search for: forthwith

Displaying 20 results from an estimated 499 matches for "forthwith".

2006 Nov 01
4
Bug#396557: xen-3.0: missing libz-dev in build dependencies
Package: xen-3.0 Version: 3.0.3-0-1 Severity: serious Justification: no longer builds from source Missing build-dep on libz-dev in debian/control. -- System Information: Debian Release: 4.0 APT prefers unstable APT policy: (500, 'unstable'), (500, 'stable') Architecture: i386 (i686) Shell: /bin/sh linked to /bin/bash Kernel: Linux 2.6.18-1-xen-686 Locale: LANG=it_IT,
2006 Nov 01
4
Bug#396561: xen-3.0: missing x11proto-core-dev in build dependencies
Package: xen-3.0 Version: 3.0.3-0-1 Severity: serious Justification: no longer builds from source Missing build-dep on x11proto-core-dev in debian/control. -- System Information: Debian Release: 4.0 APT prefers unstable APT policy: (500, 'unstable'), (500, 'stable') Architecture: i386 (i686) Shell: /bin/sh linked to /bin/bash Kernel: Linux 2.6.18-1-xen-686 Locale:
2006 Nov 01
5
Bug#396567: xen-3.0: missing libncurses5-dev in build dependencies
Package: xen-3.0 Version: 3.0.3-0-1 Severity: serious Justification: no longer builds from source Missing build-dep on libncurses5-dev in debian/control. -- System Information: Debian Release: 4.0 APT prefers unstable APT policy: (500, 'unstable'), (500, 'stable') Architecture: i386 (i686) Shell: /bin/sh linked to /bin/bash Kernel: Linux 2.6.18-1-xen-686 Locale: LANG=it_IT,
2000 Apr 01
0
space in user dir?
...> >> mikE wohlgemutH > shred@m21.sail.leon.k12.fl.us > > >> sail higH schooL > http://www.sail.leon.k12.fl.us/ > > >> > > >> Mathematicians are like Frenchmen: whatever you say to them they > > >> translate into their own language, and forthwith it is something > > >> entirely different. > > >> -- Johann Wolfgang von Goethe > > > > > >-- > > >Mike Wohlgemuth > > > > > >Technology Coordinator > > >Mathematics Teacher > > >SAIL High School...
2012 Sep 19
5
Bug#688125: xen: CVE-2012-2625
Package: xen Severity: important Tags: security Justification: user security hole Hi, This issue is still unfixed in Wheezy: https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2012-2625 Patch: http://xenbits.xensource.com/hg/xen-unstable.hg/rev/60f09d1ab1fe Cheers, Moritz
2015 May 22
1
Can email be shared between POP3 and shell account access?
...he >> ouside, but through mail/mailx on the inside, and if so, how is that >> set up? > >If you have root or sudo then all you need is mutt. > ># mutt -f /path/to/Maildir H'mm. All I need is mutt. There's a song in there somewhere. Just looked it up and will install forthwith. All of this going to further prove my depth of un-knowledge about this stuff. THANKS!
2004 May 25
1
Speed Dials
...articular purpose. The user assumes the entire risk as to the accuracy and the use of this document. The information contained in this e-mail may be confidential and may also be legally privileged. It is intended solely for the addressee(s). If you are not the intended recipient then please delete forthwith.
2012 Apr 19
2
OpenSSL ASN.1 vulnerability: sshd not affected
...the security of an application. This gloating only applies to sshd though - private key loading still uses the affected OpenSSL code, so if you are somehow allowing untrusted users to supply private keys to ssh, ssh-keygen or ssh-add in a privileged context then you should apply the OpenSSL fixes forthwith. -d
2016 May 27
2
Bug#825580: libxen-dev: broken symlink: /usr/lib/x86_64-linux-gnu/libxlutil.so -> libxlutil.so.
Package: libxen-dev Version: 4.6.0-1+nmu2 Severity: serious User: debian-qa at lists.debian.org Usertags: piuparts Hi, during a test with piuparts I noticed your package ships a broken symlink: /usr/lib/x86_64-linux-gnu/libxlutil.so -> libxlutil.so. (notice the trailing dot, it is part of the target). You probably want this target instead: libxlutil-4.6.so Andreas
2012 Jul 30
5
Bug#683279: CVE-2012-3432
Package: xen Severity: grave Tags: security Please see http://www.openwall.com/lists/oss-security/2012/07/26/4 Cheers, Moritz
2008 Sep 24
2
Bug#500017: ignore.d.server/ssh: outdated 'reverse mapping checking ... failed' rule
Package: logcheck-database Version: 1.2.68 Severity: minor openssh-server version 1:5.1p1-2 ^\w{3} [ :0-9]{11} [._[:alnum:]-]+ sshd\[[0-9]+\]: reverse mapping checking getaddrinfo for [._[:alnum:]-]+ failed - POSSIBLE BREAK-?IN ATTEMPT!$ should look like ^\w{3} [ :0-9]{11} [._[:alnum:]-]+ sshd\[[0-9]+\]: reverse mapping checking getaddrinfo for [._[:alnum:]-]+ \[[.[:alnum:]:]+\] failed -
2016 Jan 21
7
Bug#812166: xen: FTBFS with GCC 6: statement is indented as if...
Package: xen Version: 4.6.0-1 Severity: important User: debian-gcc at lists.debian.org Usertags: ftbfs-gcc-6 gcc-6-misleading-indentation This package fails to build with GCC 6. GCC 6 has not been released yet, but it's expected that GCC 6 will become the default compiler for stretch. Note that only the first error is reported; there might be more. You can find a snapshot of GCC 6 in
2008 Jun 19
2
Bug#487095: xen-3: multiple security issues
Source: xen-3 Version: 3.2.1-1 Severity: grave Tags: security, patch Hi, the following CVE (Common Vulnerabilities & Exposures) ids were published for xen-3. CVE-2008-1943[0]: | Buffer overflow in the backend of XenSource Xen Para Virtualized Frame | Buffer (PVFB) 3.0 through 3.1.2 allows local users to cause a denial | of service (crash) and possibly execute arbitrary code via a crafted |
2014 Feb 06
5
Bug#737905: Xen: hvmloader causes immediate VCPU triple fault with SeaBIOS 1.7.4
Package: xen-utils-4.3 Version: 4.3.0-3 Severity: important Tags: upstream patch When using Xen compiled with seabios-1.7.4-1 (now in unstable/testing), HVMs fail immediately upon starting with a VCPU triple fault: (XEN) HVM1: Loading SeaBIOS ... (XEN) hvm.c:1253:d1 Triple fault on VCPU0 - invoking HVM shutdown action 1. This is because SeaBIOS can now be greater than 128k, which breaks an
2012 Jun 25
4
Bug#678923: xcp-xapi: host-disable and host-reboot make host disable forever
Package: xcp-xapi Version: 1.3.2-6 Severity: important I done normal reboot: xe host-disable host=this_host xe host-reboot host=this_host After reboot host stays in 'disable' state and when I've tried to make it enable I got: xe host-enable uuid=ab523ee3-0546-5400-e2db-32f340292fff The specified host is disabled and cannot be re-enabled until after it has rebooted. host:
2017 Apr 04
4
Bug#859560: xen: CVE-2017-7228: x86: broken check in memory_exchange() permits PV guest breakout (XSA-212)
Source: xen Version: 4.8.1~pre.2017.01.23-1 Severity: grave Tags: security upstream Justification: user security hole Hi, the following vulnerability was published for xen. CVE-2017-7228[0]: | An issue (known as XSA-212) was discovered in Xen, with fixes available | for 4.8.x, 4.7.x, 4.6.x, 4.5.x, and 4.4.x. The earlier XSA-29 fix | introduced an insufficient check on XENMEM_exchange input,
2014 Oct 29
4
Bug#767295: xl: apparent memory leak
Package: xen-utils-4.4 Version: 4.4.1-3 When booting domU's running amd64 jessie, I notice some memory problems with xl. root at xen:~# pmap -x 4121 4121: /usr/lib/xen-4.4/bin/xl create --quiet --defconfig /etc/xen/auto/mail_deb80.cfg Address Kbytes RSS Dirty Mode Mapping 0000000000400000 144 128 0 r-x-- xl 0000000000623000 4 4 4 r---- xl
2023 Mar 21
2
Bug#1033297: xen: CVE-2022-42331 CVE-2022-42332 CVE-2022-42333 CVE-2022-42334
Source: xen Version: 4.17.0+46-gaaf74a532c-1 Severity: grave Tags: security upstream X-Debbugs-Cc: carnil at debian.org, Debian Security Team <team at security.debian.org> Hi, The following vulnerabilities were published for xen. CVE-2022-42331[0]: | x86: speculative vulnerability in 32bit SYSCALL path Due to an | oversight in the very original Spectre/Meltdown security work | (XSA-254),
2018 Nov 10
2
Fedora 29 upgrade: texlive-scheme-medium may depend on R (texlive-includernw)
...installs texlive-includernw, which necessarily depends on R-knitr. Thanks for the analysis. I do not see that any other latex package in texlive-sceme-medium involves creating such havoc drawing in non-texlive packages. I appeal to Andreas Storvik Strauman to ensure that texlive-includernw is forthwith withdrawn from texlive-collection-mathscience, because of its side-effects. It may be useful, but actually Rnw files would only need R anyway, and bringinging such a payload is really very bad for everybody not exposed to this behaviour previously. I wasted a lot of time trying to see why Rcpp...
2012 May 29
3
Bug#675055: xcp-xapi: xe-edit-bootloader does not compatible with new /dev/sm
Package: xcp-xapi Version: 1.3.2-6 Severity: normal Tags: upstream /usr/lib/xcp/bin/xe-edit-bootloader failing with following message: /usr/lib/xcp/bin/xe-edit-bootloader -u 19f66083-e776-70d1-1808-3712688ad138 Creating dom0 VBD: 0fdb952e-92ff-4b53-dd49-8d54b2268787 Plugging VBD: Waiting for /dev/sm/backend/4c15ea03-5d70-938e-8265-d5424c0fda5e/963afb9a-9ceb-410f-8554-8be9fb70e7e0: . done