Jump to content
Compatible Support Forums

news

Members
  • Content count

    80899
  • Joined

  • Last visited

    Never
  • Days Won

    18

Everything posted by news

  1. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ===================================================================== Red Hat Security Advisory Synopsis: Moderate: kernel security and bug fix update Advisory ID: RHSA-2017:0307-01 Product: Red Hat Enterprise Linux Advisory URL: https://rhn.redhat.com/errata/RHSA-2017-0307.html Issue date: 2017-02-23 CVE Names: CVE-2016-6136 CVE-2016-9555 ===================================================================== 1. Summary: An update for kernel is now available for Red Hat Enterprise Linux 6. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. 2. Relevant releases/architectures: Red Hat Enterprise Linux Desktop (v. 6) - i386, noarch, x86_64 Red Hat Enterprise Linux Desktop Optional (v. 6) - i386, x86_64 Red Hat Enterprise Linux HPC Node (v. 6) - noarch, x86_64 Red Hat Enterprise Linux HPC Node Optional (v. 6) - x86_64 Red Hat Enterprise Linux Server (v. 6) - i386, noarch, ppc64, s390x, x86_64 Red Hat Enterprise Linux Server Optional (v. 6) - i386, ppc64, s390x, x86_64 Red Hat Enterprise Linux Workstation (v. 6) - i386, noarch, x86_64 Red Hat Enterprise Linux Workstation Optional (v. 6) - i386, x86_64 3. Description: The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * When creating audit records for parameters to executed children processes, an attacker can convince the Linux kernel audit subsystem can create corrupt records which may allow an attacker to misrepresent or evade logging of executing commands. (CVE-2016-6136, Moderate) * A flaw was found in the Linux kernel's implementation of the SCTP protocol. A remote attacker could trigger an out-of-bounds read with an offset of up to 64kB potentially causing the system to crash. (CVE-2016-9555, Moderate) Bug Fix(es): * The qlnic driver previously attempted to fetch pending transmission descriptors before all writes were complete, which lead to firmware hangs. With this update, the qlcnic driver has been fixed to complete all writes before the hardware fetches any pending transmission descriptors. As a result, the firmware no longer hangs with the qlcnic driver. (BZ#1403143) * Previously, when a NFS share was mounted, the file-system (FS) cache was incorrectly enabled even when the "-o fsc" option was not used in the mount command. Consequently, the cachefilesd service stored files in the NFS share even when not instructed to by the user. With this update, NFS does not use the FS cache if not instructed by the "-o fsc" option. As a result, NFS no longer enables caching if the "-o fsc" option is not used. (BZ#1399172) * Previously, an NFS client and NFS server got into a NFS4 protocol loop involving a WRITE action and a NFS4ERR_EXPIRED response when the current_fileid counter got to the wraparound point by overflowing the value of 32 bits. This update fixes the NFS server to handle the current_fileid wraparound. As a result, the described NFS4 protocol loop no longer occurs. (BZ#1399174) * Previously, certain configurations of the Hewlett Packard Smart Array (HPSA) devices caused hardware to be set offline incorrectly when the HPSA driver was expected to wait for existing I/O operations to complete. Consequently, a kernel panic occurred. This update prevents the described problem. As a result, the kernel panic no longer occurs. (BZ#1399175) * Previously, memory corruption by copying data into the wrong memory locations sometimes occurred, because the __copy_tofrom_user() function was returning incorrect values. This update fixes the __copy_tofrom_user() function so that it no longer returns larger values than the number of bytes it was asked to copy. As a result, memory corruption no longer occurs in he described scenario. (BZ#1398185) * Previously, guest virtual machines (VMs) on a Hyper-V server cluster got in some cases rebooted during the graceful node failover test, because the host kept sending heartbeat packets independently of guests responding to them. This update fixes the bug by properly responding to all the heartbeat messages in the queue, even if they are pending. As a result, guest VMs no longer get rebooted under the described circumstances. (BZ#1397739) * When the "punching hole" feature of the fallocate utility was used on an ext4 file system inode with extent depth of 1, the extent tree of the inode sometimes became corrupted. With this update, the underlying source code has been fixed, and extent tree corruption no longer occurs in the described situation. (BZ#1397808) 4. Solution: For details on how to apply this update, which includes the changes described in this advisory, refer to: https://access.redhat.com/articles/11258 The system must be rebooted for this update to take effect. 5. Bugs fixed (https://bugzilla.redhat.com/): 1353533 - CVE-2016-6136 kernel: Race condition vulnerability in execve argv arguments 1397930 - CVE-2016-9555 kernel: Slab out-of-bounds access in sctp_sf_ootb() 6. Package List: Red Hat Enterprise Linux Desktop (v. 6): Source: kernel-2.6.32-642.15.1.el6.src.rpm i386: kernel-2.6.32-642.15.1.el6.i686.rpm kernel-debug-2.6.32-642.15.1.el6.i686.rpm kernel-debug-debuginfo-2.6.32-642.15.1.el6.i686.rpm kernel-debug-devel-2.6.32-642.15.1.el6.i686.rpm kernel-debuginfo-2.6.32-642.15.1.el6.i686.rpm kernel-debuginfo-common-i686-2.6.32-642.15.1.el6.i686.rpm kernel-devel-2.6.32-642.15.1.el6.i686.rpm kernel-headers-2.6.32-642.15.1.el6.i686.rpm perf-2.6.32-642.15.1.el6.i686.rpm perf-debuginfo-2.6.32-642.15.1.el6.i686.rpm python-perf-debuginfo-2.6.32-642.15.1.el6.i686.rpm noarch: kernel-abi-whitelists-2.6.32-642.15.1.el6.noarch.rpm kernel-doc-2.6.32-642.15.1.el6.noarch.rpm kernel-firmware-2.6.32-642.15.1.el6.noarch.rpm x86_64: kernel-2.6.32-642.15.1.el6.x86_64.rpm kernel-debug-2.6.32-642.15.1.el6.x86_64.rpm kernel-debug-debuginfo-2.6.32-642.15.1.el6.i686.rpm kernel-debug-debuginfo-2.6.32-642.15.1.el6.x86_64.rpm kernel-debug-devel-2.6.32-642.15.1.el6.i686.rpm kernel-debug-devel-2.6.32-642.15.1.el6.x86_64.rpm kernel-debuginfo-2.6.32-642.15.1.el6.i686.rpm kernel-debuginfo-2.6.32-642.15.1.el6.x86_64.rpm kernel-debuginfo-common-i686-2.6.32-642.15.1.el6.i686.rpm kernel-debuginfo-common-x86_64-2.6.32-642.15.1.el6.x86_64.rpm kernel-devel-2.6.32-642.15.1.el6.x86_64.rpm kernel-headers-2.6.32-642.15.1.el6.x86_64.rpm perf-2.6.32-642.15.1.el6.x86_64.rpm perf-debuginfo-2.6.32-642.15.1.el6.i686.rpm perf-debuginfo-2.6.32-642.15.1.el6.x86_64.rpm python-perf-debuginfo-2.6.32-642.15.1.el6.i686.rpm python-perf-debuginfo-2.6.32-642.15.1.el6.x86_64.rpm Red Hat Enterprise Linux Desktop Optional (v. 6): i386: kernel-debug-debuginfo-2.6.32-642.15.1.el6.i686.rpm kernel-debuginfo-2.6.32-642.15.1.el6.i686.rpm kernel-debuginfo-common-i686-2.6.32-642.15.1.el6.i686.rpm perf-debuginfo-2.6.32-642.15.1.el6.i686.rpm python-perf-2.6.32-642.15.1.el6.i686.rpm python-perf-debuginfo-2.6.32-642.15.1.el6.i686.rpm x86_64: kernel-debug-debuginfo-2.6.32-642.15.1.el6.x86_64.rpm kernel-debuginfo-2.6.32-642.15.1.el6.x86_64.rpm kernel-debuginfo-common-x86_64-2.6.32-642.15.1.el6.x86_64.rpm perf-debuginfo-2.6.32-642.15.1.el6.x86_64.rpm python-perf-2.6.32-642.15.1.el6.x86_64.rpm python-perf-debuginfo-2.6.32-642.15.1.el6.x86_64.rpm Red Hat Enterprise Linux HPC Node (v. 6): Source: kernel-2.6.32-642.15.1.el6.src.rpm noarch: kernel-abi-whitelists-2.6.32-642.15.1.el6.noarch.rpm kernel-doc-2.6.32-642.15.1.el6.noarch.rpm kernel-firmware-2.6.32-642.15.1.el6.noarch.rpm x86_64: kernel-2.6.32-642.15.1.el6.x86_64.rpm kernel-debug-2.6.32-642.15.1.el6.x86_64.rpm kernel-debug-debuginfo-2.6.32-642.15.1.el6.i686.rpm kernel-debug-debuginfo-2.6.32-642.15.1.el6.x86_64.rpm kernel-debug-devel-2.6.32-642.15.1.el6.i686.rpm kernel-debug-devel-2.6.32-642.15.1.el6.x86_64.rpm kernel-debuginfo-2.6.32-642.15.1.el6.i686.rpm kernel-debuginfo-2.6.32-642.15.1.el6.x86_64.rpm kernel-debuginfo-common-i686-2.6.32-642.15.1.el6.i686.rpm kernel-debuginfo-common-x86_64-2.6.32-642.15.1.el6.x86_64.rpm kernel-devel-2.6.32-642.15.1.el6.x86_64.rpm kernel-headers-2.6.32-642.15.1.el6.x86_64.rpm perf-2.6.32-642.15.1.el6.x86_64.rpm perf-debuginfo-2.6.32-642.15.1.el6.i686.rpm perf-debuginfo-2.6.32-642.15.1.el6.x86_64.rpm python-perf-debuginfo-2.6.32-642.15.1.el6.i686.rpm python-perf-debuginfo-2.6.32-642.15.1.el6.x86_64.rpm Red Hat Enterprise Linux HPC Node Optional (v. 6): x86_64: kernel-debug-debuginfo-2.6.32-642.15.1.el6.x86_64.rpm kernel-debuginfo-2.6.32-642.15.1.el6.x86_64.rpm kernel-debuginfo-common-x86_64-2.6.32-642.15.1.el6.x86_64.rpm perf-debuginfo-2.6.32-642.15.1.el6.x86_64.rpm python-perf-2.6.32-642.15.1.el6.x86_64.rpm python-perf-debuginfo-2.6.32-642.15.1.el6.x86_64.rpm Red Hat Enterprise Linux Server (v. 6): Source: kernel-2.6.32-642.15.1.el6.src.rpm i386: kernel-2.6.32-642.15.1.el6.i686.rpm kernel-debug-2.6.32-642.15.1.el6.i686.rpm kernel-debug-debuginfo-2.6.32-642.15.1.el6.i686.rpm kernel-debug-devel-2.6.32-642.15.1.el6.i686.rpm kernel-debuginfo-2.6.32-642.15.1.el6.i686.rpm kernel-debuginfo-common-i686-2.6.32-642.15.1.el6.i686.rpm kernel-devel-2.6.32-642.15.1.el6.i686.rpm kernel-headers-2.6.32-642.15.1.el6.i686.rpm perf-2.6.32-642.15.1.el6.i686.rpm perf-debuginfo-2.6.32-642.15.1.el6.i686.rpm python-perf-debuginfo-2.6.32-642.15.1.el6.i686.rpm noarch: kernel-abi-whitelists-2.6.32-642.15.1.el6.noarch.rpm kernel-doc-2.6.32-642.15.1.el6.noarch.rpm kernel-firmware-2.6.32-642.15.1.el6.noarch.rpm ppc64: kernel-2.6.32-642.15.1.el6.ppc64.rpm kernel-bootwrapper-2.6.32-642.15.1.el6.ppc64.rpm kernel-debug-2.6.32-642.15.1.el6.ppc64.rpm kernel-debug-debuginfo-2.6.32-642.15.1.el6.ppc64.rpm kernel-debug-devel-2.6.32-642.15.1.el6.ppc64.rpm kernel-debuginfo-2.6.32-642.15.1.el6.ppc64.rpm kernel-debuginfo-common-ppc64-2.6.32-642.15.1.el6.ppc64.rpm kernel-devel-2.6.32-642.15.1.el6.ppc64.rpm kernel-headers-2.6.32-642.15.1.el6.ppc64.rpm perf-2.6.32-642.15.1.el6.ppc64.rpm perf-debuginfo-2.6.32-642.15.1.el6.ppc64.rpm python-perf-debuginfo-2.6.32-642.15.1.el6.ppc64.rpm s390x: kernel-2.6.32-642.15.1.el6.s390x.rpm kernel-debug-2.6.32-642.15.1.el6.s390x.rpm kernel-debug-debuginfo-2.6.32-642.15.1.el6.s390x.rpm kernel-debug-devel-2.6.32-642.15.1.el6.s390x.rpm kernel-debuginfo-2.6.32-642.15.1.el6.s390x.rpm kernel-debuginfo-common-s390x-2.6.32-642.15.1.el6.s390x.rpm kernel-devel-2.6.32-642.15.1.el6.s390x.rpm kernel-headers-2.6.32-642.15.1.el6.s390x.rpm kernel-kdump-2.6.32-642.15.1.el6.s390x.rpm kernel-kdump-debuginfo-2.6.32-642.15.1.el6.s390x.rpm kernel-kdump-devel-2.6.32-642.15.1.el6.s390x.rpm perf-2.6.32-642.15.1.el6.s390x.rpm perf-debuginfo-2.6.32-642.15.1.el6.s390x.rpm python-perf-debuginfo-2.6.32-642.15.1.el6.s390x.rpm x86_64: kernel-2.6.32-642.15.1.el6.x86_64.rpm kernel-debug-2.6.32-642.15.1.el6.x86_64.rpm kernel-debug-debuginfo-2.6.32-642.15.1.el6.i686.rpm kernel-debug-debuginfo-2.6.32-642.15.1.el6.x86_64.rpm kernel-debug-devel-2.6.32-642.15.1.el6.i686.rpm kernel-debug-devel-2.6.32-642.15.1.el6.x86_64.rpm kernel-debuginfo-2.6.32-642.15.1.el6.i686.rpm kernel-debuginfo-2.6.32-642.15.1.el6.x86_64.rpm kernel-debuginfo-common-i686-2.6.32-642.15.1.el6.i686.rpm kernel-debuginfo-common-x86_64-2.6.32-642.15.1.el6.x86_64.rpm kernel-devel-2.6.32-642.15.1.el6.x86_64.rpm kernel-headers-2.6.32-642.15.1.el6.x86_64.rpm perf-2.6.32-642.15.1.el6.x86_64.rpm perf-debuginfo-2.6.32-642.15.1.el6.i686.rpm perf-debuginfo-2.6.32-642.15.1.el6.x86_64.rpm python-perf-debuginfo-2.6.32-642.15.1.el6.i686.rpm python-perf-debuginfo-2.6.32-642.15.1.el6.x86_64.rpm Red Hat Enterprise Linux Server Optional (v. 6): i386: kernel-debug-debuginfo-2.6.32-642.15.1.el6.i686.rpm kernel-debuginfo-2.6.32-642.15.1.el6.i686.rpm kernel-debuginfo-common-i686-2.6.32-642.15.1.el6.i686.rpm perf-debuginfo-2.6.32-642.15.1.el6.i686.rpm python-perf-2.6.32-642.15.1.el6.i686.rpm python-perf-debuginfo-2.6.32-642.15.1.el6.i686.rpm ppc64: kernel-debug-debuginfo-2.6.32-642.15.1.el6.ppc64.rpm kernel-debuginfo-2.6.32-642.15.1.el6.ppc64.rpm kernel-debuginfo-common-ppc64-2.6.32-642.15.1.el6.ppc64.rpm perf-debuginfo-2.6.32-642.15.1.el6.ppc64.rpm python-perf-2.6.32-642.15.1.el6.ppc64.rpm python-perf-debuginfo-2.6.32-642.15.1.el6.ppc64.rpm s390x: kernel-debug-debuginfo-2.6.32-642.15.1.el6.s390x.rpm kernel-debuginfo-2.6.32-642.15.1.el6.s390x.rpm kernel-debuginfo-common-s390x-2.6.32-642.15.1.el6.s390x.rpm kernel-kdump-debuginfo-2.6.32-642.15.1.el6.s390x.rpm perf-debuginfo-2.6.32-642.15.1.el6.s390x.rpm python-perf-2.6.32-642.15.1.el6.s390x.rpm python-perf-debuginfo-2.6.32-642.15.1.el6.s390x.rpm x86_64: kernel-debug-debuginfo-2.6.32-642.15.1.el6.x86_64.rpm kernel-debuginfo-2.6.32-642.15.1.el6.x86_64.rpm kernel-debuginfo-common-x86_64-2.6.32-642.15.1.el6.x86_64.rpm perf-debuginfo-2.6.32-642.15.1.el6.x86_64.rpm python-perf-2.6.32-642.15.1.el6.x86_64.rpm python-perf-debuginfo-2.6.32-642.15.1.el6.x86_64.rpm Red Hat Enterprise Linux Workstation (v. 6): Source: kernel-2.6.32-642.15.1.el6.src.rpm i386: kernel-2.6.32-642.15.1.el6.i686.rpm kernel-debug-2.6.32-642.15.1.el6.i686.rpm kernel-debug-debuginfo-2.6.32-642.15.1.el6.i686.rpm kernel-debug-devel-2.6.32-642.15.1.el6.i686.rpm kernel-debuginfo-2.6.32-642.15.1.el6.i686.rpm kernel-debuginfo-common-i686-2.6.32-642.15.1.el6.i686.rpm kernel-devel-2.6.32-642.15.1.el6.i686.rpm kernel-headers-2.6.32-642.15.1.el6.i686.rpm perf-2.6.32-642.15.1.el6.i686.rpm perf-debuginfo-2.6.32-642.15.1.el6.i686.rpm python-perf-debuginfo-2.6.32-642.15.1.el6.i686.rpm noarch: kernel-abi-whitelists-2.6.32-642.15.1.el6.noarch.rpm kernel-doc-2.6.32-642.15.1.el6.noarch.rpm kernel-firmware-2.6.32-642.15.1.el6.noarch.rpm x86_64: kernel-2.6.32-642.15.1.el6.x86_64.rpm kernel-debug-2.6.32-642.15.1.el6.x86_64.rpm kernel-debug-debuginfo-2.6.32-642.15.1.el6.i686.rpm kernel-debug-debuginfo-2.6.32-642.15.1.el6.x86_64.rpm kernel-debug-devel-2.6.32-642.15.1.el6.i686.rpm kernel-debug-devel-2.6.32-642.15.1.el6.x86_64.rpm kernel-debuginfo-2.6.32-642.15.1.el6.i686.rpm kernel-debuginfo-2.6.32-642.15.1.el6.x86_64.rpm kernel-debuginfo-common-i686-2.6.32-642.15.1.el6.i686.rpm kernel-debuginfo-common-x86_64-2.6.32-642.15.1.el6.x86_64.rpm kernel-devel-2.6.32-642.15.1.el6.x86_64.rpm kernel-headers-2.6.32-642.15.1.el6.x86_64.rpm perf-2.6.32-642.15.1.el6.x86_64.rpm perf-debuginfo-2.6.32-642.15.1.el6.i686.rpm perf-debuginfo-2.6.32-642.15.1.el6.x86_64.rpm python-perf-debuginfo-2.6.32-642.15.1.el6.i686.rpm python-perf-debuginfo-2.6.32-642.15.1.el6.x86_64.rpm Red Hat Enterprise Linux Workstation Optional (v. 6): i386: kernel-debug-debuginfo-2.6.32-642.15.1.el6.i686.rpm kernel-debuginfo-2.6.32-642.15.1.el6.i686.rpm kernel-debuginfo-common-i686-2.6.32-642.15.1.el6.i686.rpm perf-debuginfo-2.6.32-642.15.1.el6.i686.rpm python-perf-2.6.32-642.15.1.el6.i686.rpm python-perf-debuginfo-2.6.32-642.15.1.el6.i686.rpm x86_64: kernel-debug-debuginfo-2.6.32-642.15.1.el6.x86_64.rpm kernel-debuginfo-2.6.32-642.15.1.el6.x86_64.rpm kernel-debuginfo-common-x86_64-2.6.32-642.15.1.el6.x86_64.rpm perf-debuginfo-2.6.32-642.15.1.el6.x86_64.rpm python-perf-2.6.32-642.15.1.el6.x86_64.rpm python-perf-debuginfo-2.6.32-642.15.1.el6.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/ 7. References: https://access.redhat.com/security/cve/CVE-2016-6136 https://access.redhat.com/security/cve/CVE-2016-9555 https://access.redhat.com/security/updates/classification/#moderate https://access.redhat.com/security/vulnerabilities/2706661 8. Contact: The Red Hat security contact is . More contact details at https://access.redhat.com/security/team/contact/ Copyright 2017 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iD8DBQFYrx/HXlSAg2UNWIIRApU4AJ9l6szvNPjDAgH1twm0WZQtFSL+eACbBZsL 3UKxmm2CJO6fK4ol4lktDrA= =ZuqW -----END PGP SIGNATURE----- --
  2. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ===================================================================== Red Hat Security Advisory Synopsis: Important: kernel security and bug fix update Advisory ID: RHSA-2017:0316-01 Product: Red Hat Enterprise Linux Advisory URL: https://rhn.redhat.com/errata/RHSA-2017-0316.html Issue date: 2017-02-23 CVE Names: CVE-2017-6074 ===================================================================== 1. Summary: An update for kernel is now available for Red Hat Enterprise Linux 6.7 Extended Update Support. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. 2. Relevant releases/architectures: Red Hat Enterprise Linux HPC Node EUS (v. 6.7) - noarch, x86_64 Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7) - x86_64 Red Hat Enterprise Linux Server EUS (v. 6.7) - i386, noarch, ppc64, s390x, x86_64 Red Hat Enterprise Linux Server Optional EUS (v. 6.7) - i386, ppc64, s390x, x86_64 3. Description: The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * A use-after-free flaw was found in the way the Linux kernel's Datagram Congestion Control Protocol (DCCP) implementation freed SKB (socket buffer) resources for a DCCP_PKT_REQUEST packet when the IPV6_RECVPKTINFO option is set on the socket. A local, unprivileged user could use this flaw to alter the kernel memory, allowing them to escalate their privileges on the system. (CVE-2017-6074, Important) Red Hat would like to thank Andrey Konovalov (Google) for reporting this issue. Bug Fix(es): * When an NFS server received a compound Remote Procedure Call (RPC) with multiple operations where the SECINFO operation was the ninth or later operation, the server terminated unexpectedly. This update fixes the NFS server to correctly initialize all arguments of all compound RPC operations that are beyond the first eight operations. As a result, the NFS server no longer crashes in the described situation. (BZ#1413035) 4. Solution: For details on how to apply this update, which includes the changes described in this advisory, refer to: https://access.redhat.com/articles/11258 The system must be rebooted for this update to take effect. 5. Bugs fixed (https://bugzilla.redhat.com/): 1423071 - CVE-2017-6074 kernel: use after free in dccp protocol 6. Package List: Red Hat Enterprise Linux HPC Node EUS (v. 6.7): Source: kernel-2.6.32-573.40.1.el6.src.rpm noarch: kernel-abi-whitelists-2.6.32-573.40.1.el6.noarch.rpm kernel-doc-2.6.32-573.40.1.el6.noarch.rpm kernel-firmware-2.6.32-573.40.1.el6.noarch.rpm x86_64: kernel-2.6.32-573.40.1.el6.x86_64.rpm kernel-debug-2.6.32-573.40.1.el6.x86_64.rpm kernel-debug-debuginfo-2.6.32-573.40.1.el6.i686.rpm kernel-debug-debuginfo-2.6.32-573.40.1.el6.x86_64.rpm kernel-debug-devel-2.6.32-573.40.1.el6.i686.rpm kernel-debug-devel-2.6.32-573.40.1.el6.x86_64.rpm kernel-debuginfo-2.6.32-573.40.1.el6.i686.rpm kernel-debuginfo-2.6.32-573.40.1.el6.x86_64.rpm kernel-debuginfo-common-i686-2.6.32-573.40.1.el6.i686.rpm kernel-debuginfo-common-x86_64-2.6.32-573.40.1.el6.x86_64.rpm kernel-devel-2.6.32-573.40.1.el6.x86_64.rpm kernel-headers-2.6.32-573.40.1.el6.x86_64.rpm perf-2.6.32-573.40.1.el6.x86_64.rpm perf-debuginfo-2.6.32-573.40.1.el6.i686.rpm perf-debuginfo-2.6.32-573.40.1.el6.x86_64.rpm python-perf-debuginfo-2.6.32-573.40.1.el6.i686.rpm python-perf-debuginfo-2.6.32-573.40.1.el6.x86_64.rpm Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7): x86_64: kernel-debug-debuginfo-2.6.32-573.40.1.el6.x86_64.rpm kernel-debuginfo-2.6.32-573.40.1.el6.x86_64.rpm kernel-debuginfo-common-x86_64-2.6.32-573.40.1.el6.x86_64.rpm perf-debuginfo-2.6.32-573.40.1.el6.x86_64.rpm python-perf-2.6.32-573.40.1.el6.x86_64.rpm python-perf-debuginfo-2.6.32-573.40.1.el6.x86_64.rpm Red Hat Enterprise Linux Server EUS (v. 6.7): Source: kernel-2.6.32-573.40.1.el6.src.rpm i386: kernel-2.6.32-573.40.1.el6.i686.rpm kernel-debug-2.6.32-573.40.1.el6.i686.rpm kernel-debug-debuginfo-2.6.32-573.40.1.el6.i686.rpm kernel-debug-devel-2.6.32-573.40.1.el6.i686.rpm kernel-debuginfo-2.6.32-573.40.1.el6.i686.rpm kernel-debuginfo-common-i686-2.6.32-573.40.1.el6.i686.rpm kernel-devel-2.6.32-573.40.1.el6.i686.rpm kernel-headers-2.6.32-573.40.1.el6.i686.rpm perf-2.6.32-573.40.1.el6.i686.rpm perf-debuginfo-2.6.32-573.40.1.el6.i686.rpm python-perf-debuginfo-2.6.32-573.40.1.el6.i686.rpm noarch: kernel-abi-whitelists-2.6.32-573.40.1.el6.noarch.rpm kernel-doc-2.6.32-573.40.1.el6.noarch.rpm kernel-firmware-2.6.32-573.40.1.el6.noarch.rpm ppc64: kernel-2.6.32-573.40.1.el6.ppc64.rpm kernel-bootwrapper-2.6.32-573.40.1.el6.ppc64.rpm kernel-debug-2.6.32-573.40.1.el6.ppc64.rpm kernel-debug-debuginfo-2.6.32-573.40.1.el6.ppc64.rpm kernel-debug-devel-2.6.32-573.40.1.el6.ppc64.rpm kernel-debuginfo-2.6.32-573.40.1.el6.ppc64.rpm kernel-debuginfo-common-ppc64-2.6.32-573.40.1.el6.ppc64.rpm kernel-devel-2.6.32-573.40.1.el6.ppc64.rpm kernel-headers-2.6.32-573.40.1.el6.ppc64.rpm perf-2.6.32-573.40.1.el6.ppc64.rpm perf-debuginfo-2.6.32-573.40.1.el6.ppc64.rpm python-perf-debuginfo-2.6.32-573.40.1.el6.ppc64.rpm s390x: kernel-2.6.32-573.40.1.el6.s390x.rpm kernel-debug-2.6.32-573.40.1.el6.s390x.rpm kernel-debug-debuginfo-2.6.32-573.40.1.el6.s390x.rpm kernel-debug-devel-2.6.32-573.40.1.el6.s390x.rpm kernel-debuginfo-2.6.32-573.40.1.el6.s390x.rpm kernel-debuginfo-common-s390x-2.6.32-573.40.1.el6.s390x.rpm kernel-devel-2.6.32-573.40.1.el6.s390x.rpm kernel-headers-2.6.32-573.40.1.el6.s390x.rpm kernel-kdump-2.6.32-573.40.1.el6.s390x.rpm kernel-kdump-debuginfo-2.6.32-573.40.1.el6.s390x.rpm kernel-kdump-devel-2.6.32-573.40.1.el6.s390x.rpm perf-2.6.32-573.40.1.el6.s390x.rpm perf-debuginfo-2.6.32-573.40.1.el6.s390x.rpm python-perf-debuginfo-2.6.32-573.40.1.el6.s390x.rpm x86_64: kernel-2.6.32-573.40.1.el6.x86_64.rpm kernel-debug-2.6.32-573.40.1.el6.x86_64.rpm kernel-debug-debuginfo-2.6.32-573.40.1.el6.i686.rpm kernel-debug-debuginfo-2.6.32-573.40.1.el6.x86_64.rpm kernel-debug-devel-2.6.32-573.40.1.el6.i686.rpm kernel-debug-devel-2.6.32-573.40.1.el6.x86_64.rpm kernel-debuginfo-2.6.32-573.40.1.el6.i686.rpm kernel-debuginfo-2.6.32-573.40.1.el6.x86_64.rpm kernel-debuginfo-common-i686-2.6.32-573.40.1.el6.i686.rpm kernel-debuginfo-common-x86_64-2.6.32-573.40.1.el6.x86_64.rpm kernel-devel-2.6.32-573.40.1.el6.x86_64.rpm kernel-headers-2.6.32-573.40.1.el6.x86_64.rpm perf-2.6.32-573.40.1.el6.x86_64.rpm perf-debuginfo-2.6.32-573.40.1.el6.i686.rpm perf-debuginfo-2.6.32-573.40.1.el6.x86_64.rpm python-perf-debuginfo-2.6.32-573.40.1.el6.i686.rpm python-perf-debuginfo-2.6.32-573.40.1.el6.x86_64.rpm Red Hat Enterprise Linux Server Optional EUS (v. 6.7): i386: kernel-debug-debuginfo-2.6.32-573.40.1.el6.i686.rpm kernel-debuginfo-2.6.32-573.40.1.el6.i686.rpm kernel-debuginfo-common-i686-2.6.32-573.40.1.el6.i686.rpm perf-debuginfo-2.6.32-573.40.1.el6.i686.rpm python-perf-2.6.32-573.40.1.el6.i686.rpm python-perf-debuginfo-2.6.32-573.40.1.el6.i686.rpm ppc64: kernel-debug-debuginfo-2.6.32-573.40.1.el6.ppc64.rpm kernel-debuginfo-2.6.32-573.40.1.el6.ppc64.rpm kernel-debuginfo-common-ppc64-2.6.32-573.40.1.el6.ppc64.rpm perf-debuginfo-2.6.32-573.40.1.el6.ppc64.rpm python-perf-2.6.32-573.40.1.el6.ppc64.rpm python-perf-debuginfo-2.6.32-573.40.1.el6.ppc64.rpm s390x: kernel-debug-debuginfo-2.6.32-573.40.1.el6.s390x.rpm kernel-debuginfo-2.6.32-573.40.1.el6.s390x.rpm kernel-debuginfo-common-s390x-2.6.32-573.40.1.el6.s390x.rpm kernel-kdump-debuginfo-2.6.32-573.40.1.el6.s390x.rpm perf-debuginfo-2.6.32-573.40.1.el6.s390x.rpm python-perf-2.6.32-573.40.1.el6.s390x.rpm python-perf-debuginfo-2.6.32-573.40.1.el6.s390x.rpm x86_64: kernel-debug-debuginfo-2.6.32-573.40.1.el6.x86_64.rpm kernel-debuginfo-2.6.32-573.40.1.el6.x86_64.rpm kernel-debuginfo-common-x86_64-2.6.32-573.40.1.el6.x86_64.rpm perf-debuginfo-2.6.32-573.40.1.el6.x86_64.rpm python-perf-2.6.32-573.40.1.el6.x86_64.rpm python-perf-debuginfo-2.6.32-573.40.1.el6.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/ 7. References: https://access.redhat.com/security/cve/CVE-2017-6074 https://access.redhat.com/security/updates/classification/#important 8. Contact: The Red Hat security contact is . More contact details at https://access.redhat.com/security/team/contact/ Copyright 2017 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iD8DBQFYryAUXlSAg2UNWIIRAjmQAKCTmPf6PQcw3a6FA+fZb06P6DOwAACfQvds veY8z8VY5ewF646wsRGayAk= =URf4 -----END PGP SIGNATURE----- --
  3. ** TECHSPOT ------------------------------------------------------------ ** 7 Ways to Screenshot in Windows 10 ------------------------------------------------------------ ** http://www.techspot.com/article/1340-windows-10-screenshot/ ------------------------------------------------------------ A few of you are probably thinking: "isn't it easy to screenshot in Windows 10? You just press the print screen button and a screenshot is saved to the clipboard!" And you'd be correct; But Windows provides several other ways to screenshot, many of which are better options depending on your requirements. Thank you. Julio Franco Executive Editor | TECHSPOT ( -at -) juliofranco ----------------------------------- ============================================================ Our mailing address is: TechSpot 8237 NW 68 St Miami, FL 33166 USA
  4. Designed in City of Industry, California, Azio products are known for their unique, visually appealing designs that don’t trend towards normality. Their MK Retro keyboard is a great example of this, as it is a mechanical keyboard with a decidedly retro typewriter-esque design. Azio has recently begun making a push towards the PC gaming market with several product releases in the mechanical keyboard and mouse market. Currently, Azio develops products under their Lifestyle and Gaming labels, which will help users differentiate and find products suiting them. The Azio Lifestyle label includes Mac compatible keyboards and products aimed at traditional PC users, while the scope of their Gaming lineup is self-explanatory. Article Title: AZIO Armato Backlit Mechanical Gaming Keyboard Review ( -at -) Legit Reviews Article URL: http://www.legitreviews.com/azio-armato-backlit-mechanical-gaming-keyboard-review_191192 Unsubscribe: http://adserv.legitreviews.com/cgi-bin/dada/mail.cgi/u/legitpr/reviewnews// =
  5. Kolink Continuum KL-C1050PL 1050W Platinum Review ------------------------------------------------------------ http://us2.campaign-archive2.com/?u=bfb2b902b5fb045ad6f841f98&id=63b27ca2f0&e=872093acb5 http://www.kitguru.net Kolink Continuum KL-C1050PL 1050W Platinum Review Kolink are a relatively new brand to market, however I was impressed with their 1200W power supply, which I reviewed in November 2016 – today we look at the new 1050W model. These products are controlled by Hungarian Kellytech, a sister company of European based Caseking – who have exclusive distribution rights. Unsurprisingly they are sold in the United Kingdom by Overclockers UK. Read the review here: http://www.kitguru.net/components/power-supplies/zardon/kolink-continuum-kl-c1050pl-1050w-platinum-review/ ============================================================ ** follow on Twitter (http://twitter.com/#!/kitgurupress) | ** friend on Facebook (http://www.facebook.com/pages/KitGuru/162236020510911) | ** forward to a friend (http://us2.forward-to-friend1.com/forward?u=bfb2b902b5fb045ad6f841f98&id=63b27ca2f0&e=872093acb5) Copyright © 2017 KitGuru, All rights reserved. You are receiving this because you are a news partner or have signed up to receive our news.
  6. SUSE Security Update: Security update for php5 ______________________________________________________________________________ Announcement ID: SUSE-SU-2017:0556-1 Rating: important References: #1019550 #1022219 #1022255 #1022257 #1022260 #1022263 #1022264 #1022265 Cross-References: CVE-2016-10158 CVE-2016-10159 CVE-2016-10160 CVE-2016-10161 CVE-2016-10166 CVE-2016-10167 CVE-2016-10168 CVE-2016-7478 Affected Products: SUSE Linux Enterprise Software Development Kit 12-SP2 SUSE Linux Enterprise Software Development Kit 12-SP1 SUSE Linux Enterprise Module for Web Scripting 12 ______________________________________________________________________________ An update that fixes 8 vulnerabilities is now available. Description: This update for php5 fixes the following issues: - CVE-2016-7478: When unserializing untrusted input data, PHP could end up in an infinite loop, causing denial of service (bsc#1019550) - CVE-2016-10158: The exif_convert_any_to_int function in ext/exif/exif.c in PHP allowed remote attackers to cause a denial of service (application crash) via crafted EXIF data that triggers an attempt to divide the minimum representable negative integer by -1. (bsc#1022219) - CVE-2016-10159: Integer overflow in the phar_parse_pharfile function in ext/phar/phar.c in PHP allowed remote attackers to cause a denial of service (memory consumption or application crash) via a truncated manifest entry in a PHAR archive. (bsc#1022255) - CVE-2016-10160: Off-by-one error in the phar_parse_pharfile function in ext/phar/phar.c in PHP allowed remote attackers to cause a denial of service (memory corruption) or possibly execute arbitrary code via a crafted PHAR archive with an alias mismatch. (bsc#1022257) - CVE-2016-10161: The object_common1 function in ext/standard/var_unserializer.c in PHP allowed remote attackers to cause a denial of service (buffer over-read and application crash) via crafted serialized data that is mishandled in a finish_nested_data call. (bsc#1022260) - CVE-2016-10166: A potential unsigned underflow in gd interpolation functions could lead to memory corruption in the PHP gd module (bsc#1022263) - CVE-2016-10167: A denial of service problem in gdImageCreateFromGd2Ctx() could lead to php out of memory even on small files. (bsc#1022264) - CVE-2016-10168: A signed integer overflow in the gd module could lead to memory corruption (bsc#1022265) Patch Instructions: To install this SUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product: - SUSE Linux Enterprise Software Development Kit 12-SP2: zypper in -t patch SUSE-SLE-SDK-12-SP2-2017-293=1 - SUSE Linux Enterprise Software Development Kit 12-SP1: zypper in -t patch SUSE-SLE-SDK-12-SP1-2017-293=1 - SUSE Linux Enterprise Module for Web Scripting 12: zypper in -t patch SUSE-SLE-Module-Web-Scripting-12-2017-293=1 To bring your system up-to-date, use "zypper patch". Package List: - SUSE Linux Enterprise Software Development Kit 12-SP2 (aarch64 ppc64le s390x x86_64): php5-debuginfo-5.5.14-96.1 php5-debugsource-5.5.14-96.1 php5-devel-5.5.14-96.1 - SUSE Linux Enterprise Software Development Kit 12-SP1 (ppc64le s390x x86_64): php5-debuginfo-5.5.14-96.1 php5-debugsource-5.5.14-96.1 php5-devel-5.5.14-96.1 - SUSE Linux Enterprise Module for Web Scripting 12 (aarch64 ppc64le s390x x86_64): apache2-mod_php5-5.5.14-96.1 apache2-mod_php5-debuginfo-5.5.14-96.1 php5-5.5.14-96.1 php5-bcmath-5.5.14-96.1 php5-bcmath-debuginfo-5.5.14-96.1 php5-bz2-5.5.14-96.1 php5-bz2-debuginfo-5.5.14-96.1 php5-calendar-5.5.14-96.1 php5-calendar-debuginfo-5.5.14-96.1 php5-ctype-5.5.14-96.1 php5-ctype-debuginfo-5.5.14-96.1 php5-curl-5.5.14-96.1 php5-curl-debuginfo-5.5.14-96.1 php5-dba-5.5.14-96.1 php5-dba-debuginfo-5.5.14-96.1 php5-debuginfo-5.5.14-96.1 php5-debugsource-5.5.14-96.1 php5-dom-5.5.14-96.1 php5-dom-debuginfo-5.5.14-96.1 php5-enchant-5.5.14-96.1 php5-enchant-debuginfo-5.5.14-96.1 php5-exif-5.5.14-96.1 php5-exif-debuginfo-5.5.14-96.1 php5-fastcgi-5.5.14-96.1 php5-fastcgi-debuginfo-5.5.14-96.1 php5-fileinfo-5.5.14-96.1 php5-fileinfo-debuginfo-5.5.14-96.1 php5-fpm-5.5.14-96.1 php5-fpm-debuginfo-5.5.14-96.1 php5-ftp-5.5.14-96.1 php5-ftp-debuginfo-5.5.14-96.1 php5-gd-5.5.14-96.1 php5-gd-debuginfo-5.5.14-96.1 php5-gettext-5.5.14-96.1 php5-gettext-debuginfo-5.5.14-96.1 php5-gmp-5.5.14-96.1 php5-gmp-debuginfo-5.5.14-96.1 php5-iconv-5.5.14-96.1 php5-iconv-debuginfo-5.5.14-96.1 php5-imap-5.5.14-96.1 php5-imap-debuginfo-5.5.14-96.1 php5-intl-5.5.14-96.1 php5-intl-debuginfo-5.5.14-96.1 php5-json-5.5.14-96.1 php5-json-debuginfo-5.5.14-96.1 php5-ldap-5.5.14-96.1 php5-ldap-debuginfo-5.5.14-96.1 php5-mbstring-5.5.14-96.1 php5-mbstring-debuginfo-5.5.14-96.1 php5-mcrypt-5.5.14-96.1 php5-mcrypt-debuginfo-5.5.14-96.1 php5-mysql-5.5.14-96.1 php5-mysql-debuginfo-5.5.14-96.1 php5-odbc-5.5.14-96.1 php5-odbc-debuginfo-5.5.14-96.1 php5-opcache-5.5.14-96.1 php5-opcache-debuginfo-5.5.14-96.1 php5-openssl-5.5.14-96.1 php5-openssl-debuginfo-5.5.14-96.1 php5-pcntl-5.5.14-96.1 php5-pcntl-debuginfo-5.5.14-96.1 php5-pdo-5.5.14-96.1 php5-pdo-debuginfo-5.5.14-96.1 php5-pgsql-5.5.14-96.1 php5-pgsql-debuginfo-5.5.14-96.1 php5-phar-5.5.14-96.1 php5-phar-debuginfo-5.5.14-96.1 php5-posix-5.5.14-96.1 php5-posix-debuginfo-5.5.14-96.1 php5-pspell-5.5.14-96.1 php5-pspell-debuginfo-5.5.14-96.1 php5-shmop-5.5.14-96.1 php5-shmop-debuginfo-5.5.14-96.1 php5-snmp-5.5.14-96.1 php5-snmp-debuginfo-5.5.14-96.1 php5-soap-5.5.14-96.1 php5-soap-debuginfo-5.5.14-96.1 php5-sockets-5.5.14-96.1 php5-sockets-debuginfo-5.5.14-96.1 php5-sqlite-5.5.14-96.1 php5-sqlite-debuginfo-5.5.14-96.1 php5-suhosin-5.5.14-96.1 php5-suhosin-debuginfo-5.5.14-96.1 php5-sysvmsg-5.5.14-96.1 php5-sysvmsg-debuginfo-5.5.14-96.1 php5-sysvsem-5.5.14-96.1 php5-sysvsem-debuginfo-5.5.14-96.1 php5-sysvshm-5.5.14-96.1 php5-sysvshm-debuginfo-5.5.14-96.1 php5-tokenizer-5.5.14-96.1 php5-tokenizer-debuginfo-5.5.14-96.1 php5-wddx-5.5.14-96.1 php5-wddx-debuginfo-5.5.14-96.1 php5-xmlreader-5.5.14-96.1 php5-xmlreader-debuginfo-5.5.14-96.1 php5-xmlrpc-5.5.14-96.1 php5-xmlrpc-debuginfo-5.5.14-96.1 php5-xmlwriter-5.5.14-96.1 php5-xmlwriter-debuginfo-5.5.14-96.1 php5-xsl-5.5.14-96.1 php5-xsl-debuginfo-5.5.14-96.1 php5-zip-5.5.14-96.1 php5-zip-debuginfo-5.5.14-96.1 php5-zlib-5.5.14-96.1 php5-zlib-debuginfo-5.5.14-96.1 - SUSE Linux Enterprise Module for Web Scripting 12 (noarch): php5-pear-5.5.14-96.1 References: https://www.suse.com/security/cve/CVE-2016-10158.html https://www.suse.com/security/cve/CVE-2016-10159.html https://www.suse.com/security/cve/CVE-2016-10160.html https://www.suse.com/security/cve/CVE-2016-10161.html https://www.suse.com/security/cve/CVE-2016-10166.html https://www.suse.com/security/cve/CVE-2016-10167.html https://www.suse.com/security/cve/CVE-2016-10168.html https://www.suse.com/security/cve/CVE-2016-7478.html https://bugzilla.suse.com/1019550 https://bugzilla.suse.com/1022219 https://bugzilla.suse.com/1022255 https://bugzilla.suse.com/1022257 https://bugzilla.suse.com/1022260 https://bugzilla.suse.com/1022263 https://bugzilla.suse.com/1022264 https://bugzilla.suse.com/1022265 -- To unsubscribe, e-mail: opensuse-security-announce+unsubscribe ( -at -) opensuse.org For additional commands, e-mail: opensuse-security-announce+help ( -at -) opensuse.org
  7. SUSE Security Update: Security update for util-linux ______________________________________________________________________________ Announcement ID: SUSE-SU-2017:0554-1 Rating: important References: #1008965 #1012504 #1012632 #1019332 #1020077 #1020985 #1023041 Cross-References: CVE-2017-2616 Affected Products: SUSE Linux Enterprise Workstation Extension 12-SP2 SUSE Linux Enterprise Software Development Kit 12-SP2 SUSE Linux Enterprise Server for Raspberry Pi 12-SP2 SUSE Linux Enterprise Server 12-SP2 SUSE Linux Enterprise Desktop 12-SP2 ______________________________________________________________________________ An update that solves one vulnerability and has 6 fixes is now available. Description: This update for util-linux fixes the following issues: This security issue was fixed: - CVE-2017-2616: In su with PAM support it was possible for local users to send SIGKILL to selected other processes with root privileges (bsc#1023041). This non-security issues were fixed: - lscpu: Implement WSL detection and work around crash (bsc#1019332) - fstrim: De-duplicate btrfs sub-volumes for "fstrim -a" and bind mounts (bsc#1020077) - Fix regressions in safe loop re-use patch set for libmount (bsc#1012504) - Disable ro checks for mtab (bsc#1012632) - Ensure that the option "users,exec,dev,suid" work as expected on NFS mounts (bsc#1008965) - Fix empty slave detection to prevent 100% CPU load in some cases (bsc#1020985) Patch Instructions: To install this SUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product: - SUSE Linux Enterprise Workstation Extension 12-SP2: zypper in -t patch SUSE-SLE-WE-12-SP2-2017-292=1 - SUSE Linux Enterprise Software Development Kit 12-SP2: zypper in -t patch SUSE-SLE-SDK-12-SP2-2017-292=1 - SUSE Linux Enterprise Server for Raspberry Pi 12-SP2: zypper in -t patch SUSE-SLE-RPI-12-SP2-2017-292=1 - SUSE Linux Enterprise Server 12-SP2: zypper in -t patch SUSE-SLE-SERVER-12-SP2-2017-292=1 - SUSE Linux Enterprise Desktop 12-SP2: zypper in -t patch SUSE-SLE-DESKTOP-12-SP2-2017-292=1 To bring your system up-to-date, use "zypper patch". Package List: - SUSE Linux Enterprise Workstation Extension 12-SP2 (x86_64): libuuid-devel-2.28-44.3.1 util-linux-debuginfo-2.28-44.3.1 util-linux-debugsource-2.28-44.3.1 - SUSE Linux Enterprise Software Development Kit 12-SP2 (aarch64 ppc64le s390x x86_64): libblkid-devel-2.28-44.3.1 libmount-devel-2.28-44.3.1 libsmartcols-devel-2.28-44.3.1 libuuid-devel-2.28-44.3.1 util-linux-debuginfo-2.28-44.3.1 util-linux-debugsource-2.28-44.3.1 - SUSE Linux Enterprise Server for Raspberry Pi 12-SP2 (aarch64): libblkid1-2.28-44.3.1 libblkid1-debuginfo-2.28-44.3.1 libfdisk1-2.28-44.3.1 libfdisk1-debuginfo-2.28-44.3.1 libmount1-2.28-44.3.1 libmount1-debuginfo-2.28-44.3.1 libsmartcols1-2.28-44.3.1 libsmartcols1-debuginfo-2.28-44.3.1 libuuid1-2.28-44.3.1 libuuid1-debuginfo-2.28-44.3.1 python-libmount-2.28-44.3.3 python-libmount-debuginfo-2.28-44.3.3 python-libmount-debugsource-2.28-44.3.3 util-linux-2.28-44.3.1 util-linux-debuginfo-2.28-44.3.1 util-linux-debugsource-2.28-44.3.1 util-linux-systemd-2.28-44.3.3 util-linux-systemd-debuginfo-2.28-44.3.3 util-linux-systemd-debugsource-2.28-44.3.3 uuidd-2.28-44.3.3 uuidd-debuginfo-2.28-44.3.3 - SUSE Linux Enterprise Server for Raspberry Pi 12-SP2 (noarch): util-linux-lang-2.28-44.3.1 - SUSE Linux Enterprise Server 12-SP2 (aarch64 ppc64le x86_64): libblkid1-2.28-44.3.1 libblkid1-debuginfo-2.28-44.3.1 libfdisk1-2.28-44.3.1 libfdisk1-debuginfo-2.28-44.3.1 libmount1-2.28-44.3.1 libmount1-debuginfo-2.28-44.3.1 libsmartcols1-2.28-44.3.1 libsmartcols1-debuginfo-2.28-44.3.1 libuuid1-2.28-44.3.1 libuuid1-debuginfo-2.28-44.3.1 python-libmount-2.28-44.3.3 python-libmount-debuginfo-2.28-44.3.3 python-libmount-debugsource-2.28-44.3.3 util-linux-2.28-44.3.1 util-linux-debuginfo-2.28-44.3.1 util-linux-debugsource-2.28-44.3.1 util-linux-systemd-2.28-44.3.3 util-linux-systemd-debuginfo-2.28-44.3.3 util-linux-systemd-debugsource-2.28-44.3.3 uuidd-2.28-44.3.3 uuidd-debuginfo-2.28-44.3.3 - SUSE Linux Enterprise Server 12-SP2 (x86_64): libblkid1-32bit-2.28-44.3.1 libblkid1-debuginfo-32bit-2.28-44.3.1 libmount1-32bit-2.28-44.3.1 libmount1-debuginfo-32bit-2.28-44.3.1 libuuid1-32bit-2.28-44.3.1 libuuid1-debuginfo-32bit-2.28-44.3.1 - SUSE Linux Enterprise Server 12-SP2 (noarch): util-linux-lang-2.28-44.3.1 - SUSE Linux Enterprise Desktop 12-SP2 (x86_64): libblkid1-2.28-44.3.1 libblkid1-32bit-2.28-44.3.1 libblkid1-debuginfo-2.28-44.3.1 libblkid1-debuginfo-32bit-2.28-44.3.1 libfdisk1-2.28-44.3.1 libfdisk1-debuginfo-2.28-44.3.1 libmount1-2.28-44.3.1 libmount1-32bit-2.28-44.3.1 libmount1-debuginfo-2.28-44.3.1 libmount1-debuginfo-32bit-2.28-44.3.1 libsmartcols1-2.28-44.3.1 libsmartcols1-debuginfo-2.28-44.3.1 libuuid-devel-2.28-44.3.1 libuuid1-2.28-44.3.1 libuuid1-32bit-2.28-44.3.1 libuuid1-debuginfo-2.28-44.3.1 libuuid1-debuginfo-32bit-2.28-44.3.1 python-libmount-2.28-44.3.3 python-libmount-debuginfo-2.28-44.3.3 python-libmount-debugsource-2.28-44.3.3 util-linux-2.28-44.3.1 util-linux-debuginfo-2.28-44.3.1 util-linux-debugsource-2.28-44.3.1 util-linux-systemd-2.28-44.3.3 util-linux-systemd-debuginfo-2.28-44.3.3 util-linux-systemd-debugsource-2.28-44.3.3 uuidd-2.28-44.3.3 uuidd-debuginfo-2.28-44.3.3 - SUSE Linux Enterprise Desktop 12-SP2 (noarch): util-linux-lang-2.28-44.3.1 References: https://www.suse.com/security/cve/CVE-2017-2616.html https://bugzilla.suse.com/1008965 https://bugzilla.suse.com/1012504 https://bugzilla.suse.com/1012632 https://bugzilla.suse.com/1019332 https://bugzilla.suse.com/1020077 https://bugzilla.suse.com/1020985 https://bugzilla.suse.com/1023041 -- To unsubscribe, e-mail: opensuse-security-announce+unsubscribe ( -at -) opensuse.org For additional commands, e-mail: opensuse-security-announce+help ( -at -) opensuse.org
  8. SUSE Security Update: Security update for util-linux ______________________________________________________________________________ Announcement ID: SUSE-SU-2017:0555-1 Rating: important References: #1008965 #1012504 #1012632 #1019332 #1020077 #1023041 Cross-References: CVE-2017-2616 Affected Products: SUSE Linux Enterprise Workstation Extension 12-SP1 SUSE Linux Enterprise Software Development Kit 12-SP1 SUSE Linux Enterprise Server 12-SP1 SUSE Linux Enterprise Desktop 12-SP1 ______________________________________________________________________________ An update that solves one vulnerability and has 5 fixes is now available. Description: This update for util-linux fixes the following issues: This security issue was fixed: - CVE-2017-2616: In su with PAM support it was possible for local users to send SIGKILL to selected other processes with root privileges (bsc#1023041). This non-security issues were fixed: - lscpu: Implement WSL detection and work around crash (bsc#1019332) - fstrim: De-duplicate btrfs sub-volumes for "fstrim -a" and bind mounts (bsc#1020077) - Fix regressions in safe loop re-use patch set for libmount (bsc#1012504) - Disable ro checks for mtab (bsc#1012632) - Ensure that the option "users,exec,dev,suid" work as expected on NFS mounts (bsc#1008965) Patch Instructions: To install this SUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product: - SUSE Linux Enterprise Workstation Extension 12-SP1: zypper in -t patch SUSE-SLE-WE-12-SP1-2017-291=1 - SUSE Linux Enterprise Software Development Kit 12-SP1: zypper in -t patch SUSE-SLE-SDK-12-SP1-2017-291=1 - SUSE Linux Enterprise Server 12-SP1: zypper in -t patch SUSE-SLE-SERVER-12-SP1-2017-291=1 - SUSE Linux Enterprise Desktop 12-SP1: zypper in -t patch SUSE-SLE-DESKTOP-12-SP1-2017-291=1 To bring your system up-to-date, use "zypper patch". Package List: - SUSE Linux Enterprise Workstation Extension 12-SP1 (x86_64): libuuid-devel-2.25-40.1 util-linux-debuginfo-2.25-40.1 util-linux-debugsource-2.25-40.1 - SUSE Linux Enterprise Software Development Kit 12-SP1 (ppc64le s390x x86_64): libblkid-devel-2.25-40.1 libmount-devel-2.25-40.1 libsmartcols-devel-2.25-40.1 libuuid-devel-2.25-40.1 util-linux-debuginfo-2.25-40.1 util-linux-debugsource-2.25-40.1 - SUSE Linux Enterprise Server 12-SP1 (ppc64le s390x x86_64): libblkid1-2.25-40.1 libblkid1-debuginfo-2.25-40.1 libmount1-2.25-40.1 libmount1-debuginfo-2.25-40.1 libsmartcols1-2.25-40.1 libsmartcols1-debuginfo-2.25-40.1 libuuid1-2.25-40.1 libuuid1-debuginfo-2.25-40.1 python-libmount-2.25-40.2 python-libmount-debuginfo-2.25-40.2 python-libmount-debugsource-2.25-40.2 util-linux-2.25-40.1 util-linux-debuginfo-2.25-40.1 util-linux-debugsource-2.25-40.1 util-linux-systemd-2.25-40.1 util-linux-systemd-debuginfo-2.25-40.1 util-linux-systemd-debugsource-2.25-40.1 uuidd-2.25-40.1 uuidd-debuginfo-2.25-40.1 - SUSE Linux Enterprise Server 12-SP1 (s390x x86_64): libblkid1-32bit-2.25-40.1 libblkid1-debuginfo-32bit-2.25-40.1 libmount1-32bit-2.25-40.1 libmount1-debuginfo-32bit-2.25-40.1 libuuid1-32bit-2.25-40.1 libuuid1-debuginfo-32bit-2.25-40.1 - SUSE Linux Enterprise Server 12-SP1 (noarch): util-linux-lang-2.25-40.1 - SUSE Linux Enterprise Desktop 12-SP1 (noarch): util-linux-lang-2.25-40.1 - SUSE Linux Enterprise Desktop 12-SP1 (x86_64): libblkid1-2.25-40.1 libblkid1-32bit-2.25-40.1 libblkid1-debuginfo-2.25-40.1 libblkid1-debuginfo-32bit-2.25-40.1 libmount1-2.25-40.1 libmount1-32bit-2.25-40.1 libmount1-debuginfo-2.25-40.1 libmount1-debuginfo-32bit-2.25-40.1 libsmartcols1-2.25-40.1 libsmartcols1-debuginfo-2.25-40.1 libuuid-devel-2.25-40.1 libuuid1-2.25-40.1 libuuid1-32bit-2.25-40.1 libuuid1-debuginfo-2.25-40.1 libuuid1-debuginfo-32bit-2.25-40.1 python-libmount-2.25-40.2 python-libmount-debuginfo-2.25-40.2 python-libmount-debugsource-2.25-40.2 util-linux-2.25-40.1 util-linux-debuginfo-2.25-40.1 util-linux-debugsource-2.25-40.1 util-linux-systemd-2.25-40.1 util-linux-systemd-debuginfo-2.25-40.1 util-linux-systemd-debugsource-2.25-40.1 uuidd-2.25-40.1 uuidd-debuginfo-2.25-40.1 References: https://www.suse.com/security/cve/CVE-2017-2616.html https://bugzilla.suse.com/1008965 https://bugzilla.suse.com/1012504 https://bugzilla.suse.com/1012632 https://bugzilla.suse.com/1019332 https://bugzilla.suse.com/1020077 https://bugzilla.suse.com/1023041 -- To unsubscribe, e-mail: opensuse-security-announce+unsubscribe ( -at -) opensuse.org For additional commands, e-mail: opensuse-security-announce+help ( -at -) opensuse.org
  9. SUSE Security Update: Security update for util-linux ______________________________________________________________________________ Announcement ID: SUSE-SU-2017:0553-1 Rating: important References: #1008965 #1012504 #1012632 #1019332 #1020077 #1023041 #947494 #966891 #978993 #982331 #983164 #987176 #988361 Cross-References: CVE-2016-5011 CVE-2017-2616 Affected Products: SUSE Linux Enterprise Server for SAP 12 SUSE Linux Enterprise Server 12-LTSS ______________________________________________________________________________ An update that solves two vulnerabilities and has 11 fixes is now available. Description: This update for util-linux fixes a number of bugs and two security issues. The following security bugs were fixed: - CVE-2016-5011: Infinite loop DoS in libblkid while parsing DOS partition (bsc#988361) - CVE-2017-2616: In su with PAM support it was possible for local users to send SIGKILL to selected other processes with root privileges (bsc#1023041). The following non-security bugs were fixed: - bsc#1008965: Ensure that the option "users,exec,dev,suid" work as expected on NFS mounts - bsc#1012504: Fix regressions in safe loop re-use patch set for libmount - bsc#1012632: Disable ro checks for mtab - bsc#1020077: fstrim: De-duplicate btrfs sub-volumes for "fstrim -a" and bind mounts - bsc#947494: mount -a would fail to recognize btrfs already mounted, address loop re-use in libmount - bsc#966891: Conflict in meaning of losetup -L. This switch in SLE12 SP1 and SP2 continues to carry the meaning of --logical-blocksize instead of upstream --nooverlap - bsc#978993: cfdisk would mangle some text output - bsc#982331: libmount: ignore redundant slashes - bsc#983164: mount uid= and gid= would reject valid non UID/GID values - bsc#987176: When mounting a subfolder of a CIFS share, mount -a would show the mount as busy - bsc#1019332: lscpu: Implement WSL detection and work around crash Patch Instructions: To install this SUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product: - SUSE Linux Enterprise Server for SAP 12: zypper in -t patch SUSE-SLE-SAP-12-2017-290=1 - SUSE Linux Enterprise Server 12-LTSS: zypper in -t patch SUSE-SLE-SERVER-12-2017-290=1 To bring your system up-to-date, use "zypper patch". Package List: - SUSE Linux Enterprise Server for SAP 12 (x86_64): libblkid1-2.25-24.10.1 libblkid1-32bit-2.25-24.10.1 libblkid1-debuginfo-2.25-24.10.1 libblkid1-debuginfo-32bit-2.25-24.10.1 libmount1-2.25-24.10.1 libmount1-32bit-2.25-24.10.1 libmount1-debuginfo-2.25-24.10.1 libmount1-debuginfo-32bit-2.25-24.10.1 libsmartcols1-2.25-24.10.1 libsmartcols1-debuginfo-2.25-24.10.1 libuuid1-2.25-24.10.1 libuuid1-32bit-2.25-24.10.1 libuuid1-debuginfo-2.25-24.10.1 libuuid1-debuginfo-32bit-2.25-24.10.1 python-libmount-2.25-24.10.3 python-libmount-debuginfo-2.25-24.10.3 python-libmount-debugsource-2.25-24.10.3 util-linux-2.25-24.10.1 util-linux-debuginfo-2.25-24.10.1 util-linux-debugsource-2.25-24.10.1 util-linux-systemd-2.25-24.10.1 util-linux-systemd-debuginfo-2.25-24.10.1 util-linux-systemd-debugsource-2.25-24.10.1 uuidd-2.25-24.10.1 uuidd-debuginfo-2.25-24.10.1 - SUSE Linux Enterprise Server for SAP 12 (noarch): util-linux-lang-2.25-24.10.1 - SUSE Linux Enterprise Server 12-LTSS (ppc64le s390x x86_64): libblkid1-2.25-24.10.1 libblkid1-debuginfo-2.25-24.10.1 libmount1-2.25-24.10.1 libmount1-debuginfo-2.25-24.10.1 libsmartcols1-2.25-24.10.1 libsmartcols1-debuginfo-2.25-24.10.1 libuuid1-2.25-24.10.1 libuuid1-debuginfo-2.25-24.10.1 python-libmount-2.25-24.10.3 python-libmount-debuginfo-2.25-24.10.3 python-libmount-debugsource-2.25-24.10.3 util-linux-2.25-24.10.1 util-linux-debuginfo-2.25-24.10.1 util-linux-debugsource-2.25-24.10.1 util-linux-systemd-2.25-24.10.1 util-linux-systemd-debuginfo-2.25-24.10.1 util-linux-systemd-debugsource-2.25-24.10.1 uuidd-2.25-24.10.1 uuidd-debuginfo-2.25-24.10.1 - SUSE Linux Enterprise Server 12-LTSS (s390x x86_64): libblkid1-32bit-2.25-24.10.1 libblkid1-debuginfo-32bit-2.25-24.10.1 libmount1-32bit-2.25-24.10.1 libmount1-debuginfo-32bit-2.25-24.10.1 libuuid1-32bit-2.25-24.10.1 libuuid1-debuginfo-32bit-2.25-24.10.1 - SUSE Linux Enterprise Server 12-LTSS (noarch): util-linux-lang-2.25-24.10.1 References: https://www.suse.com/security/cve/CVE-2016-5011.html https://www.suse.com/security/cve/CVE-2017-2616.html https://bugzilla.suse.com/1008965 https://bugzilla.suse.com/1012504 https://bugzilla.suse.com/1012632 https://bugzilla.suse.com/1019332 https://bugzilla.suse.com/1020077 https://bugzilla.suse.com/1023041 https://bugzilla.suse.com/947494 https://bugzilla.suse.com/966891 https://bugzilla.suse.com/978993 https://bugzilla.suse.com/982331 https://bugzilla.suse.com/983164 https://bugzilla.suse.com/987176 https://bugzilla.suse.com/988361 -- To unsubscribe, e-mail: opensuse-security-announce+unsubscribe ( -at -) opensuse.org For additional commands, e-mail: opensuse-security-announce+help ( -at -) opensuse.org
  10. Title: Das Keyboard X40 Pro Gaming Mechanical Keyboard Review ( -at -) NikKTech Description: Das Keyboard enters the gaming peripherals market with the X40 Pro Gaming Keyboard featuring their very own Alpha-Zulu Linear and Tactile mechanical switches and we're here to check and see whether or not they're on the right path. Article Link: http://www.nikktech.com/main/articles/peripherals/keyboards/7503-das-keyboar d-x40-pro-gaming-mechanical-keyboard-review Image Link: http://www.nikktech.com/main/images/pics/reviews/das_keyboard/x40_pro/divisi on_zero_x40b.jpg A News Post Would Be Appreciated. Thanks In Advance. Sincerely Nik Kastrantas
  11. Title: Das Keyboard X40 Pro Gaming Mechanical Keyboard Review ( -at -) NikKTech Description: Das Keyboard enters the gaming peripherals market with the X40 Pro Gaming Keyboard featuring their very own Alpha-Zulu Linear and Tactile mechanical switches and we're here to check and see whether or not they're on the right path. Article Link: http://www.nikktech.com/main/articles/peripherals/keyboards/7503-das-keyboar d-x40-pro-gaming-mechanical-keyboard-review Image Link: http://www.nikktech.com/main/images/pics/reviews/das_keyboard/x40_pro/divisi on_zero_x40b.jpg A News Post Would Be Appreciated. Thanks In Advance. Sincerely Nik Kastrantas
  12. CentOS Errata and Security Advisory 2017:0293 Important Upstream details at : https://rhn.redhat.com/errata/RHSA-2017-0293.html The following updated files have been uploaded and are currently syncing to the mirrors: ( sha256sum Filename ) i386: 8e5db1418cf0c4cc98c3b3f75c73ae681e6d1af6e6af960bc03f96dd38c444c6 kernel-2.6.32-642.13.2.el6.i686.rpm 7b7c0130f6d949dbab08c622d33d3a965189992d9f790d2422ab847f7524266a kernel-abi-whitelists-2.6.32-642.13.2.el6.noarch.rpm d34bf5af966a9598fa12736e7cae72c3a02da76332774123b0e16905f88d4e95 kernel-debug-2.6.32-642.13.2.el6.i686.rpm bcef4faf1884b67f02e7b5a046bfc28ddb9f3c2f5009e86afefe00123a8d74e8 kernel-debug-devel-2.6.32-642.13.2.el6.i686.rpm 2b2ca285b26e3b90eee5ac182fcb8588532fb882632304f8a21c3e78dbb9c4a2 kernel-devel-2.6.32-642.13.2.el6.i686.rpm 83bc6d344aff521bc6b5766347fec8f2ccb482330be746661624d5e76624616a kernel-doc-2.6.32-642.13.2.el6.noarch.rpm ca77321a113b1a089c61a9d053efc06063476a0a6aeb08c257a3fb58591e8feb kernel-firmware-2.6.32-642.13.2.el6.noarch.rpm 60fb671174abdfa8ed467ff6cd71cf8ecae26f06ed94e6cd8aaca6b3820f29d5 kernel-headers-2.6.32-642.13.2.el6.i686.rpm e1ddc8fce78af40b1202267e7bdbefbb01f7b8ad9a75d68e0e88587dc68b7d4c perf-2.6.32-642.13.2.el6.i686.rpm 70bbabecf85895e3d7a1fb2d3cc6ffeccdcf0bc664bd3d994670a05cf7c6e7f7 python-perf-2.6.32-642.13.2.el6.i686.rpm x86_64: d42ff04a27c00197952bb3b84c66891022fadff49b2a907039061189e648820c kernel-2.6.32-642.13.2.el6.x86_64.rpm 7b7c0130f6d949dbab08c622d33d3a965189992d9f790d2422ab847f7524266a kernel-abi-whitelists-2.6.32-642.13.2.el6.noarch.rpm eebf181ae2c9217b4a65831903298e74454c11788ff3c4b66d66796f0d539736 kernel-debug-2.6.32-642.13.2.el6.x86_64.rpm bcef4faf1884b67f02e7b5a046bfc28ddb9f3c2f5009e86afefe00123a8d74e8 kernel-debug-devel-2.6.32-642.13.2.el6.i686.rpm 6224f08bbc8ec073385e4d9c6a4d18d1689e9914b44710214660d37a1725e4bf kernel-debug-devel-2.6.32-642.13.2.el6.x86_64.rpm af93fee2aa92ca20fc2b2a88415b9abeb1a4d8bb348f694216d7a3eaf07f7d61 kernel-devel-2.6.32-642.13.2.el6.x86_64.rpm 83bc6d344aff521bc6b5766347fec8f2ccb482330be746661624d5e76624616a kernel-doc-2.6.32-642.13.2.el6.noarch.rpm ca77321a113b1a089c61a9d053efc06063476a0a6aeb08c257a3fb58591e8feb kernel-firmware-2.6.32-642.13.2.el6.noarch.rpm 49e71d4eb8403a790910ad73529e72a52971ba0aebbe07dac25172946e94f200 kernel-headers-2.6.32-642.13.2.el6.x86_64.rpm 5b0d68de2c859691712276038c2640da96aeec17754b0aa5d0ffbd0fc2013261 perf-2.6.32-642.13.2.el6.x86_64.rpm 0455e0f63e3966926a1bbf0bd7882b90a67db437ad2e63b38800d8b6aa94c4be python-perf-2.6.32-642.13.2.el6.x86_64.rpm Source: 888ead19200985f6ad2a8f8fd53336e57b695ceb0ae47c026f82a28f67f70e7c kernel-2.6.32-642.13.2.el6.src.rpm -- Johnny Hughes CentOS Project { http://www.centos.org/ } irc: hughesjr, #centos ( -at -) irc.freenode.net Twitter: ( -at -) JohnnyCentOS _______________________________________________
  13. CentOS Errata and Security Advisory 2017:0293 Important Upstream details at : https://rhn.redhat.com/errata/RHSA-2017-0293.html The following updated files have been uploaded and are currently syncing to the mirrors: ( sha256sum Filename ) i386: 8e5db1418cf0c4cc98c3b3f75c73ae681e6d1af6e6af960bc03f96dd38c444c6 kernel-2.6.32-642.13.2.el6.i686.rpm 7b7c0130f6d949dbab08c622d33d3a965189992d9f790d2422ab847f7524266a kernel-abi-whitelists-2.6.32-642.13.2.el6.noarch.rpm d34bf5af966a9598fa12736e7cae72c3a02da76332774123b0e16905f88d4e95 kernel-debug-2.6.32-642.13.2.el6.i686.rpm bcef4faf1884b67f02e7b5a046bfc28ddb9f3c2f5009e86afefe00123a8d74e8 kernel-debug-devel-2.6.32-642.13.2.el6.i686.rpm 2b2ca285b26e3b90eee5ac182fcb8588532fb882632304f8a21c3e78dbb9c4a2 kernel-devel-2.6.32-642.13.2.el6.i686.rpm 83bc6d344aff521bc6b5766347fec8f2ccb482330be746661624d5e76624616a kernel-doc-2.6.32-642.13.2.el6.noarch.rpm ca77321a113b1a089c61a9d053efc06063476a0a6aeb08c257a3fb58591e8feb kernel-firmware-2.6.32-642.13.2.el6.noarch.rpm 60fb671174abdfa8ed467ff6cd71cf8ecae26f06ed94e6cd8aaca6b3820f29d5 kernel-headers-2.6.32-642.13.2.el6.i686.rpm e1ddc8fce78af40b1202267e7bdbefbb01f7b8ad9a75d68e0e88587dc68b7d4c perf-2.6.32-642.13.2.el6.i686.rpm 70bbabecf85895e3d7a1fb2d3cc6ffeccdcf0bc664bd3d994670a05cf7c6e7f7 python-perf-2.6.32-642.13.2.el6.i686.rpm x86_64: d42ff04a27c00197952bb3b84c66891022fadff49b2a907039061189e648820c kernel-2.6.32-642.13.2.el6.x86_64.rpm 7b7c0130f6d949dbab08c622d33d3a965189992d9f790d2422ab847f7524266a kernel-abi-whitelists-2.6.32-642.13.2.el6.noarch.rpm eebf181ae2c9217b4a65831903298e74454c11788ff3c4b66d66796f0d539736 kernel-debug-2.6.32-642.13.2.el6.x86_64.rpm bcef4faf1884b67f02e7b5a046bfc28ddb9f3c2f5009e86afefe00123a8d74e8 kernel-debug-devel-2.6.32-642.13.2.el6.i686.rpm 6224f08bbc8ec073385e4d9c6a4d18d1689e9914b44710214660d37a1725e4bf kernel-debug-devel-2.6.32-642.13.2.el6.x86_64.rpm af93fee2aa92ca20fc2b2a88415b9abeb1a4d8bb348f694216d7a3eaf07f7d61 kernel-devel-2.6.32-642.13.2.el6.x86_64.rpm 83bc6d344aff521bc6b5766347fec8f2ccb482330be746661624d5e76624616a kernel-doc-2.6.32-642.13.2.el6.noarch.rpm ca77321a113b1a089c61a9d053efc06063476a0a6aeb08c257a3fb58591e8feb kernel-firmware-2.6.32-642.13.2.el6.noarch.rpm 49e71d4eb8403a790910ad73529e72a52971ba0aebbe07dac25172946e94f200 kernel-headers-2.6.32-642.13.2.el6.x86_64.rpm 5b0d68de2c859691712276038c2640da96aeec17754b0aa5d0ffbd0fc2013261 perf-2.6.32-642.13.2.el6.x86_64.rpm 0455e0f63e3966926a1bbf0bd7882b90a67db437ad2e63b38800d8b6aa94c4be python-perf-2.6.32-642.13.2.el6.x86_64.rpm Source: 888ead19200985f6ad2a8f8fd53336e57b695ceb0ae47c026f82a28f67f70e7c kernel-2.6.32-642.13.2.el6.src.rpm -- Johnny Hughes CentOS Project { http://www.centos.org/ } irc: hughesjr, #centos ( -at -) irc.freenode.net Twitter: ( -at -) JohnnyCentOS _______________________________________________
  14. CentOS Errata and Security Advisory 2017:0294 Important Upstream details at : https://rhn.redhat.com/errata/RHSA-2017-0294.html The following updated files have been uploaded and are currently syncing to the mirrors: ( sha256sum Filename ) x86_64: 399d85490609511d4f57270f4db2ae22aff1e77dbfb9fa1735f3acd74a32b15d kernel-3.10.0-514.6.2.el7.x86_64.rpm ade938b455c925303441ff53433c55c4507501c34537a8dac3267f2027ac70a9 kernel-abi-whitelists-3.10.0-514.6.2.el7.noarch.rpm b9cbfd11d08961b8c9c78e82e669693b33063f7e5c5cd4835f17403e7a8adfd4 kernel-debug-3.10.0-514.6.2.el7.x86_64.rpm f845b17f3955c7e37c80ae44810c623e5e8679159395eb71374e3f081dbf8695 kernel-debug-devel-3.10.0-514.6.2.el7.x86_64.rpm b7fe4fc10de18db85e12d32dcb702229ed2fb3137e7cee784f5a15a2459f5db2 kernel-devel-3.10.0-514.6.2.el7.x86_64.rpm d2043d02d55f4189e3462149fbe80f8e281170d07acd5f4153636fdec89ab3c5 kernel-doc-3.10.0-514.6.2.el7.noarch.rpm 5849bd28663d4c8a112121b13c19b10b2f43decfc3a1bc3b4246227a3e255297 kernel-headers-3.10.0-514.6.2.el7.x86_64.rpm 640ba1792316b03339098f76f3bab13d2ca79a1f309122df21c3bf85ccba90e4 kernel-tools-3.10.0-514.6.2.el7.x86_64.rpm 8e9dd3262234c4d1cd6bb1cfe591111189bba8282e56cf284c5086c5977c7f96 kernel-tools-libs-3.10.0-514.6.2.el7.x86_64.rpm 35d8fee07d663665c297c3d6bd4dc623afc6fcae7bde1f09be88d4773a2837f9 kernel-tools-libs-devel-3.10.0-514.6.2.el7.x86_64.rpm c416658118df7791b9b8eb4fe9fbf941e1cb2005fd91b7f80b29232bf3b1aa7b perf-3.10.0-514.6.2.el7.x86_64.rpm 14c06f8de0921bd9a671feff1813b6af0c58a75fbe5f47ef92e4e6324c6c7249 python-perf-3.10.0-514.6.2.el7.x86_64.rpm Source: 19b33fba0c0c2c8eb838fcb65983c7dadc1c67b42c9b72e7dcd271d2c7b73572 kernel-3.10.0-514.6.2.el7.src.rpm -- Johnny Hughes CentOS Project { http://www.centos.org/ } irc: hughesjr, #centos ( -at -) irc.freenode.net Twitter: ( -at -) JohnnyCentOS _______________________________________________
  15. A news post would be great. OCC has published a review on *Galactic Civilizations III v2.0* Here is a quote from the review: Quote: â€ÂJust one more turn. I think that rather familiar phase sums up my feeling on *Galactic Civilizations III* quite well; I want to play another turn, and another, and another. Typically in 4X games I prefer the civilization development half of the game or the military half of the game, but here I genuinely am enjoying both. Okay, maybe not the strategic placing of structures on planets, that I will leave to the AI governors, but strategically placing starbases to capture resources and spread influence is very satisfying to me. I also enjoy managing my fleets to cover regions, stifling enemy planets until I can get a troop transport there to capture it. It is all just fun for me, and I know there are more mechanics I can learn to exploit to further optimize my strategy. I do have some criticisms here and there, but largely this is a game I just want to sit down and play because those criticisms are not severe enough to limit enjoyment. They are only things I think might possibly be done better, but are not flaws by any stretch. This makes the game a very easy recommendation from me for anyone looking for a good space-based 4X game." Title: MSI Z270 SLI PLUS Review Link: http://www.overclockersclub.com/reviews/galciv3_review/ Img: http://www.overclockersclub.com/siteimages/articles/galciv3_review/014_thumb.jpg
  16. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ===================================================================== Red Hat Security Advisory Synopsis: Moderate: python-oslo-middleware security update Advisory ID: RHSA-2017:0300-01 Product: Red Hat Enterprise Linux OpenStack Platform Advisory URL: https://rhn.redhat.com/errata/RHSA-2017-0300.html Issue date: 2017-02-22 CVE Names: CVE-2017-2592 ===================================================================== 1. Summary: An update for python-oslo-middleware is now available for Red Hat OpenStack Platform 10.0 (Newton). Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. 2. Relevant releases/architectures: Red Hat OpenStack Platform 10.0 - noarch 3. Description: The OpenStack Oslo Middleware library provides components that can be injected into WSGI pipelines to intercept request and response flows. The base class can be enhanced with functionality like adding or up[censored] HTTP headers, or to offer support for limiting size or connections. Security Fix(es): * An information-disclosure flaw was found in oslo.middleware. Software using the CatchError class could include sensitive values in a traceback's error message. Remote users could exploit this flaw to obtain sensitive information from OpenStack component error logs (for example, keystone tokens). (CVE-2017-2592) Red Hat would like to thank the OpenStack project for reporting this issue. Upstream acknowledges Divya K Konoor (IBM) as the original reporter. 4. Solution: For details on how to apply this update, which includes the changes described in this advisory, refer to: https://access.redhat.com/articles/11258 5. Bugs fixed (https://bugzilla.redhat.com/): 1414698 - CVE-2017-2592 python-oslo-middleware: CatchErrors leaks sensitive values into error logs 6. Package List: Red Hat OpenStack Platform 10.0: Source: python-oslo-middleware-3.19.0-1.2.el7ost.src.rpm noarch: python-oslo-middleware-3.19.0-1.2.el7ost.noarch.rpm python-oslo-middleware-lang-3.19.0-1.2.el7ost.noarch.rpm python-oslo-middleware-tests-3.19.0-1.2.el7ost.noarch.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/ 7. References: https://access.redhat.com/security/cve/CVE-2017-2592 https://access.redhat.com/security/updates/classification/#moderate 8. Contact: The Red Hat security contact is . More contact details at https://access.redhat.com/security/team/contact/ Copyright 2017 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iD8DBQFYrhR6XlSAg2UNWIIRAsY7AJ9tE67GTjrit+XzZCeIFfWdN+PhhQCgj0fR Hj5OiTy7ZqOVxlpFUWX60zI= =kGBu -----END PGP SIGNATURE----- --
  17. At Phoronix we have posted a new article. A link to this from your site's news section would be greatly appreciated. Title: Radeon vs. NVIDIA Performance For HITMAN On Linux With 17 GPUs ( -at -) Phoronix Direct Link: http://www.phoronix.com/vr.php?view=24178 Summary: "Last week Feral Interactive released the much anticipated Linux port of HITMAN, which debuted for Windows last year. Now that there's benchmark support for HITMAN on Linux, I have been running a number of tests for this game that's powered by the Glacier Engine and making use of OpenGL for rendering on Linux. In this article are our initial AMD Radeon performance figures making use of the RadeonSI Gallium3D driver compared to NVIDIA's driver and the assortment of GeForce results published yesterday." Please feel free to contact us with any questions or comments you may
  18. openSUSE Security Update: Security update for the Linux Kernel ______________________________________________________________________________ Announcement ID: openSUSE-SU-2017:0541-1 Rating: important References: #1012382 #1018100 #1019168 #1020048 #1021082 #1022181 #1022304 #1023762 #1023884 #1023888 #1024081 #1024234 #1024508 #1024938 #1025235 #1026024 #969479 #982783 #989056 #998106 Cross-References: CVE-2017-5897 CVE-2017-5970 CVE-2017-5986 CVE-2017-6074 Affected Products: openSUSE Leap 42.2 ______________________________________________________________________________ An update that solves four vulnerabilities and has 16 fixes is now available. Description: The openSUSE Leap 42.2 kernel was updated to 4.4.49 to receive various security and bugfixes. The following security bugs were fixed: - CVE-2017-5986: A userlevel triggerable BUG_ON on sctp_wait_for_sndbuf was fixed. (bsc#1025235) - CVE-2017-5970: The ipv4_pktinfo_prepare function in net/ipv4/ip_sockglue.c in the Linux kernel allowed attackers to cause a denial of service (system crash) via (1) an application that made crafted system calls or possibly (2) IPv4 traffic with invalid IP options (bnc#1024938). - CVE-2017-5897: A potential remote denial of service within the IPv6 GRE protocol was fixed. (bsc#1023762) - CVE-2017-6074: The dccp_rcv_state_process function in net/dccp/input.c in the Linux kernel mishandled DCCP_PKT_REQUEST packet data structures in the LISTEN state, which allowed local users to cause a denial of service (invalid free) or possibly have unspecified other impact via an application that makes an IPV6_RECVPKTINFO setsockopt system call. (bsc#1026024). The following non-security bugs were fixed: - btrfs: fix btrfs_compat_ioctl failures on non-compat ioctls (bsc#1018100). - iwlwifi: Expose the default fallback ucode API to module info (boo#1021082, boo#1023884). - kabi: protect struct tcp_fastopen_cookie (kabi). - md: ensure md devices are freed before module is unloaded (bsc#1022304). - md: Fix a regression reported by bsc#1020048 in patches.fixes/0003-md-lockless-I-O-submission-for-RAID1.patch (bsc#982783,bsc#998106,bsc#1020048). - net: ethtool: Initialize buffer when querying device channel settings (bsc#969479 FATE#320634). - net: implement netif_cond_dbg macro (bsc#1019168). - sfc: reduce severity of PIO buffer alloc failures (bsc#1019168). - sfc: refactor debug-or-warnings printks (bsc#1019168). - xfs_dmapi: fix the debug compilation of xfs_dmapi (bsc#989056). - xfs: do not allow di_size with high bit set (bsc#1024234). - xfs: exclude never-released buffers from buftarg I/O accounting (bsc#1024508). - xfs: fix broken multi-fsb buffer logging (bsc#1024081). - xfs: fix buffer overflow dm_get_dirattrs/dm_get_dirattrs2 (bsc#989056). - xfs: fix up xfs_swap_extent_forks inline extent handling (bsc#1023888). - xfs: track and serialize in-flight async buffers against unmount (bsc#1024508). - xfs: track and serialize in-flight async buffers against unmount - kABI (bsc#1024508). Patch Instructions: To install this openSUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product: - openSUSE Leap 42.2: zypper in -t patch openSUSE-2017-286=1 To bring your system up-to-date, use "zypper patch". Package List: - openSUSE Leap 42.2 (noarch): kernel-devel-4.4.49-16.1 kernel-docs-4.4.49-16.2 kernel-docs-html-4.4.49-16.2 kernel-docs-pdf-4.4.49-16.2 kernel-macros-4.4.49-16.1 kernel-source-4.4.49-16.1 kernel-source-vanilla-4.4.49-16.1 - openSUSE Leap 42.2 (x86_64): kernel-debug-4.4.49-16.1 kernel-debug-base-4.4.49-16.1 kernel-debug-base-debuginfo-4.4.49-16.1 kernel-debug-debuginfo-4.4.49-16.1 kernel-debug-debugsource-4.4.49-16.1 kernel-debug-devel-4.4.49-16.1 kernel-debug-devel-debuginfo-4.4.49-16.1 kernel-default-4.4.49-16.1 kernel-default-base-4.4.49-16.1 kernel-default-base-debuginfo-4.4.49-16.1 kernel-default-debuginfo-4.4.49-16.1 kernel-default-debugsource-4.4.49-16.1 kernel-default-devel-4.4.49-16.1 kernel-obs-build-4.4.49-16.1 kernel-obs-build-debugsource-4.4.49-16.1 kernel-obs-qa-4.4.49-16.1 kernel-syms-4.4.49-16.1 kernel-vanilla-4.4.49-16.1 kernel-vanilla-base-4.4.49-16.1 kernel-vanilla-base-debuginfo-4.4.49-16.1 kernel-vanilla-debuginfo-4.4.49-16.1 kernel-vanilla-debugsource-4.4.49-16.1 kernel-vanilla-devel-4.4.49-16.1 References: https://www.suse.com/security/cve/CVE-2017-5897.html https://www.suse.com/security/cve/CVE-2017-5970.html https://www.suse.com/security/cve/CVE-2017-5986.html https://www.suse.com/security/cve/CVE-2017-6074.html https://bugzilla.suse.com/1012382 https://bugzilla.suse.com/1018100 https://bugzilla.suse.com/1019168 https://bugzilla.suse.com/1020048 https://bugzilla.suse.com/1021082 https://bugzilla.suse.com/1022181 https://bugzilla.suse.com/1022304 https://bugzilla.suse.com/1023762 https://bugzilla.suse.com/1023884 https://bugzilla.suse.com/1023888 https://bugzilla.suse.com/1024081 https://bugzilla.suse.com/1024234 https://bugzilla.suse.com/1024508 https://bugzilla.suse.com/1024938 https://bugzilla.suse.com/1025235 https://bugzilla.suse.com/1026024 https://bugzilla.suse.com/969479 https://bugzilla.suse.com/982783 https://bugzilla.suse.com/989056 https://bugzilla.suse.com/998106 -- To unsubscribe, e-mail: opensuse-security-announce+unsubscribe ( -at -) opensuse.org For additional commands, e-mail: opensuse-security-announce+help ( -at -) opensuse.org
  19. openSUSE Security Update: Security update for the Linux Kernel ______________________________________________________________________________ Announcement ID: openSUSE-SU-2017:0547-1 Rating: important References: #1005666 #1015787 #1018100 #1023762 #1023888 #1024081 #1024234 #1024508 #1024938 #1025047 #1025048 #1025049 #1025050 #1025051 #1025053 #1025055 #1025057 #1025058 #1025059 #1025060 #1025061 #1025062 #1025063 #1025064 #1025065 #1025066 #1025067 #1025069 #1025070 #1025071 #1025072 #1025073 #1025074 #1025075 #1025076 #1025077 #1025079 #1025080 #1025081 #1025235 #1026024 #865869 #904489 #927455 #929871 #935087 #935088 #936445 #937609 #937612 #937616 #938550 #938891 #938892 #942512 #942685 #942925 #944001 #945649 #946057 #946902 #949440 #949472 #951615 #951844 #957805 #960300 #963193 #965344 #966278 #966910 #968230 #972844 #972951 #972993 #973855 #975596 #977685 #981038 #981709 #983087 #984779 #985562 #985850 #987192 #989953 #990384 #992712 #993841 #994881 Cross-References: CVE-2017-5897 CVE-2017-5970 CVE-2017-5986 CVE-2017-6074 Affected Products: openSUSE Leap 42.1 ______________________________________________________________________________ An update that solves four vulnerabilities and has 86 fixes is now available. Description: The openSUSE Leap 42.1 kernel was updated to receive various security and bugfixes. The following security bugs were fixed: - CVE-2017-6074: The dccp_rcv_state_process function in net/dccp/input.c in the Linux kernel mishandled DCCP_PKT_REQUEST packet data structures in the LISTEN state, which allowed local users to cause a denial of service (invalid free) or possibly have unspecified other impact via an application that made an IPV6_RECVPKTINFO setsockopt system call (bnc#1026024). - CVE-2017-5986: Race condition in the sctp_wait_for_sndbuf function in net/sctp/socket.c in the Linux kernel allowed local users to cause a denial of service (assertion failure and panic) via a multithreaded application that peels off an association in a certain buffer-full state (bnc#1025235). - CVE-2017-5970: The ipv4_pktinfo_prepare function in net/ipv4/ip_sockglue.c in the Linux kernel allowed attackers to cause a denial of service (system crash) via (1) an application that made crafted system calls or possibly (2) IPv4 traffic with invalid IP options (bnc#1024938). - CVE-2017-5897: A potential remote denial of service within the IPv6 GRE protocol was fixed. (bsc#1023762) The following non-security bugs were fixed: - btrfs: support NFSv2 export (bnc#929871). - btrfs: Direct I/O: Fix space accounting (bsc#1025058). - btrfs: add RAID 5/6 BTRFS_RBIO_REBUILD_MISSING operation (bsc#1025069). - btrfs: bail out if block group has different mixed flag (bsc#1025072). - btrfs: be more precise on errors when getting an inode from disk (bsc#981038). - btrfs: check pending chunks when shrinking fs to avoid corruption (bnc#936445). - btrfs: check prepare_uptodate_page() error code earlier (bnc#966910). - btrfs: do not BUG() during drop snapshot (bsc#1025076). - btrfs: do not collect ordered extents when logging that inode exists (bsc#977685). - btrfs: do not initialize a space info as full to prevent ENOSPC (bnc#944001). - btrfs: do not leak reloc root nodes on error (bsc#1025074). - btrfs: fix block group ->space_info null pointer dereference (bnc#935088). - btrfs: fix chunk allocation regression leading to transaction abort (bnc#938550). - btrfs: fix crash on close_ctree() if cleaner starts new transaction (bnc#938891). - btrfs: fix deadlock between direct IO reads and buffered writes (bsc#973855). - btrfs: fix deadlock between direct IO write and defrag/readpages (bnc#965344). - btrfs: fix device replace of a missing RAID 5/6 device (bsc#1025057). - btrfs: fix empty symlink after creating symlink and fsync parent dir (bsc#977685). - btrfs: fix extent accounting for partial direct IO writes (bsc#1025062). - btrfs: fix file corruption after cloning inline extents (bnc#942512). - btrfs: fix file loss on log replay after renaming a file and fsync (bsc#977685). - btrfs: fix file read corruption after extent cloning and fsync (bnc#946902). - btrfs: fix fitrim discarding device area reserved for boot loader's use (bsc#904489). - btrfs: fix for incorrect directory entries after fsync log replay (bsc#957805, bsc#977685). - btrfs: fix hang when failing to submit bio of directIO (bnc#942685). - btrfs: fix incremental send failure caused by balance (bsc#985850). - btrfs: fix invalid page accesses in extent_same (dedup) ioctl (bnc#968230). - btrfs: fix listxattrs not listing all xattrs packed in the same item (bsc#1025063). - btrfs: fix loading of orphan roots leading to BUG_ON (bsc#972844). - btrfs: fix memory corruption on failure to submit bio for direct IO (bnc#942685). - btrfs: fix memory leak in do_walk_down (bsc#1025075). - btrfs: fix memory leak in reading btree blocks (bsc#1025071). - btrfs: fix order by which delayed references are run (bnc#949440). - btrfs: fix page reading in extent_same ioctl leading to csum errors (bnc#968230). - btrfs: fix qgroup rescan worker initialization (bsc#1025077). - btrfs: fix qgroup sanity tests (bnc#951615). - btrfs: fix race between balance and unused block group deletion (bnc#938892). - btrfs: fix race between fsync and lockless direct IO writes (bsc#977685). - btrfs: fix race waiting for qgroup rescan worker (bnc#960300). - btrfs: fix regression running delayed references when using qgroups (bnc#951615). - btrfs: fix regression when running delayed references (bnc#951615). - btrfs: fix relocation incorrectly dropping data references (bsc#990384). - btrfs: fix shrinking truncate when the no_holes feature is enabled (bsc#1025053). - btrfs: fix sleeping inside atomic context in qgroup rescan worker (bnc#960300). - btrfs: fix stale dir entries after removing a link and fsync (bnc#942925). - btrfs: fix unreplayable log after snapshot delete + parent dir fsync (bsc#977685). - btrfs: fix warning in backref walking (bnc#966278). - btrfs: fix warning of bytes_may_use (bsc#1025065). - btrfs: fix wrong check for btrfs_force_chunk_alloc() (bnc#938550). - btrfs: handle quota reserve failure properly (bsc#1005666). - btrfs: incremental send, check if orphanized dir inode needs delayed rename (bsc#1025049). - btrfs: incremental send, do not delay directory renames unnecessarily (bsc#1025048). - btrfs: incremental send, fix clone operations for compressed extents (fate#316463). - btrfs: incremental send, fix premature rmdir operations (bsc#1025064). - btrfs: keep dropped roots in cache until transaction commit (bnc#935087, bnc#945649, bnc#951615). - btrfs: remove misleading handling of missing device scrub (bsc#1025055). - btrfs: remove unnecessary locking of cleaner_mutex to avoid deadlock (bsc#904489). - btrfs: return gracefully from balance if fs tree is corrupted (bsc#1025073). - btrfs: send, do not bug on inconsistent snapshots (bsc#985850). - btrfs: send, fix corner case for reference overwrite detection (bsc#1025080). - btrfs: send, fix file corruption due to incorrect cloning operations (bsc#1025060). - btrfs: set UNWRITTEN for prealloc'ed extents in fiemap (bsc#1025047). - btrfs: test_check_exists: Fix infinite loop when searching for free space entries (bsc#987192). - btrfs: use btrfs_get_fs_root in resolve_indirect_ref (bnc#935087, bnc#945649). - btrfs: use received_uuid of parent during send (bsc#1025051). - btrfs: wake up extent state waiters on unlock through clear_extent_bits (bsc#1025050). - btrfs: Add handler for invalidate page (bsc#963193). - btrfs: Add qgroup tracing (bnc#935087, bnc#945649). - btrfs: Avoid truncate tailing page if fallocate range does not exceed inode size (bsc#1025059). - btrfs: Continue write in case of can_not_nocow (bsc#1025070). - btrfs: Ensure proper sector alignment for btrfs_free_reserved_data_space (bsc#1005666). - btrfs: Export and move leaf/subtree qgroup helpers to qgroup.c (bsc#983087). - btrfs: Fix a data space underflow warning (bsc#985562, bsc#975596, bsc#984779). - btrfs: Handle unaligned length in extent_same (bsc#937609). - btrfs: abort transaction on btrfs_reloc_cow_block() (bsc#1025081). - btrfs: add missing discards when unpinning extents with -o discard (bsc#904489). - btrfs: advertise which crc32c implementation is being used on mount (bsc#946057). - btrfs: allow dedupe of same inode (bsc#1025067). - btrfs: backref: Add special time_seq == (u64)-1 case for btrfs_find_all_roots() (bnc#935087, bnc#945649). - btrfs: backref: Do not merge refs which are not for same block (bnc#935087, bnc#945649). - btrfs: btrfs_issue_discard ensure offset/length are aligned to sector boundaries (bsc#904489). - btrfs: change max_inline default to 2048 (bsc#949472). - btrfs: delayed-ref: Cleanup the unneeded functions (bnc#935087, bnc#945649). - btrfs: delayed-ref: Use list to replace the ref_root in ref_head (bnc#935087, bnc#945649). - btrfs: delayed-ref: double free in btrfs_add_delayed_tree_ref() (bsc#1025079). - btrfs: delayed_ref: Add new function to record reserved space into delayed ref (bsc#963193). - btrfs: delayed_ref: release and free qgroup reserved at proper timing (bsc#963193). - btrfs: disable defrag of tree roots. - btrfs: do not create or leak aliased root while cleaning up orphans (bsc#994881). - btrfs: do not update mtime/ctime on deduped inodes (bsc#937616). - btrfs: explictly delete unused block groups in close_ctree and ro-remount (bsc#904489). - btrfs: extent-tree: Add new version of btrfs_check_data_free_space and btrfs_free_reserved_data_space (bsc#963193). - btrfs: extent-tree: Add new version of btrfs_delalloc_reserve/release_space (bsc#963193). - btrfs: extent-tree: Switch to new check_data_free_space and free_reserved_data_space (bsc#963193). - btrfs: extent-tree: Switch to new delalloc space reserve and release (bsc#963193). - btrfs: extent-tree: Use ref_node to replace unneeded parameters in __inc_extent_ref() and __free_extent() (bnc#935087, bnc#945649). - btrfs: extent_io: Introduce needed structure for recoding set/clear bits (bsc#963193). - btrfs: extent_io: Introduce new function clear_record_extent_bits() (bsc#963193). - btrfs: extent_io: Introduce new function set_record_extent_bits (bsc#963193). - btrfs: fallocate: Add support to accurate qgroup reserve (bsc#963193). - btrfs: fix btrfs_compat_ioctl failures on non-compat ioctls (bsc#1018100). - btrfs: fix clone / extent-same deadlocks (bsc#937612). - btrfs: fix deadlock with extent-same and readpage (bsc#937612). - btrfs: fix resending received snapshot with parent (bsc#1025061). - btrfs: handle non-fatal errors in btrfs_qgroup_inherit() (bsc#972951). - btrfs: increment ctx->pos for every emitted or skipped dirent in readdir (bsc#981709). - btrfs: iterate over unused chunk space in FITRIM (bsc#904489). - btrfs: make btrfs_issue_discard return bytes discarded (bsc#904489). - btrfs: make file clone aware of fatal signals (bsc#1015787). - btrfs: pass unaligned length to btrfs_cmp_data() (bsc#937609). - btrfs: properly track when rescan worker is running (bsc#989953). - btrfs: provide super_operations->inode_get_dev (bsc#927455). - btrfs: qgroup: Add function qgroup_update_counters() (bnc#935087, bnc#945649). - btrfs: qgroup: Add function qgroup_update_refcnt() (bnc#935087, bnc#945649). - btrfs: qgroup: Add handler for NOCOW and inline (bsc#963193). - btrfs: qgroup: Add new function to record old_roots (bnc#935087, bnc#945649). - btrfs: qgroup: Add new qgroup calculation function btrfs_qgroup_account_extents() (bnc#935087, bnc#945649). - btrfs: qgroup: Add new trace point for qgroup data reserve (bsc#963193). - btrfs: qgroup: Add the ability to skip given qgroup for old/new_roots (bnc#935087, bnc#945649). - btrfs: qgroup: Avoid calling btrfs_free_reserved_data_space in clear_bit_hook (bsc#963193). - btrfs: qgroup: Check if qgroup reserved space leaked (bsc#963193). - btrfs: qgroup: Cleanup old inaccurate facilities (bsc#963193). - btrfs: qgroup: Cleanup open-coded old/new_refcnt update and read (bnc#935087, bnc#945649). - btrfs: qgroup: Cleanup the old ref_node-oriented mechanism (bnc#935087, bnc#945649). - btrfs: qgroup: Do not copy extent buffer to do qgroup rescan (bnc#960300). - btrfs: qgroup: Fix a race in delayed_ref which leads to abort trans (bsc#963193). - btrfs: qgroup: Fix a rebase bug which will cause qgroup double free (bsc#963193). - btrfs: qgroup: Fix a regression in qgroup reserved space (bnc#935087, bnc#945649). - btrfs: qgroup: Fix qgroup accounting when creating snapshot (bsc#972993). - btrfs: qgroup: Fix qgroup data leaking by using subtree tracing (bsc#983087). - btrfs: qgroup: Introduce btrfs_qgroup_reserve_data function (bsc#963193). - btrfs: qgroup: Introduce functions to release/free qgroup reserve data space (bsc#963193). - btrfs: qgroup: Introduce new functions to reserve/free metadata (bsc#963193). - btrfs: qgroup: Make snapshot accounting work with new extent-oriented qgroup (bnc#935087, bnc#945649). - btrfs: qgroup: Record possible quota-related extent for qgroup (bnc#935087, bnc#945649). - btrfs: qgroup: Switch rescan to new mechanism (bnc#935087, bnc#945649). - btrfs: qgroup: Switch self test to extent-oriented qgroup mechanism (bnc#935087, bnc#945649). - btrfs: qgroup: Switch to new extent-oriented qgroup mechanism (bnc#935087, bnc#945649). - btrfs: qgroup: Use new metadata reservation (bsc#963193). - btrfs: qgroup: account shared subtree during snapshot delete (bnc#935087, bnc#945649). - btrfs: qgroup: exit the rescan worker during umount (bnc#960300). - btrfs: qgroup: fix quota disable during rescan (bnc#960300). - btrfs: remove old tree_root dirent processing in btrfs_real_readdir() (bsc#981709). - btrfs: serialize subvolume mounts with potentially mismatching rw flags (bsc#951844). - btrfs: skip superblocks during discard (bsc#904489). - btrfs: syslog when quota is disabled. - btrfs: syslog when quota is enabled - btrfs: ulist: Add ulist_del() function (bnc#935087, bnc#945649). - btrfs: use the new VFS super_block_dev (bnc#865869). - btrfs: waiting on qgroup rescan should not always be interruptible (bsc#992712). - fs/super.c: add new super block sub devices super_block_dev (bnc#865869). - fs/super.c: fix race between freeze_super() and thaw_super() (bsc#1025066). - kabi: only use sops->get_inode_dev with proper fsflag (bsc#927455). - qgroup: Prevent qgroup->reserved from going subzero (bsc#993841). - vfs: add super_operations->get_inode_dev (bsc#927455). - xfs: do not allow di_size with high bit set (bsc#1024234). - xfs: exclude never-released buffers from buftarg I/O accounting (bsc#1024508). - xfs: fix broken multi-fsb buffer logging (bsc#1024081). - xfs: fix up xfs_swap_extent_forks inline extent handling (bsc#1023888). - xfs: track and serialize in-flight async buffers against unmount - kABI (bsc#1024508). - xfs: track and serialize in-flight async buffers against unmount (bsc#1024508). Patch Instructions: To install this openSUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product: - openSUSE Leap 42.1: zypper in -t patch openSUSE-2017-287=1 To bring your system up-to-date, use "zypper patch". Package List: - openSUSE Leap 42.1 (i586 x86_64): kernel-default-4.1.38-50.1 kernel-default-base-4.1.38-50.1 kernel-default-base-debuginfo-4.1.38-50.1 kernel-default-debuginfo-4.1.38-50.1 kernel-default-debugsource-4.1.38-50.1 kernel-default-devel-4.1.38-50.1 kernel-obs-build-4.1.38-50.2 kernel-obs-build-debugsource-4.1.38-50.2 kernel-obs-qa-4.1.38-50.1 kernel-syms-4.1.38-50.1 - openSUSE Leap 42.1 (i686 x86_64): kernel-debug-4.1.38-50.1 kernel-debug-base-4.1.38-50.1 kernel-debug-base-debuginfo-4.1.38-50.1 kernel-debug-debuginfo-4.1.38-50.1 kernel-debug-debugsource-4.1.38-50.1 kernel-debug-devel-4.1.38-50.1 kernel-debug-devel-debuginfo-4.1.38-50.1 kernel-ec2-4.1.38-50.1 kernel-ec2-base-4.1.38-50.1 kernel-ec2-base-debuginfo-4.1.38-50.1 kernel-ec2-debuginfo-4.1.38-50.1 kernel-ec2-debugsource-4.1.38-50.1 kernel-ec2-devel-4.1.38-50.1 kernel-pv-4.1.38-50.1 kernel-pv-base-4.1.38-50.1 kernel-pv-base-debuginfo-4.1.38-50.1 kernel-pv-debuginfo-4.1.38-50.1 kernel-pv-debugsource-4.1.38-50.1 kernel-pv-devel-4.1.38-50.1 kernel-vanilla-4.1.38-50.1 kernel-vanilla-debuginfo-4.1.38-50.1 kernel-vanilla-debugsource-4.1.38-50.1 kernel-vanilla-devel-4.1.38-50.1 kernel-xen-4.1.38-50.1 kernel-xen-base-4.1.38-50.1 kernel-xen-base-debuginfo-4.1.38-50.1 kernel-xen-debuginfo-4.1.38-50.1 kernel-xen-debugsource-4.1.38-50.1 kernel-xen-devel-4.1.38-50.1 - openSUSE Leap 42.1 (noarch): kernel-devel-4.1.38-50.1 kernel-docs-4.1.38-50.3 kernel-docs-html-4.1.38-50.3 kernel-docs-pdf-4.1.38-50.3 kernel-macros-4.1.38-50.1 kernel-source-4.1.38-50.1 kernel-source-vanilla-4.1.38-50.1 - openSUSE Leap 42.1 (i686): kernel-pae-4.1.38-50.1 kernel-pae-base-4.1.38-50.1 kernel-pae-base-debuginfo-4.1.38-50.1 kernel-pae-debuginfo-4.1.38-50.1 kernel-pae-debugsource-4.1.38-50.1 kernel-pae-devel-4.1.38-50.1 References: https://www.suse.com/security/cve/CVE-2017-5897.html https://www.suse.com/security/cve/CVE-2017-5970.html https://www.suse.com/security/cve/CVE-2017-5986.html https://www.suse.com/security/cve/CVE-2017-6074.html https://bugzilla.suse.com/1005666 https://bugzilla.suse.com/1015787 https://bugzilla.suse.com/1018100 https://bugzilla.suse.com/1023762 https://bugzilla.suse.com/1023888 https://bugzilla.suse.com/1024081 https://bugzilla.suse.com/1024234 https://bugzilla.suse.com/1024508 https://bugzilla.suse.com/1024938 https://bugzilla.suse.com/1025047 https://bugzilla.suse.com/1025048 https://bugzilla.suse.com/1025049 https://bugzilla.suse.com/1025050 https://bugzilla.suse.com/1025051 https://bugzilla.suse.com/1025053 https://bugzilla.suse.com/1025055 https://bugzilla.suse.com/1025057 https://bugzilla.suse.com/1025058 https://bugzilla.suse.com/1025059 https://bugzilla.suse.com/1025060 https://bugzilla.suse.com/1025061 https://bugzilla.suse.com/1025062 https://bugzilla.suse.com/1025063 https://bugzilla.suse.com/1025064 https://bugzilla.suse.com/1025065 https://bugzilla.suse.com/1025066 https://bugzilla.suse.com/1025067 https://bugzilla.suse.com/1025069 https://bugzilla.suse.com/1025070 https://bugzilla.suse.com/1025071 https://bugzilla.suse.com/1025072 https://bugzilla.suse.com/1025073 https://bugzilla.suse.com/1025074 https://bugzilla.suse.com/1025075 https://bugzilla.suse.com/1025076 https://bugzilla.suse.com/1025077 https://bugzilla.suse.com/1025079 https://bugzilla.suse.com/1025080 https://bugzilla.suse.com/1025081 https://bugzilla.suse.com/1025235 https://bugzilla.suse.com/1026024 https://bugzilla.suse.com/865869 https://bugzilla.suse.com/904489 https://bugzilla.suse.com/927455 https://bugzilla.suse.com/929871 https://bugzilla.suse.com/935087 https://bugzilla.suse.com/935088 https://bugzilla.suse.com/936445 https://bugzilla.suse.com/937609 https://bugzilla.suse.com/937612 https://bugzilla.suse.com/937616 https://bugzilla.suse.com/938550 https://bugzilla.suse.com/938891 https://bugzilla.suse.com/938892 https://bugzilla.suse.com/942512 https://bugzilla.suse.com/942685 https://bugzilla.suse.com/942925 https://bugzilla.suse.com/944001 https://bugzilla.suse.com/945649 https://bugzilla.suse.com/946057 https://bugzilla.suse.com/946902 https://bugzilla.suse.com/949440 https://bugzilla.suse.com/949472 https://bugzilla.suse.com/951615 https://bugzilla.suse.com/951844 https://bugzilla.suse.com/957805 https://bugzilla.suse.com/960300 https://bugzilla.suse.com/963193 https://bugzilla.suse.com/965344 https://bugzilla.suse.com/966278 https://bugzilla.suse.com/966910 https://bugzilla.suse.com/968230 https://bugzilla.suse.com/972844 https://bugzilla.suse.com/972951 https://bugzilla.suse.com/972993 https://bugzilla.suse.com/973855 https://bugzilla.suse.com/975596 https://bugzilla.suse.com/977685 https://bugzilla.suse.com/981038 https://bugzilla.suse.com/981709 https://bugzilla.suse.com/983087 https://bugzilla.suse.com/984779 https://bugzilla.suse.com/985562 https://bugzilla.suse.com/985850 https://bugzilla.suse.com/987192 https://bugzilla.suse.com/989953 https://bugzilla.suse.com/990384 https://bugzilla.suse.com/992712 https://bugzilla.suse.com/993841 https://bugzilla.suse.com/994881 -- To unsubscribe, e-mail: opensuse-security-announce+unsubscribe ( -at -) opensuse.org For additional commands, e-mail: opensuse-security-announce+help ( -at -) opensuse.org
  20. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ===================================================================== Red Hat Security Advisory Synopsis: Important: kernel-rt security update Advisory ID: RHSA-2017:0295-01 Product: Red Hat Enterprise Linux Advisory URL: https://rhn.redhat.com/errata/RHSA-2017-0295.html Issue date: 2017-02-22 CVE Names: CVE-2017-6074 ===================================================================== 1. Summary: An update for kernel-rt is now available for Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. 2. Relevant releases/architectures: Red Hat Enterprise Linux Realtime (v. 7) - noarch, x86_64 Red Hat Enterprise Linux for Real Time for NFV (v. 7) - noarch, x86_64 3. Description: The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements. Security Fix(es): * A use-after-free flaw was found in the way the Linux kernel's Datagram Congestion Control Protocol (DCCP) implementation freed SKB (socket buffer) resources for a DCCP_PKT_REQUEST packet when the IPV6_RECVPKTINFO option is set on the socket. A local, unprivileged user could use this flaw to alter the kernel memory, allowing them to escalate their privileges on the system. (CVE-2017-6074, Important) 4. Solution: For details on how to apply this update, which includes the changes described in this advisory, refer to: https://access.redhat.com/articles/11258 The system must be rebooted for this update to take effect. 5. Bugs fixed (https://bugzilla.redhat.com/): 1423071 - CVE-2017-6074 kernel: use after free in dccp protocol 6. Package List: Red Hat Enterprise Linux for Real Time for NFV (v. 7): Source: kernel-rt-3.10.0-514.6.1.rt56.430.el7.src.rpm noarch: kernel-rt-doc-3.10.0-514.6.1.rt56.430.el7.noarch.rpm x86_64: kernel-rt-3.10.0-514.6.1.rt56.430.el7.x86_64.rpm kernel-rt-debug-3.10.0-514.6.1.rt56.430.el7.x86_64.rpm kernel-rt-debug-debuginfo-3.10.0-514.6.1.rt56.430.el7.x86_64.rpm kernel-rt-debug-devel-3.10.0-514.6.1.rt56.430.el7.x86_64.rpm kernel-rt-debug-kvm-3.10.0-514.6.1.rt56.430.el7.x86_64.rpm kernel-rt-debug-kvm-debuginfo-3.10.0-514.6.1.rt56.430.el7.x86_64.rpm kernel-rt-debuginfo-3.10.0-514.6.1.rt56.430.el7.x86_64.rpm kernel-rt-debuginfo-common-x86_64-3.10.0-514.6.1.rt56.430.el7.x86_64.rpm kernel-rt-devel-3.10.0-514.6.1.rt56.430.el7.x86_64.rpm kernel-rt-kvm-3.10.0-514.6.1.rt56.430.el7.x86_64.rpm kernel-rt-kvm-debuginfo-3.10.0-514.6.1.rt56.430.el7.x86_64.rpm kernel-rt-trace-3.10.0-514.6.1.rt56.430.el7.x86_64.rpm kernel-rt-trace-debuginfo-3.10.0-514.6.1.rt56.430.el7.x86_64.rpm kernel-rt-trace-devel-3.10.0-514.6.1.rt56.430.el7.x86_64.rpm kernel-rt-trace-kvm-3.10.0-514.6.1.rt56.430.el7.x86_64.rpm kernel-rt-trace-kvm-debuginfo-3.10.0-514.6.1.rt56.430.el7.x86_64.rpm Red Hat Enterprise Linux Realtime (v. 7): Source: kernel-rt-3.10.0-514.6.1.rt56.430.el7.src.rpm noarch: kernel-rt-doc-3.10.0-514.6.1.rt56.430.el7.noarch.rpm x86_64: kernel-rt-3.10.0-514.6.1.rt56.430.el7.x86_64.rpm kernel-rt-debug-3.10.0-514.6.1.rt56.430.el7.x86_64.rpm kernel-rt-debug-debuginfo-3.10.0-514.6.1.rt56.430.el7.x86_64.rpm kernel-rt-debug-devel-3.10.0-514.6.1.rt56.430.el7.x86_64.rpm kernel-rt-debug-kvm-debuginfo-3.10.0-514.6.1.rt56.430.el7.x86_64.rpm kernel-rt-debuginfo-3.10.0-514.6.1.rt56.430.el7.x86_64.rpm kernel-rt-debuginfo-common-x86_64-3.10.0-514.6.1.rt56.430.el7.x86_64.rpm kernel-rt-devel-3.10.0-514.6.1.rt56.430.el7.x86_64.rpm kernel-rt-kvm-debuginfo-3.10.0-514.6.1.rt56.430.el7.x86_64.rpm kernel-rt-trace-3.10.0-514.6.1.rt56.430.el7.x86_64.rpm kernel-rt-trace-debuginfo-3.10.0-514.6.1.rt56.430.el7.x86_64.rpm kernel-rt-trace-devel-3.10.0-514.6.1.rt56.430.el7.x86_64.rpm kernel-rt-trace-kvm-debuginfo-3.10.0-514.6.1.rt56.430.el7.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/ 7. References: https://access.redhat.com/security/cve/CVE-2017-6074 https://access.redhat.com/security/updates/classification/#important 8. Contact: The Red Hat security contact is . More contact details at https://access.redhat.com/security/team/contact/ Copyright 2017 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iD8DBQFYrbxbXlSAg2UNWIIRAj4VAJsGFb/B+2G0HtMNLXx8f0iX8IoangCgv+J7 bQ6xbf+bo8tazT+MCNvAfbs= =Jg0K -----END PGP SIGNATURE----- --
  21. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ===================================================================== Red Hat Security Advisory Synopsis: Important: kernel security update Advisory ID: RHSA-2017:0293-01 Product: Red Hat Enterprise Linux Advisory URL: https://rhn.redhat.com/errata/RHSA-2017-0293.html Issue date: 2017-02-22 CVE Names: CVE-2017-6074 ===================================================================== 1. Summary: An update for kernel is now available for Red Hat Enterprise Linux 6. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. 2. Relevant releases/architectures: Red Hat Enterprise Linux Desktop (v. 6) - i386, noarch, x86_64 Red Hat Enterprise Linux Desktop Optional (v. 6) - i386, x86_64 Red Hat Enterprise Linux HPC Node (v. 6) - noarch, x86_64 Red Hat Enterprise Linux HPC Node Optional (v. 6) - x86_64 Red Hat Enterprise Linux Server (v. 6) - i386, noarch, ppc64, s390x, x86_64 Red Hat Enterprise Linux Server Optional (v. 6) - i386, ppc64, s390x, x86_64 Red Hat Enterprise Linux Workstation (v. 6) - i386, noarch, x86_64 Red Hat Enterprise Linux Workstation Optional (v. 6) - i386, x86_64 3. Description: The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * A use-after-free flaw was found in the way the Linux kernel's Datagram Congestion Control Protocol (DCCP) implementation freed SKB (socket buffer) resources for a DCCP_PKT_REQUEST packet when the IPV6_RECVPKTINFO option is set on the socket. A local, unprivileged user could use this flaw to alter the kernel memory, allowing them to escalate their privileges on the system. (CVE-2017-6074, Important) 4. Solution: For details on how to apply this update, which includes the changes described in this advisory, refer to: https://access.redhat.com/articles/11258 The system must be rebooted for this update to take effect. 5. Bugs fixed (https://bugzilla.redhat.com/): 1423071 - CVE-2017-6074 kernel: use after free in dccp protocol 6. Package List: Red Hat Enterprise Linux Desktop (v. 6): Source: kernel-2.6.32-642.13.2.el6.src.rpm i386: kernel-2.6.32-642.13.2.el6.i686.rpm kernel-debug-2.6.32-642.13.2.el6.i686.rpm kernel-debug-debuginfo-2.6.32-642.13.2.el6.i686.rpm kernel-debug-devel-2.6.32-642.13.2.el6.i686.rpm kernel-debuginfo-2.6.32-642.13.2.el6.i686.rpm kernel-debuginfo-common-i686-2.6.32-642.13.2.el6.i686.rpm kernel-devel-2.6.32-642.13.2.el6.i686.rpm kernel-headers-2.6.32-642.13.2.el6.i686.rpm perf-2.6.32-642.13.2.el6.i686.rpm perf-debuginfo-2.6.32-642.13.2.el6.i686.rpm python-perf-debuginfo-2.6.32-642.13.2.el6.i686.rpm noarch: kernel-abi-whitelists-2.6.32-642.13.2.el6.noarch.rpm kernel-doc-2.6.32-642.13.2.el6.noarch.rpm kernel-firmware-2.6.32-642.13.2.el6.noarch.rpm x86_64: kernel-2.6.32-642.13.2.el6.x86_64.rpm kernel-debug-2.6.32-642.13.2.el6.x86_64.rpm kernel-debug-debuginfo-2.6.32-642.13.2.el6.i686.rpm kernel-debug-debuginfo-2.6.32-642.13.2.el6.x86_64.rpm kernel-debug-devel-2.6.32-642.13.2.el6.i686.rpm kernel-debug-devel-2.6.32-642.13.2.el6.x86_64.rpm kernel-debuginfo-2.6.32-642.13.2.el6.i686.rpm kernel-debuginfo-2.6.32-642.13.2.el6.x86_64.rpm kernel-debuginfo-common-i686-2.6.32-642.13.2.el6.i686.rpm kernel-debuginfo-common-x86_64-2.6.32-642.13.2.el6.x86_64.rpm kernel-devel-2.6.32-642.13.2.el6.x86_64.rpm kernel-headers-2.6.32-642.13.2.el6.x86_64.rpm perf-2.6.32-642.13.2.el6.x86_64.rpm perf-debuginfo-2.6.32-642.13.2.el6.i686.rpm perf-debuginfo-2.6.32-642.13.2.el6.x86_64.rpm python-perf-debuginfo-2.6.32-642.13.2.el6.i686.rpm python-perf-debuginfo-2.6.32-642.13.2.el6.x86_64.rpm Red Hat Enterprise Linux Desktop Optional (v. 6): i386: kernel-debug-debuginfo-2.6.32-642.13.2.el6.i686.rpm kernel-debuginfo-2.6.32-642.13.2.el6.i686.rpm kernel-debuginfo-common-i686-2.6.32-642.13.2.el6.i686.rpm perf-debuginfo-2.6.32-642.13.2.el6.i686.rpm python-perf-2.6.32-642.13.2.el6.i686.rpm python-perf-debuginfo-2.6.32-642.13.2.el6.i686.rpm x86_64: kernel-debug-debuginfo-2.6.32-642.13.2.el6.x86_64.rpm kernel-debuginfo-2.6.32-642.13.2.el6.x86_64.rpm kernel-debuginfo-common-x86_64-2.6.32-642.13.2.el6.x86_64.rpm perf-debuginfo-2.6.32-642.13.2.el6.x86_64.rpm python-perf-2.6.32-642.13.2.el6.x86_64.rpm python-perf-debuginfo-2.6.32-642.13.2.el6.x86_64.rpm Red Hat Enterprise Linux HPC Node (v. 6): Source: kernel-2.6.32-642.13.2.el6.src.rpm noarch: kernel-abi-whitelists-2.6.32-642.13.2.el6.noarch.rpm kernel-doc-2.6.32-642.13.2.el6.noarch.rpm kernel-firmware-2.6.32-642.13.2.el6.noarch.rpm x86_64: kernel-2.6.32-642.13.2.el6.x86_64.rpm kernel-debug-2.6.32-642.13.2.el6.x86_64.rpm kernel-debug-debuginfo-2.6.32-642.13.2.el6.i686.rpm kernel-debug-debuginfo-2.6.32-642.13.2.el6.x86_64.rpm kernel-debug-devel-2.6.32-642.13.2.el6.i686.rpm kernel-debug-devel-2.6.32-642.13.2.el6.x86_64.rpm kernel-debuginfo-2.6.32-642.13.2.el6.i686.rpm kernel-debuginfo-2.6.32-642.13.2.el6.x86_64.rpm kernel-debuginfo-common-i686-2.6.32-642.13.2.el6.i686.rpm kernel-debuginfo-common-x86_64-2.6.32-642.13.2.el6.x86_64.rpm kernel-devel-2.6.32-642.13.2.el6.x86_64.rpm kernel-headers-2.6.32-642.13.2.el6.x86_64.rpm perf-2.6.32-642.13.2.el6.x86_64.rpm perf-debuginfo-2.6.32-642.13.2.el6.i686.rpm perf-debuginfo-2.6.32-642.13.2.el6.x86_64.rpm python-perf-debuginfo-2.6.32-642.13.2.el6.i686.rpm python-perf-debuginfo-2.6.32-642.13.2.el6.x86_64.rpm Red Hat Enterprise Linux HPC Node Optional (v. 6): x86_64: kernel-debug-debuginfo-2.6.32-642.13.2.el6.x86_64.rpm kernel-debuginfo-2.6.32-642.13.2.el6.x86_64.rpm kernel-debuginfo-common-x86_64-2.6.32-642.13.2.el6.x86_64.rpm perf-debuginfo-2.6.32-642.13.2.el6.x86_64.rpm python-perf-2.6.32-642.13.2.el6.x86_64.rpm python-perf-debuginfo-2.6.32-642.13.2.el6.x86_64.rpm Red Hat Enterprise Linux Server (v. 6): Source: kernel-2.6.32-642.13.2.el6.src.rpm i386: kernel-2.6.32-642.13.2.el6.i686.rpm kernel-debug-2.6.32-642.13.2.el6.i686.rpm kernel-debug-debuginfo-2.6.32-642.13.2.el6.i686.rpm kernel-debug-devel-2.6.32-642.13.2.el6.i686.rpm kernel-debuginfo-2.6.32-642.13.2.el6.i686.rpm kernel-debuginfo-common-i686-2.6.32-642.13.2.el6.i686.rpm kernel-devel-2.6.32-642.13.2.el6.i686.rpm kernel-headers-2.6.32-642.13.2.el6.i686.rpm perf-2.6.32-642.13.2.el6.i686.rpm perf-debuginfo-2.6.32-642.13.2.el6.i686.rpm python-perf-debuginfo-2.6.32-642.13.2.el6.i686.rpm noarch: kernel-abi-whitelists-2.6.32-642.13.2.el6.noarch.rpm kernel-doc-2.6.32-642.13.2.el6.noarch.rpm kernel-firmware-2.6.32-642.13.2.el6.noarch.rpm ppc64: kernel-2.6.32-642.13.2.el6.ppc64.rpm kernel-bootwrapper-2.6.32-642.13.2.el6.ppc64.rpm kernel-debug-2.6.32-642.13.2.el6.ppc64.rpm kernel-debug-debuginfo-2.6.32-642.13.2.el6.ppc64.rpm kernel-debug-devel-2.6.32-642.13.2.el6.ppc64.rpm kernel-debuginfo-2.6.32-642.13.2.el6.ppc64.rpm kernel-debuginfo-common-ppc64-2.6.32-642.13.2.el6.ppc64.rpm kernel-devel-2.6.32-642.13.2.el6.ppc64.rpm kernel-headers-2.6.32-642.13.2.el6.ppc64.rpm perf-2.6.32-642.13.2.el6.ppc64.rpm perf-debuginfo-2.6.32-642.13.2.el6.ppc64.rpm python-perf-debuginfo-2.6.32-642.13.2.el6.ppc64.rpm s390x: kernel-2.6.32-642.13.2.el6.s390x.rpm kernel-debug-2.6.32-642.13.2.el6.s390x.rpm kernel-debug-debuginfo-2.6.32-642.13.2.el6.s390x.rpm kernel-debug-devel-2.6.32-642.13.2.el6.s390x.rpm kernel-debuginfo-2.6.32-642.13.2.el6.s390x.rpm kernel-debuginfo-common-s390x-2.6.32-642.13.2.el6.s390x.rpm kernel-devel-2.6.32-642.13.2.el6.s390x.rpm kernel-headers-2.6.32-642.13.2.el6.s390x.rpm kernel-kdump-2.6.32-642.13.2.el6.s390x.rpm kernel-kdump-debuginfo-2.6.32-642.13.2.el6.s390x.rpm kernel-kdump-devel-2.6.32-642.13.2.el6.s390x.rpm perf-2.6.32-642.13.2.el6.s390x.rpm perf-debuginfo-2.6.32-642.13.2.el6.s390x.rpm python-perf-debuginfo-2.6.32-642.13.2.el6.s390x.rpm x86_64: kernel-2.6.32-642.13.2.el6.x86_64.rpm kernel-debug-2.6.32-642.13.2.el6.x86_64.rpm kernel-debug-debuginfo-2.6.32-642.13.2.el6.i686.rpm kernel-debug-debuginfo-2.6.32-642.13.2.el6.x86_64.rpm kernel-debug-devel-2.6.32-642.13.2.el6.i686.rpm kernel-debug-devel-2.6.32-642.13.2.el6.x86_64.rpm kernel-debuginfo-2.6.32-642.13.2.el6.i686.rpm kernel-debuginfo-2.6.32-642.13.2.el6.x86_64.rpm kernel-debuginfo-common-i686-2.6.32-642.13.2.el6.i686.rpm kernel-debuginfo-common-x86_64-2.6.32-642.13.2.el6.x86_64.rpm kernel-devel-2.6.32-642.13.2.el6.x86_64.rpm kernel-headers-2.6.32-642.13.2.el6.x86_64.rpm perf-2.6.32-642.13.2.el6.x86_64.rpm perf-debuginfo-2.6.32-642.13.2.el6.i686.rpm perf-debuginfo-2.6.32-642.13.2.el6.x86_64.rpm python-perf-debuginfo-2.6.32-642.13.2.el6.i686.rpm python-perf-debuginfo-2.6.32-642.13.2.el6.x86_64.rpm Red Hat Enterprise Linux Server Optional (v. 6): i386: kernel-debug-debuginfo-2.6.32-642.13.2.el6.i686.rpm kernel-debuginfo-2.6.32-642.13.2.el6.i686.rpm kernel-debuginfo-common-i686-2.6.32-642.13.2.el6.i686.rpm perf-debuginfo-2.6.32-642.13.2.el6.i686.rpm python-perf-2.6.32-642.13.2.el6.i686.rpm python-perf-debuginfo-2.6.32-642.13.2.el6.i686.rpm ppc64: kernel-debug-debuginfo-2.6.32-642.13.2.el6.ppc64.rpm kernel-debuginfo-2.6.32-642.13.2.el6.ppc64.rpm kernel-debuginfo-common-ppc64-2.6.32-642.13.2.el6.ppc64.rpm perf-debuginfo-2.6.32-642.13.2.el6.ppc64.rpm python-perf-2.6.32-642.13.2.el6.ppc64.rpm python-perf-debuginfo-2.6.32-642.13.2.el6.ppc64.rpm s390x: kernel-debug-debuginfo-2.6.32-642.13.2.el6.s390x.rpm kernel-debuginfo-2.6.32-642.13.2.el6.s390x.rpm kernel-debuginfo-common-s390x-2.6.32-642.13.2.el6.s390x.rpm kernel-kdump-debuginfo-2.6.32-642.13.2.el6.s390x.rpm perf-debuginfo-2.6.32-642.13.2.el6.s390x.rpm python-perf-2.6.32-642.13.2.el6.s390x.rpm python-perf-debuginfo-2.6.32-642.13.2.el6.s390x.rpm x86_64: kernel-debug-debuginfo-2.6.32-642.13.2.el6.x86_64.rpm kernel-debuginfo-2.6.32-642.13.2.el6.x86_64.rpm kernel-debuginfo-common-x86_64-2.6.32-642.13.2.el6.x86_64.rpm perf-debuginfo-2.6.32-642.13.2.el6.x86_64.rpm python-perf-2.6.32-642.13.2.el6.x86_64.rpm python-perf-debuginfo-2.6.32-642.13.2.el6.x86_64.rpm Red Hat Enterprise Linux Workstation (v. 6): Source: kernel-2.6.32-642.13.2.el6.src.rpm i386: kernel-2.6.32-642.13.2.el6.i686.rpm kernel-debug-2.6.32-642.13.2.el6.i686.rpm kernel-debug-debuginfo-2.6.32-642.13.2.el6.i686.rpm kernel-debug-devel-2.6.32-642.13.2.el6.i686.rpm kernel-debuginfo-2.6.32-642.13.2.el6.i686.rpm kernel-debuginfo-common-i686-2.6.32-642.13.2.el6.i686.rpm kernel-devel-2.6.32-642.13.2.el6.i686.rpm kernel-headers-2.6.32-642.13.2.el6.i686.rpm perf-2.6.32-642.13.2.el6.i686.rpm perf-debuginfo-2.6.32-642.13.2.el6.i686.rpm python-perf-debuginfo-2.6.32-642.13.2.el6.i686.rpm noarch: kernel-abi-whitelists-2.6.32-642.13.2.el6.noarch.rpm kernel-doc-2.6.32-642.13.2.el6.noarch.rpm kernel-firmware-2.6.32-642.13.2.el6.noarch.rpm x86_64: kernel-2.6.32-642.13.2.el6.x86_64.rpm kernel-debug-2.6.32-642.13.2.el6.x86_64.rpm kernel-debug-debuginfo-2.6.32-642.13.2.el6.i686.rpm kernel-debug-debuginfo-2.6.32-642.13.2.el6.x86_64.rpm kernel-debug-devel-2.6.32-642.13.2.el6.i686.rpm kernel-debug-devel-2.6.32-642.13.2.el6.x86_64.rpm kernel-debuginfo-2.6.32-642.13.2.el6.i686.rpm kernel-debuginfo-2.6.32-642.13.2.el6.x86_64.rpm kernel-debuginfo-common-i686-2.6.32-642.13.2.el6.i686.rpm kernel-debuginfo-common-x86_64-2.6.32-642.13.2.el6.x86_64.rpm kernel-devel-2.6.32-642.13.2.el6.x86_64.rpm kernel-headers-2.6.32-642.13.2.el6.x86_64.rpm perf-2.6.32-642.13.2.el6.x86_64.rpm perf-debuginfo-2.6.32-642.13.2.el6.i686.rpm perf-debuginfo-2.6.32-642.13.2.el6.x86_64.rpm python-perf-debuginfo-2.6.32-642.13.2.el6.i686.rpm python-perf-debuginfo-2.6.32-642.13.2.el6.x86_64.rpm Red Hat Enterprise Linux Workstation Optional (v. 6): i386: kernel-debug-debuginfo-2.6.32-642.13.2.el6.i686.rpm kernel-debuginfo-2.6.32-642.13.2.el6.i686.rpm kernel-debuginfo-common-i686-2.6.32-642.13.2.el6.i686.rpm perf-debuginfo-2.6.32-642.13.2.el6.i686.rpm python-perf-2.6.32-642.13.2.el6.i686.rpm python-perf-debuginfo-2.6.32-642.13.2.el6.i686.rpm x86_64: kernel-debug-debuginfo-2.6.32-642.13.2.el6.x86_64.rpm kernel-debuginfo-2.6.32-642.13.2.el6.x86_64.rpm kernel-debuginfo-common-x86_64-2.6.32-642.13.2.el6.x86_64.rpm perf-debuginfo-2.6.32-642.13.2.el6.x86_64.rpm python-perf-2.6.32-642.13.2.el6.x86_64.rpm python-perf-debuginfo-2.6.32-642.13.2.el6.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/ 7. References: https://access.redhat.com/security/cve/CVE-2017-6074 https://access.redhat.com/security/updates/classification/#important 8. Contact: The Red Hat security contact is . More contact details at https://access.redhat.com/security/team/contact/ Copyright 2017 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iD8DBQFYrcimXlSAg2UNWIIRAq0uAJwMSCLBVwArZ/4p+pPkhDCXitQgygCeOvSC POoLwU9WiNqKkOjZQKhgZFw= =9UHR -----END PGP SIGNATURE----- --
  22. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ===================================================================== Red Hat Security Advisory Synopsis: Important: kernel security update Advisory ID: RHSA-2017:0294-01 Product: Red Hat Enterprise Linux Advisory URL: https://rhn.redhat.com/errata/RHSA-2017-0294.html Issue date: 2017-02-22 CVE Names: CVE-2017-6074 ===================================================================== 1. Summary: An update for kernel is now available for Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. 2. Relevant releases/architectures: Red Hat Enterprise Linux Client (v. 7) - noarch, x86_64 Red Hat Enterprise Linux Client Optional (v. 7) - x86_64 Red Hat Enterprise Linux ComputeNode (v. 7) - noarch, x86_64 Red Hat Enterprise Linux ComputeNode Optional (v. 7) - x86_64 Red Hat Enterprise Linux Server (v. 7) - noarch, ppc64, ppc64le, s390x, x86_64 Red Hat Enterprise Linux Server Optional (v. 7) - ppc64, ppc64le, x86_64 Red Hat Enterprise Linux Workstation (v. 7) - noarch, x86_64 Red Hat Enterprise Linux Workstation Optional (v. 7) - x86_64 3. Description: The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * A use-after-free flaw was found in the way the Linux kernel's Datagram Congestion Control Protocol (DCCP) implementation freed SKB (socket buffer) resources for a DCCP_PKT_REQUEST packet when the IPV6_RECVPKTINFO option is set on the socket. A local, unprivileged user could use this flaw to alter the kernel memory, allowing them to escalate their privileges on the system. (CVE-2017-6074, Important) 4. Solution: For details on how to apply this update, which includes the changes described in this advisory, refer to: https://access.redhat.com/articles/11258 The system must be rebooted for this update to take effect. 5. Bugs fixed (https://bugzilla.redhat.com/): 1423071 - CVE-2017-6074 kernel: use after free in dccp protocol 6. Package List: Red Hat Enterprise Linux Client (v. 7): Source: kernel-3.10.0-514.6.2.el7.src.rpm noarch: kernel-abi-whitelists-3.10.0-514.6.2.el7.noarch.rpm kernel-doc-3.10.0-514.6.2.el7.noarch.rpm x86_64: kernel-3.10.0-514.6.2.el7.x86_64.rpm kernel-debug-3.10.0-514.6.2.el7.x86_64.rpm kernel-debug-debuginfo-3.10.0-514.6.2.el7.x86_64.rpm kernel-debug-devel-3.10.0-514.6.2.el7.x86_64.rpm kernel-debuginfo-3.10.0-514.6.2.el7.x86_64.rpm kernel-debuginfo-common-x86_64-3.10.0-514.6.2.el7.x86_64.rpm kernel-devel-3.10.0-514.6.2.el7.x86_64.rpm kernel-headers-3.10.0-514.6.2.el7.x86_64.rpm kernel-tools-3.10.0-514.6.2.el7.x86_64.rpm kernel-tools-debuginfo-3.10.0-514.6.2.el7.x86_64.rpm kernel-tools-libs-3.10.0-514.6.2.el7.x86_64.rpm perf-3.10.0-514.6.2.el7.x86_64.rpm perf-debuginfo-3.10.0-514.6.2.el7.x86_64.rpm python-perf-3.10.0-514.6.2.el7.x86_64.rpm python-perf-debuginfo-3.10.0-514.6.2.el7.x86_64.rpm Red Hat Enterprise Linux Client Optional (v. 7): x86_64: kernel-debug-debuginfo-3.10.0-514.6.2.el7.x86_64.rpm kernel-debuginfo-3.10.0-514.6.2.el7.x86_64.rpm kernel-debuginfo-common-x86_64-3.10.0-514.6.2.el7.x86_64.rpm kernel-tools-debuginfo-3.10.0-514.6.2.el7.x86_64.rpm kernel-tools-libs-devel-3.10.0-514.6.2.el7.x86_64.rpm perf-debuginfo-3.10.0-514.6.2.el7.x86_64.rpm python-perf-debuginfo-3.10.0-514.6.2.el7.x86_64.rpm Red Hat Enterprise Linux ComputeNode (v. 7): Source: kernel-3.10.0-514.6.2.el7.src.rpm noarch: kernel-abi-whitelists-3.10.0-514.6.2.el7.noarch.rpm kernel-doc-3.10.0-514.6.2.el7.noarch.rpm x86_64: kernel-3.10.0-514.6.2.el7.x86_64.rpm kernel-debug-3.10.0-514.6.2.el7.x86_64.rpm kernel-debug-debuginfo-3.10.0-514.6.2.el7.x86_64.rpm kernel-debug-devel-3.10.0-514.6.2.el7.x86_64.rpm kernel-debuginfo-3.10.0-514.6.2.el7.x86_64.rpm kernel-debuginfo-common-x86_64-3.10.0-514.6.2.el7.x86_64.rpm kernel-devel-3.10.0-514.6.2.el7.x86_64.rpm kernel-headers-3.10.0-514.6.2.el7.x86_64.rpm kernel-tools-3.10.0-514.6.2.el7.x86_64.rpm kernel-tools-debuginfo-3.10.0-514.6.2.el7.x86_64.rpm kernel-tools-libs-3.10.0-514.6.2.el7.x86_64.rpm perf-3.10.0-514.6.2.el7.x86_64.rpm perf-debuginfo-3.10.0-514.6.2.el7.x86_64.rpm python-perf-3.10.0-514.6.2.el7.x86_64.rpm python-perf-debuginfo-3.10.0-514.6.2.el7.x86_64.rpm Red Hat Enterprise Linux ComputeNode Optional (v. 7): x86_64: kernel-debug-debuginfo-3.10.0-514.6.2.el7.x86_64.rpm kernel-debuginfo-3.10.0-514.6.2.el7.x86_64.rpm kernel-debuginfo-common-x86_64-3.10.0-514.6.2.el7.x86_64.rpm kernel-tools-debuginfo-3.10.0-514.6.2.el7.x86_64.rpm kernel-tools-libs-devel-3.10.0-514.6.2.el7.x86_64.rpm perf-debuginfo-3.10.0-514.6.2.el7.x86_64.rpm python-perf-debuginfo-3.10.0-514.6.2.el7.x86_64.rpm Red Hat Enterprise Linux Server (v. 7): Source: kernel-3.10.0-514.6.2.el7.src.rpm noarch: kernel-abi-whitelists-3.10.0-514.6.2.el7.noarch.rpm kernel-doc-3.10.0-514.6.2.el7.noarch.rpm ppc64: kernel-3.10.0-514.6.2.el7.ppc64.rpm kernel-bootwrapper-3.10.0-514.6.2.el7.ppc64.rpm kernel-debug-3.10.0-514.6.2.el7.ppc64.rpm kernel-debug-debuginfo-3.10.0-514.6.2.el7.ppc64.rpm kernel-debug-devel-3.10.0-514.6.2.el7.ppc64.rpm kernel-debuginfo-3.10.0-514.6.2.el7.ppc64.rpm kernel-debuginfo-common-ppc64-3.10.0-514.6.2.el7.ppc64.rpm kernel-devel-3.10.0-514.6.2.el7.ppc64.rpm kernel-headers-3.10.0-514.6.2.el7.ppc64.rpm kernel-tools-3.10.0-514.6.2.el7.ppc64.rpm kernel-tools-debuginfo-3.10.0-514.6.2.el7.ppc64.rpm kernel-tools-libs-3.10.0-514.6.2.el7.ppc64.rpm perf-3.10.0-514.6.2.el7.ppc64.rpm perf-debuginfo-3.10.0-514.6.2.el7.ppc64.rpm python-perf-3.10.0-514.6.2.el7.ppc64.rpm python-perf-debuginfo-3.10.0-514.6.2.el7.ppc64.rpm ppc64le: kernel-3.10.0-514.6.2.el7.ppc64le.rpm kernel-bootwrapper-3.10.0-514.6.2.el7.ppc64le.rpm kernel-debug-3.10.0-514.6.2.el7.ppc64le.rpm kernel-debug-debuginfo-3.10.0-514.6.2.el7.ppc64le.rpm kernel-debuginfo-3.10.0-514.6.2.el7.ppc64le.rpm kernel-debuginfo-common-ppc64le-3.10.0-514.6.2.el7.ppc64le.rpm kernel-devel-3.10.0-514.6.2.el7.ppc64le.rpm kernel-headers-3.10.0-514.6.2.el7.ppc64le.rpm kernel-tools-3.10.0-514.6.2.el7.ppc64le.rpm kernel-tools-debuginfo-3.10.0-514.6.2.el7.ppc64le.rpm kernel-tools-libs-3.10.0-514.6.2.el7.ppc64le.rpm perf-3.10.0-514.6.2.el7.ppc64le.rpm perf-debuginfo-3.10.0-514.6.2.el7.ppc64le.rpm python-perf-3.10.0-514.6.2.el7.ppc64le.rpm python-perf-debuginfo-3.10.0-514.6.2.el7.ppc64le.rpm s390x: kernel-3.10.0-514.6.2.el7.s390x.rpm kernel-debug-3.10.0-514.6.2.el7.s390x.rpm kernel-debug-debuginfo-3.10.0-514.6.2.el7.s390x.rpm kernel-debug-devel-3.10.0-514.6.2.el7.s390x.rpm kernel-debuginfo-3.10.0-514.6.2.el7.s390x.rpm kernel-debuginfo-common-s390x-3.10.0-514.6.2.el7.s390x.rpm kernel-devel-3.10.0-514.6.2.el7.s390x.rpm kernel-headers-3.10.0-514.6.2.el7.s390x.rpm kernel-kdump-3.10.0-514.6.2.el7.s390x.rpm kernel-kdump-debuginfo-3.10.0-514.6.2.el7.s390x.rpm kernel-kdump-devel-3.10.0-514.6.2.el7.s390x.rpm perf-3.10.0-514.6.2.el7.s390x.rpm perf-debuginfo-3.10.0-514.6.2.el7.s390x.rpm python-perf-3.10.0-514.6.2.el7.s390x.rpm python-perf-debuginfo-3.10.0-514.6.2.el7.s390x.rpm x86_64: kernel-3.10.0-514.6.2.el7.x86_64.rpm kernel-debug-3.10.0-514.6.2.el7.x86_64.rpm kernel-debug-debuginfo-3.10.0-514.6.2.el7.x86_64.rpm kernel-debug-devel-3.10.0-514.6.2.el7.x86_64.rpm kernel-debuginfo-3.10.0-514.6.2.el7.x86_64.rpm kernel-debuginfo-common-x86_64-3.10.0-514.6.2.el7.x86_64.rpm kernel-devel-3.10.0-514.6.2.el7.x86_64.rpm kernel-headers-3.10.0-514.6.2.el7.x86_64.rpm kernel-tools-3.10.0-514.6.2.el7.x86_64.rpm kernel-tools-debuginfo-3.10.0-514.6.2.el7.x86_64.rpm kernel-tools-libs-3.10.0-514.6.2.el7.x86_64.rpm perf-3.10.0-514.6.2.el7.x86_64.rpm perf-debuginfo-3.10.0-514.6.2.el7.x86_64.rpm python-perf-3.10.0-514.6.2.el7.x86_64.rpm python-perf-debuginfo-3.10.0-514.6.2.el7.x86_64.rpm Red Hat Enterprise Linux Server Optional (v. 7): ppc64: kernel-debug-debuginfo-3.10.0-514.6.2.el7.ppc64.rpm kernel-debuginfo-3.10.0-514.6.2.el7.ppc64.rpm kernel-debuginfo-common-ppc64-3.10.0-514.6.2.el7.ppc64.rpm kernel-tools-debuginfo-3.10.0-514.6.2.el7.ppc64.rpm kernel-tools-libs-devel-3.10.0-514.6.2.el7.ppc64.rpm perf-debuginfo-3.10.0-514.6.2.el7.ppc64.rpm python-perf-debuginfo-3.10.0-514.6.2.el7.ppc64.rpm ppc64le: kernel-debug-debuginfo-3.10.0-514.6.2.el7.ppc64le.rpm kernel-debug-devel-3.10.0-514.6.2.el7.ppc64le.rpm kernel-debuginfo-3.10.0-514.6.2.el7.ppc64le.rpm kernel-debuginfo-common-ppc64le-3.10.0-514.6.2.el7.ppc64le.rpm kernel-tools-debuginfo-3.10.0-514.6.2.el7.ppc64le.rpm kernel-tools-libs-devel-3.10.0-514.6.2.el7.ppc64le.rpm perf-debuginfo-3.10.0-514.6.2.el7.ppc64le.rpm python-perf-debuginfo-3.10.0-514.6.2.el7.ppc64le.rpm x86_64: kernel-debug-debuginfo-3.10.0-514.6.2.el7.x86_64.rpm kernel-debuginfo-3.10.0-514.6.2.el7.x86_64.rpm kernel-debuginfo-common-x86_64-3.10.0-514.6.2.el7.x86_64.rpm kernel-tools-debuginfo-3.10.0-514.6.2.el7.x86_64.rpm kernel-tools-libs-devel-3.10.0-514.6.2.el7.x86_64.rpm perf-debuginfo-3.10.0-514.6.2.el7.x86_64.rpm python-perf-debuginfo-3.10.0-514.6.2.el7.x86_64.rpm Red Hat Enterprise Linux Workstation (v. 7): Source: kernel-3.10.0-514.6.2.el7.src.rpm noarch: kernel-abi-whitelists-3.10.0-514.6.2.el7.noarch.rpm kernel-doc-3.10.0-514.6.2.el7.noarch.rpm x86_64: kernel-3.10.0-514.6.2.el7.x86_64.rpm kernel-debug-3.10.0-514.6.2.el7.x86_64.rpm kernel-debug-debuginfo-3.10.0-514.6.2.el7.x86_64.rpm kernel-debug-devel-3.10.0-514.6.2.el7.x86_64.rpm kernel-debuginfo-3.10.0-514.6.2.el7.x86_64.rpm kernel-debuginfo-common-x86_64-3.10.0-514.6.2.el7.x86_64.rpm kernel-devel-3.10.0-514.6.2.el7.x86_64.rpm kernel-headers-3.10.0-514.6.2.el7.x86_64.rpm kernel-tools-3.10.0-514.6.2.el7.x86_64.rpm kernel-tools-debuginfo-3.10.0-514.6.2.el7.x86_64.rpm kernel-tools-libs-3.10.0-514.6.2.el7.x86_64.rpm perf-3.10.0-514.6.2.el7.x86_64.rpm perf-debuginfo-3.10.0-514.6.2.el7.x86_64.rpm python-perf-3.10.0-514.6.2.el7.x86_64.rpm python-perf-debuginfo-3.10.0-514.6.2.el7.x86_64.rpm Red Hat Enterprise Linux Workstation Optional (v. 7): x86_64: kernel-debug-debuginfo-3.10.0-514.6.2.el7.x86_64.rpm kernel-debuginfo-3.10.0-514.6.2.el7.x86_64.rpm kernel-debuginfo-common-x86_64-3.10.0-514.6.2.el7.x86_64.rpm kernel-tools-debuginfo-3.10.0-514.6.2.el7.x86_64.rpm kernel-tools-libs-devel-3.10.0-514.6.2.el7.x86_64.rpm perf-debuginfo-3.10.0-514.6.2.el7.x86_64.rpm python-perf-debuginfo-3.10.0-514.6.2.el7.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/ 7. References: https://access.redhat.com/security/cve/CVE-2017-6074 https://access.redhat.com/security/updates/classification/#important 8. Contact: The Red Hat security contact is . More contact details at https://access.redhat.com/security/team/contact/ Copyright 2017 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iD8DBQFYrckFXlSAg2UNWIIRAngmAKCgaqcYM+XTKHS/I1Z1pigpEQBPOgCeJ43+ e9FajezDcn9Codkmm/nU1Cc= =bNp7 -----END PGP SIGNATURE----- --
  23. Hello LanOC Affiliates and newsletter subscribers, here is our newest posting. We would appreciate you spreading the word! LanOC Reviews has released a new article which you and your readers might enjoy. We would be grateful if you would please share it with them. *TITLE:* Project Build: Crush – Part 5 – Painting a GTX 1080 FE ( -at -) LanOC Reviews <https://lanoc.org/review/pc-hardware/7450-project-build-crush-part-5-painting-a-gtx-1080-fe> *DESCRIPTION:* For some people, you get your computer together and never mess with it again. I, on the other hand, have a problem and as they say, the first thing is to admit you have a problem. I finished up the Crush build and even posted up performance numbers last week. My problem is I keep looking and thinking how much better the build could look with this one change. Once you do that, you are done, right? Nope! Now that you did that, this other thing really needs to be changed. It’s an endless battle. Well with Crush I just HAD to pull it all apart and keep messing with it. I’m actually in the middle of a few different changes, but the biggest was painting the two GTX 1080’s like I had originally planned. So today I’m going to run through how to paint the new GTX 1080/1070 Founders Edition cards for a nice matching look. *ARTICLE URL:* https://lanoc.org/review/pc-hardware/7450-project-build-crush-part-5-painting-a-gtx-1080-fe *LARGE IMAGE URL:* https://lanoc.org/images/reviews/2017/crush_part5/title.jpg *SMALL IMAGE URL:* https://lanoc.org/images/reviews/2017/crush_part5/email.jpg Thank you for your help Our content is syndicated by *RSS* 2.0 at: http://lanoc.org/review?fo rmat=feed&type=atom Check out our *YouTube* Channel: http://www.youtube.com/user/LanocReviews Follow us on *Twitter*: http://www.twitter.com/LanOC_Reviews Join our group on *Facebook*: http://www.facebook.com/LanOCReviews Join our *Steam* Group: http://steamcommunity.com/groups/lanoc *If this message has been sent to an incorrect address, or you no longer wish to receive our news, please email us back and let us know at reviews ( -at -) lanoc.org* ---------------------------------------- Wes Compton Editor-in-Chief LanOC Reviews http://lanoc.org ( -at -) LanOC_Reviews <http://twitter.com/#!/LanOC_Reviews> Google Plus <https://plus.google.com/u/1/b/111054267662763089650/> Our Facebook Page <http://www.facebook.com/LanOCReviews>
×