Send CentOS-announce mailing list submissions to centos-announce at centos.org To subscribe or unsubscribe via the World Wide Web, visit http://lists.centos.org/mailman/listinfo/centos-announce or, via email, send a message with subject or body 'help' to centos-announce-request at centos.org You can reach the person managing the list at centos-announce-owner at centos.org When replying, please edit your Subject line so it is more specific than "Re: Contents of CentOS-announce digest..." Today's Topics: 1. CESA-2006:0710 Important CentOS 3 i386 kernel - security update (Tru Huynh) 2. CESA-2006:0710 Important CentOS 3 x86_64 kernel - security update (Tru Huynh) 3. CESA-2006:0710 Important CentOS 3 s390(x) kernel - security update (Pasi Pirhonen) 4. CESA-2006:0720 Critical CentOS 4 i386 kdelibs - security update (Johnny Hughes) 5. CESA-2006:0720 Critical CentOS 4 x86_64 kdelibs - security update (Johnny Hughes) ---------------------------------------------------------------------- Message: 1 Date: Thu, 19 Oct 2006 19:14:26 +0200 From: Tru Huynh <tru at centos.org> Subject: [CentOS-announce] CESA-2006:0710 Important CentOS 3 i386 kernel - security update To: centos-announce at centos.org Message-ID: <20061019171426.GA15998 at sillage.bis.pasteur.fr> Content-Type: text/plain; charset="us-ascii" CentOS Errata and Security Advisory CESA-2006:0710 kernel security update for CentOS 3 i386: https://rhn.redhat.com/errata/RHSA-2006-0710.html The following updated file has been uploaded and is currently syncing to the mirrors: i386: updates/i386/RPMS/kernel-2.4.21-47.0.1.EL.i586.rpm updates/i386/RPMS/kernel-2.4.21-47.0.1.EL.i686.rpm updates/i386/RPMS/kernel-BOOT-2.4.21-47.0.1.EL.i386.rpm updates/i386/RPMS/kernel-doc-2.4.21-47.0.1.EL.i386.rpm updates/i386/RPMS/kernel-hugemem-2.4.21-47.0.1.EL.i686.rpm updates/i386/RPMS/kernel-hugemem-unsupported-2.4.21-47.0.1.EL.i686.rpm updates/i386/RPMS/kernel-smp-2.4.21-47.0.1.EL.i686.rpm updates/i386/RPMS/kernel-smp-unsupported-2.4.21-47.0.1.EL.i686.rpm updates/i386/RPMS/kernel-source-2.4.21-47.0.1.EL.i386.rpm updates/i386/RPMS/kernel-unsupported-2.4.21-47.0.1.EL.i586.rpm updates/i386/RPMS/kernel-unsupported-2.4.21-47.0.1.EL.i686.rpm updates/i386/RPMS/kernel-2.4.21-47.0.1.EL.athlon.rpm updates/i386/RPMS/kernel-smp-2.4.21-47.0.1.EL.athlon.rpm updates/i386/RPMS/kernel-smp-unsupported-2.4.21-47.0.1.EL.athlon.rpm updates/i386/RPMS/kernel-unsupported-2.4.21-47.0.1.EL.athlon.rpm source: updates/SRPMS/kernel-2.4.21-47.0.1.EL.src.rpm You may update your CentOS-3 i386 installations by running the command: yum update kernel\* Tru -- Tru Huynh (CentOS-3 i386/x86_64 Package Maintenance) http://pgp.mit.edu:11371/pks/lookup?op=get&search=0xBEFA581B -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: application/pgp-signature Size: 189 bytes Desc: not available Url : http://lists.centos.org/pipermail/centos-announce/attachments/20061019/2194a881/attachment-0001.bin ------------------------------ Message: 2 Date: Thu, 19 Oct 2006 19:15:21 +0200 From: Tru Huynh <tru at centos.org> Subject: [CentOS-announce] CESA-2006:0710 Important CentOS 3 x86_64 kernel - security update To: centos-announce at centos.org Message-ID: <20061019171521.GB15998 at sillage.bis.pasteur.fr> Content-Type: text/plain; charset="us-ascii" CentOS Errata and Security Advisory CESA-2006:0710 kernel security update for CentOS 3 x86_64: https://rhn.redhat.com/errata/RHSA-2006-0710.html The following updated file has been uploaded and is currently syncing to the mirrors: x86_64: updates/x86_64/RPMS/kernel-2.4.21-47.0.1.EL.ia32e.rpm updates/x86_64/RPMS/kernel-2.4.21-47.0.1.EL.x86_64.rpm updates/x86_64/RPMS/kernel-doc-2.4.21-47.0.1.EL.x86_64.rpm updates/x86_64/RPMS/kernel-smp-2.4.21-47.0.1.EL.x86_64.rpm updates/x86_64/RPMS/kernel-smp-unsupported-2.4.21-47.0.1.EL.x86_64.rpm updates/x86_64/RPMS/kernel-source-2.4.21-47.0.1.EL.x86_64.rpm updates/x86_64/RPMS/kernel-unsupported-2.4.21-47.0.1.EL.ia32e.rpm updates/x86_64/RPMS/kernel-unsupported-2.4.21-47.0.1.EL.x86_64.rpm source: updates/SRPMS/kernel-2.4.21-47.0.1.EL.src.rpm You may update your CentOS-3 x86_64 installations by running the command: yum update kernel\* Tru -- Tru Huynh (CentOS-3 i386/x86_64 Package Maintenance) http://pgp.mit.edu:11371/pks/lookup?op=get&search=0xBEFA581B -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: application/pgp-signature Size: 189 bytes Desc: not available Url : http://lists.centos.org/pipermail/centos-announce/attachments/20061019/16d980d0/attachment-0001.bin ------------------------------ Message: 3 Date: Thu, 19 Oct 2006 20:17:51 +0300 From: Pasi Pirhonen <upi at centos.fi> Subject: [CentOS-announce] CESA-2006:0710 Important CentOS 3 s390(x) kernel - security update To: centos-announce at centos.org Message-ID: <20061019171751.GM18119 at centos.fi> Content-Type: text/plain; charset="us-ascii" CentOS Errata and Security Advisory 2006:0710 https://rhn.redhat.com/errata/RHSA-2006-0710.html The following updated files have been uploaded and are currently syncing to the mirrors: s390: updates/s390/RPMS/kernel-2.4.21-47.0.1.EL.s390.rpm updates/s390/RPMS/kernel-doc-2.4.21-47.0.1.EL.s390.rpm updates/s390/RPMS/kernel-source-2.4.21-47.0.1.EL.s390.rpm updates/s390/RPMS/kernel-unsupported-2.4.21-47.0.1.EL.s390.rpm s390x: updates/s390x/RPMS/kernel-2.4.21-47.0.1.EL.s390x.rpm updates/s390x/RPMS/kernel-doc-2.4.21-47.0.1.EL.s390x.rpm updates/s390x/RPMS/kernel-source-2.4.21-47.0.1.EL.s390x.rpm updates/s390x/RPMS/kernel-unsupported-2.4.21-47.0.1.EL.s390x.rpm -- Pasi Pirhonen - upi at iki.fi - http://pasi.pirhonen.eu/ Top-postings silently ignored -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: application/pgp-signature Size: 189 bytes Desc: Digital signature Url : http://lists.centos.org/pipermail/centos-announce/attachments/20061019/6a39edbe/attachment-0001.bin ------------------------------ Message: 4 Date: Fri, 20 Oct 2006 08:01:46 -0500 From: Johnny Hughes <johnny at centos.org> Subject: [CentOS-announce] CESA-2006:0720 Critical CentOS 4 i386 kdelibs - security update To: CentOS-Announce <centos-announce at centos.org> Message-ID: <1161349306.5006.489.camel at myth.home.local> Content-Type: text/plain; charset="us-ascii" CentOS Errata and Security Advisory 2006:0720 https://rhn.redhat.com/errata/RHSA-2006-0720.html The following updated files have been uploaded and are currently syncing to the mirrors: i386: kdelibs-3.3.1-6.RHEL4.i386.rpm kdelibs-devel-3.3.1-6.RHEL4.i386.rpm src: kdelibs-3.3.1-6.RHEL4.src.rpm -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: application/pgp-signature Size: 189 bytes Desc: This is a digitally signed message part Url : http://lists.centos.org/pipermail/centos-announce/attachments/20061020/8e4eacaf/attachment-0001.bin ------------------------------ Message: 5 Date: Fri, 20 Oct 2006 08:01:49 -0500 From: Johnny Hughes <johnny at centos.org> Subject: [CentOS-announce] CESA-2006:0720 Critical CentOS 4 x86_64 kdelibs - security update To: CentOS-Announce <centos-announce at centos.org> Message-ID: <1161349309.5006.490.camel at myth.home.local> Content-Type: text/plain; charset="us-ascii" CentOS Errata and Security Advisory 2006:0720 https://rhn.redhat.com/errata/RHSA-2006-0720.html The following updated files have been uploaded and are currently syncing to the mirrors: x86_64: kdelibs-3.3.1-6.RHEL4.i386.rpm kdelibs-3.3.1-6.RHEL4.x86_64.rpm kdelibs-devel-3.3.1-6.RHEL4.x86_64.rpm src: kdelibs-3.3.1-6.RHEL4.src.rpm -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: application/pgp-signature Size: 189 bytes Desc: This is a digitally signed message part Url : http://lists.centos.org/pipermail/centos-announce/attachments/20061020/8248aafc/attachment-0001.bin ------------------------------ _______________________________________________ CentOS-announce mailing list CentOS-announce at centos.org http://lists.centos.org/mailman/listinfo/centos-announce End of CentOS-announce Digest, Vol 20, Issue 8 **********************************************