Displaying 20 results from an estimated 200 matches similar to: "help again"
2003 Apr 22
1
installworld (touch: not found)
Hi All,
I just the "touch: not found" problem that seems to occur occaisonally
when installing world.
--------------------------------------------------------------
>>> Installing everything..
--------------------------------------------------------------
cd /usr/src; make -f Makefile.inc1 install
===> share/info
===> include
creating osreldate.h from newvers.sh
setvar
2003 May 16
2
make installworld fails : touch not found ?
Hi, hackers :
Yesterday night and this morning, I cvsup my system to latest STABLE branch
source (RELENG_4). All make buildworld, buildkernel, and installkernel
procedure was completed with no error. But when I boot into single user mode
and try to make installworld, I always got " touch: not found " error.
Does anyone encounter this situation ? I have no idea about that. :-(
Here is
2012 Dec 12
1
/usr/src/sys/conf/newvers.sh, SYSDIR set to wrong directory.
Hello,
My 9-STABLE buildworld broke in a very inexplicable way, I was
getting an error on /usr/src/include/osreldate.h that I couldn't
figure out until I started looking at the sys/conf/newvers.sh and what
it does. It turned out that the thing that broke my buildworld was
having .git directory at the root directory of the system because I
recently started using GIT to track the configuration
2012 Jul 24
1
9-STABLE (238719) compilation fails on i386
Hi all.
When building procstat I get this:
clang -O2 -pipe -march=athlon-xp -std=gnu99 -Qunused-arguments
-fstack-protector -Wsystem-headers -Wall -Wno-format-y2k -W
-Wno-unused-parameter -Wstrict-prototypes -Wmissing-prototypes
-Wpointer-arith -Wreturn-type -Wcast-qual -Wwrite-strings -Wswitch
-Wshadow -Wunused-parameter -Wcast-align -Wchar-subscripts -Winline
-Wnested-externs
2004 Sep 14
1
multiple vulnerabilities in the cvs server code
Hello!
Port security/portaudit reports the following problem:
Affected package: FreeBSD-491000
Type of problem: multiple vulnerabilities in the cvs server code.
Reference:
<http://www.FreeBSD.org/ports/portaudit/d2102505-f03d-11d8-81b0-000347a4fa7d.htm
l>
Note: To disable this check add the uuid to `portaudit_fixed' in
/usr/local/etc/portaudit.conf
I have 2 related questions:
1)
2005 May 19
2
Versions issues
Hello all,
I'm trying to figure out which version I'm currently using. The sysctl return the following values:
kern.osreldate: 502101
kern.osrelease: 5.2 - CURRENT
Which version is that ? Is it plain 5.2 current or 5.2.1 ?
Also very important, where can I download it from ?
Any help will be appreciated!
Thanks,
pgal
2006 Apr 08
1
RELENG_6_1
Hi,
According to the webpage [1], 6.1 has been branched on April 5. However,
I noticed that there is a tag called RELENG_6_1, not a branch called
RELENG_6_1. For example, sys/conf/newvers.sh [2], rev 1.69.2.11,
is on RELENG_6 branch with tag RELENG_6_1_BP and RELENG_6_1.
It is a bit strange for me. At least, we have RELENG_X_Y branch before
and RELENG_X_Y_BP tag. Is there any special reason that
2003 Sep 25
1
FreeBSD Security Advisory FreeBSD-SA-03:14.arp [REVISED]
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
=============================================================================
FreeBSD-SA-03:14.arp Security Advisory
The FreeBSD Project
Topic: denial of service due to ARP resource starvation
Category: core
Module: sys
Announced:
2003 Aug 05
4
FreeBSD Security Advisory FreeBSD-SA-03:08.realpath [REVISED]
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
=============================================================================
FreeBSD-SA-03:08.realpath Security Advisory
The FreeBSD Project
Topic: Single byte buffer overflow in realpath(3)
Category: core
Module: libc
Announced:
2003 Aug 05
4
FreeBSD Security Advisory FreeBSD-SA-03:08.realpath [REVISED]
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
=============================================================================
FreeBSD-SA-03:08.realpath Security Advisory
The FreeBSD Project
Topic: Single byte buffer overflow in realpath(3)
Category: core
Module: libc
Announced:
2004 Mar 02
7
FreeBSD Security Advisory FreeBSD-SA-04:04.tcp
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
=============================================================================
FreeBSD-SA-04:04.tcp Security Advisory
The FreeBSD Project
Topic: many out-of-sequence TCP packets denial-of-service
Category: core
Module: kernel
2003 Sep 17
2
FreeBSD Security Advisory FreeBSD-SA-03:12.openssh [REVISED]
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
=============================================================================
FreeBSD-SA-03:12 Security Advisory
FreeBSD, Inc.
Topic: OpenSSH buffer management error
Category: core, ports
Module: openssh, ports_openssh,
2003 Sep 17
2
FreeBSD Security Advisory FreeBSD-SA-03:12.openssh [REVISED]
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
=============================================================================
FreeBSD-SA-03:12 Security Advisory
FreeBSD, Inc.
Topic: OpenSSH buffer management error
Category: core, ports
Module: openssh, ports_openssh,
2000 Jun 26
1
postscript error
I'm using R version 1.1.0 with Redhat 6.2 in a Dual-Pentium
When I type
postscript()
I have the next error:
-- Error in old$command == "default" : comparison (1) is possible only
for vector types
I have updated R next week using the rpm package
http://www.stat.math.ethz.ch/CRAN/bin/linux/redhat/6.x/i386/R-base-1.0
.0-2.i386.rpm
I know that postscript() has new features, but I
2007 Oct 03
1
FreeBSD Security Advisory FreeBSD-SA-07:08.openssl
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
=============================================================================
FreeBSD-SA-07:08.openssl Security Advisory
The FreeBSD Project
Topic: Buffer overflow in OpenSSL SSL_get_shared_ciphers()
Category: contrib
Module: openssl
2007 Oct 03
1
FreeBSD Security Advisory FreeBSD-SA-07:08.openssl
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
=============================================================================
FreeBSD-SA-07:08.openssl Security Advisory
The FreeBSD Project
Topic: Buffer overflow in OpenSSL SSL_get_shared_ciphers()
Category: contrib
Module: openssl
2006 Mar 22
1
FreeBSD Security Advisory FreeBSD-SA-06:11.ipsec
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
=============================================================================
FreeBSD-SA-06:11.ipsec Security Advisory
The FreeBSD Project
Topic: IPsec replay attack vulnerability
Category: core
Module: sys_netipsec
Announced:
2006 Mar 22
1
FreeBSD Security Advisory FreeBSD-SA-06:11.ipsec
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
=============================================================================
FreeBSD-SA-06:11.ipsec Security Advisory
The FreeBSD Project
Topic: IPsec replay attack vulnerability
Category: core
Module: sys_netipsec
Announced:
2004 Feb 04
3
FreeBSD Security Advisory FreeBSD-SA-04:01.mksnap_ffs
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
=============================================================================
FreeBSD-SA-04:01.mksnap_ffs Security Advisory
The FreeBSD Project
Topic: mksnap_ffs clears file system options
Category: core
Module: mksnap_ffs
Announced:
2003 Sep 16
9
FreeBSD Security Advisory FreeBSD-SA-03:12.openssh
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
=============================================================================
FreeBSD-SA-03:12 Security Advisory
FreeBSD, Inc.
Topic: OpenSSH buffer management error
Category: core, ports
Module: openssh, ports_openssh,