Displaying 20 results from an estimated 132 matches for "1473".
Did you mean:
147
2002 May 23
0
Semaphore Timeout on from Win2K to Samba
...normally connects w/NO problems). Here is the output from /var/log/messages
(appears the problem is in smbd)
May 23 11:34:14 fileserver nmbd[1423]: [2002/05/23 11:34:14, 0]
nmbd/nmbd.c:sig_term(65)
May 23 11:34:14 fileserver nmbd[1423]: Got SIGTERM: going down...
May 23 11:35:45 fileserver smbd[1473]: [2002/05/23 11:35:45, 0]
lib/util_sock.c:get_socket_addr(1038)
May 23 11:35:45 fileserver smbd[1473]: getpeername failed. Error was
Transport endpoint is not connected
May 23 11:35:45 fileserver smbd[1473]: [2002/05/23 11:35:45, 0]
lib/util_sock.c:get_socket_addr(1038)
May 23 11:35:45 filese...
2004 Jan 09
0
large file pre-allocation causing Windows error
...2003-1/DVm04-01.avi -> VIDEO/2003-1/DVm04-01.avi
[2004/01/09 10:05:49, 10] smbd/reply.c:can_delete(1257)
can_delete: VIDEO/2003-1/DVm04-01.avi, dirtype = 6
[2004/01/09 10:05:49, 8] smbd/dosmode.c:dos_mode(122)
dos_mode: VIDEO/2003-1/DVm04-01.avi
[2004/01/09 10:05:49, 8] lib/util.c:is_in_path(1473)
is_in_path: VIDEO/2003-1/DVm04-01.avi
[2004/01/09 10:05:49, 8] lib/util.c:is_in_path(1477)
is_in_path: no name list.
[2004/01/09 10:05:49, 8] smbd/dosmode.c:dos_mode(168)
dos_mode returning a
[2004/01/09 10:05:49, 5] smbd/files.c:file_new(122)
allocated file structure 2384, fnum = 6480 (1...
2008 May 28
7
[Bug 1473] New: Add option to save PID of a backgrounded ssh process
https://bugzilla.mindrot.org/show_bug.cgi?id=1473
Summary: Add option to save PID of a backgrounded ssh process
Classification: Unclassified
Product: Portable OpenSSH
Version: 5.0p1
Platform: All
OS/Version: All
Status: NEW
Severity: enhancement
Priority: P2...
2020 Sep 25
1
[Bug 1473] New: [log] not printing in combination with ct state and set update a/o rate limit
https://bugzilla.netfilter.org/show_bug.cgi?id=1473
Bug ID: 1473
Summary: [log] not printing in combination with ct state and
set update a/o rate limit
Product: nftables
Version: unspecified
Hardware: arm
OS: Debian GNU/Linux
Status: NEW...
2015 Jul 22
0
CEEA-2015:1473 CentOS 7 python-urllib3 Enhancement Update
CentOS Errata and Enhancement Advisory 2015:1473
Upstream details at : https://rhn.redhat.com/errata/RHEA-2015-1473.html
The following updated files have been uploaded and are currently
syncing to the mirrors: ( sha256sum Filename )
x86_64:
b21e62ce993d1f5c86097dc205598fb71a24b096d356c38639b464e1886d3f36 python-urllib3-1.10.2-1.el7_1.noarc...
2011 Nov 22
0
CEBA-2011:1473 CentOS 5 i386 ltrace Update
CentOS Errata and Bugfix Advisory 2011:1473
Upstream details at : https://rhn.redhat.com/errata/RHBA-2011-1473.html
The following updated files have been uploaded and are currently
syncing to the mirrors: ( md5sum Filename )
i386:
0be35fe0be137cc50e85ea7a7dd54c81 ltrace-0.5-13.45svn.el5_7.12.i386.rpm
Source:
131670cc094d3b8baefcb93cd...
2011 Nov 22
0
CEBA-2011:1473 CentOS 5 x86_64 ltrace Update
CentOS Errata and Bugfix Advisory 2011:1473
Upstream details at : https://rhn.redhat.com/errata/RHBA-2011-1473.html
The following updated files have been uploaded and are currently
syncing to the mirrors: ( md5sum Filename )
x86_64:
84cb434c37124ab3a45c003b0f2182f2 ltrace-0.5-13.45svn.el5_7.12.x86_64.rpm
Source:
131670cc094d3b8baefcb...
2012 Nov 22
0
CEEA-2012:1473 CentOS 6 gstreamer-plugins-base FASTTRACK Update
CentOS Errata and Enhancement Advisory 2012:1473
Upstream details at : https://rhn.redhat.com/errata/RHEA-2012-1473.html
The following updated files have been uploaded and are currently
syncing to the mirrors: ( sha256sum Filename )
i386:
1640b8e258cb7b99eb1bf55b2cf8252d5516baff47ab0224956c294b397a4e55 gstreamer-plugins-base-0.10.29-2.el6....
2013 Oct 30
0
CESA-2013:1473 Important CentOS 6 spice-server Update
CentOS Errata and Security Advisory 2013:1473 Important
Upstream details at : https://rhn.redhat.com/errata/RHSA-2013-1473.html
The following updated files have been uploaded and are currently
syncing to the mirrors: ( sha256sum Filename )
x86_64:
2de1917c3c4db38d765347c868124278dfa706467daacb8df0ec753393b0f1f7 spice-server-0.12.0-12.el...
2011 Jan 17
3
Winbind uselessly using up Idmap range in ldap
...)
Idmap module nss already registered!
[2011/01/17 10:13:50.312693, 0]
winbindd/idmap_ldap.c:1471(idmap_ldap_set_mapping)
ldap_set_mapping_internals: Failed to add
S-1-5-21-8015792-1768810241-176008768-513 to 12350 mapping [gidNumber]
[2011/01/17 10:13:50.312747, 0]
winbindd/idmap_ldap.c:1473(idmap_ldap_set_mapping)
ldap_set_mapping_internals: Error was: (Already exists)
[2011/01/17 10:13:50.318187, 0]
winbindd/idmap.c:201(smb_register_idmap_alloc)
idmap_alloc module ldap already registered!
[2011/01/17 10:13:50.318225, 0]
winbindd/idmap.c:201(smb_register_idmap_alloc)
idm...
2013 Dec 04
8
[Bug 72315] New: Fedora 19 64-bit X crash
...0x00000004
(0x04000200)
[681684.974381] nouveau E[ PFIFO][0000:03:00.0] PFIFO: write fault at
0x00002a0000 [PAGE_NOT_PRESENT] from (unknown enum 0x00000000)/GPC0/(unknown
enum 0x0000000f) on channel 0x007f96f000 [unknown]
[681691.606820] nouveau E[ PGRAPH][0000:03:00.0] TRAP ch 2 [0x007f96f000
X[1473]]
[681691.606833] nouveau E[ PGRAPH][0000:03:00.0] ROP0 0x80000000 0x80000001
[681691.606839] nouveau E[ PGRAPH][0000:03:00.0] ROP1 0x80000000 0x80000001
[681704.871500] nouveau E[ PGRAPH][0000:03:00.0] TRAP ch 2 [0x007f96f000
X[1473]]
[681704.871512] nouveau E[ PGRAPH][0000:03:00.0] ROP0 0x800...
2017 Nov 16
3
[Bug 103780] New: Nouveau causes lockup - fifo: read fault at 00005ac000 engine 00 [GR] client 02 [GPC1/PE_0] reason 02 [PTE] on channel 24 [103b5b2000 Xwayland[1507]]
https://bugs.freedesktop.org/show_bug.cgi?id=103780
Bug ID: 103780
Summary: Nouveau causes lockup - fifo: read fault at 00005ac000
engine 00 [GR] client 02 [GPC1/PE_0] reason 02 [PTE]
on channel 24 [103b5b2000 Xwayland[1507]]
Product: xorg
Version: unspecified
Hardware: Other
OS: All
2015 Apr 27
5
Centos security update
Thanks for the replies. The tool that we used for testing the security
vulnerability is "Nessus".
I have glibc version 2.17-78.el7, I saw that CVE-2015-0235 (Ghost) is fixed
in this version and I want to apply patch for the vulnerbailities
CVE-2015-1472 & CVE-2015-1473. Can you please help me in finding the right
version that has fixes for these?
Thanks
On Sat, Apr 25, 2015 at 1:05 AM, <m.roth at 5-cent.us> wrote:
> John R Pierce wrote:
> > On 4/24/2015 12:14 PM, Alexander Dalloz wrote:
> >> Am 24.04.2015 um 11:21 schrieb Venkateswara R...
2002 Apr 22
1
predict.*bSpline() bugs extrapolating for deriv >= 1 (PR#1473)
I've already fixed the bugs, but as with the last one, this is
not critical enough to allow breaking current R-devel's code
freeze. I hope I will have corrected it for 1.5.1..
## Here is code reproducing the problems;
## I use try(.) whenever I know the current versions of R would
## give an error:
library(splines)
x <- c(1:3,5:6)
y <- c(3:1,5:6)
(isP <- interpSpline(x,y))#
2011 Nov 22
0
CentOS-announce Digest, Vol 81, Issue 10
...S 5 i386 openmotif22 FASTTRACK Update
(Johnny Hughes)
4. CEBA-2011:1467 CentOS 5 x86_64 openmotif22 FASTTRACK Update
(Johnny Hughes)
5. CEBA-2011:1472 CentOS 5 i386 libexif Update (Johnny Hughes)
6. CEBA-2011:1472 CentOS 5 x86_64 libexif Update (Johnny Hughes)
7. CEBA-2011:1473 CentOS 5 i386 ltrace Update (Johnny Hughes)
8. CEBA-2011:1473 CentOS 5 x86_64 ltrace Update (Johnny Hughes)
----------------------------------------------------------------------
Message: 1
Date: Tue, 22 Nov 2011 12:18:35 +0000
From: Johnny Hughes <johnny at centos.org>
Subject: [Cent...
2004 Apr 20
0
samba locking problem
...call_trans2qfilepathinfo cfenton/Butzlaff/Wettbewerb Stifterverband/Marketing.doc (fnum = 13567) level=1005 call=7 total_data=0
[2004/03/02 15:03:56, 8] smbd/dosmode.c:dos_mode(122)
dos_mode: cfenton/Butzlaff/Wettbewerb Stifterverband/Marketing.doc
[2004/03/02 15:03:56, 8] lib/util.c:is_in_path(1473)
is_in_path: cfenton/Butzlaff/Wettbewerb Stifterverband/Marketing.doc
[2004/03/02 15:03:56, 8] lib/util.c:is_in_path(1477)
is_in_path: no name list.
[2004/03/02 15:03:56, 8] smbd/dosmode.c:dos_mode(168)
dos_mode returning a
[2004/03/02 15:03:56, 9] smbd/trans2.c:send_trans2_replies(177)
t2_...
2015 Jul 23
0
CentOS-announce Digest, Vol 125, Issue 8
...p' to
centos-announce-request at centos.org
You can reach the person managing the list at
centos-announce-owner at centos.org
When replying, please edit your Subject line so it is more specific
than "Re: Contents of CentOS-announce digest..."
Today's Topics:
1. CEEA-2015:1473 CentOS 7 python-urllib3 Enhancement Update
(Johnny Hughes)
2. CEBA-2015:1474 CentOS 7 python-chardet BugFix Update
(Johnny Hughes)
3. CEBA-2015:1475 CentOS 7 python-requests BugFix Update
(Johnny Hughes)
4. CEBA-2015:1208 CentOS 7 perl-Date-Calc FASTTRACK BugFix
Upd...
2015 Apr 27
0
Centos security update
...s for the replies. The tool that we used for testing the security
> vulnerability is "Nessus".
>
> I have glibc version 2.17-78.el7, I saw that CVE-2015-0235 (Ghost) is fixed
> in this version and I want to apply patch for the vulnerbailities
> CVE-2015-1472 & CVE-2015-1473. Can you please help me in finding the right
> version that has fixes for these?
You have the latest glibc package available.
Checking upstream, Red Hat has their CVE information here:
https://access.redhat.com/security/cve/CVE-2015-1472
https://access.redhat.com/security/cve/CVE-2015-1473
I...
2019 Sep 11
0
Joining Windows 2008 Domain as DC fails 4.10 (and 4.11rc3)
..._init__.py
> #2396: Merge the contents of this file with your system krb5.conf or
> replace it with this one. Do not create a symlink!
> Provision OK for domain DN DC=mydomain,DC=ext
> Starting replication
> Schema-DN[CN=Schema,CN=Configuration,DC=mydomain,DC=ext]
> objects[402/1473] linked_values[0/0]
> Schema-DN[CN=Schema,CN=Configuration,DC=mydomain,DC=ext]
> objects[804/1473] linked_values[0/0]
> Schema-DN[CN=Schema,CN=Configuration,DC=mydomain,DC=ext]
> objects[1206/1473] linked_values[0/0]
> Schema-DN[CN=Schema,CN=Configuration,DC=mydomain,DC=ext]
>...
2016 Mar 09
2
Client-initiated secure renegotiation
On 09/03/16 10:44, Florent B wrote:
> Hi,
>
> I don't see any SSL configuration option in Dovecot to disable
> "Client-initiated secure renegotiation".
>
> It is advised to disable it as it can cause DDoS (CVE-2011-1473).
>
> Is it possible to have this possibility through an SSL option or other ?
>
> Thank you.
>
> Florent
ssl_protocols = !SSLv3 !SSLv2
Is that enough?