Displaying 20 results from an estimated 110 matches similar to: "CESA-2009:1218 Critical CentOS 5 x86_64 pidgin Update"
2009 Aug 19
0
CentOS-announce Digest, Vol 54, Issue 8
Send CentOS-announce mailing list submissions to
centos-announce at centos.org
To subscribe or unsubscribe via the World Wide Web, visit
http://lists.centos.org/mailman/listinfo/centos-announce
or, via email, send a message with subject or body 'help' to
centos-announce-request at centos.org
You can reach the person managing the list at
centos-announce-owner at centos.org
When
2009 Aug 18
0
CESA-2009:1218 Critical CentOS 5 i386 pidgin Update
CentOS Errata and Security Advisory 2009:1218 Critical
Upstream details at : https://rhn.redhat.com/errata/RHSA-2009-1218.html
The following updated files have been uploaded and are currently
syncing to the mirrors: ( md5sum Filename )
i386:
e25d95dc8bdf606ec2d6730f48ebd594 finch-2.5.9-1.el5.i386.rpm
88b5be48a62c1dc9f8c17efd30e3e2e5 finch-devel-2.5.9-1.el5.i386.rpm
2012 Apr 20
0
CEEA-2012:0503 CentOS 6 cnic Update
CentOS Errata and Enhancement Advisory 2012:0503
Upstream details at : https://rhn.redhat.com/errata/RHEA-2012-0503.html
The following updated files have been uploaded and are currently
syncing to the mirrors: ( sha256sum Filename )
i386:
7a7472e17c1c1bb7a1dba21b4f9299848c7cc24d9f3d6b1d962a9d61bbea2699 kmod-cnic-2.5.9-1.el6_2.i686.rpm
x86_64:
2012 Apr 21
0
CentOS-announce Digest, Vol 86, Issue 12
Send CentOS-announce mailing list submissions to
centos-announce at centos.org
To subscribe or unsubscribe via the World Wide Web, visit
http://lists.centos.org/mailman/listinfo/centos-announce
or, via email, send a message with subject or body 'help' to
centos-announce-request at centos.org
You can reach the person managing the list at
centos-announce-owner at centos.org
When
2009 Aug 11
0
AST-2009-005: Remote Crash Vulnerability in SIP channel driver
Asterisk Project Security Advisory - AST-2009-005
+------------------------------------------------------------------------+
| Product | Asterisk |
|---------------------+--------------------------------------------------|
| Summary | Remote Crash Vulnerability in SIP channel driver |
2009 Aug 11
0
AST-2009-005: Remote Crash Vulnerability in SIP channel driver
Asterisk Project Security Advisory - AST-2009-005
+------------------------------------------------------------------------+
| Product | Asterisk |
|---------------------+--------------------------------------------------|
| Summary | Remote Crash Vulnerability in SIP channel driver |
2003 Oct 25
1
PXElinux error - Invalid or corrupt kenel....
Hello all,
Im a newbie trying to netboot a P4 machine with 1 gig of ram and no HD,
I've set up the DHCP and ftp servers and PXElinux is loaded onto the
client
and gets to the boot prompt. When I type in the kernel name, in this
case
bvmlinux (compiled from source I got from kernel.org) linux-2.5.9
I get the error "Invalid or corrupt kernel image" Any suggestions
on what this
2003 Sep 09
1
Building XML package for MacOS X
I am working to build the XML package for R on MacOS X. I have installed
libxml2-2.5.9 into /usr/local. I set the
LIBXML_INCDIR=/usr/local/include/libxml2. I use R INSTALL, I get the
following:
R INSTALL -c -l /usr/local/R/library XML_0.94-1.tar.gz
:
:
:
gcc -bundle -flat_namespace -undefined suppress -L/sw/lib -L/usr/local/lib
-o XML.so DocParse.o EventParse.o ExpatParse.o HTMLParse.o
2007 Feb 12
4
Zaptel install...
I am having trouble getting Asterisk to compile the zaptel stuff.
Here are the specifics:
Linux Kernel 2.5.9-42.0.8.EL
Asterisk 1.4.0
I compiled libpri, zaptel, asterisk and asterisk-addons (in that
order). This is a fresh install of CentOS. Following the CentOS
install, I did "yum -y update" until there were no updates left.
Here is my src directory:
drwxr-xr-x 24 root root
2012 Mar 27
1
Problem with DOVECOT - long authentication time
Hi all,
I want to start new server with Postfix (I still have qmail ) and I
think I have a problem with authentication in dovecot - it takes 3
seconds. Is this normal time?
My configuration:
Usernames: from MySQL
Passwords: from Active Directory
dovecot -n
# 1.1.20: /etc/dovecot.conf
# OS: Linux 2.6.18-274.7.1.el5 i686 CentOS release 5.7 (Final) ext3
log_path: /var/log/dovecot.log
2009 Oct 08
0
autospec cannont find gems
I am trying to install rspec for rails and have the following gems
install
C:\INSTAN~3.0-W\rails_apps\katai>gem list --local
*** LOCAL GEMS ***
actionmailer (2.3.4, 2.0.2)
actionpack (2.3.4, 2.0.2)
activerecord (2.3.4, 2.0.2)
activeresource (2.3.4, 2.0.2)
activesupport (2.3.4, 2.0.2)
authlogic (2.1.2)
autotest-rails (4.1.0)
builder (2.1.2)
capistrano (2.5.9, 2.1.0)
cgi_multipart_eof_fix
2018 Jan 27
1
[Bug 1218] New: ULOGD PCAP Plugin Missing Ethernet Headers
https://bugzilla.netfilter.org/show_bug.cgi?id=1218
Bug ID: 1218
Summary: ULOGD PCAP Plugin Missing Ethernet Headers
Product: ulogd
Version: SVN (please provide timestamp)
Hardware: All
OS: All
Status: NEW
Severity: blocker
Priority: P5
Component: ulogd
Assignee:
2009 Aug 19
0
CESA-2009:1218 Critical CentOS 3 i386 pidgin - security update
CentOS Errata and Security Advisory CESA-2009:1218
pidgin security update for CentOS 3 i386:
https://rhn.redhat.com/errata/RHSA-2009-1218.html
The following updated file has been uploaded and is currently syncing to
the mirrors:
i386:
updates/i386/RPMS/pidgin-1.5.1-4.el3.i386.rpm
source:
updates/SRPMS/pidgin-1.5.1-4.el3.src.rpm
You may update your CentOS-3 i386 installations by running the
2009 Aug 19
0
CESA-2009:1218 Critical CentOS 3 x86_64 pidgin - security update
CentOS Errata and Security Advisory CESA-2009:1218
pidgin security update for CentOS 3 x86_64:
https://rhn.redhat.com/errata/RHSA-2009-1218.html
The following updated file has been uploaded and is currently syncing to
the mirrors:
x86_64:
updates/x86_64/RPMS/pidgin-1.5.1-4.el3.x86_64.rpm
source:
updates/SRPMS/pidgin-1.5.1-4.el3.src.rpm
You may update your CentOS-3 x86_64 installations by
2012 Jul 12
0
AMD Opteron 1218 wrong CPU metrics in 6.3
Hello all,
since upgrade to 6.3 (and kernel 2.6.32-279.x) it looks like only one
core of the AMD Dualcore Opteron 1218 is functional. Reverting to
previous kernel shows everything working as expected.
I've filed a bug report here after failing to figure out if it is just a
configuration problem:
http://bugs.centos.org/view.php?id=5821
I can't find anything on the net that would
2014 Sep 30
0
CEBA-2014:1218 CentOS 5 lvm2 BugFix Update
CentOS Errata and Bugfix Advisory 2014:1218
Upstream details at : https://rhn.redhat.com/errata/RHBA-2014-1218.html
The following updated files have been uploaded and are currently
syncing to the mirrors: ( sha256sum Filename )
i386:
b8ca38a6609bf31a36a23f1b42638c371bcbc39e47ad49bfe5760a6e37e3c92c lvm2-2.02.88-13.el5.i386.rpm
x86_64:
2006 Aug 17
5
[Bug 1218] GSSAPI client code permits SPNEGO usage
http://bugzilla.mindrot.org/show_bug.cgi?id=1218
Summary: GSSAPI client code permits SPNEGO usage
Product: Portable OpenSSH
Version: 4.3p2
Platform: Other
OS/Version: All
Status: NEW
Severity: normal
Priority: P2
Component: Kerberos support
AssignedTo: bitbucket at mindrot.org
ReportedBy:
2015 Jul 09
0
CESA-2015:1218 Moderate CentOS 6 php Security Update
CentOS Errata and Security Advisory 2015:1218 Moderate
Upstream details at : https://rhn.redhat.com/errata/RHSA-2015-1218.html
The following updated files have been uploaded and are currently
syncing to the mirrors: ( sha256sum Filename )
i386:
97908585a91585137ccb6eee94f45568936c29c3358ddcf2f0fecef66aa807e3 php-5.3.3-46.el6_6.i686.rpm
2001 Dec 17
1
behavior of r* and d* functions at boundaries (PR#1218)
(Sent this to r-help back in October, got no comments, forgot
to re-submit it as a bug report.)
There are a few inconsistencies, at least, in some of the functions that
generate random deviates from particular distributions (I think they're
bugs because they're inconvenient, but maybe someone can make an argument
for the current behavior). If people think these are really bugs I can
2009 Apr 24
4
repository for mod_security
I want to add mod_security to my Apache server running CentOS 5.3 and am
trying to find a repository to get it from. I found it in EPEL, but
they have version 2.1.7, which is over a year old according to what I
found on the modsecurity.org website. Is there a repository which is
keeping this up to date? Or should I just build it from source?
--
Bowie