to65

tumblr tuesday!

  • robindoesrunning: is there even anything i can say about the awesomeness of robin?  i’m sure i can’t do her justice.
  • chasefear: adrien is definitely the most fearless person i have ever known.  she is insanely strong and has the best advice.
  • bendoeslife: everyone knows ben is pretty awesome.  and no one knows better than he does.
  • to65: jess is amazing!  she’s the first person i ever started following and she’s always been super supportive.
  • amandasclimb: amanda is probably one of the most giving and selfless people i’ve met on here.  go support her!
  • lifedoesjed: the slightly more responsible, slightly more grown up davis brother.
  • c-skins: my future half marathon partner!
  • regainingmymoxy: totally awesome new york-ian who i will also be running in a half with later this year!
  • runwithrach: she is off being totally amazing training for an ironman and being a mom and organizing races and tons of other things.  it’s a wonder how she does it all!

all of these guys are truly amazing and inspiring. go follow them! xx

my tumblr crushes!

wow, i think this is the first time in like 6 months that robin hasn’t been my top crush, haha.  but this week, all my love goes to amanda!

i highly recommend following all of these guys, they’re super inspirational and some of my favorite blogs. :)

RHSA-2015:1683-1: Moderate: qemu-kvm-rhev security update

Updated qemu-kvm-rhev packages that fix one security issue are nowavailable for Red Hat Enterprise Linux OpenStack Platform 5.Red Hat Product Security has rated this update as having Moderate securityimpact. A Common Vulnerability Scoring System (CVSS) base score, whichgives a detailed severity rating, is available from the CVE link in theReferences section.

KVM (Kernel-based Virtual Machine) is a full virtualization solution forLinux on AMD64 and intel 64 systems. The qemu-kvm-rhev package provides theuser-space component for running virtual machines using KVM.An information leak flaw was found in the way QEMU’s RTL8139 emulationimplementation processed network packets under RTL8139 controller’s C+ modeof operation. An unprivileged guest user could use this flaw to read up to65 KB of uninitialized QEMU heap memory. (CVE-2015-5165)Red Hat would like to thank the Xen project for reporting this issue.Upstream acknowledges Donghai Zhu of Alibaba as the original reporter.All qemu-kvm-rhev users are advised to upgrade to these updated packages,which contain a backported patch to correct this issue. After installingthis update, shut down all running virtual machines. Once all virtualmachines have shut down, start them again for this update to take effect.
Before applying this update, make sure all previously released erratarelevant to your system have been applied.For details on how to apply this update, refer to:https://access.redhat.com/articles/11258Red Hat OpenStack 5.0 for RHEL 6

SRPMS:
qemu-kvm-rhev-0.12.1.2-2.479.el6_7.1.src.rpm
    MD5: 82692d7553535ea04da0da5998eb4a0cSHA-256: fc2f9812979035336f141b7e0301cec0f5864e9c97d31121206f6b8e45e3ef48
 
x86_64:
qemu-img-rhev-0.12.1.2-2.479.el6_7.1.x86_64.rpm
    MD5: c4d47c4eafb74cd816296154a852a7e5SHA-256: 30c035203625a7cf68c1d9440dc1cb9335e7760a2f6c9931e1b8a476a52ab599
qemu-kvm-rhev-0.12.1.2-2.479.el6_7.1.x86_64.rpm
    MD5: 3647eb749389b73025911e1995325ff0SHA-256: a37ab4a3833dfbe055759d17f496282aa2259e91cc01c575ebfc9b79472531dc
qemu-kvm-rhev-debuginfo-0.12.1.2-2.479.el6_7.1.x86_64.rpm
    MD5: d1ddee6272e5e84c1765e0c32d180428SHA-256: 9e7cc92fdbfdb09ca17d5950599f27bcd1ab94ba6456b60a9cb7bc18f12f46a4
qemu-kvm-rhev-tools-0.12.1.2-2.479.el6_7.1.x86_64.rpm
    MD5: 6c543bf2b1698cd24785415740d8b486SHA-256: e5346a88d439694e6c60515062f4445c79b2b98966b4e7fd3456253b1cdff89d
 
Red Hat OpenStack 5.0 for RHEL 7

SRPMS:
qemu-kvm-rhev-2.1.2-23.el7_1.8.src.rpm
    MD5: 3b0b92d662fbcac782980c1acdc8cff3SHA-256: 5a204ee8b4b5a840b889b5685a06fe20d3febf7770706c68af4398bb10636657
 
x86_64:
libcacard-devel-rhev-2.1.2-23.el7_1.8.x86_64.rpm
    MD5: 0b17c120646768048cc3c481097afb35SHA-256: a948204698ff24306291d63c0b08d592ea802e355e3063d863f67e3818c1de1f
libcacard-rhev-2.1.2-23.el7_1.8.x86_64.rpm
    MD5: d513a4c986bdd5aba1c2a2ae3aca8212SHA-256: 0a27a6c89cf60a196f08df3f59ed181339de8a31dd4ac4b24516a28a0b0d5912
libcacard-tools-rhev-2.1.2-23.el7_1.8.x86_64.rpm
    MD5: 80f3636b437a7563ba07a1b97da36eeeSHA-256: 665d62e42cb6ee748b97c3649117429943a358707522f3c99a9544df6f6b3e0e
qemu-img-rhev-2.1.2-23.el7_1.8.x86_64.rpm
    MD5: 9464c920c09f9088442972f9d1b8eb69SHA-256: 051eccb864d190d82659648022cf40b209189f6fbc4eaab16e1995873da90278
qemu-kvm-common-rhev-2.1.2-23.el7_1.8.x86_64.rpm
    MD5: 6ae8f9fbc1a65b708883659ec44ee5baSHA-256: 178d382a01e65cf82403acf68950c2bd99af3f19e3a6e2c0c371bfb5866628fa
qemu-kvm-rhev-2.1.2-23.el7_1.8.x86_64.rpm
    MD5: 772225f803a0e86ccfae162678505c6eSHA-256: f7206fd580793b77fc7a616f4452de6d632112364a2b12356c594bbf728ef8f2
qemu-kvm-rhev-debuginfo-2.1.2-23.el7_1.8.x86_64.rpm
    MD5: 11064a5d465e5ad6966202bc3d24d35cSHA-256: a6df340ae207b44ae626eaa5c26ff7fac095b7b6d13ad8a6bc495a7891a29f39
qemu-kvm-tools-rhev-2.1.2-23.el7_1.8.x86_64.rpm
    MD5: f92840880c7cbacea4da7a236afa3348SHA-256: 30997759df8a254416674aba102325854447f63f1949fc7a15f7d20ef8a6ccfc
 
(The unlinked packages above are only available from the Red Hat Network)
1248760 – CVE-2015-5165 Qemu: rtl8139 uninitialized heap memory information leakage to guest (XSA-140)

These packages are GPG signed by Red Hat for security. Our key and
details on how to verify the signature are available from:

RHSA-2015:1683-1: Moderate: qemu-kvm-rhev security update was originally published on Cyber Parse