Send CentOS-announce mailing list submissions to
centos-announce@centos.org
To subscribe or unsubscribe via the World Wide Web, visit
http://lists.centos.org/mailman/listinfo/centos-announce
or, via email, send a message with subject or body 'help' to
centos-announce-request@centos.org
You can reach the person managing the list at
centos-announce-owner@centos.org
When replying, please edit your Subject line so it is more specific
than "Re: Contents of CentOS-announce digest..."
Today's Topics:
1. CESA-2005:416-01: Low CentOS 2 i386 kdbg security update
(John Newbigin)
2. CESA-2005:480-01: Moderate CentOS 2 i386 ImageMagick security
update (John Newbigin)
3. CESA-2005:481-01: Low CentOS 2 i386 openssh security update
(John Newbigin)
----------------------------------------------------------------------
Message: 1
Date: Mon, 06 Jun 2005 08:52:58 +1000
From: John Newbigin jnewbigin@ict.swin.edu.au
Subject: [CentOS-announce] CESA-2005:416-01: Low CentOS 2 i386 kdbg
security update
To: centos-announce@centos.org
Message-ID: 42A3824A.5060504@ict.swin.edu.au
Content-Type: text/plain; charset=us-ascii; format=flowed
The following errata for CentOS-2 have been built and uploaded to the
centos mirror:
RHSA-2005:416-01 Low: kdbg security update
Files available:
kdbg-1.2.1-7.i386.rpm
More details are available from the RedHat web site at
https://rhn.redhat.com/errata/rh21as-errata.html
The easy way to make sure you are up to date with all the latest patches
is to run:
# yum update
--
John Newbigin
Computer Systems Officer
Faculty of Information and Communication Technologies
Swinburne University of Technology
Melbourne, Australia
http://www.ict.swin.edu.au/staff/jnewbigin
------------------------------
Message: 2
Date: Mon, 06 Jun 2005 08:53:01 +1000
From: John Newbigin
jnewbigin@ict.swin.edu.au
Subject: [CentOS-announce] CESA-2005:480-01: Moderate CentOS 2 i386
ImageMagick security update
To: centos-announce@centos.org
Message-ID:
42A3824D.8050102@ict.swin.edu.au
Content-Type: text/plain; charset=us-ascii; format=flowed
The following errata for CentOS-2 have been built and uploaded to the
centos mirror:
RHSA-2005:480-01 Moderate: ImageMagick security update
Files available:
ImageMagick-5.3.8-11.c2.1.i386.rpm
ImageMagick-c++-5.3.8-11.c2.1.i386.rpm
ImageMagick-c++-devel-5.3.8-11.c2.1.i386.rpm
ImageMagick-devel-5.3.8-11.c2.1.i386.rpm
ImageMagick-perl-5.3.8-11.c2.1.i386.rpm
More details are available from the RedHat web site at
https://rhn.redhat.com/errata/rh21as-errata.html
The easy way to make sure you are up to date with all the latest patches
is to run:
# yum update
--
John Newbigin
Computer Systems Officer
Faculty of Information and Communication Technologies
Swinburne University of Technology
Melbourne, Australia
http://www.ict.swin.edu.au/staff/jnewbigin
------------------------------
Message: 3
Date: Mon, 06 Jun 2005 08:53:04 +1000
From: John Newbigin
jnewbigin@ict.swin.edu.au
Subject: [CentOS-announce] CESA-2005:481-01: Low CentOS 2 i386 openssh
security update
To: centos-announce@centos.org
Message-ID:
42A38250.9010705@ict.swin.edu.au
Content-Type: text/plain; charset=us-ascii; format=flowed
The following errata for CentOS-2 have been built and uploaded to the
centos mirror:
RHSA-2005:481-01 Low: openssh security update
Files available:
openssh-3.1p1-18.i386.rpm
openssh-askpass-3.1p1-18.i386.rpm
openssh-askpass-gnome-3.1p1-18.i386.rpm
openssh-clients-3.1p1-18.i386.rpm
openssh-server-3.1p1-18.i386.rpm
More details are available from the RedHat web site at
https://rhn.redhat.com/errata/rh21as-errata.html
The easy way to make sure you are up to date with all the latest patches
is to run:
# yum update
--
John Newbigin
Computer Systems Officer
Faculty of Information and Communication Technologies
Swinburne University of Technology
Melbourne, Australia
http://www.ict.swin.edu.au/staff/jnewbigin
------------------------------
_______________________________________________
CentOS-announce mailing list
CentOS-announce@centos.org
http://lists.centos.org/mailman/listinfo/centos-announce
End of CentOS-announce Digest, Vol 4, Issue 3
*********************************************