Control: tags -1 + moreinfo
Hi,
On Sat, Mar 12, 2022 at 01:21:23AM +, Reilly Brogan wrote:
> Package: linux-image-cloud-amd64
> Severity: important
>
> Dear Maintainer,
>
> We recently noticed that instances using linux-image-5.10.0-11-amd64 and
> newer and using Xen-based EC2 instances (su
Processing control commands:
> tags -1 + moreinfo
Bug #1007144 [src:linux] linux-image-cloud-amd64: Network doesn't come up on
AWS Xen-based EC2 instances (ex c4.large)
Added tag(s) moreinfo.
--
1007144: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1007144
Debian Bug Tracking System
Contac
Processing commands for cont...@bugs.debian.org:
> reassign 1007144 src:linux
Bug #1007144 [linux-image-cloud-amd64] linux-image-cloud-amd64: Network doesn't
come up on AWS Xen-based EC2 instances (ex c4.large)
Bug reassigned from package 'linux-image-cloud-amd64' to 'src:linux'.
Ignoring request
Your message dated Tue, 15 Mar 2022 02:26:47 +0100
with message-id
and subject line Re: /sbin/umount.nfs4: error while loading shared libraries:
has caused the Debian Bug report #849487,
regarding /sbin/umount.nfs4: error while loading shared libraries:
to be marked as done.
This means that you c
Your message dated Tue, 15 Mar 2022 00:29:53 +0100
with message-id
and subject line Re: Bug#980284: Update from original submitter
has caused the Debian Bug report #980284,
regarding linux-image-5.10.0-1-amd64: InfraRed receiving timeout, remote
control button pushes duplicated
to be marked as do
Hi
I would like to upload linux version 5.16.14-1 to unstable tomorrow.
It imports 5.16.13, 5.16.14 including several CVE fixes
(CVE-2022-0742, CVE-2022-23036, CVE-2022-23037, CVE-2022-23038,
CVE-2022-23039, CVE-2022-23040, CVE-2022-23041, CVE-2022-23042,
CVE-2022-23960, CVE-2022-24958).
An ABI b
Hi,
The next point release for "buster" (10.12) is scheduled for Saturday,
March 26th. Processing of new uploads into buster-proposed-updates will
be frozen during the preceding weekend.
Regards,
Adam
Hi,
The next point release for "bullseye" (11.3) is scheduled for Saturday,
March 26th. Processing of new uploads into bullseye-proposed-updates
will be frozen during the preceding weekend.
Regards,
Adam
Hi Felix,
On Mon, Mar 14, 2022 at 10:33:22AM +, Moessbauer, Felix wrote:
> In general I agree, but here the situation is a bit different:
> The dependency to the host compiler (e.g. arm64) is too narrow.
Wrong. It certainly is not and beyond that, this aspect is not weakened.
It still require
Accepted:
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
Format: 1.8
Date: Mon, 14 Mar 2022 07:04:37 +0100
Source: linux
Architecture: source
Version: 5.17~rc8-1~exp1
Distribution: experimental
Urgency: medium
Maintainer: Debian Kernel Team
Changed-By: Salvatore Bonaccorso
Changes:
linux (
Hi Helmut,
> From: Helmut Grohne
> Sent: Friday, March 11, 2022 2:49 PM
>
> Hi,
>
> On Thu, Mar 10, 2022 at 02:13:34PM +, Moessbauer, Felix wrote:
> > Many thanks for the patch.
> > I just (manually) backported that to Debian bullseye, tested it for arm64
> > and it
> worked like a charm.
11 matches
Mail list logo