Wednesday, September 27, 2017
[CentOS-announce] CESA-2017:2795 Important CentOS 6 kernel Security Update
Upstream details at : https://access.redhat.com/errata/RHSA-2017:2795
The following updated files have been uploaded and are currently
syncing to the mirrors: ( sha256sum Filename )
i386:
0ece8515a2a820dd68805f034238d315dc9bf7a3bd8979ab908914fff523535f kernel-2.6.32-696.10.3.el6.i686.rpm
6c0a44700f042cfbd024f7b22852a63626cd2023582b7e9033d473159cf9fe30 kernel-abi-whitelists-2.6.32-696.10.3.el6.noarch.rpm
0ee646bb30bc95b465839b76203c4371aea05c36f9fdc1a12ff5f59d716333e5 kernel-debug-2.6.32-696.10.3.el6.i686.rpm
6257147fd5d9d5e36f6e2c50e992c72d661a07ccfd8ffc6b02ecc81cdbdbb9e5 kernel-debug-devel-2.6.32-696.10.3.el6.i686.rpm
9a9ea42cdd6b6ce5b7f62a4972f2aeaf2f990eff124aa88fbb559a423525e959 kernel-devel-2.6.32-696.10.3.el6.i686.rpm
55f6c6bd63dabafd17488a612514c98ae9b37ee61d0be089be6363d80c3b45db kernel-doc-2.6.32-696.10.3.el6.noarch.rpm
eb543c671ef9785795e3472c146c194a1b0cfbee829b0c7463f457b71f13dee2 kernel-firmware-2.6.32-696.10.3.el6.noarch.rpm
5454beb01c3d7cc4e6ccf7831ac0eb191ea2e44aaa53690c413fe44462c902b3 kernel-headers-2.6.32-696.10.3.el6.i686.rpm
9dfdf0318330bd2e6a082f0c2ffc0a52f4854ebd20da227462b03648294b7ace perf-2.6.32-696.10.3.el6.i686.rpm
083e8d2bfc51b686b8c7f263ce80f8df7ac02fb6f761d4881db2cf66b4651bd6 python-perf-2.6.32-696.10.3.el6.i686.rpm
x86_64:
06e870bb5d57fefe461086e03173b75b2fa3d26b0662c0ed218272be4f62d870 kernel-2.6.32-696.10.3.el6.x86_64.rpm
6c0a44700f042cfbd024f7b22852a63626cd2023582b7e9033d473159cf9fe30 kernel-abi-whitelists-2.6.32-696.10.3.el6.noarch.rpm
0f372b21085376d6ebe881c445d0d4852e0df7c53a57def067cc3e202e62d254 kernel-debug-2.6.32-696.10.3.el6.x86_64.rpm
6257147fd5d9d5e36f6e2c50e992c72d661a07ccfd8ffc6b02ecc81cdbdbb9e5 kernel-debug-devel-2.6.32-696.10.3.el6.i686.rpm
2ac733e53bb15e042ac8391fea5b47808bbb3608037b8fc914131a1802aa3ac3 kernel-debug-devel-2.6.32-696.10.3.el6.x86_64.rpm
d476497f262a01b016efde27d7cdc831c79bdbe1e0deb335e5d1f71f30b324e2 kernel-devel-2.6.32-696.10.3.el6.x86_64.rpm
55f6c6bd63dabafd17488a612514c98ae9b37ee61d0be089be6363d80c3b45db kernel-doc-2.6.32-696.10.3.el6.noarch.rpm
eb543c671ef9785795e3472c146c194a1b0cfbee829b0c7463f457b71f13dee2 kernel-firmware-2.6.32-696.10.3.el6.noarch.rpm
303b8df4e585d9954b566329a16f2abab68783d82ebe619b5beb08fbb7b97f3d kernel-headers-2.6.32-696.10.3.el6.x86_64.rpm
5dcd16fdfe201473d29a27074942fa1d385edf1f0e8c36cfaaec0c42e0da073d perf-2.6.32-696.10.3.el6.x86_64.rpm
6b60c2094c7628db2dfe430250829584e5e5ae958eeebef91b06effe3791de94 python-perf-2.6.32-696.10.3.el6.x86_64.rpm
Source:
6a35901d0c441f3bcfb438598e8658e497c406fab60c784a80b77c47d109c8e0 kernel-2.6.32-696.10.3.el6.src.rpm
--
Johnny Hughes
CentOS Project { http://www.centos.org/ }
irc: hughesjr, #centos@irc.freenode.net
Twitter: @JohnnyCentOS
_______________________________________________
CentOS-announce mailing list
CentOS-announce@centos.org
https://lists.centos.org/mailman/listinfo/centos-announce
F28 System Wide Change: Annobin
https://fedoraproject.org/wiki/Changes/Annobin
Change owner(s):
* Nick Clifton <nickc AT redhat DOT com>
This change causes extra information to be stored in binary files
compiled by gcc. This information can be used by scripts to check on
various features of the file, such as the hardening options used of
potential ABI conflicts.
== Detailed Description ==
The plan is to use a plugin to gcc to record extra information in the
object files it creates. This information can then be examined by
static analysis tools. The information is recorded in a compact,
extensible format, described here:
https://fedoraproject.org/wiki/Toolchain/Watermark
The Fedora annobin package is an implementation of the plugin for gcc.
It also includes some example scripts that demonstrate how the
recorded information can be used to, for example, check that an
executable has been compiled with the correct hardening options, or
detect if any conflicting ABI options have been used when compiling
various parts of the executable.
To enable this change it is proposed that the redhat-rpm-config
package should be extended to add the "-fplugin=annobin" option to the
__global_compiler-flags macro. In theory such a change will be
completely invisible to Fedora users but should prove to be very
helpful to Fedora Release Management, assuming that they like the idea
of these annotated binaries.
== Scope ==
* Proposal owners:
Make sure the annobin plugin is ready.
* Other developers:
An update is needed to the redhat-rpm-config package in order for the
plugin to be invoked when gcc is used to compile programs, and to add
a dependency upon the annobin package.
* Release engineering: https://pagure.io/releng/issue/7069
- Coordination with release engineering is needed.
- A mass rebuild will be required.
* List of deliverables:
All delivered images are affected, however there no changes to the list it self.
* Policies and guidelines:
No updates needed
* Trademark approval:
N/A (not needed for this Change)
--
Jan Kuřík
Platform & Fedora Program Manager
Red Hat Czech s.r.o., Purkynova 99/71, 612 45 Brno, Czech Republic
_______________________________________________
devel-announce mailing list -- devel-announce@lists.fedoraproject.org
To unsubscribe send an email to devel-announce-leave@lists.fedoraproject.org
Tuesday, September 26, 2017
LibreSSL 2.6.2 Released
LibreSSL directory of your local OpenBSD mirror soon. This is the third
development release from the 2.6 series, which will eventually be part of
OpenBSD 6.2. It includes the following fixes:
* Provide a useful error with libtls if there are no OCSP URLs in a
peer certificate.
* Keep track of which keypair is in use by a TLS context, fixing a bug
where a TLS server with SNI would only return the OCSP staple for the
default keypair. Issue reported by William Graeber and confirmed by
Andreas Bartelt.
* Fixed various issues in the OCSP extension parsing code.
The original code incorrectly passes the pointer allocated via
CBS_stow() (using malloc()) to a d2i_*() function and then calls
free() on the now incremented pointer, most likely resulting in a
crash. This issue was reported by Robert Swiecki who found the issue
using honggfuzz.
* If tls_config_parse_protocols() is called with a NULL pointer,
return the default protocols instead of crashing - this makes the
behaviour more useful and mirrors what we already do in
tls_config_set_ciphers() et al.
The LibreSSL project continues improvement of the codebase to reflect modern,
safe programming practices. We welcome feedback and improvements from the
broader community. Thanks to all of the contributors who helped make this
release possible.
Fwd: Removal of dependencies on net-tools
[CentOS-announce] Announcing the release of Gluster 3.12 on CentOS Linux 6 x86_64
CentOS 6 on x86_64. These packages are following the upstream Gluster
Community releases, and will receive monthly bugfix updates.
Gluster 3.12 is a Long-Term-Maintenance release, and will receive
updates for approximately 18 months. The difference between
Long-Term-Maintenance and Short-Term-Maintenance releases is explained
on the Gluster release schedule page:
https://www.gluster.org/community/release-schedule/
Users of CentOS 6 can now simply install Gluster 3.12 with only these two
commands:
# yum install centos-release-gluster
# yum install glusterfs-server
The centos-release-gluster package is delivered via CentOS Extras repos.
This contains all the metadata and dependency information, needed to
install Gluster 3.12. The actual package that will get installed is
centos-release-gluster312. Users of the now End-Of-Life
Short-Term-Maintenance Gluster 3.11 will automatically get the update to
Gluster 3.12, whereas users of Gluster 3.10 can stay on that
Long-Term-Maintenance release for an other six months.
Users of Gluster 3.8 will need to manually upgrade by uninstalling the
centos-release-gluster38 package, and replacing it with either the
Gluster 3.12 or 3.10 version. Additional details about the upgrade
process are linked in the announcement from the Gluster Community:
http://lists.gluster.org/pipermail/announce/2017-September/000082.html
We have a quickstart guide specifically built around the packages are
available, it makes for a good introduction to Gluster and will help get
you started in just a few simple steps, this quick start is available at
https://wiki.centos.org/SpecialInterestGroup/Storage/gluster-Quickstart
More details about the packages that the Gluster project provides in the
Storage SIG is available in the documentation:
https://wiki.centos.org/SpecialInterestGroup/Storage/Gluster
The centos-release-gluster* repositories offer additional packages that
enhance the usability of Gluster itself. Utilities and tools that were
working with previous versions of Gluster are expected to stay working
fine. If there are any problems, or requests for additional tools and
applications to be provided, just send us an email with your
suggestions. The current list of packages that is (planned to become)
available can be found here:
https://wiki.centos.org/SpecialInterestGroup/Storage/Gluster/Ecosystem-pkgs
We welcome all feedback, comments and contributions. You can get in
touch with the CentOS Storage SIG on the centos-devel mailing list
(https://lists.centos.org ) and with the Gluster developer and user
communities at https://www.gluster.org/mailman/listinfo , we are also
available on irc at #gluster on irc.freenode.net, and on twitter at
@gluster .
Cheers,
Niels de Vos
Storage SIG member & Gluster maintainer
[CentOS-announce] Announcing the release of Gluster 3.12 on CentOS Linux 7 x86_64
CentOS 7 on x86_64. These packages are following the upstream Gluster
Community releases, and will receive monthly bugfix updates.
Gluster 3.12 is a Long-Term-Maintenance release, and will receive
updates for approximately 18 months. The difference between
Long-Term-Maintenance and Short-Term-Maintenance releases is explained
on the Gluster release schedule page:
https://www.gluster.org/community/release-schedule/
Users of CentOS 7 can now simply install Gluster 3.12 with only these two
commands:
# yum install centos-release-gluster
# yum install glusterfs-server
The centos-release-gluster package is delivered via CentOS Extras repos.
This contains all the metadata and dependency information, needed to
install Gluster 3.12. The actual package that will get installed is
centos-release-gluster312. Users of the now End-Of-Life
Short-Term-Maintenance Gluster 3.11 will automatically get the update to
Gluster 3.12, whereas users of Gluster 3.10 can stay on that
Long-Term-Maintenance release for an other six months.
Users of Gluster 3.8 will need to manually upgrade by uninstalling the
centos-release-gluster38 package, and replacing it with either the
Gluster 3.12 or 3.10 version. Additional details about the upgrade
process are linked in the announcement from the Gluster Community:
http://lists.gluster.org/pipermail/announce/2017-September/000082.html
We have a quickstart guide specifically built around the packages are
available, it makes for a good introduction to Gluster and will help get
you started in just a few simple steps, this quick start is available at
https://wiki.centos.org/SpecialInterestGroup/Storage/gluster-Quickstart
More details about the packages that the Gluster project provides in the
Storage SIG is available in the documentation:
https://wiki.centos.org/SpecialInterestGroup/Storage/Gluster
The centos-release-gluster* repositories offer additional packages that
enhance the usability of Gluster itself. Utilities and tools that were
working with previous versions of Gluster are expected to stay working
fine. If there are any problems, or requests for additional tools and
applications to be provided, just send us an email with your
suggestions. The current list of packages that is (planned to become)
available can be found here:
https://wiki.centos.org/SpecialInterestGroup/Storage/Gluster/Ecosystem-pkgs
We welcome all feedback, comments and contributions. You can get in
touch with the CentOS Storage SIG on the centos-devel mailing list
(https://lists.centos.org ) and with the Gluster developer and user
communities at https://www.gluster.org/mailman/listinfo , we are also
available on irc at #gluster on irc.freenode.net, and on twitter at
@gluster .
Cheers,
Niels de Vos
Storage SIG member & Gluster maintainer
Monday, September 25, 2017
[USN-3429-1] Libplist vulnerability
Ubuntu Security Notice USN-3429-1
September 25, 2017
libplist vulnerability
==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 17.04
- Ubuntu 16.04 LTS
- Ubuntu 14.04 LTS
Summary:
Libplist could be made to crash if it opened a specially crafted
file.
Software Description:
- libplist: Library for handling Apple binary and XML property lists
Details:
Wang Junjie discovered that Libplist incorrectly handled certain files.
If a user were tricked into opening a crafted file, an attacker could
possibly use this to cause a crash or denial or service.
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 17.04:
libplist-utils 1.12-3.1ubuntu0.17.04.1
libplist3 1.12-3.1ubuntu0.17.04.1
python-plist 1.12-3.1ubuntu0.17.04.1
Ubuntu 16.04 LTS:
libplist-utils 1.12-3.1ubuntu0.16.04.1
libplist3 1.12-3.1ubuntu0.16.04.1
python-plist 1.12-3.1ubuntu0.16.04.1
Ubuntu 14.04 LTS:
libplist-utils 1.10-1ubuntu0.1
libplist1 1.10-1ubuntu0.1
python-plist 1.10-1ubuntu0.1
In general, a standard system update will make all the necessary
changes.
References:
https://www.ubuntu.com/usn/usn-3429-1
CVE-2017-7982
Package Information:
https://launchpad.net/ubuntu/+source/libplist/1.12-3.1ubuntu0.17.04.1
https://launchpad.net/ubuntu/+source/libplist/1.12-3.1ubuntu0.16.04.1
https://launchpad.net/ubuntu/+source/libplist/1.10-1ubuntu0.1
Friday, September 22, 2017
OpenBSD Errata: September 22nd, 2017 (perl)
A buffer over-read and heap overflow in perl's regexp may result in
a crash or memory leak.
Binary updates for the amd64 and i386 platforms are available via the
syspatch utility. Source code patches can be found on the respective
errata pages:
https://www.openbsd.org/errata60.html
https://www.openbsd.org/errata61.html
Thursday, September 21, 2017
[USN-3428-1] Emacs vulnerability
Ubuntu Security Notice USN-3428-1
September 21, 2017
emacs25 vulnerability
==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 17.04
Summary:
Emacs could be made to run programs as your login if it opened a
specially crafted file.
Software Description:
- emacs25: GNU Emacs editor
Details:
Charles A. Roelli discovered that Emacs incorrectly handled certain
files. If a user were tricked into opening a specially crafted file, an
attacker could possibly use this to execute arbitrary code.
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 17.04:
emacs25 25.1+1-3ubuntu4.1
In general, a standard system update will make all the necessary
changes.
References:
https://www.ubuntu.com/usn/usn-3428-1
CVE-2017-14482
Package Information:
https://launchpad.net/ubuntu/+source/emacs25/25.1+1-3ubuntu4.1
[USN-3427-1] Emacs vulnerability
Ubuntu Security Notice USN-3427-1
September 21, 2017
emacs24 vulnerability
==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 16.04 LTS
- Ubuntu 14.04 LTS
Summary:
Emacs could be made to run programs as your login if it
opened a specially crafted file.
Software Description:
- emacs24: GNU Emacs editor
Details:
Charles A. Roelli discovered that Emacs incorrectly handled certain
files. If a user were tricked into opening a specially crafted file, an
attacker could possibly use this to execute arbitrary code.
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 16.04 LTS:
emacs24 24.5+1-6ubuntu1.1
Ubuntu 14.04 LTS:
emacs24 24.3+1-2ubuntu1.1
In general, a standard system update will make all the necessary
changes.
References:
https://www.ubuntu.com/usn/usn-3427-1
CVE-2017-14482
Package Information:
https://launchpad.net/ubuntu/+source/emacs24/24.5+1-6ubuntu1.1
https://launchpad.net/ubuntu/+source/emacs24/24.3+1-2ubuntu1.1
Fedora 27 Beta status is NO-GO
The next Go/No-Go meeting is planned on Thursday, Sep 28th. The Beta
release slips for one week. All further milestones will move out 1
week also.
For more information please check the minutes from the second round of
F27 Beta Go/No-Go meeting [1][2].
[1] https://meetbot.fedoraproject.org/fedora-meeting-1/2017-09-21/f27-beta-go-no-go-meeting-2nd.2017-09-21-17.00.html
[2] https://meetbot.fedoraproject.org/fedora-meeting-1/2017-09-21/f27-beta-go-no-go-meeting-2nd.2017-09-21-17.00.log.html
Regards,
Jan
--
Jan Kuřík
Platform & Fedora Program Manager
Red Hat Czech s.r.o., Purkynova 99/71, 612 45 Brno, Czech Republic
_______________________________________________
devel-announce mailing list -- devel-announce@lists.fedoraproject.org
To unsubscribe send an email to devel-announce-leave@lists.fedoraproject.org
[USN-3426-1] Samba vulnerabilities
Version: GnuPG v2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=GK+b
-----END PGP SIGNATURE-----
==========================================================================
Ubuntu Security Notice USN-3426-1
September 21, 2017
samba vulnerabilities
==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 17.04
- Ubuntu 16.04 LTS
- Ubuntu 14.04 LTS
Summary:
Samba could be made to expose sensitive information over the network.
Software Description:
- samba: SMB/CIFS file, print, and login server for Unix
Details:
Stefan Metzmacher discovered that Samba incorrectly enforced SMB signing in
certain situations. A remote attacker could use this issue to perform a man
in the middle attack. (CVE-2017-12150)
Stefan Metzmacher discovered that Samba incorrectly handled encryption
across DFS redirects. A remote attacker could use this issue to perform a
man in the middle attack. (CVE-2017-12151)
Yihan Lian and Zhibin Hu discovered that Samba incorrectly handled memory
when SMB1 is being used. A remote attacker could possibly use this issue to
obtain server memory contents. (CVE-2017-12163)
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 17.04:
samba 2:4.5.8+dfsg-0ubuntu0.17.04.7
Ubuntu 16.04 LTS:
samba 2:4.3.11+dfsg-0ubuntu0.16.04.11
Ubuntu 14.04 LTS:
samba 2:4.3.11+dfsg-0ubuntu0.14.04.12
In general, a standard system update will make all the necessary changes.
References:
https://www.ubuntu.com/usn/usn-3426-1
CVE-2017-12150, CVE-2017-12151, CVE-2017-12163
Package Information:
https://launchpad.net/ubuntu/+source/samba/2:4.5.8+dfsg-0ubuntu0.17.04.7
https://launchpad.net/ubuntu/+source/samba/2:4.3.11+dfsg-0ubuntu0.16.04.11
https://launchpad.net/ubuntu/+source/samba/2:4.3.11+dfsg-0ubuntu0.14.04.12