Hi Adid,
On Thu, Jun 13, 2019 at 09:38:22PM +, Adit Ranadive wrote:
> Dear Maintainer,
>
> Can you give me any ETA on when the patch in this bug would be applied
> to the Debian linux image?
I think you might want to ask here actually upstream for a backport to
stable series if that matches
Processing commands for cont...@bugs.debian.org:
> reassign 930498 src:linux
Bug #930498 [linux-image-amd64] Enabling VMware PVRDMA driver
Bug reassigned from package 'linux-image-amd64' to 'src:linux'.
No longer marked as found in versions 5.0.0-trunk.
Ignoring request to alter fixed versions of
Processing commands for cont...@bugs.debian.org:
> # accordign to reporter
> reassign 929784 4.19.37-3
Bug #929784 [linux-image-amd64] linux-image-amd64: amd_iommu conflict with
Marvell Sata controller
Bug reassigned from package 'linux-image-amd64' to '4.19.37-3'.
Warning: Unknown package '4.19.
Hi,
On Fri, May 24, 2019 at 11:36:43AM -0400, thom...@fastmail.cn wrote:
> I was looking through the config and noticed some laptop related
> stuff was missing. Any reason for these or just a mistake?
> # CONFIG_SURFACE3_WMI is not set
> # CONFIG_ACER_WIRELESS is not set
> # CONFIG_INTEL_WMI_THUND
Processing commands for cont...@bugs.debian.org:
> limit source linux
Limiting to bugs with field 'source' containing at least one of 'linux'
Limit currently set to 'source':'linux'
> tags 929366 + pending
Bug #929366 [src:linux] linux-image-4.19.0-5-octeon: usercopy: Kernel memory
overwrite att
Processing commands for cont...@bugs.debian.org:
> tags 929366 + upstream fixed-upstream
Bug #929366 [src:linux] linux-image-4.19.0-5-octeon: usercopy: Kernel memory
overwrite attempt detected (in systemd-timedated)
Added tag(s) upstream and fixed-upstream.
> thanks
Stopping processing here.
Ple
Processing commands for cont...@bugs.debian.org:
> reassign 930522 src:linux 4.19.37-3
Bug #930522 [linux-image-4.19.0-5-amd64] linux: task md5_raid6:203 blocked for
more than 120 seconds
Bug reassigned from package 'linux-image-4.19.0-5-amd64' to 'src:linux'.
No longer marked as found in version
Package: src:linux
Version: 4.19.37-3
Severity: grave
Tags: security
Justification: user security hole
When logging out, a part of the previous session is still visible.
This might be used to compromise the user's account or leak other
private information, depending on what was written on the scre
On Fri, 14 Jun 2019, Thorsten Glaser wrote:
> Currently hanging processes:
Of course, sending the bug mail also failed, while I could
still do “virsh -c qemu:///system list --all”, which was
almost certainly not in the cache.
13610 ?D 0:00 /usr/sbin/postdrop -r
13615 ?D
Package: linux-image-4.19.0-5-amd64
Version: 4.19.37-3
Severity: important
We’re back to tasks hanging, 99% of CPU being in wait.
This is somewhat similar to #913138 but not identical:
HDD reads seem to still work, as do some new writes,
but not all of them (e.g. I can run reportbug, but not
“man
Kedves Hölgyem/Uram!
2019 januárjától szinte minden béren kívüli juttatás jövedelemként fog adózni
(kivételt képez ez alól a SZÉP kártya). A változások ellenére a vállalatok több
mint 55%-a meg kívánja tartani a dolgozói juttatások nettó összegét, magára
vállalva ezzel a megemelkedett adóterhek
11 matches
Mail list logo