On 11/30/21 3:02 PM, Salvatore Bonaccorso wrote:
Control: tags -1 + security
Control: notfound -1 4.0
Hi Salvatore,
Thank you for your reply.
Thank you. It's usually not necessary to fill bugs for CVEs for
src:linux, we are already tracking them and are aware. > In the
Sorry for the
Control: severity -1 important
Control: tags -1 + moreinfo
Hi,
On Tue, Nov 30, 2021 at 10:35:39PM +0100, inasprecali wrote:
> Package: src:linux
> Version: 5.10.70-1
> Severity: grave
> Justification: renders package unusable
>
> Dear Maintainer,
>
> the system I'm currently writing this
Processing control commands:
> severity -1 important
Bug #1000900 [src:linux] linux-image-5.10.0-9-armmp: Kernel panic on boot with
Ethernet cable plugged in
Severity set to 'important' from 'grave'
> tags -1 + moreinfo
Bug #1000900 [src:linux] linux-image-5.10.0-9-armmp: Kernel panic on boot
Processing control commands:
> tags -1 + moreinfo
Bug #1000881 [firmware-iwlwifi] firmware-iwlwifi: No Bluetooth controller
detected with kernel 5.15
Added tag(s) moreinfo.
--
1000881: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1000881
Debian Bug Tracking System
Contact
Control: tags -1 + moreinfo
On Tue, Nov 30, 2021 at 12:42:03PM +0100, Léo Girardin wrote:
> Package: firmware-iwlwifi
> Version: 20210818-1
> Severity: important
>
> Dear Maintainer,
>
>* What led up to the situation?
> Kernel upgrade from 5.14.0-4 to 5.15.0-1
>
>* What exactly did you
Processing commands for cont...@bugs.debian.org:
> forwarded 1000886 https://bugzilla.kernel.org/show_bug.cgi?id=60533
Bug #1000886 [src:linux] CVE-2013-7445: Direct Rendering Manager (DRM)
subsystem in the Linux Kernel through 4.x mishandles requests for GEM object
Set Bug forwarded-to-address
Processing control commands:
> tags -1 + security
Bug #1000886 [src:linux] CVE-2013-7445: Direct Rendering Manager (DRM)
subsystem in the Linux Kernel through 4.x mishandles requests for GEM object
Added tag(s) security.
> notfound -1 4.0
Bug #1000886 [src:linux] CVE-2013-7445: Direct Rendering
Control: tags -1 + security
Control: notfound -1 4.0
Hi Jeremiah,
On Tue, Nov 30, 2021 at 12:56:50PM -0500, Jeremiah C. Foster wrote:
> Package: linux
> Source: linux
> Version: 4.0
> Severity: important
> Tags: upstream
>
> Dear Maintainer,
>
> There is a list of unreported issues in the
On Tue, 2021-11-30 at 11:01 +0100, Fabian Grünbichler wrote:
[...]
> possibly interesting in that context (I asked/posted the link in
> #debian-kernel a few days ago as well) - these BTF sections now actually
> reference the BTF info in the kernel image itself (as part of the
> deduplication of
Accepted:
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
Format: 1.8
Date: Mon, 29 Nov 2021 17:22:55 +0100
Source: linux-signed-arm64
Architecture: source
Version: 5.16~rc3+1~exp1
Distribution: experimental
Urgency: medium
Maintainer: Debian Kernel Team
Changed-By: Salvatore Bonaccorso
Accepted:
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
Format: 1.8
Date: Mon, 29 Nov 2021 17:22:55 +0100
Source: linux-signed-i386
Architecture: source
Version: 5.16~rc3+1~exp1
Distribution: experimental
Urgency: medium
Maintainer: Debian Kernel Team
Changed-By: Salvatore Bonaccorso
Accepted:
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
Format: 1.8
Date: Mon, 29 Nov 2021 17:22:55 +0100
Source: linux-signed-amd64
Architecture: source
Version: 5.16~rc3+1~exp1
Distribution: experimental
Urgency: medium
Maintainer: Debian Kernel Team
Changed-By: Salvatore Bonaccorso
Package: linux
Source: linux
Version: 4.0
Severity: important
Tags: upstream
Dear Maintainer,
There is a list of unreported issues in the Debian Security-tracker:
https://security-tracker.debian.org/tracker/status/unreported This
issue was the first one in the tracker which led me to file this
Package: firmware-iwlwifi
Version: 20210818-1
Severity: important
Dear Maintainer,
* What led up to the situation?
Kernel upgrade from 5.14.0-4 to 5.15.0-1
* What exactly did you do (or not do) that was effective (or
ineffective)?
Open the Bluetooth window in Gnome preferences to
Package: src:linux
Version: 5.15.5-1
Severity: normal
I can find in the journalctl logs:
cventin kernel: nvidia: module verification failed: signature and/or required
key missing - tainting kernel
It seems that this has occurred since the legacy nvidia driver is used
binary:acpi-modules-5.16.0-rc3-686-di is NEW.
binary:acpi-modules-5.16.0-rc3-686-pae-di is NEW.
binary:ata-modules-5.16.0-rc3-686-di is NEW.
binary:ata-modules-5.16.0-rc3-686-pae-di is NEW.
binary:btrfs-modules-5.16.0-rc3-686-di is NEW.
binary:btrfs-modules-5.16.0-rc3-686-pae-di is NEW.
linux-signed-i386_5.16~rc3+1~exp1_source.changes uploaded successfully to
localhost
along with the files:
linux-signed-i386_5.16~rc3+1~exp1.dsc
linux-signed-i386_5.16~rc3+1~exp1.tar.xz
Greetings,
Your Debian queue daemon (running on host usper.debian.org)
On Tue, 2021-11-30 at 05:19 +0200, Горбешко Богдан wrote:
> On 30.11.2021 01:57, Ben Hutchings wrote:
> >
> > About 59 MiB, so again most of the increase.
> >
> > It appears that BTF in modules was enabled in Linux 5.11 by
> >
binary:ata-modules-5.16.0-rc3-arm64-di is NEW.
binary:btrfs-modules-5.16.0-rc3-arm64-di is NEW.
binary:cdrom-core-modules-5.16.0-rc3-arm64-di is NEW.
binary:crc-modules-5.16.0-rc3-arm64-di is NEW.
binary:crypto-dm-modules-5.16.0-rc3-arm64-di is NEW.
binary:crypto-modules-5.16.0-rc3-arm64-di is
On November 30, 2021 12:57 am, Ben Hutchings wrote:
> On Sun, 07 Nov 2021 03:52:13 +0200 Bohdan Horbeshko
> wrote:
>> Package: linux-image-5.14.0-2-amd64
>> Severity: minor
>>
>> Dear Maintainer,
>>
>> the Installed-Size of the package has occasionally grown up to 375 MB,
>> which is about 30%
linux-signed-arm64_5.16~rc3+1~exp1_source.changes uploaded successfully to
localhost
along with the files:
linux-signed-arm64_5.16~rc3+1~exp1.dsc
linux-signed-arm64_5.16~rc3+1~exp1.tar.xz
Greetings,
Your Debian queue daemon (running on host usper.debian.org)
binary:acpi-modules-5.16.0-rc3-amd64-di is NEW.
binary:ata-modules-5.16.0-rc3-amd64-di is NEW.
binary:btrfs-modules-5.16.0-rc3-amd64-di is NEW.
binary:cdrom-core-modules-5.16.0-rc3-amd64-di is NEW.
binary:crc-modules-5.16.0-rc3-amd64-di is NEW.
binary:crypto-dm-modules-5.16.0-rc3-amd64-di is NEW.
linux-signed-amd64_5.16~rc3+1~exp1_source.changes uploaded successfully to
localhost
along with the files:
linux-signed-amd64_5.16~rc3+1~exp1.dsc
linux-signed-amd64_5.16~rc3+1~exp1.tar.xz
Greetings,
Your Debian queue daemon (running on host usper.debian.org)
23 matches
Mail list logo