search for: 8594

Displaying 20 results from an estimated 27 matches for "8594".

Did you mean: 2594
2014 Nov 21
0
Processed: retitle 770230 to xen: CVE-2014-5146 CVE-2014-5149 CVE-2014-8594 CVE-2014-8595 CVE-2014-9030
Processing commands for control at bugs.debian.org: > retitle 770230 xen: CVE-2014-5146 CVE-2014-5149 CVE-2014-8594 CVE-2014-8595 CVE-2014-9030 Bug #770230 [src:xen] CVE-2014-5146 CVE-2014-5149 CVE-2014-8594 CVE-2014-8595 Changed Bug title to 'xen: CVE-2014-5146 CVE-2014-5149 CVE-2014-8594 CVE-2014-8595 CVE-2014-9030' from 'CVE-2014-5146 CVE-2014-5149 CVE-2014-8594 CVE-2014-8595' > thanks Stop...
2014 Nov 19
2
Bug#770230: CVE-2014-5146 CVE-2014-5149 CVE-2014-8594 CVE-2014-8595
Source: xen Severity: grave Tags: security Hi, the following security issues apply to Xen in jessie: CVE-2014-5146,CVE-2014-5149: https://marc.info/?l=oss-security&m=140784877111813&w=2 CVE-2014-8594: https://marc.info/?l=oss-security&m=141631359901060&w=2 CVE-2014-8595: https://marc.info/?l=oss-security&m=141631352601020&w=2 Cheers, Moritz
2014 Nov 21
0
Bug#770230: CVE-2014-5146 CVE-2014-5149 CVE-2014-8594 CVE-2014-8595
...:02PM +0100, Moritz Muehlenhoff wrote: > Source: xen > Severity: grave > Tags: security > > Hi, > the following security issues apply to Xen in jessie: > > CVE-2014-5146,CVE-2014-5149: > https://marc.info/?l=oss-security&m=140784877111813&w=2 > > CVE-2014-8594: > https://marc.info/?l=oss-security&m=141631359901060&w=2 > > CVE-2014-8595: > https://marc.info/?l=oss-security&m=141631352601020&w=2 And CVE-2014-9030: https://marc.info/?l=oss-security&m=141657283302489&w=2 Cheers, Moritz
2018 Feb 15
6
[Bug 105117] New: desktop freeze playing video nouveau: DATA_ERROR INVALID_BITFIELD
...noarch xorg-x11-fonts-core-7.6-32.3.noarch xorg-x11-libs-7.6.1-1.1.noarch xorg-x11-libX11-ccache-7.6-20.5.noarch xorg-x11-server-1.19.6-2.1.x86_64 xorg-x11-util-devel-7.6_1-10.4.noarch [ 852.947765] nouveau 0000:01:00.0: gr: DATA_ERROR 0000000c [INVALID_BITFIELD] ch 11 [003f7f0000 WebKitWebProces[8594 ]] subc 0 class 9197 mthd 0808 data 200203fd [ 852.947775] nouveau 0000:01:00.0: fifo: PBDMA0: 00040000 [] ch 11 [003f7f0000 WebKitWebProces[8594]] subc 0 mthd 23 90 data 3f000000 [ 852.947798] nouveau 0000:01:00.0: gr: DATA_ERROR 0000000c [INVALID_BITFIELD] ch 11 [003f7f0000 WebKitWebProces[8594...
2015 Nov 05
0
Processed: closing 770230
Processing commands for control at bugs.debian.org: > close 770230 4.5.1~rc1-1 Bug #770230 [src:xen] xen: CVE-2014-5146 CVE-2014-5149 CVE-2014-8594 CVE-2014-8595 CVE-2014-9030 Marked as fixed in versions xen/4.5.1~rc1-1. Bug #770230 [src:xen] xen: CVE-2014-5146 CVE-2014-5149 CVE-2014-8594 CVE-2014-8595 CVE-2014-9030 Marked Bug as done > thanks Stopping processing here. Please contact me if you need assistance. -- 770230: http://bugs.debia...
2008 Jan 04
0
entities and spacing: (em|en)dash and arrow
Hello, I notice that these entities are defined like this: def emdash opts "—" end def endash opts "–" end def arrow opts "→" end However, any space from the original markup is stripped, so "hello -- world" becomes "hello—world". I''ve overridden the methods to deal with this: def emdash opts " — " end def endash opts " – &qu...
2012 Sep 04
1
cenboxplot(): Reporting Limit Twice Correct Concentration
..., 9142, 9246, 9274, 9295, 9407, 8573, 8693, 8573, 8693, 8363, 8390, 8421, 8442, 8476, 8505, 8532, 8567, 8604, 8638, 8665, 8686, 8717, 8741, 8778, 8805, 8833, 8860, 8887, 8924, 8959, 8987, 9022, 9050, 9113, 9141, 9169, 9205, 9244, 9274, 9296, 9408, 8364, 8391, 8421, 8441, 8476, 8505, 8531, 8566, 8594, 8636, 8665, 8686, 8714, 8741, 8777, 8805, 8832, 8861, 8888, 8923, 8959, 8987, 9022, 9050, 9112, 9141, 9168, 9205, 9244, 9274, 9293, 9408, 8367, 8392, 8420, 8441, 8475, 8504, 8531, 8566, 8594, 8637, 8664, 8687, 8715, 8742, 8777, 8806, 8832, 8861, 8888, 8923, 8958, 8987, 9021, 9140, 9168, 9204,...
2005 Jul 16
1
Shares all empty after upgrade to 3.0.14a-fc4
...****-2003 > se_access_check: also S-1-5-21-*********-*********-*********-2005 > [2005/07/16 00:57:12, 5] lib/util_seaccess.c:se_access_check(309) > se_access_check: access (1) granted. > [2005/07/16 00:57:12, 5] smbd/files.c:file_new(129) > allocated file structure 4498, fnum = 8594 (1 used) > [2005/07/16 00:57:12, 5] smbd/open.c:open_file_stat(1707) > open_file_stat: 'opening' file .//rem-lj.ps > [2005/07/16 00:57:12, 5] smbd/posix_acls.c:get_nt_acl(2693) > get_nt_acl : file ACL absent, directory ACL absent > [2005/07/16 00:57:12, 3] > passdb/loo...
2007 Jun 12
1
Answering machine detection after Dial()
...); }; T => { Verbose(0,WARN timeout - ${CONTEXT} ${EXTEN} on ${CHANNEL}.); Hangup(); }; }; An exmplaric Originate message for generating a call looks like this: action: Originate actionid: 25326212_156#20070531_193654_987_0043650xxxxxxx timeout: 15000 exten: 0043650xxxxxxx account: 8594 async: true callerid: 6437 context: 1000_amd_tests priority: 1 channel: SIP/voice-application@voiceserver01 Note: "callerid" is what the voice-server sees, not the real-life person.
2007 Aug 23
20
Eliminating bad tests from SuperRedCloth
Hi, all. I haven''t felt at liberty to go axing test cases, but some of the 33 that are failing now are ones I don''t think we want to pass? cruft coming from Markdown or made up to fill a gap some years ago. I''d like to float the proposition that we make Super (and thus RedCloth 4) behave as identically as possible to Textile2 as working on
2014 Nov 26
0
Processed: severity of 770230 is important
Processing commands for control at bugs.debian.org: > severity 770230 important Bug #770230 [src:xen] xen: CVE-2014-5146 CVE-2014-5149 CVE-2014-8594 CVE-2014-8595 CVE-2014-9030 Severity set to 'important' from 'grave' > thanks Stopping processing here. Please contact me if you need assistance. -- 770230: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=770230 Debian Bug Tracking System Contact owner at bugs.debian.org with...
2002 Dec 05
1
is.loaded("gamma") is FALSE in Windows
...cision Sciences | | 219A Old Chemistry, BOX 90251 | | Duke University | | Durham, NC 27708-0251 | | | | Office Phone: (919) 681-8440 | | Fax: (919) 684-8594 | | email: clyde at stat.duke.edu | | web: http://www.stat.duke.edu/~clyde | |________________________________________________|
2007 Oct 25
1
PR#10371
...e | | 223E Old Chemistry, BOX 90251 | | Duke University | | Durham, NC 27708-0251 | | | | Office Phone: (919) 681-8440 | | Fax: (919) 684-8594 | | email: clyde at stat.duke.edu | | web: http://www.stat.duke.edu/~clyde | |________________________________________________|
2006 Jun 12
3
Group averages
Hello: I hope none of you will mind helping a newbie. I'm a student research assistant working with a large data set in which observations are categorized according to two factors. I'm trying to calculate the group mean and variance of a variable (called 'hsgpa' in the example data presented below) to each observation , excluding that observation. For example, if there are
2007 Jan 17
2
Preventing a user from moving "up" directories
I am in the process of setting up a new server. In the process I cannot remember what I need to set so that an FTP user cannot move upward in the directory tree of the user's directory. The FTP server is VSFTP. The user's directory is owned by the user and the permissions are 775. Isn't there a setting in httpd.conf to prevent that? Todd -- Ariste Software 2200 D Street Ext
2014 Nov 27
0
xen_4.4.1-4_amd64.changes ACCEPTED into unstable
...- Xenstore command line utilities for Xen Closes: 759384 767295 769543 770460 Changes: xen (4.4.1-4) unstable; urgency=medium . [ Bastian Blank ] * Make operations pre-emptible. CVE-2014-5146, CVE-2014-5149 * Don't allow page table updates from non-PV page tables. CVE-2014-8594 * Enforce privilege level while loading code segment. CVE-2014-8595 * Fix reference counter leak. CVE-2014-9030 * Use linux 3.16.0-4 stuff. * Fix memory leak in xl. (closes: #767295) . [ Ian Campbell ] * Add licensing for tools/python/logging to debian/copyright. (...
2015 Jan 27
0
xen_4.1.4-3+deb7u4_amd64.changes ACCEPTED into proposed-updates->stable-new
...ta-package) xen-utils-4.1 - XEN administrative tools xen-utils-common - Xen administrative tools - common files xenstore-utils - Xenstore utilities for Xen Changes: xen (4.1.4-3+deb7u4) wheezy-security; urgency=low . * Security upload. * Apply fix for Xen Security Advisory 109 (CVE-2014-8594) * Apply fix for Xen Security Advisory 110 (CVE-2014-8595) * Apply fix for Xen Security Advisory 111 (CVE-2014-8866) * Apply fix for Xen Security Advisory 112 (CVE-2014-8867) * Apply fix for Xen Security Advisory 113 (CVE-2014-9030) Checksums-Sha1: 7b353629e06ddc5a82754372d343a01dea6f...
2015 Jan 29
0
xen_4.1.4-3+deb7u4_amd64.changes ACCEPTED into proposed-updates->stable-new, proposed-updates
...ta-package) xen-utils-4.1 - XEN administrative tools xen-utils-common - Xen administrative tools - common files xenstore-utils - Xenstore utilities for Xen Changes: xen (4.1.4-3+deb7u4) wheezy-security; urgency=low . * Security upload. * Apply fix for Xen Security Advisory 109 (CVE-2014-8594) * Apply fix for Xen Security Advisory 110 (CVE-2014-8595) * Apply fix for Xen Security Advisory 111 (CVE-2014-8866) * Apply fix for Xen Security Advisory 112 (CVE-2014-8867) * Apply fix for Xen Security Advisory 113 (CVE-2014-9030) Checksums-Sha1: 7b353629e06ddc5a82754372d343a01dea6f...
2014 Jul 31
0
Habiter ou investir sur le littoral atlantique
Si vous ne visualisez pas correctement l???e-mail, cliquez ici <http://url.snd10.ch/visu-E9D92C62-F56A-4768-8594-94E7BC64B1C3-203221958-423876-31072014.html> HABITER OU INVESTIR SUR LE LITTORAL ATLANTIQUE <http://url.snd10.ch/url-203221958-1804885-31072014.html> <http://url.snd10.ch/url-203221958-1804885-31072014.html> a s??lectionn?? pour vous les meilleurs programmes immobiliers neufs de vot...
2015 Jan 07
0
CESA-2105:X001 Important xen kernel libvirt python-virtinst e1000e (Xen4CentOS Only) Security Update
...tml http://xenbits.xen.org/xsa/advisory-110.html http://xenbits.xen.org/xsa/advisory-111.html http://xenbits.xen.org/xsa/advisory-112.html http://xenbits.xen.org/xsa/advisory-113.html http://xenbits.xen.org/xsa/advisory-114.html http://xenbits.xen.org/xsa/advisory-116.html Xen CVE's: CVE-2014-8594, CVE-2014-8595, CVE-2014-8866, CVE-2014-8867, CVE-2014-9030, CVE-2014-9065, CVE-2014-9066, CVE-2015-0361 ======================================================================== Kernel: https://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.10.57 https://www.kernel.org/pub/linux/kernel/v3.x/Cha...