Thank you for the additional information you have supplied regarding
this Bug report.
This is an automatically generated reply to let you know your message
has been received.
Your message is being forwarded to the package maintainers and other
interested parties for their attention; they will rep
I've uploaded a new version of linux to:
https://people.debian.org/~benh/packages/jessie-security/
which I believe will fix this regression (bug #925919). Please let me
know whether it works for you.
I only included the amd64 linux-image package and sources there, but
can add i386 linux-image pac
On Fri, 2019-03-29 at 11:13 +0100, Pierre Fourès wrote:
> The way I understand it, but I asked for clarification and
> confirmation in my previous message [1], is that all « updates » goes
> into -proposed-updates/, but the one who need to be quickly applied
> into the distribution (but aren't secu
Hi,
On 18/03/2019 15:56, Sylvain Beucler wrote:
> On Thu, Mar 07, 2019 at 08:02:18PM +0100, Laura Arjona Reina wrote:
>> El 5/3/19 a las 16:07, Markus Koschany escribió:
>>> thank your for your work on our website. Ideally we would like to make
>>> the whole process fully automatic without the nee
On 27.03.19 11:20, Bernie Elbourn wrote:
I am very grateful for all the work done here. You are all heroes!
Can I gently ask if we can just blank the stretch-updates archive next
time
round please. Otherwise every stable machine out there now will need a
change.
Am 27.03.19 um 12:50 schrieb
Le ven. 29 mars 2019 à 10:11, Matus UHLAR - fantomas
a écrit :
>
> >>On 27.03.19 11:20, Bernie Elbourn wrote:
> >>>If it is possible to wiz up a blank jessie-updates this will save me
> >>>visiting a bunch of systems throwing apt errors in next few days.
>
> >On 2019-03-27 11:50, Matus UHLAR - fan
There is already a report in the BTS about this as well.
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=925918
smime.p7s
Description: S/MIME Cryptographic Signature
Am 29.03.19 um 10:41 schrieb Bernhard Schmidt:
Hi,
>
> sorry for not setting References correctly, I wasn't subscribed until now.
>
> We're hitting the same issue. Sometimes we see a backtrace in various
> places, most of the times the machine just hangs (the cursor stops
> blinking and it doesn
Hi,
sorry for not setting References correctly, I wasn't subscribed until now.
We're hitting the same issue. Sometimes we see a backtrace in various
places, most of the times the machine just hangs (the cursor stops
blinking and it doesn't respond anymore).
Rebooting into -7 seems to fix it.
We
Hi
On Friday 29 March 2019 03:03 PM, Matus UHLAR - fantomas wrote:
> Hello,
>
> trying to look at changelog of packages in LTS, it's not available on links
> from packages.debian.org that point to metadata.ftp-master.d.o
>
> e.g.
> https://packages.debian.org/jessie/linux-support-3.16.0-6
> http
Hello,
trying to look at changelog of packages in LTS, it's not available on links
from packages.debian.org that point to metadata.ftp-master.d.o
e.g.
https://packages.debian.org/jessie/linux-support-3.16.0-6
https://packages.debian.org/jessie/linux-support-3.16.0-7
https://packages.debian.org/j
On 27.03.19 11:20, Bernie Elbourn wrote:
If it is possible to wiz up a blank jessie-updates this will save me
visiting a bunch of systems throwing apt errors in next few days.
On 2019-03-27 11:50, Matus UHLAR - fantomas wrote:
I wonder if it wasn't blank already. All of its contents was
suppo
Hi,
Our Debian 8 servers have picked up the kernel security update
linux-image-3.16.0-8-amd64 .
Soon after reboot, problems started to appear, mainly various process crashes
with messages like :
Mar 28 11:07:35 server123 kernel: [16203.774877] java: Corrupted page table
at address d58184a0
13 matches
Mail list logo