Package: installation-reports
Boot method: CD
Image version: Jessie Beta 2 NetInstall
Date: 2015-01-24
Machine: Mac Mini Server Mid 2011
Processor: Intel Core 2 Duo
Memory: 4 GB
Partitions: none yet, 2 brand new 1 TB WD Red HDs
Output of lspci -knn (or lspci -nn): N/A
Base System Install
Control: tag -1 +patch
On Wed, Jan 21, 2015 at 03:46:20PM +, Steve McIntyre wrote:
>So, some progress on this front. I've filed a bug against unetbootin
>itself to ask for warnings "Don't use this for Debian CD images"
>(#775689) and there has been some discussion there.
>
>I've now tried the
Processing control commands:
> tag -1 +patch
Bug #744865 [debian-installer] Add check and warning for unetbootin
Added tag(s) patch.
--
744865: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=744865
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--
To UNSUBSCRIBE, emai
Hi Steve,
Regarding your unetbootin patch:
> +Template: cdrom-detect/unetbootin_detected
> +Type: note
> +# :sl2:
> +_Description: UNetbootin media detected
> + It appears that your installation disk was generated using
> + UNetbootin. UNetbootin is regul
On Sat, Jan 24, 2015 at 09:18:49PM +0100, Holger Wansing wrote:
>Hi Steve,
>
>Regarding your unetbootin patch:
>> +Template: cdrom-detect/unetbootin_detected
>> +Type: note
>> +# :sl2:
>> +_Description: UNetbootin media detected
>> + It appears that your installation disk was generated using
>
acer 720 chromebook in development mode seabios
debian-testing-amd64-xfce-CD-1.iso wkly build 1/19/2015
install screen appears, click on either graphical or non-graphical
install - screen flashes then goes back to seabios screen
1) this usb build works on macbook
2) debian wheezy installs
On Sat, 24 Jan 2015 00:38:29 +0100, Axel Beckert wrote:
> Control: reassign -1 console-setup 0.116
>
> Hi,
>
> Gordon Morehouse wrote:
> > running 'aptitude upgrade' followed by 'aptitude update'
>
> You mean "running 'aptitude update' followed by 'aptitude upgrade'",
> don't you?
Ah, yes, in
Source: busybox
Version: 1:1.20.0-7
Severity: normal
Tags: security patch upstream fixed-upstream
Hi,
the following vulnerability was published for busybox.
CVE-2014-9645[0]:
modprobe wrongly accepts paths as module names
Upstream report is at [1] with fix at [2].
If you fix the vulnerability
8 matches
Mail list logo