Accepted:
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
Format: 1.8
Date: Tue, 08 Oct 2019 02:14:11 +0100
Source: klibc
Architecture: source
Version: 2.0.7-1
Distribution: unstable
Urgency: medium
Maintainer: Debian Kernel Team
Changed-By: Ben Hutchings
Closes: 922814 931416 932926
Changes
klibc_2.0.7-1_source.changes uploaded successfully to localhost
along with the files:
klibc_2.0.7-1.dsc
klibc_2.0.7.orig.tar.gz
klibc_2.0.7-1.debian.tar.xz
klibc_2.0.7-1_source.buildinfo
Greetings,
Your Debian queue daemon (running on host usper.debian.org)
The package requires
linux-headers-4.19.0-0.bpo.6-common_4.19.67-2+deb10u1~bpo9+1_amd64
but the corresponding package in stretch-backports is called
linux-headers-4.19.0-0.bpo.6-common_4.19.67-2~bpo9+1_amd64
which leads to a broken dependency.
Your message dated Mon, 07 Oct 2019 23:52:03 +0100
with message-id
and subject line Re: Bug#941952: linux-headers-3.16.0-6-amd64 package removed
from stable repository
has caused the Debian Bug report #941952,
regarding linux-headers-3.16.0-6-amd64 package removed from stable repository
to be mar
Package: linux-headers-3.16.0-6-amd64
Version: 3.16.56-1+deb8u1
Severity: normal
Dear Maintainer,
I work for a security focused company and part of my work is to check our DKMS
modules are well supported in Debian, recently I've started to have issues with
the linux-headers-$(uname -r) packages i
Package: src:linux
Version: 5.2.9-2~bpo10+1
Severity: important
Tags: upstream
Dear Maintainer,
While running kernel 5.2.0-0.bpo.2-amd64 with firmware-iwlwifi
installed, system freezes and becomes non-responsive to any user input.
Freezing occurs shortly after boot with no warning.
Below are pos
Your message dated Mon, 07 Oct 2019 19:04:41 +0100
with message-id <1cb07c6c2b0bb9f70dc403cd7ea358bf06adc1a1.ca...@decadent.org.uk>
and subject line Re: Bug#941910: Patched kernel available in stretch-security,
but meta package still points to older image
has caused the Debian Bug report #941910,
To,
The Teams Debian Boot and Kernel,
Dear Sirs, our Illustrious List Maintainers,
I have a need for which I require your help.
I am posting a link to my Question in the Debian forum:
http://forums.debian.net/viewtopic.php?f=5&t=143901&p=708902#p708902
Although I have posted my query on the Deb
Package: src:linux-latest
Version: 4.9+80+deb9u9
Dear maintainers,
the binary linux-image-4.9.0-11-amd64 (4.9.189-3+deb9u1) provides some
CVE fixes and was released to
stretch-security on 20 Sep 2019. However, the associated meta package on
stretch-security is still
linux-image-amd64 (4.9+80+d
Processing commands for cont...@bugs.debian.org:
> limit source linux
Limiting to bugs with field 'source' containing at least one of 'linux'
Limit currently set to 'source':'linux'
> tags 940530 + pending
Bug #940530 [src:linux] Add CONFIG_BRCMFMAC_SDIO=y to linux-image-rpi
Added tag(s) pending.
10 matches
Mail list logo