similar to: CVE-2016-1285 & CVE-2016-1286

Displaying 20 results from an estimated 7000 matches similar to: "CVE-2016-1285 & CVE-2016-1286"

2016 Mar 10
2
RES: CVE-2016-1285 & CVE-2016-1286
As soon as RHEL does. On 03/10/2016 02:13 PM, Leonardo Oliveira Ortiz wrote: > CentOS will provide an update to fix it? > > ________________________________________ > De: centos-bounces at centos.org [centos-bounces at centos.org] em nome de Alice Wonder [alice at domblogger.net] > Enviado: quinta-feira, 10 de mar?o de 2016 15:31 > Para: centos at centos.org > Assunto: Re:
2016 Mar 10
2
CVE-2016-1285 & CVE-2016-1286
On 03/10/2016 07:13 AM, Michael H wrote: > On 10/03/16 14:47, Leonardo Oliveira Ortiz wrote: >> Hello. >> >> I think Centos are affected, right? >> >> Some update from Centos? >> _______________________________________________ >> CentOS mailing list >> CentOS at centos.org >> https://lists.centos.org/mailman/listinfo/centos >> >
2016 Nov 01
2
CVE-2016-5195 DirtyCOW: Critical Linux Kernel Flaw
Leonardo Oliveira Ortiz wrote: > RedHat and Centos 4.x can be explored by this flaw? See: https://access.redhat.com/security/cve/cve-2016-5195 James Pearson
2016 Nov 01
3
CVE-2016-5195 DirtyCOW: Critical Linux Kernel Flaw
On Tue, November 1, 2016 6:25 pm, Tony Mountifield wrote: > In article <5818CD31.4050008 at moving-picture.com>, > James Pearson <james-p at moving-picture.com> wrote: >> Leonardo Oliveira Ortiz wrote: >> > RedHat and Centos 4.x can be explored by this flaw? >> >> See: >> >> https://access.redhat.com/security/cve/cve-2016-5195 > > In
2016 Mar 11
0
RES: CVE-2016-1285 & CVE-2016-1286
Looking at the redhat CVE it looks like *by default config* it is not vulnerable except from the localhost. On 03/10/2016 02:37 PM, Alice Wonder wrote: > As soon as RHEL does. > > On 03/10/2016 02:13 PM, Leonardo Oliveira Ortiz wrote: >> CentOS will provide an update to fix it? >> >> ________________________________________ >> De: centos-bounces at centos.org
2016 Mar 10
0
RES: CVE-2016-1285 & CVE-2016-1286
CentOS will provide an update to fix it? ________________________________________ De: centos-bounces at centos.org [centos-bounces at centos.org] em nome de Alice Wonder [alice at domblogger.net] Enviado: quinta-feira, 10 de mar?o de 2016 15:31 Para: centos at centos.org Assunto: Re: [CentOS] CVE-2016-1285 & CVE-2016-1286 On 03/10/2016 07:13 AM, Michael H wrote: > On 10/03/16 14:47,
2019 Feb 28
2
Using butt in same mount point that is used for relay
Hello. We are using icecast to relay a radio station on local network and I have a question: There is a way to send streaming from a mic (with butt) using same mount point that we are using for relay? Or some workaround for it like using fallback mount point? Azuracast can do it but the software have some bugs (in general usage) and I need a more fast solution for now.... Best regards.
2016 Nov 02
2
CVE-2016-5195 DirtyCOW: Critical Linux Kernel Flaw
Dear Sir/s, Can a crashed centos system be restore to its previous state before it crash? And if so, can you please tell me how to do it? Thanks, your help is very much appreciated. ----- Original Message ----- From: "Richard" <lists-centos at listmail.innovate.net> To: "CentOS mailing list" <centos at centos.org> Sent: Tuesday, November 1, 2016 5:05:59 PM
2019 Feb 28
1
Using butt in same mount point that is used for relay
Thank you Pada tanggal Kam, 28 Feb 2019 10.01 mas wanto <wantom428 at gmail.com menulis: > Sam broadcaster and fallback mount > > Pada tanggal Kam, 28 Feb 2019 09.58 Leonardo Oliveira Ortiz < > leonardo.ortiz at marisolsa.com menulis: > >> Hello. >> >> >> >> We are using icecast to relay a radio station on local network and I have >> a
2016 Oct 28
2
CVE-2016-5195 “DirtyCOW”: Critical Linux Kernel Flaw
On Fri, October 28, 2016 9:43 am, Johnny Hughes wrote: > On 10/22/2016 07:49 PM, Valeri Galtsev wrote: >> Dear All, >> >> I guess, we all have to urgently apply workaround, following, say, this: >> >> https://gryzli.info/2016/10/21/protect-cve-2016-5195-dirtycow-centos-7rhel7cpanelcloudlinux/ >> >> At least those of us who still have important multi
2016 Mar 10
0
CVE-2016-1285 & CVE-2016-1286
On 10/03/16 14:47, Leonardo Oliveira Ortiz wrote: > Hello. > > I think Centos are affected, right? > > Some update from Centos? > _______________________________________________ > CentOS mailing list > CentOS at centos.org > https://lists.centos.org/mailman/listinfo/centos > Sure looks that way... https://access.redhat.com/security/cve/cve-2016-1285
2015 Aug 06
1
RES: why no recent bind update for CentOS 6?
On Thu, Aug 06, 2015 at 01:54:21PM +0000, Leonardo Oliveira Ortiz wrote: > But what version is recommended to use ? RHEL release or ISC ? From > RHEL is 9.8 and ISC 9.10... I suggest re-reading this whole thread. Use the package that's provided by CentOS. -- Jonathan Billings <billings at negate.org>
2015 Aug 06
2
why no recent bind update for CentOS 6?
On Wed, 2015-08-05 at 21:59 -0500, Johnny Hughes wrote: > To reiterate, CentOS is built using the RHEL source code .. but it is > NOT even close to being a CLONE of RHEL. Thank you for your explanation. Best wishes, Paul. England, EU. England's place is in the European Union.
2020 Jun 10
2
can we help with libvorbis release for CVE fixes?
Hi libvorbis developers! I'm wondering if you had a chance to see my request for releasing a new libvorvis version - this is to have an official libvorbis release containing the CVE fixes that appear to be fixed in the master branch. Is there anything we can do to help with getting a release out? We're happy to work with you on this. Please let us know if we can do anything to help
2020 Jun 12
4
can we help with libvorbis release for CVE fixes?
Hi Ralph, Thank you for your reply! For context -- we consider reported CVEs as bugs even if it's in a third-party library we use (such as libvorbis). We first determine if the CVE is something that would impact our customer workflows. In this case because of our use of libvorbis for audio I/O, it does impact our customers so we need to resolve the CVE as soon as possible. In the
2020 Jun 30
2
can we help with libvorbis release for CVE fixes?
Yes, the gitlab instance is the correct upstream development repository. We maintain a mirror at github for the convenience of developers there. Cheers, Ralph On Mon, 2020-06-29 at 21:27 +0000, Ellen Johnson wrote: > Hi Ralph and libvorbis developers, > I thought the vorbis gitlab project was the main development site ( > https://gitlab.xiph.org/xiph/vorbis) because that's what
2020 Jul 07
2
new 1.3.7 and fix for CVE-2018-10392 (issue 2335)?
Hi Ralph, Again, thanks so much for doing all this! Plus thanks to all the folks who contributed to the new release! Quick clarifying question -- Isn't CVE-2018-10392 (looks like it’s fixed in https://gitlab.xiph.org/xiph/vorbis/-/issues/2335) also included in new version 1.3.7? If so can you please add it to release notes? (I asked the same question in
2016 Nov 01
0
CVE-2016-5195 DirtyCOW: Critical Linux Kernel Flaw
In article <5818CD31.4050008 at moving-picture.com>, James Pearson <james-p at moving-picture.com> wrote: > Leonardo Oliveira Ortiz wrote: > > RedHat and Centos 4.x can be explored by this flaw? > > See: > > https://access.redhat.com/security/cve/cve-2016-5195 In other words, no: RHEL 4 and CentOS4 are not affected by this flaw. Tony -- Tony Mountifield
2016 Nov 02
0
CVE-2016-5195 DirtyCOW: Critical Linux Kernel Flaw
> Date: Tuesday, November 01, 2016 18:49:56 -0500 > From: Valeri Galtsev <galtsev at kicp.uchicago.edu> > > On Tue, November 1, 2016 6:25 pm, Tony Mountifield wrote: >> In article <5818CD31.4050008 at moving-picture.com>, >> James Pearson <james-p at moving-picture.com> wrote: >>> Leonardo Oliveira Ortiz wrote: >>> > RedHat and Centos
2016 Mar 08
4
Need Help to Fix CVE-2008-1483, CVE-2008-5161, CVE-2015-5600 and CVE-2015-6565
Hi All, Actually I am working with the OpenSSH version 6.2p which is vulnerable to above mentioned vulnerabilities. So am looking for some help how I can fix these vulnerabilities in my version. I need to fix it in the OpenSSH code. Regards Abhishek