similar to: Possible problems in your Debian packages

Displaying 20 results from an estimated 2000 matches similar to: "Possible problems in your Debian packages"

2008 Jul 01
1
Possible problems in your Debian packages
=== xen-3: = 1 bug(s) that should be fixed for the next Debian release: - #391935 <http://bugs.debian.org/391935> Xen trademark might be problematic ------------ interesting stuff probably ends here ------------ This is an automated mail. These mails are sent two times per month. For more information about these mails, refer to http://wiki.debian.org/qa.debian.org/DdpoByMail We are sorry
2008 Mar 03
1
Some of your Debian packages might need attention
Dear Debian Xen Team, The following possible problem(s) were detected in the package(s) you maintain in Debian: === xen-3: = This package has 1 bug(s) that should be fixed for the next Debian release: - #464969 <http://bugs.debian.org/464969> xen-hypervisor-3.2-1-i386: Linux mmap()/vmsplice() exploit causes memory map corruption in hypervisor regardless of domain privilege This is a
2007 Sep 26
1
Some of your Debian packages might need attention
Dear Debian Xen Team, The following possible problem(s) were detected in the package(s) you maintain in Debian: === xen-unstable: = This package has not been in testing for 292 days. = This package has not been able to migrate from unstable to testing for 292 days. See <http://bjorn.haxx.se/debian/testing.pl?package=xen-unstable> This is an automated mail. These mails are sent
2007 Jun 22
1
Some of your Debian packages might need attention
Dear Debian Xen Team, The following possible problem(s) were detected in the package(s) you maintain in Debian: xen-unstable: This package has not been in testing for more than 196 days. This is an semi-automated mail. These mails will be sent monthly. For more information about these mails, refer to http://wiki.debian.org/qa.debian.org/DdpoByMail We are sorry if this mail was useless for
2007 Nov 26
2
Some of your Debian packages might need attention
Dear Debian Xen Team, The following possible problem(s) were detected in the package(s) you maintain in Debian: === xen-unstable: = This package has not been in testing for 353 days. = This package has not been able to migrate from unstable to testing for 353 days. See <http://bjorn.haxx.se/debian/testing.pl?package=xen-unstable> This is an automated mail. These mails are sent
2007 Aug 23
0
Some of your Debian packages might need attention
Dear Debian Xen Team, The following possible problem(s) were detected in the package(s) you maintain in Debian: === xen-unstable: = This package has not been in testing for 258 days. = This package has not been able to migrate from unstable to testing for 258 days. This is a semi-automated mail. These mails are sent monthly. For more information about these mails, refer to
2009 Jul 10
0
Possible problems in your Debian packages
This is an automated mail. These mails are sent twice a month. For more information about these mails, refer to http://wiki.debian.org/qa.debian.org/DdpoByMail === xen-3: = 2 bug(s) that should be fixed soon: - #536173 <http://bugs.debian.org/536173> xen-utils-3.4 need to depend on 3.4 version of xenstore - #536176 <http://bugs.debian.org/536176> xen-utils-3.4: trying xen-3.4 once
2009 Oct 29
0
Possible problems in your Debian packages
This is an automated mail. These mails are sent twice a month. For more information about these mails, refer to http://wiki.debian.org/qa.debian.org/DdpoByMail === xen-3: = There are 3 unfixed security issue(s), please fix them. See http://security-tracker.debian.net/tracker/source-package/xen-3 = Lintian reports 1 error(s) and 17 warning(s), you should consider fixing them. See
2010 Jan 13
0
Possible problems in your Debian packages
This is an automated mail. These mails are sent twice a month. For more information about these mails, refer to http://wiki.debian.org/qa.debian.org/DdpoByMail === xen-3: = There are 3 unfixed security issue(s), please fix them. See http://security-tracker.debian.org/tracker/source-package/xen-3 = Lintian reports 9 warning(s), you should consider fixing them. See
2014 Dec 16
3
BLAS/LAPACK routine 'DLASCL' gave error code -4 in liblapack3 Version 3.5.0
Dear all Some computations gave a matrix. The single value decomposition of it worked fine previously, after an system upgrade I get the following error: ----- > La.svd(x,256,256) Error in La.svd(x, nu, nv) : BLAS/LAPACK routine 'DLASCL' gave error code -4 ----- Erroneous Matrix: ftp://usys-ftp.ethz.ch/ITES/STEP/nussbaum/R/matrix-lapack-error4.RData /.csv Operating System: Debian 8
2008 Jul 03
1
Bug#489106: xen-unstable: FTBFS: *** check_openssl_devel FAILED: missing openssl headers
Package: xen-unstable Version: 3.3-unstable+hg17879-1 Severity: serious User: debian-qa at lists.debian.org Usertags: qa-ftbfs-20080702 qa-ftbfs Justification: FTBFS on i386 Hi, During a rebuild of all packages in sid, your package failed to build on i386. Relevant part: > make[5]: Entering directory
2006 Nov 13
2
Bug#398372: xen-utils-common: installation fails: ln: creating symbolic link `/etc/udev/rules.d/z60_xen-backend.rules' to `../xen-backend.rules': No such file or directory
Package: xen-utils-common Version: 3.0.3-0-1 Severity: serious Justification: makes package uninstallable Usertags: grid5000 Hi, During a piuparts run over all the packages in etch, I ran into a problem with your package: Setting up xen-utils-common (3.0.3-0-1) ... ln: creating symbolic link `/etc/udev/rules.d/z60_xen-backend.rules' to `../xen-backend.rules': No such file or directory
2011 Mar 13
1
Bug#618218: xen: FTBFS: make[3]: ps2pdf: Command not found
Source: xen Version: 4.0.1-2 Severity: serious Tags: wheezy sid User: debian-qa at lists.debian.org Usertags: qa-ftbfs-20110313 qa-ftbfs Justification: FTBFS on amd64 Hi, During a rebuild of all packages in sid, your package failed to build on amd64. Relevant part: > make[3]: Entering directory `/build/user-xen_4.0.1-2-amd64-2x64p6/xen-4.0.1/debian/build/build-docs/docs' > latex
2008 Jul 10
11
Xen status in lenny?
Hi, AFAIK, the status of Xen in lenny is currently the following: - no dom0 kernel - domU kernel only for i386 (no domU kernel for amd64) I was told (I don't remember where) that this is because the vanilla kernel only supports domU for i386, and has no dom0 support, so distros have to port the patches to their kernels (please correct me if I'm wrong). However: - etch shipped with dom0
2009 Jul 01
1
Processed: tagging as pending bugs that are closed by packages in NEW
Processing commands for control at bugs.debian.org: > # Wed Jul 1 08:03:27 UTC 2009 > # Tagging as pending bugs that are closed by packages in NEW > # http://ftp-master.debian.org/new.html > # > # Source package in NEW: xen-3 > tags 490409 + pending Bug#490409: CVE-2008-2004: privilege escalation Tags were: patch security Tags added: pending > # Source package in NEW:
2007 Sep 18
0
Bug#443024: xen-3: FTBFS: xc_core.c:195: warning: assuming signed overflow does not occur when assuming that (X + c) < X is always false
Package: xen-3 version: 3.1.0-2 Severity: serious User: debian-qa at lists.debian.org Usertags: qa-ftbfs-20070917 qa-ftbfs Justification: FTBFS on i386 Hi, During a rebuild of all packages in sid, your package failed to build on i386. Relevant part: make[5]: Entering directory `/build/user/xen-3-3.1.0/debian/build/build-utils_i386/tools/libxc' gcc -O2 -fomit-frame-pointer -m32 -march=i686
2008 Jul 12
3
Bug#490409: CVE-2008-2004: privilege escalation
Package: xen-3 Severity: grave Tags: security Justification: user security hole Hi, the following CVE (Common Vulnerabilities & Exposures) id was published for xen-3. CVE-2008-2004[0]: | The drive_init function in QEMU 0.9.1 determines the format of a raw | disk image based on the header, which allows local guest users to read | arbitrary files on the host by modifying the header to identify
2014 Dec 16
0
BLAS/LAPACK routine 'DLASCL' gave error code -4 in liblapack3 Version 3.5.0
Dear Madlene, while this list serves as a forum for discussions about R backports present on CRAN, this would be something preferably filed in the Debian bug tracking system bts.debian.org - could you file a bug there? But please don't ask me on which package - maybe Dirk has a good answer to that one... Cheers, Johannes P.S.: https://www.debian.org/Bugs/Reporting Am Dienstag, 16.
2008 Sep 10
2
Bug#490409: xen-3: diff for NMU version 3.2.1-2.1
tags 490409 + patch thanks Hi, The following is the diff for my xen-3 3.2.1-2.1 NMU. It incorporates three patches from upstream and aims to fix CVE-2008-2004 aka #490409. It is not yet tested much, I would appreciate if interested parties could give it a try. I'll upload in due course. Kind regards T. diff -u xen-3-3.2.1/debian/control.md5sum xen-3-3.2.1/debian/control.md5sum ---
2006 Nov 21
1
Bug#399700: FTBFS, build-deps on linux-support-2.6.17-2
Package: xen-unstable Version: 3.0-unstable+hg11561-1 Severity: serious Build-depends on linux-support-2.6.17-2, which is no longer available in sid. -- Stephen R. Marenka If life's not fun, you're not doing it right! <stephen@marenka.net> -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: application/pgp-signature Size: