Displaying 20 results from an estimated 100 matches similar to: "CESA-2015:1705 Important CentOS 6 bind Security Update"
2015 Sep 03
0
CentOS-announce Digest, Vol 127, Issue 2
Send CentOS-announce mailing list submissions to
centos-announce at centos.org
To subscribe or unsubscribe via the World Wide Web, visit
https://lists.centos.org/mailman/listinfo/centos-announce
or, via email, send a message with subject or body 'help' to
centos-announce-request at centos.org
You can reach the person managing the list at
centos-announce-owner at centos.org
When
2015 Nov 10
0
CESA-2015:2019 Low CentOS 6 sssd Security Update
CentOS Errata and Security Advisory 2015:2019 Low
Upstream details at : https://rhn.redhat.com/errata/RHSA-2015-2019.html
The following updated files have been uploaded and are currently
syncing to the mirrors: ( sha256sum Filename )
i386:
40caff8fde0a913ae003a86f01c064d7e967b738587b46fa351d128e449c3993 libipa_hbac-1.12.4-47.el6_7.4.i686.rpm
2015 Dec 16
0
CEBA-2015:2635 CentOS 6 lvm2 BugFix Update
CentOS Errata and Bugfix Advisory 2015:2635
Upstream details at : https://rhn.redhat.com/errata/RHBA-2015-2635.html
The following updated files have been uploaded and are currently
syncing to the mirrors: ( sha256sum Filename )
i386:
2c0c96d6a8fd6a164e4d5998acdc84ee36c2d99561210dccec954217acf83ffe cmirror-2.02.118-3.el6_7.4.i686.rpm
2015 Aug 13
0
CEBA-2015:1616 CentOS 6 selinux-policy BugFix Update
CentOS Errata and Bugfix Advisory 2015:1616
Upstream details at : https://rhn.redhat.com/errata/RHBA-2015-1616.html
The following updated files have been uploaded and are currently
syncing to the mirrors: ( sha256sum Filename )
i386:
8b4fd766a3b8fdcea6b63d84fb6f2cb7353f62a4e6eaacc98ef7d054d391f4bc selinux-policy-3.7.19-279.el6_7.4.noarch.rpm
2016 Mar 01
0
CESA-2016:0301 Important CentOS 6 openssl Security Update
CentOS Errata and Security Advisory 2016:0301 Important
Upstream details at : https://rhn.redhat.com/errata/RHSA-2016-0301.html
The following updated files have been uploaded and are currently
syncing to the mirrors: ( sha256sum Filename )
i386:
31cacdfe88b5e4b420bd2dd1fe6b491b35a2a57c7e3b4ef5b960573b095fc519 openssl-1.0.1e-42.el6_7.4.i686.rpm
2016 Mar 02
0
CentOS-announce Digest, Vol 133, Issue 1
Send CentOS-announce mailing list submissions to
centos-announce at centos.org
To subscribe or unsubscribe via the World Wide Web, visit
https://lists.centos.org/mailman/listinfo/centos-announce
or, via email, send a message with subject or body 'help' to
centos-announce-request at centos.org
You can reach the person managing the list at
centos-announce-owner at centos.org
When
2015 Dec 16
0
CentOS-announce Digest, Vol 130, Issue 5
Send CentOS-announce mailing list submissions to
centos-announce at centos.org
To subscribe or unsubscribe via the World Wide Web, visit
https://lists.centos.org/mailman/listinfo/centos-announce
or, via email, send a message with subject or body 'help' to
centos-announce-request at centos.org
You can reach the person managing the list at
centos-announce-owner at centos.org
When
2016 Feb 01
0
CESA-2016:0082 Important CentOS 6 qemu-kvm Security Update
CentOS Errata and Security Advisory 2016:0082 Important
Upstream details at : https://rhn.redhat.com/errata/RHSA-2016-0082.html
The following updated files have been uploaded and are currently
syncing to the mirrors: ( sha256sum Filename )
i386:
a1f7d969256f40bceda80f8b528483daa4c46ffd1aa161d688b5213e82534728 qemu-guest-agent-0.12.1.2-2.479.el6_7.4.i686.rpm
x86_64:
2016 Feb 01
0
CentOS-announce Digest, Vol 132, Issue 1
Send CentOS-announce mailing list submissions to
centos-announce at centos.org
To subscribe or unsubscribe via the World Wide Web, visit
https://lists.centos.org/mailman/listinfo/centos-announce
or, via email, send a message with subject or body 'help' to
centos-announce-request at centos.org
You can reach the person managing the list at
centos-announce-owner at centos.org
When
2015 Aug 14
0
CentOS-announce Digest, Vol 126, Issue 7
Send CentOS-announce mailing list submissions to
centos-announce at centos.org
To subscribe or unsubscribe via the World Wide Web, visit
http://lists.centos.org/mailman/listinfo/centos-announce
or, via email, send a message with subject or body 'help' to
centos-announce-request at centos.org
You can reach the person managing the list at
centos-announce-owner at centos.org
When
2016 Mar 16
2
Yum update issues
Hello all,
When running yum update on a few of our servers, we get the following
errors:
Running Transaction
Updating : openssl-1.0.1e-42.el6_7.4.x86_64
1/327
Updating : postgresql-libs-8.4.20-5.el6_7.cloudlinux.x86_64
2/327
Updating : kernel-firmware-2.6.32-673.8.1.lve1.4.3.el6.noarch
3/327
Updating : kmod-lve-1.4-3.1.el6.x86_64
4/327
Installing :
2016 Mar 29
2
USB 3.0 in qemu-kvm-0.12
I suspect I know the answer here, but is qemu-kvm-0.12 simply incapable
of passing a USB 3.0 device to a guest? USB 2 devices work fine, but
USB 3 -- nothing. USB 3.0 works fine in the host, of course.
Currently using qemu-kvm-0.12.1.2-2.479.el6_7.4.x86_64 in CentOS 6.7.
I'm guessing I have to upgrade to CentOS 7 to pass USB 3.0 devices
to the guest. Hoping to avoid that just now.
--
Bob
2015 Dec 18
2
How to delete a corrupt record from internal DNS
I accidentally created a SRV record with a false port. I then updated
the port but was afraid of any consequences. So I deleted that record
again and wanted to re-create it. But now I can't: "The record already
exists."
Observations:
1) I can't see it in the RSAT DNS gui, so I can't delete it there.
2) I also can't delete it via samba-tool (although I could delete
2016 Mar 30
0
USB 3.0 in qemu-kvm-0.12
On 29/03/16 22:03, Robert Nichols wrote:
> I suspect I know the answer here, but is qemu-kvm-0.12 simply incapable
> of passing a USB 3.0 device to a guest? USB 2 devices work fine, but
> USB 3 -- nothing. USB 3.0 works fine in the host, of course.
>
> Currently using qemu-kvm-0.12.1.2-2.479.el6_7.4.x86_64 in CentOS 6.7.
>
> I'm guessing I have to upgrade to CentOS 7 to
2016 Jan 04
0
How to delete a corrupt record from internal DNS
No ideas on that?
Ole
Am 18.12.2015 um 13:44 schrieb Ole Traupe:
> I accidentally created a SRV record with a false port. I then updated
> the port but was afraid of any consequences. So I deleted that record
> again and wanted to re-create it. But now I can't: "The record already
> exists."
>
> Observations:
>
>
> 1) I can't see it in the RSAT
2016 Jan 04
2
How to delete a corrupt record from internal DNS
On 04/01/16 17:23, Ole Traupe wrote:
> No ideas on that?
>
> Ole
>
>
>
> Am 18.12.2015 um 13:44 schrieb Ole Traupe:
>> I accidentally created a SRV record with a false port. I then updated
>> the port but was afraid of any consequences. So I deleted that record
>> again and wanted to re-create it. But now I can't: "The record
>> already
2016 Jan 08
0
How to delete a corrupt record from internal DNS
Am 04.01.2016 um 19:24 schrieb Rowland penny:
> On 04/01/16 17:23, Ole Traupe wrote:
>> No ideas on that?
>>
>> Ole
>>
>>
>>
>> Am 18.12.2015 um 13:44 schrieb Ole Traupe:
>>> I accidentally created a SRV record with a false port. I then
>>> updated the port but was afraid of any consequences. So I deleted
>>> that record
2015 Oct 05
3
Can one construct an IPTables rule to block on NS records?
This is the same origin that I reported on earlier. Apparently asking
for an explanation of why they were probing our sites only encouraged
them to make additional attempts.
sshd:
Authentication Failures:
unknown (ip-173-201-178-18.ip.secureserver.net): 2 Time(s)
unknown (ip-97-74-196-33.ip.secureserver.net): 2 Time(s)
unknown (ip-97-74-202-95.ip.secureserver.net): 2
2016 Jan 08
0
How to delete a corrupt record from internal DNS
Am 08.01.2016 um 11:47 schrieb Rowland penny:
> On 08/01/16 10:31, Ole Traupe wrote:
>>
>>
>> Am 04.01.2016 um 19:24 schrieb Rowland penny:
>>> On 04/01/16 17:23, Ole Traupe wrote:
>>>> No ideas on that?
>>>>
>>>> Ole
>>>>
>>>>
>>>>
>>>> Am 18.12.2015 um 13:44 schrieb Ole Traupe:
2016 Mar 02
2
problem restoring ssl and vlc
greeting.
a short while ago, i may have gone to a site i should not have. maybe.
after visiting, i decided i would check for rpm updates.
when yumex opened to available packages, it showed that;
openssl.x86_64 0:1.0.1e-42.el6_7.4
was available, so i checked it, then clicked install button. during
log display, i got error message, tried again. still got error.
seems that there is a