Package: choose-mirror
Version: 2.70
Severity: normal
Dear Maintainer,
I was using in the past the build enviromnet for building debian-installer
images for netboot. Recently a tried again to build netboot.tar.gz and it
suddently stoped workin as expected. The installation stoped every time with
Package: udev
Version: 232-22
Severity: important
Hi.
When using more than one NIC the system boot is longer than usual. In dmesg
i have fond a message telling me that it took too long to do it. This appears
on NICs after the first. The first NIC does not have trouble detecting it.
After that it
Package: src:linux
Version: 4.17.17-1~bpo9+1
Severity: normal
Dear Maintainer,
I had installed new kernel from debian backports repository, but im experiencing
some backtrace logs in system kern.log file. This does not affect systems
stability. Backtrace is caused by refcount and its affecting
Package: linux-image-4.17.0-0.bpo.3-amd64
Followup-For: Bug #907717
Dear Maintainer,
Today i experienced a backtrace which resulted to a system without a graphic
output. In logs i found a entry about a bug with a message Unable to handle
kernel NULL pointer deference. The process involved in
Package: src:linux
Version: 4.18.6-1~bpo9+1
Followup-For: Bug #909852
Dear Maintainer,
I tried to suspend the system today and it resulted with a backtrace
after waking the system. The dmesg shows that amdgpu is involved with
this backtrace. It looks to me it has trouble to resume. Interesting
Package: linux-image-4.18-0-0.bpo.1-amd64
Version: linux-image-4.18.0-0.bpo.1-amd64
Severity: minor
Dear Maintainer,
Today i tried a suspend on my system and it resulted in backtrace in dmesg,
but system was not affected by this. According the backtrace it was some
trouble with amdgpu. I'we
Package: gdebi
Version: 0.9.5.7+nmu3
Followup-For: Bug #932088
Dear Maintainer,
When attempting last try through cli i managed to get to the authentication
phase, but auth with correct password failed. The failure was with following
message
"polkit-agent-helper-1: error response to PolicyKit
Package: gdebi
Version: 0.9.5.7+nmu3
Severity: important
Dear Maintainer,
I would want to report a bug in package gdebi. When i attempt to install some
package
with gdebi it just closes without displaing any error. I found a error message
in
.xsession-errors saying "Refusing to render service
Package: login
Version: 1:4.7-1
Followup-For: Bug #731656
Dear Maintainer,
Today i installed a newer version of login on my debian bullseye. After
instalation
i noticed a error message in /var/log/auth.log stating that pam_unix.so cannot
find
file /etc/securetty. I think this is relevant to
Package: linux-image-amd64
Version: 4.19+105
Followup-For: Bug #932250
adding file with segfault data
-- System Information:
APT prefers stable
APT policy: (500, 'stable')
Architecture: amd64 (x86_64)
Kernel: Linux 4.19.0-5-amd64 (SMP w/4 CPU cores)
Kernel taint flags: TAINT_OOT_MODULE,
Package: linux-image-amd64
Version: 4.19+105
Severity: important
Hi.
Im currently running debian buster kernel and i experienced some segfaults.
Segfaults are random, which prevents me from pinpointing the trigger.
First i tried disabling overcommit on memory, the behavior stoped.
Today it
Package: libpam-modules
Version: 1.3.1-5
Followup-For: Bug #932376
Hello
I have done some research and i found a patch adding support for nullok_secure
which allows
a passwordless login when the console is listed in /etc/securetty file. I would
remove this
support by removing
Source: pam
Version: testing
Severity: wishlist
Tags: patch
Hello
I found a log message in auth.log stating the securetty file wanst found. This
is trivial to fix. The solutions is to remove nullok_secure in common-auth file.
Also im submiting a small patch. From my end this patch is good.
Source: pam
Followup-For: Bug #932376
Adding bug number to relevant info in bug report number 931899.
-- System Information:
Debian Release: bullseye/sid
APT prefers testing
APT policy: (500, 'testing')
Architecture: amd64 (x86_64)
Kernel: Linux 4.19.0-5-amd64 (SMP w/1 CPU core)
Kernel
Package: login
Version: 1:4.7-1
Followup-For: Bug #931899
Hi
I found where is /etc/securetty referenced. Its referenced in config file
/etc/pam.d/common-auth
on line specifing pam_unix. Just remove secure_nullok and the log message wont
appear again.
Ofcourse someone should test this to be
Package: src:linux
Version: 5.15.15-2~bpo11+1
Severity: important
Tags: upstream
X-Debbugs-Cc: m.alfa...@gmail.com
Hi.
Today i installed new backport version of linux kernel. I tried suspend the
machine, but it got stuck. The machine stayed on but the USB bus and harddrive
was
turned off.
Package: jmtpfs
Version: 0.5-3
Severity: important
Tags: lfs
X-Debbugs-Cc: m.alfa...@gmail.com
Dear Maintainer,
I ran to issues copying files from Android Phone on SD card to PC when the
file i bigger than 2GB. Next thing i tried to copy this files via MTP protocol.
With MTP i was able to copy
17 matches
Mail list logo