSD validation on pattern error\n- Fix an unimplemented part in RNG value validation\n\n[2.7.6-8.el6]\n- remove chunk in patch related to configure.in as it breaks rebuild\n- Resolves: rhbz#788846\n\n[2.7.6-7.el6]\n- fix previous build to force compilation of randomization code\n- Resolves: rhbz#788846\n\n[2.7.6-6.el6]\n- adds randomization to hash and dict structures CVE-2012-0841\n- Resolves: rhbz#788846\n\n[2.7.6-5.el6]\n- Make sure the parser returns when getting a Stop order CVE-2011-3905\n- Fix an allocation error when copying entities CVE-2011-3919\n- Resolves: rhbz#771910', u'issued': u'2012-09-18', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELSA-2012-1288.html', u'type': u'self', u'id': None, u'title': u'ELSA-2012-1288'}, {u'href': u'http://linux.oracle.com/cve/CVE-2011-3102.html', u'type': u'cve', u'id': u'CVE-2011-3102', u'title': u'CVE-2011-3102'}, {u'href': u'http://linux.oracle.com/cve/CVE-2012-2807.html', u'type': u'cve', u'id': u'CVE-2012-2807', u'title': u'CVE-2012-2807'}], u'_content_type_id': u'erratum', u'_id': u'856bb834-e255-46ee-85e7-0726fdad45be', u'from': u'el-errata@oss.oracle.com', u'severity': u'Moderate', u'title': u' libxml2 security update', u'_ns': u'units_erratum', u'rights': u'Copyright 2012 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 6', u'reboot_suggested': False, u'type': u'security', u'pkglist': [{u'packages': [{u'src': None, u'name': u'libxml2', u'sum': [u'md5', u'44babacec27efd9b543110cd9e59e02b'], u'filename': u'libxml2-2.7.6-8.0.1.el6_3.3.i686.rpm', u'epoch': u'0', u'version': u'2.7.6', u'release': u'8.0.1.el6_3.3', u'arch': u'i686'}, {u'src': None, u'name': u'libxml2', u'sum': [u'md5', u'7402acd068adf3095a02164394f43411'], u'filename': u'libxml2-2.7.6-8.0.1.el6_3.3.src.rpm', u'epoch': u'0', u'version': u'2.7.6', u'release': u'8.0.1.el6_3.3', u'arch': u'src'}, {u'src': None, u'name': u'libxml2', u'sum': [u'md5', u'0c0d6ef1267d478bc752984ee44ab11b'], u'filename': u'libxml2-2.7.6-8.0.1.el6_3.3.x86_64.rpm', u'epoch': u'0', u'version': u'2.7.6', u'release': u'8.0.1.el6_3.3', u'arch': u'x86_64'}, {u'src': None, u'name': u'libxml2-devel', u'sum': [u'md5', u'29244b17fa7a124894d2fad1e1a7c1de'], u'filename': u'libxml2-devel-2.7.6-8.0.1.el6_3.3.i686.rpm', u'epoch': u'0', u'version': u'2.7.6', u'release': u'8.0.1.el6_3.3', u'arch': u'i686'}, {u'src': None, u'name': u'libxml2-devel', u'sum': [u'md5', u'681e4c60f7eefebc015996370ccef52e'], u'filename': u'libxml2-devel-2.7.6-8.0.1.el6_3.3.x86_64.rpm', u'epoch': u'0', u'version': u'2.7.6', u'release': u'8.0.1.el6_3.3', u'arch': u'x86_64'}, {u'src': None, u'name': u'libxml2-python', u'sum': [u'md5', u'28b4f00aa9b428974f84ea0840cdcf25'], u'filename': u'libxml2-python-2.7.6-8.0.1.el6_3.3.x86_64.rpm', u'epoch': u'0', u'version': u'2.7.6', u'release': u'8.0.1.el6_3.3', u'arch': u'x86_64'}, {u'src': None, u'name': u'libxml2-static', u'sum': [u'md5', u'6a9afa4c85b91ac48058998db948832a'], u'filename': u'libxml2-static-2.7.6-8.0.1.el6_3.3.x86_64.rpm', u'epoch': u'0', u'version': u'2.7.6', u'release': u'8.0.1.el6_3.3', u'arch': u'x86_64'}], u'name': u'ol6_x86_64_latest', u'short': u'ol6_x86_64_latest'}, {u'packages': [{u'src': None, u'name': u'libxml2', u'sum': [u'md5', u'e7db448df92a0cb9b19893b603467703'], u'filename': u'libxml2-2.6.26-2.1.15.0.1.el5_8.5.i386.rpm', u'epoch': u'0', u'version': u'2.6.26', u'release': u'2.1.15.0.1.el5_8.5', u'arch': u'i386'}, {u'src': None, u'name': u'libxml2', u'sum': [u'md5', u'4dd40bb169d4e34a122568bf64399a42'], u'filename': u'libxml2-2.6.26-2.1.15.0.1.el5_8.5.src.rpm', u'epoch': u'0', u'version': u'2.6.26', u'release': u'2.1.15.0.1.el5_8.5', u'arch': u'src'}, {u'src': None, u'name': u'libxml2', u'sum': [u'md5', u'627bf37b5dde7b308b29cc7a5d187bd9'], u'filename': u'libxml2-2.6.26-2.1.15.0.1.el5_8.5.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.26', u'release': u'2.1.15.0.1.el5_8.5', u'arch': u'x86_64'}, {u'src': None, u'name': u'libxml2-devel', u'sum': [u'md5', u'26fca7c50675ee5620308fd3efc20a94'], u'filename': u'libxml2-devel-2.6.26-2.1.15.0.1.el5_8.5.i386.rpm', u'epoch': u'0', u'version': u'2.6.26', u'release': u'2.1.15.0.1.el5_8.5', u'arch': u'i386'}, {u'src': None, u'name': u'libxml2-devel', u'sum': [u'md5', u'f9e3e93206017d5401efdabd329444f2'], u'filename': u'libxml2-devel-2.6.26-2.1.15.0.1.el5_8.5.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.26', u'release': u'2.1.15.0.1.el5_8.5', u'arch': u'x86_64'}, {u'src': None, u'name': u'libxml2-python', u'sum': [u'md5', u'31dbb3295c6d44b195261c1dbcf62947'], u'filename': u'libxml2-python-2.6.26-2.1.15.0.1.el5_8.5.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.26', u'release': u'2.1.15.0.1.el5_8.5', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u'kernel\n[2.6.18-308.16.1.el5]\n- Revert: [fs] nfsd4: Remove check for a 32-bit cookie in nfsd4_readdir() (Eric Sandeen) [847943 784191]\n- Revert: [fs] add new FMODE flags: FMODE_32bithash and FMODE_64bithash (Eric Sandeen) [847943 784191]\n- Revert: [fs] nfsd: rename int access to int may_flags in nfsd_open() (Eric Sandeen) [847943 784191]\n- Revert: [fs] nfsd: vfs_llseek() with 32 or 64 bit offsets (hashes) (Eric Sandeen) [847943 784191]\n- Revert: [fs] vfs: add generic_file_llseek_size (Eric Sandeen) [847943 784191]\n- Revert: [s390/ppc64] add is_compat_task() for s390 and ppc64 (Eric Sandeen) [847943 784191]\n- Revert: [fs] ext3: return 32/64-bit dir name hash according to usage type (Eric Sandeen) [847943 784191]\n- Revert: [fs] ext4: improve llseek error handling for large seek offsets (Eric Sandeen) [847943 784191]\n- Revert: [fs] ext4: return 32/64-bit dir name hash according to usage type (Eric Sandeen) [847943 784191]\n- Revert: [fs] vfs: allow custom EOF in generic_file_llseek code (Eric Sandeen) [847943 784191]\n- Revert: [fs] ext4: use core vfs llseek code for dir seeks (Eric Sandeen) [847943 784191]\n- Revert: [fs] ext3: pass custom EOF to generic_file_llseek_size() (Eric Sandeen) [847943 784191]\n\n[2.6.18-308.15.1.el5]\n- [net] sfc: Fix max no of TSO segments and min TX queue size (Michal Schmidt) [845554 845555] {CVE-2012-3412}\n- [kernel] xacct_add_tsk: fix pure theoretical ->mm use-after-free (Nikola Pajkovsky) [849723 849725] {CVE-2012-3510}\n- [fs] hfsplus: Buffer overflow in the HFS plus filesystem (Jacob Tanenbaum) [820255 820256] {CVE-2012-2319}\n- [net] netfilter: add dscp netfilter match (Thomas Graf) [847327 842029]\n- [net] rds: set correct msg_namelen (Weiping Pan) [822727 822728] {CVE-2012-3430}\n- [misc] ERESTARTNOINTR seen from fork call in userspace (Oleg Nesterov) [847359 693822]\n- [fs] quota: manage reserved space when quota is not active (Eric Sandeen) [847326 818087]\n- [fs] quota: Fix warning if delayed write before quota is enabled (Eric Sandeen) [847326 818087]\n- [fs] ext3: pass custom EOF to generic_file_llseek_size() (Eric Sandeen) [847943 784191]\n- [fs] ext4: use core vfs llseek code for dir seeks (Eric Sandeen) [847943 784191]\n- [fs] vfs: allow custom EOF in generic_file_llseek code (Eric Sandeen) [847943 784191]\n- [fs] ext4: return 32/64-bit dir name hash according to usage type (Eric Sandeen) [847943 784191]\n- [fs] ext4: improve llseek error handling for large seek offsets (Eric Sandeen) [847943 784191]\n- [fs] ext3: return 32/64-bit dir name hash according to usage type (Eric Sandeen) [847943 784191]\n- [s390/ppc64] add is_compat_task() for s390 and ppc64 (Eric Sandeen) [847943 784191]\n- [fs] vfs: add generic_file_llseek_size (Eric Sandeen) [847943 784191]\n- [fs] nfsd: vfs_llseek() with 32 or 64 bit offsets (hashes) (Eric Sandeen) [847943 784191]\n- [fs] nfsd: rename int access to int may_flags in nfsd_open() (Eric Sandeen) [847943 784191]\n- [fs] add new FMODE flags: FMODE_32bithash and FMODE_64bithash (Eric Sandeen) [847943 784191]\n- [fs] nfsd4: Remove check for a 32-bit cookie in nfsd4_readdir() (Eric Sandeen) [847943 784191]\n- [xen] x86: whitelist Enhanced SpeedStep for dom0 (Laszlo Ersek) [846125 809103]\n\n[2.6.18-308.14.1.el5]\n- [net] e1000e: drop check of RXCW.CW to eliminate link up and down (Dean Nelson) [852448 840642]', u'issued': u'2012-10-02', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELSA-2012-1323.html', u'type': u'self', u'id': None, u'title': u'ELSA-2012-1323'}, {u'href': u'http://linux.oracle.com/cve/CVE-2012-3430.html', u'type': u'cve', u'id': u'CVE-2012-3430', u'title': u'CVE-2012-3430'}, {u'href': u'http://linux.oracle.com/cve/CVE-2012-2319.html', u'type': u'cve', u'id': u'CVE-2012-2319', u'title': u'CVE-2012-2319'}, {u'href': u'http://linux.oracle.com/cve/CVE-2012-3412.html', u'type': u'cve', u'id': u'CVE-2012-3412', u'title': u'CVE-2012-3412'}, {u'href': u'http://linux.oracle.com/cve/CVE-2012-3510.html', u'type': u'cve', u'id': u'CVE-2012-3510', u'title': u'CVE-2012-3510'}], u'_content_type_id': u'erratum', u'_id': u'b8f497af-e2c2-4241-a6c1-d9099222abcd', u'from': u'el-errata@oss.oracle.com', u'severity': u'Important', u'title': u' kernel security and bug fix update', u'_ns': u'units_erratum', u'rights': u'Copyright 2012 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 5', u'reboot_suggested': False, u'type': u'security', u'pkglist': [{u'packages': [{u'src': None, u'name': u'kernel', u'sum': [u'md5', u'7c28432636abdafa211ce1e7091196d5'], u'filename': u'kernel-2.6.18-308.16.1.el5.src.rpm', u'epoch': u'0', u'version': u'2.6.18', u'release': u'308.16.1.el5', u'arch': u'src'}, {u'src': None, u'name': u'kernel', u'sum': [u'md5', u'd44c404e63946122ece0c5eaf0c1ccdc'], u'filename': u'kernel-2.6.18-308.16.1.el5.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.18', u'release': u'308.16.1.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'kernel-debug', u'sum': [u'md5', u'3c469b976ec2a37f5712c8108840e232'], u'filename': u'kernel-debug-2.6.18-308.16.1.el5.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.18', u'release': u'308.16.1.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'kernel-debug-devel', u'sum': [u'md5', u'f903cf413a5b9024a13ad1e18ea8f465'], u'filename': u'kernel-debug-devel-2.6.18-308.16.1.el5.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.18', u'release': u'308.16.1.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'kernel-devel', u'sum': [u'md5', u'8e44feee70d5c2c922b82592b170670f'], u'filename': u'kernel-devel-2.6.18-308.16.1.el5.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.18', u'release': u'308.16.1.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'kernel-doc', u'sum': [u'md5', u'bb76cc7896a20b4e75b7b1807976cf99'], u'filename': u'kernel-doc-2.6.18-308.16.1.el5.noarch.rpm', u'epoch': u'0', u'version': u'2.6.18', u'release': u'308.16.1.el5', u'arch': u'noarch'}, {u'src': None, u'name': u'kernel-headers', u'sum': [u'md5', u'1e7c07736ce48dad0b9c8c8ea43c5128'], u'filename': u'kernel-headers-2.6.18-308.16.1.el5.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.18', u'release': u'308.16.1.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'kernel-xen', u'sum': [u'md5', u'ca4304f90a4d508c61268c8437aed8ec'], u'filename': u'kernel-xen-2.6.18-308.16.1.el5.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.18', u'release': u'308.16.1.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'kernel-xen-devel', u'sum': [u'md5', u'435953b7e2f8679e3fbc3ec694c3de8e'], u'filename': u'kernel-xen-devel-2.6.18-308.16.1.el5.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.18', u'release': u'308.16.1.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'ocfs2-2.6.18-308.16.1.el5', u'sum': [u'md5', u'826deb03719b63ec6c8fab5fd50b7bb5'], u'filename': u'ocfs2-2.6.18-308.16.1.el5-1.4.10-1.el5.src.rpm', u'epoch': u'0', u'version': u'1.4.10', u'release': u'1.el5', u'arch': u'src'}, {u'src': None, u'name': u'ocfs2-2.6.18-308.16.1.el5', u'sum': [u'md5', u'7703fcc560aa039a54d3bcb4ddd55c83'], u'filename': u'ocfs2-2.6.18-308.16.1.el5-1.4.10-1.el5.x86_64.rpm', u'epoch': u'0', u'version': u'1.4.10', u'release': u'1.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'ocfs2-2.6.18-308.16.1.el5debug', u'sum': [u'md5', u'c84e9fff4c93afd4ee722d849be4fd70'], u'filename': u'ocfs2-2.6.18-308.16.1.el5debug-1.4.10-1.el5.x86_64.rpm', u'epoch': u'0', u'version': u'1.4.10', u'release': u'1.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'ocfs2-2.6.18-308.16.1.el5xen', u'sum': [u'md5', u'eef6db9f5aeb2f7d7ebd1f18d393cbf9'], u'filename': u'ocfs2-2.6.18-308.16.1.el5xen-1.4.10-1.el5.x86_64.rpm', u'epoch': u'0', u'version': u'1.4.10', u'release': u'1.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'oracleasm-2.6.18-308.16.1.el5', u'sum': [u'md5', u'20e37be8a5af1648254c95c0b1b811a9'], u'filename': u'oracleasm-2.6.18-308.16.1.el5-2.0.5-1.el5.src.rpm', u'epoch': u'0', u'version': u'2.0.5', u'release': u'1.el5', u'arch': u'src'}, {u'src': None, u'name': u'oracleasm-2.6.18-308.16.1.el5', u'sum': [u'md5', u'de445836a7e5bbfe25beae5aa59cba94'], u'filename': u'oracleasm-2.6.18-308.16.1.el5-2.0.5-1.el5.x86_64.rpm', u'epoch': u'0', u'version': u'2.0.5', u'release': u'1.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'oracleasm-2.6.18-308.16.1.el5debug', u'sum': [u'md5', u'51118339dce24cff89482f06c1adb8e3'], u'filename': u'oracleasm-2.6.18-308.16.1.el5debug-2.0.5-1.el5.x86_64.rpm', u'epoch': u'0', u'version': u'2.0.5', u'release': u'1.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'oracleasm-2.6.18-308.16.1.el5xen', u'sum': [u'md5', u'f9a9fa926e0092130352bc5966c3fb78'], u'filename': u'oracleasm-2.6.18-308.16.1.el5xen-2.0.5-1.el5.x86_64.rpm', u'epoch': u'0', u'version': u'2.0.5', u'release': u'1.el5', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u'kernel\n[2.6.18-308.16.1.0.1.el5]\n- [kernel] Initialize the local uninitialized variable stats. [orabug 14051367]\n- [fs] JBD:make jbd support 512B blocks correctly for ocfs2. [orabug 13477763]\n- [x86 ] fix fpu context corrupt when preempt in signal context [orabug 14038272]\n- [net] bonding: fix carrier detect when bond is down [orabug 12377284]\n- [mm] fix hugetlb page leak (Dave McCracken) [orabug 12375075]\n- fix ia64 build error due to add-support-above-32-vcpus.patch(Zhenzhong Duan)\n- [x86] use dynamic vcpu_info remap to support more than 32 vcpus (Zhenzhong Duan)\n- [x86] Fix lvt0 reset when hvm boot up with noapic param\n- [scsi] remove printks when doing I/O to a dead device (John Sobecki, Chris Mason)\n [orabug 12342275]\n- [char] ipmi: Fix IPMI errors due to timing problems (Joe Jin) [orabug 12561346]\n- [scsi] Fix race when removing SCSI devices (Joe Jin) [orabug 12404566]\n- [net] net: Redo the broken redhat netconsole over bonding (Tina Yang) [orabug 12740042]\n- [fs] nfs: Fix __put_nfs_open_context() NULL pointer panic (Joe Jin) [orabug 12687646]\n- [scsi] fix scsi hotplug and rescan race [orabug 10260172]\n- fix filp_close() race (Joe Jin) [orabug 10335998]\n- make xenkbd.abs_pointer=1 by default [orabug 67188919]\n- [xen] check to see if hypervisor supports memory reservation change\n (Chuck Anderson) [orabug 7556514]\n- [net] Enable entropy for bnx2,bnx2x,e1000e,igb,ixgb,ixgbe,ixgbevf (John Sobecki)\n [orabug 10315433]\n- [NET] Add xen pv netconsole support (Tina Yang) [orabug 6993043] [bz 7258]\n- [mm] shrink_zone patch (John Sobecki,Chris Mason) [orabug 6086839]\n- fix aacraid not to reset during kexec (Joe Jin) [orabug 8516042]\n- [rds] Patch rds to 1.4.2-20 (Andy Grover) [orabug 9471572, 9344105]\n RDS: Fix BUG_ONs to not fire when in a tasklet\n ipoib: Fix lockup of the tx queue\n RDS: Do not call set_page_dirty() with irqs off (Sherman Pun)\n RDS: Properly unmap when getting a remote access error (Tina Yang)\n RDS: Fix locking in rds_send_drop_to()\n- [xen] PVHVM guest with PoD crashes under memory pressure (Chuck Anderson)\n [orabug 9107465]\n- [xen] PV guest with FC HBA hangs during shutdown (Chuck Anderson)\n [orabug 9764220]\n- Support 256GB+ memory for pv guest (Mukesh Rathor) [orabug 9450615]\n- fix overcommit memory to use percpu_counter for el5 (KOSAKI Motohiro,\n Guru Anbalagane) [orabug 6124033]\n- [ipmi] make configurable timeouts for kcs of ipmi [orabug 9752208]\n- [ib] fix memory corruption (Andy Grover) [orabug 9972346]\n\n[2.6.18-308.16.1.el5]\n- Revert: [fs] nfsd4: Remove check for a 32-bit cookie in nfsd4_readdir() (Eric Sandeen) [847943 784191]\n- Revert: [fs] add new FMODE flags: FMODE_32bithash and FMODE_64bithash (Eric Sandeen) [847943 784191]\n- Revert: [fs] nfsd: rename int access to int may_flags in nfsd_open() (Eric Sandeen) [847943 784191]\n- Revert: [fs] nfsd: vfs_llseek() with 32 or 64 bit offsets (hashes) (Eric Sandeen) [847943 784191]\n- Revert: [fs] vfs: add generic_file_llseek_size (Eric Sandeen) [847943 784191]\n- Revert: [s390/ppc64] add is_compat_task() for s390 and ppc64 (Eric Sandeen) [847943 784191]\n- Revert: [fs] ext3: return 32/64-bit dir name hash according to usage type (Eric Sandeen) [847943 784191]\n- Revert: [fs] ext4: improve llseek error handling for large seek offsets (Eric Sandeen) [847943 784191]\n- Revert: [fs] ext4: return 32/64-bit dir name hash according to usage type (Eric Sandeen) [847943 784191]\n- Revert: [fs] vfs: allow custom EOF in generic_file_llseek code (Eric Sandeen) [847943 784191]\n- Revert: [fs] ext4: use core vfs llseek code for dir seeks (Eric Sandeen) [847943 784191]\n- Revert: [fs] ext3: pass custom EOF to generic_file_llseek_size() (Eric Sandeen) [847943 784191]\n\n[2.6.18-308.15.1.el5]\n- [net] sfc: Fix max no of TSO segments and min TX queue size (Michal Schmidt) [845554 845555] {CVE-2012-3412}\n- [kernel] xacct_add_tsk: fix pure theoretical ->mm use-after-free (Nikola Pajkovsky) [849723 849725] {CVE-2012-3510}\n- [fs] hfsplus: Buffer overflow in the HFS plus filesystem (Jacob Tanenbaum) [820255 820256] {CVE-2012-2319}\n- [net] netfilter: add dscp netfilter match (Thomas Graf) [847327 842029]\n- [net] rds: set correct msg_namelen (Weiping Pan) [822727 822728] {CVE-2012-3430}\n- [misc] ERESTARTNOINTR seen from fork call in userspace (Oleg Nesterov) [847359 693822]\n- [fs] quota: manage reserved space when quota is not active (Eric Sandeen) [847326 818087]\n- [fs] quota: Fix warning if delayed write before quota is enabled (Eric Sandeen) [847326 818087]\n- [fs] ext3: pass custom EOF to generic_file_llseek_size() (Eric Sandeen) [847943 784191]\n- [fs] ext4: use core vfs llseek code for dir seeks (Eric Sandeen) [847943 784191]\n- [fs] vfs: allow custom EOF in generic_file_llseek code (Eric Sandeen) [847943 784191]\n- [fs] ext4: return 32/64-bit dir name hash according to usage type (Eric Sandeen) [847943 784191]\n- [fs] ext4: improve llseek error handling for large seek offsets (Eric Sandeen) [847943 784191]\n- [fs] ext3: return 32/64-bit dir name hash according to usage type (Eric Sandeen) [847943 784191]\n- [s390/ppc64] add is_compat_task() for s390 and ppc64 (Eric Sandeen) [847943 784191]\n- [fs] vfs: add generic_file_llseek_size (Eric Sandeen) [847943 784191]\n- [fs] nfsd: vfs_llseek() with 32 or 64 bit offsets (hashes) (Eric Sandeen) [847943 784191]\n- [fs] nfsd: rename int access to int may_flags in nfsd_open() (Eric Sandeen) [847943 784191]\n- [fs] add new FMODE flags: FMODE_32bithash and FMODE_64bithash (Eric Sandeen) [847943 784191]\n- [fs] nfsd4: Remove check for a 32-bit cookie in nfsd4_readdir() (Eric Sandeen) [847943 784191]\n- [xen] x86: whitelist Enhanced SpeedStep for dom0 (Laszlo Ersek) [846125 809103]\n\n[2.6.18-308.14.1.el5]\n- [net] e1000e: drop check of RXCW.CW to eliminate link up and down (Dean Nelson) [852448 840642]', u'issued': u'2012-10-02', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELSA-2012-1323-1.html', u'type': u'self', u'id': None, u'title': u'ELSA-2012-1323-1'}, {u'href': u'http://linux.oracle.com/cve/CVE-2012-3430.html', u'type': u'cve', u'id': u'CVE-2012-3430', u'title': u'CVE-2012-3430'}, {u'href': u'http://linux.oracle.com/cve/CVE-2012-2319.html', u'type': u'cve', u'id': u'CVE-2012-2319', u'title': u'CVE-2012-2319'}, {u'href': u'http://linux.oracle.com/cve/CVE-2012-3412.html', u'type': u'cve', u'id': u'CVE-2012-3412', u'title': u'CVE-2012-3412'}, {u'href': u'http://linux.oracle.com/cve/CVE-2012-3510.html', u'type': u'cve', u'id': u'CVE-2012-3510', u'title': u'CVE-2012-3510'}], u'_content_type_id': u'erratum', u'_id': u'2ef0fd6c-1660-4621-9ea0-e3b9f4730e15', u'from': u'el-errata@oss.oracle.com', u'severity': u'Important', u'title': u' kernel security and bug fix update', u'_ns': u'units_erratum', u'rights': u'Copyright 2012 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 5', u'reboot_suggested': False, u'type': u'security', u'pkglist': [{u'packages': [{u'src': None, u'name': u'kernel', u'sum': [u'md5', u'014b9f74a2b72f575bde3bfafa4cb16c'], u'filename': u'kernel-2.6.18-308.16.1.0.1.el5.src.rpm', u'epoch': u'0', u'version': u'2.6.18', u'release': u'308.16.1.0.1.el5', u'arch': u'src'}, {u'src': None, u'name': u'kernel', u'sum': [u'md5', u'1f9075c6b16d6364d7107ee7b8b310af'], u'filename': u'kernel-2.6.18-308.16.1.0.1.el5.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.18', u'release': u'308.16.1.0.1.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'kernel-debug', u'sum': [u'md5', u'7605428694b2586301af4829c671a724'], u'filename': u'kernel-debug-2.6.18-308.16.1.0.1.el5.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.18', u'release': u'308.16.1.0.1.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'kernel-debug-devel', u'sum': [u'md5', u'9a4a16ce747ac1d890b5de3b3c8dd0e3'], u'filename': u'kernel-debug-devel-2.6.18-308.16.1.0.1.el5.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.18', u'release': u'308.16.1.0.1.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'kernel-devel', u'sum': [u'md5', u'68e1c0649e70e0acf8592a9b8f815915'], u'filename': u'kernel-devel-2.6.18-308.16.1.0.1.el5.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.18', u'release': u'308.16.1.0.1.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'kernel-doc', u'sum': [u'md5', u'5350c60e0c37c10350ad23476774fe56'], u'filename': u'kernel-doc-2.6.18-308.16.1.0.1.el5.noarch.rpm', u'epoch': u'0', u'version': u'2.6.18', u'release': u'308.16.1.0.1.el5', u'arch': u'noarch'}, {u'src': None, u'name': u'kernel-headers', u'sum': [u'md5', u'ae06bdea5b14fe07622a33199dcfd4dc'], u'filename': u'kernel-headers-2.6.18-308.16.1.0.1.el5.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.18', u'release': u'308.16.1.0.1.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'kernel-xen', u'sum': [u'md5', u'ea6ce4da1da4fce763bcab203059f8d8'], u'filename': u'kernel-xen-2.6.18-308.16.1.0.1.el5.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.18', u'release': u'308.16.1.0.1.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'kernel-xen-devel', u'sum': [u'md5', u'3f53cfa35f53b1f192bb4175a015694e'], u'filename': u'kernel-xen-devel-2.6.18-308.16.1.0.1.el5.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.18', u'release': u'308.16.1.0.1.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'ocfs2-2.6.18-308.16.1.0.1.el5', u'sum': [u'md5', u'9dc41060b095afe224ab7b35908ba9a8'], u'filename': u'ocfs2-2.6.18-308.16.1.0.1.el5-1.4.10-1.el5.src.rpm', u'epoch': u'0', u'version': u'1.4.10', u'release': u'1.el5', u'arch': u'src'}, {u'src': None, u'name': u'ocfs2-2.6.18-308.16.1.0.1.el5', u'sum': [u'md5', u'09237483c3ac6ce94c6dee2ac054f335'], u'filename': u'ocfs2-2.6.18-308.16.1.0.1.el5-1.4.10-1.el5.x86_64.rpm', u'epoch': u'0', u'version': u'1.4.10', u'release': u'1.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'ocfs2-2.6.18-308.16.1.0.1.el5debug', u'sum': [u'md5', u'a168c0b22d6bdeee24de95e599afff88'], u'filename': u'ocfs2-2.6.18-308.16.1.0.1.el5debug-1.4.10-1.el5.x86_64.rpm', u'epoch': u'0', u'version': u'1.4.10', u'release': u'1.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'ocfs2-2.6.18-308.16.1.0.1.el5xen', u'sum': [u'md5', u'96196c03b31286ccdf6a7f9e1b7af1e5'], u'filename': u'ocfs2-2.6.18-308.16.1.0.1.el5xen-1.4.10-1.el5.x86_64.rpm', u'epoch': u'0', u'version': u'1.4.10', u'release': u'1.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'oracleasm-2.6.18-308.16.1.0.1.el5', u'sum': [u'md5', u'9ad379b6c73f356f130a532ad1ba80a7'], u'filename': u'oracleasm-2.6.18-308.16.1.0.1.el5-2.0.5-1.el5.src.rpm', u'epoch': u'0', u'version': u'2.0.5', u'release': u'1.el5', u'arch': u'src'}, {u'src': None, u'name': u'oracleasm-2.6.18-308.16.1.0.1.el5', u'sum': [u'md5', u'0275ceaacaee741780804183dcbb0fd1'], u'filename': u'oracleasm-2.6.18-308.16.1.0.1.el5-2.0.5-1.el5.x86_64.rpm', u'epoch': u'0', u'version': u'2.0.5', u'release': u'1.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'oracleasm-2.6.18-308.16.1.0.1.el5debug', u'sum': [u'md5', u'cd0b2a5277b2ae733575efff09bdc93c'], u'filename': u'oracleasm-2.6.18-308.16.1.0.1.el5debug-2.0.5-1.el5.x86_64.rpm', u'epoch': u'0', u'version': u'2.0.5', u'release': u'1.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'oracleasm-2.6.18-308.16.1.0.1.el5xen', u'sum': [u'md5', u'af19b4df724fa7856a40a2511230be70'], u'filename': u'oracleasm-2.6.18-308.16.1.0.1.el5xen-2.0.5-1.el5.x86_64.rpm', u'epoch': u'0', u'version': u'2.0.5', u'release': u'1.el5', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u'[2.1.12-4]\n- resolves: bug#855315\n CVE-2012-3547 freeradius: Stack-based buffer overflow by processing\n certain expiration date fields of a certificate during x509 certificate\n validation', u'issued': u'2012-10-02', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELSA-2012-1327.html', u'type': u'self', u'id': None, u'title': u'ELSA-2012-1327'}, {u'href': u'http://linux.oracle.com/cve/CVE-2012-3547.html', u'type': u'cve', u'id': u'CVE-2012-3547', u'title': u'CVE-2012-3547'}], u'_content_type_id': u'erratum', u'_id': u'c23003fe-0d1a-4f24-b0f6-1e26d364b0f1', u'from': u'el-errata@oss.oracle.com', u'severity': u'Moderate', u'title': u' freeradius2 security update', u'_ns': u'units_erratum', u'rights': u'Copyright 2012 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 5', u'reboot_suggested': False, u'type': u'security', u'pkglist': [{u'packages': [{u'src': None, u'name': u'freeradius2', u'sum': [u'md5', u'2ccb4d9a4c31e1476844896b33b8b84f'], u'filename': u'freeradius2-2.1.12-4.el5_8.src.rpm', u'epoch': u'0', u'version': u'2.1.12', u'release': u'4.el5_8', u'arch': u'src'}, {u'src': None, u'name': u'freeradius2', u'sum': [u'md5', u'496200feb84b63eccd6a86314614bcfd'], u'filename': u'freeradius2-2.1.12-4.el5_8.x86_64.rpm', u'epoch': u'0', u'version': u'2.1.12', u'release': u'4.el5_8', u'arch': u'x86_64'}, {u'src': None, u'name': u'freeradius2-krb5', u'sum': [u'md5', u'1a3ac19096601303d74bbeed633365c9'], u'filename': u'freeradius2-krb5-2.1.12-4.el5_8.x86_64.rpm', u'epoch': u'0', u'version': u'2.1.12', u'release': u'4.el5_8', u'arch': u'x86_64'}, {u'src': None, u'name': u'freeradius2-ldap', u'sum': [u'md5', u'0e5765fd49b1870053e598e8750f40d4'], u'filename': u'freeradius2-ldap-2.1.12-4.el5_8.x86_64.rpm', u'epoch': u'0', u'version': u'2.1.12', u'release': u'4.el5_8', u'arch': u'x86_64'}, {u'src': None, u'name': u'freeradius2-mysql', u'sum': [u'md5', u'976c7e906bbbba1809d5e3f16c4d3a39'], u'filename': u'freeradius2-mysql-2.1.12-4.el5_8.x86_64.rpm', u'epoch': u'0', u'version': u'2.1.12', u'release': u'4.el5_8', u'arch': u'x86_64'}, {u'src': None, u'name': u'freeradius2-perl', u'sum': [u'md5', u'5afb6110bc9d1733582866c9e670700f'], u'filename': u'freeradius2-perl-2.1.12-4.el5_8.x86_64.rpm', u'epoch': u'0', u'version': u'2.1.12', u'release': u'4.el5_8', u'arch': u'x86_64'}, {u'src': None, u'name': u'freeradius2-postgresql', u'sum': [u'md5', u'1c1fd389bb555d2e3e33755dd6b9ad9e'], u'filename': u'freeradius2-postgresql-2.1.12-4.el5_8.x86_64.rpm', u'epoch': u'0', u'version': u'2.1.12', u'release': u'4.el5_8', u'arch': u'x86_64'}, {u'src': None, u'name': u'freeradius2-python', u'sum': [u'md5', u'7587cf82a4f4d039c1a50571f23d39f0'], u'filename': u'freeradius2-python-2.1.12-4.el5_8.x86_64.rpm', u'epoch': u'0', u'version': u'2.1.12', u'release': u'4.el5_8', u'arch': u'x86_64'}, {u'src': None, u'name': u'freeradius2-unixODBC', u'sum': [u'md5', u'511022ba3922a1c30afdd4104f7ca3b4'], u'filename': u'freeradius2-unixODBC-2.1.12-4.el5_8.x86_64.rpm', u'epoch': u'0', u'version': u'2.1.12', u'release': u'4.el5_8', u'arch': u'x86_64'}, {u'src': None, u'name': u'freeradius2-utils', u'sum': [u'md5', u'6764cfbdbc7800e2740fc8892cf491c5'], u'filename': u'freeradius2-utils-2.1.12-4.el5_8.x86_64.rpm', u'epoch': u'0', u'version': u'2.1.12', u'release': u'4.el5_8', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u'firefox\n[10.0.8-1.0.2.el6_3]\n- Updated firefox-oracle-default-prefs.js based on latest firefox-redhat-default-prefs.js\n\n[10.0.8-1.0.1.el6_3]\n- Replace firefox-redhat-default-prefs.js with firefox-oracle-default-prefs.js\n\n[10.0.8-1]\n- Update to 10.0.8 ESR\n\nxulrunner\n[10.0.8-1.0.1.el6_3]\n- Replace xulrunner-redhat-default-prefs.js with xulrunner-oracle-default-prefs.js\n\n[10.0.8-1]\n- Update to 10.0.8 ESR', u'issued': u'2012-10-10', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELSA-2012-1350.html', u'type': u'self', u'id': None, u'title': u'ELSA-2012-1350'}, {u'href': u'http://linux.oracle.com/cve/CVE-2012-1956.html', u'type': u'cve', u'id': u'CVE-2012-1956', u'title': u'CVE-2012-1956'}, {u'href': u'http://linux.oracle.com/cve/CVE-2012-3982.html', u'type': u'cve', u'id': u'CVE-2012-3982', u'title': u'CVE-2012-3982'}, {u'href': u'http://linux.oracle.com/cve/CVE-2012-3986.html', u'type': u'cve', u'id': u'CVE-2012-3986', u'title': u'CVE-2012-3986'}, {u'href': u'http://linux.oracle.com/cve/CVE-2012-3988.html', u'type': u'cve', u'id': u'CVE-2012-3988', u'title': u'CVE-2012-3988'}, {u'href': u'http://linux.oracle.com/cve/CVE-2012-3990.html', u'type': u'cve', u'id': u'CVE-2012-3990', u'title': u'CVE-2012-3990'}, {u'href': u'http://linux.oracle.com/cve/CVE-2012-3991.html', u'type': u'cve', u'id': u'CVE-2012-3991', u'title': u'CVE-2012-3991'}, {u'href': u'http://linux.oracle.com/cve/CVE-2012-3992.html', u'type': u'cve', u'id': u'CVE-2012-3992', u'title': u'CVE-2012-3992'}, {u'href': u'http://linux.oracle.com/cve/CVE-2012-3993.html', u'type': u'cve', u'id': u'CVE-2012-3993', u'title': u'CVE-2012-3993'}, {u'href': u'http://linux.oracle.com/cve/CVE-2012-3994.html', u'type': u'cve', u'id': u'CVE-2012-3994', u'title': u'CVE-2012-3994'}, {u'href': u'http://linux.oracle.com/cve/CVE-2012-3995.html', u'type': u'cve', u'id': u'CVE-2012-3995', u'title': u'CVE-2012-3995'}, {u'href': u'http://linux.oracle.com/cve/CVE-2012-4179.html', u'type': u'cve', u'id': u'CVE-2012-4179', u'title': u'CVE-2012-4179'}, {u'href': u'http://linux.oracle.com/cve/CVE-2012-4180.html', u'type': u'cve', u'id': u'CVE-2012-4180', u'title': u'CVE-2012-4180'}, {u'href': u'http://linux.oracle.com/cve/CVE-2012-4181.html', u'type': u'cve', u'id': u'CVE-2012-4181', u'title': u'CVE-2012-4181'}, {u'href': u'http://linux.oracle.com/cve/CVE-2012-4182.html', u'type': u'cve', u'id': u'CVE-2012-4182', u'title': u'CVE-2012-4182'}, {u'href': u'http://linux.oracle.com/cve/CVE-2012-4183.html', u'type': u'cve', u'id': u'CVE-2012-4183', u'title': u'CVE-2012-4183'}, {u'href': u'http://linux.oracle.com/cve/CVE-2012-4184.html', u'type': u'cve', u'id': u'CVE-2012-4184', u'title': u'CVE-2012-4184'}, {u'href': u'http://linux.oracle.com/cve/CVE-2012-4185.html', u'type': u'cve', u'id': u'CVE-2012-4185', u'title': u'CVE-2012-4185'}, {u'href': u'http://linux.oracle.com/cve/CVE-2012-4186.html', u'type': u'cve', u'id': u'CVE-2012-4186', u'title': u'CVE-2012-4186'}, {u'href': u'http://linux.oracle.com/cve/CVE-2012-4187.html', u'type': u'cve', u'id': u'CVE-2012-4187', u'title': u'CVE-2012-4187'}, {u'href': u'http://linux.oracle.com/cve/CVE-2012-4188.html', u'type': u'cve', u'id': u'CVE-2012-4188', u'title': u'CVE-2012-4188'}], u'_content_type_id': u'erratum', u'_id': u'd903c0a8-625b-4e38-8744-361d6dad9126', u'from': u'el-errata@oss.oracle.com', u'severity': u'Critical', u'title': u' firefox security and bug fix update', u'_ns': u'units_erratum', u'rights': u'Copyright 2012 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 6', u'reboot_suggested': False, u'type': u'security', u'pkglist': [{u'packages': [{u'src': None, u'name': u'firefox', u'sum': [u'md5', u'9ad7fb608bb25b372dff936a053502d3'], u'filename': u'firefox-10.0.8-1.0.2.el6_3.i686.rpm', u'epoch': u'0', u'version': u'10.0.8', u'release': u'1.0.2.el6_3', u'arch': u'i686'}, {u'src': None, u'name': u'firefox', u'sum': [u'md5', u'55659a87c6e13ef4b9d77a5bc53b16cf'], u'filename': u'firefox-10.0.8-1.0.2.el6_3.src.rpm', u'epoch': u'0', u'version': u'10.0.8', u'release': u'1.0.2.el6_3', u'arch': u'src'}, {u'src': None, u'name': u'firefox', u'sum': [u'md5', u'd13aba85b3f16dae3e66c288b9dd0ffc'], u'filename': u'firefox-10.0.8-1.0.2.el6_3.x86_64.rpm', u'epoch': u'0', u'version': u'10.0.8', u'release': u'1.0.2.el6_3', u'arch': u'x86_64'}, {u'src': None, u'name': u'xulrunner', u'sum': [u'md5', u'd02cd339807a9370673528eeb6894ad4'], u'filename': u'xulrunner-10.0.8-1.0.1.el6_3.i686.rpm', u'epoch': u'0', u'version': u'10.0.8', u'release': u'1.0.1.el6_3', u'arch': u'i686'}, {u'src': None, u'name': u'xulrunner', u'sum': [u'md5', u'70c3ffe0edc8479c2809e37fa3f7c907'], u'filename': u'xulrunner-10.0.8-1.0.1.el6_3.src.rpm', u'epoch': u'0', u'version': u'10.0.8', u'release': u'1.0.1.el6_3', u'arch': u'src'}, {u'src': None, u'name': u'xulrunner', u'sum': [u'md5', u'1ed74433dd5b5825a42942c0036868f9'], u'filename': u'xulrunner-10.0.8-1.0.1.el6_3.x86_64.rpm', u'epoch': u'0', u'version': u'10.0.8', u'release': u'1.0.1.el6_3', u'arch': u'x86_64'}, {u'src': None, u'name': u'xulrunner-devel', u'sum': [u'md5', u'25cc9a7935c1bee2d7ea41b974993a88'], u'filename': u'xulrunner-devel-10.0.8-1.0.1.el6_3.i686.rpm', u'epoch': u'0', u'version': u'10.0.8', u'release': u'1.0.1.el6_3', u'arch': u'i686'}, {u'src': None, u'name': u'xulrunner-devel', u'sum': [u'md5', u'e71a20421bc3e7a3370a1758cb193a53'], u'filename': u'xulrunner-devel-10.0.8-1.0.1.el6_3.x86_64.rpm', u'epoch': u'0', u'version': u'10.0.8', u'release': u'1.0.1.el6_3', u'arch': u'x86_64'}], u'name': u'ol6_x86_64_latest', u'short': u'ol6_x86_64_latest'}, {u'packages': [{u'src': None, u'name': u'firefox', u'sum': [u'md5', u'cd0f150a33d283556e48bb8d229b8d8e'], u'filename': u'firefox-10.0.8-1.0.2.el5_8.i386.rpm', u'epoch': u'0', u'version': u'10.0.8', u'release': u'1.0.2.el5_8', u'arch': u'i386'}, {u'src': None, u'name': u'firefox', u'sum': [u'md5', u'ef30b1bb6745f0796bb0dd2179546a5c'], u'filename': u'firefox-10.0.8-1.0.2.el5_8.src.rpm', u'epoch': u'0', u'version': u'10.0.8', u'release': u'1.0.2.el5_8', u'arch': u'src'}, {u'src': None, u'name': u'firefox', u'sum': [u'md5', u'f20ae57e1b5527acb6258015025ee8e6'], u'filename': u'firefox-10.0.8-1.0.2.el5_8.x86_64.rpm', u'epoch': u'0', u'version': u'10.0.8', u'release': u'1.0.2.el5_8', u'arch': u'x86_64'}, {u'src': None, u'name': u'xulrunner', u'sum': [u'md5', u'd618b07ccdaedb273b5af82353873cf9'], u'filename': u'xulrunner-10.0.8-1.0.1.el5_8.i386.rpm', u'epoch': u'0', u'version': u'10.0.8', u'release': u'1.0.1.el5_8', u'arch': u'i386'}, {u'src': None, u'name': u'xulrunner', u'sum': [u'md5', u'8160671ddd275606f6a2ca0382a4eb6b'], u'filename': u'xulrunner-10.0.8-1.0.1.el5_8.src.rpm', u'epoch': u'0', u'version': u'10.0.8', u'release': u'1.0.1.el5_8', u'arch': u'src'}, {u'src': None, u'name': u'xulrunner', u'sum': [u'md5', u'1bea8d543da6bf2fefb76f8ef7aafdda'], u'filename': u'xulrunner-10.0.8-1.0.1.el5_8.x86_64.rpm', u'epoch': u'0', u'version': u'10.0.8', u'release': u'1.0.1.el5_8', u'arch': u'x86_64'}, {u'src': None, u'name': u'xulrunner-devel', u'sum': [u'md5', u'9a43e39cb71ff3b5daaea0120aa94dd2'], u'filename': u'xulrunner-devel-10.0.8-1.0.1.el5_8.i386.rpm', u'epoch': u'0', u'version': u'10.0.8', u'release': u'1.0.1.el5_8', u'arch': u'i386'}, {u'src': None, u'name': u'xulrunner-devel', u'sum': [u'md5', u'94697be1450d8b92126a57ed1ad6c0ac'], u'filename': u'xulrunner-devel-10.0.8-1.0.1.el5_8.x86_64.rpm', u'epoch': u'0', u'version': u'10.0.8', u'release': u'1.0.1.el5_8', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u'[10.0.8-2.0.1.el6_3]\n- Replace xulrunner-redhat-default-prefs.js with xulrunner-oracle-default-prefs.js\n\n[10.0.8-2]\n- Added patches from 10.0.9 ESR', u'issued': u'2012-10-12', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELSA-2012-1361.html', u'type': u'self', u'id': None, u'title': u'ELSA-2012-1361'}, {u'href': u'http://linux.oracle.com/cve/CVE-2012-4193.html', u'type': u'cve', u'id': u'CVE-2012-4193', u'title': u'CVE-2012-4193'}], u'_content_type_id': u'erratum', u'_id': u'bed315e9-bdd6-4bf5-bcd7-c134ddcc5166', u'from': u'el-errata@oss.oracle.com', u'severity': u'Critical', u'title': u' xulrunner security update', u'_ns': u'units_erratum', u'rights': u'Copyright 2012 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 6', u'reboot_suggested': False, u'type': u'security', u'pkglist': [{u'packages': [{u'src': None, u'name': u'xulrunner', u'sum': [u'md5', u'ce1eeedc3f932c3566b482142a84bacc'], u'filename': u'xulrunner-10.0.8-2.0.1.el6_3.i686.rpm', u'epoch': u'0', u'version': u'10.0.8', u'release': u'2.0.1.el6_3', u'arch': u'i686'}, {u'src': None, u'name': u'xulrunner', u'sum': [u'md5', u'0a395e7a72092f00065ddbeb307d3bb5'], u'filename': u'xulrunner-10.0.8-2.0.1.el6_3.src.rpm', u'epoch': u'0', u'version': u'10.0.8', u'release': u'2.0.1.el6_3', u'arch': u'src'}, {u'src': None, u'name': u'xulrunner', u'sum': [u'md5', u'8e01d9002903df1c01aedd948ad0db59'], u'filename': u'xulrunner-10.0.8-2.0.1.el6_3.x86_64.rpm', u'epoch': u'0', u'version': u'10.0.8', u'release': u'2.0.1.el6_3', u'arch': u'x86_64'}, {u'src': None, u'name': u'xulrunner-devel', u'sum': [u'md5', u'1a0d1f5642ffc745a0f9eb761faf6835'], u'filename': u'xulrunner-devel-10.0.8-2.0.1.el6_3.i686.rpm', u'epoch': u'0', u'version': u'10.0.8', u'release': u'2.0.1.el6_3', u'arch': u'i686'}, {u'src': None, u'name': u'xulrunner-devel', u'sum': [u'md5', u'a9123fe3055a1329ff84819ffe713333'], u'filename': u'xulrunner-devel-10.0.8-2.0.1.el6_3.x86_64.rpm', u'epoch': u'0', u'version': u'10.0.8', u'release': u'2.0.1.el6_3', u'arch': u'x86_64'}], u'name': u'ol6_x86_64_latest', u'short': u'ol6_x86_64_latest'}, {u'packages': [{u'src': None, u'name': u'xulrunner', u'sum': [u'md5', u'41950a523f51ccd010b534cd1d06abb5'], u'filename': u'xulrunner-10.0.8-2.0.1.el5_8.i386.rpm', u'epoch': u'0', u'version': u'10.0.8', u'release': u'2.0.1.el5_8', u'arch': u'i386'}, {u'src': None, u'name': u'xulrunner', u'sum': [u'md5', u'7b88aa769c893fd1129c10af60ded91f'], u'filename': u'xulrunner-10.0.8-2.0.1.el5_8.src.rpm', u'epoch': u'0', u'version': u'10.0.8', u'release': u'2.0.1.el5_8', u'arch': u'src'}, {u'src': None, u'name': u'xulrunner', u'sum': [u'md5', u'6fa3a616f863dbfccc360827e8503b61'], u'filename': u'xulrunner-10.0.8-2.0.1.el5_8.x86_64.rpm', u'epoch': u'0', u'version': u'10.0.8', u'release': u'2.0.1.el5_8', u'arch': u'x86_64'}, {u'src': None, u'name': u'xulrunner-devel', u'sum': [u'md5', u'b073c20e66f1448d13c77de1f2a273d4'], u'filename': u'xulrunner-devel-10.0.8-2.0.1.el5_8.i386.rpm', u'epoch': u'0', u'version': u'10.0.8', u'release': u'2.0.1.el5_8', u'arch': u'i386'}, {u'src': None, u'name': u'xulrunner-devel', u'sum': [u'md5', u'5107d87078ad29e38e2192d7a5301ae1'], u'filename': u'xulrunner-devel-10.0.8-2.0.1.el5_8.x86_64.rpm', u'epoch': u'0', u'version': u'10.0.8', u'release': u'2.0.1.el5_8', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u'[32:9.8.2-0.10.rc1.5]\n- fix CVE-2012-5166', u'issued': u'2012-10-12', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELSA-2012-1363.html', u'type': u'self', u'id': None, u'title': u'ELSA-2012-1363'}, {u'href': u'http://linux.oracle.com/cve/CVE-2012-5166.html', u'type': u'cve', u'id': u'CVE-2012-5166', u'title': u'CVE-2012-5166'}], u'_content_type_id': u'erratum', u'_id': u'f69e9cfb-f39b-4eac-804b-5e0cab4da976', u'from': u'el-errata@oss.oracle.com', u'severity': u'Important', u'title': u' bind security update', u'_ns': u'units_erratum', u'rights': u'Copyright 2012 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 6', u'reboot_suggested': False, u'type': u'security', u'pkglist': [{u'packages': [{u'src': None, u'name': u'bind', u'sum': [u'md5', u'ed7559bc019f4a66d9e9e9eb3b43a390'], u'filename': u'bind-9.8.2-0.10.rc1.el6_3.5.src.rpm', u'epoch': u'32', u'version': u'9.8.2', u'release': u'0.10.rc1.el6_3.5', u'arch': u'src'}, {u'src': None, u'name': u'bind', u'sum': [u'md5', u'276bf24131bf6a59dcd3d49a62710925'], u'filename': u'bind-9.8.2-0.10.rc1.el6_3.5.x86_64.rpm', u'epoch': u'32', u'version': u'9.8.2', u'release': u'0.10.rc1.el6_3.5', u'arch': u'x86_64'}, {u'src': None, u'name': u'bind-chroot', u'sum': [u'md5', u'd61811cc14284abb9dc378fbd638d3cd'], u'filename': u'bind-chroot-9.8.2-0.10.rc1.el6_3.5.x86_64.rpm', u'epoch': u'32', u'version': u'9.8.2', u'release': u'0.10.rc1.el6_3.5', u'arch': u'x86_64'}, {u'src': None, u'name': u'bind-devel', u'sum': [u'md5', u'7fc6320b200a22a5735178f20e417b5d'], u'filename': u'bind-devel-9.8.2-0.10.rc1.el6_3.5.i686.rpm', u'epoch': u'32', u'version': u'9.8.2', u'release': u'0.10.rc1.el6_3.5', u'arch': u'i686'}, {u'src': None, u'name': u'bind-devel', u'sum': [u'md5', u'7570ab13cda22116e0f77ac3c0496b69'], u'filename': u'bind-devel-9.8.2-0.10.rc1.el6_3.5.x86_64.rpm', u'epoch': u'32', u'version': u'9.8.2', u'release': u'0.10.rc1.el6_3.5', u'arch': u'x86_64'}, {u'src': None, u'name': u'bind-libs', u'sum': [u'md5', u'fb5baf4422a766112523546ace410e08'], u'filename': u'bind-libs-9.8.2-0.10.rc1.el6_3.5.i686.rpm', u'epoch': u'32', u'version': u'9.8.2', u'release': u'0.10.rc1.el6_3.5', u'arch': u'i686'}, {u'src': None, u'name': u'bind-libs', u'sum': [u'md5', u'5fb19829933b5808f96ae2dbbffabbec'], u'filename': u'bind-libs-9.8.2-0.10.rc1.el6_3.5.x86_64.rpm', u'epoch': u'32', u'version': u'9.8.2', u'release': u'0.10.rc1.el6_3.5', u'arch': u'x86_64'}, {u'src': None, u'name': u'bind-sdb', u'sum': [u'md5', u'95517e12d1780d7488767aa672a870ae'], u'filename': u'bind-sdb-9.8.2-0.10.rc1.el6_3.5.x86_64.rpm', u'epoch': u'32', u'version': u'9.8.2', u'release': u'0.10.rc1.el6_3.5', u'arch': u'x86_64'}, {u'src': None, u'name': u'bind-utils', u'sum': [u'md5', u'af56063626395073dc5ff7d4885ae926'], u'filename': u'bind-utils-9.8.2-0.10.rc1.el6_3.5.x86_64.rpm', u'epoch': u'32', u'version': u'9.8.2', u'release': u'0.10.rc1.el6_3.5', u'arch': u'x86_64'}], u'name': u'ol6_x86_64_latest', u'short': u'ol6_x86_64_latest'}, {u'packages': [{u'src': None, u'name': u'bind', u'sum': [u'md5', u'21cb3e8ccba0dbf7e2e02b92ba84d8db'], u'filename': u'bind-9.3.6-20.P1.el5_8.5.src.rpm', u'epoch': u'30', u'version': u'9.3.6', u'release': u'20.P1.el5_8.5', u'arch': u'src'}, {u'src': None, u'name': u'bind', u'sum': [u'md5', u'02665703532b94d3089ab91b9d90ad19'], u'filename': u'bind-9.3.6-20.P1.el5_8.5.x86_64.rpm', u'epoch': u'30', u'version': u'9.3.6', u'release': u'20.P1.el5_8.5', u'arch': u'x86_64'}, {u'src': None, u'name': u'bind-chroot', u'sum': [u'md5', u'e712b41073c5f6a17a54f1d8c7c7ed95'], u'filename': u'bind-chroot-9.3.6-20.P1.el5_8.5.x86_64.rpm', u'epoch': u'30', u'version': u'9.3.6', u'release': u'20.P1.el5_8.5', u'arch': u'x86_64'}, {u'src': None, u'name': u'bind-devel', u'sum': [u'md5', u'6d5abaff445c01a32516e43cb50f3a2d'], u'filename': u'bind-devel-9.3.6-20.P1.el5_8.5.i386.rpm', u'epoch': u'30', u'version': u'9.3.6', u'release': u'20.P1.el5_8.5', u'arch': u'i386'}, {u'src': None, u'name': u'bind-devel', u'sum': [u'md5', u'4846ae5f4b2547320ce2372c84789d74'], u'filename': u'bind-devel-9.3.6-20.P1.el5_8.5.x86_64.rpm', u'epoch': u'30', u'version': u'9.3.6', u'release': u'20.P1.el5_8.5', u'arch': u'x86_64'}, {u'src': None, u'name': u'bind-libbind-devel', u'sum': [u'md5', u'e84e7bf4ec7bf896dc5b5e9e602b7a76'], u'filename': u'bind-libbind-devel-9.3.6-20.P1.el5_8.5.i386.rpm', u'epoch': u'30', u'version': u'9.3.6', u'release': u'20.P1.el5_8.5', u'arch': u'i386'}, {u'src': None, u'name': u'bind-libbind-devel', u'sum': [u'md5', u'48130021cfa0b6ba278252a8f8045527'], u'filename': u'bind-libbind-devel-9.3.6-20.P1.el5_8.5.x86_64.rpm', u'epoch': u'30', u'version': u'9.3.6', u'release': u'20.P1.el5_8.5', u'arch': u'x86_64'}, {u'src': None, u'name': u'bind-libs', u'sum': [u'md5', u'3de7f4e0fefe1d32c54df83fee94d018'], u'filename': u'bind-libs-9.3.6-20.P1.el5_8.5.i386.rpm', u'epoch': u'30', u'version': u'9.3.6', u'release': u'20.P1.el5_8.5', u'arch': u'i386'}, {u'src': None, u'name': u'bind-libs', u'sum': [u'md5', u'5f5b69466d42c59bb05bf53e853e09ad'], u'filename': u'bind-libs-9.3.6-20.P1.el5_8.5.x86_64.rpm', u'epoch': u'30', u'version': u'9.3.6', u'release': u'20.P1.el5_8.5', u'arch': u'x86_64'}, {u'src': None, u'name': u'bind-sdb', u'sum': [u'md5', u'8eefbf7b3c6fcc94a7385f1eee163ecf'], u'filename': u'bind-sdb-9.3.6-20.P1.el5_8.5.x86_64.rpm', u'epoch': u'30', u'version': u'9.3.6', u'release': u'20.P1.el5_8.5', u'arch': u'x86_64'}, {u'src': None, u'name': u'bind-utils', u'sum': [u'md5', u'6117629cf342b7a9f6b33d551e2261fe'], u'filename': u'bind-utils-9.3.6-20.P1.el5_8.5.x86_64.rpm', u'epoch': u'30', u'version': u'9.3.6', u'release': u'20.P1.el5_8.5', u'arch': u'x86_64'}, {u'src': None, u'name': u'caching-nameserver', u'sum': [u'md5', u'f8e087c40e0a98c9fe4a094467ee7886'], u'filename': u'caching-nameserver-9.3.6-20.P1.el5_8.5.x86_64.rpm', u'epoch': u'30', u'version': u'9.3.6', u'release': u'20.P1.el5_8.5', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u'[32:9.7.0-10.P2.4]\n- fix CVE-2012-5166', u'issued': u'2012-10-12', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELSA-2012-1364.html', u'type': u'self', u'id': None, u'title': u'ELSA-2012-1364'}, {u'href': u'http://linux.oracle.com/cve/CVE-2012-5166.html', u'type': u'cve', u'id': u'CVE-2012-5166', u'title': u'CVE-2012-5166'}], u'_content_type_id': u'erratum', u'_id': u'046d69aa-f7f5-49f8-a536-18f936f5087f', u'from': u'el-errata@oss.oracle.com', u'severity': u'Important', u'title': u' bind97 security update', u'_ns': u'units_erratum', u'rights': u'Copyright 2012 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 5', u'reboot_suggested': False, u'type': u'security', u'pkglist': [{u'packages': [{u'src': None, u'name': u'bind97', u'sum': [u'md5', u'b1906771d5214a9cbf771d214a7f4702'], u'filename': u'bind97-9.7.0-10.P2.el5_8.4.src.rpm', u'epoch': u'32', u'version': u'9.7.0', u'release': u'10.P2.el5_8.4', u'arch': u'src'}, {u'src': None, u'name': u'bind97', u'sum': [u'md5', u'9cb206f5ef7f3fdffae5c32ccb6f9794'], u'filename': u'bind97-9.7.0-10.P2.el5_8.4.x86_64.rpm', u'epoch': u'32', u'version': u'9.7.0', u'release': u'10.P2.el5_8.4', u'arch': u'x86_64'}, {u'src': None, u'name': u'bind97-chroot', u'sum': [u'md5', u'0c669ee5f1948f2b9443d1611f3d4736'], u'filename': u'bind97-chroot-9.7.0-10.P2.el5_8.4.x86_64.rpm', u'epoch': u'32', u'version': u'9.7.0', u'release': u'10.P2.el5_8.4', u'arch': u'x86_64'}, {u'src': None, u'name': u'bind97-devel', u'sum': [u'md5', u'b1da0fd1d0019f142e4e21fa44035d27'], u'filename': u'bind97-devel-9.7.0-10.P2.el5_8.4.i386.rpm', u'epoch': u'32', u'version': u'9.7.0', u'release': u'10.P2.el5_8.4', u'arch': u'i386'}, {u'src': None, u'name': u'bind97-devel', u'sum': [u'md5', u'24912edc2378becf6aba76944ebeb316'], u'filename': u'bind97-devel-9.7.0-10.P2.el5_8.4.x86_64.rpm', u'epoch': u'32', u'version': u'9.7.0', u'release': u'10.P2.el5_8.4', u'arch': u'x86_64'}, {u'src': None, u'name': u'bind97-libs', u'sum': [u'md5', u'aef715057379ba3bc479a6b7e4a51636'], u'filename': u'bind97-libs-9.7.0-10.P2.el5_8.4.i386.rpm', u'epoch': u'32', u'version': u'9.7.0', u'release': u'10.P2.el5_8.4', u'arch': u'i386'}, {u'src': None, u'name': u'bind97-libs', u'sum': [u'md5', u'929fd5c3ee62d337bb2efac3516417d8'], u'filename': u'bind97-libs-9.7.0-10.P2.el5_8.4.x86_64.rpm', u'epoch': u'32', u'version': u'9.7.0', u'release': u'10.P2.el5_8.4', u'arch': u'x86_64'}, {u'src': None, u'name': u'bind97-utils', u'sum': [u'md5', u'182e065ff417b78ea524bc225d70371a'], u'filename': u'bind97-utils-9.7.0-10.P2.el5_8.4.x86_64.rpm', u'epoch': u'32', u'version': u'9.7.0', u'release': u'10.P2.el5_8.4', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u'[1:1.6.0.0-1.28.1.10.10.0.1.el5_8]\n- Add oracle-enterprise.patch\n\n[1:1.6.0.0-1.28.1.10.10]\n- Updated to IcedTea6 1.10.10\n- Resolves rhbz#s 856124, 865346, 865348, 865350, 865352, 865354, 865357,\n 865359, 865363, 865365, 865370, 865428, 865471, 865434, 865511, 865514,\n 865519, 865531, 865541, 865568', u'issued': u'2012-10-17', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELSA-2012-1385.html', u'type': u'self', u'id': None, u'title': u'ELSA-2012-1385'}, {u'href': u'http://linux.oracle.com/cve/CVE-2012-3216.html', u'type': u'cve', u'id': u'CVE-2012-3216', u'title': u'CVE-2012-3216'}, {u'href': u'http://linux.oracle.com/cve/CVE-2012-4416.html', u'type': u'cve', u'id': u'CVE-2012-4416', u'title': u'CVE-2012-4416'}, {u'href': u'http://linux.oracle.com/cve/CVE-2012-5068.html', u'type': u'cve', u'id': u'CVE-2012-5068', u'title': u'CVE-2012-5068'}, {u'href': u'http://linux.oracle.com/cve/CVE-2012-5069.html', u'type': u'cve', u'id': u'CVE-2012-5069', u'title': u'CVE-2012-5069'}, {u'href': u'http://linux.oracle.com/cve/CVE-2012-5071.html', u'type': u'cve', u'id': u'CVE-2012-5071', u'title': u'CVE-2012-5071'}, {u'href': u'http://linux.oracle.com/cve/CVE-2012-5072.html', u'type': u'cve', u'id': u'CVE-2012-5072', u'title': u'CVE-2012-5072'}, {u'href': u'http://linux.oracle.com/cve/CVE-2012-5073.html', u'type': u'cve', u'id': u'CVE-2012-5073', u'title': u'CVE-2012-5073'}, {u'href': u'http://linux.oracle.com/cve/CVE-2012-5075.html', u'type': u'cve', u'id': u'CVE-2012-5075', u'title': u'CVE-2012-5075'}, {u'href': u'http://linux.oracle.com/cve/CVE-2012-5077.html', u'type': u'cve', u'id': u'CVE-2012-5077', u'title': u'CVE-2012-5077'}, {u'href': u'http://linux.oracle.com/cve/CVE-2012-5079.html', u'type': u'cve', u'id': u'CVE-2012-5079', u'title': u'CVE-2012-5079'}, {u'href': u'http://linux.oracle.com/cve/CVE-2012-5081.html', u'type': u'cve', u'id': u'CVE-2012-5081', u'title': u'CVE-2012-5081'}, {u'href': u'http://linux.oracle.com/cve/CVE-2012-5084.html', u'type': u'cve', u'id': u'CVE-2012-5084', u'title': u'CVE-2012-5084'}, {u'href': u'http://linux.oracle.com/cve/CVE-2012-5085.html', u'type': u'cve', u'id': u'CVE-2012-5085', u'title': u'CVE-2012-5085'}, {u'href': u'http://linux.oracle.com/cve/CVE-2012-5086.html', u'type': u'cve', u'id': u'CVE-2012-5086', u'title': u'CVE-2012-5086'}, {u'href': u'http://linux.oracle.com/cve/CVE-2012-5089.html', u'type': u'cve', u'id': u'CVE-2012-5089', u'title': u'CVE-2012-5089'}], u'_content_type_id': u'erratum', u'_id': u'8e06699e-3e40-4534-92af-dc8bd3c5ff3a', u'from': u'el-errata@oss.oracle.com', u'severity': u'Important', u'title': u' java-1.6.0-openjdk security update', u'_ns': u'units_erratum', u'rights': u'Copyright 2012 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 5', u'reboot_suggested': False, u'type': u'security', u'pkglist': [{u'packages': [{u'src': None, u'name': u'java-1.6.0-openjdk', u'sum': [u'md5', u'cab0e73dd3b9f1a5010da6d0286d3b5e'], u'filename': u'java-1.6.0-openjdk-1.6.0.0-1.28.1.10.10.0.1.el5_8.src.rpm', u'epoch': u'1', u'version': u'1.6.0.0', u'release': u'1.28.1.10.10.0.1.el5_8', u'arch': u'src'}, {u'src': None, u'name': u'java-1.6.0-openjdk', u'sum': [u'md5', u'b0f80daca02c88a2a588578c72172b0e'], u'filename': u'java-1.6.0-openjdk-1.6.0.0-1.28.1.10.10.0.1.el5_8.x86_64.rpm', u'epoch': u'1', u'version': u'1.6.0.0', u'release': u'1.28.1.10.10.0.1.el5_8', u'arch': u'x86_64'}, {u'src': None, u'name': u'java-1.6.0-openjdk-demo', u'sum': [u'md5', u'de251e761af5363284682929d88d34a2'], u'filename': u'java-1.6.0-openjdk-demo-1.6.0.0-1.28.1.10.10.0.1.el5_8.x86_64.rpm', u'epoch': u'1', u'version': u'1.6.0.0', u'release': u'1.28.1.10.10.0.1.el5_8', u'arch': u'x86_64'}, {u'src': None, u'name': u'java-1.6.0-openjdk-devel', u'sum': [u'md5', u'338412f8d763035e88b41f44b271c4a2'], u'filename': u'java-1.6.0-openjdk-devel-1.6.0.0-1.28.1.10.10.0.1.el5_8.x86_64.rpm', u'epoch': u'1', u'version': u'1.6.0.0', u'release': u'1.28.1.10.10.0.1.el5_8', u'arch': u'x86_64'}, {u'src': None, u'name': u'java-1.6.0-openjdk-javadoc', u'sum': [u'md5', u'd17097488a9f48ee6ab1ff9f91f14747'], u'filename': u'java-1.6.0-openjdk-javadoc-1.6.0.0-1.28.1.10.10.0.1.el5_8.x86_64.rpm', u'epoch': u'1', u'version': u'1.6.0.0', u'release': u'1.28.1.10.10.0.1.el5_8', u'arch': u'x86_64'}, {u'src': None, u'name': u'java-1.6.0-openjdk-src', u'sum': [u'md5', u'c6f4c3b8aa9b1411ca54ba494cbb466d'], u'filename': u'java-1.6.0-openjdk-src-1.6.0.0-1.28.1.10.10.0.1.el5_8.x86_64.rpm', u'epoch': u'1', u'version': u'1.6.0.0', u'release': u'1.28.1.10.10.0.1.el5_8', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u'firefox\n[10.0.10-1.0.1.el6_3]\n- Replaced firefox-redhat-default-prefs.js with firefox-oracle-default-prefs.js\n\n[10.0.10-1]\n- Update to 10.0.10 ESR\n\n[10.0.8-2]\n- Fixed rhbz#865284 - add the storage.nfs_filesystem\n config key to property list\n- disable OOP for wrapped plugins (nspluginwrapper)\n\nxulrunner\n[10.0.10-1.0.1.el6_3]\n- Replaced xulrunner-redhat-default-prefs.js with xulrunner-oracle-default-prefs.js\n\n[10.0.10-1]\n- Added patches from 10.0.10 ESR', u'issued': u'2012-10-26', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELSA-2012-1407.html', u'type': u'self', u'id': None, u'title': u'ELSA-2012-1407'}, {u'href': u'http://linux.oracle.com/cve/CVE-2012-4194.html', u'type': u'cve', u'id': u'CVE-2012-4194', u'title': u'CVE-2012-4194'}, {u'href': u'http://linux.oracle.com/cve/CVE-2012-4195.html', u'type': u'cve', u'id': u'CVE-2012-4195', u'title': u'CVE-2012-4195'}, {u'href': u'http://linux.oracle.com/cve/CVE-2012-4196.html', u'type': u'cve', u'id': u'CVE-2012-4196', u'title': u'CVE-2012-4196'}], u'_content_type_id': u'erratum', u'_id': u'67225f54-bc30-44e7-ab1b-20f1fcd7efcb', u'from': u'el-errata@oss.oracle.com', u'severity': u'Critical', u'title': u' firefox security update', u'_ns': u'units_erratum', u'rights': u'Copyright 2012 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 6', u'reboot_suggested': False, u'type': u'security', u'pkglist': [{u'packages': [{u'src': None, u'name': u'firefox', u'sum': [u'md5', u'ddda523e8ae3a65620745f6322a641c5'], u'filename': u'firefox-10.0.10-1.0.1.el6_3.i686.rpm', u'epoch': u'0', u'version': u'10.0.10', u'release': u'1.0.1.el6_3', u'arch': u'i686'}, {u'src': None, u'name': u'firefox', u'sum': [u'md5', u'da4e1090b0c1d71d89e976fc215a5d75'], u'filename': u'firefox-10.0.10-1.0.1.el6_3.src.rpm', u'epoch': u'0', u'version': u'10.0.10', u'release': u'1.0.1.el6_3', u'arch': u'src'}, {u'src': None, u'name': u'firefox', u'sum': [u'md5', u'b5d4f2fb003e00e3825d20e0c1761b8c'], u'filename': u'firefox-10.0.10-1.0.1.el6_3.x86_64.rpm', u'epoch': u'0', u'version': u'10.0.10', u'release': u'1.0.1.el6_3', u'arch': u'x86_64'}, {u'src': None, u'name': u'xulrunner', u'sum': [u'md5', u'6165a9626e892574871383635037a302'], u'filename': u'xulrunner-10.0.10-1.0.1.el6_3.i686.rpm', u'epoch': u'0', u'version': u'10.0.10', u'release': u'1.0.1.el6_3', u'arch': u'i686'}, {u'src': None, u'name': u'xulrunner', u'sum': [u'md5', u'102dbdac64de211666f9c411347b898a'], u'filename': u'xulrunner-10.0.10-1.0.1.el6_3.src.rpm', u'epoch': u'0', u'version': u'10.0.10', u'release': u'1.0.1.el6_3', u'arch': u'src'}, {u'src': None, u'name': u'xulrunner', u'sum': [u'md5', u'0f45061033551b6a883b6051aabae4c7'], u'filename': u'xulrunner-10.0.10-1.0.1.el6_3.x86_64.rpm', u'epoch': u'0', u'version': u'10.0.10', u'release': u'1.0.1.el6_3', u'arch': u'x86_64'}, {u'src': None, u'name': u'xulrunner-devel', u'sum': [u'md5', u'f2aba862891b127f9d06a338d9c47473'], u'filename': u'xulrunner-devel-10.0.10-1.0.1.el6_3.i686.rpm', u'epoch': u'0', u'version': u'10.0.10', u'release': u'1.0.1.el6_3', u'arch': u'i686'}, {u'src': None, u'name': u'xulrunner-devel', u'sum': [u'md5', u'b4b7a49abcaa7199925effbecf8750ab'], u'filename': u'xulrunner-devel-10.0.10-1.0.1.el6_3.x86_64.rpm', u'epoch': u'0', u'version': u'10.0.10', u'release': u'1.0.1.el6_3', u'arch': u'x86_64'}], u'name': u'ol6_x86_64_latest', u'short': u'ol6_x86_64_latest'}, {u'packages': [{u'src': None, u'name': u'firefox', u'sum': [u'md5', u'491ba2e71b489bcc2b794e1889ca94cd'], u'filename': u'firefox-10.0.10-1.0.1.el5_8.i386.rpm', u'epoch': u'0', u'version': u'10.0.10', u'release': u'1.0.1.el5_8', u'arch': u'i386'}, {u'src': None, u'name': u'firefox', u'sum': [u'md5', u'5291bb16df0b8962e0bb03b2b42d378c'], u'filename': u'firefox-10.0.10-1.0.1.el5_8.src.rpm', u'epoch': u'0', u'version': u'10.0.10', u'release': u'1.0.1.el5_8', u'arch': u'src'}, {u'src': None, u'name': u'firefox', u'sum': [u'md5', u'49eb1ed1a581f99979b8a7048ae289cb'], u'filename': u'firefox-10.0.10-1.0.1.el5_8.x86_64.rpm', u'epoch': u'0', u'version': u'10.0.10', u'release': u'1.0.1.el5_8', u'arch': u'x86_64'}, {u'src': None, u'name': u'xulrunner', u'sum': [u'md5', u'5801f4d046f61232539dfbd4ef364512'], u'filename': u'xulrunner-10.0.10-1.0.1.el5_8.i386.rpm', u'epoch': u'0', u'version': u'10.0.10', u'release': u'1.0.1.el5_8', u'arch': u'i386'}, {u'src': None, u'name': u'xulrunner', u'sum': [u'md5', u'31a95f34c8c47e64c622d4e7785046f2'], u'filename': u'xulrunner-10.0.10-1.0.1.el5_8.src.rpm', u'epoch': u'0', u'version': u'10.0.10', u'release': u'1.0.1.el5_8', u'arch': u'src'}, {u'src': None, u'name': u'xulrunner', u'sum': [u'md5', u'029c0f48512e87ad14bea0cf885f3f53'], u'filename': u'xulrunner-10.0.10-1.0.1.el5_8.x86_64.rpm', u'epoch': u'0', u'version': u'10.0.10', u'release': u'1.0.1.el5_8', u'arch': u'x86_64'}, {u'src': None, u'name': u'xulrunner-devel', u'sum': [u'md5', u'36fff79cbd9128489b5efbb78afbd4e1'], u'filename': u'xulrunner-devel-10.0.10-1.0.1.el5_8.i386.rpm', u'epoch': u'0', u'version': u'10.0.10', u'release': u'1.0.1.el5_8', u'arch': u'i386'}, {u'src': None, u'name': u'xulrunner-devel', u'sum': [u'md5', u'83a138e300f330550b1312bdd733bc67'], u'filename': u'xulrunner-devel-10.0.10-1.0.1.el5_8.x86_64.rpm', u'epoch': u'0', u'version': u'10.0.10', u'release': u'1.0.1.el5_8', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u'[2.6.18-308.20.1.el5]\n- Revert: [x86] mm: randomize SHLIB_BASE (Dave Anderson) [804953 804954] {CVE-2012-1568}\n\n[2.6.18-308.19.1.el5]\n- [net] be2net: Remove code that stops further access to BE NIC based on UE bits (Alexander Gordeev) [867896 862811]\n- [net] netpoll: fix an incorrect check for NULL pointer (Alexander Gordeev) [856079 848098]\n- [net] mlx4: Add support for EEH error recovery (Alexander Gordeev) [847404 798048]\n- [fs] ext4: fix undefined bit shift result in ext4_fill_flex_info (Eric Sandeen) [809688 809689] {CVE-2012-2100}\n- [fs] ext4: fix undefined behavior in ext4_fill_flex_info (Eric Sandeen) [809688 809689] {CVE-2012-2100}\n- [fs] fix crash if block {device|size} read & changed at sametime (Mikulas Patocka) [864823 756506]\n- [x86] mm: randomize SHLIB_BASE (Dave Anderson) [804953 804954] {CVE-2012-1568}\n- [net] ipv6: Fix fib6_dump_table walker leak (Jiri Benc) [861387 819830]\n- [fs] cifs: update cifs_dfs_d_automount caller path (Sachin Prabhu) [858774 857448]\n- [xen] x86: change the default behaviour of CVE-2012-2934 fix (Petr Matousek) [859946 858724]\n- [net] ipvs: allow transmit of GRO aggregated skbs (Jesper Brouer) [857966 854067]\n- [scsi] isci: fixup linkspeed definitions (David Milburn) [854986 833000]\n- [fs] nfs: nfs_d_automount update caller path after do_add_mount (Carlos Maiolino) [857552 834379]\n- [fs] vfs: Fix vfsmount overput on simultaneous automount (Carlos Maiolino) [857552 834379]\n\n[2.6.18-308.18.1.el5]\n- [fs] autofs4: Merge the remaining dentry ops tables (Ian Kent) [857558 850977]\n\n[2.6.18-308.17.1.el5]\n- [fs] cifs: Invalidate file cache in case of posix open (Sachin Prabhu) [857964 852526]', u'issued': u'2012-11-13', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELSA-2012-1445.html', u'type': u'self', u'id': None, u'title': u'ELSA-2012-1445'}, {u'href': u'http://linux.oracle.com/cve/CVE-2012-2100.html', u'type': u'cve', u'id': u'CVE-2012-2100', u'title': u'CVE-2012-2100'}], u'_content_type_id': u'erratum', u'_id': u'8e91b933-5c42-492a-aa23-da749a20cae5', u'from': u'el-errata@oss.oracle.com', u'severity': u'Low', u'title': u' kernel security and bug fix update', u'_ns': u'units_erratum', u'rights': u'Copyright 2012 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 5', u'reboot_suggested': False, u'type': u'security', u'pkglist': [{u'packages': [{u'src': None, u'name': u'kernel', u'sum': [u'md5', u'a1d849cedf306a5b47cc59a825683e8e'], u'filename': u'kernel-2.6.18-308.20.1.el5.src.rpm', u'epoch': u'0', u'version': u'2.6.18', u'release': u'308.20.1.el5', u'arch': u'src'}, {u'src': None, u'name': u'kernel', u'sum': [u'md5', u'8235e59181141dc962fbc336e5437325'], u'filename': u'kernel-2.6.18-308.20.1.el5.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.18', u'release': u'308.20.1.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'kernel-debug', u'sum': [u'md5', u'78c9263c63c34da1f0017b4fb1ad1ddc'], u'filename': u'kernel-debug-2.6.18-308.20.1.el5.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.18', u'release': u'308.20.1.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'kernel-debug-devel', u'sum': [u'md5', u'a86cc78be0b0feb85ab950a0ac7b7848'], u'filename': u'kernel-debug-devel-2.6.18-308.20.1.el5.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.18', u'release': u'308.20.1.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'kernel-devel', u'sum': [u'md5', u'7d1c2bbb1acc6aa63003f6f6cb245626'], u'filename': u'kernel-devel-2.6.18-308.20.1.el5.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.18', u'release': u'308.20.1.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'kernel-doc', u'sum': [u'md5', u'a9c48c53fe3dd222db62f4a28ae28c69'], u'filename': u'kernel-doc-2.6.18-308.20.1.el5.noarch.rpm', u'epoch': u'0', u'version': u'2.6.18', u'release': u'308.20.1.el5', u'arch': u'noarch'}, {u'src': None, u'name': u'kernel-headers', u'sum': [u'md5', u'f1027d41dbc2343221750393f9bdea89'], u'filename': u'kernel-headers-2.6.18-308.20.1.el5.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.18', u'release': u'308.20.1.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'kernel-xen', u'sum': [u'md5', u'3ce7abdbe471afd60c02550e21231da4'], u'filename': u'kernel-xen-2.6.18-308.20.1.el5.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.18', u'release': u'308.20.1.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'kernel-xen-devel', u'sum': [u'md5', u'8d6b9860851efe3312f115462f7cce67'], u'filename': u'kernel-xen-devel-2.6.18-308.20.1.el5.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.18', u'release': u'308.20.1.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'ocfs2-2.6.18-308.20.1.el5', u'sum': [u'md5', u'ac6e00f2c4811e8cd2d4398619771e28'], u'filename': u'ocfs2-2.6.18-308.20.1.el5-1.4.10-1.el5.src.rpm', u'epoch': u'0', u'version': u'1.4.10', u'release': u'1.el5', u'arch': u'src'}, {u'src': None, u'name': u'ocfs2-2.6.18-308.20.1.el5', u'sum': [u'md5', u'04ec8959b6057eac0b8bdc0acffc40ef'], u'filename': u'ocfs2-2.6.18-308.20.1.el5-1.4.10-1.el5.x86_64.rpm', u'epoch': u'0', u'version': u'1.4.10', u'release': u'1.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'ocfs2-2.6.18-308.20.1.el5debug', u'sum': [u'md5', u'96f9728a1927218fadbff95ceea5049c'], u'filename': u'ocfs2-2.6.18-308.20.1.el5debug-1.4.10-1.el5.x86_64.rpm', u'epoch': u'0', u'version': u'1.4.10', u'release': u'1.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'ocfs2-2.6.18-308.20.1.el5xen', u'sum': [u'md5', u'23675c21c299ac0e06b015e0331a5010'], u'filename': u'ocfs2-2.6.18-308.20.1.el5xen-1.4.10-1.el5.x86_64.rpm', u'epoch': u'0', u'version': u'1.4.10', u'release': u'1.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'oracleasm-2.6.18-308.20.1.el5', u'sum': [u'md5', u'b3e6118db370cad933a791cdaefa6d04'], u'filename': u'oracleasm-2.6.18-308.20.1.el5-2.0.5-1.el5.src.rpm', u'epoch': u'0', u'version': u'2.0.5', u'release': u'1.el5', u'arch': u'src'}, {u'src': None, u'name': u'oracleasm-2.6.18-308.20.1.el5', u'sum': [u'md5', u'06b2d6471f5ca623675d0cad9b6a32db'], u'filename': u'oracleasm-2.6.18-308.20.1.el5-2.0.5-1.el5.x86_64.rpm', u'epoch': u'0', u'version': u'2.0.5', u'release': u'1.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'oracleasm-2.6.18-308.20.1.el5debug', u'sum': [u'md5', u'8269feaaf1f51363c435a9d86f151420'], u'filename': u'oracleasm-2.6.18-308.20.1.el5debug-2.0.5-1.el5.x86_64.rpm', u'epoch': u'0', u'version': u'2.0.5', u'release': u'1.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'oracleasm-2.6.18-308.20.1.el5xen', u'sum': [u'md5', u'7c335476c73f96a47d393af23da07201'], u'filename': u'oracleasm-2.6.18-308.20.1.el5xen-2.0.5-1.el5.x86_64.rpm', u'epoch': u'0', u'version': u'2.0.5', u'release': u'1.el5', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u'[2.6.18-308.20.1.0.1.el5]\n- [kernel] Initialize the local uninitialized variable stats. [orabug 14051367]\n- [fs] JBD:make jbd support 512B blocks correctly for ocfs2. [orabug 13477763]\n- [x86 ] fix fpu context corrupt when preempt in signal context [orabug 14038272]\n- [net] bonding: fix carrier detect when bond is down [orabug 12377284]\n- [mm] fix hugetlb page leak (Dave McCracken) [orabug 12375075]\n- fix ia64 build error due to add-support-above-32-vcpus.patch(Zhenzhong Duan)\n- [x86] use dynamic vcpu_info remap to support more than 32 vcpus (Zhenzhong Duan)\n- [x86] Fix lvt0 reset when hvm boot up with noapic param\n- [scsi] remove printks when doing I/O to a dead device (John Sobecki, Chris Mason)\n [orabug 12342275]\n- [char] ipmi: Fix IPMI errors due to timing problems (Joe Jin) [orabug 12561346]\n- [scsi] Fix race when removing SCSI devices (Joe Jin) [orabug 12404566]\n- [net] net: Redo the broken redhat netconsole over bonding (Tina Yang) [orabug 12740042]\n- [fs] nfs: Fix __put_nfs_open_context() NULL pointer panic (Joe Jin) [orabug 12687646]\n- [scsi] fix scsi hotplug and rescan race [orabug 10260172]\n- fix filp_close() race (Joe Jin) [orabug 10335998]\n- make xenkbd.abs_pointer=1 by default [orabug 67188919]\n- [xen] check to see if hypervisor supports memory reservation change\n (Chuck Anderson) [orabug 7556514]\n- [net] Enable entropy for bnx2,bnx2x,e1000e,igb,ixgb,ixgbe,ixgbevf (John Sobecki)\n [orabug 10315433]\n- [NET] Add xen pv netconsole support (Tina Yang) [orabug 6993043] [bz 7258]\n- [mm] Patch shrink_zone to yield during severe mempressure events, avoiding\n hangs and evictions (John Sobecki,Chris Mason) [orabug 6086839]\n- [mm] Enhance shrink_zone patch allow full swap utilization, and also be\n NUMA-aware (John Sobecki,Chris Mason,Herbert van den Bergh) [orabug 9245919]\n- fix aacraid not to reset during kexec (Joe Jin) [orabug 8516042]\n- [rds] Patch rds to 1.4.2-20 (Andy Grover) [orabug 9471572, 9344105]\n RDS: Fix BUG_ONs to not fire when in a tasklet\n ipoib: Fix lockup of the tx queue\n RDS: Do not call set_page_dirty() with irqs off (Sherman Pun)\n RDS: Properly unmap when getting a remote access error (Tina Yang)\n RDS: Fix locking in rds_send_drop_to()\n- [xen] PVHVM guest with PoD crashes under memory pressure (Chuck Anderson)\n [orabug 9107465]\n- [xen] PV guest with FC HBA hangs during shutdown (Chuck Anderson)\n [orabug 9764220]\n- Support 256GB+ memory for pv guest (Mukesh Rathor) [orabug 9450615]\n- fix overcommit memory to use percpu_counter for el5 (KOSAKI Motohiro,\n Guru Anbalagane) [orabug 6124033]\n- [ipmi] make configurable timeouts for kcs of ipmi [orabug 9752208]\n- [ib] fix memory corruption (Andy Grover) [orabug 9972346]\n\n[2.6.18-308.20.1.el5]\n- Revert: [x86] mm: randomize SHLIB_BASE (Dave Anderson) [804953 804954] {CVE-2012-1568}\n\n[2.6.18-308.19.1.el5]\n- [net] be2net: Remove code that stops further access to BE NIC based on UE bits (Alexander Gordeev) [867896 862811]\n- [net] netpoll: fix an incorrect check for NULL pointer (Alexander Gordeev) [856079 848098]\n- [net] mlx4: Add support for EEH error recovery (Alexander Gordeev) [847404 798048]\n- [fs] ext4: fix undefined bit shift result in ext4_fill_flex_info (Eric Sandeen) [809688 809689] {CVE-2012-2100}\n- [fs] ext4: fix undefined behavior in ext4_fill_flex_info (Eric Sandeen) [809688 809689] {CVE-2012-2100}\n- [fs] fix crash if block {device|size} read & changed at sametime (Mikulas Patocka) [864823 756506]\n- [x86] mm: randomize SHLIB_BASE (Dave Anderson) [804953 804954] {CVE-2012-1568}\n- [net] ipv6: Fix fib6_dump_table walker leak (Jiri Benc) [861387 819830]\n- [fs] cifs: update cifs_dfs_d_automount caller path (Sachin Prabhu) [858774 857448]\n- [xen] x86: change the default behaviour of CVE-2012-2934 fix (Petr Matousek) [859946 858724]\n- [net] ipvs: allow transmit of GRO aggregated skbs (Jesper Brouer) [857966 854067]\n- [scsi] isci: fixup linkspeed definitions (David Milburn) [854986 833000]\n- [fs] nfs: nfs_d_automount update caller path after do_add_mount (Carlos Maiolino) [857552 834379]\n- [fs] vfs: Fix vfsmount overput on simultaneous automount (Carlos Maiolino) [857552 834379]\n\n[2.6.18-308.18.1.el5]\n- [fs] autofs4: Merge the remaining dentry ops tables (Ian Kent) [857558 850977]\n\n[2.6.18-308.17.1.el5]\n- [fs] cifs: Invalidate file cache in case of posix open (Sachin Prabhu) [857964 852526]', u'issued': u'2012-11-13', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELSA-2012-1445-1.html', u'type': u'self', u'id': None, u'title': u'ELSA-2012-1445-1'}, {u'href': u'http://linux.oracle.com/cve/CVE-2012-2100.html', u'type': u'cve', u'id': u'CVE-2012-2100', u'title': u'CVE-2012-2100'}], u'_content_type_id': u'erratum', u'_id': u'18b52c04-c718-4f1e-890f-3f8ece03a455', u'from': u'el-errata@oss.oracle.com', u'severity': u'Low', u'title': u' kernel security and bug fix update', u'_ns': u'units_erratum', u'rights': u'Copyright 2012 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 5', u'reboot_suggested': False, u'type': u'security', u'pkglist': [{u'packages': [{u'src': None, u'name': u'kernel', u'sum': [u'md5', u'6ba964d0c7d987dcdacf00e680d8f4b3'], u'filename': u'kernel-2.6.18-308.20.1.0.1.el5.src.rpm', u'epoch': u'0', u'version': u'2.6.18', u'release': u'308.20.1.0.1.el5', u'arch': u'src'}, {u'src': None, u'name': u'kernel', u'sum': [u'md5', u'85089dd4934bc82d48ba1464997442d7'], u'filename': u'kernel-2.6.18-308.20.1.0.1.el5.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.18', u'release': u'308.20.1.0.1.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'kernel-debug', u'sum': [u'md5', u'1bdea6699de0d753be84e09767209a07'], u'filename': u'kernel-debug-2.6.18-308.20.1.0.1.el5.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.18', u'release': u'308.20.1.0.1.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'kernel-debug-devel', u'sum': [u'md5', u'd7752121de2d72af6b539490452c89c9'], u'filename': u'kernel-debug-devel-2.6.18-308.20.1.0.1.el5.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.18', u'release': u'308.20.1.0.1.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'kernel-devel', u'sum': [u'md5', u'2ee21beced992ebd03347d4a658951a0'], u'filename': u'kernel-devel-2.6.18-308.20.1.0.1.el5.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.18', u'release': u'308.20.1.0.1.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'kernel-doc', u'sum': [u'md5', u'5a52fa2af5ff493cae867822a4a5ba8b'], u'filename': u'kernel-doc-2.6.18-308.20.1.0.1.el5.noarch.rpm', u'epoch': u'0', u'version': u'2.6.18', u'release': u'308.20.1.0.1.el5', u'arch': u'noarch'}, {u'src': None, u'name': u'kernel-headers', u'sum': [u'md5', u'f00e35a43d233ba0a331661cfefd434d'], u'filename': u'kernel-headers-2.6.18-308.20.1.0.1.el5.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.18', u'release': u'308.20.1.0.1.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'kernel-xen', u'sum': [u'md5', u'39daf0cb08b012864acb1a4b66ac43d5'], u'filename': u'kernel-xen-2.6.18-308.20.1.0.1.el5.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.18', u'release': u'308.20.1.0.1.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'kernel-xen-devel', u'sum': [u'md5', u'a5ce1cb0ff6800c2d89bff3c94a89864'], u'filename': u'kernel-xen-devel-2.6.18-308.20.1.0.1.el5.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.18', u'release': u'308.20.1.0.1.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'ocfs2-2.6.18-308.20.1.0.1.el5', u'sum': [u'md5', u'0b0ee8e875ae668894a4a2e4bea06218'], u'filename': u'ocfs2-2.6.18-308.20.1.0.1.el5-1.4.10-1.el5.src.rpm', u'epoch': u'0', u'version': u'1.4.10', u'release': u'1.el5', u'arch': u'src'}, {u'src': None, u'name': u'ocfs2-2.6.18-308.20.1.0.1.el5', u'sum': [u'md5', u'd2210a9b19342472ad72ea940cfcd9bd'], u'filename': u'ocfs2-2.6.18-308.20.1.0.1.el5-1.4.10-1.el5.x86_64.rpm', u'epoch': u'0', u'version': u'1.4.10', u'release': u'1.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'ocfs2-2.6.18-308.20.1.0.1.el5debug', u'sum': [u'md5', u'45fbf0cf217c8667f4a50fd143745b1a'], u'filename': u'ocfs2-2.6.18-308.20.1.0.1.el5debug-1.4.10-1.el5.x86_64.rpm', u'epoch': u'0', u'version': u'1.4.10', u'release': u'1.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'ocfs2-2.6.18-308.20.1.0.1.el5xen', u'sum': [u'md5', u'47db9b8799e226019e47a2409474991f'], u'filename': u'ocfs2-2.6.18-308.20.1.0.1.el5xen-1.4.10-1.el5.x86_64.rpm', u'epoch': u'0', u'version': u'1.4.10', u'release': u'1.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'oracleasm-2.6.18-308.20.1.0.1.el5', u'sum': [u'md5', u'aec310443e49252916ac8bfec101d9ea'], u'filename': u'oracleasm-2.6.18-308.20.1.0.1.el5-2.0.5-1.el5.src.rpm', u'epoch': u'0', u'version': u'2.0.5', u'release': u'1.el5', u'arch': u'src'}, {u'src': None, u'name': u'oracleasm-2.6.18-308.20.1.0.1.el5', u'sum': [u'md5', u'3806f52ea7ac25228781c84fec58dbcc'], u'filename': u'oracleasm-2.6.18-308.20.1.0.1.el5-2.0.5-1.el5.x86_64.rpm', u'epoch': u'0', u'version': u'2.0.5', u'release': u'1.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'oracleasm-2.6.18-308.20.1.0.1.el5debug', u'sum': [u'md5', u'1c41e6d6e142b2b8041cb8f289236332'], u'filename': u'oracleasm-2.6.18-308.20.1.0.1.el5debug-2.0.5-1.el5.x86_64.rpm', u'epoch': u'0', u'version': u'2.0.5', u'release': u'1.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'oracleasm-2.6.18-308.20.1.0.1.el5xen', u'sum': [u'md5', u'f7122b7e178f00068270783a787ae248'], u'filename': u'oracleasm-2.6.18-308.20.1.0.1.el5xen-2.0.5-1.el5.x86_64.rpm', u'epoch': u'0', u'version': u'2.0.5', u'release': u'1.el5', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u'firefox\n[10.0.11-1.0.1.el6_3]\n- Add firefox-oracle-default-prefs.js and remove the corresponding Red Hat ones\n\n[10.0.11-1]\n- Update to 10.0.11 ESR\n\nxulrunner\n[10.0.11-1.0.1.el6_3]\n- Replaced xulrunner-redhat-default-prefs.js with xulrunner-oracle-default-prefs.js\n\n[10.0.11-1]\n- Update to 10.0.11 ESR', u'issued': u'2012-11-20', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELSA-2012-1482.html', u'type': u'self', u'id': None, u'title': u'ELSA-2012-1482'}, {u'href': u'http://linux.oracle.com/cve/CVE-2012-4201.html', u'type': u'cve', u'id': u'CVE-2012-4201', u'title': u'CVE-2012-4201'}, {u'href': u'http://linux.oracle.com/cve/CVE-2012-4202.html', u'type': u'cve', u'id': u'CVE-2012-4202', u'title': u'CVE-2012-4202'}, {u'href': u'http://linux.oracle.com/cve/CVE-2012-4207.html', u'type': u'cve', u'id': u'CVE-2012-4207', u'title': u'CVE-2012-4207'}, {u'href': u'http://linux.oracle.com/cve/CVE-2012-4209.html', u'type': u'cve', u'id': u'CVE-2012-4209', u'title': u'CVE-2012-4209'}, {u'href': u'http://linux.oracle.com/cve/CVE-2012-4210.html', u'type': u'cve', u'id': u'CVE-2012-4210', u'title': u'CVE-2012-4210'}, {u'href': u'http://linux.oracle.com/cve/CVE-2012-4214.html', u'type': u'cve', u'id': u'CVE-2012-4214', u'title': u'CVE-2012-4214'}, {u'href': u'http://linux.oracle.com/cve/CVE-2012-4215.html', u'type': u'cve', u'id': u'CVE-2012-4215', u'title': u'CVE-2012-4215'}, {u'href': u'http://linux.oracle.com/cve/CVE-2012-4216.html', u'type': u'cve', u'id': u'CVE-2012-4216', u'title': u'CVE-2012-4216'}, {u'href': u'http://linux.oracle.com/cve/CVE-2012-5829.html', u'type': u'cve', u'id': u'CVE-2012-5829', u'title': u'CVE-2012-5829'}, {u'href': u'http://linux.oracle.com/cve/CVE-2012-5830.html', u'type': u'cve', u'id': u'CVE-2012-5830', u'title': u'CVE-2012-5830'}, {u'href': u'http://linux.oracle.com/cve/CVE-2012-5833.html', u'type': u'cve', u'id': u'CVE-2012-5833', u'title': u'CVE-2012-5833'}, {u'href': u'http://linux.oracle.com/cve/CVE-2012-5835.html', u'type': u'cve', u'id': u'CVE-2012-5835', u'title': u'CVE-2012-5835'}, {u'href': u'http://linux.oracle.com/cve/CVE-2012-5839.html', u'type': u'cve', u'id': u'CVE-2012-5839', u'title': u'CVE-2012-5839'}, {u'href': u'http://linux.oracle.com/cve/CVE-2012-5840.html', u'type': u'cve', u'id': u'CVE-2012-5840', u'title': u'CVE-2012-5840'}, {u'href': u'http://linux.oracle.com/cve/CVE-2012-5841.html', u'type': u'cve', u'id': u'CVE-2012-5841', u'title': u'CVE-2012-5841'}, {u'href': u'http://linux.oracle.com/cve/CVE-2012-5842.html', u'type': u'cve', u'id': u'CVE-2012-5842', u'title': u'CVE-2012-5842'}], u'_content_type_id': u'erratum', u'_id': u'36f57b11-c7e4-4871-86e1-dd3cec138914', u'from': u'el-errata@oss.oracle.com', u'severity': u'Critical', u'title': u' firefox security update', u'_ns': u'units_erratum', u'rights': u'Copyright 2012 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 6', u'reboot_suggested': False, u'type': u'security', u'pkglist': [{u'packages': [{u'src': None, u'name': u'firefox', u'sum': [u'md5', u'641059c84eea23c8ff8c1f20f17a2052'], u'filename': u'firefox-10.0.11-1.0.1.el6_3.i686.rpm', u'epoch': u'0', u'version': u'10.0.11', u'release': u'1.0.1.el6_3', u'arch': u'i686'}, {u'src': None, u'name': u'firefox', u'sum': [u'md5', u'c63b395648a01f3aac0974138e081f04'], u'filename': u'firefox-10.0.11-1.0.1.el6_3.src.rpm', u'epoch': u'0', u'version': u'10.0.11', u'release': u'1.0.1.el6_3', u'arch': u'src'}, {u'src': None, u'name': u'firefox', u'sum': [u'md5', u'e5d45e0b5576058177e1a7cc331905c5'], u'filename': u'firefox-10.0.11-1.0.1.el6_3.x86_64.rpm', u'epoch': u'0', u'version': u'10.0.11', u'release': u'1.0.1.el6_3', u'arch': u'x86_64'}, {u'src': None, u'name': u'xulrunner', u'sum': [u'md5', u'c7c0b77208c85fcc65ca372eeeb58474'], u'filename': u'xulrunner-10.0.11-1.0.1.el6_3.i686.rpm', u'epoch': u'0', u'version': u'10.0.11', u'release': u'1.0.1.el6_3', u'arch': u'i686'}, {u'src': None, u'name': u'xulrunner', u'sum': [u'md5', u'b87ccf0b7e1cacef8fa94cbf082b5898'], u'filename': u'xulrunner-10.0.11-1.0.1.el6_3.src.rpm', u'epoch': u'0', u'version': u'10.0.11', u'release': u'1.0.1.el6_3', u'arch': u'src'}, {u'src': None, u'name': u'xulrunner', u'sum': [u'md5', u'6fbd0c9bf878c5bf057f8a96939dcc3d'], u'filename': u'xulrunner-10.0.11-1.0.1.el6_3.x86_64.rpm', u'epoch': u'0', u'version': u'10.0.11', u'release': u'1.0.1.el6_3', u'arch': u'x86_64'}, {u'src': None, u'name': u'xulrunner-devel', u'sum': [u'md5', u'310e6953d3a6f449333d08ceef88f2dd'], u'filename': u'xulrunner-devel-10.0.11-1.0.1.el6_3.i686.rpm', u'epoch': u'0', u'version': u'10.0.11', u'release': u'1.0.1.el6_3', u'arch': u'i686'}, {u'src': None, u'name': u'xulrunner-devel', u'sum': [u'md5', u'92fb036878a06444561ce81f044a36df'], u'filename': u'xulrunner-devel-10.0.11-1.0.1.el6_3.x86_64.rpm', u'epoch': u'0', u'version': u'10.0.11', u'release': u'1.0.1.el6_3', u'arch': u'x86_64'}], u'name': u'ol6_x86_64_latest', u'short': u'ol6_x86_64_latest'}, {u'packages': [{u'src': None, u'name': u'firefox', u'sum': [u'md5', u'84d1b8248749e21ff981f52153d0762c'], u'filename': u'firefox-10.0.11-1.0.1.el5_8.i386.rpm', u'epoch': u'0', u'version': u'10.0.11', u'release': u'1.0.1.el5_8', u'arch': u'i386'}, {u'src': None, u'name': u'firefox', u'sum': [u'md5', u'06b79e93f006267a48909506d74e01c0'], u'filename': u'firefox-10.0.11-1.0.1.el5_8.src.rpm', u'epoch': u'0', u'version': u'10.0.11', u'release': u'1.0.1.el5_8', u'arch': u'src'}, {u'src': None, u'name': u'firefox', u'sum': [u'md5', u'bda9cc8a35269fd6ccf78f0adc58a83e'], u'filename': u'firefox-10.0.11-1.0.1.el5_8.x86_64.rpm', u'epoch': u'0', u'version': u'10.0.11', u'release': u'1.0.1.el5_8', u'arch': u'x86_64'}, {u'src': None, u'name': u'xulrunner', u'sum': [u'md5', u'ae05d8abdc5a5cd12965b9851d699946'], u'filename': u'xulrunner-10.0.11-1.0.1.el5_8.i386.rpm', u'epoch': u'0', u'version': u'10.0.11', u'release': u'1.0.1.el5_8', u'arch': u'i386'}, {u'src': None, u'name': u'xulrunner', u'sum': [u'md5', u'fdd364ed9b009a80b5d1469a9dcf4d5d'], u'filename': u'xulrunner-10.0.11-1.0.1.el5_8.src.rpm', u'epoch': u'0', u'version': u'10.0.11', u'release': u'1.0.1.el5_8', u'arch': u'src'}, {u'src': None, u'name': u'xulrunner', u'sum': [u'md5', u'4357a1f594344ffcd17aba775e0d4f2e'], u'filename': u'xulrunner-10.0.11-1.0.1.el5_8.x86_64.rpm', u'epoch': u'0', u'version': u'10.0.11', u'release': u'1.0.1.el5_8', u'arch': u'x86_64'}, {u'src': None, u'name': u'xulrunner-devel', u'sum': [u'md5', u'9e3c8b3983ada38e4d7a7f86e75ceff2'], u'filename': u'xulrunner-devel-10.0.11-1.0.1.el5_8.i386.rpm', u'epoch': u'0', u'version': u'10.0.11', u'release': u'1.0.1.el5_8', u'arch': u'i386'}, {u'src': None, u'name': u'xulrunner-devel', u'sum': [u'md5', u'b1a10460135b71e7edf3c029d851238e'], u'filename': u'xulrunner-devel-10.0.11-1.0.1.el5_8.x86_64.rpm', u'epoch': u'0', u'version': u'10.0.11', u'release': u'1.0.1.el5_8', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u'[2.7.6-8.0.1.el6_3.4 ]\n- Update doc/redhat.gif in tarball\n- Add libxml2-oracle-enterprise.patch and update logos in tarball\n\n[2.7.6-8.el6_3.4]\n- fix out of range heap access (CVE-2012-5134)', u'issued': u'2012-11-29', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELSA-2012-1512.html', u'type': u'self', u'id': None, u'title': u'ELSA-2012-1512'}, {u'href': u'http://linux.oracle.com/cve/CVE-2012-5134.html', u'type': u'cve', u'id': u'CVE-2012-5134', u'title': u'CVE-2012-5134'}], u'_content_type_id': u'erratum', u'_id': u'fcc6d18e-b446-486c-a8cc-02180f9fea15', u'from': u'el-errata@oss.oracle.com', u'severity': u'Important', u'title': u' libxml2 security update', u'_ns': u'units_erratum', u'rights': u'Copyright 2012 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 6', u'reboot_suggested': False, u'type': u'security', u'pkglist': [{u'packages': [{u'src': None, u'name': u'libxml2', u'sum': [u'md5', u'2f91be77b506050eb0c50d2b464a92c6'], u'filename': u'libxml2-2.7.6-8.0.1.el6_3.4.i686.rpm', u'epoch': u'0', u'version': u'2.7.6', u'release': u'8.0.1.el6_3.4', u'arch': u'i686'}, {u'src': None, u'name': u'libxml2', u'sum': [u'md5', u'52ceb9a3770853ef49ca814b887e1786'], u'filename': u'libxml2-2.7.6-8.0.1.el6_3.4.src.rpm', u'epoch': u'0', u'version': u'2.7.6', u'release': u'8.0.1.el6_3.4', u'arch': u'src'}, {u'src': None, u'name': u'libxml2', u'sum': [u'md5', u'41822d58b8dd83bf8ec2d8bbe55cbaec'], u'filename': u'libxml2-2.7.6-8.0.1.el6_3.4.x86_64.rpm', u'epoch': u'0', u'version': u'2.7.6', u'release': u'8.0.1.el6_3.4', u'arch': u'x86_64'}, {u'src': None, u'name': u'libxml2-devel', u'sum': [u'md5', u'ea7b2d7066c08e0901c9283446b81d12'], u'filename': u'libxml2-devel-2.7.6-8.0.1.el6_3.4.i686.rpm', u'epoch': u'0', u'version': u'2.7.6', u'release': u'8.0.1.el6_3.4', u'arch': u'i686'}, {u'src': None, u'name': u'libxml2-devel', u'sum': [u'md5', u'e1ae8fdde56d61c51206e13eea8d037e'], u'filename': u'libxml2-devel-2.7.6-8.0.1.el6_3.4.x86_64.rpm', u'epoch': u'0', u'version': u'2.7.6', u'release': u'8.0.1.el6_3.4', u'arch': u'x86_64'}, {u'src': None, u'name': u'libxml2-python', u'sum': [u'md5', u'77cf44fd61cdc5da9ce44e555905121d'], u'filename': u'libxml2-python-2.7.6-8.0.1.el6_3.4.x86_64.rpm', u'epoch': u'0', u'version': u'2.7.6', u'release': u'8.0.1.el6_3.4', u'arch': u'x86_64'}, {u'src': None, u'name': u'libxml2-static', u'sum': [u'md5', u'ed6f70fd9c471ef6201fb7b12e268b0f'], u'filename': u'libxml2-static-2.7.6-8.0.1.el6_3.4.x86_64.rpm', u'epoch': u'0', u'version': u'2.7.6', u'release': u'8.0.1.el6_3.4', u'arch': u'x86_64'}], u'name': u'ol6_x86_64_latest', u'short': u'ol6_x86_64_latest'}, {u'packages': [{u'src': None, u'name': u'libxml2', u'sum': [u'md5', u'8f903abe6bcbe0713067ed86a6894ad7'], u'filename': u'libxml2-2.6.26-2.1.15.0.1.el5_8.6.i386.rpm', u'epoch': u'0', u'version': u'2.6.26', u'release': u'2.1.15.0.1.el5_8.6', u'arch': u'i386'}, {u'src': None, u'name': u'libxml2', u'sum': [u'md5', u'55f692be89ba29fa177c8a7d49db941d'], u'filename': u'libxml2-2.6.26-2.1.15.0.1.el5_8.6.src.rpm', u'epoch': u'0', u'version': u'2.6.26', u'release': u'2.1.15.0.1.el5_8.6', u'arch': u'src'}, {u'src': None, u'name': u'libxml2', u'sum': [u'md5', u'602ca25a42c998004868f7bd0458bba4'], u'filename': u'libxml2-2.6.26-2.1.15.0.1.el5_8.6.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.26', u'release': u'2.1.15.0.1.el5_8.6', u'arch': u'x86_64'}, {u'src': None, u'name': u'libxml2-devel', u'sum': [u'md5', u'142bffecbf29cc4e6a8bd36a59f7ee29'], u'filename': u'libxml2-devel-2.6.26-2.1.15.0.1.el5_8.6.i386.rpm', u'epoch': u'0', u'version': u'2.6.26', u'release': u'2.1.15.0.1.el5_8.6', u'arch': u'i386'}, {u'src': None, u'name': u'libxml2-devel', u'sum': [u'md5', u'545e43622cf362375f270098dab3d7d1'], u'filename': u'libxml2-devel-2.6.26-2.1.15.0.1.el5_8.6.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.26', u'release': u'2.1.15.0.1.el5_8.6', u'arch': u'x86_64'}, {u'src': None, u'name': u'libxml2-python', u'sum': [u'md5', u'c3edf1bf9c98e0af37873695c96300f4'], u'filename': u'libxml2-python-2.6.26-2.1.15.0.1.el5_8.6.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.26', u'release': u'2.1.15.0.1.el5_8.6', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u'kernel\n[2.6.18-308.24.1.el5]\n- Revert: [scsi] sg: fix races during device removal (Ewan Milne) [868950 861004]\n\n[2.6.18-308.23.1.el5]\n- [net] bnx2x: Add remote-fault link detection (Alexander Gordeev) [870120 796905]\n- [net] bnx2x: Cosmetic changes (Alexander Gordeev) [870120 796905]\n- [net] rds-ping cause kernel panic (Alexander Gordeev) [822755 822756] {CVE-2012-2372}\n- [xen] add guest address range checks to XENMEM_exchange handlers (Igor Mammedov) [878033 878034] {CVE-2012-5513}\n- [xen] x86/physmap: Prevent incorrect updates of m2p mappings (Igor Mammedov) [870148 870149] {CVE-2012-4537}\n- [xen] VCPU/timer: Dos vulnerability prev overflow in calculations (Igor Mammedov) [870150 870151] {CVE-2012-4535}\n- [scsi] sg: fix races during device removal (Ewan Milne) [868950 861004]\n\n[2.6.18-308.22.1.el5]\n- [net] bonding: fix link down handling in 802.3ad mode (Andy Gospodarek) [877943 782866]\n\n[2.6.18-308.21.1.el5]\n- [fs] ext4: race-cond protect for convert_unwritten_extents_endio (Lukas Czerner) [869910 869911] {CVE-2012-4508}\n- [fs] ext4: serialize fallocate w/ ext4_convert_unwritten_extents (Lukas Czerner) [869910 869911] {CVE-2012-4508}\n- [fs] ext4: flush the i_completed_io_list during ext4_truncate (Lukas Czerner) [869910 869911] {CVE-2012-4508}\n- [net] WARN if struct ip_options was allocated directly by kmalloc (Jiri Pirko) [874973 872612]\n- [net] ipv4: add RCU protection to inet->opt (Jiri Pirko) [872113 855302] {CVE-2012-3552}\n- [scsi] qla2xx: Dont toggle inter bits after IRQ lines attached (Chad Dupuis) [870118 800708]', u'issued': u'2012-12-04', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELSA-2012-1540.html', u'type': u'self', u'id': None, u'title': u'ELSA-2012-1540'}, {u'href': u'http://linux.oracle.com/cve/CVE-2012-2372.html', u'type': u'cve', u'id': u'CVE-2012-2372', u'title': u'CVE-2012-2372'}, {u'href': u'http://linux.oracle.com/cve/CVE-2012-3552.html', u'type': u'cve', u'id': u'CVE-2012-3552', u'title': u'CVE-2012-3552'}, {u'href': u'http://linux.oracle.com/cve/CVE-2012-4508.html', u'type': u'cve', u'id': u'CVE-2012-4508', u'title': u'CVE-2012-4508'}, {u'href': u'http://linux.oracle.com/cve/CVE-2012-4535.html', u'type': u'cve', u'id': u'CVE-2012-4535', u'title': u'CVE-2012-4535'}, {u'href': u'http://linux.oracle.com/cve/CVE-2012-4537.html', u'type': u'cve', u'id': u'CVE-2012-4537', u'title': u'CVE-2012-4537'}, {u'href': u'http://linux.oracle.com/cve/CVE-2012-5513.html', u'type': u'cve', u'id': u'CVE-2012-5513', u'title': u'CVE-2012-5513'}], u'_content_type_id': u'erratum', u'_id': u'136b7db0-3f46-43b7-b758-1aac8f29acad', u'from': u'el-errata@oss.oracle.com', u'severity': u'Important', u'title': u' kernel security, bug fix, and enhancement update', u'_ns': u'units_erratum', u'rights': u'Copyright 2012 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 5', u'reboot_suggested': False, u'type': u'security', u'pkglist': [{u'packages': [{u'src': None, u'name': u'kernel', u'sum': [u'md5', u'29f219fe0f2c2ad61600c758ffa72886'], u'filename': u'kernel-2.6.18-308.24.1.el5.src.rpm', u'epoch': u'0', u'version': u'2.6.18', u'release': u'308.24.1.el5', u'arch': u'src'}, {u'src': None, u'name': u'kernel', u'sum': [u'md5', u'1c0b8f36abda225a46bb504a7a956f54'], u'filename': u'kernel-2.6.18-308.24.1.el5.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.18', u'release': u'308.24.1.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'kernel-debug', u'sum': [u'md5', u'0fe511dae66f4eeb5649cf2010b1d71f'], u'filename': u'kernel-debug-2.6.18-308.24.1.el5.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.18', u'release': u'308.24.1.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'kernel-debug-devel', u'sum': [u'md5', u'24fe2a2b07c9ecebf58ecd40e3e99940'], u'filename': u'kernel-debug-devel-2.6.18-308.24.1.el5.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.18', u'release': u'308.24.1.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'kernel-devel', u'sum': [u'md5', u'31459a80e1229ee9efab2dcbafe5be7d'], u'filename': u'kernel-devel-2.6.18-308.24.1.el5.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.18', u'release': u'308.24.1.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'kernel-doc', u'sum': [u'md5', u'0740c769080ecb7ea198b33d797fa052'], u'filename': u'kernel-doc-2.6.18-308.24.1.el5.noarch.rpm', u'epoch': u'0', u'version': u'2.6.18', u'release': u'308.24.1.el5', u'arch': u'noarch'}, {u'src': None, u'name': u'kernel-headers', u'sum': [u'md5', u'88570251157e41fa1df01740c64c9c66'], u'filename': u'kernel-headers-2.6.18-308.24.1.el5.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.18', u'release': u'308.24.1.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'kernel-xen', u'sum': [u'md5', u'2ef1e761289f00dd295e84e00ffbb163'], u'filename': u'kernel-xen-2.6.18-308.24.1.el5.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.18', u'release': u'308.24.1.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'kernel-xen-devel', u'sum': [u'md5', u'557a3d4e1fd91ce384239c2ca4a9443e'], u'filename': u'kernel-xen-devel-2.6.18-308.24.1.el5.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.18', u'release': u'308.24.1.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'ocfs2-2.6.18-308.24.1.el5', u'sum': [u'md5', u'289af4f863d6479f461ebe5dc6ad27f4'], u'filename': u'ocfs2-2.6.18-308.24.1.el5-1.4.10-1.el5.src.rpm', u'epoch': u'0', u'version': u'1.4.10', u'release': u'1.el5', u'arch': u'src'}, {u'src': None, u'name': u'ocfs2-2.6.18-308.24.1.el5', u'sum': [u'md5', u'6f0b3302f0293863ed3c638887c3da73'], u'filename': u'ocfs2-2.6.18-308.24.1.el5-1.4.10-1.el5.x86_64.rpm', u'epoch': u'0', u'version': u'1.4.10', u'release': u'1.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'ocfs2-2.6.18-308.24.1.el5debug', u'sum': [u'md5', u'8eb76fd82dcffdbab1524216e07aaf27'], u'filename': u'ocfs2-2.6.18-308.24.1.el5debug-1.4.10-1.el5.x86_64.rpm', u'epoch': u'0', u'version': u'1.4.10', u'release': u'1.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'ocfs2-2.6.18-308.24.1.el5xen', u'sum': [u'md5', u'9d9950392b39bb70f8a8f02f77e05c81'], u'filename': u'ocfs2-2.6.18-308.24.1.el5xen-1.4.10-1.el5.x86_64.rpm', u'epoch': u'0', u'version': u'1.4.10', u'release': u'1.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'oracleasm-2.6.18-308.24.1.el5', u'sum': [u'md5', u'ffe92fbee4ff693860f4b56d0b2bf616'], u'filename': u'oracleasm-2.6.18-308.24.1.el5-2.0.5-1.el5.src.rpm', u'epoch': u'0', u'version': u'2.0.5', u'release': u'1.el5', u'arch': u'src'}, {u'src': None, u'name': u'oracleasm-2.6.18-308.24.1.el5', u'sum': [u'md5', u'435df0af124a7eb086ecd7b206e4125a'], u'filename': u'oracleasm-2.6.18-308.24.1.el5-2.0.5-1.el5.x86_64.rpm', u'epoch': u'0', u'version': u'2.0.5', u'release': u'1.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'oracleasm-2.6.18-308.24.1.el5debug', u'sum': [u'md5', u'e1646407b187e1d3b4d74c7a1226122a'], u'filename': u'oracleasm-2.6.18-308.24.1.el5debug-2.0.5-1.el5.x86_64.rpm', u'epoch': u'0', u'version': u'2.0.5', u'release': u'1.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'oracleasm-2.6.18-308.24.1.el5xen', u'sum': [u'md5', u'33cdebd5b11aa4efb6213077a2288bef'], u'filename': u'oracleasm-2.6.18-308.24.1.el5xen-2.0.5-1.el5.x86_64.rpm', u'epoch': u'0', u'version': u'2.0.5', u'release': u'1.el5', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u'kernel\n[2.6.18-308.24.1.0.1.el5]\n- [kernel] Initialize the local uninitialized variable stats. [orabug 14051367]\n- [fs] JBD:make jbd support 512B blocks correctly for ocfs2. [orabug 13477763]\n- [x86 ] fix fpu context corrupt when preempt in signal context [orabug 14038272]\n- [mm] fix hugetlb page leak (Dave McCracken) [orabug 12375075]\n- fix ia64 build error due to add-support-above-32-vcpus.patch(Zhenzhong Duan)\n- [x86] use dynamic vcpu_info remap to support more than 32 vcpus (Zhenzhong Duan)\n- [x86] Fix lvt0 reset when hvm boot up with noapic param\n- [scsi] remove printks when doing I/O to a dead device (John Sobecki, Chris Mason)\n [orabug 12342275]\n- [char] ipmi: Fix IPMI errors due to timing problems (Joe Jin) [orabug 12561346]\n- [scsi] Fix race when removing SCSI devices (Joe Jin) [orabug 12404566]\n- [net] net: Redo the broken redhat netconsole over bonding (Tina Yang) [orabug 12740042]\n- [fs] nfs: Fix __put_nfs_open_context() NULL pointer panic (Joe Jin) [orabug 12687646]\n- [scsi] fix scsi hotplug and rescan race [orabug 10260172]\n- fix filp_close() race (Joe Jin) [orabug 10335998]\n- make xenkbd.abs_pointer=1 by default [orabug 67188919]\n- [xen] check to see if hypervisor supports memory reservation change\n (Chuck Anderson) [orabug 7556514]\n- [net] Enable entropy for bnx2,bnx2x,e1000e,igb,ixgb,ixgbe,ixgbevf (John Sobecki)\n [orabug 10315433]\n- [NET] Add xen pv netconsole support (Tina Yang) [orabug 6993043] [bz 7258]\n- [mm] Patch shrink_zone to yield during severe mempressure events, avoiding\n hangs and evictions (John Sobecki,Chris Mason) [orabug 6086839]\n- [mm] Enhance shrink_zone patch allow full swap utilization, and also be\n NUMA-aware (John Sobecki,Chris Mason,Herbert van den Bergh) [orabug 9245919]\n- fix aacraid not to reset during kexec (Joe Jin) [orabug 8516042]\n- [rds] Patch rds to 1.4.2-20 (Andy Grover) [orabug 9471572, 9344105]\n RDS: Fix BUG_ONs to not fire when in a tasklet\n ipoib: Fix lockup of the tx queue\n RDS: Do not call set_page_dirty() with irqs off (Sherman Pun)\n RDS: Properly unmap when getting a remote access error (Tina Yang)\n RDS: Fix locking in rds_send_drop_to()\n- [xen] PVHVM guest with PoD crashes under memory pressure (Chuck Anderson)\n [orabug 9107465]\n- [xen] PV guest with FC HBA hangs during shutdown (Chuck Anderson)\n [orabug 9764220]\n- Support 256GB+ memory for pv guest (Mukesh Rathor) [orabug 9450615]\n- fix overcommit memory to use percpu_counter for el5 (KOSAKI Motohiro,\n Guru Anbalagane) [orabug 6124033]\n- [ipmi] make configurable timeouts for kcs of ipmi [orabug 9752208]\n- [ib] fix memory corruption (Andy Grover) [orabug 9972346]\n\n[2.6.18-308.24.1.el5]\n- Revert: [scsi] sg: fix races during device removal (Ewan Milne) [868950 861004]\n\n[2.6.18-308.23.1.el5]\n- [net] bnx2x: Add remote-fault link detection (Alexander Gordeev) [870120 796905]\n- [net] bnx2x: Cosmetic changes (Alexander Gordeev) [870120 796905]\n- [net] rds-ping cause kernel panic (Alexander Gordeev) [822755 822756] {CVE-2012-2372}\n- [xen] add guest address range checks to XENMEM_exchange handlers (Igor Mammedov) [878033 878034] {CVE-2012-5513}\n- [xen] x86/physmap: Prevent incorrect updates of m2p mappings (Igor Mammedov) [870148 870149] {CVE-2012-4537}\n- [xen] VCPU/timer: Dos vulnerability prev overflow in calculations (Igor Mammedov) [870150 870151] {CVE-2012-4535}\n- [scsi] sg: fix races during device removal (Ewan Milne) [868950 861004]\n\n[2.6.18-308.22.1.el5]\n- [net] bonding: fix link down handling in 802.3ad mode (Andy Gospodarek) [877943 782866]\n\n[2.6.18-308.21.1.el5]\n- [fs] ext4: race-cond protect for convert_unwritten_extents_endio (Lukas Czerner) [869910 869911] {CVE-2012-4508}\n- [fs] ext4: serialize fallocate w/ ext4_convert_unwritten_extents (Lukas Czerner) [869910 869911] {CVE-2012-4508}\n- [fs] ext4: flush the i_completed_io_list during ext4_truncate (Lukas Czerner) [869910 869911] {CVE-2012-4508}\n- [net] WARN if struct ip_options was allocated directly by kmalloc (Jiri Pirko) [874973 872612]\n- [net] ipv4: add RCU protection to inet->opt (Jiri Pirko) [872113 855302] {CVE-2012-3552}\n- [scsi] qla2xx: Dont toggle inter bits after IRQ lines attached (Chad Dupuis) [870118 800708]', u'issued': u'2012-12-05', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELSA-2012-1540-1.html', u'type': u'self', u'id': None, u'title': u'ELSA-2012-1540-1'}, {u'href': u'http://linux.oracle.com/cve/CVE-2012-2372.html', u'type': u'cve', u'id': u'CVE-2012-2372', u'title': u'CVE-2012-2372'}, {u'href': u'http://linux.oracle.com/cve/CVE-2012-3552.html', u'type': u'cve', u'id': u'CVE-2012-3552', u'title': u'CVE-2012-3552'}, {u'href': u'http://linux.oracle.com/cve/CVE-2012-4508.html', u'type': u'cve', u'id': u'CVE-2012-4508', u'title': u'CVE-2012-4508'}, {u'href': u'http://linux.oracle.com/cve/CVE-2012-4535.html', u'type': u'cve', u'id': u'CVE-2012-4535', u'title': u'CVE-2012-4535'}, {u'href': u'http://linux.oracle.com/cve/CVE-2012-4537.html', u'type': u'cve', u'id': u'CVE-2012-4537', u'title': u'CVE-2012-4537'}, {u'href': u'http://linux.oracle.com/cve/CVE-2012-5513.html', u'type': u'cve', u'id': u'CVE-2012-5513', u'title': u'CVE-2012-5513'}], u'_content_type_id': u'erratum', u'_id': u'305b0b9a-f646-4bf0-b35f-473d483f4bdc', u'from': u'el-errata@oss.oracle.com', u'severity': u'Important', u'title': u' kernel security, bug fix, and enhancement update', u'_ns': u'units_erratum', u'rights': u'Copyright 2012 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 5', u'reboot_suggested': False, u'type': u'security', u'pkglist': [{u'packages': [{u'src': None, u'name': u'kernel', u'sum': [u'md5', u'478e453b015e6154777ebc4b492d94f5'], u'filename': u'kernel-2.6.18-308.24.1.0.1.el5.src.rpm', u'epoch': u'0', u'version': u'2.6.18', u'release': u'308.24.1.0.1.el5', u'arch': u'src'}, {u'src': None, u'name': u'kernel', u'sum': [u'md5', u'520dd8b71e71ca5785fcf97fe18e6d65'], u'filename': u'kernel-2.6.18-308.24.1.0.1.el5.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.18', u'release': u'308.24.1.0.1.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'kernel-debug', u'sum': [u'md5', u'ef08562e78d7220975ae13c37b0dff81'], u'filename': u'kernel-debug-2.6.18-308.24.1.0.1.el5.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.18', u'release': u'308.24.1.0.1.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'kernel-debug-devel', u'sum': [u'md5', u'75fd4f57a811c5ebeb1f9114bce0e9d5'], u'filename': u'kernel-debug-devel-2.6.18-308.24.1.0.1.el5.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.18', u'release': u'308.24.1.0.1.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'kernel-devel', u'sum': [u'md5', u'12c1418ca809eb38651e80ae7d4bbd88'], u'filename': u'kernel-devel-2.6.18-308.24.1.0.1.el5.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.18', u'release': u'308.24.1.0.1.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'kernel-doc', u'sum': [u'md5', u'c2bc1439e299dccf56fce0b78489aef9'], u'filename': u'kernel-doc-2.6.18-308.24.1.0.1.el5.noarch.rpm', u'epoch': u'0', u'version': u'2.6.18', u'release': u'308.24.1.0.1.el5', u'arch': u'noarch'}, {u'src': None, u'name': u'kernel-headers', u'sum': [u'md5', u'73c295a8b2568241a566fedd1bcb16a0'], u'filename': u'kernel-headers-2.6.18-308.24.1.0.1.el5.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.18', u'release': u'308.24.1.0.1.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'kernel-xen', u'sum': [u'md5', u'298ac3462954849a7833031276a2d203'], u'filename': u'kernel-xen-2.6.18-308.24.1.0.1.el5.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.18', u'release': u'308.24.1.0.1.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'kernel-xen-devel', u'sum': [u'md5', u'd35b2a4a38b661f778e73d0dec9ea434'], u'filename': u'kernel-xen-devel-2.6.18-308.24.1.0.1.el5.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.18', u'release': u'308.24.1.0.1.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'ocfs2-2.6.18-308.24.1.0.1.el5', u'sum': [u'md5', u'2b39ccfcbba847aa15790a9e7b12342f'], u'filename': u'ocfs2-2.6.18-308.24.1.0.1.el5-1.4.10-1.el5.src.rpm', u'epoch': u'0', u'version': u'1.4.10', u'release': u'1.el5', u'arch': u'src'}, {u'src': None, u'name': u'ocfs2-2.6.18-308.24.1.0.1.el5', u'sum': [u'md5', u'21474107d92827e06f12918d32eed3fb'], u'filename': u'ocfs2-2.6.18-308.24.1.0.1.el5-1.4.10-1.el5.x86_64.rpm', u'epoch': u'0', u'version': u'1.4.10', u'release': u'1.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'ocfs2-2.6.18-308.24.1.0.1.el5debug', u'sum': [u'md5', u'82eac1d60ea2ed3923e5cbc02600c5c5'], u'filename': u'ocfs2-2.6.18-308.24.1.0.1.el5debug-1.4.10-1.el5.x86_64.rpm', u'epoch': u'0', u'version': u'1.4.10', u'release': u'1.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'ocfs2-2.6.18-308.24.1.0.1.el5xen', u'sum': [u'md5', u'41df1a97291170b47791296ae728e7e7'], u'filename': u'ocfs2-2.6.18-308.24.1.0.1.el5xen-1.4.10-1.el5.x86_64.rpm', u'epoch': u'0', u'version': u'1.4.10', u'release': u'1.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'oracleasm-2.6.18-308.24.1.0.1.el5', u'sum': [u'md5', u'60e183c4783397daf3cbac96dbc98703'], u'filename': u'oracleasm-2.6.18-308.24.1.0.1.el5-2.0.5-1.el5.src.rpm', u'epoch': u'0', u'version': u'2.0.5', u'release': u'1.el5', u'arch': u'src'}, {u'src': None, u'name': u'oracleasm-2.6.18-308.24.1.0.1.el5', u'sum': [u'md5', u'e70cfa5561629e46f312c35a5ff9a4bf'], u'filename': u'oracleasm-2.6.18-308.24.1.0.1.el5-2.0.5-1.el5.x86_64.rpm', u'epoch': u'0', u'version': u'2.0.5', u'release': u'1.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'oracleasm-2.6.18-308.24.1.0.1.el5debug', u'sum': [u'md5', u'645d77e1c7ccad314730086fc069221c'], u'filename': u'oracleasm-2.6.18-308.24.1.0.1.el5debug-2.0.5-1.el5.x86_64.rpm', u'epoch': u'0', u'version': u'2.0.5', u'release': u'1.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'oracleasm-2.6.18-308.24.1.0.1.el5xen', u'sum': [u'md5', u'93e33a59bd84e9043ce2542c84900e2a'], u'filename': u'oracleasm-2.6.18-308.24.1.0.1.el5xen-2.0.5-1.el5.x86_64.rpm', u'epoch': u'0', u'version': u'2.0.5', u'release': u'1.el5', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u'[3.9.4-9]\n- Still more fixes to make test case for CVE-2012-5581 work on all platforms\nResolves: #885310\n\n[3.9.4-8]\n- Fix incomplete patch for CVE-2012-3401\n- Add libtiff-tiffinfo-exif.patch so that our test case for CVE-2012-5581 works\n with pre-4.0.2 libtiff\nResolves: #885310\n\n[3.9.4-7]\n- Add fixes for CVE-2012-3401, CVE-2012-4447, CVE-2012-4564, CVE-2012-5581\nResolves: #885310', u'issued': u'2012-12-18', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELSA-2012-1590.html', u'type': u'self', u'id': None, u'title': u'ELSA-2012-1590'}, {u'href': u'http://linux.oracle.com/cve/CVE-2012-3401.html', u'type': u'cve', u'id': u'CVE-2012-3401', u'title': u'CVE-2012-3401'}, {u'href': u'http://linux.oracle.com/cve/CVE-2012-4447.html', u'type': u'cve', u'id': u'CVE-2012-4447', u'title': u'CVE-2012-4447'}, {u'href': u'http://linux.oracle.com/cve/CVE-2012-4564.html', u'type': u'cve', u'id': u'CVE-2012-4564', u'title': u'CVE-2012-4564'}, {u'href': u'http://linux.oracle.com/cve/CVE-2012-5581.html', u'type': u'cve', u'id': u'CVE-2012-5581', u'title': u'CVE-2012-5581'}], u'_content_type_id': u'erratum', u'_id': u'22388429-427c-423b-8f0c-f32030ba48db', u'from': u'el-errata@oss.oracle.com', u'severity': u'Moderate', u'title': u' libtiff security update', u'_ns': u'units_erratum', u'rights': u'Copyright 2012 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 6', u'reboot_suggested': False, u'type': u'security', u'pkglist': [{u'packages': [{u'src': None, u'name': u'libtiff', u'sum': [u'md5', u'5c61b7bfb6c745655db352d5b7d29a7e'], u'filename': u'libtiff-3.9.4-9.el6_3.i686.rpm', u'epoch': u'0', u'version': u'3.9.4', u'release': u'9.el6_3', u'arch': u'i686'}, {u'src': None, u'name': u'libtiff', u'sum': [u'md5', u'14d47354cb10a7ecd86a7de3f12920c4'], u'filename': u'libtiff-3.9.4-9.el6_3.src.rpm', u'epoch': u'0', u'version': u'3.9.4', u'release': u'9.el6_3', u'arch': u'src'}, {u'src': None, u'name': u'libtiff', u'sum': [u'md5', u'cd25f7f4bfffe7d021e61b62a2db4d8a'], u'filename': u'libtiff-3.9.4-9.el6_3.x86_64.rpm', u'epoch': u'0', u'version': u'3.9.4', u'release': u'9.el6_3', u'arch': u'x86_64'}, {u'src': None, u'name': u'libtiff-devel', u'sum': [u'md5', u'de0ee49cb113713a39f5a3665f67c682'], u'filename': u'libtiff-devel-3.9.4-9.el6_3.i686.rpm', u'epoch': u'0', u'version': u'3.9.4', u'release': u'9.el6_3', u'arch': u'i686'}, {u'src': None, u'name': u'libtiff-devel', u'sum': [u'md5', u'0ed2a25fe0485f00f7abd71d38f71f7c'], u'filename': u'libtiff-devel-3.9.4-9.el6_3.x86_64.rpm', u'epoch': u'0', u'version': u'3.9.4', u'release': u'9.el6_3', u'arch': u'x86_64'}, {u'src': None, u'name': u'libtiff-static', u'sum': [u'md5', u'13852a84b7410f664d0c381466f67861'], u'filename': u'libtiff-static-3.9.4-9.el6_3.x86_64.rpm', u'epoch': u'0', u'version': u'3.9.4', u'release': u'9.el6_3', u'arch': u'x86_64'}], u'name': u'ol6_x86_64_latest', u'short': u'ol6_x86_64_latest'}, {u'packages': [{u'src': None, u'name': u'libtiff', u'sum': [u'md5', u'b7277f02f504dcb96e49a819db36c3d1'], u'filename': u'libtiff-3.8.2-18.el5_8.i386.rpm', u'epoch': u'0', u'version': u'3.8.2', u'release': u'18.el5_8', u'arch': u'i386'}, {u'src': None, u'name': u'libtiff', u'sum': [u'md5', u'54b124b1a3220ae7b26b57e0f2bd1f4d'], u'filename': u'libtiff-3.8.2-18.el5_8.src.rpm', u'epoch': u'0', u'version': u'3.8.2', u'release': u'18.el5_8', u'arch': u'src'}, {u'src': None, u'name': u'libtiff', u'sum': [u'md5', u'f4f0432addcb0c15bb210f9135f607d1'], u'filename': u'libtiff-3.8.2-18.el5_8.x86_64.rpm', u'epoch': u'0', u'version': u'3.8.2', u'release': u'18.el5_8', u'arch': u'x86_64'}, {u'src': None, u'name': u'libtiff-devel', u'sum': [u'md5', u'a0884d5072fbdec2b1845b33da212a40'], u'filename': u'libtiff-devel-3.8.2-18.el5_8.i386.rpm', u'epoch': u'0', u'version': u'3.8.2', u'release': u'18.el5_8', u'arch': u'i386'}, {u'src': None, u'name': u'libtiff-devel', u'sum': [u'md5', u'87a53112ee99cdb09f364d6a0c39de6b'], u'filename': u'libtiff-devel-3.8.2-18.el5_8.x86_64.rpm', u'epoch': u'0', u'version': u'3.8.2', u'release': u'18.el5_8', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u'[2.6.32-300.7.1.el6uek]\n- Revert "proc: enable writing to /proc/pid/mem" [orabug 13619701] {CVE-2012-0056}\n- [PATCH] x86, tsc: Skip TSC synchronization checks for tsc=reliable (Suresh Siddha)\n\n[2.6.32-300.6.1.el6uek]\n- tracing: Fix null pointer deref with SEND_SIG_FORCED (Oleg Nesterov) [orabug 13611655]\n\n[2.6.32-300.5.1.el6uek]\n- sched, x86: Avoid unnecessary overflow in sched_clock (Salman Qazi) [orabug 13604567]\n- [x86]: Don\'t resume/restore cpu if not of the expected cpu (Joe Jin) [orabug 13492670]\n- drm/i915: Rephrase pwrite bounds checking to avoid any potential overflow (Chris Wilson) [CVE-2010-296]\n- x2apic: Enable the bios request for x2apic optout (Suresh Siddha) [orabug 13565303]\n- fuse: split queues to scale I/O throughput (Srinivas Eeda) [orabug 10004611]\n- fuse: break fc spinlock (Srinivas Eeda) [orabug 10004611]', u'issued': u'2012-01-24', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELSA-2012-2001.html', u'type': u'self', u'id': None, u'title': u'ELSA-2012-2001'}, {u'href': u'http://linux.oracle.com/cve/CVE-2010-2962.html', u'type': u'cve', u'id': u'CVE-2010-2962', u'title': u'CVE-2010-2962'}, {u'href': u'http://linux.oracle.com/cve/CVE-2012-0056.html', u'type': u'cve', u'id': u'CVE-2012-0056', u'title': u'CVE-2012-0056'}], u'_content_type_id': u'erratum', u'_id': u'8591e8bb-a96e-491d-ac4e-771077324843', u'from': u'el-errata@oss.oracle.com', u'severity': u'Important', u'title': u' Unbreakable Enterprise kernel security and bug fix update', u'_ns': u'units_erratum', u'rights': u'Copyright 2012 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 6', u'reboot_suggested': False, u'type': u'security', u'pkglist': [{u'packages': [{u'src': None, u'name': u'kernel-uek', u'sum': [u'md5', u'5aab1878988f9bfcf9092bb6e10c91b9'], u'filename': u'kernel-uek-2.6.32-300.7.1.el6uek.src.rpm', u'epoch': u'0', u'version': u'2.6.32', u'release': u'300.7.1.el6uek', u'arch': u'src'}, {u'src': None, u'name': u'kernel-uek', u'sum': [u'md5', u'c73b40e4d804e79f41e6e67bd6f94a90'], u'filename': u'kernel-uek-2.6.32-300.7.1.el6uek.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.32', u'release': u'300.7.1.el6uek', u'arch': u'x86_64'}, {u'src': None, u'name': u'kernel-uek-debug', u'sum': [u'md5', u'2bf5ff4612e58549515601bdc8f140a3'], u'filename': u'kernel-uek-debug-2.6.32-300.7.1.el6uek.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.32', u'release': u'300.7.1.el6uek', u'arch': u'x86_64'}, {u'src': None, u'name': u'kernel-uek-debug-devel', u'sum': [u'md5', u'2f4882590b3ed66c728b1643ef69fd13'], u'filename': u'kernel-uek-debug-devel-2.6.32-300.7.1.el6uek.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.32', u'release': u'300.7.1.el6uek', u'arch': u'x86_64'}, {u'src': None, u'name': u'kernel-uek-devel', u'sum': [u'md5', u'7052957fce6ede2d45fc5e866ca8f361'], u'filename': u'kernel-uek-devel-2.6.32-300.7.1.el6uek.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.32', u'release': u'300.7.1.el6uek', u'arch': u'x86_64'}, {u'src': None, u'name': u'kernel-uek-doc', u'sum': [u'md5', u'7e13982aa58ebac1a3793542db9be201'], u'filename': u'kernel-uek-doc-2.6.32-300.7.1.el6uek.noarch.rpm', u'epoch': u'0', u'version': u'2.6.32', u'release': u'300.7.1.el6uek', u'arch': u'noarch'}, {u'src': None, u'name': u'kernel-uek-firmware', u'sum': [u'md5', u'3fd5a06c552655054b3d7e26ddd79ca9'], u'filename': u'kernel-uek-firmware-2.6.32-300.7.1.el6uek.noarch.rpm', u'epoch': u'0', u'version': u'2.6.32', u'release': u'300.7.1.el6uek', u'arch': u'noarch'}, {u'src': None, u'name': u'kernel-uek-headers', u'sum': [u'md5', u'006ad5f19694e45c3e701cedb9110b59'], u'filename': u'kernel-uek-headers-2.6.32-300.7.1.el6uek.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.32', u'release': u'300.7.1.el6uek', u'arch': u'x86_64'}, {u'src': None, u'name': u'mlnx_en-2.6.32-300.7.1.el6uek', u'sum': [u'md5', u'5b86243471906fbe4cc39d97fc691e49'], u'filename': u'mlnx_en-2.6.32-300.7.1.el6uek-1.5.7-0.1.src.rpm', u'epoch': u'0', u'version': u'1.5.7', u'release': u'0.1', u'arch': u'src'}, {u'src': None, u'name': u'mlnx_en-2.6.32-300.7.1.el6uek', u'sum': [u'md5', u'cf58c0824fab79ced721e867324d2bba'], u'filename': u'mlnx_en-2.6.32-300.7.1.el6uek-1.5.7-0.1.x86_64.rpm', u'epoch': u'0', u'version': u'1.5.7', u'release': u'0.1', u'arch': u'x86_64'}, {u'src': None, u'name': u'mlnx_en-2.6.32-300.7.1.el6uekdebug', u'sum': [u'md5', u'7608cc52bfeeb461747de26b8574a57d'], u'filename': u'mlnx_en-2.6.32-300.7.1.el6uekdebug-1.5.7-0.1.x86_64.rpm', u'epoch': u'0', u'version': u'1.5.7', u'release': u'0.1', u'arch': u'x86_64'}, {u'src': None, u'name': u'ofa-2.6.32-300.7.1.el6uek', u'sum': [u'md5', u'5edd0ff793c460cdd0549e69768f2e71'], u'filename': u'ofa-2.6.32-300.7.1.el6uek-1.5.1-4.0.47.src.rpm', u'epoch': u'0', u'version': u'1.5.1', u'release': u'4.0.47', u'arch': u'src'}, {u'src': None, u'name': u'ofa-2.6.32-300.7.1.el6uek', u'sum': [u'md5', u'997d0d3d54a772a090dd4023810e4fce'], u'filename': u'ofa-2.6.32-300.7.1.el6uek-1.5.1-4.0.47.x86_64.rpm', u'epoch': u'0', u'version': u'1.5.1', u'release': u'4.0.47', u'arch': u'x86_64'}, {u'src': None, u'name': u'ofa-2.6.32-300.7.1.el6uekdebug', u'sum': [u'md5', u'72388ad53b61c33f63088d3798cc08f6'], u'filename': u'ofa-2.6.32-300.7.1.el6uekdebug-1.5.1-4.0.47.x86_64.rpm', u'epoch': u'0', u'version': u'1.5.1', u'release': u'4.0.47', u'arch': u'x86_64'}], u'name': u'ol6_x86_64_latest', u'short': u'ol6_x86_64_latest'}, {u'packages': [{u'src': None, u'name': u'kernel-uek', u'sum': [u'md5', u'cb9a2ce33e4f87708ff350ebb6f5d902'], u'filename': u'kernel-uek-2.6.32-300.7.1.el5uek.src.rpm', u'epoch': u'0', u'version': u'2.6.32', u'release': u'300.7.1.el5uek', u'arch': u'src'}, {u'src': None, u'name': u'kernel-uek', u'sum': [u'md5', u'158f52eb569b471bedf3c225e7f24168'], u'filename': u'kernel-uek-2.6.32-300.7.1.el5uek.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.32', u'release': u'300.7.1.el5uek', u'arch': u'x86_64'}, {u'src': None, u'name': u'kernel-uek-debug', u'sum': [u'md5', u'00d27e912bebf92cc9415675fb413a11'], u'filename': u'kernel-uek-debug-2.6.32-300.7.1.el5uek.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.32', u'release': u'300.7.1.el5uek', u'arch': u'x86_64'}, {u'src': None, u'name': u'kernel-uek-debug-devel', u'sum': [u'md5', u'394e3538ae9388474576374f2a100121'], u'filename': u'kernel-uek-debug-devel-2.6.32-300.7.1.el5uek.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.32', u'release': u'300.7.1.el5uek', u'arch': u'x86_64'}, {u'src': None, u'name': u'kernel-uek-devel', u'sum': [u'md5', u'15ae1003240d16c0b60082c37cc7b3e8'], u'filename': u'kernel-uek-devel-2.6.32-300.7.1.el5uek.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.32', u'release': u'300.7.1.el5uek', u'arch': u'x86_64'}, {u'src': None, u'name': u'kernel-uek-doc', u'sum': [u'md5', u'3f8ed30c3e4d72e6bdc2ebee2501b816'], u'filename': u'kernel-uek-doc-2.6.32-300.7.1.el5uek.noarch.rpm', u'epoch': u'0', u'version': u'2.6.32', u'release': u'300.7.1.el5uek', u'arch': u'noarch'}, {u'src': None, u'name': u'kernel-uek-firmware', u'sum': [u'md5', u'01f21cbd4751d6e642f9a5605e73f37e'], u'filename': u'kernel-uek-firmware-2.6.32-300.7.1.el5uek.noarch.rpm', u'epoch': u'0', u'version': u'2.6.32', u'release': u'300.7.1.el5uek', u'arch': u'noarch'}, {u'src': None, u'name': u'ofa-2.6.32-300.7.1.el5uek', u'sum': [u'md5', u'292f3048357d1790818b977a7e696b68'], u'filename': u'ofa-2.6.32-300.7.1.el5uek-1.5.1-4.0.53.src.rpm', u'epoch': u'0', u'version': u'1.5.1', u'release': u'4.0.53', u'arch': u'src'}, {u'src': None, u'name': u'ofa-2.6.32-300.7.1.el5uek', u'sum': [u'md5', u'de93e8f23eea8507611d5cb5707f9055'], u'filename': u'ofa-2.6.32-300.7.1.el5uek-1.5.1-4.0.53.x86_64.rpm', u'epoch': u'0', u'version': u'1.5.1', u'release': u'4.0.53', u'arch': u'x86_64'}, {u'src': None, u'name': u'ofa-2.6.32-300.7.1.el5uekdebug', u'sum': [u'md5', u'c582661bb05f2ab20b3da6ea24abbf3a'], u'filename': u'ofa-2.6.32-300.7.1.el5uekdebug-1.5.1-4.0.53.x86_64.rpm', u'epoch': u'0', u'version': u'1.5.1', u'release': u'4.0.53', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u"[2.6.32-300.11.1.el6uek]\n- [fs] xfs: Fix possible memory corruption in xfs_readlink (Carlos Maiolino) {CVE-2011-4077}\n- [scsi] increase qla2xxx firmware ready time-out (Joe Jin)\n- [scsi] qla2xxx: Module parameter to control use of async or sync port login (Joe Jin)\n- [net] tg3: Fix single-vector MSI-X code (Joe Jin)\n- [net] qlge: fix size of external list for TX address descriptors (Joe Jin)\n- [net] e1000e: Avoid wrong check on TX hang (Joe Jin)\n- crypto: ghash - Avoid null pointer dereference if no key is set (Nick Bowler) {CVE-2011-4081}\n- jbd/jbd2: validate sb->s_first in journal_get_superblock() (Eryu Guan) {CVE-2011-4132}\n- KVM: Device assignment permission checks (Joe Jin) {CVE-2011-4347}\n- KVM: x86: Prevent starting PIT timers in the absence of irqchip support (Jan Kiszka) {CVE-2011-4622}\n- xfs: validate acl count (Joe Jin) {CVE-2012-0038}\n- KVM: x86: fix missing checks in syscall emulation (Joe Jin) {CVE-2012-0045}\n- KVM: x86: extend 'struct x86_emulate_ops' with 'get_cpuid' (Joe Jin) {CVE-2012-0045}\n- igmp: Avoid zero delay when receiving odd mixture of IGMP queries (Ben Hutchings) {CVE-2012-0207}\n- ipv4: correct IGMP behavior on v3 query during v2-compatibility mode (David Stevens)\n- fuse: fix fuse request unique id (Srinivas Eeda) [orabug 13816349]\n\n[2.6.32-300.10.1.el6uek]\n- net: remove extra register in ip_gre (Guru Anbalagane) [Orabug: 13633287]\n\n[2.6.32-300.9.1.el6uek]\n- [netdrv] fnic: return zero on fnic_reset() success (Joe Jin)\n- [e1000e] Add entropy generation back for network interrupts (John Sobecki)\n- [nfs4] LINUX CLIENT TREATS NFS4ERR_GRACE AS A PERMANENT ERROR [orabug 13476821] (John Sobecki)\n- [nfs] NFS CLIENT CONNECTS TO SERVER THEN DISCONNECTS [orabug 13516759] (John Sobecki)\n- [sunrpc] Add patch for a mount crash in __rpc_create_common [orabug 13322773] (John Sobecki)\n\n[2.6.32-300.8.1.el6uek]\n- SPEC: fix dependency on firmware/mkinitrd (Guru Anbalagane) [orabug 13637902]\n- xfs: fix acl count validation in xfs_acl_from_disk() (Dan Carpenter)\n- [SCSI] scsi_dh: check queuedata pointer before proceeding further (Moger Babu)\n [orabug 13615419]", u'issued': u'2012-03-07', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELSA-2012-2003.html', u'type': u'self', u'id': None, u'title': u'ELSA-2012-2003'}, {u'href': u'http://linux.oracle.com/cve/CVE-2011-4081.html', u'type': u'cve', u'id': u'CVE-2011-4081', u'title': u'CVE-2011-4081'}, {u'href': u'http://linux.oracle.com/cve/CVE-2011-4347.html', u'type': u'cve', u'id': u'CVE-2011-4347', u'title': u'CVE-2011-4347'}, {u'href': u'http://linux.oracle.com/cve/CVE-2012-0038.html', u'type': u'cve', u'id': u'CVE-2012-0038', u'title': u'CVE-2012-0038'}, {u'href': u'http://linux.oracle.com/cve/CVE-2012-0045.html', u'type': u'cve', u'id': u'CVE-2012-0045', u'title': u'CVE-2012-0045'}, {u'href': u'http://linux.oracle.com/cve/CVE-2012-0207.html', u'type': u'cve', u'id': u'CVE-2012-0207', u'title': u'CVE-2012-0207'}, {u'href': u'http://linux.oracle.com/cve/CVE-2011-4077.html', u'type': u'cve', u'id': u'CVE-2011-4077', u'title': u'CVE-2011-4077'}, {u'href': u'http://linux.oracle.com/cve/CVE-2011-4132.html', u'type': u'cve', u'id': u'CVE-2011-4132', u'title': u'CVE-2011-4132'}, {u'href': u'http://linux.oracle.com/cve/CVE-2011-4622.html', u'type': u'cve', u'id': u'CVE-2011-4622', u'title': u'CVE-2011-4622'}], u'_content_type_id': u'erratum', u'_id': u'4b798ad4-c065-486e-9a28-b59746929bfe', u'from': u'el-errata@oss.oracle.com', u'severity': u'Important', u'title': u' Unbreakable Enterprise kernel security and bug fix update', u'_ns': u'units_erratum', u'rights': u'Copyright 2012 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 6', u'reboot_suggested': False, u'type': u'security', u'pkglist': [{u'packages': [{u'src': None, u'name': u'kernel-uek', u'sum': [u'md5', u'a4fd798f6d2ad0575a61d006b6373a88'], u'filename': u'kernel-uek-2.6.32-300.11.1.el6uek.src.rpm', u'epoch': u'0', u'version': u'2.6.32', u'release': u'300.11.1.el6uek', u'arch': u'src'}, {u'src': None, u'name': u'kernel-uek', u'sum': [u'md5', u'08038117c9bf9780e96e575ffc98af3e'], u'filename': u'kernel-uek-2.6.32-300.11.1.el6uek.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.32', u'release': u'300.11.1.el6uek', u'arch': u'x86_64'}, {u'src': None, u'name': u'kernel-uek-debug', u'sum': [u'md5', u'5a04ed2f8708c8f2ce9669023aef1456'], u'filename': u'kernel-uek-debug-2.6.32-300.11.1.el6uek.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.32', u'release': u'300.11.1.el6uek', u'arch': u'x86_64'}, {u'src': None, u'name': u'kernel-uek-debug-devel', u'sum': [u'md5', u'3bbe00015ff0041edef78d3b79ada19c'], u'filename': u'kernel-uek-debug-devel-2.6.32-300.11.1.el6uek.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.32', u'release': u'300.11.1.el6uek', u'arch': u'x86_64'}, {u'src': None, u'name': u'kernel-uek-devel', u'sum': [u'md5', u'd08ac78fe885441e03c6edfb575b8c51'], u'filename': u'kernel-uek-devel-2.6.32-300.11.1.el6uek.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.32', u'release': u'300.11.1.el6uek', u'arch': u'x86_64'}, {u'src': None, u'name': u'kernel-uek-doc', u'sum': [u'md5', u'7efd26be2c91d120a9f2dcde2768fd68'], u'filename': u'kernel-uek-doc-2.6.32-300.11.1.el6uek.noarch.rpm', u'epoch': u'0', u'version': u'2.6.32', u'release': u'300.11.1.el6uek', u'arch': u'noarch'}, {u'src': None, u'name': u'kernel-uek-firmware', u'sum': [u'md5', u'b632f3c420e79ef5811c408821d2ea45'], u'filename': u'kernel-uek-firmware-2.6.32-300.11.1.el6uek.noarch.rpm', u'epoch': u'0', u'version': u'2.6.32', u'release': u'300.11.1.el6uek', u'arch': u'noarch'}, {u'src': None, u'name': u'kernel-uek-headers', u'sum': [u'md5', u'1452d365f9d43fa0d3bb59ba830b2576'], u'filename': u'kernel-uek-headers-2.6.32-300.11.1.el6uek.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.32', u'release': u'300.11.1.el6uek', u'arch': u'x86_64'}, {u'src': None, u'name': u'mlnx_en-2.6.32-300.11.1.el6uek', u'sum': [u'md5', u'1c7db21d190d4cc5c0c7e2ec85c76bd2'], u'filename': u'mlnx_en-2.6.32-300.11.1.el6uek-1.5.7-0.1.src.rpm', u'epoch': u'0', u'version': u'1.5.7', u'release': u'0.1', u'arch': u'src'}, {u'src': None, u'name': u'mlnx_en-2.6.32-300.11.1.el6uek', u'sum': [u'md5', u'f040c1460d404d6552bf2ae7741805d7'], u'filename': u'mlnx_en-2.6.32-300.11.1.el6uek-1.5.7-0.1.x86_64.rpm', u'epoch': u'0', u'version': u'1.5.7', u'release': u'0.1', u'arch': u'x86_64'}, {u'src': None, u'name': u'mlnx_en-2.6.32-300.11.1.el6uekdebug', u'sum': [u'md5', u'03049ff442b38efd617d7aa5d8a5f8f8'], u'filename': u'mlnx_en-2.6.32-300.11.1.el6uekdebug-1.5.7-0.1.x86_64.rpm', u'epoch': u'0', u'version': u'1.5.7', u'release': u'0.1', u'arch': u'x86_64'}, {u'src': None, u'name': u'ofa-2.6.32-300.11.1.el6uek', u'sum': [u'md5', u'7e3d43ee21382e607e3119a8f291a7e2'], u'filename': u'ofa-2.6.32-300.11.1.el6uek-1.5.1-4.0.47.src.rpm', u'epoch': u'0', u'version': u'1.5.1', u'release': u'4.0.47', u'arch': u'src'}, {u'src': None, u'name': u'ofa-2.6.32-300.11.1.el6uek', u'sum': [u'md5', u'74b6efefb9d4965bea1d6da1e1e407ce'], u'filename': u'ofa-2.6.32-300.11.1.el6uek-1.5.1-4.0.47.x86_64.rpm', u'epoch': u'0', u'version': u'1.5.1', u'release': u'4.0.47', u'arch': u'x86_64'}, {u'src': None, u'name': u'ofa-2.6.32-300.11.1.el6uekdebug', u'sum': [u'md5', u'169fb92835be2188e610ac33b25f0ced'], u'filename': u'ofa-2.6.32-300.11.1.el6uekdebug-1.5.1-4.0.47.x86_64.rpm', u'epoch': u'0', u'version': u'1.5.1', u'release': u'4.0.47', u'arch': u'x86_64'}], u'name': u'ol6_x86_64_latest', u'short': u'ol6_x86_64_latest'}, {u'packages': [{u'src': None, u'name': u'kernel-uek', u'sum': [u'md5', u'04ca37d84a4ea11297ab533efaf8b2a8'], u'filename': u'kernel-uek-2.6.32-300.11.1.el5uek.src.rpm', u'epoch': u'0', u'version': u'2.6.32', u'release': u'300.11.1.el5uek', u'arch': u'src'}, {u'src': None, u'name': u'kernel-uek', u'sum': [u'md5', u'65245acefe33ecd79284c0d4551559a8'], u'filename': u'kernel-uek-2.6.32-300.11.1.el5uek.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.32', u'release': u'300.11.1.el5uek', u'arch': u'x86_64'}, {u'src': None, u'name': u'kernel-uek-debug', u'sum': [u'md5', u'39fe6bcbd2de13046993e179041d3d1d'], u'filename': u'kernel-uek-debug-2.6.32-300.11.1.el5uek.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.32', u'release': u'300.11.1.el5uek', u'arch': u'x86_64'}, {u'src': None, u'name': u'kernel-uek-debug-devel', u'sum': [u'md5', u'17f90f967f4687a77458098f4d5f77b0'], u'filename': u'kernel-uek-debug-devel-2.6.32-300.11.1.el5uek.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.32', u'release': u'300.11.1.el5uek', u'arch': u'x86_64'}, {u'src': None, u'name': u'kernel-uek-devel', u'sum': [u'md5', u'fd0050a977884c9f1b6267597ca15b94'], u'filename': u'kernel-uek-devel-2.6.32-300.11.1.el5uek.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.32', u'release': u'300.11.1.el5uek', u'arch': u'x86_64'}, {u'src': None, u'name': u'kernel-uek-doc', u'sum': [u'md5', u'19ec82b9070c8efa4fc713ecd05741ab'], u'filename': u'kernel-uek-doc-2.6.32-300.11.1.el5uek.noarch.rpm', u'epoch': u'0', u'version': u'2.6.32', u'release': u'300.11.1.el5uek', u'arch': u'noarch'}, {u'src': None, u'name': u'kernel-uek-firmware', u'sum': [u'md5', u'f18f945a52ad4c16a3ca7ed5fc34e941'], u'filename': u'kernel-uek-firmware-2.6.32-300.11.1.el5uek.noarch.rpm', u'epoch': u'0', u'version': u'2.6.32', u'release': u'300.11.1.el5uek', u'arch': u'noarch'}, {u'src': None, u'name': u'mlnx_en-2.6.32-300.11.1.el5uek', u'sum': [u'md5', u'a96cc1b5a3b803d998d48b5b2352d40a'], u'filename': u'mlnx_en-2.6.32-300.11.1.el5uek-1.5.7-2.src.rpm', u'epoch': u'0', u'version': u'1.5.7', u'release': u'2', u'arch': u'src'}, {u'src': None, u'name': u'mlnx_en-2.6.32-300.11.1.el5uek', u'sum': [u'md5', u'72df0224820825a459ffc2436b8eb951'], u'filename': u'mlnx_en-2.6.32-300.11.1.el5uek-1.5.7-2.x86_64.rpm', u'epoch': u'0', u'version': u'1.5.7', u'release': u'2', u'arch': u'x86_64'}, {u'src': None, u'name': u'mlnx_en-2.6.32-300.11.1.el5uekdebug', u'sum': [u'md5', u'7a640fbed04ab50b8ed33aa973d0ab1b'], u'filename': u'mlnx_en-2.6.32-300.11.1.el5uekdebug-1.5.7-2.x86_64.rpm', u'epoch': u'0', u'version': u'1.5.7', u'release': u'2', u'arch': u'x86_64'}, {u'src': None, u'name': u'ofa-2.6.32-300.11.1.el5uek', u'sum': [u'md5', u'd0914019ec51099c072246ca165b92c5'], u'filename': u'ofa-2.6.32-300.11.1.el5uek-1.5.1-4.0.53.src.rpm', u'epoch': u'0', u'version': u'1.5.1', u'release': u'4.0.53', u'arch': u'src'}, {u'src': None, u'name': u'ofa-2.6.32-300.11.1.el5uek', u'sum': [u'md5', u'32a480fe5f9376dfedf6594c4b1e8d7a'], u'filename': u'ofa-2.6.32-300.11.1.el5uek-1.5.1-4.0.53.x86_64.rpm', u'epoch': u'0', u'version': u'1.5.1', u'release': u'4.0.53', u'arch': u'x86_64'}, {u'src': None, u'name': u'ofa-2.6.32-300.11.1.el5uekdebug', u'sum': [u'md5', u'a8491ebe4265a8fa73681ac3a3a6afa3'], u'filename': u'ofa-2.6.32-300.11.1.el5uekdebug-1.5.1-4.0.53.x86_64.rpm', u'epoch': u'0', u'version': u'1.5.1', u'release': u'4.0.53', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u'[2.6.32-300.21.1.el6uek]\n- regset: Return -EFAULT, not -EIO, on host-side memory fault (H. Peter Anvin)\n CVE-2012-1097\n- regset: Prevent null pointer reference on readonly regsets (H. Peter Anvin)\n CVE-2012-1097\n- cifs: fix dentry refcount leak when opening a FIFO on lookup (Jeff Layton)\n CVE-2012-1090\n- block: Fix io_context leak after failure of clone with CLONE_IO (Louis\n Rilling) CVE-2012-0879', u'issued': u'2012-04-19', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELSA-2012-2007.html', u'type': u'self', u'id': None, u'title': u'ELSA-2012-2007'}, {u'href': u'http://linux.oracle.com/cve/CVE-2012-0879.html', u'type': u'cve', u'id': u'CVE-2012-0879', u'title': u'CVE-2012-0879'}, {u'href': u'http://linux.oracle.com/cve/CVE-2012-1090.html', u'type': u'cve', u'id': u'CVE-2012-1090', u'title': u'CVE-2012-1090'}, {u'href': u'http://linux.oracle.com/cve/CVE-2012-1097.html', u'type': u'cve', u'id': u'CVE-2012-1097', u'title': u'CVE-2012-1097'}], u'_content_type_id': u'erratum', u'_id': u'bc3450c9-a3a9-42b6-a6f7-479fac3b6c72', u'from': u'el-errata@oss.oracle.com', u'severity': u'Moderate', u'title': u' Unbreakable Enterprise kernel security and bug fix update', u'_ns': u'units_erratum', u'rights': u'Copyright 2012 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 6', u'reboot_suggested': False, u'type': u'security', u'pkglist': [{u'packages': [{u'src': None, u'name': u'kernel-uek', u'sum': [u'md5', u'75b14fd8b887ee137699c8ca267d79b8'], u'filename': u'kernel-uek-2.6.32-300.21.1.el6uek.src.rpm', u'epoch': u'0', u'version': u'2.6.32', u'release': u'300.21.1.el6uek', u'arch': u'src'}, {u'src': None, u'name': u'kernel-uek', u'sum': [u'md5', u'41a1eddf44a4e068e8b28b1ccdd1dc5a'], u'filename': u'kernel-uek-2.6.32-300.21.1.el6uek.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.32', u'release': u'300.21.1.el6uek', u'arch': u'x86_64'}, {u'src': None, u'name': u'kernel-uek-debug', u'sum': [u'md5', u'92077cd9f93c29387ccaa2bb90739539'], u'filename': u'kernel-uek-debug-2.6.32-300.21.1.el6uek.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.32', u'release': u'300.21.1.el6uek', u'arch': u'x86_64'}, {u'src': None, u'name': u'kernel-uek-debug-devel', u'sum': [u'md5', u'2bdaa9135b2863a96793a1958f11a392'], u'filename': u'kernel-uek-debug-devel-2.6.32-300.21.1.el6uek.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.32', u'release': u'300.21.1.el6uek', u'arch': u'x86_64'}, {u'src': None, u'name': u'kernel-uek-devel', u'sum': [u'md5', u'd9a72fe91f3a552374b0c009764b643d'], u'filename': u'kernel-uek-devel-2.6.32-300.21.1.el6uek.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.32', u'release': u'300.21.1.el6uek', u'arch': u'x86_64'}, {u'src': None, u'name': u'kernel-uek-doc', u'sum': [u'md5', u'210fd6a51b046fd1216a82538fce798f'], u'filename': u'kernel-uek-doc-2.6.32-300.21.1.el6uek.noarch.rpm', u'epoch': u'0', u'version': u'2.6.32', u'release': u'300.21.1.el6uek', u'arch': u'noarch'}, {u'src': None, u'name': u'kernel-uek-firmware', u'sum': [u'md5', u'1e0930dba14dc158975a0793ac2a95d0'], u'filename': u'kernel-uek-firmware-2.6.32-300.21.1.el6uek.noarch.rpm', u'epoch': u'0', u'version': u'2.6.32', u'release': u'300.21.1.el6uek', u'arch': u'noarch'}, {u'src': None, u'name': u'kernel-uek-headers', u'sum': [u'md5', u'4ae5e7a3c5ca952df1a629920c60efcb'], u'filename': u'kernel-uek-headers-2.6.32-300.21.1.el6uek.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.32', u'release': u'300.21.1.el6uek', u'arch': u'x86_64'}, {u'src': None, u'name': u'mlnx_en-2.6.32-300.21.1.el6uek', u'sum': [u'md5', u'e5f84fc7e497a1355511e0a7080c3163'], u'filename': u'mlnx_en-2.6.32-300.21.1.el6uek-1.5.7-0.1.src.rpm', u'epoch': u'0', u'version': u'1.5.7', u'release': u'0.1', u'arch': u'src'}, {u'src': None, u'name': u'mlnx_en-2.6.32-300.21.1.el6uek', u'sum': [u'md5', u'4f1611a0ca3274b027a21601563a8260'], u'filename': u'mlnx_en-2.6.32-300.21.1.el6uek-1.5.7-0.1.x86_64.rpm', u'epoch': u'0', u'version': u'1.5.7', u'release': u'0.1', u'arch': u'x86_64'}, {u'src': None, u'name': u'mlnx_en-2.6.32-300.21.1.el6uekdebug', u'sum': [u'md5', u'2e8ee14c3b42eb2bb44e92023cceb373'], u'filename': u'mlnx_en-2.6.32-300.21.1.el6uekdebug-1.5.7-0.1.x86_64.rpm', u'epoch': u'0', u'version': u'1.5.7', u'release': u'0.1', u'arch': u'x86_64'}, {u'src': None, u'name': u'ofa-2.6.32-300.21.1.el6uek', u'sum': [u'md5', u'cd5059a7cdfc94baf028cba57bc7e6a7'], u'filename': u'ofa-2.6.32-300.21.1.el6uek-1.5.1-4.0.47.src.rpm', u'epoch': u'0', u'version': u'1.5.1', u'release': u'4.0.47', u'arch': u'src'}, {u'src': None, u'name': u'ofa-2.6.32-300.21.1.el6uek', u'sum': [u'md5', u'f17d0159af4504f14263d10ace999060'], u'filename': u'ofa-2.6.32-300.21.1.el6uek-1.5.1-4.0.47.x86_64.rpm', u'epoch': u'0', u'version': u'1.5.1', u'release': u'4.0.47', u'arch': u'x86_64'}, {u'src': None, u'name': u'ofa-2.6.32-300.21.1.el6uekdebug', u'sum': [u'md5', u'38a6e77bf143b3119c61b995cf516152'], u'filename': u'ofa-2.6.32-300.21.1.el6uekdebug-1.5.1-4.0.47.x86_64.rpm', u'epoch': u'0', u'version': u'1.5.1', u'release': u'4.0.47', u'arch': u'x86_64'}], u'name': u'ol6_x86_64_latest', u'short': u'ol6_x86_64_latest'}, {u'packages': [{u'src': None, u'name': u'kernel-uek', u'sum': [u'md5', u'937d151d2416066f9f0eed17c7ed5c0c'], u'filename': u'kernel-uek-2.6.32-300.21.1.el5uek.src.rpm', u'epoch': u'0', u'version': u'2.6.32', u'release': u'300.21.1.el5uek', u'arch': u'src'}, {u'src': None, u'name': u'kernel-uek', u'sum': [u'md5', u'e12035d60c7b5ce02255eb2d9c0a0f8a'], u'filename': u'kernel-uek-2.6.32-300.21.1.el5uek.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.32', u'release': u'300.21.1.el5uek', u'arch': u'x86_64'}, {u'src': None, u'name': u'kernel-uek-debug', u'sum': [u'md5', u'85f51e126de5d8d5fdbf7bcc573fe7f4'], u'filename': u'kernel-uek-debug-2.6.32-300.21.1.el5uek.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.32', u'release': u'300.21.1.el5uek', u'arch': u'x86_64'}, {u'src': None, u'name': u'kernel-uek-debug-devel', u'sum': [u'md5', u'a6fd56bcd91221946417f7df9d66f6ce'], u'filename': u'kernel-uek-debug-devel-2.6.32-300.21.1.el5uek.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.32', u'release': u'300.21.1.el5uek', u'arch': u'x86_64'}, {u'src': None, u'name': u'kernel-uek-devel', u'sum': [u'md5', u'b6b12880459cc1bc56343023ee4e531c'], u'filename': u'kernel-uek-devel-2.6.32-300.21.1.el5uek.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.32', u'release': u'300.21.1.el5uek', u'arch': u'x86_64'}, {u'src': None, u'name': u'kernel-uek-doc', u'sum': [u'md5', u'fb648a96049d083b8820a9b1e3b833d1'], u'filename': u'kernel-uek-doc-2.6.32-300.21.1.el5uek.noarch.rpm', u'epoch': u'0', u'version': u'2.6.32', u'release': u'300.21.1.el5uek', u'arch': u'noarch'}, {u'src': None, u'name': u'kernel-uek-firmware', u'sum': [u'md5', u'92300be10df6e94605b589554fd6abb5'], u'filename': u'kernel-uek-firmware-2.6.32-300.21.1.el5uek.noarch.rpm', u'epoch': u'0', u'version': u'2.6.32', u'release': u'300.21.1.el5uek', u'arch': u'noarch'}, {u'src': None, u'name': u'mlnx_en-2.6.32-300.21.1.el5uek', u'sum': [u'md5', u'b41ea5dbc57b920a3e6c039006a2cb9d'], u'filename': u'mlnx_en-2.6.32-300.21.1.el5uek-1.5.7-2.src.rpm', u'epoch': u'0', u'version': u'1.5.7', u'release': u'2', u'arch': u'src'}, {u'src': None, u'name': u'mlnx_en-2.6.32-300.21.1.el5uek', u'sum': [u'md5', u'fbcc1d53ca4281665bd22d673f00cd0c'], u'filename': u'mlnx_en-2.6.32-300.21.1.el5uek-1.5.7-2.x86_64.rpm', u'epoch': u'0', u'version': u'1.5.7', u'release': u'2', u'arch': u'x86_64'}, {u'src': None, u'name': u'mlnx_en-2.6.32-300.21.1.el5uekdebug', u'sum': [u'md5', u'6b37791ef751d8fbdbf46cf6f1f9a0bd'], u'filename': u'mlnx_en-2.6.32-300.21.1.el5uekdebug-1.5.7-2.x86_64.rpm', u'epoch': u'0', u'version': u'1.5.7', u'release': u'2', u'arch': u'x86_64'}, {u'src': None, u'name': u'ofa-2.6.32-300.21.1.el5uek', u'sum': [u'md5', u'81f87ff89085636cd93128184f345aa4'], u'filename': u'ofa-2.6.32-300.21.1.el5uek-1.5.1-4.0.58.src.rpm', u'epoch': u'0', u'version': u'1.5.1', u'release': u'4.0.58', u'arch': u'src'}, {u'src': None, u'name': u'ofa-2.6.32-300.21.1.el5uek', u'sum': [u'md5', u'4f96d9959aa38d764f43dbd81e8889c7'], u'filename': u'ofa-2.6.32-300.21.1.el5uek-1.5.1-4.0.58.x86_64.rpm', u'epoch': u'0', u'version': u'1.5.1', u'release': u'4.0.58', u'arch': u'x86_64'}, {u'src': None, u'name': u'ofa-2.6.32-300.21.1.el5uekdebug', u'sum': [u'md5', u'd0dac328edb3957f333691fb5cb35e05'], u'filename': u'ofa-2.6.32-300.21.1.el5uekdebug-1.5.1-4.0.58.x86_64.rpm', u'epoch': u'0', u'version': u'1.5.1', u'release': u'4.0.58', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u'kernel-uek:\n\n[2.6.32-300.25.1.el6uek]\n- jbd2: clear BH_Delay & BH_Unwritten in journal_unmap_buffer (Eric Sandeen)\n [Bugdb: 13871] {CVE-2011-4086}', u'issued': u'2012-05-16', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELSA-2012-2014.html', u'type': u'self', u'id': None, u'title': u'ELSA-2012-2014'}, {u'href': u'http://linux.oracle.com/cve/CVE-2011-4086.html', u'type': u'cve', u'id': u'CVE-2011-4086', u'title': u'CVE-2011-4086'}], u'_content_type_id': u'erratum', u'_id': u'0bc57160-f3e1-43be-a853-841dd298ed52', u'from': u'el-errata@oss.oracle.com', u'severity': u'Moderate', u'title': u' Unbreakable Enterprise kernel security update', u'_ns': u'units_erratum', u'rights': u'Copyright 2012 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 6', u'reboot_suggested': False, u'type': u'security', u'pkglist': [{u'packages': [{u'src': None, u'name': u'kernel-uek', u'sum': [u'md5', u'df5ccfbf8eb8ef2dfe90575f2fa24240'], u'filename': u'kernel-uek-2.6.32-300.25.1.el6uek.src.rpm', u'epoch': u'0', u'version': u'2.6.32', u'release': u'300.25.1.el6uek', u'arch': u'src'}, {u'src': None, u'name': u'kernel-uek', u'sum': [u'md5', u'57136795a0d4255066d7d1369c2fda58'], u'filename': u'kernel-uek-2.6.32-300.25.1.el6uek.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.32', u'release': u'300.25.1.el6uek', u'arch': u'x86_64'}, {u'src': None, u'name': u'kernel-uek-debug', u'sum': [u'md5', u'748476298359d5727ad9ab860e42e6d5'], u'filename': u'kernel-uek-debug-2.6.32-300.25.1.el6uek.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.32', u'release': u'300.25.1.el6uek', u'arch': u'x86_64'}, {u'src': None, u'name': u'kernel-uek-debug-devel', u'sum': [u'md5', u'a946eb9e05edf68f8602b67abf51331a'], u'filename': u'kernel-uek-debug-devel-2.6.32-300.25.1.el6uek.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.32', u'release': u'300.25.1.el6uek', u'arch': u'x86_64'}, {u'src': None, u'name': u'kernel-uek-devel', u'sum': [u'md5', u'cf31c93e0a1390f726824bfbadcb11e8'], u'filename': u'kernel-uek-devel-2.6.32-300.25.1.el6uek.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.32', u'release': u'300.25.1.el6uek', u'arch': u'x86_64'}, {u'src': None, u'name': u'kernel-uek-doc', u'sum': [u'md5', u'46f07f5f89e70feb3813ec2cfb563ae5'], u'filename': u'kernel-uek-doc-2.6.32-300.25.1.el6uek.noarch.rpm', u'epoch': u'0', u'version': u'2.6.32', u'release': u'300.25.1.el6uek', u'arch': u'noarch'}, {u'src': None, u'name': u'kernel-uek-firmware', u'sum': [u'md5', u'0ca7eddd79fccaa2ca8ed5b5feb1d20a'], u'filename': u'kernel-uek-firmware-2.6.32-300.25.1.el6uek.noarch.rpm', u'epoch': u'0', u'version': u'2.6.32', u'release': u'300.25.1.el6uek', u'arch': u'noarch'}, {u'src': None, u'name': u'kernel-uek-headers', u'sum': [u'md5', u'a9ee24d2b1c9a66cc0b8ca52156746aa'], u'filename': u'kernel-uek-headers-2.6.32-300.25.1.el6uek.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.32', u'release': u'300.25.1.el6uek', u'arch': u'x86_64'}, {u'src': None, u'name': u'mlnx_en-2.6.32-300.25.1.el6uek', u'sum': [u'md5', u'6629785e07d280d127d7857947f2f7d9'], u'filename': u'mlnx_en-2.6.32-300.25.1.el6uek-1.5.7-0.1.src.rpm', u'epoch': u'0', u'version': u'1.5.7', u'release': u'0.1', u'arch': u'src'}, {u'src': None, u'name': u'mlnx_en-2.6.32-300.25.1.el6uek', u'sum': [u'md5', u'92a047434afc097adda49e152246b7f7'], u'filename': u'mlnx_en-2.6.32-300.25.1.el6uek-1.5.7-0.1.x86_64.rpm', u'epoch': u'0', u'version': u'1.5.7', u'release': u'0.1', u'arch': u'x86_64'}, {u'src': None, u'name': u'mlnx_en-2.6.32-300.25.1.el6uekdebug', u'sum': [u'md5', u'25d4d0347f8e399e32d714289a320d82'], u'filename': u'mlnx_en-2.6.32-300.25.1.el6uekdebug-1.5.7-0.1.x86_64.rpm', u'epoch': u'0', u'version': u'1.5.7', u'release': u'0.1', u'arch': u'x86_64'}, {u'src': None, u'name': u'ofa-2.6.32-300.25.1.el6uek', u'sum': [u'md5', u'045d2bb335733ec094f0ffa5f20ae6be'], u'filename': u'ofa-2.6.32-300.25.1.el6uek-1.5.1-4.0.47.src.rpm', u'epoch': u'0', u'version': u'1.5.1', u'release': u'4.0.47', u'arch': u'src'}, {u'src': None, u'name': u'ofa-2.6.32-300.25.1.el6uek', u'sum': [u'md5', u'b0ef528ff388b68167f5341e011badab'], u'filename': u'ofa-2.6.32-300.25.1.el6uek-1.5.1-4.0.47.x86_64.rpm', u'epoch': u'0', u'version': u'1.5.1', u'release': u'4.0.47', u'arch': u'x86_64'}, {u'src': None, u'name': u'ofa-2.6.32-300.25.1.el6uekdebug', u'sum': [u'md5', u'3bac49a883ee1338dfc89759bc471800'], u'filename': u'ofa-2.6.32-300.25.1.el6uekdebug-1.5.1-4.0.47.x86_64.rpm', u'epoch': u'0', u'version': u'1.5.1', u'release': u'4.0.47', u'arch': u'x86_64'}], u'name': u'ol6_x86_64_latest', u'short': u'ol6_x86_64_latest'}, {u'packages': [{u'src': None, u'name': u'kernel-uek', u'sum': [u'md5', u'80f9dd4573fdee81a92d48459238090b'], u'filename': u'kernel-uek-2.6.32-300.25.1.el5uek.src.rpm', u'epoch': u'0', u'version': u'2.6.32', u'release': u'300.25.1.el5uek', u'arch': u'src'}, {u'src': None, u'name': u'kernel-uek', u'sum': [u'md5', u'97c8efd78cefd47d30ccd9443facf221'], u'filename': u'kernel-uek-2.6.32-300.25.1.el5uek.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.32', u'release': u'300.25.1.el5uek', u'arch': u'x86_64'}, {u'src': None, u'name': u'kernel-uek-debug', u'sum': [u'md5', u'6c2e6e69d4e746e2d9f68ce02f314620'], u'filename': u'kernel-uek-debug-2.6.32-300.25.1.el5uek.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.32', u'release': u'300.25.1.el5uek', u'arch': u'x86_64'}, {u'src': None, u'name': u'kernel-uek-debug-devel', u'sum': [u'md5', u'5961b659e4d766f776ca70d91ce50ba1'], u'filename': u'kernel-uek-debug-devel-2.6.32-300.25.1.el5uek.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.32', u'release': u'300.25.1.el5uek', u'arch': u'x86_64'}, {u'src': None, u'name': u'kernel-uek-devel', u'sum': [u'md5', u'de4d9edc49b6305f568845d34d041560'], u'filename': u'kernel-uek-devel-2.6.32-300.25.1.el5uek.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.32', u'release': u'300.25.1.el5uek', u'arch': u'x86_64'}, {u'src': None, u'name': u'kernel-uek-doc', u'sum': [u'md5', u'bdca9dd97c0c56d7ede6c65131382191'], u'filename': u'kernel-uek-doc-2.6.32-300.25.1.el5uek.noarch.rpm', u'epoch': u'0', u'version': u'2.6.32', u'release': u'300.25.1.el5uek', u'arch': u'noarch'}, {u'src': None, u'name': u'kernel-uek-firmware', u'sum': [u'md5', u'b8c23604d4410d30b4a6cfed3a89f1e4'], u'filename': u'kernel-uek-firmware-2.6.32-300.25.1.el5uek.noarch.rpm', u'epoch': u'0', u'version': u'2.6.32', u'release': u'300.25.1.el5uek', u'arch': u'noarch'}, {u'src': None, u'name': u'mlnx_en-2.6.32-300.25.1.el5uek', u'sum': [u'md5', u'b1c7132eb3fb89bda30383df61b7bc69'], u'filename': u'mlnx_en-2.6.32-300.25.1.el5uek-1.5.7-2.src.rpm', u'epoch': u'0', u'version': u'1.5.7', u'release': u'2', u'arch': u'src'}, {u'src': None, u'name': u'mlnx_en-2.6.32-300.25.1.el5uek', u'sum': [u'md5', u'4e4fe9d4dd81f9cbd76cbab4569d6c74'], u'filename': u'mlnx_en-2.6.32-300.25.1.el5uek-1.5.7-2.x86_64.rpm', u'epoch': u'0', u'version': u'1.5.7', u'release': u'2', u'arch': u'x86_64'}, {u'src': None, u'name': u'mlnx_en-2.6.32-300.25.1.el5uekdebug', u'sum': [u'md5', u'f1c87b09d1d0758b6b0422e82afee5e3'], u'filename': u'mlnx_en-2.6.32-300.25.1.el5uekdebug-1.5.7-2.x86_64.rpm', u'epoch': u'0', u'version': u'1.5.7', u'release': u'2', u'arch': u'x86_64'}, {u'src': None, u'name': u'ofa-2.6.32-300.25.1.el5uek', u'sum': [u'md5', u'9986362bbaa0beda08955cc61f80a90f'], u'filename': u'ofa-2.6.32-300.25.1.el5uek-1.5.1-4.0.58.src.rpm', u'epoch': u'0', u'version': u'1.5.1', u'release': u'4.0.58', u'arch': u'src'}, {u'src': None, u'name': u'ofa-2.6.32-300.25.1.el5uek', u'sum': [u'md5', u'6488cbf12ef8a4c4e7cdfe6137bb8179'], u'filename': u'ofa-2.6.32-300.25.1.el5uek-1.5.1-4.0.58.x86_64.rpm', u'epoch': u'0', u'version': u'1.5.1', u'release': u'4.0.58', u'arch': u'x86_64'}, {u'src': None, u'name': u'ofa-2.6.32-300.25.1.el5uekdebug', u'sum': [u'md5', u'be1c88018e708f8fbedbf60de45ace26'], u'filename': u'ofa-2.6.32-300.25.1.el5uekdebug-1.5.1-4.0.58.x86_64.rpm', u'epoch': u'0', u'version': u'1.5.1', u'release': u'4.0.58', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u"kernel-uek:\n\n[2.6.32-300.27.1.el6uek]\n- net: sock: validate data_len before allocating skb (Jason Wang) [Bugdb: 13966]{CVE-2012-2136}\n- fcaps: clear the same personality flags as suid when fcaps are used (Eric Paris) [Bugdb: 13966] {CVE-2012-2123}\n- Revert 'nfs: when attempting to open a directory, fall back on normal lookup (Todd Vierling) [Orabug 14141154]\n\n[2.6.32-300.26.1.el6uek]\n- mptsas: do not call __mptsas_probe in kthread (Maxim Uvarov) [Orabug:\n 14175509]\n- mm: check if any page in a pageblock is reserved before marking it\n MIGRATE_RESERVE (Maxim Uvarov) [Orabug: 14073214]\n- mm: reduce the amount of work done when updating min_free_kbytes (Mel Gorman)\n [Orabug: 14073214]\n- vmxnet3: Updated to el6-u2 (Guangyu Sun) [Orabug: 14027961]\n- xen: expose host uuid via sysfs. (Zhigang Wang)\n- sched: Fix cgroup movement of waking process (Daisuke Nishimura) [Orabug:\n 13946210]\n- sched: Fix cgroup movement of newly created process (Daisuke Nishimura)\n [Orabug: 13946210]\n- sched: Fix cgroup movement of forking process (Daisuke Nishimura) [Orabug:\n 13946210]\n- x86, boot: Wait for boot cpu to show up if nr_cpus limit is about to hit\n (Zhenzhong Duan) [Orabug: 13629087]\n- smp: Use nr_cpus= to set nr_cpu_ids early (Zhenzhong Duan) [Orabug: 13629087]\n- net: ipv4: relax AF_INET check in bind() (Maxim Uvarov) [Orabug: 14054411]\n\nofa-2.6.32-300.27.1.el6uek:\n\n[1.5.1-4.0.58]\n- Add Patch 158-169", u'issued': u'2012-06-19', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELSA-2012-2020.html', u'type': u'self', u'id': None, u'title': u'ELSA-2012-2020'}, {u'href': u'http://linux.oracle.com/cve/CVE-2012-2136.html', u'type': u'cve', u'id': u'CVE-2012-2136', u'title': u'CVE-2012-2136'}, {u'href': u'http://linux.oracle.com/cve/CVE-2012-2123.html', u'type': u'cve', u'id': u'CVE-2012-2123', u'title': u'CVE-2012-2123'}], u'_content_type_id': u'erratum', u'_id': u'25da0b6d-378e-4f84-8df5-bfcc577d7317', u'from': u'el-errata@oss.oracle.com', u'severity': u'Important', u'title': u' Unbreakable Enterprise kernel security and bugfix update', u'_ns': u'units_erratum', u'rights': u'Copyright 2012 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 6', u'reboot_suggested': False, u'type': u'security', u'pkglist': [{u'packages': [{u'src': None, u'name': u'kernel-uek', u'sum': [u'md5', u'48887d615da636cedccaaa456db645e1'], u'filename': u'kernel-uek-2.6.32-300.27.1.el6uek.src.rpm', u'epoch': u'0', u'version': u'2.6.32', u'release': u'300.27.1.el6uek', u'arch': u'src'}, {u'src': None, u'name': u'kernel-uek', u'sum': [u'md5', u'851ef588fd3f5cf9c403de8e3363014e'], u'filename': u'kernel-uek-2.6.32-300.27.1.el6uek.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.32', u'release': u'300.27.1.el6uek', u'arch': u'x86_64'}, {u'src': None, u'name': u'kernel-uek-debug', u'sum': [u'md5', u'1958a897c48437da8f79e48ca901c864'], u'filename': u'kernel-uek-debug-2.6.32-300.27.1.el6uek.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.32', u'release': u'300.27.1.el6uek', u'arch': u'x86_64'}, {u'src': None, u'name': u'kernel-uek-debug-devel', u'sum': [u'md5', u'34ffe98105884ab544059e36e8eb2a8b'], u'filename': u'kernel-uek-debug-devel-2.6.32-300.27.1.el6uek.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.32', u'release': u'300.27.1.el6uek', u'arch': u'x86_64'}, {u'src': None, u'name': u'kernel-uek-devel', u'sum': [u'md5', u'667b0f9b480b112701aaaca6461fa955'], u'filename': u'kernel-uek-devel-2.6.32-300.27.1.el6uek.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.32', u'release': u'300.27.1.el6uek', u'arch': u'x86_64'}, {u'src': None, u'name': u'kernel-uek-doc', u'sum': [u'md5', u'3cbcd264ca59680b96f34ae3dff39f0d'], u'filename': u'kernel-uek-doc-2.6.32-300.27.1.el6uek.noarch.rpm', u'epoch': u'0', u'version': u'2.6.32', u'release': u'300.27.1.el6uek', u'arch': u'noarch'}, {u'src': None, u'name': u'kernel-uek-firmware', u'sum': [u'md5', u'672657dc7b9ab413cb4ee982a1f98284'], u'filename': u'kernel-uek-firmware-2.6.32-300.27.1.el6uek.noarch.rpm', u'epoch': u'0', u'version': u'2.6.32', u'release': u'300.27.1.el6uek', u'arch': u'noarch'}, {u'src': None, u'name': u'kernel-uek-headers', u'sum': [u'md5', u'5a571d634af20e8516df489d237064c8'], u'filename': u'kernel-uek-headers-2.6.32-300.27.1.el6uek.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.32', u'release': u'300.27.1.el6uek', u'arch': u'x86_64'}, {u'src': None, u'name': u'mlnx_en-2.6.32-300.27.1.el6uek', u'sum': [u'md5', u'2efef57d8ffc0e691814cc959d29f675'], u'filename': u'mlnx_en-2.6.32-300.27.1.el6uek-1.5.7-0.1.src.rpm', u'epoch': u'0', u'version': u'1.5.7', u'release': u'0.1', u'arch': u'src'}, {u'src': None, u'name': u'mlnx_en-2.6.32-300.27.1.el6uek', u'sum': [u'md5', u'3e5ebad9a5d7403c20529d7f3e9409e7'], u'filename': u'mlnx_en-2.6.32-300.27.1.el6uek-1.5.7-0.1.x86_64.rpm', u'epoch': u'0', u'version': u'1.5.7', u'release': u'0.1', u'arch': u'x86_64'}, {u'src': None, u'name': u'mlnx_en-2.6.32-300.27.1.el6uekdebug', u'sum': [u'md5', u'ce9959abc3a5887755c840f6af4e258f'], u'filename': u'mlnx_en-2.6.32-300.27.1.el6uekdebug-1.5.7-0.1.x86_64.rpm', u'epoch': u'0', u'version': u'1.5.7', u'release': u'0.1', u'arch': u'x86_64'}, {u'src': None, u'name': u'ofa-2.6.32-300.27.1.el6uek', u'sum': [u'md5', u'baea5f3d4b8bee6b97318ad377859902'], u'filename': u'ofa-2.6.32-300.27.1.el6uek-1.5.1-4.0.58.src.rpm', u'epoch': u'0', u'version': u'1.5.1', u'release': u'4.0.58', u'arch': u'src'}, {u'src': None, u'name': u'ofa-2.6.32-300.27.1.el6uek', u'sum': [u'md5', u'c676689db7587c9f75a6c92cea81d6ce'], u'filename': u'ofa-2.6.32-300.27.1.el6uek-1.5.1-4.0.58.x86_64.rpm', u'epoch': u'0', u'version': u'1.5.1', u'release': u'4.0.58', u'arch': u'x86_64'}, {u'src': None, u'name': u'ofa-2.6.32-300.27.1.el6uekdebug', u'sum': [u'md5', u'8d3a3661d38167057031f552569d6b49'], u'filename': u'ofa-2.6.32-300.27.1.el6uekdebug-1.5.1-4.0.58.x86_64.rpm', u'epoch': u'0', u'version': u'1.5.1', u'release': u'4.0.58', u'arch': u'x86_64'}], u'name': u'ol6_x86_64_latest', u'short': u'ol6_x86_64_latest'}, {u'packages': [{u'src': None, u'name': u'kernel-uek', u'sum': [u'md5', u'3f6c07cd3dc71e55756a6a869b33af8e'], u'filename': u'kernel-uek-2.6.32-300.27.1.el5uek.src.rpm', u'epoch': u'0', u'version': u'2.6.32', u'release': u'300.27.1.el5uek', u'arch': u'src'}, {u'src': None, u'name': u'kernel-uek', u'sum': [u'md5', u'db56f7d5064d312d4d472202c550f5bd'], u'filename': u'kernel-uek-2.6.32-300.27.1.el5uek.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.32', u'release': u'300.27.1.el5uek', u'arch': u'x86_64'}, {u'src': None, u'name': u'kernel-uek-debug', u'sum': [u'md5', u'0ad9a046d3933bc49a2cce14c94ebacc'], u'filename': u'kernel-uek-debug-2.6.32-300.27.1.el5uek.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.32', u'release': u'300.27.1.el5uek', u'arch': u'x86_64'}, {u'src': None, u'name': u'kernel-uek-debug-devel', u'sum': [u'md5', u'272791c1d78a76f702c36c71a44f71e9'], u'filename': u'kernel-uek-debug-devel-2.6.32-300.27.1.el5uek.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.32', u'release': u'300.27.1.el5uek', u'arch': u'x86_64'}, {u'src': None, u'name': u'kernel-uek-devel', u'sum': [u'md5', u'6c177ec41b7ee51e1cdecb20d5c857fa'], u'filename': u'kernel-uek-devel-2.6.32-300.27.1.el5uek.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.32', u'release': u'300.27.1.el5uek', u'arch': u'x86_64'}, {u'src': None, u'name': u'kernel-uek-doc', u'sum': [u'md5', u'f1e1a1bfc510cb66a31a940da6d0c87c'], u'filename': u'kernel-uek-doc-2.6.32-300.27.1.el5uek.noarch.rpm', u'epoch': u'0', u'version': u'2.6.32', u'release': u'300.27.1.el5uek', u'arch': u'noarch'}, {u'src': None, u'name': u'kernel-uek-firmware', u'sum': [u'md5', u'c8e91003c3981a60960e014660696619'], u'filename': u'kernel-uek-firmware-2.6.32-300.27.1.el5uek.noarch.rpm', u'epoch': u'0', u'version': u'2.6.32', u'release': u'300.27.1.el5uek', u'arch': u'noarch'}, {u'src': None, u'name': u'mlnx_en-2.6.32-300.27.1.el5uek', u'sum': [u'md5', u'08dc3f14634f045be0bd7d9376f76687'], u'filename': u'mlnx_en-2.6.32-300.27.1.el5uek-1.5.7-2.src.rpm', u'epoch': u'0', u'version': u'1.5.7', u'release': u'2', u'arch': u'src'}, {u'src': None, u'name': u'mlnx_en-2.6.32-300.27.1.el5uek', u'sum': [u'md5', u'615ad65dca41e069eb0089a948247152'], u'filename': u'mlnx_en-2.6.32-300.27.1.el5uek-1.5.7-2.x86_64.rpm', u'epoch': u'0', u'version': u'1.5.7', u'release': u'2', u'arch': u'x86_64'}, {u'src': None, u'name': u'mlnx_en-2.6.32-300.27.1.el5uekdebug', u'sum': [u'md5', u'f27bb911dae7345cca1e8bb2480ebcf5'], u'filename': u'mlnx_en-2.6.32-300.27.1.el5uekdebug-1.5.7-2.x86_64.rpm', u'epoch': u'0', u'version': u'1.5.7', u'release': u'2', u'arch': u'x86_64'}, {u'src': None, u'name': u'ofa-2.6.32-300.27.1.el5uek', u'sum': [u'md5', u'063078abaa2708614bf4f1530d292d25'], u'filename': u'ofa-2.6.32-300.27.1.el5uek-1.5.1-4.0.58.src.rpm', u'epoch': u'0', u'version': u'1.5.1', u'release': u'4.0.58', u'arch': u'src'}, {u'src': None, u'name': u'ofa-2.6.32-300.27.1.el5uek', u'sum': [u'md5', u'603b317d1a325167111e1404e1fe9948'], u'filename': u'ofa-2.6.32-300.27.1.el5uek-1.5.1-4.0.58.x86_64.rpm', u'epoch': u'0', u'version': u'1.5.1', u'release': u'4.0.58', u'arch': u'x86_64'}, {u'src': None, u'name': u'ofa-2.6.32-300.27.1.el5uekdebug', u'sum': [u'md5', u'7171f0f34375f295f4d7233f27584eef'], u'filename': u'ofa-2.6.32-300.27.1.el5uekdebug-1.5.1-4.0.58.x86_64.rpm', u'epoch': u'0', u'version': u'1.5.1', u'release': u'4.0.58', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u"\n[2.6.32-300.29.2]\n- epoll: epoll_wait() should not use timespec_add_ns() (Eric Dumazet)\n- epoll: clear the tfile_check_list on -ELOOP (Joe Jin) {CVE-2012-3375}\n- Don't limit non-nested epoll paths (Jason Baron)\n- epoll: kabi fixups for epoll limit wakeup paths (Joe Jin) {CVE-2011-1083}\n- epoll: limit paths (Jason Baron) {CVE-2011-1083}\n- eventpoll: fix comment typo 'evenpoll' (Paul Bolle)\n- epoll: fix compiler warning and optimize the non-blocking path (Shawn Bohrer)\n- epoll: move ready event check into proper inline (Davide Libenzi)\n- epoll: make epoll_wait() use the hrtimer range feature (Shawn Bohrer)\n- select: rename estimate_accuracy() to select_estimate_accuracy() (Andrew Morton)\n- cred: copy_process() should clear child->replacement_session_keyring (Oleg\n Nesterov) {CVE-2012-2745}\n", u'issued': u'2012-07-17', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELSA-2012-2026.html', u'type': u'self', u'id': None, u'title': u'ELSA-2012-2026'}, {u'href': u'http://linux.oracle.com/cve/CVE-2011-1083.html', u'type': u'cve', u'id': u'CVE-2011-1083', u'title': u'CVE-2011-1083'}, {u'href': u'http://linux.oracle.com/cve/CVE-2012-2745.html', u'type': u'cve', u'id': u'CVE-2012-2745', u'title': u'CVE-2012-2745'}, {u'href': u'http://linux.oracle.com/cve/CVE-2012-3375.html', u'type': u'cve', u'id': u'CVE-2012-3375', u'title': u'CVE-2012-3375'}], u'_content_type_id': u'erratum', u'_id': u'322904c9-3e81-4e9d-a392-178b6dc77b6f', u'from': u'el-errata@oss.oracle.com', u'severity': u'Important', u'title': u'Unbreakable Enterprise kernel Security update', u'_ns': u'units_erratum', u'rights': u'Copyright 2012 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 6', u'reboot_suggested': False, u'type': u'security', u'pkglist': [{u'packages': [{u'src': None, u'name': u'kernel-uek', u'sum': [u'md5', u'1181ad6337e14d17e00b8fbcd1620f22'], u'filename': u'kernel-uek-2.6.32-300.29.2.el6uek.src.rpm', u'epoch': u'0', u'version': u'2.6.32', u'release': u'300.29.2.el6uek', u'arch': u'src'}, {u'src': None, u'name': u'kernel-uek', u'sum': [u'md5', u'191ee8593cb3bafcc8c3eccc2544d2c7'], u'filename': u'kernel-uek-2.6.32-300.29.2.el6uek.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.32', u'release': u'300.29.2.el6uek', u'arch': u'x86_64'}, {u'src': None, u'name': u'kernel-uek-debug', u'sum': [u'md5', u'115c95e6f14a05aea84bb8ae6e8ca2cb'], u'filename': u'kernel-uek-debug-2.6.32-300.29.2.el6uek.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.32', u'release': u'300.29.2.el6uek', u'arch': u'x86_64'}, {u'src': None, u'name': u'kernel-uek-debug-devel', u'sum': [u'md5', u'11d22a905b4f27f4b6e2eda8e58798ea'], u'filename': u'kernel-uek-debug-devel-2.6.32-300.29.2.el6uek.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.32', u'release': u'300.29.2.el6uek', u'arch': u'x86_64'}, {u'src': None, u'name': u'kernel-uek-devel', u'sum': [u'md5', u'fb30edcf03ef9c60ff58b5fc1da9f38e'], u'filename': u'kernel-uek-devel-2.6.32-300.29.2.el6uek.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.32', u'release': u'300.29.2.el6uek', u'arch': u'x86_64'}, {u'src': None, u'name': u'kernel-uek-doc', u'sum': [u'md5', u'6556f9d87ae429d25648991631590478'], u'filename': u'kernel-uek-doc-2.6.32-300.29.2.el6uek.noarch.rpm', u'epoch': u'0', u'version': u'2.6.32', u'release': u'300.29.2.el6uek', u'arch': u'noarch'}, {u'src': None, u'name': u'kernel-uek-firmware', u'sum': [u'md5', u'2fb3fb06a920aad1c381a7022b369f1d'], u'filename': u'kernel-uek-firmware-2.6.32-300.29.2.el6uek.noarch.rpm', u'epoch': u'0', u'version': u'2.6.32', u'release': u'300.29.2.el6uek', u'arch': u'noarch'}, {u'src': None, u'name': u'kernel-uek-headers', u'sum': [u'md5', u'602f56d66166c51851249c9bf03f74f7'], u'filename': u'kernel-uek-headers-2.6.32-300.29.2.el6uek.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.32', u'release': u'300.29.2.el6uek', u'arch': u'x86_64'}, {u'src': None, u'name': u'mlnx_en-2.6.32-300.29.2.el6uek', u'sum': [u'md5', u'0e9a243a146c1691dff933e21defbfec'], u'filename': u'mlnx_en-2.6.32-300.29.2.el6uek-1.5.7-0.1.src.rpm', u'epoch': u'0', u'version': u'1.5.7', u'release': u'0.1', u'arch': u'src'}, {u'src': None, u'name': u'mlnx_en-2.6.32-300.29.2.el6uek', u'sum': [u'md5', u'1185643fc2ee6ad6e616f497445c2091'], u'filename': u'mlnx_en-2.6.32-300.29.2.el6uek-1.5.7-0.1.x86_64.rpm', u'epoch': u'0', u'version': u'1.5.7', u'release': u'0.1', u'arch': u'x86_64'}, {u'src': None, u'name': u'mlnx_en-2.6.32-300.29.2.el6uekdebug', u'sum': [u'md5', u'f136a644557249bd02e537e6599d8d67'], u'filename': u'mlnx_en-2.6.32-300.29.2.el6uekdebug-1.5.7-0.1.x86_64.rpm', u'epoch': u'0', u'version': u'1.5.7', u'release': u'0.1', u'arch': u'x86_64'}, {u'src': None, u'name': u'ofa-2.6.32-300.29.2.el6uek', u'sum': [u'md5', u'aa9f551021aef19b520b72aabbb52ba5'], u'filename': u'ofa-2.6.32-300.29.2.el6uek-1.5.1-4.0.58.src.rpm', u'epoch': u'0', u'version': u'1.5.1', u'release': u'4.0.58', u'arch': u'src'}, {u'src': None, u'name': u'ofa-2.6.32-300.29.2.el6uek', u'sum': [u'md5', u'2e68a4b4cb78cdd70b20ca1360f20289'], u'filename': u'ofa-2.6.32-300.29.2.el6uek-1.5.1-4.0.58.x86_64.rpm', u'epoch': u'0', u'version': u'1.5.1', u'release': u'4.0.58', u'arch': u'x86_64'}, {u'src': None, u'name': u'ofa-2.6.32-300.29.2.el6uekdebug', u'sum': [u'md5', u'93297aa275c1af0c53f7982a3707ca40'], u'filename': u'ofa-2.6.32-300.29.2.el6uekdebug-1.5.1-4.0.58.x86_64.rpm', u'epoch': u'0', u'version': u'1.5.1', u'release': u'4.0.58', u'arch': u'x86_64'}], u'name': u'ol6_x86_64_latest', u'short': u'ol6_x86_64_latest'}, {u'packages': [{u'src': None, u'name': u'kernel-uek', u'sum': [u'md5', u'9092a1aaef41a11372844d547c852633'], u'filename': u'kernel-uek-2.6.32-300.29.2.el5uek.src.rpm', u'epoch': u'0', u'version': u'2.6.32', u'release': u'300.29.2.el5uek', u'arch': u'src'}, {u'src': None, u'name': u'kernel-uek', u'sum': [u'md5', u'3c0eeefabc7ea4fa6aa74354761001d3'], u'filename': u'kernel-uek-2.6.32-300.29.2.el5uek.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.32', u'release': u'300.29.2.el5uek', u'arch': u'x86_64'}, {u'src': None, u'name': u'kernel-uek-debug', u'sum': [u'md5', u'fe7c565653a879a6c6c43c1be22209b9'], u'filename': u'kernel-uek-debug-2.6.32-300.29.2.el5uek.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.32', u'release': u'300.29.2.el5uek', u'arch': u'x86_64'}, {u'src': None, u'name': u'kernel-uek-debug-devel', u'sum': [u'md5', u'04da65146fd54835c0bf351fe9856e74'], u'filename': u'kernel-uek-debug-devel-2.6.32-300.29.2.el5uek.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.32', u'release': u'300.29.2.el5uek', u'arch': u'x86_64'}, {u'src': None, u'name': u'kernel-uek-devel', u'sum': [u'md5', u'8bc6f4a1366e2383376e0e9b97f854d9'], u'filename': u'kernel-uek-devel-2.6.32-300.29.2.el5uek.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.32', u'release': u'300.29.2.el5uek', u'arch': u'x86_64'}, {u'src': None, u'name': u'kernel-uek-doc', u'sum': [u'md5', u'4233b346dd27e04685a26070e31aa148'], u'filename': u'kernel-uek-doc-2.6.32-300.29.2.el5uek.noarch.rpm', u'epoch': u'0', u'version': u'2.6.32', u'release': u'300.29.2.el5uek', u'arch': u'noarch'}, {u'src': None, u'name': u'kernel-uek-firmware', u'sum': [u'md5', u'ed9a509e97ea08a7ef72d0a27d484244'], u'filename': u'kernel-uek-firmware-2.6.32-300.29.2.el5uek.noarch.rpm', u'epoch': u'0', u'version': u'2.6.32', u'release': u'300.29.2.el5uek', u'arch': u'noarch'}, {u'src': None, u'name': u'mlnx_en-2.6.32-300.29.2.el5uek', u'sum': [u'md5', u'07fac0e168c6db80341419a5ae4b081b'], u'filename': u'mlnx_en-2.6.32-300.29.2.el5uek-1.5.7-2.src.rpm', u'epoch': u'0', u'version': u'1.5.7', u'release': u'2', u'arch': u'src'}, {u'src': None, u'name': u'mlnx_en-2.6.32-300.29.2.el5uek', u'sum': [u'md5', u'6d31544c9ddfea252c6a2ceb80d1fbd0'], u'filename': u'mlnx_en-2.6.32-300.29.2.el5uek-1.5.7-2.x86_64.rpm', u'epoch': u'0', u'version': u'1.5.7', u'release': u'2', u'arch': u'x86_64'}, {u'src': None, u'name': u'mlnx_en-2.6.32-300.29.2.el5uekdebug', u'sum': [u'md5', u'9526dbd5445cd2471b359a03fd801ea3'], u'filename': u'mlnx_en-2.6.32-300.29.2.el5uekdebug-1.5.7-2.x86_64.rpm', u'epoch': u'0', u'version': u'1.5.7', u'release': u'2', u'arch': u'x86_64'}, {u'src': None, u'name': u'ofa-2.6.32-300.29.2.el5uek', u'sum': [u'md5', u'd78d996fd5fb4b4c15b2b0048e36f93e'], u'filename': u'ofa-2.6.32-300.29.2.el5uek-1.5.1-4.0.58.src.rpm', u'epoch': u'0', u'version': u'1.5.1', u'release': u'4.0.58', u'arch': u'src'}, {u'src': None, u'name': u'ofa-2.6.32-300.29.2.el5uek', u'sum': [u'md5', u'f54d48cea045984bc5b0909857a97a5d'], u'filename': u'ofa-2.6.32-300.29.2.el5uek-1.5.1-4.0.58.x86_64.rpm', u'epoch': u'0', u'version': u'1.5.1', u'release': u'4.0.58', u'arch': u'x86_64'}, {u'src': None, u'name': u'ofa-2.6.32-300.29.2.el5uekdebug', u'sum': [u'md5', u'e7b9f9941517b82a16989e309da9ba73'], u'filename': u'ofa-2.6.32-300.29.2.el5uekdebug-1.5.1-4.0.58.x86_64.rpm', u'epoch': u'0', u'version': u'1.5.1', u'release': u'4.0.58', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u'\n[2.6.32-300.32.3]\n- dl2k: Clean up rio_ioctl (Stephan Mueller) [Orabug: 14675306] {CVE-2012-2313}\n- hugetlb: fix resv_map leak in error path (Christoph Lameter) [Orabug: 14676403] {CVE-2012-2390}\n- rds: set correct msg_namelen (Jay Fenlason) [Orabug: 14676504] {CVE-2012-3430}\n', u'issued': u'2012-09-27', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELSA-2012-2035.html', u'type': u'self', u'id': None, u'title': u'ELSA-2012-2035'}, {u'href': u'http://linux.oracle.com/cve/CVE-2012-2313.html', u'type': u'cve', u'id': u'CVE-2012-2313', u'title': u'CVE-2012-2313'}, {u'href': u'http://linux.oracle.com/cve/CVE-2012-2390.html', u'type': u'cve', u'id': u'CVE-2012-2390', u'title': u'CVE-2012-2390'}, {u'href': u'http://linux.oracle.com/cve/CVE-2012-3430.html', u'type': u'cve', u'id': u'CVE-2012-3430', u'title': u'CVE-2012-3430'}], u'_content_type_id': u'erratum', u'_id': u'56050773-53cb-4463-acc0-30452fe6f5cb', u'from': u'el-errata@oss.oracle.com', u'severity': u'Moderate', u'title': u'Unbreakable Enterprise kernel security update', u'_ns': u'units_erratum', u'rights': u'Copyright 2012 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 6', u'reboot_suggested': False, u'type': u'security', u'pkglist': [{u'packages': [{u'src': None, u'name': u'kernel-uek', u'sum': [u'md5', u'816f1416f77f449d93c1b8ada2b3183e'], u'filename': u'kernel-uek-2.6.32-300.32.3.el6uek.src.rpm', u'epoch': u'0', u'version': u'2.6.32', u'release': u'300.32.3.el6uek', u'arch': u'src'}, {u'src': None, u'name': u'kernel-uek', u'sum': [u'md5', u'4addccdf41e824b428f7ddf977b97fc2'], u'filename': u'kernel-uek-2.6.32-300.32.3.el6uek.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.32', u'release': u'300.32.3.el6uek', u'arch': u'x86_64'}, {u'src': None, u'name': u'kernel-uek-debug', u'sum': [u'md5', u'f0158c2012879c3eb2272078db9a7001'], u'filename': u'kernel-uek-debug-2.6.32-300.32.3.el6uek.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.32', u'release': u'300.32.3.el6uek', u'arch': u'x86_64'}, {u'src': None, u'name': u'kernel-uek-debug-devel', u'sum': [u'md5', u'5e93eb2e240caa0e598376c57d3803c6'], u'filename': u'kernel-uek-debug-devel-2.6.32-300.32.3.el6uek.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.32', u'release': u'300.32.3.el6uek', u'arch': u'x86_64'}, {u'src': None, u'name': u'kernel-uek-devel', u'sum': [u'md5', u'706820b73797e70564de045c285b6164'], u'filename': u'kernel-uek-devel-2.6.32-300.32.3.el6uek.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.32', u'release': u'300.32.3.el6uek', u'arch': u'x86_64'}, {u'src': None, u'name': u'kernel-uek-doc', u'sum': [u'md5', u'022cbd69499ede7d518f58cafd94f3c7'], u'filename': u'kernel-uek-doc-2.6.32-300.32.3.el6uek.noarch.rpm', u'epoch': u'0', u'version': u'2.6.32', u'release': u'300.32.3.el6uek', u'arch': u'noarch'}, {u'src': None, u'name': u'kernel-uek-firmware', u'sum': [u'md5', u'b7b1ff634bdc8080ccf57711fa3522bb'], u'filename': u'kernel-uek-firmware-2.6.32-300.32.3.el6uek.noarch.rpm', u'epoch': u'0', u'version': u'2.6.32', u'release': u'300.32.3.el6uek', u'arch': u'noarch'}, {u'src': None, u'name': u'kernel-uek-headers', u'sum': [u'md5', u'c5a7fe7665f981afc84e7283372f9b40'], u'filename': u'kernel-uek-headers-2.6.32-300.32.3.el6uek.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.32', u'release': u'300.32.3.el6uek', u'arch': u'x86_64'}, {u'src': None, u'name': u'mlnx_en-2.6.32-300.32.3.el6uek', u'sum': [u'md5', u'ea6fe9f58174e59509eaffae275349e6'], u'filename': u'mlnx_en-2.6.32-300.32.3.el6uek-1.5.7-0.1.src.rpm', u'epoch': u'0', u'version': u'1.5.7', u'release': u'0.1', u'arch': u'src'}, {u'src': None, u'name': u'mlnx_en-2.6.32-300.32.3.el6uek', u'sum': [u'md5', u'46848016501cb6d65210de279d0ede1e'], u'filename': u'mlnx_en-2.6.32-300.32.3.el6uek-1.5.7-0.1.x86_64.rpm', u'epoch': u'0', u'version': u'1.5.7', u'release': u'0.1', u'arch': u'x86_64'}, {u'src': None, u'name': u'mlnx_en-2.6.32-300.32.3.el6uekdebug', u'sum': [u'md5', u'dd389edb51af4fc39c19d17ebfe7084b'], u'filename': u'mlnx_en-2.6.32-300.32.3.el6uekdebug-1.5.7-0.1.x86_64.rpm', u'epoch': u'0', u'version': u'1.5.7', u'release': u'0.1', u'arch': u'x86_64'}, {u'src': None, u'name': u'ofa-2.6.32-300.32.3.el6uek', u'sum': [u'md5', u'cc0cf310e87f3c59d0331f6d3eb8dd1a'], u'filename': u'ofa-2.6.32-300.32.3.el6uek-1.5.1-4.0.58.src.rpm', u'epoch': u'0', u'version': u'1.5.1', u'release': u'4.0.58', u'arch': u'src'}, {u'src': None, u'name': u'ofa-2.6.32-300.32.3.el6uek', u'sum': [u'md5', u'200915b7f0e3b7ae7b323c32a1f6cfd2'], u'filename': u'ofa-2.6.32-300.32.3.el6uek-1.5.1-4.0.58.x86_64.rpm', u'epoch': u'0', u'version': u'1.5.1', u'release': u'4.0.58', u'arch': u'x86_64'}, {u'src': None, u'name': u'ofa-2.6.32-300.32.3.el6uekdebug', u'sum': [u'md5', u'0eb0f9aca29a76dccf8b580bca2ff879'], u'filename': u'ofa-2.6.32-300.32.3.el6uekdebug-1.5.1-4.0.58.x86_64.rpm', u'epoch': u'0', u'version': u'1.5.1', u'release': u'4.0.58', u'arch': u'x86_64'}], u'name': u'ol6_x86_64_latest', u'short': u'ol6_x86_64_latest'}, {u'packages': [{u'src': None, u'name': u'kernel-uek', u'sum': [u'md5', u'736f2374d37effc178381306a456d96c'], u'filename': u'kernel-uek-2.6.32-300.32.3.el5uek.src.rpm', u'epoch': u'0', u'version': u'2.6.32', u'release': u'300.32.3.el5uek', u'arch': u'src'}, {u'src': None, u'name': u'kernel-uek', u'sum': [u'md5', u'6171a94dbe9c8b05bd6b49889b6bf473'], u'filename': u'kernel-uek-2.6.32-300.32.3.el5uek.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.32', u'release': u'300.32.3.el5uek', u'arch': u'x86_64'}, {u'src': None, u'name': u'kernel-uek-debug', u'sum': [u'md5', u'696655f9685d9683f5ed0f1683080c65'], u'filename': u'kernel-uek-debug-2.6.32-300.32.3.el5uek.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.32', u'release': u'300.32.3.el5uek', u'arch': u'x86_64'}, {u'src': None, u'name': u'kernel-uek-debug-devel', u'sum': [u'md5', u'e177867072b69d9b567031cabc27bf58'], u'filename': u'kernel-uek-debug-devel-2.6.32-300.32.3.el5uek.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.32', u'release': u'300.32.3.el5uek', u'arch': u'x86_64'}, {u'src': None, u'name': u'kernel-uek-devel', u'sum': [u'md5', u'de55599f1b80b51e8496de4e6b4c1746'], u'filename': u'kernel-uek-devel-2.6.32-300.32.3.el5uek.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.32', u'release': u'300.32.3.el5uek', u'arch': u'x86_64'}, {u'src': None, u'name': u'kernel-uek-doc', u'sum': [u'md5', u'48fd3597f5a57e63b6c4a6c2fd8232ad'], u'filename': u'kernel-uek-doc-2.6.32-300.32.3.el5uek.noarch.rpm', u'epoch': u'0', u'version': u'2.6.32', u'release': u'300.32.3.el5uek', u'arch': u'noarch'}, {u'src': None, u'name': u'kernel-uek-firmware', u'sum': [u'md5', u'de7bced57fed88915708126d0f05bf8c'], u'filename': u'kernel-uek-firmware-2.6.32-300.32.3.el5uek.noarch.rpm', u'epoch': u'0', u'version': u'2.6.32', u'release': u'300.32.3.el5uek', u'arch': u'noarch'}, {u'src': None, u'name': u'mlnx_en-2.6.32-300.32.3.el5uek', u'sum': [u'md5', u'08607fc9405a67d6a7e4c00ae2341708'], u'filename': u'mlnx_en-2.6.32-300.32.3.el5uek-1.5.7-2.src.rpm', u'epoch': u'0', u'version': u'1.5.7', u'release': u'2', u'arch': u'src'}, {u'src': None, u'name': u'mlnx_en-2.6.32-300.32.3.el5uek', u'sum': [u'md5', u'afdd9f20243c1f406a28ed2db22e3d07'], u'filename': u'mlnx_en-2.6.32-300.32.3.el5uek-1.5.7-2.x86_64.rpm', u'epoch': u'0', u'version': u'1.5.7', u'release': u'2', u'arch': u'x86_64'}, {u'src': None, u'name': u'mlnx_en-2.6.32-300.32.3.el5uekdebug', u'sum': [u'md5', u'5263dd7d2a120b38d05cf690c92ce2d3'], u'filename': u'mlnx_en-2.6.32-300.32.3.el5uekdebug-1.5.7-2.x86_64.rpm', u'epoch': u'0', u'version': u'1.5.7', u'release': u'2', u'arch': u'x86_64'}, {u'src': None, u'name': u'ofa-2.6.32-300.32.3.el5uek', u'sum': [u'md5', u'2270715d6530db85cb0c4d03266dc476'], u'filename': u'ofa-2.6.32-300.32.3.el5uek-1.5.1-4.0.58.src.rpm', u'epoch': u'0', u'version': u'1.5.1', u'release': u'4.0.58', u'arch': u'src'}, {u'src': None, u'name': u'ofa-2.6.32-300.32.3.el5uek', u'sum': [u'md5', u'c1f150c05de9703c72c8bf79553ef5fd'], u'filename': u'ofa-2.6.32-300.32.3.el5uek-1.5.1-4.0.58.x86_64.rpm', u'epoch': u'0', u'version': u'1.5.1', u'release': u'4.0.58', u'arch': u'x86_64'}, {u'src': None, u'name': u'ofa-2.6.32-300.32.3.el5uekdebug', u'sum': [u'md5', u'52300596bdc3c4c85c8a16ac5fb4f74c'], u'filename': u'ofa-2.6.32-300.32.3.el5uekdebug-1.5.1-4.0.58.x86_64.rpm', u'epoch': u'0', u'version': u'1.5.1', u'release': u'4.0.58', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u"[2.6.32-300.37.1.]\n- sfc: Replace some literal constants with EFX_PAGE_SIZE/EFX_BUF_SIZE (Ben Hutchings) [Orabug: 14769994]\n- CVE-2012-3412 sfc: Fix maximum number of TSO segments and minimum TX queue size (Ben Hutchings) [Orabug: 14769994] {CVE-2012-3412}\n\n[2.6.32-300.36.1.]\n- dl2k: Clean up rio_ioctl (Stephan Mueller) [Orabug: 14675306] {CVE-2012-2313}\n- hugetlb: fix resv_map leak in error path (Christoph Lameter) [Orabug: 14676403] {CVE-2012-2390}\n- rds: set correct msg_namelen (Jay Fenlason) [Orabug: 14676504] {CVE-2012-3430}\n\n[2.6.32-300.35.1.]\n- oracleasm: Bring driver in sync with UEK2 (Martin K. Petersen)\n- Fix system hang due to bad protection module parameters (CR 130769) (Martin\n K. Petersen)\n- sd: Avoid remapping bad reference tags (Martin K. Petersen)\n- block: Fix bad range check in bio_sector_offset (Martin K. Petersen)\n\n[2.6.32-300.34.1.]\n- htrimer: fix kabi breakage (Joe Jin)\n- 2.6.32.x: timekeeping: Add missing update call in timekeeping_resume()\n (Thomas Gleixner)\n- 2.6.32.x: hrtimer: Update hrtimer base offsets each hrtimer_interrupt (John\n Stultz)\n- 2.6.32.x: timekeeping: Provide hrtimer update function (Thomas Gleixner)\n- 2.6.32.x: hrtimers: Move lock held region in hrtimer_interrupt() (Thomas\n Gleixner)\n- 2.6.32.x: timekeeping: Maintain ktime_t based offsets for hrtimers (Thomas\n Gleixner)\n- 2.6.32.x: timekeeping: Fix leapsecond triggered load spike issue (John\n Stultz)\n- 2.6.32.x: hrtimer: Provide clock_was_set_delayed() (John Stultz)\n- 2.6.32.x: time: Move common updates to a function (Thomas Gleixner)\n- 2.6.32.x: timekeeping: Fix CLOCK_MONOTONIC inconsistency during leapsecond\n (John Stultz)\n- 2.6.32.x: ntp: Correct TAI offset during leap second (Richard Cochran)\n- 2.6.32.x: ntp: Fix leap-second hrtimer livelock (John Stultz)\n- Revert '2.6.32.x: hrtimer: Fix clock_was_set so it is safe to call from irq\n context' (Joe Jin)\n- Revert '2.6.32.x: time: Fix leapsecond triggered hrtimer/futex load spike\n issue' (Joe Jin)\n- Revert '2.6.32.x: hrtimer: Update hrtimer base offsets each\n hrtimer_interrupt' (Joe Jin)\n\n[2.6.32-300.33.1.]\n- mpt2sas: Update mpt2sas to 120.105.11.00 (Guru Anbalagane) [Orabug: 14376481]\n- Revert 'mpt2sas: update to 12.105.11.00' (Maxim Uvarov)\n", u'issued': u'2012-10-18', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELSA-2012-2038.html', u'type': u'self', u'id': None, u'title': u'ELSA-2012-2038'}, {u'href': u'http://linux.oracle.com/cve/CVE-2012-3412.html', u'type': u'cve', u'id': u'CVE-2012-3412', u'title': u'CVE-2012-3412'}], u'_content_type_id': u'erratum', u'_id': u'b32956e1-af00-4562-a64a-034f9e8d25de', u'from': u'el-errata@oss.oracle.com', u'severity': u'Important', u'title': u'Unbreakable Enterprise kernel security and bug fix update', u'_ns': u'units_erratum', u'rights': u'Copyright 2012 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 6', u'reboot_suggested': False, u'type': u'security', u'pkglist': [{u'packages': [{u'src': None, u'name': u'kernel-uek', u'sum': [u'md5', u'2489bf0db5476b2763f20e6c17f43fea'], u'filename': u'kernel-uek-2.6.32-300.37.1.el6uek.src.rpm', u'epoch': u'0', u'version': u'2.6.32', u'release': u'300.37.1.el6uek', u'arch': u'src'}, {u'src': None, u'name': u'kernel-uek', u'sum': [u'md5', u'3692119442a0e1e385d156f51b5e0c8a'], u'filename': u'kernel-uek-2.6.32-300.37.1.el6uek.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.32', u'release': u'300.37.1.el6uek', u'arch': u'x86_64'}, {u'src': None, u'name': u'kernel-uek-debug', u'sum': [u'md5', u'5d6498e0dc0c6916293880cddc6fe2f6'], u'filename': u'kernel-uek-debug-2.6.32-300.37.1.el6uek.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.32', u'release': u'300.37.1.el6uek', u'arch': u'x86_64'}, {u'src': None, u'name': u'kernel-uek-debug-devel', u'sum': [u'md5', u'5129c5c7edc09c278584a910170b134b'], u'filename': u'kernel-uek-debug-devel-2.6.32-300.37.1.el6uek.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.32', u'release': u'300.37.1.el6uek', u'arch': u'x86_64'}, {u'src': None, u'name': u'kernel-uek-devel', u'sum': [u'md5', u'2e30aec16d39a569ae039d4ba2e80518'], u'filename': u'kernel-uek-devel-2.6.32-300.37.1.el6uek.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.32', u'release': u'300.37.1.el6uek', u'arch': u'x86_64'}, {u'src': None, u'name': u'kernel-uek-doc', u'sum': [u'md5', u'e7c032213043173e3d52483fc4e9b8fd'], u'filename': u'kernel-uek-doc-2.6.32-300.37.1.el6uek.noarch.rpm', u'epoch': u'0', u'version': u'2.6.32', u'release': u'300.37.1.el6uek', u'arch': u'noarch'}, {u'src': None, u'name': u'kernel-uek-firmware', u'sum': [u'md5', u'8148e031c3bd11c692632a49cc8706fd'], u'filename': u'kernel-uek-firmware-2.6.32-300.37.1.el6uek.noarch.rpm', u'epoch': u'0', u'version': u'2.6.32', u'release': u'300.37.1.el6uek', u'arch': u'noarch'}, {u'src': None, u'name': u'kernel-uek-headers', u'sum': [u'md5', u'9c389451b518b1f50a39c36f8b009d3f'], u'filename': u'kernel-uek-headers-2.6.32-300.37.1.el6uek.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.32', u'release': u'300.37.1.el6uek', u'arch': u'x86_64'}, {u'src': None, u'name': u'mlnx_en-2.6.32-300.37.1.el6uek', u'sum': [u'md5', u'fe635b5f5c83bdbd3a2dc51e6471ae56'], u'filename': u'mlnx_en-2.6.32-300.37.1.el6uek-1.5.7-0.1.src.rpm', u'epoch': u'0', u'version': u'1.5.7', u'release': u'0.1', u'arch': u'src'}, {u'src': None, u'name': u'mlnx_en-2.6.32-300.37.1.el6uek', u'sum': [u'md5', u'd62942aa922f71eb68821f55d70d916e'], u'filename': u'mlnx_en-2.6.32-300.37.1.el6uek-1.5.7-0.1.x86_64.rpm', u'epoch': u'0', u'version': u'1.5.7', u'release': u'0.1', u'arch': u'x86_64'}, {u'src': None, u'name': u'mlnx_en-2.6.32-300.37.1.el6uekdebug', u'sum': [u'md5', u'0e67ecbbc5c644370665242ffedededb'], u'filename': u'mlnx_en-2.6.32-300.37.1.el6uekdebug-1.5.7-0.1.x86_64.rpm', u'epoch': u'0', u'version': u'1.5.7', u'release': u'0.1', u'arch': u'x86_64'}, {u'src': None, u'name': u'ofa-2.6.32-300.37.1.el6uek', u'sum': [u'md5', u'4ca20f676c969b592486376b0914e791'], u'filename': u'ofa-2.6.32-300.37.1.el6uek-1.5.1-4.0.58.src.rpm', u'epoch': u'0', u'version': u'1.5.1', u'release': u'4.0.58', u'arch': u'src'}, {u'src': None, u'name': u'ofa-2.6.32-300.37.1.el6uek', u'sum': [u'md5', u'55759205353877746226d69cffba6e04'], u'filename': u'ofa-2.6.32-300.37.1.el6uek-1.5.1-4.0.58.x86_64.rpm', u'epoch': u'0', u'version': u'1.5.1', u'release': u'4.0.58', u'arch': u'x86_64'}, {u'src': None, u'name': u'ofa-2.6.32-300.37.1.el6uekdebug', u'sum': [u'md5', u'34198dd20aaaf8d70594ae7fa1239cf9'], u'filename': u'ofa-2.6.32-300.37.1.el6uekdebug-1.5.1-4.0.58.x86_64.rpm', u'epoch': u'0', u'version': u'1.5.1', u'release': u'4.0.58', u'arch': u'x86_64'}], u'name': u'ol6_x86_64_latest', u'short': u'ol6_x86_64_latest'}, {u'packages': [{u'src': None, u'name': u'kernel-uek', u'sum': [u'md5', u'a1660cd38859247bd74c8178b26c4590'], u'filename': u'kernel-uek-2.6.32-300.37.1.el5uek.src.rpm', u'epoch': u'0', u'version': u'2.6.32', u'release': u'300.37.1.el5uek', u'arch': u'src'}, {u'src': None, u'name': u'kernel-uek', u'sum': [u'md5', u'0e78e5d3476312736429b3e5be429145'], u'filename': u'kernel-uek-2.6.32-300.37.1.el5uek.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.32', u'release': u'300.37.1.el5uek', u'arch': u'x86_64'}, {u'src': None, u'name': u'kernel-uek-debug', u'sum': [u'md5', u'eb36e462831f5fd822b71bdad623e843'], u'filename': u'kernel-uek-debug-2.6.32-300.37.1.el5uek.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.32', u'release': u'300.37.1.el5uek', u'arch': u'x86_64'}, {u'src': None, u'name': u'kernel-uek-debug-devel', u'sum': [u'md5', u'968626facf69d0607355a0774c367ce0'], u'filename': u'kernel-uek-debug-devel-2.6.32-300.37.1.el5uek.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.32', u'release': u'300.37.1.el5uek', u'arch': u'x86_64'}, {u'src': None, u'name': u'kernel-uek-devel', u'sum': [u'md5', u'586e456647e0117d2dfd9daec110de28'], u'filename': u'kernel-uek-devel-2.6.32-300.37.1.el5uek.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.32', u'release': u'300.37.1.el5uek', u'arch': u'x86_64'}, {u'src': None, u'name': u'kernel-uek-doc', u'sum': [u'md5', u'7027689eed31dcdf457d4ef70f644ba6'], u'filename': u'kernel-uek-doc-2.6.32-300.37.1.el5uek.noarch.rpm', u'epoch': u'0', u'version': u'2.6.32', u'release': u'300.37.1.el5uek', u'arch': u'noarch'}, {u'src': None, u'name': u'kernel-uek-firmware', u'sum': [u'md5', u'32d33b07fa66874cd7f83c5d771758ad'], u'filename': u'kernel-uek-firmware-2.6.32-300.37.1.el5uek.noarch.rpm', u'epoch': u'0', u'version': u'2.6.32', u'release': u'300.37.1.el5uek', u'arch': u'noarch'}, {u'src': None, u'name': u'mlnx_en-2.6.32-300.37.1.el5uek', u'sum': [u'md5', u'0056eec7aec73cd0febbf4d6fc2ff15a'], u'filename': u'mlnx_en-2.6.32-300.37.1.el5uek-1.5.7-2.src.rpm', u'epoch': u'0', u'version': u'1.5.7', u'release': u'2', u'arch': u'src'}, {u'src': None, u'name': u'mlnx_en-2.6.32-300.37.1.el5uek', u'sum': [u'md5', u'782cb7aa080195172a26d2e2b80666ff'], u'filename': u'mlnx_en-2.6.32-300.37.1.el5uek-1.5.7-2.x86_64.rpm', u'epoch': u'0', u'version': u'1.5.7', u'release': u'2', u'arch': u'x86_64'}, {u'src': None, u'name': u'mlnx_en-2.6.32-300.37.1.el5uekdebug', u'sum': [u'md5', u'210ad0a72a0911325ce761820ff745d7'], u'filename': u'mlnx_en-2.6.32-300.37.1.el5uekdebug-1.5.7-2.x86_64.rpm', u'epoch': u'0', u'version': u'1.5.7', u'release': u'2', u'arch': u'x86_64'}, {u'src': None, u'name': u'ofa-2.6.32-300.37.1.el5uek', u'sum': [u'md5', u'c7f876b098e75c70994d3082afb527d1'], u'filename': u'ofa-2.6.32-300.37.1.el5uek-1.5.1-4.0.58.src.rpm', u'epoch': u'0', u'version': u'1.5.1', u'release': u'4.0.58', u'arch': u'src'}, {u'src': None, u'name': u'ofa-2.6.32-300.37.1.el5uek', u'sum': [u'md5', u'abc549dbc6a05fed1ba0e806bb3b4b34'], u'filename': u'ofa-2.6.32-300.37.1.el5uek-1.5.1-4.0.58.x86_64.rpm', u'epoch': u'0', u'version': u'1.5.1', u'release': u'4.0.58', u'arch': u'x86_64'}, {u'src': None, u'name': u'ofa-2.6.32-300.37.1.el5uekdebug', u'sum': [u'md5', u'5fe2f8dc90beb1265e172594b219dc84'], u'filename': u'ofa-2.6.32-300.37.1.el5uekdebug-1.5.1-4.0.58.x86_64.rpm', u'epoch': u'0', u'version': u'1.5.1', u'release': u'4.0.58', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u'[2.6.32-300.38.1]\n- [net/sfc] limit number of segments per skb on tx (Maxim Uvarov) [Orabug:\n 14769994] {CVE-2012-3412}', u'issued': u'2012-10-19', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELSA-2012-2041.html', u'type': u'self', u'id': None, u'title': u'ELSA-2012-2041'}, {u'href': u'http://linux.oracle.com/cve/CVE-2012-3412.html', u'type': u'cve', u'id': u'CVE-2012-3412', u'title': u'CVE-2012-3412'}], u'_content_type_id': u'erratum', u'_id': u'b8e3b0cc-af7f-4597-b4e3-727aec5d6dd7', u'from': u'el-errata@oss.oracle.com', u'severity': u'Important', u'title': u'Unbreakable Enterprise kernel Security update', u'_ns': u'units_erratum', u'rights': u'Copyright 2012 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 6', u'reboot_suggested': False, u'type': u'security', u'pkglist': [{u'packages': [{u'src': None, u'name': u'kernel-uek', u'sum': [u'md5', u'533e52f500e691a6ea110e4a98d64ad2'], u'filename': u'kernel-uek-2.6.32-300.38.1.el6uek.src.rpm', u'epoch': u'0', u'version': u'2.6.32', u'release': u'300.38.1.el6uek', u'arch': u'src'}, {u'src': None, u'name': u'kernel-uek', u'sum': [u'md5', u'154ba7031804fea10570b9f99447cd2f'], u'filename': u'kernel-uek-2.6.32-300.38.1.el6uek.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.32', u'release': u'300.38.1.el6uek', u'arch': u'x86_64'}, {u'src': None, u'name': u'kernel-uek-debug', u'sum': [u'md5', u'ffbf16de9259d239efb52f94c85b7a65'], u'filename': u'kernel-uek-debug-2.6.32-300.38.1.el6uek.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.32', u'release': u'300.38.1.el6uek', u'arch': u'x86_64'}, {u'src': None, u'name': u'kernel-uek-debug-devel', u'sum': [u'md5', u'e9b263ca906e22e77685e69a9c907c45'], u'filename': u'kernel-uek-debug-devel-2.6.32-300.38.1.el6uek.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.32', u'release': u'300.38.1.el6uek', u'arch': u'x86_64'}, {u'src': None, u'name': u'kernel-uek-devel', u'sum': [u'md5', u'2ab050b3eea272ddc82ad87615bff9d0'], u'filename': u'kernel-uek-devel-2.6.32-300.38.1.el6uek.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.32', u'release': u'300.38.1.el6uek', u'arch': u'x86_64'}, {u'src': None, u'name': u'kernel-uek-doc', u'sum': [u'md5', u'303ac34ac5c15a379dd8713540f97911'], u'filename': u'kernel-uek-doc-2.6.32-300.38.1.el6uek.noarch.rpm', u'epoch': u'0', u'version': u'2.6.32', u'release': u'300.38.1.el6uek', u'arch': u'noarch'}, {u'src': None, u'name': u'kernel-uek-firmware', u'sum': [u'md5', u'4161fe38bcba90828663d2055ade42ec'], u'filename': u'kernel-uek-firmware-2.6.32-300.38.1.el6uek.noarch.rpm', u'epoch': u'0', u'version': u'2.6.32', u'release': u'300.38.1.el6uek', u'arch': u'noarch'}, {u'src': None, u'name': u'kernel-uek-headers', u'sum': [u'md5', u'fd8922d29244b0a0c53e751a3fa2ee11'], u'filename': u'kernel-uek-headers-2.6.32-300.38.1.el6uek.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.32', u'release': u'300.38.1.el6uek', u'arch': u'x86_64'}, {u'src': None, u'name': u'mlnx_en-2.6.32-300.38.1.el6uek', u'sum': [u'md5', u'bfb751788dfa134dae46429c628332a8'], u'filename': u'mlnx_en-2.6.32-300.38.1.el6uek-1.5.7-0.1.src.rpm', u'epoch': u'0', u'version': u'1.5.7', u'release': u'0.1', u'arch': u'src'}, {u'src': None, u'name': u'mlnx_en-2.6.32-300.38.1.el6uek', u'sum': [u'md5', u'f06993e64aadf8fd19b62e0384353842'], u'filename': u'mlnx_en-2.6.32-300.38.1.el6uek-1.5.7-0.1.x86_64.rpm', u'epoch': u'0', u'version': u'1.5.7', u'release': u'0.1', u'arch': u'x86_64'}, {u'src': None, u'name': u'mlnx_en-2.6.32-300.38.1.el6uekdebug', u'sum': [u'md5', u'a8c87e96582c3388e2a2120c40b147a4'], u'filename': u'mlnx_en-2.6.32-300.38.1.el6uekdebug-1.5.7-0.1.x86_64.rpm', u'epoch': u'0', u'version': u'1.5.7', u'release': u'0.1', u'arch': u'x86_64'}, {u'src': None, u'name': u'ofa-2.6.32-300.38.1.el6uek', u'sum': [u'md5', u'4ad0cc528a34d789f69f27506bc48cd9'], u'filename': u'ofa-2.6.32-300.38.1.el6uek-1.5.1-4.0.58.src.rpm', u'epoch': u'0', u'version': u'1.5.1', u'release': u'4.0.58', u'arch': u'src'}, {u'src': None, u'name': u'ofa-2.6.32-300.38.1.el6uek', u'sum': [u'md5', u'4ac394c3e7ca9c442fe85997fcef492b'], u'filename': u'ofa-2.6.32-300.38.1.el6uek-1.5.1-4.0.58.x86_64.rpm', u'epoch': u'0', u'version': u'1.5.1', u'release': u'4.0.58', u'arch': u'x86_64'}, {u'src': None, u'name': u'ofa-2.6.32-300.38.1.el6uekdebug', u'sum': [u'md5', u'd1785a2ccaa2cd50963b686fcd07bf23'], u'filename': u'ofa-2.6.32-300.38.1.el6uekdebug-1.5.1-4.0.58.x86_64.rpm', u'epoch': u'0', u'version': u'1.5.1', u'release': u'4.0.58', u'arch': u'x86_64'}], u'name': u'ol6_x86_64_latest', u'short': u'ol6_x86_64_latest'}, {u'packages': [{u'src': None, u'name': u'kernel-uek', u'sum': [u'md5', u'8c274b5e1f6c576b521f452e0699b809'], u'filename': u'kernel-uek-2.6.32-300.38.1.el5uek.src.rpm', u'epoch': u'0', u'version': u'2.6.32', u'release': u'300.38.1.el5uek', u'arch': u'src'}, {u'src': None, u'name': u'kernel-uek', u'sum': [u'md5', u'f23af69bc2af215b47c0cf42106de439'], u'filename': u'kernel-uek-2.6.32-300.38.1.el5uek.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.32', u'release': u'300.38.1.el5uek', u'arch': u'x86_64'}, {u'src': None, u'name': u'kernel-uek-debug', u'sum': [u'md5', u'5216fb78b35ef51a522dc8cda9fdb407'], u'filename': u'kernel-uek-debug-2.6.32-300.38.1.el5uek.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.32', u'release': u'300.38.1.el5uek', u'arch': u'x86_64'}, {u'src': None, u'name': u'kernel-uek-debug-devel', u'sum': [u'md5', u'677e40690a6d8c8f898a85fbb99a39af'], u'filename': u'kernel-uek-debug-devel-2.6.32-300.38.1.el5uek.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.32', u'release': u'300.38.1.el5uek', u'arch': u'x86_64'}, {u'src': None, u'name': u'kernel-uek-devel', u'sum': [u'md5', u'7e75b920d1c025634e1b94c2b1699b22'], u'filename': u'kernel-uek-devel-2.6.32-300.38.1.el5uek.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.32', u'release': u'300.38.1.el5uek', u'arch': u'x86_64'}, {u'src': None, u'name': u'kernel-uek-doc', u'sum': [u'md5', u'1e9bb1d46fc3719c6e3c8213a7d87bc0'], u'filename': u'kernel-uek-doc-2.6.32-300.38.1.el5uek.noarch.rpm', u'epoch': u'0', u'version': u'2.6.32', u'release': u'300.38.1.el5uek', u'arch': u'noarch'}, {u'src': None, u'name': u'kernel-uek-firmware', u'sum': [u'md5', u'24e8b75e4a7588e28a5201d8fd28439a'], u'filename': u'kernel-uek-firmware-2.6.32-300.38.1.el5uek.noarch.rpm', u'epoch': u'0', u'version': u'2.6.32', u'release': u'300.38.1.el5uek', u'arch': u'noarch'}, {u'src': None, u'name': u'mlnx_en-2.6.32-300.38.1.el5uek', u'sum': [u'md5', u'8c344d7ec1c606eb48fe10b421da642c'], u'filename': u'mlnx_en-2.6.32-300.38.1.el5uek-1.5.7-2.src.rpm', u'epoch': u'0', u'version': u'1.5.7', u'release': u'2', u'arch': u'src'}, {u'src': None, u'name': u'mlnx_en-2.6.32-300.38.1.el5uek', u'sum': [u'md5', u'afb43da902189828b51b348371054d46'], u'filename': u'mlnx_en-2.6.32-300.38.1.el5uek-1.5.7-2.x86_64.rpm', u'epoch': u'0', u'version': u'1.5.7', u'release': u'2', u'arch': u'x86_64'}, {u'src': None, u'name': u'mlnx_en-2.6.32-300.38.1.el5uekdebug', u'sum': [u'md5', u'9846d787313d6c7b8bc9535ca48273df'], u'filename': u'mlnx_en-2.6.32-300.38.1.el5uekdebug-1.5.7-2.x86_64.rpm', u'epoch': u'0', u'version': u'1.5.7', u'release': u'2', u'arch': u'x86_64'}, {u'src': None, u'name': u'ofa-2.6.32-300.38.1.el5uek', u'sum': [u'md5', u'2feb4fbf6d58e977327c1582808610f4'], u'filename': u'ofa-2.6.32-300.38.1.el5uek-1.5.1-4.0.58.src.rpm', u'epoch': u'0', u'version': u'1.5.1', u'release': u'4.0.58', u'arch': u'src'}, {u'src': None, u'name': u'ofa-2.6.32-300.38.1.el5uek', u'sum': [u'md5', u'bda7f939e95f07b142c942eb81c4a936'], u'filename': u'ofa-2.6.32-300.38.1.el5uek-1.5.1-4.0.58.x86_64.rpm', u'epoch': u'0', u'version': u'1.5.1', u'release': u'4.0.58', u'arch': u'x86_64'}, {u'src': None, u'name': u'ofa-2.6.32-300.38.1.el5uekdebug', u'sum': [u'md5', u'c967d0e54654a23d323608ff6fc6c205'], u'filename': u'ofa-2.6.32-300.38.1.el5uekdebug-1.5.1-4.0.58.x86_64.rpm', u'epoch': u'0', u'version': u'1.5.1', u'release': u'4.0.58', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u"[2.6.32-300.39.1]\n- hugepages: fix use after free bug in 'quota' handling [15842385] {CVE-2012-2133}\n- mm: Hold a file reference in madvise_remove [15842884] {CVE-2012-3511}\n- udf: Fortify loading of sparing table [15843730] {CVE-2012-3400}\n- udf: Avoid run away loop when partition table length is corrupt [15843730] {CVE-2012-3400}\n", u'issued': u'2012-11-08', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELSA-2012-2044.html', u'type': u'self', u'id': None, u'title': u'ELSA-2012-2044'}, {u'href': u'http://linux.oracle.com/cve/CVE-2012-2133.html', u'type': u'cve', u'id': u'CVE-2012-2133', u'title': u'CVE-2012-2133'}, {u'href': u'http://linux.oracle.com/cve/CVE-2012-3400.html', u'type': u'cve', u'id': u'CVE-2012-3400', u'title': u'CVE-2012-3400'}, {u'href': u'http://linux.oracle.com/cve/CVE-2012-3511.html', u'type': u'cve', u'id': u'CVE-2012-3511', u'title': u'CVE-2012-3511'}], u'_content_type_id': u'erratum', u'_id': u'0ae6ef5f-9418-48c2-bc65-8e7c4ba607c6', u'from': u'el-errata@oss.oracle.com', u'severity': u'Moderate', u'title': u'Unbreakable Enterprise kernel security update', u'_ns': u'units_erratum', u'rights': u'Copyright 2012 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 6', u'reboot_suggested': False, u'type': u'security', u'pkglist': [{u'packages': [{u'src': None, u'name': u'kernel-uek', u'sum': [u'md5', u'43df7da5d9a94171592cf65fef0f2417'], u'filename': u'kernel-uek-2.6.32-300.39.1.el6uek.src.rpm', u'epoch': u'0', u'version': u'2.6.32', u'release': u'300.39.1.el6uek', u'arch': u'src'}, {u'src': None, u'name': u'kernel-uek', u'sum': [u'md5', u'35e33e17b49b0ad45e0f80c1a1831e28'], u'filename': u'kernel-uek-2.6.32-300.39.1.el6uek.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.32', u'release': u'300.39.1.el6uek', u'arch': u'x86_64'}, {u'src': None, u'name': u'kernel-uek-debug', u'sum': [u'md5', u'2f512afa6c216d603d65b517277cec23'], u'filename': u'kernel-uek-debug-2.6.32-300.39.1.el6uek.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.32', u'release': u'300.39.1.el6uek', u'arch': u'x86_64'}, {u'src': None, u'name': u'kernel-uek-debug-devel', u'sum': [u'md5', u'5560ab00c182d80a6a1b48e83da8260a'], u'filename': u'kernel-uek-debug-devel-2.6.32-300.39.1.el6uek.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.32', u'release': u'300.39.1.el6uek', u'arch': u'x86_64'}, {u'src': None, u'name': u'kernel-uek-devel', u'sum': [u'md5', u'f741841323390f5f723ec9a3161883d5'], u'filename': u'kernel-uek-devel-2.6.32-300.39.1.el6uek.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.32', u'release': u'300.39.1.el6uek', u'arch': u'x86_64'}, {u'src': None, u'name': u'kernel-uek-doc', u'sum': [u'md5', u'c1d6446a97024d26b1a66366bbb37fe0'], u'filename': u'kernel-uek-doc-2.6.32-300.39.1.el6uek.noarch.rpm', u'epoch': u'0', u'version': u'2.6.32', u'release': u'300.39.1.el6uek', u'arch': u'noarch'}, {u'src': None, u'name': u'kernel-uek-firmware', u'sum': [u'md5', u'64ab32820cc2cbb549b57ab23be4c8d8'], u'filename': u'kernel-uek-firmware-2.6.32-300.39.1.el6uek.noarch.rpm', u'epoch': u'0', u'version': u'2.6.32', u'release': u'300.39.1.el6uek', u'arch': u'noarch'}, {u'src': None, u'name': u'kernel-uek-headers', u'sum': [u'md5', u'c8fbff11e8e6244c2d4f0ad5bff52fd9'], u'filename': u'kernel-uek-headers-2.6.32-300.39.1.el6uek.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.32', u'release': u'300.39.1.el6uek', u'arch': u'x86_64'}, {u'src': None, u'name': u'mlnx_en-2.6.32-300.39.1.el6uek', u'sum': [u'md5', u'3ff838f114500c59531126561caa8c84'], u'filename': u'mlnx_en-2.6.32-300.39.1.el6uek-1.5.7-0.1.src.rpm', u'epoch': u'0', u'version': u'1.5.7', u'release': u'0.1', u'arch': u'src'}, {u'src': None, u'name': u'mlnx_en-2.6.32-300.39.1.el6uek', u'sum': [u'md5', u'4a82d781a35c50d55d7e15f70d52ef2e'], u'filename': u'mlnx_en-2.6.32-300.39.1.el6uek-1.5.7-0.1.x86_64.rpm', u'epoch': u'0', u'version': u'1.5.7', u'release': u'0.1', u'arch': u'x86_64'}, {u'src': None, u'name': u'mlnx_en-2.6.32-300.39.1.el6uekdebug', u'sum': [u'md5', u'd54a9d91657825bc512a2eec99b583ad'], u'filename': u'mlnx_en-2.6.32-300.39.1.el6uekdebug-1.5.7-0.1.x86_64.rpm', u'epoch': u'0', u'version': u'1.5.7', u'release': u'0.1', u'arch': u'x86_64'}, {u'src': None, u'name': u'ofa-2.6.32-300.39.1.el6uek', u'sum': [u'md5', u'25b20e189213727f03661b6cfecc8c1d'], u'filename': u'ofa-2.6.32-300.39.1.el6uek-1.5.1-4.0.58.src.rpm', u'epoch': u'0', u'version': u'1.5.1', u'release': u'4.0.58', u'arch': u'src'}, {u'src': None, u'name': u'ofa-2.6.32-300.39.1.el6uek', u'sum': [u'md5', u'95f93edf8453412099529c5172d2a876'], u'filename': u'ofa-2.6.32-300.39.1.el6uek-1.5.1-4.0.58.x86_64.rpm', u'epoch': u'0', u'version': u'1.5.1', u'release': u'4.0.58', u'arch': u'x86_64'}, {u'src': None, u'name': u'ofa-2.6.32-300.39.1.el6uekdebug', u'sum': [u'md5', u'2cc27ed1c27de297273387fbf67beb3d'], u'filename': u'ofa-2.6.32-300.39.1.el6uekdebug-1.5.1-4.0.58.x86_64.rpm', u'epoch': u'0', u'version': u'1.5.1', u'release': u'4.0.58', u'arch': u'x86_64'}], u'name': u'ol6_x86_64_latest', u'short': u'ol6_x86_64_latest'}, {u'packages': [{u'src': None, u'name': u'kernel-uek', u'sum': [u'md5', u'e80485c0bc9e0ae6d38522d5b934dd07'], u'filename': u'kernel-uek-2.6.32-300.39.1.el5uek.src.rpm', u'epoch': u'0', u'version': u'2.6.32', u'release': u'300.39.1.el5uek', u'arch': u'src'}, {u'src': None, u'name': u'kernel-uek', u'sum': [u'md5', u'6e09ecec8d3bc28333218740bd63810f'], u'filename': u'kernel-uek-2.6.32-300.39.1.el5uek.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.32', u'release': u'300.39.1.el5uek', u'arch': u'x86_64'}, {u'src': None, u'name': u'kernel-uek-debug', u'sum': [u'md5', u'a865f8f92277161c25e9765112492d48'], u'filename': u'kernel-uek-debug-2.6.32-300.39.1.el5uek.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.32', u'release': u'300.39.1.el5uek', u'arch': u'x86_64'}, {u'src': None, u'name': u'kernel-uek-debug-devel', u'sum': [u'md5', u'de84bac746c1f3d57e3e642bf83318ba'], u'filename': u'kernel-uek-debug-devel-2.6.32-300.39.1.el5uek.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.32', u'release': u'300.39.1.el5uek', u'arch': u'x86_64'}, {u'src': None, u'name': u'kernel-uek-devel', u'sum': [u'md5', u'b0723bf779eafb935726363e44047eff'], u'filename': u'kernel-uek-devel-2.6.32-300.39.1.el5uek.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.32', u'release': u'300.39.1.el5uek', u'arch': u'x86_64'}, {u'src': None, u'name': u'kernel-uek-doc', u'sum': [u'md5', u'6e71fdb57fdc5adbfb772a5dd9511130'], u'filename': u'kernel-uek-doc-2.6.32-300.39.1.el5uek.noarch.rpm', u'epoch': u'0', u'version': u'2.6.32', u'release': u'300.39.1.el5uek', u'arch': u'noarch'}, {u'src': None, u'name': u'kernel-uek-firmware', u'sum': [u'md5', u'814c0ee8ea65ab8bb0ec455552d9582a'], u'filename': u'kernel-uek-firmware-2.6.32-300.39.1.el5uek.noarch.rpm', u'epoch': u'0', u'version': u'2.6.32', u'release': u'300.39.1.el5uek', u'arch': u'noarch'}, {u'src': None, u'name': u'mlnx_en-2.6.32-300.39.1.el5uek', u'sum': [u'md5', u'3520730d0a3b95a7fb57f9829a97b2fb'], u'filename': u'mlnx_en-2.6.32-300.39.1.el5uek-1.5.7-2.src.rpm', u'epoch': u'0', u'version': u'1.5.7', u'release': u'2', u'arch': u'src'}, {u'src': None, u'name': u'mlnx_en-2.6.32-300.39.1.el5uek', u'sum': [u'md5', u'3c5bdc9578ac1260203f5da64622d714'], u'filename': u'mlnx_en-2.6.32-300.39.1.el5uek-1.5.7-2.x86_64.rpm', u'epoch': u'0', u'version': u'1.5.7', u'release': u'2', u'arch': u'x86_64'}, {u'src': None, u'name': u'mlnx_en-2.6.32-300.39.1.el5uekdebug', u'sum': [u'md5', u'79b69c4b9390a9e46b74090cfff65706'], u'filename': u'mlnx_en-2.6.32-300.39.1.el5uekdebug-1.5.7-2.x86_64.rpm', u'epoch': u'0', u'version': u'1.5.7', u'release': u'2', u'arch': u'x86_64'}, {u'src': None, u'name': u'ofa-2.6.32-300.39.1.el5uek', u'sum': [u'md5', u'90d81eef155913925c69d8cd00093ca1'], u'filename': u'ofa-2.6.32-300.39.1.el5uek-1.5.1-4.0.58.src.rpm', u'epoch': u'0', u'version': u'1.5.1', u'release': u'4.0.58', u'arch': u'src'}, {u'src': None, u'name': u'ofa-2.6.32-300.39.1.el5uek', u'sum': [u'md5', u'105bd54bea432315294a44441f67917f'], u'filename': u'ofa-2.6.32-300.39.1.el5uek-1.5.1-4.0.58.x86_64.rpm', u'epoch': u'0', u'version': u'1.5.1', u'release': u'4.0.58', u'arch': u'x86_64'}, {u'src': None, u'name': u'ofa-2.6.32-300.39.1.el5uekdebug', u'sum': [u'md5', u'accead3d73fc92c16582119386629729'], u'filename': u'ofa-2.6.32-300.39.1.el5uekdebug-1.5.1-4.0.58.x86_64.rpm', u'epoch': u'0', u'version': u'1.5.1', u'release': u'4.0.58', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u'\n[2.6.32-300.39.2]\n- ext4: fix undefined behavior in ext4_fill_flex_info() (Xi Wang) [orabug 16020245] {CVE-2012-2100}\n- Divide by zero in TCP congestion control Algorithm (Jesper Dangaard Brouer) [orabug 16020447] {CVE-2012-4565}\n- ipv6: discard overlapping fragment (Luis Henriques) [orabug 16021354] {CVE-2012-4444}\n', u'issued': u'2012-12-20', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELSA-2012-2048.html', u'type': u'self', u'id': None, u'title': u'ELSA-2012-2048'}, {u'href': u'http://linux.oracle.com/cve/CVE-2012-2100.html', u'type': u'cve', u'id': u'CVE-2012-2100', u'title': u'CVE-2012-2100'}, {u'href': u'http://linux.oracle.com/cve/CVE-2012-4444.html', u'type': u'cve', u'id': u'CVE-2012-4444', u'title': u'CVE-2012-4444'}, {u'href': u'http://linux.oracle.com/cve/CVE-2012-4565.html', u'type': u'cve', u'id': u'CVE-2012-4565', u'title': u'CVE-2012-4565'}], u'_content_type_id': u'erratum', u'_id': u'b59e573a-b2b9-4281-b080-a5a02f383817', u'from': u'el-errata@oss.oracle.com', u'severity': u'Moderate', u'title': u'Unbreakable Enterprise kernel security update', u'_ns': u'units_erratum', u'rights': u'Copyright 2012 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 6', u'reboot_suggested': False, u'type': u'security', u'pkglist': [{u'packages': [{u'src': None, u'name': u'kernel-uek', u'sum': [u'md5', u'd37148988e1f46a547ef49656b993372'], u'filename': u'kernel-uek-2.6.32-300.39.2.el6uek.src.rpm', u'epoch': u'0', u'version': u'2.6.32', u'release': u'300.39.2.el6uek', u'arch': u'src'}, {u'src': None, u'name': u'kernel-uek', u'sum': [u'md5', u'99c07bed04b202eb75dcf2c5d56c30d0'], u'filename': u'kernel-uek-2.6.32-300.39.2.el6uek.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.32', u'release': u'300.39.2.el6uek', u'arch': u'x86_64'}, {u'src': None, u'name': u'kernel-uek-debug', u'sum': [u'md5', u'3248d3ca1385c534ecd346cf6ddb8269'], u'filename': u'kernel-uek-debug-2.6.32-300.39.2.el6uek.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.32', u'release': u'300.39.2.el6uek', u'arch': u'x86_64'}, {u'src': None, u'name': u'kernel-uek-debug-devel', u'sum': [u'md5', u'4ee5bfcf286c90e258f3270edc6332b7'], u'filename': u'kernel-uek-debug-devel-2.6.32-300.39.2.el6uek.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.32', u'release': u'300.39.2.el6uek', u'arch': u'x86_64'}, {u'src': None, u'name': u'kernel-uek-devel', u'sum': [u'md5', u'3d8e5b1a97ece3dee3496bca2ea30fd4'], u'filename': u'kernel-uek-devel-2.6.32-300.39.2.el6uek.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.32', u'release': u'300.39.2.el6uek', u'arch': u'x86_64'}, {u'src': None, u'name': u'kernel-uek-doc', u'sum': [u'md5', u'590ac4ffaeaeff24dc7bf7ba133936c9'], u'filename': u'kernel-uek-doc-2.6.32-300.39.2.el6uek.noarch.rpm', u'epoch': u'0', u'version': u'2.6.32', u'release': u'300.39.2.el6uek', u'arch': u'noarch'}, {u'src': None, u'name': u'kernel-uek-firmware', u'sum': [u'md5', u'a61ee9c2baedac0aba032524e3775119'], u'filename': u'kernel-uek-firmware-2.6.32-300.39.2.el6uek.noarch.rpm', u'epoch': u'0', u'version': u'2.6.32', u'release': u'300.39.2.el6uek', u'arch': u'noarch'}, {u'src': None, u'name': u'kernel-uek-headers', u'sum': [u'md5', u'dc8a4738df5ad58e383cecb280050cd3'], u'filename': u'kernel-uek-headers-2.6.32-300.39.2.el6uek.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.32', u'release': u'300.39.2.el6uek', u'arch': u'x86_64'}, {u'src': None, u'name': u'mlnx_en-2.6.32-300.39.2.el6uek', u'sum': [u'md5', u'c07ef99bc50f5927afbeff62ba6bf9d0'], u'filename': u'mlnx_en-2.6.32-300.39.2.el6uek-1.5.7-0.1.src.rpm', u'epoch': u'0', u'version': u'1.5.7', u'release': u'0.1', u'arch': u'src'}, {u'src': None, u'name': u'mlnx_en-2.6.32-300.39.2.el6uek', u'sum': [u'md5', u'ea6c41f9703d8a60c6c063bb5a406cb7'], u'filename': u'mlnx_en-2.6.32-300.39.2.el6uek-1.5.7-0.1.x86_64.rpm', u'epoch': u'0', u'version': u'1.5.7', u'release': u'0.1', u'arch': u'x86_64'}, {u'src': None, u'name': u'mlnx_en-2.6.32-300.39.2.el6uekdebug', u'sum': [u'md5', u'f54ff9d9dcda9b875a693ff3a0e54655'], u'filename': u'mlnx_en-2.6.32-300.39.2.el6uekdebug-1.5.7-0.1.x86_64.rpm', u'epoch': u'0', u'version': u'1.5.7', u'release': u'0.1', u'arch': u'x86_64'}, {u'src': None, u'name': u'ofa-2.6.32-300.39.2.el6uek', u'sum': [u'md5', u'2e01b2beaf8d8ecc7babe0f2b12b5b26'], u'filename': u'ofa-2.6.32-300.39.2.el6uek-1.5.1-4.0.58.src.rpm', u'epoch': u'0', u'version': u'1.5.1', u'release': u'4.0.58', u'arch': u'src'}, {u'src': None, u'name': u'ofa-2.6.32-300.39.2.el6uek', u'sum': [u'md5', u'1383e5c5cfb7895dfa6db085e5d85150'], u'filename': u'ofa-2.6.32-300.39.2.el6uek-1.5.1-4.0.58.x86_64.rpm', u'epoch': u'0', u'version': u'1.5.1', u'release': u'4.0.58', u'arch': u'x86_64'}, {u'src': None, u'name': u'ofa-2.6.32-300.39.2.el6uekdebug', u'sum': [u'md5', u'da59bfcbf98a883b98e36fa35a77149a'], u'filename': u'ofa-2.6.32-300.39.2.el6uekdebug-1.5.1-4.0.58.x86_64.rpm', u'epoch': u'0', u'version': u'1.5.1', u'release': u'4.0.58', u'arch': u'x86_64'}], u'name': u'ol6_x86_64_latest', u'short': u'ol6_x86_64_latest'}, {u'packages': [{u'src': None, u'name': u'kernel-uek', u'sum': [u'md5', u'cafbce8ca17ffb45936e20622bb368d2'], u'filename': u'kernel-uek-2.6.32-300.39.2.el5uek.src.rpm', u'epoch': u'0', u'version': u'2.6.32', u'release': u'300.39.2.el5uek', u'arch': u'src'}, {u'src': None, u'name': u'kernel-uek', u'sum': [u'md5', u'1451d367a20331dfba3063fdeb0312f7'], u'filename': u'kernel-uek-2.6.32-300.39.2.el5uek.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.32', u'release': u'300.39.2.el5uek', u'arch': u'x86_64'}, {u'src': None, u'name': u'kernel-uek-debug', u'sum': [u'md5', u'66f292dea8bb4e1b1b64d7729826d615'], u'filename': u'kernel-uek-debug-2.6.32-300.39.2.el5uek.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.32', u'release': u'300.39.2.el5uek', u'arch': u'x86_64'}, {u'src': None, u'name': u'kernel-uek-debug-devel', u'sum': [u'md5', u'f17259c788d775a24efa40e450fa1d1a'], u'filename': u'kernel-uek-debug-devel-2.6.32-300.39.2.el5uek.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.32', u'release': u'300.39.2.el5uek', u'arch': u'x86_64'}, {u'src': None, u'name': u'kernel-uek-devel', u'sum': [u'md5', u'38c360acfaf1d20a2be0f53905a3442e'], u'filename': u'kernel-uek-devel-2.6.32-300.39.2.el5uek.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.32', u'release': u'300.39.2.el5uek', u'arch': u'x86_64'}, {u'src': None, u'name': u'kernel-uek-doc', u'sum': [u'md5', u'd810215438910be78c4290df5b324171'], u'filename': u'kernel-uek-doc-2.6.32-300.39.2.el5uek.noarch.rpm', u'epoch': u'0', u'version': u'2.6.32', u'release': u'300.39.2.el5uek', u'arch': u'noarch'}, {u'src': None, u'name': u'kernel-uek-firmware', u'sum': [u'md5', u'4274adfb48aa5a60f86c8d3c3f40d406'], u'filename': u'kernel-uek-firmware-2.6.32-300.39.2.el5uek.noarch.rpm', u'epoch': u'0', u'version': u'2.6.32', u'release': u'300.39.2.el5uek', u'arch': u'noarch'}, {u'src': None, u'name': u'mlnx_en-2.6.32-300.39.2.el5uek', u'sum': [u'md5', u'a93932fbe8ef4937f1352314d017d807'], u'filename': u'mlnx_en-2.6.32-300.39.2.el5uek-1.5.7-2.src.rpm', u'epoch': u'0', u'version': u'1.5.7', u'release': u'2', u'arch': u'src'}, {u'src': None, u'name': u'mlnx_en-2.6.32-300.39.2.el5uek', u'sum': [u'md5', u'fe96bd32dac882c283bebdcc8453b7b7'], u'filename': u'mlnx_en-2.6.32-300.39.2.el5uek-1.5.7-2.x86_64.rpm', u'epoch': u'0', u'version': u'1.5.7', u'release': u'2', u'arch': u'x86_64'}, {u'src': None, u'name': u'mlnx_en-2.6.32-300.39.2.el5uekdebug', u'sum': [u'md5', u'480e9d3a93a0fcfc4b9aca7ef4f75308'], u'filename': u'mlnx_en-2.6.32-300.39.2.el5uekdebug-1.5.7-2.x86_64.rpm', u'epoch': u'0', u'version': u'1.5.7', u'release': u'2', u'arch': u'x86_64'}, {u'src': None, u'name': u'ofa-2.6.32-300.39.2.el5uek', u'sum': [u'md5', u'7ee2926f6ea4e741f0fb996667121b8a'], u'filename': u'ofa-2.6.32-300.39.2.el5uek-1.5.1-4.0.58.src.rpm', u'epoch': u'0', u'version': u'1.5.1', u'release': u'4.0.58', u'arch': u'src'}, {u'src': None, u'name': u'ofa-2.6.32-300.39.2.el5uek', u'sum': [u'md5', u'd7e6a98113d131734f277573aec47ab8'], u'filename': u'ofa-2.6.32-300.39.2.el5uek-1.5.1-4.0.58.x86_64.rpm', u'epoch': u'0', u'version': u'1.5.1', u'release': u'4.0.58', u'arch': u'x86_64'}, {u'src': None, u'name': u'ofa-2.6.32-300.39.2.el5uekdebug', u'sum': [u'md5', u'1eb25b15855e215089c3ae1350053ee4'], u'filename': u'ofa-2.6.32-300.39.2.el5uekdebug-1.5.1-4.0.58.x86_64.rpm', u'epoch': u'0', u'version': u'1.5.1', u'release': u'4.0.58', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u'[1:3.13-8.0.1]\n- Add ocfs2 support (Orabug: 14208111)\n\n[1:3.13-8]\n- Fix CVE-2012-3417 (incorrect use of tcp_wrappers) (Resolves: #841448)\n\n[1:3.13-7]\n- Fix parsing numeric arguments of setquota (Resolves: #831520)\n\n[1:3.13-6]\n- Do not use real domains in warnquota example (Resolves: #680429)\n- Use /proc/mounts for mountpoint scanning (Resolves: #689822)\n- Use rq_bsize to convert quotas transferred by RPC (bug #667360)\n- Make RPC block factor dynamic (bug #667360)', u'issued': u'2013-01-11', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELSA-2013-0120.html', u'type': u'self', u'id': None, u'title': u'ELSA-2013-0120'}, {u'href': u'http://linux.oracle.com/cve/CVE-2012-3417.html', u'type': u'cve', u'id': u'CVE-2012-3417', u'title': u'CVE-2012-3417'}], u'_content_type_id': u'erratum', u'_id': u'38cfcaad-1f8a-4f41-ae5d-77ba97897d4e', u'from': u'el-errata@oss.oracle.com', u'severity': u'Low', u'title': u' quota security and bug fix update', u'_ns': u'units_erratum', u'rights': u'Copyright 2013 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 5', u'reboot_suggested': False, u'type': u'security', u'pkglist': [{u'packages': [{u'src': None, u'name': u'quota', u'sum': [u'md5', u'1ec4d91012925c0d73d2e1fe62ddae72'], u'filename': u'quota-3.13-8.0.1.el5.src.rpm', u'epoch': u'1', u'version': u'3.13', u'release': u'8.0.1.el5', u'arch': u'src'}, {u'src': None, u'name': u'quota', u'sum': [u'md5', u'2c548e3aaceb39e036dfa85a9f29f352'], u'filename': u'quota-3.13-8.0.1.el5.x86_64.rpm', u'epoch': u'1', u'version': u'3.13', u'release': u'8.0.1.el5', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u'[5.0.95-3]\n- Re-add patch for CVE-2009-4030, mistakenly removed in 5.0.95 rebase\nResolves: CVE-2012-4452\n\n[5.0.95-2]\n- Support rotation of mysqld log (though this is not enabled by default)\nResolves: #647223\n- Fix crash with EXPLAIN and prepared statements\nResolves: #654000\n- Adopt init script updates from the last Fedora init script (F-15)\nResolves: #703476', u'issued': u'2013-01-11', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELSA-2013-0121.html', u'type': u'self', u'id': None, u'title': u'ELSA-2013-0121'}, {u'href': u'http://linux.oracle.com/cve/CVE-2012-4452.html', u'type': u'cve', u'id': u'CVE-2012-4452', u'title': u'CVE-2012-4452'}], u'_content_type_id': u'erratum', u'_id': u'aec5abff-3e80-45af-81ac-89f8346c261a', u'from': u'el-errata@oss.oracle.com', u'severity': u'Low', u'title': u' mysql security and bug fix update', u'_ns': u'units_erratum', u'rights': u'Copyright 2013 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 5', u'reboot_suggested': False, u'type': u'security', u'pkglist': [{u'packages': [{u'src': None, u'name': u'mysql', u'sum': [u'md5', u'5aedfd230ae0b660587baa65e7e082f9'], u'filename': u'mysql-5.0.95-3.el5.i386.rpm', u'epoch': u'0', u'version': u'5.0.95', u'release': u'3.el5', u'arch': u'i386'}, {u'src': None, u'name': u'mysql', u'sum': [u'md5', u'd7d72c28ea3b62e1ee9f94267341cfb8'], u'filename': u'mysql-5.0.95-3.el5.src.rpm', u'epoch': u'0', u'version': u'5.0.95', u'release': u'3.el5', u'arch': u'src'}, {u'src': None, u'name': u'mysql', u'sum': [u'md5', u'5c8c085215759f60f313ac96d090ba2d'], u'filename': u'mysql-5.0.95-3.el5.x86_64.rpm', u'epoch': u'0', u'version': u'5.0.95', u'release': u'3.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'mysql-bench', u'sum': [u'md5', u'aaa5248f203c993af44c0ca3305bbb20'], u'filename': u'mysql-bench-5.0.95-3.el5.x86_64.rpm', u'epoch': u'0', u'version': u'5.0.95', u'release': u'3.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'mysql-devel', u'sum': [u'md5', u'da2f72ccebac34be659944b6309ce9b0'], u'filename': u'mysql-devel-5.0.95-3.el5.i386.rpm', u'epoch': u'0', u'version': u'5.0.95', u'release': u'3.el5', u'arch': u'i386'}, {u'src': None, u'name': u'mysql-devel', u'sum': [u'md5', u'3264c7cf4728a1b39db2d65ff324b957'], u'filename': u'mysql-devel-5.0.95-3.el5.x86_64.rpm', u'epoch': u'0', u'version': u'5.0.95', u'release': u'3.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'mysql-server', u'sum': [u'md5', u'3bef67e6b7236d547ee55be8f73e45e8'], u'filename': u'mysql-server-5.0.95-3.el5.x86_64.rpm', u'epoch': u'0', u'version': u'5.0.95', u'release': u'3.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'mysql-test', u'sum': [u'md5', u'031b3a48e0253ad2ca22e08283945074'], u'filename': u'mysql-test-5.0.95-3.el5.x86_64.rpm', u'epoch': u'0', u'version': u'5.0.95', u'release': u'3.el5', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u'[8.4.13-6]\n- Fixed infinite loop in regex NFA optimization code\n Resolves: CVE-2007-4772\n- Fixed O(N^2) compile time (and huge memory requirements) for some regexps\n Resolves: CVE-2007-6067\n\n[8.4.13-5]\n- Threaded / nonthreaded versions of tcl are now switchable through alternatives\n Resolves: rhbz#478961', u'issued': u'2013-01-11', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELSA-2013-0122.html', u'type': u'self', u'id': None, u'title': u'ELSA-2013-0122'}, {u'href': u'http://linux.oracle.com/cve/CVE-2007-4772.html', u'type': u'cve', u'id': u'CVE-2007-4772', u'title': u'CVE-2007-4772'}, {u'href': u'http://linux.oracle.com/cve/CVE-2007-6067.html', u'type': u'cve', u'id': u'CVE-2007-6067', u'title': u'CVE-2007-6067'}], u'_content_type_id': u'erratum', u'_id': u'65c00dd6-674e-4132-93db-7187cfa5553c', u'from': u'el-errata@oss.oracle.com', u'severity': u'Moderate', u'title': u' tcl security and bug fix update', u'_ns': u'units_erratum', u'rights': u'Copyright 2013 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 5', u'reboot_suggested': False, u'type': u'security', u'pkglist': [{u'packages': [{u'src': None, u'name': u'tcl', u'sum': [u'md5', u'30535cb092fbce259c09742773358f95'], u'filename': u'tcl-8.4.13-6.el5.i386.rpm', u'epoch': u'0', u'version': u'8.4.13', u'release': u'6.el5', u'arch': u'i386'}, {u'src': None, u'name': u'tcl', u'sum': [u'md5', u'b32c01ca93c20815d8d961b550655b55'], u'filename': u'tcl-8.4.13-6.el5.src.rpm', u'epoch': u'0', u'version': u'8.4.13', u'release': u'6.el5', u'arch': u'src'}, {u'src': None, u'name': u'tcl', u'sum': [u'md5', u'a19eba8920459d98fa4724c776079337'], u'filename': u'tcl-8.4.13-6.el5.x86_64.rpm', u'epoch': u'0', u'version': u'8.4.13', u'release': u'6.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'tcl-devel', u'sum': [u'md5', u'415747d07a16a475113eeb9870cfee0d'], u'filename': u'tcl-devel-8.4.13-6.el5.i386.rpm', u'epoch': u'0', u'version': u'8.4.13', u'release': u'6.el5', u'arch': u'i386'}, {u'src': None, u'name': u'tcl-devel', u'sum': [u'md5', u'a4e266804a76cd6fbaea4895af61a6e9'], u'filename': u'tcl-devel-8.4.13-6.el5.x86_64.rpm', u'epoch': u'0', u'version': u'8.4.13', u'release': u'6.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'tcl-html', u'sum': [u'md5', u'a7f8efd9bb0bf43f650e25fcd807e42f'], u'filename': u'tcl-html-8.4.13-6.el5.x86_64.rpm', u'epoch': u'0', u'version': u'8.4.13', u'release': u'6.el5', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u"[2.0.16-16.el5]\n- ipmitool: fix ipmi command retry shifts replies (#863310)\n\n[2.0.16-15.el5]\n- ipmitool: added -b, -B, -l and -T options to ipmitool man page\n (#846596)\n- ipmitool: fixed man page documentation for delloem setled command\n (#797050)\n\n[2.0.16-14.el5]\n- ipmitool: fixed wrong permissions on ipmievd.pid (#834190)\n\n[2.0.16-13.el5]\n- ipmitool: updated delloem commands (#797050)\n- ipmitool: fixed exit code of 'ipmitool -o list' command (#740780)\n- ipmitool: disabled automatic bridging of SDR readings to IPMB\n in verbose mode (#749796)\n- ipmitool: fixed reporting of usage of various delloem subcommands\n (#658762)\n- added path to /sbin to lsmod and modprobe (#829705)", u'issued': u'2013-01-11', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELSA-2013-0123.html', u'type': u'self', u'id': None, u'title': u'ELSA-2013-0123'}, {u'href': u'http://linux.oracle.com/cve/CVE-2011-4339.html', u'type': u'cve', u'id': u'CVE-2011-4339', u'title': u'CVE-2011-4339'}], u'_content_type_id': u'erratum', u'_id': u'80633c77-2632-426a-a769-24c51cbd25cf', u'from': u'el-errata@oss.oracle.com', u'severity': u'Low', u'title': u' OpenIPMI security, bug fix, and enhancement update', u'_ns': u'units_erratum', u'rights': u'Copyright 2013 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 5', u'reboot_suggested': False, u'type': u'security', u'pkglist': [{u'packages': [{u'src': None, u'name': u'OpenIPMI', u'sum': [u'md5', u'7fc9da3a50b715b2ad0dfa360a78ab2c'], u'filename': u'OpenIPMI-2.0.16-16.el5.src.rpm', u'epoch': u'0', u'version': u'2.0.16', u'release': u'16.el5', u'arch': u'src'}, {u'src': None, u'name': u'OpenIPMI', u'sum': [u'md5', u'7c987e01ad9df23b588fca9f75c5b698'], u'filename': u'OpenIPMI-2.0.16-16.el5.x86_64.rpm', u'epoch': u'0', u'version': u'2.0.16', u'release': u'16.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'OpenIPMI-devel', u'sum': [u'md5', u'7a1ef45efee15095fc5fb7ce1487bc31'], u'filename': u'OpenIPMI-devel-2.0.16-16.el5.i386.rpm', u'epoch': u'0', u'version': u'2.0.16', u'release': u'16.el5', u'arch': u'i386'}, {u'src': None, u'name': u'OpenIPMI-devel', u'sum': [u'md5', u'018985eb24a6ade63be35a385709c930'], u'filename': u'OpenIPMI-devel-2.0.16-16.el5.x86_64.rpm', u'epoch': u'0', u'version': u'2.0.16', u'release': u'16.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'OpenIPMI-gui', u'sum': [u'md5', u'8d5ede760743516c5a72793ae7e7777d'], u'filename': u'OpenIPMI-gui-2.0.16-16.el5.x86_64.rpm', u'epoch': u'0', u'version': u'2.0.16', u'release': u'16.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'OpenIPMI-libs', u'sum': [u'md5', u'48a7343eafb53d8ba43c1ea59d815376'], u'filename': u'OpenIPMI-libs-2.0.16-16.el5.i386.rpm', u'epoch': u'0', u'version': u'2.0.16', u'release': u'16.el5', u'arch': u'i386'}, {u'src': None, u'name': u'OpenIPMI-libs', u'sum': [u'md5', u'9c5fbfe63228bb5716368c2561f5e74a'], u'filename': u'OpenIPMI-libs-2.0.16-16.el5.x86_64.rpm', u'epoch': u'0', u'version': u'2.0.16', u'release': u'16.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'OpenIPMI-perl', u'sum': [u'md5', u'5a85d7f3cd5144dc1d7af06d36be694b'], u'filename': u'OpenIPMI-perl-2.0.16-16.el5.x86_64.rpm', u'epoch': u'0', u'version': u'2.0.16', u'release': u'16.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'OpenIPMI-python', u'sum': [u'md5', u'9dfd870e7bd73f2d8a4839d1f474c43d'], u'filename': u'OpenIPMI-python-2.0.16-16.el5.x86_64.rpm', u'epoch': u'0', u'version': u'2.0.16', u'release': u'16.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'OpenIPMI-tools', u'sum': [u'md5', u'3dadfb08fc6ed8110dc48244c27c0b61'], u'filename': u'OpenIPMI-tools-2.0.16-16.el5.x86_64.rpm', u'epoch': u'0', u'version': u'2.0.16', u'release': u'16.el5', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u"[5.3.2.2-20.0.2.el5]\n- snmptrapd: Fix crash due to access of freed memory (John Haxby) [orabug 14391194]\n\n[5.3.2.2-20.0.1.el5]\n- suppress spurious asserts on 32bit [Greg Marsden]\n\n[5.3.2.2-20]\n- fixed error message when the address specified by clientaddr option\n is wrong or cannot be bound (#840861)\n\n[5.3.2.2-19]\n- fixed support for port numbers in 'clientaddr' configuration option\n (#840861, #845974)\n- added support of cvfs filesystem hrStorageTable (#846391)\n- removed various error log messages when IPv6 is disabled (#845155)\n- removed various error log messages related to counte64 expansions\n (#846905)\n\n[5.3.2.2-18]\n- added support of ocfs2, tmpfs and reiserfs in hrStorageTable\n (#754652, #755958, #822061)\n- updated documentation of '-c' option of snmptrapd (#760001)\n- fixed endless loop after truncating 64bit int (#783892)\n- fixed snmpd exiting shortly after startup due to incoming signal (#799699)\n- fixed decoding of COUNTER64 values from AgentX (#803585)\n- fixed engineID of outgoing traps if 'trapsess -e <engineID>' is used in\n snmpd.conf (#805689)\n- fixed CVE-2012-2141, an array index error in the extension table (#815813)\n- fixed snmpd showing 'failed to run mteTrigger query' when 'monitor'\n config option is used (#830042)\n- added support for port numbers in 'clientaddr' configuration option\n (#828691)", u'issued': u'2013-01-11', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELSA-2013-0124.html', u'type': u'self', u'id': None, u'title': u'ELSA-2013-0124'}, {u'href': u'http://linux.oracle.com/cve/CVE-2012-2141.html', u'type': u'cve', u'id': u'CVE-2012-2141', u'title': u'CVE-2012-2141'}], u'_content_type_id': u'erratum', u'_id': u'ff7638fd-53ff-468e-afb3-467197865027', u'from': u'el-errata@oss.oracle.com', u'severity': u'Moderate', u'title': u' net-snmp security and bug fix update', u'_ns': u'units_erratum', u'rights': u'Copyright 2013 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 5', u'reboot_suggested': False, u'type': u'security', u'pkglist': [{u'packages': [{u'src': None, u'name': u'net-snmp', u'sum': [u'md5', u'd988c99de596a15ce53bfd6277abf2b7'], u'filename': u'net-snmp-5.3.2.2-20.0.2.el5.src.rpm', u'epoch': u'1', u'version': u'5.3.2.2', u'release': u'20.0.2.el5', u'arch': u'src'}, {u'src': None, u'name': u'net-snmp', u'sum': [u'md5', u'87899933f7d22001416bf62186fcd5a7'], u'filename': u'net-snmp-5.3.2.2-20.0.2.el5.x86_64.rpm', u'epoch': u'1', u'version': u'5.3.2.2', u'release': u'20.0.2.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'net-snmp-devel', u'sum': [u'md5', u'051b04d8e2a1cb2147cdc71814d98470'], u'filename': u'net-snmp-devel-5.3.2.2-20.0.2.el5.i386.rpm', u'epoch': u'1', u'version': u'5.3.2.2', u'release': u'20.0.2.el5', u'arch': u'i386'}, {u'src': None, u'name': u'net-snmp-devel', u'sum': [u'md5', u'd67219eb6d5baa92a8221e9829df3902'], u'filename': u'net-snmp-devel-5.3.2.2-20.0.2.el5.x86_64.rpm', u'epoch': u'1', u'version': u'5.3.2.2', u'release': u'20.0.2.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'net-snmp-libs', u'sum': [u'md5', u'4f79054f4a12727fdc0fdb2cf1efefe9'], u'filename': u'net-snmp-libs-5.3.2.2-20.0.2.el5.i386.rpm', u'epoch': u'1', u'version': u'5.3.2.2', u'release': u'20.0.2.el5', u'arch': u'i386'}, {u'src': None, u'name': u'net-snmp-libs', u'sum': [u'md5', u'8d1f3a5a2871cfc08de3111ca095003f'], u'filename': u'net-snmp-libs-5.3.2.2-20.0.2.el5.x86_64.rpm', u'epoch': u'1', u'version': u'5.3.2.2', u'release': u'20.0.2.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'net-snmp-perl', u'sum': [u'md5', u'b12515081540ef19d9ec05ca18c71c62'], u'filename': u'net-snmp-perl-5.3.2.2-20.0.2.el5.x86_64.rpm', u'epoch': u'1', u'version': u'5.3.2.2', u'release': u'20.0.2.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'net-snmp-utils', u'sum': [u'md5', u'6ee7ef3a55b74319aa6a3dc3a4282d17'], u'filename': u'net-snmp-utils-5.3.2.2-20.0.2.el5.x86_64.rpm', u'epoch': u'1', u'version': u'5.3.2.2', u'release': u'20.0.2.el5', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u'[1.0.15-5.0.1.el5]\n- Added oracle-ocfs2-network.patch\n- increase max packet size to 65536 (Herbert van den Bergh) [orabug 13542633]\n\n[1.0.15-5]\n- fixed CVE-2012-4285, CVE-2012-4289, CVE-2012-4291 and CVE-2012-4290\n (#849521)\n\n[1.0.15-4]\n- fixed NetDump dissector (#484999)\n\n[1.0.15-3]\n- fixed various flaws: CVE-2011-1959 CVE-2011-2175 CVE-2011-1958\n CVE-2011-2698 CVE-2011-4102 CVE-2012-0041 CVE-2012-0042 CVE-2012-0066\n CVE-2012-0067\n\n[1.0.15-2]\n- fixed tshark -s option (#580513)\n- fixed tshark exit code when dumpcap fails (#580510)\n- fixed editing of columns in Wireshark preferences (#493693)\n- added netdump protocol dissector (#484999)\n- fixed tshark / Wireshark automatic filter when started in ssh connection\n over IPv6 (#438473)', u'issued': u'2013-01-11', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELSA-2013-0125.html', u'type': u'self', u'id': None, u'title': u'ELSA-2013-0125'}, {u'href': u'http://linux.oracle.com/cve/CVE-2011-1958.html', u'type': u'cve', u'id': u'CVE-2011-1958', u'title': u'CVE-2011-1958'}, {u'href': u'http://linux.oracle.com/cve/CVE-2011-1959.html', u'type': u'cve', u'id': u'CVE-2011-1959', u'title': u'CVE-2011-1959'}, {u'href': u'http://linux.oracle.com/cve/CVE-2011-2175.html', u'type': u'cve', u'id': u'CVE-2011-2175', u'title': u'CVE-2011-2175'}, {u'href': u'http://linux.oracle.com/cve/CVE-2011-2698.html', u'type': u'cve', u'id': u'CVE-2011-2698', u'title': u'CVE-2011-2698'}, {u'href': u'http://linux.oracle.com/cve/CVE-2011-4102.html', u'type': u'cve', u'id': u'CVE-2011-4102', u'title': u'CVE-2011-4102'}, {u'href': u'http://linux.oracle.com/cve/CVE-2012-0041.html', u'type': u'cve', u'id': u'CVE-2012-0041', u'title': u'CVE-2012-0041'}, {u'href': u'http://linux.oracle.com/cve/CVE-2012-0042.html', u'type': u'cve', u'id': u'CVE-2012-0042', u'title': u'CVE-2012-0042'}, {u'href': u'http://linux.oracle.com/cve/CVE-2012-0066.html', u'type': u'cve', u'id': u'CVE-2012-0066', u'title': u'CVE-2012-0066'}, {u'href': u'http://linux.oracle.com/cve/CVE-2012-0067.html', u'type': u'cve', u'id': u'CVE-2012-0067', u'title': u'CVE-2012-0067'}, {u'href': u'http://linux.oracle.com/cve/CVE-2012-4285.html', u'type': u'cve', u'id': u'CVE-2012-4285', u'title': u'CVE-2012-4285'}, {u'href': u'http://linux.oracle.com/cve/CVE-2012-4289.html', u'type': u'cve', u'id': u'CVE-2012-4289', u'title': u'CVE-2012-4289'}, {u'href': u'http://linux.oracle.com/cve/CVE-2012-4290.html', u'type': u'cve', u'id': u'CVE-2012-4290', u'title': u'CVE-2012-4290'}, {u'href': u'http://linux.oracle.com/cve/CVE-2012-4291.html', u'type': u'cve', u'id': u'CVE-2012-4291', u'title': u'CVE-2012-4291'}], u'_content_type_id': u'erratum', u'_id': u'06a4db38-d4c5-4378-997a-ad62cdd2abaa', u'from': u'el-errata@oss.oracle.com', u'severity': u'Moderate', u'title': u' wireshark security, bug fix, and enhancement update', u'_ns': u'units_erratum', u'rights': u'Copyright 2013 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 5', u'reboot_suggested': False, u'type': u'security', u'pkglist': [{u'packages': [{u'src': None, u'name': u'wireshark', u'sum': [u'md5', u'b119799ffc6bddb46b5547937dc610c9'], u'filename': u'wireshark-1.0.15-5.0.1.el5.src.rpm', u'epoch': u'0', u'version': u'1.0.15', u'release': u'5.0.1.el5', u'arch': u'src'}, {u'src': None, u'name': u'wireshark', u'sum': [u'md5', u'7d629aa50a0bc78ebc41a630cca842fc'], u'filename': u'wireshark-1.0.15-5.0.1.el5.x86_64.rpm', u'epoch': u'0', u'version': u'1.0.15', u'release': u'5.0.1.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'wireshark-gnome', u'sum': [u'md5', u'ed56f4e08d5b96e984fd64be2838719d'], u'filename': u'wireshark-gnome-1.0.15-5.0.1.el5.x86_64.rpm', u'epoch': u'0', u'version': u'1.0.15', u'release': u'5.0.1.el5', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u'[1.4.8-21.0.2.el5]\n- remove Redhat splash screen images from source\n\n[1.4.8-21.0.1.el5]\n- remove Redhat splash screen images\n- add README instead of README.RedHat\n\n[1.4.8-21]\n- change charset for zh_CN and zh_TW to utf-8 (#508686)\n\n[1.4.8-20]\n- fix header encoding issue (#241861)\n- fix code producing warnings in the log (#475188)\n\n[1.4.8-19]\n- patch for CVE-2010-2813 modified wrong file (#808598)\n- correct requirement is mod_php not php (#789353)\n- comply with RFC2822 line length limits (#745469)\n- document that SELinux boolean httpd_can_sendmail needs to be\n turned on (#745380)\n- add support for big UIDs on 32bit machines (#450780)\n- do not corrupt html attachments (#359791)', u'issued': u'2013-01-11', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELSA-2013-0126.html', u'type': u'self', u'id': None, u'title': u'ELSA-2013-0126'}, {u'href': u'http://linux.oracle.com/cve/CVE-2012-2124.html', u'type': u'cve', u'id': u'CVE-2012-2124', u'title': u'CVE-2012-2124'}], u'_content_type_id': u'erratum', u'_id': u'b3db90af-7e0d-4aa6-8764-9aa4babb61bb', u'from': u'el-errata@oss.oracle.com', u'severity': u'Low', u'title': u' squirrelmail security and bug fix update', u'_ns': u'units_erratum', u'rights': u'Copyright 2013 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 5', u'reboot_suggested': False, u'type': u'security', u'pkglist': [{u'packages': [{u'src': None, u'name': u'squirrelmail', u'sum': [u'md5', u'1f562b394e27cfc30b0fb963ecbf29cd'], u'filename': u'squirrelmail-1.4.8-21.0.2.el5.noarch.rpm', u'epoch': u'0', u'version': u'1.4.8', u'release': u'21.0.2.el5', u'arch': u'noarch'}, {u'src': None, u'name': u'squirrelmail', u'sum': [u'md5', u'678ccfe57469a9cc45d8565a69895286'], u'filename': u'squirrelmail-1.4.8-21.0.2.el5.src.rpm', u'epoch': u'0', u'version': u'1.4.8', u'release': u'21.0.2.el5', u'arch': u'src'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u"[0.8.2-29.0.1.el5]\n- Replaced docs/et.png in tarball\n- remove virshtest from test cases to fix failure in mock build root\n\n[libvirt-0.8.2-29.el5]\n- Coverity pointed out an use after free in the fix for 816601 (rhbz#772848)\n\n[libvirt-0.8.2-28.el5]\n- qemu: Rollback on used USB devices (rhbz#816601)\n- qemu: Don't delete USB device on failed qemuPrepareHostdevUSBDevices (rhbz#816601)\n\n[libvirt-0.8.2-27.el5]\n- qemu: Delete USB devices used by domain on stop (rhbz#816601)\n\n[libvirt-0.8.2-26.el5]\n- Fix off-by-1 in virFileAbsPath. (rhbz#680289)\n- Fix autostart flag when loading running domains (rhbz#675319)\n- node_device: Avoid null dereference on error (rhbz#772848)\n- util: Avoid null deref on qcowXGetBackingStore (rhbz#772848)\n- docs: Improve virsh domxml-*-native command docs (rhbz#783001)\n- Clarify the purpose of domxml-from-native (rhbz#783001)\n- qemu: Add return value check (rhbz#772821)\n- storage: Avoid mishandling backing store > 2GB (rhbz#772821)\n- util: Avoid PATH_MAX-sized array (rhbz#816601)\n- qemu: Keep list of USB devices attached to domains (rhbz#816601)\n- qemu: Don't leak temporary list of USB devices (rhbz#816601)\n- usb: Create functions to search usb device accurately (rhbz#816601)\n- qemu: Call usb search function for hostdev initialization and hotplug (rhbz#816601)\n- usb: Fix crash when failing to attach a second usb device (rhbz#816601)", u'issued': u'2013-01-11', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELSA-2013-0127.html', u'type': u'self', u'id': None, u'title': u'ELSA-2013-0127'}, {u'href': u'http://linux.oracle.com/cve/CVE-2012-2693.html', u'type': u'cve', u'id': u'CVE-2012-2693', u'title': u'CVE-2012-2693'}], u'_content_type_id': u'erratum', u'_id': u'763bdeab-925c-4e81-8927-5da0fac4dc13', u'from': u'el-errata@oss.oracle.com', u'severity': u'Low', u'title': u' libvirt security and bug fix update', u'_ns': u'units_erratum', u'rights': u'Copyright 2013 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 5', u'reboot_suggested': False, u'type': u'security', u'pkglist': [{u'packages': [{u'src': None, u'name': u'libvirt', u'sum': [u'md5', u'930db7bc016e7fc07d95f6b652ab48f2'], u'filename': u'libvirt-0.8.2-29.0.1.el5.i386.rpm', u'epoch': u'0', u'version': u'0.8.2', u'release': u'29.0.1.el5', u'arch': u'i386'}, {u'src': None, u'name': u'libvirt', u'sum': [u'md5', u'bd8f564fa00954de852781ea3e4d2815'], u'filename': u'libvirt-0.8.2-29.0.1.el5.src.rpm', u'epoch': u'0', u'version': u'0.8.2', u'release': u'29.0.1.el5', u'arch': u'src'}, {u'src': None, u'name': u'libvirt', u'sum': [u'md5', u'6f1404c87863f252c83cca6cfd20e0bd'], u'filename': u'libvirt-0.8.2-29.0.1.el5.x86_64.rpm', u'epoch': u'0', u'version': u'0.8.2', u'release': u'29.0.1.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'libvirt-devel', u'sum': [u'md5', u'94881484c617d19a02de6f86a72ed5d2'], u'filename': u'libvirt-devel-0.8.2-29.0.1.el5.i386.rpm', u'epoch': u'0', u'version': u'0.8.2', u'release': u'29.0.1.el5', u'arch': u'i386'}, {u'src': None, u'name': u'libvirt-devel', u'sum': [u'md5', u'314c7f30222bbe88def42952150169be'], u'filename': u'libvirt-devel-0.8.2-29.0.1.el5.x86_64.rpm', u'epoch': u'0', u'version': u'0.8.2', u'release': u'29.0.1.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'libvirt-python', u'sum': [u'md5', u'2fc02f0414e61b21e88f9fd7cda3a4f1'], u'filename': u'libvirt-python-0.8.2-29.0.1.el5.x86_64.rpm', u'epoch': u'0', u'version': u'0.8.2', u'release': u'29.0.1.el5', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u"[0.12.2-64.0.2.el5]\n- Remove conga-enterprise.patch\n\n[0.12.2-64.0.1.el5]\n- Added conga-enterprise.patch\n- Added conga-enterprise-Carthage.patch to support OEL5\n- Replaced redhat logo image in conga-0.12.2.tar.gz and Data.fs\n\n[0.12.2-64]\n- Improvements for bz786372 (Better protect luci's authentication cookie)\n- Improvements for bz607179 (Improper handling of session timeouts)\n\n[0.12.2-60]\n- Improvements for bz832185 (Luci cannot configure the 'identity_file' attribute for fence_ilo_mp)\n- Improvements for bz822633 (Add luci support for nfsrestart)\n\n[0.12.2-59]\n- Fix bz835649 (luci uninstall will leave /var/lib/luci/var/pts and /usr/lib*/luci/zope/var/pts behind)\n\n[0.12.2-58]\n- Fix bz832183 (Luci is missing configuration of ssl for fence_ilo)\n\n[0.12.2-57]\n- Fix bz835649 (luci uninstall will leave /var/lib/luci/var/pts and /usr/lib*/luci/zope/var/pts behind)\n\n[0.12.2-56]\n- Fix bz842865 (Conga unable to find/install packages due to line breaks in yum output)\n\n[0.12.2-55]\n- Add support for IBM iPDU fencing configuration (Resolves bz741986)\n\n[0.12.2-54]\n- Fix bz839732 (Conga Add a Service Screen is Missing Option for Restart-Disable Recovery Policy)\n\n[0.12.2-53]\n- Fix bz786372 (Better protect luci's authentication cookie)\n- Fix bz607179 (Improper handling of session timeouts)\n\n[0.12.2-52]\n- Fix bz822633 (Add luci support for nfsrestart)\n- Fix bz832181 (fence_apc_snmp is missing from luci)\n- Fix bz832183 (Luci is missing configuration of ssl for fence_ilo)\n- Fix bz832185 (Luci cannot configure the 'identity_file' attribute for fence_ilo_mp)", u'issued': u'2013-01-11', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELSA-2013-0128.html', u'type': u'self', u'id': None, u'title': u'ELSA-2013-0128'}, {u'href': u'http://linux.oracle.com/cve/CVE-2012-3359.html', u'type': u'cve', u'id': u'CVE-2012-3359', u'title': u'CVE-2012-3359'}], u'_content_type_id': u'erratum', u'_id': u'dba3a49e-ecc0-4dcc-b76a-5592c4c1bdf9', u'from': u'el-errata@oss.oracle.com', u'severity': u'Low', u'title': u' conga security, bug fix, and enhancement update', u'_ns': u'units_erratum', u'rights': u'Copyright 2013 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 5', u'reboot_suggested': False, u'type': u'security', u'pkglist': [{u'packages': [{u'src': None, u'name': u'conga', u'sum': [u'md5', u'770fd4c94ad438ff2efaa1b4820eaff7'], u'filename': u'conga-0.12.2-64.0.2.el5.src.rpm', u'epoch': u'0', u'version': u'0.12.2', u'release': u'64.0.2.el5', u'arch': u'src'}, {u'src': None, u'name': u'luci', u'sum': [u'md5', u'8a5ab95b157ec96e9b48869395b2a204'], u'filename': u'luci-0.12.2-64.0.2.el5.x86_64.rpm', u'epoch': u'0', u'version': u'0.12.2', u'release': u'64.0.2.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'ricci', u'sum': [u'md5', u'b751b494553d8bb086ba7bc2d0985cca'], u'filename': u'ricci-0.12.2-64.0.2.el5.x86_64.rpm', u'epoch': u'0', u'version': u'0.12.2', u'release': u'64.0.2.el5', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u'[1.8.5-27]\n- unintentional file creation caused by inserting an illegal NUL character\n * ruby-1.8.6-CVE-2012-4522-io.c-pipe_open-command-name-should-not-contain-null-.patch\n - Related: rhbz#867750\n\n[1.8.5-26]\n- escaping vulnerability about Exception#to_s / NameError#to_s\n * ruby-1.8.7-p371-CVE-2012-4481.patch\n - Resolves: rhbz#867750\n- unintentional file creation caused by inserting an illegal NUL character\n * ruby-1.8.6-CVE-2012-4522-io.c-rb_open_file-should-check-NUL-in-path.patch\n - Resolves: rhbz#867750\n\n[1.8.5-25]\n- Resolve buffer overflow causing gem installation issues.\n * ruby-1.8.7-syck-avoid-buffer-overflow.patch\n - Resolves: rhbz#834381', u'issued': u'2013-01-11', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELSA-2013-0129.html', u'type': u'self', u'id': None, u'title': u'ELSA-2013-0129'}, {u'href': u'http://linux.oracle.com/cve/CVE-2012-4481.html', u'type': u'cve', u'id': u'CVE-2012-4481', u'title': u'CVE-2012-4481'}, {u'href': u'http://linux.oracle.com/cve/CVE-2012-4522.html', u'type': u'cve', u'id': u'CVE-2012-4522', u'title': u'CVE-2012-4522'}], u'_content_type_id': u'erratum', u'_id': u'de8a7276-3412-4308-9c0c-5771cad87cf1', u'from': u'el-errata@oss.oracle.com', u'severity': u'Moderate', u'title': u' ruby security and bug fix update', u'_ns': u'units_erratum', u'rights': u'Copyright 2013 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 5', u'reboot_suggested': False, u'type': u'security', u'pkglist': [{u'packages': [{u'src': None, u'name': u'ruby', u'sum': [u'md5', u'24971456c8ec2bcaeb3e749768b81a7f'], u'filename': u'ruby-1.8.5-27.el5.src.rpm', u'epoch': u'0', u'version': u'1.8.5', u'release': u'27.el5', u'arch': u'src'}, {u'src': None, u'name': u'ruby', u'sum': [u'md5', u'c60f5662db7b6d1b1931402f33aee230'], u'filename': u'ruby-1.8.5-27.el5.x86_64.rpm', u'epoch': u'0', u'version': u'1.8.5', u'release': u'27.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'ruby-devel', u'sum': [u'md5', u'2a66213c77c99a57ddbc8e440716e176'], u'filename': u'ruby-devel-1.8.5-27.el5.i386.rpm', u'epoch': u'0', u'version': u'1.8.5', u'release': u'27.el5', u'arch': u'i386'}, {u'src': None, u'name': u'ruby-devel', u'sum': [u'md5', u'ef6e1326ff1577530fcf3b4b7a1744bd'], u'filename': u'ruby-devel-1.8.5-27.el5.x86_64.rpm', u'epoch': u'0', u'version': u'1.8.5', u'release': u'27.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'ruby-docs', u'sum': [u'md5', u'165636a581e5dcbf025b0ef5dedaf1b1'], u'filename': u'ruby-docs-1.8.5-27.el5.x86_64.rpm', u'epoch': u'0', u'version': u'1.8.5', u'release': u'27.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'ruby-irb', u'sum': [u'md5', u'321294814a2f4df62375f2ca6e06268a'], u'filename': u'ruby-irb-1.8.5-27.el5.x86_64.rpm', u'epoch': u'0', u'version': u'1.8.5', u'release': u'27.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'ruby-libs', u'sum': [u'md5', u'806e17a82577cf33296f4927f76b67d3'], u'filename': u'ruby-libs-1.8.5-27.el5.i386.rpm', u'epoch': u'0', u'version': u'1.8.5', u'release': u'27.el5', u'arch': u'i386'}, {u'src': None, u'name': u'ruby-libs', u'sum': [u'md5', u'0e920c3289943a6149048153f4b695d2'], u'filename': u'ruby-libs-1.8.5-27.el5.x86_64.rpm', u'epoch': u'0', u'version': u'1.8.5', u'release': u'27.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'ruby-mode', u'sum': [u'md5', u'6a289090622010feca44fac6d6217e55'], u'filename': u'ruby-mode-1.8.5-27.el5.x86_64.rpm', u'epoch': u'0', u'version': u'1.8.5', u'release': u'27.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'ruby-rdoc', u'sum': [u'md5', u'2f9abc2db84b07d5fc630d1bde0884fa'], u'filename': u'ruby-rdoc-1.8.5-27.el5.x86_64.rpm', u'epoch': u'0', u'version': u'1.8.5', u'release': u'27.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'ruby-ri', u'sum': [u'md5', u'16349a8cd9046b9991f94a662b091869'], u'filename': u'ruby-ri-1.8.5-27.el5.x86_64.rpm', u'epoch': u'0', u'version': u'1.8.5', u'release': u'27.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'ruby-tcltk', u'sum': [u'md5', u'e3a3236db0c73f7b89127611ff7054da'], u'filename': u'ruby-tcltk-1.8.5-27.el5.x86_64.rpm', u'epoch': u'0', u'version': u'1.8.5', u'release': u'27.el5', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u"[2.2.3-74.0.1.el5]\n- fix mod_ssl always performing full renegotiation (Joe Jin) [orabug 12423387]\n- replace index.html with Oracle's index page oracle_index.html\n- update vstring and distro in specfile\n\n[2.2.3-74]\n- further %post scriptlet fix (#752618, #867736)\n\n[2.2.3-73]\n- fix %post scriptlet output (#752618, #867736)\n\n[2.2.3-72]\n- add security fix for CVE-2008-0456\n\n[2.2.3-71]\n- add security fix for CVE-2012-2687 (#850794)\n\n[2.2.3-70]\n- relax checks for status-line validity (#853128)\n\n[2.2.3-69]\n- mod_cache: fix header merging for 304 case, thanks to Roy Badami (#845532)\n- correct CVE reference in old changelog entry (#849160)\n\n[2.2.3-68]\n- mod_ssl: add _userID DN variable suffix for NID_userId (#840036)\n- fix handling of long chunk-line (#840845)\n- omit %posttrans daemon restart if\n /etc/sysconfig/httpd-disable-posttrans exists (#833042)\n\n[2.2.3-67]\n- add server aliases to 'httpd -S' output (#833043)\n- LSB compliance fixes for init script (#783242)\n- mod_ldap: add LDAPReferrals directive alias (#727342)\n\n[2.2.3-66]\n- check if localhost.key is valid (#752618)\n- mod_proxy_ajp: honour ProxyErrorOverride (#767890)\n- mod_ssl: fixed start with FIPS 140-2 mode enabled (#773473)", u'issued': u'2013-01-11', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELSA-2013-0130.html', u'type': u'self', u'id': None, u'title': u'ELSA-2013-0130'}, {u'href': u'http://linux.oracle.com/cve/CVE-2008-0455.html', u'type': u'cve', u'id': u'CVE-2008-0455', u'title': u'CVE-2008-0455'}, {u'href': u'http://linux.oracle.com/cve/CVE-2008-0456.html', u'type': u'cve', u'id': u'CVE-2008-0456', u'title': u'CVE-2008-0456'}, {u'href': u'http://linux.oracle.com/cve/CVE-2012-2687.html', u'type': u'cve', u'id': u'CVE-2012-2687', u'title': u'CVE-2012-2687'}], u'_content_type_id': u'erratum', u'_id': u'f15886f3-14c1-445a-a808-74ee54d6790e', u'from': u'el-errata@oss.oracle.com', u'severity': u'Low', u'title': u' httpd security, bug fix, and enhancement update', u'_ns': u'units_erratum', u'rights': u'Copyright 2013 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 5', u'reboot_suggested': False, u'type': u'security', u'pkglist': [{u'packages': [{u'src': None, u'name': u'httpd', u'sum': [u'md5', u'adba5036b99bf0a23060343a68371386'], u'filename': u'httpd-2.2.3-74.0.1.el5.src.rpm', u'epoch': u'0', u'version': u'2.2.3', u'release': u'74.0.1.el5', u'arch': u'src'}, {u'src': None, u'name': u'httpd', u'sum': [u'md5', u'1484d8a1b8625d1fa685d878f3e56384'], u'filename': u'httpd-2.2.3-74.0.1.el5.x86_64.rpm', u'epoch': u'0', u'version': u'2.2.3', u'release': u'74.0.1.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'httpd-devel', u'sum': [u'md5', u'c9a84103b50b68399421aa228e43a305'], u'filename': u'httpd-devel-2.2.3-74.0.1.el5.i386.rpm', u'epoch': u'0', u'version': u'2.2.3', u'release': u'74.0.1.el5', u'arch': u'i386'}, {u'src': None, u'name': u'httpd-devel', u'sum': [u'md5', u'3556f5fc7f0f4280756591ebd8233704'], u'filename': u'httpd-devel-2.2.3-74.0.1.el5.x86_64.rpm', u'epoch': u'0', u'version': u'2.2.3', u'release': u'74.0.1.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'httpd-manual', u'sum': [u'md5', u'ef02d2c0e0e0e268da75313f60b386b8'], u'filename': u'httpd-manual-2.2.3-74.0.1.el5.x86_64.rpm', u'epoch': u'0', u'version': u'2.2.3', u'release': u'74.0.1.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'mod_ssl', u'sum': [u'md5', u'4ccb6b535dce9b10d297d43ccd9f74c5'], u'filename': u'mod_ssl-2.2.3-74.0.1.el5.x86_64.rpm', u'epoch': u'1', u'version': u'2.2.3', u'release': u'74.0.1.el5', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u'[2.16.2-10.el5]\n- Prevent trash applet crashing (#848822)\n\n[2.16.2-9.el5]\n- Prevent deleting items linking out of the trash (#586015)\n- Do not stat every file on an ClearCase mvfs filesystem (#822817)\n- Do not silently skip directory having no read permission during copy (#772307)\n- Allow trashing symlink to filesystem root that does not support trashing (#621394)\n- CVE-2009-2473 gnome-vfs2 embedded neon: billion laughs DoS attack (#540548)', u'issued': u'2013-01-11', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELSA-2013-0131.html', u'type': u'self', u'id': None, u'title': u'ELSA-2013-0131'}, {u'href': u'http://linux.oracle.com/cve/CVE-2009-2473.html', u'type': u'cve', u'id': u'CVE-2009-2473', u'title': u'CVE-2009-2473'}], u'_content_type_id': u'erratum', u'_id': u'98df1f7a-c410-4897-be99-8a60d56b7564', u'from': u'el-errata@oss.oracle.com', u'severity': u'Low', u'title': u' gnome-vfs2 security and bug fix update', u'_ns': u'units_erratum', u'rights': u'Copyright 2013 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 5', u'reboot_suggested': False, u'type': u'security', u'pkglist': [{u'packages': [{u'src': None, u'name': u'gnome-vfs2', u'sum': [u'md5', u'3c538b27d8d46da91f139d980015129d'], u'filename': u'gnome-vfs2-2.16.2-10.el5.i386.rpm', u'epoch': u'0', u'version': u'2.16.2', u'release': u'10.el5', u'arch': u'i386'}, {u'src': None, u'name': u'gnome-vfs2', u'sum': [u'md5', u'a9f758d15a308d5fb588eb2553973f83'], u'filename': u'gnome-vfs2-2.16.2-10.el5.src.rpm', u'epoch': u'0', u'version': u'2.16.2', u'release': u'10.el5', u'arch': u'src'}, {u'src': None, u'name': u'gnome-vfs2', u'sum': [u'md5', u'957705f351bac279ccb981e0d15ab5e0'], u'filename': u'gnome-vfs2-2.16.2-10.el5.x86_64.rpm', u'epoch': u'0', u'version': u'2.16.2', u'release': u'10.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'gnome-vfs2-devel', u'sum': [u'md5', u'cc4b299fc12a2499ac8ded50aabf655a'], u'filename': u'gnome-vfs2-devel-2.16.2-10.el5.i386.rpm', u'epoch': u'0', u'version': u'2.16.2', u'release': u'10.el5', u'arch': u'i386'}, {u'src': None, u'name': u'gnome-vfs2-devel', u'sum': [u'md5', u'9beca759b835c2f4ca25781bbe4b6dc9'], u'filename': u'gnome-vfs2-devel-2.16.2-10.el5.x86_64.rpm', u'epoch': u'0', u'version': u'2.16.2', u'release': u'10.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'gnome-vfs2-smb', u'sum': [u'md5', u'6b5902d0b993fe3defacda0e1011b13d'], u'filename': u'gnome-vfs2-smb-2.16.2-10.el5.x86_64.rpm', u'epoch': u'0', u'version': u'2.16.2', u'release': u'10.el5', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u"[5.0.1-0.rc2.177.0.1.el5]\n- apply fix from NetApp to use tcp before udp\n http://www.mail-archive.com/autofs@linux.kernel.org/msg07910.html\n (Bert Barbe) [orabug 6827898]\n\n[5.0.1-0.rc2.177.el5]\n- bz714766 - autofs /net maps do not refresh list of shares exported on the NFS server\n - disable hosts map HUP signal update.\n- Related: rhbz#714766\n\n[5.0.1-0.rc2.176.el5]\n- bz859890 - no --timeout option usage demonstrated in auto.master FORMAT\n options man page section\n - add timeout option description to man page.\n- Resolves: rhbz#859890\n\n[5.0.1-0.rc2.175.el5]\n- bz845503 - autofs initscript problems\n - fix status() return code now gets lost due to adding lock file check.\n- Related: rhbz#845503\n\n[5.0.1-0.rc2.174.el5]\n- bz585058 - autofs5 init script times out before automount exits and\n incorrectly shows that autofs5 stop failed\n - fix don't wait forever for shutdown.\n- bz845503 - autofs initscript problems\n - don't unconditionaly call stop on restart.\n - fix usage message.\n - fix status return code when daemon is dead but lock file exists.\n- Related: rhbz#585058 rhbz#845503\n\n[5.0.1-0.rc2.173.el5]\n- bz845503 - autofs initscript problems\n - don't use status() function in restart, it can't be relied upon.\n- Related: rhbz#845503\n\n[5.0.1-0.rc2.172.el5]\n- bz845503 - autofs initscript problems\n - fix status call in restart must specify pid file name.\n- Related: rhbz#845503\n\n[5.0.1-0.rc2.171.el5]\n- bz845503 - autofs initscript problems\n - make redhat init script more lsb compliant.\n- Resolves: rhbz#845503\n\n[5.0.1-0.rc2.170.el5]\n- bz847101 - System unresponsiveness and CPU starvation when launching source code script\n - check negative cache much earlier.\n - dont use pthread_rwlock_tryrdlock().\n - remove state machine timed wait.\n- Related: rhbz#847101\n\n[5.0.1-0.rc2.169.el5]\n- bz714766 - autofs /net maps do not refresh list of shares exported on the NFS server\n - fix offset dir removal.\n- Related: rhbz#714766\n\n[5.0.1-0.rc2.168.el5]\n- bz585058 - autofs5 init script times out before automount exits and\n incorrectly shows that autofs5 stop failed\n - make autofs wait longer for shutdown.\n- Resolves: rhbz#585058\n\n[5.0.1-0.rc2.167.el5]\n- bz714766 - autofs /net maps do not refresh list of shares exported on the NFS server\n - fix expire race.\n - fix remount deadlock.\n - fix umount recovery of busy direct mount.\n - fix offset mount point directory removal.\n - remove move mount code.\n - fix remount of multi mount.\n - fix devce ioctl alloc path check.\n - refactor hosts lookup module.\n - remove cache update from parse_mount().\n - add function to delete offset cache entry.\n - allow update of multi mount offset entries.\n - add hup signal handling to hosts map.\n- Resolves: rhbz#714766\n\n[5.0.1-0.rc2.166.el5]\n- bz826633 - autofs crashes on lookup of a key containing a backslash\n - fix fix LDAP result leaks on error paths.\n - fix result null check in read_one_map().\n- Resolves: rhbz#826633\n\n[5.0.1-0.rc2.165.el5]\n- bz767428 - Fix autofs attempting to download entire LDAP map at startup\n - always read file maps multi map fix update.\n - report map not read when debug logging.\n- bz690404 - RFE: timeout option cannot be configured individually with\n multiple direct map entries\n - move timeout to map_source.\n- Resolves: rhbz#767428 rhbz#690404", u'issued': u'2013-01-11', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELSA-2013-0132.html', u'type': u'self', u'id': None, u'title': u'ELSA-2013-0132'}, {u'href': u'http://linux.oracle.com/cve/CVE-2012-2697.html', u'type': u'cve', u'id': u'CVE-2012-2697', u'title': u'CVE-2012-2697'}], u'_content_type_id': u'erratum', u'_id': u'6d36fab1-1b45-4c44-95fa-03d65e368b7a', u'from': u'el-errata@oss.oracle.com', u'severity': u'Low', u'title': u' autofs security, bug fix, and enhancement update', u'_ns': u'units_erratum', u'rights': u'Copyright 2013 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 5', u'reboot_suggested': False, u'type': u'security', u'pkglist': [{u'packages': [{u'src': None, u'name': u'autofs', u'sum': [u'md5', u'b6ddb9446f781a703e09e9f363424873'], u'filename': u'autofs-5.0.1-0.rc2.177.0.1.el5.src.rpm', u'epoch': u'1', u'version': u'5.0.1', u'release': u'0.rc2.177.0.1.el5', u'arch': u'src'}, {u'src': None, u'name': u'autofs', u'sum': [u'md5', u'eeca0f42d84885dbbc1ee142b23039f2'], u'filename': u'autofs-5.0.1-0.rc2.177.0.1.el5.x86_64.rpm', u'epoch': u'1', u'version': u'5.0.1', u'release': u'0.rc2.177.0.1.el5', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u'[3.9.8-15]\n- Another D-Bus fix, part of bug #501834.\n\n[3.9.8-14]\n- Create debugging files securely (CVE-2011-2722, bug #725830).\n\n[3.9.8-13]\n- Several parallel-install fixes (bug #501834).\n\n[3.9.8-12]\n- Applied patch to fix CVE-2010-4267, remote stack overflow\n vulnerability (bug #662740).', u'issued': u'2013-01-11', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELSA-2013-0133.html', u'type': u'self', u'id': None, u'title': u'ELSA-2013-0133'}, {u'href': u'http://linux.oracle.com/cve/CVE-2011-2722.html', u'type': u'cve', u'id': u'CVE-2011-2722', u'title': u'CVE-2011-2722'}], u'_content_type_id': u'erratum', u'_id': u'36a2eb6c-922e-4498-8327-b3eb783fbd12', u'from': u'el-errata@oss.oracle.com', u'severity': u'Low', u'title': u' hplip3 security and bug fix update', u'_ns': u'units_erratum', u'rights': u'Copyright 2013 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 5', u'reboot_suggested': False, u'type': u'security', u'pkglist': [{u'packages': [{u'src': None, u'name': u'hpijs3', u'sum': [u'md5', u'285abe27bc99330540a73f5f6a0de0f7'], u'filename': u'hpijs3-3.9.8-15.el5.x86_64.rpm', u'epoch': u'1', u'version': u'3.9.8', u'release': u'15.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'hplip3', u'sum': [u'md5', u'41e3c411ac824f4425209b83832bde05'], u'filename': u'hplip3-3.9.8-15.el5.src.rpm', u'epoch': u'0', u'version': u'3.9.8', u'release': u'15.el5', u'arch': u'src'}, {u'src': None, u'name': u'hplip3', u'sum': [u'md5', u'd5024977fd2d076b091f0140629a621d'], u'filename': u'hplip3-3.9.8-15.el5.x86_64.rpm', u'epoch': u'0', u'version': u'3.9.8', u'release': u'15.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'hplip3-common', u'sum': [u'md5', u'bb97f00ff3111e26dddccade31bc4829'], u'filename': u'hplip3-common-3.9.8-15.el5.x86_64.rpm', u'epoch': u'0', u'version': u'3.9.8', u'release': u'15.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'hplip3-gui', u'sum': [u'md5', u'012485a6191b88ec4f76bafe61277cd7'], u'filename': u'hplip3-gui-3.9.8-15.el5.x86_64.rpm', u'epoch': u'0', u'version': u'3.9.8', u'release': u'15.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'hplip3-libs', u'sum': [u'md5', u'df6de15d2e782b2d251e1308c1f7751b'], u'filename': u'hplip3-libs-3.9.8-15.el5.x86_64.rpm', u'epoch': u'0', u'version': u'3.9.8', u'release': u'15.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'libsane-hpaio3', u'sum': [u'md5', u'ce522e41edf0630a94c75076f12ece96'], u'filename': u'libsane-hpaio3-3.9.8-15.el5.x86_64.rpm', u'epoch': u'0', u'version': u'3.9.8', u'release': u'15.el5', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u'[2.1.12-5]\n- resolves: bug#855308\n CVE-2012-3547 freeradius: Stack-based buffer overflow by processing\n certain expiration date fields of a certificate during x509 certificate\n validation', u'issued': u'2013-01-11', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELSA-2013-0134.html', u'type': u'self', u'id': None, u'title': u'ELSA-2013-0134'}, {u'href': u'http://linux.oracle.com/cve/CVE-2011-4966.html', u'type': u'cve', u'id': u'CVE-2011-4966', u'title': u'CVE-2011-4966'}], u'_content_type_id': u'erratum', u'_id': u'7193bdf9-d924-41a6-a47b-7998dca22c54', u'from': u'el-errata@oss.oracle.com', u'severity': u'Low', u'title': u' freeradius2 security and bug fix update', u'_ns': u'units_erratum', u'rights': u'Copyright 2013 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 5', u'reboot_suggested': False, u'type': u'security', u'pkglist': [{u'packages': [{u'src': None, u'name': u'freeradius2', u'sum': [u'md5', u'77146939f3375f31e8bac5a61c50855b'], u'filename': u'freeradius2-2.1.12-5.el5.src.rpm', u'epoch': u'0', u'version': u'2.1.12', u'release': u'5.el5', u'arch': u'src'}, {u'src': None, u'name': u'freeradius2', u'sum': [u'md5', u'35e510d134f824fe3c98a86c38798231'], u'filename': u'freeradius2-2.1.12-5.el5.x86_64.rpm', u'epoch': u'0', u'version': u'2.1.12', u'release': u'5.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'freeradius2-krb5', u'sum': [u'md5', u'fa16d75e4466e0a8d8fa9c6c114c3447'], u'filename': u'freeradius2-krb5-2.1.12-5.el5.x86_64.rpm', u'epoch': u'0', u'version': u'2.1.12', u'release': u'5.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'freeradius2-ldap', u'sum': [u'md5', u'5b4ce9df922bd8eed4a0b28092496811'], u'filename': u'freeradius2-ldap-2.1.12-5.el5.x86_64.rpm', u'epoch': u'0', u'version': u'2.1.12', u'release': u'5.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'freeradius2-mysql', u'sum': [u'md5', u'd25c0edd6171a4edcaa20ad1f75fbcc7'], u'filename': u'freeradius2-mysql-2.1.12-5.el5.x86_64.rpm', u'epoch': u'0', u'version': u'2.1.12', u'release': u'5.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'freeradius2-perl', u'sum': [u'md5', u'11ad50dd4520a7840dffcddccaa9aeba'], u'filename': u'freeradius2-perl-2.1.12-5.el5.x86_64.rpm', u'epoch': u'0', u'version': u'2.1.12', u'release': u'5.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'freeradius2-postgresql', u'sum': [u'md5', u'e1de5bfc819ec3425456add16f052eaf'], u'filename': u'freeradius2-postgresql-2.1.12-5.el5.x86_64.rpm', u'epoch': u'0', u'version': u'2.1.12', u'release': u'5.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'freeradius2-python', u'sum': [u'md5', u'edceeebd330913911ddbb55643d7e9bd'], u'filename': u'freeradius2-python-2.1.12-5.el5.x86_64.rpm', u'epoch': u'0', u'version': u'2.1.12', u'release': u'5.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'freeradius2-unixODBC', u'sum': [u'md5', u'bdb7f1915552bd0b702ad13bbea9db4a'], u'filename': u'freeradius2-unixODBC-2.1.12-5.el5.x86_64.rpm', u'epoch': u'0', u'version': u'2.1.12', u'release': u'5.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'freeradius2-utils', u'sum': [u'md5', u'3b687eea2252d2e88e9251f5e8e3f58f'], u'filename': u'freeradius2-utils-2.1.12-5.el5.x86_64.rpm', u'epoch': u'0', u'version': u'2.1.12', u'release': u'5.el5', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u"[2.10.4-29]\n- Improve patch to parse CUPS user lpoptions file to avoid crashes\n on s390 and ia64\n Resolves: #603809\n\n[2.10.4-28]\n- Fix the filechooser not opening selected file when location entry\n is empty\n Resolves: #518483\n\n[2.10.4-27]\n- Fix integer overflow in GdkPixbuf's XBM image file format loader\n (CVE-2012-2370)\n Resolves: #846252\n\n[2.10.4-26]\n- Fix crash when drag and dropping notebook tabs\n Resolves: #830901\n\n[2.10.4-25]\n- Fix a problem with Wacom tablets pen event positions when using dual\n head displays\n Resolves: #743658\n\n[2.10.4-24]\n- Backport a patch to parse CUPS user lpoptions file.\n Resolves: #603809", u'issued': u'2013-01-11', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELSA-2013-0135.html', u'type': u'self', u'id': None, u'title': u'ELSA-2013-0135'}, {u'href': u'http://linux.oracle.com/cve/CVE-2012-2370.html', u'type': u'cve', u'id': u'CVE-2012-2370', u'title': u'CVE-2012-2370'}], u'_content_type_id': u'erratum', u'_id': u'9e0cbf63-9369-4f55-b6f1-c0b35f7a8d03', u'from': u'el-errata@oss.oracle.com', u'severity': u'Low', u'title': u' gtk2 security and bug fix update', u'_ns': u'units_erratum', u'rights': u'Copyright 2013 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 5', u'reboot_suggested': False, u'type': u'security', u'pkglist': [{u'packages': [{u'src': None, u'name': u'gtk2', u'sum': [u'md5', u'123bcd5b252c46f89f6759e4d9401ab7'], u'filename': u'gtk2-2.10.4-29.el5.i386.rpm', u'epoch': u'0', u'version': u'2.10.4', u'release': u'29.el5', u'arch': u'i386'}, {u'src': None, u'name': u'gtk2', u'sum': [u'md5', u'5057591d5ecc5dcdad7284e9d4f20ad6'], u'filename': u'gtk2-2.10.4-29.el5.src.rpm', u'epoch': u'0', u'version': u'2.10.4', u'release': u'29.el5', u'arch': u'src'}, {u'src': None, u'name': u'gtk2', u'sum': [u'md5', u'7f7824acc120b9b44e3dfa2211e7a8e3'], u'filename': u'gtk2-2.10.4-29.el5.x86_64.rpm', u'epoch': u'0', u'version': u'2.10.4', u'release': u'29.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'gtk2-devel', u'sum': [u'md5', u'bb2c2a2cded37ad693de68d455b4a876'], u'filename': u'gtk2-devel-2.10.4-29.el5.i386.rpm', u'epoch': u'0', u'version': u'2.10.4', u'release': u'29.el5', u'arch': u'i386'}, {u'src': None, u'name': u'gtk2-devel', u'sum': [u'md5', u'9399d4b3f71a242fb009ee2dc9cea53b'], u'filename': u'gtk2-devel-2.10.4-29.el5.x86_64.rpm', u'epoch': u'0', u'version': u'2.10.4', u'release': u'29.el5', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u'firefox\n[10.0.12-1.0.1.el6_3]\n- Add firefox-oracle-default-prefs.js and remove the corresponding Red Hat ones\n\n[10.0.12-1]\n- Update to 10.0.12 ESR\n\nxulrunner\n[10.0.12-1.0.1.el6_3]\n- Replaced xulrunner-redhat-default-prefs.js with xulrunner-oracle-default-prefs.js\n\n[10.0.12-1]\n- Update to 10.0.12 ESR', u'issued': u'2013-01-08', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELSA-2013-0144.html', u'type': u'self', u'id': None, u'title': u'ELSA-2013-0144'}, {u'href': u'http://linux.oracle.com/cve/CVE-2013-0744.html', u'type': u'cve', u'id': u'CVE-2013-0744', u'title': u'CVE-2013-0744'}, {u'href': u'http://linux.oracle.com/cve/CVE-2013-0746.html', u'type': u'cve', u'id': u'CVE-2013-0746', u'title': u'CVE-2013-0746'}, {u'href': u'http://linux.oracle.com/cve/CVE-2013-0748.html', u'type': u'cve', u'id': u'CVE-2013-0748', u'title': u'CVE-2013-0748'}, {u'href': u'http://linux.oracle.com/cve/CVE-2013-0750.html', u'type': u'cve', u'id': u'CVE-2013-0750', u'title': u'CVE-2013-0750'}, {u'href': u'http://linux.oracle.com/cve/CVE-2013-0753.html', u'type': u'cve', u'id': u'CVE-2013-0753', u'title': u'CVE-2013-0753'}, {u'href': u'http://linux.oracle.com/cve/CVE-2013-0754.html', u'type': u'cve', u'id': u'CVE-2013-0754', u'title': u'CVE-2013-0754'}, {u'href': u'http://linux.oracle.com/cve/CVE-2013-0758.html', u'type': u'cve', u'id': u'CVE-2013-0758', u'title': u'CVE-2013-0758'}, {u'href': u'http://linux.oracle.com/cve/CVE-2013-0759.html', u'type': u'cve', u'id': u'CVE-2013-0759', u'title': u'CVE-2013-0759'}, {u'href': u'http://linux.oracle.com/cve/CVE-2013-0762.html', u'type': u'cve', u'id': u'CVE-2013-0762', u'title': u'CVE-2013-0762'}, {u'href': u'http://linux.oracle.com/cve/CVE-2013-0766.html', u'type': u'cve', u'id': u'CVE-2013-0766', u'title': u'CVE-2013-0766'}, {u'href': u'http://linux.oracle.com/cve/CVE-2013-0767.html', u'type': u'cve', u'id': u'CVE-2013-0767', u'title': u'CVE-2013-0767'}, {u'href': u'http://linux.oracle.com/cve/CVE-2013-0769.html', u'type': u'cve', u'id': u'CVE-2013-0769', u'title': u'CVE-2013-0769'}], u'_content_type_id': u'erratum', u'_id': u'b7df0dd6-2b84-4e46-9a4a-1cdef969c07f', u'from': u'el-errata@oss.oracle.com', u'severity': u'Critical', u'title': u' firefox security update', u'_ns': u'units_erratum', u'rights': u'Copyright 2013 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 6', u'reboot_suggested': False, u'type': u'security', u'pkglist': [{u'packages': [{u'src': None, u'name': u'firefox', u'sum': [u'md5', u'8b986fa21e7fa65852eae8810fb20f85'], u'filename': u'firefox-10.0.12-1.0.1.el6_3.i686.rpm', u'epoch': u'0', u'version': u'10.0.12', u'release': u'1.0.1.el6_3', u'arch': u'i686'}, {u'src': None, u'name': u'firefox', u'sum': [u'md5', u'198b386899cffd42201a0056844fcb31'], u'filename': u'firefox-10.0.12-1.0.1.el6_3.src.rpm', u'epoch': u'0', u'version': u'10.0.12', u'release': u'1.0.1.el6_3', u'arch': u'src'}, {u'src': None, u'name': u'firefox', u'sum': [u'md5', u'c8ff3784ef85b8b492b766792cdc6636'], u'filename': u'firefox-10.0.12-1.0.1.el6_3.x86_64.rpm', u'epoch': u'0', u'version': u'10.0.12', u'release': u'1.0.1.el6_3', u'arch': u'x86_64'}, {u'src': None, u'name': u'xulrunner', u'sum': [u'md5', u'cf064aadebe598bcfbbea38bc04217b7'], u'filename': u'xulrunner-10.0.12-1.0.1.el6_3.i686.rpm', u'epoch': u'0', u'version': u'10.0.12', u'release': u'1.0.1.el6_3', u'arch': u'i686'}, {u'src': None, u'name': u'xulrunner', u'sum': [u'md5', u'3dbbf15a76bdb8067423003f8b169ad1'], u'filename': u'xulrunner-10.0.12-1.0.1.el6_3.src.rpm', u'epoch': u'0', u'version': u'10.0.12', u'release': u'1.0.1.el6_3', u'arch': u'src'}, {u'src': None, u'name': u'xulrunner', u'sum': [u'md5', u'982c9883e7be9eddc8c3f3c5ae0c68c1'], u'filename': u'xulrunner-10.0.12-1.0.1.el6_3.x86_64.rpm', u'epoch': u'0', u'version': u'10.0.12', u'release': u'1.0.1.el6_3', u'arch': u'x86_64'}, {u'src': None, u'name': u'xulrunner-devel', u'sum': [u'md5', u'1986a1e90a47e02e5b52ea2ec1183b5a'], u'filename': u'xulrunner-devel-10.0.12-1.0.1.el6_3.i686.rpm', u'epoch': u'0', u'version': u'10.0.12', u'release': u'1.0.1.el6_3', u'arch': u'i686'}, {u'src': None, u'name': u'xulrunner-devel', u'sum': [u'md5', u'c00a5287355ab16384c14d56e59fae67'], u'filename': u'xulrunner-devel-10.0.12-1.0.1.el6_3.x86_64.rpm', u'epoch': u'0', u'version': u'10.0.12', u'release': u'1.0.1.el6_3', u'arch': u'x86_64'}], u'name': u'ol6_x86_64_latest', u'short': u'ol6_x86_64_latest'}, {u'packages': [{u'src': None, u'name': u'firefox', u'sum': [u'md5', u'f53b6d8ccdfabe89b5d5b37ba4822eaf'], u'filename': u'firefox-10.0.12-1.0.1.el5_9.i386.rpm', u'epoch': u'0', u'version': u'10.0.12', u'release': u'1.0.1.el5_9', u'arch': u'i386'}, {u'src': None, u'name': u'firefox', u'sum': [u'md5', u'd9477a9494db1e21381fc2f42531a750'], u'filename': u'firefox-10.0.12-1.0.1.el5_9.src.rpm', u'epoch': u'0', u'version': u'10.0.12', u'release': u'1.0.1.el5_9', u'arch': u'src'}, {u'src': None, u'name': u'firefox', u'sum': [u'md5', u'e59196ef80a9b0a65317c3c40bc253c8'], u'filename': u'firefox-10.0.12-1.0.1.el5_9.x86_64.rpm', u'epoch': u'0', u'version': u'10.0.12', u'release': u'1.0.1.el5_9', u'arch': u'x86_64'}, {u'src': None, u'name': u'xulrunner', u'sum': [u'md5', u'9f427fed1ada754ad8864f2bd34b4919'], u'filename': u'xulrunner-10.0.12-1.0.1.el5_9.i386.rpm', u'epoch': u'0', u'version': u'10.0.12', u'release': u'1.0.1.el5_9', u'arch': u'i386'}, {u'src': None, u'name': u'xulrunner', u'sum': [u'md5', u'4a0328c4176660f91ae34cde665f1071'], u'filename': u'xulrunner-10.0.12-1.0.1.el5_9.src.rpm', u'epoch': u'0', u'version': u'10.0.12', u'release': u'1.0.1.el5_9', u'arch': u'src'}, {u'src': None, u'name': u'xulrunner', u'sum': [u'md5', u'2b36744fed530cf2d6080c296f96402a'], u'filename': u'xulrunner-10.0.12-1.0.1.el5_9.x86_64.rpm', u'epoch': u'0', u'version': u'10.0.12', u'release': u'1.0.1.el5_9', u'arch': u'x86_64'}, {u'src': None, u'name': u'xulrunner-devel', u'sum': [u'md5', u'91bd957dbc91ffb8a79c8ea8a7642ee5'], u'filename': u'xulrunner-devel-10.0.12-1.0.1.el5_9.i386.rpm', u'epoch': u'0', u'version': u'10.0.12', u'release': u'1.0.1.el5_9', u'arch': u'i386'}, {u'src': None, u'name': u'xulrunner-devel', u'sum': [u'md5', u'f4693e88f215302a13484c440ff5f9e7'], u'filename': u'xulrunner-devel-10.0.12-1.0.1.el5_9.x86_64.rpm', u'epoch': u'0', u'version': u'10.0.12', u'release': u'1.0.1.el5_9', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u"[1.7.0.9-2.3.4.1.0.1.el6_3]\n- Update DISTRO_NAME in specfile\n\n[1.7.0.9-2.3.4.1.el6]\n- Rewerted to IcedTea 2.3.4\n - rewerted patch105: java-1.7.0-openjdk-disable-system-lcms.patch\n - removed jxmd and idlj to alternatives\n - make NOT executed with DISABLE_INTREE_EC=true and UNLIMITED_CRYPTO=true\n - re-applied patch302 and restored systemtap.patch\n - buildver set to 9\n - icedtea_version set to 2.3.4\n - unapplied patch112 java-1.7.openjdk-doNotUseDisabledEcc.patch\n - restored tmp-patches source tarball\n - removed /lib/security/US_export_policy.jar and lib/security/local_policy.jar\n - java-1.7.0-openjdk-java-access-bridge-security.patch's path moved from\n java.security-linux back to java.security\n- Resolves: rhbz#895033\n\n[1.7.0.11-2.4.0.1.el6]\n- Rewritten patch105: java-1.7.0-openjdk-disable-system-lcms.patch\n- Added jxmd and idlj to alternatives\n- make executed with DISABLE_INTREE_EC=true and UNLIMITED_CRYPTO=true\n- Unapplied patch302 and deleted systemtap.patch\n- buildver increased to 11\n- icedtea_version set to 2.4.0\n- Added and applied patch112 java-1.7.openjdk-doNotUseDisabledEcc.patch\n- removed tmp-patches source tarball\n- Added /lib/security/US_export_policy.jar and lib/security/local_policy.jar\n- Resolves: rhbz#895033\n", u'issued': u'2013-01-16', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELSA-2013-0165.html', u'type': u'self', u'id': None, u'title': u'ELSA-2013-0165'}, {u'href': u'http://linux.oracle.com/cve/CVE-2012-3174.html', u'type': u'cve', u'id': u'CVE-2012-3174', u'title': u'CVE-2012-3174'}, {u'href': u'http://linux.oracle.com/cve/CVE-2013-0422.html', u'type': u'cve', u'id': u'CVE-2013-0422', u'title': u'CVE-2013-0422'}], u'_content_type_id': u'erratum', u'_id': u'bc807f71-005f-40a7-91c3-0db3b772285b', u'from': u'el-errata@oss.oracle.com', u'severity': u'Important', u'title': u' java-1.7.0-openjdk security update', u'_ns': u'units_erratum', u'rights': u'Copyright 2013 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 6', u'reboot_suggested': False, u'type': u'security', u'pkglist': [{u'packages': [{u'src': None, u'name': u'java-1.7.0-openjdk', u'sum': [u'md5', u'4ab944ec7356bc21bd6c7e1fefeb3d9b'], u'filename': u'java-1.7.0-openjdk-1.7.0.9-2.3.4.1.0.1.el6_3.src.rpm', u'epoch': u'1', u'version': u'1.7.0.9', u'release': u'2.3.4.1.0.1.el6_3', u'arch': u'src'}, {u'src': None, u'name': u'java-1.7.0-openjdk', u'sum': [u'md5', u'48c2f1c60ca688287c279eb8a9e88c76'], u'filename': u'java-1.7.0-openjdk-1.7.0.9-2.3.4.1.0.1.el6_3.x86_64.rpm', u'epoch': u'1', u'version': u'1.7.0.9', u'release': u'2.3.4.1.0.1.el6_3', u'arch': u'x86_64'}, {u'src': None, u'name': u'java-1.7.0-openjdk-demo', u'sum': [u'md5', u'79d5a539edd0d237bad4b1c0e5e57072'], u'filename': u'java-1.7.0-openjdk-demo-1.7.0.9-2.3.4.1.0.1.el6_3.x86_64.rpm', u'epoch': u'1', u'version': u'1.7.0.9', u'release': u'2.3.4.1.0.1.el6_3', u'arch': u'x86_64'}, {u'src': None, u'name': u'java-1.7.0-openjdk-devel', u'sum': [u'md5', u'76468b9d59ed0135fcc52a756903d573'], u'filename': u'java-1.7.0-openjdk-devel-1.7.0.9-2.3.4.1.0.1.el6_3.x86_64.rpm', u'epoch': u'1', u'version': u'1.7.0.9', u'release': u'2.3.4.1.0.1.el6_3', u'arch': u'x86_64'}, {u'src': None, u'name': u'java-1.7.0-openjdk-javadoc', u'sum': [u'md5', u'515b0a738cfac3c8577d49ca9558bd8e'], u'filename': u'java-1.7.0-openjdk-javadoc-1.7.0.9-2.3.4.1.0.1.el6_3.noarch.rpm', u'epoch': u'1', u'version': u'1.7.0.9', u'release': u'2.3.4.1.0.1.el6_3', u'arch': u'noarch'}, {u'src': None, u'name': u'java-1.7.0-openjdk-src', u'sum': [u'md5', u'9e42d20f8a104499922f4d821dc4c518'], u'filename': u'java-1.7.0-openjdk-src-1.7.0.9-2.3.4.1.0.1.el6_3.x86_64.rpm', u'epoch': u'1', u'version': u'1.7.0.9', u'release': u'2.3.4.1.0.1.el6_3', u'arch': u'x86_64'}], u'name': u'ol6_x86_64_latest', u'short': u'ol6_x86_64_latest'}, {u'packages': [{u'src': None, u'name': u'java-1.7.0-openjdk', u'sum': [u'md5', u'7bd59b03e770ea22e077818193b6d848'], u'filename': u'java-1.7.0-openjdk-1.7.0.9-2.3.4.0.1.el5_9.1.src.rpm', u'epoch': u'1', u'version': u'1.7.0.9', u'release': u'2.3.4.0.1.el5_9.1', u'arch': u'src'}, {u'src': None, u'name': u'java-1.7.0-openjdk', u'sum': [u'md5', u'704f753c3436ec04170768c76abe38a0'], u'filename': u'java-1.7.0-openjdk-1.7.0.9-2.3.4.0.1.el5_9.1.x86_64.rpm', u'epoch': u'1', u'version': u'1.7.0.9', u'release': u'2.3.4.0.1.el5_9.1', u'arch': u'x86_64'}, {u'src': None, u'name': u'java-1.7.0-openjdk-demo', u'sum': [u'md5', u'2040941452f0f4ea120bd4ac27b508bb'], u'filename': u'java-1.7.0-openjdk-demo-1.7.0.9-2.3.4.0.1.el5_9.1.x86_64.rpm', u'epoch': u'1', u'version': u'1.7.0.9', u'release': u'2.3.4.0.1.el5_9.1', u'arch': u'x86_64'}, {u'src': None, u'name': u'java-1.7.0-openjdk-devel', u'sum': [u'md5', u'3a1c0654c24a954f439389e56e860452'], u'filename': u'java-1.7.0-openjdk-devel-1.7.0.9-2.3.4.0.1.el5_9.1.x86_64.rpm', u'epoch': u'1', u'version': u'1.7.0.9', u'release': u'2.3.4.0.1.el5_9.1', u'arch': u'x86_64'}, {u'src': None, u'name': u'java-1.7.0-openjdk-javadoc', u'sum': [u'md5', u'd26c60b88209d518bb733f308c51b888'], u'filename': u'java-1.7.0-openjdk-javadoc-1.7.0.9-2.3.4.0.1.el5_9.1.x86_64.rpm', u'epoch': u'1', u'version': u'1.7.0.9', u'release': u'2.3.4.0.1.el5_9.1', u'arch': u'x86_64'}, {u'src': None, u'name': u'java-1.7.0-openjdk-src', u'sum': [u'md5', u'363936d84e8b89913d25080441455027'], u'filename': u'java-1.7.0-openjdk-src-1.7.0.9-2.3.4.0.1.el5_9.1.x86_64.rpm', u'epoch': u'1', u'version': u'1.7.0.9', u'release': u'2.3.4.0.1.el5_9.1', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u'kernel\n[2.6.18-348.1.1]\n- [pci] intel-iommu: reduce max num of domains supported (Don Dutile) [886876 885125]\n- [fs] gfs2: Fix leak of cached directory hash table (Steven Whitehouse) [886124 831330]\n- [x86] mm: randomize SHLIB_BASE (Petr Matousek) [804953 804954] {CVE-2012-1568}\n- [net] be2net: create RSS rings even in multi-channel configs (Ivan Vecera) [884702 878209]\n- [net] tg3: Avoid dma read error (John Feeney) [885692 877474]\n- [misc] Fix unsupported hardware message (Prarit Bhargava) [885063 876587]\n- [net] ipv6: discard overlapping fragment (Jiri Pirko) [874837 874838] {CVE-2012-4444}\n- [usb] Fix serial port reference counting on hotplug remove (Don Zickus) [885700 845447]\n- [net] bridge: export its presence and fix bonding igmp reporting (Veaceslav Falico) [884742 843473]\n- [fs] nfs: move wait for server->active from put_super to kill_sb (Jeff Layton) [884708 839839]\n- [scsi] libfc: fix indefinite rport restart (Neil Horman) [884740 595184]\n- [scsi] libfc: Retry a rejected PRLI request (Neil Horman) [884740 595184]\n- [scsi] libfc: Fix remote port restart problem (Neil Horman) [884740 595184]\n- [xen] memop: limit guest specified extent order (Laszlo Ersek) [878449 878450] {CVE-2012-5515}\n- [xen] get bottom of EBDA from the multiboot data structure (Paolo Bonzini) [885062 881885]', u'issued': u'2013-01-22', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELSA-2013-0168.html', u'type': u'self', u'id': None, u'title': u'ELSA-2013-0168'}, {u'href': u'http://linux.oracle.com/cve/CVE-2012-1568.html', u'type': u'cve', u'id': u'CVE-2012-1568', u'title': u'CVE-2012-1568'}, {u'href': u'http://linux.oracle.com/cve/CVE-2012-4444.html', u'type': u'cve', u'id': u'CVE-2012-4444', u'title': u'CVE-2012-4444'}, {u'href': u'http://linux.oracle.com/cve/CVE-2012-5515.html', u'type': u'cve', u'id': u'CVE-2012-5515', u'title': u'CVE-2012-5515'}], u'_content_type_id': u'erratum', u'_id': u'c54c00be-391c-4ffd-918e-79a7877301fc', u'from': u'el-errata@oss.oracle.com', u'severity': u'Moderate', u'title': u' kernel security and bug fix update', u'_ns': u'units_erratum', u'rights': u'Copyright 2013 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 5', u'reboot_suggested': False, u'type': u'security', u'pkglist': [{u'packages': [{u'src': None, u'name': u'kernel', u'sum': [u'md5', u'f90c0a317cce15ee2e8ae0ad224f6268'], u'filename': u'kernel-2.6.18-348.1.1.el5.src.rpm', u'epoch': u'0', u'version': u'2.6.18', u'release': u'348.1.1.el5', u'arch': u'src'}, {u'src': None, u'name': u'kernel', u'sum': [u'md5', u'5bc733ab555a9b4ef9497d2f3aeba2a2'], u'filename': u'kernel-2.6.18-348.1.1.el5.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.18', u'release': u'348.1.1.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'kernel-debug', u'sum': [u'md5', u'14d1eff91048882cff30ca4ec4cdff46'], u'filename': u'kernel-debug-2.6.18-348.1.1.el5.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.18', u'release': u'348.1.1.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'kernel-debug-devel', u'sum': [u'md5', u'03c0a8b0e5b7abfe7e94c284f73c251a'], u'filename': u'kernel-debug-devel-2.6.18-348.1.1.el5.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.18', u'release': u'348.1.1.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'kernel-devel', u'sum': [u'md5', u'83dd93cd30051f9e0d8572b2d9a0b823'], u'filename': u'kernel-devel-2.6.18-348.1.1.el5.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.18', u'release': u'348.1.1.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'kernel-doc', u'sum': [u'md5', u'9791e69c5afaf4a490b01e7dd4b6f4c0'], u'filename': u'kernel-doc-2.6.18-348.1.1.el5.noarch.rpm', u'epoch': u'0', u'version': u'2.6.18', u'release': u'348.1.1.el5', u'arch': u'noarch'}, {u'src': None, u'name': u'kernel-headers', u'sum': [u'md5', u'0051266b00a9e428520c4b7be8a3e566'], u'filename': u'kernel-headers-2.6.18-348.1.1.el5.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.18', u'release': u'348.1.1.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'kernel-xen', u'sum': [u'md5', u'801c4be588a258f81e06d7b266c3e591'], u'filename': u'kernel-xen-2.6.18-348.1.1.el5.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.18', u'release': u'348.1.1.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'kernel-xen-devel', u'sum': [u'md5', u'dedfd5f51534fa6b5239517627e39d42'], u'filename': u'kernel-xen-devel-2.6.18-348.1.1.el5.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.18', u'release': u'348.1.1.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'ocfs2-2.6.18-348.1.1.el5', u'sum': [u'md5', u'6a29362a4ff922ac02c245d0b02e4f69'], u'filename': u'ocfs2-2.6.18-348.1.1.el5-1.4.10-1.el5.src.rpm', u'epoch': u'0', u'version': u'1.4.10', u'release': u'1.el5', u'arch': u'src'}, {u'src': None, u'name': u'ocfs2-2.6.18-348.1.1.el5', u'sum': [u'md5', u'58a59f161853a3786866e629630b5be5'], u'filename': u'ocfs2-2.6.18-348.1.1.el5-1.4.10-1.el5.x86_64.rpm', u'epoch': u'0', u'version': u'1.4.10', u'release': u'1.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'ocfs2-2.6.18-348.1.1.el5debug', u'sum': [u'md5', u'c54f40d4809b31903b82994587d33aac'], u'filename': u'ocfs2-2.6.18-348.1.1.el5debug-1.4.10-1.el5.x86_64.rpm', u'epoch': u'0', u'version': u'1.4.10', u'release': u'1.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'ocfs2-2.6.18-348.1.1.el5xen', u'sum': [u'md5', u'f27339d02d0b033ef31024025ff561e7'], u'filename': u'ocfs2-2.6.18-348.1.1.el5xen-1.4.10-1.el5.x86_64.rpm', u'epoch': u'0', u'version': u'1.4.10', u'release': u'1.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'oracleasm-2.6.18-348.1.1.el5', u'sum': [u'md5', u'5235c95ae6126a851015b9959a6ed040'], u'filename': u'oracleasm-2.6.18-348.1.1.el5-2.0.5-1.el5.src.rpm', u'epoch': u'0', u'version': u'2.0.5', u'release': u'1.el5', u'arch': u'src'}, {u'src': None, u'name': u'oracleasm-2.6.18-348.1.1.el5', u'sum': [u'md5', u'7f4d42641cd6abc4f45e39d942c2fb81'], u'filename': u'oracleasm-2.6.18-348.1.1.el5-2.0.5-1.el5.x86_64.rpm', u'epoch': u'0', u'version': u'2.0.5', u'release': u'1.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'oracleasm-2.6.18-348.1.1.el5debug', u'sum': [u'md5', u'b07f71b3edca77557cbc8c2d3106a2af'], u'filename': u'oracleasm-2.6.18-348.1.1.el5debug-2.0.5-1.el5.x86_64.rpm', u'epoch': u'0', u'version': u'2.0.5', u'release': u'1.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'oracleasm-2.6.18-348.1.1.el5xen', u'sum': [u'md5', u'a99e34a5fb005f29a8847fe9014e82ce'], u'filename': u'oracleasm-2.6.18-348.1.1.el5xen-2.0.5-1.el5.x86_64.rpm', u'epoch': u'0', u'version': u'2.0.5', u'release': u'1.el5', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u"kernel\n[2.6.18-348.1.1.0.1]\n- [oprofile] x86, mm: Add __get_user_pages_fast() [orabug 14277030]\n- [oprofile] export __get_user_pages_fast() function [orabug 14277030]\n- [oprofile] oprofile, x86: Fix nmi-unsafe callgraph support [orabug 14277030]\n- [oprofile] oprofile: use KM_NMI slot for kmap_atomic [orabug 14277030]\n- [oprofile] oprofile: i386 add get_user_pages_fast support [orabug 14277030]\n- [kernel] Initialize the local uninitialized variable stats. [orabug 14051367]\n- [fs] JBD:make jbd support 512B blocks correctly for ocfs2. [orabug 13477763]\n- [x86 ] fix fpu context corrupt when preempt in signal context [orabug 14038272]\n- [mm] fix hugetlb page leak (Dave McCracken) [orabug 12375075]\n- fix ia64 build error due to add-support-above-32-vcpus.patch(Zhenzhong Duan)\n- [x86] use dynamic vcpu_info remap to support more than 32 vcpus (Zhenzhong Duan)\n- [x86] Fix lvt0 reset when hvm boot up with noapic param\n- [scsi] remove printk's when doing I/O to a dead device (John Sobecki, Chris Mason)\n [orabug 12342275]\n- [char] ipmi: Fix IPMI errors due to timing problems (Joe Jin) [orabug 12561346]\n- [scsi] Fix race when removing SCSI devices (Joe Jin) [orabug 12404566]\n- [net] net: Redo the broken redhat netconsole over bonding (Tina Yang) [orabug 12740042]\n- [fs] nfs: Fix __put_nfs_open_context() NULL pointer panic (Joe Jin) [orabug 12687646]\n- fix filp_close() race (Joe Jin) [orabug 10335998]\n- make xenkbd.abs_pointer=1 by default [orabug 67188919]\n- [xen] check to see if hypervisor supports memory reservation change\n (Chuck Anderson) [orabug 7556514]\n- [net] Enable entropy for bnx2,bnx2x,e1000e,igb,ixgb,ixgbe,ixgbevf (John Sobecki)\n [orabug 10315433]\n- [NET] Add xen pv netconsole support (Tina Yang) [orabug 6993043] [bz 7258]\n- [mm] Patch shrink_zone to yield during severe mempressure events, avoiding\n hangs and evictions (John Sobecki,Chris Mason) [orabug 6086839]\n- [mm] Enhance shrink_zone patch allow full swap utilization, and also be\n NUMA-aware (John Sobecki,Chris Mason,Herbert van den Bergh) [orabug 9245919]\n- fix aacraid not to reset during kexec (Joe Jin) [orabug 8516042]\n- [xen] PVHVM guest with PoD crashes under memory pressure (Chuck Anderson)\n [orabug 9107465]\n- [xen] PV guest with FC HBA hangs during shutdown (Chuck Anderson)\n [orabug 9764220]\n- Support 256GB+ memory for pv guest (Mukesh Rathor) [orabug 9450615]\n- fix overcommit memory to use percpu_counter for (KOSAKI Motohiro,\n Guru Anbalagane) [orabug 6124033]\n- [ipmi] make configurable timeouts for kcs of ipmi [orabug 9752208]\n- [ib] fix memory corruption (Andy Grover) [orabug 9972346]\n\n[2.6.18-348.1.1]\n- [pci] intel-iommu: reduce max num of domains supported (Don Dutile) [886876 885125]\n- [fs] gfs2: Fix leak of cached directory hash table (Steven Whitehouse) [886124 831330]\n- [x86] mm: randomize SHLIB_BASE (Petr Matousek) [804953 804954] {CVE-2012-1568}\n- [net] be2net: create RSS rings even in multi-channel configs (Ivan Vecera) [884702 878209]\n- [net] tg3: Avoid dma read error (John Feeney) [885692 877474]\n- [misc] Fix unsupported hardware message (Prarit Bhargava) [885063 876587]\n- [net] ipv6: discard overlapping fragment (Jiri Pirko) [874837 874838] {CVE-2012-4444}\n- [usb] Fix serial port reference counting on hotplug remove (Don Zickus) [885700 845447]\n- [net] bridge: export its presence and fix bonding igmp reporting (Veaceslav Falico) [884742 843473]\n- [fs] nfs: move wait for server->active from put_super to kill_sb (Jeff Layton) [884708 839839]\n- [scsi] libfc: fix indefinite rport restart (Neil Horman) [884740 595184]\n- [scsi] libfc: Retry a rejected PRLI request (Neil Horman) [884740 595184]\n- [scsi] libfc: Fix remote port restart problem (Neil Horman) [884740 595184]\n- [xen] memop: limit guest specified extent order (Laszlo Ersek) [878449 878450] {CVE-2012-5515}\n- [xen] get bottom of EBDA from the multiboot data structure (Paolo Bonzini) [885062 881885]", u'issued': u'2013-01-22', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELSA-2013-0168-1.html', u'type': u'self', u'id': None, u'title': u'ELSA-2013-0168-1'}, {u'href': u'http://linux.oracle.com/cve/CVE-2012-1568.html', u'type': u'cve', u'id': u'CVE-2012-1568', u'title': u'CVE-2012-1568'}, {u'href': u'http://linux.oracle.com/cve/CVE-2012-4444.html', u'type': u'cve', u'id': u'CVE-2012-4444', u'title': u'CVE-2012-4444'}, {u'href': u'http://linux.oracle.com/cve/CVE-2012-5515.html', u'type': u'cve', u'id': u'CVE-2012-5515', u'title': u'CVE-2012-5515'}], u'_content_type_id': u'erratum', u'_id': u'04f6a668-91c8-4cb9-a7ef-50683a8e493d', u'from': u'el-errata@oss.oracle.com', u'severity': u'Moderate', u'title': u' kernel security and bug fix update', u'_ns': u'units_erratum', u'rights': u'Copyright 2013 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 5', u'reboot_suggested': False, u'type': u'security', u'pkglist': [{u'packages': [{u'src': None, u'name': u'kernel', u'sum': [u'md5', u'7c12781448a99dfca1f5348792eb3a54'], u'filename': u'kernel-2.6.18-348.1.1.0.1.el5.src.rpm', u'epoch': u'0', u'version': u'2.6.18', u'release': u'348.1.1.0.1.el5', u'arch': u'src'}, {u'src': None, u'name': u'kernel', u'sum': [u'md5', u'3c2a88d093bbc0bdb89ff904a999a646'], u'filename': u'kernel-2.6.18-348.1.1.0.1.el5.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.18', u'release': u'348.1.1.0.1.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'kernel-debug', u'sum': [u'md5', u'9989918b413790ec6fba407f94d30bfd'], u'filename': u'kernel-debug-2.6.18-348.1.1.0.1.el5.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.18', u'release': u'348.1.1.0.1.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'kernel-debug-devel', u'sum': [u'md5', u'dd90a520f1b8e40023f26c35388376b7'], u'filename': u'kernel-debug-devel-2.6.18-348.1.1.0.1.el5.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.18', u'release': u'348.1.1.0.1.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'kernel-devel', u'sum': [u'md5', u'29ec85cea1c807dd30b8bb7b0b9c7906'], u'filename': u'kernel-devel-2.6.18-348.1.1.0.1.el5.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.18', u'release': u'348.1.1.0.1.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'kernel-doc', u'sum': [u'md5', u'4fdc8749389b0009e4d0476dc012db41'], u'filename': u'kernel-doc-2.6.18-348.1.1.0.1.el5.noarch.rpm', u'epoch': u'0', u'version': u'2.6.18', u'release': u'348.1.1.0.1.el5', u'arch': u'noarch'}, {u'src': None, u'name': u'kernel-headers', u'sum': [u'md5', u'f40bfe3b7c64869adbaaa80ca342e6ad'], u'filename': u'kernel-headers-2.6.18-348.1.1.0.1.el5.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.18', u'release': u'348.1.1.0.1.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'kernel-xen', u'sum': [u'md5', u'16c79f399d9907ef53de8cd93c4c7945'], u'filename': u'kernel-xen-2.6.18-348.1.1.0.1.el5.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.18', u'release': u'348.1.1.0.1.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'kernel-xen-devel', u'sum': [u'md5', u'be0bd9347b639fd62cb54a1b4062a36a'], u'filename': u'kernel-xen-devel-2.6.18-348.1.1.0.1.el5.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.18', u'release': u'348.1.1.0.1.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'ocfs2-2.6.18-348.1.1.0.1.el5', u'sum': [u'md5', u'19fe09b31934c49433cb1fb5c433d5d4'], u'filename': u'ocfs2-2.6.18-348.1.1.0.1.el5-1.4.10-1.el5.src.rpm', u'epoch': u'0', u'version': u'1.4.10', u'release': u'1.el5', u'arch': u'src'}, {u'src': None, u'name': u'ocfs2-2.6.18-348.1.1.0.1.el5', u'sum': [u'md5', u'c475512643c3e7e0e5fdec4c7a208583'], u'filename': u'ocfs2-2.6.18-348.1.1.0.1.el5-1.4.10-1.el5.x86_64.rpm', u'epoch': u'0', u'version': u'1.4.10', u'release': u'1.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'ocfs2-2.6.18-348.1.1.0.1.el5debug', u'sum': [u'md5', u'0d69930d31e26064bfeb9680eb2cd186'], u'filename': u'ocfs2-2.6.18-348.1.1.0.1.el5debug-1.4.10-1.el5.x86_64.rpm', u'epoch': u'0', u'version': u'1.4.10', u'release': u'1.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'ocfs2-2.6.18-348.1.1.0.1.el5xen', u'sum': [u'md5', u'0e06173e9ae20aff0ba99eb1d97ca1b6'], u'filename': u'ocfs2-2.6.18-348.1.1.0.1.el5xen-1.4.10-1.el5.x86_64.rpm', u'epoch': u'0', u'version': u'1.4.10', u'release': u'1.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'oracleasm-2.6.18-348.1.1.0.1.el5', u'sum': [u'md5', u'7fc11b83e2aeab1952c43d83247323e1'], u'filename': u'oracleasm-2.6.18-348.1.1.0.1.el5-2.0.5-1.el5.src.rpm', u'epoch': u'0', u'version': u'2.0.5', u'release': u'1.el5', u'arch': u'src'}, {u'src': None, u'name': u'oracleasm-2.6.18-348.1.1.0.1.el5', u'sum': [u'md5', u'97a602827a290d9be0d264d7226cc2fb'], u'filename': u'oracleasm-2.6.18-348.1.1.0.1.el5-2.0.5-1.el5.x86_64.rpm', u'epoch': u'0', u'version': u'2.0.5', u'release': u'1.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'oracleasm-2.6.18-348.1.1.0.1.el5debug', u'sum': [u'md5', u'd585aa7f7cd1a58ef4cb827de9c19bfb'], u'filename': u'oracleasm-2.6.18-348.1.1.0.1.el5debug-2.0.5-1.el5.x86_64.rpm', u'epoch': u'0', u'version': u'2.0.5', u'release': u'1.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'oracleasm-2.6.18-348.1.1.0.1.el5xen', u'sum': [u'md5', u'0534d3b79e799a13db165122783316f1'], u'filename': u'oracleasm-2.6.18-348.1.1.0.1.el5xen-2.0.5-1.el5.x86_64.rpm', u'epoch': u'0', u'version': u'2.0.5', u'release': u'1.el5', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u'[5.0.95-5]\n- Rebuild to fix wrong package tag\nRelated: #892679\n\n[5.0.95-4]\n- Add patches for CVE-2012-2122, CVE-2012-2749, CVE-2012-5611\nResolves: #892679', u'issued': u'2013-01-22', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELSA-2013-0180.html', u'type': u'self', u'id': None, u'title': u'ELSA-2013-0180'}, {u'href': u'http://linux.oracle.com/cve/CVE-2012-2749.html', u'type': u'cve', u'id': u'CVE-2012-2749', u'title': u'CVE-2012-2749'}, {u'href': u'http://linux.oracle.com/cve/CVE-2012-5611.html', u'type': u'cve', u'id': u'CVE-2012-5611', u'title': u'CVE-2012-5611'}], u'_content_type_id': u'erratum', u'_id': u'0b8f56b9-5085-45a2-bd95-9d49ee317f28', u'from': u'el-errata@oss.oracle.com', u'severity': u'Important', u'title': u' mysql security update', u'_ns': u'units_erratum', u'rights': u'Copyright 2013 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 5', u'reboot_suggested': False, u'type': u'security', u'pkglist': [{u'packages': [{u'src': None, u'name': u'mysql', u'sum': [u'md5', u'0b8cc7b4ae4745ab4af2948d124a99d0'], u'filename': u'mysql-5.0.95-5.el5_9.i386.rpm', u'epoch': u'0', u'version': u'5.0.95', u'release': u'5.el5_9', u'arch': u'i386'}, {u'src': None, u'name': u'mysql', u'sum': [u'md5', u'6255d95e447e3ad259c3ecd0c1506817'], u'filename': u'mysql-5.0.95-5.el5_9.src.rpm', u'epoch': u'0', u'version': u'5.0.95', u'release': u'5.el5_9', u'arch': u'src'}, {u'src': None, u'name': u'mysql', u'sum': [u'md5', u'2ecabe4b7a112e51cd25753cf5325be4'], u'filename': u'mysql-5.0.95-5.el5_9.x86_64.rpm', u'epoch': u'0', u'version': u'5.0.95', u'release': u'5.el5_9', u'arch': u'x86_64'}, {u'src': None, u'name': u'mysql-bench', u'sum': [u'md5', u'8ca36eafc9bf975ed046fd088ee20284'], u'filename': u'mysql-bench-5.0.95-5.el5_9.x86_64.rpm', u'epoch': u'0', u'version': u'5.0.95', u'release': u'5.el5_9', u'arch': u'x86_64'}, {u'src': None, u'name': u'mysql-devel', u'sum': [u'md5', u'8f4dbf0f5645590f7f85806aeea9b4e8'], u'filename': u'mysql-devel-5.0.95-5.el5_9.i386.rpm', u'epoch': u'0', u'version': u'5.0.95', u'release': u'5.el5_9', u'arch': u'i386'}, {u'src': None, u'name': u'mysql-devel', u'sum': [u'md5', u'8853e48132c7bb123b3153a17ec00951'], u'filename': u'mysql-devel-5.0.95-5.el5_9.x86_64.rpm', u'epoch': u'0', u'version': u'5.0.95', u'release': u'5.el5_9', u'arch': u'x86_64'}, {u'src': None, u'name': u'mysql-server', u'sum': [u'md5', u'14526c799f1f78be67b7b1685c33f622'], u'filename': u'mysql-server-5.0.95-5.el5_9.x86_64.rpm', u'epoch': u'0', u'version': u'5.0.95', u'release': u'5.el5_9', u'arch': u'x86_64'}, {u'src': None, u'name': u'mysql-test', u'sum': [u'md5', u'111e476f0c1041726a700080bd5f09af'], u'filename': u'mysql-test-5.0.95-5.el5_9.x86_64.rpm', u'epoch': u'0', u'version': u'5.0.95', u'release': u'5.el5_9', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u'[2.1.3-5.2]\n- Add missing man page option --ca-cert-file. (#878217)\n\n[2.1.3-5.1]\n- Fix python syntax backport issue in CVE patch. (#878217)\n\n[2.1.3-5]\n- Use secure method to retrieve IPA CA during client enrollment.\n CVE-2012-5484 (#878217)', u'issued': u'2013-01-23', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELSA-2013-0189.html', u'type': u'self', u'id': None, u'title': u'ELSA-2013-0189'}, {u'href': u'http://linux.oracle.com/cve/CVE-2012-5484.html', u'type': u'cve', u'id': u'CVE-2012-5484', u'title': u'CVE-2012-5484'}], u'_content_type_id': u'erratum', u'_id': u'fc177f74-39b2-4016-97cd-2d298badf165', u'from': u'el-errata@oss.oracle.com', u'severity': u'Important', u'title': u' ipa-client security update', u'_ns': u'units_erratum', u'rights': u'Copyright 2013 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 5', u'reboot_suggested': False, u'type': u'security', u'pkglist': [{u'packages': [{u'src': None, u'name': u'ipa-client', u'sum': [u'md5', u'49a5363e091b0b95701ed6f302615d3a'], u'filename': u'ipa-client-2.1.3-5.el5_9.2.src.rpm', u'epoch': u'0', u'version': u'2.1.3', u'release': u'5.el5_9.2', u'arch': u'src'}, {u'src': None, u'name': u'ipa-client', u'sum': [u'md5', u'805ab1ea8aaeb64967164950cee5b2de'], u'filename': u'ipa-client-2.1.3-5.el5_9.2.x86_64.rpm', u'epoch': u'0', u'version': u'2.1.3', u'release': u'5.el5_9.2', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u'nspr\n[4.9.2-2]\n- NVR bump\n\n[4.9.2-1]\n- Resolves: rhbz#893372- [RFE] Rebase nspr to 4.9.2 due to Firefox 17 ESR\n\nnss\n[3.13.6-3]\n- Fix changelog inconsistencies with commit and bug resolved\n- Resolves: rhbz#891149 [CVE-2013-0743]\n\n[3.13.6-2]\n- [CVE-2013-0743] - Resolves: rhbz#891149 - Dis-trust TURKTRUST mis-issued *.google.com certificate\n\n[3.13.6-1]\n- Update to NSS_3_13_6_RTM\n- Resolves: rhbz#893371 - [RFE] [RHEL5] Rebase to NSS >= 3.13.6', u'issued': u'2013-01-31', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELSA-2013-0214.html', u'type': u'self', u'id': None, u'title': u'ELSA-2013-0214'}], u'_content_type_id': u'erratum', u'_id': u'a1b95bd2-776e-4536-ad7f-4008abd3e30a', u'from': u'el-errata@oss.oracle.com', u'severity': u'Important', u'title': u' nss and nspr security, bug fix, and enhancement update', u'_ns': u'units_erratum', u'rights': u'Copyright 2013 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 5', u'reboot_suggested': False, u'type': u'security', u'pkglist': [{u'packages': [{u'src': None, u'name': u'nspr', u'sum': [u'md5', u'1b2605e65936873daf7327064e840ab9'], u'filename': u'nspr-4.9.2-2.el5_9.i386.rpm', u'epoch': u'0', u'version': u'4.9.2', u'release': u'2.el5_9', u'arch': u'i386'}, {u'src': None, u'name': u'nspr', u'sum': [u'md5', u'fc7ececaee0d58397b80de32266c55e7'], u'filename': u'nspr-4.9.2-2.el5_9.src.rpm', u'epoch': u'0', u'version': u'4.9.2', u'release': u'2.el5_9', u'arch': u'src'}, {u'src': None, u'name': u'nspr', u'sum': [u'md5', u'5269f2905efb8bd2278e703c7591ecab'], u'filename': u'nspr-4.9.2-2.el5_9.x86_64.rpm', u'epoch': u'0', u'version': u'4.9.2', u'release': u'2.el5_9', u'arch': u'x86_64'}, {u'src': None, u'name': u'nspr-devel', u'sum': [u'md5', u'ba2f4612020e42b9d28a16b56cc03a4b'], u'filename': u'nspr-devel-4.9.2-2.el5_9.i386.rpm', u'epoch': u'0', u'version': u'4.9.2', u'release': u'2.el5_9', u'arch': u'i386'}, {u'src': None, u'name': u'nspr-devel', u'sum': [u'md5', u'67a239a4ef90ac3b4584e502d20971a0'], u'filename': u'nspr-devel-4.9.2-2.el5_9.x86_64.rpm', u'epoch': u'0', u'version': u'4.9.2', u'release': u'2.el5_9', u'arch': u'x86_64'}, {u'src': None, u'name': u'nss', u'sum': [u'md5', u'b0b92d86a5a6828a075ecefdf00be0e0'], u'filename': u'nss-3.13.6-3.el5_9.i386.rpm', u'epoch': u'0', u'version': u'3.13.6', u'release': u'3.el5_9', u'arch': u'i386'}, {u'src': None, u'name': u'nss', u'sum': [u'md5', u'23667500785c3a9eb614c7d5ea67253a'], u'filename': u'nss-3.13.6-3.el5_9.src.rpm', u'epoch': u'0', u'version': u'3.13.6', u'release': u'3.el5_9', u'arch': u'src'}, {u'src': None, u'name': u'nss', u'sum': [u'md5', u'50254ad61139fefe45c37145e8d75ec8'], u'filename': u'nss-3.13.6-3.el5_9.x86_64.rpm', u'epoch': u'0', u'version': u'3.13.6', u'release': u'3.el5_9', u'arch': u'x86_64'}, {u'src': None, u'name': u'nss-devel', u'sum': [u'md5', u'd7a290501a7ec6d2a674b85091f1c724'], u'filename': u'nss-devel-3.13.6-3.el5_9.i386.rpm', u'epoch': u'0', u'version': u'3.13.6', u'release': u'3.el5_9', u'arch': u'i386'}, {u'src': None, u'name': u'nss-devel', u'sum': [u'md5', u'4d4ea555494e585c0bd07ebb1b0f84c8'], u'filename': u'nss-devel-3.13.6-3.el5_9.x86_64.rpm', u'epoch': u'0', u'version': u'3.13.6', u'release': u'3.el5_9', u'arch': u'x86_64'}, {u'src': None, u'name': u'nss-pkcs11-devel', u'sum': [u'md5', u'29cd8303738e500c38ffe27133b26fc5'], u'filename': u'nss-pkcs11-devel-3.13.6-3.el5_9.i386.rpm', u'epoch': u'0', u'version': u'3.13.6', u'release': u'3.el5_9', u'arch': u'i386'}, {u'src': None, u'name': u'nss-pkcs11-devel', u'sum': [u'md5', u'd26331e305dc19fd57b2e07bc523ff7e'], u'filename': u'nss-pkcs11-devel-3.13.6-3.el5_9.x86_64.rpm', u'epoch': u'0', u'version': u'3.13.6', u'release': u'3.el5_9', u'arch': u'x86_64'}, {u'src': None, u'name': u'nss-tools', u'sum': [u'md5', u'5a875b38a4c157c9e7e6661726056fe6'], u'filename': u'nss-tools-3.13.6-3.el5_9.x86_64.rpm', u'epoch': u'0', u'version': u'3.13.6', u'release': u'3.el5_9', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u"[2.3.11-14.el6_3.1]\n- Fix CVE-2012-5669\n (Use correct array size for checking 'glyph_enc')\n- Resolves: #903542\n\n[2.3.11-14]\n- A little change in configure part\n- Related: #723468\n\n[2.3.11-13]\n- Fix CVE-2012-{1126, 1127, 1130, 1131, 1132, 1134, 1136,\n 1137, 1139, 1140, 1141, 1142, 1143, 1144}\n- Properly initialize array 'result' in\n FT_Outline_Get_Orientation()\n- Check bytes per row for overflow in _bdf_parse_glyphs()\n- Resolves: #806269\n\n[2.3.11-12]\n- Add freetype-2.3.11-CVE-2011-3439.patch\n (Various loading fixes.)\n- Resolves: #754012\n\n[2.3.11-11]\n- Add freetype-2.3.11-CVE-2011-3256.patch\n (Handle some border cases.)\n- Resolves: #747084\n\n[2.3.11-10]\n- Use -fno-strict-aliasing instead of __attribute__((__may_alias__))\n- Resolves: #723468\n\n[2.3.11-9]\n- Allow FT_Glyph to alias (to pass Rpmdiff)\n- Resolves: #723468\n\n[2.3.11-8]\n- Add freetype-2.3.11-CVE-2011-0226.patch\n (Add better argument check for 'callothersubr'.)\n - based on patches by Werner Lemberg,\n Alexei Podtelezhnikov and Matthias Drochner\n- Resolves: #723468\n\n[2.3.11-7]\n- Add freetype-2.3.11-CVE-2010-3855.patch\n (Protect against invalid 'runcnt' values.)\n- Resolves: #651762", u'issued': u'2013-01-31', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELSA-2013-0216.html', u'type': u'self', u'id': None, u'title': u'ELSA-2013-0216'}, {u'href': u'http://linux.oracle.com/cve/CVE-2012-5669.html', u'type': u'cve', u'id': u'CVE-2012-5669', u'title': u'CVE-2012-5669'}], u'_content_type_id': u'erratum', u'_id': u'f952d61b-c793-4866-8955-8495231ac0f1', u'from': u'el-errata@oss.oracle.com', u'severity': u'Important', u'title': u' freetype security update', u'_ns': u'units_erratum', u'rights': u'Copyright 2013 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 6', u'reboot_suggested': False, u'type': u'security', u'pkglist': [{u'packages': [{u'src': None, u'name': u'freetype', u'sum': [u'md5', u'1af7a087a6852c18cd17835a238764ab'], u'filename': u'freetype-2.3.11-14.el6_3.1.i686.rpm', u'epoch': u'0', u'version': u'2.3.11', u'release': u'14.el6_3.1', u'arch': u'i686'}, {u'src': None, u'name': u'freetype', u'sum': [u'md5', u'dc086f01cee0d406ab63a9a212d37e35'], u'filename': u'freetype-2.3.11-14.el6_3.1.src.rpm', u'epoch': u'0', u'version': u'2.3.11', u'release': u'14.el6_3.1', u'arch': u'src'}, {u'src': None, u'name': u'freetype', u'sum': [u'md5', u'e7c2349724f507e56ff9561865c2816b'], u'filename': u'freetype-2.3.11-14.el6_3.1.x86_64.rpm', u'epoch': u'0', u'version': u'2.3.11', u'release': u'14.el6_3.1', u'arch': u'x86_64'}, {u'src': None, u'name': u'freetype-demos', u'sum': [u'md5', u'7d6e0d39dbdede3459fe214912c41977'], u'filename': u'freetype-demos-2.3.11-14.el6_3.1.x86_64.rpm', u'epoch': u'0', u'version': u'2.3.11', u'release': u'14.el6_3.1', u'arch': u'x86_64'}, {u'src': None, u'name': u'freetype-devel', u'sum': [u'md5', u'a6cbfaf62343dd988b147a6fa66b73f6'], u'filename': u'freetype-devel-2.3.11-14.el6_3.1.i686.rpm', u'epoch': u'0', u'version': u'2.3.11', u'release': u'14.el6_3.1', u'arch': u'i686'}, {u'src': None, u'name': u'freetype-devel', u'sum': [u'md5', u'115881ba6d5b1f76c63cd3def347a8b4'], u'filename': u'freetype-devel-2.3.11-14.el6_3.1.x86_64.rpm', u'epoch': u'0', u'version': u'2.3.11', u'release': u'14.el6_3.1', u'arch': u'x86_64'}], u'name': u'ol6_x86_64_latest', u'short': u'ol6_x86_64_latest'}, {u'packages': [{u'src': None, u'name': u'freetype', u'sum': [u'md5', u'51330ac53d2d5e32bcc136c3a556a195'], u'filename': u'freetype-2.2.1-32.el5_9.1.i386.rpm', u'epoch': u'0', u'version': u'2.2.1', u'release': u'32.el5_9.1', u'arch': u'i386'}, {u'src': None, u'name': u'freetype', u'sum': [u'md5', u'1ee7ae6fb5eb3191884072a73f2e299b'], u'filename': u'freetype-2.2.1-32.el5_9.1.src.rpm', u'epoch': u'0', u'version': u'2.2.1', u'release': u'32.el5_9.1', u'arch': u'src'}, {u'src': None, u'name': u'freetype', u'sum': [u'md5', u'a6f699d19b41ece2f6e206d4cab7370a'], u'filename': u'freetype-2.2.1-32.el5_9.1.x86_64.rpm', u'epoch': u'0', u'version': u'2.2.1', u'release': u'32.el5_9.1', u'arch': u'x86_64'}, {u'src': None, u'name': u'freetype-demos', u'sum': [u'md5', u'ec1239c5f73d75f65a09aca9515392d8'], u'filename': u'freetype-demos-2.2.1-32.el5_9.1.x86_64.rpm', u'epoch': u'0', u'version': u'2.2.1', u'release': u'32.el5_9.1', u'arch': u'x86_64'}, {u'src': None, u'name': u'freetype-devel', u'sum': [u'md5', u'ba3bb34ee528d3be994494f9646c9707'], u'filename': u'freetype-devel-2.2.1-32.el5_9.1.i386.rpm', u'epoch': u'0', u'version': u'2.2.1', u'release': u'32.el5_9.1', u'arch': u'i386'}, {u'src': None, u'name': u'freetype-devel', u'sum': [u'md5', u'fb77f8d5ee8730fd37c3f164c822a9cd'], u'filename': u'freetype-devel-2.2.1-32.el5_9.1.x86_64.rpm', u'epoch': u'0', u'version': u'2.2.1', u'release': u'32.el5_9.1', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u'[3.0.3-142.el5_9.1]\n- libxc: move error checking next to the function which returned the error (rhbz 876997)\n- libxc: builder: limit maximum size of kernel/ramdisk (rhbz 876997)', u'issued': u'2013-02-07', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELSA-2013-0241.html', u'type': u'self', u'id': None, u'title': u'ELSA-2013-0241'}, {u'href': u'http://linux.oracle.com/cve/CVE-2012-4544.html', u'type': u'cve', u'id': u'CVE-2012-4544', u'title': u'CVE-2012-4544'}], u'_content_type_id': u'erratum', u'_id': u'117bb653-235b-47e0-9138-9bc1d27d1bb1', u'from': u'el-errata@oss.oracle.com', u'severity': u'Moderate', u'title': u' xen security update', u'_ns': u'units_erratum', u'rights': u'Copyright 2013 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 5', u'reboot_suggested': False, u'type': u'security', u'pkglist': [{u'packages': [{u'src': None, u'name': u'xen', u'sum': [u'md5', u'2af1ed644972b64645b33f8689d15b30'], u'filename': u'xen-3.0.3-142.el5_9.1.src.rpm', u'epoch': u'0', u'version': u'3.0.3', u'release': u'142.el5_9.1', u'arch': u'src'}, {u'src': None, u'name': u'xen', u'sum': [u'md5', u'd42547ed9ec60c1ca5acba818c7ad7a4'], u'filename': u'xen-3.0.3-142.el5_9.1.x86_64.rpm', u'epoch': u'0', u'version': u'3.0.3', u'release': u'142.el5_9.1', u'arch': u'x86_64'}, {u'src': None, u'name': u'xen-devel', u'sum': [u'md5', u'c584edbef0fd93e24d0b4214c8f8b344'], u'filename': u'xen-devel-3.0.3-142.el5_9.1.i386.rpm', u'epoch': u'0', u'version': u'3.0.3', u'release': u'142.el5_9.1', u'arch': u'i386'}, {u'src': None, u'name': u'xen-devel', u'sum': [u'md5', u'eabf9e274d34a3c7dc5e7f5692837217'], u'filename': u'xen-devel-3.0.3-142.el5_9.1.x86_64.rpm', u'epoch': u'0', u'version': u'3.0.3', u'release': u'142.el5_9.1', u'arch': u'x86_64'}, {u'src': None, u'name': u'xen-libs', u'sum': [u'md5', u'5c4caf33ba629ea01895162c06c0ae59'], u'filename': u'xen-libs-3.0.3-142.el5_9.1.i386.rpm', u'epoch': u'0', u'version': u'3.0.3', u'release': u'142.el5_9.1', u'arch': u'i386'}, {u'src': None, u'name': u'xen-libs', u'sum': [u'md5', u'c9e65329094f825dee0724656d91b204'], u'filename': u'xen-libs-3.0.3-142.el5_9.1.x86_64.rpm', u'epoch': u'0', u'version': u'3.0.3', u'release': u'142.el5_9.1', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u'[ 1:1.6.0.0-1.33.1.11.6.0.1.el5_9]\n- Add oracle-enterprise.patch\n\n[1:1.6.0.0-1.33.1.11.6]\n- removed patch9 revertTwoWrongSecurityPatches2013-02-06.patch\n- added patch9: 7201064.patch to be reverted\n- added patch10: 8005615.patch to fix the 6664509.patch\n- Resolves: rhbz#906705\n\n[1:1.6.0.0-1.32.1.11.6]\n- added patch9 revertTwoWrongSecurityPatches2013-02-06.patch\n to remove 6664509 and 7201064 from 1.11.6 tarball\n- Resolves: rhbz#906705\n\n[1:1.6.0.0-1.31.1.11.6]\n- Updated to icedtea6 1.11.6\n- Rewritten java-1.6.0-openjdk-java-access-bridge-security.patch\n- Resolves: rhbz#906705', u'issued': u'2013-02-08', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELSA-2013-0246.html', u'type': u'self', u'id': None, u'title': u'ELSA-2013-0246'}, {u'href': u'http://linux.oracle.com/cve/CVE-2013-0424.html', u'type': u'cve', u'id': u'CVE-2013-0424', u'title': u'CVE-2013-0424'}, {u'href': u'http://linux.oracle.com/cve/CVE-2013-0425.html', u'type': u'cve', u'id': u'CVE-2013-0425', u'title': u'CVE-2013-0425'}, {u'href': u'http://linux.oracle.com/cve/CVE-2013-0426.html', u'type': u'cve', u'id': u'CVE-2013-0426', u'title': u'CVE-2013-0426'}, {u'href': u'http://linux.oracle.com/cve/CVE-2013-0427.html', u'type': u'cve', u'id': u'CVE-2013-0427', u'title': u'CVE-2013-0427'}, {u'href': u'http://linux.oracle.com/cve/CVE-2013-0428.html', u'type': u'cve', u'id': u'CVE-2013-0428', u'title': u'CVE-2013-0428'}, {u'href': u'http://linux.oracle.com/cve/CVE-2013-0429.html', u'type': u'cve', u'id': u'CVE-2013-0429', u'title': u'CVE-2013-0429'}, {u'href': u'http://linux.oracle.com/cve/CVE-2013-0432.html', u'type': u'cve', u'id': u'CVE-2013-0432', u'title': u'CVE-2013-0432'}, {u'href': u'http://linux.oracle.com/cve/CVE-2013-0433.html', u'type': u'cve', u'id': u'CVE-2013-0433', u'title': u'CVE-2013-0433'}, {u'href': u'http://linux.oracle.com/cve/CVE-2013-0434.html', u'type': u'cve', u'id': u'CVE-2013-0434', u'title': u'CVE-2013-0434'}, {u'href': u'http://linux.oracle.com/cve/CVE-2013-0435.html', u'type': u'cve', u'id': u'CVE-2013-0435', u'title': u'CVE-2013-0435'}, {u'href': u'http://linux.oracle.com/cve/CVE-2013-0440.html', u'type': u'cve', u'id': u'CVE-2013-0440', u'title': u'CVE-2013-0440'}, {u'href': u'http://linux.oracle.com/cve/CVE-2013-0441.html', u'type': u'cve', u'id': u'CVE-2013-0441', u'title': u'CVE-2013-0441'}, {u'href': u'http://linux.oracle.com/cve/CVE-2013-0442.html', u'type': u'cve', u'id': u'CVE-2013-0442', u'title': u'CVE-2013-0442'}, {u'href': u'http://linux.oracle.com/cve/CVE-2013-0443.html', u'type': u'cve', u'id': u'CVE-2013-0443', u'title': u'CVE-2013-0443'}, {u'href': u'http://linux.oracle.com/cve/CVE-2013-0445.html', u'type': u'cve', u'id': u'CVE-2013-0445', u'title': u'CVE-2013-0445'}, {u'href': u'http://linux.oracle.com/cve/CVE-2013-0450.html', u'type': u'cve', u'id': u'CVE-2013-0450', u'title': u'CVE-2013-0450'}, {u'href': u'http://linux.oracle.com/cve/CVE-2013-1475.html', u'type': u'cve', u'id': u'CVE-2013-1475', u'title': u'CVE-2013-1475'}, {u'href': u'http://linux.oracle.com/cve/CVE-2013-1476.html', u'type': u'cve', u'id': u'CVE-2013-1476', u'title': u'CVE-2013-1476'}, {u'href': u'http://linux.oracle.com/cve/CVE-2013-1478.html', u'type': u'cve', u'id': u'CVE-2013-1478', u'title': u'CVE-2013-1478'}, {u'href': u'http://linux.oracle.com/cve/CVE-2013-1480.html', u'type': u'cve', u'id': u'CVE-2013-1480', u'title': u'CVE-2013-1480'}], u'_content_type_id': u'erratum', u'_id': u'c2597aee-7e8d-4d88-bf1d-9cc789436ed0', u'from': u'el-errata@oss.oracle.com', u'severity': u'Important', u'title': u' java-1.6.0-openjdk security update', u'_ns': u'units_erratum', u'rights': u'Copyright 2013 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 5', u'reboot_suggested': False, u'type': u'security', u'pkglist': [{u'packages': [{u'src': None, u'name': u'java-1.6.0-openjdk', u'sum': [u'md5', u'450d13e2d2e5b1ba0323f1a67b1bee10'], u'filename': u'java-1.6.0-openjdk-1.6.0.0-1.33.1.11.6.0.1.el5_9.src.rpm', u'epoch': u'1', u'version': u'1.6.0.0', u'release': u'1.33.1.11.6.0.1.el5_9', u'arch': u'src'}, {u'src': None, u'name': u'java-1.6.0-openjdk', u'sum': [u'md5', u'404fa4b12d2169b1b6d7483d95cfa111'], u'filename': u'java-1.6.0-openjdk-1.6.0.0-1.33.1.11.6.0.1.el5_9.x86_64.rpm', u'epoch': u'1', u'version': u'1.6.0.0', u'release': u'1.33.1.11.6.0.1.el5_9', u'arch': u'x86_64'}, {u'src': None, u'name': u'java-1.6.0-openjdk-demo', u'sum': [u'md5', u'af89d8c1e476c77671aa60315cd50f3d'], u'filename': u'java-1.6.0-openjdk-demo-1.6.0.0-1.33.1.11.6.0.1.el5_9.x86_64.rpm', u'epoch': u'1', u'version': u'1.6.0.0', u'release': u'1.33.1.11.6.0.1.el5_9', u'arch': u'x86_64'}, {u'src': None, u'name': u'java-1.6.0-openjdk-devel', u'sum': [u'md5', u'2ba6a703c677c8ca67702ec6220025c7'], u'filename': u'java-1.6.0-openjdk-devel-1.6.0.0-1.33.1.11.6.0.1.el5_9.x86_64.rpm', u'epoch': u'1', u'version': u'1.6.0.0', u'release': u'1.33.1.11.6.0.1.el5_9', u'arch': u'x86_64'}, {u'src': None, u'name': u'java-1.6.0-openjdk-javadoc', u'sum': [u'md5', u'4b64cab07e9cb0b426f5facd63a6206a'], u'filename': u'java-1.6.0-openjdk-javadoc-1.6.0.0-1.33.1.11.6.0.1.el5_9.x86_64.rpm', u'epoch': u'1', u'version': u'1.6.0.0', u'release': u'1.33.1.11.6.0.1.el5_9', u'arch': u'x86_64'}, {u'src': None, u'name': u'java-1.6.0-openjdk-src', u'sum': [u'md5', u'b7d075ce5c8d886962a5632ba14b9e3c'], u'filename': u'java-1.6.0-openjdk-src-1.6.0.0-1.33.1.11.6.0.1.el5_9.x86_64.rpm', u'epoch': u'1', u'version': u'1.6.0.0', u'release': u'1.33.1.11.6.0.1.el5_9', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u'[1.7.0.9-2.3.5.3.0.1.el6_3]\n- Update DISTRO_NAME in specfile\n\n[1.7.0.9-2.3.5.3.el6_3]\n- Sync logging fixes with upstream (icedtea7-forest and jdk7u)\n\n[1.7.0.9-2.3.5.1.el6_3]\n- Removed 6664509 backout and added 8005615 to fix the issue\n\n[1.7.0.9-2.3.5.el6_3.1]\n- Backed out 6664509 and 7201064.patch which cause regressions\n\n[1.7.0.9-2.3.5.el6_3]\n- Bumped to 2.3.5\n- Changed BR to java7-devel >= 1:1.7.0 as required by CORBA changes in 2.3.5\n- Resolves: rhbz#906707', u'issued': u'2013-02-08', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELSA-2013-0247.html', u'type': u'self', u'id': None, u'title': u'ELSA-2013-0247'}, {u'href': u'http://linux.oracle.com/cve/CVE-2013-0424.html', u'type': u'cve', u'id': u'CVE-2013-0424', u'title': u'CVE-2013-0424'}, {u'href': u'http://linux.oracle.com/cve/CVE-2013-0425.html', u'type': u'cve', u'id': u'CVE-2013-0425', u'title': u'CVE-2013-0425'}, {u'href': u'http://linux.oracle.com/cve/CVE-2013-0426.html', u'type': u'cve', u'id': u'CVE-2013-0426', u'title': u'CVE-2013-0426'}, {u'href': u'http://linux.oracle.com/cve/CVE-2013-0427.html', u'type': u'cve', u'id': u'CVE-2013-0427', u'title': u'CVE-2013-0427'}, {u'href': u'http://linux.oracle.com/cve/CVE-2013-0428.html', u'type': u'cve', u'id': u'CVE-2013-0428', u'title': u'CVE-2013-0428'}, {u'href': u'http://linux.oracle.com/cve/CVE-2013-0429.html', u'type': u'cve', u'id': u'CVE-2013-0429', u'title': u'CVE-2013-0429'}, {u'href': u'http://linux.oracle.com/cve/CVE-2013-0432.html', u'type': u'cve', u'id': u'CVE-2013-0432', u'title': u'CVE-2013-0432'}, {u'href': u'http://linux.oracle.com/cve/CVE-2013-0433.html', u'type': u'cve', u'id': u'CVE-2013-0433', u'title': u'CVE-2013-0433'}, {u'href': u'http://linux.oracle.com/cve/CVE-2013-0434.html', u'type': u'cve', u'id': u'CVE-2013-0434', u'title': u'CVE-2013-0434'}, {u'href': u'http://linux.oracle.com/cve/CVE-2013-0435.html', u'type': u'cve', u'id': u'CVE-2013-0435', u'title': u'CVE-2013-0435'}, {u'href': u'http://linux.oracle.com/cve/CVE-2013-0440.html', u'type': u'cve', u'id': u'CVE-2013-0440', u'title': u'CVE-2013-0440'}, {u'href': u'http://linux.oracle.com/cve/CVE-2013-0441.html', u'type': u'cve', u'id': u'CVE-2013-0441', u'title': u'CVE-2013-0441'}, {u'href': u'http://linux.oracle.com/cve/CVE-2013-0442.html', u'type': u'cve', u'id': u'CVE-2013-0442', u'title': u'CVE-2013-0442'}, {u'href': u'http://linux.oracle.com/cve/CVE-2013-0443.html', u'type': u'cve', u'id': u'CVE-2013-0443', u'title': u'CVE-2013-0443'}, {u'href': u'http://linux.oracle.com/cve/CVE-2013-0445.html', u'type': u'cve', u'id': u'CVE-2013-0445', u'title': u'CVE-2013-0445'}, {u'href': u'http://linux.oracle.com/cve/CVE-2013-0450.html', u'type': u'cve', u'id': u'CVE-2013-0450', u'title': u'CVE-2013-0450'}, {u'href': u'http://linux.oracle.com/cve/CVE-2013-1475.html', u'type': u'cve', u'id': u'CVE-2013-1475', u'title': u'CVE-2013-1475'}, {u'href': u'http://linux.oracle.com/cve/CVE-2013-1476.html', u'type': u'cve', u'id': u'CVE-2013-1476', u'title': u'CVE-2013-1476'}, {u'href': u'http://linux.oracle.com/cve/CVE-2013-1478.html', u'type': u'cve', u'id': u'CVE-2013-1478', u'title': u'CVE-2013-1478'}, {u'href': u'http://linux.oracle.com/cve/CVE-2013-1480.html', u'type': u'cve', u'id': u'CVE-2013-1480', u'title': u'CVE-2013-1480'}, {u'href': u'http://linux.oracle.com/cve/CVE-2013-0431.html', u'type': u'cve', u'id': u'CVE-2013-0431', u'title': u'CVE-2013-0431'}, {u'href': u'http://linux.oracle.com/cve/CVE-2013-0444.html', u'type': u'cve', u'id': u'CVE-2013-0444', u'title': u'CVE-2013-0444'}], u'_content_type_id': u'erratum', u'_id': u'66ce5144-d4b9-4435-b0aa-236fe9acaca3', u'from': u'el-errata@oss.oracle.com', u'severity': u'Important', u'title': u' java-1.7.0-openjdk security update', u'_ns': u'units_erratum', u'rights': u'Copyright 2013 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 6', u'reboot_suggested': False, u'type': u'security', u'pkglist': [{u'packages': [{u'src': None, u'name': u'java-1.7.0-openjdk', u'sum': [u'md5', u'04800dd2bfb97168e07555641e8bf446'], u'filename': u'java-1.7.0-openjdk-1.7.0.9-2.3.5.3.0.1.el6_3.src.rpm', u'epoch': u'1', u'version': u'1.7.0.9', u'release': u'2.3.5.3.0.1.el6_3', u'arch': u'src'}, {u'src': None, u'name': u'java-1.7.0-openjdk', u'sum': [u'md5', u'48cd26b533e8ac41350eb33cb4039325'], u'filename': u'java-1.7.0-openjdk-1.7.0.9-2.3.5.3.0.1.el6_3.x86_64.rpm', u'epoch': u'1', u'version': u'1.7.0.9', u'release': u'2.3.5.3.0.1.el6_3', u'arch': u'x86_64'}, {u'src': None, u'name': u'java-1.7.0-openjdk-demo', u'sum': [u'md5', u'0d14a0127f1e60541395e7330c2f66a0'], u'filename': u'java-1.7.0-openjdk-demo-1.7.0.9-2.3.5.3.0.1.el6_3.x86_64.rpm', u'epoch': u'1', u'version': u'1.7.0.9', u'release': u'2.3.5.3.0.1.el6_3', u'arch': u'x86_64'}, {u'src': None, u'name': u'java-1.7.0-openjdk-devel', u'sum': [u'md5', u'c9f58fad0204a07636b30751d07d06ad'], u'filename': u'java-1.7.0-openjdk-devel-1.7.0.9-2.3.5.3.0.1.el6_3.x86_64.rpm', u'epoch': u'1', u'version': u'1.7.0.9', u'release': u'2.3.5.3.0.1.el6_3', u'arch': u'x86_64'}, {u'src': None, u'name': u'java-1.7.0-openjdk-javadoc', u'sum': [u'md5', u'a64949e2768f4893c9eacb0df8315e0e'], u'filename': u'java-1.7.0-openjdk-javadoc-1.7.0.9-2.3.5.3.0.1.el6_3.noarch.rpm', u'epoch': u'1', u'version': u'1.7.0.9', u'release': u'2.3.5.3.0.1.el6_3', u'arch': u'noarch'}, {u'src': None, u'name': u'java-1.7.0-openjdk-src', u'sum': [u'md5', u'4f5b132ca61ceb74731ebe1158ec4146'], u'filename': u'java-1.7.0-openjdk-src-1.7.0.9-2.3.5.3.0.1.el6_3.x86_64.rpm', u'epoch': u'1', u'version': u'1.7.0.9', u'release': u'2.3.5.3.0.1.el6_3', u'arch': u'x86_64'}], u'name': u'ol6_x86_64_latest', u'short': u'ol6_x86_64_latest'}, {u'packages': [{u'src': None, u'name': u'java-1.7.0-openjdk', u'sum': [u'md5', u'8cd62d8393084f7ad04bd9381a207499'], u'filename': u'java-1.7.0-openjdk-1.7.0.9-2.3.5.3.0.1.el5_9.src.rpm', u'epoch': u'1', u'version': u'1.7.0.9', u'release': u'2.3.5.3.0.1.el5_9', u'arch': u'src'}, {u'src': None, u'name': u'java-1.7.0-openjdk', u'sum': [u'md5', u'57b865d60b0665d585cd60c50693d2f0'], u'filename': u'java-1.7.0-openjdk-1.7.0.9-2.3.5.3.0.1.el5_9.x86_64.rpm', u'epoch': u'1', u'version': u'1.7.0.9', u'release': u'2.3.5.3.0.1.el5_9', u'arch': u'x86_64'}, {u'src': None, u'name': u'java-1.7.0-openjdk-demo', u'sum': [u'md5', u'6fe1fb93b9d9ee59c02ae07b0500b9dc'], u'filename': u'java-1.7.0-openjdk-demo-1.7.0.9-2.3.5.3.0.1.el5_9.x86_64.rpm', u'epoch': u'1', u'version': u'1.7.0.9', u'release': u'2.3.5.3.0.1.el5_9', u'arch': u'x86_64'}, {u'src': None, u'name': u'java-1.7.0-openjdk-devel', u'sum': [u'md5', u'8aaabfe4f2ad109f3d912fffa6fd05ec'], u'filename': u'java-1.7.0-openjdk-devel-1.7.0.9-2.3.5.3.0.1.el5_9.x86_64.rpm', u'epoch': u'1', u'version': u'1.7.0.9', u'release': u'2.3.5.3.0.1.el5_9', u'arch': u'x86_64'}, {u'src': None, u'name': u'java-1.7.0-openjdk-javadoc', u'sum': [u'md5', u'54fff386cd464ae9f5a4c496b0180345'], u'filename': u'java-1.7.0-openjdk-javadoc-1.7.0.9-2.3.5.3.0.1.el5_9.x86_64.rpm', u'epoch': u'1', u'version': u'1.7.0.9', u'release': u'2.3.5.3.0.1.el5_9', u'arch': u'x86_64'}, {u'src': None, u'name': u'java-1.7.0-openjdk-src', u'sum': [u'md5', u'd9e9058ad7e1774bbef0438929b41e9d'], u'filename': u'java-1.7.0-openjdk-src-1.7.0.9-2.3.5.3.0.1.el5_9.x86_64.rpm', u'epoch': u'1', u'version': u'1.7.0.9', u'release': u'2.3.5.3.0.1.el5_9', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u'[0.12-0.21.pre5]\n- do not delegate GSSAPI credentials (CVE-2012-4545)', u'issued': u'2013-02-11', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELSA-2013-0250.html', u'type': u'self', u'id': None, u'title': u'ELSA-2013-0250'}, {u'href': u'http://linux.oracle.com/cve/CVE-2012-4545.html', u'type': u'cve', u'id': u'CVE-2012-4545', u'title': u'CVE-2012-4545'}], u'_content_type_id': u'erratum', u'_id': u'28d0d110-da22-4713-9035-1c156847958a', u'from': u'el-errata@oss.oracle.com', u'severity': u'Moderate', u'title': u' elinks security update', u'_ns': u'units_erratum', u'rights': u'Copyright 2013 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 6', u'reboot_suggested': False, u'type': u'security', u'pkglist': [{u'packages': [{u'src': None, u'name': u'elinks', u'sum': [u'md5', u'177e9b55fe4bec001c859c6823738cc2'], u'filename': u'elinks-0.12-0.21.pre5.el6_3.src.rpm', u'epoch': u'0', u'version': u'0.12', u'release': u'0.21.pre5.el6_3', u'arch': u'src'}, {u'src': None, u'name': u'elinks', u'sum': [u'md5', u'07260cfdb6b95e9dd675bd8614248385'], u'filename': u'elinks-0.12-0.21.pre5.el6_3.x86_64.rpm', u'epoch': u'0', u'version': u'0.12', u'release': u'0.21.pre5.el6_3', u'arch': u'x86_64'}], u'name': u'ol6_x86_64_latest', u'short': u'ol6_x86_64_latest'}, {u'packages': [{u'src': None, u'name': u'elinks', u'sum': [u'md5', u'83ebd5a1273887296bcb4b451d934d47'], u'filename': u'elinks-0.11.1-8.el5_9.src.rpm', u'epoch': u'0', u'version': u'0.11.1', u'release': u'8.el5_9', u'arch': u'src'}, {u'src': None, u'name': u'elinks', u'sum': [u'md5', u'097eea35b829803a3278d1158ffc4ea8'], u'filename': u'elinks-0.11.1-8.el5_9.x86_64.rpm', u'epoch': u'0', u'version': u'0.11.1', u'release': u'8.el5_9', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u'[1:3.1-0.7]\n- Add missing connection hostname check against X.509 certificate name\n- Resolves: CVE-2012-5783', u'issued': u'2013-02-19', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELSA-2013-0270.html', u'type': u'self', u'id': None, u'title': u'ELSA-2013-0270'}, {u'href': u'http://linux.oracle.com/cve/CVE-2012-5783.html', u'type': u'cve', u'id': u'CVE-2012-5783', u'title': u'CVE-2012-5783'}], u'_content_type_id': u'erratum', u'_id': u'84e837dd-04b3-4c92-b941-8a5c24ae2b81', u'from': u'el-errata@oss.oracle.com', u'severity': u'Moderate', u'title': u' jakarta-commons-httpclient security update', u'_ns': u'units_erratum', u'rights': u'Copyright 2013 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 6', u'reboot_suggested': False, u'type': u'security', u'pkglist': [{u'packages': [{u'src': None, u'name': u'jakarta-commons-httpclient', u'sum': [u'md5', u'a4896e45bfa3bfcaa52262910c72b995'], u'filename': u'jakarta-commons-httpclient-3.1-0.7.el6_3.src.rpm', u'epoch': u'1', u'version': u'3.1', u'release': u'0.7.el6_3', u'arch': u'src'}, {u'src': None, u'name': u'jakarta-commons-httpclient', u'sum': [u'md5', u'b111162cb096848bd5d03b7eb9395a96'], u'filename': u'jakarta-commons-httpclient-3.1-0.7.el6_3.x86_64.rpm', u'epoch': u'1', u'version': u'3.1', u'release': u'0.7.el6_3', u'arch': u'x86_64'}, {u'src': None, u'name': u'jakarta-commons-httpclient-demo', u'sum': [u'md5', u'6e54c564d62ffd4e139e38904f6a72d5'], u'filename': u'jakarta-commons-httpclient-demo-3.1-0.7.el6_3.x86_64.rpm', u'epoch': u'1', u'version': u'3.1', u'release': u'0.7.el6_3', u'arch': u'x86_64'}, {u'src': None, u'name': u'jakarta-commons-httpclient-javadoc', u'sum': [u'md5', u'50405ab2e4b31bf93208635b1b48bdab'], u'filename': u'jakarta-commons-httpclient-javadoc-3.1-0.7.el6_3.x86_64.rpm', u'epoch': u'1', u'version': u'3.1', u'release': u'0.7.el6_3', u'arch': u'x86_64'}, {u'src': None, u'name': u'jakarta-commons-httpclient-manual', u'sum': [u'md5', u'c2fbb8760c5ed17ffa1e77884e90a238'], u'filename': u'jakarta-commons-httpclient-manual-3.1-0.7.el6_3.x86_64.rpm', u'epoch': u'1', u'version': u'3.1', u'release': u'0.7.el6_3', u'arch': u'x86_64'}], u'name': u'ol6_x86_64_latest', u'short': u'ol6_x86_64_latest'}, {u'packages': [{u'src': None, u'name': u'jakarta-commons-httpclient', u'sum': [u'md5', u'cced3f9886d383f130e676a98305c79e'], u'filename': u'jakarta-commons-httpclient-3.0-7jpp.2.src.rpm', u'epoch': u'1', u'version': u'3.0', u'release': u'7jpp.2', u'arch': u'src'}, {u'src': None, u'name': u'jakarta-commons-httpclient', u'sum': [u'md5', u'c8bd0d6c7ec1cf68b6ae26da7448ce6d'], u'filename': u'jakarta-commons-httpclient-3.0-7jpp.2.x86_64.rpm', u'epoch': u'1', u'version': u'3.0', u'release': u'7jpp.2', u'arch': u'x86_64'}, {u'src': None, u'name': u'jakarta-commons-httpclient-demo', u'sum': [u'md5', u'95ffc1faf353f359e5137a46f503b9e2'], u'filename': u'jakarta-commons-httpclient-demo-3.0-7jpp.2.x86_64.rpm', u'epoch': u'1', u'version': u'3.0', u'release': u'7jpp.2', u'arch': u'x86_64'}, {u'src': None, u'name': u'jakarta-commons-httpclient-javadoc', u'sum': [u'md5', u'4acadab8f1a14af867c998458e44674c'], u'filename': u'jakarta-commons-httpclient-javadoc-3.0-7jpp.2.x86_64.rpm', u'epoch': u'1', u'version': u'3.0', u'release': u'7jpp.2', u'arch': u'x86_64'}, {u'src': None, u'name': u'jakarta-commons-httpclient-manual', u'sum': [u'md5', u'ec065d64d2f89a889794cd0046b05923'], u'filename': u'jakarta-commons-httpclient-manual-3.0-7jpp.2.x86_64.rpm', u'epoch': u'1', u'version': u'3.0', u'release': u'7jpp.2', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u'firefox\n[17.0.3-1.0.1]\n- Add firefox-oracle-default-prefs.js and remove the corresponding Red Hat ones\n\n[17.0.3-1]\n- Update to 17.0.3 ESR\n\n[17.0.2-4]\n- Added NM preferences\n\n[17.0.2-3]\n- Update to 17.0.2 ESR\n\n[17.0.1-2]\n- Update to 17.0.1 ESR\n\n[17.0-1]\n- Update to 17.0 ESR\n\n[17.0-0.2.b4]\n- Update to 17 Beta 4\n\n[17.0-0.1.beta1]\n- Update to 17 Beta 1\n\n\nlibproxy\n[0.3.0-4]\n- Rebuild against newer gecko\n\nxulrunner\n[17.0.3-1.0.2]\n- Increase release number and rebuild.\n\n[17.0.3-1.0.1]\n- Replaced xulrunner-redhat-default-prefs.js with xulrunner-oracle-default-prefs.js\n- Removed XULRUNNER_VERSION from SOURCE21\n\n[17.0.3-1]\n- Update to 17.0.3 ESR\n\n[17.0.2-5]\n- Fixed NetworkManager preferences\n- Added fix for NM regression (mozbz#791626)\n\n[17.0.2-2]\n- Added fix for rhbz#816234 - NFS fix\n\n[17.0.2-1]\n- Update to 17.0.2 ESR\n\n[17.0.1-3]\n- Update to 17.0.1 ESR\n\n[17.0-1]\n- Update to 17.0 ESR\n\n[17.0-0.6.b5]\n- Update to 17 Beta 5\n- Updated fix for rhbz#872752 - embeded crash\n\n[17.0-0.5.b4]\n- Added fix for rhbz#872752 - embeded crash\n\n[17.0-0.4.b4]\n- Update to 17 Beta 4\n\n[17.0-0.3.b3]\n- Update to 17 Beta 3\n- Updated ppc(64) patch (mozbz#746112)\n\n[17.0-0.2.b2]\n- Built with system nspr/nss\n\n[17.0-0.1.b2]\n- Update to 17 Beta 2\n\n[17.0-0.1.b1]\n- Update to 17 Beta 1\n\nyelp\n[2.28.1-17]\n- Rebuild against gecko 17.0.2\n\n[2.28.1-15]\n- Build fixes for gecko 17', u'issued': u'2013-02-19', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELSA-2013-0271.html', u'type': u'self', u'id': None, u'title': u'ELSA-2013-0271'}, {u'href': u'http://linux.oracle.com/cve/CVE-2013-0775.html', u'type': u'cve', u'id': u'CVE-2013-0775', u'title': u'CVE-2013-0775'}, {u'href': u'http://linux.oracle.com/cve/CVE-2013-0776.html', u'type': u'cve', u'id': u'CVE-2013-0776', u'title': u'CVE-2013-0776'}, {u'href': u'http://linux.oracle.com/cve/CVE-2013-0780.html', u'type': u'cve', u'id': u'CVE-2013-0780', u'title': u'CVE-2013-0780'}, {u'href': u'http://linux.oracle.com/cve/CVE-2013-0782.html', u'type': u'cve', u'id': u'CVE-2013-0782', u'title': u'CVE-2013-0782'}, {u'href': u'http://linux.oracle.com/cve/CVE-2013-0783.html', u'type': u'cve', u'id': u'CVE-2013-0783', u'title': u'CVE-2013-0783'}], u'_content_type_id': u'erratum', u'_id': u'42ec383a-652c-4767-8e86-031a187dfc0d', u'from': u'el-errata@oss.oracle.com', u'severity': u'Critical', u'title': u' firefox security update', u'_ns': u'units_erratum', u'rights': u'Copyright 2013 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 6', u'reboot_suggested': False, u'type': u'security', u'pkglist': [{u'packages': [{u'src': None, u'name': u'firefox', u'sum': [u'md5', u'98cd14c11f85c3b19c51f69c7dfc0129'], u'filename': u'firefox-17.0.3-1.0.1.el6_3.i686.rpm', u'epoch': u'0', u'version': u'17.0.3', u'release': u'1.0.1.el6_3', u'arch': u'i686'}, {u'src': None, u'name': u'firefox', u'sum': [u'md5', u'9bc1e32eb4715c60b0c99fc24a6da7d5'], u'filename': u'firefox-17.0.3-1.0.1.el6_3.src.rpm', u'epoch': u'0', u'version': u'17.0.3', u'release': u'1.0.1.el6_3', u'arch': u'src'}, {u'src': None, u'name': u'firefox', u'sum': [u'md5', u'450cf7f17d2c3c9e86b0ebfdffbd2e36'], u'filename': u'firefox-17.0.3-1.0.1.el6_3.x86_64.rpm', u'epoch': u'0', u'version': u'17.0.3', u'release': u'1.0.1.el6_3', u'arch': u'x86_64'}, {u'src': None, u'name': u'libproxy', u'sum': [u'md5', u'716f1d2d21f5c4424193cd8332099975'], u'filename': u'libproxy-0.3.0-4.el6_3.i686.rpm', u'epoch': u'0', u'version': u'0.3.0', u'release': u'4.el6_3', u'arch': u'i686'}, {u'src': None, u'name': u'libproxy', u'sum': [u'md5', u'037ab95d0f6ac2682277f48d1e7b8857'], u'filename': u'libproxy-0.3.0-4.el6_3.src.rpm', u'epoch': u'0', u'version': u'0.3.0', u'release': u'4.el6_3', u'arch': u'src'}, {u'src': None, u'name': u'libproxy', u'sum': [u'md5', u'1cdb15d74e4732d4ef3921cd3fa47506'], u'filename': u'libproxy-0.3.0-4.el6_3.x86_64.rpm', u'epoch': u'0', u'version': u'0.3.0', u'release': u'4.el6_3', u'arch': u'x86_64'}, {u'src': None, u'name': u'libproxy-bin', u'sum': [u'md5', u'72a09cec2b4df7b5636308f2b289a2c7'], u'filename': u'libproxy-bin-0.3.0-4.el6_3.x86_64.rpm', u'epoch': u'0', u'version': u'0.3.0', u'release': u'4.el6_3', u'arch': u'x86_64'}, {u'src': None, u'name': u'libproxy-devel', u'sum': [u'md5', u'cfcb559e418aa7ce61ed2a4242912486'], u'filename': u'libproxy-devel-0.3.0-4.el6_3.i686.rpm', u'epoch': u'0', u'version': u'0.3.0', u'release': u'4.el6_3', u'arch': u'i686'}, {u'src': None, u'name': u'libproxy-devel', u'sum': [u'md5', u'3e4461c17e9e82e7476d33f97096a12c'], u'filename': u'libproxy-devel-0.3.0-4.el6_3.x86_64.rpm', u'epoch': u'0', u'version': u'0.3.0', u'release': u'4.el6_3', u'arch': u'x86_64'}, {u'src': None, u'name': u'libproxy-gnome', u'sum': [u'md5', u'555fb2d5509118826f17df1546d2c840'], u'filename': u'libproxy-gnome-0.3.0-4.el6_3.x86_64.rpm', u'epoch': u'0', u'version': u'0.3.0', u'release': u'4.el6_3', u'arch': u'x86_64'}, {u'src': None, u'name': u'libproxy-kde', u'sum': [u'md5', u'192beb51cf802871793e6609a5af1a2e'], u'filename': u'libproxy-kde-0.3.0-4.el6_3.x86_64.rpm', u'epoch': u'0', u'version': u'0.3.0', u'release': u'4.el6_3', u'arch': u'x86_64'}, {u'src': None, u'name': u'libproxy-mozjs', u'sum': [u'md5', u'a9efc499f1d36bdb9ad18ce20da882d2'], u'filename': u'libproxy-mozjs-0.3.0-4.el6_3.x86_64.rpm', u'epoch': u'0', u'version': u'0.3.0', u'release': u'4.el6_3', u'arch': u'x86_64'}, {u'src': None, u'name': u'libproxy-python', u'sum': [u'md5', u'cfa69101da0a639a959c1d5af730a543'], u'filename': u'libproxy-python-0.3.0-4.el6_3.x86_64.rpm', u'epoch': u'0', u'version': u'0.3.0', u'release': u'4.el6_3', u'arch': u'x86_64'}, {u'src': None, u'name': u'libproxy-webkit', u'sum': [u'md5', u'7381692dae35735a31df8be88f6b7ba3'], u'filename': u'libproxy-webkit-0.3.0-4.el6_3.x86_64.rpm', u'epoch': u'0', u'version': u'0.3.0', u'release': u'4.el6_3', u'arch': u'x86_64'}, {u'src': None, u'name': u'xulrunner', u'sum': [u'md5', u'6969f0041ac2dcc641ae1737d6048344'], u'filename': u'xulrunner-17.0.3-1.0.2.el6_3.i686.rpm', u'epoch': u'0', u'version': u'17.0.3', u'release': u'1.0.2.el6_3', u'arch': u'i686'}, {u'src': None, u'name': u'xulrunner', u'sum': [u'md5', u'faac3e6da7984213228573f054891157'], u'filename': u'xulrunner-17.0.3-1.0.2.el6_3.src.rpm', u'epoch': u'0', u'version': u'17.0.3', u'release': u'1.0.2.el6_3', u'arch': u'src'}, {u'src': None, u'name': u'xulrunner', u'sum': [u'md5', u'4a1631fed018baa849225a49c08c9bb4'], u'filename': u'xulrunner-17.0.3-1.0.2.el6_3.x86_64.rpm', u'epoch': u'0', u'version': u'17.0.3', u'release': u'1.0.2.el6_3', u'arch': u'x86_64'}, {u'src': None, u'name': u'xulrunner-devel', u'sum': [u'md5', u'b2bc06ed5ac939105c658c3e9217908e'], u'filename': u'xulrunner-devel-17.0.3-1.0.2.el6_3.i686.rpm', u'epoch': u'0', u'version': u'17.0.3', u'release': u'1.0.2.el6_3', u'arch': u'i686'}, {u'src': None, u'name': u'xulrunner-devel', u'sum': [u'md5', u'81921c16835b0442c2e79eb9362ba54b'], u'filename': u'xulrunner-devel-17.0.3-1.0.2.el6_3.x86_64.rpm', u'epoch': u'0', u'version': u'17.0.3', u'release': u'1.0.2.el6_3', u'arch': u'x86_64'}, {u'src': None, u'name': u'yelp', u'sum': [u'md5', u'a4eb19db141ffbf8b5ac6890ff9816be'], u'filename': u'yelp-2.28.1-17.el6_3.src.rpm', u'epoch': u'0', u'version': u'2.28.1', u'release': u'17.el6_3', u'arch': u'src'}, {u'src': None, u'name': u'yelp', u'sum': [u'md5', u'682d0549618b02cdbee31db84b324363'], u'filename': u'yelp-2.28.1-17.el6_3.x86_64.rpm', u'epoch': u'0', u'version': u'2.28.1', u'release': u'17.el6_3', u'arch': u'x86_64'}], u'name': u'ol6_x86_64_latest', u'short': u'ol6_x86_64_latest'}, {u'packages': [{u'src': None, u'name': u'devhelp', u'sum': [u'md5', u'c473d1e0b0bb8749688c189a88bcc12a'], u'filename': u'devhelp-0.12-23.el5_9.i386.rpm', u'epoch': u'0', u'version': u'0.12', u'release': u'23.el5_9', u'arch': u'i386'}, {u'src': None, u'name': u'devhelp', u'sum': [u'md5', u'b6bb00c3042bd3ac6ad17d7df57617a0'], u'filename': u'devhelp-0.12-23.el5_9.src.rpm', u'epoch': u'0', u'version': u'0.12', u'release': u'23.el5_9', u'arch': u'src'}, {u'src': None, u'name': u'devhelp', u'sum': [u'md5', u'6d4fd629c71fca4b4ef6d91f68a969c9'], u'filename': u'devhelp-0.12-23.el5_9.x86_64.rpm', u'epoch': u'0', u'version': u'0.12', u'release': u'23.el5_9', u'arch': u'x86_64'}, {u'src': None, u'name': u'devhelp-devel', u'sum': [u'md5', u'683b16f34bfc2b03a77e09bc91b62ac8'], u'filename': u'devhelp-devel-0.12-23.el5_9.i386.rpm', u'epoch': u'0', u'version': u'0.12', u'release': u'23.el5_9', u'arch': u'i386'}, {u'src': None, u'name': u'devhelp-devel', u'sum': [u'md5', u'17a5d95942e77d0467e467b4c2a9f4a2'], u'filename': u'devhelp-devel-0.12-23.el5_9.x86_64.rpm', u'epoch': u'0', u'version': u'0.12', u'release': u'23.el5_9', u'arch': u'x86_64'}, {u'src': None, u'name': u'firefox', u'sum': [u'md5', u'fed16c75083f1004b8964bc8988608dd'], u'filename': u'firefox-17.0.3-1.0.1.el5_9.i386.rpm', u'epoch': u'0', u'version': u'17.0.3', u'release': u'1.0.1.el5_9', u'arch': u'i386'}, {u'src': None, u'name': u'firefox', u'sum': [u'md5', u'80c1671d36fedd4c5c4f079706854897'], u'filename': u'firefox-17.0.3-1.0.1.el5_9.src.rpm', u'epoch': u'0', u'version': u'17.0.3', u'release': u'1.0.1.el5_9', u'arch': u'src'}, {u'src': None, u'name': u'firefox', u'sum': [u'md5', u'df2ceb52153c207a833b11b42d15329a'], u'filename': u'firefox-17.0.3-1.0.1.el5_9.x86_64.rpm', u'epoch': u'0', u'version': u'17.0.3', u'release': u'1.0.1.el5_9', u'arch': u'x86_64'}, {u'src': None, u'name': u'xulrunner', u'sum': [u'md5', u'6e8045bb7075999ab0941a6380be1f25'], u'filename': u'xulrunner-17.0.3-1.0.1.el5_9.i386.rpm', u'epoch': u'0', u'version': u'17.0.3', u'release': u'1.0.1.el5_9', u'arch': u'i386'}, {u'src': None, u'name': u'xulrunner', u'sum': [u'md5', u'6c38ee28f323162b8c538e75c0846288'], u'filename': u'xulrunner-17.0.3-1.0.1.el5_9.src.rpm', u'epoch': u'0', u'version': u'17.0.3', u'release': u'1.0.1.el5_9', u'arch': u'src'}, {u'src': None, u'name': u'xulrunner', u'sum': [u'md5', u'2ce70590ab6fe967995c3d38588f6274'], u'filename': u'xulrunner-17.0.3-1.0.1.el5_9.x86_64.rpm', u'epoch': u'0', u'version': u'17.0.3', u'release': u'1.0.1.el5_9', u'arch': u'x86_64'}, {u'src': None, u'name': u'xulrunner-devel', u'sum': [u'md5', u'5d03905fa0ac315b088a1de665fd4300'], u'filename': u'xulrunner-devel-17.0.3-1.0.1.el5_9.i386.rpm', u'epoch': u'0', u'version': u'17.0.3', u'release': u'1.0.1.el5_9', u'arch': u'i386'}, {u'src': None, u'name': u'xulrunner-devel', u'sum': [u'md5', u'eab28a8af7330330be9088b23b96426a'], u'filename': u'xulrunner-devel-17.0.3-1.0.1.el5_9.x86_64.rpm', u'epoch': u'0', u'version': u'17.0.3', u'release': u'1.0.1.el5_9', u'arch': u'x86_64'}, {u'src': None, u'name': u'yelp', u'sum': [u'md5', u'66bba758c99d6284cf1d87a86e738cf2'], u'filename': u'yelp-2.16.0-30.el5_9.src.rpm', u'epoch': u'0', u'version': u'2.16.0', u'release': u'30.el5_9', u'arch': u'src'}, {u'src': None, u'name': u'yelp', u'sum': [u'md5', u'cad5ea24293d38fa9ac1b2485349ea0f'], u'filename': u'yelp-2.16.0-30.el5_9.x86_64.rpm', u'epoch': u'0', u'version': u'2.16.0', u'release': u'30.el5_9', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u'[ 1:1.6.0.0-1.35.1.11.8.0.1.el5_9]\n- Add oracle-enterprise.patch\n\n[1:1.6.0.0-1.35.1.11.8]\n- Rebuild with updated source tarball\n- Resolves: rhbz#911522\n\n[1:1.6.0.0-1.34.1.11.8]\n- Updated to icedtea6 1.11.8\n- Removed patch9 7201064.patch\n- Removed patch10 8005615.patch\n- Removed not-applied patch 6664509.patch\n- Removed mauve as deadly outdated and run on QA\n - jtreg kept, useless, but valid\n- Rewritten java-1.6.0-openjdk-java-access-bridge-security.patch\n- Resolves: rhbz#911522', u'issued': u'2013-02-20', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELSA-2013-0274.html', u'type': u'self', u'id': None, u'title': u'ELSA-2013-0274'}, {u'href': u'http://linux.oracle.com/cve/CVE-2013-0169.html', u'type': u'cve', u'id': u'CVE-2013-0169', u'title': u'CVE-2013-0169'}, {u'href': u'http://linux.oracle.com/cve/CVE-2013-1486.html', u'type': u'cve', u'id': u'CVE-2013-1486', u'title': u'CVE-2013-1486'}], u'_content_type_id': u'erratum', u'_id': u'a6d75dcc-2fae-439f-b154-8687a2711df6', u'from': u'el-errata@oss.oracle.com', u'severity': u'Important', u'title': u' java-1.6.0-openjdk security update', u'_ns': u'units_erratum', u'rights': u'Copyright 2013 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 5', u'reboot_suggested': False, u'type': u'security', u'pkglist': [{u'packages': [{u'src': None, u'name': u'java-1.6.0-openjdk', u'sum': [u'md5', u'aa4ba3e496425060e1d6fcef6045c473'], u'filename': u'java-1.6.0-openjdk-1.6.0.0-1.35.1.11.8.0.1.el5_9.src.rpm', u'epoch': u'1', u'version': u'1.6.0.0', u'release': u'1.35.1.11.8.0.1.el5_9', u'arch': u'src'}, {u'src': None, u'name': u'java-1.6.0-openjdk', u'sum': [u'md5', u'38f476e562ee4cebbb76ed337816b445'], u'filename': u'java-1.6.0-openjdk-1.6.0.0-1.35.1.11.8.0.1.el5_9.x86_64.rpm', u'epoch': u'1', u'version': u'1.6.0.0', u'release': u'1.35.1.11.8.0.1.el5_9', u'arch': u'x86_64'}, {u'src': None, u'name': u'java-1.6.0-openjdk-demo', u'sum': [u'md5', u'a81e64cc7f034ec11c368abcd9ec83f2'], u'filename': u'java-1.6.0-openjdk-demo-1.6.0.0-1.35.1.11.8.0.1.el5_9.x86_64.rpm', u'epoch': u'1', u'version': u'1.6.0.0', u'release': u'1.35.1.11.8.0.1.el5_9', u'arch': u'x86_64'}, {u'src': None, u'name': u'java-1.6.0-openjdk-devel', u'sum': [u'md5', u'7406b8e152c6c4e0f8c2ebee03520241'], u'filename': u'java-1.6.0-openjdk-devel-1.6.0.0-1.35.1.11.8.0.1.el5_9.x86_64.rpm', u'epoch': u'1', u'version': u'1.6.0.0', u'release': u'1.35.1.11.8.0.1.el5_9', u'arch': u'x86_64'}, {u'src': None, u'name': u'java-1.6.0-openjdk-javadoc', u'sum': [u'md5', u'a1896fbcecbde5835c1a428487523cf2'], u'filename': u'java-1.6.0-openjdk-javadoc-1.6.0.0-1.35.1.11.8.0.1.el5_9.x86_64.rpm', u'epoch': u'1', u'version': u'1.6.0.0', u'release': u'1.35.1.11.8.0.1.el5_9', u'arch': u'x86_64'}, {u'src': None, u'name': u'java-1.6.0-openjdk-src', u'sum': [u'md5', u'1733934aa4f78ff8af3ceb359770a857'], u'filename': u'java-1.6.0-openjdk-src-1.6.0.0-1.35.1.11.8.0.1.el5_9.x86_64.rpm', u'epoch': u'1', u'version': u'1.6.0.0', u'release': u'1.35.1.11.8.0.1.el5_9', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u'[1.7.0.9-2.3.7.1.0.2.el6_3]\n- Increase release number and rebuild.\n\n[1.7.0.9-2.3.7.1.0.1.el6_3]\n- Update DISTRO_NAME in specfile\n\n[1.7.0.9-2.3.7.1.el6_3]\n- Updated main source tarball\n- Resolves: rhbz#911529\n\n[1.7.0.9-2.3.7.0.el6_3]\n- Removed patch1000 sec-2013-02-01-8005615.patch\n- Removed patch1001 sec-2013-02-01-8005615-sync_with_jdk7u.patch\n- Removed patch1010 sec-2013-02-01-7201064.patch\n- Removed testing\n - mauve was outdated and\n - jtreg was icedtea relict\n- Updated to icedtea 2.3.7\n- Added java -Xshare:dump to post (see 513605) fo jitarchs\n- Resolves: rhbz#911529', u'issued': u'2013-02-20', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELSA-2013-0275.html', u'type': u'self', u'id': None, u'title': u'ELSA-2013-0275'}, {u'href': u'http://linux.oracle.com/cve/CVE-2013-0169.html', u'type': u'cve', u'id': u'CVE-2013-0169', u'title': u'CVE-2013-0169'}, {u'href': u'http://linux.oracle.com/cve/CVE-2013-1486.html', u'type': u'cve', u'id': u'CVE-2013-1486', u'title': u'CVE-2013-1486'}, {u'href': u'http://linux.oracle.com/cve/CVE-2013-1484.html', u'type': u'cve', u'id': u'CVE-2013-1484', u'title': u'CVE-2013-1484'}, {u'href': u'http://linux.oracle.com/cve/CVE-2013-1485.html', u'type': u'cve', u'id': u'CVE-2013-1485', u'title': u'CVE-2013-1485'}], u'_content_type_id': u'erratum', u'_id': u'd3bf6db2-3dd7-4fa8-9d6a-cd513d758a32', u'from': u'el-errata@oss.oracle.com', u'severity': u'Important', u'title': u' java-1.7.0-openjdk security update', u'_ns': u'units_erratum', u'rights': u'Copyright 2013 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 6', u'reboot_suggested': False, u'type': u'security', u'pkglist': [{u'packages': [{u'src': None, u'name': u'java-1.7.0-openjdk', u'sum': [u'md5', u'428279b30d6fc773fc14d34ce5a2149b'], u'filename': u'java-1.7.0-openjdk-1.7.0.9-2.3.7.1.0.2.el6_3.src.rpm', u'epoch': u'1', u'version': u'1.7.0.9', u'release': u'2.3.7.1.0.2.el6_3', u'arch': u'src'}, {u'src': None, u'name': u'java-1.7.0-openjdk', u'sum': [u'md5', u'14be03561f27dc1d949c0f905f54070e'], u'filename': u'java-1.7.0-openjdk-1.7.0.9-2.3.7.1.0.2.el6_3.x86_64.rpm', u'epoch': u'1', u'version': u'1.7.0.9', u'release': u'2.3.7.1.0.2.el6_3', u'arch': u'x86_64'}, {u'src': None, u'name': u'java-1.7.0-openjdk-demo', u'sum': [u'md5', u'845a6ad2f2dc0cb89875ea94cdbfb4fa'], u'filename': u'java-1.7.0-openjdk-demo-1.7.0.9-2.3.7.1.0.2.el6_3.x86_64.rpm', u'epoch': u'1', u'version': u'1.7.0.9', u'release': u'2.3.7.1.0.2.el6_3', u'arch': u'x86_64'}, {u'src': None, u'name': u'java-1.7.0-openjdk-devel', u'sum': [u'md5', u'ccbcb2b4c6961ec898417d6b87dab688'], u'filename': u'java-1.7.0-openjdk-devel-1.7.0.9-2.3.7.1.0.2.el6_3.x86_64.rpm', u'epoch': u'1', u'version': u'1.7.0.9', u'release': u'2.3.7.1.0.2.el6_3', u'arch': u'x86_64'}, {u'src': None, u'name': u'java-1.7.0-openjdk-javadoc', u'sum': [u'md5', u'daca54e040e4961f0c94f439a8c58339'], u'filename': u'java-1.7.0-openjdk-javadoc-1.7.0.9-2.3.7.1.0.2.el6_3.noarch.rpm', u'epoch': u'1', u'version': u'1.7.0.9', u'release': u'2.3.7.1.0.2.el6_3', u'arch': u'noarch'}, {u'src': None, u'name': u'java-1.7.0-openjdk-src', u'sum': [u'md5', u'f4e6b1e62c9e780857714b1648c4152b'], u'filename': u'java-1.7.0-openjdk-src-1.7.0.9-2.3.7.1.0.2.el6_3.x86_64.rpm', u'epoch': u'1', u'version': u'1.7.0.9', u'release': u'2.3.7.1.0.2.el6_3', u'arch': u'x86_64'}], u'name': u'ol6_x86_64_latest', u'short': u'ol6_x86_64_latest'}, {u'packages': [{u'src': None, u'name': u'java-1.7.0-openjdk', u'sum': [u'md5', u'329cfc5cf511d988b4c12ff48960e107'], u'filename': u'java-1.7.0-openjdk-1.7.0.9-2.3.7.1.0.1.el5_9.src.rpm', u'epoch': u'1', u'version': u'1.7.0.9', u'release': u'2.3.7.1.0.1.el5_9', u'arch': u'src'}, {u'src': None, u'name': u'java-1.7.0-openjdk', u'sum': [u'md5', u'd65e3178c28e906b6cc9d49a33e8604c'], u'filename': u'java-1.7.0-openjdk-1.7.0.9-2.3.7.1.0.1.el5_9.x86_64.rpm', u'epoch': u'1', u'version': u'1.7.0.9', u'release': u'2.3.7.1.0.1.el5_9', u'arch': u'x86_64'}, {u'src': None, u'name': u'java-1.7.0-openjdk-demo', u'sum': [u'md5', u'a65fe0ad51934b7053b79272f3656d21'], u'filename': u'java-1.7.0-openjdk-demo-1.7.0.9-2.3.7.1.0.1.el5_9.x86_64.rpm', u'epoch': u'1', u'version': u'1.7.0.9', u'release': u'2.3.7.1.0.1.el5_9', u'arch': u'x86_64'}, {u'src': None, u'name': u'java-1.7.0-openjdk-devel', u'sum': [u'md5', u'85ab1e958d507232c008ae20b1c953ae'], u'filename': u'java-1.7.0-openjdk-devel-1.7.0.9-2.3.7.1.0.1.el5_9.x86_64.rpm', u'epoch': u'1', u'version': u'1.7.0.9', u'release': u'2.3.7.1.0.1.el5_9', u'arch': u'x86_64'}, {u'src': None, u'name': u'java-1.7.0-openjdk-javadoc', u'sum': [u'md5', u'257a83488fa1b29718bdc106a01f1f4e'], u'filename': u'java-1.7.0-openjdk-javadoc-1.7.0.9-2.3.7.1.0.1.el5_9.x86_64.rpm', u'epoch': u'1', u'version': u'1.7.0.9', u'release': u'2.3.7.1.0.1.el5_9', u'arch': u'x86_64'}, {u'src': None, u'name': u'java-1.7.0-openjdk-src', u'sum': [u'md5', u'672d7089d1492f1b9425224fb331580c'], u'filename': u'java-1.7.0-openjdk-src-1.7.0.9-2.3.7.1.0.1.el5_9.x86_64.rpm', u'epoch': u'1', u'version': u'1.7.0.9', u'release': u'2.3.7.1.0.1.el5_9', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u'[0.73-11]\n- Add patch to fix CVE-2013-0292\n- Resolves: #913072', u'issued': u'2013-02-27', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELSA-2013-0568.html', u'type': u'self', u'id': None, u'title': u'ELSA-2013-0568'}, {u'href': u'http://linux.oracle.com/cve/CVE-2013-0292.html', u'type': u'cve', u'id': u'CVE-2013-0292', u'title': u'CVE-2013-0292'}], u'_content_type_id': u'erratum', u'_id': u'1e78da8d-536d-42b9-8ad3-aaaa566519cb', u'from': u'el-errata@oss.oracle.com', u'severity': u'Important', u'title': u' dbus-glib security update', u'_ns': u'units_erratum', u'rights': u'Copyright 2013 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 6', u'reboot_suggested': False, u'type': u'security', u'pkglist': [{u'packages': [{u'src': None, u'name': u'dbus-glib', u'sum': [u'md5', u'bbe2b2e1838caff64d98ac1176076487'], u'filename': u'dbus-glib-0.86-6.el6_4.i686.rpm', u'epoch': u'0', u'version': u'0.86', u'release': u'6.el6_4', u'arch': u'i686'}, {u'src': None, u'name': u'dbus-glib', u'sum': [u'md5', u'98b0560a5f1c7fe4d034d82782baa1a7'], u'filename': u'dbus-glib-0.86-6.el6_4.src.rpm', u'epoch': u'0', u'version': u'0.86', u'release': u'6.el6_4', u'arch': u'src'}, {u'src': None, u'name': u'dbus-glib', u'sum': [u'md5', u'012390482e5a7edac7b52e68b3bdf4e6'], u'filename': u'dbus-glib-0.86-6.el6_4.x86_64.rpm', u'epoch': u'0', u'version': u'0.86', u'release': u'6.el6_4', u'arch': u'x86_64'}, {u'src': None, u'name': u'dbus-glib-devel', u'sum': [u'md5', u'7ca8e31354f95360027c88c7e3ab9dd5'], u'filename': u'dbus-glib-devel-0.86-6.el6_4.i686.rpm', u'epoch': u'0', u'version': u'0.86', u'release': u'6.el6_4', u'arch': u'i686'}, {u'src': None, u'name': u'dbus-glib-devel', u'sum': [u'md5', u'a554dcd0fc6b1c17bd64819ce8504498'], u'filename': u'dbus-glib-devel-0.86-6.el6_4.x86_64.rpm', u'epoch': u'0', u'version': u'0.86', u'release': u'6.el6_4', u'arch': u'x86_64'}], u'name': u'ol6_x86_64_latest', u'short': u'ol6_x86_64_latest'}, {u'packages': [{u'src': None, u'name': u'dbus-glib', u'sum': [u'md5', u'a2956f2180577f8694baf3e1b6bf12e5'], u'filename': u'dbus-glib-0.73-11.el5_9.i386.rpm', u'epoch': u'0', u'version': u'0.73', u'release': u'11.el5_9', u'arch': u'i386'}, {u'src': None, u'name': u'dbus-glib', u'sum': [u'md5', u'45c55d1c60250d270477e57627a529d3'], u'filename': u'dbus-glib-0.73-11.el5_9.src.rpm', u'epoch': u'0', u'version': u'0.73', u'release': u'11.el5_9', u'arch': u'src'}, {u'src': None, u'name': u'dbus-glib', u'sum': [u'md5', u'd0af164f2557b11e59e46029cdd4c199'], u'filename': u'dbus-glib-0.73-11.el5_9.x86_64.rpm', u'epoch': u'0', u'version': u'0.73', u'release': u'11.el5_9', u'arch': u'x86_64'}, {u'src': None, u'name': u'dbus-glib-devel', u'sum': [u'md5', u'0a2ab9c424cb39f18a28b05561c8bedf'], u'filename': u'dbus-glib-devel-0.73-11.el5_9.i386.rpm', u'epoch': u'0', u'version': u'0.73', u'release': u'11.el5_9', u'arch': u'i386'}, {u'src': None, u'name': u'dbus-glib-devel', u'sum': [u'md5', u'04eec5cba02e3e5b39e83ca3bd67bd23'], u'filename': u'dbus-glib-devel-0.73-11.el5_9.x86_64.rpm', u'epoch': u'0', u'version': u'0.73', u'release': u'11.el5_9', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u"[1:1.4.2-50:.4]\n- Added BrowseLDAPCACertFile and PrintcapGUI to restricted options\n list.\n\n[1:1.4.2-50:.3]\n- Fix for CVE-2012-5519 patch: handle blacklisted lines that have no\n value part gracefully.\n\n[1:1.4.2-50:.2]\n- Added documentation for new CVE-2012-5519 option.\n\n[1:1.4.2-50:.1]\n- Applied patch to fix CVE-2012-5519 (privilege escalation for users\n in SystemGroup or with equivalent polkit permission). This prevents\n HTTP PUT requests with paths under /admin/conf/ other than that for\n cupsd.conf, and also prevents such requests altering certain\n configuration directives such as PageLog and FileDevice (bug #875898).\n\n[1:1.4.2-50]\n- Fixed LDAP browsing issues (bug #870386).\n\n[1:1.4.2-49]\n- Avoid 'forbidden' error when moving job between queues via web UI\n (bug #834445).", u'issued': u'2013-02-28', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELSA-2013-0580.html', u'type': u'self', u'id': None, u'title': u'ELSA-2013-0580'}, {u'href': u'http://linux.oracle.com/cve/CVE-2012-5519.html', u'type': u'cve', u'id': u'CVE-2012-5519', u'title': u'CVE-2012-5519'}], u'_content_type_id': u'erratum', u'_id': u'8e173a23-3384-4bd8-9787-9a4c79199ee8', u'from': u'el-errata@oss.oracle.com', u'severity': u'Moderate', u'title': u' cups security update', u'_ns': u'units_erratum', u'rights': u'Copyright 2013 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 6', u'reboot_suggested': False, u'type': u'security', u'pkglist': [{u'packages': [{u'src': None, u'name': u'cups', u'sum': [u'md5', u'c12ece35502a3a54abe349d42d52afb4'], u'filename': u'cups-1.4.2-50.el6_4.4.src.rpm', u'epoch': u'1', u'version': u'1.4.2', u'release': u'50.el6_4.4', u'arch': u'src'}, {u'src': None, u'name': u'cups', u'sum': [u'md5', u'f42d4cdf02c0e07f99fb43d965ff7172'], u'filename': u'cups-1.4.2-50.el6_4.4.x86_64.rpm', u'epoch': u'1', u'version': u'1.4.2', u'release': u'50.el6_4.4', u'arch': u'x86_64'}, {u'src': None, u'name': u'cups-devel', u'sum': [u'md5', u'7cf03f9c1313337cb37af6a2c9596e71'], u'filename': u'cups-devel-1.4.2-50.el6_4.4.i686.rpm', u'epoch': u'1', u'version': u'1.4.2', u'release': u'50.el6_4.4', u'arch': u'i686'}, {u'src': None, u'name': u'cups-devel', u'sum': [u'md5', u'5480b34eda21900b131f9f75f3f4a840'], u'filename': u'cups-devel-1.4.2-50.el6_4.4.x86_64.rpm', u'epoch': u'1', u'version': u'1.4.2', u'release': u'50.el6_4.4', u'arch': u'x86_64'}, {u'src': None, u'name': u'cups-libs', u'sum': [u'md5', u'1e5fbc9975581acc1139a793938f0291'], u'filename': u'cups-libs-1.4.2-50.el6_4.4.i686.rpm', u'epoch': u'1', u'version': u'1.4.2', u'release': u'50.el6_4.4', u'arch': u'i686'}, {u'src': None, u'name': u'cups-libs', u'sum': [u'md5', u'a8c97ccc9f77742740ebb8cc2afee13e'], u'filename': u'cups-libs-1.4.2-50.el6_4.4.x86_64.rpm', u'epoch': u'1', u'version': u'1.4.2', u'release': u'50.el6_4.4', u'arch': u'x86_64'}, {u'src': None, u'name': u'cups-lpd', u'sum': [u'md5', u'f2be33813266144026a612e7096ac1b3'], u'filename': u'cups-lpd-1.4.2-50.el6_4.4.x86_64.rpm', u'epoch': u'1', u'version': u'1.4.2', u'release': u'50.el6_4.4', u'arch': u'x86_64'}, {u'src': None, u'name': u'cups-php', u'sum': [u'md5', u'35baa3b435fd7c7ecd045f228f60f943'], u'filename': u'cups-php-1.4.2-50.el6_4.4.x86_64.rpm', u'epoch': u'1', u'version': u'1.4.2', u'release': u'50.el6_4.4', u'arch': u'x86_64'}], u'name': u'ol6_x86_64_latest', u'short': u'ol6_x86_64_latest'}, {u'packages': [{u'src': None, u'name': u'cups', u'sum': [u'md5', u'49e2ea46543e8f464549d8760b8db162'], u'filename': u'cups-1.3.7-30.el5_9.3.src.rpm', u'epoch': u'1', u'version': u'1.3.7', u'release': u'30.el5_9.3', u'arch': u'src'}, {u'src': None, u'name': u'cups', u'sum': [u'md5', u'ccf84a96d0b44993afb504597db31ed9'], u'filename': u'cups-1.3.7-30.el5_9.3.x86_64.rpm', u'epoch': u'1', u'version': u'1.3.7', u'release': u'30.el5_9.3', u'arch': u'x86_64'}, {u'src': None, u'name': u'cups-devel', u'sum': [u'md5', u'9f08568b3ee43d5a8d99c024ecec9c1e'], u'filename': u'cups-devel-1.3.7-30.el5_9.3.i386.rpm', u'epoch': u'1', u'version': u'1.3.7', u'release': u'30.el5_9.3', u'arch': u'i386'}, {u'src': None, u'name': u'cups-devel', u'sum': [u'md5', u'23025f461d05fe7aca078cfcd3a7cc45'], u'filename': u'cups-devel-1.3.7-30.el5_9.3.x86_64.rpm', u'epoch': u'1', u'version': u'1.3.7', u'release': u'30.el5_9.3', u'arch': u'x86_64'}, {u'src': None, u'name': u'cups-libs', u'sum': [u'md5', u'dfdfc2dcec1cb84cb56c8ed28787966a'], u'filename': u'cups-libs-1.3.7-30.el5_9.3.i386.rpm', u'epoch': u'1', u'version': u'1.3.7', u'release': u'30.el5_9.3', u'arch': u'i386'}, {u'src': None, u'name': u'cups-libs', u'sum': [u'md5', u'0f44c6b44e242596e866377fde6759b6'], u'filename': u'cups-libs-1.3.7-30.el5_9.3.x86_64.rpm', u'epoch': u'1', u'version': u'1.3.7', u'release': u'30.el5_9.3', u'arch': u'x86_64'}, {u'src': None, u'name': u'cups-lpd', u'sum': [u'md5', u'a3b726a97acffa3c6f12d98733a0fe29'], u'filename': u'cups-lpd-1.3.7-30.el5_9.3.x86_64.rpm', u'epoch': u'1', u'version': u'1.3.7', u'release': u'30.el5_9.3', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u'[2.7.6-12.0.1.el6_4.1]\n- Update doc/redhat.gif in tarball\n- Add libxml2-oracle-enterprise.patch and update logos in tarball\n\n[2.7.6-12.el6_4.1]\n-detect and stop excessive entities expansion upon replacement (rhbz#912574)\n\n[2.7.6-12.el6]\n- fix out of range heap access (CVE-2012-5134)\n\n[2.7.6-11.el6]\n- Change the XPath code to percolate allocation error (CVE-2011-1944)\n\n[2.7.6-10.el6]\n- Fix an off by one pointer access (CVE-2011-3102)\n\n[2.7.6-9.el6]\n- Fix a failure to report xmlreader parsing failures\n- Fix parser local buffers size problems (rhbz#843742)\n- Fix entities local buffers size problems (rhbz#843742)\n- Fix an error in previous commit (rhbz#843742)\n- Do not fetch external parsed entities\n- Impose a reasonable limit on attribute size (rhbz#843742)\n- Impose a reasonable limit on comment size (rhbz#843742)\n- Impose a reasonable limit on PI size (rhbz#843742)\n- Cleanups and new limit APIs for dictionaries (rhbz#843742)\n- Introduce some default parser limits (rhbz#843742)\n- Implement some default limits in the XPath module\n- Fixup limits parser (rhbz#843742)\n- Enforce XML_PARSER_EOF state handling through the parser\n- Avoid quadratic behaviour in some push parsing cases (rhbz#843742)\n- More avoid quadratic behaviour (rhbz#843742)\n- Strengthen behaviour of the push parser in problematic situations (rhbz#843742)\n- More fixups on the push parser behaviour (rhbz#843742)\n- Fix a segfault on XSD validation on pattern error\n- Fix an unimplemented part in RNG value validation\n', u'issued': u'2013-02-28', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELSA-2013-0581.html', u'type': u'self', u'id': None, u'title': u'ELSA-2013-0581'}, {u'href': u'http://linux.oracle.com/cve/CVE-2013-0338.html', u'type': u'cve', u'id': u'CVE-2013-0338', u'title': u'CVE-2013-0338'}], u'_content_type_id': u'erratum', u'_id': u'69192c00-dc4b-4662-b20d-805721f80e70', u'from': u'el-errata@oss.oracle.com', u'severity': u'Moderate', u'title': u' libxml2 security update', u'_ns': u'units_erratum', u'rights': u'Copyright 2013 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 6', u'reboot_suggested': False, u'type': u'security', u'pkglist': [{u'packages': [{u'src': None, u'name': u'libxml2', u'sum': [u'md5', u'a482c4f66fb8ebff45a10c6a25497c98'], u'filename': u'libxml2-2.7.6-12.0.1.el6_4.1.i686.rpm', u'epoch': u'0', u'version': u'2.7.6', u'release': u'12.0.1.el6_4.1', u'arch': u'i686'}, {u'src': None, u'name': u'libxml2', u'sum': [u'md5', u'3ac593e7ac9077b895573929c43b8edd'], u'filename': u'libxml2-2.7.6-12.0.1.el6_4.1.src.rpm', u'epoch': u'0', u'version': u'2.7.6', u'release': u'12.0.1.el6_4.1', u'arch': u'src'}, {u'src': None, u'name': u'libxml2', u'sum': [u'md5', u'de5261f3e3ff5c84cf91437f3cc954b8'], u'filename': u'libxml2-2.7.6-12.0.1.el6_4.1.x86_64.rpm', u'epoch': u'0', u'version': u'2.7.6', u'release': u'12.0.1.el6_4.1', u'arch': u'x86_64'}, {u'src': None, u'name': u'libxml2-devel', u'sum': [u'md5', u'af6505d8573d330004ea708370afe9f3'], u'filename': u'libxml2-devel-2.7.6-12.0.1.el6_4.1.i686.rpm', u'epoch': u'0', u'version': u'2.7.6', u'release': u'12.0.1.el6_4.1', u'arch': u'i686'}, {u'src': None, u'name': u'libxml2-devel', u'sum': [u'md5', u'2e136f2f8f249e80bc70c04984e4907a'], u'filename': u'libxml2-devel-2.7.6-12.0.1.el6_4.1.x86_64.rpm', u'epoch': u'0', u'version': u'2.7.6', u'release': u'12.0.1.el6_4.1', u'arch': u'x86_64'}, {u'src': None, u'name': u'libxml2-python', u'sum': [u'md5', u'4fa0c4636711a7d200496d4578344c4e'], u'filename': u'libxml2-python-2.7.6-12.0.1.el6_4.1.x86_64.rpm', u'epoch': u'0', u'version': u'2.7.6', u'release': u'12.0.1.el6_4.1', u'arch': u'x86_64'}, {u'src': None, u'name': u'libxml2-static', u'sum': [u'md5', u'30591163938a3c6748cf837ceff82af8'], u'filename': u'libxml2-static-2.7.6-12.0.1.el6_4.1.x86_64.rpm', u'epoch': u'0', u'version': u'2.7.6', u'release': u'12.0.1.el6_4.1', u'arch': u'x86_64'}], u'name': u'ol6_x86_64_latest', u'short': u'ol6_x86_64_latest'}, {u'packages': [{u'src': None, u'name': u'libxml2', u'sum': [u'md5', u'60d3885979088493aa4fe0f304eaac35'], u'filename': u'libxml2-2.6.26-2.1.21.0.1.el5_9.1.i386.rpm', u'epoch': u'0', u'version': u'2.6.26', u'release': u'2.1.21.0.1.el5_9.1', u'arch': u'i386'}, {u'src': None, u'name': u'libxml2', u'sum': [u'md5', u'cefb47d9ef1f6b73274b35d3a4f75ea8'], u'filename': u'libxml2-2.6.26-2.1.21.0.1.el5_9.1.src.rpm', u'epoch': u'0', u'version': u'2.6.26', u'release': u'2.1.21.0.1.el5_9.1', u'arch': u'src'}, {u'src': None, u'name': u'libxml2', u'sum': [u'md5', u'e61c144181baddf8d563a2f73cedcfe5'], u'filename': u'libxml2-2.6.26-2.1.21.0.1.el5_9.1.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.26', u'release': u'2.1.21.0.1.el5_9.1', u'arch': u'x86_64'}, {u'src': None, u'name': u'libxml2-devel', u'sum': [u'md5', u'f23dfc9115a5b93f75393c844e1ed129'], u'filename': u'libxml2-devel-2.6.26-2.1.21.0.1.el5_9.1.i386.rpm', u'epoch': u'0', u'version': u'2.6.26', u'release': u'2.1.21.0.1.el5_9.1', u'arch': u'i386'}, {u'src': None, u'name': u'libxml2-devel', u'sum': [u'md5', u'335051921392ec3f98311b2fa8407cae'], u'filename': u'libxml2-devel-2.6.26-2.1.21.0.1.el5_9.1.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.26', u'release': u'2.1.21.0.1.el5_9.1', u'arch': u'x86_64'}, {u'src': None, u'name': u'libxml2-python', u'sum': [u'md5', u'de48af4f7e9ed145a87f74f662e05438'], u'filename': u'libxml2-python-2.6.26-2.1.21.0.1.el5_9.1.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.26', u'release': u'2.1.21.0.1.el5_9.1', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u'[1.0.0-27.2]\n- fix for CVE-2013-0169 - SSL/TLS CBC timing attack (#907589)\n- fix for CVE-2013-0166 - DoS in OCSP signatures checking (#908052)\n- enable compression only if explicitly asked for or OPENSSL_DEFAULT_ZLIB\n environment variable is set (fixes CVE-2012-4929 #857051)\n- use __secure_getenv() everywhere instead of getenv() (#839735)', u'issued': u'2013-03-04', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELSA-2013-0587.html', u'type': u'self', u'id': None, u'title': u'ELSA-2013-0587'}, {u'href': u'http://linux.oracle.com/cve/CVE-2013-0169.html', u'type': u'cve', u'id': u'CVE-2013-0169', u'title': u'CVE-2013-0169'}, {u'href': u'http://linux.oracle.com/cve/CVE-2012-4929.html', u'type': u'cve', u'id': u'CVE-2012-4929', u'title': u'CVE-2012-4929'}, {u'href': u'http://linux.oracle.com/cve/CVE-2013-0166.html', u'type': u'cve', u'id': u'CVE-2013-0166', u'title': u'CVE-2013-0166'}], u'_content_type_id': u'erratum', u'_id': u'20c2a38d-6f3b-47ee-8908-eb7c95e8a182', u'from': u'el-errata@oss.oracle.com', u'severity': u'Moderate', u'title': u' openssl security update', u'_ns': u'units_erratum', u'rights': u'Copyright 2013 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 6', u'reboot_suggested': False, u'type': u'security', u'pkglist': [{u'packages': [{u'src': None, u'name': u'openssl', u'sum': [u'md5', u'a5395e6c63315e355c0f9e2ce5966ffe'], u'filename': u'openssl-1.0.0-27.el6_4.2.i686.rpm', u'epoch': u'0', u'version': u'1.0.0', u'release': u'27.el6_4.2', u'arch': u'i686'}, {u'src': None, u'name': u'openssl', u'sum': [u'md5', u'053be4eb228a5743117cf97036d5913c'], u'filename': u'openssl-1.0.0-27.el6_4.2.src.rpm', u'epoch': u'0', u'version': u'1.0.0', u'release': u'27.el6_4.2', u'arch': u'src'}, {u'src': None, u'name': u'openssl', u'sum': [u'md5', u'67afb252d0bc490b21056b8d41a652be'], u'filename': u'openssl-1.0.0-27.el6_4.2.x86_64.rpm', u'epoch': u'0', u'version': u'1.0.0', u'release': u'27.el6_4.2', u'arch': u'x86_64'}, {u'src': None, u'name': u'openssl-devel', u'sum': [u'md5', u'1c8b7cd9141375e7c7b770cee29be1a9'], u'filename': u'openssl-devel-1.0.0-27.el6_4.2.i686.rpm', u'epoch': u'0', u'version': u'1.0.0', u'release': u'27.el6_4.2', u'arch': u'i686'}, {u'src': None, u'name': u'openssl-devel', u'sum': [u'md5', u'60a1c23b50713350e3ade970ebb124c3'], u'filename': u'openssl-devel-1.0.0-27.el6_4.2.x86_64.rpm', u'epoch': u'0', u'version': u'1.0.0', u'release': u'27.el6_4.2', u'arch': u'x86_64'}, {u'src': None, u'name': u'openssl-perl', u'sum': [u'md5', u'771b18e4e0929704ea4970586cef1055'], u'filename': u'openssl-perl-1.0.0-27.el6_4.2.x86_64.rpm', u'epoch': u'0', u'version': u'1.0.0', u'release': u'27.el6_4.2', u'arch': u'x86_64'}, {u'src': None, u'name': u'openssl-static', u'sum': [u'md5', u'227c6b5ac1ea49068f4fbcfa49beacc7'], u'filename': u'openssl-static-1.0.0-27.el6_4.2.x86_64.rpm', u'epoch': u'0', u'version': u'1.0.0', u'release': u'27.el6_4.2', u'arch': u'x86_64'}], u'name': u'ol6_x86_64_latest', u'short': u'ol6_x86_64_latest'}, {u'packages': [{u'src': None, u'name': u'openssl', u'sum': [u'md5', u'29613f65efe2f5ee8e94bfa3f4d3e0fc'], u'filename': u'openssl-0.9.8e-26.el5_9.1.src.rpm', u'epoch': u'0', u'version': u'0.9.8e', u'release': u'26.el5_9.1', u'arch': u'src'}, {u'src': None, u'name': u'openssl', u'sum': [u'md5', u'f330ea13cdc165bd713276960efe3f7d'], u'filename': u'openssl-0.9.8e-26.el5_9.1.i686.rpm', u'epoch': u'0', u'version': u'0.9.8e', u'release': u'26.el5_9.1', u'arch': u'i686'}, {u'src': None, u'name': u'openssl', u'sum': [u'md5', u'05a1487051957ab2584cd6aaa7bc16ff'], u'filename': u'openssl-0.9.8e-26.el5_9.1.x86_64.rpm', u'epoch': u'0', u'version': u'0.9.8e', u'release': u'26.el5_9.1', u'arch': u'x86_64'}, {u'src': None, u'name': u'openssl-devel', u'sum': [u'md5', u'1dfac10926ff368f2c5a2a3ad7015de1'], u'filename': u'openssl-devel-0.9.8e-26.el5_9.1.i386.rpm', u'epoch': u'0', u'version': u'0.9.8e', u'release': u'26.el5_9.1', u'arch': u'i386'}, {u'src': None, u'name': u'openssl-devel', u'sum': [u'md5', u'17b9e92ca46421585854948ba6eef9e3'], u'filename': u'openssl-devel-0.9.8e-26.el5_9.1.x86_64.rpm', u'epoch': u'0', u'version': u'0.9.8e', u'release': u'26.el5_9.1', u'arch': u'x86_64'}, {u'src': None, u'name': u'openssl-perl', u'sum': [u'md5', u'eed4f706df649ae639a05c7d067cad8a'], u'filename': u'openssl-perl-0.9.8e-26.el5_9.1.x86_64.rpm', u'epoch': u'0', u'version': u'0.9.8e', u'release': u'26.el5_9.1', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u'[2.8.5-10.1]\n- fix CVE-2013-1619 - fix TLS-CBC timing attack (#908238)', u'issued': u'2013-03-04', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELSA-2013-0588.html', u'type': u'self', u'id': None, u'title': u'ELSA-2013-0588'}, {u'href': u'http://linux.oracle.com/cve/CVE-2013-1619.html', u'type': u'cve', u'id': u'CVE-2013-1619', u'title': u'CVE-2013-1619'}], u'_content_type_id': u'erratum', u'_id': u'ce3289e7-9e92-49bd-b52c-0d26284ceba1', u'from': u'el-errata@oss.oracle.com', u'severity': u'Moderate', u'title': u' gnutls security update', u'_ns': u'units_erratum', u'rights': u'Copyright 2013 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 6', u'reboot_suggested': False, u'type': u'security', u'pkglist': [{u'packages': [{u'src': None, u'name': u'gnutls', u'sum': [u'md5', u'908116869d33286361d7044e6df12aba'], u'filename': u'gnutls-2.8.5-10.el6_4.1.i686.rpm', u'epoch': u'0', u'version': u'2.8.5', u'release': u'10.el6_4.1', u'arch': u'i686'}, {u'src': None, u'name': u'gnutls', u'sum': [u'md5', u'86b76ee1cc79e5719f174710d862b3ab'], u'filename': u'gnutls-2.8.5-10.el6_4.1.src.rpm', u'epoch': u'0', u'version': u'2.8.5', u'release': u'10.el6_4.1', u'arch': u'src'}, {u'src': None, u'name': u'gnutls', u'sum': [u'md5', u'a7aef11669458bd67e5f2fc8dd76fc84'], u'filename': u'gnutls-2.8.5-10.el6_4.1.x86_64.rpm', u'epoch': u'0', u'version': u'2.8.5', u'release': u'10.el6_4.1', u'arch': u'x86_64'}, {u'src': None, u'name': u'gnutls-devel', u'sum': [u'md5', u'2fa16a8a74ecc7201d168f670f6d7d9e'], u'filename': u'gnutls-devel-2.8.5-10.el6_4.1.i686.rpm', u'epoch': u'0', u'version': u'2.8.5', u'release': u'10.el6_4.1', u'arch': u'i686'}, {u'src': None, u'name': u'gnutls-devel', u'sum': [u'md5', u'a0d4be32e807086862ce7318e9aef7dc'], u'filename': u'gnutls-devel-2.8.5-10.el6_4.1.x86_64.rpm', u'epoch': u'0', u'version': u'2.8.5', u'release': u'10.el6_4.1', u'arch': u'x86_64'}, {u'src': None, u'name': u'gnutls-guile', u'sum': [u'md5', u'e6ddf691e4480be0cf5e785ae25f1d2a'], u'filename': u'gnutls-guile-2.8.5-10.el6_4.1.i686.rpm', u'epoch': u'0', u'version': u'2.8.5', u'release': u'10.el6_4.1', u'arch': u'i686'}, {u'src': None, u'name': u'gnutls-guile', u'sum': [u'md5', u'ccc41b109b91d926e37893acb4ee996f'], u'filename': u'gnutls-guile-2.8.5-10.el6_4.1.x86_64.rpm', u'epoch': u'0', u'version': u'2.8.5', u'release': u'10.el6_4.1', u'arch': u'x86_64'}, {u'src': None, u'name': u'gnutls-utils', u'sum': [u'md5', u'a5eb011458a32a2d860648a2e68c9b66'], u'filename': u'gnutls-utils-2.8.5-10.el6_4.1.x86_64.rpm', u'epoch': u'0', u'version': u'2.8.5', u'release': u'10.el6_4.1', u'arch': u'x86_64'}], u'name': u'ol6_x86_64_latest', u'short': u'ol6_x86_64_latest'}, {u'packages': [{u'src': None, u'name': u'gnutls', u'sum': [u'md5', u'5cce4a003c09e1a1c9c28ad2fbc29c8e'], u'filename': u'gnutls-1.4.1-10.el5_9.1.i386.rpm', u'epoch': u'0', u'version': u'1.4.1', u'release': u'10.el5_9.1', u'arch': u'i386'}, {u'src': None, u'name': u'gnutls', u'sum': [u'md5', u'5cb481f32ca80276e6cfda09dd8f8345'], u'filename': u'gnutls-1.4.1-10.el5_9.1.src.rpm', u'epoch': u'0', u'version': u'1.4.1', u'release': u'10.el5_9.1', u'arch': u'src'}, {u'src': None, u'name': u'gnutls', u'sum': [u'md5', u'8f496e1aff765ca8300acca9ddce1d0b'], u'filename': u'gnutls-1.4.1-10.el5_9.1.x86_64.rpm', u'epoch': u'0', u'version': u'1.4.1', u'release': u'10.el5_9.1', u'arch': u'x86_64'}, {u'src': None, u'name': u'gnutls-devel', u'sum': [u'md5', u'0f634f93f0659fdb125d47507ed56ef5'], u'filename': u'gnutls-devel-1.4.1-10.el5_9.1.i386.rpm', u'epoch': u'0', u'version': u'1.4.1', u'release': u'10.el5_9.1', u'arch': u'i386'}, {u'src': None, u'name': u'gnutls-devel', u'sum': [u'md5', u'7e9e68ccac5eefd965d9a0a48f2f47b8'], u'filename': u'gnutls-devel-1.4.1-10.el5_9.1.x86_64.rpm', u'epoch': u'0', u'version': u'1.4.1', u'release': u'10.el5_9.1', u'arch': u'x86_64'}, {u'src': None, u'name': u'gnutls-utils', u'sum': [u'md5', u'58fe4f666fae73f04ab0c6e94a748b2f'], u'filename': u'gnutls-utils-1.4.1-10.el5_9.1.x86_64.rpm', u'epoch': u'0', u'version': u'1.4.1', u'release': u'10.el5_9.1', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u'kernel\n[2.6.18-348.2.1]\n- [misc] tainted flags, fix buffer size (Prarit Bhargava) [905829 901547]\n- [net] be2net: fix unconditionally returning IRQ_HANDLED in INTx (Ivan Vecera) [884704 878316]\n- [net] be2net: fix INTx ISR for interrupt behaviour on BE2 (Ivan Vecera) [884704 878316]\n- [net] be2net: fix a possible events_get() race on BE2 (Ivan Vecera) [884704 878316]\n- [firmware] Expand kernel boot-time storage for DMI table structs (Lenny Szubowicz) [902683 862865]\n- [fs] udf: Fortify loading of sparing table (Nikola Pajkovsky) [843140 843141] {CVE-2012-3400}\n- [fs] udf: Improve table length check to avoid possible overflow (Nikola Pajkovsky) [843140 843141] {CVE-2012-3400}\n- [fs] udf: Avoid run away loop when partition table is corrupted (Nikola Pajkovsky) [843140 843141] {CVE-2012-3400}', u'issued': u'2013-03-05', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELSA-2013-0594.html', u'type': u'self', u'id': None, u'title': u'ELSA-2013-0594'}, {u'href': u'http://linux.oracle.com/cve/CVE-2012-3400.html', u'type': u'cve', u'id': u'CVE-2012-3400', u'title': u'CVE-2012-3400'}], u'_content_type_id': u'erratum', u'_id': u'bb39850e-8211-466e-9dd9-4a363b7e9879', u'from': u'el-errata@oss.oracle.com', u'severity': u'Low', u'title': u' kernel security and bug fix update', u'_ns': u'units_erratum', u'rights': u'Copyright 2013 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 5', u'reboot_suggested': False, u'type': u'security', u'pkglist': [{u'packages': [{u'src': None, u'name': u'kernel', u'sum': [u'md5', u'784bf967b0b6622d4a3fbbf19044e8b2'], u'filename': u'kernel-2.6.18-348.2.1.el5.src.rpm', u'epoch': u'0', u'version': u'2.6.18', u'release': u'348.2.1.el5', u'arch': u'src'}, {u'src': None, u'name': u'kernel', u'sum': [u'md5', u'fa5e9281d061e9cd11b9d8a3892eb8a0'], u'filename': u'kernel-2.6.18-348.2.1.el5.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.18', u'release': u'348.2.1.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'kernel-debug', u'sum': [u'md5', u'88c51eba6be29f23d9370b2cbd77454e'], u'filename': u'kernel-debug-2.6.18-348.2.1.el5.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.18', u'release': u'348.2.1.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'kernel-debug-devel', u'sum': [u'md5', u'373689dc6b085102bd4836ca6156aa38'], u'filename': u'kernel-debug-devel-2.6.18-348.2.1.el5.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.18', u'release': u'348.2.1.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'kernel-devel', u'sum': [u'md5', u'a9cf4e936b5f9dd727009759b3af4e57'], u'filename': u'kernel-devel-2.6.18-348.2.1.el5.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.18', u'release': u'348.2.1.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'kernel-doc', u'sum': [u'md5', u'3ffad64561be61846e88cae924e43b1d'], u'filename': u'kernel-doc-2.6.18-348.2.1.el5.noarch.rpm', u'epoch': u'0', u'version': u'2.6.18', u'release': u'348.2.1.el5', u'arch': u'noarch'}, {u'src': None, u'name': u'kernel-headers', u'sum': [u'md5', u'0144402ce9405bc127fdc4ee230bd90f'], u'filename': u'kernel-headers-2.6.18-348.2.1.el5.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.18', u'release': u'348.2.1.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'kernel-xen', u'sum': [u'md5', u'12577fb70ef98206ac51fb7d0ce60717'], u'filename': u'kernel-xen-2.6.18-348.2.1.el5.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.18', u'release': u'348.2.1.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'kernel-xen-devel', u'sum': [u'md5', u'61b1357797b45b35b2e5ae7ad83bef28'], u'filename': u'kernel-xen-devel-2.6.18-348.2.1.el5.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.18', u'release': u'348.2.1.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'ocfs2-2.6.18-348.2.1.el5', u'sum': [u'md5', u'7b901156cf2f846dcd3eab67ba3c85ad'], u'filename': u'ocfs2-2.6.18-348.2.1.el5-1.4.10-1.el5.src.rpm', u'epoch': u'0', u'version': u'1.4.10', u'release': u'1.el5', u'arch': u'src'}, {u'src': None, u'name': u'ocfs2-2.6.18-348.2.1.el5', u'sum': [u'md5', u'569e81004b3b0d3f26c5702332b214c8'], u'filename': u'ocfs2-2.6.18-348.2.1.el5-1.4.10-1.el5.x86_64.rpm', u'epoch': u'0', u'version': u'1.4.10', u'release': u'1.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'ocfs2-2.6.18-348.2.1.el5debug', u'sum': [u'md5', u'b5d04b1f90985cd0c3ad4b75db07f2b0'], u'filename': u'ocfs2-2.6.18-348.2.1.el5debug-1.4.10-1.el5.x86_64.rpm', u'epoch': u'0', u'version': u'1.4.10', u'release': u'1.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'ocfs2-2.6.18-348.2.1.el5xen', u'sum': [u'md5', u'c2ff65c58f319433b7cef985880dc7df'], u'filename': u'ocfs2-2.6.18-348.2.1.el5xen-1.4.10-1.el5.x86_64.rpm', u'epoch': u'0', u'version': u'1.4.10', u'release': u'1.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'oracleasm-2.6.18-348.2.1.el5', u'sum': [u'md5', u'65eeacd5b7de7519bb473582639c7367'], u'filename': u'oracleasm-2.6.18-348.2.1.el5-2.0.5-1.el5.src.rpm', u'epoch': u'0', u'version': u'2.0.5', u'release': u'1.el5', u'arch': u'src'}, {u'src': None, u'name': u'oracleasm-2.6.18-348.2.1.el5', u'sum': [u'md5', u'e89288343df1fd7bb3d8505a37a81d9e'], u'filename': u'oracleasm-2.6.18-348.2.1.el5-2.0.5-1.el5.x86_64.rpm', u'epoch': u'0', u'version': u'2.0.5', u'release': u'1.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'oracleasm-2.6.18-348.2.1.el5debug', u'sum': [u'md5', u'086230bcca1aae368fe495472870aab5'], u'filename': u'oracleasm-2.6.18-348.2.1.el5debug-2.0.5-1.el5.x86_64.rpm', u'epoch': u'0', u'version': u'2.0.5', u'release': u'1.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'oracleasm-2.6.18-348.2.1.el5xen', u'sum': [u'md5', u'c6742e52ea0f00ed94d064804c8e575e'], u'filename': u'oracleasm-2.6.18-348.2.1.el5xen-2.0.5-1.el5.x86_64.rpm', u'epoch': u'0', u'version': u'2.0.5', u'release': u'1.el5', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u"kernel\n[2.6.18-348.2.1.0.1]\n- [oprofile] x86, mm: Add __get_user_pages_fast() [orabug 14277030]\n- [oprofile] export __get_user_pages_fast() function [orabug 14277030]\n- [oprofile] oprofile, x86: Fix nmi-unsafe callgraph support [orabug 14277030]\n- [oprofile] oprofile: use KM_NMI slot for kmap_atomic [orabug 14277030]\n- [oprofile] oprofile: i386 add get_user_pages_fast support [orabug 14277030]\n- [kernel] Initialize the local uninitialized variable stats. [orabug 14051367]\n- [fs] JBD:make jbd support 512B blocks correctly for ocfs2. [orabug 13477763]\n- [x86 ] fix fpu context corrupt when preempt in signal context [orabug 14038272]\n- [mm] fix hugetlb page leak (Dave McCracken) [orabug 12375075]\n- fix ia64 build error due to add-support-above-32-vcpus.patch(Zhenzhong Duan)\n- [x86] use dynamic vcpu_info remap to support more than 32 vcpus (Zhenzhong Duan)\n- [x86] Fix lvt0 reset when hvm boot up with noapic param\n- [scsi] remove printk's when doing I/O to a dead device (John Sobecki, Chris Mason)\n [orabug 12342275]\n- [char] ipmi: Fix IPMI errors due to timing problems (Joe Jin) [orabug 12561346]\n- [scsi] Fix race when removing SCSI devices (Joe Jin) [orabug 12404566]\n- [net] net: Redo the broken redhat netconsole over bonding (Tina Yang) [orabug 12740042]\n- [fs] nfs: Fix __put_nfs_open_context() NULL pointer panic (Joe Jin) [orabug 12687646]\n- fix filp_close() race (Joe Jin) [orabug 10335998]\n- make xenkbd.abs_pointer=1 by default [orabug 67188919]\n- [xen] check to see if hypervisor supports memory reservation change\n (Chuck Anderson) [orabug 7556514]\n- [net] Enable entropy for bnx2,bnx2x,e1000e,igb,ixgb,ixgbe,ixgbevf (John Sobecki)\n [orabug 10315433]\n- [NET] Add xen pv netconsole support (Tina Yang) [orabug 6993043] [bz 7258]\n- [mm] Patch shrink_zone to yield during severe mempressure events, avoiding\n hangs and evictions (John Sobecki,Chris Mason) [orabug 6086839]\n- [mm] Enhance shrink_zone patch allow full swap utilization, and also be\n NUMA-aware (John Sobecki,Chris Mason,Herbert van den Bergh) [orabug 9245919]\n- fix aacraid not to reset during kexec (Joe Jin) [orabug 8516042]\n- [xen] PVHVM guest with PoD crashes under memory pressure (Chuck Anderson)\n [orabug 9107465]\n- [xen] PV guest with FC HBA hangs during shutdown (Chuck Anderson)\n [orabug 9764220]\n- Support 256GB+ memory for pv guest (Mukesh Rathor) [orabug 9450615]\n- fix overcommit memory to use percpu_counter for (KOSAKI Motohiro,\n Guru Anbalagane) [orabug 6124033]\n- [ipmi] make configurable timeouts for kcs of ipmi [orabug 9752208]\n- [ib] fix memory corruption (Andy Grover) [orabug 9972346]\n- [usb] USB: fix __must_check warnings in drivers/usb/core/ (Junxiao Bi) [orabug 14795203]\n- [usb] usbcore: fix endpoint device creation (Junxiao Bi) [orabug 14795203]\n- [usb] usbcore: fix refcount bug in endpoint removal (Junxiao Bi) [orabug 14795203]", u'issued': u'2013-03-06', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELSA-2013-0594-1.html', u'type': u'self', u'id': None, u'title': u'ELSA-2013-0594-1'}, {u'href': u'http://linux.oracle.com/cve/CVE-2012-3400.html', u'type': u'cve', u'id': u'CVE-2012-3400', u'title': u'CVE-2012-3400'}], u'_content_type_id': u'erratum', u'_id': u'402b6397-9862-4c18-99c3-451a50ff9d72', u'from': u'el-errata@oss.oracle.com', u'severity': u'Low', u'title': u' kernel security and bug fix update', u'_ns': u'units_erratum', u'rights': u'Copyright 2013 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 5', u'reboot_suggested': False, u'type': u'security', u'pkglist': [{u'packages': [{u'src': None, u'name': u'kernel', u'sum': [u'md5', u'9476739e470bc52f4c77b7f6a984d697'], u'filename': u'kernel-2.6.18-348.2.1.0.1.el5.src.rpm', u'epoch': u'0', u'version': u'2.6.18', u'release': u'348.2.1.0.1.el5', u'arch': u'src'}, {u'src': None, u'name': u'kernel', u'sum': [u'md5', u'a1230462eedd313e9ae8119f1afdd127'], u'filename': u'kernel-2.6.18-348.2.1.0.1.el5.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.18', u'release': u'348.2.1.0.1.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'kernel-debug', u'sum': [u'md5', u'41f5f63fe385fde06e2fe532d1c4aadf'], u'filename': u'kernel-debug-2.6.18-348.2.1.0.1.el5.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.18', u'release': u'348.2.1.0.1.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'kernel-debug-devel', u'sum': [u'md5', u'27aee775a69874ae81de87b39c11b299'], u'filename': u'kernel-debug-devel-2.6.18-348.2.1.0.1.el5.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.18', u'release': u'348.2.1.0.1.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'kernel-devel', u'sum': [u'md5', u'b471931e165cf7493c32cd6bf323f08e'], u'filename': u'kernel-devel-2.6.18-348.2.1.0.1.el5.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.18', u'release': u'348.2.1.0.1.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'kernel-doc', u'sum': [u'md5', u'3b421b2190ba4aae491d2f8cec133ca2'], u'filename': u'kernel-doc-2.6.18-348.2.1.0.1.el5.noarch.rpm', u'epoch': u'0', u'version': u'2.6.18', u'release': u'348.2.1.0.1.el5', u'arch': u'noarch'}, {u'src': None, u'name': u'kernel-headers', u'sum': [u'md5', u'e207920b1943bc39b612d55f94cbd038'], u'filename': u'kernel-headers-2.6.18-348.2.1.0.1.el5.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.18', u'release': u'348.2.1.0.1.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'kernel-xen', u'sum': [u'md5', u'c910da44c96b07e7b88fc5b357718069'], u'filename': u'kernel-xen-2.6.18-348.2.1.0.1.el5.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.18', u'release': u'348.2.1.0.1.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'kernel-xen-devel', u'sum': [u'md5', u'42f43fdba170500bb36a59d8712db111'], u'filename': u'kernel-xen-devel-2.6.18-348.2.1.0.1.el5.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.18', u'release': u'348.2.1.0.1.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'ocfs2-2.6.18-348.2.1.0.1.el5', u'sum': [u'md5', u'34fccd903f2658916632bc9db4bd785e'], u'filename': u'ocfs2-2.6.18-348.2.1.0.1.el5-1.4.10-1.el5.src.rpm', u'epoch': u'0', u'version': u'1.4.10', u'release': u'1.el5', u'arch': u'src'}, {u'src': None, u'name': u'ocfs2-2.6.18-348.2.1.0.1.el5', u'sum': [u'md5', u'67f5bdb63dc81aa5bbf4af9edd9cc341'], u'filename': u'ocfs2-2.6.18-348.2.1.0.1.el5-1.4.10-1.el5.x86_64.rpm', u'epoch': u'0', u'version': u'1.4.10', u'release': u'1.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'ocfs2-2.6.18-348.2.1.0.1.el5debug', u'sum': [u'md5', u'd5cf26e49ea057f0984694d602d2da29'], u'filename': u'ocfs2-2.6.18-348.2.1.0.1.el5debug-1.4.10-1.el5.x86_64.rpm', u'epoch': u'0', u'version': u'1.4.10', u'release': u'1.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'ocfs2-2.6.18-348.2.1.0.1.el5xen', u'sum': [u'md5', u'ea985bc70d792129631b2135a2c16365'], u'filename': u'ocfs2-2.6.18-348.2.1.0.1.el5xen-1.4.10-1.el5.x86_64.rpm', u'epoch': u'0', u'version': u'1.4.10', u'release': u'1.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'oracleasm-2.6.18-348.2.1.0.1.el5', u'sum': [u'md5', u'b81c8e4ceb3ba063b4c98090cbb90c81'], u'filename': u'oracleasm-2.6.18-348.2.1.0.1.el5-2.0.5-1.el5.src.rpm', u'epoch': u'0', u'version': u'2.0.5', u'release': u'1.el5', u'arch': u'src'}, {u'src': None, u'name': u'oracleasm-2.6.18-348.2.1.0.1.el5', u'sum': [u'md5', u'fcc5f287aa0afd1b6caf134bf3873773'], u'filename': u'oracleasm-2.6.18-348.2.1.0.1.el5-2.0.5-1.el5.x86_64.rpm', u'epoch': u'0', u'version': u'2.0.5', u'release': u'1.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'oracleasm-2.6.18-348.2.1.0.1.el5debug', u'sum': [u'md5', u'88d31d2d9b420e49dde89f5018d04055'], u'filename': u'oracleasm-2.6.18-348.2.1.0.1.el5debug-2.0.5-1.el5.x86_64.rpm', u'epoch': u'0', u'version': u'2.0.5', u'release': u'1.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'oracleasm-2.6.18-348.2.1.0.1.el5xen', u'sum': [u'md5', u'abc3708337ad93ea3402f231344e3831'], u'filename': u'oracleasm-2.6.18-348.2.1.0.1.el5xen-2.0.5-1.el5.x86_64.rpm', u'epoch': u'0', u'version': u'2.0.5', u'release': u'1.el5', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u'[3.0.3-142.el5_9.2]\n- e1000: discard packets that are too long if !SBP and !LPE (rhbz 910843)\n- e1000: discard oversized packets based on SBP|LPE (rhbz 910843)', u'issued': u'2013-03-06', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELSA-2013-0599.html', u'type': u'self', u'id': None, u'title': u'ELSA-2013-0599'}, {u'href': u'http://linux.oracle.com/cve/CVE-2012-6075.html', u'type': u'cve', u'id': u'CVE-2012-6075', u'title': u'CVE-2012-6075'}], u'_content_type_id': u'erratum', u'_id': u'20906d7f-4a68-4808-8173-342565877167', u'from': u'el-errata@oss.oracle.com', u'severity': u'Important', u'title': u' xen security update', u'_ns': u'units_erratum', u'rights': u'Copyright 2013 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 5', u'reboot_suggested': False, u'type': u'security', u'pkglist': [{u'packages': [{u'src': None, u'name': u'xen', u'sum': [u'md5', u'821353c19417e6544ad46c9d8279a7a5'], u'filename': u'xen-3.0.3-142.el5_9.2.src.rpm', u'epoch': u'0', u'version': u'3.0.3', u'release': u'142.el5_9.2', u'arch': u'src'}, {u'src': None, u'name': u'xen', u'sum': [u'md5', u'c7d0b76c13f410acef24a13ca10bff05'], u'filename': u'xen-3.0.3-142.el5_9.2.x86_64.rpm', u'epoch': u'0', u'version': u'3.0.3', u'release': u'142.el5_9.2', u'arch': u'x86_64'}, {u'src': None, u'name': u'xen-devel', u'sum': [u'md5', u'107849c20a81e3674d76c23ee83db48a'], u'filename': u'xen-devel-3.0.3-142.el5_9.2.i386.rpm', u'epoch': u'0', u'version': u'3.0.3', u'release': u'142.el5_9.2', u'arch': u'i386'}, {u'src': None, u'name': u'xen-devel', u'sum': [u'md5', u'eb657d3d0a180b0debe35db44dc44f2b'], u'filename': u'xen-devel-3.0.3-142.el5_9.2.x86_64.rpm', u'epoch': u'0', u'version': u'3.0.3', u'release': u'142.el5_9.2', u'arch': u'x86_64'}, {u'src': None, u'name': u'xen-libs', u'sum': [u'md5', u'8323f2e70fa5010ef77cd7744687859d'], u'filename': u'xen-libs-3.0.3-142.el5_9.2.i386.rpm', u'epoch': u'0', u'version': u'3.0.3', u'release': u'142.el5_9.2', u'arch': u'i386'}, {u'src': None, u'name': u'xen-libs', u'sum': [u'md5', u'd67cf03473f8ec29e46aee9dd99dd1f4'], u'filename': u'xen-libs-3.0.3-142.el5_9.2.x86_64.rpm', u'epoch': u'0', u'version': u'3.0.3', u'release': u'142.el5_9.2', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u"[1.7.0.9-2.3.8.0.0.1.el5_9]\n- Add oracle-enterprise.patch\n- Fix DISTRO_NAME to 'Enterprise Linux'\n\n[1.7.0.9-2.3.8.0.el5_9]\n- Updated to icedtea7-forest-2.3\n- Resolves: rhbz#917181", u'issued': u'2013-03-06', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELSA-2013-0603.html', u'type': u'self', u'id': None, u'title': u'ELSA-2013-0603'}, {u'href': u'http://linux.oracle.com/cve/CVE-2013-0809.html', u'type': u'cve', u'id': u'CVE-2013-0809', u'title': u'CVE-2013-0809'}, {u'href': u'http://linux.oracle.com/cve/CVE-2013-1493.html', u'type': u'cve', u'id': u'CVE-2013-1493', u'title': u'CVE-2013-1493'}], u'_content_type_id': u'erratum', u'_id': u'4cf70bd0-fdc9-4465-8783-886cc36881dd', u'from': u'el-errata@oss.oracle.com', u'severity': u'Important', u'title': u' java-1.7.0-openjdk security update', u'_ns': u'units_erratum', u'rights': u'Copyright 2013 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 5', u'reboot_suggested': False, u'type': u'security', u'pkglist': [{u'packages': [{u'src': None, u'name': u'java-1.7.0-openjdk', u'sum': [u'md5', u'1ae93278c6817763c493d754a5214d6c'], u'filename': u'java-1.7.0-openjdk-1.7.0.9-2.3.8.0.0.1.el5_9.src.rpm', u'epoch': u'1', u'version': u'1.7.0.9', u'release': u'2.3.8.0.0.1.el5_9', u'arch': u'src'}, {u'src': None, u'name': u'java-1.7.0-openjdk', u'sum': [u'md5', u'03aa8e8517c5fb54e720e9365ef50f1d'], u'filename': u'java-1.7.0-openjdk-1.7.0.9-2.3.8.0.0.1.el5_9.x86_64.rpm', u'epoch': u'1', u'version': u'1.7.0.9', u'release': u'2.3.8.0.0.1.el5_9', u'arch': u'x86_64'}, {u'src': None, u'name': u'java-1.7.0-openjdk-demo', u'sum': [u'md5', u'054be9f27dc3cd1e05f7b047d67d512f'], u'filename': u'java-1.7.0-openjdk-demo-1.7.0.9-2.3.8.0.0.1.el5_9.x86_64.rpm', u'epoch': u'1', u'version': u'1.7.0.9', u'release': u'2.3.8.0.0.1.el5_9', u'arch': u'x86_64'}, {u'src': None, u'name': u'java-1.7.0-openjdk-devel', u'sum': [u'md5', u'b302937da3577b2252061edc60a69994'], u'filename': u'java-1.7.0-openjdk-devel-1.7.0.9-2.3.8.0.0.1.el5_9.x86_64.rpm', u'epoch': u'1', u'version': u'1.7.0.9', u'release': u'2.3.8.0.0.1.el5_9', u'arch': u'x86_64'}, {u'src': None, u'name': u'java-1.7.0-openjdk-javadoc', u'sum': [u'md5', u'585959c3ddd1b575d1c66da53bf7e830'], u'filename': u'java-1.7.0-openjdk-javadoc-1.7.0.9-2.3.8.0.0.1.el5_9.x86_64.rpm', u'epoch': u'1', u'version': u'1.7.0.9', u'release': u'2.3.8.0.0.1.el5_9', u'arch': u'x86_64'}, {u'src': None, u'name': u'java-1.7.0-openjdk-src', u'sum': [u'md5', u'007d1c99a0d88a3649e95c125aac1387'], u'filename': u'java-1.7.0-openjdk-src-1.7.0.9-2.3.8.0.0.1.el5_9.x86_64.rpm', u'epoch': u'1', u'version': u'1.7.0.9', u'release': u'2.3.8.0.0.1.el5_9', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u'[ 1:1.6.0.0-1.36.1.11.9.0.1.el5_9]\n- Add oracle-enterprise.patch\n\n[1:1.6.0.0-1.36.1.11.9]\n- Updated to icedtea6 1.11.9\n- Resolves: rhbz#917176', u'issued': u'2013-03-06', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELSA-2013-0604.html', u'type': u'self', u'id': None, u'title': u'ELSA-2013-0604'}, {u'href': u'http://linux.oracle.com/cve/CVE-2013-0809.html', u'type': u'cve', u'id': u'CVE-2013-0809', u'title': u'CVE-2013-0809'}, {u'href': u'http://linux.oracle.com/cve/CVE-2013-1493.html', u'type': u'cve', u'id': u'CVE-2013-1493', u'title': u'CVE-2013-1493'}], u'_content_type_id': u'erratum', u'_id': u'8cbb1692-d1a0-4913-89cc-66783aa4a1c8', u'from': u'el-errata@oss.oracle.com', u'severity': u'Important', u'title': u' java-1.6.0-openjdk security update', u'_ns': u'units_erratum', u'rights': u'Copyright 2013 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 5', u'reboot_suggested': False, u'type': u'security', u'pkglist': [{u'packages': [{u'src': None, u'name': u'java-1.6.0-openjdk', u'sum': [u'md5', u'05720706f669b237f1f739997c3ef6b3'], u'filename': u'java-1.6.0-openjdk-1.6.0.0-1.36.1.11.9.0.1.el5_9.src.rpm', u'epoch': u'1', u'version': u'1.6.0.0', u'release': u'1.36.1.11.9.0.1.el5_9', u'arch': u'src'}, {u'src': None, u'name': u'java-1.6.0-openjdk', u'sum': [u'md5', u'f72d7f10fb515cbe0117bcab615b0b08'], u'filename': u'java-1.6.0-openjdk-1.6.0.0-1.36.1.11.9.0.1.el5_9.x86_64.rpm', u'epoch': u'1', u'version': u'1.6.0.0', u'release': u'1.36.1.11.9.0.1.el5_9', u'arch': u'x86_64'}, {u'src': None, u'name': u'java-1.6.0-openjdk-demo', u'sum': [u'md5', u'dfb9401130140cc88bfa2aa734a91bad'], u'filename': u'java-1.6.0-openjdk-demo-1.6.0.0-1.36.1.11.9.0.1.el5_9.x86_64.rpm', u'epoch': u'1', u'version': u'1.6.0.0', u'release': u'1.36.1.11.9.0.1.el5_9', u'arch': u'x86_64'}, {u'src': None, u'name': u'java-1.6.0-openjdk-devel', u'sum': [u'md5', u'321cc1a30871ae0095d404f9091c29b6'], u'filename': u'java-1.6.0-openjdk-devel-1.6.0.0-1.36.1.11.9.0.1.el5_9.x86_64.rpm', u'epoch': u'1', u'version': u'1.6.0.0', u'release': u'1.36.1.11.9.0.1.el5_9', u'arch': u'x86_64'}, {u'src': None, u'name': u'java-1.6.0-openjdk-javadoc', u'sum': [u'md5', u'd9dc85ed7ec13b5e1c34c60342f7d17e'], u'filename': u'java-1.6.0-openjdk-javadoc-1.6.0.0-1.36.1.11.9.0.1.el5_9.x86_64.rpm', u'epoch': u'1', u'version': u'1.6.0.0', u'release': u'1.36.1.11.9.0.1.el5_9', u'arch': u'x86_64'}, {u'src': None, u'name': u'java-1.6.0-openjdk-src', u'sum': [u'md5', u'3fbcbdf61d1c8a120d7e240d9926e89f'], u'filename': u'java-1.6.0-openjdk-src-1.6.0.0-1.36.1.11.9.0.1.el5_9.x86_64.rpm', u'epoch': u'1', u'version': u'1.6.0.0', u'release': u'1.36.1.11.9.0.1.el5_9', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u'[kvm-83-262.0.1.el5_9.1]\n- Added kvm-add-oracle-workaround-for-libvirt-bug.patch\n- Added kvm-Introduce-oel-machine-type.patch\n\n[kvm-83-262.el5_1]\n- kvm-e1000-Discard-packets-that-are-too-long-if-SBP-and-L.patch [bz#910839]\n- kvm-e1000-Discard-oversized-packets-based-on-SBP-LPE.patch [bz#910839]\n- Resolves: bz#910839\n (CVE-2012-6075 qemu (e1000 device driver): Buffer overflow when processing large packets when SBP and LPE flags are disabled [rhel-5.9.z])', u'issued': u'2013-03-07', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELSA-2013-0608.html', u'type': u'self', u'id': None, u'title': u'ELSA-2013-0608'}, {u'href': u'http://linux.oracle.com/cve/CVE-2012-6075.html', u'type': u'cve', u'id': u'CVE-2012-6075', u'title': u'CVE-2012-6075'}], u'_content_type_id': u'erratum', u'_id': u'3008dd82-c083-4b6a-b756-0bbae21ac2c2', u'from': u'el-errata@oss.oracle.com', u'severity': u'Important', u'title': u' kvm security update', u'_ns': u'units_erratum', u'rights': u'Copyright 2013 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 5', u'reboot_suggested': False, u'type': u'security', u'pkglist': [{u'packages': [{u'src': None, u'name': u'kmod-kvm', u'sum': [u'md5', u'9b3991a8d9b278be8aa57b44d514787a'], u'filename': u'kmod-kvm-83-262.0.1.el5_9.1.x86_64.rpm', u'epoch': u'0', u'version': u'83', u'release': u'262.0.1.el5_9.1', u'arch': u'x86_64'}, {u'src': None, u'name': u'kmod-kvm-debug', u'sum': [u'md5', u'34db3fbee603d7004e52c6591a5fbb2c'], u'filename': u'kmod-kvm-debug-83-262.0.1.el5_9.1.x86_64.rpm', u'epoch': u'0', u'version': u'83', u'release': u'262.0.1.el5_9.1', u'arch': u'x86_64'}, {u'src': None, u'name': u'kvm', u'sum': [u'md5', u'f5a6b5dc8450a6bfacb6b36551ea43a7'], u'filename': u'kvm-83-262.0.1.el5_9.1.src.rpm', u'epoch': u'0', u'version': u'83', u'release': u'262.0.1.el5_9.1', u'arch': u'src'}, {u'src': None, u'name': u'kvm', u'sum': [u'md5', u'138037eb4ca79a1b9e8004f4cea94544'], u'filename': u'kvm-83-262.0.1.el5_9.1.x86_64.rpm', u'epoch': u'0', u'version': u'83', u'release': u'262.0.1.el5_9.1', u'arch': u'x86_64'}, {u'src': None, u'name': u'kvm-qemu-img', u'sum': [u'md5', u'f506bb8a5a8bcf3f1761b3386f46e474'], u'filename': u'kvm-qemu-img-83-262.0.1.el5_9.1.x86_64.rpm', u'epoch': u'0', u'version': u'83', u'release': u'262.0.1.el5_9.1', u'arch': u'x86_64'}, {u'src': None, u'name': u'kvm-tools', u'sum': [u'md5', u'65a7937d4a9de2806433e88869af0e6b'], u'filename': u'kvm-tools-83-262.0.1.el5_9.1.x86_64.rpm', u'epoch': u'0', u'version': u'83', u'release': u'262.0.1.el5_9.1', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u'[1.8.5-29]\n- Fix regression introduced by fix for entity expansion DOS vulnerability\n in REXML (https://bugs.ruby-lang.org/issues/7961)\n * ruby-2.0.0-add-missing-rexml-require.patch\n- Related: rhbz#915377\n\n[1.8.5-28]\n- Addresses entity expansion DoS vulnerability in REXML.\n * ruby-2.0.0-entity-expansion-DoS-vulnerability-in-REXML.patch\n- Resolves: rhbz#915377', u'issued': u'2013-03-07', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELSA-2013-0611.html', u'type': u'self', u'id': None, u'title': u'ELSA-2013-0611'}, {u'href': u'http://linux.oracle.com/cve/CVE-2013-1821.html', u'type': u'cve', u'id': u'CVE-2013-1821', u'title': u'CVE-2013-1821'}], u'_content_type_id': u'erratum', u'_id': u'9c46bc5b-4ba5-4c8f-bfa7-cc173b5bb00e', u'from': u'el-errata@oss.oracle.com', u'severity': u'Moderate', u'title': u' ruby security update', u'_ns': u'units_erratum', u'rights': u'Copyright 2013 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 5', u'reboot_suggested': False, u'type': u'security', u'pkglist': [{u'packages': [{u'src': None, u'name': u'ruby', u'sum': [u'md5', u'2c965b863f9189991ecf8e29ebe55941'], u'filename': u'ruby-1.8.5-29.el5_9.src.rpm', u'epoch': u'0', u'version': u'1.8.5', u'release': u'29.el5_9', u'arch': u'src'}, {u'src': None, u'name': u'ruby', u'sum': [u'md5', u'0ce4e8550595be1e91c1a8fc7b4b0998'], u'filename': u'ruby-1.8.5-29.el5_9.x86_64.rpm', u'epoch': u'0', u'version': u'1.8.5', u'release': u'29.el5_9', u'arch': u'x86_64'}, {u'src': None, u'name': u'ruby-devel', u'sum': [u'md5', u'188bc431becf691b7423438df10526fb'], u'filename': u'ruby-devel-1.8.5-29.el5_9.i386.rpm', u'epoch': u'0', u'version': u'1.8.5', u'release': u'29.el5_9', u'arch': u'i386'}, {u'src': None, u'name': u'ruby-devel', u'sum': [u'md5', u'67a0d0f342de4ca4fb39a67180bd5642'], u'filename': u'ruby-devel-1.8.5-29.el5_9.x86_64.rpm', u'epoch': u'0', u'version': u'1.8.5', u'release': u'29.el5_9', u'arch': u'x86_64'}, {u'src': None, u'name': u'ruby-docs', u'sum': [u'md5', u'c7b19f6f1ee18518abaddbbaa4bb7999'], u'filename': u'ruby-docs-1.8.5-29.el5_9.x86_64.rpm', u'epoch': u'0', u'version': u'1.8.5', u'release': u'29.el5_9', u'arch': u'x86_64'}, {u'src': None, u'name': u'ruby-irb', u'sum': [u'md5', u'032dfe9585771fc3302a205b7f55260e'], u'filename': u'ruby-irb-1.8.5-29.el5_9.x86_64.rpm', u'epoch': u'0', u'version': u'1.8.5', u'release': u'29.el5_9', u'arch': u'x86_64'}, {u'src': None, u'name': u'ruby-libs', u'sum': [u'md5', u'e438f666e50f789738976e0e66b6d2a8'], u'filename': u'ruby-libs-1.8.5-29.el5_9.i386.rpm', u'epoch': u'0', u'version': u'1.8.5', u'release': u'29.el5_9', u'arch': u'i386'}, {u'src': None, u'name': u'ruby-libs', u'sum': [u'md5', u'f198f16efdc3a2e49bad7c20b448c286'], u'filename': u'ruby-libs-1.8.5-29.el5_9.x86_64.rpm', u'epoch': u'0', u'version': u'1.8.5', u'release': u'29.el5_9', u'arch': u'x86_64'}, {u'src': None, u'name': u'ruby-mode', u'sum': [u'md5', u'3ef7f1da91443875f1ab69daebfdaf29'], u'filename': u'ruby-mode-1.8.5-29.el5_9.x86_64.rpm', u'epoch': u'0', u'version': u'1.8.5', u'release': u'29.el5_9', u'arch': u'x86_64'}, {u'src': None, u'name': u'ruby-rdoc', u'sum': [u'md5', u'e3b274d5b5f94a0f6954f2fecb55fd5e'], u'filename': u'ruby-rdoc-1.8.5-29.el5_9.x86_64.rpm', u'epoch': u'0', u'version': u'1.8.5', u'release': u'29.el5_9', u'arch': u'x86_64'}, {u'src': None, u'name': u'ruby-ri', u'sum': [u'md5', u'e26dc588915bb62a014ccdb9243e4fe7'], u'filename': u'ruby-ri-1.8.5-29.el5_9.x86_64.rpm', u'epoch': u'0', u'version': u'1.8.5', u'release': u'29.el5_9', u'arch': u'x86_64'}, {u'src': None, u'name': u'ruby-tcltk', u'sum': [u'md5', u'fec751d06e63a357220d4fcdb86816a5'], u'filename': u'ruby-tcltk-1.8.5-29.el5_9.x86_64.rpm', u'epoch': u'0', u'version': u'1.8.5', u'release': u'29.el5_9', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u'[17.0.3-2.0.1.el6_4]\n- Replaced xulrunner-redhat-default-prefs.js with xulrunner-oracle-default-prefs.js\n- Removed XULRUNNER_VERSION from SOURCE21\n\n[17.0.3-2]\n- Added fix for #848644', u'issued': u'2013-03-08', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELSA-2013-0614.html', u'type': u'self', u'id': None, u'title': u'ELSA-2013-0614'}, {u'href': u'http://linux.oracle.com/cve/CVE-2013-0787.html', u'type': u'cve', u'id': u'CVE-2013-0787', u'title': u'CVE-2013-0787'}], u'_content_type_id': u'erratum', u'_id': u'93a0ce6d-a748-4168-a0c4-cd77b6ac32e8', u'from': u'el-errata@oss.oracle.com', u'severity': u'Critical', u'title': u' xulrunner security update', u'_ns': u'units_erratum', u'rights': u'Copyright 2013 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 6', u'reboot_suggested': False, u'type': u'security', u'pkglist': [{u'packages': [{u'src': None, u'name': u'xulrunner', u'sum': [u'md5', u'34871b2ee0e1c60dbcbcc7732dab3b0d'], u'filename': u'xulrunner-17.0.3-2.0.1.el6_4.i686.rpm', u'epoch': u'0', u'version': u'17.0.3', u'release': u'2.0.1.el6_4', u'arch': u'i686'}, {u'src': None, u'name': u'xulrunner', u'sum': [u'md5', u'f5cde20a01a6d20b724c07f36c273290'], u'filename': u'xulrunner-17.0.3-2.0.1.el6_4.src.rpm', u'epoch': u'0', u'version': u'17.0.3', u'release': u'2.0.1.el6_4', u'arch': u'src'}, {u'src': None, u'name': u'xulrunner', u'sum': [u'md5', u'aeb6ca0c75d6f51f66cd57e66008a7cd'], u'filename': u'xulrunner-17.0.3-2.0.1.el6_4.x86_64.rpm', u'epoch': u'0', u'version': u'17.0.3', u'release': u'2.0.1.el6_4', u'arch': u'x86_64'}, {u'src': None, u'name': u'xulrunner-devel', u'sum': [u'md5', u'c1b15ba52153486cca5ab2d34138e115'], u'filename': u'xulrunner-devel-17.0.3-2.0.1.el6_4.i686.rpm', u'epoch': u'0', u'version': u'17.0.3', u'release': u'2.0.1.el6_4', u'arch': u'i686'}, {u'src': None, u'name': u'xulrunner-devel', u'sum': [u'md5', u'986c06f4428ebe2bbe1e174989abde2e'], u'filename': u'xulrunner-devel-17.0.3-2.0.1.el6_4.x86_64.rpm', u'epoch': u'0', u'version': u'17.0.3', u'release': u'2.0.1.el6_4', u'arch': u'x86_64'}], u'name': u'ol6_x86_64_latest', u'short': u'ol6_x86_64_latest'}, {u'packages': [{u'src': None, u'name': u'xulrunner', u'sum': [u'md5', u'ef0cd3f7836b12facccd4d4c4c9b4f85'], u'filename': u'xulrunner-17.0.3-2.0.1.el5_9.i386.rpm', u'epoch': u'0', u'version': u'17.0.3', u'release': u'2.0.1.el5_9', u'arch': u'i386'}, {u'src': None, u'name': u'xulrunner', u'sum': [u'md5', u'840b571e886ae819746dd5622d93b0a2'], u'filename': u'xulrunner-17.0.3-2.0.1.el5_9.src.rpm', u'epoch': u'0', u'version': u'17.0.3', u'release': u'2.0.1.el5_9', u'arch': u'src'}, {u'src': None, u'name': u'xulrunner', u'sum': [u'md5', u'622bbf011687d638ad474a27004ad396'], u'filename': u'xulrunner-17.0.3-2.0.1.el5_9.x86_64.rpm', u'epoch': u'0', u'version': u'17.0.3', u'release': u'2.0.1.el5_9', u'arch': u'x86_64'}, {u'src': None, u'name': u'xulrunner-devel', u'sum': [u'md5', u'80301bfffe777863efc384139a14c08b'], u'filename': u'xulrunner-devel-17.0.3-2.0.1.el5_9.i386.rpm', u'epoch': u'0', u'version': u'17.0.3', u'release': u'2.0.1.el5_9', u'arch': u'i386'}, {u'src': None, u'name': u'xulrunner-devel', u'sum': [u'md5', u'e856a0c2bed83d3a9bb22a4c52180626'], u'filename': u'xulrunner-devel-17.0.3-2.0.1.el5_9.x86_64.rpm', u'epoch': u'0', u'version': u'17.0.3', u'release': u'2.0.1.el5_9', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u'kernel\n[2.6.18-348.3.1]\n- [utrace] ensure arch_ptrace() can never race with SIGKILL (Oleg Nesterov) [912071 912072] {CVE-2013-0871}\n- [x86] msr: Add capabilities check (Nikola Pajkovsky) [908696 908697] {CVE-2013-0268}', u'issued': u'2013-03-11', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELSA-2013-0621.html', u'type': u'self', u'id': None, u'title': u'ELSA-2013-0621'}, {u'href': u'http://linux.oracle.com/cve/CVE-2013-0871.html', u'type': u'cve', u'id': u'CVE-2013-0871', u'title': u'CVE-2013-0871'}, {u'href': u'http://linux.oracle.com/cve/CVE-2013-0268.html', u'type': u'cve', u'id': u'CVE-2013-0268', u'title': u'CVE-2013-0268'}], u'_content_type_id': u'erratum', u'_id': u'c44ec7b0-4149-4fca-91ec-923b2a23c97e', u'from': u'el-errata@oss.oracle.com', u'severity': u'Important', u'title': u' kernel security update', u'_ns': u'units_erratum', u'rights': u'Copyright 2013 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 5', u'reboot_suggested': False, u'type': u'security', u'pkglist': [{u'packages': [{u'src': None, u'name': u'kernel', u'sum': [u'md5', u'46abb194cdc96ce2af3d54a489e03561'], u'filename': u'kernel-2.6.18-348.3.1.el5.src.rpm', u'epoch': u'0', u'version': u'2.6.18', u'release': u'348.3.1.el5', u'arch': u'src'}, {u'src': None, u'name': u'kernel', u'sum': [u'md5', u'e3bb548d0ebba9881602a008f98c6067'], u'filename': u'kernel-2.6.18-348.3.1.el5.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.18', u'release': u'348.3.1.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'kernel-debug', u'sum': [u'md5', u'61e37380163e226cd583fec7b1087fc7'], u'filename': u'kernel-debug-2.6.18-348.3.1.el5.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.18', u'release': u'348.3.1.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'kernel-debug-devel', u'sum': [u'md5', u'de18e90eb113fed6bfa9d4596852a829'], u'filename': u'kernel-debug-devel-2.6.18-348.3.1.el5.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.18', u'release': u'348.3.1.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'kernel-devel', u'sum': [u'md5', u'0e9224b22b2ab31451a8a0dda00a794b'], u'filename': u'kernel-devel-2.6.18-348.3.1.el5.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.18', u'release': u'348.3.1.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'kernel-doc', u'sum': [u'md5', u'f6c2cb7827024b4f116a573a6e309f8d'], u'filename': u'kernel-doc-2.6.18-348.3.1.el5.noarch.rpm', u'epoch': u'0', u'version': u'2.6.18', u'release': u'348.3.1.el5', u'arch': u'noarch'}, {u'src': None, u'name': u'kernel-headers', u'sum': [u'md5', u'5da1e02aa21eed84da94fcfb83b76c4c'], u'filename': u'kernel-headers-2.6.18-348.3.1.el5.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.18', u'release': u'348.3.1.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'kernel-xen', u'sum': [u'md5', u'7154dc5a40ce45d082e144e963c4444a'], u'filename': u'kernel-xen-2.6.18-348.3.1.el5.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.18', u'release': u'348.3.1.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'kernel-xen-devel', u'sum': [u'md5', u'd73249f64a856f56fbf73f8fd546a3b9'], u'filename': u'kernel-xen-devel-2.6.18-348.3.1.el5.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.18', u'release': u'348.3.1.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'ocfs2-2.6.18-348.3.1.el5', u'sum': [u'md5', u'41e0f0756c2116ecf80fdcf1fa36c684'], u'filename': u'ocfs2-2.6.18-348.3.1.el5-1.4.10-1.el5.src.rpm', u'epoch': u'0', u'version': u'1.4.10', u'release': u'1.el5', u'arch': u'src'}, {u'src': None, u'name': u'ocfs2-2.6.18-348.3.1.el5', u'sum': [u'md5', u'01da28426409c26a136a0d3d9f73288c'], u'filename': u'ocfs2-2.6.18-348.3.1.el5-1.4.10-1.el5.x86_64.rpm', u'epoch': u'0', u'version': u'1.4.10', u'release': u'1.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'ocfs2-2.6.18-348.3.1.el5debug', u'sum': [u'md5', u'3de00e54d1e9b12da330460b851189dc'], u'filename': u'ocfs2-2.6.18-348.3.1.el5debug-1.4.10-1.el5.x86_64.rpm', u'epoch': u'0', u'version': u'1.4.10', u'release': u'1.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'ocfs2-2.6.18-348.3.1.el5xen', u'sum': [u'md5', u'533c28b3455aa96d2767d47a58effc05'], u'filename': u'ocfs2-2.6.18-348.3.1.el5xen-1.4.10-1.el5.x86_64.rpm', u'epoch': u'0', u'version': u'1.4.10', u'release': u'1.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'oracleasm-2.6.18-348.3.1.el5', u'sum': [u'md5', u'd7b8b23264d22b8892d9750ffcd5817e'], u'filename': u'oracleasm-2.6.18-348.3.1.el5-2.0.5-1.el5.src.rpm', u'epoch': u'0', u'version': u'2.0.5', u'release': u'1.el5', u'arch': u'src'}, {u'src': None, u'name': u'oracleasm-2.6.18-348.3.1.el5', u'sum': [u'md5', u'75fad9d837f9565db537d5647694f43d'], u'filename': u'oracleasm-2.6.18-348.3.1.el5-2.0.5-1.el5.x86_64.rpm', u'epoch': u'0', u'version': u'2.0.5', u'release': u'1.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'oracleasm-2.6.18-348.3.1.el5debug', u'sum': [u'md5', u'b6465442b55051c4c95d2381d7bd0255'], u'filename': u'oracleasm-2.6.18-348.3.1.el5debug-2.0.5-1.el5.x86_64.rpm', u'epoch': u'0', u'version': u'2.0.5', u'release': u'1.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'oracleasm-2.6.18-348.3.1.el5xen', u'sum': [u'md5', u'8390cf5a944440e9f2e737baf479c626'], u'filename': u'oracleasm-2.6.18-348.3.1.el5xen-2.0.5-1.el5.x86_64.rpm', u'epoch': u'0', u'version': u'2.0.5', u'release': u'1.el5', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u"kernel\n[2.6.18-348.3.1.0.1]\n- [oprofile] x86, mm: Add __get_user_pages_fast() [orabug 14277030]\n- [oprofile] export __get_user_pages_fast() function [orabug 14277030]\n- [oprofile] oprofile, x86: Fix nmi-unsafe callgraph support [orabug 14277030]\n- [oprofile] oprofile: use KM_NMI slot for kmap_atomic [orabug 14277030]\n- [oprofile] oprofile: i386 add get_user_pages_fast support [orabug 14277030]\n- [kernel] Initialize the local uninitialized variable stats. [orabug 14051367]\n- [fs] JBD:make jbd support 512B blocks correctly for ocfs2. [orabug 13477763]\n- [x86 ] fix fpu context corrupt when preempt in signal context [orabug 14038272]\n- [mm] fix hugetlb page leak (Dave McCracken) [orabug 12375075]\n- fix ia64 build error due to add-support-above-32-vcpus.patch(Zhenzhong Duan)\n- [x86] use dynamic vcpu_info remap to support more than 32 vcpus (Zhenzhong Duan)\n- [x86] Fix lvt0 reset when hvm boot up with noapic param\n- [scsi] remove printk's when doing I/O to a dead device (John Sobecki, Chris Mason)\n [orabug 12342275]\n- [char] ipmi: Fix IPMI errors due to timing problems (Joe Jin) [orabug 12561346]\n- [scsi] Fix race when removing SCSI devices (Joe Jin) [orabug 12404566]\n- [net] net: Redo the broken redhat netconsole over bonding (Tina Yang) [orabug 12740042]\n- [fs] nfs: Fix __put_nfs_open_context() NULL pointer panic (Joe Jin) [orabug 12687646]\n- fix filp_close() race (Joe Jin) [orabug 10335998]\n- make xenkbd.abs_pointer=1 by default [orabug 67188919]\n- [xen] check to see if hypervisor supports memory reservation change\n (Chuck Anderson) [orabug 7556514]\n- [net] Enable entropy for bnx2,bnx2x,e1000e,igb,ixgb,ixgbe,ixgbevf (John Sobecki)\n [orabug 10315433]\n- [NET] Add xen pv netconsole support (Tina Yang) [orabug 6993043] [bz 7258]\n- [mm] Patch shrink_zone to yield during severe mempressure events, avoiding\n hangs and evictions (John Sobecki,Chris Mason) [orabug 6086839]\n- [mm] Enhance shrink_zone patch allow full swap utilization, and also be\n NUMA-aware (John Sobecki,Chris Mason,Herbert van den Bergh) [orabug 9245919]\n- fix aacraid not to reset during kexec (Joe Jin) [orabug 8516042]\n- [xen] PVHVM guest with PoD crashes under memory pressure (Chuck Anderson)\n [orabug 9107465]\n- [xen] PV guest with FC HBA hangs during shutdown (Chuck Anderson)\n [orabug 9764220]\n- Support 256GB+ memory for pv guest (Mukesh Rathor) [orabug 9450615]\n- fix overcommit memory to use percpu_counter for (KOSAKI Motohiro,\n Guru Anbalagane) [orabug 6124033]\n- [ipmi] make configurable timeouts for kcs of ipmi [orabug 9752208]\n- [ib] fix memory corruption (Andy Grover) [orabug 9972346]\n- [usb] USB: fix __must_check warnings in drivers/usb/core/ (Junxiao Bi) [orabug 14795203]\n- [usb] usbcore: fix endpoint device creation (Junxiao Bi) [orabug 14795203]\n- [usb] usbcore: fix refcount bug in endpoint removal (Junxiao Bi) [orabug 14795203]\n\n[2.6.18-348.3.1]\n- [utrace] ensure arch_ptrace() can never race with SIGKILL (Oleg Nesterov) [912071 912072] {CVE-2013-0871}\n- [x86] msr: Add capabilities check (Nikola Pajkovsky) [908696 908697] {CVE-2013-0268}", u'issued': u'2013-03-11', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELSA-2013-0621-1.html', u'type': u'self', u'id': None, u'title': u'ELSA-2013-0621-1'}, {u'href': u'http://linux.oracle.com/cve/CVE-2013-0871.html', u'type': u'cve', u'id': u'CVE-2013-0871', u'title': u'CVE-2013-0871'}, {u'href': u'http://linux.oracle.com/cve/CVE-2013-0268.html', u'type': u'cve', u'id': u'CVE-2013-0268', u'title': u'CVE-2013-0268'}], u'_content_type_id': u'erratum', u'_id': u'7c29f34c-beb5-4785-8dfb-558574f610da', u'from': u'el-errata@oss.oracle.com', u'severity': u'Important', u'title': u' kernel security update', u'_ns': u'units_erratum', u'rights': u'Copyright 2013 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 5', u'reboot_suggested': False, u'type': u'security', u'pkglist': [{u'packages': [{u'src': None, u'name': u'kernel', u'sum': [u'md5', u'0d86197c227e923ca0c002b2508a2315'], u'filename': u'kernel-2.6.18-348.3.1.0.1.el5.src.rpm', u'epoch': u'0', u'version': u'2.6.18', u'release': u'348.3.1.0.1.el5', u'arch': u'src'}, {u'src': None, u'name': u'kernel', u'sum': [u'md5', u'29659c681803a4e686cb5bc049f786c9'], u'filename': u'kernel-2.6.18-348.3.1.0.1.el5.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.18', u'release': u'348.3.1.0.1.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'kernel-debug', u'sum': [u'md5', u'e8367c238e29b67d9b8d6a67ab2f89ca'], u'filename': u'kernel-debug-2.6.18-348.3.1.0.1.el5.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.18', u'release': u'348.3.1.0.1.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'kernel-debug-devel', u'sum': [u'md5', u'ebe29853c649b828c927a39bce888f64'], u'filename': u'kernel-debug-devel-2.6.18-348.3.1.0.1.el5.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.18', u'release': u'348.3.1.0.1.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'kernel-devel', u'sum': [u'md5', u'ee37276751bf48435cbe92def0d7e9c0'], u'filename': u'kernel-devel-2.6.18-348.3.1.0.1.el5.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.18', u'release': u'348.3.1.0.1.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'kernel-doc', u'sum': [u'md5', u'c01ac40860ee16fae912bb70289c1ac6'], u'filename': u'kernel-doc-2.6.18-348.3.1.0.1.el5.noarch.rpm', u'epoch': u'0', u'version': u'2.6.18', u'release': u'348.3.1.0.1.el5', u'arch': u'noarch'}, {u'src': None, u'name': u'kernel-headers', u'sum': [u'md5', u'0c3ec4502809787ba1d023f68d2da405'], u'filename': u'kernel-headers-2.6.18-348.3.1.0.1.el5.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.18', u'release': u'348.3.1.0.1.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'kernel-xen', u'sum': [u'md5', u'dd2dd23d6b95940ee09e3cf69f862003'], u'filename': u'kernel-xen-2.6.18-348.3.1.0.1.el5.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.18', u'release': u'348.3.1.0.1.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'kernel-xen-devel', u'sum': [u'md5', u'fb0946775cb6319b8b4496fa28a6effc'], u'filename': u'kernel-xen-devel-2.6.18-348.3.1.0.1.el5.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.18', u'release': u'348.3.1.0.1.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'ocfs2-2.6.18-348.3.1.0.1.el5', u'sum': [u'md5', u'9c4f417316a159bc32ff37b84b94ea64'], u'filename': u'ocfs2-2.6.18-348.3.1.0.1.el5-1.4.10-1.el5.src.rpm', u'epoch': u'0', u'version': u'1.4.10', u'release': u'1.el5', u'arch': u'src'}, {u'src': None, u'name': u'ocfs2-2.6.18-348.3.1.0.1.el5', u'sum': [u'md5', u'8bf42f96db1fa41d44fb9ef137030fab'], u'filename': u'ocfs2-2.6.18-348.3.1.0.1.el5-1.4.10-1.el5.x86_64.rpm', u'epoch': u'0', u'version': u'1.4.10', u'release': u'1.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'ocfs2-2.6.18-348.3.1.0.1.el5debug', u'sum': [u'md5', u'aacaaf8452757610372e427ff375b224'], u'filename': u'ocfs2-2.6.18-348.3.1.0.1.el5debug-1.4.10-1.el5.x86_64.rpm', u'epoch': u'0', u'version': u'1.4.10', u'release': u'1.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'ocfs2-2.6.18-348.3.1.0.1.el5xen', u'sum': [u'md5', u'5589269b099d49fc421b0793f0d7cebf'], u'filename': u'ocfs2-2.6.18-348.3.1.0.1.el5xen-1.4.10-1.el5.x86_64.rpm', u'epoch': u'0', u'version': u'1.4.10', u'release': u'1.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'oracleasm-2.6.18-348.3.1.0.1.el5', u'sum': [u'md5', u'a33c76e0bf68d306fe96d6b36abbb81d'], u'filename': u'oracleasm-2.6.18-348.3.1.0.1.el5-2.0.5-1.el5.src.rpm', u'epoch': u'0', u'version': u'2.0.5', u'release': u'1.el5', u'arch': u'src'}, {u'src': None, u'name': u'oracleasm-2.6.18-348.3.1.0.1.el5', u'sum': [u'md5', u'a3789a0667fb00e68136b2befce2feb8'], u'filename': u'oracleasm-2.6.18-348.3.1.0.1.el5-2.0.5-1.el5.x86_64.rpm', u'epoch': u'0', u'version': u'2.0.5', u'release': u'1.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'oracleasm-2.6.18-348.3.1.0.1.el5debug', u'sum': [u'md5', u'19e41c7a7c2beb45ceae7d54dea10c82'], u'filename': u'oracleasm-2.6.18-348.3.1.0.1.el5debug-2.0.5-1.el5.x86_64.rpm', u'epoch': u'0', u'version': u'2.0.5', u'release': u'1.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'oracleasm-2.6.18-348.3.1.0.1.el5xen', u'sum': [u'md5', u'21da7816a114d321b4252d6ecd22458f'], u'filename': u'oracleasm-2.6.18-348.3.1.0.1.el5xen-2.0.5-1.el5.x86_64.rpm', u'epoch': u'0', u'version': u'2.0.5', u'release': u'1.el5', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u'[0:5.5.23-0jpp.38]\n- Resolves: CVE-2012-3439 rhbz#882008 three DIGEST authentication\n- implementation\n- Resolves: CVE-2012-3546, rhbz#913034 Bypass of security constraints.\n- Remove unneeded handling of FORM authentication in RealmBase', u'issued': u'2013-03-12', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELSA-2013-0640.html', u'type': u'self', u'id': None, u'title': u'ELSA-2013-0640'}, {u'href': u'http://linux.oracle.com/cve/CVE-2012-3546.html', u'type': u'cve', u'id': u'CVE-2012-3546', u'title': u'CVE-2012-3546'}, {u'href': u'http://linux.oracle.com/cve/CVE-2012-5885.html', u'type': u'cve', u'id': u'CVE-2012-5885', u'title': u'CVE-2012-5885'}, {u'href': u'http://linux.oracle.com/cve/CVE-2012-5886.html', u'type': u'cve', u'id': u'CVE-2012-5886', u'title': u'CVE-2012-5886'}, {u'href': u'http://linux.oracle.com/cve/CVE-2012-5887.html', u'type': u'cve', u'id': u'CVE-2012-5887', u'title': u'CVE-2012-5887'}], u'_content_type_id': u'erratum', u'_id': u'1444a3ec-9cd8-488a-83e5-fb0e6ef40141', u'from': u'el-errata@oss.oracle.com', u'severity': u'Important', u'title': u' tomcat5 security update', u'_ns': u'units_erratum', u'rights': u'Copyright 2013 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 5', u'reboot_suggested': False, u'type': u'security', u'pkglist': [{u'packages': [{u'src': None, u'name': u'tomcat5', u'sum': [u'md5', u'f26a569bf4f86bb6d6605d29f731ea22'], u'filename': u'tomcat5-5.5.23-0jpp.38.el5_9.src.rpm', u'epoch': u'0', u'version': u'5.5.23', u'release': u'0jpp.38.el5_9', u'arch': u'src'}, {u'src': None, u'name': u'tomcat5', u'sum': [u'md5', u'91e855a2117b7ccb15cfaae8e229c89a'], u'filename': u'tomcat5-5.5.23-0jpp.38.el5_9.x86_64.rpm', u'epoch': u'0', u'version': u'5.5.23', u'release': u'0jpp.38.el5_9', u'arch': u'x86_64'}, {u'src': None, u'name': u'tomcat5-admin-webapps', u'sum': [u'md5', u'740ac0f653aa52382493d02b36ed0af0'], u'filename': u'tomcat5-admin-webapps-5.5.23-0jpp.38.el5_9.x86_64.rpm', u'epoch': u'0', u'version': u'5.5.23', u'release': u'0jpp.38.el5_9', u'arch': u'x86_64'}, {u'src': None, u'name': u'tomcat5-common-lib', u'sum': [u'md5', u'75a10838431087d0bd86b4eaa48493d9'], u'filename': u'tomcat5-common-lib-5.5.23-0jpp.38.el5_9.x86_64.rpm', u'epoch': u'0', u'version': u'5.5.23', u'release': u'0jpp.38.el5_9', u'arch': u'x86_64'}, {u'src': None, u'name': u'tomcat5-jasper', u'sum': [u'md5', u'2a51b673ebabb29f9f37463e91072eb4'], u'filename': u'tomcat5-jasper-5.5.23-0jpp.38.el5_9.x86_64.rpm', u'epoch': u'0', u'version': u'5.5.23', u'release': u'0jpp.38.el5_9', u'arch': u'x86_64'}, {u'src': None, u'name': u'tomcat5-jasper-javadoc', u'sum': [u'md5', u'b8d311aa3ddf6a565888fe7f71326ab2'], u'filename': u'tomcat5-jasper-javadoc-5.5.23-0jpp.38.el5_9.x86_64.rpm', u'epoch': u'0', u'version': u'5.5.23', u'release': u'0jpp.38.el5_9', u'arch': u'x86_64'}, {u'src': None, u'name': u'tomcat5-jsp-2.0-api', u'sum': [u'md5', u'f163c55a83aff54523bf9af42515f264'], u'filename': u'tomcat5-jsp-2.0-api-5.5.23-0jpp.38.el5_9.x86_64.rpm', u'epoch': u'0', u'version': u'5.5.23', u'release': u'0jpp.38.el5_9', u'arch': u'x86_64'}, {u'src': None, u'name': u'tomcat5-jsp-2.0-api-javadoc', u'sum': [u'md5', u'9f9de03ecdc2e3263cc9a698d96e87ee'], u'filename': u'tomcat5-jsp-2.0-api-javadoc-5.5.23-0jpp.38.el5_9.x86_64.rpm', u'epoch': u'0', u'version': u'5.5.23', u'release': u'0jpp.38.el5_9', u'arch': u'x86_64'}, {u'src': None, u'name': u'tomcat5-server-lib', u'sum': [u'md5', u'1257009050cee71a7e4c0512c163d354'], u'filename': u'tomcat5-server-lib-5.5.23-0jpp.38.el5_9.x86_64.rpm', u'epoch': u'0', u'version': u'5.5.23', u'release': u'0jpp.38.el5_9', u'arch': u'x86_64'}, {u'src': None, u'name': u'tomcat5-servlet-2.4-api', u'sum': [u'md5', u'd047206c23e416540922b08668b04d7d'], u'filename': u'tomcat5-servlet-2.4-api-5.5.23-0jpp.38.el5_9.x86_64.rpm', u'epoch': u'0', u'version': u'5.5.23', u'release': u'0jpp.38.el5_9', u'arch': u'x86_64'}, {u'src': None, u'name': u'tomcat5-servlet-2.4-api-javadoc', u'sum': [u'md5', u'3070e7ba2f2deb7f74de4a5c7777a29d'], u'filename': u'tomcat5-servlet-2.4-api-javadoc-5.5.23-0jpp.38.el5_9.x86_64.rpm', u'epoch': u'0', u'version': u'5.5.23', u'release': u'0jpp.38.el5_9', u'arch': u'x86_64'}, {u'src': None, u'name': u'tomcat5-webapps', u'sum': [u'md5', u'7c41199fc68c2c8d3de8d9b22697df6b'], u'filename': u'tomcat5-webapps-5.5.23-0jpp.38.el5_9.x86_64.rpm', u'epoch': u'0', u'version': u'5.5.23', u'release': u'0jpp.38.el5_9', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u'[1.41.0-15]\n- Add in explicit dependences between some boost subpackages\n\n[1.41.0-14]\n- Build with -fno-strict-aliasing\n\n[1.41.0-13]\n- In Boost.Pool, be careful not to overflow allocated chunk size\n (boost-1.41.0-pool.patch)\n\n[1.41.0-12]\n- Add an upstream patch that fixes computation of CRC in zlib streams.\n- Resolves: #707624', u'issued': u'2013-03-21', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELSA-2013-0668.html', u'type': u'self', u'id': None, u'title': u'ELSA-2013-0668'}, {u'href': u'http://linux.oracle.com/cve/CVE-2012-2677.html', u'type': u'cve', u'id': u'CVE-2012-2677', u'title': u'CVE-2012-2677'}], u'_content_type_id': u'erratum', u'_id': u'56ff152d-82e6-483c-a24b-81540683a554', u'from': u'el-errata@oss.oracle.com', u'severity': u'Moderate', u'title': u' boost security update', u'_ns': u'units_erratum', u'rights': u'Copyright 2013 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 6', u'reboot_suggested': False, u'type': u'security', u'pkglist': [{u'packages': [{u'src': None, u'name': u'boost', u'sum': [u'md5', u'ada4a7e829ff2ea07629ce46051ae874'], u'filename': u'boost-1.41.0-15.el6_4.src.rpm', u'epoch': u'0', u'version': u'1.41.0', u'release': u'15.el6_4', u'arch': u'src'}, {u'src': None, u'name': u'boost', u'sum': [u'md5', u'8ecc92de397d7f33b868d7c5c052b8f5'], u'filename': u'boost-1.41.0-15.el6_4.x86_64.rpm', u'epoch': u'0', u'version': u'1.41.0', u'release': u'15.el6_4', u'arch': u'x86_64'}, {u'src': None, u'name': u'boost-date-time', u'sum': [u'md5', u'e7c2e2c712274278967eef5cb500cc4b'], u'filename': u'boost-date-time-1.41.0-15.el6_4.i686.rpm', u'epoch': u'0', u'version': u'1.41.0', u'release': u'15.el6_4', u'arch': u'i686'}, {u'src': None, u'name': u'boost-date-time', u'sum': [u'md5', u'9f7d341813d3a389f991263e820d2f98'], u'filename': u'boost-date-time-1.41.0-15.el6_4.x86_64.rpm', u'epoch': u'0', u'version': u'1.41.0', u'release': u'15.el6_4', u'arch': u'x86_64'}, {u'src': None, u'name': u'boost-devel', u'sum': [u'md5', u'a827b6973b73189a4bcce2d5e3ef1841'], u'filename': u'boost-devel-1.41.0-15.el6_4.x86_64.rpm', u'epoch': u'0', u'version': u'1.41.0', u'release': u'15.el6_4', u'arch': u'x86_64'}, {u'src': None, u'name': u'boost-doc', u'sum': [u'md5', u'6c9746a874d54cc07a3a9858d5ff30ad'], u'filename': u'boost-doc-1.41.0-15.el6_4.x86_64.rpm', u'epoch': u'0', u'version': u'1.41.0', u'release': u'15.el6_4', u'arch': u'x86_64'}, {u'src': None, u'name': u'boost-filesystem', u'sum': [u'md5', u'ec7a08508acf3ca33af95bec8dfed911'], u'filename': u'boost-filesystem-1.41.0-15.el6_4.i686.rpm', u'epoch': u'0', u'version': u'1.41.0', u'release': u'15.el6_4', u'arch': u'i686'}, {u'src': None, u'name': u'boost-filesystem', u'sum': [u'md5', u'f4c74ce9e5797c52ecd8e39f243067d0'], u'filename': u'boost-filesystem-1.41.0-15.el6_4.x86_64.rpm', u'epoch': u'0', u'version': u'1.41.0', u'release': u'15.el6_4', u'arch': u'x86_64'}, {u'src': None, u'name': u'boost-graph', u'sum': [u'md5', u'779fcc35f95bfff15af1efe98bdea0a8'], u'filename': u'boost-graph-1.41.0-15.el6_4.i686.rpm', u'epoch': u'0', u'version': u'1.41.0', u'release': u'15.el6_4', u'arch': u'i686'}, {u'src': None, u'name': u'boost-graph', u'sum': [u'md5', u'3d3475877d8caad1e9f64ee6f3544858'], u'filename': u'boost-graph-1.41.0-15.el6_4.x86_64.rpm', u'epoch': u'0', u'version': u'1.41.0', u'release': u'15.el6_4', u'arch': u'x86_64'}, {u'src': None, u'name': u'boost-graph-mpich2', u'sum': [u'md5', u'8bcea8f48eb672d9429f0711ca9a07fe'], u'filename': u'boost-graph-mpich2-1.41.0-15.el6_4.x86_64.rpm', u'epoch': u'0', u'version': u'1.41.0', u'release': u'15.el6_4', u'arch': u'x86_64'}, {u'src': None, u'name': u'boost-graph-openmpi', u'sum': [u'md5', u'c4af52a9ba7c939f35eb0e5c1f8be364'], u'filename': u'boost-graph-openmpi-1.41.0-15.el6_4.x86_64.rpm', u'epoch': u'0', u'version': u'1.41.0', u'release': u'15.el6_4', u'arch': u'x86_64'}, {u'src': None, u'name': u'boost-iostreams', u'sum': [u'md5', u'a61e558f8fd6c756168b975f6e7b91d5'], u'filename': u'boost-iostreams-1.41.0-15.el6_4.i686.rpm', u'epoch': u'0', u'version': u'1.41.0', u'release': u'15.el6_4', u'arch': u'i686'}, {u'src': None, u'name': u'boost-iostreams', u'sum': [u'md5', u'4b7111a3dfe39686a6e6db8282a44be8'], u'filename': u'boost-iostreams-1.41.0-15.el6_4.x86_64.rpm', u'epoch': u'0', u'version': u'1.41.0', u'release': u'15.el6_4', u'arch': u'x86_64'}, {u'src': None, u'name': u'boost-math', u'sum': [u'md5', u'71c35f20efb1d0b4aa3df2e13320e6b0'], u'filename': u'boost-math-1.41.0-15.el6_4.x86_64.rpm', u'epoch': u'0', u'version': u'1.41.0', u'release': u'15.el6_4', u'arch': u'x86_64'}, {u'src': None, u'name': u'boost-mpich2', u'sum': [u'md5', u'8981a4f93d8474e6f6966aa176807432'], u'filename': u'boost-mpich2-1.41.0-15.el6_4.x86_64.rpm', u'epoch': u'0', u'version': u'1.41.0', u'release': u'15.el6_4', u'arch': u'x86_64'}, {u'src': None, u'name': u'boost-mpich2-devel', u'sum': [u'md5', u'7850c246b8cf4e5d0503d23f23c99b3b'], u'filename': u'boost-mpich2-devel-1.41.0-15.el6_4.x86_64.rpm', u'epoch': u'0', u'version': u'1.41.0', u'release': u'15.el6_4', u'arch': u'x86_64'}, {u'src': None, u'name': u'boost-mpich2-python', u'sum': [u'md5', u'ea131d3f67ca111898a172ab7280cb30'], u'filename': u'boost-mpich2-python-1.41.0-15.el6_4.x86_64.rpm', u'epoch': u'0', u'version': u'1.41.0', u'release': u'15.el6_4', u'arch': u'x86_64'}, {u'src': None, u'name': u'boost-openmpi', u'sum': [u'md5', u'9855c8373225c732f4bb0bafc6eee755'], u'filename': u'boost-openmpi-1.41.0-15.el6_4.x86_64.rpm', u'epoch': u'0', u'version': u'1.41.0', u'release': u'15.el6_4', u'arch': u'x86_64'}, {u'src': None, u'name': u'boost-openmpi-devel', u'sum': [u'md5', u'aa0f22c7cd8c03d1e4554fb0d76ce228'], u'filename': u'boost-openmpi-devel-1.41.0-15.el6_4.x86_64.rpm', u'epoch': u'0', u'version': u'1.41.0', u'release': u'15.el6_4', u'arch': u'x86_64'}, {u'src': None, u'name': u'boost-openmpi-python', u'sum': [u'md5', u'85ea8aa01ff9f946a3373e0d857c9539'], u'filename': u'boost-openmpi-python-1.41.0-15.el6_4.x86_64.rpm', u'epoch': u'0', u'version': u'1.41.0', u'release': u'15.el6_4', u'arch': u'x86_64'}, {u'src': None, u'name': u'boost-program-options', u'sum': [u'md5', u'bf23bc3556a98b6793a0d4ed1a765e4b'], u'filename': u'boost-program-options-1.41.0-15.el6_4.i686.rpm', u'epoch': u'0', u'version': u'1.41.0', u'release': u'15.el6_4', u'arch': u'i686'}, {u'src': None, u'name': u'boost-program-options', u'sum': [u'md5', u'788842af4ca32f92634ac58e80cb60fe'], u'filename': u'boost-program-options-1.41.0-15.el6_4.x86_64.rpm', u'epoch': u'0', u'version': u'1.41.0', u'release': u'15.el6_4', u'arch': u'x86_64'}, {u'src': None, u'name': u'boost-python', u'sum': [u'md5', u'7855ac851ce8c48eb67ae76046babc03'], u'filename': u'boost-python-1.41.0-15.el6_4.x86_64.rpm', u'epoch': u'0', u'version': u'1.41.0', u'release': u'15.el6_4', u'arch': u'x86_64'}, {u'src': None, u'name': u'boost-regex', u'sum': [u'md5', u'05dd061849ee65966ea40b78c40b1a3c'], u'filename': u'boost-regex-1.41.0-15.el6_4.i686.rpm', u'epoch': u'0', u'version': u'1.41.0', u'release': u'15.el6_4', u'arch': u'i686'}, {u'src': None, u'name': u'boost-regex', u'sum': [u'md5', u'2ac1be3d014c2e8c4506fd8f96b1d211'], u'filename': u'boost-regex-1.41.0-15.el6_4.x86_64.rpm', u'epoch': u'0', u'version': u'1.41.0', u'release': u'15.el6_4', u'arch': u'x86_64'}, {u'src': None, u'name': u'boost-serialization', u'sum': [u'md5', u'6fbad2f5f5d9b0cdca3ac953fc610838'], u'filename': u'boost-serialization-1.41.0-15.el6_4.i686.rpm', u'epoch': u'0', u'version': u'1.41.0', u'release': u'15.el6_4', u'arch': u'i686'}, {u'src': None, u'name': u'boost-serialization', u'sum': [u'md5', u'925308c7d912fe65334de2fb20b6fa32'], u'filename': u'boost-serialization-1.41.0-15.el6_4.x86_64.rpm', u'epoch': u'0', u'version': u'1.41.0', u'release': u'15.el6_4', u'arch': u'x86_64'}, {u'src': None, u'name': u'boost-signals', u'sum': [u'md5', u'5545df340b571ba18ba59d128f55d58d'], u'filename': u'boost-signals-1.41.0-15.el6_4.i686.rpm', u'epoch': u'0', u'version': u'1.41.0', u'release': u'15.el6_4', u'arch': u'i686'}, {u'src': None, u'name': u'boost-signals', u'sum': [u'md5', u'5818bc83f2d2d48d500254594eb090a5'], u'filename': u'boost-signals-1.41.0-15.el6_4.x86_64.rpm', u'epoch': u'0', u'version': u'1.41.0', u'release': u'15.el6_4', u'arch': u'x86_64'}, {u'src': None, u'name': u'boost-static', u'sum': [u'md5', u'ab35aa66f635f4f74aa9f7a2fe6b6220'], u'filename': u'boost-static-1.41.0-15.el6_4.x86_64.rpm', u'epoch': u'0', u'version': u'1.41.0', u'release': u'15.el6_4', u'arch': u'x86_64'}, {u'src': None, u'name': u'boost-system', u'sum': [u'md5', u'12b1e1144ea5fa42725064b1de7e7d77'], u'filename': u'boost-system-1.41.0-15.el6_4.i686.rpm', u'epoch': u'0', u'version': u'1.41.0', u'release': u'15.el6_4', u'arch': u'i686'}, {u'src': None, u'name': u'boost-system', u'sum': [u'md5', u'f661c44d1536e5f6c535d92852c55897'], u'filename': u'boost-system-1.41.0-15.el6_4.x86_64.rpm', u'epoch': u'0', u'version': u'1.41.0', u'release': u'15.el6_4', u'arch': u'x86_64'}, {u'src': None, u'name': u'boost-test', u'sum': [u'md5', u'446d7097a34c45e0f06b106046f396c4'], u'filename': u'boost-test-1.41.0-15.el6_4.i686.rpm', u'epoch': u'0', u'version': u'1.41.0', u'release': u'15.el6_4', u'arch': u'i686'}, {u'src': None, u'name': u'boost-test', u'sum': [u'md5', u'7336b4a15d8639c598f54baaca60a157'], u'filename': u'boost-test-1.41.0-15.el6_4.x86_64.rpm', u'epoch': u'0', u'version': u'1.41.0', u'release': u'15.el6_4', u'arch': u'x86_64'}, {u'src': None, u'name': u'boost-thread', u'sum': [u'md5', u'1e7f73697a966cfdf6d2ccc4dcb44b26'], u'filename': u'boost-thread-1.41.0-15.el6_4.i686.rpm', u'epoch': u'0', u'version': u'1.41.0', u'release': u'15.el6_4', u'arch': u'i686'}, {u'src': None, u'name': u'boost-thread', u'sum': [u'md5', u'c7cd9b884fe41be1387d5a1d46576b63'], u'filename': u'boost-thread-1.41.0-15.el6_4.x86_64.rpm', u'epoch': u'0', u'version': u'1.41.0', u'release': u'15.el6_4', u'arch': u'x86_64'}, {u'src': None, u'name': u'boost-wave', u'sum': [u'md5', u'f10bd4c7c7ecb3da5782e288bb3b8915'], u'filename': u'boost-wave-1.41.0-15.el6_4.i686.rpm', u'epoch': u'0', u'version': u'1.41.0', u'release': u'15.el6_4', u'arch': u'i686'}, {u'src': None, u'name': u'boost-wave', u'sum': [u'md5', u'e1dd96b31b0d70ad4affb09016a571b8'], u'filename': u'boost-wave-1.41.0-15.el6_4.x86_64.rpm', u'epoch': u'0', u'version': u'1.41.0', u'release': u'15.el6_4', u'arch': u'x86_64'}], u'name': u'ol6_x86_64_latest', u'short': u'ol6_x86_64_latest'}, {u'packages': [{u'src': None, u'name': u'boost', u'sum': [u'md5', u'607fa744b2aa294ec8092e4a4569b7ca'], u'filename': u'boost-1.33.1-16.el5_9.i386.rpm', u'epoch': u'0', u'version': u'1.33.1', u'release': u'16.el5_9', u'arch': u'i386'}, {u'src': None, u'name': u'boost', u'sum': [u'md5', u'7bbda5d7960cdbd75c96bef032069081'], u'filename': u'boost-1.33.1-16.el5_9.src.rpm', u'epoch': u'0', u'version': u'1.33.1', u'release': u'16.el5_9', u'arch': u'src'}, {u'src': None, u'name': u'boost', u'sum': [u'md5', u'bc358e1862c90c69c4e79014358631cf'], u'filename': u'boost-1.33.1-16.el5_9.x86_64.rpm', u'epoch': u'0', u'version': u'1.33.1', u'release': u'16.el5_9', u'arch': u'x86_64'}, {u'src': None, u'name': u'boost-devel', u'sum': [u'md5', u'0cd4b18671d64ef413eae2208ed0cb16'], u'filename': u'boost-devel-1.33.1-16.el5_9.i386.rpm', u'epoch': u'0', u'version': u'1.33.1', u'release': u'16.el5_9', u'arch': u'i386'}, {u'src': None, u'name': u'boost-devel', u'sum': [u'md5', u'f23d964dc3c97359e87f9d029f3145a2'], u'filename': u'boost-devel-1.33.1-16.el5_9.x86_64.rpm', u'epoch': u'0', u'version': u'1.33.1', u'release': u'16.el5_9', u'arch': u'x86_64'}, {u'src': None, u'name': u'boost-doc', u'sum': [u'md5', u'c12daa06eb03d8310030ee4152279026'], u'filename': u'boost-doc-1.33.1-16.el5_9.x86_64.rpm', u'epoch': u'0', u'version': u'1.33.1', u'release': u'16.el5_9', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u'[0:1.2.1-2jpp.7]\n- Add missing connection hostname check against X.509 certificate name\n- Resolves: CVE-2012-5784\n- Add patches to build with java 1.6', u'issued': u'2013-03-25', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELSA-2013-0683.html', u'type': u'self', u'id': None, u'title': u'ELSA-2013-0683'}, {u'href': u'http://linux.oracle.com/cve/CVE-2012-5784.html', u'type': u'cve', u'id': u'CVE-2012-5784', u'title': u'CVE-2012-5784'}], u'_content_type_id': u'erratum', u'_id': u'bde26a48-dd03-4c92-a047-98a5dd99c02a', u'from': u'el-errata@oss.oracle.com', u'severity': u'Moderate', u'title': u' axis security update', u'_ns': u'units_erratum', u'rights': u'Copyright 2013 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 5', u'reboot_suggested': False, u'type': u'security', u'pkglist': [{u'packages': [{u'src': None, u'name': u'axis', u'sum': [u'md5', u'6bea061aa0b3906cceec1dc05a0c4a81'], u'filename': u'axis-1.2.1-2jpp.7.el5_9.src.rpm', u'epoch': u'0', u'version': u'1.2.1', u'release': u'2jpp.7.el5_9', u'arch': u'src'}, {u'src': None, u'name': u'axis', u'sum': [u'md5', u'bc0d7deaed6ff792990031533895a48c'], u'filename': u'axis-1.2.1-2jpp.7.el5_9.x86_64.rpm', u'epoch': u'0', u'version': u'1.2.1', u'release': u'2jpp.7.el5_9', u'arch': u'x86_64'}, {u'src': None, u'name': u'axis-javadoc', u'sum': [u'md5', u'46965c191fcf608d3e7c15ab8aa5c1c2'], u'filename': u'axis-javadoc-1.2.1-2jpp.7.el5_9.x86_64.rpm', u'epoch': u'0', u'version': u'1.2.1', u'release': u'2jpp.7.el5_9', u'arch': u'x86_64'}, {u'src': None, u'name': u'axis-manual', u'sum': [u'md5', u'b7b50afe94c201348be9e243502f0017'], u'filename': u'axis-manual-1.2.1-2jpp.7.el5_9.x86_64.rpm', u'epoch': u'0', u'version': u'1.2.1', u'release': u'2jpp.7.el5_9', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u'[4:5.10.1-130]\n- Resolves: #915692 - CVE-2012-5526 (newline injection due to improper CRLF\n escaping in Set-Cookie and P3P headers)\n- Resolves: #915692 - CVE-2012-6329 (possible arbitrary code execution via\n Locale::Maketext)\n- Resolves: #915692 - CVE-2013-1667 (DoS in rehashing code)', u'issued': u'2013-03-26', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELSA-2013-0685.html', u'type': u'self', u'id': None, u'title': u'ELSA-2013-0685'}, {u'href': u'http://linux.oracle.com/cve/CVE-2012-5195.html', u'type': u'cve', u'id': u'CVE-2012-5195', u'title': u'CVE-2012-5195'}, {u'href': u'http://linux.oracle.com/cve/CVE-2012-5526.html', u'type': u'cve', u'id': u'CVE-2012-5526', u'title': u'CVE-2012-5526'}, {u'href': u'http://linux.oracle.com/cve/CVE-2012-6329.html', u'type': u'cve', u'id': u'CVE-2012-6329', u'title': u'CVE-2012-6329'}, {u'href': u'http://linux.oracle.com/cve/CVE-2013-1667.html', u'type': u'cve', u'id': u'CVE-2013-1667', u'title': u'CVE-2013-1667'}], u'_content_type_id': u'erratum', u'_id': u'63c1ae5e-4098-460a-9fea-494505d9d111', u'from': u'el-errata@oss.oracle.com', u'severity': u'Moderate', u'title': u' perl security update', u'_ns': u'units_erratum', u'rights': u'Copyright 2013 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 6', u'reboot_suggested': False, u'type': u'security', u'pkglist': [{u'packages': [{u'src': None, u'name': u'perl', u'sum': [u'md5', u'bc72d2e60087d9914ab6faf4ef7b0242'], u'filename': u'perl-5.10.1-130.el6_4.src.rpm', u'epoch': u'4', u'version': u'5.10.1', u'release': u'130.el6_4', u'arch': u'src'}, {u'src': None, u'name': u'perl', u'sum': [u'md5', u'6ebf176d0ea7fe2f880a9f14bf3a56d8'], u'filename': u'perl-5.10.1-130.el6_4.x86_64.rpm', u'epoch': u'4', u'version': u'5.10.1', u'release': u'130.el6_4', u'arch': u'x86_64'}, {u'src': None, u'name': u'perl-Archive-Extract', u'sum': [u'md5', u'66d3798d21b0b0eac10a553f7afaa70f'], u'filename': u'perl-Archive-Extract-0.38-130.el6_4.x86_64.rpm', u'epoch': u'1', u'version': u'0.38', u'release': u'130.el6_4', u'arch': u'x86_64'}, {u'src': None, u'name': u'perl-Archive-Tar', u'sum': [u'md5', u'b8c4697eb608127b90eec8c92d2a85e1'], u'filename': u'perl-Archive-Tar-1.58-130.el6_4.x86_64.rpm', u'epoch': u'0', u'version': u'1.58', u'release': u'130.el6_4', u'arch': u'x86_64'}, {u'src': None, u'name': u'perl-CGI', u'sum': [u'md5', u'230a7de7ead1dbf50a12192fb3cdd4b4'], u'filename': u'perl-CGI-3.51-130.el6_4.x86_64.rpm', u'epoch': u'0', u'version': u'3.51', u'release': u'130.el6_4', u'arch': u'x86_64'}, {u'src': None, u'name': u'perl-CPAN', u'sum': [u'md5', u'f57cbaadf9e1a34d80e2008add5b5632'], u'filename': u'perl-CPAN-1.9402-130.el6_4.x86_64.rpm', u'epoch': u'0', u'version': u'1.9402', u'release': u'130.el6_4', u'arch': u'x86_64'}, {u'src': None, u'name': u'perl-CPANPLUS', u'sum': [u'md5', u'77daeadd65d94e5d61577fd4f1f3432d'], u'filename': u'perl-CPANPLUS-0.88-130.el6_4.x86_64.rpm', u'epoch': u'0', u'version': u'0.88', u'release': u'130.el6_4', u'arch': u'x86_64'}, {u'src': None, u'name': u'perl-Compress-Raw-Bzip2', u'sum': [u'md5', u'cad675d3bdf94b6bc2d9b3c69bc55a62'], u'filename': u'perl-Compress-Raw-Bzip2-2.020-130.el6_4.x86_64.rpm', u'epoch': u'0', u'version': u'2.020', u'release': u'130.el6_4', u'arch': u'x86_64'}, {u'src': None, u'name': u'perl-Compress-Raw-Zlib', u'sum': [u'md5', u'060444c3dbbf8cf2948bea2acadf9c7c'], u'filename': u'perl-Compress-Raw-Zlib-2.020-130.el6_4.x86_64.rpm', u'epoch': u'1', u'version': u'2.020', u'release': u'130.el6_4', u'arch': u'x86_64'}, {u'src': None, u'name': u'perl-Compress-Zlib', u'sum': [u'md5', u'fc1b39201973e0bc13533b1e6746b637'], u'filename': u'perl-Compress-Zlib-2.020-130.el6_4.x86_64.rpm', u'epoch': u'0', u'version': u'2.020', u'release': u'130.el6_4', u'arch': u'x86_64'}, {u'src': None, u'name': u'perl-Digest-SHA', u'sum': [u'md5', u'0a636043d33a4512045279c2efcc6980'], u'filename': u'perl-Digest-SHA-5.47-130.el6_4.x86_64.rpm', u'epoch': u'1', u'version': u'5.47', u'release': u'130.el6_4', u'arch': u'x86_64'}, {u'src': None, u'name': u'perl-ExtUtils-CBuilder', u'sum': [u'md5', u'a27611f9bc106028cc715155fba14689'], u'filename': u'perl-ExtUtils-CBuilder-0.27-130.el6_4.x86_64.rpm', u'epoch': u'1', u'version': u'0.27', u'release': u'130.el6_4', u'arch': u'x86_64'}, {u'src': None, u'name': u'perl-ExtUtils-Embed', u'sum': [u'md5', u'6f7d12dd8f8ca197cf9f2f506984b5c1'], u'filename': u'perl-ExtUtils-Embed-1.28-130.el6_4.x86_64.rpm', u'epoch': u'0', u'version': u'1.28', u'release': u'130.el6_4', u'arch': u'x86_64'}, {u'src': None, u'name': u'perl-ExtUtils-MakeMaker', u'sum': [u'md5', u'97552b21f07b996e4cc607ad00cedc1c'], u'filename': u'perl-ExtUtils-MakeMaker-6.55-130.el6_4.x86_64.rpm', u'epoch': u'0', u'version': u'6.55', u'release': u'130.el6_4', u'arch': u'x86_64'}, {u'src': None, u'name': u'perl-ExtUtils-ParseXS', u'sum': [u'md5', u'e39071f50666e4ee61e045ab604bb269'], u'filename': u'perl-ExtUtils-ParseXS-2.2003.0-130.el6_4.x86_64.rpm', u'epoch': u'1', u'version': u'2.2003.0', u'release': u'130.el6_4', u'arch': u'x86_64'}, {u'src': None, u'name': u'perl-File-Fetch', u'sum': [u'md5', u'aba37e4c8fa1e05702a427c94b6417fc'], u'filename': u'perl-File-Fetch-0.26-130.el6_4.x86_64.rpm', u'epoch': u'0', u'version': u'0.26', u'release': u'130.el6_4', u'arch': u'x86_64'}, {u'src': None, u'name': u'perl-IO-Compress-Base', u'sum': [u'md5', u'f8c7b2f841195a6b72e2f5e27d887474'], u'filename': u'perl-IO-Compress-Base-2.020-130.el6_4.x86_64.rpm', u'epoch': u'0', u'version': u'2.020', u'release': u'130.el6_4', u'arch': u'x86_64'}, {u'src': None, u'name': u'perl-IO-Compress-Bzip2', u'sum': [u'md5', u'e57348d36c5e501a70b7f6becbb9e428'], u'filename': u'perl-IO-Compress-Bzip2-2.020-130.el6_4.x86_64.rpm', u'epoch': u'0', u'version': u'2.020', u'release': u'130.el6_4', u'arch': u'x86_64'}, {u'src': None, u'name': u'perl-IO-Compress-Zlib', u'sum': [u'md5', u'dc3f787541eacee349301943510cee26'], u'filename': u'perl-IO-Compress-Zlib-2.020-130.el6_4.x86_64.rpm', u'epoch': u'0', u'version': u'2.020', u'release': u'130.el6_4', u'arch': u'x86_64'}, {u'src': None, u'name': u'perl-IO-Zlib', u'sum': [u'md5', u'4442639334871cd1c088091409a674fa'], u'filename': u'perl-IO-Zlib-1.09-130.el6_4.x86_64.rpm', u'epoch': u'1', u'version': u'1.09', u'release': u'130.el6_4', u'arch': u'x86_64'}, {u'src': None, u'name': u'perl-IPC-Cmd', u'sum': [u'md5', u'9c47597b69fb8bd240dcc662b601ff3c'], u'filename': u'perl-IPC-Cmd-0.56-130.el6_4.x86_64.rpm', u'epoch': u'1', u'version': u'0.56', u'release': u'130.el6_4', u'arch': u'x86_64'}, {u'src': None, u'name': u'perl-Locale-Maketext-Simple', u'sum': [u'md5', u'255bc1adfa2a46a8e6ba8246881fe87f'], u'filename': u'perl-Locale-Maketext-Simple-0.18-130.el6_4.x86_64.rpm', u'epoch': u'1', u'version': u'0.18', u'release': u'130.el6_4', u'arch': u'x86_64'}, {u'src': None, u'name': u'perl-Log-Message', u'sum': [u'md5', u'9c62d173a914ce49be86dccafbdd0e08'], u'filename': u'perl-Log-Message-0.02-130.el6_4.x86_64.rpm', u'epoch': u'1', u'version': u'0.02', u'release': u'130.el6_4', u'arch': u'x86_64'}, {u'src': None, u'name': u'perl-Log-Message-Simple', u'sum': [u'md5', u'0e0b02c1d3a9ee9c4adb17eaf97b5845'], u'filename': u'perl-Log-Message-Simple-0.04-130.el6_4.x86_64.rpm', u'epoch': u'0', u'version': u'0.04', u'release': u'130.el6_4', u'arch': u'x86_64'}, {u'src': None, u'name': u'perl-Module-Build', u'sum': [u'md5', u'b70592a9373dd3ca202a33d60c5536a7'], u'filename': u'perl-Module-Build-0.3500-130.el6_4.x86_64.rpm', u'epoch': u'1', u'version': u'0.3500', u'release': u'130.el6_4', u'arch': u'x86_64'}, {u'src': None, u'name': u'perl-Module-CoreList', u'sum': [u'md5', u'72f95b927d31fe7d2d47a1459a33eeed'], u'filename': u'perl-Module-CoreList-2.18-130.el6_4.x86_64.rpm', u'epoch': u'0', u'version': u'2.18', u'release': u'130.el6_4', u'arch': u'x86_64'}, {u'src': None, u'name': u'perl-Module-Load', u'sum': [u'md5', u'bfe1ee638e6ef4271e9a89ed900b081f'], u'filename': u'perl-Module-Load-0.16-130.el6_4.x86_64.rpm', u'epoch': u'1', u'version': u'0.16', u'release': u'130.el6_4', u'arch': u'x86_64'}, {u'src': None, u'name': u'perl-Module-Load-Conditional', u'sum': [u'md5', u'3062903fa217f3b4f707834de8d4e866'], u'filename': u'perl-Module-Load-Conditional-0.30-130.el6_4.x86_64.rpm', u'epoch': u'0', u'version': u'0.30', u'release': u'130.el6_4', u'arch': u'x86_64'}, {u'src': None, u'name': u'perl-Module-Loaded', u'sum': [u'md5', u'106c33d94115abf5a59699669470f193'], u'filename': u'perl-Module-Loaded-0.02-130.el6_4.x86_64.rpm', u'epoch': u'1', u'version': u'0.02', u'release': u'130.el6_4', u'arch': u'x86_64'}, {u'src': None, u'name': u'perl-Module-Pluggable', u'sum': [u'md5', u'd545c136e3e14b50958543761c808c43'], u'filename': u'perl-Module-Pluggable-3.90-130.el6_4.x86_64.rpm', u'epoch': u'1', u'version': u'3.90', u'release': u'130.el6_4', u'arch': u'x86_64'}, {u'src': None, u'name': u'perl-Object-Accessor', u'sum': [u'md5', u'ca11336129386696389482e25caf522b'], u'filename': u'perl-Object-Accessor-0.34-130.el6_4.x86_64.rpm', u'epoch': u'1', u'version': u'0.34', u'release': u'130.el6_4', u'arch': u'x86_64'}, {u'src': None, u'name': u'perl-Package-Constants', u'sum': [u'md5', u'8552f303956371d24740df739ec06239'], u'filename': u'perl-Package-Constants-0.02-130.el6_4.x86_64.rpm', u'epoch': u'1', u'version': u'0.02', u'release': u'130.el6_4', u'arch': u'x86_64'}, {u'src': None, u'name': u'perl-Params-Check', u'sum': [u'md5', u'fa95a721502cbb781a9428e8565f8959'], u'filename': u'perl-Params-Check-0.26-130.el6_4.x86_64.rpm', u'epoch': u'1', u'version': u'0.26', u'release': u'130.el6_4', u'arch': u'x86_64'}, {u'src': None, u'name': u'perl-Parse-CPAN-Meta', u'sum': [u'md5', u'3e991bf9d6fe499cf0228b2441ba7129'], u'filename': u'perl-Parse-CPAN-Meta-1.40-130.el6_4.x86_64.rpm', u'epoch': u'1', u'version': u'1.40', u'release': u'130.el6_4', u'arch': u'x86_64'}, {u'src': None, u'name': u'perl-Pod-Escapes', u'sum': [u'md5', u'b809708e548f93a27370098dde57dfca'], u'filename': u'perl-Pod-Escapes-1.04-130.el6_4.x86_64.rpm', u'epoch': u'1', u'version': u'1.04', u'release': u'130.el6_4', u'arch': u'x86_64'}, {u'src': None, u'name': u'perl-Pod-Simple', u'sum': [u'md5', u'59eb0c99633eb491fc541480e32f30f0'], u'filename': u'perl-Pod-Simple-3.13-130.el6_4.x86_64.rpm', u'epoch': u'1', u'version': u'3.13', u'release': u'130.el6_4', u'arch': u'x86_64'}, {u'src': None, u'name': u'perl-Term-UI', u'sum': [u'md5', u'e56819b1daf2e7d12f4bd0091041d6bf'], u'filename': u'perl-Term-UI-0.20-130.el6_4.x86_64.rpm', u'epoch': u'0', u'version': u'0.20', u'release': u'130.el6_4', u'arch': u'x86_64'}, {u'src': None, u'name': u'perl-Test-Harness', u'sum': [u'md5', u'2b238457201b26d2824ed14339e3c6a8'], u'filename': u'perl-Test-Harness-3.17-130.el6_4.x86_64.rpm', u'epoch': u'0', u'version': u'3.17', u'release': u'130.el6_4', u'arch': u'x86_64'}, {u'src': None, u'name': u'perl-Test-Simple', u'sum': [u'md5', u'ec9185245dc8d8d8b0dacbf8f182dac1'], u'filename': u'perl-Test-Simple-0.92-130.el6_4.x86_64.rpm', u'epoch': u'0', u'version': u'0.92', u'release': u'130.el6_4', u'arch': u'x86_64'}, {u'src': None, u'name': u'perl-Time-HiRes', u'sum': [u'md5', u'1f57ac1feb2d1183cbfbd0a432790042'], u'filename': u'perl-Time-HiRes-1.9721-130.el6_4.x86_64.rpm', u'epoch': u'4', u'version': u'1.9721', u'release': u'130.el6_4', u'arch': u'x86_64'}, {u'src': None, u'name': u'perl-Time-Piece', u'sum': [u'md5', u'dac1b5425ae5bd7a8f05f34ec65929a7'], u'filename': u'perl-Time-Piece-1.15-130.el6_4.x86_64.rpm', u'epoch': u'0', u'version': u'1.15', u'release': u'130.el6_4', u'arch': u'x86_64'}, {u'src': None, u'name': u'perl-core', u'sum': [u'md5', u'cf6ae560ff53c8925f0d880536e21bbc'], u'filename': u'perl-core-5.10.1-130.el6_4.x86_64.rpm', u'epoch': u'0', u'version': u'5.10.1', u'release': u'130.el6_4', u'arch': u'x86_64'}, {u'src': None, u'name': u'perl-devel', u'sum': [u'md5', u'a6f18826d75381217401c94d2556b491'], u'filename': u'perl-devel-5.10.1-130.el6_4.i686.rpm', u'epoch': u'4', u'version': u'5.10.1', u'release': u'130.el6_4', u'arch': u'i686'}, {u'src': None, u'name': u'perl-devel', u'sum': [u'md5', u'aebc4838ac3afa78bd6c89563f4d144a'], u'filename': u'perl-devel-5.10.1-130.el6_4.x86_64.rpm', u'epoch': u'4', u'version': u'5.10.1', u'release': u'130.el6_4', u'arch': u'x86_64'}, {u'src': None, u'name': u'perl-libs', u'sum': [u'md5', u'5477dd5e5096c7ce497905b7a3bf89c1'], u'filename': u'perl-libs-5.10.1-130.el6_4.i686.rpm', u'epoch': u'4', u'version': u'5.10.1', u'release': u'130.el6_4', u'arch': u'i686'}, {u'src': None, u'name': u'perl-libs', u'sum': [u'md5', u'1e4921a64d0652dd5e0165f702c41e07'], u'filename': u'perl-libs-5.10.1-130.el6_4.x86_64.rpm', u'epoch': u'4', u'version': u'5.10.1', u'release': u'130.el6_4', u'arch': u'x86_64'}, {u'src': None, u'name': u'perl-parent', u'sum': [u'md5', u'278a7ba66415be36312d70cc3249a240'], u'filename': u'perl-parent-0.221-130.el6_4.x86_64.rpm', u'epoch': u'1', u'version': u'0.221', u'release': u'130.el6_4', u'arch': u'x86_64'}, {u'src': None, u'name': u'perl-suidperl', u'sum': [u'md5', u'ddb9158697cceb6912c308f84aa06d35'], u'filename': u'perl-suidperl-5.10.1-130.el6_4.x86_64.rpm', u'epoch': u'4', u'version': u'5.10.1', u'release': u'130.el6_4', u'arch': u'x86_64'}, {u'src': None, u'name': u'perl-version', u'sum': [u'md5', u'1d9acdbedf5cb2cacd04f809794bf059'], u'filename': u'perl-version-0.77-130.el6_4.x86_64.rpm', u'epoch': u'3', u'version': u'0.77', u'release': u'130.el6_4', u'arch': u'x86_64'}], u'name': u'ol6_x86_64_latest', u'short': u'ol6_x86_64_latest'}, {u'packages': [{u'src': None, u'name': u'perl', u'sum': [u'md5', u'848ca64a02e92f8e1f9b1dc723777d9f'], u'filename': u'perl-5.8.8-40.el5_9.src.rpm', u'epoch': u'4', u'version': u'5.8.8', u'release': u'40.el5_9', u'arch': u'src'}, {u'src': None, u'name': u'perl', u'sum': [u'md5', u'4d5124d2859ce2abdf49951947bbccee'], u'filename': u'perl-5.8.8-40.el5_9.x86_64.rpm', u'epoch': u'4', u'version': u'5.8.8', u'release': u'40.el5_9', u'arch': u'x86_64'}, {u'src': None, u'name': u'perl-suidperl', u'sum': [u'md5', u'f11484f64793cac1201f51295c8b51fa'], u'filename': u'perl-suidperl-5.8.8-40.el5_9.x86_64.rpm', u'epoch': u'4', u'version': u'5.8.8', u'release': u'40.el5_9', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u'[32:9.7.0-17.P2.1]\n- fix CVE-2013-2266', u'issued': u'2013-03-28', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELSA-2013-0690.html', u'type': u'self', u'id': None, u'title': u'ELSA-2013-0690'}, {u'href': u'http://linux.oracle.com/cve/CVE-2013-2266.html', u'type': u'cve', u'id': u'CVE-2013-2266', u'title': u'CVE-2013-2266'}], u'_content_type_id': u'erratum', u'_id': u'e3420fe0-b9c1-4c0f-a24d-4dabeff16802', u'from': u'el-errata@oss.oracle.com', u'severity': u'Important', u'title': u' bind97 security update', u'_ns': u'units_erratum', u'rights': u'Copyright 2013 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 5', u'reboot_suggested': False, u'type': u'security', u'pkglist': [{u'packages': [{u'src': None, u'name': u'bind97', u'sum': [u'md5', u'ff9ef54f328fcc26a17b01a2d3179dbf'], u'filename': u'bind97-9.7.0-17.P2.el5_9.1.src.rpm', u'epoch': u'32', u'version': u'9.7.0', u'release': u'17.P2.el5_9.1', u'arch': u'src'}, {u'src': None, u'name': u'bind97', u'sum': [u'md5', u'a5bcf9c1fe1f127c8b200ca41b708924'], u'filename': u'bind97-9.7.0-17.P2.el5_9.1.x86_64.rpm', u'epoch': u'32', u'version': u'9.7.0', u'release': u'17.P2.el5_9.1', u'arch': u'x86_64'}, {u'src': None, u'name': u'bind97-chroot', u'sum': [u'md5', u'cda690281b3de822f86ae9bee8b8b8bb'], u'filename': u'bind97-chroot-9.7.0-17.P2.el5_9.1.x86_64.rpm', u'epoch': u'32', u'version': u'9.7.0', u'release': u'17.P2.el5_9.1', u'arch': u'x86_64'}, {u'src': None, u'name': u'bind97-devel', u'sum': [u'md5', u'db0a67036199915af8ac54cf4bfc9551'], u'filename': u'bind97-devel-9.7.0-17.P2.el5_9.1.i386.rpm', u'epoch': u'32', u'version': u'9.7.0', u'release': u'17.P2.el5_9.1', u'arch': u'i386'}, {u'src': None, u'name': u'bind97-devel', u'sum': [u'md5', u'5a3c3c4be4bc8cf38486a0b5fcedc52a'], u'filename': u'bind97-devel-9.7.0-17.P2.el5_9.1.x86_64.rpm', u'epoch': u'32', u'version': u'9.7.0', u'release': u'17.P2.el5_9.1', u'arch': u'x86_64'}, {u'src': None, u'name': u'bind97-libs', u'sum': [u'md5', u'92a2787420089e614ad28c9f8ff7308b'], u'filename': u'bind97-libs-9.7.0-17.P2.el5_9.1.i386.rpm', u'epoch': u'32', u'version': u'9.7.0', u'release': u'17.P2.el5_9.1', u'arch': u'i386'}, {u'src': None, u'name': u'bind97-libs', u'sum': [u'md5', u'9e8ae60aec1e97f6ae6e63bc46c23e19'], u'filename': u'bind97-libs-9.7.0-17.P2.el5_9.1.x86_64.rpm', u'epoch': u'32', u'version': u'9.7.0', u'release': u'17.P2.el5_9.1', u'arch': u'x86_64'}, {u'src': None, u'name': u'bind97-utils', u'sum': [u'md5', u'8c9fa456081a8cc5d7d52f9e4950c1a4'], u'filename': u'bind97-utils-9.7.0-17.P2.el5_9.1.x86_64.rpm', u'epoch': u'32', u'version': u'9.7.0', u'release': u'17.P2.el5_9.1', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u'firefox\n[17.0.5-1.0.1]\n- Add firefox-oracle-default-prefs.js and remove the corresponding Red Hat ones\n\n[17.0.5-1]\n- Update to 17.0.5 ESR\n\nxulrunner\n[17.0.5-1.0.1.el6_4]\n- Replaced xulrunner-redhat-default-prefs.js with xulrunner-oracle-default-prefs.js\n- Removed XULRUNNER_VERSION from SOURCE21\n\n[17.0.5-1]\n- Update to 17.0.5 ESR\n\n[17.0.3-3]\n- Added fix for rhbz#916180 - Wrong library directory reference\n in /usr/bin/xulrunner', u'issued': u'2013-04-02', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELSA-2013-0696.html', u'type': u'self', u'id': None, u'title': u'ELSA-2013-0696'}, {u'href': u'http://linux.oracle.com/cve/CVE-2013-0788.html', u'type': u'cve', u'id': u'CVE-2013-0788', u'title': u'CVE-2013-0788'}, {u'href': u'http://linux.oracle.com/cve/CVE-2013-0793.html', u'type': u'cve', u'id': u'CVE-2013-0793', u'title': u'CVE-2013-0793'}, {u'href': u'http://linux.oracle.com/cve/CVE-2013-0795.html', u'type': u'cve', u'id': u'CVE-2013-0795', u'title': u'CVE-2013-0795'}, {u'href': u'http://linux.oracle.com/cve/CVE-2013-0796.html', u'type': u'cve', u'id': u'CVE-2013-0796', u'title': u'CVE-2013-0796'}, {u'href': u'http://linux.oracle.com/cve/CVE-2013-0800.html', u'type': u'cve', u'id': u'CVE-2013-0800', u'title': u'CVE-2013-0800'}], u'_content_type_id': u'erratum', u'_id': u'a9e37c9b-d1cd-424c-8185-a106e33a2ed2', u'from': u'el-errata@oss.oracle.com', u'severity': u'Critical', u'title': u' firefox security update', u'_ns': u'units_erratum', u'rights': u'Copyright 2013 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 6', u'reboot_suggested': False, u'type': u'security', u'pkglist': [{u'packages': [{u'src': None, u'name': u'firefox', u'sum': [u'md5', u'a1e4b8daefe11ff1f3e109456460b4f7'], u'filename': u'firefox-17.0.5-1.0.1.el6_4.i686.rpm', u'epoch': u'0', u'version': u'17.0.5', u'release': u'1.0.1.el6_4', u'arch': u'i686'}, {u'src': None, u'name': u'firefox', u'sum': [u'md5', u'acd531efa60b41e083372691b7390f54'], u'filename': u'firefox-17.0.5-1.0.1.el6_4.src.rpm', u'epoch': u'0', u'version': u'17.0.5', u'release': u'1.0.1.el6_4', u'arch': u'src'}, {u'src': None, u'name': u'firefox', u'sum': [u'md5', u'8401d4055203e8aa7ae24e9078e0944a'], u'filename': u'firefox-17.0.5-1.0.1.el6_4.x86_64.rpm', u'epoch': u'0', u'version': u'17.0.5', u'release': u'1.0.1.el6_4', u'arch': u'x86_64'}, {u'src': None, u'name': u'xulrunner', u'sum': [u'md5', u'b6aba58641a4f3e454546001b6a777c0'], u'filename': u'xulrunner-17.0.5-1.0.1.el6_4.i686.rpm', u'epoch': u'0', u'version': u'17.0.5', u'release': u'1.0.1.el6_4', u'arch': u'i686'}, {u'src': None, u'name': u'xulrunner', u'sum': [u'md5', u'052603e26fb9ba310c629d4f016c00de'], u'filename': u'xulrunner-17.0.5-1.0.1.el6_4.src.rpm', u'epoch': u'0', u'version': u'17.0.5', u'release': u'1.0.1.el6_4', u'arch': u'src'}, {u'src': None, u'name': u'xulrunner', u'sum': [u'md5', u'f71109b4717c8da13deb320aecc2b947'], u'filename': u'xulrunner-17.0.5-1.0.1.el6_4.x86_64.rpm', u'epoch': u'0', u'version': u'17.0.5', u'release': u'1.0.1.el6_4', u'arch': u'x86_64'}, {u'src': None, u'name': u'xulrunner-devel', u'sum': [u'md5', u'99c3c962755f58e4d4b7854ed0bc7196'], u'filename': u'xulrunner-devel-17.0.5-1.0.1.el6_4.i686.rpm', u'epoch': u'0', u'version': u'17.0.5', u'release': u'1.0.1.el6_4', u'arch': u'i686'}, {u'src': None, u'name': u'xulrunner-devel', u'sum': [u'md5', u'c003db42b8ca764eef5fc4091c386573'], u'filename': u'xulrunner-devel-17.0.5-1.0.1.el6_4.x86_64.rpm', u'epoch': u'0', u'version': u'17.0.5', u'release': u'1.0.1.el6_4', u'arch': u'x86_64'}], u'name': u'ol6_x86_64_latest', u'short': u'ol6_x86_64_latest'}, {u'packages': [{u'src': None, u'name': u'firefox', u'sum': [u'md5', u'39df6d2432f7d2576b59a02d8794ef22'], u'filename': u'firefox-17.0.5-1.0.1.el5_9.i386.rpm', u'epoch': u'0', u'version': u'17.0.5', u'release': u'1.0.1.el5_9', u'arch': u'i386'}, {u'src': None, u'name': u'firefox', u'sum': [u'md5', u'4083176f0e949dc2506fb94e1df0dae0'], u'filename': u'firefox-17.0.5-1.0.1.el5_9.src.rpm', u'epoch': u'0', u'version': u'17.0.5', u'release': u'1.0.1.el5_9', u'arch': u'src'}, {u'src': None, u'name': u'firefox', u'sum': [u'md5', u'574ad2f8e7f9fe0007bb3fadf7d65f47'], u'filename': u'firefox-17.0.5-1.0.1.el5_9.x86_64.rpm', u'epoch': u'0', u'version': u'17.0.5', u'release': u'1.0.1.el5_9', u'arch': u'x86_64'}, {u'src': None, u'name': u'xulrunner', u'sum': [u'md5', u'c38ae209290bf2527873522fa903a762'], u'filename': u'xulrunner-17.0.5-1.0.1.el5_9.i386.rpm', u'epoch': u'0', u'version': u'17.0.5', u'release': u'1.0.1.el5_9', u'arch': u'i386'}, {u'src': None, u'name': u'xulrunner', u'sum': [u'md5', u'86203a2b863b10416c2b825001866876'], u'filename': u'xulrunner-17.0.5-1.0.1.el5_9.src.rpm', u'epoch': u'0', u'version': u'17.0.5', u'release': u'1.0.1.el5_9', u'arch': u'src'}, {u'src': None, u'name': u'xulrunner', u'sum': [u'md5', u'00e597401978d9981d67949c6bfabd8a'], u'filename': u'xulrunner-17.0.5-1.0.1.el5_9.x86_64.rpm', u'epoch': u'0', u'version': u'17.0.5', u'release': u'1.0.1.el5_9', u'arch': u'x86_64'}, {u'src': None, u'name': u'xulrunner-devel', u'sum': [u'md5', u'6c3bb6c9fb797405db9efc4acec38080'], u'filename': u'xulrunner-devel-17.0.5-1.0.1.el5_9.i386.rpm', u'epoch': u'0', u'version': u'17.0.5', u'release': u'1.0.1.el5_9', u'arch': u'i386'}, {u'src': None, u'name': u'xulrunner-devel', u'sum': [u'md5', u'3e03f0a5b6b958b8b152ae27221440c2'], u'filename': u'xulrunner-devel-17.0.5-1.0.1.el5_9.x86_64.rpm', u'epoch': u'0', u'version': u'17.0.5', u'release': u'1.0.1.el5_9', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u'[kvm-83-262.0.1.el5_9.3]\n- Added kvm-add-oracle-workaround-for-libvirt-bug.patch\n- Added kvm-Introduce-oel-machine-type.patch\n\n[kvm-83-262.el5_3]\n- kvm-kernel-kvm-accept-unaligned-MSR_KVM_SYSTEM_TIME-writes.patch [bz#947363]\n- Resolves: bz#947363\n (RHEL.5.8.32 guest hang when installing)\n\n[kvm-83-262.el5_2]\n- kvm-kernel-KVM-Fix-for-buffer-overflow-in-handling-of-MSR_KVM_S.patch [bz#917018]\n- kvm-kernel-KVM-Convert-MSR_KVM_SYSTEM_TIME-to-use-kvm_write_gue.patch [bz#917022]\n- kvm-kernel-KVM-Fix-bounds-checking-in-ioapic-indirect-register-.patch [bz#917028]\n- kvm-kernel-do-not-GP-on-unaligned-MSR_KVM_SYSTEM_TIME-write.patch [bz#bz917019]\n- Resolves: bz#917018\n (CVE-2013-1796 kernel: kvm: buffer overflow in handling of MSR_KVM_SYSTEM_TIME [rhel-5.9.z])\n- Resolves: bz#917022\n (CVE-2013-1797 kernel: kvm: after free issue with the handling of MSR_KVM_SYSTEM_TIME [rhel-5.9.z])\n- Resolves: bz#917028\n (CVE-2013-1798 kernel: kvm: out-of-bounds access in ioapic indirect register reads [rhel-5.9.z])', u'issued': u'2013-04-09', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELSA-2013-0727.html', u'type': u'self', u'id': None, u'title': u'ELSA-2013-0727'}, {u'href': u'http://linux.oracle.com/cve/CVE-2013-1796.html', u'type': u'cve', u'id': u'CVE-2013-1796', u'title': u'CVE-2013-1796'}, {u'href': u'http://linux.oracle.com/cve/CVE-2013-1797.html', u'type': u'cve', u'id': u'CVE-2013-1797', u'title': u'CVE-2013-1797'}, {u'href': u'http://linux.oracle.com/cve/CVE-2013-1798.html', u'type': u'cve', u'id': u'CVE-2013-1798', u'title': u'CVE-2013-1798'}], u'_content_type_id': u'erratum', u'_id': u'4f9af6e4-808f-4ce5-b881-1ccb71163866', u'from': u'el-errata@oss.oracle.com', u'severity': u'Important', u'title': u' kvm security update', u'_ns': u'units_erratum', u'rights': u'Copyright 2013 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 5', u'reboot_suggested': False, u'type': u'security', u'pkglist': [{u'packages': [{u'src': None, u'name': u'kmod-kvm', u'sum': [u'md5', u'73e0d2d82f335263f6e19060d00a437c'], u'filename': u'kmod-kvm-83-262.0.1.el5_9.3.x86_64.rpm', u'epoch': u'0', u'version': u'83', u'release': u'262.0.1.el5_9.3', u'arch': u'x86_64'}, {u'src': None, u'name': u'kmod-kvm-debug', u'sum': [u'md5', u'86a660515e0d64f4199ad2b71021cb78'], u'filename': u'kmod-kvm-debug-83-262.0.1.el5_9.3.x86_64.rpm', u'epoch': u'0', u'version': u'83', u'release': u'262.0.1.el5_9.3', u'arch': u'x86_64'}, {u'src': None, u'name': u'kvm', u'sum': [u'md5', u'64de79611f7fd3336bfbac154974f1dd'], u'filename': u'kvm-83-262.0.1.el5_9.3.src.rpm', u'epoch': u'0', u'version': u'83', u'release': u'262.0.1.el5_9.3', u'arch': u'src'}, {u'src': None, u'name': u'kvm', u'sum': [u'md5', u'acae91e1622840b427849882a34bfa25'], u'filename': u'kvm-83-262.0.1.el5_9.3.x86_64.rpm', u'epoch': u'0', u'version': u'83', u'release': u'262.0.1.el5_9.3', u'arch': u'x86_64'}, {u'src': None, u'name': u'kvm-qemu-img', u'sum': [u'md5', u'56e0f638a071b0d26ee865800c7074c1'], u'filename': u'kvm-qemu-img-83-262.0.1.el5_9.3.x86_64.rpm', u'epoch': u'0', u'version': u'83', u'release': u'262.0.1.el5_9.3', u'arch': u'x86_64'}, {u'src': None, u'name': u'kvm-tools', u'sum': [u'md5', u'5eedcfe13e001ada07adf15583a024a7'], u'filename': u'kvm-tools-83-262.0.1.el5_9.3.x86_64.rpm', u'epoch': u'0', u'version': u'83', u'release': u'262.0.1.el5_9.3', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u'[1.6.11-9]\n- add security fixes for CVE-2013-1846, CVE-2013-1847, CVE-2013-1849 (#947372)\n\n[1.6.11-8]\n- add security fix for CVE-2013-1845 (#947372)', u'issued': u'2013-04-11', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELSA-2013-0737.html', u'type': u'self', u'id': None, u'title': u'ELSA-2013-0737'}, {u'href': u'http://linux.oracle.com/cve/CVE-2013-1845.html', u'type': u'cve', u'id': u'CVE-2013-1845', u'title': u'CVE-2013-1845'}, {u'href': u'http://linux.oracle.com/cve/CVE-2013-1846.html', u'type': u'cve', u'id': u'CVE-2013-1846', u'title': u'CVE-2013-1846'}, {u'href': u'http://linux.oracle.com/cve/CVE-2013-1847.html', u'type': u'cve', u'id': u'CVE-2013-1847', u'title': u'CVE-2013-1847'}, {u'href': u'http://linux.oracle.com/cve/CVE-2013-1849.html', u'type': u'cve', u'id': u'CVE-2013-1849', u'title': u'CVE-2013-1849'}], u'_content_type_id': u'erratum', u'_id': u'220d70cd-a211-4716-87fb-11f0272583a2', u'from': u'el-errata@oss.oracle.com', u'severity': u'Moderate', u'title': u' subversion security update', u'_ns': u'units_erratum', u'rights': u'Copyright 2013 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 6', u'reboot_suggested': False, u'type': u'security', u'pkglist': [{u'packages': [{u'src': None, u'name': u'mod_dav_svn', u'sum': [u'md5', u'32069de25dfe1469b5d1440a9a881895'], u'filename': u'mod_dav_svn-1.6.11-9.el6_4.x86_64.rpm', u'epoch': u'0', u'version': u'1.6.11', u'release': u'9.el6_4', u'arch': u'x86_64'}, {u'src': None, u'name': u'subversion', u'sum': [u'md5', u'cac9b8f82b9708c83497e0ebe87164c2'], u'filename': u'subversion-1.6.11-9.el6_4.i686.rpm', u'epoch': u'0', u'version': u'1.6.11', u'release': u'9.el6_4', u'arch': u'i686'}, {u'src': None, u'name': u'subversion', u'sum': [u'md5', u'65043506b913efe80b18b09cdd2fceab'], u'filename': u'subversion-1.6.11-9.el6_4.src.rpm', u'epoch': u'0', u'version': u'1.6.11', u'release': u'9.el6_4', u'arch': u'src'}, {u'src': None, u'name': u'subversion', u'sum': [u'md5', u'08e585fe0dd4e39735ab5e75f4cb2a45'], u'filename': u'subversion-1.6.11-9.el6_4.x86_64.rpm', u'epoch': u'0', u'version': u'1.6.11', u'release': u'9.el6_4', u'arch': u'x86_64'}, {u'src': None, u'name': u'subversion-devel', u'sum': [u'md5', u'b9ca9fc039bdce31ad199ec41b258c4e'], u'filename': u'subversion-devel-1.6.11-9.el6_4.i686.rpm', u'epoch': u'0', u'version': u'1.6.11', u'release': u'9.el6_4', u'arch': u'i686'}, {u'src': None, u'name': u'subversion-devel', u'sum': [u'md5', u'7b99dbb364c1d2c8f5a580fb3c7b7ed1'], u'filename': u'subversion-devel-1.6.11-9.el6_4.x86_64.rpm', u'epoch': u'0', u'version': u'1.6.11', u'release': u'9.el6_4', u'arch': u'x86_64'}, {u'src': None, u'name': u'subversion-gnome', u'sum': [u'md5', u'2e67fc18eea58ccac62e0785d6ee390d'], u'filename': u'subversion-gnome-1.6.11-9.el6_4.i686.rpm', u'epoch': u'0', u'version': u'1.6.11', u'release': u'9.el6_4', u'arch': u'i686'}, {u'src': None, u'name': u'subversion-gnome', u'sum': [u'md5', u'7d3cc5cdfd9b4e5312b3c6b96c52c1fc'], u'filename': u'subversion-gnome-1.6.11-9.el6_4.x86_64.rpm', u'epoch': u'0', u'version': u'1.6.11', u'release': u'9.el6_4', u'arch': u'x86_64'}, {u'src': None, u'name': u'subversion-javahl', u'sum': [u'md5', u'd4578f6de778345d71e0305562aff1c7'], u'filename': u'subversion-javahl-1.6.11-9.el6_4.i686.rpm', u'epoch': u'0', u'version': u'1.6.11', u'release': u'9.el6_4', u'arch': u'i686'}, {u'src': None, u'name': u'subversion-javahl', u'sum': [u'md5', u'fcef25993f150a65e8bf077f484fc817'], u'filename': u'subversion-javahl-1.6.11-9.el6_4.x86_64.rpm', u'epoch': u'0', u'version': u'1.6.11', u'release': u'9.el6_4', u'arch': u'x86_64'}, {u'src': None, u'name': u'subversion-kde', u'sum': [u'md5', u'463b0ad23ba5e78b1fa530c341e16297'], u'filename': u'subversion-kde-1.6.11-9.el6_4.i686.rpm', u'epoch': u'0', u'version': u'1.6.11', u'release': u'9.el6_4', u'arch': u'i686'}, {u'src': None, u'name': u'subversion-kde', u'sum': [u'md5', u'7913e0f3df4be7614c45754aaefd788a'], u'filename': u'subversion-kde-1.6.11-9.el6_4.x86_64.rpm', u'epoch': u'0', u'version': u'1.6.11', u'release': u'9.el6_4', u'arch': u'x86_64'}, {u'src': None, u'name': u'subversion-perl', u'sum': [u'md5', u'a8d4eccb7ae8e82fb11752c296a0fc83'], u'filename': u'subversion-perl-1.6.11-9.el6_4.i686.rpm', u'epoch': u'0', u'version': u'1.6.11', u'release': u'9.el6_4', u'arch': u'i686'}, {u'src': None, u'name': u'subversion-perl', u'sum': [u'md5', u'7fd6c76ca438bfd094a75047aff5adb4'], u'filename': u'subversion-perl-1.6.11-9.el6_4.x86_64.rpm', u'epoch': u'0', u'version': u'1.6.11', u'release': u'9.el6_4', u'arch': u'x86_64'}, {u'src': None, u'name': u'subversion-ruby', u'sum': [u'md5', u'fc68e26377972768234d71e1957e53a3'], u'filename': u'subversion-ruby-1.6.11-9.el6_4.i686.rpm', u'epoch': u'0', u'version': u'1.6.11', u'release': u'9.el6_4', u'arch': u'i686'}, {u'src': None, u'name': u'subversion-ruby', u'sum': [u'md5', u'446ca29c728e35db48727216449e5d27'], u'filename': u'subversion-ruby-1.6.11-9.el6_4.x86_64.rpm', u'epoch': u'0', u'version': u'1.6.11', u'release': u'9.el6_4', u'arch': u'x86_64'}, {u'src': None, u'name': u'subversion-svn2cl', u'sum': [u'md5', u'dcd109ccb5b987f91362809ccf561dfc'], u'filename': u'subversion-svn2cl-1.6.11-9.el6_4.noarch.rpm', u'epoch': u'0', u'version': u'1.6.11', u'release': u'9.el6_4', u'arch': u'noarch'}], u'name': u'ol6_x86_64_latest', u'short': u'ol6_x86_64_latest'}, {u'packages': [{u'src': None, u'name': u'mod_dav_svn', u'sum': [u'md5', u'a31f64eac7b9690badce9fa55994c102'], u'filename': u'mod_dav_svn-1.6.11-11.el5_9.x86_64.rpm', u'epoch': u'0', u'version': u'1.6.11', u'release': u'11.el5_9', u'arch': u'x86_64'}, {u'src': None, u'name': u'subversion', u'sum': [u'md5', u'f0f15f19f6394e9c7aeae8949cbecb39'], u'filename': u'subversion-1.6.11-11.el5_9.i386.rpm', u'epoch': u'0', u'version': u'1.6.11', u'release': u'11.el5_9', u'arch': u'i386'}, {u'src': None, u'name': u'subversion', u'sum': [u'md5', u'30b17ae90cabc59d156d7c67691f1a7d'], u'filename': u'subversion-1.6.11-11.el5_9.src.rpm', u'epoch': u'0', u'version': u'1.6.11', u'release': u'11.el5_9', u'arch': u'src'}, {u'src': None, u'name': u'subversion', u'sum': [u'md5', u'3a96e06d183e6ea3e929074da4bd8a2a'], u'filename': u'subversion-1.6.11-11.el5_9.x86_64.rpm', u'epoch': u'0', u'version': u'1.6.11', u'release': u'11.el5_9', u'arch': u'x86_64'}, {u'src': None, u'name': u'subversion-devel', u'sum': [u'md5', u'95551eb31220f548c7cf0586a34687ec'], u'filename': u'subversion-devel-1.6.11-11.el5_9.i386.rpm', u'epoch': u'0', u'version': u'1.6.11', u'release': u'11.el5_9', u'arch': u'i386'}, {u'src': None, u'name': u'subversion-devel', u'sum': [u'md5', u'af6345f208987b135093ea4594a39506'], u'filename': u'subversion-devel-1.6.11-11.el5_9.x86_64.rpm', u'epoch': u'0', u'version': u'1.6.11', u'release': u'11.el5_9', u'arch': u'x86_64'}, {u'src': None, u'name': u'subversion-javahl', u'sum': [u'md5', u'233c50085993cca6751174e39cf0f3c2'], u'filename': u'subversion-javahl-1.6.11-11.el5_9.x86_64.rpm', u'epoch': u'0', u'version': u'1.6.11', u'release': u'11.el5_9', u'arch': u'x86_64'}, {u'src': None, u'name': u'subversion-perl', u'sum': [u'md5', u'bc1147be8818c7f630c04be1be234cc5'], u'filename': u'subversion-perl-1.6.11-11.el5_9.x86_64.rpm', u'epoch': u'0', u'version': u'1.6.11', u'release': u'11.el5_9', u'arch': u'x86_64'}, {u'src': None, u'name': u'subversion-ruby', u'sum': [u'md5', u'8722c171360a8d89c74f1d8d1660f423'], u'filename': u'subversion-ruby-1.6.11-11.el5_9.x86_64.rpm', u'epoch': u'0', u'version': u'1.6.11', u'release': u'11.el5_9', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u"kernel\n[2.6.18-348.4.1]\n- [virt] xen-netback: backports (Andrew Jones) [910884 910885] {CVE-2013-0216}\n- [virt] xen-netback: netif_schedulable should take a netif (Andrew Jones) [910884 910885] {CVE-2013-0216}\n- [virt] pciback: rate limit error mess from pciback_enable_msi() (Igor Mammedov) [910876 910877] {CVE-2013-0231}\n- [net] be2net: remove BUG_ON() in be_mcc_compl_is_new() (Ivan Vecera) [923910 907524]\n- [net] ipv4: Update MTU to all related cache entries (Amerigo Wang) [923353 905190]\n- [net] annotate rt_hash_code() users (Amerigo Wang) [923353 905190]\n- [net] xfrm_user: fix info leak in copy_to_user_state() (Thomas Graf) [922426 922427] {CVE-2012-6537}\n- [net] xfrm_user: fix info leak in copy_to_user_policy() (Thomas Graf) [922426 922427] {CVE-2012-6537}\n- [net] xfrm_user: fix info leak in copy_to_user_tmpl() (Thomas Graf) [922426 922427] {CVE-2012-6537}\n- [net] atm: fix info leak in getsockopt(SO_ATMPVC) (Thomas Graf) [922384 922385] {CVE-2012-6546}\n- [net] atm: fix info leak via getsockname() (Thomas Graf) [922384 922385] {CVE-2012-6546}\n- [net] tun: fix ioctl() based info leaks (Thomas Graf) [922348 922349] {CVE-2012-6547}\n- [net] llc, zero sockaddr_llc struct (Thomas Graf) [922327 922329] {CVE-2012-6542}\n- [net] llc: fix info leak via getsockname() (Thomas Graf) [922327 922329] {CVE-2012-6542}\n- [net] xfrm_user: return error pointer instead of NULL (Thomas Graf) [919386 919387] {CVE-2013-1826}\n- [net] ixgbevf: allocate room for mailbox MSI-X interrupt's name (Laszlo Ersek) [924134 862862]\n- [fs] knfsd: allow nfsd READDIR to return 64bit cookies (Niels de Vos) [924087 918952]", u'issued': u'2013-04-16', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELSA-2013-0747.html', u'type': u'self', u'id': None, u'title': u'ELSA-2013-0747'}, {u'href': u'http://linux.oracle.com/cve/CVE-2013-0231.html', u'type': u'cve', u'id': u'CVE-2013-0231', u'title': u'CVE-2013-0231'}, {u'href': u'http://linux.oracle.com/cve/CVE-2013-0216.html', u'type': u'cve', u'id': u'CVE-2013-0216', u'title': u'CVE-2013-0216'}, {u'href': u'http://linux.oracle.com/cve/CVE-2012-6537.html', u'type': u'cve', u'id': u'CVE-2012-6537', u'title': u'CVE-2012-6537'}, {u'href': u'http://linux.oracle.com/cve/CVE-2012-6542.html', u'type': u'cve', u'id': u'CVE-2012-6542', u'title': u'CVE-2012-6542'}, {u'href': u'http://linux.oracle.com/cve/CVE-2012-6546.html', u'type': u'cve', u'id': u'CVE-2012-6546', u'title': u'CVE-2012-6546'}, {u'href': u'http://linux.oracle.com/cve/CVE-2012-6547.html', u'type': u'cve', u'id': u'CVE-2012-6547', u'title': u'CVE-2012-6547'}, {u'href': u'http://linux.oracle.com/cve/CVE-2013-1826.html', u'type': u'cve', u'id': u'CVE-2013-1826', u'title': u'CVE-2013-1826'}], u'_content_type_id': u'erratum', u'_id': u'423c3262-77be-4509-add5-bebc1d91993d', u'from': u'el-errata@oss.oracle.com', u'severity': u'Moderate', u'title': u' kernel security and bug fix update', u'_ns': u'units_erratum', u'rights': u'Copyright 2013 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 5', u'reboot_suggested': False, u'type': u'security', u'pkglist': [{u'packages': [{u'src': None, u'name': u'kernel', u'sum': [u'md5', u'46ec89427010fb1fab69314a4c2c0e1b'], u'filename': u'kernel-2.6.18-348.4.1.el5.src.rpm', u'epoch': u'0', u'version': u'2.6.18', u'release': u'348.4.1.el5', u'arch': u'src'}, {u'src': None, u'name': u'kernel', u'sum': [u'md5', u'1f704c41a41d38f14c79dc0069450da4'], u'filename': u'kernel-2.6.18-348.4.1.el5.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.18', u'release': u'348.4.1.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'kernel-debug', u'sum': [u'md5', u'13a52deb982d8bafd749ce3f3bcae2a3'], u'filename': u'kernel-debug-2.6.18-348.4.1.el5.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.18', u'release': u'348.4.1.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'kernel-debug-devel', u'sum': [u'md5', u'b5f7dd284743a6e4c74d5587aa35a034'], u'filename': u'kernel-debug-devel-2.6.18-348.4.1.el5.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.18', u'release': u'348.4.1.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'kernel-devel', u'sum': [u'md5', u'2dee6b9613e432d02172f8c94594e9e7'], u'filename': u'kernel-devel-2.6.18-348.4.1.el5.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.18', u'release': u'348.4.1.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'kernel-doc', u'sum': [u'md5', u'8732df60a28b72e06ad640eea2c2de97'], u'filename': u'kernel-doc-2.6.18-348.4.1.el5.noarch.rpm', u'epoch': u'0', u'version': u'2.6.18', u'release': u'348.4.1.el5', u'arch': u'noarch'}, {u'src': None, u'name': u'kernel-headers', u'sum': [u'md5', u'6bb94c58057339b928cbee44f23ab229'], u'filename': u'kernel-headers-2.6.18-348.4.1.el5.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.18', u'release': u'348.4.1.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'kernel-xen', u'sum': [u'md5', u'4301a66c41f52f55d1d936469aa1e812'], u'filename': u'kernel-xen-2.6.18-348.4.1.el5.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.18', u'release': u'348.4.1.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'kernel-xen-devel', u'sum': [u'md5', u'452be888947dcd1ac0a02864b36c8ed7'], u'filename': u'kernel-xen-devel-2.6.18-348.4.1.el5.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.18', u'release': u'348.4.1.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'ocfs2-2.6.18-348.4.1.el5', u'sum': [u'md5', u'6ff4fad214993dd4a520db0bad9d1568'], u'filename': u'ocfs2-2.6.18-348.4.1.el5-1.4.10-1.el5.src.rpm', u'epoch': u'0', u'version': u'1.4.10', u'release': u'1.el5', u'arch': u'src'}, {u'src': None, u'name': u'ocfs2-2.6.18-348.4.1.el5', u'sum': [u'md5', u'60216d829a852e9e2ebade715cf0599c'], u'filename': u'ocfs2-2.6.18-348.4.1.el5-1.4.10-1.el5.x86_64.rpm', u'epoch': u'0', u'version': u'1.4.10', u'release': u'1.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'ocfs2-2.6.18-348.4.1.el5debug', u'sum': [u'md5', u'0c37499750813164944bae8c6c66c4b0'], u'filename': u'ocfs2-2.6.18-348.4.1.el5debug-1.4.10-1.el5.x86_64.rpm', u'epoch': u'0', u'version': u'1.4.10', u'release': u'1.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'ocfs2-2.6.18-348.4.1.el5xen', u'sum': [u'md5', u'b821d09700c7ae258816a44723042912'], u'filename': u'ocfs2-2.6.18-348.4.1.el5xen-1.4.10-1.el5.x86_64.rpm', u'epoch': u'0', u'version': u'1.4.10', u'release': u'1.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'oracleasm-2.6.18-348.4.1.el5', u'sum': [u'md5', u'4dd3a7bd0a17ec2115cc3ceec41f5352'], u'filename': u'oracleasm-2.6.18-348.4.1.el5-2.0.5-1.el5.src.rpm', u'epoch': u'0', u'version': u'2.0.5', u'release': u'1.el5', u'arch': u'src'}, {u'src': None, u'name': u'oracleasm-2.6.18-348.4.1.el5', u'sum': [u'md5', u'6f1cdeca3982bf9ca0c6026430b1986d'], u'filename': u'oracleasm-2.6.18-348.4.1.el5-2.0.5-1.el5.x86_64.rpm', u'epoch': u'0', u'version': u'2.0.5', u'release': u'1.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'oracleasm-2.6.18-348.4.1.el5debug', u'sum': [u'md5', u'52edc21004be7dc60cbe3416cac2b705'], u'filename': u'oracleasm-2.6.18-348.4.1.el5debug-2.0.5-1.el5.x86_64.rpm', u'epoch': u'0', u'version': u'2.0.5', u'release': u'1.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'oracleasm-2.6.18-348.4.1.el5xen', u'sum': [u'md5', u'2af7737d5c262f930e7cfef7495cd29c'], u'filename': u'oracleasm-2.6.18-348.4.1.el5xen-2.0.5-1.el5.x86_64.rpm', u'epoch': u'0', u'version': u'2.0.5', u'release': u'1.el5', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u"kernel\n[2.6.18-348.4.1.0.1]\n- [oprofile] x86, mm: Add __get_user_pages_fast() [orabug 14277030]\n- [oprofile] export __get_user_pages_fast() function [orabug 14277030]\n- [oprofile] oprofile, x86: Fix nmi-unsafe callgraph support [orabug 14277030]\n- [oprofile] oprofile: use KM_NMI slot for kmap_atomic [orabug 14277030]\n- [oprofile] oprofile: i386 add get_user_pages_fast support [orabug 14277030]\n- [kernel] Initialize the local uninitialized variable stats. [orabug 14051367]\n- [fs] JBD:make jbd support 512B blocks correctly for ocfs2. [orabug 13477763]\n- [x86 ] fix fpu context corrupt when preempt in signal context [orabug 14038272]\n- [mm] fix hugetlb page leak (Dave McCracken) [orabug 12375075]\n- fix ia64 build error due to add-support-above-32-vcpus.patch(Zhenzhong Duan)\n- [x86] use dynamic vcpu_info remap to support more than 32 vcpus (Zhenzhong Duan)\n- [x86] Fix lvt0 reset when hvm boot up with noapic param\n- [scsi] remove printk's when doing I/O to a dead device (John Sobecki, Chris Mason)\n [orabug 12342275]\n- [char] ipmi: Fix IPMI errors due to timing problems (Joe Jin) [orabug 12561346]\n- [scsi] Fix race when removing SCSI devices (Joe Jin) [orabug 12404566]\n- [net] net: Redo the broken redhat netconsole over bonding (Tina Yang) [orabug 12740042]\n- [fs] nfs: Fix __put_nfs_open_context() NULL pointer panic (Joe Jin) [orabug 12687646]\n- fix filp_close() race (Joe Jin) [orabug 10335998]\n- make xenkbd.abs_pointer=1 by default [orabug 67188919]\n- [xen] check to see if hypervisor supports memory reservation change\n (Chuck Anderson) [orabug 7556514]\n- [net] Enable entropy for bnx2,bnx2x,e1000e,igb,ixgb,ixgbe,ixgbevf (John Sobecki)\n [orabug 10315433]\n- [NET] Add xen pv netconsole support (Tina Yang) [orabug 6993043] [bz 7258]\n- [mm] Patch shrink_zone to yield during severe mempressure events, avoiding\n hangs and evictions (John Sobecki,Chris Mason) [orabug 6086839]\n- [mm] Enhance shrink_zone patch allow full swap utilization, and also be\n NUMA-aware (John Sobecki,Chris Mason,Herbert van den Bergh) [orabug 9245919]\n- fix aacraid not to reset during kexec (Joe Jin) [orabug 8516042]\n- [xen] PVHVM guest with PoD crashes under memory pressure (Chuck Anderson)\n [orabug 9107465]\n- [xen] PV guest with FC HBA hangs during shutdown (Chuck Anderson)\n [orabug 9764220]\n- Support 256GB+ memory for pv guest (Mukesh Rathor) [orabug 9450615]\n- fix overcommit memory to use percpu_counter for (KOSAKI Motohiro,\n Guru Anbalagane) [orabug 6124033]\n- [ipmi] make configurable timeouts for kcs of ipmi [orabug 9752208]\n- [ib] fix memory corruption (Andy Grover) [orabug 9972346]\n- [usb] USB: fix __must_check warnings in drivers/usb/core/ (Junxiao Bi) [orabug 14795203]\n- [usb] usbcore: fix endpoint device creation (Junxiao Bi) [orabug 14795203]\n- [usb] usbcore: fix refcount bug in endpoint removal (Junxiao Bi) [orabug 14795203]\n\n[2.6.18-348.4.1]\n- [virt] xen-netback: backports (Andrew Jones) [910884 910885] {CVE-2013-0216}\n- [virt] xen-netback: netif_schedulable should take a netif (Andrew Jones) [910884 910885] {CVE-2013-0216}\n- [virt] pciback: rate limit error mess from pciback_enable_msi() (Igor Mammedov) [910876 910877] {CVE-2013-0231}\n- [net] be2net: remove BUG_ON() in be_mcc_compl_is_new() (Ivan Vecera) [923910 907524]\n- [net] ipv4: Update MTU to all related cache entries (Amerigo Wang) [923353 905190]\n- [net] annotate rt_hash_code() users (Amerigo Wang) [923353 905190]\n- [net] xfrm_user: fix info leak in copy_to_user_state() (Thomas Graf) [922426 922427] {CVE-2012-6537}\n- [net] xfrm_user: fix info leak in copy_to_user_policy() (Thomas Graf) [922426 922427] {CVE-2012-6537}\n- [net] xfrm_user: fix info leak in copy_to_user_tmpl() (Thomas Graf) [922426 922427] {CVE-2012-6537}\n- [net] atm: fix info leak in getsockopt(SO_ATMPVC) (Thomas Graf) [922384 922385] {CVE-2012-6546}\n- [net] atm: fix info leak via getsockname() (Thomas Graf) [922384 922385] {CVE-2012-6546}\n- [net] tun: fix ioctl() based info leaks (Thomas Graf) [922348 922349] {CVE-2012-6547}\n- [net] llc, zero sockaddr_llc struct (Thomas Graf) [922327 922329] {CVE-2012-6542}\n- [net] llc: fix info leak via getsockname() (Thomas Graf) [922327 922329] {CVE-2012-6542}\n- [net] xfrm_user: return error pointer instead of NULL (Thomas Graf) [919386 919387] {CVE-2013-1826}\n- [net] ixgbevf: allocate room for mailbox MSI-X interrupt's name (Laszlo Ersek) [924134 862862]\n- [fs] knfsd: allow nfsd READDIR to return 64bit cookies (Niels de Vos) [924087 918952]", u'issued': u'2013-04-16', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELSA-2013-0747-1.html', u'type': u'self', u'id': None, u'title': u'ELSA-2013-0747-1'}, {u'href': u'http://linux.oracle.com/cve/CVE-2013-0231.html', u'type': u'cve', u'id': u'CVE-2013-0231', u'title': u'CVE-2013-0231'}, {u'href': u'http://linux.oracle.com/cve/CVE-2013-0216.html', u'type': u'cve', u'id': u'CVE-2013-0216', u'title': u'CVE-2013-0216'}, {u'href': u'http://linux.oracle.com/cve/CVE-2012-6537.html', u'type': u'cve', u'id': u'CVE-2012-6537', u'title': u'CVE-2012-6537'}, {u'href': u'http://linux.oracle.com/cve/CVE-2012-6542.html', u'type': u'cve', u'id': u'CVE-2012-6542', u'title': u'CVE-2012-6542'}, {u'href': u'http://linux.oracle.com/cve/CVE-2012-6546.html', u'type': u'cve', u'id': u'CVE-2012-6546', u'title': u'CVE-2012-6546'}, {u'href': u'http://linux.oracle.com/cve/CVE-2012-6547.html', u'type': u'cve', u'id': u'CVE-2012-6547', u'title': u'CVE-2012-6547'}, {u'href': u'http://linux.oracle.com/cve/CVE-2013-1826.html', u'type': u'cve', u'id': u'CVE-2013-1826', u'title': u'CVE-2013-1826'}], u'_content_type_id': u'erratum', u'_id': u'0d3ae634-3109-48e3-a073-a4983802cc66', u'from': u'el-errata@oss.oracle.com', u'severity': u'Moderate', u'title': u' kernel security and bug fix update', u'_ns': u'units_erratum', u'rights': u'Copyright 2013 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 5', u'reboot_suggested': False, u'type': u'security', u'pkglist': [{u'packages': [{u'src': None, u'name': u'kernel', u'sum': [u'md5', u'e70d4980d21b7209b76a39760f870ea5'], u'filename': u'kernel-2.6.18-348.4.1.0.1.el5.src.rpm', u'epoch': u'0', u'version': u'2.6.18', u'release': u'348.4.1.0.1.el5', u'arch': u'src'}, {u'src': None, u'name': u'kernel', u'sum': [u'md5', u'842b8bb16942d2379503460f7555c427'], u'filename': u'kernel-2.6.18-348.4.1.0.1.el5.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.18', u'release': u'348.4.1.0.1.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'kernel-debug', u'sum': [u'md5', u'45b0cbdec3a3e7c596c7b7a10a95b61b'], u'filename': u'kernel-debug-2.6.18-348.4.1.0.1.el5.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.18', u'release': u'348.4.1.0.1.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'kernel-debug-devel', u'sum': [u'md5', u'20d5015ebb4b316df8a194bde9c48ed4'], u'filename': u'kernel-debug-devel-2.6.18-348.4.1.0.1.el5.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.18', u'release': u'348.4.1.0.1.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'kernel-devel', u'sum': [u'md5', u'4af3b1d3d5d6231a448f7e7dc8e5542d'], u'filename': u'kernel-devel-2.6.18-348.4.1.0.1.el5.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.18', u'release': u'348.4.1.0.1.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'kernel-doc', u'sum': [u'md5', u'b141dab805a1d26f165ec59d82fd2ded'], u'filename': u'kernel-doc-2.6.18-348.4.1.0.1.el5.noarch.rpm', u'epoch': u'0', u'version': u'2.6.18', u'release': u'348.4.1.0.1.el5', u'arch': u'noarch'}, {u'src': None, u'name': u'kernel-headers', u'sum': [u'md5', u'baf28638f07f8c6d994ffc0ab1201064'], u'filename': u'kernel-headers-2.6.18-348.4.1.0.1.el5.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.18', u'release': u'348.4.1.0.1.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'kernel-xen', u'sum': [u'md5', u'e13ab626017742d567944903cc2d47be'], u'filename': u'kernel-xen-2.6.18-348.4.1.0.1.el5.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.18', u'release': u'348.4.1.0.1.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'kernel-xen-devel', u'sum': [u'md5', u'84c43de1abfc7c29373e3720bac4aeb4'], u'filename': u'kernel-xen-devel-2.6.18-348.4.1.0.1.el5.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.18', u'release': u'348.4.1.0.1.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'ocfs2-2.6.18-348.4.1.0.1.el5', u'sum': [u'md5', u'04b96cf8596e4424bc983cc0a823a2a0'], u'filename': u'ocfs2-2.6.18-348.4.1.0.1.el5-1.4.10-1.el5.src.rpm', u'epoch': u'0', u'version': u'1.4.10', u'release': u'1.el5', u'arch': u'src'}, {u'src': None, u'name': u'ocfs2-2.6.18-348.4.1.0.1.el5', u'sum': [u'md5', u'ad0fab1c6100c02491b46aa6092f9446'], u'filename': u'ocfs2-2.6.18-348.4.1.0.1.el5-1.4.10-1.el5.x86_64.rpm', u'epoch': u'0', u'version': u'1.4.10', u'release': u'1.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'ocfs2-2.6.18-348.4.1.0.1.el5debug', u'sum': [u'md5', u'a0c656a88ba45b91d72933d9389b6573'], u'filename': u'ocfs2-2.6.18-348.4.1.0.1.el5debug-1.4.10-1.el5.x86_64.rpm', u'epoch': u'0', u'version': u'1.4.10', u'release': u'1.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'ocfs2-2.6.18-348.4.1.0.1.el5xen', u'sum': [u'md5', u'07b4e8809e1f68f3fc0f5d8ccce8df5c'], u'filename': u'ocfs2-2.6.18-348.4.1.0.1.el5xen-1.4.10-1.el5.x86_64.rpm', u'epoch': u'0', u'version': u'1.4.10', u'release': u'1.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'oracleasm-2.6.18-348.4.1.0.1.el5', u'sum': [u'md5', u'85822cf64d2e75776ca121e979991d54'], u'filename': u'oracleasm-2.6.18-348.4.1.0.1.el5-2.0.5-1.el5.src.rpm', u'epoch': u'0', u'version': u'2.0.5', u'release': u'1.el5', u'arch': u'src'}, {u'src': None, u'name': u'oracleasm-2.6.18-348.4.1.0.1.el5', u'sum': [u'md5', u'a6c7de1f728e7ecbf954225d5026045c'], u'filename': u'oracleasm-2.6.18-348.4.1.0.1.el5-2.0.5-1.el5.x86_64.rpm', u'epoch': u'0', u'version': u'2.0.5', u'release': u'1.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'oracleasm-2.6.18-348.4.1.0.1.el5debug', u'sum': [u'md5', u'd1df29f5b12577c8a8dde055ed4e9e56'], u'filename': u'oracleasm-2.6.18-348.4.1.0.1.el5debug-2.0.5-1.el5.x86_64.rpm', u'epoch': u'0', u'version': u'2.0.5', u'release': u'1.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'oracleasm-2.6.18-348.4.1.0.1.el5xen', u'sum': [u'md5', u'6af9f87b0e9e51a7852f62fe2d0de669'], u'filename': u'oracleasm-2.6.18-348.4.1.0.1.el5xen-2.0.5-1.el5.x86_64.rpm', u'epoch': u'0', u'version': u'2.0.5', u'release': u'1.el5', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u'[1.7.0.19-2.3.9.1.0.1.el5_9]\n- Add oracle-enterprise.patch\n- Fix DISTRO_NAME to "Enterprise Linux"\n\n[1.7.0.19-2.3.9.1.el5]\n- updated to updated IcedTea 2.3.9 with fix to one of security fixes\n- fixed font glyph offset\n- Resolves: rhbz#950376\n\n[1.7.0.19-2.3.9.0.el5]\n- updated to IcedTea 2.3.9 with latest security patches\n- buildver sync to b19\n- rewritten java-1.7.0-openjdk-java-access-bridge-security.patch\n- Resolves: rhbz#950376\n\n[1.7.0.9-2.3.8.1.el5]\n- Added some of the latest Fedora spec bugfixes\n- Bumped release\n- zlib in BuildReq restricted for 1.2.3-7 or higher\n- see https://bugzilla.redhat.com/show_bug.cgi?id=904231\n- Removed a -icedtea tag from the version\n- package have less and less connections to icedtea7\n- Added gcc-c++ build dependence. Sometimes caused troubles during rpm -bb\n- Added (Build)Requires for fontconfig and xorg-x11-fonts-Type1\n- see https://bugzilla.redhat.com/show_bug.cgi?id=721033 for details\n- logging.properties marked as config(noreplace)\n- see https://bugzilla.redhat.com/show_bug.cgi?id=679180 for details\n- nss.cfg was marked as config(noreplace)\n- slaves sync with el6\n- Resolves: rhbz#950376\n', u'issued': u'2013-04-17', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELSA-2013-0752.html', u'type': u'self', u'id': None, u'title': u'ELSA-2013-0752'}, {u'href': u'http://linux.oracle.com/cve/CVE-2013-0401.html', u'type': u'cve', u'id': u'CVE-2013-0401', u'title': u'CVE-2013-0401'}, {u'href': u'http://linux.oracle.com/cve/CVE-2013-1488.html', u'type': u'cve', u'id': u'CVE-2013-1488', u'title': u'CVE-2013-1488'}, {u'href': u'http://linux.oracle.com/cve/CVE-2013-1518.html', u'type': u'cve', u'id': u'CVE-2013-1518', u'title': u'CVE-2013-1518'}, {u'href': u'http://linux.oracle.com/cve/CVE-2013-1537.html', u'type': u'cve', u'id': u'CVE-2013-1537', u'title': u'CVE-2013-1537'}, {u'href': u'http://linux.oracle.com/cve/CVE-2013-1557.html', u'type': u'cve', u'id': u'CVE-2013-1557', u'title': u'CVE-2013-1557'}, {u'href': u'http://linux.oracle.com/cve/CVE-2013-1558.html', u'type': u'cve', u'id': u'CVE-2013-1558', u'title': u'CVE-2013-1558'}, {u'href': u'http://linux.oracle.com/cve/CVE-2013-1569.html', u'type': u'cve', u'id': u'CVE-2013-1569', u'title': u'CVE-2013-1569'}, {u'href': u'http://linux.oracle.com/cve/CVE-2013-2383.html', u'type': u'cve', u'id': u'CVE-2013-2383', u'title': u'CVE-2013-2383'}, {u'href': u'http://linux.oracle.com/cve/CVE-2013-2384.html', u'type': u'cve', u'id': u'CVE-2013-2384', u'title': u'CVE-2013-2384'}, {u'href': u'http://linux.oracle.com/cve/CVE-2013-2415.html', u'type': u'cve', u'id': u'CVE-2013-2415', u'title': u'CVE-2013-2415'}, {u'href': u'http://linux.oracle.com/cve/CVE-2013-2417.html', u'type': u'cve', u'id': u'CVE-2013-2417', u'title': u'CVE-2013-2417'}, {u'href': u'http://linux.oracle.com/cve/CVE-2013-2419.html', u'type': u'cve', u'id': u'CVE-2013-2419', u'title': u'CVE-2013-2419'}, {u'href': u'http://linux.oracle.com/cve/CVE-2013-2420.html', u'type': u'cve', u'id': u'CVE-2013-2420', u'title': u'CVE-2013-2420'}, {u'href': u'http://linux.oracle.com/cve/CVE-2013-2421.html', u'type': u'cve', u'id': u'CVE-2013-2421', u'title': u'CVE-2013-2421'}, {u'href': u'http://linux.oracle.com/cve/CVE-2013-2422.html', u'type': u'cve', u'id': u'CVE-2013-2422', u'title': u'CVE-2013-2422'}, {u'href': u'http://linux.oracle.com/cve/CVE-2013-2423.html', u'type': u'cve', u'id': u'CVE-2013-2423', u'title': u'CVE-2013-2423'}, {u'href': u'http://linux.oracle.com/cve/CVE-2013-2424.html', u'type': u'cve', u'id': u'CVE-2013-2424', u'title': u'CVE-2013-2424'}, {u'href': u'http://linux.oracle.com/cve/CVE-2013-2426.html', u'type': u'cve', u'id': u'CVE-2013-2426', u'title': u'CVE-2013-2426'}, {u'href': u'http://linux.oracle.com/cve/CVE-2013-2429.html', u'type': u'cve', u'id': u'CVE-2013-2429', u'title': u'CVE-2013-2429'}, {u'href': u'http://linux.oracle.com/cve/CVE-2013-2430.html', u'type': u'cve', u'id': u'CVE-2013-2430', u'title': u'CVE-2013-2430'}, {u'href': u'http://linux.oracle.com/cve/CVE-2013-2431.html', u'type': u'cve', u'id': u'CVE-2013-2431', u'title': u'CVE-2013-2431'}, {u'href': u'http://linux.oracle.com/cve/CVE-2013-2436.html', u'type': u'cve', u'id': u'CVE-2013-2436', u'title': u'CVE-2013-2436'}], u'_content_type_id': u'erratum', u'_id': u'1947b023-c58a-4d4a-8c17-d4668d3033f5', u'from': u'el-errata@oss.oracle.com', u'severity': u'Important', u'title': u' java-1.7.0-openjdk security update', u'_ns': u'units_erratum', u'rights': u'Copyright 2013 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 5', u'reboot_suggested': False, u'type': u'security', u'pkglist': [{u'packages': [{u'src': None, u'name': u'java-1.7.0-openjdk', u'sum': [u'md5', u'7e8b5fa58d35ec9fe106f4d1eccabb1f'], u'filename': u'java-1.7.0-openjdk-1.7.0.19-2.3.9.1.0.1.el5_9.src.rpm', u'epoch': u'1', u'version': u'1.7.0.19', u'release': u'2.3.9.1.0.1.el5_9', u'arch': u'src'}, {u'src': None, u'name': u'java-1.7.0-openjdk', u'sum': [u'md5', u'f41c2d2e2aafaf2dc2eae56fd96c43d5'], u'filename': u'java-1.7.0-openjdk-1.7.0.19-2.3.9.1.0.1.el5_9.x86_64.rpm', u'epoch': u'1', u'version': u'1.7.0.19', u'release': u'2.3.9.1.0.1.el5_9', u'arch': u'x86_64'}, {u'src': None, u'name': u'java-1.7.0-openjdk-demo', u'sum': [u'md5', u'204c567a34e5b7a6e454a8a23ef8fd22'], u'filename': u'java-1.7.0-openjdk-demo-1.7.0.19-2.3.9.1.0.1.el5_9.x86_64.rpm', u'epoch': u'1', u'version': u'1.7.0.19', u'release': u'2.3.9.1.0.1.el5_9', u'arch': u'x86_64'}, {u'src': None, u'name': u'java-1.7.0-openjdk-devel', u'sum': [u'md5', u'7d8ab30f2fc39e3d6a4881005c29621a'], u'filename': u'java-1.7.0-openjdk-devel-1.7.0.19-2.3.9.1.0.1.el5_9.x86_64.rpm', u'epoch': u'1', u'version': u'1.7.0.19', u'release': u'2.3.9.1.0.1.el5_9', u'arch': u'x86_64'}, {u'src': None, u'name': u'java-1.7.0-openjdk-javadoc', u'sum': [u'md5', u'4e0e4a2ebbb6178c89cc79264fce5eca'], u'filename': u'java-1.7.0-openjdk-javadoc-1.7.0.19-2.3.9.1.0.1.el5_9.x86_64.rpm', u'epoch': u'1', u'version': u'1.7.0.19', u'release': u'2.3.9.1.0.1.el5_9', u'arch': u'x86_64'}, {u'src': None, u'name': u'java-1.7.0-openjdk-src', u'sum': [u'md5', u'b291ed9193353cb8079aba722a3fa006'], u'filename': u'java-1.7.0-openjdk-src-1.7.0.19-2.3.9.1.0.1.el5_9.x86_64.rpm', u'epoch': u'1', u'version': u'1.7.0.19', u'release': u'2.3.9.1.0.1.el5_9', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u'[2.5-107.4]\n- Add missing patch to avoid use after free (#816647).\n\n[2.5-107.3]\n- Fix multibyte character processing crash in regexp (CVE-2013-0242, #951130)\n - Fix getaddrinfo stack overflow resulting in application crash (CVE-2013-1914, #951130)\n\n[2.5-107.2]\n- Call feraiseexcept only if exceptions are not masked (#861871).', u'issued': u'2013-04-24', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELSA-2013-0769.html', u'type': u'self', u'id': None, u'title': u'ELSA-2013-0769'}, {u'href': u'http://linux.oracle.com/cve/CVE-2013-0242.html', u'type': u'cve', u'id': u'CVE-2013-0242', u'title': u'CVE-2013-0242'}, {u'href': u'http://linux.oracle.com/cve/CVE-2013-1914.html', u'type': u'cve', u'id': u'CVE-2013-1914', u'title': u'CVE-2013-1914'}], u'_content_type_id': u'erratum', u'_id': u'7664e6de-e7fe-4fe8-b00c-655bd84e0d58', u'from': u'el-errata@oss.oracle.com', u'severity': u'Low', u'title': u' glibc security and bug fix update', u'_ns': u'units_erratum', u'rights': u'Copyright 2013 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 5', u'reboot_suggested': False, u'type': u'security', u'pkglist': [{u'packages': [{u'src': None, u'name': u'glibc', u'sum': [u'md5', u'd3d43447f4a160384cc98da4f510a167'], u'filename': u'glibc-2.5-107.el5_9.4.src.rpm', u'epoch': u'0', u'version': u'2.5', u'release': u'107.el5_9.4', u'arch': u'src'}, {u'src': None, u'name': u'glibc', u'sum': [u'md5', u'0df9d98656a5a4a46b33efe540903d39'], u'filename': u'glibc-2.5-107.el5_9.4.i686.rpm', u'epoch': u'0', u'version': u'2.5', u'release': u'107.el5_9.4', u'arch': u'i686'}, {u'src': None, u'name': u'glibc', u'sum': [u'md5', u'e7fd37c62f67d557d776a7589f4c1b72'], u'filename': u'glibc-2.5-107.el5_9.4.x86_64.rpm', u'epoch': u'0', u'version': u'2.5', u'release': u'107.el5_9.4', u'arch': u'x86_64'}, {u'src': None, u'name': u'glibc-common', u'sum': [u'md5', u'b1e2d1b9f7e513bc9a9f5f464464c20b'], u'filename': u'glibc-common-2.5-107.el5_9.4.x86_64.rpm', u'epoch': u'0', u'version': u'2.5', u'release': u'107.el5_9.4', u'arch': u'x86_64'}, {u'src': None, u'name': u'glibc-devel', u'sum': [u'md5', u'0ee817589ea1ff14fac2ba5d5f710abf'], u'filename': u'glibc-devel-2.5-107.el5_9.4.i386.rpm', u'epoch': u'0', u'version': u'2.5', u'release': u'107.el5_9.4', u'arch': u'i386'}, {u'src': None, u'name': u'glibc-devel', u'sum': [u'md5', u'f2db6b17b558ecadab92242112fa8be7'], u'filename': u'glibc-devel-2.5-107.el5_9.4.x86_64.rpm', u'epoch': u'0', u'version': u'2.5', u'release': u'107.el5_9.4', u'arch': u'x86_64'}, {u'src': None, u'name': u'glibc-headers', u'sum': [u'md5', u'eb557a98448a077e9586fcdea980fe63'], u'filename': u'glibc-headers-2.5-107.el5_9.4.x86_64.rpm', u'epoch': u'0', u'version': u'2.5', u'release': u'107.el5_9.4', u'arch': u'x86_64'}, {u'src': None, u'name': u'glibc-utils', u'sum': [u'md5', u'591ce303557158a86b8f06199f2bb4b6'], u'filename': u'glibc-utils-2.5-107.el5_9.4.x86_64.rpm', u'epoch': u'0', u'version': u'2.5', u'release': u'107.el5_9.4', u'arch': u'x86_64'}, {u'src': None, u'name': u'nscd', u'sum': [u'md5', u'bcc82c851693fda45280db5d2487a765'], u'filename': u'nscd-2.5-107.el5_9.4.x86_64.rpm', u'epoch': u'0', u'version': u'2.5', u'release': u'107.el5_9.4', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u'[1:1.6.0.0-1.61.1.11.11]\n- added and applied (temporally) patch10 fixToFontSecurityFix.patch.\n - fixing regression in fonts introduced by one security patch.\n- Resolves: rhbz#950386\n\n[1:1.6.0.0-1.60.1.11.11]\n- added and applied (temporally) one more patch to xalan/xerces privileges\n - patch9 jaxp-backport-factoryfinder.patch\n- will be upstreamed\n- Resolves: rhbz#950386\n\n[1:1.6.0.0-1.59.1.11.11]\n- Updated to icedtea6 1.11.11 - fixed xalan/xerxes privledges\n- removed patch 8 - removingOfAarch64.patch.patch - fixed upstream\n- Resolves: rhbz#950386\n\n[1:1.6.0.0-1.58.1.11.10]\n- Updated to icedtea6 1.11.10\n- rewritten java-1.6.0-openjdk-java-access-bridge-security.patch\n- excluded aarch64.patch\n - by patch 8 - removingOfAarch64.patch.patch\n- Resolves: rhbz#950386\n', u'issued': u'2013-04-24', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELSA-2013-0770.html', u'type': u'self', u'id': None, u'title': u'ELSA-2013-0770'}, {u'href': u'http://linux.oracle.com/cve/CVE-2013-0401.html', u'type': u'cve', u'id': u'CVE-2013-0401', u'title': u'CVE-2013-0401'}, {u'href': u'http://linux.oracle.com/cve/CVE-2013-1488.html', u'type': u'cve', u'id': u'CVE-2013-1488', u'title': u'CVE-2013-1488'}, {u'href': u'http://linux.oracle.com/cve/CVE-2013-1518.html', u'type': u'cve', u'id': u'CVE-2013-1518', u'title': u'CVE-2013-1518'}, {u'href': u'http://linux.oracle.com/cve/CVE-2013-1537.html', u'type': u'cve', u'id': u'CVE-2013-1537', u'title': u'CVE-2013-1537'}, {u'href': u'http://linux.oracle.com/cve/CVE-2013-1557.html', u'type': u'cve', u'id': u'CVE-2013-1557', u'title': u'CVE-2013-1557'}, {u'href': u'http://linux.oracle.com/cve/CVE-2013-1558.html', u'type': u'cve', u'id': u'CVE-2013-1558', u'title': u'CVE-2013-1558'}, {u'href': u'http://linux.oracle.com/cve/CVE-2013-1569.html', u'type': u'cve', u'id': u'CVE-2013-1569', u'title': u'CVE-2013-1569'}, {u'href': u'http://linux.oracle.com/cve/CVE-2013-2383.html', u'type': u'cve', u'id': u'CVE-2013-2383', u'title': u'CVE-2013-2383'}, {u'href': u'http://linux.oracle.com/cve/CVE-2013-2384.html', u'type': u'cve', u'id': u'CVE-2013-2384', u'title': u'CVE-2013-2384'}, {u'href': u'http://linux.oracle.com/cve/CVE-2013-2415.html', u'type': u'cve', u'id': u'CVE-2013-2415', u'title': u'CVE-2013-2415'}, {u'href': u'http://linux.oracle.com/cve/CVE-2013-2417.html', u'type': u'cve', u'id': u'CVE-2013-2417', u'title': u'CVE-2013-2417'}, {u'href': u'http://linux.oracle.com/cve/CVE-2013-2419.html', u'type': u'cve', u'id': u'CVE-2013-2419', u'title': u'CVE-2013-2419'}, {u'href': u'http://linux.oracle.com/cve/CVE-2013-2420.html', u'type': u'cve', u'id': u'CVE-2013-2420', u'title': u'CVE-2013-2420'}, {u'href': u'http://linux.oracle.com/cve/CVE-2013-2421.html', u'type': u'cve', u'id': u'CVE-2013-2421', u'title': u'CVE-2013-2421'}, {u'href': u'http://linux.oracle.com/cve/CVE-2013-2422.html', u'type': u'cve', u'id': u'CVE-2013-2422', u'title': u'CVE-2013-2422'}, {u'href': u'http://linux.oracle.com/cve/CVE-2013-2424.html', u'type': u'cve', u'id': u'CVE-2013-2424', u'title': u'CVE-2013-2424'}, {u'href': u'http://linux.oracle.com/cve/CVE-2013-2426.html', u'type': u'cve', u'id': u'CVE-2013-2426', u'title': u'CVE-2013-2426'}, {u'href': u'http://linux.oracle.com/cve/CVE-2013-2429.html', u'type': u'cve', u'id': u'CVE-2013-2429', u'title': u'CVE-2013-2429'}, {u'href': u'http://linux.oracle.com/cve/CVE-2013-2430.html', u'type': u'cve', u'id': u'CVE-2013-2430', u'title': u'CVE-2013-2430'}, {u'href': u'http://linux.oracle.com/cve/CVE-2013-2431.html', u'type': u'cve', u'id': u'CVE-2013-2431', u'title': u'CVE-2013-2431'}], u'_content_type_id': u'erratum', u'_id': u'215b26c0-88d9-4c4c-831f-f10afb6aa8b4', u'from': u'el-errata@oss.oracle.com', u'severity': u'Important', u'title': u' java-1.6.0-openjdk security update', u'_ns': u'units_erratum', u'rights': u'Copyright 2013 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 6', u'reboot_suggested': False, u'type': u'security', u'pkglist': [{u'packages': [{u'src': None, u'name': u'java-1.6.0-openjdk', u'sum': [u'md5', u'0ccdc4c8dd3cd0f04e165439d2f4968b'], u'filename': u'java-1.6.0-openjdk-1.6.0.0-1.61.1.11.11.el6_4.src.rpm', u'epoch': u'1', u'version': u'1.6.0.0', u'release': u'1.61.1.11.11.el6_4', u'arch': u'src'}, {u'src': None, u'name': u'java-1.6.0-openjdk', u'sum': [u'md5', u'6af2fd832b55d444096c9bb71c6ed5a5'], u'filename': u'java-1.6.0-openjdk-1.6.0.0-1.61.1.11.11.el6_4.x86_64.rpm', u'epoch': u'1', u'version': u'1.6.0.0', u'release': u'1.61.1.11.11.el6_4', u'arch': u'x86_64'}, {u'src': None, u'name': u'java-1.6.0-openjdk-demo', u'sum': [u'md5', u'd535d8618cbab15169ea43a0210a16af'], u'filename': u'java-1.6.0-openjdk-demo-1.6.0.0-1.61.1.11.11.el6_4.x86_64.rpm', u'epoch': u'1', u'version': u'1.6.0.0', u'release': u'1.61.1.11.11.el6_4', u'arch': u'x86_64'}, {u'src': None, u'name': u'java-1.6.0-openjdk-devel', u'sum': [u'md5', u'89b74e2632a72ef34462852e9c6c4b08'], u'filename': u'java-1.6.0-openjdk-devel-1.6.0.0-1.61.1.11.11.el6_4.x86_64.rpm', u'epoch': u'1', u'version': u'1.6.0.0', u'release': u'1.61.1.11.11.el6_4', u'arch': u'x86_64'}, {u'src': None, u'name': u'java-1.6.0-openjdk-javadoc', u'sum': [u'md5', u'7285c2383e73a7dfb8c840726bf5568a'], u'filename': u'java-1.6.0-openjdk-javadoc-1.6.0.0-1.61.1.11.11.el6_4.x86_64.rpm', u'epoch': u'1', u'version': u'1.6.0.0', u'release': u'1.61.1.11.11.el6_4', u'arch': u'x86_64'}, {u'src': None, u'name': u'java-1.6.0-openjdk-src', u'sum': [u'md5', u'b0a4ffc2b8568f61ffd7762b546fcef1'], u'filename': u'java-1.6.0-openjdk-src-1.6.0.0-1.61.1.11.11.el6_4.x86_64.rpm', u'epoch': u'1', u'version': u'1.6.0.0', u'release': u'1.61.1.11.11.el6_4', u'arch': u'x86_64'}], u'name': u'ol6_x86_64_latest', u'short': u'ol6_x86_64_latest'}, {u'packages': [{u'src': None, u'name': u'java-1.6.0-openjdk', u'sum': [u'md5', u'523909bbbcb4d95f23339c6a445f7f42'], u'filename': u'java-1.6.0-openjdk-1.6.0.0-1.40.1.11.11.0.1.el5_9.src.rpm', u'epoch': u'1', u'version': u'1.6.0.0', u'release': u'1.40.1.11.11.0.1.el5_9', u'arch': u'src'}, {u'src': None, u'name': u'java-1.6.0-openjdk', u'sum': [u'md5', u'5f8b9501e72e951ffcd342fcc1519fe0'], u'filename': u'java-1.6.0-openjdk-1.6.0.0-1.40.1.11.11.0.1.el5_9.x86_64.rpm', u'epoch': u'1', u'version': u'1.6.0.0', u'release': u'1.40.1.11.11.0.1.el5_9', u'arch': u'x86_64'}, {u'src': None, u'name': u'java-1.6.0-openjdk-demo', u'sum': [u'md5', u'1264edd293c1c17b08b10b4fb6045f40'], u'filename': u'java-1.6.0-openjdk-demo-1.6.0.0-1.40.1.11.11.0.1.el5_9.x86_64.rpm', u'epoch': u'1', u'version': u'1.6.0.0', u'release': u'1.40.1.11.11.0.1.el5_9', u'arch': u'x86_64'}, {u'src': None, u'name': u'java-1.6.0-openjdk-devel', u'sum': [u'md5', u'8cad8a8024e68039b6e86242831b70c2'], u'filename': u'java-1.6.0-openjdk-devel-1.6.0.0-1.40.1.11.11.0.1.el5_9.x86_64.rpm', u'epoch': u'1', u'version': u'1.6.0.0', u'release': u'1.40.1.11.11.0.1.el5_9', u'arch': u'x86_64'}, {u'src': None, u'name': u'java-1.6.0-openjdk-javadoc', u'sum': [u'md5', u'336516dbe9253565518cbb0ef01ed6ca'], u'filename': u'java-1.6.0-openjdk-javadoc-1.6.0.0-1.40.1.11.11.0.1.el5_9.x86_64.rpm', u'epoch': u'1', u'version': u'1.6.0.0', u'release': u'1.40.1.11.11.0.1.el5_9', u'arch': u'x86_64'}, {u'src': None, u'name': u'java-1.6.0-openjdk-src', u'sum': [u'md5', u'80620975488d824d7569826a82e760c5'], u'filename': u'java-1.6.0-openjdk-src-1.6.0.0-1.40.1.11.11.0.1.el5_9.x86_64.rpm', u'epoch': u'1', u'version': u'1.6.0.0', u'release': u'1.40.1.11.11.0.1.el5_9', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u'[7.19.7-36]\n- fix cookie tailmatching to prevent cross-domain leakage (CVE-2013-1944)', u'issued': u'2013-04-24', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELSA-2013-0771.html', u'type': u'self', u'id': None, u'title': u'ELSA-2013-0771'}, {u'href': u'http://linux.oracle.com/cve/CVE-2013-1944.html', u'type': u'cve', u'id': u'CVE-2013-1944', u'title': u'CVE-2013-1944'}], u'_content_type_id': u'erratum', u'_id': u'363cc284-b088-4fdf-a9c5-5f8c9a6c1b09', u'from': u'el-errata@oss.oracle.com', u'severity': u'Moderate', u'title': u' curl security update', u'_ns': u'units_erratum', u'rights': u'Copyright 2013 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 6', u'reboot_suggested': False, u'type': u'security', u'pkglist': [{u'packages': [{u'src': None, u'name': u'curl', u'sum': [u'md5', u'f42013f267dee545dd568294747843be'], u'filename': u'curl-7.19.7-36.el6_4.src.rpm', u'epoch': u'0', u'version': u'7.19.7', u'release': u'36.el6_4', u'arch': u'src'}, {u'src': None, u'name': u'curl', u'sum': [u'md5', u'bab105499f0fb1476f9d851a2208a9fb'], u'filename': u'curl-7.19.7-36.el6_4.x86_64.rpm', u'epoch': u'0', u'version': u'7.19.7', u'release': u'36.el6_4', u'arch': u'x86_64'}, {u'src': None, u'name': u'libcurl', u'sum': [u'md5', u'28e549f5f894a8570a7003041dd37fa8'], u'filename': u'libcurl-7.19.7-36.el6_4.i686.rpm', u'epoch': u'0', u'version': u'7.19.7', u'release': u'36.el6_4', u'arch': u'i686'}, {u'src': None, u'name': u'libcurl', u'sum': [u'md5', u'76fac1cb19a5f7f76fe6cf208d9066f7'], u'filename': u'libcurl-7.19.7-36.el6_4.x86_64.rpm', u'epoch': u'0', u'version': u'7.19.7', u'release': u'36.el6_4', u'arch': u'x86_64'}, {u'src': None, u'name': u'libcurl-devel', u'sum': [u'md5', u'fea3b6997eec517126755d85e829d2eb'], u'filename': u'libcurl-devel-7.19.7-36.el6_4.i686.rpm', u'epoch': u'0', u'version': u'7.19.7', u'release': u'36.el6_4', u'arch': u'i686'}, {u'src': None, u'name': u'libcurl-devel', u'sum': [u'md5', u'b1beeff330fb69ef9103d34670100e4a'], u'filename': u'libcurl-devel-7.19.7-36.el6_4.x86_64.rpm', u'epoch': u'0', u'version': u'7.19.7', u'release': u'36.el6_4', u'arch': u'x86_64'}], u'name': u'ol6_x86_64_latest', u'short': u'ol6_x86_64_latest'}, {u'packages': [{u'src': None, u'name': u'curl', u'sum': [u'md5', u'25fbe299a74cb25ef5c79fb9b606898c'], u'filename': u'curl-7.15.5-16.el5_9.i386.rpm', u'epoch': u'0', u'version': u'7.15.5', u'release': u'16.el5_9', u'arch': u'i386'}, {u'src': None, u'name': u'curl', u'sum': [u'md5', u'6a36cf301b4e49014eb1923da0a50fad'], u'filename': u'curl-7.15.5-16.el5_9.src.rpm', u'epoch': u'0', u'version': u'7.15.5', u'release': u'16.el5_9', u'arch': u'src'}, {u'src': None, u'name': u'curl', u'sum': [u'md5', u'c525669e5f06a9ccf7bf88ad8153132e'], u'filename': u'curl-7.15.5-16.el5_9.x86_64.rpm', u'epoch': u'0', u'version': u'7.15.5', u'release': u'16.el5_9', u'arch': u'x86_64'}, {u'src': None, u'name': u'curl-devel', u'sum': [u'md5', u'1c8edd8e1a12afd7e07bcbba52760a87'], u'filename': u'curl-devel-7.15.5-16.el5_9.i386.rpm', u'epoch': u'0', u'version': u'7.15.5', u'release': u'16.el5_9', u'arch': u'i386'}, {u'src': None, u'name': u'curl-devel', u'sum': [u'md5', u'91e05896748d8d5cee287be5a7a28f49'], u'filename': u'curl-devel-7.15.5-16.el5_9.x86_64.rpm', u'epoch': u'0', u'version': u'7.15.5', u'release': u'16.el5_9', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u'[0-0.7.0.1.el5_9.3]\n- Add support for oracle os\n\n[0-0.7.3]\n- Fix for one more file descriptor leak (rhbz#953502)\n\n[0-0.7.2]\n- Validate Netlink source address (CVE-2012-5532) (rhbz#953560)\n\n[0-0.7.1]\n- Fix for file descriptor leak (rhbz#953502)', u'issued': u'2013-05-09', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELSA-2013-0807.html', u'type': u'self', u'id': None, u'title': u'ELSA-2013-0807'}, {u'href': u'http://linux.oracle.com/cve/CVE-2012-5532.html', u'type': u'cve', u'id': u'CVE-2012-5532', u'title': u'CVE-2012-5532'}], u'_content_type_id': u'erratum', u'_id': u'c8743cac-3dfa-4b4d-80f6-8d2a833b9937', u'from': u'el-errata@oss.oracle.com', u'severity': u'Low', u'title': u' hypervkvpd security and bug fix update', u'_ns': u'units_erratum', u'rights': u'Copyright 2013 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 5', u'reboot_suggested': False, u'type': u'security', u'pkglist': [{u'packages': [{u'src': None, u'name': u'hypervkvpd', u'sum': [u'md5', u'f31cb97cf1b1f3e6d771d4312bf73718'], u'filename': u'hypervkvpd-0-0.7.0.1.el5_9.3.src.rpm', u'epoch': u'0', u'version': u'0', u'release': u'0.7.0.1.el5_9.3', u'arch': u'src'}, {u'src': None, u'name': u'hypervkvpd', u'sum': [u'md5', u'b90cc33866f0c82438b6f0a1d265a7b6'], u'filename': u'hypervkvpd-0-0.7.0.1.el5_9.3.x86_64.rpm', u'epoch': u'0', u'version': u'0', u'release': u'0.7.0.1.el5_9.3', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u"[2.2.15-28.0.1.el6_4]\n- replace index.html with Oracle's index page oracle_index.html\n update vstring in specfile\n\n[2.2.15-28]\n- mod_rewrite: add security fix for CVE-2013-1862 (#953729)\n\n[2.2.15-27]\n- add security fixes for CVE-2012-3499, CVE-2012-4558 (#915883, #915884)", u'issued': u'2013-05-13', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELSA-2013-0815.html', u'type': u'self', u'id': None, u'title': u'ELSA-2013-0815'}, {u'href': u'http://linux.oracle.com/cve/CVE-2012-3499.html', u'type': u'cve', u'id': u'CVE-2012-3499', u'title': u'CVE-2012-3499'}, {u'href': u'http://linux.oracle.com/cve/CVE-2012-4558.html', u'type': u'cve', u'id': u'CVE-2012-4558', u'title': u'CVE-2012-4558'}, {u'href': u'http://linux.oracle.com/cve/CVE-2013-1862.html', u'type': u'cve', u'id': u'CVE-2013-1862', u'title': u'CVE-2013-1862'}], u'_content_type_id': u'erratum', u'_id': u'6bab282c-86cc-4924-a8d0-9dddd1ec4565', u'from': u'el-errata@oss.oracle.com', u'severity': u'Moderate', u'title': u' httpd security update', u'_ns': u'units_erratum', u'rights': u'Copyright 2013 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 6', u'reboot_suggested': False, u'type': u'security', u'pkglist': [{u'packages': [{u'src': None, u'name': u'httpd', u'sum': [u'md5', u'edb0bc8bf34a7f19d6230a8edb2ce2ee'], u'filename': u'httpd-2.2.15-28.0.1.el6_4.src.rpm', u'epoch': u'0', u'version': u'2.2.15', u'release': u'28.0.1.el6_4', u'arch': u'src'}, {u'src': None, u'name': u'httpd', u'sum': [u'md5', u'e4e3b28a90e4cd51be4318d764df368d'], u'filename': u'httpd-2.2.15-28.0.1.el6_4.x86_64.rpm', u'epoch': u'0', u'version': u'2.2.15', u'release': u'28.0.1.el6_4', u'arch': u'x86_64'}, {u'src': None, u'name': u'httpd-devel', u'sum': [u'md5', u'7c0e936fc65cf7b854419636723ffa25'], u'filename': u'httpd-devel-2.2.15-28.0.1.el6_4.i686.rpm', u'epoch': u'0', u'version': u'2.2.15', u'release': u'28.0.1.el6_4', u'arch': u'i686'}, {u'src': None, u'name': u'httpd-devel', u'sum': [u'md5', u'47cab4a8dc88003fa881ee70be4844e8'], u'filename': u'httpd-devel-2.2.15-28.0.1.el6_4.x86_64.rpm', u'epoch': u'0', u'version': u'2.2.15', u'release': u'28.0.1.el6_4', u'arch': u'x86_64'}, {u'src': None, u'name': u'httpd-manual', u'sum': [u'md5', u'af510a1280ab81ed4a996d558599d5df'], u'filename': u'httpd-manual-2.2.15-28.0.1.el6_4.noarch.rpm', u'epoch': u'0', u'version': u'2.2.15', u'release': u'28.0.1.el6_4', u'arch': u'noarch'}, {u'src': None, u'name': u'httpd-tools', u'sum': [u'md5', u'046f8b689a0d4dab72f237705d970e44'], u'filename': u'httpd-tools-2.2.15-28.0.1.el6_4.x86_64.rpm', u'epoch': u'0', u'version': u'2.2.15', u'release': u'28.0.1.el6_4', u'arch': u'x86_64'}, {u'src': None, u'name': u'mod_ssl', u'sum': [u'md5', u'47c927d5e1490c93dd56e23ce6b354c7'], u'filename': u'mod_ssl-2.2.15-28.0.1.el6_4.x86_64.rpm', u'epoch': u'1', u'version': u'2.2.15', u'release': u'28.0.1.el6_4', u'arch': u'x86_64'}], u'name': u'ol6_x86_64_latest', u'short': u'ol6_x86_64_latest'}, {u'packages': [{u'src': None, u'name': u'httpd', u'sum': [u'md5', u'f945c37dbf9b549b00a22aba5a117708'], u'filename': u'httpd-2.2.3-78.0.1.el5_9.src.rpm', u'epoch': u'0', u'version': u'2.2.3', u'release': u'78.0.1.el5_9', u'arch': u'src'}, {u'src': None, u'name': u'httpd', u'sum': [u'md5', u'0601b63f04d4733be2d3a4a3241a03fd'], u'filename': u'httpd-2.2.3-78.0.1.el5_9.x86_64.rpm', u'epoch': u'0', u'version': u'2.2.3', u'release': u'78.0.1.el5_9', u'arch': u'x86_64'}, {u'src': None, u'name': u'httpd-devel', u'sum': [u'md5', u'46aa0665061a38ac2205676514e22b6a'], u'filename': u'httpd-devel-2.2.3-78.0.1.el5_9.i386.rpm', u'epoch': u'0', u'version': u'2.2.3', u'release': u'78.0.1.el5_9', u'arch': u'i386'}, {u'src': None, u'name': u'httpd-devel', u'sum': [u'md5', u'5d38fff330546760c208470387730968'], u'filename': u'httpd-devel-2.2.3-78.0.1.el5_9.x86_64.rpm', u'epoch': u'0', u'version': u'2.2.3', u'release': u'78.0.1.el5_9', u'arch': u'x86_64'}, {u'src': None, u'name': u'httpd-manual', u'sum': [u'md5', u'45a61affb5e0f8c729ca0e131ed50a2d'], u'filename': u'httpd-manual-2.2.3-78.0.1.el5_9.x86_64.rpm', u'epoch': u'0', u'version': u'2.2.3', u'release': u'78.0.1.el5_9', u'arch': u'x86_64'}, {u'src': None, u'name': u'mod_ssl', u'sum': [u'md5', u'8a2c7e4691a9873f229b47df0692077f'], u'filename': u'mod_ssl-2.2.3-78.0.1.el5_9.x86_64.rpm', u'epoch': u'1', u'version': u'2.2.3', u'release': u'78.0.1.el5_9', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u'firefox\n[17.0.6-1.0.1.el6_4]\n- Add firefox-oracle-default-prefs.js and remove the corresponding Red Hat ones\n\n[17.0.6-1]\n- Update to 17.0.6 ESR\n\n[17.0.5-2]\n- Updated XulRunner check\n\nxulrunner\n[17.0.6-2.0.1.el6_4]\n- Replaced xulrunner-redhat-default-prefs.js with xulrunner-oracle-default-prefs.js\n- Removed XULRUNNER_VERSION from SOURCE21\n\n[17.0.6-2]\n- Update to 17.0.6 ESR\n\n[17.0.5-2]\n- Updated nss and nspr versions', u'issued': u'2013-05-14', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELSA-2013-0820.html', u'type': u'self', u'id': None, u'title': u'ELSA-2013-0820'}, {u'href': u'http://linux.oracle.com/cve/CVE-2013-0801.html', u'type': u'cve', u'id': u'CVE-2013-0801', u'title': u'CVE-2013-0801'}, {u'href': u'http://linux.oracle.com/cve/CVE-2013-1670.html', u'type': u'cve', u'id': u'CVE-2013-1670', u'title': u'CVE-2013-1670'}, {u'href': u'http://linux.oracle.com/cve/CVE-2013-1674.html', u'type': u'cve', u'id': u'CVE-2013-1674', u'title': u'CVE-2013-1674'}, {u'href': u'http://linux.oracle.com/cve/CVE-2013-1675.html', u'type': u'cve', u'id': u'CVE-2013-1675', u'title': u'CVE-2013-1675'}, {u'href': u'http://linux.oracle.com/cve/CVE-2013-1676.html', u'type': u'cve', u'id': u'CVE-2013-1676', u'title': u'CVE-2013-1676'}, {u'href': u'http://linux.oracle.com/cve/CVE-2013-1677.html', u'type': u'cve', u'id': u'CVE-2013-1677', u'title': u'CVE-2013-1677'}, {u'href': u'http://linux.oracle.com/cve/CVE-2013-1678.html', u'type': u'cve', u'id': u'CVE-2013-1678', u'title': u'CVE-2013-1678'}, {u'href': u'http://linux.oracle.com/cve/CVE-2013-1679.html', u'type': u'cve', u'id': u'CVE-2013-1679', u'title': u'CVE-2013-1679'}, {u'href': u'http://linux.oracle.com/cve/CVE-2013-1680.html', u'type': u'cve', u'id': u'CVE-2013-1680', u'title': u'CVE-2013-1680'}, {u'href': u'http://linux.oracle.com/cve/CVE-2013-1681.html', u'type': u'cve', u'id': u'CVE-2013-1681', u'title': u'CVE-2013-1681'}], u'_content_type_id': u'erratum', u'_id': u'5fc01996-e8f9-413e-b8b3-2fdabff37714', u'from': u'el-errata@oss.oracle.com', u'severity': u'Critical', u'title': u' firefox security update', u'_ns': u'units_erratum', u'rights': u'Copyright 2013 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 6', u'reboot_suggested': False, u'type': u'security', u'pkglist': [{u'packages': [{u'src': None, u'name': u'firefox', u'sum': [u'md5', u'ea1a0b7822b7e66e89e527fbadc6ff13'], u'filename': u'firefox-17.0.6-1.0.1.el6_4.i686.rpm', u'epoch': u'0', u'version': u'17.0.6', u'release': u'1.0.1.el6_4', u'arch': u'i686'}, {u'src': None, u'name': u'firefox', u'sum': [u'md5', u'338572b18ba4aee6aed37166737839d4'], u'filename': u'firefox-17.0.6-1.0.1.el6_4.src.rpm', u'epoch': u'0', u'version': u'17.0.6', u'release': u'1.0.1.el6_4', u'arch': u'src'}, {u'src': None, u'name': u'firefox', u'sum': [u'md5', u'b77c65b96e1b4687edaa4dbafb80e5f5'], u'filename': u'firefox-17.0.6-1.0.1.el6_4.x86_64.rpm', u'epoch': u'0', u'version': u'17.0.6', u'release': u'1.0.1.el6_4', u'arch': u'x86_64'}, {u'src': None, u'name': u'xulrunner', u'sum': [u'md5', u'a8a3a2e07b3da58e31ee8924a834ae01'], u'filename': u'xulrunner-17.0.6-2.0.1.el6_4.i686.rpm', u'epoch': u'0', u'version': u'17.0.6', u'release': u'2.0.1.el6_4', u'arch': u'i686'}, {u'src': None, u'name': u'xulrunner', u'sum': [u'md5', u'6cdace66403b081badefba5a355c87e6'], u'filename': u'xulrunner-17.0.6-2.0.1.el6_4.src.rpm', u'epoch': u'0', u'version': u'17.0.6', u'release': u'2.0.1.el6_4', u'arch': u'src'}, {u'src': None, u'name': u'xulrunner', u'sum': [u'md5', u'0552133e684fdad5cf254afe48a852ec'], u'filename': u'xulrunner-17.0.6-2.0.1.el6_4.x86_64.rpm', u'epoch': u'0', u'version': u'17.0.6', u'release': u'2.0.1.el6_4', u'arch': u'x86_64'}, {u'src': None, u'name': u'xulrunner-devel', u'sum': [u'md5', u'd2eda798d36e8e7f975cfe225ac092d0'], u'filename': u'xulrunner-devel-17.0.6-2.0.1.el6_4.i686.rpm', u'epoch': u'0', u'version': u'17.0.6', u'release': u'2.0.1.el6_4', u'arch': u'i686'}, {u'src': None, u'name': u'xulrunner-devel', u'sum': [u'md5', u'f81d60a7ba42ce3888a39fed2f884dbf'], u'filename': u'xulrunner-devel-17.0.6-2.0.1.el6_4.x86_64.rpm', u'epoch': u'0', u'version': u'17.0.6', u'release': u'2.0.1.el6_4', u'arch': u'x86_64'}], u'name': u'ol6_x86_64_latest', u'short': u'ol6_x86_64_latest'}, {u'packages': [{u'src': None, u'name': u'firefox', u'sum': [u'md5', u'5d9f99b3947c0ac23c19c1944925836d'], u'filename': u'firefox-17.0.6-1.0.1.el5_9.i386.rpm', u'epoch': u'0', u'version': u'17.0.6', u'release': u'1.0.1.el5_9', u'arch': u'i386'}, {u'src': None, u'name': u'firefox', u'sum': [u'md5', u'4b9a957a7631d6bd03545d4d4820dd37'], u'filename': u'firefox-17.0.6-1.0.1.el5_9.src.rpm', u'epoch': u'0', u'version': u'17.0.6', u'release': u'1.0.1.el5_9', u'arch': u'src'}, {u'src': None, u'name': u'firefox', u'sum': [u'md5', u'db69217f3a952ff085140b201778be4e'], u'filename': u'firefox-17.0.6-1.0.1.el5_9.x86_64.rpm', u'epoch': u'0', u'version': u'17.0.6', u'release': u'1.0.1.el5_9', u'arch': u'x86_64'}, {u'src': None, u'name': u'xulrunner', u'sum': [u'md5', u'99c6ae0e33944ab2f3ee74f770f67f94'], u'filename': u'xulrunner-17.0.6-1.0.1.el5_9.i386.rpm', u'epoch': u'0', u'version': u'17.0.6', u'release': u'1.0.1.el5_9', u'arch': u'i386'}, {u'src': None, u'name': u'xulrunner', u'sum': [u'md5', u'1c6f04ff42585a22cb8668f655a499d3'], u'filename': u'xulrunner-17.0.6-1.0.1.el5_9.src.rpm', u'epoch': u'0', u'version': u'17.0.6', u'release': u'1.0.1.el5_9', u'arch': u'src'}, {u'src': None, u'name': u'xulrunner', u'sum': [u'md5', u'd7fe5e036a371fda4b63d8293d167fa2'], u'filename': u'xulrunner-17.0.6-1.0.1.el5_9.x86_64.rpm', u'epoch': u'0', u'version': u'17.0.6', u'release': u'1.0.1.el5_9', u'arch': u'x86_64'}, {u'src': None, u'name': u'xulrunner-devel', u'sum': [u'md5', u'a80a013dafeb69ea38f81f4b897a63dc'], u'filename': u'xulrunner-devel-17.0.6-1.0.1.el5_9.i386.rpm', u'epoch': u'0', u'version': u'17.0.6', u'release': u'1.0.1.el5_9', u'arch': u'i386'}, {u'src': None, u'name': u'xulrunner-devel', u'sum': [u'md5', u'94d1a363235008267dbd016d196ab7ea'], u'filename': u'xulrunner-devel-17.0.6-1.0.1.el5_9.x86_64.rpm', u'epoch': u'0', u'version': u'17.0.6', u'release': u'1.0.1.el5_9', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u'[2.6.32-20]\nResolves: #960234 - CVE-2013-2053', u'issued': u'2013-05-15', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELSA-2013-0827.html', u'type': u'self', u'id': None, u'title': u'ELSA-2013-0827'}, {u'href': u'http://linux.oracle.com/cve/CVE-2013-2053.html', u'type': u'cve', u'id': u'CVE-2013-2053', u'title': u'CVE-2013-2053'}], u'_content_type_id': u'erratum', u'_id': u'559e089c-114c-4524-98ad-0e216865dc27', u'from': u'el-errata@oss.oracle.com', u'severity': u'Important', u'title': u' openswan security update', u'_ns': u'units_erratum', u'rights': u'Copyright 2013 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 6', u'reboot_suggested': False, u'type': u'security', u'pkglist': [{u'packages': [{u'src': None, u'name': u'openswan', u'sum': [u'md5', u'0945f5bf168ea5703920aaebeae58ac7'], u'filename': u'openswan-2.6.32-20.el6_4.src.rpm', u'epoch': u'0', u'version': u'2.6.32', u'release': u'20.el6_4', u'arch': u'src'}, {u'src': None, u'name': u'openswan', u'sum': [u'md5', u'd67eab5a256d882666a5d9b5e17a8533'], u'filename': u'openswan-2.6.32-20.el6_4.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.32', u'release': u'20.el6_4', u'arch': u'x86_64'}, {u'src': None, u'name': u'openswan-doc', u'sum': [u'md5', u'90159e56fc34c9e72c5a27f1c4a0ef47'], u'filename': u'openswan-doc-2.6.32-20.el6_4.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.32', u'release': u'20.el6_4', u'arch': u'x86_64'}], u'name': u'ol6_x86_64_latest', u'short': u'ol6_x86_64_latest'}, {u'packages': [{u'src': None, u'name': u'openswan', u'sum': [u'md5', u'9b9a8ddbd8117e1647a7ecac8d7c2a76'], u'filename': u'openswan-2.6.32-5.el5_9.src.rpm', u'epoch': u'0', u'version': u'2.6.32', u'release': u'5.el5_9', u'arch': u'src'}, {u'src': None, u'name': u'openswan', u'sum': [u'md5', u'256c734fc836ada15de3344e84ab92d5'], u'filename': u'openswan-2.6.32-5.el5_9.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.32', u'release': u'5.el5_9', u'arch': u'x86_64'}, {u'src': None, u'name': u'openswan-doc', u'sum': [u'md5', u'38f1c2aa3c604f46d60837f730a8c089'], u'filename': u'openswan-doc-2.6.32-5.el5_9.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.32', u'release': u'5.el5_9', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u"kernel\n[2.6.18-348.6.1]\n- [char] ipmi: use a tasklet for handling received messages (Tony Camuso) [953435 947732]\n- [char] ipmi: do run_to_completion properly in deliver_recv_msg (Tony Camuso) [953435 947732]\n- [fs] nfs4: fix locking around cl_state_owners list (Dave Wysochanski) [954296 948317]\n- [fs] nfs: Fix bugs on short read (Sachin Prabhu) [952098 924011]\n- [xen] AMD IOMMU: spot missing IO-APIC entries in IVRS table (Igor Mammedov) [910912 910913] {CVE-2013-0153}\n- [xen] AMD, IOMMU: Make per-device interrupt remap table default (Igor Mammedov) [910912 910913] {CVE-2013-0153}\n- [xen] AMD, IOMMU: Disable IOMMU if SATA Combined mode is on (Igor Mammedov) [910912 910913] {CVE-2013-0153}\n- [xen] AMD, IOMMU: On creating entry clean up in remapping tables (Igor Mammedov) [910912 910913] {CVE-2013-0153}\n- [xen] ACPI: acpi_table_parse() should return handler's err code (Igor Mammedov) [910912 910913] {CVE-2013-0153}\n- [xen] introduce xzalloc() & Co (Igor Mammedov) [910912 910913] {CVE-2013-0153}\n- [x86] fpu: fix CONFIG_PREEMPT=y corruption of FPU stack (Prarit Bhargava) [948187 731531]\n- [i386] add sleazy FPU optimization (Prarit Bhargava) [948187 731531]\n- [x86-64] non lazy 'sleazy' fpu implementation (Prarit Bhargava) [948187 731531]\n\n[2.6.18-348.5.1]\n- [fs] nfs: handle getattr failure during nfsv4 open (David Jeffery) [947736 906909]", u'issued': u'2013-05-21', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELSA-2013-0847.html', u'type': u'self', u'id': None, u'title': u'ELSA-2013-0847'}, {u'href': u'http://linux.oracle.com/cve/CVE-2013-0153.html', u'type': u'cve', u'id': u'CVE-2013-0153', u'title': u'CVE-2013-0153'}], u'_content_type_id': u'erratum', u'_id': u'd5ab938b-3d88-449c-b377-4e970b95b824', u'from': u'el-errata@oss.oracle.com', u'severity': u'Moderate', u'title': u' kernel security and bug fix update', u'_ns': u'units_erratum', u'rights': u'Copyright 2013 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 5', u'reboot_suggested': False, u'type': u'security', u'pkglist': [{u'packages': [{u'src': None, u'name': u'kernel', u'sum': [u'md5', u'df370a17e30227d1625507293ed5a45b'], u'filename': u'kernel-2.6.18-348.6.1.el5.src.rpm', u'epoch': u'0', u'version': u'2.6.18', u'release': u'348.6.1.el5', u'arch': u'src'}, {u'src': None, u'name': u'kernel', u'sum': [u'md5', u'3d2047173f22f807223c6c9ced70de37'], u'filename': u'kernel-2.6.18-348.6.1.el5.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.18', u'release': u'348.6.1.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'kernel-debug', u'sum': [u'md5', u'8dc7facad2c8795d6508a8b051e5f7a4'], u'filename': u'kernel-debug-2.6.18-348.6.1.el5.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.18', u'release': u'348.6.1.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'kernel-debug-devel', u'sum': [u'md5', u'beaf7a575e98422b8ca837662486d9bb'], u'filename': u'kernel-debug-devel-2.6.18-348.6.1.el5.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.18', u'release': u'348.6.1.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'kernel-devel', u'sum': [u'md5', u'cc7c8550f6a6f2c1175b2ce28e758e64'], u'filename': u'kernel-devel-2.6.18-348.6.1.el5.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.18', u'release': u'348.6.1.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'kernel-doc', u'sum': [u'md5', u'dc48679a77f3e85157032c0a3d446adf'], u'filename': u'kernel-doc-2.6.18-348.6.1.el5.noarch.rpm', u'epoch': u'0', u'version': u'2.6.18', u'release': u'348.6.1.el5', u'arch': u'noarch'}, {u'src': None, u'name': u'kernel-headers', u'sum': [u'md5', u'3777c646b42440d9b2a3f23d68be3943'], u'filename': u'kernel-headers-2.6.18-348.6.1.el5.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.18', u'release': u'348.6.1.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'kernel-xen', u'sum': [u'md5', u'4a57393f19f424f1972fb8c283d4af3e'], u'filename': u'kernel-xen-2.6.18-348.6.1.el5.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.18', u'release': u'348.6.1.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'kernel-xen-devel', u'sum': [u'md5', u'36540f4b570aefc507316d7aca6f8a37'], u'filename': u'kernel-xen-devel-2.6.18-348.6.1.el5.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.18', u'release': u'348.6.1.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'ocfs2-2.6.18-348.6.1.el5', u'sum': [u'md5', u'6e7520414d1b241a71498d064861636b'], u'filename': u'ocfs2-2.6.18-348.6.1.el5-1.4.10-1.el5.src.rpm', u'epoch': u'0', u'version': u'1.4.10', u'release': u'1.el5', u'arch': u'src'}, {u'src': None, u'name': u'ocfs2-2.6.18-348.6.1.el5', u'sum': [u'md5', u'8eded0d4e0ea98ffbcbd8201d369cd97'], u'filename': u'ocfs2-2.6.18-348.6.1.el5-1.4.10-1.el5.x86_64.rpm', u'epoch': u'0', u'version': u'1.4.10', u'release': u'1.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'ocfs2-2.6.18-348.6.1.el5debug', u'sum': [u'md5', u'644f2493f1aaaf2546a697afa47a39eb'], u'filename': u'ocfs2-2.6.18-348.6.1.el5debug-1.4.10-1.el5.x86_64.rpm', u'epoch': u'0', u'version': u'1.4.10', u'release': u'1.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'ocfs2-2.6.18-348.6.1.el5xen', u'sum': [u'md5', u'e87eb1411d03adba5db3a9ccd9535cbf'], u'filename': u'ocfs2-2.6.18-348.6.1.el5xen-1.4.10-1.el5.x86_64.rpm', u'epoch': u'0', u'version': u'1.4.10', u'release': u'1.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'oracleasm-2.6.18-348.6.1.el5', u'sum': [u'md5', u'34cdecf78bbf9eecaf739ff24b644e69'], u'filename': u'oracleasm-2.6.18-348.6.1.el5-2.0.5-1.el5.src.rpm', u'epoch': u'0', u'version': u'2.0.5', u'release': u'1.el5', u'arch': u'src'}, {u'src': None, u'name': u'oracleasm-2.6.18-348.6.1.el5', u'sum': [u'md5', u'f505d2c69e06fd5cf1af5f7ed5cae600'], u'filename': u'oracleasm-2.6.18-348.6.1.el5-2.0.5-1.el5.x86_64.rpm', u'epoch': u'0', u'version': u'2.0.5', u'release': u'1.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'oracleasm-2.6.18-348.6.1.el5debug', u'sum': [u'md5', u'f62535cb001ae7c985b52caf408b4595'], u'filename': u'oracleasm-2.6.18-348.6.1.el5debug-2.0.5-1.el5.x86_64.rpm', u'epoch': u'0', u'version': u'2.0.5', u'release': u'1.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'oracleasm-2.6.18-348.6.1.el5xen', u'sum': [u'md5', u'aadcd34fbe67c507fe7df53b5c1f37f2'], u'filename': u'oracleasm-2.6.18-348.6.1.el5xen-2.0.5-1.el5.x86_64.rpm', u'epoch': u'0', u'version': u'2.0.5', u'release': u'1.el5', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u"kernel\n[2.6.18-348.6.1.0.1]\n- [oprofile] x86, mm: Add __get_user_pages_fast() [orabug 14277030]\n- [oprofile] export __get_user_pages_fast() function [orabug 14277030]\n- [oprofile] oprofile, x86: Fix nmi-unsafe callgraph support [orabug 14277030]\n- [oprofile] oprofile: use KM_NMI slot for kmap_atomic [orabug 14277030]\n- [oprofile] oprofile: i386 add get_user_pages_fast support [orabug 14277030]\n- [kernel] Initialize the local uninitialized variable stats. [orabug 14051367]\n- [fs] JBD:make jbd support 512B blocks correctly for ocfs2. [orabug 13477763]\n- [x86 ] fix fpu context corrupt when preempt in signal context [orabug 14038272]\n- [mm] fix hugetlb page leak (Dave McCracken) [orabug 12375075]\n- fix ia64 build error due to add-support-above-32-vcpus.patch(Zhenzhong Duan)\n- [x86] use dynamic vcpu_info remap to support more than 32 vcpus (Zhenzhong Duan)\n- [x86] Fix lvt0 reset when hvm boot up with noapic param\n- [scsi] remove printk's when doing I/O to a dead device (John Sobecki, Chris Mason)\n [orabug 12342275]\n- [char] ipmi: Fix IPMI errors due to timing problems (Joe Jin) [orabug 12561346]\n- [scsi] Fix race when removing SCSI devices (Joe Jin) [orabug 12404566]\n- [net] net: Redo the broken redhat netconsole over bonding (Tina Yang) [orabug 12740042]\n- [fs] nfs: Fix __put_nfs_open_context() NULL pointer panic (Joe Jin) [orabug 12687646]\n- fix filp_close() race (Joe Jin) [orabug 10335998]\n- make xenkbd.abs_pointer=1 by default [orabug 67188919]\n- [xen] check to see if hypervisor supports memory reservation change\n (Chuck Anderson) [orabug 7556514]\n- [net] Enable entropy for bnx2,bnx2x,e1000e,igb,ixgb,ixgbe,ixgbevf (John Sobecki)\n [orabug 10315433]\n- [NET] Add xen pv netconsole support (Tina Yang) [orabug 6993043] [bz 7258]\n- [mm] Patch shrink_zone to yield during severe mempressure events, avoiding\n hangs and evictions (John Sobecki,Chris Mason) [orabug 6086839]\n- [mm] Enhance shrink_zone patch allow full swap utilization, and also be\n NUMA-aware (John Sobecki,Chris Mason,Herbert van den Bergh) [orabug 9245919]\n- fix aacraid not to reset during kexec (Joe Jin) [orabug 8516042]\n- [xen] PVHVM guest with PoD crashes under memory pressure (Chuck Anderson)\n [orabug 9107465]\n- [xen] PV guest with FC HBA hangs during shutdown (Chuck Anderson)\n [orabug 9764220]\n- Support 256GB+ memory for pv guest (Mukesh Rathor) [orabug 9450615]\n- fix overcommit memory to use percpu_counter for (KOSAKI Motohiro,\n Guru Anbalagane) [orabug 6124033]\n- [ipmi] make configurable timeouts for kcs of ipmi [orabug 9752208]\n- [ib] fix memory corruption (Andy Grover) [orabug 9972346]\n- [usb] USB: fix __must_check warnings in drivers/usb/core/ (Junxiao Bi) [orabug 14795203]\n- [usb] usbcore: fix endpoint device creation (Junxiao Bi) [orabug 14795203]\n- [usb] usbcore: fix refcount bug in endpoint removal (Junxiao Bi) [orabug 14795203]\n\n[2.6.18-348.6.1.el5]\n- [char] ipmi: use a tasklet for handling received messages (Tony Camuso) [953435 947732]\n- [char] ipmi: do run_to_completion properly in deliver_recv_msg (Tony Camuso) [953435 947732]\n- [fs] nfs4: fix locking around cl_state_owners list (Dave Wysochanski) [954296 948317]\n- [fs] nfs: Fix bugs on short read (Sachin Prabhu) [952098 924011]\n- [xen] AMD IOMMU: spot missing IO-APIC entries in IVRS table (Igor Mammedov) [910912 910913] {CVE-2013-0153}\n- [xen] AMD, IOMMU: Make per-device interrupt remap table default (Igor Mammedov) [910912 910913] {CVE-2013-0153}\n- [xen] AMD, IOMMU: Disable IOMMU if SATA Combined mode is on (Igor Mammedov) [910912 910913] {CVE-2013-0153}\n- [xen] AMD, IOMMU: On creating entry clean up in remapping tables (Igor Mammedov) [910912 910913] {CVE-2013-0153}\n- [xen] ACPI: acpi_table_parse() should return handler's err code (Igor Mammedov) [910912 910913] {CVE-2013-0153}\n- [xen] introduce xzalloc() & Co (Igor Mammedov) [910912 910913] {CVE-2013-0153}\n- [x86] fpu: fix CONFIG_PREEMPT=y corruption of FPU stack (Prarit Bhargava) [948187 731531]\n- [i386] add sleazy FPU optimization (Prarit Bhargava) [948187 731531]\n- [x86-64] non lazy 'sleazy' fpu implementation (Prarit Bhargava) [948187 731531]\n\n[2.6.18-348.5.1.el5]\n- [fs] nfs: handle getattr failure during nfsv4 open (David Jeffery) [947736 906909]", u'issued': u'2013-05-21', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELSA-2013-0847-1.html', u'type': u'self', u'id': None, u'title': u'ELSA-2013-0847-1'}, {u'href': u'http://linux.oracle.com/cve/CVE-2013-0153.html', u'type': u'cve', u'id': u'CVE-2013-0153', u'title': u'CVE-2013-0153'}], u'_content_type_id': u'erratum', u'_id': u'4d79276e-2c66-4d40-a4fd-497e467b5e37', u'from': u'el-errata@oss.oracle.com', u'severity': u'Moderate', u'title': u' kernel security and bug fix update', u'_ns': u'units_erratum', u'rights': u'Copyright 2013 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 5', u'reboot_suggested': False, u'type': u'security', u'pkglist': [{u'packages': [{u'src': None, u'name': u'kernel', u'sum': [u'md5', u'5c41cdcee6cc8850579ed0da33808b8d'], u'filename': u'kernel-2.6.18-348.6.1.0.1.el5.src.rpm', u'epoch': u'0', u'version': u'2.6.18', u'release': u'348.6.1.0.1.el5', u'arch': u'src'}, {u'src': None, u'name': u'kernel', u'sum': [u'md5', u'8804b627f7b6957ff8112c42e70249cb'], u'filename': u'kernel-2.6.18-348.6.1.0.1.el5.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.18', u'release': u'348.6.1.0.1.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'kernel-debug', u'sum': [u'md5', u'1f90eb8c28f56ccc89765b840bedb438'], u'filename': u'kernel-debug-2.6.18-348.6.1.0.1.el5.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.18', u'release': u'348.6.1.0.1.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'kernel-debug-devel', u'sum': [u'md5', u'0ac30c1685befcb1dde1e78bc36a85c7'], u'filename': u'kernel-debug-devel-2.6.18-348.6.1.0.1.el5.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.18', u'release': u'348.6.1.0.1.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'kernel-devel', u'sum': [u'md5', u'e43a968c9c04544ceb12af9b9b310177'], u'filename': u'kernel-devel-2.6.18-348.6.1.0.1.el5.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.18', u'release': u'348.6.1.0.1.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'kernel-doc', u'sum': [u'md5', u'c80f3fc84ceed82fd941360a2afbce7a'], u'filename': u'kernel-doc-2.6.18-348.6.1.0.1.el5.noarch.rpm', u'epoch': u'0', u'version': u'2.6.18', u'release': u'348.6.1.0.1.el5', u'arch': u'noarch'}, {u'src': None, u'name': u'kernel-headers', u'sum': [u'md5', u'ae66d034abebc5999b2faedc7df4a24d'], u'filename': u'kernel-headers-2.6.18-348.6.1.0.1.el5.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.18', u'release': u'348.6.1.0.1.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'kernel-xen', u'sum': [u'md5', u'5404c5007c202bce10cd9a67f9e68116'], u'filename': u'kernel-xen-2.6.18-348.6.1.0.1.el5.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.18', u'release': u'348.6.1.0.1.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'kernel-xen-devel', u'sum': [u'md5', u'56cd6fcbf72fa74860ec0c7318744929'], u'filename': u'kernel-xen-devel-2.6.18-348.6.1.0.1.el5.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.18', u'release': u'348.6.1.0.1.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'ocfs2-2.6.18-348.6.1.0.1.el5', u'sum': [u'md5', u'9d3382c1f8d22fa4c68f464fbccb0ecb'], u'filename': u'ocfs2-2.6.18-348.6.1.0.1.el5-1.4.10-1.el5.src.rpm', u'epoch': u'0', u'version': u'1.4.10', u'release': u'1.el5', u'arch': u'src'}, {u'src': None, u'name': u'ocfs2-2.6.18-348.6.1.0.1.el5', u'sum': [u'md5', u'4302ee7e5b28a7cf4705ed8e5079196c'], u'filename': u'ocfs2-2.6.18-348.6.1.0.1.el5-1.4.10-1.el5.x86_64.rpm', u'epoch': u'0', u'version': u'1.4.10', u'release': u'1.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'ocfs2-2.6.18-348.6.1.0.1.el5debug', u'sum': [u'md5', u'30c6e95e9e5a9cdb86e3bf701dd06693'], u'filename': u'ocfs2-2.6.18-348.6.1.0.1.el5debug-1.4.10-1.el5.x86_64.rpm', u'epoch': u'0', u'version': u'1.4.10', u'release': u'1.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'ocfs2-2.6.18-348.6.1.0.1.el5xen', u'sum': [u'md5', u'12e6cbe12ebac9b5febfed8d8d547664'], u'filename': u'ocfs2-2.6.18-348.6.1.0.1.el5xen-1.4.10-1.el5.x86_64.rpm', u'epoch': u'0', u'version': u'1.4.10', u'release': u'1.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'oracleasm-2.6.18-348.6.1.0.1.el5', u'sum': [u'md5', u'619cb321a3fcdf9952a6eab76c6e4bbd'], u'filename': u'oracleasm-2.6.18-348.6.1.0.1.el5-2.0.5-1.el5.src.rpm', u'epoch': u'0', u'version': u'2.0.5', u'release': u'1.el5', u'arch': u'src'}, {u'src': None, u'name': u'oracleasm-2.6.18-348.6.1.0.1.el5', u'sum': [u'md5', u'082dea4cfb682491af7449ed787a51ca'], u'filename': u'oracleasm-2.6.18-348.6.1.0.1.el5-2.0.5-1.el5.x86_64.rpm', u'epoch': u'0', u'version': u'2.0.5', u'release': u'1.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'oracleasm-2.6.18-348.6.1.0.1.el5debug', u'sum': [u'md5', u'e8ae6e1a2f9c827696900b97dabced4a'], u'filename': u'oracleasm-2.6.18-348.6.1.0.1.el5debug-2.0.5-1.el5.x86_64.rpm', u'epoch': u'0', u'version': u'2.0.5', u'release': u'1.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'oracleasm-2.6.18-348.6.1.0.1.el5xen', u'sum': [u'md5', u'f2381d617691a8db3a3ba5af36ecb57e'], u'filename': u'oracleasm-2.6.18-348.6.1.0.1.el5xen-2.0.5-1.el5.x86_64.rpm', u'epoch': u'0', u'version': u'2.0.5', u'release': u'1.el5', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u'[0:5.5.23-0jpp.40]\n- Related: CVE-2013-1976 It was found during additional testing\n- that the tomcat5 init may fail to start because the user\n- shell is set to sbin/nologin. Fixed in init scrip. SU now\n- uses -s /bin/sh during startup\n\n[0:5.5.23-0jpp.39]\n- Resolves: CVE-2013-1976 Improper TOMCAT_LOG management in\n- initscript. Change location of TOMCAT_LOG to /var/log so\n- only root can write to it. Touching TOMCAT_LOG is no longer\n- required during initscript startup. Permissions and ownership\n- changed to 0755 tomcat:root for logdir', u'issued': u'2013-05-28', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELSA-2013-0870.html', u'type': u'self', u'id': None, u'title': u'ELSA-2013-0870'}, {u'href': u'http://linux.oracle.com/cve/CVE-2013-1976.html', u'type': u'cve', u'id': u'CVE-2013-1976', u'title': u'CVE-2013-1976'}], u'_content_type_id': u'erratum', u'_id': u'd293e309-d433-4d38-a462-7142a3b53ffe', u'from': u'el-errata@oss.oracle.com', u'severity': u'Important', u'title': u' tomcat5 security update', u'_ns': u'units_erratum', u'rights': u'Copyright 2013 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 5', u'reboot_suggested': False, u'type': u'security', u'pkglist': [{u'packages': [{u'src': None, u'name': u'tomcat5', u'sum': [u'md5', u'd09b4523998686a0f4816ed65eea97fd'], u'filename': u'tomcat5-5.5.23-0jpp.40.el5_9.src.rpm', u'epoch': u'0', u'version': u'5.5.23', u'release': u'0jpp.40.el5_9', u'arch': u'src'}, {u'src': None, u'name': u'tomcat5', u'sum': [u'md5', u'60aa3dc44d10e5522783d125bbaa7e71'], u'filename': u'tomcat5-5.5.23-0jpp.40.el5_9.x86_64.rpm', u'epoch': u'0', u'version': u'5.5.23', u'release': u'0jpp.40.el5_9', u'arch': u'x86_64'}, {u'src': None, u'name': u'tomcat5-admin-webapps', u'sum': [u'md5', u'82b0a36a5de9ed376d2d48a904f07674'], u'filename': u'tomcat5-admin-webapps-5.5.23-0jpp.40.el5_9.x86_64.rpm', u'epoch': u'0', u'version': u'5.5.23', u'release': u'0jpp.40.el5_9', u'arch': u'x86_64'}, {u'src': None, u'name': u'tomcat5-common-lib', u'sum': [u'md5', u'3cb9a50ae4c5d63218b4fe4667b73879'], u'filename': u'tomcat5-common-lib-5.5.23-0jpp.40.el5_9.x86_64.rpm', u'epoch': u'0', u'version': u'5.5.23', u'release': u'0jpp.40.el5_9', u'arch': u'x86_64'}, {u'src': None, u'name': u'tomcat5-jasper', u'sum': [u'md5', u'f7a2478304b5d3c4b8e5a1ef83f00e9a'], u'filename': u'tomcat5-jasper-5.5.23-0jpp.40.el5_9.x86_64.rpm', u'epoch': u'0', u'version': u'5.5.23', u'release': u'0jpp.40.el5_9', u'arch': u'x86_64'}, {u'src': None, u'name': u'tomcat5-jasper-javadoc', u'sum': [u'md5', u'fc9737f026b89580beed5a644663a1be'], u'filename': u'tomcat5-jasper-javadoc-5.5.23-0jpp.40.el5_9.x86_64.rpm', u'epoch': u'0', u'version': u'5.5.23', u'release': u'0jpp.40.el5_9', u'arch': u'x86_64'}, {u'src': None, u'name': u'tomcat5-jsp-2.0-api', u'sum': [u'md5', u'b25f00125b223d3ccd563e260bd0967a'], u'filename': u'tomcat5-jsp-2.0-api-5.5.23-0jpp.40.el5_9.x86_64.rpm', u'epoch': u'0', u'version': u'5.5.23', u'release': u'0jpp.40.el5_9', u'arch': u'x86_64'}, {u'src': None, u'name': u'tomcat5-jsp-2.0-api-javadoc', u'sum': [u'md5', u'499fcc14c50fcc25810114b37622fc57'], u'filename': u'tomcat5-jsp-2.0-api-javadoc-5.5.23-0jpp.40.el5_9.x86_64.rpm', u'epoch': u'0', u'version': u'5.5.23', u'release': u'0jpp.40.el5_9', u'arch': u'x86_64'}, {u'src': None, u'name': u'tomcat5-server-lib', u'sum': [u'md5', u'912be7b11c11374879f24d6ba432a7ae'], u'filename': u'tomcat5-server-lib-5.5.23-0jpp.40.el5_9.x86_64.rpm', u'epoch': u'0', u'version': u'5.5.23', u'release': u'0jpp.40.el5_9', u'arch': u'x86_64'}, {u'src': None, u'name': u'tomcat5-servlet-2.4-api', u'sum': [u'md5', u'7a67dd0ea6a3ef5e4f69eea91e7bf57b'], u'filename': u'tomcat5-servlet-2.4-api-5.5.23-0jpp.40.el5_9.x86_64.rpm', u'epoch': u'0', u'version': u'5.5.23', u'release': u'0jpp.40.el5_9', u'arch': u'x86_64'}, {u'src': None, u'name': u'tomcat5-servlet-2.4-api-javadoc', u'sum': [u'md5', u'a7fe019bbc14476fa65caf342617698a'], u'filename': u'tomcat5-servlet-2.4-api-javadoc-5.5.23-0jpp.40.el5_9.x86_64.rpm', u'epoch': u'0', u'version': u'5.5.23', u'release': u'0jpp.40.el5_9', u'arch': u'x86_64'}, {u'src': None, u'name': u'tomcat5-webapps', u'sum': [u'md5', u'83db06948a60c0a36a14457b1a564b12'], u'filename': u'tomcat5-webapps-5.5.23-0jpp.40.el5_9.x86_64.rpm', u'epoch': u'0', u'version': u'5.5.23', u'release': u'0jpp.40.el5_9', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u'[2.8.5-10.2]\n- fix CVE-2013-2116 - fix DoS regression in CVE-2013-1619\n upstream patch (#966754)', u'issued': u'2013-05-30', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELSA-2013-0883.html', u'type': u'self', u'id': None, u'title': u'ELSA-2013-0883'}, {u'href': u'http://linux.oracle.com/cve/CVE-2013-2116.html', u'type': u'cve', u'id': u'CVE-2013-2116', u'title': u'CVE-2013-2116'}], u'_content_type_id': u'erratum', u'_id': u'aa2fa00c-6b6a-446b-9c45-ba005119a0c3', u'from': u'el-errata@oss.oracle.com', u'severity': u'Important', u'title': u' gnutls security update', u'_ns': u'units_erratum', u'rights': u'Copyright 2013 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 5', u'reboot_suggested': False, u'type': u'security', u'pkglist': [{u'packages': [{u'src': None, u'name': u'gnutls', u'sum': [u'md5', u'286c3e700f723b73f1c33a998355b4e5'], u'filename': u'gnutls-1.4.1-10.el5_9.2.i386.rpm', u'epoch': u'0', u'version': u'1.4.1', u'release': u'10.el5_9.2', u'arch': u'i386'}, {u'src': None, u'name': u'gnutls', u'sum': [u'md5', u'1b228a407bfe6fd2be9ce1ce981db02c'], u'filename': u'gnutls-1.4.1-10.el5_9.2.src.rpm', u'epoch': u'0', u'version': u'1.4.1', u'release': u'10.el5_9.2', u'arch': u'src'}, {u'src': None, u'name': u'gnutls', u'sum': [u'md5', u'23969e6a47c9d497e64bce2868eaa1b4'], u'filename': u'gnutls-1.4.1-10.el5_9.2.x86_64.rpm', u'epoch': u'0', u'version': u'1.4.1', u'release': u'10.el5_9.2', u'arch': u'x86_64'}, {u'src': None, u'name': u'gnutls-devel', u'sum': [u'md5', u'2aec86773e634530f6c02fc7e57086c5'], u'filename': u'gnutls-devel-1.4.1-10.el5_9.2.i386.rpm', u'epoch': u'0', u'version': u'1.4.1', u'release': u'10.el5_9.2', u'arch': u'i386'}, {u'src': None, u'name': u'gnutls-devel', u'sum': [u'md5', u'e343291307a383e17d93bcf2ae4ec221'], u'filename': u'gnutls-devel-1.4.1-10.el5_9.2.x86_64.rpm', u'epoch': u'0', u'version': u'1.4.1', u'release': u'10.el5_9.2', u'arch': u'x86_64'}, {u'src': None, u'name': u'gnutls-utils', u'sum': [u'md5', u'cdb64a09b687c10094705628d3570281'], u'filename': u'gnutls-utils-1.4.1-10.el5_9.2.x86_64.rpm', u'epoch': u'0', u'version': u'1.4.1', u'release': u'10.el5_9.2', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}, {u'packages': [{u'src': None, u'name': u'gnutls', u'sum': [u'md5', u'f18ec574bf8d37ef17e2e0b3ef3e38ba'], u'filename': u'gnutls-2.8.5-10.el6_4.2.i686.rpm', u'epoch': u'0', u'version': u'2.8.5', u'release': u'10.el6_4.2', u'arch': u'i686'}, {u'src': None, u'name': u'gnutls', u'sum': [u'md5', u'5cdc75da95b7d3ea3ed9718bafa5051e'], u'filename': u'gnutls-2.8.5-10.el6_4.2.src.rpm', u'epoch': u'0', u'version': u'2.8.5', u'release': u'10.el6_4.2', u'arch': u'src'}, {u'src': None, u'name': u'gnutls', u'sum': [u'md5', u'db3727334ba6821f5d1ccadeba2ad756'], u'filename': u'gnutls-2.8.5-10.el6_4.2.x86_64.rpm', u'epoch': u'0', u'version': u'2.8.5', u'release': u'10.el6_4.2', u'arch': u'x86_64'}, {u'src': None, u'name': u'gnutls-devel', u'sum': [u'md5', u'0c2a16c26f7a82fedb629cb8f7c485a2'], u'filename': u'gnutls-devel-2.8.5-10.el6_4.2.i686.rpm', u'epoch': u'0', u'version': u'2.8.5', u'release': u'10.el6_4.2', u'arch': u'i686'}, {u'src': None, u'name': u'gnutls-devel', u'sum': [u'md5', u'132bda195c87338a7222a1e900c9c386'], u'filename': u'gnutls-devel-2.8.5-10.el6_4.2.x86_64.rpm', u'epoch': u'0', u'version': u'2.8.5', u'release': u'10.el6_4.2', u'arch': u'x86_64'}, {u'src': None, u'name': u'gnutls-guile', u'sum': [u'md5', u'bf8c0a64b8e415b426843cc7fc2a2f94'], u'filename': u'gnutls-guile-2.8.5-10.el6_4.2.i686.rpm', u'epoch': u'0', u'version': u'2.8.5', u'release': u'10.el6_4.2', u'arch': u'i686'}, {u'src': None, u'name': u'gnutls-guile', u'sum': [u'md5', u'52275e0d12258afe50649d4f30841a4d'], u'filename': u'gnutls-guile-2.8.5-10.el6_4.2.x86_64.rpm', u'epoch': u'0', u'version': u'2.8.5', u'release': u'10.el6_4.2', u'arch': u'x86_64'}, {u'src': None, u'name': u'gnutls-utils', u'sum': [u'md5', u'd12e6e37adeee2a526a9bf5b6306bfa1'], u'filename': u'gnutls-utils-2.8.5-10.el6_4.2.x86_64.rpm', u'epoch': u'0', u'version': u'2.8.5', u'release': u'10.el6_4.2', u'arch': u'x86_64'}], u'name': u'ol6_x86_64_latest', u'short': u'ol6_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u'[6.5.1-7.11]\n- CVE-2013-1993 - buffer overflows in DRI protocol (#963066)', u'issued': u'2013-06-03', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELSA-2013-0898.html', u'type': u'self', u'id': None, u'title': u'ELSA-2013-0898'}, {u'href': u'http://linux.oracle.com/cve/CVE-2013-1993.html', u'type': u'cve', u'id': u'CVE-2013-1993', u'title': u'CVE-2013-1993'}], u'_content_type_id': u'erratum', u'_id': u'ca4d9d77-0e6e-4545-8dcb-ebf68273ef7d', u'from': u'el-errata@oss.oracle.com', u'severity': u'Moderate', u'title': u' mesa security update', u'_ns': u'units_erratum', u'rights': u'Copyright 2013 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 5', u'reboot_suggested': False, u'type': u'security', u'pkglist': [{u'packages': [{u'src': None, u'name': u'glx-utils', u'sum': [u'md5', u'f41b36971f2c512319546b3bc061c033'], u'filename': u'glx-utils-6.5.1-7.11.el5_9.x86_64.rpm', u'epoch': u'0', u'version': u'6.5.1', u'release': u'7.11.el5_9', u'arch': u'x86_64'}, {u'src': None, u'name': u'mesa', u'sum': [u'md5', u'76960ece864abef687a06554d73d31ee'], u'filename': u'mesa-6.5.1-7.11.el5_9.src.rpm', u'epoch': u'0', u'version': u'6.5.1', u'release': u'7.11.el5_9', u'arch': u'src'}, {u'src': None, u'name': u'mesa-libGL', u'sum': [u'md5', u'6ddb5d9318fc020d059398061f1070c3'], u'filename': u'mesa-libGL-6.5.1-7.11.el5_9.i386.rpm', u'epoch': u'0', u'version': u'6.5.1', u'release': u'7.11.el5_9', u'arch': u'i386'}, {u'src': None, u'name': u'mesa-libGL', u'sum': [u'md5', u'5ed30ab8d3f7ab59c9558ed75edece72'], u'filename': u'mesa-libGL-6.5.1-7.11.el5_9.x86_64.rpm', u'epoch': u'0', u'version': u'6.5.1', u'release': u'7.11.el5_9', u'arch': u'x86_64'}, {u'src': None, u'name': u'mesa-libGL-devel', u'sum': [u'md5', u'4a3197b56e8b518f54305c9e5da8b8e8'], u'filename': u'mesa-libGL-devel-6.5.1-7.11.el5_9.i386.rpm', u'epoch': u'0', u'version': u'6.5.1', u'release': u'7.11.el5_9', u'arch': u'i386'}, {u'src': None, u'name': u'mesa-libGL-devel', u'sum': [u'md5', u'7e0a99ed7113873544bda5792e626d8b'], u'filename': u'mesa-libGL-devel-6.5.1-7.11.el5_9.x86_64.rpm', u'epoch': u'0', u'version': u'6.5.1', u'release': u'7.11.el5_9', u'arch': u'x86_64'}, {u'src': None, u'name': u'mesa-libGLU', u'sum': [u'md5', u'523eb36beb3395b0157b540e81cec1ff'], u'filename': u'mesa-libGLU-6.5.1-7.11.el5_9.i386.rpm', u'epoch': u'0', u'version': u'6.5.1', u'release': u'7.11.el5_9', u'arch': u'i386'}, {u'src': None, u'name': u'mesa-libGLU', u'sum': [u'md5', u'ef92dc3a37091ffa1a134aade14e56a0'], u'filename': u'mesa-libGLU-6.5.1-7.11.el5_9.x86_64.rpm', u'epoch': u'0', u'version': u'6.5.1', u'release': u'7.11.el5_9', u'arch': u'x86_64'}, {u'src': None, u'name': u'mesa-libGLU-devel', u'sum': [u'md5', u'f820fae06a7e0758c36cb9ac3972ecdf'], u'filename': u'mesa-libGLU-devel-6.5.1-7.11.el5_9.i386.rpm', u'epoch': u'0', u'version': u'6.5.1', u'release': u'7.11.el5_9', u'arch': u'i386'}, {u'src': None, u'name': u'mesa-libGLU-devel', u'sum': [u'md5', u'a77e8f254a3f4cfa723dc9ef45c47126'], u'filename': u'mesa-libGLU-devel-6.5.1-7.11.el5_9.x86_64.rpm', u'epoch': u'0', u'version': u'6.5.1', u'release': u'7.11.el5_9', u'arch': u'x86_64'}, {u'src': None, u'name': u'mesa-libGLw', u'sum': [u'md5', u'ef435ecf7bc4617208e2c75755e6101c'], u'filename': u'mesa-libGLw-6.5.1-7.11.el5_9.i386.rpm', u'epoch': u'0', u'version': u'6.5.1', u'release': u'7.11.el5_9', u'arch': u'i386'}, {u'src': None, u'name': u'mesa-libGLw', u'sum': [u'md5', u'd4d83f1a29f6946caff89332c3a281e6'], u'filename': u'mesa-libGLw-6.5.1-7.11.el5_9.x86_64.rpm', u'epoch': u'0', u'version': u'6.5.1', u'release': u'7.11.el5_9', u'arch': u'x86_64'}, {u'src': None, u'name': u'mesa-libGLw-devel', u'sum': [u'md5', u'7316d3771d1b45853a61a5d241499aeb'], u'filename': u'mesa-libGLw-devel-6.5.1-7.11.el5_9.i386.rpm', u'epoch': u'0', u'version': u'6.5.1', u'release': u'7.11.el5_9', u'arch': u'i386'}, {u'src': None, u'name': u'mesa-libGLw-devel', u'sum': [u'md5', u'2e9224fb5092c67f0a7487f647f5f2ea'], u'filename': u'mesa-libGLw-devel-6.5.1-7.11.el5_9.x86_64.rpm', u'epoch': u'0', u'version': u'6.5.1', u'release': u'7.11.el5_9', u'arch': u'x86_64'}, {u'src': None, u'name': u'mesa-libOSMesa', u'sum': [u'md5', u'821a1eeb4bbc7c6a6ce0d0c32fb62cf7'], u'filename': u'mesa-libOSMesa-6.5.1-7.11.el5_9.i386.rpm', u'epoch': u'0', u'version': u'6.5.1', u'release': u'7.11.el5_9', u'arch': u'i386'}, {u'src': None, u'name': u'mesa-libOSMesa', u'sum': [u'md5', u'88ca86c510ed4e1fa555ee5e06dc3408'], u'filename': u'mesa-libOSMesa-6.5.1-7.11.el5_9.x86_64.rpm', u'epoch': u'0', u'version': u'6.5.1', u'release': u'7.11.el5_9', u'arch': u'x86_64'}, {u'src': None, u'name': u'mesa-libOSMesa-devel', u'sum': [u'md5', u'b6e4e0d3fd5e8b8d0f22930f1dc57668'], u'filename': u'mesa-libOSMesa-devel-6.5.1-7.11.el5_9.i386.rpm', u'epoch': u'0', u'version': u'6.5.1', u'release': u'7.11.el5_9', u'arch': u'i386'}, {u'src': None, u'name': u'mesa-libOSMesa-devel', u'sum': [u'md5', u'90081c371543db69ff56050e10455e98'], u'filename': u'mesa-libOSMesa-devel-6.5.1-7.11.el5_9.x86_64.rpm', u'epoch': u'0', u'version': u'6.5.1', u'release': u'7.11.el5_9', u'arch': u'x86_64'}, {u'src': None, u'name': u'mesa-source', u'sum': [u'md5', u'e09e91fcc95cb4a077cf63cf49e9583d'], u'filename': u'mesa-source-6.5.1-7.11.el5_9.x86_64.rpm', u'epoch': u'0', u'version': u'6.5.1', u'release': u'7.11.el5_9', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u'[1.10.3-10.3]\n- pull up fix for UDP ping-pong flaw in kpasswd service (CVE-2002-2443,', u'issued': u'2013-06-12', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELSA-2013-0942.html', u'type': u'self', u'id': None, u'title': u'ELSA-2013-0942'}, {u'href': u'http://linux.oracle.com/cve/CVE-2002-2443.html', u'type': u'cve', u'id': u'CVE-2002-2443', u'title': u'CVE-2002-2443'}], u'_content_type_id': u'erratum', u'_id': u'2221d18a-80c9-4971-b01c-870a9a5e91ed', u'from': u'el-errata@oss.oracle.com', u'severity': u'Moderate', u'title': u' krb5 security update', u'_ns': u'units_erratum', u'rights': u'Copyright 2013 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 5', u'reboot_suggested': False, u'type': u'security', u'pkglist': [{u'packages': [{u'src': None, u'name': u'krb5', u'sum': [u'md5', u'155511abf1f03378f934044db5cb9b8a'], u'filename': u'krb5-1.6.1-70.el5_9.2.src.rpm', u'epoch': u'0', u'version': u'1.6.1', u'release': u'70.el5_9.2', u'arch': u'src'}, {u'src': None, u'name': u'krb5-devel', u'sum': [u'md5', u'3724edf62697e639c308928037be04ba'], u'filename': u'krb5-devel-1.6.1-70.el5_9.2.i386.rpm', u'epoch': u'0', u'version': u'1.6.1', u'release': u'70.el5_9.2', u'arch': u'i386'}, {u'src': None, u'name': u'krb5-devel', u'sum': [u'md5', u'bb93c391360ea15517b9792e79577fc8'], u'filename': u'krb5-devel-1.6.1-70.el5_9.2.x86_64.rpm', u'epoch': u'0', u'version': u'1.6.1', u'release': u'70.el5_9.2', u'arch': u'x86_64'}, {u'src': None, u'name': u'krb5-libs', u'sum': [u'md5', u'7509f3e336e47a8baa72e7fa96094859'], u'filename': u'krb5-libs-1.6.1-70.el5_9.2.i386.rpm', u'epoch': u'0', u'version': u'1.6.1', u'release': u'70.el5_9.2', u'arch': u'i386'}, {u'src': None, u'name': u'krb5-libs', u'sum': [u'md5', u'67dd704d12edb89c5ef9eeacceabd44e'], u'filename': u'krb5-libs-1.6.1-70.el5_9.2.x86_64.rpm', u'epoch': u'0', u'version': u'1.6.1', u'release': u'70.el5_9.2', u'arch': u'x86_64'}, {u'src': None, u'name': u'krb5-server', u'sum': [u'md5', u'81b57a61250170364fc088c239ccc4d8'], u'filename': u'krb5-server-1.6.1-70.el5_9.2.x86_64.rpm', u'epoch': u'0', u'version': u'1.6.1', u'release': u'70.el5_9.2', u'arch': u'x86_64'}, {u'src': None, u'name': u'krb5-server-ldap', u'sum': [u'md5', u'8f3199e0a7d8892004f19141853d61fd'], u'filename': u'krb5-server-ldap-1.6.1-70.el5_9.2.x86_64.rpm', u'epoch': u'0', u'version': u'1.6.1', u'release': u'70.el5_9.2', u'arch': u'x86_64'}, {u'src': None, u'name': u'krb5-workstation', u'sum': [u'md5', u'a6c5cf5f5435dc6d15fc73bcad6e216b'], u'filename': u'krb5-workstation-1.6.1-70.el5_9.2.x86_64.rpm', u'epoch': u'0', u'version': u'1.6.1', u'release': u'70.el5_9.2', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}, {u'packages': [{u'src': None, u'name': u'krb5', u'sum': [u'md5', u'3b6a2dab0a832c446e9e57dc69afb9de'], u'filename': u'krb5-1.10.3-10.el6_4.3.src.rpm', u'epoch': u'0', u'version': u'1.10.3', u'release': u'10.el6_4.3', u'arch': u'src'}, {u'src': None, u'name': u'krb5-devel', u'sum': [u'md5', u'1f469ac56e6291e4c99fbd311290af9c'], u'filename': u'krb5-devel-1.10.3-10.el6_4.3.i686.rpm', u'epoch': u'0', u'version': u'1.10.3', u'release': u'10.el6_4.3', u'arch': u'i686'}, {u'src': None, u'name': u'krb5-devel', u'sum': [u'md5', u'5a0e840044dc1627fccdb05d6612d9d3'], u'filename': u'krb5-devel-1.10.3-10.el6_4.3.x86_64.rpm', u'epoch': u'0', u'version': u'1.10.3', u'release': u'10.el6_4.3', u'arch': u'x86_64'}, {u'src': None, u'name': u'krb5-libs', u'sum': [u'md5', u'6fe6c898b4d13c532c8758e50d95d7bf'], u'filename': u'krb5-libs-1.10.3-10.el6_4.3.i686.rpm', u'epoch': u'0', u'version': u'1.10.3', u'release': u'10.el6_4.3', u'arch': u'i686'}, {u'src': None, u'name': u'krb5-libs', u'sum': [u'md5', u'cb2d2a85be101ae87ea3c5bb36d894e2'], u'filename': u'krb5-libs-1.10.3-10.el6_4.3.x86_64.rpm', u'epoch': u'0', u'version': u'1.10.3', u'release': u'10.el6_4.3', u'arch': u'x86_64'}, {u'src': None, u'name': u'krb5-pkinit-openssl', u'sum': [u'md5', u'f34b08fc5210a2b07e9a466e4483e6aa'], u'filename': u'krb5-pkinit-openssl-1.10.3-10.el6_4.3.x86_64.rpm', u'epoch': u'0', u'version': u'1.10.3', u'release': u'10.el6_4.3', u'arch': u'x86_64'}, {u'src': None, u'name': u'krb5-server', u'sum': [u'md5', u'6345b2da250220bd0aa376ae3217a276'], u'filename': u'krb5-server-1.10.3-10.el6_4.3.x86_64.rpm', u'epoch': u'0', u'version': u'1.10.3', u'release': u'10.el6_4.3', u'arch': u'x86_64'}, {u'src': None, u'name': u'krb5-server-ldap', u'sum': [u'md5', u'4a635feb91e14578587d1dc7d88e0d17'], u'filename': u'krb5-server-ldap-1.10.3-10.el6_4.3.i686.rpm', u'epoch': u'0', u'version': u'1.10.3', u'release': u'10.el6_4.3', u'arch': u'i686'}, {u'src': None, u'name': u'krb5-server-ldap', u'sum': [u'md5', u'fc93feb61bba90d332172e2b97248f69'], u'filename': u'krb5-server-ldap-1.10.3-10.el6_4.3.x86_64.rpm', u'epoch': u'0', u'version': u'1.10.3', u'release': u'10.el6_4.3', u'arch': u'x86_64'}, {u'src': None, u'name': u'krb5-workstation', u'sum': [u'md5', u'21a419fb75b26818852b400c33ee83d1'], u'filename': u'krb5-workstation-1.10.3-10.el6_4.3.x86_64.rpm', u'epoch': u'0', u'version': u'1.10.3', u'release': u'10.el6_4.3', u'arch': u'x86_64'}], u'name': u'ol6_x86_64_latest', u'short': u'ol6_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u"[1.7.0.25-2.3.10.4.0.1.el5_9]\n- Add oracle-enterprise.patch\n- Fix DISTRO_NAME to 'Enterprise Linux'\n\n[1.7.0.25-2.3.10.4.el5]\n- updated to newer IcedTea7-forest 2.3.10 with 8010118 fix\n- removed upstreamed patch1000 MBeanFix.patch\n- Resolves: rhbz#973117\n\n[1.7.0.25-2.3.10.3.el5]\n- reverted fix for license files owning\n- Resolves: rhbz#973117\n\n[1.7.0.25-2.3.10.2.el5]\n- added patch1000 MBeanFix.patch to fix regressions caused by security patches\n- Resolves: rhbz#973117\n\n[1.7.0.25-2.3.10.1.el6]\n- build bumped to 25\n- Resolves: rhbz#973117\n\n[1.7.0.19-2.3.10.0.el5]\n- Updated to latest IcedTea7-forest 2.3.10\n- patch 107 renamed to 500 for cosmetic purposes\n- Added fix for RH857717, owned /etc/.java/ and /etc/.java/.systemPrefs\n- Resolves: rhbz#973117\n\n[1.7.0.19-2.3.10.0.el5]\n- Updated to latest IcedTea7-forest 2.3.10\n- Resolves: rhbz#973117", u'issued': u'2013-06-19', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELSA-2013-0958.html', u'type': u'self', u'id': None, u'title': u'ELSA-2013-0958'}, {u'href': u'http://linux.oracle.com/cve/CVE-2013-1500.html', u'type': u'cve', u'id': u'CVE-2013-1500', u'title': u'CVE-2013-1500'}, {u'href': u'http://linux.oracle.com/cve/CVE-2013-1571.html', u'type': u'cve', u'id': u'CVE-2013-1571', u'title': u'CVE-2013-1571'}, {u'href': u'http://linux.oracle.com/cve/CVE-2013-2407.html', u'type': u'cve', u'id': u'CVE-2013-2407', u'title': u'CVE-2013-2407'}, {u'href': u'http://linux.oracle.com/cve/CVE-2013-2412.html', u'type': u'cve', u'id': u'CVE-2013-2412', u'title': u'CVE-2013-2412'}, {u'href': u'http://linux.oracle.com/cve/CVE-2013-2443.html', u'type': u'cve', u'id': u'CVE-2013-2443', u'title': u'CVE-2013-2443'}, {u'href': u'http://linux.oracle.com/cve/CVE-2013-2444.html', u'type': u'cve', u'id': u'CVE-2013-2444', u'title': u'CVE-2013-2444'}, {u'href': u'http://linux.oracle.com/cve/CVE-2013-2445.html', u'type': u'cve', u'id': u'CVE-2013-2445', u'title': u'CVE-2013-2445'}, {u'href': u'http://linux.oracle.com/cve/CVE-2013-2446.html', u'type': u'cve', u'id': u'CVE-2013-2446', u'title': u'CVE-2013-2446'}, {u'href': u'http://linux.oracle.com/cve/CVE-2013-2447.html', u'type': u'cve', u'id': u'CVE-2013-2447', u'title': u'CVE-2013-2447'}, {u'href': u'http://linux.oracle.com/cve/CVE-2013-2448.html', u'type': u'cve', u'id': u'CVE-2013-2448', u'title': u'CVE-2013-2448'}, {u'href': u'http://linux.oracle.com/cve/CVE-2013-2449.html', u'type': u'cve', u'id': u'CVE-2013-2449', u'title': u'CVE-2013-2449'}, {u'href': u'http://linux.oracle.com/cve/CVE-2013-2450.html', u'type': u'cve', u'id': u'CVE-2013-2450', u'title': u'CVE-2013-2450'}, {u'href': u'http://linux.oracle.com/cve/CVE-2013-2452.html', u'type': u'cve', u'id': u'CVE-2013-2452', u'title': u'CVE-2013-2452'}, {u'href': u'http://linux.oracle.com/cve/CVE-2013-2453.html', u'type': u'cve', u'id': u'CVE-2013-2453', u'title': u'CVE-2013-2453'}, {u'href': u'http://linux.oracle.com/cve/CVE-2013-2454.html', u'type': u'cve', u'id': u'CVE-2013-2454', u'title': u'CVE-2013-2454'}, {u'href': u'http://linux.oracle.com/cve/CVE-2013-2455.html', u'type': u'cve', u'id': u'CVE-2013-2455', u'title': u'CVE-2013-2455'}, {u'href': u'http://linux.oracle.com/cve/CVE-2013-2456.html', u'type': u'cve', u'id': u'CVE-2013-2456', u'title': u'CVE-2013-2456'}, {u'href': u'http://linux.oracle.com/cve/CVE-2013-2457.html', u'type': u'cve', u'id': u'CVE-2013-2457', u'title': u'CVE-2013-2457'}, {u'href': u'http://linux.oracle.com/cve/CVE-2013-2458.html', u'type': u'cve', u'id': u'CVE-2013-2458', u'title': u'CVE-2013-2458'}, {u'href': u'http://linux.oracle.com/cve/CVE-2013-2459.html', u'type': u'cve', u'id': u'CVE-2013-2459', u'title': u'CVE-2013-2459'}, {u'href': u'http://linux.oracle.com/cve/CVE-2013-2460.html', u'type': u'cve', u'id': u'CVE-2013-2460', u'title': u'CVE-2013-2460'}, {u'href': u'http://linux.oracle.com/cve/CVE-2013-2461.html', u'type': u'cve', u'id': u'CVE-2013-2461', u'title': u'CVE-2013-2461'}, {u'href': u'http://linux.oracle.com/cve/CVE-2013-2463.html', u'type': u'cve', u'id': u'CVE-2013-2463', u'title': u'CVE-2013-2463'}, {u'href': u'http://linux.oracle.com/cve/CVE-2013-2465.html', u'type': u'cve', u'id': u'CVE-2013-2465', u'title': u'CVE-2013-2465'}, {u'href': u'http://linux.oracle.com/cve/CVE-2013-2469.html', u'type': u'cve', u'id': u'CVE-2013-2469', u'title': u'CVE-2013-2469'}, {u'href': u'http://linux.oracle.com/cve/CVE-2013-2470.html', u'type': u'cve', u'id': u'CVE-2013-2470', u'title': u'CVE-2013-2470'}, {u'href': u'http://linux.oracle.com/cve/CVE-2013-2471.html', u'type': u'cve', u'id': u'CVE-2013-2471', u'title': u'CVE-2013-2471'}, {u'href': u'http://linux.oracle.com/cve/CVE-2013-2472.html', u'type': u'cve', u'id': u'CVE-2013-2472', u'title': u'CVE-2013-2472'}, {u'href': u'http://linux.oracle.com/cve/CVE-2013-2473.html', u'type': u'cve', u'id': u'CVE-2013-2473', u'title': u'CVE-2013-2473'}], u'_content_type_id': u'erratum', u'_id': u'949fbefc-2c9b-4b73-8b56-681da71de14a', u'from': u'el-errata@oss.oracle.com', u'severity': u'Important', u'title': u' java-1.7.0-openjdk security update', u'_ns': u'units_erratum', u'rights': u'Copyright 2013 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 5', u'reboot_suggested': False, u'type': u'security', u'pkglist': [{u'packages': [{u'src': None, u'name': u'java-1.7.0-openjdk', u'sum': [u'md5', u'dc4961ae0a8f82a78e3aed6d9f9aaf1d'], u'filename': u'java-1.7.0-openjdk-1.7.0.25-2.3.10.4.0.1.el5_9.src.rpm', u'epoch': u'1', u'version': u'1.7.0.25', u'release': u'2.3.10.4.0.1.el5_9', u'arch': u'src'}, {u'src': None, u'name': u'java-1.7.0-openjdk', u'sum': [u'md5', u'67ce129d735ce274b6b024c4e499a788'], u'filename': u'java-1.7.0-openjdk-1.7.0.25-2.3.10.4.0.1.el5_9.x86_64.rpm', u'epoch': u'1', u'version': u'1.7.0.25', u'release': u'2.3.10.4.0.1.el5_9', u'arch': u'x86_64'}, {u'src': None, u'name': u'java-1.7.0-openjdk-demo', u'sum': [u'md5', u'cf1b9a84180a0fa83a4d6cd616e72bbd'], u'filename': u'java-1.7.0-openjdk-demo-1.7.0.25-2.3.10.4.0.1.el5_9.x86_64.rpm', u'epoch': u'1', u'version': u'1.7.0.25', u'release': u'2.3.10.4.0.1.el5_9', u'arch': u'x86_64'}, {u'src': None, u'name': u'java-1.7.0-openjdk-devel', u'sum': [u'md5', u'6afe56387312e7593b506fdcb5f6a3be'], u'filename': u'java-1.7.0-openjdk-devel-1.7.0.25-2.3.10.4.0.1.el5_9.x86_64.rpm', u'epoch': u'1', u'version': u'1.7.0.25', u'release': u'2.3.10.4.0.1.el5_9', u'arch': u'x86_64'}, {u'src': None, u'name': u'java-1.7.0-openjdk-javadoc', u'sum': [u'md5', u'ec32807136e19a3a4a3a4ff21e49d6df'], u'filename': u'java-1.7.0-openjdk-javadoc-1.7.0.25-2.3.10.4.0.1.el5_9.x86_64.rpm', u'epoch': u'1', u'version': u'1.7.0.25', u'release': u'2.3.10.4.0.1.el5_9', u'arch': u'x86_64'}, {u'src': None, u'name': u'java-1.7.0-openjdk-src', u'sum': [u'md5', u'c495616885a215a12f653cc5e0572484'], u'filename': u'java-1.7.0-openjdk-src-1.7.0.25-2.3.10.4.0.1.el5_9.x86_64.rpm', u'epoch': u'1', u'version': u'1.7.0.25', u'release': u'2.3.10.4.0.1.el5_9', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u"firefox\n[17.0.7-1.0.1.el6_4]\n- Add firefox-oracle-default-prefs.js and remove the corresponding Red Hat ones\n\n[17.0.7-1]\n- Update to 17.0.7 ESR\n\nxulrunner\n[17.0.7-1.0.1.el6_4]\n- Replaced xulrunner-redhat-default-prefs.js with xulrunner-oracle-default-prefs.js\n- Removed XULRUNNER_VERSION from SOURCE21\n\n[17.0.7-1]\n- Update to 17.0.7 ESR\n\n[17.0.6-5]\n- Added workaround for rhbz#973721 - fixing problem with installation\n of some addons\n\n[17.0.6-4]\n- Added a workaround for rhbz#961687 - Prelink throws message\n 'Cannot safely convert .rel.dyn' section from REL to RELA'\n\n[17.0.6-3]\n- Added patch for aliasing issues (mozbz#821502)", u'issued': u'2013-06-25', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELSA-2013-0981.html', u'type': u'self', u'id': None, u'title': u'ELSA-2013-0981'}, {u'href': u'http://linux.oracle.com/cve/CVE-2013-1682.html', u'type': u'cve', u'id': u'CVE-2013-1682', u'title': u'CVE-2013-1682'}, {u'href': u'http://linux.oracle.com/cve/CVE-2013-1684.html', u'type': u'cve', u'id': u'CVE-2013-1684', u'title': u'CVE-2013-1684'}, {u'href': u'http://linux.oracle.com/cve/CVE-2013-1685.html', u'type': u'cve', u'id': u'CVE-2013-1685', u'title': u'CVE-2013-1685'}, {u'href': u'http://linux.oracle.com/cve/CVE-2013-1686.html', u'type': u'cve', u'id': u'CVE-2013-1686', u'title': u'CVE-2013-1686'}, {u'href': u'http://linux.oracle.com/cve/CVE-2013-1687.html', u'type': u'cve', u'id': u'CVE-2013-1687', u'title': u'CVE-2013-1687'}, {u'href': u'http://linux.oracle.com/cve/CVE-2013-1690.html', u'type': u'cve', u'id': u'CVE-2013-1690', u'title': u'CVE-2013-1690'}, {u'href': u'http://linux.oracle.com/cve/CVE-2013-1692.html', u'type': u'cve', u'id': u'CVE-2013-1692', u'title': u'CVE-2013-1692'}, {u'href': u'http://linux.oracle.com/cve/CVE-2013-1693.html', u'type': u'cve', u'id': u'CVE-2013-1693', u'title': u'CVE-2013-1693'}, {u'href': u'http://linux.oracle.com/cve/CVE-2013-1694.html', u'type': u'cve', u'id': u'CVE-2013-1694', u'title': u'CVE-2013-1694'}, {u'href': u'http://linux.oracle.com/cve/CVE-2013-1697.html', u'type': u'cve', u'id': u'CVE-2013-1697', u'title': u'CVE-2013-1697'}], u'_content_type_id': u'erratum', u'_id': u'd4c5f4f6-3959-45d1-bac3-d855e106e835', u'from': u'el-errata@oss.oracle.com', u'severity': u'Critical', u'title': u' firefox security update', u'_ns': u'units_erratum', u'rights': u'Copyright 2013 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 5', u'reboot_suggested': False, u'type': u'security', u'pkglist': [{u'packages': [{u'src': None, u'name': u'firefox', u'sum': [u'md5', u'f3f24db85b3ffb1fc109b74fbcf4c181'], u'filename': u'firefox-17.0.7-1.0.1.el5_9.i386.rpm', u'epoch': u'0', u'version': u'17.0.7', u'release': u'1.0.1.el5_9', u'arch': u'i386'}, {u'src': None, u'name': u'firefox', u'sum': [u'md5', u'fcd06569a77e1544bac64bd43b9f6ed6'], u'filename': u'firefox-17.0.7-1.0.1.el5_9.src.rpm', u'epoch': u'0', u'version': u'17.0.7', u'release': u'1.0.1.el5_9', u'arch': u'src'}, {u'src': None, u'name': u'firefox', u'sum': [u'md5', u'070da5833a8ed4f28709e2d2ff79c679'], u'filename': u'firefox-17.0.7-1.0.1.el5_9.x86_64.rpm', u'epoch': u'0', u'version': u'17.0.7', u'release': u'1.0.1.el5_9', u'arch': u'x86_64'}, {u'src': None, u'name': u'xulrunner', u'sum': [u'md5', u'0347c570cc74ede1bf26d943410327e4'], u'filename': u'xulrunner-17.0.7-1.0.1.el5_9.i386.rpm', u'epoch': u'0', u'version': u'17.0.7', u'release': u'1.0.1.el5_9', u'arch': u'i386'}, {u'src': None, u'name': u'xulrunner', u'sum': [u'md5', u'6b9bf4364ba9db1f4916d7aefe09acd3'], u'filename': u'xulrunner-17.0.7-1.0.1.el5_9.src.rpm', u'epoch': u'0', u'version': u'17.0.7', u'release': u'1.0.1.el5_9', u'arch': u'src'}, {u'src': None, u'name': u'xulrunner', u'sum': [u'md5', u'5b57c3acd0bdd31369671b71e80a9fa4'], u'filename': u'xulrunner-17.0.7-1.0.1.el5_9.x86_64.rpm', u'epoch': u'0', u'version': u'17.0.7', u'release': u'1.0.1.el5_9', u'arch': u'x86_64'}, {u'src': None, u'name': u'xulrunner-devel', u'sum': [u'md5', u'ac15968fb1fe66dd2870450b75f1e8f5'], u'filename': u'xulrunner-devel-17.0.7-1.0.1.el5_9.i386.rpm', u'epoch': u'0', u'version': u'17.0.7', u'release': u'1.0.1.el5_9', u'arch': u'i386'}, {u'src': None, u'name': u'xulrunner-devel', u'sum': [u'md5', u'6e2b699b2142103059c5ccf848f53373'], u'filename': u'xulrunner-devel-17.0.7-1.0.1.el5_9.x86_64.rpm', u'epoch': u'0', u'version': u'17.0.7', u'release': u'1.0.1.el5_9', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}, {u'packages': [{u'src': None, u'name': u'firefox', u'sum': [u'md5', u'd748f6dab1bffb1f369c39cfa1600a65'], u'filename': u'firefox-17.0.7-1.0.1.el6_4.i686.rpm', u'epoch': u'0', u'version': u'17.0.7', u'release': u'1.0.1.el6_4', u'arch': u'i686'}, {u'src': None, u'name': u'firefox', u'sum': [u'md5', u'36889c9869b7b72fff176fbd080d944c'], u'filename': u'firefox-17.0.7-1.0.1.el6_4.src.rpm', u'epoch': u'0', u'version': u'17.0.7', u'release': u'1.0.1.el6_4', u'arch': u'src'}, {u'src': None, u'name': u'firefox', u'sum': [u'md5', u'6cc1104b541596ad7e9b9570a89b6b7e'], u'filename': u'firefox-17.0.7-1.0.1.el6_4.x86_64.rpm', u'epoch': u'0', u'version': u'17.0.7', u'release': u'1.0.1.el6_4', u'arch': u'x86_64'}, {u'src': None, u'name': u'xulrunner', u'sum': [u'md5', u'6eb85c3cb1e73398d2a9ec75db3c5159'], u'filename': u'xulrunner-17.0.7-1.0.1.el6_4.i686.rpm', u'epoch': u'0', u'version': u'17.0.7', u'release': u'1.0.1.el6_4', u'arch': u'i686'}, {u'src': None, u'name': u'xulrunner', u'sum': [u'md5', u'ca19047e0d448c2f90eaa414293896bb'], u'filename': u'xulrunner-17.0.7-1.0.1.el6_4.src.rpm', u'epoch': u'0', u'version': u'17.0.7', u'release': u'1.0.1.el6_4', u'arch': u'src'}, {u'src': None, u'name': u'xulrunner', u'sum': [u'md5', u'884528037aaf83bb0a172ffe53ce8213'], u'filename': u'xulrunner-17.0.7-1.0.1.el6_4.x86_64.rpm', u'epoch': u'0', u'version': u'17.0.7', u'release': u'1.0.1.el6_4', u'arch': u'x86_64'}, {u'src': None, u'name': u'xulrunner-devel', u'sum': [u'md5', u'd686d7f23c8f1ef4e86a2fcff51d220b'], u'filename': u'xulrunner-devel-17.0.7-1.0.1.el6_4.i686.rpm', u'epoch': u'0', u'version': u'17.0.7', u'release': u'1.0.1.el6_4', u'arch': u'i686'}, {u'src': None, u'name': u'xulrunner-devel', u'sum': [u'md5', u'17c72c904007e8cc515f22508e253669'], u'filename': u'xulrunner-devel-17.0.7-1.0.1.el6_4.x86_64.rpm', u'epoch': u'0', u'version': u'17.0.7', u'release': u'1.0.1.el6_4', u'arch': u'x86_64'}], u'name': u'ol6_x86_64_latest', u'short': u'ol6_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u'[7.19.7-37]\n- fix heap-based buffer overflow in curl_easy_unescape() (CVE-2013-2174)', u'issued': u'2013-06-25', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELSA-2013-0983.html', u'type': u'self', u'id': None, u'title': u'ELSA-2013-0983'}, {u'href': u'http://linux.oracle.com/cve/CVE-2013-2174.html', u'type': u'cve', u'id': u'CVE-2013-2174', u'title': u'CVE-2013-2174'}], u'_content_type_id': u'erratum', u'_id': u'e1ca4051-26da-43fb-a821-59c099b00d1f', u'from': u'el-errata@oss.oracle.com', u'severity': u'Moderate', u'title': u' curl security update', u'_ns': u'units_erratum', u'rights': u'Copyright 2013 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 5', u'reboot_suggested': False, u'type': u'security', u'pkglist': [{u'packages': [{u'src': None, u'name': u'curl', u'sum': [u'md5', u'0c4fb724be23b46c1f2dc1dfdc86c20d'], u'filename': u'curl-7.15.5-17.el5_9.i386.rpm', u'epoch': u'0', u'version': u'7.15.5', u'release': u'17.el5_9', u'arch': u'i386'}, {u'src': None, u'name': u'curl', u'sum': [u'md5', u'd9fa1188a77d797c73479d8ac182ac91'], u'filename': u'curl-7.15.5-17.el5_9.src.rpm', u'epoch': u'0', u'version': u'7.15.5', u'release': u'17.el5_9', u'arch': u'src'}, {u'src': None, u'name': u'curl', u'sum': [u'md5', u'5499f6421a61a1ee759192ed306f78fe'], u'filename': u'curl-7.15.5-17.el5_9.x86_64.rpm', u'epoch': u'0', u'version': u'7.15.5', u'release': u'17.el5_9', u'arch': u'x86_64'}, {u'src': None, u'name': u'curl-devel', u'sum': [u'md5', u'7917fc8b0cd729e63d5931931785aca3'], u'filename': u'curl-devel-7.15.5-17.el5_9.i386.rpm', u'epoch': u'0', u'version': u'7.15.5', u'release': u'17.el5_9', u'arch': u'i386'}, {u'src': None, u'name': u'curl-devel', u'sum': [u'md5', u'9cfe5efb41bd693f2fde1d1499d0f5d7'], u'filename': u'curl-devel-7.15.5-17.el5_9.x86_64.rpm', u'epoch': u'0', u'version': u'7.15.5', u'release': u'17.el5_9', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}, {u'packages': [{u'src': None, u'name': u'curl', u'sum': [u'md5', u'1467d13f639d1075f9b4e968b4be3d9b'], u'filename': u'curl-7.19.7-37.el6_4.src.rpm', u'epoch': u'0', u'version': u'7.19.7', u'release': u'37.el6_4', u'arch': u'src'}, {u'src': None, u'name': u'curl', u'sum': [u'md5', u'32dcc6f7e54474fef5c4924fb1a1286e'], u'filename': u'curl-7.19.7-37.el6_4.x86_64.rpm', u'epoch': u'0', u'version': u'7.19.7', u'release': u'37.el6_4', u'arch': u'x86_64'}, {u'src': None, u'name': u'libcurl', u'sum': [u'md5', u'9803bcb4d0fb33ee974ed33167e25a6e'], u'filename': u'libcurl-7.19.7-37.el6_4.i686.rpm', u'epoch': u'0', u'version': u'7.19.7', u'release': u'37.el6_4', u'arch': u'i686'}, {u'src': None, u'name': u'libcurl', u'sum': [u'md5', u'42e882a87187ea53b869e7605f5966bf'], u'filename': u'libcurl-7.19.7-37.el6_4.x86_64.rpm', u'epoch': u'0', u'version': u'7.19.7', u'release': u'37.el6_4', u'arch': u'x86_64'}, {u'src': None, u'name': u'libcurl-devel', u'sum': [u'md5', u'a1baeec45e5b4c23050a3cc99e3b5dc7'], u'filename': u'libcurl-devel-7.19.7-37.el6_4.i686.rpm', u'epoch': u'0', u'version': u'7.19.7', u'release': u'37.el6_4', u'arch': u'i686'}, {u'src': None, u'name': u'libcurl-devel', u'sum': [u'md5', u'0b7303bdb08a5ab3acdc240e0bb11df0'], u'filename': u'libcurl-devel-7.19.7-37.el6_4.x86_64.rpm', u'epoch': u'0', u'version': u'7.19.7', u'release': u'37.el6_4', u'arch': u'x86_64'}], u'name': u'ol6_x86_64_latest', u'short': u'ol6_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u'[1:1.6.0.0-1.62.1.11.11.90]\n- updated to icedtea6-1.11.11.90.tar.gz\n- removed upstreamed patch9 jaxp-backport-factoryfinder.patch\n- removed upstreamed patch10 fixToFontSecurityFix.patch.\n- modified patch3, java-1.6.0-openjdk-java-access-bridge-security.patch\n- Resolves: rhbz#973129', u'issued': u'2013-07-03', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELSA-2013-1014.html', u'type': u'self', u'id': None, u'title': u'ELSA-2013-1014'}, {u'href': u'http://linux.oracle.com/cve/CVE-2013-1500.html', u'type': u'cve', u'id': u'CVE-2013-1500', u'title': u'CVE-2013-1500'}, {u'href': u'http://linux.oracle.com/cve/CVE-2013-1571.html', u'type': u'cve', u'id': u'CVE-2013-1571', u'title': u'CVE-2013-1571'}, {u'href': u'http://linux.oracle.com/cve/CVE-2013-2407.html', u'type': u'cve', u'id': u'CVE-2013-2407', u'title': u'CVE-2013-2407'}, {u'href': u'http://linux.oracle.com/cve/CVE-2013-2412.html', u'type': u'cve', u'id': u'CVE-2013-2412', u'title': u'CVE-2013-2412'}, {u'href': u'http://linux.oracle.com/cve/CVE-2013-2443.html', u'type': u'cve', u'id': u'CVE-2013-2443', u'title': u'CVE-2013-2443'}, {u'href': u'http://linux.oracle.com/cve/CVE-2013-2444.html', u'type': u'cve', u'id': u'CVE-2013-2444', u'title': u'CVE-2013-2444'}, {u'href': u'http://linux.oracle.com/cve/CVE-2013-2445.html', u'type': u'cve', u'id': u'CVE-2013-2445', u'title': u'CVE-2013-2445'}, {u'href': u'http://linux.oracle.com/cve/CVE-2013-2446.html', u'type': u'cve', u'id': u'CVE-2013-2446', u'title': u'CVE-2013-2446'}, {u'href': u'http://linux.oracle.com/cve/CVE-2013-2447.html', u'type': u'cve', u'id': u'CVE-2013-2447', u'title': u'CVE-2013-2447'}, {u'href': u'http://linux.oracle.com/cve/CVE-2013-2448.html', u'type': u'cve', u'id': u'CVE-2013-2448', u'title': u'CVE-2013-2448'}, {u'href': u'http://linux.oracle.com/cve/CVE-2013-2450.html', u'type': u'cve', u'id': u'CVE-2013-2450', u'title': u'CVE-2013-2450'}, {u'href': u'http://linux.oracle.com/cve/CVE-2013-2452.html', u'type': u'cve', u'id': u'CVE-2013-2452', u'title': u'CVE-2013-2452'}, {u'href': u'http://linux.oracle.com/cve/CVE-2013-2453.html', u'type': u'cve', u'id': u'CVE-2013-2453', u'title': u'CVE-2013-2453'}, {u'href': u'http://linux.oracle.com/cve/CVE-2013-2455.html', u'type': u'cve', u'id': u'CVE-2013-2455', u'title': u'CVE-2013-2455'}, {u'href': u'http://linux.oracle.com/cve/CVE-2013-2456.html', u'type': u'cve', u'id': u'CVE-2013-2456', u'title': u'CVE-2013-2456'}, {u'href': u'http://linux.oracle.com/cve/CVE-2013-2457.html', u'type': u'cve', u'id': u'CVE-2013-2457', u'title': u'CVE-2013-2457'}, {u'href': u'http://linux.oracle.com/cve/CVE-2013-2459.html', u'type': u'cve', u'id': u'CVE-2013-2459', u'title': u'CVE-2013-2459'}, {u'href': u'http://linux.oracle.com/cve/CVE-2013-2461.html', u'type': u'cve', u'id': u'CVE-2013-2461', u'title': u'CVE-2013-2461'}, {u'href': u'http://linux.oracle.com/cve/CVE-2013-2463.html', u'type': u'cve', u'id': u'CVE-2013-2463', u'title': u'CVE-2013-2463'}, {u'href': u'http://linux.oracle.com/cve/CVE-2013-2465.html', u'type': u'cve', u'id': u'CVE-2013-2465', u'title': u'CVE-2013-2465'}, {u'href': u'http://linux.oracle.com/cve/CVE-2013-2469.html', u'type': u'cve', u'id': u'CVE-2013-2469', u'title': u'CVE-2013-2469'}, {u'href': u'http://linux.oracle.com/cve/CVE-2013-2470.html', u'type': u'cve', u'id': u'CVE-2013-2470', u'title': u'CVE-2013-2470'}, {u'href': u'http://linux.oracle.com/cve/CVE-2013-2471.html', u'type': u'cve', u'id': u'CVE-2013-2471', u'title': u'CVE-2013-2471'}, {u'href': u'http://linux.oracle.com/cve/CVE-2013-2472.html', u'type': u'cve', u'id': u'CVE-2013-2472', u'title': u'CVE-2013-2472'}, {u'href': u'http://linux.oracle.com/cve/CVE-2013-2473.html', u'type': u'cve', u'id': u'CVE-2013-2473', u'title': u'CVE-2013-2473'}], u'_content_type_id': u'erratum', u'_id': u'0598762b-3f62-4300-852c-4abb1a9f3162', u'from': u'el-errata@oss.oracle.com', u'severity': u'Important', u'title': u' java-1.6.0-openjdk security update', u'_ns': u'units_erratum', u'rights': u'Copyright 2013 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 5', u'reboot_suggested': False, u'type': u'security', u'pkglist': [{u'packages': [{u'src': None, u'name': u'java-1.6.0-openjdk', u'sum': [u'md5', u'216d0cd9b473dbb9ff20f9ee358f1e98'], u'filename': u'java-1.6.0-openjdk-1.6.0.0-1.41.1.11.11.90.0.1.el5_9.src.rpm', u'epoch': u'1', u'version': u'1.6.0.0', u'release': u'1.41.1.11.11.90.0.1.el5_9', u'arch': u'src'}, {u'src': None, u'name': u'java-1.6.0-openjdk', u'sum': [u'md5', u'51d679dc5fc02c9ad2e681dd9634d3e3'], u'filename': u'java-1.6.0-openjdk-1.6.0.0-1.41.1.11.11.90.0.1.el5_9.x86_64.rpm', u'epoch': u'1', u'version': u'1.6.0.0', u'release': u'1.41.1.11.11.90.0.1.el5_9', u'arch': u'x86_64'}, {u'src': None, u'name': u'java-1.6.0-openjdk-demo', u'sum': [u'md5', u'ca65c3ce3fb50f4cae57199f0dd2199c'], u'filename': u'java-1.6.0-openjdk-demo-1.6.0.0-1.41.1.11.11.90.0.1.el5_9.x86_64.rpm', u'epoch': u'1', u'version': u'1.6.0.0', u'release': u'1.41.1.11.11.90.0.1.el5_9', u'arch': u'x86_64'}, {u'src': None, u'name': u'java-1.6.0-openjdk-devel', u'sum': [u'md5', u'e7cad47749e454260f2135d46e1abfc4'], u'filename': u'java-1.6.0-openjdk-devel-1.6.0.0-1.41.1.11.11.90.0.1.el5_9.x86_64.rpm', u'epoch': u'1', u'version': u'1.6.0.0', u'release': u'1.41.1.11.11.90.0.1.el5_9', u'arch': u'x86_64'}, {u'src': None, u'name': u'java-1.6.0-openjdk-javadoc', u'sum': [u'md5', u'2190eb3fd113a7035045fd2b0d1d4362'], u'filename': u'java-1.6.0-openjdk-javadoc-1.6.0.0-1.41.1.11.11.90.0.1.el5_9.x86_64.rpm', u'epoch': u'1', u'version': u'1.6.0.0', u'release': u'1.41.1.11.11.90.0.1.el5_9', u'arch': u'x86_64'}, {u'src': None, u'name': u'java-1.6.0-openjdk-src', u'sum': [u'md5', u'd5f20a5fad3df9a9495a7374bd01351a'], u'filename': u'java-1.6.0-openjdk-src-1.6.0.0-1.41.1.11.11.90.0.1.el5_9.x86_64.rpm', u'epoch': u'1', u'version': u'1.6.0.0', u'release': u'1.41.1.11.11.90.0.1.el5_9', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}, {u'packages': [{u'src': None, u'name': u'java-1.6.0-openjdk', u'sum': [u'md5', u'5c0260a4cbcc65e3edad9d37ddec42f8'], u'filename': u'java-1.6.0-openjdk-1.6.0.0-1.62.1.11.11.90.el6_4.src.rpm', u'epoch': u'1', u'version': u'1.6.0.0', u'release': u'1.62.1.11.11.90.el6_4', u'arch': u'src'}, {u'src': None, u'name': u'java-1.6.0-openjdk', u'sum': [u'md5', u'3e8c5aeba0069f2707532b9e143d5e92'], u'filename': u'java-1.6.0-openjdk-1.6.0.0-1.62.1.11.11.90.el6_4.x86_64.rpm', u'epoch': u'1', u'version': u'1.6.0.0', u'release': u'1.62.1.11.11.90.el6_4', u'arch': u'x86_64'}, {u'src': None, u'name': u'java-1.6.0-openjdk-demo', u'sum': [u'md5', u'dfa08bfd78d710b1954e676829ef018b'], u'filename': u'java-1.6.0-openjdk-demo-1.6.0.0-1.62.1.11.11.90.el6_4.x86_64.rpm', u'epoch': u'1', u'version': u'1.6.0.0', u'release': u'1.62.1.11.11.90.el6_4', u'arch': u'x86_64'}, {u'src': None, u'name': u'java-1.6.0-openjdk-devel', u'sum': [u'md5', u'edfbb2a33ae04d69d023dcbf3100d930'], u'filename': u'java-1.6.0-openjdk-devel-1.6.0.0-1.62.1.11.11.90.el6_4.x86_64.rpm', u'epoch': u'1', u'version': u'1.6.0.0', u'release': u'1.62.1.11.11.90.el6_4', u'arch': u'x86_64'}, {u'src': None, u'name': u'java-1.6.0-openjdk-javadoc', u'sum': [u'md5', u'0cf78340100bee3e3d5f9e2c4dea9fd0'], u'filename': u'java-1.6.0-openjdk-javadoc-1.6.0.0-1.62.1.11.11.90.el6_4.x86_64.rpm', u'epoch': u'1', u'version': u'1.6.0.0', u'release': u'1.62.1.11.11.90.el6_4', u'arch': u'x86_64'}, {u'src': None, u'name': u'java-1.6.0-openjdk-src', u'sum': [u'md5', u'8d296d4b310689c86016a6db1ac5a376'], u'filename': u'java-1.6.0-openjdk-src-1.6.0.0-1.62.1.11.11.90.el6_4.x86_64.rpm', u'epoch': u'1', u'version': u'1.6.0.0', u'release': u'1.62.1.11.11.90.el6_4', u'arch': u'x86_64'}], u'name': u'ol6_x86_64_latest', u'short': u'ol6_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u'kernel\n[2.6.18-348.12.1]\n- Revert: [fs] afs: export a couple of core functions for AFS write support (Lukas Czerner) [960014 692071]\n- Revert: [fs] ext4: drop ec_type from the ext4_ext_cache structure (Lukas Czerner) [960014 692071]\n- Revert: [fs] ext4: handle NULL p_ext in ext4_ext_next_allocated_block() (Lukas Czerner) [960014 692071]\n- Revert: [fs] ext4: make FIEMAP and delayed allocation play well together (Lukas Czerner) [960014 692071]\n- Revert: [fs] ext4: Fix possibly very long loop in fiemap (Lukas Czerner) [960014 692071]\n- Revert: [fs] ext4: prevent race while walking extent tree for fiemap (Lukas Czerner) [960014 692071]\n\n[2.6.18-348.11.1]\n- Revert: [kernel] kmod: make request_module() killable (Frantisek Hrbata) [858752 858753] {CVE-2012-4398}\n- Revert: [kernel] kmod: avoid deadlock from recursive kmod call (Frantisek Hrbata) [858752 858753] {CVE-2012-4398}\n- Revert: [kernel] wait_for_helper: remove unneeded do_sigaction() (Frantisek Hrbata) [858752 858753] {CVE-2012-4398}\n- Revert: [kernel] Fix ____call_usermodehelper errs being silently ignored (Frantisek Hrbata) [858752 858753] {CVE-2012-4398}\n- Revert: [kernel] wait_for_helper: SIGCHLD from u/s cause use-after-free (Frantisek Hrbata) [858752 858753] {CVE-2012-4398}\n- Revert: [kernel] kmod: avoid deadlock from recursive request_module call (Frantisek Hrbata) [957152 949568]\n- Revert: [x86-64] non lazy sleazy fpu implementation (Prarit Bhargava) [948187 731531]\n- Revert: [i386] add sleazy FPU optimization (Prarit Bhargava) [948187 731531]\n- Revert: [x86] fpu: fix CONFIG_PREEMPT=y corruption of FPU stack (Prarit Bhargava) [948187 731531]\n- Revert: [ia64] fix KABI breakage on ia64 (Prarit Bhargava) [966878 960783]\n\n[2.6.18-348.10.1]\n- [net] Bluetooth: fix possible info leak in bt_sock_recvmsg() (Radomir Vrbovsky) [955600 955601] {CVE-2013-3224}\n- [net] Bluetooth: HCI & L2CAP information leaks (Jacob Tanenbaum) [922415 922416] {CVE-2012-6544}\n- [misc] signal: use __ARCH_HAS_SA_RESTORER instead of SA_RESTORER (Nikola Pajkovsky) [920503 920504] {CVE-2013-0914}\n- [misc] signal: always clear sa_restorer on execve (Nikola Pajkovsky) [920503 920504] {CVE-2013-0914}\n- [misc] signal: Def __ARCH_HAS_SA_RESTORER for sa_restorer clear (Nikola Pajkovsky) [920503 920504] {CVE-2013-0914}\n- [net] cxgb4: zero out another firmware request struct (Jay Fenlason) [971872 872531]\n- [net] cxgb4: clear out most firmware request structures (Jay Fenlason) [971872 872531]\n- [kernel] Make futex_wait() use an hrtimer for timeout (Prarit Bhargava) [958021 864648]\n\n[2.6.18-348.9.1]\n- [net] tg3: buffer overflow in VPD firmware parsing (Jacob Tanenbaum) [949939 949940] {CVE-2013-1929}\n- [net] atm: update msg_namelen in vcc_recvmsg() (Nikola Pajkovsky) [955222 955223] {CVE-2013-3222}\n- [fs] ext4: prevent race while walking extent tree for fiemap (Lukas Czerner) [960014 692071]\n- [fs] ext4: Fix possibly very long loop in fiemap (Lukas Czerner) [960014 692071]\n- [fs] ext4: make FIEMAP and delayed allocation play well together (Lukas Czerner) [960014 692071]\n- [fs] ext4: handle NULL p_ext in ext4_ext_next_allocated_block() (Lukas Czerner) [960014 692071]\n- [fs] ext4: drop ec_type from the ext4_ext_cache structure (Lukas Czerner) [960014 692071]\n- [fs] afs: export a couple of core functions for AFS write support (Lukas Czerner) [960014 692071]\n- [net] llc: Fix missing msg_namelen update in llc_ui_recvmsg() (Jesper Brouer) [956096 956097] {CVE-2013-3231}\n- [net] tipc: fix info leaks via msg_name in recv_msg/recv_stream (Jesper Brouer) [956148 956149] {CVE-2013-3235}\n- [net] Bluetooth: RFCOMM Fix info leak in ioctl(RFCOMMGETDEVLIST) (Radomir Vrbovsky) [922406 922407] {CVE-2012-6545}\n- [net] Bluetooth: RFCOMM - Fix info leak via getsockname() (Radomir Vrbovsky) [922406 922407] {CVE-2012-6545}\n- [kernel] kmod: avoid deadlock from recursive request_module call (Frantisek Hrbata) [957152 949568]\n- [kernel] wait_for_helper: SIGCHLD from u/s cause use-after-free (Frantisek Hrbata) [858752 858753] {CVE-2012-4398}\n- [kernel] Fix ____call_usermodehelper errs being silently ignored (Frantisek Hrbata) [858752 858753] {CVE-2012-4398}\n- [kernel] wait_for_helper: remove unneeded do_sigaction() (Frantisek Hrbata) [858752 858753] {CVE-2012-4398}\n- [kernel] kmod: avoid deadlock from recursive kmod call (Frantisek Hrbata) [858752 858753] {CVE-2012-4398}\n- [kernel] kmod: make request_module() killable (Frantisek Hrbata) [858752 858753] {CVE-2012-4398}\n\n[2.6.18-348.8.1]\n- [ia64] fix KABI breakage on ia64 (Prarit Bhargava) [966878 960783]\n\n[2.6.18-348.7.1]\n- [pci] intel-iommu: Prev devs with RMRRs from going in SI Domain (Tony Camuso) [957606 839334]', u'issued': u'2013-07-10', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELSA-2013-1034.html', u'type': u'self', u'id': None, u'title': u'ELSA-2013-1034'}, {u'href': u'http://linux.oracle.com/cve/CVE-2013-1929.html', u'type': u'cve', u'id': u'CVE-2013-1929', u'title': u'CVE-2013-1929'}, {u'href': u'http://linux.oracle.com/cve/CVE-2012-6544.html', u'type': u'cve', u'id': u'CVE-2012-6544', u'title': u'CVE-2012-6544'}, {u'href': u'http://linux.oracle.com/cve/CVE-2012-6545.html', u'type': u'cve', u'id': u'CVE-2012-6545', u'title': u'CVE-2012-6545'}, {u'href': u'http://linux.oracle.com/cve/CVE-2013-0914.html', u'type': u'cve', u'id': u'CVE-2013-0914', u'title': u'CVE-2013-0914'}, {u'href': u'http://linux.oracle.com/cve/CVE-2013-3222.html', u'type': u'cve', u'id': u'CVE-2013-3222', u'title': u'CVE-2013-3222'}, {u'href': u'http://linux.oracle.com/cve/CVE-2013-3224.html', u'type': u'cve', u'id': u'CVE-2013-3224', u'title': u'CVE-2013-3224'}, {u'href': u'http://linux.oracle.com/cve/CVE-2013-3231.html', u'type': u'cve', u'id': u'CVE-2013-3231', u'title': u'CVE-2013-3231'}, {u'href': u'http://linux.oracle.com/cve/CVE-2013-3235.html', u'type': u'cve', u'id': u'CVE-2013-3235', u'title': u'CVE-2013-3235'}], u'_content_type_id': u'erratum', u'_id': u'0594367c-f6e4-4b51-bddb-5aea50280362', u'from': u'el-errata@oss.oracle.com', u'severity': u'Low', u'title': u' kernel security and bug fix update', u'_ns': u'units_erratum', u'rights': u'Copyright 2013 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 5', u'reboot_suggested': False, u'type': u'security', u'pkglist': [{u'packages': [{u'src': None, u'name': u'kernel', u'sum': [u'md5', u'1558789911e53b7f191c9a8007eb1c82'], u'filename': u'kernel-2.6.18-348.12.1.el5.src.rpm', u'epoch': u'0', u'version': u'2.6.18', u'release': u'348.12.1.el5', u'arch': u'src'}, {u'src': None, u'name': u'kernel', u'sum': [u'md5', u'4221bf4bd5f1d970b65bb6caae2d4e81'], u'filename': u'kernel-2.6.18-348.12.1.el5.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.18', u'release': u'348.12.1.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'kernel-debug', u'sum': [u'md5', u'6a1a0d231830a6a548271269c3461cc1'], u'filename': u'kernel-debug-2.6.18-348.12.1.el5.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.18', u'release': u'348.12.1.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'kernel-debug-devel', u'sum': [u'md5', u'19e4fac7545542eade218131b2bdb7bc'], u'filename': u'kernel-debug-devel-2.6.18-348.12.1.el5.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.18', u'release': u'348.12.1.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'kernel-devel', u'sum': [u'md5', u'd336c474c2fcce20b9050d7dd7d3c179'], u'filename': u'kernel-devel-2.6.18-348.12.1.el5.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.18', u'release': u'348.12.1.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'kernel-doc', u'sum': [u'md5', u'ba4d3e3ebb9fe345cca7ee405ecad022'], u'filename': u'kernel-doc-2.6.18-348.12.1.el5.noarch.rpm', u'epoch': u'0', u'version': u'2.6.18', u'release': u'348.12.1.el5', u'arch': u'noarch'}, {u'src': None, u'name': u'kernel-headers', u'sum': [u'md5', u'e9b142baf8b82fa24e07d1c87f92e05b'], u'filename': u'kernel-headers-2.6.18-348.12.1.el5.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.18', u'release': u'348.12.1.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'kernel-xen', u'sum': [u'md5', u'bca79dd949e01a97714f4cee2c7a5df4'], u'filename': u'kernel-xen-2.6.18-348.12.1.el5.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.18', u'release': u'348.12.1.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'kernel-xen-devel', u'sum': [u'md5', u'9e2e53a3eacf3ca40973ed52753a3e60'], u'filename': u'kernel-xen-devel-2.6.18-348.12.1.el5.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.18', u'release': u'348.12.1.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'ocfs2-2.6.18-348.12.1.el5', u'sum': [u'md5', u'6f1ef16c425a38e46e1158609a811048'], u'filename': u'ocfs2-2.6.18-348.12.1.el5-1.4.10-1.el5.src.rpm', u'epoch': u'0', u'version': u'1.4.10', u'release': u'1.el5', u'arch': u'src'}, {u'src': None, u'name': u'ocfs2-2.6.18-348.12.1.el5', u'sum': [u'md5', u'f4fab17e52e2b96a75a13f5dd1b3ad0e'], u'filename': u'ocfs2-2.6.18-348.12.1.el5-1.4.10-1.el5.x86_64.rpm', u'epoch': u'0', u'version': u'1.4.10', u'release': u'1.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'ocfs2-2.6.18-348.12.1.el5debug', u'sum': [u'md5', u'b3a0d6d11cec3599f95dd080c32e9593'], u'filename': u'ocfs2-2.6.18-348.12.1.el5debug-1.4.10-1.el5.x86_64.rpm', u'epoch': u'0', u'version': u'1.4.10', u'release': u'1.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'ocfs2-2.6.18-348.12.1.el5xen', u'sum': [u'md5', u'4213ca82870f15c8ef73cf8fd9d06c83'], u'filename': u'ocfs2-2.6.18-348.12.1.el5xen-1.4.10-1.el5.x86_64.rpm', u'epoch': u'0', u'version': u'1.4.10', u'release': u'1.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'oracleasm-2.6.18-348.12.1.el5', u'sum': [u'md5', u'900dbe0d000c7c8e800c159558398801'], u'filename': u'oracleasm-2.6.18-348.12.1.el5-2.0.5-1.el5.src.rpm', u'epoch': u'0', u'version': u'2.0.5', u'release': u'1.el5', u'arch': u'src'}, {u'src': None, u'name': u'oracleasm-2.6.18-348.12.1.el5', u'sum': [u'md5', u'6cfb8da6ff3812bb38daa065361d8057'], u'filename': u'oracleasm-2.6.18-348.12.1.el5-2.0.5-1.el5.x86_64.rpm', u'epoch': u'0', u'version': u'2.0.5', u'release': u'1.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'oracleasm-2.6.18-348.12.1.el5debug', u'sum': [u'md5', u'73e8f6ea962e83ea65be23ba8b215137'], u'filename': u'oracleasm-2.6.18-348.12.1.el5debug-2.0.5-1.el5.x86_64.rpm', u'epoch': u'0', u'version': u'2.0.5', u'release': u'1.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'oracleasm-2.6.18-348.12.1.el5xen', u'sum': [u'md5', u'79239e943b0c96bd859abaf32d31bb47'], u'filename': u'oracleasm-2.6.18-348.12.1.el5xen-2.0.5-1.el5.x86_64.rpm', u'epoch': u'0', u'version': u'2.0.5', u'release': u'1.el5', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u'kernel\n[2.6.18-348.12.1.0.1]\n- [oprofile] x86, mm: Add __get_user_pages_fast() [orabug 14277030]\n- [oprofile] export __get_user_pages_fast() function [orabug 14277030]\n- [oprofile] oprofile, x86: Fix nmi-unsafe callgraph support [orabug 14277030]\n- [oprofile] oprofile: use KM_NMI slot for kmap_atomic [orabug 14277030]\n- [oprofile] oprofile: i386 add get_user_pages_fast support [orabug 14277030]\n- [kernel] Initialize the local uninitialized variable stats. [orabug 14051367]\n- [fs] JBD:make jbd support 512B blocks correctly for ocfs2. [orabug 13477763]\n- [x86 ] fix fpu context corrupt when preempt in signal context [orabug 14038272]\n- [mm] fix hugetlb page leak (Dave McCracken) [orabug 12375075]\n- fix ia64 build error due to add-support-above-32-vcpus.patch(Zhenzhong Duan)\n- [x86] use dynamic vcpu_info remap to support more than 32 vcpus (Zhenzhong Duan)\n- [x86] Fix lvt0 reset when hvm boot up with noapic param\n- [scsi] remove printks when doing I/O to a dead device (John Sobecki, Chris Mason)\n [orabug 12342275]\n- [char] ipmi: Fix IPMI errors due to timing problems (Joe Jin) [orabug 12561346]\n- [scsi] Fix race when removing SCSI devices (Joe Jin) [orabug 12404566]\n- [net] net: Redo the broken redhat netconsole over bonding (Tina Yang) [orabug 12740042]\n- [fs] nfs: Fix __put_nfs_open_context() NULL pointer panic (Joe Jin) [orabug 12687646]\n- fix filp_close() race (Joe Jin) [orabug 10335998]\n- make xenkbd.abs_pointer=1 by default [orabug 67188919]\n- [xen] check to see if hypervisor supports memory reservation change\n (Chuck Anderson) [orabug 7556514]\n- [net] Enable entropy for bnx2,bnx2x,e1000e,igb,ixgb,ixgbe,ixgbevf (John Sobecki)\n [orabug 10315433]\n- [NET] Add xen pv netconsole support (Tina Yang) [orabug 6993043] [bz 7258]\n- [mm] Patch shrink_zone to yield during severe mempressure events, avoiding\n hangs and evictions (John Sobecki,Chris Mason) [orabug 6086839]\n- [mm] Enhance shrink_zone patch allow full swap utilization, and also be\n NUMA-aware (John Sobecki,Chris Mason,Herbert van den Bergh) [orabug 9245919]\n- fix aacraid not to reset during kexec (Joe Jin) [orabug 8516042]\n- [xen] PVHVM guest with PoD crashes under memory pressure (Chuck Anderson)\n [orabug 9107465]\n- [xen] PV guest with FC HBA hangs during shutdown (Chuck Anderson)\n [orabug 9764220]\n- Support 256GB+ memory for pv guest (Mukesh Rathor) [orabug 9450615]\n- fix overcommit memory to use percpu_counter for (KOSAKI Motohiro,\n Guru Anbalagane) [orabug 6124033]\n- [ipmi] make configurable timeouts for kcs of ipmi [orabug 9752208]\n- [ib] fix memory corruption (Andy Grover) [orabug 9972346]\n- [usb] USB: fix __must_check warnings in drivers/usb/core/ (Junxiao Bi) [orabug 14795203]\n- [usb] usbcore: fix endpoint device creation (Junxiao Bi) [orabug 14795203]\n- [usb] usbcore: fix refcount bug in endpoint removal (Junxiao Bi) [orabug 14795203]\n\n[2.6.18-348.12.1]\n- Revert: [fs] afs: export a couple of core functions for AFS write support (Lukas Czerner) [960014 692071]\n- Revert: [fs] ext4: drop ec_type from the ext4_ext_cache structure (Lukas Czerner) [960014 692071]\n- Revert: [fs] ext4: handle NULL p_ext in ext4_ext_next_allocated_block() (Lukas Czerner) [960014 692071]\n- Revert: [fs] ext4: make FIEMAP and delayed allocation play well together (Lukas Czerner) [960014 692071]\n- Revert: [fs] ext4: Fix possibly very long loop in fiemap (Lukas Czerner) [960014 692071]\n- Revert: [fs] ext4: prevent race while walking extent tree for fiemap (Lukas Czerner) [960014 692071]\n\n[2.6.18-348.11.1]\n- Revert: [kernel] kmod: make request_module() killable (Frantisek Hrbata) [858752 858753] {CVE-2012-4398}\n- Revert: [kernel] kmod: avoid deadlock from recursive kmod call (Frantisek Hrbata) [858752 858753] {CVE-2012-4398}\n- Revert: [kernel] wait_for_helper: remove unneeded do_sigaction() (Frantisek Hrbata) [858752 858753] {CVE-2012-4398}\n- Revert: [kernel] Fix ____call_usermodehelper errs being silently ignored (Frantisek Hrbata) [858752 858753] {CVE-2012-4398}\n- Revert: [kernel] wait_for_helper: SIGCHLD from u/s cause use-after-free (Frantisek Hrbata) [858752 858753] {CVE-2012-4398}\n- Revert: [kernel] kmod: avoid deadlock from recursive request_module call (Frantisek Hrbata) [957152 949568]\n- Revert: [x86-64] non lazy sleazy fpu implementation (Prarit Bhargava) [948187 731531]\n- Revert: [i386] add sleazy FPU optimization (Prarit Bhargava) [948187 731531]\n- Revert: [x86] fpu: fix CONFIG_PREEMPT=y corruption of FPU stack (Prarit Bhargava) [948187 731531]\n- Revert: [ia64] fix KABI breakage on ia64 (Prarit Bhargava) [966878 960783]\n\n[2.6.18-348.10.1]\n- [net] Bluetooth: fix possible info leak in bt_sock_recvmsg() (Radomir Vrbovsky) [955600 955601] {CVE-2013-3224}\n- [net] Bluetooth: HCI & L2CAP information leaks (Jacob Tanenbaum) [922415 922416] {CVE-2012-6544}\n- [misc] signal: use __ARCH_HAS_SA_RESTORER instead of SA_RESTORER (Nikola Pajkovsky) [920503 920504] {CVE-2013-0914}\n- [misc] signal: always clear sa_restorer on execve (Nikola Pajkovsky) [920503 920504] {CVE-2013-0914}\n- [misc] signal: Def __ARCH_HAS_SA_RESTORER for sa_restorer clear (Nikola Pajkovsky) [920503 920504] {CVE-2013-0914}\n- [net] cxgb4: zero out another firmware request struct (Jay Fenlason) [971872 872531]\n- [net] cxgb4: clear out most firmware request structures (Jay Fenlason) [971872 872531]\n- [kernel] Make futex_wait() use an hrtimer for timeout (Prarit Bhargava) [958021 864648]\n\n[2.6.18-348.9.1]\n- [net] tg3: buffer overflow in VPD firmware parsing (Jacob Tanenbaum) [949939 949940] {CVE-2013-1929}\n- [net] atm: update msg_namelen in vcc_recvmsg() (Nikola Pajkovsky) [955222 955223] {CVE-2013-3222}\n- [fs] ext4: prevent race while walking extent tree for fiemap (Lukas Czerner) [960014 692071]\n- [fs] ext4: Fix possibly very long loop in fiemap (Lukas Czerner) [960014 692071]\n- [fs] ext4: make FIEMAP and delayed allocation play well together (Lukas Czerner) [960014 692071]\n- [fs] ext4: handle NULL p_ext in ext4_ext_next_allocated_block() (Lukas Czerner) [960014 692071]\n- [fs] ext4: drop ec_type from the ext4_ext_cache structure (Lukas Czerner) [960014 692071]\n- [fs] afs: export a couple of core functions for AFS write support (Lukas Czerner) [960014 692071]\n- [net] llc: Fix missing msg_namelen update in llc_ui_recvmsg() (Jesper Brouer) [956096 956097] {CVE-2013-3231}\n- [net] tipc: fix info leaks via msg_name in recv_msg/recv_stream (Jesper Brouer) [956148 956149] {CVE-2013-3235}\n- [net] Bluetooth: RFCOMM Fix info leak in ioctl(RFCOMMGETDEVLIST) (Radomir Vrbovsky) [922406 922407] {CVE-2012-6545}\n- [net] Bluetooth: RFCOMM - Fix info leak via getsockname() (Radomir Vrbovsky) [922406 922407] {CVE-2012-6545}\n- [kernel] kmod: avoid deadlock from recursive request_module call (Frantisek Hrbata) [957152 949568]\n- [kernel] wait_for_helper: SIGCHLD from u/s cause use-after-free (Frantisek Hrbata) [858752 858753] {CVE-2012-4398}\n- [kernel] Fix ____call_usermodehelper errs being silently ignored (Frantisek Hrbata) [858752 858753] {CVE-2012-4398}\n- [kernel] wait_for_helper: remove unneeded do_sigaction() (Frantisek Hrbata) [858752 858753] {CVE-2012-4398}\n- [kernel] kmod: avoid deadlock from recursive kmod call (Frantisek Hrbata) [858752 858753] {CVE-2012-4398}\n- [kernel] kmod: make request_module() killable (Frantisek Hrbata) [858752 858753] {CVE-2012-4398}\n\n[2.6.18-348.8.1]\n- [ia64] fix KABI breakage on ia64 (Prarit Bhargava) [966878 960783]\n\n[2.6.18-348.7.1]\n- [pci] intel-iommu: Prev devs with RMRRs from going in SI Domain (Tony Camuso) [957606 839334]', u'issued': u'2013-07-10', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELSA-2013-1034-1.html', u'type': u'self', u'id': None, u'title': u'ELSA-2013-1034-1'}, {u'href': u'http://linux.oracle.com/cve/CVE-2013-1929.html', u'type': u'cve', u'id': u'CVE-2013-1929', u'title': u'CVE-2013-1929'}, {u'href': u'http://linux.oracle.com/cve/CVE-2012-6544.html', u'type': u'cve', u'id': u'CVE-2012-6544', u'title': u'CVE-2012-6544'}, {u'href': u'http://linux.oracle.com/cve/CVE-2012-6545.html', u'type': u'cve', u'id': u'CVE-2012-6545', u'title': u'CVE-2012-6545'}, {u'href': u'http://linux.oracle.com/cve/CVE-2013-0914.html', u'type': u'cve', u'id': u'CVE-2013-0914', u'title': u'CVE-2013-0914'}, {u'href': u'http://linux.oracle.com/cve/CVE-2013-3222.html', u'type': u'cve', u'id': u'CVE-2013-3222', u'title': u'CVE-2013-3222'}, {u'href': u'http://linux.oracle.com/cve/CVE-2013-3224.html', u'type': u'cve', u'id': u'CVE-2013-3224', u'title': u'CVE-2013-3224'}, {u'href': u'http://linux.oracle.com/cve/CVE-2013-3231.html', u'type': u'cve', u'id': u'CVE-2013-3231', u'title': u'CVE-2013-3231'}, {u'href': u'http://linux.oracle.com/cve/CVE-2013-3235.html', u'type': u'cve', u'id': u'CVE-2013-3235', u'title': u'CVE-2013-3235'}], u'_content_type_id': u'erratum', u'_id': u'5ce13079-5461-404a-8818-7394c6caa45a', u'from': u'el-errata@oss.oracle.com', u'severity': u'Low', u'title': u' kernel security and bug fix update', u'_ns': u'units_erratum', u'rights': u'Copyright 2013 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 5', u'reboot_suggested': False, u'type': u'security', u'pkglist': [{u'packages': [{u'src': None, u'name': u'kernel', u'sum': [u'md5', u'0ab275b695627d1e77d673864db97ef0'], u'filename': u'kernel-2.6.18-348.12.1.0.1.el5.src.rpm', u'epoch': u'0', u'version': u'2.6.18', u'release': u'348.12.1.0.1.el5', u'arch': u'src'}, {u'src': None, u'name': u'kernel', u'sum': [u'md5', u'fcb60841d2ec160baf8ef76743b83164'], u'filename': u'kernel-2.6.18-348.12.1.0.1.el5.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.18', u'release': u'348.12.1.0.1.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'kernel-debug', u'sum': [u'md5', u'52891146a359673795a726755b65185f'], u'filename': u'kernel-debug-2.6.18-348.12.1.0.1.el5.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.18', u'release': u'348.12.1.0.1.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'kernel-debug-devel', u'sum': [u'md5', u'555faee054b33ca79c66190db6ba879f'], u'filename': u'kernel-debug-devel-2.6.18-348.12.1.0.1.el5.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.18', u'release': u'348.12.1.0.1.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'kernel-devel', u'sum': [u'md5', u'02f42d000cdcf1c336d72696a172759f'], u'filename': u'kernel-devel-2.6.18-348.12.1.0.1.el5.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.18', u'release': u'348.12.1.0.1.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'kernel-doc', u'sum': [u'md5', u'5506d57ef20393da6b6f4869a55c8045'], u'filename': u'kernel-doc-2.6.18-348.12.1.0.1.el5.noarch.rpm', u'epoch': u'0', u'version': u'2.6.18', u'release': u'348.12.1.0.1.el5', u'arch': u'noarch'}, {u'src': None, u'name': u'kernel-headers', u'sum': [u'md5', u'84c52f2a446c91fa02cd617a26b80a83'], u'filename': u'kernel-headers-2.6.18-348.12.1.0.1.el5.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.18', u'release': u'348.12.1.0.1.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'kernel-xen', u'sum': [u'md5', u'cd2b363f83504c517c097023f87cdccf'], u'filename': u'kernel-xen-2.6.18-348.12.1.0.1.el5.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.18', u'release': u'348.12.1.0.1.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'kernel-xen-devel', u'sum': [u'md5', u'b8c1ae74f61c9f7353476742a3337ea4'], u'filename': u'kernel-xen-devel-2.6.18-348.12.1.0.1.el5.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.18', u'release': u'348.12.1.0.1.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'ocfs2-2.6.18-348.12.1.0.1.el5', u'sum': [u'md5', u'9eb67c506c714f63b44681b1a869f76c'], u'filename': u'ocfs2-2.6.18-348.12.1.0.1.el5-1.4.10-1.el5.src.rpm', u'epoch': u'0', u'version': u'1.4.10', u'release': u'1.el5', u'arch': u'src'}, {u'src': None, u'name': u'ocfs2-2.6.18-348.12.1.0.1.el5', u'sum': [u'md5', u'3e56b5f747cffe7ea36825f6e1989b96'], u'filename': u'ocfs2-2.6.18-348.12.1.0.1.el5-1.4.10-1.el5.x86_64.rpm', u'epoch': u'0', u'version': u'1.4.10', u'release': u'1.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'ocfs2-2.6.18-348.12.1.0.1.el5debug', u'sum': [u'md5', u'a5ac369368fa989c2b32883d72df20a3'], u'filename': u'ocfs2-2.6.18-348.12.1.0.1.el5debug-1.4.10-1.el5.x86_64.rpm', u'epoch': u'0', u'version': u'1.4.10', u'release': u'1.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'ocfs2-2.6.18-348.12.1.0.1.el5xen', u'sum': [u'md5', u'47f089ddcb589236bcd2f2c17f8f1c8f'], u'filename': u'ocfs2-2.6.18-348.12.1.0.1.el5xen-1.4.10-1.el5.x86_64.rpm', u'epoch': u'0', u'version': u'1.4.10', u'release': u'1.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'oracleasm-2.6.18-348.12.1.0.1.el5', u'sum': [u'md5', u'093811bd97a1752b617aab1e21085bd0'], u'filename': u'oracleasm-2.6.18-348.12.1.0.1.el5-2.0.5-1.el5.src.rpm', u'epoch': u'0', u'version': u'2.0.5', u'release': u'1.el5', u'arch': u'src'}, {u'src': None, u'name': u'oracleasm-2.6.18-348.12.1.0.1.el5', u'sum': [u'md5', u'e85a971d5ea6f9c93e41fcd91857df60'], u'filename': u'oracleasm-2.6.18-348.12.1.0.1.el5-2.0.5-1.el5.x86_64.rpm', u'epoch': u'0', u'version': u'2.0.5', u'release': u'1.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'oracleasm-2.6.18-348.12.1.0.1.el5debug', u'sum': [u'md5', u'115b3a14a7f214177084952f501bc286'], u'filename': u'oracleasm-2.6.18-348.12.1.0.1.el5debug-2.0.5-1.el5.x86_64.rpm', u'epoch': u'0', u'version': u'2.0.5', u'release': u'1.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'oracleasm-2.6.18-348.12.1.0.1.el5xen', u'sum': [u'md5', u'03e8254a225de1565dfdb0e4e6d1f3af'], u'filename': u'oracleasm-2.6.18-348.12.1.0.1.el5xen-2.0.5-1.el5.x86_64.rpm', u'epoch': u'0', u'version': u'2.0.5', u'release': u'1.el5', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u'[5.3.3-23]\n- add security fix for CVE-2013-4113', u'issued': u'2013-07-12', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELSA-2013-1049.html', u'type': u'self', u'id': None, u'title': u'ELSA-2013-1049'}, {u'href': u'http://linux.oracle.com/cve/CVE-2013-4113.html', u'type': u'cve', u'id': u'CVE-2013-4113', u'title': u'CVE-2013-4113'}], u'_content_type_id': u'erratum', u'_id': u'a5c3c4c8-d5c6-49c0-8cf2-719976a1aea7', u'from': u'el-errata@oss.oracle.com', u'severity': u'Critical', u'title': u' php security update', u'_ns': u'units_erratum', u'rights': u'Copyright 2013 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 5', u'reboot_suggested': False, u'type': u'security', u'pkglist': [{u'packages': [{u'src': None, u'name': u'php', u'sum': [u'md5', u'cfec57182a8341a61f97b576c1db8a8b'], u'filename': u'php-5.1.6-40.el5_9.src.rpm', u'epoch': u'0', u'version': u'5.1.6', u'release': u'40.el5_9', u'arch': u'src'}, {u'src': None, u'name': u'php', u'sum': [u'md5', u'960d32cada55d930dbc463b3c1780a8e'], u'filename': u'php-5.1.6-40.el5_9.x86_64.rpm', u'epoch': u'0', u'version': u'5.1.6', u'release': u'40.el5_9', u'arch': u'x86_64'}, {u'src': None, u'name': u'php-bcmath', u'sum': [u'md5', u'8caf8e46a4af250ed39d969616dfc8fc'], u'filename': u'php-bcmath-5.1.6-40.el5_9.x86_64.rpm', u'epoch': u'0', u'version': u'5.1.6', u'release': u'40.el5_9', u'arch': u'x86_64'}, {u'src': None, u'name': u'php-cli', u'sum': [u'md5', u'9fff32bb004c285a2e498419a15c8636'], u'filename': u'php-cli-5.1.6-40.el5_9.x86_64.rpm', u'epoch': u'0', u'version': u'5.1.6', u'release': u'40.el5_9', u'arch': u'x86_64'}, {u'src': None, u'name': u'php-common', u'sum': [u'md5', u'e76db0a0cf3bbcd54f58b75aac4740fb'], u'filename': u'php-common-5.1.6-40.el5_9.x86_64.rpm', u'epoch': u'0', u'version': u'5.1.6', u'release': u'40.el5_9', u'arch': u'x86_64'}, {u'src': None, u'name': u'php-dba', u'sum': [u'md5', u'd627d2fa1c19f5a819ffd4d211347d65'], u'filename': u'php-dba-5.1.6-40.el5_9.x86_64.rpm', u'epoch': u'0', u'version': u'5.1.6', u'release': u'40.el5_9', u'arch': u'x86_64'}, {u'src': None, u'name': u'php-devel', u'sum': [u'md5', u'b76f0efb86c21cc56022a739a78ea4d3'], u'filename': u'php-devel-5.1.6-40.el5_9.x86_64.rpm', u'epoch': u'0', u'version': u'5.1.6', u'release': u'40.el5_9', u'arch': u'x86_64'}, {u'src': None, u'name': u'php-gd', u'sum': [u'md5', u'3124e9ad35750951c912417d7aca0268'], u'filename': u'php-gd-5.1.6-40.el5_9.x86_64.rpm', u'epoch': u'0', u'version': u'5.1.6', u'release': u'40.el5_9', u'arch': u'x86_64'}, {u'src': None, u'name': u'php-imap', u'sum': [u'md5', u'05b49807db65c226e0f40b932beb52de'], u'filename': u'php-imap-5.1.6-40.el5_9.x86_64.rpm', u'epoch': u'0', u'version': u'5.1.6', u'release': u'40.el5_9', u'arch': u'x86_64'}, {u'src': None, u'name': u'php-ldap', u'sum': [u'md5', u'd569e5be1b349801716e5ac92b966723'], u'filename': u'php-ldap-5.1.6-40.el5_9.x86_64.rpm', u'epoch': u'0', u'version': u'5.1.6', u'release': u'40.el5_9', u'arch': u'x86_64'}, {u'src': None, u'name': u'php-mbstring', u'sum': [u'md5', u'691d5d47b2eeb165df108a8c02cc5708'], u'filename': u'php-mbstring-5.1.6-40.el5_9.x86_64.rpm', u'epoch': u'0', u'version': u'5.1.6', u'release': u'40.el5_9', u'arch': u'x86_64'}, {u'src': None, u'name': u'php-mysql', u'sum': [u'md5', u'12e4167b12e4f9b381732c4d4d9a8ca2'], u'filename': u'php-mysql-5.1.6-40.el5_9.x86_64.rpm', u'epoch': u'0', u'version': u'5.1.6', u'release': u'40.el5_9', u'arch': u'x86_64'}, {u'src': None, u'name': u'php-ncurses', u'sum': [u'md5', u'7dee6340a549e65ea4691e59e112dcf9'], u'filename': u'php-ncurses-5.1.6-40.el5_9.x86_64.rpm', u'epoch': u'0', u'version': u'5.1.6', u'release': u'40.el5_9', u'arch': u'x86_64'}, {u'src': None, u'name': u'php-odbc', u'sum': [u'md5', u'c3ca2ee067bf2cb13269f62a5e42769e'], u'filename': u'php-odbc-5.1.6-40.el5_9.x86_64.rpm', u'epoch': u'0', u'version': u'5.1.6', u'release': u'40.el5_9', u'arch': u'x86_64'}, {u'src': None, u'name': u'php-pdo', u'sum': [u'md5', u'32d33423013c424a3a0bf3588c9d0685'], u'filename': u'php-pdo-5.1.6-40.el5_9.x86_64.rpm', u'epoch': u'0', u'version': u'5.1.6', u'release': u'40.el5_9', u'arch': u'x86_64'}, {u'src': None, u'name': u'php-pgsql', u'sum': [u'md5', u'0676b5b71a5e2f233f875656c3a8103b'], u'filename': u'php-pgsql-5.1.6-40.el5_9.x86_64.rpm', u'epoch': u'0', u'version': u'5.1.6', u'release': u'40.el5_9', u'arch': u'x86_64'}, {u'src': None, u'name': u'php-snmp', u'sum': [u'md5', u'7fbc023e4267e1882eb89e71464cc221'], u'filename': u'php-snmp-5.1.6-40.el5_9.x86_64.rpm', u'epoch': u'0', u'version': u'5.1.6', u'release': u'40.el5_9', u'arch': u'x86_64'}, {u'src': None, u'name': u'php-soap', u'sum': [u'md5', u'0fbf7273971edfffbc22e16082f13016'], u'filename': u'php-soap-5.1.6-40.el5_9.x86_64.rpm', u'epoch': u'0', u'version': u'5.1.6', u'release': u'40.el5_9', u'arch': u'x86_64'}, {u'src': None, u'name': u'php-xml', u'sum': [u'md5', u'2ff0fead867ed1e8f035eb896ae76e1a'], u'filename': u'php-xml-5.1.6-40.el5_9.x86_64.rpm', u'epoch': u'0', u'version': u'5.1.6', u'release': u'40.el5_9', u'arch': u'x86_64'}, {u'src': None, u'name': u'php-xmlrpc', u'sum': [u'md5', u'9d23a947255b76055e46d7602954f8cb'], u'filename': u'php-xmlrpc-5.1.6-40.el5_9.x86_64.rpm', u'epoch': u'0', u'version': u'5.1.6', u'release': u'40.el5_9', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}, {u'packages': [{u'src': None, u'name': u'php', u'sum': [u'md5', u'e740aff8b9fd69843ed28822b46c8a74'], u'filename': u'php-5.3.3-23.el6_4.src.rpm', u'epoch': u'0', u'version': u'5.3.3', u'release': u'23.el6_4', u'arch': u'src'}, {u'src': None, u'name': u'php', u'sum': [u'md5', u'70f0f21916fd6ffc9a12112dff8d0809'], u'filename': u'php-5.3.3-23.el6_4.x86_64.rpm', u'epoch': u'0', u'version': u'5.3.3', u'release': u'23.el6_4', u'arch': u'x86_64'}, {u'src': None, u'name': u'php-bcmath', u'sum': [u'md5', u'2fb60600f5183b72a0609a0cf211a2e9'], u'filename': u'php-bcmath-5.3.3-23.el6_4.x86_64.rpm', u'epoch': u'0', u'version': u'5.3.3', u'release': u'23.el6_4', u'arch': u'x86_64'}, {u'src': None, u'name': u'php-cli', u'sum': [u'md5', u'4c5d79843a2145d2d77bf2d4003e077f'], u'filename': u'php-cli-5.3.3-23.el6_4.x86_64.rpm', u'epoch': u'0', u'version': u'5.3.3', u'release': u'23.el6_4', u'arch': u'x86_64'}, {u'src': None, u'name': u'php-common', u'sum': [u'md5', u'013a8258e7da79fbc5c9273a4c64c018'], u'filename': u'php-common-5.3.3-23.el6_4.x86_64.rpm', u'epoch': u'0', u'version': u'5.3.3', u'release': u'23.el6_4', u'arch': u'x86_64'}, {u'src': None, u'name': u'php-dba', u'sum': [u'md5', u'054beeec290bac7a4a2bb25cc7bea89a'], u'filename': u'php-dba-5.3.3-23.el6_4.x86_64.rpm', u'epoch': u'0', u'version': u'5.3.3', u'release': u'23.el6_4', u'arch': u'x86_64'}, {u'src': None, u'name': u'php-devel', u'sum': [u'md5', u'630d11acce207c87df21c49a7dee02de'], u'filename': u'php-devel-5.3.3-23.el6_4.x86_64.rpm', u'epoch': u'0', u'version': u'5.3.3', u'release': u'23.el6_4', u'arch': u'x86_64'}, {u'src': None, u'name': u'php-embedded', u'sum': [u'md5', u'8fa038be50650b15794fb6ed32243b0d'], u'filename': u'php-embedded-5.3.3-23.el6_4.x86_64.rpm', u'epoch': u'0', u'version': u'5.3.3', u'release': u'23.el6_4', u'arch': u'x86_64'}, {u'src': None, u'name': u'php-enchant', u'sum': [u'md5', u'1b8c326843534f4d28250abe69e791c1'], u'filename': u'php-enchant-5.3.3-23.el6_4.x86_64.rpm', u'epoch': u'0', u'version': u'5.3.3', u'release': u'23.el6_4', u'arch': u'x86_64'}, {u'src': None, u'name': u'php-fpm', u'sum': [u'md5', u'bcfa831bbbc09110ef25a236fe1f7077'], u'filename': u'php-fpm-5.3.3-23.el6_4.x86_64.rpm', u'epoch': u'0', u'version': u'5.3.3', u'release': u'23.el6_4', u'arch': u'x86_64'}, {u'src': None, u'name': u'php-gd', u'sum': [u'md5', u'b8dbc6ff7ce57217a6738380d2ce92c5'], u'filename': u'php-gd-5.3.3-23.el6_4.x86_64.rpm', u'epoch': u'0', u'version': u'5.3.3', u'release': u'23.el6_4', u'arch': u'x86_64'}, {u'src': None, u'name': u'php-imap', u'sum': [u'md5', u'4b3ad40850e2f604884efa42578c0bb6'], u'filename': u'php-imap-5.3.3-23.el6_4.x86_64.rpm', u'epoch': u'0', u'version': u'5.3.3', u'release': u'23.el6_4', u'arch': u'x86_64'}, {u'src': None, u'name': u'php-intl', u'sum': [u'md5', u'782cb243d5dd945df92920d53a7f8d00'], u'filename': u'php-intl-5.3.3-23.el6_4.x86_64.rpm', u'epoch': u'0', u'version': u'5.3.3', u'release': u'23.el6_4', u'arch': u'x86_64'}, {u'src': None, u'name': u'php-ldap', u'sum': [u'md5', u'3d7b44b297e190922977af9d0b8d1852'], u'filename': u'php-ldap-5.3.3-23.el6_4.x86_64.rpm', u'epoch': u'0', u'version': u'5.3.3', u'release': u'23.el6_4', u'arch': u'x86_64'}, {u'src': None, u'name': u'php-mbstring', u'sum': [u'md5', u'eca01d41fd7abe6038cae8952a651f25'], u'filename': u'php-mbstring-5.3.3-23.el6_4.x86_64.rpm', u'epoch': u'0', u'version': u'5.3.3', u'release': u'23.el6_4', u'arch': u'x86_64'}, {u'src': None, u'name': u'php-mysql', u'sum': [u'md5', u'6b3212b6cbc0b4b321c58a9a8eb16a76'], u'filename': u'php-mysql-5.3.3-23.el6_4.x86_64.rpm', u'epoch': u'0', u'version': u'5.3.3', u'release': u'23.el6_4', u'arch': u'x86_64'}, {u'src': None, u'name': u'php-odbc', u'sum': [u'md5', u'27042e7015f00584bf13014ae38d762f'], u'filename': u'php-odbc-5.3.3-23.el6_4.x86_64.rpm', u'epoch': u'0', u'version': u'5.3.3', u'release': u'23.el6_4', u'arch': u'x86_64'}, {u'src': None, u'name': u'php-pdo', u'sum': [u'md5', u'2bd69c34f3646f89dfd8991846712204'], u'filename': u'php-pdo-5.3.3-23.el6_4.x86_64.rpm', u'epoch': u'0', u'version': u'5.3.3', u'release': u'23.el6_4', u'arch': u'x86_64'}, {u'src': None, u'name': u'php-pgsql', u'sum': [u'md5', u'd2b1b8c8bfab37b14bffbc00bb5c57d4'], u'filename': u'php-pgsql-5.3.3-23.el6_4.x86_64.rpm', u'epoch': u'0', u'version': u'5.3.3', u'release': u'23.el6_4', u'arch': u'x86_64'}, {u'src': None, u'name': u'php-process', u'sum': [u'md5', u'21072b3adca645ac7c75939795d0b245'], u'filename': u'php-process-5.3.3-23.el6_4.x86_64.rpm', u'epoch': u'0', u'version': u'5.3.3', u'release': u'23.el6_4', u'arch': u'x86_64'}, {u'src': None, u'name': u'php-pspell', u'sum': [u'md5', u'01dc03c2e9904e0c767abb5d39dd3b73'], u'filename': u'php-pspell-5.3.3-23.el6_4.x86_64.rpm', u'epoch': u'0', u'version': u'5.3.3', u'release': u'23.el6_4', u'arch': u'x86_64'}, {u'src': None, u'name': u'php-recode', u'sum': [u'md5', u'aad0c67620a328cd374212f3fca27ef2'], u'filename': u'php-recode-5.3.3-23.el6_4.x86_64.rpm', u'epoch': u'0', u'version': u'5.3.3', u'release': u'23.el6_4', u'arch': u'x86_64'}, {u'src': None, u'name': u'php-snmp', u'sum': [u'md5', u'c815da1865d93c17fab723ff82147fe0'], u'filename': u'php-snmp-5.3.3-23.el6_4.x86_64.rpm', u'epoch': u'0', u'version': u'5.3.3', u'release': u'23.el6_4', u'arch': u'x86_64'}, {u'src': None, u'name': u'php-soap', u'sum': [u'md5', u'23ac8451b7976fb04a2b8df1e265098b'], u'filename': u'php-soap-5.3.3-23.el6_4.x86_64.rpm', u'epoch': u'0', u'version': u'5.3.3', u'release': u'23.el6_4', u'arch': u'x86_64'}, {u'src': None, u'name': u'php-tidy', u'sum': [u'md5', u'fc531b7349a66a96fa28933810a34a70'], u'filename': u'php-tidy-5.3.3-23.el6_4.x86_64.rpm', u'epoch': u'0', u'version': u'5.3.3', u'release': u'23.el6_4', u'arch': u'x86_64'}, {u'src': None, u'name': u'php-xml', u'sum': [u'md5', u'78dab925d9e2ba370e6202e05cd271e1'], u'filename': u'php-xml-5.3.3-23.el6_4.x86_64.rpm', u'epoch': u'0', u'version': u'5.3.3', u'release': u'23.el6_4', u'arch': u'x86_64'}, {u'src': None, u'name': u'php-xmlrpc', u'sum': [u'md5', u'6aceace0472a34d743b693fd459b72e7'], u'filename': u'php-xmlrpc-5.3.3-23.el6_4.x86_64.rpm', u'epoch': u'0', u'version': u'5.3.3', u'release': u'23.el6_4', u'arch': u'x86_64'}, {u'src': None, u'name': u'php-zts', u'sum': [u'md5', u'00bb3b30bb6773831af488bb2003c6a1'], u'filename': u'php-zts-5.3.3-23.el6_4.x86_64.rpm', u'epoch': u'0', u'version': u'5.3.3', u'release': u'23.el6_4', u'arch': u'x86_64'}], u'name': u'ol6_x86_64_latest', u'short': u'ol6_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u'[5.3.3-13.1]\n- add security fix for CVE-2013-4113', u'issued': u'2013-07-12', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELSA-2013-1050.html', u'type': u'self', u'id': None, u'title': u'ELSA-2013-1050'}, {u'href': u'http://linux.oracle.com/cve/CVE-2013-4113.html', u'type': u'cve', u'id': u'CVE-2013-4113', u'title': u'CVE-2013-4113'}], u'_content_type_id': u'erratum', u'_id': u'56146509-ac30-4144-bd11-49ce365498e8', u'from': u'el-errata@oss.oracle.com', u'severity': u'Critical', u'title': u' php53 security update', u'_ns': u'units_erratum', u'rights': u'Copyright 2013 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 5', u'reboot_suggested': False, u'type': u'security', u'pkglist': [{u'packages': [{u'src': None, u'name': u'php53', u'sum': [u'md5', u'2ac42832eb702aff8be194df0e27aa0d'], u'filename': u'php53-5.3.3-13.el5_9.1.src.rpm', u'epoch': u'0', u'version': u'5.3.3', u'release': u'13.el5_9.1', u'arch': u'src'}, {u'src': None, u'name': u'php53', u'sum': [u'md5', u'113c464a57fc278a068e569f339e54c2'], u'filename': u'php53-5.3.3-13.el5_9.1.x86_64.rpm', u'epoch': u'0', u'version': u'5.3.3', u'release': u'13.el5_9.1', u'arch': u'x86_64'}, {u'src': None, u'name': u'php53-bcmath', u'sum': [u'md5', u'0bf9b52a53f4afe452660015cfdffc77'], u'filename': u'php53-bcmath-5.3.3-13.el5_9.1.x86_64.rpm', u'epoch': u'0', u'version': u'5.3.3', u'release': u'13.el5_9.1', u'arch': u'x86_64'}, {u'src': None, u'name': u'php53-cli', u'sum': [u'md5', u'df07eea81ebc1f53f83af29777fc5731'], u'filename': u'php53-cli-5.3.3-13.el5_9.1.x86_64.rpm', u'epoch': u'0', u'version': u'5.3.3', u'release': u'13.el5_9.1', u'arch': u'x86_64'}, {u'src': None, u'name': u'php53-common', u'sum': [u'md5', u'65c7710db897553b46184b324dec7048'], u'filename': u'php53-common-5.3.3-13.el5_9.1.x86_64.rpm', u'epoch': u'0', u'version': u'5.3.3', u'release': u'13.el5_9.1', u'arch': u'x86_64'}, {u'src': None, u'name': u'php53-dba', u'sum': [u'md5', u'a55f3277eb1bdba0977604d52653e322'], u'filename': u'php53-dba-5.3.3-13.el5_9.1.x86_64.rpm', u'epoch': u'0', u'version': u'5.3.3', u'release': u'13.el5_9.1', u'arch': u'x86_64'}, {u'src': None, u'name': u'php53-devel', u'sum': [u'md5', u'3f8ccda61b5f3dfe4304cb3100b3cb46'], u'filename': u'php53-devel-5.3.3-13.el5_9.1.x86_64.rpm', u'epoch': u'0', u'version': u'5.3.3', u'release': u'13.el5_9.1', u'arch': u'x86_64'}, {u'src': None, u'name': u'php53-gd', u'sum': [u'md5', u'079506e4e4fea928e01660a5f167ab1d'], u'filename': u'php53-gd-5.3.3-13.el5_9.1.x86_64.rpm', u'epoch': u'0', u'version': u'5.3.3', u'release': u'13.el5_9.1', u'arch': u'x86_64'}, {u'src': None, u'name': u'php53-imap', u'sum': [u'md5', u'95899b721c84d8a684c6293c85bbf441'], u'filename': u'php53-imap-5.3.3-13.el5_9.1.x86_64.rpm', u'epoch': u'0', u'version': u'5.3.3', u'release': u'13.el5_9.1', u'arch': u'x86_64'}, {u'src': None, u'name': u'php53-intl', u'sum': [u'md5', u'aca5b23b5302f9a933a44b8a08f24c03'], u'filename': u'php53-intl-5.3.3-13.el5_9.1.x86_64.rpm', u'epoch': u'0', u'version': u'5.3.3', u'release': u'13.el5_9.1', u'arch': u'x86_64'}, {u'src': None, u'name': u'php53-ldap', u'sum': [u'md5', u'6cac6191b43a2de6f8354c4858e0b428'], u'filename': u'php53-ldap-5.3.3-13.el5_9.1.x86_64.rpm', u'epoch': u'0', u'version': u'5.3.3', u'release': u'13.el5_9.1', u'arch': u'x86_64'}, {u'src': None, u'name': u'php53-mbstring', u'sum': [u'md5', u'9a31605b4b6d317ae2c2584ec4bd8bc3'], u'filename': u'php53-mbstring-5.3.3-13.el5_9.1.x86_64.rpm', u'epoch': u'0', u'version': u'5.3.3', u'release': u'13.el5_9.1', u'arch': u'x86_64'}, {u'src': None, u'name': u'php53-mysql', u'sum': [u'md5', u'356ec4bc5e999d94ad52d065f5cc0415'], u'filename': u'php53-mysql-5.3.3-13.el5_9.1.x86_64.rpm', u'epoch': u'0', u'version': u'5.3.3', u'release': u'13.el5_9.1', u'arch': u'x86_64'}, {u'src': None, u'name': u'php53-odbc', u'sum': [u'md5', u'd7955a1a4dddd12473ef99d0415e28d8'], u'filename': u'php53-odbc-5.3.3-13.el5_9.1.x86_64.rpm', u'epoch': u'0', u'version': u'5.3.3', u'release': u'13.el5_9.1', u'arch': u'x86_64'}, {u'src': None, u'name': u'php53-pdo', u'sum': [u'md5', u'b37defdb4c3149fd3b2aebc56b960c8a'], u'filename': u'php53-pdo-5.3.3-13.el5_9.1.x86_64.rpm', u'epoch': u'0', u'version': u'5.3.3', u'release': u'13.el5_9.1', u'arch': u'x86_64'}, {u'src': None, u'name': u'php53-pgsql', u'sum': [u'md5', u'ad774947493b14433174ba28ade5062f'], u'filename': u'php53-pgsql-5.3.3-13.el5_9.1.x86_64.rpm', u'epoch': u'0', u'version': u'5.3.3', u'release': u'13.el5_9.1', u'arch': u'x86_64'}, {u'src': None, u'name': u'php53-process', u'sum': [u'md5', u'e18b6806a719a2478ec151e3b4921ec8'], u'filename': u'php53-process-5.3.3-13.el5_9.1.x86_64.rpm', u'epoch': u'0', u'version': u'5.3.3', u'release': u'13.el5_9.1', u'arch': u'x86_64'}, {u'src': None, u'name': u'php53-pspell', u'sum': [u'md5', u'c78fb142139a90a3c648cfdbea7c5894'], u'filename': u'php53-pspell-5.3.3-13.el5_9.1.x86_64.rpm', u'epoch': u'0', u'version': u'5.3.3', u'release': u'13.el5_9.1', u'arch': u'x86_64'}, {u'src': None, u'name': u'php53-snmp', u'sum': [u'md5', u'd635e5b37e5567a4c1c8b744fc9d193d'], u'filename': u'php53-snmp-5.3.3-13.el5_9.1.x86_64.rpm', u'epoch': u'0', u'version': u'5.3.3', u'release': u'13.el5_9.1', u'arch': u'x86_64'}, {u'src': None, u'name': u'php53-soap', u'sum': [u'md5', u'0759c6bb07b2754b5fd4913b86d6ece9'], u'filename': u'php53-soap-5.3.3-13.el5_9.1.x86_64.rpm', u'epoch': u'0', u'version': u'5.3.3', u'release': u'13.el5_9.1', u'arch': u'x86_64'}, {u'src': None, u'name': u'php53-xml', u'sum': [u'md5', u'be757de00a0e09af3771deaa81942456'], u'filename': u'php53-xml-5.3.3-13.el5_9.1.x86_64.rpm', u'epoch': u'0', u'version': u'5.3.3', u'release': u'13.el5_9.1', u'arch': u'x86_64'}, {u'src': None, u'name': u'php53-xmlrpc', u'sum': [u'md5', u'158c61d7c1392c36c78007f49fb24227'], u'filename': u'php53-xmlrpc-5.3.3-13.el5_9.1.x86_64.rpm', u'epoch': u'0', u'version': u'5.3.3', u'release': u'13.el5_9.1', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u'[1.8.7.352-12]\n- Fix regression introduced by CVE-2013-4073\n https://bugs.ruby-lang.org/issues/8575\n * ruby-2.0.0-p255-Fix-SSL-client-connection-crash-for-SAN-marked-critical.patch\n - Related: rhbz#979300\n\n[1.8.7.352-11]\n- hostname check bypassing vulnerability in SSL client.\n * ruby-1.8.7-p374-CVE-2013-4073-fix-hostname-verification.patch\n - Resolves: rhbz#979300', u'issued': u'2013-07-17', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELSA-2013-1090.html', u'type': u'self', u'id': None, u'title': u'ELSA-2013-1090'}, {u'href': u'http://linux.oracle.com/cve/CVE-2013-4073.html', u'type': u'cve', u'id': u'CVE-2013-4073', u'title': u'CVE-2013-4073'}], u'_content_type_id': u'erratum', u'_id': u'75b48f33-faaa-4ebb-8374-f967b5cbbfb2', u'from': u'el-errata@oss.oracle.com', u'severity': u'Moderate', u'title': u' ruby security update', u'_ns': u'units_erratum', u'rights': u'Copyright 2013 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 5', u'reboot_suggested': False, u'type': u'security', u'pkglist': [{u'packages': [{u'src': None, u'name': u'ruby', u'sum': [u'md5', u'0b36a9ba8b4beb9d5c39641dd512932f'], u'filename': u'ruby-1.8.5-31.el5_9.src.rpm', u'epoch': u'0', u'version': u'1.8.5', u'release': u'31.el5_9', u'arch': u'src'}, {u'src': None, u'name': u'ruby', u'sum': [u'md5', u'5785a3c593f6e19ee5b274f211db5d28'], u'filename': u'ruby-1.8.5-31.el5_9.x86_64.rpm', u'epoch': u'0', u'version': u'1.8.5', u'release': u'31.el5_9', u'arch': u'x86_64'}, {u'src': None, u'name': u'ruby-devel', u'sum': [u'md5', u'63942b6446ecf179aa4c0d7ef7161d29'], u'filename': u'ruby-devel-1.8.5-31.el5_9.i386.rpm', u'epoch': u'0', u'version': u'1.8.5', u'release': u'31.el5_9', u'arch': u'i386'}, {u'src': None, u'name': u'ruby-devel', u'sum': [u'md5', u'8028cd154bec259c3862fdd21cee3914'], u'filename': u'ruby-devel-1.8.5-31.el5_9.x86_64.rpm', u'epoch': u'0', u'version': u'1.8.5', u'release': u'31.el5_9', u'arch': u'x86_64'}, {u'src': None, u'name': u'ruby-docs', u'sum': [u'md5', u'd9cc8ebb4ab649cd3a8db8b741a1f424'], u'filename': u'ruby-docs-1.8.5-31.el5_9.x86_64.rpm', u'epoch': u'0', u'version': u'1.8.5', u'release': u'31.el5_9', u'arch': u'x86_64'}, {u'src': None, u'name': u'ruby-irb', u'sum': [u'md5', u'75162ea306f3b12fb089d309822db1d4'], u'filename': u'ruby-irb-1.8.5-31.el5_9.x86_64.rpm', u'epoch': u'0', u'version': u'1.8.5', u'release': u'31.el5_9', u'arch': u'x86_64'}, {u'src': None, u'name': u'ruby-libs', u'sum': [u'md5', u'008f003f357acc3bf2ea3d0ff3e03447'], u'filename': u'ruby-libs-1.8.5-31.el5_9.i386.rpm', u'epoch': u'0', u'version': u'1.8.5', u'release': u'31.el5_9', u'arch': u'i386'}, {u'src': None, u'name': u'ruby-libs', u'sum': [u'md5', u'1f0c336f6b5cce9da0f9fe07f3e72f02'], u'filename': u'ruby-libs-1.8.5-31.el5_9.x86_64.rpm', u'epoch': u'0', u'version': u'1.8.5', u'release': u'31.el5_9', u'arch': u'x86_64'}, {u'src': None, u'name': u'ruby-mode', u'sum': [u'md5', u'96a27811dd8c4e6fd8f71105a2776156'], u'filename': u'ruby-mode-1.8.5-31.el5_9.x86_64.rpm', u'epoch': u'0', u'version': u'1.8.5', u'release': u'31.el5_9', u'arch': u'x86_64'}, {u'src': None, u'name': u'ruby-rdoc', u'sum': [u'md5', u'3474fc0e4c81f3e8da2159f342909fc8'], u'filename': u'ruby-rdoc-1.8.5-31.el5_9.x86_64.rpm', u'epoch': u'0', u'version': u'1.8.5', u'release': u'31.el5_9', u'arch': u'x86_64'}, {u'src': None, u'name': u'ruby-ri', u'sum': [u'md5', u'0dc20430ba0d2f3af4dca351d357499e'], u'filename': u'ruby-ri-1.8.5-31.el5_9.x86_64.rpm', u'epoch': u'0', u'version': u'1.8.5', u'release': u'31.el5_9', u'arch': u'x86_64'}, {u'src': None, u'name': u'ruby-tcltk', u'sum': [u'md5', u'606e70774c6838d5ffe877f63b317e01'], u'filename': u'ruby-tcltk-1.8.5-31.el5_9.x86_64.rpm', u'epoch': u'0', u'version': u'1.8.5', u'release': u'31.el5_9', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u'[32:9.7.0-17.P2.2]\n- fix for CVE-2013-4854', u'issued': u'2013-07-29', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELSA-2013-1115.html', u'type': u'self', u'id': None, u'title': u'ELSA-2013-1115'}, {u'href': u'http://linux.oracle.com/cve/CVE-2013-4854.html', u'type': u'cve', u'id': u'CVE-2013-4854', u'title': u'CVE-2013-4854'}], u'_content_type_id': u'erratum', u'_id': u'004eae8a-9437-4396-a7c9-582884e5ed37', u'from': u'el-errata@oss.oracle.com', u'severity': u'Important', u'title': u' bind97 security update', u'_ns': u'units_erratum', u'rights': u'Copyright 2013 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 5', u'reboot_suggested': False, u'type': u'security', u'pkglist': [{u'packages': [{u'src': None, u'name': u'bind97', u'sum': [u'md5', u'da5f1fd6213f94c8da36e57cfedee468'], u'filename': u'bind97-9.7.0-17.P2.el5_9.2.src.rpm', u'epoch': u'32', u'version': u'9.7.0', u'release': u'17.P2.el5_9.2', u'arch': u'src'}, {u'src': None, u'name': u'bind97', u'sum': [u'md5', u'358b385705fe34083ed791aee4269b04'], u'filename': u'bind97-9.7.0-17.P2.el5_9.2.x86_64.rpm', u'epoch': u'32', u'version': u'9.7.0', u'release': u'17.P2.el5_9.2', u'arch': u'x86_64'}, {u'src': None, u'name': u'bind97-chroot', u'sum': [u'md5', u'91b6a956d68d5637924988214805cb2f'], u'filename': u'bind97-chroot-9.7.0-17.P2.el5_9.2.x86_64.rpm', u'epoch': u'32', u'version': u'9.7.0', u'release': u'17.P2.el5_9.2', u'arch': u'x86_64'}, {u'src': None, u'name': u'bind97-devel', u'sum': [u'md5', u'cb67444a6268412ecf7a2415b7e585b4'], u'filename': u'bind97-devel-9.7.0-17.P2.el5_9.2.i386.rpm', u'epoch': u'32', u'version': u'9.7.0', u'release': u'17.P2.el5_9.2', u'arch': u'i386'}, {u'src': None, u'name': u'bind97-devel', u'sum': [u'md5', u'63993f23ab1373ab179fbcdac7cbd876'], u'filename': u'bind97-devel-9.7.0-17.P2.el5_9.2.x86_64.rpm', u'epoch': u'32', u'version': u'9.7.0', u'release': u'17.P2.el5_9.2', u'arch': u'x86_64'}, {u'src': None, u'name': u'bind97-libs', u'sum': [u'md5', u'5cf91ad45a8cac641b0e3f67fae0ea82'], u'filename': u'bind97-libs-9.7.0-17.P2.el5_9.2.i386.rpm', u'epoch': u'32', u'version': u'9.7.0', u'release': u'17.P2.el5_9.2', u'arch': u'i386'}, {u'src': None, u'name': u'bind97-libs', u'sum': [u'md5', u'1025874ba1c88584638966319859360a'], u'filename': u'bind97-libs-9.7.0-17.P2.el5_9.2.x86_64.rpm', u'epoch': u'32', u'version': u'9.7.0', u'release': u'17.P2.el5_9.2', u'arch': u'x86_64'}, {u'src': None, u'name': u'bind97-utils', u'sum': [u'md5', u'267dc92768188729fb4653350665e331'], u'filename': u'bind97-utils-9.7.0-17.P2.el5_9.2.x86_64.rpm', u'epoch': u'32', u'version': u'9.7.0', u'release': u'17.P2.el5_9.2', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u'[1.7-9.62.0.1.el5_9.1]\n- add patch to remove all sysrq echo commands from sysreport.legacy\n (John Sobecki) [orabug 11061754]\n- comment out rh-upload-core and README.rh-upload-core in specfile\n\n[1.7-9.62.el5_9.1]\n- Remove anaconda-ks.cfg collection from general plug-in\n Resolves: bz965807\n\n[1.7-9.62.el5_9]\n- Elide passwords in anaconda-ks.cfg and yum.repos.d\n Resolves: bz965807', u'issued': u'2013-07-30', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELSA-2013-1121.html', u'type': u'self', u'id': None, u'title': u'ELSA-2013-1121'}, {u'href': u'http://linux.oracle.com/cve/CVE-2012-2664.html', u'type': u'cve', u'id': u'CVE-2012-2664', u'title': u'CVE-2012-2664'}], u'_content_type_id': u'erratum', u'_id': u'ba31e925-b8df-4f94-89a6-d23a57629f25', u'from': u'el-errata@oss.oracle.com', u'severity': u'Low', u'title': u' sos security update', u'_ns': u'units_erratum', u'rights': u'Copyright 2013 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 5', u'reboot_suggested': False, u'type': u'security', u'pkglist': [{u'packages': [{u'src': None, u'name': u'sos', u'sum': [u'md5', u'2222b18ea9680d3b2e373a16a7e59be7'], u'filename': u'sos-1.7-9.62.0.1.el5_9.1.noarch.rpm', u'epoch': u'0', u'version': u'1.7', u'release': u'9.62.0.1.el5_9.1', u'arch': u'noarch'}, {u'src': None, u'name': u'sos', u'sum': [u'md5', u'9ac254bc611cbd7c28606e40eeae21db'], u'filename': u'sos-1.7-9.62.0.1.el5_9.1.src.rpm', u'epoch': u'0', u'version': u'1.7', u'release': u'9.62.0.1.el5_9.1', u'arch': u'src'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u"nspr\n[4.9.2-4]\n- Resolves: rhbz#924741 - Rebase to nspr-4.9.5\n\nnss\n[3.14.3-6]\n- Resolves: rhbz#986969 - nssutil_ReadSecmodDB() leaks memory\n\n[3.14.3-5]\n- Define -DNO_FORK_CHECK when compiling softoken for ABI compatibility\n- Remove the unused and obsolete nss-nochktest.patch\n- Resolves: rhbz#949845 - [RFE][RHEL5] Rebase to nss-3.14.3 to fix the lucky-13 issue\n\n[3.14.3-4]\n- Fix rpmdiff test reported failures and remove other unwanted changes\n- Resolves: rhbz#949845 - [RFE][RHEL5] Rebase to nss-3.14.3 to fix the lucky-13 issue\n\n[3.14.3-3]\n- Update to NSS_3_14_3_RTM\n- Rework the rebase to preserve needed idiosynchracies\n- Ensure we install frebl/softoken from the extra build tree\n- Don't include freebl static library or its private headers\n- Add patch to deal with system sqlite not being recent enough\n- Don't install nss-sysinit nor sharedb\n- Resolves: rhbz#949845 - [RFE][RHEL5] Rebase to nss-3.14.3 to fix the lucky-13 issue\n\n[3.14.3-2]\n- Restore the freebl-softoken source tar ball updated to 3.14.3\n- Renumbering of some sources for clarity\n- Resolves: rhbz#918870 - [RFE][RHEL5] Rebase to nss-3.14.3 to fix the lucky-13 issue\n\n[3.14.3-1]\n- Update to NSS_3_14_3_RTM\n- Resolves: rhbz#918870 - [RFE][RHEL5] Rebase to nss-3.14.3 to fix the lucky-13 issue", u'issued': u'2013-08-05', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELSA-2013-1135.html', u'type': u'self', u'id': None, u'title': u'ELSA-2013-1135'}, {u'href': u'http://linux.oracle.com/cve/CVE-2013-0791.html', u'type': u'cve', u'id': u'CVE-2013-0791', u'title': u'CVE-2013-0791'}, {u'href': u'http://linux.oracle.com/cve/CVE-2013-1620.html', u'type': u'cve', u'id': u'CVE-2013-1620', u'title': u'CVE-2013-1620'}], u'_content_type_id': u'erratum', u'_id': u'f411009e-270a-4ff9-a91a-cda6a829a71a', u'from': u'el-errata@oss.oracle.com', u'severity': u'Moderate', u'title': u' nss and nspr security, bug fix, and enhancement update', u'_ns': u'units_erratum', u'rights': u'Copyright 2013 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 5', u'reboot_suggested': False, u'type': u'security', u'pkglist': [{u'packages': [{u'src': None, u'name': u'nspr', u'sum': [u'md5', u'f94429cef6b403ddaa2280d93209b6f0'], u'filename': u'nspr-4.9.5-1.el5_9.i386.rpm', u'epoch': u'0', u'version': u'4.9.5', u'release': u'1.el5_9', u'arch': u'i386'}, {u'src': None, u'name': u'nspr', u'sum': [u'md5', u'4a9861c02f303949a95813a1cf18939e'], u'filename': u'nspr-4.9.5-1.el5_9.src.rpm', u'epoch': u'0', u'version': u'4.9.5', u'release': u'1.el5_9', u'arch': u'src'}, {u'src': None, u'name': u'nspr', u'sum': [u'md5', u'42a8f93ac08bdae88aef5c995b4a0ce4'], u'filename': u'nspr-4.9.5-1.el5_9.x86_64.rpm', u'epoch': u'0', u'version': u'4.9.5', u'release': u'1.el5_9', u'arch': u'x86_64'}, {u'src': None, u'name': u'nspr-devel', u'sum': [u'md5', u'0700db48c513e70a9397928bcfdbc296'], u'filename': u'nspr-devel-4.9.5-1.el5_9.i386.rpm', u'epoch': u'0', u'version': u'4.9.5', u'release': u'1.el5_9', u'arch': u'i386'}, {u'src': None, u'name': u'nspr-devel', u'sum': [u'md5', u'3ef9646925232146756208b001efc0d8'], u'filename': u'nspr-devel-4.9.5-1.el5_9.x86_64.rpm', u'epoch': u'0', u'version': u'4.9.5', u'release': u'1.el5_9', u'arch': u'x86_64'}, {u'src': None, u'name': u'nss', u'sum': [u'md5', u'e82951ced92bd930e6cbcc2e4bfb7cb9'], u'filename': u'nss-3.14.3-6.el5_9.i386.rpm', u'epoch': u'0', u'version': u'3.14.3', u'release': u'6.el5_9', u'arch': u'i386'}, {u'src': None, u'name': u'nss', u'sum': [u'md5', u'9ec833dddec9083f8353211bfe3e2200'], u'filename': u'nss-3.14.3-6.el5_9.src.rpm', u'epoch': u'0', u'version': u'3.14.3', u'release': u'6.el5_9', u'arch': u'src'}, {u'src': None, u'name': u'nss', u'sum': [u'md5', u'1ab1f7a01b970cf8a1c0e9b4c65ade63'], u'filename': u'nss-3.14.3-6.el5_9.x86_64.rpm', u'epoch': u'0', u'version': u'3.14.3', u'release': u'6.el5_9', u'arch': u'x86_64'}, {u'src': None, u'name': u'nss-devel', u'sum': [u'md5', u'77a9e505562651bdbd0b73dc67e1c4de'], u'filename': u'nss-devel-3.14.3-6.el5_9.i386.rpm', u'epoch': u'0', u'version': u'3.14.3', u'release': u'6.el5_9', u'arch': u'i386'}, {u'src': None, u'name': u'nss-devel', u'sum': [u'md5', u'a0ccc8dabdc0450a2eeac038d6091a7c'], u'filename': u'nss-devel-3.14.3-6.el5_9.x86_64.rpm', u'epoch': u'0', u'version': u'3.14.3', u'release': u'6.el5_9', u'arch': u'x86_64'}, {u'src': None, u'name': u'nss-pkcs11-devel', u'sum': [u'md5', u'867dfc90cc84bdaac25b9486f82f8eb6'], u'filename': u'nss-pkcs11-devel-3.14.3-6.el5_9.i386.rpm', u'epoch': u'0', u'version': u'3.14.3', u'release': u'6.el5_9', u'arch': u'i386'}, {u'src': None, u'name': u'nss-pkcs11-devel', u'sum': [u'md5', u'dd1bd4979c0e2bb49147ae059a9b675d'], u'filename': u'nss-pkcs11-devel-3.14.3-6.el5_9.x86_64.rpm', u'epoch': u'0', u'version': u'3.14.3', u'release': u'6.el5_9', u'arch': u'x86_64'}, {u'src': None, u'name': u'nss-tools', u'sum': [u'md5', u'c2fe8359c00821c36f1454cc274be343'], u'filename': u'nss-tools-3.14.3-6.el5_9.x86_64.rpm', u'epoch': u'0', u'version': u'3.14.3', u'release': u'6.el5_9', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u'firefox\n[17.0.8-1.0.1.el6_4]\n- Add firefox-oracle-default-prefs.js and remove the corresponding Red Hat ones\n\n[17.0.8-1]\n- Update to 17.0.8 ESR\n\nxulrunner\n[17.0.8-3.0.1.el6_4]\n- Replaced xulrunner-redhat-default-prefs.js with xulrunner-oracle-default-prefs.js\n- Removed XULRUNNER_VERSION from SOURCE21\n\n[17.0.8-3]\n- Update to 17.0.8 ESR Build 2\n\n[17.0.8-2]\n- Added fix for rhbz#990921 - firefox does not build with\n required nss/nspr\n\n[17.0.8-1]\n- Update to 17.0.8 ESR', u'issued': u'2013-08-07', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELSA-2013-1140.html', u'type': u'self', u'id': None, u'title': u'ELSA-2013-1140'}, {u'href': u'http://linux.oracle.com/cve/CVE-2013-1701.html', u'type': u'cve', u'id': u'CVE-2013-1701', u'title': u'CVE-2013-1701'}, {u'href': u'http://linux.oracle.com/cve/CVE-2013-1709.html', u'type': u'cve', u'id': u'CVE-2013-1709', u'title': u'CVE-2013-1709'}, {u'href': u'http://linux.oracle.com/cve/CVE-2013-1710.html', u'type': u'cve', u'id': u'CVE-2013-1710', u'title': u'CVE-2013-1710'}, {u'href': u'http://linux.oracle.com/cve/CVE-2013-1713.html', u'type': u'cve', u'id': u'CVE-2013-1713', u'title': u'CVE-2013-1713'}, {u'href': u'http://linux.oracle.com/cve/CVE-2013-1714.html', u'type': u'cve', u'id': u'CVE-2013-1714', u'title': u'CVE-2013-1714'}, {u'href': u'http://linux.oracle.com/cve/CVE-2013-1717.html', u'type': u'cve', u'id': u'CVE-2013-1717', u'title': u'CVE-2013-1717'}], u'_content_type_id': u'erratum', u'_id': u'be6ff1ee-f385-47e7-92e4-20b8ca658507', u'from': u'el-errata@oss.oracle.com', u'severity': u'Critical', u'title': u' firefox security update', u'_ns': u'units_erratum', u'rights': u'Copyright 2013 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 5', u'reboot_suggested': False, u'type': u'security', u'pkglist': [{u'packages': [{u'src': None, u'name': u'firefox', u'sum': [u'md5', u'a91ec7e7e86f5087387ecac9f4d841c8'], u'filename': u'firefox-17.0.8-1.0.1.el5_9.i386.rpm', u'epoch': u'0', u'version': u'17.0.8', u'release': u'1.0.1.el5_9', u'arch': u'i386'}, {u'src': None, u'name': u'firefox', u'sum': [u'md5', u'9f9de622e5d2d24771a9953eb17d9d15'], u'filename': u'firefox-17.0.8-1.0.1.el5_9.src.rpm', u'epoch': u'0', u'version': u'17.0.8', u'release': u'1.0.1.el5_9', u'arch': u'src'}, {u'src': None, u'name': u'firefox', u'sum': [u'md5', u'2ff64d89f8e0bc01a8df6b7207b9130a'], u'filename': u'firefox-17.0.8-1.0.1.el5_9.x86_64.rpm', u'epoch': u'0', u'version': u'17.0.8', u'release': u'1.0.1.el5_9', u'arch': u'x86_64'}, {u'src': None, u'name': u'xulrunner', u'sum': [u'md5', u'b8ff9a993deb37b68b0db6e514b70327'], u'filename': u'xulrunner-17.0.8-3.0.1.el5_9.i386.rpm', u'epoch': u'0', u'version': u'17.0.8', u'release': u'3.0.1.el5_9', u'arch': u'i386'}, {u'src': None, u'name': u'xulrunner', u'sum': [u'md5', u'ed55c385cd5c4a7b3f349eb1f280fbc6'], u'filename': u'xulrunner-17.0.8-3.0.1.el5_9.src.rpm', u'epoch': u'0', u'version': u'17.0.8', u'release': u'3.0.1.el5_9', u'arch': u'src'}, {u'src': None, u'name': u'xulrunner', u'sum': [u'md5', u'52e9b2ea4608ad4c0b4c77db853a3f52'], u'filename': u'xulrunner-17.0.8-3.0.1.el5_9.x86_64.rpm', u'epoch': u'0', u'version': u'17.0.8', u'release': u'3.0.1.el5_9', u'arch': u'x86_64'}, {u'src': None, u'name': u'xulrunner-devel', u'sum': [u'md5', u'd313b5cfadb5a1eb9c9029557a2e2a1e'], u'filename': u'xulrunner-devel-17.0.8-3.0.1.el5_9.i386.rpm', u'epoch': u'0', u'version': u'17.0.8', u'release': u'3.0.1.el5_9', u'arch': u'i386'}, {u'src': None, u'name': u'xulrunner-devel', u'sum': [u'md5', u'22d1813887ffd4f1d6cb05855cc90035'], u'filename': u'xulrunner-devel-17.0.8-3.0.1.el5_9.x86_64.rpm', u'epoch': u'0', u'version': u'17.0.8', u'release': u'3.0.1.el5_9', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u"[2.2.15-29.0.1.el6_4]\n- replace index.html with Oracle's index page oracle_index.html\n update vstring in specfile\n\n[2.2.15-29]\n- mod_dav: add security fix for CVE-2013-1896 (#991368)", u'issued': u'2013-08-13', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELSA-2013-1156.html', u'type': u'self', u'id': None, u'title': u'ELSA-2013-1156'}, {u'href': u'http://linux.oracle.com/cve/CVE-2013-1896.html', u'type': u'cve', u'id': u'CVE-2013-1896', u'title': u'CVE-2013-1896'}], u'_content_type_id': u'erratum', u'_id': u'9137d403-380f-4182-95d0-cb4a8f33761a', u'from': u'el-errata@oss.oracle.com', u'severity': u'Moderate', u'title': u' httpd security update', u'_ns': u'units_erratum', u'rights': u'Copyright 2013 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 5', u'reboot_suggested': False, u'type': u'security', u'pkglist': [{u'packages': [{u'src': None, u'name': u'httpd', u'sum': [u'md5', u'7e3b1b4df88915b81d527ad9bb47546f'], u'filename': u'httpd-2.2.3-82.0.1.el5_9.src.rpm', u'epoch': u'0', u'version': u'2.2.3', u'release': u'82.0.1.el5_9', u'arch': u'src'}, {u'src': None, u'name': u'httpd', u'sum': [u'md5', u'99c67756c49187ed274fca25a3469567'], u'filename': u'httpd-2.2.3-82.0.1.el5_9.x86_64.rpm', u'epoch': u'0', u'version': u'2.2.3', u'release': u'82.0.1.el5_9', u'arch': u'x86_64'}, {u'src': None, u'name': u'httpd-devel', u'sum': [u'md5', u'931fd33daf4d0e22591c0198ba31132d'], u'filename': u'httpd-devel-2.2.3-82.0.1.el5_9.i386.rpm', u'epoch': u'0', u'version': u'2.2.3', u'release': u'82.0.1.el5_9', u'arch': u'i386'}, {u'src': None, u'name': u'httpd-devel', u'sum': [u'md5', u'4077d15f5dd8599e8fcb3725d1b6aed7'], u'filename': u'httpd-devel-2.2.3-82.0.1.el5_9.x86_64.rpm', u'epoch': u'0', u'version': u'2.2.3', u'release': u'82.0.1.el5_9', u'arch': u'x86_64'}, {u'src': None, u'name': u'httpd-manual', u'sum': [u'md5', u'dd6a303d84e051e74568cf3dee61cf6b'], u'filename': u'httpd-manual-2.2.3-82.0.1.el5_9.x86_64.rpm', u'epoch': u'0', u'version': u'2.2.3', u'release': u'82.0.1.el5_9', u'arch': u'x86_64'}, {u'src': None, u'name': u'mod_ssl', u'sum': [u'md5', u'aa5f9ae85357ce4adbcd481efba21b8e'], u'filename': u'mod_ssl-2.2.3-82.0.1.el5_9.x86_64.rpm', u'epoch': u'1', u'version': u'2.2.3', u'release': u'82.0.1.el5_9', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u"kernel\n[2.6.18-348.16.1]\n- [x86_64] Fix kdump failure due to 'x86_64: Early segment setup' (Paolo Bonzini) [988251 987244]\n- [xen] skip tracing if it was disabled instead of dying (Igor Mammedov) [987976 967053]\n- [ia64] fix KABI breakage on ia64 (Prarit Bhargava) [966878 960783]\n- [x86] fpu: fix CONFIG_PREEMPT=y corruption of FPU stack (Prarit Bhargava) [948187 731531]\n- [i386] add sleazy FPU optimization (Prarit Bhargava) [948187 731531]\n- [x86-64] non lazy 'sleazy' fpu implementation (Prarit Bhargava) [948187 731531]\n\n[2.6.18-348.15.1]\n- [fs] nfs: flush cached dir information slightly more readily (Scott Mayhew) [976441 853145]\n- [fs] nfs: Fix resolution prob with cache_change_attribute (Scott Mayhew) [976441 853145]\n- [fs] nfs: define function to update nfsi->cache_change_attribute (Scott Mayhew) [976441 853145]\n- [net] af_key: fix info leaks in notify messages (Jiri Benc) [980999 981000] {CVE-2013-2234}\n- [net] af_key: initialize satype in key_notify_policy_flush() (Jiri Benc) [981222 981224] {CVE-2013-2237}\n- [net] ipv6: ip6_sk_dst_check() must not assume ipv6 dst (Jiri Pirko) [981556 981557] {CVE-2013-2232}\n- [net] fix invalid free in ip_cmsg_send() callers (Petr Matousek) [980141 980142] {CVE-2013-2224}\n- [x86_64] Early segment setup for VT (Paolo Bonzini) [979920 978305]\n- [block] cpqarray: info leak in ida_locked_ioctl() (Tomas Henzl) [971245 971246] {CVE-2013-2147}\n- [block] cdrom: use kzalloc() for failing hardware (Frantisek Hrbata) [973103 973104] {CVE-2013-2164}\n- [mm] Break out when there is nothing more to write for the fs. (Larry Woodman) [972583 965359]\n\n[2.6.18-348.14.1]\n- [net] Fix panic for vlan over gre via tun (Thomas Graf) [983452 981337]\n- [x86] mm: introduce proper mem barriers smp_invalidate_interrupt (Rafael Aquini) [983628 865095]\n\n[2.6.18-348.13.1]\n- [net] sctp: Disallow new connection on a closing socket (Daniel Borkmann) [976569 974936] {CVE-2013-2206}\n- [net] sctp: Use correct sideffect command in dup cookie handling (Daniel Borkmann) [976569 974936] {CVE-2013-2206}\n- [net] sctp: deal with multiple COOKIE_ECHO chunks (Daniel Borkmann) [976569 974936] {CVE-2013-2206}\n- [net] tcp: bind() use stronger condition for bind_conflict (Flavio Leitner) [980811 957604]", u'issued': u'2013-08-21', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELSA-2013-1166.html', u'type': u'self', u'id': None, u'title': u'ELSA-2013-1166'}, {u'href': u'http://linux.oracle.com/cve/CVE-2013-2147.html', u'type': u'cve', u'id': u'CVE-2013-2147', u'title': u'CVE-2013-2147'}, {u'href': u'http://linux.oracle.com/cve/CVE-2013-2164.html', u'type': u'cve', u'id': u'CVE-2013-2164', u'title': u'CVE-2013-2164'}, {u'href': u'http://linux.oracle.com/cve/CVE-2013-2206.html', u'type': u'cve', u'id': u'CVE-2013-2206', u'title': u'CVE-2013-2206'}, {u'href': u'http://linux.oracle.com/cve/CVE-2013-2224.html', u'type': u'cve', u'id': u'CVE-2013-2224', u'title': u'CVE-2013-2224'}, {u'href': u'http://linux.oracle.com/cve/CVE-2013-2232.html', u'type': u'cve', u'id': u'CVE-2013-2232', u'title': u'CVE-2013-2232'}, {u'href': u'http://linux.oracle.com/cve/CVE-2013-2234.html', u'type': u'cve', u'id': u'CVE-2013-2234', u'title': u'CVE-2013-2234'}, {u'href': u'http://linux.oracle.com/cve/CVE-2013-2237.html', u'type': u'cve', u'id': u'CVE-2013-2237', u'title': u'CVE-2013-2237'}], u'_content_type_id': u'erratum', u'_id': u'df8f481b-f821-4388-ac18-a6cea3127540', u'from': u'el-errata@oss.oracle.com', u'severity': u'Important', u'title': u' kernel security and bug fix update', u'_ns': u'units_erratum', u'rights': u'Copyright 2013 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 5', u'reboot_suggested': False, u'type': u'security', u'pkglist': [{u'packages': [{u'src': None, u'name': u'kernel', u'sum': [u'md5', u'fdb28c1fde110b823b069ad0d65ca019'], u'filename': u'kernel-2.6.18-348.16.1.el5.src.rpm', u'epoch': u'0', u'version': u'2.6.18', u'release': u'348.16.1.el5', u'arch': u'src'}, {u'src': None, u'name': u'kernel', u'sum': [u'md5', u'fb4649421037c3871e25f702d36d4fbe'], u'filename': u'kernel-2.6.18-348.16.1.el5.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.18', u'release': u'348.16.1.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'kernel-debug', u'sum': [u'md5', u'a4b299b7ebddcb2fc298dfbff8f6e06f'], u'filename': u'kernel-debug-2.6.18-348.16.1.el5.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.18', u'release': u'348.16.1.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'kernel-debug-devel', u'sum': [u'md5', u'710c17d1653055ee7e5241cbefdf0d35'], u'filename': u'kernel-debug-devel-2.6.18-348.16.1.el5.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.18', u'release': u'348.16.1.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'kernel-devel', u'sum': [u'md5', u'05c4fb0b80854d794c96a18bfdff5e39'], u'filename': u'kernel-devel-2.6.18-348.16.1.el5.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.18', u'release': u'348.16.1.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'kernel-doc', u'sum': [u'md5', u'2b4040ca63a733e3da2616fc4b6ad34f'], u'filename': u'kernel-doc-2.6.18-348.16.1.el5.noarch.rpm', u'epoch': u'0', u'version': u'2.6.18', u'release': u'348.16.1.el5', u'arch': u'noarch'}, {u'src': None, u'name': u'kernel-headers', u'sum': [u'md5', u'a733e0449ebe233de51388addc77c9ab'], u'filename': u'kernel-headers-2.6.18-348.16.1.el5.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.18', u'release': u'348.16.1.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'kernel-xen', u'sum': [u'md5', u'f096d5b61d18c7c6d3de19d1d260d001'], u'filename': u'kernel-xen-2.6.18-348.16.1.el5.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.18', u'release': u'348.16.1.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'kernel-xen-devel', u'sum': [u'md5', u'cebb00e385afc6cdea43978d1721185a'], u'filename': u'kernel-xen-devel-2.6.18-348.16.1.el5.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.18', u'release': u'348.16.1.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'ocfs2-2.6.18-348.16.1.el5', u'sum': [u'md5', u'9f5685fe680a0347d65ca309a177cbbd'], u'filename': u'ocfs2-2.6.18-348.16.1.el5-1.4.10-1.el5.src.rpm', u'epoch': u'0', u'version': u'1.4.10', u'release': u'1.el5', u'arch': u'src'}, {u'src': None, u'name': u'ocfs2-2.6.18-348.16.1.el5', u'sum': [u'md5', u'80671c0073a0dbdc010d4cd317366332'], u'filename': u'ocfs2-2.6.18-348.16.1.el5-1.4.10-1.el5.x86_64.rpm', u'epoch': u'0', u'version': u'1.4.10', u'release': u'1.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'ocfs2-2.6.18-348.16.1.el5debug', u'sum': [u'md5', u'2730b2c33bab281b3e26cea21acba865'], u'filename': u'ocfs2-2.6.18-348.16.1.el5debug-1.4.10-1.el5.x86_64.rpm', u'epoch': u'0', u'version': u'1.4.10', u'release': u'1.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'ocfs2-2.6.18-348.16.1.el5xen', u'sum': [u'md5', u'e47be162187a6a705ffc0921f530a66f'], u'filename': u'ocfs2-2.6.18-348.16.1.el5xen-1.4.10-1.el5.x86_64.rpm', u'epoch': u'0', u'version': u'1.4.10', u'release': u'1.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'oracleasm-2.6.18-348.16.1.el5', u'sum': [u'md5', u'51c025787a5f581e61244b03693662e1'], u'filename': u'oracleasm-2.6.18-348.16.1.el5-2.0.5-1.el5.src.rpm', u'epoch': u'0', u'version': u'2.0.5', u'release': u'1.el5', u'arch': u'src'}, {u'src': None, u'name': u'oracleasm-2.6.18-348.16.1.el5', u'sum': [u'md5', u'dc32eaaaaca61e1e133d5937a3524058'], u'filename': u'oracleasm-2.6.18-348.16.1.el5-2.0.5-1.el5.x86_64.rpm', u'epoch': u'0', u'version': u'2.0.5', u'release': u'1.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'oracleasm-2.6.18-348.16.1.el5debug', u'sum': [u'md5', u'4def2d033f346ee74f3b44493e9739bb'], u'filename': u'oracleasm-2.6.18-348.16.1.el5debug-2.0.5-1.el5.x86_64.rpm', u'epoch': u'0', u'version': u'2.0.5', u'release': u'1.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'oracleasm-2.6.18-348.16.1.el5xen', u'sum': [u'md5', u'3ddfc3225d76a4a80117dc82f98b935b'], u'filename': u'oracleasm-2.6.18-348.16.1.el5xen-2.0.5-1.el5.x86_64.rpm', u'epoch': u'0', u'version': u'2.0.5', u'release': u'1.el5', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u"kernel\n[2.6.18-348.16.1.0.1]\n- [oprofile] x86, mm: Add __get_user_pages_fast() [orabug 14277030]\n- [oprofile] export __get_user_pages_fast() function [orabug 14277030]\n- [oprofile] oprofile, x86: Fix nmi-unsafe callgraph support [orabug 14277030]\n- [oprofile] oprofile: use KM_NMI slot for kmap_atomic [orabug 14277030]\n- [oprofile] oprofile: i386 add get_user_pages_fast support [orabug 14277030]\n- [kernel] Initialize the local uninitialized variable stats. [orabug 14051367]\n- [fs] JBD:make jbd support 512B blocks correctly for ocfs2. [orabug 13477763]\n- [x86 ] fix fpu context corrupt when preempt in signal context [orabug 14038272]\n- [mm] fix hugetlb page leak (Dave McCracken) [orabug 12375075]\n- fix ia64 build error due to add-support-above-32-vcpus.patch(Zhenzhong Duan)\n- [x86] use dynamic vcpu_info remap to support more than 32 vcpus (Zhenzhong Duan)\n- [x86] Fix lvt0 reset when hvm boot up with noapic param\n- [scsi] remove printk's when doing I/O to a dead device (John Sobecki, Chris Mason)\n [orabug 12342275]\n- [char] ipmi: Fix IPMI errors due to timing problems (Joe Jin) [orabug 12561346]\n- [scsi] Fix race when removing SCSI devices (Joe Jin) [orabug 12404566]\n- [net] net: Redo the broken redhat netconsole over bonding (Tina Yang) [orabug 12740042]\n- [fs] nfs: Fix __put_nfs_open_context() NULL pointer panic (Joe Jin) [orabug 12687646]\n- fix filp_close() race (Joe Jin) [orabug 10335998]\n- make xenkbd.abs_pointer=1 by default [orabug 67188919]\n- [xen] check to see if hypervisor supports memory reservation change\n (Chuck Anderson) [orabug 7556514]\n- [net] Enable entropy for bnx2,bnx2x,e1000e,igb,ixgb,ixgbe,ixgbevf (John Sobecki)\n [orabug 10315433]\n- [NET] Add xen pv netconsole support (Tina Yang) [orabug 6993043] [bz 7258]\n- [mm] Patch shrink_zone to yield during severe mempressure events, avoiding\n hangs and evictions (John Sobecki,Chris Mason) [orabug 6086839]\n- [mm] Enhance shrink_zone patch allow full swap utilization, and also be\n NUMA-aware (John Sobecki,Chris Mason,Herbert van den Bergh) [orabug 9245919]\n- fix aacraid not to reset during kexec (Joe Jin) [orabug 8516042]\n- [xen] PVHVM guest with PoD crashes under memory pressure (Chuck Anderson)\n [orabug 9107465]\n- [xen] PV guest with FC HBA hangs during shutdown (Chuck Anderson)\n [orabug 9764220]\n- Support 256GB+ memory for pv guest (Mukesh Rathor) [orabug 9450615]\n- fix overcommit memory to use percpu_counter for (KOSAKI Motohiro,\n Guru Anbalagane) [orabug 6124033]\n- [ipmi] make configurable timeouts for kcs of ipmi [orabug 9752208]\n- [ib] fix memory corruption (Andy Grover) [orabug 9972346]\n- [usb] USB: fix __must_check warnings in drivers/usb/core/ (Junxiao Bi) [orabug 14795203]\n- [usb] usbcore: fix endpoint device creation (Junxiao Bi) [orabug 14795203]\n- [usb] usbcore: fix refcount bug in endpoint removal (Junxiao Bi) [orabug 14795203]", u'issued': u'2013-08-21', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELSA-2013-1166-1.html', u'type': u'self', u'id': None, u'title': u'ELSA-2013-1166-1'}, {u'href': u'http://linux.oracle.com/cve/CVE-2013-2147.html', u'type': u'cve', u'id': u'CVE-2013-2147', u'title': u'CVE-2013-2147'}, {u'href': u'http://linux.oracle.com/cve/CVE-2013-2164.html', u'type': u'cve', u'id': u'CVE-2013-2164', u'title': u'CVE-2013-2164'}, {u'href': u'http://linux.oracle.com/cve/CVE-2013-2206.html', u'type': u'cve', u'id': u'CVE-2013-2206', u'title': u'CVE-2013-2206'}, {u'href': u'http://linux.oracle.com/cve/CVE-2013-2224.html', u'type': u'cve', u'id': u'CVE-2013-2224', u'title': u'CVE-2013-2224'}, {u'href': u'http://linux.oracle.com/cve/CVE-2013-2232.html', u'type': u'cve', u'id': u'CVE-2013-2232', u'title': u'CVE-2013-2232'}, {u'href': u'http://linux.oracle.com/cve/CVE-2013-2234.html', u'type': u'cve', u'id': u'CVE-2013-2234', u'title': u'CVE-2013-2234'}, {u'href': u'http://linux.oracle.com/cve/CVE-2013-2237.html', u'type': u'cve', u'id': u'CVE-2013-2237', u'title': u'CVE-2013-2237'}], u'_content_type_id': u'erratum', u'_id': u'f7753a12-68ce-4bdf-882f-2833f2782bcd', u'from': u'el-errata@oss.oracle.com', u'severity': u'Important', u'title': u' kernel security and bug fix update', u'_ns': u'units_erratum', u'rights': u'Copyright 2013 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 5', u'reboot_suggested': False, u'type': u'security', u'pkglist': [{u'packages': [{u'src': None, u'name': u'kernel', u'sum': [u'md5', u'90ff5d7187ba08e355e9c67a98a80a7f'], u'filename': u'kernel-2.6.18-348.16.1.0.1.el5.src.rpm', u'epoch': u'0', u'version': u'2.6.18', u'release': u'348.16.1.0.1.el5', u'arch': u'src'}, {u'src': None, u'name': u'kernel', u'sum': [u'md5', u'e2dc41078e2185242aa027812cc83337'], u'filename': u'kernel-2.6.18-348.16.1.0.1.el5.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.18', u'release': u'348.16.1.0.1.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'kernel-debug', u'sum': [u'md5', u'47c77e30352cd8354c10d8219f65c5d8'], u'filename': u'kernel-debug-2.6.18-348.16.1.0.1.el5.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.18', u'release': u'348.16.1.0.1.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'kernel-debug-devel', u'sum': [u'md5', u'90cfd3e6ee2d4bd0171a8f7b20689f01'], u'filename': u'kernel-debug-devel-2.6.18-348.16.1.0.1.el5.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.18', u'release': u'348.16.1.0.1.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'kernel-devel', u'sum': [u'md5', u'88e550d4a1e17712bd43a6910baa8e08'], u'filename': u'kernel-devel-2.6.18-348.16.1.0.1.el5.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.18', u'release': u'348.16.1.0.1.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'kernel-doc', u'sum': [u'md5', u'9965feba9a55d9bf8d932dbeac713c3f'], u'filename': u'kernel-doc-2.6.18-348.16.1.0.1.el5.noarch.rpm', u'epoch': u'0', u'version': u'2.6.18', u'release': u'348.16.1.0.1.el5', u'arch': u'noarch'}, {u'src': None, u'name': u'kernel-headers', u'sum': [u'md5', u'0fdf8768ff777a2de04683f4016cd752'], u'filename': u'kernel-headers-2.6.18-348.16.1.0.1.el5.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.18', u'release': u'348.16.1.0.1.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'kernel-xen', u'sum': [u'md5', u'3d7829ac3d46ed7c5d5e294ced01c5d3'], u'filename': u'kernel-xen-2.6.18-348.16.1.0.1.el5.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.18', u'release': u'348.16.1.0.1.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'kernel-xen-devel', u'sum': [u'md5', u'd56884c90fbf2d8490db06d05d48517d'], u'filename': u'kernel-xen-devel-2.6.18-348.16.1.0.1.el5.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.18', u'release': u'348.16.1.0.1.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'ocfs2-2.6.18-348.16.1.0.1.el5', u'sum': [u'md5', u'37d927fbd238752a2d572530205c4083'], u'filename': u'ocfs2-2.6.18-348.16.1.0.1.el5-1.4.10-1.el5.src.rpm', u'epoch': u'0', u'version': u'1.4.10', u'release': u'1.el5', u'arch': u'src'}, {u'src': None, u'name': u'ocfs2-2.6.18-348.16.1.0.1.el5', u'sum': [u'md5', u'0cdf06bdf2182aecd10989765521c768'], u'filename': u'ocfs2-2.6.18-348.16.1.0.1.el5-1.4.10-1.el5.x86_64.rpm', u'epoch': u'0', u'version': u'1.4.10', u'release': u'1.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'ocfs2-2.6.18-348.16.1.0.1.el5debug', u'sum': [u'md5', u'10278610a5d85e272f560aa735cb510b'], u'filename': u'ocfs2-2.6.18-348.16.1.0.1.el5debug-1.4.10-1.el5.x86_64.rpm', u'epoch': u'0', u'version': u'1.4.10', u'release': u'1.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'ocfs2-2.6.18-348.16.1.0.1.el5xen', u'sum': [u'md5', u'dc2d6970ca90fa02a17f71ece3a7495f'], u'filename': u'ocfs2-2.6.18-348.16.1.0.1.el5xen-1.4.10-1.el5.x86_64.rpm', u'epoch': u'0', u'version': u'1.4.10', u'release': u'1.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'oracleasm-2.6.18-348.16.1.0.1.el5', u'sum': [u'md5', u'6e632f3ad4321d360a00f0e6a8621c24'], u'filename': u'oracleasm-2.6.18-348.16.1.0.1.el5-2.0.5-1.el5.src.rpm', u'epoch': u'0', u'version': u'2.0.5', u'release': u'1.el5', u'arch': u'src'}, {u'src': None, u'name': u'oracleasm-2.6.18-348.16.1.0.1.el5', u'sum': [u'md5', u'34119e1dc61834caf337b8481168db88'], u'filename': u'oracleasm-2.6.18-348.16.1.0.1.el5-2.0.5-1.el5.x86_64.rpm', u'epoch': u'0', u'version': u'2.0.5', u'release': u'1.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'oracleasm-2.6.18-348.16.1.0.1.el5debug', u'sum': [u'md5', u'60c1ba42e1e361528582118dd0c52abd'], u'filename': u'oracleasm-2.6.18-348.16.1.0.1.el5debug-2.0.5-1.el5.x86_64.rpm', u'epoch': u'0', u'version': u'2.0.5', u'release': u'1.el5', u'arch': u'x86_64'}, {u'src': None, u'name': u'oracleasm-2.6.18-348.16.1.0.1.el5xen', u'sum': [u'md5', u'66c6e2522f0b0b327d27e7d2c89e94ef'], u'filename': u'oracleasm-2.6.18-348.16.1.0.1.el5xen-2.0.5-1.el5.x86_64.rpm', u'epoch': u'0', u'version': u'2.0.5', u'release': u'1.el5', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u'[2.6.32-300.39.4]\n- exec: do not leave bprm->interp on stack (Kees Cook) [Orabug: 16286741]\n {CVE-2012-4530}\n- exec: use -ELOOP for max recursion depth (Kees Cook) [Orabug: 16286741]\n {CVE-2012-4530}\n\n[2.6.32-300.39.3]\n- Xen: Fix stack corruption in xen_failsafe_callback for 32bit PVOPS guests.\n (Frediano Ziglio) [Orabug: 16274192] {CVE-2013-0190}', u'issued': u'2013-02-06', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELSA-2013-2504.html', u'type': u'self', u'id': None, u'title': u'ELSA-2013-2504'}, {u'href': u'http://linux.oracle.com/cve/CVE-2012-4530.html', u'type': u'cve', u'id': u'CVE-2012-4530', u'title': u'CVE-2012-4530'}, {u'href': u'http://linux.oracle.com/cve/CVE-2013-0190.html', u'type': u'cve', u'id': u'CVE-2013-0190', u'title': u'CVE-2013-0190'}], u'_content_type_id': u'erratum', u'_id': u'a4535eaa-403f-42ab-a45f-28a423c25dab', u'from': u'el-errata@oss.oracle.com', u'severity': u'Moderate', u'title': u'Unbreakable Enterprise kernel security update', u'_ns': u'units_erratum', u'rights': u'Copyright 2013 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 6', u'reboot_suggested': False, u'type': u'security', u'pkglist': [{u'packages': [{u'src': None, u'name': u'kernel-uek', u'sum': [u'md5', u'5728a320e634178e6c260512789f2414'], u'filename': u'kernel-uek-2.6.32-300.39.4.el6uek.src.rpm', u'epoch': u'0', u'version': u'2.6.32', u'release': u'300.39.4.el6uek', u'arch': u'src'}, {u'src': None, u'name': u'kernel-uek', u'sum': [u'md5', u'086b766d8eecd6c855e6b2b54dfbee37'], u'filename': u'kernel-uek-2.6.32-300.39.4.el6uek.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.32', u'release': u'300.39.4.el6uek', u'arch': u'x86_64'}, {u'src': None, u'name': u'kernel-uek-debug', u'sum': [u'md5', u'bb4be4aeb9861c51abe10342ae58733c'], u'filename': u'kernel-uek-debug-2.6.32-300.39.4.el6uek.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.32', u'release': u'300.39.4.el6uek', u'arch': u'x86_64'}, {u'src': None, u'name': u'kernel-uek-debug-devel', u'sum': [u'md5', u'cf00d920ee38ef9372d1f57b919c8f00'], u'filename': u'kernel-uek-debug-devel-2.6.32-300.39.4.el6uek.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.32', u'release': u'300.39.4.el6uek', u'arch': u'x86_64'}, {u'src': None, u'name': u'kernel-uek-devel', u'sum': [u'md5', u'd999288d2dfc5357d86ea01393d514b8'], u'filename': u'kernel-uek-devel-2.6.32-300.39.4.el6uek.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.32', u'release': u'300.39.4.el6uek', u'arch': u'x86_64'}, {u'src': None, u'name': u'kernel-uek-doc', u'sum': [u'md5', u'96969790d5347f9793846383d0c851ea'], u'filename': u'kernel-uek-doc-2.6.32-300.39.4.el6uek.noarch.rpm', u'epoch': u'0', u'version': u'2.6.32', u'release': u'300.39.4.el6uek', u'arch': u'noarch'}, {u'src': None, u'name': u'kernel-uek-firmware', u'sum': [u'md5', u'739e5d226ed58eeb0959f3a435a0be9b'], u'filename': u'kernel-uek-firmware-2.6.32-300.39.4.el6uek.noarch.rpm', u'epoch': u'0', u'version': u'2.6.32', u'release': u'300.39.4.el6uek', u'arch': u'noarch'}, {u'src': None, u'name': u'kernel-uek-headers', u'sum': [u'md5', u'd51c68e0060d00c72449b13618344eb6'], u'filename': u'kernel-uek-headers-2.6.32-300.39.4.el6uek.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.32', u'release': u'300.39.4.el6uek', u'arch': u'x86_64'}, {u'src': None, u'name': u'mlnx_en-2.6.32-300.39.4.el6uek', u'sum': [u'md5', u'0cfb6779272e5e09159faadbf06e768f'], u'filename': u'mlnx_en-2.6.32-300.39.4.el6uek-1.5.7-0.1.src.rpm', u'epoch': u'0', u'version': u'1.5.7', u'release': u'0.1', u'arch': u'src'}, {u'src': None, u'name': u'mlnx_en-2.6.32-300.39.4.el6uek', u'sum': [u'md5', u'cd98fead229224422704077868c38e41'], u'filename': u'mlnx_en-2.6.32-300.39.4.el6uek-1.5.7-0.1.x86_64.rpm', u'epoch': u'0', u'version': u'1.5.7', u'release': u'0.1', u'arch': u'x86_64'}, {u'src': None, u'name': u'mlnx_en-2.6.32-300.39.4.el6uekdebug', u'sum': [u'md5', u'8cd7871ff0e5d14375b970168552781d'], u'filename': u'mlnx_en-2.6.32-300.39.4.el6uekdebug-1.5.7-0.1.x86_64.rpm', u'epoch': u'0', u'version': u'1.5.7', u'release': u'0.1', u'arch': u'x86_64'}, {u'src': None, u'name': u'ofa-2.6.32-300.39.4.el6uek', u'sum': [u'md5', u'b9ec5e830c6fa691ece3856391aab722'], u'filename': u'ofa-2.6.32-300.39.4.el6uek-1.5.1-4.0.58.src.rpm', u'epoch': u'0', u'version': u'1.5.1', u'release': u'4.0.58', u'arch': u'src'}, {u'src': None, u'name': u'ofa-2.6.32-300.39.4.el6uek', u'sum': [u'md5', u'9f1f5fcadc9ec995be3be15f1cf59b0f'], u'filename': u'ofa-2.6.32-300.39.4.el6uek-1.5.1-4.0.58.x86_64.rpm', u'epoch': u'0', u'version': u'1.5.1', u'release': u'4.0.58', u'arch': u'x86_64'}, {u'src': None, u'name': u'ofa-2.6.32-300.39.4.el6uekdebug', u'sum': [u'md5', u'89bf89784220cc35be8516e293dfa502'], u'filename': u'ofa-2.6.32-300.39.4.el6uekdebug-1.5.1-4.0.58.x86_64.rpm', u'epoch': u'0', u'version': u'1.5.1', u'release': u'4.0.58', u'arch': u'x86_64'}], u'name': u'ol6_x86_64_latest', u'short': u'ol6_x86_64_latest'}, {u'packages': [{u'src': None, u'name': u'kernel-uek', u'sum': [u'md5', u'c318febbb38dadf78ee44c035c78d340'], u'filename': u'kernel-uek-2.6.32-300.39.4.el5uek.src.rpm', u'epoch': u'0', u'version': u'2.6.32', u'release': u'300.39.4.el5uek', u'arch': u'src'}, {u'src': None, u'name': u'kernel-uek', u'sum': [u'md5', u'5bc1f71462a7c07fd8071ae0ce2886e7'], u'filename': u'kernel-uek-2.6.32-300.39.4.el5uek.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.32', u'release': u'300.39.4.el5uek', u'arch': u'x86_64'}, {u'src': None, u'name': u'kernel-uek-debug', u'sum': [u'md5', u'c5d686aede605b03f49201e94e62273e'], u'filename': u'kernel-uek-debug-2.6.32-300.39.4.el5uek.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.32', u'release': u'300.39.4.el5uek', u'arch': u'x86_64'}, {u'src': None, u'name': u'kernel-uek-debug-devel', u'sum': [u'md5', u'143ea75881ea1d0e1403f949a1126040'], u'filename': u'kernel-uek-debug-devel-2.6.32-300.39.4.el5uek.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.32', u'release': u'300.39.4.el5uek', u'arch': u'x86_64'}, {u'src': None, u'name': u'kernel-uek-devel', u'sum': [u'md5', u'ab6b1a9b538776b6de295153bd7f70dd'], u'filename': u'kernel-uek-devel-2.6.32-300.39.4.el5uek.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.32', u'release': u'300.39.4.el5uek', u'arch': u'x86_64'}, {u'src': None, u'name': u'kernel-uek-doc', u'sum': [u'md5', u'e3813bca0262d96b87993877cdb62b28'], u'filename': u'kernel-uek-doc-2.6.32-300.39.4.el5uek.noarch.rpm', u'epoch': u'0', u'version': u'2.6.32', u'release': u'300.39.4.el5uek', u'arch': u'noarch'}, {u'src': None, u'name': u'kernel-uek-firmware', u'sum': [u'md5', u'1409bf91255a2004d863b80002f401ed'], u'filename': u'kernel-uek-firmware-2.6.32-300.39.4.el5uek.noarch.rpm', u'epoch': u'0', u'version': u'2.6.32', u'release': u'300.39.4.el5uek', u'arch': u'noarch'}, {u'src': None, u'name': u'mlnx_en-2.6.32-300.39.4.el5uek', u'sum': [u'md5', u'986ae6efe331cb3b47e5e99ea9a71a5b'], u'filename': u'mlnx_en-2.6.32-300.39.4.el5uek-1.5.7-2.src.rpm', u'epoch': u'0', u'version': u'1.5.7', u'release': u'2', u'arch': u'src'}, {u'src': None, u'name': u'mlnx_en-2.6.32-300.39.4.el5uek', u'sum': [u'md5', u'3f31cd0167eb6144af03298fba8d3317'], u'filename': u'mlnx_en-2.6.32-300.39.4.el5uek-1.5.7-2.x86_64.rpm', u'epoch': u'0', u'version': u'1.5.7', u'release': u'2', u'arch': u'x86_64'}, {u'src': None, u'name': u'mlnx_en-2.6.32-300.39.4.el5uekdebug', u'sum': [u'md5', u'b9b3d95a9a1ae3e5212547b2b1b77c84'], u'filename': u'mlnx_en-2.6.32-300.39.4.el5uekdebug-1.5.7-2.x86_64.rpm', u'epoch': u'0', u'version': u'1.5.7', u'release': u'2', u'arch': u'x86_64'}, {u'src': None, u'name': u'ofa-2.6.32-300.39.4.el5uek', u'sum': [u'md5', u'da1ab5be812115e888cede65666e8c33'], u'filename': u'ofa-2.6.32-300.39.4.el5uek-1.5.1-4.0.58.src.rpm', u'epoch': u'0', u'version': u'1.5.1', u'release': u'4.0.58', u'arch': u'src'}, {u'src': None, u'name': u'ofa-2.6.32-300.39.4.el5uek', u'sum': [u'md5', u'cc55b5b32768924c81b5bbd7c6e496ef'], u'filename': u'ofa-2.6.32-300.39.4.el5uek-1.5.1-4.0.58.x86_64.rpm', u'epoch': u'0', u'version': u'1.5.1', u'release': u'4.0.58', u'arch': u'x86_64'}, {u'src': None, u'name': u'ofa-2.6.32-300.39.4.el5uekdebug', u'sum': [u'md5', u'00cce7b474775811f364dedae430ff00'], u'filename': u'ofa-2.6.32-300.39.4.el5uekdebug-1.5.1-4.0.58.x86_64.rpm', u'epoch': u'0', u'version': u'1.5.1', u'release': u'4.0.58', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u'kernel-uek\n[2.6.32-300.39.5uek]\n- x86/msr: Add capabilities check (Alan Cox) [Orabug: 16481233] {CVE-2013-0268}\n\nofa-2.6.32-300.39.5.el6uek\nmlnx_en-2.6.32-300.39.5.el6uek\n* Mon Dec 12 2011 Guru Anbalagane <guru.anbalagane@oracle.com>\n- version 1.5.7-0.1\n\n* Tue Nov 01 2011 Joe Jin <joe.jin@oracle.com>\n- 1.5.7 for UEK kernel.\n\n* Mon Sep 08 2008 Vladimir Sokolovsky <vlad@mellanox.co.il>\n- Added nfsrdma support\n\n* Wed Aug 13 2008 Vladimir Sokolovsky <vlad@mellanox.co.il>\n- Added mlx4_en support\n\n* Tue Aug 21 2007 Vladimir Sokolovsky <vlad@mellanox.co.il>\n- Added %build\nLANG=C\nexport LANG\nunset DISPLAY\n macro\n\n* Sun Jan 28 2007 Vladimir Sokolovsky <vlad@mellanox.co.il>\n- Created spec file for kernel-ib', u'issued': u'2013-03-13', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELSA-2013-2512.html', u'type': u'self', u'id': None, u'title': u'ELSA-2013-2512'}, {u'href': u'http://linux.oracle.com/cve/CVE-2013-0268.html', u'type': u'cve', u'id': u'CVE-2013-0268', u'title': u'CVE-2013-0268'}], u'_content_type_id': u'erratum', u'_id': u'2418d727-d817-4c97-8f46-2ab6078c5fbc', u'from': u'el-errata@oss.oracle.com', u'severity': u'Important', u'title': u'Unbreakable Enterprise kernel Security update', u'_ns': u'units_erratum', u'rights': u'Copyright 2013 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 6', u'reboot_suggested': False, u'type': u'security', u'pkglist': [{u'packages': [{u'src': None, u'name': u'kernel-uek', u'sum': [u'md5', u'a0a6cc933dfd9aa4d23b240338036b4d'], u'filename': u'kernel-uek-2.6.32-300.39.5.el6uek.src.rpm', u'epoch': u'0', u'version': u'2.6.32', u'release': u'300.39.5.el6uek', u'arch': u'src'}, {u'src': None, u'name': u'kernel-uek', u'sum': [u'md5', u'0e052c47b0a84c785d5f84dc4f8b7e26'], u'filename': u'kernel-uek-2.6.32-300.39.5.el6uek.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.32', u'release': u'300.39.5.el6uek', u'arch': u'x86_64'}, {u'src': None, u'name': u'kernel-uek-debug', u'sum': [u'md5', u'f80baafab6a20ae3d47a70d3e5a37513'], u'filename': u'kernel-uek-debug-2.6.32-300.39.5.el6uek.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.32', u'release': u'300.39.5.el6uek', u'arch': u'x86_64'}, {u'src': None, u'name': u'kernel-uek-debug-devel', u'sum': [u'md5', u'4796d4b5e960bcc17cbc4980a043f0aa'], u'filename': u'kernel-uek-debug-devel-2.6.32-300.39.5.el6uek.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.32', u'release': u'300.39.5.el6uek', u'arch': u'x86_64'}, {u'src': None, u'name': u'kernel-uek-devel', u'sum': [u'md5', u'08208a2720e0b87172cfbc00601b4d87'], u'filename': u'kernel-uek-devel-2.6.32-300.39.5.el6uek.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.32', u'release': u'300.39.5.el6uek', u'arch': u'x86_64'}, {u'src': None, u'name': u'kernel-uek-doc', u'sum': [u'md5', u'451d4ec5d5057c8600a1d5ee2722edb0'], u'filename': u'kernel-uek-doc-2.6.32-300.39.5.el6uek.noarch.rpm', u'epoch': u'0', u'version': u'2.6.32', u'release': u'300.39.5.el6uek', u'arch': u'noarch'}, {u'src': None, u'name': u'kernel-uek-firmware', u'sum': [u'md5', u'c03184ca82890c56d9ef87b33a4f895c'], u'filename': u'kernel-uek-firmware-2.6.32-300.39.5.el6uek.noarch.rpm', u'epoch': u'0', u'version': u'2.6.32', u'release': u'300.39.5.el6uek', u'arch': u'noarch'}, {u'src': None, u'name': u'kernel-uek-headers', u'sum': [u'md5', u'343d64d5710c8179cc187037469bac5e'], u'filename': u'kernel-uek-headers-2.6.32-300.39.5.el6uek.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.32', u'release': u'300.39.5.el6uek', u'arch': u'x86_64'}, {u'src': None, u'name': u'mlnx_en-2.6.32-300.39.5.el6uek', u'sum': [u'md5', u'f82d53a739ee854141b61f33b5df84dc'], u'filename': u'mlnx_en-2.6.32-300.39.5.el6uek-1.5.7-0.1.src.rpm', u'epoch': u'0', u'version': u'1.5.7', u'release': u'0.1', u'arch': u'src'}, {u'src': None, u'name': u'mlnx_en-2.6.32-300.39.5.el6uek', u'sum': [u'md5', u'b516e6d191a6555a84bc33782c262e6e'], u'filename': u'mlnx_en-2.6.32-300.39.5.el6uek-1.5.7-0.1.x86_64.rpm', u'epoch': u'0', u'version': u'1.5.7', u'release': u'0.1', u'arch': u'x86_64'}, {u'src': None, u'name': u'mlnx_en-2.6.32-300.39.5.el6uekdebug', u'sum': [u'md5', u'e3433a34525fccc4e48d8a952d4e50f9'], u'filename': u'mlnx_en-2.6.32-300.39.5.el6uekdebug-1.5.7-0.1.x86_64.rpm', u'epoch': u'0', u'version': u'1.5.7', u'release': u'0.1', u'arch': u'x86_64'}, {u'src': None, u'name': u'ofa-2.6.32-300.39.5.el6uek', u'sum': [u'md5', u'46ee1c2bf430cdde53fa97737331cf57'], u'filename': u'ofa-2.6.32-300.39.5.el6uek-1.5.1-4.0.58.src.rpm', u'epoch': u'0', u'version': u'1.5.1', u'release': u'4.0.58', u'arch': u'src'}, {u'src': None, u'name': u'ofa-2.6.32-300.39.5.el6uek', u'sum': [u'md5', u'f7f6656d08285564d56c3f7cda3861c4'], u'filename': u'ofa-2.6.32-300.39.5.el6uek-1.5.1-4.0.58.x86_64.rpm', u'epoch': u'0', u'version': u'1.5.1', u'release': u'4.0.58', u'arch': u'x86_64'}, {u'src': None, u'name': u'ofa-2.6.32-300.39.5.el6uekdebug', u'sum': [u'md5', u'13bf0e52411c4802bd4798e8f5719e00'], u'filename': u'ofa-2.6.32-300.39.5.el6uekdebug-1.5.1-4.0.58.x86_64.rpm', u'epoch': u'0', u'version': u'1.5.1', u'release': u'4.0.58', u'arch': u'x86_64'}], u'name': u'ol6_x86_64_latest', u'short': u'ol6_x86_64_latest'}, {u'packages': [{u'src': None, u'name': u'kernel-uek', u'sum': [u'md5', u'5b6d830027a50aad2b22c9b9e739e5b5'], u'filename': u'kernel-uek-2.6.32-300.39.5.el5uek.src.rpm', u'epoch': u'0', u'version': u'2.6.32', u'release': u'300.39.5.el5uek', u'arch': u'src'}, {u'src': None, u'name': u'kernel-uek', u'sum': [u'md5', u'6c0c8c719082b23250042755580b4bc6'], u'filename': u'kernel-uek-2.6.32-300.39.5.el5uek.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.32', u'release': u'300.39.5.el5uek', u'arch': u'x86_64'}, {u'src': None, u'name': u'kernel-uek-debug', u'sum': [u'md5', u'17a7a04dc7c511dd646e363218e827b5'], u'filename': u'kernel-uek-debug-2.6.32-300.39.5.el5uek.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.32', u'release': u'300.39.5.el5uek', u'arch': u'x86_64'}, {u'src': None, u'name': u'kernel-uek-debug-devel', u'sum': [u'md5', u'af3c8aeeec94167494b90e7e45d809b7'], u'filename': u'kernel-uek-debug-devel-2.6.32-300.39.5.el5uek.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.32', u'release': u'300.39.5.el5uek', u'arch': u'x86_64'}, {u'src': None, u'name': u'kernel-uek-devel', u'sum': [u'md5', u'eb12322c8de5047d14ce79e2c85dc884'], u'filename': u'kernel-uek-devel-2.6.32-300.39.5.el5uek.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.32', u'release': u'300.39.5.el5uek', u'arch': u'x86_64'}, {u'src': None, u'name': u'kernel-uek-doc', u'sum': [u'md5', u'862ffe74f8af5520b4098d1338e93495'], u'filename': u'kernel-uek-doc-2.6.32-300.39.5.el5uek.noarch.rpm', u'epoch': u'0', u'version': u'2.6.32', u'release': u'300.39.5.el5uek', u'arch': u'noarch'}, {u'src': None, u'name': u'kernel-uek-firmware', u'sum': [u'md5', u'b267f0a0cbca0a6679b9465488bed61c'], u'filename': u'kernel-uek-firmware-2.6.32-300.39.5.el5uek.noarch.rpm', u'epoch': u'0', u'version': u'2.6.32', u'release': u'300.39.5.el5uek', u'arch': u'noarch'}, {u'src': None, u'name': u'mlnx_en-2.6.32-300.39.5.el5uek', u'sum': [u'md5', u'41f64efa659ba2487e313659677b493b'], u'filename': u'mlnx_en-2.6.32-300.39.5.el5uek-1.5.7-2.src.rpm', u'epoch': u'0', u'version': u'1.5.7', u'release': u'2', u'arch': u'src'}, {u'src': None, u'name': u'mlnx_en-2.6.32-300.39.5.el5uek', u'sum': [u'md5', u'52bef97c31e9080833ded657205c3cf6'], u'filename': u'mlnx_en-2.6.32-300.39.5.el5uek-1.5.7-2.x86_64.rpm', u'epoch': u'0', u'version': u'1.5.7', u'release': u'2', u'arch': u'x86_64'}, {u'src': None, u'name': u'mlnx_en-2.6.32-300.39.5.el5uekdebug', u'sum': [u'md5', u'4901e3d67fd95b9319a49bfe571bd6ce'], u'filename': u'mlnx_en-2.6.32-300.39.5.el5uekdebug-1.5.7-2.x86_64.rpm', u'epoch': u'0', u'version': u'1.5.7', u'release': u'2', u'arch': u'x86_64'}, {u'src': None, u'name': u'ofa-2.6.32-300.39.5.el5uek', u'sum': [u'md5', u'79639ac2f5662785c27da373578150e7'], u'filename': u'ofa-2.6.32-300.39.5.el5uek-1.5.1-4.0.58.src.rpm', u'epoch': u'0', u'version': u'1.5.1', u'release': u'4.0.58', u'arch': u'src'}, {u'src': None, u'name': u'ofa-2.6.32-300.39.5.el5uek', u'sum': [u'md5', u'b625210e6c7a181aaa9f36f98d7b716f'], u'filename': u'ofa-2.6.32-300.39.5.el5uek-1.5.1-4.0.58.x86_64.rpm', u'epoch': u'0', u'version': u'1.5.1', u'release': u'4.0.58', u'arch': u'x86_64'}, {u'src': None, u'name': u'ofa-2.6.32-300.39.5.el5uekdebug', u'sum': [u'md5', u'e8acec6215150a657a7a11114c65c14a'], u'filename': u'ofa-2.6.32-300.39.5.el5uekdebug-1.5.1-4.0.58.x86_64.rpm', u'epoch': u'0', u'version': u'1.5.1', u'release': u'4.0.58', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u"[2.6.32-400.26.2]\n- mm/hotplug: correctly add new zone to all other nodes' zone lists (Jiang Liu) [Orabug: 16603569] {CVE-2012-5517}\n- ptrace: ptrace_resume() shouldn't wake up !TASK_TRACED thread (Oleg Nesterov) [Orabug: 16405868] {CVE-2013-0871}\n- ptrace: ensure arch_ptrace/ptrace_request can never race with SIGKILL (Oleg Nesterov) [Orabug: 16405868] {CVE-2013-0871}\n- ptrace: introduce signal_wake_up_state() and ptrace_signal_wake_up() (Oleg Nesterov) [Orabug: 16405868] {CVE-2013-0871}\n- Bluetooth: Fix incorrect strncpy() in hidp_setup_hid() (Anderson Lizardo) [Orabug: 16711062] {CVE-2013-0349}\n- dccp: check ccid before dereferencing (Mathias Krause) [Orabug: 16711040] {CVE-2013-1827}\n- USB: io_ti: Fix NULL dereference in chase_port() (Wolfgang Frisch) [Orabug: 16425435] {CVE-2013-1774}\n- keys: fix race with concurrent install_user_keyrings() (David Howells) [Orabug: 16493369] {CVE-2013-1792}\n- KVM: Fix bounds checking in ioapic indirect register reads (CVE-2013-1798) (Andy Honig) [Orabug: 16710937] {CVE-2013-1798}\n- KVM: x86: fix for buffer overflow in handling of MSR_KVM_SYSTEM_TIME (CVE-2013-1796) (Jerry Snitselaar) [Orabug: 16710794] {CVE-2013-1796}\n- net/tun: fix ioctl() based info leaks (Mathias Krause) [Orabug: 16675501] {CVE-2012-6547}\n- atm: fix info leak via getsockname() (Mathias Krause) [Orabug: 16675501] {CVE-2012-6546}\n- atm: fix info leak in getsockopt(SO_ATMPVC) (Mathias Krause) [Orabug: 16675501] {CVE-2012-6546}\n- xfrm_user: fix info leak in copy_to_user_tmpl() (Mathias Krause) [Orabug: 16675501] {CVE-2012-6537}\n- xfrm_user: fix info leak in copy_to_user_policy() (Mathias Krause) [Orabug: 16675501] {CVE-2012-6537}\n- xfrm_user: fix info leak in copy_to_user_state() (Mathias Krause) [Orabug: 16675501] {CVE-2013-6537}\n- xfrm_user: return error pointer instead of NULL #2 (Mathias Krause) [Orabug: 16675501] {CVE-2013-1826}\n- xfrm_user: return error pointer instead of NULL (Mathias Krause) [Orabug: 16675501] {CVE-2013-1826}\n", u'issued': u'2013-04-24', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELSA-2013-2520.html', u'type': u'self', u'id': None, u'title': u'ELSA-2013-2520'}, {u'href': u'http://linux.oracle.com/cve/CVE-2012-4508.html', u'type': u'cve', u'id': u'CVE-2012-4508', u'title': u'CVE-2012-4508'}, {u'href': u'http://linux.oracle.com/cve/CVE-2012-5517.html', u'type': u'cve', u'id': u'CVE-2012-5517', u'title': u'CVE-2012-5517'}, {u'href': u'http://linux.oracle.com/cve/CVE-2013-0309.html', u'type': u'cve', u'id': u'CVE-2013-0309', u'title': u'CVE-2013-0309'}, {u'href': u'http://linux.oracle.com/cve/CVE-2013-0310.html', u'type': u'cve', u'id': u'CVE-2013-0310', u'title': u'CVE-2013-0310'}, {u'href': u'http://linux.oracle.com/cve/CVE-2013-0871.html', u'type': u'cve', u'id': u'CVE-2013-0871', u'title': u'CVE-2013-0871'}, {u'href': u'http://linux.oracle.com/cve/CVE-2013-1796.html', u'type': u'cve', u'id': u'CVE-2013-1796', u'title': u'CVE-2013-1796'}, {u'href': u'http://linux.oracle.com/cve/CVE-2013-1798.html', u'type': u'cve', u'id': u'CVE-2013-1798', u'title': u'CVE-2013-1798'}, {u'href': u'http://linux.oracle.com/cve/CVE-2012-6537.html', u'type': u'cve', u'id': u'CVE-2012-6537', u'title': u'CVE-2012-6537'}, {u'href': u'http://linux.oracle.com/cve/CVE-2012-6546.html', u'type': u'cve', u'id': u'CVE-2012-6546', u'title': u'CVE-2012-6546'}, {u'href': u'http://linux.oracle.com/cve/CVE-2012-6547.html', u'type': u'cve', u'id': u'CVE-2012-6547', u'title': u'CVE-2012-6547'}, {u'href': u'http://linux.oracle.com/cve/CVE-2013-1826.html', u'type': u'cve', u'id': u'CVE-2013-1826', u'title': u'CVE-2013-1826'}, {u'href': u'http://linux.oracle.com/cve/CVE-2013-0349.html', u'type': u'cve', u'id': u'CVE-2013-0349', u'title': u'CVE-2013-0349'}, {u'href': u'http://linux.oracle.com/cve/CVE-2013-1774.html', u'type': u'cve', u'id': u'CVE-2013-1774', u'title': u'CVE-2013-1774'}, {u'href': u'http://linux.oracle.com/cve/CVE-2013-1792.html', u'type': u'cve', u'id': u'CVE-2013-1792', u'title': u'CVE-2013-1792'}, {u'href': u'http://linux.oracle.com/cve/CVE-2013-1827.html', u'type': u'cve', u'id': u'CVE-2013-1827', u'title': u'CVE-2013-1827'}], u'_content_type_id': u'erratum', u'_id': u'b84dcc15-e019-4dca-a61e-76441a90a677', u'from': u'el-errata@oss.oracle.com', u'severity': u'Important', u'title': u'Unbreakable Enterprise kernel security update', u'_ns': u'units_erratum', u'rights': u'Copyright 2013 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 6', u'reboot_suggested': False, u'type': u'security', u'pkglist': [{u'packages': [{u'src': None, u'name': u'kernel-uek', u'sum': [u'md5', u'de1389b893500303d87f168fcb4cfbea'], u'filename': u'kernel-uek-2.6.32-400.26.2.el6uek.src.rpm', u'epoch': u'0', u'version': u'2.6.32', u'release': u'400.26.2.el6uek', u'arch': u'src'}, {u'src': None, u'name': u'kernel-uek', u'sum': [u'md5', u'692ff5c64f654bfa45f629eb7fd2abe0'], u'filename': u'kernel-uek-2.6.32-400.26.2.el6uek.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.32', u'release': u'400.26.2.el6uek', u'arch': u'x86_64'}, {u'src': None, u'name': u'kernel-uek-debug', u'sum': [u'md5', u'1edc4499186d2ede1fda6faac50d8d52'], u'filename': u'kernel-uek-debug-2.6.32-400.26.2.el6uek.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.32', u'release': u'400.26.2.el6uek', u'arch': u'x86_64'}, {u'src': None, u'name': u'kernel-uek-debug-devel', u'sum': [u'md5', u'36d1c4aca6a56c4620bed3f1d7e4f9a4'], u'filename': u'kernel-uek-debug-devel-2.6.32-400.26.2.el6uek.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.32', u'release': u'400.26.2.el6uek', u'arch': u'x86_64'}, {u'src': None, u'name': u'kernel-uek-devel', u'sum': [u'md5', u'71e3562ff8f7c5d1cff9c703b2517e4b'], u'filename': u'kernel-uek-devel-2.6.32-400.26.2.el6uek.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.32', u'release': u'400.26.2.el6uek', u'arch': u'x86_64'}, {u'src': None, u'name': u'kernel-uek-doc', u'sum': [u'md5', u'31db12ac107f2f2209b758cc58d76d99'], u'filename': u'kernel-uek-doc-2.6.32-400.26.2.el6uek.noarch.rpm', u'epoch': u'0', u'version': u'2.6.32', u'release': u'400.26.2.el6uek', u'arch': u'noarch'}, {u'src': None, u'name': u'kernel-uek-firmware', u'sum': [u'md5', u'234e78e44baee4da38c55a3df6d55a56'], u'filename': u'kernel-uek-firmware-2.6.32-400.26.2.el6uek.noarch.rpm', u'epoch': u'0', u'version': u'2.6.32', u'release': u'400.26.2.el6uek', u'arch': u'noarch'}, {u'src': None, u'name': u'kernel-uek-headers', u'sum': [u'md5', u'038a5fd747f146cbab63716e350a8e09'], u'filename': u'kernel-uek-headers-2.6.32-400.26.2.el6uek.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.32', u'release': u'400.26.2.el6uek', u'arch': u'x86_64'}, {u'src': None, u'name': u'mlnx_en-2.6.32-400.26.2.el6uek', u'sum': [u'md5', u'962ca59557edc35e8eaa3c7dbcd1affe'], u'filename': u'mlnx_en-2.6.32-400.26.2.el6uek-1.5.7-0.1.src.rpm', u'epoch': u'0', u'version': u'1.5.7', u'release': u'0.1', u'arch': u'src'}, {u'src': None, u'name': u'mlnx_en-2.6.32-400.26.2.el6uek', u'sum': [u'md5', u'bddd20720c351283f13849f31013c1fe'], u'filename': u'mlnx_en-2.6.32-400.26.2.el6uek-1.5.7-0.1.x86_64.rpm', u'epoch': u'0', u'version': u'1.5.7', u'release': u'0.1', u'arch': u'x86_64'}, {u'src': None, u'name': u'mlnx_en-2.6.32-400.26.2.el6uekdebug', u'sum': [u'md5', u'502095aaea49953c3064cb410107a308'], u'filename': u'mlnx_en-2.6.32-400.26.2.el6uekdebug-1.5.7-0.1.x86_64.rpm', u'epoch': u'0', u'version': u'1.5.7', u'release': u'0.1', u'arch': u'x86_64'}, {u'src': None, u'name': u'ofa-2.6.32-400.26.2.el6uek', u'sum': [u'md5', u'd4dfa38df0c101b1c9e3f433b9e9b0a7'], u'filename': u'ofa-2.6.32-400.26.2.el6uek-1.5.1-4.0.58.src.rpm', u'epoch': u'0', u'version': u'1.5.1', u'release': u'4.0.58', u'arch': u'src'}, {u'src': None, u'name': u'ofa-2.6.32-400.26.2.el6uek', u'sum': [u'md5', u'15cad49338253dbb02772bb121ce8197'], u'filename': u'ofa-2.6.32-400.26.2.el6uek-1.5.1-4.0.58.x86_64.rpm', u'epoch': u'0', u'version': u'1.5.1', u'release': u'4.0.58', u'arch': u'x86_64'}, {u'src': None, u'name': u'ofa-2.6.32-400.26.2.el6uekdebug', u'sum': [u'md5', u'48ace3dfee52b56fa9257d4062d5b16b'], u'filename': u'ofa-2.6.32-400.26.2.el6uekdebug-1.5.1-4.0.58.x86_64.rpm', u'epoch': u'0', u'version': u'1.5.1', u'release': u'4.0.58', u'arch': u'x86_64'}], u'name': u'ol6_x86_64_latest', u'short': u'ol6_x86_64_latest'}, {u'packages': [{u'src': None, u'name': u'kernel-uek', u'sum': [u'md5', u'4ce1c11df7f8de94f6152bef65e994c1'], u'filename': u'kernel-uek-2.6.32-400.26.2.el5uek.src.rpm', u'epoch': u'0', u'version': u'2.6.32', u'release': u'400.26.2.el5uek', u'arch': u'src'}, {u'src': None, u'name': u'kernel-uek', u'sum': [u'md5', u'38bbfa91c70e80a02149e799447f0c1c'], u'filename': u'kernel-uek-2.6.32-400.26.2.el5uek.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.32', u'release': u'400.26.2.el5uek', u'arch': u'x86_64'}, {u'src': None, u'name': u'kernel-uek-debug', u'sum': [u'md5', u'001e92c50391d92374af1874e2d4a2ba'], u'filename': u'kernel-uek-debug-2.6.32-400.26.2.el5uek.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.32', u'release': u'400.26.2.el5uek', u'arch': u'x86_64'}, {u'src': None, u'name': u'kernel-uek-debug-devel', u'sum': [u'md5', u'd8a0af75a4fe9a3b2f2e2cb3d8624062'], u'filename': u'kernel-uek-debug-devel-2.6.32-400.26.2.el5uek.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.32', u'release': u'400.26.2.el5uek', u'arch': u'x86_64'}, {u'src': None, u'name': u'kernel-uek-devel', u'sum': [u'md5', u'4e3fac684e6deb7ad025d889b17893de'], u'filename': u'kernel-uek-devel-2.6.32-400.26.2.el5uek.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.32', u'release': u'400.26.2.el5uek', u'arch': u'x86_64'}, {u'src': None, u'name': u'kernel-uek-doc', u'sum': [u'md5', u'a9aeb9a39888b3b8be2f6da1b2d19908'], u'filename': u'kernel-uek-doc-2.6.32-400.26.2.el5uek.noarch.rpm', u'epoch': u'0', u'version': u'2.6.32', u'release': u'400.26.2.el5uek', u'arch': u'noarch'}, {u'src': None, u'name': u'kernel-uek-firmware', u'sum': [u'md5', u'671e0b3d3f690275a8933351a8149d27'], u'filename': u'kernel-uek-firmware-2.6.32-400.26.2.el5uek.noarch.rpm', u'epoch': u'0', u'version': u'2.6.32', u'release': u'400.26.2.el5uek', u'arch': u'noarch'}, {u'src': None, u'name': u'mlnx_en-2.6.32-400.26.2.el5uek', u'sum': [u'md5', u'527483787132d46566a8afb49d42e4d4'], u'filename': u'mlnx_en-2.6.32-400.26.2.el5uek-1.5.7-2.src.rpm', u'epoch': u'0', u'version': u'1.5.7', u'release': u'2', u'arch': u'src'}, {u'src': None, u'name': u'mlnx_en-2.6.32-400.26.2.el5uek', u'sum': [u'md5', u'60bf08928e5bb4c58c11b8ce8435d38d'], u'filename': u'mlnx_en-2.6.32-400.26.2.el5uek-1.5.7-2.x86_64.rpm', u'epoch': u'0', u'version': u'1.5.7', u'release': u'2', u'arch': u'x86_64'}, {u'src': None, u'name': u'mlnx_en-2.6.32-400.26.2.el5uekdebug', u'sum': [u'md5', u'c28c19d527f3c6f6aefcc272413adf88'], u'filename': u'mlnx_en-2.6.32-400.26.2.el5uekdebug-1.5.7-2.x86_64.rpm', u'epoch': u'0', u'version': u'1.5.7', u'release': u'2', u'arch': u'x86_64'}, {u'src': None, u'name': u'ofa-2.6.32-400.26.2.el5uek', u'sum': [u'md5', u'8a232e1c16816aee3e7b6f4202031e8e'], u'filename': u'ofa-2.6.32-400.26.2.el5uek-1.5.1-4.0.58.src.rpm', u'epoch': u'0', u'version': u'1.5.1', u'release': u'4.0.58', u'arch': u'src'}, {u'src': None, u'name': u'ofa-2.6.32-400.26.2.el5uek', u'sum': [u'md5', u'd42a42cb192f63a78e3f559045271ea8'], u'filename': u'ofa-2.6.32-400.26.2.el5uek-1.5.1-4.0.58.x86_64.rpm', u'epoch': u'0', u'version': u'1.5.1', u'release': u'4.0.58', u'arch': u'x86_64'}, {u'src': None, u'name': u'ofa-2.6.32-400.26.2.el5uekdebug', u'sum': [u'md5', u'3af2b57ebd9d412229a3bc54559ae012'], u'filename': u'ofa-2.6.32-400.26.2.el5uekdebug-1.5.1-4.0.58.x86_64.rpm', u'epoch': u'0', u'version': u'1.5.1', u'release': u'4.0.58', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u"[2.6.32-400.29.1]\n- KVM: add missing void __user COPYING CREDITS Documentation Kbuild MAINTAINERS Makefile README REPORTING-BUGS arch block crypto drivers firmware fs include init ipc kernel lib mm net samples scripts security sound tools uek-rpm usr virt cast to access_ok() call (Heiko Carstens) [Orabug: 16941620] {CVE-2013-1943}\n- KVM: Validate userspace_addr of memslot when registered (Takuya Yoshikawa) [Orabug: 16941620] {CVE-2013-1943}\n\n[2.6.32-400.28.1]\n- do_add_mount()/umount -l races (Jerry Snitselaar) [Orabug: 16311974]\n- tg3: fix length overflow in VPD firmware parsing (Kees Cook) [Orabug: 16837019] {CVE-2013-1929}\n- USB: cdc-wdm: fix buffer overflow (Oliver Neukum) [Orabug: 16837003] {CVE-2013-1860}\n- bonding: emit event when bonding changes MAC (Weiping Pan) [Orabug: 16579025]\n- sched: Fix ancient race in do_exit() (Joe Jin)\n- open debug in page_move_anon_rmap by default. (Xiaowei.Hu) [Orabug: 14046035]\n- block: default SCSI command filter does not accomodate commands overlap across device classes (Jamie Iles) [Orabug: 16387136] {CVE-2012-4542}\n- vma_adjust: fix the copying of anon_vma chains (Linus Torvalds) [Orabug: 14046035]\n- xen-netfront: delay gARP until backend switches to Connected (Laszlo Ersek) [Orabug: 16182568]\n- svcrpc: don't hold sv_lock over svc_xprt_put() (J. Bruce Fields) [Orabug: 16032824]\n- mm/hotplug: correctly add new zone to all other nodes' zone lists (Jiang Liu) [Orabug: 16603569] {CVE-2012-5517}\n- ptrace: ptrace_resume() shouldn't wake up !TASK_TRACED thread (Oleg Nesterov) [Orabug: 16405868] {CVE-2013-0871}\n- ptrace: ensure arch_ptrace/ptrace_request can never race with SIGKILL (Oleg Nesterov) [Orabug: 16405868] {CVE-2013-0871}\n- ptrace: introduce signal_wake_up_state() and ptrace_signal_wake_up() (Oleg Nesterov) [Orabug: 16405868] {CVE-2013-0871}\n- Bluetooth: Fix incorrect strncpy() in hidp_setup_hid() (Anderson Lizardo) [Orabug: 16711062] {CVE-2013-0349}\n- dccp: check ccid before dereferencing (Mathias Krause) [Orabug: 16711040] {CVE-2013-1827}\n- USB: io_ti: Fix NULL dereference in chase_port() (Wolfgang Frisch) [Orabug: 16425435] {CVE-2013-1774}\n- keys: fix race with concurrent install_user_keyrings() (David Howells) [Orabug: 16493369] {CVE-2013-1792}\n- KVM: Fix bounds checking in ioapic indirect register reads (CVE-2013-1798) (Andy Honig) [Orabug: 16710937] {CVE-2013-1798}\n- KVM: x86: fix for buffer overflow in handling of MSR_KVM_SYSTEM_TIME (CVE-2013-1796) (Jerry Snitselaar) [Orabug: 16710794] {CVE-2013-1796}\n\n[2.6.32-400.27.1]\n- net/tun: fix ioctl() based info leaks (Mathias Krause) [Orabug: 16675501] {CVE-2012-6547}\n- atm: fix info leak via getsockname() (Mathias Krause) [Orabug: 16675501] {CVE-2012-6546}\n- atm: fix info leak in getsockopt(SO_ATMPVC) (Mathias Krause) [Orabug: 16675501] {CVE-2012-6546}\n- xfrm_user: fix info leak in copy_to_user_tmpl() (Mathias Krause) [Orabug: 16675501] {CVE-2012-6537}\n- xfrm_user: fix info leak in copy_to_user_policy() (Mathias Krause) [Orabug: 16675501] {CVE-2012-6537}\n- xfrm_user: fix info leak in copy_to_user_state() (Mathias Krause) [Orabug: 16675501] {CVE-2013-6537}\n- xfrm_user: return error pointer instead of NULL #2 (Mathias Krause) [Orabug: 16675501] {CVE-2013-1826}\n- xfrm_user: return error pointer instead of NULL (Mathias Krause) [Orabug: 16675501] {CVE-2013-1826}\n- llc: fix info leak via getsockname() (Mathias Krause) [Orabug: 16675501] {CVE-2012-6542}\n- x86/mm: Check if PUD is large when validating a kernel address (Mel Gorman) [Orabug: 14251997]", u'issued': u'2013-06-11', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELSA-2013-2534.html', u'type': u'self', u'id': None, u'title': u'ELSA-2013-2534'}, {u'href': u'http://linux.oracle.com/cve/CVE-2012-4542.html', u'type': u'cve', u'id': u'CVE-2012-4542', u'title': u'CVE-2012-4542'}, {u'href': u'http://linux.oracle.com/cve/CVE-2012-6542.html', u'type': u'cve', u'id': u'CVE-2012-6542', u'title': u'CVE-2012-6542'}, {u'href': u'http://linux.oracle.com/cve/CVE-2013-1943.html', u'type': u'cve', u'id': u'CVE-2013-1943', u'title': u'CVE-2013-1943'}, {u'href': u'http://linux.oracle.com/cve/CVE-2013-1929.html', u'type': u'cve', u'id': u'CVE-2013-1929', u'title': u'CVE-2013-1929'}, {u'href': u'http://linux.oracle.com/cve/CVE-2013-1860.html', u'type': u'cve', u'id': u'CVE-2013-1860', u'title': u'CVE-2013-1860'}], u'_content_type_id': u'erratum', u'_id': u'64d5d6fa-7569-41a5-8fc6-ad850bce6165', u'from': u'el-errata@oss.oracle.com', u'severity': u'Moderate', u'title': u'Unbreakable Enterprise kernel Security update', u'_ns': u'units_erratum', u'rights': u'Copyright 2013 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 5', u'reboot_suggested': False, u'type': u'security', u'pkglist': [{u'packages': [{u'src': None, u'name': u'kernel-uek', u'sum': [u'md5', u'fe4d9bc8802f5fe0e60511c468ec4f3a'], u'filename': u'kernel-uek-2.6.32-400.29.1.el5uek.src.rpm', u'epoch': u'0', u'version': u'2.6.32', u'release': u'400.29.1.el5uek', u'arch': u'src'}, {u'src': None, u'name': u'kernel-uek', u'sum': [u'md5', u'97f0f0d62ed7dc756a8a24e0382b5366'], u'filename': u'kernel-uek-2.6.32-400.29.1.el5uek.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.32', u'release': u'400.29.1.el5uek', u'arch': u'x86_64'}, {u'src': None, u'name': u'kernel-uek-debug', u'sum': [u'md5', u'7009124f3e62d071a21ea85dd6a34346'], u'filename': u'kernel-uek-debug-2.6.32-400.29.1.el5uek.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.32', u'release': u'400.29.1.el5uek', u'arch': u'x86_64'}, {u'src': None, u'name': u'kernel-uek-debug-devel', u'sum': [u'md5', u'ae4bb411bf9612a32ae59b666c102b19'], u'filename': u'kernel-uek-debug-devel-2.6.32-400.29.1.el5uek.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.32', u'release': u'400.29.1.el5uek', u'arch': u'x86_64'}, {u'src': None, u'name': u'kernel-uek-devel', u'sum': [u'md5', u'0e7ced589e148b9d4875286d11e0a362'], u'filename': u'kernel-uek-devel-2.6.32-400.29.1.el5uek.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.32', u'release': u'400.29.1.el5uek', u'arch': u'x86_64'}, {u'src': None, u'name': u'kernel-uek-doc', u'sum': [u'md5', u'49759c32b7bd169636e199a50bb6ce59'], u'filename': u'kernel-uek-doc-2.6.32-400.29.1.el5uek.noarch.rpm', u'epoch': u'0', u'version': u'2.6.32', u'release': u'400.29.1.el5uek', u'arch': u'noarch'}, {u'src': None, u'name': u'kernel-uek-firmware', u'sum': [u'md5', u'a94c1ca390bf23bdadd7ed27e58a6147'], u'filename': u'kernel-uek-firmware-2.6.32-400.29.1.el5uek.noarch.rpm', u'epoch': u'0', u'version': u'2.6.32', u'release': u'400.29.1.el5uek', u'arch': u'noarch'}, {u'src': None, u'name': u'mlnx_en-2.6.32-400.29.1.el5uek', u'sum': [u'md5', u'3cf20725f4642bb90793b86f042c9026'], u'filename': u'mlnx_en-2.6.32-400.29.1.el5uek-1.5.7-2.src.rpm', u'epoch': u'0', u'version': u'1.5.7', u'release': u'2', u'arch': u'src'}, {u'src': None, u'name': u'mlnx_en-2.6.32-400.29.1.el5uek', u'sum': [u'md5', u'd69523b18b8d4d526423beccfcc1470e'], u'filename': u'mlnx_en-2.6.32-400.29.1.el5uek-1.5.7-2.x86_64.rpm', u'epoch': u'0', u'version': u'1.5.7', u'release': u'2', u'arch': u'x86_64'}, {u'src': None, u'name': u'mlnx_en-2.6.32-400.29.1.el5uekdebug', u'sum': [u'md5', u'6b423a1e25671843cf2d3a220108e336'], u'filename': u'mlnx_en-2.6.32-400.29.1.el5uekdebug-1.5.7-2.x86_64.rpm', u'epoch': u'0', u'version': u'1.5.7', u'release': u'2', u'arch': u'x86_64'}, {u'src': None, u'name': u'ofa-2.6.32-400.29.1.el5uek', u'sum': [u'md5', u'69a9ec0588467d09f21abd1a38e76fa5'], u'filename': u'ofa-2.6.32-400.29.1.el5uek-1.5.1-4.0.58.src.rpm', u'epoch': u'0', u'version': u'1.5.1', u'release': u'4.0.58', u'arch': u'src'}, {u'src': None, u'name': u'ofa-2.6.32-400.29.1.el5uek', u'sum': [u'md5', u'c6ad72ebaf9e3e0969b11388b9484d0b'], u'filename': u'ofa-2.6.32-400.29.1.el5uek-1.5.1-4.0.58.x86_64.rpm', u'epoch': u'0', u'version': u'1.5.1', u'release': u'4.0.58', u'arch': u'x86_64'}, {u'src': None, u'name': u'ofa-2.6.32-400.29.1.el5uekdebug', u'sum': [u'md5', u'e45e7c94e1b1f3b06469ed598181dff0'], u'filename': u'ofa-2.6.32-400.29.1.el5uekdebug-1.5.1-4.0.58.x86_64.rpm', u'epoch': u'0', u'version': u'1.5.1', u'release': u'4.0.58', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}, {u'packages': [{u'src': None, u'name': u'kernel-uek', u'sum': [u'md5', u'b0908fb8daa122d18ce36b1bc6cf5172'], u'filename': u'kernel-uek-2.6.32-400.29.1.el6uek.src.rpm', u'epoch': u'0', u'version': u'2.6.32', u'release': u'400.29.1.el6uek', u'arch': u'src'}, {u'src': None, u'name': u'kernel-uek', u'sum': [u'md5', u'023041a0916820a92002f9af01597167'], u'filename': u'kernel-uek-2.6.32-400.29.1.el6uek.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.32', u'release': u'400.29.1.el6uek', u'arch': u'x86_64'}, {u'src': None, u'name': u'kernel-uek-debug', u'sum': [u'md5', u'384323b8b35986cb2f0621a517a20ed0'], u'filename': u'kernel-uek-debug-2.6.32-400.29.1.el6uek.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.32', u'release': u'400.29.1.el6uek', u'arch': u'x86_64'}, {u'src': None, u'name': u'kernel-uek-debug-devel', u'sum': [u'md5', u'157d5e1bcf119c9d069a391ccd0b9aa4'], u'filename': u'kernel-uek-debug-devel-2.6.32-400.29.1.el6uek.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.32', u'release': u'400.29.1.el6uek', u'arch': u'x86_64'}, {u'src': None, u'name': u'kernel-uek-devel', u'sum': [u'md5', u'1136ff44aee750eda8c0043c16403565'], u'filename': u'kernel-uek-devel-2.6.32-400.29.1.el6uek.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.32', u'release': u'400.29.1.el6uek', u'arch': u'x86_64'}, {u'src': None, u'name': u'kernel-uek-doc', u'sum': [u'md5', u'5a6857070f9054eeb3e28370d21a0a02'], u'filename': u'kernel-uek-doc-2.6.32-400.29.1.el6uek.noarch.rpm', u'epoch': u'0', u'version': u'2.6.32', u'release': u'400.29.1.el6uek', u'arch': u'noarch'}, {u'src': None, u'name': u'kernel-uek-firmware', u'sum': [u'md5', u'8c4e4d56a321ea6a9c89eafcdfcb966f'], u'filename': u'kernel-uek-firmware-2.6.32-400.29.1.el6uek.noarch.rpm', u'epoch': u'0', u'version': u'2.6.32', u'release': u'400.29.1.el6uek', u'arch': u'noarch'}, {u'src': None, u'name': u'kernel-uek-headers', u'sum': [u'md5', u'df270c75d96d1b7cbc6595e98f43fb37'], u'filename': u'kernel-uek-headers-2.6.32-400.29.1.el6uek.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.32', u'release': u'400.29.1.el6uek', u'arch': u'x86_64'}, {u'src': None, u'name': u'mlnx_en-2.6.32-400.29.1.el6uek', u'sum': [u'md5', u'2a196a5a958553c2122508f6f4ac3f63'], u'filename': u'mlnx_en-2.6.32-400.29.1.el6uek-1.5.7-0.1.src.rpm', u'epoch': u'0', u'version': u'1.5.7', u'release': u'0.1', u'arch': u'src'}, {u'src': None, u'name': u'mlnx_en-2.6.32-400.29.1.el6uek', u'sum': [u'md5', u'5075ca776b97f9653545e21204256a9d'], u'filename': u'mlnx_en-2.6.32-400.29.1.el6uek-1.5.7-0.1.x86_64.rpm', u'epoch': u'0', u'version': u'1.5.7', u'release': u'0.1', u'arch': u'x86_64'}, {u'src': None, u'name': u'mlnx_en-2.6.32-400.29.1.el6uekdebug', u'sum': [u'md5', u'cbe924e00380d285fc79ec60dd5fc468'], u'filename': u'mlnx_en-2.6.32-400.29.1.el6uekdebug-1.5.7-0.1.x86_64.rpm', u'epoch': u'0', u'version': u'1.5.7', u'release': u'0.1', u'arch': u'x86_64'}, {u'src': None, u'name': u'ofa-2.6.32-400.29.1.el6uek', u'sum': [u'md5', u'067d14c392b812406f9b428cb3d7a473'], u'filename': u'ofa-2.6.32-400.29.1.el6uek-1.5.1-4.0.58.src.rpm', u'epoch': u'0', u'version': u'1.5.1', u'release': u'4.0.58', u'arch': u'src'}, {u'src': None, u'name': u'ofa-2.6.32-400.29.1.el6uek', u'sum': [u'md5', u'abbeffbf9cb9ccbfbf39808c426f0fe3'], u'filename': u'ofa-2.6.32-400.29.1.el6uek-1.5.1-4.0.58.x86_64.rpm', u'epoch': u'0', u'version': u'1.5.1', u'release': u'4.0.58', u'arch': u'x86_64'}, {u'src': None, u'name': u'ofa-2.6.32-400.29.1.el6uekdebug', u'sum': [u'md5', u'2818aebc4e4e641ea2723369d469ef8a'], u'filename': u'ofa-2.6.32-400.29.1.el6uekdebug-1.5.1-4.0.58.x86_64.rpm', u'epoch': u'0', u'version': u'1.5.1', u'release': u'4.0.58', u'arch': u'x86_64'}], u'name': u'ol6_x86_64_latest', u'short': u'ol6_x86_64_latest'}]} >{u'status': u'final', u'updated': u'', u'description': u'kernel-uek\n[2.6.32-400.29.2uek]\n- Bluetooth: RFCOMM - Fix missing msg_namelen update in rfcomm_sock_recvmsg() (Mathias Krause) [Orabug: 17173824] {CVE-2013-3225}\n- Bluetooth: fix possible info leak in bt_sock_recvmsg() (Mathias Krause) [Orabug: 17173824] {CVE-2013-3224}\n- atm: update msg_namelen in vcc_recvmsg() (Mathias Krause) [Orabug: 17173824] {CVE-2013-3222}\n- dcbnl: fix various netlink info leaks (Mathias Krause) [Orabug: 17173824] {CVE-2013-2634}\n- udf: avoid info leak on export (Mathias Krause) [Orabug: 17173824] {CVE-2012-6548}\n- b43: stop format string leaking into error msgs (Kees Cook) [Orabug: 17173824] {CVE-2013-2852}\n- signal: always clear sa_restorer on execve (Kees Cook) [Orabug: 17173824] {CVE-2013-0914}', u'issued': u'2013-07-18', u'_last_updated': 0.0, u'pushcount': 1, u'references': [{u'href': u'http://linux.oracle.com/errata/ELSA-2013-2537.html', u'type': u'self', u'id': None, u'title': u'ELSA-2013-2537'}, {u'href': u'http://linux.oracle.com/cve/CVE-2013-0914.html', u'type': u'cve', u'id': u'CVE-2013-0914', u'title': u'CVE-2013-0914'}, {u'href': u'http://linux.oracle.com/cve/CVE-2013-3222.html', u'type': u'cve', u'id': u'CVE-2013-3222', u'title': u'CVE-2013-3222'}, {u'href': u'http://linux.oracle.com/cve/CVE-2013-3224.html', u'type': u'cve', u'id': u'CVE-2013-3224', u'title': u'CVE-2013-3224'}, {u'href': u'http://linux.oracle.com/cve/CVE-2012-6548.html', u'type': u'cve', u'id': u'CVE-2012-6548', u'title': u'CVE-2012-6548'}, {u'href': u'http://linux.oracle.com/cve/CVE-2013-2634.html', u'type': u'cve', u'id': u'CVE-2013-2634', u'title': u'CVE-2013-2634'}, {u'href': u'http://linux.oracle.com/cve/CVE-2013-2852.html', u'type': u'cve', u'id': u'CVE-2013-2852', u'title': u'CVE-2013-2852'}, {u'href': u'http://linux.oracle.com/cve/CVE-2013-3225.html', u'type': u'cve', u'id': u'CVE-2013-3225', u'title': u'CVE-2013-3225'}], u'_content_type_id': u'erratum', u'_id': u'75ba8e27-25a5-4ea8-9983-edb0c2a93f99', u'from': u'el-errata@oss.oracle.com', u'severity': u'Moderate', u'title': u'unbreakable enterprise kernel security update', u'_ns': u'units_erratum', u'rights': u'Copyright 2013 Oracle, Inc.', u'solution': u'This update is available via the Unbreakable Linux Network (ULN) and the Oracle Public Yum Server. Details on how to use ULN or http://public-yum.oracle.com to apply this update are available at http://linux.oracle.com/applying_updates.html.', u'summary': u'', u'version': u'1', u'release': u'Oracle Linux 5', u'reboot_suggested': False, u'type': u'security', u'pkglist': [{u'packages': [{u'src': None, u'name': u'kernel-uek', u'sum': [u'md5', u'f77ce582a5f484c02761d2b1c22e4320'], u'filename': u'kernel-uek-2.6.32-400.29.2.el5uek.src.rpm', u'epoch': u'0', u'version': u'2.6.32', u'release': u'400.29.2.el5uek', u'arch': u'src'}, {u'src': None, u'name': u'kernel-uek', u'sum': [u'md5', u'2b54040c3b303c633f895f5569d656f8'], u'filename': u'kernel-uek-2.6.32-400.29.2.el5uek.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.32', u'release': u'400.29.2.el5uek', u'arch': u'x86_64'}, {u'src': None, u'name': u'kernel-uek-debug', u'sum': [u'md5', u'ab33b9edae91abeff66eab96fe5e1f04'], u'filename': u'kernel-uek-debug-2.6.32-400.29.2.el5uek.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.32', u'release': u'400.29.2.el5uek', u'arch': u'x86_64'}, {u'src': None, u'name': u'kernel-uek-debug-devel', u'sum': [u'md5', u'bd62bb46243645cd4b5b56776622ffcc'], u'filename': u'kernel-uek-debug-devel-2.6.32-400.29.2.el5uek.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.32', u'release': u'400.29.2.el5uek', u'arch': u'x86_64'}, {u'src': None, u'name': u'kernel-uek-devel', u'sum': [u'md5', u'8d11beddf00ea5d08dc92b26d628c55f'], u'filename': u'kernel-uek-devel-2.6.32-400.29.2.el5uek.x86_64.rpm', u'epoch': u'0', u'version': u'2.6.32', u'release': u'400.29.2.el5uek', u'arch': u'x86_64'}, {u'src': None, u'name': u'kernel-uek-doc', u'sum': [u'md5', u'd056558ffa2becdab160edcbfac29705'], u'filename': u'kernel-uek-doc-2.6.32-400.29.2.el5uek.noarch.rpm', u'epoch': u'0', u'version': u'2.6.32', u'release': u'400.29.2.el5uek', u'arch': u'noarch'}, {u'src': None, u'name': u'kernel-uek-firmware', u'sum': [u'md5', u'24203d5f3fb859f4a6804cbb97df4d15'], u'filename': u'kernel-uek-firmware-2.6.32-400.29.2.el5uek.noarch.rpm', u'epoch': u'0', u'version': u'2.6.32', u'release': u'400.29.2.el5uek', u'arch': u'noarch'}, {u'src': None, u'name': u'mlnx_en-2.6.32-400.29.2.el5uek', u'sum': [u'md5', u'6c804d532a9376854e3af3d1e68ce941'], u'filename': u'mlnx_en-2.6.32-400.29.2.el5uek-1.5.7-2.src.rpm', u'epoch': u'0', u'version': u'1.5.7', u'release': u'2', u'arch': u'src'}, {u'src': None, u'name': u'mlnx_en-2.6.32-400.29.2.el5uek', u'sum': [u'md5', u'3fa3aba7c2e0b077379858d0e9a7f5f4'], u'filename': u'mlnx_en-2.6.32-400.29.2.el5uek-1.5.7-2.x86_64.rpm', u'epoch': u'0', u'version': u'1.5.7', u'release': u'2', u'arch': u'x86_64'}, {u'src': None, u'name': u'mlnx_en-2.6.32-400.29.2.el5uekdebug', u'sum': [u'md5', u'071987a217615d450023709594214799'], u'filename': u'mlnx_en-2.6.32-400.29.2.el5uekdebug-1.5.7-2.x86_64.rpm', u'epoch': u'0', u'version': u'1.5.7', u'release': u'2', u'arch': u'x86_64'}, {u'src': None, u'name': u'ofa-2.6.32-400.29.2.el5uek', u'sum': [u'md5', u'3af561401f107ab0243b2feb921259a9'], u'filename': u'ofa-2.6.32-400.29.2.el5uek-1.5.1-4.0.58.src.rpm', u'epoch': u'0', u'version': u'1.5.1', u'release': u'4.0.58', u'arch': u'src'}, {u'src': None, u'name': u'ofa-2.6.32-400.29.2.el5uek', u'sum': [u'md5', u'37d0b805bc8ba808375ef73451a942d9'], u'filename': u'ofa-2.6.32-400.29.2.el5uek-1.5.1-4.0.58.x86_64.rpm', u'epoch': u'0', u'version': u'1.5.1', u'release': u'4.0.58', u'arch': u'x86_64'}, {u'src': None, u'name': u'ofa-2.6.32-400.29.2.el5uekdebug', u'sum': [u'md5', u'4ac35b282540c5e40ad502c49d770019'], u'filename': u'ofa-2.6.32-400.29.2.el5uekdebug-1.5.1-4.0.58.x86_64.rpm', u'epoch': u'0', u'version': u'1.5.1', u'release': u'4.0.58', u'arch': u'x86_64'}], u'name': u'ol5_x86_64_latest', u'short': u'ol5_x86_64_latest'}]} >Repo.id = epel6 >Repo.id = rhel-6-x86_64-os >Repo.id = rhel-7-x86_64-os >Repo.id = ius-6-x86_64 >Repo.id = rhel-5-x86_64-os >Repo.id = rhel-6-x86_64-sfs >Repo.id = ol6_x86_64_latest >Repo.id = rhel-6-x86_64-rhscl >Repo.id = rhel-6-x86_64-debug >Repo.id = rhel-7-x86_64-optional >Repo.id = rhel-7-x86_64-rhscl >Repo.id = rhel-7-x86_64-debug >Repo.id = epel7 >Migration to pulp_rpm.plugins.migrations version 16 complete. >Database migrations complete.
You cannot view the attachment while viewing its details because your browser does not support IFRAMEs.
View the attachment on a separate page
.
View Attachment As Raw
Actions:
View
Attachments on
bug 1131251
: 928056