Your message dated Mon, 24 Jan 2005 21:36:46 -0800
with message-id <[EMAIL PROTECTED]>
and subject line Bugs not fixed from 2.6.8
has caused the attached Bug report to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what I am
talking about this indicates a serious mail system misconfiguration
somewhere.  Please contact me immediately.)

Debian bug tracking system administrator
(administrator, Debian Bugs database)

--------------------------------------
Received: (at submit) by bugs.debian.org; 23 Jan 2005 16:33:35 +0000
>From [EMAIL PROTECTED] Sun Jan 23 08:33:35 2005
Return-path: <[EMAIL PROTECTED]>
Received: from 80-218-227-31.dclient.hispeed.ch (hal9000) [80.218.227.31] 
        by spohr.debian.org with esmtp (Exim 3.35 1 (Debian))
        id 1Cskg7-0002Jz-00; Sun, 23 Jan 2005 08:33:31 -0800
Received: from [192.168.42.12] (aragon [192.168.42.12])
        by hal9000 (Postfix) with ESMTP id 4830436C0D0
        for <[EMAIL PROTECTED]>; Sun, 23 Jan 2005 17:33:21 +0100 (CET)
From: Peter Walser <[EMAIL PROTECTED]>
Date: Sun, 23 Jan 2005 17:33:24 +0100
User-Agent: KMail/1.7.2
MIME-Version: 1.0
Content-Disposition: inline
To: [EMAIL PROTECTED]
Subject: Bugs not fixed from 2.6.8
Content-Type: text/plain;
  charset="us-ascii"
Content-Transfer-Encoding: 7bit
Message-Id: <[EMAIL PROTECTED]>
Delivered-To: [EMAIL PROTECTED]
X-Spam-Checker-Version: SpamAssassin 2.60-bugs.debian.org_2005_01_02 
        (1.212-2003-09-23-exp) on spohr.debian.org
X-Spam-Status: No, hits=-4.3 required=4.0 tests=BAYES_00,FORGED_YAHOO_RCVD,
        HAS_PACKAGE autolearn=no version=2.60-bugs.debian.org_2005_01_02
X-Spam-Level: 

Package: kernel-image-2.6.8-2-686
Version:  2.6.8-12
Severity:  grave

hi

Has someone looked at the bugs in kernel-image-2.6.8-1-386 and 
kernel-image-2.6.8-1-686?
<http://bugs.debian.org/cgi-bin/pkgreport.cgi?pkg=kernel-image-2.6.8-1-386>
Grave functionality bugs - outstanding (1 bug)
Important bugs - outstanding (5 bugs)
Normal bugs - outstanding (9 bugs)
Wishlist items - outstanding (1 bug)
Grave functionality bugs - resolved (2 bugs)
<http://bugs.debian.org/cgi-bin/pkgreport.cgi?pkg=kernel-image-2.6.8-1-686>
Critical bugs - outstanding (1 bug)
Important bugs - outstanding (8 bugs)
Normal bugs - outstanding (21 bugs)
Minor bugs - outstanding (2 bugs)
Wishlist items - outstanding (1 bug)
Normal bugs - resolved (1 bug)

At least not all bugs are tested, if they are still present and the  
people are not informed to test with the newer version 
kernel-image-2.6.8-2-686.
My bug #282800 is still not fixed and you shouldn't go out with this 
2.6.8. In Kernel 2.6.10 this bug is fixed.


Peter

---------------------------------------
Received: (at 291846-done) by bugs.debian.org; 25 Jan 2005 05:36:49 +0000
>From [EMAIL PROTECTED] Mon Jan 24 21:36:49 2005
Return-path: <[EMAIL PROTECTED]>
Received: from dsl093-039-086.pdx1.dsl.speakeasy.net (localhost.localdomain) 
[66.93.39.86] 
        by spohr.debian.org with esmtp (Exim 3.35 1 (Debian))
        id 1CtJNg-0006AC-00; Mon, 24 Jan 2005 21:36:49 -0800
Received: by localhost.localdomain (Postfix, from userid 1000)
        id 994E311AF3C; Mon, 24 Jan 2005 21:36:46 -0800 (PST)
Date: Mon, 24 Jan 2005 21:36:46 -0800
From: Steve Langasek <[EMAIL PROTECTED]>
To: [EMAIL PROTECTED]
Subject: Re: Bugs not fixed from 2.6.8
Message-ID: <[EMAIL PROTECTED]>
Mime-Version: 1.0
Content-Type: multipart/signed; micalg=pgp-sha1;
        protocol="application/pgp-signature"; boundary="/NkBOFFp2J2Af1nK"
Content-Disposition: inline
User-Agent: Mutt/1.5.6+20040907i
Delivered-To: [EMAIL PROTECTED]
X-Spam-Checker-Version: SpamAssassin 2.60-bugs.debian.org_2005_01_02 
        (1.212-2003-09-23-exp) on spohr.debian.org
X-Spam-Status: No, hits=-3.0 required=4.0 tests=BAYES_00 autolearn=no 
        version=2.60-bugs.debian.org_2005_01_02
X-Spam-Level: 


--/NkBOFFp2J2Af1nK
Content-Type: text/plain; charset=us-ascii
Content-Disposition: inline
Content-Transfer-Encoding: quoted-printable

Peter,

These bugs have not been lost; there's really no reason to open new release
critical bugs just to point at release critical bugs that are already open.
If anything, the bugs open against the -1 kernel images probably need to be
reassigned to the -2 kernel images, but it should be confirmed that these
bugs are still present in the new images before doing so.

The release-critical bugs you've pointed to will be addressed before the
sarge release.

--=20
Steve Langasek
postmodern programmer

--/NkBOFFp2J2Af1nK
Content-Type: application/pgp-signature; name="signature.asc"
Content-Description: Digital signature
Content-Disposition: inline

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.2.4 (GNU/Linux)

iD8DBQFB9drsKN6ufymYLloRApYmAKDBNpL+ZZLuHjt5MDg7fECV06todgCgj64C
iqXTWkGVrzE4fqarTVusiNo=
=869X
-----END PGP SIGNATURE-----

--/NkBOFFp2J2Af1nK--


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]

Reply via email to