Displaying 20 results from an estimated 800 matches similar to: "SECURITY: [RHSA-2000:014-10] Updated piranha packages available"
2000 Mar 15
0
Re: IPMASQ and lock-up of all terminals ---- Sum mary and update
Well, last night, my box was hit again.. same symptoms:
All attempts to connect remotely receive a connection, but a login prompt
never comes up.
When I went to the console and turned on the monitor, I had the login
prompt, but written on to the screen was the message
IPMASQ: Reverse ICMP: Checksum error from xxx.xxx.xxx.xxx
So, on this occasion, I thought I would post a summary of the
2000 Apr 26
0
SECURITY: UPDATED - RHSA-2000:014 New Piranha release available
-----BEGIN PGP SIGNED MESSAGE-----
- ---------------------------------------------------------------------
Red Hat, Inc. Security Advisory
Synopsis: Piranha web GUI exposure
Advisory ID: RHSA-2000:014-16
Issue date: 2000-04-18
Updated on: 2000-04-26
Product: Red Hat Linux
Keywords: piranha
Cross references: php
-
2008 Jul 22
0
Oracle apps form server issue with Piranha Load balancer
Hi all,
First of all sorry for writing such a big mail.I am facing problem while
implementing Piranha Load balancer on CENTOS 4 for my two oracle 11i
application server running on linux.
Oracle Real server details
Instance Name - test
url's - 1 . dev.xxx.com:8004
2 . uat.xxx.com:8004
Architecture -
Services installed on dev are
1. Database Server
2.Concurrent Processing
2014 Feb 13
0
CESA-2014:0175 Important CentOS 6 piranha Update
CentOS Errata and Security Advisory 2014:0175 Important
Upstream details at : https://rhn.redhat.com/errata/RHSA-2014-0175.html
The following updated files have been uploaded and are currently
syncing to the mirrors: ( sha256sum Filename )
i386:
4d4241930e9d10070344dbb6d9883796f53e34614cb8a0fb105aa75f8c5095be piranha-0.8.6-4.el6_5.2.i686.rpm
x86_64:
2014 Feb 13
0
CESA-2014:0174 Important CentOS 5 piranha Update
CentOS Errata and Security Advisory 2014:0174 Important
Upstream details at : https://rhn.redhat.com/errata/RHSA-2014-0174.html
The following updated files have been uploaded and are currently
syncing to the mirrors: ( sha256sum Filename )
i386:
cf98137c77e69d87b14092c435f50fde5bfc1576eb8daa7ea4bdc6a9fc7d30db piranha-0.8.4-26.el5_10.1.i386.rpm
x86_64:
2008 Sep 25
1
Implementing LVS changes made in Piranha GUI
Every time I touch something, pieces fall off! It's a good thing this
stuff isn't in production yet (for me I mean).
So I had an LVS, configured with Piranha, directing http test transactions
across two servers. I used Piranha to add another realserver. It
appeared in the lvs.cf file, but didn't appear in the ipvsadm output. So
I stopped and restarted Pulse. And now *none* of the
2011 Sep 22
0
CEBA-2011:1059 CentOS 5 i386 piranha Update
CentOS Errata and Bugfix Advisory 2011:1059
Upstream details at : https://rhn.redhat.com/errata/RHBA-2011-1059.html
The following updated files have been uploaded and are currently
syncing to the mirrors: ( md5sum Filename )
i386:
73efddaba71b53278cbb61a05079f33a piranha-0.8.4-22.el5.i386.rpm
Source:
3f6cb170fe1612f5cce6753a9b278902 piranha-0.8.4-22.el5.src.rpm
--
Karanbir Singh
CentOS
2011 Sep 22
0
CEBA-2011:1059 CentOS 5 x86_64 piranha Update
CentOS Errata and Bugfix Advisory 2011:1059
Upstream details at : https://rhn.redhat.com/errata/RHBA-2011-1059.html
The following updated files have been uploaded and are currently
syncing to the mirrors: ( md5sum Filename )
x86_64:
e4999594de5ef1818660c2ccddb454d4 piranha-0.8.4-22.el5.x86_64.rpm
Source:
3f6cb170fe1612f5cce6753a9b278902 piranha-0.8.4-22.el5.src.rpm
--
Karanbir Singh
1999 Oct 21
1
[RHSA-1999:042-01] screen defaults to not using Unix98 ptys
---------------------------------------------------------------------
Red Hat, Inc. Security Advisory
Synopsis: screen defaults to not using Unix98 ptys
Advisory ID: RHSA-1999:042-01
Issue date: 1999-10-20
Updated on:
Keywords:
Cross references: screen unix98 pty permissions
---------------------------------------------------------------------
1. Topic:
Screen uses ptys with world
1999 Oct 12
0
SECURITY: RHSA-1999:040 New PAM packages available
-----BEGIN PGP SIGNED MESSAGE-----
- ---------------------------------------------------------------------
Red Hat, Inc. Security Advisory
Synopsis: New PAM packages available
Advisory ID: RHSA-1999:040
Issue date: 10/13/1999
Updated on: 10/13/1999
Keywords: pam security login NIS server
Cross references: N/A
-
1999 Aug 31
0
[SECURITY] RHSA-1999:034 New proftpd packages available
-----BEGIN PGP SIGNED MESSAGE-----
- ---------------------------------------------------------------------
Red Hat, Inc. Security Advisory
Synopsis: Buffer overflow in proftpd
Advisory ID: RHSA-1999:034-01
Issue date: 1999-08-31
Keywords: proftpd buffer overflow remote exploit
- ---------------------------------------------------------------------
1. Topic:
proftpd is a ftp server
2000 Apr 21
0
SECURITY: [RHSA-2000:012] New openldap packages available
-----BEGIN PGP SIGNED MESSAGE-----
- ---------------------------------------------------------------------
Red Hat, Inc. Security Advisory
Synopsis: New openldap packages.
Advisory ID: RHSA-2000:012-05
Issue date: 2000-04-13
Updated on: 2000-04-21
Product: Red Hat Linux
Keywords: openldap startup symlink overwrite denial
Cross
2000 Apr 12
0
[SECURITY] RHSA-2000:009-02.text: New gpm packages available
-----BEGIN PGP SIGNED MESSAGE-----
- ---------------------------------------------------------------------
Red Hat, Inc. Security Advisory
Synopsis: gpm
Advisory ID: RHSA-2000:009-02
Issue date: 2000-04-07
Updated on: 2000-04-10
Product: Red Hat Linux
Keywords: gpm gpm-root gid 0 priviledge
Cross references: N/A
-
1999 Aug 30
0
SECURITY: RHSA-1999:032 Buffer overflows in amd
-----BEGIN PGP SIGNED MESSAGE-----
- ---------------------------------------------------------------------
Red Hat, Inc. Security Advisory
Synopsis: Buffer overrun in amd
Advisory ID: RHSA-1999:032-01
Issue date: 1999-08-30
Keywords: amd am-utils buffer overflow remote exploit
- ---------------------------------------------------------------------
1. Topic:
New packages of am-utils
1999 Oct 21
0
SECURITY: [RHSA-1999:043] New wu-ftpd packages available
---------------------------------------------------------------------
Red Hat, Inc. Security Advisory
Synopsis: Security problems in WU-FTPD
Advisory ID: RHSA-1999:043-01
Issue date: 1999-10-21
Updated on:
Keywords: wu-ftp security remote exploit
Cross references:
---------------------------------------------------------------------
1. Topic:
Various computer security groups have
1999 Aug 27
0
2.0.38 fixes a glitch
Freshmeat says:
Following up to yesterday's Linux 2.0.38 release, Alan Cox sent out a
security notice about a remote network DoS vulnerability which is
present in all Linux 2.0.x systems. Linux 2.2.x is not affected by
this bug. Causing this requires a great deal of skill and probably a
reasonably local network access as it is extremely timing
dependant. Nevertheless everyone is advised to
2007 Jan 15
1
piranha lvsd "cluster" status: how?
Hi,
I've got a couple of machines acting as directors with service=lvs
Is there something similar to 'clustat' for pulse+lvsd?
I need this in order to make our monitorization scripts "cluster-aware",
or else one node will have critical status when there are less nannies
than it expected because the services ran over to the other node.
Thanks in advance,
Rui
--
+ No
1999 Apr 23
0
Forw: new procmail package
___________________________________________________________________________
Dan Yocum | Phone: (630) 840-8525
Linux/Unix System Administrator | Fax: (630) 840-6345
Computing Division OSS/FSS | email: yocum@fnal.gov .~. L
Fermi National Accelerator Lab | WWW: www-oss.fnal.gov/~yocum/ /V\ I
P.O. Box 500 |
1999 Apr 23
0
Forw: rsync correction
___________________________________________________________________________
Dan Yocum | Phone: (630) 840-8525
Linux/Unix System Administrator | Fax: (630) 840-6345
Computing Division OSS/FSS | email: yocum@fnal.gov .~. L
Fermi National Accelerator Lab | WWW: www-oss.fnal.gov/~yocum/ /V\ I
P.O. Box 500 |
1999 Apr 23
0
Forw: new lpr package
This and the following 2 messages are from linux-watch@redhatc.com
Dan
___________________________________________________________________________
Dan Yocum | Phone: (630) 840-8525
Linux/Unix System Administrator | Fax: (630) 840-6345
Computing Division OSS/FSS | email: yocum@fnal.gov .~. L
Fermi National Accelerator Lab | WWW: