Displaying 20 results from an estimated 1126 matches for "006".
Did you mean:
2006
2010 Jun 01
3
problem with intToChar
...t;\n" "\n" "\r" "\003" "\v" "\v" "\v"
[251] "\n" "\002" "\n" "\003" "\005" "\005" "\004" "\004" "\004" "\v"
[261] "\006" "\f" "\003" "\n" "\003" "\003" "\001" "\002" "\002" "\v"
[271] "\003" "\003" "\003" "\n" "\f" "\005" "\005" "\004"...
2013 Aug 16
2
[PATCH] xfstests: update filters and output of btrfs/006
The btrfs-progs tools changed the output:
- 100GiB instead of 100GB
- The number of spaces was changed
Signed-off-by: Stefan Behrens <sbehrens@giantdisaster.de>
---
common/filter | 2 +-
common/filter.btrfs | 3 ++-
tests/btrfs/006 | 6 +++---
tests/btrfs/006.out | 36 ++++++++++++++++++------------------
4 files changed, 24 insertions(+), 23 deletions(-)
diff --git a/common/filter b/common/filter
index dbb1674..ee738ca 100644
--- a/common/filter
+++ b/common/filter
@@ -262,7 +262,7 @@ _filter_uuid()
# Filter out sizes...
2013 Dec 16
0
AST-2013-006: Buffer Overflow when receiving odd length 16 bit SMS message
Asterisk Project Security Advisory - AST-2013-006
Product Asterisk
Summary Buffer Overflow when receiving odd length 16 bit SMS
message
Nature of Advisory Buffer Overflow and Remote Crash...
2013 Dec 16
0
AST-2013-006: Buffer Overflow when receiving odd length 16 bit SMS message
Asterisk Project Security Advisory - AST-2013-006
Product Asterisk
Summary Buffer Overflow when receiving odd length 16 bit SMS
message
Nature of Advisory Buffer Overflow and Remote Crash...
2017 Aug 31
0
AST-2017-006: Shell access command injection in app_minivm
Asterisk Project Security Advisory - AST-2017-006
Product Asterisk
Summary Shell access command injection in app_minivm
Nature of Advisory Unauthorized command execution
Susceptibility Remote Authenticated Sessions...
2011 Apr 21
0
AST-2011-006: Asterisk Manager User Shell Access
Asterisk Project Security Advisory - AST-2011-006
Product Asterisk
Summary Asterisk Manager User Shell Access
Nature of Advisory Permission Escalation
Susceptibility Remote Authenticated Sessions...
2019 Nov 21
0
AST-2019-006: SIP request can change address of a SIP peer.
Asterisk Project Security Advisory - AST-2019-006
Product Asterisk
Summary SIP request can change address of a SIP peer.
Nature of Advisory Denial of Service
Susceptibility Remote Unauthenticated Sessions...
2014 Jun 12
0
AST-2014-006: Asterisk Manager User Unauthorized Shell Access
Asterisk Project Security Advisory - AST-2014-006
Product Asterisk
Summary Asterisk Manager User Unauthorized Shell Access
Nature of Advisory Permission Escalation
Susceptibility Remote Authenticated Sessions...
2014 Jun 12
0
AST-2014-006: Asterisk Manager User Unauthorized Shell Access
Asterisk Project Security Advisory - AST-2014-006
Product Asterisk
Summary Asterisk Manager User Unauthorized Shell Access
Nature of Advisory Permission Escalation
Susceptibility Remote Authenticated Sessions...
2011 Apr 21
1
AST-2011-006: Asterisk Manager User Shell Access
Asterisk Project Security Advisory - AST-2011-006
Product Asterisk
Summary Asterisk Manager User Shell Access
Nature of Advisory Permission Escalation
Susceptibility Remote Authenticated Sessions...
2018 Feb 21
0
AST-2018-006: WebSocket frames with 0 sized payload causes DoS
Asterisk Project Security Advisory - AST-2018-006
Product Asterisk
Summary WebSocket frames with 0 sized payload causes DoS
Nature of Advisory Denial of Service
Susceptibility Remote Unauthenticated Sessions...
2009 Sep 04
0
[Fwd: AST-2009-006: IAX2 Call Number Resource Exhaustion]
Hello,
Just in case someone hasn't upgraded yet, and is using IAX2.
-------- Original Message --------
Subject: AST-2009-006: IAX2 Call Number Resource Exhaustion
Date: Thu, 03 Sep 2009 17:47:35 -0500
From: Asterisk Security Team <security at asterisk.org>
To: bugtraq at securityfocus.com
Asterisk Project Security Advisory - AST-2009-006
+----------------------------------------------------...
2012 Apr 23
0
AST-2012-006: Remote Crash Vulnerability in SIP Channel Driver
Asterisk Project Security Advisory - AST-2012-006
Product Asterisk
Summary Remote Crash Vulnerability in SIP Channel Driver
Nature of Advisory Remote Crash
Susceptibility Remote Authenticated Sessions...
2016 Sep 08
0
AST-2016-006: Crash on ACK from unknown endpoint
Asterisk Project Security Advisory - AST-2016-006
Product Asterisk
Summary Crash on ACK from unknown endpoint
Nature of Advisory Remote Crash
Susceptibility Remote unauthenticated sessions...
2007 Apr 03
0
DTMF via IAX ignored after a few seconds
...004 ISeqno: 005 Type: IAX Subclass: ACK
Timestamp: 05623ms SCall: 00001 DCall: 00023 [64.2.142.31:4569]
Rx-Frame Retry[ No] -- OSeqno: 005 ISeqno: 004 Type: DTMF_E Subclass: 1
Timestamp: 05783ms SCall: 00023 DCall: 00001 [64.2.142.31:4569]
Tx-Frame Retry[-01] -- OSeqno: 004 ISeqno: 006 Type: IAX Subclass: ACK
Timestamp: 05783ms SCall: 00001 DCall: 00023 [64.2.142.31:4569]
#===================================================================
The tones for 411 above work fine and call is routed to the directory app
== CDR updated on IAX2/vitel-inbound-1
-- Exec...
2007 Jun 20
5
0.23 question
I think that I''m running into the warning on external node support here but
after a recent upgrade for my puppetmaster I get:
puppetmasterd[19397]: Could not find aa0-006-4.foo.com with names
aa0-006-4.foo.com, aa0-006-4
I''ve not changed puppetd.conf which contains:
ldapnodes = true
ldapserver = my.ldap.foo.com
ldapbase = ou=hosts,dc=foo,dc=com
I''ve not explicitly set external_nodes (so it stays false).
What else needs to be done?
Cheers...
2005 Apr 06
1
%U doesn't work in root postexec
Hi!
I've following in my smb.conf
root postexec = /bin/rm /hades/samba/netlogon/scripts/%U.bat
but I get following in my logfile:
[2005/04/06 13:55:39, 1] smbd/service.c:close_cnum(836)
hitt-006 (10.16.69.21) closed connection to service penzrobe
[2005/04/06 13:55:39, 1] smbd/service.c:close_cnum(836)
hitt-006 (10.16.69.21) closed connection to service netlogon
/bin/rm: cannot remove `/hades/samba/netlogon/scripts/.bat': No such file or
directory
[2005/04/06 13:55:56, 1] smbd/service...
2002 Jun 28
1
Problem in optim(method="L-BFGS-B") (PR#1717)
...istance to the stationary point = 1.4763e-001
Cauchy X = -3.18017 6.51477 0.97505 15.259
---------------- exit CAUCHY----------------------
4 variables are free at GCP on iteration 12 #
!!!!!!!!!!!!!!!!!!!!!!
LINE SEARCH 0 times; norm of step = 2.30637
X = -3.90499 7.26709 1e-006 16.8712
G = 2.86794e+006 2.02055e+006 -4.1147e+009 -0.191468
iterations 12
function evaluations 15
segments explored during Cauchy searches 12
BFGS updates skipped 0
active bounds at final generalized Cauchy point 0
norm of the final projected gradient 4.1147e+009
final function value 4.1188e+00...
2007 Nov 25
2
2007-006 Ruby SSL Update on Debian
Hi *!
Just a heads up. The recent issues with the Ruby SSL Security Fix are
now available on Debian too.
I''ve updated the infos on
http://reductivelabs.com/trac/puppet/wiki/RubySSL-2007-006
Summary:
DSA 1410-1 and DSA 1411-1 updating ruby1.8 to 1.8.5-4etch1 cause puppet
to fail, if the puppetmaster has no certificate matching the value of
the client''s "server" parameter, which is "puppet" by default.
Regards, David
2004 Oct 06
0
iax2, strange native bridge problem????
...: 330561062
Tx-Frame Retry[000] -- OSeqno: 001 ISeqno: 005 Type: IAX Subclass: TXREQ
Timestamp: 03368ms SCall: 00008 DCall: 17188 [62.178.166.159:4569]
APPARENT ADDRES : IPV4 80.141.107.154:4569
CALL NUMBER : 3
TRANSFER ID : 330561062
Tx-Frame Retry[000] -- OSeqno: 006 ISeqno: 002 Type: VOICE Subclass: 2
Timestamp: 03442ms SCall: 00007 DCall: 00003 [80.141.107.154:4569]
Rx-Frame Retry[Yes] -- OSeqno: 002 ISeqno: 001 Type: IAX Subclass: UNQULCH
Timestamp: 03250ms SCall: 17188 DCall: 00008 [62.178.166.159:4569]
Tx-Frame Retry[-01] -- OSeqno: 001 I...