Package: win32-loader
Version: 0.10.1
Severity: wishlist
Tags: l10n patch
Russian debconf templates translation update is attached.
-- System Information:
Debian Release: bullseye/sid
APT prefers testing
APT policy: (500, 'testing')
Architecture: amd64 (x86_64)
Foreign Architectures: i386
Ke
Package: installation-reports
Severity: minor
Hi,
No problem to report, this is a success report.
-- Package-specific info:
Boot method: USB key
Image version: Debian GNU/Linux 10.4.0 "Buster" - Unofficial amd64 NETINST with
firmware 20200509-10:25 (torrent from
http://cdimage.debian.org/cdim
Hi Marco,
On Sun, Nov 15, 2020 at 10:14:24AM -0400, Marco Shaw wrote:
>https://askubuntu.com/questions/163084/upgrading-ubuntu-chroot-environment
>
>It seems do-release-upgrade is the "best" way to upgrade a chroot.
>
>I think I'm struggling to get this to work as my server does not have an
>inter
https://askubuntu.com/questions/163084/upgrading-ubuntu-chroot-environment
It seems do-release-upgrade is the "best" way to upgrade a chroot.
I think I'm struggling to get this to work as my server does not have an
internet connection so I must point it to my internal mirror.
do-release-upgrade
control: retitle -1 buster-pu: package openssl/1.1.1h-1
On 2020-05-02 22:34:40 [+0100], Adam D. Barratt wrote:
> > > Do we have any feeling for how widespread such certificates might
> > > be?
> > > The fact that there have been two different upstream reports isn't
> > > particularly comforting.
>
5 matches
Mail list logo