search for: 5715

Displaying 20 results from an estimated 53 matches for "5715".

Did you mean: 571
2011 Feb 22
1
ANNOUNCE: Puppet 2.6.5 - Release Candidate 5 available!
...758) Verify that report events are correctly created de85f8d Prep work for #5758: set audited=true on all audit events e162da9 Prep work for #5758: clean up initializer for Puppet::Transaction::Event 06a8d1e Fix #5698 puppet inspect shouldn''t report of attributes of deleted files 1f72c31 (#5715) Added attributes resource_type and title to Puppet::Resource::Status. a6cd736 (#5715) Removed attribute source_description from the YAML representation of Puppet::Resource::Status. 98db2da (#5715) Removed unnecessary attributes from YAML of Puppet::Transaction::Event. bd4a8a1 (#5715) Make certain...
2011 Feb 04
1
ANNOUNCE: Puppet 2.6.5 - Release Candidate 1 available!
...758) Verify that report events are correctly created de85f8d Prep work for #5758: set audited=true on all audit events e162da9 Prep work for #5758: clean up initializer for Puppet::Transaction::Event 06a8d1e Fix #5698 puppet inspect shouldn''t report of attributes of deleted files 1f72c31 (#5715) Added attributes resource_type and title to Puppet::Resource::Status. a6cd736 (#5715) Removed attribute source_description from the YAML representation of Puppet::Resource::Status. 98db2da (#5715) Removed unnecessary attributes from YAML of Puppet::Transaction::Event. bd4a8a1 (#5715) Make certain...
2011 Feb 04
2
Fwd: [Puppet-dev] ANNOUNCE: Puppet 2.6.5 - Release Candidate 1 available!
...758) Verify that report events are correctly created de85f8d Prep work for #5758: set audited=true on all audit events e162da9 Prep work for #5758: clean up initializer for Puppet::Transaction::Event 06a8d1e Fix #5698 puppet inspect shouldn''t report of attributes of deleted files 1f72c31 (#5715) Added attributes resource_type and title to Puppet::Resource::Status. a6cd736 (#5715) Removed attribute source_description from the YAML representation of Puppet::Resource::Status. 98db2da (#5715) Removed unnecessary attributes from YAML of Puppet::Transaction::Event. bd4a8a1 (#5715) Make certain...
2018 Jan 04
1
[CVE-2017-5715] qemu-kvm-ev-2.9.0-16.el7_4.13.1 is now available for testing
...g it for release in a few hours. Here's the changelog: * Thu Jan 04 2018 Sandro Bonazzola <sbonazzo at redhat.com> - ev-2.9.0-16.el7_4.13.1 - Removing RH branding from package name * Thu Dec 14 2017 Miroslav Rezanina <mrezanin at redhat.com> - rhev-2.9.0-16.el7_4.13 - Fix CVE-2017-5715 * Thu Nov 16 2017 Miroslav Rezanina <mrezanin at redhat.com> - rhev-2.9.0-16.el7_4.12 - kvm-util-async-use-atomic_mb_set-in-qemu_bh_cancel.patch [bz#1513362] - Resolves: bz#1513362 (QEMU's AIO subsystem gets stuck inhibiting all I/O operations on virtio-blk-pci devices [rhel-7.4.z]) --...
2006 Oct 31
0
6398779 Need to reduce address limits for devices downstream of a BCM 5708/5714/5715 bridge
Author: cjj Repository: /hg/zfs-crypto/gate Revision: a58472277959c34c37827af84da191ceba990899 Log message: 6398779 Need to reduce address limits for devices downstream of a BCM 5708/5714/5715 bridge Files: create: usr/src/uts/sparc/pxb_bcm/Makefile update: usr/src/cmd/pcidr/etc/SUNW,EC_dr,ESC_dr_req,sysevent.conf update: usr/src/pkgdefs/SUNWckr/prototype_sparc update: usr/src/uts/sparc/Makefile.sparc.shared update: usr/src/uts/sparc/os/driver_aliases update: usr/src/uts/sparc/os/...
2018 Jan 04
1
CVE-2017-5715, CVE-2017-5753 and CVE-2017-5754
On Jan 4, 2018, at 12:18 PM, Walter H. <walter.h at mathemainzel.info> wrote: > > will there be updates for these CVEs for CentOS 6? Red Hat hasn?t released them all yet. Quoting Christopher Robinson in the thread for this here: https://access.redhat.com/errata/RHSA-2018:0007 "We will be pushing errata out as soon as they have passed our QA team's testing. The more
2018 Jan 05
0
CVE-2017-5715, CVE-2017-5753 and CVE-2017-5754
I have released everything for CentOS-6 that has been released upstream in RHEL source code. I will continue to do so when they release new sources. NOTE: We will NOT be releasing anything for CentOS versions before CentOS-6 (ie, CentOS-2.1, 3.x, 4.x, 5.x releases in vault that are past EOL will not get updates) CentOS-6 and CentOS-7 will continue to get updates based on the specific version
2018 Jan 07
1
CVE-2017-5715, CVE-2017-5753 and CVE-2017-5754
How about kernel-lt and kernel-ml? Mike On 01/04/2018 05:41 PM, Warren Young wrote: > On Jan 4, 2018, at 12:18 PM, Walter H. <walter.h at mathemainzel.info> wrote: >> will there be updates for these CVEs for CentOS 6? > Red Hat hasn?t released them all yet. Quoting Christopher Robinson in the thread for this here: > > https://access.redhat.com/errata/RHSA-2018:0007
2018 Mar 16
2
spectre variant 2
Hi all! I'm running an up-to-date Centos-7 on an AMD Vishera 6300, 6 core CPU. I note that when I run the redhat script to test for spectre & meltdown I get this result for variant 2: Variant #2 (Spectre): Vulnerable CVE-2017-5715 - speculative execution branch target injection - Kernel with mitigation patches: OK - HW support / updated microcode: NO - IBRS: Not disabled on kernel commandline - IBPB: Not disabled on kernel commandline and when I run the one from github I get this: CVE-2017-5715 [branch target...
2018 Jan 04
3
CVE-2017-5715, CVE-2017-5753 and CVE-2017-5754
Hello, will there be updates for these CVEs for CentOS 6? Thanks, Walter
2005 Nov 04
2
openssh vulnerability WITH TCP DUMP!
...as a hacking platform (according to my ISP). I was running a fairly recent version of OpenSSH (3.9p1). I reinstalled my box (now with 3.8p1 as supplied by Debian Stable), and started tcpdump to see if I would get lucky. I DID! The aut.log file shows the following: Nov 4 06:25:01 localhost su[5715]: + ??? root:nobody Nov 4 06:25:01 localhost su[5715]: (pam_unix) session opened for user nobody by (uid=0) In the auth.log from my hacked box, I also had these lines. However, I could not correlate them to TCP messages, so they didn't help me. Now, I do have a full tcp dump ;-) In the d...
2007 Dec 23
2
irritating log warnings
hi, At home I used to have a multihomed server. Now it only has 1 nic. Since I removed the physical card and its configuration entry from for the OS, I have this kind of warnings in the logfiles: Dec 23 16:47:44 etch nmbd[5715]: [2007/12/23 16:47:44, 0] nmbd/nmbd_browsesync.c:get_domain_master_name_node_status_fail(486) Dec 23 16:47:44 etch nmbd[5715]: get_domain_master_name_node_status_fail: Dec 23 16:47:44 etch nmbd[5715]: Doing a node status request to the domain master browser at IP 10.0.0.150 failed. Dec 23 16:4...
2019 Oct 18
3
[2.3.8] possible replication issue
...unning fast and successful. Also running a doveadm sync tcp:... is working fine for all users. I can't see exactly, but I haven't seen mailboxes timeouting again and again. So I would assume it's not related to the mailbox. >From the logs: server1: Oct 16 08:29:25 server1 dovecot[5715]: dsync-local(username1 at domain.com)<FXnVDW22pl0tGAAA1cwDxA>: Error: dsync(172.16.0.1): I/O has stalled, no activity for 600 seconds (version not received) Oct 16 08:29:25 server1 dovecot[5715]: dsync-local(username1 at domain.com)<FXnVDW22pl0tGAAA1cwDxA>: Error: Timeout during state=...
2019 Dec 05
2
[2.3.8] possible replication issue
...ing a doveadm sync tcp:... is working fine for all users. >> I can't see exactly, but I haven't seen mailboxes timeouting again and >> again. So I would assume it's not related to the mailbox. >> From the logs: >> server1: >> Oct 16 08:29:25 server1 dovecot[5715]: >> dsync-local(username1 at domain.com)<FXnVDW22pl0tGAAA1cwDxA>: Error: >> dsync(172.16.0.1): I/O has stalled, no activity for 600 seconds (version >> not received) >> Oct 16 08:29:25 server1 dovecot[5715]: >> dsync-local(username1 at domain.com)<FXnVDW22pl0...
2018 Jan 08
4
Response to Meltdown and Spectre
...on the workload. As such, the tunable can also be overridden by the end-user if they are willing to accept the risk. Initial work can be tracked at https://reviews.freebsd.org/D13797. Please note this is a work in progress and some stuff is likely to be broken. Spectre (CVE-2017-5753 and CVE-2017-5715) ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ When it comes to the Spectre vulnerabilities, it is much harder to sort these out. Variant 1 (CVE-2017-5753) is going to require some static analysis to determine vulnerable use cases that will require barriers to stop speculation from disclosing informati...
2018 Jan 08
4
Response to Meltdown and Spectre
...on the workload. As such, the tunable can also be overridden by the end-user if they are willing to accept the risk. Initial work can be tracked at https://reviews.freebsd.org/D13797. Please note this is a work in progress and some stuff is likely to be broken. Spectre (CVE-2017-5753 and CVE-2017-5715) ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ When it comes to the Spectre vulnerabilities, it is much harder to sort these out. Variant 1 (CVE-2017-5753) is going to require some static analysis to determine vulnerable use cases that will require barriers to stop speculation from disclosing informati...
2018 Jan 19
1
Xen 4.4 Immediate EOL
...our best bet is to try to get up to a new >> version of Xen that is under upstream security support, probably 4.8. > > Oracle VM 3.4 product is based on Xen 4.4, and they seem to have backported the fixes already.. > > It looks like those src.rpms have {CVE-2017-5753} {CVE-2017-5715} {CVE-2017-5754} fixes included. > > https://oss.oracle.com/pipermail/oraclevm-errata/2018-January/thread.html > https://oss.oracle.com/pipermail/oraclevm-errata/2018-January/000816.html > https://oss.oracle.com/pipermail/oraclevm-errata/2018-January/000817.html > > http://oss.o...
2018 Jan 18
5
Xen 4.4 Immediate EOL
Hi, I am very sorry to do this on short notice, but obviously Meltdown and Spectre are a lot more than anyone was really expecting to come down the pipeline. Xen 4.4 has been EOL upstream for about a year now and I have personally been reviewing and backporting patches based on the 4.5 versions made available upstream. Given that 4.5 is now also reaching EOL, backporting to 4.4 will become
2018 Mar 16
0
spectre variant 2
...I'm running an up-to-date Centos-7 on an AMD Vishera 6300, 6 core CPU. > What kernel are you running (uname -r)? > I note that when I run the redhat script to test for spectre & meltdown > I get this result for variant 2: > > Variant #2 (Spectre): Vulnerable > CVE-2017-5715 - speculative execution branch target injection > - Kernel with mitigation patches: OK > - HW support / updated microcode: NO > - IBRS: Not disabled on kernel commandline > - IBPB: Not disabled on kernel commandline > > > and when I run the one from github I g...
2019 Dec 05
0
[2.3.8] possible replication issue
...ning a doveadm sync tcp:... is working fine for all users. > > I can't see exactly, but I haven't seen mailboxes timeouting again and > again. So I would assume it's not related to the mailbox. > > From the logs: > > server1: > Oct 16 08:29:25 server1 dovecot[5715]: > dsync-local(username1 at domain.com)<FXnVDW22pl0tGAAA1cwDxA>: Error: > dsync(172.16.0.1): I/O has stalled, no activity for 600 seconds (version > not received) > Oct 16 08:29:25 server1 dovecot[5715]: > dsync-local(username1 at domain.com)<FXnVDW22pl0tGAAA1cwDxA>: Err...