Debian Bug report logs -
#310565
'kernel-patch-cryptoloop' does not apply to any current sarge kernel
Reported by: Francesco Paolo Lovergine <frankie@debian.org>
Date: Tue, 24 May 2005 11:18:15 UTC
Severity: grave
Found in version 2.4.22.0-25.1
Done: Moritz Muehlenhoff <jmm@inutil.org>
Bug is archived. No further changes may be made.
Toggle useless messages
Report forwarded to debian-bugs-dist@lists.debian.org, Juergen Strobel (private) <juergen@strobel.info>:
Bug#310565; Package kernel-patch-cryptoloop.
(full text, mbox, link).
Acknowledgement sent to Francesco Paolo Lovergine <frankie@debian.org>:
New Bug report received and forwarded. Copy sent to Juergen Strobel (private) <juergen@strobel.info>.
(full text, mbox, link).
Message #5 received at submit@bugs.debian.org (full text, mbox, reply):
Package: kernel-patch-cryptoloop
Version: 2.4.22.0-25.1
Severity: grave
Dear Juergen Strobel (private)
As reported in http://people.debian.org/~frankie/kernel-patches-checks.txt, kernel-patch-cryptoloop does not
apply clean to a current kernel-source. If you think this package is anyway useful at least with
an up-to-date vanilla kernel and sure that it apply properly, feel free to document this in the
package and reduce the severity of this report, else this kernel-patch will be hinted for
removing in sarge.
See also this ML thread about the issue:
http://lists.debian.org/debian-release/2005/05/msg01325.html
--
Francesco P. Lovergine
Information forwarded to debian-bugs-dist@lists.debian.org, Juergen Strobel (private) <juergen@strobel.info>:
Bug#310565; Package kernel-patch-cryptoloop.
(full text, mbox, link).
Acknowledgement sent to Juergen Strobel <juergen@strobel.info>:
Extra info received and forwarded to list. Copy sent to Juergen Strobel (private) <juergen@strobel.info>.
(full text, mbox, link).
Message #10 received at 310565@bugs.debian.org (full text, mbox, reply):
[Message part 1 (text/plain, inline)]
On Tue, May 24, 2005 at 01:05:15PM +0200, Francesco Paolo Lovergine wrote:
> Package: kernel-patch-cryptoloop
> Version: 2.4.22.0-25.1
> Severity: grave
>
> Dear Juergen Strobel (private)
>
> As reported in http://people.debian.org/~frankie/kernel-patches-checks.txt, kernel-patch-cryptoloop does not
> apply clean to a current kernel-source. If you think this package is anyway useful at least with
> an up-to-date vanilla kernel and sure that it apply properly, feel free to document this in the
> package and reduce the severity of this report, else this kernel-patch will be hinted for
> removing in sarge.
>
> See also this ML thread about the issue:
>
> http://lists.debian.org/debian-release/2005/05/msg01325.html
>
Hello,
I have fixes for this, but I lost contact to my mentor long ago and
gave up on it, therefore I cannot upload them.
Very few people are using this (~10-30 maybe), and they can get it
from my site directly. This is only useful for 2.4 kernels, 2.6 has
something better integrated. Upstream is dead.
Maybe it is best to drop this package, even if just to drop
another responsibility of the security team.
I will be on vacation for a week now, afterwards I can help resolve any
problems if it is in my limited power as non-DD package owner.
regards,
Jürgen Strobel
--
The box said it requires Windows 95 or better so I installed Linux
[signature.asc (application/pgp-signature, inline)]
Information forwarded to debian-bugs-dist@lists.debian.org, Juergen Strobel (private) <juergen@strobel.info>:
Bug#310565; Package kernel-patch-cryptoloop.
(full text, mbox, link).
Acknowledgement sent to Steve Langasek <vorlon@debian.org>:
Extra info received and forwarded to list. Copy sent to Juergen Strobel (private) <juergen@strobel.info>.
(full text, mbox, link).
Message #15 received at 310565@bugs.debian.org (full text, mbox, reply):
[Message part 1 (text/plain, inline)]
Hi Juergen,
On Wed, May 25, 2005 at 07:13:20AM +0200, Juergen Strobel wrote:
> On Tue, May 24, 2005 at 01:05:15PM +0200, Francesco Paolo Lovergine wrote:
> > As reported in http://people.debian.org/~frankie/kernel-patches-checks.txt, kernel-patch-cryptoloop does not
> > apply clean to a current kernel-source. If you think this package is anyway useful at least with
> > an up-to-date vanilla kernel and sure that it apply properly, feel free to document this in the
> > package and reduce the severity of this report, else this kernel-patch will be hinted for
> > removing in sarge.
> > See also this ML thread about the issue:
> > http://lists.debian.org/debian-release/2005/05/msg01325.html
> I have fixes for this, but I lost contact to my mentor long ago and
> gave up on it, therefore I cannot upload them.
> Very few people are using this (~10-30 maybe), and they can get it
> from my site directly. This is only useful for 2.4 kernels, 2.6 has
> something better integrated. Upstream is dead.
> Maybe it is best to drop this package, even if just to drop
> another responsibility of the security team.
Ok, I'll go ahead and remove it from testing.
Thanks,
--
Steve Langasek
postmodern programmer
[signature.asc (application/pgp-signature, inline)]
Reply sent to Moritz Muehlenhoff <jmm@inutil.org>:
You have taken responsibility.
(full text, mbox, link).
Notification sent to Francesco Paolo Lovergine <frankie@debian.org>:
Bug acknowledged by developer.
(full text, mbox, link).
Message #20 received at 310565-done@bugs.debian.org (full text, mbox, reply):
This package has been removed from testing and unstable, closing.
Bug archived.
Request was from Debbugs Internal Request <owner@bugs.debian.org>
to internal_control@bugs.debian.org.
(Mon, 18 Jun 2007 13:02:48 GMT) (full text, mbox, link).
Send a report that this bug log contains spam.
Debian bug tracking system administrator <owner@bugs.debian.org>.
Last modified:
Tue Aug 14 22:42:06 2018;
Machine Name:
beach
Debian Bug tracking system
Debbugs is free software and licensed under the terms of the GNU
Public License version 2. The current version can be obtained
from https://bugs.debian.org/debbugs-source/.
Copyright © 1999 Darren O. Benham,
1997,2003 nCipher Corporation Ltd,
1994-97 Ian Jackson,
2005-2017 Don Armstrong, and many other contributors.