Send CentOS-announce mailing list submissions to
centos-announce@centos.org
To subscribe or unsubscribe via the World Wide Web, visit
https://lists.centos.org/mailman/listinfo/centos-announce
or, via email, send a message with subject or body 'help' to
centos-announce-request@centos.org
You can reach the person managing the list at
centos-announce-owner@centos.org
When replying, please edit your Subject line so it is more specific
than "Re: Contents of CentOS-announce digest..."
Today's Topics:
1. CESA-2018:0007 Important CentOS 7 kernel Security Update
(Karanbir Singh)
2. CESA-2018:0012 Important CentOS 7 microcode_ctl Security
Update (Karanbir Singh)
3. CESA-2018:0014 Important CentOS 7 linux-firmware Security
Update (Karanbir Singh)
4. [Infra] - planned outage : All services (Fabian Arrotin)
5. CESA-2018:0013 Important CentOS 6 microcode_ctl Security
Update (Johnny Hughes)
6. CESA-2018:0008 Important CentOS 6 kernel Security Update
(Johnny Hughes)
7. CESA-RHSA-2018:0024 Important CentOS 6 qemu-kvm Security
Update (Johnny Hughes)
8. CESA-2018:0030 Important CentOS 6 libvirt Security Update
(Johnny Hughes)
9. CESA-2018:0029 Important CentOS 7 libvirt Security Update
(Johnny Hughes)
10. CESA-2018:0023 Important CentOS 7 qemu-kvm Security Update
(Johnny Hughes)
----------------------------------------------------------------------
Message: 1
Date: Thu, 4 Jan 2018 11:36:27 +0000
From: Karanbir Singh kbsingh@centos.org
To: CentOS Announcements List centos-announce@centos.org
Subject: [CentOS-announce] CESA-2018:0007 Important CentOS 7 kernel
Security Update
Message-ID: d07d0b4b-cc89-329a-f517-08b3cd1bae7d@centos.org
Content-Type: text/plain; charset=utf-8
CentOS Errata and Security Advisory 2018:0007 Important
Upstream details at : https://access.redhat.com/errata/RHSA-2018:0007
The following updated files have been uploaded and are currently
syncing to the mirrors: ( sha256sum Filename )
x86_64:
320ab3bd00bd1f051c69f65f2d4cd6ab64585f977d9cd7a52e64e8f8147894fc
kernel-3.10.0-693.11.6.el7.x86_64.rpm
0eefdec5447d3ed2781f30d093e22f4654e8af201e1e8058a57876d1baf2ee64
kernel-abi-whitelists-3.10.0-693.11.6.el7.noarch.rpm
5137d0db8632342edfb355ce5bb0a4b4b80d5ffd4b9950bb8dcfcd78e4b8a9dc
kernel-debug-3.10.0-693.11.6.el7.x86_64.rpm
882a6522bdafaa697173ff7adedd2cd6ceee5c4a6aa0cd1cb4cf042789420c78
kernel-debug-devel-3.10.0-693.11.6.el7.x86_64.rpm
9c0d7753c649d68cd25b212ee573cec37dc2211891444224e502128fcffdf301
kernel-devel-3.10.0-693.11.6.el7.x86_64.rpm
d2005d6a85f2ddd627290dd4cd4d2084215ef45cd8b3f66077b68fe2b0cce61e
kernel-doc-3.10.0-693.11.6.el7.noarch.rpm
34d8682b2df1e47c9675f913fbfb129420cce219beaf7985c607a69ccdb3e064
kernel-headers-3.10.0-693.11.6.el7.x86_64.rpm
fd3eaf598546bcb502e5e7293d0301b48774c9358dd320b7e53bd042dfae7094
kernel-tools-3.10.0-693.11.6.el7.x86_64.rpm
3c53034adc4c942a02f1dd72f0adf688f558867caf086b5b239169262b75f570
kernel-tools-libs-3.10.0-693.11.6.el7.x86_64.rpm
91153ae59d0acf585201b9a5b453ed8e6504651bf114e3c21c725ce42c8675c5
kernel-tools-libs-devel-3.10.0-693.11.6.el7.x86_64.rpm
8ef1d6c1ef77af60bbb680fa58b1d15f7901c21220c7e5db05edbbbb56f7b17c
perf-3.10.0-693.11.6.el7.x86_64.rpm
b1f7bf92063bce0cec6286845686bc6ef96db126bdaa8987703b21a736a1a509
python-perf-3.10.0-693.11.6.el7.x86_64.rpm
Source:
b7756ceda51a35942e03d553f0ec6049ba2520c89e0d66e8e2cdae88f6db0d6a
kernel-3.10.0-693.11.6.el7.src.rpm
Note:
1) This is a widespread issue with potentially huge impact, we
appreciate any help in spreading the word around so maximum number of
users are able to find out, and patch their systems.
2) Upstream is curating information around this issue at
https://access.redhat.com/security/vulnerabilities/speculativeexecution
- information on that page would be helpful for most people on CentOS
Linux as well.
3) Please reach out to us at #centos on irc.freenode.net for any
feedback, comments, questions or concerns.
--
Karanbir Singh, Project Lead, The CentOS Project
+44-207-0999389 |
http://www.centos.org/ | twitter.com/CentOS
GnuPG Key :
http://www.karan.org/publickey.asc
------------------------------
Message: 2
Date: Thu, 4 Jan 2018 11:40:52 +0000
From: Karanbir Singh
kbsingh@centos.org
To: CentOS Announcements List
centos-announce@centos.org
Subject: [CentOS-announce] CESA-2018:0012 Important CentOS 7
microcode_ctl Security Update
Message-ID:
ebbc916f-bc12-0a57-4228-cffde1956cdd@centos.org
Content-Type: text/plain; charset=utf-8
CentOS Errata and Security Advisory 2018:0012 Important
Upstream details at :
https://access.redhat.com/errata/RHSA-2018:0012
The following updated files have been uploaded and are currently
syncing to the mirrors: ( sha256sum Filename )
x86_64:
ccb96b47da6ce420c39a38d09e57adcc7ab3696c721d081fee94298f19fc6cab
microcode_ctl-2.1-22.2.el7.x86_64.rpm
Source:
589fe27443e43fd6549f56e39968cf515d1cd2448dc922bf0cc980fc651f880d
microcode_ctl-2.1-22.2.el7.src.rpm
--
Karanbir Singh, Project Lead, The CentOS Project
+44-207-0999389 |
http://www.centos.org/ | twitter.com/CentOS
GnuPG Key :
http://www.karan.org/publickey.asc
------------------------------
Message: 3
Date: Thu, 4 Jan 2018 11:47:37 +0000
From: Karanbir Singh
kbsingh@centos.org
To: CentOS Announcements List
centos-announce@centos.org
Subject: [CentOS-announce] CESA-2018:0014 Important CentOS 7
linux-firmware Security Update
Message-ID:
d1551ccd-4d12-3bc1-b1d9-9d9bcac949ae@centos.org
Content-Type: text/plain; charset=utf-8
CentOS Errata and Security Advisory 2018:0014 Important
Upstream details at :
https://access.redhat.com/errata/RHSA-2018:0014
The following updated files have been uploaded and are currently
syncing to the mirrors: ( sha256sum Filename )
x86_64:
dad80246e21277864476614560cae38820cc147b9ceb44dd0d1776e3935b05df
iwl1000-firmware-39.31.5.1-57.el7.noarch.rpm
dbb0a9095b11d9af2b8db8f160e1004ead7f5b07add216df63c843e2ac470259
iwl100-firmware-39.31.5.1-57.el7.noarch.rpm
1ff7d3347a2759b15818d71817d5055643bcc4a9f7b091d186006948cf75a3f0
iwl105-firmware-18.168.6.1-57.el7.noarch.rpm
e807e3cc6faa0be6df4675d9810db6292a534bc0c3f9c714dcc7c92fed0ba4fd
iwl135-firmware-18.168.6.1-57.el7.noarch.rpm
d24d6225079ec7d7870ca022226686c67d70f9d034af1167b36570e8506fdf02
iwl2000-firmware-18.168.6.1-57.el7.noarch.rpm
2eebc03a19e54f4b072f21886f02e43bdac41ff5e8290d9eb7c62e3ef1ed7352
iwl2030-firmware-18.168.6.1-57.el7.noarch.rpm
d154f7ddb5ccca2772604f907d7a3c06e1b2f95b35665e81363226c98a9115c4
iwl3160-firmware-22.0.7.0-57.el7.noarch.rpm
aaba72a90838c5dee3373004ee00530e3f43fbd0b9cd634223d02ea500c3cd6d
iwl3945-firmware-15.32.2.9-57.el7.noarch.rpm
f18caaca13e3ed06f43483870ecdc57ff6c8796bf3cb8375822519d0ced3b659
iwl4965-firmware-228.61.2.24-57.el7.noarch.rpm
257fe78f77c4e1c5c9bea3873421411c77020c12d907b1d7c511e7e96eaa3190
iwl5000-firmware-8.83.5.1_1-57.el7.noarch.rpm
e9edf8b527e94302b0572ce1e3f0e91d62e9d11f74cf3ad1c0350c8e23684acc
iwl5150-firmware-8.24.2.2-57.el7.noarch.rpm
b63dc1829cca0afbb4a6e5681cebf54509cc4c507ab0bad6553856c4063616ed
iwl6000-firmware-9.221.4.1-57.el7.noarch.rpm
8abb25db6c0dcedfa0c11f87028521f5098a88374dcb99376f485bda4596a567
iwl6000g2a-firmware-17.168.5.3-57.el7.noarch.rpm
d35951cc21bfccae24e6611ad03901ac1fe0183614add09b2b04528a72d3ea4b
iwl6000g2b-firmware-17.168.5.2-57.el7.noarch.rpm
8a2cd4dbabdbdcc36ed46a2529c07b9873716981610082db5b40ae134e12ee3d
iwl6050-firmware-41.28.5.1-57.el7.noarch.rpm
357388ce0000543ce9714ebffbadc15ab1e3969c4f1256d6f1132f619c82afdc
iwl7260-firmware-22.0.7.0-57.el7.noarch.rpm
75a235701d30e685ca87945e0dd583bda08e254f9078d50b3d466af4d5e3cfe6
iwl7265-firmware-22.0.7.0-57.el7.noarch.rpm
16164fc1c681f5a04a14879041e66855aa434c9c9c30d722a273519896b0f7b7
linux-firmware-20170606-57.gitc990aae.el7.noarch.rpm
Source:
ffa8541e30f72d79d88740d418943668d1da9535ebbee0df3c61ad4d7d576cdc
linux-firmware-20170606-57.gitc990aae.el7.src.rpm
--
Karanbir Singh, Project Lead, The CentOS Project
+44-207-0999389 |
http://www.centos.org/ | twitter.com/CentOS
GnuPG Key :
http://www.karan.org/publickey.asc
------------------------------
Message: 4
Date: Thu, 4 Jan 2018 14:21:49 +0100
From: Fabian Arrotin
arrfab@centos.org
To: "The CentOS developers mailing list."
centos-devel@centos.org,
centos-announce@centos.org
Subject: [CentOS-announce] [Infra] - planned outage : All services
Message-ID:
eb940deb-7311-381d-c2f4-ede324e9ffe4@centos.org
Content-Type: text/plain; charset="utf-8"
Due to important security updates that we need to apply within the whole
CentOS infra, please be aware that some nodes/services will be
unresponsive during that maintenance window.
As it targets both CentOS 6 and CentOS 7, we'll probably apply those
updates ASAP but we'll not notify for each impacted service, so this
announce will cover all impacted services during the next hours/days.
Thanks for your comprehending and patience.
on behalf of the Infra team,
--
Fabian Arrotin
The CentOS Project |
https://www.centos.org
gpg key: 56BEC54E | twitter: @arrfab