Wednesday, July 31, 2013
[USN-1923-1] GnuPG, Libgcrypt vulnerability
Ubuntu Security Notice USN-1923-1
August 01, 2013
gnupg, libgcrypt11 vulnerability
==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 13.04
- Ubuntu 12.10
- Ubuntu 12.04 LTS
- Ubuntu 10.04 LTS
Summary:
GnuPG and Libgcrypt could be made to expose sensitive information.
Software Description:
- gnupg: GNU privacy guard - a free PGP replacement
- libgcrypt11: LGPL Crypto library - runtime library
Details:
Yuval Yarom and Katrina Falkner discovered a timing-based information leak,
known as Flush+Reload, that could be used to trace execution in programs.
GnuPG and Libgcrypt followed different execution paths based on key-related
data, which could be used to expose the contents of private keys.
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 13.04:
gnupg 1.4.12-7ubuntu1.1
libgcrypt11 1.5.0-3ubuntu2.2
Ubuntu 12.10:
gnupg 1.4.11-3ubuntu4.2
libgcrypt11 1.5.0-3ubuntu1.1
Ubuntu 12.04 LTS:
gnupg 1.4.11-3ubuntu2.3
libgcrypt11 1.5.0-3ubuntu0.2
Ubuntu 10.04 LTS:
gnupg 1.4.10-2ubuntu1.3
libgcrypt11 1.4.4-5ubuntu2.2
In general, a standard system update will make all the necessary changes.
References:
http://www.ubuntu.com/usn/usn-1923-1
CVE-2013-4242
Package Information:
https://launchpad.net/ubuntu/+source/gnupg/1.4.12-7ubuntu1.1
https://launchpad.net/ubuntu/+source/libgcrypt11/1.5.0-3ubuntu2.2
https://launchpad.net/ubuntu/+source/gnupg/1.4.11-3ubuntu4.2
https://launchpad.net/ubuntu/+source/libgcrypt11/1.5.0-3ubuntu1.1
https://launchpad.net/ubuntu/+source/gnupg/1.4.11-3ubuntu2.3
https://launchpad.net/ubuntu/+source/libgcrypt11/1.5.0-3ubuntu0.2
https://launchpad.net/ubuntu/+source/gnupg/1.4.10-2ubuntu1.3
https://launchpad.net/ubuntu/+source/libgcrypt11/1.4.4-5ubuntu2.2
[USN-1922-1] Evolution Data Server vulnerability
Version: GnuPG v1.4.12 (GNU/Linux)
Comment: Using GnuPG with undefined - http://www.enigmail.net/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=eyo9
-----END PGP SIGNATURE-----
==========================================================================
Ubuntu Security Notice USN-1922-1
July 31, 2013
evolution-data-server vulnerability
==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 13.04
- Ubuntu 12.10
- Ubuntu 12.04 LTS
Summary:
Evolution would sometimes encrypt email to the wrong recipient.
Software Description:
- evolution-data-server: Evolution suite data server
Details:
Yves-Alexis Perez discovered that Evolution Data Server did not properly
select GPG recipients. Under certain circumstances, this could result in
Evolution encrypting email to an unintended recipient.
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 13.04:
libcamel-1.2-40 3.6.4-0ubuntu1.1
Ubuntu 12.10:
libcamel-1.2-40 3.6.2-0ubuntu0.2
Ubuntu 12.04 LTS:
libcamel-1.2-29 3.2.3-0ubuntu7.1
After a standard system update you need to restart Evolution to make all
the necessary changes.
References:
http://www.ubuntu.com/usn/usn-1922-1
CVE-2013-4166
Package Information:
https://launchpad.net/ubuntu/+source/evolution-data-server/3.6.4-0ubuntu1.1
https://launchpad.net/ubuntu/+source/evolution-data-server/3.6.2-0ubuntu0.2
https://launchpad.net/ubuntu/+source/evolution-data-server/3.2.3-0ubuntu7.1
[USN-1911-2] Ghostscript vulnerability
Version: GnuPG v1.4.12 (GNU/Linux)
Comment: Using GnuPG with undefined - http://www.enigmail.net/
iQIcBAEBCgAGBQJR+XBfAAoJEFHb3FjMVZVzmqAP/Amtngrk4+U1eAmx62hkIsnm
suClvQAE/rCnuFDeThyobbSZc5duyETCVIH4LvUxhjAu/ZnAH+vo1XyoTwARyymq
RXF2PyqbAgyvPRSl/yHqXDCGtjyxiJBvErY+cdVw0Fjf9GdcAgeS2EocJV54ltZ9
L6HwEBOd434PA5oU2Tu4n0hAs4ChP41q7rIxTnNKK2ehOAGmWNlt2XRKYNuvED/K
Ycf5b0pahQ/sUjNLZUGsvn/UQnaKMsMDIO4/W0hBhrYOfnEoHJBTUmmeQPIUkrKJ
VzJSUwx9zcywVevHr8D5NNNi7nXNp01dpIYMQaDCVQfZ4egYXUNGT/NYQi4kGk0v
LmKoGCYzb9dzvxGfNVPKi7cyF/wD9thDeYvvmEKoE0B0q11RdZs4IPz84GAftRyK
8SZtxex9NQ1SbUPrtFRmAu1eYLoMSIiQhiC4VCcpV8c3NouK6oaYkBCip3nKkATV
5JPObaW1qQ9Yn4ENifozxgHfQJz80quw+2+4s+buclGY6lLPqleSx1/TSKSbjyuO
PMEwDN3C1ZJLMsIKQVgBufAtKPZcBBlUn73Z4einVhQlDczzPAPBKOwmxstrJAdf
e4Zz/4xVBv00FxkRvRacCdryQF4lYQXlA637O42eORNDpXMVOs3M6LbxrWr+jtwQ
tH6eCTRH0GmC6A9oeM7j
=0gkK
-----END PGP SIGNATURE-----
==========================================================================
Ubuntu Security Notice USN-1911-2
July 31, 2013
ghostscript vulnerability
==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 13.04
Summary:
Ghostscript could be made to crash if it opened a specially crafted file.
Software Description:
- ghostscript: PostScript and PDF interpreter
Details:
USN-1911-1 fixed vulnerabilities in Little CMS. This update provides the
corresponding updates for Ghostscript.
Original advisory details:
It was discovered that Little CMS did not properly verify certain memory
allocations. If a user or automated system using Little CMS were tricked
into opening a specially crafted file, an attacker could cause Little CMS
to crash.
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 13.04:
libgs9 9.07~dfsg2-0ubuntu3.1
In general, a standard system update will make all the necessary changes.
References:
http://www.ubuntu.com/usn/usn-1911-2
http://www.ubuntu.com/usn/usn-1911-1
CVE-2013-4160
Package Information:
https://launchpad.net/ubuntu/+source/ghostscript/9.07~dfsg2-0ubuntu3.1
Fedora 17 End of Life
Hash: SHA1
As of 30th July 2013, Fedora 17 has reached its end of life for
updates and support. No further updates, including security updates,
will be available for Fedora 17. A previous reminder was sent on
July 3rd [0].
Fedora 18 will continue to receive updates until approximately one
month after the release of Fedora 20. The maintenance schedule of
Fedora releases is documented on the Fedora Project wiki [1]. The
Fedora Project wiki also contains instructions [2] on how to upgrade
from a previous release of Fedora to a version receiving updates.
Cheers,
Dennis
[0]
https://lists.fedoraproject.org/pipermail/announce/2013-July/003169.html
[1]
https://fedoraproject.org/wiki/Fedora_Release_Life_Cycle#Maintenance_Schedule
[2] http://fedoraproject.org/wiki/DistributionUpgrades
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v2.0.19 (GNU/Linux)
iEYEARECAAYFAlH5RDcACgkQkSxm47BaWfeGyQCfRaTPrFR2cZfg24tDmyEFL+j8
VIEAnRBsiNAYq+Pc6voWfC3DarHXH+qn
=gA5+
-----END PGP SIGNATURE-----
--
announce mailing list
announce@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/announce
[CentOS-announce] CEBA-2013:1123 CentOS 5 libxml2 Update
Upstream details at : https://rhn.redhat.com/errata/RHBA-2013-1123.html
The following updated files have been uploaded and are currently
syncing to the mirrors: ( sha256sum Filename )
i386:
ebf0b3974edaf326518788a1e5fe209e3eff0b38522e1169e1e6bed2ddf75eee libxml2-2.6.26-2.1.21.el5_9.3.i386.rpm
b56d1e1b3ef74aac4d8edbb7c0e8dcbb6ecca22fa3aed59d3308fc43c7f11c06 libxml2-devel-2.6.26-2.1.21.el5_9.3.i386.rpm
9f4d54db7a5c815b267a7f839a205a8b4800f1529f404c546afd0d07e437994d libxml2-python-2.6.26-2.1.21.el5_9.3.i386.rpm
x86_64:
ebf0b3974edaf326518788a1e5fe209e3eff0b38522e1169e1e6bed2ddf75eee libxml2-2.6.26-2.1.21.el5_9.3.i386.rpm
2df1b87ed8e375de99c52d313d3cd44249bb3b7e24ad21a703ff4376a065e0e1 libxml2-2.6.26-2.1.21.el5_9.3.x86_64.rpm
b56d1e1b3ef74aac4d8edbb7c0e8dcbb6ecca22fa3aed59d3308fc43c7f11c06 libxml2-devel-2.6.26-2.1.21.el5_9.3.i386.rpm
3ac4a4461b6f917c9ce3a5295e2ac0684d3bb0326772323ec1f4f139bc96f714 libxml2-devel-2.6.26-2.1.21.el5_9.3.x86_64.rpm
547f232e6e51a7e26c2aa86b1d5f679f4a9cd706a5e0415544cdbc53b4277609 libxml2-python-2.6.26-2.1.21.el5_9.3.x86_64.rpm
Source:
0560552aa2690edc58467b7cc113133dfb644fe8ff6328a3f44498788ac1fe6b libxml2-2.6.26-2.1.21.el5_9.3.src.rpm
--
Johnny Hughes
CentOS Project { http://www.centos.org/ }
irc: hughesjr, #centos@irc.freenode.net
_______________________________________________
CentOS-announce mailing list
CentOS-announce@centos.org
http://lists.centos.org/mailman/listinfo/centos-announce
Tuesday, July 30, 2013
[USN-1920-1] Linux kernel (OMAP4) vulnerability
Version: GnuPG v1.4.12 (GNU/Linux)
Comment: Using GnuPG with undefined - http://www.enigmail.net/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=/7x+
-----END PGP SIGNATURE-----
==========================================================================
Ubuntu Security Notice USN-1920-1
July 30, 2013
linux-ti-omap4 vulnerability
==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 13.04
Summary:
The system could be made to crash or run programs as an administrator.
Software Description:
- linux-ti-omap4: Linux kernel for OMAP4
Details:
Kees Cook discovered a format string vulnerability in the Broadcom B43
wireless driver for the Linux kernel. A local user could exploit this flaw
to gain administrative privileges.
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 13.04:
linux-image-3.5.0-229-omap4 3.5.0-229.42
After a standard system update you need to reboot your computer to make
all the necessary changes.
ATTENTION: Due to an unavoidable ABI change the kernel updates have
been given a new version number, which requires you to recompile and
reinstall all third party kernel modules you might have installed. If
you use linux-restricted-modules, you have to update that package as
well to get modules which work with the new kernel version. Unless you
manually uninstalled the standard kernel metapackages (e.g. linux-generic,
linux-server, linux-powerpc), a standard system upgrade will automatically
perform this as well.
References:
http://www.ubuntu.com/usn/usn-1920-1
CVE-2013-2852
Package Information:
https://launchpad.net/ubuntu/+source/linux-ti-omap4/3.5.0-229.42
[CentOS-announce] CESA-2013:1121 Low CentOS 5 sos Update
Upstream details at : https://rhn.redhat.com/errata/RHSA-2013-1121.html
The following updated files have been uploaded and are currently
syncing to the mirrors: ( sha256sum Filename )
i386:
1e2972ebedc4a8dff7524acaf7911e494718e499e675a41f3b28b7c341b60d19 sos-1.7-9.62.el5_9.1.noarch.rpm
x86_64:
1e2972ebedc4a8dff7524acaf7911e494718e499e675a41f3b28b7c341b60d19 sos-1.7-9.62.el5_9.1.noarch.rpm
Source:
fd07a41fca3aca304fb149d6c1a333367b0c281b773a5aaf2204b92a3f270622 sos-1.7-9.62.el5_9.1.src.rpm
--
Johnny Hughes
CentOS Project { http://www.centos.org/ }
irc: hughesjr, #centos@irc.freenode.net
_______________________________________________
CentOS-announce mailing list
CentOS-announce@centos.org
http://lists.centos.org/mailman/listinfo/centos-announce
[CentOS-announce] CESA-2013:1120 Moderate CentOS 6 haproxy Update
Upstream details at : https://rhn.redhat.com/errata/RHSA-2013-1120.html
The following updated files have been uploaded and are currently
syncing to the mirrors: ( sha256sum Filename )
i386:
b89b3098b127d18c78ed0965bdccac4c9099d47ad43d313b5aa79c64ffe6a116 haproxy-1.4.22-5.el6_4.i686.rpm
x86_64:
321d50a8209e5427e00a3369c779fd3f85c29db5d4c20b726bf30a31b30f220a haproxy-1.4.22-5.el6_4.x86_64.rpm
Source:
4c7110a2ef9c884388f3ab9f1644c5c3c2d1f3621fb88dcc374862ab3ebec7f9 haproxy-1.4.22-5.el6_4.src.rpm
--
Johnny Hughes
CentOS Project { http://www.centos.org/ }
irc: hughesjr, #centos@irc.freenode.net
_______________________________________________
CentOS-announce mailing list
CentOS-announce@centos.org
http://lists.centos.org/mailman/listinfo/centos-announce
[CentOS-announce] CESA-2013:1119 Moderate CentOS 6 389-ds-base Update
Upstream details at : https://rhn.redhat.com/errata/RHSA-2013-1119.html
The following updated files have been uploaded and are currently
syncing to the mirrors: ( sha256sum Filename )
i386:
e7a7848579f30b7bbe5fc08971bdeaf91f4af4b70696fbd6c3f783d5b787964e 389-ds-base-1.2.11.15-20.el6_4.i686.rpm
7f65459e3274cc33e3f9f3d349fc3514786910bbbd6c4133f16f5a2235ef6471 389-ds-base-devel-1.2.11.15-20.el6_4.i686.rpm
35d27c9650c1225386c6a96f16346aa865d5a153b2e2fa475f0050855c33a7be 389-ds-base-libs-1.2.11.15-20.el6_4.i686.rpm
x86_64:
7f6cf7f2c4c91d1cb25e3f0d302af788fc87e43d2afbe054fabe19efef455677 389-ds-base-1.2.11.15-20.el6_4.x86_64.rpm
7f65459e3274cc33e3f9f3d349fc3514786910bbbd6c4133f16f5a2235ef6471 389-ds-base-devel-1.2.11.15-20.el6_4.i686.rpm
1a8defa87282bbbd1f27e5261bd3bb0fc3b91a9c96c697e6f35a7f1e2c79aca4 389-ds-base-devel-1.2.11.15-20.el6_4.x86_64.rpm
35d27c9650c1225386c6a96f16346aa865d5a153b2e2fa475f0050855c33a7be 389-ds-base-libs-1.2.11.15-20.el6_4.i686.rpm
0c33ac9093cd211dd0f90910905db61cb0e9386efbfc66cd82b8fecd9a0e7fd1 389-ds-base-libs-1.2.11.15-20.el6_4.x86_64.rpm
Source:
ff8588f94c34b6d09b6e1d31dcf9175e4b0059628c3d9aa2875961d404002326 389-ds-base-1.2.11.15-20.el6_4.src.rpm
--
Johnny Hughes
CentOS Project { http://www.centos.org/ }
irc: hughesjr, #centos@irc.freenode.net
_______________________________________________
CentOS-announce mailing list
CentOS-announce@centos.org
http://lists.centos.org/mailman/listinfo/centos-announce
[CentOS-announce] CEBA-2013:1117 CentOS 6 python-urlgrabber FASTTRACK Update
Upstream details at : https://rhn.redhat.com/errata/RHBA-2013-1117.html
The following updated files have been uploaded and are currently
syncing to the mirrors: ( sha256sum Filename )
i386:
25a65554c75a773913baf694c56382ecd7595a1d8d2af7704ef87a4a22046f77 python-urlgrabber-3.9.1-9.el6.noarch.rpm
x86_64:
25a65554c75a773913baf694c56382ecd7595a1d8d2af7704ef87a4a22046f77 python-urlgrabber-3.9.1-9.el6.noarch.rpm
Source:
addfb96ce86adede7e9bb4313ee4c551795217a3762206d5189778bd448e5e98 python-urlgrabber-3.9.1-9.el6.src.rpm
--
Johnny Hughes
CentOS Project { http://www.centos.org/ }
irc: hughesjr, #centos@irc.freenode.net
_______________________________________________
CentOS-announce mailing list
CentOS-announce@centos.org
http://lists.centos.org/mailman/listinfo/centos-announce
[CentOS-announce] CEBA-2013:1118 CentOS 6 opencv FASTTRACK Update
Upstream details at : https://rhn.redhat.com/errata/RHBA-2013-1118.html
The following updated files have been uploaded and are currently
syncing to the mirrors: ( sha256sum Filename )
i386:
fb7055f2fcc955ae29a1a70cb4d2817c9c0844072cc6c4512b1dd2c07736ad65 opencv-2.0.0-12.el6.i686.rpm
112dab445e16aeed580a75a8ebea8a82b12f12fd6869a036f9b47f8de027171f opencv-devel-2.0.0-12.el6.i686.rpm
970386795a2beae78ab9536dea9ac3fe54acef4ac07c0966f2bfe3129baaf490 opencv-devel-docs-2.0.0-12.el6.noarch.rpm
322240955728dda1860a765469682d380dfae155e09d22b1c78e9bba6500b920 opencv-python-2.0.0-12.el6.i686.rpm
x86_64:
fb7055f2fcc955ae29a1a70cb4d2817c9c0844072cc6c4512b1dd2c07736ad65 opencv-2.0.0-12.el6.i686.rpm
524a2d9a1485e895f80a0e07cec981325807f167e4b2103ca46245dc43a7aefd opencv-2.0.0-12.el6.x86_64.rpm
112dab445e16aeed580a75a8ebea8a82b12f12fd6869a036f9b47f8de027171f opencv-devel-2.0.0-12.el6.i686.rpm
132bdfe48e9badd33b28dc2de6522a83ea32e0f7b12f0534aa3b47056fe1b03e opencv-devel-2.0.0-12.el6.x86_64.rpm
970386795a2beae78ab9536dea9ac3fe54acef4ac07c0966f2bfe3129baaf490 opencv-devel-docs-2.0.0-12.el6.noarch.rpm
92735ef59423ff2b009d0350fe8f2daf2cc30b64ecd1de96b23e8d4915e3a398 opencv-python-2.0.0-12.el6.x86_64.rpm
Source:
cf529d8d53401c9fde3d8f467d91b9d4a51891bf7aac347e484d3849ef1e7e9e opencv-2.0.0-12.el6.src.rpm
--
Johnny Hughes
CentOS Project { http://www.centos.org/ }
irc: hughesjr, #centos@irc.freenode.net
_______________________________________________
CentOS-announce mailing list
CentOS-announce@centos.org
http://lists.centos.org/mailman/listinfo/centos-announce
Monday, July 29, 2013
[CentOS-announce] CESA-2013:1115 Important CentOS 5 bind97 Update
Upstream details at : https://rhn.redhat.com/errata/RHSA-2013-1115.html
The following updated files have been uploaded and are currently
syncing to the mirrors: ( sha256sum Filename )
i386:
07353bfc8b4041910e8a0effc1dc60dd6761a95cfa778da02a5da474029c44ae bind97-9.7.0-17.P2.el5_9.2.i386.rpm
62b27079408913cb2437b0e2cdc482195ec8c990ae9c3d12fae24ccfeb0ba118 bind97-chroot-9.7.0-17.P2.el5_9.2.i386.rpm
fd04d1d5c334233d14b5c8ae0e7a540371447f6028bcf43c972b2366c21fc0a5 bind97-devel-9.7.0-17.P2.el5_9.2.i386.rpm
2f287d608f0f555b92c5ba0524eededd3ead2ebc8c74cc9ed2f05ced0830ff47 bind97-libs-9.7.0-17.P2.el5_9.2.i386.rpm
7b6271db504a410a3a2092ba781d2d2703232b27953f87e8250ea8754bcee744 bind97-utils-9.7.0-17.P2.el5_9.2.i386.rpm
x86_64:
9e3ae7f7c3bd6921ea8c8e215c63d1e4541821306e8a28f09f861070e6136baf bind97-9.7.0-17.P2.el5_9.2.x86_64.rpm
161e0bbd8ff3e64ac4f4fa85fea247bdb696865867856d20b04a8022ad8ae9d1 bind97-chroot-9.7.0-17.P2.el5_9.2.x86_64.rpm
fd04d1d5c334233d14b5c8ae0e7a540371447f6028bcf43c972b2366c21fc0a5 bind97-devel-9.7.0-17.P2.el5_9.2.i386.rpm
effe4b0436cd1abeb634f7ed5a09c755562527e5a527adedaf3d2a7551dd5526 bind97-devel-9.7.0-17.P2.el5_9.2.x86_64.rpm
2f287d608f0f555b92c5ba0524eededd3ead2ebc8c74cc9ed2f05ced0830ff47 bind97-libs-9.7.0-17.P2.el5_9.2.i386.rpm
5f66c754d1b817ed61fef76b202c78e60d55849acf28060526fb725893368e92 bind97-libs-9.7.0-17.P2.el5_9.2.x86_64.rpm
3b97d3edf6568400b8fdd0f860e4e431f920c319d15d3222078f54438b65c547 bind97-utils-9.7.0-17.P2.el5_9.2.x86_64.rpm
Source:
5b8053329c3e5ad7562ef00100a4016505b78a614848be73c35522b1fc366d27 bind97-9.7.0-17.P2.el5_9.2.src.rpm
--
Johnny Hughes
CentOS Project { http://www.centos.org/ }
irc: hughesjr, #centos@irc.freenode.net
_______________________________________________
CentOS-announce mailing list
CentOS-announce@centos.org
http://lists.centos.org/mailman/listinfo/centos-announce
[CentOS-announce] CESA-2013:1114 Important CentOS 6 bind Update
Upstream details at : https://rhn.redhat.com/errata/RHSA-2013-1114.html
The following updated files have been uploaded and are currently
syncing to the mirrors: ( sha256sum Filename )
i386:
2cecf1ef3617a88c4d73ed9e5c5000702408dd8873f3a2b59bdfaf113d5e4d14 bind-9.8.2-0.17.rc1.el6_4.5.i686.rpm
8f6d3e6d9c23456debb8ca623bfe0fe3d2e29fde67b5db64b3e6b4c25191e7e0 bind-chroot-9.8.2-0.17.rc1.el6_4.5.i686.rpm
32a365e12c1d5537867982d18715f9d69fa31ec746f14b4ace4d73f576c57146 bind-devel-9.8.2-0.17.rc1.el6_4.5.i686.rpm
3221984e7500cebca31518ca679b8fff5d97542fb188f6e98b462eaafefb8db2 bind-libs-9.8.2-0.17.rc1.el6_4.5.i686.rpm
9f76328995846ff950dffa91b1b0374c507613a15acfb7ff2403fd594c2a7056 bind-sdb-9.8.2-0.17.rc1.el6_4.5.i686.rpm
737422dd5bcad54cc32217a94b17de6a12068f3b7588e14bc5511c14a99ede23 bind-utils-9.8.2-0.17.rc1.el6_4.5.i686.rpm
x86_64:
340ba0114a123f8e7362002202031a8c4bb72a89b4822f1380fd3fc56a74dd2d bind-9.8.2-0.17.rc1.el6_4.5.x86_64.rpm
abeb1c0474d6a9dd14b06ab002f68a71afa79f27ec5482f00379f48947c2a2cb bind-chroot-9.8.2-0.17.rc1.el6_4.5.x86_64.rpm
32a365e12c1d5537867982d18715f9d69fa31ec746f14b4ace4d73f576c57146 bind-devel-9.8.2-0.17.rc1.el6_4.5.i686.rpm
eb2ef371ccf99a859007cf448f55e0df42de6be953d77b37c6d71baf7b22b208 bind-devel-9.8.2-0.17.rc1.el6_4.5.x86_64.rpm
3221984e7500cebca31518ca679b8fff5d97542fb188f6e98b462eaafefb8db2 bind-libs-9.8.2-0.17.rc1.el6_4.5.i686.rpm
8215a47204fc8d0b0ead5acdacab2255b64a63a076d4fc231666266b334deee8 bind-libs-9.8.2-0.17.rc1.el6_4.5.x86_64.rpm
c424699ef7210ad81dc93ed9521b6f986b620d56b1beb5e300a7ccb65eba62de bind-sdb-9.8.2-0.17.rc1.el6_4.5.x86_64.rpm
c4c420fad53d83ed34a5ccd588b30726d0a45d75557c47917539f32c061c9df8 bind-utils-9.8.2-0.17.rc1.el6_4.5.x86_64.rpm
Source:
0613587760b68d4ce3c0becd1cbe8281ddab224fdcbabff2b4d026ae01a14985 bind-9.8.2-0.17.rc1.el6_4.5.src.rpm
--
Johnny Hughes
CentOS Project { http://www.centos.org/ }
irc: hughesjr, #centos@irc.freenode.net
_______________________________________________
CentOS-announce mailing list
CentOS-announce@centos.org
http://lists.centos.org/mailman/listinfo/centos-announce
[USN-1919-1] Linux kernel vulnerability
Version: GnuPG v1.4.12 (GNU/Linux)
Comment: Using GnuPG with undefined - http://www.enigmail.net/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=+TYH
-----END PGP SIGNATURE-----
==========================================================================
Ubuntu Security Notice USN-1919-1
July 29, 2013
linux vulnerability
==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 13.04
Summary:
The system could be made to crash or run programs as an administrator.
Software Description:
- linux: Linux kernel
Details:
Kees Cook discovered a format string vulnerability in the Broadcom B43
wireless driver for the Linux kernel. A local user could exploit this flaw
to gain administrative privileges.
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 13.04:
linux-image-3.8.0-27-generic 3.8.0-27.40
After a standard system update you need to reboot your computer to make
all the necessary changes.
ATTENTION: Due to an unavoidable ABI change the kernel updates have
been given a new version number, which requires you to recompile and
reinstall all third party kernel modules you might have installed. If
you use linux-restricted-modules, you have to update that package as
well to get modules which work with the new kernel version. Unless you
manually uninstalled the standard kernel metapackages (e.g. linux-generic,
linux-server, linux-powerpc), a standard system upgrade will automatically
perform this as well.
References:
http://www.ubuntu.com/usn/usn-1919-1
CVE-2013-2852
Package Information:
https://launchpad.net/ubuntu/+source/linux/3.8.0-27.40
[USN-1918-1] Linux kernel (OMAP4) vulnerability
Version: GnuPG v1.4.12 (GNU/Linux)
Comment: Using GnuPG with undefined - http://www.enigmail.net/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=G4sx
-----END PGP SIGNATURE-----
==========================================================================
Ubuntu Security Notice USN-1918-1
July 29, 2013
linux-ti-omap4 vulnerability
==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 12.10
Summary:
The system could be made to crash or run programs as an administrator.
Software Description:
- linux-ti-omap4: Linux kernel for OMAP4
Details:
Kees Cook discovered a format string vulnerability in the Broadcom B43
wireless driver for the Linux kernel. A local user could exploit this flaw
to gain administrative privileges.
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 12.10:
linux-image-3.5.0-229-omap4 3.5.0-229.42
After a standard system update you need to reboot your computer to make
all the necessary changes.
ATTENTION: Due to an unavoidable ABI change the kernel updates have
been given a new version number, which requires you to recompile and
reinstall all third party kernel modules you might have installed. If
you use linux-restricted-modules, you have to update that package as
well to get modules which work with the new kernel version. Unless you
manually uninstalled the standard kernel metapackages (e.g. linux-generic,
linux-server, linux-powerpc), a standard system upgrade will automatically
perform this as well.
References:
http://www.ubuntu.com/usn/usn-1918-1
CVE-2013-2852
Package Information:
https://launchpad.net/ubuntu/+source/linux-ti-omap4/3.5.0-229.42
[USN-1917-1] Linux kernel vulnerability
Version: GnuPG v1.4.12 (GNU/Linux)
Comment: Using GnuPG with undefined - http://www.enigmail.net/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=ss3m
-----END PGP SIGNATURE-----
==========================================================================
Ubuntu Security Notice USN-1917-1
July 29, 2013
linux vulnerability
==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 12.10
Summary:
The system could be made to crash or run programs as an administrator.
Software Description:
- linux: Linux kernel
Details:
Kees Cook discovered a format string vulnerability in the Broadcom B43
wireless driver for the Linux kernel. A local user could exploit this flaw
to gain administrative privileges.
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 12.10:
linux-image-3.5.0-37-generic 3.5.0-37.58
linux-image-3.5.0-37-highbank 3.5.0-37.58
linux-image-3.5.0-37-omap 3.5.0-37.58
linux-image-3.5.0-37-powerpc-smp 3.5.0-37.58
linux-image-3.5.0-37-powerpc64-smp 3.5.0-37.58
After a standard system update you need to reboot your computer to make
all the necessary changes.
ATTENTION: Due to an unavoidable ABI change the kernel updates have
been given a new version number, which requires you to recompile and
reinstall all third party kernel modules you might have installed. If
you use linux-restricted-modules, you have to update that package as
well to get modules which work with the new kernel version. Unless you
manually uninstalled the standard kernel metapackages (e.g. linux-generic,
linux-server, linux-powerpc), a standard system upgrade will automatically
perform this as well.
References:
http://www.ubuntu.com/usn/usn-1917-1
CVE-2013-2852
Package Information:
https://launchpad.net/ubuntu/+source/linux/3.5.0-37.58
[USN-1916-1] Linux kernel (Raring HWE) vulnerability
Version: GnuPG v1.4.12 (GNU/Linux)
Comment: Using GnuPG with undefined - http://www.enigmail.net/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=YgJ8
-----END PGP SIGNATURE-----
==========================================================================
Ubuntu Security Notice USN-1916-1
July 29, 2013
linux-lts-raring vulnerability
==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 12.04 LTS
Summary:
The system could be made to crash or run programs as an administrator.
Software Description:
- linux-lts-raring: Linux hardware enablement kernel from Raring
Details:
Kees Cook discovered a format string vulnerability in the Broadcom B43
wireless driver for the Linux kernel. A local user could exploit this flaw
to gain administrative privileges.
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 12.04 LTS:
linux-image-3.8.0-27-generic 3.8.0-27.40~precise3
After a standard system update you need to reboot your computer to make
all the necessary changes.
ATTENTION: Due to an unavoidable ABI change the kernel updates have
been given a new version number, which requires you to recompile and
reinstall all third party kernel modules you might have installed. If
you use linux-restricted-modules, you have to update that package as
well to get modules which work with the new kernel version. Unless you
manually uninstalled the standard kernel metapackages (e.g. linux-generic,
linux-server, linux-powerpc), a standard system upgrade will automatically
perform this as well.
References:
http://www.ubuntu.com/usn/usn-1916-1
CVE-2013-2852
Package Information:
https://launchpad.net/ubuntu/+source/linux-lts-raring/3.8.0-27.40~precise3
[USN-1915-1] Linux kernel (Quantal HWE) vulnerability
Version: GnuPG v1.4.12 (GNU/Linux)
Comment: Using GnuPG with undefined - http://www.enigmail.net/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=eF8V
-----END PGP SIGNATURE-----
==========================================================================
Ubuntu Security Notice USN-1915-1
July 29, 2013
linux-lts-quantal vulnerability
==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 12.04 LTS
Summary:
The system could be made to crash or run programs as an administrator.
Software Description:
- linux-lts-quantal: Linux hardware enablement kernel from Quantal
Details:
Kees Cook discovered a format string vulnerability in the Broadcom B43
wireless driver for the Linux kernel. A local user could exploit this flaw
to gain administrative privileges.
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 12.04 LTS:
linux-image-3.5.0-37-generic 3.5.0-37.58~precise1
After a standard system update you need to reboot your computer to make
all the necessary changes.
ATTENTION: Due to an unavoidable ABI change the kernel updates have
been given a new version number, which requires you to recompile and
reinstall all third party kernel modules you might have installed. If
you use linux-restricted-modules, you have to update that package as
well to get modules which work with the new kernel version. Unless you
manually uninstalled the standard kernel metapackages (e.g. linux-generic,
linux-server, linux-powerpc), a standard system upgrade will automatically
perform this as well.
References:
http://www.ubuntu.com/usn/usn-1915-1
CVE-2013-2852
Package Information:
https://launchpad.net/ubuntu/+source/linux-lts-quantal/3.5.0-37.58~precise1
[USN-1914-1] Linux kernel vulnerability
Version: GnuPG v1.4.12 (GNU/Linux)
Comment: Using GnuPG with undefined - http://www.enigmail.net/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=H+yb
-----END PGP SIGNATURE-----
==========================================================================
Ubuntu Security Notice USN-1914-1
July 29, 2013
linux vulnerability
==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 12.04 LTS
Summary:
The system could be made to crash or run programs as an administrator.
Software Description:
- linux: Linux kernel
Details:
Kees Cook discovered a format string vulnerability in the Broadcom B43
wireless driver for the Linux kernel. A local user could exploit this flaw
to gain administrative privileges.
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 12.04 LTS:
linux-image-3.2.0-51-generic 3.2.0-51.77
linux-image-3.2.0-51-generic-pae 3.2.0-51.77
linux-image-3.2.0-51-highbank 3.2.0-51.77
linux-image-3.2.0-51-omap 3.2.0-51.77
linux-image-3.2.0-51-powerpc-smp 3.2.0-51.77
linux-image-3.2.0-51-powerpc64-smp 3.2.0-51.77
linux-image-3.2.0-51-virtual 3.2.0-51.77
After a standard system update you need to reboot your computer to make
all the necessary changes.
ATTENTION: Due to an unavoidable ABI change the kernel updates have
been given a new version number, which requires you to recompile and
reinstall all third party kernel modules you might have installed. If
you use linux-restricted-modules, you have to update that package as
well to get modules which work with the new kernel version. Unless you
manually uninstalled the standard kernel metapackages (e.g. linux-generic,
linux-server, linux-powerpc), a standard system upgrade will automatically
perform this as well.
References:
http://www.ubuntu.com/usn/usn-1914-1
CVE-2013-2852
Package Information:
https://launchpad.net/ubuntu/+source/linux/3.2.0-51.77
[USN-1913-1] Linux kernel (EC2) vulnerabilities
Version: GnuPG v1.4.12 (GNU/Linux)
Comment: Using GnuPG with undefined - http://www.enigmail.net/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=/i93
-----END PGP SIGNATURE-----
==========================================================================
Ubuntu Security Notice USN-1913-1
July 29, 2013
linux-ec2 vulnerabilities
==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 10.04 LTS
Summary:
Several security issues were fixed in the kernel.
Software Description:
- linux-ec2: Linux kernel for EC2
Details:
Jonathan Salwan discovered an information leak in the Linux kernel's cdrom
driver. A local user can exploit this leak to obtain sensitive information
from kernel memory if the CD-ROM drive is malfunctioning. (CVE-2013-2164)
A flaw was discovered in the Linux kernel when an IPv6 socket is used to
connect to an IPv4 destination. An unprivileged local user could exploit
this flaw to cause a denial of service (system crash). (CVE-2013-2232)
An information leak was discovered in the IPSec key_socket implementation
in the Linux kernel. An local user could exploit this flaw to examine
potentially sensitive information in kernel memory. (CVE-2013-2234)
An information leak was discovered in the Linux kernel's IPSec key_socket
when using the notify_policy interface. A local user could exploit this
flaw to examine potentially sensitive information in kernel memory.
(CVE-2013-2237)
Kees Cook discovered a format string vulnerability in the Linux kernel's
disk block layer. A local user with administrator privileges could exploit
this flaw to gain kernel privileges. (CVE-2013-2851)
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 10.04 LTS:
linux-image-2.6.32-355-ec2 2.6.32-355.68
After a standard system update you need to reboot your computer to make
all the necessary changes.
ATTENTION: Due to an unavoidable ABI change the kernel updates have
been given a new version number, which requires you to recompile and
reinstall all third party kernel modules you might have installed. If
you use linux-restricted-modules, you have to update that package as
well to get modules which work with the new kernel version. Unless you
manually uninstalled the standard kernel metapackages (e.g. linux-generic,
linux-server, linux-powerpc), a standard system upgrade will automatically
perform this as well.
References:
http://www.ubuntu.com/usn/usn-1913-1
CVE-2013-2164, CVE-2013-2232, CVE-2013-2234, CVE-2013-2237,
CVE-2013-2851
Package Information:
https://launchpad.net/ubuntu/+source/linux-ec2/2.6.32-355.68
[USN-1912-1] Linux kernel vulnerabilities
Version: GnuPG v1.4.12 (GNU/Linux)
Comment: Using GnuPG with undefined - http://www.enigmail.net/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=OwiD
-----END PGP SIGNATURE-----
==========================================================================
Ubuntu Security Notice USN-1912-1
July 29, 2013
linux vulnerabilities
==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 10.04 LTS
Summary:
Several security issues were fixed in the kernel.
Software Description:
- linux: Linux kernel
Details:
Jonathan Salwan discovered an information leak in the Linux kernel's cdrom
driver. A local user can exploit this leak to obtain sensitive information
from kernel memory if the CD-ROM drive is malfunctioning. (CVE-2013-2164)
A flaw was discovered in the Linux kernel when an IPv6 socket is used to
connect to an IPv4 destination. An unprivileged local user could exploit
this flaw to cause a denial of service (system crash). (CVE-2013-2232)
An information leak was discovered in the IPSec key_socket implementation
in the Linux kernel. An local user could exploit this flaw to examine
potentially sensitive information in kernel memory. (CVE-2013-2234)
An information leak was discovered in the Linux kernel's IPSec key_socket
when using the notify_policy interface. A local user could exploit this
flaw to examine potentially sensitive information in kernel memory.
(CVE-2013-2237)
Kees Cook discovered a format string vulnerability in the Linux kernel's
disk block layer. A local user with administrator privileges could exploit
this flaw to gain kernel privileges. (CVE-2013-2851)
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 10.04 LTS:
linux-image-2.6.32-50-386 2.6.32-50.112
linux-image-2.6.32-50-generic 2.6.32-50.112
linux-image-2.6.32-50-generic-pae 2.6.32-50.112
linux-image-2.6.32-50-ia64 2.6.32-50.112
linux-image-2.6.32-50-lpia 2.6.32-50.112
linux-image-2.6.32-50-powerpc 2.6.32-50.112
linux-image-2.6.32-50-powerpc-smp 2.6.32-50.112
linux-image-2.6.32-50-powerpc64-smp 2.6.32-50.112
linux-image-2.6.32-50-preempt 2.6.32-50.112
linux-image-2.6.32-50-server 2.6.32-50.112
linux-image-2.6.32-50-sparc64 2.6.32-50.112
linux-image-2.6.32-50-sparc64-smp 2.6.32-50.112
linux-image-2.6.32-50-versatile 2.6.32-50.112
linux-image-2.6.32-50-virtual 2.6.32-50.112
After a standard system update you need to reboot your computer to make
all the necessary changes.
ATTENTION: Due to an unavoidable ABI change the kernel updates have
been given a new version number, which requires you to recompile and
reinstall all third party kernel modules you might have installed. If
you use linux-restricted-modules, you have to update that package as
well to get modules which work with the new kernel version. Unless you
manually uninstalled the standard kernel metapackages (e.g. linux-generic,
linux-server, linux-powerpc), a standard system upgrade will automatically
perform this as well.
References:
http://www.ubuntu.com/usn/usn-1912-1
CVE-2013-2164, CVE-2013-2232, CVE-2013-2234, CVE-2013-2237,
CVE-2013-2851
Package Information:
https://launchpad.net/ubuntu/+source/linux/2.6.32-50.112
[USN-1911-1] Little CMS vulnerability
Version: GnuPG v1.4.12 (GNU/Linux)
Comment: Using GnuPG with undefined - http://www.enigmail.net/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=28+G
-----END PGP SIGNATURE-----
==========================================================================
Ubuntu Security Notice USN-1911-1
July 29, 2013
lcms2 vulnerability
==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 13.04
- Ubuntu 12.10
- Ubuntu 12.04 LTS
Summary:
Little CMS could be made to crash if it opened a specially crafted file.
Software Description:
- lcms2: Little CMS 2 color management library
Details:
It was discovered that Little CMS did not properly verify certain memory
allocations. If a user or automated system using Little CMS were tricked
into opening a specially crafted file, an attacker could cause Little CMS
to crash.
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 13.04:
liblcms2-2 2.4-0ubuntu3.1
Ubuntu 12.10:
liblcms2-2 2.2+git20110628-2ubuntu4.1
Ubuntu 12.04 LTS:
liblcms2-2 2.2+git20110628-2ubuntu3.1
After a standard system update you need to restart any applications that
uses Little CMS to make all the necessary changes.
References:
http://www.ubuntu.com/usn/usn-1911-1
CVE-2013-4160
Package Information:
https://launchpad.net/ubuntu/+source/lcms2/2.4-0ubuntu3.1
https://launchpad.net/ubuntu/+source/lcms2/2.2+git20110628-2ubuntu4.1
https://launchpad.net/ubuntu/+source/lcms2/2.2+git20110628-2ubuntu3.1
[CentOS-announce] CEBA-2013:1112 CentOS 6 net-snmp Update
Upstream details at : https://rhn.redhat.com/errata/RHBA-2013-1112.html
The following updated files have been uploaded and are currently
syncing to the mirrors: ( sha256sum Filename )
i386:
70519ea5efc82328b629f216b4183d89cc7b9a7943ce164cb8849608f3c4cd1c net-snmp-5.5-44.el6_4.3.i686.rpm
9f3307443db8a1616188bf60bab3458729c41c593b146cd77a84674bf2d064ef net-snmp-devel-5.5-44.el6_4.3.i686.rpm
25ab85790811157b9879022efc772fd5ef88645643f795d8d5e368bcd4b8a7aa net-snmp-libs-5.5-44.el6_4.3.i686.rpm
4310efac5a8084c8094b4bc02e2e0c094d88ab88815c3840918a3b786fdd6848 net-snmp-perl-5.5-44.el6_4.3.i686.rpm
98e62361f6270f9f0418a6affff1ac4048696a343887a0b08c2480e7d33c0e83 net-snmp-python-5.5-44.el6_4.3.i686.rpm
6b8ff28c472256a0c489a9f18ddd4e83ae422b0822726f13f458d4857c1713b1 net-snmp-utils-5.5-44.el6_4.3.i686.rpm
x86_64:
3233c259ed3c516ffbfa86471953c6e3e6259e6f8bc6d5148d5d9498a7d5e6fe net-snmp-5.5-44.el6_4.3.x86_64.rpm
9f3307443db8a1616188bf60bab3458729c41c593b146cd77a84674bf2d064ef net-snmp-devel-5.5-44.el6_4.3.i686.rpm
9a75d2a89442822689d957bda5a9e0ca2e5644f49b7ab60fe7e6552c099c9721 net-snmp-devel-5.5-44.el6_4.3.x86_64.rpm
25ab85790811157b9879022efc772fd5ef88645643f795d8d5e368bcd4b8a7aa net-snmp-libs-5.5-44.el6_4.3.i686.rpm
fc60db91a959731f2550f36c4703e3c544ed0cc4a168dc05601848cff15f8093 net-snmp-libs-5.5-44.el6_4.3.x86_64.rpm
57aca348bdbc2b69f159661360eca1f7bee2dcf41712f5efb1139f53d37f0fee net-snmp-perl-5.5-44.el6_4.3.x86_64.rpm
12fd3e047a6fe45aa0885b1873e44b7b913151c02c7227651fb6e606766bbc45 net-snmp-python-5.5-44.el6_4.3.x86_64.rpm
391ba506926a145c450b78c94d68a4167a3b5110940f382baec126f35d595be9 net-snmp-utils-5.5-44.el6_4.3.x86_64.rpm
Source:
3df0e53ac945d04bc6493dbceaa1347192d318c507e19a7d851cf0770c42946c net-snmp-5.5-44.el6_4.3.src.rpm
--
Johnny Hughes
CentOS Project { http://www.centos.org/ }
irc: hughesjr, #centos@irc.freenode.net
_______________________________________________
CentOS-announce mailing list
CentOS-announce@centos.org
http://lists.centos.org/mailman/listinfo/centos-announce
[USN-1910-1] Bind vulnerability
Version: GnuPG v1.4.12 (GNU/Linux)
Comment: Using GnuPG with undefined - http://www.enigmail.net/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=iMMD
-----END PGP SIGNATURE-----
==========================================================================
Ubuntu Security Notice USN-1910-1
July 29, 2013
bind9 vulnerability
==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 13.04
- Ubuntu 12.10
- Ubuntu 12.04 LTS
- Ubuntu 10.04 LTS
Summary:
Bind could be made to crash if it received specially crafted network
traffic.
Software Description:
- bind9: Internet Domain Name Server
Details:
Maxim Shudrak discovered that Bind incorrectly handled certain malformed
rdata. A remote attacker could use this flaw with a specially crafted
query to cause Bind to stop responding, resulting in a denial of service.
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 13.04:
bind9 1:9.9.2.dfsg.P1-2ubuntu2.1
libdns95 1:9.9.2.dfsg.P1-2ubuntu2.1
Ubuntu 12.10:
bind9 1:9.8.1.dfsg.P1-4.2ubuntu3.3
libdns81 1:9.8.1.dfsg.P1-4.2ubuntu3.3
Ubuntu 12.04 LTS:
bind9 1:9.8.1.dfsg.P1-4ubuntu0.7
libdns81 1:9.8.1.dfsg.P1-4ubuntu0.7
Ubuntu 10.04 LTS:
bind9 1:9.7.0.dfsg.P1-1ubuntu0.10
libdns64 1:9.7.0.dfsg.P1-1ubuntu0.10
In general, a standard system update will make all the necessary changes.
References:
http://www.ubuntu.com/usn/usn-1910-1
CVE-2013-4854
Package Information:
https://launchpad.net/ubuntu/+source/bind9/1:9.9.2.dfsg.P1-2ubuntu2.1
https://launchpad.net/ubuntu/+source/bind9/1:9.8.1.dfsg.P1-4.2ubuntu3.3
https://launchpad.net/ubuntu/+source/bind9/1:9.8.1.dfsg.P1-4ubuntu0.7
https://launchpad.net/ubuntu/+source/bind9/1:9.7.0.dfsg.P1-1ubuntu0.10
[CentOS-announce] CEBA-2013:1109 CentOS 6 xorg-x11-drv-mga Update
Upstream details at : https://rhn.redhat.com/errata/RHBA-2013-1109.html
The following updated files have been uploaded and are currently
syncing to the mirrors: ( sha256sum Filename )
i386:
9df43ddff609ec225962d24246dc6d1a4743761746779ba3b7d1ec65b290e3e8 xorg-x11-drv-mga-1.6.1-8.el6_4.i686.rpm
x86_64:
bd22fd85bc7729ffe7b18210c984f974d574a5a597e96506ca57c6ea51eb2458 xorg-x11-drv-mga-1.6.1-8.el6_4.x86_64.rpm
Source:
0e57deef5e021482c49c8bebb11edce6354e4bb2171fd2b4d55d8cdc137189be xorg-x11-drv-mga-1.6.1-8.el6_4.src.rpm
--
Johnny Hughes
CentOS Project { http://www.centos.org/ }
irc: hughesjr, #centos@irc.freenode.net
_______________________________________________
CentOS-announce mailing list
CentOS-announce@centos.org
http://lists.centos.org/mailman/listinfo/centos-announce
Friday, July 26, 2013
[FreeBSD-Announce] FreeBSD Security Advisory FreeBSD-SA-13:08.nfsserver
Hash: SHA1
=============================================================================
FreeBSD-SA-13:08.nfsserver Security Advisory
The FreeBSD Project
Topic: Incorrect privilege validation in the NFS server
Category: core
Module: nfsserver
Announced: 2013-07-26
Credits: Rick Macklem, Christopher Key, Tim Zingelman
Affects: FreeBSD 8.3, FreeBSD 9.0 and FreeBSD 9.1
Corrected: 2012-12-28 14:06:49 UTC (stable/9, 9.2-BETA2)
2013-07-26 22:40:23 UTC (releng/9.1, 9.1-RELEASE-p5)
2013-01-06 01:11:45 UTC (stable/8, 8.3-STABLE)
2013-07-26 22:40:29 UTC (releng/8.3, 8.3-RELEASE-p9)
CVE Name: CVE-2013-4851
For general information regarding FreeBSD Security Advisories,
including descriptions of the fields above, security branches, and the
following sections, please visit <URL:http://security.FreeBSD.org/>.
I. Background
The Network File System (NFS) allows a host to export some or all of its
file systems so that other hosts can access them over the network and mount
them as if they were on local disks. FreeBSD includes both server and client
implementations of NFS.
II. Problem Description
The kernel incorrectly uses client supplied credentials instead of the one
configured in exports(5) when filling out the anonymous credential for a
NFS export, when -network or -host restrictions are used at the same time.
III. Impact
The remote client may supply privileged credentials (e.g. the root user)
when accessing a file under the NFS share, which will bypass the normal
access checks.
IV. Workaround
Systems that do not provide the NFS service are not vulnerable. Systems that
do provide the NFS service are only vulnerable when -mapall or -maproot is
used in combination with network and/or host restrictions.
V. Solution
Perform one of the following:
1) Upgrade your vulnerable system to a supported FreeBSD stable or
release / security branch (releng) dated after the correction date.
2) To update your vulnerable system via a source code patch:
The following patches have been verified to apply to the applicable
FreeBSD release branches.
a) Download the relevant patch from the location below, and verify the
detached PGP signature using your PGP utility.
# fetch http://security.FreeBSD.org/patches/SA-13:08/nfsserver.patch
# fetch http://security.FreeBSD.org/patches/SA-13:08/nfsserver.patch.asc
# gpg --verify nfsserver.patch.asc
b) Apply the patch.
# cd /usr/src
# patch < /path/to/patch
c) Recompile your kernel as described in
<URL:http://www.FreeBSD.org/handbook/kernelconfig.html> and reboot the
system.
3) To update your vulnerable system via a binary patch:
Systems running a RELEASE version of FreeBSD on the i386 or amd64
platforms can be updated via the freebsd-update(8) utility:
# freebsd-update fetch
# freebsd-update install
VI. Correction details
The following list contains the correction revision numbers for each
affected branch.
Branch/path Revision
- -------------------------------------------------------------------------
stable/8/ r245086
releng/8.3/ r253694
stable/9/ r244772
releng/9.1/ r253693
- -------------------------------------------------------------------------
To see which files were modified by a particular revision, run the
following command, replacing XXXXXX with the revision number, on a
machine with Subversion installed:
# svn diff -cXXXXXX --summarize svn://svn.freebsd.org/base
Or visit the following URL, replacing XXXXXX with the revision number:
<URL:http://svnweb.freebsd.org/base?view=revision&revision=XXXXXX>
VII. References
<URL:http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4851>
The latest revision of this advisory is available at
http://security.FreeBSD.org/advisories/FreeBSD-SA-13:08.nfsserver.asc
-----BEGIN PGP SIGNATURE-----
iEYEARECAAYFAlHzPrkACgkQFdaIBMps37I9YACfSu4orRhgOhol8vacW9kF3ZGP
jtAAn0t2i14CMo1MT5MztI6RWX3hnUWZ
=xjf/
-----END PGP SIGNATURE-----
_______________________________________________
freebsd-announce@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-announce
To unsubscribe, send any mail to "freebsd-announce-unsubscribe@freebsd.org"
[FreeBSD-Announce] FreeBSD Security Advisory FreeBSD-SA-13:07.bind
Hash: SHA1
=============================================================================
FreeBSD-SA-13:07.bind Security Advisory
The FreeBSD Project
Topic: BIND remote denial of service
Category: contrib
Module: bind
Announced: 2013-07-26
Credits: Maxim Shudrak and the HP Zero Day Initiative, ISC
Affects: FreeBSD 8.4-RELEASE and FreeBSD 9.x
Corrected: 2013-07-26 22:53:17 UTC (stable/8, 8.4-STABLE)
2013-07-26 22:40:17 UTC (releng/8.4, 8.4-RELEASE-p2)
2013-07-26 22:43:09 UTC (stable/9, 9.2-BETA2)
2013-07-26 22:40:23 UTC (releng/9.1, 9.1-RELEASE-p5)
CVE Name: CVE-2013-4854
For general information regarding FreeBSD Security Advisories,
including descriptions of the fields above, security branches, and the
following sections, please visit <URL:http://security.FreeBSD.org/>.
I. Background
BIND 9 is an implementation of the Domain Name System (DNS) protocols.
The named(8) daemon is an Internet Domain Name Server. The libdns
library is a library of DNS protocol support functions.
II. Problem Description
Due to a software defect a specially crafted query which includes
malformed rdata, could cause named(8) to crash with an assertion
failure and rejecting the malformed query. This issue affects both
recursive and authoritative-only nameservers.
III. Impact
An attacker who can send a specially crafted query could cause named(8)
to crash, resulting in a denial of service.
IV. Workaround
No workaround is available, but systems not running the named(8) service
and not using the base system DNS utilities are not affected.
V. Solution
Perform one of the following:
1) Upgrade your vulnerable system to a supported FreeBSD stable or
release / security branch (releng) dated after the correction date.
2) To update your vulnerable system via a source code patch:
The following patches have been verified to apply to the applicable
FreeBSD release branches.
a) Download the relevant patch from the location below, and verify the
detached PGP signature using your PGP utility.
# fetch http://security.FreeBSD.org/patches/SA-13:07/bind.patch
# fetch http://security.FreeBSD.org/patches/SA-13:07/bind.patch.asc
# gpg --verify bind.patch.asc
b) Execute the following commands as root:
# cd /usr/src
# patch < /path/to/patch
Recompile the operating system using buildworld and installworld as
described in <URL:http://www.FreeBSD.org/handbook/makeworld.html>.
Restart the named daemon, or reboot the system.
3) To update your vulnerable system via a binary patch:
Systems running a RELEASE version of FreeBSD on the i386 or amd64
platforms can be updated via the freebsd-update(8) utility:
# freebsd-update fetch
# freebsd-update install
VI. Correction details
The following list contains the correction revision numbers for each
affected branch.
Branch/path Revision
- -------------------------------------------------------------------------
stable/8/ r253696
releng/8.4/ r253692
stable/9/ r253695
releng/9.1/ r253693
- -------------------------------------------------------------------------
To see which files were modified by a particular revision, run the
following command, replacing XXXXXX with the revision number, on a
machine with Subversion installed:
# svn diff -cXXXXXX --summarize svn://svn.freebsd.org/base
Or visit the following URL, replacing XXXXXX with the revision number:
<URL:http://svnweb.freebsd.org/base?view=revision&revision=XXXXXX>
VII. References
https://kb.isc.org/article/AA-01015
<URL:http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4854>
The latest revision of this advisory is available at
http://security.FreeBSD.org/advisories/FreeBSD-SA-13:07.bind.asc
-----BEGIN PGP SIGNATURE-----
iEYEARECAAYFAlHzPpMACgkQFdaIBMps37Jb2ACdFqaNTTBFiOCuz30MJ5s85UVd
MzoAn2ebCjqULwyEbJaeTlck87NPfQWR
=RFf2
-----END PGP SIGNATURE-----
_______________________________________________
freebsd-announce@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-announce
To unsubscribe, send any mail to "freebsd-announce-unsubscribe@freebsd.org"
Thursday, July 25, 2013
botan update to 1.10
this is a heads-up that I updated the botan package to the latest
stable version 1.10.5 in rawhide, as requested in bug 822421.
This changes the API and thus the soname of the library. Also, since
1.9.18, the library and header paths have been changed to allow
parallel installation of different versions of the library, so headers
are in /usr/include/botan-1.10/botan now, the library is named
libbotan-1.10, botan-config and the botan pkg-config file are
namespaced.
The dependent packages that need to be rebuilt by their owners are:
* bind10: configure finds botan-1.10, but a local rebuild failed
later due to an unrelated problem as far as I can see
* softhsm: seems to support botan-1.10 in principle, but needs a
patch for configure (resp. m4/acx_botan.m4) from SVN
* ne7ssh: rebuild failed, seems to need a patch
* monotone: needs a patch from mainline, will take care of that myself
Regards,
Thomas
_______________________________________________
devel-announce mailing list
devel-announce@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel-announce
[USN-1909-1] MySQL vulnerabilities
Version: GnuPG v1.4.12 (GNU/Linux)
Comment: Using GnuPG with undefined - http://www.enigmail.net/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=02Pf
-----END PGP SIGNATURE-----
==========================================================================
Ubuntu Security Notice USN-1909-1
July 25, 2013
mysql-5.5, mysql-dfsg-5.1 vulnerabilities
==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 13.04
- Ubuntu 12.10
- Ubuntu 12.04 LTS
- Ubuntu 10.04 LTS
Summary:
Several security issues were fixed in MySQL.
Software Description:
- mysql-5.5: MySQL database
- mysql-dfsg-5.1: MySQL database
Details:
Multiple security issues were discovered in MySQL and this update includes
new upstream MySQL versions to fix these issues.
MySQL has been updated to 5.1.70 in Ubuntu 10.04 LTS. Ubuntu 12.04 LTS,
Ubuntu 12.10 and Ubuntu 13.04 have been updated to MySQL 5.5.32.
In addition to security fixes, the updated packages contain bug fixes,
new features, and possibly incompatible changes.
Please see the following for more information:
http://dev.mysql.com/doc/relnotes/mysql/5.1/en/news-5-1-70.html
http://dev.mysql.com/doc/relnotes/mysql/5.5/en/news-5-5-32.html
http://www.oracle.com/technetwork/topics/security/cpujuly2013-1899826.html
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 13.04:
mysql-server-5.5 5.5.32-0ubuntu0.13.04.1
Ubuntu 12.10:
mysql-server-5.5 5.5.32-0ubuntu0.12.10.1
Ubuntu 12.04 LTS:
mysql-server-5.5 5.5.32-0ubuntu0.12.04.1
Ubuntu 10.04 LTS:
mysql-server-5.1 5.1.70-0ubuntu0.10.04.1
In general, a standard system update will make all the necessary changes.
References:
http://www.ubuntu.com/usn/usn-1909-1
CVE-2013-1861, CVE-2013-2162, CVE-2013-3783, CVE-2013-3793,
CVE-2013-3802, CVE-2013-3804, CVE-2013-3809, CVE-2013-3812
Package Information:
https://launchpad.net/ubuntu/+source/mysql-5.5/5.5.32-0ubuntu0.13.04.1
https://launchpad.net/ubuntu/+source/mysql-5.5/5.5.32-0ubuntu0.12.10.1
https://launchpad.net/ubuntu/+source/mysql-5.5/5.5.32-0ubuntu0.12.04.1
https://launchpad.net/ubuntu/+source/mysql-dfsg-5.1/5.1.70-0ubuntu0.10.04.1
Summary of accepted Fedora 20 Changes - week 30
This is a summary of accepted Fedora 20 Changes by FESCo for week 30
(2013-07-24 meeting).
= System Wide Changes =
* Unversioned Docdirs -
https://fedoraproject.org/wiki/Changes/UnversionedDocdirs discussed on
https://lists.fedoraproject.org/pipermail/devel/2013-July/185633.html
* Allow kdump on secureboot machines -
https://fedoraproject.org/wiki/Changes/Kdump_with_secureboot discussed on
https://lists.fedoraproject.org/pipermail/devel/2013-July/185133.html
Partially accepted Changes
* No Default Sendmail -
https://fedoraproject.org/wiki/Changes/NoDefaultSendmail -
https://lists.fedoraproject.org/pipermail/devel/2013-July/185328.html
Sendmail will be removed from @core. Removal of sendmail from @standard didn't
pass. Note: About @standard group might be decided in next release of Fedora.
* No Default Syslog - https://fedoraproject.org/wiki/Changes/NoDefaultSyslog
discussed on https://lists.fedoraproject.org/pipermail/devel/2013-July/185329.html
Remove rsyslog from @core, move to @standard pending revaluation in future.
* Change Packaging Guidelines to discourage requires into /bin and /sbin -
https://fedoraproject.org/wiki/Changes/NoBinDeps discussed on
https://lists.fedoraproject.org/pipermail/devel/2013-July/185632.html
FESCo agreed to defer to FPC to figure out the right thing to do here,
reevaluate if this needs to be handled as a Change later
= Self Contained Changes =
* Vagrant - https://fedoraproject.org/wiki/Changes/Vagrant discussed on
https://lists.fedoraproject.org/pipermail/devel/2013-July/185864.html
* GNOME 3.10 - https://fedoraproject.org/wiki/Changes/Gnome3.10 discussed on
https://lists.fedoraproject.org/pipermail/devel/2013-July/185381.html
* DNSSEC support for FreeIPA -
http://fedoraproject.org/wiki/Changes/IPAv3DNSSEC discussed on
http://lists.fedoraproject.org/pipermail/devel/2013-July/185626.html
* Snapshot and Rollback Tool - http://fedoraproject.org/wiki/Changes/Rollback
discussed on https://lists.fedoraproject.org/pipermail/devel/2013-July/185804.html
* Transitive Trusts with Active Directory support for FreeIPA -
http://fedoraproject.org/wiki/Changes/IPAv3TransitiveTrusts discussed on
https://lists.fedoraproject.org/pipermail/devel/2013-July/185634.html
* OS Installer Support for LVM Thin Provisioning -
http://fedoraproject.org/wiki/Changes/InstallerLVMThinProvisioningSupport
discussed on https://lists.fedoraproject.org/pipermail/devel/2013-July/185803.html
FESCo accepts LVM thinp as a Change and asks to treat usability issues as bugs
to be worked out, change documentation from N/A to 'please document in install
guide' and speak to maintainers of tools like coreutils.
* Enlightenment - http://fedoraproject.org/wiki/Changes/Enlightenment
discussed on https://lists.fedoraproject.org/pipermail/devel/2013-July/186080.html (announced on 2013-07-18 but without complaints)
* Apache OpenOffice - http://fedoraproject.org/wiki/Changes/ApacheOpenOffice
discussed on https://lists.fedoraproject.org/pipermail/devel/2013-July/
Apache OpenOffice Change is accepted under the condition that the conflicts with
libreoffice must be worked out. openoffice and libreoffice packagers get to work
them out. There is no Fesco mandate that libreoffice must change to accomodate
openoffice at this time. alternatives is not the way to resolve the conflicts but
environment-modules may be looked at as a similar means to achieve that.
mattdm wants this to be perfectly clear: FESCo does not grant automatic
exceptions to our processes on any basis.
* X2Go - http://fedoraproject.org//wiki/Changes/X2Go discussed on
https://lists.fedoraproject.org/pipermail/devel/2013-July/185644.html
* Sugar 0.100 (1.0) - http://fedoraproject.org/wiki/Changes/Sugar-0.100
discussed on https://lists.fedoraproject.org/pipermail/devel/2013-July/185808.html
* SSSD Smart Card Support -
http://fedoraproject.org/wiki/Changes/SSSD_Smart_Card_Support discussed on
https://lists.fedoraproject.org/pipermail/devel/2013-July/185977.html
* ACPICA Tools Update - http://fedoraproject.org/wiki/Changes/AcpicaTools
discussed on https://lists.fedoraproject.org/pipermail/devel/2013-July/185802.html
* Developer Assistant GUI -
http://fedoraproject.org/wiki/Changes/DeveloperAssistantGUI discussed on
https://lists.fedoraproject.org/pipermail/devel/2013-July/185374.html
* Role based access control with libvirt -
http://fedoraproject.org/wiki/Changes/Virt_ACLs discussed on
https://lists.fedoraproject.org/pipermail/devel/2013-July/185419.html
* SSSD CIFS plugin - http://fedoraproject.org/wiki/Changes/SSSD_CIFS_plugin
discussed on https://lists.fedoraproject.org/pipermail/devel/2013-July/185376.html
* FreeIPA OTP UI - http://fedoraproject.org/wiki/Changes/IPAv3OTPUI discussed
on https://lists.fedoraproject.org/pipermail/devel/2013-July/185657.html
* Ryu Network Operating System - http://fedoraproject.org/wiki/Changes/Ryu
discussed on https://lists.fedoraproject.org/pipermail/devel/2013-July/184930.html
* Plasma-nm - http://fedoraproject.org/wiki/Changes/Plasma-nm discussed on
https://lists.fedoraproject.org/pipermail/devel/2013-July/185649.html
_______________________________________________
devel-announce mailing list
devel-announce@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel-announce
F20 System Wide Change: Enable SELinux Labeled NFS Support
https://fedoraproject.org/wiki/Changes/LabeledNFS
Change owner(s): Daniel Walsh <dwalsh@redhat.com>, Steve Dickson
<steved@redhat.com>
The Linux Kernel has grown support for passing SELinux labels between a client
and server using NFS.
== Detailed description ==
We have always needed to treat NFS mounts with a single label usually
something like nfs_t. Or at best allow an administrator to override the
default with a label using the mount --context option. With this change we
have lots of different Labels supported on an NFS share.
== Scope ==
Proposal owners:
* Steve Dickson needs to make sure nfs-utils works properly.
* Dan Walsh needs to make sure selinux-policy works properly in all use cases.
Other developers: Kernel
* Turn on Labeled NFS in the Fedora Kernel, Fix any policy issues that arise
because of this. I believe this is mainly a testing issue, and that the
functionality is complete.
Release engineering: N/A (No changes for Release Engineering)
Policies and guidelines: N/A (not affected)
_______________________________________________
devel-announce mailing list
devel-announce@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel-announce
Wednesday, July 24, 2013
[CentOS-announce] CEBA-2013:X006 Xen4CentOS kernel Update
Version: GnuPG v2.0.14 (GNU/Linux)
iEYEARECAAYFAlHvw6kACgkQTKkMgmrBY7MraQCfXOH6MArFw9efWmV8LSvGiW8S
ldIAn1tLFSkD4QG6NL+xGE9jpeg3p1Bb
=RLPy
-----END PGP SIGNATURE-----
CentOS Errata and Bug Fix Advisory 2013:X006 (Xen4CentOS)
The following updated files have been uploaded and are currently
syncing to the mirrors: ( sha256sum Filename )
-----------------------------
X86_64
-----------------------------
e1000e-2.4.14-3.4.54.1.el6.centos.alt.x86_64.rpm:
42e5a701631d08eca5a62c0f3cb1c9cc527fad358fe74e72f426dd4ce16e384a
kernel-3.4.54-8.el6.centos.alt.x86_64.rpm:
f33e351084f5952a863cb8ba8f1e5ceb51999958e10fbf539bab52b89166b100
kernel-devel-3.4.54-8.el6.centos.alt.x86_64.rpm:
2bc8fc1f3b276d151ca50ad5943cacde5ce168cb026dd328008b021c28fd5865
kernel-doc-3.4.54-8.el6.centos.alt.noarch.rpm:
2608e0189f98dfd78b35feb0a14c2050e96bb7bd04e17a74b58028a143421354
kernel-firmware-3.4.54-8.el6.centos.alt.noarch.rpm:
5c6ff0197936db9a3d26241ae92543f2b56d3a342393b9c3d416598f0eab22a4
kernel-headers-3.4.54-8.el6.centos.alt.x86_64.rpm:
145392ddd7953f7e2aa9e7cc4a4a6ed64f2e1e73cb59a1db6d86ef7bb3797dba
perf-3.4.54-8.el6.centos.alt.x86_64.rpm
e83327bfc33b5dcde1eaa239ebadea9769895419a8c1f0f2a9bd02e99bc2b03c
-----------------------------
Source:
-----------------------------
e1000e-2.4.14-3.4.54.1.el6.centos.alt.src.rpm:
2c2a71b086ec3d1cab87466c11d9f33874c25652c9a91afb3f2fc79d7ff3602a
kernel-3.4.54-8.el6.centos.alt.src.rpm:
caeeceef9a9bb890fa852f22f51249f4c4102cb4bb30a988e983dc3638c75c3a
==================================================================
Corrected the following CentOS Bugs in this kernel:
http://bugs.centos.org/view.php?id=6561
http://bugs.centos.org/view.php?id=6570
==================================================================
kernel Changelog info from the SPEC file:
* Mon Jul 22 2013 Johnny Hughes johnny@centos.org 3.4.54-8
- upgraded to upstream version 3.4.54
- Turned on CONFIG_XEN_BALLOON_MEMORY_HOTPLUG
in this kernel (centos bug 6561)
- added patch 131 and patch 132 per centos bug 6570
==================================================================
The following kernel.org changelog entries are applicable since the last
kernel update:
https://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.4.54
==================================================================
Note: After kernel updates on a Xen Dom0 machine, you must run
"/usr/bin/grub-bootxen.sh" to add the xen hypervisor to
/boot/grub/grub.conf See this page for grub.conf details:
http://wiki.centos.org/HowTos/Xen/Xen4QuickStart
Note: As before, the e1000e driver provided replaces the mainline
driver. It has some support for newer hardware and should only be used
if the mainline driver does not detect your e1000e NIC.
--
Johnny Hughes
CentOS Project { http://www.centos.org/ }
irc: hughesjr, #centos at irc.freenode.net
Tuesday, July 23, 2013
[CentOS-announce] CEBA-2013:1102 CentOS 6 crash-gcore-command Update
Upstream details at : https://rhn.redhat.com/errata/RHBA-2013-1102.html
The following updated files have been uploaded and are currently
syncing to the mirrors: ( sha256sum Filename )
i386:
e7d44190c825fa3368083a938536b0ea9da777919d5a4a31c4769ebb6ca83bea crash-gcore-command-1.0-4.el6_4.i686.rpm
x86_64:
1ba3a4a874e290f5a3f588d92521c292025db7139e67bc706d432e9d843bc6c2 crash-gcore-command-1.0-4.el6_4.x86_64.rpm
Source:
4c9ee88076c6ce0c1baf841f4cf2cc44ba4e9492cbcb37f9f1e1b9755a03b982 crash-gcore-command-1.0-4.el6_4.src.rpm
--
Johnny Hughes
CentOS Project { http://www.centos.org/ }
irc: hughesjr, #centos@irc.freenode.net
_______________________________________________
CentOS-announce mailing list
CentOS-announce@centos.org
http://lists.centos.org/mailman/listinfo/centos-announce
Planned Outage: Datacenter work outage - 2013-07-30 21:00 UTC
Version: GnuPG v2.0.20 (GNU/Linux)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=+jVf
-----END PGP SIGNATURE-----
Planned Outage: Datacenter work outage - 2013-07-30 21:00 UTC
There will be an outage starting at 2013-07-30 21:00 UTC, which will
last approximately 4 hours.
To convert UTC to your local time, take a look at
http://fedoraproject.org/wiki/Infrastructure/UTCHowto
or run:
date -d '2013-07-30 21:00 UTC'
Reason for outage:
We are going to be adding memory and disks to various virtual server
hosts and updating all instances to the latest security updates.
During the outage window particular services may go down and come back
up. We will try and keep disruptions down as much as we are able.
Affected Services:
Ask Fedora - http://ask.fedoraproject.org/
BFO - http://boot.fedoraproject.org/
Blockerbugs - https://qa.fedoraproject.org/blockerbugs/
Bodhi - https://admin.fedoraproject.org/updates/
Buildsystem - http://koji.fedoraproject.org/
GIT / Source Control - pkgs.fedoraproject.org
Docs - http://docs.fedoraproject.org/
Email system
Fedora Account System - https://admin.fedoraproject.org/accounts/
Fedora Community - https://admin.fedoraproject.org/community/
Fedora Calendar - https://apps.fedoraproject.org/calendar/
Fedora Hosted - https://fedorahosted.org/
(trac logins may be unavailable when/if openid is down)
Fedora OpenID - https://id.fedoraproject.org/
Mirror Manager - https://admin.fedoraproject.org/mirrormanager/
Package Database - https://admin.fedoraproject.org/pkgdb/
Wiki - http://fedoraproject.org/wiki/
Unaffected Services:
DNS - ns-sb01.fedoraproject.org, ns02.fedoraproject.org,
ns04.fedoraproject.org, ns05.fedoraproject.org
Fedora People - http://fedorapeople.org/
Main Website - http://fedoraproject.org/
Mirror List - https://mirrors.fedoraproject.org/
Spins - http://spins.fedoraproject.org/
Start - http://start.fedoraproject.org/
Torrent - http://torrent.fedoraproject.org/
Secondary Architectures
QA Services
Contact Information:
Ticket Link:
https://fedorahosted.org/fedora-infrastructure/ticket/3904
Please join #fedora-admin or #fedora-noc on irc.freenode.net or add
comments to the ticket for this outage above.