Displaying 20 results from an estimated 1100 matches similar to: "CESA-2014:1652 Important CentOS 6 openssl Security Update"
2014 Oct 17
0
CentOS-announce Digest, Vol 116, Issue 10
Send CentOS-announce mailing list submissions to
centos-announce at centos.org
To subscribe or unsubscribe via the World Wide Web, visit
http://lists.centos.org/mailman/listinfo/centos-announce
or, via email, send a message with subject or body 'help' to
centos-announce-request at centos.org
You can reach the person managing the list at
centos-announce-owner at centos.org
When
2014 Oct 16
1
POODLE on CentOS
The following updates address POODLE on CentOS:
CentOS-5:
http://lists.centos.org/pipermail/centos-announce/2014-October/020696.html
CentOS-6.5:
http://lists.centos.org/pipermail/centos-announce/2014-October/020697.html
CentOS-7:
http://lists.centos.org/pipermail/centos-announce/2014-October/020695.html
Please note that the CentOS-6.5 updates are built from:
openssl-1.0.1e-30.el6_5.2.src.rpm
2014 Feb 04
1
CESA-2014:0127 Moderate CentOS 6 librsvg2 Update
CentOS Errata and Security Advisory 2014:0127 Moderate
Upstream details at : https://rhn.redhat.com/errata/RHSA-2014-0127.html
The following updated files have been uploaded and are currently
syncing to the mirrors: ( sha256sum Filename )
i386:
7f582307cabadd730387b49d93e454ab8e9007a98c991210ed3b86f67b9f29f9 librsvg2-2.26.0-6.el6_5.2.i686.rpm
2014 Feb 04
1
CESA-2014:0127 Moderate CentOS 6 librsvg2 Update
CentOS Errata and Security Advisory 2014:0127 Moderate
Upstream details at : https://rhn.redhat.com/errata/RHSA-2014-0127.html
The following updated files have been uploaded and are currently
syncing to the mirrors: ( sha256sum Filename )
i386:
7f582307cabadd730387b49d93e454ab8e9007a98c991210ed3b86f67b9f29f9 librsvg2-2.26.0-6.el6_5.2.i686.rpm
2014 Jun 06
0
CentOS-announce Digest, Vol 112, Issue 3
Send CentOS-announce mailing list submissions to
centos-announce at centos.org
To subscribe or unsubscribe via the World Wide Web, visit
http://lists.centos.org/mailman/listinfo/centos-announce
or, via email, send a message with subject or body 'help' to
centos-announce-request at centos.org
You can reach the person managing the list at
centos-announce-owner at centos.org
When
2014 Feb 04
2
librsvg2 update problem - nautilus segfault
after morning update of librsvg2
Feb 04 09:39:15 Updated: librsvg2-2.26.0-6.el6_5.2.x86_64
nautilus crashed with
nautilus[3419]: segfault at 21 ip 00007f68b2d2733c sp 00007fffe2ce04f0
error 4 in librsvg-2.so.2.26.0[7f68b2d01000+37000]
temporary solution
yum downgrade librsvg2
-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type:
2014 Sep 30
1
CESA-2014:1326 Moderate CentOS 6 php Security Update
CentOS Errata and Security Advisory 2014:1326 Moderate
Upstream details at : https://rhn.redhat.com/errata/RHSA-2014-1326.html
The following updated files have been uploaded and are currently
syncing to the mirrors: ( sha256sum Filename )
i386:
713dbbfa6b5bbe8b9dc74de079be9065e8cd1d9d0b1e0c2acc2853a7eb591a7b php-5.3.3-27.el6_5.2.i686.rpm
2014 Sep 30
1
CESA-2014:1326 Moderate CentOS 6 php Security Update
CentOS Errata and Security Advisory 2014:1326 Moderate
Upstream details at : https://rhn.redhat.com/errata/RHSA-2014-1326.html
The following updated files have been uploaded and are currently
syncing to the mirrors: ( sha256sum Filename )
i386:
713dbbfa6b5bbe8b9dc74de079be9065e8cd1d9d0b1e0c2acc2853a7eb591a7b php-5.3.3-27.el6_5.2.i686.rpm
2014 Oct 09
2
Bash still vulnerable
According to the vulnerability test script from shellshocker.net, the latest
bash versions on CentOS5 and CentOS6, 3.2-33.el5_11.4 and 4.1.2-15.el6_5.2,
resp., are still vulnerable to CVE-2014-6277. In fact, on CentOS6, abrtd will
send you a nice report about it. Does anyone know if upstream is working on a
fix?
[root at host ~]# bash ~/shellshock_test.sh
CVE-2014-6271 (original shellshock):
2013 Dec 14
0
CEBA-2013:1836 CentOS 6 mesa Update
CentOS Errata and Bugfix Advisory 2013:1836
Upstream details at : https://rhn.redhat.com/errata/RHBA-2013-1836.html
The following updated files have been uploaded and are currently
syncing to the mirrors: ( sha256sum Filename )
i386:
d390b1f7d615553c9275ced0f7706d1a914a6d5b1a4ee1d51947a1376981ad07 glx-utils-9.2-0.5.el6_5.2.i686.rpm
2013 Dec 14
0
CentOS-announce Digest, Vol 106, Issue 9
Send CentOS-announce mailing list submissions to
centos-announce at centos.org
To subscribe or unsubscribe via the World Wide Web, visit
http://lists.centos.org/mailman/listinfo/centos-announce
or, via email, send a message with subject or body 'help' to
centos-announce-request at centos.org
You can reach the person managing the list at
centos-announce-owner at centos.org
When
2014 Jan 16
0
CEEA-2014:0031 CentOS 6 pacemaker Update
CentOS Errata and Enhancement Advisory 2014:0031
Upstream details at : https://rhn.redhat.com/errata/RHEA-2014-0031.html
The following updated files have been uploaded and are currently
syncing to the mirrors: ( sha256sum Filename )
i386:
1f46e89510adc8ca8a2d7fb7f048459aae28b093288704ae52456eb1a818ff0a pacemaker-1.1.10-14.el6_5.2.i686.rpm
2014 May 27
0
CEBA-2014:0543 CentOS 6 glibc Update
CentOS Errata and Bugfix Advisory 2014:0543
Upstream details at : https://rhn.redhat.com/errata/RHBA-2014-0543.html
The following updated files have been uploaded and are currently
syncing to the mirrors: ( sha256sum Filename )
i386:
646353d24e7b98a82728147d03501703a922b1c4aa3e10e1ec2a80612a997895 glibc-2.12-1.132.el6_5.2.i686.rpm
2014 Oct 19
3
Dovecote 1.2.17 poodle
Hi, how do I protect dovecot 1.2.17 against poodle?
Br
/Marc
-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 842 bytes
Desc: Message signed with OpenPGP using GPGMail
URL: <http://dovecot.org/pipermail/dovecot/attachments/20141019/b4152487/attachment-0001.sig>
2015 Jul 08
2
Samba 4 - disabling SSLv3 to mitigate POODLE effects
Thanks Kelvin
I'm a bit confised tho, is this patch already avaiable? if yes, what is the
parameter that disable ssl into the smb.conf? Maybe the guys from
Enterprise samba have already included the patch into their releases so
it's just a maatter of enabling the flag.
I'm using sernet-samba-4.2.2
Thanks!
2014 Aug 26
0
CEBA-2014:1099 CentOS 6 net-snmp Update
CentOS Errata and Bugfix Advisory 2014:1099
Upstream details at : https://rhn.redhat.com/errata/RHBA-2014-1099.html
The following updated files have been uploaded and are currently
syncing to the mirrors: ( sha256sum Filename )
i386:
a4f6c5c76eed2de244cb73747f0547b8626fd097b0ad1047fabbf5b9d4979d05 net-snmp-5.5-49.el6_5.2.i686.rpm
2015 Jul 08
2
Samba 4 - disabling SSLv3 to mitigate POODLE effects
Good Day All
Sorry if this is a repeated email, but I need some information about how to
disable SSL on a Samba4.2.2 AD domain controller as the nessus scanner is
reporting the POODLE vulnerability and we are not allowed to have any of
that in our environment.
the nessus scan reports poodle vulnerability on all these ports:
443, 636, 3269
I had a look at previous posts but couldn't find a
2014 Jan 21
0
CentOS-announce Digest, Vol 107, Issue 10
Send CentOS-announce mailing list submissions to
centos-announce at centos.org
To subscribe or unsubscribe via the World Wide Web, visit
http://lists.centos.org/mailman/listinfo/centos-announce
or, via email, send a message with subject or body 'help' to
centos-announce-request at centos.org
You can reach the person managing the list at
centos-announce-owner at centos.org
When
2014 Aug 06
0
CEBA-2014:1016 CentOS 6 cups Update
CentOS Errata and Bugfix Advisory 2014:1016
Upstream details at : https://rhn.redhat.com/errata/RHBA-2014-1016.html
The following updated files have been uploaded and are currently
syncing to the mirrors: ( sha256sum Filename )
i386:
fecb1d7188cc96c840f41c86661286a94cbf2be8251088488e2059680ff13aec cups-1.4.2-52.el6_5.2.i686.rpm
2013 Dec 18
0
CEBA-2013:1856 CentOS 6 libvirt Update
CentOS Errata and Bugfix Advisory 2013:1856
Upstream details at : https://rhn.redhat.com/errata/RHBA-2013-1856.html
The following updated files have been uploaded and are currently
syncing to the mirrors: ( sha256sum Filename )
i386:
488920f329f234c27ec7e3865c3aedc5370d3dd5ba37944b6bb545fcfb6fdde1 libvirt-0.10.2-29.el6_5.2.i686.rpm