On mar., 2015-09-15 at 00:12 +0100, Ben Hutchings wrote:
> There were several discussions with various people involved; the result
> as I understand it was that a linux-grsecurity package is likely to be
> acceptable in unstable (only) and Jacob would be ready to work on such a
> package in Debian.
Hi new version of the patch for xen-netfront.c , and it's for 3.16.7.
--- a/drivers/net/xen-netfront.c
+++ b/drivers/net/xen-netfront.c
@@ -1827,8 +1827,9 @@ static int xennet_create_queues(struct netfront_info *info,
ret = xennet_init_queue(queue);
if (ret < 0) {
- dev_warn(&info->n
On Mon, 2015-09-14 at 17:23 -0400, micah wrote:
> Erinn Clark writes:
>
> > I'm just wondering if there are any updates to this bug and in particular
> > I'm
> > curious what could happen now that the grsecurity stable patches are only
> > available to sponsors. I still think getting grsec into
Erinn Clark writes:
> I'm just wondering if there are any updates to this bug and in particular I'm
> curious what could happen now that the grsecurity stable patches are only
> available to sponsors. I still think getting grsec into Debian is a very
> important and worthwhile goal, but we should
On lun., 2015-09-14 at 14:15 -0400, Erinn Clark wrote:
> Hi,
>
> I'm just wondering if there are any updates to this bug and in particular I'm
> curious what could happen now that the grsecurity stable patches are only
> available to sponsors. I still think getting grsec into Debian is a very
> im
Hi,
I'm just wondering if there are any updates to this bug and in particular I'm
curious what could happen now that the grsecurity stable patches are only
available to sponsors. I still think getting grsec into Debian is a very
important and worthwhile goal, but we should begin discussing it agai
Processing commands for cont...@bugs.debian.org:
> severity 798948 important
Bug #798948 [src:linux] linux-image-3.16.0-4-amd64: Bridging in XEN is not
working when 32 or more CPU's are used in DomU.
Severity set to 'important' from 'critical'
> tags 798948 + upstream fixed-upstream
Bug #798948 [
Package: src:linux
Version: 3.16.7-ckt11-1+deb8u3
Severity: critical
Tags: patch
Justification: breaks the whole system
Dear Maintainer,
*** Reporter, please consider answering these questions, where appropriate ***
* What led up to the situation?
When uppgrading DomU to Debain Jessie s
Processing commands for cont...@bugs.debian.org:
> fixed 758870 4.1.6-1
Bug #758870 [src:linux] nfs-common: nfs v4: uid/gid lookup fails for some of
the users
Marked as fixed in versions linux/4.1.6-1.
> thanks
Stopping processing here.
Please contact me if you need assistance.
--
758870: http:
Processing commands for cont...@bugs.debian.org:
> notfound 758870 4.1+67~bpo8+1
Bug #758870 [src:linux] nfs-common: nfs v4: uid/gid lookup fails for some of
the users
The source 'linux' and version '4.1+67~bpo8+1' do not appear to match any
binary packages
Ignoring request to alter found versio
reopen 758870
found 758870 3.16.7-ckt11-1+deb8u3
notfound 758870 4.1.0-0.bpo.2-amd64
thanks
Hi,
This bug still exists in the jessie kernel. Upgrading to the backported
kernel from stretch fixes the issue.
--
Pelle
Processing commands for cont...@bugs.debian.org:
> reopen 758870
Bug #758870 {Done: Ben Hutchings } [src:linux]
nfs-common: nfs v4: uid/gid lookup fails for some of the users
'reopen' may be inappropriate when a bug has been closed with a version;
all fixed versions will be cleared, and you may n
Processing commands for cont...@bugs.debian.org:
> unarchive 758870
Bug #758870 {Done: Ben Hutchings } [src:linux]
nfs-common: nfs v4: uid/gid lookup fails for some of the users
Unarchived Bug 758870
> thanks
Stopping processing here.
Please contact me if you need assistance.
--
758870: http://
13 matches
Mail list logo