Re: Good for Huawei
Because NAT is a kludge that breaks many things (eg, SIP), unless you use yet even more kludges (STUN).
11 publicly visible posts • joined 2 Jul 2024
Uh, no. WSL1 was another NT “personality” that basically just performed Linux syscall emulation. It ran directly as part of the NT kernel.
WSL2 just uses a slimmed down Hyper-V for the most part, so it’s a VM using VT-x/SVM.
WSL1 was more performant, but required more work on MS’s part to keep the syscall emulation up to date with newer Linux kernels. It also meant that not every Linux kernel feature was available (cgroups, etc). It’s also why WSL1 worked on machines without hardware-assisted virtualization.
Oracle Linux has always used upstream Red Hat SRPMs, it has never been based on CentOS, ever.
There's both a plus and a negative to Oracle Linux: They actually fix bugs that Red Hat doesn't, especially in the toolchain (gcc, binutils, libc). The plus is that bugs are fixed, the negative is that it means it is no longer 100% bug-for-bug compatible with RHEL. Is this normally a problem? No, but for some people it might be.
True about the import.
As for the place in the wrong location, did you use the prominent "Report a Problem" option? It's pretty quick to fill out, drop the pin where it really it, and hit submit. They usually get fixed fast.
Apple Maps added offline maps not too long ago, so you can do the same download of map data ahead of time for places with no mobile coverage.
Actually, no, RHEL9 and CentOS 9 Stream are NOT patched, I just checked. In fact, the RHEL9 package hasn't been updated since April and the CentOS 9 Stream package was updated a month ago. So there's no way they're patched.
Your "yum" command is invalid and will produce a list of every available package. the dnf man page straight out says:
--cve=<cves>, --cves=<cves>
Include packages that fix a CVE (Common Vulnerabilities and Ex‐
posures) ID (http://cve.mitre.org/about/), Eg. CVE-2201-0123.
Applicable for the install, repoquery, updateinfo, upgrade and
offline-upgrade (dnf-plugins-core) commands.
Notice 'list' isn't listed.
# dnf repoquery --cve=CVE-2024-6387
Will return.. nothing