On Wed, Nov 25, 2009 at 06:03:48PM +0100, Eric Doutreleau wrote:
i m trying to setup sssd on a fedora 12 machine
i m carefully following the instructions of this page
https://fedorahosted.org/sssd/wiki/HOWTO_Configure
then i m trying to configure the LOCAL provider.
[snip]
i look in the
On Fri, Aug 14, 2009 at 10:38:58AM +0100, Andrew Haley wrote:
Kevin Kofler wrote:
We need to provide architectural defaults for plain i686, even crappy
ones, they just need to work at all.
I think there's a valid case for making an exception to this: when a
package is an accelerated
On Wed, Jul 01, 2009 at 11:52:20AM +0200, Stepan Kasal wrote:
IOW, what's Fedora good for after its EOL? If it is a museum
artifact, then I'm spoiling the game. If it is to be used in real
life, then update to Automake 1.11 is beneficial for the developers
using it and harmless for the
On Fri, Jun 19, 2009 at 09:38:54PM -0400, Braden McDaniel wrote:
Okay... My problem was the firewall on the server.
Is my only option to disable the firewall completely?
Hopefully not. The ypserv(8) man page notes that it takes a -p option
which lets you specify which port it binds to. The
On Wed, Feb 04, 2009 at 09:39:07AM +1100, Oscar Plameras wrote:
1. System1 - I had 3 test servers running OpenLDAP-2.3.30-3.fc6,
OpenSSL-0.9.8b-15.fc6 on Linux-2.6.22.14-72.fc6.
And these were perfectly running with OPENSSL configured on
'slapd.conf' as follows:
lines cut
#
#
:
This is a re-issue of the testing update, this time signed
with the testing key. Sorry for the multiple-releases.
-
* Tue Apr 11 2006 Nalin Dahyabhai [EMAIL PROTECTED] - 1.4.3-2
- apply patch from David Shaw to try multiple
as if it had been signed. The Common Vulnerabilities and
Exposures project assigned the name CVE-2006-0049 to this issue.
-
* Fri Mar 10 2006 Nalin Dahyabhai [EMAIL PROTECTED] - 1.4.2.2-1
- update to 1.4.2.2 to fix detection of unsigned
:
The previous update, to version 1.4.2.1, could produce
errors when gpg attempted to read certain keyrings produced
by earlier versions of GnuPG. This update includes a fix
for that bug.
-
* Mon Feb 20 2006 Nalin Dahyabhai [EMAIL
to this function, its stack may become corrupted.
This update backports the fix from imap-2004g which resolves
this issue.
-
* Wed Nov 23 2005 Nalin Dahyabhai [EMAIL PROTECTED] 2002e-13
- apply fix for CVE-2005-2933: buffer overflow