similar to: CESA-2015:0092 Critical CentOS 6 glibc Security Update

Displaying 20 results from an estimated 100 matches similar to: "CESA-2015:0092 Critical CentOS 6 glibc Security Update"

2015 Jan 28
0
CentOS-announce Digest, Vol 119, Issue 10
Send CentOS-announce mailing list submissions to centos-announce at centos.org To subscribe or unsubscribe via the World Wide Web, visit http://lists.centos.org/mailman/listinfo/centos-announce or, via email, send a message with subject or body 'help' to centos-announce-request at centos.org You can reach the person managing the list at centos-announce-owner at centos.org When
2015 Jan 20
0
CESA-2015:0066 Moderate CentOS 6 openssl Security Update
CentOS Errata and Security Advisory 2015:0066 Moderate Upstream details at : https://rhn.redhat.com/errata/RHSA-2015-0066.html The following updated files have been uploaded and are currently syncing to the mirrors: ( sha256sum Filename ) i386: 0b92c578790913dffc24ce526b0465d216dd988451a5a9666a357a321969c276 openssl-1.0.1e-30.el6_6.5.i686.rpm
2015 Jun 22
0
CEBA-2015:1128 CentOS 6 selinux-policy BugFix Update
CentOS Errata and Bugfix Advisory 2015:1128 Upstream details at : https://rhn.redhat.com/errata/RHBA-2015-1128.html The following updated files have been uploaded and are currently syncing to the mirrors: ( sha256sum Filename ) i386: c34b15ba6f550ee470feeee3a1293da33163bd6ee541619e26951a9fc5b60138 selinux-policy-3.7.19-260.el6_6.5.noarch.rpm
2015 Mar 17
0
Re: Can't create any KVM template due to the error with libguestfs
Update me Richie, Meanwhile, I've booted the server in latest kernel, Its still not working for me. 2015-03-17 0:54 GMT+05:30 Thirumalai Nambi <thirumalai.sandy@gmail.com>: > > libtool-2.2.6-15.5.el6.x86_64 > upstart-0.6.5-13.el6_5.3.x86_64 > atmel-firmware-1.3-7.el6.noarch > redhat-rpm-config-9.0.3-42.el6.centos.noarch > plymouth-scripts-0.8.3-27.el6.centos.1.x86_64
2015 Jun 23
0
CentOS-announce Digest, Vol 124, Issue 11
Send CentOS-announce mailing list submissions to centos-announce at centos.org To subscribe or unsubscribe via the World Wide Web, visit http://lists.centos.org/mailman/listinfo/centos-announce or, via email, send a message with subject or body 'help' to centos-announce-request at centos.org You can reach the person managing the list at centos-announce-owner at centos.org When
2015 May 06
0
CEEA-2015:0951 CentOS 6 resource-agents Enhancement Update
CentOS Errata and Enhancement Advisory 2015:0951 Upstream details at : https://rhn.redhat.com/errata/RHEA-2015-0951.html The following updated files have been uploaded and are currently syncing to the mirrors: ( sha256sum Filename ) i386: 73d3f2924f5fada52153c6410c26b05304ed345be0ce15068a7623b26990bf28 resource-agents-3.9.5-12.el6_6.5.i686.rpm x86_64:
2015 Jan 21
0
CentOS-announce Digest, Vol 119, Issue 6
Send CentOS-announce mailing list submissions to centos-announce at centos.org To subscribe or unsubscribe via the World Wide Web, visit http://lists.centos.org/mailman/listinfo/centos-announce or, via email, send a message with subject or body 'help' to centos-announce-request at centos.org You can reach the person managing the list at centos-announce-owner at centos.org When
2015 Mar 16
4
Re: Can't create any KVM template due to the error with libguestfs
libtool-2.2.6-15.5.el6.x86_64 upstart-0.6.5-13.el6_5.3.x86_64 atmel-firmware-1.3-7.el6.noarch redhat-rpm-config-9.0.3-42.el6.centos.noarch plymouth-scripts-0.8.3-27.el6.centos.1.x86_64 patchutils-0.3.1-3.1.el6.x86_64 bc-1.06.95-1.el6.x86_64 cscope-15.6-6.el6.x86_64 coreutils-8.4-37.el6.x86_64 ncurses-devel-5.7-3.20090208.el6.x86_64 libselinux-utils-2.0.94-5.8.el6.x86_64
2015 Jan 27
4
CVE-2015-0235 - glibc gethostbyname
On Tue, January 27, 2015 1:58 pm, Peter Lawler wrote: > On 28/01/15 04:47, Always Learning wrote: >> >> Saw this on the Exim List:- >> > <SNIP> >> >> I use Exim on C5 and C6 - should I be worried about Exim on C6 ? >> > > upstream references: > https://rhn.redhat.com/errata/RHSA-2015-0092.html When I read this I read that it is fixed in
2015 Jan 27
0
CVE-2015-0235 - glibc gethostbyname
Packages are being built for CentOS 5, 6 & 7 at the moment: https://twitter.com/CentOS/status/560128242682966017 & https://twitter.com/CentOS/status/560138182441070592 On 27 January 2015 at 20:22, Valeri Galtsev <galtsev at kicp.uchicago.edu> wrote: > > On Tue, January 27, 2015 1:58 pm, Peter Lawler wrote: > > On 28/01/15 04:47, Always Learning wrote: > >> >
2015 Feb 27
7
Glibc sources?
All, Please excuse any ignorance in this e-mail as I am not a RH/CentOS/Fedora user and may blunder my way through the correct terminology for my request. I'm tasked with reconstructing the CentOS version of the GlibC library for testing with gethostbyname(). My mission is to show that we are not affected by the latest exploit for the product we are shipping targeted for RHEL and CentOS.
2015 May 06
0
CentOS-announce Digest, Vol 123, Issue 1
Send CentOS-announce mailing list submissions to centos-announce at centos.org To subscribe or unsubscribe via the World Wide Web, visit http://lists.centos.org/mailman/listinfo/centos-announce or, via email, send a message with subject or body 'help' to centos-announce-request at centos.org You can reach the person managing the list at centos-announce-owner at centos.org When
2015 Jan 27
0
CVE-2015-0235 - glibc gethostbyname
On 01/27/2015 12:22 PM, Valeri Galtsev wrote: > > On Tue, January 27, 2015 1:58 pm, Peter Lawler wrote: >> On 28/01/15 04:47, Always Learning wrote: >>> >>> Saw this on the Exim List:- >>> >> <SNIP> >>> >>> I use Exim on C5 and C6 - should I be worried about Exim on C6 ? >>> >> >> upstream references:
2015 Mar 01
0
Glibc sources?
On 02/27/2015 12:49 PM, ANDY KENNEDY wrote: > All, > > Please excuse any ignorance in this e-mail as I am not a RH/CentOS/Fedora user and may > blunder my way through the correct terminology for my request. No problem. > I'm tasked with reconstructing the CentOS version of the GlibC library for testing with > gethostbyname(). My mission is to show that we are not affected
2015 Mar 02
2
Glibc sources?
> > I'm tasked with reconstructing the CentOS version of the GlibC library for testing with > > gethostbyname(). My mission is to show that we are not affected by the latest exploit for > > the product we are shipping targeted for RHEL and CentOS. To do so, I want to equip > > gethostbyname() with additional code. > > Do you plan on shipping this updated glibc
2015 Jan 27
2
CVE-2015-0235 - glibc gethostbyname
On Tue, January 27, 2015 2:35 pm, Thomas Eriksson wrote: > On 01/27/2015 12:22 PM, Valeri Galtsev wrote: >> >> On Tue, January 27, 2015 1:58 pm, Peter Lawler wrote: >>> On 28/01/15 04:47, Always Learning wrote: >>>> >>>> Saw this on the Exim List:- >>>> >>> <SNIP> >>>> >>>> I use Exim on C5 and C6 -
2015 Mar 02
2
Glibc sources?
On 03/02/2015 11:00 AM, Johnny Hughes wrote: > On 03/02/2015 10:38 AM, ANDY KENNEDY wrote: >>>> I'm tasked with reconstructing the CentOS version of the GlibC library for testing with >>>> gethostbyname(). My mission is to show that we are not affected by the latest exploit for >>>> the product we are shipping targeted for RHEL and CentOS. To do so, I
2015 Mar 05
0
Glibc sources?
<snip> > > > The list of packages that were in the "mock build root" for our build of > the glibc-2.12-1.149.el6_6.5.x86_64.src.rpm is here: > > http://ur1.ca/ju24m > > To get close to an exact match, you need to use mock and use the > packages listed above (and only those versions) if you are trying to get > a build that matches what we built.
2015 Mar 16
2
Re: Can't create any KVM template due to the error with libguestfs
Hi, Two doubts. 1. What I've to replace in "NEEDED"? or I need to just run the whole command you given 2. You mean this one, rpm -qa | grep libguestfs* On Mon, Mar 16, 2015 at 5:35 PM, Richard W.M. Jones <rjones@redhat.com> wrote: > On Sat, Mar 14, 2015 at 11:14:55PM +0530, Thirumalai Nambi wrote: > > Thanks for your update, > > > > I got the
2015 Jan 27
3
CVE-2015-0235 - glibc gethostbyname
Saw this on the Exim List:- From: Tony Finch <dot--at-- at dotat.at> Subject: [exim] CVE-2015-0235 - glibc gethostbyname remotely exploitable via exim Date: Tue, 27 Jan 2015 17:33:45 +0000 "The Exim mail server is exploitable remotely if configured to perform extra security checks on the HELO and EHLO commands ("helo_verify_hosts" or "helo_try_verify_hosts"