similar to: CESA-2015:1706 Important CentOS 5 bind Security Update

Displaying 15 results from an estimated 15 matches similar to: "CESA-2015:1706 Important CentOS 5 bind Security Update"

2015 Sep 03
0
CentOS-announce Digest, Vol 127, Issue 2
Send CentOS-announce mailing list submissions to centos-announce at centos.org To subscribe or unsubscribe via the World Wide Web, visit https://lists.centos.org/mailman/listinfo/centos-announce or, via email, send a message with subject or body 'help' to centos-announce-request at centos.org You can reach the person managing the list at centos-announce-owner at centos.org When
2015 Dec 16
0
CESA-2015:2658 Important CentOS 5 bind97 Security Update
CentOS Errata and Security Advisory 2015:2658 Important Upstream details at : https://rhn.redhat.com/errata/RHSA-2015-2658.html The following updated files have been uploaded and are currently syncing to the mirrors: ( sha256sum Filename ) i386: 0dc7e37c9a0bfb8cfbe4ed0f47b8a2a7203c8e0827f1c1c3e58ad2e89acbceda bind97-9.7.0-21.P2.el5_11.4.i386.rpm
2016 Aug 23
0
CEBA-2016:1658 CentOS 5 cman BugFix Update
CentOS Errata and Bugfix Advisory 2016:1658 Upstream details at : https://rhn.redhat.com/errata/RHBA-2016-1658.html The following updated files have been uploaded and are currently syncing to the mirrors: ( sha256sum Filename ) i386: 7e60ccf2518f1d21f09b8dd19edb4130d43fe0442b3d0a9446aa78ec16d62763 cman-2.0.115-124.el5_11.4.i386.rpm
2015 Dec 17
0
CentOS-announce Digest, Vol 130, Issue 6
Send CentOS-announce mailing list submissions to centos-announce at centos.org To subscribe or unsubscribe via the World Wide Web, visit https://lists.centos.org/mailman/listinfo/centos-announce or, via email, send a message with subject or body 'help' to centos-announce-request at centos.org You can reach the person managing the list at centos-announce-owner at centos.org When
2014 Nov 25
0
CEEA-2014:1898 CentOS 5 dovecot Enhancement Update
CentOS Errata and Enhancement Advisory 2014:1898 Upstream details at : https://rhn.redhat.com/errata/RHEA-2014-1898.html The following updated files have been uploaded and are currently syncing to the mirrors: ( sha256sum Filename ) i386: 04c48a90c887dc9f7334dbc1b80bda482a5ad3ed7b41b313e374397ca1a93b0a dovecot-1.0.7-9.el5_11.4.i386.rpm x86_64:
2014 Nov 25
0
CentOS-announce Digest, Vol 117, Issue 14
Send CentOS-announce mailing list submissions to centos-announce at centos.org To subscribe or unsubscribe via the World Wide Web, visit http://lists.centos.org/mailman/listinfo/centos-announce or, via email, send a message with subject or body 'help' to centos-announce-request at centos.org You can reach the person managing the list at centos-announce-owner at centos.org When
2014 Sep 30
2
Bash package for CentOS5
Hi! I have noticed, that our mirror has this package bash-3.2-33.el5_11.4.x86_64.rpm, but a lot of other mirror still have bash-3.2-33.el5_10.4.x86_64.rpm. Since bash-3.2-33.el5_11.4.x86_64.rpm was issued on 26-Sep-2014 04:28, could this be the product of slower mirror update cycles? Regards, Mitja -- -- Mitja Miheli? ARNES, Tehnolo?ki park 18, p.p. 7, SI-1001 Ljubljana, Slovenia tel: +386
2016 Aug 24
0
CentOS-announce Digest, Vol 138, Issue 8
Send CentOS-announce mailing list submissions to centos-announce at centos.org To subscribe or unsubscribe via the World Wide Web, visit https://lists.centos.org/mailman/listinfo/centos-announce or, via email, send a message with subject or body 'help' to centos-announce-request at centos.org You can reach the person managing the list at centos-announce-owner at centos.org When
2014 Oct 09
2
Bash still vulnerable
According to the vulnerability test script from shellshocker.net, the latest bash versions on CentOS5 and CentOS6, 3.2-33.el5_11.4 and 4.1.2-15.el6_5.2, resp., are still vulnerable to CVE-2014-6277. In fact, on CentOS6, abrtd will send you a nice report about it. Does anyone know if upstream is working on a fix? [root at host ~]# bash ~/shellshock_test.sh CVE-2014-6271 (original shellshock):
2015 May 28
0
X-UID in mail header is removed?
Dear Dovecot Mailing List, I have 2 questions regarding dovecot and would very much appreciate if you would kindly give me helps. <Question 1> Is 'X-UID' no longer shown in mail header via pop3? I have checked with the following 3 version of dovecot packages in order to make sure if a message sent by dovecot have 'X-UID' in its mail header, and the result is that only
2014 Sep 26
4
URGENT! Shellshock fix DOES NOT fix the bug on CentOS 5.4
Good afternoon! After applying the latest bash RPM listed at http://lists.centos.org/pipermail/centos-announce/2014-September/020594.html : The fixed RPM (bash-3.2-33.el5_10.4.x86_64.rpm) DOES work just fine on CentOS 5.10. However, it DOES NOT work on CentOS 5.4. That is, bash runs fine, but IS STILL VULNERABLE TO SHELLSHOCK! Scary screenie at: http://i.imgur.com/yR7sBjV.png It looks like
2010 Jan 28
4
[Bug 1706] New: Set FD_CLOEXEC on accepted socket
https://bugzilla.mindrot.org/show_bug.cgi?id=1706 Summary: Set FD_CLOEXEC on accepted socket Product: Portable OpenSSH Version: 5.3p1 Platform: Other OS/Version: Linux Status: NEW Severity: normal Priority: P2 Component: sshd AssignedTo: unassigned-bugs at mindrot.org ReportedBy: jchadima
1998 Jun 03
0
SAMBA digest 1706 (PR#7484)
dan@gasboy.com wrote: > > > Me too. Samba 1.9.18p7. It doesn't happen right away, though. Several > days of running, and nmbd begins losing elections consistently, although > it is still responding. > > My workaround is a script that runs once a minute looking to see who is > master. When it sees the samba server isn't, kills nmbd on the > server then
1998 Jun 02
0
SAMBA digest 1706
> > ------------------------------ > > Date: Tue, 02 Jun 1998 17:28:41 +0000 > From: Jeff Wiegley <jeff@la.usweb.com> > To: samba@samba.anu.edu.au > Subject: ARGH!! why does my samba server lose domain master elections?? > Message-ID: <35743649.5CF3502F@la.usweb.com> > > Subject pretty much says it all. > > (And *please* don't point me
2023 Sep 19
4
[Bug 1706] New: Nft is slow when loading ruleset with lots of add element calls of different interval maps
https://bugzilla.netfilter.org/show_bug.cgi?id=1706 Bug ID: 1706 Summary: Nft is slow when loading ruleset with lots of add element calls of different interval maps Product: nftables Version: 1.0.x Hardware: x86_64 OS: Debian GNU/Linux Status: NEW Severity: normal Priority: