[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

Bug#289909: marked as done (depends on old abinamed kernel packages)



Your message dated Wed, 12 Jan 2005 03:02:15 -0500
with message-id <E1CodSJ-00087m-00@newraff.debian.org>
and subject line Bug#289909: fixed in kernel-latest-2.4-i386 101
has caused the attached Bug report to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what I am
talking about this indicates a serious mail system misconfiguration
somewhere.  Please contact me immediately.)

Debian bug tracking system administrator
(administrator, Debian Bugs database)

--------------------------------------
Received: (at submit) by bugs.debian.org; 11 Jan 2005 19:23:16 +0000
>From joey@kitenet.net Tue Jan 11 11:23:16 2005
Return-path: <joey@kitenet.net>
Received: from kitenet.net [64.62.161.42] (postfix)
	by spohr.debian.org with esmtp (Exim 3.35 1 (Debian))
	id 1CoRbo-0001yQ-00; Tue, 11 Jan 2005 11:23:16 -0800
Received: from dragon.kitenet.net (unknown [66.168.94.144])
	(using TLSv1 with cipher DHE-RSA-AES256-SHA (256/256 bits))
	(Client CN "Joey Hess", Issuer "Joey Hess" (verified OK))
	by kitenet.net (Postfix) with ESMTP id B896D1831E
	for <submit@bugs.debian.org>; Tue, 11 Jan 2005 19:23:15 +0000 (GMT)
Received: by dragon.kitenet.net (Postfix, from userid 1000)
	id 3ACC26E337; Tue, 11 Jan 2005 14:25:14 -0500 (EST)
Date: Tue, 11 Jan 2005 14:25:14 -0500
From: Joey Hess <joeyh@debian.org>
To: Debian Bug Tracking System <submit@bugs.debian.org>
Subject: depends on old abinamed kernel packages
Message-ID: <20050111192514.GA3905@kitenet.net>
Mime-Version: 1.0
Content-Type: multipart/signed; micalg=pgp-sha1;
	protocol="application/pgp-signature"; boundary="ew6BAiZeqk4r7MaW"
Content-Disposition: inline
X-Reportbug-Version: 3.5
User-Agent: Mutt/1.5.6+20040907i
Delivered-To: submit@bugs.debian.org
X-Spam-Checker-Version: SpamAssassin 2.60-bugs.debian.org_2005_01_02 
	(1.212-2003-09-23-exp) on spohr.debian.org
X-Spam-Status: No, hits=-8.0 required=4.0 tests=BAYES_00,HAS_PACKAGE 
	autolearn=no version=2.60-bugs.debian.org_2005_01_02
X-Spam-Level: 


--ew6BAiZeqk4r7MaW
Content-Type: text/plain; charset=us-ascii
Content-Disposition: inline
Content-Transfer-Encoding: quoted-printable

Package: kernel-latest-2.4-i386
Severity: serious

kernel-latest needs to be updated to depend on
kernel-image-2.4.27-2-386, and so on. Until this is done, the new
packages cannot enter testing.

I'm making this bug report severity serious since kernel-latest is
keeping security fixes out of testing.

-- System Information:
Debian Release: 3.1
  APT prefers unstable
  APT policy: (500, 'unstable')
Architecture: i386 (i686)
Kernel: Linux 2.4.27
Locale: LANG=3Den_US.UTF-8, LC_CTYPE=3Den_US.UTF-8 (charmap=3DUTF-8)

--=20
see shy jo

--ew6BAiZeqk4r7MaW
Content-Type: application/pgp-signature; name="signature.asc"
Content-Description: Digital signature
Content-Disposition: inline

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.2.5 (GNU/Linux)

iD8DBQFB5CgZd8HHehbQuO8RAhbCAJ42K4UMy1khB34fIKFiNLxOVeJSDgCfUAVc
w+rWLbhYQTJWtsp2CqEzItE=
=4xXU
-----END PGP SIGNATURE-----

--ew6BAiZeqk4r7MaW--

---------------------------------------
Received: (at 289909-close) by bugs.debian.org; 12 Jan 2005 08:08:30 +0000
>From katie@ftp-master.debian.org Wed Jan 12 00:08:30 2005
Return-path: <katie@ftp-master.debian.org>
Received: from newraff.debian.org [208.185.25.31] (mail)
	by spohr.debian.org with esmtp (Exim 3.35 1 (Debian))
	id 1CodYM-0007OC-00; Wed, 12 Jan 2005 00:08:30 -0800
Received: from katie by newraff.debian.org with local (Exim 3.35 1 (Debian))
	id 1CodSJ-00087m-00; Wed, 12 Jan 2005 03:02:15 -0500
From: Joshua Kwan <joshk@triplehelix.org>
To: 289909-close@bugs.debian.org
X-Katie: $Revision: 1.54 $
Subject: Bug#289909: fixed in kernel-latest-2.4-i386 101
Message-Id: <E1CodSJ-00087m-00@newraff.debian.org>
Sender: Archive Administrator <katie@ftp-master.debian.org>
Date: Wed, 12 Jan 2005 03:02:15 -0500
Delivered-To: 289909-close@bugs.debian.org
X-Spam-Checker-Version: SpamAssassin 2.60-bugs.debian.org_2005_01_02 
	(1.212-2003-09-23-exp) on spohr.debian.org
X-Spam-Status: No, hits=-6.0 required=4.0 tests=BAYES_00,HAS_BUG_NUMBER 
	autolearn=no version=2.60-bugs.debian.org_2005_01_02
X-Spam-Level: 
X-CrossAssassin-Score: 2

Source: kernel-latest-2.4-i386
Source-Version: 101

We believe that the bug you reported is fixed in the latest version of
kernel-latest-2.4-i386, which is due to be installed in the Debian FTP archive:

kernel-headers-2.4-386_101_i386.deb
  to pool/main/k/kernel-latest-2.4-i386/kernel-headers-2.4-386_101_i386.deb
kernel-headers-2.4-586tsc_101_i386.deb
  to pool/main/k/kernel-latest-2.4-i386/kernel-headers-2.4-586tsc_101_i386.deb
kernel-headers-2.4-686-smp_101_i386.deb
  to pool/main/k/kernel-latest-2.4-i386/kernel-headers-2.4-686-smp_101_i386.deb
kernel-headers-2.4-686_101_i386.deb
  to pool/main/k/kernel-latest-2.4-i386/kernel-headers-2.4-686_101_i386.deb
kernel-headers-2.4-k6_101_i386.deb
  to pool/main/k/kernel-latest-2.4-i386/kernel-headers-2.4-k6_101_i386.deb
kernel-headers-2.4-k7-smp_101_i386.deb
  to pool/main/k/kernel-latest-2.4-i386/kernel-headers-2.4-k7-smp_101_i386.deb
kernel-headers-2.4-k7_101_i386.deb
  to pool/main/k/kernel-latest-2.4-i386/kernel-headers-2.4-k7_101_i386.deb
kernel-image-2.4-386_101_i386.deb
  to pool/main/k/kernel-latest-2.4-i386/kernel-image-2.4-386_101_i386.deb
kernel-image-2.4-586tsc_101_i386.deb
  to pool/main/k/kernel-latest-2.4-i386/kernel-image-2.4-586tsc_101_i386.deb
kernel-image-2.4-686-smp_101_i386.deb
  to pool/main/k/kernel-latest-2.4-i386/kernel-image-2.4-686-smp_101_i386.deb
kernel-image-2.4-686_101_i386.deb
  to pool/main/k/kernel-latest-2.4-i386/kernel-image-2.4-686_101_i386.deb
kernel-image-2.4-k6_101_i386.deb
  to pool/main/k/kernel-latest-2.4-i386/kernel-image-2.4-k6_101_i386.deb
kernel-image-2.4-k7-smp_101_i386.deb
  to pool/main/k/kernel-latest-2.4-i386/kernel-image-2.4-k7-smp_101_i386.deb
kernel-image-2.4-k7_101_i386.deb
  to pool/main/k/kernel-latest-2.4-i386/kernel-image-2.4-k7_101_i386.deb
kernel-latest-2.4-i386_101.dsc
  to pool/main/k/kernel-latest-2.4-i386/kernel-latest-2.4-i386_101.dsc
kernel-latest-2.4-i386_101.tar.gz
  to pool/main/k/kernel-latest-2.4-i386/kernel-latest-2.4-i386_101.tar.gz
kernel-pcmcia-modules-2.4-386_101_i386.deb
  to pool/main/k/kernel-latest-2.4-i386/kernel-pcmcia-modules-2.4-386_101_i386.deb
kernel-pcmcia-modules-2.4-586tsc_101_i386.deb
  to pool/main/k/kernel-latest-2.4-i386/kernel-pcmcia-modules-2.4-586tsc_101_i386.deb
kernel-pcmcia-modules-2.4-686-smp_101_i386.deb
  to pool/main/k/kernel-latest-2.4-i386/kernel-pcmcia-modules-2.4-686-smp_101_i386.deb
kernel-pcmcia-modules-2.4-686_101_i386.deb
  to pool/main/k/kernel-latest-2.4-i386/kernel-pcmcia-modules-2.4-686_101_i386.deb
kernel-pcmcia-modules-2.4-k6_101_i386.deb
  to pool/main/k/kernel-latest-2.4-i386/kernel-pcmcia-modules-2.4-k6_101_i386.deb
kernel-pcmcia-modules-2.4-k7-smp_101_i386.deb
  to pool/main/k/kernel-latest-2.4-i386/kernel-pcmcia-modules-2.4-k7-smp_101_i386.deb
kernel-pcmcia-modules-2.4-k7_101_i386.deb
  to pool/main/k/kernel-latest-2.4-i386/kernel-pcmcia-modules-2.4-k7_101_i386.deb



A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 289909@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Joshua Kwan <joshk@triplehelix.org> (supplier of updated kernel-latest-2.4-i386 package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmaster@debian.org)


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Format: 1.7
Date: Tue, 11 Jan 2005 23:42:47 -0800
Source: kernel-latest-2.4-i386
Binary: kernel-pcmcia-modules-2.4-686-smp kernel-headers-2.4-686-smp kernel-headers-2.4-k7-smp kernel-image-2.4-k7 kernel-image-2.4-386 kernel-pcmcia-modules-2.4-k7 kernel-pcmcia-modules-2.4-686 kernel-pcmcia-modules-2.4-k7-smp kernel-headers-2.4-686 kernel-pcmcia-modules-2.4-586tsc kernel-headers-2.4-586tsc kernel-image-2.4-k7-smp kernel-image-2.4-586tsc kernel-pcmcia-modules-2.4-k6 kernel-headers-2.4-k6 kernel-headers-2.4-k7 kernel-headers-2.4-386 kernel-image-2.4-k6 kernel-image-2.4-686-smp kernel-image-2.4-686 kernel-pcmcia-modules-2.4-386
Architecture: source i386
Version: 101
Distribution: unstable
Urgency: high
Maintainer: Debian Kernel Team <debian-kernel@lists.debian.org>
Changed-By: Joshua Kwan <joshk@triplehelix.org>
Description: 
 kernel-headers-2.4-386 - Linux kernel headers for version 2.4 on 386
 kernel-headers-2.4-586tsc - Linux kernel headers for version 2.4 on Pentium-Classic
 kernel-headers-2.4-686 - Linux kernel headers for version 2.4 on PPro/Celeron/PII/PIII/P4
 kernel-headers-2.4-686-smp - Linux kernel headers for version 2.4 on PPro/Celeron/PII/PIII/P4 
 kernel-headers-2.4-k6 - Linux kernel headers for version 2.4 on  K6/K6-II/K6-III
 kernel-headers-2.4-k7 - Linux kernel headers for version 2.4 on AMD K7
 kernel-headers-2.4-k7-smp - Linux kernel headers for version 2.4 on AMD K7 SMP
 kernel-image-2.4-386 - Linux kernel image for version 2.4 on 386
 kernel-image-2.4-586tsc - Linux kernel image for version 2.4 on Pentium-Classic
 kernel-image-2.4-686 - Linux kernel image for version 2.4 on PPro/Celeron/PII/PIII/P4
 kernel-image-2.4-686-smp - Linux kernel image for version 2.4 on PPro/Celeron/PII/PIII/P4 SM
 kernel-image-2.4-k6 - Linux kernel image for version 2.4 on AMD K6/K6-II/K6-III
 kernel-image-2.4-k7 - Linux kernel image for version 2.4 on AMD K7
 kernel-image-2.4-k7-smp - Linux kernel image for version 2.4 on AMD K7 SMP
 kernel-pcmcia-modules-2.4-386 - Mainstream PCMCIA modules for version 2.4 on 386
 kernel-pcmcia-modules-2.4-586tsc - Mainstream PCMCIA modules for version 2.4 on Pentium-Classic
 kernel-pcmcia-modules-2.4-686 - Mainstream PCMCIA modules for version 2.4 on PPro/Celeron/PII/PII
 kernel-pcmcia-modules-2.4-686-smp - Mainstream PCMCIA modules for version 2.4 on PPro/Celeron/PII/PII
 kernel-pcmcia-modules-2.4-k6 - Mainstream PCMCIA modules for version 2.4 on AMD K6/K6-II/K6-III
 kernel-pcmcia-modules-2.4-k7 - Mainstream PCMCIA modules for version 2.4 on AMD K7
 kernel-pcmcia-modules-2.4-k7-smp - Mainstream PCMCIA modules for version 2.4 on AMD K7 SMP
Closes: 284138 289909
Changes: 
 kernel-latest-2.4-i386 (101) unstable; urgency=high
 .
   * Change Pentium IV/PIV to Pentium 4/P4
     (closes: #284138). (Simon Horman)
   * Upgrade to 2.4.27-2 to allow security fixes to enter testing.
     closes: #289909
Files: 
 06957f250918adf841b0dad5f0480f22 2025 devel optional kernel-latest-2.4-i386_101.dsc
 d57939aec1818d3b2e0218639934ccb9 2557 devel optional kernel-latest-2.4-i386_101.tar.gz
 cf8e1ec65a34916c22a302059285f50a 2094 base optional kernel-pcmcia-modules-2.4-386_101_i386.deb
 aaa7d54bc7ec8e46a24151e1914ad875 2072 base optional kernel-image-2.4-386_101_i386.deb
 ed731a74596e50e2bcc48afd7227a1b6 2108 base optional kernel-headers-2.4-386_101_i386.deb
 20030370da2cf3c0c1a7a6aa9ab99a7b 2114 base optional kernel-pcmcia-modules-2.4-586tsc_101_i386.deb
 d59e1f357fe7d0b1469c79e4e87c4fec 2088 base optional kernel-image-2.4-586tsc_101_i386.deb
 dc2e2261a00cab047ad7c40e7689a900 2124 base optional kernel-headers-2.4-586tsc_101_i386.deb
 1dc86437a9d2fcbd492480109ca7f98c 2126 base optional kernel-pcmcia-modules-2.4-686_101_i386.deb
 78ba7b097f5beb634077d23a8cf0b7bc 2102 base optional kernel-image-2.4-686_101_i386.deb
 d25d6cee90e2d16facbfefd244a271e7 2144 base optional kernel-headers-2.4-686_101_i386.deb
 3c238e634d028ea50a88e5c980fac18c 2192 base optional kernel-pcmcia-modules-2.4-686-smp_101_i386.deb
 cd8250d78029c3e6fe945e7547cd31e7 2170 base optional kernel-image-2.4-686-smp_101_i386.deb
 40af6eaa12e1e4fc9b19eae232adde4a 2212 base optional kernel-headers-2.4-686-smp_101_i386.deb
 2a203e96e53178b472645a5ed74bff6b 2106 base optional kernel-pcmcia-modules-2.4-k6_101_i386.deb
 2468d054e4dda680a30e636607efeb33 2084 base optional kernel-image-2.4-k6_101_i386.deb
 430aac0bc8fc015fd82bbbbfa9d532e7 2132 base optional kernel-headers-2.4-k6_101_i386.deb
 b2305cbd788ddae05f56192c3595b1bc 2108 base optional kernel-pcmcia-modules-2.4-k7_101_i386.deb
 e3a1d17140998dc9e6958e1a4ee138a2 2088 base optional kernel-image-2.4-k7_101_i386.deb
 dd7f41445057283d3591d8f61345ab93 2122 base optional kernel-headers-2.4-k7_101_i386.deb
 f3368a56570da796c5287da81d640a16 2178 base optional kernel-pcmcia-modules-2.4-k7-smp_101_i386.deb
 4de6fe159a8a614ef33e9b1a5ed08615 2154 base optional kernel-image-2.4-k7-smp_101_i386.deb
 53b18fbbd4405f539bc12eeac3b7ce9c 2182 base optional kernel-headers-2.4-k7-smp_101_i386.deb

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.2.5 (GNU/Linux)
Comment: http://triplehelix.org/~joshk/pubkey_gpg.asc
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=PxdO
-----END PGP SIGNATURE-----



Reply to: