Thursday, August 31, 2017
[CentOS-announce] CESA-2017:2563 Moderate CentOS 6 openssh Security Update
Upstream details at : https://access.redhat.com/errata/RHSA-2017:2563
The following updated files have been uploaded and are currently
syncing to the mirrors: ( sha256sum Filename )
i386:
7fcc14482bde0ffd56256a95d4e9fb1adde76ff3bd4e51bca62d991216637a41 openssh-5.3p1-123.el6_9.i686.rpm
0b7200aa9e46618664f5ce4418d8dc2a3536246ce4c05a8d49c87a91a2e65c4c openssh-askpass-5.3p1-123.el6_9.i686.rpm
38117542a8fbe8ed16604704c90009c0317759f67de4329b644f1741e72c98fb openssh-clients-5.3p1-123.el6_9.i686.rpm
9446db394224c7ad6b155386d690b5992115d1c0cc2a1e6c324f8db313faffa2 openssh-ldap-5.3p1-123.el6_9.i686.rpm
1b4954075f7f4364460e35cdd4c76c9bdd0f8a6ab5bb7e2ef04cbee9c1098aaa openssh-server-5.3p1-123.el6_9.i686.rpm
318fe5d62ad947c5090fd36310e6938a1f0de93bd2b9b9c490c2bbf2ba9bd65d pam_ssh_agent_auth-0.9.3-123.el6_9.i686.rpm
x86_64:
ca4e9591f2670255c532f2be9b229eff12799006d60aefd7decdf68ab555975c openssh-5.3p1-123.el6_9.x86_64.rpm
5a8b1a467d7836300f53b54e1e96bdaa93cf8df93cd730729f6d5e430f61a8f5 openssh-askpass-5.3p1-123.el6_9.x86_64.rpm
5c7ac733ef43bdd9169c9ba26d2e44d273496508649c30acf2c119c8ee4dd7d0 openssh-clients-5.3p1-123.el6_9.x86_64.rpm
1c4c57bb410082a30401cd68e492d13d3b58577afa604e9ae79114468f61b006 openssh-ldap-5.3p1-123.el6_9.x86_64.rpm
69b18041197c4be9a2812bbea1fc92f94b45d7adca0dd9c308f87dde7743ac06 openssh-server-5.3p1-123.el6_9.x86_64.rpm
318fe5d62ad947c5090fd36310e6938a1f0de93bd2b9b9c490c2bbf2ba9bd65d pam_ssh_agent_auth-0.9.3-123.el6_9.i686.rpm
f87bed409bfde8b91268589a1c32da959cba0bae5a555bed2150c2a4667723f3 pam_ssh_agent_auth-0.9.3-123.el6_9.x86_64.rpm
Source:
4c78bd24259d3604ffbf905642dbf44d209c3997696cfc443eae7885a8d9a53a openssh-5.3p1-123.el6_9.src.rpm
--
Johnny Hughes
CentOS Project { http://www.centos.org/ }
irc: hughesjr, #centos@irc.freenode.net
Twitter: @JohnnyCentOS
_______________________________________________
CentOS-announce mailing list
CentOS-announce@centos.org
https://lists.centos.org/mailman/listinfo/centos-announce
[CentOS-announce] CESA-2017:2534 Important CentOS 6 thunderbird Security Update
Upstream details at : https://access.redhat.com/errata/RHSA-2017:2534
The following updated files have been uploaded and are currently
syncing to the mirrors: ( sha256sum Filename )
i386:
96494a6bbf9295994238419e7b7e9d0f32bd34771f06b54f0f0d06439c72f95e thunderbird-52.3.0-1.el6.centos.i686.rpm
x86_64:
6afe985ea385fb5549fcb8ed89fff3cb4ceacf121de067e809e88da57daa5c48 thunderbird-52.3.0-1.el6.centos.x86_64.rpm
Source:
369ece0043d2781f548a3fe74c097d222f6e9afabd2e7f38a07c476f10dd9cb7 thunderbird-52.3.0-1.el6.centos.src.rpm
--
Johnny Hughes
CentOS Project { http://www.centos.org/ }
irc: hughesjr, #centos@irc.freenode.net
Twitter: @JohnnyCentOS
_______________________________________________
CentOS-announce mailing list
CentOS-announce@centos.org
https://lists.centos.org/mailman/listinfo/centos-announce
[CentOS-announce] CESA-2017:2550 Moderate CentOS 6 poppler Security Update
Upstream details at : https://access.redhat.com/errata/RHSA-2017:2550
The following updated files have been uploaded and are currently
syncing to the mirrors: ( sha256sum Filename )
i386:
5e00e48b8c0ac31de59d24deaa04247cc665a39827832cfac05df03c164c52c4 poppler-0.12.4-12.el6_9.i686.rpm
d25cdcfbfc0bf8ef7f5e548984674c6ce2a8d6a2eaef784b1ea7767840690466 poppler-devel-0.12.4-12.el6_9.i686.rpm
94011927f19dd72b17214ea203338a17c4e75507543666097b0d7244860da132 poppler-glib-0.12.4-12.el6_9.i686.rpm
23425ddf68356964411efc36159173c6ae243d0eb237dce6361e582d2baa9e97 poppler-glib-devel-0.12.4-12.el6_9.i686.rpm
f88d5fb1cb327fb9dacc48f2ab02cc12ac09ea043622e39b4eb34ec33088cd76 poppler-qt-0.12.4-12.el6_9.i686.rpm
d201890924ed934ca293d1a88c1a7da78be176166099574c7858c60f3ee93c6e poppler-qt4-0.12.4-12.el6_9.i686.rpm
8d645831a8fac15e1c8e5a32fc9183e95713f9ef1ee561af2d1cc7d11bd705fc poppler-qt4-devel-0.12.4-12.el6_9.i686.rpm
5b88d65fe039f4b9f2ea41faeaa59c35ee0e10a6c24bbf1756f5a9ea6fb0a8f0 poppler-qt-devel-0.12.4-12.el6_9.i686.rpm
59ca913a180b4fd587d4479b64efa37f04c1ee5b6812d17319f69e9cc38d5807 poppler-utils-0.12.4-12.el6_9.i686.rpm
x86_64:
5e00e48b8c0ac31de59d24deaa04247cc665a39827832cfac05df03c164c52c4 poppler-0.12.4-12.el6_9.i686.rpm
2a7c924303b93c19268086f7202cd4d147d54ba04b4d5e9c31f785c887d0f3ff poppler-0.12.4-12.el6_9.x86_64.rpm
d25cdcfbfc0bf8ef7f5e548984674c6ce2a8d6a2eaef784b1ea7767840690466 poppler-devel-0.12.4-12.el6_9.i686.rpm
df823b5d17233bc08e976918b1aeb8d16d88e40c8de95da56c6ad9d22cde0f03 poppler-devel-0.12.4-12.el6_9.x86_64.rpm
94011927f19dd72b17214ea203338a17c4e75507543666097b0d7244860da132 poppler-glib-0.12.4-12.el6_9.i686.rpm
aaa7b0ad900a0f1b77a503bed3772ca8f8d5cc9299be07eba849d67fff67f21a poppler-glib-0.12.4-12.el6_9.x86_64.rpm
23425ddf68356964411efc36159173c6ae243d0eb237dce6361e582d2baa9e97 poppler-glib-devel-0.12.4-12.el6_9.i686.rpm
77a0cf7d64625bd9547bde17cee820eb1c12c4d153cc92dd1f3edd2afc5113bb poppler-glib-devel-0.12.4-12.el6_9.x86_64.rpm
f88d5fb1cb327fb9dacc48f2ab02cc12ac09ea043622e39b4eb34ec33088cd76 poppler-qt-0.12.4-12.el6_9.i686.rpm
29d53b90f6ca5ba1ea401ae122c4ff987a20aa8accfa019f3a9afbb25bb24b46 poppler-qt-0.12.4-12.el6_9.x86_64.rpm
d201890924ed934ca293d1a88c1a7da78be176166099574c7858c60f3ee93c6e poppler-qt4-0.12.4-12.el6_9.i686.rpm
b411d564f12f72a171e5dfb7a15ed32b276afc23b86ce0799aebd2e3400006cf poppler-qt4-0.12.4-12.el6_9.x86_64.rpm
8d645831a8fac15e1c8e5a32fc9183e95713f9ef1ee561af2d1cc7d11bd705fc poppler-qt4-devel-0.12.4-12.el6_9.i686.rpm
6935fc562c03523283368b0ac587bbc9d98b8ec84006d4991d2e3b243157a134 poppler-qt4-devel-0.12.4-12.el6_9.x86_64.rpm
5b88d65fe039f4b9f2ea41faeaa59c35ee0e10a6c24bbf1756f5a9ea6fb0a8f0 poppler-qt-devel-0.12.4-12.el6_9.i686.rpm
2ce55815fe0011187173d93bba74e0f4fc0c01b5b2b4800081c27d54c659b654 poppler-qt-devel-0.12.4-12.el6_9.x86_64.rpm
e75d1d7531bd8ff24932c7ed58fb34b24d9cb1913a3642887e42f441f1725b5d poppler-utils-0.12.4-12.el6_9.x86_64.rpm
Source:
8f9a5f707bf29ee83b8e38b90cf211b01a841591e47fd5848061d37fddf66669 poppler-0.12.4-12.el6_9.src.rpm
--
Johnny Hughes
CentOS Project { http://www.centos.org/ }
irc: hughesjr, #centos@irc.freenode.net
Twitter: @JohnnyCentOS
_______________________________________________
CentOS-announce mailing list
CentOS-announce@centos.org
https://lists.centos.org/mailman/listinfo/centos-announce
Wednesday, August 30, 2017
[USN-3407-1] PyJWT vulnerability
Ubuntu Security Notice USN-3407-1
August 30, 2017
pyjwt vulnerability
==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 17.04
- Ubuntu 16.04 LTS
Summary:
PyJWT could be made to crash if it received specially crafted
input.
Software Description:
- pyjwt: Python implementation of JSON Web Token
Details:
It was discovered that a vulnerability in PyJWT doesn't check
invalid_strings properly for some public keys. A remote attacker
could take advantage of a key confusion to craft JWTs from scratch.
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 17.04:
python-jwt 1.4.2-1ubuntu0.1
python3-jwt 1.4.2-1ubuntu0.1
Ubuntu 16.04 LTS:
python-jwt 1.3.0-1ubuntu0.1
python3-jwt 1.3.0-1ubuntu0.1
In general, a standard system update will make all the necessary
changes.
References:
https://www.ubuntu.com/usn/usn-3407-1
CVE-2017-11424
Package Information:
https://launchpad.net/ubuntu/+source/pyjwt/1.4.2-1ubuntu0.1
https://launchpad.net/ubuntu/+source/pyjwt/1.3.0-1ubuntu0.1
OpenBSD Errata: August 30th, 2017 (net80211)
and 6.0.
State transition errors could cause reinstallation of old WPA keys.
Binary updates for the amd64 and i386 platforms are available via the
syspatch utility. Source code patches can be found on the respective
errata pages:
https://www.openbsd.org/errata60.html
https://www.openbsd.org/errata61.html
As this affects the kernel, a reboot will be needed after patching.
[LSN-0029-1] Linux kernel vulnerability
Kernel Live Patch Security Notice LSN-0029-1
August 30, 2017
linux vulnerability
==========================================================================
A security issue affects these releases of Ubuntu:
| Series | Base kernel | Arch | flavors |
|------------------+--------------+----------+------------------|
| Ubuntu 14.04 LTS | 4.4.0 | amd64 | generic |
| Ubuntu 14.04 LTS | 4.4.0 | amd64 | lowlatency |
| Ubuntu 16.04 LTS | 4.4.0 | amd64 | generic |
| Ubuntu 16.04 LTS | 4.4.0 | amd64 | lowlatency |
Summary:
Several security issues were fixed in the kernel.
Software Description:
- linux: Linux kernel
Details:
It was discovered that the Linux kernel did not honor the UEFI secure boot
mode when performing a kexec operation. A local attacker could use this to
bypass secure boot restrictions. (CVE-2015-7837)
Huang Weller discovered that the ext4 filesystem implementation in the
Linux kernel mishandled a needs-flushing-before-commit list. A local
attacker could use this to expose sensitive information. (CVE-2017-7495)
Update instructions:
The problem can be corrected by updating your livepatches to the following
versions:
| Kernel | Version | flavors |
|-----------------+----------+--------------------------|
| 4.4.0-21.37 | 29.1 | generic, lowlatency |
| 4.4.0-22.39 | 29.1 | generic, lowlatency |
| 4.4.0-22.40 | 29.1 | generic, lowlatency |
| 4.4.0-24.43 | 29.1 | generic, lowlatency |
| 4.4.0-28.47 | 29.1 | generic, lowlatency |
| 4.4.0-31.50 | 29.1 | generic, lowlatency |
| 4.4.0-34.53 | 29.1 | generic, lowlatency |
| 4.4.0-36.55 | 29.1 | generic, lowlatency |
| 4.4.0-38.57 | 29.1 | generic, lowlatency |
| 4.4.0-42.62 | 29.1 | generic, lowlatency |
| 4.4.0-43.63 | 29.1 | generic, lowlatency |
| 4.4.0-45.66 | 29.1 | generic, lowlatency |
| 4.4.0-47.68 | 29.1 | generic, lowlatency |
| 4.4.0-51.72 | 29.1 | generic, lowlatency |
| 4.4.0-53.74 | 29.1 | generic, lowlatency |
| 4.4.0-57.78 | 29.1 | generic, lowlatency |
| 4.4.0-59.80 | 29.1 | generic, lowlatency |
| 4.4.0-62.83 | 29.1 | generic, lowlatency |
| 4.4.0-63.84 | 29.1 | generic, lowlatency |
| 4.4.0-64.85 | 29.1 | generic, lowlatency |
| 4.4.0-66.87 | 29.1 | generic, lowlatency |
| 4.4.0-67.88 | 29.1 | generic, lowlatency |
| 4.4.0-70.91 | 29.1 | generic, lowlatency |
| 4.4.0-71.92 | 29.1 | generic, lowlatency |
| 4.4.0-72.93 | 29.1 | generic, lowlatency |
| 4.4.0-75.96 | 29.1 | generic, lowlatency |
| 4.4.0-77.98 | 29.1 | generic, lowlatency |
| 4.4.0-78.99 | 29.1 | generic, lowlatency |
| 4.4.0-79.100 | 29.1 | generic, lowlatency |
| 4.4.0-81.104 | 29.1 | generic, lowlatency |
| 4.4.0-83.106 | 29.1 | generic, lowlatency |
| 4.4.0-87.110 | 29.1 | generic, lowlatency |
| 4.4.0-89.112 | 29.1 | generic, lowlatency |
| 4.4.0-91.114 | 29.1 | generic, lowlatency |
| lts-4.4.0-21.37_14.04.1-lts-xenial | 14.04.1 | generic, lowlatency |
| lts-4.4.0-22.39_14.04.1-lts-xenial | 14.04.1 | generic, lowlatency |
| lts-4.4.0-24.43_14.04.1-lts-xenial | 14.04.1 | generic, lowlatency |
| lts-4.4.0-28.47_14.04.1-lts-xenial | 14.04.1 | generic, lowlatency |
| lts-4.4.0-31.50_14.04.1-lts-xenial | 14.04.1 | generic, lowlatency |
| lts-4.4.0-34.53_14.04.1-lts-xenial | 14.04.1 | generic, lowlatency |
| lts-4.4.0-36.55_14.04.1-lts-xenial | 14.04.1 | generic, lowlatency |
| lts-4.4.0-38.57_14.04.1-lts-xenial | 14.04.1 | generic, lowlatency |
| lts-4.4.0-42.62_14.04.1-lts-xenial | 14.04.1 | generic, lowlatency |
| lts-4.4.0-45.66_14.04.1-lts-xenial | 14.04.1 | generic, lowlatency |
| lts-4.4.0-47.68_14.04.1-lts-xenial | 14.04.1 | generic, lowlatency |
| lts-4.4.0-51.72_14.04.1-lts-xenial | 14.04.1 | generic, lowlatency |
| lts-4.4.0-53.74_14.04.1-lts-xenial | 14.04.1 | generic, lowlatency |
| lts-4.4.0-57.78_14.04.1-lts-xenial | 14.04.1 | generic, lowlatency |
| lts-4.4.0-59.80_14.04.1-lts-xenial | 14.04.1 | generic, lowlatency |
| lts-4.4.0-62.83_14.04.1-lts-xenial | 14.04.1 | generic, lowlatency |
| lts-4.4.0-63.84_14.04.2-lts-xenial | 14.04.2 | generic, lowlatency |
| lts-4.4.0-64.85_14.04.1-lts-xenial | 14.04.1 | generic, lowlatency |
| lts-4.4.0-66.87_14.04.1-lts-xenial | 14.04.1 | generic, lowlatency |
| lts-4.4.0-70.91_14.04.1-lts-xenial | 14.04.1 | generic, lowlatency |
| lts-4.4.0-71.92_14.04.1-lts-xenial | 14.04.1 | generic, lowlatency |
| lts-4.4.0-72.93_14.04.1-lts-xenial | 14.04.1 | generic, lowlatency |
| lts-4.4.0-75.96_14.04.1-lts-xenial | 14.04.1 | generic, lowlatency |
| lts-4.4.0-78.99_14.04.2-lts-xenial | 14.04.2 | generic, lowlatency |
| lts-4.4.0-79.100_14.04.1-lts-xenial | 14.04.1 | generic, lowlatency |
| lts-4.4.0-81.104_14.04.1-lts-xenial | 14.04.1 | generic, lowlatency |
| lts-4.4.0-87.110_14.04.1-lts-xenial | 14.04.1 | generic, lowlatency |
Additionally, you should install an updated kernel with these fixes and
reboot at your convienience.
References:
CVE-2015-7837, CVE-2017-7495
--
ubuntu-security-announce mailing list
ubuntu-security-announce@lists.ubuntu.com
Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-security-announce
Tuesday, August 29, 2017
[USN-3406-2] Linux kernel (Trusty HWE) vulnerabilities
Ubuntu Security Notice USN-3406-2
August 29, 2017
linux-lts-trusty vulnerabilities
==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 12.04 ESM
Summary:
Several security issues were fixed in the Linux kernel.
Software Description:
- linux-lts-trusty: Linux hardware enablement kernel from Trusty for Precise ESM
Details:
USN-3406-1 fixed vulnerabilities in the Linux kernel for Ubuntu 14.04
LTS. This update provides the corresponding updates for the Linux
Hardware Enablement (HWE) kernel from Ubuntu 14.04 LTS for Ubuntu
12.04 ESM.
It was discovered that an out of bounds read vulnerability existed in the
associative array implementation in the Linux kernel. A local attacker
could use this to cause a denial of service (system crash) or expose
sensitive information. (CVE-2016-7914)
It was discovered that a NULL pointer dereference existed in the Direct
Rendering Manager (DRM) driver for VMWare devices in the Linux kernel. A
local attacker could use this to cause a denial of service (system crash).
(CVE-2017-7261)
It was discovered that the USB Cypress HID drivers for the Linux kernel did
not properly validate reported information from the device. An attacker
with physical access could use this to expose sensitive information (kernel
memory). (CVE-2017-7273)
A reference count bug was discovered in the Linux kernel ipx protocol
stack. A local attacker could exploit this flaw to cause a denial of
service or possibly other unspecified problems. (CVE-2017-7487)
Huang Weller discovered that the ext4 filesystem implementation in the
Linux kernel mishandled a needs-flushing-before-commit list. A local
attacker could use this to expose sensitive information. (CVE-2017-7495)
It was discovered that an information leak existed in the set_mempolicy and
mbind compat syscalls in the Linux kernel. A local attacker could use this
to expose sensitive information (kernel memory). (CVE-2017-7616)
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 12.04 ESM:
linux-image-3.13.0-129-generic 3.13.0-129.178~precise1
linux-image-3.13.0-129-generic-lpae 3.13.0-129.178~precise1
linux-image-generic-lpae-lts-trusty 3.13.0.129.119
linux-image-generic-lts-trusty 3.13.0.129.119
After a standard system update you need to reboot your computer to make
all the necessary changes.
ATTENTION: Due to an unavoidable ABI change the kernel updates have
been given a new version number, which requires you to recompile and
reinstall all third party kernel modules you might have installed.
Unless you manually uninstalled the standard kernel metapackages
(e.g. linux-generic, linux-generic-lts-RELEASE, linux-virtual,
linux-powerpc), a standard system upgrade will automatically perform
this as well.
References:
https://www.ubuntu.com/usn/usn-3406-2
https://www.ubuntu.com/usn/usn-3406-1
CVE-2016-7914, CVE-2017-7261, CVE-2017-7273, CVE-2017-7487,
CVE-2017-7495, CVE-2017-7616
Fedora 27 Bodhi Activation Point
Monday, August 28, 2017
[USN-3406-1] Linux kernel vulnerabilities
Ubuntu Security Notice USN-3406-1
August 28, 2017
linux vulnerabilities
==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 14.04 LTS
Summary:
Several security issues were fixed in the Linux kernel.
Software Description:
- linux: Linux kernel
Details:
It was discovered that an out of bounds read vulnerability existed in the
associative array implementation in the Linux kernel. A local attacker
could use this to cause a denial of service (system crash) or expose
sensitive information. (CVE-2016-7914)
It was discovered that a NULL pointer dereference existed in the Direct
Rendering Manager (DRM) driver for VMWare devices in the Linux kernel. A
local attacker could use this to cause a denial of service (system crash).
(CVE-2017-7261)
It was discovered that the USB Cypress HID drivers for the Linux kernel did
not properly validate reported information from the device. An attacker
with physical access could use this to expose sensitive information (kernel
memory). (CVE-2017-7273)
A reference count bug was discovered in the Linux kernel ipx protocol
stack. A local attacker could exploit this flaw to cause a denial of
service or possibly other unspecified problems. (CVE-2017-7487)
Huang Weller discovered that the ext4 filesystem implementation in the
Linux kernel mishandled a needs-flushing-before-commit list. A local
attacker could use this to expose sensitive information. (CVE-2017-7495)
It was discovered that an information leak existed in the set_mempolicy and
mbind compat syscalls in the Linux kernel. A local attacker could use this
to expose sensitive information (kernel memory). (CVE-2017-7616)
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 14.04 LTS:
linux-image-3.13.0-129-generic 3.13.0-129.178
linux-image-3.13.0-129-generic-lpae 3.13.0-129.178
linux-image-3.13.0-129-lowlatency 3.13.0-129.178
linux-image-3.13.0-129-powerpc-e500 3.13.0-129.178
linux-image-3.13.0-129-powerpc-e500mc 3.13.0-129.178
linux-image-3.13.0-129-powerpc-smp 3.13.0-129.178
linux-image-3.13.0-129-powerpc64-emb 3.13.0-129.178
linux-image-3.13.0-129-powerpc64-smp 3.13.0-129.178
linux-image-generic 3.13.0.129.138
linux-image-generic-lpae 3.13.0.129.138
linux-image-lowlatency 3.13.0.129.138
linux-image-powerpc-e500 3.13.0.129.138
linux-image-powerpc-e500mc 3.13.0.129.138
linux-image-powerpc-smp 3.13.0.129.138
linux-image-powerpc64-emb 3.13.0.129.138
linux-image-powerpc64-smp 3.13.0.129.138
After a standard system update you need to reboot your computer to make
all the necessary changes.
ATTENTION: Due to an unavoidable ABI change the kernel updates have
been given a new version number, which requires you to recompile and
reinstall all third party kernel modules you might have installed.
Unless you manually uninstalled the standard kernel metapackages
(e.g. linux-generic, linux-generic-lts-RELEASE, linux-virtual,
linux-powerpc), a standard system upgrade will automatically perform
this as well.
References:
https://www.ubuntu.com/usn/usn-3406-1
CVE-2016-7914, CVE-2017-7261, CVE-2017-7273, CVE-2017-7487,
CVE-2017-7495, CVE-2017-7616
Package Information:
https://launchpad.net/ubuntu/+source/linux/3.13.0-129.178
[USN-3405-2] Linux kernel (Xenial HWE) vulnerabilities
Ubuntu Security Notice USN-3405-2
August 28, 2017
linux-lts-xenial vulnerabilities
==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 14.04 LTS
Summary:
Several security issues were fixed in the Linux kernel.
Software Description:
- linux-lts-xenial: Linux hardware enablement kernel from Xenial for Trusty
Details:
USN-3405-1 fixed vulnerabilities in the Linux kernel for Ubuntu 16.04
LTS. This update provides the corresponding updates for the Linux
Hardware Enablement (HWE) kernel from Ubuntu 16.04 LTS for Ubuntu
14.04 LTS.
It was discovered that a use-after-free vulnerability existed in the POSIX
message queue implementation in the Linux kernel. A local attacker could
use this to cause a denial of service (system crash) or possibly execute
arbitrary code. (CVE-2017-11176)
Huang Weller discovered that the ext4 filesystem implementation in the
Linux kernel mishandled a needs-flushing-before-commit list. A local
attacker could use this to expose sensitive information. (CVE-2017-7495)
It was discovered that a buffer overflow existed in the Broadcom FullMAC
WLAN driver in the Linux kernel. A local attacker could use this to cause a
denial of service (system crash) or possibly execute arbitrary code.
(CVE-2017-7541)
It was discovered that the Linux kernel did not honor the UEFI secure boot
mode when performing a kexec operation. A local attacker could use this to
bypass secure boot restrictions. (CVE-2015-7837)
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 14.04 LTS:
linux-image-4.4.0-93-generic 4.4.0-93.116~14.04.1
linux-image-4.4.0-93-generic-lpae 4.4.0-93.116~14.04.1
linux-image-4.4.0-93-lowlatency 4.4.0-93.116~14.04.1
linux-image-4.4.0-93-powerpc-e500mc 4.4.0-93.116~14.04.1
linux-image-4.4.0-93-powerpc-smp 4.4.0-93.116~14.04.1
linux-image-4.4.0-93-powerpc64-emb 4.4.0-93.116~14.04.1
linux-image-4.4.0-93-powerpc64-smp 4.4.0-93.116~14.04.1
linux-image-generic-lpae-lts-xenial 4.4.0.93.77
linux-image-generic-lts-xenial 4.4.0.93.77
linux-image-lowlatency-lts-xenial 4.4.0.93.77
linux-image-powerpc-e500mc-lts-xenial 4.4.0.93.77
linux-image-powerpc-smp-lts-xenial 4.4.0.93.77
linux-image-powerpc64-emb-lts-xenial 4.4.0.93.77
linux-image-powerpc64-smp-lts-xenial 4.4.0.93.77
After a standard system update you need to reboot your computer to make
all the necessary changes.
ATTENTION: Due to an unavoidable ABI change the kernel updates have
been given a new version number, which requires you to recompile and
reinstall all third party kernel modules you might have installed.
Unless you manually uninstalled the standard kernel metapackages
(e.g. linux-generic, linux-generic-lts-RELEASE, linux-virtual,
linux-powerpc), a standard system upgrade will automatically perform
this as well.
References:
https://www.ubuntu.com/usn/usn-3405-2
https://www.ubuntu.com/usn/usn-3405-1
CVE-2015-7837, CVE-2017-11176, CVE-2017-7495, CVE-2017-7541
Package Information:
https://launchpad.net/ubuntu/+source/linux-lts-xenial/4.4.0-93.116~14.04.1
[USN-3405-1] Linux kernel vulnerabilities
Ubuntu Security Notice USN-3405-1
August 28, 2017
linux, linux-aws, linux-gke, linux-raspi2, linux-snapdragon vulnerabilities
==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 16.04 LTS
Summary:
Several security issues were fixed in the Linux kernel.
Software Description:
- linux: Linux kernel
- linux-aws: Linux kernel for Amazon Web Services (AWS) systems
- linux-gke: Linux kernel for Google Container Engine (GKE) systems
- linux-raspi2: Linux kernel for Raspberry Pi 2
- linux-snapdragon: Linux kernel for Snapdragon processors
Details:
It was discovered that a use-after-free vulnerability existed in the POSIX
message queue implementation in the Linux kernel. A local attacker could
use this to cause a denial of service (system crash) or possibly execute
arbitrary code. (CVE-2017-11176)
Huang Weller discovered that the ext4 filesystem implementation in the
Linux kernel mishandled a needs-flushing-before-commit list. A local
attacker could use this to expose sensitive information. (CVE-2017-7495)
It was discovered that a buffer overflow existed in the Broadcom FullMAC
WLAN driver in the Linux kernel. A local attacker could use this to cause a
denial of service (system crash) or possibly execute arbitrary code.
(CVE-2017-7541)
It was discovered that the Linux kernel did not honor the UEFI secure boot
mode when performing a kexec operation. A local attacker could use this to
bypass secure boot restrictions. (CVE-2015-7837)
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 16.04 LTS:
linux-image-4.4.0-1028-gke 4.4.0-1028.28
linux-image-4.4.0-1032-aws 4.4.0-1032.41
linux-image-4.4.0-1071-raspi2 4.4.0-1071.79
linux-image-4.4.0-1073-snapdragon 4.4.0-1073.78
linux-image-4.4.0-93-generic 4.4.0-93.116
linux-image-4.4.0-93-generic-lpae 4.4.0-93.116
linux-image-4.4.0-93-lowlatency 4.4.0-93.116
linux-image-4.4.0-93-powerpc-e500mc 4.4.0-93.116
linux-image-4.4.0-93-powerpc-smp 4.4.0-93.116
linux-image-4.4.0-93-powerpc64-emb 4.4.0-93.116
linux-image-4.4.0-93-powerpc64-smp 4.4.0-93.116
linux-image-aws 4.4.0.1032.34
linux-image-generic 4.4.0.93.98
linux-image-generic-lpae 4.4.0.93.98
linux-image-gke 4.4.0.1028.29
linux-image-lowlatency 4.4.0.93.98
linux-image-powerpc-smp 4.4.0.93.98
linux-image-powerpc64-emb 4.4.0.93.98
linux-image-powerpc64-smp 4.4.0.93.98
linux-image-raspi2 4.4.0.1071.71
linux-image-snapdragon 4.4.0.1073.65
After a standard system update you need to reboot your computer to make
all the necessary changes.
ATTENTION: Due to an unavoidable ABI change the kernel updates have
been given a new version number, which requires you to recompile and
reinstall all third party kernel modules you might have installed.
Unless you manually uninstalled the standard kernel metapackages
(e.g. linux-generic, linux-generic-lts-RELEASE, linux-virtual,
linux-powerpc), a standard system upgrade will automatically perform
this as well.
References:
https://www.ubuntu.com/usn/usn-3405-1
CVE-2015-7837, CVE-2017-11176, CVE-2017-7495, CVE-2017-7541
Package Information:
https://launchpad.net/ubuntu/+source/linux/4.4.0-93.116
https://launchpad.net/ubuntu/+source/linux-aws/4.4.0-1032.41
https://launchpad.net/ubuntu/+source/linux-gke/4.4.0-1028.28
https://launchpad.net/ubuntu/+source/linux-raspi2/4.4.0-1071.79
https://launchpad.net/ubuntu/+source/linux-snapdragon/4.4.0-1073.78
[USN-3404-2] Linux kernel (HWE) vulnerability
Ubuntu Security Notice USN-3404-2
August 28, 2017
linux-hwe vulnerability
==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 16.04 LTS
Summary:
The system could be made to crash under certain conditions.
Software Description:
- linux-hwe: Linux hardware enablement (HWE) kernel
Details:
USN-3404-1 fixed a vulnerability in the Linux kernel for Ubuntu 17.04.
This update provides the corresponding updates for the Linux Hardware
Enablement (HWE) kernel from Ubuntu 17.04 for Ubuntu 16.04 LTS.
A reference count bug was discovered in the Linux kernel ipx protocol
stack. A local attacker could exploit this flaw to cause a denial of
service or possibly other unspecified problems.
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 16.04 LTS:
linux-image-4.10.0-33-generic 4.10.0-33.37~16.04.1
linux-image-4.10.0-33-generic-lpae 4.10.0-33.37~16.04.1
linux-image-4.10.0-33-lowlatency 4.10.0-33.37~16.04.1
linux-image-generic-hwe-16.04 4.10.0.33.35
linux-image-generic-lpae-hwe-16.04 4.10.0.33.35
linux-image-lowlatency-hwe-16.04 4.10.0.33.35
After a standard system update you need to reboot your computer to make
all the necessary changes.
ATTENTION: Due to an unavoidable ABI change the kernel updates have
been given a new version number, which requires you to recompile and
reinstall all third party kernel modules you might have installed.
Unless you manually uninstalled the standard kernel metapackages
(e.g. linux-generic, linux-generic-lts-RELEASE, linux-virtual,
linux-powerpc), a standard system upgrade will automatically perform
this as well.
References:
https://www.ubuntu.com/usn/usn-3404-2
https://www.ubuntu.com/usn/usn-3404-1
CVE-2017-7487
Package Information:
https://launchpad.net/ubuntu/+source/linux-hwe/4.10.0-33.37~16.04.1
[USN-3404-1] Linux kernel vulnerability
Ubuntu Security Notice USN-3404-1
August 28, 2017
linux, linux-raspi2 vulnerability
==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 17.04
Summary:
The system could be made to crash under certain conditions.
Software Description:
- linux: Linux kernel
- linux-raspi2: Linux kernel for Raspberry Pi 2
Details:
A reference count bug was discovered in the Linux kernel ipx protocol
stack. A local attacker could exploit this flaw to cause a denial of
service or possibly other unspecified problems.
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 17.04:
linux-image-4.10.0-1016-raspi2 4.10.0-1016.19
linux-image-4.10.0-33-generic 4.10.0-33.37
linux-image-4.10.0-33-generic-lpae 4.10.0-33.37
linux-image-4.10.0-33-lowlatency 4.10.0-33.37
linux-image-generic 4.10.0.33.33
linux-image-generic-lpae 4.10.0.33.33
linux-image-lowlatency 4.10.0.33.33
linux-image-raspi2 4.10.0.1016.17
After a standard system update you need to reboot your computer to make
all the necessary changes.
ATTENTION: Due to an unavoidable ABI change the kernel updates have
been given a new version number, which requires you to recompile and
reinstall all third party kernel modules you might have installed.
Unless you manually uninstalled the standard kernel metapackages
(e.g. linux-generic, linux-generic-lts-RELEASE, linux-virtual,
linux-powerpc), a standard system upgrade will automatically perform
this as well.
References:
https://www.ubuntu.com/usn/usn-3404-1
CVE-2017-7487
Package Information:
https://launchpad.net/ubuntu/+source/linux/4.10.0-33.37
https://launchpad.net/ubuntu/+source/linux-raspi2/4.10.0-1016.19
[USN-3403-1] Ghostscript vulnerabilities
Ubuntu Security Notice USN-3403-1
August 28, 2017
ghostscript vulnerabilities
==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 17.04
- Ubuntu 16.04 LTS
- Ubuntu 14.04 LTS
Summary:
Several security issues were fixed in Ghostscript.
Software Description:
- ghostscript: PostScript and PDF interpreter
Details:
Kamil Frankowicz discovered that Ghostscript mishandles references.
A remote attacker could use this to cause a denial of service.
(CVE-2017-11714)
Kim Gwan Yeong discovered that Ghostscript could allow a heap-based
buffer over-read and application crash. A remote attacker could use a
crafted document to cause a denial of service. (CVE-2017-9611,
CVE-2017-9726, CVE-2017-9727, CVE-2017-9739)
Kim Gwan Yeong discovered an use-after-free vulnerability in
Ghostscript. A remote attacker could use a crafted file to cause a
denial of service. (CVE-2017-9612)
Kim Gwan Yeong discovered a lack of integer overflow check in
Ghostscript. A remote attacker could use crafted PostScript document to
cause a denial of service. (CVE-2017-9835)
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 17.04:
ghostscript 9.19~dfsg+1-0ubuntu7.6
ghostscript-x 9.19~dfsg+1-0ubuntu7.6
libgs9 9.19~dfsg+1-0ubuntu7.6
libgs9-common 9.19~dfsg+1-0ubuntu7.6
Ubuntu 16.04 LTS:
ghostscript 9.18~dfsg~0-0ubuntu2.7
ghostscript-x 9.18~dfsg~0-0ubuntu2.7
libgs9 9.18~dfsg~0-0ubuntu2.7
libgs9-common 9.18~dfsg~0-0ubuntu2.7
Ubuntu 14.04 LTS:
ghostscript 9.10~dfsg-0ubuntu10.10
ghostscript-x 9.10~dfsg-0ubuntu10.10
libgs9 9.10~dfsg-0ubuntu10.10
libgs9-common 9.10~dfsg-0ubuntu10.10
In general, a standard system update will make all the necessary
changes.
References:
https://www.ubuntu.com/usn/usn-3403-1
CVE-2017-11714, CVE-2017-9611, CVE-2017-9612, CVE-2017-9726,
CVE-2017-9727, CVE-2017-9739, CVE-2017-9835
Package Information:
https://launchpad.net/ubuntu/+source/ghostscript/9.19~dfsg+1-0ubuntu7.6
https://launchpad.net/ubuntu/+source/ghostscript/9.18~dfsg~0-0ubuntu2.7
https://launchpad.net/ubuntu/+source/ghostscript/9.10~dfsg-0ubuntu10.10
[USN-3199-3] Python Crypto vulnerability
Ubuntu Security Notice USN-3199-3
August 28, 2017
python-crypto vulnerability
==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 12.04 ESM
Summary:
Programs using the Python Cryptography Toolkit could be made to
crash or run programs if they receive specially crafted network
traffic or other input.
Software Description:
- python-crypto: cryptographic algorithms and protocols for Python
Details:
USN-3199-1 fixed a vulnerability in Python Crypto. This update
provides the corresponding update for Ubuntu 12.04 ESM.
Original advisory details:
It was discovered that the ALGnew function in block_templace.c in the
Python Cryptography Toolkit contained a heap-based buffer overflow
vulnerability. A remote attacker could use this flaw to execute
arbitrary code by using a crafted initialization vector parameter.
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 12.04 ESM:
python-crypto 2.4.1-1ubuntu0.2
python3-crypto 2.4.1-1ubuntu0.2
In general, a standard system update will make all the necessary
changes.
References:
https://www.ubuntu.com/usn/usn-3199-3
https://www.ubuntu.com/usn/usn-3199-1
CVE-2013-7459
Sunday, August 27, 2017
③8采金只要主冊就送了,克服微信wnsr686868首村最高送3⑧8啊,壹倍流水了271342697@qq.com
Saturday, August 26, 2017
OpenBSD Errata: August 26th, 2017 (smap)
SMAP enforcement could be bypassed by userland code.
Binary updates for the amd64 and i386 platforms are available via the
syspatch utility. Source code patches can be found on the respective
errata pages:
https://www.openbsd.org/errata60.html
https://www.openbsd.org/errata61.html
As this affects the kernel, a reboot will be needed after patching.
Friday, August 25, 2017
F28 System Wide Change: Switch libidn-using applications to IDNA2008
https://fedoraproject.org/wiki/Changes/IDNA2008
Change owner(s):
* Nikos Mavrogiannopoulos <nmav AT redhat DOT com>
* Robert Scheck <robert AT fedoraproject DOT org>
The proposed change is about deprecating libidn, which supports
IDNA2003, and switch all applications using libidn, to libidn2 2.0.0,
which supports IDNA2008.
== Detailed Description ==
Internationalized domain names exist for quite some time (IDNA2003),
although the protocols describing them have evolved in an incompatible
way (IDNA2008). These incompatibilities will prevent applications
written for IDNA2003 to access certain problematic domain names
defined with IDNA2008, e.g., faß.de is translated to domain
xn--fa-hia.de with IDNA2008, while in IDNA2003 it is translated to
fass.de domain. That not only causes incompatibility problems, but may
be used as an attack vector to redirect users to different web sites.
The proposed change is about deprecating libidn, which supports
IDNA2003, and switch all applications using libidn, to libidn2 2.0.0,
which supports IDNA2008. The switch should be transparent as the
libidn2 library is API compatible.
Note that even in the web browsers, field there is much confusion on
the topic. Chromium appears to use IDNA2008 transitional (i.e.,
IDNA2003 mapping for the problematic characters), while Firefox and
Safari have already moved to IDNA2008.
For more information see:
* http://nmav.gnutls.org/2017/04/the-mess-with-internationalized-domain.html
* https://www.plesk.com/blog/what-is-the-problem-with-s/
* http://unicode.org/faq/idn.html#6
== Scope ==
* Proposal owners:
The proposal owner is expected to co-ordinate and fill the required
bugs on the distribution.
* Other developers:
Maintainers, should
- Verify that their software is linked with the libidn library
- Update the software from upstream if it already has been converted to libidn2
- Check the libidn2 instructions on converting a package to libidn2.
- Propose patches (trivial task) to convert to libidn2, and notify
upstream about it.
In short switch software from libidn to libidn2, it is sufficient
replacing idna.h header with idn2.h.
* Release engineering:
This feature requires not action from release engineering.
* List of deliverables:
This will bring:
- An updated libidn2 library <- already in F25
- A switch of all applications to libidn2
- libidn will be deprecated but not removed as applications may
explicitly require IDNA2003 support (e.g., for compatibility)
* Policies and guidelines:
Currently Fedora has no guidelines for IDNA support. With this change
the recommended guideline for applications would be to support
IDNA2008 by default.
* Trademark approval:
N/A (not needed for this Change)
--
Jan Kuřík
Platform & Fedora Program Manager
Red Hat Czech s.r.o., Purkynova 99/71, 612 45 Brno, Czech Republic
_______________________________________________
devel-announce mailing list -- devel-announce@lists.fedoraproject.org
To unsubscribe send an email to devel-announce-leave@lists.fedoraproject.org
Thursday, August 24, 2017
[USN-3402-1] PySAML2 vulnerability
Ubuntu Security Notice USN-3402-1
August 24, 2017
python-pysaml2 vulnerability
==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 17.04
- Ubuntu 16.04 LTS
Summary:
The system could be made to expose sensitive information.
Software Description:
- python-pysaml2: Pure python implementation of SAML2
Details:
It was discovered that PySAML2 incorrectly handled certain
SAML XML requests and responses. A remote attacker could use
this issue to read arbitrary files.
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 17.04:
python-pysaml2 3.0.0-3ubuntu1.17.04.1
python3-pysaml2 3.0.0-3ubuntu1.17.04.1
Ubuntu 16.04 LTS:
python-pysaml2 3.0.0-3ubuntu1.16.04.1
python3-pysaml2 3.0.0-3ubuntu1.16.04.1
In general, a standard system update will make all the necessary
changes.
References:
https://www.ubuntu.com/usn/usn-3402-1
CVE-2016-10149
Package Information:
https://launchpad.net/ubuntu/+source/python-pysaml2/3.0.0-3ubuntu1.17.04.1
https://launchpad.net/ubuntu/+source/python-pysaml2/3.0.0-3ubuntu1.16.04.1
Wednesday, August 23, 2017
Cleaning up the test-* namespaces
A while ago we had the question about including tests in dist-git. We considered
two options:
- Have the tests in the same git repos as the files to generate the artifact
- Have the tests in a separate namespace test-<namespace>
While we weren't quite sure what was the best approach, we put in place a
mechanism to automatically create the project in the test-* namespace when it
was created in the regular namespace and using the same ACLs.
To be more concrete, we had the mechanism that was creating for every repository
in the `rpms` namespace a corresponding repository in the `test-rpms` namespace
with the same maintainers and ACLs.
The recent work going on around CI [1] has led to the decision that tests stored
in dist-git will be held in the same git repository as the spec files (for rpms).
Now some numbers:
* We have currently 43663 repositories in dist-git
grep 'repo ' gitolite.conf |wc -l
43663
* 20843 of them correspond to the test-* namespaces
grep 'repo test-' gitolite.conf |wc -l
20843
* Leaving 22820 repositories not in the test-* namespaces
grep 'repo ' gitolite.conf |grep -v 'repo test-' |wc -l
22820
(I double checked, 20843+22820=43663 so we're good there)
I would like to get ride of the test-* namespaces. Tim Flink for which we
originally added this mechanism agrees with it. We also have backups in case there
is something needed from there sometime in the future.
Before I do so, I would like to know if anyone is opposed to this idea of
removing the test-* namespaces from dist-git?
Thanks in advance for your help,
Pierre
[1] http://fedoraproject.org/wiki/CI
_______________________________________________
devel-announce mailing list -- devel-announce@lists.fedoraproject.org
To unsubscribe send an email to devel-announce-leave@lists.fedoraproject.org
[CentOS-announce] CEBA-2017:2505 CentOS 6 sssd BugFix Update
Upstream details at : https://access.redhat.com/errata/RHBA-2017:2505
The following updated files have been uploaded and are currently
syncing to the mirrors: ( sha256sum Filename )
i386:
a13401b5a68e93e194fa862f3502ad7c93976151e61df31543612279904316d4 libipa_hbac-1.13.3-57.el6_9.i686.rpm
7f12b9d12a0ea77382b0d3b776d77b04d5a2e4945ef022e33007074216de3dcb libipa_hbac-devel-1.13.3-57.el6_9.i686.rpm
5038172ca941498feae2da10afdd3c3196f2a7d9be0f1bac583fb38c085df10f libsss_idmap-1.13.3-57.el6_9.i686.rpm
5657074aafc12930b7c43e1221555cf76175052dfa5cf0b054d0ce6a0e27ce47 libsss_idmap-devel-1.13.3-57.el6_9.i686.rpm
701993ad8ce2dd85022d74a2ddc0c393b4f3675cd8635e5692f8bfd3214f0213 libsss_nss_idmap-1.13.3-57.el6_9.i686.rpm
e33158734216b89323680ab4b23ed7ee51ca50ac9804cf34a1470fe04e50d1da libsss_nss_idmap-devel-1.13.3-57.el6_9.i686.rpm
ad5ac6f7439d62997536b84755e20b7688913a3b4fd04afe622ba4f8c4fa8dd5 libsss_simpleifp-1.13.3-57.el6_9.i686.rpm
26a9d7d29a9c5bb89da20ac0774b8bb80cac735faddc44bd41e07baab8f0e1ed libsss_simpleifp-devel-1.13.3-57.el6_9.i686.rpm
d5cc77c29545b83ff183425acd004c6149c0a60eacb0e811391d49c107602cd2 python-libipa_hbac-1.13.3-57.el6_9.i686.rpm
e0c4ec8e31dd30b28079f628cab53e5f9940b067288c22c3f029e774829f09d4 python-libsss_nss_idmap-1.13.3-57.el6_9.i686.rpm
29f3a7938d5b30a99b6a8aee70499a1643a8a63dcca8c944b692947ece5c784e python-sss-1.13.3-57.el6_9.i686.rpm
c7b8df5b47960010dcd0b9464e17f8df42205f739754816573d5c8d5f58a330d python-sssdconfig-1.13.3-57.el6_9.noarch.rpm
d1d7f68a5b700a7599129c12f7c7aeae764536631cd988b211a9cf9521eaed2b python-sss-murmur-1.13.3-57.el6_9.i686.rpm
d3b70d514a3e7a3c8b5ccb654718bd8ae829371ccf4dcb7f9d22a2a9b29bc45a sssd-1.13.3-57.el6_9.i686.rpm
2fe9180dc9ec9b552890a5ada4445e48353573e1b47b9db508125d5602a44383 sssd-ad-1.13.3-57.el6_9.i686.rpm
0e18519ce4ec99044ddfc9b2f16bbcba96057a078ebbd8c9544c06e351d36d66 sssd-client-1.13.3-57.el6_9.i686.rpm
532039b14de6f3b8fc11e516ea25810ed419acd28d4843bf842b9c219f1e82e5 sssd-common-1.13.3-57.el6_9.i686.rpm
9199a323b752c421afde17234ae1232a442ef4d49cb06033d8741995270d9ce4 sssd-common-pac-1.13.3-57.el6_9.i686.rpm
c733c43f0a22930700bb0d46e4cd57293e9335f9bff49180edb43f4ec2c1c3ac sssd-dbus-1.13.3-57.el6_9.i686.rpm
6783419d96794196655edaa9171e8022cd052ef52062f494e712c741a358bb92 sssd-ipa-1.13.3-57.el6_9.i686.rpm
7bde1eb73e97da65079b7ea00f144b033ad7ad57b29d918db06913e2daea2ed7 sssd-krb5-1.13.3-57.el6_9.i686.rpm
e1f422785b790cb6ff7278543799ab5518e6d3347c6d14688b0d13b30e52ddd2 sssd-krb5-common-1.13.3-57.el6_9.i686.rpm
4ed9ee3cf8b2bcd81bc638af7394b96686b9605949c2e2c0a42e20bee07759a5 sssd-ldap-1.13.3-57.el6_9.i686.rpm
8bcf5312b87932b4d7c2f6b8b45fe48faca924e90e1c244d81d410899d979c40 sssd-proxy-1.13.3-57.el6_9.i686.rpm
81bcb25b9f2ae1ed30456741db7df9a37c1a0405555614a7b5ae95a2bd44dd5e sssd-tools-1.13.3-57.el6_9.i686.rpm
x86_64:
a13401b5a68e93e194fa862f3502ad7c93976151e61df31543612279904316d4 libipa_hbac-1.13.3-57.el6_9.i686.rpm
9115fd0f410b9c54c12ef053717bc785c0a57c4e4c9142dd79215db39c7ef5b1 libipa_hbac-1.13.3-57.el6_9.x86_64.rpm
7f12b9d12a0ea77382b0d3b776d77b04d5a2e4945ef022e33007074216de3dcb libipa_hbac-devel-1.13.3-57.el6_9.i686.rpm
cc15202f7287617ead9e33088307ca232d69205367bcfc48b629b4257be2bce2 libipa_hbac-devel-1.13.3-57.el6_9.x86_64.rpm
5038172ca941498feae2da10afdd3c3196f2a7d9be0f1bac583fb38c085df10f libsss_idmap-1.13.3-57.el6_9.i686.rpm
22509a00ea3a552a38a2fbe1fcd3d52aaf1fab61a88829529d0cdec4393991f9 libsss_idmap-1.13.3-57.el6_9.x86_64.rpm
5657074aafc12930b7c43e1221555cf76175052dfa5cf0b054d0ce6a0e27ce47 libsss_idmap-devel-1.13.3-57.el6_9.i686.rpm
8c5b2dbfe15941133e9dc6b9f04651f8fd6907a201a9321bc29a51f0a2ee06c6 libsss_idmap-devel-1.13.3-57.el6_9.x86_64.rpm
701993ad8ce2dd85022d74a2ddc0c393b4f3675cd8635e5692f8bfd3214f0213 libsss_nss_idmap-1.13.3-57.el6_9.i686.rpm
a7077dc3b6b7a12044ee0b6788e182cb9a5ab48450c5127c7bb5ab62ce340ff4 libsss_nss_idmap-1.13.3-57.el6_9.x86_64.rpm
e33158734216b89323680ab4b23ed7ee51ca50ac9804cf34a1470fe04e50d1da libsss_nss_idmap-devel-1.13.3-57.el6_9.i686.rpm
4d1a4f732ae27501bb013674f1b0b85028fc2d4a4ae061d1244db2bff8a477f5 libsss_nss_idmap-devel-1.13.3-57.el6_9.x86_64.rpm
ad5ac6f7439d62997536b84755e20b7688913a3b4fd04afe622ba4f8c4fa8dd5 libsss_simpleifp-1.13.3-57.el6_9.i686.rpm
5629876de7fba52273539241f6cfbfb2c7ff1983fa02bc70eebb6bfa29a6b68d libsss_simpleifp-1.13.3-57.el6_9.x86_64.rpm
26a9d7d29a9c5bb89da20ac0774b8bb80cac735faddc44bd41e07baab8f0e1ed libsss_simpleifp-devel-1.13.3-57.el6_9.i686.rpm
b1820d13dcd398ec17dcacc051ba6e81130fdca41e10b121968fbbbf5f5be456 libsss_simpleifp-devel-1.13.3-57.el6_9.x86_64.rpm
209f7352d918cb4adef50373529bdac4a5430e2379d7acd7a4724eb98bb13179 python-libipa_hbac-1.13.3-57.el6_9.x86_64.rpm
477897405d5762c897ce497069c6a7eac5b6c94a846956de9ca473049c18bc57 python-libsss_nss_idmap-1.13.3-57.el6_9.x86_64.rpm
2b95cc2a5bc3fbb2f64a25fc369a633701f61c28031f1583a81890ef6f234197 python-sss-1.13.3-57.el6_9.x86_64.rpm
c7b8df5b47960010dcd0b9464e17f8df42205f739754816573d5c8d5f58a330d python-sssdconfig-1.13.3-57.el6_9.noarch.rpm
71c0760de386f0b713d147a11b0237801abfb3ce1db0befc729925e9149768d4 python-sss-murmur-1.13.3-57.el6_9.x86_64.rpm
1557f7ef5bb01a5b84a6a59a07e79add62c83545cd7b8f9d014e8a1fb699b3c3 sssd-1.13.3-57.el6_9.x86_64.rpm
eba82b031016f13ea9721b946e084e918b2356f55da5b35be1cf011dc8760517 sssd-ad-1.13.3-57.el6_9.x86_64.rpm
0e18519ce4ec99044ddfc9b2f16bbcba96057a078ebbd8c9544c06e351d36d66 sssd-client-1.13.3-57.el6_9.i686.rpm
01f72a1a1e4bad08ff860a7fc7809d7a1c42e4f34cb4e774d8c6a81d618864d6 sssd-client-1.13.3-57.el6_9.x86_64.rpm
d10d8155de1517c6bed677ee6dcfacd70b5bd9ff7d26c8fd832b7db6756e1c84 sssd-common-1.13.3-57.el6_9.x86_64.rpm
b7aa3ad5384c6f917113f2ae28e15282bff563fcf533f7affbeb6a8af0582a2d sssd-common-pac-1.13.3-57.el6_9.x86_64.rpm
1ce45883ba5e42de2ba4b0f3d32ed518e0271065ca77cb4ab1e85af63e853d73 sssd-dbus-1.13.3-57.el6_9.x86_64.rpm
c6016d578a734908687cb2a4e7c574b08bc8f77e197bf87ae7219b435b5b34e5 sssd-ipa-1.13.3-57.el6_9.x86_64.rpm
588fbde858c7d5f47e3f86dc0b54de543e01069338f6b313d9ea559e7281add3 sssd-krb5-1.13.3-57.el6_9.x86_64.rpm
af20075ea6e142f484b4b6ffadc1f4480236835b162a0d708c65c75b869dc1ca sssd-krb5-common-1.13.3-57.el6_9.x86_64.rpm
70d654af09bd053d31546883d946bcb1c4a965006d344b48d84d47e0bce59b17 sssd-ldap-1.13.3-57.el6_9.x86_64.rpm
48928584868468445c42869789fadca83f09c62d2067727d4239504f08fd32ae sssd-proxy-1.13.3-57.el6_9.x86_64.rpm
cfd0168886af56b426ad73a0085c4cc26a6450e067514049a7a5b5d6137db527 sssd-tools-1.13.3-57.el6_9.x86_64.rpm
Source:
4d7f4a06ff19037727fce55eb84c8f8d8526abe2c6651c1ac809eeec21213b0b sssd-1.13.3-57.el6_9.src.rpm
--
Johnny Hughes
CentOS Project { http://www.centos.org/ }
irc: hughesjr, #centos@irc.freenode.net
Twitter: @JohnnyCentOS
_______________________________________________
CentOS-announce mailing list
CentOS-announce@centos.org
https://lists.centos.org/mailman/listinfo/centos-announce
[CentOS-announce] CEEA-2017:2500 CentOS 6 unbound Enhancement Update
Upstream details at : https://access.redhat.com/errata/RHEA-2017:2500
The following updated files have been uploaded and are currently
syncing to the mirrors: ( sha256sum Filename )
i386:
2fac524811e1dbf01a6cd6bd931d4628a5adba2d20d0cd97f0cb342ea064b8b3 unbound-1.4.20-23.el6_9.4.i686.rpm
ed1ce6f7b787138dd29af1064ce5046fa6fa49c0849f6facf1cc683ec1c61cdb unbound-devel-1.4.20-23.el6_9.4.i686.rpm
929982cc3197d5bfa6b770bace24e395a14ec98ff4e4db3377da3a2c29db32cf unbound-libs-1.4.20-23.el6_9.4.i686.rpm
46e553a20ee09820c08415a89ad3a5be5c978c1794ca2419caf913737183dd02 unbound-python-1.4.20-23.el6_9.4.i686.rpm
x86_64:
b870310bbc3ed3d0386e25b3bf72be92d256032c2c272a5ac3e94d109fddb661 unbound-1.4.20-23.el6_9.4.x86_64.rpm
ed1ce6f7b787138dd29af1064ce5046fa6fa49c0849f6facf1cc683ec1c61cdb unbound-devel-1.4.20-23.el6_9.4.i686.rpm
cd93e772f13decfbcd5ee60ead21d04d7a734a22370b1c83e185f75ab2465d07 unbound-devel-1.4.20-23.el6_9.4.x86_64.rpm
929982cc3197d5bfa6b770bace24e395a14ec98ff4e4db3377da3a2c29db32cf unbound-libs-1.4.20-23.el6_9.4.i686.rpm
b9991f293eddceba22b2cd66e15f451ddb4338fb3fcf1811f728fc640dcf4074 unbound-libs-1.4.20-23.el6_9.4.x86_64.rpm
46e553a20ee09820c08415a89ad3a5be5c978c1794ca2419caf913737183dd02 unbound-python-1.4.20-23.el6_9.4.i686.rpm
73f0e380f4a8e9e75439325e0ed9cb3371fecdbaaea6ae1fa6e4485f1f0d4797 unbound-python-1.4.20-23.el6_9.4.x86_64.rpm
Source:
5e5a69b22ec6f36c6c3263d665855e11ee7c28cf339120ae15d16bcc45cf9eec unbound-1.4.20-23.el6_9.4.src.rpm
--
Johnny Hughes
CentOS Project { http://www.centos.org/ }
irc: hughesjr, #centos@irc.freenode.net
Twitter: @JohnnyCentOS
_______________________________________________
CentOS-announce mailing list
CentOS-announce@centos.org
https://lists.centos.org/mailman/listinfo/centos-announce
[CentOS-announce] CEBA-2017:2503 CentOS 6 samba BugFix Update
Upstream details at : https://access.redhat.com/errata/RHBA-2017:2503
The following updated files have been uploaded and are currently
syncing to the mirrors: ( sha256sum Filename )
i386:
87269f714a65dd129fca8497dd8b037337fb99868de85c4a429b42d9f13bd0d2 libsmbclient-3.6.23-44.el6_9.i686.rpm
7010b7851ad11bf90b6c804f3ad163e148ebdce72e0ffa2707f5e47564398bc6 libsmbclient-devel-3.6.23-44.el6_9.i686.rpm
e9c2f8f869542a0ad4aaacf1bb2ebd95ba1aeb2b9866ad204964b12f2d9a0915 samba-3.6.23-44.el6_9.i686.rpm
2e6d7682d23d823b2b791245497532f72fb07cc7f719eae622eb9542b60c8beb samba-client-3.6.23-44.el6_9.i686.rpm
e61cd439e12710eb6af6a65bd0146716afed4be2f6da933ef36f54f584cbb146 samba-common-3.6.23-44.el6_9.i686.rpm
73eddc6e1b6d13601df165a93a60345057a8cf0442d172e51405533636db5795 samba-doc-3.6.23-44.el6_9.i686.rpm
e8c2763e776470aa92d6fdfbf89fa24bceeaa4ea169967e343868765fcd570dd samba-domainjoin-gui-3.6.23-44.el6_9.i686.rpm
674c4f38741bb2c92a2fc99d7ec993fc65d787116b3e7b54bebbddf97dfa72a3 samba-swat-3.6.23-44.el6_9.i686.rpm
05fa3c1e498572c70a66c960330663843d127adfa2c8624e10e306e1f6c3862b samba-winbind-3.6.23-44.el6_9.i686.rpm
b2bb5fa267c592a950d31987d493552f144894f66261ad7cb647a3ef78b544e4 samba-winbind-clients-3.6.23-44.el6_9.i686.rpm
cc45242631859f54be41370195540ac2526d12b861dd338af94ee6329c01b50c samba-winbind-devel-3.6.23-44.el6_9.i686.rpm
17d40cdb7f23806604bd5808986bd5b4dfd883fb49aed3b3374e884cff4aec8c samba-winbind-krb5-locator-3.6.23-44.el6_9.i686.rpm
x86_64:
87269f714a65dd129fca8497dd8b037337fb99868de85c4a429b42d9f13bd0d2 libsmbclient-3.6.23-44.el6_9.i686.rpm
9ba6b7253311bfed18bb3523849a92b31d755dfae228acaec53144079f491221 libsmbclient-3.6.23-44.el6_9.x86_64.rpm
7010b7851ad11bf90b6c804f3ad163e148ebdce72e0ffa2707f5e47564398bc6 libsmbclient-devel-3.6.23-44.el6_9.i686.rpm
77e46d8910bfceb778676cbba018cf2a40295321d592418202c5af269cb1b8cf libsmbclient-devel-3.6.23-44.el6_9.x86_64.rpm
21018e8fe062e1589d484cb208a6f90dc03e7e69c895af2e01a158879942a122 samba-3.6.23-44.el6_9.x86_64.rpm
cd1277c4736080daf752f69651edab8aea20b49f1ed2dc93ab43558266f92c13 samba-client-3.6.23-44.el6_9.x86_64.rpm
e61cd439e12710eb6af6a65bd0146716afed4be2f6da933ef36f54f584cbb146 samba-common-3.6.23-44.el6_9.i686.rpm
28c2dfe75c2b510abb31fd29c5f92878d878aab839ac7d7c3d77c286846d33cf samba-common-3.6.23-44.el6_9.x86_64.rpm
1bc5b16aa7f71146a4b523d3d1c0684287de5e1e9b539dff8b14b7573876d28a samba-doc-3.6.23-44.el6_9.x86_64.rpm
27189348fedd2b1be13f64f792c594ee1007f6c12dae96af4e47bfb33634f670 samba-domainjoin-gui-3.6.23-44.el6_9.x86_64.rpm
e23a85368e28e90c1491aff86b9bffa0863ca7a30e9830c878f88432e68add28 samba-glusterfs-3.6.23-44.el6_9.x86_64.rpm
f4755292e85ff60bb0b039b18fe193e69be40ad26d1b390629b95a48c48ca58b samba-swat-3.6.23-44.el6_9.x86_64.rpm
500229f658d887638590fb05c6bca7b43868f40cf7032538c92d211ac3aa5c5c samba-winbind-3.6.23-44.el6_9.x86_64.rpm
b2bb5fa267c592a950d31987d493552f144894f66261ad7cb647a3ef78b544e4 samba-winbind-clients-3.6.23-44.el6_9.i686.rpm
ff1deaa1f55f103d7f02d352cdc142bb5306bbb4ee821dcac95d45165431cfbb samba-winbind-clients-3.6.23-44.el6_9.x86_64.rpm
cc45242631859f54be41370195540ac2526d12b861dd338af94ee6329c01b50c samba-winbind-devel-3.6.23-44.el6_9.i686.rpm
1488541aa150dd17c739144146acb975bd4f4565c1c9d424d6b02262d2e69d22 samba-winbind-devel-3.6.23-44.el6_9.x86_64.rpm
ca71de881c47e6eb18d6742d698a38789d022e5b0624df21ed655dc8dd91aa36 samba-winbind-krb5-locator-3.6.23-44.el6_9.x86_64.rpm
Source:
19c9c2264fc0813d95442abc9358c34387b4760204e1318487bb9919a1470756 samba-3.6.23-44.el6_9.src.rpm
--
Johnny Hughes
CentOS Project { http://www.centos.org/ }
irc: hughesjr, #centos@irc.freenode.net
Twitter: @JohnnyCentOS
_______________________________________________
CentOS-announce mailing list
CentOS-announce@centos.org
https://lists.centos.org/mailman/listinfo/centos-announce
[CentOS-announce] CEBA-2017:2502 CentOS 6 java-1.8.0-openjdk BugFix Update
Upstream details at : https://access.redhat.com/errata/RHBA-2017:2502
The following updated files have been uploaded and are currently
syncing to the mirrors: ( sha256sum Filename )
i386:
29aa47221ed0af8e6682de084d4540d06c601a6c0de5c9b2cb4f0d7bbb218262 java-1.8.0-openjdk-1.8.0.141-3.b16.el6_9.i686.rpm
82e16e5070e31a9020997eba9b93b147edc625bd0de2e786f847297de1a3074a java-1.8.0-openjdk-debug-1.8.0.141-3.b16.el6_9.i686.rpm
62574067c088c23c6d955b6c633645b483e5d339d36c3da5c9a83e7a45316c22 java-1.8.0-openjdk-demo-1.8.0.141-3.b16.el6_9.i686.rpm
efe75fdda3527e508b612992da6d4802f9da71eedc8ac16939f94b29082de8a1 java-1.8.0-openjdk-demo-debug-1.8.0.141-3.b16.el6_9.i686.rpm
9fdb6873649450892fda86320a97cfea4991ce997ece1968a058adead1305cee java-1.8.0-openjdk-devel-1.8.0.141-3.b16.el6_9.i686.rpm
b6705809d914d7dfdb47de13e99924cfae3915b5f3857ea77d21323874361a44 java-1.8.0-openjdk-devel-debug-1.8.0.141-3.b16.el6_9.i686.rpm
b5f2badc5bf4b10129a99a10a653e6abc4b2098fac4f5a6b5e521edd603d9eed java-1.8.0-openjdk-headless-1.8.0.141-3.b16.el6_9.i686.rpm
0a0663ac988035cf801a7446053555d09fbe4ced45e97152e0f9efd439323889 java-1.8.0-openjdk-headless-debug-1.8.0.141-3.b16.el6_9.i686.rpm
697147e970a7f210014853ad4a292c6ce00de1f09338d2cbb1bada2a1dea6aeb java-1.8.0-openjdk-javadoc-1.8.0.141-3.b16.el6_9.noarch.rpm
ced0c9be3af069982b0bb2b491df0f12f90fe9230425f3150ac7974a35e09784 java-1.8.0-openjdk-javadoc-debug-1.8.0.141-3.b16.el6_9.noarch.rpm
1f3df35edddb81c4f8df5ed438cb8692d8a2395e3e8b9b198c4f7e76567c5cde java-1.8.0-openjdk-src-1.8.0.141-3.b16.el6_9.i686.rpm
36dd102f5166929c45675f3e0b4f44167e851663fb909ce2152d59813463bc33 java-1.8.0-openjdk-src-debug-1.8.0.141-3.b16.el6_9.i686.rpm
x86_64:
bcef0720030aa7686ac1d05487e4944ed75328f20e5e07af087fc6e9537b123f java-1.8.0-openjdk-1.8.0.141-3.b16.el6_9.x86_64.rpm
031f02121c2e2f5577e2124787f7df0465fe739ba622be843ee6df2299fc0ec7 java-1.8.0-openjdk-debug-1.8.0.141-3.b16.el6_9.x86_64.rpm
eb17cf3738d447bedb2aa8fb839ba7060d6c65b261ef9ddb989df0146528e42b java-1.8.0-openjdk-demo-1.8.0.141-3.b16.el6_9.x86_64.rpm
f97cc7d63f151e26b5e622094e744462d83fe0f390664bd8fa7b39bcaac4df56 java-1.8.0-openjdk-demo-debug-1.8.0.141-3.b16.el6_9.x86_64.rpm
4844af6c9421c0530f3339a3c41dcabad174297866993cb7e7db26ba776250e9 java-1.8.0-openjdk-devel-1.8.0.141-3.b16.el6_9.x86_64.rpm
c1ee5081c1347aabab55c11df2af0d0c86302ce2b08fa0a712adbaa41481c00d java-1.8.0-openjdk-devel-debug-1.8.0.141-3.b16.el6_9.x86_64.rpm
3bc5f354c12f7b6cfb99a4744ba466aa9d734d994a6474538fa6adc29d25414e java-1.8.0-openjdk-headless-1.8.0.141-3.b16.el6_9.x86_64.rpm
af993d0a3e481916d29a621549a87a05c8ce9b4ff800e20a2b3f0f17a3e4b05d java-1.8.0-openjdk-headless-debug-1.8.0.141-3.b16.el6_9.x86_64.rpm
697147e970a7f210014853ad4a292c6ce00de1f09338d2cbb1bada2a1dea6aeb java-1.8.0-openjdk-javadoc-1.8.0.141-3.b16.el6_9.noarch.rpm
ced0c9be3af069982b0bb2b491df0f12f90fe9230425f3150ac7974a35e09784 java-1.8.0-openjdk-javadoc-debug-1.8.0.141-3.b16.el6_9.noarch.rpm
60e766a44b71709b81024f3449f9d0a58a28f57ef8a2478b66fd021bda4b3ca4 java-1.8.0-openjdk-src-1.8.0.141-3.b16.el6_9.x86_64.rpm
213d25f86aae1878a802e2281897d38f09624e4ef42dcf0aefbbaf056b1b37d3 java-1.8.0-openjdk-src-debug-1.8.0.141-3.b16.el6_9.x86_64.rpm
Source:
2f5bf796b01b62d0f84d5f162ccd24689e6195379a761db829c176d292504d3f java-1.8.0-openjdk-1.8.0.141-3.b16.el6_9.src.rpm
--
Johnny Hughes
CentOS Project { http://www.centos.org/ }
irc: hughesjr, #centos@irc.freenode.net
Twitter: @JohnnyCentOS
_______________________________________________
CentOS-announce mailing list
CentOS-announce@centos.org
https://lists.centos.org/mailman/listinfo/centos-announce
[CentOS-announce] CEBA-2017:2501 CentOS 6 acl BugFix Update
Upstream details at : https://access.redhat.com/errata/RHBA-2017:2501
The following updated files have been uploaded and are currently
syncing to the mirrors: ( sha256sum Filename )
i386:
56c8bd71d132223a86492533476fe9ff37c5ba7c09e21b5927a9efd5b2d717dd acl-2.2.49-7.el6_9.1.i686.rpm
fdd9e75884a47e8ef4ebc8552e907cd27405f6e9efbb2be773dcae07c01fc294 libacl-2.2.49-7.el6_9.1.i686.rpm
48295e81557752bcce96dd7271fe5234560db841fe309a732a7e5810323e209c libacl-devel-2.2.49-7.el6_9.1.i686.rpm
x86_64:
3afaabd15713abab6adc5033f35b9db225e792d651e42199d59c8444695893a5 acl-2.2.49-7.el6_9.1.x86_64.rpm
fdd9e75884a47e8ef4ebc8552e907cd27405f6e9efbb2be773dcae07c01fc294 libacl-2.2.49-7.el6_9.1.i686.rpm
2d2bb216ec706020dd82ddb7f0971d799161d3e7fb35937e14eb1a77a8c183e0 libacl-2.2.49-7.el6_9.1.x86_64.rpm
48295e81557752bcce96dd7271fe5234560db841fe309a732a7e5810323e209c libacl-devel-2.2.49-7.el6_9.1.i686.rpm
32b91ef60f2813d8275e0b87dd8193efcc515f71a8fdc54f306ee334bc55ab95 libacl-devel-2.2.49-7.el6_9.1.x86_64.rpm
Source:
5ce6a3887fb3a2026f08ba2dcfe43861c564fdcf2ba330d70701abb25f4a2a19 acl-2.2.49-7.el6_9.1.src.rpm
--
Johnny Hughes
CentOS Project { http://www.centos.org/ }
irc: hughesjr, #centos@irc.freenode.net
Twitter: @JohnnyCentOS
_______________________________________________
CentOS-announce mailing list
CentOS-announce@centos.org
https://lists.centos.org/mailman/listinfo/centos-announce
[CentOS-announce] CEBA-2017:2504 CentOS 6 kernel BugFix Update
Upstream details at : https://access.redhat.com/errata/RHBA-2017:2504
The following updated files have been uploaded and are currently
syncing to the mirrors: ( sha256sum Filename )
i386:
36f1caaa6c48a78430998ec9d682c77fc9df21d9a83304552120556ecd6422a4 kernel-2.6.32-696.10.1.el6.i686.rpm
8608dcfbc36435abd0c53888bf4cf42bef1d3b6db0d3a40c5f4d8deaf468f5be kernel-abi-whitelists-2.6.32-696.10.1.el6.noarch.rpm
045fb48f38b4cecf54daaa5592d9a02f69df0208cac0469c205649f2aa62969f kernel-debug-2.6.32-696.10.1.el6.i686.rpm
29f13703c00dbda98959ed95dea17d8af796b5b19a92b61c73c76def3cb73573 kernel-debug-devel-2.6.32-696.10.1.el6.i686.rpm
d76cfa1de782160933f03fe983d9f65bf3c6d8a19ba3a493f17b503617c9fd91 kernel-devel-2.6.32-696.10.1.el6.i686.rpm
b67a79c5f7f1ab3ee4901179c10a2ed752224ae8cc3372052bedef807993ce0a kernel-doc-2.6.32-696.10.1.el6.noarch.rpm
4fd75de3d8f4695b54c95fd530311ecec385197c7439312afb2f47562a63c18f kernel-firmware-2.6.32-696.10.1.el6.noarch.rpm
b965f76a4170f1acd67eb026745c1cec18a05d7613059face9391081e2d9269b kernel-headers-2.6.32-696.10.1.el6.i686.rpm
575fb150297a97b200d17a562b87c117058c914162fb2e0065d05a0715f14a87 perf-2.6.32-696.10.1.el6.i686.rpm
45119a13d91a6e388f7a421c8b6608cfc5240c98de6d459a4c26b18d25960799 python-perf-2.6.32-696.10.1.el6.i686.rpm
x86_64:
c3354e273a4502253f6bb47dac4a6651c3248e62b3e367ddec7410115f146647 kernel-2.6.32-696.10.1.el6.x86_64.rpm
8608dcfbc36435abd0c53888bf4cf42bef1d3b6db0d3a40c5f4d8deaf468f5be kernel-abi-whitelists-2.6.32-696.10.1.el6.noarch.rpm
a8d900bcedce07d2df857a9cf8fa2e9e1069d2e5c4b975ef711e0225448ac725 kernel-debug-2.6.32-696.10.1.el6.x86_64.rpm
29f13703c00dbda98959ed95dea17d8af796b5b19a92b61c73c76def3cb73573 kernel-debug-devel-2.6.32-696.10.1.el6.i686.rpm
09dbd4bd464ac4ef723b6cae81013bc40fccf8aecccdaff38e7a875ebc53a674 kernel-debug-devel-2.6.32-696.10.1.el6.x86_64.rpm
af3867adb5216dbf71f3c9c126cf0de06996767ef65c05f0786c0210c9a0125e kernel-devel-2.6.32-696.10.1.el6.x86_64.rpm
b67a79c5f7f1ab3ee4901179c10a2ed752224ae8cc3372052bedef807993ce0a kernel-doc-2.6.32-696.10.1.el6.noarch.rpm
4fd75de3d8f4695b54c95fd530311ecec385197c7439312afb2f47562a63c18f kernel-firmware-2.6.32-696.10.1.el6.noarch.rpm
b496b65ca47516f47ea820c11ee7909f3147af4c1576cd0a06e8823c8d5e67e9 kernel-headers-2.6.32-696.10.1.el6.x86_64.rpm
19a1513d18dbbdafc6982b24b6346c77539b1cc1a8cdb2771b73808ee7e15293 perf-2.6.32-696.10.1.el6.x86_64.rpm
f3f19f3b992692f8910046499b26773b025e8e0b5b501ceb39f6f91c6b4da9bf python-perf-2.6.32-696.10.1.el6.x86_64.rpm
Source:
63c595b74270700871b44133cabae13243117cd858fddd66d0589d875eb1509f kernel-2.6.32-696.10.1.el6.src.rpm
--
Johnny Hughes
CentOS Project { http://www.centos.org/ }
irc: hughesjr, #centos@irc.freenode.net
Twitter: @JohnnyCentOS
_______________________________________________
CentOS-announce mailing list
CentOS-announce@centos.org
https://lists.centos.org/mailman/listinfo/centos-announce
[CentOS-announce] CEBA-2017:2506 CentOS 6 dhcp BugFix Update
Upstream details at : https://access.redhat.com/errata/RHBA-2017:2506
The following updated files have been uploaded and are currently
syncing to the mirrors: ( sha256sum Filename )
i386:
31d4b1e77ecd473cfae41fbf4216158cc9b923d553556d412e637ff2fa8cec47 dhclient-4.1.1-53.P1.el6.centos.1.i686.rpm
c35277ba2644e77feb9984275cd871a9e632e0392b9d332e0a85827e7906d1aa dhcp-4.1.1-53.P1.el6.centos.1.i686.rpm
d35c82ff2e3d02889531fd6adb737c11890758c2252ad1cc85f11cd871a4e24a dhcp-common-4.1.1-53.P1.el6.centos.1.i686.rpm
9a0feab0407cb62c42d6e3d2488a0ec9a00c1812117bf9ff591742b3f578fc3c dhcp-devel-4.1.1-53.P1.el6.centos.1.i686.rpm
x86_64:
1a5b9ef938292a1b272db6a52a341cb4cf470d78c9ee44b999b66837797a1c5c dhclient-4.1.1-53.P1.el6.centos.1.x86_64.rpm
069cbc470f4d064b759f1573f74102667aae852b3efc7c3999f5322f3f559e16 dhcp-4.1.1-53.P1.el6.centos.1.x86_64.rpm
6570ee68e9333cbf9698863b2ce4b90f3bd3135c27b537e78d0506b7673a4792 dhcp-common-4.1.1-53.P1.el6.centos.1.x86_64.rpm
9a0feab0407cb62c42d6e3d2488a0ec9a00c1812117bf9ff591742b3f578fc3c dhcp-devel-4.1.1-53.P1.el6.centos.1.i686.rpm
27b4ec55bae530671a45a52a54c84c175cb5d7d2169ac0a5b465ec9ea2b15f31 dhcp-devel-4.1.1-53.P1.el6.centos.1.x86_64.rpm
Source:
904fbae9672602a5e167a228ea712b71460e2a1f705ef0922b5bbec9559dd9cf dhcp-4.1.1-53.P1.el6.centos.1.src.rpm
--
Johnny Hughes
CentOS Project { http://www.centos.org/ }
irc: hughesjr, #centos@irc.freenode.net
Twitter: @JohnnyCentOS
_______________________________________________
CentOS-announce mailing list
CentOS-announce@centos.org
https://lists.centos.org/mailman/listinfo/centos-announce
Tuesday, August 22, 2017
[USN-3401-1] TeX Live vulnerability
Ubuntu Security Notice USN-3401-1
August 22, 2017
texlive-base vulnerability
==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 16.04 LTS
- Ubuntu 14.04 LTS
Summary:
TeX Live could be made to run programs as your login if it
opened a specially crafted file.
Software Description:
- texlive-base: TeX Live: Essential programs and files
Details:
It was discovered that TeX Live incorrectly handled certain
system commands. If a user were tricked into processing a
specially crafted TeX file, a remote attacker could execute
arbitrary code.
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 16.04 LTS:
texlive-base 2015.20160320-1ubuntu0.1
texlive-latex-base 2015.20160320-1ubuntu0.1
Ubuntu 14.04 LTS:
texlive-base 2013.20140215-1ubuntu0.1
texlive-latex-base 2013.20140215-1ubuntu0.1
In general, a standard system update will make all the necessary
changes.
References:
https://www.ubuntu.com/usn/usn-3401-1
CVE-2016-10243
Package Information:
https://launchpad.net/ubuntu/+source/texlive-base/2015.20160320-1ubuntu0.1
https://launchpad.net/ubuntu/+source/texlive-base/2013.20140215-1ubuntu0.1
[opensuse-announce] openSUSE Leap 42.3 Cloud Images Become Available
https://news.opensuse.org/2017/08/22/opensuse-leap-42-3-cloud-images-become-available/
Cloud images for openSUSE Leap 42.3 are now available for Azure, Google Compute Engine and more cloud providers.
The images for Amazon Web Services (AWS EC2) are expected to arrive soon as they were recently submitted for review by the AWS Marketplace team.
"Compared to openSUSE Leap 42.2 we were in much better shape releasing two of three images on release date (GCE and Azure) and even the delayed image was released much closer to release date than the 42.2 release," Robert Schweikert wrote on Google Plus.
End users can choose the cloud service provider that best fits their usage model.
Leap ships with tools for uploading and managing images. The tools allow for uploading, publishing, deleting and deprecating images.
There are a couple of known things not working at the moment like the "gcloud" command in the GCE image and the automatic hostname setting in the GCE image,
Both will be worked on as time permits, Schweikert wrote.
Cloud images of openSUSE have been available in for years and users can run Docker containers in a Virtual Machine with openSUSE's cloud image; this has been tested with SUSE Linux Enterprise Server 12, which shares a common core with openSUSE Leap.
Since releasing openSUSE Leap 42.2 in the AWS Marketplace, around mid January, roughly 220 subscribers are running openSUSE Leap. AWS customers have an opportunity to use openSUSE's community software on AWS without any hourly-software instance charge.
Monday, August 21, 2017
FAmSCo Elections - July/August 2017 - Result announcement
The elections for FAmSCo - August 2017 have concluded, and the results
are shown below.
FAmSCo is electing 3 seats this time.
A total of 148 ballots were cast, meaning a candidate could accumulate
up to 1480 votes (148 * 10).
The results for the elections are as follows:
# votes | name
- --------+----------------------
613 | Nick Bebout (nb/nb)
551 | Itamar Reis Peixoto (itamarjp/itamarjp)
541 | Sumantro Mukherjee (sumantro / sumantrom)
- --------+----------------------
523 | Alex Oviedo Solis (alexove/alexove)
490 | Eduardo Echeverria (echevemaster/echevemaster)
469 | Daniel Lara (danniel/Danniel)
467 | Eduard Lucena (x3mboy)
449 | Ben Williams (Southern_Gentlem/jbwillia)
445 | Sirko Kemter (gnokii/gnokii)
443 | Andrew Ward (award3535)
Congratulations to the winning candidates, and thank you all
candidates for running this elections!
Regards,
Jan
--
Jan Kuřík
Platform & Fedora Program Manager
Red Hat Czech s.r.o., Purkynova 99/71, 612 45 Brno, Czech Republic
_______________________________________________
devel-announce mailing list -- devel-announce@lists.fedoraproject.org
To unsubscribe send an email to devel-announce-leave@lists.fedoraproject.org
FESCo Elections - July/August 2017 - Result announcement
The elections for FESCo - August 2017 have concluded, and the results
are shown below.
FESCo is electing 4 seats this time.
A total of 150 ballots were cast, meaning a candidate could accumulate
up to 750 votes (150 * 5).
The results for the elections are as follows:
# votes | name
- --------+----------------------
458 | Dennis Gilmore (dgilmore / ausil)
438 | Till Maas (tyll / till)
431 | Stephen Gallagher (sgallagh/sgallagh)
330 | Randy Barlow (bowlofeggs/bowlofeggs)
- --------+----------------------
296 | Dominik Mierzejewski (Rathann/rathann)
Congratulations to the winning candidates, and thank you all
candidates for running this elections!
Regards,
Jan
--
Jan Kuřík
Platform & Fedora Program Manager
Red Hat Czech s.r.o., Purkynova 99/71, 612 45 Brno, Czech Republic
_______________________________________________
devel-announce mailing list -- devel-announce@lists.fedoraproject.org
To unsubscribe send an email to devel-announce-leave@lists.fedoraproject.org
[USN-3400-1] Augeas vulnerability
Ubuntu Security Notice USN-3400-1
August 21, 2017
augeas vulnerability
==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 17.04
- Ubuntu 16.04 LTS
- Ubuntu 14.04 LTS
Summary:
Augeas could be made to crash if it received specially crafted
input.
Software Description:
- augeas: Configuration editing tool
Details:
It was discovered that Augeas incorrectly handled certain strings.
An attacker could use this issue to cause Augeas to crash, leading
to a denial of service, or possibly execute arbitrary code.
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 17.04:
augeas-tools 1.6.0-0ubuntu3.1
libaugeas0 1.6.0-0ubuntu3.1
Ubuntu 16.04 LTS:
augeas-tools 1.4.0-0ubuntu1.1
libaugeas0 1.4.0-0ubuntu1.1
Ubuntu 14.04 LTS:
augeas-tools 1.2.0-0ubuntu1.3
libaugeas0 1.2.0-0ubuntu1.3
In general, a standard system update will make all the necessary
changes.
References:
https://www.ubuntu.com/usn/usn-3400-1
CVE-2017-7555
Package Information:
https://launchpad.net/ubuntu/+source/augeas/1.6.0-0ubuntu3.1
https://launchpad.net/ubuntu/+source/augeas/1.4.0-0ubuntu1.1
https://launchpad.net/ubuntu/+source/augeas/1.2.0-0ubuntu1.3
[USN-3399-1] cvs vulnerability
Ubuntu Security Notice USN-3399-1
August 21, 2017
cvs vulnerability
==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 17.04
- Ubuntu 16.04 LTS
- Ubuntu 14.04 LTS
Summary:
cvs could be made run programs as your login if it opened a
specially crafted cvs repository.
Software Description:
- cvs: Concurrent Versions System
Details:
Hank Leininger discovered that cvs did not properly handle SSH
for remote repositories. A remote attacker could use this to
construct a cvs repository that when accessed could run arbitrary
code with the privileges of the user.
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 17.04:
cvs 2:1.12.13+real-22ubuntu0.1
Ubuntu 16.04 LTS:
cvs 2:1.12.13+real-15ubuntu0.1
Ubuntu 14.04 LTS:
cvs 2:1.12.13+real-12ubuntu0.1
In general, a standard system update will make all the necessary
changes.
References:
https://www.ubuntu.com/usn/usn-3399-1
CVE-2017-12836
Package Information:
https://launchpad.net/ubuntu/+source/cvs/2:1.12.13+real-22ubuntu0.1
https://launchpad.net/ubuntu/+source/cvs/2:1.12.13+real-15ubuntu0.1
https://launchpad.net/ubuntu/+source/cvs/2:1.12.13+real-12ubuntu0.1
[USN-3398-1] graphite2 vulnerabilities
Version: GnuPG v2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=6oro
-----END PGP SIGNATURE-----
==========================================================================
Ubuntu Security Notice USN-3398-1
August 21, 2017
graphite2 vulnerabilities
==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 17.04
- Ubuntu 16.04 LTS
- Ubuntu 14.04 LTS
Summary:
graphite2 could be made to crash or run programs if it opened a specially
crafted font.
Software Description:
- graphite2: Font rendering engine for Complex Scripts
Details:
Holger Fuhrmannek and Tyson Smith discovered that graphite2 incorrectly
handled certain malformed fonts. If a user or automated system were tricked
into opening a specially-crafted font file, a remote attacker could use
this issue to cause graphite2 to crash, resulting in a denial of service,
or possibly execute arbitrary code.
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 17.04:
libgraphite2-3 1.3.10-0ubuntu0.17.04.1
Ubuntu 16.04 LTS:
libgraphite2-3 1.3.10-0ubuntu0.16.04.1
Ubuntu 14.04 LTS:
libgraphite2-3 1.3.10-0ubuntu0.14.04.1
This update uses a new upstream release, which includes additional bug
fixes. After a standard system update you need to restart applications
using graphite2, such as LibreOffice, to make all the necessary changes.
References:
https://www.ubuntu.com/usn/usn-3398-1
CVE-2017-7771, CVE-2017-7772, CVE-2017-7773, CVE-2017-7774,
CVE-2017-7775, CVE-2017-7776, CVE-2017-7777, CVE-2017-7778
Package Information:
https://launchpad.net/ubuntu/+source/graphite2/1.3.10-0ubuntu0.17.04.1
https://launchpad.net/ubuntu/+source/graphite2/1.3.10-0ubuntu0.16.04.1
https://launchpad.net/ubuntu/+source/graphite2/1.3.10-0ubuntu0.14.04.1
[USN-3397-1] strongSwan vulnerability
Ubuntu Security Notice USN-3397-1
August 21, 2017
strongswan vulnerability
==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 17.04
- Ubuntu 16.04 LTS
- Ubuntu 14.04 LTS
Summary:
strongSwan could be made to crash or hang if it received specially
crafted network traffic.
Software Description:
- strongswan: IPsec VPN solution
Details:
It was discovered that strongSwan incorrectly handled verifying
specific RSA signatures. A remote attacker could use this issue
to cause strongSwan to crash, resulting in a denial of service.
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 17.04:
libstrongswan 5.5.1-1ubuntu3.2
strongswan 5.5.1-1ubuntu3.2
Ubuntu 16.04 LTS:
libstrongswan 5.3.5-1ubuntu3.4
strongswan 5.3.5-1ubuntu3.4
Ubuntu 14.04 LTS:
libstrongswan 5.1.2-0ubuntu2.7
strongswan 5.1.2-0ubuntu2.7
In general, a standard system update will make all the necessary
changes.
References:
https://www.ubuntu.com/usn/usn-3397-1
CVE-2017-11185
Package Information:
https://launchpad.net/ubuntu/+source/strongswan/5.5.1-1ubuntu3.2
https://launchpad.net/ubuntu/+source/strongswan/5.3.5-1ubuntu3.4
https://launchpad.net/ubuntu/+source/strongswan/5.1.2-0ubuntu2.7
F28 Self Contained Change: Packaging Rust applications/libraries
https://fedoraproject.org/wiki/Changes/Packaging_Rust_applications_and_libraries
Change owner(s):
* Igor Gnatenko <ignatenkobrain@fedoraproject.org > (on behalf of Rust SIG)
Add required tools/instructions for packaging applications/libraries
written in Rust. Rust is a systems programming language that runs
blazingly fast, prevents segfaults, and guarantees thread safety.
== Detailed Description ==
During initial research of SIG about packaging we identified that
inability to specify version range dependencies (1.0 <= foo < 2.0) in
RPM is main blocker. This problem hits almost every other language
ecosystem (esp. NodeJS), but it is not very noticable due to having
not more than 2 versions. While packaging some applications we
discovered need of having 3 or more versions of same crate.
The most of the work already has been done and users can consume
applications without needing to do anything from Rust/Playground COPR
repository https://copr.fedorainfracloud.org/coprs/g/rust/playground/ .
== Scope ==
* Proposal owners: Create tool for automatic creation of rpm-spec-file
from crate on crates.io, create RPM macro for easy packaging, write
packaging guidelines.
* Other developers: RPM developers to add support for expressing
version range dependencies.
* Release engineering: https://pagure.io/releng/issue/6889
* List of deliverables: N/A (not a System Wide Change)
* Policies and guidelines: Packaging Guidelines needs to be written
for packaging Rust applications/libraries.
* Trademark approval: N/A (not needed for this Change)
--
Jan Kuřík
Platform & Fedora Program Manager
Red Hat Czech s.r.o., Purkynova 99/71, 612 45 Brno, Czech Republic
_______________________________________________
devel-announce mailing list -- devel-announce@lists.fedoraproject.org
To unsubscribe send an email to devel-announce-leave@lists.fedoraproject.org