Displaying 20 results from an estimated 499 matches for "forthwith".
2006 Nov 01
4
Bug#396557: xen-3.0: missing libz-dev in build dependencies
Package: xen-3.0
Version: 3.0.3-0-1
Severity: serious
Justification: no longer builds from source
Missing build-dep on libz-dev in debian/control.
-- System Information:
Debian Release: 4.0
APT prefers unstable
APT policy: (500, 'unstable'), (500, 'stable')
Architecture: i386 (i686)
Shell: /bin/sh linked to /bin/bash
Kernel: Linux 2.6.18-1-xen-686
Locale: LANG=it_IT,
2006 Nov 01
4
Bug#396561: xen-3.0: missing x11proto-core-dev in build dependencies
Package: xen-3.0
Version: 3.0.3-0-1
Severity: serious
Justification: no longer builds from source
Missing build-dep on x11proto-core-dev in debian/control.
-- System Information:
Debian Release: 4.0
APT prefers unstable
APT policy: (500, 'unstable'), (500, 'stable')
Architecture: i386 (i686)
Shell: /bin/sh linked to /bin/bash
Kernel: Linux 2.6.18-1-xen-686
Locale:
2006 Nov 01
5
Bug#396567: xen-3.0: missing libncurses5-dev in build dependencies
Package: xen-3.0
Version: 3.0.3-0-1
Severity: serious
Justification: no longer builds from source
Missing build-dep on libncurses5-dev in debian/control.
-- System Information:
Debian Release: 4.0
APT prefers unstable
APT policy: (500, 'unstable'), (500, 'stable')
Architecture: i386 (i686)
Shell: /bin/sh linked to /bin/bash
Kernel: Linux 2.6.18-1-xen-686
Locale: LANG=it_IT,
2000 Apr 01
0
space in user dir?
...> >> mikE wohlgemutH > shred@m21.sail.leon.k12.fl.us
> > >> sail higH schooL > http://www.sail.leon.k12.fl.us/
> > >>
> > >> Mathematicians are like Frenchmen: whatever you say to them they
> > >> translate into their own language, and forthwith it is something
> > >> entirely different.
> > >> -- Johann Wolfgang von Goethe
> > >
> > >--
> > >Mike Wohlgemuth
> > >
> > >Technology Coordinator
> > >Mathematics Teacher
> > >SAIL High School...
2012 Sep 19
5
Bug#688125: xen: CVE-2012-2625
Package: xen
Severity: important
Tags: security
Justification: user security hole
Hi,
This issue is still unfixed in Wheezy:
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2012-2625
Patch:
http://xenbits.xensource.com/hg/xen-unstable.hg/rev/60f09d1ab1fe
Cheers,
Moritz
2015 May 22
1
Can email be shared between POP3 and shell account access?
...he
>> ouside, but through mail/mailx on the inside, and if so, how is that
>> set up?
>
>If you have root or sudo then all you need is mutt.
>
># mutt -f /path/to/Maildir
H'mm. All I need is mutt. There's a song in there somewhere. Just
looked it up and will install forthwith. All of this going to further
prove my depth of un-knowledge about this stuff. THANKS!
2004 May 25
1
Speed Dials
...articular purpose. The user assumes the entire risk as to the accuracy and the use of this document.
The information contained in this e-mail may be confidential and may also be legally privileged. It is intended solely for the addressee(s). If you are not the intended recipient then please delete forthwith.
2012 Apr 19
2
OpenSSL ASN.1 vulnerability: sshd not affected
...the security
of an application.
This gloating only applies to sshd though - private key loading still
uses the affected OpenSSL code, so if you are somehow allowing untrusted
users to supply private keys to ssh, ssh-keygen or ssh-add in a
privileged context then you should apply the OpenSSL fixes forthwith.
-d
2016 May 27
2
Bug#825580: libxen-dev: broken symlink: /usr/lib/x86_64-linux-gnu/libxlutil.so -> libxlutil.so.
Package: libxen-dev
Version: 4.6.0-1+nmu2
Severity: serious
User: debian-qa at lists.debian.org
Usertags: piuparts
Hi,
during a test with piuparts I noticed your package ships a broken
symlink:
/usr/lib/x86_64-linux-gnu/libxlutil.so -> libxlutil.so.
(notice the trailing dot, it is part of the target).
You probably want this target instead:
libxlutil-4.6.so
Andreas
2012 Jul 30
5
Bug#683279: CVE-2012-3432
Package: xen
Severity: grave
Tags: security
Please see
http://www.openwall.com/lists/oss-security/2012/07/26/4
Cheers,
Moritz
2008 Sep 24
2
Bug#500017: ignore.d.server/ssh: outdated 'reverse mapping checking ... failed' rule
Package: logcheck-database
Version: 1.2.68
Severity: minor
openssh-server version 1:5.1p1-2
^\w{3} [ :0-9]{11} [._[:alnum:]-]+ sshd\[[0-9]+\]: reverse mapping checking getaddrinfo for [._[:alnum:]-]+ failed - POSSIBLE BREAK-?IN ATTEMPT!$
should look like
^\w{3} [ :0-9]{11} [._[:alnum:]-]+ sshd\[[0-9]+\]: reverse mapping checking getaddrinfo for [._[:alnum:]-]+ \[[.[:alnum:]:]+\] failed -
2016 Jan 21
7
Bug#812166: xen: FTBFS with GCC 6: statement is indented as if...
Package: xen
Version: 4.6.0-1
Severity: important
User: debian-gcc at lists.debian.org
Usertags: ftbfs-gcc-6 gcc-6-misleading-indentation
This package fails to build with GCC 6. GCC 6 has not been released
yet, but it's expected that GCC 6 will become the default compiler for
stretch.
Note that only the first error is reported; there might be more. You
can find a snapshot of GCC 6 in
2008 Jun 19
2
Bug#487095: xen-3: multiple security issues
Source: xen-3
Version: 3.2.1-1
Severity: grave
Tags: security, patch
Hi,
the following CVE (Common Vulnerabilities & Exposures) ids were
published for xen-3.
CVE-2008-1943[0]:
| Buffer overflow in the backend of XenSource Xen Para Virtualized Frame
| Buffer (PVFB) 3.0 through 3.1.2 allows local users to cause a denial
| of service (crash) and possibly execute arbitrary code via a crafted
|
2014 Feb 06
5
Bug#737905: Xen: hvmloader causes immediate VCPU triple fault with SeaBIOS 1.7.4
Package: xen-utils-4.3
Version: 4.3.0-3
Severity: important
Tags: upstream patch
When using Xen compiled with seabios-1.7.4-1 (now in unstable/testing), HVMs fail immediately upon starting with a VCPU triple fault:
(XEN) HVM1: Loading SeaBIOS ...
(XEN) hvm.c:1253:d1 Triple fault on VCPU0 - invoking HVM shutdown action 1.
This is because SeaBIOS can now be greater than 128k, which breaks an
2012 Jun 25
4
Bug#678923: xcp-xapi: host-disable and host-reboot make host disable forever
Package: xcp-xapi
Version: 1.3.2-6
Severity: important
I done normal reboot:
xe host-disable host=this_host
xe host-reboot host=this_host
After reboot host stays in 'disable' state and when I've tried to make it enable I got:
xe host-enable uuid=ab523ee3-0546-5400-e2db-32f340292fff
The specified host is disabled and cannot be re-enabled until after it has rebooted.
host:
2017 Apr 04
4
Bug#859560: xen: CVE-2017-7228: x86: broken check in memory_exchange() permits PV guest breakout (XSA-212)
Source: xen
Version: 4.8.1~pre.2017.01.23-1
Severity: grave
Tags: security upstream
Justification: user security hole
Hi,
the following vulnerability was published for xen.
CVE-2017-7228[0]:
| An issue (known as XSA-212) was discovered in Xen, with fixes available
| for 4.8.x, 4.7.x, 4.6.x, 4.5.x, and 4.4.x. The earlier XSA-29 fix
| introduced an insufficient check on XENMEM_exchange input,
2014 Oct 29
4
Bug#767295: xl: apparent memory leak
Package: xen-utils-4.4
Version: 4.4.1-3
When booting domU's running amd64 jessie, I notice some memory problems
with xl.
root at xen:~# pmap -x 4121
4121: /usr/lib/xen-4.4/bin/xl create --quiet --defconfig
/etc/xen/auto/mail_deb80.cfg
Address Kbytes RSS Dirty Mode Mapping
0000000000400000 144 128 0 r-x-- xl
0000000000623000 4 4 4 r---- xl
2023 Mar 21
2
Bug#1033297: xen: CVE-2022-42331 CVE-2022-42332 CVE-2022-42333 CVE-2022-42334
Source: xen
Version: 4.17.0+46-gaaf74a532c-1
Severity: grave
Tags: security upstream
X-Debbugs-Cc: carnil at debian.org, Debian Security Team <team at security.debian.org>
Hi,
The following vulnerabilities were published for xen.
CVE-2022-42331[0]:
| x86: speculative vulnerability in 32bit SYSCALL path Due to an
| oversight in the very original Spectre/Meltdown security work
| (XSA-254),
2018 Nov 10
2
Fedora 29 upgrade: texlive-scheme-medium may depend on R (texlive-includernw)
...installs texlive-includernw, which necessarily depends on R-knitr.
Thanks for the analysis. I do not see that any other latex package in
texlive-sceme-medium involves creating such havoc drawing in non-texlive
packages.
I appeal to Andreas Storvik Strauman to ensure that texlive-includernw is
forthwith withdrawn from texlive-collection-mathscience, because of its
side-effects.
It may be useful, but actually Rnw files would only need R anyway, and
bringinging such a payload is really very bad for everybody not exposed to
this behaviour previously. I wasted a lot of time trying to see why Rcpp...
2012 May 29
3
Bug#675055: xcp-xapi: xe-edit-bootloader does not compatible with new /dev/sm
Package: xcp-xapi
Version: 1.3.2-6
Severity: normal
Tags: upstream
/usr/lib/xcp/bin/xe-edit-bootloader failing with following message:
/usr/lib/xcp/bin/xe-edit-bootloader -u 19f66083-e776-70d1-1808-3712688ad138
Creating dom0 VBD: 0fdb952e-92ff-4b53-dd49-8d54b2268787
Plugging VBD:
Waiting for /dev/sm/backend/4c15ea03-5d70-938e-8265-d5424c0fda5e/963afb9a-9ceb-410f-8554-8be9fb70e7e0: . done