news
Members-
Content count
80899 -
Joined
-
Last visited
Never -
Days Won
18
Everything posted by news
-
gscan2pdf - A GUI to produce a multipage PDF or DjVu from a scan. http://gscan2pdf.sourceforge.net/ Five clicks are required to scan several pages and then save all or a selection as a PDF or DjVu file, including metadata if required. gscan2pdf can control regular or sheet-fed (ADF) scanners with SANE via libsane-perl, scanimage or scanadf, and can scan multiple pages at once. It presents a thumbnail view of scanned pages, and permits simple operations such as cropping, rotating and deleting pages. OCR can be used to recognise text in the scans, and the output embedded in the PDF or DjVu. PDF conversion is done by PDF::API2. The resulting document may be saved as a PDF, DjVu, multipage TIFF file, or single page image file. Changelog for 1.5.4: * Fixed cycle SANE handle error when using frontend other than libsane-perl. * Fixed bug preventing # pages = all by default, even with ADF. Closes Debian bug #840534 (#Pages scan option always defaults to '1') _______________________________________________
-
GParted is the GNOME Partition Editor for creating, reorganizing, and deleting disk partitions. The GParted 0.27.0 release improves handling of devices with multiple device paths and includes bug fixes and language translation updates. Key changes include: - Recognize GRUB2 core.img - Fix Mount Point column is wider than the screen on openSUSE - Make GParted exit when closed before the initial load completes Visit http://gparted.org for more details. _______________________________________________
-
gscan2pdf - A GUI to produce a multipage PDF or DjVu from a scan. http://gscan2pdf.sourceforge.net/ Five clicks are required to scan several pages and then save all or a selection as a PDF or DjVu file, including metadata if required. gscan2pdf can control regular or sheet-fed (ADF) scanners with SANE via libsane-perl, scanimage or scanadf, and can scan multiple pages at once. It presents a thumbnail view of scanned pages, and permits simple operations such as cropping, rotating and deleting pages. OCR can be used to recognise text in the scans, and the output embedded in the PDF or DjVu. PDF conversion is done by PDF::API2. The resulting document may be saved as a PDF, DjVu, multipage TIFF file, or single page image file. Changelog for 1.5.5: * Work around bug in imagemagick causing the image depth not to be respected. Closes bug #231 (Saving PDF corrupts 1-bpp images imported from a PDF) Thanks to Petr PÃÂsař for the patch. * Fix deleting pages by selecting thumbnails and hitting delete key. * Fixed drag-and-drop operations broken in v1.5.2. Closes bug #232 (Unable to reorder pages in the thumbview) _______________________________________________
-
Hardware Canucks is pleased to present our review of the new ADATA Ultimate SU800 240GB SSD. *Article URL:* http://www.hardwarecanucks.com/forum/hardware-canucks-reviews/73708-adata-ultimate-su800-240gb-ssd-review.html *Quote:* *ADATA's Ultimate SU800 strives to be the best value-oriented SSD around but with so many competitors from OCZ, Crucial and Samsung, can it actually succeed? * We would appreciate it if you would post this in your News section. Regards, -- Hardware Canucks News Team
-
Welcome to the Ubuntu Weekly Newsletter, Issue 485 for the weeks October 17 - 30, 2016. == Links to UWN == * Wiki page: https://wiki.ubuntu.com/UbuntuWeeklyNewsletter/Issue485 == In This Issue == * The mouse that jumped * Ubuntu Stats * Cesar Sevilla: 1er Festival Universitario de Tecnologias Libres * LoCo Events * Stephane Graber: LXD is now available in the Ubuntu Snap Store * Paul White: More on bug reports, September 1973 and a jumping mouse * Dustin Kirkland: Hotfix Your Ubuntu Kernels with the Canonical Livepatch Service! * Canonical Design Team: Download Ubuntu Yakkety Yak 16.10 wallpaper * Chris Glass: Making LXD Fly on Ubuntu * Stephane Graber: Network Management with LXD (2.3+) * Dustin Kirkland: Dirty COW was Livepatched in Ubuntu within Hours of Publication * Ubuntu Cloud News * Marcos Costales: A new uWriter for Ubuntu Phone * Canonical News * In The Press * In The Blogosphere * Featured Audio and Video * Weekly Ubuntu Development Team Meetings * Upcoming Meetings and Events * Updates and Security for 12.04, 14.04, 16.04 and 16.10 * And much more! == General Community News == === The mouse that jumped === Mark Shuttleworth writes that the Ubuntu community is diverse both in its background and the devices that it uses. He says that we are a tiny part of the giant world market needing to be fast and agile, and concludes with the announcement that Ubuntu 17.04 will be code named Zesty Zapus. http://www.markshuttleworth.com/archives/1512 Other outlets covered the news of the 17.04 release codename, including: * The Ubuntu 17.04 Codename Has Been Announced - http://www.omgubuntu.co.uk/2016/10/official-ubuntu-17-04-codename * Ubuntu 17.04 'Zesty Zapus' - http://www.linuxtoday.com/infrastructure/ubuntu-17.04-zesty-zapus.html * Ubuntu 17.04 ZZ Codename Announced - http://www.phoronix.com/scan.php?page=news_item&px=Ubuntu-17.04-ZZ == Ubuntu Stats == === Bug Stats === * Open (126930) +427 over the last 2 weeks * Critical (376) -15 over the last 2 weeks * Unconfirmed (62714) +243 over the last 2 weeks As always, the Bug Squad needs more help. If you want to get started, please see https://wiki.ubuntu.com/BugSquad === Ask Ubuntu Top 5 Questions this week === ==== Most Active Questions ==== * How is being able to break into any Linux machine through grub2 secure? http://askubuntu.com/questions/842070/how-is-being-able-to-break-into-any-linux-machine-through-grub2-secure * Accidentally modified .bashrc and now I cant login despite entering password correctly http://askubuntu.com/questions/842085/accidentally-modified-bashrc-and-now-i-cant-login-despite-entering-password-cor * deleting folders with spaces in their names using xargs [on hold] http://askubuntu.com/questions/842160/deleting-folders-with-spaces-in-their-names-using-xargs * How do I install the latest OpenOffice? http://askubuntu.com/questions/841148/how-do-i-install-the-latest-openoffice * Can't update nginx because of debconf http://askubuntu.com/questions/842217/cant-update-nginx-because-of-debconf ==== Top Voted New Questions ==== * How is being able to break into any Linux machine through grub2 secure? http://askubuntu.com/questions/842070/ * Accidentally modified .bashrc and now I cant login despite entering password correctly http://askubuntu.com/questions/842085/ * Where is the kernel documentation? http://askubuntu.com/questions/841043/ * How do I install the latest OpenOffice? http://askubuntu.com/questions/841148/ * deleting folders with spaces in their names using xargs http://askubuntu.com/questions/842160/ People Contributing the best questions and answers this week: Rinzwind (http://askubuntu.com/users/15811/rinzwind), Kaz Wolfe (http://askubuntu.com/users/208574/kaz-wolfe), Zanna (http://askubuntu.com/users/527764/zanna), heemayl (http://askubuntu.com/users/216503/heemayl) and muru (http://askubuntu.com/users/158442/muru) Ask (and answer!) questions at http://askubuntu.com == LoCo News == === Cesar Sevilla: 1er Festival Universitario de Tecnologias Libres === Cesar Sevilla shares details and goals of the upcoming Festival Universitario de Tecnologias Libres taking place from November 11-12th at the Universidad Dr. Jose Gregorio Hernandez in Maracaibo, Venezuela. Article is in Spanish. https://cesarsevilla.wordpress.com/2016/10/28/1er-festival-universitario-de-tecnologias-libres/ == LoCo Events == * Monthly meeting, FOSS User Group at Natick Community-Senior Center, Ubuntu Massachusetts LoCo: http://loco.ubuntu.com/events/ubuntu-us-ma/3443-monthly-meeting,-foss-user-group-at-natick-community-senior-center/ * Tempe Ubuntu Hour, Arizona LoCo Team: http://loco.ubuntu.com/events/ubuntu-arizona/3446-tempe-ubuntu-hour/ * Ubuntu 16.10 Yakkety-Yak Release Party with System76, Colorado Ubuntu Local Team: http://loco.ubuntu.com/events/ubuntu-us-co/3452-ubuntu-1610-yakkety-yak-release-party-with-system76/ * Ubuntu-it Meeting, Ubuntu Italy: http://loco.ubuntu.com/events/ubuntu-it/3437-ubuntu-it-meeting/ * AZLOCO Install-fest/Linux Workshop, Arizona LoCo Team: http://loco.ubuntu.com/events/ubuntu-arizona/3447-azloco-install-fest/linux-workshop/ * SeaGL, Ubuntu Washington LoCo: http://loco.ubuntu.com/events/ubuntu-washington/3455-seagl/ * SeaGL, Ubuntu Oregon LoCo: http://loco.ubuntu.com/events/ubuntu-us-or/3454-seagl/ * Ubuntu Party, LoCoTeam ubuntu-fr: http://loco.ubuntu.com/events/ubuntu-fr/3456-ubuntu-party/ Looking beyond the next two weeks? Visit the LoCo Team Portal to browse upcoming events around the world: http://loco.ubuntu.com/events/ == The Planet == === Stephane Graber: LXD is now available in the Ubuntu Snap Store === Stephane Graber reminds us about snaps and the benefits of having LXD available in snap format. Stephane provides commands to install the LXD snap on Ubuntu 16.04 and 16.10, then tells us about our choices regarding the three channels that the LXD snap is provided in. https://www.stgraber.org/2016/10/17/lxd-snap-available/ === Paul White: More on bug reports, September 1973 and a jumping mouse === Paul White writes again about bug reports saying that vague and incomplete bug reports are of little to no use so he asks for them to include the version of Ubuntu Desktop used and as much information as possible which will help identify the package at fault. He says that many users that have filed bugs would have received better help had they gone first to the Ubuntu , Ask Ubuntu, or Launchpad Answers. Paul provides a number of links for further reading on reporting bugs. http://blog.pcw.me.uk/2016/10/more-on-bug-reports-september-1973-and.html === Dustin Kirkland: Hotfix Your Ubuntu Kernels with the Canonical Livepatch Service! === Dustin Kirkland provides an overview of how to use the recently released Canonical Livepatch Service on systems running Ubuntu 16.04 and says that with this new service, users may safely download and install Linux livepatches through an encrypted stream. This allows users to conveniently apply security updates without rebooting their entire system. http://blog.dustinkirkland.com/2016/10/canonical-livepatch.html === Canonical Design Team: Download Ubuntu Yakkety Yak 16.10 wallpaper === Grazina Borosko shares a link for downloading Ubuntu 16.10's wallpaper. She also links to an article that outlines the design process for the new wallpaper. http://design.canonical.com/2016/10/download-ubuntu-yakkety-yak-16-10-wallpaper/ === Chris Glass: Making LXD Fly on Ubuntu === Chris Glass tells us that instead of using LXC he now uses LXD. He records how he made containers use his own host as an apt proxy and shows us all the commands needed to do this. https://tribaal.io/making-lxd-fly-on-ubuntu-as-well.html === Stephane Graber: Network Management with LXD (2.3+) === Stephane Graber writes about LXD networking in 16.04. Originally networking was external to LXD, but there is now a networking management API in LXD 2.3. He provides an overview of the new networking capabilities, with commands used to enable, examine, attaching, using DHCP, DNS and tunnels. Stephane also links to sites where more information can be found. https://www.stgraber.org/2016/10/27/network-management-with-lxd-2-3/ === Dustin Kirkland: Dirty COW was Livepatched in Ubuntu within Hours of Publication === Dustin Kirkland writes about the recent Dirty COW security vulnerability, shows a demonstration of the vulnerability in action and explains how the new livepatch capability can be used to quickly patch it on Ubuntu. http://blog.dustinkirkland.com/2016/10/dirty-cow-livepatched-in-ubuntu.html == Ubuntu Cloud News == * Canonical and ARM collaborate on OpenStack - http://insights.ubuntu.com/2016/10/17/canonical-and-arm-collaborate-on-openstack/ * Working to make Juju more accessible - http://design.canonical.com/2016/10/working-to-make-juju-more-accessible/ * Snapping Cuberite - http://insights.ubuntu.com/2016/10/27/snapping-cuberite/ == Ubuntu Phone News == === Marcos Costales: A new uWriter for Ubuntu Phone === Marcos Costales writes briefly about a new release of uWriter, which is an offline text editor for Ubuntu Touch. He shares screenshots and the new location of files stored on the device. http://thinkonbytes.blogspot.com/2016/10/a-new-uwriter-for-ubuntu-phone.html == Canonical News == * DataArt to deploy Juju for "Big Software" collaboration - http://insights.ubuntu.com/2016/10/19/dataart-to-deploy-juju-for-big-software-collaboration/ * Live kernel patching from Canonical now available for Ubuntu 16.04 LTS - http://insights.ubuntu.com/2016/10/20/live-kernel-patching-from-canonical-now-available-for-ubuntu/ * Managing your physical infrastructure from the top of rack switch - http://insights.ubuntu.com/2016/10/21/managing-your-physical-infrastructure-from-the-top-of-rack-switch/ * Infographic: Ubuntu Advantage explained - http://insights.ubuntu.com/2016/10/25/infographic-ubuntu-advantage-explained/ * Travel-friendly Lemur Ubuntu Laptop Updated to Kaby Lake - http://insights.ubuntu.com/2016/10/27/travel-friendly-lemur-ubuntu-laptop-updated-to-kaby-lake/ == In The Press == === Why the IoT security nightmare could be a dream for Ubuntu === Glyn Moody from Ars Technica writes about Mark Shuttleworth's talk at OSCON in London about the Internet of Things (IoT). He highlights some facts on Mark's slides, Snaps, and how that connects to IoT. http://arstechnica.co.uk/business/2016/10/ubuntu-snap-packaging-internet-of-things-security/ === Ubuntu 16.10: Yakkety Yak... Unity 8's not wack === Scott Gilbertson of The Register shares his in depth review of the newly released Ubuntu 16.10. He concludes that although the release is not without its faults (particularly the instability of Unity 8), users may yet wish to upgrade to the new release in order to take advantage of updates to the kernel, Software Center and GNOME packages. http://www.theregister.co.uk/2016/10/18/ubuntu_1610_review/ == In The Blogosphere == === Ubuntu 16.10 Desktop Gaming Benchmarks: Unity, GNOME, Xfce, LXDE, KDE, Openbox, MATE === Michael Larabel, writing for Phoronix, responds to requests for OpenGL benchmarks now that Ubuntu 16.10 has been released. He shows us the results after comparing Unity against six other desktop options and notes that the slowest, in an "out-of-the-box" configuration as packaged in Ubuntu, were Xfce and MATE. http://www.phoronix.com/scan.php?page=article&item=ubuntu-1610-desktops&num=1 === Ubuntu 16.10 Review === Mike Johnson of CMS Critic shares his review of Ubuntu 16.10 with us noting that it is one of the easiest distributions to install but doesn't look much different to previous releases. He says of the Unity 8 preview: "it is simply awful looking" and goes on to show us how it can be accessed. Mike goes on to review some of the updated applications and includes in his summary: "Overall, I'd say this felt like a typical Ubuntu release, at least from a desktop perspective." https://www.cmscritic.com/ubuntu-16.10-review/ === 7 Best Features Of Ubuntu 16.10 Yakkety Yak === Aditya Tiwari of Fossbytes takes quick look at the best features of Ubuntu 16.10 which updated versions of the kernel, nautilus, GNOME, an extra job for systemd, changes to GPG, a developer preview of Unity 8 and many updated applications. He reminds us that the release is supported for nine months and points us to where it can be downloaded from. https://fossbytes.com/7-best-features-in-ubuntu-16-10-yakkety-yak/ === Canonical Ltd.'s Ubuntu Core === James Gray, writing for Linux Journal, gives us a summary of Ubuntu Core which he says Canonical describes as: "the ideal platform for developers in the semiconductor arena for deploying large numbers of IoT devices due to its secure and open-source design, transactional updates that are fast and reliable and its small footprint." He informs us that the UcRobotics' Bubblegum-96 board is the latest addition to the list of supported devices. http://www.linuxjournal.com/content/canonical-ltds-ubuntu-core === Happy 12th Birthday, Ubuntu! === Joey-Elijah Sneddon of OMG! Ubuntu! reminds us that 12 years has passed since Mark Shuttleworth's announcement of the release of Ubuntu 4.10 which was code-named Warty Warthog. He quotes from that announcement, highlights some of the features of the first release and ends by writing: "Ubuntu was a game-changer from the get-go. In the 12 years since that release the project has grown in almost every area, ambition, scale, innovation and popularity." http://www.omgubuntu.co.uk/2016/10/ubuntu-12th-birthday == Featured Audio and Video == === Ubuntu snaps: from Zero to Hero === Didier Roche presents a video tutorial entitled "Ubuntu snaps: from Zero to Hero" in which he talks about the Linux cross-distro application packaging format called snaps. === S09E34 - The Mutant Killer Zombie Manhattan Project Thingy - Ubuntu Podcast === The three amigos are back with our new amiga! In this week's show: * We discuss going to a Randall Munroe book signing of What If? and Thing Explainer and getting extra signed copies for you to try and win in a competition! * We share a Command Line Lurve: direnv - An environment switcher for the shell * We also discuss fixing bugs in Ubuntu and visiting Barcelona. * and more. http://ubuntupodcast.org/2016/10/20/s09e34-the-mutant-killer-zombie-manhattan-project-thingy/ === Ubuntu Community Team Q&A - 25th October 2016 === Alan Pope and Daniel Holbach host another Ubuntu Community Q&A in which they answer questions that are put to them on iRC. === S09E35 - Red Nun - Ubuntu Podcast === We are four, made whole by a new guest presenter. In this week's show: * We discuss the news * Ubuntu 16.10 has been released, along with all the flavours * Ubuntu Budgie Remix 16.10 has been Released * Ubuntu 17.04 is named "Zesty Zapus" * A security vulnerability involving an unkempt bovine * Canonical has announced live kernel patching for Ubuntu * Happy 12th birthday to Ubuntu! * We mention some events * and more. http://ubuntupodcast.org/2016/10/27/s09e35-red-nun/ == Weekly Ubuntu Development Team Meetings == * Kernel Team - October 18 & 25, 2016 - https://wiki.ubuntu.com/KernelTeam/Newsletter/2016-10-18 & https://wiki.ubuntu.com/KernelTeam/Newsletter/2016-10-25 * Security Team - October 3, 2016 - https://wiki.ubuntu.com/MeetingLogs/Security/20161003 * Server Team - October 18 & 25, 2016 - https://wiki.ubuntu.com/MeetingLogs/Server/20161018 & https://wiki.ubuntu.com/MeetingLogs/Server/20161025 == Upcoming Meetings and Events == For upcoming meetings and events please visit the calendars at fridge.ubuntu.com: http://fridge.ubuntu.com/calendars/ == Updates and Security for 12.04, 14.04, 16.04 and 16.10 == === Security Updates === * [uSN-3097-2] Linux kernel (OMAP4) vulnerabilities - https://lists.ubuntu.com/archives/ubuntu-security-announce/2016-October/003592.html * [uSN-3104-1] Linux kernel vulnerability - https://lists.ubuntu.com/archives/ubuntu-security-announce/2016-October/003593.html * [uSN-3105-1] Linux kernel vulnerability - https://lists.ubuntu.com/archives/ubuntu-security-announce/2016-October/003594.html * [uSN-3106-1] Linux kernel vulnerability - https://lists.ubuntu.com/archives/ubuntu-security-announce/2016-October/003595.html * [uSN-3107-1] Linux kernel vulnerability - https://lists.ubuntu.com/archives/ubuntu-security-announce/2016-October/003596.html * [uSN-3105-2] Linux kernel (Trusty HWE) vulnerability - https://lists.ubuntu.com/archives/ubuntu-security-announce/2016-October/003597.html * [uSN-3106-2] Linux kernel (Xenial HWE) vulnerability - https://lists.ubuntu.com/archives/ubuntu-security-announce/2016-October/003598.html * [uSN-3104-2] Linux kernel (OMAP4) vulnerability - https://lists.ubuntu.com/archives/ubuntu-security-announce/2016-October/003599.html * [uSN-3106-3] Linux kernel (Raspberry Pi 2) vulnerability - https://lists.ubuntu.com/archives/ubuntu-security-announce/2016-October/003600.html * [uSN-3106-4] Linux kernel (Qualcomm Snapdragon) vulnerability - https://lists.ubuntu.com/archives/ubuntu-security-announce/2016-October/003601.html * [uSN-3108-1] Bind vulnerability - https://lists.ubuntu.com/archives/ubuntu-security-announce/2016-October/003603.html * [uSN-3107-2] Linux kernel (Raspberry Pi 2) vulnerability - https://lists.ubuntu.com/archives/ubuntu-security-announce/2016-October/003604.html * [uSN-3109-1] MySQL vulnerabilities - https://lists.ubuntu.com/archives/ubuntu-security-announce/2016-October/003605.html * [uSN-3110-1] Quagga vulnerability - https://lists.ubuntu.com/archives/ubuntu-security-announce/2016-October/003606.html * [uSN-3114-1] nginx vulnerability - https://lists.ubuntu.com/archives/ubuntu-security-announce/2016-October/003607.html * [uSN-3114-2] nginx regression - https://lists.ubuntu.com/archives/ubuntu-security-announce/2016-October/003608.html * [uSN-3111-1] Firefox vulnerabilities - https://lists.ubuntu.com/archives/ubuntu-security-announce/2016-October/003609.html * [uSN-3112-1] Thunderbird vulnerabilities - https://lists.ubuntu.com/archives/ubuntu-security-announce/2016-October/003610.html === Ubuntu 12.04 Updates === * update-manager 1:0.156.14.20 - https://lists.ubuntu.com/archives/precise-changes/2016-October/025712.html * distro-info-data 0.8ubuntu0.11 - https://lists.ubuntu.com/archives/precise-changes/2016-October/025713.html * distro-info-data 0.8ubuntu0.11 - https://lists.ubuntu.com/archives/precise-changes/2016-October/025714.html * linux-lts-trusty 3.13.0-99.146~precise1 - https://lists.ubuntu.com/archives/precise-changes/2016-October/025715.html * linux-signed-lts-trusty 3.13.0-99.146~precise1 - https://lists.ubuntu.com/archives/precise-changes/2016-October/025716.html * linux-meta-lts-trusty 3.13.0.99.90 - https://lists.ubuntu.com/archives/precise-changes/2016-October/025717.html * linux-lts-trusty_3.13.0-99.146~precise1_amd64.tar.gz - - https://lists.ubuntu.com/archives/precise-changes/2016-October/025718.html * vlan 1.9-3ubuntu6.1 - https://lists.ubuntu.com/archives/precise-changes/2016-October/025719.html * linux-meta 3.2.0.113.129 - https://lists.ubuntu.com/archives/precise-changes/2016-October/025720.html * linux-backports-modules-3.2.0 3.2.0-113.105 - https://lists.ubuntu.com/archives/precise-changes/2016-October/025721.html * linux 3.2.0-113.155 - https://lists.ubuntu.com/archives/precise-changes/2016-October/025722.html * linux-signed-lts-trusty 3.13.0-100.147~precise1 - https://lists.ubuntu.com/archives/precise-changes/2016-October/025723.html * linux-lts-trusty 3.13.0-100.147~precise1 - https://lists.ubuntu.com/archives/precise-changes/2016-October/025724.html * linux-meta-lts-trusty 3.13.0.100.91 - https://lists.ubuntu.com/archives/precise-changes/2016-October/025725.html * linux-ti-omap4 3.2.0-1491.118 - https://lists.ubuntu.com/archives/precise-changes/2016-October/025726.html * linux-meta-ti-omap4 3.2.0.1491.86 - https://lists.ubuntu.com/archives/precise-changes/2016-October/025727.html * linux-lts-trusty_3.13.0-100.147~precise1_amd64.tar.gz - - https://lists.ubuntu.com/archives/precise-changes/2016-October/025728.html * linux 3.2.0-113.155 - https://lists.ubuntu.com/archives/precise-changes/2016-October/025729.html * linux 3.2.0-113.155 - https://lists.ubuntu.com/archives/precise-changes/2016-October/025730.html * linux 3.2.0-113.155 - https://lists.ubuntu.com/archives/precise-changes/2016-October/025746.html * linux-meta 3.2.0.113.129 - https://lists.ubuntu.com/archives/precise-changes/2016-October/025731.html * linux-meta 3.2.0.113.129 - https://lists.ubuntu.com/archives/precise-changes/2016-October/025732.html * linux-backports-modules-3.2.0 3.2.0-113.105 - https://lists.ubuntu.com/archives/precise-changes/2016-October/025733.html * linux-backports-modules-3.2.0 3.2.0-113.105 - https://lists.ubuntu.com/archives/precise-changes/2016-October/025734.html * linux-ti-omap4 3.2.0-1491.118 - https://lists.ubuntu.com/archives/precise-changes/2016-October/025735.html * linux-ti-omap4 3.2.0-1491.118 - https://lists.ubuntu.com/archives/precise-changes/2016-October/025736.html * linux-meta-ti-omap4 3.2.0.1491.86 - https://lists.ubuntu.com/archives/precise-changes/2016-October/025737.html * linux-meta-ti-omap4 3.2.0.1491.86 - https://lists.ubuntu.com/archives/precise-changes/2016-October/025738.html * linux-lts-trusty 3.13.0-100.147~precise1 - https://lists.ubuntu.com/archives/precise-changes/2016-October/025739.html * linux-lts-trusty 3.13.0-100.147~precise1 - https://lists.ubuntu.com/archives/precise-changes/2016-October/025740.html * linux-signed-lts-trusty 3.13.0-100.147~precise1 - https://lists.ubuntu.com/archives/precise-changes/2016-October/025741.html * linux-signed-lts-trusty 3.13.0-100.147~precise1 - https://lists.ubuntu.com/archives/precise-changes/2016-October/025742.html * linux-meta-lts-trusty 3.13.0.100.91 - https://lists.ubuntu.com/archives/precise-changes/2016-October/025743.html * linux-meta-lts-trusty 3.13.0.100.91 - https://lists.ubuntu.com/archives/precise-changes/2016-October/025744.html * linux-lts-trusty_3.13.0-100.147~precise1_amd64.tar.gz - - https://lists.ubuntu.com/archives/precise-changes/2016-October/025745.html * bind9 1:9.8.1.dfsg.P1-4ubuntu0.18 - https://lists.ubuntu.com/archives/precise-changes/2016-October/025747.html * bind9 1:9.8.1.dfsg.P1-4ubuntu0.18 - https://lists.ubuntu.com/archives/precise-changes/2016-October/025748.html * linux-armadaxp 3.2.0-1676.102 - https://lists.ubuntu.com/archives/precise-changes/2016-October/025749.html * linux-meta-armadaxp 3.2.0.1676.92 - https://lists.ubuntu.com/archives/precise-changes/2016-October/025750.html * tzdata 2016h-0ubuntu0.12.04 - https://lists.ubuntu.com/archives/precise-changes/2016-October/025751.html * linux-armadaxp 3.2.0-1676.102 - https://lists.ubuntu.com/archives/precise-changes/2016-October/025752.html * linux-armadaxp 3.2.0-1676.102 - https://lists.ubuntu.com/archives/precise-changes/2016-October/025753.html * linux-armadaxp 3.2.0-1676.102 - https://lists.ubuntu.com/archives/precise-changes/2016-October/025756.html * linux-meta-armadaxp 3.2.0.1676.92 - https://lists.ubuntu.com/archives/precise-changes/2016-October/025754.html * linux-meta-armadaxp 3.2.0.1676.92 - https://lists.ubuntu.com/archives/precise-changes/2016-October/025755.html * tzdata 2016h-0ubuntu0.12.04 - https://lists.ubuntu.com/archives/precise-changes/2016-October/025757.html * tzdata 2016h-0ubuntu0.12.04 - https://lists.ubuntu.com/archives/precise-changes/2016-October/025758.html * linux 3.2.0-114.156 - https://lists.ubuntu.com/archives/precise-changes/2016-October/025759.html * linux-backports-modules-3.2.0 3.2.0-114.106 - https://lists.ubuntu.com/archives/precise-changes/2016-October/025760.html * linux-meta 3.2.0.114.130 - https://lists.ubuntu.com/archives/precise-changes/2016-October/025761.html * linux-ti-omap4 3.2.0-1492.119 - https://lists.ubuntu.com/archives/precise-changes/2016-October/025762.html * linux-meta-ti-omap4 3.2.0.1492.87 - https://lists.ubuntu.com/archives/precise-changes/2016-October/025763.html * linux-lts-trusty 3.13.0-101.148~precise1 - https://lists.ubuntu.com/archives/precise-changes/2016-October/025764.html * linux-signed-lts-trusty 3.13.0-101.148~precise1 - https://lists.ubuntu.com/archives/precise-changes/2016-October/025765.html * linux-meta-lts-trusty 3.13.0.101.92 - https://lists.ubuntu.com/archives/precise-changes/2016-October/025766.html * linux-lts-trusty_3.13.0-101.148~precise1_amd64.tar.gz - - https://lists.ubuntu.com/archives/precise-changes/2016-October/025767.html * mysql-5.5 5.5.53-0ubuntu0.12.04.1 - https://lists.ubuntu.com/archives/precise-changes/2016-October/025768.html * quagga 0.99.20.1-0ubuntu0.12.04.6 - https://lists.ubuntu.com/archives/precise-changes/2016-October/025769.html * quagga 0.99.20.1-0ubuntu0.12.04.6 - https://lists.ubuntu.com/archives/precise-changes/2016-October/025770.html * mysql-5.5 5.5.53-0ubuntu0.12.04.1 - https://lists.ubuntu.com/archives/precise-changes/2016-October/025771.html * adobe-flashplugin 1:20161026.1-0ubuntu0.12.04.1 - https://lists.ubuntu.com/archives/precise-changes/2016-October/025772.html * adobe-flashplugin 1:20161026.1-0ubuntu0.12.04.1 - https://lists.ubuntu.com/archives/precise-changes/2016-October/025773.html * debootstrap 1.0.40~ubuntu0.11 - https://lists.ubuntu.com/archives/precise-changes/2016-October/025774.html * flashplugin-nonfree 11.2.202.643ubuntu0.12.04.1 - https://lists.ubuntu.com/archives/precise-changes/2016-October/025775.html * flashplugin-nonfree 11.2.202.643ubuntu0.12.04.1 - https://lists.ubuntu.com/archives/precise-changes/2016-October/025776.html * akonadi 1.7.2-0ubuntu1.1 - https://lists.ubuntu.com/archives/precise-changes/2016-October/025777.html * akonadi 1.7.2-0ubuntu1.1 - https://lists.ubuntu.com/archives/precise-changes/2016-October/025778.html * linux 3.2.0-115.157 - https://lists.ubuntu.com/archives/precise-changes/2016-October/025779.html * linux-backports-modules-3.2.0 3.2.0-115.107 - https://lists.ubuntu.com/archives/precise-changes/2016-October/025780.html * linux-meta 3.2.0.115.131 - https://lists.ubuntu.com/archives/precise-changes/2016-October/025781.html * linux-ti-omap4 3.2.0-1493.120 - https://lists.ubuntu.com/archives/precise-changes/2016-October/025782.html * linux-meta-ti-omap4 3.2.0.1493.88 - https://lists.ubuntu.com/archives/precise-changes/2016-October/025783.html * linux-armadaxp 3.2.0-1677.104 - https://lists.ubuntu.com/archives/precise-changes/2016-October/025784.html * linux-meta-armadaxp 3.2.0.1677.93 - https://lists.ubuntu.com/archives/precise-changes/2016-October/025785.html * firefox 49.0.2+build2-0ubuntu0.12.04.1 - https://lists.ubuntu.com/archives/precise-changes/2016-October/025786.html * thunderbird 1:45.4.0+build1-0ubuntu0.12.04.1 - https://lists.ubuntu.com/archives/precise-changes/2016-October/025787.html * postgresql-9.1 9.1.24-0ubuntu0.12.04 - https://lists.ubuntu.com/archives/precise-changes/2016-October/025788.html * firefox 49.0.2+build2-0ubuntu0.12.04.1 - https://lists.ubuntu.com/archives/precise-changes/2016-October/025789.html * thunderbird 1:45.4.0+build1-0ubuntu0.12.04.1 - https://lists.ubuntu.com/archives/precise-changes/2016-October/025790.html * debootstrap 1.0.40~ubuntu0.11 - https://lists.ubuntu.com/archives/precise-changes/2016-October/025791.html End of Life - April 2017 === Ubuntu 14.04 Updates === * update-manager 1:0.196.22 - https://lists.ubuntu.com/archives/trusty-changes/2016-October/023017.html * apt 1.0.1ubuntu2.15 - https://lists.ubuntu.com/archives/trusty-changes/2016-October/023018.html * debian-installer 20101020ubuntu318.41 - https://lists.ubuntu.com/archives/trusty-changes/2016-October/023019.html * distro-info-data 0.18ubuntu0.6 - https://lists.ubuntu.com/archives/trusty-changes/2016-October/023020.html * distro-info-data 0.18ubuntu0.6 - https://lists.ubuntu.com/archives/trusty-changes/2016-October/023021.html * linux-lts-xenial 4.4.0-44.64~14.04.1 - https://lists.ubuntu.com/archives/trusty-changes/2016-October/023022.html * linux-signed-lts-xenial 4.4.0-44.64~14.04.1 - https://lists.ubuntu.com/archives/trusty-changes/2016-October/023023.html * linux-meta-lts-xenial 4.4.0.44.32 - https://lists.ubuntu.com/archives/trusty-changes/2016-October/023024.html * linux-lts-xenial_4.4.0-44.64~14.04.1_amd64.tar.gz - - https://lists.ubuntu.com/archives/trusty-changes/2016-October/023025.html * qemu 2.0.0+dfsg-2ubuntu1.28 - https://lists.ubuntu.com/archives/trusty-changes/2016-October/023026.html * vlan 1.9-3ubuntu10.1 - https://lists.ubuntu.com/archives/trusty-changes/2016-October/023027.html * linux-signed 3.13.0-100.147 - https://lists.ubuntu.com/archives/trusty-changes/2016-October/023028.html * linux-meta 3.13.0.100.108 - https://lists.ubuntu.com/archives/trusty-changes/2016-October/023029.html * linux 3.13.0-100.147 - https://lists.ubuntu.com/archives/trusty-changes/2016-October/023030.html * linux-signed-lts-vivid 3.19.0-73.81~14.04.1 - https://lists.ubuntu.com/archives/trusty-changes/2016-October/023031.html * linux-lts-vivid 3.19.0-73.81~14.04.1 - https://lists.ubuntu.com/archives/trusty-changes/2016-October/023032.html * linux-meta-lts-vivid 3.19.0.73.55 - https://lists.ubuntu.com/archives/trusty-changes/2016-October/023033.html * linux-signed-lts-xenial 4.4.0-45.66~14.04.1 - https://lists.ubuntu.com/archives/trusty-changes/2016-October/023034.html * linux-lts-xenial 4.4.0-45.66~14.04.1 - https://lists.ubuntu.com/archives/trusty-changes/2016-October/023035.html * linux-meta-lts-xenial 4.4.0.45.33 - https://lists.ubuntu.com/archives/trusty-changes/2016-October/023036.html * linux-lts-xenial_4.4.0-45.66~14.04.1_amd64.tar.gz - - https://lists.ubuntu.com/archives/trusty-changes/2016-October/023037.html * linux-lts-vivid_3.19.0-73.81~14.04.1_amd64.tar.gz - - https://lists.ubuntu.com/archives/trusty-changes/2016-October/023038.html * linux_3.13.0-100.147_amd64.tar.gz - - https://lists.ubuntu.com/archives/trusty-changes/2016-October/023039.html * linux-signed 3.13.0-100.147 - https://lists.ubuntu.com/archives/trusty-changes/2016-October/023040.html * linux 3.13.0-100.147 - https://lists.ubuntu.com/archives/trusty-changes/2016-October/023041.html * linux-signed 3.13.0-100.147 - https://lists.ubuntu.com/archives/trusty-changes/2016-October/023042.html * linux 3.13.0-100.147 - https://lists.ubuntu.com/archives/trusty-changes/2016-October/023043.html * linux-meta 3.13.0.100.108 - https://lists.ubuntu.com/archives/trusty-changes/2016-October/023044.html * linux-meta 3.13.0.100.108 - https://lists.ubuntu.com/archives/trusty-changes/2016-October/023045.html * linux-lts-vivid 3.19.0-73.81~14.04.1 - https://lists.ubuntu.com/archives/trusty-changes/2016-October/023046.html * linux-lts-vivid 3.19.0-73.81~14.04.1 - https://lists.ubuntu.com/archives/trusty-changes/2016-October/023047.html * linux-signed-lts-vivid 3.19.0-73.81~14.04.1 - https://lists.ubuntu.com/archives/trusty-changes/2016-October/023048.html * linux-signed-lts-vivid 3.19.0-73.81~14.04.1 - https://lists.ubuntu.com/archives/trusty-changes/2016-October/023049.html * linux-meta-lts-vivid 3.19.0.73.55 - https://lists.ubuntu.com/archives/trusty-changes/2016-October/023050.html * linux-meta-lts-vivid 3.19.0.73.55 - https://lists.ubuntu.com/archives/trusty-changes/2016-October/023051.html * linux-signed-lts-xenial 4.4.0-45.66~14.04.1 - https://lists.ubuntu.com/archives/trusty-changes/2016-October/023052.html * linux-lts-xenial 4.4.0-45.66~14.04.1 - https://lists.ubuntu.com/archives/trusty-changes/2016-October/023053.html * linux-lts-xenial 4.4.0-45.66~14.04.1 - https://lists.ubuntu.com/archives/trusty-changes/2016-October/023054.html * linux-signed-lts-xenial 4.4.0-45.66~14.04.1 - https://lists.ubuntu.com/archives/trusty-changes/2016-October/023055.html * linux-meta-lts-xenial 4.4.0.45.33 - https://lists.ubuntu.com/archives/trusty-changes/2016-October/023056.html * linux-meta-lts-xenial 4.4.0.45.33 - https://lists.ubuntu.com/archives/trusty-changes/2016-October/023057.html * linux_3.13.0-100.147_amd64.tar.gz - - https://lists.ubuntu.com/archives/trusty-changes/2016-October/023060.html * linux-lts-vivid_3.19.0-73.81~14.04.1_amd64.tar.gz - - https://lists.ubuntu.com/archives/trusty-changes/2016-October/023058.html * linux-lts-xenial_4.4.0-45.66~14.04.1_amd64.tar.gz - - https://lists.ubuntu.com/archives/trusty-changes/2016-October/023059.html * tzdata 2016h-0ubuntu0.14.04 - https://lists.ubuntu.com/archives/trusty-changes/2016-October/023061.html * linux-signed 3.13.0-101.148 - https://lists.ubuntu.com/archives/trusty-changes/2016-October/023062.html * linux-meta 3.13.0.101.109 - https://lists.ubuntu.com/archives/trusty-changes/2016-October/023063.html * linux 3.13.0-101.148 - https://lists.ubuntu.com/archives/trusty-changes/2016-October/023064.html * linux_3.13.0-101.148_amd64.tar.gz - - https://lists.ubuntu.com/archives/trusty-changes/2016-October/023065.html * tzdata 2016h-0ubuntu0.14.04 - https://lists.ubuntu.com/archives/trusty-changes/2016-October/023066.html * tzdata 2016h-0ubuntu0.14.04 - https://lists.ubuntu.com/archives/trusty-changes/2016-October/023067.html * linux-lts-xenial 4.4.0-46.67~14.04.1 - https://lists.ubuntu.com/archives/trusty-changes/2016-October/023070.html * linux-signed-lts-xenial 4.4.0-46.67~14.04.1 - https://lists.ubuntu.com/archives/trusty-changes/2016-October/023068.html * linux-meta-lts-xenial 4.4.0.46.34 - https://lists.ubuntu.com/archives/trusty-changes/2016-October/023069.html * linux-signed-lts-vivid 3.19.0-74.82~14.04.1 - https://lists.ubuntu.com/archives/trusty-changes/2016-October/023071.html * linux-lts-vivid 3.19.0-74.82~14.04.1 - https://lists.ubuntu.com/archives/trusty-changes/2016-October/023072.html * linux-meta-lts-vivid 3.19.0.74.56 - https://lists.ubuntu.com/archives/trusty-changes/2016-October/023073.html * linux-lts-vivid_3.19.0-74.82~14.04.1_amd64.tar.gz - - https://lists.ubuntu.com/archives/trusty-changes/2016-October/023074.html * linux-lts-xenial_4.4.0-46.67~14.04.1_amd64.tar.gz - - https://lists.ubuntu.com/archives/trusty-changes/2016-October/023075.html * makedumpfile 1.5.5-2ubuntu1.6 - https://lists.ubuntu.com/archives/trusty-changes/2016-October/023076.html * libnl3 3.2.21-1ubuntu4 - https://lists.ubuntu.com/archives/trusty-changes/2016-October/023077.html * pinba-engine-mysql 1.0.0-4ubuntu0.14.04.5 - https://lists.ubuntu.com/archives/trusty-changes/2016-October/023078.html * mysql-5.5 5.5.53-0ubuntu0.14.04.1 - https://lists.ubuntu.com/archives/trusty-changes/2016-October/023079.html * quagga 0.99.22.4-3ubuntu1.3 - https://lists.ubuntu.com/archives/trusty-changes/2016-October/023080.html * pinba-engine-mysql 1.0.0-4ubuntu0.14.04.5 - https://lists.ubuntu.com/archives/trusty-changes/2016-October/023081.html * quagga 0.99.22.4-3ubuntu1.3 - https://lists.ubuntu.com/archives/trusty-changes/2016-October/023082.html * mysql-5.5 5.5.53-0ubuntu0.14.04.1 - https://lists.ubuntu.com/archives/trusty-changes/2016-October/023083.html * nginx 1.4.6-1ubuntu3.6 - https://lists.ubuntu.com/archives/trusty-changes/2016-October/023084.html * nginx 1.4.6-1ubuntu3.6 - https://lists.ubuntu.com/archives/trusty-changes/2016-October/023085.html * sudo 1.8.9p5-1ubuntu1.3 - https://lists.ubuntu.com/archives/trusty-changes/2016-October/023086.html * preseed 1.62ubuntu1.1 - https://lists.ubuntu.com/archives/trusty-changes/2016-October/023087.html * debian-installer 20101020ubuntu318.41 - https://lists.ubuntu.com/archives/trusty-changes/2016-October/023088.html * strongswan 5.1.2-0ubuntu2.5 - https://lists.ubuntu.com/archives/trusty-changes/2016-October/023089.html * adobe-flashplugin 1:20161026.1-0ubuntu0.14.04.1 - https://lists.ubuntu.com/archives/trusty-changes/2016-October/023090.html * adobe-flashplugin 1:20161026.1-0ubuntu0.14.04.1 - https://lists.ubuntu.com/archives/trusty-changes/2016-October/023091.html * debootstrap 1.0.59ubuntu0.6 - https://lists.ubuntu.com/archives/trusty-changes/2016-October/023092.html * flashplugin-nonfree 11.2.202.643ubuntu0.14.04.1 - https://lists.ubuntu.com/archives/trusty-changes/2016-October/023093.html * fwts 14.03.01-0ubuntu4 - https://lists.ubuntu.com/archives/trusty-changes/2016-October/023094.html * flashplugin-nonfree 11.2.202.643ubuntu0.14.04.1 - https://lists.ubuntu.com/archives/trusty-changes/2016-October/023095.html * akonadi 1.12.1-0ubuntu1.2 - https://lists.ubuntu.com/archives/trusty-changes/2016-October/023096.html * akonadi 1.12.1-0ubuntu1.2 - https://lists.ubuntu.com/archives/trusty-changes/2016-October/023097.html * dkms 2.2.0.3-1.1ubuntu5.14.04.9 - https://lists.ubuntu.com/archives/trusty-changes/2016-October/023098.html * nginx 1.4.6-1ubuntu3.7 - https://lists.ubuntu.com/archives/trusty-changes/2016-October/023099.html * nginx 1.4.6-1ubuntu3.7 - https://lists.ubuntu.com/archives/trusty-changes/2016-October/023100.html * firefox 49.0.2+build2-0ubuntu0.14.04.1 - https://lists.ubuntu.com/archives/trusty-changes/2016-October/023101.html * thunderbird 1:45.4.0+build1-0ubuntu0.14.04.1 - https://lists.ubuntu.com/archives/trusty-changes/2016-October/023102.html * postgresql-9.3 9.3.15-0ubuntu0.14.04 - https://lists.ubuntu.com/archives/trusty-changes/2016-October/023103.html * postgresql-9.1 9.1.24-0ubuntu0.14.04 - https://lists.ubuntu.com/archives/trusty-changes/2016-October/023104.html * firefox 49.0.2+build2-0ubuntu0.14.04.1 - https://lists.ubuntu.com/archives/trusty-changes/2016-October/023105.html * thunderbird 1:45.4.0+build1-0ubuntu0.14.04.1 - https://lists.ubuntu.com/archives/trusty-changes/2016-October/023106.html * debootstrap 1.0.59ubuntu0.6 - https://lists.ubuntu.com/archives/trusty-changes/2016-October/023107.html * qemu 2.0.0+dfsg-2ubuntu1.29 - https://lists.ubuntu.com/archives/trusty-changes/2016-October/023108.html End of Life - April 2019 === Ubuntu 16.04 Updates === * gnome-software 3.20.1+git20160923.2.7374bdc-0ubuntu1~xenial1 - https://lists.ubuntu.com/archives/xenial-changes/2016-October/014864.html * update-manager 1:16.04.4 - https://lists.ubuntu.com/archives/xenial-changes/2016-October/014865.html * bzr 2.7.0-2ubuntu3 - https://lists.ubuntu.com/archives/xenial-changes/2016-October/014866.html * curtin 0.1.0~bzr425-0ubuntu1~16.04.1 - https://lists.ubuntu.com/archives/xenial-changes/2016-October/014867.html * cpustat 0.01.25-1ubuntu0 - https://lists.ubuntu.com/archives/xenial-changes/2016-October/014868.html * comix 4.0.4-1ubuntu1 - https://lists.ubuntu.com/archives/xenial-changes/2016-October/014869.html * python-pylxd 2.0.5-0ubuntu1.1 - https://lists.ubuntu.com/archives/xenial-changes/2016-October/014870.html * ffmpeg 7:2.8.8-0ubuntu0.16.04.1 - https://lists.ubuntu.com/archives/xenial-changes/2016-October/014871.html * ffmpeg 7:2.8.8-0ubuntu0.16.04.1 - https://lists.ubuntu.com/archives/xenial-changes/2016-October/014872.html * initramfs-tools 0.122ubuntu8.5 - https://lists.ubuntu.com/archives/xenial-changes/2016-October/014873.html * squashfuse 0.1.100-0ubuntu1~ubuntu16.04.1 - https://lists.ubuntu.com/archives/xenial-changes/2016-October/014874.html * snapd 2.16ubuntu1 - https://lists.ubuntu.com/archives/xenial-changes/2016-October/014875.html * distro-info-data 0.28ubuntu0.2 - https://lists.ubuntu.com/archives/xenial-changes/2016-October/014876.html * vmware-nsx 8.0.0-0ubuntu0.16.04.4 - https://lists.ubuntu.com/archives/xenial-changes/2016-October/014877.html * plasma-discover 5.6.2-1ubuntu1.1 - https://lists.ubuntu.com/archives/xenial-changes/2016-October/014878.html * distro-info-data 0.28ubuntu0.2 - https://lists.ubuntu.com/archives/xenial-changes/2016-October/014879.html * snapd-xdg-open 0.0.0~16.04 - https://lists.ubuntu.com/archives/xenial-changes/2016-October/014880.html * linux-signed 4.4.0-44.64 - https://lists.ubuntu.com/archives/xenial-changes/2016-October/014881.html * linux 4.4.0-44.64 - https://lists.ubuntu.com/archives/xenial-changes/2016-October/014882.html * linux-meta 4.4.0.44.47 - https://lists.ubuntu.com/archives/xenial-changes/2016-October/014883.html * linux_4.4.0-44.64_amd64.tar.gz - - https://lists.ubuntu.com/archives/xenial-changes/2016-October/014884.html * linux-raspi2 4.4.0-1028.34 - https://lists.ubuntu.com/archives/xenial-changes/2016-October/014885.html * linux-meta-raspi2 4.4.0.1028.28 - https://lists.ubuntu.com/archives/xenial-changes/2016-October/014886.html * snapd 2.16ubuntu2 - https://lists.ubuntu.com/archives/xenial-changes/2016-October/014887.html * linux-snapdragon 4.4.0-1031.34 - https://lists.ubuntu.com/archives/xenial-changes/2016-October/014888.html * snapd 2.16ubuntu3 - https://lists.ubuntu.com/archives/xenial-changes/2016-October/014889.html * vlan 1.9-3.2ubuntu1.16.04.1 - https://lists.ubuntu.com/archives/xenial-changes/2016-October/014890.html * libvirt 1.3.1-1ubuntu10.5 - https://lists.ubuntu.com/archives/xenial-changes/2016-October/014891.html * linux-signed 4.4.0-45.66 - https://lists.ubuntu.com/archives/xenial-changes/2016-October/014892.html * linux 4.4.0-45.66 - https://lists.ubuntu.com/archives/xenial-changes/2016-October/014893.html * linux-meta 4.4.0.45.48 - https://lists.ubuntu.com/archives/xenial-changes/2016-October/014894.html * linux-raspi2 4.4.0-1029.36 - https://lists.ubuntu.com/archives/xenial-changes/2016-October/014895.html * linux-meta-raspi2 4.4.0.1029.29 - https://lists.ubuntu.com/archives/xenial-changes/2016-October/014896.html * linux-snapdragon 4.4.0-1032.36 - https://lists.ubuntu.com/archives/xenial-changes/2016-October/014897.html * linux-meta-snapdragon 4.4.0.1032.24 - https://lists.ubuntu.com/archives/xenial-changes/2016-October/014898.html * linux_4.4.0-45.66_amd64.tar.gz - - https://lists.ubuntu.com/archives/xenial-changes/2016-October/014899.html * lxc 2.0.5-0ubuntu1~ubuntu16.04.1 - https://lists.ubuntu.com/archives/xenial-changes/2016-October/014900.html * lxcfs 2.0.4-0ubuntu1~ubuntu16.04.1 - https://lists.ubuntu.com/archives/xenial-changes/2016-October/014901.html * lxd 2.0.5-0ubuntu1~ubuntu16.04.1 - https://lists.ubuntu.com/archives/xenial-changes/2016-October/014902.html * linux-signed 4.4.0-45.66 - https://lists.ubuntu.com/archives/xenial-changes/2016-October/014903.html * linux 4.4.0-45.66 - https://lists.ubuntu.com/archives/xenial-changes/2016-October/014904.html * linux-signed 4.4.0-45.66 - https://lists.ubuntu.com/archives/xenial-changes/2016-October/014905.html * linux 4.4.0-45.66 - https://lists.ubuntu.com/archives/xenial-changes/2016-October/014906.html * linux-meta 4.4.0.45.48 - https://lists.ubuntu.com/archives/xenial-changes/2016-October/014907.html * linux-meta 4.4.0.45.48 - https://lists.ubuntu.com/archives/xenial-changes/2016-October/014908.html * linux-raspi2 4.4.0-1029.36 - https://lists.ubuntu.com/archives/xenial-changes/2016-October/014909.html * linux-raspi2 4.4.0-1029.36 - https://lists.ubuntu.com/archives/xenial-changes/2016-October/014910.html * linux-meta-raspi2 4.4.0.1029.29 - https://lists.ubuntu.com/archives/xenial-changes/2016-October/014911.html * linux-meta-raspi2 4.4.0.1029.29 - https://lists.ubuntu.com/archives/xenial-changes/2016-October/014912.html * linux-snapdragon 4.4.0-1032.36 - https://lists.ubuntu.com/archives/xenial-changes/2016-October/014913.html * linux_4.4.0-45.66_amd64.tar.gz - - https://lists.ubuntu.com/archives/xenial-changes/2016-October/014914.html * linux-snapdragon 4.4.0-1032.36 - https://lists.ubuntu.com/archives/xenial-changes/2016-October/014915.html * linux-meta-snapdragon 4.4.0.1032.24 - https://lists.ubuntu.com/archives/xenial-changes/2016-October/014916.html * linux-meta-snapdragon 4.4.0.1032.24 - https://lists.ubuntu.com/archives/xenial-changes/2016-October/014917.html * nplan 0.13~16.04 - https://lists.ubuntu.com/archives/xenial-changes/2016-October/014918.html * ubuntu-image 0.9+16.04ubuntu1 - https://lists.ubuntu.com/archives/xenial-changes/2016-October/014919.html * linux-signed 4.4.0-46.67 - https://lists.ubuntu.com/archives/xenial-changes/2016-October/014920.html * linux 4.4.0-46.67 - https://lists.ubuntu.com/archives/xenial-changes/2016-October/014921.html * linux-meta 4.4.0.46.49 - https://lists.ubuntu.com/archives/xenial-changes/2016-October/014922.html * linux_4.4.0-46.67_amd64.tar.gz - - https://lists.ubuntu.com/archives/xenial-changes/2016-October/014923.html * linux-raspi2 4.4.0-1030.37 - https://lists.ubuntu.com/archives/xenial-changes/2016-October/014924.html * linux-meta-raspi2 4.4.0.1030.30 - https://lists.ubuntu.com/archives/xenial-changes/2016-October/014925.html * linux-snapdragon 4.4.0-1033.37 - https://lists.ubuntu.com/archives/xenial-changes/2016-October/014926.html * linux-meta-snapdragon 4.4.0.1033.25 - https://lists.ubuntu.com/archives/xenial-changes/2016-October/014927.html * tzdata 2016h-0ubuntu0.16.04 - https://lists.ubuntu.com/archives/xenial-changes/2016-October/014928.html * tzdata 2016h-0ubuntu0.16.04 - https://lists.ubuntu.com/archives/xenial-changes/2016-October/014929.html * tzdata 2016h-0ubuntu0.16.04 - https://lists.ubuntu.com/archives/xenial-changes/2016-October/014930.html * lxc 2.0.5-0ubuntu1~ubuntu16.04.2 - https://lists.ubuntu.com/archives/xenial-changes/2016-October/014931.html * snapd 2.16ubuntu3 - https://lists.ubuntu.com/archives/xenial-changes/2016-October/014932.html * lxc 2.0.5-0ubuntu1~ubuntu16.04.2 - https://lists.ubuntu.com/archives/xenial-changes/2016-October/014933.html * makedumpfile 1:1.5.9-5ubuntu0.2 - https://lists.ubuntu.com/archives/xenial-changes/2016-October/014934.html * glibc 2.23-0ubuntu4 - https://lists.ubuntu.com/archives/xenial-changes/2016-October/014935.html * pinba-engine-mysql 1.1.0-1ubuntu1.4 - https://lists.ubuntu.com/archives/xenial-changes/2016-October/014936.html * mysql-5.7 5.7.16-0ubuntu0.16.04.1 - https://lists.ubuntu.com/archives/xenial-changes/2016-October/014937.html * quagga 0.99.24.1-2ubuntu1.2 - https://lists.ubuntu.com/archives/xenial-changes/2016-October/014938.html * quagga 0.99.24.1-2ubuntu1.2 - https://lists.ubuntu.com/archives/xenial-changes/2016-October/014939.html * pinba-engine-mysql 1.1.0-1ubuntu1.4 - https://lists.ubuntu.com/archives/xenial-changes/2016-October/014940.html * mysql-5.7 5.7.16-0ubuntu0.16.04.1 - https://lists.ubuntu.com/archives/xenial-changes/2016-October/014941.html * fwts 16.03.00-0ubuntu1.1 - https://lists.ubuntu.com/archives/xenial-changes/2016-October/014942.html * nginx 1.10.0-0ubuntu0.16.04.3 - https://lists.ubuntu.com/archives/xenial-changes/2016-October/014943.html * nginx 1.10.0-0ubuntu0.16.04.3 - https://lists.ubuntu.com/archives/xenial-changes/2016-October/014944.html * preseed 1.71ubuntu1.1 - https://lists.ubuntu.com/archives/xenial-changes/2016-October/014945.html * ganglia-web 3.6.1-1ubuntu1.1 - https://lists.ubuntu.com/archives/xenial-changes/2016-October/014946.html * python-novaclient 2:3.3.1-2ubuntu1 - https://lists.ubuntu.com/archives/xenial-changes/2016-October/014947.html * bacula 7.0.5+dfsg-4ubuntu0.1 - https://lists.ubuntu.com/archives/xenial-changes/2016-October/014948.html * ansible 2.0.0.2-2ubuntu1 - https://lists.ubuntu.com/archives/xenial-changes/2016-October/014949.html * libsmbios 2.3.0-0ubuntu1.1 - https://lists.ubuntu.com/archives/xenial-changes/2016-October/014950.html * icinga 1.13.3-2ubuntu0.1 - https://lists.ubuntu.com/archives/xenial-changes/2016-October/014951.html * zabbix 1:2.4.7+dfsg-2ubuntu2.1 - https://lists.ubuntu.com/archives/xenial-changes/2016-October/014952.html * ubuntu-release-upgrader 1:16.04.17 - https://lists.ubuntu.com/archives/xenial-changes/2016-October/014953.html * python-pylxd 2.0.5-0ubuntu1.1 - https://lists.ubuntu.com/archives/xenial-changes/2016-October/014954.html * nova 2:13.1.1-0ubuntu1.1 - https://lists.ubuntu.com/archives/xenial-changes/2016-October/014955.html * systemd 229-4ubuntu12 - https://lists.ubuntu.com/archives/xenial-changes/2016-October/014956.html * adobe-flashplugin 1:20161026.1-0ubuntu0.16.04.1 - https://lists.ubuntu.com/archives/xenial-changes/2016-October/014957.html * adobe-flashplugin 1:20161026.1-0ubuntu0.16.04.1 - https://lists.ubuntu.com/archives/xenial-changes/2016-October/014958.html * squashfuse 0.1.100-0ubuntu1~ubuntu16.04.1 - https://lists.ubuntu.com/archives/xenial-changes/2016-October/014959.html * debootstrap 1.0.78+nmu1ubuntu1.2 - https://lists.ubuntu.com/archives/xenial-changes/2016-October/014960.html * flashplugin-nonfree 11.2.202.643ubuntu0.16.04.1 - https://lists.ubuntu.com/archives/xenial-changes/2016-October/014961.html * ubuntu-image 0.9+16.04ubuntu1 - https://lists.ubuntu.com/archives/xenial-changes/2016-October/014962.html * ubuntu-image 0.10+16.04ubuntu1 - https://lists.ubuntu.com/archives/xenial-changes/2016-October/014963.html * flashplugin-nonfree 11.2.202.643ubuntu0.16.04.1 - https://lists.ubuntu.com/archives/xenial-changes/2016-October/014964.html * procps 2:3.3.10-4ubuntu2.1 - https://lists.ubuntu.com/archives/xenial-changes/2016-October/014965.html * python-rfc3986 0.2.2-0ubuntu0.16.04.1 - https://lists.ubuntu.com/archives/xenial-changes/2016-October/014966.html * ubuntu-themes 14.04+16.04.20161024-0ubuntu1 - https://lists.ubuntu.com/archives/xenial-changes/2016-October/014967.html * apparmor 2.10.95-0ubuntu2.5 - https://lists.ubuntu.com/archives/xenial-changes/2016-October/014968.html * dkms 2.2.0.3-2ubuntu11.3 - https://lists.ubuntu.com/archives/xenial-changes/2016-October/014969.html * qtbase-opensource-src 5.5.1+dfsg-16ubuntu7.2 - https://lists.ubuntu.com/archives/xenial-changes/2016-October/014970.html * im-config 0.29-1ubuntu12.2 - https://lists.ubuntu.com/archives/xenial-changes/2016-October/014971.html * python-mock-services 0.2-0ubuntu0.16.04.1 - https://lists.ubuntu.com/archives/xenial-changes/2016-October/014972.html * nginx 1.10.0-0ubuntu0.16.04.4 - https://lists.ubuntu.com/archives/xenial-changes/2016-October/014973.html * snapcraft 2.20 - https://lists.ubuntu.com/archives/xenial-changes/2016-October/014974.html * nginx 1.10.0-0ubuntu0.16.04.4 - https://lists.ubuntu.com/archives/xenial-changes/2016-October/014975.html * golang-go.crypto 1:0.0~git20161012.0.5f31782-1ubuntu0.16.04.1 - https://lists.ubuntu.com/archives/xenial-changes/2016-October/014976.html * firefox 49.0.2+build2-0ubuntu0.16.04.2 - https://lists.ubuntu.com/archives/xenial-changes/2016-October/014977.html * thunderbird 1:45.4.0+build1-0ubuntu0.16.04.1 - https://lists.ubuntu.com/archives/xenial-changes/2016-October/014978.html * juju-core 2.0.0-0ubuntu0.16.04.1 - https://lists.ubuntu.com/archives/xenial-changes/2016-October/014979.html * postgresql-9.5 9.5.5-0ubuntu0.16.04 - https://lists.ubuntu.com/archives/xenial-changes/2016-October/014980.html * php-smbclient 0.8.0~rc1-2build1 - https://lists.ubuntu.com/archives/xenial-changes/2016-October/014981.html * mistral 2.0.0-1ubuntu1 - https://lists.ubuntu.com/archives/xenial-changes/2016-October/014982.html * nvme-cli 0.5-1ubuntu0.1 - https://lists.ubuntu.com/archives/xenial-changes/2016-October/014983.html * thunderbird 1:45.4.0+build1-0ubuntu0.16.04.1 - https://lists.ubuntu.com/archives/xenial-changes/2016-October/014984.html * firefox 49.0.2+build2-0ubuntu0.16.04.2 - https://lists.ubuntu.com/archives/xenial-changes/2016-October/014985.html * linux-firmware 1.157.4 - https://lists.ubuntu.com/archives/xenial-changes/2016-October/014986.html * debootstrap 1.0.78+nmu1ubuntu1.2 - https://lists.ubuntu.com/archives/xenial-changes/2016-October/014987.html * ubuntu-image 0.10+16.04ubuntu2 - https://lists.ubuntu.com/archives/xenial-changes/2016-October/014988.html * zfs-linux 0.6.5.6-0ubuntu15 - https://lists.ubuntu.com/archives/xenial-changes/2016-October/014989.html End of Life - April 2021 === Ubuntu 16.10 Updates === * calligra 1:2.9.11-0ubuntu1 - https://lists.ubuntu.com/archives/yakkety-changes/2016-October/011275.html * freeipa 4.3.2-1 - https://lists.ubuntu.com/archives/yakkety-changes/2016-October/011276.html * gnome-control-center 1:3.20.2-0ubuntu1 - https://lists.ubuntu.com/archives/yakkety-changes/2016-October/011277.html * file-roller 3.22.1-0ubuntu1 - https://lists.ubuntu.com/archives/yakkety-changes/2016-October/011278.html * mate-netbook 1.16.1-1 - https://lists.ubuntu.com/archives/yakkety-changes/2016-October/011279.html * snapd 2.16+16.10ubuntu1.1 - https://lists.ubuntu.com/archives/yakkety-changes/2016-October/011280.html * mate-optimus 16.10.1-1 - https://lists.ubuntu.com/archives/yakkety-changes/2016-October/011281.html * fcitx 1:4.2.9.1-4 - https://lists.ubuntu.com/archives/yakkety-changes/2016-October/011282.html * distro-info-data 0.29ubuntu0.1 - https://lists.ubuntu.com/archives/yakkety-changes/2016-October/011283.html * distro-info-data 0.29ubuntu0.1 - https://lists.ubuntu.com/archives/yakkety-changes/2016-October/011284.html * snapd 2.16+16.10ubuntu1.2 - https://lists.ubuntu.com/archives/yakkety-changes/2016-October/011285.html * linux-signed 4.8.0-26.28 - https://lists.ubuntu.com/archives/yakkety-changes/2016-October/011286.html * linux 4.8.0-26.28 - https://lists.ubuntu.com/archives/yakkety-changes/2016-October/011287.html * linux-meta 4.8.0.26.35 - https://lists.ubuntu.com/archives/yakkety-changes/2016-October/011288.html * linux_4.8.0-26.28_amd64.tar.gz - - https://lists.ubuntu.com/archives/yakkety-changes/2016-October/011289.html * linux-signed 4.8.0-26.28 - https://lists.ubuntu.com/archives/yakkety-changes/2016-October/011290.html * linux 4.8.0-26.28 - https://lists.ubuntu.com/archives/yakkety-changes/2016-October/011291.html * linux 4.8.0-26.28 - https://lists.ubuntu.com/archives/yakkety-changes/2016-October/011292.html * linux-signed 4.8.0-26.28 - https://lists.ubuntu.com/archives/yakkety-changes/2016-October/011293.html * linux-meta 4.8.0.26.35 - https://lists.ubuntu.com/archives/yakkety-changes/2016-October/011294.html * linux-meta 4.8.0.26.35 - https://lists.ubuntu.com/archives/yakkety-changes/2016-October/011295.html * linux_4.8.0-26.28_amd64.tar.gz - - https://lists.ubuntu.com/archives/yakkety-changes/2016-October/011296.html * linux-raspi2 4.8.0-1017.20 - https://lists.ubuntu.com/archives/yakkety-changes/2016-October/011297.html * linux-meta-raspi2 4.8.0.1017.20 - https://lists.ubuntu.com/archives/yakkety-changes/2016-October/011298.html * linux-snapdragon 4.4.0-1032.36 - https://lists.ubuntu.com/archives/yakkety-changes/2016-October/011299.html * linux-meta-snapdragon 4.4.0.1032.24 - https://lists.ubuntu.com/archives/yakkety-changes/2016-October/011300.html * linux-raspi2 4.8.0-1017.20 - https://lists.ubuntu.com/archives/yakkety-changes/2016-October/011301.html * linux-raspi2 4.8.0-1017.20 - https://lists.ubuntu.com/archives/yakkety-changes/2016-October/011302.html * linux-meta-raspi2 4.8.0.1017.20 - https://lists.ubuntu.com/archives/yakkety-changes/2016-October/011304.html * linux-meta-raspi2 4.8.0.1017.20 - https://lists.ubuntu.com/archives/yakkety-changes/2016-October/011303.html * linux-snapdragon 4.4.0-1032.36 - https://lists.ubuntu.com/archives/yakkety-changes/2016-October/011305.html * linux-meta-snapdragon 4.4.0.1032.24 - https://lists.ubuntu.com/archives/yakkety-changes/2016-October/011306.html * linux-snapdragon 4.4.0-1032.36 - https://lists.ubuntu.com/archives/yakkety-changes/2016-October/011307.html * linux-meta-snapdragon 4.4.0.1032.24 - https://lists.ubuntu.com/archives/yakkety-changes/2016-October/011308.html * ifupdown 0.8.13ubuntu3 - https://lists.ubuntu.com/archives/yakkety-changes/2016-October/011309.html * mistral 3.0.0-1ubuntu0.16.10.1 - https://lists.ubuntu.com/archives/yakkety-changes/2016-October/011310.html * initramfs-tools 0.125ubuntu6 - https://lists.ubuntu.com/archives/yakkety-changes/2016-October/011311.html * plasma-discover 5.7.5-0ubuntu2.1 - https://lists.ubuntu.com/archives/yakkety-changes/2016-October/011312.html * libreoffice 1:5.2.2-0ubuntu2 - https://lists.ubuntu.com/archives/yakkety-changes/2016-October/011313.html * libreoffice 1:5.2.2-0ubuntu2 - https://lists.ubuntu.com/archives/yakkety-changes/2016-October/011314.html * hardinfo 0.5.1-1.4ubuntu3 - https://lists.ubuntu.com/archives/yakkety-changes/2016-October/011315.html * gnome-settings-daemon 3.22.1-0ubuntu1 - https://lists.ubuntu.com/archives/yakkety-changes/2016-October/011316.html * apparmor 2.10.95-4ubuntu5.1 - https://lists.ubuntu.com/archives/yakkety-changes/2016-October/011317.html * ubuntu-mate-welcome 16.10.11 - https://lists.ubuntu.com/archives/yakkety-changes/2016-October/011318.html * webkit2gtk 2.14.1-0ubuntu1 - https://lists.ubuntu.com/archives/yakkety-changes/2016-October/011319.html * tcpdump 4.7.4-1ubuntu1.16.10.1 - https://lists.ubuntu.com/archives/yakkety-changes/2016-October/011320.html * evolution 3.22.1-0ubuntu2 - https://lists.ubuntu.com/archives/yakkety-changes/2016-October/011321.html * makedumpfile 1:1.6.0-2ubuntu1.1 - https://lists.ubuntu.com/archives/yakkety-changes/2016-October/011322.html * initramfs-tools 0.125ubuntu6.1 - https://lists.ubuntu.com/archives/yakkety-changes/2016-October/011323.html * ktexteditor 5.26.0-0ubuntu1.1 - https://lists.ubuntu.com/archives/yakkety-changes/2016-October/011324.html * neutron 2:9.0.0-0ubuntu1.16.10.1 - https://lists.ubuntu.com/archives/yakkety-changes/2016-October/011325.html * ubuntu-image 0.9+16.10ubuntu1 - https://lists.ubuntu.com/archives/yakkety-changes/2016-October/011326.html * tzdata 2016h-0ubuntu0.16.10 - https://lists.ubuntu.com/archives/yakkety-changes/2016-October/011327.html * tzdata 2016h-0ubuntu0.16.10 - https://lists.ubuntu.com/archives/yakkety-changes/2016-October/011328.html * tzdata 2016h-0ubuntu0.16.10 - https://lists.ubuntu.com/archives/yakkety-changes/2016-October/011329.html * linux-signed 4.8.0-27.29 - https://lists.ubuntu.com/archives/yakkety-changes/2016-October/011330.html * linux 4.8.0-27.29 - https://lists.ubuntu.com/archives/yakkety-changes/2016-October/011331.html * linux-meta 4.8.0.27.36 - https://lists.ubuntu.com/archives/yakkety-changes/2016-October/011332.html * linux_4.8.0-27.29_amd64.tar.gz - - https://lists.ubuntu.com/archives/yakkety-changes/2016-October/011333.html * linux-raspi2 4.8.0-1018.21 - https://lists.ubuntu.com/archives/yakkety-changes/2016-October/011334.html * linux-meta-raspi2 4.8.0.1018.21 - https://lists.ubuntu.com/archives/yakkety-changes/2016-October/011335.html * lxc 2.0.5-0ubuntu1.1 - https://lists.ubuntu.com/archives/yakkety-changes/2016-October/011336.html * lxc 2.0.5-0ubuntu1.1 - https://lists.ubuntu.com/archives/yakkety-changes/2016-October/011337.html * fwts 16.09.00-0ubuntu4.1 - https://lists.ubuntu.com/archives/yakkety-changes/2016-October/011338.html * linux-meta-snapdragon 4.4.0.1033.25 - https://lists.ubuntu.com/archives/yakkety-changes/2016-October/011339.html * linux-snapdragon 4.4.0-1033.37 - https://lists.ubuntu.com/archives/yakkety-changes/2016-October/011340.html * golang-go.crypto 1:0.0~git20161012.0.5f31782-1ubuntu0.16.10.1 - https://lists.ubuntu.com/archives/yakkety-changes/2016-October/011341.html * mysql-5.7 5.7.16-0ubuntu0.16.10.1 - https://lists.ubuntu.com/archives/yakkety-changes/2016-October/011342.html * quagga 1.0.20160315-2ubuntu0.1 - https://lists.ubuntu.com/archives/yakkety-changes/2016-October/011343.html * quagga 1.0.20160315-2ubuntu0.1 - https://lists.ubuntu.com/archives/yakkety-changes/2016-October/011344.html * mysql-5.7 5.7.16-0ubuntu0.16.10.1 - https://lists.ubuntu.com/archives/yakkety-changes/2016-October/011345.html * nginx 1.10.1-0ubuntu1.1 - https://lists.ubuntu.com/archives/yakkety-changes/2016-October/011346.html * nginx 1.10.1-0ubuntu1.1 - https://lists.ubuntu.com/archives/yakkety-changes/2016-October/011347.html * file-roller 3.22.1-0ubuntu1 - https://lists.ubuntu.com/archives/yakkety-changes/2016-October/011348.html * gnome-control-center 1:3.20.2-0ubuntu1 - https://lists.ubuntu.com/archives/yakkety-changes/2016-October/011349.html * anjuta-extras 3.10.0-4build0.1 - https://lists.ubuntu.com/archives/yakkety-changes/2016-October/011350.html * golang-go.crypto 1:0.0~git20161012.0.5f31782-1ubuntu0.16.10.2 - https://lists.ubuntu.com/archives/yakkety-changes/2016-October/011351.html * systemd 231-9ubuntu1 - https://lists.ubuntu.com/archives/yakkety-changes/2016-October/011352.html * ubuntu-release-upgrader 1:16.10.8 - https://lists.ubuntu.com/archives/yakkety-changes/2016-October/011353.html * edk2 0~20160813.de74668f-1ubuntu0.1 - https://lists.ubuntu.com/archives/yakkety-changes/2016-October/011354.html * snapd-glib 1.2-0ubuntu1.1 - https://lists.ubuntu.com/archives/yakkety-changes/2016-October/011355.html * adobe-flashplugin 1:20161026.1-0ubuntu0.16.10.1 - https://lists.ubuntu.com/archives/yakkety-changes/2016-October/011356.html * adobe-flashplugin 1:20161026.1-0ubuntu0.16.10.1 - https://lists.ubuntu.com/archives/yakkety-changes/2016-October/011357.html * debootstrap 1.0.81ubuntu2.1 - https://lists.ubuntu.com/archives/yakkety-changes/2016-October/011358.html * flashplugin-nonfree 11.2.202.643ubuntu0.16.10.1 - https://lists.ubuntu.com/archives/yakkety-changes/2016-October/011359.html * ubuntu-image 0.9+16.10ubuntu1 - https://lists.ubuntu.com/archives/yakkety-changes/2016-October/011360.html * flashplugin-nonfree 11.2.202.643ubuntu0.16.10.1 - https://lists.ubuntu.com/archives/yakkety-changes/2016-October/011361.html * ubuntu-image 0.10+16.10ubuntu1 - https://lists.ubuntu.com/archives/yakkety-changes/2016-October/011362.html * python-rfc3986 0.2.2-0ubuntu0.16.10.1 - https://lists.ubuntu.com/archives/yakkety-changes/2016-October/011363.html * ubuntu-themes 16.10+16.10.20161024-0ubuntu1 - https://lists.ubuntu.com/archives/yakkety-changes/2016-October/011364.html * nautilus 1:3.20.3-1ubuntu3.1 - https://lists.ubuntu.com/archives/yakkety-changes/2016-October/011365.html * snapd 2.16+16.10ubuntu1.2 - https://lists.ubuntu.com/archives/yakkety-changes/2016-October/011366.html * webbrowser-app 0.23+16.10.20161018-0ubuntu1 - https://lists.ubuntu.com/archives/yakkety-changes/2016-October/011367.html * nginx 1.10.1-0ubuntu1.2 - https://lists.ubuntu.com/archives/yakkety-changes/2016-October/011368.html * snapcraft 2.20+16.10 - https://lists.ubuntu.com/archives/yakkety-changes/2016-October/011369.html * nginx 1.10.1-0ubuntu1.2 - https://lists.ubuntu.com/archives/yakkety-changes/2016-October/011370.html * firefox 49.0.2+build2-0ubuntu0.16.10.2 - https://lists.ubuntu.com/archives/yakkety-changes/2016-October/011371.html * thunderbird 1:45.4.0+build1-0ubuntu0.16.10.1 - https://lists.ubuntu.com/archives/yakkety-changes/2016-October/011372.html * juju-core 2.0.0-0ubuntu0.16.10.1 - https://lists.ubuntu.com/archives/yakkety-changes/2016-October/011373.html * postgresql-9.5 9.5.5-0ubuntu0.16.10 - https://lists.ubuntu.com/archives/yakkety-changes/2016-October/011374.html * firefox 49.0.2+build2-0ubuntu0.16.10.2 - https://lists.ubuntu.com/archives/yakkety-changes/2016-October/011375.html * thunderbird 1:45.4.0+build1-0ubuntu0.16.10.1 - https://lists.ubuntu.com/archives/yakkety-changes/2016-October/011376.html * debootstrap 1.0.81ubuntu2.1 - https://lists.ubuntu.com/archives/yakkety-changes/2016-October/011377.html * zfs-linux 0.6.5.8-0ubuntu4.1 - https://lists.ubuntu.com/archives/yakkety-changes/2016-October/011378.html * grub2 2.02~beta2-36ubuntu11.1 - https://lists.ubuntu.com/archives/yakkety-changes/2016-October/011379.html * grub2-signed 1.74.1 - https://lists.ubuntu.com/archives/yakkety-changes/2016-October/011380.html * shim 0.9+1474479173.6c180c6-0ubuntu1 - https://lists.ubuntu.com/archives/yakkety-changes/2016-October/011381.html End of Life - July 2017 == Subscribe == Get your copy of the Ubuntu Weekly Newsletter delivered each week to you via email at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-news == Archives == You can always find older Ubuntu Weekly Newsletter issues at: https://wiki.ubuntu.com/UbuntuWeeklyNewsletter == Additional Ubuntu News == As always you can find more news and announcements at: http://insights.ubuntu.com/ and http://fridge.ubuntu.com/ == Conclusion == Thank you for reading the Ubuntu Weekly Newsletter. See you next week! == Credits == The Ubuntu Weekly Newsletter is brought to you by: * Elizabeth K. Joseph * Chris Guiver * Chris Sirrs * Simon Quigley * Paul White * And many others == Glossary of Terms == Other acronyms can be found at https://wiki.ubuntu.com/UbuntuWeeklyNewsletter/glossary == Ubuntu - Get Involved == The Ubuntu community consists of individuals and teams, working on different aspects of the distribution, giving advice and technical support, and helping to promote Ubuntu to a wider audience. No contribution is too small, and anyone can help. It's your chance to get in on all the community fun associated with developing and promoting Ubuntu. http://community.ubuntu.com/contribute/ Or get involved with the Ubuntu Weekly Newsletter team! We always need summary writers and editors, if you're interested, learn more at: https://wiki.ubuntu.com/UbuntuWeeklyNewsletter/Join == Feedback == This document is maintained by the Ubuntu Weekly News Team. If you have a story idea or suggestions for the Weekly Newsletter, join the
-
Fractal Design's latest Define case, the Define C, promises ATX expandability in a mid-tower that's no larger than some microATX cases. We put the Define C to the test to see whether Fractal's fat-trimming added any compromises on the way. Read more: http://techreport.com/review/30904/fractal-design-define-c-case-reviewed --- The Tech Report - PC Hardware Explored http://techreport.com -- To unsubscribe from: TR-News, just follow this link: http://node1.techreport.com/cgi-bin/dada/mail.cgi/u/trnews/reviewnews// Click this link, or copy and paste the address into your browser.
-
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ===================================================================== Red Hat Security Advisory Synopsis: Important: bind97 security update Advisory ID: RHSA-2016:2142-01 Product: Red Hat Enterprise Linux Advisory URL: https://rhn.redhat.com/errata/RHSA-2016-2142.html Issue date: 2016-11-02 CVE Names: CVE-2016-8864 ===================================================================== 1. Summary: An update for bind97 is now available for Red Hat Enterprise Linux 5. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. 2. Relevant releases/architectures: Red Hat Enterprise Linux (v. 5 server) - i386, ia64, ppc, s390x, x86_64 Red Hat Enterprise Linux Desktop Workstation (v. 5 client) - i386, x86_64 3. Description: The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. Security Fix(es): * A denial of service flaw was found in the way BIND handled responses containing a DNAME answer. A remote attacker could use this flaw to make named exit unexpectedly with an assertion failure via a specially crafted DNS response. (CVE-2016-8864) Red Hat would like to thank ISC for reporting this issue. Upstream acknowledges Tony Finch (University of Cambridge) and Marco Davids (SIDN Labs) as the original reporters. 4. Solution: For details on how to apply this update, which includes the changes described in this advisory, refer to: https://access.redhat.com/articles/11258 After installing the update, the BIND daemon (named) will be restarted automatically. 5. Bugs fixed (https://bugzilla.redhat.com/): 1389652 - CVE-2016-8864 bind: assertion failure while handling responses containing a DNAME answer 6. Package List: Red Hat Enterprise Linux Desktop Workstation (v. 5 client): Source: bind97-9.7.0-21.P2.el5_11.9.src.rpm i386: bind97-9.7.0-21.P2.el5_11.9.i386.rpm bind97-chroot-9.7.0-21.P2.el5_11.9.i386.rpm bind97-debuginfo-9.7.0-21.P2.el5_11.9.i386.rpm bind97-devel-9.7.0-21.P2.el5_11.9.i386.rpm bind97-libs-9.7.0-21.P2.el5_11.9.i386.rpm bind97-utils-9.7.0-21.P2.el5_11.9.i386.rpm x86_64: bind97-9.7.0-21.P2.el5_11.9.x86_64.rpm bind97-chroot-9.7.0-21.P2.el5_11.9.x86_64.rpm bind97-debuginfo-9.7.0-21.P2.el5_11.9.i386.rpm bind97-debuginfo-9.7.0-21.P2.el5_11.9.x86_64.rpm bind97-devel-9.7.0-21.P2.el5_11.9.i386.rpm bind97-devel-9.7.0-21.P2.el5_11.9.x86_64.rpm bind97-libs-9.7.0-21.P2.el5_11.9.i386.rpm bind97-libs-9.7.0-21.P2.el5_11.9.x86_64.rpm bind97-utils-9.7.0-21.P2.el5_11.9.x86_64.rpm Red Hat Enterprise Linux (v. 5 server): Source: bind97-9.7.0-21.P2.el5_11.9.src.rpm i386: bind97-9.7.0-21.P2.el5_11.9.i386.rpm bind97-chroot-9.7.0-21.P2.el5_11.9.i386.rpm bind97-debuginfo-9.7.0-21.P2.el5_11.9.i386.rpm bind97-devel-9.7.0-21.P2.el5_11.9.i386.rpm bind97-libs-9.7.0-21.P2.el5_11.9.i386.rpm bind97-utils-9.7.0-21.P2.el5_11.9.i386.rpm ia64: bind97-9.7.0-21.P2.el5_11.9.ia64.rpm bind97-chroot-9.7.0-21.P2.el5_11.9.ia64.rpm bind97-debuginfo-9.7.0-21.P2.el5_11.9.ia64.rpm bind97-devel-9.7.0-21.P2.el5_11.9.ia64.rpm bind97-libs-9.7.0-21.P2.el5_11.9.ia64.rpm bind97-utils-9.7.0-21.P2.el5_11.9.ia64.rpm ppc: bind97-9.7.0-21.P2.el5_11.9.ppc.rpm bind97-chroot-9.7.0-21.P2.el5_11.9.ppc.rpm bind97-debuginfo-9.7.0-21.P2.el5_11.9.ppc.rpm bind97-debuginfo-9.7.0-21.P2.el5_11.9.ppc64.rpm bind97-devel-9.7.0-21.P2.el5_11.9.ppc.rpm bind97-devel-9.7.0-21.P2.el5_11.9.ppc64.rpm bind97-libs-9.7.0-21.P2.el5_11.9.ppc.rpm bind97-libs-9.7.0-21.P2.el5_11.9.ppc64.rpm bind97-utils-9.7.0-21.P2.el5_11.9.ppc.rpm s390x: bind97-9.7.0-21.P2.el5_11.9.s390x.rpm bind97-chroot-9.7.0-21.P2.el5_11.9.s390x.rpm bind97-debuginfo-9.7.0-21.P2.el5_11.9.s390.rpm bind97-debuginfo-9.7.0-21.P2.el5_11.9.s390x.rpm bind97-devel-9.7.0-21.P2.el5_11.9.s390.rpm bind97-devel-9.7.0-21.P2.el5_11.9.s390x.rpm bind97-libs-9.7.0-21.P2.el5_11.9.s390.rpm bind97-libs-9.7.0-21.P2.el5_11.9.s390x.rpm bind97-utils-9.7.0-21.P2.el5_11.9.s390x.rpm x86_64: bind97-9.7.0-21.P2.el5_11.9.x86_64.rpm bind97-chroot-9.7.0-21.P2.el5_11.9.x86_64.rpm bind97-debuginfo-9.7.0-21.P2.el5_11.9.i386.rpm bind97-debuginfo-9.7.0-21.P2.el5_11.9.x86_64.rpm bind97-devel-9.7.0-21.P2.el5_11.9.i386.rpm bind97-devel-9.7.0-21.P2.el5_11.9.x86_64.rpm bind97-libs-9.7.0-21.P2.el5_11.9.i386.rpm bind97-libs-9.7.0-21.P2.el5_11.9.x86_64.rpm bind97-utils-9.7.0-21.P2.el5_11.9.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/ 7. References: https://access.redhat.com/security/cve/CVE-2016-8864 https://access.redhat.com/security/updates/classification/#important https://kb.isc.org/article/AA-01434 8. Contact: The Red Hat security contact is . More contact details at https://access.redhat.com/security/team/contact/ Copyright 2016 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iD8DBQFYGhs5XlSAg2UNWIIRAuuvAKCPRQwoplrK9grbRWWbnQ7YwzjNcACfczui OdTNJjTRz4T6sInzlKm7+sc= =DJTn -----END PGP SIGNATURE----- --
-
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ===================================================================== Red Hat Security Advisory Synopsis: Important: bind security update Advisory ID: RHSA-2016:2141-01 Product: Red Hat Enterprise Linux Advisory URL: https://rhn.redhat.com/errata/RHSA-2016-2141.html Issue date: 2016-11-02 CVE Names: CVE-2016-8864 ===================================================================== 1. Summary: An update for bind is now available for Red Hat Enterprise Linux 5 and Red Hat Enterprise Linux 6. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. 2. Relevant releases/architectures: Red Hat Enterprise Linux (v. 5 server) - i386, ia64, ppc, s390x, x86_64 Red Hat Enterprise Linux Desktop (v. 5 client) - i386, x86_64 Red Hat Enterprise Linux Desktop (v. 6) - i386, x86_64 Red Hat Enterprise Linux Desktop Optional (v. 6) - i386, x86_64 Red Hat Enterprise Linux Desktop Workstation (v. 5 client) - i386, x86_64 Red Hat Enterprise Linux HPC Node (v. 6) - x86_64 Red Hat Enterprise Linux HPC Node Optional (v. 6) - x86_64 Red Hat Enterprise Linux Server (v. 6) - i386, ppc64, s390x, x86_64 Red Hat Enterprise Linux Server Optional (v. 6) - i386, ppc64, s390x, x86_64 Red Hat Enterprise Linux Workstation (v. 6) - i386, x86_64 Red Hat Enterprise Linux Workstation Optional (v. 6) - i386, x86_64 3. Description: The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. Security Fix(es): * A denial of service flaw was found in the way BIND handled responses containing a DNAME answer. A remote attacker could use this flaw to make named exit unexpectedly with an assertion failure via a specially crafted DNS response. (CVE-2016-8864) Red Hat would like to thank ISC for reporting this issue. Upstream acknowledges Tony Finch (University of Cambridge) and Marco Davids (SIDN Labs) as the original reporters. 4. Solution: For details on how to apply this update, which includes the changes described in this advisory, refer to: https://access.redhat.com/articles/11258 After installing the update, the BIND daemon (named) will be restarted automatically. 5. Bugs fixed (https://bugzilla.redhat.com/): 1389652 - CVE-2016-8864 bind: assertion failure while handling responses containing a DNAME answer 6. Package List: Red Hat Enterprise Linux Desktop (v. 5 client): Source: bind-9.3.6-25.P1.el5_11.11.src.rpm i386: bind-9.3.6-25.P1.el5_11.11.i386.rpm bind-debuginfo-9.3.6-25.P1.el5_11.11.i386.rpm bind-libs-9.3.6-25.P1.el5_11.11.i386.rpm bind-sdb-9.3.6-25.P1.el5_11.11.i386.rpm bind-utils-9.3.6-25.P1.el5_11.11.i386.rpm x86_64: bind-9.3.6-25.P1.el5_11.11.x86_64.rpm bind-debuginfo-9.3.6-25.P1.el5_11.11.i386.rpm bind-debuginfo-9.3.6-25.P1.el5_11.11.x86_64.rpm bind-libs-9.3.6-25.P1.el5_11.11.i386.rpm bind-libs-9.3.6-25.P1.el5_11.11.x86_64.rpm bind-sdb-9.3.6-25.P1.el5_11.11.x86_64.rpm bind-utils-9.3.6-25.P1.el5_11.11.x86_64.rpm Red Hat Enterprise Linux Desktop Workstation (v. 5 client): Source: bind-9.3.6-25.P1.el5_11.11.src.rpm i386: bind-chroot-9.3.6-25.P1.el5_11.11.i386.rpm bind-debuginfo-9.3.6-25.P1.el5_11.11.i386.rpm bind-devel-9.3.6-25.P1.el5_11.11.i386.rpm bind-libbind-devel-9.3.6-25.P1.el5_11.11.i386.rpm caching-nameserver-9.3.6-25.P1.el5_11.11.i386.rpm x86_64: bind-chroot-9.3.6-25.P1.el5_11.11.x86_64.rpm bind-debuginfo-9.3.6-25.P1.el5_11.11.i386.rpm bind-debuginfo-9.3.6-25.P1.el5_11.11.x86_64.rpm bind-devel-9.3.6-25.P1.el5_11.11.i386.rpm bind-devel-9.3.6-25.P1.el5_11.11.x86_64.rpm bind-libbind-devel-9.3.6-25.P1.el5_11.11.i386.rpm bind-libbind-devel-9.3.6-25.P1.el5_11.11.x86_64.rpm caching-nameserver-9.3.6-25.P1.el5_11.11.x86_64.rpm Red Hat Enterprise Linux (v. 5 server): Source: bind-9.3.6-25.P1.el5_11.11.src.rpm i386: bind-9.3.6-25.P1.el5_11.11.i386.rpm bind-chroot-9.3.6-25.P1.el5_11.11.i386.rpm bind-debuginfo-9.3.6-25.P1.el5_11.11.i386.rpm bind-devel-9.3.6-25.P1.el5_11.11.i386.rpm bind-libbind-devel-9.3.6-25.P1.el5_11.11.i386.rpm bind-libs-9.3.6-25.P1.el5_11.11.i386.rpm bind-sdb-9.3.6-25.P1.el5_11.11.i386.rpm bind-utils-9.3.6-25.P1.el5_11.11.i386.rpm caching-nameserver-9.3.6-25.P1.el5_11.11.i386.rpm ia64: bind-9.3.6-25.P1.el5_11.11.ia64.rpm bind-chroot-9.3.6-25.P1.el5_11.11.ia64.rpm bind-debuginfo-9.3.6-25.P1.el5_11.11.i386.rpm bind-debuginfo-9.3.6-25.P1.el5_11.11.ia64.rpm bind-devel-9.3.6-25.P1.el5_11.11.ia64.rpm bind-libbind-devel-9.3.6-25.P1.el5_11.11.ia64.rpm bind-libs-9.3.6-25.P1.el5_11.11.i386.rpm bind-libs-9.3.6-25.P1.el5_11.11.ia64.rpm bind-sdb-9.3.6-25.P1.el5_11.11.ia64.rpm bind-utils-9.3.6-25.P1.el5_11.11.ia64.rpm caching-nameserver-9.3.6-25.P1.el5_11.11.ia64.rpm ppc: bind-9.3.6-25.P1.el5_11.11.ppc.rpm bind-chroot-9.3.6-25.P1.el5_11.11.ppc.rpm bind-debuginfo-9.3.6-25.P1.el5_11.11.ppc.rpm bind-debuginfo-9.3.6-25.P1.el5_11.11.ppc64.rpm bind-devel-9.3.6-25.P1.el5_11.11.ppc.rpm bind-devel-9.3.6-25.P1.el5_11.11.ppc64.rpm bind-libbind-devel-9.3.6-25.P1.el5_11.11.ppc.rpm bind-libbind-devel-9.3.6-25.P1.el5_11.11.ppc64.rpm bind-libs-9.3.6-25.P1.el5_11.11.ppc.rpm bind-libs-9.3.6-25.P1.el5_11.11.ppc64.rpm bind-sdb-9.3.6-25.P1.el5_11.11.ppc.rpm bind-utils-9.3.6-25.P1.el5_11.11.ppc.rpm caching-nameserver-9.3.6-25.P1.el5_11.11.ppc.rpm s390x: bind-9.3.6-25.P1.el5_11.11.s390x.rpm bind-chroot-9.3.6-25.P1.el5_11.11.s390x.rpm bind-debuginfo-9.3.6-25.P1.el5_11.11.s390.rpm bind-debuginfo-9.3.6-25.P1.el5_11.11.s390x.rpm bind-devel-9.3.6-25.P1.el5_11.11.s390.rpm bind-devel-9.3.6-25.P1.el5_11.11.s390x.rpm bind-libbind-devel-9.3.6-25.P1.el5_11.11.s390.rpm bind-libbind-devel-9.3.6-25.P1.el5_11.11.s390x.rpm bind-libs-9.3.6-25.P1.el5_11.11.s390.rpm bind-libs-9.3.6-25.P1.el5_11.11.s390x.rpm bind-sdb-9.3.6-25.P1.el5_11.11.s390x.rpm bind-utils-9.3.6-25.P1.el5_11.11.s390x.rpm caching-nameserver-9.3.6-25.P1.el5_11.11.s390x.rpm x86_64: bind-9.3.6-25.P1.el5_11.11.x86_64.rpm bind-chroot-9.3.6-25.P1.el5_11.11.x86_64.rpm bind-debuginfo-9.3.6-25.P1.el5_11.11.i386.rpm bind-debuginfo-9.3.6-25.P1.el5_11.11.x86_64.rpm bind-devel-9.3.6-25.P1.el5_11.11.i386.rpm bind-devel-9.3.6-25.P1.el5_11.11.x86_64.rpm bind-libbind-devel-9.3.6-25.P1.el5_11.11.i386.rpm bind-libbind-devel-9.3.6-25.P1.el5_11.11.x86_64.rpm bind-libs-9.3.6-25.P1.el5_11.11.i386.rpm bind-libs-9.3.6-25.P1.el5_11.11.x86_64.rpm bind-sdb-9.3.6-25.P1.el5_11.11.x86_64.rpm bind-utils-9.3.6-25.P1.el5_11.11.x86_64.rpm caching-nameserver-9.3.6-25.P1.el5_11.11.x86_64.rpm Red Hat Enterprise Linux Desktop (v. 6): Source: bind-9.8.2-0.47.rc1.el6_8.3.src.rpm i386: bind-debuginfo-9.8.2-0.47.rc1.el6_8.3.i686.rpm bind-libs-9.8.2-0.47.rc1.el6_8.3.i686.rpm bind-utils-9.8.2-0.47.rc1.el6_8.3.i686.rpm x86_64: bind-debuginfo-9.8.2-0.47.rc1.el6_8.3.i686.rpm bind-debuginfo-9.8.2-0.47.rc1.el6_8.3.x86_64.rpm bind-libs-9.8.2-0.47.rc1.el6_8.3.i686.rpm bind-libs-9.8.2-0.47.rc1.el6_8.3.x86_64.rpm bind-utils-9.8.2-0.47.rc1.el6_8.3.x86_64.rpm Red Hat Enterprise Linux Desktop Optional (v. 6): i386: bind-9.8.2-0.47.rc1.el6_8.3.i686.rpm bind-chroot-9.8.2-0.47.rc1.el6_8.3.i686.rpm bind-debuginfo-9.8.2-0.47.rc1.el6_8.3.i686.rpm bind-devel-9.8.2-0.47.rc1.el6_8.3.i686.rpm bind-sdb-9.8.2-0.47.rc1.el6_8.3.i686.rpm x86_64: bind-9.8.2-0.47.rc1.el6_8.3.x86_64.rpm bind-chroot-9.8.2-0.47.rc1.el6_8.3.x86_64.rpm bind-debuginfo-9.8.2-0.47.rc1.el6_8.3.i686.rpm bind-debuginfo-9.8.2-0.47.rc1.el6_8.3.x86_64.rpm bind-devel-9.8.2-0.47.rc1.el6_8.3.i686.rpm bind-devel-9.8.2-0.47.rc1.el6_8.3.x86_64.rpm bind-sdb-9.8.2-0.47.rc1.el6_8.3.x86_64.rpm Red Hat Enterprise Linux HPC Node (v. 6): Source: bind-9.8.2-0.47.rc1.el6_8.3.src.rpm x86_64: bind-debuginfo-9.8.2-0.47.rc1.el6_8.3.i686.rpm bind-debuginfo-9.8.2-0.47.rc1.el6_8.3.x86_64.rpm bind-libs-9.8.2-0.47.rc1.el6_8.3.i686.rpm bind-libs-9.8.2-0.47.rc1.el6_8.3.x86_64.rpm bind-utils-9.8.2-0.47.rc1.el6_8.3.x86_64.rpm Red Hat Enterprise Linux HPC Node Optional (v. 6): x86_64: bind-9.8.2-0.47.rc1.el6_8.3.x86_64.rpm bind-chroot-9.8.2-0.47.rc1.el6_8.3.x86_64.rpm bind-debuginfo-9.8.2-0.47.rc1.el6_8.3.i686.rpm bind-debuginfo-9.8.2-0.47.rc1.el6_8.3.x86_64.rpm bind-devel-9.8.2-0.47.rc1.el6_8.3.i686.rpm bind-devel-9.8.2-0.47.rc1.el6_8.3.x86_64.rpm bind-sdb-9.8.2-0.47.rc1.el6_8.3.x86_64.rpm Red Hat Enterprise Linux Server (v. 6): Source: bind-9.8.2-0.47.rc1.el6_8.3.src.rpm i386: bind-9.8.2-0.47.rc1.el6_8.3.i686.rpm bind-chroot-9.8.2-0.47.rc1.el6_8.3.i686.rpm bind-debuginfo-9.8.2-0.47.rc1.el6_8.3.i686.rpm bind-libs-9.8.2-0.47.rc1.el6_8.3.i686.rpm bind-utils-9.8.2-0.47.rc1.el6_8.3.i686.rpm ppc64: bind-9.8.2-0.47.rc1.el6_8.3.ppc64.rpm bind-chroot-9.8.2-0.47.rc1.el6_8.3.ppc64.rpm bind-debuginfo-9.8.2-0.47.rc1.el6_8.3.ppc.rpm bind-debuginfo-9.8.2-0.47.rc1.el6_8.3.ppc64.rpm bind-libs-9.8.2-0.47.rc1.el6_8.3.ppc.rpm bind-libs-9.8.2-0.47.rc1.el6_8.3.ppc64.rpm bind-utils-9.8.2-0.47.rc1.el6_8.3.ppc64.rpm s390x: bind-9.8.2-0.47.rc1.el6_8.3.s390x.rpm bind-chroot-9.8.2-0.47.rc1.el6_8.3.s390x.rpm bind-debuginfo-9.8.2-0.47.rc1.el6_8.3.s390.rpm bind-debuginfo-9.8.2-0.47.rc1.el6_8.3.s390x.rpm bind-libs-9.8.2-0.47.rc1.el6_8.3.s390.rpm bind-libs-9.8.2-0.47.rc1.el6_8.3.s390x.rpm bind-utils-9.8.2-0.47.rc1.el6_8.3.s390x.rpm x86_64: bind-9.8.2-0.47.rc1.el6_8.3.x86_64.rpm bind-chroot-9.8.2-0.47.rc1.el6_8.3.x86_64.rpm bind-debuginfo-9.8.2-0.47.rc1.el6_8.3.i686.rpm bind-debuginfo-9.8.2-0.47.rc1.el6_8.3.x86_64.rpm bind-libs-9.8.2-0.47.rc1.el6_8.3.i686.rpm bind-libs-9.8.2-0.47.rc1.el6_8.3.x86_64.rpm bind-utils-9.8.2-0.47.rc1.el6_8.3.x86_64.rpm Red Hat Enterprise Linux Server Optional (v. 6): i386: bind-debuginfo-9.8.2-0.47.rc1.el6_8.3.i686.rpm bind-devel-9.8.2-0.47.rc1.el6_8.3.i686.rpm bind-sdb-9.8.2-0.47.rc1.el6_8.3.i686.rpm ppc64: bind-debuginfo-9.8.2-0.47.rc1.el6_8.3.ppc.rpm bind-debuginfo-9.8.2-0.47.rc1.el6_8.3.ppc64.rpm bind-devel-9.8.2-0.47.rc1.el6_8.3.ppc.rpm bind-devel-9.8.2-0.47.rc1.el6_8.3.ppc64.rpm bind-sdb-9.8.2-0.47.rc1.el6_8.3.ppc64.rpm s390x: bind-debuginfo-9.8.2-0.47.rc1.el6_8.3.s390.rpm bind-debuginfo-9.8.2-0.47.rc1.el6_8.3.s390x.rpm bind-devel-9.8.2-0.47.rc1.el6_8.3.s390.rpm bind-devel-9.8.2-0.47.rc1.el6_8.3.s390x.rpm bind-sdb-9.8.2-0.47.rc1.el6_8.3.s390x.rpm x86_64: bind-debuginfo-9.8.2-0.47.rc1.el6_8.3.i686.rpm bind-debuginfo-9.8.2-0.47.rc1.el6_8.3.x86_64.rpm bind-devel-9.8.2-0.47.rc1.el6_8.3.i686.rpm bind-devel-9.8.2-0.47.rc1.el6_8.3.x86_64.rpm bind-sdb-9.8.2-0.47.rc1.el6_8.3.x86_64.rpm Red Hat Enterprise Linux Workstation (v. 6): Source: bind-9.8.2-0.47.rc1.el6_8.3.src.rpm i386: bind-9.8.2-0.47.rc1.el6_8.3.i686.rpm bind-chroot-9.8.2-0.47.rc1.el6_8.3.i686.rpm bind-debuginfo-9.8.2-0.47.rc1.el6_8.3.i686.rpm bind-libs-9.8.2-0.47.rc1.el6_8.3.i686.rpm bind-utils-9.8.2-0.47.rc1.el6_8.3.i686.rpm x86_64: bind-9.8.2-0.47.rc1.el6_8.3.x86_64.rpm bind-chroot-9.8.2-0.47.rc1.el6_8.3.x86_64.rpm bind-debuginfo-9.8.2-0.47.rc1.el6_8.3.i686.rpm bind-debuginfo-9.8.2-0.47.rc1.el6_8.3.x86_64.rpm bind-libs-9.8.2-0.47.rc1.el6_8.3.i686.rpm bind-libs-9.8.2-0.47.rc1.el6_8.3.x86_64.rpm bind-utils-9.8.2-0.47.rc1.el6_8.3.x86_64.rpm Red Hat Enterprise Linux Workstation Optional (v. 6): i386: bind-debuginfo-9.8.2-0.47.rc1.el6_8.3.i686.rpm bind-devel-9.8.2-0.47.rc1.el6_8.3.i686.rpm bind-sdb-9.8.2-0.47.rc1.el6_8.3.i686.rpm x86_64: bind-debuginfo-9.8.2-0.47.rc1.el6_8.3.i686.rpm bind-debuginfo-9.8.2-0.47.rc1.el6_8.3.x86_64.rpm bind-devel-9.8.2-0.47.rc1.el6_8.3.i686.rpm bind-devel-9.8.2-0.47.rc1.el6_8.3.x86_64.rpm bind-sdb-9.8.2-0.47.rc1.el6_8.3.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/ 7. References: https://access.redhat.com/security/cve/CVE-2016-8864 https://access.redhat.com/security/updates/classification/#important https://kb.isc.org/article/AA-01434 8. Contact: The Red Hat security contact is . More contact details at https://access.redhat.com/security/team/contact/ Copyright 2016 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iD8DBQFYGiVaXlSAg2UNWIIRAtEHAJ4yv9COTrqlLpjBReYD/AP/s9QmMgCdFUJJ 4EFHv2intcb25OFopZzK4UA= =/+fr -----END PGP SIGNATURE----- --
-
[security-announce] SUSE-SU-2016:2706-1: important: Security update for bind
news posted a topic in Upcoming News
SUSE Security Update: Security update for bind ______________________________________________________________________________ Announcement ID: SUSE-SU-2016:2706-1 Rating: important References: #1007829 #965748 Cross-References: CVE-2016-8864 Affected Products: SUSE OpenStack Cloud 5 SUSE Manager Proxy 2.1 SUSE Manager 2.1 SUSE Linux Enterprise Software Development Kit 11-SP4 SUSE Linux Enterprise Server 11-SP4 SUSE Linux Enterprise Server 11-SP3-LTSS SUSE Linux Enterprise Server 11-SP2-LTSS SUSE Linux Enterprise Point of Sale 11-SP3 SUSE Linux Enterprise Debuginfo 11-SP4 SUSE Linux Enterprise Debuginfo 11-SP3 SUSE Linux Enterprise Debuginfo 11-SP2 ______________________________________________________________________________ An update that solves one vulnerability and has one errata is now available. Description: This update for bind fixes the following issues: - A defect in BIND's handling of responses containing a DNAME answer had the potential to trigger assertion errors in the server remotely, thereby facilitating a denial-of-service attack. (CVE-2016-8864, bsc#1007829). - Fix BIND to return a valid hostname in response to ldapdump queries. (bsc#965748) Patch Instructions: To install this SUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product: - SUSE OpenStack Cloud 5: zypper in -t patch sleclo50sp3-bind-12829=1 - SUSE Manager Proxy 2.1: zypper in -t patch slemap21-bind-12829=1 - SUSE Manager 2.1: zypper in -t patch sleman21-bind-12829=1 - SUSE Linux Enterprise Software Development Kit 11-SP4: zypper in -t patch sdksp4-bind-12829=1 - SUSE Linux Enterprise Server 11-SP4: zypper in -t patch slessp4-bind-12829=1 - SUSE Linux Enterprise Server 11-SP3-LTSS: zypper in -t patch slessp3-bind-12829=1 - SUSE Linux Enterprise Server 11-SP2-LTSS: zypper in -t patch slessp2-bind-12829=1 - SUSE Linux Enterprise Point of Sale 11-SP3: zypper in -t patch sleposp3-bind-12829=1 - SUSE Linux Enterprise Debuginfo 11-SP4: zypper in -t patch dbgsp4-bind-12829=1 - SUSE Linux Enterprise Debuginfo 11-SP3: zypper in -t patch dbgsp3-bind-12829=1 - SUSE Linux Enterprise Debuginfo 11-SP2: zypper in -t patch dbgsp2-bind-12829=1 To bring your system up-to-date, use "zypper patch". Package List: - SUSE OpenStack Cloud 5 (x86_64): bind-9.9.6P1-0.33.1 bind-chrootenv-9.9.6P1-0.33.1 bind-doc-9.9.6P1-0.33.1 bind-libs-32bit-9.9.6P1-0.33.1 bind-libs-9.9.6P1-0.33.1 bind-utils-9.9.6P1-0.33.1 - SUSE Manager Proxy 2.1 (x86_64): bind-9.9.6P1-0.33.1 bind-chrootenv-9.9.6P1-0.33.1 bind-doc-9.9.6P1-0.33.1 bind-libs-32bit-9.9.6P1-0.33.1 bind-libs-9.9.6P1-0.33.1 bind-utils-9.9.6P1-0.33.1 - SUSE Manager 2.1 (s390x x86_64): bind-9.9.6P1-0.33.1 bind-chrootenv-9.9.6P1-0.33.1 bind-doc-9.9.6P1-0.33.1 bind-libs-32bit-9.9.6P1-0.33.1 bind-libs-9.9.6P1-0.33.1 bind-utils-9.9.6P1-0.33.1 - SUSE Linux Enterprise Software Development Kit 11-SP4 (i586 ia64 ppc64 s390x x86_64): bind-devel-9.9.6P1-0.33.1 - SUSE Linux Enterprise Software Development Kit 11-SP4 (ppc64): bind-devel-32bit-9.9.6P1-0.33.1 - SUSE Linux Enterprise Server 11-SP4 (i586 ia64 ppc64 s390x x86_64): bind-9.9.6P1-0.33.1 bind-chrootenv-9.9.6P1-0.33.1 bind-doc-9.9.6P1-0.33.1 bind-libs-9.9.6P1-0.33.1 bind-utils-9.9.6P1-0.33.1 - SUSE Linux Enterprise Server 11-SP4 (ppc64 s390x x86_64): bind-libs-32bit-9.9.6P1-0.33.1 - SUSE Linux Enterprise Server 11-SP4 (ia64): bind-libs-x86-9.9.6P1-0.33.1 - SUSE Linux Enterprise Server 11-SP3-LTSS (i586 s390x x86_64): bind-9.9.6P1-0.33.1 bind-chrootenv-9.9.6P1-0.33.1 bind-doc-9.9.6P1-0.33.1 bind-libs-9.9.6P1-0.33.1 bind-utils-9.9.6P1-0.33.1 - SUSE Linux Enterprise Server 11-SP3-LTSS (s390x x86_64): bind-libs-32bit-9.9.6P1-0.33.1 - SUSE Linux Enterprise Server 11-SP2-LTSS (i586 s390x x86_64): bind-9.9.6P1-0.33.1 bind-chrootenv-9.9.6P1-0.33.1 bind-devel-9.9.6P1-0.33.1 bind-doc-9.9.6P1-0.33.1 bind-libs-9.9.6P1-0.33.1 bind-utils-9.9.6P1-0.33.1 - SUSE Linux Enterprise Server 11-SP2-LTSS (s390x x86_64): bind-libs-32bit-9.9.6P1-0.33.1 - SUSE Linux Enterprise Point of Sale 11-SP3 (i586): bind-9.9.6P1-0.33.1 bind-chrootenv-9.9.6P1-0.33.1 bind-doc-9.9.6P1-0.33.1 bind-libs-9.9.6P1-0.33.1 bind-utils-9.9.6P1-0.33.1 - SUSE Linux Enterprise Debuginfo 11-SP4 (i586 ia64 ppc64 s390x x86_64): bind-debuginfo-9.9.6P1-0.33.1 bind-debugsource-9.9.6P1-0.33.1 - SUSE Linux Enterprise Debuginfo 11-SP3 (i586 s390x x86_64): bind-debuginfo-9.9.6P1-0.33.1 bind-debugsource-9.9.6P1-0.33.1 - SUSE Linux Enterprise Debuginfo 11-SP2 (i586 s390x x86_64): bind-debuginfo-9.9.6P1-0.33.1 bind-debugsource-9.9.6P1-0.33.1 References: https://www.suse.com/security/cve/CVE-2016-8864.html https://bugzilla.suse.com/1007829 https://bugzilla.suse.com/965748 -- To unsubscribe, e-mail: opensuse-security-announce+unsubscribe ( -at -) opensuse.org For additional commands, e-mail: opensuse-security-announce+help ( -at -) opensuse.org -
[CentOS-announce] CESA-2016:2141 Important CentOS 5 bind Security Update
news posted a topic in Upcoming News
CentOS Errata and Security Advisory 2016:2141 Important Upstream details at : https://rhn.redhat.com/errata/RHSA-2016-2141.html The following updated files have been uploaded and are currently syncing to the mirrors: ( sha256sum Filename ) i386: 3e2d58dc776ab061309890162ebae0b602c6d29e8a0c752f8e57e9f65d5cb390 bind-9.3.6-25.P1.el5_11.11.i386.rpm 3ab9710ea4dc8cb9add7ed7f7e67ebc8065738c69854481ce7127fec0067e619 bind-chroot-9.3.6-25.P1.el5_11.11.i386.rpm aca3bedae5c7cdbdf6a08efb1e3a860119af0f45ddffcd73e0a88cc907ef0d92 bind-devel-9.3.6-25.P1.el5_11.11.i386.rpm 42a8a2b0b0dfc88da188014819c7b4284fc74024aa778c6da60b2812d318efaa bind-libbind-devel-9.3.6-25.P1.el5_11.11.i386.rpm 63c70130106c809fdf2b66bde34b29dc357b80b7bbe9f5c86af8beb71eb4fe74 bind-libs-9.3.6-25.P1.el5_11.11.i386.rpm d0ed73a4ac94cff4b01b1e871eee57e01b5fc6cb229f01570bcaa731a061c465 bind-sdb-9.3.6-25.P1.el5_11.11.i386.rpm b74fdb5985e411a722d446501d4c1ded3aa64953e9de8a05c13115288d54ec2f bind-utils-9.3.6-25.P1.el5_11.11.i386.rpm e678a6e7e6d217b5ff06b138dca80f1a69f893ef23b50389b007464f8589bff4 caching-nameserver-9.3.6-25.P1.el5_11.11.i386.rpm x86_64: 16b4239a8971548908848651973f2763fefeee417d9f99c91f9202823398d669 bind-9.3.6-25.P1.el5_11.11.x86_64.rpm be3cad068fb6962a495c4f232c6847fc0bba38b12758b81bbeaf98f93e2de613 bind-chroot-9.3.6-25.P1.el5_11.11.x86_64.rpm aca3bedae5c7cdbdf6a08efb1e3a860119af0f45ddffcd73e0a88cc907ef0d92 bind-devel-9.3.6-25.P1.el5_11.11.i386.rpm 7d97fb0cd285fef2de6de156d611e485136d953a929e1e9c27fb99ef55febfda bind-devel-9.3.6-25.P1.el5_11.11.x86_64.rpm 42a8a2b0b0dfc88da188014819c7b4284fc74024aa778c6da60b2812d318efaa bind-libbind-devel-9.3.6-25.P1.el5_11.11.i386.rpm 27025805a55d9de451822969c129878fdc900c9cd4927c213be49f32038658d5 bind-libbind-devel-9.3.6-25.P1.el5_11.11.x86_64.rpm 63c70130106c809fdf2b66bde34b29dc357b80b7bbe9f5c86af8beb71eb4fe74 bind-libs-9.3.6-25.P1.el5_11.11.i386.rpm b7f67e002209e7943a2b81593589b89f9d97ef61987f3cd045224d7f4f844372 bind-libs-9.3.6-25.P1.el5_11.11.x86_64.rpm d6480a340a4c5432133a6b615cd88c9b062887749ff8eb3069cf5662f7a689b0 bind-sdb-9.3.6-25.P1.el5_11.11.x86_64.rpm 18aaaf91d307156f1a8d3c747f2ef7c07a8602f5a079b7284f9f6cd6833a70c5 bind-utils-9.3.6-25.P1.el5_11.11.x86_64.rpm d4b2cdf9ea23fef3d97213fba71fa3b96defb469c4eea15c82f0f9c836fa83a0 caching-nameserver-9.3.6-25.P1.el5_11.11.x86_64.rpm Source: 6a0a4af0486ffacd345255202bce1c61ce03e81387f70ac04c5de45b80a054fd bind-9.3.6-25.P1.el5_11.11.src.rpm -- Johnny Hughes CentOS Project { http://www.centos.org/ } irc: hughesjr, #centos ( -at -) irc.freenode.net Twitter: JohnnyCentOS _______________________________________________ -
[CentOS-announce] CESA-2016:2141 Important CentOS 6 bind Security Update
news posted a topic in Upcoming News
CentOS Errata and Security Advisory 2016:2141 Important Upstream details at : https://rhn.redhat.com/errata/RHSA-2016-2141.html The following updated files have been uploaded and are currently syncing to the mirrors: ( sha256sum Filename ) i386: df523a82864171db1137fd9bdb3f68be01add333b3274295cda8801135f2b27a bind-9.8.2-0.47.rc1.el6_8.3.i686.rpm b44cb15db8efa6f933534aa45ab95f2246dddfc88e39baa6ffce4d443dcb9d73 bind-chroot-9.8.2-0.47.rc1.el6_8.3.i686.rpm ead380fa773093d34a29d1b3bb4ffc085b9b4cd083319f962ea2b6fb63316005 bind-devel-9.8.2-0.47.rc1.el6_8.3.i686.rpm 2ea5e764a72941f2b8500b7075555219b8a695d0c931ce04ecb878755aa39bc5 bind-libs-9.8.2-0.47.rc1.el6_8.3.i686.rpm 1fdc17332283ae099bc65a171bf1bbf7ab31ea487503fe9838e07b8ba53525d3 bind-sdb-9.8.2-0.47.rc1.el6_8.3.i686.rpm 09f2740ccaedce3134e41a817023d955a0f56e112f4b3526139db91090d76a23 bind-utils-9.8.2-0.47.rc1.el6_8.3.i686.rpm x86_64: 61d6b8544bade794c10e3ee3a52b694f8d4ae32cc9d70585289eb67738ef5123 bind-9.8.2-0.47.rc1.el6_8.3.x86_64.rpm e70a58174cc79ec54869e6aa5eaacd9eb91af5b3c5f42267fb81cf771e4a4a3c bind-chroot-9.8.2-0.47.rc1.el6_8.3.x86_64.rpm ead380fa773093d34a29d1b3bb4ffc085b9b4cd083319f962ea2b6fb63316005 bind-devel-9.8.2-0.47.rc1.el6_8.3.i686.rpm 443175aad1aab791e7e458690751ae577a33654ce9068efbbc49bdef8767ec60 bind-devel-9.8.2-0.47.rc1.el6_8.3.x86_64.rpm 2ea5e764a72941f2b8500b7075555219b8a695d0c931ce04ecb878755aa39bc5 bind-libs-9.8.2-0.47.rc1.el6_8.3.i686.rpm 103e669378991cd37514fa68b9f080cb2307b1feabbb94d67c923fd2e8b9b40c bind-libs-9.8.2-0.47.rc1.el6_8.3.x86_64.rpm 5db27dfafc208f92b547ad9aca04d44767abf475f575234dc919bea3b3b3372a bind-sdb-9.8.2-0.47.rc1.el6_8.3.x86_64.rpm 654d0c37d628a062b5c29beea67623848dc083a28b61b22aa846741d97b46add bind-utils-9.8.2-0.47.rc1.el6_8.3.x86_64.rpm Source: c3c8756fc27c0e4a61da8b38050ddfd2e099a7056a33aac452ed9dc984e33782 bind-9.8.2-0.47.rc1.el6_8.3.src.rpm -- Johnny Hughes CentOS Project { http://www.centos.org/ } irc: hughesjr, #centos ( -at -) irc.freenode.net Twitter: ( -at -) JohnnyCentOS _______________________________________________ -
[CentOS-announce] CESA-2016:2142 Important CentOS 5 bind97 Security Update
news posted a topic in Upcoming News
CentOS Errata and Security Advisory 2016:2142 Important Upstream details at : https://rhn.redhat.com/errata/RHSA-2016-2142.html The following updated files have been uploaded and are currently syncing to the mirrors: ( sha256sum Filename ) i386: c965d86a42d44fd986446824dc2bdefe6da7efd43f1e7ed2b1180ffcd1540dfe bind97-9.7.0-21.P2.el5_11.9.i386.rpm 9133cefb2a0fb2b3ce49b83b6cea92e6592fca74893e336dfefc4d3af4d988af bind97-chroot-9.7.0-21.P2.el5_11.9.i386.rpm 310768962b680c5732f4cf5e330b2f18f49d6cb38b9f1f2d71f1f2402c4c00d0 bind97-devel-9.7.0-21.P2.el5_11.9.i386.rpm 4d7dd3772d94904c954624caa7bb3ed1d97a2c5dfeb9b1c80ebb1b0346fdf32d bind97-libs-9.7.0-21.P2.el5_11.9.i386.rpm 0bd7ed7494b8f2d58956c70ad4952c310e93c37045314f914716c9a7ddf4b7c1 bind97-utils-9.7.0-21.P2.el5_11.9.i386.rpm x86_64: 401d615f35d1b18aaac9d23336d702fac97a784d7588131ccfd5e1d5df8fb393 bind97-9.7.0-21.P2.el5_11.9.x86_64.rpm c7de4a37902f58bc62b6cf41d56c0f177289799dcdfc1fd2d85ef852e1cefdab bind97-chroot-9.7.0-21.P2.el5_11.9.x86_64.rpm 310768962b680c5732f4cf5e330b2f18f49d6cb38b9f1f2d71f1f2402c4c00d0 bind97-devel-9.7.0-21.P2.el5_11.9.i386.rpm b3dabddc4f094b86194e6d6b81a86b646eeb4b8d414bcdc168a1da26c64e616e bind97-devel-9.7.0-21.P2.el5_11.9.x86_64.rpm 4d7dd3772d94904c954624caa7bb3ed1d97a2c5dfeb9b1c80ebb1b0346fdf32d bind97-libs-9.7.0-21.P2.el5_11.9.i386.rpm 8e01b316ed98030e42cd3c3afcced13cfe1d1ea0cc294bc968f062305c08bf16 bind97-libs-9.7.0-21.P2.el5_11.9.x86_64.rpm d19d762ae8e029ea095c66b62bf21a35020b031b48927b1a8f4252102adc5765 bind97-utils-9.7.0-21.P2.el5_11.9.x86_64.rpm Source: 902a4cbef8d0576c4b11c489ba7e7e225a2a179adadfe09a65f127d185d935f7 bind97-9.7.0-21.P2.el5_11.9.src.rpm -- Johnny Hughes CentOS Project { http://www.centos.org/ } irc: hughesjr, #centos ( -at -) irc.freenode.net Twitter: JohnnyCentOS _______________________________________________ -
View this email in your browser (http://us3.campaign-archive1.com/?u=efc4c507c2cf964fc2462caca&id=41e20f5e06&e=0c004f9c13) External storage is commonplace now, but traditional standalone storage products sometimes leave a large number of devices hanging. I've got a 2TB external drive plugged into a USB 3 port, for example, which is great for the main PC, but it doesn't help much with the laptop, iPhone and iPad. That's where some of the latest wireless storage products like the WD My Passport Wireless Pro we're going to be showing you here comes in. Through creative piggy-backing onto your Wi-Fi network, you can add multiple terabytes of additional storage that can be accessed by any wirelessly-connected device... WD My Passport Wireless Pro Review: Wireless Storage For Mobile Devices (http://hothardware.us3.list-manage.com/track/click?u=efc4c507c2cf964fc2462caca&id=9462932d4f&e=0c004f9c13) http://hothardware.us3.list-manage.com/track/click?u=efc4c507c2cf964fc2462caca&id=7d3a918d95&e=0c004f9c13 http://hothardware.us3.list-manage.com/track/click?u=efc4c507c2cf964fc2462caca&id=4bac8df7ca&e=0c004f9c13 Best Regards, HotHardware.com (http://hothardware.us3.list-manage1.com/track/click?u=efc4c507c2cf964fc2462caca&id=b089d10ac9&e=0c004f9c13) http://hothardware.us3.list-manage1.com/track/click?u=efc4c507c2cf964fc2462caca&id=84b02aca19&e=0c004f9c13 http://hothardware.us3.list-manage.com/track/click?u=efc4c507c2cf964fc2462caca&id=05608db448&e=0c004f9c13 http://hothardware.us3.list-manage1.com/track/click?u=efc4c507c2cf964fc2462caca&id=8437fabb4f&e=0c004f9c13 ============================================================
-
WD My Passport Wireless Pro Review: Wireless Storage For Mobile Devices
news posted a topic in Upcoming News
View this email in your browser (http://us3.campaign-archive1.com/?u=efc4c507c2cf964fc2462caca&id=41e20f5e06&e=0c004f9c13) External storage is commonplace now, but traditional standalone storage products sometimes leave a large number of devices hanging. I've got a 2TB external drive plugged into a USB 3 port, for example, which is great for the main PC, but it doesn't help much with the laptop, iPhone and iPad. That's where some of the latest wireless storage products like the WD My Passport Wireless Pro we're going to be showing you here comes in. Through creative piggy-backing onto your Wi-Fi network, you can add multiple terabytes of additional storage that can be accessed by any wirelessly-connected device... WD My Passport Wireless Pro Review: Wireless Storage For Mobile Devices (http://hothardware.us3.list-manage.com/track/click?u=efc4c507c2cf964fc2462caca&id=9462932d4f&e=0c004f9c13) http://hothardware.us3.list-manage.com/track/click?u=efc4c507c2cf964fc2462caca&id=7d3a918d95&e=0c004f9c13 http://hothardware.us3.list-manage.com/track/click?u=efc4c507c2cf964fc2462caca&id=4bac8df7ca&e=0c004f9c13 Best Regards, HotHardware.com (http://hothardware.us3.list-manage1.com/track/click?u=efc4c507c2cf964fc2462caca&id=b089d10ac9&e=0c004f9c13) http://hothardware.us3.list-manage1.com/track/click?u=efc4c507c2cf964fc2462caca&id=84b02aca19&e=0c004f9c13 http://hothardware.us3.list-manage.com/track/click?u=efc4c507c2cf964fc2462caca&id=05608db448&e=0c004f9c13 http://hothardware.us3.list-manage1.com/track/click?u=efc4c507c2cf964fc2462caca&id=8437fabb4f&e=0c004f9c13 ============================================================ -
Dear Editors, we just posted a new article which might be interesting to your readers. A post in your news section would be appreciated. Title: Fractal Design Define C Link: http://www.techpowerup.com/reviews/Fractal_Design/Define_C Brief: The Fractal Design Define C is an optimized version of the open-air design we have seen in the Define S. Lacking the usual internal and external drive bays and with a more compact size and somewhat simplified but modernized interior, it will be interesting to see whether it can hold its own.
-
Fractal Design Define Mini C Case Review ------------------------------------------------------------ http://us2.campaign-archive1.com/?u=bfb2b902b5fb045ad6f841f98&id=672f28740e&e=872093acb5 http://www.kitguru.net =FRACTAL DESIGN DEFINE MINI C CASE REVIEW= Fractal Design Define Mini C is a Micro-ATX case that fills a gap in the range of Fractal cases between the mid-tower Define R5 and Mini-ITX Define Nano S. Read the review here: http://www.kitguru.net/components/cases/leo-waldock/fractal-design-define-mini-c-case-review/ ============================================================ ** follow on Twitter (http://twitter.com/#!/kitgurupress) | ** friend on Facebook (http://www.facebook.com/pages/KitGuru/162236020510911) | ** forward to a friend (http://us2.forward-to-friend.com/forward?u=bfb2b902b5fb045ad6f841f98&id=672f28740e&e=872093acb5) Copyright © 2016 KitGuru, All rights reserved. You are receiving this because you are a news partner or have signed up to receive our news.
-
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 Package : libwmf Version : 0.2.8.4-10.3+deb7u2 CVE ID : CVE-2016-9011 Debian Bug : 842090 Agostino Sarubbo from Gentoo discovered a flaw in libwmf's Windows Metafile Format (WMF) parser which caused allocation of excessive amount of memory potentially leading to a crash. For Debian 7 "Wheezy", these problems have been fixed in version 0.2.8.4-10.3+deb7u2. We recommend that you upgrade your libwmf packages. Further information about Debian LTS security advisories, how to apply these updates to your system and frequently asked questions can be found at: https://wiki.debian.org/LTS -----BEGIN PGP SIGNATURE----- Version: GnuPG v2 iQIcBAEBCAAGBQJYGfjGAAoJEPZk0la0aRp97QcP/jocLxjkuNCeUSJJ6awFhTCe 5FA+Ufmbf4AnaccnmfCS1yenadgTkEmzbEJrBUPbfeqAsMaT+kaj7GXOtSAQHwCN jq30QZMSfNQJNzE+f9lPntM6ZD9xkjdt1twfuVS7JpA4bY3qgP7uBUEySnwOnSXU kxTr48dCi+WVksXQ9h7Snk6ov2wedmrNEI/j0ukC1vIQ97sX3y6aw9ijuIqNiW8x Hnl7/11zFjV5aDe7jaMHeT1xg4c6PVmZmXxcHzrqBEZVxpikc3wEAi+UPSjcc5+R ZPxKFq6HCSbttj9Ftw3nOvuvzex1o5Gn130MsBqIJJ1JTyZ2ytDGn7K5+nJOP8yl FFWMYKf02Xj3JmYqiuuv34QmZDO6wkI7gMCW2Ohm4SpYC2lTwr5BEi/2tSUV2Wrp TIt4zZsNq3gYUuPF73MKVktOd5SwMIWKIe1l37yFLtoFqukvxUc6Lw+aR6K7mEjT zU5Ge4amc7tjG02qgbvwpAOEdLGiiBhbD8ZNwWz6dOvzjWOzv3tkRylw9lX4OALI rGDtaf9jCQhGWAGxbBM6uD6hz+DVIZJBW9Euyl0hErb0OCcANpIlIr7nj28Raaqt pYL1GKc9Ajwbm5LQc6g0djC90cyoPushTnWds+JaPomCvlVX5aV0hxKjyQ/qKZTa epMQiVdakbDcB/PWQvi4 =eBHk -----END PGP SIGNATURE-----
-
[security-announce] SUSE-SU-2016:2699-1: important: Security update for curl
news posted a topic in Upcoming News
SUSE Security Update: Security update for curl ______________________________________________________________________________ Announcement ID: SUSE-SU-2016:2699-1 Rating: important References: #1005633 #1005634 #1005635 #1005637 #1005638 #1005640 #1005642 #1005643 #1005645 #1005646 #998760 Cross-References: CVE-2016-7167 CVE-2016-8615 CVE-2016-8616 CVE-2016-8617 CVE-2016-8618 CVE-2016-8619 CVE-2016-8620 CVE-2016-8621 CVE-2016-8622 CVE-2016-8623 CVE-2016-8624 Affected Products: SUSE Linux Enterprise Software Development Kit 12-SP1 SUSE Linux Enterprise Server 12-SP1 SUSE Linux Enterprise Desktop 12-SP1 ______________________________________________________________________________ An update that fixes 11 vulnerabilities is now available. Description: This update for curl fixes the following security issues: - CVE-2016-8624: invalid URL parsing with '#' (bsc#1005646) - CVE-2016-8623: Use-after-free via shared cookies (bsc#1005645) - CVE-2016-8622: URL unescape heap overflow via integer truncation (bsc#1005643) - CVE-2016-8621: curl_getdate read out of bounds (bsc#1005642) - CVE-2016-8620: glob parser write/read out of bounds (bsc#1005640) - CVE-2016-8619: double-free in krb5 code (bsc#1005638) - CVE-2016-8618: double-free in curl_maprintf (bsc#1005637) - CVE-2016-8617: OOB write via unchecked multiplication (bsc#1005635) - CVE-2016-8616: case insensitive password comparison (bsc#1005634) - CVE-2016-8615: cookie injection for other servers (bsc#1005633) - CVE-2016-7167: escape and unescape integer overflows (bsc#998760) Patch Instructions: To install this SUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product: - SUSE Linux Enterprise Software Development Kit 12-SP1: zypper in -t patch SUSE-SLE-SDK-12-SP1-2016-1591=1 - SUSE Linux Enterprise Server 12-SP1: zypper in -t patch SUSE-SLE-SERVER-12-SP1-2016-1591=1 - SUSE Linux Enterprise Desktop 12-SP1: zypper in -t patch SUSE-SLE-DESKTOP-12-SP1-2016-1591=1 To bring your system up-to-date, use "zypper patch". Package List: - SUSE Linux Enterprise Software Development Kit 12-SP1 (ppc64le s390x x86_64): curl-debuginfo-7.37.0-31.1 curl-debugsource-7.37.0-31.1 libcurl-devel-7.37.0-31.1 - SUSE Linux Enterprise Server 12-SP1 (ppc64le s390x x86_64): curl-7.37.0-31.1 curl-debuginfo-7.37.0-31.1 curl-debugsource-7.37.0-31.1 libcurl4-7.37.0-31.1 libcurl4-debuginfo-7.37.0-31.1 - SUSE Linux Enterprise Server 12-SP1 (s390x x86_64): libcurl4-32bit-7.37.0-31.1 libcurl4-debuginfo-32bit-7.37.0-31.1 - SUSE Linux Enterprise Desktop 12-SP1 (x86_64): curl-7.37.0-31.1 curl-debuginfo-7.37.0-31.1 curl-debugsource-7.37.0-31.1 libcurl4-32bit-7.37.0-31.1 libcurl4-7.37.0-31.1 libcurl4-debuginfo-32bit-7.37.0-31.1 libcurl4-debuginfo-7.37.0-31.1 References: https://www.suse.com/security/cve/CVE-2016-7167.html https://www.suse.com/security/cve/CVE-2016-8615.html https://www.suse.com/security/cve/CVE-2016-8616.html https://www.suse.com/security/cve/CVE-2016-8617.html https://www.suse.com/security/cve/CVE-2016-8618.html https://www.suse.com/security/cve/CVE-2016-8619.html https://www.suse.com/security/cve/CVE-2016-8620.html https://www.suse.com/security/cve/CVE-2016-8621.html https://www.suse.com/security/cve/CVE-2016-8622.html https://www.suse.com/security/cve/CVE-2016-8623.html https://www.suse.com/security/cve/CVE-2016-8624.html https://bugzilla.suse.com/1005633 https://bugzilla.suse.com/1005634 https://bugzilla.suse.com/1005635 https://bugzilla.suse.com/1005637 https://bugzilla.suse.com/1005638 https://bugzilla.suse.com/1005640 https://bugzilla.suse.com/1005642 https://bugzilla.suse.com/1005643 https://bugzilla.suse.com/1005645 https://bugzilla.suse.com/1005646 https://bugzilla.suse.com/998760 -- To unsubscribe, e-mail: opensuse-security-announce+unsubscribe ( -at -) opensuse.org For additional commands, e-mail: opensuse-security-announce+help ( -at -) opensuse.org -
[security-announce] SUSE-SU-2016:2700-1: important: Security update for curl
news posted a topic in Upcoming News
SUSE Security Update: Security update for curl ______________________________________________________________________________ Announcement ID: SUSE-SU-2016:2700-1 Rating: important References: #1005633 #1005634 #1005635 #1005637 #1005638 #1005642 #1005645 #1005646 #997420 #998760 Cross-References: CVE-2016-5420 CVE-2016-7141 CVE-2016-7167 CVE-2016-8615 CVE-2016-8616 CVE-2016-8617 CVE-2016-8618 CVE-2016-8619 CVE-2016-8620 CVE-2016-8621 CVE-2016-8622 CVE-2016-8623 CVE-2016-8624 Affected Products: SUSE Studio Onsite 1.3 ______________________________________________________________________________ An update that fixes 13 vulnerabilities is now available. Description: This update for curl fixes the following issues: - CVE-2016-8624: invalid URL parsing with '#' (bsc#1005646) - CVE-2016-8623: Use-after-free via shared cookies (bsc#1005645) - CVE-2016-8621: curl_getdate read out of bounds (bsc#1005642) - CVE-2016-8619: double-free in krb5 code (bsc#1005638) - CVE-2016-8618: double-free in curl_maprintf (bsc#1005637) - CVE-2016-8617: OOB write via unchecked multiplication (bsc#1005635) - CVE-2016-8616: case insensitive password comparison (bsc#1005634) - CVE-2016-8615: cookie injection for other servers (bsc#1005633) - CVE-2016-7167: escape and unescape integer overflows (bsc#998760) - CVE-2016-7141: Fixed incorrect reuse of client certificates with NSS not fixed in CVE-2016-5420 (bsc#997420) Patch Instructions: To install this SUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product: - SUSE Studio Onsite 1.3: zypper in -t patch slestso13-curl-12827=1 To bring your system up-to-date, use "zypper patch". Package List: - SUSE Studio Onsite 1.3 (x86_64): libcurl-devel-7.19.7-1.20.47.2 References: https://www.suse.com/security/cve/CVE-2016-5420.html https://www.suse.com/security/cve/CVE-2016-7141.html https://www.suse.com/security/cve/CVE-2016-7167.html https://www.suse.com/security/cve/CVE-2016-8615.html https://www.suse.com/security/cve/CVE-2016-8616.html https://www.suse.com/security/cve/CVE-2016-8617.html https://www.suse.com/security/cve/CVE-2016-8618.html https://www.suse.com/security/cve/CVE-2016-8619.html https://www.suse.com/security/cve/CVE-2016-8620.html https://www.suse.com/security/cve/CVE-2016-8621.html https://www.suse.com/security/cve/CVE-2016-8622.html https://www.suse.com/security/cve/CVE-2016-8623.html https://www.suse.com/security/cve/CVE-2016-8624.html https://bugzilla.suse.com/1005633 https://bugzilla.suse.com/1005634 https://bugzilla.suse.com/1005635 https://bugzilla.suse.com/1005637 https://bugzilla.suse.com/1005638 https://bugzilla.suse.com/1005642 https://bugzilla.suse.com/1005645 https://bugzilla.suse.com/1005646 https://bugzilla.suse.com/997420 https://bugzilla.suse.com/998760 -- To unsubscribe, e-mail: opensuse-security-announce+unsubscribe ( -at -) opensuse.org For additional commands, e-mail: opensuse-security-announce+help ( -at -) opensuse.org -
Hello LanOC Affiliates and newsletter subscribers, here is our newest posting. We would appreciate you spreading the word! LanOC Reviews has released a new article which you and your readers might enjoy. We would be grateful if you would please share it with them. *TITLE:* Gigabyte RX 480 G1 Gaming 8GB ( -at -) LanOC Reviews <http://lanoc.org/review/video-cards/7360-gigabyte-rx-480-g1-gaming-8gb> *DESCRIPTION:* After checking out an aftermarket RX 480, the reference RX 480, and both together in Crossfire you might think we were done. But Gigabyte was a little late to the party with their sampling and their RX 480 G1 Gaming with 8GB of vRAM came in while I was on vacation. Add in the RX 460 and GTX 1050 launches and I’m just now getting around to take a look at the card. So today I’m going to take a look at the card and see what it is all about. Then I’m going to run it through our test suite including the recently added Deus Ex tests and see how it compares to the rest of the RX 480 options. This also gives me a good chance to revisit the RX 480 and see if its location in the market has changed at all with the price changes. So get into everything and see what Gigabyte has going on. *ARTICLE URL:* http://lanoc.org/review/video-cards/7360-gigabyte-rx-480-g1-gaming-8gb *LARGE IMAGE URL:* http://lanoc.org/images/reviews/2016/gigabyte_rx480_g1gaming/title.jpg *SMALL IMAGE URL:* http://lanoc.org/images/reviews/2016/gigabyte_rx480_g1gaming/email.jpg Thank you for your help Our content is syndicated by *RSS* 2.0 at: http://lanoc.org/review? format=feed&type=atom Check out our *YouTube* Channel: http://www.youtube.com/user/LanocReviews Follow us on *Twitter*: http://www.twitter.com/LanOC_Reviews Join our group on *Facebook*: http://www.facebook.com/LanOCReviews Join our *Steam* Group: http://steamcommunity.com/groups/lanoc *If this message has been sent to an incorrect address, or you no longer wish to receive our news, please email us back and let us know at reviews ( -at -) lanoc.org <reviews ( -at -) lanoc.org>* ---------------------------------------- Wes Compton Editor-in-Chief LanOC Reviews http://lanoc.org ( -at -) LanOC_Reviews <http://twitter.com/#!/LanOC_Reviews> Google Plus <https://plus.google.com/u/1/b/111054267662763089650/> Our Facebook Page <http://www.facebook.com/LanOCReviews>
-
Zotac Factory Tour In Dongguan, China ( -at -) ThinkComputers.org Article Link: http://www.thinkcomputers.org/zotac-factory-tour-in-dongguan-china/ Image URL: http://www.thinkcomputers.org/articles/pcpartner-email.jpg Alt Image URL: http://www.thinkcomputers.org/articles/pcpartner-small.jpg Quote: "As part of their 10th Anniversary celebration Zotac organized a factory tour for members of the media. The factory tour took place in Dongguan, China at the PC Partner facility. PC Partner is actually the holding company of Zotac. This facility is where all of the Zotac graphics cards and mini PCs are made. Through the factory tour Zotac showed us exactly how their graphics cards and Mini PC’s are produced from start to finish."
-
*Fractal Design Define C chassis review* Today Fractal Design released the Define C, a silent, stylish and compact PC chassis. This all predominantly black and white chassis comes with plenty of cooling options, great design and it will house up-to ATX motherboards. Armed with a PSU compartment this product is made with airflow and liquid cooling in mind to serve the more performance oriented PCs. You'll love the storage options, style, USB 3.0 and low noise levels. Read the full * review right here <http://www.guru3d.com/articles-pages/fractal-design-define-c-review,1.html>'>http://www.guru3d.com/articles-pages/fractal-design-define-c-review,1.html> *. URL: http://www.guru3d.com/articles-pages/fractal-design-define-c-review,1.html <http://www.guru3d.com/articles-pages/fractal-design-define-c-review,1.html> --
-
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ===================================================================== Red Hat Security Advisory Synopsis: Critical: java-1.7.1-ibm security update Advisory ID: RHSA-2016:2137-01 Product: Red Hat Enterprise Linux Supplementary Advisory URL: https://rhn.redhat.com/errata/RHSA-2016-2137.html Issue date: 2016-11-02 CVE Names: CVE-2016-5542 CVE-2016-5554 CVE-2016-5556 CVE-2016-5573 CVE-2016-5597 ===================================================================== 1. Summary: An update for java-1.7.1-ibm is now available for Red Hat Enterprise Linux 6 Supplementary and Red Hat Enterprise Linux 7 Supplementary. Red Hat Product Security has rated this update as having a security impact of Critical. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. 2. Relevant releases/architectures: Red Hat Enterprise Linux Client Supplementary (v. 7) - x86_64 Red Hat Enterprise Linux ComputeNode Supplementary (v. 7) - x86_64 Red Hat Enterprise Linux Desktop Supplementary (v. 6) - i386, x86_64 Red Hat Enterprise Linux HPC Node Supplementary (v. 6) - x86_64 Red Hat Enterprise Linux Server Supplementary (v. 6) - i386, ppc64, s390x, x86_64 Red Hat Enterprise Linux Server Supplementary (v. 7) - ppc64, ppc64le, s390x, x86_64 Red Hat Enterprise Linux Workstation Supplementary (v. 6) - i386, x86_64 Red Hat Enterprise Linux Workstation Supplementary (v. 7) - x86_64 3. Description: IBM Java SE version 7 Release 1 includes the IBM Java Runtime Environment and the IBM Java Software Development Kit. This update upgrades IBM Java SE 7 to version 7R1 SR3-FP60. Security Fix(es): * This update fixes multiple vulnerabilities in the IBM Java Runtime Environment and the IBM Java Software Development Kit. Further information about these flaws can be found on the IBM Java Security alerts page, listed in the References section. (CVE-2016-5542, CVE-2016-5554, CVE-2016-5556, CVE-2016-5573, CVE-2016-5597) 4. Solution: For details on how to apply this update, which includes the changes described in this advisory, refer to: https://access.redhat.com/articles/11258 All running instances of IBM Java must be restarted for this update to take effect. 5. Bugs fixed (https://bugzilla.redhat.com/): 1385544 - CVE-2016-5573 OpenJDK: insufficient checks of JDWP packets (Hotspot, 8159519) 1385714 - CVE-2016-5554 OpenJDK: insufficient classloader consistency checks in ClassLoaderWithRepository (JMX, 8157739) 1385723 - CVE-2016-5542 OpenJDK: missing algorithm restrictions for jar verification (Libraries, 8155973) 1386103 - CVE-2016-5597 OpenJDK: exposure of server authentication credentials to proxy (Networking, 8160838) 1386408 - CVE-2016-5556 Oracle JDK: unspecified vulnerability fixed in 6u131, 7u121, and 8u111 (2D) 6. Package List: Red Hat Enterprise Linux Desktop Supplementary (v. 6): i386: java-1.7.1-ibm-1.7.1.3.60-1jpp.1.el6_8.i686.rpm java-1.7.1-ibm-demo-1.7.1.3.60-1jpp.1.el6_8.i686.rpm java-1.7.1-ibm-devel-1.7.1.3.60-1jpp.1.el6_8.i686.rpm java-1.7.1-ibm-jdbc-1.7.1.3.60-1jpp.1.el6_8.i686.rpm java-1.7.1-ibm-plugin-1.7.1.3.60-1jpp.1.el6_8.i686.rpm java-1.7.1-ibm-src-1.7.1.3.60-1jpp.1.el6_8.i686.rpm x86_64: java-1.7.1-ibm-1.7.1.3.60-1jpp.1.el6_8.x86_64.rpm java-1.7.1-ibm-demo-1.7.1.3.60-1jpp.1.el6_8.x86_64.rpm java-1.7.1-ibm-devel-1.7.1.3.60-1jpp.1.el6_8.x86_64.rpm java-1.7.1-ibm-jdbc-1.7.1.3.60-1jpp.1.el6_8.x86_64.rpm java-1.7.1-ibm-plugin-1.7.1.3.60-1jpp.1.el6_8.x86_64.rpm java-1.7.1-ibm-src-1.7.1.3.60-1jpp.1.el6_8.x86_64.rpm Red Hat Enterprise Linux HPC Node Supplementary (v. 6): x86_64: java-1.7.1-ibm-1.7.1.3.60-1jpp.1.el6_8.x86_64.rpm java-1.7.1-ibm-demo-1.7.1.3.60-1jpp.1.el6_8.x86_64.rpm java-1.7.1-ibm-devel-1.7.1.3.60-1jpp.1.el6_8.x86_64.rpm java-1.7.1-ibm-src-1.7.1.3.60-1jpp.1.el6_8.x86_64.rpm Red Hat Enterprise Linux Server Supplementary (v. 6): i386: java-1.7.1-ibm-1.7.1.3.60-1jpp.1.el6_8.i686.rpm java-1.7.1-ibm-demo-1.7.1.3.60-1jpp.1.el6_8.i686.rpm java-1.7.1-ibm-devel-1.7.1.3.60-1jpp.1.el6_8.i686.rpm java-1.7.1-ibm-jdbc-1.7.1.3.60-1jpp.1.el6_8.i686.rpm java-1.7.1-ibm-plugin-1.7.1.3.60-1jpp.1.el6_8.i686.rpm java-1.7.1-ibm-src-1.7.1.3.60-1jpp.1.el6_8.i686.rpm ppc64: java-1.7.1-ibm-1.7.1.3.60-1jpp.1.el6_8.ppc64.rpm java-1.7.1-ibm-demo-1.7.1.3.60-1jpp.1.el6_8.ppc64.rpm java-1.7.1-ibm-devel-1.7.1.3.60-1jpp.1.el6_8.ppc64.rpm java-1.7.1-ibm-jdbc-1.7.1.3.60-1jpp.1.el6_8.ppc64.rpm java-1.7.1-ibm-src-1.7.1.3.60-1jpp.1.el6_8.ppc64.rpm s390x: java-1.7.1-ibm-1.7.1.3.60-1jpp.1.el6_8.s390x.rpm java-1.7.1-ibm-demo-1.7.1.3.60-1jpp.1.el6_8.s390x.rpm java-1.7.1-ibm-devel-1.7.1.3.60-1jpp.1.el6_8.s390x.rpm java-1.7.1-ibm-jdbc-1.7.1.3.60-1jpp.1.el6_8.s390x.rpm java-1.7.1-ibm-src-1.7.1.3.60-1jpp.1.el6_8.s390x.rpm x86_64: java-1.7.1-ibm-1.7.1.3.60-1jpp.1.el6_8.x86_64.rpm java-1.7.1-ibm-demo-1.7.1.3.60-1jpp.1.el6_8.x86_64.rpm java-1.7.1-ibm-devel-1.7.1.3.60-1jpp.1.el6_8.x86_64.rpm java-1.7.1-ibm-jdbc-1.7.1.3.60-1jpp.1.el6_8.x86_64.rpm java-1.7.1-ibm-plugin-1.7.1.3.60-1jpp.1.el6_8.x86_64.rpm java-1.7.1-ibm-src-1.7.1.3.60-1jpp.1.el6_8.x86_64.rpm Red Hat Enterprise Linux Workstation Supplementary (v. 6): i386: java-1.7.1-ibm-1.7.1.3.60-1jpp.1.el6_8.i686.rpm java-1.7.1-ibm-demo-1.7.1.3.60-1jpp.1.el6_8.i686.rpm java-1.7.1-ibm-devel-1.7.1.3.60-1jpp.1.el6_8.i686.rpm java-1.7.1-ibm-jdbc-1.7.1.3.60-1jpp.1.el6_8.i686.rpm java-1.7.1-ibm-plugin-1.7.1.3.60-1jpp.1.el6_8.i686.rpm java-1.7.1-ibm-src-1.7.1.3.60-1jpp.1.el6_8.i686.rpm x86_64: java-1.7.1-ibm-1.7.1.3.60-1jpp.1.el6_8.x86_64.rpm java-1.7.1-ibm-demo-1.7.1.3.60-1jpp.1.el6_8.x86_64.rpm java-1.7.1-ibm-devel-1.7.1.3.60-1jpp.1.el6_8.x86_64.rpm java-1.7.1-ibm-jdbc-1.7.1.3.60-1jpp.1.el6_8.x86_64.rpm java-1.7.1-ibm-plugin-1.7.1.3.60-1jpp.1.el6_8.x86_64.rpm java-1.7.1-ibm-src-1.7.1.3.60-1jpp.1.el6_8.x86_64.rpm Red Hat Enterprise Linux Client Supplementary (v. 7): x86_64: java-1.7.1-ibm-1.7.1.3.60-1jpp.1.el7_2.i686.rpm java-1.7.1-ibm-1.7.1.3.60-1jpp.1.el7_2.x86_64.rpm java-1.7.1-ibm-demo-1.7.1.3.60-1jpp.1.el7_2.x86_64.rpm java-1.7.1-ibm-devel-1.7.1.3.60-1jpp.1.el7_2.i686.rpm java-1.7.1-ibm-devel-1.7.1.3.60-1jpp.1.el7_2.x86_64.rpm java-1.7.1-ibm-jdbc-1.7.1.3.60-1jpp.1.el7_2.x86_64.rpm java-1.7.1-ibm-plugin-1.7.1.3.60-1jpp.1.el7_2.x86_64.rpm java-1.7.1-ibm-src-1.7.1.3.60-1jpp.1.el7_2.x86_64.rpm Red Hat Enterprise Linux ComputeNode Supplementary (v. 7): x86_64: java-1.7.1-ibm-1.7.1.3.60-1jpp.1.el7_2.i686.rpm java-1.7.1-ibm-1.7.1.3.60-1jpp.1.el7_2.x86_64.rpm java-1.7.1-ibm-demo-1.7.1.3.60-1jpp.1.el7_2.x86_64.rpm java-1.7.1-ibm-devel-1.7.1.3.60-1jpp.1.el7_2.i686.rpm java-1.7.1-ibm-devel-1.7.1.3.60-1jpp.1.el7_2.x86_64.rpm java-1.7.1-ibm-src-1.7.1.3.60-1jpp.1.el7_2.x86_64.rpm Red Hat Enterprise Linux Server Supplementary (v. 7): ppc64: java-1.7.1-ibm-1.7.1.3.60-1jpp.1.el7_2.ppc.rpm java-1.7.1-ibm-1.7.1.3.60-1jpp.1.el7_2.ppc64.rpm java-1.7.1-ibm-demo-1.7.1.3.60-1jpp.1.el7_2.ppc64.rpm java-1.7.1-ibm-devel-1.7.1.3.60-1jpp.1.el7_2.ppc.rpm java-1.7.1-ibm-devel-1.7.1.3.60-1jpp.1.el7_2.ppc64.rpm java-1.7.1-ibm-jdbc-1.7.1.3.60-1jpp.1.el7_2.ppc64.rpm java-1.7.1-ibm-plugin-1.7.1.3.60-1jpp.1.el7_2.ppc.rpm java-1.7.1-ibm-src-1.7.1.3.60-1jpp.1.el7_2.ppc64.rpm ppc64le: java-1.7.1-ibm-1.7.1.3.60-1jpp.1.el7_2.ppc64le.rpm java-1.7.1-ibm-demo-1.7.1.3.60-1jpp.1.el7_2.ppc64le.rpm java-1.7.1-ibm-devel-1.7.1.3.60-1jpp.1.el7_2.ppc64le.rpm java-1.7.1-ibm-jdbc-1.7.1.3.60-1jpp.1.el7_2.ppc64le.rpm java-1.7.1-ibm-src-1.7.1.3.60-1jpp.1.el7_2.ppc64le.rpm s390x: java-1.7.1-ibm-1.7.1.3.60-1jpp.1.el7_2.s390.rpm java-1.7.1-ibm-1.7.1.3.60-1jpp.1.el7_2.s390x.rpm java-1.7.1-ibm-demo-1.7.1.3.60-1jpp.1.el7_2.s390x.rpm java-1.7.1-ibm-devel-1.7.1.3.60-1jpp.1.el7_2.s390.rpm java-1.7.1-ibm-devel-1.7.1.3.60-1jpp.1.el7_2.s390x.rpm java-1.7.1-ibm-jdbc-1.7.1.3.60-1jpp.1.el7_2.s390x.rpm java-1.7.1-ibm-src-1.7.1.3.60-1jpp.1.el7_2.s390x.rpm x86_64: java-1.7.1-ibm-1.7.1.3.60-1jpp.1.el7_2.i686.rpm java-1.7.1-ibm-1.7.1.3.60-1jpp.1.el7_2.x86_64.rpm java-1.7.1-ibm-demo-1.7.1.3.60-1jpp.1.el7_2.x86_64.rpm java-1.7.1-ibm-devel-1.7.1.3.60-1jpp.1.el7_2.i686.rpm java-1.7.1-ibm-devel-1.7.1.3.60-1jpp.1.el7_2.x86_64.rpm java-1.7.1-ibm-jdbc-1.7.1.3.60-1jpp.1.el7_2.x86_64.rpm java-1.7.1-ibm-plugin-1.7.1.3.60-1jpp.1.el7_2.x86_64.rpm java-1.7.1-ibm-src-1.7.1.3.60-1jpp.1.el7_2.x86_64.rpm Red Hat Enterprise Linux Workstation Supplementary (v. 7): x86_64: java-1.7.1-ibm-1.7.1.3.60-1jpp.1.el7_2.i686.rpm java-1.7.1-ibm-1.7.1.3.60-1jpp.1.el7_2.x86_64.rpm java-1.7.1-ibm-demo-1.7.1.3.60-1jpp.1.el7_2.x86_64.rpm java-1.7.1-ibm-devel-1.7.1.3.60-1jpp.1.el7_2.i686.rpm java-1.7.1-ibm-devel-1.7.1.3.60-1jpp.1.el7_2.x86_64.rpm java-1.7.1-ibm-jdbc-1.7.1.3.60-1jpp.1.el7_2.x86_64.rpm java-1.7.1-ibm-plugin-1.7.1.3.60-1jpp.1.el7_2.x86_64.rpm java-1.7.1-ibm-src-1.7.1.3.60-1jpp.1.el7_2.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/ 7. References: https://access.redhat.com/security/cve/CVE-2016-5542 https://access.redhat.com/security/cve/CVE-2016-5554 https://access.redhat.com/security/cve/CVE-2016-5556 https://access.redhat.com/security/cve/CVE-2016-5573 https://access.redhat.com/security/cve/CVE-2016-5597 https://access.redhat.com/security/updates/classification/#critical https://www.ibm.com/developerworks/java/jdk/alerts/ 8. Contact: The Red Hat security contact is . More contact details at https://access.redhat.com/security/team/contact/ Copyright 2016 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iD8DBQFYGdv5XlSAg2UNWIIRAgdIAKC+SB1l/p1UZwZGJOOY/Khe9kdjFgCgu0Rj rDyKBjJF1gGfjBqqXUvwhOw= =9b+t -----END PGP SIGNATURE----- --
-
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ===================================================================== Red Hat Security Advisory Synopsis: Critical: java-1.8.0-ibm security update Advisory ID: RHSA-2016:2136-01 Product: Red Hat Enterprise Linux Supplementary Advisory URL: https://rhn.redhat.com/errata/RHSA-2016-2136.html Issue date: 2016-11-02 CVE Names: CVE-2016-5542 CVE-2016-5554 CVE-2016-5556 CVE-2016-5573 CVE-2016-5597 ===================================================================== 1. Summary: An update for java-1.8.0-ibm is now available for Red Hat Enterprise Linux 6 Supplementary and Red Hat Enterprise Linux 7 Supplementary. Red Hat Product Security has rated this update as having a security impact of Critical. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. 2. Relevant releases/architectures: Red Hat Enterprise Linux Client Supplementary (v. 7) - x86_64 Red Hat Enterprise Linux ComputeNode Supplementary (v. 7) - x86_64 Red Hat Enterprise Linux Desktop Supplementary (v. 6) - i386, x86_64 Red Hat Enterprise Linux HPC Node Supplementary (v. 6) - x86_64 Red Hat Enterprise Linux Server Supplementary (v. 6) - i386, ppc64, s390x, x86_64 Red Hat Enterprise Linux Server Supplementary (v. 7) - ppc64, ppc64le, s390x, x86_64 Red Hat Enterprise Linux Workstation Supplementary (v. 6) - i386, x86_64 Red Hat Enterprise Linux Workstation Supplementary (v. 7) - x86_64 3. Description: IBM Java SE version 8 includes the IBM Java Runtime Environment and the IBM Java Software Development Kit. This update upgrades IBM Java SE 8 to version 8 SR3-FP20. Security Fix(es): * This update fixes multiple vulnerabilities in the IBM Java Runtime Environment and the IBM Java Software Development Kit. Further information about these flaws can be found on the IBM Java Security alerts page, listed in the References section. (CVE-2016-5542, CVE-2016-5554, CVE-2016-5556, CVE-2016-5573, CVE-2016-5597) 4. Solution: For details on how to apply this update, which includes the changes described in this advisory, refer to: https://access.redhat.com/articles/11258 All running instances of IBM Java must be restarted for this update to take effect. 5. Bugs fixed (https://bugzilla.redhat.com/): 1385544 - CVE-2016-5573 OpenJDK: insufficient checks of JDWP packets (Hotspot, 8159519) 1385714 - CVE-2016-5554 OpenJDK: insufficient classloader consistency checks in ClassLoaderWithRepository (JMX, 8157739) 1385723 - CVE-2016-5542 OpenJDK: missing algorithm restrictions for jar verification (Libraries, 8155973) 1386103 - CVE-2016-5597 OpenJDK: exposure of server authentication credentials to proxy (Networking, 8160838) 1386408 - CVE-2016-5556 Oracle JDK: unspecified vulnerability fixed in 6u131, 7u121, and 8u111 (2D) 6. Package List: Red Hat Enterprise Linux Desktop Supplementary (v. 6): i386: java-1.8.0-ibm-1.8.0.3.20-1jpp.1.el6_8.i686.rpm java-1.8.0-ibm-demo-1.8.0.3.20-1jpp.1.el6_8.i686.rpm java-1.8.0-ibm-devel-1.8.0.3.20-1jpp.1.el6_8.i686.rpm java-1.8.0-ibm-jdbc-1.8.0.3.20-1jpp.1.el6_8.i686.rpm java-1.8.0-ibm-plugin-1.8.0.3.20-1jpp.1.el6_8.i686.rpm java-1.8.0-ibm-src-1.8.0.3.20-1jpp.1.el6_8.i686.rpm x86_64: java-1.8.0-ibm-1.8.0.3.20-1jpp.1.el6_8.x86_64.rpm java-1.8.0-ibm-demo-1.8.0.3.20-1jpp.1.el6_8.x86_64.rpm java-1.8.0-ibm-devel-1.8.0.3.20-1jpp.1.el6_8.x86_64.rpm java-1.8.0-ibm-jdbc-1.8.0.3.20-1jpp.1.el6_8.x86_64.rpm java-1.8.0-ibm-plugin-1.8.0.3.20-1jpp.1.el6_8.x86_64.rpm java-1.8.0-ibm-src-1.8.0.3.20-1jpp.1.el6_8.x86_64.rpm Red Hat Enterprise Linux HPC Node Supplementary (v. 6): x86_64: java-1.8.0-ibm-1.8.0.3.20-1jpp.1.el6_8.x86_64.rpm java-1.8.0-ibm-demo-1.8.0.3.20-1jpp.1.el6_8.x86_64.rpm java-1.8.0-ibm-devel-1.8.0.3.20-1jpp.1.el6_8.x86_64.rpm java-1.8.0-ibm-src-1.8.0.3.20-1jpp.1.el6_8.x86_64.rpm Red Hat Enterprise Linux Server Supplementary (v. 6): i386: java-1.8.0-ibm-1.8.0.3.20-1jpp.1.el6_8.i686.rpm java-1.8.0-ibm-demo-1.8.0.3.20-1jpp.1.el6_8.i686.rpm java-1.8.0-ibm-devel-1.8.0.3.20-1jpp.1.el6_8.i686.rpm java-1.8.0-ibm-jdbc-1.8.0.3.20-1jpp.1.el6_8.i686.rpm java-1.8.0-ibm-plugin-1.8.0.3.20-1jpp.1.el6_8.i686.rpm java-1.8.0-ibm-src-1.8.0.3.20-1jpp.1.el6_8.i686.rpm ppc64: java-1.8.0-ibm-1.8.0.3.20-1jpp.1.el6_8.ppc64.rpm java-1.8.0-ibm-demo-1.8.0.3.20-1jpp.1.el6_8.ppc64.rpm java-1.8.0-ibm-devel-1.8.0.3.20-1jpp.1.el6_8.ppc64.rpm java-1.8.0-ibm-jdbc-1.8.0.3.20-1jpp.1.el6_8.ppc64.rpm java-1.8.0-ibm-src-1.8.0.3.20-1jpp.1.el6_8.ppc64.rpm s390x: java-1.8.0-ibm-1.8.0.3.20-1jpp.1.el6_8.s390x.rpm java-1.8.0-ibm-demo-1.8.0.3.20-1jpp.1.el6_8.s390x.rpm java-1.8.0-ibm-devel-1.8.0.3.20-1jpp.1.el6_8.s390x.rpm java-1.8.0-ibm-jdbc-1.8.0.3.20-1jpp.1.el6_8.s390x.rpm java-1.8.0-ibm-src-1.8.0.3.20-1jpp.1.el6_8.s390x.rpm x86_64: java-1.8.0-ibm-1.8.0.3.20-1jpp.1.el6_8.x86_64.rpm java-1.8.0-ibm-demo-1.8.0.3.20-1jpp.1.el6_8.x86_64.rpm java-1.8.0-ibm-devel-1.8.0.3.20-1jpp.1.el6_8.x86_64.rpm java-1.8.0-ibm-jdbc-1.8.0.3.20-1jpp.1.el6_8.x86_64.rpm java-1.8.0-ibm-plugin-1.8.0.3.20-1jpp.1.el6_8.x86_64.rpm java-1.8.0-ibm-src-1.8.0.3.20-1jpp.1.el6_8.x86_64.rpm Red Hat Enterprise Linux Workstation Supplementary (v. 6): i386: java-1.8.0-ibm-1.8.0.3.20-1jpp.1.el6_8.i686.rpm java-1.8.0-ibm-demo-1.8.0.3.20-1jpp.1.el6_8.i686.rpm java-1.8.0-ibm-devel-1.8.0.3.20-1jpp.1.el6_8.i686.rpm java-1.8.0-ibm-jdbc-1.8.0.3.20-1jpp.1.el6_8.i686.rpm java-1.8.0-ibm-plugin-1.8.0.3.20-1jpp.1.el6_8.i686.rpm java-1.8.0-ibm-src-1.8.0.3.20-1jpp.1.el6_8.i686.rpm x86_64: java-1.8.0-ibm-1.8.0.3.20-1jpp.1.el6_8.x86_64.rpm java-1.8.0-ibm-demo-1.8.0.3.20-1jpp.1.el6_8.x86_64.rpm java-1.8.0-ibm-devel-1.8.0.3.20-1jpp.1.el6_8.x86_64.rpm java-1.8.0-ibm-jdbc-1.8.0.3.20-1jpp.1.el6_8.x86_64.rpm java-1.8.0-ibm-plugin-1.8.0.3.20-1jpp.1.el6_8.x86_64.rpm java-1.8.0-ibm-src-1.8.0.3.20-1jpp.1.el6_8.x86_64.rpm Red Hat Enterprise Linux Client Supplementary (v. 7): x86_64: java-1.8.0-ibm-1.8.0.3.20-1jpp.1.el7_2.i686.rpm java-1.8.0-ibm-1.8.0.3.20-1jpp.1.el7_2.x86_64.rpm java-1.8.0-ibm-demo-1.8.0.3.20-1jpp.1.el7_2.x86_64.rpm java-1.8.0-ibm-devel-1.8.0.3.20-1jpp.1.el7_2.i686.rpm java-1.8.0-ibm-devel-1.8.0.3.20-1jpp.1.el7_2.x86_64.rpm java-1.8.0-ibm-jdbc-1.8.0.3.20-1jpp.1.el7_2.x86_64.rpm java-1.8.0-ibm-plugin-1.8.0.3.20-1jpp.1.el7_2.x86_64.rpm java-1.8.0-ibm-src-1.8.0.3.20-1jpp.1.el7_2.x86_64.rpm Red Hat Enterprise Linux ComputeNode Supplementary (v. 7): x86_64: java-1.8.0-ibm-1.8.0.3.20-1jpp.1.el7_2.i686.rpm java-1.8.0-ibm-1.8.0.3.20-1jpp.1.el7_2.x86_64.rpm java-1.8.0-ibm-demo-1.8.0.3.20-1jpp.1.el7_2.x86_64.rpm java-1.8.0-ibm-devel-1.8.0.3.20-1jpp.1.el7_2.i686.rpm java-1.8.0-ibm-devel-1.8.0.3.20-1jpp.1.el7_2.x86_64.rpm java-1.8.0-ibm-src-1.8.0.3.20-1jpp.1.el7_2.x86_64.rpm Red Hat Enterprise Linux Server Supplementary (v. 7): ppc64: java-1.8.0-ibm-1.8.0.3.20-1jpp.1.el7_2.ppc.rpm java-1.8.0-ibm-1.8.0.3.20-1jpp.1.el7_2.ppc64.rpm java-1.8.0-ibm-demo-1.8.0.3.20-1jpp.1.el7_2.ppc64.rpm java-1.8.0-ibm-devel-1.8.0.3.20-1jpp.1.el7_2.ppc.rpm java-1.8.0-ibm-devel-1.8.0.3.20-1jpp.1.el7_2.ppc64.rpm java-1.8.0-ibm-jdbc-1.8.0.3.20-1jpp.1.el7_2.ppc64.rpm java-1.8.0-ibm-plugin-1.8.0.3.20-1jpp.1.el7_2.ppc64.rpm java-1.8.0-ibm-src-1.8.0.3.20-1jpp.1.el7_2.ppc64.rpm ppc64le: java-1.8.0-ibm-1.8.0.3.20-1jpp.1.el7_2.ppc64le.rpm java-1.8.0-ibm-demo-1.8.0.3.20-1jpp.1.el7_2.ppc64le.rpm java-1.8.0-ibm-devel-1.8.0.3.20-1jpp.1.el7_2.ppc64le.rpm java-1.8.0-ibm-jdbc-1.8.0.3.20-1jpp.1.el7_2.ppc64le.rpm java-1.8.0-ibm-src-1.8.0.3.20-1jpp.1.el7_2.ppc64le.rpm s390x: java-1.8.0-ibm-1.8.0.3.20-1jpp.1.el7_2.s390.rpm java-1.8.0-ibm-1.8.0.3.20-1jpp.1.el7_2.s390x.rpm java-1.8.0-ibm-demo-1.8.0.3.20-1jpp.1.el7_2.s390x.rpm java-1.8.0-ibm-devel-1.8.0.3.20-1jpp.1.el7_2.s390.rpm java-1.8.0-ibm-devel-1.8.0.3.20-1jpp.1.el7_2.s390x.rpm java-1.8.0-ibm-jdbc-1.8.0.3.20-1jpp.1.el7_2.s390x.rpm java-1.8.0-ibm-src-1.8.0.3.20-1jpp.1.el7_2.s390x.rpm x86_64: java-1.8.0-ibm-1.8.0.3.20-1jpp.1.el7_2.i686.rpm java-1.8.0-ibm-1.8.0.3.20-1jpp.1.el7_2.x86_64.rpm java-1.8.0-ibm-demo-1.8.0.3.20-1jpp.1.el7_2.x86_64.rpm java-1.8.0-ibm-devel-1.8.0.3.20-1jpp.1.el7_2.i686.rpm java-1.8.0-ibm-devel-1.8.0.3.20-1jpp.1.el7_2.x86_64.rpm java-1.8.0-ibm-jdbc-1.8.0.3.20-1jpp.1.el7_2.x86_64.rpm java-1.8.0-ibm-plugin-1.8.0.3.20-1jpp.1.el7_2.x86_64.rpm java-1.8.0-ibm-src-1.8.0.3.20-1jpp.1.el7_2.x86_64.rpm Red Hat Enterprise Linux Workstation Supplementary (v. 7): x86_64: java-1.8.0-ibm-1.8.0.3.20-1jpp.1.el7_2.i686.rpm java-1.8.0-ibm-1.8.0.3.20-1jpp.1.el7_2.x86_64.rpm java-1.8.0-ibm-demo-1.8.0.3.20-1jpp.1.el7_2.x86_64.rpm java-1.8.0-ibm-devel-1.8.0.3.20-1jpp.1.el7_2.i686.rpm java-1.8.0-ibm-devel-1.8.0.3.20-1jpp.1.el7_2.x86_64.rpm java-1.8.0-ibm-jdbc-1.8.0.3.20-1jpp.1.el7_2.x86_64.rpm java-1.8.0-ibm-plugin-1.8.0.3.20-1jpp.1.el7_2.x86_64.rpm java-1.8.0-ibm-src-1.8.0.3.20-1jpp.1.el7_2.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/ 7. References: https://access.redhat.com/security/cve/CVE-2016-5542 https://access.redhat.com/security/cve/CVE-2016-5554 https://access.redhat.com/security/cve/CVE-2016-5556 https://access.redhat.com/security/cve/CVE-2016-5573 https://access.redhat.com/security/cve/CVE-2016-5597 https://access.redhat.com/security/updates/classification/#critical https://www.ibm.com/developerworks/java/jdk/alerts/ 8. Contact: The Red Hat security contact is . More contact details at https://access.redhat.com/security/team/contact/ Copyright 2016 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iD8DBQFYGdurXlSAg2UNWIIRAnIaAJwIBTsMod5OrlROHcXxbpCuqnY/eACfcekk TLTrAbAE3GmrnNksgMFtm4E= =rKwt -----END PGP SIGNATURE----- --
-
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ===================================================================== Red Hat Security Advisory Synopsis: Critical: java-1.7.0-ibm security update Advisory ID: RHSA-2016:2138-01 Product: Red Hat Enterprise Linux Supplementary Advisory URL: https://rhn.redhat.com/errata/RHSA-2016-2138.html Issue date: 2016-11-02 CVE Names: CVE-2016-5542 CVE-2016-5554 CVE-2016-5556 CVE-2016-5573 CVE-2016-5597 ===================================================================== 1. Summary: An update for java-1.7.0-ibm is now available for Red Hat Enterprise Linux 5 Supplementary. Red Hat Product Security has rated this update as having a security impact of Critical. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. 2. Relevant releases/architectures: Red Hat Enterprise Linux Desktop Supplementary (v. 5) - i386, x86_64 Red Hat Enterprise Linux Server Supplementary (v. 5) - i386, ppc, s390x, x86_64 3. Description: IBM Java SE version 7 includes the IBM Java Runtime Environment and the IBM Java Software Development Kit. This update upgrades IBM Java SE 7 to version 7 SR9-FP60. Security Fix(es): * This update fixes multiple vulnerabilities in the IBM Java Runtime Environment and the IBM Java Software Development Kit. Further information about these flaws can be found on the IBM Java Security alerts page, listed in the References section. (CVE-2016-5542, CVE-2016-5554, CVE-2016-5556, CVE-2016-5573, CVE-2016-5597) 4. Solution: For details on how to apply this update, which includes the changes described in this advisory, refer to: https://access.redhat.com/articles/11258 All running instances of IBM Java must be restarted for this update to take effect. 5. Bugs fixed (https://bugzilla.redhat.com/): 1385544 - CVE-2016-5573 OpenJDK: insufficient checks of JDWP packets (Hotspot, 8159519) 1385714 - CVE-2016-5554 OpenJDK: insufficient classloader consistency checks in ClassLoaderWithRepository (JMX, 8157739) 1385723 - CVE-2016-5542 OpenJDK: missing algorithm restrictions for jar verification (Libraries, 8155973) 1386103 - CVE-2016-5597 OpenJDK: exposure of server authentication credentials to proxy (Networking, 8160838) 1386408 - CVE-2016-5556 Oracle JDK: unspecified vulnerability fixed in 6u131, 7u121, and 8u111 (2D) 6. Package List: Red Hat Enterprise Linux Desktop Supplementary (v. 5): i386: java-1.7.0-ibm-1.7.0.9.60-1jpp.1.el5_11.i386.rpm java-1.7.0-ibm-demo-1.7.0.9.60-1jpp.1.el5_11.i386.rpm java-1.7.0-ibm-devel-1.7.0.9.60-1jpp.1.el5_11.i386.rpm java-1.7.0-ibm-jdbc-1.7.0.9.60-1jpp.1.el5_11.i386.rpm java-1.7.0-ibm-plugin-1.7.0.9.60-1jpp.1.el5_11.i386.rpm java-1.7.0-ibm-src-1.7.0.9.60-1jpp.1.el5_11.i386.rpm x86_64: java-1.7.0-ibm-1.7.0.9.60-1jpp.1.el5_11.i386.rpm java-1.7.0-ibm-1.7.0.9.60-1jpp.1.el5_11.x86_64.rpm java-1.7.0-ibm-demo-1.7.0.9.60-1jpp.1.el5_11.i386.rpm java-1.7.0-ibm-demo-1.7.0.9.60-1jpp.1.el5_11.x86_64.rpm java-1.7.0-ibm-devel-1.7.0.9.60-1jpp.1.el5_11.i386.rpm java-1.7.0-ibm-devel-1.7.0.9.60-1jpp.1.el5_11.x86_64.rpm java-1.7.0-ibm-jdbc-1.7.0.9.60-1jpp.1.el5_11.i386.rpm java-1.7.0-ibm-jdbc-1.7.0.9.60-1jpp.1.el5_11.x86_64.rpm java-1.7.0-ibm-plugin-1.7.0.9.60-1jpp.1.el5_11.i386.rpm java-1.7.0-ibm-plugin-1.7.0.9.60-1jpp.1.el5_11.x86_64.rpm java-1.7.0-ibm-src-1.7.0.9.60-1jpp.1.el5_11.i386.rpm java-1.7.0-ibm-src-1.7.0.9.60-1jpp.1.el5_11.x86_64.rpm Red Hat Enterprise Linux Server Supplementary (v. 5): i386: java-1.7.0-ibm-1.7.0.9.60-1jpp.1.el5_11.i386.rpm java-1.7.0-ibm-demo-1.7.0.9.60-1jpp.1.el5_11.i386.rpm java-1.7.0-ibm-devel-1.7.0.9.60-1jpp.1.el5_11.i386.rpm java-1.7.0-ibm-jdbc-1.7.0.9.60-1jpp.1.el5_11.i386.rpm java-1.7.0-ibm-plugin-1.7.0.9.60-1jpp.1.el5_11.i386.rpm java-1.7.0-ibm-src-1.7.0.9.60-1jpp.1.el5_11.i386.rpm ppc: java-1.7.0-ibm-1.7.0.9.60-1jpp.1.el5_11.ppc.rpm java-1.7.0-ibm-1.7.0.9.60-1jpp.1.el5_11.ppc64.rpm java-1.7.0-ibm-demo-1.7.0.9.60-1jpp.1.el5_11.ppc.rpm java-1.7.0-ibm-demo-1.7.0.9.60-1jpp.1.el5_11.ppc64.rpm java-1.7.0-ibm-devel-1.7.0.9.60-1jpp.1.el5_11.ppc.rpm java-1.7.0-ibm-devel-1.7.0.9.60-1jpp.1.el5_11.ppc64.rpm java-1.7.0-ibm-jdbc-1.7.0.9.60-1jpp.1.el5_11.ppc.rpm java-1.7.0-ibm-jdbc-1.7.0.9.60-1jpp.1.el5_11.ppc64.rpm java-1.7.0-ibm-plugin-1.7.0.9.60-1jpp.1.el5_11.ppc.rpm java-1.7.0-ibm-src-1.7.0.9.60-1jpp.1.el5_11.ppc.rpm java-1.7.0-ibm-src-1.7.0.9.60-1jpp.1.el5_11.ppc64.rpm s390x: java-1.7.0-ibm-1.7.0.9.60-1jpp.1.el5_11.s390.rpm java-1.7.0-ibm-1.7.0.9.60-1jpp.1.el5_11.s390x.rpm java-1.7.0-ibm-demo-1.7.0.9.60-1jpp.1.el5_11.s390.rpm java-1.7.0-ibm-demo-1.7.0.9.60-1jpp.1.el5_11.s390x.rpm java-1.7.0-ibm-devel-1.7.0.9.60-1jpp.1.el5_11.s390.rpm java-1.7.0-ibm-devel-1.7.0.9.60-1jpp.1.el5_11.s390x.rpm java-1.7.0-ibm-jdbc-1.7.0.9.60-1jpp.1.el5_11.s390.rpm java-1.7.0-ibm-jdbc-1.7.0.9.60-1jpp.1.el5_11.s390x.rpm java-1.7.0-ibm-src-1.7.0.9.60-1jpp.1.el5_11.s390.rpm java-1.7.0-ibm-src-1.7.0.9.60-1jpp.1.el5_11.s390x.rpm x86_64: java-1.7.0-ibm-1.7.0.9.60-1jpp.1.el5_11.i386.rpm java-1.7.0-ibm-1.7.0.9.60-1jpp.1.el5_11.x86_64.rpm java-1.7.0-ibm-demo-1.7.0.9.60-1jpp.1.el5_11.i386.rpm java-1.7.0-ibm-demo-1.7.0.9.60-1jpp.1.el5_11.x86_64.rpm java-1.7.0-ibm-devel-1.7.0.9.60-1jpp.1.el5_11.i386.rpm java-1.7.0-ibm-devel-1.7.0.9.60-1jpp.1.el5_11.x86_64.rpm java-1.7.0-ibm-jdbc-1.7.0.9.60-1jpp.1.el5_11.i386.rpm java-1.7.0-ibm-jdbc-1.7.0.9.60-1jpp.1.el5_11.x86_64.rpm java-1.7.0-ibm-plugin-1.7.0.9.60-1jpp.1.el5_11.i386.rpm java-1.7.0-ibm-plugin-1.7.0.9.60-1jpp.1.el5_11.x86_64.rpm java-1.7.0-ibm-src-1.7.0.9.60-1jpp.1.el5_11.i386.rpm java-1.7.0-ibm-src-1.7.0.9.60-1jpp.1.el5_11.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/ 7. References: https://access.redhat.com/security/cve/CVE-2016-5542 https://access.redhat.com/security/cve/CVE-2016-5554 https://access.redhat.com/security/cve/CVE-2016-5556 https://access.redhat.com/security/cve/CVE-2016-5573 https://access.redhat.com/security/cve/CVE-2016-5597 https://access.redhat.com/security/updates/classification/#critical https://www.ibm.com/developerworks/java/jdk/alerts/ 8. Contact: The Red Hat security contact is . More contact details at https://access.redhat.com/security/team/contact/ Copyright 2016 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iD8DBQFYGdwbXlSAg2UNWIIRAidnAKC8jV0vo6180kCptfJQiNHcFi3cuwCZAdks Phc7rnlyCrnI+uAUF7vG+QE= =RIGg -----END PGP SIGNATURE----- --