The following Fedora EPEL 8 Security updates need testing:
Age URL
4 https://bodhi.fedoraproject.org/updates/FEDORA-EPEL-2022-47a8accb45
trafficserver-9.1.4-1.el8
1 https://bodhi.fedoraproject.org/updates/FEDORA-EPEL-2022-5564c168f5
w3m-0.5.3-58.git20220429.el8
The following
The following Fedora EPEL 7 Security updates need testing:
Age URL
4 https://bodhi.fedoraproject.org/updates/FEDORA-EPEL-2022-8362ddfe7c
trafficserver-9.1.4-1.el7
1 https://bodhi.fedoraproject.org/updates/FEDORA-EPEL-2022-65548d9891
w3m-0.5.3-58.git20220429.el7
The following
The following Fedora EPEL 9 Security updates need testing:
Age URL
4 https://bodhi.fedoraproject.org/updates/FEDORA-EPEL-2022-53c9c8c84a
trafficserver-9.1.4-1.el9
1 https://bodhi.fedoraproject.org/updates/FEDORA-EPEL-2022-e4e5ecabcf
w3m-0.5.3-58.git20220429.el9
The following
https://bugzilla.redhat.com/show_bug.cgi?id=2153171
Fedora Update System changed:
What|Removed |Added
Fixed In Version|perl-DateTime-TimeZone-2.57 |perl-DateTime-TimeZone-2.57
https://bugzilla.redhat.com/show_bug.cgi?id=2156168
Bug ID: 2156168
Summary: perl-ExtUtils-Install-2.22 is available
Product: Fedora
Version: rawhide
Status: NEW
Component: perl-ExtUtils-Install
Keywords: FutureFeature,
* Vít Ondruch:
> Working with upstream on one issue [1], it seems that the culprit is in
> the Fedora compiler options. Is there some convenient way to set them
> up? Of course I can copy them from log, or somehow put together from the
> RPM macros, but I'd appreciate if there was some easier
> On Tue, 2022-02-08 at 15:12 -0500, Adam Jackson wrote:
>
> X Display Manager with support for XDMCP, host chooser
>
> what are the alternatives of "Display Manager" ? and "with support for
> XDMCP" ? only gdm ?
>
> And xdm is not abandoned https://gitlab.freedesktop.org/xorg/app/xdm ,
>
On Tue, 2022-02-08 at 15:12 -0500, Adam Jackson wrote:
> xorg-x11-xdm
X Display Manager with support for XDMCP, host chooser
what are the alternatives of "Display Manager" ? and "with support for
XDMCP" ? only gdm ?
And xdm is not abandoned https://gitlab.freedesktop.org/xorg/app/xdm ,
maybe
> On 12/22/22 15:39, Lennart Poettering wrote:
>
>
>
> Well, the thing with a chain of trust is the fact that the only chain
> the user can trust is the one that he himself or the host device he owns
> and operates generated that trust of chain, from link 0 in that chain. (
> And we all know
OLD: Fedora-Rawhide-20221223.n.0
NEW: Fedora-Rawhide-20221224.n.0
= SUMMARY =
Added images:0
Dropped images: 1
Added packages: 0
Dropped packages:2
Upgraded packages: 39
Downgraded packages: 0
Size of added packages: 0 B
Size of dropped packages:26.30 MiB
On 12/22/22 15:39, Lennart Poettering wrote:
Well, the thing is: a chain of trust is a*chain*, hence you must
ultimately hook validation to what the firmware provides you with as
root. And that ultimately is the SecureBoot db on commodity hardware.
Well, the thing with a chain of trust is
11 matches
Mail list logo