search for: nogpg

Displaying 20 results from an estimated 106 matches for "nogpg".

Did you mean: nogpt
1999 Oct 21
1
[RHSA-1999:042-01] screen defaults to not using Unix98 ptys
...at: http://www.redhat.com/corp/contact.html You can verify each package with the following command: rpm --checksig 'filename' If you only wish to verify that each package has not been corrupted or tampered with, examine only the md5sum with the following command: rpm --checksig --nogpg 'filename' 10. References: From mail@mail.redhat.com Oct 17:20:32 1999 -0400 Received: (qmail 1551 invoked from network); 21 Oct 1999 21:20:34 -0000 Received: from mail.redhat.com (199.183.24.239) by lists.redhat.com with SMTP; 21 Oct 1999 21:20:34 -0000 Received: from alien.devel.red...
2013 Jul 22
2
Libvirt-lxc and systemd question
...md systemd-libs-204-9.fc19.x86_64 systemd-python-204-9.fc19.x86_64 systemd-sysv-204-9.fc19.x86_64 systemd-libs-204-9.fc19.i686 systemd-204-9.fc19.x86_64 Here is the scenario I'm trying to go through: $ export LIBVIRT_DEFAULT_URI=lxc:/// $ getenforce Enforcing $ sudo yum -y --releasever=19 --nogpg --installroot=/srv/mycontainer --disablerepo='*' --enablerepo=fedora install systemd passwd yum fedora-release vim-minimal ... lots of output $ ls /srv/mycontainer/ bin boot dev etc home lib lib64 media mnt opt proc root run sbin srv sys tmp usr var $ cat test2.xml &lt...
2014 Jan 30
2
Notes on building libguestfs in a systemd-nspawn container
...ting by booting the host w/ 'audit=0' on Kernel command line. (NOTE: There's work in progress[2] in upstream Kernel to fix this.) Create container ---------------- On the host, specify an installroot (/srv) and install a minimal Fedora 20 distribution: $ yum -y --releasever=20 --nogpg \ --installroot=/srv/testcontainer \ --disablerepo='*' --enablerepo=fedora \ install systemd passwd yum \ fedora-release vim-minimal Boot into the container, set a password: $ systemd-nspawn -D /srv/testcontainer [. . .] -bash-4.2# passwd Start...
2000 May 31
1
[RHSA-2000:005-05] New majordomo packages available
...: http://www.redhat.com/corp/contact.html You can verify each package with the following command: rpm --checksig <filename> If you only wish to verify that each package has not been corrupted or tampered with, examine only the md5sum with the following command: rpm --checksig --nogpg <filename> 8. References: Thanks to Brock Tellier at btellier@USA.NET for noting the vulnerability in resend, to Shevek at shevek@anarres.org and Olaf Kirch at okir@monad.swb.de for noting the vulnerability in the wrapper.
1999 Oct 21
1
...at: http://www.redhat.com/corp/contact.html You can verify each package with the following command: rpm --checksig <filename> If you only wish to verify that each package has not been corrupted or tampered with, examine only the md5sum with the following command: rpm --checksig --nogpg <filename> 10. References: CERT Advisory CA-99-13 Multiple Vulnerabilities in WU-FTPD http://www.cert.org AUSCERT Advisory AA-1999.01 ftp://www.auscert.org.au/security/advisory/AA-1999.01.wu-ftpd.mapping_chdir.vul AUSCERT Advisory AA-1999.02 ftp://www.auscert.org.au/security/advisory/AA-1...
2000 Jun 14
0
Security Advisory: local ROOT exploit in BRU
...: http://www.redhat.com/corp/contact.html You can verify each package with the following command: rpm --checksig <filename> If you only wish to verify that each package has not been corrupted or tampered with, examine only the md5sum with the following command: rpm --checksig --nogpg <filename> 8. References: http://www.securityfocus.com/bid/1125 From mail@mail.redhat.com Jun 19:00:12 2000 -0400 Received: (qmail 8172 invoked from network); 15 Jun 2000 23:00:13 -0000 Received: from mail.redhat.com (199.183.24.239) by lists.redhat.com with SMTP; 15 Jun 2000 23:00:1...
2000 May 19
1
[RHSA-2000:028-02] Netscape 4.73 available
...: http://www.redhat.com/corp/contact.html You can verify each package with the following command: rpm --checksig <filename> If you only wish to verify that each package has not been corrupted or tampered with, examine only the md5sum with the following command: rpm --checksig --nogpg <filename> 8. References: N/A
2000 Aug 09
1
[RHSA-2000:048-06] Updated mailx and perl packages are now available.
...: http://www.redhat.com/corp/contact.html You can verify each package with the following command: rpm --checksig <filename> If you only wish to verify that each package has not been corrupted or tampered with, examine only the md5sum with the following command: rpm --checksig --nogpg <filename> 8. References: http://www.securityfocus.com/vdb/bottom.html?vid=1547 http://bugs.perl.org/perlbug.cgi?req=tidmids&tidmids=20000806.001 Copyright(c) 2000 Red Hat, Inc. _______________________________________________ Redhat-watch-list mailing list Redhat-watch-list@redhat....
2000 Aug 08
0
[RHSA-2000:050-01] mopd-linux buffer overflow
...: http://www.redhat.com/corp/contact.html You can verify each package with the following command: rpm --checksig <filename> If you only wish to verify that each package has not been corrupted or tampered with, examine only the md5sum with the following command: rpm --checksig --nogpg <filename> 8. References: http://www.openbsd.org/security.html#27 Thanks to Matt Power <mhpower@MIT.EDU> for making us aware of this vulnerability. Copyright(c) 2000 Red Hat, Inc.
2000 Aug 08
0
[RHSA-2000:049-02] Remote file access vulnerability in ntop
...: http://www.redhat.com/corp/contact.html You can verify each package with the following command: rpm --checksig <filename> If you only wish to verify that each package has not been corrupted or tampered with, examine only the md5sum with the following command: rpm --checksig --nogpg <filename> 8. References: N/A Copyright(c) 2000 Red Hat, Inc. _______________________________________________ Redhat-watch-list mailing list Redhat-watch-list@redhat.com https://listman.redhat.com/mailman/listinfo/redhat-watch-list
2000 Aug 08
0
[RHSA-2000:047-03] New umb-scheme packages are available.
...: http://www.redhat.com/corp/contact.html You can verify each package with the following command: rpm --checksig <filename> If you only wish to verify that each package has not been corrupted or tampered with, examine only the md5sum with the following command: rpm --checksig --nogpg <filename> 8. References: Thanks to Prasanth A. Kumar for pointing this error out. Copyright(c) 2000 Red Hat, Inc.
2000 Aug 11
0
[RHSA-2000:052-02] Zope update
...: http://www.redhat.com/corp/contact.html You can verify each package with the following command: rpm --checksig <filename> If you only wish to verify that each package has not been corrupted or tampered with, examine only the md5sum with the following command: rpm --checksig --nogpg <filename> 8. References: http://www.zope.org/Products/Zope/Hotfix_08_09_2000/security_alert Copyright(c) 2000 Red Hat, Inc. _______________________________________________ Redhat-watch-list mailing list Redhat-watch-list@redhat.com https://listman.redhat.com/mailman/listinfo/redhat-wa...
2000 Aug 03
0
[RHSA-2000:030-03] Updated mailman packages are available.
...: http://www.redhat.com/corp/contact.html You can verify each package with the following command: rpm --checksig <filename> If you only wish to verify that each package has not been corrupted or tampered with, examine only the md5sum with the following command: rpm --checksig --nogpg <filename> 8. References: N/A Copyright(c) 2000 Red Hat, Inc.
2000 Jul 03
0
[RHSA-2000:016-03] Multiple local imwheel vulnerabilities
...: http://www.redhat.com/corp/contact.html You can verify each package with the following command: rpm --checksig <filename> If you only wish to verify that each package has not been corrupted or tampered with, examine only the md5sum with the following command: rpm --checksig --nogpg <filename> 8. References: N/A
2000 Jul 06
0
[RHSA-2000:042-01] BitchX denial of service vulnerability
...: http://www.redhat.com/corp/contact.html You can verify each package with the following command: rpm --checksig <filename> If you only wish to verify that each package has not been corrupted or tampered with, examine only the md5sum with the following command: rpm --checksig --nogpg <filename> 8. References: Thanks to Colten Edwards <edwards@bitchx.dimension6.com> for making us aware of the problem.
2000 Jun 07
0
[RHSA-2000:032-02] kdelibs vulnerability for suid-root KDE applications
...: http://www.redhat.com/corp/contact.html You can verify each package with the following command: rpm --checksig <filename> If you only wish to verify that each package has not been corrupted or tampered with, examine only the md5sum with the following command: rpm --checksig --nogpg <filename> 8. References: N/A
2000 Jun 22
0
[RHSA-2000:038-01] Zope update
...: http://www.redhat.com/corp/contact.html You can verify each package with the following command: rpm --checksig <filename> If you only wish to verify that each package has not been corrupted or tampered with, examine only the md5sum with the following command: rpm --checksig --nogpg <filename> 8. References: http://www.zope.org/Products/Zope/Hotfix_06_16_2000/security_alert
2000 May 09
0
[RHBA-2000:021-01] gnuplot
...: http://www.redhat.com/corp/contact.html You can verify each package with the following command: rpm --checksig <filename> If you only wish to verify that each package has not been corrupted or tampered with, examine only the md5sum with the following command: rpm --checksig --nogpg <filename> 10. References: N/A
2000 Apr 21
0
[RHSA-2000:016-02] imwheel buffer overflow
...: http://www.redhat.com/corp/contact.html You can verify each package with the following command: rpm --checksig <filename> If you only wish to verify that each package has not been corrupted or tampered with, examine only the md5sum with the following command: rpm --checksig --nogpg <filename> 10. References: http://www.securityfocus.com/vdb/bottom.html?vid=1060
1999 Oct 12
0
SECURITY: RHSA-1999:040 New PAM packages available
...http://www.redhat.com/corp/contact.html You can verify each package with the following command: rpm --checksig <filename> If you only wish to verify that each package has not been corrupted or tampered with, examine only the md5sum with the following command: rpm --checksig --nogpg <filename> 10. References: Cristian - -- - ---------------------------------------------------------------------- Cristian Gafton -- gafton@redhat.com -- Red Hat, Inc. ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ "How could this be a problem...