- Issued:
- 2013-03-06
- Updated:
- 2013-03-06
RHSA-2013:0564 - Security Advisory
Synopsis
Low: Red Hat Enterprise MRG Grid 2.3 security update
Type/Severity
Security Advisory: Low
Red Hat Insights patch analysis
Identify and remediate systems affected by this advisory.
Topic
Updated Grid component packages that fix one security issue, multiple bugs,
and add various enhancements are now available for Red Hat Enterprise MRG
2.3 for Red Hat Enterprise Linux 5.
The Red Hat Security Response Team has rated this update as having low
security impact. A Common Vulnerability Scoring System (CVSS) base score,
which gives a detailed severity rating, is available from the CVE link in
the References section.
Description
Red Hat Enterprise MRG (Messaging, Realtime, and Grid) is a next-generation
IT infrastructure for enterprise computing. MRG offers increased
performance, reliability, interoperability, and faster computing for
enterprise customers.
MRG Grid provides high-throughput computing and enables enterprises to
achieve higher peak computing capacity as well as improved infrastructure
utilization by leveraging their existing technology to build high
performance grids. MRG Grid provides a job-queueing mechanism, scheduling
policy, and a priority scheme, as well as resource monitoring and resource
management. Users submit their jobs to MRG Grid, where they are placed into
a queue. MRG Grid then chooses when and where to run the jobs based upon a
policy, carefully monitors their progress, and ultimately informs the user
upon completion.
It was found that attempting to remove a job via
"/usr/share/condor/aviary/jobcontrol.py" with CPROC in square brackets
caused condor_schedd to crash. If aviary_query_server was configured to
listen to public interfaces, this could allow a remote attacker to cause a
denial of service condition in condor_schedd. While condor_schedd was
restarted by the condor_master process after each exit, condor_master would
throttle back restarts after each crash. This would slowly increment to the
defined MASTER_BACKOFF_CEILING value (3600 seconds/1 hour, by default).
(CVE-2012-4462)
The CVE-2012-4462 issue was discovered by Daniel Horak of the Red Hat
Enterprise MRG Quality Engineering Team.
These updated packages for Red Hat Enterprise Linux 5 provide numerous
enhancements and bug fixes for the Grid component of MRG. Some of the most
important enhancements include:
- Release of HTCondor 7.8
- OS integration with control groups (cgroups)
- Kerberos integration and HTML5 interactivity in the management console
- Historical data reporting in the management console as Technology Preview
- Job data availability from MongoDB as Technology Preview
- Updated EC2 AMI and instance tagging support
- Enhanced negotiation and accounting
- Enhanced DAG workflow management
- Enhancements to configuration inspection, node inventory, and
configuration of walk-in or dynamic resources
- High availability for Aviary
Space precludes documenting all of these changes in this advisory. Refer to
the Red Hat Enterprise MRG 2 Technical Notes document, available shortly
from the link in the References section, for information on these changes.
All users of the Grid capabilities of Red Hat Enterprise MRG are advised
to upgrade to these updated packages, which correct this issue, and fix
the bugs and add the enhancements noted in the Red Hat Enterprise MRG 2
Technical Notes.
Solution
Before applying this update, make sure all previously-released errata
relevant to your system have been applied.
This update is available via the Red Hat Network. Details on how to
use the Red Hat Network to apply this update are available at
https://access.redhat.com/knowledge/articles/11258
Affected Products
- MRG Grid from RHUI 2 for RHEL 5 x86_64
- Red Hat Enterprise MRG Messaging 2 for RHEL 5 x86_64
- Red Hat Enterprise MRG Messaging 2 for RHEL 5 i386
- MRG Grid 2 for RHEL 5 x86_64
- MRG Grid 2 for RHEL 5 i386
Fixes
- BZ - 486480 - [RFE] Master should send obituary from .old logs if necessary
- BZ - 635207 - Cumin: Edit Dynamic Group Quota chart should allow editing subshares
- BZ - 703859 - Add chart(s) showing grid utilization by accounting group [RFE]
- BZ - 732388 - aviary query 'getSubmissionSummary' - match for owner
- BZ - 733498 - Expose suspend/continue controls for jobs through Aviary
- BZ - 733515 - lookup or discovery capability so that cumin can find Aviary endpoints
- BZ - 733516 - support for proposed Aviary endpoint lookup feature
- BZ - 739219 - Aviary does not handle job output filenames that do not contain explicit paths
- BZ - 740774 - Condor doesn't run jobs with real number in RequestMemory classad
- BZ - 746005 - [RFE] wallaby plumage feature
- BZ - 748053 - preemption does not work when group quotas are in effect
- BZ - 749569 - [RFE] the skeleton group support in ccp/s
- BZ - 750196 - Timer to dismiss invocation banners [RFE]
- BZ - 750818 - SELinux error (setattr) for VM/KVM universe jobs (RHEL5 only)
- BZ - 751013 - Job receive twice signal SIGCONT after condor_continue command.
- BZ - 752732 - list of OSes is out of frame
- BZ - 753822 - Make condor_job_server default submission publisher
- BZ - 755765 - RFE: Gracefully handle MAX_..._LOG configuration errors
- BZ - 756096 - [RFE]change UNHIBERNATE default value to not wake up all the machines
- BZ - 756384 - RFE: Add suspend/continue job operations
- BZ - 760567 - Change of DynamicQuota causes KeyError on empty data
- BZ - 766612 - condor_schedd.init - stop should return 0 if there is not service executable
- BZ - 768298 - Display supported browsers in cumin [RFE]
- BZ - 768319 - provide information of suspended jobs
- BZ - 768328 - there is no suspend and transfer states in ns0:JobStatusType
- BZ - 772587 - openmpiscript - A deprecated MCA parameter value 'plm_rsh_agent' (on RHEL 6.2)
- BZ - 773434 - Some condor_ commands with valid parameter '-help' return non zero exit code
- BZ - 782054 - VM without VNC console doesn't start
- BZ - 782132 - openmpiscript - Command mpirun needs parameter --prefix for correct run (on RHEL 6.2)
- BZ - 782359 - Condor HFS quota example returns "Unknown config:" from QMF
- BZ - 782552 - Use idempotent EC2 RunInstances
- BZ - 782553 - [RFE] Add support for EC2 Instance Resource Tagging
- BZ - 782816 - warning messages of wallaby shell
- BZ - 783139 - Remove job using aviary isn't handled properly
- BZ - 783267 - [RFE] ssh_to_job for VM/Java/Sched/Local universe
- BZ - 785283 - RFE: expose accounting group negotiation-ordering to configuration
- BZ - 785289 - RFE: Alter semantic of GROUP_AUTOREGROUP to replicate legacy behavior
- BZ - 786020 - condor_configure_pool + required parameters
- BZ - 786801 - Rotation of wallaby agent logs wrongly affects old logs
- BZ - 786815 - Time borders have no effect for list of resources, groups, users
- BZ - 786825 - plumage_stats parameter for server raise exception
- BZ - 787138 - Add time-stamp to yellow banner [RFE]
- BZ - 788452 - Java issue on updated packages from condor-7.6.3-0.3 to condor-7.6.5-0.11
- BZ - 789351 - Change cumin's charting tools to a non-flash-based solution [RFE]
- BZ - 796406 - wallaby doesn't recognize node config change when group deleted
- BZ - 796798 - [RFE] Make grid persona default for Cumin
- BZ - 799129 - [RFE] Add Kerberos authentication for Cumin
- BZ - 799382 - Grid - Quotas - CSV - 'loading' values
- BZ - 799404 - Grid - Limits - CSV - html metadata
- BZ - 800065 - Cumin processes sometimes do not exit and must be killed from master with SIGKILL
- BZ - 800079 - Provide API and implementation to query submissions using a page size and age
- BZ - 800660 - Updates for new Aviary locator support
- BZ - 801047 - [RFE] Change default value of sasl-mech-list to 'ANONYMOUS' or 'PLAIN DIGEST-MD5' with credentials
- BZ - 801287 - service cumin start missing pid file
- BZ - 801632 - [RFE] wallaby shell should have a means to delete a snapshot
- BZ - 802704 - Inventory - Filters for a value in a column in a table
- BZ - 802799 - wallaby shell replace-* commands with empty args should clear the value in the store
- BZ - 802821 - Support description metadata for features and snapshots in wallaby store
- BZ - 803359 - [RFE]change UNHIBERNATE default value to not wake up all the machines
- BZ - 803897 - RFE: advertise the accounting group that a running job matched under on the resource ad
- BZ - 805029 - Remove slotvis functionality from cumin [RFE]
- BZ - 805448 - bad submitter limit
- BZ - 805581 - Number of group quota exceeded
- BZ - 807398 - Endpoint updating for HA configurations
- BZ - 807820 - Update wallaby packaging to use wallaby assigned uid/gid
- BZ - 807838 - Use plumage data to provide initial reporting capabilities [RFE]
- BZ - 809006 - Double escaping html strings
- BZ - 809551 - [RFE] Add the ability to use keypair by name
- BZ - 809732 - PU job is runned before slots are cleaned from previous (removed) job
- BZ - 810982 - Enable locator support for QueryServer in RHHAv2 tools
- BZ - 813807 - Jobs submitted from cumin through aviary show 'unknown' for enqueued column
- BZ - 814386 - Integration of aviary for job control, submission, and job/submission queries [RFE]
- BZ - 815820 - condor_configd is using QMF_BROKER_AUTH_MECHANISM instead of QMF_BROKER_AUTH_MECH
- BZ - 820419 - RFE: new command show-node-config
- BZ - 828983 - condor resource agent start operation should have verification of startup
- BZ - 831709 - SharedPort should depend on Master
- BZ - 831725 - Cleanup ALLOW_NEGOTIATOR* params
- BZ - 831756 - Add ALLOW_NEGOTIATOR to the ExecuteNode feature
- BZ - 833095 - total local resources per slot for dynamic slots is always zero
- BZ - 833611 - The cluster-* commands always ask for a password even if only acting on the store
- BZ - 840076 - Job history collection daemon and tool
- BZ - 845567 - new PRE_SKIP key word in DAGMan
- BZ - 846955 - unexpected error message from condor init.d script
- BZ - 848344 - Problem submitting jobs from cumin via Aviary when commands have no arguments
- BZ - 850205 - traceback when bad option is provided to wallaby
- BZ - 850392 - RFE Update Hunting+Splitting+Defaults algorithm
- BZ - 850555 - RFE Add new -expand option to condor_config_val
- BZ - 850567 - RFE Improved the output of condor_userprio to better support hierarchical groups
- BZ - 850838 - RFE copy PRIORITY values from the DAG input file to the JobPrio attribute in the job ClassAd
- BZ - 851205 - schedulers list is bigger than its parent
- BZ - 851217 - wallaby shell should detect if there are more wallaby agents on broker
- BZ - 851222 - configd should detect if there are more wallaby agents on broker
- BZ - 855449 - getSubmissionID by qdate with scan mode "AFTER" does not work unless the qdate supplied is an exact match of an existing qdate
- BZ - 856646 - getSubmissionID() by qdate returning duplicates
- BZ - 860308 - condor SEGFAULT after upgrade while using custom hostname
- BZ - 860850 - CVE-2012-4462 condor: DoS when removing jobs via jobcontrol.py when job id is in square brackets
- BZ - 862550 - schedd crash on local universe condor_suspend+condor_continue job
- BZ - 864091 - wallaby list-users prints READ_ONLY instead of READ
- BZ - 864637 - 'condor_restart -subsystem had' causes had and negotiator to shutdown
- BZ - 867989 - Cumin missing scheduler stats
- BZ - 871080 - Queryserver is not visible in locator
- BZ - 881366 - Wallaby shell modify-* commands do not accept empty strings as arguments
- BZ - 885787 - Wallaby agent exception while running in memory
- BZ - 886448 - Aviary api examples: option --timeout leads to Traceback
CVEs
Red Hat Enterprise MRG Messaging 2 for RHEL 5
SRPM | |
---|---|
sesame-1.0-7.el5.src.rpm | SHA-256: c244c5eb39d1fc88ef0a2574a19fe391edf841923b8b77ed3cc40744c9daf589 |
x86_64 | |
sesame-1.0-7.el5.x86_64.rpm | SHA-256: 5994a8b75ed7bc7b16fa9b4d9b48397bff9b980a65eb4b9cbe18c97771ad64f3 |
i386 | |
sesame-1.0-7.el5.i386.rpm | SHA-256: d7d0d25af8b2937dc529dfdeffa2976e8b36bc9ac4457d8a47a5aedc51961608 |
MRG Grid 2 for RHEL 5
SRPM | |
---|---|
condor-7.8.8-0.4.1.el5.src.rpm | SHA-256: 632de442fc57bde09771daa07936597a2b23ead2d505c55ea29e41b92db1bc8d |
condor-ec2-enhanced-1.3.0-2.el5.src.rpm | SHA-256: 3609f9e3761022e9f8612e9aca031bc95e1c184402896225def1d50dd502cb2b |
condor-ec2-enhanced-hooks-1.3.0-3.el5.src.rpm | SHA-256: 0b0d96873dd10ed2a5e51d46e3b07ccba45d5fff0be58593b3be85d472ffe3f6 |
condor-job-hooks-1.5-6.el5.src.rpm | SHA-256: bedabd6d746eab8b164c04e9857b28a3f5ab6f47742668b0aaf5e69a5b0858cc |
condor-low-latency-1.2-3.el5.src.rpm | SHA-256: 56dc170d2604fb1701bcf77d06a41f4170137f4f2eaa62f798a43ee90a461b5b |
condor-wallaby-5.0.5-2.el5.src.rpm | SHA-256: d198210747f864295981112e7f511df8d70b665ff471e9a7812778958e50d614 |
condor-wallaby-base-db-1.25-1.el5.src.rpm | SHA-256: 09a892335f626333af683a9d0459fe09d4b6df4f2f1d0d72358f702e5dcffbdd |
cumin-0.1.5675-1.el5.src.rpm | SHA-256: 074f88af9eaee243b71d6b323f8c3c8a9ffb3489bac166dfba9f72393a2190c8 |
python-boto-2.3.0-1.1.el5.src.rpm | SHA-256: 05844acd6fe9358bb3f07417738ad63de04031413b4c397b4e86eb9d6d5edacf |
ruby-rhubarb-0.4.3-5.el5.src.rpm | SHA-256: 7a81c2da6b27b0757653260fcf1263a5046664855116bf3d503947d5e4e9f4ab |
ruby-spqr-0.3.6-3.el5.src.rpm | SHA-256: cd3943378be5600bab4c95e819ec16f6cebdbbcb29c710d1ef89fe89dc7aa442 |
sesame-1.0-7.el5.src.rpm | SHA-256: c244c5eb39d1fc88ef0a2574a19fe391edf841923b8b77ed3cc40744c9daf589 |
wallaby-0.16.3-1.el5.src.rpm | SHA-256: 379fc1c9b3c6e2e9bb44e399e094ded2b8a59a23ac5a8511b0e78f30d568f67d |
x86_64 | |
condor-7.8.8-0.4.1.el5.x86_64.rpm | SHA-256: 286c7c1abb1d76fc4a598573b860dc51856d2694ca6df59547a791c4c7d806f7 |
condor-aviary-7.8.8-0.4.1.el5.x86_64.rpm | SHA-256: 5d0b7a767ee2b6f2605935f550f0c3afbfdcbd2b87b42188abee293eb017374a |
condor-classads-7.8.8-0.4.1.el5.x86_64.rpm | SHA-256: ee7d5919b71e4d5746208faca56d79e2ec66275d3548aae0f1e1afccd7b41a79 |
condor-ec2-enhanced-1.3.0-2.el5.noarch.rpm | SHA-256: f8e4c270d427e6ed1dddb241230ac39b467d916d18384c8984714788f3f60a4b |
condor-ec2-enhanced-hooks-1.3.0-3.el5.noarch.rpm | SHA-256: c845099ac89e94ac728b7afc33465065c7464d699102cf45afe0d75dd2380527 |
condor-job-hooks-1.5-6.el5.noarch.rpm | SHA-256: 67565f3de0fa79ddb010cea2fc271ceb17217d77819ee6b7a8ddfad1611bb777 |
condor-kbdd-7.8.8-0.4.1.el5.x86_64.rpm | SHA-256: a31f758ae4b009f36bd88469fdeefd5ac87cfb4ec096a26f379735789c061d2f |
condor-low-latency-1.2-3.el5.noarch.rpm | SHA-256: 43b42555ae57965ac9e9d54ebd2653a70d4e7cdc448b6fcc9b2f583a0c2e363b |
condor-qmf-7.8.8-0.4.1.el5.x86_64.rpm | SHA-256: e42c359ddba3059b4b917900a7fe56bd1389c87067248e2b0c1506065558fa5a |
condor-vm-gahp-7.8.8-0.4.1.el5.x86_64.rpm | SHA-256: aa1fc0611f638458ba066a1d10daaa16775e1451735f764935d5deb632453b50 |
condor-wallaby-base-db-1.25-1.el5.noarch.rpm | SHA-256: 585babe0acf032ecb6f97d1f08e0e89f3510278e755827d2090f371c5dcf271d |
condor-wallaby-client-5.0.5-2.el5.noarch.rpm | SHA-256: 9d35997b1374799f7f5869075f3d0db884dbc6e42661843dcd8a2a5b2815c71d |
condor-wallaby-tools-5.0.5-2.el5.noarch.rpm | SHA-256: 7e99bb69e2937bd04b82fc90fb9467bbd6454ecae057f7d6bebd990fdc3b17a9 |
cumin-0.1.5675-1.el5.noarch.rpm | SHA-256: 6fe33c2079bc011f233810393aed8a660cf13ec49cde42e86b60e9884ad24224 |
python-boto-2.3.0-1.1.el5.noarch.rpm | SHA-256: cb55de9b4e04fd10c86bba58cf6e58cc7baa9d9fe8eec41ee6a1d243b5116031 |
python-condorec2e-1.3.0-3.el5.noarch.rpm | SHA-256: 9ddab231c407c8f093f41e5495504bb43e00d6846beaee6b5659cfc9061a319f |
python-condorutils-1.5-6.el5.noarch.rpm | SHA-256: e6ac36cf61ded7758fa3d4c51f458627d9947c06827dfe5124b03f8022335f0e |
python-wallaby-0.16.3-1.el5.noarch.rpm | SHA-256: e9507933bf08467aa9a25884a2e48735e4fefa766af7c96e070a8864549352d2 |
python-wallabyclient-5.0.5-2.el5.noarch.rpm | SHA-256: 6bc1603ed376867f1d2f278e3f457fc521efecafb131e503136889fd9d5ea76a |
ruby-condor-wallaby-5.0.5-2.el5.noarch.rpm | SHA-256: 6fb39b0f6f344b8e01a9a497256980f0cae7166dc63407e3a7337ae3e8d3b881 |
ruby-rhubarb-0.4.3-5.el5.noarch.rpm | SHA-256: aea99c67c8110137a7fbc8ee77a0de6910c015f752429823354ccd96fb21e992 |
ruby-spqr-0.3.6-3.el5.noarch.rpm | SHA-256: e4592404b074872f1553aa5a24f49ed5a6776e5d23ecb1b1abf4c49c378c6615 |
ruby-wallaby-0.16.3-1.el5.noarch.rpm | SHA-256: a8819f5c4b8299a3bea607bebe6f0ef6c01fb1ebb29efa8690f0eda3569331ba |
sesame-1.0-7.el5.x86_64.rpm | SHA-256: 5994a8b75ed7bc7b16fa9b4d9b48397bff9b980a65eb4b9cbe18c97771ad64f3 |
spqr-gen-0.3.6-3.el5.noarch.rpm | SHA-256: 8f39b96d65fc2b6080d3f38d1762cb5fb765ca9e0a088d5531c3c328a4028ad4 |
wallaby-0.16.3-1.el5.noarch.rpm | SHA-256: 7034fe1b5fd2c4e7b5f8d206cc4c3be1eadc52e12adeb38f2f363a0f457c1421 |
wallaby-utils-0.16.3-1.el5.noarch.rpm | SHA-256: 10216274337532d6bb566f796b249e923e03afed3ea1ac4331e5ed63a3b83eec |
i386 | |
condor-7.8.8-0.4.1.el5.i386.rpm | SHA-256: 160a4fa7c772d61779d53bcff85a421e1960d2ebe55df510bf25a40ceb06a36e |
condor-aviary-7.8.8-0.4.1.el5.i386.rpm | SHA-256: 5c9251c33184ab414e1a9fac356fe707ca053cc7cf3f804664127f116b8df5c0 |
condor-classads-7.8.8-0.4.1.el5.i386.rpm | SHA-256: fde7cabc7c8bd48c1d3a32d784edb44d65c9946438d7dac819688ce43a9462f4 |
condor-ec2-enhanced-1.3.0-2.el5.noarch.rpm | SHA-256: f8e4c270d427e6ed1dddb241230ac39b467d916d18384c8984714788f3f60a4b |
condor-ec2-enhanced-hooks-1.3.0-3.el5.noarch.rpm | SHA-256: c845099ac89e94ac728b7afc33465065c7464d699102cf45afe0d75dd2380527 |
condor-job-hooks-1.5-6.el5.noarch.rpm | SHA-256: 67565f3de0fa79ddb010cea2fc271ceb17217d77819ee6b7a8ddfad1611bb777 |
condor-kbdd-7.8.8-0.4.1.el5.i386.rpm | SHA-256: 129fbaec0c4417155a31f528341c32f3f4110051b9f8b79d9d12ea58120d08a2 |
condor-low-latency-1.2-3.el5.noarch.rpm | SHA-256: 43b42555ae57965ac9e9d54ebd2653a70d4e7cdc448b6fcc9b2f583a0c2e363b |
condor-qmf-7.8.8-0.4.1.el5.i386.rpm | SHA-256: b4a4810653b27f240183a4826dcfa65ca336bffae4667ba9012dba22728b7cac |
condor-vm-gahp-7.8.8-0.4.1.el5.i386.rpm | SHA-256: 2ec95eec66dd06b9c2760c21ec28029b80cf25cefc99ab8b02aa275ab01984f2 |
condor-wallaby-base-db-1.25-1.el5.noarch.rpm | SHA-256: 585babe0acf032ecb6f97d1f08e0e89f3510278e755827d2090f371c5dcf271d |
condor-wallaby-client-5.0.5-2.el5.noarch.rpm | SHA-256: 9d35997b1374799f7f5869075f3d0db884dbc6e42661843dcd8a2a5b2815c71d |
condor-wallaby-tools-5.0.5-2.el5.noarch.rpm | SHA-256: 7e99bb69e2937bd04b82fc90fb9467bbd6454ecae057f7d6bebd990fdc3b17a9 |
cumin-0.1.5675-1.el5.noarch.rpm | SHA-256: 6fe33c2079bc011f233810393aed8a660cf13ec49cde42e86b60e9884ad24224 |
python-boto-2.3.0-1.1.el5.noarch.rpm | SHA-256: cb55de9b4e04fd10c86bba58cf6e58cc7baa9d9fe8eec41ee6a1d243b5116031 |
python-condorec2e-1.3.0-3.el5.noarch.rpm | SHA-256: 9ddab231c407c8f093f41e5495504bb43e00d6846beaee6b5659cfc9061a319f |
python-condorutils-1.5-6.el5.noarch.rpm | SHA-256: e6ac36cf61ded7758fa3d4c51f458627d9947c06827dfe5124b03f8022335f0e |
python-wallaby-0.16.3-1.el5.noarch.rpm | SHA-256: e9507933bf08467aa9a25884a2e48735e4fefa766af7c96e070a8864549352d2 |
python-wallabyclient-5.0.5-2.el5.noarch.rpm | SHA-256: 6bc1603ed376867f1d2f278e3f457fc521efecafb131e503136889fd9d5ea76a |
ruby-condor-wallaby-5.0.5-2.el5.noarch.rpm | SHA-256: 6fb39b0f6f344b8e01a9a497256980f0cae7166dc63407e3a7337ae3e8d3b881 |
ruby-rhubarb-0.4.3-5.el5.noarch.rpm | SHA-256: aea99c67c8110137a7fbc8ee77a0de6910c015f752429823354ccd96fb21e992 |
ruby-spqr-0.3.6-3.el5.noarch.rpm | SHA-256: e4592404b074872f1553aa5a24f49ed5a6776e5d23ecb1b1abf4c49c378c6615 |
ruby-wallaby-0.16.3-1.el5.noarch.rpm | SHA-256: a8819f5c4b8299a3bea607bebe6f0ef6c01fb1ebb29efa8690f0eda3569331ba |
sesame-1.0-7.el5.i386.rpm | SHA-256: d7d0d25af8b2937dc529dfdeffa2976e8b36bc9ac4457d8a47a5aedc51961608 |
spqr-gen-0.3.6-3.el5.noarch.rpm | SHA-256: 8f39b96d65fc2b6080d3f38d1762cb5fb765ca9e0a088d5531c3c328a4028ad4 |
wallaby-0.16.3-1.el5.noarch.rpm | SHA-256: 7034fe1b5fd2c4e7b5f8d206cc4c3be1eadc52e12adeb38f2f363a0f457c1421 |
wallaby-utils-0.16.3-1.el5.noarch.rpm | SHA-256: 10216274337532d6bb566f796b249e923e03afed3ea1ac4331e5ed63a3b83eec |
MRG Grid from RHUI 2 for RHEL 5
SRPM | |
---|---|
x86_64 |
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.