Re: [CentOS] Download Centos 7.2 64 bit
On Wed, 2 Nov 2016 11:15:59 +0530 JEYARAJ wrote: How to download the Centos 7.2 64 bit.. > > If you see anyone please send me the link. Urgent. https://www.centos.org/download/ -- MELVILLE THEATRE ~ Real D 3D Digital Cinema ~ www.melvilletheatre.com ___ CentOS mailing list CentOS@centos.org https://lists.centos.org/mailman/listinfo/centos
Re: [CentOS] Download Centos 7.2 64 bit
On 11/1/2016 10:45 PM, JEYARAJ wrote: How to download the Centos 7.2 64 bit.. If you see anyone please send me the link. Urgent. 7 update 2 is the 1511 release. any of the 3 links here, depending if you want DVD, everything, or Minimal ISO's. https://www.centos.org/download/ -- john r pierce, recycling bits in santa cruz ___ CentOS mailing list CentOS@centos.org https://lists.centos.org/mailman/listinfo/centos
[CentOS] Download Centos 7.2 64 bit
Hi All, How to download the Centos 7.2 64 bit.. If you see anyone please send me the link. Urgent. Regards, Jeyaraj. M ___ CentOS mailing list CentOS@centos.org https://lists.centos.org/mailman/listinfo/centos
Re: [CentOS] CVE-2016-5195 DirtyCOW: Critical Linux Kernel Flaw
On 02/11/16 13:05, Richard wrote: > RHEL/Centos-4 is EOL so wouldn't be updated regardless (at least > under the normal EOL guidelines), but it is mentioned toward the > bottom of that page under "Affected Packages State": > > Red Hat Enterprise Linux 4 kernel Not affected It is mentioned because RHEL4 is in extended life phase, so not EOL yet. CentOS 4 is EOL as CentOS does not track the extended life phase of Red Hat. Peter ___ CentOS mailing list CentOS@centos.org https://lists.centos.org/mailman/listinfo/centos
Re: [CentOS] CVE-2016-5195 DirtyCOW: Critical Linux Kernel Flaw
You appear to have hijacked this (DirtyCOW) thread. You may want to re-post your question as a new message so that it won't get mingled with this discussion. Original Message > Date: Tuesday, November 01, 2016 21:03:48 -0400 > From: "Christopher G. Halnin"> To: CentOS mailing list > Subject: Re: [CentOS] CVE-2016-5195 DirtyCOW: Critical Linux Kernel Flaw > > Dear Sir/s, > > Can a crashed centos system be restore to its previous state before > it crash? And if so, can you please tell me how to do it? Thanks, > your help is very much appreciated. > > - Original Message - > From: "Richard" > To: "CentOS mailing list" > Sent: Tuesday, November 1, 2016 5:05:59 PM > Subject: Re: [CentOS] CVE-2016-5195 DirtyCOW: Critical Linux Kernel > Flaw > >> Date: Tuesday, November 01, 2016 18:49:56 -0500 >> From: Valeri Galtsev >> >> On Tue, November 1, 2016 6:25 pm, Tony Mountifield wrote: >>> In article <5818cd31.4050...@moving-picture.com>, >>> James Pearson wrote: Leonardo Oliveira Ortiz wrote: > RedHat and Centos 4.x can be explored by this flaw? See: https://access.redhat.com/security/cve/cve-2016-5195 >>> >>> In other words, no: RHEL 4 and CentOS4 are not affected by this >>> flaw. >> >> My understanding is: RHEL is obsolete, hence it will not even be >> mentioned on that page, whether it is known to be affected or not. >> > > RHEL/Centos-4 is EOL so wouldn't be updated regardless (at least > under the normal EOL guidelines), but it is mentioned toward the > bottom of that page under "Affected Packages State": > > Red Hat Enterprise Linux 4 kernel Not affected > > > > ___ > CentOS mailing list > CentOS@centos.org > https://lists.centos.org/mailman/listinfo/centos > ___ > CentOS mailing list > CentOS@centos.org > https://lists.centos.org/mailman/listinfo/centos End Original Message ___ CentOS mailing list CentOS@centos.org https://lists.centos.org/mailman/listinfo/centos
Re: [CentOS] CVE-2016-5195 DirtyCOW: Critical Linux Kernel Flaw
On 11/1/2016 6:03 PM, Christopher G. Halnin wrote: Can a crashed centos system be restore to its previous state before it crash? And if so, can you please tell me how to do it? Thanks, your help is very much appreciated. 1) define 'crashed' 2) got backups? -- john r pierce, recycling bits in santa cruz ___ CentOS mailing list CentOS@centos.org https://lists.centos.org/mailman/listinfo/centos
Re: [CentOS] CVE-2016-5195 DirtyCOW: Critical Linux Kernel Flaw
Dear Sir/s, Can a crashed centos system be restore to its previous state before it crash? And if so, can you please tell me how to do it? Thanks, your help is very much appreciated. - Original Message - From: "Richard"To: "CentOS mailing list" Sent: Tuesday, November 1, 2016 5:05:59 PM Subject: Re: [CentOS] CVE-2016-5195 DirtyCOW: Critical Linux Kernel Flaw > Date: Tuesday, November 01, 2016 18:49:56 -0500 > From: Valeri Galtsev > > On Tue, November 1, 2016 6:25 pm, Tony Mountifield wrote: >> In article <5818cd31.4050...@moving-picture.com>, >> James Pearson wrote: >>> Leonardo Oliveira Ortiz wrote: >>> > RedHat and Centos 4.x can be explored by this flaw? >>> >>> See: >>> >>> https://access.redhat.com/security/cve/cve-2016-5195 >> >> In other words, no: RHEL 4 and CentOS4 are not affected by this >> flaw. > > My understanding is: RHEL is obsolete, hence it will not even be > mentioned on that page, whether it is known to be affected or not. > RHEL/Centos-4 is EOL so wouldn't be updated regardless (at least under the normal EOL guidelines), but it is mentioned toward the bottom of that page under "Affected Packages State": Red Hat Enterprise Linux 4kernel Not affected ___ CentOS mailing list CentOS@centos.org https://lists.centos.org/mailman/listinfo/centos ___ CentOS mailing list CentOS@centos.org https://lists.centos.org/mailman/listinfo/centos
Re: [CentOS] Power Cut
On 10/30/2016 01:12 AM, Hadi Motamedi wrote: Dear All I am using a centos server for cdr billing and mediation device on a remote network. I am experiencing problem that I am suspicious it comes from main supply power cut at the remote site. The power supply to the remote site comes from battery charger that will be automatically switched in circuit under main supply power cut but cannot provide adequate power for more than 2 hours . I am suspicious that the remote system is suffering from many frequent main supply power cut . Can you please do me favor and let me know if there is any log on my centos server that I can check to see if there would be many frequent power cut there ? Thank you for your time I have been experiencing a similar situation with a remote server, and found it much easier to use the command: last -x | tail -n50 to see reboots. You can tell a power cut because the end time for the previous boot up will be the same as the begin time for the next boot. If it is an orderly shutdown, there will be a time gap that is logged. As I understand it, the 'last' command uses the data stored in /var/log/wtmp, but that information is not in human-readable format. Ted Miller Indiana, USA ___ CentOS mailing list CentOS@centos.org https://lists.centos.org/mailman/listinfo/centos
Re: [CentOS] CVE-2016-5195 DirtyCOW: Critical Linux Kernel Flaw
> Date: Tuesday, November 01, 2016 18:49:56 -0500 > From: Valeri Galtsev> > On Tue, November 1, 2016 6:25 pm, Tony Mountifield wrote: >> In article <5818cd31.4050...@moving-picture.com>, >> James Pearson wrote: >>> Leonardo Oliveira Ortiz wrote: >>> > RedHat and Centos 4.x can be explored by this flaw? >>> >>> See: >>> >>> https://access.redhat.com/security/cve/cve-2016-5195 >> >> In other words, no: RHEL 4 and CentOS4 are not affected by this >> flaw. > > My understanding is: RHEL is obsolete, hence it will not even be > mentioned on that page, whether it is known to be affected or not. > RHEL/Centos-4 is EOL so wouldn't be updated regardless (at least under the normal EOL guidelines), but it is mentioned toward the bottom of that page under "Affected Packages State": Red Hat Enterprise Linux 4kernel Not affected ___ CentOS mailing list CentOS@centos.org https://lists.centos.org/mailman/listinfo/centos
Re: [CentOS] CVE-2016-5195 DirtyCOW: Critical Linux Kernel Flaw
On Tue, November 1, 2016 6:25 pm, Tony Mountifield wrote: > In article <5818cd31.4050...@moving-picture.com>, > James Pearsonwrote: >> Leonardo Oliveira Ortiz wrote: >> > RedHat and Centos 4.x can be explored by this flaw? >> >> See: >> >> https://access.redhat.com/security/cve/cve-2016-5195 > > In other words, no: RHEL 4 and CentOS4 are not affected by this flaw. My understanding is: RHEL is obsolete, hence it will not even be mentioned on that page, whether it is known to be affected or not. Valeri > > Tony > -- > Tony Mountifield > Work: t...@softins.co.uk - http://www.softins.co.uk > Play: t...@mountifield.org - http://tony.mountifield.org > ___ > CentOS mailing list > CentOS@centos.org > https://lists.centos.org/mailman/listinfo/centos > Valeri Galtsev Sr System Administrator Department of Astronomy and Astrophysics Kavli Institute for Cosmological Physics University of Chicago Phone: 773-702-4247 ___ CentOS mailing list CentOS@centos.org https://lists.centos.org/mailman/listinfo/centos
Re: [CentOS] CVE-2016-5195 DirtyCOW: Critical Linux Kernel Flaw
In article <5818cd31.4050...@moving-picture.com>, James Pearsonwrote: > Leonardo Oliveira Ortiz wrote: > > RedHat and Centos 4.x can be explored by this flaw? > > See: > > https://access.redhat.com/security/cve/cve-2016-5195 In other words, no: RHEL 4 and CentOS4 are not affected by this flaw. Tony -- Tony Mountifield Work: t...@softins.co.uk - http://www.softins.co.uk Play: t...@mountifield.org - http://tony.mountifield.org ___ CentOS mailing list CentOS@centos.org https://lists.centos.org/mailman/listinfo/centos
Re: [CentOS] how to view a picture under shell?
Hi Glenn, I found this project similar to what you want: https://github.com/ MilenMMinev/AsciiViewer Regards, Julius On 1 November 2016 at 03:43, Glenn WANGwrote: > hi, all, is there any command(such asciiview) to view the picture under > bash shell? I found the asciiview could meet my requirement, but how to > install it on centos? thanks. > ___ > CentOS mailing list > CentOS@centos.org > https://lists.centos.org/mailman/listinfo/centos > ___ CentOS mailing list CentOS@centos.org https://lists.centos.org/mailman/listinfo/centos
Re: [CentOS] CVE-2016-5195 DirtyCOW: Critical Linux Kernel Flaw
Leonardo Oliveira Ortiz wrote: RedHat and Centos 4.x can be explored by this flaw? See: https://access.redhat.com/security/cve/cve-2016-5195 James Pearson ___ CentOS mailing list CentOS@centos.org https://lists.centos.org/mailman/listinfo/centos
[CentOS] how to install amule in CertOS 7?
I could find the amule package in CertOS7, is anyone know this? Thanks. Xiaoqi ___ CentOS mailing list CentOS@centos.org https://lists.centos.org/mailman/listinfo/centos
[CentOS] RES: CVE-2016-5195 “DirtyCOWâ€: Critical Linux Kernel Flaw
RedHat and Centos 4.x can be explored by this flaw? -Mensagem original- De: centos-boun...@centos.org [mailto:centos-boun...@centos.org] Em nome de Valeri Galtsev Enviada em: sexta-feira, 28 de outubro de 2016 12:50 Para: CentOS mailing listAssunto: Re: [CentOS] CVE-2016-5195 “DirtyCOWâ€: Critical Linux Kernel Flaw On Fri, October 28, 2016 9:43 am, Johnny Hughes wrote: > On 10/22/2016 07:49 PM, Valeri Galtsev wrote: >> Dear All, >> >> I guess, we all have to urgently apply workaround, following, say, this: >> >> https://gryzli.info/2016/10/21/protect-cve-2016-5195-dirtycow-centos- >> 7rhel7cpanelcloudlinux/ >> >> At least those of us who still have important multi user machines >> running Linux. (Yes, me too, I do have a couple, thank goodness, the >> rest are already not ;-) >> >> Have a productive weekend, everybody. >> >> Valeri >> > > And to close the book on this CVE, I just pushed the CentOS-5.11 > kernel to fix this issue as well: > > kernel-2.6.18-416.el5 Johnny, thanks a lot!! (even though on my most ancient venerable couple of boxes still running CentOS 5 users can not execute anything of their own, so the boxes are immune to hack from inside, is still gives one great feeling to have kernel patched). Thanks again for the great job you, guys are doing! Valeri > > So, the only thing we still have to release is a fixed kernel for the > aarch64 AltArch SIG. And we are building a test kernel for that right > now. > > ppc64le, ppc64, i686, arm32 for CentOS-7 .. and all released arches > for > CentOS-5 and CentOS-6 ... now all have updates released. > > Thanks, > Johnny Hughes > > > ___ > CentOS mailing list > CentOS@centos.org > https://lists.centos.org/mailman/listinfo/centos > Valeri Galtsev Sr System Administrator Department of Astronomy and Astrophysics Kavli Institute for Cosmological Physics University of Chicago Phone: 773-702-4247 ___ CentOS mailing list CentOS@centos.org https://lists.centos.org/mailman/listinfo/centos ___ CentOS mailing list CentOS@centos.org https://lists.centos.org/mailman/listinfo/centos