similar to: Bug#1036475: unblock: xen/4.17.1+2-gb773c48e36-1

Displaying 20 results from an estimated 400 matches similar to: "Bug#1036475: unblock: xen/4.17.1+2-gb773c48e36-1"

2023 Jul 05
0
Processed: user debian-qa@lists.debian.org, found 986475 in 4.1.9-1, found 1036601 in 4.17.1+2-gb773c48e36-1 ...
Processing commands for control at bugs.debian.org: > user debian-qa at lists.debian.org Setting user to debian-qa at lists.debian.org (was anbe at debian.org). > found 986475 4.1.9-1 Bug #986475 [libocamlnet-ocaml-doc] libocamlnet-ocaml-doc: broken symlinks: /usr/share/doc/libocamlnet-ocaml-dev/examples -> ../libocamlnet-ocaml-doc/examples Marked as found in versions ocamlnet/4.1.9-1.
2023 May 24
0
xen 4.17.1+2-gb773c48e36-1 MIGRATED to testing
FYI: The status of the xen source package in Debian's testing distribution has changed. Previous version: 4.17.0+74-g3eac216e6e-1 Current version: 4.17.1+2-gb773c48e36-1 -- This email is automatically generated once a day. As the installation of new packages into testing happens multiple times a day you will receive later changes on the next day. See
2012 Aug 29
0
Bug#686199: unblock: xen-api/1.3.2-11
Package: release.debian.org Severity: normal User: release.debian.org at packages.debian.org Usertags: unblock Hi, Please unblock package xen-api. The PAM fix which we did for version 1.3.2-10 wasn't correct, and thanks to the help of Steve Langasek, we have it in a good shape now. The details of the conversation is available in the Ubuntu BTS here:
2013 Mar 06
3
unblock: xcp-xapi - urgent documentation fixes
Package: release.debian.org Severity: normal The current README.Debian is quite old It gives some advice that will lead to people having a broken system (e.g. no networking). It describes a procedure for configuring networking that is completely opposite to what has been described more recently on the upstream mailing list http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=702337 I'm happy
2012 Nov 18
0
Bug#693611: unblock: xen-api/1.3.2-13
Package: release.debian.org Severity: normal User: release.debian.org at packages.debian.org Usertags: unblock Hi, I have uploaded xen-api/1.3.2-13, which corrects 2 things: the hostname change script was designed by CentOS, so I've fixed that, and also, the init script was hanging waiting forever if the xen-api host was a slave node, so I added a test in the init script, thanks to a patch
2023 Jul 20
3
Bug#1041533: xen-system-amd64: Xen fails to start hvm type VMs when a vncpasswd is set
Package: xen-system-amd64 Version: 4.17.1+2-gb773c48e36-1 Severity: important Dear Maintainer, after upgrading my bullseye server to bookworm I ran into the issue that all VMs of type hvm are not starting anymore. xl throws an error: libxl: error: libxl_qmp.c:1399:qmp_ev_fd_callback: Domain 8:error on QMP socket: Connection reset by peer libxl: error: libxl_qmp.c:1438:qmp_ev_fd_callback: Domain
2023 Jul 26
2
Bug#1042102: xen FTBFS with gcc 13
Source: xen Version: 4.17.1+2-gb773c48e36-1 Severity: serious Tags: ftbfs trixie sid Forwarded: https://github.com/xen-project/xen/commit/99a9c3d7141063ae3f357892c6181cfa3be8a280 https://tests.reproducible-builds.org/debian/rb-pkg/unstable/amd64/xen.html ... xg_offline_page.c: In function 'backup_ptes': xg_offline_page.c:191:13: error: pointer 'orig' may be used after
2016 Jan 19
0
Bug#805508: Bug#805508: Bug#805508: Bug#805508: Bug#805508: xen: Unable to create HVM domUs
On Tue, 2016-01-19 at 10:39 +0000, Ian Campbell wrote: > On Thu, 2015-11-26 at 15:16 +0000, Ian Campbell wrote: > > anything better would need to be arranged upstream. > > http://xenbits.xen.org/gitweb/?p=xen.git;a=commit;h=de858271c16851d662b26 > 13 > 699401df6ecec8ef8 has now landed upstream, which allows the leaf dir to > be > set at configure time and therefore
2023 Aug 26
0
xen 4.17.2-1 MIGRATED to testing
FYI: The status of the xen source package in Debian's testing distribution has changed. Previous version: 4.17.1+2-gb773c48e36-1 Current version: 4.17.2-1 -- This email is automatically generated once a day. As the installation of new packages into testing happens multiple times a day you will receive later changes on the next day. See https://release.debian.org/testing-watch/ for
2017 May 04
2
Bug#861660: Xen package security updates for jessie 4.4, XSA-213, XSA-214
Moritz Muehlenhoff writes ("Re: Xen package security updates for jessie 4.4, XSA-213, XSA-214"): > On Thu, May 04, 2017 at 05:59:18PM +0100, Ian Jackson wrote: > > Should I put jessie-security in the debian/changelog and dgit push it > > (ie, from many people's pov, dput it) ? > > Yes, the distribution line should be jessie-security, but please send > a
2012 Oct 24
1
Upload of fixes for xen-api
Dear release team, I would like update the Wheezy package of xen-api with numerous small fixes. These aren't RC bugs, but I believe they are all worth fixing. I believe that the most important one to fix is #682202. Here's the changelog: * Fixes bashism in install-debian-pv.sh (Closes: #690612). * Fixes bashism in interface-visualise (Closes: #690710). * The /etc/init.d/xcp-squeezed
2016 Jan 19
2
Bug#805508: Bug#805508: Bug#805508: Bug#805508: xen: Unable to create HVM domUs
On Thu, 2015-11-26 at 15:16 +0000, Ian Campbell wrote: > anything better would need to be arranged upstream. http://xenbits.xen.org/gitweb/?p=xen.git;a=commit;h=de858271c16851d662b2613 699401df6ecec8ef8 has now landed upstream, which allows the leaf dir to be set at configure time and therefore allows the packaging to avoid patching some stuff. HVM guests have been broken in Stretch for ages
2002 Jun 11
0
[Bug 271] New: SSHD should unblock SIGCHLD - POSIX signal blocks survive exec()
http://bugzilla.mindrot.org/show_bug.cgi?id=271 Summary: SSHD should unblock SIGCHLD - POSIX signal blocks survive exec() Product: Portable OpenSSH Version: -current Platform: Other OS/Version: other Status: NEW Severity: enhancement Priority: P2 Component: sshd AssignedTo:
2008 Oct 23
2
Unblock the websites you love!
Are you tired of being in your highschool/university classroom or at work and not being able to visit the website you want? With sfsf loan you can now unblock popular social networking sites such as Myspace, Bebo, Facebook and many other sites. Don’t give yourself a heart attack worrying about being caught surfing the sites you want at work! Use sfsf loan and your ip cannot be monitored! Get on
2013 Oct 17
0
Processed: unblock 718767 with 710650
Processing commands for control at bugs.debian.org: > unblock 718767 with 710650 Bug #718767 [release.debian.org] transition: ocaml 4.00.1 718767 was blocked by: 726010 710650 718767 was not blocking any bugs. Removed blocking bug(s) of 718767: 710650 > thanks Stopping processing here. Please contact me if you need assistance. -- 718767:
2003 Jan 07
0
[Bug 271] SSHD should unblock SIGCHLD - POSIX signal blocks survive exec()
http://bugzilla.mindrot.org/show_bug.cgi?id=271 ------- Additional Comments From djm at mindrot.org 2003-01-07 18:13 ------- We already reset SIGCHLD to SIG_DFL in main(), maybe we don't do it early enough... ------- You are receiving this mail because: ------- You are the assignee for the bug, or are watching the assignee.
2003 May 16
0
[Bug 271] SSHD should unblock SIGCHLD - POSIX signal blocks survive exec()
http://bugzilla.mindrot.org/show_bug.cgi?id=271 ------- Additional Comments From djm at mindrot.org 2003-05-16 13:29 ------- Could you verify this with a recent version, preferably including diag output. ------- You are receiving this mail because: ------- You are the assignee for the bug, or are watching the assignee.
2017 Jun 10
1
[PATCH] lib: direct, uml: Unblock SIGTERM in the hypervisor and recovery processes (RHBZ#1460338).
If SIGTERM is blocked in the main program, then it ends up still being blocked in the subprocess after we fork. This means that we cannot kill qemu by sending SIGTERM to it. This commit fixes the problem by unblocking SIGTERM unconditionally after fork. Thanks: wtfuzz on IRC for reporting and analysis. --- lib/launch-direct.c | 15 +++++++++++++++ lib/launch-uml.c | 11 +++++++++++ 2 files
2015 Jan 22
1
Ubuntu delta against 4.5.0-1 in experimental for disussion
On Thu, 2015-01-22 at 16:08 +0100, Stefan Bader wrote: > On 22.01.2015 13:02, Stefan Bader wrote: > > Hi, > > > > I just finished preparing the Xen-4.5 merge from experimental into our next > > release (Vivid/15.04). And something I actually should have done since the 4.4 > > times is to report back the delta I have in case there are things Debian might > >
2012 Sep 06
1
Fwd: [Xen-announce] Xen Security Advisory 19 - guest administrator can access qemu monitor console
Hi everyone at the security team, I'd like to upload an update of xen-qemu-dm-4.0 in Squeeze. Below is the Xen Security Advisory as I received it, attached is the patch that they provided. Both the debdiff and the updated packages are available in here: http://archive.gplhost.com/pub/security/xen-qemu-dm-4.0/ Please allow me to upload this fix. If you wish, I can prepare a DSA as well (but