Zabbix 3.4.0rc1 released

The following information has been provided by the zabbix announce mailing list.
Greetings!

Zabbix Team is pleased to announce the availability of Zabbix 3.4.0rc1, first release candidate of Zabbix 3.4.

Complete Release Notes: https://www.zabbix.com/rn3.4.0rc1

Download: https://www.zabbix.com/download

Kind regards,
Alexei Vladishev,
Zabbix Product Manager, CEO

——————————————————————————
Check out the vibrant tech community on one of the world’s most
engaging tech sites, Slashdot.org! http://sdm.link/slashdot
_______________________________________________
Zabbix-announce mailing list
Zabbix-announce@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/zabbix-announce

CESA-2017:2478 Critical CentOS 6 httpd Security Update

The following information has been provided by the CENTOS announce mailing list.

CentOS Errata and Security Advisory 2017:2478 Critical

Upstream details at : https://access.redhat.com/errata/RHSA-2017:2478

The following updated files have been uploaded and are currently
syncing to the mirrors: ( sha256sum Filename )

i386:
68b712bfb3b1a08748f4bdac924dc30fa5683977333c9ff052a525d2e9347259  httpd-2.2.15-60.el6.centos.5.i686.rpm
aeff46346d66dcb687524a05882f21b6c7596f433859c2a443354af33bc3deed  httpd-devel-2.2.15-60.el6.centos.5.i686.rpm
ae7886ff13fef00ae7272ccced1ec6e3d4cdd0db02a3e9ba37a37d7b7548d087  httpd-manual-2.2.15-60.el6.centos.5.noarch.rpm
30d1a73a78e580d5314b7140799e23af42c0023560c863ceab681eae175e815b  httpd-tools-2.2.15-60.el6.centos.5.i686.rpm
c6ee5b709d021faaa9abd61f8316948ed2043ce53d935b9063285bf3d41994f8  mod_ssl-2.2.15-60.el6.centos.5.i686.rpm

x86_64:
6c4577f55b8b3f40a1223be39a61ee1185ce7b9a0588ef4ad60fbf45d5e431e7  httpd-2.2.15-60.el6.centos.5.x86_64.rpm
aeff46346d66dcb687524a05882f21b6c7596f433859c2a443354af33bc3deed  httpd-devel-2.2.15-60.el6.centos.5.i686.rpm
4c9cc089ac1d30b9b50bd1ff2a2a3eaf0c09cc969b0b543f6a7d9ffd01f5cf4f  httpd-devel-2.2.15-60.el6.centos.5.x86_64.rpm
ae7886ff13fef00ae7272ccced1ec6e3d4cdd0db02a3e9ba37a37d7b7548d087  httpd-manual-2.2.15-60.el6.centos.5.noarch.rpm
5cc5dfdd78d76f2c020cfab998363aa8345cdc477d48af3a1c1cd48dd364098f  httpd-tools-2.2.15-60.el6.centos.5.x86_64.rpm
b2f9c90fc09cb85894f20ead9cbf4405cf92ac1748860aa280e7af96c21e17fb  mod_ssl-2.2.15-60.el6.centos.5.x86_64.rpm

Source:
ee426ab362997f52fcfd19d7e5610359d47a3a5439cbba2ecff7455c35bd9b85  httpd-2.2.15-60.el6.centos.5.src.rpm

CESA-2017:2424 Critical CentOS 6 java-1.7.0-openjdk Security Update

The following information has been provided by the CENTOS announce mailing list.

CentOS Errata and Security Advisory 2017:2424 Critical

Upstream details at : https://access.redhat.com/errata/RHSA-2017:2424

The following updated files have been uploaded and are currently
syncing to the mirrors: ( sha256sum Filename )

i386:
53a24f4fed4dffa5d60f5f6f5aae09cae0d5aa675aae5c89bc89568f150c375b  java-1.7.0-openjdk-1.7.0.151-2.6.11.0.el6_9.i686.rpm
87ed44696e8f5d9f3a409e48e8e45c9963ee8bd5d66d85432f99fde5fe700fc6  java-1.7.0-openjdk-demo-1.7.0.151-2.6.11.0.el6_9.i686.rpm
a22a1605fd7fd61c1edff42b837d048263c9ed3d62ddc6cb057df9db9b8488d3  java-1.7.0-openjdk-devel-1.7.0.151-2.6.11.0.el6_9.i686.rpm
ab1fa5c00fc66e895c699909ba6f7a033359a2cb6c853b45db77bac414f83faa  java-1.7.0-openjdk-javadoc-1.7.0.151-2.6.11.0.el6_9.noarch.rpm
ddc41007c6b80e937826f9b08adb8529537e45224b7d9c77e88a5137333dec08  java-1.7.0-openjdk-src-1.7.0.151-2.6.11.0.el6_9.i686.rpm

x86_64:
bd3d2e33f5f05c97acdb4463ee838e1ac990de77704401a13cbee82d6359c93b  java-1.7.0-openjdk-1.7.0.151-2.6.11.0.el6_9.x86_64.rpm
077188b99553fa5323ce61ae133048b4a3fbf12bb6feeb494734af627cf5fb62  java-1.7.0-openjdk-demo-1.7.0.151-2.6.11.0.el6_9.x86_64.rpm
aa5efd1300c3240590bf4ecaaf00040eb1a3ae3674279de2c768c734921eef85  java-1.7.0-openjdk-devel-1.7.0.151-2.6.11.0.el6_9.x86_64.rpm
ab1fa5c00fc66e895c699909ba6f7a033359a2cb6c853b45db77bac414f83faa  java-1.7.0-openjdk-javadoc-1.7.0.151-2.6.11.0.el6_9.noarch.rpm
51f85429d7fb4aebb500b6ba73e717f7dbc6597191db9dd8c0b108d9f1e7aac4  java-1.7.0-openjdk-src-1.7.0.151-2.6.11.0.el6_9.x86_64.rpm

Source:
f7fea14d8c97e7251cb3129c2c0bc23485ed534d36f80a9e1feb6d301abbe207  java-1.7.0-openjdk-1.7.0.151-2.6.11.0.el6_9.src.rpm

CESA-2017:2456 Critical CentOS 6 firefox Security Update

The following information has been provided by the CENTOS announce mailing list.

CentOS Errata and Security Advisory 2017:2456 Critical

Upstream details at : https://access.redhat.com/errata/RHSA-2017:2456

The following updated files have been uploaded and are currently
syncing to the mirrors: ( sha256sum Filename )

i386:
f29636840b84fd6d5a4a102d02a19c569a3c8e5bb122fffab931a57fdaf87ae8  firefox-52.3.0-3.el6.centos.i686.rpm

x86_64:
f29636840b84fd6d5a4a102d02a19c569a3c8e5bb122fffab931a57fdaf87ae8  firefox-52.3.0-3.el6.centos.i686.rpm
fa94722eb61a41e0c0c12c31dab803aeb3387e9ba83ad52a305dc1880d5764b8  firefox-52.3.0-3.el6.centos.x86_64.rpm

Source:
85eb85c49ccac809e5eb899b3680735e5ba1521c378866ccfa98982462801152  firefox-52.3.0-3.el6.centos.src.rpm

Dovecot v2.2.32 release candidate released

The following information has been provided by the Dovecot-news mailing list.

https://dovecot.org/releases/2.2/rc/dovecot-2.2.32.rc1.tar.gz
https://dovecot.org/releases/2.2/rc/dovecot-2.2.32.rc1.tar.gz.sig

There are various changes in this release that can be used to significantly reduce disk IO with:
1) NFS storage especially, but I guess also other remote filesystems and even some with local disks

Continue reading “Dovecot v2.2.32 release candidate released”

New CentOS Atomic Release and Kubernetes System Containers Now Available

The following information has been provided by the CENTOS announce mailing list.

Last week, the CentOS Atomic SIG released an updated version
(https://wiki.centos.org/SpecialInterestGroup/Atomic/Download) of
CentOS Atomic Host (7.1707), a lean operating system designed to run
Docker containers, built from standard CentOS 7 RPMs, and tracking the
component versions included in Red Hat Enterprise Linux Atomic Host.
Continue reading “New CentOS Atomic Release and Kubernetes System Containers Now Available”

NEW VMSA-2017-0014 VMware NSX-V Edge updates address OSPF Protocol LSA DoS

The following information has been provided by the vmware security announce mailing list.
—–BEGIN PGP SIGNED MESSAGE—–
Hash: SHA256
– ———————————————————————–
                           VMware Security Advisory
Advisory ID: VMSA-2017-0014
Severity:    Important
Synopsis:    VMware NSX-V Edge updates address OSPF Protocol LSA DoS
Issue date:  2017-08-10
Updated on:  2017-08-10 (Initial Advisory)
CVE number:  CVE-2017-4920

Continue reading “NEW VMSA-2017-0014 VMware NSX-V Edge updates address OSPF Protocol LSA DoS”

FreeBSD Security Advisory FreeBSD-SA-17:06.openssh

The following information has been provided by the FREEBSD SECURITY mailing list.

=============================================================================
FreeBSD-SA-17:06.openssh                                    Security Advisory
The FreeBSD Project

Topic:          OpenSSH Denial of Service vulnerability

Category:       contrib
Module:         OpenSSH
Announced:      2017-08-10
Affects:        All supported versions of FreeBSD.
Corrected:      2017-08-10 06:36:37 UTC (stable/11, 11.1-STABLE)
2017-08-10 06:59:07 UTC (releng/11.1, 11.1-RELEASE-p1)
2017-08-10 06:59:26 UTC (releng/11.0, 11.0-RELEASE-p12)
2017-08-10 06:36:37 UTC (stable/10, 10.3-STABLE)
2017-08-10 06:59:43 UTC (releng/10.3, 10.3-RELEASE-p21)
CVE Name:       CVE-2016-6515

For general information regarding FreeBSD Security Advisories,
including descriptions of the fields above, security branches, and the
following sections, please visit <URL:https://security.FreeBSD.org/>.
Continue reading “FreeBSD Security Advisory FreeBSD-SA-17:06.openssh”

Puppet Enterprise 2016.4.7 and 2017.2.3 are now available!

The following information has been provided by the puppet announce mailing list.
Dear Puppet Enterprise Users,
Puppet Enterprise 2016.4.7 and 2017.2.3 are now available.
These are security and bugfix releases of Puppet Enterprise. All users of Puppet Enterprise 2016.4.x and 2017.2.x are encouraged to upgrade when possible to Puppet Enterprise 2016.4.7 and 2017.2.3, respectively.
These releases include fixes to address security vulnerabilities in Java and nginx, as well as a number of other bugfixes and improvements.
As a current Puppet Enterprise user, you can upgrade to this new version as part of your annual subscription. If upgrading, it is required to upgrade your master, puppetdb, and console servers first.
As always, we want to hear about your experiences with Puppet Enterprise. If you have any questions about upgrading, be sure to get in touch with Puppet Support.

MariaDB 10.0.32 and new Connector ODBC and Connector J releases available

The following information has been provided by the mariadb announce mailing list.

The MariaDB project is pleased to announce the availability
of MariaDB 10.0.32 as well as MariaDB Connector/ODBC 3.0.1 (beta),
MariaDB Connector/J 2.1.0 and MariaDB Connector/J 1.6.3

See the Release Notes and Changelogs for details.

Continue reading “MariaDB 10.0.32 and new Connector ODBC and Connector J releases available”

SUSE-SU-2017:2074-1: important: Security update for the Linux Kernel

The following information has been provided by the opensuse security announce mailing list.

SUSE Security Update: Security update for the Linux Kernel
______________________________________________________________________________

Announcement ID:    SUSE-SU-2017:2074-1
Rating:             important
References:         #1049483
Cross-References:   CVE-2017-7533
Affected Products:
SUSE Linux Enterprise Server for SAP 12
SUSE Linux Enterprise Server 12-LTSS
SUSE Linux Enterprise Module for Public Cloud 12
______________________________________________________________________________
Continue reading “SUSE-SU-2017:2074-1: important: Security update for the Linux Kernel”

SUSE-SU-2017:2072-1: important: Security update for Linux Kernel Live Patch 10 for SLE 12 SP1

The following information has been provided by the opensuse security announce mailing list.

SUSE Security Update: Security update for Linux Kernel Live Patch 10 for SLE 12 SP1
______________________________________________________________________________

Announcement ID:    SUSE-SU-2017:2072-1
Rating:             important
References:         #1027575 #1038564 #1042892 #1046191 #1050751

Cross-References:   CVE-2017-2636 CVE-2017-7533 CVE-2017-7645
CVE-2017-8890 CVE-2017-9242
Affected Products:
SUSE Linux Enterprise Server for SAP 12-SP1
SUSE Linux Enterprise Server 12-SP1-LTSS
______________________________________________________________________________
Continue reading “SUSE-SU-2017:2072-1: important: Security update for Linux Kernel Live Patch 10 for SLE 12 SP1”

SUSE-SU-2017:2070-1: important: Security update for Linux Kernel Live Patch 6 for SLE 12 SP2

The following information has been provided by the opensuse security announce mailing list.

SUSE Security Update: Security update for Linux Kernel Live Patch 6 for SLE 12 SP2
______________________________________________________________________________

Announcement ID:    SUSE-SU-2017:2070-1
Rating:             important
References:         #1038564 #1042364 #1042892 #1046191 #1046202
#1046206 #1050751
Cross-References:   CVE-2017-7533 CVE-2017-7645 CVE-2017-8797
CVE-2017-8890 CVE-2017-9077 CVE-2017-9242

Affected Products:
SUSE Linux Enterprise Live Patching 12
______________________________________________________________________________
Continue reading “SUSE-SU-2017:2070-1: important: Security update for Linux Kernel Live Patch 6 for SLE 12 SP2”