Re: Proposed Kernel Updates for Sid: Round 1

2005-12-08 Thread Norbert Tretkowski
* Horms wrote:
> * Recently fixed, in the most need of testing
>   kernel-image-2.4.27-alpha
>   kernel-image-2.6.8-alpha

I'm going to take a look at those next weekend.

Norbert


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Re: Proposed Kernel Updates for Sid: Round 1

2005-12-07 Thread dann frazier
On Thu, 2005-12-08 at 01:24 +, Horms wrote:
>   kernel-image-2.4.27-armwrong distribution, needs fix, random changes

arm should be fine now; all known issues have been fixed and I've been
running the netwinder build for a few days now.  The other flavors could
use testing though.

> You can find the images, and corresponding source in
> http://kernel.debian.net/debian/pool/main/
> 
> And the archive is apt-gettable using:
> 
> deb http://kernel.debian.net/debian/ sarge-proposed-security-updates main
> deb-src http://kernel.debian.net/debian/ sarge-proposed-security-updates main
> 
> 
> If you know of new security bugs, and they aren't in 
> http://svn.debian.org/wsvn/kernel/patch-tracking/?rev=0&sc=0
> then send a note here, to the testing-security team, or
> open a bug in the BTS.

-- 
dann frazier <[EMAIL PROTECTED]>


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Proposed Kernel Updates for Sid: Round 1

2005-12-07 Thread Horms
Hi,

This has been a long time in the coming, but I'm happy
to report that we are slowly, but very surely making progress
towards being able to release a round of security updates for
Sarge.

These updates were actually prepared a little while ago,
but it has taken us a little while to work with the Security
team to get them into shape. Hopefully it won't take so long the
next time around, which will likely kick off as soon as this
round concludes.

The reason that I am writing is to solicit help in testing.
Some minor problems have been found, and mostly fixed,
but the more testing the merrier. 

What we are looking for is problems that have been _introduced_
by the security updates. Particularly problems like,
the system now fails to boot because vmlinuz is missing.

The status of the architectures is:

* Still needs fixing, should happen real soon now
  kernel-image-2.4.27-armwrong distribution, needs fix, random changes
  kernel-patch-2.4.27-mips   needs mipsel -> buildd, pending
* Recently fixed, in the most need of testing
  kernel-image-2.4.27-ia64
  kernel-image-2.4.27-alpha
  kernel-image-2.6.8-alpha
  kernel-patch-powerpc-2.6.8
* Not recently updated, already had some testing
  kernel-image-2.6.8-sparc
  kernel-image-2.4.27-sparc
  kernel-image-2.6.8-hppa
  kernel-image-2.6.8-i386
  kernel-image-2.4.27-i386
  kernel-image-2.6.8-m68k
  kernel-image-2.4.27-m68k
  kernel-image-2.4.27-s390
  kernel-patch-2.4.27-powerpc
  kernel-image-2.6.8-ia64
  kernel-image-2.6.8-s390
  kernel-image-2.6.8-amd64

You can find the images, and corresponding source in
http://kernel.debian.net/debian/pool/main/

And the archive is apt-gettable using:

deb http://kernel.debian.net/debian/ sarge-proposed-security-updates main
deb-src http://kernel.debian.net/debian/ sarge-proposed-security-updates main


If you know of new security bugs, and they aren't in 
http://svn.debian.org/wsvn/kernel/patch-tracking/?rev=0&sc=0
then send a note here, to the testing-security team, or
open a bug in the BTS.

-- 
Horms


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]