Hi,
I'm currently at CentOS 5.8 and am applying the latest OS updates available
for 5.8. I'm seeing following error:
error: bind-libs-9.3.6-20.P1.el5_8.6.x86_64.rpm: headerRead failed: hdr
blob(48062): BAD, read returned 515
error: bind-libs-9.3.6-20.P1.el5_8.6.x86_64.rpm cannot be installed
Sim
It's working fine now. There was some issue with the way I packaged the OS
updates rpms.
Thanks
On Mon, Feb 11, 2013 at 6:51 PM, Karanbir Singh wrote:
> On 02/11/2013 12:35 PM, Anumeha Prasad wrote:
> > error: bind-libs-9.3.6-20.P1.el5_8.6.x86_64.rpm: headerRead failed: hdr
Hi,
I'm currently at CentOS 5.8. After some penetration testing, found some
high severity OpenSSH issues which would require its upgrade. But till
CentOS 5.9 the latest rpm available is openssh-4.3p2-82.el5 (which I'm
currently using).
Is it fine to upgrade to CentOS 6 rpms while I'm on CentOS 5?
Hi,
I've created a new partition on /dev/sda on my CentOS machine after which
fdisk -l gives output as:
Device Boot Start End Blocks Id System
/dev/sda1 * 1 13 104391 83 Linux
/dev/sda2 14350028009327+ 83 Linux
/dev/sda3
Thanks for the reply...
But isn't it true that if I use partprobe command, I don't need to reboot
my machine for kernel to read partition changes?
On Wed, Apr 17, 2013 at 5:49 PM, Mike Burger wrote:
> > Hi,
> >
> > I've created a new partition on /dev/sda on my CentOS machine after which
> > fd
Hi,
Following 2 vulnerabilities were detected in VA scan required for PCI
compliance:
1. SSL Weak Cipher Suites Supported
2. SSL Medium Strength Cipher Suites Supported
I'm using CentOS 5.8 with open ssl version "openssl-0.9.8e-22.el5_8.4". Any
idea how to get rid of this?
Thanks,
Anumeha
_
exander Dalloz wrote:
> Am 31.07.2013 10:52, schrieb Anumeha Prasad:
> > Hi,
> >
> > Following 2 vulnerabilities were detected in VA scan required for PCI
> > compliance:
> >
> > 1. SSL Weak Cipher Suites Supported
> > 2. SSL Medium Strength Cipher Su
Hi,
I'm currently at CentOS 5.8. I'm using openssl version
openssl-0.9.8e-22.el5. The following vulnerability was reported by a Nessus
security scan:
"SSL/ TLS Renegotion Handshakes MiTm Plaintext Data Injection"
As per following link, Redhat has introduced openssl-0.9.8m which fixes
this specif
eported by Nessus scanner ignored?
On Tue, Aug 6, 2013 at 4:20 PM, Stephen Harris wrote:
> On Tue, Aug 06, 2013 at 04:01:12PM +0530, Anumeha Prasad wrote:
> > Hi,
> >
> > I'm currently at CentOS 5.8. I'm using openssl version
> > openssl-0.9.8e-22.el5. The fol
een updated since a few *days* after the
> release.
>
> [3]
> http://wiki.centos.org/FAQ/General#head-6e2c3746ec45ac3142917466760321e8
> 68f43c0e
>
> [4]
> http://wiki.centos.org/FAQ/General#head-3dad8cb98ac535185e58e882a23ca4b0
> 96cbff2f
>
>
> Even when this
On Thu, Aug 8, 2013 at 2:24 PM, Alexander Dalloz wrote:
> Am 08.08.2013 09:04, schrieb Anumeha Prasad:
> > Thanks for the update.
> >
> > I'd updated most of my rpms to CentOS 5.9. I'd even updated openssl
> > to openssl-0.9.8e-22.el5_8.4 (though now the late
Hi,
Cent OS 5.5 x64 does not boot on certain AMD-based servers. Following error
is displayed:
Code: 8b 72 40 48 8d 4c 24 1c 48 8b 7a 20 ba c4 01 00 00 e8 5f 77
RIP [] cpuid4_cache_lookup+0x256/0x356
RSP
CR2: 0040
<0>Kernel panic -- not syncing: Fatal exception
This issue was noticed on D
Thanks. I will indeed install Cent OS 5.8 and see if that resolves the
issue. RHEL 5 had released some kernel-xen patch to
address this issue. So, just wanted to know if a similar thing is available
for CentOS.
On Thu, Jul 19, 2012 at 5:17 PM, James Hogarth wrote:
> > Cent OS 5.5 x64 does not bo
13 matches
Mail list logo