Tuesday, June 30, 2015

翁美俊 了解劳动用工过程的法律风险

            新《劳动合同法》、《社会保险法》、《工伤保险条例》
           
        实操应对策略与有效调岗调薪、裁员解雇及违纪问题员工处理技巧


        2015年7月3-4日广州(A单元)、   7月31-8月1日广州(B单元)

                    7月10-11日上海(A单元)、8月7-8日上海(B元)                                      

                    7月17-18日北京(A单元)、8月14-15日北京(B单元)

                    7月24-25日深圳(A单元)、 8月21-22日深圳(B单元)


                    注明:该课程2天为一个单元,A单元与B单元内容是完全独立的不分先后顺序,客户可根据自己需求选择参加A单元或者B单元,或AB单元均参加,可以参加完A单元再参加B单元或者先参加B单元再参加A单元均可,A单元与B单元内容请看下面的课程大纲!!!

【参加对象】 董事长、总经理、副总经理、人力资源总监/经理/专员及人事行政管理人员、工会干部、法务人员及相关管理人员、相关律师等。


【授课方式】 讲师讲授 + 视频演绎 + 案例研讨 +角色扮演 + 讲师点评


【学习费用】 参加A单元:2800/1人,5000/2人;参加B单元:2800/1人,5000/2人
                          参加AB单元:5000/人,(含课程讲义、午餐/茶点等)


垂询热线:上海:021-31006787、北京:010-5129-9910,深圳:0755-6128-0006 


在·线·QQ·微信:320588808      18918958501    许先生


注:如不需要此类信件信息,请发送"删除"至qytuixin@163.com,我们会及时处理,谢谢您的理解。

课程背景:
  2008年,国家出台了《劳动合同法》、《劳动合同法实施条例》、《劳动争议调解仲裁法》、《职工带薪年休假条例》、《企业职工带薪年休假实施办法》;2009年,国家出台了《劳动人事争议仲裁办案规则》;2010年,国家出台了《劳动争议司法解释(三)》及修改了《工伤保险条例》;2011年,国家出台了《社会保险法》及《实施<社会保险法>若干规定》;2012年,国家出台了《企业民主管理规定》、《女职工劳动保护特别规定》及修改了《职业病防治法》;2013年,国家出台了《劳动争议司法解释(四)》、《劳务派遣若干规定》;2014年……
  上述法律法规政策的持续实施,客观上要求企业精打细算,否则无法承受与日俱增的用工成本;客观上要求用人单位做到"精细化"管理,否则难以证明劳动者"不合格、不胜任、严重失职、严重违纪违规",也难以进行合法有效的"调岗调薪、裁员解雇"。如果用人单位依然实施"传统式、粗放式、随便式"的管理,那么用人单位必将面临巨大的用工风险和赔偿责任,其管理权威也将受到严峻的挑战!
  为帮助广大企事业单位了解相关政策法律法规,掌握防范用工风险和化解劳动争议的技能技巧,以实现低风险、低成本、高绩效的人力资源管理目标,特邀请我国知名的劳动法与员工关系管理实战专家钟永棣老师主讲此课程。欢迎企事业单位积极组织相关人员参加此培训课程!

培训收益:
1、全面了解劳动用工过程的法律风险;
2、理解与劳动用工有关的政策法律法规;
3、培养预测、分析劳动用工法律风险的思维;
4、掌握预防和应对风险的实战技能及方法工具……

课程特色:
稀缺性:此课程将劳动法体系和薪酬绩效管理体系紧密相结合,国内极少出现此类课程。
针对性:课程内容精选了过去5年来主讲老师亲自处理过的且在不少用人单位内部也曾发生过的代表性案例,这些案例完全符合中国现阶段的大环境大气候,极具参考性和启发性。
实战性:实战沙盘演练,学员深入思考与充分互动,老师毫不保留倾囊相授;学员把错误留在课堂,把正确 的观点、方法、工具、技能带回去。

讲师介绍:【钟永棣】

资深劳动法专家

教育背景:
    国内著名劳动法与员工关系管理实战专家、劳动仲裁员、企业劳动争议预防应对专家、高级人力资源管理师、高级劳动关系协调师,国内第一批倡导、传播、实施"国家劳动法与企业薪酬绩效有机整合"的先行者;国内原创型、实战型、顾问型的培训师。
  现任"劳律通(中国)顾问中心"、中华创世纪培训网首席顾问,上海成通律师事务所投资合伙人;兼任时代光华管理学院、深圳外商投资企业协会、广州市劳动保障学会、广州市人力资源市场服务中心、广东省人力资源管理协会、香港工业总会、中山大学、浙江大学等100多家培训公司、行业协会、有关机构的签约讲师、特聘顾问。

讲师擅长:
    钟老师精通劳动政策法律法规和劳动仲裁、诉讼程序,擅长劳动用工风险的有效预防与劳动争议案件的精准应对,善于把劳动法律法规与企业人力资源管理有机整合,通晓企业劳动争议防范机制的构建和劳动用工管理体系的修正完善。钟老师经常在客户办公现场、培训现场为客户、学员即时起草、审查、修改相关制度、合同、文书,或分析具体案件的应对思路;钟老师独到的现场的专业功底,每次都赢得广大客户、学员发自内心的好评与100%的信服!

讲师经历:
    钟老师曾任专职劳动仲裁员,曾获"广州市优秀劳动仲裁员"称号,期间审裁劳动争议案件400多宗;多年来累积代理劳动争议500多宗,参与或主持薪酬绩效咨询项目20多个,审查完善400多家企业的人力资源管理规章制度。个人长期担任30多家(累计200多家)企业的人力资源管理法律顾问;以钟老师领衔的专家队伍,长期为企事业单位提供劳动法常年顾问及各种劳资专项咨询服务,客户满意度高达95%。
    2004年开始钟老师全国各地巡讲劳动法、劳动关系课程,受益企业达30000家,直接受益学员70000多人,培训地点涉及20多个省会城市及沿海地区大城市。钟老师将枯燥的劳动政策法规溶入实际管理案例当中,将人力资源管理与劳动法有机地整合在一起;课程内容80%为真实案例、20%为必备的重点法条;学员参与讨论、互动,课程生动有趣,深入浅出,实战型超强,让学员即时学以致用!课程满意度高达95%,众多学员均表示:"第一次听到如此实战、
实用、实效的劳动法课程!钟老师非常务实、不说教、没有商业味道,终于听到了让我不再后悔的精彩课程!"
    钟老师先后在《广州日报》、《南方都市报》、《中国社会科学报》、《人力资源》、《香港工业总会月刊》等报刊、杂志、媒体发表专业文章或采访稿50多篇。


课程大纲:
A单元内容(共2天,15个以上经典案例)
专题一:招聘入职
1.如何预防劳动者的"应聘欺诈",如何证明劳动者的"欺诈"?
2.招收应届毕业生,应注意哪些细节问题?
3.招用达到法定退休年龄的人员,应注意哪些细节问题?
4.招用待岗、内退、停薪留职的人员,应注意哪些细节问题?
5.入职体检需注意哪些细节问题?
6.入职前后用人单位应告知劳动者哪些情况,如何保留证据?
7.《入职登记表》如何设计,才能起到预防法律风险的作用?
8.劳动者无法提交《离职证明》,该怎么办?
9.企业如何书写《录用通知书》,其法律风险有哪些?

专题二:劳动合同订立
1.用人单位自行拟定的劳动合同文本是否有效,是否需要进行备案?
2.劳动者借故拖延或拒绝签订劳动合同,用人单位如何应对?
3.未签订劳动合同,需支付多长期限的双倍工资?是否受到仲裁时效的限制?
4.劳动合同期满,继续留用劳动者,但未续签合同,是否也需支付双倍工资?
5.什么时候为最佳时间,签署劳动合同、用工协议?
6.法律禁止2次约定试用期,劳动合同期限和试用期限该如何约定?
7.用人单位收购其他组织时,如何与被接收的员工签订、变更劳动合同?
8.应否与属于职业经理人的法人代表签订劳动合同?

专题三:试用期
1.可否先试用后签合同,可否单独签订试用期协议?
2.员工主动申请延长试用期,该怎样操作,才规避赔偿风险?
3.试用期满后辞退员工,最少赔2个月工资,该如何化解?
4.试用期最后一天辞退员工,赔偿概率为70%,如何化解?
5.试用期满前几天辞退员工,赔偿概率为50%,如何化解?
6.不符合录用条件的范围包括哪些,如何取证证明?
7.《试用期辞退通知书》如何书写,以避免违法解除的赔偿金?
8.出现"经济性裁员"情况,优先裁掉试用期的新员工,合法吗?

专题四:无固定期限劳动合同
1.无固定期限劳动合同到底是不是铁饭碗,会不会增加企业成本?
2.无固定期限劳动合同解除的条件、理由有哪些?
3.用人单位拒绝签订无固定期限劳动合同,有何风险?
4.签订了固定期限劳动合同的员工,期间工作累计满10年,能否要求将固定期限合同变更为无固定期限合同?
5.连续订立二次固定期限劳动合同到期,用人单位能否终止合同;员工提出签订无固定期限合同,用人单位能否拒绝?
6.合同期满劳动者由于医疗期、三期等原因续延劳动合同导致劳动者连续工作满十年,劳动者提出订立无固 定期限劳动合同的,用人单位能否拒绝?

专题五:特殊用工协议
1.培训服务期与劳动合同期限有何不同,劳动合同期限与服务期限发生冲突时如何适用?
2.培训服务期未到期,而劳动合同到期,用人单位终止劳动合同的,是否属于提前解除劳动合同,如何规避 ?
3.劳动者严重过错被解雇,用人单位能否依据服务期约定要求劳动者支付违约金?
4.在什么情况下,可签署竞业限制协议?
5.在什么时候,企业更有主动权签署竞业限制协议?
6.无约定经济补偿的支付,竞业限制是否有效?
7.竞业限制的经济补偿的标准如何界定?
8.要求员工保密,企业需要支付保密工资吗?

专题六:劳动关系解除终止
1.双方协商解除劳动合同并约定支付适当的经济补偿,事后劳动者追讨经济补偿的差额部分,仲裁机构有可 能支持劳动者的诉求,企业如何避免案件败诉?
2.能否与"三期妇女、特殊保护期间的员工"协商解除,如何规避风险?
3.员工未提前30日通知企业即自行离职,企业能否扣减其工资?
4.员工提交辞职信后的30天内,企业批准其离职,可能有风险,如何化解?
5.员工提交辞职信后的30天后,企业批准其离职,也可能有风险,如何化解?
6.对于患病员工,能否解除,如何操作才能降低法律风险?
7.实行末位淘汰制,以末位排名为由解雇员工,往往被认定非法解雇,企业该如何做,才避免案件败诉?
8.以"组织架构调整,无合适岗位安排"为由解雇员工,感觉非常符合常理,但往往被认定非法解雇,企业该如何做才避免风险?
9.以"经济性裁员"名义解雇员工,感觉非常符合常理,但往往被认定非法解雇,企业该如何操作?
10.《解除劳动合同通知书》如果表述不当,往往成为劳动者打赢官司的有力证据,企业该如何书写,才避免案件败诉而承担法律责任?
11.解除劳动合同前未通知及征求工会的意见,是否构成非法解除?
12.劳动合同到期后,经常出现该终止的忘记办理终止手续,该续签的忘记办理续签手续,其引发的风险非常大;那么企业该如何规避风险?

专题七:社会保险法
1.用人单位拖欠社保费,有什么法律责任?
2.用人单位不足额缴纳社会保险如何处理?
3.员工不愿意买社保,并与单位签有协议的情况下,该协议是否有效?
4.试用期间,是否必须缴纳社会保险?
5.如果无参保,劳动者因第三方责任产生的医疗费用,能否要求单位报销?
6.企业协助辞职员工骗取失业保险金,有什么法律风险?
7.女职工未婚先孕、未婚生育争议如何处理?
8.怀孕女职工提出长期休假保胎,直至修完产假,该如何协调此问题?

专题八:劳动争议处理
1.用人单位败诉的原因主要有哪些?
2.仲裁或法院在处理案件时,如何适用法律法规?
3.如何判定政策法律法规的效力等级?
4.公开审理的开庭形式,有何风险,如何避免风险?
5.申请仲裁的时效如何计算;如何理解"劳动争议发生之日"?
6.如何书写答辩书,有哪些注意事项?
7.开庭期间,质证与辩论需要注意哪些关键问题?
8.举证责任如何分配,无法举证的后果有哪些?

B单元内容(共2天,15个以上经典案例)
专题一:绩效管理与岗位调整
1.企业单方调整岗位,员工往往可被迫解除合同并索赔经济补偿,如何规避?
2.调岗时没有书面确认,员工到新岗位工作2个月后能否要求恢复到原岗位?
3.可否对"三期内"女职工进行调岗、调薪?
4.员工认同绩效结果,为什么在"不胜任工作"引发的争议中还是败诉?
5.为什么企业根据绩效结果支付员工绩效奖金,最终被认定非法克扣工资?
6.法律上如何证明劳动者"不能胜任工作"?
7.对绩效考核不合格的员工,如何合法辞退?
8.绩效正态分布往往强制划分5%的员工为不合格者,是否合法?

专题二:劳动报酬、薪酬福利
1.工资总额包括哪些工资明细?
2.新进员工薪资管理问题及处理技巧;
3.调整工作岗位后,可以调整薪资标准吗?
4.如何通过薪酬调整处理员工失职、违纪等问题?
5.值班算不算加班?
6.加班加点工资支付常见误区?
7.用人单位如何设计工资构成以降低加班费成本?
8.未经用人单位安排,劳动者自行加班的,是否需支付加班工资?
9.劳动者主张入职以来的加班费,如何应对?
10.劳动者在工作日\法定节假日加班,能否安排补休而不予支付加班费?
11.病假、年休假、婚假、产假、丧假等的享受条件及工资待遇标准?
12.离职员工往往回头追讨年终奖,有可能得到支持,如何规避该风险?

专题三:违纪违规问题员工处理
1.劳动者往往拒绝签收处分、解雇通知书,如何应对?
2.问题员工往往拒绝提交《检讨书》或否认违纪违规事实,企业该如何收集证据?
3.对于违纪员工,应该在什么时间内处理?
4.怎样理解"严重违反用人单位的规章制度"?
5.如何在《惩罚条例》中描述"一般违纪"、"较重违纪"及"严重违纪"?
6.怎样理解"严重失职,营私舞弊,给用人单位造成重大损害"?
7.如何界定"重大损害","重大损害"是否必须体现为造成直接的经济损失?
8.如何追究"严重失职、严重违纪违规"者的法律责任?
9.能否直接规定"禁止兼职,否则视为严重违纪违规"?
10.直线部门经理擅自口头辞退员工,仲裁机构往往认定企业非法解雇,企业该如何做,才避免案件败诉?
11.劳动者不辞而别、无故旷工,却主张被企业口头解雇,往往得到仲裁机构的支持,企业该如何做,才避免案件败诉?
12."录音录象"证据,仲裁与法院是否采信;企业内部OA系统上的资料能否作为证据使用;电子邮件、手机短信能否作为证据使用?

专题四:经济补偿
1.用人单位需向劳动者支付经济补偿的情形有哪些?
2.什么情况下用人单位需支付两倍的经济补偿?
3.劳动者可否同时向用人单位主张经济补偿和赔偿金?
4.经济补偿计算的基数及标准如何确定?
5.经济补偿年限最高不超过十二年的适用范围?
6.如何计算《劳动合同法》生效前后的经济补偿年限?
7.如何理解"六个月以上不满一年的,按一年计算;不满六个月的,向劳动者支付半个月工资的经济补偿"?
8.劳动合同法环境下"50%额外经济补偿金"是否继续适用?

专题五:规章制度、员工手册
1.企业人力资源管理体系中哪些内容跟劳动法有必然联系?
2.人力资源、劳动用工管理制度应该包括哪些必备内容?
3.制定规章制度的程序要求给用人单位带来哪些风险,如何应对?
4.非国有用人单位如何组建"职工代表大会"?
5.无纸化、网络化办公下的公示,存在哪些风险?
6.如何公示或告知,更符合仲裁或诉讼的举证要求?
7.规章制度能否规定对员工进行经济处罚?
8.规章制度违反法律法规,劳动者可以被迫解除并索取经济补偿,如何防范?

专题六:工伤保险条例
1.属于工伤范围的情形有哪些?
2.不得认定为工伤的情形有哪些?
3.怎样理解"上下班途中",怎样控制期间的风险?
4.发生工伤事故,用人单位需承担哪些费用?
5.工伤员工借故拒绝复工,借故不断休假,如何处理?
6.对于第三方造成的工伤事故,劳动者能否要求用人单位支付工伤待遇又同时要求第三方支付人身伤害赔偿
  ?
7.用人单位能否以商业保险理赔款替代职工工伤赔偿待遇?
8.发生工伤事故,双方私下和解,补偿协议该如何签订才有效?

专题七:劳务派遣
1.劳务派遣用工模式,有何利弊,利大还是弊大?
2.劳务派遣合作协议必须注意的风险细节有哪些?
3.新法下劳务派遣面临的主要风险有哪些?
4.派遣工"第三签"时,能否要求签订无固定期限劳动合同?
5.哪些岗位可以使用派遣工,辅助性、临时性、替代性如何理解与操作?
6.新规定对于同工同酬提出哪些新要求,如何规避同工同酬风险?
7.采用劳务派遣用工方式,能否异地参保?
8.用工单位如何行使对派遣员工的退还或退换权?
9.如何处理违反用工单位规章制度的派遣员工?
10.怎样规定派遣员工的辞职程序和离职责任?
11.部分劳务公司很可能面临关闭停业,原来的派遣工的劳动关系如何处理?
12.业务外包与劳务派遣的本质区别有哪些?
13.如何筛选承包方,需考察哪些细节要点?
14.用工单位如何应对派遣合作争议和劳动争议?

[FreeBSD-Announce] FreeBSD Errata Notice FreeBSD-EN-15:09.xlocale

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

=============================================================================
FreeBSD-EN-15:09.xlocale Errata Notice
The FreeBSD Project

Topic: Inconsistency between locale and rune locale states

Category: core
Module: libc
Announced: 2015-06-30
Credits: David Chisnall
Affects: FreeBSD 9.x and FreeBSD 10.x.
Corrected: 2015-06-17 19:12:18 UTC (stable/10, 10.1-STABLE)
2015-06-30 23:21:37 UTC (releng/10.1, 10.1-RELEASE-p14)
2015-06-17 19:13:13 UTC (stable/9, 9.3-STABLE)
2015-06-30 23:21:48 UTC (releng/9.3, 9.3-RELEASE-p18)

For general information regarding FreeBSD Errata Notices and Security
Advisories, including descriptions of the fields above, security
branches, and the following sections, please visit
<URL:https://security.freebsd.org/>.

I. Background

Recent FreeBSD releases have support to thread-safe and extended locale API,
modeled after the Darwin xlocale(3) API.

The C standard locale API was reimplemented as a wrapper of the xlocale(3)
API with a global locale in order to support its semantics.

II. Problem Description

The locale and rune locale may become out of sync, in which case calls of
mb* and similar functions would be supplied with wrong data.

III. Impact

Applications that uses xlocale but does not call setlocale(3) would crash.

IV. Workaround

No workaround is available.

V. Solution

Perform one of the following:

1) Upgrade your system to a supported FreeBSD stable or release / security
branch (releng) dated after the correction date.

2) To update your present system via a binary patch:

Systems running a RELEASE version of FreeBSD on the i386 or amd64
platforms can be updated via the freebsd-update(8) utility:

# freebsd-update fetch
# freebsd-update install

3) To update your present system via a source code patch:

The following patches have been verified to apply to the applicable
FreeBSD release branches.

a) Download the relevant patch from the location below, and verify the
detached PGP signature using your PGP utility.

# fetch https://security.FreeBSD.org/patches/EN-15:09/xlocale.patch
# fetch https://security.FreeBSD.org/patches/EN-15:09/xlocale.patch.asc
# gpg --verify xlocale.patch.asc

b) Apply the patch. Execute the following commands as root:

# cd /usr/src
# patch < /path/to/patch

c) Recompile the operating system using buildworld and installworld as
described in <URL:https://www.FreeBSD.org/handbook/makeworld.html>.

Restart all deamons using the library, or reboot the system.

VI. Correction details

The following list contains the correction revision numbers for each
affected branch.

Branch/path Revision
- -------------------------------------------------------------------------
stable/9/ r284525
releng/9.3/ r284986
stable/10/ r284524
releng/10.1/ r284985
- -------------------------------------------------------------------------

To see which files were modified by a particular revision, run the
following command, replacing NNNNNN with the revision number, on a
machine with Subversion installed:

# svn diff -cNNNNNN --summarize svn://svn.freebsd.org/base

Or visit the following URL, replacing NNNNNN with the revision number:

<URL:https://svnweb.freebsd.org/base?view=revision&revision=NNNNNN>

VII. References

<URL:https://bugs.freebsd.org/188036>

The latest revision of this Errata Notice is available at
https://security.FreeBSD.org/advisories/FreeBSD-EN-15:09.locale.asc

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v2.1.5 (FreeBSD)
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=Wfyl
-----END PGP SIGNATURE-----
_______________________________________________
freebsd-announce@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-announce
To unsubscribe, send any mail to "freebsd-announce-unsubscribe@freebsd.org"

[FreeBSD-Announce] FreeBSD Errata Notice FreeBSD-EN-15:10.iconv

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

=============================================================================
FreeBSD-EN-15:10.iconv Errata Notice
The FreeBSD Project

Topic: Improved iconv(3) UTF-7 support

Category: core
Module: libc/iconv
Announced: 2015-06-30
Credits: Tijl Coosemans
Affects: FreeBSD 10.x
Corrected: 2015-06-02 09:42:00 UTC (stable/10, 10.1-STABLE)
2015-06-30 23:21:37 UTC (releng/10.1, 10.1-RELEASE-p14)

For general information regarding FreeBSD Errata Notices and Security
Advisories, including descriptions of the fields above, security
branches, and the following sections, please visit
<URL:https://security.freebsd.org/>.

I. Background

The iconv(3) API allows converting text data from one character set
encoding to another. Applications first open a converter between two
encodings using iconv_open(3) and then convert text using iconv(3).

UTF-7 is a variable-length character encoding representing Unicode text
using a stream of ASCII characters.

II. Problem Description

A defect in the iconv(3) UTF-7 decoding process causes the end of base64
symbols ("-") to be treated as an incomplete character when they exist
at the end of the string.

III. Impact

Applications that use iconv(3) to decode UTF-7 may receive an incorrect
encoded result.

IV. Workaround

No workaround is available.

V. Solution

Perform one of the following:

1) Upgrade your system to a supported FreeBSD stable or release / security
branch (releng) dated after the correction date.

2) To update your present system via a binary patch:

Systems running a RELEASE version of FreeBSD on the i386 or amd64
platforms can be updated via the freebsd-update(8) utility:

# freebsd-update fetch
# freebsd-update install

3) To update your present system via a source code patch:

The following patches have been verified to apply to the applicable
FreeBSD release branches.

a) Download the relevant patch from the location below, and verify the
detached PGP signature using your PGP utility.

# fetch https://security.FreeBSD.org/patches/EN-15:10/iconv.patch
# fetch https://security.FreeBSD.org/patches/EN-15:10/iconv.patch.asc
# gpg --verify iconv.patch.asc

b) Apply the patch. Execute the following commands as root:

# cd /usr/src
# patch < /path/to/patch

c) Recompile the operating system using buildworld and installworld as
described in <URL:https://www.FreeBSD.org/handbook/makeworld.html>.

Restart all deamons using the library, or reboot the system.

VI. Correction details

The following list contains the correction revision numbers for each
affected branch.

Branch/path Revision
- -------------------------------------------------------------------------
stable/10/ r283908
releng/10.1/ r284985
- -------------------------------------------------------------------------

To see which files were modified by a particular revision, run the
following command, replacing NNNNNN with the revision number, on a
machine with Subversion installed:

# svn diff -cNNNNNN --summarize svn://svn.freebsd.org/base

Or visit the following URL, replacing NNNNNN with the revision number:

<URL:https://svnweb.freebsd.org/base?view=revision&revision=NNNNNN>

VII. References

<URL:https://bugs.freebsd.org/200398>

The latest revision of this Errata Notice is available at
https://security.FreeBSD.org/advisories/FreeBSD-EN-15:10.iconv.asc

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v2.1.5 (FreeBSD)
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=hK2X
-----END PGP SIGNATURE-----
_______________________________________________
freebsd-announce@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-announce
To unsubscribe, send any mail to "freebsd-announce-unsubscribe@freebsd.org"

[FreeBSD-Announce] FreeBSD Errata Notice FreeBSD-EN-15:08.sendmail

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

=============================================================================
FreeBSD-EN-15:08.sendmail Errata Notice
The FreeBSD Project

Topic: sendmail TLS/DH Interoperability Improvement

Category: contrib
Module: sendmail
Announced: 2015-06-18; Last revised on 2015-06-30.
Credits: Frank Seltzer, Gregory Shapiro
Affects: All supported versions of FreeBSD.
Corrected: 2015-06-25 01:49:44 UTC (stable/10, 10.1-STABLE)
2015-06-30 23:21:37 UTC (releng/10.1, 10.1-RELEASE-p14)
2015-06-25 01:53:45 UTC (stable/9, 9.3-STABLE)
2015-06-30 23:21:48 UTC (releng/9.3, 9.3-RELEASE-p18)
2015-06-25 01:56:36 UTC (stable/8, 8.4-STABLE)
2015-06-30 23:21:59 UTC (releng/8.4, 8.4-RELEASE-p32)

For general information regarding FreeBSD Errata Notices and Security
Advisories, including descriptions of the fields above, security
branches, and the following sections, please visit
<URL:https://security.freebsd.org/>.

0. Revision history

v1.0 2015-06-18 Initial release.
v1.1 2015-06-30 Revised patch for non-existent DH parameter file.

I. Background

Sendmail supports STARTTLS encrypted connections using DHE_EXPORT
ciphers. As part of that support, by default, Sendmail employs 1024-bit
DH parameters for server connections but 512-bit DH parameters if
configured to use a DH parameter file that does not exist.

II. Problem Description

In response to CVE-2015-4000 ("Logjam TLS vulnerability"), OpenSSL and
other encryption packages have begun rejecting 512-bit and lower DH
parameters during negotiation, thereby reducing interoperability.

III. Impact

In its default FreeBSD configuration, client connections from Sendmail
to other SMTP servers will not be able to negotiate a STARTTLS encrypted
session with SMTP servers that reject 512-bit DH parameters. This may
cause mail deliverability issues for outbound mail.

IV. Workaround

Systems that do not use Sendmail are not affected.

To work around this interoperability, Sendmail can be configured to use
a 1024 or 2048 bit DH parameter using these steps:

1. Edit /etc/mail/`hostname`.mc
2. If a setting for confDH_PARAMETERS does not exist or
exists and is set to a string beginning with '5',
replace it with '1' for 1024-bit or '2' for 2048-bit.
3. If a setting for confDH_PARAMETERS exists and is set to
a file path, create a new file with:
openssl dhparam -out /path/to/file 2048
for 2048-bit or:
openssl dhparam -out /path/to/file 1024
for 1024-bit.

4. Rebuild the .cf file:
cd /etc/mail/; make; make install
5. Restart sendmail:
cd /etc/mail/; make restart

V. Solution

A change to the raise the default for Sendmail connections to use
1024-bit DH parameters if the configured DH parameters file does not
exist has been committed.

Perform one of the following:

1) Upgrade your system to a supported FreeBSD stable or release / security
branch (releng) dated after the correction date.

2) To update your present system via a binary patch:

Systems running a RELEASE version of FreeBSD on the i386 or amd64
platforms can be updated via the freebsd-update(8) utility:

# freebsd-update fetch
# freebsd-update install

3) To update your present system via a source code patch:

The following patches have been verified to apply to the applicable
FreeBSD release branches.

a) Download the relevant patch from the location below, and verify the
detached PGP signature using your PGP utility.

# fetch https://security.FreeBSD.org/patches/EN-15:08/sendmail.patch
# fetch https://security.FreeBSD.org/patches/EN-15:08/sendmail.patch.asc
# gpg --verify sendmail.patch.asc

# fetch https://security.FreeBSD.org/patches/EN-15:08/sendmail-01.patch
# fetch https://security.FreeBSD.org/patches/EN-15:08/sendmail-01.patch.asc
# gpg --verify sendmail.patch.asc

b) Apply the patch. Execute the following commands as root:

# cd /usr/src
# patch < /path/to/patch

c) Recompile the operating system using buildworld and installworld as
described in <URL:https://www.FreeBSD.org/handbook/makeworld.html>.

Restart the Sendmail daemon(s), or reboot the system.

VI. Correction details

The following list contains the correction revision numbers for each
affected branch.

Branch/path Revision
- -------------------------------------------------------------------------
stable/8/ r284790
releng/8.4/ r284987
stable/9/ r284788
releng/9.3/ r284986
stable/10/ r284786
releng/10.1/ r284985
- -------------------------------------------------------------------------

To see which files were modified by a particular revision, run the
following command, replacing NNNNNN with the revision number, on a
machine with Subversion installed:

# svn diff -cNNNNNN --summarize svn://svn.freebsd.org/base

Or visit the following URL, replacing NNNNNN with the revision number:

<URL:https://svnweb.freebsd.org/base?view=revision&revision=NNNNNN>

VII. References

The latest revision of this Errata Notice is available at
https://security.FreeBSD.org/advisories/FreeBSD-EN-15:08.sendmail.asc
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v2.1.5 (FreeBSD)
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=ibhZ
-----END PGP SIGNATURE-----
_______________________________________________
freebsd-announce@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-announce
To unsubscribe, send any mail to "freebsd-announce-unsubscribe@freebsd.org"

[USN-2652-1] Oxide vulnerabilities

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1

iQEcBAEBAgAGBQJVkn3lAAoJEGEfvezVlG4Pz08H/0EBWXJw9laW2UVNeD4Y8dij
dPeaZmH2GH5Vpst0aU7qPSHH1LTq9T/62EwLp1EokR24aGAnFFBEfD2dgC5ho6SU
9vS2Xfgtu8krbf72LmXu7y7a2zvlblVgYyhFaRzjaE9ojbthDj/6OH/gILNoB4Bn
9LDydYUiGc6tRtFyxKq1lrAeqohMFA9qIMLup1H5kL4536FSD7d6s7KwxvDXErTY
WAWy94uJXhFouH/eVeY8ats7BtC/DtaLS53jNRiI/tz6LDoQYyqFAAyDiIrct57n
M+iF7cr0+9nnaN79Cyo6xmorTZr9l/JwWj/jY1Ebe/HRItiBE67YbQi9i8LqN2k=
=62L4
-----END PGP SIGNATURE-----
==========================================================================
Ubuntu Security Notice USN-2652-1
June 30, 2015

oxide-qt vulnerabilities
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 15.04
- Ubuntu 14.10
- Ubuntu 14.04 LTS

Summary:

Several security issues were fixed in Oxide.

Software Description:
- oxide-qt: Web browser engine library for Qt (QML plugin)

Details:

It was discovered that Chromium did not properly consider the scheme when
determining whether a URL is associated with a WebUI SiteInstance. If a
user were tricked in to opening a specially crafted website, an attacker
could potentially exploit this to bypass security restrictions.
(CVE-2015-1266)

It was discovered that Blink did not properly restrict the creation
context during creation of a DOM wrapper. If a user were tricked in to
opening a specially crafted website, an attacker could potentially exploit
this to bypass same-origin restrictions. (CVE-2015-1267, CVE-2015-1268)

It was discovered that Chromium did not properly canonicalize DNS hostnames
before comparing to HSTS or HPKP preload entries. An attacker could
potentially exploit this to bypass intended access restrictions.
(CVE-2015-1269)

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 15.04:
liboxideqtcore0 1.7.9-0ubuntu0.15.04.1

Ubuntu 14.10:
liboxideqtcore0 1.7.9-0ubuntu0.14.10.1

Ubuntu 14.04 LTS:
liboxideqtcore0 1.7.9-0ubuntu0.14.04.1

In general, a standard system update will make all the necessary changes.

References:
http://www.ubuntu.com/usn/usn-2652-1
CVE-2015-1266, CVE-2015-1267, CVE-2015-1268, CVE-2015-1269

Package Information:
https://launchpad.net/ubuntu/+source/oxide-qt/1.7.9-0ubuntu0.15.04.1
https://launchpad.net/ubuntu/+source/oxide-qt/1.7.9-0ubuntu0.14.10.1
https://launchpad.net/ubuntu/+source/oxide-qt/1.7.9-0ubuntu0.14.04.1

reallost1.fbsd2233449 您 好

附件中《企业股权激励实战——留驻、吸引和激励核心人才》

希望难呢过对贵公司的发展壮大有所帮助

感谢您对我们工作的支持和理解

祝您生活愉快,事业腾飞

8tfyn

Monday, June 29, 2015

[announce] NYC*BUG July 1: Precision Time Protocol

July 1, Wednesday
Staying in sync with the Precision Time Protocol, Steven Kreuzer
18:45, Stone Creek Bar & Lounge: 140 E 27th St

Abstract

Getting clocks to agree on the time is tricky. Getting them to agree on
the time better than 100 nanoseconds is even trickier.

In this talk I will provide an introduction to the basic principles of
the Precision Time Protocol (PTP) and how it can be used to precisely
synchronize computers over a LAN.

Speaker Bio

Battling to keep unreliable clocks in sync, Steven is a system
administrator who has gained an appreciation for the art and science of
timekeeping. He lives in Queens, NY with his wife and dog.

_______________________________________________
announce mailing list
announce@lists.nycbug.org
http://lists.nycbug.org/mailman/listinfo/announce

[announce] NYC*BUG July 1: Precision Time Protocol

July 1, Wednesday
Staying in sync with the Precision Time Protocol, Steven Kreuzer
18:45, Stone Creek Bar & Lounge: 140 E 27th St

Abstract

Getting clocks to agree on the time is tricky. Getting them to agree on
the time better than 100 nanoseconds is even trickier.

In this talk I will provide an introduction to the basic principles of
the Precision Time Protocol (PTP) and how it can be used to precisely
synchronize computers over a LAN.

Speaker Bio

Battling to keep unreliable clocks in sync, Steven is a system
administrator who has gained an appreciation for the art and science of
timekeeping. He lives in Queens, NY with his wife and dog.

_______________________________________________
announce mailing list
announce@lists.nycbug.org
http://lists.nycbug.org/mailman/listinfo/announce

[FreeBSD-Announce] FreeBSD 8.4 EoL extension

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

Dear FreeBSD community,

After the recent reminder about the upcoming EoL for FreeBSD 8.4, several
issues have come to our attention related to earlier security advisories,
most notably users have reported a regression with sendmail.

We have decided to postpone the EoL date for 8.4 and 8-STABLE to August 1,
2015 to make sure that all known issues have been addressed.

Because this extension is small, freebsd-update(8) will continue to warn about
the approaching EoL for 8.4, and there is no plan to postpone its EoL further.
Existing users of FreeBSD 8.4 or 8-STABLE are advised to upgrade to a newer
release promptly.

The currently supported branches and releases and their expected
end-of-life dates are:

+----------------------------------------------------------------------------+
| Branch | Release | Type | Release Date | Estimated EoL |
+-----------+------------+--------+------------------+-----------------------+
|stable/8 |n/a |n/a |n/a |August 1, 2015 |
+-----------+------------+--------+------------------+-----------------------+
|releng/8.4 |8.4-RELEASE |Extended|June 9, 2013 |August 1, 2015 |
+-----------+------------+--------+------------------+-----------------------+
|stable/9 |n/a |n/a |n/a |last release + 2 years |
+-----------+------------+--------+------------------+-----------------------+
|releng/9.3 |9.3-RELEASE |Extended|July 16, 2014 |December 31, 2016 |
+-----------+------------+--------+------------------+-----------------------+
|stable/10 |n/a |n/a |n/a |last release + 2 years |
+-----------+------------+--------+------------------+-----------------------+
|releng/10.1|10.1-RELEASE|Extended|November 14, 2014 |December 31, 2016 |
+----------------------------------------------------------------------------+

- --
Xin Li
Security Officer of the FreeBSD Project
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v2.1.5 (FreeBSD)
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=zoTs
-----END PGP SIGNATURE-----
_______________________________________________
freebsd-announce@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-announce
To unsubscribe, send any mail to "freebsd-announce-unsubscribe@freebsd.org"

reallost1.fbsd2233449 管理的目的是什么?


                    新任经理、部门经理全面管理技能提升训练

【时间地点】 2015年07月04-05深圳、07月25-26上海、08月08-09北京


【参加对象】 新上任主管、经理,储备人员,部门经理/主管,职能经理,技术经理,企业中高层...


【学习费用】 3200   /人, (含课程讲义、午餐、茶点等)



垂·询·热·线:北京:010-5129-9910,深圳:0755-6128-0006  ,上海:021-3100-6787


在·线·QQ:320588808        189-189-58501    许先生


注:如不需此类信件信息,请转发送"删除"至wytuixin@163.com,我们会及时处理,谢谢您的理解。

课程背景:
  企业的发展壮大,需要管理干部的快速成长;面对越来越激烈的市场竞争,需要管理干部的管理水平快上台阶。许多企业的中层管理干部,尤其是新任的主管经理,从专业岗位转换为主管经理后,对管理工作及管理角色的认识不到位,管理工作片面而被动,没有真正把管理的责任担当起来。有些中层管理干部虽然具有管理意识,但缺思路,缺方法,缺动作,管事带人效果不佳,事情没做好,人员没留住,团队不成型,积极性不高,凝聚力不够,归属感不强,干部自身忙而累,累而烦,久而久之麻木倦怠! 
  新任经理全面管理技能提升训练培训帮助新任经理、主管等企业管理干部,系统理解管理的逻辑性,站在整体角度,把握管理角色,理解人事管理的相辅相成,分析问题,梳理思路,探讨方法,演练工具,帮助缩短中层干部的成长周期,减少管理失误,提高管理效率,以适应市场竞争形势和企业的快速发展!

培训收益:
1、建立对管理的整体和系统思维,理解从问题,思路,系统,方法,到动作的管理线索
2、理解中层管理者在企业里应承担的责任,角色身份,应表现出的态度和意识
3、掌握把工作管好的方法和技巧 – 计划,组织,控制,创新
4、掌握带人带团队的方法 – 培养训练,沟通互动,团队氛围营造,激励设计
5、促进自我提升 – 有效管理时间,职业认识,个人修炼

讲师介绍:【曹礼明】
强调落地的动作化训练导师!
中山大学MBA,中国首批PMP认证资格人员,知名企业管理培训导师。
  20多年的企业工作与管理实践经验,先后在国企、合资、外资、民企担任研发经理、部门经理、人力资源总监、生产及运营总监、常务副总等职。
  从事企业管理咨询顾问5年,帮助企业进行管 理变革和管理干部队伍训练。曹老师融合中西方管理理念和方法,擅长将西方管理理论与中国企业实际相结合,以结果和管理有效性为导向,注重方法、策略、措施与实际情况相结合,追求对企业产生实际效果。
  曹礼明老师认为企业管理干部管理知识和思维固然重要,如果不能落地,不能应用在工作中解决问题,那么价值有限,事倍功半!
  企业要解决管理上的"最后一公里"问题,必须在如何落地,如何做管理动作上下工夫!曹老师的训练强调找问题,做动作,追求学用结合!
  曹礼明老师在企业执行力提升,中高层领导力,团队打造,团队文化建设,干部管理技能训练等方面有丰富经验。他曾主持了多家企业的管理咨询辅导,使企业从管理混乱失控、业绩停滞不前、人员自由涣散的状态,逐步改变成制度规范、流程控制有效、企业业绩显著提升、企业凝聚力增强的崭新企业。
  曹礼明老师自从事企业管理培训以来,内外训课程数百场,受训人数上万人,其中《新任经理全面管理技能提升训练》公开课二百余期,《MTP中层管理训练》内 训上百期,内训结合企业实际情况和解决学员问题而深受好评。

老师特点:
强调务实,不夸大,不作秀,不刻意宣传。
讲求实战,实用,实效,注重动作化;
注重管理的整体性和逻辑性,提倡打组合拳。

课堂风格:
欢迎学员现场提问,带着问题来,带着答案走
问题导向,引导启发思考和解决问题
演讲,互动,问题讨论,现场演练,案例分享相结合

主要课程:
《新任经理全面管理技能提升训练》、《中层管 理MTP训练》、《中高层领导力》、《中层执行力》、《中层选用育留》、《中层带团队》、《管理沟通与协调》、《中层核心工作能力提升》、《团队管理与人员激励》、《生产经理、主管实战管理技能提升训练》等课程。

课程大纲:
第一部分 自我管理
一、管理与角色认知
从专业走向管理后,如何实现角色转换?
管理的目的是什么?
中基层管理者,要承担哪些管理责任?
中基层管理者如何确立自己对上,对下,对中的身份定位?
中层管理者如何避免角色行为误区?
【讨论互动】: 你是如何理解管理及角色的?
二、管理者工作方法
时间管理与工作统筹
时间分析:我的时间用的有效吗?
时间管理的四个象限
四个象限的策略和目标
管理者如何识别轻重缓急?
好钢用在刀刃上 – 如何抓住工作的重中之重?
管理者如何做好工作统筹?
其他常用工作方法
结构分解法
项目管理法
目标管理法
PDCA
5W3H
SMART

第二部分 工作管理
一、工作管理 – 工作计划
计划为何重要?
制定计划的步骤
如何做工作分解?
工作评估与安排
【工具演练】:用WBS工具做工作策划与分解
【工具模板】:WBS参考模板
二、工作管理 – 工作组织
什么是工作组织?组织的目的是什么?
企业组织设计
企业工作组织
企业工作组织中的问题
工作组织原则
三、工作管理 – 执行控制
企业执行力差的管理因素
【讨论互动】:执行不力的管理因素
工作执行控制的策略
工作控制方法与工具
分段控制法
三要素控制法
稽核控制法
【工具演练】:控制卡设计练习
【参考工具】:三要素控制卡
【案例分析】: 三要素控制卡工具的应用
【案例分析】: 分段控制法应用
【案例分析】:稽核控制法应用
目标管理与绩效考核法
什么是目标管理?
目标来自哪里?
结果可衡量性?
考核规则?
目标共识性?
绩效考核的关键问题
数据的真实准确性?
考核与面谈注意事项
奖惩合理性
四、工作管理 – 工作改善
改进,变革与创新意识
建立创新机制

第三部分 人员与团队管理
一、沟通技能
对上沟通
了解上司
接受命令,请示建议,汇报工作
如何配合上司?
平行沟通协调
案例分析:工作协作协调中的首要问题是什么?
平级关系沟通中应切记的三条原则
如何应对办公室政治?
沟通方法技巧
沟通如何准备?
倾听的技巧
表达的技巧
赞美的技巧
二、团队管理 – 领导力发挥
什么是领导力?
领导与管理的区别
领导力来源于什么?
管理者如何提升领导力素质,发挥领导作用?
什么样的品质更受下属敬重?
什么样的行为要以身作则?
哪些能力必须修炼?
心智修炼
三、团队管理 – 员工管理
员工管理策略
打破盲人摸象式的员工管理思维!
管不住事能管好人吗?
如何应用原则性与灵活性结合?
推拉帮管组合拳
什么是德主刑辅的管理思维?
员工管理案例分析讨论:
新任主管的挑战?
个性专家员工?
老油条,有后台?
如何处理法不责众?
在下属面前没有威信怎么办?
四、团队管理 – 员工培育
1、抓思想
如何使员工认同企业?
工作中的意识问题?
引导员工的职业观,企业观,人生价值观?
调整员工心态与情绪?
2、带作风
如何带出一支雷厉风行,敢打硬仗的队伍?
如何训练良好的行为习惯?
3、提升能力
如何帮助员工建立职业理想?
管不住事能管好人吗?
如何让员工在工作中成长?
【案例分析】:华为,海尔的晋升通道与任职资格体系
【模板参考】:岗位能力分析
五、团队管理 -- 团队环境建设
1、团队环境建设与团队文化建设
2、环境对人的影响
3、优秀团队的环境特征
4、如何塑造团队环境?
价值观宣传
领导骨干的作用
制度与平台
环境建设的管理策略
六、员工管理 – 员工激励
马斯洛需求层次理论在员工需求中的体现?
如何把握员工需求?
激励员工的方法措施
物质激励是基础 – 公正评价,合理报酬,帮助员工增加收入!
让员工成长 – 个性化的培养
放大感受价值 – 关注感受与感情!
【案例分析】:企业员工激励方案和措施若干
如何激发员工 – 激励员工的12剧场
【模板工具】:12剧场激励设计方法

[USN-2657-1] unattended-upgrades vulnerability

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
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=w1Ik
-----END PGP SIGNATURE-----
==========================================================================
Ubuntu Security Notice USN-2657-1
June 29, 2015

unattended-upgrades vulnerability
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 15.04
- Ubuntu 14.10
- Ubuntu 14.04 LTS
- Ubuntu 12.04 LTS

Summary:

An attacker could trick unattended-upgrades into installing altered
packages.

Software Description:
- unattended-upgrades: automatic installation of security upgrades

Details:

It was discovered that unattended-upgrades incorrectly performed
authentication checks in certain configurations. If a remote attacker were
able to perform a man-in-the-middle attack, this flaw could potentially be
used to install altered packages.

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 15.04:
unattended-upgrades 0.83.6ubuntu1

Ubuntu 14.10:
unattended-upgrades 0.82.8ubuntu0.3

Ubuntu 14.04 LTS:
unattended-upgrades 0.82.1ubuntu2.3

Ubuntu 12.04 LTS:
unattended-upgrades 0.76ubuntu1.1

In general, a standard system update will make all the necessary changes.

References:
http://www.ubuntu.com/usn/usn-2657-1
CVE-2015-1330

Package Information:
https://launchpad.net/ubuntu/+source/unattended-upgrades/0.83.6ubuntu1
https://launchpad.net/ubuntu/+source/unattended-upgrades/0.82.8ubuntu0.3
https://launchpad.net/ubuntu/+source/unattended-upgrades/0.82.1ubuntu2.3
https://launchpad.net/ubuntu/+source/unattended-upgrades/0.76ubuntu1.1

[CentOS-announce] CESA-2015:1194 Moderate CentOS 7 postgresql Security Update

CentOS Errata and Security Advisory 2015:1194 Moderate

Upstream details at : https://rhn.redhat.com/errata/RHSA-2015-1194.html

The following updated files have been uploaded and are currently
syncing to the mirrors: ( sha256sum Filename )

x86_64:
68f75a380fb35cbf47d27a27884116cea350e1d8fbf2f566bebb8b58d34bf4a1 postgresql-9.2.13-1.el7_1.i686.rpm
9e301e4212c06695f095b2bee281baf3435608cd63ad70be94e181de341d81c5 postgresql-9.2.13-1.el7_1.x86_64.rpm
981c31541f67bd4b110df1371f9ca313698a97810c38274b0f924459079e7e39 postgresql-contrib-9.2.13-1.el7_1.x86_64.rpm
d9e577eb24b8d45803e7c33b320f0880879444c057928dc04a091c4af1cda292 postgresql-devel-9.2.13-1.el7_1.i686.rpm
c6dc3e9f24d0b3fb1405506854e7815bd72c9b49c0e5df8498ce558c0001efc8 postgresql-devel-9.2.13-1.el7_1.x86_64.rpm
7995e777b8133a67d72a1b225560ce0f63d41bc064a469dce6b455dbe1a308c6 postgresql-docs-9.2.13-1.el7_1.x86_64.rpm
371b3f5c4adb28366fcce85191dc70455ec7383c1097b0202c4e761743dbea0e postgresql-libs-9.2.13-1.el7_1.i686.rpm
eabcc29979df894bc6196447e440e11a5d85f0bac616e1250b6f8930ebc74300 postgresql-libs-9.2.13-1.el7_1.x86_64.rpm
f539cb95191a69dd107feaa183ff31cc5f4159b8bad0262fd5449187716f63b7 postgresql-plperl-9.2.13-1.el7_1.x86_64.rpm
7373870c1833da0ca1671ed0cd7c311175967d397b59c2c1ba20ad8e39b9c6ec postgresql-plpython-9.2.13-1.el7_1.x86_64.rpm
d036fc72f2c89a661c82cbab8023df4d16704f8a375ecec00cda512b0d2a930b postgresql-pltcl-9.2.13-1.el7_1.x86_64.rpm
392ca0e1accf6883e2b36f39cc9b203e991e48a340d8895b24f02118948c6cd0 postgresql-server-9.2.13-1.el7_1.x86_64.rpm
c698baa54a3062dfd6e860c138cf2eef4aa87eea1ea8cbe659f4fe816c9e0a27 postgresql-test-9.2.13-1.el7_1.x86_64.rpm
b4d4f0ac450076857682566e4b19dbb0a5362052de181854e13a3d9ad5a59e9f postgresql-upgrade-9.2.13-1.el7_1.x86_64.rpm

Source:
efa4a7c335d023956ac1d6adfd067921c46ea7bb6aecc15fe04634590f38ef28 postgresql-9.2.13-1.el7_1.src.rpm



--
Johnny Hughes
CentOS Project { http://www.centos.org/ }
irc: hughesjr, #centos@irc.freenode.net

_______________________________________________
CentOS-announce mailing list
CentOS-announce@centos.org
http://lists.centos.org/mailman/listinfo/centos-announce

[CentOS-announce] CESA-2015:1193 Moderate CentOS 7 xerces-c Security Update

CentOS Errata and Security Advisory 2015:1193 Moderate

Upstream details at : https://rhn.redhat.com/errata/RHSA-2015-1193.html

The following updated files have been uploaded and are currently
syncing to the mirrors: ( sha256sum Filename )

x86_64:
afe38236b7958205c190007679893aa52681defb42cec67e07a40222c0344ffd xerces-c-3.1.1-7.el7_1.i686.rpm
2978ee1ec27642b6233228ba6bb21dff81609aeded24f66ab348a5d2caf2bfb0 xerces-c-3.1.1-7.el7_1.x86_64.rpm
cb5dfd0d635477caeab441417dc1310301661a5b366d845c060104824221f4a8 xerces-c-devel-3.1.1-7.el7_1.i686.rpm
48d763429c615c60c5153aa8b1e22149f056948f99cd5291dcbadc602fe34c7e xerces-c-devel-3.1.1-7.el7_1.x86_64.rpm
db2116d626c0c82271a06e14ec8b067fdba3f12594d5d543092f7908e386b800 xerces-c-doc-3.1.1-7.el7_1.noarch.rpm

Source:
69ab23c4a875ed4cd10a77b8e310032108569d047d6f323e7573ad146e8798c1 xerces-c-3.1.1-7.el7_1.src.rpm



--
Johnny Hughes
CentOS Project { http://www.centos.org/ }
irc: hughesjr, #centos@irc.freenode.net

_______________________________________________
CentOS-announce mailing list
CentOS-announce@centos.org
http://lists.centos.org/mailman/listinfo/centos-announce

[CentOS-announce] CESA-2015:1194 Moderate CentOS 6 postgresql Security Update

CentOS Errata and Security Advisory 2015:1194 Moderate

Upstream details at : https://rhn.redhat.com/errata/RHSA-2015-1194.html

The following updated files have been uploaded and are currently
syncing to the mirrors: ( sha256sum Filename )

i386:
38011c1a69aac2d06e4309c0fa4cf17d8fa3f6393d9b99116365d277bf9df8a4 postgresql-8.4.20-3.el6_6.i686.rpm
75b8c97fbcc379ff002cc3ec6a9e65c3163966add47d9cc51a09ee8526ba31c7 postgresql-contrib-8.4.20-3.el6_6.i686.rpm
392b1251aab447568fbb76fd8c4997ff331246061db197b0cd13574a18cd4415 postgresql-devel-8.4.20-3.el6_6.i686.rpm
dea73d52e9d5185a49ab859220cdecca739c8c7d85f7a51fba49d6dd7bfaa012 postgresql-docs-8.4.20-3.el6_6.i686.rpm
292276c6e567d46ef194cdd9fff8cb0fb11b7e924d418ad75cc3be1555634aeb postgresql-libs-8.4.20-3.el6_6.i686.rpm
e570c1313bfe0e7502299d0af4696feb56f7d8847165896913e2baa3a198ea94 postgresql-plperl-8.4.20-3.el6_6.i686.rpm
ae287231ae774f9aba82085551e38447eb4a611e2af5cf16887d666de6de0581 postgresql-plpython-8.4.20-3.el6_6.i686.rpm
dd785db4e8c9f57a86907ac5abab40af293019afbfc731d9801083eaa3ad64ff postgresql-pltcl-8.4.20-3.el6_6.i686.rpm
110719e3176139a68fb8a6867b6183feee528b1a56fb45bc23ce8b4e5a3eb072 postgresql-server-8.4.20-3.el6_6.i686.rpm
d02ede44f9cbd547693b9de880f3aed6583f390c9f478a53df6e25430804dd47 postgresql-test-8.4.20-3.el6_6.i686.rpm

x86_64:
38011c1a69aac2d06e4309c0fa4cf17d8fa3f6393d9b99116365d277bf9df8a4 postgresql-8.4.20-3.el6_6.i686.rpm
449c2c72585adb94d9fbfcae049e2bcd3ef329b273c36e55c5a1f6a9f3da1e94 postgresql-8.4.20-3.el6_6.x86_64.rpm
19ee23df9fd054b6b748b6a91bd1d07a24e14e56eab91c8587e703daaea544ff postgresql-contrib-8.4.20-3.el6_6.x86_64.rpm
392b1251aab447568fbb76fd8c4997ff331246061db197b0cd13574a18cd4415 postgresql-devel-8.4.20-3.el6_6.i686.rpm
5afb7ab33f153c23ec0414273d02e1d0c801bd90878069dbd294873fbcbc5c16 postgresql-devel-8.4.20-3.el6_6.x86_64.rpm
fff82d8f6ed8594ab0a2ac856cf555175520f03eb02b1227fe46810cf68df140 postgresql-docs-8.4.20-3.el6_6.x86_64.rpm
292276c6e567d46ef194cdd9fff8cb0fb11b7e924d418ad75cc3be1555634aeb postgresql-libs-8.4.20-3.el6_6.i686.rpm
79cbf9ab217cfbea6ac19785803e9ef5ed6e8f47a07f8c058ba7da2ae1713913 postgresql-libs-8.4.20-3.el6_6.x86_64.rpm
49b8fc43b5b0fb238135aa8c70dfddd6f8ef712b8e5051ae64543493ef3bf17b postgresql-plperl-8.4.20-3.el6_6.x86_64.rpm
e3f840e38086a8df5bc209d997a4d45325abf357e35f5430ccfe48b1087e6522 postgresql-plpython-8.4.20-3.el6_6.x86_64.rpm
6b582939ebfd4f1ae95aa793356a1bfa55bd3fbc4173d8e272b1cb17d1238d20 postgresql-pltcl-8.4.20-3.el6_6.x86_64.rpm
814b84b3007ffcfe92f5f94903d04b185fb5ae263a9f9ec566397715711c737e postgresql-server-8.4.20-3.el6_6.x86_64.rpm
e048ea27aa7f338a14c2dfdb7294f41d7dfe816124bae17916b4d59bd5128122 postgresql-test-8.4.20-3.el6_6.x86_64.rpm

Source:
75d6b751e43de5008752eb631fb44aeedcec26f8acc61783cefd033451f489c7 postgresql-8.4.20-3.el6_6.src.rpm



--
Johnny Hughes
CentOS Project { http://www.centos.org/ }
irc: hughesjr, #centos@irc.freenode.net

_______________________________________________
CentOS-announce mailing list
CentOS-announce@centos.org
http://lists.centos.org/mailman/listinfo/centos-announce

[CentOS-announce] CEBA-2015:1192 CentOS 7 openssl BugFix Update

CentOS Errata and Bugfix Advisory 2015:1192

Upstream details at : https://rhn.redhat.com/errata/RHBA-2015-1192.html

The following updated files have been uploaded and are currently
syncing to the mirrors: ( sha256sum Filename )

x86_64:
e6c2ef7c0b89fcfacb8e64488d2802271ab082921512860385fb1c0aae46684a openssl-1.0.1e-42.el7.9.x86_64.rpm
b96a444096055df0ceec150eb107130a814060558ddaa4ecbec1abcfc0acc99e openssl-devel-1.0.1e-42.el7.9.i686.rpm
018b50c925ec2feba99dd5b06e651327da4258b7a0c0a4bb4e551c6f0710ceb0 openssl-devel-1.0.1e-42.el7.9.x86_64.rpm
7a2778580ee3d50584b8329e859d4be55d93ff749b088f50df2bb9a6879eb817 openssl-libs-1.0.1e-42.el7.9.i686.rpm
b4dcd15094fc1a2f4e9742169d66e5de06a6751de26f2baa13282cca64954e3d openssl-libs-1.0.1e-42.el7.9.x86_64.rpm
13600af8063a7f56cb8686a5261c1c8cf42335a2a5f41ada1038d3e55ef78b08 openssl-perl-1.0.1e-42.el7.9.x86_64.rpm
3c62e5f755a5db436f16c15af1236b8c80565b69b00d31f60bb4b686f36270c7 openssl-static-1.0.1e-42.el7.9.i686.rpm
0aae83ae75cbcb9bb61c5c85fe5a06b35a8fc96d5fd35ce2b845d647c243b160 openssl-static-1.0.1e-42.el7.9.x86_64.rpm

Source:
ad13e94dd6fb298aef32f250d95ea9f27a2de4a62d2f1e9f3e3ecc7c8e034c84 openssl-1.0.1e-42.el7.9.src.rpm



--
Johnny Hughes
CentOS Project { http://www.centos.org/ }
irc: hughesjr, #centos@irc.freenode.net

_______________________________________________
CentOS-announce mailing list
CentOS-announce@centos.org
http://lists.centos.org/mailman/listinfo/centos-announce

Env and Stacks Elections - June 2015 - Results

Greetings, all!

The elections for Env and Stacks - June 2015 have concluded, and the results
are shown below.

Env and Stacks is electing 5 seats this time.
A total of 71 ballots were cast, meaning a candidate
could accumulate up to 426 votes (71 * 6).

The results for the elections are as follows:

# votes | name
- --------+----------------------
307 | Honza Horak (hhorak)
262 | Nick Coghlan (ncoghlan)
219 | Václav Pavlín (vpavlin)
197 | Jens Petersen (petersen)
175 | Jan Kaluza (jkaluza)
- --------+----------------------
154 | Stuart Campbell (sic)


Congratulations to the winning candidates, and thank you all
candidates for running this elections!

--
Jan Kuřík
_______________________________________________
devel-announce mailing list
devel-announce@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel-announce

FESCO Elections - June 2015 - Results

Greetings, all!

The elections for FESCo - June 2015 have concluded, and the results
are shown below.

FESCo is electing 4 seats this time.
A total of 90 ballots were cast, meaning a candidate
could accumulate up to 540 votes (90 * 6).

The results for the elections are as follows:

# votes | name
- --------+----------------------
363 | Stephen Gallagher (sgallagh)
294 | Josh Boyer (jwboyer)
293 | Dennis Gilmore (ausil)
274 | Haïkel Guémar (hguemar)
- --------+----------------------
177 | Germano Massullo (germano)
159 | David King (amigadave)


Congratulations to the winning candidates, and thank you all
candidates for running this elections!

--
Jan Kuřík
_______________________________________________
devel-announce mailing list
devel-announce@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel-announce

Saturday, June 27, 2015

[CentOS-announce] CEBA-2015:1191 CentOS 5 irqbalance BugFix Update

CentOS Errata and Bugfix Advisory 2015:1191

Upstream details at : https://rhn.redhat.com/errata/RHBA-2015-1191.html

The following updated files have been uploaded and are currently
syncing to the mirrors: ( sha256sum Filename )

i386:
0ec224e1af235b81234eea49486b3cf28562457ce4c67ae3da06cdc7e5f4ba37 irqbalance-0.55-16.el5_11.i386.rpm

x86_64:
818235db375a8409016a5bf4a3c27765adbf4a44dfea7b9a0bbbc6c7c6a959ab irqbalance-0.55-16.el5_11.x86_64.rpm

Source:
b233e7b4dfe9720ddad886936804055e2c92ae57a5ee83ff3324eff85de0c719 irqbalance-0.55-16.el5_11.src.rpm



--
Johnny Hughes
CentOS Project { http://www.centos.org/ }
irc: hughesjr, #centos@irc.freenode.net

_______________________________________________
CentOS-announce mailing list
CentOS-announce@centos.org
http://lists.centos.org/mailman/listinfo/centos-announce

Friday, June 26, 2015

[announce] NYC*BUG Wed July 1: Precision Time Protocol with Steve K

July 1, Wednesday
Staying in sync with the Precision Time Protocol, Steven Kreuzer
18:45, Stone Creek Bar & Lounge: 140 E 27th St

Abstract

Getting clocks to agree on the time is tricky. Getting them to agree on
the time better than 100 nanoseconds is even trickier.

In this talk I will provide an introduction to the basic principles of
the Precision Time Protocol (PTP) and how it can be used to precisely
synchronize computers over a LAN.

Speaker Bio

Battling to keep unreliable clocks in sync, Steven is a system
administrator who has gained an appreciation for the art and science of
timekeeping. He lives in Queens, NY with his wife and dog.

_______________________________________________
announce mailing list
announce@lists.nycbug.org
http://lists.nycbug.org/mailman/listinfo/announce

F23 Self Contained Change: Astronomy Spin

= Proposed Self Contained Change: Astronomy Spin =
https://fedoraproject.org/wiki/Changes/Astronomy_Spin

Change owner(s): Christian Dersch <lupinix at mailbox dot org >

A Fedora Spin providing a complete toolchain for both amateur and professional astronomers.


== Detailed Description ==
In both amateur and professional astronomy and astrophysics Linux is a very popular operating system. More and more data analysis is performed using Python, especially the astropy project is a quite new effort providing a professional toolchain. The Astronomy Spin provides a complete scientific Python environment (2 and 3) as well as the AstrOmatic software. For observational astronomy, KStars provides a complete solution for astrophotography using the INDI library. In addition to an astronomical collection of packages the spin also adds a menu for astronomy to make work more comfortable.


== Scope ==
* Other developers: N/A (not a System Wide Change)
* Release engineering: Add spin to spin-kickstarts, ensure spin has been tested, and release with rest of spins
* Policies and guidelines: N/A (not a System Wide Change)
* Trademark approval: Requested
--
Jan Kuřík
_______________________________________________
devel-announce mailing list
devel-announce@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel-announce

[CentOS-announce] CESA-2015:1189 Important CentOS 5 kvm Security Update

CentOS Errata and Security Advisory 2015:1189 Important

Upstream details at : https://rhn.redhat.com/errata/RHSA-2015-1189.html

The following updated files have been uploaded and are currently
syncing to the mirrors: ( sha256sum Filename )


x86_64:
492ee4251b86edf043521fb03757643de2f25776eb6eab5745b53d1d2337be63 kmod-kvm-83-273.el5.centos.x86_64.rpm
4e43433ec3b141ff6d3eae3d2d4c2407ece9ce948439a4cdc87e651b26dd1e0c kmod-kvm-debug-83-273.el5.centos.x86_64.rpm
62f07523683d3bc7dd295bb39f079d9a08d4d4f4136d920a0b6baf026ca8d2ae kvm-83-273.el5.centos.x86_64.rpm
6a61830f8c07eaa0ce456660fd5bbe1f0d8a1ff791db0507b199e3cf70f3951f kvm-qemu-img-83-273.el5.centos.x86_64.rpm
83104ad3a7483c91c8cb0c09700c08bb5d3463fe20c455e367f17c2c49ce80d1 kvm-tools-83-273.el5.centos.x86_64.rpm

Source:
b83cedf1824e79195e22e88c431c8f87be9189e61d0dc67dc77eaff507a0a44c kvm-83-273.el5.centos.src.rpm



--
Johnny Hughes
CentOS Project { http://www.centos.org/ }
irc: hughesjr, #centos@irc.freenode.net

_______________________________________________
CentOS-announce mailing list
CentOS-announce@centos.org
http://lists.centos.org/mailman/listinfo/centos-announce

[opensuse-announce] Work begins on totally new openSUSE release

Hi all,
Please help us get the news about about the next openSUSE regular
release - http://bit.ly/1HjnkkB

Work begins on totally new openSUSE release

Roadmap questions answered

Deep thought and some additional core SUSE Linux Enterprise source code
have given The openSUSE Project a path forward for future releases.

The change is so phenomenal that the project is building a whole new
release.

Some people might be perplexed over the next regular release, but rather
than bikeshedding the name over the next few months, for the moment, we
will call it openSUSE: 42 after its project name in the Open Build
Service. And we are going to explain the roadmap for this regular release.

openSUSE 42 is scheduled to be released around SUSECon, which is in
Amsterdam this year from Nov. 2 – 6.

Unlike old releases, future releases of "42" are expected to align with
the releases of SLE service packs and major releases.

There are about 2,000 packages in openSUSE 42 right now, said Stephan
"Coolo" Kulow, release manager. Of course, many more are expected.

openSUSE 42 will be a long-term type release with enduring updates and
maintenance commitments by the community and SUSE.

Kulow said a milestone will be released soon.

"We have to come up with solutions as problems arise," Kulow said.

There is currently no plans for live CDs, but he said expect other media
formats to be added later.

--
Respectfully,
Douglas DeMaio
douglas.demaio@suse.com

"In any moment of decision, the best thing you can do is the right
thing, the next best thing is the wrong thing, and the worst thing you
can do is nothing."
- Theodore Roosevelt
--
To unsubscribe, e-mail: opensuse-announce+unsubscribe@opensuse.org
For additional commands, e-mail: opensuse-announce+help@opensuse.org

Thursday, June 25, 2015

Koschei - new Fedora infrastructure service

I'm glad to announce that as of yesterday Koschei production instance
has been moved Fedora infrastructure and now it can be considered as
officially-supported Fedora service.

Koschei is a continuous integration service for Fedora packages.
Koschei is aimed at helping Fedora developers by detecting problems as
soon as they appear in rawhide - it tries to detect package FTBFS in
rawhide by scratch-building them in Koji. More information can be
found at Fedora Wiki [1].

Interested parties can be automatically notified when Koschei detects
change in package FTBFS status. In order to subscribe to email or IRC
notifications you can follow instructions at [2].

At the time of writing, Koschei monitors about 20 % of all Fedora
packages, but anyone with FAS account can add packages they are
interested in. See [3] for details how to add packages to Koschei.

I would like to thank everybody who helped to make Koschei at Fedora
infrastructure possible, especially Kevin Fenzi, who sponsored Koschei
request for resources and assisted us with the migration.

[1] https://fedoraproject.org/wiki/Koschei
[2] https://fedoraproject.org/wiki/Koschei#Notifications
[3] https://fedoraproject.org/wiki/Koschei#Adding_packages

--
Mikolaj Izdebski

_______________________________________________
devel-announce mailing list
devel-announce@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel-announce

[USN-2655-1] Tomcat vulnerabilities

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
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=zFjm
-----END PGP SIGNATURE-----
==========================================================================
Ubuntu Security Notice USN-2655-1
June 25, 2015

tomcat6 vulnerabilities
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 12.04 LTS

Summary:

Several security issues were fixed in Tomcat.

Software Description:
- tomcat6: Servlet and JSP engine

Details:

It was discovered that Tomcat incorrectly handled data with malformed
chunked transfer coding. A remote attacker could possibly use this issue to
conduct HTTP request smuggling attacks, or cause Tomcat to consume
resources, resulting in a denial of service. (CVE-2014-0227)

It was discovered that Tomcat incorrectly handled HTTP responses occurring
before the entire request body was finished being read. A remote attacker
could possibly use this issue to cause memory consumption, resulting in a
denial of service. (CVE-2014-0230)

It was discovered that the Tomcat Expression Language (EL) implementation
incorrectly handled accessible interfaces implemented by inaccessible
classes. An attacker could possibly use this issue to bypass a
SecurityManager protection mechanism. (CVE-2014-7810)

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 12.04 LTS:
libtomcat6-java 6.0.35-1ubuntu3.6

In general, a standard system update will make all the necessary changes.

References:
http://www.ubuntu.com/usn/usn-2655-1
CVE-2014-0227, CVE-2014-0230, CVE-2014-7810

Package Information:
https://launchpad.net/ubuntu/+source/tomcat6/6.0.35-1ubuntu3.6

[USN-2654-1] Tomcat vulnerabilities

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
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=31aZ
-----END PGP SIGNATURE-----
==========================================================================
Ubuntu Security Notice USN-2654-1
June 25, 2015

tomcat7 vulnerabilities
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 15.04
- Ubuntu 14.10
- Ubuntu 14.04 LTS

Summary:

Several security issues were fixed in Tomcat.

Software Description:
- tomcat7: Servlet and JSP engine

Details:

It was discovered that the Tomcat XML parser incorrectly handled XML
External Entities (XXE). A remote attacker could possibly use this issue to
read arbitrary files. This issue only affected Ubuntu 14.04 LTS.
(CVE-2014-0119)

It was discovered that Tomcat incorrectly handled data with malformed
chunked transfer coding. A remote attacker could possibly use this issue to
conduct HTTP request smuggling attacks, or cause Tomcat to consume
resources, resulting in a denial of service. This issue only affected
Ubuntu 14.04 LTS. (CVE-2014-0227)

It was discovered that Tomcat incorrectly handled HTTP responses occurring
before the entire request body was finished being read. A remote attacker
could possibly use this issue to cause memory consumption, resulting in a
denial of service. This issue only affected Ubuntu 14.04 LTS.
(CVE-2014-0230)

It was discovered that the Tomcat Expression Language (EL) implementation
incorrectly handled accessible interfaces implemented by inaccessible
classes. An attacker could possibly use this issue to bypass a
SecurityManager protection mechanism. (CVE-2014-7810)

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 15.04:
libtomcat7-java 7.0.56-2ubuntu0.1

Ubuntu 14.10:
libtomcat7-java 7.0.55-1ubuntu0.2

Ubuntu 14.04 LTS:
libtomcat7-java 7.0.52-1ubuntu0.3

In general, a standard system update will make all the necessary changes.

References:
http://www.ubuntu.com/usn/usn-2654-1
CVE-2014-0119, CVE-2014-0227, CVE-2014-0230, CVE-2014-7810

Package Information:
https://launchpad.net/ubuntu/+source/tomcat7/7.0.56-2ubuntu0.1
https://launchpad.net/ubuntu/+source/tomcat7/7.0.55-1ubuntu0.2
https://launchpad.net/ubuntu/+source/tomcat7/7.0.52-1ubuntu0.3

[USN-2653-1] Python vulnerabilities

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
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=fS+y
-----END PGP SIGNATURE-----
==========================================================================
Ubuntu Security Notice USN-2653-1
June 25, 2015

python2.7, python3.2, python3.4 vulnerabilities
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 14.10
- Ubuntu 14.04 LTS
- Ubuntu 12.04 LTS

Summary:

Several security issues were fixed in Python.

Software Description:
- python2.7: An interactive high-level object-oriented language
- python3.4: An interactive high-level object-oriented language
- python3.2: An interactive high-level object-oriented language

Details:

It was discovered that multiple Python protocol libraries incorrectly
limited certain data when connecting to servers. A malicious ftp, http,
imap, nntp, pop or smtp server could use this issue to cause a denial of
service. (CVE-2013-1752)

It was discovered that the Python xmlrpc library did not limit unpacking
gzip-compressed HTTP bodies. A malicious server could use this issue to
cause a denial of service. (CVE-2013-1753)

It was discovered that the Python json module incorrectly handled a certain
argument. An attacker could possibly use this issue to read arbitrary
memory and expose sensitive information. This issue only affected Ubuntu
12.04 LTS and Ubuntu 14.04 LTS. (CVE-2014-4616)

It was discovered that the Python CGIHTTPServer incorrectly handled
URL-encoded path separators in URLs. A remote attacker could use this issue
to expose sensitive information, or possibly execute arbitrary code. This
issue only affected Ubuntu 12.04 LTS and Ubuntu 14.04 LTS. (CVE-2014-4650)

It was discovered that Python incorrectly handled sizes and offsets in
buffer functions. An attacker could possibly use this issue to read
arbitrary memory and obtain sensitive information. This issue only affected
Ubuntu 12.04 LTS and Ubuntu 14.04 LTS. (CVE-2014-7185)

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 14.10:
python2.7 2.7.8-10ubuntu1.1
python2.7-minimal 2.7.8-10ubuntu1.1
python3.4 3.4.2-1ubuntu0.1
python3.4-minimal 3.4.2-1ubuntu0.1

Ubuntu 14.04 LTS:
python2.7 2.7.6-8ubuntu0.2
python2.7-minimal 2.7.6-8ubuntu0.2
python3.4 3.4.0-2ubuntu1.1
python3.4-minimal 3.4.0-2ubuntu1.1

Ubuntu 12.04 LTS:
python2.7 2.7.3-0ubuntu3.8
python2.7-minimal 2.7.3-0ubuntu3.8
python3.2 3.2.3-0ubuntu3.7
python3.2-minimal 3.2.3-0ubuntu3.7

In general, a standard system update will make all the necessary changes.

References:
http://www.ubuntu.com/usn/usn-2653-1
CVE-2013-1752, CVE-2013-1753, CVE-2014-4616, CVE-2014-4650,
CVE-2014-7185

Package Information:
https://launchpad.net/ubuntu/+source/python2.7/2.7.8-10ubuntu1.1
https://launchpad.net/ubuntu/+source/python3.4/3.4.2-1ubuntu0.1
https://launchpad.net/ubuntu/+source/python2.7/2.7.6-8ubuntu0.2
https://launchpad.net/ubuntu/+source/python3.4/3.4.0-2ubuntu1.1
https://launchpad.net/ubuntu/+source/python2.7/2.7.3-0ubuntu3.8
https://launchpad.net/ubuntu/+source/python3.2/3.2.3-0ubuntu3.7

[CentOS-announce] CESA-2015:1185 Moderate CentOS 7 nss-util Security Update

CentOS Errata and Security Advisory 2015:1185 Moderate

Upstream details at : https://rhn.redhat.com/errata/RHSA-2015-1185.html

The following updated files have been uploaded and are currently
syncing to the mirrors: ( sha256sum Filename )

x86_64:
2ef5f1ea879e3bb34c930bdcb7ebea42bb1f3a3440e4f8f61b34a9bf042a42eb nss-util-3.19.1-1.el7_1.i686.rpm
c379f6530da7996ea4d52370038ff0dde6f69395b4b38bd184f9ea3ff93cd066 nss-util-3.19.1-1.el7_1.x86_64.rpm
420eda8ab708d8b616e19288813a47f6a82f013c58ca474d91d544d4b4fe7951 nss-util-devel-3.19.1-1.el7_1.i686.rpm
f4609893801a577d38f7a447775120bcef017207fabab038152ed248d8b262f2 nss-util-devel-3.19.1-1.el7_1.x86_64.rpm

Source:
25631048669b631db267364a4adff132c337756e91b3880db2ca5f6cc0e05219 nss-util-3.19.1-1.el7_1.src.rpm



--
Johnny Hughes
CentOS Project { http://www.centos.org/ }
irc: hughesjr, #centos@irc.freenode.net

_______________________________________________
CentOS-announce mailing list
CentOS-announce@centos.org
http://lists.centos.org/mailman/listinfo/centos-announce

[CentOS-announce] CESA-2015:1185 Moderate CentOS 7 nss Security Update

CentOS Errata and Security Advisory 2015:1185 Moderate

Upstream details at : https://rhn.redhat.com/errata/RHSA-2015-1185.html

The following updated files have been uploaded and are currently
syncing to the mirrors: ( sha256sum Filename )

x86_64:
c36669d51214d57b5a82f9b079c12ff025b33dfdc417376f01ad3538ba44ede2 nss-3.19.1-3.el7_1.i686.rpm
67217f72404c892ec99f3620176a88815865c9e0760cfcde205ccb438c27c936 nss-3.19.1-3.el7_1.x86_64.rpm
796fd60bf87cc31757a284190ef1471ecf6d677c48efc1867b5ca70ed07254bf nss-devel-3.19.1-3.el7_1.i686.rpm
24105b14d55d7fe635d2a61b428f14e6f60f97592ee973e9627cf4a67acfc963 nss-devel-3.19.1-3.el7_1.x86_64.rpm
94d8574d74fdf11669e69adc0c8a9c05ee261feb186bb742cfe6ca76d651454f nss-pkcs11-devel-3.19.1-3.el7_1.i686.rpm
6b020d9acf4a76177c3bba65766a32f486e669da53464ea4b5a33dbc6a119eed nss-pkcs11-devel-3.19.1-3.el7_1.x86_64.rpm
43911fd7e9c230d4ed1f92cf709e150d2a671228256a6abaa99bd2ee541287a8 nss-sysinit-3.19.1-3.el7_1.x86_64.rpm
f724e35a7efafae8f3babbb7274adb518c642a098fd087cdc09fab867b7b4a43 nss-tools-3.19.1-3.el7_1.x86_64.rpm

Source:
3560838cde182f07528ad9cde1afbd899b3274c50328c21c1ccb521ffa327e29 nss-3.19.1-3.el7_1.src.rpm



--
Johnny Hughes
CentOS Project { http://www.centos.org/ }
irc: hughesjr, #centos@irc.freenode.net

_______________________________________________
CentOS-announce mailing list
CentOS-announce@centos.org
http://lists.centos.org/mailman/listinfo/centos-announce

[CentOS-announce] CEBA-2015:1180 CentOS 6 kdebase-workspace BugFix Update

CentOS Errata and Bugfix Advisory 2015:1180

Upstream details at : https://rhn.redhat.com/errata/RHBA-2015-1180.html

The following updated files have been uploaded and are currently
syncing to the mirrors: ( sha256sum Filename )

i386:
3f6d88392299834369f0dc5c4f86baf323417aaa409e5b58daaa86a9c9e68829 kdebase-workspace-4.3.4-30.el6_6.i686.rpm
6347bc4b6155060ae654271f0761cefff84bbc4550b81d335437438145b05b04 kdebase-workspace-akonadi-4.3.4-30.el6_6.i686.rpm
6b0a17dc25a328cde571c9b80a4777a32dcb8874f283f253d1f54e941c6dfd1c kdebase-workspace-devel-4.3.4-30.el6_6.i686.rpm
2b3508584d1a1f79d95e5a2566d59980330f4dfe8a44e7e74b924361b9c48cb1 kdebase-workspace-libs-4.3.4-30.el6_6.i686.rpm
f324c331c4c8b169d168ae0b7dd37e77a341df170de9895e51f3c1dc2982a112 kdebase-workspace-python-applet-4.3.4-30.el6_6.i686.rpm
4b6334b13161f3b23ce271d0a4d38129483b8cec77075972e043034915efc4e6 kdebase-workspace-wallpapers-4.3.4-30.el6_6.noarch.rpm
55bfd8daf41d207ae0051b31e2c811b9023fe9d16b0267d1cbbe9040e74a17d2 kdm-4.3.4-30.el6_6.i686.rpm
40bbfe9aa15744d6971811ccd966b695f6b3335316546c80dc2c7f08e1f0d047 ksysguardd-4.3.4-30.el6_6.i686.rpm
ebd8ef145e2d1a7c101e02da1f04200d03a6b9e5401fdc43c405f5ac4d256cd4 oxygen-cursor-themes-4.3.4-30.el6_6.noarch.rpm

x86_64:
9219e30a29bc81c4b2d31bdcecba7774d75d1909d5162b7312eff8ec99972ddf kdebase-workspace-4.3.4-30.el6_6.x86_64.rpm
7388b4d6818b4914d2a4f812d54820bda72762113f7252e218d7ffc6f4677d25 kdebase-workspace-akonadi-4.3.4-30.el6_6.x86_64.rpm
6b0a17dc25a328cde571c9b80a4777a32dcb8874f283f253d1f54e941c6dfd1c kdebase-workspace-devel-4.3.4-30.el6_6.i686.rpm
04701e7b0f2cb25112540456c8de64d0b2e2c2b0dfbca160d682c6ae9fadaa49 kdebase-workspace-devel-4.3.4-30.el6_6.x86_64.rpm
2b3508584d1a1f79d95e5a2566d59980330f4dfe8a44e7e74b924361b9c48cb1 kdebase-workspace-libs-4.3.4-30.el6_6.i686.rpm
d4860b2d83767d6454ca2b8623afe2bfdd00234b570b61b81aa1175ce638cb6c kdebase-workspace-libs-4.3.4-30.el6_6.x86_64.rpm
7a6ba4bcfc2401db8b6a5341327cf5a7d0a11c74c92c25290ba02e1e01d18d0c kdebase-workspace-python-applet-4.3.4-30.el6_6.x86_64.rpm
4b6334b13161f3b23ce271d0a4d38129483b8cec77075972e043034915efc4e6 kdebase-workspace-wallpapers-4.3.4-30.el6_6.noarch.rpm
450da92e9b9bd08a3429e35fda30e98f7dd316083db841b05e47c219a7fb0f8a kdm-4.3.4-30.el6_6.x86_64.rpm
4c04b9b7ea2fe85a69b584f13527aa7b163bf2fe17c64a91ae0959dd2ac3537b ksysguardd-4.3.4-30.el6_6.x86_64.rpm
ebd8ef145e2d1a7c101e02da1f04200d03a6b9e5401fdc43c405f5ac4d256cd4 oxygen-cursor-themes-4.3.4-30.el6_6.noarch.rpm

Source:
55837600e115f5c886b00b14b2b467e54f42be110365b9acb8f265da0f12a041 kdebase-workspace-4.3.4-30.el6_6.src.rpm



--
Johnny Hughes
CentOS Project { http://www.centos.org/ }
irc: hughesjr, #centos@irc.freenode.net

_______________________________________________
CentOS-announce mailing list
CentOS-announce@centos.org
http://lists.centos.org/mailman/listinfo/centos-announce

[CentOS-announce] CESA-2015:1185 Moderate CentOS 6 nss Security Update

CentOS Errata and Security Advisory 2015:1185 Moderate

Upstream details at : https://rhn.redhat.com/errata/RHSA-2015-1185.html

The following updated files have been uploaded and are currently
syncing to the mirrors: ( sha256sum Filename )

i386:
a74da22a4f4859a8a476af17f4f871901bb90da15afcf16665a66f0b6c71afdb nss-3.19.1-3.el6_6.i686.rpm
5386cf07a44380ffb202ba7e82f10220d36abc97478b49993b7a95690d085c9d nss-devel-3.19.1-3.el6_6.i686.rpm
d3da3f8d93cf5505d4d3c83a1f4cf610ffccf96f6dae68e18d9ec0befea03198 nss-pkcs11-devel-3.19.1-3.el6_6.i686.rpm
66ae3f655a0f04df9a4ab92a744a3754c5634097e305692a71908a2b26e99f85 nss-sysinit-3.19.1-3.el6_6.i686.rpm
f95028d6f4dab7cac8b000a6d5edc8ad50b4c51fa9098a11bd1537278c589d65 nss-tools-3.19.1-3.el6_6.i686.rpm

x86_64:
a74da22a4f4859a8a476af17f4f871901bb90da15afcf16665a66f0b6c71afdb nss-3.19.1-3.el6_6.i686.rpm
527b9685f9466312d5dc12fd5c95a17eaca308b93cb6e6e2b6e90f67b6199839 nss-3.19.1-3.el6_6.x86_64.rpm
5386cf07a44380ffb202ba7e82f10220d36abc97478b49993b7a95690d085c9d nss-devel-3.19.1-3.el6_6.i686.rpm
3e9aad3ff99d1c8dd83246b5182715bcf6b3fa7b3ac8d185aa39808c5365b3eb nss-devel-3.19.1-3.el6_6.x86_64.rpm
d3da3f8d93cf5505d4d3c83a1f4cf610ffccf96f6dae68e18d9ec0befea03198 nss-pkcs11-devel-3.19.1-3.el6_6.i686.rpm
d43230dd26cd5d746e578f2b8dd45dde8b9db72810bcdc43aa1675c5d8138832 nss-pkcs11-devel-3.19.1-3.el6_6.x86_64.rpm
5544ff6bb87c77715fa11ad9ad61941f57dffdfde8427129c75090ae0f1851da nss-sysinit-3.19.1-3.el6_6.x86_64.rpm
d682e4187fda2f1b2222ea70fb7795887bdb7fc6168167fb51fc58bacd87b90c nss-tools-3.19.1-3.el6_6.x86_64.rpm

Source:
b30fb858dcec5a154713cfd27386aa48def4cf819f2ed39f586c513f8eb1d209 nss-3.19.1-3.el6_6.src.rpm



--
Johnny Hughes
CentOS Project { http://www.centos.org/ }
irc: hughesjr, #centos@irc.freenode.net

_______________________________________________
CentOS-announce mailing list
CentOS-announce@centos.org
http://lists.centos.org/mailman/listinfo/centos-announce

[CentOS-announce] CESA-2015:1185 Moderate CentOS 6 nss-util Security Update

CentOS Errata and Security Advisory 2015:1185 Moderate

Upstream details at : https://rhn.redhat.com/errata/RHSA-2015-1185.html

The following updated files have been uploaded and are currently
syncing to the mirrors: ( sha256sum Filename )

i386:
07b2323f67221bfa440bcbf79d099b401f0b05539d5c7c6054682eea1a054043 nss-util-3.19.1-1.el6_6.i686.rpm
3a33c0c12ce812e18d86d1ba0601546ba645babb4b129f5318472180ddfb3ccb nss-util-devel-3.19.1-1.el6_6.i686.rpm

x86_64:
07b2323f67221bfa440bcbf79d099b401f0b05539d5c7c6054682eea1a054043 nss-util-3.19.1-1.el6_6.i686.rpm
6d18c09300d59c832734701ff7403398a46ef2faa8897ae52f88d204a2d610a2 nss-util-3.19.1-1.el6_6.x86_64.rpm
3a33c0c12ce812e18d86d1ba0601546ba645babb4b129f5318472180ddfb3ccb nss-util-devel-3.19.1-1.el6_6.i686.rpm
abceb0b92d73c562720382d69b6e9af3d72f85257fb66dbad9de07652e68e844 nss-util-devel-3.19.1-1.el6_6.x86_64.rpm

Source:
8b4f5d17d8260f788fc58e0d22bc4f6d79481822be4218403e3d8dfc7f92229b nss-util-3.19.1-1.el6_6.src.rpm



--
Johnny Hughes
CentOS Project { http://www.centos.org/ }
irc: hughesjr, #centos@irc.freenode.net

_______________________________________________
CentOS-announce mailing list
CentOS-announce@centos.org
http://lists.centos.org/mailman/listinfo/centos-announce

Wednesday, June 24, 2015

reallost1.fbsd2233449 您 好

reallost1.fbsd2233449   您 好

附件中的内容希望能帮助的到您的学习和工作

鲍淋忱祝您事业有成,生活愉快

2015-6-257:14:07

sjbhn

[CentOS-announce] CEBA-2015:1182 CentOS 7 spamassassin FASTTRACK BugFix Update

CentOS Errata and Bugfix Advisory 2015:1182

Upstream details at : https://rhn.redhat.com/errata/RHBA-2015-1182.html

The following updated files have been uploaded and are currently
syncing to the mirrors: ( sha256sum Filename )

x86_64:
1c840911a65e0041ced665790a561032b75df8c41b53d086bd7ecddeeb8d27e9 spamassassin-3.4.0-2.el7.x86_64.rpm

Source:
05dbd6e4dac1b1e7fa01a17e718bea715c62ff1ba3234c3599dc1cf3a3177ae8 spamassassin-3.4.0-2.el7.src.rpm



--
Johnny Hughes
CentOS Project { http://www.centos.org/ }
irc: hughesjr, #centos@irc.freenode.net

_______________________________________________
CentOS-announce mailing list
CentOS-announce@centos.org
http://lists.centos.org/mailman/listinfo/centos-announce

[CentOS-announce] CEBA-2015:1181 CentOS 6 resource-agents BugFix Update

CentOS Errata and Bugfix Advisory 2015:1181

Upstream details at : https://rhn.redhat.com/errata/RHBA-2015-1181.html

The following updated files have been uploaded and are currently
syncing to the mirrors: ( sha256sum Filename )

i386:
830df3099492595e440c9f82527dfd40a6a4e2441bde09957fac4ea41dff86db resource-agents-3.9.5-12.el6_6.7.i686.rpm

x86_64:
2ce77aa52bb83c459aa03a7ea0b8a41e9b245ad036260f78c630836b5d8ba8af resource-agents-3.9.5-12.el6_6.7.x86_64.rpm
f07ca4bd64173453b60ded6c8421ee1f4d29d3557f7af8b06adeef5c2b63fec1 resource-agents-sap-3.9.5-12.el6_6.7.x86_64.rpm
979e8a18f7d8b4cce19bf8e0d45a050cb498d0c63247f3a4214d46649747fe48 resource-agents-sap-hana-3.9.5-12.el6_6.7.x86_64.rpm

Source:
4080856dbe8038694949c1792b133e3797ef585d3c5d4f2613f15ad2daca835f resource-agents-3.9.5-12.el6_6.7.src.rpm



--
Johnny Hughes
CentOS Project { http://www.centos.org/ }
irc: hughesjr, #centos@irc.freenode.net

_______________________________________________
CentOS-announce mailing list
CentOS-announce@centos.org
http://lists.centos.org/mailman/listinfo/centos-announce

[CentOS-announce] CEBA-2015:1180 CentOS 6 kdebase-workspace BugFix Update

CentOS Errata and Bugfix Advisory 2015:1180

Upstream details at : https://rhn.redhat.com/errata/RHBA-2015-1180.html

The following updated files have been uploaded and are currently
syncing to the mirrors: ( sha256sum Filename )

i386:
3f6d88392299834369f0dc5c4f86baf323417aaa409e5b58daaa86a9c9e68829 kdebase-workspace-4.3.4-30.el6_6.i686.rpm
6347bc4b6155060ae654271f0761cefff84bbc4550b81d335437438145b05b04 kdebase-workspace-akonadi-4.3.4-30.el6_6.i686.rpm
6b0a17dc25a328cde571c9b80a4777a32dcb8874f283f253d1f54e941c6dfd1c kdebase-workspace-devel-4.3.4-30.el6_6.i686.rpm
2b3508584d1a1f79d95e5a2566d59980330f4dfe8a44e7e74b924361b9c48cb1 kdebase-workspace-libs-4.3.4-30.el6_6.i686.rpm
f324c331c4c8b169d168ae0b7dd37e77a341df170de9895e51f3c1dc2982a112 kdebase-workspace-python-applet-4.3.4-30.el6_6.i686.rpm
4b6334b13161f3b23ce271d0a4d38129483b8cec77075972e043034915efc4e6 kdebase-workspace-wallpapers-4.3.4-30.el6_6.noarch.rpm
55bfd8daf41d207ae0051b31e2c811b9023fe9d16b0267d1cbbe9040e74a17d2 kdm-4.3.4-30.el6_6.i686.rpm
40bbfe9aa15744d6971811ccd966b695f6b3335316546c80dc2c7f08e1f0d047 ksysguardd-4.3.4-30.el6_6.i686.rpm
ebd8ef145e2d1a7c101e02da1f04200d03a6b9e5401fdc43c405f5ac4d256cd4 oxygen-cursor-themes-4.3.4-30.el6_6.noarch.rpm

x86_64:
9219e30a29bc81c4b2d31bdcecba7774d75d1909d5162b7312eff8ec99972ddf kdebase-workspace-4.3.4-30.el6_6.x86_64.rpm
7388b4d6818b4914d2a4f812d54820bda72762113f7252e218d7ffc6f4677d25 kdebase-workspace-akonadi-4.3.4-30.el6_6.x86_64.rpm
6b0a17dc25a328cde571c9b80a4777a32dcb8874f283f253d1f54e941c6dfd1c kdebase-workspace-devel-4.3.4-30.el6_6.i686.rpm
04701e7b0f2cb25112540456c8de64d0b2e2c2b0dfbca160d682c6ae9fadaa49 kdebase-workspace-devel-4.3.4-30.el6_6.x86_64.rpm
2b3508584d1a1f79d95e5a2566d59980330f4dfe8a44e7e74b924361b9c48cb1 kdebase-workspace-libs-4.3.4-30.el6_6.i686.rpm
d4860b2d83767d6454ca2b8623afe2bfdd00234b570b61b81aa1175ce638cb6c kdebase-workspace-libs-4.3.4-30.el6_6.x86_64.rpm
7a6ba4bcfc2401db8b6a5341327cf5a7d0a11c74c92c25290ba02e1e01d18d0c kdebase-workspace-python-applet-4.3.4-30.el6_6.x86_64.rpm
4b6334b13161f3b23ce271d0a4d38129483b8cec77075972e043034915efc4e6 kdebase-workspace-wallpapers-4.3.4-30.el6_6.noarch.rpm
450da92e9b9bd08a3429e35fda30e98f7dd316083db841b05e47c219a7fb0f8a kdm-4.3.4-30.el6_6.x86_64.rpm
4c04b9b7ea2fe85a69b584f13527aa7b163bf2fe17c64a91ae0959dd2ac3537b ksysguardd-4.3.4-30.el6_6.x86_64.rpm
ebd8ef145e2d1a7c101e02da1f04200d03a6b9e5401fdc43c405f5ac4d256cd4 oxygen-cursor-themes-4.3.4-30.el6_6.noarch.rpm

Source:
55837600e115f5c886b00b14b2b467e54f42be110365b9acb8f265da0f12a041 kdebase-workspace-4.3.4-30.el6_6.src.rpm



--
Johnny Hughes
CentOS Project { http://www.centos.org/ }
irc: hughesjr, #centos@irc.freenode.net

_______________________________________________
CentOS-announce mailing list
CentOS-announce@centos.org
http://lists.centos.org/mailman/listinfo/centos-announce

Tuesday, June 23, 2015

[CentOS-announce] CESA-2015:1137 Important CentOS 7 kernel Security Update

CentOS Errata and Security Advisory 2015:1137 Important

Upstream details at : https://rhn.redhat.com/errata/RHSA-2015-1137.html

The following updated files have been uploaded and are currently
syncing to the mirrors: ( sha256sum Filename )

x86_64:
ec844f9bc28a351f6411a10803439f7f53083d67f9b4c1cc0f1287e5cc086009 kernel-3.10.0-229.7.2.el7.x86_64.rpm
3295df06cb85ffe1fc5b1afc33aa08460c7b36d18acaabec4eadcfca30c81b70 kernel-abi-whitelists-3.10.0-229.7.2.el7.noarch.rpm
618210511ce18f8aba22f7a40768cde29a0cb7c7928db947bd94cff11bd56674 kernel-debug-3.10.0-229.7.2.el7.x86_64.rpm
f77d1c602383b6857a5e35fbe5c1a971c2ad90ddb4c3e0a24c4534e73572d85d kernel-debug-devel-3.10.0-229.7.2.el7.x86_64.rpm
91e92ea8302357b50089375c64fc6bffcef33c6ec3fc94a234a9821d509f37e6 kernel-devel-3.10.0-229.7.2.el7.x86_64.rpm
e6c2178d42d57f9cdc852eb1cbad0da73c87cf49059ca388a0a8038a6496d1b8 kernel-doc-3.10.0-229.7.2.el7.noarch.rpm
c6e3b5a4e0564c81cddc2495302d8baab679bcc48e63baf45bec765c47ea55e9 kernel-headers-3.10.0-229.7.2.el7.x86_64.rpm
44cff1d22cb064037f197f2db5f37b4be3805bdb2ed6045f4302f3277041a8dc kernel-tools-3.10.0-229.7.2.el7.x86_64.rpm
a2ea801bb956f36efa2e41f93a76e56bc9cc4b44d0b154dcf7e29fce0edd3678 kernel-tools-libs-3.10.0-229.7.2.el7.x86_64.rpm
3dc6f912c1a1cdadfcfdcf40d475765a58c9f6cfff7a10887f29e1e99a6aa1c9 kernel-tools-libs-devel-3.10.0-229.7.2.el7.x86_64.rpm
58a0d3836f6e231709860113ef8c8c892b999f61d3c6ffe7e7bcd7bcdd88fb0f perf-3.10.0-229.7.2.el7.x86_64.rpm
f756898551544feba4ae6beea3679003859978000fc9840b0dba615dbc8bc260 python-perf-3.10.0-229.7.2.el7.x86_64.rpm

Source:
7373425cdfa719f8016529350952e83aa067432c54c80144ceec62a2711352af kernel-3.10.0-229.7.2.el7.src.rpm



--
Johnny Hughes
CentOS Project { http://www.centos.org/ }
irc: hughesjr, #centos@irc.freenode.net

_______________________________________________
CentOS-announce mailing list
CentOS-announce@centos.org
http://lists.centos.org/mailman/listinfo/centos-announce

[CentOS-announce] CEBA-2015:1162 CentOS 7 python BugFix Update

CentOS Errata and Bugfix Advisory 2015:1162

Upstream details at : https://rhn.redhat.com/errata/RHBA-2015-1162.html

The following updated files have been uploaded and are currently
syncing to the mirrors: ( sha256sum Filename )

x86_64:
78e62ff932343e14f88b8c81dc52772c8a47a9acf7b8061da23b95b13c4e8f01 python-2.7.5-18.el7_1.1.x86_64.rpm
118f9b9b84659db44514a147012d463b72b064db7a129940d0bb5b5ccd649715 python-debug-2.7.5-18.el7_1.1.x86_64.rpm
795965a908b14190b3a74f78e098d56c98e1544d97925af7b7533946ff6d9a26 python-devel-2.7.5-18.el7_1.1.x86_64.rpm
e498298f2cc35437cfc0255c14ae994b5fe4aa0bec4988b90cf03fdc97c67d5e python-libs-2.7.5-18.el7_1.1.i686.rpm
cf3bc35022b6b99bb379c8359e258a2bb2946febb7857972564e1c3f138ea259 python-libs-2.7.5-18.el7_1.1.x86_64.rpm
76360f782fa949435ecd0e1318a35c0485a8b7e3c501c5bb5cd2556a30f2ccd1 python-test-2.7.5-18.el7_1.1.x86_64.rpm
4a194a79087b5aac383e762be08fb3a763b8d48eb38e9f8e6caa0f29614cfe18 python-tools-2.7.5-18.el7_1.1.x86_64.rpm
8aa6bec11d4876f51266a2de755e8f3deafbe832c9c2e1c17a09d06290013fe2 tkinter-2.7.5-18.el7_1.1.x86_64.rpm

Source:
c7dd84eace1c7be5384a5bc5973658b82db4953aa40c1e684b0a95a474ea2dd0 python-2.7.5-18.el7_1.1.src.rpm



--
Johnny Hughes
CentOS Project { http://www.centos.org/ }
irc: hughesjr, #centos@irc.freenode.net

_______________________________________________
CentOS-announce mailing list
CentOS-announce@centos.org
http://lists.centos.org/mailman/listinfo/centos-announce