An important question wich have been on my mind for a long time

2005-12-14 Thread Thomas Skybakmoen
Why is there so much more security patches in the redhat kernel, compare here:

http://cve.mitre.org/cgi-bin/cvekey.cgi?keyword=redhat+kernel

http://cve.mitre.org/cgi-bin/cvekey.cgi?keyword=debian+kernel

when alot of the advisories seems to be affect debian as well?

Is it up to the wendor to see if this affeft it`s distro or does CVE do that?

Or look at Ubuntu wich I guess will have more or less same kernel source:

http://www.ubuntulinux.org/usn/usn-219-1
http://www.ubuntulinux.org/usn/usn-199-1
http://www.ubuntulinux.org/usn/usn-187-1
http://www.ubuntulinux.org/usn/usn-178-1
http://www.ubuntulinux.org/usn/usn-169-1
http://www.ubuntulinux.org/usn/usn-143-1
http://www.ubuntulinux.org/usn/usn-137-1
http://www.ubuntulinux.org/usn/usn-131-1
http://www.ubuntulinux.org/usn/usn-110-1
http://www.ubuntulinux.org/usn/usn-103-1

Can someone give me an answear on this?
For to me it seems that CVE lists if there are an security issue, and it`s up to the vendor to see if it affects em...

Regards

Thomas Skybakmoen


Bug#343302: initramfs-tools: should not regenerate images on upgrade

2005-12-14 Thread David Härdeman
Package: initramfs-tools
Severity: important

The latest version of initramfs-tools (0.44) calls update-initramfs in
postinst to regenerate the latest initramfs on upgrades (see initramfs-tools
changelog, version 0.40ubuntu6).

This can be potentially very dangerous if the newer initramfs-tools for some
reason generates unbootable images as all images will be replaced with
unbootable ones (meaning that even older kernels kept in /boot as a fallback
solution might fail).

For instance, earlier combinations of initramfs-tools and udev automatically
loaded the ide-disk module for me. 0.44 doesn't and since it replaced all
initramfs-images without warning, none of my kernels boot (ok, it was simple
to fix, insmod the module, resume boot, then fix the error and regenerate the
images).

I think the auto-regereration should:
o be reverted; or
o carry a big warning; or
o be configurable

Regards,
David



-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



RE: Please Build 2.4.27-12 for Sid

2005-12-14 Thread Andree Leidenfrost
Hi Simon

 2.4.27-12 has been released into sid, this is a call to rebuild for 
 all the different architectures. So far it is only available for i386
 (which I built). I'll get powerpc rolling, I had mistakenly thought it
 was removed from Sid. Perhaps it should be, we can address that
 another day.

 I'm happy to do some more builds, but doing all of them is a little
 daunting.

 http://people.debian.org/~dannf/kernel-stats/kernel-avail.html

 Also, if an arch should not be built lets start a list.

Hm, I'm not sure whether I'm overlooking something here, but I don't think
that kernel-tree-2.4.27-12 nor kernel-source-2.4.27-12 are actually in the
archive.

As I am actually waiting for the latter to show up to be able to fix
#336277, I'm eagerly awaiting your response.

 -- 
 Horms

Cheers
Andree
-- 
Andree Leidenfrost
Sydney - Australia



signature.asc
Description: This is a digitally signed message part


Re: linux-source-2.6.15 (2.6.14+2.6.15-rc5-0experimental.1) and bcm43xx

2005-12-14 Thread Otavio Salvador
Michael Schmitz [EMAIL PROTECTED] writes:

 Thanks. But the vanilla kernel-2.6.15-rc5 has not this problem.

 Confirmed. So we conclude linux-source-2.6.15 is broken.

No. We concluded that linux-source-2.6.15 has a patch that broke
it. I'm adding Debian kernel Team on CC for reference.

-- 
O T A V I OS A L V A D O R
-
 E-mail: [EMAIL PROTECTED]  UIN: 5906116
 GNU/Linux User: 239058 GPG ID: 49A5F855
 Home Page: http://www.freedom.ind.br/otavio
-
Microsoft gives you Windows ... Linux gives
 you the whole house.


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Re: Please Build 2.4.27-12 for Sid

2005-12-14 Thread Sven Luther
On Wed, Dec 14, 2005 at 10:57:49AM +0900, Horms wrote:
 2.4.27-12 has been released into sid, this is a call to rebuild for all
 the different architectures. So far it is only available for i386 (which
 I built). I'll get powerpc rolling, I had mistakenly thought it was
 removed from Sid. Perhaps it should be, we can address that another day.

only the nubus kernel is still available in sid for powerpc, and as long as
there is no 2.6 port, it will have to stay. It is a not officially supported
subarch though, and has a very minot userbase (like you can probably count
them on your fingers), so it is not high priority.

Friendly,

Sven Luther


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Re: Please Build 2.4.27-12 for Sid

2005-12-14 Thread Thiemo Seufer
Horms wrote:
 2.4.27-12 has been released into sid, this is a call to rebuild for all
 the different architectures. So far it is only available for i386 (which
 I built). I'll get powerpc rolling, I had mistakenly thought it was
 removed from Sid. Perhaps it should be, we can address that another day.
 
 I'm happy to do some more builds, but doing all of them is a little
 daunting.

Unfortunately I don't have time for mips/mipsel kernels the next days
(and not even a way to test them).


Thiemo


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Bug#343048: Additional information

2005-12-14 Thread Curt Howland
Suggest merge with #343042, it seems this is happening to lots of 
people.

I attempted the fix mentioned in #343042, adding MODULE ide-generic 
and MODULE ide-disk to /etc/haird/Default.cfg, and running yaird -v 
-o /boot/initrd.img-2.6.14-2-686 2.6.14-2-686, but the same error 
occured. I have not yet downgraded yaird.

Curt-

-- 
September 11th, 2001
The proudest day for gun control and central 
planning advocates in American history



-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Bug#330664: Bug still pending - cont give more info ATM ...

2005-12-14 Thread DEMAINE Benoit-Pierre
I did not forget that bug; and I would like to solve it ASAP.

- it seems to me that my bug is not generic to the Debian-Alpha-SMP kernels, but
rather directly to all
Linux-SMP due to a likely bug in the PCI device Qlogick 4010 (scsi card)
with some module like
qlasomething

I think about that because all Gentoo SMP kernels 2.6 also hang on Alpha, and 
also
'ANY' SMP kernel in x86 when I insert that PCI card in my computer (either 
kernel
hand build, Debian, Gentoo) (only SMP kernel, whatever there are 1 or many 
CPUs, SMP
kernels only - does not hang with non SMP kernels on multi CPU computers )

Thats the actual way I am working ...

but, before confirming any thing, I need to:
come back home where I have access to suffisant hardware (SMP x86 and alpha 
box, the
faulty QLA, compile SMP and non SMP kernels for all of theose box, greb my 
serial
cable to dumps Linux logs, and most difficult: boot my Alpha systems on the 
required
SCSI drives but without having to use the QLA board !!!)

practical infos and relevant test are coming quiet late because it takes ages to
perform enough cross tests ...
(especially when you have only one CPU running on a quadri MB to compile stuff)

* I am not forgetting that I opened a CRITICAL bug. *

Note: qla driver is loaded by busy box in ramdisk on Debian, when I need to do 2
tests on Gentoo to help debing the Debian problem:
- boot scsi with non QLA driver
- boot scsi with non QLA driver, then load the qla driver with hardware NOT 
present
- boot scsi with non QLA driver, with QLA hardware present but no driver
- boot scsi with non QLA driver, with QLA hardware present, and load driver 
manually
(disable udev)
- boot scsi with QLA driver build static

(in case some one have time to perform those tests before me)

apart from the fact I could use hand made kernel under Debian, I am not able 
ATM to
ask the Debian kernels not to use busybox and/or udev at boot time (those 
fitting
the ramdisk).

Thats why I need to try hand made kernel with Debian, then Gentoo, with both 
udev
desactivated, and see whats up when loading the QLA driver manually.

A kernel bug /should/ be distribution independant, and  should not tell about 
Gentoo
in Debian BTS ... I know. But some times, it is faster using an alternate 
distro to
try fast tests than finding out 'who to desactivate that feature' n a given 
distro.

Logging that is also slown down with 2 other bugs I am having with the Linux 
kernel
on my machines. Sorry.

-- 
DEMAINE Benoit-Pierre (aka DoubleHP ) http://www.demaine.info/
\_o If computing were an exact science, IT engineers would not have work o_/


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Bug#342562: not in sid

2005-12-14 Thread dann frazier
On Wed, 2005-12-14 at 10:41 -0500, Rich Johnson wrote:
 On Dec 12, 2005, at 1:13 PM, dann frazier wrote:
 
  You are trying to build 2.6.8 with gcc 4.  2.6.8 isn't in sid and  
  gcc 4
  isn't in sarge.  Closing.
 
  If you want to build this on sid anyway, try setting CC to gcc-3.3 in
  your kernel Makefile.
 
 Acknowleged, butshouldn't some utility like autoconfig or  apt- 
 get builddep be sorting this out?

If it was still in sid, yes.  But since this package is not in sid,
there's no vehicle to add that.

If a non-security update is ever allowed in sarge, there's a pending
patch to hardcode it to use gcc 3; but I wouldn't count on that
happening anytime soon.

-- 
dann frazier [EMAIL PROTECTED]



-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Bug#343363: package linux-image-2.6.14-2-686 won't install due to a post-installation script error.

2005-12-14 Thread Andrea Franzese
Package: linux-image-2.6.14-2-686
Version: 2.6.14-5
Severity: grave
Justification: renders package unusable

Installing (or upgrading) the package linux-image-2.6.14-2-686 the
post-installation script returns error code 128.


Configuro linux-image-2.6.14-2-686 (2.6.14-5) ...
Running depmod.
Finding valid ramdisk creators.
Using mkinitrd.yaird to build the ramdisk.
Running postinst hook.
Searching for GRUB installation directory ... found: /boot/grub
dpkg: errore processando linux-image-2.6.14-2-686 (--configure):
 il sottoprocesso post-installation script ha restituito un codice di
 errore 128


Problem cannot be fixed running apt-get install -f, and/or dpkg
--configure -a.

Trying to remove the package (not fully configurated) is the
post-removal script that returns error code 128.

-- System Information:
Debian Release: testing/unstable
  APT prefers unstable
  APT policy: (500, 'unstable'), (500, 'stable'), (1, 'experimental')
Architecture: i386 (i686)
Shell:  /bin/sh linked to /bin/bash
Kernel: Linux 2.6.14-1-686
Locale: [EMAIL PROTECTED], [EMAIL PROTECTED] (charmap=UTF-8)

Versions of packages linux-image-2.6.14-2-686 depends on:
ii  module-init-tools 3.2.2-1tools for managing Linux kernel mo
ii  yaird [linux-initramfs-tool]  0.0.12-1   Yet Another mkInitRD

Versions of packages linux-image-2.6.14-2-686 recommends:
pn  libc6-i686none (no description available)

-- debconf information:
  linux-image-2.6.14-2-686/preinst/initrd-2.6.14-2-686:
  linux-image-2.6.14-2-686/preinst/bootloader-initrd-2.6.14-2-686: true
  linux-image-2.6.14-2-686/postinst/old-system-map-link-2.6.14-2-686: true
  linux-image-2.6.14-2-686/preinst/failed-to-move-modules-2.6.14-2-686:
  linux-image-2.6.14-2-686/preinst/elilo-initrd-2.6.14-2-686: true
  linux-image-2.6.14-2-686/preinst/abort-install-2.6.14-2-686:
  linux-image-2.6.14-2-686/preinst/lilo-initrd-2.6.14-2-686: true
  linux-image-2.6.14-2-686/postinst/depmod-error-2.6.14-2-686: false
  linux-image-2.6.14-2-686/postinst/bootloader-test-error-2.6.14-2-686:
  linux-image-2.6.14-2-686/postinst/bootloader-error-2.6.14-2-686:
  linux-image-2.6.14-2-686/preinst/abort-overwrite-2.6.14-2-686:
* linux-image-2.6.14-2-686/preinst/already-running-this-2.6.14-2-686:
  linux-image-2.6.14-2-686/preinst/lilo-has-ramdisk:
  linux-image-2.6.14-2-686/postinst/create-kimage-link-2.6.14-2-686: true
  linux-image-2.6.14-2-686/postinst/depmod-error-initrd-2.6.14-2-686: false
  linux-image-2.6.14-2-686/postinst/old-dir-initrd-link-2.6.14-2-686: true
  linux-image-2.6.14-2-686/prerm/would-invalidate-boot-loader-2.6.14-2-686: true
* linux-image-2.6.14-2-686/preinst/overwriting-modules-2.6.14-2-686: false
  linux-image-2.6.14-2-686/postinst/kimage-is-a-directory:
  linux-image-2.6.14-2-686/prerm/removing-running-kernel-2.6.14-2-686: true
  linux-image-2.6.14-2-686/postinst/old-initrd-link-2.6.14-2-686: true


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



bigphysarea patch for 2.6

2005-12-14 Thread Ryan Underwood

Hello.

Would it be possible to include the bigphysarea patch in Debian 2.6
kernels, and enable it by default?  It is necessary for hardware which
has large DMA buffers and which does not support scatter-gather DMA.
Example: Zoran ZR36067.  It also does not bother anything else by being
enabled since its memory must be reserved by a boot parameter.

I don't know who is officially maintaining the patch, but I used this
particular one with 2.6.14:
http://pv105234.reshsg.uci.edu/~jfeise/Downloads/zr36120/

This patch has been around for a long time, and I have no idea the
reasons why it has not been merged in the mainline kernel.

Please Cc: on reply.

-- 
Ryan Underwood, [EMAIL PROTECTED]


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Bug#343363: package linux-image-2.6.14-2-686 won't install due to a post-installation script error.

2005-12-14 Thread Maximilian Attems
reassign 343363 kernel-package
stop

On Wed, Dec 14, 2005 at 07:33:56PM +0100, Andrea Franzese wrote:
 Package: linux-image-2.6.14-2-686
 Version: 2.6.14-5
 Severity: grave
 Justification: renders package unusable
 
 Installing (or upgrading) the package linux-image-2.6.14-2-686 the
 post-installation script returns error code 128.
 
 
 Configuro linux-image-2.6.14-2-686 (2.6.14-5) ...
 Running depmod.
 Finding valid ramdisk creators.
 Using mkinitrd.yaird to build the ramdisk.
 Running postinst hook.
 Searching for GRUB installation directory ... found: /boot/grub
 dpkg: errore processando linux-image-2.6.14-2-686 (--configure):
  il sottoprocesso post-installation script ha restituito un codice di
  errore 128
 
 
 Problem cannot be fixed running apt-get install -f, and/or dpkg
 --configure -a.
 
 Trying to remove the package (not fully configurated) is the
 post-removal script that returns error code 128.

the severity might be a bit exagerated.
Manoj that was the error we discussed on irc a while ago,
thus reassigning.

regards

-- 
maks



-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Processed: Re: Bug#343363: package linux-image-2.6.14-2-686 won't install due to a post-installation script error.

2005-12-14 Thread Debian Bug Tracking System
Processing commands for [EMAIL PROTECTED]:

 reassign 343363 kernel-package
Bug#343363: package linux-image-2.6.14-2-686 won't install due to a 
post-installation script error.
Bug reassigned from package `linux-image-2.6.14-2-686' to `kernel-package'.

 stop
Stopping processing here.

Please contact me if you need assistance.

Debian bug tracking system administrator
(administrator, Debian Bugs database)


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Processing of kernel-image-2.4.27-alpha_2.4.27-10sarge1_alpha.changes

2005-12-14 Thread Archive Administrator
kernel-image-2.4.27-alpha_2.4.27-10sarge1_alpha.changes uploaded successfully 
to localhost
along with the files:
  kernel-image-2.4.27-alpha_2.4.27-10sarge1.dsc
  kernel-image-2.4.27-alpha_2.4.27-10sarge1.tar.gz
  kernel-headers-2.4.27-2_2.4.27-10sarge1_alpha.deb
  kernel-headers-2.4.27-2-generic_2.4.27-10sarge1_alpha.deb
  kernel-image-2.4.27-2-generic_2.4.27-10sarge1_alpha.deb
  kernel-headers-2.4.27-2-smp_2.4.27-10sarge1_alpha.deb
  kernel-image-2.4.27-2-smp_2.4.27-10sarge1_alpha.deb
  kernel-build-2.4.27-2_2.4.27-10sarge1_alpha.deb

Greetings,

Your Debian queue daemon


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Processing of kernel-image-2.4.27-ia64_2.4.27-10sarge1_ia64.changes

2005-12-14 Thread Archive Administrator
kernel-image-2.4.27-ia64_2.4.27-10sarge1_ia64.changes uploaded successfully to 
localhost
along with the files:
  kernel-image-2.4.27-ia64_2.4.27-10sarge1.dsc
  kernel-image-2.4.27-ia64_2.4.27-10sarge1.tar.gz
  kernel-headers-2.4.27-2_2.4.27-10sarge1_ia64.deb
  kernel-image-2.4-itanium-smp_2.4.27-10sarge1_ia64.deb
  kernel-headers-2.4.27-2-itanium-smp_2.4.27-10sarge1_ia64.deb
  kernel-image-2.4.27-2-itanium-smp_2.4.27-10sarge1_ia64.deb
  kernel-image-2.4-itanium_2.4.27-10sarge1_ia64.deb
  kernel-headers-2.4.27-2-itanium_2.4.27-10sarge1_ia64.deb
  kernel-image-2.4.27-2-itanium_2.4.27-10sarge1_ia64.deb
  kernel-image-2.4-mckinley-smp_2.4.27-10sarge1_ia64.deb
  kernel-headers-2.4.27-2-mckinley-smp_2.4.27-10sarge1_ia64.deb
  kernel-image-2.4.27-2-mckinley-smp_2.4.27-10sarge1_ia64.deb
  kernel-image-2.4-mckinley_2.4.27-10sarge1_ia64.deb
  kernel-headers-2.4.27-2-mckinley_2.4.27-10sarge1_ia64.deb
  kernel-image-2.4.27-2-mckinley_2.4.27-10sarge1_ia64.deb
  kernel-build-2.4.27-2_2.4.27-10sarge1_ia64.deb

Greetings,

Your Debian queue daemon


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Processing of kernel-image-2.4.27-i386_2.4.27-10sarge1_i386.changes

2005-12-14 Thread Archive Administrator
PGP/GnuPG signature check failed on 
kernel-image-2.4.27-i386_2.4.27-10sarge1_i386.changes
gpg: Signature made Wed Aug 17 18:49:36 2005 PDT using DSA key ID 87B1CFB5
gpg: Can't check signature: public key not found
(Exit status 2)
kernel-image-2.4.27-i386_2.4.27-10sarge1_i386.changes has bad PGP/GnuPG 
signature!
Removing kernel-image-2.4.27-i386_2.4.27-10sarge1_i386.changes, but keeping its 
associated files for now.

Greetings,

Your Debian queue daemon


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Processing of kernel-image-2.4.27-sparc_2.4.27-9sarge1_sparc.changes

2005-12-14 Thread Archive Administrator
kernel-image-2.4.27-sparc_2.4.27-9sarge1_sparc.changes uploaded successfully to 
localhost
along with the files:
  kernel-image-2.4.27-sparc_2.4.27-9sarge1.dsc
  kernel-image-2.4.27-sparc_2.4.27-9sarge1.tar.gz
  kernel-headers-2.4.27-2_2.4.27-9sarge1_sparc.deb
  kernel-headers-2.4.27-2-sparc32-smp_2.4.27-9sarge1_sparc.deb
  kernel-image-2.4.27-2-sparc32-smp_2.4.27-9sarge1_sparc.deb
  kernel-headers-2.4.27-2-sparc32_2.4.27-9sarge1_sparc.deb
  kernel-image-2.4.27-2-sparc32_2.4.27-9sarge1_sparc.deb
  kernel-headers-2.4.27-2-sparc64-smp_2.4.27-9sarge1_sparc.deb
  kernel-image-2.4.27-2-sparc64-smp_2.4.27-9sarge1_sparc.deb
  kernel-headers-2.4.27-2-sparc64_2.4.27-9sarge1_sparc.deb
  kernel-image-2.4.27-2-sparc64_2.4.27-9sarge1_sparc.deb
  kernel-build-2.4.27-2_2.4.27-9sarge1_sparc.deb

Greetings,

Your Debian queue daemon


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Processing of kernel-patch-powerpc-2.4.27_2.4.27-10sarge1_powerpc.changes

2005-12-14 Thread Archive Administrator
PGP/GnuPG signature check failed on 
kernel-patch-powerpc-2.4.27_2.4.27-10sarge1_powerpc.changes
gpg: Signature made Wed Aug 17 18:50:26 2005 PDT using DSA key ID 87B1CFB5
gpg: Can't check signature: public key not found
(Exit status 2)
kernel-patch-powerpc-2.4.27_2.4.27-10sarge1_powerpc.changes has bad PGP/GnuPG 
signature!
Removing kernel-patch-powerpc-2.4.27_2.4.27-10sarge1_powerpc.changes, but 
keeping its associated files for now.

Greetings,

Your Debian queue daemon


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Processing of kernel-source-2.4.27_2.4.27-10sarge1_i386.changes

2005-12-14 Thread Archive Administrator
kernel-source-2.4.27_2.4.27-10sarge1_i386.changes uploaded successfully to 
localhost
along with the files:
  kernel-source-2.4.27_2.4.27-10sarge1.dsc
  kernel-source-2.4.27_2.4.27-10sarge1.diff.gz
  kernel-source-2.4.27_2.4.27.orig.tar.gz
  kernel-patch-debian-2.4.27_2.4.27-10sarge1_all.deb
  kernel-doc-2.4.27_2.4.27-10sarge1_all.deb
  kernel-source-2.4.27_2.4.27-10sarge1_all.deb
  kernel-tree-2.4.27_2.4.27-10sarge1_all.deb

Greetings,

Your Debian queue daemon


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Processing of kernel-image-2.6.8-alpha_2.6.8-16sarge1_alpha.changes

2005-12-14 Thread Archive Administrator
kernel-image-2.6.8-alpha_2.6.8-16sarge1_alpha.changes uploaded successfully to 
localhost
along with the files:
  kernel-image-2.6.8-alpha_2.6.8-16sarge1.dsc
  kernel-image-2.6.8-alpha_2.6.8-16sarge1.tar.gz
  kernel-headers-2.6.8-2_2.6.8-16sarge1_alpha.deb
  kernel-headers-2.6.8-2-generic_2.6.8-16sarge1_alpha.deb
  kernel-image-2.6.8-2-generic_2.6.8-16sarge1_alpha.deb
  kernel-headers-2.6.8-2-smp_2.6.8-16sarge1_alpha.deb
  kernel-image-2.6.8-2-smp_2.6.8-16sarge1_alpha.deb

Greetings,

Your Debian queue daemon


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Processing of kernel-image-2.6.8-amd64_2.6.8-16sarge1_i386.changes

2005-12-14 Thread Archive Administrator
kernel-image-2.6.8-amd64_2.6.8-16sarge1_i386.changes uploaded successfully to 
localhost
along with the files:
  kernel-image-2.6.8-amd64_2.6.8-16sarge1.dsc
  kernel-image-2.6.8-amd64_2.6.8-16sarge1.tar.gz
  kernel-headers-2.6.8-11_2.6.8-16sarge1_i386.deb
  kernel-headers-2.6.8-11-amd64-generic_2.6.8-16sarge1_i386.deb
  kernel-image-2.6.8-11-amd64-generic_2.6.8-16sarge1_i386.deb
  kernel-headers-2.6.8-11-amd64-k8-smp_2.6.8-16sarge1_i386.deb
  kernel-image-2.6.8-11-amd64-k8-smp_2.6.8-16sarge1_i386.deb
  kernel-headers-2.6.8-11-em64t-p4_2.6.8-16sarge1_i386.deb
  kernel-image-2.6.8-11-em64t-p4_2.6.8-16sarge1_i386.deb
  kernel-headers-2.6.8-11-em64t-p4-smp_2.6.8-16sarge1_i386.deb
  kernel-image-2.6.8-11-em64t-p4-smp_2.6.8-16sarge1_i386.deb
  kernel-headers-2.6.8-11-amd64-k8_2.6.8-16sarge1_i386.deb
  kernel-image-2.6.8-11-amd64-k8_2.6.8-16sarge1_i386.deb

Greetings,

Your Debian queue daemon


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Processing of kernel-image-2.6.8-i386_2.6.8-16sarge1_i386.changes

2005-12-14 Thread Archive Administrator
PGP/GnuPG signature check failed on 
kernel-image-2.6.8-i386_2.6.8-16sarge1_i386.changes
gpg: Signature made Tue Aug 16 19:17:24 2005 PDT using DSA key ID 87B1CFB5
gpg: Can't check signature: public key not found
(Exit status 2)
kernel-image-2.6.8-i386_2.6.8-16sarge1_i386.changes has bad PGP/GnuPG signature!
Removing kernel-image-2.6.8-i386_2.6.8-16sarge1_i386.changes, but keeping its 
associated files for now.

Greetings,

Your Debian queue daemon


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Processing of kernel-image-2.6.8-ia64_2.6.8-14sarge1_ia64.changes

2005-12-14 Thread Archive Administrator
kernel-image-2.6.8-ia64_2.6.8-14sarge1_ia64.changes uploaded successfully to 
localhost
along with the files:
  kernel-image-2.6.8-ia64_2.6.8-14sarge1.dsc
  kernel-image-2.6.8-ia64_2.6.8-14sarge1.tar.gz
  kernel-headers-2.6.8-2_2.6.8-14sarge1_ia64.deb
  kernel-headers-2.6-itanium-smp_2.6.8-14sarge1_ia64.deb
  kernel-image-2.6-itanium-smp_2.6.8-14sarge1_ia64.deb
  kernel-headers-2.6.8-2-itanium-smp_2.6.8-14sarge1_ia64.deb
  kernel-image-2.6.8-2-itanium-smp_2.6.8-14sarge1_ia64.deb
  kernel-headers-2.6-mckinley-smp_2.6.8-14sarge1_ia64.deb
  kernel-image-2.6-mckinley-smp_2.6.8-14sarge1_ia64.deb
  kernel-headers-2.6.8-2-mckinley-smp_2.6.8-14sarge1_ia64.deb
  kernel-image-2.6.8-2-mckinley-smp_2.6.8-14sarge1_ia64.deb
  kernel-headers-2.6-itanium_2.6.8-14sarge1_ia64.deb
  kernel-image-2.6-itanium_2.6.8-14sarge1_ia64.deb
  kernel-headers-2.6.8-2-itanium_2.6.8-14sarge1_ia64.deb
  kernel-image-2.6.8-2-itanium_2.6.8-14sarge1_ia64.deb
  kernel-headers-2.6-mckinley_2.6.8-14sarge1_ia64.deb
  kernel-image-2.6-mckinley_2.6.8-14sarge1_ia64.deb
  kernel-headers-2.6.8-2-mckinley_2.6.8-14sarge1_ia64.deb
  kernel-image-2.6.8-2-mckinley_2.6.8-14sarge1_ia64.deb

Greetings,

Your Debian queue daemon


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Processing of kernel-image-2.6.8-s390_2.6.8-5sarge1_s390.changes

2005-12-14 Thread Archive Administrator
kernel-image-2.6.8-s390_2.6.8-5sarge1_s390.changes uploaded successfully to 
localhost
along with the files:
  kernel-image-2.6.8-s390_2.6.8-5sarge1.dsc
  kernel-image-2.6.8-s390_2.6.8-5sarge1.tar.gz
  kernel-patch-2.6.8-s390_2.6.8-5sarge1_all.deb
  kernel-headers-2.6.8-2_2.6.8-5sarge1_s390.deb
  kernel-image-2.6.8-2-s390_2.6.8-5sarge1_s390.deb
  kernel-image-2.6.8-2-s390x_2.6.8-5sarge1_s390.deb
  kernel-image-2.6.8-2-s390-tape_2.6.8-5sarge1_s390.deb

Greetings,

Your Debian queue daemon


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Processing of kernel-image-2.6.8-sparc_2.6.8-15sarge1_sparc.changes

2005-12-14 Thread Archive Administrator
kernel-image-2.6.8-sparc_2.6.8-15sarge1_sparc.changes uploaded successfully to 
localhost
along with the files:
  kernel-image-2.6.8-sparc_2.6.8-15sarge1.dsc
  kernel-image-2.6.8-sparc_2.6.8-15sarge1.tar.gz
  kernel-headers-2.6.8-2_2.6.8-15sarge1_sparc.deb
  kernel-headers-2.6.8-2-sparc32_2.6.8-15sarge1_sparc.deb
  kernel-image-2.6.8-2-sparc32_2.6.8-15sarge1_sparc.deb
  kernel-headers-2.6.8-2-sparc64_2.6.8-15sarge1_sparc.deb
  kernel-image-2.6.8-2-sparc64_2.6.8-15sarge1_sparc.deb
  kernel-headers-2.6.8-2-sparc64-smp_2.6.8-15sarge1_sparc.deb
  kernel-image-2.6.8-2-sparc64-smp_2.6.8-15sarge1_sparc.deb
  kernel-build-2.6.8-2_2.6.8-15sarge1_sparc.deb

Greetings,

Your Debian queue daemon


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Processing of kernel-patch-powerpc-2.6.8_2.6.8-12sarge1_powerpc.changes

2005-12-14 Thread Archive Administrator
kernel-patch-powerpc-2.6.8_2.6.8-12sarge1_powerpc.changes uploaded successfully 
to localhost
along with the files:
  kernel-patch-powerpc-2.6.8_2.6.8-12sarge1.dsc
  kernel-patch-powerpc-2.6.8_2.6.8-12sarge1.tar.gz
  kernel-headers-2.6.8_2.6.8-12sarge1_powerpc.deb
  kernel-image-2.6.8-power3_2.6.8-12sarge1_powerpc.deb
  kernel-build-2.6.8-power3_2.6.8-12sarge1_powerpc.deb
  kernel-image-2.6.8-power3-smp_2.6.8-12sarge1_powerpc.deb
  kernel-build-2.6.8-power3-smp_2.6.8-12sarge1_powerpc.deb
  kernel-image-2.6.8-power4_2.6.8-12sarge1_powerpc.deb
  kernel-build-2.6.8-power4_2.6.8-12sarge1_powerpc.deb
  kernel-image-2.6.8-power4-smp_2.6.8-12sarge1_powerpc.deb
  kernel-build-2.6.8-power4-smp_2.6.8-12sarge1_powerpc.deb
  kernel-image-2.6.8-powerpc_2.6.8-12sarge1_powerpc.deb
  kernel-build-2.6.8-powerpc_2.6.8-12sarge1_powerpc.deb
  kernel-image-2.6.8-powerpc-smp_2.6.8-12sarge1_powerpc.deb
  kernel-build-2.6.8-powerpc-smp_2.6.8-12sarge1_powerpc.deb

Greetings,

Your Debian queue daemon


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Processing of kernel-source-2.6.8_2.6.8-16sarge1_i386.changes

2005-12-14 Thread Archive Administrator
kernel-source-2.6.8_2.6.8-16sarge1_i386.changes uploaded successfully to 
localhost
along with the files:
  kernel-source-2.6.8_2.6.8-16sarge1.dsc
  kernel-source-2.6.8_2.6.8-16sarge1.diff.gz
  kernel-source-2.6.8_2.6.8.orig.tar.gz
  kernel-patch-debian-2.6.8_2.6.8-16sarge1_all.deb
  kernel-source-2.6.8_2.6.8-16sarge1_all.deb
  kernel-tree-2.6.8_2.6.8-16sarge1_all.deb
  kernel-doc-2.6.8_2.6.8-16sarge1_all.deb

Greetings,

Your Debian queue daemon


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



kernel-image-2.6.8-s390_2.6.8-5sarge1_s390.changes ACCEPTED

2005-12-14 Thread Debian Installer
Mapping stable-security to proposed-updates.

Accepted:
kernel-headers-2.6.8-2_2.6.8-5sarge1_s390.deb
  to 
pool/main/k/kernel-image-2.6.8-s390/kernel-headers-2.6.8-2_2.6.8-5sarge1_s390.deb
kernel-image-2.6.8-2-s390-tape_2.6.8-5sarge1_s390.deb
  to 
pool/main/k/kernel-image-2.6.8-s390/kernel-image-2.6.8-2-s390-tape_2.6.8-5sarge1_s390.deb
kernel-image-2.6.8-2-s390_2.6.8-5sarge1_s390.deb
  to 
pool/main/k/kernel-image-2.6.8-s390/kernel-image-2.6.8-2-s390_2.6.8-5sarge1_s390.deb
kernel-image-2.6.8-2-s390x_2.6.8-5sarge1_s390.deb
  to 
pool/main/k/kernel-image-2.6.8-s390/kernel-image-2.6.8-2-s390x_2.6.8-5sarge1_s390.deb
kernel-image-2.6.8-s390_2.6.8-5sarge1.dsc
  to 
pool/main/k/kernel-image-2.6.8-s390/kernel-image-2.6.8-s390_2.6.8-5sarge1.dsc
kernel-image-2.6.8-s390_2.6.8-5sarge1.tar.gz
  to 
pool/main/k/kernel-image-2.6.8-s390/kernel-image-2.6.8-s390_2.6.8-5sarge1.tar.gz
kernel-patch-2.6.8-s390_2.6.8-5sarge1_all.deb
  to 
pool/main/k/kernel-image-2.6.8-s390/kernel-patch-2.6.8-s390_2.6.8-5sarge1_all.deb
Announcing to debian-changes@lists.debian.org


Thank you for your contribution to Debian.


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



kernel-image-2.4.27-alpha_2.4.27-10sarge1_alpha.changes ACCEPTED

2005-12-14 Thread Debian Installer
Mapping stable-security to proposed-updates.

Accepted:
kernel-build-2.4.27-2_2.4.27-10sarge1_alpha.deb
  to 
pool/main/k/kernel-image-2.4.27-alpha/kernel-build-2.4.27-2_2.4.27-10sarge1_alpha.deb
kernel-headers-2.4.27-2-generic_2.4.27-10sarge1_alpha.deb
  to 
pool/main/k/kernel-image-2.4.27-alpha/kernel-headers-2.4.27-2-generic_2.4.27-10sarge1_alpha.deb
kernel-headers-2.4.27-2-smp_2.4.27-10sarge1_alpha.deb
  to 
pool/main/k/kernel-image-2.4.27-alpha/kernel-headers-2.4.27-2-smp_2.4.27-10sarge1_alpha.deb
kernel-headers-2.4.27-2_2.4.27-10sarge1_alpha.deb
  to 
pool/main/k/kernel-image-2.4.27-alpha/kernel-headers-2.4.27-2_2.4.27-10sarge1_alpha.deb
kernel-image-2.4.27-2-generic_2.4.27-10sarge1_alpha.deb
  to 
pool/main/k/kernel-image-2.4.27-alpha/kernel-image-2.4.27-2-generic_2.4.27-10sarge1_alpha.deb
kernel-image-2.4.27-2-smp_2.4.27-10sarge1_alpha.deb
  to 
pool/main/k/kernel-image-2.4.27-alpha/kernel-image-2.4.27-2-smp_2.4.27-10sarge1_alpha.deb
kernel-image-2.4.27-alpha_2.4.27-10sarge1.dsc
  to 
pool/main/k/kernel-image-2.4.27-alpha/kernel-image-2.4.27-alpha_2.4.27-10sarge1.dsc
kernel-image-2.4.27-alpha_2.4.27-10sarge1.tar.gz
  to 
pool/main/k/kernel-image-2.4.27-alpha/kernel-image-2.4.27-alpha_2.4.27-10sarge1.tar.gz
Announcing to debian-changes@lists.debian.org


Thank you for your contribution to Debian.


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



kernel-image-2.4.27-sparc_2.4.27-9sarge1_sparc.changes ACCEPTED

2005-12-14 Thread Debian Installer
Mapping stable-security to proposed-updates.
Warning: Propogating upload to unstable
Warning: Propogating upload to testing-proposed-updates
Warning: Propogating upload to unstable
Warning: Propogating upload to testing-proposed-updates
Warning: Propogating upload to unstable
Warning: Propogating upload to testing-proposed-updates
Warning: Propogating upload to unstable
Warning: Propogating upload to testing-proposed-updates
Warning: Propogating upload to unstable
Warning: Propogating upload to testing-proposed-updates
Warning: Propogating upload to unstable
Warning: Propogating upload to testing-proposed-updates
Warning: Propogating upload to unstable
Warning: Propogating upload to testing-proposed-updates
Warning: Propogating upload to unstable
Warning: Propogating upload to testing-proposed-updates
Warning: Propogating upload to unstable
Warning: Propogating upload to testing-proposed-updates
Warning: Propogating upload to unstable
Warning: Propogating upload to testing-proposed-updates
Warning: Propogating upload to unstable
Warning: Propogating upload to testing-proposed-updates

Accepted:
kernel-build-2.4.27-2_2.4.27-9sarge1_sparc.deb
  to 
pool/main/k/kernel-image-2.4.27-sparc/kernel-build-2.4.27-2_2.4.27-9sarge1_sparc.deb
kernel-headers-2.4.27-2-sparc32-smp_2.4.27-9sarge1_sparc.deb
  to 
pool/main/k/kernel-image-2.4.27-sparc/kernel-headers-2.4.27-2-sparc32-smp_2.4.27-9sarge1_sparc.deb
kernel-headers-2.4.27-2-sparc32_2.4.27-9sarge1_sparc.deb
  to 
pool/main/k/kernel-image-2.4.27-sparc/kernel-headers-2.4.27-2-sparc32_2.4.27-9sarge1_sparc.deb
kernel-headers-2.4.27-2-sparc64-smp_2.4.27-9sarge1_sparc.deb
  to 
pool/main/k/kernel-image-2.4.27-sparc/kernel-headers-2.4.27-2-sparc64-smp_2.4.27-9sarge1_sparc.deb
kernel-headers-2.4.27-2-sparc64_2.4.27-9sarge1_sparc.deb
  to 
pool/main/k/kernel-image-2.4.27-sparc/kernel-headers-2.4.27-2-sparc64_2.4.27-9sarge1_sparc.deb
kernel-headers-2.4.27-2_2.4.27-9sarge1_sparc.deb
  to 
pool/main/k/kernel-image-2.4.27-sparc/kernel-headers-2.4.27-2_2.4.27-9sarge1_sparc.deb
kernel-image-2.4.27-2-sparc32-smp_2.4.27-9sarge1_sparc.deb
  to 
pool/main/k/kernel-image-2.4.27-sparc/kernel-image-2.4.27-2-sparc32-smp_2.4.27-9sarge1_sparc.deb
kernel-image-2.4.27-2-sparc32_2.4.27-9sarge1_sparc.deb
  to 
pool/main/k/kernel-image-2.4.27-sparc/kernel-image-2.4.27-2-sparc32_2.4.27-9sarge1_sparc.deb
kernel-image-2.4.27-2-sparc64-smp_2.4.27-9sarge1_sparc.deb
  to 
pool/main/k/kernel-image-2.4.27-sparc/kernel-image-2.4.27-2-sparc64-smp_2.4.27-9sarge1_sparc.deb
kernel-image-2.4.27-2-sparc64_2.4.27-9sarge1_sparc.deb
  to 
pool/main/k/kernel-image-2.4.27-sparc/kernel-image-2.4.27-2-sparc64_2.4.27-9sarge1_sparc.deb
kernel-image-2.4.27-sparc_2.4.27-9sarge1.dsc
  to 
pool/main/k/kernel-image-2.4.27-sparc/kernel-image-2.4.27-sparc_2.4.27-9sarge1.dsc
kernel-image-2.4.27-sparc_2.4.27-9sarge1.tar.gz
  to 
pool/main/k/kernel-image-2.4.27-sparc/kernel-image-2.4.27-sparc_2.4.27-9sarge1.tar.gz
Announcing to debian-changes@lists.debian.org


Thank you for your contribution to Debian.


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



kernel-image-2.6.8-ia64_2.6.8-14sarge1_ia64.changes ACCEPTED

2005-12-14 Thread Debian Installer
Mapping stable-security to proposed-updates.
Warning: Propogating upload to testing-proposed-updates
Warning: Propogating upload to testing-proposed-updates
Warning: Propogating upload to testing-proposed-updates
Warning: Propogating upload to testing-proposed-updates
Warning: Propogating upload to testing-proposed-updates
Warning: Propogating upload to testing-proposed-updates
Warning: Propogating upload to testing-proposed-updates
Warning: Propogating upload to testing-proposed-updates
Warning: Propogating upload to testing-proposed-updates
Warning: Propogating upload to testing-proposed-updates

Accepted:
kernel-headers-2.6-itanium-smp_2.6.8-14sarge1_ia64.deb
  to 
pool/main/k/kernel-image-2.6.8-ia64/kernel-headers-2.6-itanium-smp_2.6.8-14sarge1_ia64.deb
kernel-headers-2.6-itanium_2.6.8-14sarge1_ia64.deb
  to 
pool/main/k/kernel-image-2.6.8-ia64/kernel-headers-2.6-itanium_2.6.8-14sarge1_ia64.deb
kernel-headers-2.6-mckinley-smp_2.6.8-14sarge1_ia64.deb
  to 
pool/main/k/kernel-image-2.6.8-ia64/kernel-headers-2.6-mckinley-smp_2.6.8-14sarge1_ia64.deb
kernel-headers-2.6-mckinley_2.6.8-14sarge1_ia64.deb
  to 
pool/main/k/kernel-image-2.6.8-ia64/kernel-headers-2.6-mckinley_2.6.8-14sarge1_ia64.deb
kernel-headers-2.6.8-2-itanium-smp_2.6.8-14sarge1_ia64.deb
  to 
pool/main/k/kernel-image-2.6.8-ia64/kernel-headers-2.6.8-2-itanium-smp_2.6.8-14sarge1_ia64.deb
kernel-headers-2.6.8-2-itanium_2.6.8-14sarge1_ia64.deb
  to 
pool/main/k/kernel-image-2.6.8-ia64/kernel-headers-2.6.8-2-itanium_2.6.8-14sarge1_ia64.deb
kernel-headers-2.6.8-2-mckinley-smp_2.6.8-14sarge1_ia64.deb
  to 
pool/main/k/kernel-image-2.6.8-ia64/kernel-headers-2.6.8-2-mckinley-smp_2.6.8-14sarge1_ia64.deb
kernel-headers-2.6.8-2-mckinley_2.6.8-14sarge1_ia64.deb
  to 
pool/main/k/kernel-image-2.6.8-ia64/kernel-headers-2.6.8-2-mckinley_2.6.8-14sarge1_ia64.deb
kernel-headers-2.6.8-2_2.6.8-14sarge1_ia64.deb
  to 
pool/main/k/kernel-image-2.6.8-ia64/kernel-headers-2.6.8-2_2.6.8-14sarge1_ia64.deb
kernel-image-2.6-itanium-smp_2.6.8-14sarge1_ia64.deb
  to 
pool/main/k/kernel-image-2.6.8-ia64/kernel-image-2.6-itanium-smp_2.6.8-14sarge1_ia64.deb
kernel-image-2.6-itanium_2.6.8-14sarge1_ia64.deb
  to 
pool/main/k/kernel-image-2.6.8-ia64/kernel-image-2.6-itanium_2.6.8-14sarge1_ia64.deb
kernel-image-2.6-mckinley-smp_2.6.8-14sarge1_ia64.deb
  to 
pool/main/k/kernel-image-2.6.8-ia64/kernel-image-2.6-mckinley-smp_2.6.8-14sarge1_ia64.deb
kernel-image-2.6-mckinley_2.6.8-14sarge1_ia64.deb
  to 
pool/main/k/kernel-image-2.6.8-ia64/kernel-image-2.6-mckinley_2.6.8-14sarge1_ia64.deb
kernel-image-2.6.8-2-itanium-smp_2.6.8-14sarge1_ia64.deb
  to 
pool/main/k/kernel-image-2.6.8-ia64/kernel-image-2.6.8-2-itanium-smp_2.6.8-14sarge1_ia64.deb
kernel-image-2.6.8-2-itanium_2.6.8-14sarge1_ia64.deb
  to 
pool/main/k/kernel-image-2.6.8-ia64/kernel-image-2.6.8-2-itanium_2.6.8-14sarge1_ia64.deb
kernel-image-2.6.8-2-mckinley-smp_2.6.8-14sarge1_ia64.deb
  to 
pool/main/k/kernel-image-2.6.8-ia64/kernel-image-2.6.8-2-mckinley-smp_2.6.8-14sarge1_ia64.deb
kernel-image-2.6.8-2-mckinley_2.6.8-14sarge1_ia64.deb
  to 
pool/main/k/kernel-image-2.6.8-ia64/kernel-image-2.6.8-2-mckinley_2.6.8-14sarge1_ia64.deb
kernel-image-2.6.8-ia64_2.6.8-14sarge1.dsc
  to 
pool/main/k/kernel-image-2.6.8-ia64/kernel-image-2.6.8-ia64_2.6.8-14sarge1.dsc
kernel-image-2.6.8-ia64_2.6.8-14sarge1.tar.gz
  to 
pool/main/k/kernel-image-2.6.8-ia64/kernel-image-2.6.8-ia64_2.6.8-14sarge1.tar.gz
Announcing to debian-changes@lists.debian.org


Thank you for your contribution to Debian.


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



kernel-image-2.6.8-alpha_2.6.8-16sarge1_alpha.changes ACCEPTED

2005-12-14 Thread Debian Installer
Mapping stable-security to proposed-updates.

Accepted:
kernel-headers-2.6.8-2-generic_2.6.8-16sarge1_alpha.deb
  to 
pool/main/k/kernel-image-2.6.8-alpha/kernel-headers-2.6.8-2-generic_2.6.8-16sarge1_alpha.deb
kernel-headers-2.6.8-2-smp_2.6.8-16sarge1_alpha.deb
  to 
pool/main/k/kernel-image-2.6.8-alpha/kernel-headers-2.6.8-2-smp_2.6.8-16sarge1_alpha.deb
kernel-headers-2.6.8-2_2.6.8-16sarge1_alpha.deb
  to 
pool/main/k/kernel-image-2.6.8-alpha/kernel-headers-2.6.8-2_2.6.8-16sarge1_alpha.deb
kernel-image-2.6.8-2-generic_2.6.8-16sarge1_alpha.deb
  to 
pool/main/k/kernel-image-2.6.8-alpha/kernel-image-2.6.8-2-generic_2.6.8-16sarge1_alpha.deb
kernel-image-2.6.8-2-smp_2.6.8-16sarge1_alpha.deb
  to 
pool/main/k/kernel-image-2.6.8-alpha/kernel-image-2.6.8-2-smp_2.6.8-16sarge1_alpha.deb
kernel-image-2.6.8-alpha_2.6.8-16sarge1.dsc
  to 
pool/main/k/kernel-image-2.6.8-alpha/kernel-image-2.6.8-alpha_2.6.8-16sarge1.dsc
kernel-image-2.6.8-alpha_2.6.8-16sarge1.tar.gz
  to 
pool/main/k/kernel-image-2.6.8-alpha/kernel-image-2.6.8-alpha_2.6.8-16sarge1.tar.gz
Announcing to debian-changes@lists.debian.org


Thank you for your contribution to Debian.


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



kernel-source-2.6.8_2.6.8-16sarge1_i386.changes REJECTED

2005-12-14 Thread Debian Installer

Mapping stable-security to proposed-updates.
Rejected: The key (0x76EF8CE887B1CFB5) used to sign 
kernel-source-2.6.8_2.6.8-16sarge1.dsc wasn't found in the keyring(s).
Warning: ignoring kernel-source-2.6.8_2.6.8.orig.tar.gz, since it's already in 
the archive.


===

If you don't understand why your files were rejected, or if the
override file requires editing, reply to this email.


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



kernel-patch-powerpc-2.6.8_2.6.8-12sarge1_powerpc.changes ACCEPTED

2005-12-14 Thread Debian Installer
Mapping stable-security to proposed-updates.

Accepted:
kernel-build-2.6.8-power3-smp_2.6.8-12sarge1_powerpc.deb
  to 
pool/main/k/kernel-patch-powerpc-2.6.8/kernel-build-2.6.8-power3-smp_2.6.8-12sarge1_powerpc.deb
kernel-build-2.6.8-power3_2.6.8-12sarge1_powerpc.deb
  to 
pool/main/k/kernel-patch-powerpc-2.6.8/kernel-build-2.6.8-power3_2.6.8-12sarge1_powerpc.deb
kernel-build-2.6.8-power4-smp_2.6.8-12sarge1_powerpc.deb
  to 
pool/main/k/kernel-patch-powerpc-2.6.8/kernel-build-2.6.8-power4-smp_2.6.8-12sarge1_powerpc.deb
kernel-build-2.6.8-power4_2.6.8-12sarge1_powerpc.deb
  to 
pool/main/k/kernel-patch-powerpc-2.6.8/kernel-build-2.6.8-power4_2.6.8-12sarge1_powerpc.deb
kernel-build-2.6.8-powerpc-smp_2.6.8-12sarge1_powerpc.deb
  to 
pool/main/k/kernel-patch-powerpc-2.6.8/kernel-build-2.6.8-powerpc-smp_2.6.8-12sarge1_powerpc.deb
kernel-build-2.6.8-powerpc_2.6.8-12sarge1_powerpc.deb
  to 
pool/main/k/kernel-patch-powerpc-2.6.8/kernel-build-2.6.8-powerpc_2.6.8-12sarge1_powerpc.deb
kernel-headers-2.6.8_2.6.8-12sarge1_powerpc.deb
  to 
pool/main/k/kernel-patch-powerpc-2.6.8/kernel-headers-2.6.8_2.6.8-12sarge1_powerpc.deb
kernel-image-2.6.8-power3-smp_2.6.8-12sarge1_powerpc.deb
  to 
pool/main/k/kernel-patch-powerpc-2.6.8/kernel-image-2.6.8-power3-smp_2.6.8-12sarge1_powerpc.deb
kernel-image-2.6.8-power3_2.6.8-12sarge1_powerpc.deb
  to 
pool/main/k/kernel-patch-powerpc-2.6.8/kernel-image-2.6.8-power3_2.6.8-12sarge1_powerpc.deb
kernel-image-2.6.8-power4-smp_2.6.8-12sarge1_powerpc.deb
  to 
pool/main/k/kernel-patch-powerpc-2.6.8/kernel-image-2.6.8-power4-smp_2.6.8-12sarge1_powerpc.deb
kernel-image-2.6.8-power4_2.6.8-12sarge1_powerpc.deb
  to 
pool/main/k/kernel-patch-powerpc-2.6.8/kernel-image-2.6.8-power4_2.6.8-12sarge1_powerpc.deb
kernel-image-2.6.8-powerpc-smp_2.6.8-12sarge1_powerpc.deb
  to 
pool/main/k/kernel-patch-powerpc-2.6.8/kernel-image-2.6.8-powerpc-smp_2.6.8-12sarge1_powerpc.deb
kernel-image-2.6.8-powerpc_2.6.8-12sarge1_powerpc.deb
  to 
pool/main/k/kernel-patch-powerpc-2.6.8/kernel-image-2.6.8-powerpc_2.6.8-12sarge1_powerpc.deb
kernel-patch-powerpc-2.6.8_2.6.8-12sarge1.dsc
  to 
pool/main/k/kernel-patch-powerpc-2.6.8/kernel-patch-powerpc-2.6.8_2.6.8-12sarge1.dsc
kernel-patch-powerpc-2.6.8_2.6.8-12sarge1.tar.gz
  to 
pool/main/k/kernel-patch-powerpc-2.6.8/kernel-patch-powerpc-2.6.8_2.6.8-12sarge1.tar.gz
Announcing to debian-changes@lists.debian.org


Thank you for your contribution to Debian.


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



kernel-image-2.6.8-amd64_2.6.8-16sarge1_i386.changes ACCEPTED

2005-12-14 Thread Debian Installer
Mapping stable-security to proposed-updates.

Accepted:
kernel-headers-2.6.8-11-amd64-generic_2.6.8-16sarge1_i386.deb
  to 
pool/main/k/kernel-image-2.6.8-amd64/kernel-headers-2.6.8-11-amd64-generic_2.6.8-16sarge1_i386.deb
kernel-headers-2.6.8-11-amd64-k8-smp_2.6.8-16sarge1_i386.deb
  to 
pool/main/k/kernel-image-2.6.8-amd64/kernel-headers-2.6.8-11-amd64-k8-smp_2.6.8-16sarge1_i386.deb
kernel-headers-2.6.8-11-amd64-k8_2.6.8-16sarge1_i386.deb
  to 
pool/main/k/kernel-image-2.6.8-amd64/kernel-headers-2.6.8-11-amd64-k8_2.6.8-16sarge1_i386.deb
kernel-headers-2.6.8-11-em64t-p4-smp_2.6.8-16sarge1_i386.deb
  to 
pool/main/k/kernel-image-2.6.8-amd64/kernel-headers-2.6.8-11-em64t-p4-smp_2.6.8-16sarge1_i386.deb
kernel-headers-2.6.8-11-em64t-p4_2.6.8-16sarge1_i386.deb
  to 
pool/main/k/kernel-image-2.6.8-amd64/kernel-headers-2.6.8-11-em64t-p4_2.6.8-16sarge1_i386.deb
kernel-headers-2.6.8-11_2.6.8-16sarge1_i386.deb
  to 
pool/main/k/kernel-image-2.6.8-amd64/kernel-headers-2.6.8-11_2.6.8-16sarge1_i386.deb
kernel-image-2.6.8-11-amd64-generic_2.6.8-16sarge1_i386.deb
  to 
pool/main/k/kernel-image-2.6.8-amd64/kernel-image-2.6.8-11-amd64-generic_2.6.8-16sarge1_i386.deb
kernel-image-2.6.8-11-amd64-k8-smp_2.6.8-16sarge1_i386.deb
  to 
pool/main/k/kernel-image-2.6.8-amd64/kernel-image-2.6.8-11-amd64-k8-smp_2.6.8-16sarge1_i386.deb
kernel-image-2.6.8-11-amd64-k8_2.6.8-16sarge1_i386.deb
  to 
pool/main/k/kernel-image-2.6.8-amd64/kernel-image-2.6.8-11-amd64-k8_2.6.8-16sarge1_i386.deb
kernel-image-2.6.8-11-em64t-p4-smp_2.6.8-16sarge1_i386.deb
  to 
pool/main/k/kernel-image-2.6.8-amd64/kernel-image-2.6.8-11-em64t-p4-smp_2.6.8-16sarge1_i386.deb
kernel-image-2.6.8-11-em64t-p4_2.6.8-16sarge1_i386.deb
  to 
pool/main/k/kernel-image-2.6.8-amd64/kernel-image-2.6.8-11-em64t-p4_2.6.8-16sarge1_i386.deb
kernel-image-2.6.8-amd64_2.6.8-16sarge1.dsc
  to 
pool/main/k/kernel-image-2.6.8-amd64/kernel-image-2.6.8-amd64_2.6.8-16sarge1.dsc
kernel-image-2.6.8-amd64_2.6.8-16sarge1.tar.gz
  to 
pool/main/k/kernel-image-2.6.8-amd64/kernel-image-2.6.8-amd64_2.6.8-16sarge1.tar.gz
Announcing to debian-changes@lists.debian.org


Thank you for your contribution to Debian.


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



kernel-source-2.4.27_2.4.27-10sarge1_i386.changes REJECTED

2005-12-14 Thread Debian Installer

Mapping stable-security to proposed-updates.
Rejected: The key (0x76EF8CE887B1CFB5) used to sign 
kernel-source-2.4.27_2.4.27-10sarge1.dsc wasn't found in the keyring(s).
Warning: ignoring kernel-source-2.4.27_2.4.27.orig.tar.gz, since it's already 
in the archive.


===

If you don't understand why your files were rejected, or if the
override file requires editing, reply to this email.


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



kernel-image-2.4.27-ia64_2.4.27-10sarge1_ia64.changes ACCEPTED

2005-12-14 Thread Debian Installer
Mapping stable-security to proposed-updates.

Accepted:
kernel-build-2.4.27-2_2.4.27-10sarge1_ia64.deb
  to 
pool/main/k/kernel-image-2.4.27-ia64/kernel-build-2.4.27-2_2.4.27-10sarge1_ia64.deb
kernel-headers-2.4.27-2-itanium-smp_2.4.27-10sarge1_ia64.deb
  to 
pool/main/k/kernel-image-2.4.27-ia64/kernel-headers-2.4.27-2-itanium-smp_2.4.27-10sarge1_ia64.deb
kernel-headers-2.4.27-2-itanium_2.4.27-10sarge1_ia64.deb
  to 
pool/main/k/kernel-image-2.4.27-ia64/kernel-headers-2.4.27-2-itanium_2.4.27-10sarge1_ia64.deb
kernel-headers-2.4.27-2-mckinley-smp_2.4.27-10sarge1_ia64.deb
  to 
pool/main/k/kernel-image-2.4.27-ia64/kernel-headers-2.4.27-2-mckinley-smp_2.4.27-10sarge1_ia64.deb
kernel-headers-2.4.27-2-mckinley_2.4.27-10sarge1_ia64.deb
  to 
pool/main/k/kernel-image-2.4.27-ia64/kernel-headers-2.4.27-2-mckinley_2.4.27-10sarge1_ia64.deb
kernel-headers-2.4.27-2_2.4.27-10sarge1_ia64.deb
  to 
pool/main/k/kernel-image-2.4.27-ia64/kernel-headers-2.4.27-2_2.4.27-10sarge1_ia64.deb
kernel-image-2.4-itanium-smp_2.4.27-10sarge1_ia64.deb
  to 
pool/main/k/kernel-image-2.4.27-ia64/kernel-image-2.4-itanium-smp_2.4.27-10sarge1_ia64.deb
kernel-image-2.4-itanium_2.4.27-10sarge1_ia64.deb
  to 
pool/main/k/kernel-image-2.4.27-ia64/kernel-image-2.4-itanium_2.4.27-10sarge1_ia64.deb
kernel-image-2.4-mckinley-smp_2.4.27-10sarge1_ia64.deb
  to 
pool/main/k/kernel-image-2.4.27-ia64/kernel-image-2.4-mckinley-smp_2.4.27-10sarge1_ia64.deb
kernel-image-2.4-mckinley_2.4.27-10sarge1_ia64.deb
  to 
pool/main/k/kernel-image-2.4.27-ia64/kernel-image-2.4-mckinley_2.4.27-10sarge1_ia64.deb
kernel-image-2.4.27-2-itanium-smp_2.4.27-10sarge1_ia64.deb
  to 
pool/main/k/kernel-image-2.4.27-ia64/kernel-image-2.4.27-2-itanium-smp_2.4.27-10sarge1_ia64.deb
kernel-image-2.4.27-2-itanium_2.4.27-10sarge1_ia64.deb
  to 
pool/main/k/kernel-image-2.4.27-ia64/kernel-image-2.4.27-2-itanium_2.4.27-10sarge1_ia64.deb
kernel-image-2.4.27-2-mckinley-smp_2.4.27-10sarge1_ia64.deb
  to 
pool/main/k/kernel-image-2.4.27-ia64/kernel-image-2.4.27-2-mckinley-smp_2.4.27-10sarge1_ia64.deb
kernel-image-2.4.27-2-mckinley_2.4.27-10sarge1_ia64.deb
  to 
pool/main/k/kernel-image-2.4.27-ia64/kernel-image-2.4.27-2-mckinley_2.4.27-10sarge1_ia64.deb
kernel-image-2.4.27-ia64_2.4.27-10sarge1.dsc
  to 
pool/main/k/kernel-image-2.4.27-ia64/kernel-image-2.4.27-ia64_2.4.27-10sarge1.dsc
kernel-image-2.4.27-ia64_2.4.27-10sarge1.tar.gz
  to 
pool/main/k/kernel-image-2.4.27-ia64/kernel-image-2.4.27-ia64_2.4.27-10sarge1.tar.gz
Announcing to debian-changes@lists.debian.org


Thank you for your contribution to Debian.


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



File a bug in ALSA driver snd_es18xx

2005-12-14 Thread Paulo Marcel Coelho Aragao
Hello,

I'm starting to believe I found a bug in ALSA driver snd_es18xx. I don't know 
against which package I should file the bug. Could anybody point me to the 
right direction ?

Thanks
Paulo


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Processing of kernel-source-2.4.27_2.4.27-10sarge1_i386.changes

2005-12-14 Thread Archive Administrator
kernel-source-2.4.27_2.4.27-10sarge1_i386.changes uploaded successfully to 
localhost
along with the files:
  kernel-source-2.4.27_2.4.27-10sarge1.dsc
  kernel-source-2.4.27_2.4.27-10sarge1.diff.gz
  kernel-patch-debian-2.4.27_2.4.27-10sarge1_all.deb
  kernel-doc-2.4.27_2.4.27-10sarge1_all.deb
  kernel-source-2.4.27_2.4.27-10sarge1_all.deb
  kernel-tree-2.4.27_2.4.27-10sarge1_all.deb

Greetings,

Your Debian queue daemon


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Bug#311164: marked as done (CAN-2005-0757: DoS possibility in xattrs handling on 64 bits archs)

2005-12-14 Thread Debian Bug Tracking System
Your message dated Wed, 14 Dec 2005 19:47:14 -0800
with message-id [EMAIL PROTECTED]
and subject line Bug#311164: fixed in kernel-source-2.4.27 2.4.27-10sarge1
has caused the attached Bug report to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what I am
talking about this indicates a serious mail system misconfiguration
somewhere.  Please contact me immediately.)

Debian bug tracking system administrator
(administrator, Debian Bugs database)

--
Received: (at submit) by bugs.debian.org; 29 May 2005 13:47:01 +
From [EMAIL PROTECTED] Sun May 29 06:47:00 2005
Return-path: [EMAIL PROTECTED]
Received: from inutil.org (vserver151.vserver151.serverflex.de) 
[193.22.164.111] 
by spohr.debian.org with esmtp (Exim 3.35 1 (Debian))
id 1DcO84-0004x1-00; Sun, 29 May 2005 06:47:00 -0700
Received: from p54893b55.dip.t-dialin.net ([84.137.59.85] 
helo=localhost.localdomain)
by vserver151.vserver151.serverflex.de with esmtpsa 
(TLS-1.0:RSA_AES_256_CBC_SHA:32)
(Exim 4.50)
id 1DcO5T-0003P6-PV
for [EMAIL PROTECTED]; Sun, 29 May 2005 15:44:20 +0200
Received: from jmm by localhost.localdomain with local (Exim 4.50)
id 1DcO7q-0001Xl-Nx; Sun, 29 May 2005 15:46:46 +0200
Content-Type: text/plain; charset=us-ascii
MIME-Version: 1.0
Content-Transfer-Encoding: 7bit
From: Moritz Muehlenhoff [EMAIL PROTECTED]
To: Debian Bug Tracking System [EMAIL PROTECTED]
Subject: CAN-2005-0757: DoS possibility in xattrs handling on 64 bits archs
X-Mailer: reportbug 3.12
Date: Sun, 29 May 2005 15:46:46 +0200
Message-Id: [EMAIL PROTECTED]
X-SA-Exim-Connect-IP: 84.137.59.85
X-SA-Exim-Mail-From: [EMAIL PROTECTED]
X-SA-Exim-Scanned: No (on vserver151.vserver151.serverflex.de); SAEximRunCond 
expanded to false
Delivered-To: [EMAIL PROTECTED]
X-Spam-Checker-Version: SpamAssassin 2.60-bugs.debian.org_2005_01_02 
(1.212-2003-09-23-exp) on spohr.debian.org
X-Spam-Status: No, hits=-8.0 required=4.0 tests=BAYES_00,HAS_PACKAGE 
autolearn=no version=2.60-bugs.debian.org_2005_01_02
X-Spam-Level: 

Package: kernel-source-2.4.27
Severity: important
Tags: security

Quoting from http://rhn.redhat.com/errata/RHSA-2005-294.html:
A flaw in offset handling in the xattr file system code backported to
Red Hat Enterprise Linux 3 was fixed. On 64-bit systems, a user who
can access an ext3 extended-attribute-enabled file system could cause
a denial of service (system crash). This issue is rated as having a
moderate security impact (CAN-2005-0757).

I couldn't find further information on whether this is already fixed
in 2.4.27, do you have further information?

Cheers,
Moritz

-- System Information:
Debian Release: 3.1
  APT prefers unstable
  APT policy: (500, 'unstable')
Architecture: i386 (i686)
Shell:  /bin/sh linked to /bin/bash
Kernel: Linux 2.6.12-rc5
Locale: LANG=C, [EMAIL PROTECTED] (charmap=ISO-8859-15)

---
Received: (at 311164-close) by bugs.debian.org; 15 Dec 2005 03:51:37 +
From [EMAIL PROTECTED] Wed Dec 14 19:51:37 2005
Return-path: [EMAIL PROTECTED]
Received: from katie by spohr.debian.org with local (Exim 4.50)
id 1Emk5K-0006AC-WD; Wed, 14 Dec 2005 19:47:15 -0800
From: Simon Horman [EMAIL PROTECTED]
To: [EMAIL PROTECTED]
X-Katie: $Revision: 1.60 $
Subject: Bug#311164: fixed in kernel-source-2.4.27 2.4.27-10sarge1
Message-Id: [EMAIL PROTECTED]
Sender: Archive Administrator [EMAIL PROTECTED]
Date: Wed, 14 Dec 2005 19:47:14 -0800
X-Spam-Checker-Version: SpamAssassin 2.60-bugs.debian.org_2005_01_02 
(1.212-2003-09-23-exp) on spohr.debian.org
X-Spam-Level: 
X-Spam-Status: No, hits=-6.0 required=4.0 tests=BAYES_00,HAS_BUG_NUMBER 
autolearn=no version=2.60-bugs.debian.org_2005_01_02

Source: kernel-source-2.4.27
Source-Version: 2.4.27-10sarge1

We believe that the bug you reported is fixed in the latest version of
kernel-source-2.4.27, which is due to be installed in the Debian FTP archive:

kernel-doc-2.4.27_2.4.27-10sarge1_all.deb
  to pool/main/k/kernel-source-2.4.27/kernel-doc-2.4.27_2.4.27-10sarge1_all.deb
kernel-patch-debian-2.4.27_2.4.27-10sarge1_all.deb
  to 
pool/main/k/kernel-source-2.4.27/kernel-patch-debian-2.4.27_2.4.27-10sarge1_all.deb
kernel-source-2.4.27_2.4.27-10sarge1.diff.gz
  to 
pool/main/k/kernel-source-2.4.27/kernel-source-2.4.27_2.4.27-10sarge1.diff.gz
kernel-source-2.4.27_2.4.27-10sarge1.dsc
  to pool/main/k/kernel-source-2.4.27/kernel-source-2.4.27_2.4.27-10sarge1.dsc
kernel-source-2.4.27_2.4.27-10sarge1_all.deb
  to 
pool/main/k/kernel-source-2.4.27/kernel-source-2.4.27_2.4.27-10sarge1_all.deb
kernel-tree-2.4.27_2.4.27-10sarge1_all.deb
  to pool/main/k/kernel-source-2.4.27/kernel-tree-2.4.27_2.4.27-10sarge1_all.deb



A summary of the changes 

Bug#309308: marked as done (kernel-image-2.6.8-2-686-smp: null pointer oops on udp packets)

2005-12-14 Thread Debian Bug Tracking System
Your message dated Wed, 14 Dec 2005 19:47:25 -0800
with message-id [EMAIL PROTECTED]
and subject line Bug#309308: fixed in kernel-source-2.6.8 2.6.8-16sarge1
has caused the attached Bug report to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what I am
talking about this indicates a serious mail system misconfiguration
somewhere.  Please contact me immediately.)

Debian bug tracking system administrator
(administrator, Debian Bugs database)

--
Received: (at submit) by bugs.debian.org; 16 May 2005 09:27:14 +
From [EMAIL PROTECTED] Mon May 16 02:27:14 2005
Return-path: [EMAIL PROTECTED]
Received: from master.debian.org [146.82.138.7] 
by spohr.debian.org with esmtp (Exim 3.35 1 (Debian))
id 1DXbsX-0003BB-00; Mon, 16 May 2005 02:27:13 -0700
Received: from ([127.0.0.1]) [217.212.246.126] 
by master.debian.org with esmtp (Exim 3.35 1 (Debian))
id 1DXbsW-0003eV-00; Mon, 16 May 2005 04:27:12 -0500
Content-Type: text/plain; charset=us-ascii
MIME-Version: 1.0
Content-Transfer-Encoding: 7bit
From: Peter Sandstrom [EMAIL PROTECTED]
To: Debian Bug Tracking System [EMAIL PROTECTED]
Subject: kernel-image-2.6.8-2-686-smp: null pointer oops on udp packets
X-Mailer: reportbug 3.8
Date: Mon, 16 May 2005 11:26:56 +0200
X-Debbugs-Cc: [EMAIL PROTECTED]
Message-Id: [EMAIL PROTECTED]
Delivered-To: [EMAIL PROTECTED]
X-Spam-Checker-Version: SpamAssassin 2.60-bugs.debian.org_2005_01_02 
(1.212-2003-09-23-exp) on spohr.debian.org
X-Spam-Status: No, hits=-9.0 required=4.0 tests=BAYES_00,HAS_PACKAGE,
OUR_MTA_MSGID,X_DEBBUGS_CC autolearn=ham 
version=2.60-bugs.debian.org_2005_01_02
X-Spam-Level: 

Package: kernel-image-2.6.8-2-686-smp
Version: 2.6.8-13
Severity: critical
Tags: security
Justification: breaks the whole system


kernel oops while trying to do a snmpwalk from a remote host. the entire
udp stack becomes unresponsive and reboot fails when trying to bring
down network interfaces. unsure if this is exploitable for a DoS attack,
will investigate further when i have time if this not a know issue.

:01:01.0 Ethernet controller: Intel Corp. 82547GI Gigabit Ethernet
Controller
:03:02.0 Ethernet controller: Intel Corp. 82541GI/PI Gigabit
Ethernet Controller

vlan tagging is in use on the interface that recieves the udp packet
that causes the oops.

Unable to handle kernel NULL pointer dereference at virtual address

 printing eip:
f89f64f2
*pde = 
Oops:  [#1]
PREEMPT SMP
Modules linked in: deflate zlib_deflate twofish serpent aes_i586
blowfish des sha256 sha1 crypto_null af_key tun ipv6 8021q dm_mod
capability commoncap e1000 genrtc ext3 jbd mbcache sd_mod ata_piix
libata scsi_mod unix font vesafb cfbcopyarea cfbimgblt cfbfillrect
CPU:1
EIP:0060:[f89f64f2]Not tainted
EFLAGS: 00010a86   (2.6.8-2-686-smp)
EIP is at e1000_shift_out_mdi_bits+0x22/0xa0 [e1000]
eax:    ebx: 8000   ecx: 001f   edx: 
esi: f77f3c10   edi: f74bbe6c   ebp:    esp: f74bbe64
ds: 007b   es: 007b   ss: 0068
Process snmpd (pid: 793, threadinfo=f74ba000 task=f505b410)
Stack: c038b124 c01163e7  1820 f77f3c10 f74bbee2 f74bbf30
f89f674b
   f77f3c10  0020 f74bbecc f77f3a20 f74bbedc f89f3b3b
f77f3c10
    f74bbee2 f74bbecc f89f3950 f74bbedc f8880ab1 f77f3800
f74bbecc
Call Trace:
 [c01163e7] smp_apic_timer_interrupt+0xe7/0x160
 [f89f674b] e1000_read_phy_reg_ex+0xab/0xd0 [e1000]
 [f89f3b3b] e1000_mii_ioctl+0x1cb/0x1d0 [e1000]
 [f89f3950] e1000_ioctl+0x0/0x20 [e1000]
 [f8880ab1] vlan_dev_ioctl+0xc1/0x110 [8021q]
 [c0236944] dev_ifsioc+0x374/0x3e0
 [c0236b46] dev_ioctl+0x196/0x320
 [c027f59c] inet_ioctl+0x9c/0xb0
 [c022b9d9] sock_ioctl+0x139/0x300
 [c0174d78] sys_ioctl+0x148/0x2d0
 [c01061fb] syscall_call+0x7/0xb
Code: 8b 02 0d 00 00 00 03 89 44 24 08 85 db 74 56 eb 0d 90 90 90


-- System Information:
Debian Release: 3.1
  APT prefers testing
  APT policy: (500, 'testing')
Architecture: i386 (i686)
Kernel: Linux 2.6.8-2-686-smp
Locale: LANG=C, LC_CTYPE=C (charmap=ANSI_X3.4-1968)

Versions of packages kernel-image-2.6.8-2-686-smp depends on:
ii  coreutils [fileutils] 5.2.1-2The GNU core utilities
ii  fileutils 5.2.1-2The GNU file management utilities 
ii  initrd-tools  0.1.78 tools to create initrd image for p
ii  module-init-tools 3.2-pre1-2 tools for managing Linux kernel mo

-- no debconf information

---
Received: (at 309308-close) by bugs.debian.org; 15 Dec 2005 03:51:02 +
From [EMAIL PROTECTED] Wed Dec 14 19:51:02 2005
Return-path: [EMAIL PROTECTED]
Received: from katie by spohr.debian.org with local (Exim 4.50)
id 1Emk5V-0006BL-HB; 

Bug#322339: marked as done (CAN-2004-2302: Race condition allows DoS through large offsets in sysfs files)

2005-12-14 Thread Debian Bug Tracking System
Your message dated Wed, 14 Dec 2005 19:47:25 -0800
with message-id [EMAIL PROTECTED]
and subject line Bug#322339: fixed in kernel-source-2.6.8 2.6.8-16sarge1
has caused the attached Bug report to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what I am
talking about this indicates a serious mail system misconfiguration
somewhere.  Please contact me immediately.)

Debian bug tracking system administrator
(administrator, Debian Bugs database)

--
Received: (at submit) by bugs.debian.org; 10 Aug 2005 09:52:40 +
From [EMAIL PROTECTED] Wed Aug 10 02:52:40 2005
Return-path: [EMAIL PROTECTED]
Received: from ip0.serverflex.de (vserver151.vserver151.serverflex.de) 
[193.22.164.111] 
by spohr.debian.org with esmtp (Exim 3.36 1 (Debian))
id 1E2nGK-0007Bl-00; Wed, 10 Aug 2005 02:52:40 -0700
Received: from wlan-client-052.informatik.uni-bremen.de ([134.102.116.53] 
helo=localhost.localdomain)
by vserver151.vserver151.serverflex.de with esmtpsa 
(TLS-1.0:RSA_AES_256_CBC_SHA:32)
(Exim 4.50)
id 1E2nGH-0005xN-9V
for [EMAIL PROTECTED]; Wed, 10 Aug 2005 11:52:37 +0200
Received: from jmm by localhost.localdomain with local (Exim 4.52)
id 1E2nGe-0001Uk-K8; Wed, 10 Aug 2005 11:53:00 +0200
Content-Type: text/plain; charset=us-ascii
MIME-Version: 1.0
Content-Transfer-Encoding: 7bit
From: Moritz Muehlenhoff [EMAIL PROTECTED]
To: Debian Bug Tracking System [EMAIL PROTECTED]
Subject: CAN-2004-2302: Race condition allows DoS through large offsets in 
sysfs files
X-Mailer: reportbug 3.15
Date: Wed, 10 Aug 2005 11:53:00 +0200
X-Debbugs-Cc: [EMAIL PROTECTED]
Message-Id: [EMAIL PROTECTED]
X-SA-Exim-Connect-IP: 134.102.116.53
X-SA-Exim-Mail-From: [EMAIL PROTECTED]
X-SA-Exim-Scanned: No (on vserver151.vserver151.serverflex.de); SAEximRunCond 
expanded to false
Delivered-To: [EMAIL PROTECTED]
X-Spam-Checker-Version: SpamAssassin 2.60-bugs.debian.org_2005_01_02 
(1.212-2003-09-23-exp) on spohr.debian.org
X-Spam-Level: 
X-Spam-Status: No, hits=-11.0 required=4.0 tests=BAYES_00,HAS_PACKAGE,
X_DEBBUGS_CC autolearn=ham version=2.60-bugs.debian.org_2005_01_02

Package: kernel-source-2.6.8
Severity: important
Tags: security patch

CAN-2004-2302 describes a kernel DoS through a race condition, that can be 
triggered
by overly long sysfs offsets. Please see 
http://linux.bkbits.net:8080/linux-2.6/cset%404186a4deVoR88JjTwMa3ZnIp-_YJsA
for description and a patch. 2.4 doesn't seem to use sysfs and it should 
already be
fixed in 2.6.12.

Cheers,
Moritz

-- System Information:
Debian Release: testing/unstable
  APT prefers unstable
  APT policy: (500, 'unstable')
Architecture: i386 (i686)
Shell:  /bin/sh linked to /bin/bash
Kernel: Linux 2.6.12-rc5
Locale: LANG=C, [EMAIL PROTECTED] (charmap=ISO-8859-15)

---
Received: (at 322339-close) by bugs.debian.org; 15 Dec 2005 03:50:59 +
From [EMAIL PROTECTED] Wed Dec 14 19:50:59 2005
Return-path: [EMAIL PROTECTED]
Received: from katie by spohr.debian.org with local (Exim 4.50)
id 1Emk5V-0006BW-LP; Wed, 14 Dec 2005 19:47:25 -0800
From: Simon Horman [EMAIL PROTECTED]
To: [EMAIL PROTECTED]
X-Katie: $Revision: 1.60 $
Subject: Bug#322339: fixed in kernel-source-2.6.8 2.6.8-16sarge1
Message-Id: [EMAIL PROTECTED]
Sender: Archive Administrator [EMAIL PROTECTED]
Date: Wed, 14 Dec 2005 19:47:25 -0800
X-Spam-Checker-Version: SpamAssassin 2.60-bugs.debian.org_2005_01_02 
(1.212-2003-09-23-exp) on spohr.debian.org
X-Spam-Level: 
X-Spam-Status: No, hits=-5.0 required=4.0 tests=BAYES_01,HAS_BUG_NUMBER 
autolearn=no version=2.60-bugs.debian.org_2005_01_02

Source: kernel-source-2.6.8
Source-Version: 2.6.8-16sarge1

We believe that the bug you reported is fixed in the latest version of
kernel-source-2.6.8, which is due to be installed in the Debian FTP archive:

kernel-doc-2.6.8_2.6.8-16sarge1_all.deb
  to pool/main/k/kernel-source-2.6.8/kernel-doc-2.6.8_2.6.8-16sarge1_all.deb
kernel-patch-debian-2.6.8_2.6.8-16sarge1_all.deb
  to 
pool/main/k/kernel-source-2.6.8/kernel-patch-debian-2.6.8_2.6.8-16sarge1_all.deb
kernel-source-2.6.8_2.6.8-16sarge1.diff.gz
  to pool/main/k/kernel-source-2.6.8/kernel-source-2.6.8_2.6.8-16sarge1.diff.gz
kernel-source-2.6.8_2.6.8-16sarge1.dsc
  to pool/main/k/kernel-source-2.6.8/kernel-source-2.6.8_2.6.8-16sarge1.dsc
kernel-source-2.6.8_2.6.8-16sarge1_all.deb
  to pool/main/k/kernel-source-2.6.8/kernel-source-2.6.8_2.6.8-16sarge1_all.deb
kernel-tree-2.6.8_2.6.8-16sarge1_all.deb
  to pool/main/k/kernel-source-2.6.8/kernel-tree-2.6.8_2.6.8-16sarge1_all.deb



A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you

Bug#323318: marked as done (Array element has incomplete type)

2005-12-14 Thread Debian Bug Tracking System
Your message dated Wed, 14 Dec 2005 19:47:15 -0800
with message-id [EMAIL PROTECTED]
and subject line Bug#323318: fixed in kernel-source-2.4.27 2.4.27-10sarge1
has caused the attached Bug report to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what I am
talking about this indicates a serious mail system misconfiguration
somewhere.  Please contact me immediately.)

Debian bug tracking system administrator
(administrator, Debian Bugs database)

--
Received: (at submit) by bugs.debian.org; 16 Aug 2005 01:54:57 +
From [EMAIL PROTECTED] Mon Aug 15 18:54:57 2005
Return-path: [EMAIL PROTECTED]
Received: from zoot.lafn.org [206.117.18.6] 
by spohr.debian.org with esmtp (Exim 3.36 1 (Debian))
id 1E4qfJ-00056s-00; Mon, 15 Aug 2005 18:54:57 -0700
Received: from localhost.localdomain 
(pool-71-104-165-253.lsanca.dsl-w.verizon.net [71.104.165.253])
(authenticated bits=0)
by zoot.lafn.org (8.13.1/8.13.1) with ESMTP id j7G1sux2012721
(version=TLSv1/SSLv3 cipher=AES256-SHA bits=256 verify=NO)
for [EMAIL PROTECTED]; Mon, 15 Aug 2005 18:54:57 -0700 (PDT)
(envelope-from [EMAIL PROTECTED])
Received: from kraai by localhost.localdomain with local (Exim 4.52)
id 1E4jbc-00012I-15
for [EMAIL PROTECTED]; Mon, 15 Aug 2005 11:22:40 -0700
Date: Mon, 15 Aug 2005 11:22:39 -0700
From: Matt Kraai [EMAIL PROTECTED]
To: [EMAIL PROTECTED]
Subject: Array element has incomplete type
Message-ID: [EMAIL PROTECTED]
Mime-Version: 1.0
Content-Type: multipart/signed; micalg=pgp-sha1;
protocol=application/pgp-signature; boundary=qMm9M+Fa2AknHoGS
Content-Disposition: inline
User-Agent: Mutt/1.5.9i
X-Virus-Scanned: ClamAV 0.86.2/1023/Mon Aug 15 13:15:08 2005 on zoot.lafn.org
X-Virus-Status: Clean
Delivered-To: [EMAIL PROTECTED]
X-Spam-Checker-Version: SpamAssassin 2.60-bugs.debian.org_2005_01_02 
(1.212-2003-09-23-exp) on spohr.debian.org
X-Spam-Level: 
X-Spam-Status: No, hits=-8.0 required=4.0 tests=BAYES_00,HAS_PACKAGE 
autolearn=no version=2.60-bugs.debian.org_2005_01_02


--qMm9M+Fa2AknHoGS
Content-Type: text/plain; charset=us-ascii
Content-Disposition: inline
Content-Transfer-Encoding: quoted-printable

Package: kernel-headers-2.4.27-2
Version: 2.4.27-10
Severity: serious

hostap-modules-i386 fails to build because a kernel header has an array type
with an incomplete element type:

 /tmp/buildd/hostap-modules-i386-0.3.7/kernel-headers-2.4.27-2-386/include=
/asm/processor.h:75: error: array type has incomplete element type

--=20
Matt

--qMm9M+Fa2AknHoGS
Content-Type: application/pgp-signature; name=signature.asc
Content-Description: Digital signature
Content-Disposition: inline

-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.1 (GNU/Linux)

iD8DBQFDAN1ufNdgYxVXvBARArrhAJ9fLP6YIVKsBWkxL/Y+2VDulPh4tgCeNE6J
2H0jgYNQlitdGqeZi3/LJGE=
=l3T3
-END PGP SIGNATURE-

--qMm9M+Fa2AknHoGS--

---
Received: (at 323318-close) by bugs.debian.org; 15 Dec 2005 03:51:52 +
From [EMAIL PROTECTED] Wed Dec 14 19:51:52 2005
Return-path: [EMAIL PROTECTED]
Received: from katie by spohr.debian.org with local (Exim 4.50)
id 1Emk5L-0006AI-2V; Wed, 14 Dec 2005 19:47:15 -0800
From: Simon Horman [EMAIL PROTECTED]
To: [EMAIL PROTECTED]
X-Katie: $Revision: 1.60 $
Subject: Bug#323318: fixed in kernel-source-2.4.27 2.4.27-10sarge1
Message-Id: [EMAIL PROTECTED]
Sender: Archive Administrator [EMAIL PROTECTED]
Date: Wed, 14 Dec 2005 19:47:15 -0800
X-Spam-Checker-Version: SpamAssassin 2.60-bugs.debian.org_2005_01_02 
(1.212-2003-09-23-exp) on spohr.debian.org
X-Spam-Level: 
X-Spam-Status: No, hits=-6.0 required=4.0 tests=BAYES_00,HAS_BUG_NUMBER 
autolearn=no version=2.60-bugs.debian.org_2005_01_02

Source: kernel-source-2.4.27
Source-Version: 2.4.27-10sarge1

We believe that the bug you reported is fixed in the latest version of
kernel-source-2.4.27, which is due to be installed in the Debian FTP archive:

kernel-doc-2.4.27_2.4.27-10sarge1_all.deb
  to pool/main/k/kernel-source-2.4.27/kernel-doc-2.4.27_2.4.27-10sarge1_all.deb
kernel-patch-debian-2.4.27_2.4.27-10sarge1_all.deb
  to 
pool/main/k/kernel-source-2.4.27/kernel-patch-debian-2.4.27_2.4.27-10sarge1_all.deb
kernel-source-2.4.27_2.4.27-10sarge1.diff.gz
  to 
pool/main/k/kernel-source-2.4.27/kernel-source-2.4.27_2.4.27-10sarge1.diff.gz
kernel-source-2.4.27_2.4.27-10sarge1.dsc
  to pool/main/k/kernel-source-2.4.27/kernel-source-2.4.27_2.4.27-10sarge1.dsc
kernel-source-2.4.27_2.4.27-10sarge1_all.deb
  to 
pool/main/k/kernel-source-2.4.27/kernel-source-2.4.27_2.4.27-10sarge1_all.deb
kernel-tree-2.4.27_2.4.27-10sarge1_all.deb
  to pool/main/k/kernel-source-2.4.27/kernel-tree-2.4.27_2.4.27-10sarge1_all.deb



A 

Bug#323059: marked as done (kernel-source-2.6.8 fails at make menuconfig command)

2005-12-14 Thread Debian Bug Tracking System
Your message dated Wed, 14 Dec 2005 19:47:25 -0800
with message-id [EMAIL PROTECTED]
and subject line Bug#323059: fixed in kernel-source-2.6.8 2.6.8-16sarge1
has caused the attached Bug report to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what I am
talking about this indicates a serious mail system misconfiguration
somewhere.  Please contact me immediately.)

Debian bug tracking system administrator
(administrator, Debian Bugs database)

--
Received: (at submit) by bugs.debian.org; 14 Aug 2005 13:23:05 +
From [EMAIL PROTECTED] Sun Aug 14 06:23:05 2005
Return-path: [EMAIL PROTECTED]
Received: from smtp102.sbc.mail.mud.yahoo.com [68.142.198.201] 
by spohr.debian.org with smtp (Exim 3.36 1 (Debian))
id 1E4IS9-00016j-00; Sun, 14 Aug 2005 06:23:05 -0700
Received: (qmail 65217 invoked from network); 14 Aug 2005 13:22:33 -
Received: from unknown (HELO localhost.localdomain) ([EMAIL 
PROTECTED]@67.67.247.95 with plain)
  by smtp102.sbc.mail.mud.yahoo.com with SMTP; 14 Aug 2005 13:22:33 -
Reply-To: [EMAIL PROTECTED]
To: [EMAIL PROTECTED]
Subject: kernel-source-2.6.8 fails at make menuconfig command
Date: Sun, 14 Aug 2005 08:22:30 -0500
From: Charles Lear [EMAIL PROTECTED]
Content-Type: text/plain; format=flowed; delsp=yes; charset=iso-8859-1
MIME-Version: 1.0
Content-Transfer-Encoding: 8bit
Message-ID: [EMAIL PROTECTED]
User-Agent: Opera M2/8.02 (Linux, build 1272)
Delivered-To: [EMAIL PROTECTED]
X-Spam-Checker-Version: SpamAssassin 2.60-bugs.debian.org_2005_01_02 
(1.212-2003-09-23-exp) on spohr.debian.org
X-Spam-Level: 
X-Spam-Status: No, hits=-8.0 required=4.0 tests=BAYES_00,HAS_PACKAGE 
autolearn=no version=2.60-bugs.debian.org_2005_01_02


Package: kernel-source
Version: 2.6.8

I installed the Deiban testing (Etch) version on 08-13-05 and have not been 
able to get the kernel-source-2.6.8 to compile. It consistently fails at the 
'make menuconfig' command. The only major difference I am aware of between this 
installation and previous examples is the recent inclusion of the gcc 4.0.1 
packages. See output below:

# make menuconfig
   HOSTCC  scripts/basic/fixdep
   HOSTCC  scripts/basic/split-include
   HOSTCC  scripts/basic/docproc
   SHIPPED scripts/kconfig/zconf.tab.h
   HOSTCC  scripts/kconfig/conf.o
   HOSTCC  scripts/kconfig/mconf.o
scripts/kconfig/mconf.c:91: error: static declaration of 'current_menu' 
followsnon-static declaration
scripts/kconfig/lkc.h:63: error: previous declaration of 'current_menu' was here
make[1]: *** [scripts/kconfig/mconf.o] Error 1
make: *** [menuconfig] Error 2

# gcc --version
gcc (GCC) 4.0.1 (Debian 4.0.1-2)
Copyright (C) 2005 Free Software Foundation, Inc.
This is free software; see the source for copying conditions.  There is NO
warranty; not even for MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.

# uname -a
Linux linux 2.6.8-2-k7 #1 Thu May 19 18:03:29 JST 2005 i686 GNU/Linux





---
Received: (at 323059-close) by bugs.debian.org; 15 Dec 2005 03:50:58 +
From [EMAIL PROTECTED] Wed Dec 14 19:50:58 2005
Return-path: [EMAIL PROTECTED]
Received: from katie by spohr.debian.org with local (Exim 4.50)
id 1Emk5V-0006BY-MI; Wed, 14 Dec 2005 19:47:25 -0800
From: Simon Horman [EMAIL PROTECTED]
To: [EMAIL PROTECTED]
X-Katie: $Revision: 1.60 $
Subject: Bug#323059: fixed in kernel-source-2.6.8 2.6.8-16sarge1
Message-Id: [EMAIL PROTECTED]
Sender: Archive Administrator [EMAIL PROTECTED]
Date: Wed, 14 Dec 2005 19:47:25 -0800
X-Spam-Checker-Version: SpamAssassin 2.60-bugs.debian.org_2005_01_02 
(1.212-2003-09-23-exp) on spohr.debian.org
X-Spam-Level: 
X-Spam-Status: No, hits=-5.0 required=4.0 tests=BAYES_01,HAS_BUG_NUMBER 
autolearn=no version=2.60-bugs.debian.org_2005_01_02

Source: kernel-source-2.6.8
Source-Version: 2.6.8-16sarge1

We believe that the bug you reported is fixed in the latest version of
kernel-source-2.6.8, which is due to be installed in the Debian FTP archive:

kernel-doc-2.6.8_2.6.8-16sarge1_all.deb
  to pool/main/k/kernel-source-2.6.8/kernel-doc-2.6.8_2.6.8-16sarge1_all.deb
kernel-patch-debian-2.6.8_2.6.8-16sarge1_all.deb
  to 
pool/main/k/kernel-source-2.6.8/kernel-patch-debian-2.6.8_2.6.8-16sarge1_all.deb
kernel-source-2.6.8_2.6.8-16sarge1.diff.gz
  to pool/main/k/kernel-source-2.6.8/kernel-source-2.6.8_2.6.8-16sarge1.diff.gz
kernel-source-2.6.8_2.6.8-16sarge1.dsc
  to pool/main/k/kernel-source-2.6.8/kernel-source-2.6.8_2.6.8-16sarge1.dsc
kernel-source-2.6.8_2.6.8-16sarge1_all.deb
  to pool/main/k/kernel-source-2.6.8/kernel-source-2.6.8_2.6.8-16sarge1_all.deb
kernel-tree-2.6.8_2.6.8-16sarge1_all.deb
  to pool/main/k/kernel-source-2.6.8/kernel-tree-2.6.8_2.6.8-16sarge1_all.deb



A summary of the 

kernel-source-2.6.8_2.6.8-16sarge1_i386.changes ACCEPTED

2005-12-14 Thread Debian Installer
Mapping stable-security to proposed-updates.

Accepted:
kernel-doc-2.6.8_2.6.8-16sarge1_all.deb
  to pool/main/k/kernel-source-2.6.8/kernel-doc-2.6.8_2.6.8-16sarge1_all.deb
kernel-patch-debian-2.6.8_2.6.8-16sarge1_all.deb
  to 
pool/main/k/kernel-source-2.6.8/kernel-patch-debian-2.6.8_2.6.8-16sarge1_all.deb
kernel-source-2.6.8_2.6.8-16sarge1.diff.gz
  to pool/main/k/kernel-source-2.6.8/kernel-source-2.6.8_2.6.8-16sarge1.diff.gz
kernel-source-2.6.8_2.6.8-16sarge1.dsc
  to pool/main/k/kernel-source-2.6.8/kernel-source-2.6.8_2.6.8-16sarge1.dsc
kernel-source-2.6.8_2.6.8-16sarge1_all.deb
  to pool/main/k/kernel-source-2.6.8/kernel-source-2.6.8_2.6.8-16sarge1_all.deb
kernel-tree-2.6.8_2.6.8-16sarge1_all.deb
  to pool/main/k/kernel-source-2.6.8/kernel-tree-2.6.8_2.6.8-16sarge1_all.deb
Announcing to debian-changes@lists.debian.org
Closing bugs: 309308 311357 317286 321401 322237 322339 323059 


Thank you for your contribution to Debian.


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



kernel-source-2.4.27_2.4.27-10sarge1_i386.changes ACCEPTED

2005-12-14 Thread Debian Installer
Mapping stable-security to proposed-updates.

Accepted:
kernel-doc-2.4.27_2.4.27-10sarge1_all.deb
  to pool/main/k/kernel-source-2.4.27/kernel-doc-2.4.27_2.4.27-10sarge1_all.deb
kernel-patch-debian-2.4.27_2.4.27-10sarge1_all.deb
  to 
pool/main/k/kernel-source-2.4.27/kernel-patch-debian-2.4.27_2.4.27-10sarge1_all.deb
kernel-source-2.4.27_2.4.27-10sarge1.diff.gz
  to 
pool/main/k/kernel-source-2.4.27/kernel-source-2.4.27_2.4.27-10sarge1.diff.gz
kernel-source-2.4.27_2.4.27-10sarge1.dsc
  to pool/main/k/kernel-source-2.4.27/kernel-source-2.4.27_2.4.27-10sarge1.dsc
kernel-source-2.4.27_2.4.27-10sarge1_all.deb
  to 
pool/main/k/kernel-source-2.4.27/kernel-source-2.4.27_2.4.27-10sarge1_all.deb
kernel-tree-2.4.27_2.4.27-10sarge1_all.deb
  to pool/main/k/kernel-source-2.4.27/kernel-tree-2.4.27_2.4.27-10sarge1_all.deb
Announcing to debian-changes@lists.debian.org
Closing bugs: 311164 319629 320256 323318 


Thank you for your contribution to Debian.


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Bug#343417: Several crashs in many machines.

2005-12-14 Thread Rodrigo Varella Rahmi
Package: kernel-image-2.4.27-nubus
Version: 2.4.27-11

When the kernel start to get some memory that was swapped, the
application that it need that memory almost in 90% of times will crash
when the quantity of memory it need is more than 30 megabytes of swapped
memory, causing illegal instructions (sig 4),or segfaults.Not mattering
the application (even Xserver, and init), when the system is in heavy
load (not so heavy) the app crash.

Sorry so much for my english, Im reporting that has occuring in more
than 1 year.

The machines crashing are all Macintosh Performas 5200 and 6300 series
(including others like 5215CD and 6320, not the 6360 that is PCI), tests
were made in several conditions of memorys and hard drives, the
distribution (Debian) in unimportant, MkLinux and MkLinux Mach Kernels
also crashing. I will try debug the kernel (with my short devel
knowledge), and report if I get something.



-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Processing of kernel-patch-powerpc-2.4.27_2.4.27-10sarge1_powerpc.changes

2005-12-14 Thread Archive Administrator
kernel-patch-powerpc-2.4.27_2.4.27-10sarge1_powerpc.changes uploaded 
successfully to localhost
along with the files:
  kernel-patch-powerpc-2.4.27_2.4.27-10sarge1.dsc
  kernel-patch-powerpc-2.4.27_2.4.27-10sarge1.tar.gz
  kernel-patch-2.4.27-apus_2.4.27-10sarge1_powerpc.deb
  kernel-headers-2.4.27-apus_2.4.27-10sarge1_powerpc.deb
  kernel-image-2.4.27-apus_2.4.27-10sarge1_powerpc.deb
  kernel-build-2.4.27-apus_2.4.27-10sarge1_powerpc.deb
  kernel-patch-2.4.27-nubus_2.4.27-10sarge1_powerpc.deb
  kernel-headers-2.4.27-nubus_2.4.27-10sarge1_powerpc.deb
  kernel-image-2.4.27-nubus_2.4.27-10sarge1_powerpc.deb
  kernel-build-2.4.27-nubus_2.4.27-10sarge1_powerpc.deb
  kernel-patch-2.4.27-powerpc_2.4.27-10sarge1_powerpc.deb
  kernel-headers-2.4.27-powerpc_2.4.27-10sarge1_powerpc.deb
  kernel-image-2.4.27-powerpc_2.4.27-10sarge1_powerpc.deb
  kernel-build-2.4.27-powerpc_2.4.27-10sarge1_powerpc.deb
  kernel-image-2.4.27-powerpc-smp_2.4.27-10sarge1_powerpc.deb
  kernel-build-2.4.27-powerpc-smp_2.4.27-10sarge1_powerpc.deb
  kernel-image-2.4.27-powerpc-small_2.4.27-10sarge1_powerpc.deb
  kernel-build-2.4.27-powerpc-small_2.4.27-10sarge1_powerpc.deb

Greetings,

Your Debian queue daemon


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Processing of kernel-image-2.4.27-i386_2.4.27-10sarge1_i386.changes

2005-12-14 Thread Archive Administrator
kernel-image-2.4.27-i386_2.4.27-10sarge1_i386.changes uploaded successfully to 
localhost
along with the files:
  kernel-image-2.4.27-i386_2.4.27-10sarge1.dsc
  kernel-image-2.4.27-i386_2.4.27-10sarge1.tar.gz
  kernel-headers-2.4.27-2_2.4.27-10sarge1_i386.deb
  kernel-pcmcia-modules-2.4.27-2-586tsc_2.4.27-10sarge1_i386.deb
  kernel-headers-2.4.27-2-586tsc_2.4.27-10sarge1_i386.deb
  kernel-image-2.4.27-2-586tsc_2.4.27-10sarge1_i386.deb
  kernel-pcmcia-modules-2.4.27-2-386_2.4.27-10sarge1_i386.deb
  kernel-headers-2.4.27-2-386_2.4.27-10sarge1_i386.deb
  kernel-image-2.4.27-2-386_2.4.27-10sarge1_i386.deb
  kernel-pcmcia-modules-2.4.27-2-686-smp_2.4.27-10sarge1_i386.deb
  kernel-headers-2.4.27-2-686-smp_2.4.27-10sarge1_i386.deb
  kernel-image-2.4.27-2-686-smp_2.4.27-10sarge1_i386.deb
  kernel-pcmcia-modules-2.4.27-2-686_2.4.27-10sarge1_i386.deb
  kernel-headers-2.4.27-2-686_2.4.27-10sarge1_i386.deb
  kernel-image-2.4.27-2-686_2.4.27-10sarge1_i386.deb
  kernel-pcmcia-modules-2.4.27-2-k6_2.4.27-10sarge1_i386.deb
  kernel-headers-2.4.27-2-k6_2.4.27-10sarge1_i386.deb
  kernel-image-2.4.27-2-k6_2.4.27-10sarge1_i386.deb
  kernel-pcmcia-modules-2.4.27-2-k7_2.4.27-10sarge1_i386.deb
  kernel-headers-2.4.27-2-k7_2.4.27-10sarge1_i386.deb
  kernel-image-2.4.27-2-k7_2.4.27-10sarge1_i386.deb
  kernel-pcmcia-modules-2.4.27-2-k7-smp_2.4.27-10sarge1_i386.deb
  kernel-headers-2.4.27-2-k7-smp_2.4.27-10sarge1_i386.deb
  kernel-image-2.4.27-2-k7-smp_2.4.27-10sarge1_i386.deb
  kernel-build-2.4.27-2_2.4.27-10sarge1_i386.deb

Greetings,

Your Debian queue daemon


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Processing of kernel-image-2.6.8-i386_2.6.8-16sarge1_i386.changes

2005-12-14 Thread Archive Administrator
kernel-image-2.6.8-i386_2.6.8-16sarge1_i386.changes uploaded successfully to 
localhost
along with the files:
  kernel-image-2.6.8-i386_2.6.8-16sarge1.dsc
  kernel-image-2.6.8-i386_2.6.8-16sarge1.tar.gz
  kernel-headers-2.6.8-2_2.6.8-16sarge1_i386.deb
  kernel-headers-2.6.8-2-686-smp_2.6.8-16sarge1_i386.deb
  kernel-image-2.6.8-2-686-smp_2.6.8-16sarge1_i386.deb
  kernel-headers-2.6.8-2-386_2.6.8-16sarge1_i386.deb
  kernel-image-2.6.8-2-386_2.6.8-16sarge1_i386.deb
  kernel-headers-2.6.8-2-686_2.6.8-16sarge1_i386.deb
  kernel-image-2.6.8-2-686_2.6.8-16sarge1_i386.deb
  kernel-headers-2.6.8-2-k7_2.6.8-16sarge1_i386.deb
  kernel-image-2.6.8-2-k7_2.6.8-16sarge1_i386.deb
  kernel-headers-2.6.8-2-k7-smp_2.6.8-16sarge1_i386.deb
  kernel-image-2.6.8-2-k7-smp_2.6.8-16sarge1_i386.deb

Greetings,

Your Debian queue daemon


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



kernel-image-2.4.27-i386_2.4.27-10sarge1_i386.changes ACCEPTED

2005-12-14 Thread Debian Installer
Mapping stable-security to proposed-updates.

Accepted:
kernel-build-2.4.27-2_2.4.27-10sarge1_i386.deb
  to 
pool/main/k/kernel-image-2.4.27-i386/kernel-build-2.4.27-2_2.4.27-10sarge1_i386.deb
kernel-headers-2.4.27-2-386_2.4.27-10sarge1_i386.deb
  to 
pool/main/k/kernel-image-2.4.27-i386/kernel-headers-2.4.27-2-386_2.4.27-10sarge1_i386.deb
kernel-headers-2.4.27-2-586tsc_2.4.27-10sarge1_i386.deb
  to 
pool/main/k/kernel-image-2.4.27-i386/kernel-headers-2.4.27-2-586tsc_2.4.27-10sarge1_i386.deb
kernel-headers-2.4.27-2-686-smp_2.4.27-10sarge1_i386.deb
  to 
pool/main/k/kernel-image-2.4.27-i386/kernel-headers-2.4.27-2-686-smp_2.4.27-10sarge1_i386.deb
kernel-headers-2.4.27-2-686_2.4.27-10sarge1_i386.deb
  to 
pool/main/k/kernel-image-2.4.27-i386/kernel-headers-2.4.27-2-686_2.4.27-10sarge1_i386.deb
kernel-headers-2.4.27-2-k6_2.4.27-10sarge1_i386.deb
  to 
pool/main/k/kernel-image-2.4.27-i386/kernel-headers-2.4.27-2-k6_2.4.27-10sarge1_i386.deb
kernel-headers-2.4.27-2-k7-smp_2.4.27-10sarge1_i386.deb
  to 
pool/main/k/kernel-image-2.4.27-i386/kernel-headers-2.4.27-2-k7-smp_2.4.27-10sarge1_i386.deb
kernel-headers-2.4.27-2-k7_2.4.27-10sarge1_i386.deb
  to 
pool/main/k/kernel-image-2.4.27-i386/kernel-headers-2.4.27-2-k7_2.4.27-10sarge1_i386.deb
kernel-headers-2.4.27-2_2.4.27-10sarge1_i386.deb
  to 
pool/main/k/kernel-image-2.4.27-i386/kernel-headers-2.4.27-2_2.4.27-10sarge1_i386.deb
kernel-image-2.4.27-2-386_2.4.27-10sarge1_i386.deb
  to 
pool/main/k/kernel-image-2.4.27-i386/kernel-image-2.4.27-2-386_2.4.27-10sarge1_i386.deb
kernel-image-2.4.27-2-586tsc_2.4.27-10sarge1_i386.deb
  to 
pool/main/k/kernel-image-2.4.27-i386/kernel-image-2.4.27-2-586tsc_2.4.27-10sarge1_i386.deb
kernel-image-2.4.27-2-686-smp_2.4.27-10sarge1_i386.deb
  to 
pool/main/k/kernel-image-2.4.27-i386/kernel-image-2.4.27-2-686-smp_2.4.27-10sarge1_i386.deb
kernel-image-2.4.27-2-686_2.4.27-10sarge1_i386.deb
  to 
pool/main/k/kernel-image-2.4.27-i386/kernel-image-2.4.27-2-686_2.4.27-10sarge1_i386.deb
kernel-image-2.4.27-2-k6_2.4.27-10sarge1_i386.deb
  to 
pool/main/k/kernel-image-2.4.27-i386/kernel-image-2.4.27-2-k6_2.4.27-10sarge1_i386.deb
kernel-image-2.4.27-2-k7-smp_2.4.27-10sarge1_i386.deb
  to 
pool/main/k/kernel-image-2.4.27-i386/kernel-image-2.4.27-2-k7-smp_2.4.27-10sarge1_i386.deb
kernel-image-2.4.27-2-k7_2.4.27-10sarge1_i386.deb
  to 
pool/main/k/kernel-image-2.4.27-i386/kernel-image-2.4.27-2-k7_2.4.27-10sarge1_i386.deb
kernel-image-2.4.27-i386_2.4.27-10sarge1.dsc
  to 
pool/main/k/kernel-image-2.4.27-i386/kernel-image-2.4.27-i386_2.4.27-10sarge1.dsc
kernel-image-2.4.27-i386_2.4.27-10sarge1.tar.gz
  to 
pool/main/k/kernel-image-2.4.27-i386/kernel-image-2.4.27-i386_2.4.27-10sarge1.tar.gz
kernel-pcmcia-modules-2.4.27-2-386_2.4.27-10sarge1_i386.deb
  to 
pool/main/k/kernel-image-2.4.27-i386/kernel-pcmcia-modules-2.4.27-2-386_2.4.27-10sarge1_i386.deb
kernel-pcmcia-modules-2.4.27-2-586tsc_2.4.27-10sarge1_i386.deb
  to 
pool/main/k/kernel-image-2.4.27-i386/kernel-pcmcia-modules-2.4.27-2-586tsc_2.4.27-10sarge1_i386.deb
kernel-pcmcia-modules-2.4.27-2-686-smp_2.4.27-10sarge1_i386.deb
  to 
pool/main/k/kernel-image-2.4.27-i386/kernel-pcmcia-modules-2.4.27-2-686-smp_2.4.27-10sarge1_i386.deb
kernel-pcmcia-modules-2.4.27-2-686_2.4.27-10sarge1_i386.deb
  to 
pool/main/k/kernel-image-2.4.27-i386/kernel-pcmcia-modules-2.4.27-2-686_2.4.27-10sarge1_i386.deb
kernel-pcmcia-modules-2.4.27-2-k6_2.4.27-10sarge1_i386.deb
  to 
pool/main/k/kernel-image-2.4.27-i386/kernel-pcmcia-modules-2.4.27-2-k6_2.4.27-10sarge1_i386.deb
kernel-pcmcia-modules-2.4.27-2-k7-smp_2.4.27-10sarge1_i386.deb
  to 
pool/main/k/kernel-image-2.4.27-i386/kernel-pcmcia-modules-2.4.27-2-k7-smp_2.4.27-10sarge1_i386.deb
kernel-pcmcia-modules-2.4.27-2-k7_2.4.27-10sarge1_i386.deb
  to 
pool/main/k/kernel-image-2.4.27-i386/kernel-pcmcia-modules-2.4.27-2-k7_2.4.27-10sarge1_i386.deb
Announcing to debian-changes@lists.debian.org


Thank you for your contribution to Debian.


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



kernel-image-2.6.8-i386_2.6.8-16sarge1_i386.changes ACCEPTED

2005-12-14 Thread Debian Installer
Mapping stable-security to proposed-updates.

Accepted:
kernel-headers-2.6.8-2-386_2.6.8-16sarge1_i386.deb
  to 
pool/main/k/kernel-image-2.6.8-i386/kernel-headers-2.6.8-2-386_2.6.8-16sarge1_i386.deb
kernel-headers-2.6.8-2-686-smp_2.6.8-16sarge1_i386.deb
  to 
pool/main/k/kernel-image-2.6.8-i386/kernel-headers-2.6.8-2-686-smp_2.6.8-16sarge1_i386.deb
kernel-headers-2.6.8-2-686_2.6.8-16sarge1_i386.deb
  to 
pool/main/k/kernel-image-2.6.8-i386/kernel-headers-2.6.8-2-686_2.6.8-16sarge1_i386.deb
kernel-headers-2.6.8-2-k7-smp_2.6.8-16sarge1_i386.deb
  to 
pool/main/k/kernel-image-2.6.8-i386/kernel-headers-2.6.8-2-k7-smp_2.6.8-16sarge1_i386.deb
kernel-headers-2.6.8-2-k7_2.6.8-16sarge1_i386.deb
  to 
pool/main/k/kernel-image-2.6.8-i386/kernel-headers-2.6.8-2-k7_2.6.8-16sarge1_i386.deb
kernel-headers-2.6.8-2_2.6.8-16sarge1_i386.deb
  to 
pool/main/k/kernel-image-2.6.8-i386/kernel-headers-2.6.8-2_2.6.8-16sarge1_i386.deb
kernel-image-2.6.8-2-386_2.6.8-16sarge1_i386.deb
  to 
pool/main/k/kernel-image-2.6.8-i386/kernel-image-2.6.8-2-386_2.6.8-16sarge1_i386.deb
kernel-image-2.6.8-2-686-smp_2.6.8-16sarge1_i386.deb
  to 
pool/main/k/kernel-image-2.6.8-i386/kernel-image-2.6.8-2-686-smp_2.6.8-16sarge1_i386.deb
kernel-image-2.6.8-2-686_2.6.8-16sarge1_i386.deb
  to 
pool/main/k/kernel-image-2.6.8-i386/kernel-image-2.6.8-2-686_2.6.8-16sarge1_i386.deb
kernel-image-2.6.8-2-k7-smp_2.6.8-16sarge1_i386.deb
  to 
pool/main/k/kernel-image-2.6.8-i386/kernel-image-2.6.8-2-k7-smp_2.6.8-16sarge1_i386.deb
kernel-image-2.6.8-2-k7_2.6.8-16sarge1_i386.deb
  to 
pool/main/k/kernel-image-2.6.8-i386/kernel-image-2.6.8-2-k7_2.6.8-16sarge1_i386.deb
kernel-image-2.6.8-i386_2.6.8-16sarge1.dsc
  to 
pool/main/k/kernel-image-2.6.8-i386/kernel-image-2.6.8-i386_2.6.8-16sarge1.dsc
kernel-image-2.6.8-i386_2.6.8-16sarge1.tar.gz
  to 
pool/main/k/kernel-image-2.6.8-i386/kernel-image-2.6.8-i386_2.6.8-16sarge1.tar.gz
Announcing to debian-changes@lists.debian.org


Thank you for your contribution to Debian.


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Bug#342248: [m68k headers] binaries are i386 - cannot execute binary file

2005-12-14 Thread Christian T. Steigies
Hi,
On Tue, Dec 06, 2005 at 03:48:40PM +0100, Max Vozeler wrote:
 Package: linux-2.6
 Version: 2.6.12-10
 Severity: important
 
 This bug is a bit weird :-)
 
 Apparently the binaries in m68k -headers were built for i386.

Yes, this may very well be possible, since the m68k linux-* packages were
cross-compiled on i386. Since the linux-image-* packages are built in the
same run, and they are properly cross-compiled for m68k and actually work
(at least) on (my) m68k boxes, this must be a bug in the linux-headers build
rules, they should be cross-compiled, too. Can somebody look into that?

 This breaks builds of external modules as they try to execute eg.
 scripts/basic/fixdep on m68k.

Do you have any external modules for m68k that are not part of the kernel?
Who is supplying those?

Christian


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Bug#343424: linux-doc-2.6.14: s/varios/various/ typo in long description

2005-12-14 Thread Justin Pryzby
Package: linux-doc-2.6.14
Version: 2.6.14-4
Severity: minor

Please s/varios/various/ in the long description.


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]