Displaying 20 results from an estimated 120 matches similar to: "CentOS-announce Digest, Vol 140, Issue 3"
2016 Oct 05
0
CESA-2016:2006 Important CentOS 6 kernel Security Update
CentOS Errata and Security Advisory 2016:2006 Important
Upstream details at : https://rhn.redhat.com/errata/RHSA-2016-2006.html
The following updated files have been uploaded and are currently
syncing to the mirrors: ( sha256sum Filename )
i386:
810ff04c87c510188497a9e532d30337092e09b739dd997942e64e085d41895e kernel-2.6.32-642.6.1.el6.i686.rpm
2016 Oct 26
2
CVE-2016-5195 DirtyCOW : Critical Linux Kernel Flaw
On Tue, Oct 25, 2016 at 10:26 AM, Leon Fauster
<leonfauster at googlemail.com> wrote:
> Am 25.10.2016 um 15:39 schrieb Peter Kjellstr?m <cap at nsc.liu.se>:
>> On Tue, 25 Oct 2016 10:06:12 +0200
>> Christian Anthon <anthon at rth.dk> wrote:
>>
>>> What is the best approach on centos 6 to mitigate the problem is
>>> officially patched? As far
2016 Oct 26
1
CVE-2016-5195 DirtyCOW : Critical Linux Kernel Flaw
On 10/26/2016 05:56 AM, Peter Kjellstr?m wrote:
> On Tue, 25 Oct 2016 17:21:54 -0700
> Akemi Yagi <amyagi at gmail.com> wrote:
>
>> On Tue, Oct 25, 2016 at 10:26 AM, Leon Fauster
>> <leonfauster at googlemail.com> wrote:
>>> Am 25.10.2016 um 15:39 schrieb Peter Kjellstr?m <cap at nsc.liu.se>:
>>>> On Tue, 25 Oct 2016 10:06:12 +0200
2016 Dec 04
2
RES: RES: v2.2.27 released
I don't see it, and can't really think of a good reason why it would happen. This happens in configure? And the first thing you ran was configure, right? No autogen.sh or autoconf/automake?
-bash-4.1# cat /etc/redhat-release
CentOS release 6.8 (Final)
-bash-4.1# uname -a
Linux test-centos6.dovecot.net 2.6.32-642.6.1.el6.x86_64 #1 SMP Wed Oct 5 00:36:12 UTC 2016 x86_64 x86_64 x86_64
2016 Oct 26
0
CVE-2016-5195 DirtyCOW : Critical Linux Kernel Flaw
On Tue, 25 Oct 2016 17:21:54 -0700
Akemi Yagi <amyagi at gmail.com> wrote:
> On Tue, Oct 25, 2016 at 10:26 AM, Leon Fauster
> <leonfauster at googlemail.com> wrote:
> > Am 25.10.2016 um 15:39 schrieb Peter Kjellstr?m <cap at nsc.liu.se>:
> >> On Tue, 25 Oct 2016 10:06:12 +0200
> >> Christian Anthon <anthon at rth.dk> wrote:
> >>
2016 Oct 30
0
Power Cut
On 10/29/2016 10:12 PM, Hadi Motamedi wrote:
> I am using a centos server for cdr billing and mediation device on a remote
> network. I am experiencing problem that I am suspicious it comes from main
> supply power cut at the remote site. The power supply to the remote site
> comes from battery charger that will be automatically switched in circuit
> under main supply power cut but
2016 Dec 04
0
RES: RES: RES: v2.2.27 released
This happens on configure, I only ran ./configure.
This error is logged to stderr:
[root at host1 dovecot]# wget https://dovecot.org/releases/2.2/dovecot-2.2.27.tar.gz
[root at host1 dovecot]# tar xzf dovecot-2.2.27.tar.gz
[root at host1 dovecot]# cd dovecot-2.2.27
[root at host1 dovecot-2.2.27]# ./configure --with-ldap=yes --with-zlib --with-bzlib --with-solr > foo
configure: error:
2016 Oct 30
2
Power Cut
Thank you very much for your reply . So you mean under the
/var/log/messages it is distinguishable that which logs come from operator
initiated reboot and which ones come from sudden power cut and then booting
from scratch when power resumed ? Am I correct ?
On Sat, Oct 29, 2016 at 11:44 PM, John R Pierce <pierce at hogranch.com> wrote:
> On 10/29/2016 10:12 PM, Hadi Motamedi wrote:
2016 Oct 25
5
CVE-2016-5195 DirtyCOW : Critical Linux Kernel Flaw
On Tue, 25 Oct 2016 10:06:12 +0200
Christian Anthon <anthon at rth.dk> wrote:
> What is the best approach on centos 6 to mitigate the problem is
> officially patched? As far as I can tell Centos 6 is vulnerable to
> attacks using ptrace.
I can confirm that c6 is vulnerable, we're running a patched kernel
(local build) using a rhel6 adaptation of the upstream fix.
Ask
2008 Jun 03
0
FIPS 140-2 OpenSSL(2007) patches
Hi Oren,
I'd VERY MUCH appreciate if you could send me a unified patch file for
openssh with fips.
In the meanwhile I'll try to work with the ones you posted.
BTW, I'm CentOS-5.1 based. My native openssh is 4.3p2. Do you think
your patch may be valid for that baseline as well? Could you make one?
I know this is a lot to ask for. Are there any other alternatives?
Many
2002 Mar 07
0
[Bug 140] Solaris 8 cannot create pkg in OpenSSH 3.1p1 (fwd)
Forwarded message:
> In $openSSH/contrib/solaris/buildpkg.sh
> line 13:
> VERSION=`tail -1 ../../version.h | sed -e 's/.*_\([0-9]\)/\1/g' | sed 's/\"$//'`
> needs to change to
> line 13:
> VERSION=`tail -2 ../../version.h | sed -e 's/.*_\([0-9]\)/\1/g' | sed 's/\"$//'`
>
> This fixes the pkgcreation problem on Solaris 8
This
2010 Mar 15
1
5.4p1 and FIPS 140-2
My office is working with government contracts, and it appears that they
are wanting FIPS enabled OpenSSL and OpenSSH is coming in the next year.
We have been able to compile OpenSSL to create the container, but all
the diffs to enable FIPS 140-2 in OpenSSH are for 5.3p1. Will the diffs
from:
https://bugzilla.mindrot.org/attachment.cgi?id=1789&action=edit
build in 5.4p1 will a little
2002 Mar 07
2
[Bug 140] Solaris 8 cannot create pkg in OpenSSH 3.1p1
http://bugzilla.mindrot.org/show_bug.cgi?id=140
------- Additional Comments From mozilla at mediaone.net 2002-03-08 08:33 -------
Ok found the bug,
In $openSSH/contrib/solaris/buildpkg.sh
line 13:
VERSION=`tail -1 ../../version.h | sed -e 's/.*_\([0-9]\)/\1/g' | sed 's/\"$//'`
needs to change to
line 13:
VERSION=`tail -2 ../../version.h | sed -e
2011 Aug 03
0
OpenSSH and FIPS 140-2
Does anyone knows why in some OpenSSH patches for FIPS we have something like:
SSLeay_add_all_algorithms();
if (FIPS_mode() && !FIPSCHECK_verify(NULL, NULL)) {
fprintf(stderr,
"FIPS integrity verification test failed.\n");
exit(3);
}
This block of code is always in main() soon after starting
service/client. Why are they
2013 Oct 10
3
FIPS 140-2 patch for openssh 6.3.p1
Hi,
Is FIPS 140-2 patch for openssh 6.3.p1 available somewhere or do I have to
make one using
http://www.openssl.com/export/openssh/openssh-6.0p1.fips-revised.patch ?
Regards,
Manish
2014 Feb 17
1
[ DRAFT PATCH ] - FIPS 140-2 patch for OpenSSH 6.5p1
Hi,
Here is FIPS 140-2 patch for OpenSSH 6.5p1. Since our expertise in OpenSSH
code is limited, request moderators to validate this patch and update as
required.
Regards,
Manish Jagtap
2014 Feb 17
0
[Bug 2202] New: [ DRAFT PATCH ] - FIPS 140-2 patch for OpenSSH 6.5p1
https://bugzilla.mindrot.org/show_bug.cgi?id=2202
Bug ID: 2202
Summary: [ DRAFT PATCH ] - FIPS 140-2 patch for OpenSSH 6.5p1
Product: Portable OpenSSH
Version: 6.5p1
Hardware: Other
OS: Linux
Status: NEW
Severity: normal
Priority: P5
Component: Miscellaneous
Assignee:
2019 Feb 03
0
[PATCH 3.16 140/305] x86/hyper-v: Enable PIT shutdown quirk
3.16.63-rc1 review patch. If anyone has any objections, please let me know.
------------------
From: Michael Kelley <mikelley at microsoft.com>
commit 1de72c706488b7be664a601cf3843bd01e327e58 upstream.
Hyper-V emulation of the PIT has a quirk such that the normal PIT shutdown
path doesn't work, because clearing the counter register restarts the
timer.
Disable the counter clearing
2016 Oct 07
0
CentOS-announce Digest, Vol 140, Issue 4
Send CentOS-announce mailing list submissions to
centos-announce at centos.org
To subscribe or unsubscribe via the World Wide Web, visit
https://lists.centos.org/mailman/listinfo/centos-announce
or, via email, send a message with subject or body 'help' to
centos-announce-request at centos.org
You can reach the person managing the list at
centos-announce-owner at centos.org
When
2017 Feb 24
0
Quota usage value shows 140% of actual disk usage
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
On Fri, 24 Feb 2017, Umut Erol Ka?ar wrote:
> investigated and found that Dovecot shows a quota usage value roughly
> around 140% of actual disk usage. It's also valid on newly created
> accounts. My test account for example:
Quota does not count physical useage, but the amount of bytes
allocated by the messages. Maildir may hardlink