Sophos Antivirus for Linux: Limited Support for RHEL 6 during Extended Life Phase (Japan only)

Sophos plans to provide Limited Support for Sophos Antivirus for RHEL 6 during Red Hat’s Extended Life Phase (ELP), until June 30, 2024, on the following basis:

  • Limited Support for Sophos Antivirus for RHEL 6 is provided on the assumption that the customer subscribes to Red Hat’s Extended Life-cycle Support (ELS) Add-On to receive critical security fixes for the operating system through the Extended Life Phase (ELP)
  • Limited Support is subject to a valid subscription to a current Sophos Server Protection license and receipt by Sophos of a support extension fee.
  • Limited Support means that Sophos will continue to test and release new versions of the Virus Engine or Virus Data Library as part of the release calendar. Only critical product issues will be addressed, which may include hot fixes, vulnerabilities or improvements to protection, at Sophos’ discretion.
  • Limited Support will be provided for 64-bit platforms and the last minor point release of RHEL 6. Sophos will endeavor to provide support for other minor releases on a ‘commercially reasonable efforts’ basis, as follows:
    • Support for product configuration and usage questions will be provided by Sophos Technical Support.
    • Technical product issues will be investigated using Sophos’ existing maintenance process, on the basis that the issue can be replicated on the last minor release
    • If a reported product issue cannot be replicated on the last minor release, Sophos advises that such issues would fall outside the scope of support.
  • Limited Support for Sophos Antivirus on RHEL 6 does not include CentOS and Oracle Linux derivatives. See Retirement calendar for supported platforms and operating systems.
  • Sophos currently plans to provide Limited Support for Sophos Antivirus on RHEL 6 through Red Hat’s published Extended Life Phase (June 30, 2024). Sophos reserves the right to suspend, reduce or terminate Limited Support before this date for reasons including but not limited to changes in demand, security, and technology. For example, if Sophos discovers an issue that requires the third-party operating system provider to provide a fix and the third party does not provide such fix, or if Sophos determines that a product code change would be required to address an issue for the RHEL 6 operating system.

Limited Support Terms

RHEL 6 Limited Support. AVAILABLE IN JAPAN ONLY. Subject to receipt by Sophos of a support extension Fee (either directly or via an authorized reseller as applicable), Sophos agrees that it will continue to provide Limited Support on a technically and commercially reasonable endeavours basis for a version of Sophos Anti-Virus for Red Hat Enterprise Linux (RHEL) version 6 on 64 bit platforms, beyond the published end of support date until the earlier of (i) the expiry of the support extension period stated in the relevant Schedule, or (ii) 30 June 2024. RHEL 6 Limited Support comprises regular updates to security data and periodic updates to the product engine only. Sophos reserves the right to suspend, reduce or terminate RHEL 6 Limited Support prior to such date for reasons including but not limited to changes in demand, security and technology, and if and to the extent that Sophos determines that a code change would be required to the Sophos Anti-Virus Product to address an issue for the RHEL 6 operating system.

If you’ve spotted an error or would like to provide feedback on this article, please use the section below to rate and comment on the article.

This is invaluable to us to ensure that we continually strive to give our customers the best information possible.

Related:

Sophos Anti-Virus for Linux: Support for minor releases of RHEL, CentOS and Oracle Linux

This article describes the Sophos Anti-Virus for Linux support for minor releases of different Linux distributions.

Sophos uses commercially reasonable efforts, as described below, to support Sophos Antivirus for Linux on all minor point releases of Red Hat Enterprise Linux (RHEL) while the corresponding major version is supported. This includes the CentOS and Oracle Linux derivatives of RHEL.

Sophos will test and support Sophos Antivirus on the current active minor release of RHEL, CentOS, and Oracle Linux. When a new minor version is released by the operating system vendor, the previous minor version typically stops receiving important security updates. Sophos, therefore, recommends customers upgrade to the current active minor release as early as practicable.

To assist customers who are unable to upgrade their systems in line with RHEL minor releases, Sophos uses commercially reasonable efforts to support Sophos Antivirus on non-current minor releases of RHEL, CentOS, and Oracle Linux, on the following basis:

  • Support for configuration and usage questions for Sophos Antivirus for Linux will be provided by Sophos Technical Support
  • Technical product issues will be investigated using Sophos’ existing maintenance process, on the basis that the issue can be replicated on the current active minor release
  • If a reported product issue cannot be replicated on the current active minor release, or in the event that a software update would be required to provide a resolution for a non-current minor release, Sophos advises that such issues may fall outside the scope of commercially reasonable efforts support
  • The corresponding major version must be supported by Sophos, excluding extended or limited support offerings

If you’ve spotted an error or would like to provide feedback on this article, please use the section below to rate and comment on the article.

This is invaluable to us to ensure that we continually strive to give our customers the best information possible.

Related:

Auto Protect Malfunctioning

I need a solution

hello everyone, 

I have an issue with installing SEP Client on Linux .

as you can see I’m using CentOS 7.4 with kernel 3.10.0-693.el7.x86_64 , which according to the following article , is a valid kernel to install SEP Client on it : 

https://support.symantec.com/en_US/article.INFO3983.html

the problem is when i install SEP Client on my linux , everything seems to work fine except Auto-Protect : 

so i googled the issue , and found out that i have to complie the auto-protect files manually , so i tried it according to symantec article on the following link : 

https://support.symantec.com/en_US/article.TECH132773.html

but i got another error : 

so is there anyway to findout the problem ? 

thanks in advance 

0

Related:

Client Installation for Linux

I need a solution

I have downloaded the SEP 14.2 trialware to install on our integration and test system, however I am unable to find the Linux client installation package, most of the clients are CentOS.  Is it possible that I can be provided with the software?  Both auto-compile and manual compile (if they are different) thanks.

I tried the online chat for support, they sent me here. 🙂

0

Related:

Hotfix XS71ECU1033 – For XenServer 7.1 CU1

Who Should Install This Hotfix?

This is a hotfix for customers running XenServer 7.1 Cumulative Update 1 with a legacy disk partition scheme.

Note: This hotfix is available only to customers on the Customer Success Services program.

Information About this Hotfix

Component Details
Prerequisite None
Post-update tasks* Restart the XAPI Toolstack
Content live patchable** No
Baselines for Live Patch N/A
Revision History

Published on November 30, 2018

** Available to Enterprise Customers.

Issues Resolved In This Hotfix

This hotfix resolves the following issues:

  • If customers upgrade a host with legacy disk partition from XenServer 6.x to XenServer 7.1 CU1, and then attempt to apply a subsequent Cumulative Update as an update, they may receive an insufficient space error. This hotfix includes a fix to reduce the calculated space required to apply the update. You must apply this hotfix to XenServer 7.1 CU1 before attempting to update to a subsequent Cumulative Update. This hotfix should not be necessary on hosts that have the new host disk partition layout introduced in XenServer 7.0.
  • When customers are attempting to use Jumbo Frames, a VM without PV drivers installed would cause the MTU to drop to 1500 as the MTU was only being set for the paravirtualised VIF device and not for the fully emulated TAP device.

This hotfix also includes the following previously released hotfixes:

Installing the Hotfix

Customers should use either XenCenter or the XenServer Command Line Interface (CLI) to apply this hotfix. As with any software update, back up your data before applying this update. Citrix recommends updating all hosts within a pool sequentially. Upgrading of hosts should be scheduled to minimize the amount of time the pool runs in a “mixed state” where some hosts are upgraded and some are not. Running a mixed pool of updated and non-updated hosts for general operation is not supported.

Note: The attachment to this article is a zip file. It contains the hotfix update package only. Click the following link to download the source code for any modified open source components XS71ECU1033-sources.iso. The source code is not necessary for hotfix installation: it is provided to fulfill licensing obligations.

Installing the Hotfix by using XenCenter

Choose an Installation Mechanism

There are three mechanisms to install a hotfix:

  1. Automated Updates
  2. Download update from Citrix
  3. Select update or Supplemental pack from disk

The Automated Updates feature is available for XenServer Enterprise Edition customers, or to those who have access to XenServer through their XenApp/XenDesktop entitlement. For information about installing a hotfix using the Automated Updates feature, see the Applying Automated Updates in the XenServer documentation.

For information about installing a hotfix using the Download update from Citrix option, see Applying an Update to a Pool in the XenServer documentation.

The following section contains instructions on option (3) installing a hotfix that you have downloaded to disk:

  1. Download the hotfix to a known location on a computer that has XenCenter installed.
  2. Unzip the hotfix zip file and extract the .iso file
  3. In XenCenter, on the Tools menu, select Install Update. This displays the Install Update wizard.
  4. Read the information displayed on the Before You Start page and click Next to start the wizard.
  5. Click Browse to locate the iso file, select XS71ECU1033.iso and then click Open.
  6. Click Next.
  7. Select the pool or hosts you wish to apply the hotfix to, and then click Next.
  8. The Install Update wizard performs a number of update prechecks, including the space available on the hosts, to ensure that the pool is in a valid configuration state. The wizard also checks whether the hosts need to be rebooted after the update is applied and displays the result.
  9. Follow the on-screen recommendations to resolve any update prechecks that have failed. If you want XenCenter to automatically resolve all failed prechecks, click Resolve All. When the prechecks have been resolved, click Next.

  10. Choose the Update Mode. Review the information displayed on the screen and select an appropriate mode.
  11. Note: If you click Cancel at this stage, the Install Update wizard reverts the changes and removes the update file from the host.

  12. Click Install update to proceed with the installation. The Install Update wizard shows the progress of the update, displaying the major operations that XenCenter performs while updating each host in the pool.
  13. When the update is applied, click Finish to close the wizard.
  14. If you chose to carry out the post-update tasks, do so now.

Installing the Hotfix by using the xe Command Line Interface

  1. Download the hotfix file to a known location.
  2. Extract the .iso file from the zip.
  3. Upload the .iso file to the Pool Master by entering the following commands:

    (Where -s is the Pool Master’s IP address or DNS name.)

    xe -s <server> -u <username> -pw <password> update-upload file-name=<filename>XS71ECU1033.iso

    XenServer assigns the update file a UUID which this command prints. Note the UUID.

    4058e644-e819-11e8-842a-b36f8ca04d81

  4. Apply the update to all hosts in the pool, specifying the UUID of the update:

    xe update-pool-apply uuid=4058e644-e819-11e8-842a-b36f8ca04d81

    Alternatively, if you need to update and restart hosts in a rolling manner, you can apply the update file to an individual host by running the following:

    xe update-apply host=<host> uuid=4058e644-e819-11e8-842a-b36f8ca04d81

  5. Verify that the update was applied by using the update-list command.

    xe update-list -s <server> -u root -pw <password> name-label=XS71ECU1033

    If the update is successful, the hosts field contains the UUIDs of the hosts to which this patch was successfully applied. This should be a complete list of all hosts in the pool.

Files

Hotfix File

Component Details
Hotfix Filename XS71ECU1033.iso
Hotfix File sha256 b97c6d527df01ddac8d37746cb4c9d1a80d238b75cb82baf2cba433dcd22413a
Hotfix Source Filename XS71ECU1033-sources.iso
Hotfix Source File sha256 b33ecea9f4577f674fc725a0f47bb281aa3dbe7e7c6487ae3ff1c881572dd2f7
Hotfix Zip Filename XS71ECU1033.zip
Hotfix Zip File sha256 c8fc91a8e4e589e98879e05853bf5f03bdc5165fbbbad3dfcf62e830cb35c893
Size of the Zip file 48.9 MB

Files Updated

squeezed-0.13.2-1.el7.centos.x86_64.rpm
v6d-citrix-10.0.7-1.el7.centos.x86_64.rpm
vhd-tool-0.11.3-1.el7.centos.x86_64.rpm
xapi-core-1.14.39.1-1.x86_64.rpm
xapi-tests-1.14.39.1-1.x86_64.rpm
xapi-xe-1.14.39.1-1.x86_64.rpm
xcp-networkd-0.13.6-1.el7.centos.x86_64.rpm
xenopsd-0.17.12-1.el7.centos.x86_64.rpm
xenopsd-xc-0.17.12-1.el7.centos.x86_64.rpm
xenopsd-xenlight-0.17.12-1.el7.centos.x86_64.rpm

More Information

For more information, see XenServer Documentation.

If you experience any difficulties, contact Citrix Technical Support.

Related:

Hotfix XS71ECU1031 – For XenServer 7.1 CU1

Who Should Install This Hotfix?

This is a hotfix for customers running XenServer 7.1 Cumulative Update 1.

All customers who are affected by the issues described in CTX239100 – Citrix XenServer Multiple Security Updates should install this hotfix.

Note: This hotfix is available only to customers on the Customer Success Services program.

Information About this Hotfix

Component Details
Prerequisite None
Post-update tasks* Restart Host
Content live patchable** Yes
Baselines for Live Patch XS71ECU1026
Revision History

Published on October 26, 2018

** Available to Enterprise Customers.

Issues Resolved In This Hotfix

This security hotfix addresses the vulnerabilities as described in the Security Bulletin above.

This hotfix also includes the following previously released hotfixes:

Installing the Hotfix

Customers should use either XenCenter or the XenServer Command Line Interface (CLI) to apply this hotfix. As with any software update, back up your data before applying this update. Citrix recommends updating all hosts within a pool sequentially. Upgrading of hosts should be scheduled to minimize the amount of time the pool runs in a “mixed state” where some hosts are upgraded and some are not. Running a mixed pool of updated and non-updated hosts for general operation is not supported.

Note: The attachment to this article is a zip file. It contains the hotfix update package only. Click the following link to download the source code for any modified open source components XS71ECU1031-sources.iso. The source code is not necessary for hotfix installation: it is provided to fulfill licensing obligations.

Installing the Hotfix by using XenCenter

Choose an Installation Mechanism

There are three mechanisms to install a hotfix:

  1. Automated Updates
  2. Download update from Citrix
  3. Select update or Supplemental pack from disk

The Automated Updates feature is available for XenServer Enterprise Edition customers, or to those who have access to XenServer through their XenApp/XenDesktop entitlement. For information about installing a hotfix using the Automated Updates feature, see the Applying Automated Updates in the XenServer documentation.

For information about installing a hotfix using the Download update from Citrix option, see Applying an Update to a Pool in the XenServer documentation.

The following section contains instructions on option (3) installing a hotfix that you have downloaded to disk:

  1. Download the hotfix to a known location on a computer that has XenCenter installed.
  2. Unzip the hotfix zip file and extract the .iso file
  3. In XenCenter, on the Tools menu, select Install Update. This displays the Install Update wizard.
  4. Read the information displayed on the Before You Start page and click Next to start the wizard.
  5. Click Browse to locate the iso file, select XS71ECU1031.iso and then click Open.
  6. Click Next.
  7. Select the pool or hosts you wish to apply the hotfix to, and then click Next.
  8. The Install Update wizard performs a number of update prechecks, including the space available on the hosts, to ensure that the pool is in a valid configuration state. The wizard also checks whether the hosts need to be rebooted after the update is applied and displays the result.
  9. Follow the on-screen recommendations to resolve any update prechecks that have failed. If you want XenCenter to automatically resolve all failed prechecks, click Resolve All. When the prechecks have been resolved, click Next.

  10. Choose the Update Mode. Review the information displayed on the screen and select an appropriate mode.
  11. Note: If you click Cancel at this stage, the Install Update wizard reverts the changes and removes the update file from the host.

  12. Click Install update to proceed with the installation. The Install Update wizard shows the progress of the update, displaying the major operations that XenCenter performs while updating each host in the pool.
  13. When the update is applied, click Finish to close the wizard.
  14. If you chose to carry out the post-update tasks, do so now.

Installing the Hotfix by using the xe Command Line Interface

  1. Download the hotfix file to a known location.
  2. Extract the .iso file from the zip.
  3. Upload the .iso file to the Pool Master by entering the following commands:

    (Where -s is the Pool Master’s IP address or DNS name.)

    xe -s <server> -u <username> -pw <password> update-upload file-name=<filename>XS71ECU1031.iso

    XenServer assigns the update file a UUID which this command prints. Note the UUID.

    5b7e23fc-4b4f-43c3-8691-d7b453c771c3

  4. Apply the update to all hosts in the pool, specifying the UUID of the update:

    xe update-pool-apply uuid=5b7e23fc-4b4f-43c3-8691-d7b453c771c3

    Alternatively, if you need to update and restart hosts in a rolling manner, you can apply the update file to an individual host by running the following:

    xe update-apply host=<host> uuid=5b7e23fc-4b4f-43c3-8691-d7b453c771c3

  5. Verify that the update was applied by using the update-list command.

    xe update-list -s <server> -u root -pw <password> name-label=XS71ECU1031

    If the update is successful, the hosts field contains the UUIDs of the hosts to which this patch was successfully applied. This should be a complete list of all hosts in the pool.

  6. If the hotfix is applied successfully, restart each host in the pool, starting with the master.

Files

Hotfix File

Component Details
Hotfix Filename XS71ECU1031.iso
Hotfix File sha256 f58de41675ae60d19be43ed8990edba3b9037f58f05292316bf76690735ed9ca
Hotfix Source Filename XS71ECU1031-sources.iso
Hotfix Source File sha256 fc52d65d6173fba1b6f495f6df3159cddcf3675462d66336d775c0a4b11750bb
Hotfix Zip Filename XS71ECU1031.zip
Hotfix Zip File sha256 ac9e69847dcd8e075b03ae463e36e5c88f61eef1071b3928c22190320e2df8cf
Size of the Zip file 31.84 MB

Files Updated

dracut-033-360.el7.centos.xs13.x86_64.rpm
dracut-network-033-360.el7.centos.xs13.x86_64.rpm
kexec-tools-2.0.4-31.x86_64.rpm
linux-firmware-20170622-3.2.noarch.rpm
microcode_ctl-2.1-26.xs1.x86_64.rpm
xen-dom0-libs-4.7.5-1.22.x86_64.rpm
xen-dom0-tools-4.7.5-1.22.x86_64.rpm
xen-hypervisor-4.7.5-1.22.x86_64.rpm
xen-libs-4.7.5-1.22.x86_64.rpm
xen-livepatch_4.7.5_1.21-1-1.x86_64.rpm
xen-tools-4.7.5-1.22.x86_64.rpm

More Information

For more information, see XenServer Documentation.

If you experience any difficulties, contact Citrix Technical Support.

Related:

Upgrading Workload Balancing with Internet Access

Upgrading with the Internet requires that you download GNU wget, an HTTP retrieval utility. You also need to download a Python script that configures a repository (add-repo.py) on your virtual appliance.

To upgrade Workload Balancing in environments with Internet access

1. If you have not done so already, log in to the Workload Balancing appliance you want to upgrade as described in Section 8.1.1, “Logging in to the Workload Balancing Virtual Appliance”

2. Install GNU wget so you can retrieve the upgrade repository installation script using HTTP:

a. From the bash prompt, run the following command:

yum install wget

b. During installation, wget Setup asks you to accept various prompts, such as the size of the download package and the CentOS key. Type y when prompted.

3. When the wget installation is complete, download “add-repo” script by running the following command:

wget http://updates.xensource.com/XenServer/WLB/6.5/add-repo.py

When this command finishes running, a message appears stating the ‘add-repo.py’ script is saved.

4. At the bash prompt, run the following command to create the upgrade repository on the Workload Balancing appliance:

python add-repo.py

After the script finishes, the output states “Done.”

5. Do one of the following to upgrade your Workload Balancing virtual appliance:

• To upgrade both CentOS and Workload Balancing, run:

yum update

• To upgrade Workload Balancing only, run:

yum update citrix-wlb

• To upgrade CentOS only, run:

yum update –disablerepo=citrix-wlb

6. After upgrading either CentOS or Workload Balancing or both, restart the Workload Balancing virtual appliance.

Note:

After upgrading CentOS, the operating-system time changes from Coordinated Universal Time (UTC) to the local time zone. One side effect of this change is that the timestamps in the Workload Balancing log file (LogFile.log) also change from UTC time to local time. If you want to change the system time back to UTC time, run the following command in the Workload Balancing virtual appliance: rm -rf /etc/localtime.

Related:

Hotfix XS71ECU1026 – For XenServer 7.1 Cumulative Update 1

Who Should Install This Hotfix?

This is a hotfix for customers running XenServer 7.1 Cumulative Update 1.

All customers who are affected by the issues described in CTX236548 – Citrix XenServer Multiple Security Updates should install this hotfix.

Important: Customers running XenServer on AMD hardware may not be able to live migrate VMs back to the updated host. For more information, see CTX237585 – Unable to live migrate VMs on AMD hardware.

Note: This hotfix is available only to customers on the Customer Success Services program.

Information About this Hotfix

Component Details
Prerequisite None
Post-update tasks* Restart Host
Content live patchable** No
Baselines for Live Patch N/A
Revision History

Published on August 14, 2018

** Available to Enterprise Customers.

Issues Resolved In This Hotfix

This security hotfix addresses the vulnerabilities as described in the Security Bulletin above.

This hotfix also includes the following previously released hotfixes:

Installing the Hotfix

Customers should use either XenCenter or the XenServer Command Line Interface (CLI) to apply this hotfix. As with any software update, back up your data before applying this update. Citrix recommends updating all hosts within a pool sequentially. Upgrading of hosts should be scheduled to minimize the amount of time the pool runs in a “mixed state” where some hosts are upgraded and some are not. Running a mixed pool of updated and non-updated hosts for general operation is not supported.

Note: The attachment to this article is a zip file. It contains the hotfix update package only. Click the following link to download the source code for any modified open source components XS71ECU1026-sources.iso. The source code is not necessary for hotfix installation: it is provided to fulfill licensing obligations.

Installing the Hotfix by using XenCenter

Choose an Installation Mechanism

There are three mechanisms to install a hotfix:

  1. Automated Updates
  2. Download update from Citrix
  3. Select update or Supplemental pack from disk

The Automated Updates feature is available for XenServer Enterprise Edition customers, or to those who have access to XenServer through their XenApp/XenDesktop entitlement. For information about installing a hotfix using the Automated Updates feature, see the section Applying Automated Updates in the XenServer Installation Guide.

For information about installing a hotfix using the Download update from Citrix option, see the section Applying an Update to a Pool in the XenServer Installation Guide.

The following section contains instructions on option (3) installing a hotfix that you have downloaded to disk:

  1. Download the hotfix to a known location on a computer that has XenCenter installed.
  2. Unzip the hotfix zip file and extract the .iso file
  3. In XenCenter, on the Tools menu, select Install Update. This displays the Install Update wizard.
  4. Read the information displayed on the Before You Start page and click Next to start the wizard.
  5. Click Browse to locate the iso file, select XS71ECU1026.iso and then click Open.
  6. Click Next.
  7. Select the pool or hosts you wish to apply the hotfix to, and then click Next.
  8. The Install Update wizard performs a number of update prechecks, including the space available on the hosts, to ensure that the pool is in a valid configuration state. The wizard also checks whether the hosts need to be rebooted after the update is applied and displays the result.
  9. Follow the on-screen recommendations to resolve any update prechecks that have failed. If you want XenCenter to automatically resolve all failed prechecks, click Resolve All. When the prechecks have been resolved, click Next.

  10. Choose the Update Mode. Review the information displayed on the screen and select an appropriate mode.
  11. Note: If you click Cancel at this stage, the Install Update wizard reverts the changes and removes the update file from the host.

  12. Click Install update to proceed with the installation. The Install Update wizard shows the progress of the update, displaying the major operations that XenCenter performs while updating each host in the pool.
  13. When the update is applied, click Finish to close the wizard.
  14. If you chose to carry out the post-update tasks, do so now.

Installing the Hotfix by using the xe Command Line Interface

  1. Download the hotfix file to a known location.
  2. Extract the .iso file from the zip.
  3. Upload the .iso file to the Pool Master by entering the following commands:

    (Where -s is the Pool Master’s IP address or DNS name.)

    xe -s <server> -u <username> -pw <password> update-upload file-name=<filename>XS71ECU1026.iso

    XenServer assigns the update file a UUID which this command prints. Note the UUID.

    558b7a50-a412-471c-81a1-9f5cf87f1011

  4. Apply the update to all hosts in the pool, specifying the UUID of the update:

    xe update-pool-apply uuid=558b7a50-a412-471c-81a1-9f5cf87f1011

    Alternatively, if you need to update and restart hosts in a rolling manner, you can apply the update file to an individual host by running the following:

    xe update-apply host=<host> uuid=558b7a50-a412-471c-81a1-9f5cf87f1011

    Verify that the update was applied by using the update-list command.

  5. xe update-list -s <server> -u root -pw <password> name-label=XS71ECU1026

    If the update is successful, the hosts field contains the UUIDs of the hosts to which this patch was successfully applied. This should be a complete list of all hosts in the pool.

  6. If the hotfix is applied successfully, restart each host in the pool, starting with the master.

Files

Hotfix File

Component Details
Hotfix Filename XS71ECU1026.iso
Hotfix File sha256 4ee056f647d2cb659d7ccc337c8a9f5be394c029b8351b0484644cbdc1d36472
Hotfix Source Filename XS71ECU1026-sources.iso
Hotfix Source File sha256 2a6188b061d2bbbe8cff5f41ecf63b65ddd6b7d5777c5da6ec232434f5adf95e
Hotfix Zip Filename XS71ECU1026.zip
Hotfix Zip File sha256 92e672c5d242fef72411ea0e3aeed0bdad1318ebf13d4a92872bdf4c04154f9f
Size of the Zip file 31.83 MB

Files Updated

dracut-033-360.el7.centos.xs13.x86_64.rpm
dracut-network-033-360.el7.centos.xs13.x86_64.rpm
kexec-tools-2.0.4-31.x86_64.rpm
linux-firmware-20170622-3.2.noarch.rpm
microcode_ctl-2.1-26.xs1.x86_64.rpm
xen-dom0-libs-4.7.5-1.21.x86_64.rpm
xen-dom0-tools-4.7.5-1.21.x86_64.rpm
xen-hypervisor-4.7.5-1.21.x86_64.rpm
xen-libs-4.7.5-1.21.x86_64.rpm
xen-tools-4.7.5-1.21.x86_64.rpm

More Information

For more information, see XenServer Documentation.

If you experience any difficulties, contact Citrix Technical Support.

Related: