Tuesday, April 30, 2019
[USN-3962-1] libpng vulnerability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=0d2T
-----END PGP SIGNATURE-----
==========================================================================
Ubuntu Security Notice USN-3962-1
April 30, 2019
libpng1.6 vulnerability
==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 18.10
- Ubuntu 18.04 LTS
Summary:
libpng be made to crash or run programs if it opened a specially crafted
file.
Software Description:
- libpng1.6: PNG (Portable Network Graphics) file library
Details:
It was discovered that libpng incorrectly handled certain memory
operations. If a user or automated system were tricked into opening a
specially crafted PNG file, a remote attacker could use this issue to
cause libpng to crash, resulting in a denial of service, or possibly
execute arbitrary code.
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 18.10:
libpng16-16 1.6.34-2ubuntu0.1
Ubuntu 18.04 LTS:
libpng16-16 1.6.34-1ubuntu0.18.04.2
In general, a standard system update will make all the necessary changes.
References:
https://usn.ubuntu.com/usn/usn-3962-1
CVE-2019-7317
Package Information:
https://launchpad.net/ubuntu/+source/libpng1.6/1.6.34-2ubuntu0.1
https://launchpad.net/ubuntu/+source/libpng1.6/1.6.34-1ubuntu0.18.04.2
[USN-3961-1] Dovecot vulnerabilities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=hgU5
-----END PGP SIGNATURE-----
==========================================================================
Ubuntu Security Notice USN-3961-1
April 30, 2019
dovecot vulnerabilities
==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 19.04
- Ubuntu 18.10
Summary:
Dovecot could be made to crash if it received specially crafted network
traffic.
Software Description:
- dovecot: IMAP and POP3 email server
Details:
It was discovered that the Dovecot Submission login service incorrectly
handled certain operations. A remote attacker could possibly use this issue
to cause Dovecot to crash, resulting in a denial of service.
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 19.04:
dovecot-core 1:2.3.4.1-1ubuntu2.2
dovecot-submissiond 1:2.3.4.1-1ubuntu2.2
Ubuntu 18.10:
dovecot-core 1:2.3.2.1-1ubuntu3.4
dovecot-submissiond 1:2.3.2.1-1ubuntu3.4
In general, a standard system update will make all the necessary changes.
References:
https://usn.ubuntu.com/usn/usn-3961-1
CVE-2019-11494, CVE-2019-11499
Package Information:
https://launchpad.net/ubuntu/+source/dovecot/1:2.3.4.1-1ubuntu2.2
https://launchpad.net/ubuntu/+source/dovecot/1:2.3.2.1-1ubuntu3.4
[USN-3960-1] WavPack vulnerability
Ubuntu Security Notice USN-3960-1
April 30, 2019
wavpack vulnerability
==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 19.04
- Ubuntu 18.10
- Ubuntu 18.04 LTS
Summary:
WavPack could be made to crash if it received a specially
crafted file.
Software Description:
- wavpack: audio codec (lossy and lossless) - encoder and decoder
Details:
It was discovered that WavPack incorrectly handled certain DFF files.
An attacker could possibly use this issue to cause a denial of service.
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 19.04:
libwavpack1 5.1.0-5ubuntu0.1
wavpack 5.1.0-5ubuntu0.1
Ubuntu 18.10:
libwavpack1 5.1.0-4ubuntu0.2
wavpack 5.1.0-4ubuntu0.2
Ubuntu 18.04 LTS:
libwavpack1 5.1.0-2ubuntu1.3
wavpack 5.1.0-2ubuntu1.3
In general, a standard system update will make all the necessary
changes.
References:
https://usn.ubuntu.com/usn/usn-3960-1
CVE-2019-11498
Package Information:
https://launchpad.net/ubuntu/+source/wavpack/5.1.0-5ubuntu0.1
https://launchpad.net/ubuntu/+source/wavpack/5.1.0-4ubuntu0.2
https://launchpad.net/ubuntu/+source/wavpack/5.1.0-2ubuntu1.3
[announce] Next NYC*BUG: Tomorrow!
https://www.nycbug.org/index?action=view&id=10667
_______________________________________________
announce mailing list
announce@lists.nycbug.org
http://lists.nycbug.org:8080/mailman/listinfo/announce
Fedora 30 officially released!
Thank you to the thousands of people who worked to bring this release
together. Fedora doesn't happen by magic: it happens because of you!
Read the official announcement at:
* https://fedoramagazine.org/announcing-fedora-30/
or just go ahead and grab it from:
* https://getfedora.org/
--
Matthew Miller
<mattdm@fedoraproject.org>
Fedora Project Leader
_______________________________________________
devel-announce mailing list -- devel-announce@lists.fedoraproject.org
To unsubscribe send an email to devel-announce-leave@lists.fedoraproject.org
Fedora Code of Conduct: https://getfedora.org/code-of-conduct.html
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: https://lists.fedoraproject.org/archives/list/devel-announce@lists.fedoraproject.org
[CentOS-announce] CEBA-2019:0813 CentOS 7 nss-pam-ldapd BugFix Update
Upstream details at : https://access.redhat.com/errata/RHBA-2019:0813
The following updated files have been uploaded and are currently
syncing to the mirrors: ( sha256sum Filename )
x86_64:
36ad7169df1653de7381b6d87ef18144ae2d5a144ef44b7aa2c2d34b4a738a20 nss-pam-ldapd-0.8.13-16.el7_6.1.i686.rpm
7fd9baa18be9beadc22a1d7e96d3fb986d02e15c3f39df3f5d94df732674ca87 nss-pam-ldapd-0.8.13-16.el7_6.1.x86_64.rpm
Source:
faccb45d4f28c664921ca0f0ec78032ddb3189f051c904aa4929746c06b04193 nss-pam-ldapd-0.8.13-16.el7_6.1.src.rpm
--
Johnny Hughes
CentOS Project { http://www.centos.org/ }
irc: hughesjr, #centos@irc.freenode.net
Twitter: @JohnnyCentOS
_______________________________________________
CentOS-announce mailing list
CentOS-announce@centos.org
https://lists.centos.org/mailman/listinfo/centos-announce
[CentOS-announce] CEBA-2019:0812 CentOS 7 httpd BugFix Update
Upstream details at : https://access.redhat.com/errata/RHBA-2019:0812
The following updated files have been uploaded and are currently
syncing to the mirrors: ( sha256sum Filename )
x86_64:
3c080130b71a9303918f5d64bc8a12a1b35eabb2e34ef0c2f5b9da52cffb1596 httpd-2.4.6-89.el7.centos.x86_64.rpm
12906a5814e2ce78026af786e00e546bcdd01912ab844c118e87c34f4d934433 httpd-devel-2.4.6-89.el7.centos.x86_64.rpm
1926e44bbb630c8c2f71e57241a91386529452dc2b2d7d52419d49b39a1817a5 httpd-manual-2.4.6-89.el7.centos.noarch.rpm
c92f76f10425a2f0572889a7cc806b7492da1d8b9f602ad0d2daebda82eef17d httpd-tools-2.4.6-89.el7.centos.x86_64.rpm
e206107f20efd4ff66370ebaef8e62d17776f8a57f3426362e844241420b1f8c mod_ldap-2.4.6-89.el7.centos.x86_64.rpm
06d923a8d2b1fed8b3a2572a7416d853eab72d45c241e5e662ad7134b6d8a57f mod_proxy_html-2.4.6-89.el7.centos.x86_64.rpm
56df30a88f3cb4385da941f93e62d4085578cf868e114d1e0728659ba373bd89 mod_session-2.4.6-89.el7.centos.x86_64.rpm
e7669ab3e44863c3eed8bfff19065d00d706ffd684992837b8d5eb082b0dcb9f mod_ssl-2.4.6-89.el7.centos.x86_64.rpm
Source:
27af76d945fc12d84d235efe008d41e894a3279bb06c0a21c7158e625eb3b621 httpd-2.4.6-89.el7.centos.src.rpm
--
Johnny Hughes
CentOS Project { http://www.centos.org/ }
irc: hughesjr, #centos@irc.freenode.net
Twitter: @JohnnyCentOS
_______________________________________________
CentOS-announce mailing list
CentOS-announce@centos.org
https://lists.centos.org/mailman/listinfo/centos-announce
[CentOS-announce] CESA-2019:0638 Important CentOS 7 openwsman Security Update
Upstream details at : https://access.redhat.com/errata/RHSA-2019:0638
The following updated files have been uploaded and are currently
syncing to the mirrors: ( sha256sum Filename )
x86_64:
33f8ea7f389485fb3997848c47e5fb01a19939e8fa13fa35b1330a1f9193cda1 libwsman1-2.6.3-6.git4391e5c.el7_6.i686.rpm
52772584a6c4b25710350bba42b8539386c7eebd1dc10a1937afc810e189479c libwsman1-2.6.3-6.git4391e5c.el7_6.x86_64.rpm
38f0b77b51a6779dfdbaea4ec56edd1a44b0dd4b08bf825b223cdee7890ea6f3 libwsman-devel-2.6.3-6.git4391e5c.el7_6.i686.rpm
44e029ac26748d1ef9d89ae5529b6f6ef3b705e9cf2f8a7af61a297847e02077 libwsman-devel-2.6.3-6.git4391e5c.el7_6.x86_64.rpm
594f646e9625dff7ce7a3cd10141688b70e97465b34db41acd97c78a12b94dda openwsman-client-2.6.3-6.git4391e5c.el7_6.i686.rpm
c20714bf096f8f1fb437387d829ee070da4b7ec6c71f9777b232277f8936b0cb openwsman-client-2.6.3-6.git4391e5c.el7_6.x86_64.rpm
3e5dc73de9658058f09939c7f37bc8142e497e5608c5f40c0f729a79431b2875 openwsman-perl-2.6.3-6.git4391e5c.el7_6.x86_64.rpm
d35a655954338813b2bf8c555c08532a028116233e301c73112ec4d024343e94 openwsman-python-2.6.3-6.git4391e5c.el7_6.x86_64.rpm
f2c27cc2bb522cea6b1a6fcfb9466a47a1cce7e9d9270b4ecca2613166ae4523 openwsman-ruby-2.6.3-6.git4391e5c.el7_6.x86_64.rpm
d178342b37039a400282f362206ad06b78719fd0fe4a31ee0c38fa895f9536ce openwsman-server-2.6.3-6.git4391e5c.el7_6.i686.rpm
c21b0800b68655241bab770df8729ee434b9139ecb6c86ca75d594e11daaab26 openwsman-server-2.6.3-6.git4391e5c.el7_6.x86_64.rpm
Source:
634cb9f7b2b4aee668a06c8d14b51a4e3681a24a7796f25c06b6910be16eff58 openwsman-2.6.3-6.git4391e5c.el7_6.src.rpm
--
Johnny Hughes
CentOS Project { http://www.centos.org/ }
irc: hughesjr, #centos@irc.freenode.net
Twitter: @JohnnyCentOS
_______________________________________________
CentOS-announce mailing list
CentOS-announce@centos.org
https://lists.centos.org/mailman/listinfo/centos-announce
[CentOS-announce] CEBA-2019:0814 CentOS 7 lvm2 BugFix Update
Upstream details at : https://access.redhat.com/errata/RHBA-2019:0814
The following updated files have been uploaded and are currently
syncing to the mirrors: ( sha256sum Filename )
x86_64:
d514dea74b547e752633be3a90063db4cbf302b17b0f882d53736d167130d3c2 cmirror-2.02.180-10.el7_6.7.x86_64.rpm
fd0fca9158322c04876e538b5ede6ccf4c13769274f74f051403d872894dd692 device-mapper-1.02.149-10.el7_6.7.x86_64.rpm
a0929232a9f42e3d61c62f056c984761c23ba41d07ffab9040aafb26f6ba9fbd device-mapper-devel-1.02.149-10.el7_6.7.i686.rpm
ba46706c1a35e56703b530614d7ccaf4a9ba9cd3a67ab152f49b95661206cad4 device-mapper-devel-1.02.149-10.el7_6.7.x86_64.rpm
43ae4117ace823ca52d24255f78a5e2c94338939e2addb08ae455185bb761ad1 device-mapper-event-1.02.149-10.el7_6.7.x86_64.rpm
947732949100abce4b02e41c67655395e3666a7a1dc52001b19653bb50fcf2d5 device-mapper-event-devel-1.02.149-10.el7_6.7.i686.rpm
2e09cb7ddb1efdc7811373c4abd39e0b81e231c3e4c0adcb40062e3ff087b67a device-mapper-event-devel-1.02.149-10.el7_6.7.x86_64.rpm
36ae715bae99e58db197911f9a2e34e9263f86140bc0203d818acdd854ba3241 device-mapper-event-libs-1.02.149-10.el7_6.7.i686.rpm
ff29b1b509a2cb76eefc8b78a9c5e25195c83c37142bd9fce412a860f7980d4d device-mapper-event-libs-1.02.149-10.el7_6.7.x86_64.rpm
e91afea72a347ec5e9fc47f4c3202dd5cda91dd7fd4723334c59debf0bd62210 device-mapper-libs-1.02.149-10.el7_6.7.i686.rpm
ce980bf09d3c2c791725f9a3f9d9d1c4786e80f77c0ab0a108e1411418551c28 device-mapper-libs-1.02.149-10.el7_6.7.x86_64.rpm
1571c74a567f7d42406a0dcb84ad562c0ec6ce8ce4521738e59652569963bbb7 lvm2-2.02.180-10.el7_6.7.x86_64.rpm
24229c631f44ea6a31bb054c95d2b21e47b58d3fa777d6fed994f362da23b9b7 lvm2-cluster-2.02.180-10.el7_6.7.x86_64.rpm
ada0238af4c4cde255badbfd835781668f2c3887d4b5f18ab53bab438a1db844 lvm2-devel-2.02.180-10.el7_6.7.i686.rpm
68d2f1b10d6c1696f3d21c77daad162a67eca8ab2cc6d82673f5d91848504dd0 lvm2-devel-2.02.180-10.el7_6.7.x86_64.rpm
40060a20228f0cab46f8ad8a769cafb08f6225ddf060626abcbed95772eb6b7b lvm2-libs-2.02.180-10.el7_6.7.i686.rpm
c176454d341964a952ed97161ce9faae266f58804dcc701c1a721ed50328fd85 lvm2-libs-2.02.180-10.el7_6.7.x86_64.rpm
fd57a8ba2fc7ef54a6475f7bb01c1cd504d36c8245d1e1af3bf7b34e2f1fe5c0 lvm2-lockd-2.02.180-10.el7_6.7.x86_64.rpm
d8fa68d2ec307b56f8cda603fb76828336e5c9c9b99a983293082f363f534ceb lvm2-python-boom-0.9-14.el7_6.7.noarch.rpm
18a82bae2535f2a75aa111de0463af8c117c7202c90966b7a6d9abef82de2b83 lvm2-python-libs-2.02.180-10.el7_6.7.x86_64.rpm
eaaec775abb998dfe2fddac053e02f383ce3cba9c3f88598ef1e58f3c58bd2bb lvm2-sysvinit-2.02.180-10.el7_6.7.x86_64.rpm
Source:
74fb5e03ce1b7ccf2005ddd47a3f8da97471923dd664c970c692f62b2164e466 lvm2-2.02.180-10.el7_6.7.src.rpm
--
Johnny Hughes
CentOS Project { http://www.centos.org/ }
irc: hughesjr, #centos@irc.freenode.net
Twitter: @JohnnyCentOS
_______________________________________________
CentOS-announce mailing list
CentOS-announce@centos.org
https://lists.centos.org/mailman/listinfo/centos-announce
OpenBGPD 6.5p0 released
OpenBGPD directory of your local OpenBSD mirror soon.
OpenBGPD is a free, functional, and secure implementation of the
Border Gateway Protocol (BGP-4). It is a fairly complete BGP
implementation and praised for ease of use, as well as its
reliability. This is the first release of OpenBGPD-portable in
quite some time. Since the last portable release a significant
amount of features and performance improvements have been added,
if you haven't used openbgpd-portable in a while, you'll be positively
amazed what has changed!
Caveats: there currently there is no support to update FIB / kernel
routing tables in the portable version of OpenBGPD. This means
OpenBGPD-portable is suitable for IXP route servers, route collectors
and route reflectors but not (yet) for use as a traditional router.
Some OpenBSD specific features have been turned off as well.
OpenBGPD-portable is known to compile and run on FreeBSD 12.x, and
the Linux distributions Debian 9, and Ubuntu 14.04. It is our hope
that packagers take interest and help adapt OpenBGPD-portable to
more distributions.
We welcome feedback and improvements from the broader community.
Thanks to all of the contributors who helped make this release
possible.
[CentOS-announce] CEBA-2019:0821 CentOS 7 libvirt BugFix Update
Upstream details at : https://access.redhat.com/errata/RHBA-2019:0821
The following updated files have been uploaded and are currently
syncing to the mirrors: ( sha256sum Filename )
x86_64:
56f5cf33d0268691e5a4c21db9136d0eea21081b671a4b0a8f99af6c94248926 libvirt-4.5.0-10.el7_6.7.x86_64.rpm
b8f3e0834020de930ceadb39baeffc5a5608f71a5097d904a67f292802e0dc4f libvirt-admin-4.5.0-10.el7_6.7.x86_64.rpm
6ed80410d9ec15f8d297a2048ea572beda657291f6ae34991d873796ca79c391 libvirt-bash-completion-4.5.0-10.el7_6.7.x86_64.rpm
ff1de3ca46508eb13c970cb35fe666e0a48b1d216cdf25cf571e171ebd461e77 libvirt-client-4.5.0-10.el7_6.7.i686.rpm
3eb94aea16b661768bc7b84b4122ce85f5e48ea5d7b90452645c1cee3641eb93 libvirt-client-4.5.0-10.el7_6.7.x86_64.rpm
7abdd13893b7f3508e1e81d79fcc22415843d76733b993244a0cd9d9f9df404f libvirt-daemon-4.5.0-10.el7_6.7.x86_64.rpm
502663b67013c0446d6eb5e2633ee13280e7b7f3bb6b6c1288e37ad793150054 libvirt-daemon-config-network-4.5.0-10.el7_6.7.x86_64.rpm
03f498eeb21540f4fd1f12e157cc9314c03b17bf77d6e931472806a1f277a19b libvirt-daemon-config-nwfilter-4.5.0-10.el7_6.7.x86_64.rpm
634b886f65130380b24f59f0f3d71dac96260db43444c8b8bc69f22452191913 libvirt-daemon-driver-interface-4.5.0-10.el7_6.7.x86_64.rpm
ecea568a95c0a80e7dd6b9b6f1f83873ffd87777c5f0a5e8c07b7a28cec061f8 libvirt-daemon-driver-lxc-4.5.0-10.el7_6.7.x86_64.rpm
90561b06c7d0f11be6ff346dfaca6766c76a3c369009f404e3d68615e6b06a6e libvirt-daemon-driver-network-4.5.0-10.el7_6.7.x86_64.rpm
1b1627e4f661d48a1034fbdd78e6df57b1c0e2cbac7fea73365278017194b808 libvirt-daemon-driver-nodedev-4.5.0-10.el7_6.7.x86_64.rpm
bbe62e2cb258edd398d3a385ad438721480621ca1d8a7c9aab681a157ba96495 libvirt-daemon-driver-nwfilter-4.5.0-10.el7_6.7.x86_64.rpm
e02c08dba864dbc8a822a7acc7ef91f06161504424365dc8dc7ae7e3423539e6 libvirt-daemon-driver-qemu-4.5.0-10.el7_6.7.x86_64.rpm
c10fcd2f7e9383f996e0ecbe644615c8f0019c68729d76094bb02fc5138cf023 libvirt-daemon-driver-secret-4.5.0-10.el7_6.7.x86_64.rpm
e55b08a60c6667c09dea12ef131179e1c0ba42138334c39c11533e9faaacefae libvirt-daemon-driver-storage-4.5.0-10.el7_6.7.x86_64.rpm
b05d78a96edb06f0dd5cec435a156d206d6ac06d471d102b0b2adc2b1c285325 libvirt-daemon-driver-storage-core-4.5.0-10.el7_6.7.x86_64.rpm
d9df17f52fbf5edd973c1ed4d8c755353c9fb8f9aa89a666cc45be3850b71bc8 libvirt-daemon-driver-storage-disk-4.5.0-10.el7_6.7.x86_64.rpm
3e97e6bd10415615bd25fb3e4144e92bd48c40677f9a8009763d08272bfdbbb7 libvirt-daemon-driver-storage-gluster-4.5.0-10.el7_6.7.x86_64.rpm
ad2eaaa73c8bad7879baa926146f071bed1002720b81d5bc60321e25c62fe35e libvirt-daemon-driver-storage-iscsi-4.5.0-10.el7_6.7.x86_64.rpm
50a645c586b0d21aa242d930e05bc6bf17e29f0a1d0f1c9510dffc592b248f25 libvirt-daemon-driver-storage-logical-4.5.0-10.el7_6.7.x86_64.rpm
a16c59b2b9b1e8f1daa93c71c704a29b7f9a015f4069bf12be149ee02ace8bd7 libvirt-daemon-driver-storage-mpath-4.5.0-10.el7_6.7.x86_64.rpm
10d2e0c9bfdcb9fa6a48b6f13f70882e3d9540e4e4578852c688a5c6a76458df libvirt-daemon-driver-storage-rbd-4.5.0-10.el7_6.7.x86_64.rpm
48f0ca2b3cb4a9d6a1a1d9804107a83dd3d18d5b9e2fe2856b9a9d668511afcf libvirt-daemon-driver-storage-scsi-4.5.0-10.el7_6.7.x86_64.rpm
29d2082b992107d18593387c21cf86e33154fef1a916c09bf0807caf7d3e3975 libvirt-daemon-kvm-4.5.0-10.el7_6.7.x86_64.rpm
c04f02fa5327c6abc0e9f8dbcebd44711d4e309893b78e1c3514510af993d7cb libvirt-daemon-lxc-4.5.0-10.el7_6.7.x86_64.rpm
3186d8f5ee0bc595f1a2a66515ea512a9ea437bd8e83ee0c494bce044dec1f22 libvirt-devel-4.5.0-10.el7_6.7.i686.rpm
b05e72c684d485f14cb54650f5f3012d24e869a04b73be12431ec789270aace2 libvirt-devel-4.5.0-10.el7_6.7.x86_64.rpm
cb371e251165dcd716f769a38ce990a9d6aa8ba0c6b81b8415498ec32a343d91 libvirt-docs-4.5.0-10.el7_6.7.x86_64.rpm
61704477d41bbddcc2ba3566a61fca8d02103055bc0468b8b552ad734d429f94 libvirt-libs-4.5.0-10.el7_6.7.i686.rpm
1433e07b764a1c4b1c0f16ee307097e478f907f05bd42edde703622a09a4054d libvirt-libs-4.5.0-10.el7_6.7.x86_64.rpm
66e108ebc2671a1c69497a6b099063b14ce80d9c30147292f0d9db18ea81a80f libvirt-lock-sanlock-4.5.0-10.el7_6.7.x86_64.rpm
612395f022c422f8c5a4bdf317a9c4764d108d9549e563cac1021bb5947efd78 libvirt-login-shell-4.5.0-10.el7_6.7.x86_64.rpm
636f8f3a5e8a130c980b18a2208e383e0f504c5044cca75985b4ad34b6fc4860 libvirt-nss-4.5.0-10.el7_6.7.i686.rpm
4996b8c5a067928500be9e9041bde345988352b573b57401d0c573b82c0800ea libvirt-nss-4.5.0-10.el7_6.7.x86_64.rpm
Source:
a64fe33d08ce1162b0d7d945eaaf0b4ede98b3bec06d7dd73fcd860771857caf libvirt-4.5.0-10.el7_6.7.src.rpm
--
Johnny Hughes
CentOS Project { http://www.centos.org/ }
irc: hughesjr, #centos@irc.freenode.net
Twitter: @JohnnyCentOS
_______________________________________________
CentOS-announce mailing list
CentOS-announce@centos.org
https://lists.centos.org/mailman/listinfo/centos-announce
[CentOS-announce] CEBA-2019:0819 CentOS 7 sos BugFix Update
Upstream details at : https://access.redhat.com/errata/RHBA-2019:0819
The following updated files have been uploaded and are currently
syncing to the mirrors: ( sha256sum Filename )
x86_64:
8149dfcaa9a93bcbd5d600b8c8a16aa37448ea2dad02492e1136fe518929bcad sos-3.6-17.el7.centos.noarch.rpm
Source:
1058403bd648455e3351b93b429fec26d0852b858bcb8ffc3467b5330351db72 sos-3.6-17.el7.centos.src.rpm
--
Johnny Hughes
CentOS Project { http://www.centos.org/ }
irc: hughesjr, #centos@irc.freenode.net
Twitter: @JohnnyCentOS
_______________________________________________
CentOS-announce mailing list
CentOS-announce@centos.org
https://lists.centos.org/mailman/listinfo/centos-announce
[CentOS-announce] CEBA-2019:0826 CentOS 7 scap-security-guide BugFix Update
Upstream details at : https://access.redhat.com/errata/RHBA-2019:0826
The following updated files have been uploaded and are currently
syncing to the mirrors: ( sha256sum Filename )
x86_64:
bb4c6463fd7698caadf8f2f4eefac7d6e7de514b58b23b1527ae4c24e8f087b0 scap-security-guide-0.1.40-13.el7.centos.noarch.rpm
6c17aa362019a3d8db322c676d0c5aab33572787e3a68298f53c1d876ac7f2e5 scap-security-guide-doc-0.1.40-13.el7.centos.noarch.rpm
Source:
2e2f20b9a8a42862aeccd09dadae11af95f9b1b7c5914c157a2532a0726414e1 scap-security-guide-0.1.40-13.el7.centos.src.rpm
--
Johnny Hughes
CentOS Project { http://www.centos.org/ }
irc: hughesjr, #centos@irc.freenode.net
Twitter: @JohnnyCentOS
_______________________________________________
CentOS-announce mailing list
CentOS-announce@centos.org
https://lists.centos.org/mailman/listinfo/centos-announce
[CentOS-announce] CEBA-2019:0810 CentOS 7 kexec-tools BugFix Update
Upstream details at : https://access.redhat.com/errata/RHBA-2019:0810
The following updated files have been uploaded and are currently
syncing to the mirrors: ( sha256sum Filename )
x86_64:
90e4863776b4c5ffcaa33da4b46fe7122120a7f9331bcb168152fa9eab66675c kexec-tools-2.0.15-21.el7_6.3.x86_64.rpm
092a129c14fe356e92c0f2f6c5f82dc1d7218236aff84b7bed552603eb62b48c kexec-tools-anaconda-addon-2.0.15-21.el7_6.3.x86_64.rpm
d4a8f05c6994583640714ccc9b7932fbcec5f7f6f1a8e3a283a278b6ae2cacb9 kexec-tools-eppic-2.0.15-21.el7_6.3.x86_64.rpm
Source:
5d5507a7111f3c7f392c29225fe4e24c64541d05d168875bf66f1ebf90c74b2b kexec-tools-2.0.15-21.el7_6.3.src.rpm
--
Johnny Hughes
CentOS Project { http://www.centos.org/ }
irc: hughesjr, #centos@irc.freenode.net
Twitter: @JohnnyCentOS
_______________________________________________
CentOS-announce mailing list
CentOS-announce@centos.org
https://lists.centos.org/mailman/listinfo/centos-announce
[CentOS-announce] CEBA-2019:0825 CentOS 7 gnome-shell-extensions BugFix Update
Upstream details at : https://access.redhat.com/errata/RHBA-2019:0825
The following updated files have been uploaded and are currently
syncing to the mirrors: ( sha256sum Filename )
x86_64:
7d05b49cb0d69ab8048d1ae76dea13ca4c534fbf8e7d08bf049f11a6102598b8 gnome-classic-session-3.28.1-5.el7.1.noarch.rpm
9ae540a1231e3b4c1aba9e3e79a668745a1964310b30bb00de0bc266dbe47fbe gnome-shell-extension-alternate-tab-3.28.1-5.el7.1.noarch.rpm
a207d8d71d1dc64eca4186b0c3a3f8733619eaee100dd59a4d7ca74b932d1ed1 gnome-shell-extension-apps-menu-3.28.1-5.el7.1.noarch.rpm
4be3c6c0f725866eddb51091b57d18ece9cbe013ca544feb65013694d7d175c6 gnome-shell-extension-auto-move-windows-3.28.1-5.el7.1.noarch.rpm
fe594155592f7aef2f99661956dbbffa85761535707983a686bea190ce4f4917 gnome-shell-extension-common-3.28.1-5.el7.1.noarch.rpm
261632a3648580f5962e3f8f95fec6d44a1b808c463d1de4bdf8481c5bbafd6c gnome-shell-extension-dash-to-dock-3.28.1-5.el7.1.noarch.rpm
17f73fa7e20d19a6b25ea476bfef2542f519c2c4866422daca944a49ff3137a1 gnome-shell-extension-drive-menu-3.28.1-5.el7.1.noarch.rpm
33139b99723d3d86c83ec98aa216093c1ccef0d67ba5b556414b328818f2fcfe gnome-shell-extension-launch-new-instance-3.28.1-5.el7.1.noarch.rpm
7817de6f342096ef3465898d366e79034fb4fd0ff747b05303cc11ab74a03e3a gnome-shell-extension-native-window-placement-3.28.1-5.el7.1.noarch.rpm
315814dd5860a5ee2946df7195c77408538587ab2f149ba158928aac05f7ccd3 gnome-shell-extension-no-hot-corner-3.28.1-5.el7.1.noarch.rpm
c22d325625ab9834dfc4b043ade4b50a21b075f4b543d8740671ab00327efd8b gnome-shell-extension-panel-favorites-3.28.1-5.el7.1.noarch.rpm
94a9e8858ea2a9e1a6e57f9722136f0821bd1ed77b17b5560cce478dc7db98a5 gnome-shell-extension-places-menu-3.28.1-5.el7.1.noarch.rpm
c0c378c429d3627530a15f354c5af9ba28cd6880296c5b515b6319a4cb848eb2 gnome-shell-extension-screenshot-window-sizer-3.28.1-5.el7.1.noarch.rpm
1237f63f6aca588a50e0a57d8f4791b218f0eecdc24d961b5efee2899f49202d gnome-shell-extension-systemMonitor-3.28.1-5.el7.1.noarch.rpm
8967813d021342b57b44d7ccf56a6c8a705de2b2b5b9c263867fe30ea739210b gnome-shell-extension-top-icons-3.28.1-5.el7.1.noarch.rpm
183deec68d89cbf0fe4e4cf0962de49e3ec12f2a32ea33dfc1c4c7ff6d3a8e49 gnome-shell-extension-updates-dialog-3.28.1-5.el7.1.noarch.rpm
d3eb97442ae7fd80a6bfdf2a3620eebcc6d2ebc9b764afa743f2354321ae429c gnome-shell-extension-user-theme-3.28.1-5.el7.1.noarch.rpm
b706bbdaa76f04467630796078d24231516cc614351d2147b77e8b54d635feab gnome-shell-extension-window-list-3.28.1-5.el7.1.noarch.rpm
a2b85881a4e636bc0cc1f839416ca24bd231ca9aab51fff61ab0b3d998d779be gnome-shell-extension-windowsNavigator-3.28.1-5.el7.1.noarch.rpm
bad579113d40f17fda1017cecd7428a9390e95ac7debbfe668ba57fa97a8f608 gnome-shell-extension-workspace-indicator-3.28.1-5.el7.1.noarch.rpm
Source:
f6351dea217114fd9c9b2aeeefb0e04da7b68c06a4cf5928b7eb0792c343517b gnome-shell-extensions-3.28.1-5.el7.1.src.rpm
--
Johnny Hughes
CentOS Project { http://www.centos.org/ }
irc: hughesjr, #centos@irc.freenode.net
Twitter: @JohnnyCentOS
_______________________________________________
CentOS-announce mailing list
CentOS-announce@centos.org
https://lists.centos.org/mailman/listinfo/centos-announce
[CentOS-announce] CEBA-2019:0808 CentOS 7 iproute BugFix Update
Upstream details at : https://access.redhat.com/errata/RHBA-2019:0808
The following updated files have been uploaded and are currently
syncing to the mirrors: ( sha256sum Filename )
x86_64:
abf0bf331ab7c24a12bf898ac03213e8fc8b812bc63d938c28f6aa278c59573a iproute-4.11.0-14.el7_6.2.x86_64.rpm
82a251f695b66156b365ebe76806633b14671963c05c5dd7046f76b433726094 iproute-devel-4.11.0-14.el7_6.2.i686.rpm
c6b212aa98657e3f93d70772a276519b666c0e10bc1b6d60c5acc59fb54f16b0 iproute-devel-4.11.0-14.el7_6.2.x86_64.rpm
526e83983a6cb35c45650c1e4e4cef1b4e1929b8d3ad814ad3c9ed8057fa7397 iproute-doc-4.11.0-14.el7_6.2.x86_64.rpm
Source:
664fdfd7ff6927469922aa0b8724af40e221a63cf7952fcfc051b2db27681970 iproute-4.11.0-14.el7_6.2.src.rpm
--
Johnny Hughes
CentOS Project { http://www.centos.org/ }
irc: hughesjr, #centos@irc.freenode.net
Twitter: @JohnnyCentOS
_______________________________________________
CentOS-announce mailing list
CentOS-announce@centos.org
https://lists.centos.org/mailman/listinfo/centos-announce
[CentOS-announce] CEBA-2019:0824 CentOS 7 gdm BugFix Update
Upstream details at : https://access.redhat.com/errata/RHBA-2019:0824
The following updated files have been uploaded and are currently
syncing to the mirrors: ( sha256sum Filename )
x86_64:
fb2ee3d13cda2abc10dbacae19f946cfbc7c17834980942478736aab4c3a44df gdm-3.28.2-12.el7_6.1.i686.rpm
5a92f6b0ab13ab262f7710c2c3260d0a9a6b6d2e3c401d61f385ad3c9fe33fdf gdm-3.28.2-12.el7_6.1.x86_64.rpm
56e5e0b7c5251130d5320d24e33d3226edb56f0e8865d3098ef1aac282c1ff5c gdm-devel-3.28.2-12.el7_6.1.i686.rpm
a233266b8af24da79df51fcb1cc24011c3e4f133eceac7b79c19ae22724a0790 gdm-devel-3.28.2-12.el7_6.1.x86_64.rpm
0f27f2a1579247eee4471d913f773d73086fd9fdca5501615006dc56416ffac9 gdm-pam-extensions-devel-3.28.2-12.el7_6.1.i686.rpm
5c0da42a2493b2b4c3584fe04017d3fdc5180aa39724ae118265f09526a8b6b1 gdm-pam-extensions-devel-3.28.2-12.el7_6.1.x86_64.rpm
Source:
3ecc35023124558d744db5da6c83158c2467b7cc28428db1408619b878e228b8 gdm-3.28.2-12.el7_6.1.src.rpm
--
Johnny Hughes
CentOS Project { http://www.centos.org/ }
irc: hughesjr, #centos@irc.freenode.net
Twitter: @JohnnyCentOS
_______________________________________________
CentOS-announce mailing list
CentOS-announce@centos.org
https://lists.centos.org/mailman/listinfo/centos-announce
[CentOS-announce] CEBA-2019:0807 CentOS 7 gcc BugFix Update
Upstream details at : https://access.redhat.com/errata/RHBA-2019:0807
The following updated files have been uploaded and are currently
syncing to the mirrors: ( sha256sum Filename )
x86_64:
0aa2fe9110c371e8233a318a4080947071efa1520a65ca2ac53d008f33bb9226 cpp-4.8.5-36.el7_6.2.x86_64.rpm
df11ee20a10e77891291f7792937b6289d5f0d7f9a71c2fe3565c13638e9faa1 gcc-4.8.5-36.el7_6.2.x86_64.rpm
4be1a944bfc7c6a5baf6ad0670b0c6c1dcb21a5b6d0ddb7ef81e13df17b849a7 gcc-c++-4.8.5-36.el7_6.2.x86_64.rpm
76f426e1b324a612b907c6b52fb915488c00d9b2317f5460387dfb53b99d29bc gcc-gfortran-4.8.5-36.el7_6.2.x86_64.rpm
61cc26676fd02d50aa8a90b212140cfe2cccd1b9acc5bfb2fc4f8160d8f72471 gcc-gnat-4.8.5-36.el7_6.2.x86_64.rpm
4287f16f1bdeaf4f5563ce45dcc0922e4fb6354c3c9e509af43d3f2ef71a904a gcc-go-4.8.5-36.el7_6.2.x86_64.rpm
b8cb2d060242ec97157a34a80f77d984f18102167677e5e05f18c6e6bf8bc469 gcc-objc-4.8.5-36.el7_6.2.x86_64.rpm
11083f3d86e04333bc8bedabebeba53b9a0d00b47b69bdd0dd9b0847a7ecb70d gcc-objc++-4.8.5-36.el7_6.2.x86_64.rpm
217f966f99a87abdd07fda4971cbe65ae68f74e4a65ff6dd972a0e4dc2e9e060 gcc-plugin-devel-4.8.5-36.el7_6.2.x86_64.rpm
de3c266962526efc4e2960b7153cd8f56cffecfd1dcdb357797e4dc1726408ed libasan-4.8.5-36.el7_6.2.i686.rpm
b1bed6bdb163928ae0c19d760983c3970b412b4a353cf827b6acc40674434298 libasan-4.8.5-36.el7_6.2.x86_64.rpm
90b931d343aacc05679bcb364abaa4e81aadb109432df7dec57011152dc28e75 libasan-static-4.8.5-36.el7_6.2.i686.rpm
8a474ea77ad996a57261226b2bfe9db46e5387ed879d355794c5788681640cf5 libasan-static-4.8.5-36.el7_6.2.x86_64.rpm
f0a454fa2b64d4db9f3e6e36aa520ab7a0eab903543012189f7f4094a2b6a856 libatomic-4.8.5-36.el7_6.2.i686.rpm
8d16d345c51f3709c45c2fd03bc428a9b402fc40bdc07b4a913ec09b2f297a66 libatomic-4.8.5-36.el7_6.2.x86_64.rpm
866968c2ee28b8eacb0fa3ce99b2a9217e7c8f289cf984531391d8f4e43f4a39 libatomic-static-4.8.5-36.el7_6.2.i686.rpm
71971abdddb5f1ba218ba14b74b5af9839957a784fa66609c5f97b8629353948 libatomic-static-4.8.5-36.el7_6.2.x86_64.rpm
256c871a4378476f7ef174c412f909033723f579d0bc7ebb91cf05d926266d9f libgcc-4.8.5-36.el7_6.2.i686.rpm
5200ee8c1960a6412f508440ec14d8b96a44f1c78874bfccdb1c2d8d815b1d76 libgcc-4.8.5-36.el7_6.2.x86_64.rpm
27f77f89cd158bb3c30cbe7297627e42cff975d97e12a7bdce4b7a34966a6a1e libgfortran-4.8.5-36.el7_6.2.i686.rpm
76ca4c9e1bcbc52cb9c32e8cb69670581b6b9271c938cbee688f0a963fa1f6ce libgfortran-4.8.5-36.el7_6.2.x86_64.rpm
2f76e7093b790cfaf30fc423c42406c244451b93e15c2b6e30e81a1714e93819 libgfortran-static-4.8.5-36.el7_6.2.i686.rpm
494fa32af8aa1387258dd8a5b7e0a82f1e003ef408779db6d9baf62d7c7e0667 libgfortran-static-4.8.5-36.el7_6.2.x86_64.rpm
51c33003a3443c5ab42517b7f2ab01d73afa8102a0173f9742a35dce7c49527f libgnat-4.8.5-36.el7_6.2.i686.rpm
699cb8daf69ffa9d4ec5554da416ef9fb5deca4a6ad2ee6d92d84703bd3faac7 libgnat-4.8.5-36.el7_6.2.x86_64.rpm
5697845c0f0d36247f5fffb7ba8586bcc0cad8d50ce8c3ba3d7d9c1e5d30406e libgnat-devel-4.8.5-36.el7_6.2.i686.rpm
b0097f2122cce28bef289275ba6cc5df6873b945c5dc0257e3104f15feb76e5a libgnat-devel-4.8.5-36.el7_6.2.x86_64.rpm
1d50e89f2e580766e2a68daa528eb7135af77c9105727d4c955d1e0dc2df1bad libgnat-static-4.8.5-36.el7_6.2.i686.rpm
fef98c9799b3b97bb5a420ca3a2f8c793af1a9689b55fff5d050887ca100e3ba libgnat-static-4.8.5-36.el7_6.2.x86_64.rpm
9be62c2bcfb6fdb77903496f0c3f3b1bae50c062738ee659191f8033647cfbc3 libgo-4.8.5-36.el7_6.2.i686.rpm
a1309a935cd76935d80807cc8993f92ac7005343c36020fb6481f70c7f3143cc libgo-4.8.5-36.el7_6.2.x86_64.rpm
e927f4382bdec6248af3128a5ff9bf8451633831790e842836f873de5ec5a3ca libgo-devel-4.8.5-36.el7_6.2.i686.rpm
f6dcb3b0462b2908d02745f092080ae531d01df58d2b6a5e141d1758e7054908 libgo-devel-4.8.5-36.el7_6.2.x86_64.rpm
63e76c63d5e97594f8aee9f6868a69393bcfe74221d6e1645d81cc5c1c1fc295 libgomp-4.8.5-36.el7_6.2.i686.rpm
3d4b7fef75e6abdac9393e0fb334b1a79e33dca26f3042a126378072a70a2dc2 libgomp-4.8.5-36.el7_6.2.x86_64.rpm
6a540bdb56564698b601607305ff339e316bbb5ea7721febe104a58b3a668645 libgo-static-4.8.5-36.el7_6.2.i686.rpm
f6649df3b41248e96bdf88a328144a10a063cc7328866730ca5957485aa26cd9 libgo-static-4.8.5-36.el7_6.2.x86_64.rpm
13d2fa2882e646825923c323589599703821b6a68c9c2250a575f909f2ff1e61 libitm-4.8.5-36.el7_6.2.i686.rpm
90757e8d5bd1c3fa73154184a369c41c0b1b81c1145b3409a895c44e06a0fb1a libitm-4.8.5-36.el7_6.2.x86_64.rpm
26a4a985dba5f35e85b09e709d5121133cd5c7cd6b9b37dfeaf78fd5c8266d69 libitm-devel-4.8.5-36.el7_6.2.i686.rpm
033cc05d4e54c3bd0f651676c290b04cb139d7fdf5eb368132f01c8638458751 libitm-devel-4.8.5-36.el7_6.2.x86_64.rpm
25c5f29e424cf85d2f6495c77d6506903ca0b17292150b89a259a1c9203b2a0e libitm-static-4.8.5-36.el7_6.2.i686.rpm
7c4fa8767f31914d939b189caac45b73454dee2d7e4bb218f2a3a86fcca4fa59 libitm-static-4.8.5-36.el7_6.2.x86_64.rpm
0d0b23abefb707e05f056c47f8b6db790fb9fc4004456a2bd5a4a36ede65d880 libmudflap-4.8.5-36.el7_6.2.i686.rpm
5ebbbf957e2ebdee4c9d5bb76b0dd1a90c44795e97bd0eac8901678dd95cf143 libmudflap-4.8.5-36.el7_6.2.x86_64.rpm
d57cd01a2548328e2ece8eb7cde252c3bc056461471531c106ce8edf2595d662 libmudflap-devel-4.8.5-36.el7_6.2.i686.rpm
51a4b70b4d22abe76d4970e61e6ce03e045ac065f44a18dc9491fcdd208485ea libmudflap-devel-4.8.5-36.el7_6.2.x86_64.rpm
62e9dfe581fc6d0140f492ca787c51d1f819b21dcc42673b22601213f5df61c3 libmudflap-static-4.8.5-36.el7_6.2.i686.rpm
1934261dbba05affe010770dea2a26cb793e0a0a4026b34a7a2b269dfea6ce00 libmudflap-static-4.8.5-36.el7_6.2.x86_64.rpm
d796159b7d5fb6f56cbb758927db3c3d9f37fbe477161200c7a166bd8913e692 libobjc-4.8.5-36.el7_6.2.i686.rpm
047db911d89e6b9b356b27a88db4ae3d69553b6fc0145aecba639dea47c4cdcc libobjc-4.8.5-36.el7_6.2.x86_64.rpm
9141df0631a9502840ff3d2f9e68f95308cdb78ca50116539fcdab9e6693eeea libquadmath-4.8.5-36.el7_6.2.i686.rpm
0d955da7f927534e6b61320fe5032b12ce7f8643db965135be9fe2970363b432 libquadmath-4.8.5-36.el7_6.2.x86_64.rpm
730e9c188ce026acffd5e0329aaf4b100751cdbb84f4244577a947ca25d9f361 libquadmath-devel-4.8.5-36.el7_6.2.i686.rpm
ef8cda19ef7fa51d1aa0e457d1d6b1190cd9bb1673547c2aa828bca65eabcd13 libquadmath-devel-4.8.5-36.el7_6.2.x86_64.rpm
17199cc944f4da248e37088df38602ca53054588324882a872c52b4e55f954f2 libquadmath-static-4.8.5-36.el7_6.2.i686.rpm
7a9df7d025e6947da1389cbd59938c9fe8efcc790280e596e6d0486a6077e962 libquadmath-static-4.8.5-36.el7_6.2.x86_64.rpm
3391384761493964c02434865ad8e77a3c1f49ee350c1f6499c8ab9b4e1bbefe libstdc++-4.8.5-36.el7_6.2.i686.rpm
3d98b7ccc533541024831afb66285a08aeaeb548429cf8bc903178681fb8ff9a libstdc++-4.8.5-36.el7_6.2.x86_64.rpm
8ae628c1c9ba0a186d2913db2a3e88c848905cfb467fdf4bbc1db408183637ec libstdc++-devel-4.8.5-36.el7_6.2.i686.rpm
d57ddb332eafb1b8b184fc578b9d31f695cc68b5953fb5894f82dd58159a9bbd libstdc++-devel-4.8.5-36.el7_6.2.x86_64.rpm
989d4604f25a832a19f76d397cb6550007350bf3f4a8a0cddfd7175312ce1f02 libstdc++-docs-4.8.5-36.el7_6.2.x86_64.rpm
f6012dd8e1b29f884904a2d7aa9818bd2131c5b121905c34dd09d2f9f82582f7 libstdc++-static-4.8.5-36.el7_6.2.i686.rpm
f234f01e2b34023f72166b2cf3423e6e22d8d59e338cbf33f82a4a534e10b9d8 libstdc++-static-4.8.5-36.el7_6.2.x86_64.rpm
797dd0c857865409ec3fd9030d8804e06cc8eabfcc1cba01270c488810df7cdb libtsan-4.8.5-36.el7_6.2.x86_64.rpm
e88c81ad2365d4a9b7588aff93e502429c3e55f56ff98294fa46ed29c3d2a6d4 libtsan-static-4.8.5-36.el7_6.2.x86_64.rpm
Source:
ac99e3be48ea00a95dc8d302a31c74597f365f1f3c05ed10623954a155f5498c gcc-4.8.5-36.el7_6.2.src.rpm
--
Johnny Hughes
CentOS Project { http://www.centos.org/ }
irc: hughesjr, #centos@irc.freenode.net
Twitter: @JohnnyCentOS
_______________________________________________
CentOS-announce mailing list
CentOS-announce@centos.org
https://lists.centos.org/mailman/listinfo/centos-announce
[CentOS-announce] CEBA-2019:0815 CentOS 7 pango BugFix Update
Upstream details at : https://access.redhat.com/errata/RHBA-2019:0815
The following updated files have been uploaded and are currently
syncing to the mirrors: ( sha256sum Filename )
x86_64:
7b5a6fc50bc8275994f811b047643572b6355353fd2224ac4d42e5e758f0c38c pango-1.42.4-2.el7_6.i686.rpm
4d7d465674aeabb2d809fe1ca1012e7ec3daeca8e76ddbc9422e6b60c396b3f4 pango-1.42.4-2.el7_6.x86_64.rpm
da5cacb248236919355f8e7675a88f8f3cad0723780959760b10654f05bcc256 pango-devel-1.42.4-2.el7_6.i686.rpm
598b178425f6032c9f5e4dfcc500f325ec2b534941f5cc8c1a3031a6f42226e4 pango-devel-1.42.4-2.el7_6.x86_64.rpm
801c783cb343fd8e3de95603649d7e8928d6f70c0a6f4a064587147f7d1bd2a8 pango-tests-1.42.4-2.el7_6.x86_64.rpm
Source:
5f27373c7de242946c3d3a7a1b3cbff497caf7908b7c76b571b18a4e9b8ba5fa pango-1.42.4-2.el7_6.src.rpm
--
Johnny Hughes
CentOS Project { http://www.centos.org/ }
irc: hughesjr, #centos@irc.freenode.net
Twitter: @JohnnyCentOS
_______________________________________________
CentOS-announce mailing list
CentOS-announce@centos.org
https://lists.centos.org/mailman/listinfo/centos-announce
[CentOS-announce] CEEA-2019:0045 CentOS 7 rsync Enhancement Update
Upstream details at : https://access.redhat.com/errata/RHEA-2019:0045
The following updated files have been uploaded and are currently
syncing to the mirrors: ( sha256sum Filename )
x86_64:
903d5110ff3b7959965444137774b61fbfe8b45825488fbf1fb2dc5a707e9867 rsync-3.1.2-6.el7_6.1.x86_64.rpm
Source:
df0b3a18cf1a59a2ad1c022f403c7e513b22aa8793e2a654070f6c7cd0d81e5b rsync-3.1.2-6.el7_6.1.src.rpm
--
Johnny Hughes
CentOS Project { http://www.centos.org/ }
irc: hughesjr, #centos@irc.freenode.net
Twitter: @JohnnyCentOS
_______________________________________________
CentOS-announce mailing list
CentOS-announce@centos.org
https://lists.centos.org/mailman/listinfo/centos-announce
[CentOS-announce] CEBA-2019:0816 CentOS 7 sssd BugFix Update
Upstream details at : https://access.redhat.com/errata/RHBA-2019:0816
The following updated files have been uploaded and are currently
syncing to the mirrors: ( sha256sum Filename )
x86_64:
bb1c30bf0b7ec76797d166af1ef5a6bfa1a5b77bdf098bd2ffe7756edad6ba29 libipa_hbac-1.16.2-13.el7_6.8.i686.rpm
aa54fb18333a0e137ef2bb2c35413fac1743aa32c9b456bdb95f8856ba6ab3d3 libipa_hbac-1.16.2-13.el7_6.8.x86_64.rpm
072ddf528807cb815d272921c3eadaeb24f406da99bd6a86760c5e68c87105aa libipa_hbac-devel-1.16.2-13.el7_6.8.i686.rpm
f53b3a4de94d7d64675a04010ee56f483f081d52e1637d0e761d9952745f9039 libipa_hbac-devel-1.16.2-13.el7_6.8.x86_64.rpm
4113def34b25b6bacc2dcd2ce0bdb1e5f645da187273b7fb451b5ffc391229d2 libsss_autofs-1.16.2-13.el7_6.8.x86_64.rpm
da279dc825faf40a8ab6346726fc4ca92e48fe1360f78fd1d9a98d59eb0fd830 libsss_certmap-1.16.2-13.el7_6.8.i686.rpm
37e0ea31c761396c245dfcc32b1490a29e0c58e0e1f68c6335e1ce5d521f5aa4 libsss_certmap-1.16.2-13.el7_6.8.x86_64.rpm
49b5e103395232ee43885eae5c74822fd00cd5af6f31edd120f5d436a81edd10 libsss_certmap-devel-1.16.2-13.el7_6.8.i686.rpm
233136525a52b81490c30e0d8707ca62a32c3402850d3b0d8f6aa366c24053eb libsss_certmap-devel-1.16.2-13.el7_6.8.x86_64.rpm
6375f9b9b4a23f334cc52ee4f4d747059888a533ecd1f082278ab9bb77dd8e77 libsss_idmap-1.16.2-13.el7_6.8.i686.rpm
ef132f7edc6db583ca75c3174e49cfde89c264c8c20cd08f9424f5b4b4382f1f libsss_idmap-1.16.2-13.el7_6.8.x86_64.rpm
08c48399c9c76dd55b4a84a32b06f34724ea3959aa708628d2f984b2e218f84a libsss_idmap-devel-1.16.2-13.el7_6.8.i686.rpm
bceb7beadb89c558b634abc48fd53708d98d43f59b09841d501c65b352658f9c libsss_idmap-devel-1.16.2-13.el7_6.8.x86_64.rpm
dc2a64c6668b20420142e316035f313113aed17aff0cec1c58b755f599804211 libsss_nss_idmap-1.16.2-13.el7_6.8.i686.rpm
109f0136550d1e30e2bc95494906ba051acc77ec7ca789e819b59678564bd151 libsss_nss_idmap-1.16.2-13.el7_6.8.x86_64.rpm
8ee61ce0ad5d0933d84f09d01348f9aa354d89f1b41cca6257f54923d5a54d25 libsss_nss_idmap-devel-1.16.2-13.el7_6.8.i686.rpm
e1e9cc14e5da0d42b3435eb23d371fc805ec2c2fa6525b6c4a494537beafed38 libsss_nss_idmap-devel-1.16.2-13.el7_6.8.x86_64.rpm
e773275d764b7a48e7c0a072d014f8478c9877c694ab0249b9c34f700f06e510 libsss_simpleifp-1.16.2-13.el7_6.8.i686.rpm
96f6769d453f17fb3422a2f9e4efae7247a80cc7cf70c6ae5305fae447b5d21f libsss_simpleifp-1.16.2-13.el7_6.8.x86_64.rpm
1ddb42ebdcd5e49b3863cf29acd3f6592e596a39f0fda0c1c31fef30cd35d41e libsss_simpleifp-devel-1.16.2-13.el7_6.8.i686.rpm
1337e81be7d4179435ef95ef042208cda6747a05e48f14a5793c39a806c19f91 libsss_simpleifp-devel-1.16.2-13.el7_6.8.x86_64.rpm
7b95dbc1de0827d6a74ffae1da31b9cddde32fb56ab30af9513eaf2d4e12da9c libsss_sudo-1.16.2-13.el7_6.8.x86_64.rpm
60b565f5d39d8cb6bc52e5a73bd1b0f17abfc458f17ed2d56fd56be12b53e27d python-libipa_hbac-1.16.2-13.el7_6.8.x86_64.rpm
2fb54c1ac379aa0c415ae93805994567e4becc5e1a82bd47b493dbce4fc28438 python-libsss_nss_idmap-1.16.2-13.el7_6.8.x86_64.rpm
f0b8f7c31a60c45d3931f8e1b0c87183ede79d5fb9a7c4fb247380555f0206d6 python-sss-1.16.2-13.el7_6.8.x86_64.rpm
a408d57e28b6e5500bdcb91a8788cf1c06a89af3e3824eb5d3954753fde966ca python-sssdconfig-1.16.2-13.el7_6.8.noarch.rpm
096384d7bb46e2a8ef7fe13fd12c96fefa2611d582f174d53733a0196cf597a0 python-sss-murmur-1.16.2-13.el7_6.8.x86_64.rpm
704d3d4580838eabc3dc2a89fd0744bae8baed3961637aeb11697f1a3e4c8200 sssd-1.16.2-13.el7_6.8.x86_64.rpm
9bc20555a6cc72f91562317b1a1dc8c92f94bf5aadb56ecaf9c4b2c648d27625 sssd-ad-1.16.2-13.el7_6.8.x86_64.rpm
ffb7f31d13d8e5aceedd75a6ccc37797d8096ebb14dfddb121cee80c685bbca4 sssd-client-1.16.2-13.el7_6.8.i686.rpm
30b6dec48b8ad232675a6fe5d890e5a5c2c29e8e5668ee91b38f919758972793 sssd-client-1.16.2-13.el7_6.8.x86_64.rpm
a3353ba5898b6d5773c4d6e22674555198192a2003b0cb09b352347956a2aba5 sssd-common-1.16.2-13.el7_6.8.x86_64.rpm
b84ab02b438bc9e176c263eae0910e33fe19b9f8359dc10bc56436aae350f540 sssd-common-pac-1.16.2-13.el7_6.8.x86_64.rpm
9f78f3b7e9edcff4c75315cfe8fed4fb401c5e8ff658ec0175c896648e61f5f7 sssd-dbus-1.16.2-13.el7_6.8.x86_64.rpm
4fb3d90364418487cfdc8838b2d360426e79de4327392959c5b5ccaefc427e47 sssd-ipa-1.16.2-13.el7_6.8.x86_64.rpm
3f7ad195f5cc4a9a2bc212760d26d00f7ade88bb0606f6a326e6ac538be775b9 sssd-kcm-1.16.2-13.el7_6.8.x86_64.rpm
d1709521a1a63fd011682896ce53b4da37ed1cdec6f5ac28847f30d8e91e60eb sssd-krb5-1.16.2-13.el7_6.8.x86_64.rpm
878ef7e84bc14e3cf8061f002f0e0210e2b191cc96180d35807ef92c76dfecdb sssd-krb5-common-1.16.2-13.el7_6.8.x86_64.rpm
72e0a06c99665507d51cf3a01dcff56eae35707c8953a0f5b40b54c5d848318e sssd-ldap-1.16.2-13.el7_6.8.x86_64.rpm
c16848395bab714b82ee285e8793459442c586d4391e4eb7b04b9646d9baeded sssd-libwbclient-1.16.2-13.el7_6.8.x86_64.rpm
af44a304d769cb2a9fb4f6a7eb8f7c201871dac2c8ee46258ec76dcd979226a6 sssd-libwbclient-devel-1.16.2-13.el7_6.8.i686.rpm
d9e822edac77461d0af2d6bf31eb54ad3394d6073c802462f6967aab3497939b sssd-libwbclient-devel-1.16.2-13.el7_6.8.x86_64.rpm
5d59ce71308f49ba2b16844b86061961eda0e58805f6cc8c4f5742e474b373ba sssd-polkit-rules-1.16.2-13.el7_6.8.x86_64.rpm
b649ca7c34bd2f160d4dd315ef7825bad7c1014ae9a3d92b48b65a055ec0d839 sssd-proxy-1.16.2-13.el7_6.8.x86_64.rpm
461470a8b3cb45e52514a24aab8a5d4a6acf0f34e0821203ccc4a57b3e44c2ab sssd-tools-1.16.2-13.el7_6.8.x86_64.rpm
304a8b8ab099d234b036f19044ba2839736fb059b49c514149f6a3f21e8dcf9b sssd-winbind-idmap-1.16.2-13.el7_6.8.x86_64.rpm
Source:
0ad9409ea26aa5dae8c60a99eed33ef37c6b3f7c57ea90d857fbe361b74e82b1 sssd-1.16.2-13.el7_6.8.src.rpm
--
Johnny Hughes
CentOS Project { http://www.centos.org/ }
irc: hughesjr, #centos@irc.freenode.net
Twitter: @JohnnyCentOS
_______________________________________________
CentOS-announce mailing list
CentOS-announce@centos.org
https://lists.centos.org/mailman/listinfo/centos-announce
[CentOS-announce] CEBA-2019:0817 CentOS 7 mutter BugFix Update
Upstream details at : https://access.redhat.com/errata/RHBA-2019:0817
The following updated files have been uploaded and are currently
syncing to the mirrors: ( sha256sum Filename )
x86_64:
2e623a911e1729643bdc6d0e50b0f2ea3585c3fbccbd779073402b3a229e86ef mutter-3.28.3-7.el7_6.i686.rpm
ae4ba3dee7f101b4a75dae11a93934361eaccfdfe95c885543b8945567acb0a4 mutter-3.28.3-7.el7_6.x86_64.rpm
934744deca7e3f3cebc3b419d14784234dc4921e37e67bf459c47148bfb93d17 mutter-devel-3.28.3-7.el7_6.i686.rpm
94f606868a487cdbf552ef2767b0128e241b6f99773f0e72485287b2141a8a54 mutter-devel-3.28.3-7.el7_6.x86_64.rpm
Source:
f9c3f55da4cd6970a8990e7bfd896f5ab38402b1bb4a4248dcc415186fb95acf mutter-3.28.3-7.el7_6.src.rpm
--
Johnny Hughes
CentOS Project { http://www.centos.org/ }
irc: hughesjr, #centos@irc.freenode.net
Twitter: @JohnnyCentOS
_______________________________________________
CentOS-announce mailing list
CentOS-announce@centos.org
https://lists.centos.org/mailman/listinfo/centos-announce
[CentOS-announce] CEBA-2019:0820 CentOS 7 systemd BugFix Update
Upstream details at : https://access.redhat.com/errata/RHBA-2019:0820
The following updated files have been uploaded and are currently
syncing to the mirrors: ( sha256sum Filename )
x86_64:
9ad40f40f47eaa29547a95123729dd30e99fd91925499fcc5b254f19364e52a3 libgudev1-219-62.el7_6.6.i686.rpm
573a1b8b430ff92c6840b27b2b8b4a5782c07cdc178121d168fa612086a8c18a libgudev1-219-62.el7_6.6.x86_64.rpm
888d6d6568f170c07ac5666169e91e8b37aac03706e50514d45704c23d608460 libgudev1-devel-219-62.el7_6.6.i686.rpm
4c25e40b8d6c37b6f3b74631e632e136dd7da50c565988250b1f225a61dd4c84 libgudev1-devel-219-62.el7_6.6.x86_64.rpm
96ed589bc60237643ff4651983e10364db9c80062e343cd6965fa7de6b283781 systemd-219-62.el7_6.6.x86_64.rpm
cdf123b05e8826f7cbd0900d04c9a34472967ecf84b128f44c0aa975a6d49377 systemd-devel-219-62.el7_6.6.i686.rpm
e56ce16287bae3671950422d3499c19f7cd468cd0fe566e0caf7b69631a41091 systemd-devel-219-62.el7_6.6.x86_64.rpm
daacbec13567c188d1dd200ef1edf3e785715f7b456cec7d6601f172e6ad6e35 systemd-journal-gateway-219-62.el7_6.6.x86_64.rpm
50006e58f91c1d9004dc82bf4396aad8d57df6208dd3232a22604694c16b9216 systemd-libs-219-62.el7_6.6.i686.rpm
9858bf9be66829b71ff186615f8243f7e16086773d47fed0a9e825c42e462003 systemd-libs-219-62.el7_6.6.x86_64.rpm
4a1e92957476e4f9d49ec13ecf336520561e4dd6438244abdbd9e4e45dbdcddc systemd-networkd-219-62.el7_6.6.x86_64.rpm
1b2978103782d80cc92518a70dde0cd7d21608f49f3f8ee96f756e3d6eba8121 systemd-python-219-62.el7_6.6.x86_64.rpm
40cc176669caceb7432e76611abfd9783b7706f0c51e41430d5761ab7a6b5052 systemd-resolved-219-62.el7_6.6.i686.rpm
0bdbe6ee8dfc2e7d56fde2fef5c1eae2e7759b331fb1e60ce72055e7797badfe systemd-resolved-219-62.el7_6.6.x86_64.rpm
d7d7df6d2a55ddc31f2eb08cdbe45a2ba70d18a2f8c5a9ca66aded1d01bbae6c systemd-sysv-219-62.el7_6.6.x86_64.rpm
Source:
a53404113d6ef051e7d89b949a7d56e8cd1d136e57bfed0d1a7f4332d4629dc4 systemd-219-62.el7_6.6.src.rpm
--
Johnny Hughes
CentOS Project { http://www.centos.org/ }
irc: hughesjr, #centos@irc.freenode.net
Twitter: @JohnnyCentOS
_______________________________________________
CentOS-announce mailing list
CentOS-announce@centos.org
https://lists.centos.org/mailman/listinfo/centos-announce
[CentOS-announce] CESA-2019:0809 Important CentOS 7 ovmf Security Update
Upstream details at : https://access.redhat.com/errata/RHSA-2019:0809
The following updated files have been uploaded and are currently
syncing to the mirrors: ( sha256sum Filename )
x86_64:
545824b78aea87bcf90ff9b6d2cc79a912ff268a85ddba21ebce7cfa6b6ba17a OVMF-20180508-3.gitee3198e672e2.el7_6.1.noarch.rpm
Source:
6f41f7dab14205e720d7196e10cf1d2e0000e99c605f5a428c51213f72c34d33 ovmf-20180508-3.gitee3198e672e2.el7_6.1.src.rpm
--
Johnny Hughes
CentOS Project { http://www.centos.org/ }
irc: hughesjr, #centos@irc.freenode.net
Twitter: @JohnnyCentOS
_______________________________________________
CentOS-announce mailing list
CentOS-announce@centos.org
https://lists.centos.org/mailman/listinfo/centos-announce
[CentOS-announce] CEBA-2019:0811 CentOS 7 selinux-policy BugFix Update
Upstream details at : https://access.redhat.com/errata/RHBA-2019:0811
The following updated files have been uploaded and are currently
syncing to the mirrors: ( sha256sum Filename )
x86_64:
4fc115f34bb5961dc2ff905dfde26ed42f60e9817f6624a80b9630afb1b7ce78 selinux-policy-3.13.1-229.el7_6.12.noarch.rpm
e86d71f2e7637fffc123e74491b545e76f53a6907b060638610db9f70e3db5ee selinux-policy-devel-3.13.1-229.el7_6.12.noarch.rpm
0d542af0a877655c72532dd51a07c61c7c7ad4f57b6e9dfc59759ac53d78719e selinux-policy-doc-3.13.1-229.el7_6.12.noarch.rpm
2ad11c1764a5d7f89e179d9b9b381f551392b47a123a9fc37e94c91cdbcbdaf4 selinux-policy-minimum-3.13.1-229.el7_6.12.noarch.rpm
7b070a1e862095afca890e0fb19c46a33800adb05228de63515fa66aa31a5fd8 selinux-policy-mls-3.13.1-229.el7_6.12.noarch.rpm
667702e8f7e1fa570f0dacdbd64bbd19b39592e9e5a71a95138e79501648dad3 selinux-policy-sandbox-3.13.1-229.el7_6.12.noarch.rpm
86999ea70fb92a8a049be69bbb96b7d0a40629118679a52cacb6a651af765643 selinux-policy-targeted-3.13.1-229.el7_6.12.noarch.rpm
Source:
f7682818db4172d4b1cd2596cf35c0203677d7d5742006eeb8b7fae39943b6ad selinux-policy-3.13.1-229.el7_6.12.src.rpm
--
Johnny Hughes
CentOS Project { http://www.centos.org/ }
irc: hughesjr, #centos@irc.freenode.net
Twitter: @JohnnyCentOS
_______________________________________________
CentOS-announce mailing list
CentOS-announce@centos.org
https://lists.centos.org/mailman/listinfo/centos-announce
[CentOS-announce] CESA-2019:0818 Important CentOS 7 kernel Security Update
Upstream details at : https://access.redhat.com/errata/RHSA-2019:0818
The following updated files have been uploaded and are currently
syncing to the mirrors: ( sha256sum Filename )
x86_64:
22232a43a89006952c1ef37039017e82c39117f805eeedd345f7edacac65abc0 bpftool-3.10.0-957.12.1.el7.x86_64.rpm
99dab9875a92cf1a556d664dfaa5a69143d9f96f2c3c6fe7a10fc35964cee088 kernel-3.10.0-957.12.1.el7.x86_64.rpm
528f3c2583c838e348cfaa028989d9d9aa048b50af722849d5845fa4076b0f02 kernel-abi-whitelists-3.10.0-957.12.1.el7.noarch.rpm
b7c9c340201085a7a301aef37305e4deea85e4eb60dbd2586af6e78547a84b4a kernel-debug-3.10.0-957.12.1.el7.x86_64.rpm
a164fbf1e13f4e4c8378d72a575b1ee2617d1c78e1a37f464ff5f1871552d302 kernel-debug-devel-3.10.0-957.12.1.el7.x86_64.rpm
da14623036ae7069d8d8df04f2832d2bb8b2da291d13b4cccd4f3b31276f6782 kernel-devel-3.10.0-957.12.1.el7.x86_64.rpm
d7d549ce61627264b2263eb9975f4a933c20340d96eba917e45f55bf6e1ec752 kernel-doc-3.10.0-957.12.1.el7.noarch.rpm
1eecf424270d55de5de3c417b540f992f3be5489bb0f029aae65137565d0a838 kernel-headers-3.10.0-957.12.1.el7.x86_64.rpm
5d2020bd11dfb87283b2b1a56bc65012a4ed653f4dda4730511f5e4f9d57fbbc kernel-tools-3.10.0-957.12.1.el7.x86_64.rpm
793ae8c03006f2ff49d159e6a6f28b2a144a111161a98e581c0623962a398450 kernel-tools-libs-3.10.0-957.12.1.el7.x86_64.rpm
36fa2420a7a5875022c88e7f768780c5faf7ac8e69d6b1959f7a491e249a701e kernel-tools-libs-devel-3.10.0-957.12.1.el7.x86_64.rpm
8e43ff52c9e1d6b472a0fa768505540d9668bf73b1ba5bf7605f65391669b619 perf-3.10.0-957.12.1.el7.x86_64.rpm
5dea4497afdba7fde6444966b30efb998ec55cdb3b16e0f8e894e7ac065d2e77 python-perf-3.10.0-957.12.1.el7.x86_64.rpm
Source:
79f62ec35df6222e9e7be4f9d002ac8822b43cacefa6e4fed96747183961fb1d kernel-3.10.0-957.12.1.el7.src.rpm
--
Johnny Hughes
CentOS Project { http://www.centos.org/ }
irc: hughesjr, #centos@irc.freenode.net
Twitter: @JohnnyCentOS
_______________________________________________
CentOS-announce mailing list
CentOS-announce@centos.org
https://lists.centos.org/mailman/listinfo/centos-announce
Monday, April 29, 2019
Orphaned packages need new maintainers (lot of nodejs deps will be retired next week)
are orphaned for six weeks, unless someone adopts them. If you know for sure
that the package should be retired, please do so now with a proper reason:
https://fedoraproject.org/wiki/How_to_remove_a_package_at_end_of_life
Note: If you received this mail directly you (co)maintain one of the affected
packages or a package that depends on one. Please adopt the affected package or
retire your depending package to avoid broken dependencies, otherwise your
package will be retired when the affected package gets retired.
Grep the list for your FAS name, follow the transitive deps:
https://churchyard.fedorapeople.org/orphans-2019-04-29.txt
Request package ownership via releng ticket: https://pagure.io/releng/issues
Packages retired today:
rubygem-fog rubygem-fog-atmos rubygem-fog-brightbox rubygem-fog-ecloud
rubygem-fog-profitbricks rubygem-fog-radosgw rubygem-fog-riakcs
rubygem-fog-sakuracloud rubygem-fog-serverlove rubygem-fog-softlayer
rubygem-fog-storm_on_demand rubygem-fog-terremark rubygem-fog-vmfusion
rubygem-fog-voxel rubygem-multipart
Package (co)maintainers Status Change
================================================================================
PyMca orphan 4 weeks ago
Ray orphan 4 weeks ago
aeskulap orphan 2 weeks ago
ahkab orphan 3 weeks ago
cwiid orphan 4 weeks ago
dvdbackup cicku, orphan 2 weeks ago
emacs-pymacs orphan 2 weeks ago
gnome-dvb-daemon orphan 2 weeks ago
gnome-shell-extension- orphan 2 weeks ago
openweather
gnome-shell-extension-panel-osd orphan 2 weeks ago
gnue-common orphan 4 weeks ago
jam-control orphan 4 weeks ago
lightdm-gtk cwickert, dbenoit, orphan, 3 weeks ago
rdieter
ltspfs enslaver, orphan 1 weeks ago
ninja-ide echevemaster, orphan 1 weeks ago
nodejs-after nodejs-sig, orphan 6 weeks ago
nodejs-alter nodejs-sig, orphan 6 weeks ago
nodejs-ansi-font nodejs-sig, orphan 6 weeks ago
nodejs-ansidiff nodejs-sig, orphan 6 weeks ago
nodejs-archiver nodejs-sig, orphan 6 weeks ago
nodejs-archiver-utils nodejs-sig, orphan 6 weeks ago
nodejs-ast-traverse nodejs-sig, orphan 6 weeks ago
nodejs-ast-types nodejs-sig, orphan 6 weeks ago
nodejs-astral nodejs-sig, orphan 6 weeks ago
nodejs-astral-angular-annotate nodejs-sig, orphan 6 weeks ago
nodejs-astral-pass nodejs-sig, orphan 6 weeks ago
nodejs-async-cache nodejs-sig, orphan 6 weeks ago
nodejs-async-each nodejs-sig, orphan 6 weeks ago
nodejs-aws-sign2 nodejs-sig, orphan 6 weeks ago
nodejs-base64-js nodejs-sig, orphan 6 weeks ago
nodejs-basic-auth-parser nodejs-sig, orphan 6 weeks ago
nodejs-bl nodejs-sig, orphan 6 weeks ago
nodejs-breakable nodejs-sig, orphan 6 weeks ago
nodejs-camel-case nodejs-sig, orphan 6 weeks ago
nodejs-caniuse-db nodejs-sig, orphan 6 weeks ago
nodejs-change-case nodejs-sig, orphan 6 weeks ago
nodejs-clone nodejs-sig, orphan 6 weeks ago
nodejs-cls nodejs-sig, orphan 6 weeks ago
nodejs-co nodejs-sig, orphan 6 weeks ago
nodejs-commoner nodejs-sig, orphan 6 weeks ago
nodejs-compress-commons nodejs-sig, orphan 6 weeks ago
nodejs-console-browserify nodejs-sig, orphan 6 weeks ago
nodejs-constant-case nodejs-sig, orphan 6 weeks ago
nodejs-crc32-stream nodejs-sig, orphan 6 weeks ago
nodejs-dashdash nodejs-sig, orphan 6 weeks ago
nodejs-date-now nodejs-sig, orphan 6 weeks ago
nodejs-deferred nodejs-sig, orphan 6 weeks ago
nodejs-defs nodejs-sig, orphan 6 weeks ago
nodejs-degenerator nodejs-sig, orphan 6 weeks ago
nodejs-dom-serializer nodejs-sig, orphan 6 weeks ago
nodejs-domelementtype nodejs-sig, orphan 6 weeks ago
nodejs-domhandler nodejs-sig, orphan 6 weeks ago
nodejs-domutils nodejs-sig, orphan 6 weeks ago
nodejs-dot-case nodejs-sig, orphan 6 weeks ago
nodejs-dreamopt nodejs-sig, orphan 6 weeks ago
nodejs-each-async nodejs-sig, orphan 6 weeks ago
nodejs-entities nodejs-sig, orphan 6 weeks ago
nodejs-etag nodejs-sig, orphan 6 weeks ago
nodejs-extend nodejs-sig, orphan 6 weeks ago
nodejs-extsprintf nodejs-sig, orphan 6 weeks ago
nodejs-far nodejs-sig, orphan 6 weeks ago
nodejs-fd nodejs-sig, orphan 6 weeks ago
nodejs-fg-lodash nodejs-sig, orphan 6 weeks ago
nodejs-file-uri-to-path nodejs-sig, orphan 6 weeks ago
nodejs-fn-name nodejs-sig, orphan 6 weeks ago
nodejs-formatio nodejs-sig, orphan 6 weeks ago
nodejs-fs2 nodejs-sig, orphan 6 weeks ago
nodejs-ftp nodejs-sig, orphan 6 weeks ago
nodejs-generate-function nodejs-sig, orphan 6 weeks ago
nodejs-generate-object-property nodejs-sig, orphan 6 weeks ago
nodejs-get-stdin nodejs-sig, orphan 6 weeks ago
nodejs-get-uri nodejs-sig, orphan 6 weeks ago
nodejs-grunt-angular-templates nodejs-sig, orphan 6 weeks ago
nodejs-grunt-contrib-connect nodejs-sig, orphan 6 weeks ago
nodejs-grunt-contrib-cssmin nodejs-sig, orphan 6 weeks ago
nodejs-grunt-contrib-htmlmin nodejs-sig, orphan 6 weeks ago
nodejs-grunt-contrib-less nodejs-sig, orphan 6 weeks ago
nodejs-grunt-contrib-requirejs nodejs-sig, orphan 6 weeks ago
nodejs-grunt-saucelabs nodejs-sig, orphan 6 weeks ago
nodejs-grunt-util-args nodejs-sig, orphan 6 weeks ago
nodejs-grunt-util-options nodejs-sig, orphan 6 weeks ago
nodejs-grunt-util-process nodejs-sig, orphan 6 weeks ago
nodejs-grunt-util-property nodejs-sig, orphan 6 weeks ago
nodejs-har-validator nodejs-sig, orphan 6 weeks ago
nodejs-hash_file nodejs-sig, orphan 6 weeks ago
nodejs-hock nodejs-sig, orphan 6 weeks ago
nodejs-html-minifier nodejs-sig, orphan 6 weeks ago
nodejs-https-proxy-agent nodejs-sig, orphan 6 weeks ago
nodejs-install nodejs-sig, orphan 6 weeks ago
nodejs-is-lower-case nodejs-sig, orphan 6 weeks ago
nodejs-is-my-json-valid nodejs-sig, orphan 6 weeks ago
nodejs-is-property nodejs-sig, orphan 6 weeks ago
nodejs-is-typedarray nodejs-sig, orphan 6 weeks ago
nodejs-is-upper-case nodejs-sig, orphan 6 weeks ago
nodejs-isstream nodejs-sig, orphan 6 weeks ago
nodejs-istanbul nodejs-sig, orphan 6 weeks ago
nodejs-jison nodejs-sig, orphan 6 weeks ago
nodejs-jsonpointer nodejs-sig, orphan 6 weeks ago
nodejs-log-symbols nodejs-sig, orphan 6 weeks ago
nodejs-lolex nodejs-sig, orphan 6 weeks ago
nodejs-lower-case nodejs-sig, orphan 6 weeks ago
nodejs-lower-case-first nodejs-sig, orphan 6 weeks ago
nodejs-mkfiletree nodejs-sig, orphan 6 weeks ago
nodejs-multiline nodejs-sig, orphan 6 weeks ago
nodejs-next nodejs-sig, orphan 6 weeks ago
nodejs-onetime nodejs-sig, orphan 6 weeks ago
nodejs-oop nodejs-sig, orphan 6 weeks ago
nodejs-opn nodejs-sig, orphan 6 weeks ago
nodejs-pac-proxy-agent nodejs-sig, orphan 6 weeks ago
nodejs-pac-resolver nodejs-sig, orphan 6 weeks ago
nodejs-param-case nodejs-sig, orphan 6 weeks ago
nodejs-parserlib nodejs-sig, orphan 6 weeks ago
nodejs-pascal-case nodejs-sig, orphan 6 weeks ago
nodejs-path-case nodejs-sig, orphan 6 weeks ago
nodejs-pend nodejs-sig, orphan 6 weeks ago
nodejs-pify nodejs-sig, orphan 6 weeks ago
nodejs-portscanner nodejs-sig, orphan 6 weeks ago
nodejs-private nodejs-sig, orphan 6 weeks ago
nodejs-proxy nodejs-sig, orphan 6 weeks ago
nodejs-recast nodejs-sig, orphan 6 weeks ago
nodejs-regenerator nodejs-sig, orphan 6 weeks ago
nodejs-relateurl nodejs-sig, orphan 6 weeks ago
nodejs-requestretry nodejs-sig, orphan 6 weeks ago
nodejs-require-directory nodejs-sig, orphan 6 weeks ago
nodejs-run-parallel-limit nodejs-sig, orphan 6 weeks ago
nodejs-safe-buffer nodejs-sig, orphan, pnemade 6 weeks ago
nodejs-samsam nodejs-sig, orphan 6 weeks ago
nodejs-sauce-tunnel nodejs-sig, orphan 6 weeks ago
nodejs-saucelabs nodejs-sig, orphan 6 weeks ago
nodejs-sentence-case nodejs-sig, orphan 6 weeks ago
nodejs-sinon nodejs-sig, orphan 6 weeks ago
nodejs-smart-buffer nodejs-sig, orphan 6 weeks ago
nodejs-snake-case nodejs-sig, orphan 6 weeks ago
nodejs-socks-client nodejs-sig, orphan 6 weeks ago
nodejs-socks-proxy-agent nodejs-sig, orphan 6 weeks ago
nodejs-st nodejs-sig, orphan 6 weeks ago
nodejs-std-mocks nodejs-sig, orphan 6 weeks ago
nodejs-stream-equal nodejs-sig, orphan 6 weeks ago
nodejs-stream-to-array nodejs-sig, orphan 6 weeks ago
nodejs-streamsink nodejs-sig, orphan 6 weeks ago
nodejs-stringstream nodejs-sig, orphan 6 weeks ago
nodejs-strip-indent nodejs-sig, orphan 6 weeks ago
nodejs-swap-case nodejs-sig, orphan 6 weeks ago
nodejs-tar-stream nodejs-sig, orphan 6 weeks ago
nodejs-title-case nodejs-sig, orphan 6 weeks ago
nodejs-tough-cookie nodejs-sig, orphan 6 weeks ago
nodejs-upper-case nodejs-sig, orphan 6 weeks ago
nodejs-upper-case-first nodejs-sig, orphan 6 weeks ago
nodejs-util nodejs-sig, orphan 6 weeks ago
nodejs-vary nodejs-sig, orphan 6 weeks ago
nodejs-verror nodejs-sig, orphan 6 weeks ago
nodejs-xregexp nodejs-sig, orphan 6 weeks ago
nodejs-zip-stream nodejs-sig, orphan 6 weeks ago
plague dcbw, orphan 0 weeks ago
prover9 orphan 4 weeks ago
python-deltasigma orphan 3 weeks ago
python-django-notifications-hq orphan 5 weeks ago
python-jabberbot orphan 4 weeks ago
python-port-for orphan 5 weeks ago
pywebkitgtk ivazquez, orphan, walters 1 weeks ago
rubygem-chunky_png mmorsi, orphan 2 weeks ago
rubygem-codemirror-rails orphan 1 weeks ago
rubygem-compass-960-plugin orphan 2 weeks ago
rubygem-fog orphan 7 weeks ago
rubygem-fog-atmos orphan 7 weeks ago
rubygem-fog-brightbox orphan 7 weeks ago
rubygem-fog-ecloud orphan 7 weeks ago
rubygem-fog-profitbricks orphan 7 weeks ago
rubygem-fog-radosgw orphan 7 weeks ago
rubygem-fog-riakcs orphan 7 weeks ago
rubygem-fog-sakuracloud orphan 7 weeks ago
rubygem-fog-serverlove orphan 7 weeks ago
rubygem-fog-softlayer orphan 7 weeks ago
rubygem-fog-storm_on_demand orphan 7 weeks ago
rubygem-fog-terremark orphan 7 weeks ago
rubygem-fog-vmfusion orphan 7 weeks ago
rubygem-fog-voxel orphan 7 weeks ago
rubygem-jnunemaker-matchy orphan, tdawson 5 weeks ago
rubygem-kaminari orphan 6 weeks ago
rubygem-map orphan 5 weeks ago
rubygem-multipart orphan 7 weeks ago
rubygem-sprite-factory orphan 3 weeks ago
rubygem-webrat mmorsi, orphan 2 weeks ago
thermald dbenoit, orphan 3 weeks ago
The following packages require above mentioned packages:
https://churchyard.fedorapeople.org/orphans-2019-04-29.txt
(grep for your FAS username and follow the dependency chain)
Affected (co)maintainers
adamwill: nodejs-clone
aeperezt: pywebkitgtk
alt-gtk-de-sig: lightdm-gtk
besser82: lightdm-gtk
cicku: dvdbackup
cwickert: lightdm-gtk
dbenoit: lightdm-gtk, thermald
dcallagh: nodejs-clone
dcbw: plague
echevemaster: ninja-ide
enslaver: ltspfs
eseyman: nodejs-clone
fab: python-jabberbot
humaton: nodejs-clone
itamarjp: nodejs-clone
ivazquez: pywebkitgtk
jamielinux: nodejs-formatio, nodejs-vary, nodejs-istanbul, nodejs-util,
nodejs-requestretry, nodejs-dreamopt, nodejs-is-my-json-valid,
nodejs-generate-object-property, nodejs-co, nodejs-samsam, nodejs-tough-cookie,
nodejs-etag, nodejs-require-directory, nodejs-aws-sign2, nodejs-entities,
nodejs-generate-function, nodejs-bl, nodejs-extend, nodejs-stream-to-array,
nodejs-sinon, nodejs-lolex, nodejs-isstream, nodejs-clone, nodejs-after,
nodejs-is-property, nodejs-stringstream, nodejs-har-validator,
nodejs-safe-buffer, nodejs-fg-lodash, nodejs-is-typedarray, nodejs-hash_file,
nodejs-jsonpointer
jdeluyck: nodejs-archiver-utils, nodejs-zip-stream, nodejs-tar-stream,
nodejs-crc32-stream, nodejs-compress-commons, nodejs-archiver
jsmith: nodejs-formatio, nodejs-vary, nodejs-get-stdin, nodejs-recast,
nodejs-cls, nodejs-istanbul, nodejs-regenerator, nodejs-util, nodejs-verror,
nodejs-dreamopt, nodejs-is-my-json-valid, nodejs-async-each, nodejs-co,
nodejs-extsprintf, nodejs-generate-object-property, nodejs-alter, nodejs-samsam,
nodejs-commoner, nodejs-pify, nodejs-tough-cookie, nodejs-defs,
nodejs-breakable, nodejs-next, nodejs-require-directory, nodejs-deferred,
nodejs-aws-sign2, nodejs-far, nodejs-entities, nodejs-log-symbols, nodejs-oop,
nodejs-private, nodejs-bl, nodejs-extend, nodejs-generate-function,
nodejs-parserlib, nodejs-stream-to-array, nodejs-domhandler, nodejs-sinon,
nodejs-lolex, nodejs-isstream, nodejs-ast-types, nodejs-onetime, nodejs-clone,
nodejs-after, nodejs-dom-serializer, nodejs-ast-traverse, nodejs-is-property,
nodejs-stringstream, nodejs-har-validator, nodejs-safe-buffer,
nodejs-is-typedarray, nodejs-domelementtype, nodejs-strip-indent,
nodejs-hash_file, nodejs-fs2, nodejs-domutils, nodejs-each-async, nodejs-jsonpointer
jstanek: nodejs-formatio, nodejs-sinon, nodejs-lolex, nodejs-util, nodejs-samsam
kumarpraveen: nodejs-clone
kwizart: nodejs-clone
martinkg: nodejs-after
mmorsi: rubygem-webrat, rubygem-chunky_png
mrunge: nodejs-clone
mso: nodejs-clone
nodejs-sig: ...
piotrp: nodejs-tough-cookie, nodejs-require-directory, nodejs-is-property,
nodejs-isstream, nodejs-aws-sign2, nodejs-har-validator, nodejs-stringstream,
nodejs-bl, nodejs-is-typedarray, nodejs-dreamopt, nodejs-is-my-json-valid,
nodejs-generate-object-property, nodejs-hash_file, nodejs-generate-function,
nodejs-jsonpointer, nodejs-extend
pjp: nodejs-clone
pnemade: nodejs-istanbul, nodejs-dreamopt, nodejs-is-my-json-valid,
nodejs-generate-object-property, nodejs-tough-cookie, nodejs-require-directory,
nodejs-aws-sign2, nodejs-stream-to-array, nodejs-bl, nodejs-extend,
nodejs-generate-function, nodejs-isstream, nodejs-is-property,
nodejs-stringstream, nodejs-har-validator, nodejs-safe-buffer,
nodejs-is-typedarray, nodejs-hash_file, nodejs-jsonpointer
potty: pywebkitgtk
rathann: nodejs-clone
rdieter: lightdm-gtk
roshansingh: pywebkitgtk
rtnpro: pywebkitgtk
sgallagh: nodejs-clone
suanand: python-port-for
sundaram: nodejs-clone
tc01: nodejs-formatio, nodejs-istanbul, nodejs-util, nodejs-dreamopt,
nodejs-is-my-json-valid, nodejs-generate-object-property, nodejs-samsam,
nodejs-tough-cookie, nodejs-require-directory, nodejs-aws-sign2, nodejs-bl,
nodejs-extend, nodejs-generate-function, nodejs-stream-to-array, nodejs-sinon,
nodejs-lolex, nodejs-isstream, nodejs-is-property, nodejs-stringstream,
nodejs-har-validator, nodejs-safe-buffer, nodejs-is-typedarray,
nodejs-hash_file, nodejs-jsonpointer
tchaikov: nodejs-clone
tdawson: nodejs-tough-cookie, nodejs-require-directory,
rubygem-jnunemaker-matchy, nodejs-is-property, nodejs-isstream,
nodejs-aws-sign2, nodejs-har-validator, nodejs-safe-buffer, nodejs-stringstream,
rubygem-chunky_png, nodejs-bl, nodejs-is-typedarray, nodejs-is-my-json-valid,
nodejs-generate-object-property, nodejs-hash_file, nodejs-generate-function,
nodejs-jsonpointer, nodejs-extend
tomh: nodejs-formatio, nodejs-util, nodejs-requestretry,
nodejs-is-my-json-valid, nodejs-generate-object-property, nodejs-co,
nodejs-samsam, nodejs-tough-cookie, nodejs-etag, nodejs-require-directory,
nodejs-aws-sign2, nodejs-generate-function, nodejs-bl, nodejs-extend,
nodejs-stream-to-array, nodejs-sinon, nodejs-lolex, nodejs-isstream,
nodejs-clone, nodejs-is-property, nodejs-stringstream, nodejs-har-validator,
nodejs-fg-lodash, nodejs-is-typedarray, nodejs-hash_file, nodejs-jsonpointer
vjancik: nodejs-clone, nodejs-safe-buffer, nodejs-stream-to-array
walters: pywebkitgtk
xavierb: nodejs-grunt-contrib-cssmin
zvetlik: nodejs-istanbul, nodejs-safe-buffer, nodejs-dreamopt, nodejs-clone,
nodejs-stream-to-array
--
The script creating this output is run and developed by Fedora
Release Engineering. Please report issues at its pagure instance:
https://pagure.io/releng/
The sources of this script can be found at:
https://pagure.io/releng/blob/master/f/scripts/find_unblocked_orphans.py
--
Miro Hrončok
--
Phone: +420777974800
IRC: mhroncok
_______________________________________________
devel-announce mailing list -- devel-announce@lists.fedoraproject.org
To unsubscribe send an email to devel-announce-leave@lists.fedoraproject.org
Fedora Code of Conduct: https://getfedora.org/code-of-conduct.html
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: https://lists.fedoraproject.org/archives/list/devel-announce@lists.fedoraproject.org
[USN-3959-1] Evince vulnerability
Ubuntu Security Notice USN-3959-1
April 29, 2019
evince vulnerability
==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 19.04
- Ubuntu 18.10
- Ubuntu 18.04 LTS
- Ubuntu 16.04 LTS
Summary:
Evince could be made to expose sensitive information if it received
a specially crafted file.
Software Description:
- evince: Document viewer
Details:
It was discovered that Evince incorrectly handled certain images.
An attacker could possibly use this issue to expose sensitive
information.
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 19.04:
evince 3.32.0-1ubuntu0.1
evince-common 3.32.0-1ubuntu0.1
Ubuntu 18.10:
evince 3.30.1-1ubuntu1.3
evince-common 3.30.1-1ubuntu1.3
Ubuntu 18.04 LTS:
evince 3.28.4-0ubuntu1.1
evince-common 3.28.4-0ubuntu1.1
Ubuntu 16.04 LTS:
evince 3.18.2-1ubuntu4.4
evince-common 3.18.2-1ubuntu4.4
In general, a standard system update will make all the necessary
changes.
References:
https://usn.ubuntu.com/usn/usn-3959-1
CVE-2019-11459
Package Information:
https://launchpad.net/ubuntu/+source/evince/3.32.0-1ubuntu0.1
https://launchpad.net/ubuntu/+source/evince/3.30.1-1ubuntu1.3
https://launchpad.net/ubuntu/+source/evince/3.28.4-0ubuntu1.1
https://launchpad.net/ubuntu/+source/evince/3.18.2-1ubuntu4.4
[announce] Next NYC*BUG: May 1st
2019-05-01 @ 18:45 - Suspenders, 108 Greenwich Street; typically on the
second floor, otherwise on the first
Abstract
Lookup Data Structures in the FreeBSD Kernel will be a tour of Red/Black
Trees and Radix trees as they appear in the source code. An overview of
what problem the structure solves as well as an in depth look at the
call strucuture of each will be covered. The structures will also be
compared to assess their strengths/weaknesses for example red black
trees are organized to rebalence on write and be stateless on read,
whereas radix trees have a more predicable insertion method.
More Info:
https://www.nycbug.org/index?action=view&id=10667
[USN-3958-1] GStreamer Base Plugins vulnerability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=Nq71
-----END PGP SIGNATURE-----
==========================================================================
Ubuntu Security Notice USN-3958-1
April 29, 2019
gst-plugins-base0.10, gst-plugins-base1.0 vulnerability
==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 18.10
- Ubuntu 18.04 LTS
- Ubuntu 16.04 LTS
Summary:
GStreamer Base Plugins could be made to crash or run programs if it
received specially crafted network traffic.
Software Description:
- gst-plugins-base1.0: GStreamer plugins
- gst-plugins-base0.10: GStreamer plugins
Details:
It was discovered that GStreamer Base Plugins did not correctly handle
certain malformed RTSP streams. If a user were tricked into opening a
crafted RTSP stream with a GStreamer application, an attacker could cause a
denial of service via application crash, or possibly execute arbitrary
code.
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 18.10:
gstreamer1.0-plugins-base 1.14.4-1ubuntu1.1
Ubuntu 18.04 LTS:
gstreamer1.0-plugins-base 1.14.1-1ubuntu1~ubuntu18.04.2
Ubuntu 16.04 LTS:
gstreamer0.10-plugins-base 0.10.36-2ubuntu0.2
gstreamer1.0-plugins-base 1.8.3-1ubuntu0.3
In general, a standard system update will make all the necessary changes.
References:
https://usn.ubuntu.com/usn/usn-3958-1
CVE-2019-9928
Package Information:
https://launchpad.net/ubuntu/+source/gst-plugins-base1.0/1.14.4-1ubuntu1.1
https://launchpad.net/ubuntu/+source/gst-plugins-base1.0/1.14.1-1ubuntu1~ubuntu18.04.2
https://launchpad.net/ubuntu/+source/gst-plugins-base0.10/0.10.36-2ubuntu0.2
https://launchpad.net/ubuntu/+source/gst-plugins-base1.0/1.8.3-1ubuntu0.3
[USN-3957-1] MySQL vulnerabilities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=HZ7J
-----END PGP SIGNATURE-----
==========================================================================
Ubuntu Security Notice USN-3957-1
April 29, 2019
mysql-5.7 vulnerabilities
==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 19.04
- Ubuntu 18.10
- Ubuntu 18.04 LTS
- Ubuntu 16.04 LTS
Summary:
Several security issues were fixed in MySQL.
Software Description:
- mysql-5.7: MySQL database
Details:
Multiple security issues were discovered in MySQL and this update includes
a new upstream MySQL version to fix these issues.
Ubuntu 16.04 LTS, Ubuntu 18.04 LTS, Ubuntu 18.10, and Ubuntu 19.04 have
been updated to MySQL 5.7.26.
In addition to security fixes, the updated packages contain bug fixes, new
features, and possibly incompatible changes.
Please see the following for more information:
https://dev.mysql.com/doc/relnotes/mysql/5.7/en/news-5-7-26.html
https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 19.04:
mysql-server-5.7 5.7.26-0ubuntu0.19.04.1
Ubuntu 18.10:
mysql-server-5.7 5.7.26-0ubuntu0.18.10.1
Ubuntu 18.04 LTS:
mysql-server-5.7 5.7.26-0ubuntu0.18.04.1
Ubuntu 16.04 LTS:
mysql-server-5.7 5.7.26-0ubuntu0.16.04.1
This update uses a new upstream release, which includes additional bug
fixes. In general, a standard system update will make all the necessary
changes.
References:
https://usn.ubuntu.com/usn/usn-3957-1
CVE-2019-2566, CVE-2019-2581, CVE-2019-2592, CVE-2019-2614,
CVE-2019-2627, CVE-2019-2628, CVE-2019-2632, CVE-2019-2683
Package Information:
https://launchpad.net/ubuntu/+source/mysql-5.7/5.7.26-0ubuntu0.19.04.1
https://launchpad.net/ubuntu/+source/mysql-5.7/5.7.26-0ubuntu0.18.10.1
https://launchpad.net/ubuntu/+source/mysql-5.7/5.7.26-0ubuntu0.18.04.1
https://launchpad.net/ubuntu/+source/mysql-5.7/5.7.26-0ubuntu0.16.04.1
AskFedora has moved to Discourse!
We wanted to get the word out on the mailing lists that AskFedora has
now moved to Discourse at https://askbeta.fedoraproject.org. In the next
few days, https://ask.fedoraproject.org will also begin to point here.
Our older askbot instance is now in read-only mode, and will be moved to
https://askbot.fedoraproject.org.
We have tried to time this change with the F30 release so that users
installing or upgrading to our newest offering also get to use the shiny
new forum.
You can read more about the move on this CommBlog post:
https://communityblog.fedoraproject.org/moving-ask-fedora-to-discourse-phase-2-request-for-beta-testing/
If you can please find some time to regularly check AskFedora to
interact with users there, that would be very helpful. We're supporting
multiple languages to make the site more accessible to our global
community and userbase. We're also focussing on community discussion and
contribution on the new forum with the hope that it'll help convert
users into contributors.
A Fedora Magazine post on this change is in review, and will announce it
to the wider audience outside the Fedora community.
--
Thanks,
Regards,
Ankur Sinha "FranciscoD"
https://fedoraproject.org/wiki/User:Ankursinha
Time zone: Europe/London
Saturday, April 27, 2019
Updated Debian 9: 9.9 released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=0W6Z
-----END PGP SIGNATURE-----
------------------------------------------------------------------------
The Debian Project https://www.debian.org/
Updated Debian 9: 9.9 released press@debian.org
April 27th, 2019 https://www.debian.org/News/2019/20190427
------------------------------------------------------------------------
The Debian project is pleased to announce the ninth update of its stable
distribution Debian 9 (codename "stretch"). This point release mainly
adds corrections for security issues, along with a few adjustments for
serious problems. Security advisories have already been published
separately and are referenced where available.
Please note that the point release does not constitute a new version of
Debian 9 but only updates some of the packages included. There is no
need to throw away old "stretch" media. After installation, packages can
be upgraded to the current versions using an up-to-date Debian mirror.
Those who frequently install updates from security.debian.org won't have
to update many packages, and most such updates are included in the point
release.
New installation images will be available soon at the regular locations.
Upgrading an existing installation to this revision can be achieved by
pointing the package management system at one of Debian's many HTTP
mirrors. A comprehensive list of mirrors is available at:
https://www.debian.org/mirror/list
As a special case for this point release, those using the "apt-get" tool
to perform the upgrade will need to ensure that the "dist-upgrade"
command is used, in order to update to the latest kernel packages. Users
of other tools such as "apt" and "aptitude" should use the "upgrade"
command.
Miscellaneous Bugfixes
----------------------
This stable update adds a few important corrections to the following
packages:
+--------------------------+------------------------------------------+
| Package | Reason |
+--------------------------+------------------------------------------+
| audiofile [1] | Fix denial of service [CVE-2018-13440] |
| | and buffer overflow issues [CVE-2018- |
| | 17095] |
| | |
| base-files [2] | Update for the point release |
| | |
| bwa [3] | Fix buffer overflow [CVE-2019-10269] |
| | |
| ca-certificates-java [4] | Fix bashisms in postinst and jks- |
| | keystore |
| | |
| cernlib [5] | Apply optimization flag -O to Fortran |
| | modules instead of -O2 which generates |
| | broken code; fix build failure on arm64 |
| | by disabling PIE for Fortran executables |
| | |
| choose-mirror [6] | Update included mirror list |
| | |
| chrony [7] | Fix logging of measurements and |
| | statistics, and stopping of chronyd, on |
| | some platforms when seccomp filtering is |
| | enabled |
| | |
| ckermit [8] | Drop OpenSSL version check |
| | |
| clamav [9] | Fix out-of-bounds heap access when |
| | scanning PDF documents [CVE-2019-1787], |
| | PE files packed using Aspack [CVE-2019- |
| | 1789] or OLE2 files [CVE-2019-1788] |
| | |
| dansguardian [10] | Add "missingok" to logrotate |
| | configuration |
| | |
| debian-installer [11] | Rebuild against proposed-updates |
| | |
| debian-installer- | Rebuild against proposed-updates |
| netboot-images [12] | |
| | |
| debian-security- | Update support statuses |
| support [13] | |
| | |
| diffoscope [14] | Fix tests to work with Ghostscript 9.26 |
| | |
| dns-root-data [15] | Update root data to 2019031302 |
| | |
| dnsruby [16] | Add new root key (KSK-2017); ruby 2.3.0 |
| | deprecates TimeoutError, use |
| | Timeout::Error |
| | |
| dpdk [17] | New upstream stable release |
| | |
| edk2 [18] | Fix buffer overflow in BlockIo service |
| | [CVE-2018-12180]; DNS: Check received |
| | packet size before using [CVE-2018- |
| | 12178]; fix stack overflow with |
| | corrupted BMP [CVE-2018-12181] |
| | |
| firmware-nonfree [19] | atheros / iwlwifi: update BlueTooth |
| | firmware [CVE-2018-5383] |
| | |
| flatpak [20] | Reject all ioctls that the kernel will |
| | interpret as TIOCSTI [CVE-2019-10063] |
| | |
| geant321 [21] | Rebuild against cernlib with fixed |
| | Fortran optmisations |
| | |
| gnome-chemistry- | Stop building the obsolete gcu-plugin |
| utils [22] | package |
| | |
| gocode [23] | gocode-auto-complete-el: Promote auto- |
| | complete-el to Pre-Depends to ensure |
| | successful upgrades |
| | |
| gpac [24] | Fix buffer overflows [CVE-2018-7752 |
| | CVE-2018-20762], heap overflows |
| | [CVE-2018-13005 CVE-2018-13006 CVE-2018- |
| | 20761], out-of-bounds writes [CVE-2018- |
| | 20760 CVE-2018-20763] |
| | |
| icedtea-web [25] | Stop building the browser plugin, no |
| | longer works with Firefox 60 |
| | |
| igraph [26] | Fix a crash when loading malformed |
| | GraphML files [CVE-2018-20349] |
| | |
| jabref [27] | Fix XML External Entity attack |
| | [CVE-2018-1000652] |
| | |
| java-common [28] | Remove the default-java-plugin package, |
| | as the icedtea-web Xul plugin is being |
| | removed |
| | |
| jquery [29] | Prevent Object.prototype pollution |
| | [CVE-2019-11358] |
| | |
| kauth [30] | Fix insecure handling of arguments in |
| | helpers [CVE-2019-7443] |
| | |
| libdate-holidays-de- | Add March 8th (from 2019 onwards) and |
| perl [31] | May 8th (2020 only) as public holidays |
| | (Berlin only) |
| | |
| libdatetime-timezone- | Update included data |
| perl [32] | |
| | |
| libreoffice [33] | Introduce next Japanese gengou era |
| | 'Reiwa'; make -core conflict against |
| | openjdk-8-jre-headless (= 8u181-b13- |
| | 2~deb9u1), which had a broken |
| | ClassPathURLCheck |
| | |
| linux [34] | New upstream stable version |
| | |
| linux-latest [35] | Update for -9 kernel ABI |
| | |
| mariadb-10.1 [36] | New upstream stable version |
| | |
| mclibs [37] | Rebuild against cernlib with fixed |
| | Fortran optmisations |
| | |
| ncmpc [38] | Fix NULL pointer dereference [CVE-2018- |
| | 9240] |
| | |
| node-superagent [39] | Fix ZIP bomb attacks [CVE-2017-16129]; |
| | fix syntax error |
| | |
| nvidia-graphics- | New upstream stable release [CVE-2018- |
| drivers [40] | 6260] |
| | |
| nvidia-settings [41] | New upstream stable release |
| | |
| obs-build [42] | Do not allow writing to files in the |
| | host system [CVE-2017-14804] |
| | |
| paw [43] | Rebuild against cernlib with fixed |
| | Fortran optmisations |
| | |
| perlbrew [44] | Allow HTTPS CPAN URLs |
| | |
| postfix [45] | New upstream stable release |
| | |
| postgresql-9.6 [46] | New upstream stable release |
| | |
| psk31lx [47] | Make version sort correctly to avoid |
| | potential upgrade issues |
| | |
| publicsuffix [48] | Update included data |
| | |
| pyca [49] | Add "missingok" to logrotate |
| | configuration |
| | |
| python-certbot [50] | Revert to debhelper compat 9, to ensure |
| | systemd timers are correctly started |
| | |
| python-cryptography [51] | Remove BIO_callback_ctrl: The prototype |
| | differs with the OpenSSL's definition of |
| | it after it was changed (fixed) within |
| | OpenSSL |
| | |
| python-django- | Apply django 1.10 middleware fix; |
| casclient [52] | python(3)-django-casclient: fix missing |
| | dependencies on python(3)-django |
| | |
| python-mode [53] | Remove support for xemacs21 |
| | |
| python-pip [54] | Properly catch requests' HTTPError in |
| | index.py |
| | |
| python-pykmip [55] | Fix potential denial of service issue |
| | [CVE-2018-1000872] |
| | |
| r-cran-igraph [56] | Fix denial of service via crafted object |
| | [CVE-2018-20349] |
| | |
| rails [57] | Fix information disclosure issues |
| | [CVE-2018-16476 CVE-2019-5418], denial |
| | of service issue [CVE-2019-5419] |
| | |
| rsync [58] | Several security fixes for zlib |
| | [CVE-2016-9840 CVE-2016-9841 CVE-2016- |
| | 9842 CVE-2016-9843] |
| | |
| ruby-i18n [59] | Prevent a remote denial-of-service |
| | vulnerability [CVE-2014-10077] |
| | |
| ruby2.3 [60] | Fix FTBFS |
| | |
| runc [61] | Fix root privilege escalation |
| | vulnerability [CVE-2019-5736] |
| | |
| systemd [62] | journald: fix assertion failure on |
| | journal_file_link_data; tmpfiles: fix |
| | "e" to support shell style globs; |
| | mount-util: accept that |
| | name_to_handle_at() might fail with |
| | EPERM; automount: ack automount requests |
| | even when already mounted [CVE-2018- |
| | 1049]; fix potential root privilege |
| | escalation [CVE-2018-15686] |
| | |
| twitter-bootstrap3 [63] | Fix cross site scripting issue in |
| | tooltips or popovers [CVE-2019-8331] |
| | |
| tzdata [64] | New upstream release |
| | |
| unzip [65] | Fix buffer overflow in password |
| | protected ZIP archives [CVE-2018- |
| | 1000035] |
| | |
| vcftools [66] | Fix information disclosure [CVE-2018- |
| | 11099] and denial of service [CVE-2018- |
| | 11129 CVE-2018-11130] via crafted files |
| | |
| vips [67] | Fix NULL function pointer dereference |
| | [CVE-2018-7998], uninitialised memory |
| | access [CVE-2019-6976] |
| | |
| waagent [68] | New upstream release, with many Azure |
| | fixes [CVE-2019-0804] |
| | |
| yorick-av [69] | Rescale frame timestamps; set VBV buffer |
| | size for MPEG1/2 files |
| | |
| zziplib [70] | Fix invalid memory access [CVE-2018- |
| | 6381], bus error [CVE-2018-6540], out- |
| | of-bounds read [CVE-2018-7725], crash |
| | via crafted zip file [CVE-2018-7726], |
| | memory leak [CVE-2018-16548]; reject ZIP |
| | file if the size of the central |
| | directory and/or the offset of start of |
| | central directory point beyond the end |
| | of the ZIP file [CVE-2018-6484, |
| | CVE-2018-6541, CVE-2018-6869] |
| | |
+--------------------------+------------------------------------------+
1: https://packages.debian.org/src:audiofile
2: https://packages.debian.org/src:base-files
3: https://packages.debian.org/src:bwa
4: https://packages.debian.org/src:ca-certificates-java
5: https://packages.debian.org/src:cernlib
6: https://packages.debian.org/src:choose-mirror
7: https://packages.debian.org/src:chrony
8: https://packages.debian.org/src:ckermit
9: https://packages.debian.org/src:clamav
10: https://packages.debian.org/src:dansguardian
11: https://packages.debian.org/src:debian-installer
12: https://packages.debian.org/src:debian-installer-netboot-images
13: https://packages.debian.org/src:debian-security-support
14: https://packages.debian.org/src:diffoscope
15: https://packages.debian.org/src:dns-root-data
16: https://packages.debian.org/src:dnsruby
17: https://packages.debian.org/src:dpdk
18: https://packages.debian.org/src:edk2
19: https://packages.debian.org/src:firmware-nonfree
20: https://packages.debian.org/src:flatpak
21: https://packages.debian.org/src:geant321
22: https://packages.debian.org/src:gnome-chemistry-utils
23: https://packages.debian.org/src:gocode
24: https://packages.debian.org/src:gpac
25: https://packages.debian.org/src:icedtea-web
26: https://packages.debian.org/src:igraph
27: https://packages.debian.org/src:jabref
28: https://packages.debian.org/src:java-common
29: https://packages.debian.org/src:jquery
30: https://packages.debian.org/src:kauth
31: https://packages.debian.org/src:libdate-holidays-de-perl
32: https://packages.debian.org/src:libdatetime-timezone-perl
33: https://packages.debian.org/src:libreoffice
34: https://packages.debian.org/src:linux
35: https://packages.debian.org/src:linux-latest
36: https://packages.debian.org/src:mariadb-10.1
37: https://packages.debian.org/src:mclibs
38: https://packages.debian.org/src:ncmpc
39: https://packages.debian.org/src:node-superagent
40: https://packages.debian.org/src:nvidia-graphics-drivers
41: https://packages.debian.org/src:nvidia-settings
42: https://packages.debian.org/src:obs-build
43: https://packages.debian.org/src:paw
44: https://packages.debian.org/src:perlbrew
45: https://packages.debian.org/src:postfix
46: https://packages.debian.org/src:postgresql-9.6
47: https://packages.debian.org/src:psk31lx
48: https://packages.debian.org/src:publicsuffix
49: https://packages.debian.org/src:pyca
50: https://packages.debian.org/src:python-certbot
51: https://packages.debian.org/src:python-cryptography
52: https://packages.debian.org/src:python-django-casclient
53: https://packages.debian.org/src:python-mode
54: https://packages.debian.org/src:python-pip
55: https://packages.debian.org/src:python-pykmip
56: https://packages.debian.org/src:r-cran-igraph
57: https://packages.debian.org/src:rails
58: https://packages.debian.org/src:rsync
59: https://packages.debian.org/src:ruby-i18n
60: https://packages.debian.org/src:ruby2.3
61: https://packages.debian.org/src:runc
62: https://packages.debian.org/src:systemd
63: https://packages.debian.org/src:twitter-bootstrap3
64: https://packages.debian.org/src:tzdata
65: https://packages.debian.org/src:unzip
66: https://packages.debian.org/src:vcftools
67: https://packages.debian.org/src:vips
68: https://packages.debian.org/src:waagent
69: https://packages.debian.org/src:yorick-av
70: https://packages.debian.org/src:zziplib
Security Updates
----------------
This revision adds the following security updates to the stable release.
The Security Team has already released an advisory for each of these
updates:
+----------------+----------------------------------+
| Advisory ID | Package |
+----------------+----------------------------------+
| DSA-4259 [71] | ruby2.3 [72] |
| | |
| DSA-4332 [73] | ruby2.3 [74] |
| | |
| DSA-4341 [75] | mariadb-10.1 [76] |
| | |
| DSA-4373 [77] | coturn [78] |
| | |
| DSA-4374 [79] | qtbase-opensource-src [80] |
| | |
| DSA-4377 [81] | rssh [82] |
| | |
| DSA-4385 [83] | dovecot [84] |
| | |
| DSA-4387 [85] | openssh [86] |
| | |
| DSA-4388 [87] | mosquitto [88] |
| | |
| DSA-4389 [89] | libu2f-host [90] |
| | |
| DSA-4390 [91] | flatpak [92] |
| | |
| DSA-4391 [93] | firefox-esr [94] |
| | |
| DSA-4392 [95] | thunderbird [96] |
| | |
| DSA-4393 [97] | systemd [98] |
| | |
| DSA-4394 [99] | rdesktop [100] |
| | |
| DSA-4396 [101] | ansible [102] |
| | |
| DSA-4397 [103] | ldb [104] |
| | |
| DSA-4398 [105] | php7.0 [106] |
| | |
| DSA-4399 [107] | ikiwiki [108] |
| | |
| DSA-4400 [109] | openssl1.0 [110] |
| | |
| DSA-4401 [111] | wordpress [112] |
| | |
| DSA-4402 [113] | mumble [114] |
| | |
| DSA-4403 [115] | php7.0 [116] |
| | |
| DSA-4405 [117] | openjpeg2 [118] |
| | |
| DSA-4406 [119] | waagent [120] |
| | |
| DSA-4407 [121] | xmltooling [122] |
| | |
| DSA-4408 [123] | liblivemedia [124] |
| | |
| DSA-4409 [125] | neutron [126] |
| | |
| DSA-4410 [127] | openjdk-8 [128] |
| | |
| DSA-4411 [129] | firefox-esr [130] |
| | |
| DSA-4412 [131] | drupal7 [132] |
| | |
| DSA-4413 [133] | ntfs-3g [134] |
| | |
| DSA-4414 [135] | libapache2-mod-auth-mellon [136] |
| | |
| DSA-4415 [137] | passenger [138] |
| | |
| DSA-4416 [139] | wireshark [140] |
| | |
| DSA-4417 [141] | firefox-esr [142] |
| | |
| DSA-4418 [143] | dovecot [144] |
| | |
| DSA-4419 [145] | twig [146] |
| | |
| DSA-4420 [147] | thunderbird [148] |
| | |
| DSA-4422 [149] | apache2 [150] |
| | |
| DSA-4423 [151] | putty [152] |
| | |
| DSA-4424 [153] | pdns [154] |
| | |
| DSA-4425 [155] | wget [156] |
| | |
| DSA-4426 [157] | tryton-server [158] |
| | |
| DSA-4427 [159] | samba [160] |
| | |
| DSA-4428 [161] | systemd [162] |
| | |
| DSA-4429 [163] | spip [164] |
| | |
| DSA-4430 [165] | wpa [166] |
| | |
| DSA-4431 [167] | libssh2 [168] |
| | |
| DSA-4432 [169] | ghostscript [170] |
| | |
| DSA-4433 [171] | ruby2.3 [172] |
| | |
| DSA-4434 [173] | drupal7 [174] |
| | |
+----------------+----------------------------------+
71: https://www.debian.org/security/2018/dsa-4259
72: https://packages.debian.org/src:ruby2.3
73: https://www.debian.org/security/2018/dsa-4332
74: https://packages.debian.org/src:ruby2.3
75: https://www.debian.org/security/2018/dsa-4341
76: https://packages.debian.org/src:mariadb-10.1
77: https://www.debian.org/security/2019/dsa-4373
78: https://packages.debian.org/src:coturn
79: https://www.debian.org/security/2019/dsa-4374
80: https://packages.debian.org/src:qtbase-opensource-src
81: https://www.debian.org/security/2019/dsa-4377
82: https://packages.debian.org/src:rssh
83: https://www.debian.org/security/2019/dsa-4385
84: https://packages.debian.org/src:dovecot
85: https://www.debian.org/security/2019/dsa-4387
86: https://packages.debian.org/src:openssh
87: https://www.debian.org/security/2019/dsa-4388
88: https://packages.debian.org/src:mosquitto
89: https://www.debian.org/security/2019/dsa-4389
90: https://packages.debian.org/src:libu2f-host
91: https://www.debian.org/security/2019/dsa-4390
92: https://packages.debian.org/src:flatpak
93: https://www.debian.org/security/2019/dsa-4391
94: https://packages.debian.org/src:firefox-esr
95: https://www.debian.org/security/2019/dsa-4392
96: https://packages.debian.org/src:thunderbird
97: https://www.debian.org/security/2019/dsa-4393
98: https://packages.debian.org/src:systemd
99: https://www.debian.org/security/2019/dsa-4394
100: https://packages.debian.org/src:rdesktop
101: https://www.debian.org/security/2019/dsa-4396
102: https://packages.debian.org/src:ansible
103: https://www.debian.org/security/2019/dsa-4397
104: https://packages.debian.org/src:ldb
105: https://www.debian.org/security/2019/dsa-4398
106: https://packages.debian.org/src:php7.0
107: https://www.debian.org/security/2019/dsa-4399
108: https://packages.debian.org/src:ikiwiki
109: https://www.debian.org/security/2019/dsa-4400
110: https://packages.debian.org/src:openssl1.0
111: https://www.debian.org/security/2019/dsa-4401
112: https://packages.debian.org/src:wordpress
113: https://www.debian.org/security/2019/dsa-4402
114: https://packages.debian.org/src:mumble
115: https://www.debian.org/security/2019/dsa-4403
116: https://packages.debian.org/src:php7.0
117: https://www.debian.org/security/2019/dsa-4405
118: https://packages.debian.org/src:openjpeg2
119: https://www.debian.org/security/2019/dsa-4406
120: https://packages.debian.org/src:waagent
121: https://www.debian.org/security/2019/dsa-4407
122: https://packages.debian.org/src:xmltooling
123: https://www.debian.org/security/2019/dsa-4408
124: https://packages.debian.org/src:liblivemedia
125: https://www.debian.org/security/2019/dsa-4409
126: https://packages.debian.org/src:neutron
127: https://www.debian.org/security/2019/dsa-4410
128: https://packages.debian.org/src:openjdk-8
129: https://www.debian.org/security/2019/dsa-4411
130: https://packages.debian.org/src:firefox-esr
131: https://www.debian.org/security/2019/dsa-4412
132: https://packages.debian.org/src:drupal7
133: https://www.debian.org/security/2019/dsa-4413
134: https://packages.debian.org/src:ntfs-3g
135: https://www.debian.org/security/2019/dsa-4414
136: https://packages.debian.org/src:libapache2-mod-auth-mellon
137: https://www.debian.org/security/2019/dsa-4415
138: https://packages.debian.org/src:passenger
139: https://www.debian.org/security/2019/dsa-4416
140: https://packages.debian.org/src:wireshark
141: https://www.debian.org/security/2019/dsa-4417
142: https://packages.debian.org/src:firefox-esr
143: https://www.debian.org/security/2019/dsa-4418
144: https://packages.debian.org/src:dovecot
145: https://www.debian.org/security/2019/dsa-4419
146: https://packages.debian.org/src:twig
147: https://www.debian.org/security/2019/dsa-4420
148: https://packages.debian.org/src:thunderbird
149: https://www.debian.org/security/2019/dsa-4422
150: https://packages.debian.org/src:apache2
151: https://www.debian.org/security/2019/dsa-4423
152: https://packages.debian.org/src:putty
153: https://www.debian.org/security/2019/dsa-4424
154: https://packages.debian.org/src:pdns
155: https://www.debian.org/security/2019/dsa-4425
156: https://packages.debian.org/src:wget
157: https://www.debian.org/security/2019/dsa-4426
158: https://packages.debian.org/src:tryton-server
159: https://www.debian.org/security/2019/dsa-4427
160: https://packages.debian.org/src:samba
161: https://www.debian.org/security/2019/dsa-4428
162: https://packages.debian.org/src:systemd
163: https://www.debian.org/security/2019/dsa-4429
164: https://packages.debian.org/src:spip
165: https://www.debian.org/security/2019/dsa-4430
166: https://packages.debian.org/src:wpa
167: https://www.debian.org/security/2019/dsa-4431
168: https://packages.debian.org/src:libssh2
169: https://www.debian.org/security/2019/dsa-4432
170: https://packages.debian.org/src:ghostscript
171: https://www.debian.org/security/2019/dsa-4433
172: https://packages.debian.org/src:ruby2.3
173: https://www.debian.org/security/2019/dsa-4434
174: https://packages.debian.org/src:drupal7
Removed packages
----------------
The following packages were removed due to circumstances beyond our
control:
+-----------------------------+----------------------------------------+
| Package | Reason |
+-----------------------------+----------------------------------------+
| gcontactsync [175] | Incompatible with newer firefox-esr |
| | versions |
| | |
| google-tasks-sync [176] | Incompatible with newer firefox-esr |
| | versions |
| | |
| mozilla-gnome-kerying [177] | Incompatible with newer firefox-esr |
| | versions |
| | |
| tbdialout [178] | Incompatible with newer thunderbird |
| | versions |
| | |
| timeline [179] | Incompatible with newer thunderbird |
| | versions |
| | |
+-----------------------------+----------------------------------------+
175: https://packages.debian.org/src:gcontactsync
176: https://packages.debian.org/src:google-tasks-sync
177: https://packages.debian.org/src:mozilla-gnome-kerying
178: https://packages.debian.org/src:tbdialout
179: https://packages.debian.org/src:timeline
Debian Installer
----------------
The installer has been updated to include the fixes incorporated into
stable by the point release.
URLs
----
The complete lists of packages that have changed with this revision:
http://ftp.debian.org/debian/dists/stretch/ChangeLog
The current stable distribution:
http://ftp.debian.org/debian/dists/stable/
Proposed updates to the stable distribution:
http://ftp.debian.org/debian/dists/proposed-updates
stable distribution information (release notes, errata etc.):
https://www.debian.org/releases/stable/
Security announcements and information:
https://www.debian.org/security/
About Debian
------------
The Debian Project is an association of Free Software developers who
volunteer their time and effort in order to produce the completely free
operating system Debian.
Contact Information
-------------------
For further information, please visit the Debian web pages at
https://www.debian.org/, send mail to <press@debian.org>, or contact the
stable release team at <debian-release@lists.debian.org>.