Re: [CentOS] Download Centos 7.2 64 bit

2016-11-01 Thread Frank Cox
On Wed, 2 Nov 2016 11:15:59 +0530
JEYARAJ wrote:

 How to download the Centos 7.2 64 bit..
> 
> If you see anyone please send me the link. Urgent.

https://www.centos.org/download/

-- 
MELVILLE THEATRE ~ Real D 3D Digital Cinema ~ www.melvilletheatre.com
___
CentOS mailing list
CentOS@centos.org
https://lists.centos.org/mailman/listinfo/centos


Re: [CentOS] Download Centos 7.2 64 bit

2016-11-01 Thread John R Pierce

On 11/1/2016 10:45 PM, JEYARAJ wrote:

How to download the Centos 7.2 64 bit..

If you see anyone please send me the link. Urgent.


7 update 2 is the 1511 release.

any of the 3 links here, depending if you want DVD, everything, or 
Minimal ISO's.

https://www.centos.org/download/



--
john r pierce, recycling bits in santa cruz

___
CentOS mailing list
CentOS@centos.org
https://lists.centos.org/mailman/listinfo/centos


[CentOS] Download Centos 7.2 64 bit

2016-11-01 Thread JEYARAJ
Hi All,

 

How to download the Centos 7.2 64 bit..

If you see anyone please send me the link. Urgent.

 

Regards,

Jeyaraj. M

___
CentOS mailing list
CentOS@centos.org
https://lists.centos.org/mailman/listinfo/centos


Re: [CentOS] CVE-2016-5195 DirtyCOW: Critical Linux Kernel Flaw

2016-11-01 Thread Peter
On 02/11/16 13:05, Richard wrote:
> RHEL/Centos-4 is EOL so wouldn't be updated regardless (at least
> under the normal EOL guidelines), but it is mentioned toward the
> bottom of that page under "Affected Packages State":
> 
>   Red Hat Enterprise Linux 4  kernel  Not affected

It is mentioned because RHEL4 is in extended life phase, so not EOL yet.

CentOS 4 is EOL as CentOS does not track the extended life phase of Red Hat.


Peter
___
CentOS mailing list
CentOS@centos.org
https://lists.centos.org/mailman/listinfo/centos


Re: [CentOS] CVE-2016-5195 DirtyCOW: Critical Linux Kernel Flaw

2016-11-01 Thread Richard
You appear to have hijacked this (DirtyCOW) thread. You may want to
re-post your question as a new message so that it won't get mingled
with this discussion.
 

 Original Message 
> Date: Tuesday, November 01, 2016 21:03:48 -0400
> From: "Christopher G. Halnin" 
> To: CentOS mailing list 
> Subject: Re: [CentOS] CVE-2016-5195 DirtyCOW: Critical Linux Kernel
Flaw
>
> Dear Sir/s,
> 
> Can a crashed centos system be restore to its previous state before
> it crash? And if so, can you please tell me how to do it? Thanks,
> your help is very much appreciated.
> 
> - Original Message -
> From: "Richard" 
> To: "CentOS mailing list" 
> Sent: Tuesday, November 1, 2016 5:05:59 PM
> Subject: Re: [CentOS] CVE-2016-5195 DirtyCOW: Critical Linux Kernel
> Flaw
> 
>> Date: Tuesday, November 01, 2016 18:49:56 -0500
>> From: Valeri Galtsev 
>> 
>> On Tue, November 1, 2016 6:25 pm, Tony Mountifield wrote:
>>> In article <5818cd31.4050...@moving-picture.com>,
>>> James Pearson  wrote:
 Leonardo Oliveira Ortiz wrote:
 > RedHat and Centos 4.x can be explored by this flaw?
 
 See:
 
   https://access.redhat.com/security/cve/cve-2016-5195
>>> 
>>> In other words, no: RHEL 4 and CentOS4 are not affected by this
>>> flaw.
>> 
>> My understanding is: RHEL is obsolete, hence it will not even be
>> mentioned on that page, whether it is known to be affected or not.
>> 
> 
> RHEL/Centos-4 is EOL so wouldn't be updated regardless (at least
> under the normal EOL guidelines), but it is mentioned toward the
> bottom of that page under "Affected Packages State":
> 
>   Red Hat Enterprise Linux 4  kernel  Not affected
> 
> 
> 
> ___
> CentOS mailing list
> CentOS@centos.org
> https://lists.centos.org/mailman/listinfo/centos
> ___
> CentOS mailing list
> CentOS@centos.org
> https://lists.centos.org/mailman/listinfo/centos

 End Original Message 


___
CentOS mailing list
CentOS@centos.org
https://lists.centos.org/mailman/listinfo/centos


Re: [CentOS] CVE-2016-5195 DirtyCOW: Critical Linux Kernel Flaw

2016-11-01 Thread John R Pierce

On 11/1/2016 6:03 PM, Christopher G. Halnin wrote:

Can a crashed centos system be restore to its previous state before it crash? 
And if so, can you please tell me how to do it?
Thanks, your help is very much appreciated.


1) define 'crashed'

2) got backups?


--
john r pierce, recycling bits in santa cruz

___
CentOS mailing list
CentOS@centos.org
https://lists.centos.org/mailman/listinfo/centos


Re: [CentOS] CVE-2016-5195 DirtyCOW: Critical Linux Kernel Flaw

2016-11-01 Thread Christopher G. Halnin
Dear Sir/s,

Can a crashed centos system be restore to its previous state before it crash? 
And if so, can you please tell me how to do it?
Thanks, your help is very much appreciated.

- Original Message -
From: "Richard" 
To: "CentOS mailing list" 
Sent: Tuesday, November 1, 2016 5:05:59 PM
Subject: Re: [CentOS] CVE-2016-5195 DirtyCOW: Critical Linux Kernel Flaw

> Date: Tuesday, November 01, 2016 18:49:56 -0500
> From: Valeri Galtsev 
>
> On Tue, November 1, 2016 6:25 pm, Tony Mountifield wrote:
>> In article <5818cd31.4050...@moving-picture.com>,
>> James Pearson  wrote:
>>> Leonardo Oliveira Ortiz wrote:
>>> > RedHat and Centos 4.x can be explored by this flaw?
>>> 
>>> See:
>>> 
>>>   https://access.redhat.com/security/cve/cve-2016-5195
>> 
>> In other words, no: RHEL 4 and CentOS4 are not affected by this
>> flaw.
> 
> My understanding is: RHEL is obsolete, hence it will not even be
> mentioned on that page, whether it is known to be affected or not.
> 

RHEL/Centos-4 is EOL so wouldn't be updated regardless (at least
under the normal EOL guidelines), but it is mentioned toward the
bottom of that page under "Affected Packages State":

  Red Hat Enterprise Linux 4kernel  Not affected



___
CentOS mailing list
CentOS@centos.org
https://lists.centos.org/mailman/listinfo/centos
___
CentOS mailing list
CentOS@centos.org
https://lists.centos.org/mailman/listinfo/centos


Re: [CentOS] Power Cut

2016-11-01 Thread Ted Miller

On 10/30/2016 01:12 AM, Hadi Motamedi wrote:

Dear All
I am using a centos server for cdr billing and mediation device on a remote
network. I am experiencing problem that I am suspicious it comes from main
supply power cut at the remote site. The power supply to the remote site
comes from battery charger that will be automatically switched in circuit
under main supply power cut but cannot provide adequate power for more than
2 hours . I am suspicious that the remote system is suffering from many
frequent main supply power cut . Can you please do me favor and let me know
if there is any log on my centos server that I can check to see if there
would be many frequent power cut there ?
Thank you for your time


I have been experiencing a similar situation with a remote server, and
found it much easier to use the command:
  last -x | tail -n50
to see reboots.  You can tell a power cut because the end time for the
previous boot up will be the same as the begin time for the next boot.  If
it is an orderly shutdown, there will be a time gap that is logged.  As I
understand it, the 'last' command uses the data stored in /var/log/wtmp,
but that information is not in human-readable format.
Ted Miller
Indiana, USA

___
CentOS mailing list
CentOS@centos.org
https://lists.centos.org/mailman/listinfo/centos


Re: [CentOS] CVE-2016-5195 DirtyCOW: Critical Linux Kernel Flaw

2016-11-01 Thread Richard


> Date: Tuesday, November 01, 2016 18:49:56 -0500
> From: Valeri Galtsev 
>
> On Tue, November 1, 2016 6:25 pm, Tony Mountifield wrote:
>> In article <5818cd31.4050...@moving-picture.com>,
>> James Pearson  wrote:
>>> Leonardo Oliveira Ortiz wrote:
>>> > RedHat and Centos 4.x can be explored by this flaw?
>>> 
>>> See:
>>> 
>>>   https://access.redhat.com/security/cve/cve-2016-5195
>> 
>> In other words, no: RHEL 4 and CentOS4 are not affected by this
>> flaw.
> 
> My understanding is: RHEL is obsolete, hence it will not even be
> mentioned on that page, whether it is known to be affected or not.
> 

RHEL/Centos-4 is EOL so wouldn't be updated regardless (at least
under the normal EOL guidelines), but it is mentioned toward the
bottom of that page under "Affected Packages State":

  Red Hat Enterprise Linux 4kernel  Not affected



___
CentOS mailing list
CentOS@centos.org
https://lists.centos.org/mailman/listinfo/centos


Re: [CentOS] CVE-2016-5195 DirtyCOW: Critical Linux Kernel Flaw

2016-11-01 Thread Valeri Galtsev

On Tue, November 1, 2016 6:25 pm, Tony Mountifield wrote:
> In article <5818cd31.4050...@moving-picture.com>,
> James Pearson  wrote:
>> Leonardo Oliveira Ortiz wrote:
>> > RedHat and Centos 4.x can be explored by this flaw?
>>
>> See:
>>
>>   https://access.redhat.com/security/cve/cve-2016-5195
>
> In other words, no: RHEL 4 and CentOS4 are not affected by this flaw.

My understanding is: RHEL is obsolete, hence it will not even be mentioned
on that page, whether it is known to be affected or not.

Valeri

>
> Tony
> --
> Tony Mountifield
> Work: t...@softins.co.uk - http://www.softins.co.uk
> Play: t...@mountifield.org - http://tony.mountifield.org
> ___
> CentOS mailing list
> CentOS@centos.org
> https://lists.centos.org/mailman/listinfo/centos
>



Valeri Galtsev
Sr System Administrator
Department of Astronomy and Astrophysics
Kavli Institute for Cosmological Physics
University of Chicago
Phone: 773-702-4247

___
CentOS mailing list
CentOS@centos.org
https://lists.centos.org/mailman/listinfo/centos


Re: [CentOS] CVE-2016-5195 DirtyCOW: Critical Linux Kernel Flaw

2016-11-01 Thread Tony Mountifield
In article <5818cd31.4050...@moving-picture.com>,
James Pearson  wrote:
> Leonardo Oliveira Ortiz wrote:
> > RedHat and Centos 4.x can be explored by this flaw?
> 
> See:
> 
>   https://access.redhat.com/security/cve/cve-2016-5195

In other words, no: RHEL 4 and CentOS4 are not affected by this flaw.

Tony
-- 
Tony Mountifield
Work: t...@softins.co.uk - http://www.softins.co.uk
Play: t...@mountifield.org - http://tony.mountifield.org
___
CentOS mailing list
CentOS@centos.org
https://lists.centos.org/mailman/listinfo/centos


Re: [CentOS] how to view a picture under shell?

2016-11-01 Thread Julius Tchanque
Hi Glenn,
I found this project similar to what you want: https://github.com/
MilenMMinev/AsciiViewer

Regards,
Julius
On 1 November 2016 at 03:43, Glenn WANG  wrote:

> hi, all, is there any command(such asciiview) to view the picture under
> bash shell? I found the asciiview could meet my requirement, but how to
> install it on centos? thanks.
> ___
> CentOS mailing list
> CentOS@centos.org
> https://lists.centos.org/mailman/listinfo/centos
>
___
CentOS mailing list
CentOS@centos.org
https://lists.centos.org/mailman/listinfo/centos


Re: [CentOS] CVE-2016-5195 DirtyCOW: Critical Linux Kernel Flaw

2016-11-01 Thread James Pearson

Leonardo Oliveira Ortiz wrote:

RedHat and Centos 4.x can be explored by this flaw?


See:

 https://access.redhat.com/security/cve/cve-2016-5195

James Pearson
___
CentOS mailing list
CentOS@centos.org
https://lists.centos.org/mailman/listinfo/centos


[CentOS] how to install amule in CertOS 7?

2016-11-01 Thread Zhao Xiaoqi
I could find the amule package in CertOS7, is anyone know this?
Thanks.
Xiaoqi

___
CentOS mailing list
CentOS@centos.org
https://lists.centos.org/mailman/listinfo/centos


[CentOS] RES: CVE-2016-5195 “DirtyCOW”: Critical Linux Kernel Flaw

2016-11-01 Thread Leonardo Oliveira Ortiz
RedHat and Centos 4.x can be explored by this flaw?



-Mensagem original-
De: centos-boun...@centos.org [mailto:centos-boun...@centos.org] Em nome de 
Valeri Galtsev
Enviada em: sexta-feira, 28 de outubro de 2016 12:50
Para: CentOS mailing list 
Assunto: Re: [CentOS] CVE-2016-5195 “DirtyCOW”: Critical Linux Kernel Flaw


On Fri, October 28, 2016 9:43 am, Johnny Hughes wrote:
> On 10/22/2016 07:49 PM, Valeri Galtsev wrote:
>> Dear All,
>>
>> I guess, we all have to urgently apply workaround, following, say, this:
>>
>> https://gryzli.info/2016/10/21/protect-cve-2016-5195-dirtycow-centos-
>> 7rhel7cpanelcloudlinux/
>>
>> At least those of us who still have important multi user machines 
>> running Linux. (Yes, me too, I do have a couple, thank goodness, the 
>> rest are already not ;-)
>>
>> Have a productive weekend, everybody.
>>
>> Valeri
>>
>
> And to close the book on this CVE, I just pushed the CentOS-5.11 
> kernel to fix this issue as well:
>
> kernel-2.6.18-416.el5

Johnny, thanks a lot!!

(even though on my most ancient venerable couple of boxes still running CentOS 
5 users can not execute anything of their own, so the boxes are immune to hack 
from inside, is still gives one great feeling to have kernel patched).

Thanks again for the great job you, guys are doing!

Valeri

>
> So, the only thing we still have to release is a fixed kernel for the
> aarch64 AltArch SIG.  And we are building a test kernel for that right 
> now.
>
> ppc64le, ppc64, i686, arm32 for CentOS-7 .. and all released arches 
> for
> CentOS-5 and CentOS-6 ... now all have updates released.
>
> Thanks,
> Johnny Hughes
>
>
> ___
> CentOS mailing list
> CentOS@centos.org
> https://lists.centos.org/mailman/listinfo/centos
>



Valeri Galtsev
Sr System Administrator
Department of Astronomy and Astrophysics Kavli Institute for Cosmological 
Physics University of Chicago
Phone: 773-702-4247

___
CentOS mailing list
CentOS@centos.org
https://lists.centos.org/mailman/listinfo/centos
___
CentOS mailing list
CentOS@centos.org
https://lists.centos.org/mailman/listinfo/centos