An important question wich have been on my mind for a long time
Why is there so much more security patches in the redhat kernel, compare here: http://cve.mitre.org/cgi-bin/cvekey.cgi?keyword=redhat+kernel http://cve.mitre.org/cgi-bin/cvekey.cgi?keyword=debian+kernel when alot of the advisories seems to be affect debian as well? Is it up to the wendor to see if this affeft it`s distro or does CVE do that? Or look at Ubuntu wich I guess will have more or less same kernel source: http://www.ubuntulinux.org/usn/usn-219-1 http://www.ubuntulinux.org/usn/usn-199-1 http://www.ubuntulinux.org/usn/usn-187-1 http://www.ubuntulinux.org/usn/usn-178-1 http://www.ubuntulinux.org/usn/usn-169-1 http://www.ubuntulinux.org/usn/usn-143-1 http://www.ubuntulinux.org/usn/usn-137-1 http://www.ubuntulinux.org/usn/usn-131-1 http://www.ubuntulinux.org/usn/usn-110-1 http://www.ubuntulinux.org/usn/usn-103-1 Can someone give me an answear on this? For to me it seems that CVE lists if there are an security issue, and it`s up to the vendor to see if it affects em... Regards Thomas Skybakmoen
Bug#343302: initramfs-tools: should not regenerate images on upgrade
Package: initramfs-tools Severity: important The latest version of initramfs-tools (0.44) calls update-initramfs in postinst to regenerate the latest initramfs on upgrades (see initramfs-tools changelog, version 0.40ubuntu6). This can be potentially very dangerous if the newer initramfs-tools for some reason generates unbootable images as all images will be replaced with unbootable ones (meaning that even older kernels kept in /boot as a fallback solution might fail). For instance, earlier combinations of initramfs-tools and udev automatically loaded the ide-disk module for me. 0.44 doesn't and since it replaced all initramfs-images without warning, none of my kernels boot (ok, it was simple to fix, insmod the module, resume boot, then fix the error and regenerate the images). I think the auto-regereration should: o be reverted; or o carry a big warning; or o be configurable Regards, David -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
RE: Please Build 2.4.27-12 for Sid
Hi Simon 2.4.27-12 has been released into sid, this is a call to rebuild for all the different architectures. So far it is only available for i386 (which I built). I'll get powerpc rolling, I had mistakenly thought it was removed from Sid. Perhaps it should be, we can address that another day. I'm happy to do some more builds, but doing all of them is a little daunting. http://people.debian.org/~dannf/kernel-stats/kernel-avail.html Also, if an arch should not be built lets start a list. Hm, I'm not sure whether I'm overlooking something here, but I don't think that kernel-tree-2.4.27-12 nor kernel-source-2.4.27-12 are actually in the archive. As I am actually waiting for the latter to show up to be able to fix #336277, I'm eagerly awaiting your response. -- Horms Cheers Andree -- Andree Leidenfrost Sydney - Australia signature.asc Description: This is a digitally signed message part
Re: linux-source-2.6.15 (2.6.14+2.6.15-rc5-0experimental.1) and bcm43xx
Michael Schmitz [EMAIL PROTECTED] writes: Thanks. But the vanilla kernel-2.6.15-rc5 has not this problem. Confirmed. So we conclude linux-source-2.6.15 is broken. No. We concluded that linux-source-2.6.15 has a patch that broke it. I'm adding Debian kernel Team on CC for reference. -- O T A V I OS A L V A D O R - E-mail: [EMAIL PROTECTED] UIN: 5906116 GNU/Linux User: 239058 GPG ID: 49A5F855 Home Page: http://www.freedom.ind.br/otavio - Microsoft gives you Windows ... Linux gives you the whole house. -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
Re: Please Build 2.4.27-12 for Sid
On Wed, Dec 14, 2005 at 10:57:49AM +0900, Horms wrote: 2.4.27-12 has been released into sid, this is a call to rebuild for all the different architectures. So far it is only available for i386 (which I built). I'll get powerpc rolling, I had mistakenly thought it was removed from Sid. Perhaps it should be, we can address that another day. only the nubus kernel is still available in sid for powerpc, and as long as there is no 2.6 port, it will have to stay. It is a not officially supported subarch though, and has a very minot userbase (like you can probably count them on your fingers), so it is not high priority. Friendly, Sven Luther -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
Re: Please Build 2.4.27-12 for Sid
Horms wrote: 2.4.27-12 has been released into sid, this is a call to rebuild for all the different architectures. So far it is only available for i386 (which I built). I'll get powerpc rolling, I had mistakenly thought it was removed from Sid. Perhaps it should be, we can address that another day. I'm happy to do some more builds, but doing all of them is a little daunting. Unfortunately I don't have time for mips/mipsel kernels the next days (and not even a way to test them). Thiemo -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
Bug#343048: Additional information
Suggest merge with #343042, it seems this is happening to lots of people. I attempted the fix mentioned in #343042, adding MODULE ide-generic and MODULE ide-disk to /etc/haird/Default.cfg, and running yaird -v -o /boot/initrd.img-2.6.14-2-686 2.6.14-2-686, but the same error occured. I have not yet downgraded yaird. Curt- -- September 11th, 2001 The proudest day for gun control and central planning advocates in American history -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
Bug#330664: Bug still pending - cont give more info ATM ...
I did not forget that bug; and I would like to solve it ASAP. - it seems to me that my bug is not generic to the Debian-Alpha-SMP kernels, but rather directly to all Linux-SMP due to a likely bug in the PCI device Qlogick 4010 (scsi card) with some module like qlasomething I think about that because all Gentoo SMP kernels 2.6 also hang on Alpha, and also 'ANY' SMP kernel in x86 when I insert that PCI card in my computer (either kernel hand build, Debian, Gentoo) (only SMP kernel, whatever there are 1 or many CPUs, SMP kernels only - does not hang with non SMP kernels on multi CPU computers ) Thats the actual way I am working ... but, before confirming any thing, I need to: come back home where I have access to suffisant hardware (SMP x86 and alpha box, the faulty QLA, compile SMP and non SMP kernels for all of theose box, greb my serial cable to dumps Linux logs, and most difficult: boot my Alpha systems on the required SCSI drives but without having to use the QLA board !!!) practical infos and relevant test are coming quiet late because it takes ages to perform enough cross tests ... (especially when you have only one CPU running on a quadri MB to compile stuff) * I am not forgetting that I opened a CRITICAL bug. * Note: qla driver is loaded by busy box in ramdisk on Debian, when I need to do 2 tests on Gentoo to help debing the Debian problem: - boot scsi with non QLA driver - boot scsi with non QLA driver, then load the qla driver with hardware NOT present - boot scsi with non QLA driver, with QLA hardware present but no driver - boot scsi with non QLA driver, with QLA hardware present, and load driver manually (disable udev) - boot scsi with QLA driver build static (in case some one have time to perform those tests before me) apart from the fact I could use hand made kernel under Debian, I am not able ATM to ask the Debian kernels not to use busybox and/or udev at boot time (those fitting the ramdisk). Thats why I need to try hand made kernel with Debian, then Gentoo, with both udev desactivated, and see whats up when loading the QLA driver manually. A kernel bug /should/ be distribution independant, and should not tell about Gentoo in Debian BTS ... I know. But some times, it is faster using an alternate distro to try fast tests than finding out 'who to desactivate that feature' n a given distro. Logging that is also slown down with 2 other bugs I am having with the Linux kernel on my machines. Sorry. -- DEMAINE Benoit-Pierre (aka DoubleHP ) http://www.demaine.info/ \_o If computing were an exact science, IT engineers would not have work o_/ -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
Bug#342562: not in sid
On Wed, 2005-12-14 at 10:41 -0500, Rich Johnson wrote: On Dec 12, 2005, at 1:13 PM, dann frazier wrote: You are trying to build 2.6.8 with gcc 4. 2.6.8 isn't in sid and gcc 4 isn't in sarge. Closing. If you want to build this on sid anyway, try setting CC to gcc-3.3 in your kernel Makefile. Acknowleged, butshouldn't some utility like autoconfig or apt- get builddep be sorting this out? If it was still in sid, yes. But since this package is not in sid, there's no vehicle to add that. If a non-security update is ever allowed in sarge, there's a pending patch to hardcode it to use gcc 3; but I wouldn't count on that happening anytime soon. -- dann frazier [EMAIL PROTECTED] -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
Bug#343363: package linux-image-2.6.14-2-686 won't install due to a post-installation script error.
Package: linux-image-2.6.14-2-686 Version: 2.6.14-5 Severity: grave Justification: renders package unusable Installing (or upgrading) the package linux-image-2.6.14-2-686 the post-installation script returns error code 128. Configuro linux-image-2.6.14-2-686 (2.6.14-5) ... Running depmod. Finding valid ramdisk creators. Using mkinitrd.yaird to build the ramdisk. Running postinst hook. Searching for GRUB installation directory ... found: /boot/grub dpkg: errore processando linux-image-2.6.14-2-686 (--configure): il sottoprocesso post-installation script ha restituito un codice di errore 128 Problem cannot be fixed running apt-get install -f, and/or dpkg --configure -a. Trying to remove the package (not fully configurated) is the post-removal script that returns error code 128. -- System Information: Debian Release: testing/unstable APT prefers unstable APT policy: (500, 'unstable'), (500, 'stable'), (1, 'experimental') Architecture: i386 (i686) Shell: /bin/sh linked to /bin/bash Kernel: Linux 2.6.14-1-686 Locale: [EMAIL PROTECTED], [EMAIL PROTECTED] (charmap=UTF-8) Versions of packages linux-image-2.6.14-2-686 depends on: ii module-init-tools 3.2.2-1tools for managing Linux kernel mo ii yaird [linux-initramfs-tool] 0.0.12-1 Yet Another mkInitRD Versions of packages linux-image-2.6.14-2-686 recommends: pn libc6-i686none (no description available) -- debconf information: linux-image-2.6.14-2-686/preinst/initrd-2.6.14-2-686: linux-image-2.6.14-2-686/preinst/bootloader-initrd-2.6.14-2-686: true linux-image-2.6.14-2-686/postinst/old-system-map-link-2.6.14-2-686: true linux-image-2.6.14-2-686/preinst/failed-to-move-modules-2.6.14-2-686: linux-image-2.6.14-2-686/preinst/elilo-initrd-2.6.14-2-686: true linux-image-2.6.14-2-686/preinst/abort-install-2.6.14-2-686: linux-image-2.6.14-2-686/preinst/lilo-initrd-2.6.14-2-686: true linux-image-2.6.14-2-686/postinst/depmod-error-2.6.14-2-686: false linux-image-2.6.14-2-686/postinst/bootloader-test-error-2.6.14-2-686: linux-image-2.6.14-2-686/postinst/bootloader-error-2.6.14-2-686: linux-image-2.6.14-2-686/preinst/abort-overwrite-2.6.14-2-686: * linux-image-2.6.14-2-686/preinst/already-running-this-2.6.14-2-686: linux-image-2.6.14-2-686/preinst/lilo-has-ramdisk: linux-image-2.6.14-2-686/postinst/create-kimage-link-2.6.14-2-686: true linux-image-2.6.14-2-686/postinst/depmod-error-initrd-2.6.14-2-686: false linux-image-2.6.14-2-686/postinst/old-dir-initrd-link-2.6.14-2-686: true linux-image-2.6.14-2-686/prerm/would-invalidate-boot-loader-2.6.14-2-686: true * linux-image-2.6.14-2-686/preinst/overwriting-modules-2.6.14-2-686: false linux-image-2.6.14-2-686/postinst/kimage-is-a-directory: linux-image-2.6.14-2-686/prerm/removing-running-kernel-2.6.14-2-686: true linux-image-2.6.14-2-686/postinst/old-initrd-link-2.6.14-2-686: true -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
bigphysarea patch for 2.6
Hello. Would it be possible to include the bigphysarea patch in Debian 2.6 kernels, and enable it by default? It is necessary for hardware which has large DMA buffers and which does not support scatter-gather DMA. Example: Zoran ZR36067. It also does not bother anything else by being enabled since its memory must be reserved by a boot parameter. I don't know who is officially maintaining the patch, but I used this particular one with 2.6.14: http://pv105234.reshsg.uci.edu/~jfeise/Downloads/zr36120/ This patch has been around for a long time, and I have no idea the reasons why it has not been merged in the mainline kernel. Please Cc: on reply. -- Ryan Underwood, [EMAIL PROTECTED] -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
Bug#343363: package linux-image-2.6.14-2-686 won't install due to a post-installation script error.
reassign 343363 kernel-package stop On Wed, Dec 14, 2005 at 07:33:56PM +0100, Andrea Franzese wrote: Package: linux-image-2.6.14-2-686 Version: 2.6.14-5 Severity: grave Justification: renders package unusable Installing (or upgrading) the package linux-image-2.6.14-2-686 the post-installation script returns error code 128. Configuro linux-image-2.6.14-2-686 (2.6.14-5) ... Running depmod. Finding valid ramdisk creators. Using mkinitrd.yaird to build the ramdisk. Running postinst hook. Searching for GRUB installation directory ... found: /boot/grub dpkg: errore processando linux-image-2.6.14-2-686 (--configure): il sottoprocesso post-installation script ha restituito un codice di errore 128 Problem cannot be fixed running apt-get install -f, and/or dpkg --configure -a. Trying to remove the package (not fully configurated) is the post-removal script that returns error code 128. the severity might be a bit exagerated. Manoj that was the error we discussed on irc a while ago, thus reassigning. regards -- maks -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
Processed: Re: Bug#343363: package linux-image-2.6.14-2-686 won't install due to a post-installation script error.
Processing commands for [EMAIL PROTECTED]: reassign 343363 kernel-package Bug#343363: package linux-image-2.6.14-2-686 won't install due to a post-installation script error. Bug reassigned from package `linux-image-2.6.14-2-686' to `kernel-package'. stop Stopping processing here. Please contact me if you need assistance. Debian bug tracking system administrator (administrator, Debian Bugs database) -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
Processing of kernel-image-2.4.27-alpha_2.4.27-10sarge1_alpha.changes
kernel-image-2.4.27-alpha_2.4.27-10sarge1_alpha.changes uploaded successfully to localhost along with the files: kernel-image-2.4.27-alpha_2.4.27-10sarge1.dsc kernel-image-2.4.27-alpha_2.4.27-10sarge1.tar.gz kernel-headers-2.4.27-2_2.4.27-10sarge1_alpha.deb kernel-headers-2.4.27-2-generic_2.4.27-10sarge1_alpha.deb kernel-image-2.4.27-2-generic_2.4.27-10sarge1_alpha.deb kernel-headers-2.4.27-2-smp_2.4.27-10sarge1_alpha.deb kernel-image-2.4.27-2-smp_2.4.27-10sarge1_alpha.deb kernel-build-2.4.27-2_2.4.27-10sarge1_alpha.deb Greetings, Your Debian queue daemon -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
Processing of kernel-image-2.4.27-ia64_2.4.27-10sarge1_ia64.changes
kernel-image-2.4.27-ia64_2.4.27-10sarge1_ia64.changes uploaded successfully to localhost along with the files: kernel-image-2.4.27-ia64_2.4.27-10sarge1.dsc kernel-image-2.4.27-ia64_2.4.27-10sarge1.tar.gz kernel-headers-2.4.27-2_2.4.27-10sarge1_ia64.deb kernel-image-2.4-itanium-smp_2.4.27-10sarge1_ia64.deb kernel-headers-2.4.27-2-itanium-smp_2.4.27-10sarge1_ia64.deb kernel-image-2.4.27-2-itanium-smp_2.4.27-10sarge1_ia64.deb kernel-image-2.4-itanium_2.4.27-10sarge1_ia64.deb kernel-headers-2.4.27-2-itanium_2.4.27-10sarge1_ia64.deb kernel-image-2.4.27-2-itanium_2.4.27-10sarge1_ia64.deb kernel-image-2.4-mckinley-smp_2.4.27-10sarge1_ia64.deb kernel-headers-2.4.27-2-mckinley-smp_2.4.27-10sarge1_ia64.deb kernel-image-2.4.27-2-mckinley-smp_2.4.27-10sarge1_ia64.deb kernel-image-2.4-mckinley_2.4.27-10sarge1_ia64.deb kernel-headers-2.4.27-2-mckinley_2.4.27-10sarge1_ia64.deb kernel-image-2.4.27-2-mckinley_2.4.27-10sarge1_ia64.deb kernel-build-2.4.27-2_2.4.27-10sarge1_ia64.deb Greetings, Your Debian queue daemon -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
Processing of kernel-image-2.4.27-i386_2.4.27-10sarge1_i386.changes
PGP/GnuPG signature check failed on kernel-image-2.4.27-i386_2.4.27-10sarge1_i386.changes gpg: Signature made Wed Aug 17 18:49:36 2005 PDT using DSA key ID 87B1CFB5 gpg: Can't check signature: public key not found (Exit status 2) kernel-image-2.4.27-i386_2.4.27-10sarge1_i386.changes has bad PGP/GnuPG signature! Removing kernel-image-2.4.27-i386_2.4.27-10sarge1_i386.changes, but keeping its associated files for now. Greetings, Your Debian queue daemon -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
Processing of kernel-image-2.4.27-sparc_2.4.27-9sarge1_sparc.changes
kernel-image-2.4.27-sparc_2.4.27-9sarge1_sparc.changes uploaded successfully to localhost along with the files: kernel-image-2.4.27-sparc_2.4.27-9sarge1.dsc kernel-image-2.4.27-sparc_2.4.27-9sarge1.tar.gz kernel-headers-2.4.27-2_2.4.27-9sarge1_sparc.deb kernel-headers-2.4.27-2-sparc32-smp_2.4.27-9sarge1_sparc.deb kernel-image-2.4.27-2-sparc32-smp_2.4.27-9sarge1_sparc.deb kernel-headers-2.4.27-2-sparc32_2.4.27-9sarge1_sparc.deb kernel-image-2.4.27-2-sparc32_2.4.27-9sarge1_sparc.deb kernel-headers-2.4.27-2-sparc64-smp_2.4.27-9sarge1_sparc.deb kernel-image-2.4.27-2-sparc64-smp_2.4.27-9sarge1_sparc.deb kernel-headers-2.4.27-2-sparc64_2.4.27-9sarge1_sparc.deb kernel-image-2.4.27-2-sparc64_2.4.27-9sarge1_sparc.deb kernel-build-2.4.27-2_2.4.27-9sarge1_sparc.deb Greetings, Your Debian queue daemon -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
Processing of kernel-patch-powerpc-2.4.27_2.4.27-10sarge1_powerpc.changes
PGP/GnuPG signature check failed on kernel-patch-powerpc-2.4.27_2.4.27-10sarge1_powerpc.changes gpg: Signature made Wed Aug 17 18:50:26 2005 PDT using DSA key ID 87B1CFB5 gpg: Can't check signature: public key not found (Exit status 2) kernel-patch-powerpc-2.4.27_2.4.27-10sarge1_powerpc.changes has bad PGP/GnuPG signature! Removing kernel-patch-powerpc-2.4.27_2.4.27-10sarge1_powerpc.changes, but keeping its associated files for now. Greetings, Your Debian queue daemon -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
Processing of kernel-source-2.4.27_2.4.27-10sarge1_i386.changes
kernel-source-2.4.27_2.4.27-10sarge1_i386.changes uploaded successfully to localhost along with the files: kernel-source-2.4.27_2.4.27-10sarge1.dsc kernel-source-2.4.27_2.4.27-10sarge1.diff.gz kernel-source-2.4.27_2.4.27.orig.tar.gz kernel-patch-debian-2.4.27_2.4.27-10sarge1_all.deb kernel-doc-2.4.27_2.4.27-10sarge1_all.deb kernel-source-2.4.27_2.4.27-10sarge1_all.deb kernel-tree-2.4.27_2.4.27-10sarge1_all.deb Greetings, Your Debian queue daemon -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
Processing of kernel-image-2.6.8-alpha_2.6.8-16sarge1_alpha.changes
kernel-image-2.6.8-alpha_2.6.8-16sarge1_alpha.changes uploaded successfully to localhost along with the files: kernel-image-2.6.8-alpha_2.6.8-16sarge1.dsc kernel-image-2.6.8-alpha_2.6.8-16sarge1.tar.gz kernel-headers-2.6.8-2_2.6.8-16sarge1_alpha.deb kernel-headers-2.6.8-2-generic_2.6.8-16sarge1_alpha.deb kernel-image-2.6.8-2-generic_2.6.8-16sarge1_alpha.deb kernel-headers-2.6.8-2-smp_2.6.8-16sarge1_alpha.deb kernel-image-2.6.8-2-smp_2.6.8-16sarge1_alpha.deb Greetings, Your Debian queue daemon -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
Processing of kernel-image-2.6.8-amd64_2.6.8-16sarge1_i386.changes
kernel-image-2.6.8-amd64_2.6.8-16sarge1_i386.changes uploaded successfully to localhost along with the files: kernel-image-2.6.8-amd64_2.6.8-16sarge1.dsc kernel-image-2.6.8-amd64_2.6.8-16sarge1.tar.gz kernel-headers-2.6.8-11_2.6.8-16sarge1_i386.deb kernel-headers-2.6.8-11-amd64-generic_2.6.8-16sarge1_i386.deb kernel-image-2.6.8-11-amd64-generic_2.6.8-16sarge1_i386.deb kernel-headers-2.6.8-11-amd64-k8-smp_2.6.8-16sarge1_i386.deb kernel-image-2.6.8-11-amd64-k8-smp_2.6.8-16sarge1_i386.deb kernel-headers-2.6.8-11-em64t-p4_2.6.8-16sarge1_i386.deb kernel-image-2.6.8-11-em64t-p4_2.6.8-16sarge1_i386.deb kernel-headers-2.6.8-11-em64t-p4-smp_2.6.8-16sarge1_i386.deb kernel-image-2.6.8-11-em64t-p4-smp_2.6.8-16sarge1_i386.deb kernel-headers-2.6.8-11-amd64-k8_2.6.8-16sarge1_i386.deb kernel-image-2.6.8-11-amd64-k8_2.6.8-16sarge1_i386.deb Greetings, Your Debian queue daemon -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
Processing of kernel-image-2.6.8-i386_2.6.8-16sarge1_i386.changes
PGP/GnuPG signature check failed on kernel-image-2.6.8-i386_2.6.8-16sarge1_i386.changes gpg: Signature made Tue Aug 16 19:17:24 2005 PDT using DSA key ID 87B1CFB5 gpg: Can't check signature: public key not found (Exit status 2) kernel-image-2.6.8-i386_2.6.8-16sarge1_i386.changes has bad PGP/GnuPG signature! Removing kernel-image-2.6.8-i386_2.6.8-16sarge1_i386.changes, but keeping its associated files for now. Greetings, Your Debian queue daemon -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
Processing of kernel-image-2.6.8-ia64_2.6.8-14sarge1_ia64.changes
kernel-image-2.6.8-ia64_2.6.8-14sarge1_ia64.changes uploaded successfully to localhost along with the files: kernel-image-2.6.8-ia64_2.6.8-14sarge1.dsc kernel-image-2.6.8-ia64_2.6.8-14sarge1.tar.gz kernel-headers-2.6.8-2_2.6.8-14sarge1_ia64.deb kernel-headers-2.6-itanium-smp_2.6.8-14sarge1_ia64.deb kernel-image-2.6-itanium-smp_2.6.8-14sarge1_ia64.deb kernel-headers-2.6.8-2-itanium-smp_2.6.8-14sarge1_ia64.deb kernel-image-2.6.8-2-itanium-smp_2.6.8-14sarge1_ia64.deb kernel-headers-2.6-mckinley-smp_2.6.8-14sarge1_ia64.deb kernel-image-2.6-mckinley-smp_2.6.8-14sarge1_ia64.deb kernel-headers-2.6.8-2-mckinley-smp_2.6.8-14sarge1_ia64.deb kernel-image-2.6.8-2-mckinley-smp_2.6.8-14sarge1_ia64.deb kernel-headers-2.6-itanium_2.6.8-14sarge1_ia64.deb kernel-image-2.6-itanium_2.6.8-14sarge1_ia64.deb kernel-headers-2.6.8-2-itanium_2.6.8-14sarge1_ia64.deb kernel-image-2.6.8-2-itanium_2.6.8-14sarge1_ia64.deb kernel-headers-2.6-mckinley_2.6.8-14sarge1_ia64.deb kernel-image-2.6-mckinley_2.6.8-14sarge1_ia64.deb kernel-headers-2.6.8-2-mckinley_2.6.8-14sarge1_ia64.deb kernel-image-2.6.8-2-mckinley_2.6.8-14sarge1_ia64.deb Greetings, Your Debian queue daemon -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
Processing of kernel-image-2.6.8-s390_2.6.8-5sarge1_s390.changes
kernel-image-2.6.8-s390_2.6.8-5sarge1_s390.changes uploaded successfully to localhost along with the files: kernel-image-2.6.8-s390_2.6.8-5sarge1.dsc kernel-image-2.6.8-s390_2.6.8-5sarge1.tar.gz kernel-patch-2.6.8-s390_2.6.8-5sarge1_all.deb kernel-headers-2.6.8-2_2.6.8-5sarge1_s390.deb kernel-image-2.6.8-2-s390_2.6.8-5sarge1_s390.deb kernel-image-2.6.8-2-s390x_2.6.8-5sarge1_s390.deb kernel-image-2.6.8-2-s390-tape_2.6.8-5sarge1_s390.deb Greetings, Your Debian queue daemon -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
Processing of kernel-image-2.6.8-sparc_2.6.8-15sarge1_sparc.changes
kernel-image-2.6.8-sparc_2.6.8-15sarge1_sparc.changes uploaded successfully to localhost along with the files: kernel-image-2.6.8-sparc_2.6.8-15sarge1.dsc kernel-image-2.6.8-sparc_2.6.8-15sarge1.tar.gz kernel-headers-2.6.8-2_2.6.8-15sarge1_sparc.deb kernel-headers-2.6.8-2-sparc32_2.6.8-15sarge1_sparc.deb kernel-image-2.6.8-2-sparc32_2.6.8-15sarge1_sparc.deb kernel-headers-2.6.8-2-sparc64_2.6.8-15sarge1_sparc.deb kernel-image-2.6.8-2-sparc64_2.6.8-15sarge1_sparc.deb kernel-headers-2.6.8-2-sparc64-smp_2.6.8-15sarge1_sparc.deb kernel-image-2.6.8-2-sparc64-smp_2.6.8-15sarge1_sparc.deb kernel-build-2.6.8-2_2.6.8-15sarge1_sparc.deb Greetings, Your Debian queue daemon -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
Processing of kernel-patch-powerpc-2.6.8_2.6.8-12sarge1_powerpc.changes
kernel-patch-powerpc-2.6.8_2.6.8-12sarge1_powerpc.changes uploaded successfully to localhost along with the files: kernel-patch-powerpc-2.6.8_2.6.8-12sarge1.dsc kernel-patch-powerpc-2.6.8_2.6.8-12sarge1.tar.gz kernel-headers-2.6.8_2.6.8-12sarge1_powerpc.deb kernel-image-2.6.8-power3_2.6.8-12sarge1_powerpc.deb kernel-build-2.6.8-power3_2.6.8-12sarge1_powerpc.deb kernel-image-2.6.8-power3-smp_2.6.8-12sarge1_powerpc.deb kernel-build-2.6.8-power3-smp_2.6.8-12sarge1_powerpc.deb kernel-image-2.6.8-power4_2.6.8-12sarge1_powerpc.deb kernel-build-2.6.8-power4_2.6.8-12sarge1_powerpc.deb kernel-image-2.6.8-power4-smp_2.6.8-12sarge1_powerpc.deb kernel-build-2.6.8-power4-smp_2.6.8-12sarge1_powerpc.deb kernel-image-2.6.8-powerpc_2.6.8-12sarge1_powerpc.deb kernel-build-2.6.8-powerpc_2.6.8-12sarge1_powerpc.deb kernel-image-2.6.8-powerpc-smp_2.6.8-12sarge1_powerpc.deb kernel-build-2.6.8-powerpc-smp_2.6.8-12sarge1_powerpc.deb Greetings, Your Debian queue daemon -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
Processing of kernel-source-2.6.8_2.6.8-16sarge1_i386.changes
kernel-source-2.6.8_2.6.8-16sarge1_i386.changes uploaded successfully to localhost along with the files: kernel-source-2.6.8_2.6.8-16sarge1.dsc kernel-source-2.6.8_2.6.8-16sarge1.diff.gz kernel-source-2.6.8_2.6.8.orig.tar.gz kernel-patch-debian-2.6.8_2.6.8-16sarge1_all.deb kernel-source-2.6.8_2.6.8-16sarge1_all.deb kernel-tree-2.6.8_2.6.8-16sarge1_all.deb kernel-doc-2.6.8_2.6.8-16sarge1_all.deb Greetings, Your Debian queue daemon -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
kernel-image-2.6.8-s390_2.6.8-5sarge1_s390.changes ACCEPTED
Mapping stable-security to proposed-updates. Accepted: kernel-headers-2.6.8-2_2.6.8-5sarge1_s390.deb to pool/main/k/kernel-image-2.6.8-s390/kernel-headers-2.6.8-2_2.6.8-5sarge1_s390.deb kernel-image-2.6.8-2-s390-tape_2.6.8-5sarge1_s390.deb to pool/main/k/kernel-image-2.6.8-s390/kernel-image-2.6.8-2-s390-tape_2.6.8-5sarge1_s390.deb kernel-image-2.6.8-2-s390_2.6.8-5sarge1_s390.deb to pool/main/k/kernel-image-2.6.8-s390/kernel-image-2.6.8-2-s390_2.6.8-5sarge1_s390.deb kernel-image-2.6.8-2-s390x_2.6.8-5sarge1_s390.deb to pool/main/k/kernel-image-2.6.8-s390/kernel-image-2.6.8-2-s390x_2.6.8-5sarge1_s390.deb kernel-image-2.6.8-s390_2.6.8-5sarge1.dsc to pool/main/k/kernel-image-2.6.8-s390/kernel-image-2.6.8-s390_2.6.8-5sarge1.dsc kernel-image-2.6.8-s390_2.6.8-5sarge1.tar.gz to pool/main/k/kernel-image-2.6.8-s390/kernel-image-2.6.8-s390_2.6.8-5sarge1.tar.gz kernel-patch-2.6.8-s390_2.6.8-5sarge1_all.deb to pool/main/k/kernel-image-2.6.8-s390/kernel-patch-2.6.8-s390_2.6.8-5sarge1_all.deb Announcing to debian-changes@lists.debian.org Thank you for your contribution to Debian. -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
kernel-image-2.4.27-alpha_2.4.27-10sarge1_alpha.changes ACCEPTED
Mapping stable-security to proposed-updates. Accepted: kernel-build-2.4.27-2_2.4.27-10sarge1_alpha.deb to pool/main/k/kernel-image-2.4.27-alpha/kernel-build-2.4.27-2_2.4.27-10sarge1_alpha.deb kernel-headers-2.4.27-2-generic_2.4.27-10sarge1_alpha.deb to pool/main/k/kernel-image-2.4.27-alpha/kernel-headers-2.4.27-2-generic_2.4.27-10sarge1_alpha.deb kernel-headers-2.4.27-2-smp_2.4.27-10sarge1_alpha.deb to pool/main/k/kernel-image-2.4.27-alpha/kernel-headers-2.4.27-2-smp_2.4.27-10sarge1_alpha.deb kernel-headers-2.4.27-2_2.4.27-10sarge1_alpha.deb to pool/main/k/kernel-image-2.4.27-alpha/kernel-headers-2.4.27-2_2.4.27-10sarge1_alpha.deb kernel-image-2.4.27-2-generic_2.4.27-10sarge1_alpha.deb to pool/main/k/kernel-image-2.4.27-alpha/kernel-image-2.4.27-2-generic_2.4.27-10sarge1_alpha.deb kernel-image-2.4.27-2-smp_2.4.27-10sarge1_alpha.deb to pool/main/k/kernel-image-2.4.27-alpha/kernel-image-2.4.27-2-smp_2.4.27-10sarge1_alpha.deb kernel-image-2.4.27-alpha_2.4.27-10sarge1.dsc to pool/main/k/kernel-image-2.4.27-alpha/kernel-image-2.4.27-alpha_2.4.27-10sarge1.dsc kernel-image-2.4.27-alpha_2.4.27-10sarge1.tar.gz to pool/main/k/kernel-image-2.4.27-alpha/kernel-image-2.4.27-alpha_2.4.27-10sarge1.tar.gz Announcing to debian-changes@lists.debian.org Thank you for your contribution to Debian. -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
kernel-image-2.4.27-sparc_2.4.27-9sarge1_sparc.changes ACCEPTED
Mapping stable-security to proposed-updates. Warning: Propogating upload to unstable Warning: Propogating upload to testing-proposed-updates Warning: Propogating upload to unstable Warning: Propogating upload to testing-proposed-updates Warning: Propogating upload to unstable Warning: Propogating upload to testing-proposed-updates Warning: Propogating upload to unstable Warning: Propogating upload to testing-proposed-updates Warning: Propogating upload to unstable Warning: Propogating upload to testing-proposed-updates Warning: Propogating upload to unstable Warning: Propogating upload to testing-proposed-updates Warning: Propogating upload to unstable Warning: Propogating upload to testing-proposed-updates Warning: Propogating upload to unstable Warning: Propogating upload to testing-proposed-updates Warning: Propogating upload to unstable Warning: Propogating upload to testing-proposed-updates Warning: Propogating upload to unstable Warning: Propogating upload to testing-proposed-updates Warning: Propogating upload to unstable Warning: Propogating upload to testing-proposed-updates Accepted: kernel-build-2.4.27-2_2.4.27-9sarge1_sparc.deb to pool/main/k/kernel-image-2.4.27-sparc/kernel-build-2.4.27-2_2.4.27-9sarge1_sparc.deb kernel-headers-2.4.27-2-sparc32-smp_2.4.27-9sarge1_sparc.deb to pool/main/k/kernel-image-2.4.27-sparc/kernel-headers-2.4.27-2-sparc32-smp_2.4.27-9sarge1_sparc.deb kernel-headers-2.4.27-2-sparc32_2.4.27-9sarge1_sparc.deb to pool/main/k/kernel-image-2.4.27-sparc/kernel-headers-2.4.27-2-sparc32_2.4.27-9sarge1_sparc.deb kernel-headers-2.4.27-2-sparc64-smp_2.4.27-9sarge1_sparc.deb to pool/main/k/kernel-image-2.4.27-sparc/kernel-headers-2.4.27-2-sparc64-smp_2.4.27-9sarge1_sparc.deb kernel-headers-2.4.27-2-sparc64_2.4.27-9sarge1_sparc.deb to pool/main/k/kernel-image-2.4.27-sparc/kernel-headers-2.4.27-2-sparc64_2.4.27-9sarge1_sparc.deb kernel-headers-2.4.27-2_2.4.27-9sarge1_sparc.deb to pool/main/k/kernel-image-2.4.27-sparc/kernel-headers-2.4.27-2_2.4.27-9sarge1_sparc.deb kernel-image-2.4.27-2-sparc32-smp_2.4.27-9sarge1_sparc.deb to pool/main/k/kernel-image-2.4.27-sparc/kernel-image-2.4.27-2-sparc32-smp_2.4.27-9sarge1_sparc.deb kernel-image-2.4.27-2-sparc32_2.4.27-9sarge1_sparc.deb to pool/main/k/kernel-image-2.4.27-sparc/kernel-image-2.4.27-2-sparc32_2.4.27-9sarge1_sparc.deb kernel-image-2.4.27-2-sparc64-smp_2.4.27-9sarge1_sparc.deb to pool/main/k/kernel-image-2.4.27-sparc/kernel-image-2.4.27-2-sparc64-smp_2.4.27-9sarge1_sparc.deb kernel-image-2.4.27-2-sparc64_2.4.27-9sarge1_sparc.deb to pool/main/k/kernel-image-2.4.27-sparc/kernel-image-2.4.27-2-sparc64_2.4.27-9sarge1_sparc.deb kernel-image-2.4.27-sparc_2.4.27-9sarge1.dsc to pool/main/k/kernel-image-2.4.27-sparc/kernel-image-2.4.27-sparc_2.4.27-9sarge1.dsc kernel-image-2.4.27-sparc_2.4.27-9sarge1.tar.gz to pool/main/k/kernel-image-2.4.27-sparc/kernel-image-2.4.27-sparc_2.4.27-9sarge1.tar.gz Announcing to debian-changes@lists.debian.org Thank you for your contribution to Debian. -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
kernel-image-2.6.8-ia64_2.6.8-14sarge1_ia64.changes ACCEPTED
Mapping stable-security to proposed-updates. Warning: Propogating upload to testing-proposed-updates Warning: Propogating upload to testing-proposed-updates Warning: Propogating upload to testing-proposed-updates Warning: Propogating upload to testing-proposed-updates Warning: Propogating upload to testing-proposed-updates Warning: Propogating upload to testing-proposed-updates Warning: Propogating upload to testing-proposed-updates Warning: Propogating upload to testing-proposed-updates Warning: Propogating upload to testing-proposed-updates Warning: Propogating upload to testing-proposed-updates Accepted: kernel-headers-2.6-itanium-smp_2.6.8-14sarge1_ia64.deb to pool/main/k/kernel-image-2.6.8-ia64/kernel-headers-2.6-itanium-smp_2.6.8-14sarge1_ia64.deb kernel-headers-2.6-itanium_2.6.8-14sarge1_ia64.deb to pool/main/k/kernel-image-2.6.8-ia64/kernel-headers-2.6-itanium_2.6.8-14sarge1_ia64.deb kernel-headers-2.6-mckinley-smp_2.6.8-14sarge1_ia64.deb to pool/main/k/kernel-image-2.6.8-ia64/kernel-headers-2.6-mckinley-smp_2.6.8-14sarge1_ia64.deb kernel-headers-2.6-mckinley_2.6.8-14sarge1_ia64.deb to pool/main/k/kernel-image-2.6.8-ia64/kernel-headers-2.6-mckinley_2.6.8-14sarge1_ia64.deb kernel-headers-2.6.8-2-itanium-smp_2.6.8-14sarge1_ia64.deb to pool/main/k/kernel-image-2.6.8-ia64/kernel-headers-2.6.8-2-itanium-smp_2.6.8-14sarge1_ia64.deb kernel-headers-2.6.8-2-itanium_2.6.8-14sarge1_ia64.deb to pool/main/k/kernel-image-2.6.8-ia64/kernel-headers-2.6.8-2-itanium_2.6.8-14sarge1_ia64.deb kernel-headers-2.6.8-2-mckinley-smp_2.6.8-14sarge1_ia64.deb to pool/main/k/kernel-image-2.6.8-ia64/kernel-headers-2.6.8-2-mckinley-smp_2.6.8-14sarge1_ia64.deb kernel-headers-2.6.8-2-mckinley_2.6.8-14sarge1_ia64.deb to pool/main/k/kernel-image-2.6.8-ia64/kernel-headers-2.6.8-2-mckinley_2.6.8-14sarge1_ia64.deb kernel-headers-2.6.8-2_2.6.8-14sarge1_ia64.deb to pool/main/k/kernel-image-2.6.8-ia64/kernel-headers-2.6.8-2_2.6.8-14sarge1_ia64.deb kernel-image-2.6-itanium-smp_2.6.8-14sarge1_ia64.deb to pool/main/k/kernel-image-2.6.8-ia64/kernel-image-2.6-itanium-smp_2.6.8-14sarge1_ia64.deb kernel-image-2.6-itanium_2.6.8-14sarge1_ia64.deb to pool/main/k/kernel-image-2.6.8-ia64/kernel-image-2.6-itanium_2.6.8-14sarge1_ia64.deb kernel-image-2.6-mckinley-smp_2.6.8-14sarge1_ia64.deb to pool/main/k/kernel-image-2.6.8-ia64/kernel-image-2.6-mckinley-smp_2.6.8-14sarge1_ia64.deb kernel-image-2.6-mckinley_2.6.8-14sarge1_ia64.deb to pool/main/k/kernel-image-2.6.8-ia64/kernel-image-2.6-mckinley_2.6.8-14sarge1_ia64.deb kernel-image-2.6.8-2-itanium-smp_2.6.8-14sarge1_ia64.deb to pool/main/k/kernel-image-2.6.8-ia64/kernel-image-2.6.8-2-itanium-smp_2.6.8-14sarge1_ia64.deb kernel-image-2.6.8-2-itanium_2.6.8-14sarge1_ia64.deb to pool/main/k/kernel-image-2.6.8-ia64/kernel-image-2.6.8-2-itanium_2.6.8-14sarge1_ia64.deb kernel-image-2.6.8-2-mckinley-smp_2.6.8-14sarge1_ia64.deb to pool/main/k/kernel-image-2.6.8-ia64/kernel-image-2.6.8-2-mckinley-smp_2.6.8-14sarge1_ia64.deb kernel-image-2.6.8-2-mckinley_2.6.8-14sarge1_ia64.deb to pool/main/k/kernel-image-2.6.8-ia64/kernel-image-2.6.8-2-mckinley_2.6.8-14sarge1_ia64.deb kernel-image-2.6.8-ia64_2.6.8-14sarge1.dsc to pool/main/k/kernel-image-2.6.8-ia64/kernel-image-2.6.8-ia64_2.6.8-14sarge1.dsc kernel-image-2.6.8-ia64_2.6.8-14sarge1.tar.gz to pool/main/k/kernel-image-2.6.8-ia64/kernel-image-2.6.8-ia64_2.6.8-14sarge1.tar.gz Announcing to debian-changes@lists.debian.org Thank you for your contribution to Debian. -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
kernel-image-2.6.8-alpha_2.6.8-16sarge1_alpha.changes ACCEPTED
Mapping stable-security to proposed-updates. Accepted: kernel-headers-2.6.8-2-generic_2.6.8-16sarge1_alpha.deb to pool/main/k/kernel-image-2.6.8-alpha/kernel-headers-2.6.8-2-generic_2.6.8-16sarge1_alpha.deb kernel-headers-2.6.8-2-smp_2.6.8-16sarge1_alpha.deb to pool/main/k/kernel-image-2.6.8-alpha/kernel-headers-2.6.8-2-smp_2.6.8-16sarge1_alpha.deb kernel-headers-2.6.8-2_2.6.8-16sarge1_alpha.deb to pool/main/k/kernel-image-2.6.8-alpha/kernel-headers-2.6.8-2_2.6.8-16sarge1_alpha.deb kernel-image-2.6.8-2-generic_2.6.8-16sarge1_alpha.deb to pool/main/k/kernel-image-2.6.8-alpha/kernel-image-2.6.8-2-generic_2.6.8-16sarge1_alpha.deb kernel-image-2.6.8-2-smp_2.6.8-16sarge1_alpha.deb to pool/main/k/kernel-image-2.6.8-alpha/kernel-image-2.6.8-2-smp_2.6.8-16sarge1_alpha.deb kernel-image-2.6.8-alpha_2.6.8-16sarge1.dsc to pool/main/k/kernel-image-2.6.8-alpha/kernel-image-2.6.8-alpha_2.6.8-16sarge1.dsc kernel-image-2.6.8-alpha_2.6.8-16sarge1.tar.gz to pool/main/k/kernel-image-2.6.8-alpha/kernel-image-2.6.8-alpha_2.6.8-16sarge1.tar.gz Announcing to debian-changes@lists.debian.org Thank you for your contribution to Debian. -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
kernel-source-2.6.8_2.6.8-16sarge1_i386.changes REJECTED
Mapping stable-security to proposed-updates. Rejected: The key (0x76EF8CE887B1CFB5) used to sign kernel-source-2.6.8_2.6.8-16sarge1.dsc wasn't found in the keyring(s). Warning: ignoring kernel-source-2.6.8_2.6.8.orig.tar.gz, since it's already in the archive. === If you don't understand why your files were rejected, or if the override file requires editing, reply to this email. -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
kernel-patch-powerpc-2.6.8_2.6.8-12sarge1_powerpc.changes ACCEPTED
Mapping stable-security to proposed-updates. Accepted: kernel-build-2.6.8-power3-smp_2.6.8-12sarge1_powerpc.deb to pool/main/k/kernel-patch-powerpc-2.6.8/kernel-build-2.6.8-power3-smp_2.6.8-12sarge1_powerpc.deb kernel-build-2.6.8-power3_2.6.8-12sarge1_powerpc.deb to pool/main/k/kernel-patch-powerpc-2.6.8/kernel-build-2.6.8-power3_2.6.8-12sarge1_powerpc.deb kernel-build-2.6.8-power4-smp_2.6.8-12sarge1_powerpc.deb to pool/main/k/kernel-patch-powerpc-2.6.8/kernel-build-2.6.8-power4-smp_2.6.8-12sarge1_powerpc.deb kernel-build-2.6.8-power4_2.6.8-12sarge1_powerpc.deb to pool/main/k/kernel-patch-powerpc-2.6.8/kernel-build-2.6.8-power4_2.6.8-12sarge1_powerpc.deb kernel-build-2.6.8-powerpc-smp_2.6.8-12sarge1_powerpc.deb to pool/main/k/kernel-patch-powerpc-2.6.8/kernel-build-2.6.8-powerpc-smp_2.6.8-12sarge1_powerpc.deb kernel-build-2.6.8-powerpc_2.6.8-12sarge1_powerpc.deb to pool/main/k/kernel-patch-powerpc-2.6.8/kernel-build-2.6.8-powerpc_2.6.8-12sarge1_powerpc.deb kernel-headers-2.6.8_2.6.8-12sarge1_powerpc.deb to pool/main/k/kernel-patch-powerpc-2.6.8/kernel-headers-2.6.8_2.6.8-12sarge1_powerpc.deb kernel-image-2.6.8-power3-smp_2.6.8-12sarge1_powerpc.deb to pool/main/k/kernel-patch-powerpc-2.6.8/kernel-image-2.6.8-power3-smp_2.6.8-12sarge1_powerpc.deb kernel-image-2.6.8-power3_2.6.8-12sarge1_powerpc.deb to pool/main/k/kernel-patch-powerpc-2.6.8/kernel-image-2.6.8-power3_2.6.8-12sarge1_powerpc.deb kernel-image-2.6.8-power4-smp_2.6.8-12sarge1_powerpc.deb to pool/main/k/kernel-patch-powerpc-2.6.8/kernel-image-2.6.8-power4-smp_2.6.8-12sarge1_powerpc.deb kernel-image-2.6.8-power4_2.6.8-12sarge1_powerpc.deb to pool/main/k/kernel-patch-powerpc-2.6.8/kernel-image-2.6.8-power4_2.6.8-12sarge1_powerpc.deb kernel-image-2.6.8-powerpc-smp_2.6.8-12sarge1_powerpc.deb to pool/main/k/kernel-patch-powerpc-2.6.8/kernel-image-2.6.8-powerpc-smp_2.6.8-12sarge1_powerpc.deb kernel-image-2.6.8-powerpc_2.6.8-12sarge1_powerpc.deb to pool/main/k/kernel-patch-powerpc-2.6.8/kernel-image-2.6.8-powerpc_2.6.8-12sarge1_powerpc.deb kernel-patch-powerpc-2.6.8_2.6.8-12sarge1.dsc to pool/main/k/kernel-patch-powerpc-2.6.8/kernel-patch-powerpc-2.6.8_2.6.8-12sarge1.dsc kernel-patch-powerpc-2.6.8_2.6.8-12sarge1.tar.gz to pool/main/k/kernel-patch-powerpc-2.6.8/kernel-patch-powerpc-2.6.8_2.6.8-12sarge1.tar.gz Announcing to debian-changes@lists.debian.org Thank you for your contribution to Debian. -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
kernel-image-2.6.8-amd64_2.6.8-16sarge1_i386.changes ACCEPTED
Mapping stable-security to proposed-updates. Accepted: kernel-headers-2.6.8-11-amd64-generic_2.6.8-16sarge1_i386.deb to pool/main/k/kernel-image-2.6.8-amd64/kernel-headers-2.6.8-11-amd64-generic_2.6.8-16sarge1_i386.deb kernel-headers-2.6.8-11-amd64-k8-smp_2.6.8-16sarge1_i386.deb to pool/main/k/kernel-image-2.6.8-amd64/kernel-headers-2.6.8-11-amd64-k8-smp_2.6.8-16sarge1_i386.deb kernel-headers-2.6.8-11-amd64-k8_2.6.8-16sarge1_i386.deb to pool/main/k/kernel-image-2.6.8-amd64/kernel-headers-2.6.8-11-amd64-k8_2.6.8-16sarge1_i386.deb kernel-headers-2.6.8-11-em64t-p4-smp_2.6.8-16sarge1_i386.deb to pool/main/k/kernel-image-2.6.8-amd64/kernel-headers-2.6.8-11-em64t-p4-smp_2.6.8-16sarge1_i386.deb kernel-headers-2.6.8-11-em64t-p4_2.6.8-16sarge1_i386.deb to pool/main/k/kernel-image-2.6.8-amd64/kernel-headers-2.6.8-11-em64t-p4_2.6.8-16sarge1_i386.deb kernel-headers-2.6.8-11_2.6.8-16sarge1_i386.deb to pool/main/k/kernel-image-2.6.8-amd64/kernel-headers-2.6.8-11_2.6.8-16sarge1_i386.deb kernel-image-2.6.8-11-amd64-generic_2.6.8-16sarge1_i386.deb to pool/main/k/kernel-image-2.6.8-amd64/kernel-image-2.6.8-11-amd64-generic_2.6.8-16sarge1_i386.deb kernel-image-2.6.8-11-amd64-k8-smp_2.6.8-16sarge1_i386.deb to pool/main/k/kernel-image-2.6.8-amd64/kernel-image-2.6.8-11-amd64-k8-smp_2.6.8-16sarge1_i386.deb kernel-image-2.6.8-11-amd64-k8_2.6.8-16sarge1_i386.deb to pool/main/k/kernel-image-2.6.8-amd64/kernel-image-2.6.8-11-amd64-k8_2.6.8-16sarge1_i386.deb kernel-image-2.6.8-11-em64t-p4-smp_2.6.8-16sarge1_i386.deb to pool/main/k/kernel-image-2.6.8-amd64/kernel-image-2.6.8-11-em64t-p4-smp_2.6.8-16sarge1_i386.deb kernel-image-2.6.8-11-em64t-p4_2.6.8-16sarge1_i386.deb to pool/main/k/kernel-image-2.6.8-amd64/kernel-image-2.6.8-11-em64t-p4_2.6.8-16sarge1_i386.deb kernel-image-2.6.8-amd64_2.6.8-16sarge1.dsc to pool/main/k/kernel-image-2.6.8-amd64/kernel-image-2.6.8-amd64_2.6.8-16sarge1.dsc kernel-image-2.6.8-amd64_2.6.8-16sarge1.tar.gz to pool/main/k/kernel-image-2.6.8-amd64/kernel-image-2.6.8-amd64_2.6.8-16sarge1.tar.gz Announcing to debian-changes@lists.debian.org Thank you for your contribution to Debian. -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
kernel-source-2.4.27_2.4.27-10sarge1_i386.changes REJECTED
Mapping stable-security to proposed-updates. Rejected: The key (0x76EF8CE887B1CFB5) used to sign kernel-source-2.4.27_2.4.27-10sarge1.dsc wasn't found in the keyring(s). Warning: ignoring kernel-source-2.4.27_2.4.27.orig.tar.gz, since it's already in the archive. === If you don't understand why your files were rejected, or if the override file requires editing, reply to this email. -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
kernel-image-2.4.27-ia64_2.4.27-10sarge1_ia64.changes ACCEPTED
Mapping stable-security to proposed-updates. Accepted: kernel-build-2.4.27-2_2.4.27-10sarge1_ia64.deb to pool/main/k/kernel-image-2.4.27-ia64/kernel-build-2.4.27-2_2.4.27-10sarge1_ia64.deb kernel-headers-2.4.27-2-itanium-smp_2.4.27-10sarge1_ia64.deb to pool/main/k/kernel-image-2.4.27-ia64/kernel-headers-2.4.27-2-itanium-smp_2.4.27-10sarge1_ia64.deb kernel-headers-2.4.27-2-itanium_2.4.27-10sarge1_ia64.deb to pool/main/k/kernel-image-2.4.27-ia64/kernel-headers-2.4.27-2-itanium_2.4.27-10sarge1_ia64.deb kernel-headers-2.4.27-2-mckinley-smp_2.4.27-10sarge1_ia64.deb to pool/main/k/kernel-image-2.4.27-ia64/kernel-headers-2.4.27-2-mckinley-smp_2.4.27-10sarge1_ia64.deb kernel-headers-2.4.27-2-mckinley_2.4.27-10sarge1_ia64.deb to pool/main/k/kernel-image-2.4.27-ia64/kernel-headers-2.4.27-2-mckinley_2.4.27-10sarge1_ia64.deb kernel-headers-2.4.27-2_2.4.27-10sarge1_ia64.deb to pool/main/k/kernel-image-2.4.27-ia64/kernel-headers-2.4.27-2_2.4.27-10sarge1_ia64.deb kernel-image-2.4-itanium-smp_2.4.27-10sarge1_ia64.deb to pool/main/k/kernel-image-2.4.27-ia64/kernel-image-2.4-itanium-smp_2.4.27-10sarge1_ia64.deb kernel-image-2.4-itanium_2.4.27-10sarge1_ia64.deb to pool/main/k/kernel-image-2.4.27-ia64/kernel-image-2.4-itanium_2.4.27-10sarge1_ia64.deb kernel-image-2.4-mckinley-smp_2.4.27-10sarge1_ia64.deb to pool/main/k/kernel-image-2.4.27-ia64/kernel-image-2.4-mckinley-smp_2.4.27-10sarge1_ia64.deb kernel-image-2.4-mckinley_2.4.27-10sarge1_ia64.deb to pool/main/k/kernel-image-2.4.27-ia64/kernel-image-2.4-mckinley_2.4.27-10sarge1_ia64.deb kernel-image-2.4.27-2-itanium-smp_2.4.27-10sarge1_ia64.deb to pool/main/k/kernel-image-2.4.27-ia64/kernel-image-2.4.27-2-itanium-smp_2.4.27-10sarge1_ia64.deb kernel-image-2.4.27-2-itanium_2.4.27-10sarge1_ia64.deb to pool/main/k/kernel-image-2.4.27-ia64/kernel-image-2.4.27-2-itanium_2.4.27-10sarge1_ia64.deb kernel-image-2.4.27-2-mckinley-smp_2.4.27-10sarge1_ia64.deb to pool/main/k/kernel-image-2.4.27-ia64/kernel-image-2.4.27-2-mckinley-smp_2.4.27-10sarge1_ia64.deb kernel-image-2.4.27-2-mckinley_2.4.27-10sarge1_ia64.deb to pool/main/k/kernel-image-2.4.27-ia64/kernel-image-2.4.27-2-mckinley_2.4.27-10sarge1_ia64.deb kernel-image-2.4.27-ia64_2.4.27-10sarge1.dsc to pool/main/k/kernel-image-2.4.27-ia64/kernel-image-2.4.27-ia64_2.4.27-10sarge1.dsc kernel-image-2.4.27-ia64_2.4.27-10sarge1.tar.gz to pool/main/k/kernel-image-2.4.27-ia64/kernel-image-2.4.27-ia64_2.4.27-10sarge1.tar.gz Announcing to debian-changes@lists.debian.org Thank you for your contribution to Debian. -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
File a bug in ALSA driver snd_es18xx
Hello, I'm starting to believe I found a bug in ALSA driver snd_es18xx. I don't know against which package I should file the bug. Could anybody point me to the right direction ? Thanks Paulo -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
Processing of kernel-source-2.4.27_2.4.27-10sarge1_i386.changes
kernel-source-2.4.27_2.4.27-10sarge1_i386.changes uploaded successfully to localhost along with the files: kernel-source-2.4.27_2.4.27-10sarge1.dsc kernel-source-2.4.27_2.4.27-10sarge1.diff.gz kernel-patch-debian-2.4.27_2.4.27-10sarge1_all.deb kernel-doc-2.4.27_2.4.27-10sarge1_all.deb kernel-source-2.4.27_2.4.27-10sarge1_all.deb kernel-tree-2.4.27_2.4.27-10sarge1_all.deb Greetings, Your Debian queue daemon -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
Bug#311164: marked as done (CAN-2005-0757: DoS possibility in xattrs handling on 64 bits archs)
Your message dated Wed, 14 Dec 2005 19:47:14 -0800 with message-id [EMAIL PROTECTED] and subject line Bug#311164: fixed in kernel-source-2.4.27 2.4.27-10sarge1 has caused the attached Bug report to be marked as done. This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what I am talking about this indicates a serious mail system misconfiguration somewhere. Please contact me immediately.) Debian bug tracking system administrator (administrator, Debian Bugs database) -- Received: (at submit) by bugs.debian.org; 29 May 2005 13:47:01 + From [EMAIL PROTECTED] Sun May 29 06:47:00 2005 Return-path: [EMAIL PROTECTED] Received: from inutil.org (vserver151.vserver151.serverflex.de) [193.22.164.111] by spohr.debian.org with esmtp (Exim 3.35 1 (Debian)) id 1DcO84-0004x1-00; Sun, 29 May 2005 06:47:00 -0700 Received: from p54893b55.dip.t-dialin.net ([84.137.59.85] helo=localhost.localdomain) by vserver151.vserver151.serverflex.de with esmtpsa (TLS-1.0:RSA_AES_256_CBC_SHA:32) (Exim 4.50) id 1DcO5T-0003P6-PV for [EMAIL PROTECTED]; Sun, 29 May 2005 15:44:20 +0200 Received: from jmm by localhost.localdomain with local (Exim 4.50) id 1DcO7q-0001Xl-Nx; Sun, 29 May 2005 15:46:46 +0200 Content-Type: text/plain; charset=us-ascii MIME-Version: 1.0 Content-Transfer-Encoding: 7bit From: Moritz Muehlenhoff [EMAIL PROTECTED] To: Debian Bug Tracking System [EMAIL PROTECTED] Subject: CAN-2005-0757: DoS possibility in xattrs handling on 64 bits archs X-Mailer: reportbug 3.12 Date: Sun, 29 May 2005 15:46:46 +0200 Message-Id: [EMAIL PROTECTED] X-SA-Exim-Connect-IP: 84.137.59.85 X-SA-Exim-Mail-From: [EMAIL PROTECTED] X-SA-Exim-Scanned: No (on vserver151.vserver151.serverflex.de); SAEximRunCond expanded to false Delivered-To: [EMAIL PROTECTED] X-Spam-Checker-Version: SpamAssassin 2.60-bugs.debian.org_2005_01_02 (1.212-2003-09-23-exp) on spohr.debian.org X-Spam-Status: No, hits=-8.0 required=4.0 tests=BAYES_00,HAS_PACKAGE autolearn=no version=2.60-bugs.debian.org_2005_01_02 X-Spam-Level: Package: kernel-source-2.4.27 Severity: important Tags: security Quoting from http://rhn.redhat.com/errata/RHSA-2005-294.html: A flaw in offset handling in the xattr file system code backported to Red Hat Enterprise Linux 3 was fixed. On 64-bit systems, a user who can access an ext3 extended-attribute-enabled file system could cause a denial of service (system crash). This issue is rated as having a moderate security impact (CAN-2005-0757). I couldn't find further information on whether this is already fixed in 2.4.27, do you have further information? Cheers, Moritz -- System Information: Debian Release: 3.1 APT prefers unstable APT policy: (500, 'unstable') Architecture: i386 (i686) Shell: /bin/sh linked to /bin/bash Kernel: Linux 2.6.12-rc5 Locale: LANG=C, [EMAIL PROTECTED] (charmap=ISO-8859-15) --- Received: (at 311164-close) by bugs.debian.org; 15 Dec 2005 03:51:37 + From [EMAIL PROTECTED] Wed Dec 14 19:51:37 2005 Return-path: [EMAIL PROTECTED] Received: from katie by spohr.debian.org with local (Exim 4.50) id 1Emk5K-0006AC-WD; Wed, 14 Dec 2005 19:47:15 -0800 From: Simon Horman [EMAIL PROTECTED] To: [EMAIL PROTECTED] X-Katie: $Revision: 1.60 $ Subject: Bug#311164: fixed in kernel-source-2.4.27 2.4.27-10sarge1 Message-Id: [EMAIL PROTECTED] Sender: Archive Administrator [EMAIL PROTECTED] Date: Wed, 14 Dec 2005 19:47:14 -0800 X-Spam-Checker-Version: SpamAssassin 2.60-bugs.debian.org_2005_01_02 (1.212-2003-09-23-exp) on spohr.debian.org X-Spam-Level: X-Spam-Status: No, hits=-6.0 required=4.0 tests=BAYES_00,HAS_BUG_NUMBER autolearn=no version=2.60-bugs.debian.org_2005_01_02 Source: kernel-source-2.4.27 Source-Version: 2.4.27-10sarge1 We believe that the bug you reported is fixed in the latest version of kernel-source-2.4.27, which is due to be installed in the Debian FTP archive: kernel-doc-2.4.27_2.4.27-10sarge1_all.deb to pool/main/k/kernel-source-2.4.27/kernel-doc-2.4.27_2.4.27-10sarge1_all.deb kernel-patch-debian-2.4.27_2.4.27-10sarge1_all.deb to pool/main/k/kernel-source-2.4.27/kernel-patch-debian-2.4.27_2.4.27-10sarge1_all.deb kernel-source-2.4.27_2.4.27-10sarge1.diff.gz to pool/main/k/kernel-source-2.4.27/kernel-source-2.4.27_2.4.27-10sarge1.diff.gz kernel-source-2.4.27_2.4.27-10sarge1.dsc to pool/main/k/kernel-source-2.4.27/kernel-source-2.4.27_2.4.27-10sarge1.dsc kernel-source-2.4.27_2.4.27-10sarge1_all.deb to pool/main/k/kernel-source-2.4.27/kernel-source-2.4.27_2.4.27-10sarge1_all.deb kernel-tree-2.4.27_2.4.27-10sarge1_all.deb to pool/main/k/kernel-source-2.4.27/kernel-tree-2.4.27_2.4.27-10sarge1_all.deb A summary of the changes
Bug#309308: marked as done (kernel-image-2.6.8-2-686-smp: null pointer oops on udp packets)
Your message dated Wed, 14 Dec 2005 19:47:25 -0800 with message-id [EMAIL PROTECTED] and subject line Bug#309308: fixed in kernel-source-2.6.8 2.6.8-16sarge1 has caused the attached Bug report to be marked as done. This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what I am talking about this indicates a serious mail system misconfiguration somewhere. Please contact me immediately.) Debian bug tracking system administrator (administrator, Debian Bugs database) -- Received: (at submit) by bugs.debian.org; 16 May 2005 09:27:14 + From [EMAIL PROTECTED] Mon May 16 02:27:14 2005 Return-path: [EMAIL PROTECTED] Received: from master.debian.org [146.82.138.7] by spohr.debian.org with esmtp (Exim 3.35 1 (Debian)) id 1DXbsX-0003BB-00; Mon, 16 May 2005 02:27:13 -0700 Received: from ([127.0.0.1]) [217.212.246.126] by master.debian.org with esmtp (Exim 3.35 1 (Debian)) id 1DXbsW-0003eV-00; Mon, 16 May 2005 04:27:12 -0500 Content-Type: text/plain; charset=us-ascii MIME-Version: 1.0 Content-Transfer-Encoding: 7bit From: Peter Sandstrom [EMAIL PROTECTED] To: Debian Bug Tracking System [EMAIL PROTECTED] Subject: kernel-image-2.6.8-2-686-smp: null pointer oops on udp packets X-Mailer: reportbug 3.8 Date: Mon, 16 May 2005 11:26:56 +0200 X-Debbugs-Cc: [EMAIL PROTECTED] Message-Id: [EMAIL PROTECTED] Delivered-To: [EMAIL PROTECTED] X-Spam-Checker-Version: SpamAssassin 2.60-bugs.debian.org_2005_01_02 (1.212-2003-09-23-exp) on spohr.debian.org X-Spam-Status: No, hits=-9.0 required=4.0 tests=BAYES_00,HAS_PACKAGE, OUR_MTA_MSGID,X_DEBBUGS_CC autolearn=ham version=2.60-bugs.debian.org_2005_01_02 X-Spam-Level: Package: kernel-image-2.6.8-2-686-smp Version: 2.6.8-13 Severity: critical Tags: security Justification: breaks the whole system kernel oops while trying to do a snmpwalk from a remote host. the entire udp stack becomes unresponsive and reboot fails when trying to bring down network interfaces. unsure if this is exploitable for a DoS attack, will investigate further when i have time if this not a know issue. :01:01.0 Ethernet controller: Intel Corp. 82547GI Gigabit Ethernet Controller :03:02.0 Ethernet controller: Intel Corp. 82541GI/PI Gigabit Ethernet Controller vlan tagging is in use on the interface that recieves the udp packet that causes the oops. Unable to handle kernel NULL pointer dereference at virtual address printing eip: f89f64f2 *pde = Oops: [#1] PREEMPT SMP Modules linked in: deflate zlib_deflate twofish serpent aes_i586 blowfish des sha256 sha1 crypto_null af_key tun ipv6 8021q dm_mod capability commoncap e1000 genrtc ext3 jbd mbcache sd_mod ata_piix libata scsi_mod unix font vesafb cfbcopyarea cfbimgblt cfbfillrect CPU:1 EIP:0060:[f89f64f2]Not tainted EFLAGS: 00010a86 (2.6.8-2-686-smp) EIP is at e1000_shift_out_mdi_bits+0x22/0xa0 [e1000] eax: ebx: 8000 ecx: 001f edx: esi: f77f3c10 edi: f74bbe6c ebp: esp: f74bbe64 ds: 007b es: 007b ss: 0068 Process snmpd (pid: 793, threadinfo=f74ba000 task=f505b410) Stack: c038b124 c01163e7 1820 f77f3c10 f74bbee2 f74bbf30 f89f674b f77f3c10 0020 f74bbecc f77f3a20 f74bbedc f89f3b3b f77f3c10 f74bbee2 f74bbecc f89f3950 f74bbedc f8880ab1 f77f3800 f74bbecc Call Trace: [c01163e7] smp_apic_timer_interrupt+0xe7/0x160 [f89f674b] e1000_read_phy_reg_ex+0xab/0xd0 [e1000] [f89f3b3b] e1000_mii_ioctl+0x1cb/0x1d0 [e1000] [f89f3950] e1000_ioctl+0x0/0x20 [e1000] [f8880ab1] vlan_dev_ioctl+0xc1/0x110 [8021q] [c0236944] dev_ifsioc+0x374/0x3e0 [c0236b46] dev_ioctl+0x196/0x320 [c027f59c] inet_ioctl+0x9c/0xb0 [c022b9d9] sock_ioctl+0x139/0x300 [c0174d78] sys_ioctl+0x148/0x2d0 [c01061fb] syscall_call+0x7/0xb Code: 8b 02 0d 00 00 00 03 89 44 24 08 85 db 74 56 eb 0d 90 90 90 -- System Information: Debian Release: 3.1 APT prefers testing APT policy: (500, 'testing') Architecture: i386 (i686) Kernel: Linux 2.6.8-2-686-smp Locale: LANG=C, LC_CTYPE=C (charmap=ANSI_X3.4-1968) Versions of packages kernel-image-2.6.8-2-686-smp depends on: ii coreutils [fileutils] 5.2.1-2The GNU core utilities ii fileutils 5.2.1-2The GNU file management utilities ii initrd-tools 0.1.78 tools to create initrd image for p ii module-init-tools 3.2-pre1-2 tools for managing Linux kernel mo -- no debconf information --- Received: (at 309308-close) by bugs.debian.org; 15 Dec 2005 03:51:02 + From [EMAIL PROTECTED] Wed Dec 14 19:51:02 2005 Return-path: [EMAIL PROTECTED] Received: from katie by spohr.debian.org with local (Exim 4.50) id 1Emk5V-0006BL-HB;
Bug#322339: marked as done (CAN-2004-2302: Race condition allows DoS through large offsets in sysfs files)
Your message dated Wed, 14 Dec 2005 19:47:25 -0800 with message-id [EMAIL PROTECTED] and subject line Bug#322339: fixed in kernel-source-2.6.8 2.6.8-16sarge1 has caused the attached Bug report to be marked as done. This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what I am talking about this indicates a serious mail system misconfiguration somewhere. Please contact me immediately.) Debian bug tracking system administrator (administrator, Debian Bugs database) -- Received: (at submit) by bugs.debian.org; 10 Aug 2005 09:52:40 + From [EMAIL PROTECTED] Wed Aug 10 02:52:40 2005 Return-path: [EMAIL PROTECTED] Received: from ip0.serverflex.de (vserver151.vserver151.serverflex.de) [193.22.164.111] by spohr.debian.org with esmtp (Exim 3.36 1 (Debian)) id 1E2nGK-0007Bl-00; Wed, 10 Aug 2005 02:52:40 -0700 Received: from wlan-client-052.informatik.uni-bremen.de ([134.102.116.53] helo=localhost.localdomain) by vserver151.vserver151.serverflex.de with esmtpsa (TLS-1.0:RSA_AES_256_CBC_SHA:32) (Exim 4.50) id 1E2nGH-0005xN-9V for [EMAIL PROTECTED]; Wed, 10 Aug 2005 11:52:37 +0200 Received: from jmm by localhost.localdomain with local (Exim 4.52) id 1E2nGe-0001Uk-K8; Wed, 10 Aug 2005 11:53:00 +0200 Content-Type: text/plain; charset=us-ascii MIME-Version: 1.0 Content-Transfer-Encoding: 7bit From: Moritz Muehlenhoff [EMAIL PROTECTED] To: Debian Bug Tracking System [EMAIL PROTECTED] Subject: CAN-2004-2302: Race condition allows DoS through large offsets in sysfs files X-Mailer: reportbug 3.15 Date: Wed, 10 Aug 2005 11:53:00 +0200 X-Debbugs-Cc: [EMAIL PROTECTED] Message-Id: [EMAIL PROTECTED] X-SA-Exim-Connect-IP: 134.102.116.53 X-SA-Exim-Mail-From: [EMAIL PROTECTED] X-SA-Exim-Scanned: No (on vserver151.vserver151.serverflex.de); SAEximRunCond expanded to false Delivered-To: [EMAIL PROTECTED] X-Spam-Checker-Version: SpamAssassin 2.60-bugs.debian.org_2005_01_02 (1.212-2003-09-23-exp) on spohr.debian.org X-Spam-Level: X-Spam-Status: No, hits=-11.0 required=4.0 tests=BAYES_00,HAS_PACKAGE, X_DEBBUGS_CC autolearn=ham version=2.60-bugs.debian.org_2005_01_02 Package: kernel-source-2.6.8 Severity: important Tags: security patch CAN-2004-2302 describes a kernel DoS through a race condition, that can be triggered by overly long sysfs offsets. Please see http://linux.bkbits.net:8080/linux-2.6/cset%404186a4deVoR88JjTwMa3ZnIp-_YJsA for description and a patch. 2.4 doesn't seem to use sysfs and it should already be fixed in 2.6.12. Cheers, Moritz -- System Information: Debian Release: testing/unstable APT prefers unstable APT policy: (500, 'unstable') Architecture: i386 (i686) Shell: /bin/sh linked to /bin/bash Kernel: Linux 2.6.12-rc5 Locale: LANG=C, [EMAIL PROTECTED] (charmap=ISO-8859-15) --- Received: (at 322339-close) by bugs.debian.org; 15 Dec 2005 03:50:59 + From [EMAIL PROTECTED] Wed Dec 14 19:50:59 2005 Return-path: [EMAIL PROTECTED] Received: from katie by spohr.debian.org with local (Exim 4.50) id 1Emk5V-0006BW-LP; Wed, 14 Dec 2005 19:47:25 -0800 From: Simon Horman [EMAIL PROTECTED] To: [EMAIL PROTECTED] X-Katie: $Revision: 1.60 $ Subject: Bug#322339: fixed in kernel-source-2.6.8 2.6.8-16sarge1 Message-Id: [EMAIL PROTECTED] Sender: Archive Administrator [EMAIL PROTECTED] Date: Wed, 14 Dec 2005 19:47:25 -0800 X-Spam-Checker-Version: SpamAssassin 2.60-bugs.debian.org_2005_01_02 (1.212-2003-09-23-exp) on spohr.debian.org X-Spam-Level: X-Spam-Status: No, hits=-5.0 required=4.0 tests=BAYES_01,HAS_BUG_NUMBER autolearn=no version=2.60-bugs.debian.org_2005_01_02 Source: kernel-source-2.6.8 Source-Version: 2.6.8-16sarge1 We believe that the bug you reported is fixed in the latest version of kernel-source-2.6.8, which is due to be installed in the Debian FTP archive: kernel-doc-2.6.8_2.6.8-16sarge1_all.deb to pool/main/k/kernel-source-2.6.8/kernel-doc-2.6.8_2.6.8-16sarge1_all.deb kernel-patch-debian-2.6.8_2.6.8-16sarge1_all.deb to pool/main/k/kernel-source-2.6.8/kernel-patch-debian-2.6.8_2.6.8-16sarge1_all.deb kernel-source-2.6.8_2.6.8-16sarge1.diff.gz to pool/main/k/kernel-source-2.6.8/kernel-source-2.6.8_2.6.8-16sarge1.diff.gz kernel-source-2.6.8_2.6.8-16sarge1.dsc to pool/main/k/kernel-source-2.6.8/kernel-source-2.6.8_2.6.8-16sarge1.dsc kernel-source-2.6.8_2.6.8-16sarge1_all.deb to pool/main/k/kernel-source-2.6.8/kernel-source-2.6.8_2.6.8-16sarge1_all.deb kernel-tree-2.6.8_2.6.8-16sarge1_all.deb to pool/main/k/kernel-source-2.6.8/kernel-tree-2.6.8_2.6.8-16sarge1_all.deb A summary of the changes between this version and the previous one is attached. Thank you for reporting the bug, which will now be closed. If you
Bug#323318: marked as done (Array element has incomplete type)
Your message dated Wed, 14 Dec 2005 19:47:15 -0800 with message-id [EMAIL PROTECTED] and subject line Bug#323318: fixed in kernel-source-2.4.27 2.4.27-10sarge1 has caused the attached Bug report to be marked as done. This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what I am talking about this indicates a serious mail system misconfiguration somewhere. Please contact me immediately.) Debian bug tracking system administrator (administrator, Debian Bugs database) -- Received: (at submit) by bugs.debian.org; 16 Aug 2005 01:54:57 + From [EMAIL PROTECTED] Mon Aug 15 18:54:57 2005 Return-path: [EMAIL PROTECTED] Received: from zoot.lafn.org [206.117.18.6] by spohr.debian.org with esmtp (Exim 3.36 1 (Debian)) id 1E4qfJ-00056s-00; Mon, 15 Aug 2005 18:54:57 -0700 Received: from localhost.localdomain (pool-71-104-165-253.lsanca.dsl-w.verizon.net [71.104.165.253]) (authenticated bits=0) by zoot.lafn.org (8.13.1/8.13.1) with ESMTP id j7G1sux2012721 (version=TLSv1/SSLv3 cipher=AES256-SHA bits=256 verify=NO) for [EMAIL PROTECTED]; Mon, 15 Aug 2005 18:54:57 -0700 (PDT) (envelope-from [EMAIL PROTECTED]) Received: from kraai by localhost.localdomain with local (Exim 4.52) id 1E4jbc-00012I-15 for [EMAIL PROTECTED]; Mon, 15 Aug 2005 11:22:40 -0700 Date: Mon, 15 Aug 2005 11:22:39 -0700 From: Matt Kraai [EMAIL PROTECTED] To: [EMAIL PROTECTED] Subject: Array element has incomplete type Message-ID: [EMAIL PROTECTED] Mime-Version: 1.0 Content-Type: multipart/signed; micalg=pgp-sha1; protocol=application/pgp-signature; boundary=qMm9M+Fa2AknHoGS Content-Disposition: inline User-Agent: Mutt/1.5.9i X-Virus-Scanned: ClamAV 0.86.2/1023/Mon Aug 15 13:15:08 2005 on zoot.lafn.org X-Virus-Status: Clean Delivered-To: [EMAIL PROTECTED] X-Spam-Checker-Version: SpamAssassin 2.60-bugs.debian.org_2005_01_02 (1.212-2003-09-23-exp) on spohr.debian.org X-Spam-Level: X-Spam-Status: No, hits=-8.0 required=4.0 tests=BAYES_00,HAS_PACKAGE autolearn=no version=2.60-bugs.debian.org_2005_01_02 --qMm9M+Fa2AknHoGS Content-Type: text/plain; charset=us-ascii Content-Disposition: inline Content-Transfer-Encoding: quoted-printable Package: kernel-headers-2.4.27-2 Version: 2.4.27-10 Severity: serious hostap-modules-i386 fails to build because a kernel header has an array type with an incomplete element type: /tmp/buildd/hostap-modules-i386-0.3.7/kernel-headers-2.4.27-2-386/include= /asm/processor.h:75: error: array type has incomplete element type --=20 Matt --qMm9M+Fa2AknHoGS Content-Type: application/pgp-signature; name=signature.asc Content-Description: Digital signature Content-Disposition: inline -BEGIN PGP SIGNATURE- Version: GnuPG v1.4.1 (GNU/Linux) iD8DBQFDAN1ufNdgYxVXvBARArrhAJ9fLP6YIVKsBWkxL/Y+2VDulPh4tgCeNE6J 2H0jgYNQlitdGqeZi3/LJGE= =l3T3 -END PGP SIGNATURE- --qMm9M+Fa2AknHoGS-- --- Received: (at 323318-close) by bugs.debian.org; 15 Dec 2005 03:51:52 + From [EMAIL PROTECTED] Wed Dec 14 19:51:52 2005 Return-path: [EMAIL PROTECTED] Received: from katie by spohr.debian.org with local (Exim 4.50) id 1Emk5L-0006AI-2V; Wed, 14 Dec 2005 19:47:15 -0800 From: Simon Horman [EMAIL PROTECTED] To: [EMAIL PROTECTED] X-Katie: $Revision: 1.60 $ Subject: Bug#323318: fixed in kernel-source-2.4.27 2.4.27-10sarge1 Message-Id: [EMAIL PROTECTED] Sender: Archive Administrator [EMAIL PROTECTED] Date: Wed, 14 Dec 2005 19:47:15 -0800 X-Spam-Checker-Version: SpamAssassin 2.60-bugs.debian.org_2005_01_02 (1.212-2003-09-23-exp) on spohr.debian.org X-Spam-Level: X-Spam-Status: No, hits=-6.0 required=4.0 tests=BAYES_00,HAS_BUG_NUMBER autolearn=no version=2.60-bugs.debian.org_2005_01_02 Source: kernel-source-2.4.27 Source-Version: 2.4.27-10sarge1 We believe that the bug you reported is fixed in the latest version of kernel-source-2.4.27, which is due to be installed in the Debian FTP archive: kernel-doc-2.4.27_2.4.27-10sarge1_all.deb to pool/main/k/kernel-source-2.4.27/kernel-doc-2.4.27_2.4.27-10sarge1_all.deb kernel-patch-debian-2.4.27_2.4.27-10sarge1_all.deb to pool/main/k/kernel-source-2.4.27/kernel-patch-debian-2.4.27_2.4.27-10sarge1_all.deb kernel-source-2.4.27_2.4.27-10sarge1.diff.gz to pool/main/k/kernel-source-2.4.27/kernel-source-2.4.27_2.4.27-10sarge1.diff.gz kernel-source-2.4.27_2.4.27-10sarge1.dsc to pool/main/k/kernel-source-2.4.27/kernel-source-2.4.27_2.4.27-10sarge1.dsc kernel-source-2.4.27_2.4.27-10sarge1_all.deb to pool/main/k/kernel-source-2.4.27/kernel-source-2.4.27_2.4.27-10sarge1_all.deb kernel-tree-2.4.27_2.4.27-10sarge1_all.deb to pool/main/k/kernel-source-2.4.27/kernel-tree-2.4.27_2.4.27-10sarge1_all.deb A
Bug#323059: marked as done (kernel-source-2.6.8 fails at make menuconfig command)
Your message dated Wed, 14 Dec 2005 19:47:25 -0800 with message-id [EMAIL PROTECTED] and subject line Bug#323059: fixed in kernel-source-2.6.8 2.6.8-16sarge1 has caused the attached Bug report to be marked as done. This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what I am talking about this indicates a serious mail system misconfiguration somewhere. Please contact me immediately.) Debian bug tracking system administrator (administrator, Debian Bugs database) -- Received: (at submit) by bugs.debian.org; 14 Aug 2005 13:23:05 + From [EMAIL PROTECTED] Sun Aug 14 06:23:05 2005 Return-path: [EMAIL PROTECTED] Received: from smtp102.sbc.mail.mud.yahoo.com [68.142.198.201] by spohr.debian.org with smtp (Exim 3.36 1 (Debian)) id 1E4IS9-00016j-00; Sun, 14 Aug 2005 06:23:05 -0700 Received: (qmail 65217 invoked from network); 14 Aug 2005 13:22:33 - Received: from unknown (HELO localhost.localdomain) ([EMAIL PROTECTED]@67.67.247.95 with plain) by smtp102.sbc.mail.mud.yahoo.com with SMTP; 14 Aug 2005 13:22:33 - Reply-To: [EMAIL PROTECTED] To: [EMAIL PROTECTED] Subject: kernel-source-2.6.8 fails at make menuconfig command Date: Sun, 14 Aug 2005 08:22:30 -0500 From: Charles Lear [EMAIL PROTECTED] Content-Type: text/plain; format=flowed; delsp=yes; charset=iso-8859-1 MIME-Version: 1.0 Content-Transfer-Encoding: 8bit Message-ID: [EMAIL PROTECTED] User-Agent: Opera M2/8.02 (Linux, build 1272) Delivered-To: [EMAIL PROTECTED] X-Spam-Checker-Version: SpamAssassin 2.60-bugs.debian.org_2005_01_02 (1.212-2003-09-23-exp) on spohr.debian.org X-Spam-Level: X-Spam-Status: No, hits=-8.0 required=4.0 tests=BAYES_00,HAS_PACKAGE autolearn=no version=2.60-bugs.debian.org_2005_01_02 Package: kernel-source Version: 2.6.8 I installed the Deiban testing (Etch) version on 08-13-05 and have not been able to get the kernel-source-2.6.8 to compile. It consistently fails at the 'make menuconfig' command. The only major difference I am aware of between this installation and previous examples is the recent inclusion of the gcc 4.0.1 packages. See output below: # make menuconfig HOSTCC scripts/basic/fixdep HOSTCC scripts/basic/split-include HOSTCC scripts/basic/docproc SHIPPED scripts/kconfig/zconf.tab.h HOSTCC scripts/kconfig/conf.o HOSTCC scripts/kconfig/mconf.o scripts/kconfig/mconf.c:91: error: static declaration of 'current_menu' followsnon-static declaration scripts/kconfig/lkc.h:63: error: previous declaration of 'current_menu' was here make[1]: *** [scripts/kconfig/mconf.o] Error 1 make: *** [menuconfig] Error 2 # gcc --version gcc (GCC) 4.0.1 (Debian 4.0.1-2) Copyright (C) 2005 Free Software Foundation, Inc. This is free software; see the source for copying conditions. There is NO warranty; not even for MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. # uname -a Linux linux 2.6.8-2-k7 #1 Thu May 19 18:03:29 JST 2005 i686 GNU/Linux --- Received: (at 323059-close) by bugs.debian.org; 15 Dec 2005 03:50:58 + From [EMAIL PROTECTED] Wed Dec 14 19:50:58 2005 Return-path: [EMAIL PROTECTED] Received: from katie by spohr.debian.org with local (Exim 4.50) id 1Emk5V-0006BY-MI; Wed, 14 Dec 2005 19:47:25 -0800 From: Simon Horman [EMAIL PROTECTED] To: [EMAIL PROTECTED] X-Katie: $Revision: 1.60 $ Subject: Bug#323059: fixed in kernel-source-2.6.8 2.6.8-16sarge1 Message-Id: [EMAIL PROTECTED] Sender: Archive Administrator [EMAIL PROTECTED] Date: Wed, 14 Dec 2005 19:47:25 -0800 X-Spam-Checker-Version: SpamAssassin 2.60-bugs.debian.org_2005_01_02 (1.212-2003-09-23-exp) on spohr.debian.org X-Spam-Level: X-Spam-Status: No, hits=-5.0 required=4.0 tests=BAYES_01,HAS_BUG_NUMBER autolearn=no version=2.60-bugs.debian.org_2005_01_02 Source: kernel-source-2.6.8 Source-Version: 2.6.8-16sarge1 We believe that the bug you reported is fixed in the latest version of kernel-source-2.6.8, which is due to be installed in the Debian FTP archive: kernel-doc-2.6.8_2.6.8-16sarge1_all.deb to pool/main/k/kernel-source-2.6.8/kernel-doc-2.6.8_2.6.8-16sarge1_all.deb kernel-patch-debian-2.6.8_2.6.8-16sarge1_all.deb to pool/main/k/kernel-source-2.6.8/kernel-patch-debian-2.6.8_2.6.8-16sarge1_all.deb kernel-source-2.6.8_2.6.8-16sarge1.diff.gz to pool/main/k/kernel-source-2.6.8/kernel-source-2.6.8_2.6.8-16sarge1.diff.gz kernel-source-2.6.8_2.6.8-16sarge1.dsc to pool/main/k/kernel-source-2.6.8/kernel-source-2.6.8_2.6.8-16sarge1.dsc kernel-source-2.6.8_2.6.8-16sarge1_all.deb to pool/main/k/kernel-source-2.6.8/kernel-source-2.6.8_2.6.8-16sarge1_all.deb kernel-tree-2.6.8_2.6.8-16sarge1_all.deb to pool/main/k/kernel-source-2.6.8/kernel-tree-2.6.8_2.6.8-16sarge1_all.deb A summary of the
kernel-source-2.6.8_2.6.8-16sarge1_i386.changes ACCEPTED
Mapping stable-security to proposed-updates. Accepted: kernel-doc-2.6.8_2.6.8-16sarge1_all.deb to pool/main/k/kernel-source-2.6.8/kernel-doc-2.6.8_2.6.8-16sarge1_all.deb kernel-patch-debian-2.6.8_2.6.8-16sarge1_all.deb to pool/main/k/kernel-source-2.6.8/kernel-patch-debian-2.6.8_2.6.8-16sarge1_all.deb kernel-source-2.6.8_2.6.8-16sarge1.diff.gz to pool/main/k/kernel-source-2.6.8/kernel-source-2.6.8_2.6.8-16sarge1.diff.gz kernel-source-2.6.8_2.6.8-16sarge1.dsc to pool/main/k/kernel-source-2.6.8/kernel-source-2.6.8_2.6.8-16sarge1.dsc kernel-source-2.6.8_2.6.8-16sarge1_all.deb to pool/main/k/kernel-source-2.6.8/kernel-source-2.6.8_2.6.8-16sarge1_all.deb kernel-tree-2.6.8_2.6.8-16sarge1_all.deb to pool/main/k/kernel-source-2.6.8/kernel-tree-2.6.8_2.6.8-16sarge1_all.deb Announcing to debian-changes@lists.debian.org Closing bugs: 309308 311357 317286 321401 322237 322339 323059 Thank you for your contribution to Debian. -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
kernel-source-2.4.27_2.4.27-10sarge1_i386.changes ACCEPTED
Mapping stable-security to proposed-updates. Accepted: kernel-doc-2.4.27_2.4.27-10sarge1_all.deb to pool/main/k/kernel-source-2.4.27/kernel-doc-2.4.27_2.4.27-10sarge1_all.deb kernel-patch-debian-2.4.27_2.4.27-10sarge1_all.deb to pool/main/k/kernel-source-2.4.27/kernel-patch-debian-2.4.27_2.4.27-10sarge1_all.deb kernel-source-2.4.27_2.4.27-10sarge1.diff.gz to pool/main/k/kernel-source-2.4.27/kernel-source-2.4.27_2.4.27-10sarge1.diff.gz kernel-source-2.4.27_2.4.27-10sarge1.dsc to pool/main/k/kernel-source-2.4.27/kernel-source-2.4.27_2.4.27-10sarge1.dsc kernel-source-2.4.27_2.4.27-10sarge1_all.deb to pool/main/k/kernel-source-2.4.27/kernel-source-2.4.27_2.4.27-10sarge1_all.deb kernel-tree-2.4.27_2.4.27-10sarge1_all.deb to pool/main/k/kernel-source-2.4.27/kernel-tree-2.4.27_2.4.27-10sarge1_all.deb Announcing to debian-changes@lists.debian.org Closing bugs: 311164 319629 320256 323318 Thank you for your contribution to Debian. -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
Bug#343417: Several crashs in many machines.
Package: kernel-image-2.4.27-nubus Version: 2.4.27-11 When the kernel start to get some memory that was swapped, the application that it need that memory almost in 90% of times will crash when the quantity of memory it need is more than 30 megabytes of swapped memory, causing illegal instructions (sig 4),or segfaults.Not mattering the application (even Xserver, and init), when the system is in heavy load (not so heavy) the app crash. Sorry so much for my english, Im reporting that has occuring in more than 1 year. The machines crashing are all Macintosh Performas 5200 and 6300 series (including others like 5215CD and 6320, not the 6360 that is PCI), tests were made in several conditions of memorys and hard drives, the distribution (Debian) in unimportant, MkLinux and MkLinux Mach Kernels also crashing. I will try debug the kernel (with my short devel knowledge), and report if I get something. -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
Processing of kernel-patch-powerpc-2.4.27_2.4.27-10sarge1_powerpc.changes
kernel-patch-powerpc-2.4.27_2.4.27-10sarge1_powerpc.changes uploaded successfully to localhost along with the files: kernel-patch-powerpc-2.4.27_2.4.27-10sarge1.dsc kernel-patch-powerpc-2.4.27_2.4.27-10sarge1.tar.gz kernel-patch-2.4.27-apus_2.4.27-10sarge1_powerpc.deb kernel-headers-2.4.27-apus_2.4.27-10sarge1_powerpc.deb kernel-image-2.4.27-apus_2.4.27-10sarge1_powerpc.deb kernel-build-2.4.27-apus_2.4.27-10sarge1_powerpc.deb kernel-patch-2.4.27-nubus_2.4.27-10sarge1_powerpc.deb kernel-headers-2.4.27-nubus_2.4.27-10sarge1_powerpc.deb kernel-image-2.4.27-nubus_2.4.27-10sarge1_powerpc.deb kernel-build-2.4.27-nubus_2.4.27-10sarge1_powerpc.deb kernel-patch-2.4.27-powerpc_2.4.27-10sarge1_powerpc.deb kernel-headers-2.4.27-powerpc_2.4.27-10sarge1_powerpc.deb kernel-image-2.4.27-powerpc_2.4.27-10sarge1_powerpc.deb kernel-build-2.4.27-powerpc_2.4.27-10sarge1_powerpc.deb kernel-image-2.4.27-powerpc-smp_2.4.27-10sarge1_powerpc.deb kernel-build-2.4.27-powerpc-smp_2.4.27-10sarge1_powerpc.deb kernel-image-2.4.27-powerpc-small_2.4.27-10sarge1_powerpc.deb kernel-build-2.4.27-powerpc-small_2.4.27-10sarge1_powerpc.deb Greetings, Your Debian queue daemon -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
Processing of kernel-image-2.4.27-i386_2.4.27-10sarge1_i386.changes
kernel-image-2.4.27-i386_2.4.27-10sarge1_i386.changes uploaded successfully to localhost along with the files: kernel-image-2.4.27-i386_2.4.27-10sarge1.dsc kernel-image-2.4.27-i386_2.4.27-10sarge1.tar.gz kernel-headers-2.4.27-2_2.4.27-10sarge1_i386.deb kernel-pcmcia-modules-2.4.27-2-586tsc_2.4.27-10sarge1_i386.deb kernel-headers-2.4.27-2-586tsc_2.4.27-10sarge1_i386.deb kernel-image-2.4.27-2-586tsc_2.4.27-10sarge1_i386.deb kernel-pcmcia-modules-2.4.27-2-386_2.4.27-10sarge1_i386.deb kernel-headers-2.4.27-2-386_2.4.27-10sarge1_i386.deb kernel-image-2.4.27-2-386_2.4.27-10sarge1_i386.deb kernel-pcmcia-modules-2.4.27-2-686-smp_2.4.27-10sarge1_i386.deb kernel-headers-2.4.27-2-686-smp_2.4.27-10sarge1_i386.deb kernel-image-2.4.27-2-686-smp_2.4.27-10sarge1_i386.deb kernel-pcmcia-modules-2.4.27-2-686_2.4.27-10sarge1_i386.deb kernel-headers-2.4.27-2-686_2.4.27-10sarge1_i386.deb kernel-image-2.4.27-2-686_2.4.27-10sarge1_i386.deb kernel-pcmcia-modules-2.4.27-2-k6_2.4.27-10sarge1_i386.deb kernel-headers-2.4.27-2-k6_2.4.27-10sarge1_i386.deb kernel-image-2.4.27-2-k6_2.4.27-10sarge1_i386.deb kernel-pcmcia-modules-2.4.27-2-k7_2.4.27-10sarge1_i386.deb kernel-headers-2.4.27-2-k7_2.4.27-10sarge1_i386.deb kernel-image-2.4.27-2-k7_2.4.27-10sarge1_i386.deb kernel-pcmcia-modules-2.4.27-2-k7-smp_2.4.27-10sarge1_i386.deb kernel-headers-2.4.27-2-k7-smp_2.4.27-10sarge1_i386.deb kernel-image-2.4.27-2-k7-smp_2.4.27-10sarge1_i386.deb kernel-build-2.4.27-2_2.4.27-10sarge1_i386.deb Greetings, Your Debian queue daemon -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
Processing of kernel-image-2.6.8-i386_2.6.8-16sarge1_i386.changes
kernel-image-2.6.8-i386_2.6.8-16sarge1_i386.changes uploaded successfully to localhost along with the files: kernel-image-2.6.8-i386_2.6.8-16sarge1.dsc kernel-image-2.6.8-i386_2.6.8-16sarge1.tar.gz kernel-headers-2.6.8-2_2.6.8-16sarge1_i386.deb kernel-headers-2.6.8-2-686-smp_2.6.8-16sarge1_i386.deb kernel-image-2.6.8-2-686-smp_2.6.8-16sarge1_i386.deb kernel-headers-2.6.8-2-386_2.6.8-16sarge1_i386.deb kernel-image-2.6.8-2-386_2.6.8-16sarge1_i386.deb kernel-headers-2.6.8-2-686_2.6.8-16sarge1_i386.deb kernel-image-2.6.8-2-686_2.6.8-16sarge1_i386.deb kernel-headers-2.6.8-2-k7_2.6.8-16sarge1_i386.deb kernel-image-2.6.8-2-k7_2.6.8-16sarge1_i386.deb kernel-headers-2.6.8-2-k7-smp_2.6.8-16sarge1_i386.deb kernel-image-2.6.8-2-k7-smp_2.6.8-16sarge1_i386.deb Greetings, Your Debian queue daemon -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
kernel-image-2.4.27-i386_2.4.27-10sarge1_i386.changes ACCEPTED
Mapping stable-security to proposed-updates. Accepted: kernel-build-2.4.27-2_2.4.27-10sarge1_i386.deb to pool/main/k/kernel-image-2.4.27-i386/kernel-build-2.4.27-2_2.4.27-10sarge1_i386.deb kernel-headers-2.4.27-2-386_2.4.27-10sarge1_i386.deb to pool/main/k/kernel-image-2.4.27-i386/kernel-headers-2.4.27-2-386_2.4.27-10sarge1_i386.deb kernel-headers-2.4.27-2-586tsc_2.4.27-10sarge1_i386.deb to pool/main/k/kernel-image-2.4.27-i386/kernel-headers-2.4.27-2-586tsc_2.4.27-10sarge1_i386.deb kernel-headers-2.4.27-2-686-smp_2.4.27-10sarge1_i386.deb to pool/main/k/kernel-image-2.4.27-i386/kernel-headers-2.4.27-2-686-smp_2.4.27-10sarge1_i386.deb kernel-headers-2.4.27-2-686_2.4.27-10sarge1_i386.deb to pool/main/k/kernel-image-2.4.27-i386/kernel-headers-2.4.27-2-686_2.4.27-10sarge1_i386.deb kernel-headers-2.4.27-2-k6_2.4.27-10sarge1_i386.deb to pool/main/k/kernel-image-2.4.27-i386/kernel-headers-2.4.27-2-k6_2.4.27-10sarge1_i386.deb kernel-headers-2.4.27-2-k7-smp_2.4.27-10sarge1_i386.deb to pool/main/k/kernel-image-2.4.27-i386/kernel-headers-2.4.27-2-k7-smp_2.4.27-10sarge1_i386.deb kernel-headers-2.4.27-2-k7_2.4.27-10sarge1_i386.deb to pool/main/k/kernel-image-2.4.27-i386/kernel-headers-2.4.27-2-k7_2.4.27-10sarge1_i386.deb kernel-headers-2.4.27-2_2.4.27-10sarge1_i386.deb to pool/main/k/kernel-image-2.4.27-i386/kernel-headers-2.4.27-2_2.4.27-10sarge1_i386.deb kernel-image-2.4.27-2-386_2.4.27-10sarge1_i386.deb to pool/main/k/kernel-image-2.4.27-i386/kernel-image-2.4.27-2-386_2.4.27-10sarge1_i386.deb kernel-image-2.4.27-2-586tsc_2.4.27-10sarge1_i386.deb to pool/main/k/kernel-image-2.4.27-i386/kernel-image-2.4.27-2-586tsc_2.4.27-10sarge1_i386.deb kernel-image-2.4.27-2-686-smp_2.4.27-10sarge1_i386.deb to pool/main/k/kernel-image-2.4.27-i386/kernel-image-2.4.27-2-686-smp_2.4.27-10sarge1_i386.deb kernel-image-2.4.27-2-686_2.4.27-10sarge1_i386.deb to pool/main/k/kernel-image-2.4.27-i386/kernel-image-2.4.27-2-686_2.4.27-10sarge1_i386.deb kernel-image-2.4.27-2-k6_2.4.27-10sarge1_i386.deb to pool/main/k/kernel-image-2.4.27-i386/kernel-image-2.4.27-2-k6_2.4.27-10sarge1_i386.deb kernel-image-2.4.27-2-k7-smp_2.4.27-10sarge1_i386.deb to pool/main/k/kernel-image-2.4.27-i386/kernel-image-2.4.27-2-k7-smp_2.4.27-10sarge1_i386.deb kernel-image-2.4.27-2-k7_2.4.27-10sarge1_i386.deb to pool/main/k/kernel-image-2.4.27-i386/kernel-image-2.4.27-2-k7_2.4.27-10sarge1_i386.deb kernel-image-2.4.27-i386_2.4.27-10sarge1.dsc to pool/main/k/kernel-image-2.4.27-i386/kernel-image-2.4.27-i386_2.4.27-10sarge1.dsc kernel-image-2.4.27-i386_2.4.27-10sarge1.tar.gz to pool/main/k/kernel-image-2.4.27-i386/kernel-image-2.4.27-i386_2.4.27-10sarge1.tar.gz kernel-pcmcia-modules-2.4.27-2-386_2.4.27-10sarge1_i386.deb to pool/main/k/kernel-image-2.4.27-i386/kernel-pcmcia-modules-2.4.27-2-386_2.4.27-10sarge1_i386.deb kernel-pcmcia-modules-2.4.27-2-586tsc_2.4.27-10sarge1_i386.deb to pool/main/k/kernel-image-2.4.27-i386/kernel-pcmcia-modules-2.4.27-2-586tsc_2.4.27-10sarge1_i386.deb kernel-pcmcia-modules-2.4.27-2-686-smp_2.4.27-10sarge1_i386.deb to pool/main/k/kernel-image-2.4.27-i386/kernel-pcmcia-modules-2.4.27-2-686-smp_2.4.27-10sarge1_i386.deb kernel-pcmcia-modules-2.4.27-2-686_2.4.27-10sarge1_i386.deb to pool/main/k/kernel-image-2.4.27-i386/kernel-pcmcia-modules-2.4.27-2-686_2.4.27-10sarge1_i386.deb kernel-pcmcia-modules-2.4.27-2-k6_2.4.27-10sarge1_i386.deb to pool/main/k/kernel-image-2.4.27-i386/kernel-pcmcia-modules-2.4.27-2-k6_2.4.27-10sarge1_i386.deb kernel-pcmcia-modules-2.4.27-2-k7-smp_2.4.27-10sarge1_i386.deb to pool/main/k/kernel-image-2.4.27-i386/kernel-pcmcia-modules-2.4.27-2-k7-smp_2.4.27-10sarge1_i386.deb kernel-pcmcia-modules-2.4.27-2-k7_2.4.27-10sarge1_i386.deb to pool/main/k/kernel-image-2.4.27-i386/kernel-pcmcia-modules-2.4.27-2-k7_2.4.27-10sarge1_i386.deb Announcing to debian-changes@lists.debian.org Thank you for your contribution to Debian. -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
kernel-image-2.6.8-i386_2.6.8-16sarge1_i386.changes ACCEPTED
Mapping stable-security to proposed-updates. Accepted: kernel-headers-2.6.8-2-386_2.6.8-16sarge1_i386.deb to pool/main/k/kernel-image-2.6.8-i386/kernel-headers-2.6.8-2-386_2.6.8-16sarge1_i386.deb kernel-headers-2.6.8-2-686-smp_2.6.8-16sarge1_i386.deb to pool/main/k/kernel-image-2.6.8-i386/kernel-headers-2.6.8-2-686-smp_2.6.8-16sarge1_i386.deb kernel-headers-2.6.8-2-686_2.6.8-16sarge1_i386.deb to pool/main/k/kernel-image-2.6.8-i386/kernel-headers-2.6.8-2-686_2.6.8-16sarge1_i386.deb kernel-headers-2.6.8-2-k7-smp_2.6.8-16sarge1_i386.deb to pool/main/k/kernel-image-2.6.8-i386/kernel-headers-2.6.8-2-k7-smp_2.6.8-16sarge1_i386.deb kernel-headers-2.6.8-2-k7_2.6.8-16sarge1_i386.deb to pool/main/k/kernel-image-2.6.8-i386/kernel-headers-2.6.8-2-k7_2.6.8-16sarge1_i386.deb kernel-headers-2.6.8-2_2.6.8-16sarge1_i386.deb to pool/main/k/kernel-image-2.6.8-i386/kernel-headers-2.6.8-2_2.6.8-16sarge1_i386.deb kernel-image-2.6.8-2-386_2.6.8-16sarge1_i386.deb to pool/main/k/kernel-image-2.6.8-i386/kernel-image-2.6.8-2-386_2.6.8-16sarge1_i386.deb kernel-image-2.6.8-2-686-smp_2.6.8-16sarge1_i386.deb to pool/main/k/kernel-image-2.6.8-i386/kernel-image-2.6.8-2-686-smp_2.6.8-16sarge1_i386.deb kernel-image-2.6.8-2-686_2.6.8-16sarge1_i386.deb to pool/main/k/kernel-image-2.6.8-i386/kernel-image-2.6.8-2-686_2.6.8-16sarge1_i386.deb kernel-image-2.6.8-2-k7-smp_2.6.8-16sarge1_i386.deb to pool/main/k/kernel-image-2.6.8-i386/kernel-image-2.6.8-2-k7-smp_2.6.8-16sarge1_i386.deb kernel-image-2.6.8-2-k7_2.6.8-16sarge1_i386.deb to pool/main/k/kernel-image-2.6.8-i386/kernel-image-2.6.8-2-k7_2.6.8-16sarge1_i386.deb kernel-image-2.6.8-i386_2.6.8-16sarge1.dsc to pool/main/k/kernel-image-2.6.8-i386/kernel-image-2.6.8-i386_2.6.8-16sarge1.dsc kernel-image-2.6.8-i386_2.6.8-16sarge1.tar.gz to pool/main/k/kernel-image-2.6.8-i386/kernel-image-2.6.8-i386_2.6.8-16sarge1.tar.gz Announcing to debian-changes@lists.debian.org Thank you for your contribution to Debian. -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
Bug#342248: [m68k headers] binaries are i386 - cannot execute binary file
Hi, On Tue, Dec 06, 2005 at 03:48:40PM +0100, Max Vozeler wrote: Package: linux-2.6 Version: 2.6.12-10 Severity: important This bug is a bit weird :-) Apparently the binaries in m68k -headers were built for i386. Yes, this may very well be possible, since the m68k linux-* packages were cross-compiled on i386. Since the linux-image-* packages are built in the same run, and they are properly cross-compiled for m68k and actually work (at least) on (my) m68k boxes, this must be a bug in the linux-headers build rules, they should be cross-compiled, too. Can somebody look into that? This breaks builds of external modules as they try to execute eg. scripts/basic/fixdep on m68k. Do you have any external modules for m68k that are not part of the kernel? Who is supplying those? Christian -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
Bug#343424: linux-doc-2.6.14: s/varios/various/ typo in long description
Package: linux-doc-2.6.14 Version: 2.6.14-4 Severity: minor Please s/varios/various/ in the long description. -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]