Hello. Previously debian, ubuntu, opensuse, I've used. But I'm new to CentOS
too. I do not install desktop environment. Servers want to learn. I can not
update the system. I could not so I researched. I give the following command
. "yum update". I get the error. I'm working on a virtual machine. (I
On 26/09/14 09:44, Gökhan Öztürk wrote:
> Hello. Previously debian, ubuntu, opensuse, I've used. But I'm new to CentOS
> too. I do not install desktop environment. Servers want to learn. I can not
> update the system. I could not so I researched. I give the following command
> . "yum update". I get
On 09/25/2014 01:49 AM, James Hogarth wrote:
> On 24 Sep 2014 17:12, "Johnny Hughes" wrote:
>>
>>
>>
>> For informational purposes:
>>
>> https://access.redhat.com/articles/1200223
>>
>
> As a by heads up that advisory has been updated since the updated packages
> were released.
>
> The fix in t
It is listed how one can check whether his system is vulnerable to
shellshock or not & how to verify after the upgrade of bash rpm.
https://garage.godaddy.com/webpro/security/shellshock-vulnerability-need-know/
On Fri, Sep 26, 2014 at 4:24 PM, Johnny Hughes wrote:
> On 09/25/2014 01:49 AM, Jame
Better one ->
https://support.godaddy.com/help/article/12120/patching-bash-on-your-server-shellshock-patch
On Fri, Sep 26, 2014 at 4:33 PM, Ankush Grover
wrote:
> It is listed how one can check whether his system is vulnerable to
> shellshock or not & how to verify after the upgrade of bash rpm.
On 26/09/14 11:54, Johnny Hughes wrote:
> On 09/25/2014 01:49 AM, James Hogarth wrote:
>
> If you absolutely must run an EL4 workload, please do not do it on
> CentOS-4 and instead pay for and upgrade to RHEL-4 ELS as described in
> the above link from February 2012. CentOS-4 is unsafe .. don't u
Jake Shipton wrote:
On 26/09/14 11:54, Johnny Hughes wrote:
On 09/25/2014 01:49 AM, James Hogarth wrote:
If you absolutely must run an EL4 workload, please do not do it on
CentOS-4 and instead pay for and upgrade to RHEL-4 ELS as described in
the above link from February 2012. CentOS-4 is uns
Send CentOS-announce mailing list submissions to
centos-annou...@centos.org
To subscribe or unsubscribe via the World Wide Web, visit
http://lists.centos.org/mailman/listinfo/centos-announce
or, via email, send a message with subject or body 'help' to
centos-announce-requ..
> If you absolutely must run an EL4 workload, please do not do it on
> CentOS-4 and instead pay for and upgrade to RHEL-4 ELS as described in
> the above link from February 2012. CentOS-4 is unsafe .. don't use it
> .. don't do it .. please.
Or, use the source, Luke. There are official patches
I'm working with some people using apple laptops. When we share text
files (latex files), I reach in an encoding problem on our CentOS
laptops and desktops. In my favorite editor, "é" is "<8e>", "à" is
"<88>" etc...
Of course, I can change the encoding with iconv:
iconv -f MACINTOSH -t ISO8
Hi folks,
just curious about the requirement having a nonpae kernel for i686 hw (el6).
Are there any one outside that have the need for such a kernel?
It would be great having such kernels in the plus channel (yum).
--
Thanks,
LF
___
CentOS mailing li
On 09/25/2014 09:42 AM, m.r...@5-cent.us wrote:
> Steve Lindemann wrote:
>> On 9/25/2014 8:13 AM, m.r...@5-cent.us wrote:
>>> Valeri Galtsev wrote:
On Thu, September 25, 2014 8:59 am, John Doe wrote:
> From: Johan Vermeulen
>> op 25-09-14 13:46, mark schreef:
>>> Yup, forgot tha
On Fri, Sep 26, 2014 at 5:09 AM, Jake Shipton
wrote:
> On 26/09/14 09:44, Gökhan Öztürk wrote:
> > Hello. Previously debian, ubuntu, opensuse, I've used. But I'm new to
> CentOS
> > too. I do not install desktop environment. Servers want to learn. I can
> not
> > update the system. I could not so
On Fri, Sep 26, 2014 at 6:10 AM, Leon Fauster
wrote:
> Hi folks,
>
> just curious about the requirement having a nonpae kernel for i686 hw (el6).
> Are there any one outside that have the need for such a kernel?
>
> It would be great having such kernels in the plus channel (yum).
ELRepo provides
On Fri, September 26, 2014 8:21 am, Johnny Hughes wrote:
> On 09/25/2014 09:42 AM, m.r...@5-cent.us wrote:
>> Steve Lindemann wrote:
>>> On 9/25/2014 8:13 AM, m.r...@5-cent.us wrote:
Valeri Galtsev wrote:
> On Thu, September 25, 2014 8:59 am, John Doe wrote:
>> From: Johan Vermeulen
Ok I created my script this morning
[Unit]
Description=Connections
After=network.target
[Service]
Type=notify
ExecStart=/home/silentm/bin/mystart
[Install]
WantedBy=multi-user.target
I put it in the correct directory, I rebooted and I see that
my mystart script runs- programs start up but then
Am 26.09.2014 um 15:48 schrieb Akemi Yagi :
> On Fri, Sep 26, 2014 at 6:10 AM, Leon Fauster
> wrote:
>> just curious about the requirement having a nonpae kernel for i686 hw (el6).
>> Are there any one outside that have the need for such a kernel?
>>
>> It would be great having such kernels in t
Hi Patrick,
> iconv -f MACINTOSH -t ISO8859-15 file.bib.mac >file.bib
> iconv -f ISO8859-15 -t MACINTOSH file.bib >file.bib.mac
>
> But it is a little tedious to work like this...
>
> Runing pdflatex (in CentOS) on these files written on apple laptops works
> fine with
>
> \usepackage[a
Am 26.09.2014 um 15:13 schrieb Patrick Bégou
:
> I'm working with some people using apple laptops. When we share text files
> (latex files), I reach in an encoding problem on our CentOS laptops and
> desktops. In my favorite editor, "é" is "<8e>", "à" is "<88>" etc...
> Of course, I can change t
On Fri, Sep 26, 2014 at 10:16:49AM -0400, Jerry Geis wrote:
> Ok I created my script this morning
>
> [Unit]
> Description=Connections
> After=network.target
>
> [Service]
> Type=notify
> ExecStart=/home/silentm/bin/mystart
>
> [Install]
> WantedBy=multi-user.target
>
> I put it in the correct
On Thu, September 25, 2014 10:27, Scott Robbins wrote:
> On Thu, Sep 25, 2014 at 09:09:15AM -0500, Valeri Galtsev wrote:
>>
>> developers to follow this:
>>
>> Don't change anything unless it is absolutely necessary.
>>
>> (it was excellent attitude to programming I was doing once: this way you
>>
On Thu, September 25, 2014 12:42, m.r...@5-cent.us wrote:
>
> Thanks, I sit (and type) corrected. There was something nagging at me,
> saying Russia was wrong for Nux. However, I don't foresee aforesaid
> manager being happy with an eastern European individual's repo.
>
You, and your boss, should
On 26 Sep 2014 15:17, "Jerry Geis" wrote:
> Is there something else that allows them to continue to run?
> the mystart runs the needed programs then it does exit.
> I presume that mystart exit is killing the children.
>
Did you see the template I made for you in your other thread on this
subject?
James B. Byrne wrote:
>
> On Thu, September 25, 2014 12:42, m.r...@5-cent.us wrote:
>>
>> Thanks, I sit (and type) corrected. There was something nagging at me,
>> saying Russia was wrong for Nux. However, I don't foresee aforesaid
>> manager being happy with an eastern European individual's repo.
On Fri, September 26, 2014 11:56 am, James B. Byrne wrote:
>
> On Thu, September 25, 2014 12:42, m.r...@5-cent.us wrote:
>>
>> Thanks, I sit (and type) corrected. There was something nagging at me,
>> saying Russia was wrong for Nux. However, I don't foresee aforesaid
>> manager being happy with a
Valeri Galtsev wrote:
>
> On Fri, September 26, 2014 11:56 am, James B. Byrne wrote:
>>
>> On Thu, September 25, 2014 12:42, m.r...@5-cent.us wrote:
>>>
>>> Thanks, I sit (and type) corrected. There was something nagging at me,
>>> saying Russia was wrong for Nux. However, I don't foresee aforesaid
I hope, "my" government doesn't go into alliance with Russia behind my
back ;-) (I'm perfectly OK about Romania, no matter how much more
careful
I'll be about repositories hosted there compared to the ones hosted,
say,
in Finland, just based on statistics of compromised machines...)
These guy
On Fri, Sep 26, 2014 at 8:21 AM, Johnny Hughes wrote:
> >
> So, because you have to check a box to get the menu, you want to look
> for a new browser, which could just stop working at the whims of the
> upstream guys (like chromium did) when they move on to the latest and
> greatest glibc, etc? T
On Fri, Sep 26, 2014 at 9:08 AM, Valeri Galtsev
wrote:
>
> No, it is not because of that. At least in my case. I started looking for
> decent open source browser that to an extent possible follows the rule
> "don't change anything unless it is absolutely necessary" as far as the
> way of user inte
On Fri, September 26, 2014 1:27 pm, Les Mikesell wrote:
> On Fri, Sep 26, 2014 at 9:08 AM, Valeri Galtsev
> wrote:
>>
>> No, it is not because of that. At least in my case. I started looking
>> for
>> decent open source browser that to an extent possible follows the rule
>> "don't change anything
Good afternoon!
After applying the latest bash RPM listed at
http://lists.centos.org/pipermail/centos-announce/2014-September/020594.html :
The fixed RPM (bash-3.2-33.el5_10.4.x86_64.rpm) DOES work just fine on
CentOS 5.10. However, it DOES NOT work on CentOS 5.4. That is, bash runs
fine, but
Never mind; false alarm. Apparently, we both had a previous 'echo' file
sitting around from before.
Best,
Jessica
On Fri, 26 Sep 2014, Jessica Blank wrote:
Good afternoon!
After applying the latest bash RPM listed at
http://lists.centos.org/pipermail/centos-announce/2014-September/020594.ht
Jessica Blank wrote:
> Good afternoon!
>
> After applying the latest bash RPM listed at
> http://lists.centos.org/pipermail/centos-announce/2014-September/020594.html
> :
> The fixed RPM (bash-3.2-33.el5_10.4.x86_64.rpm) DOES work just fine on
> CentOS 5.10. However, it DOES NOT work on CentOS 5.4.
On Fri, Sep 26, 2014 at 3:24 PM, wrote:
> Jessica Blank wrote:
>> Good afternoon!
>>
>> After applying the latest bash RPM listed at
>> http://lists.centos.org/pipermail/centos-announce/2014-September/020594.html
>> :
>> The fixed RPM (bash-3.2-33.el5_10.4.x86_64.rpm) DOES work just fine on
>> Ce
On Fri, 2014-09-26 at 15:02 -0500, Jessica Blank wrote:
> Scary screenie at: http://i.imgur.com/yR7sBjV.png
Never mind the "scary screen" why are you deliberately using an insecure
and out-of-date 5.4 version of Centos ?
Common sense says that if you are genuinely interested in security then
y
On Fri, 2014-09-26 at 12:22 -0500, Valeri Galtsev wrote:
> . just based on statistics of compromised machines...)
Probably all Windoze :-)
Regards,
Paul.
England, EU.
___
CentOS mailing list
CentOS@centos.org
http://lists.centos.org/mailman/
On 9/26/2014 2:51 PM, Always Learning wrote:
Probably all Windoze
linux apache web servers with the bash exploit are getting owned en
masse today. my (patched) internet web server has logged 100s and
100s of attempts like...
66.186.2.172 - - [26/Sep/2014:00:49:29 -0700] "GET /cgi-bin/te
2014-09-27 0:42 GMT+03:00 Always Learning :
>
> On Fri, 2014-09-26 at 15:02 -0500, Jessica Blank wrote:
>
>
> > Scary screenie at: http://i.imgur.com/yR7sBjV.png
>
> Never mind the "scary screen" why are you deliberately using an insecure
> and out-of-date 5.4 version of Centos ?
>
> Common sense
On Fri, September 26, 2014 5:13 pm, John R Pierce wrote:
> On 9/26/2014 2:51 PM, Always Learning wrote:
>> Probably all Windoze
>
> linux apache web servers with the bash exploit are getting owned en
> masse today. my (patched) internet web server has logged 100s and
> 100s of attempts like...
On 9/26/2014 3:36 PM, Valeri Galtsev wrote:
On Fri, September 26, 2014 5:13 pm, John R Pierce wrote:
>On 9/26/2014 2:51 PM, Always Learning wrote:
>>Probably all Windoze
>
>linux apache web servers with the bash exploit are getting owned en
>masse today. my (patched) internet web server ha
On 2014-09-26, Valeri Galtsev wrote:
> On Fri, September 26, 2014 5:13 pm, John R Pierce wrote:
>>
>> linux apache web servers with the bash exploit are getting owned en
>> masse today. my (patched) internet web server has logged 100s and
>> 100s of attempts like...
>>
>> 66.186.2.172 - - [26/
On Sat, Sep 27, 2014 at 11:02 AM, Keith Keller <
kkel...@wombat.san-francisco.ca.us> wrote:
> On 2014-09-26, Valeri Galtsev wrote:
> > On Fri, September 26, 2014 5:13 pm, John R Pierce wrote:
> >>
> >> linux apache web servers with the bash exploit are getting owned en
> >> masse today. my (p
It may be that you have a bad bash RPM from somewhere. I believe that the
cpio command works directly on the package so you could try with cpio on
the command line to see if it will open the RPM. I suspect that it won't be
able to.
Cheers,
Cliff
On Thu, Sep 25, 2014 at 6:52 PM, Tony Molloy wrot
On Sat, Sep 27, 2014 at 01:29:44AM +0300, Eero Volotinen wrote:
> 2014-09-27 0:42 GMT+03:00 Always Learning :
> > > Scary screenie at: http://i.imgur.com/yR7sBjV.png
> >
> > Never mind the "scary screen" why are you deliberately using an insecure
> > and out-of-date 5.4 version of Centos ?
Do we
On Fri, Sep 26, 2014 at 6:28 PM, James Hogarth
wrote:
> On 26 Sep 2014 05:46, "Cliff Pratt" wrote:
> >
> > Take the case of an Apache Bash CGI. This will have been loaded when
> Apache
> > started, so Apache will have to be restarted to get the new one. There
> may
> > be other similar cases. So
On Fri, September 26, 2014 6:05 pm, John R Pierce wrote:
> On 9/26/2014 3:36 PM, Valeri Galtsev wrote:
>> On Fri, September 26, 2014 5:13 pm, John R Pierce wrote:
>>> >On 9/26/2014 2:51 PM, Always Learning wrote:
>>Probably all Windoze
>>> >
>>> >linux apache web servers with the bash exploit
On 2014-09-26, John R Pierce wrote:
>> On Fri, September 26, 2014 5:13 pm, John R Pierce wrote:
>>> >
>>> >66.186.2.172 - - [26/Sep/2014:00:49:29 -0700] "GET /cgi-bin/test.sh
>
> no. mod_cgi launches /bin/sh and passes it the command, even if the
> file doesn't exist. and /bin/sh is linked t
On Fri, September 26, 2014 6:05 pm, John R Pierce wrote:
> On 9/26/2014 3:36 PM, Valeri Galtsev wrote:
>> On Fri, September 26, 2014 5:13 pm, John R Pierce wrote:
>>> >On 9/26/2014 2:51 PM, Always Learning wrote:
>>Probably all Windoze
>>> >
>>> >linux apache web servers with the bash exploit
On Fri, 2014-09-26 at 16:05 -0700, John R Pierce wrote:
> no. mod_cgi launches /bin/sh and passes it the command, even if the
> file doesn't exist. and /bin/sh is linked to bash
Don't use cgi. Have no /cgi directory. Don't load mod_cgi
Bash is patched (updated to new version). Automatica
On Fri, September 26, 2014 8:32 pm, Always Learning wrote:
>
> On Fri, 2014-09-26 at 16:05 -0700, John R Pierce wrote:
>
>> no. mod_cgi launches /bin/sh and passes it the command, even if the
>> file doesn't exist. and /bin/sh is linked to bash
>
> Don't use cgi. Have no /cgi directory. Don't
Hi Valeri,
> On Fri, September 26, 2014 8:32 pm, Always Learning wrote:
> > Don't use cgi. Have no /cgi directory. Don't load mod_cgi
> >
> > Bash is patched (updated to new version). Automatically bloke IPs of
> > anyone trying to hack Apache. Am I safe ?
> You are. But if you run the server
V,
Sorry that should be ...
I understand your hotel analogy.
P.
___
CentOS mailing list
CentOS@centos.org
http://lists.centos.org/mailman/listinfo/centos
On 09/27/2014 10:29 AM, Eero Volotinen wrote:
> uh. is this system even patched for heartbleed?
EL5 was never vulnerable to heartbleed to begin with, that said, your
point is still valid as to other vulnerabilities.
Peter
___
CentOS mailing list
CentOS
53 matches
Mail list logo