Jump to content
Compatible Support Forums

news

Members
  • Content count

    80899
  • Joined

  • Last visited

    Never
  • Days Won

    18

Everything posted by news

  1. CentOS Errata and Bugfix Advisory 2017:0913 Upstream details at : https://rhn.redhat.com/errata/RHBA-2017-0913.html The following updated files have been uploaded and are currently syncing to the mirrors: ( sha256sum Filename ) x86_64: cde26a26ece68b49ee272d0cdfd190e4beee130b1927ef86f7e6cb9ca783a45f ca-certificates-2017.2.11-70.1.el7_3.noarch.rpm Source: 47995f4c3e481a06e79af71a81998861ba465def8313c0adb036b856d99163c6 ca-certificates-2017.2.11-70.1.el7_3.src.rpm -- Johnny Hughes CentOS Project { http://www.centos.org/ } irc: hughesjr, #centos ( -at -) irc.freenode.net Twitter: ( -at -) JohnnyCentOS _______________________________________________
  2. CentOS Errata and Bugfix Advisory 2017:0905 Upstream details at : https://rhn.redhat.com/errata/RHBA-2017-0905.html The following updated files have been uploaded and are currently syncing to the mirrors: ( sha256sum Filename ) x86_64: 91b4df3ecc323165928e6a31737908e1edfca5842e75c65d8b0fbb09eeb00c50 irqbalance-1.0.7-6.el7_3.1.x86_64.rpm Source: 88131c2f2428f5ab82705550533d94c269a923ade603c931b747c1fb7ecf168a irqbalance-1.0.7-6.el7_3.1.src.rpm -- Johnny Hughes CentOS Project { http://www.centos.org/ } irc: hughesjr, #centos ( -at -) irc.freenode.net Twitter: ( -at -) JohnnyCentOS _______________________________________________
  3. CentOS Errata and Bugfix Advisory 2017:0917 Upstream details at : https://rhn.redhat.com/errata/RHBA-2017-0917.html The following updated files have been uploaded and are currently syncing to the mirrors: ( sha256sum Filename ) x86_64: 8d05489aa972e05af635f6aba9236262d3c2a5fefcb3e773b1a4ce60b39a7543 yum-rhn-plugin-2.0.1-6.1.el7_3.noarch.rpm Source: 9f92151197ed571ede4d03a62dadd653eeacc22c284c8f4f259d87814342230a yum-rhn-plugin-2.0.1-6.1.el7_3.src.rpm -- Johnny Hughes CentOS Project { http://www.centos.org/ } irc: hughesjr, #centos ( -at -) irc.freenode.net Twitter: ( -at -) JohnnyCentOS _______________________________________________
  4. CentOS Errata and Security Advisory 2017:0906 Moderate Upstream details at : https://rhn.redhat.com/errata/RHSA-2017-0906.html The following updated files have been uploaded and are currently syncing to the mirrors: ( sha256sum Filename ) x86_64: 3e941e4c2ee157ac7d6f020b3bfb4b2c2369d0a2bb3745534aa28e29925d9514 httpd-2.4.6-45.el7.centos.4.x86_64.rpm fab0f1d0022353b090e1b288629d5ce8f5ecdf689f03958fb1171d03960f28b6 httpd-devel-2.4.6-45.el7.centos.4.x86_64.rpm 7ada864e1973c2d34dd46a5fc7557fcaf1c0f54c6313453c129331a29d56e862 httpd-manual-2.4.6-45.el7.centos.4.noarch.rpm 96889910d65624a1a3aa442eff188885f5bc42f8d76d888593297ac6e423e035 httpd-tools-2.4.6-45.el7.centos.4.x86_64.rpm 3e11f212393e9a117c8512e78e5e12ce42ee3408067d4715d745f6d041291b18 mod_ldap-2.4.6-45.el7.centos.4.x86_64.rpm 1ba540b53c222db6f0ac9eb1114387cf6f2d59647f2bdcb12b360f539f7f245e mod_proxy_html-2.4.6-45.el7.centos.4.x86_64.rpm 354357840c1362305c2a7fb085d55713082b9a3e88586d8348e100e4962da2ec mod_session-2.4.6-45.el7.centos.4.x86_64.rpm a0d3a0af956f22c27ad04496d5fd456b3d55e869ca6c66dbbf2dab8437268450 mod_ssl-2.4.6-45.el7.centos.4.x86_64.rpm Source: f2f691a16d497ae89b7c1b3f5c8bebb559b5f86e10e52d0ce031225f7f695daf httpd-2.4.6-45.el7.centos.4.src.rpm -- Johnny Hughes CentOS Project { http://www.centos.org/ } irc: hughesjr, #centos ( -at -) irc.freenode.net Twitter: ( -at -) JohnnyCentOS _______________________________________________
  5. CentOS Errata and Bugfix Advisory 2017:0923 Upstream details at : https://rhn.redhat.com/errata/RHBA-2017-0923.html The following updated files have been uploaded and are currently syncing to the mirrors: ( sha256sum Filename ) x86_64: ad7bee7329706d42a213e587d20074d25f7cb52745ff13e13be77162ae289217 squid-3.5.20-2.el7_3.3.x86_64.rpm de5b31a1a304218b7e32fd973dc6a284a7e7dc2b8e890d3b85d292a309207bb7 squid-migration-script-3.5.20-2.el7_3.3.x86_64.rpm 1da1cb8b792883e78b7f427755b35a4b1b7f8bed38d300116cd5d9c63c8b7b79 squid-sysvinit-3.5.20-2.el7_3.3.x86_64.rpm Source: a8ca8972cbbd46f3446f9b5cfae792eda1f130849ac8aaf5c655a7c2d210d480 squid-3.5.20-2.el7_3.3.src.rpm -- Johnny Hughes CentOS Project { http://www.centos.org/ } irc: hughesjr, #centos ( -at -) irc.freenode.net Twitter: ( -at -) JohnnyCentOS _______________________________________________
  6. CentOS Errata and Bugfix Advisory 2017:0909 Upstream details at : https://rhn.redhat.com/errata/RHBA-2017-0909.html The following updated files have been uploaded and are currently syncing to the mirrors: ( sha256sum Filename ) x86_64: 7f8daa15c0c586f35b468a968a304aaa865ceba4dbc14d40dbd171a1deb44734 libgudev1-219-30.el7_3.8.i686.rpm 46f35c81d9447048157cdfcd19003c22d865c24e1c54dedcfd8ba55b9b2456df libgudev1-219-30.el7_3.8.x86_64.rpm 28d67b09133f98c2ee94b4e648f00ef10fb082191840d350b8b63b31dab651f3 libgudev1-devel-219-30.el7_3.8.i686.rpm 79154175175eae53e96fed7f3402424da41d7d9cfe956744008ce517b59b6d3c libgudev1-devel-219-30.el7_3.8.x86_64.rpm a958791a987f69acc1a3c50e75149118d7bca72312c6451ebe8c457b24ccd421 systemd-219-30.el7_3.8.x86_64.rpm 5548db83fd30cc5b3c78255f64de82308792fc6202e1fa3d6f760e7ae5015840 systemd-devel-219-30.el7_3.8.i686.rpm 24b8eaa7b57237eb55c978e5a00d123b55be3fd7d4b403a7b2ca766dc26e9d98 systemd-devel-219-30.el7_3.8.x86_64.rpm 444012f6699b020f207754e8e8bd922919bb81628afcc4a5681fd5301774a7b9 systemd-journal-gateway-219-30.el7_3.8.x86_64.rpm 012559fad5def210c2036d8d11959dc15845adf685fc0ddfd097d896ef46ffad systemd-libs-219-30.el7_3.8.i686.rpm d2740ba1a3f6ca61cae1e9c3bfbdaa645e4a3c46c0ce4a6a9532f57c45ebc1d1 systemd-libs-219-30.el7_3.8.x86_64.rpm 5fe5e8830fe48e086865bc2b81368f685a8ee830cd83e590e60454ce3bb4f716 systemd-networkd-219-30.el7_3.8.x86_64.rpm f9f431b08f6016e1ac9b5bfb63c74bdbebbc34c51d3a6fb3b5b252cc2ef45429 systemd-python-219-30.el7_3.8.x86_64.rpm 0c20ea1107ee0484ac7d135d45b67e2f36568b3c7490115f6fcc56ee6094d8ac systemd-resolved-219-30.el7_3.8.i686.rpm b9dcdcf633e1a5aac787ad0cec6d14b31d079bff514176d4575cda82fe060867 systemd-resolved-219-30.el7_3.8.x86_64.rpm 54ad0b62fcbc4efaebb31312506d695310b2c4f43ded82d8444ce19a19d054ee systemd-sysv-219-30.el7_3.8.x86_64.rpm Source: 68bb1420f295ea28db79a44b478fc361cd27a6d5b9dda372b88211500ce31477 systemd-219-30.el7_3.8.src.rpm -- Johnny Hughes CentOS Project { http://www.centos.org/ } irc: hughesjr, #centos ( -at -) irc.freenode.net Twitter: ( -at -) JohnnyCentOS _______________________________________________
  7. CentOS Errata and Security Advisory 2017:0920 Important Upstream details at : https://rhn.redhat.com/errata/RHSA-2017-0920.html The following updated files have been uploaded and are currently syncing to the mirrors: ( sha256sum Filename ) x86_64: 45311435f497b6facaaeeb5aac4e59117fc60175c5bda970d9602dba57e642bd 389-ds-base-1.3.5.10-20.el7_3.x86_64.rpm 151683af5cbafb93c07fa422d940c7853f8743ac2e7e44fcd3d8a6115ffb4391 389-ds-base-devel-1.3.5.10-20.el7_3.x86_64.rpm b9e806e89911b00f9d442ece447ceb77f2d922b974c77c416bfa7a7e1c89923e 389-ds-base-libs-1.3.5.10-20.el7_3.x86_64.rpm 29fc184db7e286e6aa50c8e7297336b2b0031f1759ead0c8ad8340787aef72f9 389-ds-base-snmp-1.3.5.10-20.el7_3.x86_64.rpm Source: 52c3cdb6b5db5ff789262733ca9e4eb10fcc9a02a8eaac8bf6f047b9a18238af 389-ds-base-1.3.5.10-20.el7_3.src.rpm -- Johnny Hughes CentOS Project { http://www.centos.org/ } irc: hughesjr, #centos ( -at -) irc.freenode.net Twitter: ( -at -) JohnnyCentOS _______________________________________________
  8. CentOS Errata and Bugfix Advisory 2017:0915 Upstream details at : https://rhn.redhat.com/errata/RHBA-2017-0915.html The following updated files have been uploaded and are currently syncing to the mirrors: ( sha256sum Filename ) x86_64: 356bf33eedbe4eb198e327befda417a5fa50176feb73a6f13d2cabde199ad4de openssh-6.6.1p1-35.el7_3.x86_64.rpm 05ae548f00db200355dba4f5519b4305556eb1d881d5a387bc72fbf00387bac5 openssh-askpass-6.6.1p1-35.el7_3.x86_64.rpm 5e470fd11a2e6605cdcd49048233cf27f22ca7fc1a3dd9b90d75c1228585f7e7 openssh-clients-6.6.1p1-35.el7_3.x86_64.rpm 8c017a759c44000430438fee8291f7479d4cc2ba6336d46b98601929cffc15e6 openssh-keycat-6.6.1p1-35.el7_3.x86_64.rpm e757f6ed2c8c972ddc90f51e86bb19c16f75a75f30bd16bacca99155d92faec4 openssh-ldap-6.6.1p1-35.el7_3.x86_64.rpm 34d0a1dbe8853fb62864e2510bd8ba1ab32ea729053f5a54117411fbab3da401 openssh-server-6.6.1p1-35.el7_3.x86_64.rpm c40d5cb5b7a6631ac07dbe77608bc87ea6ba3fc7f809decbb1c7eb264dd47dc6 openssh-server-sysvinit-6.6.1p1-35.el7_3.x86_64.rpm 448946bceb88e278ea9715c8090fb6c5086bdf5e7fcc2afc040c3c58641bedb4 pam_ssh_agent_auth-0.9.3-9.35.el7_3.i686.rpm c200b92ad813c395b336eda875aa66c13938fe9098fef795f90eab0176ac812e pam_ssh_agent_auth-0.9.3-9.35.el7_3.x86_64.rpm Source: c88649ae298cc071f3b0dc1a5e70cd2029f9f9554aaa1275c2afd2d4ab59c47e openssh-6.6.1p1-35.el7_3.src.rpm -- Johnny Hughes CentOS Project { http://www.centos.org/ } irc: hughesjr, #centos ( -at -) irc.freenode.net Twitter: ( -at -) JohnnyCentOS _______________________________________________
  9. news

    Drobo 5N2 NAS Review

    Drobo 5N2 NAS Review ------------------------------------------------------------ http://us2.campaign-archive2.com/?e=872093acb5&u=bfb2b902b5fb045ad6f841f98&id=7eb578e2bb http://www.kitguru.net Drobo 5N2 NAS Review We reviewed Drobo’s 5N home/SOHO 5-bay tower NAS last year and now the next generation 5N, the 5N2 has arrived. Drobo claim it’s their fastest 5-bay NAS to date with a more powerful processor than the original as well as an additional LAN port to offer improved network performance and failover protection. Read the review here: http://www.kitguru.net/professional/networking/simon-crisp/drobo-5n2-nas-review/ ============================================================ ** follow on Twitter (http://twitter.com/#!/kitgurupress) | ** friend on Facebook (http://www.facebook.com/pages/KitGuru/162236020510911) | ** forward to a friend (http://us2.forward-to-friend2.com/forward?u=bfb2b902b5fb045ad6f841f98&id=7eb578e2bb&e=872093acb5) Copyright © 2017 KitGuru, All rights reserved. You are receiving this because you are a news partner or have signed up to receive our news.
  10. SUSE Security Update: Security update for bind ______________________________________________________________________________ Announcement ID: SUSE-SU-2017:0999-1 Rating: important References: #1033466 #1033467 #1033468 #987866 #989528 Cross-References: CVE-2016-2775 CVE-2016-6170 CVE-2017-3136 CVE-2017-3137 CVE-2017-3138 Affected Products: SUSE Linux Enterprise Server for SAP 12 SUSE Linux Enterprise Server 12-LTSS ______________________________________________________________________________ An update that fixes 5 vulnerabilities is now available. Description: This update for bind fixes the following issues: CVE-2017-3137 (bsc#1033467): Mistaken assumptions about the ordering of records in the answer section of a response containing CNAME or DNAME resource records could have been exploited to cause a denial of service of a bind server performing recursion. CVE-2017-3136 (bsc#1033466): An attacker could have constructed a query that would cause a denial of service of servers configured to use DNS64. CVE-2017-3138 (bsc#1033468): An attacker with access to the BIND control channel could have caused the server to stop by triggering an assertion failure. CVE-2016-6170 (bsc#987866): Primary DNS servers could have caused a denial of service of secondary DNS servers via a large AXFR response. IXFR servers could have caused a denial of service of IXFR clients via a large IXFR response. Remote authenticated users could have caused a denial of service of primary DNS servers via a large UPDATE message. CVE-2016-2775 (bsc#989528): When lwresd or the named lwres option were enabled, bind allowed remote attackers to cause a denial of service (daemon crash) via a long request that uses the lightweight resolver protocol. Patch Instructions: To install this SUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product: - SUSE Linux Enterprise Server for SAP 12: zypper in -t patch SUSE-SLE-SAP-12-2017-581=1 - SUSE Linux Enterprise Server 12-LTSS: zypper in -t patch SUSE-SLE-SERVER-12-2017-581=1 To bring your system up-to-date, use "zypper patch". Package List: - SUSE Linux Enterprise Server for SAP 12 (x86_64): bind-9.9.9P1-28.34.1 bind-chrootenv-9.9.9P1-28.34.1 bind-debuginfo-9.9.9P1-28.34.1 bind-debugsource-9.9.9P1-28.34.1 bind-devel-9.9.9P1-28.34.1 bind-libs-32bit-9.9.9P1-28.34.1 bind-libs-9.9.9P1-28.34.1 bind-libs-debuginfo-32bit-9.9.9P1-28.34.1 bind-libs-debuginfo-9.9.9P1-28.34.1 bind-utils-9.9.9P1-28.34.1 bind-utils-debuginfo-9.9.9P1-28.34.1 - SUSE Linux Enterprise Server for SAP 12 (noarch): bind-doc-9.9.9P1-28.34.1 - SUSE Linux Enterprise Server 12-LTSS (ppc64le s390x x86_64): bind-9.9.9P1-28.34.1 bind-chrootenv-9.9.9P1-28.34.1 bind-debuginfo-9.9.9P1-28.34.1 bind-debugsource-9.9.9P1-28.34.1 bind-devel-9.9.9P1-28.34.1 bind-libs-9.9.9P1-28.34.1 bind-libs-debuginfo-9.9.9P1-28.34.1 bind-utils-9.9.9P1-28.34.1 bind-utils-debuginfo-9.9.9P1-28.34.1 - SUSE Linux Enterprise Server 12-LTSS (s390x x86_64): bind-libs-32bit-9.9.9P1-28.34.1 bind-libs-debuginfo-32bit-9.9.9P1-28.34.1 - SUSE Linux Enterprise Server 12-LTSS (noarch): bind-doc-9.9.9P1-28.34.1 References: https://www.suse.com/security/cve/CVE-2016-2775.html https://www.suse.com/security/cve/CVE-2016-6170.html https://www.suse.com/security/cve/CVE-2017-3136.html https://www.suse.com/security/cve/CVE-2017-3137.html https://www.suse.com/security/cve/CVE-2017-3138.html https://bugzilla.suse.com/1033466 https://bugzilla.suse.com/1033467 https://bugzilla.suse.com/1033468 https://bugzilla.suse.com/987866 https://bugzilla.suse.com/989528 -- To unsubscribe, e-mail: opensuse-security-announce+unsubscribe ( -at -) opensuse.org For additional commands, e-mail: opensuse-security-announce+help ( -at -) opensuse.org
  11. SUSE Security Update: Security update for bind ______________________________________________________________________________ Announcement ID: SUSE-SU-2017:0998-1 Rating: important References: #1020983 #1033466 #1033467 #1033468 #987866 #989528 Cross-References: CVE-2016-2775 CVE-2016-6170 CVE-2017-3136 CVE-2017-3137 CVE-2017-3138 Affected Products: SUSE Linux Enterprise Software Development Kit 12-SP2 SUSE Linux Enterprise Software Development Kit 12-SP1 SUSE Linux Enterprise Server for Raspberry Pi 12-SP2 SUSE Linux Enterprise Server 12-SP2 SUSE Linux Enterprise Server 12-SP1 SUSE Linux Enterprise Desktop 12-SP2 SUSE Linux Enterprise Desktop 12-SP1 ______________________________________________________________________________ An update that solves 5 vulnerabilities and has one errata is now available. Description: This update for bind fixes the following issues: CVE-2017-3137 (bsc#1033467): Mistaken assumptions about the ordering of records in the answer section of a response containing CNAME or DNAME resource records could have been exploited to cause a denial of service of a bind server performing recursion. CVE-2017-3136 (bsc#1033466): An attacker could have constructed a query that would cause a denial of service of servers configured to use DNS64. CVE-2017-3138 (bsc#1033468): An attacker with access to the BIND control channel could have caused the server to stop by triggering an assertion failure. CVE-2016-6170 (bsc#987866): Primary DNS servers could have caused a denial of service of secondary DNS servers via a large AXFR response. IXFR servers could have caused a denial of service of IXFR clients via a large IXFR response. Remote authenticated users could have caused a denial of service of primary DNS servers via a large UPDATE message. CVE-2016-2775 (bsc#989528): When lwresd or the named lwres option were enabled, bind allowed remote attackers to cause a denial of service (daemon crash) via a long request that uses the lightweight resolver protocol. One additional non-security bug was fixed: The default umask was changed to 077. (bsc#1020983) Patch Instructions: To install this SUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product: - SUSE Linux Enterprise Software Development Kit 12-SP2: zypper in -t patch SUSE-SLE-SDK-12-SP2-2017-582=1 - SUSE Linux Enterprise Software Development Kit 12-SP1: zypper in -t patch SUSE-SLE-SDK-12-SP1-2017-582=1 - SUSE Linux Enterprise Server for Raspberry Pi 12-SP2: zypper in -t patch SUSE-SLE-RPI-12-SP2-2017-582=1 - SUSE Linux Enterprise Server 12-SP2: zypper in -t patch SUSE-SLE-SERVER-12-SP2-2017-582=1 - SUSE Linux Enterprise Server 12-SP1: zypper in -t patch SUSE-SLE-SERVER-12-SP1-2017-582=1 - SUSE Linux Enterprise Desktop 12-SP2: zypper in -t patch SUSE-SLE-DESKTOP-12-SP2-2017-582=1 - SUSE Linux Enterprise Desktop 12-SP1: zypper in -t patch SUSE-SLE-DESKTOP-12-SP1-2017-582=1 To bring your system up-to-date, use "zypper patch". Package List: - SUSE Linux Enterprise Software Development Kit 12-SP2 (aarch64 ppc64le s390x x86_64): bind-debuginfo-9.9.9P1-59.1 bind-debugsource-9.9.9P1-59.1 bind-devel-9.9.9P1-59.1 - SUSE Linux Enterprise Software Development Kit 12-SP1 (ppc64le s390x x86_64): bind-debuginfo-9.9.9P1-59.1 bind-debugsource-9.9.9P1-59.1 bind-devel-9.9.9P1-59.1 - SUSE Linux Enterprise Server for Raspberry Pi 12-SP2 (aarch64): bind-9.9.9P1-59.1 bind-chrootenv-9.9.9P1-59.1 bind-debuginfo-9.9.9P1-59.1 bind-debugsource-9.9.9P1-59.1 bind-libs-9.9.9P1-59.1 bind-libs-debuginfo-9.9.9P1-59.1 bind-utils-9.9.9P1-59.1 bind-utils-debuginfo-9.9.9P1-59.1 - SUSE Linux Enterprise Server for Raspberry Pi 12-SP2 (noarch): bind-doc-9.9.9P1-59.1 - SUSE Linux Enterprise Server 12-SP2 (aarch64 ppc64le x86_64): bind-9.9.9P1-59.1 bind-chrootenv-9.9.9P1-59.1 bind-debuginfo-9.9.9P1-59.1 bind-debugsource-9.9.9P1-59.1 bind-libs-9.9.9P1-59.1 bind-libs-debuginfo-9.9.9P1-59.1 bind-utils-9.9.9P1-59.1 bind-utils-debuginfo-9.9.9P1-59.1 - SUSE Linux Enterprise Server 12-SP2 (x86_64): bind-libs-32bit-9.9.9P1-59.1 bind-libs-debuginfo-32bit-9.9.9P1-59.1 - SUSE Linux Enterprise Server 12-SP2 (noarch): bind-doc-9.9.9P1-59.1 - SUSE Linux Enterprise Server 12-SP1 (ppc64le s390x x86_64): bind-9.9.9P1-59.1 bind-chrootenv-9.9.9P1-59.1 bind-debuginfo-9.9.9P1-59.1 bind-debugsource-9.9.9P1-59.1 bind-libs-9.9.9P1-59.1 bind-libs-debuginfo-9.9.9P1-59.1 bind-utils-9.9.9P1-59.1 bind-utils-debuginfo-9.9.9P1-59.1 - SUSE Linux Enterprise Server 12-SP1 (s390x x86_64): bind-libs-32bit-9.9.9P1-59.1 bind-libs-debuginfo-32bit-9.9.9P1-59.1 - SUSE Linux Enterprise Server 12-SP1 (noarch): bind-doc-9.9.9P1-59.1 - SUSE Linux Enterprise Desktop 12-SP2 (x86_64): bind-debuginfo-9.9.9P1-59.1 bind-debugsource-9.9.9P1-59.1 bind-libs-32bit-9.9.9P1-59.1 bind-libs-9.9.9P1-59.1 bind-libs-debuginfo-32bit-9.9.9P1-59.1 bind-libs-debuginfo-9.9.9P1-59.1 bind-utils-9.9.9P1-59.1 bind-utils-debuginfo-9.9.9P1-59.1 - SUSE Linux Enterprise Desktop 12-SP1 (x86_64): bind-debuginfo-9.9.9P1-59.1 bind-debugsource-9.9.9P1-59.1 bind-libs-32bit-9.9.9P1-59.1 bind-libs-9.9.9P1-59.1 bind-libs-debuginfo-32bit-9.9.9P1-59.1 bind-libs-debuginfo-9.9.9P1-59.1 bind-utils-9.9.9P1-59.1 bind-utils-debuginfo-9.9.9P1-59.1 References: https://www.suse.com/security/cve/CVE-2016-2775.html https://www.suse.com/security/cve/CVE-2016-6170.html https://www.suse.com/security/cve/CVE-2017-3136.html https://www.suse.com/security/cve/CVE-2017-3137.html https://www.suse.com/security/cve/CVE-2017-3138.html https://bugzilla.suse.com/1020983 https://bugzilla.suse.com/1033466 https://bugzilla.suse.com/1033467 https://bugzilla.suse.com/1033468 https://bugzilla.suse.com/987866 https://bugzilla.suse.com/989528 -- To unsubscribe, e-mail: opensuse-security-announce+unsubscribe ( -at -) opensuse.org For additional commands, e-mail: opensuse-security-announce+help ( -at -) opensuse.org
  12. CentOS Errata and Enhancement Advisory 2017:0890 Upstream details at : https://rhn.redhat.com/errata/RHEA-2017-0890.html The following updated files have been uploaded and are currently syncing to the mirrors: ( sha256sum Filename ) i386: 509dfc40541a3cd57337f0415f0fafeb37076988956b0b351513fedcea0cd348 nss-3.28.3-3.el6_9.i686.rpm 2cb1a6b94ebe7eb14568b8a9609087621bb756f5c1a1d66209f4624483890c52 nss-devel-3.28.3-3.el6_9.i686.rpm 9ce45c047f6d3aa94ac99642d9325938eb3da9865df742199a886a5661d3c08b nss-pkcs11-devel-3.28.3-3.el6_9.i686.rpm 9e9449fb1828556f54ed786451c876fe60f77979c786f9fb4d70be000b023e31 nss-sysinit-3.28.3-3.el6_9.i686.rpm 0ce30b6e8eef1497a146e36de426d0edfa2f6ccfdde0761b8c39edf35efbb27d nss-tools-3.28.3-3.el6_9.i686.rpm x86_64: 509dfc40541a3cd57337f0415f0fafeb37076988956b0b351513fedcea0cd348 nss-3.28.3-3.el6_9.i686.rpm 85e659e7c9dd6cc3f92d9533b7639c3bd20c000f28993ec911f820f9b6f7e417 nss-3.28.3-3.el6_9.x86_64.rpm 2cb1a6b94ebe7eb14568b8a9609087621bb756f5c1a1d66209f4624483890c52 nss-devel-3.28.3-3.el6_9.i686.rpm 648f642b45d3a106f7a7ce696361de4f5ce1d91f6041a0c981a4985a965d0220 nss-devel-3.28.3-3.el6_9.x86_64.rpm 9ce45c047f6d3aa94ac99642d9325938eb3da9865df742199a886a5661d3c08b nss-pkcs11-devel-3.28.3-3.el6_9.i686.rpm 1109409641781683833d8320b316bf2db7eee3e23ac708129bce3215a4386687 nss-pkcs11-devel-3.28.3-3.el6_9.x86_64.rpm 507a50f8fca8e8e3bcf1fcb44355b7c4a392ea51a250fa9245a572094b73f762 nss-sysinit-3.28.3-3.el6_9.x86_64.rpm c6c87a08024a0c914058671cf5c58e6b17452a266b13a40edc430838597e5292 nss-tools-3.28.3-3.el6_9.x86_64.rpm Source: fb7422b5d57a5a743165fd8f93884ceffe1aa300042fa6493cd5282c27c29273 nss-3.28.3-3.el6_9.src.rpm -- Johnny Hughes CentOS Project { http://www.centos.org/ } irc: hughesjr, #centos ( -at -) irc.freenode.net Twitter: ( -at -) JohnnyCentOS _______________________________________________
  13. CentOS Errata and Bugfix Advisory 2017:0891 Upstream details at : https://rhn.redhat.com/errata/RHBA-2017-0891.html The following updated files have been uploaded and are currently syncing to the mirrors: ( sha256sum Filename ) i386: 522137f6ad927defa29d622f9c898b15cfcb831bc9540a744cc633ce592029d4 binutils-2.20.51.0.2-5.47.el6_9.1.i686.rpm fcf046bc91f084f03066b70d1678f00244962c89b04edac4f4675b0f521ea7cc binutils-devel-2.20.51.0.2-5.47.el6_9.1.i686.rpm x86_64: 3ddfa87eb95de0b5b9c45c9066c888f5ad09604f828f781c9667d9e567b16a98 binutils-2.20.51.0.2-5.47.el6_9.1.x86_64.rpm fcf046bc91f084f03066b70d1678f00244962c89b04edac4f4675b0f521ea7cc binutils-devel-2.20.51.0.2-5.47.el6_9.1.i686.rpm 6f836323bf6bd2f69ec0f7de74b268a0281b46f4a4a1626aee5d006bf86e2eb1 binutils-devel-2.20.51.0.2-5.47.el6_9.1.x86_64.rpm Source: 0a75e68ffd00380df15b062e3aaf5bddb4b1f008882945d62cb25432abb9e6fb binutils-2.20.51.0.2-5.47.el6_9.1.src.rpm -- Johnny Hughes CentOS Project { http://www.centos.org/ } irc: hughesjr, #centos ( -at -) irc.freenode.net Twitter: ( -at -) JohnnyCentOS _______________________________________________
  14. CentOS Errata and Enhancement Advisory 2017:0890 Upstream details at : https://rhn.redhat.com/errata/RHEA-2017-0890.html The following updated files have been uploaded and are currently syncing to the mirrors: ( sha256sum Filename ) i386: f0dd36a2ffd1bd3193157b19bbed84aaefa671bec44a6b0f77dc2459166cf444 nss-util-3.28.3-1.el6_9.i686.rpm 2b85c7bd91b7211b995091b75cfabcc7d661e2a4081ddaa3dd0b43f7f06b0789 nss-util-devel-3.28.3-1.el6_9.i686.rpm x86_64: f0dd36a2ffd1bd3193157b19bbed84aaefa671bec44a6b0f77dc2459166cf444 nss-util-3.28.3-1.el6_9.i686.rpm 1e31884ab0c3f3ed7c9dceeed6d8756fa5953a8995fcc95a5d2ec54afbe273c1 nss-util-3.28.3-1.el6_9.x86_64.rpm 2b85c7bd91b7211b995091b75cfabcc7d661e2a4081ddaa3dd0b43f7f06b0789 nss-util-devel-3.28.3-1.el6_9.i686.rpm d1ab474cfaa8d7e326fb07ae3888d49db13b214e1902b1ff20c6838eb63d30d1 nss-util-devel-3.28.3-1.el6_9.x86_64.rpm Source: 2717e278d224dce7a6736e8d474b3ec20c4b657403a363d2ea82b31b7b8011ea nss-util-3.28.3-1.el6_9.src.rpm -- Johnny Hughes CentOS Project { http://www.centos.org/ } irc: hughesjr, #centos ( -at -) irc.freenode.net Twitter: ( -at -) JohnnyCentOS _______________________________________________
  15. CentOS Errata and Security Advisory 2017:0893 Important Upstream details at : https://rhn.redhat.com/errata/RHSA-2017-0893.html The following updated files have been uploaded and are currently syncing to the mirrors: ( sha256sum Filename ) i386: f37d9fc9d72aa953adf6f00bd89f983f4fa4014fa60aa5592ed0193f19bb1a17 389-ds-base-1.2.11.15-91.el6_9.i686.rpm 912cfdc9c70c72572b3ddd43a837684cd6a333cf13669c31446fcbf2f627c02c 389-ds-base-devel-1.2.11.15-91.el6_9.i686.rpm 7b0321c770d7747d75042b06143c4191f7093509f0aa03a35cc64ab27a7e8661 389-ds-base-libs-1.2.11.15-91.el6_9.i686.rpm x86_64: 46e41f2c29fc9f4385b09d81d29c6643f6f3a4024312f0cf24b0328722c3cad1 389-ds-base-1.2.11.15-91.el6_9.x86_64.rpm 912cfdc9c70c72572b3ddd43a837684cd6a333cf13669c31446fcbf2f627c02c 389-ds-base-devel-1.2.11.15-91.el6_9.i686.rpm 115c2855a58ba660f845ead4b4a69ee66ce3a07f656474f67c4c63c61ec81131 389-ds-base-devel-1.2.11.15-91.el6_9.x86_64.rpm 7b0321c770d7747d75042b06143c4191f7093509f0aa03a35cc64ab27a7e8661 389-ds-base-libs-1.2.11.15-91.el6_9.i686.rpm 02cdcbe1385fe44f3fbcb17ed60a7f1f31748f9c971b5b41388584ca98907b1d 389-ds-base-libs-1.2.11.15-91.el6_9.x86_64.rpm Source: 6766a9c8fd0d269b3dbb571c313ba53ad1e1552a68c09bf5dcef1590cbdf9c67 389-ds-base-1.2.11.15-91.el6_9.src.rpm -- Johnny Hughes CentOS Project { http://www.centos.org/ } irc: hughesjr, #centos ( -at -) irc.freenode.net Twitter: ( -at -) JohnnyCentOS _______________________________________________
  16. CentOS Errata and Bugfix Advisory 2017:0889 Upstream details at : https://rhn.redhat.com/errata/RHBA-2017-0889.html The following updated files have been uploaded and are currently syncing to the mirrors: ( sha256sum Filename ) i386: 9ce4a6af56ee568164dade2fd4254ce8c362f2307a04d333de521de47da110ca libsmbclient-3.6.23-42.el6_9.i686.rpm cac7a69c90589ec4bee06dc745050c5b88a7b189e041de7d12df7d4b733281df libsmbclient-devel-3.6.23-42.el6_9.i686.rpm b5293faf3005566dfb0c9d0a66e31a6455421dab8a321f58d37e5750235697b3 samba-3.6.23-42.el6_9.i686.rpm 6829a9b24b8aa9785018993c7af7fda4e895c61021e2bfe1f6289cd2fcb4da05 samba-client-3.6.23-42.el6_9.i686.rpm fc55152d6ab7d82309a0eb7b1fa518214535c79b78e0f76bfb52c1153ace1e5c samba-common-3.6.23-42.el6_9.i686.rpm eb7ba98097c62a909de5df7f1f01f232cee3eb301404826e5d29c80c82b254f6 samba-doc-3.6.23-42.el6_9.i686.rpm cad6f604b3c84e806a37579ba94f4b69168b8658c9556af4bee777d4be0eaf46 samba-domainjoin-gui-3.6.23-42.el6_9.i686.rpm 808c4e8fda62dc7d94b05a25b67ad27c8b1302e559c6819459efcfb4dc33bdb1 samba-swat-3.6.23-42.el6_9.i686.rpm 4170815ce9c1c79cf77c5dacba9beb09f6cc0927d7388348385a39fe7decb514 samba-winbind-3.6.23-42.el6_9.i686.rpm d1132bcb927cfdfdf5cd471437d9aaaa0154753ba0a2f077b8200cf398b4fde9 samba-winbind-clients-3.6.23-42.el6_9.i686.rpm 88faedc52cab529f10b2e323cc1c4f8bc609acee4766d798a41ceb145029c28f samba-winbind-devel-3.6.23-42.el6_9.i686.rpm 865c0de7f6a1b0437c8084d4e80b5824229fc486b2d4318f53c96a5c153325c3 samba-winbind-krb5-locator-3.6.23-42.el6_9.i686.rpm x86_64: 9ce4a6af56ee568164dade2fd4254ce8c362f2307a04d333de521de47da110ca libsmbclient-3.6.23-42.el6_9.i686.rpm 9252d97e5b1d83525ce506768ef46d651948bfbc5fc106e550ff759a92423240 libsmbclient-3.6.23-42.el6_9.x86_64.rpm cac7a69c90589ec4bee06dc745050c5b88a7b189e041de7d12df7d4b733281df libsmbclient-devel-3.6.23-42.el6_9.i686.rpm 7c03b4c3bbf7c3aae2ba79fc17357cec551df9121d944218f6e24099f9069646 libsmbclient-devel-3.6.23-42.el6_9.x86_64.rpm a48103747b6f3c612ea19f5ed057dbda448b701751cb9941c16841178d1c84d1 samba-3.6.23-42.el6_9.x86_64.rpm 60ba8b2f2723b15e5c5c33023e05db2a0648c9c06482785af2de5baa139d85fc samba-client-3.6.23-42.el6_9.x86_64.rpm fc55152d6ab7d82309a0eb7b1fa518214535c79b78e0f76bfb52c1153ace1e5c samba-common-3.6.23-42.el6_9.i686.rpm 9ce3055d83ee7f9713537f3e59cd55b542f65d523c3d036796f93703859529f1 samba-common-3.6.23-42.el6_9.x86_64.rpm d410f5225467f1e60da5e50b85ee92e381d374f73942c298fb37ece89c8ba820 samba-doc-3.6.23-42.el6_9.x86_64.rpm 49b363e62e81849237e62c553152f21b419d01097cc896a49f734e953f2acedf samba-domainjoin-gui-3.6.23-42.el6_9.x86_64.rpm ababd26fd7af3800feb36777dc1459c67e8f3ddd3ee343a24d091de912a13a0f samba-glusterfs-3.6.23-42.el6_9.x86_64.rpm bc593a2e9139f2e3ce3484097ea123350712ff93571fd9b3f205af31d0199507 samba-swat-3.6.23-42.el6_9.x86_64.rpm 68511f9e70e3934467bae9a8923f934ba938db60250d258aed078237952004f3 samba-winbind-3.6.23-42.el6_9.x86_64.rpm d1132bcb927cfdfdf5cd471437d9aaaa0154753ba0a2f077b8200cf398b4fde9 samba-winbind-clients-3.6.23-42.el6_9.i686.rpm de60ddaa43fdeaf72d88f7a0f3aa36b863b1cff204d9421ae8a124f750fdd166 samba-winbind-clients-3.6.23-42.el6_9.x86_64.rpm 88faedc52cab529f10b2e323cc1c4f8bc609acee4766d798a41ceb145029c28f samba-winbind-devel-3.6.23-42.el6_9.i686.rpm 46cdbecd3889f1b48f5467a6133779a3e78e8db490532d014a5c59c9348f8dc6 samba-winbind-devel-3.6.23-42.el6_9.x86_64.rpm f6ef47d35a28f2b042d51335e5e39ce226624bcc6bfa11943a4f7a198d5d3d04 samba-winbind-krb5-locator-3.6.23-42.el6_9.x86_64.rpm Source: 93f46faa8d8a6947457634412d1efcd5abd729aa546a384d7d031727b96efaf6 samba-3.6.23-42.el6_9.src.rpm -- Johnny Hughes CentOS Project { http://www.centos.org/ } irc: hughesjr, #centos ( -at -) irc.freenode.net Twitter: ( -at -) JohnnyCentOS _______________________________________________
  17. CentOS Errata and Bugfix Advisory 2017:0894 Upstream details at : https://rhn.redhat.com/errata/RHBA-2017-0894.html The following updated files have been uploaded and are currently syncing to the mirrors: ( sha256sum Filename ) i386: 9d63b2a8a77b6636265bc8edfdbb0fc3bcb8e1c656161d59c3cf7579edf6b4c7 glibc-2.12-1.209.el6_9.1.i686.rpm ba30bee02c49006e9698a77804c3d836c1e053a61bb73948ba99a0714fbace46 glibc-common-2.12-1.209.el6_9.1.i686.rpm 8ad4160b287392bf3b750148daa757352970686d4344c37d5d53867eb47478c2 glibc-devel-2.12-1.209.el6_9.1.i686.rpm 28bbf60b4c9404622599321874b8cf9bb54c7acdd015dd3e692b6e6b4cd583cc glibc-headers-2.12-1.209.el6_9.1.i686.rpm 4a40f86b6fea385e2ead0a090a0f1b7f63f326acae376666976b06397a89bce3 glibc-static-2.12-1.209.el6_9.1.i686.rpm 182408411a6a47e5ccf15ade5eb1b6c5a6f84312d54c6a5067aa01740d701f3e glibc-utils-2.12-1.209.el6_9.1.i686.rpm 40cf3d6e5c12a07fab4d789c352082812f146820c93f6bf5aff47c5e4ae25747 nscd-2.12-1.209.el6_9.1.i686.rpm x86_64: 9d63b2a8a77b6636265bc8edfdbb0fc3bcb8e1c656161d59c3cf7579edf6b4c7 glibc-2.12-1.209.el6_9.1.i686.rpm 650a0071e6e7859cdbfb941ea564994ce4f6cba203384e3a950364a1d3ff9ebe glibc-2.12-1.209.el6_9.1.x86_64.rpm 6c2fca00f9b1dbef707434d97aa356fa180224c24dc17b024e2a66bee60d7ba6 glibc-common-2.12-1.209.el6_9.1.x86_64.rpm 8ad4160b287392bf3b750148daa757352970686d4344c37d5d53867eb47478c2 glibc-devel-2.12-1.209.el6_9.1.i686.rpm e343aeebc2a75cf9d3b75b02d58be7c358a14d0291f8581d21d0ae5bb7135dd4 glibc-devel-2.12-1.209.el6_9.1.x86_64.rpm d3ba0a0c27c5db4b1f15e3ec5fc35b620bb3a8a9aaaed4d6384deb5e72f04769 glibc-headers-2.12-1.209.el6_9.1.x86_64.rpm 4a40f86b6fea385e2ead0a090a0f1b7f63f326acae376666976b06397a89bce3 glibc-static-2.12-1.209.el6_9.1.i686.rpm ba4d18f71d4e3e74d2a150098656a899cd2414324992d6efe90ef60da406be8a glibc-static-2.12-1.209.el6_9.1.x86_64.rpm c95f7ca9104adcd8603b3d99fdf672f975d423e559e5b248710562014041695b glibc-utils-2.12-1.209.el6_9.1.x86_64.rpm 2c3ac82473b66c51039b3af1263dc688d3f8224b33db54953f9779368363692e nscd-2.12-1.209.el6_9.1.x86_64.rpm Source: 146f3b91dfd472aa8d78f1465b2e5e8111fa3f85e62c9acc1f06096d0bcafdc7 glibc-2.12-1.209.el6_9.1.src.rpm -- Johnny Hughes CentOS Project { http://www.centos.org/ } irc: hughesjr, #centos ( -at -) irc.freenode.net Twitter: ( -at -) JohnnyCentOS _______________________________________________
  18. CentOS Errata and Security Advisory 2017:0892 Important Upstream details at : https://rhn.redhat.com/errata/RHSA-2017-0892.html The following updated files have been uploaded and are currently syncing to the mirrors: ( sha256sum Filename ) i386: 2367afcc5342da7c12ee2263779d93a954989b5caa9dfd731addafdd06eb1638 kernel-2.6.32-696.1.1.el6.i686.rpm c489879590137579eff94afc56ed1372164f434b25b3e1a43c117d9e5d61e2ce kernel-abi-whitelists-2.6.32-696.1.1.el6.noarch.rpm e250c00c050d23fdd9d702a05e9092e0643869737d9937db2e2b3e579a1db045 kernel-debug-2.6.32-696.1.1.el6.i686.rpm 3c64e9dfc843cdbb8e5a60345bfed8abb7dfbdd93bbc8064935c6e5042fa989c kernel-debug-devel-2.6.32-696.1.1.el6.i686.rpm c723a4ccedbb868a4fe605bc7f86bf170703938f51a88f512198edc9305d503e kernel-devel-2.6.32-696.1.1.el6.i686.rpm 27ed32deef4b7e27b3657b84d02199112e9b9023fe8944bb4925c86a2ad7d4f6 kernel-doc-2.6.32-696.1.1.el6.noarch.rpm a91232aa2b06cd5d709969455d6b19a691f8da607cdd41e8cae54b45dd4517af kernel-firmware-2.6.32-696.1.1.el6.noarch.rpm e643e1c3cb86f48102ed0f3ae5472f5de07ce52088422a3ffd78f3c3d18e2c12 kernel-headers-2.6.32-696.1.1.el6.i686.rpm 0ec7874f8cbd0a05aca3a5d62f5a8b901685224246f03d988f6f8d99dc9a3696 perf-2.6.32-696.1.1.el6.i686.rpm c6df199d777e745b397914dfcfee3311a23b611ffa17b1887739d0a00f2f7c29 python-perf-2.6.32-696.1.1.el6.i686.rpm x86_64: 50b0a0be111ec196f0c253a1462f542cf823df9a54d4af6045365ea31aa8fbd8 kernel-2.6.32-696.1.1.el6.x86_64.rpm c489879590137579eff94afc56ed1372164f434b25b3e1a43c117d9e5d61e2ce kernel-abi-whitelists-2.6.32-696.1.1.el6.noarch.rpm 3badb8f67c68256f4995812088264a89329fd3f5f09315d0298a7f9638359828 kernel-debug-2.6.32-696.1.1.el6.x86_64.rpm 3c64e9dfc843cdbb8e5a60345bfed8abb7dfbdd93bbc8064935c6e5042fa989c kernel-debug-devel-2.6.32-696.1.1.el6.i686.rpm d989a9230305f177b2c011f482087e6dfacf2742128d0ab2020d634edcfe0255 kernel-debug-devel-2.6.32-696.1.1.el6.x86_64.rpm 715e336be40c119cf68834110e8c39d03b5c437578498ca8b09290f0e6189fab kernel-devel-2.6.32-696.1.1.el6.x86_64.rpm 27ed32deef4b7e27b3657b84d02199112e9b9023fe8944bb4925c86a2ad7d4f6 kernel-doc-2.6.32-696.1.1.el6.noarch.rpm a91232aa2b06cd5d709969455d6b19a691f8da607cdd41e8cae54b45dd4517af kernel-firmware-2.6.32-696.1.1.el6.noarch.rpm a44fdaee6282905253397094af96b111619ce1dc4689fc4c23828b2afcb2a44d kernel-headers-2.6.32-696.1.1.el6.x86_64.rpm a905f2efe92bf571b9109da6b5b2f1c5592625befb73817213f05d7c0a04b4b8 perf-2.6.32-696.1.1.el6.x86_64.rpm 0fbf0a65673d07ff3bdb7c87f4de57893a284b445499ef81dc9fb9f96bfe00e0 python-perf-2.6.32-696.1.1.el6.x86_64.rpm Source: 80ac2b7b45549095128c71fe7af213de58a397e1b8e20bbe58835949a91d307c kernel-2.6.32-696.1.1.el6.src.rpm -- Johnny Hughes CentOS Project { http://www.centos.org/ } irc: hughesjr, #centos ( -at -) irc.freenode.net Twitter: ( -at -) JohnnyCentOS _______________________________________________
  19. news

    KitGuru visits FSP UK

    ** KitGuru visits FSP UK ------------------------------------------------------------ ------------------------------------------------------------ http://us2.campaign-archive2.com/?e=872093acb5&u=bfb2b902b5fb045ad6f841f98&id=76dab23b51 http://www.kitguru.net ** KitGuru visits FSP UK ------------------------------------------------------------ KitGuru visited the impressively large UK headquarters of power supply company FSP where we were greeted by Managing Director Emmy Chen. The purpose of the visit was to meet Joey Cheng of FSP who was on a flying visit from Taiwan. Joey has the job title ‘Senior Manager, Retail Marketing & Sales Division’ which means that any product with an FSP logo, anywhere on the planet, is part of his brief. Read the review here: http://www.kitguru.net/components/leo-waldock/kitguru-visits-fsp-uk/ ============================================================ ** follow on Twitter (http://twitter.com/#!/kitgurupress) | ** friend on Facebook (http://www.facebook.com/pages/KitGuru/162236020510911) | ** forward to a friend (http://us2.forward-to-friend.com/forward?u=bfb2b902b5fb045ad6f841f98&id=76dab23b51&e=872093acb5) Copyright © 2017 KitGuru, All rights reserved. You are receiving this because you are a news partner or have signed up to receive our news.
  20. Dear Editors, we just posted a new article which might be interesting to your readers. A post in your news section would be appreciated. Title: Bitspower Summit EF-X CPU Waterblock Link: https://www.techpowerup.com/reviews/Bitspower/Summit_EF-X Brief: Bitspower has not enjoyed much success in the sector of CPU waterblocks, owing to average performance and high product cost with limited customization. They aim to change this in 2017 with the new Summit EF that promises to run at up to 6°C less than before; it will also come with top options in acrylic, nickel-plated copper, and a special gold-plated copper edition.
  21. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ===================================================================== Red Hat Security Advisory Synopsis: Critical: flash-plugin security update Advisory ID: RHSA-2017:0934-01 Product: Red Hat Enterprise Linux Supplementary Advisory URL: https://access.redhat.com/errata/RHSA-2017:0934 Issue date: 2017-04-12 CVE Names: CVE-2017-3058 CVE-2017-3059 CVE-2017-3060 CVE-2017-3061 CVE-2017-3062 CVE-2017-3063 CVE-2017-3064 ===================================================================== 1. Summary: An update for flash-plugin is now available for Red Hat Enterprise Linux 6 Supplementary. Red Hat Product Security has rated this update as having a security impact of Critical. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. 2. Relevant releases/architectures: Red Hat Enterprise Linux Desktop Supplementary (v. 6) - i386, x86_64 Red Hat Enterprise Linux Server Supplementary (v. 6) - i386, x86_64 Red Hat Enterprise Linux Workstation Supplementary (v. 6) - i386, x86_64 3. Description: The flash-plugin package contains a Mozilla Firefox compatible Adobe Flash Player web browser plug-in. This update upgrades Flash Player to version 25.0.0.148. Security Fix(es): * This update fixes multiple vulnerabilities in Adobe Flash Player. These vulnerabilities, detailed in the Adobe Security Bulletin listed in the References section, could allow an attacker to create a specially crafted SWF file that would cause flash-plugin to crash, execute arbitrary code, or disclose sensitive information when the victim loaded a page containing the malicious SWF content. (CVE-2017-3058, CVE-2017-3059, CVE-2017-3060, CVE-2017-3061, CVE-2017-3062, CVE-2017-3063, CVE-2017-3064) 4. Solution: For details on how to apply this update, which includes the changes described in this advisory, refer to: https://access.redhat.com/articles/11258 5. Bugs fixed (https://bugzilla.redhat.com/): 1441308 - CVE-2017-3058 CVE-2017-3059 CVE-2017-3060 CVE-2017-3061 CVE-2017-3062 CVE-2017-3063 CVE-2017-3064 flash-plugin: multiple code execution issues fixed in APSB17-10 6. Package List: Red Hat Enterprise Linux Desktop Supplementary (v. 6): i386: flash-plugin-25.0.0.148-1.el6_9.i686.rpm x86_64: flash-plugin-25.0.0.148-1.el6_9.i686.rpm Red Hat Enterprise Linux Server Supplementary (v. 6): i386: flash-plugin-25.0.0.148-1.el6_9.i686.rpm x86_64: flash-plugin-25.0.0.148-1.el6_9.i686.rpm Red Hat Enterprise Linux Workstation Supplementary (v. 6): i386: flash-plugin-25.0.0.148-1.el6_9.i686.rpm x86_64: flash-plugin-25.0.0.148-1.el6_9.i686.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/ 7. References: https://access.redhat.com/security/cve/CVE-2017-3058 https://access.redhat.com/security/cve/CVE-2017-3059 https://access.redhat.com/security/cve/CVE-2017-3060 https://access.redhat.com/security/cve/CVE-2017-3061 https://access.redhat.com/security/cve/CVE-2017-3062 https://access.redhat.com/security/cve/CVE-2017-3063 https://access.redhat.com/security/cve/CVE-2017-3064 https://access.redhat.com/security/updates/classification/#critical https://helpx.adobe.com/security/products/flash-player/apsb17-10.html 8. Contact: The Red Hat security contact is . More contact details at https://access.redhat.com/security/team/contact/ Copyright 2017 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iD8DBQFY7n9IXlSAg2UNWIIRAmwVAJ902TLNKi8COINjB94DYMVkp/aqwACgjozY IAESfe46GDvWyqvR0c+GvME= =b0mH -----END PGP SIGNATURE----- --
  22. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ===================================================================== Red Hat Security Advisory Synopsis: Moderate: tomcat security update Advisory ID: RHSA-2017:0935-01 Product: Red Hat Enterprise Linux Advisory URL: https://access.redhat.com/errata/RHSA-2017:0935 Issue date: 2017-04-12 CVE Names: CVE-2016-6816 CVE-2016-8745 ===================================================================== 1. Summary: An update for tomcat is now available for Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. 2. Relevant releases/architectures: Red Hat Enterprise Linux Client (v. 7) - noarch Red Hat Enterprise Linux Client Optional (v. 7) - noarch Red Hat Enterprise Linux ComputeNode (v. 7) - noarch Red Hat Enterprise Linux ComputeNode Optional (v. 7) - noarch Red Hat Enterprise Linux Server (v. 7) - noarch Red Hat Enterprise Linux Server Optional (v. 7) - noarch Red Hat Enterprise Linux Workstation (v. 7) - noarch Red Hat Enterprise Linux Workstation Optional (v. 7) - noarch 3. Description: Apache Tomcat is a servlet container for the Java Servlet and JavaServer Pages (JSP) technologies. Security Fix(es): * It was discovered that the code that parsed the HTTP request line permitted invalid characters. This could be exploited, in conjunction with a proxy that also permitted the invalid characters but with a different interpretation, to inject data into the HTTP response. By manipulating the HTTP response the attacker could poison a web-cache, perform an XSS attack, or obtain sensitive information from requests other then their own. (CVE-2016-6816) Note: This fix causes Tomcat to respond with an HTTP 400 Bad Request error when request contains characters that are not permitted by the HTTP specification to appear not encoded, even though they were previously accepted. The newly introduced system property tomcat.util.http.parser.HttpParser.requestTargetAllow can be used to configure Tomcat to accept curly braces ({ and }) and the pipe symbol (|) in not encoded form, as these are often used in URLs without being properly encoded. * A bug was discovered in the error handling of the send file code for the NIO HTTP connector. This led to the current Processor object being added to the Processor cache multiple times allowing information leakage between requests including, and not limited to, session ID and the response body. (CVE-2016-8745) 4. Solution: For details on how to apply this update, which includes the changes described in this advisory, refer to: https://access.redhat.com/articles/11258 5. Bugs fixed (https://bugzilla.redhat.com/): 1397484 - CVE-2016-6816 tomcat: HTTP Request smuggling vulnerability due to permitting invalid character in HTTP requests 1403824 - CVE-2016-8745 tomcat: information disclosure due to incorrect Processor sharing 6. Package List: Red Hat Enterprise Linux Client (v. 7): Source: tomcat-7.0.69-11.el7_3.src.rpm noarch: tomcat-servlet-3.0-api-7.0.69-11.el7_3.noarch.rpm Red Hat Enterprise Linux Client Optional (v. 7): noarch: tomcat-7.0.69-11.el7_3.noarch.rpm tomcat-admin-webapps-7.0.69-11.el7_3.noarch.rpm tomcat-docs-webapp-7.0.69-11.el7_3.noarch.rpm tomcat-el-2.2-api-7.0.69-11.el7_3.noarch.rpm tomcat-javadoc-7.0.69-11.el7_3.noarch.rpm tomcat-jsp-2.2-api-7.0.69-11.el7_3.noarch.rpm tomcat-jsvc-7.0.69-11.el7_3.noarch.rpm tomcat-lib-7.0.69-11.el7_3.noarch.rpm tomcat-webapps-7.0.69-11.el7_3.noarch.rpm Red Hat Enterprise Linux ComputeNode (v. 7): Source: tomcat-7.0.69-11.el7_3.src.rpm noarch: tomcat-servlet-3.0-api-7.0.69-11.el7_3.noarch.rpm Red Hat Enterprise Linux ComputeNode Optional (v. 7): noarch: tomcat-7.0.69-11.el7_3.noarch.rpm tomcat-admin-webapps-7.0.69-11.el7_3.noarch.rpm tomcat-docs-webapp-7.0.69-11.el7_3.noarch.rpm tomcat-el-2.2-api-7.0.69-11.el7_3.noarch.rpm tomcat-javadoc-7.0.69-11.el7_3.noarch.rpm tomcat-jsp-2.2-api-7.0.69-11.el7_3.noarch.rpm tomcat-jsvc-7.0.69-11.el7_3.noarch.rpm tomcat-lib-7.0.69-11.el7_3.noarch.rpm tomcat-webapps-7.0.69-11.el7_3.noarch.rpm Red Hat Enterprise Linux Server (v. 7): Source: tomcat-7.0.69-11.el7_3.src.rpm noarch: tomcat-7.0.69-11.el7_3.noarch.rpm tomcat-admin-webapps-7.0.69-11.el7_3.noarch.rpm tomcat-el-2.2-api-7.0.69-11.el7_3.noarch.rpm tomcat-jsp-2.2-api-7.0.69-11.el7_3.noarch.rpm tomcat-lib-7.0.69-11.el7_3.noarch.rpm tomcat-servlet-3.0-api-7.0.69-11.el7_3.noarch.rpm tomcat-webapps-7.0.69-11.el7_3.noarch.rpm Red Hat Enterprise Linux Server Optional (v. 7): noarch: tomcat-7.0.69-11.el7_3.noarch.rpm tomcat-admin-webapps-7.0.69-11.el7_3.noarch.rpm tomcat-docs-webapp-7.0.69-11.el7_3.noarch.rpm tomcat-el-2.2-api-7.0.69-11.el7_3.noarch.rpm tomcat-javadoc-7.0.69-11.el7_3.noarch.rpm tomcat-jsp-2.2-api-7.0.69-11.el7_3.noarch.rpm tomcat-jsvc-7.0.69-11.el7_3.noarch.rpm tomcat-lib-7.0.69-11.el7_3.noarch.rpm tomcat-webapps-7.0.69-11.el7_3.noarch.rpm Red Hat Enterprise Linux Workstation (v. 7): Source: tomcat-7.0.69-11.el7_3.src.rpm noarch: tomcat-7.0.69-11.el7_3.noarch.rpm tomcat-admin-webapps-7.0.69-11.el7_3.noarch.rpm tomcat-el-2.2-api-7.0.69-11.el7_3.noarch.rpm tomcat-jsp-2.2-api-7.0.69-11.el7_3.noarch.rpm tomcat-lib-7.0.69-11.el7_3.noarch.rpm tomcat-servlet-3.0-api-7.0.69-11.el7_3.noarch.rpm tomcat-webapps-7.0.69-11.el7_3.noarch.rpm Red Hat Enterprise Linux Workstation Optional (v. 7): noarch: tomcat-docs-webapp-7.0.69-11.el7_3.noarch.rpm tomcat-javadoc-7.0.69-11.el7_3.noarch.rpm tomcat-jsvc-7.0.69-11.el7_3.noarch.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/ 7. References: https://access.redhat.com/security/cve/CVE-2016-6816 https://access.redhat.com/security/cve/CVE-2016-8745 https://access.redhat.com/security/updates/classification/#moderate 8. Contact: The Red Hat security contact is . More contact details at https://access.redhat.com/security/team/contact/ Copyright 2017 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iD8DBQFY7n94XlSAg2UNWIIRAmjPAJ9bk8IBbgSqjZoV7R+WBZNUGHOKfwCcCZBj I6oGMjVT1JjlWEBHS/2zKeI= =EWzy -----END PGP SIGNATURE----- --
  23. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ===================================================================== Red Hat Security Advisory Synopsis: Moderate: libreoffice security and bug fix update Advisory ID: RHSA-2017:0914-01 Product: Red Hat Enterprise Linux Advisory URL: https://access.redhat.com/errata/RHSA-2017:0914 Issue date: 2017-04-12 CVE Names: CVE-2017-3157 ===================================================================== 1. Summary: An update for libreoffice is now available for Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. 2. Relevant releases/architectures: Red Hat Enterprise Linux Client (v. 7) - noarch, x86_64 Red Hat Enterprise Linux Client Optional (v. 7) - x86_64 Red Hat Enterprise Linux Server Optional (v. 7) - aarch64, noarch, ppc64le, x86_64 Red Hat Enterprise Linux Workstation (v. 7) - noarch, x86_64 Red Hat Enterprise Linux Workstation Optional (v. 7) - x86_64 3. Description: LibreOffice is an open source, community-developed office productivity suite. It includes key desktop applications, such as a word processor, a spreadsheet, a presentation manager, a formula editor, and a drawing program. LibreOffice replaces OpenOffice and provides a similar but enhanced and extended office suite. Security Fix(es): * It was found that LibreOffice disclosed contents of a file specified in an embedded object's preview. An attacker could potentially use this flaw to expose details of a system running LibreOffice as an online service via a crafted document. (CVE-2017-3157) Bug Fix(es): * Previously, an improper resource management caused the LibreOffice Calc spreadsheet application to terminate unexpectedly after closing a dialog window with accessibility support enabled. The resource management has been improved, and the described problem no longer occurs. (BZ#1425536) * Previously, when an incorrect password was entered for a password protected document, the document has been considered as valid and a fallback attempt to open it as plain text has been made. As a consequence, it could appear that the document succesfully loaded, while just the encrypted unreadable content was shown. A fix has been made to terminate import attempts after entering incorrect password, and now nothing is loaded when a wrong password is entered. (BZ#1426348) * Previously, an improper resource management caused the LibreOffice Calc spreadsheet application to terminate unexpectedly during exit, after the Text Import dialog for CSV (Comma-separated Value) files closed, when accessibility support was enabled. The resource management has been improved, and the described problem no longer occurs. (BZ#1425535) 4. Solution: For details on how to apply this update, which includes the changes described in this advisory, refer to: https://access.redhat.com/articles/11258 All running instances of LibreOffice applications must be restarted for this update to take effect. 5. Bugs fixed (https://bugzilla.redhat.com/): 1425536 - [fix available] Crash in calc after closing dialog box with a11y enabled 1425844 - CVE-2017-3157 libreoffice: Arbitrary file disclosure in Calc and Writer 1426348 - [fix available] Password Protected (Encrypted) files opening as plain text after cancelling password dialog 6. Package List: Red Hat Enterprise Linux Client (v. 7): Source: libreoffice-5.0.6.2-5.el7_3.1.src.rpm noarch: autocorr-af-5.0.6.2-5.el7_3.1.noarch.rpm autocorr-bg-5.0.6.2-5.el7_3.1.noarch.rpm autocorr-ca-5.0.6.2-5.el7_3.1.noarch.rpm autocorr-cs-5.0.6.2-5.el7_3.1.noarch.rpm autocorr-da-5.0.6.2-5.el7_3.1.noarch.rpm autocorr-de-5.0.6.2-5.el7_3.1.noarch.rpm autocorr-en-5.0.6.2-5.el7_3.1.noarch.rpm autocorr-es-5.0.6.2-5.el7_3.1.noarch.rpm autocorr-fa-5.0.6.2-5.el7_3.1.noarch.rpm autocorr-fi-5.0.6.2-5.el7_3.1.noarch.rpm autocorr-fr-5.0.6.2-5.el7_3.1.noarch.rpm autocorr-ga-5.0.6.2-5.el7_3.1.noarch.rpm autocorr-hr-5.0.6.2-5.el7_3.1.noarch.rpm autocorr-hu-5.0.6.2-5.el7_3.1.noarch.rpm autocorr-is-5.0.6.2-5.el7_3.1.noarch.rpm autocorr-it-5.0.6.2-5.el7_3.1.noarch.rpm autocorr-ja-5.0.6.2-5.el7_3.1.noarch.rpm autocorr-ko-5.0.6.2-5.el7_3.1.noarch.rpm autocorr-lb-5.0.6.2-5.el7_3.1.noarch.rpm autocorr-lt-5.0.6.2-5.el7_3.1.noarch.rpm autocorr-mn-5.0.6.2-5.el7_3.1.noarch.rpm autocorr-nl-5.0.6.2-5.el7_3.1.noarch.rpm autocorr-pl-5.0.6.2-5.el7_3.1.noarch.rpm autocorr-pt-5.0.6.2-5.el7_3.1.noarch.rpm autocorr-ro-5.0.6.2-5.el7_3.1.noarch.rpm autocorr-ru-5.0.6.2-5.el7_3.1.noarch.rpm autocorr-sk-5.0.6.2-5.el7_3.1.noarch.rpm autocorr-sl-5.0.6.2-5.el7_3.1.noarch.rpm autocorr-sr-5.0.6.2-5.el7_3.1.noarch.rpm autocorr-sv-5.0.6.2-5.el7_3.1.noarch.rpm autocorr-tr-5.0.6.2-5.el7_3.1.noarch.rpm autocorr-vi-5.0.6.2-5.el7_3.1.noarch.rpm autocorr-zh-5.0.6.2-5.el7_3.1.noarch.rpm libreoffice-opensymbol-fonts-5.0.6.2-5.el7_3.1.noarch.rpm x86_64: libreoffice-base-5.0.6.2-5.el7_3.1.x86_64.rpm libreoffice-calc-5.0.6.2-5.el7_3.1.x86_64.rpm libreoffice-core-5.0.6.2-5.el7_3.1.x86_64.rpm libreoffice-debuginfo-5.0.6.2-5.el7_3.1.x86_64.rpm libreoffice-draw-5.0.6.2-5.el7_3.1.x86_64.rpm libreoffice-emailmerge-5.0.6.2-5.el7_3.1.x86_64.rpm libreoffice-graphicfilter-5.0.6.2-5.el7_3.1.x86_64.rpm libreoffice-impress-5.0.6.2-5.el7_3.1.x86_64.rpm libreoffice-langpack-af-5.0.6.2-5.el7_3.1.x86_64.rpm libreoffice-langpack-ar-5.0.6.2-5.el7_3.1.x86_64.rpm libreoffice-langpack-as-5.0.6.2-5.el7_3.1.x86_64.rpm libreoffice-langpack-bg-5.0.6.2-5.el7_3.1.x86_64.rpm libreoffice-langpack-bn-5.0.6.2-5.el7_3.1.x86_64.rpm libreoffice-langpack-br-5.0.6.2-5.el7_3.1.x86_64.rpm libreoffice-langpack-ca-5.0.6.2-5.el7_3.1.x86_64.rpm libreoffice-langpack-cs-5.0.6.2-5.el7_3.1.x86_64.rpm libreoffice-langpack-cy-5.0.6.2-5.el7_3.1.x86_64.rpm libreoffice-langpack-da-5.0.6.2-5.el7_3.1.x86_64.rpm libreoffice-langpack-de-5.0.6.2-5.el7_3.1.x86_64.rpm libreoffice-langpack-dz-5.0.6.2-5.el7_3.1.x86_64.rpm libreoffice-langpack-el-5.0.6.2-5.el7_3.1.x86_64.rpm libreoffice-langpack-en-5.0.6.2-5.el7_3.1.x86_64.rpm libreoffice-langpack-es-5.0.6.2-5.el7_3.1.x86_64.rpm libreoffice-langpack-et-5.0.6.2-5.el7_3.1.x86_64.rpm libreoffice-langpack-eu-5.0.6.2-5.el7_3.1.x86_64.rpm libreoffice-langpack-fa-5.0.6.2-5.el7_3.1.x86_64.rpm libreoffice-langpack-fi-5.0.6.2-5.el7_3.1.x86_64.rpm libreoffice-langpack-fr-5.0.6.2-5.el7_3.1.x86_64.rpm libreoffice-langpack-ga-5.0.6.2-5.el7_3.1.x86_64.rpm libreoffice-langpack-gl-5.0.6.2-5.el7_3.1.x86_64.rpm libreoffice-langpack-gu-5.0.6.2-5.el7_3.1.x86_64.rpm libreoffice-langpack-he-5.0.6.2-5.el7_3.1.x86_64.rpm libreoffice-langpack-hi-5.0.6.2-5.el7_3.1.x86_64.rpm libreoffice-langpack-hr-5.0.6.2-5.el7_3.1.x86_64.rpm libreoffice-langpack-hu-5.0.6.2-5.el7_3.1.x86_64.rpm libreoffice-langpack-it-5.0.6.2-5.el7_3.1.x86_64.rpm libreoffice-langpack-ja-5.0.6.2-5.el7_3.1.x86_64.rpm libreoffice-langpack-kk-5.0.6.2-5.el7_3.1.x86_64.rpm libreoffice-langpack-kn-5.0.6.2-5.el7_3.1.x86_64.rpm libreoffice-langpack-ko-5.0.6.2-5.el7_3.1.x86_64.rpm libreoffice-langpack-lt-5.0.6.2-5.el7_3.1.x86_64.rpm libreoffice-langpack-lv-5.0.6.2-5.el7_3.1.x86_64.rpm libreoffice-langpack-mai-5.0.6.2-5.el7_3.1.x86_64.rpm libreoffice-langpack-ml-5.0.6.2-5.el7_3.1.x86_64.rpm libreoffice-langpack-mr-5.0.6.2-5.el7_3.1.x86_64.rpm libreoffice-langpack-nb-5.0.6.2-5.el7_3.1.x86_64.rpm libreoffice-langpack-nl-5.0.6.2-5.el7_3.1.x86_64.rpm libreoffice-langpack-nn-5.0.6.2-5.el7_3.1.x86_64.rpm libreoffice-langpack-nr-5.0.6.2-5.el7_3.1.x86_64.rpm libreoffice-langpack-nso-5.0.6.2-5.el7_3.1.x86_64.rpm libreoffice-langpack-or-5.0.6.2-5.el7_3.1.x86_64.rpm libreoffice-langpack-pa-5.0.6.2-5.el7_3.1.x86_64.rpm libreoffice-langpack-pl-5.0.6.2-5.el7_3.1.x86_64.rpm libreoffice-langpack-pt-BR-5.0.6.2-5.el7_3.1.x86_64.rpm libreoffice-langpack-pt-PT-5.0.6.2-5.el7_3.1.x86_64.rpm libreoffice-langpack-ro-5.0.6.2-5.el7_3.1.x86_64.rpm libreoffice-langpack-ru-5.0.6.2-5.el7_3.1.x86_64.rpm libreoffice-langpack-si-5.0.6.2-5.el7_3.1.x86_64.rpm libreoffice-langpack-sk-5.0.6.2-5.el7_3.1.x86_64.rpm libreoffice-langpack-sl-5.0.6.2-5.el7_3.1.x86_64.rpm libreoffice-langpack-sr-5.0.6.2-5.el7_3.1.x86_64.rpm libreoffice-langpack-ss-5.0.6.2-5.el7_3.1.x86_64.rpm libreoffice-langpack-st-5.0.6.2-5.el7_3.1.x86_64.rpm libreoffice-langpack-sv-5.0.6.2-5.el7_3.1.x86_64.rpm libreoffice-langpack-ta-5.0.6.2-5.el7_3.1.x86_64.rpm libreoffice-langpack-te-5.0.6.2-5.el7_3.1.x86_64.rpm libreoffice-langpack-th-5.0.6.2-5.el7_3.1.x86_64.rpm libreoffice-langpack-tn-5.0.6.2-5.el7_3.1.x86_64.rpm libreoffice-langpack-tr-5.0.6.2-5.el7_3.1.x86_64.rpm libreoffice-langpack-ts-5.0.6.2-5.el7_3.1.x86_64.rpm libreoffice-langpack-uk-5.0.6.2-5.el7_3.1.x86_64.rpm libreoffice-langpack-ve-5.0.6.2-5.el7_3.1.x86_64.rpm libreoffice-langpack-xh-5.0.6.2-5.el7_3.1.x86_64.rpm libreoffice-langpack-zh-Hans-5.0.6.2-5.el7_3.1.x86_64.rpm libreoffice-langpack-zh-Hant-5.0.6.2-5.el7_3.1.x86_64.rpm libreoffice-langpack-zu-5.0.6.2-5.el7_3.1.x86_64.rpm libreoffice-math-5.0.6.2-5.el7_3.1.x86_64.rpm libreoffice-ogltrans-5.0.6.2-5.el7_3.1.x86_64.rpm libreoffice-pdfimport-5.0.6.2-5.el7_3.1.x86_64.rpm libreoffice-pyuno-5.0.6.2-5.el7_3.1.x86_64.rpm libreoffice-ure-5.0.6.2-5.el7_3.1.x86_64.rpm libreoffice-wiki-publisher-5.0.6.2-5.el7_3.1.x86_64.rpm libreoffice-writer-5.0.6.2-5.el7_3.1.x86_64.rpm Red Hat Enterprise Linux Client Optional (v. 7): x86_64: libreoffice-5.0.6.2-5.el7_3.1.x86_64.rpm libreoffice-bsh-5.0.6.2-5.el7_3.1.x86_64.rpm libreoffice-debuginfo-5.0.6.2-5.el7_3.1.x86_64.rpm libreoffice-filters-5.0.6.2-5.el7_3.1.x86_64.rpm libreoffice-gdb-debug-support-5.0.6.2-5.el7_3.1.x86_64.rpm libreoffice-glade-5.0.6.2-5.el7_3.1.x86_64.rpm libreoffice-librelogo-5.0.6.2-5.el7_3.1.x86_64.rpm libreoffice-nlpsolver-5.0.6.2-5.el7_3.1.x86_64.rpm libreoffice-officebean-5.0.6.2-5.el7_3.1.x86_64.rpm libreoffice-postgresql-5.0.6.2-5.el7_3.1.x86_64.rpm libreoffice-rhino-5.0.6.2-5.el7_3.1.x86_64.rpm libreoffice-sdk-5.0.6.2-5.el7_3.1.x86_64.rpm libreoffice-sdk-doc-5.0.6.2-5.el7_3.1.x86_64.rpm libreoffice-xsltfilter-5.0.6.2-5.el7_3.1.x86_64.rpm Red Hat Enterprise Linux Server Optional (v. 7): Source: libreoffice-5.0.6.2-5.el7_3.1.src.rpm aarch64: libreoffice-5.0.6.2-5.el7_3.1.aarch64.rpm libreoffice-base-5.0.6.2-5.el7_3.1.aarch64.rpm libreoffice-bsh-5.0.6.2-5.el7_3.1.aarch64.rpm libreoffice-calc-5.0.6.2-5.el7_3.1.aarch64.rpm libreoffice-core-5.0.6.2-5.el7_3.1.aarch64.rpm libreoffice-debuginfo-5.0.6.2-5.el7_3.1.aarch64.rpm libreoffice-draw-5.0.6.2-5.el7_3.1.aarch64.rpm libreoffice-emailmerge-5.0.6.2-5.el7_3.1.aarch64.rpm libreoffice-filters-5.0.6.2-5.el7_3.1.aarch64.rpm libreoffice-gdb-debug-support-5.0.6.2-5.el7_3.1.aarch64.rpm libreoffice-glade-5.0.6.2-5.el7_3.1.aarch64.rpm libreoffice-graphicfilter-5.0.6.2-5.el7_3.1.aarch64.rpm libreoffice-impress-5.0.6.2-5.el7_3.1.aarch64.rpm libreoffice-langpack-af-5.0.6.2-5.el7_3.1.aarch64.rpm libreoffice-langpack-ar-5.0.6.2-5.el7_3.1.aarch64.rpm libreoffice-langpack-as-5.0.6.2-5.el7_3.1.aarch64.rpm libreoffice-langpack-bg-5.0.6.2-5.el7_3.1.aarch64.rpm libreoffice-langpack-bn-5.0.6.2-5.el7_3.1.aarch64.rpm libreoffice-langpack-br-5.0.6.2-5.el7_3.1.aarch64.rpm libreoffice-langpack-ca-5.0.6.2-5.el7_3.1.aarch64.rpm libreoffice-langpack-cs-5.0.6.2-5.el7_3.1.aarch64.rpm libreoffice-langpack-cy-5.0.6.2-5.el7_3.1.aarch64.rpm libreoffice-langpack-da-5.0.6.2-5.el7_3.1.aarch64.rpm libreoffice-langpack-de-5.0.6.2-5.el7_3.1.aarch64.rpm libreoffice-langpack-dz-5.0.6.2-5.el7_3.1.aarch64.rpm libreoffice-langpack-el-5.0.6.2-5.el7_3.1.aarch64.rpm libreoffice-langpack-en-5.0.6.2-5.el7_3.1.aarch64.rpm libreoffice-langpack-es-5.0.6.2-5.el7_3.1.aarch64.rpm libreoffice-langpack-et-5.0.6.2-5.el7_3.1.aarch64.rpm libreoffice-langpack-eu-5.0.6.2-5.el7_3.1.aarch64.rpm libreoffice-langpack-fa-5.0.6.2-5.el7_3.1.aarch64.rpm libreoffice-langpack-fi-5.0.6.2-5.el7_3.1.aarch64.rpm libreoffice-langpack-fr-5.0.6.2-5.el7_3.1.aarch64.rpm libreoffice-langpack-ga-5.0.6.2-5.el7_3.1.aarch64.rpm libreoffice-langpack-gl-5.0.6.2-5.el7_3.1.aarch64.rpm libreoffice-langpack-gu-5.0.6.2-5.el7_3.1.aarch64.rpm libreoffice-langpack-he-5.0.6.2-5.el7_3.1.aarch64.rpm libreoffice-langpack-hi-5.0.6.2-5.el7_3.1.aarch64.rpm libreoffice-langpack-hr-5.0.6.2-5.el7_3.1.aarch64.rpm libreoffice-langpack-hu-5.0.6.2-5.el7_3.1.aarch64.rpm libreoffice-langpack-it-5.0.6.2-5.el7_3.1.aarch64.rpm libreoffice-langpack-ja-5.0.6.2-5.el7_3.1.aarch64.rpm libreoffice-langpack-kk-5.0.6.2-5.el7_3.1.aarch64.rpm libreoffice-langpack-kn-5.0.6.2-5.el7_3.1.aarch64.rpm libreoffice-langpack-ko-5.0.6.2-5.el7_3.1.aarch64.rpm libreoffice-langpack-lt-5.0.6.2-5.el7_3.1.aarch64.rpm libreoffice-langpack-lv-5.0.6.2-5.el7_3.1.aarch64.rpm libreoffice-langpack-mai-5.0.6.2-5.el7_3.1.aarch64.rpm libreoffice-langpack-ml-5.0.6.2-5.el7_3.1.aarch64.rpm libreoffice-langpack-mr-5.0.6.2-5.el7_3.1.aarch64.rpm libreoffice-langpack-nb-5.0.6.2-5.el7_3.1.aarch64.rpm libreoffice-langpack-nl-5.0.6.2-5.el7_3.1.aarch64.rpm libreoffice-langpack-nn-5.0.6.2-5.el7_3.1.aarch64.rpm libreoffice-langpack-nr-5.0.6.2-5.el7_3.1.aarch64.rpm libreoffice-langpack-nso-5.0.6.2-5.el7_3.1.aarch64.rpm libreoffice-langpack-or-5.0.6.2-5.el7_3.1.aarch64.rpm libreoffice-langpack-pa-5.0.6.2-5.el7_3.1.aarch64.rpm libreoffice-langpack-pl-5.0.6.2-5.el7_3.1.aarch64.rpm libreoffice-langpack-pt-BR-5.0.6.2-5.el7_3.1.aarch64.rpm libreoffice-langpack-pt-PT-5.0.6.2-5.el7_3.1.aarch64.rpm libreoffice-langpack-ro-5.0.6.2-5.el7_3.1.aarch64.rpm libreoffice-langpack-ru-5.0.6.2-5.el7_3.1.aarch64.rpm libreoffice-langpack-si-5.0.6.2-5.el7_3.1.aarch64.rpm libreoffice-langpack-sk-5.0.6.2-5.el7_3.1.aarch64.rpm libreoffice-langpack-sl-5.0.6.2-5.el7_3.1.aarch64.rpm libreoffice-langpack-sr-5.0.6.2-5.el7_3.1.aarch64.rpm libreoffice-langpack-ss-5.0.6.2-5.el7_3.1.aarch64.rpm libreoffice-langpack-st-5.0.6.2-5.el7_3.1.aarch64.rpm libreoffice-langpack-sv-5.0.6.2-5.el7_3.1.aarch64.rpm libreoffice-langpack-ta-5.0.6.2-5.el7_3.1.aarch64.rpm libreoffice-langpack-te-5.0.6.2-5.el7_3.1.aarch64.rpm libreoffice-langpack-th-5.0.6.2-5.el7_3.1.aarch64.rpm libreoffice-langpack-tn-5.0.6.2-5.el7_3.1.aarch64.rpm libreoffice-langpack-tr-5.0.6.2-5.el7_3.1.aarch64.rpm libreoffice-langpack-ts-5.0.6.2-5.el7_3.1.aarch64.rpm libreoffice-langpack-uk-5.0.6.2-5.el7_3.1.aarch64.rpm libreoffice-langpack-ve-5.0.6.2-5.el7_3.1.aarch64.rpm libreoffice-langpack-xh-5.0.6.2-5.el7_3.1.aarch64.rpm libreoffice-langpack-zh-Hans-5.0.6.2-5.el7_3.1.aarch64.rpm libreoffice-langpack-zh-Hant-5.0.6.2-5.el7_3.1.aarch64.rpm libreoffice-langpack-zu-5.0.6.2-5.el7_3.1.aarch64.rpm libreoffice-librelogo-5.0.6.2-5.el7_3.1.aarch64.rpm libreoffice-math-5.0.6.2-5.el7_3.1.aarch64.rpm libreoffice-nlpsolver-5.0.6.2-5.el7_3.1.aarch64.rpm libreoffice-officebean-5.0.6.2-5.el7_3.1.aarch64.rpm libreoffice-ogltrans-5.0.6.2-5.el7_3.1.aarch64.rpm libreoffice-pdfimport-5.0.6.2-5.el7_3.1.aarch64.rpm libreoffice-postgresql-5.0.6.2-5.el7_3.1.aarch64.rpm libreoffice-pyuno-5.0.6.2-5.el7_3.1.aarch64.rpm libreoffice-rhino-5.0.6.2-5.el7_3.1.aarch64.rpm libreoffice-sdk-5.0.6.2-5.el7_3.1.aarch64.rpm libreoffice-sdk-doc-5.0.6.2-5.el7_3.1.aarch64.rpm libreoffice-ure-5.0.6.2-5.el7_3.1.aarch64.rpm libreoffice-wiki-publisher-5.0.6.2-5.el7_3.1.aarch64.rpm libreoffice-writer-5.0.6.2-5.el7_3.1.aarch64.rpm libreoffice-xsltfilter-5.0.6.2-5.el7_3.1.aarch64.rpm noarch: autocorr-af-5.0.6.2-5.el7_3.1.noarch.rpm autocorr-bg-5.0.6.2-5.el7_3.1.noarch.rpm autocorr-ca-5.0.6.2-5.el7_3.1.noarch.rpm autocorr-cs-5.0.6.2-5.el7_3.1.noarch.rpm autocorr-da-5.0.6.2-5.el7_3.1.noarch.rpm autocorr-de-5.0.6.2-5.el7_3.1.noarch.rpm autocorr-en-5.0.6.2-5.el7_3.1.noarch.rpm autocorr-es-5.0.6.2-5.el7_3.1.noarch.rpm autocorr-fa-5.0.6.2-5.el7_3.1.noarch.rpm autocorr-fi-5.0.6.2-5.el7_3.1.noarch.rpm autocorr-fr-5.0.6.2-5.el7_3.1.noarch.rpm autocorr-ga-5.0.6.2-5.el7_3.1.noarch.rpm autocorr-hr-5.0.6.2-5.el7_3.1.noarch.rpm autocorr-hu-5.0.6.2-5.el7_3.1.noarch.rpm autocorr-is-5.0.6.2-5.el7_3.1.noarch.rpm autocorr-it-5.0.6.2-5.el7_3.1.noarch.rpm autocorr-ja-5.0.6.2-5.el7_3.1.noarch.rpm autocorr-ko-5.0.6.2-5.el7_3.1.noarch.rpm autocorr-lb-5.0.6.2-5.el7_3.1.noarch.rpm autocorr-lt-5.0.6.2-5.el7_3.1.noarch.rpm autocorr-mn-5.0.6.2-5.el7_3.1.noarch.rpm autocorr-nl-5.0.6.2-5.el7_3.1.noarch.rpm autocorr-pl-5.0.6.2-5.el7_3.1.noarch.rpm autocorr-pt-5.0.6.2-5.el7_3.1.noarch.rpm autocorr-ro-5.0.6.2-5.el7_3.1.noarch.rpm autocorr-ru-5.0.6.2-5.el7_3.1.noarch.rpm autocorr-sk-5.0.6.2-5.el7_3.1.noarch.rpm autocorr-sl-5.0.6.2-5.el7_3.1.noarch.rpm autocorr-sr-5.0.6.2-5.el7_3.1.noarch.rpm autocorr-sv-5.0.6.2-5.el7_3.1.noarch.rpm autocorr-tr-5.0.6.2-5.el7_3.1.noarch.rpm autocorr-vi-5.0.6.2-5.el7_3.1.noarch.rpm autocorr-zh-5.0.6.2-5.el7_3.1.noarch.rpm libreoffice-opensymbol-fonts-5.0.6.2-5.el7_3.1.noarch.rpm ppc64le: libreoffice-5.0.6.2-5.el7_3.1.ppc64le.rpm libreoffice-base-5.0.6.2-5.el7_3.1.ppc64le.rpm libreoffice-bsh-5.0.6.2-5.el7_3.1.ppc64le.rpm libreoffice-calc-5.0.6.2-5.el7_3.1.ppc64le.rpm libreoffice-core-5.0.6.2-5.el7_3.1.ppc64le.rpm libreoffice-debuginfo-5.0.6.2-5.el7_3.1.ppc64le.rpm libreoffice-draw-5.0.6.2-5.el7_3.1.ppc64le.rpm libreoffice-emailmerge-5.0.6.2-5.el7_3.1.ppc64le.rpm libreoffice-filters-5.0.6.2-5.el7_3.1.ppc64le.rpm libreoffice-gdb-debug-support-5.0.6.2-5.el7_3.1.ppc64le.rpm libreoffice-glade-5.0.6.2-5.el7_3.1.ppc64le.rpm libreoffice-graphicfilter-5.0.6.2-5.el7_3.1.ppc64le.rpm libreoffice-impress-5.0.6.2-5.el7_3.1.ppc64le.rpm libreoffice-langpack-af-5.0.6.2-5.el7_3.1.ppc64le.rpm libreoffice-langpack-ar-5.0.6.2-5.el7_3.1.ppc64le.rpm libreoffice-langpack-as-5.0.6.2-5.el7_3.1.ppc64le.rpm libreoffice-langpack-bg-5.0.6.2-5.el7_3.1.ppc64le.rpm libreoffice-langpack-bn-5.0.6.2-5.el7_3.1.ppc64le.rpm libreoffice-langpack-br-5.0.6.2-5.el7_3.1.ppc64le.rpm libreoffice-langpack-ca-5.0.6.2-5.el7_3.1.ppc64le.rpm libreoffice-langpack-cs-5.0.6.2-5.el7_3.1.ppc64le.rpm libreoffice-langpack-cy-5.0.6.2-5.el7_3.1.ppc64le.rpm libreoffice-langpack-da-5.0.6.2-5.el7_3.1.ppc64le.rpm libreoffice-langpack-de-5.0.6.2-5.el7_3.1.ppc64le.rpm libreoffice-langpack-dz-5.0.6.2-5.el7_3.1.ppc64le.rpm libreoffice-langpack-el-5.0.6.2-5.el7_3.1.ppc64le.rpm libreoffice-langpack-en-5.0.6.2-5.el7_3.1.ppc64le.rpm libreoffice-langpack-es-5.0.6.2-5.el7_3.1.ppc64le.rpm libreoffice-langpack-et-5.0.6.2-5.el7_3.1.ppc64le.rpm libreoffice-langpack-eu-5.0.6.2-5.el7_3.1.ppc64le.rpm libreoffice-langpack-fa-5.0.6.2-5.el7_3.1.ppc64le.rpm libreoffice-langpack-fi-5.0.6.2-5.el7_3.1.ppc64le.rpm libreoffice-langpack-fr-5.0.6.2-5.el7_3.1.ppc64le.rpm libreoffice-langpack-ga-5.0.6.2-5.el7_3.1.ppc64le.rpm libreoffice-langpack-gl-5.0.6.2-5.el7_3.1.ppc64le.rpm libreoffice-langpack-gu-5.0.6.2-5.el7_3.1.ppc64le.rpm libreoffice-langpack-he-5.0.6.2-5.el7_3.1.ppc64le.rpm libreoffice-langpack-hi-5.0.6.2-5.el7_3.1.ppc64le.rpm libreoffice-langpack-hr-5.0.6.2-5.el7_3.1.ppc64le.rpm libreoffice-langpack-hu-5.0.6.2-5.el7_3.1.ppc64le.rpm libreoffice-langpack-it-5.0.6.2-5.el7_3.1.ppc64le.rpm libreoffice-langpack-ja-5.0.6.2-5.el7_3.1.ppc64le.rpm libreoffice-langpack-kk-5.0.6.2-5.el7_3.1.ppc64le.rpm libreoffice-langpack-kn-5.0.6.2-5.el7_3.1.ppc64le.rpm libreoffice-langpack-ko-5.0.6.2-5.el7_3.1.ppc64le.rpm libreoffice-langpack-lt-5.0.6.2-5.el7_3.1.ppc64le.rpm libreoffice-langpack-lv-5.0.6.2-5.el7_3.1.ppc64le.rpm libreoffice-langpack-mai-5.0.6.2-5.el7_3.1.ppc64le.rpm libreoffice-langpack-ml-5.0.6.2-5.el7_3.1.ppc64le.rpm libreoffice-langpack-mr-5.0.6.2-5.el7_3.1.ppc64le.rpm libreoffice-langpack-nb-5.0.6.2-5.el7_3.1.ppc64le.rpm libreoffice-langpack-nl-5.0.6.2-5.el7_3.1.ppc64le.rpm libreoffice-langpack-nn-5.0.6.2-5.el7_3.1.ppc64le.rpm libreoffice-langpack-nr-5.0.6.2-5.el7_3.1.ppc64le.rpm libreoffice-langpack-nso-5.0.6.2-5.el7_3.1.ppc64le.rpm libreoffice-langpack-or-5.0.6.2-5.el7_3.1.ppc64le.rpm libreoffice-langpack-pa-5.0.6.2-5.el7_3.1.ppc64le.rpm libreoffice-langpack-pl-5.0.6.2-5.el7_3.1.ppc64le.rpm libreoffice-langpack-pt-BR-5.0.6.2-5.el7_3.1.ppc64le.rpm libreoffice-langpack-pt-PT-5.0.6.2-5.el7_3.1.ppc64le.rpm libreoffice-langpack-ro-5.0.6.2-5.el7_3.1.ppc64le.rpm libreoffice-langpack-ru-5.0.6.2-5.el7_3.1.ppc64le.rpm libreoffice-langpack-si-5.0.6.2-5.el7_3.1.ppc64le.rpm libreoffice-langpack-sk-5.0.6.2-5.el7_3.1.ppc64le.rpm libreoffice-langpack-sl-5.0.6.2-5.el7_3.1.ppc64le.rpm libreoffice-langpack-sr-5.0.6.2-5.el7_3.1.ppc64le.rpm libreoffice-langpack-ss-5.0.6.2-5.el7_3.1.ppc64le.rpm libreoffice-langpack-st-5.0.6.2-5.el7_3.1.ppc64le.rpm libreoffice-langpack-sv-5.0.6.2-5.el7_3.1.ppc64le.rpm libreoffice-langpack-ta-5.0.6.2-5.el7_3.1.ppc64le.rpm libreoffice-langpack-te-5.0.6.2-5.el7_3.1.ppc64le.rpm libreoffice-langpack-th-5.0.6.2-5.el7_3.1.ppc64le.rpm libreoffice-langpack-tn-5.0.6.2-5.el7_3.1.ppc64le.rpm libreoffice-langpack-tr-5.0.6.2-5.el7_3.1.ppc64le.rpm libreoffice-langpack-ts-5.0.6.2-5.el7_3.1.ppc64le.rpm libreoffice-langpack-uk-5.0.6.2-5.el7_3.1.ppc64le.rpm libreoffice-langpack-ve-5.0.6.2-5.el7_3.1.ppc64le.rpm libreoffice-langpack-xh-5.0.6.2-5.el7_3.1.ppc64le.rpm libreoffice-langpack-zh-Hans-5.0.6.2-5.el7_3.1.ppc64le.rpm libreoffice-langpack-zh-Hant-5.0.6.2-5.el7_3.1.ppc64le.rpm libreoffice-langpack-zu-5.0.6.2-5.el7_3.1.ppc64le.rpm libreoffice-librelogo-5.0.6.2-5.el7_3.1.ppc64le.rpm libreoffice-math-5.0.6.2-5.el7_3.1.ppc64le.rpm libreoffice-nlpsolver-5.0.6.2-5.el7_3.1.ppc64le.rpm libreoffice-officebean-5.0.6.2-5.el7_3.1.ppc64le.rpm libreoffice-ogltrans-5.0.6.2-5.el7_3.1.ppc64le.rpm libreoffice-pdfimport-5.0.6.2-5.el7_3.1.ppc64le.rpm libreoffice-postgresql-5.0.6.2-5.el7_3.1.ppc64le.rpm libreoffice-pyuno-5.0.6.2-5.el7_3.1.ppc64le.rpm libreoffice-rhino-5.0.6.2-5.el7_3.1.ppc64le.rpm libreoffice-sdk-5.0.6.2-5.el7_3.1.ppc64le.rpm libreoffice-sdk-doc-5.0.6.2-5.el7_3.1.ppc64le.rpm libreoffice-ure-5.0.6.2-5.el7_3.1.ppc64le.rpm libreoffice-wiki-publisher-5.0.6.2-5.el7_3.1.ppc64le.rpm libreoffice-writer-5.0.6.2-5.el7_3.1.ppc64le.rpm libreoffice-xsltfilter-5.0.6.2-5.el7_3.1.ppc64le.rpm x86_64: libreoffice-5.0.6.2-5.el7_3.1.x86_64.rpm libreoffice-base-5.0.6.2-5.el7_3.1.x86_64.rpm libreoffice-bsh-5.0.6.2-5.el7_3.1.x86_64.rpm libreoffice-calc-5.0.6.2-5.el7_3.1.x86_64.rpm libreoffice-core-5.0.6.2-5.el7_3.1.x86_64.rpm libreoffice-debuginfo-5.0.6.2-5.el7_3.1.x86_64.rpm libreoffice-draw-5.0.6.2-5.el7_3.1.x86_64.rpm libreoffice-emailmerge-5.0.6.2-5.el7_3.1.x86_64.rpm libreoffice-filters-5.0.6.2-5.el7_3.1.x86_64.rpm libreoffice-gdb-debug-support-5.0.6.2-5.el7_3.1.x86_64.rpm libreoffice-glade-5.0.6.2-5.el7_3.1.x86_64.rpm libreoffice-graphicfilter-5.0.6.2-5.el7_3.1.x86_64.rpm libreoffice-impress-5.0.6.2-5.el7_3.1.x86_64.rpm libreoffice-langpack-af-5.0.6.2-5.el7_3.1.x86_64.rpm libreoffice-langpack-ar-5.0.6.2-5.el7_3.1.x86_64.rpm libreoffice-langpack-as-5.0.6.2-5.el7_3.1.x86_64.rpm libreoffice-langpack-bg-5.0.6.2-5.el7_3.1.x86_64.rpm libreoffice-langpack-bn-5.0.6.2-5.el7_3.1.x86_64.rpm libreoffice-langpack-br-5.0.6.2-5.el7_3.1.x86_64.rpm libreoffice-langpack-ca-5.0.6.2-5.el7_3.1.x86_64.rpm libreoffice-langpack-cs-5.0.6.2-5.el7_3.1.x86_64.rpm libreoffice-langpack-cy-5.0.6.2-5.el7_3.1.x86_64.rpm libreoffice-langpack-da-5.0.6.2-5.el7_3.1.x86_64.rpm libreoffice-langpack-de-5.0.6.2-5.el7_3.1.x86_64.rpm libreoffice-langpack-dz-5.0.6.2-5.el7_3.1.x86_64.rpm libreoffice-langpack-el-5.0.6.2-5.el7_3.1.x86_64.rpm libreoffice-langpack-en-5.0.6.2-5.el7_3.1.x86_64.rpm libreoffice-langpack-es-5.0.6.2-5.el7_3.1.x86_64.rpm libreoffice-langpack-et-5.0.6.2-5.el7_3.1.x86_64.rpm libreoffice-langpack-eu-5.0.6.2-5.el7_3.1.x86_64.rpm libreoffice-langpack-fa-5.0.6.2-5.el7_3.1.x86_64.rpm libreoffice-langpack-fi-5.0.6.2-5.el7_3.1.x86_64.rpm libreoffice-langpack-fr-5.0.6.2-5.el7_3.1.x86_64.rpm libreoffice-langpack-ga-5.0.6.2-5.el7_3.1.x86_64.rpm libreoffice-langpack-gl-5.0.6.2-5.el7_3.1.x86_64.rpm libreoffice-langpack-gu-5.0.6.2-5.el7_3.1.x86_64.rpm libreoffice-langpack-he-5.0.6.2-5.el7_3.1.x86_64.rpm libreoffice-langpack-hi-5.0.6.2-5.el7_3.1.x86_64.rpm libreoffice-langpack-hr-5.0.6.2-5.el7_3.1.x86_64.rpm libreoffice-langpack-hu-5.0.6.2-5.el7_3.1.x86_64.rpm libreoffice-langpack-it-5.0.6.2-5.el7_3.1.x86_64.rpm libreoffice-langpack-ja-5.0.6.2-5.el7_3.1.x86_64.rpm libreoffice-langpack-kk-5.0.6.2-5.el7_3.1.x86_64.rpm libreoffice-langpack-kn-5.0.6.2-5.el7_3.1.x86_64.rpm libreoffice-langpack-ko-5.0.6.2-5.el7_3.1.x86_64.rpm libreoffice-langpack-lt-5.0.6.2-5.el7_3.1.x86_64.rpm libreoffice-langpack-lv-5.0.6.2-5.el7_3.1.x86_64.rpm libreoffice-langpack-mai-5.0.6.2-5.el7_3.1.x86_64.rpm libreoffice-langpack-ml-5.0.6.2-5.el7_3.1.x86_64.rpm libreoffice-langpack-mr-5.0.6.2-5.el7_3.1.x86_64.rpm libreoffice-langpack-nb-5.0.6.2-5.el7_3.1.x86_64.rpm libreoffice-langpack-nl-5.0.6.2-5.el7_3.1.x86_64.rpm libreoffice-langpack-nn-5.0.6.2-5.el7_3.1.x86_64.rpm libreoffice-langpack-nr-5.0.6.2-5.el7_3.1.x86_64.rpm libreoffice-langpack-nso-5.0.6.2-5.el7_3.1.x86_64.rpm libreoffice-langpack-or-5.0.6.2-5.el7_3.1.x86_64.rpm libreoffice-langpack-pa-5.0.6.2-5.el7_3.1.x86_64.rpm libreoffice-langpack-pl-5.0.6.2-5.el7_3.1.x86_64.rpm libreoffice-langpack-pt-BR-5.0.6.2-5.el7_3.1.x86_64.rpm libreoffice-langpack-pt-PT-5.0.6.2-5.el7_3.1.x86_64.rpm libreoffice-langpack-ro-5.0.6.2-5.el7_3.1.x86_64.rpm libreoffice-langpack-ru-5.0.6.2-5.el7_3.1.x86_64.rpm libreoffice-langpack-si-5.0.6.2-5.el7_3.1.x86_64.rpm libreoffice-langpack-sk-5.0.6.2-5.el7_3.1.x86_64.rpm libreoffice-langpack-sl-5.0.6.2-5.el7_3.1.x86_64.rpm libreoffice-langpack-sr-5.0.6.2-5.el7_3.1.x86_64.rpm libreoffice-langpack-ss-5.0.6.2-5.el7_3.1.x86_64.rpm libreoffice-langpack-st-5.0.6.2-5.el7_3.1.x86_64.rpm libreoffice-langpack-sv-5.0.6.2-5.el7_3.1.x86_64.rpm libreoffice-langpack-ta-5.0.6.2-5.el7_3.1.x86_64.rpm libreoffice-langpack-te-5.0.6.2-5.el7_3.1.x86_64.rpm libreoffice-langpack-th-5.0.6.2-5.el7_3.1.x86_64.rpm libreoffice-langpack-tn-5.0.6.2-5.el7_3.1.x86_64.rpm libreoffice-langpack-tr-5.0.6.2-5.el7_3.1.x86_64.rpm libreoffice-langpack-ts-5.0.6.2-5.el7_3.1.x86_64.rpm libreoffice-langpack-uk-5.0.6.2-5.el7_3.1.x86_64.rpm libreoffice-langpack-ve-5.0.6.2-5.el7_3.1.x86_64.rpm libreoffice-langpack-xh-5.0.6.2-5.el7_3.1.x86_64.rpm libreoffice-langpack-zh-Hans-5.0.6.2-5.el7_3.1.x86_64.rpm libreoffice-langpack-zh-Hant-5.0.6.2-5.el7_3.1.x86_64.rpm libreoffice-langpack-zu-5.0.6.2-5.el7_3.1.x86_64.rpm libreoffice-librelogo-5.0.6.2-5.el7_3.1.x86_64.rpm libreoffice-math-5.0.6.2-5.el7_3.1.x86_64.rpm libreoffice-nlpsolver-5.0.6.2-5.el7_3.1.x86_64.rpm libreoffice-officebean-5.0.6.2-5.el7_3.1.x86_64.rpm libreoffice-ogltrans-5.0.6.2-5.el7_3.1.x86_64.rpm libreoffice-pdfimport-5.0.6.2-5.el7_3.1.x86_64.rpm libreoffice-postgresql-5.0.6.2-5.el7_3.1.x86_64.rpm libreoffice-pyuno-5.0.6.2-5.el7_3.1.x86_64.rpm libreoffice-rhino-5.0.6.2-5.el7_3.1.x86_64.rpm libreoffice-sdk-5.0.6.2-5.el7_3.1.x86_64.rpm libreoffice-sdk-doc-5.0.6.2-5.el7_3.1.x86_64.rpm libreoffice-ure-5.0.6.2-5.el7_3.1.x86_64.rpm libreoffice-wiki-publisher-5.0.6.2-5.el7_3.1.x86_64.rpm libreoffice-writer-5.0.6.2-5.el7_3.1.x86_64.rpm libreoffice-xsltfilter-5.0.6.2-5.el7_3.1.x86_64.rpm Red Hat Enterprise Linux Workstation (v. 7): Source: libreoffice-5.0.6.2-5.el7_3.1.src.rpm noarch: autocorr-af-5.0.6.2-5.el7_3.1.noarch.rpm autocorr-bg-5.0.6.2-5.el7_3.1.noarch.rpm autocorr-ca-5.0.6.2-5.el7_3.1.noarch.rpm autocorr-cs-5.0.6.2-5.el7_3.1.noarch.rpm autocorr-da-5.0.6.2-5.el7_3.1.noarch.rpm autocorr-de-5.0.6.2-5.el7_3.1.noarch.rpm autocorr-en-5.0.6.2-5.el7_3.1.noarch.rpm autocorr-es-5.0.6.2-5.el7_3.1.noarch.rpm autocorr-fa-5.0.6.2-5.el7_3.1.noarch.rpm autocorr-fi-5.0.6.2-5.el7_3.1.noarch.rpm autocorr-fr-5.0.6.2-5.el7_3.1.noarch.rpm autocorr-ga-5.0.6.2-5.el7_3.1.noarch.rpm autocorr-hr-5.0.6.2-5.el7_3.1.noarch.rpm autocorr-hu-5.0.6.2-5.el7_3.1.noarch.rpm autocorr-is-5.0.6.2-5.el7_3.1.noarch.rpm autocorr-it-5.0.6.2-5.el7_3.1.noarch.rpm autocorr-ja-5.0.6.2-5.el7_3.1.noarch.rpm autocorr-ko-5.0.6.2-5.el7_3.1.noarch.rpm autocorr-lb-5.0.6.2-5.el7_3.1.noarch.rpm autocorr-lt-5.0.6.2-5.el7_3.1.noarch.rpm autocorr-mn-5.0.6.2-5.el7_3.1.noarch.rpm autocorr-nl-5.0.6.2-5.el7_3.1.noarch.rpm autocorr-pl-5.0.6.2-5.el7_3.1.noarch.rpm autocorr-pt-5.0.6.2-5.el7_3.1.noarch.rpm autocorr-ro-5.0.6.2-5.el7_3.1.noarch.rpm autocorr-ru-5.0.6.2-5.el7_3.1.noarch.rpm autocorr-sk-5.0.6.2-5.el7_3.1.noarch.rpm autocorr-sl-5.0.6.2-5.el7_3.1.noarch.rpm autocorr-sr-5.0.6.2-5.el7_3.1.noarch.rpm autocorr-sv-5.0.6.2-5.el7_3.1.noarch.rpm autocorr-tr-5.0.6.2-5.el7_3.1.noarch.rpm autocorr-vi-5.0.6.2-5.el7_3.1.noarch.rpm autocorr-zh-5.0.6.2-5.el7_3.1.noarch.rpm libreoffice-opensymbol-fonts-5.0.6.2-5.el7_3.1.noarch.rpm x86_64: libreoffice-base-5.0.6.2-5.el7_3.1.x86_64.rpm libreoffice-calc-5.0.6.2-5.el7_3.1.x86_64.rpm libreoffice-core-5.0.6.2-5.el7_3.1.x86_64.rpm libreoffice-debuginfo-5.0.6.2-5.el7_3.1.x86_64.rpm libreoffice-draw-5.0.6.2-5.el7_3.1.x86_64.rpm libreoffice-emailmerge-5.0.6.2-5.el7_3.1.x86_64.rpm libreoffice-graphicfilter-5.0.6.2-5.el7_3.1.x86_64.rpm libreoffice-impress-5.0.6.2-5.el7_3.1.x86_64.rpm libreoffice-langpack-af-5.0.6.2-5.el7_3.1.x86_64.rpm libreoffice-langpack-ar-5.0.6.2-5.el7_3.1.x86_64.rpm libreoffice-langpack-as-5.0.6.2-5.el7_3.1.x86_64.rpm libreoffice-langpack-bg-5.0.6.2-5.el7_3.1.x86_64.rpm libreoffice-langpack-bn-5.0.6.2-5.el7_3.1.x86_64.rpm libreoffice-langpack-br-5.0.6.2-5.el7_3.1.x86_64.rpm libreoffice-langpack-ca-5.0.6.2-5.el7_3.1.x86_64.rpm libreoffice-langpack-cs-5.0.6.2-5.el7_3.1.x86_64.rpm libreoffice-langpack-cy-5.0.6.2-5.el7_3.1.x86_64.rpm libreoffice-langpack-da-5.0.6.2-5.el7_3.1.x86_64.rpm libreoffice-langpack-de-5.0.6.2-5.el7_3.1.x86_64.rpm libreoffice-langpack-dz-5.0.6.2-5.el7_3.1.x86_64.rpm libreoffice-langpack-el-5.0.6.2-5.el7_3.1.x86_64.rpm libreoffice-langpack-en-5.0.6.2-5.el7_3.1.x86_64.rpm libreoffice-langpack-es-5.0.6.2-5.el7_3.1.x86_64.rpm libreoffice-langpack-et-5.0.6.2-5.el7_3.1.x86_64.rpm libreoffice-langpack-eu-5.0.6.2-5.el7_3.1.x86_64.rpm libreoffice-langpack-fa-5.0.6.2-5.el7_3.1.x86_64.rpm libreoffice-langpack-fi-5.0.6.2-5.el7_3.1.x86_64.rpm libreoffice-langpack-fr-5.0.6.2-5.el7_3.1.x86_64.rpm libreoffice-langpack-ga-5.0.6.2-5.el7_3.1.x86_64.rpm libreoffice-langpack-gl-5.0.6.2-5.el7_3.1.x86_64.rpm libreoffice-langpack-gu-5.0.6.2-5.el7_3.1.x86_64.rpm libreoffice-langpack-he-5.0.6.2-5.el7_3.1.x86_64.rpm libreoffice-langpack-hi-5.0.6.2-5.el7_3.1.x86_64.rpm libreoffice-langpack-hr-5.0.6.2-5.el7_3.1.x86_64.rpm libreoffice-langpack-hu-5.0.6.2-5.el7_3.1.x86_64.rpm libreoffice-langpack-it-5.0.6.2-5.el7_3.1.x86_64.rpm libreoffice-langpack-ja-5.0.6.2-5.el7_3.1.x86_64.rpm libreoffice-langpack-kk-5.0.6.2-5.el7_3.1.x86_64.rpm libreoffice-langpack-kn-5.0.6.2-5.el7_3.1.x86_64.rpm libreoffice-langpack-ko-5.0.6.2-5.el7_3.1.x86_64.rpm libreoffice-langpack-lt-5.0.6.2-5.el7_3.1.x86_64.rpm libreoffice-langpack-lv-5.0.6.2-5.el7_3.1.x86_64.rpm libreoffice-langpack-mai-5.0.6.2-5.el7_3.1.x86_64.rpm libreoffice-langpack-ml-5.0.6.2-5.el7_3.1.x86_64.rpm libreoffice-langpack-mr-5.0.6.2-5.el7_3.1.x86_64.rpm libreoffice-langpack-nb-5.0.6.2-5.el7_3.1.x86_64.rpm libreoffice-langpack-nl-5.0.6.2-5.el7_3.1.x86_64.rpm libreoffice-langpack-nn-5.0.6.2-5.el7_3.1.x86_64.rpm libreoffice-langpack-nr-5.0.6.2-5.el7_3.1.x86_64.rpm libreoffice-langpack-nso-5.0.6.2-5.el7_3.1.x86_64.rpm libreoffice-langpack-or-5.0.6.2-5.el7_3.1.x86_64.rpm libreoffice-langpack-pa-5.0.6.2-5.el7_3.1.x86_64.rpm libreoffice-langpack-pl-5.0.6.2-5.el7_3.1.x86_64.rpm libreoffice-langpack-pt-BR-5.0.6.2-5.el7_3.1.x86_64.rpm libreoffice-langpack-pt-PT-5.0.6.2-5.el7_3.1.x86_64.rpm libreoffice-langpack-ro-5.0.6.2-5.el7_3.1.x86_64.rpm libreoffice-langpack-ru-5.0.6.2-5.el7_3.1.x86_64.rpm libreoffice-langpack-si-5.0.6.2-5.el7_3.1.x86_64.rpm libreoffice-langpack-sk-5.0.6.2-5.el7_3.1.x86_64.rpm libreoffice-langpack-sl-5.0.6.2-5.el7_3.1.x86_64.rpm libreoffice-langpack-sr-5.0.6.2-5.el7_3.1.x86_64.rpm libreoffice-langpack-ss-5.0.6.2-5.el7_3.1.x86_64.rpm libreoffice-langpack-st-5.0.6.2-5.el7_3.1.x86_64.rpm libreoffice-langpack-sv-5.0.6.2-5.el7_3.1.x86_64.rpm libreoffice-langpack-ta-5.0.6.2-5.el7_3.1.x86_64.rpm libreoffice-langpack-te-5.0.6.2-5.el7_3.1.x86_64.rpm libreoffice-langpack-th-5.0.6.2-5.el7_3.1.x86_64.rpm libreoffice-langpack-tn-5.0.6.2-5.el7_3.1.x86_64.rpm libreoffice-langpack-tr-5.0.6.2-5.el7_3.1.x86_64.rpm libreoffice-langpack-ts-5.0.6.2-5.el7_3.1.x86_64.rpm libreoffice-langpack-uk-5.0.6.2-5.el7_3.1.x86_64.rpm libreoffice-langpack-ve-5.0.6.2-5.el7_3.1.x86_64.rpm libreoffice-langpack-xh-5.0.6.2-5.el7_3.1.x86_64.rpm libreoffice-langpack-zh-Hans-5.0.6.2-5.el7_3.1.x86_64.rpm libreoffice-langpack-zh-Hant-5.0.6.2-5.el7_3.1.x86_64.rpm libreoffice-langpack-zu-5.0.6.2-5.el7_3.1.x86_64.rpm libreoffice-math-5.0.6.2-5.el7_3.1.x86_64.rpm libreoffice-ogltrans-5.0.6.2-5.el7_3.1.x86_64.rpm libreoffice-pdfimport-5.0.6.2-5.el7_3.1.x86_64.rpm libreoffice-pyuno-5.0.6.2-5.el7_3.1.x86_64.rpm libreoffice-ure-5.0.6.2-5.el7_3.1.x86_64.rpm libreoffice-wiki-publisher-5.0.6.2-5.el7_3.1.x86_64.rpm libreoffice-writer-5.0.6.2-5.el7_3.1.x86_64.rpm Red Hat Enterprise Linux Workstation Optional (v. 7): x86_64: libreoffice-5.0.6.2-5.el7_3.1.x86_64.rpm libreoffice-bsh-5.0.6.2-5.el7_3.1.x86_64.rpm libreoffice-debuginfo-5.0.6.2-5.el7_3.1.x86_64.rpm libreoffice-filters-5.0.6.2-5.el7_3.1.x86_64.rpm libreoffice-gdb-debug-support-5.0.6.2-5.el7_3.1.x86_64.rpm libreoffice-glade-5.0.6.2-5.el7_3.1.x86_64.rpm libreoffice-librelogo-5.0.6.2-5.el7_3.1.x86_64.rpm libreoffice-nlpsolver-5.0.6.2-5.el7_3.1.x86_64.rpm libreoffice-officebean-5.0.6.2-5.el7_3.1.x86_64.rpm libreoffice-postgresql-5.0.6.2-5.el7_3.1.x86_64.rpm libreoffice-rhino-5.0.6.2-5.el7_3.1.x86_64.rpm libreoffice-sdk-5.0.6.2-5.el7_3.1.x86_64.rpm libreoffice-sdk-doc-5.0.6.2-5.el7_3.1.x86_64.rpm libreoffice-xsltfilter-5.0.6.2-5.el7_3.1.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/ 7. References: https://access.redhat.com/security/cve/CVE-2017-3157 https://access.redhat.com/security/updates/classification/#moderate 8. Contact: The Red Hat security contact is . More contact details at https://access.redhat.com/security/team/contact/ Copyright 2017 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iD8DBQFY7n6mXlSAg2UNWIIRAllUAJ4w+5TYVGNYRElCI1Hza8P7vp7FNQCglikw +pIQr2+eOMMHuKqw4H9rlGk= =W3Eg -----END PGP SIGNATURE----- --
  24. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ===================================================================== Red Hat Security Advisory Synopsis: Important: 389-ds-base security and bug fix update Advisory ID: RHSA-2017:0920-01 Product: Red Hat Enterprise Linux Advisory URL: https://access.redhat.com/errata/RHSA-2017:0920 Issue date: 2017-04-12 CVE Names: CVE-2017-2668 ===================================================================== 1. Summary: An update for 389-ds-base is now available for Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. 2. Relevant releases/architectures: Red Hat Enterprise Linux Client Optional (v. 7) - x86_64 Red Hat Enterprise Linux ComputeNode Optional (v. 7) - x86_64 Red Hat Enterprise Linux Server (v. 7) - aarch64, ppc64le, x86_64 Red Hat Enterprise Linux Server Optional (v. 7) - aarch64, ppc64le, x86_64 Red Hat Enterprise Linux Workstation (v. 7) - x86_64 Red Hat Enterprise Linux Workstation Optional (v. 7) - x86_64 3. Description: 389 Directory Server is an LDAP version 3 (LDAPv3) compliant server. The base packages include the Lightweight Directory Access Protocol (LDAP) server and command-line utilities for server administration. Security Fix(es): * An invalid pointer dereference flaw was found in the way 389-ds-base handled LDAP bind requests. A remote unauthenticated attacker could use this flaw to make ns-slapd crash via a specially crafted LDAP bind request, resulting in denial of service. (CVE-2017-2668) Red Hat would like to thank Joachim Jabs (F24) for reporting this issue. Bug Fix(es): * Previously, when adding a filtered role definition that uses the "nsrole" virtual attribute in the filter, Directory Server terminated unexpectedly. A patch has been applied, and now the roles plug-in ignores all virtual attributes. As a result, an error message is logged when an invalid filter is used. Additionally, the role is deactivated and Directory Server no longer fails. (BZ#1429498) * In a replication topology, Directory Server incorrectly calculated the size of string format entries when a lot of entries were deleted. The calculated size of entries was smaller than the actual required size. Consequently, Directory Server allocated insufficient memory and terminated unexpectedly when the data was written to it. With this update, the size of string format entries is now calculated correctly in the described situation and Directory Server no longer terminates unexpectedly. (BZ#1429495) 4. Solution: For details on how to apply this update, which includes the changes described in this advisory, refer to: https://access.redhat.com/articles/11258 After installing this update, the 389 server service will be restarted automatically. 5. Bugs fixed (https://bugzilla.redhat.com/): 1429495 - ns-slapd dies under heavy load 1429498 - A filtered nsrole that specifies an empty nsrole in its nsRoleFilter will result in a segfault. 1436575 - CVE-2017-2668 389-ds-base: Remote crash via crafted LDAP messages 6. Package List: Red Hat Enterprise Linux Client Optional (v. 7): Source: 389-ds-base-1.3.5.10-20.el7_3.src.rpm x86_64: 389-ds-base-1.3.5.10-20.el7_3.x86_64.rpm 389-ds-base-debuginfo-1.3.5.10-20.el7_3.x86_64.rpm 389-ds-base-devel-1.3.5.10-20.el7_3.x86_64.rpm 389-ds-base-libs-1.3.5.10-20.el7_3.x86_64.rpm 389-ds-base-snmp-1.3.5.10-20.el7_3.x86_64.rpm Red Hat Enterprise Linux ComputeNode Optional (v. 7): Source: 389-ds-base-1.3.5.10-20.el7_3.src.rpm x86_64: 389-ds-base-1.3.5.10-20.el7_3.x86_64.rpm 389-ds-base-debuginfo-1.3.5.10-20.el7_3.x86_64.rpm 389-ds-base-devel-1.3.5.10-20.el7_3.x86_64.rpm 389-ds-base-libs-1.3.5.10-20.el7_3.x86_64.rpm 389-ds-base-snmp-1.3.5.10-20.el7_3.x86_64.rpm Red Hat Enterprise Linux Server (v. 7): Source: 389-ds-base-1.3.5.10-20.el7_3.src.rpm aarch64: 389-ds-base-1.3.5.10-20.el7_3.aarch64.rpm 389-ds-base-debuginfo-1.3.5.10-20.el7_3.aarch64.rpm 389-ds-base-libs-1.3.5.10-20.el7_3.aarch64.rpm ppc64le: 389-ds-base-1.3.5.10-20.el7_3.ppc64le.rpm 389-ds-base-debuginfo-1.3.5.10-20.el7_3.ppc64le.rpm 389-ds-base-libs-1.3.5.10-20.el7_3.ppc64le.rpm x86_64: 389-ds-base-1.3.5.10-20.el7_3.x86_64.rpm 389-ds-base-debuginfo-1.3.5.10-20.el7_3.x86_64.rpm 389-ds-base-libs-1.3.5.10-20.el7_3.x86_64.rpm Red Hat Enterprise Linux Server Optional (v. 7): aarch64: 389-ds-base-debuginfo-1.3.5.10-20.el7_3.aarch64.rpm 389-ds-base-devel-1.3.5.10-20.el7_3.aarch64.rpm 389-ds-base-snmp-1.3.5.10-20.el7_3.aarch64.rpm ppc64le: 389-ds-base-debuginfo-1.3.5.10-20.el7_3.ppc64le.rpm 389-ds-base-devel-1.3.5.10-20.el7_3.ppc64le.rpm 389-ds-base-snmp-1.3.5.10-20.el7_3.ppc64le.rpm x86_64: 389-ds-base-debuginfo-1.3.5.10-20.el7_3.x86_64.rpm 389-ds-base-devel-1.3.5.10-20.el7_3.x86_64.rpm 389-ds-base-snmp-1.3.5.10-20.el7_3.x86_64.rpm Red Hat Enterprise Linux Workstation (v. 7): Source: 389-ds-base-1.3.5.10-20.el7_3.src.rpm x86_64: 389-ds-base-1.3.5.10-20.el7_3.x86_64.rpm 389-ds-base-debuginfo-1.3.5.10-20.el7_3.x86_64.rpm 389-ds-base-libs-1.3.5.10-20.el7_3.x86_64.rpm Red Hat Enterprise Linux Workstation Optional (v. 7): x86_64: 389-ds-base-debuginfo-1.3.5.10-20.el7_3.x86_64.rpm 389-ds-base-devel-1.3.5.10-20.el7_3.x86_64.rpm 389-ds-base-snmp-1.3.5.10-20.el7_3.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/ 7. References: https://access.redhat.com/security/cve/CVE-2017-2668 https://access.redhat.com/security/updates/classification/#important 8. Contact: The Red Hat security contact is . More contact details at https://access.redhat.com/security/team/contact/ Copyright 2017 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iD8DBQFY7n8HXlSAg2UNWIIRAkoNAKDE6GGYYqAzrqytX9kZaokV44XZ0ACeOWOe THYzG9N5LL5bYhOy1/B+wHc= =t9kU -----END PGP SIGNATURE----- --
  25. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ===================================================================== Red Hat Security Advisory Synopsis: Moderate: python-defusedxml and python-pysaml2 security update Advisory ID: RHSA-2017:0936-01 Product: Red Hat Enterprise Linux OpenStack Platform Advisory URL: https://access.redhat.com/errata/RHSA-2017:0936 Issue date: 2017-04-12 CVE Names: CVE-2016-10149 ===================================================================== 1. Summary: An update for python-defusedxml and python-pysaml2 is now available for Red Hat OpenStack Platform 8.0 (Liberty). Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. 2. Relevant releases/architectures: Red Hat OpenStack Platform 8.0 (Liberty) - noarch 3. Description: The defusedxml package contains several Python-only updates for security vulnerabilities in Python's XML libraries. Defusedxml functions and classes can be used instead of the originals to protect against entity-expansion and DTD-retrieval issues. PySAML2 is the python implementation of SAML Version 2, containing all the functionality for building a SAML2 service provider or an identity provider, to be used in a WSGI environment. Security Fix(es): * An XML entity expansion vulnerability was found in python-pysaml2. A remote attacker could send a crafted request which would cause denial of service through resource exhaustion. (CVE-2016-10149) 4. Solution: For details on how to apply this update, which includes the changes described in this advisory, refer to: https://access.redhat.com/articles/11258 5. Bugs fixed (https://bugzilla.redhat.com/): 1415710 - CVE-2016-10149 python-pysaml2: Entity expansion issue 6. Package List: Red Hat OpenStack Platform 8.0 (Liberty): Source: python-defusedxml-0.5.0-1.el7ost.src.rpm python-pysaml2-3.0.2-3.el7ost.src.rpm noarch: python-defusedxml-0.5.0-1.el7ost.noarch.rpm python-pysaml2-3.0.2-3.el7ost.noarch.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/ 7. References: https://access.redhat.com/security/cve/CVE-2016-10149 https://access.redhat.com/security/updates/classification/#moderate 8. Contact: The Red Hat security contact is . More contact details at https://access.redhat.com/security/team/contact/ Copyright 2017 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iD8DBQFY7n+sXlSAg2UNWIIRAu4sAKC3MaFR/1NxH2kaxjSE5twde3xAxACgmXBk QfT2n6UvaBZ/EinRhfueD8E= =A38l -----END PGP SIGNATURE----- --
×