November 2018
M T W T F S S
« Oct    
 1234
567891011
12131415161718
19202122232425
2627282930  

Categories

WordPress Quotes

You cannot dream yourself into a character: you must hammer and forge yourself into one.
Henry D. Thoreau

Recent Comments

November 2018
M T W T F S S
« Oct    
 1234
567891011
12131415161718
19202122232425
2627282930  

Short Cuts

2012 SERVER (64)
2016 windows (9)
AIX (13)
Amazon (34)
Ansibile (18)
Apache (133)
Asterisk (2)
cassandra (2)
Centos (209)
Centos RHEL 7 (258)
chef (3)
cloud (2)
cluster (3)
Coherence (1)
DB2 (5)
DISK (25)
DNS (9)
Docker (28)
Eassy (11)
ELKS (1)
EXCHANGE (3)
Fedora (6)
ftp (5)
GIT (3)
GOD (2)
Grub (1)
Hacking (10)
Hadoop (6)
horoscope (23)
Hyper-V (10)
IIS (15)
IPTABLES (15)
JAVA (7)
JBOSS (32)
jenkins (1)
Kubernetes (2)
Ldap (5)
Linux (189)
Linux Commands (167)
Load balancer (5)
mariadb (14)
Mongodb (4)
MQ Server (22)
MYSQL (84)
Nagios (5)
NaturalOil (13)
Nginx (30)
Ngix (1)
openldap (1)
Openstack (6)
Oracle (34)
Perl (3)
Postfix (19)
Postgresql (1)
PowerShell (2)
Python (3)
qmail (36)
Redis (12)
RHCE (28)
SCALEIO (1)
Security on Centos (29)
SFTP (1)
Shell (64)
Solaris (58)
Sql Server 2012 (4)
squid (3)
SSH (10)
SSL (14)
Storage (1)
swap (3)
TIPS on Linux (28)
tomcat (60)
Uncategorized (29)
Veritas (2)
vfabric (1)
VMware (28)
Weblogic (38)
Websphere (71)
Windows (19)
Windows Software (2)
wordpress (1)
ZIMBRA (17)

WP Cumulus Flash tag cloud by Roy Tanck requires Flash Player 9 or better.

Who's Online

14 visitors online now
0 guests, 14 bots, 0 members

Hit Counter provided by dental implants orange county

CentOS6.x risk vulnerabilities

This article is only for the Green League vulnerability scan results, in RHEL / CentOS / OEL5.x x64-bit versions exist as high-risk vulnerabilities, where finishing solutions, again through vulnerability scanning, vulnerability has been patched.
High-risk
OpenSSH ‘schnorr.c’ remote memory corruption vulnerability (CVE-2014-1692)
OpenSSH J-PAKE licensing issues Vulnerability (CVE-2010-4478)
OpenSSH GSSAPI remote code execution vulnerability (CVE-2006-5051)
GNU Bash environment variable remote Command Execution Vulnerability (CVE-2014-6271)
GNU Wget symlink vulnerability (CVE-2014-4877)
The risk
OpenSSH default server configuration Denial of Service Vulnerability (CVE-2010-5107)
OpenSSH glob expression Denial of Service Vulnerability (CVE-2010-4755)
OpenSSH Licenses and Access Control Vulnerability (CVE-2014-2532)
OpenSSH verify_host_key function SSHFP DNS RR Check Bypass Vulnerability (CVE-2014-2653)
OpenSSH S / Key Remote Information Disclosure Vulnerability (CVE-2007-2243)

1. RHEL /CentOS/OEL5/6.x x64-bit versions of the operating system vulnerabilities Galway to upgrade openssh 6.6p1, would eliminate the loopholes in the following school risk, low-risk vulnerabilities can ignored.
(1) using the original source package installation
(2) using rpm installation package upgrade installation, this uses rpm package upgrade patch.

 

Leave a Reply

You can use these HTML tags

<a href="" title=""> <abbr title=""> <acronym title=""> <b> <blockquote cite=""> <cite> <code> <del datetime=""> <em> <i> <q cite=""> <s> <strike> <strong>

  

  

  

Blue Captcha Image
Refresh

*

Protected by WP Anti Spam