similar to: Xapian 1.2.22 released

Displaying 20 results from an estimated 100 matches similar to: "Xapian 1.2.22 released"

2016 Jan 01
0
Xapian 1.3.4 development snapshot released
On Fri, 01 Jan 2016 at 18:19, Olly Betts wrote: >I'm happy to be able to announce that Xapian 1.3.4 is now available. > >Please note that 1.3.x releases are development releases - they are made >to encourage earlier and wider use and testing of new and changed code. > >Our record with 1.1.x was very good - all the bugs I am aware of were >either in new features, or were
2016 Jan 01
2
Xapian 1.3.4 development snapshot released
I'm happy to be able to announce that Xapian 1.3.4 is now available. Please note that 1.3.x releases are development releases - they are made to encourage earlier and wider use and testing of new and changed code. Our record with 1.1.x was very good - all the bugs I am aware of were either in new features, or were also present in the corresponding 1.0.x release. But if you main concern is
2007 Jul 19
2
Problem after upgrading from 1.2.21.1 to 1.2.22
Yesterday I upgraded from asterisk 1.2.21.1 to 1.2.22. We are running Zaptel-1.2.17.1. After upgrading all of our calls from the phone company (DIDs trunks with wink start on a channelized T1) were not coming in. Looking in the log file '/var/log/messages'. I saw the following error message. pbx.c: Cannot find extension '' in context '(null)' This was confusing since I
2013 Feb 13
0
Announce: Puppet Dashboard 1.2.22 Available [ security release ]
This release of Puppet Dashboard addresses CVE-2013-0277 and CVE-2013-0269. These are vulnerabilities that affect Ruby on Rails, specifically around YAML serialization and JSON handling. They expose vulnerable systems to SQL Injection, Denial of Service Attacks, and arbitrary YAML deserialization. Additionally, CVE-2013-0276 and CVE-2013-0263 affect vendored components of Puppet Dashboard, but by
2016 Aug 06
2
debian (1.2.22-3~bpo8+1) package build failure
I'm trying to test a trivial patch to set FD_CLOEXEC on the flintlock lockfd when using F_OFD_SETLK and am running into a build failure even in an unpatched state. This is on a Debian jessie amd64 system building the jessie-backports version. The stable version (1.2.19-1+deb8u1) works and builds fine using the same commands, however I also encountered a similar build problem in a sid chroot
2007 Jul 22
1
Asterisk-1.2.22 DeadAGI Hangup
Hi I've upgraded my server to asterisk-1.2.22 from 1.2.10 after that my DeadAGI scripts are not working properly. Like after hangup I used to do some more work now its not working. Please help. thanks arun -------------- next part -------------- An HTML attachment was scrubbed... URL: http://lists.digium.com/pipermail/asterisk-users/attachments/20070722/09df42e9/attachment.htm
2007 Jul 17
0
Critical Updates: Asterisk 1.2.22 and 1.4.8 released
The Asterisk development team has released Asterisk versions 1.2.22 and 1.4.8. These releases contain fixes for four critical security vulnerabilities. One of these vulnerabilities is a remotely exploitable stack buffer overflow, which could allow an attacker to execute arbitrary code on the target machine. The other three are all remotely exploitable crash vulnerabilities. We have released
2007 Jul 17
0
Critical Updates: Asterisk 1.2.22 and 1.4.8 released
The Asterisk development team has released Asterisk versions 1.2.22 and 1.4.8. These releases contain fixes for four critical security vulnerabilities. One of these vulnerabilities is a remotely exploitable stack buffer overflow, which could allow an attacker to execute arbitrary code on the target machine. The other three are all remotely exploitable crash vulnerabilities. We have released
2007 Nov 27
0
Zaptel 1.2.22 and 1.4.7 released
The Asterisk.org development team has announced the release of Zaptel versions 1.2.22 and 1.4.7. These releases contain (among other things) many bug fixes to the TC400B driver, a bug fix on the wctdm24xxp driver for users with a VPM150M, as well as numerous improvements and fixes to the Xorcom driver suite. The much better performing version of fxotune from 1.4 has now been put into 1.2, so
2007 Nov 27
0
Zaptel 1.2.22 and 1.4.7 released
The Asterisk.org development team has announced the release of Zaptel versions 1.2.22 and 1.4.7. These releases contain (among other things) many bug fixes to the TC400B driver, a bug fix on the wctdm24xxp driver for users with a VPM150M, as well as numerous improvements and fixes to the Xorcom driver suite. The much better performing version of fxotune from 1.4 has now been put into 1.2, so
2008 Apr 02
0
Receiving 404 Not Found on all outbound calls when attempting SIP trunking between * 1.2.22 and Mitel 3300 CX
We are attempting to configure SIP trunking between asterisk 1.2.22 and a Mitel 3300 CX box. The Mitel machine will gateway to the PSTN for us. I found this earlier post about doing this from July: http://lists.digium.com/pipermail/asterisk-users/2007-July/191630.html Unfortunately the promised configs never came ;(. We're having the exact reverse problem: we can register with the Mitel
2007 Jul 18
3
Problem building Asterisk 1.2.22
I'm having a problem building Asterisk 1.2.22. It fails in codecs/codec_zap.c on codec_zap.c is revision 62173. The OS is FC4. Here's the error. Can anyone help me with this? gcc -pipe -Wall -Wstrict-prototypes -Wmissing-prototypes -Wmissing-declarations -g3 -Iinclude -I../include -D_REENTRANT -D_GNU_SOURCE -O6 -march=i686 -DZAPTEL_OPTIMIZATIONS -fomit-frame-pointer -fPIC -c -o
2013 Feb 22
1
upgraded to puppet 1.2.22 from 1.2.21 and get error
[ pid=1870 thr=69908823898540 file=utils.rb:176 time=2013-02-22 16:39:47.170 ]: *** Exception RuntimeError in PhusionPassenger::Rack::ApplicationSpawner (can''t activate rack (~> 1.1.0, runtime) for [], already activated rack-1.5.2 for []) (process 1870, thread #<Thread:0x7f29d53af358>): from ./config/../vendor/rails/railties/lib/initializer.rb:271:in
2016 Aug 07
2
debian (1.2.22-3~bpo8+1) package build failure
On Sat, Aug 06, 2016 at 03:43:48AM +0000, Eric Wong wrote: > Eric Wong <e at 80x24.org> wrote: > > I'm trying to test a trivial patch to set FD_CLOEXEC on the > > flintlock lockfd when using F_OFD_SETLK > > Fwiw, this is the patch I was originally going to test. > (but now I see maybe my F_SETFD might only need to be > called on F_OFD_SETLK success)
2016 Apr 10
2
Xapian 1.3.5 snapshot performance and index size
Hi, I ran some tests with Recoll to compare Xapian 1.2.22 and 1.3.5 performance. I mostly used two relatively small document sets (realistic/typical recoll data subsets). The first set is a 2.2 GB mbox folder, with approximately 56K messages in 275 files, producing approximately 64K documents (because of attachments). The second set is a 11 GB folder with 5300 PDF files in it (random PDFS
2007 Jul 17
0
ASA-2007-016: Remote crash vulnerability in Skinny channel driver
Asterisk Project Security Advisory - ASA-2007-016 +------------------------------------------------------------------------+ | Product | Asterisk | |--------------------+---------------------------------------------------| | Summary | Remote crash vulnerability in Skinny channel | | | driver
2007 Jul 17
0
ASA-2007-016: Remote crash vulnerability in Skinny channel driver
Asterisk Project Security Advisory - ASA-2007-016 +------------------------------------------------------------------------+ | Product | Asterisk | |--------------------+---------------------------------------------------| | Summary | Remote crash vulnerability in Skinny channel | | | driver
2007 Nov 08
0
AST-2007-024 - Fallacious security advisory spread on the Internet involving buffer overflow in Zaptel's sethdlc application
Asterisk Project Security Advisory - AST-2007-024 +------------------------------------------------------------------------+ | Product | Zaptel | |--------------------+---------------------------------------------------| | Summary | Potential buffer overflow from command line | | |
2007 Nov 08
0
AST-2007-024 - Fallacious security advisory spread on the Internet involving buffer overflow in Zaptel's sethdlc application
Asterisk Project Security Advisory - AST-2007-024 +------------------------------------------------------------------------+ | Product | Zaptel | |--------------------+---------------------------------------------------| | Summary | Potential buffer overflow from command line | | |
2007 Jul 17
0
ASA-2007-015: Remote Crash Vulnerability in IAX2 channel driver
Asterisk Project Security Advisory - ASA-2007-015 +------------------------------------------------------------------------+ | Product | Asterisk | |--------------------+---------------------------------------------------| | Summary | Remote Crash Vulnerability in IAX2 channel driver |