similar to: CESA-2015:1705 Important CentOS 6 bind Security Update

Displaying 20 results from an estimated 100 matches similar to: "CESA-2015:1705 Important CentOS 6 bind Security Update"

2015 Sep 03
0
CentOS-announce Digest, Vol 127, Issue 2
Send CentOS-announce mailing list submissions to centos-announce at centos.org To subscribe or unsubscribe via the World Wide Web, visit https://lists.centos.org/mailman/listinfo/centos-announce or, via email, send a message with subject or body 'help' to centos-announce-request at centos.org You can reach the person managing the list at centos-announce-owner at centos.org When
2015 Nov 10
0
CESA-2015:2019 Low CentOS 6 sssd Security Update
CentOS Errata and Security Advisory 2015:2019 Low Upstream details at : https://rhn.redhat.com/errata/RHSA-2015-2019.html The following updated files have been uploaded and are currently syncing to the mirrors: ( sha256sum Filename ) i386: 40caff8fde0a913ae003a86f01c064d7e967b738587b46fa351d128e449c3993 libipa_hbac-1.12.4-47.el6_7.4.i686.rpm
2015 Dec 16
0
CEBA-2015:2635 CentOS 6 lvm2 BugFix Update
CentOS Errata and Bugfix Advisory 2015:2635 Upstream details at : https://rhn.redhat.com/errata/RHBA-2015-2635.html The following updated files have been uploaded and are currently syncing to the mirrors: ( sha256sum Filename ) i386: 2c0c96d6a8fd6a164e4d5998acdc84ee36c2d99561210dccec954217acf83ffe cmirror-2.02.118-3.el6_7.4.i686.rpm
2015 Aug 13
0
CEBA-2015:1616 CentOS 6 selinux-policy BugFix Update
CentOS Errata and Bugfix Advisory 2015:1616 Upstream details at : https://rhn.redhat.com/errata/RHBA-2015-1616.html The following updated files have been uploaded and are currently syncing to the mirrors: ( sha256sum Filename ) i386: 8b4fd766a3b8fdcea6b63d84fb6f2cb7353f62a4e6eaacc98ef7d054d391f4bc selinux-policy-3.7.19-279.el6_7.4.noarch.rpm
2016 Mar 01
0
CESA-2016:0301 Important CentOS 6 openssl Security Update
CentOS Errata and Security Advisory 2016:0301 Important Upstream details at : https://rhn.redhat.com/errata/RHSA-2016-0301.html The following updated files have been uploaded and are currently syncing to the mirrors: ( sha256sum Filename ) i386: 31cacdfe88b5e4b420bd2dd1fe6b491b35a2a57c7e3b4ef5b960573b095fc519 openssl-1.0.1e-42.el6_7.4.i686.rpm
2016 Mar 02
0
CentOS-announce Digest, Vol 133, Issue 1
Send CentOS-announce mailing list submissions to centos-announce at centos.org To subscribe or unsubscribe via the World Wide Web, visit https://lists.centos.org/mailman/listinfo/centos-announce or, via email, send a message with subject or body 'help' to centos-announce-request at centos.org You can reach the person managing the list at centos-announce-owner at centos.org When
2015 Dec 16
0
CentOS-announce Digest, Vol 130, Issue 5
Send CentOS-announce mailing list submissions to centos-announce at centos.org To subscribe or unsubscribe via the World Wide Web, visit https://lists.centos.org/mailman/listinfo/centos-announce or, via email, send a message with subject or body 'help' to centos-announce-request at centos.org You can reach the person managing the list at centos-announce-owner at centos.org When
2016 Feb 01
0
CESA-2016:0082 Important CentOS 6 qemu-kvm Security Update
CentOS Errata and Security Advisory 2016:0082 Important Upstream details at : https://rhn.redhat.com/errata/RHSA-2016-0082.html The following updated files have been uploaded and are currently syncing to the mirrors: ( sha256sum Filename ) i386: a1f7d969256f40bceda80f8b528483daa4c46ffd1aa161d688b5213e82534728 qemu-guest-agent-0.12.1.2-2.479.el6_7.4.i686.rpm x86_64:
2016 Feb 01
0
CentOS-announce Digest, Vol 132, Issue 1
Send CentOS-announce mailing list submissions to centos-announce at centos.org To subscribe or unsubscribe via the World Wide Web, visit https://lists.centos.org/mailman/listinfo/centos-announce or, via email, send a message with subject or body 'help' to centos-announce-request at centos.org You can reach the person managing the list at centos-announce-owner at centos.org When
2015 Aug 14
0
CentOS-announce Digest, Vol 126, Issue 7
Send CentOS-announce mailing list submissions to centos-announce at centos.org To subscribe or unsubscribe via the World Wide Web, visit http://lists.centos.org/mailman/listinfo/centos-announce or, via email, send a message with subject or body 'help' to centos-announce-request at centos.org You can reach the person managing the list at centos-announce-owner at centos.org When
2016 Mar 16
2
Yum update issues
Hello all, When running yum update on a few of our servers, we get the following errors: Running Transaction Updating : openssl-1.0.1e-42.el6_7.4.x86_64 1/327 Updating : postgresql-libs-8.4.20-5.el6_7.cloudlinux.x86_64 2/327 Updating : kernel-firmware-2.6.32-673.8.1.lve1.4.3.el6.noarch 3/327 Updating : kmod-lve-1.4-3.1.el6.x86_64 4/327 Installing :
2016 Mar 29
2
USB 3.0 in qemu-kvm-0.12
I suspect I know the answer here, but is qemu-kvm-0.12 simply incapable of passing a USB 3.0 device to a guest? USB 2 devices work fine, but USB 3 -- nothing. USB 3.0 works fine in the host, of course. Currently using qemu-kvm-0.12.1.2-2.479.el6_7.4.x86_64 in CentOS 6.7. I'm guessing I have to upgrade to CentOS 7 to pass USB 3.0 devices to the guest. Hoping to avoid that just now. -- Bob
2015 Dec 18
2
How to delete a corrupt record from internal DNS
I accidentally created a SRV record with a false port. I then updated the port but was afraid of any consequences. So I deleted that record again and wanted to re-create it. But now I can't: "The record already exists." Observations: 1) I can't see it in the RSAT DNS gui, so I can't delete it there. 2) I also can't delete it via samba-tool (although I could delete
2016 Mar 30
0
USB 3.0 in qemu-kvm-0.12
On 29/03/16 22:03, Robert Nichols wrote: > I suspect I know the answer here, but is qemu-kvm-0.12 simply incapable > of passing a USB 3.0 device to a guest? USB 2 devices work fine, but > USB 3 -- nothing. USB 3.0 works fine in the host, of course. > > Currently using qemu-kvm-0.12.1.2-2.479.el6_7.4.x86_64 in CentOS 6.7. > > I'm guessing I have to upgrade to CentOS 7 to
2016 Jan 04
0
How to delete a corrupt record from internal DNS
No ideas on that? Ole Am 18.12.2015 um 13:44 schrieb Ole Traupe: > I accidentally created a SRV record with a false port. I then updated > the port but was afraid of any consequences. So I deleted that record > again and wanted to re-create it. But now I can't: "The record already > exists." > > Observations: > > > 1) I can't see it in the RSAT
2016 Jan 04
2
How to delete a corrupt record from internal DNS
On 04/01/16 17:23, Ole Traupe wrote: > No ideas on that? > > Ole > > > > Am 18.12.2015 um 13:44 schrieb Ole Traupe: >> I accidentally created a SRV record with a false port. I then updated >> the port but was afraid of any consequences. So I deleted that record >> again and wanted to re-create it. But now I can't: "The record >> already
2016 Jan 08
0
How to delete a corrupt record from internal DNS
Am 04.01.2016 um 19:24 schrieb Rowland penny: > On 04/01/16 17:23, Ole Traupe wrote: >> No ideas on that? >> >> Ole >> >> >> >> Am 18.12.2015 um 13:44 schrieb Ole Traupe: >>> I accidentally created a SRV record with a false port. I then >>> updated the port but was afraid of any consequences. So I deleted >>> that record
2015 Oct 05
3
Can one construct an IPTables rule to block on NS records?
This is the same origin that I reported on earlier. Apparently asking for an explanation of why they were probing our sites only encouraged them to make additional attempts. sshd: Authentication Failures: unknown (ip-173-201-178-18.ip.secureserver.net): 2 Time(s) unknown (ip-97-74-196-33.ip.secureserver.net): 2 Time(s) unknown (ip-97-74-202-95.ip.secureserver.net): 2
2016 Jan 08
0
How to delete a corrupt record from internal DNS
Am 08.01.2016 um 11:47 schrieb Rowland penny: > On 08/01/16 10:31, Ole Traupe wrote: >> >> >> Am 04.01.2016 um 19:24 schrieb Rowland penny: >>> On 04/01/16 17:23, Ole Traupe wrote: >>>> No ideas on that? >>>> >>>> Ole >>>> >>>> >>>> >>>> Am 18.12.2015 um 13:44 schrieb Ole Traupe:
2016 Mar 02
2
problem restoring ssl and vlc
greeting. a short while ago, i may have gone to a site i should not have. maybe. after visiting, i decided i would check for rpm updates. when yumex opened to available packages, it showed that; openssl.x86_64 0:1.0.1e-42.el6_7.4 was available, so i checked it, then clicked install button. during log display, i got error message, tried again. still got error. seems that there is a