Tuesday, May 31, 2016

LibreSSL 2.4.0/2.3.5/2.2.8 Released

We have released a first development snapshot of LibreSSL 2.4.0 along
with two stable builds, 2.3.5 and 2.2.8. These should be arriving in
the LibreSSL directory of your local OpenBSD mirror soon.

The 2.3.5 and 2.2.8 releases contain a reliability fix, correcting an
error when parsing certain ASN.1 elements over 16k in size.

The 2.4.0 release contains the following additional changes:

* Implemented the IETF ChaCha20-Poly1305 cipher suites.

* Changed default EVP_aead_chacha20_poly1305() implementation to the
IETF version, which is now the default.

* Many improvements to the CMake build infrastructure, including
Solaris, mingw-w64, Cygwin, and HP-UX support. Thanks to Kinichiro
Inoguchi for this work.

* Reworked error handling in libtls so that configuration errors are
more visible.

* Added missing error handling around bn_wexpand() calls.

* Added explicit_bzero calls for freed ASN.1 objects.

* Fixed X509_*set_object functions to return 0 on allocation failure.

* Fixed password prompts from openssl(1) to properly handle ^C.

* Deprecated internal use of EVP_[Cipher|Encrypt|Decrypt]_Final.

The LibreSSL project continues improvement of the codebase to reflect modern,
safe programming practices. We welcome feedback and improvements from the
broader community. Thanks to all of the contributors who helped make this
release possible.

[CentOS-announce] CEBA-2016:1185 CentOS 6 kernel BugFix Update

CentOS Errata and Bugfix Advisory 2016:1185

Upstream details at : https://rhn.redhat.com/errata/RHBA-2016-1185.html

The following updated files have been uploaded and are currently
syncing to the mirrors: ( sha256sum Filename )

i386:
c9f9fe408219c4477449ea1ff02b1cdb8f138c7e8946b0107a2550e337d42db7 kernel-2.6.32-642.1.1.el6.i686.rpm
93aff6d219a35ccdb037f8ca0fb37ef2404dc932193050b04cfdab654fa74ef9 kernel-abi-whitelists-2.6.32-642.1.1.el6.noarch.rpm
ff24d2f6561c5228368b4375b8cf6f28dbc5dd84d4a02c2390eb5ab12e89779a kernel-debug-2.6.32-642.1.1.el6.i686.rpm
f685c21c4edddd1463a84253308120bb0842baf173defb56ad20305f7bebb8be kernel-debug-devel-2.6.32-642.1.1.el6.i686.rpm
a263fb3038a7fa29613a4e957da4f6dcd3c6798fa56fbca19a1f64c5913d2eb9 kernel-devel-2.6.32-642.1.1.el6.i686.rpm
dafcbcca6b84b865ad490ddd8c0bc769eda11f6291d9e3addbfe7f4ec4dc3b82 kernel-doc-2.6.32-642.1.1.el6.noarch.rpm
35e63ebedc5e4008d065dacccf333edb1fecb10f112281b281a3ac91277a9f46 kernel-firmware-2.6.32-642.1.1.el6.noarch.rpm
c1b7eed3be0cdb28e06485332eb90f899841b6f389db3c5a8b441879197571ec kernel-headers-2.6.32-642.1.1.el6.i686.rpm
dac134f20393e3bf654ed3622c5219d6cb58dfb3ebcc3caae8005a6cdad8ca64 perf-2.6.32-642.1.1.el6.i686.rpm
b7d2ce2cba6bdeaa47a4373d45d753a58754069aedba9f34d65b9fb70f42daa8 python-perf-2.6.32-642.1.1.el6.i686.rpm

x86_64:
de1c95c8ea3e296a54477af2a7a8955090445142fcc4cea74161ca37b15d3d4f kernel-2.6.32-642.1.1.el6.x86_64.rpm
93aff6d219a35ccdb037f8ca0fb37ef2404dc932193050b04cfdab654fa74ef9 kernel-abi-whitelists-2.6.32-642.1.1.el6.noarch.rpm
11162d5665d1fb06e6f659f8fda34b9fa9b5204d41d1bf96a1982dc98c291fa0 kernel-debug-2.6.32-642.1.1.el6.x86_64.rpm
f685c21c4edddd1463a84253308120bb0842baf173defb56ad20305f7bebb8be kernel-debug-devel-2.6.32-642.1.1.el6.i686.rpm
31e8b9b5786590bce2204b8ffbd326b83c8a89853a70b55273ff439734f8e793 kernel-debug-devel-2.6.32-642.1.1.el6.x86_64.rpm
5dd4737555f3c5562e4bcf0ebe5e739db0c132f17a0af760cfd66cc2394ee819 kernel-devel-2.6.32-642.1.1.el6.x86_64.rpm
dafcbcca6b84b865ad490ddd8c0bc769eda11f6291d9e3addbfe7f4ec4dc3b82 kernel-doc-2.6.32-642.1.1.el6.noarch.rpm
35e63ebedc5e4008d065dacccf333edb1fecb10f112281b281a3ac91277a9f46 kernel-firmware-2.6.32-642.1.1.el6.noarch.rpm
6815bb0ce437d62c1ce2cd75e090a8c1d6f3c6f8176b3ded3932d0d1b7ad5878 kernel-headers-2.6.32-642.1.1.el6.x86_64.rpm
92728541814d02ed3ecc7ca0de5836a6a6c4aff8e2e9a74542d6c9a0f31b05d5 perf-2.6.32-642.1.1.el6.x86_64.rpm
5a2712140efe05cd0846c0e1eb77ecea7566666d424539bebeb0b3e37b0486ff python-perf-2.6.32-642.1.1.el6.x86_64.rpm

Source:
4e812c4f1bd1a9172bea3c7b11680a359b0d051f964a720f6d4257a50a3b1215 kernel-2.6.32-642.1.1.el6.src.rpm



--
Johnny Hughes
CentOS Project { http://www.centos.org/ }
irc: hughesjr, #centos@irc.freenode.net
Twitter: @JohnnyCentOS

_______________________________________________
CentOS-announce mailing list
CentOS-announce@centos.org
https://lists.centos.org/mailman/listinfo/centos-announce

reallost1.fbsd2233449:店长,经理常遇到的难题

reallost1.fbsd2233449     亲!

附件中的内容打造金牌店长特训营,希望能帮助到贵公司的发展。

pkgh4i-

祝您工作顺利,身体健康

向朞秒5:02:26

 

 

 

[USN-2988-1] LXD vulnerabilities

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v2
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=01s6
-----END PGP SIGNATURE-----
==========================================================================
Ubuntu Security Notice USN-2988-1
May 31, 2016

lxd vulnerabilities
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 16.04 LTS
- Ubuntu 15.10

Summary:

Several security issues were fixed in LXD.

Software Description:
- lxd: Container hypervisor based on LXC

Details:

Robie Basak discovered that LXD incorrectly set permissions when setting up
a loop based ZFS pool. A local attacker could use this issue to copy and
read the data of any LXD container. (CVE-2016-1581)

Robie Basak discovered that LXD incorrectly set permissions when switching
an unprivileged container into privileged mode. A local attacker could use
this issue to access any world readable path in the container directory,
including setuid binaries. (CVE-2016-1582)

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 16.04 LTS:
lxd 2.0.2-0ubuntu1~16.04.1

Ubuntu 15.10:
lxd 0.20-0ubuntu4.2

In general, a standard system update will make all the necessary changes.

References:
http://www.ubuntu.com/usn/usn-2988-1
CVE-2016-1581, CVE-2016-1582

Package Information:
https://launchpad.net/ubuntu/+source/lxd/2.0.2-0ubuntu1~16.04.1
https://launchpad.net/ubuntu/+source/lxd/0.20-0ubuntu4.2

[FreeBSD-Announce] FreeBSD Security Advisory FreeBSD-SA-16:22.libarchive

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

=============================================================================
FreeBSD-SA-16:22.libarchive Security Advisory
The FreeBSD Project

Topic: Directory traversal in cpio(1)

Category: contrib
Module: libarchive
Announced: 2016-05-31
Credits: Alexander Cherepanov
Affects: All supported versions of FreeBSD
Corrected: 2016-05-21 09:03:45 UTC (stable/10, 10.3-STABLE)
2016-05-31 16:35:03 UTC (releng/10.3, 10.3-RELEASE-p4)
2016-05-31 16:33:56 UTC (releng/10.2, 10.2-RELEASE-p18)
2016-05-31 16:32:42 UTC (releng/10.1, 10.1-RELEASE-p35)
2016-05-21 09:27:30 UTC (stable/9, 9.3-STABLE)
2016-05-31 16:23:56 UTC (releng/9.3, 9.3-RELEASE-p43)
CVE Name: CVE-2015-2304

For general information regarding FreeBSD Security Advisories,
including descriptions of the fields above, security branches, and the
following sections, please visit <URL:https://security.FreeBSD.org/>.

I. Background

The libarchive(3) library provides a flexible interface for reading and
writing streaming archive files such as tar(1) and cpio(1), and has been the
basis for the FreeBSD implementation of the tar(1) and cpio(1) utilities
since FreeBSD 5.3.

II. Problem Description

The cpio(1) tool from the libarchive(3) bundle is vulnerable to a directory
traversal problem via absolute paths in an archive file.

III. Impact

A malicious archive file being unpacked can overwrite an arbitrary file on
a filesystem, if the owner of the cpio process has write access to it.

IV. Workaround

No workaround is available.

V. Solution

Perform one of the following:

1) Upgrade your vulnerable system to a supported FreeBSD stable or
release / security branch (releng) dated after the correction date.

Reboot is not required.

2) To update your vulnerable system via a binary patch:

Systems running a RELEASE version of FreeBSD on the i386 or amd64
platforms can be updated via the freebsd-update(8) utility:

# freebsd-update fetch
# freebsd-update install

Reboot is not required.

3) To update your vulnerable system via a source code patch:

The following patches have been verified to apply to the applicable
FreeBSD release branches.

a) Download the relevant patch from the location below, and verify the
detached PGP signature using your PGP utility.

[FreeBSD 10.x]
# fetch https://security.FreeBSD.org/patches/SA-16:22/libarchive-10.patch
# fetch https://security.FreeBSD.org/patches/SA-16:22/libarchive-10.patch.asc
# gpg --verify libarchive-10.patch.asc

[FreeBSD 9.3]
# fetch https://security.FreeBSD.org/patches/SA-16:22/libarchive-9.patch
# fetch https://security.FreeBSD.org/patches/SA-16:22/libarchive-9.patch.asc
# gpg --verify libarchive-9.patch.asc

b) Apply the patch. Execute the following commands as root:

# cd /usr/src
# patch < /path/to/patch

c) Recompile the operating system using buildworld and installworld as
described in <URL:https://www.FreeBSD.org/handbook/makeworld.html>.

VI. Correction details

The following list contains the correction revision numbers for each
affected branch.

Branch/path Revision
- -------------------------------------------------------------------------
stable/9/ r300363
releng/9.3/ r301044
stable/10/ r300361
releng/10.1/ r301046
releng/10.2/ r301047
releng/10.3/ r301048
- -------------------------------------------------------------------------

To see which files were modified by a particular revision, run the
following command, replacing NNNNNN with the revision number, on a
machine with Subversion installed:

# svn diff -cNNNNNN --summarize svn://svn.freebsd.org/base

Or visit the following URL, replacing NNNNNN with the revision number:

<URL:https://svnweb.freebsd.org/base?view=revision&revision=NNNNNN>

VII. References

<URL:https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2304>

The latest revision of this advisory is available at
<URL:https://security.FreeBSD.org/advisories/FreeBSD-SA-16:22.libarchive.asc>
-----BEGIN PGP SIGNATURE-----
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=+ZX7
-----END PGP SIGNATURE-----
_______________________________________________
freebsd-announce@freebsd.org mailing list
https://lists.freebsd.org/mailman/listinfo/freebsd-announce
To unsubscribe, send any mail to "freebsd-announce-unsubscribe@freebsd.org"

[FreeBSD-Announce] FreeBSD Security Advisory FreeBSD-SA-16:23.libarchive

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

=============================================================================
FreeBSD-SA-16:23.libarchive Security Advisory
The FreeBSD Project

Topic: Buffer overflow in libarchive(3)

Category: contrib
Module: libarchive
Announced: 2016-05-31
Affects: FreeBSD 9.3
Corrected: 2016-05-21 09:27:30 UTC (stable/9, 9.3-STABLE)
2016-05-31 16:23:56 UTC (releng/9.3, 9.3-RELEASE-p43)
CVE Name: CVE-2013-0211

For general information regarding FreeBSD Security Advisories,
including descriptions of the fields above, security branches, and the
following sections, please visit <URL:https://security.FreeBSD.org/>.

I. Background

The libarchive(3) library provides a flexible interface for reading and
writing streaming archive files such as tar and cpio, and has been the
basis for FreeBSD's implementation of the tar(1) and cpio(1) utilities
since FreeBSD 5.3.

II. Problem Description

An integer signedness error in the archive_write_zip_data() function in
archive_write_set_format_zip.c in libarchive(2) could lead to a buffer
overflow on 64-bit machines.

III. Impact

An attacker who can provide input of their choice for creating a ZIP archive
can cause a buffer overflow in libarchive(2) that results in a core dump or
possibly execution of arbitrary code provided by the attacker.

IV. Workaround

No workaround is available but 32-bit systems are not vulnerable.

V. Solution

Perform one of the following:

1) Upgrade your vulnerable system to a supported FreeBSD stable or
release / security branch (releng) dated after the correction date.

Reboot is not required.

2) To update your vulnerable system via a binary patch:

Systems running a RELEASE version of FreeBSD on the i386 or amd64
platforms can be updated via the freebsd-update(8) utility:

# freebsd-update fetch
# freebsd-update install

A reboot is not required.

3) To update your vulnerable system via a source code patch:

The following patches have been verified to apply to the applicable
FreeBSD release branches.

a) Download the relevant patch from the location below, and verify the
detached PGP signature using your PGP utility.

# fetch https://security.FreeBSD.org/patches/SA-16:23/libarchive.patch
# fetch https://security.FreeBSD.org/patches/SA-16:23/libarchive.patch.asc
# gpg --verify libarchive.patch.asc

b) Apply the patch. Execute the following commands as root:

# cd /usr/src
# patch < /path/to/patch

c) Recompile the operating system using buildworld and installworld as
described in <URL:https://www.FreeBSD.org/handbook/makeworld.html>.

Restart the applicable daemons, or reboot the system.

VI. Correction details

The following list contains the correction revision numbers for each
affected branch.

Branch/path Revision
- -------------------------------------------------------------------------
stable/9/ r300363
releng/9.3/ r301044
- -------------------------------------------------------------------------

To see which files were modified by a particular revision, run the
following command, replacing NNNNNN with the revision number, on a
machine with Subversion installed:

# svn diff -cNNNNNN --summarize svn://svn.freebsd.org/base

Or visit the following URL, replacing NNNNNN with the revision number:

<URL:https://svnweb.freebsd.org/base?view=revision&revision=NNNNNN>

VII. References

<URL:https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0211>

The latest revision of this advisory is available at
<URL:https://security.FreeBSD.org/advisories/FreeBSD-SA-16:23.libarchive.asc>
-----BEGIN PGP SIGNATURE-----

iQIcBAEBCgAGBQJXTcSUAAoJEO1n7NZdz2rnjuwP/36GShkMxVtvEF3LeZCtT1bT
J0TSoXWpOo8rW61W0VEQ8xxOupIUwpDC2zwvgg0ZuPPbUY1nKYGrql8hixzmyg7n
Da7krIxv7guTrpIWumEztS7JAVjZWEW+SfwiXZ7OY+3KHSLcGh5E0MpEvWDy+Ysa
5/fjyaxYV2jHCaXwqNpCHv9ahS3Ca4VMr37E2H+3efdbSzkfUz17nReNjBtk8P76
5teuC/PZ0aXIToOBuP039NPy7Cw42AsgAnEDLayEMIuuq/u4JVmDUONcnjfQ4occ
tlCl3tNmk8LR9kotcvkg+7ZDOZ6zq4NHkcpjek8GPqScV2EgY0wixf4Eo2hD4P4x
NDo4pkzt5L+6mkJoSc/6zBYiVGLAqGBMDqsaemqBL/aTLH6+W+Bulvr9prfB2EIN
EBWfO4zkA3tKAPAZIpCQRzG2FScOjNeH49hy+ISTUWYcWDtNrpYIJdhX+XtsuZIt
Swd++AYcvnDJGX8bTPRb8nOlBWqAAscuIJsvyqyRVahmKrG2USECmhvaIN6jPbVq
8dScr0yO0ixzUpnkEMV8GW8kstC5mwCihJ4MG5qDtsWGYybH93N22eHZyOlCqa9J
d+V8OzEiVEtGtdDqbThDW3FfuimAm6aShTLxATeJTGbc+mQEdUMjjgAmrvCZxcEZ
URXCjA5XayDc0iZySd4r
=XTv8
-----END PGP SIGNATURE-----
_______________________________________________
freebsd-announce@freebsd.org mailing list
https://lists.freebsd.org/mailman/listinfo/freebsd-announce
To unsubscribe, send any mail to "freebsd-announce-unsubscribe@freebsd.org"

[FreeBSD-Announce] FreeBSD Security Advisory FreeBSD-SA-16:21.43bsd

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

=============================================================================
FreeBSD-SA-16:21.43bsd Security Advisory
The FreeBSD Project

Topic: Kernel stack disclosure in 4.3BSD compatibility layer

Category: core
Module: kernel
Announced: 2016-05-31
Credits: CTurt
Affects: All supported versions of FreeBSD.
Corrected: 2016-05-31 16:57:42 UTC (stable/10, 10.3-STABLE)
2016-05-31 16:55:50 UTC (releng/10.3, 10.3-RELEASE-p4)
2016-05-31 16:55:45 UTC (releng/10.2, 10.2-RELEASE-p18)
2016-05-31 16:55:41 UTC (releng/10.1, 10.1-RELEASE-p35)
2016-05-31 16:58:00 UTC (stable/9, 9.3-STABLE)
2016-05-31 16:55:37 UTC (releng/9.3, 9.3-RELEASE-p43)

For general information regarding FreeBSD Security Advisories,
including descriptions of the fields above, security branches, and the
following sections, please visit <URL:https://security.FreeBSD.org/>.

I. Background

FreeBSD has binary compatibility layer with historic 4.3BSD operating
system.

II. Problem Description

The implementation of historic stat(2) system call does not clear the
output struct before copying it out to userland.

III. Impact

An unprivileged user can read a portion of uninitialised kernel stack data,
which may contain sensitive information, such as the stack guard, portions
of the file cache or terminal buffers, which an attacker might leverage to
obtain elevated privileges.

IV. Workaround

No workaround is available, but systems not using the 4.3BSD compatibility
layer are not vulnerable.

The 4.3BSD compatibility layer is not included into the default GENERIC kernel
configuration. A custom kernel config that does not have the COMPAT_43 option
is also not vulnerable.

V. Solution

Perform one of the following:

1) Upgrade your vulnerable system to a supported FreeBSD stable or
release / security branch (releng) dated after the correction date.

Reboot is required.

2) To update your vulnerable system via a source code patch:

The following patches have been verified to apply to the applicable
FreeBSD release branches.

a) Download the relevant patch from the location below, and verify the
detached PGP signature using your PGP utility.

# fetch https://security.FreeBSD.org/patches/SA-16:21/stat.patch
# fetch https://security.FreeBSD.org/patches/SA-16:21/stat.patch.asc
# gpg --verify stat.patch.asc

b) Apply the patch. Execute the following commands as root:

# cd /usr/src
# patch < /path/to/patch

c) Recompile your kernel as described in
<URL:https://www.FreeBSD.org/handbook/kernelconfig.html> and reboot the
system.

VI. Correction details

The following list contains the correction revision numbers for each
affected branch.

Branch/path Revision
- -------------------------------------------------------------------------
stable/9/ r301055
releng/9.3/ r301049
stable/10/ r301054
releng/10.1/ r301050
releng/10.2/ r301051
releng/10.3/ r301052
- -------------------------------------------------------------------------

To see which files were modified by a particular revision, run the
following command, replacing NNNNNN with the revision number, on a
machine with Subversion installed:

# svn diff -cNNNNNN --summarize svn://svn.freebsd.org/base

Or visit the following URL, replacing NNNNNN with the revision number:

<URL:https://svnweb.freebsd.org/base?view=revision&revision=NNNNNN>

VII. References

<URL:http://cturt.github.io/compat-info-leaks.html>

The latest revision of this advisory is available at
<URL:https://security.FreeBSD.org/advisories/FreeBSD-SA-16:21.43bsd.asc>
-----BEGIN PGP SIGNATURE-----
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=qPmZ
-----END PGP SIGNATURE-----
_______________________________________________
freebsd-announce@freebsd.org mailing list
https://lists.freebsd.org/mailman/listinfo/freebsd-announce
To unsubscribe, send any mail to "freebsd-announce-unsubscribe@freebsd.org"

[FreeBSD-Announce] FreeBSD Security Advisory FreeBSD-SA-16:20.linux

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

=============================================================================
FreeBSD-SA-16:20.linux Security Advisory
The FreeBSD Project

Topic: Kernel stack disclosure in Linux compatibility layer

Category: core
Module: linux(4)
Announced: 2016-05-31
Credits: CTurt
Affects: All supported versions of FreeBSD.
Corrected: 2016-05-31 16:57:42 UTC (stable/10, 10.3-STABLE)
2016-05-31 16:55:50 UTC (releng/10.3, 10.3-RELEASE-p4)
2016-05-31 16:55:45 UTC (releng/10.2, 10.2-RELEASE-p18)
2016-05-31 16:55:41 UTC (releng/10.1, 10.1-RELEASE-p35)
2016-05-31 16:58:00 UTC (stable/9, 9.3-STABLE)
2016-05-31 16:55:37 UTC (releng/9.3, 9.3-RELEASE-p43)

For general information regarding FreeBSD Security Advisories,
including descriptions of the fields above, security branches, and the
following sections, please visit <URL:https://security.FreeBSD.org/>.

I. Background

FreeBSD is binary-compatible with the Linux operating system through a
loadable kernel module/optional kernel component. The support is provided
for amd64 and i386 machines.

II. Problem Description

The implementation of the TIOCGSERIAL ioctl(2) does not clear the output
struct before copying it out to userland.

The implementation of the Linux sysinfo() system call does not clear the
output struct before copying it out to userland.

III. Impact

An unprivileged user can read a portion of uninitialised kernel stack data,
which may contain sensitive information, such as the stack guard, portions
of the file cache or terminal buffers, which an attacker might leverage to
obtain elevated privileges.

IV. Workaround

No workaround is available, but systems not using the Linux binary
compatibility layer are not vulnerable.

The Linux compatibility layer is not included in the default GENERIC kernel.

The following command can be used to test if the Linux binary compatibility
layer is loaded:

# kldstat -m linuxelf

V. Solution

Perform one of the following:

1) Upgrade your vulnerable system to a supported FreeBSD stable or
release / security branch (releng) dated after the correction date.

Reboot is required.

2) To update your vulnerable system via a binary patch:

Systems running a RELEASE version of FreeBSD on the i386 or amd64
platforms can be updated via the freebsd-update(8) utility:

# freebsd-update fetch
# freebsd-update install

Reboot is required.

3) To update your vulnerable system via a source code patch:

The following patches have been verified to apply to the applicable
FreeBSD release branches.

a) Download the relevant patch from the location below, and verify the
detached PGP signature using your PGP utility.

# fetch https://security.FreeBSD.org/patches/SA-16:20/linux.patch
# fetch https://security.FreeBSD.org/patches/SA-16:20/linux.patch.asc
# gpg --verify linux.patch.asc

b) Apply the patch. Execute the following commands as root:

# cd /usr/src
# patch < /path/to/patch

c) Recompile your kernel as described in
<URL:https://www.FreeBSD.org/handbook/kernelconfig.html> and reboot the
system.

VI. Correction details

The following list contains the correction revision numbers for each
affected branch.

Branch/path Revision
- -------------------------------------------------------------------------
stable/9/ r301055
releng/9.3/ r301049
stable/10/ r301054
releng/10.1/ r301050
releng/10.2/ r301051
releng/10.3/ r301052
- -------------------------------------------------------------------------

To see which files were modified by a particular revision, run the
following command, replacing NNNNNN with the revision number, on a
machine with Subversion installed:

# svn diff -cNNNNNN --summarize svn://svn.freebsd.org/base

Or visit the following URL, replacing NNNNNN with the revision number:

<URL:https://svnweb.freebsd.org/base?view=revision&revision=NNNNNN>

VII. References

<URL:http://cturt.github.io/compat-info-leaks.html>

The latest revision of this advisory is available at
<URL:https://security.FreeBSD.org/advisories/FreeBSD-SA-16:20.linux.asc>
-----BEGIN PGP SIGNATURE-----
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=bohu
-----END PGP SIGNATURE-----
_______________________________________________
freebsd-announce@freebsd.org mailing list
https://lists.freebsd.org/mailman/listinfo/freebsd-announce
To unsubscribe, send any mail to "freebsd-announce-unsubscribe@freebsd.org"

[USN-2987-1] GD library vulnerabilities

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v2
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=nH9U
-----END PGP SIGNATURE-----
==========================================================================
Ubuntu Security Notice USN-2987-1
May 31, 2016

libgd2 vulnerabilities
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 16.04 LTS
- Ubuntu 15.10
- Ubuntu 14.04 LTS
- Ubuntu 12.04 LTS

Summary:

The GD library could be made to crash or run programs if it processed a
specially crafted image file.

Software Description:
- libgd2: GD Graphics Library

Details:

It was discovered that the GD library incorrectly handled certain color
tables in XPM images. If a user or automated system were tricked into
processing a specially crafted XPM image, an attacker could cause a denial
of service. This issue only affected Ubuntu 12.04 LTS and Ubuntu 14.04 LTS.
(CVE-2014-2497)

It was discovered that the GD library incorrectly handled certain malformed
GIF images. If a user or automated system were tricked into processing a
specially crafted GIF image, an attacker could cause a denial of service.
This issue only affected Ubuntu 12.04 LTS and Ubuntu 14.04 LTS.
(CVE-2014-9709)

It was discovered that the GD library incorrectly handled memory when using
gdImageFillToBorder(). A remote attacker could possibly use this issue to
cause a denial of service. (CVE-2015-8874)

It was discovered that the GD library incorrectly handled memory when using
gdImageScaleTwoPass(). A remote attacker could possibly use this issue to
cause a denial of service. This issue only applied to Ubuntu 14.04 LTS,
Ubuntu 15.10 and Ubuntu 16.04 LTS. (CVE-2015-8877)

Hans Jerry Illikainen discovered that the GD library incorrectly handled
certain malformed GD images. If a user or automated system were tricked
into processing a specially crafted GD image, an attacker could cause a
denial of service or possibly execute arbitrary code. (CVE-2016-3074)

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 16.04 LTS:
libgd3 2.1.1-4ubuntu0.16.04.1

Ubuntu 15.10:
libgd3 2.1.1-4ubuntu0.15.10.1

Ubuntu 14.04 LTS:
libgd3 2.1.0-3ubuntu0.1

Ubuntu 12.04 LTS:
libgd2-noxpm 2.0.36~rc1~dfsg-6ubuntu2.1
libgd2-xpm 2.0.36~rc1~dfsg-6ubuntu2.1

In general, a standard system update will make all the necessary changes.

References:
http://www.ubuntu.com/usn/usn-2987-1
CVE-2014-2497, CVE-2014-9709, CVE-2015-8874, CVE-2015-8877,
CVE-2016-3074

Package Information:
https://launchpad.net/ubuntu/+source/libgd2/2.1.1-4ubuntu0.16.04.1
https://launchpad.net/ubuntu/+source/libgd2/2.1.1-4ubuntu0.15.10.1
https://launchpad.net/ubuntu/+source/libgd2/2.1.0-3ubuntu0.1
https://launchpad.net/ubuntu/+source/libgd2/2.0.36~rc1~dfsg-6ubuntu2.1

[USN-2986-1] dosfstools vulnerabilities

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v2
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=caus
-----END PGP SIGNATURE-----
==========================================================================
Ubuntu Security Notice USN-2986-1
May 31, 2016

dosfstools vulnerabilities
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 16.04 LTS
- Ubuntu 15.10
- Ubuntu 14.04 LTS
- Ubuntu 12.04 LTS

Summary:

dosfstools could be made to crash or run programs if it processed a
specially crafted filesystem.

Software Description:
- dosfstools: utilities for making and checking MS-DOS FAT filesystems

Details:

Hanno Böck discovered that dosfstools incorrectly handled certain malformed
filesystems. A local attacker could use this issue to cause dosfstools to
crash, resulting in a denial of service, or possibly execute arbitrary
code.

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 16.04 LTS:
dosfstools 3.0.28-2ubuntu0.1

Ubuntu 15.10:
dosfstools 3.0.28-1ubuntu0.1

Ubuntu 14.04 LTS:
dosfstools 3.0.26-1ubuntu0.1

Ubuntu 12.04 LTS:
dosfstools 3.0.12-1ubuntu1.3

In general, a standard system update will make all the necessary changes.

References:
http://www.ubuntu.com/usn/usn-2986-1
CVE-2015-8872, CVE-2016-4804

Package Information:
https://launchpad.net/ubuntu/+source/dosfstools/3.0.28-2ubuntu0.1
https://launchpad.net/ubuntu/+source/dosfstools/3.0.28-1ubuntu0.1
https://launchpad.net/ubuntu/+source/dosfstools/3.0.26-1ubuntu0.1
https://launchpad.net/ubuntu/+source/dosfstools/3.0.12-1ubuntu1.3

[CentOS-announce] CESA-2016:1137 Important CentOS 5 openssl Security Update

CentOS Errata and Security Advisory 2016:1137 Important

Upstream details at : https://rhn.redhat.com/errata/RHSA-2016-1137.html

The following updated files have been uploaded and are currently
syncing to the mirrors: ( sha256sum Filename )

i386:
631e91525505003d8b42dfc52fd9b1423aa4f62b52fe0a99b179fc7ca5d402df openssl-0.9.8e-40.el5_11.i386.rpm
91707deacf653a4c5e1ee71bfe78c312ddaf1ced22598aa0ed9364b801a95f75 openssl-0.9.8e-40.el5_11.i686.rpm
b14fb301e7bb528ac9f12862471875a8a937e557437bf5dfeeb5bf45ba62a7a0 openssl-devel-0.9.8e-40.el5_11.i386.rpm
7f74ee4c3eb94f41034d716729f5a922301984327d3c7e1398d625e3d9828071 openssl-perl-0.9.8e-40.el5_11.i386.rpm

x86_64:
91707deacf653a4c5e1ee71bfe78c312ddaf1ced22598aa0ed9364b801a95f75 openssl-0.9.8e-40.el5_11.i686.rpm
4b01840b72a7ee82f9a3eb20df16106e3c0fdfcd0fb83457487a740fb4774413 openssl-0.9.8e-40.el5_11.x86_64.rpm
b14fb301e7bb528ac9f12862471875a8a937e557437bf5dfeeb5bf45ba62a7a0 openssl-devel-0.9.8e-40.el5_11.i386.rpm
e2fd36a8953c239a4526ee747fcef4faf0e52ba5c8c3a870bf3d05895ee19e72 openssl-devel-0.9.8e-40.el5_11.x86_64.rpm
3bad2a15cbbb096392eb97d9a414aae6b05edacc290ae266b2bbc47a875cf0b2 openssl-perl-0.9.8e-40.el5_11.x86_64.rpm

Source:
603c7be208dc0cb4de26b9db6a29d6aa9bf796d0227ee58d81a0c07038ef1bfe openssl-0.9.8e-40.el5_11.src.rpm



--
Johnny Hughes
CentOS Project { http://www.centos.org/ }
irc: hughesjr, #centos@irc.freenode.net
Twitter: JohnnyCentOS

_______________________________________________
CentOS-announce mailing list
CentOS-announce@centos.org
https://lists.centos.org/mailman/listinfo/centos-announce

[CentOS-announce] CESA-2016:1139 Moderate CentOS 7 squid Security Update

CentOS Errata and Security Advisory 2016:1139 Moderate

Upstream details at : https://rhn.redhat.com/errata/RHSA-2016-1139.html

The following updated files have been uploaded and are currently
syncing to the mirrors: ( sha256sum Filename )

x86_64:
431c4c5b1d7c4795b0597f7a655c44e03db6cd573082375d28bb9eac9e527f4e squid-3.3.8-26.el7_2.3.x86_64.rpm
1c04bd54d4b10395d2c3e78a6e00ef49a7123a4347edf5aa70f57e71a87528c1 squid-sysvinit-3.3.8-26.el7_2.3.x86_64.rpm

Source:
fa239d6add7aeb21c9bceb300207e173ce7dbca3a6bd73c52266571d58e7ec91 squid-3.3.8-26.el7_2.3.src.rpm



--
Johnny Hughes
CentOS Project { http://www.centos.org/ }
irc: hughesjr, #centos@irc.freenode.net
Twitter: @JohnnyCentOS

_______________________________________________
CentOS-announce mailing list
CentOS-announce@centos.org
https://lists.centos.org/mailman/listinfo/centos-announce

[CentOS-announce] CESA-2016:1141 Moderate CentOS 7 ntp Security Update

CentOS Errata and Security Advisory 2016:1141 Moderate

Upstream details at : https://rhn.redhat.com/errata/RHSA-2016-1141.html

The following updated files have been uploaded and are currently
syncing to the mirrors: ( sha256sum Filename )

x86_64:
afb3dfae974c95e885c4f6335cd06f21263224ae21bff8bd2a5c54d5dde44d00 ntp-4.2.6p5-22.el7.centos.2.x86_64.rpm
46cc107c74c97c07bbbf1275133cc0e1b6a5598fa53bb34650e7f7559a49a36e ntpdate-4.2.6p5-22.el7.centos.2.x86_64.rpm
f916317311a69c1fc27d297a15df69002e0a92ae91f290bed52ac99bf3ff3dab ntp-doc-4.2.6p5-22.el7.centos.2.noarch.rpm
aad649a9c029e0fc173d24eaa3e548524f3cbe7271128ebd571d9535b2a9d38a ntp-perl-4.2.6p5-22.el7.centos.2.noarch.rpm
d2c4d2d7472eb1a732e68cec9f7e60bc17d356bc879e3b23a69faf607793a995 sntp-4.2.6p5-22.el7.centos.2.x86_64.rpm

Source:
ccbc05d3874452e7c1e9b72fac58c4fc5f69d9a37cf77c5b7ffe34d6416acfe2 ntp-4.2.6p5-22.el7.centos.2.src.rpm



--
Johnny Hughes
CentOS Project { http://www.centos.org/ }
irc: hughesjr, #centos@irc.freenode.net
Twitter: @JohnnyCentOS

_______________________________________________
CentOS-announce mailing list
CentOS-announce@centos.org
https://lists.centos.org/mailman/listinfo/centos-announce

[CentOS-announce] CESA-2016:1141 Moderate CentOS 6 ntp Security Update

CentOS Errata and Security Advisory 2016:1141 Moderate

Upstream details at : https://rhn.redhat.com/errata/RHSA-2016-1141.html

The following updated files have been uploaded and are currently
syncing to the mirrors: ( sha256sum Filename )

i386:
8cb6eac95c0d760035a5b251c4f6f72920d0c23766e98c845885ea91d4a69f08 ntp-4.2.6p5-10.el6.centos.1.i686.rpm
45f7a3ef55eff1448bdc1e6dd7e7d8db030461562643b6df33d82f59b3eb20da ntpdate-4.2.6p5-10.el6.centos.1.i686.rpm
27f007b3249dcb28a17938d3d09ef2534c30c9106b21515849a44dada7aebdbd ntp-doc-4.2.6p5-10.el6.centos.1.noarch.rpm
f9cb8483b4f76c243ab2b3dd60b37d43444425fd9df60f46c01c720cd04774fc ntp-perl-4.2.6p5-10.el6.centos.1.i686.rpm

x86_64:
e4177b6e3734069c1ee814bd358b92c9fb81d66b80ce02b687df4579174d8abe ntp-4.2.6p5-10.el6.centos.1.x86_64.rpm
7179b002333ae35af41f07b70c1d6c87407d446645038ec70f401fc178fc69f2 ntpdate-4.2.6p5-10.el6.centos.1.x86_64.rpm
27f007b3249dcb28a17938d3d09ef2534c30c9106b21515849a44dada7aebdbd ntp-doc-4.2.6p5-10.el6.centos.1.noarch.rpm
281370467116872d146d319ee7687896e59db493724b51ed3b9fac10b6d1787d ntp-perl-4.2.6p5-10.el6.centos.1.x86_64.rpm

Source:
f8d4b4a86e65c984352cd0c1b79bbbb518f986112f8ee91a2e2d953c270fc307 ntp-4.2.6p5-10.el6.centos.1.src.rpm



--
Johnny Hughes
CentOS Project { http://www.centos.org/ }
irc: hughesjr, #centos@irc.freenode.net
Twitter: @JohnnyCentOS

_______________________________________________
CentOS-announce mailing list
CentOS-announce@centos.org
https://lists.centos.org/mailman/listinfo/centos-announce

[CentOS-announce] CESA-2016:1140 Moderate CentOS 6 squid34 Security Update

CentOS Errata and Security Advisory 2016:1140 Moderate

Upstream details at : https://rhn.redhat.com/errata/RHSA-2016-1140.html

The following updated files have been uploaded and are currently
syncing to the mirrors: ( sha256sum Filename )

i386:
8b20601c95dc356ab1bb2b087331ee432f10cc567eb7503bef2e37891e18f03d squid34-3.4.14-9.el6_8.3.i686.rpm

x86_64:
50ccde2efa8f46ef1c4dabba442427aa812ce24ecdf202e1390346dc190659b7 squid34-3.4.14-9.el6_8.3.x86_64.rpm

Source:
304814481410fe9686f28f996c09882e794901d99aa3b509e92753ee683abf4c squid34-3.4.14-9.el6_8.3.src.rpm



--
Johnny Hughes
CentOS Project { http://www.centos.org/ }
irc: hughesjr, #centos@irc.freenode.net
Twitter: @JohnnyCentOS

_______________________________________________
CentOS-announce mailing list
CentOS-announce@centos.org
https://lists.centos.org/mailman/listinfo/centos-announce

[CentOS-announce] CESA-2016:1138 Moderate CentOS 6 squid Security Update

CentOS Errata and Security Advisory 2016:1138 Moderate

Upstream details at : https://rhn.redhat.com/errata/RHSA-2016-1138.html

The following updated files have been uploaded and are currently
syncing to the mirrors: ( sha256sum Filename )

i386:
e47c5002da71e2ae26beb75c5606d5014c2d9bd6c9e2372ab770a73af0194567 squid-3.1.23-16.el6_8.4.i686.rpm

x86_64:
d4a0380af389fc303e5db2764893651d0f8f320e22af7e240346e99379213a01 squid-3.1.23-16.el6_8.4.x86_64.rpm

Source:
17e493babcd6f109e5feb8087ebbc60e5d4c938cb8a071343e134204cedb4079 squid-3.1.23-16.el6_8.4.src.rpm



--
Johnny Hughes
CentOS Project { http://www.centos.org/ }
irc: hughesjr, #centos@irc.freenode.net
Twitter: @JohnnyCentOS

_______________________________________________
CentOS-announce mailing list
CentOS-announce@centos.org
https://lists.centos.org/mailman/listinfo/centos-announce

Monday, May 30, 2016

OpenNTPD 6.0p1 available

OpenNTPD 6.0p1 has just been released. It will be available from the mirrors
listed at http://www.openntpd.org/ shortly.

OpenNTPD is a FREE, secure, and easy to use implementation of the Network Time
Protocol. It provides the ability to sync the local clock to remote NTP servers
and can act as NTP server itself, redistributing the local clock.

Changes since OpenNTPD 5.9p1
============================

* Fixed a link failure on older Linux distributions and a build
failure on FreeBSD.
* Set MOD_MAXERROR to avoid unsynced time status when using
ntp_adjtime.
* Fixed HTTP Timestamp header parsing to use strptime in a more
portable fashion.
* Hardened TLS for ntpd constraints, enabling server name
verification. Thanks to Luis M. Merino.

The libtls library, as shipped with LibreSSL 2.3.2 or later, is
required to use the HTTPS constraint feature, though it is not
required to use OpenNTPD.

For detailed changes, see the changes either in the OpenBSD CVS repository or
the GitHub mirror.

Checksums:
==========

SHA256 (openntpd-6.0p1.tar.gz) = b1ab80094788912adb12b33cb1f251cc58db39294c1b5c6376972f5f7ba577e8

Reporting Bugs:
===============

General bugs may be reported to tech@openbsd.org

Portable bugs may be filed at https://github.com/openntpd-portable/openntpd-portable/

reallost1.fbsd2233449:管理的目的是什么?


                    新任经理、部门经理全面管理技能提升训练

【时间地点】 2016年6月17-18深圳


【参加对象】 新上任主管、经理,储备人员,部门经理/主管,职能经理,技术经理,企业中高层...
【学习费用】 3200   /人, (含课程讲义、午餐、茶点等)
垂·询·热·线:0755-61280006 、189-1787-0808     许先生      QQ/微信:320588808     
   注:如不需此类信件信息,请转发送"删除"至tuiding02@163.com,我们会及时处理,谢谢您的理解。

课程背景:
  企业的发展壮大,需要管理干部的快速成长;面对越来越激烈的市场竞争,需要管理干部的管理水平快上台阶。许多企业的中层管理干部,尤其是新任的主管经理,从专业岗位转换为主管经理后,对管理工作及管理角色的认识不到位,管理工作片面而被动,没有真正把管理的责任担当起来。有些中层管理干部虽然具有管理意识,但缺思路,缺方法,缺动作,管事带人效果不佳,事情没做好,人员没留住,团队不成型,积极性不高,凝聚力不够,归属感不强,干部自身忙而累,累而烦,久而久之麻木倦怠! 
  新任经理全面管理技能提升训练培训帮助新任经理、主管等企业管理干部,系统理解管理的逻辑性,站在整体角度,把握管理角色,理解人事管理的相辅相成,分析问题,梳理思路,探讨方法,演练工具,帮助缩短中层干部的成长周期,减少管理失误,提高管理效率,以适应市场竞争形势和企业的快速发展!

培训收益:
1、建立对管理的整体和系统思维,理解从问题,思路,系统,方法,到动作的管理线索
2、理解中层管理者在企业里应承担的责任,角色身份,应表现出的态度和意识
3、掌握把工作管好的方法和技巧 – 计划,组织,控制,创新
4、掌握带人带团队的方法 – 培养训练,沟通互动,团队氛围营造,激励设计
5、促进自我提升 – 有效管理时间,职业认识,个人修炼

课程大纲:
第一部分 自我管理
一、管理与角色认知
从专业走向管理后,如何实现角色转换?
管理的目的是什么?
中基层管理者,要承担哪些管理责任?
中基层管理者如何确立自己对上,对下,对中的身份定位?
中层管理者如何避免角色行为误区?
【讨论互动】: 你是如何理解管理及角色的?
二、管理者工作方法
时间管理与工作统筹
时间分析:我的时间用的有效吗?
时间管理的四个象限
四个象限的策略和目标
管理者如何识别轻重缓急?
好钢用在刀刃上 – 如何抓住工作的重中之重?
管理者如何做好工作统筹?
其他常用工作方法
结构分解法
项目管理法
目标管理法
PDCA
5W3H
SMART

第二部分 工作管理
一、工作管理 – 工作计划
计划为何重要?
制定计划的步骤
如何做工作分解?
工作评估与安排
【工具演练】:用WBS工具做工作策划与分解
【工具模板】:WBS参考模板
二、工作管理 – 工作组织
什么是工作组织?组织的目的是什么?
企业组织设计
企业工作组织
企业工作组织中的问题
工作组织原则
三、工作管理 – 执行控制
企业执行力差的管理因素
【讨论互动】:执行不力的管理因素
工作执行控制的策略
工作控制方法与工具
分段控制法
三要素控制法
稽核控制法
【工具演练】:控制卡设计练习
【参考工具】:三要素控制卡
【案例分析】: 三要素控制卡工具的应用
【案例分析】: 分段控制法应用
【案例分析】:稽核控制法应用
目标管理与绩效考核法
什么是目标管理?
目标来自哪里?
结果可衡量性?
考核规则?
目标共识性?
绩效考核的关键问题
数据的真实准确性?
考核与面谈注意事项
奖惩合理性
四、工作管理 – 工作改善
改进,变革与创新意识
建立创新机制

第三部分 人员与团队管理
一、沟通技能
对上沟通
了解上司
接受命令,请示建议,汇报工作
如何配合上司?
平行沟通协调
案例分析:工作协作协调中的首要问题是什么?
平级关系沟通中应切记的三条原则
如何应对办公室政治?
沟通方法技巧
沟通如何准备?
倾听的技巧
表达的技巧
赞美的技巧
二、团队管理 – 领导力发挥
什么是领导力?
领导与管理的区别
领导力来源于什么?
管理者如何提升领导力素质,发挥领导作用?
什么样的品质更受下属敬重?
什么样的行为要以身作则?
哪些能力必须修炼?
心智修炼
三、团队管理 – 员工管理
员工管理策略
打破盲人摸象式的员工管理思维!
管不住事能管好人吗?
如何应用原则性与灵活性结合?
推拉帮管组合拳
什么是德主刑辅的管理思维?
员工管理案例分析讨论:
新任主管的挑战?
个性专家员工?
老油条,有后台?
如何处理法不责众?
在下属面前没有威信怎么办?
四、团队管理 – 员工培育
1、抓思想
如何使员工认同企业?
工作中的意识问题?
引导员工的职业观,企业观,人生价值观?
调整员工心态与情绪?
2、带作风
如何带出一支雷厉风行,敢打硬仗的队伍?
如何训练良好的行为习惯?
3、提升能力
如何帮助员工建立职业理想?
管不住事能管好人吗?
如何让员工在工作中成长?
【案例分析】:华为,海尔的晋升通道与任职资格体系
【模板参考】:岗位能力分析
五、团队管理 -- 团队环境建设
1、团队环境建设与团队文化建设
2、环境对人的影响
3、优秀团队的环境特征
4、如何塑造团队环境?
价值观宣传
领导骨干的作用
制度与平台
环境建设的管理策略
六、员工管理 – 员工激励
马斯洛需求层次理论在员工需求中的体现?
如何把握员工需求?
激励员工的方法措施
物质激励是基础 – 公正评价,合理报酬,帮助员工增加收入!
让员工成长 – 个性化的培养
放大感受价值 – 关注感受与感情!
【案例分析】:企业员工激励方案和措施若干
如何激发员工 – 激励员工的12剧场
【模板工具】:12剧场激励设计方法

讲师介绍:【曹礼明】
强调落地的动作化训练导师!
中山大学MBA,中国首批PMP认证资格人员,知名企业管理培训导师。
20多年的企业工作与管理实践经验,先后在国企、合资、外资、民企担任研发经理、部门经理、人力资源总监、生产及运营总监、常务副总等职。
从事企业管理咨询顾问5年,帮助企业进行管 理变革和管理干部队伍训练。曹老师融合中西方管理理念和方法,擅长将西方管理理论与中国企业实际相结合,以结果和管理有效性为导向,注重方法、策略、措施与实际情况相结合,追求对企业产生实际效果。
  曹礼明老师认为企业管理干部管理知识和思维固然重要,如果不能落地,不能应用在工作中解决问题,那么价值有限,事倍功半!
  企业要解决管理上的"最后一公里"问题,必须在如何落地,如何做管理动作上下工夫!曹老师的训练强调找问题,做动作,追求学用结合!
  曹礼明老师在企业执行力提升,中高层领导力,团队打造,团队文化建设,干部管理技能训练等方面有丰富经验。他曾主持了多家企业的管理咨询辅导,使企业从管理混乱失控、业绩停滞不前、人员自由涣散的状态,逐步改变成制度规范、流程控制有效、企业业绩显著提升、企业凝聚力增强的崭新企业。
  曹礼明老师自从事企业管理培训以来,内外训课程数百场,受训人数上万人,其中《新任经理全面管理技能提升训练》公开课二百余期,《MTP中层管理训练》内 训上百期,内训结合企业实际情况和解决学员问题而深受好评。

主要课程:
《新任经理全面管理技能提升训练》、《中层管 理MTP训练》、《中高层领导力》、《中层执行力》、《中层选用育留》、《中层带团队》、《管理沟通与协调》、《中层核心工作能力提升》、《团队管理与人员激励》、《生产经理、主管实战管理技能提升训练》等课程。

Sunday, May 29, 2016

libcrypto errata update

A bug in the previous libcrypto errata caused an error when reading
ASN.1 elements over 16kb.

Patches for OpenBSD are available. Updated LibreSSL-portable releases
will be available later.

http://ftp.openbsd.org/pub/OpenBSD/patches/5.9/common/009_crypto.patch.sig

http://ftp.openbsd.org/pub/OpenBSD/patches/5.8/common/015_crypto.patch.sig

Friday, May 27, 2016

Fedora 24 Final Freeze (2016-05-31)

Hi all,

Tuesday May 31st 2016 is an important day on the Fedora 24 schedule[1], with
significant cut-offs.

Tuesday is the Final Freeze[2]. This means that only packages which
fix accepted blocker or freeze exception bugs[3][4] will be marked as
'stable' and included in the Final composes. Other builds will remain
in updates-testing until the Final release is approved, at which point
the Final freeze is lifted and packages can move to the 'updates' repository,
pending updates will be pushed before final release as zero day updates.

The final stable push before freeze will happen shortly after 2016-05-31
00:00:00 Please get all updates you want included requested for stable in
bodhi[5] before then.

Regards

Dennis

[1] https://fedoraproject.org/wiki/Releases/24/Schedule
[2] https://fedoraproject.org/wiki/Milestone_freezes
[3] https://fedoraproject.org/wiki/QA:SOP_blocker_bug_process
[4] https://fedoraproject.org/wiki/QA:SOP_freeze_exception_bug_process
[5] https://bodhi.fedoraproject.org/

Planned Outage: database outage - 2016-05-27 21:00 UTC

Planned Outage: database outage - 2016-05-27 21:00 UTC

There will be an outage starting at 2016-05-27 21:00 UTC, which will
last approximately 1 hour or less.

To convert UTC to your local time, take a look at
http://fedoraproject.org/wiki/Infrastructure/UTCHowto
or run:

date -d '2016-05-27 21:00 UTC'

Reason for outage:

We need to add disk space to one of our primary database servers. This
will ensure it has sufficient space for the upcoming ramp up to Fedora
24 Final release. This outage should be very short.

Affected Services:

fedocal
fedora tagger
kerneltest
mailman3/hyperkitty
koschei
mirrormanager web interface
fedora notifications service
nuancier
pdc
pkgdb2
badges

Services not listed are not affected by this outage.

Contact Information: https://fedorahosted.org/fedora-
infrastructure/ticket/5327

Ticket Link:

Please join #fedora-admin or #fedora-noc on irc.freenode.net or add
comments to the ticket for this outage above.

F25 Self Contained Change: Koji Generates Installation Media

= Proposed Self Contained Change: Koji Generates Installation Media =
https://fedoraproject.org/wiki/Changes/KojiInstallMedia

Change owner(s):
* Jay Greguske <jgregusk with the usual red hat domain>

Extend Koji with a new feature that allows users to create
installation media for various architectures.

== Detailed Description ==
This is a significant enabler for generating DVD media, other ISOs,
and images more efficiently. It also allows other tools such as mash
or pungi to offload much of the heavy-lifting to the build system.
Longer term, we may be able to reduce the number of tools needed to
manufacture Fedora releases.

== Scope ==
Proposal owners:
* to implement this change

Release engineering:
* This feature does require coordination with release engineering
(e.g. changes to installer image generation or update package
delivery.)
--
Jan Kuřík
Platform & Fedora Program Manager
Red Hat Czech s.r.o., Purkynova 99/71, 612 45 Brno, Czech Republic
_______________________________________________
devel-announce mailing list
devel-announce@lists.fedoraproject.org
https://lists.fedoraproject.org/admin/lists/devel-announce@lists.fedoraproject.org

Thursday, May 26, 2016

reallost1.fbsd2233449:全 能 型 车 间 主 任 50650

                      全 能 型 车 间 主 任 -- 实战技能训练


【参加对象】 企业厂长、制造业生产总监、生产经理、车间主任及生产制造主管及一线干部
【时间地点】 2016年6月04-05上海
【授课方式】 讲师讲授 + 视频演绎 + 案例研讨 +角色扮演 + 讲师点评
【学习费用】 3200/人(含课程讲义、午餐、茶点等)
垂询热线:上海:021-31006787    189-1787 0808    许先生
QQ/微信:320588808     

注:如不需此类信件信息,请转发送"删除"至tuiding02@163.com,我们会及时处理,谢谢您的理解。

课程背景:
  《全能型车间主任实战技能训练》课程在全国推广五年以来,深受国内外企业的菁莱。在全国成功举办公开课近百场次,并被很多企业引进为内训课程,尤其是中字头企业和装备制造业。在举办过程中,学员对该课程和讲师的评价可综合为六个字"实在"、"实用"、"实战"。四年的发展、四年的发现、四年的变化,使该课程的开发者――陈志华老师有了更多的感悟与提升。为了进一步加强该课程的实用性、系统性和科学性,陈志华老师对课程作了更一步的完善。现在您看到的是2013版《全能型车间主任实战技能训练》课程大纲。
  2014版《全能型车间主任实战技能训练》以科学管理为纲、以系统化为领、以鲜活的现状为例,助力广大学员改变用"习惯性思维"做管理,凭"过往经验"办事情的风格。学习和掌握科学的理念、系统、方法、工具,并灵活地运用到实际工作中去。从此改变车间工作忙而乱,类似问题天天有,不同问题相同对策的格局。

课程大纲:
第一讲 基层领导角色认知与管理认知
问题讨论
为什么我们总是很忙?
为什么忙的时候只知道加班、加人、加设备?
我们凭什做管理?(理念、系统、方法、工具?)
传统管理与科学管理究竟有何区别?

领导的自我认知与任务
车间主任与班长到底是不是真正的领导?
领导到底是人手还是人才?
领导的三大主要标志是什么?
领导的必备的两大基本条件是什么?
领导的三件事与两大任务?

管理的三种认识
过程与手段(管理为何与时间息息相关?)
技术与艺术(如何让部下对你的管理感兴趣?)
行为与借力(上下级与相邻部门如何借力?)
经典分享(减少超负荷加班的八大要点)
班(组)长工作力不从心的原因分析
时间有效利用率低下的八大原因分析
  
第二讲 工作职责神圣化与班组管理
车间主任的四种身份角色
对待企业与报酬的两种心态
对待下属与下属的三种心态
实战训练:如何管理好你的班长?
  班长有哪四种不称职表现?
  班长为什么总是忙而乱?
  班长最喜欢的工作方式是什么?
  工作技巧:班长协调的劣势与最佳范围
  现场管理中的"定员定岗"有何特别要求?
  为什么游离状态的作业没有工作效率?
  经典分享
  现场管理"三不坚守原则"决定产能释放
  
第三讲 钱,在哪里?怎么来!——权威观点的价值
管理者管理效率——被勿视的西瓜
管理者管理思路——一个中心两个基本点
管理者管理方法——重经验凭习惯
没有结局的结局——布局决定结局
员工的生产效率——只有强化没有改善
新产品的研发  ——没有可批量制造性
  
  抢:抢时间永远都不犯法
  省:省出的钱都是净利益
  盯:盯出的效率成本最低
  挖:挖出的效益最有价值
  
  
第四讲 质量与效率的分析与长效控制手法
生产效率与生产能力识别
生产方式与生产原理识别
什么是流线化与流程化?
(乱流、倒流、绕流的形成分析与对策)
什么是标准化的现场管理?
什么是标准化作业?
什么是作业标准化?
经济动作的三不原则?   
       
经典分享:
车产物流管理的"三不政策"
平衡效率与平衡损失率的计算与意义
生产线不平衡管的十大原因分析
  
第五讲 后员工管理与工作教导的四阶段法
———员工为什么会犯错?
———员工为什么会流失?
———怎样才能管理好你的员工?
      上司最不妥当的"八大肢体语言"
      上司最不妥当的"十大口头语言"
      上司尊重员工人格的"十大要点"
      面对员工要胁的"五大对策"
———工作教导"四阶段法"的应用

经典分享
人的第一资产是什么以及对管理的启发?

第六讲 把握N种管理理念/体系构筑的精髓
观念:ISO9000的效用是提升企业的体质
问题:为什么只求证书不求正本?

问题讨论:
1)精益生产到底是什么?(TPS、JIT、看板生产?)
2)到底是不是精益创造了TOYOTA神话?
3)精益生产的核心思想和核心思路到底是什么?
4)为什么只能是"5S"而不是"6S、7S"
5)5S管理为什么总是一动就还原?
6)5S管理的精髓与终极目的是什么?               

经典分享:
车间物品摆放的"三不管理原则"?
学员课后作业或实践(感悟与收获)

(一)感悟部份
1、对于工作中出现的问题,我们通常更多地归根于"沟通不行"、"协调不当"、"执行能力差"等问题。从表面上看确实是这些问题。只要仔细想想,也许你会悟出一些疑问:难道人与人之间就那么难以沟通吗?部门之间难道就那么难以协调吗?属下难道就不想把工作尽快完成吗?对此问题你有何感想?

2、如果说管理是一门艺术,而艺术最精华的就是创意。作为一名中基层领导者,面对新生代或者另类的员工群体,在过往的管理过程中所做的一切到底是你或你的上司感兴趣,还是先让员工感兴趣呢?管理的创意你有了吗?员工对你的管理感兴趣了吗?你打算做何努力?

3、通过该课程我们已经知道了人的第一资产是人格尊严。理解起来其实很容易,可是做起来真的很难。在今后的工作中你打算怎样去保护好员工的人格尊严。
  
(二)实践部份
1、尽管中国企业的一线员工其实已经很优秀了,但在工厂或车间只要出现质量问题或者是交期问题,员工还是罪责难逃。本课程完后你回到公司抽四个小时的时间站到一个视觉良好的地方观察一下你的员工作业的状态,就会明白为什么质量不稳定,为什么看上去热火朝天却总是交不出货。请你观察后找出原因并划清罪责。

2、本课程完成后请你回到公司用一张A3的纸把你的车间平面图划下来。再用半天的时间观察车间的实际人流、物流、信息流现状,并把每一次流动路线在A3纸上进行连接。请你再看看那张平面图是什么状况,并由此推断你到底出了什么问题。

3、目前中国工厂每天几乎只在为一个问题忙碌,那就是赶货!到底是订单量太大没法承受,还是的确生产能力有限,或者是生产效率太低呢?这个问题恐怕所有人都能答得上来,更恐怕没有几个人答的是对的。如果所有人都答对了,那为什么还是天天这样?对此你有何感想?

讲师介绍:【陈志华】
工商管理硕士,国内制造管理专家师

工作经历:
  曾在全球最大的线圈制造商胜美达(SUMIDA)、日本卡西欧电子(CASIO)任职达13年,历任生产主管、品质主管,生产经理、制造总经理等;曾师从小川一也(日本能率协会管理中心专家, 日本WF&IE研究第一人,日本制造业研究的国宝级人物)专门研习标准工时与动作研究曾先后多次被派往日本和新加坡进修及培训(丰田JIT生产方式,对NPS有系统及深入研究和实践), 陈老师尤其擅长现场一体化管理(计划,成本,纳期,质量,技术,人员)

主讲课程:
  《构筑高精度标准工时ST管理系统》、《多技能员工培养体系》、《多批少量生产方式实务》、《微利时代的精细化现场管理》、《全能班组长训练》等,主要出版物《反省中国式工厂管理》、《挑战80后管理》等。

[USN-2985-2] GNU C Library regression

==========================================================================
Ubuntu Security Notice USN-2985-2
May 26, 2016

eglibc, glibc regression
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 15.10
- Ubuntu 14.04 LTS
- Ubuntu 12.04 LTS

Summary:

USN-2985-1 introduced a regression in the GNU C Library.

Software Description:
- glibc: GNU C Library
- eglibc: GNU C Library

Details:

USN-2985-1 fixed vulnerabilities in the GNU C Library. The fix for
CVE-2014-9761 introduced a regression which affected applications that
use the libm library but were not fully restarted after the upgrade.
This update removes the fix for CVE-2014-9761 and a future update
will be provided to address this issue.

We apologize for the inconvenience.

Original advisory details:

Martin Carpenter discovered that pt_chown in the GNU C Library did not
properly check permissions for tty files. A local attacker could use this
to gain administrative privileges or expose sensitive information.
(CVE-2013-2207, CVE-2016-2856)

Robin Hack discovered that the Name Service Switch (NSS) implementation in
the GNU C Library did not properly manage its file descriptors. An attacker
could use this to cause a denial of service (infinite loop).
(CVE-2014-8121)

Joseph Myers discovered that the GNU C Library did not properly handle long
arguments to functions returning a representation of Not a Number (NaN). An
attacker could use this to cause a denial of service (stack exhaustion
leading to an application crash) or possibly execute arbitrary code.
(CVE-2014-9761)

Arjun Shankar discovered that in certain situations the nss_dns code in the
GNU C Library did not properly account buffer sizes when passed an
unaligned buffer. An attacker could use this to cause a denial of service
or possibly execute arbitrary code. (CVE-2015-1781)

Sumit Bose and Lukas Slebodnik discovered that the Name Service
Switch (NSS) implementation in the GNU C Library did not handle long
lines in the files databases correctly. A local attacker could use
this to cause a denial of service (application crash) or possibly
execute arbitrary code. (CVE-2015-5277)

Adam Nielsen discovered that the strftime function in the GNU C Library did
not properly handle out-of-range argument data. An attacker could use this
to cause a denial of service (application crash) or possibly expose
sensitive information. (CVE-2015-8776)

Hector Marco and Ismael Ripoll discovered that the GNU C Library allowed
the pointer-guarding protection mechanism to be disabled by honoring the
LD_POINTER_GUARD environment variable across privilege boundaries. A local
attacker could use this to exploit an existing vulnerability more easily.
(CVE-2015-8777)

Szabolcs Nagy discovered that the hcreate functions in the GNU C Library
did not properly check its size argument, leading to an integer overflow.
An attacker could use to cause a denial of service (application crash) or
possibly execute arbitrary code. (CVE-2015-8778)

Maksymilian Arciemowicz discovered a stack-based buffer overflow in the
catopen function in the GNU C Library when handling long catalog names. An
attacker could use this to cause a denial of service (application crash) or
possibly execute arbitrary code. (CVE-2015-8779)

Florian Weimer discovered that the getnetbyname implementation in the GNU C
Library did not properly handle long names passed as arguments. An attacker
could use to cause a denial of service (stack exhaustion leading to an
application crash). (CVE-2016-3075)

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 15.10:
libc-bin 2.21-0ubuntu4.3
libc6 2.21-0ubuntu4.3
libc6-dev 2.21-0ubuntu4.3

Ubuntu 14.04 LTS:
libc-bin 2.19-0ubuntu6.9
libc6 2.19-0ubuntu6.9
libc6-dev 2.19-0ubuntu6.9

Ubuntu 12.04 LTS:
libc-bin 2.15-0ubuntu10.15
libc6 2.15-0ubuntu10.15
libc6-dev 2.15-0ubuntu10.15

After a standard system update you need to reboot your computer to
make all the necessary changes.

References:
http://www.ubuntu.com/usn/usn-2985-2
http://www.ubuntu.com/usn/usn-2985-1
https://launchpad.net/bugs/1585614

Package Information:
https://launchpad.net/ubuntu/+source/glibc/2.21-0ubuntu4.3
https://launchpad.net/ubuntu/+source/eglibc/2.19-0ubuntu6.9
https://launchpad.net/ubuntu/+source/eglibc/2.15-0ubuntu10.15

Wednesday, May 25, 2016

[USN-2985-1] GNU C Library vulnerabilities

==========================================================================
Ubuntu Security Notice USN-2985-1
May 25, 2016

eglibc, glibc vulnerabilities
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 15.10
- Ubuntu 14.04 LTS
- Ubuntu 12.04 LTS

Summary:

Several security issues were fixed in the GNU C Library.

Software Description:
- glibc: GNU C Library
- eglibc: GNU C Library

Details:

Martin Carpenter discovered that pt_chown in the GNU C Library did not
properly check permissions for tty files. A local attacker could use this
to gain administrative privileges or expose sensitive information.
(CVE-2013-2207, CVE-2016-2856)

Robin Hack discovered that the Name Service Switch (NSS) implementation in
the GNU C Library did not properly manage its file descriptors. An attacker
could use this to cause a denial of service (infinite loop).
(CVE-2014-8121)

Joseph Myers discovered that the GNU C Library did not properly handle long
arguments to functions returning a representation of Not a Number (NaN). An
attacker could use this to cause a denial of service (stack exhaustion
leading to an application crash) or possibly execute arbitrary code.
(CVE-2014-9761)

Arjun Shankar discovered that in certain situations the nss_dns code in the
GNU C Library did not properly account buffer sizes when passed an
unaligned buffer. An attacker could use this to cause a denial of service
or possibly execute arbitrary code. (CVE-2015-1781)

Sumit Bose and Lukáš Slebodník discovered that the Name Service
Switch (NSS) implementation in the GNU C Library did not handle long
lines in the files databases correctly. A local attacker could use
this to cause a denial of service (application crash) or possibly
execute arbitrary code. (CVE-2015-5277)

Adam Nielsen discovered that the strftime function in the GNU C Library did
not properly handle out-of-range argument data. An attacker could use this
to cause a denial of service (application crash) or possibly expose
sensitive information. (CVE-2015-8776)

Hector Marco and Ismael Ripoll discovered that the GNU C Library allowed
the pointer-guarding protection mechanism to be disabled by honoring the
LD_POINTER_GUARD environment variable across privilege boundaries. A local
attacker could use this to exploit an existing vulnerability more easily.
(CVE-2015-8777)

Szabolcs Nagy discovered that the hcreate functions in the GNU C Library
did not properly check its size argument, leading to an integer overflow.
An attacker could use to cause a denial of service (application crash) or
possibly execute arbitrary code. (CVE-2015-8778)

Maksymilian Arciemowicz discovered a stack-based buffer overflow in the
catopen function in the GNU C Library when handling long catalog names. An
attacker could use this to cause a denial of service (application crash) or
possibly execute arbitrary code. (CVE-2015-8779)

Florian Weimer discovered that the getnetbyname implementation in the GNU C
Library did not properly handle long names passed as arguments. An attacker
could use to cause a denial of service (stack exhaustion leading to an
application crash). (CVE-2016-3075)

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 15.10:
libc6 2.21-0ubuntu4.2
libc6-dev 2.21-0ubuntu4.2

Ubuntu 14.04 LTS:
libc6 2.19-0ubuntu6.8
libc6-dev 2.19-0ubuntu6.8

Ubuntu 12.04 LTS:
libc6 2.15-0ubuntu10.14
libc6-dev 2.15-0ubuntu10.14

After a standard system update you need to reboot your computer to
make all the necessary changes.

References:
http://www.ubuntu.com/usn/usn-2985-1
CVE-2013-2207, CVE-2014-8121, CVE-2014-9761, CVE-2015-1781,
CVE-2015-5277, CVE-2015-8776, CVE-2015-8777, CVE-2015-8778,
CVE-2015-8779, CVE-2016-2856, CVE-2016-3075

Package Information:
https://launchpad.net/ubuntu/+source/glibc/2.21-0ubuntu4.2
https://launchpad.net/ubuntu/+source/eglibc/2.19-0ubuntu6.8
https://launchpad.net/ubuntu/+source/eglibc/2.15-0ubuntu10.14

[USN-2950-5] Samba regression

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v2
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=Fz1o
-----END PGP SIGNATURE-----
==========================================================================
Ubuntu Security Notice USN-2950-5
May 25, 2016

samba regression
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 16.04 LTS
- Ubuntu 15.10
- Ubuntu 14.04 LTS

Summary:

USN-2950-1 introduced a regression in Samba.

Software Description:
- samba: SMB/CIFS file, print, and login server for Unix

Details:

USN-2950-1 fixed vulnerabilities in Samba. USN-2950-3 updated Samba to
version 4.3.9, which introduced a regression when using the ntlm_auth tool.
This update fixes the problem.

Original advisory details:

Jouni Knuutinen discovered that Samba contained multiple flaws in the
DCE/RPC implementation. A remote attacker could use this issue to perform
a denial of service, downgrade secure connections by performing a man in
the middle attack, or possibly execute arbitrary code. (CVE-2015-5370)
Stefan Metzmacher discovered that Samba contained multiple flaws in the
NTLMSSP authentication implementation. A remote attacker could use this
issue to downgrade connections to plain text by performing a man in the
middle attack. (CVE-2016-2110)
Alberto Solino discovered that a Samba domain controller would establish a
secure connection to a server with a spoofed computer name. A remote
attacker could use this issue to obtain sensitive information.
(CVE-2016-2111)
Stefan Metzmacher discovered that the Samba LDAP implementation did not
enforce integrity protection. A remote attacker could use this issue to
hijack LDAP connections by performing a man in the middle attack.
(CVE-2016-2112)
Stefan Metzmacher discovered that Samba did not validate TLS certificates.
A remote attacker could use this issue to spoof a Samba server.
(CVE-2016-2113)
Stefan Metzmacher discovered that Samba did not enforce SMB signing even if
configured to. A remote attacker could use this issue to perform a man in
the middle attack. (CVE-2016-2114)
Stefan Metzmacher discovered that Samba did not enable integrity protection
for IPC traffic. A remote attacker could use this issue to perform a man in
the middle attack. (CVE-2016-2115)
Stefan Metzmacher discovered that Samba incorrectly handled the MS-SAMR and
MS-LSAD protocols. A remote attacker could use this flaw with a man in the
middle attack to impersonate users and obtain sensitive information from
the Security Account Manager database. This flaw is known as Badlock.
(CVE-2016-2118)
Samba has been updated to 4.3.8 in Ubuntu 14.04 LTS and Ubuntu 15.10.
Ubuntu 12.04 LTS has been updated to 3.6.25 with backported security fixes.
In addition to security fixes, the updated packages contain bug fixes,
new features, and possibly incompatible changes. Configuration changes may
be required in certain environments.

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 16.04 LTS:
samba 2:4.3.9+dfsg-0ubuntu0.16.04.2

Ubuntu 15.10:
samba 2:4.3.9+dfsg-0ubuntu0.15.10.2

Ubuntu 14.04 LTS:
samba 2:4.3.9+dfsg-0ubuntu0.14.04.3

In general, a standard system update will make all the necessary changes.

References:
http://www.ubuntu.com/usn/usn-2950-5
http://www.ubuntu.com/usn/usn-2950-1
https://launchpad.net/bugs/1578576

Package Information:
https://launchpad.net/ubuntu/+source/samba/2:4.3.9+dfsg-0ubuntu0.16.04.2
https://launchpad.net/ubuntu/+source/samba/2:4.3.9+dfsg-0ubuntu0.15.10.2
https://launchpad.net/ubuntu/+source/samba/2:4.3.9+dfsg-0ubuntu0.14.04.3

[CentOS-announce] Release for CentOS Linux 6.8 i386 and x86_64

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v2.0.22 (GNU/Linux)

iEYEARECAAYFAldFzQMACgkQTKkMgmrBY7N36wCbB0srkLACBRsscBbt7IplCYSe
At4An0cp9CCRL+8KPquyLT4z519CWDxf
=4el4
-----END PGP SIGNATURE-----
We are pleased to announce the immediate availability of CentOS Linux
6.8 and install media for i386 and x86_64 Architectures. Release Notes
for 6.8 are available at:

http://wiki.centos.org/Manuals/ReleaseNotes/CentOS6.8

We recommend everyone review these release notes.

CentOS Linux 6.8 is derived from source code released by Red Hat, Inc.
for Red Hat Enterprise Linux 6.8. All upstream variants have been
placed into one combined repository to make it easier for end users.
Workstation, server, and minimal installs can all be done from our
combined repository. All of our testing is only done against this
combined distribution.

There are many fundamental changes in this release, compared with the
past CentOS Linux 6 releases, and we highly recommend everyone study
the upstream Release Notes as well as the upstream Technical Notes
about the changes and how they might impact your installation. (See
the 'Further Reading' section if the CentOS release notes link above).

All updates since the upstream 6.8 release are also on the CentOS
mirrors as zero day updates. When installing CentOS-6.8 (or any other
version) from any of our media, you should always run 'yum update'
after the install to apply these.

Users consuming our centos-cr repositories will already be running all
the packages that make up CentOS-6.8, and all updates released since.
They will notice only the centos-release and anaconda updates today
when moving to CentOS Linux 6.8. For more information on the CR
repository for future updates, see this link:
http://wiki.centos.org/AdditionalResources/Repositories/CR

Release Announcements for all updated packages are available here:
http://bit.ly/1WOy3dB

+++++++++++++++++++++++
Upgrading From Prior Major CentOS Versions:

We recommend everyone perform a fresh reinstall rather than attempt an
inplace upgrade from other major CentOS versions (CentOS-2.1, CentOS-3.x,
CentOS-4.x, CentOS-5.x).

+++++++++++++++++++++++
Upgrading from CentOS-6.0 / 6.1 / 6.2 / 6.3 / 6.4 / 6.5 / 6.6 or 6.7

CentOS Linux is designed to automatically upgrade between releases
within a major version (in this case, CentOS-6). Unless you have
edited your yum default configuration, a 'yum update' should move your
machines seamlessly from any previous CentOS Linux 6.x release to 6.8.
We also test this in our QA cycles and have noticed no problems, any
issues would be mentioned in the Release Notes.

+++++++++++++++++++++++
Downloading CentOS Linux 6.8 for new installs:

When possible, consider using torrents to obtain our ISOs. Usually it
is also the fastest means to download the distro.

The install media is split into various formats. We have made efforts
to ensure that most install types and roles can be done from DVD-1
itself, and the minimal install ISO is only tested to deliver a
minimal install set, when used as an ISO format ( either on cd or usb
). While other forms of installs ( eg. pxe delivered ) might work from
the minimal ISO, they are neither tested not supported. The only
format where we support the entire set of install options and delivery
mechanisms is via the complete CentOS Linux 6.8 tree, wihch can also
be created by consolidating all content from DVD1 and DVD2.

We no longer produce CD size images for the entire CentOS Linux 6
distribution, however the minimal install and netinstall iso images
are small enough to fit on all CD grade media.

Torrent files for the DVD's are available at :
http://mirror.centos.org/centos/6.8/isos/i386/CentOS-6.8-i386-bin-DVD1to2.torrent
http://mirror.centos.org/centos/6.8/isos/x86_64/CentOS-6.8-x86_64-bin-DVD1to2.torrent

You can also use a mirror close to you to get any of our ISOs:
http://mirror.centos.org/centos/6.8/isos/

If you need to update a local mirror, you can choose from our mirror
network http://www.centos.org/download/mirrors/ Most mirrors will
allow downloads over http, ftp and rsync.

Note: The x86_64 ISOs (minimal, netinstall, DVD1) should install on UEFI
machines.
Secure Boot must be disabled to install CentOS 6. The Live ISOs and i386
ISOs will
not boot with UEFI.

+++++++++++++++++++++++
sha256sum for the CentOS-6.8 ISOS:

i386:
720d185fdf063383a4471657076b72fc162d3c3c3bca2e5e5ae13a25b3046519
CentOS-6.8-i386-bin-DVD1.iso

0c1a498a469214f276b4390a9ac2111fe8eb89084f7921d2eced659ada09e1a9
CentOS-6.8-i386-bin-DVD2.iso

7df6c27c0cd1186845bee4e786d43dbd3ae429258098283f9dbc2b2d20ed6a89
CentOS-6.8-i386-LiveCD.iso

7e2ace104901921ac919a390be827251727dfd04437fbd4e4d3024b6d70d8718
CentOS-6.8-i386-LiveDVD.iso

f4cf0614cc2ac451ffec5bd349ee74a1b31fd394e58561a07c38a21be5a4bdeb
CentOS-6.8-i386-minimal.iso

1668434d76e14a45a189b7810582e7e6ded686854f75b7f8ba053830a5706e57
CentOS-6.8-i386-netinstall.iso

x86_64:
dda55622614a8b43b448a72f87d6cb7f79de1eff49ee8c5881a7d9db28d4e35
CentOS-6.8-x86_64-bin-DVD1.iso

0aba869427b4ce04e100d72744daf7fea1f7be2e4be56b658095bd9e99e04e6d
CentOS-6.8-x86_64-bin-DVD2.iso

efa82d673206cb6af377b1f929a510cc2b1ce95cdb436210121ec271e056c920
CentOS-6.8-x86_64-LiveCD.iso

52a9c8c1d250de39976dda9412293473b8349efefb31b66fecdee0fdf93866d9
CentOS-6.8-x86_64-LiveDVD.iso

ec49c297d484b9da0787e5944edc38f7c70f21c0f6a60178d8e9a8926d1949f4
CentOS-6.8-x86_64-minimal.iso

56d9cc5757ed1443af7b321967622a108978328f72e58050d31bcf1998dfd162
CentOS-6.8-x86_64-netinstall.iso

+++++++++++++++++++++++
Cloud Images:

Images for various on-premise and off-premise Cloud environments are
currently under development for CentOS Linux 6.8 and will be released
in the coming days. Everyone looking to join and help with the CentOS
Cloud efforts is encouraged to join the CentOS-devel list where such
issues are discussed (
http://lists.centos.org/mailman/listinfo/centos-devel ).

+++++++++++++++++++++++
Getting Help:

The best place to start when looking for help with CentOS is at the
wiki ( http://wiki.centos.org/GettingHelp ) which lists various
options and communities who might be able to help. If you think there
is a bug in the system, do report it at http://bugs.centos.org/ - but
keep in mind that the bugs system is *not* a support mechanism. If you
need supported software with Support Level Agreements, people to call
and response times then we recommend Red Hat Enterprise Linux.

If you have questions you would like to field at us in real time, come
join the office hours on Wed or Thu of every week. You can find
details on these at http://wiki.centos.org/OfficeHours

+++++++++++++++++++++++
Meet-ups and Events:

If you would like to get involved in helping organize, run, present or
sponsor a CentOS Dojo or even just want more details then join the
CentOS Promo list:
http://lists.centos.org/mailman/listinfo/centos-promo and drop an
email introducing yourself. We are very keen to find help to run
events around the world, and also to find people who can represent
CentOS at various community events around the world.

+++++++++++++++++++++++
Contributing and joining the project:

We are always looking for people to join and help with various things
in the project. If you are keen to help out a good place to start is
the wiki page at http://wiki.centos.org/Contribute . If you have
questions or a specific area you would like to contribute towards that
is not covered on that page, feel free to drop in on #centos-devel at
irc.freenode.net for a chat or email the centos-devel list
(http://lists.centos.org).

+++++++++++++++++++++++
Thanks to everyone who contributed towards making CentOS Linux 6.8,
especially the effort put in, as always, by the QA
(http://wiki.centos.org/QaGroup) and Build teams.

A special shout out to all the donors who have contributed hardware,
network connectivity, hosting and resources over the years. The CentOS
project now has a fairly well setup resource pool, solely thanks to
the donors.

Enjoy!

--
Johnny Hughes
CentOS Project { http://www.centos.org/ }
irc: hughesjr, #centos@irc.freenode.net
Twitter: @JohnnyCentOS

Tuesday, May 24, 2016

[USN-2984-1] PHP vulnerabilities

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v2
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=C5U2
-----END PGP SIGNATURE-----
==========================================================================
Ubuntu Security Notice USN-2984-1
May 24, 2016

php5, php7.0 vulnerabilities
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 16.04 LTS
- Ubuntu 15.10
- Ubuntu 14.04 LTS
- Ubuntu 12.04 LTS

Summary:

Several security issues were fixed in PHP.

Software Description:
- php7.0: HTML-embedded scripting language interpreter
- php5: HTML-embedded scripting language interpreter

Details:

It was discovered that the PHP Fileinfo component incorrectly handled
certain magic files. An attacker could use this issue to cause PHP to
crash, resulting in a denial of service, or possibly execute arbitrary
code. This issue only affected Ubuntu 16.04 LTS. (CVE-2015-8865)

Hans Jerry Illikainen discovered that the PHP Zip extension incorrectly
handled certain malformed Zip archives. A remote attacker could use this
issue to cause PHP to crash, resulting in a denial of service, or possibly
execute arbitrary code. This issue only affected Ubuntu 16.04 LTS.
(CVE-2016-3078)

It was discovered that PHP incorrectly handled invalid indexes in the
SplDoublyLinkedList class. An attacker could use this issue to cause PHP to
crash, resulting in a denial of service, or possibly execute arbitrary
code. This issue only affected Ubuntu 16.04 LTS. (CVE-2016-3132)

It was discovered that the PHP rawurlencode() function incorrectly handled
large strings. A remote attacker could use this issue to cause PHP to
crash, resulting in a denial of service. This issue only affected Ubuntu
16.04 LTS. (CVE-2016-4070)

It was discovered that the PHP php_snmp_error() function incorrectly
handled string formatting. A remote attacker could use this issue to cause
PHP to crash, resulting in a denial of service, or possibly execute
arbitrary code. This issue only affected Ubuntu 16.04 LTS. (CVE-2016-4071)

It was discovered that the PHP phar extension incorrectly handled certain
filenames in archives. A remote attacker could use this issue to cause PHP
to crash, resulting in a denial of service, or possibly execute arbitrary
code. This issue only affected Ubuntu 16.04 LTS. (CVE-2016-4072)

It was discovered that the PHP mb_strcut() function incorrectly handled
string formatting. A remote attacker could use this issue to cause PHP to
crash, resulting in a denial of service, or possibly execute arbitrary
code. This issue only affected Ubuntu 16.04 LTS. (CVE-2016-4073)

It was discovered that the PHP phar extension incorrectly handled certain
archive files. A remote attacker could use this issue to cause PHP to
crash, resulting in a denial of service, or possibly execute arbitrary
code. This issue only affected Ubuntu 12.04 LTS, Ubuntu 14.04 LTS and
Ubuntu 15.10. (CVE-2016-4342, CVE-2016-4343)

It was discovered that the PHP bcpowmod() function incorrectly handled
memory. A remote attacker could use this issue to cause PHP to crash,
resulting in a denial of service, or possibly execute arbitrary code.
(CVE-2016-4537, CVE-2016-4538)

It was discovered that the PHP XML parser incorrectly handled certain
malformed XML data. A remote attacker could possibly use this issue to
cause PHP to crash, resulting in a denial of service, or possibly execute
arbitrary code. (CVE-2016-4539)

It was discovered that certain PHP grapheme functions incorrectly handled
negative offsets. A remote attacker could possibly use this issue to cause
PHP to crash, resulting in a denial of service. (CVE-2016-4540,
CVE-2016-4541)

It was discovered that PHP incorrectly handled certain malformed EXIF tags.
A remote attacker could possibly use this issue to cause PHP to crash,
resulting in a denial of service. (CVE-2016-4542, CVE-2016-4543,
CVE-2016-4544)

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 16.04 LTS:
libapache2-mod-php7.0 7.0.4-7ubuntu2.1
php7.0-cgi 7.0.4-7ubuntu2.1
php7.0-cli 7.0.4-7ubuntu2.1
php7.0-fpm 7.0.4-7ubuntu2.1

Ubuntu 15.10:
libapache2-mod-php5 5.6.11+dfsg-1ubuntu3.4
php5-cgi 5.6.11+dfsg-1ubuntu3.4
php5-cli 5.6.11+dfsg-1ubuntu3.4
php5-fpm 5.6.11+dfsg-1ubuntu3.4

Ubuntu 14.04 LTS:
libapache2-mod-php5 5.5.9+dfsg-1ubuntu4.17
php5-cgi 5.5.9+dfsg-1ubuntu4.17
php5-cli 5.5.9+dfsg-1ubuntu4.17
php5-fpm 5.5.9+dfsg-1ubuntu4.17

Ubuntu 12.04 LTS:
libapache2-mod-php5 5.3.10-1ubuntu3.23
php5-cgi 5.3.10-1ubuntu3.23
php5-cli 5.3.10-1ubuntu3.23
php5-fpm 5.3.10-1ubuntu3.23

In general, a standard system update will make all the necessary changes.

References:
http://www.ubuntu.com/usn/usn-2984-1
CVE-2015-8865, CVE-2016-3078, CVE-2016-3132, CVE-2016-4070,
CVE-2016-4071, CVE-2016-4072, CVE-2016-4073, CVE-2016-4342,
CVE-2016-4343, CVE-2016-4537, CVE-2016-4538, CVE-2016-4539,
CVE-2016-4540, CVE-2016-4541, CVE-2016-4542, CVE-2016-4543,
CVE-2016-4544

Package Information:
https://launchpad.net/ubuntu/+source/php7.0/7.0.4-7ubuntu2.1
https://launchpad.net/ubuntu/+source/php5/5.6.11+dfsg-1ubuntu3.4
https://launchpad.net/ubuntu/+source/php5/5.5.9+dfsg-1ubuntu4.17
https://launchpad.net/ubuntu/+source/php5/5.3.10-1ubuntu3.23

Friday, May 20, 2016

Planned Outage: buildsystem Server reboots - 2016-05-24 21:00 UTC

Planned Outage: buildsystem Server reboots - 2016-05-24 21:00 UTC

There will be an outage starting at 2016-05-24 21:00 UTC, which will
last approximately 2 hours.

To convert UTC to your local time, take a look at
http://fedoraproject.org/wiki/Infrastructure/UTCHowto
or run:

date -d '2016-05-24 21:00 UTC'

Reason for outage:

We will be updating and rebooting the servers in our build network.
Services related to building may be down and up during the outage
window.

Affected Services:

* pkgs.fedoraproject.org
* koschei
* koji
* kojipkgs
* bodhi / updates.fedoraproject.org

Services not listed are not affected by this outage.

Contact Information:

Ticket Link: https://fedorahosted.org/fedora-infrastructure/ticket/5312

Please join #fedora-admin or #fedora-noc on irc.freenode.net or add
comments to the ticket for this outage above.