Displaying 11 results from an estimated 11 matches similar to: "CESA-2016:2105 Important CentOS 6 kernel Security Update"
2016 Oct 26
0
CentOS-announce Digest, Vol 140, Issue 9
Send CentOS-announce mailing list submissions to
centos-announce at centos.org
To subscribe or unsubscribe via the World Wide Web, visit
https://lists.centos.org/mailman/listinfo/centos-announce
or, via email, send a message with subject or body 'help' to
centos-announce-request at centos.org
You can reach the person managing the list at
centos-announce-owner at centos.org
When
2016 Oct 26
2
CVE-2016-5195 DirtyCOW : Critical Linux Kernel Flaw
On Tue, Oct 25, 2016 at 10:26 AM, Leon Fauster
<leonfauster at googlemail.com> wrote:
> Am 25.10.2016 um 15:39 schrieb Peter Kjellstr?m <cap at nsc.liu.se>:
>> On Tue, 25 Oct 2016 10:06:12 +0200
>> Christian Anthon <anthon at rth.dk> wrote:
>>
>>> What is the best approach on centos 6 to mitigate the problem is
>>> officially patched? As far
2017 Jan 03
2
Result: hostbyte=DID_ERROR driverbyte=DRIVER_OK
I am trying to copy(~7TB of data using rsync) between two server in same
data center in the backend its using EMC VMAX3
After copying ~30-40GB of data multipath start failing
Dec 15 01:57:53 test.example.com multipathd:
360000970000196801239533037303434: Recovered to normal mode
Dec 15 01:57:53 test.example.com multipathd:
360000970000196801239533037303434: remaining active paths: 1
Dec 15
2016 Oct 26
1
CVE-2016-5195 DirtyCOW : Critical Linux Kernel Flaw
On 10/26/2016 05:56 AM, Peter Kjellstr?m wrote:
> On Tue, 25 Oct 2016 17:21:54 -0700
> Akemi Yagi <amyagi at gmail.com> wrote:
>
>> On Tue, Oct 25, 2016 at 10:26 AM, Leon Fauster
>> <leonfauster at googlemail.com> wrote:
>>> Am 25.10.2016 um 15:39 schrieb Peter Kjellstr?m <cap at nsc.liu.se>:
>>>> On Tue, 25 Oct 2016 10:06:12 +0200
2016 Oct 26
0
CVE-2016-5195 DirtyCOW : Critical Linux Kernel Flaw
On Tue, 25 Oct 2016 17:21:54 -0700
Akemi Yagi <amyagi at gmail.com> wrote:
> On Tue, Oct 25, 2016 at 10:26 AM, Leon Fauster
> <leonfauster at googlemail.com> wrote:
> > Am 25.10.2016 um 15:39 schrieb Peter Kjellstr?m <cap at nsc.liu.se>:
> >> On Tue, 25 Oct 2016 10:06:12 +0200
> >> Christian Anthon <anthon at rth.dk> wrote:
> >>
CESA-2105:X001 Important xen kernel libvirt python-virtinst e1000e (Xen4CentOS Only) Security Update
2015 Jan 07
0
CESA-2105:X001 Important xen kernel libvirt python-virtinst e1000e (Xen4CentOS Only) Security Update
The following packages are updated for Xen4CentOS for CentOS 6:
Source:
942bc436e401c798991ae4ca956082c12a5a3b65ec53cd7ec9901dda7704f9b7 e1000e-2.5.4-3.10.63.2.el6.centos.alt.src.rpm
aa46f97636568c46295d2d99f1e33b5fda50df707a2a8321a516200b8b4e95a6 kernel-3.10.63-11.el6.centos.alt.src.rpm
ea44d2658e096ef6f00f7dfd4fecc6bff977d959563e4929539d23643b134c3a libvirt-0.10.2.8-9.el6.centos.alt.src.rpm
2013 May 15
14
[Bug 2105] New: ssh-copy-id leads to rm -f * (local vs. dash)
https://bugzilla.mindrot.org/show_bug.cgi?id=2105
Bug ID: 2105
Summary: ssh-copy-id leads to rm -f * (local vs. dash)
Classification: Unclassified
Product: Portable OpenSSH
Version: 6.2p1
Hardware: Other
URL: http://bugs.debian.org/708419
OS: Linux
Status: NEW
Severity: major
2017 Feb 24
2
Quota usage value shows 140% of actual disk usage
Hello everyone,
Our server has these installed:
dovecot-2.0.21-2.el6.x86_64
dovecot-pigeonhole-2.0.21-2.el6.x86_64
dovecot-mysql-2.0.21-2.el6.x86_64
...and has been running for quite a long time, with several hundred domains
and thousands of accounts on it. My colleagues reported that it's been
showing quota usage values that are more than actual disk usage, so I
investigated and found that
2016 Oct 25
5
CVE-2016-5195 DirtyCOW : Critical Linux Kernel Flaw
On Tue, 25 Oct 2016 10:06:12 +0200
Christian Anthon <anthon at rth.dk> wrote:
> What is the best approach on centos 6 to mitigate the problem is
> officially patched? As far as I can tell Centos 6 is vulnerable to
> attacks using ptrace.
I can confirm that c6 is vulnerable, we're running a patched kernel
(local build) using a rhel6 adaptation of the upstream fix.
Ask
2016 Nov 11
6
Asterisk 11.24.1 garbled audio
>Information on timing sources can be found here:
>https://wiki.asterisk.org/wiki/display/AST/Timing+Interfaces
>As noted on that page, ConfBridge can use any timing interface Asterisk
>provides, and is not limited to the DAHDI timing interface. Generally,
>timerfd is a good timing interface.
>That aside, I would try to rule out external issues with the garbled audio
2016 Oct 25
2
CVE-2016-5195 DirtyCOW : Critical Linux Kernel Flaw
On Tue, Oct 25, 2016 at 2:18 PM, <m.roth at 5-cent.us> wrote:
> My manager just told me that upstream has released a patched kernel for 7:
>
> CentOS package kernel-3.10.0-327.36.3.el7.x86_64.rpm
> see http://rhn.redhat.com/errata/RHSA-2016-2098.html
>
> I'm hoping Johnny can get us that, hopefully before the end of the week.
>
> mark
>
>