centos-announce-request at centos.org
2013-May-16 12:00 UTC
[CentOS] CentOS-announce Digest, Vol 99, Issue 7
Send CentOS-announce mailing list submissions to centos-announce at centos.org To subscribe or unsubscribe via the World Wide Web, visit http://lists.centos.org/mailman/listinfo/centos-announce or, via email, send a message with subject or body 'help' to centos-announce-request at centos.org You can reach the person managing the list at centos-announce-owner at centos.org When replying, please edit your Subject line so it is more specific than "Re: Contents of CentOS-announce digest..." Today's Topics: 1. CentOS-6 CVE-2013-2094 Kernel Issue (Johnny Hughes) 2. CESA-2013:0827 Important CentOS 5 openswan Update (Johnny Hughes) 3. CESA-2013:0827 Important CentOS 6 openswan Update (Johnny Hughes) ---------------------------------------------------------------------- Message: 1 Date: Wed, 15 May 2013 09:34:53 -0500 From: Johnny Hughes <johnny at centos.org> Subject: [CentOS-announce] CentOS-6 CVE-2013-2094 Kernel Issue To: CentOS-Announce <centos-announce at centos.org> Message-ID: <51939D0D.3000309 at centos.org> Content-Type: text/plain; charset="iso-8859-1" There is a kernel security issue that allows unprivileged (normal) users to gain root access on CentOS-6.4 x86_64 machines. The upstream bugzilla entry is here: https://bugzilla.redhat.com/show_bug.cgi?id=962792 There is a *TESTING* kernel that should mitigate this issue available here: http://people.centos.org/hughesjr/c6kernel/2.6.32-358.6.1.el6.cve20132094/ Signing Key: http://mirror.centos.org/centos/RPM-GPG-KEY-CentOS-Testing-6 This kernel is the current CentOS-6.4 kernel with this one patch added and recompiled: https://patchwork.kernel.org/patch/2441281/ Note: This is signed by the centos-6 test key and it is provided as a best effort option to mitigate the above security issue while waiting for an upstream solution. It has been tested by our QA Team, but it is *NOT* an official CentOS package and needs to be fully tested for fitness by each user before used in production. Please see this mailing list thread: http://lists.centos.org/pipermail/centos/2013-May/134726.html And/or this Forum thread: http://www.centos.org/modules/newbb/viewtopic.php?topic_id=42827&forum=59 For more details. Thanks, Johnny Hughes -------------- next part -------------- A non-text attachment was scrubbed... Name: signature.asc Type: application/pgp-signature Size: 198 bytes Desc: OpenPGP digital signature Url : http://lists.centos.org/pipermail/centos-announce/attachments/20130515/27ff719e/attachment-0001.bin ------------------------------ Message: 2 Date: Wed, 15 May 2013 23:11:17 +0000 From: Johnny Hughes <johnny at centos.org> Subject: [CentOS-announce] CESA-2013:0827 Important CentOS 5 openswan Update To: centos-announce at centos.org Message-ID: <20130515231117.GA14241 at chakra.karan.org> Content-Type: text/plain; charset=us-ascii CentOS Errata and Security Advisory 2013:0827 Important Upstream details at : https://rhn.redhat.com/errata/RHSA-2013-0827.html The following updated files have been uploaded and are currently syncing to the mirrors: ( sha256sum Filename ) i386: 20f26a7b4e0826441b25ef19a0b8d0067405788402a18c52c25bc4df942a60ef openswan-2.6.32-5.el5_9.i386.rpm 6fa4b93fe7e3b8fa3a6ae5ee744cc9125fd3f890f3c3402e06ffa61606ebeb35 openswan-doc-2.6.32-5.el5_9.i386.rpm x86_64: fd3c84089449a13525f522390a8e76b6a50e1429c4d2a6bcae2b0f31a6d13ba1 openswan-2.6.32-5.el5_9.x86_64.rpm 7c958210e030009fdfff516c8279bac4102503eeb481da8e39312fc25778fd96 openswan-doc-2.6.32-5.el5_9.x86_64.rpm Source: 49ab324f02c07f1f468d42293b3f3880e3a0d8f634f994b9bed57f7c909c408a openswan-2.6.32-5.el5_9.src.rpm -- Johnny Hughes CentOS Project { http://www.centos.org/ } irc: hughesjr, #centos at irc.freenode.net ------------------------------ Message: 3 Date: Thu, 16 May 2013 00:24:06 +0000 From: Johnny Hughes <johnny at centos.org> Subject: [CentOS-announce] CESA-2013:0827 Important CentOS 6 openswan Update To: centos-announce at centos.org Message-ID: <20130516002406.GA53621 at n04.lon1.karan.org> Content-Type: text/plain; charset=us-ascii CentOS Errata and Security Advisory 2013:0827 Important Upstream details at : https://rhn.redhat.com/errata/RHSA-2013-0827.html The following updated files have been uploaded and are currently syncing to the mirrors: ( sha256sum Filename ) i386: 067bd7c50f44083b4b0f744559a9ad08d207ec534c8399d73e7fe26a8aecb0d7 openswan-2.6.32-20.el6_4.i686.rpm ce628c6436fdd05078d495b623517961f833200f5e1e0f76bffd40d5950d4e68 openswan-doc-2.6.32-20.el6_4.i686.rpm x86_64: 90e8036cb7c72ce0cddcf6338c21adb00c348b1331b71addd22f032d2c136784 openswan-2.6.32-20.el6_4.x86_64.rpm daa7e45402a8419527f66d0c4005da5818110aaeffe524a57cedbc731bb1af14 openswan-doc-2.6.32-20.el6_4.x86_64.rpm Source: 23b0745a71808105bc742819a25b76295aa9e2e4a74895b1bd1104b0a8e35338 openswan-2.6.32-20.el6_4.src.rpm -- Johnny Hughes CentOS Project { http://www.centos.org/ } irc: hughesjr, #centos at irc.freenode.net ------------------------------ _______________________________________________ CentOS-announce mailing list CentOS-announce at centos.org http://lists.centos.org/mailman/listinfo/centos-announce End of CentOS-announce Digest, Vol 99, Issue 7 **********************************************