Internal Use - Confidential

Hello, 

First up, please check for the latest firmware presence for MD1400 and PERC 
H730Mini in your server.
https://www.dell.com/support/home/in/en/inbsd1/product-support/product/storage-md1400/drivers

Thanks
Vivek

-----Original Message-----
From: linux-poweredge-bounces-Lists <linux-poweredge-boun...@lists.us.dell.com> 
On Behalf Of linux-poweredge-request-Lists
Sent: Sunday, March 15, 2020 9:26 PM
To: linux-poweredge-Lists
Subject: Linux-PowerEdge Digest, Vol 184, Issue 7

Send Linux-PowerEdge mailing list submissions to
        linux-poweredge@dell.com

To subscribe or unsubscribe via the World Wide Web, visit
        https://lists.us.dell.com/mailman/listinfo/linux-poweredge
or, via email, send a message with subject or body 'help' to
        linux-poweredge-requ...@dell.com

You can reach the person managing the list at
        linux-poweredge-ow...@dell.com

When replying, please edit your Subject line so it is more specific than "Re: 
Contents of Linux-PowerEdge digest..."


Today's Topics:

   1. Re:  [Security Alert] Latest Dell's (Peter Brunnengraeber)
   2. Re:  [Security Alert] Latest Dell's (Patrick Boutilier)
   3.  PERC-attached enclosures don't appear in
      /sys/class/enclosure - expected? (Anthony Alba)
   4. Re:  [Security Alert] Latest Dell's (Ben Argyle)


----------------------------------------------------------------------

Message: 1
Date: Sat, 14 Mar 2020 15:34:55 -0400 (EDT)
From: Peter Brunnengraeber <pbrun...@bccglobal.com>
To: linux-poweredge@dell.com
Subject: Re: [Linux-PowerEdge] [Security Alert] Latest Dell's
Message-ID:
        <1153553367.720.1584214492716.JavaMail.pbrunnen@Station10.local>
Content-Type: text/plain; charset="utf-8"


[EXTERNAL EMAIL] 

Dear Dell OMSA team,
  I need to agree with Zbigniew's post...  OMSA should really use the system 
JRE.  We require the GUI for our non-technical end users to do their system 
checklists, but we've had to strip OMSA because our the security team keeps 
flagging our systems.

-With kind regards,
 Peter Brunnengr?ber


----- Original Message -----
From: linux-poweredge-requ...@dell.com
To: linux-poweredge@dell.com
Sent: Saturday, March 14, 2020 1:00:01 PM
Subject: Linux-PowerEdge Digest, Vol 184, Issue 6

------------------------------

Message: 3
Date: Sat, 14 Mar 2020 08:07:49 +0000
From: <fragon_z...@dell.com>
To: <mr.zbi...@upcpoczta.pl>, <linux-powere...@lists.us.dell.com>
Subject: Re: [Linux-PowerEdge] [Security Alert] Latest Dell's
        srvadmin-jre-9.4.0-3787.15943.el7.x86_64.rpm vulnerable
Message-ID:
        <48db0050425e435bbabca45fd3ef9...@kulx13mdc105.apac.dell.com>
Content-Type: text/plain; charset="us-ascii"

Dell Customer Communication - Confidential

Hi Zbigniew

Are you using GUI function of OMSA? Or only command line? If latter, I'd 
suggest to remove GUI related packages (include Java/Tomcat etc). This avoids 
Java vulnerabilities. 

Thanks,  

-----Original Message-----
From: linux-poweredge-bounces-Lists <linux-poweredge-boun...@lists.us.dell.com> 
On Behalf Of mr.zbiggy
Sent: Friday, March 13, 2020 5:19 PM
To: linux-poweredge-Lists
Subject: [Linux-PowerEdge] [Security Alert] Latest Dell's 
srvadmin-jre-9.4.0-3787.15943.el7.x86_64.rpm vulnerable


[EXTERNAL EMAIL] 

Dear Dell,

Nessus Security Scanner found your package:
srvadmin-jre-9.4.0-3787.15943.el7.x86_64.rpm vulnerable. Please update.

Java JRE 1.11.0_4 from Dell's package:
 srvadmin-jre-9.4.0-3787.15943.el7.x86_64.rpm
has several vulnerabilities. Please update to fixed Java JRE 1.11.0_6 or stop 
distributing Java JRE and start using Java from Operating System which is 
faster maintained.

Package           : srvadmin-jre-9.4.0-3787.15943.el7.x86_64.rpm
Path              : /opt/dell/srvadmin/lib64/openmanage/
Installed version : 1.11.0_4
Fixed version     : 1.11.0_6

The version of Oracle (formerly Sun) Java SE or Java for Business installed on 
the remote host is prior to 11 Update 6. It is, therefore, affected by multiple 
vulnerabilities related to the following components:
- 2D
- Libraries
- Kerberos
- Networking
- JavaFX
- Hotspot
- Scripting
- Javadoc
- Deployment
- Concurrency
- JAXP
- Serialization
- Security
Nessus has not tested for these issues but has instead relied only on the 
application's self-reported version number.
- Oracle Java SE and Java SE Embedded are prone to a severe division by zero, 
over 'Multiple' protocol. This issue affects the 'SQLite'
component.(CVE-2019-16168)
- Oracle Java SE and Java SE Embedded are prone to format string vulnerability, 
leading to a read uninitialized stack data over 'Multiple' protocol. This issue 
affects the 'libxst' component.
(CVE-2019-13117, CVE-2019-13118)
- Oracle Java SE and Java SE Embedded are prone to a remote security 
vulnerability. An unauthenticated remote attacker can exploit this over 
'Kerberos' protocol. This issue affects the 'Security' component.
(CVE-2020-2601, CVE-2020-2590)
- Oracle Java SE/Java SE Embedded are prone to a remote security vulnerability. 
An unauthenticated remote attacker can exploit this overmultiple protocols. 
This issue affects the 'Serialization'
component. (CVE-2020-2604, CVE-2020-2583)
- Oracle Java SE/Java SE Embedded are prone to a remote security vulnerability. 
Tn unauthenticated remote attacker can exploit this over multiple protocols. 
This issue affects the 'Networking' component.
(CVE-2020-2593, CVE-2020-2659)
- Oracle Java SE are prone to a remote security vulnerability. An 
unauthenticated remote attacker can exploit this over multiple protocols. This 
issue affects the 'Libraries' component. (CVE-2020-2654)
- Oracle Java SE are prone to a multiple security vulnerability. An 
unauthenticated remote attacker can exploit this over multiple protocols. This 
issue affects the 'JavaFX' component. (CVE-2020-2585)
- Oracle Java SE are prone to a multiple security vulnerability. An 
unauthenticate remote attacker can exploit this over 'HTTPS' protocols.
This issue affects the 'JSSE' component. (CVE-2020-2655)

iava: 2019-A-0385
cve: CVE-2019-11068
cve: CVE-2019-2894
cve: CVE-2019-2933
cve: CVE-2019-2945
cve: CVE-2019-2949
cve: CVE-2019-2958
cve: CVE-2019-2962
cve: CVE-2019-2964
cve: CVE-2019-2973
cve: CVE-2019-2975
cve: CVE-2019-2977
cve: CVE-2019-2978
cve: CVE-2019-2981
cve: CVE-2019-2983
cve: CVE-2019-2987
cve: CVE-2019-2988
cve: CVE-2019-2989
cve: CVE-2019-2992
cve: CVE-2019-2996
cve: CVE-2019-2999
bid: 109323
iava: 2020-A-0023
cve: CVE-2019-13117
cve: CVE-2019-13118
cve: CVE-2019-16168
cve: CVE-2020-2583
cve: CVE-2020-2585
cve: CVE-2020-2590
cve: CVE-2020-2593
cve: CVE-2020-2601
cve: CVE-2020-2604
cve: CVE-2020-2654
cve: CVE-2020-2655
cve: CVE-2020-2659

greetings,
Zbigniew

_______________________________________________
Linux-PowerEdge mailing list
Linux-PowerEdge@dell.com
https://lists.us.dell.com/mailman/listinfo/linux-poweredge



------------------------------

Subject: Digest Footer

_______________________________________________
Linux-PowerEdge mailing list
Linux-PowerEdge@dell.com
https://lists.us.dell.com/mailman/listinfo/linux-poweredge

------------------------------

End of Linux-PowerEdge Digest, Vol 184, Issue 6
***********************************************



------------------------------

Message: 2
Date: Sat, 14 Mar 2020 20:01:58 -0300
From: Patrick Boutilier <bouti...@ednet.ns.ca>
To: linux-poweredge@dell.com
Subject: Re: [Linux-PowerEdge] [Security Alert] Latest Dell's
Message-ID: <1562f097-c6d5-30a0-2f25-b46709455...@ednet.ns.ca>
Content-Type: text/plain; charset="utf-8"; Format="flowed"


[EXTERNAL EMAIL] 

This seems to work as a workaround. Restart dsm_om_connsvc service afterwards.


mv /opt/dell/srvadmin/lib64/openmanage/jre 
/opt/dell/srvadmin/lib64/openmanage/jre.OLD

ln -s /usr/lib/jvm/java-11-openjdk-11.0.6.10-1.el7_7.x86_64 
/opt/dell/srvadmin/lib64/openmanage/jre




On 3/14/20 4:34 PM, Peter Brunnengraeber wrote:
> 
> [EXTERNAL EMAIL]
> 
> Dear Dell OMSA team,
>    I need to agree with Zbigniew's post...  OMSA should really use the system 
> JRE.  We require the GUI for our non-technical end users to do their system 
> checklists, but we've had to strip OMSA because our the security team keeps 
> flagging our systems.
> 
> -With kind regards,
>   Peter Brunnengr?ber
> 
> 
> ----- Original Message -----
> From: linux-poweredge-requ...@dell.com
> To: linux-poweredge@dell.com
> Sent: Saturday, March 14, 2020 1:00:01 PM
> Subject: Linux-PowerEdge Digest, Vol 184, Issue 6
> 
> ------------------------------
> 
> Message: 3
> Date: Sat, 14 Mar 2020 08:07:49 +0000
> From: <fragon_z...@dell.com>
> To: <mr.zbi...@upcpoczta.pl>, <linux-powere...@lists.us.dell.com>
> Subject: Re: [Linux-PowerEdge] [Security Alert] Latest Dell's
>       srvadmin-jre-9.4.0-3787.15943.el7.x86_64.rpm vulnerable
> Message-ID:
>       <48db0050425e435bbabca45fd3ef9...@kulx13mdc105.apac.dell.com>
> Content-Type: text/plain; charset="us-ascii"
> 
> Dell Customer Communication - Confidential
> 
> Hi Zbigniew
> 
> Are you using GUI function of OMSA? Or only command line? If latter, I'd 
> suggest to remove GUI related packages (include Java/Tomcat etc). This avoids 
> Java vulnerabilities.
> 
> Thanks,
> 
> -----Original Message-----
> From: linux-poweredge-bounces-Lists 
> <linux-poweredge-boun...@lists.us.dell.com> On Behalf Of mr.zbiggy
> Sent: Friday, March 13, 2020 5:19 PM
> To: linux-poweredge-Lists
> Subject: [Linux-PowerEdge] [Security Alert] Latest Dell's 
> srvadmin-jre-9.4.0-3787.15943.el7.x86_64.rpm vulnerable
> 
> 
> [EXTERNAL EMAIL]
> 
> Dear Dell,
> 
> Nessus Security Scanner found your package:
> srvadmin-jre-9.4.0-3787.15943.el7.x86_64.rpm vulnerable. Please update.
> 
> Java JRE 1.11.0_4 from Dell's package:
>   srvadmin-jre-9.4.0-3787.15943.el7.x86_64.rpm
> has several vulnerabilities. Please update to fixed Java JRE 1.11.0_6 or stop 
> distributing Java JRE and start using Java from Operating System which is 
> faster maintained.
> 
> Package                 : srvadmin-jre-9.4.0-3787.15943.el7.x86_64.rpm
> Path              : /opt/dell/srvadmin/lib64/openmanage/
> Installed version : 1.11.0_4
> Fixed version     : 1.11.0_6
> 
> The version of Oracle (formerly Sun) Java SE or Java for Business installed 
> on the remote host is prior to 11 Update 6. It is, therefore, affected by 
> multiple vulnerabilities related to the following components:
> - 2D
> - Libraries
> - Kerberos
> - Networking
> - JavaFX
> - Hotspot
> - Scripting
> - Javadoc
> - Deployment
> - Concurrency
> - JAXP
> - Serialization
> - Security
> Nessus has not tested for these issues but has instead relied only on the 
> application's self-reported version number.
> - Oracle Java SE and Java SE Embedded are prone to a severe division by zero, 
> over 'Multiple' protocol. This issue affects the 'SQLite'
> component.(CVE-2019-16168)
> - Oracle Java SE and Java SE Embedded are prone to format string 
> vulnerability, leading to a read uninitialized stack data over 'Multiple' 
> protocol. This issue affects the 'libxst' component.
> (CVE-2019-13117, CVE-2019-13118)
> - Oracle Java SE and Java SE Embedded are prone to a remote security 
> vulnerability. An unauthenticated remote attacker can exploit this over 
> 'Kerberos' protocol. This issue affects the 'Security' component.
> (CVE-2020-2601, CVE-2020-2590)
> - Oracle Java SE/Java SE Embedded are prone to a remote security 
> vulnerability. An unauthenticated remote attacker can exploit this 
> overmultiple protocols. This issue affects the 'Serialization'
> component. (CVE-2020-2604, CVE-2020-2583)
> - Oracle Java SE/Java SE Embedded are prone to a remote security 
> vulnerability. Tn unauthenticated remote attacker can exploit this over 
> multiple protocols. This issue affects the 'Networking' component.
> (CVE-2020-2593, CVE-2020-2659)
> - Oracle Java SE are prone to a remote security vulnerability. An 
> unauthenticated remote attacker can exploit this over multiple protocols. 
> This issue affects the 'Libraries' component. (CVE-2020-2654)
> - Oracle Java SE are prone to a multiple security vulnerability. An 
> unauthenticated remote attacker can exploit this over multiple protocols. 
> This issue affects the 'JavaFX' component. (CVE-2020-2585)
> - Oracle Java SE are prone to a multiple security vulnerability. An 
> unauthenticate remote attacker can exploit this over 'HTTPS' protocols.
> This issue affects the 'JSSE' component. (CVE-2020-2655)
> 
> iava: 2019-A-0385
> cve: CVE-2019-11068
> cve: CVE-2019-2894
> cve: CVE-2019-2933
> cve: CVE-2019-2945
> cve: CVE-2019-2949
> cve: CVE-2019-2958
> cve: CVE-2019-2962
> cve: CVE-2019-2964
> cve: CVE-2019-2973
> cve: CVE-2019-2975
> cve: CVE-2019-2977
> cve: CVE-2019-2978
> cve: CVE-2019-2981
> cve: CVE-2019-2983
> cve: CVE-2019-2987
> cve: CVE-2019-2988
> cve: CVE-2019-2989
> cve: CVE-2019-2992
> cve: CVE-2019-2996
> cve: CVE-2019-2999
> bid: 109323
> iava: 2020-A-0023
> cve: CVE-2019-13117
> cve: CVE-2019-13118
> cve: CVE-2019-16168
> cve: CVE-2020-2583
> cve: CVE-2020-2585
> cve: CVE-2020-2590
> cve: CVE-2020-2593
> cve: CVE-2020-2601
> cve: CVE-2020-2604
> cve: CVE-2020-2654
> cve: CVE-2020-2655
> cve: CVE-2020-2659
> 
> greetings,
> Zbigniew
> 
> _______________________________________________
> Linux-PowerEdge mailing list
> Linux-PowerEdge@dell.com
> https://lists.us.dell.com/mailman/listinfo/linux-poweredge
> 
> 
> 
> ------------------------------
> 
> Subject: Digest Footer
> 
> _______________________________________________
> Linux-PowerEdge mailing list
> Linux-PowerEdge@dell.com
> https://lists.us.dell.com/mailman/listinfo/linux-poweredge
> 
> ------------------------------
> 
> End of Linux-PowerEdge Digest, Vol 184, Issue 6
> ***********************************************
> 
> _______________________________________________
> Linux-PowerEdge mailing list
> Linux-PowerEdge@dell.com
> https://lists.us.dell.com/mailman/listinfo/linux-poweredge
> 

-------------- next part --------------
A non-text attachment was scrubbed...
Name: boutilpj.vcf
Type: text/x-vcard
Size: 286 bytes
Desc: not available
URL: 
<http://lists.us.dell.com/pipermail/linux-poweredge/attachments/20200314/e53db842/attachment-0001.vcf>

------------------------------

Message: 3
Date: Sun, 15 Mar 2020 11:13:41 +0800
From: Anthony Alba <ascanio.al...@gmail.com>
To: linux-poweredge@dell.com
Subject: [Linux-PowerEdge] PERC-attached enclosures don't appear in
        /sys/class/enclosure - expected?
Message-ID:
        <cadkwibee+eqzvjy8ez3-pdf3yc-_jwws_xc-6cgzspbdcvr...@mail.gmail.com>
Content-Type: text/plain; charset="UTF-8"


[EXTERNAL EMAIL] 

Hi, on a PowerEdge R630 running with PERC H730 Mini the internal
enclosure and MD1400 (external enclosure) do not appear in
/sys/class/enclosure/.

(For comparison: on a white box build with LSI SAS2008 + ARECA
enclosure /sys/class/enclosure/ is populated.)

I am wondering if this is a "feature" and an artifact of the
megaraid_sas driver? racadm storage does see everything correctly.

OS is CentOS 7.6

Cheers
Anthony Alba



------------------------------

Message: 4
Date: Sun, 15 Mar 2020 15:55:53 +0000
From: Ben Argyle <ben.arg...@uis.cam.ac.uk>
To: Patrick Boutilier <bouti...@ednet.ns.ca>,
        "linux-poweredge@dell.com" <linux-poweredge@dell.com>
Subject: Re: [Linux-PowerEdge] [Security Alert] Latest Dell's
Message-ID:
        
<lnxp265mb0746ed87bdf1630b40dd340f8b...@lnxp265mb0746.gbrp265.prod.outlook.com>
        
Content-Type: text/plain; charset="iso-8859-1"


[EXTERNAL EMAIL] 

I'd suggest linking to a system-managed JRE symlink of that version of Java, 
rather than a specific version(ed) directory which will be removed the next 
time you get an update for that RPM.

Ben
--
Servers and Storage Team, UIS, University of Cambridge


________________________________________
From: Linux-PowerEdge <linux-poweredge-boun...@dell.com> on behalf of Patrick 
Boutilier <bouti...@ednet.ns.ca>
Sent: 14 March 2020 23:01
To: linux-poweredge@dell.com
Subject: Re: [Linux-PowerEdge] [Security Alert] Latest Dell's


[EXTERNAL EMAIL]

This seems to work as a workaround. Restart dsm_om_connsvc service
afterwards.


mv /opt/dell/srvadmin/lib64/openmanage/jre
/opt/dell/srvadmin/lib64/openmanage/jre.OLD

ln -s /usr/lib/jvm/java-11-openjdk-11.0.6.10-1.el7_7.x86_64
/opt/dell/srvadmin/lib64/openmanage/jre




On 3/14/20 4:34 PM, Peter Brunnengraeber wrote:
>
> [EXTERNAL EMAIL]
>
> Dear Dell OMSA team,
>    I need to agree with Zbigniew's post...  OMSA should really use the system 
> JRE.  We require the GUI for our non-technical end users to do their system 
> checklists, but we've had to strip OMSA because our the security team keeps 
> flagging our systems.
>
> -With kind regards,
>   Peter Brunnengr?ber
>
>
> ----- Original Message -----
> From: linux-poweredge-requ...@dell.com
> To: linux-poweredge@dell.com
> Sent: Saturday, March 14, 2020 1:00:01 PM
> Subject: Linux-PowerEdge Digest, Vol 184, Issue 6
>
> ------------------------------
>
> Message: 3
> Date: Sat, 14 Mar 2020 08:07:49 +0000
> From: <fragon_z...@dell.com>
> To: <mr.zbi...@upcpoczta.pl>, <linux-powere...@lists.us.dell.com>
> Subject: Re: [Linux-PowerEdge] [Security Alert] Latest Dell's
>       srvadmin-jre-9.4.0-3787.15943.el7.x86_64.rpm vulnerable
> Message-ID:
>       <48db0050425e435bbabca45fd3ef9...@kulx13mdc105.apac.dell.com>
> Content-Type: text/plain; charset="us-ascii"
>
> Dell Customer Communication - Confidential
>
> Hi Zbigniew
>
> Are you using GUI function of OMSA? Or only command line? If latter, I'd 
> suggest to remove GUI related packages (include Java/Tomcat etc). This avoids 
> Java vulnerabilities.
>
> Thanks,
>
> -----Original Message-----
> From: linux-poweredge-bounces-Lists 
> <linux-poweredge-boun...@lists.us.dell.com> On Behalf Of mr.zbiggy
> Sent: Friday, March 13, 2020 5:19 PM
> To: linux-poweredge-Lists
> Subject: [Linux-PowerEdge] [Security Alert] Latest Dell's 
> srvadmin-jre-9.4.0-3787.15943.el7.x86_64.rpm vulnerable
>
>
> [EXTERNAL EMAIL]
>
> Dear Dell,
>
> Nessus Security Scanner found your package:
> srvadmin-jre-9.4.0-3787.15943.el7.x86_64.rpm vulnerable. Please update.
>
> Java JRE 1.11.0_4 from Dell's package:
>   srvadmin-jre-9.4.0-3787.15943.el7.x86_64.rpm
> has several vulnerabilities. Please update to fixed Java JRE 1.11.0_6 or stop 
> distributing Java JRE and start using Java from Operating System which is 
> faster maintained.
>
> Package                 : srvadmin-jre-9.4.0-3787.15943.el7.x86_64.rpm
> Path              : /opt/dell/srvadmin/lib64/openmanage/
> Installed version : 1.11.0_4
> Fixed version     : 1.11.0_6
>
> The version of Oracle (formerly Sun) Java SE or Java for Business installed 
> on the remote host is prior to 11 Update 6. It is, therefore, affected by 
> multiple vulnerabilities related to the following components:
> - 2D
> - Libraries
> - Kerberos
> - Networking
> - JavaFX
> - Hotspot
> - Scripting
> - Javadoc
> - Deployment
> - Concurrency
> - JAXP
> - Serialization
> - Security
> Nessus has not tested for these issues but has instead relied only on the 
> application's self-reported version number.
> - Oracle Java SE and Java SE Embedded are prone to a severe division by zero, 
> over 'Multiple' protocol. This issue affects the 'SQLite'
> component.(CVE-2019-16168)
> - Oracle Java SE and Java SE Embedded are prone to format string 
> vulnerability, leading to a read uninitialized stack data over 'Multiple' 
> protocol. This issue affects the 'libxst' component.
> (CVE-2019-13117, CVE-2019-13118)
> - Oracle Java SE and Java SE Embedded are prone to a remote security 
> vulnerability. An unauthenticated remote attacker can exploit this over 
> 'Kerberos' protocol. This issue affects the 'Security' component.
> (CVE-2020-2601, CVE-2020-2590)
> - Oracle Java SE/Java SE Embedded are prone to a remote security 
> vulnerability. An unauthenticated remote attacker can exploit this 
> overmultiple protocols. This issue affects the 'Serialization'
> component. (CVE-2020-2604, CVE-2020-2583)
> - Oracle Java SE/Java SE Embedded are prone to a remote security 
> vulnerability. Tn unauthenticated remote attacker can exploit this over 
> multiple protocols. This issue affects the 'Networking' component.
> (CVE-2020-2593, CVE-2020-2659)
> - Oracle Java SE are prone to a remote security vulnerability. An 
> unauthenticated remote attacker can exploit this over multiple protocols. 
> This issue affects the 'Libraries' component. (CVE-2020-2654)
> - Oracle Java SE are prone to a multiple security vulnerability. An 
> unauthenticated remote attacker can exploit this over multiple protocols. 
> This issue affects the 'JavaFX' component. (CVE-2020-2585)
> - Oracle Java SE are prone to a multiple security vulnerability. An 
> unauthenticate remote attacker can exploit this over 'HTTPS' protocols.
> This issue affects the 'JSSE' component. (CVE-2020-2655)
>
> iava: 2019-A-0385
> cve: CVE-2019-11068
> cve: CVE-2019-2894
> cve: CVE-2019-2933
> cve: CVE-2019-2945
> cve: CVE-2019-2949
> cve: CVE-2019-2958
> cve: CVE-2019-2962
> cve: CVE-2019-2964
> cve: CVE-2019-2973
> cve: CVE-2019-2975
> cve: CVE-2019-2977
> cve: CVE-2019-2978
> cve: CVE-2019-2981
> cve: CVE-2019-2983
> cve: CVE-2019-2987
> cve: CVE-2019-2988
> cve: CVE-2019-2989
> cve: CVE-2019-2992
> cve: CVE-2019-2996
> cve: CVE-2019-2999
> bid: 109323
> iava: 2020-A-0023
> cve: CVE-2019-13117
> cve: CVE-2019-13118
> cve: CVE-2019-16168
> cve: CVE-2020-2583
> cve: CVE-2020-2585
> cve: CVE-2020-2590
> cve: CVE-2020-2593
> cve: CVE-2020-2601
> cve: CVE-2020-2604
> cve: CVE-2020-2654
> cve: CVE-2020-2655
> cve: CVE-2020-2659
>
> greetings,
> Zbigniew
>
> _______________________________________________
> Linux-PowerEdge mailing list
> Linux-PowerEdge@dell.com
> https://lists.us.dell.com/mailman/listinfo/linux-poweredge
>
>
>
> ------------------------------
>
> Subject: Digest Footer
>
> _______________________________________________
> Linux-PowerEdge mailing list
> Linux-PowerEdge@dell.com
> https://lists.us.dell.com/mailman/listinfo/linux-poweredge
>
> ------------------------------
>
> End of Linux-PowerEdge Digest, Vol 184, Issue 6
> ***********************************************
>
> _______________________________________________
> Linux-PowerEdge mailing list
> Linux-PowerEdge@dell.com
> https://lists.us.dell.com/mailman/listinfo/linux-poweredge
>



------------------------------

Subject: Digest Footer

_______________________________________________
Linux-PowerEdge mailing list
Linux-PowerEdge@dell.com
https://lists.us.dell.com/mailman/listinfo/linux-poweredge

------------------------------

End of Linux-PowerEdge Digest, Vol 184, Issue 7
***********************************************

_______________________________________________
Linux-PowerEdge mailing list
Linux-PowerEdge@dell.com
https://lists.us.dell.com/mailman/listinfo/linux-poweredge

Reply via email to