Displaying 10 results from an estimated 10 matches similar to: "CESA-2015:1228 Important CentOS 6 java-1.8.0-openjdk Security Update"
2015 Jul 16
0
CentOS-announce Digest, Vol 125, Issue 6
Send CentOS-announce mailing list submissions to
centos-announce at centos.org
To subscribe or unsubscribe via the World Wide Web, visit
http://lists.centos.org/mailman/listinfo/centos-announce
or, via email, send a message with subject or body 'help' to
centos-announce-request at centos.org
You can reach the person managing the list at
centos-announce-owner at centos.org
When
2015 Jul 15
0
CESA-2015:1228 Important CentOS 7 java-1.8.0-openjdk Security Update
CentOS Errata and Security Advisory 2015:1228 Important
Upstream details at : https://rhn.redhat.com/errata/RHSA-2015-1228.html
The following updated files have been uploaded and are currently
syncing to the mirrors: ( sha256sum Filename )
x86_64:
11cb5562dd5dff45d15211e6df0f6425f89a3a7a1b16777c4a7d7be82482e822 java-1.8.0-openjdk-1.8.0.51-1.b16.el7_1.x86_64.rpm
2015 Sep 22
0
CEBA-2015:1828 CentOS 6 java-1.8.0-openjdk BugFix Update
CentOS Errata and Bugfix Advisory 2015:1828
Upstream details at : https://rhn.redhat.com/errata/RHBA-2015-1828.html
The following updated files have been uploaded and are currently
syncing to the mirrors: ( sha256sum Filename )
i386:
fbb5fb0dc1ce429bb16d3da1c228ff35e152ba90a91dbd09a60db328aebac5ea java-1.8.0-openjdk-1.8.0.51-3.b16.el6_7.i686.rpm
2015 Sep 23
0
CentOS-announce Digest, Vol 127, Issue 7
Send CentOS-announce mailing list submissions to
centos-announce at centos.org
To subscribe or unsubscribe via the World Wide Web, visit
https://lists.centos.org/mailman/listinfo/centos-announce
or, via email, send a message with subject or body 'help' to
centos-announce-request at centos.org
You can reach the person managing the list at
centos-announce-owner at centos.org
When
2006 Sep 14
3
[Bug 1228] kbd-int device for AIX authenticate
http://bugzilla.mindrot.org/show_bug.cgi?id=1228
Summary: kbd-int device for AIX authenticate
Product: Portable OpenSSH
Version: 4.3p2
Platform: Other
OS/Version: AIX
Status: NEW
Severity: enhancement
Priority: P2
Component: sshd
AssignedTo: bitbucket at mindrot.org
ReportedBy: dleonard at
2014 Sep 30
0
CEBA-2014:1228 CentOS 5 device-mapper-multipath BugFix Update
CentOS Errata and Bugfix Advisory 2014:1228
Upstream details at : https://rhn.redhat.com/errata/RHBA-2014-1228.html
The following updated files have been uploaded and are currently
syncing to the mirrors: ( sha256sum Filename )
i386:
ebba8c48a07501e2e0bb91242a58e255fd8adc2bde7c07bad6bdfcf25fdcb757 device-mapper-multipath-0.4.7-63.el5.i386.rpm
2019 May 21
0
CESA-2019:1228 Important CentOS 7 wget Security Update
CentOS Errata and Security Advisory 2019:1228 Important
Upstream details at : https://access.redhat.com/errata/RHSA-2019:1228
The following updated files have been uploaded and are currently
syncing to the mirrors: ( sha256sum Filename )
x86_64:
229d6e173f22a647c8db9c8e7d0b21c8f86dd4e270abb96548aa40d84457c99a wget-1.14-18.el7_6.1.x86_64.rpm
Source:
2004 Apr 06
0
Accuracy Bug (PR#1228), (PR#6743)
>>>>> "daheiser" == daheiser <daheiser@gvn.net>
>>>>> on Tue, 6 Apr 2004 04:24:35 +0200 (CEST) writes:
daheiser> It is an error in the algorithm.
"it" being the behavior reported in bug report PR#1228 ---
[too bad you didn't use the whole string "PR#1228" in your subject;
if you had, no new report would have
2018 Feb 18
5
[Bug 1228] New: [REGRESSION] nft cannot load big set anymore
https://bugzilla.netfilter.org/show_bug.cgi?id=1228
Bug ID: 1228
Summary: [REGRESSION] nft cannot load big set anymore
Product: nftables
Version: unspecified
Hardware: x86_64
OS: other
Status: NEW
Severity: normal
Priority: P5
Component: nft
Assignee: pablo at netfilter.org
2001 Dec 26
3
bug with var(rep(1e30, 3)) (PR#1228)
There seems to be a bug with var() when the argument is a vector with
exactly three values of 1e30 (or close to this value). This does not happen
with twice, four (or more) times this value, or another value.
> var(rep(1e30, 3))
[1] 2.971056e+28
> var(rep(1.2e30, 3))
[1] 2.971056e+28
> var(rep(0.9e30, 3))
[1] 2.971056e+28
> var(rep(0.8e30, 3))
[1] 0
> var(rep(1e29, 3))
[1] 0
>