Mapping sid to unstable.
Accepted:
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Format: 1.8
Date: Mon, 17 Jun 2019 20:00:22 +0100
Source: linux-signed-i386
Binary: kernel-image-4.19.0-5-686-di nic-modules-4.19.0-5-686-di
nic-wireless-modules-4.19.0-5-686-di nic-shared-modules-4.19.0-5-686-di
* On 6/18/19 3:22 PM, Bastian Blank wrote:
> See #847154 for the workaround.
Thanks. Seems to work fine.
This triggered another question, though: can I assume that buster kernels are
also affected by that problem by default? Given that the shipped user space is
new enough, I figure that option wil
linux-signed-i386_4.19.37+4_source.changes uploaded successfully to localhost
along with the files:
linux-signed-i386_4.19.37+4.dsc
linux-signed-i386_4.19.37+4.tar.xz
Greetings,
Your Debian queue daemon (running on host usper.debian.org)
Accepted:
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
Format: 1.8
Date: Sun, 16 Jun 2019 15:38:39 +0100
Source: linux
Binary: linux-source-4.9 linux-support-4.9.0-9 linux-doc-4.9 linux-manual-4.9
linux-kbuild-4.9 linux-cpupower libcpupower1 libcpupower-dev linux-perf-4.9
libusbip-dev usb
Your message dated Tue, 18 Jun 2019 21:47:21 +
with message-id
and subject line Bug#928989: fixed in linux 4.9.168-1+deb9u3
has caused the Debian Bug report #928989,
regarding linux-image-4.19.0-4-amd64: CVE-2019-11815
to be marked as done.
This means that you claim that the problem has been
Mapping sid to unstable.
Accepted:
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Format: 1.8
Date: Mon, 17 Jun 2019 20:00:22 +0100
Source: linux-signed-amd64
Binary: kernel-image-4.19.0-5-amd64-di nic-modules-4.19.0-5-amd64-di
nic-wireless-modules-4.19.0-5-amd64-di nic-shared-modules-4.19.0-5
Mapping sid to unstable.
Accepted:
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Format: 1.8
Date: Mon, 17 Jun 2019 20:00:22 +0100
Source: linux-signed-arm64
Binary: kernel-image-4.19.0-5-arm64-di nic-modules-4.19.0-5-arm64-di
nic-wireless-modules-4.19.0-5-arm64-di nic-shared-modules-4.19.0-5
linux-signed-arm64_4.19.37+4_source.changes uploaded successfully to localhost
along with the files:
linux-signed-arm64_4.19.37+4.dsc
linux-signed-arm64_4.19.37+4.tar.xz
Greetings,
Your Debian queue daemon (running on host usper.debian.org)
linux-signed-amd64_4.19.37+4_source.changes uploaded successfully to localhost
along with the files:
linux-signed-amd64_4.19.37+4.dsc
linux-signed-amd64_4.19.37+4.tar.xz
Greetings,
Your Debian queue daemon (running on host usper.debian.org)
Processing commands for cont...@bugs.debian.org:
> reassign 930698 src:linux 4.19.37-3
Bug #930698 [linux-image-4.19.0-5-rt-arm64] linux-image-4.19.0-5-rt-arm64:
Kernel OOPs if Connman is run on this kernel
Bug reassigned from package 'linux-image-4.19.0-5-rt-arm64' to 'src:linux'.
No longer mark
Package: linux-image-4.19.0-5-rt-arm64
Version: 4.19.37-3
Severity: normal
Dear Maintainer,
*** Reporter, please consider answering these questions, where appropriate ***
* What led up to the situation?
Install linux-image-4.19.0-5-rt-arm64
I installed the unofficial image from debian arm64
Your message dated Tue, 18 Jun 2019 15:22:29 +0200
with message-id <20190618132228.xsvvgo223pyee...@shell.thinkmo.de>
and subject line Re: Bug#930681: stretch-backports kernel unable to execute
(some) older (e.g., CentOS 6) binaries
has caused the Debian Bug report #930681,
regarding stretch-backp
Package: linux-image-amd64
Version: 4.19.37-3~bpo9+1
Steps to reproduce:
1.) apt-get install mock
2.) [0] /usr/bin/mock -r /etc/mock/epel-6-x86_64.cfg --init
3.) chroot /var/lib/mock/epel-6-x86_64/root/
=> Segmentation fault
=> [53880.200376] bash[25554] vsyscall attempted with vsyscall=none
ip:f
Your message dated Tue, 18 Jun 2019 10:52:03 +
with message-id
and subject line Bug#929366: fixed in linux 4.19.37-4
has caused the Debian Bug report #929366,
regarding linux-image-4.19.0-5-octeon: usercopy: Kernel memory overwrite
attempt detected (in systemd-timedated)
to be marked as done.
Accepted:
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
Format: 1.8
Date: Mon, 17 Jun 2019 20:00:22 +0100
Source: linux
Architecture: source
Version: 4.19.37-4
Distribution: unstable
Urgency: high
Maintainer: Debian Kernel Team
Changed-By: Ben Hutchings
Closes: 929187 929366 929583
Changes
linux_4.19.37-4_source.changes uploaded successfully to localhost
along with the files:
linux_4.19.37-4.dsc
linux_4.19.37-4.debian.tar.xz
linux_4.19.37-4_source.buildinfo
Greetings,
Your Debian queue daemon (running on host usper.debian.org)
Your message dated Tue, 18 Jun 2019 10:52:03 +
with message-id
and subject line Bug#929583: fixed in linux 4.19.37-4
has caused the Debian Bug report #929583,
regarding linux-image-5.0.0-trunk-amd64: Please build with
CONFIG_ALLOW_LOCKDOWN_LIFT_BY_SYSRQ
to be marked as done.
This means that
Your message dated Tue, 18 Jun 2019 10:52:03 +
with message-id
and subject line Bug#929187: fixed in linux 4.19.37-4
has caused the Debian Bug report #929187,
regarding libbpf soversion does not match the package name
to be marked as done.
This means that you claim that the problem has been d
18 matches
Mail list logo