Displaying 13 results from an estimated 13 matches similar to: "CEBA-2012:1286 CentOS 6 kdebase-workspace FASTTRACK Update"
2012 Sep 18
0
CentOS-announce Digest, Vol 91, Issue 12
Send CentOS-announce mailing list submissions to
centos-announce at centos.org
To subscribe or unsubscribe via the World Wide Web, visit
http://lists.centos.org/mailman/listinfo/centos-announce
or, via email, send a message with subject or body 'help' to
centos-announce-request at centos.org
You can reach the person managing the list at
centos-announce-owner at centos.org
When
2007 May 06
1
[Bug 1286] SFTP keeps reading input until it runs out of buffer space
http://bugzilla.mindrot.org/show_bug.cgi?id=1286
thuejk at gmail.com changed:
What |Removed |Added
----------------------------------------------------------------------------
OS/Version|Linux |All
Keywords| |low-hanging-fruit
------- You are receiving this mail because: -------
You are
2011 Sep 22
0
CEBA-2011:1286 CentOS 5 i386 ghostscript Update
CentOS Errata and Bugfix Advisory 2011:1286
Upstream details at : https://rhn.redhat.com/errata/RHBA-2011-1286.html
The following updated files have been uploaded and are currently
syncing to the mirrors: ( md5sum Filename )
i386:
101ec5c784933a329f4ead813ec48b5e ghostscript-8.70-6.el5_7.3.i386.rpm
f683b46612c857c524b761f75ea4dcfd ghostscript-devel-8.70-6.el5_7.3.i386.rpm
2011 Sep 22
0
CEBA-2011:1286 CentOS 5 x86_64 ghostscript Update
CentOS Errata and Bugfix Advisory 2011:1286
Upstream details at : https://rhn.redhat.com/errata/RHBA-2011-1286.html
The following updated files have been uploaded and are currently
syncing to the mirrors: ( md5sum Filename )
x86_64:
101ec5c784933a329f4ead813ec48b5e ghostscript-8.70-6.el5_7.3.i386.rpm
3f6e45105d2e3473b2f4e8d1fc099832 ghostscript-8.70-6.el5_7.3.x86_64.rpm
2016 Mar 10
3
CVE-2016-1285 & CVE-2016-1286
Hello.
I think Centos are affected, right?
Some update from Centos?
2016 Mar 10
0
CVE-2016-1285 & CVE-2016-1286
On 10/03/16 14:47, Leonardo Oliveira Ortiz wrote:
> Hello.
>
> I think Centos are affected, right?
>
> Some update from Centos?
> _______________________________________________
> CentOS mailing list
> CentOS at centos.org
> https://lists.centos.org/mailman/listinfo/centos
>
Sure looks that way...
https://access.redhat.com/security/cve/cve-2016-1285
2016 Mar 10
0
RES: CVE-2016-1285 & CVE-2016-1286
CentOS will provide an update to fix it?
________________________________________
De: centos-bounces at centos.org [centos-bounces at centos.org] em nome de Alice Wonder [alice at domblogger.net]
Enviado: quinta-feira, 10 de mar?o de 2016 15:31
Para: centos at centos.org
Assunto: Re: [CentOS] CVE-2016-1285 & CVE-2016-1286
On 03/10/2016 07:13 AM, Michael H wrote:
> On 10/03/16 14:47,
2016 Mar 11
0
RES: CVE-2016-1285 & CVE-2016-1286
Looking at the redhat CVE it looks like *by default config* it is not
vulnerable except from the localhost.
On 03/10/2016 02:37 PM, Alice Wonder wrote:
> As soon as RHEL does.
>
> On 03/10/2016 02:13 PM, Leonardo Oliveira Ortiz wrote:
>> CentOS will provide an update to fix it?
>>
>> ________________________________________
>> De: centos-bounces at centos.org
2016 Mar 10
2
CVE-2016-1285 & CVE-2016-1286
On 03/10/2016 07:13 AM, Michael H wrote:
> On 10/03/16 14:47, Leonardo Oliveira Ortiz wrote:
>> Hello.
>>
>> I think Centos are affected, right?
>>
>> Some update from Centos?
>> _______________________________________________
>> CentOS mailing list
>> CentOS at centos.org
>> https://lists.centos.org/mailman/listinfo/centos
>>
>
2018 Nov 02
3
[Bug 1286] New: -Z regression
https://bugzilla.netfilter.org/show_bug.cgi?id=1286
Bug ID: 1286
Summary: -Z regression
Product: nftables
Version: unspecified
Hardware: x86_64
OS: Debian GNU/Linux
Status: NEW
Severity: normal
Priority: P5
Component: iptables over nftable
Assignee: pablo at netfilter.org
2006 Dec 28
0
[807] trunk/wxruby2/lib/wx/classes/colour.rb: Raise an exception if an invalid colour is specified (Feature #1286)
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.1//EN"
"http://www.w3.org/TR/xhtml11/DTD/xhtml11.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head><meta http-equiv="content-type" content="text/html; charset=utf-8" /><style type="text/css"><!--
#msg dl { border: 1px #006 solid; background: #369; padding:
2016 Mar 10
2
RES: CVE-2016-1285 & CVE-2016-1286
As soon as RHEL does.
On 03/10/2016 02:13 PM, Leonardo Oliveira Ortiz wrote:
> CentOS will provide an update to fix it?
>
> ________________________________________
> De: centos-bounces at centos.org [centos-bounces at centos.org] em nome de Alice Wonder [alice at domblogger.net]
> Enviado: quinta-feira, 10 de mar?o de 2016 15:31
> Para: centos at centos.org
> Assunto: Re:
2007 Feb 18
8
[Bug 1286] SFTP keeps reading input until it runs out of buffer space
http://bugzilla.mindrot.org/show_bug.cgi?id=1286
Summary: SFTP keeps reading input until it runs out of buffer
space
Product: Portable OpenSSH
Version: v4.5p1
Platform: All
OS/Version: Linux
Status: NEW
Keywords: patch
Severity: normal
Priority: P2
Component: sftp