Displaying 20 results from an estimated 27 matches for "8594".
Did you mean:
2594
2014 Nov 21
0
Processed: retitle 770230 to xen: CVE-2014-5146 CVE-2014-5149 CVE-2014-8594 CVE-2014-8595 CVE-2014-9030
Processing commands for control at bugs.debian.org:
> retitle 770230 xen: CVE-2014-5146 CVE-2014-5149 CVE-2014-8594 CVE-2014-8595 CVE-2014-9030
Bug #770230 [src:xen] CVE-2014-5146 CVE-2014-5149 CVE-2014-8594 CVE-2014-8595
Changed Bug title to 'xen: CVE-2014-5146 CVE-2014-5149 CVE-2014-8594 CVE-2014-8595 CVE-2014-9030' from 'CVE-2014-5146 CVE-2014-5149 CVE-2014-8594 CVE-2014-8595'
> thanks
Stop...
2014 Nov 19
2
Bug#770230: CVE-2014-5146 CVE-2014-5149 CVE-2014-8594 CVE-2014-8595
Source: xen
Severity: grave
Tags: security
Hi,
the following security issues apply to Xen in jessie:
CVE-2014-5146,CVE-2014-5149:
https://marc.info/?l=oss-security&m=140784877111813&w=2
CVE-2014-8594:
https://marc.info/?l=oss-security&m=141631359901060&w=2
CVE-2014-8595:
https://marc.info/?l=oss-security&m=141631352601020&w=2
Cheers,
Moritz
2014 Nov 21
0
Bug#770230: CVE-2014-5146 CVE-2014-5149 CVE-2014-8594 CVE-2014-8595
...:02PM +0100, Moritz Muehlenhoff wrote:
> Source: xen
> Severity: grave
> Tags: security
>
> Hi,
> the following security issues apply to Xen in jessie:
>
> CVE-2014-5146,CVE-2014-5149:
> https://marc.info/?l=oss-security&m=140784877111813&w=2
>
> CVE-2014-8594:
> https://marc.info/?l=oss-security&m=141631359901060&w=2
>
> CVE-2014-8595:
> https://marc.info/?l=oss-security&m=141631352601020&w=2
And CVE-2014-9030:
https://marc.info/?l=oss-security&m=141657283302489&w=2
Cheers,
Moritz
2018 Feb 15
6
[Bug 105117] New: desktop freeze playing video nouveau: DATA_ERROR INVALID_BITFIELD
...noarch
xorg-x11-fonts-core-7.6-32.3.noarch
xorg-x11-libs-7.6.1-1.1.noarch
xorg-x11-libX11-ccache-7.6-20.5.noarch
xorg-x11-server-1.19.6-2.1.x86_64
xorg-x11-util-devel-7.6_1-10.4.noarch
[ 852.947765] nouveau 0000:01:00.0: gr: DATA_ERROR 0000000c [INVALID_BITFIELD]
ch 11 [003f7f0000 WebKitWebProces[8594
]] subc 0 class 9197 mthd 0808 data 200203fd
[ 852.947775] nouveau 0000:01:00.0: fifo: PBDMA0: 00040000 [] ch 11
[003f7f0000 WebKitWebProces[8594]] subc 0 mthd 23
90 data 3f000000
[ 852.947798] nouveau 0000:01:00.0: gr: DATA_ERROR 0000000c [INVALID_BITFIELD]
ch 11 [003f7f0000 WebKitWebProces[8594...
2015 Nov 05
0
Processed: closing 770230
Processing commands for control at bugs.debian.org:
> close 770230 4.5.1~rc1-1
Bug #770230 [src:xen] xen: CVE-2014-5146 CVE-2014-5149 CVE-2014-8594 CVE-2014-8595 CVE-2014-9030
Marked as fixed in versions xen/4.5.1~rc1-1.
Bug #770230 [src:xen] xen: CVE-2014-5146 CVE-2014-5149 CVE-2014-8594 CVE-2014-8595 CVE-2014-9030
Marked Bug as done
> thanks
Stopping processing here.
Please contact me if you need assistance.
--
770230: http://bugs.debia...
2008 Jan 04
0
entities and spacing: (em|en)dash and arrow
Hello,
I notice that these entities are defined like this:
def emdash opts
"—"
end
def endash opts
"–"
end
def arrow opts
"→"
end
However, any space from the original markup is stripped, so "hello -- world"
becomes "hello—world". I''ve overridden the methods to deal with this:
def emdash opts
" — "
end
def endash opts
" – &qu...
2012 Sep 04
1
cenboxplot(): Reporting Limit Twice Correct Concentration
..., 9142, 9246, 9274, 9295, 9407, 8573, 8693, 8573, 8693, 8363,
8390, 8421, 8442, 8476, 8505, 8532, 8567, 8604, 8638, 8665, 8686,
8717, 8741, 8778, 8805, 8833, 8860, 8887, 8924, 8959, 8987, 9022,
9050, 9113, 9141, 9169, 9205, 9244, 9274, 9296, 9408, 8364, 8391,
8421, 8441, 8476, 8505, 8531, 8566, 8594, 8636, 8665, 8686, 8714,
8741, 8777, 8805, 8832, 8861, 8888, 8923, 8959, 8987, 9022, 9050,
9112, 9141, 9168, 9205, 9244, 9274, 9293, 9408, 8367, 8392, 8420,
8441, 8475, 8504, 8531, 8566, 8594, 8637, 8664, 8687, 8715, 8742,
8777, 8806, 8832, 8861, 8888, 8923, 8958, 8987, 9021, 9140, 9168,
9204,...
2005 Jul 16
1
Shares all empty after upgrade to 3.0.14a-fc4
...****-2003
> se_access_check: also S-1-5-21-*********-*********-*********-2005
> [2005/07/16 00:57:12, 5] lib/util_seaccess.c:se_access_check(309)
> se_access_check: access (1) granted.
> [2005/07/16 00:57:12, 5] smbd/files.c:file_new(129)
> allocated file structure 4498, fnum = 8594 (1 used)
> [2005/07/16 00:57:12, 5] smbd/open.c:open_file_stat(1707)
> open_file_stat: 'opening' file .//rem-lj.ps
> [2005/07/16 00:57:12, 5] smbd/posix_acls.c:get_nt_acl(2693)
> get_nt_acl : file ACL absent, directory ACL absent
> [2005/07/16 00:57:12, 3]
> passdb/loo...
2007 Jun 12
1
Answering machine detection after Dial()
...);
};
T => {
Verbose(0,WARN timeout - ${CONTEXT} ${EXTEN} on ${CHANNEL}.);
Hangup();
};
};
An exmplaric Originate message for generating a call looks like this:
action: Originate
actionid: 25326212_156#20070531_193654_987_0043650xxxxxxx
timeout: 15000
exten: 0043650xxxxxxx
account: 8594
async: true
callerid: 6437
context: 1000_amd_tests
priority: 1
channel: SIP/voice-application@voiceserver01
Note: "callerid" is what the voice-server sees, not the real-life
person.
2007 Aug 23
20
Eliminating bad tests from SuperRedCloth
Hi, all. I haven''t felt at liberty to go axing test cases, but some
of the 33 that are failing now are ones I don''t think we want to pass?
cruft coming from Markdown or made up to fill a gap some years ago.
I''d like to float the proposition that we make Super (and thus
RedCloth 4) behave as identically as possible to Textile2 as working
on
2014 Nov 26
0
Processed: severity of 770230 is important
Processing commands for control at bugs.debian.org:
> severity 770230 important
Bug #770230 [src:xen] xen: CVE-2014-5146 CVE-2014-5149 CVE-2014-8594 CVE-2014-8595 CVE-2014-9030
Severity set to 'important' from 'grave'
> thanks
Stopping processing here.
Please contact me if you need assistance.
--
770230: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=770230
Debian Bug Tracking System
Contact owner at bugs.debian.org with...
2002 Dec 05
1
is.loaded("gamma") is FALSE in Windows
...cision Sciences |
| 219A Old Chemistry, BOX 90251 |
| Duke University |
| Durham, NC 27708-0251 |
| |
| Office Phone: (919) 681-8440 |
| Fax: (919) 684-8594 |
| email: clyde at stat.duke.edu |
| web: http://www.stat.duke.edu/~clyde |
|________________________________________________|
2007 Oct 25
1
PR#10371
...e |
| 223E Old Chemistry, BOX 90251 |
| Duke University |
| Durham, NC 27708-0251 |
| |
| Office Phone: (919) 681-8440 |
| Fax: (919) 684-8594 |
| email: clyde at stat.duke.edu |
| web: http://www.stat.duke.edu/~clyde |
|________________________________________________|
2006 Jun 12
3
Group averages
Hello:
I hope none of you will mind helping a newbie. I'm a student research
assistant working with a large data set in which observations are
categorized according to two factors. I'm trying to calculate the group
mean and variance of a variable (called 'hsgpa' in the example data
presented below) to each observation , excluding that observation. For
example, if there are
2007 Jan 17
2
Preventing a user from moving "up" directories
I am in the process of setting up a new server. In the process I cannot
remember what I need to set so that an FTP user cannot move upward in
the directory tree of the user's directory. The FTP server is VSFTP.
The user's directory is owned by the user and the permissions are 775.
Isn't there a setting in httpd.conf to prevent that?
Todd
--
Ariste Software
2200 D Street Ext
2014 Nov 27
0
xen_4.4.1-4_amd64.changes ACCEPTED into unstable
...- Xenstore command line utilities for Xen
Closes: 759384 767295 769543 770460
Changes:
xen (4.4.1-4) unstable; urgency=medium
.
[ Bastian Blank ]
* Make operations pre-emptible.
CVE-2014-5146, CVE-2014-5149
* Don't allow page table updates from non-PV page tables.
CVE-2014-8594
* Enforce privilege level while loading code segment.
CVE-2014-8595
* Fix reference counter leak.
CVE-2014-9030
* Use linux 3.16.0-4 stuff.
* Fix memory leak in xl. (closes: #767295)
.
[ Ian Campbell ]
* Add licensing for tools/python/logging to debian/copyright.
(...
2015 Jan 27
0
xen_4.1.4-3+deb7u4_amd64.changes ACCEPTED into proposed-updates->stable-new
...ta-package)
xen-utils-4.1 - XEN administrative tools
xen-utils-common - Xen administrative tools - common files
xenstore-utils - Xenstore utilities for Xen
Changes:
xen (4.1.4-3+deb7u4) wheezy-security; urgency=low
.
* Security upload.
* Apply fix for Xen Security Advisory 109 (CVE-2014-8594)
* Apply fix for Xen Security Advisory 110 (CVE-2014-8595)
* Apply fix for Xen Security Advisory 111 (CVE-2014-8866)
* Apply fix for Xen Security Advisory 112 (CVE-2014-8867)
* Apply fix for Xen Security Advisory 113 (CVE-2014-9030)
Checksums-Sha1:
7b353629e06ddc5a82754372d343a01dea6f...
2015 Jan 29
0
xen_4.1.4-3+deb7u4_amd64.changes ACCEPTED into proposed-updates->stable-new, proposed-updates
...ta-package)
xen-utils-4.1 - XEN administrative tools
xen-utils-common - Xen administrative tools - common files
xenstore-utils - Xenstore utilities for Xen
Changes:
xen (4.1.4-3+deb7u4) wheezy-security; urgency=low
.
* Security upload.
* Apply fix for Xen Security Advisory 109 (CVE-2014-8594)
* Apply fix for Xen Security Advisory 110 (CVE-2014-8595)
* Apply fix for Xen Security Advisory 111 (CVE-2014-8866)
* Apply fix for Xen Security Advisory 112 (CVE-2014-8867)
* Apply fix for Xen Security Advisory 113 (CVE-2014-9030)
Checksums-Sha1:
7b353629e06ddc5a82754372d343a01dea6f...
2014 Jul 31
0
Habiter ou investir sur le littoral atlantique
Si vous ne visualisez pas correctement l???e-mail, cliquez ici
<http://url.snd10.ch/visu-E9D92C62-F56A-4768-8594-94E7BC64B1C3-203221958-423876-31072014.html>
HABITER OU INVESTIR SUR LE LITTORAL ATLANTIQUE
<http://url.snd10.ch/url-203221958-1804885-31072014.html>
<http://url.snd10.ch/url-203221958-1804885-31072014.html>
a s??lectionn?? pour vous les meilleurs programmes
immobiliers neufs de vot...
CESA-2105:X001 Important xen kernel libvirt python-virtinst e1000e (Xen4CentOS Only) Security Update
2015 Jan 07
0
CESA-2105:X001 Important xen kernel libvirt python-virtinst e1000e (Xen4CentOS Only) Security Update
...tml
http://xenbits.xen.org/xsa/advisory-110.html
http://xenbits.xen.org/xsa/advisory-111.html
http://xenbits.xen.org/xsa/advisory-112.html
http://xenbits.xen.org/xsa/advisory-113.html
http://xenbits.xen.org/xsa/advisory-114.html
http://xenbits.xen.org/xsa/advisory-116.html
Xen CVE's: CVE-2014-8594, CVE-2014-8595, CVE-2014-8866, CVE-2014-8867, CVE-2014-9030, CVE-2014-9065, CVE-2014-9066, CVE-2015-0361
========================================================================
Kernel:
https://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.10.57
https://www.kernel.org/pub/linux/kernel/v3.x/Cha...