similar to: CentOS-announce Digest, Vol 140, Issue 3

Displaying 20 results from an estimated 120 matches similar to: "CentOS-announce Digest, Vol 140, Issue 3"

2016 Oct 05
0
CESA-2016:2006 Important CentOS 6 kernel Security Update
CentOS Errata and Security Advisory 2016:2006 Important Upstream details at : https://rhn.redhat.com/errata/RHSA-2016-2006.html The following updated files have been uploaded and are currently syncing to the mirrors: ( sha256sum Filename ) i386: 810ff04c87c510188497a9e532d30337092e09b739dd997942e64e085d41895e kernel-2.6.32-642.6.1.el6.i686.rpm
2016 Oct 26
2
CVE-2016-5195 DirtyCOW : Critical Linux Kernel Flaw
On Tue, Oct 25, 2016 at 10:26 AM, Leon Fauster <leonfauster at googlemail.com> wrote: > Am 25.10.2016 um 15:39 schrieb Peter Kjellstr?m <cap at nsc.liu.se>: >> On Tue, 25 Oct 2016 10:06:12 +0200 >> Christian Anthon <anthon at rth.dk> wrote: >> >>> What is the best approach on centos 6 to mitigate the problem is >>> officially patched? As far
2016 Oct 26
1
CVE-2016-5195 DirtyCOW : Critical Linux Kernel Flaw
On 10/26/2016 05:56 AM, Peter Kjellstr?m wrote: > On Tue, 25 Oct 2016 17:21:54 -0700 > Akemi Yagi <amyagi at gmail.com> wrote: > >> On Tue, Oct 25, 2016 at 10:26 AM, Leon Fauster >> <leonfauster at googlemail.com> wrote: >>> Am 25.10.2016 um 15:39 schrieb Peter Kjellstr?m <cap at nsc.liu.se>: >>>> On Tue, 25 Oct 2016 10:06:12 +0200
2016 Dec 04
2
RES: RES: v2.2.27 released
I don't see it, and can't really think of a good reason why it would happen. This happens in configure? And the first thing you ran was configure, right? No autogen.sh or autoconf/automake? -bash-4.1# cat /etc/redhat-release CentOS release 6.8 (Final) -bash-4.1# uname -a Linux test-centos6.dovecot.net 2.6.32-642.6.1.el6.x86_64 #1 SMP Wed Oct 5 00:36:12 UTC 2016 x86_64 x86_64 x86_64
2016 Oct 26
0
CVE-2016-5195 DirtyCOW : Critical Linux Kernel Flaw
On Tue, 25 Oct 2016 17:21:54 -0700 Akemi Yagi <amyagi at gmail.com> wrote: > On Tue, Oct 25, 2016 at 10:26 AM, Leon Fauster > <leonfauster at googlemail.com> wrote: > > Am 25.10.2016 um 15:39 schrieb Peter Kjellstr?m <cap at nsc.liu.se>: > >> On Tue, 25 Oct 2016 10:06:12 +0200 > >> Christian Anthon <anthon at rth.dk> wrote: > >>
2016 Oct 30
0
Power Cut
On 10/29/2016 10:12 PM, Hadi Motamedi wrote: > I am using a centos server for cdr billing and mediation device on a remote > network. I am experiencing problem that I am suspicious it comes from main > supply power cut at the remote site. The power supply to the remote site > comes from battery charger that will be automatically switched in circuit > under main supply power cut but
2016 Dec 04
0
RES: RES: RES: v2.2.27 released
This happens on configure, I only ran ./configure. This error is logged to stderr: [root at host1 dovecot]# wget https://dovecot.org/releases/2.2/dovecot-2.2.27.tar.gz [root at host1 dovecot]# tar xzf dovecot-2.2.27.tar.gz [root at host1 dovecot]# cd dovecot-2.2.27 [root at host1 dovecot-2.2.27]# ./configure --with-ldap=yes --with-zlib --with-bzlib --with-solr > foo configure: error:
2016 Oct 30
2
Power Cut
Thank you very much for your reply . So you mean under the /var/log/messages it is distinguishable that which logs come from operator initiated reboot and which ones come from sudden power cut and then booting from scratch when power resumed ? Am I correct ? On Sat, Oct 29, 2016 at 11:44 PM, John R Pierce <pierce at hogranch.com> wrote: > On 10/29/2016 10:12 PM, Hadi Motamedi wrote:
2016 Oct 25
5
CVE-2016-5195 DirtyCOW : Critical Linux Kernel Flaw
On Tue, 25 Oct 2016 10:06:12 +0200 Christian Anthon <anthon at rth.dk> wrote: > What is the best approach on centos 6 to mitigate the problem is > officially patched? As far as I can tell Centos 6 is vulnerable to > attacks using ptrace. I can confirm that c6 is vulnerable, we're running a patched kernel (local build) using a rhel6 adaptation of the upstream fix. Ask
2008 Jun 03
0
FIPS 140-2 OpenSSL(2007) patches
Hi Oren, I'd VERY MUCH appreciate if you could send me a unified patch file for openssh with fips. In the meanwhile I'll try to work with the ones you posted. BTW, I'm CentOS-5.1 based. My native openssh is 4.3p2. Do you think your patch may be valid for that baseline as well? Could you make one? I know this is a lot to ask for. Are there any other alternatives? Many
2002 Mar 07
0
[Bug 140] Solaris 8 cannot create pkg in OpenSSH 3.1p1 (fwd)
Forwarded message: > In $openSSH/contrib/solaris/buildpkg.sh > line 13: > VERSION=`tail -1 ../../version.h | sed -e 's/.*_\([0-9]\)/\1/g' | sed 's/\"$//'` > needs to change to > line 13: > VERSION=`tail -2 ../../version.h | sed -e 's/.*_\([0-9]\)/\1/g' | sed 's/\"$//'` > > This fixes the pkgcreation problem on Solaris 8 This
2010 Mar 15
1
5.4p1 and FIPS 140-2
My office is working with government contracts, and it appears that they are wanting FIPS enabled OpenSSL and OpenSSH is coming in the next year. We have been able to compile OpenSSL to create the container, but all the diffs to enable FIPS 140-2 in OpenSSH are for 5.3p1. Will the diffs from: https://bugzilla.mindrot.org/attachment.cgi?id=1789&action=edit build in 5.4p1 will a little
2002 Mar 07
2
[Bug 140] Solaris 8 cannot create pkg in OpenSSH 3.1p1
http://bugzilla.mindrot.org/show_bug.cgi?id=140 ------- Additional Comments From mozilla at mediaone.net 2002-03-08 08:33 ------- Ok found the bug, In $openSSH/contrib/solaris/buildpkg.sh line 13: VERSION=`tail -1 ../../version.h | sed -e 's/.*_\([0-9]\)/\1/g' | sed 's/\"$//'` needs to change to line 13: VERSION=`tail -2 ../../version.h | sed -e
2011 Aug 03
0
OpenSSH and FIPS 140-2
Does anyone knows why in some OpenSSH patches for FIPS we have something like: SSLeay_add_all_algorithms(); if (FIPS_mode() && !FIPSCHECK_verify(NULL, NULL)) { fprintf(stderr, "FIPS integrity verification test failed.\n"); exit(3); } This block of code is always in main() soon after starting service/client. Why are they
2013 Oct 10
3
FIPS 140-2 patch for openssh 6.3.p1
Hi, Is FIPS 140-2 patch for openssh 6.3.p1 available somewhere or do I have to make one using http://www.openssl.com/export/openssh/openssh-6.0p1.fips-revised.patch ? Regards, Manish
2014 Feb 17
1
[ DRAFT PATCH ] - FIPS 140-2 patch for OpenSSH 6.5p1
Hi, Here is FIPS 140-2 patch for OpenSSH 6.5p1. Since our expertise in OpenSSH code is limited, request moderators to validate this patch and update as required. Regards, Manish Jagtap
2014 Feb 17
0
[Bug 2202] New: [ DRAFT PATCH ] - FIPS 140-2 patch for OpenSSH 6.5p1
https://bugzilla.mindrot.org/show_bug.cgi?id=2202 Bug ID: 2202 Summary: [ DRAFT PATCH ] - FIPS 140-2 patch for OpenSSH 6.5p1 Product: Portable OpenSSH Version: 6.5p1 Hardware: Other OS: Linux Status: NEW Severity: normal Priority: P5 Component: Miscellaneous Assignee:
2019 Feb 03
0
[PATCH 3.16 140/305] x86/hyper-v: Enable PIT shutdown quirk
3.16.63-rc1 review patch. If anyone has any objections, please let me know. ------------------ From: Michael Kelley <mikelley at microsoft.com> commit 1de72c706488b7be664a601cf3843bd01e327e58 upstream. Hyper-V emulation of the PIT has a quirk such that the normal PIT shutdown path doesn't work, because clearing the counter register restarts the timer. Disable the counter clearing
2016 Oct 07
0
CentOS-announce Digest, Vol 140, Issue 4
Send CentOS-announce mailing list submissions to centos-announce at centos.org To subscribe or unsubscribe via the World Wide Web, visit https://lists.centos.org/mailman/listinfo/centos-announce or, via email, send a message with subject or body 'help' to centos-announce-request at centos.org You can reach the person managing the list at centos-announce-owner at centos.org When
2017 Feb 24
0
Quota usage value shows 140% of actual disk usage
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 On Fri, 24 Feb 2017, Umut Erol Ka?ar wrote: > investigated and found that Dovecot shows a quota usage value roughly > around 140% of actual disk usage. It's also valid on newly created > accounts. My test account for example: Quota does not count physical useage, but the amount of bytes allocated by the messages. Maildir may hardlink