Displaying 20 results from an estimated 106 matches for "nogpg".
Did you mean:
nogpt
1999 Oct 21
1
[RHSA-1999:042-01] screen defaults to not using Unix98 ptys
...at:
http://www.redhat.com/corp/contact.html
You can verify each package with the following command:
rpm --checksig 'filename'
If you only wish to verify that each package has not been corrupted or
tampered with, examine only the md5sum with the following command:
rpm --checksig --nogpg 'filename'
10. References:
From mail@mail.redhat.com Oct 17:20:32 1999 -0400
Received: (qmail 1551 invoked from network); 21 Oct 1999 21:20:34 -0000
Received: from mail.redhat.com (199.183.24.239)
by lists.redhat.com with SMTP; 21 Oct 1999 21:20:34 -0000
Received: from alien.devel.red...
2013 Jul 22
2
Libvirt-lxc and systemd question
...md
systemd-libs-204-9.fc19.x86_64
systemd-python-204-9.fc19.x86_64
systemd-sysv-204-9.fc19.x86_64
systemd-libs-204-9.fc19.i686
systemd-204-9.fc19.x86_64
Here is the scenario I'm trying to go through:
$ export LIBVIRT_DEFAULT_URI=lxc:///
$ getenforce
Enforcing
$ sudo yum -y --releasever=19 --nogpg --installroot=/srv/mycontainer
--disablerepo='*' --enablerepo=fedora install systemd passwd yum
fedora-release vim-minimal
... lots of output
$ ls /srv/mycontainer/
bin boot dev etc home lib lib64 media mnt opt proc root run
sbin srv sys tmp usr var
$ cat test2.xml
<...
2014 Jan 30
2
Notes on building libguestfs in a systemd-nspawn container
...ting by booting the host w/ 'audit=0' on Kernel command line.
(NOTE: There's work in progress[2] in upstream Kernel to fix this.)
Create container
----------------
On the host, specify an installroot (/srv) and install a minimal Fedora
20 distribution:
$ yum -y --releasever=20 --nogpg \
--installroot=/srv/testcontainer \
--disablerepo='*' --enablerepo=fedora \
install systemd passwd yum \
fedora-release vim-minimal
Boot into the container, set a password:
$ systemd-nspawn -D /srv/testcontainer
[. . .]
-bash-4.2# passwd
Start...
2000 May 31
1
[RHSA-2000:005-05] New majordomo packages available
...:
http://www.redhat.com/corp/contact.html
You can verify each package with the following command:
rpm --checksig <filename>
If you only wish to verify that each package has not been corrupted or
tampered with, examine only the md5sum with the following command:
rpm --checksig --nogpg <filename>
8. References:
Thanks to Brock Tellier at btellier@USA.NET for noting the vulnerability in resend, to Shevek at shevek@anarres.org and Olaf Kirch at okir@monad.swb.de for noting the vulnerability in the wrapper.
1999 Oct 21
1
...at:
http://www.redhat.com/corp/contact.html
You can verify each package with the following command:
rpm --checksig <filename>
If you only wish to verify that each package has not been corrupted or
tampered with, examine only the md5sum with the following command:
rpm --checksig --nogpg <filename>
10. References:
CERT Advisory CA-99-13 Multiple Vulnerabilities in WU-FTPD
http://www.cert.org
AUSCERT Advisory AA-1999.01
ftp://www.auscert.org.au/security/advisory/AA-1999.01.wu-ftpd.mapping_chdir.vul
AUSCERT Advisory AA-1999.02
ftp://www.auscert.org.au/security/advisory/AA-1...
2000 Jun 14
0
Security Advisory: local ROOT exploit in BRU
...:
http://www.redhat.com/corp/contact.html
You can verify each package with the following command:
rpm --checksig <filename>
If you only wish to verify that each package has not been corrupted or
tampered with, examine only the md5sum with the following command:
rpm --checksig --nogpg <filename>
8. References:
http://www.securityfocus.com/bid/1125
From mail@mail.redhat.com Jun 19:00:12 2000 -0400
Received: (qmail 8172 invoked from network); 15 Jun 2000 23:00:13 -0000
Received: from mail.redhat.com (199.183.24.239)
by lists.redhat.com with SMTP; 15 Jun 2000 23:00:1...
2000 May 19
1
[RHSA-2000:028-02] Netscape 4.73 available
...:
http://www.redhat.com/corp/contact.html
You can verify each package with the following command:
rpm --checksig <filename>
If you only wish to verify that each package has not been corrupted or
tampered with, examine only the md5sum with the following command:
rpm --checksig --nogpg <filename>
8. References:
N/A
2000 Aug 09
1
[RHSA-2000:048-06] Updated mailx and perl packages are now available.
...:
http://www.redhat.com/corp/contact.html
You can verify each package with the following command:
rpm --checksig <filename>
If you only wish to verify that each package has not been corrupted or
tampered with, examine only the md5sum with the following command:
rpm --checksig --nogpg <filename>
8. References:
http://www.securityfocus.com/vdb/bottom.html?vid=1547
http://bugs.perl.org/perlbug.cgi?req=tidmids&tidmids=20000806.001
Copyright(c) 2000 Red Hat, Inc.
_______________________________________________
Redhat-watch-list mailing list
Redhat-watch-list@redhat....
2000 Aug 08
0
[RHSA-2000:050-01] mopd-linux buffer overflow
...:
http://www.redhat.com/corp/contact.html
You can verify each package with the following command:
rpm --checksig <filename>
If you only wish to verify that each package has not been corrupted or
tampered with, examine only the md5sum with the following command:
rpm --checksig --nogpg <filename>
8. References:
http://www.openbsd.org/security.html#27
Thanks to Matt Power <mhpower@MIT.EDU> for making us aware of this
vulnerability.
Copyright(c) 2000 Red Hat, Inc.
2000 Aug 08
0
[RHSA-2000:049-02] Remote file access vulnerability in ntop
...:
http://www.redhat.com/corp/contact.html
You can verify each package with the following command:
rpm --checksig <filename>
If you only wish to verify that each package has not been corrupted or
tampered with, examine only the md5sum with the following command:
rpm --checksig --nogpg <filename>
8. References:
N/A
Copyright(c) 2000 Red Hat, Inc.
_______________________________________________
Redhat-watch-list mailing list
Redhat-watch-list@redhat.com
https://listman.redhat.com/mailman/listinfo/redhat-watch-list
2000 Aug 08
0
[RHSA-2000:047-03] New umb-scheme packages are available.
...:
http://www.redhat.com/corp/contact.html
You can verify each package with the following command:
rpm --checksig <filename>
If you only wish to verify that each package has not been corrupted or
tampered with, examine only the md5sum with the following command:
rpm --checksig --nogpg <filename>
8. References:
Thanks to Prasanth A. Kumar for pointing this error out.
Copyright(c) 2000 Red Hat, Inc.
2000 Aug 11
0
[RHSA-2000:052-02] Zope update
...:
http://www.redhat.com/corp/contact.html
You can verify each package with the following command:
rpm --checksig <filename>
If you only wish to verify that each package has not been corrupted or
tampered with, examine only the md5sum with the following command:
rpm --checksig --nogpg <filename>
8. References:
http://www.zope.org/Products/Zope/Hotfix_08_09_2000/security_alert
Copyright(c) 2000 Red Hat, Inc.
_______________________________________________
Redhat-watch-list mailing list
Redhat-watch-list@redhat.com
https://listman.redhat.com/mailman/listinfo/redhat-wa...
2000 Aug 03
0
[RHSA-2000:030-03] Updated mailman packages are available.
...:
http://www.redhat.com/corp/contact.html
You can verify each package with the following command:
rpm --checksig <filename>
If you only wish to verify that each package has not been corrupted or
tampered with, examine only the md5sum with the following command:
rpm --checksig --nogpg <filename>
8. References:
N/A
Copyright(c) 2000 Red Hat, Inc.
2000 Jul 03
0
[RHSA-2000:016-03] Multiple local imwheel vulnerabilities
...:
http://www.redhat.com/corp/contact.html
You can verify each package with the following command:
rpm --checksig <filename>
If you only wish to verify that each package has not been corrupted or
tampered with, examine only the md5sum with the following command:
rpm --checksig --nogpg <filename>
8. References:
N/A
2000 Jul 06
0
[RHSA-2000:042-01] BitchX denial of service vulnerability
...:
http://www.redhat.com/corp/contact.html
You can verify each package with the following command:
rpm --checksig <filename>
If you only wish to verify that each package has not been corrupted or
tampered with, examine only the md5sum with the following command:
rpm --checksig --nogpg <filename>
8. References:
Thanks to Colten Edwards <edwards@bitchx.dimension6.com> for making us aware of the problem.
2000 Jun 07
0
[RHSA-2000:032-02] kdelibs vulnerability for suid-root KDE applications
...:
http://www.redhat.com/corp/contact.html
You can verify each package with the following command:
rpm --checksig <filename>
If you only wish to verify that each package has not been corrupted or
tampered with, examine only the md5sum with the following command:
rpm --checksig --nogpg <filename>
8. References:
N/A
2000 Jun 22
0
[RHSA-2000:038-01] Zope update
...:
http://www.redhat.com/corp/contact.html
You can verify each package with the following command:
rpm --checksig <filename>
If you only wish to verify that each package has not been corrupted or
tampered with, examine only the md5sum with the following command:
rpm --checksig --nogpg <filename>
8. References:
http://www.zope.org/Products/Zope/Hotfix_06_16_2000/security_alert
2000 May 09
0
[RHBA-2000:021-01] gnuplot
...:
http://www.redhat.com/corp/contact.html
You can verify each package with the following command:
rpm --checksig <filename>
If you only wish to verify that each package has not been corrupted or
tampered with, examine only the md5sum with the following command:
rpm --checksig --nogpg <filename>
10. References:
N/A
2000 Apr 21
0
[RHSA-2000:016-02] imwheel buffer overflow
...:
http://www.redhat.com/corp/contact.html
You can verify each package with the following command:
rpm --checksig <filename>
If you only wish to verify that each package has not been corrupted or
tampered with, examine only the md5sum with the following command:
rpm --checksig --nogpg <filename>
10. References:
http://www.securityfocus.com/vdb/bottom.html?vid=1060
1999 Oct 12
0
SECURITY: RHSA-1999:040 New PAM packages available
...http://www.redhat.com/corp/contact.html
You can verify each package with the following command:
rpm --checksig <filename>
If you only wish to verify that each package has not been corrupted or
tampered with, examine only the md5sum with the following command:
rpm --checksig --nogpg <filename>
10. References:
Cristian
- --
- ----------------------------------------------------------------------
Cristian Gafton -- gafton@redhat.com -- Red Hat, Inc.
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
"How could this be a problem...