Red Hat Security Advisory 2015-1890-01

Red Hat Security Advisory 2015-1890-01 – The Simple Protocol for Independent Computing Environments is a remote display protocol for virtual environments. SPICE users can access a virtualized desktop or server from the local system or any system with network access to the server. SPICE is used in Red Hat Enterprise Linux for viewing virtualized guests running on the Kernel-based Virtual Machine hypervisor or on Red Hat Enterprise Virtualization Hypervisors. A heap-based buffer overflow flaw was found in the way SPICE handled certain guest QXL commands related to surface creation. A user in a guest could use this flaw to read and write arbitrary memory locations on the host.

Red Hat Security Advisory 2015-1889-01

Red Hat Security Advisory 2015-1889-01 – The Simple Protocol for Independent Computing Environments is a remote display protocol for virtual environments. SPICE users can access a virtualized desktop or server from the local system or any system with network access to the server. SPICE is used in Red Hat Enterprise Linux for viewing virtualized guests running on the Kernel-based Virtual Machine hypervisor or on Red Hat Enterprise Virtualization Hypervisors. A heap-based buffer overflow flaw was found in the way SPICE handled certain guest QXL commands related to surface creation. A user in a guest could use this flaw to read and write arbitrary memory locations on the host.

Red Hat Security Advisory 2015-1888-01

Red Hat Security Advisory 2015-1888-01 – Red Hat JBoss SOA Platform is the next-generation ESB and business process automation infrastructure. Red Hat JBoss SOA Platform allows IT to leverage existing, modern, and future integration methodologies to dramatically improve business process execution speed and quality. It was found that the code which checked that the server hostname matches the domain name in a subject’s Common Name field in X.509 certificates was flawed. A man-in-the-middle attacker could use this flaw to spoof an SSL server using a specially crafted X.509 certificate.

CentOS Linux 7 for 32-bit x86 (i386) Architecture

We would like to announce the general availability of CentOS Linux 7 for
the 32-bit x86 (i386) architecture.

This is the first major release of the 32 bit x86 by the AltArch Special
Interest Group.  This release is based on the Source Code from the
CentOS 7 (1503) x86_64 architecture and includes all current updates
from the main CentOS 7 tree.


Installation
============

Install ISOs are available here:

http://mirror.centos.org/altarch/7/isos/i386/

sha256sums:

CentOS-7-i386-DVD-1503.iso:
8973b31b45878b2277c19465b0260aab4efb86126033ee0909fafa47ace5c3af

CentOS-7-i386-Everything-1503.iso:
1c016cd95aaa8fe9bc68376f388c03c704eacd3f303e7f37f026e6aed4f78b77

CentOS-7-i386-Minimal-1503.iso:
4b71900eda2e863234e2edee9b2c3753f83bc9a0912551d26f69ff1e202ca979

CentOS-7-i386-NetInstall-1503.iso:
cea236c94a26e62330acbbf8fe0e1aefa75f282fdbaab7f169213e8fb33d2cc4

The install process is identical to CentOS 7 x86_64 via kickstart or ISO
installers.


Known Issues
============

1.  If installing on a QEMU (kvm) i386 VM, you must modify the VM cpu to
use "copy host cpu"

http://bugs.centos.org/view.php?id=8748

2.  The gnome desktop will not exit or log out from the menu.

http://bugs.centos.org/view.php?id=8834


More Information
================

More information is available on the i386 AltArch page:

https://wiki.centos.org/SpecialInterestGroup/AltArch/i386

--
Johnny Hughes
CentOS Project { https://www.centos.org/ }
irc: hughesjr, #centos at irc.freenode.net