CentOS Errata and Security Advisory 2014:1635 Critical
Upstream details at : https://rhn.redhat.com/errata/RHSA-2014-1635.html
The following updated files have been uploaded and are currently
syncing to the mirrors: ( sha256sum Filename )
i386:
9df05ee668d515f3ece37ee2e4cf518ffef8d1c52de35a0c59743ef9cf574cd7 firefox-31.2.0-3.el5.centos.i386.rpm
x86_64:
9df05ee668d515f3ece37ee2e4cf518ffef8d1c52de35a0c59743ef9cf574cd7 firefox-31.2.0-3.el5.centos.i386.rpm
fbd203f1998e1dee8e25010a1d4fa29b4b5321d20db4125b985b03a8592346ff firefox-31.2.0-3.el5.centos.x86_64.rpm
Source:
f5201abc4f86e806a1fcb6f85333b750203339111f506ffb2641beb02c3693f4 firefox-31.2.0-3.el5.centos.src.rpm
--
Johnny Hughes
CentOS Project { http://www.centos.org/ }
irc: hughesjr, #centos(a)irc.freenode.net
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
Hi,
As most of you already know, there is an important SSLv3 vulnerability
(CVE-2014-3566 - see https://access.redhat.com/articles/1232123) ,
known as Poodle.
While it's easy to disable SSLv3 in the allowed Protocols at the
server level (for example SSLProtocol All -SSLv2 -SSLv3 for apache),
some clients are still defaulting to SSLv3, and Koji does that.
We currently have disabled SSLv3 on our cbs.centos.org koji instance,
so if you're a cbs/koji user, please adapt your local koji package
(local fix !)
At the moment, there is no available upstream package, but the
following patch has been tested by Fedora people too (and credits go
to
https://lists.fedoraproject.org/pipermail/infrastructure/2014-October/01497…)
=====================================================
- --- SSLCommon.py.orig 2014-10-15 11:42:54.747082029 +0200
+++ SSLCommon.py 2014-10-15 11:44:08.215257590 +0200
@@ -37,7 +37,8 @@
if f and not os.access(f, os.R_OK):
raise StandardError, "%s does not exist or is not
readable" % f
- - ctx = SSL.Context(SSL.SSLv3_METHOD) # SSLv3 only
+ #ctx = SSL.Context(SSL.SSLv3_METHOD) # SSLv3 only
+ ctx = SSL.Context(SSL.TLSv1_METHOD) # TLSv1 only
ctx.use_certificate_file(key_and_cert)
ctx.use_privatekey_file(key_and_cert)
ctx.load_client_ca(ca_cert)
@@ -45,7 +46,8 @@
verify = SSL.VERIFY_PEER | SSL.VERIFY_FAIL_IF_NO_PEER_CERT
ctx.set_verify(verify, our_verify)
ctx.set_verify_depth(10)
- - ctx.set_options(SSL.OP_NO_SSLv2 | SSL.OP_NO_TLSv1)
+ #ctx.set_options(SSL.OP_NO_SSLv2 | SSL.OP_NO_TLSv1)
+ ctx.set_options(SSL.OP_NO_SSLv2 | SSL.OP_NO_TLSv1 | SSL.OP_NO_SSLv3)
return ctx
=====================================================
We'll keep you informed about possible upstream koji packages that
would default to at least TLSv1
If you encounter a problem, feel free to drop into #centos-devel
channel on irc.freenode.net and have a chat with us
on behalf of the Infra team,
- --
Fabian Arrotin
The CentOS Project | http://www.centos.org
gpg key: 56BEC54E | twitter: @arrfab
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v2.0.22 (GNU/Linux)
iEYEARECAAYFAlQ+TUUACgkQnVkHo1a+xU4JyQCfefp2h7yRdmljBqRc+M76jPTf
z7wAn3dOkaNPNfEnV0pxWDFX7BDDqKuY
=lxsg
-----END PGP SIGNATURE-----
CentOS Errata and Enhancement Advisory 2014:1393
Upstream details at : https://rhn.redhat.com/errata/RHEA-2014-1393.html
The following updated files have been uploaded and are currently
syncing to the mirrors: ( sha256sum Filename )
i386:
d0d7eaa262746e1760fd3d533b9fa82684ef87bb344b38422946f6b1b81c69c1 kmod-be2iscsi-10.2.273.0r-1.el6_5.i686.rpm
x86_64:
c066e98a14fc3db9b8237d19d3ffef9a62bcb8e063d6f996b166040f2a047bd2 kmod-be2iscsi-10.2.273.0r-1.el6_5.x86_64.rpm
Source:
6d708190df4651c157dd173748290b83bb624071c37e0602540e04a72696d085 be2iscsi-10.2.273.0r-1.el6_5.src.rpm
--
Johnny Hughes
CentOS Project { http://www.centos.org/ }
irc: hughesjr, #centos(a)irc.freenode.net
CentOS Errata and Bugfix Advisory 2014:1395
Upstream details at : https://rhn.redhat.com/errata/RHBA-2014-1395.html
The following updated files have been uploaded and are currently
syncing to the mirrors: ( sha256sum Filename )
i386:
1387ed663fe471b6b1b4c7ace450886b76d8513ca399fa407f91125cf5b6c765 ksh-20120801-10.el6_5.12.i686.rpm
x86_64:
1376e7817bab4dd5b14a4bd2ec56e973d05fbc6367350ceb110a5e39163a7be9 ksh-20120801-10.el6_5.12.x86_64.rpm
Source:
7c1fe6ed97a97af63f4810947c747fd9ec6017ba9dcd7104b6d0c9fe007833fc ksh-20120801-10.el6_5.12.src.rpm
--
Johnny Hughes
CentOS Project { http://www.centos.org/ }
irc: hughesjr, #centos(a)irc.freenode.net
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
We have to do some hardware/software maintenance on the machine
actually hosting the Wiki service (http://wiki.centos.org) Instead of
just taking the wiki instance down during that maintenance, we've
decided to relocate it to a temporary host, proceed to maintenance,
and then migrate it back to the previous node.
Migration is scheduled for Friday October 10th, 11:00 am UTC time.
You can convert to local time with $(date -d '2014-10-10 11:00 UTC')
Migration will happen in several steps:
1 - we "freeze" the wiki on the actual node, transfer data, update the
A record, restore the service on the temporary node (disruption ~ 30min)
2 - we proceed to the needed maintenance on first node (no disruption
in service, but no estimated time)
3 - depending on time needed for step [2], and assuming we have no
hardware issue, we proceed like step [1], but in reverse (so
disruption ~30 minutes again)
Thanks for your comprehending and patience.
on behalf of the Infra team,
- --
Fabian Arrotin
The CentOS Project | http://www.centos.org
gpg key: 56BEC54E | twitter: @arrfab
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v2.0.22 (GNU/Linux)
iEYEARECAAYFAlQ2g0kACgkQnVkHo1a+xU4flACfc1IjPeHelBntwt4eNTd6SBvM
wXAAnAqtOg4Ko4nqd0QVUfX7ZcQevD5K
=v15z
-----END PGP SIGNATURE-----