Jump to content
Compatible Support Forums

news

Members
  • Content count

    80899
  • Joined

  • Last visited

    Never
  • Days Won

    18

Everything posted by news

  1. CentOS Errata and Security Advisory 2017:0064 Important Upstream details at : https://rhn.redhat.com/errata/RHSA-2017-0064.html The following updated files have been uploaded and are currently syncing to the mirrors: ( sha256sum Filename ) i386: 15901c27eb18339d100c822e229763b20a1c17442bc12394bf98d14b534f50db bind97-9.7.0-21.P2.el5_11.10.i386.rpm e628be5d4849b82e978989c405e4f3248f59d3bdeeb0ecc61216138a00f1061a bind97-chroot-9.7.0-21.P2.el5_11.10.i386.rpm ed3e8c4ef3105c25788a7a9f030f3992264d0a026d4dc56185cb3d8501dd3aff bind97-devel-9.7.0-21.P2.el5_11.10.i386.rpm 6621f2186190dca0b182539e7a6dc7fcb9be0e8ce08b157a9952209b17538e25 bind97-libs-9.7.0-21.P2.el5_11.10.i386.rpm 1e6dc63437f48c256ce341138759faf635b79afbb5fbc0cb1ca0b7e92828b530 bind97-utils-9.7.0-21.P2.el5_11.10.i386.rpm x86_64: f2c9671bbd0e1060fb57646a7095869fa6fd4d53b92422403c2ebf75899088b6 bind97-9.7.0-21.P2.el5_11.10.x86_64.rpm c459368a91c11712682af9cad9e4211d7a400f845981878eb36631087773d468 bind97-chroot-9.7.0-21.P2.el5_11.10.x86_64.rpm ed3e8c4ef3105c25788a7a9f030f3992264d0a026d4dc56185cb3d8501dd3aff bind97-devel-9.7.0-21.P2.el5_11.10.i386.rpm d1447bac46b92250da988fbba14372fdfd8e50b496630d220e2b3b7146d93b10 bind97-devel-9.7.0-21.P2.el5_11.10.x86_64.rpm 6621f2186190dca0b182539e7a6dc7fcb9be0e8ce08b157a9952209b17538e25 bind97-libs-9.7.0-21.P2.el5_11.10.i386.rpm 4ca5c353ee4caffccd0eb04ea239c30db06ff857020df3ed03eab8e0b68f7865 bind97-libs-9.7.0-21.P2.el5_11.10.x86_64.rpm 5b81957e075bb723933dbe8df9cbab893cffa8512d2ffaae0a9e2ec78c893da8 bind97-utils-9.7.0-21.P2.el5_11.10.x86_64.rpm Source: 258485f13396e50e1d83ca27fd2e4da0c96c0b8bc1ea3f54eca79006e6ca0c60 bind97-9.7.0-21.P2.el5_11.10.src.rpm -- Johnny Hughes CentOS Project { http://www.centos.org/ } irc: hughesjr, #centos ( -at -) irc.freenode.net Twitter: JohnnyCentOS _______________________________________________
  2. CentOS Errata and Security Advisory 2017:0062 Important Upstream details at : https://rhn.redhat.com/errata/RHSA-2017-0062.html The following updated files have been uploaded and are currently syncing to the mirrors: ( sha256sum Filename ) x86_64: 922e6d7db809f86fb353cf2635724692c169f81b8f306372400e810dfcc7dd21 bind-9.9.4-38.el7_3.1.x86_64.rpm d7521bfd2279313d0ca6d92c2ca9f724c25a343cc3f7bf104d6bafdfe6c1baea bind-chroot-9.9.4-38.el7_3.1.x86_64.rpm 6745e01a27f6f2b0ee43040254f4737b455d6ed66ae161bf9c6b116572b3962f bind-devel-9.9.4-38.el7_3.1.i686.rpm 35898e81da63115180e390304796010f06b175f99598461efe2937e6b05dd17b bind-devel-9.9.4-38.el7_3.1.x86_64.rpm 8ba46f89c530972d8f7e60e25864437f265e76516bc3d51c949c3c85a65c6e75 bind-libs-9.9.4-38.el7_3.1.i686.rpm 5cfe528a1c12d5e97949cc56e89817c9156f5d46a674c2d1de2e21df5d441fe9 bind-libs-9.9.4-38.el7_3.1.x86_64.rpm 3e92363d65aa194ace31e76814279e88f64ed59921da6098189bb4e577c2a220 bind-libs-lite-9.9.4-38.el7_3.1.i686.rpm fcccb3dbd7846be233881a8c525d4515210c9d431921333ce4fc94697dd314c5 bind-libs-lite-9.9.4-38.el7_3.1.x86_64.rpm 07549f43dac929ba85a7e1123e4d8c3149a75947e8e88716588cd07f02cc7a2d bind-license-9.9.4-38.el7_3.1.noarch.rpm 85adc57e21acf71af69b06b17f236c3f8cdbfb2db660e97ef62d2332fbcbb41c bind-lite-devel-9.9.4-38.el7_3.1.i686.rpm 7c7bb26f5860bceacdb4884172daf16f04aee1e45bd61b1369448c6d9a08c6bd bind-lite-devel-9.9.4-38.el7_3.1.x86_64.rpm 533e77ad5b75b00ff4dc30640cb597f4d9471fbe8dec20ae0c537bb27c1f27a5 bind-pkcs11-9.9.4-38.el7_3.1.x86_64.rpm e81e12e30f217e052c830be848978e6aaf1792d49b5b790bfb740e66b9dc180f bind-pkcs11-devel-9.9.4-38.el7_3.1.i686.rpm 623b00adb0a66786faf9b7e7afe603534092cd4e0674eec44132b555af0c9077 bind-pkcs11-devel-9.9.4-38.el7_3.1.x86_64.rpm 6fee761a9ffde4503bb94a45b4480630801c30c8815c0b7153f9c2665ba4ab2d bind-pkcs11-libs-9.9.4-38.el7_3.1.i686.rpm 1c9cbe6497dcaa0fc9a54021a43f29df8648083e16934258f6c0fe68a32908de bind-pkcs11-libs-9.9.4-38.el7_3.1.x86_64.rpm 5e5b779edaa5ba9d19149ea28cb31a491ab14e2298c8b3fbc206c8133799d336 bind-pkcs11-utils-9.9.4-38.el7_3.1.x86_64.rpm 4678bbf2437150632e574f371e0719ceb36a8f5e3d8998c54a5a3ac64e414d9e bind-sdb-9.9.4-38.el7_3.1.x86_64.rpm 3c23783b1a42f0af013f38a698c25275425fe2fc0bd5483a104b3c0415fc28d4 bind-sdb-chroot-9.9.4-38.el7_3.1.x86_64.rpm 356da572ddae5297282284bae84be7df83daf6f28239d5f3768e72d7f24427ec bind-utils-9.9.4-38.el7_3.1.x86_64.rpm Source: 878bbd8d211b55b559f825892c3f2b57f2188fd5377e69e6bd36d861c068caae bind-9.9.4-38.el7_3.1.src.rpm -- Johnny Hughes CentOS Project { http://www.centos.org/ } irc: hughesjr, #centos ( -at -) irc.freenode.net Twitter: ( -at -) JohnnyCentOS _______________________________________________
  3. ThunderX3 TM50 By Aerocool Mouse Review (w/ TMP40 Mousemat) ------------------------------------------------------------ http://us2.campaign-archive2.com/?u=bfb2b902b5fb045ad6f841f98&id=d00df0f1da&e=872093acb5 http://www.kitguru.net ThunderX3 TM50 By Aerocool Mouse Review (w/ TMP40 Mousemat) In an increasingly saturated peripheral market, it can be hard for a new manufacturer to stand out and get some attention. ThunderX3, a subsidiary of Aerocool, are hoping that their TM50 mouse – complete with an Avago 3310 optical sensor, RGB lighting and an aluminium base – will be able to compete with established brands like Corsair and Razer. The TM50 may sound like a fairly typical mouse on paper, but ThunderX3 do have a trick up their sleeve – the mouse costs just £29.90. Read the review here: http://www.kitguru.net/peripherals/mouse/dominic-moass/thunderx3-tm50-by-aerocool-mouse-review-w-tmp40-mousemat/ ============================================================ ** follow on Twitter (http://twitter.com/#!/kitgurupress) | ** friend on Facebook (http://www.facebook.com/pages/KitGuru/162236020510911) | ** forward to a friend (http://us2.forward-to-friend1.com/forward?u=bfb2b902b5fb045ad6f841f98&id=d00df0f1da&e=872093acb5) Copyright © 2017 KitGuru, All rights reserved. You are receiving this because you are a news partner or have signed up to receive our news.
  4. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ===================================================================== Red Hat Security Advisory Synopsis: Important: kernel security update Advisory ID: RHSA-2017:0065-01 Product: Red Hat Enterprise Linux Advisory URL: https://rhn.redhat.com/errata/RHSA-2017-0065.html Issue date: 2017-01-17 CVE Names: CVE-2016-7117 ===================================================================== 1. Summary: An update for kernel is now available for Red Hat Enterprise Linux 6.5 Advanced Update Support. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. 2. Relevant releases/architectures: Red Hat Enterprise Linux Server AUS (v. 6.5) - noarch, x86_64 Red Hat Enterprise Linux Server Optional AUS (v. 6.5) - x86_64 Red Hat Enterprise Linux Server Optional TUS (v. 6.5) - x86_64 Red Hat Enterprise Linux Server TUS (v. 6.5) - noarch, x86_64 3. Description: The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * A use-after-free vulnerability was found in the kernels socket recvmmsg subsystem. This may allow remote attackers to corrupt memory and may allow execution of arbitrary code. This corruption takes place during the error handling routines within __sys_recvmmsg() function. (CVE-2016-7117, Important) 4. Solution: For details on how to apply this update, which includes the changes described in this advisory, refer to: https://access.redhat.com/articles/11258 The system must be rebooted for this update to take effect. 5. Bugs fixed (https://bugzilla.redhat.com/): 1382268 - CVE-2016-7117 kernel: Use-after-free in the recvmmsg exit path 6. Package List: Red Hat Enterprise Linux Server AUS (v. 6.5): Source: kernel-2.6.32-431.77.1.el6.src.rpm noarch: kernel-abi-whitelists-2.6.32-431.77.1.el6.noarch.rpm kernel-doc-2.6.32-431.77.1.el6.noarch.rpm kernel-firmware-2.6.32-431.77.1.el6.noarch.rpm x86_64: kernel-2.6.32-431.77.1.el6.x86_64.rpm kernel-debug-2.6.32-431.77.1.el6.x86_64.rpm kernel-debug-debuginfo-2.6.32-431.77.1.el6.x86_64.rpm kernel-debug-devel-2.6.32-431.77.1.el6.x86_64.rpm kernel-debuginfo-2.6.32-431.77.1.el6.x86_64.rpm kernel-debuginfo-common-x86_64-2.6.32-431.77.1.el6.x86_64.rpm kernel-devel-2.6.32-431.77.1.el6.x86_64.rpm kernel-headers-2.6.32-431.77.1.el6.x86_64.rpm perf-2.6.32-431.77.1.el6.x86_64.rpm perf-debuginfo-2.6.32-431.77.1.el6.x86_64.rpm python-perf-debuginfo-2.6.32-431.77.1.el6.x86_64.rpm Red Hat Enterprise Linux Server TUS (v. 6.5): Source: kernel-2.6.32-431.77.1.el6.src.rpm noarch: kernel-abi-whitelists-2.6.32-431.77.1.el6.noarch.rpm kernel-doc-2.6.32-431.77.1.el6.noarch.rpm kernel-firmware-2.6.32-431.77.1.el6.noarch.rpm x86_64: kernel-2.6.32-431.77.1.el6.x86_64.rpm kernel-debug-2.6.32-431.77.1.el6.x86_64.rpm kernel-debug-debuginfo-2.6.32-431.77.1.el6.x86_64.rpm kernel-debug-devel-2.6.32-431.77.1.el6.x86_64.rpm kernel-debuginfo-2.6.32-431.77.1.el6.x86_64.rpm kernel-debuginfo-common-x86_64-2.6.32-431.77.1.el6.x86_64.rpm kernel-devel-2.6.32-431.77.1.el6.x86_64.rpm kernel-headers-2.6.32-431.77.1.el6.x86_64.rpm perf-2.6.32-431.77.1.el6.x86_64.rpm perf-debuginfo-2.6.32-431.77.1.el6.x86_64.rpm python-perf-debuginfo-2.6.32-431.77.1.el6.x86_64.rpm Red Hat Enterprise Linux Server Optional AUS (v. 6.5): Source: kernel-2.6.32-431.77.1.el6.src.rpm x86_64: kernel-debug-debuginfo-2.6.32-431.77.1.el6.x86_64.rpm kernel-debuginfo-2.6.32-431.77.1.el6.x86_64.rpm kernel-debuginfo-common-x86_64-2.6.32-431.77.1.el6.x86_64.rpm perf-debuginfo-2.6.32-431.77.1.el6.x86_64.rpm python-perf-2.6.32-431.77.1.el6.x86_64.rpm python-perf-debuginfo-2.6.32-431.77.1.el6.x86_64.rpm Red Hat Enterprise Linux Server Optional TUS (v. 6.5): Source: kernel-2.6.32-431.77.1.el6.src.rpm x86_64: kernel-debug-debuginfo-2.6.32-431.77.1.el6.x86_64.rpm kernel-debuginfo-2.6.32-431.77.1.el6.x86_64.rpm kernel-debuginfo-common-x86_64-2.6.32-431.77.1.el6.x86_64.rpm perf-debuginfo-2.6.32-431.77.1.el6.x86_64.rpm python-perf-2.6.32-431.77.1.el6.x86_64.rpm python-perf-debuginfo-2.6.32-431.77.1.el6.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/ 7. References: https://access.redhat.com/security/cve/CVE-2016-7117 https://access.redhat.com/security/updates/classification/#important 8. Contact: The Red Hat security contact is . More contact details at https://access.redhat.com/security/team/contact/ Copyright 2017 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iD8DBQFYfeJtXlSAg2UNWIIRAtNNAJ9nV+3x9+l9Kp9ydyAXvUHvcA+y2ACdFhkS v/OR3f7Vm/GoMtdmI9yEelk= =cZ8o -----END PGP SIGNATURE----- --
  5. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ===================================================================== Red Hat Security Advisory Synopsis: Important: kernel security update Advisory ID: RHSA-2017:0065-01 Product: Red Hat Enterprise Linux Advisory URL: https://rhn.redhat.com/errata/RHSA-2017-0065.html Issue date: 2017-01-17 CVE Names: CVE-2016-7117 ===================================================================== 1. Summary: An update for kernel is now available for Red Hat Enterprise Linux 6.5 Advanced Update Support. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. 2. Relevant releases/architectures: Red Hat Enterprise Linux Server AUS (v. 6.5) - noarch, x86_64 Red Hat Enterprise Linux Server Optional AUS (v. 6.5) - x86_64 Red Hat Enterprise Linux Server Optional TUS (v. 6.5) - x86_64 Red Hat Enterprise Linux Server TUS (v. 6.5) - noarch, x86_64 3. Description: The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * A use-after-free vulnerability was found in the kernels socket recvmmsg subsystem. This may allow remote attackers to corrupt memory and may allow execution of arbitrary code. This corruption takes place during the error handling routines within __sys_recvmmsg() function. (CVE-2016-7117, Important) 4. Solution: For details on how to apply this update, which includes the changes described in this advisory, refer to: https://access.redhat.com/articles/11258 The system must be rebooted for this update to take effect. 5. Bugs fixed (https://bugzilla.redhat.com/): 1382268 - CVE-2016-7117 kernel: Use-after-free in the recvmmsg exit path 6. Package List: Red Hat Enterprise Linux Server AUS (v. 6.5): Source: kernel-2.6.32-431.77.1.el6.src.rpm noarch: kernel-abi-whitelists-2.6.32-431.77.1.el6.noarch.rpm kernel-doc-2.6.32-431.77.1.el6.noarch.rpm kernel-firmware-2.6.32-431.77.1.el6.noarch.rpm x86_64: kernel-2.6.32-431.77.1.el6.x86_64.rpm kernel-debug-2.6.32-431.77.1.el6.x86_64.rpm kernel-debug-debuginfo-2.6.32-431.77.1.el6.x86_64.rpm kernel-debug-devel-2.6.32-431.77.1.el6.x86_64.rpm kernel-debuginfo-2.6.32-431.77.1.el6.x86_64.rpm kernel-debuginfo-common-x86_64-2.6.32-431.77.1.el6.x86_64.rpm kernel-devel-2.6.32-431.77.1.el6.x86_64.rpm kernel-headers-2.6.32-431.77.1.el6.x86_64.rpm perf-2.6.32-431.77.1.el6.x86_64.rpm perf-debuginfo-2.6.32-431.77.1.el6.x86_64.rpm python-perf-debuginfo-2.6.32-431.77.1.el6.x86_64.rpm Red Hat Enterprise Linux Server TUS (v. 6.5): Source: kernel-2.6.32-431.77.1.el6.src.rpm noarch: kernel-abi-whitelists-2.6.32-431.77.1.el6.noarch.rpm kernel-doc-2.6.32-431.77.1.el6.noarch.rpm kernel-firmware-2.6.32-431.77.1.el6.noarch.rpm x86_64: kernel-2.6.32-431.77.1.el6.x86_64.rpm kernel-debug-2.6.32-431.77.1.el6.x86_64.rpm kernel-debug-debuginfo-2.6.32-431.77.1.el6.x86_64.rpm kernel-debug-devel-2.6.32-431.77.1.el6.x86_64.rpm kernel-debuginfo-2.6.32-431.77.1.el6.x86_64.rpm kernel-debuginfo-common-x86_64-2.6.32-431.77.1.el6.x86_64.rpm kernel-devel-2.6.32-431.77.1.el6.x86_64.rpm kernel-headers-2.6.32-431.77.1.el6.x86_64.rpm perf-2.6.32-431.77.1.el6.x86_64.rpm perf-debuginfo-2.6.32-431.77.1.el6.x86_64.rpm python-perf-debuginfo-2.6.32-431.77.1.el6.x86_64.rpm Red Hat Enterprise Linux Server Optional AUS (v. 6.5): Source: kernel-2.6.32-431.77.1.el6.src.rpm x86_64: kernel-debug-debuginfo-2.6.32-431.77.1.el6.x86_64.rpm kernel-debuginfo-2.6.32-431.77.1.el6.x86_64.rpm kernel-debuginfo-common-x86_64-2.6.32-431.77.1.el6.x86_64.rpm perf-debuginfo-2.6.32-431.77.1.el6.x86_64.rpm python-perf-2.6.32-431.77.1.el6.x86_64.rpm python-perf-debuginfo-2.6.32-431.77.1.el6.x86_64.rpm Red Hat Enterprise Linux Server Optional TUS (v. 6.5): Source: kernel-2.6.32-431.77.1.el6.src.rpm x86_64: kernel-debug-debuginfo-2.6.32-431.77.1.el6.x86_64.rpm kernel-debuginfo-2.6.32-431.77.1.el6.x86_64.rpm kernel-debuginfo-common-x86_64-2.6.32-431.77.1.el6.x86_64.rpm perf-debuginfo-2.6.32-431.77.1.el6.x86_64.rpm python-perf-2.6.32-431.77.1.el6.x86_64.rpm python-perf-debuginfo-2.6.32-431.77.1.el6.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/ 7. References: https://access.redhat.com/security/cve/CVE-2016-7117 https://access.redhat.com/security/updates/classification/#important 8. Contact: The Red Hat security contact is . More contact details at https://access.redhat.com/security/team/contact/ Copyright 2017 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iD8DBQFYfeJtXlSAg2UNWIIRAtNNAJ9nV+3x9+l9Kp9ydyAXvUHvcA+y2ACdFhkS v/OR3f7Vm/GoMtdmI9yEelk= =cZ8o -----END PGP SIGNATURE----- --
  6. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ===================================================================== Red Hat Security Advisory Synopsis: Important: kernel security update Advisory ID: RHSA-2017:0065-01 Product: Red Hat Enterprise Linux Advisory URL: https://rhn.redhat.com/errata/RHSA-2017-0065.html Issue date: 2017-01-17 CVE Names: CVE-2016-7117 ===================================================================== 1. Summary: An update for kernel is now available for Red Hat Enterprise Linux 6.5 Advanced Update Support. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. 2. Relevant releases/architectures: Red Hat Enterprise Linux Server AUS (v. 6.5) - noarch, x86_64 Red Hat Enterprise Linux Server Optional AUS (v. 6.5) - x86_64 Red Hat Enterprise Linux Server Optional TUS (v. 6.5) - x86_64 Red Hat Enterprise Linux Server TUS (v. 6.5) - noarch, x86_64 3. Description: The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * A use-after-free vulnerability was found in the kernels socket recvmmsg subsystem. This may allow remote attackers to corrupt memory and may allow execution of arbitrary code. This corruption takes place during the error handling routines within __sys_recvmmsg() function. (CVE-2016-7117, Important) 4. Solution: For details on how to apply this update, which includes the changes described in this advisory, refer to: https://access.redhat.com/articles/11258 The system must be rebooted for this update to take effect. 5. Bugs fixed (https://bugzilla.redhat.com/): 1382268 - CVE-2016-7117 kernel: Use-after-free in the recvmmsg exit path 6. Package List: Red Hat Enterprise Linux Server AUS (v. 6.5): Source: kernel-2.6.32-431.77.1.el6.src.rpm noarch: kernel-abi-whitelists-2.6.32-431.77.1.el6.noarch.rpm kernel-doc-2.6.32-431.77.1.el6.noarch.rpm kernel-firmware-2.6.32-431.77.1.el6.noarch.rpm x86_64: kernel-2.6.32-431.77.1.el6.x86_64.rpm kernel-debug-2.6.32-431.77.1.el6.x86_64.rpm kernel-debug-debuginfo-2.6.32-431.77.1.el6.x86_64.rpm kernel-debug-devel-2.6.32-431.77.1.el6.x86_64.rpm kernel-debuginfo-2.6.32-431.77.1.el6.x86_64.rpm kernel-debuginfo-common-x86_64-2.6.32-431.77.1.el6.x86_64.rpm kernel-devel-2.6.32-431.77.1.el6.x86_64.rpm kernel-headers-2.6.32-431.77.1.el6.x86_64.rpm perf-2.6.32-431.77.1.el6.x86_64.rpm perf-debuginfo-2.6.32-431.77.1.el6.x86_64.rpm python-perf-debuginfo-2.6.32-431.77.1.el6.x86_64.rpm Red Hat Enterprise Linux Server TUS (v. 6.5): Source: kernel-2.6.32-431.77.1.el6.src.rpm noarch: kernel-abi-whitelists-2.6.32-431.77.1.el6.noarch.rpm kernel-doc-2.6.32-431.77.1.el6.noarch.rpm kernel-firmware-2.6.32-431.77.1.el6.noarch.rpm x86_64: kernel-2.6.32-431.77.1.el6.x86_64.rpm kernel-debug-2.6.32-431.77.1.el6.x86_64.rpm kernel-debug-debuginfo-2.6.32-431.77.1.el6.x86_64.rpm kernel-debug-devel-2.6.32-431.77.1.el6.x86_64.rpm kernel-debuginfo-2.6.32-431.77.1.el6.x86_64.rpm kernel-debuginfo-common-x86_64-2.6.32-431.77.1.el6.x86_64.rpm kernel-devel-2.6.32-431.77.1.el6.x86_64.rpm kernel-headers-2.6.32-431.77.1.el6.x86_64.rpm perf-2.6.32-431.77.1.el6.x86_64.rpm perf-debuginfo-2.6.32-431.77.1.el6.x86_64.rpm python-perf-debuginfo-2.6.32-431.77.1.el6.x86_64.rpm Red Hat Enterprise Linux Server Optional AUS (v. 6.5): Source: kernel-2.6.32-431.77.1.el6.src.rpm x86_64: kernel-debug-debuginfo-2.6.32-431.77.1.el6.x86_64.rpm kernel-debuginfo-2.6.32-431.77.1.el6.x86_64.rpm kernel-debuginfo-common-x86_64-2.6.32-431.77.1.el6.x86_64.rpm perf-debuginfo-2.6.32-431.77.1.el6.x86_64.rpm python-perf-2.6.32-431.77.1.el6.x86_64.rpm python-perf-debuginfo-2.6.32-431.77.1.el6.x86_64.rpm Red Hat Enterprise Linux Server Optional TUS (v. 6.5): Source: kernel-2.6.32-431.77.1.el6.src.rpm x86_64: kernel-debug-debuginfo-2.6.32-431.77.1.el6.x86_64.rpm kernel-debuginfo-2.6.32-431.77.1.el6.x86_64.rpm kernel-debuginfo-common-x86_64-2.6.32-431.77.1.el6.x86_64.rpm perf-debuginfo-2.6.32-431.77.1.el6.x86_64.rpm python-perf-2.6.32-431.77.1.el6.x86_64.rpm python-perf-debuginfo-2.6.32-431.77.1.el6.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/ 7. References: https://access.redhat.com/security/cve/CVE-2016-7117 https://access.redhat.com/security/updates/classification/#important 8. Contact: The Red Hat security contact is . More contact details at https://access.redhat.com/security/team/contact/ Copyright 2017 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iD8DBQFYfeJtXlSAg2UNWIIRAtNNAJ9nV+3x9+l9Kp9ydyAXvUHvcA+y2ACdFhkS v/OR3f7Vm/GoMtdmI9yEelk= =cZ8o -----END PGP SIGNATURE----- --
  7. ** TECHSPOT ------------------------------------------------------------ ** A Decade Later: Does the Q6600 Still Have Game in 2017? ------------------------------------------------------------ ** http://www.techspot.com/article/1313-intel-q6600-ten-years-later/ ------------------------------------------------------------ Released about 10 years ago, we thought it would be interesting to see how the Q6600 holds up in 2017 while playing today's games on modern GPUs. In other words, what would happen if you paired a trusty old PC with a GeForce GTX 1060 or GTX 1070. Thank you. Julio Franco Executive Editor | TECHSPOT ( -at -) juliofranco ----------------------------------- ============================================================ Our mailing address is: TechSpot 8237 NW 68 St Miami, FL 33166 USA
  8. ** TECHSPOT ------------------------------------------------------------ ** A Decade Later: Does the Q6600 Still Have Game in 2017? ------------------------------------------------------------ ** http://www.techspot.com/article/1313-intel-q6600-ten-years-later/ ------------------------------------------------------------ Released about 10 years ago, we thought it would be interesting to see how the Q6600 holds up in 2017 while playing today's games on modern GPUs. In other words, what would happen if you paired a trusty old PC with a GeForce GTX 1060 or GTX 1070. Thank you. Julio Franco Executive Editor | TECHSPOT ( -at -) juliofranco ----------------------------------- ============================================================ Our mailing address is: TechSpot 8237 NW 68 St Miami, FL 33166 USA
  9. ** TECHSPOT ------------------------------------------------------------ ** A Decade Later: Does the Q6600 Still Have Game in 2017? ------------------------------------------------------------ ** http://www.techspot.com/article/1313-intel-q6600-ten-years-later/ ------------------------------------------------------------ Released about 10 years ago, we thought it would be interesting to see how the Q6600 holds up in 2017 while playing today's games on modern GPUs. In other words, what would happen if you paired a trusty old PC with a GeForce GTX 1060 or GTX 1070. Thank you. Julio Franco Executive Editor | TECHSPOT ( -at -) juliofranco ----------------------------------- ============================================================ Our mailing address is: TechSpot 8237 NW 68 St Miami, FL 33166 USA
  10. ** TECHSPOT ------------------------------------------------------------ ** A Decade Later: Does the Q6600 Still Have Game in 2017? ------------------------------------------------------------ ** http://www.techspot.com/article/1313-intel-q6600-ten-years-later/ ------------------------------------------------------------ Released about 10 years ago, we thought it would be interesting to see how the Q6600 holds up in 2017 while playing today's games on modern GPUs. In other words, what would happen if you paired a trusty old PC with a GeForce GTX 1060 or GTX 1070. Thank you. Julio Franco Executive Editor | TECHSPOT ( -at -) juliofranco ----------------------------------- ============================================================ Our mailing address is: TechSpot 8237 NW 68 St Miami, FL 33166 USA
  11. Hardware Canucks is pleased to present our review of the new ASUS Maximus IX Hero Kaby Lake motherboard. *Article URL:* http://www.hardwarecanucks.com/forum/hardware-canucks-reviews/74201-asus-maximus-ix-hero-motherboard-review.html *Quote:* *Buyers of Intel's new Kaby Lake processors already have a huge number of Z270 options but the ASUS MAXIMUS IX Hero stands apart with an awesome combination of features and pricing. * We would appreciate it if you would post this in your News section. Regards, -- Hardware Canucks News Team
  12. Dear Editors, we just posted a new article which might be interesting to your readers. A post in your news section would be appreciated. Title: Crucial Ballistix Elite 3200 MHz DDR4 16 GB Link: http://www.techpowerup.com/reviews/Crucial/Ballistix_Elite_3200_DDR4 Brief: Crucial's Ballistix Elite DDR4 are on our test bench today. These 3200 MHz 4 GB DIMMs are the top speed Crucial offers right now, featuring large heatsinks and fairly respectable timings. Also included is a nice software suite that lets you monitor temperatures and adjust the LED lighting.
  13. openSUSE Security Update: Security update for icoutils ______________________________________________________________________________ Announcement ID: openSUSE-SU-2017:0166-1 Rating: important References: #1018756 Cross-References: CVE-2017-5208 CVE-2017-5331 CVE-2017-5332 CVE-2017-5333 Affected Products: openSUSE Leap 42.1 ______________________________________________________________________________ An update that fixes four vulnerabilities is now available. Description: This update for icoutils to version 0.31.1 fixes the following issues: - CVE-2017-5208: An integer overflow allows maliciously crafted files to cause DoS or code execution (boo#1018756). - CVE-2017-5331: Incorrect out of bounds checks in check_offset allow for DoS or code execution (boo#1018756). - CVE-2017-5332: Missing out of bounds checks in extract_group_icon_cursor_resource allow for DoS or code execution (boo#1018756). - CVE-2017-5333: Incorrect out of bounds checks in check_offset allow for DoS or code execution (boo#1018756). Patch Instructions: To install this openSUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product: - openSUSE Leap 42.1: zypper in -t patch openSUSE-2017-104=1 To bring your system up-to-date, use "zypper patch". Package List: - openSUSE Leap 42.1 (i586 x86_64): icoutils-0.31.1-7.1 icoutils-debuginfo-0.31.1-7.1 icoutils-debugsource-0.31.1-7.1 References: https://www.suse.com/security/cve/CVE-2017-5208.html https://www.suse.com/security/cve/CVE-2017-5331.html https://www.suse.com/security/cve/CVE-2017-5332.html https://www.suse.com/security/cve/CVE-2017-5333.html https://bugzilla.suse.com/1018756 -- To unsubscribe, e-mail: opensuse-security-announce+unsubscribe ( -at -) opensuse.org For additional commands, e-mail: opensuse-security-announce+help ( -at -) opensuse.org
  14. openSUSE Security Update: Security update for icoutils ______________________________________________________________________________ Announcement ID: openSUSE-SU-2017:0167-1 Rating: important References: #1018756 Cross-References: CVE-2017-5208 CVE-2017-5331 CVE-2017-5332 CVE-2017-5333 Affected Products: openSUSE Leap 42.2 ______________________________________________________________________________ An update that fixes four vulnerabilities is now available. Description: This update for icoutils to version 0.31.1 fixes the following issues: - CVE-2017-5208: An integer overflow allows maliciously crafted files to cause DoS or code execution (boo#1018756). - CVE-2017-5331: Incorrect out of bounds checks in check_offset allow for DoS or code execution (boo#1018756). - CVE-2017-5332: Missing out of bounds checks in extract_group_icon_cursor_resource allow for DoS or code execution (boo#1018756). - CVE-2017-5333: Incorrect out of bounds checks in check_offset allow for DoS or code execution (boo#1018756). Patch Instructions: To install this openSUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product: - openSUSE Leap 42.2: zypper in -t patch openSUSE-2017-105=1 To bring your system up-to-date, use "zypper patch". Package List: - openSUSE Leap 42.2 (i586 x86_64): icoutils-0.31.1-8.1 icoutils-debuginfo-0.31.1-8.1 icoutils-debugsource-0.31.1-8.1 References: https://www.suse.com/security/cve/CVE-2017-5208.html https://www.suse.com/security/cve/CVE-2017-5331.html https://www.suse.com/security/cve/CVE-2017-5332.html https://www.suse.com/security/cve/CVE-2017-5333.html https://bugzilla.suse.com/1018756 -- To unsubscribe, e-mail: opensuse-security-announce+unsubscribe ( -at -) opensuse.org For additional commands, e-mail: opensuse-security-announce+help ( -at -) opensuse.org
  15. openSUSE Security Update: Security update for icoutils ______________________________________________________________________________ Announcement ID: openSUSE-SU-2017:0168-1 Rating: important References: #1018756 Cross-References: CVE-2017-5208 CVE-2017-5331 CVE-2017-5332 CVE-2017-5333 Affected Products: openSUSE 13.2 ______________________________________________________________________________ An update that fixes four vulnerabilities is now available. Description: This update for icoutils to version 0.31.1 fixes the following issues: - CVE-2017-5208: An integer overflow allows maliciously crafted files to cause DoS or code execution (boo#1018756). - CVE-2017-5331: Incorrect out of bounds checks in check_offset allow for DoS or code execution (boo#1018756). - CVE-2017-5332: Missing out of bounds checks in extract_group_icon_cursor_resource allow for DoS or code execution (boo#1018756). - CVE-2017-5333: Incorrect out of bounds checks in check_offset allow for DoS or code execution (boo#1018756). Patch Instructions: To install this openSUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product: - openSUSE 13.2: zypper in -t patch openSUSE-2017-103=1 To bring your system up-to-date, use "zypper patch". Package List: - openSUSE 13.2 (i586 x86_64): icoutils-0.31.1-4.3.1 icoutils-debuginfo-0.31.1-4.3.1 icoutils-debugsource-0.31.1-4.3.1 References: https://www.suse.com/security/cve/CVE-2017-5208.html https://www.suse.com/security/cve/CVE-2017-5331.html https://www.suse.com/security/cve/CVE-2017-5332.html https://www.suse.com/security/cve/CVE-2017-5333.html https://bugzilla.suse.com/1018756 -- To unsubscribe, e-mail: opensuse-security-announce+unsubscribe ( -at -) opensuse.org For additional commands, e-mail: opensuse-security-announce+help ( -at -) opensuse.org
  16. Hello LanOC Affiliates and newsletter subscribers, here is our newest posting. We would appreciate you spreading the word! LanOC Reviews has released a new article which you and your readers might enjoy. We would be grateful if you would please share it with them. *TITLE:* XFX Hard Swap LED Fans ( -at -) LanOC Reviews <https://lanoc.org/review/video-cards/7428-xfx-hard-swap-led-fans> *DESCRIPTION:* So last week I took a look at XFX’s RX 480 and it, like the XFX RX 470, has what they call Hard Swap fans. The stock fans are just basic 90mm fans like you would find on most aftermarket cards, but without any tools they can be swapped with other fans. Along with the card, XFX also sent all three of their LED fan kits for me to check out. So today isn’t going to be a long day or anything, but I’m going to check out the new fans, see how easy they are to swap out, and take a look at all three LED colors on the XFX RX 480. *ARTICLE URL:* https://lanoc.org/review/video-cards/7428-xfx-hard-swap-led-fans *LARGE IMAGE URL:* https://lanoc.org/images/reviews/2017/xfx_hard_swap_led_fans/title.jpg *SMALL IMAGE URL:* https://lanoc.org/images/reviews/2017/xfx_hard_swap_led_fans/email.jpg Thank you for your help Our content is syndicated by *RSS* 2.0 at: http://lanoc.org/review?fo rmat=feed&type=atom Check out our *YouTube* Channel: http://www.youtube.com/user/LanocReviews Follow us on *Twitter*: http://www.twitter.com/LanOC_Reviews Join our group on *Facebook*: http://www.facebook.com/LanOCReviews Join our *Steam* Group: http://steamcommunity.com/groups/lanoc *If this message has been sent to an incorrect address, or you no longer wish to receive our news, please email us back and let us know at reviews ( -at -) lanoc.org* ---------------------------------------- Wes Compton Editor-in-Chief LanOC Reviews http://lanoc.org ( -at -) LanOC_Reviews <http://twitter.com/#!/LanOC_Reviews> Google Plus <https://plus.google.com/u/1/b/111054267662763089650/> Our Facebook Page <http://www.facebook.com/LanOCReviews>
  17. Corsair hasn’t been that aggressive in the SSD market recently, but all that changed earlier this month when their announced the Force MP500. This drive marks a number of firsts for Corsair as it is their first drive to ever use the M.2 2280 form factor, PCIe interface, and the NVMe protocol. Since this is Corsair’s first PCIe Gen 3 x4 SSD it has blisteringly fast sequential speeds of up to 3,000 MB/s read and 2,400 MB/s write, which makes it roughly 5 times faster than the Corsair Nuetron Series XTi drives that used to be their flagship storage drive series. Read on to find out more! Article Title: Corsair Force MP500 480GB M.2 NVMe SSD Review ( -at -) Legit Reiviews Article URL: http://www.legitreviews.com/corsair-force-mp500-480gb-m-2-nvme-ssd-review_189274 Unsubscribe: http://adserv.legitreviews.com/cgi-bin/dada/mail.cgi/u/legitpr/reviewnews// =
  18. openSUSE Security Update: Security update for gstreamer-plugins-good ______________________________________________________________________________ Announcement ID: openSUSE-SU-2017:0141-1 Rating: important References: #1012102 #1012103 #1012104 #1013653 #1013655 #1013663 Cross-References: CVE-2016-9634 CVE-2016-9635 CVE-2016-9636 CVE-2016-9807 CVE-2016-9808 CVE-2016-9810 Affected Products: openSUSE Leap 42.1 ______________________________________________________________________________ An update that fixes 6 vulnerabilities is now available. Description: This update for gstreamer-plugins-good fixes the following issues: - CVE-2016-9634: Invalid FLIC files could have caused and an out-of-bounds write (bsc#1012102) - CVE-2016-9635: Invalid FLIC files could have caused and an out-of-bounds write (bsc#1012103) - CVE-2016-9636: Prevent maliciously crafted flic files from causing invalid memory writes (bsc#1012104) - CVE-2016-9807: Prevent the reading of invalid memory in flx_decode_chunks, leading to DoS (bsc#1013655) - CVE-2016-9808: Prevent maliciously crafted flic files from causing invalid memory accesses (bsc#1013653) - CVE-2016-9810: Invalid files can be used to extraneous unreferences, leading to invalid memory access and DoS (bsc#1013663) Patch Instructions: To install this openSUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product: - openSUSE Leap 42.1: zypper in -t patch openSUSE-2017-93=1 To bring your system up-to-date, use "zypper patch". Package List: - openSUSE Leap 42.1 (i586 x86_64): gstreamer-plugins-good-1.4.5-5.1 gstreamer-plugins-good-debuginfo-1.4.5-5.1 gstreamer-plugins-good-debugsource-1.4.5-5.1 gstreamer-plugins-good-doc-1.4.5-5.1 gstreamer-plugins-good-extra-1.4.5-5.1 gstreamer-plugins-good-extra-debuginfo-1.4.5-5.1 - openSUSE Leap 42.1 (x86_64): gstreamer-plugins-good-32bit-1.4.5-5.1 gstreamer-plugins-good-debuginfo-32bit-1.4.5-5.1 gstreamer-plugins-good-extra-32bit-1.4.5-5.1 gstreamer-plugins-good-extra-debuginfo-32bit-1.4.5-5.1 - openSUSE Leap 42.1 (noarch): gstreamer-plugins-good-lang-1.4.5-5.1 References: https://www.suse.com/security/cve/CVE-2016-9634.html https://www.suse.com/security/cve/CVE-2016-9635.html https://www.suse.com/security/cve/CVE-2016-9636.html https://www.suse.com/security/cve/CVE-2016-9807.html https://www.suse.com/security/cve/CVE-2016-9808.html https://www.suse.com/security/cve/CVE-2016-9810.html https://bugzilla.suse.com/1012102 https://bugzilla.suse.com/1012103 https://bugzilla.suse.com/1012104 https://bugzilla.suse.com/1013653 https://bugzilla.suse.com/1013655 https://bugzilla.suse.com/1013663 -- To unsubscribe, e-mail: opensuse-security-announce+unsubscribe ( -at -) opensuse.org For additional commands, e-mail: opensuse-security-announce+help ( -at -) opensuse.org
  19. openSUSE Security Update: Security update for icinga ______________________________________________________________________________ Announcement ID: openSUSE-SU-2017:0146-1 Rating: important References: #1014637 #952777 Cross-References: CVE-2015-8010 CVE-2016-9566 Affected Products: openSUSE Leap 42.2 openSUSE Leap 42.1 ______________________________________________________________________________ An update that fixes two vulnerabilities is now available. Description: This update for icinga includes various upstream fixes and the following security security fixes: - icinga was updated to version 1.14.0 - the classic-UI was vulnerable to a cross site scripting attack (CVE-2015-8010, boo#952777) - A user with nagios privileges could have gained root privileges by placing a symbolic link at the logfile location (CVE-2016-9566, boo#1014637) Patch Instructions: To install this openSUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product: - openSUSE Leap 42.2: zypper in -t patch openSUSE-2017-100=1 - openSUSE Leap 42.1: zypper in -t patch openSUSE-2017-100=1 To bring your system up-to-date, use "zypper patch". Package List: - openSUSE Leap 42.2 (x86_64): icinga-1.14.0-4.1 icinga-debuginfo-1.14.0-4.1 icinga-debugsource-1.14.0-4.1 icinga-devel-1.14.0-4.1 icinga-doc-1.14.0-4.1 icinga-idoutils-1.14.0-4.1 icinga-idoutils-debuginfo-1.14.0-4.1 icinga-idoutils-mysql-1.14.0-4.1 icinga-idoutils-oracle-1.14.0-4.1 icinga-idoutils-pgsql-1.14.0-4.1 icinga-plugins-downtimes-1.14.0-4.1 icinga-plugins-eventhandlers-1.14.0-4.1 icinga-www-1.14.0-4.1 icinga-www-config-1.14.0-4.1 icinga-www-debuginfo-1.14.0-4.1 monitoring-tools-1.14.0-4.1 monitoring-tools-debuginfo-1.14.0-4.1 - openSUSE Leap 42.1 (i586 x86_64): icinga-1.14.0-3.1 icinga-debuginfo-1.14.0-3.1 icinga-debugsource-1.14.0-3.1 icinga-devel-1.14.0-3.1 icinga-doc-1.14.0-3.1 icinga-idoutils-1.14.0-3.1 icinga-idoutils-debuginfo-1.14.0-3.1 icinga-idoutils-mysql-1.14.0-3.1 icinga-idoutils-oracle-1.14.0-3.1 icinga-idoutils-pgsql-1.14.0-3.1 icinga-plugins-downtimes-1.14.0-3.1 icinga-plugins-eventhandlers-1.14.0-3.1 icinga-www-1.14.0-3.1 icinga-www-config-1.14.0-3.1 icinga-www-debuginfo-1.14.0-3.1 monitoring-tools-1.14.0-3.1 monitoring-tools-debuginfo-1.14.0-3.1 References: https://www.suse.com/security/cve/CVE-2015-8010.html https://www.suse.com/security/cve/CVE-2016-9566.html https://bugzilla.suse.com/1014637 https://bugzilla.suse.com/952777 -- To unsubscribe, e-mail: opensuse-security-announce+unsubscribe ( -at -) opensuse.org For additional commands, e-mail: opensuse-security-announce+help ( -at -) opensuse.org
  20. openSUSE Security Update: Security update for gstreamer-plugins-good ______________________________________________________________________________ Announcement ID: openSUSE-SU-2017:0151-1 Rating: important References: #1012102 #1012103 #1012104 #1013653 #1013655 #1013663 Cross-References: CVE-2016-9634 CVE-2016-9635 CVE-2016-9636 CVE-2016-9807 CVE-2016-9808 CVE-2016-9810 Affected Products: openSUSE 13.2 ______________________________________________________________________________ An update that fixes 6 vulnerabilities is now available. Description: This update for gstreamer-plugins-good fixes the following issues: - CVE-2016-9634: Invalid FLIC files could have caused and an out-of-bounds write (bsc#1012102) - CVE-2016-9635: Invalid FLIC files could have caused and an out-of-bounds write (bsc#1012103) - CVE-2016-9636: Prevent maliciously crafted flic files from causing invalid memory writes (bsc#1012104) - CVE-2016-9807: Prevent the reading of invalid memory in flx_decode_chunks, leading to DoS (bsc#1013655) - CVE-2016-9808: Prevent maliciously crafted flic files from causing invalid memory accesses (bsc#1013653) - CVE-2016-9810: Invalid files can be used to extraneous unreferences, leading to invalid memory access and DoS (bsc#1013663) Patch Instructions: To install this openSUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product: - openSUSE 13.2: zypper in -t patch openSUSE-2017-83=1 To bring your system up-to-date, use "zypper patch". Package List: - openSUSE 13.2 (i586 x86_64): gstreamer-plugins-good-1.4.3-3.1 gstreamer-plugins-good-debuginfo-1.4.3-3.1 gstreamer-plugins-good-debugsource-1.4.3-3.1 gstreamer-plugins-good-doc-1.4.3-3.1 gstreamer-plugins-good-extra-1.4.3-3.1 gstreamer-plugins-good-extra-debuginfo-1.4.3-3.1 - openSUSE 13.2 (x86_64): gstreamer-plugins-good-32bit-1.4.3-3.1 gstreamer-plugins-good-debuginfo-32bit-1.4.3-3.1 gstreamer-plugins-good-extra-32bit-1.4.3-3.1 gstreamer-plugins-good-extra-debuginfo-32bit-1.4.3-3.1 - openSUSE 13.2 (noarch): gstreamer-plugins-good-lang-1.4.3-3.1 References: https://www.suse.com/security/cve/CVE-2016-9634.html https://www.suse.com/security/cve/CVE-2016-9635.html https://www.suse.com/security/cve/CVE-2016-9636.html https://www.suse.com/security/cve/CVE-2016-9807.html https://www.suse.com/security/cve/CVE-2016-9808.html https://www.suse.com/security/cve/CVE-2016-9810.html https://bugzilla.suse.com/1012102 https://bugzilla.suse.com/1012103 https://bugzilla.suse.com/1012104 https://bugzilla.suse.com/1013653 https://bugzilla.suse.com/1013655 https://bugzilla.suse.com/1013663 -- To unsubscribe, e-mail: opensuse-security-announce+unsubscribe ( -at -) opensuse.org For additional commands, e-mail: opensuse-security-announce+help ( -at -) opensuse.org
  21. openSUSE Security Update: Security update for openjpeg2 ______________________________________________________________________________ Announcement ID: openSUSE-SU-2017:0155-1 Rating: important References: #1002414 #1007739 #1007740 #1007741 #1007742 #1007743 #1007744 #1007747 #1014543 #1014975 #999817 Cross-References: CVE-2016-7445 CVE-2016-8332 CVE-2016-9112 CVE-2016-9113 CVE-2016-9114 CVE-2016-9115 CVE-2016-9116 CVE-2016-9117 CVE-2016-9118 CVE-2016-9572 CVE-2016-9573 CVE-2016-9580 CVE-2016-9581 Affected Products: openSUSE Leap 42.2 ______________________________________________________________________________ An update that fixes 13 vulnerabilities is now available. Description: This update for openjpeg2 fixes the following issues: * CVE-2016-9114: NULL Pointer Access in function imagetopnm of convert.c:1943(jp2) could lead to crash [bsc#1007740] * CVE-2016-9115: Heap Buffer Overflow in function imagetotga of convert.c(jp2) [bsc#1007741] * CVE-2016-9580, CVE-2016-9581: Possible Heap buffer overflow via integer overflow and infite loop [bsc#1014975] * CVE-2016-9117: NULL Pointer Access in function imagetopnm of convert.c(jp2):1289 [bsc#1007743] * CVE-2016-9118: Heap Buffer Overflow in function pnmtoimage of convert.c [bsc#1007744] * CVE-2016-9112: FPE(Floating Point Exception) in lib/openjp2/pi.c:523 [bsc#1007747] * CVE-2016-9116: NULL Pointer Access in function imagetopnm of convert.c:2226(jp2) [bsc#1007742] * CVE-2016-9113: NULL point dereference in function imagetobmp of convertbmp.c could lead to crash [bsc#1007739] * CVE-2016-9572 CVE-2016-9573: Insuficient check in imagetopnm() could lead to heap buffer overflow [bsc#1014543] * CVE-2016-8332: Malicious file in OpenJPEG JPEG2000 format could lead to code execution [bsc#1002414] * CVE-2016-7445: Null pointer dereference in convert.c could lead to crash [bsc#999817] This update was imported from the SUSE:SLE-12-SP2:Update update project. Patch Instructions: To install this openSUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product: - openSUSE Leap 42.2: zypper in -t patch openSUSE-2017-101=1 To bring your system up-to-date, use "zypper patch". Package List: - openSUSE Leap 42.2 (i586 x86_64): libopenjp2-7-2.1.0-11.1 libopenjp2-7-debuginfo-2.1.0-11.1 openjpeg2-2.1.0-11.1 openjpeg2-debuginfo-2.1.0-11.1 openjpeg2-debugsource-2.1.0-11.1 openjpeg2-devel-2.1.0-11.1 - openSUSE Leap 42.2 (x86_64): libopenjp2-7-32bit-2.1.0-11.1 libopenjp2-7-debuginfo-32bit-2.1.0-11.1 References: https://www.suse.com/security/cve/CVE-2016-7445.html https://www.suse.com/security/cve/CVE-2016-8332.html https://www.suse.com/security/cve/CVE-2016-9112.html https://www.suse.com/security/cve/CVE-2016-9113.html https://www.suse.com/security/cve/CVE-2016-9114.html https://www.suse.com/security/cve/CVE-2016-9115.html https://www.suse.com/security/cve/CVE-2016-9116.html https://www.suse.com/security/cve/CVE-2016-9117.html https://www.suse.com/security/cve/CVE-2016-9118.html https://www.suse.com/security/cve/CVE-2016-9572.html https://www.suse.com/security/cve/CVE-2016-9573.html https://www.suse.com/security/cve/CVE-2016-9580.html https://www.suse.com/security/cve/CVE-2016-9581.html https://bugzilla.suse.com/1002414 https://bugzilla.suse.com/1007739 https://bugzilla.suse.com/1007740 https://bugzilla.suse.com/1007741 https://bugzilla.suse.com/1007742 https://bugzilla.suse.com/1007743 https://bugzilla.suse.com/1007744 https://bugzilla.suse.com/1007747 https://bugzilla.suse.com/1014543 https://bugzilla.suse.com/1014975 https://bugzilla.suse.com/999817 -- To unsubscribe, e-mail: opensuse-security-announce+unsubscribe ( -at -) opensuse.org For additional commands, e-mail: opensuse-security-announce+help ( -at -) opensuse.org
  22. openSUSE Security Update: Security update for python-pycrypto ______________________________________________________________________________ Announcement ID: openSUSE-SU-2017:0156-1 Rating: important References: #1017420 Cross-References: CVE-2013-7459 Affected Products: openSUSE Leap 42.2 openSUSE Leap 42.1 openSUSE 13.2 ______________________________________________________________________________ An update that fixes one vulnerability is now available. Description: This update for python-pycrypto fixes the following issues: - A heap buffer overflow in the AES module was fixed that could have lead to remote code execution, if the mode of operation can be specified from the outside (CVE-2013-7459, boo#1017420). Patch Instructions: To install this openSUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product: - openSUSE Leap 42.2: zypper in -t patch openSUSE-2017-86=1 - openSUSE Leap 42.1: zypper in -t patch openSUSE-2017-86=1 - openSUSE 13.2: zypper in -t patch openSUSE-2017-86=1 To bring your system up-to-date, use "zypper patch". Package List: - openSUSE Leap 42.2 (i586 x86_64): python-pycrypto-2.6.1-7.1 python-pycrypto-debuginfo-2.6.1-7.1 - openSUSE Leap 42.1 (i586 x86_64): python-pycrypto-2.6.1-6.1 python-pycrypto-debuginfo-2.6.1-6.1 - openSUSE 13.2 (i586 x86_64): python-pycrypto-2.6.1-3.3.1 python-pycrypto-debuginfo-2.6.1-3.3.1 References: https://www.suse.com/security/cve/CVE-2013-7459.html https://bugzilla.suse.com/1017420 -- To unsubscribe, e-mail: opensuse-security-announce+unsubscribe ( -at -) opensuse.org For additional commands, e-mail: opensuse-security-announce+help ( -at -) opensuse.org
  23. openSUSE Security Update: Security update for gstreamer-0_10-plugins-good ______________________________________________________________________________ Announcement ID: openSUSE-SU-2017:0160-1 Rating: important References: #1012102 #1012103 #1012104 #1013653 #1013655 #1013663 Cross-References: CVE-2016-9634 CVE-2016-9635 CVE-2016-9636 CVE-2016-9807 CVE-2016-9808 CVE-2016-9810 Affected Products: openSUSE 13.2 ______________________________________________________________________________ An update that fixes 6 vulnerabilities is now available. Description: This update for gstreamer-0_10-plugins-good fixes the following issues: - CVE-2016-9634: Invalid FLIC files could have caused and an out-of-bounds write (bsc#1012102) - CVE-2016-9635: Invalid FLIC files could have caused and an out-of-bounds write (bsc#1012103) - CVE-2016-9636: Prevent maliciously crafted flic files from causing invalid memory writes (bsc#1012104) - CVE-2016-9807: Prevent the reading of invalid memory in flx_decode_chunks, leading to DoS (bsc#1013655) - CVE-2016-9808: Prevent maliciously crafted flic files from causing invalid memory accesses (bsc#1013653) - CVE-2016-9810: Invalid files can be used to extraneous unreferences, leading to invalid memory access and DoS (bsc#1013663) Patch Instructions: To install this openSUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product: - openSUSE 13.2: zypper in -t patch openSUSE-2017-88=1 To bring your system up-to-date, use "zypper patch". Package List: - openSUSE 13.2 (i586 x86_64): gstreamer-0_10-plugin-esd-0.10.31-13.3.1 gstreamer-0_10-plugin-esd-debuginfo-0.10.31-13.3.1 gstreamer-0_10-plugins-good-0.10.31-13.3.1 gstreamer-0_10-plugins-good-debuginfo-0.10.31-13.3.1 gstreamer-0_10-plugins-good-debugsource-0.10.31-13.3.1 gstreamer-0_10-plugins-good-doc-0.10.31-13.3.1 gstreamer-0_10-plugins-good-extra-0.10.31-13.3.1 gstreamer-0_10-plugins-good-extra-debuginfo-0.10.31-13.3.1 - openSUSE 13.2 (noarch): gstreamer-0_10-plugins-good-lang-0.10.31-13.3.1 - openSUSE 13.2 (x86_64): gstreamer-0_10-plugin-esd-32bit-0.10.31-13.3.1 gstreamer-0_10-plugin-esd-debuginfo-32bit-0.10.31-13.3.1 gstreamer-0_10-plugins-good-32bit-0.10.31-13.3.1 gstreamer-0_10-plugins-good-debuginfo-32bit-0.10.31-13.3.1 gstreamer-0_10-plugins-good-extra-32bit-0.10.31-13.3.1 gstreamer-0_10-plugins-good-extra-debuginfo-32bit-0.10.31-13.3.1 References: https://www.suse.com/security/cve/CVE-2016-9634.html https://www.suse.com/security/cve/CVE-2016-9635.html https://www.suse.com/security/cve/CVE-2016-9636.html https://www.suse.com/security/cve/CVE-2016-9807.html https://www.suse.com/security/cve/CVE-2016-9808.html https://www.suse.com/security/cve/CVE-2016-9810.html https://bugzilla.suse.com/1012102 https://bugzilla.suse.com/1012103 https://bugzilla.suse.com/1012104 https://bugzilla.suse.com/1013653 https://bugzilla.suse.com/1013655 https://bugzilla.suse.com/1013663 -- To unsubscribe, e-mail: opensuse-security-announce+unsubscribe ( -at -) opensuse.org For additional commands, e-mail: opensuse-security-announce+help ( -at -) opensuse.org
  24. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ===================================================================== Red Hat Security Advisory Synopsis: Important: bind97 security update Advisory ID: RHSA-2017:0064-01 Product: Red Hat Enterprise Linux Advisory URL: https://rhn.redhat.com/errata/RHSA-2017-0064.html Issue date: 2017-01-16 CVE Names: CVE-2016-9147 ===================================================================== 1. Summary: An update for bind97 is now available for Red Hat Enterprise Linux 5. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. 2. Relevant releases/architectures: Red Hat Enterprise Linux (v. 5 server) - i386, ia64, ppc, s390x, x86_64 Red Hat Enterprise Linux Desktop Workstation (v. 5 client) - i386, x86_64 3. Description: The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. Security Fix(es): * A denial of service flaw was found in the way BIND handled a query response containing inconsistent DNSSEC information. A remote attacker could use this flaw to make named exit unexpectedly with an assertion failure via a specially crafted DNS response. (CVE-2016-9147) Red Hat would like to thank ISC for reporting this issue. 4. Solution: For details on how to apply this update, which includes the changes described in this advisory, refer to: https://access.redhat.com/articles/11258 After installing the update, the BIND daemon (named) will be restarted automatically. 5. Bugs fixed (https://bugzilla.redhat.com/): 1411367 - CVE-2016-9147 bind: assertion failure while handling a query response containing inconsistent DNSSEC information 6. Package List: Red Hat Enterprise Linux Desktop Workstation (v. 5 client): Source: bind97-9.7.0-21.P2.el5_11.10.src.rpm i386: bind97-9.7.0-21.P2.el5_11.10.i386.rpm bind97-chroot-9.7.0-21.P2.el5_11.10.i386.rpm bind97-debuginfo-9.7.0-21.P2.el5_11.10.i386.rpm bind97-devel-9.7.0-21.P2.el5_11.10.i386.rpm bind97-libs-9.7.0-21.P2.el5_11.10.i386.rpm bind97-utils-9.7.0-21.P2.el5_11.10.i386.rpm x86_64: bind97-9.7.0-21.P2.el5_11.10.x86_64.rpm bind97-chroot-9.7.0-21.P2.el5_11.10.x86_64.rpm bind97-debuginfo-9.7.0-21.P2.el5_11.10.i386.rpm bind97-debuginfo-9.7.0-21.P2.el5_11.10.x86_64.rpm bind97-devel-9.7.0-21.P2.el5_11.10.i386.rpm bind97-devel-9.7.0-21.P2.el5_11.10.x86_64.rpm bind97-libs-9.7.0-21.P2.el5_11.10.i386.rpm bind97-libs-9.7.0-21.P2.el5_11.10.x86_64.rpm bind97-utils-9.7.0-21.P2.el5_11.10.x86_64.rpm Red Hat Enterprise Linux (v. 5 server): Source: bind97-9.7.0-21.P2.el5_11.10.src.rpm i386: bind97-9.7.0-21.P2.el5_11.10.i386.rpm bind97-chroot-9.7.0-21.P2.el5_11.10.i386.rpm bind97-debuginfo-9.7.0-21.P2.el5_11.10.i386.rpm bind97-devel-9.7.0-21.P2.el5_11.10.i386.rpm bind97-libs-9.7.0-21.P2.el5_11.10.i386.rpm bind97-utils-9.7.0-21.P2.el5_11.10.i386.rpm ia64: bind97-9.7.0-21.P2.el5_11.10.ia64.rpm bind97-chroot-9.7.0-21.P2.el5_11.10.ia64.rpm bind97-debuginfo-9.7.0-21.P2.el5_11.10.ia64.rpm bind97-devel-9.7.0-21.P2.el5_11.10.ia64.rpm bind97-libs-9.7.0-21.P2.el5_11.10.ia64.rpm bind97-utils-9.7.0-21.P2.el5_11.10.ia64.rpm ppc: bind97-9.7.0-21.P2.el5_11.10.ppc.rpm bind97-chroot-9.7.0-21.P2.el5_11.10.ppc.rpm bind97-debuginfo-9.7.0-21.P2.el5_11.10.ppc.rpm bind97-debuginfo-9.7.0-21.P2.el5_11.10.ppc64.rpm bind97-devel-9.7.0-21.P2.el5_11.10.ppc.rpm bind97-devel-9.7.0-21.P2.el5_11.10.ppc64.rpm bind97-libs-9.7.0-21.P2.el5_11.10.ppc.rpm bind97-libs-9.7.0-21.P2.el5_11.10.ppc64.rpm bind97-utils-9.7.0-21.P2.el5_11.10.ppc.rpm s390x: bind97-9.7.0-21.P2.el5_11.10.s390x.rpm bind97-chroot-9.7.0-21.P2.el5_11.10.s390x.rpm bind97-debuginfo-9.7.0-21.P2.el5_11.10.s390.rpm bind97-debuginfo-9.7.0-21.P2.el5_11.10.s390x.rpm bind97-devel-9.7.0-21.P2.el5_11.10.s390.rpm bind97-devel-9.7.0-21.P2.el5_11.10.s390x.rpm bind97-libs-9.7.0-21.P2.el5_11.10.s390.rpm bind97-libs-9.7.0-21.P2.el5_11.10.s390x.rpm bind97-utils-9.7.0-21.P2.el5_11.10.s390x.rpm x86_64: bind97-9.7.0-21.P2.el5_11.10.x86_64.rpm bind97-chroot-9.7.0-21.P2.el5_11.10.x86_64.rpm bind97-debuginfo-9.7.0-21.P2.el5_11.10.i386.rpm bind97-debuginfo-9.7.0-21.P2.el5_11.10.x86_64.rpm bind97-devel-9.7.0-21.P2.el5_11.10.i386.rpm bind97-devel-9.7.0-21.P2.el5_11.10.x86_64.rpm bind97-libs-9.7.0-21.P2.el5_11.10.i386.rpm bind97-libs-9.7.0-21.P2.el5_11.10.x86_64.rpm bind97-utils-9.7.0-21.P2.el5_11.10.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/ 7. References: https://access.redhat.com/security/cve/CVE-2016-9147 https://access.redhat.com/security/updates/classification/#important https://kb.isc.org/article/AA-01440 8. Contact: The Red Hat security contact is . More contact details at https://access.redhat.com/security/team/contact/ Copyright 2017 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iD8DBQFYfG0SXlSAg2UNWIIRAqMKAKC1P/1mupHVpR4P115n2DanOpYOWgCdFHt+ 4n6D05VwtJuRLh+LNl5fMhQ= =+GMD -----END PGP SIGNATURE----- --
  25. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ===================================================================== Red Hat Security Advisory Synopsis: Important: bind security update Advisory ID: RHSA-2017:0063-01 Product: Red Hat Enterprise Linux Advisory URL: https://rhn.redhat.com/errata/RHSA-2017-0063.html Issue date: 2017-01-16 CVE Names: CVE-2016-9147 ===================================================================== 1. Summary: An update for bind is now available for Red Hat Enterprise Linux 5 and Red Hat Enterprise Linux 6. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. 2. Relevant releases/architectures: Red Hat Enterprise Linux (v. 5 server) - i386, ia64, ppc, s390x, x86_64 Red Hat Enterprise Linux Desktop (v. 5 client) - i386, x86_64 Red Hat Enterprise Linux Desktop (v. 6) - i386, x86_64 Red Hat Enterprise Linux Desktop Optional (v. 6) - i386, x86_64 Red Hat Enterprise Linux Desktop Workstation (v. 5 client) - i386, x86_64 Red Hat Enterprise Linux HPC Node (v. 6) - x86_64 Red Hat Enterprise Linux HPC Node Optional (v. 6) - x86_64 Red Hat Enterprise Linux Server (v. 6) - i386, ppc64, s390x, x86_64 Red Hat Enterprise Linux Server Optional (v. 6) - i386, ppc64, s390x, x86_64 Red Hat Enterprise Linux Workstation (v. 6) - i386, x86_64 Red Hat Enterprise Linux Workstation Optional (v. 6) - i386, x86_64 3. Description: The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. Security Fix(es): * A denial of service flaw was found in the way BIND handled a query response containing inconsistent DNSSEC information. A remote attacker could use this flaw to make named exit unexpectedly with an assertion failure via a specially crafted DNS response. (CVE-2016-9147) Red Hat would like to thank ISC for reporting this issue. 4. Solution: For details on how to apply this update, which includes the changes described in this advisory, refer to: https://access.redhat.com/articles/11258 After installing the update, the BIND daemon (named) will be restarted automatically. 5. Bugs fixed (https://bugzilla.redhat.com/): 1411367 - CVE-2016-9147 bind: assertion failure while handling a query response containing inconsistent DNSSEC information 6. Package List: Red Hat Enterprise Linux Desktop (v. 5 client): Source: bind-9.3.6-25.P1.el5_11.12.src.rpm i386: bind-9.3.6-25.P1.el5_11.12.i386.rpm bind-debuginfo-9.3.6-25.P1.el5_11.12.i386.rpm bind-libs-9.3.6-25.P1.el5_11.12.i386.rpm bind-sdb-9.3.6-25.P1.el5_11.12.i386.rpm bind-utils-9.3.6-25.P1.el5_11.12.i386.rpm x86_64: bind-9.3.6-25.P1.el5_11.12.x86_64.rpm bind-debuginfo-9.3.6-25.P1.el5_11.12.i386.rpm bind-debuginfo-9.3.6-25.P1.el5_11.12.x86_64.rpm bind-libs-9.3.6-25.P1.el5_11.12.i386.rpm bind-libs-9.3.6-25.P1.el5_11.12.x86_64.rpm bind-sdb-9.3.6-25.P1.el5_11.12.x86_64.rpm bind-utils-9.3.6-25.P1.el5_11.12.x86_64.rpm Red Hat Enterprise Linux Desktop Workstation (v. 5 client): Source: bind-9.3.6-25.P1.el5_11.12.src.rpm i386: bind-chroot-9.3.6-25.P1.el5_11.12.i386.rpm bind-debuginfo-9.3.6-25.P1.el5_11.12.i386.rpm bind-devel-9.3.6-25.P1.el5_11.12.i386.rpm bind-libbind-devel-9.3.6-25.P1.el5_11.12.i386.rpm caching-nameserver-9.3.6-25.P1.el5_11.12.i386.rpm x86_64: bind-chroot-9.3.6-25.P1.el5_11.12.x86_64.rpm bind-debuginfo-9.3.6-25.P1.el5_11.12.i386.rpm bind-debuginfo-9.3.6-25.P1.el5_11.12.x86_64.rpm bind-devel-9.3.6-25.P1.el5_11.12.i386.rpm bind-devel-9.3.6-25.P1.el5_11.12.x86_64.rpm bind-libbind-devel-9.3.6-25.P1.el5_11.12.i386.rpm bind-libbind-devel-9.3.6-25.P1.el5_11.12.x86_64.rpm caching-nameserver-9.3.6-25.P1.el5_11.12.x86_64.rpm Red Hat Enterprise Linux (v. 5 server): Source: bind-9.3.6-25.P1.el5_11.12.src.rpm i386: bind-9.3.6-25.P1.el5_11.12.i386.rpm bind-chroot-9.3.6-25.P1.el5_11.12.i386.rpm bind-debuginfo-9.3.6-25.P1.el5_11.12.i386.rpm bind-devel-9.3.6-25.P1.el5_11.12.i386.rpm bind-libbind-devel-9.3.6-25.P1.el5_11.12.i386.rpm bind-libs-9.3.6-25.P1.el5_11.12.i386.rpm bind-sdb-9.3.6-25.P1.el5_11.12.i386.rpm bind-utils-9.3.6-25.P1.el5_11.12.i386.rpm caching-nameserver-9.3.6-25.P1.el5_11.12.i386.rpm ia64: bind-9.3.6-25.P1.el5_11.12.ia64.rpm bind-chroot-9.3.6-25.P1.el5_11.12.ia64.rpm bind-debuginfo-9.3.6-25.P1.el5_11.12.i386.rpm bind-debuginfo-9.3.6-25.P1.el5_11.12.ia64.rpm bind-devel-9.3.6-25.P1.el5_11.12.ia64.rpm bind-libbind-devel-9.3.6-25.P1.el5_11.12.ia64.rpm bind-libs-9.3.6-25.P1.el5_11.12.i386.rpm bind-libs-9.3.6-25.P1.el5_11.12.ia64.rpm bind-sdb-9.3.6-25.P1.el5_11.12.ia64.rpm bind-utils-9.3.6-25.P1.el5_11.12.ia64.rpm caching-nameserver-9.3.6-25.P1.el5_11.12.ia64.rpm ppc: bind-9.3.6-25.P1.el5_11.12.ppc.rpm bind-chroot-9.3.6-25.P1.el5_11.12.ppc.rpm bind-debuginfo-9.3.6-25.P1.el5_11.12.ppc.rpm bind-debuginfo-9.3.6-25.P1.el5_11.12.ppc64.rpm bind-devel-9.3.6-25.P1.el5_11.12.ppc.rpm bind-devel-9.3.6-25.P1.el5_11.12.ppc64.rpm bind-libbind-devel-9.3.6-25.P1.el5_11.12.ppc.rpm bind-libbind-devel-9.3.6-25.P1.el5_11.12.ppc64.rpm bind-libs-9.3.6-25.P1.el5_11.12.ppc.rpm bind-libs-9.3.6-25.P1.el5_11.12.ppc64.rpm bind-sdb-9.3.6-25.P1.el5_11.12.ppc.rpm bind-utils-9.3.6-25.P1.el5_11.12.ppc.rpm caching-nameserver-9.3.6-25.P1.el5_11.12.ppc.rpm s390x: bind-9.3.6-25.P1.el5_11.12.s390x.rpm bind-chroot-9.3.6-25.P1.el5_11.12.s390x.rpm bind-debuginfo-9.3.6-25.P1.el5_11.12.s390.rpm bind-debuginfo-9.3.6-25.P1.el5_11.12.s390x.rpm bind-devel-9.3.6-25.P1.el5_11.12.s390.rpm bind-devel-9.3.6-25.P1.el5_11.12.s390x.rpm bind-libbind-devel-9.3.6-25.P1.el5_11.12.s390.rpm bind-libbind-devel-9.3.6-25.P1.el5_11.12.s390x.rpm bind-libs-9.3.6-25.P1.el5_11.12.s390.rpm bind-libs-9.3.6-25.P1.el5_11.12.s390x.rpm bind-sdb-9.3.6-25.P1.el5_11.12.s390x.rpm bind-utils-9.3.6-25.P1.el5_11.12.s390x.rpm caching-nameserver-9.3.6-25.P1.el5_11.12.s390x.rpm x86_64: bind-9.3.6-25.P1.el5_11.12.x86_64.rpm bind-chroot-9.3.6-25.P1.el5_11.12.x86_64.rpm bind-debuginfo-9.3.6-25.P1.el5_11.12.i386.rpm bind-debuginfo-9.3.6-25.P1.el5_11.12.x86_64.rpm bind-devel-9.3.6-25.P1.el5_11.12.i386.rpm bind-devel-9.3.6-25.P1.el5_11.12.x86_64.rpm bind-libbind-devel-9.3.6-25.P1.el5_11.12.i386.rpm bind-libbind-devel-9.3.6-25.P1.el5_11.12.x86_64.rpm bind-libs-9.3.6-25.P1.el5_11.12.i386.rpm bind-libs-9.3.6-25.P1.el5_11.12.x86_64.rpm bind-sdb-9.3.6-25.P1.el5_11.12.x86_64.rpm bind-utils-9.3.6-25.P1.el5_11.12.x86_64.rpm caching-nameserver-9.3.6-25.P1.el5_11.12.x86_64.rpm Red Hat Enterprise Linux Desktop (v. 6): Source: bind-9.8.2-0.47.rc1.el6_8.4.src.rpm i386: bind-debuginfo-9.8.2-0.47.rc1.el6_8.4.i686.rpm bind-libs-9.8.2-0.47.rc1.el6_8.4.i686.rpm bind-utils-9.8.2-0.47.rc1.el6_8.4.i686.rpm x86_64: bind-debuginfo-9.8.2-0.47.rc1.el6_8.4.i686.rpm bind-debuginfo-9.8.2-0.47.rc1.el6_8.4.x86_64.rpm bind-libs-9.8.2-0.47.rc1.el6_8.4.i686.rpm bind-libs-9.8.2-0.47.rc1.el6_8.4.x86_64.rpm bind-utils-9.8.2-0.47.rc1.el6_8.4.x86_64.rpm Red Hat Enterprise Linux Desktop Optional (v. 6): i386: bind-9.8.2-0.47.rc1.el6_8.4.i686.rpm bind-chroot-9.8.2-0.47.rc1.el6_8.4.i686.rpm bind-debuginfo-9.8.2-0.47.rc1.el6_8.4.i686.rpm bind-devel-9.8.2-0.47.rc1.el6_8.4.i686.rpm bind-sdb-9.8.2-0.47.rc1.el6_8.4.i686.rpm x86_64: bind-9.8.2-0.47.rc1.el6_8.4.x86_64.rpm bind-chroot-9.8.2-0.47.rc1.el6_8.4.x86_64.rpm bind-debuginfo-9.8.2-0.47.rc1.el6_8.4.i686.rpm bind-debuginfo-9.8.2-0.47.rc1.el6_8.4.x86_64.rpm bind-devel-9.8.2-0.47.rc1.el6_8.4.i686.rpm bind-devel-9.8.2-0.47.rc1.el6_8.4.x86_64.rpm bind-sdb-9.8.2-0.47.rc1.el6_8.4.x86_64.rpm Red Hat Enterprise Linux HPC Node (v. 6): Source: bind-9.8.2-0.47.rc1.el6_8.4.src.rpm x86_64: bind-debuginfo-9.8.2-0.47.rc1.el6_8.4.i686.rpm bind-debuginfo-9.8.2-0.47.rc1.el6_8.4.x86_64.rpm bind-libs-9.8.2-0.47.rc1.el6_8.4.i686.rpm bind-libs-9.8.2-0.47.rc1.el6_8.4.x86_64.rpm bind-utils-9.8.2-0.47.rc1.el6_8.4.x86_64.rpm Red Hat Enterprise Linux HPC Node Optional (v. 6): x86_64: bind-9.8.2-0.47.rc1.el6_8.4.x86_64.rpm bind-chroot-9.8.2-0.47.rc1.el6_8.4.x86_64.rpm bind-debuginfo-9.8.2-0.47.rc1.el6_8.4.i686.rpm bind-debuginfo-9.8.2-0.47.rc1.el6_8.4.x86_64.rpm bind-devel-9.8.2-0.47.rc1.el6_8.4.i686.rpm bind-devel-9.8.2-0.47.rc1.el6_8.4.x86_64.rpm bind-sdb-9.8.2-0.47.rc1.el6_8.4.x86_64.rpm Red Hat Enterprise Linux Server (v. 6): Source: bind-9.8.2-0.47.rc1.el6_8.4.src.rpm i386: bind-9.8.2-0.47.rc1.el6_8.4.i686.rpm bind-chroot-9.8.2-0.47.rc1.el6_8.4.i686.rpm bind-debuginfo-9.8.2-0.47.rc1.el6_8.4.i686.rpm bind-libs-9.8.2-0.47.rc1.el6_8.4.i686.rpm bind-utils-9.8.2-0.47.rc1.el6_8.4.i686.rpm ppc64: bind-9.8.2-0.47.rc1.el6_8.4.ppc64.rpm bind-chroot-9.8.2-0.47.rc1.el6_8.4.ppc64.rpm bind-debuginfo-9.8.2-0.47.rc1.el6_8.4.ppc.rpm bind-debuginfo-9.8.2-0.47.rc1.el6_8.4.ppc64.rpm bind-libs-9.8.2-0.47.rc1.el6_8.4.ppc.rpm bind-libs-9.8.2-0.47.rc1.el6_8.4.ppc64.rpm bind-utils-9.8.2-0.47.rc1.el6_8.4.ppc64.rpm s390x: bind-9.8.2-0.47.rc1.el6_8.4.s390x.rpm bind-chroot-9.8.2-0.47.rc1.el6_8.4.s390x.rpm bind-debuginfo-9.8.2-0.47.rc1.el6_8.4.s390.rpm bind-debuginfo-9.8.2-0.47.rc1.el6_8.4.s390x.rpm bind-libs-9.8.2-0.47.rc1.el6_8.4.s390.rpm bind-libs-9.8.2-0.47.rc1.el6_8.4.s390x.rpm bind-utils-9.8.2-0.47.rc1.el6_8.4.s390x.rpm x86_64: bind-9.8.2-0.47.rc1.el6_8.4.x86_64.rpm bind-chroot-9.8.2-0.47.rc1.el6_8.4.x86_64.rpm bind-debuginfo-9.8.2-0.47.rc1.el6_8.4.i686.rpm bind-debuginfo-9.8.2-0.47.rc1.el6_8.4.x86_64.rpm bind-libs-9.8.2-0.47.rc1.el6_8.4.i686.rpm bind-libs-9.8.2-0.47.rc1.el6_8.4.x86_64.rpm bind-utils-9.8.2-0.47.rc1.el6_8.4.x86_64.rpm Red Hat Enterprise Linux Server Optional (v. 6): i386: bind-debuginfo-9.8.2-0.47.rc1.el6_8.4.i686.rpm bind-devel-9.8.2-0.47.rc1.el6_8.4.i686.rpm bind-sdb-9.8.2-0.47.rc1.el6_8.4.i686.rpm ppc64: bind-debuginfo-9.8.2-0.47.rc1.el6_8.4.ppc.rpm bind-debuginfo-9.8.2-0.47.rc1.el6_8.4.ppc64.rpm bind-devel-9.8.2-0.47.rc1.el6_8.4.ppc.rpm bind-devel-9.8.2-0.47.rc1.el6_8.4.ppc64.rpm bind-sdb-9.8.2-0.47.rc1.el6_8.4.ppc64.rpm s390x: bind-debuginfo-9.8.2-0.47.rc1.el6_8.4.s390.rpm bind-debuginfo-9.8.2-0.47.rc1.el6_8.4.s390x.rpm bind-devel-9.8.2-0.47.rc1.el6_8.4.s390.rpm bind-devel-9.8.2-0.47.rc1.el6_8.4.s390x.rpm bind-sdb-9.8.2-0.47.rc1.el6_8.4.s390x.rpm x86_64: bind-debuginfo-9.8.2-0.47.rc1.el6_8.4.i686.rpm bind-debuginfo-9.8.2-0.47.rc1.el6_8.4.x86_64.rpm bind-devel-9.8.2-0.47.rc1.el6_8.4.i686.rpm bind-devel-9.8.2-0.47.rc1.el6_8.4.x86_64.rpm bind-sdb-9.8.2-0.47.rc1.el6_8.4.x86_64.rpm Red Hat Enterprise Linux Workstation (v. 6): Source: bind-9.8.2-0.47.rc1.el6_8.4.src.rpm i386: bind-9.8.2-0.47.rc1.el6_8.4.i686.rpm bind-chroot-9.8.2-0.47.rc1.el6_8.4.i686.rpm bind-debuginfo-9.8.2-0.47.rc1.el6_8.4.i686.rpm bind-libs-9.8.2-0.47.rc1.el6_8.4.i686.rpm bind-utils-9.8.2-0.47.rc1.el6_8.4.i686.rpm x86_64: bind-9.8.2-0.47.rc1.el6_8.4.x86_64.rpm bind-chroot-9.8.2-0.47.rc1.el6_8.4.x86_64.rpm bind-debuginfo-9.8.2-0.47.rc1.el6_8.4.i686.rpm bind-debuginfo-9.8.2-0.47.rc1.el6_8.4.x86_64.rpm bind-libs-9.8.2-0.47.rc1.el6_8.4.i686.rpm bind-libs-9.8.2-0.47.rc1.el6_8.4.x86_64.rpm bind-utils-9.8.2-0.47.rc1.el6_8.4.x86_64.rpm Red Hat Enterprise Linux Workstation Optional (v. 6): i386: bind-debuginfo-9.8.2-0.47.rc1.el6_8.4.i686.rpm bind-devel-9.8.2-0.47.rc1.el6_8.4.i686.rpm bind-sdb-9.8.2-0.47.rc1.el6_8.4.i686.rpm x86_64: bind-debuginfo-9.8.2-0.47.rc1.el6_8.4.i686.rpm bind-debuginfo-9.8.2-0.47.rc1.el6_8.4.x86_64.rpm bind-devel-9.8.2-0.47.rc1.el6_8.4.i686.rpm bind-devel-9.8.2-0.47.rc1.el6_8.4.x86_64.rpm bind-sdb-9.8.2-0.47.rc1.el6_8.4.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/ 7. References: https://access.redhat.com/security/cve/CVE-2016-9147 https://access.redhat.com/security/updates/classification/#important https://kb.isc.org/article/AA-01440 8. Contact: The Red Hat security contact is . More contact details at https://access.redhat.com/security/team/contact/ Copyright 2017 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iD8DBQFYfGzoXlSAg2UNWIIRApCZAKC49veEJxDDyT6s9rEqW/MeItCNTgCfagSn V3oDcJx/6mxYPbhtkfrQj0M= =jzRy -----END PGP SIGNATURE----- --
×