Thursday, June 28, 2018

Planned Outage: Build, cloud and web proxy service down/disrupted 2018-07-02 21:00 UTC

There will be an outage starting at 2018-07-02 21:00UTC, which will
last approximately 4 hours.

To convert UTC to your local time, take a look at
http://fedoraproject.org/wiki/Infrastructure/UTCHowto

or run:

date -d '2018-07-02 21:00UTC'

Reason for outage:

There have been a set up of updates for EL7 and Fedora requiring
reboots of infrastructure. We will be rebooting the Build and remote
systems outside of PHX2 on this day.

Affected Services:

All build and cloud services may be up or down during the outage
window. Various proxies will not be available and fedorapeople will be
down also.

Contact Information:

Ticket Link:

https://pagure.io/fedora-infrastructure/issue/7064

Please join #fedora-admin or #fedora-noc on irc.freenode.net or add
comments to the ticket for this outage above.




--
Stephen J Smoogen.
_______________________________________________
announce mailing list -- announce@lists.fedoraproject.org
To unsubscribe send an email to announce-leave@lists.fedoraproject.org
Fedora Code of Conduct: https://getfedora.org/code-of-conduct.html
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: https://lists.fedoraproject.org/archives/list/announce@lists.fedoraproject.org/message/D2V6JED6H7Y3575ZRP4OCXR5JGRRHNWC/

[USN-3686-2] file vulnerabilities

==========================================================================
Ubuntu Security Notice USN-3686-2
June 28, 2018

file vulnerabilities
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 12.04 ESM

Summary:

Several security issues were fixed in file.

Software Description:
- file: Tool to determine file types

Details:

USN-3686-1 fixed a vulnerability in file. This update provides
the corresponding update for Ubuntu 12.04 ESM.

Original advisory details:

 It was discovered that file incorrectly handled certain magic files.
 An attacker could use this issue with a specially crafted magic file
 to cause a denial of service, or possibly execute arbitrary code.
 (CVE-2015-8865)

 It was discovered that file incorrectly handled certain malformed ELF
 files. An attacker could use this issue to cause a denial of service.
 (CVE-2018-10360)

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 12.04 ESM:
  file                            5.09-2ubuntu0.7
  libmagic1                       5.09-2ubuntu0.7

In general, a standard system update will make all the necessary
changes.

References:
  https://usn.ubuntu.com/usn/usn-3686-2
  https://usn.ubuntu.com/usn/usn-3686-1
  CVE-2015-8865, CVE-2018-10360

[USN-3694-1] NASM vulnerabilities

-----BEGIN PGP SIGNATURE-----
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=OK0R
-----END PGP SIGNATURE-----
==========================================================================
Ubuntu Security Notice USN-3694-1
June 28, 2018

nasm vulnerabilities
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 14.04 LTS

Summary:

NASM could be made to crash or run programs if it opened a specially
crafted file.

Software Description:
- nasm: General-purpose x86 assembler

Details:

It was discovered that NASM incorrectly handled certain source files. If a
user or automated system were tricked into processing a specially crafted
source file, a remote attacker could use these issues to cause NASM to
crash, resulting in a denial of service, or possibly execute arbitrary
code.

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 14.04 LTS:
nasm 2.10.09-1ubuntu0.1

In general, a standard system update will make all the necessary changes.

References:
https://usn.ubuntu.com/usn/usn-3694-1
CVE-2017-10686, CVE-2017-11111, CVE-2017-14228, CVE-2017-17810,
CVE-2017-17811, CVE-2017-17812, CVE-2017-17813, CVE-2017-17814,
CVE-2017-17815, CVE-2017-17816, CVE-2017-17817, CVE-2017-17818,
CVE-2017-17819, CVE-2017-17820, CVE-2018-8881

Package Information:
https://launchpad.net/ubuntu/+source/nasm/2.10.09-1ubuntu0.1

ICU4J License Change notification

ICU4J is now covered by the Unicode License (with MIT and BSD licensed contributed parts.)

The Unicode license is very similar to the previous MIT-style ICU license.

F29 System Wide Change: CJK Default Fonts To Noto

= Proposed System Wide Change: CJK Default Fonts To Noto =
https://fedoraproject.org/wiki/Changes/CJKDefaultFontsToNoto


Owner(s):
* Akira TAGOH <tagoh at redhat dot com>
* Peng Wu <pwu at redhat dot com>


Changes the default fonts for Chinese, Japanese, and Korean (CJK)
languages to Google Noto.


== Detailed description ==
This proposal is to change the default fonts for CJK languages to
Google Noto and adopts OpenType Collection format to suppress disk
space increase as far as possible. Typefaces mapping will change as
described on the Change Proposal wiki page (Change wrangler note: the
description contains tables which are not easily convertible to text,
so please follow this link to check it:
https://fedoraproject.org/wiki/Changes/CJKDefaultFontsToNoto#Detailed_Description
):


== Scope ==
* Proposal owners:
** Update CJK fonts packages with the proper priority of fontconfig config files
** Update fonts group in comps [done]

* Other developers:
** For application package maintainers:
*** Any GUI applications that don't support TTC or OTC, would need to be fixed.

* Release engineering:
#7592 [https://pagure.io/releng/issue/7592]

** List of deliverables:
All of the installable images should be affected

* Policies and guidelines:
N/A

* Trademark approval:
N/A
--
Jan Kuřík
JBoss EAP Program Manager
Red Hat Czech s.r.o., Purkynova 99/71, 612 45 Brno, Czech Republic
_______________________________________________
devel-announce mailing list -- devel-announce@lists.fedoraproject.org
To unsubscribe send an email to devel-announce-leave@lists.fedoraproject.org
Fedora Code of Conduct: https://getfedora.org/code-of-conduct.html
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: https://lists.fedoraproject.org/archives/list/devel-announce@lists.fedoraproject.org/message/4HOZ5PUZXMNRACCM5QHAO5P2QTN2L2TS/

Wednesday, June 27, 2018

[USN-3693-1] JasPer vulnerabilities

-----BEGIN PGP SIGNATURE-----
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=7M8G
-----END PGP SIGNATURE-----
==========================================================================
Ubuntu Security Notice USN-3693-1
June 27, 2018

jasper vulnerabilities
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 16.04 LTS
- Ubuntu 14.04 LTS

Summary:

Several security issues were fixed in JasPer.

Software Description:
- jasper: Library for manipulating JPEG-2000 files

Details:

It was discovered that JasPer incorrectly handled certain malformed
JPEG-2000 image files. If a user or automated system using JasPer were
tricked into opening a specially crafted image, an attacker could exploit
this to cause a denial of service or possibly execute code with the
privileges of the user invoking the program.

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 16.04 LTS:
libjasper1 1.900.1-debian1-2.4ubuntu1.2

Ubuntu 14.04 LTS:
libjasper1 1.900.1-14ubuntu3.5

In general, a standard system update will make all the necessary changes.

References:
https://usn.ubuntu.com/usn/usn-3693-1
CVE-2015-5203, CVE-2015-5221, CVE-2016-10248, CVE-2016-10250,
CVE-2016-8883, CVE-2016-8887, CVE-2016-9262, CVE-2016-9387,
CVE-2016-9388, CVE-2016-9389, CVE-2016-9390, CVE-2016-9391,
CVE-2016-9392, CVE-2016-9393, CVE-2016-9394, CVE-2016-9396,
CVE-2016-9600, CVE-2017-1000050, CVE-2017-6850

Package Information:
https://launchpad.net/ubuntu/+source/jasper/1.900.1-debian1-2.4ubuntu1.2
https://launchpad.net/ubuntu/+source/jasper/1.900.1-14ubuntu3.5

[FreeBSD-Announce] FreeBSD 11.2-RELEASE Now Available

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

FreeBSD 11.2-RELEASE Announcement

The FreeBSD Release Engineering Team is pleased to announce the
availability of FreeBSD 11.2-RELEASE. This is the third release of the
stable/11 branch.

Some of the highlights:

* OpenSSH has been updated to version 7.5p1.

* OpenSSL has been updated to version 1.0.2o.

* The clang, llvm, lldb and compiler-rt utilities have been updated to
version 6.0.0.

* The libarchive(3) library has been updated to version 3.3.2.

* The libxo(3) library has been updated to version 0.9.0.

* Device driver updates to cxgbe(4), ixl(4), and ng_pppoe(4), and the
new mlx5io(4), ocs_fw(4), and smartpqi(4) drivers have been added.

* The dwatch(1), efibootmgr(8), and etdump(1) utilities have been
added.

* Various miscellaneous kernel, userland application, and library
updates.

* KDE has been updated to version 4.14.3.

* Gnome has been updated to version 3.18.0.

For a complete list of new features and known problems, please see the
online release notes and errata list, available at:

* https://www.FreeBSD.org/releases/11.2R/relnotes.html

* https://www.FreeBSD.org/releases/11.2R/errata.html

For more information about FreeBSD release engineering activities, please
see:

* https://www.FreeBSD.org/releng/

Availability

FreeBSD 11.2-RELEASE is now available for the amd64, i386, powerpc,
powerpc64, sparc64, armv6, and aarch64 architectures.

FreeBSD 11.2-RELEASE can be installed from bootable ISO images or over
the network. Some architectures also support installing from a USB memory
stick. The required files can be downloaded as described in the section
below.

SHA512 and SHA256 hashes for the release ISO, memory stick, and SD card
images are included at the bottom of this message.

PGP-signed checksums for the release images are also available at:

* https://www.FreeBSD.org/releases/11.2R/signatures.html

A PGP-signed version of this announcement is available at:

* https://www.FreeBSD.org/releases/11.2R/announce.asc

The purpose of the images provided as part of the release are as follows:

dvd1

This contains everything necessary to install the base FreeBSD
operating system, the documentation, debugging distribution sets,
and a small set of pre-built packages aimed at getting a
graphical workstation up and running. It also supports booting
into a "livefs" based rescue mode. This should be all you need if
you can burn and use DVD-sized media.

disc1

This contains the base FreeBSD operating system. It also supports
booting into a "livefs" based rescue mode. There are no pre-built
packages.

bootonly

This supports booting a machine using the CDROM drive but does
not contain the installation distribution sets for installing
FreeBSD from the CD itself. You would need to perform a network
based install (e.g., from an HTTP or FTP server) after booting
from the CD.

memstick

This can be written to an USB memory stick (flash drive) and used
to do an install on machines capable of booting off USB drives.
It also supports booting into a "livefs" based rescue mode. There
are no pre-built packages.

As one example of how to use the memstick image, assuming the USB
drive appears as /dev/da0 on your machine something like this
should work:

# dd if=FreeBSD-11.2-RELEASE-amd64-memstick.img \
of=/dev/da0 bs=1m conv=sync

Be careful to make sure you get the target (of=) correct.

mini-memstick

This can be written to an USB memory stick (flash drive) and used
to boot a machine, but does not contain the installation
distribution sets on the medium itself, similar to the bootonly
image. It also supports booting into a "livefs" based rescue
mode. There are no pre-built packages.

As one example of how to use the mini-memstick image, assuming
the USB drive appears as /dev/da0 on your machine something like
this should work:

# dd if=FreeBSD-11.2-RELEASE-amd64-mini-memstick.img \
of=/dev/da0 bs=1m conv=sync

Be careful to make sure you get the target (of=) correct.

FreeBSD/arm SD card images

These can be written to an SD card and used to boot the supported
arm system. The SD card image contains the full FreeBSD
installation, and can be installed onto SD cards as small as 2GB.

For convenience for those without console access to the system, a
freebsd user with a password of freebsd is available by default
for ssh(1) access. Additionally, the root user password is set to
root, which it is strongly recommended to change the password for
both users after gaining access to the system.

To write the FreeBSD/arm image to an SD card, use the dd(1)
utility, replacing KERNEL with the appropriate kernel
configuration name for the system.

# dd if=FreeBSD-11.2-RELEASE-arm-armv6-KERNEL.img \
of=/dev/da0 bs=1m conv=sync

Be careful to make sure you get the target (of=) correct.

FreeBSD 11.2-RELEASE can also be purchased on CD-ROM or DVD from several
vendors. One of the vendors that will be offering FreeBSD 11.2-based
products is:

* FreeBSD Mall, Inc. https://www.freebsdmall.com

Pre-installed virtual machine images are also available for the amd64
(x86_64), i386 (x86_32), and AArch64 (arm64) architectures in QCOW2, VHD,
and VMDK disk image formats, as well as raw (unformatted) images.

FreeBSD 11.2-RELEASE amd64 is also available on these cloud hosting
platforms:

* Amazon(R) EC2(TM):
AMIs are available in the following regions:

ap-south-1 region: ami-941520fb
eu-west-3 region: ami-fcf54581
eu-west-2 region: ami-ccb75eab
eu-west-1 region: ami-cb202e21
ap-northeast-2 region: ami-54bd083a
ap-northeast-1 region: ami-3e25f341
sa-east-1 region: ami-7147621d
ca-central-1 region: ami-a2f97bc6
ap-southeast-1 region: ami-57f0f22b
ap-southeast-2 region: ami-2e25fc4c
eu-central-1 region: ami-2b97a8c0
us-east-1 region: ami-e83e6c97
us-east-2 region: ami-3bd2eb5e
us-west-1 region: ami-f0df3993
us-west-2 region: ami-37df964f

AMIs will also available in the Amazon(R) Marketplace once they have
completed third-party specific validation at:
https://aws.amazon.com/marketplace/pp/B01LWSWRED/

* Google(R) Compute Engine(TM):
Instances can be deployed using the gcloud utility:

% gcloud compute instances create INSTANCE \
--image freebsd-11-2-release-amd64 \
--image-project=freebsd-org-cloud-dev
% gcloud compute ssh INSTANCE

Replace INSTANCE with the name of the Google Compute Engine instance.

FreeBSD will also available in the Google Compute Engine(TM)
Marketplace once they have completed third-party specific validation
at:
https://console.cloud.google.com/launcher/browse?filter=category:os&filter=price:free

* Hashicorp/Atlas(R) Vagrant(TM):
Instances can be deployed using the vagrant utility:

% vagrant init freebsd/FreeBSD-11.2-RELEASE
% vagrant up

* Microsoft(R) Azure(TM):
FreeBSD virtual machine images will be available once they have
completed third-party specific validation at:
https://azuremarketplace.microsoft.com/marketplace/apps/Microsoft.FreeBSD112?tab=Overview

Download

FreeBSD 11.2-RELEASE may be downloaded via https from the following site:

* https://download.freebsd.org/ftp/releases/ISO-IMAGES/11.2/

FreeBSD 11.2-RELEASE virtual machine images may be downloaded from:

* https://download.freebsd.org/ftp/releases/VM-IMAGES/11.2-RELEASE/

For instructions on installing FreeBSD or updating an existing machine to
11.2-RELEASE please see:

* https://www.FreeBSD.org/releases/11.2R/installation.html

Support

Based on the new FreeBSD support model, the FreeBSD 11 release series
will be supported until at least September 30, 2021. This point release,
FreeBSD 11.2-RELEASE, will be supported until at least three months after
FreeBSD 11.3-RELEASE. Additional support information can be found at:

* https://www.FreeBSD.org/security/

Please note that 11.1 will be supported until three months from the 11.2
release date, currently scheduled for September 30, 2018.

Acknowledgments

Many companies donated equipment, network access, or man-hours to support
the release engineering activities for FreeBSD 11.2 including The
FreeBSD Foundation, Yahoo!, NetApp, Internet Systems Consortium, ByteMark
Hosting, Sentex Communications, New York Internet, Juniper Networks,
NLNet Labs, iXsystems, and Yandex.

The release engineering team for 11.2-RELEASE includes:

Glen Barber <gjb@FreeBSD.org> Release Engineering Lead,
11.2-RELEASE Release Engineer
Konstantin Belousov <kib@FreeBSD.org> Release Engineering
Bryan Drewery <bdrewery@FreeBSD.org> Release Engineering, Package
Building
Marc Fonvieille <blackend@FreeBSD.org> Release Engineering, Documentation
Rodney Grimes <rgrimes@FreeBSD.org> Release Engineering
Xin Li <delphij@FreeBSD.org> Release Engineering, Security
Officer Emeritus
Remko Lodder <remko@FreeBSD.org> Security Team Liaison
Ed Maste <emaste@FreeBSD.org> Security Officer Deputy
Hiroki Sato <hrs@FreeBSD.org> Release Engineering, Documentation
Gleb Smirnoff <glebius@FreeBSD.org> Release Engineering
Marius Strobl <marius@FreeBSD.org> Release Engineering Deputy Lead
Gordon Tetlow <gordon@FreeBSD.org> Security Officer
Robert Watson <rwatson@FreeBSD.org> Release Engineering

Special thanks to Colin Percival <cperciva@FreeBSD.org> for his help in
working out several last-minute issues with FreeBSD on Amazon(R) EC2(TM).

Trademark

FreeBSD is a registered trademark of The FreeBSD Foundation.

ISO Image Checksums

amd64 (x86_64):

SHA512 (FreeBSD-11.2-RELEASE-amd64-bootonly.iso) = eba02c98f8c665e39a9d6064f49342b37cd445e7e03e94bd5373b03b87c9134206da60a199bdf099fc907f570705bf896d5b2fd9af26d87c2599fffa72f4a34a
SHA512 (FreeBSD-11.2-RELEASE-amd64-bootonly.iso.xz) = 8e7ef8183376ed9c98e74c3062ab9c216605f4158c13fc88666660cf3fd0d53c465b2d6752543d300e5463bfa1301b54c8efb41c7cad772b5bdbc8356c7d83b1
SHA512 (FreeBSD-11.2-RELEASE-amd64-disc1.iso) = 3a98f0ad7ad4b9cd1e2f73b7cdc39be1e4ee009693d9a54aeb7f537aaee6ef66103c085a9759cd5c95d5b03681aef315436a4d26088e87cfbafa763f3ae71868
SHA512 (FreeBSD-11.2-RELEASE-amd64-disc1.iso.xz) = 5651bf12a73a1430f60e785bb1d4983dc66878aee983aa725f69b1519ab9688d53785f24ee9259ae716083fde22b3ccf9016c8d2db61512b62665f3f4fab32cf
SHA512 (FreeBSD-11.2-RELEASE-amd64-dvd1.iso) = 843549b9a6c56ddd0bd12838693e0da9a81323ef8607654ed36a3486b52766e67d8b51d08be0618b6c6f32bf191dd9ef69ebfcea0a628657e5597200251e69f1
SHA512 (FreeBSD-11.2-RELEASE-amd64-dvd1.iso.xz) = a59122413b416e9d5de65768c14cb995a355c519055c12e4d1efbca067697c0cbc64cdbd6375b679d9047cfdd2a15480d673ac48282ef4d34d2bd9b1909384b2
SHA512 (FreeBSD-11.2-RELEASE-amd64-memstick.img) = 164cdfd9f6cd134d2e2b1e5d83aa910d488b870c027055a71f19fc73ff469c8535e4c812f6268f48dbdcc8b2bd16aace593114f461399f58f71f3cb3e830bb0e
SHA512 (FreeBSD-11.2-RELEASE-amd64-memstick.img.xz) = 59e6a2a0bf4f91068bdf3c5f372bbace3d4fc6eb225b369c41a2a102e906c4b0717179a2de46bb23f73590dc486e512ad6c30cbe2d5b0c08a6ccd953447b612c
SHA512 (FreeBSD-11.2-RELEASE-amd64-mini-memstick.img) = 87b885dcd299cb8938dbc23e540ed469803199d492c5bd74c7a9b16d219aa523a0028bf0ad433ef830db057a2c9691527d10fe1ca2a38ca1a64a24ca649be20b
SHA512 (FreeBSD-11.2-RELEASE-amd64-mini-memstick.img.xz) = 4cc735bef3b1241230be71886529b91f816fbde5eba95a75dac591bc6174dd63136fa5b50178f6f424a4c93b1942865aed05cf7036aca834a8a3a6b5e7ee9c74


SHA256 (FreeBSD-11.2-RELEASE-amd64-bootonly.iso) = 107e4c6e42607ca55b6479a34aeba19e05d0fc1a82a36ad8e633f33169bb4fdb
SHA256 (FreeBSD-11.2-RELEASE-amd64-bootonly.iso.xz) = 29c082156f4df9bfc797723b8425edc9b9e2d203866a75fea90262a75a9e619f
SHA256 (FreeBSD-11.2-RELEASE-amd64-disc1.iso) = 710d237907f1753dbfbecb1186e401d9635156eeef6914f24f632f3219e59d3b
SHA256 (FreeBSD-11.2-RELEASE-amd64-disc1.iso.xz) = 1497baa593f9b91a0041e6d858526d3ece98c2e20f85401bfb03e3dc8c0fd544
SHA256 (FreeBSD-11.2-RELEASE-amd64-dvd1.iso) = ce15a111cd2b4c7972c35cfafd4b373c0b725fd70ce64397d2e33b6124b3d092
SHA256 (FreeBSD-11.2-RELEASE-amd64-dvd1.iso.xz) = 2b524bf4bcbdc940af82689f256a0fdc48ec90cc0c92bb49a39c02a548417cdd
SHA256 (FreeBSD-11.2-RELEASE-amd64-memstick.img) = 784d4cc1971def3b7cca14fe97368b8c62ec56f4cd2d5090760b94d534de4f80
SHA256 (FreeBSD-11.2-RELEASE-amd64-memstick.img.xz) = 008034131b8336a8b86ebecf068428eaff0fcd832270d18fe07e2436331ac61e
SHA256 (FreeBSD-11.2-RELEASE-amd64-mini-memstick.img) = 4b90f19c9f08cc7a2db39072e43967d90f3bf057125aa16b8c9d7c3ea8d23b39
SHA256 (FreeBSD-11.2-RELEASE-amd64-mini-memstick.img.xz) = 603d2e4781bf178fbaff79fe1b6a8f24a27096b1b5a7902a02628ba568b610ec


i386 (x86):

SHA512 (FreeBSD-11.2-RELEASE-i386-bootonly.iso) = e24f9d2f2dc46166b4dee20911d9649bfa47c291640615dbbb587d897f2a42217c898934d99970d1ff0c1f7999ff6f3f459913a3ede3a339bf83cb882e6814cc
SHA512 (FreeBSD-11.2-RELEASE-i386-bootonly.iso.xz) = 811f03cdb9e8e394b855b0869fe16ee10197f8395a2a16d21d3178abd8ccc952136cd342af8e1d9a06c4773c7d251f93b793d2969f8aa175f6d34e7b8b5dcea4
SHA512 (FreeBSD-11.2-RELEASE-i386-disc1.iso) = 4a4d7340711ff469686f0b1b986fbd05f0a1220e7907b46a356709492f1a1a06e86e61b31fc52399773bbc854feb98c44928790c985aa7a6cf54b9a7f4e4481c
SHA512 (FreeBSD-11.2-RELEASE-i386-disc1.iso.xz) = d4dd3864ef2a2a0d8f0460fd73e661b1416216ee3deb006d3ea830a12fc71a5cd2c0207cc2675dbe012b3c0438b5026e3e1abcff85f5ac5cc5b3be9d03fdeed6
SHA512 (FreeBSD-11.2-RELEASE-i386-dvd1.iso) = 4c663f44bd438d6881800f5819f7c15ede5e2c98b5b68c680146f655d232e1eb1a555b878cbe7e2b1a2c95e43a7117d7962e31604d5555b49072372b957e0561
SHA512 (FreeBSD-11.2-RELEASE-i386-dvd1.iso.xz) = 2d9ab2235dcf5b44eac0c69f0f81d688fda2f3ce1c1a4b6965fd064e85b639bb90b5fe3085ac945ff26d3f8ce5d2bab9687fd59548f948dd1ccd154d003fe5ff
SHA512 (FreeBSD-11.2-RELEASE-i386-memstick.img) = 52e797705b571ec525138a5fc3ac6af8a004820bf702aae8fbc6cf49e16a66786e69d4c7aededb893294c407bdf89f95bc2a6ec6b7c36d3c06c873e4b8664ad2
SHA512 (FreeBSD-11.2-RELEASE-i386-memstick.img.xz) = 898820241db7346ca88b6002798d6fa77ec1cf93d3651a04de428ffc1a5d6b8346d87970abe6ef626a87579a4ed45a33cb8fa2b8f0fb052603d31dc9d42bc811
SHA512 (FreeBSD-11.2-RELEASE-i386-mini-memstick.img) = 957e6b9bd7e1ffd682d7f14600a1c1c072172b6a9149663fd8c16e9affc965a2c53fe6f5b3b1de4e82a02bfb004aa59da57407946ccaaeb19fd46c3143c01202
SHA512 (FreeBSD-11.2-RELEASE-i386-mini-memstick.img.xz) = 4ce221c2fb65e26be0777fe307cd7ac4a13bbfe885493877ccde821d7047a01da587b9e6dc85c982de4498b8e36fdfb03de6654ec315be6e0dde114d8868bd08


SHA256 (FreeBSD-11.2-RELEASE-i386-bootonly.iso) = ce1f12c492c26930cf6635dd04799a679eb731ee53ad753d403e54e20c3e9e5c
SHA256 (FreeBSD-11.2-RELEASE-i386-bootonly.iso.xz) = fdbd2cea9bcef68e3cf8a67d5094dd132e3a261c345e43cb8322abd36454d820
SHA256 (FreeBSD-11.2-RELEASE-i386-disc1.iso) = 676ca4ca873b210a52a01c3c24fb2d114ea47ae77e7d86b445f459407d7a0a8d
SHA256 (FreeBSD-11.2-RELEASE-i386-disc1.iso.xz) = b5f1a5c9bf823b099c348f6cd7ec778a55920f96ff0f77cd80b658b29ada05f8
SHA256 (FreeBSD-11.2-RELEASE-i386-dvd1.iso) = 7da5b9e3691ac46ad6e2f1d21e19055dd089d0b1199968315d3bd8f20026e47c
SHA256 (FreeBSD-11.2-RELEASE-i386-dvd1.iso.xz) = ce7a64f98399e01b9a53ff463a8ff37e12f547d3cf675a89c995ae9cca5d69c8
SHA256 (FreeBSD-11.2-RELEASE-i386-memstick.img) = 15665a4f43baa16388fcfaa60c191308cfe0c8b9849a3d03a66aa175bad5721f
SHA256 (FreeBSD-11.2-RELEASE-i386-memstick.img.xz) = 30a69c7c9a7e094f152aeae218cf99996e23722a11d29e789141fea71ddd0f81
SHA256 (FreeBSD-11.2-RELEASE-i386-mini-memstick.img) = fbce06c7f98a242c920eebc443644ace4a63b8228bc5bd5d88f5566d0831fe75
SHA256 (FreeBSD-11.2-RELEASE-i386-mini-memstick.img.xz) = fb43220c1d990a312fb10c1a6db63c825ade5588716261ea2ac3da08dd591071


powerpc:

SHA512 (FreeBSD-11.2-RELEASE-powerpc-bootonly.iso) = 33bbba67c304157e40e3254addf9657783c0b96639282879ed4bace4b80a2fe9eb9cbe3594229c8b6d2579c4d189185ae2c0df9c0fa3491580c00ec9230a16ce
SHA512 (FreeBSD-11.2-RELEASE-powerpc-bootonly.iso.xz) = 7a4ee5b4cf28dccc74e4c89bedc3d40a094673e372d9a128074fc0d16d08bc3e8cd88469551ff8a02c9007ab9c966e7048030235cbe57a260596186be1bfc518
SHA512 (FreeBSD-11.2-RELEASE-powerpc-disc1.iso) = 668c8f9b5ffa1f566000ce1da9fb0df26045bb959b6c3a26df1bac834582c9490fc4652741956e94b0daa07773105524c13be151973036b8f5d7383ce3cf7e06
SHA512 (FreeBSD-11.2-RELEASE-powerpc-disc1.iso.xz) = 5cf8d21fd230deae32aba20e96384a4dcc5ea36220510595ff8a0c31b0fd7eea0068ba648563647dee326ceb2b6d686c0f81bd07fd631ebab20870ca98dfeb5e
SHA512 (FreeBSD-11.2-RELEASE-powerpc-dvd1.iso) = 17bad078ac150297a315f35c70b4c7f8bc6ff7284787d9c0586543f9b7e51086d99a096015b6795e8f1fac2da68f15e585ffb6e4d44aecbfa36f7cf293f6e265
SHA512 (FreeBSD-11.2-RELEASE-powerpc-dvd1.iso.xz) = 3807fbf870e75775f0e9e7463ed926e861ab97d417416251b537eb10607e4c62749c493a586ab8f173aaa40684815501aa81381f978f206014187f353a1f4126
SHA512 (FreeBSD-11.2-RELEASE-powerpc-memstick.img) = 3c425fa24d5a099f867cef72120547e75a53af9ef49fed91194d8bf3bba3b1a4f8ccd83b89d526742fdb6802d2dd912fe64dd5dbb4bfcd18651bbce309b39384
SHA512 (FreeBSD-11.2-RELEASE-powerpc-memstick.img.xz) = ff79ec9b3ac2a4dfb3dff111fc5571cb88692bbd08d606b706fb94eda699bfddb5b4b32a46d5da5bf18bf1aa5180e29f08facfdee4fad3a0fdbc729a394b81b8
SHA512 (FreeBSD-11.2-RELEASE-powerpc-mini-memstick.img) = 69d6233784cf045bafd3e255307e88920a8b348ed880cf2a8ec300bce8909c5adcaa58a28be43b9cd64b5abc7abe1bcdedab61f925551f5fc046be8a7ee87a08
SHA512 (FreeBSD-11.2-RELEASE-powerpc-mini-memstick.img.xz) = 6eb4debb8a8a499ba8240178dba730aa258c7f69005eb808e73a97ef909e62645776b39e6fe3bd55c63215c7242039e69b6a9dbdd98d7df20654d4b51623fabf


SHA256 (FreeBSD-11.2-RELEASE-powerpc-bootonly.iso) = ecc1d1ac17872692573aa2fa7da9081cfacf571a54b8656e864a4a0a842fe83a
SHA256 (FreeBSD-11.2-RELEASE-powerpc-bootonly.iso.xz) = 2bb1145b6b6ba69431f0e7ef05f6b4e1d876e115bb9817f4eda0ee792f8c1d52
SHA256 (FreeBSD-11.2-RELEASE-powerpc-disc1.iso) = ab53e8ae2656303e89e766ddbfa19cd620b12026b916dfec613c3fae52ad0733
SHA256 (FreeBSD-11.2-RELEASE-powerpc-disc1.iso.xz) = aefc589131694f67c7c0443ce6abcddd8bc68287c9c9701656ad1ffcd341de7a
SHA256 (FreeBSD-11.2-RELEASE-powerpc-dvd1.iso) = 78852af33ca4d3819fa4548ba13f27877365ce78da0f95d5b6664d728f770802
SHA256 (FreeBSD-11.2-RELEASE-powerpc-dvd1.iso.xz) = ddc0e86960de35aa609ee68b358a8dd278189744f94e2fde039d7907ff1a24e3
SHA256 (FreeBSD-11.2-RELEASE-powerpc-memstick.img) = 285f967a44bcb3ad552b7e04a9c30c68f95b7b2ed46fdf3a54d5bad83ae06c61
SHA256 (FreeBSD-11.2-RELEASE-powerpc-memstick.img.xz) = c50fd5848b0603592a1677196f16778796a7db5caebe24a761ef69f77d4d862f
SHA256 (FreeBSD-11.2-RELEASE-powerpc-mini-memstick.img) = 85c3f1d614c327f80200531d2cd71613bb3cff310edaa8714b47b637d15268b9
SHA256 (FreeBSD-11.2-RELEASE-powerpc-mini-memstick.img.xz) = 3bdf1f4237d8f7debecb7771001bcf6a48d20f2bda0c9cea999fa1082145b8c8


powerpc64:

SHA512 (FreeBSD-11.2-RELEASE-powerpc-powerpc64-bootonly.iso) = 968fdf83a69b3b7ee359e79af82dc6b32caacef948ae18c14fb128b546ec2f42cc836a3987965b4a3336d384930b60a9d3a514827ba7973984d9249df6b04455
SHA512 (FreeBSD-11.2-RELEASE-powerpc-powerpc64-bootonly.iso.xz) = 99464d640b54f15b582ff46860d49d231b148852c498ccc840e77e23b11d46568510d6d7e27c5b706937ba5024ff4a5304500b9fbc542f45fef6779f22400a21
SHA512 (FreeBSD-11.2-RELEASE-powerpc-powerpc64-disc1.iso) = 34427090fd825cb6409d82cdd12e6c58c8a6a0a958291440b90b66143e7473c33860f6e891ee19a5fdc33ac749c1e379e3dfd0b8c9ab93e1e61e5673cfaea2b9
SHA512 (FreeBSD-11.2-RELEASE-powerpc-powerpc64-disc1.iso.xz) = 5810ab0a0b8311008344021c07fbd0777bb4133d1a4c967cd1d568d98c06b1d3e378e37b0941c309d0bbb3c87c8986fc52502d1d097c83288a4075f2eeef0c0e
SHA512 (FreeBSD-11.2-RELEASE-powerpc-powerpc64-dvd1.iso) = bc916c920f9156dc99f26c74cfa4ae7c84e0973707fc50b2f9ef4e398b16f1fe73761337358bbfefc11d0518d383d91892a49e6f0157866df9eb3f72ede74512
SHA512 (FreeBSD-11.2-RELEASE-powerpc-powerpc64-dvd1.iso.xz) = c23a876e10a5e1df592aa6345f5c51a3c269586e264cd358b35e10cf6d71a7a76bcfd0c07ce39d959edeb5ff33c127c6b3574cb38c10457d50e0c2559b2d6f0d
SHA512 (FreeBSD-11.2-RELEASE-powerpc-powerpc64-memstick.img) = 46af6aa035eba9997a09d0ec40f3e0182d2257c56713584098def1ac7eeb5c8131838b25ef5fba25f8ff065dfc45074ae00bfb4d3b0b6b5eac508a7987375a6c
SHA512 (FreeBSD-11.2-RELEASE-powerpc-powerpc64-memstick.img.xz) = 397afdec25ac958d38802beb50291732396263619149b523fae8aad309e8f0ddb5ce03009977950f6b94b254630c9377699d96c8b873479717813fe118d08b56
SHA512 (FreeBSD-11.2-RELEASE-powerpc-powerpc64-mini-memstick.img) = ea721a211352f376d5d4fdb29edffcaef5298b6d51d49f03eeb76e2c2e90d0bdb77effa865410b3db6f8c148c2daaccff3d67e67406550ff9ee3d1a094faa4a3
SHA512 (FreeBSD-11.2-RELEASE-powerpc-powerpc64-mini-memstick.img.xz) = 9ddc73a8cd2cc6e2339996c4ebd21597e8e3d1857bc4ba2f306b698732473f5da402397ca8f3c04b1de5d8a1ce87b8a42a7e581e519c0f9c4577d43a7ce7f84a


SHA256 (FreeBSD-11.2-RELEASE-powerpc-powerpc64-bootonly.iso) = 34e835ddb1b21941c6abfc4636a0ea03a825e7b249279f7e8b2c4ae4d69ac901
SHA256 (FreeBSD-11.2-RELEASE-powerpc-powerpc64-bootonly.iso.xz) = 1369c6590afbf128666e14d7d80122e03f6c0149a42359f0af3bc57ccaa8e609
SHA256 (FreeBSD-11.2-RELEASE-powerpc-powerpc64-disc1.iso) = 877256241bd114561e0b7fbae2404b7795f2ff1dc4dbba01a94cfe0625787332
SHA256 (FreeBSD-11.2-RELEASE-powerpc-powerpc64-disc1.iso.xz) = 3f9a0a8f014f51a9ff894be72ca97eb1cf23734891dcbcf060eb79612ae36f45
SHA256 (FreeBSD-11.2-RELEASE-powerpc-powerpc64-dvd1.iso) = 34e33421490ca882beaa604c1bd1b1b4a158779e7361f08e1a82060843c872d3
SHA256 (FreeBSD-11.2-RELEASE-powerpc-powerpc64-dvd1.iso.xz) = 70ca894b65e2b57f3deb0bedf0a40ade9936afda84b5e577d391c2dba24d643d
SHA256 (FreeBSD-11.2-RELEASE-powerpc-powerpc64-memstick.img) = ff863db160495d4107c955914fcc64faa2a7ff1944cd71db525ded0d44fd79f3
SHA256 (FreeBSD-11.2-RELEASE-powerpc-powerpc64-memstick.img.xz) = 12beaa5aa6d6078ea991434db6cad9b0ca2e4088ad141e0ee4b59582f616ccdd
SHA256 (FreeBSD-11.2-RELEASE-powerpc-powerpc64-mini-memstick.img) = 9919a37fb145dc3aa262b5d442033b5932744e89725dfadff9da13dbab3ad358
SHA256 (FreeBSD-11.2-RELEASE-powerpc-powerpc64-mini-memstick.img.xz) = c3395d0531e199b44414cc1d0ce4a1f2bb06137528b66acbdc0f5877d3630d00


sparc64:

SHA512 (FreeBSD-11.2-RELEASE-sparc64-bootonly.iso) = 0aab1f5f540ab17c08eaec1d93ac5a86ddf6dcbe4864df4be0f9f655cb8f34bf7d52f15aadaaa3b00b283758a7b5c161b4e3411c09f0474624a84c92389d53f7
SHA512 (FreeBSD-11.2-RELEASE-sparc64-bootonly.iso.xz) = 4a2962f5d654ec47012dfefdebe9f6ae4f8c881c667cdf371795018eca523b771a056712931b654ccacc3b3e434c0c0856ed68cdecbee4d20a4cf142ff580361
SHA512 (FreeBSD-11.2-RELEASE-sparc64-disc1.iso) = 3258676b090a2953d723ac21ece66cfd6966cb0df1c8fad709345f2b26069002e423485ec684a103bd0a85b67302d7357025e448735776754ca56d8be6c35b0a
SHA512 (FreeBSD-11.2-RELEASE-sparc64-disc1.iso.xz) = 51c8092674a7c37acb91fbd83c9293a1bb345fd886b3a9adf2ca97db1feda5c4f82f08ea26f47294968a2562657d5b708834e29dc1e04bc52d7ba26be36210e1
SHA512 (FreeBSD-11.2-RELEASE-sparc64-dvd1.iso) = e3d93b587d4c9dc50422fa730f2b3401ed713fdd8e9ec4366454d97cf6e4c2ae1a1b657d72ccfaedded26dddb9a05425c58aa5acaa74ea42822d2ecae2d05b7d
SHA512 (FreeBSD-11.2-RELEASE-sparc64-dvd1.iso.xz) = 3709e40bb30b0b3bb32fd37e29c6976e54d3983473098a88daad093ef5051fa0bc57fa94d9389e64eac047bdef03afd204d22651d3aece40cc0419293a9c65f6


SHA256 (FreeBSD-11.2-RELEASE-sparc64-bootonly.iso) = a9238344b4a6c48d9c1ad45c3bc653533fb0561b4bee6791bdf53dd95cc728ad
SHA256 (FreeBSD-11.2-RELEASE-sparc64-bootonly.iso.xz) = ebca9148ff95ff9c0335b939d406f34f8482919cabfa7402e8a670b5cabcab72
SHA256 (FreeBSD-11.2-RELEASE-sparc64-disc1.iso) = 60765a0629bb74b60db427f10899b35cca35b6cb97e29acfb5141a7e7aa672c2
SHA256 (FreeBSD-11.2-RELEASE-sparc64-disc1.iso.xz) = ed35ea562402da5531bc25f84aa9e56bbd77d371fe2bea0db133959b17444796
SHA256 (FreeBSD-11.2-RELEASE-sparc64-dvd1.iso) = 648bb8a8cd565d3d56f3ad27d6854dfa8a0803c6e66a8d7663b40a550ea70ac7
SHA256 (FreeBSD-11.2-RELEASE-sparc64-dvd1.iso.xz) = ead5b0398fa959ba920cc90014ba675e2b9c29f9db1d540951b75c315bf67c56


aarch64:

SHA512 (FreeBSD-11.2-RELEASE-arm64-aarch64-memstick.img) = d4dc187d05f55bc38a1ab7d9f547eb54877384aa8910ef26aa3eddf92185bf9fb6c4f88f1530092785d51ebf0e61de8c21b6d2204497f17be6b91a55a2f316ad
SHA512 (FreeBSD-11.2-RELEASE-arm64-aarch64-memstick.img.xz) = 4f7c28c2311277c1a2e9a2829290051efa3a986468e2463bec3583816e2fa8fb3c0dcfeff013fb499160593909535f314c4d6ac638673465528b8e72a1a2f582
SHA512 (FreeBSD-11.2-RELEASE-arm64-aarch64-mini-memstick.img) = 2384187041ea5f1475fae110a2b5b51a813089fc1d58db30a790626a0163e6e835032815b816a28f31bbddcbdcec9981f0782502fe9367c09364af9af7b571c5
SHA512 (FreeBSD-11.2-RELEASE-arm64-aarch64-mini-memstick.img.xz) = 29a127a456c2dd145b9d9ac5234c4712af599971493935a732eab94aa2bfb96bde192dd20af917ba8e8bdc2e6f1116ea385eaae2e420952dd9f8438ce8010324


SHA256 (FreeBSD-11.2-RELEASE-arm64-aarch64-memstick.img) = 7adb43ec554020c35e510373290cd506eb6f16d15e8908e42267723888fcb4d4
SHA256 (FreeBSD-11.2-RELEASE-arm64-aarch64-memstick.img.xz) = a064e5a29704f025f6814022710e3ada49909b2df9b5af6c7a49767df094421e
SHA256 (FreeBSD-11.2-RELEASE-arm64-aarch64-mini-memstick.img) = 28d6d4b79cc9903f6013de1f6da3f4bb2a39b372df8773f0bc7b1cba39ac94ec
SHA256 (FreeBSD-11.2-RELEASE-arm64-aarch64-mini-memstick.img.xz) = 07d3442cf977895a5b3f76aa5148272e3b05d53c11108fc246f25a997f970963


arm GUMSTIX:

SHA512 (FreeBSD-11.2-RELEASE-arm-GUMSTIX.img.xz) = 234074750403c1d8d797d166f22a8eff6fc2151898a155a60c1eef2822c4734565817c333cc1bb83c60f8d389e1dc1c277929f69f8b32727e634ef65c4757572


SHA256 (FreeBSD-11.2-RELEASE-arm-GUMSTIX.img.xz) = 1c0f75c87f95faee4f287703e1616331c918c054af5b52db33c7f0fb815f7d0d


armv6 BANANAPI:

SHA512 (FreeBSD-11.2-RELEASE-arm-armv6-BANANAPI.img.xz) = c2fad235b90958bc5ab2b22e2ffc911b45c9542bed58ae9893845e9943be4f9bdf8fcdff28691e4171135c3150f160058cdb3740077b2a202f3eaf9ccbadf04e


SHA256 (FreeBSD-11.2-RELEASE-arm-armv6-BANANAPI.img.xz) = a7023a89d4260aac52994f587c20f3d08075b3cb9b91b4d22d432e63144d8d00


armv6 BEAGLEBONE:

SHA512 (FreeBSD-11.2-RELEASE-arm-armv6-BEAGLEBONE.img.xz) = 61aa2bc6c92bd8e26534c3c7fb1756dd51853d4f2eec506a0d20d02868c1a8d57d3b24b65fc89212df3949456a162379f66b50d9ae4424951b66fa2df7a468bb


SHA256 (FreeBSD-11.2-RELEASE-arm-armv6-BEAGLEBONE.img.xz) = e1d7c94ed8d442b0986d261f10b93a4bd14757562e339ba0d1c3737d390963dd


armv6 CUBIEBOARD:

SHA512 (FreeBSD-11.2-RELEASE-arm-armv6-CUBIEBOARD.img.xz) = 55b4cff13f092d6dc845dc5bef0d98af84bb1144e9c7a7b942928c91c4b6c2d88dc09052b3265b82ace80a8c852af5218a25be45fab13508d8f6b2ff601519dd


SHA256 (FreeBSD-11.2-RELEASE-arm-armv6-CUBIEBOARD.img.xz) = 11e7b78f89d104fa18e1ff03470048729efbcd1ad436c0872e9e9b9c7f610d16


armv6 CUBIEBOARD2:

SHA512 (FreeBSD-11.2-RELEASE-arm-armv6-CUBIEBOARD2.img.xz) = d3349fd1c25bc2c648b81031e34858e362feb629cc2814e471a9f19d459aea46866179f6f8e28f20bc521707ceffc58a7d03d731ecda478f141951e0e9edf2fc


SHA256 (FreeBSD-11.2-RELEASE-arm-armv6-CUBIEBOARD2.img.xz) = b83b349c4e09aaa85cc8d9ca5ae32cd1f07d79dd4c3a0b97ef3d1015992875c3


armv6 CUBOX-HUMMINGBOARD:

SHA512 (FreeBSD-11.2-RELEASE-arm-armv6-CUBOX-HUMMINGBOARD.img.xz) = 0f1ffaeecc055745bdf30ceeaf1df50eb331446c9793b701340742f879c08521029becb5d1db88e78d21381559661cc57b433800b9cf6e88cb15d0a7cbef341b


SHA256 (FreeBSD-11.2-RELEASE-arm-armv6-CUBOX-HUMMINGBOARD.img.xz) = ad6c39719d30b66aeef73a131d22bef3589913ef6a029b77618818f575483fb2


armv6 RPI-B:

SHA512 (FreeBSD-11.2-RELEASE-arm-armv6-RPI-B.img.xz) = 78d73086180296d53dedf1008f856d644f046ba0ee483e21cbf3c9d14cc9a351a8113731621ff9817de7f9b8fdffcd53d0ece2a92db647a272ddc28c31168d66


SHA256 (FreeBSD-11.2-RELEASE-arm-armv6-RPI-B.img.xz) = afd260edb3a8e3210f2022e117f8156d57ec891e29b177d31e596dc5469bb683


armv6 RPI2:

SHA512 (FreeBSD-11.2-RELEASE-arm-armv6-RPI2.img.xz) = e87b46b8c47e2d54d388e123100a5629a7964222d8c1d2028adb4c90f2a9af77f5371360a114dedba8f4c4fed4ad953d0c8d555f1e587d4ae4717409552f5844


SHA256 (FreeBSD-11.2-RELEASE-arm-armv6-RPI2.img.xz) = 3c3f64aceffcd1b7db50b4ce1521b502c2728de803d5e2d5d5938edfb1ad58a4


armv6 PANDABOARD:

SHA512 (FreeBSD-11.2-RELEASE-arm-armv6-PANDABOARD.img.xz) = cc72c332cada9155ae37b8e6b7db050fb86d27a55b761e713097bd8edd54234120cf3535208215e71b05a6cf33541525619609e4549c2f1eeb83783649f6aa14


SHA256 (FreeBSD-11.2-RELEASE-arm-armv6-PANDABOARD.img.xz) = fc6844bceb096bfe32b3345c519ded0d6d5d76f56a57b0395473fdd0c051370e


armv6 WANDBOARD:

SHA512 (FreeBSD-11.2-RELEASE-arm-armv6-WANDBOARD.img.xz) = 6d5f7497e226b3c9b4eafb8fa098e7ab6ccc29db5def9b367ab20ef0abc208e0d5de0e65e70fe228e4ed6d6851617b9e51a5d7655202ee4522c9ad4de5749a0e


SHA256 (FreeBSD-11.2-RELEASE-arm-armv6-WANDBOARD.img.xz) = 8824f62b400c60fac380e51b0ded6adb48a150d17b6bdff0d021cc2048d0ec61


Virtual Machine Disk Image Checksums

amd64 (x86_64):

SHA512 (FreeBSD-11.2-RELEASE-amd64.qcow2.xz) = bc8870131acec4c3afdc7b09cf03d0414bb52d937012dbcfab143766099c6419c1913067bb8c883bde2d1267dbb54bb5292bdc969d43c4125fb288622c5df86c
SHA512 (FreeBSD-11.2-RELEASE-amd64.raw.xz) = 0c3c232c7023c5036daeb5fbf68c2ddecf9703c74e317afcf19da91e83d0afcc526785571e2868894ce15cdb56b74fafa1ce9fd216469db91e021ac2ef8911e5
SHA512 (FreeBSD-11.2-RELEASE-amd64.vhd.xz) = 941a96f0dc9b78448121191bf326ab0e9e10c396052bb6e2c55bbd2d0cb490779eb757c222e2ceac751ecb088c48055e1f55f215a0a92326cd578984a8449d5a
SHA512 (FreeBSD-11.2-RELEASE-amd64.vmdk.xz) = d486371d7ca860a14caa6334949c4bd6e5a29af15c647b1aaf1a3abfa75e08a8d59cb167568ca082c2f678c5408949a454a5f0806d929b2e7ac9dc3a250ec94e


SHA256 (FreeBSD-11.2-RELEASE-amd64.qcow2.xz) = ce622f25482ff9efec848fe47513bc3323b56b6dc8b22183d8ab23b9099d33a9
SHA256 (FreeBSD-11.2-RELEASE-amd64.raw.xz) = d8638aecbb13bdc891e17187f3932fe477f5655846bdaad8fecd60614de9312c
SHA256 (FreeBSD-11.2-RELEASE-amd64.vhd.xz) = 12f1ac1b35a62bf69c31199a32d0f38c6ab95643726df96c86b41deea8a941c3
SHA256 (FreeBSD-11.2-RELEASE-amd64.vmdk.xz) = b41aa59b88329704d1593df928fda49780a3e37bb6c9ebd00a2871e6bc5041bd


i386 (x86):

SHA512 (FreeBSD-11.2-RELEASE-i386.qcow2.xz) = 845006cbd8199e27eaf41629c75e60afaea4f0a6749517ca977d3a983adf41915e9af45112713b383dcfafdb44b583848d8ed801fe6db73e715c396bd4904530
SHA512 (FreeBSD-11.2-RELEASE-i386.raw.xz) = b5b46cac7f57e8abd3d52db0cabed8c7b62bbb8a20d6bbde73f4e61054052faa4a2db92e54f9206c97491daa9688d6006f9d0fe508a81040f10a3fc62e91f73b
SHA512 (FreeBSD-11.2-RELEASE-i386.vhd.xz) = 4415485e5b71396b4a6c0d584f263fcd38ae38707f1b52da110c083e0bcb979e9f932378ab589576eace8bc75f54642d8aa121a6e5060d0609af1bcac1814f4c
SHA512 (FreeBSD-11.2-RELEASE-i386.vmdk.xz) = cd65a5ef23036ca1728510cf197d4923fb395105b01f21b07577f37b731ce0fe5e01f70d653bca14a4ea452e9c51712b0dfce7dcffe1e4ef299795e0a467b605


SHA256 (FreeBSD-11.2-RELEASE-i386.qcow2.xz) = 9534362def06110fbc5f2d59f741c73a1a46cb4870e9c3585afb6f1dd25e08dc
SHA256 (FreeBSD-11.2-RELEASE-i386.raw.xz) = 2828eb78849a9abe37cca5b2cceeaf4bddbd4255a9936ac2b2b8fbcb309e6967
SHA256 (FreeBSD-11.2-RELEASE-i386.vhd.xz) = 1dc71fa972145ba88cb60434e3d049489d2f1ea07f83ca1c8ddf38b4405f6f70
SHA256 (FreeBSD-11.2-RELEASE-i386.vmdk.xz) = 09cdab323b774d4b9947ee703d9876079201d8d48efc1c249fe108e01b6b5dbf


aarch64 (arm64):

SHA512 (FreeBSD-11.2-RELEASE-arm64-aarch64.qcow2.xz) = 9ac1aa2319050006e1ae2d0883ac6fe1946d6908782668e895e075f74a072f9cdf0f701f89c4d48e0f8d417764cf5a35eb119af674a32e9f8a8071e2d872b68b
SHA512 (FreeBSD-11.2-RELEASE-arm64-aarch64.raw.xz) = 819ee7eea441963ef986f2273408ff819b6b183f70773919b67fe390a33fb24837286ccc492cc391699ba902cc93382982971a914e972d08772b52cac97d5c74
SHA512 (FreeBSD-11.2-RELEASE-arm64-aarch64.vhd.xz) = 5302649d7fe391b992dc3564267a2cede4fd6d7c627375d0e2f0d7445a567c63f7871ec4bdd43553e70a2099b64050bea81de273af6c198cb26bfb29f8dea3e6
SHA512 (FreeBSD-11.2-RELEASE-arm64-aarch64.vmdk.xz) = cc93d446cddfc17702be93a454244e3f11ca18f79a8d6964aabfc4ce7f8a53c8d196e3cbbf22f473cd8e03264290a2ec1fb9adc13ff71d5100b64aa3d0e09b3a


SHA256 (FreeBSD-11.2-RELEASE-arm64-aarch64.qcow2.xz) = 6196ca3acc29ada9cdee86ca2af925350050fb63a0bd66022bcd26430e5b1850
SHA256 (FreeBSD-11.2-RELEASE-arm64-aarch64.raw.xz) = 7364e9a83d3e51e8ca41bd08a72095eb3d48d09d2f7090a064189f2e8cea03be
SHA256 (FreeBSD-11.2-RELEASE-arm64-aarch64.vhd.xz) = 1c0ebfd3bf8bc519359fe2fa40ee3c6caabd10a742798151f0ff8c0b95caf9be
SHA256 (FreeBSD-11.2-RELEASE-arm64-aarch64.vmdk.xz) = c1206d7fe03b3c0307b042c1d0196bffcfbd40a689705bd441cc6399fb8d0acc


Love FreeBSD? Support this and future releases with a donation to The
FreeBSD Foundation! https://www.FreeBSDFoundation.org/donate/

-----BEGIN PGP SIGNATURE-----
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=+fuC
-----END PGP SIGNATURE-----
_______________________________________________
freebsd-announce@freebsd.org mailing list
https://lists.freebsd.org/mailman/listinfo/freebsd-announce
To unsubscribe, send any mail to "freebsd-announce-unsubscribe@freebsd.org"

[CentOS-announce] Announcing the release of Gluster 4.1 on CentOS Linux 6 x86_64

I am happy to announce the General Availability of Gluster 4.1 for
CentOS 6 on x86_64. These packages are following the upstream Gluster
Community releases, and will receive monthly bugfix updates.

Gluster 4.1 is a Long-Term-Maintenance release, and will receive
updates for approximately 18 months. The difference between
Long-Term-Maintenance and Short-Term-Maintenance releases is explained
on the Gluster release schedule page:
https://www.gluster.org/community/release-schedule/

Users of CentOS 6 can now simply install the Gluster 4.1 clients with
only these two commands:

# yum install centos-release-gluster
# yum install glusterfs-fuse

Note that Gluster 4.x do not provide the glusterfs-server package for
CentOS 6 anymore. Users that run their Gluster Storage Servers on CentOS
6 are strongly encouraged to plan moving to CentOS 7.

The centos-release-gluster package is delivered via CentOS Extras repos.
This contains all the metadata and dependency information, needed to
install Gluster 4.1. The actual package that will get installed is
centos-release-gluster41. Users of the now End-Of-Life
Short-Term-Maintenance Gluster 4.0 will automatically get the update to
Gluster 4.1, whereas users of Gluster 3.12 can stay on that
Long-Term-Maintenance release for an other six months.

Users of Gluster 3.10 will need to manually upgrade by uninstalling the
centos-release-gluster310 package, and replacing it with either the
Gluster 4.1 or 3.12 version. Additional details about the upgrade
process are linked in the announcement from the Gluster Community:
https://lists.gluster.org/pipermail/announce/2018-June/000102.html

We have a quickstart guide specifically built around the packages are
available, it makes for a good introduction to Gluster and will help get
you started in just a few simple steps, this quick start is available at
https://wiki.centos.org/SpecialInterestGroup/Storage/gluster-Quickstart

More details about the packages that the Gluster project provides in the
Storage SIG is available in the documentation:
https://wiki.centos.org/SpecialInterestGroup/Storage/Gluster

The centos-release-gluster* repositories offer additional packages that
enhance the usability of Gluster itself. Utilities and tools that were
working with previous versions of Gluster are expected to stay working
fine. If there are any problems, or requests for additional tools and
applications to be provided, just send us an email with your
suggestions. The current list of packages that is (planned to become)
available can be found here:
https://wiki.centos.org/SpecialInterestGroup/Storage/Gluster/Ecosystem-pkgs

We welcome all feedback, comments and contributions. You can get in
touch with the CentOS Storage SIG on the centos-devel mailing list
(https://lists.centos.org ) and with the Gluster developer and user
communities at https://www.gluster.org/mailman/listinfo , we are also
available on irc at #gluster on irc.freenode.net, and on twitter at
@gluster .

Cheers,
Niels de Vos
Storage SIG member & Gluster maintainer

[CentOS-announce] Announcing the release of Gluster 4.1 on CentOS Linux 7 x86_64

I am happy to announce the General Availability of Gluster 4.1 for
CentOS 7 on x86_64. These packages are following the upstream Gluster
Community releases, and will receive monthly bugfix updates.

Gluster 4.1 is a Long-Term-Maintenance release, and will receive
updates for approximately 18 months. The difference between
Long-Term-Maintenance and Short-Term-Maintenance releases is explained
on the Gluster release schedule page:
https://www.gluster.org/community/release-schedule/

Users of CentOS 7 can now simply install Gluster 4.1 with only these two
commands:

# yum install centos-release-gluster
# yum install glusterfs-server

The centos-release-gluster package is delivered via CentOS Extras repos.
This contains all the metadata and dependency information, needed to
install Gluster 4.1. The actual package that will get installed is
centos-release-gluster41. Users of the now End-Of-Life
Short-Term-Maintenance Gluster 4.0 will automatically get the update to
Gluster 4.1, whereas users of Gluster 3.12 can stay on that
Long-Term-Maintenance release for an other six months.

Users of Gluster 3.10 will need to manually upgrade by uninstalling the
centos-release-gluster310 package, and replacing it with either the
Gluster 4.1 or 3.12 version. Additional details about the upgrade
process are linked in the announcement from the Gluster Community:
https://lists.gluster.org/pipermail/announce/2018-June/000102.html

We have a quickstart guide specifically built around the packages are
available, it makes for a good introduction to Gluster and will help get
you started in just a few simple steps, this quick start is available at
https://wiki.centos.org/SpecialInterestGroup/Storage/gluster-Quickstart

More details about the packages that the Gluster project provides in the
Storage SIG is available in the documentation:
https://wiki.centos.org/SpecialInterestGroup/Storage/Gluster

The centos-release-gluster* repositories offer additional packages that
enhance the usability of Gluster itself. Utilities and tools that were
working with previous versions of Gluster are expected to stay working
fine. If there are any problems, or requests for additional tools and
applications to be provided, just send us an email with your
suggestions. The current list of packages that is (planned to become)
available can be found here:
https://wiki.centos.org/SpecialInterestGroup/Storage/Gluster/Ecosystem-pkgs

We welcome all feedback, comments and contributions. You can get in
touch with the CentOS Storage SIG on the centos-devel mailing list
(https://lists.centos.org ) and with the Gluster developer and user
communities at https://www.gluster.org/mailman/listinfo , we are also
available on irc at #gluster on irc.freenode.net, and on twitter at
@gluster .

Cheers,
Niels de Vos
Storage SIG member & Gluster maintainer

F29 Self Contained Change: Deprecate YUM 3

= Proposed Self Contained Change: Deprecate YUM 3 =
https://fedoraproject.org/wiki/Changes/Deprecate_YUM_3


Owner(s):
* Daniel Mach <dmach at redhat dot com>


Remove yum (v3) and all related packages from Fedora.


== Detailed description ==
Remove packages from the distribution:
* createrepo
* yum
* yum-langpacks
* yum-utils,
* yum-metadata-parser
* python-urlgrabber
All these packages should no longer be used and all software using
them should be migrated to DNF.


== Scope ==
* Proposal owners:
Remove packages from the distribution: createrepo, yum, yum-langpacks,
yum-utils, yum-metadata-parser, python-urlgrabber

* Other developers:
Either remove packages from the distribution or switch them to DNF

* Release engineering:
#7588 [https://pagure.io/releng/issue/7588]

** List of deliverables:
N/A (not a System Wide Change)

* Policies and guidelines:
N/A

* Trademark approval:
N/A (not needed for this Change)

--
Jan Kuřík
JBoss EAP Program Manager
Red Hat Czech s.r.o., Purkynova 99/71, 612 45 Brno, Czech Republic
_______________________________________________
devel-announce mailing list -- devel-announce@lists.fedoraproject.org
To unsubscribe send an email to devel-announce-leave@lists.fedoraproject.org
Fedora Code of Conduct: https://getfedora.org/code-of-conduct.html
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: https://lists.fedoraproject.org/archives/list/devel-announce@lists.fedoraproject.org/message/S47CRUAYUAWBTMAYW2ZBKMIRVSCI7QCE/

Tuesday, June 26, 2018

[USN-3692-2] OpenSSL vulnerabilities

==========================================================================
Ubuntu Security Notice USN-3692-2
June 26, 2018

openssl vulnerabilities
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 12.04 ESM

Summary:

Several security issues were fixed in OpenSSL.

Software Description:
- openssl: Secure Socket Layer (SSL) cryptographic library and tools

Details:

USN-3692-1 fixed a vulnerability in OpenSSL. This update provides
the corresponding update for Ubuntu 12.04 ESM.

Original advisory details:

 Keegan Ryan discovered that OpenSSL incorrectly handled ECDSA key
 generation. An attacker could possibly use this issue to perform a
 cache-timing attack and recover private ECDSA keys. (CVE-2018-0495)

 Guido Vranken discovered that OpenSSL incorrectly handled very large
 prime values during a key agreement. A remote attacker could possibly
 use this issue to consume resources, leading to a denial of service.
 (CVE-2018-0732)

 Alejandro Cabrera Aldaya, Billy Brumley, Cesar Pereida Garcia and Luis
 Manuel Alvarez Tapia discovered that OpenSSL incorrectly handled RSA
 key generation. An attacker could possibly use this issue to perform a
 cache-timing attack and recover private RSA keys. (CVE-2018-0737)

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 12.04 ESM:
  libssl1.0.0                     1.0.1-4ubuntu5.43

After a standard system update you need to reboot your computer to make
all the necessary changes.

References:
  https://usn.ubuntu.com/usn/usn-3692-2
  https://usn.ubuntu.com/usn/usn-3692-1
  CVE-2017-0737, CVE-2018-0495, CVE-2018-0732, CVE-2018-0737

[USN-3692-1] OpenSSL vulnerabilities

-----BEGIN PGP SIGNATURE-----

iQIzBAEBCgAdFiEEUMSg3c8x5FLOsZtRZWnYVadEvpMFAlsyMmgACgkQZWnYVadE
vpNT2A/7BAZ6olNsDEXvgh9iqQOGM2okaUM9UzQYCeVamPeB+Pxbjk2tqxNUqAME
9dsdjNXJIGmEFtOR0d6E3FaKak3lO+tLJH0NxWtkmVqu9C+DiauktWSjBOANNhJI
C2TWX9JhEFLCWB4k6qZjMMnNA28NDEMAFFVX8lw6T/yI1tobCpRnIvG2L/GBlxUI
8pvvWe3NtmKY5hGNOMeJlhhRvcq1bFm05e98y64niNu4asBnt6hQrOLpJM5B7kYc
Mc0eQ9P0NQuF8RetIimo7xIuxoED3uNWOvKx4L3B7I2Qz0h5hI1TjsuuNNWNChTY
8l6Nn/PcacDEi78VZw7WtRI2V6Euz/t0sAmC9XsjKIli1w79HqxCWu4E8iW6YvUE
1/YClhvcNiZvwMD8U9nW0twiZc8OLU2Jk4Y7gJoJ19MY069V8DDkWllJE4jPc2us
Zv3uMWfZfdDAWvJfgeEXxBxDlqAAz3DIWeR6Ss5nZQoaOmilTvb1qT3jG1cxAMNl
RiYtRPqzfdPYfnGWSHeQ5GCk7H91ml720lqqTa01L3ZHRMSyvO+uyf9a/Pt8NSSW
Oj+7acgIYA3ZFsOihZsm2s03HLn+h3wR1Vu+8YqOGCc3KBmbROub3x7pz3p90dE/
hxl99OtrV3H0jN96PxI/JFLkp/kERrQaxlW+eQ0CMDBfjw4i2WI=
=S0pT
-----END PGP SIGNATURE-----
==========================================================================
Ubuntu Security Notice USN-3692-1
June 26, 2018

openssl, openssl1.0 vulnerabilities
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 18.04 LTS
- Ubuntu 17.10
- Ubuntu 16.04 LTS
- Ubuntu 14.04 LTS

Summary:

Several security issues were fixed in OpenSSL.

Software Description:
- openssl: Secure Socket Layer (SSL) cryptographic library and tools
- openssl1.0: Secure Socket Layer (SSL) cryptographic library and tools

Details:

Keegan Ryan discovered that OpenSSL incorrectly handled ECDSA key
generation. An attacker could possibly use this issue to perform a
cache-timing attack and recover private ECDSA keys. (CVE-2018-0495)

Guido Vranken discovered that OpenSSL incorrectly handled very large prime
values during a key agreement. A remote attacker could possibly use this
issue to consume resources, leading to a denial of service. (CVE-2018-0732)

Alejandro Cabrera Aldaya, Billy Brumley, Cesar Pereida Garcia and Luis
Manuel Alvarez Tapia discovered that OpenSSL incorrectly handled RSA key
generation. An attacker could possibly use this issue to perform a
cache-timing attack and recover private RSA keys. (CVE-2018-0737)

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 18.04 LTS:
libssl1.0.0 1.0.2n-1ubuntu5.1
libssl1.1 1.1.0g-2ubuntu4.1

Ubuntu 17.10:
libssl1.0.0 1.0.2g-1ubuntu13.6

Ubuntu 16.04 LTS:
libssl1.0.0 1.0.2g-1ubuntu4.13

Ubuntu 14.04 LTS:
libssl1.0.0 1.0.1f-1ubuntu2.26

After a standard system update you need to reboot your computer to make
all the necessary changes.

References:
https://usn.ubuntu.com/usn/usn-3692-1
CVE-2018-0495, CVE-2018-0732, CVE-2018-0737

Package Information:
https://launchpad.net/ubuntu/+source/openssl/1.1.0g-2ubuntu4.1
https://launchpad.net/ubuntu/+source/openssl1.0/1.0.2n-1ubuntu5.1
https://launchpad.net/ubuntu/+source/openssl/1.0.2g-1ubuntu13.6
https://launchpad.net/ubuntu/+source/openssl/1.0.2g-1ubuntu4.13
https://launchpad.net/ubuntu/+source/openssl/1.0.1f-1ubuntu2.26

Monday, June 25, 2018

F29 Self Contained Change: Minishift Spin

= Proposed Self Contained Change: Minishift Spin =
https://fedoraproject.org/wiki/Changes/Minishift_Spin


Owner(s):
* Praveen Kumar <kumarpraveen dot nitdgp at gmail dot com>
* Gerard Braad <me at gbraad dot nl>


A Fedora Spin providing an easy way for minishift users to consume
fedora as an ISO.


== Detailed description ==
Minishift [https://github.com/MiniShift/minishift] provides an easy
way to create a single node Openshift cluster for developers and as of
now, we have only CentOS and b2d ISO support. It would be great if we
can have Fedora ISO support for this project so developers can have
latest and greatest container related packages.


== Scope ==
* Proposal owners:
Implement this Change.

* Other developers:
N/A (not a System Wide Change)

* Release engineering:
- Add spin to spin-kickstarts, ensure spin has been tested, and
release with rest of spins
- Ticket: #7584 [https://pagure.io/releng/issue/7584]

* Policies and guidelines:
N/A (not a System Wide Change)

* Trademark approval:
N/A
--
Jan Kuřík
JBoss EAP Program Manager
Red Hat Czech s.r.o., Purkynova 99/71, 612 45 Brno, Czech Republic
_______________________________________________
devel-announce mailing list -- devel-announce@lists.fedoraproject.org
To unsubscribe send an email to devel-announce-leave@lists.fedoraproject.org
Fedora Code of Conduct: https://getfedora.org/code-of-conduct.html
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: https://lists.fedoraproject.org/archives/list/devel-announce@lists.fedoraproject.org/message/IMX3STKPRYBG5B6UQJEMKTXG6KSYMIKM/

Saturday, June 23, 2018

Updated Debian 8: 8.11 released

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v2
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=gjEB
-----END PGP SIGNATURE-----
------------------------------------------------------------------------
The Debian Project https://www.debian.org/
Updated Debian 8: 8.11 released press@debian.org
June 23rd, 2018 https://www.debian.org/News/2018/20180623
------------------------------------------------------------------------


The Debian project is pleased to announce the eleventh (and final)
update of its oldstable distribution Debian 8 (codename "jessie"). This
point release mainly adds corrections for security issues, along with a
few adjustments for serious problems. Security advisories have already
been published separately and are referenced where available.

After this point release, Debian's Security and Release Teams will no
longer be producing updates for Debian 8. Users wishing to continue to
receive security support should upgrade to Debian 9, or see
https://wiki.debian.org/LTS for details about the subset of
architectures and packages covered by the Long Term Support project.


The packages for some architectures for DSA 3746, DSA 3944, DSA 3968,
DSA 4010, DSA 4014, DSA 4061, DSA 4075, DSA 4102, DSA 4155, DSA 4209 and
DSA 4218 are not included in this point release for technical reasons.
All other security updates released during the lifetime of "jessie" that
have not previously been part of a point release are included in this
update.

Please note that the point release does not constitute a new version of
Debian 8 but only updates some of the packages included. There is no
need to throw away old "jessie" media. After installation, packages can
be upgraded to the current versions using an up-to-date Debian mirror.

Those who frequently install updates from security.debian.org won't have
to update many packages, and most such updates are included in the point
release.

New installation images will be available soon at the regular locations.

Upgrading an existing installation to this revision can be achieved by
pointing the package management system at one of Debian's many HTTP
mirrors. A comprehensive list of mirrors is available at:

https://www.debian.org/mirror/list



Miscellaneous Bugfixes
----------------------

This oldstable update adds a few important corrections to the following
packages:

+----------------------------+----------------------------------------+
| Package | Reason |
+----------------------------+----------------------------------------+
| adminer [1] | Don't allow connections to privileged |
| | ports [CVE-2018-7667] |
| | |
| base-files [2] | Update for the point release |
| | |
| blktrace [3] | Fix buffer overflow in btt [CVE-2018- |
| | 10689] |
| | |
| bwm-ng [4] | Explicitly build without libstatgrab |
| | support |
| | |
| clamav [5] | Security update [CVE-2017-6418 |
| | CVE-2017-6420 CVE-2017-12374 CVE-2017- |
| | 12375 CVE-2017-12376 CVE-2017-12377 |
| | CVE-2017-12378 CVE-2017-12379 |
| | CVE-2017-12380]; fix temporary file |
| | cleanup issue; new upstream release; |
| | new upstream version |
| | |
| debian-installer [6] | Rebuild for the point release |
| | |
| debian-installer-netboot- | Rebuild for the point release |
| images [7] | |
| | |
| debian-security- | Update package data |
| support [8] | |
| | |
| dh-make-perl [9] | Support Contents file without header |
| | |
| dns-root-data [10] | Update IANA DNSSEC files to 2017-02-02 |
| | versions |
| | |
| faad2 [11] | Fix several DoS issues via crafted MP4 |
| | files [CVE-2017-9218 CVE-2017-9219 |
| | CVE-2017-9220 CVE-2017-9221 CVE-2017- |
| | 9222 CVE-2017-9223 CVE-2017-9253 |
| | CVE-2017-9254 CVE-2017-9255 CVE-2017- |
| | 9256 CVE-2017-9257] |
| | |
| file [12] | Avoid reading past the end of a buffer |
| | [CVE-2018-10360]] |
| | |
| ghostscript [13] | Fix segfault with fuzzing file in |
| | gxht_thresh_image_init[); fix buffer |
| | overflow in fill_threshold_buffer |
| | [CVE-2016-10317]; pdfwrite - Guard |
| | against trying to output an infinite |
| | number [CVE-2018-10194] |
| | |
| intel-microcode [14] | Update included microcode, including |
| | fixes for Spectre v2 [CVE-2017-5715] |
| | |
| lame [15] | Fix security issues by switching to |
| | use I/O routines from sndfile |
| | [CVE-2017-15018 CVE-2017-15045 |
| | CVE-2017-15046 CVE-2017-9869 CVE-2017- |
| | 9870 CVE-2017-9871 CVE-2017-9872] |
| | |
| libdatetime-timezone- | Update included data |
| perl [16] | |
| | |
| libextractor [17] | Various security fixes [CVE-2017-15266 |
| | CVE-2017-15267 CVE-2017-15600 |
| | CVE-2017-15601 CVE-2017-15602 |
| | CVE-2017-15922 CVE-2017-17440] |
| | |
| libipc-run-perl [18] | Fix memory leak |
| | |
| linux [19] | New upstream stable release |
| | |
| mactelnet [20] | Security fix [CVE-2016-7115] |
| | |
| ncurses [21] | Fix buffer overflow in the |
| | _nc_write_entry function [CVE-2017- |
| | 16879] |
| | |
| nvidia-graphics- | New upstream version |
| drivers [22] | |
| | |
| nvidia-graphics-drivers- | Update to latest driver |
| legacy-304xx [23] | |
| | |
| openafs [24] | Fix kernel module build against linux |
| | 3.16.51-3+deb8u1 kernels after |
| | security update-induced ABI changes |
| | |
| openldap [25] | Fix upgrade failure when olcSuffix |
| | contains a backslash; fix memory |
| | corruption caused by calling |
| | sasl_client_init() multiple times |
| | |
| patch [26] | Fix arbitrary command execution in ed- |
| | style patches [CVE-2018-1000156] |
| | |
| postgresql-9.4 [27] | New upstream release |
| | |
| psensor [28] | Fix directory traversal issue |
| | [CVE-2014-10073] |
| | |
| python-mimeparse [29] | Fix python3-mimeparse's dependencies |
| | |
| rar [30] | Strip statically linked rar and |
| | install the dynamically linked version |
| | instead |
| | |
| reportbug [31] | Stop CCing secure-testing- |
| | team@lists.alioth.debian.org |
| | |
| sam2p [32] | Fix multiple invalid frees and buffer- |
| | overflow vulnerabilities [CVE-2018- |
| | 7487 CVE-2018-7551 CVE-2018-7552 |
| | CVE-2018-7553 CVE-2018-7554] |
| | |
| slurm-llnl [33] | Fix upgrade issue from wheezy |
| | |
| soundtouch [34] | Security fixes [CVE-2017-9258 |
| | CVE-2017-9259 CVE-2017-9260] |
| | |
| subversion [35] | Fix crashes with Perl bindings, |
| | commonly seen when using git-svn |
| | |
| tzdata [36] | Update included data |
| | |
| user-mode-linux [37] | Rebuild against current jessie kernel |
| | |
| virtualbox-guest- | Fix multiple security issues |
| additions-iso [38] | [CVE-2016-0592 CVE-2016-0495 CVE-2015- |
| | 8104 CVE-2015-7183 CVE-2015-5307 |
| | CVE-2015-7183 CVE-2015-4813 CVE-2015- |
| | 4896 CVE-2015-3456] |
| | |
| xerces-c [39] | Fix Denial of Service via external DTD |
| | reference [CVE-2017-12627] |
| | |
| zsh [40] | Rebuild against libraries currently in |
| | jessie |
| | |
+----------------------------+----------------------------------------+

1: https://packages.debian.org/src:adminer
2: https://packages.debian.org/src:base-files
3: https://packages.debian.org/src:blktrace
4: https://packages.debian.org/src:bwm-ng
5: https://packages.debian.org/src:clamav
6: https://packages.debian.org/src:debian-installer
7: https://packages.debian.org/src:debian-installer-netboot-images
8: https://packages.debian.org/src:debian-security-support
9: https://packages.debian.org/src:dh-make-perl
10: https://packages.debian.org/src:dns-root-data
11: https://packages.debian.org/src:faad2
12: https://packages.debian.org/src:file
13: https://packages.debian.org/src:ghostscript
14: https://packages.debian.org/src:intel-microcode
15: https://packages.debian.org/src:lame
16: https://packages.debian.org/src:libdatetime-timezone-perl
17: https://packages.debian.org/src:libextractor
18: https://packages.debian.org/src:libipc-run-perl
19: https://packages.debian.org/src:linux
20: https://packages.debian.org/src:mactelnet
21: https://packages.debian.org/src:ncurses
22: https://packages.debian.org/src:nvidia-graphics-drivers
23: https://packages.debian.org/src:nvidia-graphics-drivers-legacy-304xx
24: https://packages.debian.org/src:openafs
25: https://packages.debian.org/src:openldap
26: https://packages.debian.org/src:patch
27: https://packages.debian.org/src:postgresql-9.4
28: https://packages.debian.org/src:psensor
29: https://packages.debian.org/src:python-mimeparse
30: https://packages.debian.org/src:rar
31: https://packages.debian.org/src:reportbug
32: https://packages.debian.org/src:sam2p
33: https://packages.debian.org/src:slurm-llnl
34: https://packages.debian.org/src:soundtouch
35: https://packages.debian.org/src:subversion
36: https://packages.debian.org/src:tzdata
37: https://packages.debian.org/src:user-mode-linux
38: https://packages.debian.org/src:virtualbox-guest-additions-iso
39: https://packages.debian.org/src:xerces-c
40: https://packages.debian.org/src:zsh

Security Updates
----------------

This revision adds the following security updates to the oldstable
release. The Security Team has already released an advisory for each of
these updates:

+----------------+----------------------------------+
| Advisory ID | Package |
+----------------+----------------------------------+
| DSA-3707 [41] | openjdk-7 [42] |
| | |
| DSA-3708 [43] | mat [44] |
| | |
| DSA-3746 [45] | graphicsmagick [46] |
| | |
| DSA-3782 [47] | openjdk-7 [48] |
| | |
| DSA-3832 [49] | openoffice.org-dictionaries [50] |
| | |
| DSA-3858 [51] | openjdk-7 [52] |
| | |
| DSA-3923 [53] | freerdp [54] |
| | |
| DSA-3944 [55] | mariadb-10.0 [56] |
| | |
| DSA-3954 [57] | openjdk-7 [58] |
| | |
| DSA-3968 [59] | icedove [60] |
| | |
| DSA-4010 [61] | git-annex [62] |
| | |
| DSA-4014 [63] | thunderbird [64] |
| | |
| DSA-4048 [65] | openjdk-7 [66] |
| | |
| DSA-4054 [67] | tor [68] |
| | |
| DSA-4057 [69] | erlang [70] |
| | |
| DSA-4058 [71] | optipng [72] |
| | |
| DSA-4059 [73] | libxcursor [74] |
| | |
| DSA-4060 [75] | wireshark [76] |
| | |
| DSA-4061 [77] | thunderbird [78] |
| | |
| DSA-4062 [79] | firefox-esr [80] |
| | |
| DSA-4066 [81] | otrs2 [82] |
| | |
| DSA-4067 [83] | openafs [84] |
| | |
| DSA-4068 [85] | rsync [86] |
| | |
| DSA-4069 [87] | otrs2 [88] |
| | |
| DSA-4070 [89] | enigmail [90] |
| | |
| DSA-4071 [91] | sensible-utils [92] |
| | |
| DSA-4075 [93] | thunderbird [94] |
| | |
| DSA-4076 [95] | asterisk [96] |
| | |
| DSA-4077 [97] | gimp [98] |
| | |
| DSA-4079 [99] | poppler [100] |
| | |
| DSA-4081 [101] | php5 [102] |
| | |
| DSA-4082 [103] | linux [104] |
| | |
| DSA-4082 [105] | linux-latest [106] |
| | |
| DSA-4083 [107] | poco [108] |
| | |
| DSA-4084 [109] | gifsicle [110] |
| | |
| DSA-4085 [111] | xmltooling [112] |
| | |
| DSA-4086 [113] | libxml2 [114] |
| | |
| DSA-4087 [115] | transmission [116] |
| | |
| DSA-4088 [117] | gdk-pixbuf [118] |
| | |
| DSA-4089 [119] | bind9 [120] |
| | |
| DSA-4090 [121] | wordpress [122] |
| | |
| DSA-4091 [123] | mysql-5.5 [124] |
| | |
| DSA-4092 [125] | awstats [126] |
| | |
| DSA-4093 [127] | openocd [128] |
| | |
| DSA-4094 [129] | smarty3 [130] |
| | |
| DSA-4096 [131] | firefox-esr [132] |
| | |
| DSA-4097 [133] | poppler [134] |
| | |
| DSA-4098 [135] | curl [136] |
| | |
| DSA-4100 [137] | tiff [138] |
| | |
| DSA-4101 [139] | wireshark [140] |
| | |
| DSA-4102 [141] | thunderbird [142] |
| | |
| DSA-4104 [143] | p7zip [144] |
| | |
| DSA-4108 [145] | mailman [146] |
| | |
| DSA-4109 [147] | ruby-omniauth [148] |
| | |
| DSA-4110 [149] | exim4 [150] |
| | |
| DSA-4111 [151] | libreoffice [152] |
| | |
| DSA-4114 [153] | jackson-databind [154] |
| | |
| DSA-4115 [155] | quagga [156] |
| | |
| DSA-4117 [157] | gcc-4.9 [158] |
| | |
| DSA-4118 [159] | tomcat-native [160] |
| | |
| DSA-4119 [161] | libav [162] |
| | |
| DSA-4122 [163] | squid3 [164] |
| | |
| DSA-4123 [165] | drupal7 [166] |
| | |
| DSA-4124 [167] | lucene-solr [168] |
| | |
| DSA-4126 [169] | xmltooling [170] |
| | |
| DSA-4127 [171] | simplesamlphp [172] |
| | |
| DSA-4129 [173] | freexl [174] |
| | |
| DSA-4130 [175] | dovecot [176] |
| | |
| DSA-4132 [177] | libvpx [178] |
| | |
| DSA-4133 [179] | isc-dhcp [180] |
| | |
| DSA-4136 [181] | curl [182] |
| | |
| DSA-4137 [183] | libvirt [184] |
| | |
| DSA-4139 [185] | firefox-esr [186] |
| | |
| DSA-4140 [187] | libvorbis [188] |
| | |
| DSA-4141 [189] | libvorbisidec [190] |
| | |
| DSA-4142 [191] | uwsgi [192] |
| | |
| DSA-4143 [193] | firefox-esr [194] |
| | |
| DSA-4146 [195] | plexus-utils [196] |
| | |
| DSA-4147 [197] | polarssl [198] |
| | |
| DSA-4148 [199] | kamailio [200] |
| | |
| DSA-4149 [201] | plexus-utils2 [202] |
| | |
| DSA-4150 [203] | icu [204] |
| | |
| DSA-4151 [205] | librelp [206] |
| | |
| DSA-4152 [207] | mupdf [208] |
| | |
| DSA-4153 [209] | firefox-esr [210] |
| | |
| DSA-4154 [211] | net-snmp [212] |
| | |
| DSA-4155 [213] | thunderbird [214] |
| | |
| DSA-4156 [215] | drupal7 [216] |
| | |
| DSA-4157 [217] | openssl [218] |
| | |
| DSA-4161 [219] | python-django [220] |
| | |
| DSA-4163 [221] | beep [222] |
| | |
| DSA-4164 [223] | apache2 [224] |
| | |
| DSA-4165 [225] | ldap-account-manager [226] |
| | |
| DSA-4167 [227] | sharutils [228] |
| | |
| DSA-4168 [229] | squirrelmail [230] |
| | |
| DSA-4172 [231] | perl [232] |
| | |
| DSA-4175 [233] | freeplane [234] |
| | |
| DSA-4176 [235] | mysql-5.5 [236] |
| | |
| DSA-4177 [237] | libsdl2-image [238] |
| | |
| DSA-4178 [239] | libreoffice [240] |
| | |
| DSA-4179 [241] | linux-tools [242] |
| | |
| DSA-4180 [243] | drupal7 [244] |
| | |
| DSA-4184 [245] | sdl-image1.2 [246] |
| | |
| DSA-4186 [247] | gunicorn [248] |
| | |
| DSA-4187 [249] | linux-latest [250] |
| | |
| DSA-4187 [251] | linux [252] |
| | |
| DSA-4189 [253] | quassel [254] |
| | |
| DSA-4190 [255] | jackson-databind [256] |
| | |
| DSA-4192 [257] | libmad [258] |
| | |
| DSA-4193 [259] | wordpress [260] |
| | |
| DSA-4194 [261] | lucene-solr [262] |
| | |
| DSA-4195 [263] | wget [264] |
| | |
| DSA-4196 [265] | linux [266] |
| | |
| DSA-4199 [267] | firefox-esr [268] |
| | |
| DSA-4202 [269] | curl [270] |
| | |
| DSA-4204 [271] | imagemagick [272] |
| | |
| DSA-4208 [273] | procps [274] |
| | |
| DSA-4209 [275] | thunderbird [276] |
| | |
| DSA-4211 [277] | xdg-utils [278] |
| | |
| DSA-4212 [279] | git [280] |
| | |
| DSA-4214 [281] | zookeeper [282] |
| | |
| DSA-4215 [283] | batik [284] |
| | |
| DSA-4216 [285] | prosody [286] |
| | |
| DSA-4217 [287] | wireshark [288] |
| | |
| DSA-4218 [289] | memcached [290] |
| | |
| DSA-4220 [291] | firefox-esr [292] |
| | |
| DSA-4221 [293] | libvncserver [294] |
| | |
| DSA-4222 [295] | gnupg2 [296] |
| | |
| DSA-4224 [297] | gnupg [298] |
| | |
| DSA-4225 [299] | openjdk-7 [300] |
| | |
| DSA-4226 [301] | perl [302] |
| | |
| DSA-4227 [303] | plexus-archiver [304] |
| | |
| DSA-4228 [305] | spip [306] |
| | |
| DSA-4229 [307] | strongswan [308] |
| | |
+----------------+----------------------------------+

41: https://www.debian.org/security/2016/dsa-3707
42: https://packages.debian.org/src:openjdk-7
43: https://www.debian.org/security/2016/dsa-3708
44: https://packages.debian.org/src:mat
45: https://www.debian.org/security/2016/dsa-3746
46: https://packages.debian.org/src:graphicsmagick
47: https://www.debian.org/security/2017/dsa-3782
48: https://packages.debian.org/src:openjdk-7
49: https://www.debian.org/security/2017/dsa-3832
50: https://packages.debian.org/src:openoffice.org-dictionaries
51: https://www.debian.org/security/2017/dsa-3858
52: https://packages.debian.org/src:openjdk-7
53: https://www.debian.org/security/2017/dsa-3923
54: https://packages.debian.org/src:freerdp
55: https://www.debian.org/security/2017/dsa-3944
56: https://packages.debian.org/src:mariadb-10.0
57: https://www.debian.org/security/2017/dsa-3954
58: https://packages.debian.org/src:openjdk-7
59: https://www.debian.org/security/2017/dsa-3968
60: https://packages.debian.org/src:icedove
61: https://www.debian.org/security/2017/dsa-4010
62: https://packages.debian.org/src:git-annex
63: https://www.debian.org/security/2017/dsa-4014
64: https://packages.debian.org/src:thunderbird
65: https://www.debian.org/security/2017/dsa-4048
66: https://packages.debian.org/src:openjdk-7
67: https://www.debian.org/security/2017/dsa-4054
68: https://packages.debian.org/src:tor
69: https://www.debian.org/security/2017/dsa-4057
70: https://packages.debian.org/src:erlang
71: https://www.debian.org/security/2017/dsa-4058
72: https://packages.debian.org/src:optipng
73: https://www.debian.org/security/2017/dsa-4059
74: https://packages.debian.org/src:libxcursor
75: https://www.debian.org/security/2017/dsa-4060
76: https://packages.debian.org/src:wireshark
77: https://www.debian.org/security/2017/dsa-4061
78: https://packages.debian.org/src:thunderbird
79: https://www.debian.org/security/2017/dsa-4062
80: https://packages.debian.org/src:firefox-esr
81: https://www.debian.org/security/2017/dsa-4066
82: https://packages.debian.org/src:otrs2
83: https://www.debian.org/security/2017/dsa-4067
84: https://packages.debian.org/src:openafs
85: https://www.debian.org/security/2017/dsa-4068
86: https://packages.debian.org/src:rsync
87: https://www.debian.org/security/2017/dsa-4069
88: https://packages.debian.org/src:otrs2
89: https://www.debian.org/security/2017/dsa-4070
90: https://packages.debian.org/src:enigmail
91: https://www.debian.org/security/2017/dsa-4071
92: https://packages.debian.org/src:sensible-utils
93: https://www.debian.org/security/2017/dsa-4075
94: https://packages.debian.org/src:thunderbird
95: https://www.debian.org/security/2017/dsa-4076
96: https://packages.debian.org/src:asterisk
97: https://www.debian.org/security/2017/dsa-4077
98: https://packages.debian.org/src:gimp
99: https://www.debian.org/security/2018/dsa-4079
100: https://packages.debian.org/src:poppler
101: https://www.debian.org/security/2018/dsa-4081
102: https://packages.debian.org/src:php5
103: https://www.debian.org/security/2018/dsa-4082
104: https://packages.debian.org/src:linux
105: https://www.debian.org/security/2018/dsa-4082
106: https://packages.debian.org/src:linux-latest
107: https://www.debian.org/security/2018/dsa-4083
108: https://packages.debian.org/src:poco
109: https://www.debian.org/security/2018/dsa-4084
110: https://packages.debian.org/src:gifsicle
111: https://www.debian.org/security/2018/dsa-4085
112: https://packages.debian.org/src:xmltooling
113: https://www.debian.org/security/2018/dsa-4086
114: https://packages.debian.org/src:libxml2
115: https://www.debian.org/security/2018/dsa-4087
116: https://packages.debian.org/src:transmission
117: https://www.debian.org/security/2018/dsa-4088
118: https://packages.debian.org/src:gdk-pixbuf
119: https://www.debian.org/security/2018/dsa-4089
120: https://packages.debian.org/src:bind9
121: https://www.debian.org/security/2018/dsa-4090
122: https://packages.debian.org/src:wordpress
123: https://www.debian.org/security/2018/dsa-4091
124: https://packages.debian.org/src:mysql-5.5
125: https://www.debian.org/security/2018/dsa-4092
126: https://packages.debian.org/src:awstats
127: https://www.debian.org/security/2018/dsa-4093
128: https://packages.debian.org/src:openocd
129: https://www.debian.org/security/2018/dsa-4094
130: https://packages.debian.org/src:smarty3
131: https://www.debian.org/security/2018/dsa-4096
132: https://packages.debian.org/src:firefox-esr
133: https://www.debian.org/security/2018/dsa-4097
134: https://packages.debian.org/src:poppler
135: https://www.debian.org/security/2018/dsa-4098
136: https://packages.debian.org/src:curl
137: https://www.debian.org/security/2018/dsa-4100
138: https://packages.debian.org/src:tiff
139: https://www.debian.org/security/2018/dsa-4101
140: https://packages.debian.org/src:wireshark
141: https://www.debian.org/security/2018/dsa-4102
142: https://packages.debian.org/src:thunderbird
143: https://www.debian.org/security/2018/dsa-4104
144: https://packages.debian.org/src:p7zip
145: https://www.debian.org/security/2018/dsa-4108
146: https://packages.debian.org/src:mailman
147: https://www.debian.org/security/2018/dsa-4109
148: https://packages.debian.org/src:ruby-omniauth
149: https://www.debian.org/security/2018/dsa-4110
150: https://packages.debian.org/src:exim4
151: https://www.debian.org/security/2018/dsa-4111
152: https://packages.debian.org/src:libreoffice
153: https://www.debian.org/security/2018/dsa-4114
154: https://packages.debian.org/src:jackson-databind
155: https://www.debian.org/security/2018/dsa-4115
156: https://packages.debian.org/src:quagga
157: https://www.debian.org/security/2018/dsa-4117
158: https://packages.debian.org/src:gcc-4.9
159: https://www.debian.org/security/2018/dsa-4118
160: https://packages.debian.org/src:tomcat-native
161: https://www.debian.org/security/2018/dsa-4119
162: https://packages.debian.org/src:libav
163: https://www.debian.org/security/2018/dsa-4122
164: https://packages.debian.org/src:squid3
165: https://www.debian.org/security/2018/dsa-4123
166: https://packages.debian.org/src:drupal7
167: https://www.debian.org/security/2018/dsa-4124
168: https://packages.debian.org/src:lucene-solr
169: https://www.debian.org/security/2018/dsa-4126
170: https://packages.debian.org/src:xmltooling
171: https://www.debian.org/security/2018/dsa-4127
172: https://packages.debian.org/src:simplesamlphp
173: https://www.debian.org/security/2018/dsa-4129
174: https://packages.debian.org/src:freexl
175: https://www.debian.org/security/2018/dsa-4130
176: https://packages.debian.org/src:dovecot
177: https://www.debian.org/security/2018/dsa-4132
178: https://packages.debian.org/src:libvpx
179: https://www.debian.org/security/2018/dsa-4133
180: https://packages.debian.org/src:isc-dhcp
181: https://www.debian.org/security/2018/dsa-4136
182: https://packages.debian.org/src:curl
183: https://www.debian.org/security/2018/dsa-4137
184: https://packages.debian.org/src:libvirt
185: https://www.debian.org/security/2018/dsa-4139
186: https://packages.debian.org/src:firefox-esr
187: https://www.debian.org/security/2018/dsa-4140
188: https://packages.debian.org/src:libvorbis
189: https://www.debian.org/security/2018/dsa-4141
190: https://packages.debian.org/src:libvorbisidec
191: https://www.debian.org/security/2018/dsa-4142
192: https://packages.debian.org/src:uwsgi
193: https://www.debian.org/security/2018/dsa-4143
194: https://packages.debian.org/src:firefox-esr
195: https://www.debian.org/security/2018/dsa-4146
196: https://packages.debian.org/src:plexus-utils
197: https://www.debian.org/security/2018/dsa-4147
198: https://packages.debian.org/src:polarssl
199: https://www.debian.org/security/2018/dsa-4148
200: https://packages.debian.org/src:kamailio
201: https://www.debian.org/security/2018/dsa-4149
202: https://packages.debian.org/src:plexus-utils2
203: https://www.debian.org/security/2018/dsa-4150
204: https://packages.debian.org/src:icu
205: https://www.debian.org/security/2018/dsa-4151
206: https://packages.debian.org/src:librelp
207: https://www.debian.org/security/2018/dsa-4152
208: https://packages.debian.org/src:mupdf
209: https://www.debian.org/security/2018/dsa-4153
210: https://packages.debian.org/src:firefox-esr
211: https://www.debian.org/security/2018/dsa-4154
212: https://packages.debian.org/src:net-snmp
213: https://www.debian.org/security/2018/dsa-4155
214: https://packages.debian.org/src:thunderbird
215: https://www.debian.org/security/2018/dsa-4156
216: https://packages.debian.org/src:drupal7
217: https://www.debian.org/security/2018/dsa-4157
218: https://packages.debian.org/src:openssl
219: https://www.debian.org/security/2018/dsa-4161
220: https://packages.debian.org/src:python-django
221: https://www.debian.org/security/2018/dsa-4163
222: https://packages.debian.org/src:beep
223: https://www.debian.org/security/2018/dsa-4164
224: https://packages.debian.org/src:apache2
225: https://www.debian.org/security/2018/dsa-4165
226: https://packages.debian.org/src:ldap-account-manager
227: https://www.debian.org/security/2018/dsa-4167
228: https://packages.debian.org/src:sharutils
229: https://www.debian.org/security/2018/dsa-4168
230: https://packages.debian.org/src:squirrelmail
231: https://www.debian.org/security/2018/dsa-4172
232: https://packages.debian.org/src:perl
233: https://www.debian.org/security/2018/dsa-4175
234: https://packages.debian.org/src:freeplane
235: https://www.debian.org/security/2018/dsa-4176
236: https://packages.debian.org/src:mysql-5.5
237: https://www.debian.org/security/2018/dsa-4177
238: https://packages.debian.org/src:libsdl2-image
239: https://www.debian.org/security/2018/dsa-4178
240: https://packages.debian.org/src:libreoffice
241: https://www.debian.org/security/2018/dsa-4179
242: https://packages.debian.org/src:linux-tools
243: https://www.debian.org/security/2018/dsa-4180
244: https://packages.debian.org/src:drupal7
245: https://www.debian.org/security/2018/dsa-4184
246: https://packages.debian.org/src:sdl-image1.2
247: https://www.debian.org/security/2018/dsa-4186
248: https://packages.debian.org/src:gunicorn
249: https://www.debian.org/security/2018/dsa-4187
250: https://packages.debian.org/src:linux-latest
251: https://www.debian.org/security/2018/dsa-4187
252: https://packages.debian.org/src:linux
253: https://www.debian.org/security/2018/dsa-4189
254: https://packages.debian.org/src:quassel
255: https://www.debian.org/security/2018/dsa-4190
256: https://packages.debian.org/src:jackson-databind
257: https://www.debian.org/security/2018/dsa-4192
258: https://packages.debian.org/src:libmad
259: https://www.debian.org/security/2018/dsa-4193
260: https://packages.debian.org/src:wordpress
261: https://www.debian.org/security/2018/dsa-4194
262: https://packages.debian.org/src:lucene-solr
263: https://www.debian.org/security/2018/dsa-4195
264: https://packages.debian.org/src:wget
265: https://www.debian.org/security/2018/dsa-4196
266: https://packages.debian.org/src:linux
267: https://www.debian.org/security/2018/dsa-4199
268: https://packages.debian.org/src:firefox-esr
269: https://www.debian.org/security/2018/dsa-4202
270: https://packages.debian.org/src:curl
271: https://www.debian.org/security/2018/dsa-4204
272: https://packages.debian.org/src:imagemagick
273: https://www.debian.org/security/2018/dsa-4208
274: https://packages.debian.org/src:procps
275: https://www.debian.org/security/2018/dsa-4209
276: https://packages.debian.org/src:thunderbird
277: https://www.debian.org/security/2018/dsa-4211
278: https://packages.debian.org/src:xdg-utils
279: https://www.debian.org/security/2018/dsa-4212
280: https://packages.debian.org/src:git
281: https://www.debian.org/security/2018/dsa-4214
282: https://packages.debian.org/src:zookeeper
283: https://www.debian.org/security/2018/dsa-4215
284: https://packages.debian.org/src:batik
285: https://www.debian.org/security/2018/dsa-4216
286: https://packages.debian.org/src:prosody
287: https://www.debian.org/security/2018/dsa-4217
288: https://packages.debian.org/src:wireshark
289: https://www.debian.org/security/2018/dsa-4218
290: https://packages.debian.org/src:memcached
291: https://www.debian.org/security/2018/dsa-4220
292: https://packages.debian.org/src:firefox-esr
293: https://www.debian.org/security/2018/dsa-4221
294: https://packages.debian.org/src:libvncserver
295: https://www.debian.org/security/2018/dsa-4222
296: https://packages.debian.org/src:gnupg2
297: https://www.debian.org/security/2018/dsa-4224
298: https://packages.debian.org/src:gnupg
299: https://www.debian.org/security/2018/dsa-4225
300: https://packages.debian.org/src:openjdk-7
301: https://www.debian.org/security/2018/dsa-4226
302: https://packages.debian.org/src:perl
303: https://www.debian.org/security/2018/dsa-4227
304: https://packages.debian.org/src:plexus-archiver
305: https://www.debian.org/security/2018/dsa-4228
306: https://packages.debian.org/src:spip
307: https://www.debian.org/security/2018/dsa-4229
308: https://packages.debian.org/src:strongswan

Removed packages
----------------

The following packages were removed due to circumstances beyond our
control:

+-------------------------------+-------------------------------------+
| Package | Reason |
+-------------------------------+-------------------------------------+
| dolibarr [309] | Too much work to maintain it |
| | properly in Debian |
| | |
| electrum [310] | No longer able to connect to the |
| | network |
| | |
| jirc [311] | Broken with jessie's libpoe-filter- |
| | xml-perl |
| | |
| nvidia-graphics-modules [312] | License problem; incompatible with |
| | current kernel ABI |
| | |
| openstreetmap-client [313] | Broken |
| | |
| redmine [314] | No longer security supported |
| | |
| redmine-plugin-pretend [315] | Depends on redmine |
| | |
| redmine-plugin- | Depends on redmine |
| recaptcha [316] | |
| | |
| redmine-recaptcha [317] | Depends on redmine |
| | |
| youtube-dl [318] | Incompatible YouTube API changes |
| | |
+-------------------------------+-------------------------------------+

309: https://packages.debian.org/src:dolibarr
310: https://packages.debian.org/src:electrum
311: https://packages.debian.org/src:jirc
312: https://packages.debian.org/src:nvidia-graphics-modules
313: https://packages.debian.org/src:openstreetmap-client
314: https://packages.debian.org/src:redmine
315: https://packages.debian.org/src:redmine-plugin-pretend
316: https://packages.debian.org/src:redmine-plugin-recaptcha
317: https://packages.debian.org/src:redmine-recaptcha
318: https://packages.debian.org/src:youtube-dl

Debian Installer
----------------

The installer has been updated to include the fixes incorporated into
oldstable by the point release.


URLs
----

The complete lists of packages that have changed with this revision:

http://ftp.debian.org/debian/dists/jessie/ChangeLog


The current oldstable distribution:

http://ftp.debian.org/debian/dists/oldstable/


Proposed updates to the oldstable distribution:

http://ftp.debian.org/debian/dists/oldstable-proposed-updates


oldstable distribution information (release notes, errata etc.):

https://www.debian.org/releases/oldstable/


Security announcements and information:

https://security.debian.org/ [319]

319: https://www.debian.org/security/


About Debian
------------

The Debian Project is an association of Free Software developers who
volunteer their time and effort in order to produce the completely free
operating system Debian.


Contact Information
-------------------

For further information, please visit the Debian web pages at
https://www.debian.org/, send mail to <press@debian.org>, or contact the
stable release team at <debian-release@lists.debian.org>.
--
--
Donald Norwood
www.debian.org