search for: 1473

Displaying 20 results from an estimated 132 matches for "1473".

Did you mean: 147
2002 May 23
0
Semaphore Timeout on from Win2K to Samba
...normally connects w/NO problems). Here is the output from /var/log/messages (appears the problem is in smbd) May 23 11:34:14 fileserver nmbd[1423]: [2002/05/23 11:34:14, 0] nmbd/nmbd.c:sig_term(65) May 23 11:34:14 fileserver nmbd[1423]: Got SIGTERM: going down... May 23 11:35:45 fileserver smbd[1473]: [2002/05/23 11:35:45, 0] lib/util_sock.c:get_socket_addr(1038) May 23 11:35:45 fileserver smbd[1473]: getpeername failed. Error was Transport endpoint is not connected May 23 11:35:45 fileserver smbd[1473]: [2002/05/23 11:35:45, 0] lib/util_sock.c:get_socket_addr(1038) May 23 11:35:45 filese...
2004 Jan 09
0
large file pre-allocation causing Windows error
...2003-1/DVm04-01.avi -> VIDEO/2003-1/DVm04-01.avi [2004/01/09 10:05:49, 10] smbd/reply.c:can_delete(1257) can_delete: VIDEO/2003-1/DVm04-01.avi, dirtype = 6 [2004/01/09 10:05:49, 8] smbd/dosmode.c:dos_mode(122) dos_mode: VIDEO/2003-1/DVm04-01.avi [2004/01/09 10:05:49, 8] lib/util.c:is_in_path(1473) is_in_path: VIDEO/2003-1/DVm04-01.avi [2004/01/09 10:05:49, 8] lib/util.c:is_in_path(1477) is_in_path: no name list. [2004/01/09 10:05:49, 8] smbd/dosmode.c:dos_mode(168) dos_mode returning a [2004/01/09 10:05:49, 5] smbd/files.c:file_new(122) allocated file structure 2384, fnum = 6480 (1...
2008 May 28
7
[Bug 1473] New: Add option to save PID of a backgrounded ssh process
https://bugzilla.mindrot.org/show_bug.cgi?id=1473 Summary: Add option to save PID of a backgrounded ssh process Classification: Unclassified Product: Portable OpenSSH Version: 5.0p1 Platform: All OS/Version: All Status: NEW Severity: enhancement Priority: P2...
2020 Sep 25
1
[Bug 1473] New: [log] not printing in combination with ct state and set update a/o rate limit
https://bugzilla.netfilter.org/show_bug.cgi?id=1473 Bug ID: 1473 Summary: [log] not printing in combination with ct state and set update a/o rate limit Product: nftables Version: unspecified Hardware: arm OS: Debian GNU/Linux Status: NEW...
2015 Jul 22
0
CEEA-2015:1473 CentOS 7 python-urllib3 Enhancement Update
CentOS Errata and Enhancement Advisory 2015:1473 Upstream details at : https://rhn.redhat.com/errata/RHEA-2015-1473.html The following updated files have been uploaded and are currently syncing to the mirrors: ( sha256sum Filename ) x86_64: b21e62ce993d1f5c86097dc205598fb71a24b096d356c38639b464e1886d3f36 python-urllib3-1.10.2-1.el7_1.noarc...
2011 Nov 22
0
CEBA-2011:1473 CentOS 5 i386 ltrace Update
CentOS Errata and Bugfix Advisory 2011:1473 Upstream details at : https://rhn.redhat.com/errata/RHBA-2011-1473.html The following updated files have been uploaded and are currently syncing to the mirrors: ( md5sum Filename ) i386: 0be35fe0be137cc50e85ea7a7dd54c81 ltrace-0.5-13.45svn.el5_7.12.i386.rpm Source: 131670cc094d3b8baefcb93cd...
2011 Nov 22
0
CEBA-2011:1473 CentOS 5 x86_64 ltrace Update
CentOS Errata and Bugfix Advisory 2011:1473 Upstream details at : https://rhn.redhat.com/errata/RHBA-2011-1473.html The following updated files have been uploaded and are currently syncing to the mirrors: ( md5sum Filename ) x86_64: 84cb434c37124ab3a45c003b0f2182f2 ltrace-0.5-13.45svn.el5_7.12.x86_64.rpm Source: 131670cc094d3b8baefcb...
2012 Nov 22
0
CEEA-2012:1473 CentOS 6 gstreamer-plugins-base FASTTRACK Update
CentOS Errata and Enhancement Advisory 2012:1473 Upstream details at : https://rhn.redhat.com/errata/RHEA-2012-1473.html The following updated files have been uploaded and are currently syncing to the mirrors: ( sha256sum Filename ) i386: 1640b8e258cb7b99eb1bf55b2cf8252d5516baff47ab0224956c294b397a4e55 gstreamer-plugins-base-0.10.29-2.el6....
2013 Oct 30
0
CESA-2013:1473 Important CentOS 6 spice-server Update
CentOS Errata and Security Advisory 2013:1473 Important Upstream details at : https://rhn.redhat.com/errata/RHSA-2013-1473.html The following updated files have been uploaded and are currently syncing to the mirrors: ( sha256sum Filename ) x86_64: 2de1917c3c4db38d765347c868124278dfa706467daacb8df0ec753393b0f1f7 spice-server-0.12.0-12.el...
2011 Jan 17
3
Winbind uselessly using up Idmap range in ldap
...) Idmap module nss already registered! [2011/01/17 10:13:50.312693, 0] winbindd/idmap_ldap.c:1471(idmap_ldap_set_mapping) ldap_set_mapping_internals: Failed to add S-1-5-21-8015792-1768810241-176008768-513 to 12350 mapping [gidNumber] [2011/01/17 10:13:50.312747, 0] winbindd/idmap_ldap.c:1473(idmap_ldap_set_mapping) ldap_set_mapping_internals: Error was: (Already exists) [2011/01/17 10:13:50.318187, 0] winbindd/idmap.c:201(smb_register_idmap_alloc) idmap_alloc module ldap already registered! [2011/01/17 10:13:50.318225, 0] winbindd/idmap.c:201(smb_register_idmap_alloc) idm...
2013 Dec 04
8
[Bug 72315] New: Fedora 19 64-bit X crash
...0x00000004 (0x04000200) [681684.974381] nouveau E[ PFIFO][0000:03:00.0] PFIFO: write fault at 0x00002a0000 [PAGE_NOT_PRESENT] from (unknown enum 0x00000000)/GPC0/(unknown enum 0x0000000f) on channel 0x007f96f000 [unknown] [681691.606820] nouveau E[ PGRAPH][0000:03:00.0] TRAP ch 2 [0x007f96f000 X[1473]] [681691.606833] nouveau E[ PGRAPH][0000:03:00.0] ROP0 0x80000000 0x80000001 [681691.606839] nouveau E[ PGRAPH][0000:03:00.0] ROP1 0x80000000 0x80000001 [681704.871500] nouveau E[ PGRAPH][0000:03:00.0] TRAP ch 2 [0x007f96f000 X[1473]] [681704.871512] nouveau E[ PGRAPH][0000:03:00.0] ROP0 0x800...
2017 Nov 16
3
[Bug 103780] New: Nouveau causes lockup - fifo: read fault at 00005ac000 engine 00 [GR] client 02 [GPC1/PE_0] reason 02 [PTE] on channel 24 [103b5b2000 Xwayland[1507]]
https://bugs.freedesktop.org/show_bug.cgi?id=103780 Bug ID: 103780 Summary: Nouveau causes lockup - fifo: read fault at 00005ac000 engine 00 [GR] client 02 [GPC1/PE_0] reason 02 [PTE] on channel 24 [103b5b2000 Xwayland[1507]] Product: xorg Version: unspecified Hardware: Other OS: All
2015 Apr 27
5
Centos security update
Thanks for the replies. The tool that we used for testing the security vulnerability is "Nessus". I have glibc version 2.17-78.el7, I saw that CVE-2015-0235 (Ghost) is fixed in this version and I want to apply patch for the vulnerbailities CVE-2015-1472 & CVE-2015-1473. Can you please help me in finding the right version that has fixes for these? Thanks On Sat, Apr 25, 2015 at 1:05 AM, <m.roth at 5-cent.us> wrote: > John R Pierce wrote: > > On 4/24/2015 12:14 PM, Alexander Dalloz wrote: > >> Am 24.04.2015 um 11:21 schrieb Venkateswara R...
2002 Apr 22
1
predict.*bSpline() bugs extrapolating for deriv >= 1 (PR#1473)
I've already fixed the bugs, but as with the last one, this is not critical enough to allow breaking current R-devel's code freeze. I hope I will have corrected it for 1.5.1.. ## Here is code reproducing the problems; ## I use try(.) whenever I know the current versions of R would ## give an error: library(splines) x <- c(1:3,5:6) y <- c(3:1,5:6) (isP <- interpSpline(x,y))#
2011 Nov 22
0
CentOS-announce Digest, Vol 81, Issue 10
...S 5 i386 openmotif22 FASTTRACK Update (Johnny Hughes) 4. CEBA-2011:1467 CentOS 5 x86_64 openmotif22 FASTTRACK Update (Johnny Hughes) 5. CEBA-2011:1472 CentOS 5 i386 libexif Update (Johnny Hughes) 6. CEBA-2011:1472 CentOS 5 x86_64 libexif Update (Johnny Hughes) 7. CEBA-2011:1473 CentOS 5 i386 ltrace Update (Johnny Hughes) 8. CEBA-2011:1473 CentOS 5 x86_64 ltrace Update (Johnny Hughes) ---------------------------------------------------------------------- Message: 1 Date: Tue, 22 Nov 2011 12:18:35 +0000 From: Johnny Hughes <johnny at centos.org> Subject: [Cent...
2004 Apr 20
0
samba locking problem
...call_trans2qfilepathinfo cfenton/Butzlaff/Wettbewerb Stifterverband/Marketing.doc (fnum = 13567) level=1005 call=7 total_data=0 [2004/03/02 15:03:56, 8] smbd/dosmode.c:dos_mode(122) dos_mode: cfenton/Butzlaff/Wettbewerb Stifterverband/Marketing.doc [2004/03/02 15:03:56, 8] lib/util.c:is_in_path(1473) is_in_path: cfenton/Butzlaff/Wettbewerb Stifterverband/Marketing.doc [2004/03/02 15:03:56, 8] lib/util.c:is_in_path(1477) is_in_path: no name list. [2004/03/02 15:03:56, 8] smbd/dosmode.c:dos_mode(168) dos_mode returning a [2004/03/02 15:03:56, 9] smbd/trans2.c:send_trans2_replies(177) t2_...
2015 Jul 23
0
CentOS-announce Digest, Vol 125, Issue 8
...p' to centos-announce-request at centos.org You can reach the person managing the list at centos-announce-owner at centos.org When replying, please edit your Subject line so it is more specific than "Re: Contents of CentOS-announce digest..." Today's Topics: 1. CEEA-2015:1473 CentOS 7 python-urllib3 Enhancement Update (Johnny Hughes) 2. CEBA-2015:1474 CentOS 7 python-chardet BugFix Update (Johnny Hughes) 3. CEBA-2015:1475 CentOS 7 python-requests BugFix Update (Johnny Hughes) 4. CEBA-2015:1208 CentOS 7 perl-Date-Calc FASTTRACK BugFix Upd...
2015 Apr 27
0
Centos security update
...s for the replies. The tool that we used for testing the security > vulnerability is "Nessus". > > I have glibc version 2.17-78.el7, I saw that CVE-2015-0235 (Ghost) is fixed > in this version and I want to apply patch for the vulnerbailities > CVE-2015-1472 & CVE-2015-1473. Can you please help me in finding the right > version that has fixes for these? You have the latest glibc package available. Checking upstream, Red Hat has their CVE information here: https://access.redhat.com/security/cve/CVE-2015-1472 https://access.redhat.com/security/cve/CVE-2015-1473 I...
2019 Sep 11
0
Joining Windows 2008 Domain as DC fails 4.10 (and 4.11rc3)
..._init__.py > #2396: Merge the contents of this file with your system krb5.conf or > replace it with this one. Do not create a symlink! > Provision OK for domain DN DC=mydomain,DC=ext > Starting replication > Schema-DN[CN=Schema,CN=Configuration,DC=mydomain,DC=ext] > objects[402/1473] linked_values[0/0] > Schema-DN[CN=Schema,CN=Configuration,DC=mydomain,DC=ext] > objects[804/1473] linked_values[0/0] > Schema-DN[CN=Schema,CN=Configuration,DC=mydomain,DC=ext] > objects[1206/1473] linked_values[0/0] > Schema-DN[CN=Schema,CN=Configuration,DC=mydomain,DC=ext] >...
2016 Mar 09
2
Client-initiated secure renegotiation
On 09/03/16 10:44, Florent B wrote: > Hi, > > I don't see any SSL configuration option in Dovecot to disable > "Client-initiated secure renegotiation". > > It is advised to disable it as it can cause DDoS (CVE-2011-1473). > > Is it possible to have this possibility through an SSL option or other ? > > Thank you. > > Florent ssl_protocols = !SSLv3 !SSLv2 Is that enough?