similar to: Linux 3.18.44 kernel with Dirty Cow fix (CVE-2016-5195)

Displaying 20 results from an estimated 3000 matches similar to: "Linux 3.18.44 kernel with Dirty Cow fix (CVE-2016-5195)"

2016 Oct 26
0
Linux 3.18.44 kernel with Dirty Cow fix (CVE-2016-5195)
Pasi, Recommend to test it out before production environment. Xlord -----Original Message----- From: centos-virt-bounces at centos.org [mailto:centos-virt-bounces at centos.org] On Behalf Of Pasi K?rkk?inen Sent: Monday, October 24, 2016 2:55 AM To: centos-virt at centos.org Subject: [CentOS-virt] Linux 3.18.44 kernel with Dirty Cow fix (CVE-2016-5195) Hello, I think we should build and
2017 Jan 24
2
NIC Stability Problems Under Xen 4.4 / CentOS 6 / Linux 3.18
On Tue, Jan 24, 2017 at 09:29:39PM +0800, -=X.L.O.R.D=- wrote: > Kevin Stange, > It can be either kernel or update the NIC driver or firmware of the NIC > card. Hope that helps! > > Xlord > -----Original Message----- > From: CentOS-virt [mailto:centos-virt-bounces at centos.org] On Behalf Of Kevin > Stange > Sent: Tuesday, January 24, 2017 1:04 AM > To: centos-virt
2015 Oct 28
2
Libvirt enhancement requests
On Tue, Oct 27, 2015 at 05:19:16PM +0000, Nux! wrote: > To clarify my own request: > > RBD (for CEPH) support is available in the version bundled in RHEL 7.2 Beta, so we'll have it in CentOS 7.2 (or whatever will be the identifying number). > > The hooks seems just like a matter of creating files in the correct location. > > ..So, all is good in the world once again.
2015 Oct 31
3
Libvirt enhancement requests
Hi Lucian, It seems to be upstream libvirt-1.2.15-2 with options with_xen and with_libxl enabled. http://cbs.centos.org/koji/buildinfo?buildID=1348 Regards, Jean-Marc Le 28/10/2015 09:38, Nux! a ?crit : > Pasi, > > Where are these RPMs, how are they built, what exactly are the differences vs the stock ones? > > Regards, > Lucian > > -- > Sent from the Delta quadrant
2017 Feb 12
3
NIC Stability Problems Under Xen 4.4 / CentOS 6 / Linux 3.18
On 11/02/17 06:29, Kevin Stange wrote: > On 01/30/2017 06:41 PM, Kevin Stange wrote: >> On 01/30/2017 06:12 PM, Adi Pircalabu wrote: >>> On 31/01/17 10:49, Kevin Stange wrote: >>>> You said 3.x kernels specifically. The kernel on Xen Made Easy now is a >>>> 4.4 kernel. Any chance you have tested with that one? >>> >>> Not yet, however
2016 Aug 05
1
Centos 7 newer kernel needed
Dear Laurentiu, Agree with Johnny for kernel upgrade if upgrade helps, alternative if 3.10 or above already supported it, you can check from kernel parameter or options if they are disabled on purpose. You can do that via the "make menuconfig" via "https://wiki.centos.org/HowTos/I_need_the_Kernel_Source" or "https://wiki.centos.org/HowTos/BuildingKernelModules". Hope
2017 Jan 25
2
NIC Stability Problems Under Xen 4.4 / CentOS 6 / Linux 3.18
On 01/24/2017 11:16 AM, Kevin Stange wrote: > On 01/24/2017 09:10 AM, Konrad Rzeszutek Wilk wrote: >> On Tue, Jan 24, 2017 at 09:29:39PM +0800, -=X.L.O.R.D=- wrote: >>> Kevin Stange, >>> It can be either kernel or update the NIC driver or firmware of the NIC >>> card. Hope that helps! >>> >>> Xlord >>> -----Original Message-----
2015 Oct 27
2
Libvirt enhancement requests
So... how exactly do we proceed? Anyone from the Virt SIG, please stand up? -- Sent from the Delta quadrant using Borg technology! Nux! www.nux.ro ----- Original Message ----- > From: "Pasi K?rkk?inen" <pasik at iki.fi> > To: "Discussion about the virtualization on CentOS" <centos-virt at centos.org> > Sent: Sunday, 25 October, 2015 11:02:22 >
2017 Feb 28
2
NUMA placement failed, performance might be affected
I just did a yum update on a CentOS 7 / Xen 4.6 server which took me from kernel-3.18.34-20.el7.x86_64 -> kernel-3.18.44-20.el7.x86_64 After rebooting, the following notice is printed immediately upon xl create'ing a domain: libxl: notice: libxl_numa.c:499:libxl__get_numa_candidate: NUMA placement failed, performance might be affected Indeed performance is significantly degraded. This
2016 Aug 04
2
Centos 7 newer kernel needed
Hi Xlord, Yes, the CPU has support for EPT. I wrongly thought that the nested EPT was first introduced in 3.12. Following your instructions I see that I have it enabled on my system as well. However, checking the kernel commits from 3.12 on search string 'nested ept' I found about 10 code changes/fixes for nested EPT.
2016 Nov 02
2
CVE-2016-5195 DirtyCOW: Critical Linux Kernel Flaw
Dear Sir/s, Can a crashed centos system be restore to its previous state before it crash? And if so, can you please tell me how to do it? Thanks, your help is very much appreciated. ----- Original Message ----- From: "Richard" <lists-centos at listmail.innovate.net> To: "CentOS mailing list" <centos at centos.org> Sent: Tuesday, November 1, 2016 5:05:59 PM
2016 Nov 01
3
CVE-2016-5195 DirtyCOW: Critical Linux Kernel Flaw
On Tue, November 1, 2016 6:25 pm, Tony Mountifield wrote: > In article <5818CD31.4050008 at moving-picture.com>, > James Pearson <james-p at moving-picture.com> wrote: >> Leonardo Oliveira Ortiz wrote: >> > RedHat and Centos 4.x can be explored by this flaw? >> >> See: >> >> https://access.redhat.com/security/cve/cve-2016-5195 > > In
2016 Oct 28
2
CVE-2016-5195 “DirtyCOW”: Critical Linux Kernel Flaw
On Fri, October 28, 2016 9:43 am, Johnny Hughes wrote: > On 10/22/2016 07:49 PM, Valeri Galtsev wrote: >> Dear All, >> >> I guess, we all have to urgently apply workaround, following, say, this: >> >> https://gryzli.info/2016/10/21/protect-cve-2016-5195-dirtycow-centos-7rhel7cpanelcloudlinux/ >> >> At least those of us who still have important multi
2016 Oct 25
2
CVE-2016-5195
Hi Team, Could you please help us to know about the CVE-2016-5195 on CentOs. I have server running with CentOS Linux release 7.2.1511 (Core) , will this be effected? Thanks Aswathi ________________________________ This message is for the designated recipient only and may contain privileged, proprietary, or otherwise confidential information. If you have received it in error, please notify
2016 Nov 01
2
CVE-2016-5195 DirtyCOW: Critical Linux Kernel Flaw
Leonardo Oliveira Ortiz wrote: > RedHat and Centos 4.x can be explored by this flaw? See: https://access.redhat.com/security/cve/cve-2016-5195 James Pearson
2016 Oct 23
6
CVE-2016-5195 “DirtyCOW”: Critical Linux Kernel Flaw
Dear All, I guess, we all have to urgently apply workaround, following, say, this: https://gryzli.info/2016/10/21/protect-cve-2016-5195-dirtycow-centos-7rhel7cpanelcloudlinux/ At least those of us who still have important multi user machines running Linux. (Yes, me too, I do have a couple, thank goodness, the rest are already not ;-) Have a productive weekend, everybody. Valeri
2016 Oct 24
3
CVE-2016-5195 “DirtyCOW”: Critical Linux Kernel Flaw
On Sat, 22 Oct 2016, Valeri Galtsev wrote: > On Sat, October 22, 2016 7:49 pm, Valeri Galtsev wrote: >> Dear All, >> >> I guess, we all have to urgently apply workaround, following, say, this: >> >> https://gryzli.info/2016/10/21/protect-cve-2016-5195-dirtycow-centos-7rhel7cpanelcloudlinux/ >> >> At least those of us who still have important multi user
2017 Jan 26
2
NIC Stability Problems Under Xen 4.4 / CentOS 6 / Linux 3.18
On 01/26/2017 09:32 AM, Johnny Hughes wrote: > On 01/25/2017 11:49 AM, Kevin Stange wrote: >> On 01/24/2017 11:16 AM, Kevin Stange wrote: >>> On 01/24/2017 09:10 AM, Konrad Rzeszutek Wilk wrote: >>>> On Tue, Jan 24, 2017 at 09:29:39PM +0800, -=X.L.O.R.D=- wrote: >>>>> Kevin Stange, >>>>> It can be either kernel or update the NIC driver or
2017 Jan 24
0
NIC Stability Problems Under Xen 4.4 / CentOS 6 / Linux 3.18
On 01/24/2017 09:10 AM, Konrad Rzeszutek Wilk wrote: > On Tue, Jan 24, 2017 at 09:29:39PM +0800, -=X.L.O.R.D=- wrote: >> Kevin Stange, >> It can be either kernel or update the NIC driver or firmware of the NIC >> card. Hope that helps! >> >> Xlord >> -----Original Message----- >> From: CentOS-virt [mailto:centos-virt-bounces at centos.org] On Behalf Of
2016 Nov 02
2
CVE-2016-5195 DirtyCOW: Critical Linux Kernel Flaw
On 02/11/16 13:05, Richard wrote: > RHEL/Centos-4 is EOL so wouldn't be updated regardless (at least > under the normal EOL guidelines), but it is mentioned toward the > bottom of that page under "Affected Packages State": > > Red Hat Enterprise Linux 4 kernel Not affected It is mentioned because RHEL4 is in extended life phase, so not EOL yet. CentOS 4 is EOL