- Bug squasher view: Affecting sid and stretch, not marked as done, not tagged patch; those need to be fixed, probably by a patch+upload
- Sponsor view: Affecting sid and stretch, not marked as done, tagged 'patch'; those need a DD to sponsor an upload
- Cleaner view: Affecting sid and stretch, but marked as done; why is it still affecting unstable? fixed only in experimental? missing binaries? wrong changelog?
- Release Team view: Affecting stretch, but not sid. Help the fix migrate to stretch!
Known performance issue: since May 2015 and a reorganization of the blades system that hosts it, UDD has been suffering from storage performance problems.
The Debian Systems Administrators are aware of the issue, but no solution has been found at this time. Please be patient.
9 bugs found
|#614497||doc-debian||doc-debian: The OPL-licensed documents taken from Debian website are non-free||2013-11-23|
|#768905||src:keyutils||FTBFS: fails test "CHECK INVALID KEY TYPE"||2015-04-28|
|#775541||nfs-common||NFS mounts from /etc/fstab do not work||2015-04-28|
|#783108||file||file: OOM and/or segfault||2015-04-24|
|#785271||bash-completion||dh_bash-completion script/file list autodetection fails hiding bugs which can become RC||2015-05-14|
|#788257||ssh||SSH packet_write_wait: Connection to ...: Broken pipe / Marvell 88E8071 PCI-E Gigabit Ethernet||2015-06-09|
|#788546||nfs-common||nfs4 mount.nfs does not respect option "user" in fstab in Jessie||2015-07-03|
|#793661||nfs-kernel-server||crashes the server||2015-07-26|
|#793903||src:bind9||bind9: CVE-2015-5477: An error in handling TKEY queries can cause named to exit with a REQUIRE assertion failure||2015-07-28|
Generated in 0.997 seconds. Last data update: 2015-07-29T02:30:27+00:00 (0.1 hours ago)
select id, bugs.package, bugs.source, severity, title, last_modified, affects_stable, affects_testing, affects_unstable, affects_experimental from bugs where id in (select id from bugs_rt_affects_testing) and bugs.source in (select source from sources where priority='standard') and not (id in (select id from bugs_merged_with where id > merged_with)) AND (severity >= 'serious') order by id asc