Displaying 17 results from an estimated 17 matches similar to: "Compaq T2400H UPS model 242688-006"
2013 Jul 22
2
stopping amd causes a freeze
Occasionally stopping amd freezes my system. It's a rare occurrence,
and I haven't found a reliable way to reproduce it.
It's also a real freeze, so there's no way to get into the debugger
or grab a core dump. I only can perform the 4 seconds hard shutdown to
revive the system.
I run amd through sysutils/automounter, which is a scripting solution
that generates an amd.map file
2007 Nov 25
2
2007-006 Ruby SSL Update on Debian
Hi *!
Just a heads up. The recent issues with the Ruby SSL Security Fix are
now available on Debian too.
I''ve updated the infos on
http://reductivelabs.com/trac/puppet/wiki/RubySSL-2007-006
Summary:
DSA 1410-1 and DSA 1411-1 updating ruby1.8 to 1.8.5-4etch1 cause puppet
to fail, if the puppetmaster has no certificate matching the value of
the client''s "server"
2011 Apr 21
0
AST-2011-006: Asterisk Manager User Shell Access
Asterisk Project Security Advisory - AST-2011-006
Product Asterisk
Summary Asterisk Manager User Shell Access
Nature of Advisory Permission Escalation
Susceptibility Remote Authenticated Sessions
Severity Minor
2014 Jun 12
0
AST-2014-006: Asterisk Manager User Unauthorized Shell Access
Asterisk Project Security Advisory - AST-2014-006
Product Asterisk
Summary Asterisk Manager User Unauthorized Shell Access
Nature of Advisory Permission Escalation
Susceptibility Remote Authenticated Sessions
Severity Minor
2016 Sep 08
0
AST-2016-006: Crash on ACK from unknown endpoint
Asterisk Project Security Advisory - AST-2016-006
Product Asterisk
Summary Crash on ACK from unknown endpoint
Nature of Advisory Remote Crash
Susceptibility Remote unauthenticated sessions
Severity Critical
2018 Feb 21
0
AST-2018-006: WebSocket frames with 0 sized payload causes DoS
Asterisk Project Security Advisory - AST-2018-006
Product Asterisk
Summary WebSocket frames with 0 sized payload causes DoS
Nature of Advisory Denial of Service
Susceptibility Remote Unauthenticated Sessions
Severity Moderate
2014 Jun 12
0
AST-2014-006: Asterisk Manager User Unauthorized Shell Access
Asterisk Project Security Advisory - AST-2014-006
Product Asterisk
Summary Asterisk Manager User Unauthorized Shell Access
Nature of Advisory Permission Escalation
Susceptibility Remote Authenticated Sessions
Severity Minor
2017 Aug 31
0
AST-2017-006: Shell access command injection in app_minivm
Asterisk Project Security Advisory - AST-2017-006
Product Asterisk
Summary Shell access command injection in app_minivm
Nature of Advisory Unauthorized command execution
Susceptibility Remote Authenticated Sessions
Severity Moderate
2013 Dec 16
0
AST-2013-006: Buffer Overflow when receiving odd length 16 bit SMS message
Asterisk Project Security Advisory - AST-2013-006
Product Asterisk
Summary Buffer Overflow when receiving odd length 16 bit SMS
message
Nature of Advisory Buffer Overflow and Remote Crash
Susceptibility Remote
2013 Dec 16
0
AST-2013-006: Buffer Overflow when receiving odd length 16 bit SMS message
Asterisk Project Security Advisory - AST-2013-006
Product Asterisk
Summary Buffer Overflow when receiving odd length 16 bit SMS
message
Nature of Advisory Buffer Overflow and Remote Crash
Susceptibility Remote
2012 Apr 23
0
AST-2012-006: Remote Crash Vulnerability in SIP Channel Driver
Asterisk Project Security Advisory - AST-2012-006
Product Asterisk
Summary Remote Crash Vulnerability in SIP Channel Driver
Nature of Advisory Remote Crash
Susceptibility Remote Authenticated Sessions
Severity
2019 Nov 21
0
AST-2019-006: SIP request can change address of a SIP peer.
Asterisk Project Security Advisory - AST-2019-006
Product Asterisk
Summary SIP request can change address of a SIP peer.
Nature of Advisory Denial of Service
Susceptibility Remote Unauthenticated Sessions
Severity Minor
2000 Mar 06
0
[RHSA-2000:006-01] New nmh packages available
---------------------------------------------------------------------
Red Hat, Inc. Security Advisory
Synopsis: New nmh packages available
Advisory ID: RHSA-2000:006-01
Issue date: 2000-03-06
Updated on: 2000-03-06
Product: Red Hat Linux
Keywords: nmh mime mhshow
Cross references: N/A
2011 Apr 21
1
AST-2011-006: Asterisk Manager User Shell Access
Asterisk Project Security Advisory - AST-2011-006
Product Asterisk
Summary Asterisk Manager User Shell Access
Nature of Advisory Permission Escalation
Susceptibility Remote Authenticated Sessions
Severity Minor
2009 Sep 04
0
[Fwd: AST-2009-006: IAX2 Call Number Resource Exhaustion]
Hello,
Just in case someone hasn't upgraded yet, and is using IAX2.
-------- Original Message --------
Subject: AST-2009-006: IAX2 Call Number Resource Exhaustion
Date: Thu, 03 Sep 2009 17:47:35 -0500
From: Asterisk Security Team <security at asterisk.org>
To: bugtraq at securityfocus.com
Asterisk Project Security Advisory - AST-2009-006
2020 Feb 14
0
[PATCH AUTOSEL 5.5 006/542] drm/virtio: fix byteorder handling in virtio_gpu_cmd_transfer_{from, to}_host_3d functions
From: Gerd Hoffmann <kraxel at redhat.com>
[ Upstream commit 1dc3485247170d3b88a21cadee7f7da1f0433495 ]
Be consistent with the rest of the code base.
No functional change.
v2:
- fix sparse warnings for virtio_gpu_cmd_transfer_to_host_2d call.
- move convert_to_hw_box helper function.
Signed-off-by: Gerd Hoffmann <kraxel at redhat.com>
Reviewed-by: Gurchetan Singh
2013 Aug 16
2
[PATCH] xfstests: update filters and output of btrfs/006
The btrfs-progs tools changed the output:
- 100GiB instead of 100GB
- The number of spaces was changed
Signed-off-by: Stefan Behrens <sbehrens@giantdisaster.de>
---
common/filter | 2 +-
common/filter.btrfs | 3 ++-
tests/btrfs/006 | 6 +++---
tests/btrfs/006.out | 36 ++++++++++++++++++------------------
4 files changed, 24 insertions(+), 23 deletions(-)
diff --git