Users login

Create an account »

JOIN XATRIX

Users login

Home » Security Advisories» Centos » Low CentOS 7 qemu-kvm Security Update

Low CentOS 7 qemu-kvm Security Update

  • Vendor: Centos
  • Vendor ID: CESA-2014:1669
  • Date: October 21, 2014


CentOS Errata and Security Advisory 2014:1669 Low

Upstream details at : https://rhn.redhat.com/errata/RHSA-2014-1669.html

The following updated files have been uploaded and are currently
syncing to the mirrors: ( sha256sum Filename )

x86_64:
fb80d3eed43c292045f789a7975233d8370f81ab44ed7533c89e9285cdaaf76b libcacard-1.5.3-60.el7_0.10.i686.rpm
8a596137622c6ed6113f60a09264fea4af9163939d481faacc0446b69d7e4ccf libcacard-1.5.3-60.el7_0.10.x86_64.rpm
3652b540146a2346ddfa29b44020b35e73cf07eb7dbc34d263b3cbb0fd6d67a4 libcacard-devel-1.5.3-60.el7_0.10.i686.rpm
62812d12eaf3446b88f9d4fc28fd030794de0a4cc374ba0280ff2166ac8638f7 libcacard-devel-1.5.3-60.el7_0.10.x86_64.rpm
2ec8eafc99d8f2ec49e16ecfb2962992f215a0def44faa91438cb42045957f17 libcacard-tools-1.5.3-60.el7_0.10.x86_64.rpm
a0c730b45988fa40b5757164d3a9db73a5a1b258501d400b1110ee7d2d859be0 qemu-guest-agent-1.5.3-60.el7_0.10.x86_64.rpm
fdc3370f8f691de28013d749c99e500a72db65708e867016824dde55e63597d7 qemu-img-1.5.3-60.el7_0.10.x86_64.rpm
ca55fa4cf9cdf4d5d45ab30afeedc4378161c9ada913f3b8d7da189a8eca7f86 qemu-kvm-1.5.3-60.el7_0.10.x86_64.rpm
7e1f62cdac4f199e8f31751ee937ace975d025556cdb3c654ea53c02e0f387d2 qemu-kvm-common-1.5.3-60.el7_0.10.x86_64.rpm
e4082072fd75bb8166d954062928ab0c16439dd491535e0c8e329da6c6b7f1c9 qemu-kvm-tools-1.5.3-60.el7_0.10.x86_64.rpm

Source:
6821bb25b385c0ad5e25cf715cba8244836e8ab3b969c431f0aa2f1245d74461 qemu-kvm-1.5.3-60.el7_0.10.src.rpm



--
Johnny Hughes
CentOS Project { http://www.centos.org/ }
irc: hughesjr, #centos at irc.freenode.net

Newsletter signup

Signup to our monthly newsletter and stay in touch with IT news!

Free E-books

We've got ebooks! But they're not online. :( Please give us a few days to bring downloads back.

Contact

Have something to say or just wanna drop us a line? Please keep this in mind: to spam, we reply with spam.

Contact us »