Send CentOS-announce mailing list submissions to
centos-announce@centos.org
To subscribe or unsubscribe via the World Wide Web, visit
https://lists.centos.org/mailman/listinfo/centos-announce
or, via email, send a message with subject or body 'help' to
centos-announce-request@centos.org
You can reach the person managing the list at
centos-announce-owner@centos.org
When replying, please edit your Subject line so it is more specific
than "Re: Contents of CentOS-announce digest..."
Today's Topics:
1. CESA-2020:2433 Moderate CentOS 6 microcode_ctl Security
Update (Johnny Hughes)
2. CESA-2020:2430 Moderate CentOS 6 kernel Security Update
(Johnny Hughes)
3. CESA-2020:2432 Moderate CentOS 7 microcode_ctl Security
Update (Johnny Hughes)
----------------------------------------------------------------------
Message: 1
Date: Wed, 10 Jun 2020 17:17:14 +0000
From: Johnny Hughes johnny@centos.org
To: centos-announce@centos.org
Subject: [CentOS-announce] CESA-2020:2433 Moderate CentOS 6
microcode_ctl Security Update
Message-ID: 20200610171714.GA3446@bstore1.rdu2.centos.org
Content-Type: text/plain; charset=us-ascii
CentOS Errata and Security Advisory 2020:2433 Moderate
Upstream details at : https://access.redhat.com/errata/RHSA-2020:2433
The following updated files have been uploaded and are currently
syncing to the mirrors: ( sha256sum Filename )
i386:
bc2910c9f73fe13f75c2921410c368230698ad20c41c6bc8f2b077e875bc5ecb microcode_ctl-1.17-33.26.el6_10.i686.rpm
x86_64:
d61387797006fdb5af23de80a5751ff3769dbdbb53d89839809dc98359b58125 microcode_ctl-1.17-33.26.el6_10.x86_64.rpm
Source:
29a7a32919a8d60ce03d01075170f32614032b89bd9bf8b3e46b76525018c082 microcode_ctl-1.17-33.26.el6_10.src.rpm
--
Johnny Hughes
CentOS Project {
http://www.centos.org/ }
irc: hughesjr, #centos@irc.freenode.net
Twitter: @JohnnyCentOS
------------------------------
Message: 2
Date: Wed, 10 Jun 2020 17:19:46 +0000
From: Johnny Hughes
johnny@centos.org
To: centos-announce@centos.org
Subject: [CentOS-announce] CESA-2020:2430 Moderate CentOS 6 kernel
Security Update
Message-ID:
20200610171946.GA3787@bstore1.rdu2.centos.org
Content-Type: text/plain; charset=us-ascii
CentOS Errata and Security Advisory 2020:2430 Moderate
Upstream details at :
https://access.redhat.com/errata/RHSA-2020:2430
The following updated files have been uploaded and are currently
syncing to the mirrors: ( sha256sum Filename )
i386:
11bf519a323e41b66b238dc14e924b0b5d3b6d637dc4d8f5e866a566545ea7f0 kernel-2.6.32-754.30.2.el6.i686.rpm
2502bbcf915834aae1634c2ece36bafb9a3348fef2b9232e147477d81874c853 kernel-abi-whitelists-2.6.32-754.30.2.el6.noarch.rpm
15f96d91bfc8fe4a00f5ec978233cbc05167bfe7734ec2c1b6ed071e68566406 kernel-debug-2.6.32-754.30.2.el6.i686.rpm
e7e5ffa9c22ed9d43fcf4e98e08dafdd1be3a308824a60103843540a0b1456d5 kernel-debug-devel-2.6.32-754.30.2.el6.i686.rpm
4fff97920b1df19e4b2ae0af5e2a3f0cfca8853858e7c892bfbfe112507cb6b6 kernel-devel-2.6.32-754.30.2.el6.i686.rpm
921d611a19b98c2f04f9981edf3324b27b869f8a1d327adb60061ff71a912aaf kernel-doc-2.6.32-754.30.2.el6.noarch.rpm
bf7722b27bd32467a52cf669295c683070fba5151ee297a33f7718dd7dd16107 kernel-firmware-2.6.32-754.30.2.el6.noarch.rpm
a29ac2d4a39828bc7c5a18c9f728b0695b35d33ffb11c3dbcd8dc2b0f4621f21 kernel-headers-2.6.32-754.30.2.el6.i686.rpm
86a91237241b6d70a7ef40118609a192095ebc6867b6dde631eb935f6301d794 perf-2.6.32-754.30.2.el6.i686.rpm
54ab43ad2015f540fa658ea87ef5c7b7e24d411150aa1d58398be71af04d8c6e python-perf-2.6.32-754.30.2.el6.i686.rpm
x86_64:
921bf8f31a14a20b2ae2c729af200cac547e18d5459bdf68c2fd13e76c08f83e kernel-2.6.32-754.30.2.el6.x86_64.rpm
2502bbcf915834aae1634c2ece36bafb9a3348fef2b9232e147477d81874c853 kernel-abi-whitelists-2.6.32-754.30.2.el6.noarch.rpm
2c3fe628af77d70d17d4df1f409e693dad07100ae1394473258422a785403cc4 kernel-debug-2.6.32-754.30.2.el6.x86_64.rpm
e7e5ffa9c22ed9d43fcf4e98e08dafdd1be3a308824a60103843540a0b1456d5 kernel-debug-devel-2.6.32-754.30.2.el6.i686.rpm
403bc658ff35b9fafb243d94d6cf6fa028b2530b2c31164e776f4b1a95995679 kernel-debug-devel-2.6.32-754.30.2.el6.x86_64.rpm
22d0199606b0ffa91d4981ffeafe3bf14eddb4176ebd1afe76e01e2dac46806f kernel-devel-2.6.32-754.30.2.el6.x86_64.rpm
921d611a19b98c2f04f9981edf3324b27b869f8a1d327adb60061ff71a912aaf kernel-doc-2.6.32-754.30.2.el6.noarch.rpm
bf7722b27bd32467a52cf669295c683070fba5151ee297a33f7718dd7dd16107 kernel-firmware-2.6.32-754.30.2.el6.noarch.rpm
59b69f6865b2598236fd7f1062321e8cfba8562f8f6f03533a88a0d1234d6543 kernel-headers-2.6.32-754.30.2.el6.x86_64.rpm
fe5f89cc7d77d68ded0aea3d056408e5405b90b1ecaea31e174ad600e17ff7e0 perf-2.6.32-754.30.2.el6.x86_64.rpm
5439d7ca2bbf1686b75f1209436985aaee824e9c188359f5e5dae1c1b10183dd python-perf-2.6.32-754.30.2.el6.x86_64.rpm
Source:
b23d189769ca45756cbf8dac9fdfd11b507414a2c64f5e8973fd8540aa2ba211 kernel-2.6.32-754.30.2.el6.src.rpm
--
Johnny Hughes
CentOS Project {
http://www.centos.org/ }
irc: hughesjr, #centos@irc.freenode.net
Twitter: @JohnnyCentOS
------------------------------
Message: 3
Date: Wed, 10 Jun 2020 17:22:53 +0000
From: Johnny Hughes
johnny@centos.org
To: centos-announce@centos.org
Subject: [CentOS-announce] CESA-2020:2432 Moderate CentOS 7
microcode_ctl Security Update
Message-ID:
20200610172253.GA4100@bstore1.rdu2.centos.org
Content-Type: text/plain; charset=us-ascii
CentOS Errata and Security Advisory 2020:2432 Moderate
Upstream details at :
https://access.redhat.com/errata/RHSA-2020:2432
The following updated files have been uploaded and are currently
syncing to the mirrors: ( sha256sum Filename )
x86_64:
e60f84fe58d8f960f14241fc1c21ad0053213bad8ba294fc3c5f727d37076e4c microcode_ctl-2.1-61.6.el7_8.x86_64.rpm
Source:
42a0ea626d8554d7d25af8a383010f11fd791f7689f8943c7b97646db5550acc microcode_ctl-2.1-61.6.el7_8.src.rpm
--
Johnny Hughes
CentOS Project {
http://www.centos.org/ }
irc: hughesjr, #centos@irc.freenode.net
Twitter: @JohnnyCentOS
------------------------------
Subject: Digest Footer
_______________________________________________
CentOS-announce mailing list
CentOS-announce@centos.org
https://lists.centos.org/mailman/listinfo/centos-announce
------------------------------
End of CentOS-announce Digest, Vol 184, Issue 4
***********************************************