Thursday, July 31, 2014

[FreeBSD-Announce] The FreeBSD Foundation July 2014 Semi-Annual Newsletter

-----BEGIN PGP SIGNATURE-----
Comment: GPGTools - http://gpgtools.org

iQEcBAEBCgAGBQJT2qKOAAoJELLsYiYPtogfEr0H/iDp2SsxIuAbNxB/YvpHtrh5
dIcCMAivrGdUp+jdgqxusiuxllTnS3KTeeHXnjCtRqZemSofCnju3J7f2/AFYITJ
ayLUJgv0Jm+vGtn2AWJEIaobZC+zzNIZD75jOYLCAp0JJo3YU2YPqpmsLNSj9Q7X
1YdydmawAk0QxDeNs0gaZhzCoA0y/RlKleKsSoAce3VO30VIGEdR+XdK/aMASQQv
Of5JBFSfzB2lXQDZMXDAhFhSE1mSDxufaEwrDBKUCYzMXU5v+kh9d6OJQ5jqcuFE
U8iS+QYfvCcO+qlcSCVoo8bsHxxRkf5AyflSBxmbYbhNqVIq6xpNBHGYYuVjh3Q=
=WpZz
-----END PGP SIGNATURE-----
Dear FreeBSD Community,

We are pleased to announce the publication of our July 2014 Semi-Annual Newsletter! It's full of interesting articles highlighting projects we've funded, conferences we've sponsored, our new online magazine the FreeBSD Journal, an inspirational letter from our president and founder, and other things we've been involved in. We even have another testimonial from a big-time FreeBSD user!

Go here to read our newsletter:
https://www.freebsdfoundation.org/press/2014jul-newsletter

Thank you for your support!

The FreeBSD Foundation

[CentOS-announce] CESA-2014:0981 Important CentOS 6 kernel Update

CentOS Errata and Security Advisory 2014:0981 Important

Upstream details at : https://rhn.redhat.com/errata/RHSA-2014-0981.html

The following updated files have been uploaded and are currently
syncing to the mirrors: ( sha256sum Filename )

i386:
a33fddc2c29ed4fa890c0673d351cada355b6595aa7e4119691c47c539f719a0 kernel-2.6.32-431.23.3.el6.i686.rpm
bfaf02c06dca59985d2466e06de9ca924a1bac24589978a12d8ea74047540698 kernel-abi-whitelists-2.6.32-431.23.3.el6.noarch.rpm
0896c8aadb4e7804de75cb08f4ef2b608d0ce8a46d08eeb2992117700a3bb3ba kernel-debug-2.6.32-431.23.3.el6.i686.rpm
a636480b39b1ad3ca68bc551dc064e4fa73ca00e2d78882af64a132a2b6538f2 kernel-debug-devel-2.6.32-431.23.3.el6.i686.rpm
8f3780d92e3d93e393493acf7e5a96f48b579ac0d13512f32d0704e22fcf8806 kernel-devel-2.6.32-431.23.3.el6.i686.rpm
4ea181b90c3b96a04afaa6384a781c635ef6d1f4f4522c6fea171ea95a270c6f kernel-doc-2.6.32-431.23.3.el6.noarch.rpm
0e61c8998a6e8824c97321c50a4a63067dfbf40088cd4a3d7e4c4c714c24b812 kernel-firmware-2.6.32-431.23.3.el6.noarch.rpm
f902714e0725651132f1bd0178f4cfeff2cf41b73ac99a5cab378545aba8000f kernel-headers-2.6.32-431.23.3.el6.i686.rpm
e34b9965937e87f29b7adea548b6bc084b9c37844933b23ba9e4c377e3d5fd08 perf-2.6.32-431.23.3.el6.i686.rpm
0b13896d8453db79b410bafaca2473b6aa477152148796a1ba157d41fc985b18 python-perf-2.6.32-431.23.3.el6.i686.rpm

x86_64:
86369f48087131b2ef554871c44ff342b37577be3d0878ce2ae001a404be0b6c kernel-2.6.32-431.23.3.el6.x86_64.rpm
bfaf02c06dca59985d2466e06de9ca924a1bac24589978a12d8ea74047540698 kernel-abi-whitelists-2.6.32-431.23.3.el6.noarch.rpm
820424f2da378c70b7cfb56ec797d489d5b35f23eb48df5566246c31e1ed29d0 kernel-debug-2.6.32-431.23.3.el6.x86_64.rpm
6418fc38647218c6c12d1567416dfcb664d60a3e6911043025b70ab1dd7feb09 kernel-debug-devel-2.6.32-431.23.3.el6.x86_64.rpm
a78e8517118353d53ec5cfca44c26478b5f8184ee1348d2f1f575149a76164d5 kernel-devel-2.6.32-431.23.3.el6.x86_64.rpm
4ea181b90c3b96a04afaa6384a781c635ef6d1f4f4522c6fea171ea95a270c6f kernel-doc-2.6.32-431.23.3.el6.noarch.rpm
0e61c8998a6e8824c97321c50a4a63067dfbf40088cd4a3d7e4c4c714c24b812 kernel-firmware-2.6.32-431.23.3.el6.noarch.rpm
bee8e2f94872dec215ad7432fe6bac82234d164b43cf7c4e23fa689f1f3aba37 kernel-headers-2.6.32-431.23.3.el6.x86_64.rpm
4f1afc1e3642e344c0c6de139df775766a378cdd23fb414d4c98b536c1c85485 perf-2.6.32-431.23.3.el6.x86_64.rpm
65e302b3eb3b761ddaec42a4a22b4fd44747ee34414e38d7664d648b43bdc572 python-perf-2.6.32-431.23.3.el6.x86_64.rpm

Source:
1c3c8ed232cc3dead9f50dd2b1a06398eb9b1ce7621f14ad993c6f00db269aa6 kernel-2.6.32-431.23.3.el6.src.rpm



--
Johnny Hughes
CentOS Project { http://www.centos.org/ }
irc: hughesjr, #centos@irc.freenode.net

_______________________________________________
CentOS-announce mailing list
CentOS-announce@centos.org
http://lists.centos.org/mailman/listinfo/centos-announce

[CentOS-announce] CEEA-2014:0993 CentOS 6 ca-certificates Update

CentOS Errata and Enhancement Advisory 2014:0993

Upstream details at : https://rhn.redhat.com/errata/RHEA-2014-0993.html

The following updated files have been uploaded and are currently
syncing to the mirrors: ( sha256sum Filename )

i386:
8b32dc0749f753398c90ecab91179f709cd137d4a3a14e30e5e5111977bba350 ca-certificates-2014.1.98-65.0.el6_5.noarch.rpm

x86_64:
8b32dc0749f753398c90ecab91179f709cd137d4a3a14e30e5e5111977bba350 ca-certificates-2014.1.98-65.0.el6_5.noarch.rpm

Source:
450b27629d41b8dd0de9260b8b870609eccab071ee67018d64102fed8cbee626 ca-certificates-2014.1.98-65.0.el6_5.src.rpm



--
Johnny Hughes
CentOS Project { http://www.centos.org/ }
irc: hughesjr, #centos@irc.freenode.net

_______________________________________________
CentOS-announce mailing list
CentOS-announce@centos.org
http://lists.centos.org/mailman/listinfo/centos-announce

[CentOS-announce] CEBA-2014:0992 CentOS 6 libvirt Update

CentOS Errata and Bugfix Advisory 2014:0992

Upstream details at : https://rhn.redhat.com/errata/RHBA-2014-0992.html

The following updated files have been uploaded and are currently
syncing to the mirrors: ( sha256sum Filename )

i386:
b943273022a38b12a4d77817390e77d65e202870f3e52abe0ae2eba19c2d2b17 libvirt-0.10.2-29.el6_5.11.i686.rpm
66523e30591555196332482d684fbec15db3cbb70745e47e932ee8510168dd85 libvirt-client-0.10.2-29.el6_5.11.i686.rpm
97b84729f4860e77a34ec29c8e8882d6ac721338f791c2e6dea56dcf3c6d1281 libvirt-devel-0.10.2-29.el6_5.11.i686.rpm
ee9f37610e7b353ae7f014ab58e859c2cdd9e8cc866a358ca2a03f82121453e4 libvirt-python-0.10.2-29.el6_5.11.i686.rpm

x86_64:
6f2eb655c55a5383c06b02a3e466f70296c02ee7b45ff7283d69a5ae385733cd libvirt-0.10.2-29.el6_5.11.x86_64.rpm
66523e30591555196332482d684fbec15db3cbb70745e47e932ee8510168dd85 libvirt-client-0.10.2-29.el6_5.11.i686.rpm
083762a31d65ed05edb7634192bed9efd75334599f7438e388593e49e1a11b49 libvirt-client-0.10.2-29.el6_5.11.x86_64.rpm
97b84729f4860e77a34ec29c8e8882d6ac721338f791c2e6dea56dcf3c6d1281 libvirt-devel-0.10.2-29.el6_5.11.i686.rpm
20a31b0c6e5a3bcd023327d4d314f09e479ae63ff6859db8f051baa656dafc33 libvirt-devel-0.10.2-29.el6_5.11.x86_64.rpm
b5faf33c5c0f7539f01977c9cdc184d0b89937caa119da47caf325b4005461f5 libvirt-lock-sanlock-0.10.2-29.el6_5.11.x86_64.rpm
479de0cf9cb3c2228a6a20f1a4260a8d06d75e43a1d8269c9b6c1e307efc589c libvirt-python-0.10.2-29.el6_5.11.x86_64.rpm

Source:
2475522a3a931d6669d380df0578dc6df62c9aefe881e36cba7a3b07eecdda1c libvirt-0.10.2-29.el6_5.11.src.rpm



--
Johnny Hughes
CentOS Project { http://www.centos.org/ }
irc: hughesjr, #centos@irc.freenode.net

_______________________________________________
CentOS-announce mailing list
CentOS-announce@centos.org
http://lists.centos.org/mailman/listinfo/centos-announce

[CentOS-announce] CEBA-2014:0948 CentOS 6 aide FASTTRACK Update

CentOS Errata and Bugfix Advisory 2014:0948

Upstream details at : https://rhn.redhat.com/errata/RHBA-2014-0948.html

The following updated files have been uploaded and are currently
syncing to the mirrors: ( sha256sum Filename )

i386:
d4286ed601702ca38db7688ff6c509e0ecd491c173e149546e20f9252e3012f2 aide-0.14-7.el6.i686.rpm

x86_64:
045bff3612d5ba662378f0ab480af3fc5bd80238070ebb725dbd62866c7fb00a aide-0.14-7.el6.x86_64.rpm

Source:
0920e91436125d28c6cdfec4ec17c7959ddb18ad67ccfe808687794d4a03a817 aide-0.14-7.el6.src.rpm



--
Johnny Hughes
CentOS Project { http://www.centos.org/ }
irc: hughesjr, #centos@irc.freenode.net

_______________________________________________
CentOS-announce mailing list
CentOS-announce@centos.org
http://lists.centos.org/mailman/listinfo/centos-announce

[CentOS-announce] CEBA-2014:0945 CentOS 6 mutt FASTTRACK Update

CentOS Errata and Bugfix Advisory 2014:0945

Upstream details at : https://rhn.redhat.com/errata/RHBA-2014-0945.html

The following updated files have been uploaded and are currently
syncing to the mirrors: ( sha256sum Filename )

i386:
9a43ce3aee834f0a1c1dcf4ef6dafd600b6dae94653c9f950c194258906d295f mutt-1.5.20-7.20091214hg736b6a.el6.i686.rpm

x86_64:
b22d8185a4fe76689b9f64e9a909fe2ab47f045d0ebea8fc83890c3db2ae1e31 mutt-1.5.20-7.20091214hg736b6a.el6.x86_64.rpm

Source:
0a74d631991d60e36529c9066da3c4a7609f10e05f5ce3bbb0571d2e1318ffa4 mutt-1.5.20-7.20091214hg736b6a.el6.src.rpm



--
Johnny Hughes
CentOS Project { http://www.centos.org/ }
irc: hughesjr, #centos@irc.freenode.net

_______________________________________________
CentOS-announce mailing list
CentOS-announce@centos.org
http://lists.centos.org/mailman/listinfo/centos-announce

hello reallost1.fbsd2233449

reallost1.fbsd2233449     您好。

附件中的内容希望对您的工作和学习有所帮助

2014-8-1%{CURRENT_TI

bx7aqfME}

19007 reallost1.fbsd2233449

Dear:  您好。

基层领导角色认知与管理认知?

质量与效率的分析与长效控制手法?

如何做一名优秀的车间主任。。。

车承军

2014-8-10:45:11

fp0doo

[USN-2304-1] KDE-Libs vulnerability

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1

iQIcBAEBCgAGBQJT2lpZAAoJEGVp2FWnRL6TVtsP/ipKtG9+aoHlOSklfw3ZyIA7
9Xy8eBzmGQ18amLxoRbO8t7xeooAkU3hrDJDs34qsY8D9YajTfc/sg0GX4kNqW6p
GaKhOZVdZkH2zJ6ZAZRpXaRKvLBXcQZvU/lBtdb4o2JLIR4uHu58XGO+fPtsT47/
VO1BQLy5c0RIgDCQj34SUD2Jh1Gpbi5bH0xNgP+pAbIa3jEytFF4d1IJn51d/kIp
AGZJvrXUzX9FQxrMaCWE/bmYizNWZsTzVCJJbJcpJ0qWX8Gz7adHBv7TS3T8cGZD
DHZOlWWXuCIYMPUI5mOrMNIlm3ws509YmkAnBBSzbQ2QcCm+7C0u2rHfQk6yBsFl
KOnUnFM95fwISL+TeAcT1hc0Bnfk1/gVsNmBf+l9+9N27oqdEsg+cdXFd5UVqmoZ
kqVWpvNBnWoLBODz3iMxTFsZ7aOmqMbaG53dqKNeW2I3AyZv9FBJS1M/2GAteTpk
f10iBb29OvrFLbDZRCscMh4dQ41AMHUxl7D0/51hQq8XmiIjxbtKD5P0zPYeRB8d
KaAhgbW6Mcdv66DO76+Iv4QEkIQQBpQdapnIgLDvfvrYKUx2DYHx9shK1f/pVHkf
+EuWEAUXOT9b0q9YTnznucW32Xxb0qtyLLDmrWdaYfmstT6xUpUz7mTFooK217t3
UEV5iYOQRJ7Jyr8JJfbL
=ODyE
-----END PGP SIGNATURE-----
==========================================================================
Ubuntu Security Notice USN-2304-1
July 31, 2014

kde4libs vulnerability
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 14.04 LTS
- Ubuntu 12.04 LTS

Summary:

kauth could be tricked into bypassing polkit authorizations.

Software Description:
- kde4libs: KDE 4 core applications and libraries

Details:

It was discovered that kauth was using polkit in an unsafe manner. A local
attacker could possibly use this issue to bypass intended polkit
authorizations.

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 14.04 LTS:
kdelibs5-plugins 4:4.13.2a-0ubuntu0.3

Ubuntu 12.04 LTS:
kdelibs5-plugins 4:4.8.5-0ubuntu0.4

After a standard system update you need to reboot your computer to make
all the necessary changes.

References:
http://www.ubuntu.com/usn/usn-2304-1
CVE-2014-5033

Package Information:
https://launchpad.net/ubuntu/+source/kde4libs/4:4.13.2a-0ubuntu0.3
https://launchpad.net/ubuntu/+source/kde4libs/4:4.8.5-0ubuntu0.4

[USN-2303-1] Unity vulnerability

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
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=8KKn
-----END PGP SIGNATURE-----
==========================================================================
Ubuntu Security Notice USN-2303-1
July 31, 2014

unity vulnerability
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 14.04 LTS

Summary:

The Unity lock screen could possibly be bypassed in certain circumstances.

Software Description:
- unity: Interface designed for efficiency of space and interaction.

Details:

It was discovered that in certain circumstances Unity failed to
successfully grab the keyboard when switching to the lock screen. A local
attacker could possibly use this issue to run commands, and unlock the
current session.

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 14.04 LTS:
unity 7.2.2+14.04.20140714-0ubuntu1.1

After a standard system update you need to restart your session to make all
the necessary changes.

References:
http://www.ubuntu.com/usn/usn-2303-1
https://launchpad.net/bugs/1349128

Package Information:
https://launchpad.net/ubuntu/+source/unity/7.2.2+14.04.20140714-0ubuntu1.1

Wednesday, July 30, 2014

微信实战应用网络营销rbpnur

[CentOS-announce] CEEA-2014:0990 CentOS 6 xorg-x11-drv-synaptics Enhancement Update

CentOS Errata and Enhancement Advisory 2014:0990

Upstream details at : https://rhn.redhat.com/errata/RHEA-2014-0990.html

The following updated files have been uploaded and are currently
syncing to the mirrors: ( sha256sum Filename )

x86_64:
2e1a2064c699ee5f40daa74f22bfb952fd413863c0c0179b963bb062cb1d3054 xorg-x11-drv-synaptics-1.7.1-10.el7_0.1.i686.rpm
8cbe8be7f916ad0aebcfe931996632116d1350caac3ca6845ff0e6d128586697 xorg-x11-drv-synaptics-1.7.1-10.el7_0.1.x86_64.rpm
8702aea0ce927798738bd33a294d3a90d78ba12d4717b51f7958b31d15dcb88c xorg-x11-drv-synaptics-devel-1.7.1-10.el7_0.1.i686.rpm
605e860c00c8a079d67600e1fd9d20b83a72fed9152e4ae7c690c19644708564 xorg-x11-drv-synaptics-devel-1.7.1-10.el7_0.1.x86_64.rpm

Source:
30641c7baab2fe4b3ecc7330cf70a3e5359f4ab1495a9b0074774ff09e031695 xorg-x11-drv-synaptics-1.7.1-10.el7_0.1.src.rpm



--
Johnny Hughes
CentOS Project { http://www.centos.org/ }
irc: hughesjr, #centos@irc.freenode.net

_______________________________________________
CentOS-announce mailing list
CentOS-announce@centos.org
http://lists.centos.org/mailman/listinfo/centos-announce

[CentOS-announce] CEBA-2014:0989 CentOS 7 systemd BugFix Update

CentOS Errata and Bugfix Advisory 2014:0989

Upstream details at : https://rhn.redhat.com/errata/RHBA-2014-0989.html

The following updated files have been uploaded and are currently
syncing to the mirrors: ( sha256sum Filename )

x86_64:
fda4a49fa241de2f9e8c658eea0af652d06cc8057829f23523b2daacf6218f35 libgudev1-208-11.el7_0.2.i686.rpm
873ebf7ecc365eed0d4e88ffd99ff334e218cd9af74df4440479822a4db8eb7d libgudev1-208-11.el7_0.2.x86_64.rpm
2fa8960386331687d840e0e9866187702c119fc138c8bde9104f8ac59a7b65a5 libgudev1-devel-208-11.el7_0.2.i686.rpm
d39540a22eb1a8fd9be477e5d357a56e323e11ac230cbf7abd58badf53628dcc libgudev1-devel-208-11.el7_0.2.x86_64.rpm
228860724648cc4087e960e2520640c373a64a9bf928625a2da4e88f9bafa20e systemd-208-11.el7_0.2.i686.rpm
b7e09b24a7d3bf9fa1703c435537cef8d28363baa25fa29b611b4452b223de30 systemd-208-11.el7_0.2.x86_64.rpm
5c9932d0d13dea9260e1f34044f52cfaf3d3d28314091f2bcd3295b69c37520f systemd-devel-208-11.el7_0.2.i686.rpm
15bd748eff9ef524528758aec6308e827e201dbdaa7159ff10acc7885566fc38 systemd-devel-208-11.el7_0.2.x86_64.rpm
23c1a65b3f6c9999e226fd0d64454ba401dc960a1e38b50f624189494ec05b89 systemd-journal-gateway-208-11.el7_0.2.i686.rpm
e683bcf4c0432c313c0cce46cfc6503e51f0101bd602405ac87fd5da8c0be7b9 systemd-journal-gateway-208-11.el7_0.2.x86_64.rpm
8068ed0f3555e39cf6d82d7817117b51326e5d537a50b3d28d5971f5db6e5413 systemd-libs-208-11.el7_0.2.i686.rpm
faa0804ee60a61494e7319bef72613bffe755c2b5888106aff004d9b780f5735 systemd-libs-208-11.el7_0.2.x86_64.rpm
4b981398256ef43d4e94280f86b09bd5318441b971bfa19eb7e1128845bc8946 systemd-python-208-11.el7_0.2.i686.rpm
d039620dd1338b4fc2b7636e163f084052375ef9a9d4e18405ff922fff8806f1 systemd-python-208-11.el7_0.2.x86_64.rpm
9ffa4344c0a9ab9a301252437acca726e2699e7bb52f29ad73cb3c19ed378701 systemd-sysv-208-11.el7_0.2.i686.rpm
80578e0fb65dd7e2270bbd1fa5b5467ce3b5a2b398d8c3d4ab0cb3a45404bd6f systemd-sysv-208-11.el7_0.2.x86_64.rpm

Source:
adb8a8b36f7c3268856653065e14e18d0c566b5353f0e433a7839f47d40b95c5 systemd-208-11.el7_0.2.src.rpm



--
Johnny Hughes
CentOS Project { http://www.centos.org/ }
irc: hughesjr, #centos@irc.freenode.net

_______________________________________________
CentOS-announce mailing list
CentOS-announce@centos.org
http://lists.centos.org/mailman/listinfo/centos-announce

[CentOS-announce] CEBA-2014:0946 CentOS 7 unzip FASTTRACK BugFix Update

CentOS Errata and Bugfix Advisory 2014:0946

Upstream details at : https://rhn.redhat.com/errata/RHBA-2014-0946.html

The following updated files have been uploaded and are currently
syncing to the mirrors: ( sha256sum Filename )

x86_64:
2fffce30bede69193adc468a44f83275b72106082c5a7bde37b37fc953e85fbd unzip-6.0-14.el7.i686.rpm
c9ed7221ad9f6814c44970ac2afa435a2e092a7b7d70ad614d56820b19a15154 unzip-6.0-14.el7.x86_64.rpm

Source:
c6f24e45734be959a29f8c746cf20c73641a88f730d7eacce0ff0acfa0a6eeba unzip-6.0-14.el7.src.rpm



--
Johnny Hughes
CentOS Project { http://www.centos.org/ }
irc: hughesjr, #centos@irc.freenode.net

_______________________________________________
CentOS-announce mailing list
CentOS-announce@centos.org
http://lists.centos.org/mailman/listinfo/centos-announce

[CentOS-announce] CEBA-2014:0947 CentOS 7 cronie FASTTRACK BugFix Update

CentOS Errata and Bugfix Advisory 2014:0947

Upstream details at : https://rhn.redhat.com/errata/RHBA-2014-0947.html

The following updated files have been uploaded and are currently
syncing to the mirrors: ( sha256sum Filename )

x86_64:
64e6270ac3f7e319c370c4851115ca21e2626fba4a79de3aff88edb8ef509def cronie-1.4.11-13.el7.i686.rpm
ef6ef700df6fc0b77f4a27dabdd9bf95fe3573953c4e4757add56dfb668ad715 cronie-1.4.11-13.el7.x86_64.rpm
e936841a571b648394665b81759c6446f97d2991662ee5df7c1dd18a6035cb0b cronie-anacron-1.4.11-13.el7.i686.rpm
89d5b58600efddc0ca286433f7741b187076a5011c893d0f11cd0b53c7aea712 cronie-anacron-1.4.11-13.el7.x86_64.rpm
52fad07fd35781428c58cc71432aa4e1d1c341d6ed36043325fa4073ea7a514e cronie-noanacron-1.4.11-13.el7.i686.rpm
7cf0f0e26829988c3b79be4505bf73dbabbf6ba68c67010a6b53ab76e683bdd9 cronie-noanacron-1.4.11-13.el7.x86_64.rpm

Source:
4e0d4e019cc32c1679a2b1d09bfd171082b11898323ad32d13a03bd441a08b51 cronie-1.4.11-13.el7.src.rpm



--
Johnny Hughes
CentOS Project { http://www.centos.org/ }
irc: hughesjr, #centos@irc.freenode.net

_______________________________________________
CentOS-announce mailing list
CentOS-announce@centos.org
http://lists.centos.org/mailman/listinfo/centos-announce

[USN-2302-1] Tomcat vulnerabilities

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
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=uTi/
-----END PGP SIGNATURE-----
==========================================================================
Ubuntu Security Notice USN-2302-1
July 30, 2014

tomcat6, tomcat7 vulnerabilities
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 14.04 LTS
- Ubuntu 12.04 LTS
- Ubuntu 10.04 LTS

Summary:

Several security issues were fixed in Tomcat.

Software Description:
- tomcat7: Servlet and JSP engine
- tomcat6: Servlet and JSP engine

Details:

David Jorm discovered that Tomcat incorrectly handled certain requests
submitted using chunked transfer encoding. A remote attacker could use this
flaw to cause the Tomcat server to consume resources, resulting in a denial
of service. (CVE-2014-0075)

It was discovered that Tomcat did not properly restrict XSLT stylesheets.
An attacker could use this issue with a crafted web application to bypass
security-manager restrictions and read arbitrary files. (CVE-2014-0096)

It was discovered that Tomcat incorrectly handled certain Content-Length
headers. A remote attacker could use this flaw in configurations where
Tomcat is behind a reverse proxy to perform HTTP request smuggling attacks.
(CVE-2014-0099)

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 14.04 LTS:
libtomcat7-java 7.0.52-1ubuntu0.1

Ubuntu 12.04 LTS:
libtomcat6-java 6.0.35-1ubuntu3.5

Ubuntu 10.04 LTS:
libtomcat6-java 6.0.24-2ubuntu1.16

In general, a standard system update will make all the necessary changes.

References:
http://www.ubuntu.com/usn/usn-2302-1
CVE-2014-0075, CVE-2014-0096, CVE-2014-0099

Package Information:
https://launchpad.net/ubuntu/+source/tomcat7/7.0.52-1ubuntu0.1
https://launchpad.net/ubuntu/+source/tomcat6/6.0.35-1ubuntu3.5
https://launchpad.net/ubuntu/+source/tomcat6/6.0.24-2ubuntu1.16

reallost1.fbsd2233449

reallost1.fbsd2233449

上海,深圳,销-售-主-管即将开课,火爆报名中!

Shanghai Beijing Shenzhen, main sale - pin - tube will begin, hot application!

附件中的内容希望对您的工作有所帮助

滕彦清亲情浓于血,友情淡如水,爱情甜如蜜。祝您盛年不重来,一日难再晨。及时当勉励,岁月不待人。

j6iyv6

reallost1.fbsd2233449

reallost1.fbsd2233449

企业竞争日趋激烈,如何跟上时代发展的脚步,?

附件中的内容希望对贵公司的发展有所帮助。富合运祝您生活愉快。

qls4h

[CentOS-announce] Docker Index image builds updated to 20140726

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

The CentOS images included in the docker index have been bumped to
build 20140726.

Fixes
=====

This update resolves:
1. glibc locale errors for non-root users and applications for both
CentOS-6 and CentOS-7.
2. libselinux multilib errors on some yum install actions for CentOS-6.
3. iputils and iproute are now included in the base install.
4. Includes recent updates current to 20140726.


Usage
=====

If you are using the CentOS images from the docker index, please run
'docker pull centos' to get the updates. After updating, you may need
to rebuild your application images.



Additional Information
======================
For detailed information or to see the code differences used in
building the images, please see
https://github.com/CentOS/sig-cloud-instance-build



- --
Jim Perrin
The CentOS Project | http://www.centos.org
twitter: @BitIntegrity | GPG Key: FA09AD77
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v2.0.22 (GNU/Linux)

iQIcBAEBAgAGBQJT2RpiAAoJEBbHyC76Ca13XxoP/2wWyNPec+K2pdjdW4odFqUv
0YH+G1kfAocTOJL+rjTCrH4mp2TvijEwgk6F9zfXgYS/Orb32KOIbtDepYlhH6oU
2VohgkxdbSjLqptp7tDQuee4fmRmz+YCgfl2C6HXAoIRFA2VEf+At+83RgV3kQgq
/yVE7eJuXoDsqw+hT2rI+hibhZm6IrAf0VWbOVnvrXAz6kGKrY7jnNMGfyUaboQv
axTryFCy3G6dmlbuN9ojeNX108GsXXys9LE8/ODTji5CY+90IM0h/gNVzmIkYmjK
NqC7w+DUVoB/1DYMPMGTZ0DiDWwsjbRJOQ28vwfm8CzpNdzvHJOCQqQkR3sNMvQn
gp/ypFSQNWKiAs1shkW5FYPsn5q2VU7QchqLDTUZeDaEuxq3oYfuBnQH1sOW8v8W
OSSPJTF6j76Lc/iBwHDVRhVJGAiux1V/uaMrdH3TqQEZMKw7SmsCNhNBFQITbGgq
7GMyecM2r6s+eX9O6Rf/jkHveimxoDPa+Z4OcGfPpMD1tZg/zjFse0aQnhn8tjp7
DNiSt3SatBlMfU/wzc0FL9iNVGiq3U22XZZYMQ1ntE5FA+mFDzepGY2GP3cTdBHA
CdufkMz77HiAAfIpsD0CF8VnjQcqJWBfnribD5AkJNAjJGXfteiz2Gti5TImPzJb
k3A6cEqPXaqn5Ztqdwzi
=vglE
-----END PGP SIGNATURE-----
_______________________________________________
CentOS-announce mailing list
CentOS-announce@centos.org
http://lists.centos.org/mailman/listinfo/centos-announce

Fedora Security Team

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

Some people have already heard about the new Security Team making the rounds on BZ trying to clean up vulnerabilities that still linger within our OS. Until today I've not said much as I was waiting to see how successful we'd be at trying to remedy some of these situations. Turns out I had nothing to fear. So with that I formally announce the Security Team to Fedora and open the doors to all that are interested.

== What are we doing? ==
The Security Team's mission is to assist packagers in closing security vulnerabilities. Once alerted to a vulnerability on a package, the security team can help work with upstream to obtain a patch or a new release of a package. Once we have a patch or a new release we attach it to the vulnerability bug and work with packagers to get the fix pushed.

== How bad is the problem now? ==
As of a few days ago we had 566 open vulnerability tickets that cover both Fedora and EPEL. The breakdown of those bugs by severity looks like this:
* Critical: 3
* Important: 69
* Moderate: 366
* Low: 128

The good thing is that few of these vulnerabilities are considered "bad" (critical and important). There are likely bugs in there that no longer apply since the packages have been upgraded but the tickets never got closed. Also, a package that is in both Fedora and EPEL will get a ticket for each so from a pure numbers standpoint there are duplicates in those stats.

== How many people have signed up for the team? ==
Over twenty so far.

== How can I join/get involved/learn more about the project? ==
Go look at our wiki page[0], which is still being developed but does contain some basic information on the team. We also have a listserv[1] and an IRC channel[2] where we hang out.

[0] https://fedoraproject.org/wiki/Security_Team
[1] https://lists.fedoraproject.org/mailman/listinfo/security-team
[2] #fedora-security-team on irc.freenode.net

- -- Eric

- --------------------------------------------------
Eric "Sparks" Christensen
Fedora Project

sparks@fedoraproject.org - sparks@redhat.com
097C 82C3 52DF C64A 50C2 E3A3 8076 ABDE 024B B3D1
- --------------------------------------------------
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
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=LOhU
-----END PGP SIGNATURE-----
_______________________________________________
devel-announce mailing list
devel-announce@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel-announce

Rawhide soname version bumps on evolution-data-server and evolution packages

Hello,
I'm going to update evolution packages (evolution-data-server,
evolution, evolution-ews and evolution-mapi) in rawhide to their
3.13.4 versions during today, which brings soname version bumps in
evolution-data-server and evolution. I'll take care of rebuilds where
needed (and I have commit rights for).

There are also large changes in 3.13.4, in evolution-data-server are
used subprocesses for backends and evolution uses webkit-based
composer. Please use GNOME's bugzilla [1] for any issue you might find
with these.
Thanks and bye,
Milan

[1] https://bugzilla.gnome.org/enter_bug.cgi?product=evolution-data-server
https://bugzilla.gnome.org/enter_bug.cgi?product=evolution

_______________________________________________
devel-announce mailing list
devel-announce@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel-announce

Tuesday, July 29, 2014

告诉你福寿双全

reallost1.fbsd2233449 ly

 附件里的内容希望对您工作和生活有所帮助。

祝您生活愉快,工作顺利,家庭幸福。

谢谢您对我们工作的理解和支持。%{RAND_TEXT_5}

reallost1.fbsd2233449

reallost1.fbsd2233449     您好。

附件中的内容希望对您的工作和学习有所帮助。

547824

2014-7-300:27:52

[opensuse-announce] Factory moves to Rolling Release Development Model

The Internet. July 29th, 2014.

We are proud to announce that we have just switched our beloved
development distribution, openSUSE Factory, to be an independent
distribution using the "rolling release" development model. openSUSE
Factory is now a tested, reliable and bleeding edge Linux distribution!

This change will shorten the stabilization process for our major
releases (next up: 13.2) and eliminate the need for pre-releases and
milestones.

https://news.opensuse.org/2014/07/29/factory-rolling-release/

A more distributed development process for openSUSE
###################################################
In the old development model, an army of packagers would shoot new
packages and updates to Factory, with a relatively small team of Factory
Maintainers taking care of the integration process of all those
packages. This often took a long time to stabilize for a release.

In the new "rolling release" development model, package submissions
cannot go to Factory directly. First they have to prove to be functional
and trustworthy in a staging project. Staging projects are projects in
our Open Build Service where groups of submissions are collected,
reviewed, compiled and tested with openQA. But even after the packages
survived the staging project, they don't directly end up in Factory.
First all Factory media (e.g. DVDs etc.) are being built and put again
through more tests in openQA. The Factory maintainers then decide on the
basis of the Factory-To-Test overview if the new packages should be
published to the users.

This new Factory development model balances responsibility among
packagers, testers and end users while putting more emphasis on
automated quality assurance. As a result, openSUSE Factory becomes a
reliable, always-ready working distribution.

"With this new openSUSE development model, users get the latest free
software packages without waiting for the next release"

said Richard Brown, openSUSE board chair. He continues

"With a daily fresh Factory distribution making it easier for those
who want to preview and test, we hope to see more users and
contributors, leading to faster fixes and even higher quality. Factory
is critical as it provides the base technology for openSUSE and SUSE
Linux Enterprise, which is used by tens of thousands of organizations
around the world."

Get it while is hot!
####################
So there is no excuse to give Factory a try and provide feedback or, if
you are not so interested in living on the edge, to help spreading the
word: there is a new (old) kid on the Linux Distributions block:
openSUSE Factory!

Thanks
######
This major change in how we develop our distribution would have not been
possible without the tireless work of the openSUSE Team from SUSE who
drove this process, the openQA developers who integrated all the
features and certainly not without our most awesome package maintainers
who provided feedback along the way. Thank you guys for another
astonishing job completed!

About the openSUSE Project
--------------------------
The openSUSE project is a worldwide effort that promotes the use of
Linux everywhere. openSUSE creates one of the world's best Linux
distributions, working together in an open, transparent and friendly
manner as part of the worldwide Free and Open Source Software community.
The project is controlled by its community and relies on the
contributions of individuals, working as testers, writers, translators,
usability experts, artists and ambassadors or developers. The project
embraces a wide variety of technology, people with different levels of
expertise, speaking different languages and having different cultural
backgrounds.

About the openSUSE Distribution
-------------------------------
The openSUSE distribution is a stable, easy to use and complete
multi-purpose distribution. It is aimed towards users and developers
working on the desktop or server. It is great for beginners, experienced
users and ultra geeks alike, in short, it is perfect for everybody! The
latest release, openSUSE 13.1, features new and massively improved
versions of all useful server and desktop applications. It comes with
more than 1,000 open source applications. openSUSE is also the base for
SUSE's award-winning SUSE Linux Enterprise products.

About openQA
------------
openQA is the only comprehensive, fully automated Linux distribution
testing framework which can run tests on every level of the OS, from
core functionality like the kernel up to testing applications like
Firefox or LibreOffice. It shows the results in a convenient web
interface and allows testers to see screenshots and even videos of the
issues found.
--
To unsubscribe, e-mail: opensuse-announce+unsubscribe@opensuse.org
For additional commands, e-mail: opensuse-announce+help@opensuse.org

Monday, July 28, 2014

微信实战应用网络营销hd1

[arch-announce] xorg-server 1.16 is now available

Laurent Carlier wrote:

The new version comes with the following changes:

* X is now rootless with the help of systemd-logind, this also means that it
must be launched from the same virtual terminal as was used to log in,
redirecting stderr also breaks rootless login. The old root execution behavior
can be restored through the Xorg.wrap config file (man xorg.wrap). Please note
that launching X through a login-manager (gdm, kdm, ...) doesn't yet provide
rootless access.

* The default configuration files are now in /usr/share/X11/xorg.conf.d, all
host configurations are still taking place in /etc/X11/xorg.conf.d/ directory.
Please note that files 10-evdev.conf and 10-quirks.conf in /etc/X11/xorg.conf.d
could be renamed with .pacsave suffix, which could break your configuration,
then just rename them and remove the .pacsave suffix.

* Better glamor accelerated rendering, deprecating `glamor-egl` package.

* A new package `xorg-server-xwayland` that allows running X applications
inside a wayland session.

* The `xf86-video-intel` package doesn't provide dri3 support anymore because
of multiple rendering bugs.

URL: https://www.archlinux.org/news/xorg-server-116-is-now-available/
_______________________________________________
arch-announce mailing list
arch-announce@archlinux.org
https://mailman.archlinux.org/mailman/listinfo/arch-announce

reallost1.fbsd2233449 您好

近期在北京,深圳,上海,开设班组长的课程,为企业解决班组长管理的困扰

打好底层基础,企业早日壮大。期待您的莅临。

祝您工作顺利,身体健康。

梅启祯

2014-7-290:13:17

gqh0y

 

reallost1.fbsd2233449 npoqa

reallost1.fbsd2233449  您好

新任经理如何确定自己的角色,更好的融入自己在工作?

附件中的内容,帮您解除困惑,让您成为一名优秀的经理。

0:05:222014-7-29

2eudn

Sunday, July 27, 2014

成都八方溪缘餐饮

reallost1.fbsd2233449 lbvlv

reallost1.fbsd2233449   您好

附件中《降低采购成本与供应商谈判技巧》

希望对您的工作有所帮助。。。。

142168

2014-7-282:30:34

reallost1.fbsd2233449 ymaics

reallost1.fbsd2233449     您好。

附件中的内容希望对您的工作和学习有所帮助

In the annex to the content you want to work and learning help

2014-7-281:35:10

y8yugb

 

立学校时时吉祥

Saturday, July 26, 2014

全面系统学习微信营销运营系统搭建,打造完整的微信电商体系smloyu3k

《微信营销高级实战运营系统》
【主讲:马佳彬】
报名详情 >
【培训时间】2014年8月15上海、8月16北京、8月23深圳、
9月19上海、9月20北京、9月27深圳、10月17上海、10月18北京、10月25深圳、11月14上海、
11月15北京、11月22深圳、12月12上海、12月13北京、12月20深圳
【培训对象】企业的经营者、营销负责人、网络营销人员、企业营销策略制定者及所有营销人员。
【授课方式】讲师讲授 + 视频演绎 + 案例研讨 +角色扮演 + 讲师点评 + 落地工具。
【培训费用】3200/两人"买一赠一",单独一人收费1980元(含资料费、午餐、茶点)
【深 圳】0755-61289820 【北京】 010-51661863 【上海】 021-51082178

课程简介 >
【课程背景】
10年前,互联网来了,有人因此成为商业巨头;
5年前,淘宝来了,有人因此实现"草根创业";
3年前,微博来了,有人因此实现财富"核裂变";
而今天,微信来了,微营销来了……
7天连锁酒店通过微信营销,一个月内,会员从30万几何式增至120万!
小米手机通过微信营销,在短短3个月内吸引粉丝105万,网上订单暴增15倍!
星巴克通过微信营销,在三周内,仅"冰摇沁爽"一项产品销售额就突破750万!
"90后"大学生通过微信营销卖水果,一没店铺,二没员工情况下,实现月入8万的奇迹!
微信来了,"微"机也就来了,你知道这意味着什么!!
未来十年,是中国商业领域大规模打劫的时代,所有还在采用传统运营模式的企业的"粮仓"
都有可能遭遇打劫,而那些适应了"微"机,抓住了"微"机的企业将是这个时代最大的赢家,小米
赢了,星巴克赢了……

参加《微信营销从入门到实战》,下一个赢家,就是你!

【课程收益】
1、全面系统学习微信营销运营系统搭建,打造完整的微信电商体系
2、知晓团队规划、管理的方方面面,提升团队整体实战能力
3、从活动到互动,从引流到转化,学会把握成交关键的细节
4、数十种一线实战运营经验技巧,省时省力实现高效运营
5、运营反查快速找出问题所在,有病自医不费成本不费精力
6、落地计划书加全套实战落地工具,即学即回高效开展微信营销

导师简介 >【马佳彬】
【讲师介绍】
微信实战应用专家、网络营销实战专家。网名:汗马,现居住广东广州。
【主要成就】
企业学习网微信营销高级讲师、企业学习网战略发展顾问、中山大学MBA微信营销讲师、上海交通大学
EMBA总裁班导师、中央人民广播电台经济之声时评嘉宾代表作品:《"马"道微信》、《企业实操微信
八卦图》
【教育背景】
草根创业者,独立IT博客评论员,自媒体人,微信实战应用专家,网络营销实战专家,中央人民广
播电台经济之声时评嘉宾,《前沿讲座》特邀演讲嘉宾,单仁集团移动营销金牌讲师,中特《微信解码》
专家团专家,企业学习网高级讲师,中山大学MBA微信营销讲师;智度行销机构首席讲师。
马老师是多家知名网站的专栏作家,如:Chinaz站长之家,Donews新锐作家、速途网、艾瑞网、易观网、
亿邦动力网和最科技网等。微信营销领域专业排名前四*马老师拥有9年的互联网行业培训经验,先后从事
信息咨询及广告传媒工作。微博营销领域首次提出"灭亡论"。最早涉足研究微信营销,微信营销实战班
网络培训开创者,"微信营销六步思维法"讲师。长期担任业内多家知名IT门户站点写手。其个人博客在
业内拥有比较高的知名度,已被网站运营等专业书籍收录推荐。培训学员数以万计,马老师由于长期亲密
接触网络营销一线,因此,讲解风格生动、贴近实际,更易引起学员共鸣!是最早的微信营销研究及实践
者,在微信营销领域具有完善系统的研究成果。
【部分合作客户】
现任广州佳彬网络科技有限公司总经理,指导过深圳同洲电子股份有限公司、深圳天虹百货、平安
银行、朵唯女性手机、前程无忧、神州租车、富贵鸟、立白集团、广发证券、海信、华为、美的、九阳
股份有限公司、中国移动、苏宁电器、统一企业、古井集团、OPPO手机、维他奶、联想集团、厦门航空、
TCL集团、中国烟草、真功夫、安利集团、中国银行、中国一汽、中国光大银行、顺丰速运、西蒙电气、
南方李锦记有限公司、上海和黄药业、南车株洲电力机车有限公司、中粮福临门、雅芳中国、新世界集
团、中国东方航空、红蜻蜓、吉利汽车、神州数码、中国中纺集团公司、四季沐歌太阳能、M18麦网、万
通集团、中国电信、青岛啤酒、万科集团、太平洋保险、HITACHI日立集团、上汽集团、UPS国际快递、
爱国者、中国金茂集团、北京探路者旅游用品有限公司、上海通用汽车有限公司、招商银行、前锦网络
信息技术(上海)有限公司、高德置地集团等国内外众多知名企业。

课程大纲
一、微信营销高级实战运营计划
1、运营目标设定(定性/定量,成功最大关键在于确立合适的目标。)
2、运营平台/工具组合(理解/筛选,正确选择平台/工具拒绝盲目。)
3、运营团队规划(招聘/架构,没有好的团队规划就干不出好的运营工作。)

二、微信营销高级实战运营执行
1、平台搭建(万丈高楼从地起,根基打错步步皆错。)
2、团队管理(团队高效管理,全面提升微信营销实战能力。)
3、内容策划(内容为王,内容创作18招,14种标题策划思路。)
4、活动策划(15种实用活动策划方式促进产品销售。)
5、互动策划(互动为皇,引导、驱动、维护粉丝关系。)
6、推广引流(全网推广18招,学会基本功一通百通。)
7、转化成交(说服力9步法,让客户心甘情愿掏钱购买。)
8、客户维护(5种客户两大管理模式,自建微信客户关系管理系统。)

三、微信营销高级实战运营技巧
1、平台运营技巧(玩转微信公众平台不可不懂的技巧。)
2、工具应用技巧(多种工具应用技巧让日常运营工作事半功倍。)
3、自媒体传播技巧(再小的企业和品牌都能建立自媒体。)
4、粉丝主动传播技巧(5招让粉丝主动传播,借助圈子传递强信任。)

四、微信营销高级实战运营反查
1、数据反查(收集、提炼、分析、总结,学会用数据指导运营。)
2、运营反查(干什么?用什么干?谁去干?怎么干?反推看全面抓细节。)
3、资源反查(自身资源投入,外部资源整合,合理规划把资源用到刀刃上。)
4、营销反查(微信营销即服务营销,客户至上不能只说到不做到。)

课后作业:《微信营销高级实战运营系统》落地计划书
附送:《微信营销高级实战运营系统》落地工具包

" ? 温馨提示: 本课程可针对企业需求,上门服务,组织内训,欢迎咨询。
"

Friday, July 25, 2014

[CentOS-announce] CESA-2014:0943 CentOS 7 kexec-tools BugFix Update

CentOS Errata and BugFix Advisory 2014:0943

Upstream details at : https://access.redhat.com/errata/RHBA-2014:0943

The following updated files have been uploaded and are currently
syncing to the mirrors: ( sha256sum Filename )

x86_64:
e958b5a943bcd3aaadf7b5279cb7ac7fb544b212dc432e360b6a600d77c58632 kexec-tools-2.0.4-32.el7.centos.2.x86_64.rpm
4dbf8ae8ce5192c04dc728de3f75082c0b3d6aaaba259e3aafc76b60bd51d997 kexec-tools-eppic-2.0.4-32.el7.centos.2.x86_64.rpm


Source:
53434dc700bcda18f2e1455cbb09c09d6f5cafc41d05c32204cd6ecb21e2564a kexec-tools-2.0.4-32.el7.centos.2.src.rpm

--
Johnny Hughes
CentOS Project { http://www.centos.org/ }
irc: hughesjr, #centos at irc.freenode.net

_______________________________________________
CentOS-announce mailing list
CentOS-announce@centos.org
http://lists.centos.org/mailman/listinfo/centos-announce

[CentOS-announce] CESA-2014:0927 Moderate CentOS 7 qemu-kvm Security Update

CentOS Errata and Security Advisory 2014:0927

Upstream details at : https://access.redhat.com/errata/RHSA-2014:0927

The following updated files have been uploaded and are currently
syncing to the mirrors: ( sha256sum Filename )

x86_64:
87ba4b20726d89fc4363aef40fe365949aa9515744b7ec6e07c2bccbc8e80289 libcacard-1.5.3-60.el7_0.5.i686.rpm
64c22987012ff5a2b5314161a659f54d67a8e9501806b6a536ea1dac46db26a3 libcacard-1.5.3-60.el7_0.5.x86_64.rpm
91ee7505fbd00f4637bc336766069aabefb8d089a39261b263a62dc0c49b343c libcacard-devel-1.5.3-60.el7_0.5.i686.rpm
09f0c3a9bd3b5492aa3697c2940995614c1b56c27b8882f4b52e60b2c639e116 libcacard-devel-1.5.3-60.el7_0.5.x86_64.rpm
118f381eab93044d0d769ff0a829907202fe763db958099a2ed348bc4834197f libcacard-tools-1.5.3-60.el7_0.5.x86_64.rpm
696141e8ffd984c0c571c866ab94faf18c380bdbac38219236e735d6e670f8de qemu-guest-agent-1.5.3-60.el7_0.5.x86_64.rpm
d0529b85eee5fbf09352f37b6473e9cc0d2e30e23b5919a120e9628ba45219d9 qemu-img-1.5.3-60.el7_0.5.x86_64.rpm
618ff6a123ae6db82ee0049a864a95b68fd7127a03e16f21e649c5565b63f3ff qemu-kvm-1.5.3-60.el7_0.5.x86_64.rpm
4e9dcb97d4e724c0f23872646c1472c306e030c64202e078e48159a82fdb2a30 qemu-kvm-common-1.5.3-60.el7_0.5.x86_64.rpm
15aab98b337044b4a69f7b8823a23117f58a98e71b0c9ade5f492d4346e43767 qemu-kvm-tools-1.5.3-60.el7_0.5.x86_64.rpm

Source:
874f6c7d6f83dcff1b13bd92e7de69a6327f0e65c09659fad2bd36888cd0106b qemu-kvm-1.5.3-60.el7_0.5.src.rpm

--
Johnny Hughes
CentOS Project { http://www.centos.org/ }
irc: hughesjr, #centos at irc.freenode.net

_______________________________________________
CentOS-announce mailing list
CentOS-announce@centos.org
http://lists.centos.org/mailman/listinfo/centos-announce

[CentOS-announce] CESA-2014:0923 Important CentOS 7 kernel Security Update

CentOS Errata and Security Advisory 2014:0923

Upstream details at : https://access.redhat.com/errata/RHSA-2014:0923

The following updated files have been uploaded and are currently
syncing to the mirrors: ( sha256sum Filename )

x86_64:
89f68da867001aec6065d78b9ab206995fcb1594c022d69842624cb1679dd2f4 kernel-3.10.0-123.4.4.el7.x86_64.rpm
abc7073f1f879a0741f9152cfceb454cdd237877d0c09512fd3ebfdc748e1460 kernel-abi-whitelists-3.10.0-123.4.4.el7.noarch.rpm
149343a4ebb7427db6f694349b22f5d30266d741a7e910f474a7f2608832824b kernel-debug-3.10.0-123.4.4.el7.x86_64.rpm
99821973e2daedb30ea23fc98de08dfde79dd9c8cdee63549b384e23142310b7 kernel-debug-devel-3.10.0-123.4.4.el7.x86_64.rpm
8e36ae3ef3374b7b590895023f73c0c336e0ee5b52b0d2f951416b857e3ccf65 kernel-devel-3.10.0-123.4.4.el7.x86_64.rpm
f4f18ff1d584401a000cdea2aec96aeec9fa9d556edacaf871e0381edf4ba748 kernel-doc-3.10.0-123.4.4.el7.noarch.rpm
e48e950c38eb54d557e0cb7bf123945f32396c9b61f3354124706bba1c8c6298 kernel-headers-3.10.0-123.4.4.el7.x86_64.rpm
f1af6a1d71f32d5098aed0d30f1244047aedeff2a901d6c89fafa14b38479e13 kernel-tools-3.10.0-123.4.4.el7.x86_64.rpm
5af0512258c6b33a843a4114e1acf75ee815e65d7a7364587c960fdca10b8a12 kernel-tools-libs-3.10.0-123.4.4.el7.x86_64.rpm
f7d7fe6cf5730ac85855981a37c5da1fd99829500e5012232a64f042fceac27a kernel-tools-libs-devel-3.10.0-123.4.4.el7.x86_64.rpm
245c443792770c7a8a7d6ccbc745bf6c4fd45148c42403741e00b26248be832c perf-3.10.0-123.4.4.el7.x86_64.rpm
68da17b5661d69d98d9a5d53fc4d660541b5c80e5e3fe3eb3fed09b14f8afa31 python-perf-3.10.0-123.4.4.el7.x86_64.rpm

Source:
c86f63cac1effe2f2ef8d0731a4e5f0191ba93c8314fff2a94ca1e52f35a7000 kernel-3.10.0-123.4.4.el7.src.rpm

--
Johnny Hughes
CentOS Project { http://www.centos.org/ }
irc: hughesjr, #centos at irc.freenode.net

_______________________________________________
CentOS-announce mailing list
CentOS-announce@centos.org
http://lists.centos.org/mailman/listinfo/centos-announce

[CentOS-announce] CEBA-2014:0942 CentOS 6 grub Update

CentOS Errata and Bugfix Advisory 2014:0942

Upstream details at : https://rhn.redhat.com/errata/RHBA-2014-0942.html

The following updated files have been uploaded and are currently
syncing to the mirrors: ( sha256sum Filename )

i386:
0241a850da2fafa22f964f38445550420b49c2139e45684279f54d1e6292be58 grub-0.97-84.el6_5.i686.rpm

x86_64:
1935eeb557d0bf3e7486e333d8d7fcf0ef0618f10323bb2c242c4df9eebea278 grub-0.97-84.el6_5.x86_64.rpm

Source:
fbcf5b3280a4cc8a58ffc5f7b9e0052ee18f37b0fa55cda265e8df10fb081d61 grub-0.97-84.el6_5.src.rpm



--
Johnny Hughes
CentOS Project { http://www.centos.org/ }
irc: hughesjr, #centos@irc.freenode.net

_______________________________________________
CentOS-announce mailing list
CentOS-announce@centos.org
http://lists.centos.org/mailman/listinfo/centos-announce

[CentOS-announce] CESA-2014:0924 Important CentOS 6 kernel Update

CentOS Errata and Security Advisory 2014:0924 Important

Upstream details at : https://rhn.redhat.com/errata/RHSA-2014-0924.html

The following updated files have been uploaded and are currently
syncing to the mirrors: ( sha256sum Filename )

i386:
0dd0078d2cf32e2c86a82c8cdbca30e83f334aa4d087c81dd6329d6d2db06d64 kernel-2.6.32-431.20.5.el6.i686.rpm
9e4a7a2d5d78b3a4b59fb18650db3931dd22cac3a41ad002882aced73ba49dce kernel-abi-whitelists-2.6.32-431.20.5.el6.noarch.rpm
1fd3cfffafbe8dc6d8cbaa891d9ab018becbf3731ccdd6243deeda94a16123b8 kernel-debug-2.6.32-431.20.5.el6.i686.rpm
539da1645c83006d90586a121e0e973a90c1937e2c23cc61f960d3f1f20ed44c kernel-debug-devel-2.6.32-431.20.5.el6.i686.rpm
a180413e29f220617c5211b6b981297ae164e5649ff529660dbf5ebb801c7978 kernel-devel-2.6.32-431.20.5.el6.i686.rpm
bbb077840ee83f523924bffa44190644c21467919c6d94e5851a06b50121ecc4 kernel-doc-2.6.32-431.20.5.el6.noarch.rpm
156775f70b4378e2a75e0783261d5a2f2158c039b6e087a7d08fb23a497882ae kernel-firmware-2.6.32-431.20.5.el6.noarch.rpm
3d34554c51dd2eabe8dfc75bc0b5e2b5bc0b1e98317deaa9e7a47bbda8541a37 kernel-headers-2.6.32-431.20.5.el6.i686.rpm
6de77cbdd0a17d0b4ba894bec9c3d5eecc7085d270769ed4f2dbe8712a95f764 perf-2.6.32-431.20.5.el6.i686.rpm
46e8418f9717eff9bae2507d0ebe53e9a23976a82c0c311b32712b91ba4cf6ff python-perf-2.6.32-431.20.5.el6.i686.rpm

x86_64:
9839043c6e44c193377ec86c00cb067a9d9f19b6c911e77fec1f4e2a7e9cbba5 kernel-2.6.32-431.20.5.el6.x86_64.rpm
9e4a7a2d5d78b3a4b59fb18650db3931dd22cac3a41ad002882aced73ba49dce kernel-abi-whitelists-2.6.32-431.20.5.el6.noarch.rpm
6875bdbc1c633fa8be656194ffb7d1b146cf7e6c7e7ea50ab11c8e43b884da12 kernel-debug-2.6.32-431.20.5.el6.x86_64.rpm
dd511dec8dd8f561357cf583e43892147373bd9bbff6b82841fd26dd5a9d838b kernel-debug-devel-2.6.32-431.20.5.el6.x86_64.rpm
5bca000ada4630777f7b7e1bac6304a0ce88f00e03f03b1f1fb3cf285c510d8b kernel-devel-2.6.32-431.20.5.el6.x86_64.rpm
bbb077840ee83f523924bffa44190644c21467919c6d94e5851a06b50121ecc4 kernel-doc-2.6.32-431.20.5.el6.noarch.rpm
156775f70b4378e2a75e0783261d5a2f2158c039b6e087a7d08fb23a497882ae kernel-firmware-2.6.32-431.20.5.el6.noarch.rpm
ca0bca2be58254b97f6f3556c3ad99eacaf25a95b9dadcbb139372767a4e3c04 kernel-headers-2.6.32-431.20.5.el6.x86_64.rpm
6bedc1ef2c0ac7c60bd748b626f9fac62c0b87e623f2f48caa4f9831e5cff394 perf-2.6.32-431.20.5.el6.x86_64.rpm
918c0421b9e52e7821b107d845d5a82047bb2a31f0cff315fb3aa86424994049 python-perf-2.6.32-431.20.5.el6.x86_64.rpm

Source:
aa9179d13388e5fbef93fa57b5cd7760a5f001d6b37ddf9aefd5940cc9389398 kernel-2.6.32-431.20.5.el6.src.rpm



--
Johnny Hughes
CentOS Project { http://www.centos.org/ }
irc: hughesjr, #centos@irc.freenode.net

_______________________________________________
CentOS-announce mailing list
CentOS-announce@centos.org
http://lists.centos.org/mailman/listinfo/centos-announce

Thursday, July 24, 2014

[CentOS-announce] CESA-2014:0926 Moderate CentOS 5 kernel Update

CentOS Errata and Security Advisory 2014:0926 Moderate

Upstream details at : https://rhn.redhat.com/errata/RHSA-2014-0926.html

The following updated files have been uploaded and are currently
syncing to the mirrors: ( sha256sum Filename )

i386:
7e2c76364bc958fff0d32cf27ac20500c2108183c84782d32c4c4dc56d23dac5 kernel-2.6.18-371.11.1.el5.i686.rpm
e4501176e02403ffe5b4c8537230e891bae9615c66b6aed75252174cb81a8760 kernel-debug-2.6.18-371.11.1.el5.i686.rpm
ba8a145c983ce17d6f25da273b9a2fc71469afa6cddeb5623c94001c90ddf243 kernel-debug-devel-2.6.18-371.11.1.el5.i686.rpm
178564a0db08d63919cc30047788172d71a44b7eb895c7adb176724207399bc1 kernel-devel-2.6.18-371.11.1.el5.i686.rpm
9a49e170dd9dea91421182d2f1a0464effe8999a2d2467c163e63f72bae68d8f kernel-doc-2.6.18-371.11.1.el5.noarch.rpm
1a0c8d752aaa6f91a35cd004c527420cece9e66e60682da342be2bbafb16ecf7 kernel-headers-2.6.18-371.11.1.el5.i386.rpm
60fe6f1b50f4919476bbe108c687ca44e2fce390f4951d3330f72440282e6301 kernel-PAE-2.6.18-371.11.1.el5.i686.rpm
65018fb31b4f2f0194440f3d1ce66d6940815c08c23d25305f989c662146d718 kernel-PAE-devel-2.6.18-371.11.1.el5.i686.rpm
cd3214c7376ae0c6b2f293282c542ea9c9bc60bb537556fb4dd6d3acba9972da kernel-xen-2.6.18-371.11.1.el5.i686.rpm
be372c63a79549b952c30e67fbb761f1db104e4dc084574d7120de26a4142efd kernel-xen-devel-2.6.18-371.11.1.el5.i686.rpm

x86_64:
aaf4725b798b620cab891f2fc4e71ebf05cb341b0ed01806c3e5bf3f5e3a03f3 kernel-2.6.18-371.11.1.el5.x86_64.rpm
925b9aa574ac99407262b9fd2be0f247ec69b8af59fc570bc218e86fc6d747f2 kernel-debug-2.6.18-371.11.1.el5.x86_64.rpm
f20e7ded62917fda4c7749bf0a54f1a5ef496a58211fd63eed3b8b70e008a267 kernel-debug-devel-2.6.18-371.11.1.el5.x86_64.rpm
6fdcdd9416fd244403c47f2d195dfcbaef49d32e9f90f3e8fdf7cf45667c4d54 kernel-devel-2.6.18-371.11.1.el5.x86_64.rpm
9a49e170dd9dea91421182d2f1a0464effe8999a2d2467c163e63f72bae68d8f kernel-doc-2.6.18-371.11.1.el5.noarch.rpm
7b56e10a3aa07e05d511e5a5599e77b708bf9ead95627c19e56d70e3bf6ae7c9 kernel-headers-2.6.18-371.11.1.el5.x86_64.rpm
e9fe2c77d25d54af3c9d2a0bf0386c1576401b1c047df7e88246ea05123ada34 kernel-xen-2.6.18-371.11.1.el5.x86_64.rpm
3448c824bb1bebb84382d52463bbf256bf42aba2589bdb55f6f2ea65bafe95f2 kernel-xen-devel-2.6.18-371.11.1.el5.x86_64.rpm

Source:
a0032720d960d30a6cc3aa10c717fe1c75595f74731b071d4cf47adf7b6807ed kernel-2.6.18-371.11.1.el5.src.rpm



--
Johnny Hughes
CentOS Project { http://www.centos.org/ }
irc: hughesjr, #centos@irc.freenode.net

_______________________________________________
CentOS-announce mailing list
CentOS-announce@centos.org
http://lists.centos.org/mailman/listinfo/centos-announce

Ubuntu 14.04.1 LTS released

The Ubuntu team is pleased to announce the release of Ubuntu 14.04.1 LTS
(Long-Term Support) for its Desktop, Server, Cloud, and Core products,
as well as other flavours of Ubuntu with long-term support.

As usual, this point release includes many updates, and updated
installation media has been provided so that fewer updates will need to
be downloaded after installation. These include security updates and
corrections for other high-impact bugs, with a focus on maintaining
stability and compatibility with Ubuntu 14.04 LTS.

Kubuntu 14.04.1 LTS, Edubuntu 14.04.1 LTS, Xubuntu 14.04.1 LTS,
Mythbuntu 14.04.1 LTS, Ubuntu GNOME 14.04.1 LTS, Lubuntu 14.04.1 LTS,
Ubuntu Kylin 14.04.1 LTS, and Ubuntu Studio 14.04.1 LTS are also now
available. More details can be found in their individual release notes:

https://wiki.ubuntu.com/TrustyTahr/ReleaseNotes#Official_flavours

Maintenance updates will be provided for 5 years for Ubuntu Desktop,
Ubuntu Server, Ubuntu Cloud, Ubuntu Core, Ubuntu Kylin, Edubuntu, and
Kubuntu. All the remaining flavours will be supported for 3 years.

To get Ubuntu 14.04.1
---------------------

In order to download Ubuntu 14.04.1, visit:

http://www.ubuntu.com/download

Users of Ubuntu 12.04 will soon be offered an automatic upgrade to
14.04.1 via Update Manager. For further information about upgrading,
see:

https://help.ubuntu.com/community/TrustyUpgrades

As always, upgrades to the latest version of Ubuntu are entirely free of
charge.

We recommend that all users read the 14.04.1 release notes, which
document caveats and workarounds for known issues, as well as more
in-depth notes on the release itself. They are available at:

https://wiki.ubuntu.com/TrustyTahr/ReleaseNotes

If you have a question, or if you think you may have found a bug but
aren't sure, you can try asking in any of the following places:

#ubuntu on irc.freenode.net
http://lists.ubuntu.com/mailman/listinfo/ubuntu-users
http://www.ubuntuforums.org
http://askubuntu.com


Help Shape Ubuntu
-----------------

If you would like to help shape Ubuntu, take a look at the list of ways
you can participate at:

http://www.ubuntu.com/community/get-involved


About Ubuntu
------------

Ubuntu is a full-featured Linux distribution for desktops, laptops,
clouds and servers, with a fast and easy installation and regular
releases. A tightly-integrated selection of excellent applications is
included, and an incredible variety of add-on software is just a few
clicks away.

Professional services including support are available from Canonical and
hundreds of other companies around the world. For more information
about support, visit:

http://www.ubuntu.com/support


More Information
----------------

You can learn more about Ubuntu and about this release on our website
listed below:

http://www.ubuntu.com/

To sign up for future Ubuntu announcements, please subscribe to Ubuntu's
very low volume announcement list at:

http://lists.ubuntu.com/mailman/listinfo/ubuntu-announce

On behalf of the Ubuntu Release Team,

... Adam Conrad

--
ubuntu-announce mailing list
ubuntu-announce@lists.ubuntu.com
Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-announce

[FreeBSD-Announce] FreeBSD Quarterly Status Report - Second Quarter 2014

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

FreeBSD Project Quarterly Status Report: April - June 2014

This report covers FreeBSD-related projects between April and June
2014. This is the second of four reports planned for 2014.

The second quarter of 2014 was a very busy and productive time for the
FreeBSD Project. A new FreeBSD Core Team was elected, the FreeBSD Ports
Management Team branched the second quarterly "stable" branch, the
FreeBSD Release Engineering Team was in the process of finalizing the
FreeBSD 9.3-RELEASE cycle, and many exciting new features have been
added to FreeBSD.

Thanks to all the reporters for the excellent work! This report
contains 24 entries and we hope you enjoy reading it.

The deadline for submissions covering the period from July to September
2014 is October 7th, 2014.
__________________________________________________________________

FreeBSD Team Reports

* FreeBSD Core Team
* FreeBSD Port Management Team
* FreeBSD Release Engineering Team

Projects

* Chelsio iSCSI Offload Support
* CUSE4BSD
* FreeBSD and Summer of Code 2014
* New Automounter
* pkg(8)
* QEMU bsd-user-Enabled Ports Building
* RPC/NFS and CTL/iSCSI Performance Optimizations
* ZFSguru

Kernel

* PostgreSQL Performance Improvements
* Running FreeBSD as an Application on Top of the Fiasco.OC
Microkernel
* SDIO Driver
* TMPFS Stability
* UEFI Boot
* Updated vt(4) System Console

Architectures

* FreeBSD/arm64

Ports

* FreeBSD Python Ports
* KDE/FreeBSD
* The Graphics Stack on FreeBSD

Documentation

* Quarterly Status Reports

Miscellaneous

* FreeBSD Host Support for OpenStack and OpenContrail
* The FreeBSD Foundation
__________________________________________________________________

FreeBSD Core Team

Contact: FreeBSD Core Team <core@FreeBSD.org>

The FreeBSD Core Team constitutes the project's "Board of Directors",
responsible for deciding the project's overall goals and direction as
well as managing specific areas of the FreeBSD project landscape.

Topics for core this quarter have included some far-reaching policy
reviews and some significant changes to the project development
methodology.

In May, a new release policy was published and presented at the BSDCan
developer conference by John Baldwin. The idea is that each major
release branch (for example, 10.X) is guaranteed to be supported for at
least five years, but individual point releases on each branch, like
10.0-RELEASE, will be issued at regular intervals and only the latest
point release will be supported.

Another significant change did not receive approval. When the change to
the Bylaws reforming the core team election process was put to the vote
of all FreeBSD developers, it failed to reach a quorum.

June saw the culmination of a long running project to replace the
project's bug tracking system. As of June 3, the FreeBSD project has
switched to Bugzilla as its bug tracking system. All of the history of
GNATS PRs has been preserved, so there is no need to re-open old
tickets. Work is still going on to replicate some of the integration
tweaks that had been applied to GNATS, but all necessary functionality
has been implemented and the project is already seeing the benefits of
the new capabilities brought by Bugzilla.

An election to select core members for the next two year term of office
took place during this period. We would like to thank retiring members
of core for their years of service. The new core team provides
continuity with previous core teams: about half are incumbents from the
previous team, and several former core team members have returned after
a hiatus. Core now includes two members of the FreeBSD Foundation board
and one other Foundation staff member, aiding greater coordination at
the top level of the project. At the same time the core-secretary role
was passed on to a new volunteer.

Other activities included providing consultation on licensing terms for
software within the FreeBSD source tree, and oversight of changes to
the membership of postmaster and clusteradm.

Three new src commit bits were issued during this quarter, and one was
taken into safekeeping.
__________________________________________________________________

FreeBSD Port Management Team

URL: http://www.FreeBSD.org/ports/
URL: http://www.freebsd.org/doc/en_US.ISO8859-1/articles/contributing-ports/
URL: http://portsmon.freebsd.org/index.html
URL: http://www.freebsd.org/portmgr/index.html
URL: http://blogs.freebsdish.org/portmgr/
URL: http://www.twitter.com/freebsd_portmgr/
URL: http://www.facebook.com/portmgr
URL: http://plus.google.com/communities/108335846196454338383

Contact: Frederic Culot <portmgr-secretary@FreeBSD.org>
Contact: FreeBSD Port Management Team <portmgr@FreeBSD.org>

The ports tree slowly approaches the 25,000 ports threshold, while the
PR count is slightly below 1800.

In Q2 we added three new committers, took in one commit bit for
safekeeping, and reinstated one commit bit.

In May, Thomas Abthorpe was replaced by Frederic Culot as portmgr
secretary, and Steve Wills became a member of the portmgr team.

Commencing July 1, the third intake of portmgr-lurkers started active
duty on portmgr for a four month duration. The next two candidates are
William Grzybowski and Nicola Vitale.

This quarter also saw the release of the second quarterly branch,
namely 2014Q2. This branch was not only built for 10 (as 2014Q1) but
for 9 as well (both i386 and amd64).

Open tasks:

1. As previously noted, many PRs continue to languish, we would like
to see committers dedicate themselves to closing as many as
possible.
__________________________________________________________________

FreeBSD Release Engineering Team

URL: http://www.freebsd.org/releases/9.3R/schedule.html
URL: http://ftp.freebsd.org/pub/FreeBSD/snapshots/ISO-IMAGES/

Contact: FreeBSD Release Engineering Team <re@FreeBSD.org>

The FreeBSD Release Engineering Team is responsible for setting and
publishing release schedules for official project releases of FreeBSD,
and announcing code freezes and maintaining the respective branches,
among other things.

In early May, the FreeBSD 9.3-RELEASE cycle entered the code slush
phase. The FreeBSD 9.3-RELEASE cycle is nearing the final phases, and
9.3-RC3 builds will be starting soon. 9.3-RC3 is planned to be the
final release candidate for this release cycle, and at the time of this
writing, 9.3-RELEASE should be available on schedule.

Work is ongoing to integrate support for embedded architectures into
the release build process. At this time, support exists for a number of
ARM kernels, in particular the Raspberry Pi, BeagleBone, and WandBoard.

Additionally, work is in progress to produce virtual machine images as
part of the release cycle, supporting various cloud services such as
Microsoft Azure, Amazon EC2, and Google Compute Engine.

This project is sponsored by The FreeBSD Foundation .
__________________________________________________________________

Chelsio iSCSI Offload Support

Contact: Sreenivasa Honnur <shonnur@chelsio.com>

Building on the new in-kernel iSCSI target and initiator stack released
in FreeBSD 10.0, Chelsio Communications has begun developing an offload
interface to take advantage of the hardware offload capabilities of
Chelsio T4 and T5 10 and 40 gigabit Ethernet adapters.

The code currently implements a working prototype of offload for the
initiator side, and target side offload should begin shortly. The code
will be released under the BSD license and is expected to be completed
later in the year and be committed to FreeBSD-HEAD, and will likely
ship in a FreeBSD release in early 2015.

Open tasks:

1. Complete testing and debugging of the initiator offload.
2. Start development of target offload.
3. Create hardware-independent offload APIs, based on experiences with
target and initiator proof-of-concept implementations.
__________________________________________________________________

CUSE4BSD

URL: http://svnweb.freebsd.org/changeset/base/266581

Contact: Hans Petter Selasky <hselasky@FreeBSD.org>

The so-called CUSE4BSD has been imported into the base system of
FreeBSD-11. CUSE is short for character device in userspace. The CUSE
library is a wrapper for the devfs(8) kernel functionality which is
exposed through /dev/cuse. In order to function, the CUSE kernel code
must either be enabled in the kernel configuration file or loaded
separately as a module. Follow the commit message link to get more
information.
__________________________________________________________________

FreeBSD and Summer of Code 2014

URL: http://gsoc.FreeBSD.org
URL: https://wiki.freebsd.org/SummerOfCode2014

Contact: Gavin Atkinson <gavin@FreeBSD.org>
Contact: Glen Barber <gjb@FreeBSD.org>
Contact: Wojciech Koszek <wkoszek@FreeBSD.org>

FreeBSD received 39 project proposals this year, many of which were of
a very high standard. After a difficult selection process narrowing
these down into the slots we had been allocated, a total of 16 projects
were selected to participate in Google Summer of Code 2014 with
FreeBSD.

The projects selected span a wide range of areas within FreeBSD,
covering both the base system and ports infrastructure, userland and
kernel. We have students working on firewall optimisation, ports
packaging tools, embedded systems, debugging infrastructure, improved
Unicode support, enhancements to the loader and to the installer, and
several other areas of work. We are just over halfway through the
allocated time this year, and are very much looking forward to
integrating code produced by these projects into FreeBSD.

This is the tenth time FreeBSD has taken part in Google's Summer of
Code, and we are grateful to Google to have accepted us as a
participating organisation.
__________________________________________________________________

New Automounter

Contact: Edward Tomasz Napieral/a <trasz@FreeBSD.org>

Deficiencies in the current automounter, amd(8), are a recurring
problem reported by many FreeBSD users. A new automounter is being
developed to address these concerns.

The automounter is a cleanroom implementation of functionality
available in most other Unix systems, using proper kernel support
implemented via an autofs filesystem. The automounter supports a
standard map format, and will integrate with the Lightweight Directory
Access Protocol (LDAP) service.

The project is at the early testing stage. A patch will be released as
part of a broader call for testing after additional review on some
critical components (in particular, the autofs filesystem). After
fixing reported problems, the code will be committed to
FreeBSD 11-CURRENT. It is expected to ship in the FreeBSD 10.2 release.

This project is sponsored by The FreeBSD Foundation .

Open tasks:

1. Fix bad interaction with fts(3).
2. Debug a problem with Kerberos NFS mounts.
__________________________________________________________________

pkg(8)

URL: https://github.com/freebsd/pkg
URL: https://github.com/freebsd/pkg/issues

Contact: Baptiste Daroussin <bapt@FreeBSD.org>
Contact: Bryan Drewery <bryan@FreeBSD.org>
Contact: Matthew Seaman <matthew@FreeBSD.org>
Contact: Vsevolod Stakhov <vsevolod@FreeBSD.org>
Contact: The pkg mailing list <freebsd-pkg@FreeBSD.org>

pkg(8) is the new package management tool for FreeBSD. It is now the
only supported package management tool for FreeBSD releases from
10.0-RELEASE, including the upcoming 9.3-RELEASE. pkg(8) is available
on all currently supported releases. Support for the legacy pkg_tools
is due to be discontinued at the beginning of September 2014.

The release of pkg(8) 1.3 is imminent. This includes major improvements
in the dependency solver. Now we can:
* Switch versions of, for example, Perl or PHP and resolve all the
conflicts with packages that depend on them automatically. No more
need to manually switch package origins.
* Deal more gracefully with complex upgrade or install scenarios.
* Sandbox operations dealing with freshly downloaded data until it
can be verified as trustworthy by checking the package signature.
* Deal with provides-and-requires style of dependencies, so for
example we can say "this package needs to use a web server" and
allow that dependency to be fulfilled by apache or nginx or any
other alternative that provides web-server functionality.

Beyond the next release, we have work in progress on allowing ranges of
versions in dependency rules and handling a selection of "foreign"
package repositories, such as CPAN or CTAN or PyPi.

There are plans to use pkg(8) to package up the base system. Along with
other benefits, this will allow writing a universal installer: download
one installer image and from there install any available version of
FreeBSD, including snapshots.

We are also intending to use pkg(8) within the ports tree at
package-build time to handle fulfilling build dependencies. This opens
the possibility of installing build-dependencies by downloading binary
packages, which means you can install a package with customized options
with the minimum amount of time spent compiling anything else.

Open tasks:

1. We are sorely lacking a comprehensive testing setup. Integrating
automated regression testing into the development cycle is becoming
an imperative.
2. We need testers who can run development versions of pkg in as many
distinct types of use-cases as possible, and report feedback from
their experiences to the freebsd-pkg@freebsd.org mailing list or
our issues list on github.
__________________________________________________________________

QEMU bsd-user-Enabled Ports Building

URL: https://wiki.freebsd.org/QemuUserModeHowTo
URL: http://dirty.ysv.freebsd.org/
URL: https://github.com/seanbruno/qemu-bsd-user

Contact: Stacey Son <sson@FreeBSD.org>
Contact: Juergen Lock <nox@FreeBSD.org>
Contact: Sean Bruno <sbruno@FreeBSD.org>

The ports-mgmt/poudriere-devel port is capable of building ports via an
emulator. Configuration of the miscellaneous binary image activator is
required prior to a poudriere-devel run.

ARMV6, MIPS32 and MIPS64 packages can be produced via full emulation.
There are several packages that block a full run of builds. They can be
viewed on the "Status of ports building" link.

To build packages via emulation, on current or latest stable/10:

Clone the github repository, and switch to the bsd-user branch. Then
run:

./configure --static \
--target-list="arm-bsd-user i386-bsd-user \
mips-bsd-user mips64-bsd-user mips64el-bsd-user \
mipsel-bsd-user ppc-bsd-user ppc64-bsd-user sparc-bsd-user \
sparc64-bsd-user x86_64-bsd-user"

gmake; gmake install

Then set up the binmiscctl tools to do some evil hackery to redirect
execution of armv6 binaries to qemu:

binmiscctl add armv6 --interpreter \ "/usr/local/bin/qemu-arm" --magic
\ "\x7f\x45\x4c\x46\x01\x01\x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02
\
\x00\x28\x00" --mask "\xff\xff\xff\xff\xff\xff\xff\x00\xff\xff\xff\xff
\
\xff\xff\xff\xff\xfe\xff\xff\xff" --size 20 --set-enabled

Install poudriere-devel from ports. It knows how to set up things.

Create a poudriere jail to do all the magic:

poudriere jail -c -j 11armv632 -m svn -a armv6 \
-v head

Now run poudriere against that jail to build all the ports:

poudriere bulk -j 11armv632 -a

Nullfs mount the ports tree into the jail:

mkdir /usr/local/poudriere/jails/11armv632/usr/ports
mount -t nullfs /usr/ports
/usr/local/poudriere/jails/11armv632/usr/ports

To chroot into the jail:

mount -t devfs devfs /usr/local/poudriere/jails/11armv632/dev
chroot /usr/local/poudriere/jails/11armv632/

Open tasks:

1. PPC on AMD64 emulation. This is a work in progress as there appear
to be some serious issues running the bsd-user binary on big-endian
hardware. Justin Hibbits is working on this.
2. SPARC64 on AMD64 emulation is non-functional and instantly
segfaults. We are looking for someone to poke at the bits here.
3. External Toolchain, XDEV support. There is partial support for
using an AMD64 toolchain that can output binaries for other
architecture (e.g., using an AMD64 toolchain to build MIPS64
packages). We are currently tracking a linking issue with
ports-mgmt/pkg. Thanks to Warner Losh, Baptiste Daroussin, Dimitry
Andric for poking at bits in here to make the XDEV target useful.
4. Signal handling. The MIPS/ARMV6 target stills display a failure
that manifests itself when building devel/p5-Sys-SigAction.
5. Massive documentation update needed. These modifications actually
allow chrooting into a MIPS or ARMv6 environment and using native
toolchains and libraries to prototype software for a target
platform.
__________________________________________________________________

RPC/NFS and CTL/iSCSI Performance Optimizations

Contact: Alexander Motin <mav@FreeBSD.org>

The FreeBSD RPC stack, used as a base for its NFS server, received
multiple optimizations to improve performance and SMP scalability.
Algorithmic optimizations reduced processing overhead, while improved
locking allowed it to scale up to at least 40 processor cores without
significant lock congestion. Combined with some other kernel
optimizations, the peak NFS request rate increased by many times,
reaching up to 600K requests per second on modern hardware.

The CAM Target Layer (CTL), used as the base for the new kernel iSCSI
server, also received a series of locking optimizations which allowed
its peak request rate to increase from ~200K to ~600K IOPS with the
potential of reaching a rate of 1M requests per second. That rate is
sufficient to completely saturate 2x10Gbit Ethernet links with 4KB
requests. For comparison, the port of net/istgt (user-level iSCSI
server) on the same hardware with an equivalent configuration showed
only 100K IOPS.

There is also ongoing work on improving CTL functionality. It was
already made to support three of four VMware VAAI storage acceleration
primitives (net/istgt supports 2), while the goal is to reach full VAAI
support during next months.

With all these improvements, and earlier improvements in CAM, GEOM,
ZFS, and a number of other kernel areas coming soon, FreeBSD 10.1 may
become the fastest storage release ever. ;)

These projects are sponsored by iXsystems, Inc.
__________________________________________________________________

ZFSguru

URL: http://zfsguru.com
URL: http://zfsguru.com/news/stateoftheproject/2014

Contact: Jason Edwards <sub.mesa@gmail.com>

ZFSguru is a multifunctional server appliance with a strong emphasis on
storage. ZFSguru began as simple web-interface frontend to ZFS, but has
since grown into a FreeBSD derivative with its own infrastructure. The
scope of the project has also grown with the inclusion of add-on
packages that add functionality beyond the traditional NAS
functionality found in similar product like FreeNAS and NAS4Free.
ZFSguru aims to be a true multifunctional server appliance that is
extremely easy to setup and can unite both novice and more experienced
users in a single user interface. The modular nature of the project
combats the danger of bloat, whilst still allowing extended
functionality to be easily deployed.

Where development in the first quarter of this year brought
drag-and-drop permissions for Samba and NFS, development in the second
quarter focused on strengthening the infrastructure of the project. A
new library and toolkit solution dubbed 'Mesa' is in the works,
providing a cleaner foundation to the project. A new master server
providing secure remote services is being setup, to be located in a
high-speed datacenter. But most importantly, a new system build
infrastructure has shown great progress and will soon be able to
provide automated system builds to our users. This not only improves
the frequency of system releases but also frees much developer time to
be spent on different areas of the project.

Furthermore, a new website and forum is being worked on, replacing the
old-fashioned website that offers only limited functionality. The new
website will be linked to the server database, providing real-time
updates about the project.

In addition, a new platform for collaborative development is in the
works. A service addon has been created for the GitLab project, which
is a drop-in replacement of the popular GitHub website. The choice was
made to host our own solution and not rely on GitHub itself. In
retrospect this appears to be a good decision. The recent development
where GitHub removed projects after DCMA takedowns being sent is
incompatible with the philosophy of free-flow-of-information, which the
ZFSguru project is a strong proponent of. By hosting our own solution,
we have avoided any dependency on third party projects.

It is expected that after the infrastructure of the project has been
revamped, work on the web-interface itself can continue. New
functionality such as GuruDB and Service Bulletins provide a tighter
connection between the server infrastructure and the web-interface. The
Migration Manager is one of the last remaining features still missing
in the web-interface. This functionality provides an easy way to
upgrade the current system by performing a new clean installation, but
migrate all relevant configuration to the new installation. It also
allows to backup all system configuration in a single file to be stored
on a different machine should things go awry.

A longer version of this status report giving a wider perspective on
the project can be found at the stateoftheproject link.
__________________________________________________________________

PostgreSQL Performance Improvements

URL: https://www.kib.kiev.ua/kib/pgsql_perf_v2.0.pdf

Contact: Konstantin Belousov <kib@FreeBSD.org>

Analysis of the performance of the latest 9.3 version of PostgreSQL on
FreeBSD-CURRENT has been performed. The issues which prevented good
scalability on a 40-core machine were determined, and changes
prototyped which solve the bottlenecks.

The URL above provides a paper which contains a detailed explanation of
the issues and solutions, together with a graph demonstrating the
effects on scalability.

This project is sponsored by The FreeBSD Foundation.
__________________________________________________________________

Running FreeBSD as an Application on Top of the Fiasco.OC Microkernel

URL: http://en.wikipedia.org/wiki/L4_microkernel_family
URL: https://wiki.freebsd.org/201407DevSummit/BSDUserspace

Contact: Ilya Bakulin <ilya@bakulin.de>

Fiasco.OC belongs to the L4 microkernel family. A microkernel provides
a bare minimum of services to the applications running on top of it,
unlike traditional kernels that incorporate complex code like IP stacks
and device drivers. This allows a dramatic decrease in the amount of
code running in the privileged mode of the CPU, achieving higher
security while still providing an acceptable level of performance.

Running an operating system kernel on top of the microkernel allows
leveraging any software that was developed for that operating system.
The OS kernel runs in user-mode side-by-side with other microkernel
applications such as real-time components. Multiple OSes, each with
their userland applications, can even be run in parallel, thus allowing
construction of products where processing of corporate data is strictly
separated from the processing of private data.

The project aims to create a port of FreeBSD to the Fiasco.OC
microkernel, a high performance L4 microkernel developed by TU Dresden.
Existing ports of OpenBSD and Linux are used as a reference. This will
allow the use of unique FreeBSD features like ZFS in L4-based projects.

Open tasks:

1. Finish opensourcing the port of L4OpenBSD/amd64 made by genua mbh.
This is a work in progress.
2. Publish the sources of the L4FreeBSD port that is largely based on
the L4OpenBSD code.
3. Improve the port, the first task being adopting the pmap(9) module
to work with L4 microkernel memory allocation services.
__________________________________________________________________

SDIO Driver

URL: https://wiki.freebsd.org/SDIO
URL: https://github.com/kibab/freebsd/tree/mmccam

Contact: Ilya Bakulin <ilya@bakulin.de>

SDIO is an interface designed as an extension of the existing SD card
standard, which allows the connecting of different peripherals to a
host with a standard SD controller. Peripherals currently sold on the
general market include WLAN/BT modules, cameras, fingerprint readers,
and barcode scanners. Additionally, SDIO is used to connect some
peripherals in products like Chromebooks and Wandboards. A prototype of
the driver for the Marvell SDIO WLAN/BT (Avastar 88W8787) module is
also being developed, using the existing Linux driver as the reference.

SDIO card detection and initialization already work. Most necessary bus
methods are implemented and tested.

The WiFi driver is able to load firmware onto the card and initialize
it. A rewrite of the MMC stack as a transport layer for the CAM
framework is in progress. This will allow utilization of the
well-tested CAM locking model and debug features.

Open tasks:

1. SDIO stack: finish CAM migration. The initialization of the MMC/SD
card is implemented in the XPT layer, but cannot be tested with
real hardware because of the lack of any device drivers that
implement peripheral drivers and SIMs for CAM MMC. The plan is to
use a modified version of the BeagleBone Black SDHCI controller
driver for the SIM and a modified version of mmcsd(4) as a
peripheral driver.
2. Marvell SDIO WiFi: connect to the FreeBSD network stack, write the
code to implement required functions (such as sending/receiving
data, network scanning and so on).
__________________________________________________________________

TMPFS Stability

Contact: Konstantin Belousov <kib@FreeBSD.org>
Contact: Peter Holm <pho@FreeBSD.org>

Extensive testing of tmpfs(5) using the stress2 kernel test suite was
done. The issues found were debugged and fixed.

Most of the problems are related to bugs in the interaction of the
vnode and node lifetime, culminating in e.g., unmount races and dotdot
lookup bugs.

This project is sponsored by The FreeBSD Foundation.
__________________________________________________________________

UEFI Boot

URL: https://wiki.freebsd.org/UEFI
URL: http://www.freebsd.org/snapshots/

Contact: Ed Maste <emaste@FreeBSD.org>
Contact: Nathan Whitehorn <nwhitehorn@FreeBSD.org>

The Unified Extensible Firmware Interface (UEFI) provides boot- and
run-time services for x86 and other computers. For the x86 architecture
it replaces the legacy BIOS. This project will adapt the FreeBSD loader
and kernel boot process for compatibility with UEFI firmware, found on
contemporary servers, desktops, and laptops.

Ed and Nathan completed a number of integration tasks over the past
three months. Nathan added a first-stage loader, boot1.efi, to support
chain-loading the rest of the system from a UFS filesystem. This allows
the UEFI boot process to proceed in a similar fashion as with BIOS
boot. Nathan also added UEFI support to the FreeBSD installer and
release image creation script.

The EFI framebuffer requires the vt(4) system console -- a framebuffer
driver is not implemented for the legacy syscons(4) console. Ed added
automatic vt(4) selection to the UEFI boot path.

Snapshots are now built as dual-mode images, and should boot via both
BIOS and UEFI. Our plan is to merge the UEFI and vt(4) work to
stable/10 to appear in FreeBSD 10.1-RELEASE.

This project is sponsored by The FreeBSD Foundation.

Open tasks:

1. Document manual installation, including dual-boot configurations.
2. Implement boot1.efi for ZFS file systems.
3. Add support for UEFI variables stored in non-volatile memory
(NVRAM).
4. Debug boot failures with certain UEFI firmware implementations.
5. Support secure boot.
__________________________________________________________________

Updated vt(4) System Console

URL: https://wiki.freebsd.org/Newcons

Contact: Aleksandr Rybalko <ray@FreeBSD.org>
Contact: Ed Maste <emaste@FreeBSD.org>
Contact: Ed Schouten <ed@FreeBSD.org>
Contact: Warren Block <wblock@FreeBSD.org>

The vt(4) (aka Newcons) project provides a replacement for the legacy
syscons system console. It brings a number of improvements, including
better integration with graphics modes and broader character set
support.

Since the last report, vt(4) gained the ability to make early driver
selection. vt(4) selects the best successfully-probed driver before
most other kernel subsystems are initialized. Also, to facilitate
migration from syscons(4) to vt(4), multiple virtual terminal
subsystems in the kernel are now supported. It is controlled by a small
module with just one kernel environment variable. Users can select the
virtual terminal system to use by setting kern.vty=sc or kern.vty=vt.

The GENERIC kernel configuration for the amd64 and i386 platforms now
includes both syscons(4) and vt(4) by default. This configuration is
also planned to be in FreeBSD 10.1-RELEASE.

The project finally received a man page, so now vt(4) is not only the
project name, but also a link to its documentation. Great thanks to
Warren Block for that.

Major highlights:
* Unicode support.
* Double-width character support for CJK characters.
* xterm(1)-like terminal emulation.
* Support for Kernel Mode Setting (KMS) drivers (i915kms, radeonkms).
* Support for different fonts per terminal window.
* Simplified drivers.

Brief status of supported architectures and hardware:
* amd64 (VGA/i915kms/radeonkms) -- works.
* ARM framebuffer -- works.
* i386 (VGA/i915kms/radeonkms) -- works.
* IA64 -- untested.
* MIPS -- untested.
* PPC and PPC64 -- work, but without X.Org yet.
* SPARC -- works on certain hardware (e.g., Ultra 5).
* vesa(4) -- in progress.
* i386/amd64 nVidia driver -- not supported. VGA should be used (VESA
planned).
* Xbox framebuffer driver -- will be deleted as unused.

This project is sponsored by The FreeBSD Foundation.

Open tasks:

1. Implement the remaining features supported by vidcontrol(1).
2. Write manual pages for vt(4) drivers and kernel interfaces.
3. Support direct handling of keyboard by the kbd device (without
kbdmux(4)).
4. CJK fonts. (This is in progress).
5. Address performance issues on some architectures.
6. Switch to vt(4) by default.
7. Convert keyboard maps for use with vt(4).
8. Implement compatibility mode to be able to use single-byte
charsets/key-codes in vt(4).
__________________________________________________________________

FreeBSD/arm64

URL: http://svnweb.freebsd.org/base/projects/arm64/

Contact: Andrew Turner <andrew@FreeBSD.org>

Arm64 is the name of the in-progress port of FreeBSD to the ARMv8 CPU
when it is in AArch64 mode. Until recently, all ARM CPU designs were
32-bit only. With the introduction of the ARMv8 architecture, ARM has
added a new 64-bit mode. This new mode has been named AArch64.

Booting FreeBSD on the ARM Foundation Model has made a lot of progress
since the last status report. An initial pmap implementation has been
written. With this, FreeBSD is able to enter the Machine Independent
boot code. The required autoconf functions have been added allowing
FreeBSD to start scheduling tasks. Finally the cpu_switch and copystr
functions were added. With these two, FreeBSD will boot to the
mountroot prompt.

Work has started on supporting exceptions, including interrupts. This
will allow more developers to start working on device drivers.

Open tasks:

1. Finish exception and interrupt handling
2. Read the Device Tree or ACPI tables from UEFI
3. Test on real hardware
__________________________________________________________________

FreeBSD Python Ports

URL: https://wiki.FreeBSD.org/Python
URL: irc://freebsd-python@irc.freenode.net

Contact: FreeBSD Python Team <python@FreeBSD.org>

We are pleased to announce the availability of conflict-free Python
package support across different Python versions based on the
USES=uniquefiles feature recently introduced to the Ports framework. A
Python package can be marked as buildable and installable in parallel
for different Python versions at the same time on the same host. The
package building tools, however, do not support this feature yet and
the Python team will work closely with portmgr and the pkg developers
to enable support on a global ports and packages scale.

In May and June a huge clean-up operation took place to remove the last
bits and pieces targeting easy_install. In the beginning of July we
committed the final changes to remove easy_install support completely
from the ports framework. This greatly simplifies the infrastructure
and allows us to modernize and maintain it with less effort.

We added Python 3.4, removed Python 3.1 after its end of life, updated
the setuptools ports to version 5.1 and PyPy's development version to
2.3.1. The latest Python 2.7.8 and an updated setuptools will hit the
tree shortly.

Our upstreaming effort continues to produce good outcomes for
simplifying maintenance and reducing complexity.

Looking forward, one of the top priorities is to comply with the USES
framework in the foreseeable future and to roll out a consistent
maintainer policy for integrating new Python-related ports into the
tree.

Open tasks:

1. Migrate bsd.python.mk to the Uses framework.
2. Develop a high-level and lightweight Python Ports Policy.
3. Add support for granular dependencies (for example >=1.0,<2.0).
4. See what adding pip (Python Package Index) support will require.
5. Add default QA targets and functions for Python ports
(TEST_DEPENDS, regression-test, etc.)
6. More tasks can be found on the team's wiki page (see links).
7. To get involved, come and say "hi" on IRC and let us know what you
are interested in!
__________________________________________________________________

KDE/FreeBSD

URL: http://FreeBSD.kde.org
URL: http://FreeBSD.kde.org/area51.php

Contact: KDE/FreeBSD Team <kde@FreeBSD.org>

The KDE/FreeBSD team has continued to improve the experience of KDE
software and Qt under FreeBSD.

During this quarter, the team has kept most of the KDE and Qt ports
up-to-date, working on the following releases:
* KDE SC: 4.12.5; Workspace: 4.11.9

As a result -- according to PortScout -- kde@ has 526 ports (up from
526), of which 84.63% are up-to-date (down from 98.86%). iXsystems Inc.
continues to provide a machine for the team to build packages and to
test updates. iXsystems Inc. has been providing the KDE/FreeBSD team
with support for quite a long time and we are very grateful for that.

As usual, the team is always looking for more testers and porters so
please contact us at kde@FreeBSD.org and visit our home page at
http://FreeBSD.kde.org. It would be especially useful to have more
helping hands on tasks such as getting rid of the dependency on the
defunct HAL project and providing integration with KDE's Bluedevil
Bluetooth interface.

Open tasks:

1. Updating out-of-date ports, see PortScout for a list
2. Removing the dependency on HAL
__________________________________________________________________

The Graphics Stack on FreeBSD

URL: https://wiki.freebsd.org/Graphics
URL: http://lists.freebsd.org/pipermail/freebsd-announce/2014-July/001570.ht
ml
URL: http://trillian.chruetertee.ch/ports/browser/trunk

Contact: FreeBSD Graphics team <x11@FreeBSD.org>

We were generally short on time this quarter. We made less progress
than expected on all fronts.

The alternate pkg(8) repository, built with WITH_NEW_XORG, is now
available. This alleviates the need for users to rebuild their ports
with WITH_NEW_XORG. See the announcement, linked above for further
information.

Thanks to a contribution from Jan Kokemüller, Radeon 32bit ioctls are
now working on 64bit hosts. This was tested successfully with Wine and
StarCraft II on FreeBSD 9.x and 11. This required modifications to
emulators/i386-wine-devel so that it works with WITH_NEW_XORG, and the
creation of a new port, libtxc_dxtn, to support the texture compression
used by StarCraft II. We have not yet had the time to polish
everything, so this still requires manual steps.

The DRM generic code update is ready, but it breaks the current i915
driver. Therefore, the i915 driver must be updated before anything is
committed.

Compared to the previous status report, OpenCL test programs are
running fine now, thanks to upgrades and fixes to libc++ and Clang. The
relevant ports are still not ready to hit the ports tree,
unfortunately.

Open tasks:

1. See the "Graphics" wiki page for up-to-date information.
__________________________________________________________________

Quarterly Status Reports

Contact: Quarterly Status Report Team <monthly@FreeBSD.org>

These quarterly status reports help the FreeBSD community stay
up-to-date with the happenings in and around the project. Updates from
FreeBSD teams, new features being developed in- or out-of-tree,
products derived from FreeBSD, and FreeBSD events are all welcome
additions to the status reports.

The Monthly team has been busy since the last report, with longtime
organizer Gábor Páli having stepped down from the team -- thank you
Gábor for all your hard work! This has left something of a void in the
preparation of this report, for which the call for items was issued
quite late. To help fill the void, Warren Block and Benjamin Kaduk have
been added to the monthly@ team, joining Glen Barber, Gavin Atkinson,
Ed Maste, and the rest of the team in preparing this report. Special
thanks to Glen for doing most of the work while simultaneously getting
9.3-RELEASE out the door!

The next cycle is sooner than you think! The deadline for submitting
entries for the Q3 report is October 7th, 2014.

This project is sponsored by The FreeBSD Foundation.

Open tasks:

1. Submit reports for Q42014 to monthly@FreeBSD.org!
__________________________________________________________________

FreeBSD Host Support for OpenStack and OpenContrail

URL: http://www.openstack.org
URL: http://www.opencontrail.org
URL: https://github.com/Semihalf/openstack-devstack
URL: https://github.com/Semihalf/openstack-nova
URL: https://github.com/Semihalf/contrail-vrouter
URL: https://blueprints.launchpad.net/nova/+spec/freebsd-compute-node

Contact: Grzegorz Bernacki <gjb@semihalf.com>
Contact: Michal Dubiel <md@semihalf.com>
Contact: Dominik Ermel <der@semihalf.com>
Contact: Rafal Jaworowski <raj@semihalf.com>

OpenStack is a cloud operating system that controls large pools of
compute, storage, and networking resources in a datacenter.

OpenContrail is a network virtualization (SDN) solution comprising
network controller, virtual router, and analytics engine, which can be
integrated with cloud orchestration systems like OpenStack or
CloudStack.

The goal of this work is to enable FreeBSD as a fully supported compute
host for OpenStack using OpenContrail virtualized networking. The main
areas of development are:
* Libvirt hypervisor driver for bhyve.
* Support for bhyve (via libvirt compute driver) and the overall
FreeBSD platform in nova-compute.
* OpenContrail vRouter (forwarding plane kernel module) port to
FreeBSD.
* OpenContrail Agent (network controller node) port to FreeBSD.
* Integration and performance optimizations.

Since the last report the following items have been completed, which
allow for a working demo of an OpenStack compute node on a FreeBSD host
using OpenContrail for network virtualization:
* Port of the OpenContrail vRouter kernel module for FreeBSD (MPLS
over GRE mode only)
* Port of the OpenContrail Agent for FreeBSD
* FreeBSD version of a Devstack installation/configuration script
with support for the OpenContrail solution (Compute node components
only)

A demo was presented at the DevSummit during BSDCan2014 in Ottawa.
Also, a meetup regarding the subject was organized in Krakow, Poland.

Work on this project is sponsored by Juniper Networks.
__________________________________________________________________

The FreeBSD Foundation

URL: http://www.FreeBSDFoundation.org/
URL: http://freebsdjournal.com/

Contact: Deb Goodkin <deb@FreeBSDFoundation.org>

The FreeBSD Foundation is a 501(c)(3) non-profit organization dedicated
to supporting and promoting the FreeBSD Project and community
worldwide. Most of the funding is used to support FreeBSD development
projects, conferences and developer summits, purchase equipment to grow
and improve the FreeBSD infrastructure, and provide legal support for
the Project.

We published our third issue of the FreeBSD Journal. We have over 2700
subscriptions so far. We continued working on the digital edition,
which will allow subscribers to read the magazine in different web
browsers, including those than run on FreeBSD. This will be available
for the July/August issue of the Journal.

We hired Anne Dickison, on a freelance basis, as our new marketing
director, to help us promote the Foundation and Project.

The annual board meeting was held in Ottawa, Canada, in May. Directors
and officers were elected, and we did some long-term planning. We
worked on our vision, core values, project road mapping, and our
near-term goals. We also met with the core team to discuss roles and
responsibilities, project roadmapping, and what we can do to help the
Project more.

We were a Gold+ sponsor for BSDCan, May 16-17 and provided 7 travel
grants for developers to attend the conference. We also were the
sponsor for both the developer and vendor summits.

Justin Gibbs gave a FreeBSD presentation at a FreeBSD user's internal
technology summit. Company visits like this help users understand the
Project structure better and gives us a chance to communicate what
FreeBSD people are working on as well as learn what different companies
are doing with FreeBSD, as well as what they'd like to see supported.
We can then help facilitate collaboration between the companies and
FreeBSD developers.

We were represented at Great Wide Open, April 2-3 (greatwideopen.org),
Texas LinuxFest, June 13-14 (texaslinuxfest.org), and SouthEast
LinuxFest, June 20-22 (southeastlinuxfest.org).

Hardware was purchased to support an upgrade at Sentex. A new
high-capacity 1Gbps switch was deployed to allow for more systems to be
added to the test lab. The main file server and development box was
upgraded to allow more users in the lab simultaneously.

We purchased hardware, including package builders, and a larger server
to allow NYI to be a full replica of all Project systems, comparable to
what is in place at Yahoo Inc. and ISC.

We worked with our lawyer to create an NDA between the Foundation and
individuals for third party NDAs. This allows developers who need
access to proprietary documents, to go through the Foundation, via an
NDA for access.

FreeBSD Foundation Systems Administrator and Release Engineer, Glen
Barber, continued work on producing regularly-updated FreeBSD/arm
snapshots for embedded devices, such as the Raspberry Pi, ZedBoard, and
BeagleBone.

In addition to producing weekly development snapshots from the head/
and stable/ branches, with feedback and help from Ed Maste, Glen
finished work to produce release images that will, by default, provide
debugging files for userland and kernel available on the
FreeBSD Project FTP mirrors. Note that the debugging files will not be
included on the bootonly.iso, disc1.iso, or dvd1.iso images due to the
size of the resulting images.

Foundation staff member Konstantin Belousov completed an investigation
into poor performance of PostgreSQL on FreeBSD. This uncovered
scalability problems in the FreeBSD kernel, and changes to address
these issues are in progress.

Some previously completed Foundation-sponsored projects received
enhancements or additional work. The ARM superpages project was
completed last year, but is now enabled by default in FreeBSD-CURRENT.
Many stability fixes and enhancements have been committed to the
in-kernel iSCSI stack. The iSCSI project was released in FreeBSD 10.0.
Many stability fixes and enhancements have been committed and will be
included in FreeBSD 10.1.

Work continues on the Foundation-sponsored autofs automount daemon,
UEFI boot support, the updated vt(4) system video console, virtual
machine images, and the Intel graphics driver update.
Foundation-sponsored work resulted in 226 commits to FreeBSD over the
April to June period.
__________________________________________________________________


-----BEGIN PGP SIGNATURE-----
Version: GnuPG v2
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=rQsK
-----END PGP SIGNATURE-----
_______________________________________________
freebsd-announce@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-announce
To unsubscribe, send any mail to "freebsd-announce-unsubscribe@freebsd.org"