Friday, January 31, 2020

Fwd: Mass rebuild reminders

-----BEGIN PGP SIGNATURE-----
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=gyLR
-----END PGP SIGNATURE-----

---------- Forwarded message ---------
From: Kevin Fenzi <kevin@scrye.com>
Date: Fri, Jan 31, 2020, 03:40
Subject: Mass rebuild reminders
To: <devel@lists.fedoraproject.org>


Just a few reminders for folks:

* If your package failed to build in the mass rebuild
( https://kojipkgs.fedoraproject.org/mass-rebuild/f32-failures.html )
and you want to fix it, please do so. Just do a normal commit/build
cycle for rawhide as you normally would. It should disappear from the
above list and no FTBFS bug will be filed.

* If you want to fix something else or update a package or whatever,
just do it as normal. The script that tags the mass rebuild back in will
see a newer build and not tag in the one from the mass rebuild.

* There were some failures on s390x at the beginning of the mass
rebuild. We will try and resubmit these after the mass rebuild is
done. You're welcome to resubmit them (make sure you resubmit or do a
new build in the f32-rebuild tag, not the normal tag) also anytime. The
above link should update and they will have no FTBFS filed for them.

kevin
_______________________________________________
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-leave@lists.fedoraproject.org
Fedora Code of Conduct: https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org

Thursday, January 30, 2020

[USN-4262-1] OpenStack Keystone vulnerability

-----BEGIN PGP SIGNATURE-----
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=HFeK
-----END PGP SIGNATURE-----
==========================================================================
Ubuntu Security Notice USN-4262-1
January 30, 2020

keystone vulnerability
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 19.10

Summary:

OpenStack Keystone could be made to expose sensitive information over the
network.

Software Description:
- keystone: OpenStack identity service

Details:

Daniel Preussker discovered that OpenStack Keystone incorrectly handled the
list credentials API. A user with a role on the project could use this
issue to view any other user's credentials.

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 19.10:
keystone 2:16.0.0-0ubuntu1.1
python3-keystone 2:16.0.0-0ubuntu1.1

In general, a standard system update will make all the necessary changes.

References:
https://usn.ubuntu.com/4262-1
CVE-2019-19687

Package Information:
https://launchpad.net/ubuntu/+source/keystone/2:16.0.0-0ubuntu1.1

Wednesday, January 29, 2020

[USN-4261-1] WebKitGTK+ vulnerabilities

-----BEGIN PGP SIGNATURE-----
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=OnDl
-----END PGP SIGNATURE-----
==========================================================================
Ubuntu Security Notice USN-4261-1
January 29, 2020

webkit2gtk vulnerabilities
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 19.10
- Ubuntu 18.04 LTS

Summary:

Several security issues were fixed in WebKitGTK+.

Software Description:
- webkit2gtk: Web content engine library for GTK+

Details:

A large number of security issues were discovered in the WebKitGTK+ Web and
JavaScript engines. If a user were tricked into viewing a malicious
website, a remote attacker could exploit a variety of issues related to web
browser security, including cross-site scripting attacks, denial of service
attacks, and arbitrary code execution.

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 19.10:
libjavascriptcoregtk-4.0-18 2.26.3-0ubuntu0.19.10.1
libwebkit2gtk-4.0-37 2.26.3-0ubuntu0.19.10.1

Ubuntu 18.04 LTS:
libjavascriptcoregtk-4.0-18 2.26.3-0ubuntu0.18.04.1
libwebkit2gtk-4.0-37 2.26.3-0ubuntu0.18.04.1

This update uses a new upstream release, which includes additional bug
fixes. After a standard system update you need to restart any applications
that use WebKitGTK+, such as Epiphany, to make all the necessary changes.

References:
https://usn.ubuntu.com/4261-1
CVE-2019-8835, CVE-2019-8844, CVE-2019-8846

Package Information:
https://launchpad.net/ubuntu/+source/webkit2gtk/2.26.3-0ubuntu0.19.10.1
https://launchpad.net/ubuntu/+source/webkit2gtk/2.26.3-0ubuntu0.18.04.1

[USN-4259-1] Apache Solr vulnerability

-----BEGIN PGP SIGNATURE-----
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=EyQJ
-----END PGP SIGNATURE-----
==========================================================================
Ubuntu Security Notice USN-4259-1
January 29, 2020

Apache Solr vulnerability
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 16.04 LTS

Summary:

Apache Solr could be made to run programs if it received
specially crafted network traffic.

Software Description:
- lucene-solr: Full-text search engine library for Java - additional libraries

Details:

Michael Stepankin and Olga Barinova discovered that Apache Solr was
vulnerable to an XXE attack. An attacker could use this vulnerability to
remotely execute code.

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 16.04 LTS:
liblucene3-contrib-java 3.6.2+dfsg-8ubuntu0.1
liblucene3-java 3.6.2+dfsg-8ubuntu0.1
libsolr-java 3.6.2+dfsg-8ubuntu0.1
solr-common 3.6.2+dfsg-8ubuntu0.1
solr-jetty 3.6.2+dfsg-8ubuntu0.1
solr-tomcat 3.6.2+dfsg-8ubuntu0.1

In general, a standard system update will make all the necessary changes.

References:
https://usn.ubuntu.com/4259-1
CVE-2017-12629

Package Information:
https://launchpad.net/ubuntu/+source/lucene-solr/3.6.2+dfsg-8ubuntu0.1

[announce] Next NYC*BUG: Feb 5th 18:45 - *Chartbeat 826 Broadway, 6th Floor New York, NY 10003*



Details:


We can carry our dinner and beverages into to the5NYC*Bug meeting space at Chartbeat. 


Tuesday, January 28, 2020

[USN-4254-2] Linux kernel (Xenial HWE) vulnerabilities

==========================================================================
Ubuntu Security Notice USN-4254-2
January 29, 2020

linux-lts-xenial, linux-aws vulnerabilities
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 14.04 ESM

Summary:

Several security issues were fixed in the Linux kernel.

Software Description:
- linux-aws: Linux kernel for Amazon Web Services (AWS) systems
- linux-lts-xenial: Linux hardware enablement kernel from Xenial for Trusty

Details:

USN-4254-1 fixed vulnerabilities in the Linux kernel for Ubuntu 16.04
LTS. This update provides the corresponding updates for the Linux
Hardware Enablement (HWE) kernel from Ubuntu 16.04 LTS for Ubuntu
14.04 ESM.

It was discovered that the Linux kernel did not properly clear data
structures on context switches for certain Intel graphics processors. A
local attacker could use this to expose sensitive information.
(CVE-2019-14615)

It was discovered that a race condition existed in the Virtual Video Test
Driver in the Linux kernel. An attacker with write access to /dev/video0 on
a system with the vivid module loaded could possibly use this to gain
administrative privileges. (CVE-2019-18683)

It was discovered that the btrfs file system in the Linux kernel did not
properly validate metadata, leading to a NULL pointer dereference. An
attacker could use this to specially craft a file system image that, when
mounted, could cause a denial of service (system crash). (CVE-2019-18885)

It was discovered that multiple memory leaks existed in the Marvell WiFi-Ex
Driver for the Linux kernel. A local attacker could possibly use this to
cause a denial of service (kernel memory exhaustion). (CVE-2019-19057)

It was discovered that the crypto subsystem in the Linux kernel did not
properly deallocate memory in certain error conditions. A local attacker
could use this to cause a denial of service (kernel memory exhaustion).
(CVE-2019-19062)

It was discovered that the Realtek rtlwifi USB device driver in the Linux
kernel did not properly deallocate memory in certain error conditions. A
local attacker could possibly use this to cause a denial of service (kernel
memory exhaustion). (CVE-2019-19063)

Dan Carpenter discovered that the AppleTalk networking subsystem of the
Linux kernel did not properly handle certain error conditions, leading to a
NULL pointer dereference. A local attacker could use this to cause a denial
of service (system crash). (CVE-2019-19227)

It was discovered that the KVM hypervisor implementation in the Linux
kernel did not properly handle ioctl requests to get emulated CPUID
features. An attacker with access to /dev/kvm could use this to cause a
denial of service (system crash). (CVE-2019-19332)

It was discovered that the B2C2 FlexCop USB device driver in the Linux
kernel did not properly validate device metadata. A physically proximate
attacker could use this to cause a denial of service (system crash).
(CVE-2019-15291)

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 14.04 ESM:
linux-image-4.4.0-1061-aws 4.4.0-1061.65
linux-image-4.4.0-173-generic 4.4.0-173.203~14.04.1
linux-image-4.4.0-173-generic-lpae 4.4.0-173.203~14.04.1
linux-image-4.4.0-173-lowlatency 4.4.0-173.203~14.04.1
linux-image-4.4.0-173-powerpc-e500mc 4.4.0-173.203~14.04.1
linux-image-4.4.0-173-powerpc-smp 4.4.0-173.203~14.04.1
linux-image-4.4.0-173-powerpc64-emb 4.4.0-173.203~14.04.1
linux-image-4.4.0-173-powerpc64-smp 4.4.0-173.203~14.04.1
linux-image-aws 4.4.0.1061.62
linux-image-generic-lpae-lts-xenial 4.4.0.173.152
linux-image-generic-lts-xenial 4.4.0.173.152
linux-image-lowlatency-lts-xenial 4.4.0.173.152
linux-image-powerpc-e500mc-lts-xenial 4.4.0.173.152
linux-image-powerpc-smp-lts-xenial 4.4.0.173.152
linux-image-powerpc64-emb-lts-xenial 4.4.0.173.152
linux-image-powerpc64-smp-lts-xenial 4.4.0.173.152
linux-image-virtual-lts-xenial 4.4.0.173.152

After a standard system update you need to reboot your computer to make
all the necessary changes.

ATTENTION: Due to an unavoidable ABI change the kernel updates have
been given a new version number, which requires you to recompile and
reinstall all third party kernel modules you might have installed.
Unless you manually uninstalled the standard kernel metapackages
(e.g. linux-generic, linux-generic-lts-RELEASE, linux-virtual,
linux-powerpc), a standard system upgrade will automatically perform
this as well.

References:
https://usn.ubuntu.com/4254-2
https://usn.ubuntu.com/4254-1
CVE-2019-14615, CVE-2019-15291, CVE-2019-18683, CVE-2019-18885,
CVE-2019-19057, CVE-2019-19062, CVE-2019-19063, CVE-2019-19227,
CVE-2019-19332

[USN-4255-2] Linux kernel (HWE) vulnerabilities

==========================================================================
Ubuntu Security Notice USN-4255-2
January 28, 2020

linux-hwe, linux-aws-hwe vulnerabilities
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 16.04 LTS

Summary:

Several security issues were fixed in the Linux kernel.

Software Description:
- linux-aws-hwe: Linux kernel for Amazon Web Services (AWS-HWE) systems
- linux-hwe: Linux hardware enablement (HWE) kernel

Details:

USN-4255-1 fixed vulnerabilities in the Linux kernel for Ubuntu 18.04
LTS. This update provides the corresponding updates for the Linux
Hardware Enablement (HWE) kernel from Ubuntu 18.04 LTS for Ubuntu
16.04 LTS.

It was discovered that the Linux kernel did not properly clear data
structures on context switches for certain Intel graphics processors. A
local attacker could use this to expose sensitive information.
(CVE-2019-14615)

It was discovered that a race condition can lead to a use-after-free while
destroying GEM contexts in the i915 driver for the Linux kernel. A local
attacker could use this to cause a denial of service (system crash) or
possibly execute arbitrary code. (CVE-2020-7053)

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 16.04 LTS:
linux-image-4.15.0-1058-aws 4.15.0-1058.60~16.04.1
linux-image-4.15.0-76-generic 4.15.0-76.86~16.04.1
linux-image-4.15.0-76-generic-lpae 4.15.0-76.86~16.04.1
linux-image-4.15.0-76-lowlatency 4.15.0-76.86~16.04.1
linux-image-aws-hwe 4.15.0.1058.58
linux-image-generic-hwe-16.04 4.15.0.76.96
linux-image-generic-lpae-hwe-16.04 4.15.0.76.96
linux-image-lowlatency-hwe-16.04 4.15.0.76.96
linux-image-oem 4.15.0.76.96
linux-image-virtual-hwe-16.04 4.15.0.76.96

After a standard system update you need to reboot your computer to make
all the necessary changes.

ATTENTION: Due to an unavoidable ABI change the kernel updates have
been given a new version number, which requires you to recompile and
reinstall all third party kernel modules you might have installed.
Unless you manually uninstalled the standard kernel metapackages
(e.g. linux-generic, linux-generic-lts-RELEASE, linux-virtual,
linux-powerpc), a standard system upgrade will automatically perform
this as well.

References:
https://usn.ubuntu.com/4255-2
https://usn.ubuntu.com/4255-1
CVE-2019-14615, CVE-2020-7053

Package Information:
https://launchpad.net/ubuntu/+source/linux-aws-hwe/4.15.0-1058.60~16.04.1
https://launchpad.net/ubuntu/+source/linux-hwe/4.15.0-76.86~16.04.1

[USN-4253-2] Linux kernel (HWE) vulnerability

==========================================================================
Ubuntu Security Notice USN-4253-2
January 28, 2020

linux-hwe vulnerability
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 18.04 LTS

Summary:

he Linux kernel could be made to expose sensitive information.

Software Description:
- linux-hwe: Linux hardware enablement (HWE) kernel

Details:

USN-4253-1 fixed vulnerabilities in the Linux kernel for Ubuntu 19.10.
This update provides the corresponding updates for the Linux
Hardware Enablement (HWE) kernel from Ubuntu 19.10 for Ubuntu
18.04 LTS.

It was discovered that the Linux kernel did not properly clear data
structures on context switches for certain Intel graphics processors. A
local attacker could use this to expose sensitive information.

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 18.04 LTS:
linux-image-5.3.0-28-generic 5.3.0-28.30~18.04.1
linux-image-5.3.0-28-generic-lpae 5.3.0-28.30~18.04.1
linux-image-5.3.0-28-lowlatency 5.3.0-28.30~18.04.1
linux-image-generic-hwe-18.04 5.3.0.28.96
linux-image-generic-lpae-hwe-18.04 5.3.0.28.96
linux-image-lowlatency-hwe-18.04 5.3.0.28.96
linux-image-snapdragon-hwe-18.04 5.3.0.28.96
linux-image-virtual-hwe-18.04 5.3.0.28.96

After a standard system update you need to reboot your computer to make
all the necessary changes.

ATTENTION: Due to an unavoidable ABI change the kernel updates have
been given a new version number, which requires you to recompile and
reinstall all third party kernel modules you might have installed.
Unless you manually uninstalled the standard kernel metapackages
(e.g. linux-generic, linux-generic-lts-RELEASE, linux-virtual,
linux-powerpc), a standard system upgrade will automatically perform
this as well.

References:
https://usn.ubuntu.com/4253-2
https://usn.ubuntu.com/4253-1
CVE-2019-14615

Package Information:
https://launchpad.net/ubuntu/+source/linux-hwe/5.3.0-28.30~18.04.1

[USN-4258-1] Linux kernel vulnerabilities

==========================================================================
Ubuntu Security Notice USN-4258-1
January 29, 2020

linux-aws-5.0, linux-gcp, linux-gke-5.0, linux-oracle-5.0 vulnerabilities
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 18.04 LTS

Summary:

Several security issues were fixed in the Linux kernel.

Software Description:
- linux-aws-5.0: Linux kernel for Amazon Web Services (AWS) systems
- linux-gcp: Linux kernel for Google Cloud Platform (GCP) systems
- linux-gke-5.0: Linux kernel for Google Container Engine (GKE) systems
- linux-oracle-5.0: Linux kernel for Oracle Cloud systems

Details:

It was discovered that the Atheros 802.11ac wireless USB device driver in
the Linux kernel did not properly validate device metadata. A physically
proximate attacker could use this to cause a denial of service (system
crash). (CVE-2019-15099)

It was discovered that a race condition existed in the Virtual Video Test
Driver in the Linux kernel. An attacker with write access to /dev/video0 on
a system with the vivid module loaded could possibly use this to gain
administrative privileges. (CVE-2019-18683)

It was discovered that the btrfs file system in the Linux kernel did not
properly validate metadata, leading to a NULL pointer dereference. An
attacker could use this to specially craft a file system image that, when
mounted, could cause a denial of service (system crash). (CVE-2019-18885)

It was discovered that the crypto subsystem in the Linux kernel did not
properly deallocate memory in certain error conditions. A local attacker
could use this to cause a denial of service (kernel memory exhaustion).
(CVE-2019-19050, CVE-2019-19062)

It was discovered that the RSI 91x WLAN device driver in the Linux kernel
did not properly deallocate memory in certain error conditions. A local
attacker could use this to cause a denial of service (kernel memory
exhaustion). (CVE-2019-19071)

It was discovered that the Broadcom Netxtreme HCA device driver in the
Linux kernel did not properly deallocate memory in certain error
conditions. A local attacker could possibly use this to cause a denial of
service (kernel memory exhaustion). (CVE-2019-19077)

It was discovered that the Atheros 802.11ac wireless USB device driver in
the Linux kernel did not properly deallocate memory in certain error
conditions. A local attacker could possibly use this to cause a denial of
service (kernel memory exhaustion). (CVE-2019-19078)

It was discovered that the Qualcomm IPC Router TUN device driver in the
Linux kernel did not properly deallocate memory in certain situations. A
local attacker could possibly use this to cause a denial of service (kernel
memory exhaustion). (CVE-2019-19079)

It was discovered that the AMD GPU device drivers in the Linux kernel did
not properly deallocate memory in certain error conditions. A local
attacker could use this to possibly cause a denial of service (kernel
memory exhaustion). (CVE-2019-19082)

Dan Carpenter discovered that the AppleTalk networking subsystem of the
Linux kernel did not properly handle certain error conditions, leading to a
NULL pointer dereference. A local attacker could use this to cause a denial
of service (system crash). (CVE-2019-19227)

Or Cohen discovered that the virtual console subsystem in the Linux kernel
did not properly restrict writes to unimplemented vcsu (unicode) devices. A
local attacker could possibly use this to cause a denial of service (system
crash) or have other unspecified impacts. (CVE-2019-19252)

It was discovered that the KVM hypervisor implementation in the Linux
kernel did not properly handle ioctl requests to get emulated CPUID
features. An attacker with access to /dev/kvm could use this to cause a
denial of service (system crash). (CVE-2019-19332)

It was discovered that the ext4 file system implementation in the Linux
kernel did not properly handle certain conditions. An attacker could use
this to specially craft an ext4 file system that, when mounted, could cause
a denial of service (system crash) or possibly execute arbitrary code.
(CVE-2019-19767)

It was discovered that the B2C2 FlexCop USB device driver in the Linux
kernel did not properly validate device metadata. A physically proximate
attacker could use this to cause a denial of service (system crash).
(CVE-2019-15291)

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 18.04 LTS:
linux-image-5.0.0-1010-oracle 5.0.0-1010.15~18.04.1
linux-image-5.0.0-1024-aws 5.0.0-1024.27~18.04.1
linux-image-5.0.0-1029-gcp 5.0.0-1029.30~18.04.1
linux-image-5.0.0-1029-gke 5.0.0-1029.30~18.04.1
linux-image-aws-edge 5.0.0.1024.38
linux-image-gcp 5.0.0.1029.33
linux-image-gke-5.0 5.0.0.1029.17
linux-image-oracle-edge 5.0.0.1010.9

After a standard system update you need to reboot your computer to make
all the necessary changes.

ATTENTION: Due to an unavoidable ABI change the kernel updates have
been given a new version number, which requires you to recompile and
reinstall all third party kernel modules you might have installed.
Unless you manually uninstalled the standard kernel metapackages
(e.g. linux-generic, linux-generic-lts-RELEASE, linux-virtual,
linux-powerpc), a standard system upgrade will automatically perform
this as well.

References:
https://usn.ubuntu.com/4258-1
CVE-2019-15099, CVE-2019-15291, CVE-2019-18683, CVE-2019-18885,
CVE-2019-19050, CVE-2019-19062, CVE-2019-19071, CVE-2019-19077,
CVE-2019-19078, CVE-2019-19079, CVE-2019-19082, CVE-2019-19227,
CVE-2019-19252, CVE-2019-19332, CVE-2019-19767

Package Information:
https://launchpad.net/ubuntu/+source/linux-aws-5.0/5.0.0-1024.27~18.04.1
https://launchpad.net/ubuntu/+source/linux-gcp/5.0.0-1029.30~18.04.1
https://launchpad.net/ubuntu/+source/linux-gke-5.0/5.0.0-1029.30~18.04.1
https://launchpad.net/ubuntu/+source/linux-oracle-5.0/5.0.0-1010.15~18.04.1

OpenBSD Errata: January 30th, 2020 (smtpd_exec)

Errata patches for OpenSMTPD have been released for OpenBSD 6.5 and 6.6.

An incorrect check allows an attacker to trick mbox delivery into executing
arbitrary commands as root and lmtp delivery into executing arbitrary commands
as an unprivileged user.

Binary updates for the amd64, i386, and arm64 platforms are available via
the syspatch utility. Source code patches can be found on the respective
errata page:

https://www.openbsd.org/errata65.html
https://www.openbsd.org/errata66.html

After patching, restart the smtpd service.

OpenBSD Errata: January 30th, 2020 (smtpd_tls)

Errata patches for OpenSMTPD have been released for OpenBSD 6.5 and 6.6.

smtpd can crash on opportunistic TLS downgrade, causing a denial of service.

Binary updates for the amd64, i386, and arm64 platforms are available via
the syspatch utility. Source code patches can be found on the respective
errata page:

https://www.openbsd.org/errata65.html
https://www.openbsd.org/errata66.html

After patching, restart the smtpd service.

[CentOS-announce] CESA-2020:0194 Important CentOS 7 apache-commons-beanutils Security Update

CentOS Errata and Security Advisory 2020:0194 Important

Upstream details at : https://access.redhat.com/errata/RHSA-2020:0194

The following updated files have been uploaded and are currently
syncing to the mirrors: ( sha256sum Filename )

x86_64:
8488826ee5893b6d5cbfad0c033c7290d0c3d0d0c9878d368b7ac2f52390d50f apache-commons-beanutils-1.8.3-15.el7_7.noarch.rpm
6d645a2ff7c628ebc1a48cd58ef48aa6cf2c34ec1e71157d9426fedf0bbff797 apache-commons-beanutils-javadoc-1.8.3-15.el7_7.noarch.rpm

Source:
e959ecc93b02e09ea2e16056a9d05348ceda07c6f0b48b16a2797d4e056bc067 apache-commons-beanutils-1.8.3-15.el7_7.src.rpm



--
Johnny Hughes
CentOS Project { http://www.centos.org/ }
irc: hughesjr, #centos@irc.freenode.net
Twitter: @JohnnyCentOS

_______________________________________________
CentOS-announce mailing list
CentOS-announce@centos.org
https://lists.centos.org/mailman/listinfo/centos-announce

[CentOS-announce] CESA-2020:0196 Important CentOS 7 java-1.8.0-openjdk Security Update

CentOS Errata and Security Advisory 2020:0196 Important

Upstream details at : https://access.redhat.com/errata/RHSA-2020:0196

The following updated files have been uploaded and are currently
syncing to the mirrors: ( sha256sum Filename )

x86_64:
88d099974db682900bc082401876d3b997a3e9b1e3079cfae263b954de83f281 java-1.8.0-openjdk-1.8.0.242.b08-0.el7_7.i686.rpm
1f941ed52919b04751d315f3656257cd63215ff18c9e73368d5ec6644a9d5362 java-1.8.0-openjdk-1.8.0.242.b08-0.el7_7.x86_64.rpm
188cd56fc9faaa5b4f5b0d0d2247cb9cc75b721581874932937a2a1eb8954ba7 java-1.8.0-openjdk-accessibility-1.8.0.242.b08-0.el7_7.i686.rpm
2041897b80d06086a509b4c3775456953b6e3e5b9ea624094d6872b7dd30b0f7 java-1.8.0-openjdk-accessibility-1.8.0.242.b08-0.el7_7.x86_64.rpm
1bfa03de1506f08a01080dab02759ccf479eda825e38ca8710e3aae770ba94c7 java-1.8.0-openjdk-accessibility-debug-1.8.0.242.b08-0.el7_7.i686.rpm
8144c8d8733a4ed74b87b40d42bf8d492dd3614e41a4987f22f79f25896a615b java-1.8.0-openjdk-accessibility-debug-1.8.0.242.b08-0.el7_7.x86_64.rpm
cbcd93b3db5830dbe1bf07d86d27392b67acbd09603437a3594d85efa437aeab java-1.8.0-openjdk-debug-1.8.0.242.b08-0.el7_7.i686.rpm
05aff37b96bbf034a6e33c781181d135e5bce7ac2430dba8ea6aace4df18999e java-1.8.0-openjdk-debug-1.8.0.242.b08-0.el7_7.x86_64.rpm
0ace8f91b8acb78cc66adb6cadd5775e125f2b7c44e91bc71deef874de8c51eb java-1.8.0-openjdk-demo-1.8.0.242.b08-0.el7_7.i686.rpm
9b652f42f2f5fe95cfb73e645997d2f525472950044802393e2e164df2b6b728 java-1.8.0-openjdk-demo-1.8.0.242.b08-0.el7_7.x86_64.rpm
86c36dfe76de46f3c3b286b668f3349f9d7f09ab23b10dd7e8a28e0be1d09a20 java-1.8.0-openjdk-demo-debug-1.8.0.242.b08-0.el7_7.i686.rpm
e3818f36ff4d5c51e5c5d0fa273977d74443c9c0ec63dcac72d1f33ed0e13474 java-1.8.0-openjdk-demo-debug-1.8.0.242.b08-0.el7_7.x86_64.rpm
6ebfb3c8dc24c8abee5be695f6319cc1aae23d2a6dec65f2cbc3ef5a1b71f293 java-1.8.0-openjdk-devel-1.8.0.242.b08-0.el7_7.i686.rpm
55498008f54fc83d8c798e947baef2ade4b7a0689af00427091b8e40778c369a java-1.8.0-openjdk-devel-1.8.0.242.b08-0.el7_7.x86_64.rpm
9b0fcf864931694ba25156e3abc48f62278f18243b5ee79e84333b700b87e3c8 java-1.8.0-openjdk-devel-debug-1.8.0.242.b08-0.el7_7.i686.rpm
6c4bd1c4fc50c3f9f8124563926a72f71b5013aa8b0a5fca7ce93a3034bbbd9d java-1.8.0-openjdk-devel-debug-1.8.0.242.b08-0.el7_7.x86_64.rpm
9f513f8bd9cb15d52a023e2182d4d697b819ae8e6fc055a6845044fcf1ca738a java-1.8.0-openjdk-headless-1.8.0.242.b08-0.el7_7.i686.rpm
f78767572b9e6de74ad59da1a10f6128c58000d2e3148777c626efeacacb82c8 java-1.8.0-openjdk-headless-1.8.0.242.b08-0.el7_7.x86_64.rpm
4ae4cd77e2db7fd25d5155967d5b704c4fa9e718c3ecd3ec4252bb50c5f71f1b java-1.8.0-openjdk-headless-debug-1.8.0.242.b08-0.el7_7.i686.rpm
5b78c1f73460c733bfd7674760b84dc94450ad90daf1bea259c98bb4ca528892 java-1.8.0-openjdk-headless-debug-1.8.0.242.b08-0.el7_7.x86_64.rpm
042bf4242c2613ba2ba210cdbe3cab047f476ab65d5b0f687e5148c91fefaf1e java-1.8.0-openjdk-javadoc-1.8.0.242.b08-0.el7_7.noarch.rpm
3bef58b19c246a34bb20b652ec9f285d62ce3d4ac1d79e5eb0e3b2c935339b1a java-1.8.0-openjdk-javadoc-debug-1.8.0.242.b08-0.el7_7.noarch.rpm
55a82510f69b267e13c4ab0b018975a88d951bf7ce5a70dddb5cb101a5b8e3eb java-1.8.0-openjdk-javadoc-zip-1.8.0.242.b08-0.el7_7.noarch.rpm
c746465424ee41f43e7fbb0009bb34dfb0c584eb9011f6c77f3e8a582b710307 java-1.8.0-openjdk-javadoc-zip-debug-1.8.0.242.b08-0.el7_7.noarch.rpm
42d4a64d57ee16a46c38702a26c00f600e6203def7d9e45977b621152a30809a java-1.8.0-openjdk-src-1.8.0.242.b08-0.el7_7.i686.rpm
95e3bd8099009053d6b1f9e4a8bc4e832481aba2869a033af8bd663bfb2005da java-1.8.0-openjdk-src-1.8.0.242.b08-0.el7_7.x86_64.rpm
05e3936a61c6f03426775c3fa55ade58888c05055af4ff20e588f77c3a1e4980 java-1.8.0-openjdk-src-debug-1.8.0.242.b08-0.el7_7.i686.rpm
2d58c44d5a533c1189e90c7ad63a5f7aa548c3bd41a80478fdd1fac5b835f8e3 java-1.8.0-openjdk-src-debug-1.8.0.242.b08-0.el7_7.x86_64.rpm

Source:
f3750eaab84baf895e73a10aba5db1bc96b3d55b428f3e7cfaff027740329a74 java-1.8.0-openjdk-1.8.0.242.b08-0.el7_7.src.rpm



--
Johnny Hughes
CentOS Project { http://www.centos.org/ }
irc: hughesjr, #centos@irc.freenode.net
Twitter: @JohnnyCentOS

_______________________________________________
CentOS-announce mailing list
CentOS-announce@centos.org
https://lists.centos.org/mailman/listinfo/centos-announce

[CentOS-announce] CESA-2020:0227 Important CentOS 7 sqlite Security Update

CentOS Errata and Security Advisory 2020:0227 Important

Upstream details at : https://access.redhat.com/errata/RHSA-2020:0227

The following updated files have been uploaded and are currently
syncing to the mirrors: ( sha256sum Filename )

x86_64:
4e7b3e26e7960631fa1b70b58d3d363b51b0f9bee514cdd277c377750d976dd1 lemon-3.7.17-8.el7_7.1.x86_64.rpm
23aba566842009e5b1de0da13d18652ba0df4250af61b62d2c0cd1109f1c75d1 sqlite-3.7.17-8.el7_7.1.i686.rpm
93ffb0eb1e297c35cee76add2e583efb990da702684bbfaa6b159494d135d99c sqlite-3.7.17-8.el7_7.1.x86_64.rpm
6554b5e46e91ee97bf642410ec76875992977eb9dad4254dbb55c3bd2fc01a57 sqlite-devel-3.7.17-8.el7_7.1.i686.rpm
2e18ccbbe43bfc5e231905366f832521949f4a024195446e59a1aee0cddd7042 sqlite-devel-3.7.17-8.el7_7.1.x86_64.rpm
6b864973ac3bf2be39a3204e4459ffbbd42516c33b578c641e9dcce76babe5d8 sqlite-doc-3.7.17-8.el7_7.1.noarch.rpm
067c535a324cb6e39251099946ca9d6912b145f37935c0a76c4f7824fce5e596 sqlite-tcl-3.7.17-8.el7_7.1.x86_64.rpm

Source:
d490052987332d5ac1a765245aa0b634b17928f3d48dd301680ba47dc1f69828 sqlite-3.7.17-8.el7_7.1.src.rpm



--
Johnny Hughes
CentOS Project { http://www.centos.org/ }
irc: hughesjr, #centos@irc.freenode.net
Twitter: @JohnnyCentOS

_______________________________________________
CentOS-announce mailing list
CentOS-announce@centos.org
https://lists.centos.org/mailman/listinfo/centos-announce

[CentOS-announce] CESA-2020:0203 Important CentOS 7 libarchive Security Update

CentOS Errata and Security Advisory 2020:0203 Important

Upstream details at : https://access.redhat.com/errata/RHSA-2020:0203

The following updated files have been uploaded and are currently
syncing to the mirrors: ( sha256sum Filename )

x86_64:
67b204db1b3c2174656dfb95b88b93b80586abbc26efa6fc2ff58e385106f076 bsdcpio-3.1.2-14.el7_7.x86_64.rpm
89208eec521abee72a76bed88812b215371a02de38c5e6c438ecda3aff7adf45 bsdtar-3.1.2-14.el7_7.x86_64.rpm
96d1410b03acd27790d6cdfc9b8622c7cf331e4c6e747ad91117914a533b5ebc libarchive-3.1.2-14.el7_7.i686.rpm
1a66ff826c1898d606570208e92fb71c18e35a376151b91c860cbc295efb9733 libarchive-3.1.2-14.el7_7.x86_64.rpm
9fb64954aa54d13e1b694ed8543cd1641be6cfda2d660963fbfd111b4f3a8396 libarchive-devel-3.1.2-14.el7_7.i686.rpm
d818acd1870806fbf7dc52141e1c0264cb061ad8f77ce62244e28626116810c1 libarchive-devel-3.1.2-14.el7_7.x86_64.rpm

Source:
1186a66de2849483ae9c5f33cd9b2aa2d44a860c95f7a258870fdafb1c92a581 libarchive-3.1.2-14.el7_7.src.rpm



--
Johnny Hughes
CentOS Project { http://www.centos.org/ }
irc: hughesjr, #centos@irc.freenode.net
Twitter: @JohnnyCentOS

_______________________________________________
CentOS-announce mailing list
CentOS-announce@centos.org
https://lists.centos.org/mailman/listinfo/centos-announce

[CentOS-announce] CESA-2020:0195 Important CentOS 7 python-reportlab Security Update

CentOS Errata and Security Advisory 2020:0195 Important

Upstream details at : https://access.redhat.com/errata/RHSA-2020:0195

The following updated files have been uploaded and are currently
syncing to the mirrors: ( sha256sum Filename )

x86_64:
632ea80e6506f4b9a35f65a9bbfc353985e866ce8aa801c27fe0a4720f260ed9 python-reportlab-2.5-9.el7_7.1.x86_64.rpm
847900300c3e2c3b73ddbeaffd20b4cd2612daa23c2bd052e9b008dbe3bbff8f python-reportlab-docs-2.5-9.el7_7.1.x86_64.rpm

Source:
19ebda4fcae3fa7f81c99cd6befd81d128a6dfc7b0d8e52d03a40cbe24dbc299 python-reportlab-2.5-9.el7_7.1.src.rpm



--
Johnny Hughes
CentOS Project { http://www.centos.org/ }
irc: hughesjr, #centos@irc.freenode.net
Twitter: @JohnnyCentOS

_______________________________________________
CentOS-announce mailing list
CentOS-announce@centos.org
https://lists.centos.org/mailman/listinfo/centos-announce

[CentOS-announce] CESA-2020:0262 Important CentOS 7 openjpeg2 Security Update

CentOS Errata and Security Advisory 2020:0262 Important

Upstream details at : https://access.redhat.com/errata/RHSA-2020:0262

The following updated files have been uploaded and are currently
syncing to the mirrors: ( sha256sum Filename )

x86_64:
faf834e0d3b22f84e49fab5e7025316946f85d59474c89c9d74033f6b05b0f61 openjpeg2-2.3.1-2.el7_7.i686.rpm
ca0dba97c2e4a6c4e7187e3e82ce5c145a7fb36220481a6bf0bdb8d596edd2ab openjpeg2-2.3.1-2.el7_7.x86_64.rpm
44afb1ee36b20d795d8ca363607b28f308a9b1c8df287a0f50be8635362d72e6 openjpeg2-devel-2.3.1-2.el7_7.i686.rpm
a1fcc42bd618bda608935baf065a4fae280bb0a3c00e5d9b97a93145726087dd openjpeg2-devel-2.3.1-2.el7_7.x86_64.rpm
335ce40d0677e452ebf0c4fa34209c76a312131f0026d8378576357e9eb67420 openjpeg2-devel-docs-2.3.1-2.el7_7.noarch.rpm
1946b8d48b293003492444f27a4c1af9cfd6e7a38813c10c4f9ceb8cc9bdd677 openjpeg2-tools-2.3.1-2.el7_7.i686.rpm
74f53bc4bab5c14fd9616989833d36c30a9bd12d7624071df7d35da90b3d56ac openjpeg2-tools-2.3.1-2.el7_7.x86_64.rpm

Source:
7a4c836c04affff74a3ed6249c061f13e965b37bfe594c12039cde42230264d5 openjpeg2-2.3.1-2.el7_7.src.rpm



--
Johnny Hughes
CentOS Project { http://www.centos.org/ }
irc: hughesjr, #centos@irc.freenode.net
Twitter: @JohnnyCentOS

_______________________________________________
CentOS-announce mailing list
CentOS-announce@centos.org
https://lists.centos.org/mailman/listinfo/centos-announce

[CentOS-announce] CEBA-2020:0256 CentOS 6 kernel BugFix Update

CentOS Errata and Bugfix Advisory 2020:0256

Upstream details at : https://access.redhat.com/errata/RHBA-2020:0256

The following updated files have been uploaded and are currently
syncing to the mirrors: ( sha256sum Filename )

i386:
a9adc9d1430929a6c58e204eb8f518ea4d62fd90cfc2622f994cf3ea5c9e7bcc kernel-2.6.32-754.27.1.el6.i686.rpm
216208a0a5b7e6d7b930a32578d817c70262638df21e9691b897425c69cde7e1 kernel-abi-whitelists-2.6.32-754.27.1.el6.noarch.rpm
a7df0d0194d5fc5c8fbeb0d1ff6c7c2057d7c08e98ccfba891460caa35416b1f kernel-debug-2.6.32-754.27.1.el6.i686.rpm
af21d47014d02d44f17910769801a411f254d6c78e89cc2e3c7a5812ce325073 kernel-debug-devel-2.6.32-754.27.1.el6.i686.rpm
e86634122f623315eec50867f57e135f3142e90b3e22c748ffb6843adbd08581 kernel-devel-2.6.32-754.27.1.el6.i686.rpm
d51d65174087aa67ed700d91ed84604d8cbd2b9d418265bc5d220df45d16c5f7 kernel-doc-2.6.32-754.27.1.el6.noarch.rpm
c30886d4ca2a3af1c3b4119ff0009886955a9328072b36c7dd0914ca0420fd09 kernel-firmware-2.6.32-754.27.1.el6.noarch.rpm
42b477e3dc9d2e86d0964bd149c559b45f5298605b247a216f54439f587d9278 kernel-headers-2.6.32-754.27.1.el6.i686.rpm
7d2117159a0d352455619fc6da016c62fc7f199df489f725730038c3365d9221 perf-2.6.32-754.27.1.el6.i686.rpm
23124827f04ee46996c43a518bb8add6d659517f2ce559d6b95c0159b5e34a47 python-perf-2.6.32-754.27.1.el6.i686.rpm

x86_64:
b4c9b6b23a5c9f2b039ea361bede9cbb8326b1d72c969fc5e98b350fe51e8fa0 kernel-2.6.32-754.27.1.el6.x86_64.rpm
216208a0a5b7e6d7b930a32578d817c70262638df21e9691b897425c69cde7e1 kernel-abi-whitelists-2.6.32-754.27.1.el6.noarch.rpm
e1e55b9273e5c407265fac22046e44efd6e0c391c132cba9ff507ea65dad317d kernel-debug-2.6.32-754.27.1.el6.x86_64.rpm
af21d47014d02d44f17910769801a411f254d6c78e89cc2e3c7a5812ce325073 kernel-debug-devel-2.6.32-754.27.1.el6.i686.rpm
bd802bba2b92025ddef7d94add85f5b4ea1d8b461179c0e1a9c0d76ddf9b2fa2 kernel-debug-devel-2.6.32-754.27.1.el6.x86_64.rpm
de33734a27b302c1ef5d3e67e7a5f97651fa8e97b2db734fb9b95b0b1713236f kernel-devel-2.6.32-754.27.1.el6.x86_64.rpm
d51d65174087aa67ed700d91ed84604d8cbd2b9d418265bc5d220df45d16c5f7 kernel-doc-2.6.32-754.27.1.el6.noarch.rpm
c30886d4ca2a3af1c3b4119ff0009886955a9328072b36c7dd0914ca0420fd09 kernel-firmware-2.6.32-754.27.1.el6.noarch.rpm
a9a3b0b989c824df6e0d458f7538237adf936eef5708a91476f52a60b21f7605 kernel-headers-2.6.32-754.27.1.el6.x86_64.rpm
6e4f9fcb9191da7a328b5f77f4d1e545935f8b91e56a2c908c0c16b8c1451e73 perf-2.6.32-754.27.1.el6.x86_64.rpm
93bb07db3eb08c51a0e50357c9c854f03bbc070d38f95f334692dc868998cc24 python-perf-2.6.32-754.27.1.el6.x86_64.rpm

Source:
4976ac2af48fe4df67b7ad6a3b6bdb14e300bba37d499967947217ced2cd4616 kernel-2.6.32-754.27.1.el6.src.rpm



--
Johnny Hughes
CentOS Project { http://www.centos.org/ }
irc: hughesjr, #centos@irc.freenode.net
Twitter: @JohnnyCentOS

_______________________________________________
CentOS-announce mailing list
CentOS-announce@centos.org
https://lists.centos.org/mailman/listinfo/centos-announce

[CentOS-announce] CEBA-2020:0257 CentOS 6 libreswan BugFix Update

CentOS Errata and Bugfix Advisory 2020:0257

Upstream details at : https://access.redhat.com/errata/RHBA-2020:0257

The following updated files have been uploaded and are currently
syncing to the mirrors: ( sha256sum Filename )

i386:
2d6bf8c42bfd0e04076fe42afed24d4456f524ee09d17e32271381f6c7994534 libreswan-3.15-9.el6_10.i686.rpm

x86_64:
9bd9727a83f41e02e646e6a09f7546aba913f2ed4570d208af00d41833771a6f libreswan-3.15-9.el6_10.x86_64.rpm

Source:
1a68b8f2f23b1f53e13e9e62fe0f8d152f49adb12df8aa12dbf29209d426dcf1 libreswan-3.15-9.el6_10.src.rpm



--
Johnny Hughes
CentOS Project { http://www.centos.org/ }
irc: hughesjr, #centos@irc.freenode.net
Twitter: @JohnnyCentOS

_______________________________________________
CentOS-announce mailing list
CentOS-announce@centos.org
https://lists.centos.org/mailman/listinfo/centos-announce

[CentOS-announce] CEBA-2020:0255 CentOS 6 poppler BugFix Update

CentOS Errata and Bugfix Advisory 2020:0255

Upstream details at : https://access.redhat.com/errata/RHBA-2020:0255

The following updated files have been uploaded and are currently
syncing to the mirrors: ( sha256sum Filename )

i386:
123572152351b684e6e916ff84a4ec8fdb161c05d05edced883d375aae38c837 poppler-0.12.4-12.el6_10.1.i686.rpm
6b8b0aa0dcdd9c1949d49e09112b3ec8704c4fe1bd3394576c32d244d6dfd358 poppler-devel-0.12.4-12.el6_10.1.i686.rpm
c1d6eceed5593bfcd25a2c6fbfc579fb61a6d96fa7b7cfe6fe4816b8702805c0 poppler-glib-0.12.4-12.el6_10.1.i686.rpm
1082e337b1ea37c34ab4ca4cc4b130fe08cf4a711a26292bf272b1c5545798f6 poppler-glib-devel-0.12.4-12.el6_10.1.i686.rpm
d2f6b6c295ead553dfd7076ee79b5d41da00f17a5de7d0093820656d6022c3cc poppler-qt-0.12.4-12.el6_10.1.i686.rpm
b0756af7fa33c7aebc02d74606274965ba1e0e08c685ad1700fa5932734b578e poppler-qt4-0.12.4-12.el6_10.1.i686.rpm
d31f1b1c6579bdb92f615072f23051ec962d47bf29893aa8795a26cec4db596a poppler-qt4-devel-0.12.4-12.el6_10.1.i686.rpm
53566f53c568f5854d13d6cfe7599460a6ce198add3928873403289bb1e794cd poppler-qt-devel-0.12.4-12.el6_10.1.i686.rpm
7a62ee1ef97786daae93b0e16b0ef2d8c7680e71e0adab2e38c5b0944fb26041 poppler-utils-0.12.4-12.el6_10.1.i686.rpm

x86_64:
123572152351b684e6e916ff84a4ec8fdb161c05d05edced883d375aae38c837 poppler-0.12.4-12.el6_10.1.i686.rpm
72828a61fff262ad03a949b86ebabf0f9a4eaf76922bf8ee39803320c3e06f35 poppler-0.12.4-12.el6_10.1.x86_64.rpm
6b8b0aa0dcdd9c1949d49e09112b3ec8704c4fe1bd3394576c32d244d6dfd358 poppler-devel-0.12.4-12.el6_10.1.i686.rpm
5cb1e08c9b4a88b93e537b678519e8e44ae3438e4c57991f0e6465e2fc4bd6fc poppler-devel-0.12.4-12.el6_10.1.x86_64.rpm
c1d6eceed5593bfcd25a2c6fbfc579fb61a6d96fa7b7cfe6fe4816b8702805c0 poppler-glib-0.12.4-12.el6_10.1.i686.rpm
ebd0fe42650edeb6159e5cd50b644126f4d297af767bf3de4bc6a807d8dcba82 poppler-glib-0.12.4-12.el6_10.1.x86_64.rpm
1082e337b1ea37c34ab4ca4cc4b130fe08cf4a711a26292bf272b1c5545798f6 poppler-glib-devel-0.12.4-12.el6_10.1.i686.rpm
dc4decdf2bd3121acd00efaaf0c2e3396286883b5ac2a96e7230a1f207e7f064 poppler-glib-devel-0.12.4-12.el6_10.1.x86_64.rpm
d2f6b6c295ead553dfd7076ee79b5d41da00f17a5de7d0093820656d6022c3cc poppler-qt-0.12.4-12.el6_10.1.i686.rpm
8a6e6eb7d2cc1a41a4efa9b9713d739fcc2056a1bf3de87e474dfa37181b63d8 poppler-qt-0.12.4-12.el6_10.1.x86_64.rpm
b0756af7fa33c7aebc02d74606274965ba1e0e08c685ad1700fa5932734b578e poppler-qt4-0.12.4-12.el6_10.1.i686.rpm
16f3ea32a06aa2653d4b9a56c0cc29117d0106d95098efc25643fcc469df11e6 poppler-qt4-0.12.4-12.el6_10.1.x86_64.rpm
d31f1b1c6579bdb92f615072f23051ec962d47bf29893aa8795a26cec4db596a poppler-qt4-devel-0.12.4-12.el6_10.1.i686.rpm
fdc787fda8b937b92cc3af8492b3eb48712688d59cfc9855abd08ad0c9e9adc2 poppler-qt4-devel-0.12.4-12.el6_10.1.x86_64.rpm
53566f53c568f5854d13d6cfe7599460a6ce198add3928873403289bb1e794cd poppler-qt-devel-0.12.4-12.el6_10.1.i686.rpm
6d537d01d9db1f921dc5277f569553a19f73fcad460de95de0f8d2152537a813 poppler-qt-devel-0.12.4-12.el6_10.1.x86_64.rpm
3fc2580af38efecabd9dc34fee0a6ebfbd02340ffef4e3b6dbfdece66ff65c5e poppler-utils-0.12.4-12.el6_10.1.x86_64.rpm

Source:
db2370d990c782aa467b18da286848c6100b4cba33870a2107ee937a4a1bdde1 poppler-0.12.4-12.el6_10.1.src.rpm



--
Johnny Hughes
CentOS Project { http://www.centos.org/ }
irc: hughesjr, #centos@irc.freenode.net
Twitter: @JohnnyCentOS

_______________________________________________
CentOS-announce mailing list
CentOS-announce@centos.org
https://lists.centos.org/mailman/listinfo/centos-announce

[CentOS-announce] CESA-2020:0197 Important CentOS 6 python-reportlab Security Update

CentOS Errata and Security Advisory 2020:0197 Important

Upstream details at : https://access.redhat.com/errata/RHSA-2020:0197

The following updated files have been uploaded and are currently
syncing to the mirrors: ( sha256sum Filename )

i386:
10e384f6cae23d460beb64b2c0547698c51735e8b37f5faec2500c4326f256cb python-reportlab-2.3-3.el6_10.1.i686.rpm
b4ac741c80a61e7ea1e883553585d674330297516781269df461173a1f393844 python-reportlab-docs-2.3-3.el6_10.1.noarch.rpm

x86_64:
ca3e88351d9bd5b4d4fb6ddda73c0e26bd7efc27524f38e30787f79b11bd0856 python-reportlab-2.3-3.el6_10.1.x86_64.rpm
b4ac741c80a61e7ea1e883553585d674330297516781269df461173a1f393844 python-reportlab-docs-2.3-3.el6_10.1.noarch.rpm

Source:
e4ccb9e6c4a70c5753283d3672c92b70ca71a5efca5c97df78b7e51a17ed78c7 python-reportlab-2.3-3.el6_10.1.src.rpm



--
Johnny Hughes
CentOS Project { http://www.centos.org/ }
irc: hughesjr, #centos@irc.freenode.net
Twitter: @JohnnyCentOS

_______________________________________________
CentOS-announce mailing list
CentOS-announce@centos.org
https://lists.centos.org/mailman/listinfo/centos-announce

[CentOS-announce] CESA-2020:0199 Critical CentOS 6 openslp Security Update

CentOS Errata and Security Advisory 2020:0199 Critical

Upstream details at : https://access.redhat.com/errata/RHSA-2020:0199

The following updated files have been uploaded and are currently
syncing to the mirrors: ( sha256sum Filename )

i386:
01c62b8aff92678750af0ee740fe9751ea72bedbce518f6a8343274175500ca3 openslp-2.0.0-4.el6_10.i686.rpm
d7ecbbf297d043a9e927ab2db21ebb752686242cbf7ccb3c7e25dd063b48c403 openslp-devel-2.0.0-4.el6_10.i686.rpm
46b578a89258772fb98092e038b5148f1dc3ab7d69e2e2ae0f03c27fdb42650e openslp-server-2.0.0-4.el6_10.i686.rpm

x86_64:
01c62b8aff92678750af0ee740fe9751ea72bedbce518f6a8343274175500ca3 openslp-2.0.0-4.el6_10.i686.rpm
ef962fe8591ba8ea125a72739348ae69748326147e6a4a76f37f017a36c6b7bc openslp-2.0.0-4.el6_10.x86_64.rpm
d7ecbbf297d043a9e927ab2db21ebb752686242cbf7ccb3c7e25dd063b48c403 openslp-devel-2.0.0-4.el6_10.i686.rpm
61549ced3795b0ee5feb10a8c1134c3d3dc5d8e1a943cb6c7694f14c5b1c434f openslp-devel-2.0.0-4.el6_10.x86_64.rpm
c6a29e45de9587febdec09d73110423e33cd3b489443426b26016e92f8968b40 openslp-server-2.0.0-4.el6_10.x86_64.rpm

Source:
7a80b3f7cd75c87b17ec227e93b2b39a4a7cf587c12bd0f2765a2bb421f2b1c3 openslp-2.0.0-4.el6_10.src.rpm



--
Johnny Hughes
CentOS Project { http://www.centos.org/ }
irc: hughesjr, #centos@irc.freenode.net
Twitter: @JohnnyCentOS

_______________________________________________
CentOS-announce mailing list
CentOS-announce@centos.org
https://lists.centos.org/mailman/listinfo/centos-announce

[CentOS-announce] CESA-2020:0157 Important CentOS 6 java-1.8.0-openjdk Security Update

CentOS Errata and Security Advisory 2020:0157 Important

Upstream details at : https://access.redhat.com/errata/RHSA-2020:0157

The following updated files have been uploaded and are currently
syncing to the mirrors: ( sha256sum Filename )

i386:
160e391e5d12a54047da4ffa40e3797e870e96e64be8161852a6c5bc90f8e71b java-1.8.0-openjdk-1.8.0.242.b07-1.el6_10.i686.rpm
8a073140cdfcbe94589563ec66e923debe94e60581f767336b59e7f800be19f5 java-1.8.0-openjdk-debug-1.8.0.242.b07-1.el6_10.i686.rpm
27d8d994472c8bc17a778effd95bd14fe77a816cdf7b843ddb75e374fa9f3bc4 java-1.8.0-openjdk-demo-1.8.0.242.b07-1.el6_10.i686.rpm
8b16efb098066651e70c4b8dc9aefdf77f783895a50fa5d0eedfd27bf92f9fe7 java-1.8.0-openjdk-demo-debug-1.8.0.242.b07-1.el6_10.i686.rpm
332f068e669b5aa63d6a4bb8c1a6d737f5195174dc2df2d24a175303c3049b86 java-1.8.0-openjdk-devel-1.8.0.242.b07-1.el6_10.i686.rpm
a9f6d24d50a529b764a3e85b72a044049307f001a27a06ed0f3b4122bd4b97af java-1.8.0-openjdk-devel-debug-1.8.0.242.b07-1.el6_10.i686.rpm
099f6fc643e8efeddb72116bb5a496ba4e011896eb5fa2eb64f03d68bf83142c java-1.8.0-openjdk-headless-1.8.0.242.b07-1.el6_10.i686.rpm
0d9c2d570953ebb812c0fe5707399d81da1eac03da4f13cd64e2c6bfd57081c9 java-1.8.0-openjdk-headless-debug-1.8.0.242.b07-1.el6_10.i686.rpm
ad347216349d88737a257abb1148868b46c9573e9f496adbb1a4697bc5c383b4 java-1.8.0-openjdk-javadoc-1.8.0.242.b07-1.el6_10.noarch.rpm
ef223881757a2facd840627b93b32256e7156ecec01c2466c8f9ff61ec078005 java-1.8.0-openjdk-javadoc-debug-1.8.0.242.b07-1.el6_10.noarch.rpm
e27fc2105bf01285245c63f8f22d76a0905c81b92c518018525fca09f61eb84f java-1.8.0-openjdk-src-1.8.0.242.b07-1.el6_10.i686.rpm
841bdc7523687b427ba2122d6a288dabcc8d721e9ae500c4193ae4aecae64fb5 java-1.8.0-openjdk-src-debug-1.8.0.242.b07-1.el6_10.i686.rpm

x86_64:
a747a1f6798d760a1f61aa0eb0a7624f437ded3f24862471725d5a84a1d443f1 java-1.8.0-openjdk-1.8.0.242.b07-1.el6_10.x86_64.rpm
a57d85e5299abe89745a6795d026570a780dbd5f67e26d69d35d091e5aa59ab0 java-1.8.0-openjdk-debug-1.8.0.242.b07-1.el6_10.x86_64.rpm
a15f0acd7d8e1f9d71880398936ea038dcb0cb6a71a89eef8aa83b31c922ba25 java-1.8.0-openjdk-demo-1.8.0.242.b07-1.el6_10.x86_64.rpm
979e6cb9eb21b4f361965f97eba4ad96da4b3b07f67e05f29eef25b430c8805a java-1.8.0-openjdk-demo-debug-1.8.0.242.b07-1.el6_10.x86_64.rpm
40822874cd2d8a766068776e2fd2d032de16fe9d29aab90a0110cc137f98650b java-1.8.0-openjdk-devel-1.8.0.242.b07-1.el6_10.x86_64.rpm
45b0fe8653c245c9562f3be7f35d8fad4d0f92108ef37656949f982e28cd07ce java-1.8.0-openjdk-devel-debug-1.8.0.242.b07-1.el6_10.x86_64.rpm
1b2fa9dbaf7e91a673c3ebfa89280dc4c141999b9890ebdb41bdaf54fdb78b95 java-1.8.0-openjdk-headless-1.8.0.242.b07-1.el6_10.x86_64.rpm
824fd933f82bb322575360b53e8bbe9b9407c70a2e6b2a9a0304be87e0383209 java-1.8.0-openjdk-headless-debug-1.8.0.242.b07-1.el6_10.x86_64.rpm
ad347216349d88737a257abb1148868b46c9573e9f496adbb1a4697bc5c383b4 java-1.8.0-openjdk-javadoc-1.8.0.242.b07-1.el6_10.noarch.rpm
ef223881757a2facd840627b93b32256e7156ecec01c2466c8f9ff61ec078005 java-1.8.0-openjdk-javadoc-debug-1.8.0.242.b07-1.el6_10.noarch.rpm
52d5a0270aa252f75caa5cf94bcb8307b80418d381fe19f2931114bcf4c9cb98 java-1.8.0-openjdk-src-1.8.0.242.b07-1.el6_10.x86_64.rpm
168f83059d822c10a2addca314af517321ccdd6b47e4a6696e4824e215c3070f java-1.8.0-openjdk-src-debug-1.8.0.242.b07-1.el6_10.x86_64.rpm

Source:
86a192a99c523eef8ee9a8d42ffd58cca498428fafa41ba02f17b48e99fa5a50 java-1.8.0-openjdk-1.8.0.242.b07-1.el6_10.src.rpm



--
Johnny Hughes
CentOS Project { http://www.centos.org/ }
irc: hughesjr, #centos@irc.freenode.net
Twitter: @JohnnyCentOS

_______________________________________________
CentOS-announce mailing list
CentOS-announce@centos.org
https://lists.centos.org/mailman/listinfo/centos-announce

[USN-4257-1] OpenJDK vulnerabilities

==========================================================================
Ubuntu Security Notice USN-4257-1
January 28, 2020

openjdk-8, openjdk-lts vulnerabilities
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 19.10
- Ubuntu 18.04 LTS
- Ubuntu 16.04 LTS

Summary:

Several security issues were fixed in OpenJDK.

Software Description:
- openjdk-8: Open Source Java implementation
- openjdk-lts: Open Source Java implementation

Details:

It was discovered that OpenJDK incorrectly handled exceptions during
deserialization in BeanContextSupport. An attacker could possibly use this
issue to cause a denial of service or other unspecified impact.
(CVE-2020-2583)

It was discovered that OpenJDK incorrectly validated properties of SASL
messages included in Kerberos GSSAPI. An unauthenticated remote attacker
with network access via Kerberos could possibly use this issue to insert,
modify or obtain sensitive information. (CVE-2020-2590)

It was discovered that OpenJDK incorrectly validated URLs. An attacker
could possibly use this issue to insert, edit or obtain sensitive
information. (CVE-2020-2593)

It was discovered that OpenJDK Security component still used MD5 algorithm.
A remote attacker could possibly use this issue to obtain sensitive
information. (CVE-2020-2601)

It was discovered that OpenJDK incorrectly handled the application of
serialization filters. An attacker could possibly use this issue to bypass the
intended filter during serialization. (CVE-2020-2604)

Bo Zhang and Long Kuan discovered that OpenJDK incorrectly handled X.509
certificates. An attacker could possibly use this issue to cause a denial
of service. (CVE-2020-2654)

Bengt Jonsson, Juraj Somorovsky, Kostis Sagonas, Paul Fiterau Brostean and
Robert Merget discovered that OpenJDK incorrectly handled CertificateVerify
TLS handshake messages. A remote attacker could possibly use this issue to
insert, edit or obtain sensitive information. This issue only affected
OpenJDK 11. (CVE-2020-2655)

It was discovered that OpenJDK incorrectly enforced the limit of datagram
sockets that can be created by a code running within a Java sandbox. An
attacker could possibly use this issue to bypass the sandbox restrictions
causing a denial of service. This issue only affected OpenJDK 8.
(CVE-2020-2659)

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 19.10:
openjdk-11-jdk 11.0.6+10-1ubuntu1~19.10.1
openjdk-11-jre 11.0.6+10-1ubuntu1~19.10.1
openjdk-11-jre-headless 11.0.6+10-1ubuntu1~19.10.1
openjdk-11-jre-zero 11.0.6+10-1ubuntu1~19.10.1
openjdk-8-jdk 8u242-b08-0ubuntu3~19.10
openjdk-8-jre 8u242-b08-0ubuntu3~19.10
openjdk-8-jre-headless 8u242-b08-0ubuntu3~19.10
openjdk-8-jre-zero 8u242-b08-0ubuntu3~19.10

Ubuntu 18.04 LTS:
openjdk-11-jdk 11.0.6+10-1ubuntu1~18.04.1
openjdk-11-jre 11.0.6+10-1ubuntu1~18.04.1
openjdk-11-jre-headless 11.0.6+10-1ubuntu1~18.04.1
openjdk-11-jre-zero 11.0.6+10-1ubuntu1~18.04.1
openjdk-8-jdk 8u242-b08-0ubuntu3~18.04
openjdk-8-jre 8u242-b08-0ubuntu3~18.04
openjdk-8-jre-headless 8u242-b08-0ubuntu3~18.04
openjdk-8-jre-zero 8u242-b08-0ubuntu3~18.04

Ubuntu 16.04 LTS:
openjdk-8-jdk 8u242-b08-0ubuntu3~16.04
openjdk-8-jre 8u242-b08-0ubuntu3~16.04
openjdk-8-jre-headless 8u242-b08-0ubuntu3~16.04
openjdk-8-jre-jamvm 8u242-b08-0ubuntu3~16.04
openjdk-8-jre-zero 8u242-b08-0ubuntu3~16.04

This update uses a new upstream release, which includes additional bug
fixes. After a standard system update you need to restart any Java
applications or applets to make all the necessary changes.

References:
https://usn.ubuntu.com/4257-1
CVE-2020-2583, CVE-2020-2590, CVE-2020-2593, CVE-2020-2601,
CVE-2020-2604, CVE-2020-2654, CVE-2020-2655, CVE-2020-2659

Package Information:
https://launchpad.net/ubuntu/+source/openjdk-8/8u242-b08-0ubuntu3~19.10
https://launchpad.net/ubuntu/+source/openjdk-lts/11.0.6+10-1ubuntu1~19.10.1
https://launchpad.net/ubuntu/+source/openjdk-8/8u242-b08-0ubuntu3~18.04
https://launchpad.net/ubuntu/+source/openjdk-lts/11.0.6+10-1ubuntu1~18.04.1
https://launchpad.net/ubuntu/+source/openjdk-8/8u242-b08-0ubuntu3~16.04

[FreeBSD-Announce] FreeBSD Errata Notice FreeBSD-EN-20:02.nmount

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

=============================================================================
FreeBSD-EN-20:02.nmount Errata Notice
The FreeBSD Project

Topic: nmount invalid pointer dereference

Category: core
Module: kernel
Announced: 2020-01-28
Credits: Andrew Turner
Affects: FreeBSD 11.3 and FreeBSD 12.0.
Corrected: 2019-10-03 07:17:26 UTC (stable/12, 12.1-STABLE)
2019-10-04 14:10:56 UTC (releng/12.1, 12.1-RELEASE)
2020-01-28 18:54:15 UTC (releng/12.0, 12.0-RELEASE-p13)
2019-10-04 17:27:49 UTC (stable/11, 11.3-STABLE)
2020-01-28 18:54:15 UTC (releng/11.3, 11.3-RELEASE-p6)

For general information regarding FreeBSD Errata Notices and Security
Advisories, including descriptions of the fields above, security
branches, and the following sections, please visit
<URL:https://security.FreeBSD.org/>.

I. Background

The nmount(2) system call is used to mount file systems.

II. Problem Description

VFS option processing related to the nmount(2) system call was missing a
length check. This is generally only available to privileged users unless
the vfs.usermount sysctl is changed from the default to allow non-privileged
users the ability to mount file systems.

III. Impact

A userland process authorized to mount filesystems can possibly trigger a
kernel panic.

IV. Workaround

No workaround is available. However, if the vfs.usermount sysctl has been
changed to allow non-privileged users the ability to mount file systems,
switching back to the default value of 0 will prevent non-privileged users
from triggering the issue.

V. Solution

Upgrade your system to a supported FreeBSD stable or release / security
branch (releng) dated after the correction date, and reboot.

Perform one of the following:

1) To update your system via a binary patch:

Systems running a RELEASE version of FreeBSD on the i386 or amd64
platforms can be updated via the freebsd-update(8) utility:

# freebsd-update fetch
# freebsd-update install
# shutdown -r +10min "Rebooting for an errata update"

2) To update your system via a source code patch:

The following patches have been verified to apply to the applicable
FreeBSD release branches.

a) Download the relevant patch from the location below, and verify the
detached PGP signature using your PGP utility.

# fetch https://security.FreeBSD.org/patches/EN-20:02/nmount.patch
# fetch https://security.FreeBSD.org/patches/EN-20:02/nmount.patch.asc
# gpg --verify nmount.patch.asc

b) Apply the patch. Execute the following commands as root:

# cd /usr/src
# patch < /path/to/patch

c) Recompile your kernel as described in
<URL:https://www.FreeBSD.org/handbook/kernelconfig.html> and reboot the
system.

VI. Correction details

The following list contains the correction revision numbers for each
affected branch.

Branch/path Revision
- -------------------------------------------------------------------------
stable/12/ r353032
releng/12.1/ r353104
releng/12.0/ r357216
stable/11/ r353109
releng/11.3/ r357216
- -------------------------------------------------------------------------

To see which files were modified by a particular revision, run the
following command, replacing NNNNNN with the revision number, on a
machine with Subversion installed:

# svn diff -cNNNNNN --summarize svn://svn.freebsd.org/base

Or visit the following URL, replacing NNNNNN with the revision number:

<URL:https://svnweb.freebsd.org/base?view=revision&revision=NNNNNN>

VII. References

The latest revision of this advisory is available at
<URL:https://security.FreeBSD.org/advisories/FreeBSD-EN-20:02.nmount.asc>
-----BEGIN PGP SIGNATURE-----

iQKTBAEBCgB9FiEE/A6HiuWv54gCjWNV05eS9J6n5cIFAl4whcpfFIAAAAAALgAo
aXNzdWVyLWZwckBub3RhdGlvbnMub3BlbnBncC5maWZ0aGhvcnNlbWFuLm5ldEZD
MEU4NzhBRTVBRkU3ODgwMjhENjM1NUQzOTc5MkY0OUVBN0U1QzIACgkQ05eS9J6n
5cJWUQ//UZtfZZXpkmLYet67qmbIj7uLbw9CDc1N5HRwNgnjTDGc4d5o3BQEAr2X
/q1t8US3Ec/rWm5YqzqRNmt+Uei/F7J2u1udRm56vsPPb+eq8tRiRVK6RYY4FYBj
rxPkxf6nNCTqWELFtmQejnCQ0wN2Oy+oNY3fA1j1GzOHm0S7dc9CnlrE75eDX33q
sXezm6/VYRwyKGKEJUMlmn9gn0qzGr3L9go5TCWDw9lhuJoygE/QblnVTQI5mTDv
khjke28RxLkAkOUMvq8EIq1L9j88FeVWEOMIKU2xgaUvh6z6NQE8o6eKTb4D7mDO
Vo4NdB81SdPmCaHISocrEhkS/Vff3rlMcb4xf/DFZgDK3FXzNYkAqLyMrDNw6egv
fV4fbhnyqPpejCDW0Il7nxOwV4KtdmEaMCvKwvQu9VpiL8wUrV9wBSkbavyagS49
un2UYkkv28IIkmhDwbRM7qEcE7Dt6xfsZN4HIZ6R2eUGhGx/ETDXoC9fE74khigF
ubU7QygqWtZ8JDZ8qmnfDM7n0EG1DV3I+XSdupN1ytaxaKOzF5HAnVxcLuMnY5LT
80HaVQazsfCJ5IQinUtiGoOFldQT3NGkvVMcCe+M5R+PP2g4DRJgaCzDCXDIx0k2
My/JU5RjlUl0714OV0VaGlzVnwk5y7RNNLcHWlSx83HBoBSWcnk=
=uOTk
-----END PGP SIGNATURE-----
_______________________________________________
freebsd-announce@freebsd.org mailing list
https://lists.freebsd.org/mailman/listinfo/freebsd-announce
To unsubscribe, send any mail to "freebsd-announce-unsubscribe@freebsd.org"

[FreeBSD-Announce] FreeBSD Errata Notice FreeBSD-EN-20:01.ssp

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

=============================================================================
FreeBSD-EN-20:01.ssp Errata Notice
The FreeBSD Project

Topic: Imprecise ordering of SSP canary initialization

Category: core
Module: libc
Announced: 2020-01-28
Credits: Kyle Evans
Affects: All supported versions of FreeBSD.
Corrected: 2019-11-25 03:49:38 UTC (stable/12, 12.1-STABLE)
2020-01-28 18:53:14 UTC (releng/12.1, 12.1-RELEASE-p2)
2020-01-28 18:53:14 UTC (releng/12.0, 12.0-RELEASE-p13)
2019-11-25 03:49:38 UTC (stable/11, 11.3-STABLE)
2020-01-28 18:53:14 UTC (releng/11.3, 11.3-RELEASE-p6)

For general information regarding FreeBSD Errata Notices and Security
Advisories, including descriptions of the fields above, security
branches, and the following sections, please visit
<URL:https://security.FreeBSD.org/>.

I. Background

The Stack Smashing Protector ("SSP") relies on a stack canary being
initialized early on in application startup. On FreeBSD, this is
accomplished with a constructor in libc.

II. Problem Description

When a binary is statically linked, constructor invocation order is based on
priority and sorted arbitrarily within a priority level across all
constructors present in the single statically linked object. The stack
canary guard constructor had no priority, so statically linked binary could
not predictably order their constructors to avoid bad interactions with
respect to the stack canary constructor leading to false-positive detection
of a stack overflow condition and erroneous process abort in some rare cases.

Dynamically linked binaries are generally not affected, since the stack
canary is initialized in libc and libc is ordered very early in constructor
invocation.

III. Impact

Affected programs will abort and log a "stack overflow detected" message to
syslog(3).

IV. Workaround

No workaround is available, but dynamically linked binaries are not affected.

V. Solution

Upgrade your system to a supported FreeBSD stable or release / security
branch (releng) dated after the correction date. Statically linked binaries
should be relinked against the updated base system.

Perform one of the following:

1) To update your system via a binary patch:

Systems running a RELEASE version of FreeBSD on the i386 or amd64
platforms can be updated via the freebsd-update(8) utility:

# freebsd-update fetch
# freebsd-update install

2) To update your system via a source code patch:

The following patches have been verified to apply to the applicable
FreeBSD release branches.

a) Download the relevant patch from the location below, and verify the
detached PGP signature using your PGP utility.

# fetch https://security.FreeBSD.org/patches/EN-20:01/ssp.patch
# fetch https://security.FreeBSD.org/patches/EN-20:01/ssp.patch.asc
# gpg --verify ssp.patch.asc

b) Apply the patch. Execute the following commands as root:

# cd /usr/src
# patch < /path/to/patch

c) Recompile the operating system using buildworld and installworld as
described in <URL:https://www.FreeBSD.org/handbook/makeworld.html>.

VI. Correction details

The following list contains the correction revision numbers for each
affected branch.

Branch/path Revision
- -------------------------------------------------------------------------
stable/12/ r355080
releng/12.1/ r357215
releng/12.0/ r357215
stable/11/ r355080
releng/11.3/ r357215
- -------------------------------------------------------------------------

To see which files were modified by a particular revision, run the
following command, replacing NNNNNN with the revision number, on a
machine with Subversion installed:

# svn diff -cNNNNNN --summarize svn://svn.freebsd.org/base

Or visit the following URL, replacing NNNNNN with the revision number:

<URL:https://svnweb.freebsd.org/base?view=revision&revision=NNNNNN>

VII. References

<URL:https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=241905>

The latest revision of this advisory is available at
<URL:https://security.FreeBSD.org/advisories/FreeBSD-EN-20:01.ssp.asc>
-----BEGIN PGP SIGNATURE-----
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=VzHc
-----END PGP SIGNATURE-----
_______________________________________________
freebsd-announce@freebsd.org mailing list
https://lists.freebsd.org/mailman/listinfo/freebsd-announce
To unsubscribe, send any mail to "freebsd-announce-unsubscribe@freebsd.org"

[FreeBSD-Announce] FreeBSD Security Advisory FreeBSD-SA-20:02.ipsec

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

=============================================================================
FreeBSD-SA-20:02.ipsec Security Advisory
The FreeBSD Project

Topic: Missing IPsec anti-replay window check

Category: core
Module: kernel
Announced: 2020-01-28
Credits: Jean-Francois HREN
Affects: FreeBSD 12.0 only
Corrected: 2020-01-28 18:56:46 UTC (releng/12.0, 12.0-RELEASE-p13)
CVE Name: CVE-2019-5613

For general information regarding FreeBSD Security Advisories,
including descriptions of the fields above, security branches, and the
following sections, please visit <URL:https://security.FreeBSD.org/>.

I. Background

IPsec is a suite of protocols providing data authentication, integrity, and
confidentiality between two networked hosts.

II. Problem Description

A missing check means that an attacker can reinject an old packet and it will
be accepted and processed by the IPsec endpoint.

III. Impact

The impact depends on the higher-level protocols in use over IPsec. For
example, an attacker who can capture and inject packets could cause an action
that was intentionally performed once to be repeated.

IV. Workaround

No workaround is available. Systems not using IPsec are not vulnerable.

V. Solution

Upgrade your vulnerable system to a supported FreeBSD stable or
release / security branch (releng) dated after the correction date,
and reboot.

Perform one of the following:

1) To update your vulnerable system via a binary patch:

Systems running a RELEASE version of FreeBSD on the i386 or amd64
platforms can be updated via the freebsd-update(8) utility:

# freebsd-update fetch
# freebsd-update install
# shutdown -r +10min "Rebooting for a security update"

2) To update your vulnerable system via a source code patch:

The following patches have been verified to apply to the applicable
FreeBSD release branches.

a) Download the relevant patch from the location below, and verify the
detached PGP signature using your PGP utility.

# fetch https://security.FreeBSD.org/patches/SA-20:02/ipsec.patch
# fetch https://security.FreeBSD.org/patches/SA-20:02/ipsec.patch.asc
# gpg --verify ipsec.patch.asc

b) Apply the patch. Execute the following commands as root:

# cd /usr/src
# patch < /path/to/patch

c) Recompile your kernel as described in
<URL:https://www.FreeBSD.org/handbook/kernelconfig.html> and reboot the
system.

VI. Correction details

The following list contains the correction revision numbers for each
affected branch.

Branch/path Revision
- -------------------------------------------------------------------------
releng/12.0/ r357218
- -------------------------------------------------------------------------

To see which files were modified by a particular revision, run the
following command, replacing NNNNNN with the revision number, on a
machine with Subversion installed:

# svn diff -cNNNNNN --summarize svn://svn.freebsd.org/base

Or visit the following URL, replacing NNNNNN with the revision number:

<URL:https://svnweb.freebsd.org/base?view=revision&revision=NNNNNN>

VII. References

<URL:https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5613>

The latest revision of this advisory is available at
<URL:https://security.FreeBSD.org/advisories/FreeBSD-SA-20:02.ipsec.asc>
-----BEGIN PGP SIGNATURE-----
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=tFox
-----END PGP SIGNATURE-----
_______________________________________________
freebsd-announce@freebsd.org mailing list
https://lists.freebsd.org/mailman/listinfo/freebsd-announce
To unsubscribe, send any mail to "freebsd-announce-unsubscribe@freebsd.org"

[FreeBSD-Announce] FreeBSD Security Advisory FreeBSD-SA-20:03.thrmisc

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

=============================================================================
FreeBSD-SA-20:03.thrmisc Security Advisory
The FreeBSD Project

Topic: kernel stack data disclosure

Category: core
Module: kernel
Announced: 2020-01-28
Credits: Ilja Van Sprundel
Affects: All supported versions of FreeBSD.
Corrected: 2019-11-15 16:40:10 UTC (stable/12, 12.1-STABLE)
2020-01-28 18:57:45 UTC (releng/12.1, 12.1-RELEASE-p2)
2020-01-28 18:57:45 UTC (releng/12.0, 12.0-RELEASE-p13)
2019-11-15 16:40:55 UTC (stable/11, 11.3-STABLE)
2020-01-28 18:57:45 UTC (releng/11.3, 11.3-RELEASE-p6)
CVE Name: CVE-2019-15875

For general information regarding FreeBSD Security Advisories,
including descriptions of the fields above, security branches, and the
following sections, please visit <URL:https://security.FreeBSD.org/>.

I. Background

The kernel can create a core dump file when a process crashes that contains
process state, for debugging.

II. Problem Description

Due to incorrect initialization of a stack data structure, up to 20 bytes of
kernel data stored previously stored on the stack will be exposed to a
crashing user process.

III. Impact

Sensitive kernel data may be disclosed.

IV. Workaround

Core dumps may be disabled by setting the kern.coredump sysctl to 0.
See sysctl(8) and sysctl.conf(5).

V. Solution

Upgrade your vulnerable system to a supported FreeBSD stable or
release / security branch (releng) dated after the correction date,
and reboot.

Perform one of the following:

1) To update your vulnerable system via a binary patch:

Systems running a RELEASE version of FreeBSD on the i386 or amd64
platforms can be updated via the freebsd-update(8) utility:

# freebsd-update fetch
# freebsd-update install
# shutdown -r +10min "Rebooting for a security update"

2) To update your vulnerable system via a source code patch:

The following patches have been verified to apply to the applicable
FreeBSD release branches.

a) Download the relevant patch from the location below, and verify the
detached PGP signature using your PGP utility.

# fetch https://security.FreeBSD.org/patches/SA-20:03/thrmisc.patch
# fetch https://security.FreeBSD.org/patches/SA-20:03/thrmisc.patch.asc
# gpg --verify thrmisc.patch.asc

b) Apply the patch. Execute the following commands as root:

# cd /usr/src
# patch < /path/to/patch

c) Recompile your kernel as described in
<URL:https://www.FreeBSD.org/handbook/kernelconfig.html> and reboot the
system.

VI. Correction details

The following list contains the correction revision numbers for each
affected branch.

Branch/path Revision
- -------------------------------------------------------------------------
stable/12/ r354734
releng/12.1/ r357219
releng/12.0/ r357219
stable/11/ r354735
releng/11.3/ r357219
- -------------------------------------------------------------------------

To see which files were modified by a particular revision, run the
following command, replacing NNNNNN with the revision number, on a
machine with Subversion installed:

# svn diff -cNNNNNN --summarize svn://svn.freebsd.org/base

Or visit the following URL, replacing NNNNNN with the revision number:

<URL:https://svnweb.freebsd.org/base?view=revision&revision=NNNNNN>

VII. References

<URL:https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15875>

The latest revision of this advisory is available at
<URL:https://security.FreeBSD.org/advisories/FreeBSD-SA-20:03.thrmisc.asc>
-----BEGIN PGP SIGNATURE-----
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=3mdJ
-----END PGP SIGNATURE-----
_______________________________________________
freebsd-announce@freebsd.org mailing list
https://lists.freebsd.org/mailman/listinfo/freebsd-announce
To unsubscribe, send any mail to "freebsd-announce-unsubscribe@freebsd.org"

[FreeBSD-Announce] FreeBSD Security Advisory FreeBSD-SA-20:01.libfetch

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

=============================================================================
FreeBSD-SA-20:01.libfetch Security Advisory
The FreeBSD Project

Topic: libfetch buffer overflow

Category: core
Module: libfetch
Announced: 2020-01-28
Credits: Duncan Overbruck
Affects: All supported versions of FreeBSD.
Corrected: 2020-01-28 18:40:55 UTC (stable/12, 12.1-STABLE)
2020-01-28 18:55:25 UTC (releng/12.1, 12.1-RELEASE-p2)
2020-01-28 18:55:25 UTC (releng/12.0, 12.0-RELEASE-p13)
2020-01-28 18:42:06 UTC (stable/11, 11.3-STABLE)
2020-01-28 18:55:25 UTC (releng/11.3, 11.3-RELEASE-p6)
CVE Name: CVE-2020-7450

For general information regarding FreeBSD Security Advisories,
including descriptions of the fields above, security branches, and the
following sections, please visit <URL:https://security.FreeBSD.org/>.

I. Background

libfetch(3) is a multi-protocol file transfer library included with FreeBSD
and used by the fetch(1) command-line tool, pkg(8) package manager, and
others.

II. Problem Description

A programming error allows an attacker who can specify a URL with a username
and/or password components to overflow libfetch(3) buffers.

III. Impact

An attacker in control of the URL to be fetched (possibly via HTTP redirect)
may cause a heap buffer overflow, resulting in program misbehavior or
malicious code execution.

IV. Workaround

No workaround is available.

V. Solution

Upgrade your vulnerable system to a supported FreeBSD stable or
release / security branch (releng) dated after the correction date.

Perform one of the following:

1) To update your vulnerable system via a binary patch:

Systems running a RELEASE version of FreeBSD on the i386 or amd64
platforms can be updated via the freebsd-update(8) utility:

# freebsd-update fetch
# freebsd-update install

2) To update your vulnerable system via a source code patch:

The following patches have been verified to apply to the applicable
FreeBSD release branches.

a) Download the relevant patch from the location below, and verify the
detached PGP signature using your PGP utility.

# fetch https://security.FreeBSD.org/patches/SA-20:01/libfetch.patch
# fetch https://security.FreeBSD.org/patches/SA-20:01/libfetch.patch.asc
# gpg --verify libfetch.patch.asc

b) Apply the patch. Execute the following commands as root:

# cd /usr/src
# patch < /path/to/patch

c) Recompile the operating system using buildworld and installworld as
described in <URL:https://www.FreeBSD.org/handbook/makeworld.html>.

Restart all daemons that use the library, or reboot the system.

VI. Correction details

The following list contains the correction revision numbers for each
affected branch.

Branch/path Revision
- -------------------------------------------------------------------------
stable/12/ r357213
releng/12.1/ r357217
releng/12.0/ r357217
stable/11/ r357214
releng/11.3/ r357217
- -------------------------------------------------------------------------

To see which files were modified by a particular revision, run the
following command, replacing NNNNNN with the revision number, on a
machine with Subversion installed:

# svn diff -cNNNNNN --summarize svn://svn.freebsd.org/base

Or visit the following URL, replacing NNNNNN with the revision number:

<URL:https://svnweb.freebsd.org/base?view=revision&revision=NNNNNN>

VII. References

<URL:https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7450>

The latest revision of this advisory is available at
<URL:https://security.FreeBSD.org/advisories/FreeBSD-SA-20:01.libfetch.asc>
-----BEGIN PGP SIGNATURE-----
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=chN4
-----END PGP SIGNATURE-----
_______________________________________________
freebsd-announce@freebsd.org mailing list
https://lists.freebsd.org/mailman/listinfo/freebsd-announce
To unsubscribe, send any mail to "freebsd-announce-unsubscribe@freebsd.org"