Hi everyone,
Salvatore Bonaccorso (2023-05-12):
> The upload was announced in
> https://lists.debian.org/debian-release/2023/05/msg00287.html and
> summarizing consists of importing new stable series. But in particular
> addressing recent CVEs, covering CVE-2023-31436 and CVE-2023-2002.
> Additio
Package: release.debian.org
Severity: normal
User: release.debian@packages.debian.org
Usertags: unblock
X-Debbugs-Cc: li...@packages.debian.org, k...@debian.org,
debian-b...@lists.debian.org, b...@debian.org, car...@debian.org
Control: affects -1 + src:linux
Hi Release team, hi Cyril for debi
Processing commands for cont...@bugs.debian.org:
> reassign 1035939 src:linux 6.1.25-1
Bug #1035939 [linux-image-6.1.0-8-amd64] linux-image-6.1.0-8-amd64: dmesg flood
xhci_hcd :03:00.0: WARN: bandwidth overrun event for slot 6 ep 4 on endpoint
Bug reassigned from package 'linux-image-6.1.0-8-
Processing commands for cont...@bugs.debian.org:
> reassign 1035938 src:linux 5.10.178-3
Bug #1035938 [linux-image-amd64] KVM guests did not boot properly after upgrade
from 11.6 to 11.7
Bug reassigned from package 'linux-image-amd64' to 'src:linux'.
No longer marked as found in versions linux-si
Installing the 6.1.X kernel from the bullseye-backports
apparently solves the problem, so this might be a temporary
solution to affected systems (if applicable).
Kind regards,
--
Kamil Wilczek [https://keys.openpgp.org/]
[6C4BE20A90A1DBFB3CBE2947A832BF5A491F9F2A]
OpenPGP_signature
Description:
Processing control commands:
> reassign -1 debian-kernel-handbook 1.0.21
Bug #1035941 [linux-image-amd64] linux-image-amd64: too much space needed to
build
Bug reassigned from package 'linux-image-amd64' to 'debian-kernel-handbook'.
Ignoring request to alter found versions of bug #1035941 to the
Control: reassign -1 debian-kernel-handbook 1.0.21
Control: severity -1 wishlist
Control: retitle -1 debian-kernel-handbook: Paragraph 4.5.1.1. Disk space
requirements needs an update (from 2018 numbers)?
On Thursday, 11 May 2023 14:33:40 CEST Claude Heiland-Allen wrote:
> I freed up more space,
Package: linux-image-amd64
Severity: normal
X-Debbugs-Cc: cla...@mathr.co.uk
Dear Maintainer,
* What led up to the situation?
I tried to build locally-patched kernel debs:
sudo apt build-dep linux-image-6.1.0-8-amd64-unsigned
apt source linux-image-6.1.0-8-amd64-unsigned
cd linux-6.1.25
# ma
Package: linux-image-amd64
Version: 5.10.178-3
we have a small fleet of Debian servers, some of them are KVM guests.
After an upgrade from 11.6 to 11.7 some of them did not boot up properly
or at all. We narrow down the problem to (probably) the 5.10.0-22-amd64
kernel, because servers boot proper
Package: linux-image-6.1.0-8-amd64
Severity: normal
X-Debbugs-Cc: cla...@mathr.co.uk
Dear Maintainer,
* What led up to the situation?
I noticed a flood of messages (1000 per second!) in dmesg (mirrored in /var/log)
after it filled my drive (16GB of logs total, over a couple of weeks).
The me
Package: linux-image-6.1.0-8-amd64-unsigned
Severity: serious
Tags: ftbfs
Justification: fails to build from source (but built successfully in the past)
X-Debbugs-Cc: cla...@mathr.co.uk
Dear Maintainer,
* What led up to the situation?
I wanted to patch the kernel source to see if it would hel
11 matches
Mail list logo