similar to: Bug#674907: severity.

Displaying 20 results from an estimated 50000 matches similar to: "Bug#674907: severity."

2012 Sep 26
2
Bug#674907: severity
Do you mind explaining why this bug was downgraded from grave (which had a justification) to normal? -- C'est avec les pierres de la loi qu'on a b?ti les prisons, et avec les briques de la religion, les bordels. - Blake, William -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: application/pgp-signature Size:
2012 Sep 26
0
Processed: severity of 674907 is normal
Processing commands for control at bugs.debian.org: > severity 674907 normal Bug #674907 [xen] shifts the clock by 50 minutes unexplicably under a Xen dom0 Severity set to 'normal' from 'grave' > thanks Stopping processing here. Please contact me if you need assistance. -- 674907: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=674907 Debian Bug Tracking System Contact
2012 Oct 01
1
Bug#674907: shifts the clock by 50 minutes unexplicably under a Xen dom0
I have exactly the same problem. I have two cluster nodes HP Proliant DL 580 G5 systems with four quad core Xeon processors. Operating system is debian squeeze. Uname -a: Linux xen-p02 2.6.32-5-xen-amd64 #1 SMP Sun Sep 23 13:49:30 UTC 2012 x86_64 GNU/Linux This is an annoying problem, the system clock in dom0 jumps forward 50 minutes and this cause my cluster node to be fenced and then rebooted.
2007 Mar 08
0
Processed: severity of 414040 is important
Processing commands for control@bugs.debian.org: > # Automatically generated email from bts, devscripts version 2.9.27 > # does not make the package unusable > severity 414040 important Bug#414040: kernel: xen_net: Memory squeeze in netback driver. Severity set to `important' from `grave' > End of message, stopping processing here. Please contact me if you need assistance.
2012 Dec 11
0
Bug#674907: closed by Bastian Blank <waldi@debian.org> (Bug#599161: fixed in xen 4.1.3-7)
On 2012-12-11, Debian Bug Tracking System wrote: > #674907: shifts the clock by 50 minutes unexplicably under a Xen dom0 > > It has been closed by Bastian Blank <waldi at debian.org>. What about us poor users on Debian squeeze? Or worse, about the upcoming wheezy release? Is there the possibility to backport this fix to s-p-u? Should I ask release.debian.org for a freeze
2010 Nov 04
2
Bug#602391: xen-hypervisor-4.0-amd64: system fails to boot from LVM if Hypervisor loaded
Package: xen-hypervisor-4.0-amd64 Version: 4.0.1-1 Severity: grave Tags: squeeze sid Justification: renders package unusable -- System Information: Debian Release: squeeze/sid APT prefers unstable APT policy: (500, 'unstable'), (500, 'testing') Architecture: amd64 (x86_64) Kernel: Linux 2.6.32-5-xen-amd64 (SMP w/1 CPU core) Locale: LANG=de_CH.UTF-8, LC_CTYPE=de_CH.UTF-8
2011 Jan 02
3
Bug#608715: Recent hardware components render the xen-hyervisor unusable, fails completeley to boot due to kernel panic
Package: xen-hypervisor-4.0-amd64 Version: 4.0.1-1 Severity: grave Tags: squeeze upstream Some newer hardware components (it is unclear what exactly causes the issue) render xen-hyervisor unusable as it crashes immediately after boot for the Debian out-of-box configuration. This results in a system rebooting all over again if the hypervisor is choosen as default stanza to be booted by grub
2011 Jun 20
3
Bug#631102: xen: Xen guests on Squeeze lose networking randomly
Package: xen-hypervisor-4.0-amd64 Version: 4.0.1-2 Severity: grave File: xen Justification: renders package unusable Debian Squeeze Dom0, up to date. Networking is handled by OS scripts, such that br0 and br1 are bridge interfaces. Without warning, the DomU (Ubuntu 10.04 LTS) loses inbound connectivity. It tends to happen after several hours. It doesn't seem to be affected by throughput
2012 May 06
0
Processed: severity of 671750 is important
Processing commands for control at bugs.debian.org: > severity 671750 important Bug #671750 [xen-utils-common] Configuration of domain save/restore broken Severity set to 'important' from 'grave' > thanks Stopping processing here. Please contact me if you need assistance. -- 671750: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=671750 Debian Bug Tracking System Contact
2012 Jun 12
0
Processed: severity of 677244 is important
Processing commands for control at bugs.debian.org: > severity 677244 important Bug #677244 [xen-utils-common] xen-utils-common: xen-toolstack fails if either `xm` or `xl` is not found in xen-dir Severity set to 'important' from 'grave' > thanks Stopping processing here. Please contact me if you need assistance. -- 677244:
2012 Aug 02
0
Processed: Set severity normal
Processing commands for control at bugs.debian.org: > severity 682979 normal Bug #682979 [xcp-xapi] xcp-xapi: VM not starting, tasks not cancellable Severity set to 'normal' from 'grave' > End of message, stopping processing here. Please contact me if you need assistance. -- 682979: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=682979 Debian Bug Tracking System Contact
2014 Aug 10
0
Processed: severity of 757724 is important
Processing commands for control at bugs.debian.org: > severity 757724 important Bug #757724 [src:xen] Multiple security issues Severity set to 'important' from 'grave' > thanks Stopping processing here. Please contact me if you need assistance. -- 757724: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=757724 Debian Bug Tracking System Contact owner at bugs.debian.org
2014 Nov 26
0
Processed: severity of 770230 is important
Processing commands for control at bugs.debian.org: > severity 770230 important Bug #770230 [src:xen] xen: CVE-2014-5146 CVE-2014-5149 CVE-2014-8594 CVE-2014-8595 CVE-2014-9030 Severity set to 'important' from 'grave' > thanks Stopping processing here. Please contact me if you need assistance. -- 770230: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=770230 Debian Bug
2012 Sep 26
0
Processed: this affects more than OpenNTPd, probably all of Xen 4.0 on Debian
Processing commands for control at bugs.debian.org: > reassign 674907 xen Bug #674907 [openntpd] shifts the clock by 50 minutes unexplicably under a Xen dom0 Bug reassigned from package 'openntpd' to 'xen'. No longer marked as found in versions 3.9p1+debian-8~bpo60+1. Ignoring request to alter fixed versions of bug #674907 to the same values previously set > found 674907
2010 Nov 04
4
Bug#602378: xen-hypervisor-4.0-amd64: Live migration of Guests crashes and reboots
Package: xen-hypervisor-4.0-amd64 Version: 4.0.1-1 Severity: grave Tags: squeeze sid Justification: causes non-serious data loss Live migration of a guest (running CentOS 5.5, Paravirtualized) crashes the target-host (Hardware: Dell R610, 2x Xeon 5620, 16Gb RAM, Perc/700-Raid) (XEN) ----[ Xen-4.0.1 x86_64 debug=n Not tainted ]---- (XEN) CPU: 9 (XEN) RIP: e008:[<ffff82c4801151f6>]
2007 Mar 08
1
Bug#414040: kernel: xen_net: Memory squeeze in netback driver.
Package: xen-hypervisor-3.0.3-1-amd64 Version: 3.0.3-0-2 Severity: grave Justification: renders package unusable This bug looks to be tracked in upstream: http://bugzilla.xensource.com/bugzilla/show_bug.cgi?id=762 Mailing list discussion here: http://lists.xensource.com/archives/html/xen-bugs/2006-11/msg00030.html -- System Information: Debian Release: 4.0 APT prefers testing APT policy:
2012 Mar 26
0
Bug#648029:
This bug is still around and has hit me today after upgrading from Debian Squeeze to a apt-pinned Xen 4.1 setup with linux-image-3.2.0-2-amd64. As this is a grave bug for Xen 4.1 actually, why not apply the patch for now to get a working package for systems using dash (which is the declared default for Debian anyway). I can confirm this patch is working fine. -------------- next part
2009 Jul 26
0
Bug#538766: xen-utils-common: fail to start xend
Package: xen-utils-common Version: 3.3.1-1 Severity: grave Justification: renders package unusable -- System Information: Debian Release: squeeze/sid APT prefers testing APT policy: (500, 'testing'), (500, 'stable') Architecture: amd64 (x86_64) Kernel: Linux 2.6.26-2-xen-amd64 (SMP w/2 CPU cores) Locale: LANG=en_US.UTF-8, LC_CTYPE=en_US.UTF-8 (charmap=UTF-8) Shell: /bin/sh
2010 Mar 23
0
Bug#571634: [xen-utils-common] using --physdev-out in the OUTPUT, FORWARD and POSTROUTING
Package: xen-utils-common Version: 3.4.2-3 --- Please enter the report below this line. --- After several tests and many hours of investigation I found out that this is not a bug. The iptables rules that triggers the message is found in /etc/xen/scripts/vif-common.sh [1], but as the syslog message clearly indicates this rule works perfectly when the traffic is bridged. Moreover, those rules are
2012 Sep 06
0
Bug#686848: CVE-2007-0998: Qemu monitor can be used to access host resources
Package: xen-qemu-dm-4.0 Version: 4.0.1-2+squeeze1 Severity: grave Tags: squeeze Copying the Xen Security Advisory: -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 Xen Security Advisory XSA-19 guest administrator can access qemu monitor console ISSUE DESCRIPTION ================= A guest administrator who is granted access to the graphical console of a Xen guest can