similar to: SuSE Security Announcement - ypserv

Displaying 20 results from an estimated 500 matches similar to: "SuSE Security Announcement - ypserv"

2006 May 31
0
FreeBSD Security Advisory FreeBSD-SA-06:15.ypserv
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ============================================================================= FreeBSD-SA-06:15.ypserv Security Advisory The FreeBSD Project Topic: Inoperative access controls in ypserv(8) Category: core Module: ypserv Announced:
2006 May 31
0
FreeBSD Security Advisory FreeBSD-SA-06:15.ypserv
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ============================================================================= FreeBSD-SA-06:15.ypserv Security Advisory The FreeBSD Project Topic: Inoperative access controls in ypserv(8) Category: core Module: ypserv Announced:
2013 Mar 19
0
CEBA-2013:0660 CentOS 5 ypserv Update
CentOS Errata and Bugfix Advisory 2013:0660 Upstream details at : https://rhn.redhat.com/errata/RHBA-2013-0660.html The following updated files have been uploaded and are currently syncing to the mirrors: ( sha256sum Filename ) i386: 57d27c2c7db432b08cbd5474363aceb154bf4ce3e5926e5a02a5fb830e98ed11 ypserv-2.19-10.el5_9.1.i386.rpm x86_64:
2012 Mar 13
0
CEBA-2012:0379 CentOS 5 ypserv Update
CentOS Errata and Bugfix Advisory 2012:0379 Upstream details at : https://rhn.redhat.com/errata/RHBA-2012-0379.html The following updated files have been uploaded and are currently syncing to the mirrors: ( sha256sum Filename ) i386: 27a4ef8962838b715028e2b43ae22dc64eb19d38e3d704b91dd27974c4780d2d ypserv-2.19-9.el5_8.1.i386.rpm x86_64:
2013 Oct 07
0
CEBA-2013:1406 CentOS 6 ypserv Update
CentOS Errata and Bugfix Advisory 2013:1406 Upstream details at : https://rhn.redhat.com/errata/RHBA-2013-1406.html The following updated files have been uploaded and are currently syncing to the mirrors: ( sha256sum Filename ) i386: 8389a7c0ba74106508f8f1fae32cd6e55e3a5803f0ff470febe98c249296b8e6 ypserv-2.19-26.el6_4.2.i686.rpm x86_64:
2018 Oct 09
0
CEBA-2018:2899 CentOS 6 ypserv BugFix Update
CentOS Errata and Bugfix Advisory 2018:2899 Upstream details at : https://access.redhat.com/errata/RHBA-2018:2899 The following updated files have been uploaded and are currently syncing to the mirrors: ( sha256sum Filename ) i386: 68486805a12364a57b2d7c2fccb1d4831a05aaa4fee1c95120a707cc45449aa6 ypserv-2.19-32.el6_10.i686.rpm x86_64:
2006 Mar 27
0
CESA-2006:0203-8: Low CentOS 2 i386 ypserv bug fix update
The following errata for CentOS-2 have been built and uploaded to the centos mirror: RHBA-2006:0203-8 ypserv bug fix update Files available: ypserv-2.8-9.23.i386.rpm More details are available from the RedHat web site at https://rhn.redhat.com/errata/rh21as-errata.html The easy way to make sure you are up to date with all the latest patches is to run: # yum update -- John Newbigin Computer
2000 Apr 13
0
YPServ uses a lot of CPU, why?
Hello, Sometimes 'ypserv' uses a lot of CPU in our Samba machine. Here is a capture of the output: load averages: 7.11, 4.71, 4.18 19:19:03 242 processes: 2 running, 3 waiting, 102 sleeping, 133 idle, 2 zombie CPU states: 20.0% user, 0.0% nice, 80.0% system, 0.0% idle Memory: Real: 100M/242M act/tot Virtual: 98M/824M use/tot Free: 664K PID
2010 Jul 21
0
CEBA-2010:0540 CentOS 4 i386 ypserv Update
CentOS Errata and Bugfix Advisory 2010:0540 Upstream details at : https://rhn.redhat.com/errata/RHBA-2010-0540.html The following updated files have been uploaded and are currently syncing to the mirrors: i386: ypserv-2.13-19.el4_8.2.i386.rpm Source: ypserv-2.13-19.el4_8.2.src.rpm -- Karanbir Singh CentOS Project { http://www.centos.org/ } irc: z00dax, #centos at irc.freenode.net
2010 Jul 21
0
CEBA-2010:0540 CentOS 4 x86_64 ypserv Update
CentOS Errata and Bugfix Advisory 2010:0540 Upstream details at : https://rhn.redhat.com/errata/RHBA-2010-0540.html The following updated files have been uploaded and are currently syncing to the mirrors: x86_64: ypserv-2.13-19.el4_8.2.x86_64.rpm Source: ypserv-2.13-19.el4_8.2.src.rpm -- Karanbir Singh CentOS Project { http://www.centos.org/ } irc: z00dax, #centos at irc.freenode.net
2011 Apr 14
0
CEBA-2011:0444 CentOS 5 i386 ypserv Update
CentOS Errata and Bugfix Advisory 2011:0444 Upstream details at : https://rhn.redhat.com/errata/RHBA-2011-0444.html The following updated files have been uploaded and are currently syncing to the mirrors: ( md5sum Filename ) i386: 407d7b987f8820fc26f3bca7fae3bf8d ypserv-2.19-5.el5_6.1.i386.rpm Source: 7cf3163973ac69ebd10fa40ad9254e05 ypserv-2.19-5.el5_6.1.src.rpm -- Karanbir Singh
2011 Apr 14
0
CEBA-2011:0444 CentOS 5 x86_64 ypserv Update
CentOS Errata and Bugfix Advisory 2011:0444 Upstream details at : https://rhn.redhat.com/errata/RHBA-2011-0444.html The following updated files have been uploaded and are currently syncing to the mirrors: ( md5sum Filename ) x86_64: 3be76fe55492bf7fc70a0fc6e28632bc ypserv-2.19-5.el5_6.1.x86_64.rpm Source: 7cf3163973ac69ebd10fa40ad9254e05 ypserv-2.19-5.el5_6.1.src.rpm -- Karanbir Singh
2017 Jan 18
0
CEBA-2017:0085 CentOS 7 ypserv BugFix Update
CentOS Errata and Bugfix Advisory 2017:0085 Upstream details at : https://rhn.redhat.com/errata/RHBA-2017-0085.html The following updated files have been uploaded and are currently syncing to the mirrors: ( sha256sum Filename ) x86_64: 8de58436ff1b69bfad39ba229e7f5cdc6b9e9f58121bc056907a7dfc96b168fb ypserv-2.31-9.el7_3.x86_64.rpm Source:
2008 Aug 11
4
Need to restart ypserv to update the nis maps
Hi I use NIS om my network (CentOS4.6). When an update on a map occurs (home directory changed in /etc/passwd for instance), I run make -C /var/yp/ and check the result on a client. On the client I use "ypcat passwd" and find indeed that the update has propagated (the clients run ypbind service). On the client I have configured /etc/nsswitch.conf with : passwd: files nis shadow:
2009 Jan 17
2
ypserv errors
In my syslog I get many of these types of errors: ypserv [4818]: refused connect from 127.0.0.1:57124 to procedure ypproc_match [domain.com,passwd.adjunct.byname;-1) Any idea what this error is? TIA
1999 Oct 21
1
-----BEGIN PGP SIGNED MESSAGE----- - --------------------------------------------------------------------- Red Hat, Inc. Security Advisory Synopsis: Security problems in WU-FTPD Advisory ID: RHSA-1999:043-01 Issue date: 1999-10-21 Updated on: Keywords: wu-ftp security remote exploit Cross references: - --------------------------------------------------------------------- 1. Topic:
2012 Mar 13
0
CentOS-announce Digest, Vol 85, Issue 5
Send CentOS-announce mailing list submissions to centos-announce at centos.org To subscribe or unsubscribe via the World Wide Web, visit http://lists.centos.org/mailman/listinfo/centos-announce or, via email, send a message with subject or body 'help' to centos-announce-request at centos.org You can reach the person managing the list at centos-announce-owner at centos.org When
2013 Oct 08
0
CentOS-announce Digest, Vol 104, Issue 3
Send CentOS-announce mailing list submissions to centos-announce at centos.org To subscribe or unsubscribe via the World Wide Web, visit http://lists.centos.org/mailman/listinfo/centos-announce or, via email, send a message with subject or body 'help' to centos-announce-request at centos.org You can reach the person managing the list at centos-announce-owner at centos.org When
2009 Apr 03
1
warning for nis users and 5.3 upgrade
i think that previous versions did this as well, but for sure the newest ypserv in 5.3 replaces /var/yp/Makefile with a new copy. needless to say if you've made any changes to that file, you will not be happy. we had a couple hours of phone calls after passwords stopped working. the original file is save as Makefile.rpmsave, so recovery of the file is straightforward. the issue has
2007 Jul 16
3
NIS problems after installation
so, i just installed CentOS on our server and set up NIS using the same configuration as on our other server, but the clients' ypbind services complain that although they can find the correct server, the server does not respond to requests. to debug this, i've: * pinged the server using its ip and it's name * ssh'ed to the server using it's ip and name *