search for: 0204

Displaying 20 results from an estimated 64 matches for "0204".

Did you mean: 0200
2006 Mar 08
0
CentOS-announce Digest, Vol 13, Issue 3
...p' to centos-announce-request at centos.org You can reach the person managing the list at centos-announce-owner at centos.org When replying, please edit your Subject line so it is more specific than "Re: Contents of CentOS-announce digest..." Today's Topics: 1. CESA-2006:0204 Moderate CentOS 3 i386 mailman - security update (Tru Huynh) 2. CESA-2006:0204 Moderate CentOS 3 x86_64 mailman - security update (Tru Huynh) 3. CESA-2006:0204 Moderate CentOS 3 ia64 mailman - security update (Pasi Pirhonen) 4. CESA-2006:0204 Moderate CentOS 3 s390(x) mai...
2015 Mar 04
2
New FREAK SSL Attack CVE-2015-0204
Hello, about the CVE-2015-0204, in apache the following config seems to disable this vulnerability: SSLProtocol All -SSLv2 -SSLv3 SSLCipherSuite HIGH:MEDIUM:!aNULL:!eNULL:!EXPORT:!CAMELLIA:!DES:!MD5:!PSK:!RC4 Is something similar possible with dovecot ? If yes, what are the implications with old mail clients ? -- Best r...
2016 Feb 17
0
CESA-2016:0204 Important CentOS 7 389-ds-base Security Update
CentOS Errata and Security Advisory 2016:0204 Important Upstream details at : https://rhn.redhat.com/errata/RHSA-2016-0204.html The following updated files have been uploaded and are currently syncing to the mirrors: ( sha256sum Filename ) x86_64: e9a4261b4a290e15b6d6ebb8ae88bd94cf64d9c232121db8c460415e637b15d1 389-ds-base-1.3.4.0-26.el7...
2006 Mar 07
0
CESA-2006:0204 Moderate CentOS 3 i386 mailman - security update
CentOS Errata and Security Advisory CESA-2006:0204 mailman security update for CentOS 3 i386: https://rhn.redhat.com/errata/RHSA-2006-0204.html The following updated file has been uploaded and is currently syncing to the mirrors: i386: updates/i386/RPMS/mailman-2.1.5.1-25.rhel3.4.i386.rpm source: updates/SRPMS/mailman-2.1.5.1-25.rhel3.4.src.rpm...
2006 Mar 07
0
CESA-2006:0204 Moderate CentOS 3 x86_64 mailman - security update
CentOS Errata and Security Advisory CESA-2006:0204 mailman security update for CentOS 3 x86_64: https://rhn.redhat.com/errata/RHSA-2006-0204.html The following updated file has been uploaded and is currently syncing to the mirrors: x86_64: updates/x86_64/RPMS/mailman-2.1.5.1-25.rhel3.4.x86_64.rpm source: updates/SRPMS/mailman-2.1.5.1-25.rhel3.4...
2006 Mar 07
0
CESA-2006:0204 Moderate CentOS 3 ia64 mailman - security update
CentOS Errata and Security Advisory 2006:0204 https://rhn.redhat.com/errata/RHSA-2006-0204.html The following updated files have been uploaded and are currently syncing to the mirrors: files: updates/ia64/RPMS/mailman-2.1.5.1-25.rhel3.4.ia64.rpm -- Pasi Pirhonen - upi at iki.fi - http://iki.fi/upi/ -------------- next part --------------...
2006 Mar 07
0
CESA-2006:0204 Moderate CentOS 3 s390(x) mailman - security update
CentOS Errata and Security Advisory 2006:0204 https://rhn.redhat.com/errata/RHSA-2006-0204.html The following updated files have been uploaded and are currently syncing to the mirrors: s390: updates/s390/RPMS/mailman-2.1.5.1-25.rhel3.4.s390.rpm s390x: updates/s390x/RPMS/mailman-2.1.5.1-25.rhel3.4.s390x.rpm -- Pasi Pirhonen - upi at iki....
2006 Mar 08
0
CESA-2006:0204 Moderate CentOS 4 ia64 mailman - security update
CentOS Errata and Security Advisory 2006:0204 https://rhn.redhat.com/errata/RHSA-2006-0204.html The following updated files have been uploaded and are currently syncing to the mirrors: files: updates/ia64/RPMS/mailman-2.1.5.1-34.rhel4.2.ia64.rpm -- Pasi Pirhonen - upi at iki.fi - http://iki.fi/upi/ -------------- next part --------------...
2006 Mar 08
0
CESA-2006:0204 Moderate CentOS 4 s390(x) mailman - security update
CentOS Errata and Security Advisory 2006:0204 https://rhn.redhat.com/errata/RHSA-2006-0204.html The following updated files have been uploaded and are currently syncing to the mirrors: s390: updates/s390/RPMS/mailman-2.1.5.1-34.rhel4.2.s390.rpm s390x: updates/s390x/RPMS/mailman-2.1.5.1-34.rhel4.2.s390x.rpm -- Pasi Pirhonen - upi at iki....
2006 Mar 08
0
CESA-2006:0204 Moderate CentOS 4 axp mailman - security update
CentOS Errata and Security Advisory 2006:0204 https://rhn.redhat.com/errata/RHSA-2006-0204.html The following updated files have been uploaded and are currently syncing to the mirrors: files: updates/alpha/RPMS/mailman-2.1.5.1-34.rhel4.2.alpha.rpm -- Pasi Pirhonen - upi at iki.fi - http://iki.fi/upi/ -------------- next part ------------...
2006 Mar 10
0
CESA-2006:0204 Moderate CentOS 4 i386 mailman - security update
CentOS Errata and Security Advisory 2006:0204 https://rhn.redhat.com/errata/RHSA-2006-0204.html The following updated files have been uploaded and are currently syncing to the mirrors: i386: mailman-2.1.5.1-34.rhel4.2.i386.rpm src: mailman-2.1.5.1-34.rhel4.2.src.rpm -------------- next part -------------- A non-text attachment was scrubbed...
2006 Mar 13
0
CESA-2006:0204 Moderate CentOS 4 x86_64 mailman - security update
CentOS Errata and Security Advisory 2006:0204 https://rhn.redhat.com/errata/RHSA-2006-0204.html The following updated files have been uploaded and are currently syncing to the mirrors: x86_64: mailman-2.1.5.1-34.rhel4.2.x86_64.rpm src: mailman-2.1.5.1-34.rhel4.2.src.rpm -------------- next part -------------- A non-text attachment was scru...
2015 Mar 04
0
New FREAK SSL Attack CVE-2015-0204
On Wed, Mar 04, 2015 at 06:13:31PM +0200, Adrian Minta wrote: > Hello, > about the CVE-2015-0204, in apache the following config seems to disable > this vulnerability: > SSLProtocol All -SSLv2 -SSLv3 > SSLCipherSuite > HIGH:MEDIUM:!aNULL:!eNULL:!EXPORT:!CAMELLIA:!DES:!MD5:!PSK:!RC4 > > Is something similar possible with dovecot ? I use this with some succes: # dovecot ha...
2016 Aug 02
0
[PATCH 0204/1285] Replace numeric parameter like 0444 with macro
I find that the developers often just specified the numeric value when calling a macro which is defined with a parameter for access permission. As we know, these numeric value for access permission have had the corresponding macro, and that using macro can improve the robustness and readability of the code, thus, I suggest replacing the numeric parameter with the macro. Signed-off-by: Chuansheng
2015 Mar 04
0
New FREAK SSL Attack CVE-2015-0204
On Wed, Mar 04, 2015 at 06:36:07PM +0200, Adrian Minta wrote: > Thank you for the answer. > The "!EXPORT" part is included in "ECDH at STRENGTH:DH at STRENGTH:HIGH", or it > must be added as well ? This is not the cipher list I sent. It was: ECDH at STRENGTH:DH at STRENGTH:HIGH:!RC4:!MD5:!DES:!aNULL:!eNUL Mine does not contain any export cipher, yours does. You can
2015 Mar 04
2
New FREAK SSL Attack CVE-2015-0204
On 04.03.2015 18:19, Emmanuel Dreyfus wrote: > On Wed, Mar 04, 2015 at 06:13:31PM +0200, Adrian Minta wrote: >> Hello, >> about the CVE-2015-0204, in apache the following config seems to disable >> this vulnerability: >> SSLProtocol All -SSLv2 -SSLv3 >> SSLCipherSuite >> HIGH:MEDIUM:!aNULL:!eNULL:!EXPORT:!CAMELLIA:!DES:!MD5:!PSK:!RC4 >> >> Is something similar possible with dovecot ? > I use this wi...
2010 Apr 28
2
BN8S0, dahdi, wcb4xxp
...ried to install zaptel for my Beronet BN8S0 pci card... I gave up and took hfcmulti/lcr. Now dahdi (2.2.1.1) seems to support the card and I'm very interested to get it to work. But how to get rid of these annoying qozap driver? bishop dahdi # lspci -v -nn -s 01:00.0 01:00.0 ISDN controller [0204]: Cologne Chip Designs GmbH ISDN network Controller [HFC-8S] [1397:16b8] (rev 01) Subsystem: Cologne Chip Designs GmbH Device [1397:b562] Flags: medium devsel, IRQ 21 I/O ports at 9480 [size=8] Memory at fb9bb000 (32-bit, non-prefetchable) [size=4K] Capabili...
2005 Apr 22
4
I have a problem similar to FAQ 2 scenario, but reply packets don''t seem to be recognized.
...timestamp 3624012786 0,nop,wscale 2> 0x0000: 0000 f4c3 9dac 0011 43fd 4dca 0800 4500 ........C.M...E. 0x0010: 003c b5b8 4000 4006 a906 c0a8 0096 4128 .<..@.@.......A( 0x0020: d996 89a6 01bb 1511 be4a 0000 0000 a002 .........J...... 0x0030: 16d0 1286 0000 0204 05b4 0402 080a d802 ................ 0x0040: 0bf2 0000 0000 0103 0302 .......... 09:07:03.607781 00:0f:b5:42:7f:aa > 00:02:3b:02:78:06, ethertype IPv4 (0x0800), length 78: IP (tos 0x0, ttl 127, id 59957, offset 0, flags [DF], length: 64) 65.40.217.150.443 > 192.168.0...
2016 May 12
2
Openssl vulnerability
...ith openssl version openssl-1.0.1e-51.el7_2.4.x86_64, I have received a set of vulnerability from security team, can anyone tell me as per below CVE do I need to update my openssl version to 1.0.1t? Or the current version which we have is safe. CVE-2016-0701, CVE-2015-3197 CVE-2015-4000 CVE-2015-0204 CVE-2015-0286, CVE-2015-0287, CVE-2015-0289, CVE-2015-0293, CVE-2015-0209, CVE-2015-0288 CVE-2015-0292, CVE-2014-8176 Thanks Aswathi ________________________________ This message is for the designated recipient only and may contain privileged, proprietary, or otherwise confidential informatio...
2011 Mar 11
1
[Bug 704] Issue with "iptables -A OUTPUT -m string"
....com.http: S 651414485:651414485(0) win 5840 <mss 1460,sackOK,timestamp 10144916 0,nop,wscale 7> 0x0000: 4500 003c 0741 4000 4006 d8c5 0a38 0635 E..<.A at .@....8.5 0x0010: 481e 022b c091 0050 26d3 cbd5 0000 0000 H..+...P&....... 0x0020: a002 16d0 55c1 0000 0204 05b4 0402 080a ....U........... 0x0030: 009a cc94 0000 0000 0103 0307 ............ 18:50:02.413851 IP ir1.fp.vip.sk1.yahoo.com.http > tst-sniffer.qualcomm.com.49297: S 152029863:152029863(0) ack 651414486 win 5840 <mss 1460,nop,nop,sackOK,nop,wscale 2> 0x0000:...