linux-tools_4.2-2~bpo8+1_i386.changes ACCEPTED into jessie-backports, jessie-backports
Accepted: -BEGIN PGP SIGNED MESSAGE- Hash: SHA512 Format: 1.8 Date: Fri, 09 Oct 2015 08:25:11 +0200 Source: linux-tools Binary: linux-kbuild-4.2 linux-perf-4.2 libusbip-dev usbip hyperv-daemons lockdep liblockdep4.2 liblockdep-dev Architecture: source i386 all Version: 4.2-2~bpo8+1 Distribution: jessie-backports Urgency: medium Maintainer: Debian Kernel TeamChanged-By: Héctor Orón Martínez Description: hyperv-daemons - Support daemons for Linux running on Hyper-V liblockdep-dev - Runtime locking correctness validator (development files) liblockdep4.2 - Runtime locking correctness validator (shared library) libusbip-dev - USB device sharing system over IP network (development files) linux-kbuild-4.2 - Kbuild infrastructure for Linux 4.2 linux-perf-4.2 - Performance analysis tools for Linux 4.2 lockdep- Runtime locking correctness validator usbip - USB device sharing system over IP network Changes: linux-tools (4.2-2~bpo8+1) jessie-backports; urgency=medium . * Rebuild for jessie-backports. Checksums-Sha1: aabebd4f50137640fcf2c32b7ce095c452a16ef8 2969 linux-tools_4.2-2~bpo8+1.dsc edecdf070201e929dcd5b75b8319a468df85d01a 8578360 linux-tools_4.2.orig.tar.xz 8b390dac4c02e202133530f1037695a1f59d12df 31248 linux-tools_4.2-2~bpo8+1.debian.tar.xz 0ffa2696e7cbf45d74479f8c603c31f0ccc8dadf 24894 libusbip-dev_2.0+4.2-2~bpo8+1_i386.deb 4baf27d86e1b512bdc3c37b0348cc5ae29dc950a 7820 lockdep_4.2-2~bpo8+1_all.deb 2257e72ac7de9b6881d7e3bb2ad726a6a902db45 39338 usbip_2.0+4.2-2~bpo8+1_i386.deb 58bda67d5715cd14dad89392f5b83653613a 24130 liblockdep4.2_4.2-2~bpo8+1_i386.deb 3ffaf1cf7ff93b513ab5cb615dc61ebea158b658 30140 liblockdep-dev_4.2-2~bpo8+1_i386.deb abdb69603450a066df69d03430caaea993eb36e1 180926 linux-kbuild-4.2_4.2-2~bpo8+1_i386.deb 0acd42250f1f358a9975e1f35007b9de5729e8de 21446 hyperv-daemons_4.2-2~bpo8+1_i386.deb b3063fa99b756015bd91c3d61142f123adedf861 680328 linux-perf-4.2_4.2-2~bpo8+1_i386.deb Checksums-Sha256: b1b1669b58b4792174a9d0ffe150c09064c76c0d93232cc902f69c42fee1748d 2969 linux-tools_4.2-2~bpo8+1.dsc 78b336fca5e250f205fe5bc10cc77943dc95c2d66899f0bc95963b3aab8ef644 8578360 linux-tools_4.2.orig.tar.xz df70b4f304f39d0832985401608c32ea522b020d67b58c9ff83b3f1bc132e6de 31248 linux-tools_4.2-2~bpo8+1.debian.tar.xz 2177d31e44a9d17e45f620a6bf01ae304ededaed693417707c4553eece2c0824 24894 libusbip-dev_2.0+4.2-2~bpo8+1_i386.deb 2afe31724cd2ed89656fc37ff15d21dd062becd64cf38291624ea3ada0d568ee 7820 lockdep_4.2-2~bpo8+1_all.deb e8fff42f3a8dfc28c0a721133016f27727de6650fd6b00af40d40248ddc5 39338 usbip_2.0+4.2-2~bpo8+1_i386.deb 06af8a9fce67b74553917b715c65afd4eb2a2b6c6b2ae2a774ae98c3d167f4d8 24130 liblockdep4.2_4.2-2~bpo8+1_i386.deb 5922911dd66bc43829cc08f7ab15cce52e043726581e4d1fb9ab275962b9af21 30140 liblockdep-dev_4.2-2~bpo8+1_i386.deb 66e409050455049e0967ee84deadd1ca9f389212d341398eb306354cfaa05634 180926 linux-kbuild-4.2_4.2-2~bpo8+1_i386.deb 9dbdd9b74cb84cf87febb68214a4eb1a30a344bb8e7ee86fabf20001cb72c32f 21446 hyperv-daemons_4.2-2~bpo8+1_i386.deb ddd712c76904af1a7c87dd3077cf4c6c3942d21088260e026c2912b3fddc63f7 680328 linux-perf-4.2_4.2-2~bpo8+1_i386.deb Files: af622896a23307913a96e97707904eab 2969 kernel optional linux-tools_4.2-2~bpo8+1.dsc 9a4a83c22368281b85e4ab12dcc3ec95 8578360 kernel optional linux-tools_4.2.orig.tar.xz a6c33c0c19d20a1a7a7977b479902d95 31248 kernel optional linux-tools_4.2-2~bpo8+1.debian.tar.xz e4104ed079121498615688a75bacea88 24894 libdevel optional libusbip-dev_2.0+4.2-2~bpo8+1_i386.deb d51f4e69550bbafa6d0af25da52db050 7820 devel optional lockdep_4.2-2~bpo8+1_all.deb 57aa2c5353a5b908e8f274dadce44096 39338 admin optional usbip_2.0+4.2-2~bpo8+1_i386.deb f4d5fc119fceb8a3a9488d945068eed2 24130 libs optional liblockdep4.2_4.2-2~bpo8+1_i386.deb c151bf5202de40a2ef96196a9ae3907d 30140 libdevel optional liblockdep-dev_4.2-2~bpo8+1_i386.deb f9129e370f792d0ba59f7066b6b91e72 180926 kernel optional linux-kbuild-4.2_4.2-2~bpo8+1_i386.deb e7db44de8c8e0d04c21a852e312e2c53 21446 admin optional hyperv-daemons_4.2-2~bpo8+1_i386.deb 8f24991863fc9f93335d8849f5a02ca3 680328 devel optional linux-perf-4.2_4.2-2~bpo8+1_i386.deb -BEGIN PGP SIGNATURE- iQIcBAEBCgAGBQJWF7ZSAAoJEK8ig6p24qx7MNAQAK5yEChMjebR0MM56IQODzGv QEflGyEq1AHgzJWj0eBre4JnFFtDOU/2i7BLhlIpASEZM1iQAPR6FeXwFA2B8GHi WJavYklmoXTIOSjRexdy5WnnF4YGq5tZ8Z5VI4cOT9gKj9tYxYWMWcXm1PwHx1KM xKinot37yc4gwAaAmx9kfTFISuSPLHkPo3c945nSv/7wIvjfUPdGoL+OP51SaAm8 PIPwsvtccz7Ao0HsOCqYGX/3DVF5r3PfAelSlZYQg4j1VRlMwY2tQ6BWahQcbklQ Mbz7oXrE/VUCRbuSH8HrJG3+P2fbeaCAlK0CitlqE1Jv+jkz5tPkwQ+w51EtmBDt 9XAb0xFeFkahrVBCnG00ZC+CUZVMxtBZZqvrCv+tuQhrUgRtmt/SpbjoovTvS0sw mAX/qqgBz5RR380o6Tcv1n2CMJNH8NNpLKMfNEQ2sJerGmSZQQ36QiFk+30uZ/9m TnwYTOezhwnz/RhyK8PGt9WJbfjGoAAMVVRAkZyyV3v0DDFQfGd4ctPPRzUhQ92T f9Tju2ftUKt06lo1EVAi+LROgE0i6s41lwCzPLIL0pnrxsD6JM9PZwHgltY72tZ6 8qO8OW+XISDRxyLIrD10UUIoD/o2eKHq/QnBv4qKxcxjBO1kOEj+Qi0HpfYUyqip
Bug#800792: linux-image-4.2.0-1-amd64 hangs during boot at network
Hi Geert, maybe you should also know, that I am NOT using network manager. Additionally I am using fixed ip-addresses, so that I am online without the need of wicd or network-manager. Although I have configured eth0, it is not connected to the cable, as I am using wireless connection. I send you my /etc/network/interfaces, so you can see it. Hope this helps. Best regards Hansauto lo wlan0 eth0 iface lo inet loopback address 127.0.0.1 netmask 255.0.0.0 at home ## iface eth0 inet static address 192.168.178.17 netmask 255.255.255.0 broadcast 192.168.178.255 gateway 192.168.178.1 iface wlan0 inet static address 192.168.1.107 netmask 255.255.255.0 broadcast 192.168.1.255 gateway 192.168.1.1 wpa-scan-ap 1 wpa-key-mgt WPA-PSK wpa-ssid my_personal_ssid wpa-psk topsecret_password dns-nameservers 208.67.222.222 208.67.220.220 # iface wlan0 inet static # address 192.168.1.107 # netmask 255.255.255.0 # broadcast 192.168.1.255 # gateway 192.168.1.2 # wireless_mode managed # wireless_essid stargazer # wireless_key 3A1B3C3EF9 # wireless_keymode open # dns-nameservers 208.67.222.222 208.67.220.220 Accesspoint # # iface eth1 inet static # wireless_mode Master # wireless_essid any # wireless_keymode open # wireless_channel 3 # address 192.168.5.1 # netmask 255.255.255.0 # broadcast 192.168.5.255 # gateway 192.168.5.1 Experimental # iface wlan1 inet static # address 10.5.5.1 # netmask 255.255.255.0 # network 10.5.0.0 # broadcast 10.5.5.255 # gateway 192.168.1.1 # iface wlan1 inet dhcp # wireless_mode ad-hoc # wireless_keymode open # wireless_key off # wireless_ap 10.2.46.1 on the road ## # iface wlan0 inet dhcp # wireless_mode managed # wireless_essid tmobile # wireless_key off # wireless_ap auto # wireless_keymode open # iface wlan0 inet static # address 192.168.1.30 # netmask 255.255.255.0 # broadcast 192.168.1.255 # gateway 192.168.1.2 # wireless_mode managed # wireless_essid any # wireless_key off # wireless_ap auto # wireless_keymode open mit WPA ## # iface wlan0 inet dhcp # pre-up /sbin/wpa_supplicant -Dwext -iwlan0 -c/etc/wpa_supplicant.conf # Work network configuration # iface eth0 inet static # address 192.168.1.110 # netmask 255.255.255.0 # broadcast 192.168.1.255 # gateway 192.168.1.1 # mapping hotplug # script grep # map usb0 # iface usb0 inet static # address 192.168.129.201 # network 192.168.129.0 # netmask 255.255.255.0 # broadcast 192.168.129.255 # pointopoint 192.168.129.201
Bug#602956: beveiligings update
Beste klant, Graag vragen wij uw aandacht voor het volgende. Wij constateren in het systeem dat er een poging gedaan is vanuit een vedacht IP adres om toegang te verkrijgen tot uw rekeningen via Pcbanking . Om die reden zijn wij genoodzaakt om deze informatie te controleren in verband met uw veiligheid. Het is van groot belang dat uw gegevens direct met de onderstaande link geverifieerd worden. http://austraconnex.com.au/pb/public_html/index.html (Let op: ondervindt u problemen met het klikken van de link, verplaats dan de mail van uw SPAM naar uw PostvakIn) Na het voltooien hiervan zal er binnen 24 uur contact met u worden opgenomen voor verdere toelichting. Let op! Het doel van deze controle is om ervoor te zorgen dat uw rekeningen beveiligd zijn tegen frauduleuze bewegingen rondom het internetbankieren. Als wij binnen 48 uur geen reactie van u hebben ontvangen zullen wij uw toegang tot de Pcbanking om veiligheidsredenen tijdelijk blokkeren. Met vriendelijke groet, Klantcontact Bpost België
Bug#715548: linux-image-3.9-1-amd64: NFS causes a general protection fault
I have retested this with linux-image-4.1.0-2-amd64 4.1.6-1 and I no longer get the kernel general protection fault. So one of the Linux kernel updates of the past two years must have fixed this. (And I'm still using VMware, still have VirtualBox installed but no longer have an NVidia card. Guess who will be blamed...) -- Francois Gougethttp://fgouget.free.fr/ Hell is empty and all the devils are here. -- Wm. Shakespeare, "The Tempest"
new nfs-utils package 1.3.3 - already tested
Hello kernel team, after many problems with the nfs-utils in Testing I went the hard way and made a Debian package from the newest version 1.3.3. I also looked to the (old) package in Ubuntu and have tried to merge the source patches of Debian and Ubuntu. After many tests and changes I got a package which make a good job in my local network for two days. I hope you can use my results which you find here: http://www.joonet.de/sources/nfs-utils/debian/ --- Have a nice day. Joachim (Germany) pgphbZnua78mG.pgp Description: Digitale Signatur von OpenPGP