): test the package before
publishing it...
Thanks and regards
Harry Haller
-- System Information:
Debian Release: 10.1
APT prefers stable-updates
APT policy: (500, 'stable-updates'), (500, 'stable')
Architecture: i386 (i686)
Kernel: Linux 4.19.0-6-686-pae (SMP w/4 CPU cores)
On Thu, 10 Mar 2016 17:34:54 + Ben Hutchings wrote:
> On Thu, 2016-03-10 at 17:32 +0100, Harry Junior wrote:
>> Package: linux-image-4.4.0-1-amd64
>> Version: 4.4.4-1
>> Severity: critical
>> Justification: renders system unusable
>>
>>
>>
Package: linux-image-4.4.0-1-amd64
Version: 4.4.4-1
Severity: critical
Justification: renders system unusable
When I run the following commands, the system freezes:
# echo 0 | tee /sys/devices/system/cpu/cpu*/online && echo 1 | sudo tee
/sys/devices/system/cpu/cpu*/online
The system freezes ra
I'm not clear what the process is here. openstack-deploy is known to be broken
in Jessie, so the bug is being closed? Isn't the bug tracker where known issues
are supposed to be tracked?
In any case, if it's know to be broken, why is it still in testing? What's the
point of including a non-work
I haven't been able to get this (i.e. clean install) to work on any machine and
haven't heard from anyone else who could either, so adjusting severity
accordingly.
--
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of "un
get_iplayer again.
Regards
Harry
--
H G Noel @ hgnoel1980.no-ip.org
signature.asc
Description: This is a digitally signed message part
On Thu, 2 Feb 2012, Jakub Wilk wrote:
* Harry Sintonen , 2012-01-31, 01:42:
-D_FORTIFY_SOURCE=2 was enabled in package version 1.8.3p1-3. See:
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=655417
This makes current sid package (1.8.3p1-3) safe.
Maybe. Maybe not. There are known ways of
I=l/571.-1.75,l;)for(putchar(--l%80?
i:10),o=D=l%80*.05-2,i=31;_=O*O,O=2*o*O+I,o=o*o-_+D,o+_+_<4+D&i++<87;);puts
(" Harry 'Piru' Sintonen http://www.iki.fi/sintonen";);}
--
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subje
Damu
I had the same problem but an upgrade to the latest gnome-shell package
in experimental (3.0.2-3+b1 at time of writing) which appears to have a
dependancy on libmozjs7d instead of libmozjs5d seems to have solved it
for me...
Kind Regards
Harry
signature.asc
Description: OpenPGP digital
Hi everyone,
Seeing as 1.1.8-2 contains a fix to a pretty serious bug
(http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=564665) does anyone
have any issues with releasing 1.1.8-2 tomorrow after some testing?
--
Harry Rickards - ha...@linux.com
Debian Lenny server | Debian Sid desktop | UNR
fore a new version though, as I am currently in discussions with
pkg-multimedia-maintainers about becoming a member, which would
require several other changes.
--
Harry Rickards - ha...@linux.com
Debian Lenny server | Debian Sid desktop | UNR Karmic netbook
A good programmer is someone who looks both w
The released 2.6.32 does not have the init_nfsd entry. This has to be
fixed for squeeze.
--
Dr. Harry Edmon E-MAIL: ha...@atmos.washington.edu
206-543-0547 FAX: 206-543-0308 ha...@washington.edu, ha...@uw.edu
Director of IT, College of the Environment and
Director of
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Upstream (Gabriel 'salsaman' Finch) has now filed a bug report for this
problem in the frei0r system -
http://www.piksel.no/projects/frei0r/ticket/16.
- --
Thanks
Harr
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
On 09/13/09 14:04, Bastian Blank wrote:
> On Sun, Sep 13, 2009 at 01:20:57PM +0100, Harry Rickards wrote:
>> On 09/13/09 12:30, Bastian Blank wrote:
>>> I don't see a reason for this exclusion. frei0r is built on all
>>&g
little endian safe (that's upstreams advice) so shouldn't
be depended on in powerpc.
If temporary unavaliable build-deps are no reason for an exclusion, what
should I do for arm? Just leave it not being able t
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Bugger. That should have been frei0r-plugins-dev [!kfreebsd-i386
!kfreebsd-amd64 !hurd-i386 !arm !powerpc]. Will upload a new version to
mentors.d.n and send another RFS to d-ment...@l.d.o
- --
Thanks
Harry Rickards
Latest version on Lenny is still 1.8.7-72. Shouldn't this fix be sent
out via security so all stable systems can be upgraded as well? This
is marked as a rather serious exploit.
--
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact
Package: cruft
Version: 0.9.12
Severity: grave
Justification: renders package unusable
In february, I've upgraded my Etch to Lenny. But (for the results of
cruft) I thought, it failed - so I decided recently to make a new
install (with nearly the same packages). After this, another check with
cru
Package: sysvinit
Version: 2.86.ds1-36
Severity: critical
Justification: breaks the whole system
Using the default binary version of halt shipped with etch prevents diskless
systems from booting in response to the wake-on-lan
packet. Can't get more critical than a cluster of systems that can't b
Package: sendmail-bin
Version: 8.13.4-3sarge2
Severity: grave
This version of sendmail-bin depends on libsasl2 >= 2.1.19.dfsg1, which
is not currently available in sarge.
--
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]
Package: python-gendoc
Version: 0.73-10.1
Severity: grave
Justification: renders package unusable
When upgrading to 0.73-10.1 the post-installation script fails with the
following error:
Setting up python-gendoc (0.73-10.1) ...
python: can't open file '/usr/lib/python/compileall.py'
dpkg: error
Package: idle-python2.3
Version: 2.3.5-12
Severity: grave
Upgrading the package to 2.3.5-12 fails with the following error:
Setting up idle-python2.3 (2.3.5-12) ...
/var/lib/dpkg/info/idle-python2.3.postinst: line 9: register-python:
command not found
dpkg: error processing idle-python2.3 (--con
ep ^Version:
Version: 2.3.6-13
Regards,
--
l=2001;main(i){float o,O,_,I,D;for(;O=I=l/571.-1.75,l;)for(putchar(--l%80?
i:10),o=D=l%80*.05-2,i=31;_=O*O,O=2*o*O+I,o=o*o-_+D,o+_+_<4+D&i++<87;);puts
(" Harry 'Piru' Sintonen <[EMAIL PROTECTED]> http://www.iki.fi/sintonen";);}
Package: mysql-dfsg-4.1
Severity: grave
Tags: security
Justification: user security hole
The stable version was updated (4.1.11a-4sarge3) to handle security
bugs fixed in upstream version 4.1.19. The testing version should
reflect these changes. The best way would be to update to the new
upstrea
24 matches
Mail list logo