similar to: URGENT! Shellshock fix DOES NOT fix the bug on CentOS 5.4

Displaying 20 results from an estimated 1000 matches similar to: "URGENT! Shellshock fix DOES NOT fix the bug on CentOS 5.4"

2014 Sep 30
2
Bash package for CentOS5
Hi! I have noticed, that our mirror has this package bash-3.2-33.el5_11.4.x86_64.rpm, but a lot of other mirror still have bash-3.2-33.el5_10.4.x86_64.rpm. Since bash-3.2-33.el5_11.4.x86_64.rpm was issued on 26-Sep-2014 04:28, could this be the product of slower mirror update cycles? Regards, Mitja -- -- Mitja Miheli? ARNES, Tehnolo?ki park 18, p.p. 7, SI-1001 Ljubljana, Slovenia tel: +386
2014 Sep 26
1
CESA-2014:1306 Important CentOS 5 bash Security Update
CentOS Errata and Security Advisory 2014:1306 Important Upstream details at : https://rhn.redhat.com/errata/RHSA-2014-1306.html The following updated files have been uploaded and are currently syncing to the mirrors: ( sha256sum Filename ) i386: 9755e86ad8536c908f95340be308190b52989bfa0d9268a461c40a3f0d493bc7 bash-3.2-33.el5_10.4.i386.rpm x86_64:
2014 Oct 08
0
patching bash 2.05b for Shellshock
Hello all, Amongst a number of modern CentOS machines we have this one RHEL 3 machine (don't ask me why:) and on it we have bash 2.05b. I was trying to compile a version of bash for it that would be Shellshock-proofed. To do that, I downloaded a copy of the code from the GNU along with all the 13 patches, applied the patches, compiled the code and installed the executable. All
2014 Oct 03
0
ShellShock and bash status
For those of us still in shell shock, the following was sent several days ago under a misleading subject/thread mixed in with a bunch of other nonsense. (Message-ID: <54291071.7010209 at centos.org>) According to Johnny the second bash patch addressed all of the known issues. I had been waiting for a third patch to come through and missed this important information sent on Monday. On
2014 Sep 26
1
Is dovecot vulnerable to the shellshock/CVE-2014-6271 exploit?
I'm right now handling this beach-ball sized grenade, and trying to figure out which of our services need to be locked down right away. Since dovecot passes values via environment variables based on user input (e.g. username, password, mailbox?) to auxilliary executables (including possibly bash shell scripts), is dovecot vulnerable to this exploit? (This is not a fault of dovecot, but
2017 May 01
0
Dovecot 2.2 maildir replication issue
Hello, I'm just trying to setup two mailservers with dovecot 2.2, postfix, mysql, postfixadmin where i would like to sync the maildirs between them; I'm at the point where sending/receiving and qouta is working and try the maildir replication but it only creates the maildir directories (as example: /srv/vmail/test.domain/screenie/) on the second server but nothing inside the maildir is
2014 Oct 09
2
Bash still vulnerable
According to the vulnerability test script from shellshocker.net, the latest bash versions on CentOS5 and CentOS6, 3.2-33.el5_11.4 and 4.1.2-15.el6_5.2, resp., are still vulnerable to CVE-2014-6277. In fact, on CentOS6, abrtd will send you a nice report about it. Does anyone know if upstream is working on a fix? [root at host ~]# bash ~/shellshock_test.sh CVE-2014-6271 (original shellshock):
2015 Feb 03
3
Another Fedora decision
On Mon, Feb 2, 2015 at 8:02 PM, Kahlil Hodgson <kahlil.hodgson at dealmax.com.au> wrote: > On 3 February 2015 at 13:34, PatrickD Garvey <patrickdgarveyt at gmail.com> wrote: >> Now how about some specific sources you personally used to learn your >> craft that we can use likewise? > > So many places it makes my brain hurt just thinking about it. Google > and
2015 Feb 05
2
Another Fedora decision
On Wed, Feb 4, 2015 at 6:32 PM, Warren Young <wyml at etr-usa.com> wrote: > >>> Most such vulns are against Apache, PHP, etc, which do not run as root. >> >> Those are common. Combine them with anything called a 'local >> privilege escalation' vulnerability and you've got a remote root >> exploit. > > Not quite. An LPE can only be used
2014 Oct 02
1
AstLinux 1.2.0 Released
The AstLinux Team has released 1.2.0. All current users are encouraged to upgrade as this release addresses the bash "ShellShock" bug. New in 1.2.0: * New Linux Kernel 3.2.x * "igb" ethernet driver for Intel Atom C2000 * Enable AES-NI support * New "sip-user-agent" firewall plugin * New versions of Asterisk 11 and 1.8 * Bash "ShellShock" security fixes A
2014 Oct 06
1
'template shell' samba parameter
Hi, As part of the bash 'shellshock' bug / vulnerability in unix/linux environments i would like to know whether the use of the samba parameter 'template shell' in my product may cause my product to be vulnerable to the shellshock bug , since this 'template shell' parameter , as per my understanding allows to open a remote bash session used by external users. I would
2016 Jan 20
7
[Bug 93795] New: G98: GL(X) compositing - XRandR DPMS trouble
https://bugs.freedesktop.org/show_bug.cgi?id=93795 Bug ID: 93795 Summary: G98: GL(X) compositing - XRandR DPMS trouble Product: xorg Version: unspecified Hardware: Other OS: All Status: NEW Severity: normal Priority: medium Component: Driver/nouveau Assignee: nouveau at
2017 Dec 12
5
problems with share permissions
Hi I had a few test shares  created and they were working fine. Users could read or write depending on the windows group that was defined on the share. I have since removed the test shares and created the file structure needed and setup the smb.conf file with the share names.  I have also setup the groups and assigned them to the respective directories.  Problem is the users can connect to
2020 Oct 14
3
Changing IMAP separator - does it break things?
14. 10. 2020 v 11:51, Victor Sudakov <vas at sibptus.ru>: > >> I had to do it with 10-20 live users and it went fine, nobody noticed >> anything (I made the change in the night hours just to be sure >> though). I had to go down and fix some erratic folder names that >> resulted from the botched separator handling on some macOS Mail >> accounts. > >
2005 Jan 24
3
Roaming Profiles -- Problem Rapidly Switching Users
Does anybody have any insight into what could be causing this strange problem? I have Samba 3.02 (sorry, can't upgrade right now). My Linux box is running Mandrake 10 Official. I have Samba configured as a PDC. I can successfully add machines to my Domain -- and log on as ANY user from ANY machine. However on a SINGLE MACHINE, when I log on as USER_1 and access that user's roaming
2007 May 24
6
Sum per hour
Dear all, I have a list of precipitation record and a list of time I would like to sum them up per hour, or per day. Does such a function exist ? example: time<-c("2000-10-03 14:00:00","2000-10-03 14:10:00","2000-10-03 14:20:00","2000-10-03 15:30:00","2000-10-03 16:40:00","2000-10-03 16:50:00","2000-10-03
2005 Feb 07
5
Creating a correlation Matrix
Hi all: I have a question on how to go about creating a correlation matrix. I have a huge amount of data....21 variables for 3471 times. I want to see how each of the variables correlate to each other. Any help would be appreciated, including which package and which functions I should use to do this. Thanks, Jessica Higgs Masters Student Department of Meteorology Penn State University
2008 Feb 12
3
regular expression for na.strings / read.table
Dear all, I am working with a csv file. Some data of the file are not valid and they are marked with a star '*'. For example : *789. I have attached with this email a example file (test.txt) that looks like the data I have to work with. I see 2 possibilities ..thast I cannot manage anyway in R: 1-first & easiest solution: Read the data with read.csv in R, and define as na strings
2010 Feb 16
2
error message when downloading packages using the OS X shell
Hi Fellow R Users, I recently upgraded to Mac OS X 10.5 (Snow Leopard) and had some issues downloading and running R 2.10.1. I fixed the tcl/tk problem I was originally having but it was replaced with another. I run R out of the shell (terminal) and when I ask it to download.packages() it gives me the following message: *Loading Tcl/Tk interface ... done* *Error in file.info(x) : argument
2007 May 08
3
plot time series
[This email is either empty or too large to be displayed at this time]