Internal Use - Confidential Hello,
First up, please check for the latest firmware presence for MD1400 and PERC H730Mini in your server. https://www.dell.com/support/home/in/en/inbsd1/product-support/product/storage-md1400/drivers Thanks Vivek -----Original Message----- From: linux-poweredge-bounces-Lists <linux-poweredge-boun...@lists.us.dell.com> On Behalf Of linux-poweredge-request-Lists Sent: Sunday, March 15, 2020 9:26 PM To: linux-poweredge-Lists Subject: Linux-PowerEdge Digest, Vol 184, Issue 7 Send Linux-PowerEdge mailing list submissions to linux-poweredge@dell.com To subscribe or unsubscribe via the World Wide Web, visit https://lists.us.dell.com/mailman/listinfo/linux-poweredge or, via email, send a message with subject or body 'help' to linux-poweredge-requ...@dell.com You can reach the person managing the list at linux-poweredge-ow...@dell.com When replying, please edit your Subject line so it is more specific than "Re: Contents of Linux-PowerEdge digest..." Today's Topics: 1. Re: [Security Alert] Latest Dell's (Peter Brunnengraeber) 2. Re: [Security Alert] Latest Dell's (Patrick Boutilier) 3. PERC-attached enclosures don't appear in /sys/class/enclosure - expected? (Anthony Alba) 4. Re: [Security Alert] Latest Dell's (Ben Argyle) ---------------------------------------------------------------------- Message: 1 Date: Sat, 14 Mar 2020 15:34:55 -0400 (EDT) From: Peter Brunnengraeber <pbrun...@bccglobal.com> To: linux-poweredge@dell.com Subject: Re: [Linux-PowerEdge] [Security Alert] Latest Dell's Message-ID: <1153553367.720.1584214492716.JavaMail.pbrunnen@Station10.local> Content-Type: text/plain; charset="utf-8" [EXTERNAL EMAIL] Dear Dell OMSA team, I need to agree with Zbigniew's post... OMSA should really use the system JRE. We require the GUI for our non-technical end users to do their system checklists, but we've had to strip OMSA because our the security team keeps flagging our systems. -With kind regards, Peter Brunnengr?ber ----- Original Message ----- From: linux-poweredge-requ...@dell.com To: linux-poweredge@dell.com Sent: Saturday, March 14, 2020 1:00:01 PM Subject: Linux-PowerEdge Digest, Vol 184, Issue 6 ------------------------------ Message: 3 Date: Sat, 14 Mar 2020 08:07:49 +0000 From: <fragon_z...@dell.com> To: <mr.zbi...@upcpoczta.pl>, <linux-powere...@lists.us.dell.com> Subject: Re: [Linux-PowerEdge] [Security Alert] Latest Dell's srvadmin-jre-9.4.0-3787.15943.el7.x86_64.rpm vulnerable Message-ID: <48db0050425e435bbabca45fd3ef9...@kulx13mdc105.apac.dell.com> Content-Type: text/plain; charset="us-ascii" Dell Customer Communication - Confidential Hi Zbigniew Are you using GUI function of OMSA? Or only command line? If latter, I'd suggest to remove GUI related packages (include Java/Tomcat etc). This avoids Java vulnerabilities. Thanks, -----Original Message----- From: linux-poweredge-bounces-Lists <linux-poweredge-boun...@lists.us.dell.com> On Behalf Of mr.zbiggy Sent: Friday, March 13, 2020 5:19 PM To: linux-poweredge-Lists Subject: [Linux-PowerEdge] [Security Alert] Latest Dell's srvadmin-jre-9.4.0-3787.15943.el7.x86_64.rpm vulnerable [EXTERNAL EMAIL] Dear Dell, Nessus Security Scanner found your package: srvadmin-jre-9.4.0-3787.15943.el7.x86_64.rpm vulnerable. Please update. Java JRE 1.11.0_4 from Dell's package: srvadmin-jre-9.4.0-3787.15943.el7.x86_64.rpm has several vulnerabilities. Please update to fixed Java JRE 1.11.0_6 or stop distributing Java JRE and start using Java from Operating System which is faster maintained. Package : srvadmin-jre-9.4.0-3787.15943.el7.x86_64.rpm Path : /opt/dell/srvadmin/lib64/openmanage/ Installed version : 1.11.0_4 Fixed version : 1.11.0_6 The version of Oracle (formerly Sun) Java SE or Java for Business installed on the remote host is prior to 11 Update 6. It is, therefore, affected by multiple vulnerabilities related to the following components: - 2D - Libraries - Kerberos - Networking - JavaFX - Hotspot - Scripting - Javadoc - Deployment - Concurrency - JAXP - Serialization - Security Nessus has not tested for these issues but has instead relied only on the application's self-reported version number. - Oracle Java SE and Java SE Embedded are prone to a severe division by zero, over 'Multiple' protocol. This issue affects the 'SQLite' component.(CVE-2019-16168) - Oracle Java SE and Java SE Embedded are prone to format string vulnerability, leading to a read uninitialized stack data over 'Multiple' protocol. This issue affects the 'libxst' component. (CVE-2019-13117, CVE-2019-13118) - Oracle Java SE and Java SE Embedded are prone to a remote security vulnerability. An unauthenticated remote attacker can exploit this over 'Kerberos' protocol. This issue affects the 'Security' component. (CVE-2020-2601, CVE-2020-2590) - Oracle Java SE/Java SE Embedded are prone to a remote security vulnerability. An unauthenticated remote attacker can exploit this overmultiple protocols. This issue affects the 'Serialization' component. (CVE-2020-2604, CVE-2020-2583) - Oracle Java SE/Java SE Embedded are prone to a remote security vulnerability. Tn unauthenticated remote attacker can exploit this over multiple protocols. This issue affects the 'Networking' component. (CVE-2020-2593, CVE-2020-2659) - Oracle Java SE are prone to a remote security vulnerability. An unauthenticated remote attacker can exploit this over multiple protocols. This issue affects the 'Libraries' component. (CVE-2020-2654) - Oracle Java SE are prone to a multiple security vulnerability. An unauthenticated remote attacker can exploit this over multiple protocols. This issue affects the 'JavaFX' component. (CVE-2020-2585) - Oracle Java SE are prone to a multiple security vulnerability. An unauthenticate remote attacker can exploit this over 'HTTPS' protocols. This issue affects the 'JSSE' component. (CVE-2020-2655) iava: 2019-A-0385 cve: CVE-2019-11068 cve: CVE-2019-2894 cve: CVE-2019-2933 cve: CVE-2019-2945 cve: CVE-2019-2949 cve: CVE-2019-2958 cve: CVE-2019-2962 cve: CVE-2019-2964 cve: CVE-2019-2973 cve: CVE-2019-2975 cve: CVE-2019-2977 cve: CVE-2019-2978 cve: CVE-2019-2981 cve: CVE-2019-2983 cve: CVE-2019-2987 cve: CVE-2019-2988 cve: CVE-2019-2989 cve: CVE-2019-2992 cve: CVE-2019-2996 cve: CVE-2019-2999 bid: 109323 iava: 2020-A-0023 cve: CVE-2019-13117 cve: CVE-2019-13118 cve: CVE-2019-16168 cve: CVE-2020-2583 cve: CVE-2020-2585 cve: CVE-2020-2590 cve: CVE-2020-2593 cve: CVE-2020-2601 cve: CVE-2020-2604 cve: CVE-2020-2654 cve: CVE-2020-2655 cve: CVE-2020-2659 greetings, Zbigniew _______________________________________________ Linux-PowerEdge mailing list Linux-PowerEdge@dell.com https://lists.us.dell.com/mailman/listinfo/linux-poweredge ------------------------------ Subject: Digest Footer _______________________________________________ Linux-PowerEdge mailing list Linux-PowerEdge@dell.com https://lists.us.dell.com/mailman/listinfo/linux-poweredge ------------------------------ End of Linux-PowerEdge Digest, Vol 184, Issue 6 *********************************************** ------------------------------ Message: 2 Date: Sat, 14 Mar 2020 20:01:58 -0300 From: Patrick Boutilier <bouti...@ednet.ns.ca> To: linux-poweredge@dell.com Subject: Re: [Linux-PowerEdge] [Security Alert] Latest Dell's Message-ID: <1562f097-c6d5-30a0-2f25-b46709455...@ednet.ns.ca> Content-Type: text/plain; charset="utf-8"; Format="flowed" [EXTERNAL EMAIL] This seems to work as a workaround. Restart dsm_om_connsvc service afterwards. mv /opt/dell/srvadmin/lib64/openmanage/jre /opt/dell/srvadmin/lib64/openmanage/jre.OLD ln -s /usr/lib/jvm/java-11-openjdk-11.0.6.10-1.el7_7.x86_64 /opt/dell/srvadmin/lib64/openmanage/jre On 3/14/20 4:34 PM, Peter Brunnengraeber wrote: > > [EXTERNAL EMAIL] > > Dear Dell OMSA team, > I need to agree with Zbigniew's post... OMSA should really use the system > JRE. We require the GUI for our non-technical end users to do their system > checklists, but we've had to strip OMSA because our the security team keeps > flagging our systems. > > -With kind regards, > Peter Brunnengr?ber > > > ----- Original Message ----- > From: linux-poweredge-requ...@dell.com > To: linux-poweredge@dell.com > Sent: Saturday, March 14, 2020 1:00:01 PM > Subject: Linux-PowerEdge Digest, Vol 184, Issue 6 > > ------------------------------ > > Message: 3 > Date: Sat, 14 Mar 2020 08:07:49 +0000 > From: <fragon_z...@dell.com> > To: <mr.zbi...@upcpoczta.pl>, <linux-powere...@lists.us.dell.com> > Subject: Re: [Linux-PowerEdge] [Security Alert] Latest Dell's > srvadmin-jre-9.4.0-3787.15943.el7.x86_64.rpm vulnerable > Message-ID: > <48db0050425e435bbabca45fd3ef9...@kulx13mdc105.apac.dell.com> > Content-Type: text/plain; charset="us-ascii" > > Dell Customer Communication - Confidential > > Hi Zbigniew > > Are you using GUI function of OMSA? Or only command line? If latter, I'd > suggest to remove GUI related packages (include Java/Tomcat etc). This avoids > Java vulnerabilities. > > Thanks, > > -----Original Message----- > From: linux-poweredge-bounces-Lists > <linux-poweredge-boun...@lists.us.dell.com> On Behalf Of mr.zbiggy > Sent: Friday, March 13, 2020 5:19 PM > To: linux-poweredge-Lists > Subject: [Linux-PowerEdge] [Security Alert] Latest Dell's > srvadmin-jre-9.4.0-3787.15943.el7.x86_64.rpm vulnerable > > > [EXTERNAL EMAIL] > > Dear Dell, > > Nessus Security Scanner found your package: > srvadmin-jre-9.4.0-3787.15943.el7.x86_64.rpm vulnerable. Please update. > > Java JRE 1.11.0_4 from Dell's package: > srvadmin-jre-9.4.0-3787.15943.el7.x86_64.rpm > has several vulnerabilities. Please update to fixed Java JRE 1.11.0_6 or stop > distributing Java JRE and start using Java from Operating System which is > faster maintained. > > Package : srvadmin-jre-9.4.0-3787.15943.el7.x86_64.rpm > Path : /opt/dell/srvadmin/lib64/openmanage/ > Installed version : 1.11.0_4 > Fixed version : 1.11.0_6 > > The version of Oracle (formerly Sun) Java SE or Java for Business installed > on the remote host is prior to 11 Update 6. It is, therefore, affected by > multiple vulnerabilities related to the following components: > - 2D > - Libraries > - Kerberos > - Networking > - JavaFX > - Hotspot > - Scripting > - Javadoc > - Deployment > - Concurrency > - JAXP > - Serialization > - Security > Nessus has not tested for these issues but has instead relied only on the > application's self-reported version number. > - Oracle Java SE and Java SE Embedded are prone to a severe division by zero, > over 'Multiple' protocol. This issue affects the 'SQLite' > component.(CVE-2019-16168) > - Oracle Java SE and Java SE Embedded are prone to format string > vulnerability, leading to a read uninitialized stack data over 'Multiple' > protocol. This issue affects the 'libxst' component. > (CVE-2019-13117, CVE-2019-13118) > - Oracle Java SE and Java SE Embedded are prone to a remote security > vulnerability. An unauthenticated remote attacker can exploit this over > 'Kerberos' protocol. This issue affects the 'Security' component. > (CVE-2020-2601, CVE-2020-2590) > - Oracle Java SE/Java SE Embedded are prone to a remote security > vulnerability. An unauthenticated remote attacker can exploit this > overmultiple protocols. This issue affects the 'Serialization' > component. (CVE-2020-2604, CVE-2020-2583) > - Oracle Java SE/Java SE Embedded are prone to a remote security > vulnerability. Tn unauthenticated remote attacker can exploit this over > multiple protocols. This issue affects the 'Networking' component. > (CVE-2020-2593, CVE-2020-2659) > - Oracle Java SE are prone to a remote security vulnerability. An > unauthenticated remote attacker can exploit this over multiple protocols. > This issue affects the 'Libraries' component. (CVE-2020-2654) > - Oracle Java SE are prone to a multiple security vulnerability. An > unauthenticated remote attacker can exploit this over multiple protocols. > This issue affects the 'JavaFX' component. (CVE-2020-2585) > - Oracle Java SE are prone to a multiple security vulnerability. An > unauthenticate remote attacker can exploit this over 'HTTPS' protocols. > This issue affects the 'JSSE' component. (CVE-2020-2655) > > iava: 2019-A-0385 > cve: CVE-2019-11068 > cve: CVE-2019-2894 > cve: CVE-2019-2933 > cve: CVE-2019-2945 > cve: CVE-2019-2949 > cve: CVE-2019-2958 > cve: CVE-2019-2962 > cve: CVE-2019-2964 > cve: CVE-2019-2973 > cve: CVE-2019-2975 > cve: CVE-2019-2977 > cve: CVE-2019-2978 > cve: CVE-2019-2981 > cve: CVE-2019-2983 > cve: CVE-2019-2987 > cve: CVE-2019-2988 > cve: CVE-2019-2989 > cve: CVE-2019-2992 > cve: CVE-2019-2996 > cve: CVE-2019-2999 > bid: 109323 > iava: 2020-A-0023 > cve: CVE-2019-13117 > cve: CVE-2019-13118 > cve: CVE-2019-16168 > cve: CVE-2020-2583 > cve: CVE-2020-2585 > cve: CVE-2020-2590 > cve: CVE-2020-2593 > cve: CVE-2020-2601 > cve: CVE-2020-2604 > cve: CVE-2020-2654 > cve: CVE-2020-2655 > cve: CVE-2020-2659 > > greetings, > Zbigniew > > _______________________________________________ > Linux-PowerEdge mailing list > Linux-PowerEdge@dell.com > https://lists.us.dell.com/mailman/listinfo/linux-poweredge > > > > ------------------------------ > > Subject: Digest Footer > > _______________________________________________ > Linux-PowerEdge mailing list > Linux-PowerEdge@dell.com > https://lists.us.dell.com/mailman/listinfo/linux-poweredge > > ------------------------------ > > End of Linux-PowerEdge Digest, Vol 184, Issue 6 > *********************************************** > > _______________________________________________ > Linux-PowerEdge mailing list > Linux-PowerEdge@dell.com > https://lists.us.dell.com/mailman/listinfo/linux-poweredge > -------------- next part -------------- A non-text attachment was scrubbed... Name: boutilpj.vcf Type: text/x-vcard Size: 286 bytes Desc: not available URL: <http://lists.us.dell.com/pipermail/linux-poweredge/attachments/20200314/e53db842/attachment-0001.vcf> ------------------------------ Message: 3 Date: Sun, 15 Mar 2020 11:13:41 +0800 From: Anthony Alba <ascanio.al...@gmail.com> To: linux-poweredge@dell.com Subject: [Linux-PowerEdge] PERC-attached enclosures don't appear in /sys/class/enclosure - expected? Message-ID: <cadkwibee+eqzvjy8ez3-pdf3yc-_jwws_xc-6cgzspbdcvr...@mail.gmail.com> Content-Type: text/plain; charset="UTF-8" [EXTERNAL EMAIL] Hi, on a PowerEdge R630 running with PERC H730 Mini the internal enclosure and MD1400 (external enclosure) do not appear in /sys/class/enclosure/. (For comparison: on a white box build with LSI SAS2008 + ARECA enclosure /sys/class/enclosure/ is populated.) I am wondering if this is a "feature" and an artifact of the megaraid_sas driver? racadm storage does see everything correctly. OS is CentOS 7.6 Cheers Anthony Alba ------------------------------ Message: 4 Date: Sun, 15 Mar 2020 15:55:53 +0000 From: Ben Argyle <ben.arg...@uis.cam.ac.uk> To: Patrick Boutilier <bouti...@ednet.ns.ca>, "linux-poweredge@dell.com" <linux-poweredge@dell.com> Subject: Re: [Linux-PowerEdge] [Security Alert] Latest Dell's Message-ID: <lnxp265mb0746ed87bdf1630b40dd340f8b...@lnxp265mb0746.gbrp265.prod.outlook.com> Content-Type: text/plain; charset="iso-8859-1" [EXTERNAL EMAIL] I'd suggest linking to a system-managed JRE symlink of that version of Java, rather than a specific version(ed) directory which will be removed the next time you get an update for that RPM. Ben -- Servers and Storage Team, UIS, University of Cambridge ________________________________________ From: Linux-PowerEdge <linux-poweredge-boun...@dell.com> on behalf of Patrick Boutilier <bouti...@ednet.ns.ca> Sent: 14 March 2020 23:01 To: linux-poweredge@dell.com Subject: Re: [Linux-PowerEdge] [Security Alert] Latest Dell's [EXTERNAL EMAIL] This seems to work as a workaround. Restart dsm_om_connsvc service afterwards. mv /opt/dell/srvadmin/lib64/openmanage/jre /opt/dell/srvadmin/lib64/openmanage/jre.OLD ln -s /usr/lib/jvm/java-11-openjdk-11.0.6.10-1.el7_7.x86_64 /opt/dell/srvadmin/lib64/openmanage/jre On 3/14/20 4:34 PM, Peter Brunnengraeber wrote: > > [EXTERNAL EMAIL] > > Dear Dell OMSA team, > I need to agree with Zbigniew's post... OMSA should really use the system > JRE. We require the GUI for our non-technical end users to do their system > checklists, but we've had to strip OMSA because our the security team keeps > flagging our systems. > > -With kind regards, > Peter Brunnengr?ber > > > ----- Original Message ----- > From: linux-poweredge-requ...@dell.com > To: linux-poweredge@dell.com > Sent: Saturday, March 14, 2020 1:00:01 PM > Subject: Linux-PowerEdge Digest, Vol 184, Issue 6 > > ------------------------------ > > Message: 3 > Date: Sat, 14 Mar 2020 08:07:49 +0000 > From: <fragon_z...@dell.com> > To: <mr.zbi...@upcpoczta.pl>, <linux-powere...@lists.us.dell.com> > Subject: Re: [Linux-PowerEdge] [Security Alert] Latest Dell's > srvadmin-jre-9.4.0-3787.15943.el7.x86_64.rpm vulnerable > Message-ID: > <48db0050425e435bbabca45fd3ef9...@kulx13mdc105.apac.dell.com> > Content-Type: text/plain; charset="us-ascii" > > Dell Customer Communication - Confidential > > Hi Zbigniew > > Are you using GUI function of OMSA? Or only command line? If latter, I'd > suggest to remove GUI related packages (include Java/Tomcat etc). This avoids > Java vulnerabilities. > > Thanks, > > -----Original Message----- > From: linux-poweredge-bounces-Lists > <linux-poweredge-boun...@lists.us.dell.com> On Behalf Of mr.zbiggy > Sent: Friday, March 13, 2020 5:19 PM > To: linux-poweredge-Lists > Subject: [Linux-PowerEdge] [Security Alert] Latest Dell's > srvadmin-jre-9.4.0-3787.15943.el7.x86_64.rpm vulnerable > > > [EXTERNAL EMAIL] > > Dear Dell, > > Nessus Security Scanner found your package: > srvadmin-jre-9.4.0-3787.15943.el7.x86_64.rpm vulnerable. Please update. > > Java JRE 1.11.0_4 from Dell's package: > srvadmin-jre-9.4.0-3787.15943.el7.x86_64.rpm > has several vulnerabilities. Please update to fixed Java JRE 1.11.0_6 or stop > distributing Java JRE and start using Java from Operating System which is > faster maintained. > > Package : srvadmin-jre-9.4.0-3787.15943.el7.x86_64.rpm > Path : /opt/dell/srvadmin/lib64/openmanage/ > Installed version : 1.11.0_4 > Fixed version : 1.11.0_6 > > The version of Oracle (formerly Sun) Java SE or Java for Business installed > on the remote host is prior to 11 Update 6. It is, therefore, affected by > multiple vulnerabilities related to the following components: > - 2D > - Libraries > - Kerberos > - Networking > - JavaFX > - Hotspot > - Scripting > - Javadoc > - Deployment > - Concurrency > - JAXP > - Serialization > - Security > Nessus has not tested for these issues but has instead relied only on the > application's self-reported version number. > - Oracle Java SE and Java SE Embedded are prone to a severe division by zero, > over 'Multiple' protocol. This issue affects the 'SQLite' > component.(CVE-2019-16168) > - Oracle Java SE and Java SE Embedded are prone to format string > vulnerability, leading to a read uninitialized stack data over 'Multiple' > protocol. This issue affects the 'libxst' component. > (CVE-2019-13117, CVE-2019-13118) > - Oracle Java SE and Java SE Embedded are prone to a remote security > vulnerability. An unauthenticated remote attacker can exploit this over > 'Kerberos' protocol. This issue affects the 'Security' component. > (CVE-2020-2601, CVE-2020-2590) > - Oracle Java SE/Java SE Embedded are prone to a remote security > vulnerability. An unauthenticated remote attacker can exploit this > overmultiple protocols. This issue affects the 'Serialization' > component. (CVE-2020-2604, CVE-2020-2583) > - Oracle Java SE/Java SE Embedded are prone to a remote security > vulnerability. Tn unauthenticated remote attacker can exploit this over > multiple protocols. This issue affects the 'Networking' component. > (CVE-2020-2593, CVE-2020-2659) > - Oracle Java SE are prone to a remote security vulnerability. An > unauthenticated remote attacker can exploit this over multiple protocols. > This issue affects the 'Libraries' component. (CVE-2020-2654) > - Oracle Java SE are prone to a multiple security vulnerability. An > unauthenticated remote attacker can exploit this over multiple protocols. > This issue affects the 'JavaFX' component. (CVE-2020-2585) > - Oracle Java SE are prone to a multiple security vulnerability. An > unauthenticate remote attacker can exploit this over 'HTTPS' protocols. > This issue affects the 'JSSE' component. (CVE-2020-2655) > > iava: 2019-A-0385 > cve: CVE-2019-11068 > cve: CVE-2019-2894 > cve: CVE-2019-2933 > cve: CVE-2019-2945 > cve: CVE-2019-2949 > cve: CVE-2019-2958 > cve: CVE-2019-2962 > cve: CVE-2019-2964 > cve: CVE-2019-2973 > cve: CVE-2019-2975 > cve: CVE-2019-2977 > cve: CVE-2019-2978 > cve: CVE-2019-2981 > cve: CVE-2019-2983 > cve: CVE-2019-2987 > cve: CVE-2019-2988 > cve: CVE-2019-2989 > cve: CVE-2019-2992 > cve: CVE-2019-2996 > cve: CVE-2019-2999 > bid: 109323 > iava: 2020-A-0023 > cve: CVE-2019-13117 > cve: CVE-2019-13118 > cve: CVE-2019-16168 > cve: CVE-2020-2583 > cve: CVE-2020-2585 > cve: CVE-2020-2590 > cve: CVE-2020-2593 > cve: CVE-2020-2601 > cve: CVE-2020-2604 > cve: CVE-2020-2654 > cve: CVE-2020-2655 > cve: CVE-2020-2659 > > greetings, > Zbigniew > > _______________________________________________ > Linux-PowerEdge mailing list > Linux-PowerEdge@dell.com > https://lists.us.dell.com/mailman/listinfo/linux-poweredge > > > > ------------------------------ > > Subject: Digest Footer > > _______________________________________________ > Linux-PowerEdge mailing list > Linux-PowerEdge@dell.com > https://lists.us.dell.com/mailman/listinfo/linux-poweredge > > ------------------------------ > > End of Linux-PowerEdge Digest, Vol 184, Issue 6 > *********************************************** > > _______________________________________________ > Linux-PowerEdge mailing list > Linux-PowerEdge@dell.com > https://lists.us.dell.com/mailman/listinfo/linux-poweredge > ------------------------------ Subject: Digest Footer _______________________________________________ Linux-PowerEdge mailing list Linux-PowerEdge@dell.com https://lists.us.dell.com/mailman/listinfo/linux-poweredge ------------------------------ End of Linux-PowerEdge Digest, Vol 184, Issue 7 *********************************************** _______________________________________________ Linux-PowerEdge mailing list Linux-PowerEdge@dell.com https://lists.us.dell.com/mailman/listinfo/linux-poweredge