27 Sep
2014
27 Sep
'14
6:46 p.m.
salt stack > pulp > puppet
--
Regards,
Darius Jan Seroka
dariusjs@gmail.com
On Sat, Sep 27, 2014 at 2:13 AM, Adam Armstrong adama@memetic.org wrote:
> THE POWER OF PUPPET COMPELS YOU
>
>
>
>
>
> On 2014-09-26 21:42, Michael Loftis wrote:
>
>> Oh and word is THIS one still isn't quite final too. Coz yanno I love
>> having to patch thousands of boxes.
>>
>> On Fri, Sep 26, 2014 at 12:07 PM, Adam Armstrong adama@memetic.org
>> wrote:
>> Seems the first lot of patches didn't work, so they patched them all
>> again!
>>
>> YAY!
>>
>> adam.
>>
>>
>>
>> On 2014-09-25 07:57, tonto@decoygaming.com.au wrote:
>>
>> Hey all,
>>
>> This isn't technically about Observium but felt it was worth bringing
>> to your attention.
>>
>>
>> https://www.us-cert.gov/ncas/current-activity/2014/09/24/
>> Bourne-Again-Shell-Bash-Remote-Code-Execution-Vulnerability
>>
>> A bash exploit has been announced that allows remote code execution.
>> Updates are available for Debian/Ubuntu/RHEL via APT/YUM.
>>
>> Might be an idea to patch your Observium boxes.
>>
>> Regards,
>> Matt "Tonto" Harper - DecoyGaming
>> _______________________________________________
>> observium mailing list
>> observium@observium.org
>> http://postman.memetic.org/cgi-bin/mailman/listinfo/observium
>>
>> _______________________________________________
>> observium mailing list
>> observium@observium.org
>> http://postman.memetic.org/cgi-bin/mailman/listinfo/observium
>>
> _______________________________________________
> observium mailing list
> observium@observium.org
> http://postman.memetic.org/cgi-bin/mailman/listinfo/observium
>