Bug#1041893:

2023-12-13 Thread Nelson, Shannon
[AMD Official Use Only - General] Are there any updates available for this request? sln

Processed: reassign 1057926 to src:linux, reassign 1057694 to src:nodejs, tagging 1057850, tagging 1057356 ...

2023-12-13 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org: > reassign 1057926 src:linux 6.1.64-1 Bug #1057926 {Done: Salvatore Bonaccorso } [linux-image-6.1.0-14-rt-amd64] 403 Access Denied on some packages on official Debian repo Warning: Unknown package 'linux-image-6.1.0-14-rt-amd64' Bug reassigned

Re: How to revoke Debian kernels for secure boot

2023-12-13 Thread Dimitri John Ledkov
At the moment the best options are: - rotate online signing key - build new shim with old signing key in vendorx (revoked ESL) - build new kernels with old signing key built-in revoked keyring This is to ensure that old shim & old kernel can boot or kexec new kernels. To ensure new shim cannot

How to revoke Debian kernels for secure boot

2023-12-13 Thread Bastian Blank
Hi I don't think we currently have a documented way to revoke old kernels for secure boot. Are there known plans by other distributions? Or should we just force the inclusion of SBAT and use it as intended? Regards, Bastian -- ... The prejudices people feel about each other disappear when

[arm64] secure boot breach via VFIO_NOIOMMU

2023-12-13 Thread Bastian Blank
Hi Over six years ago, support for VFIO without IOMMU was enabled for arm64. This is a breach of the integrity lockdown requirement of secure boot. VFIO is a framework for handle devices in userspace. To make this safe, an IOMMU is required by default. Without it, user space can write

Bug#1055021: linux: mips64el loongson3 kernel crashes when running cmake

2023-12-13 Thread Salvatore Bonaccorso
Contol: tags -1 + fixed-upstream Control: found -1 6.1.66-1 Control: found -1 6.5.13-1 On Sun, Oct 29, 2023 at 02:16:57PM +0100, Aurelien Jarno wrote: > Source: linux > Version: 5.10.197-1 > Severity: grave > Tags: upstream patch > X-Debbugs-Cc: d...@debian.org, debian-m...@lists.debian.org > >

Processed: Re: Bug#1055021: linux: mips64el loongson3 kernel crashes when running cmake

2023-12-13 Thread Debian Bug Tracking System
Processing control commands: > found -1 6.1.66-1 Bug #1055021 [src:linux] linux: mips64el loongson3 kernel crashes when running cmake Marked as found in versions linux/6.1.66-1. > found -1 6.5.13-1 Bug #1055021 [src:linux] linux: mips64el loongson3 kernel crashes when running cmake Marked as

Processed: Re: Bug#1058595: Bug - linux-image-6.1.0-15-amd64 - system won't shut down if using rtl8192cu wifi adapter.

2023-12-13 Thread Debian Bug Tracking System
Processing control commands: > reassign -1 src:linux 6.1.66-1 Bug #1058595 [linux-image-6.1.0-15-amd64] Bug - linux-image-6.1.0-15-amd64 - system won't shut down if using rtl8192cu wifi adapter. Bug reassigned from package 'linux-image-6.1.0-15-amd64' to 'src:linux'. No longer marked as found in

Bug#1058595: Bug - linux-image-6.1.0-15-amd64 - system won't shut down if using rtl8192cu wifi adapter.

2023-12-13 Thread Diederik de Haas
Control: reassign -1 src:linux 6.1.66-1 Control: close -1 6.1.67-1 On Wednesday, 13 December 2023 15:27:14 CET Doug Behl wrote: > Package: linux-image-6.1.0-15-amd64 > Version: 6.1.661 > > Recent update from Linux image 6.1.0-13-amd64 to Linux image > 6.1.0-15-amd64 created an issue with system

Bug#1058595: Bug - linux-image-6.1.0-15-amd64 - system won't shut down if using rtl8192cu wifi adapter.

2023-12-13 Thread Doug Behl
Package: linux-image-6.1.0-15-amd64 Version: 6.1.661 Recent update from Linux image 6.1.0-13-amd64 to Linux image 6.1.0-15-amd64 created an issue with system shutdown while using a wifi adapter (D-Link DWA-121 150 Pico, rtl8192cu). Firmware-realtek is installed.  When shutting down, the

linux-signed-i386_6.1.67+1_source.changes ACCEPTED into proposed-updates

2023-12-13 Thread Debian FTP Masters
Thank you for your contribution to Debian. Accepted: -BEGIN PGP SIGNED MESSAGE- Hash: SHA512 Format: 1.8 Date: Tue, 12 Dec 2023 13:16:20 +0100 Source: linux-signed-i386 Architecture: source Version: 6.1.67+1 Distribution: bookworm-proposed-updates Urgency: medium Maintainer: Debian

linux-signed-arm64_6.1.67+1_source.changes ACCEPTED into proposed-updates

2023-12-13 Thread Debian FTP Masters
Thank you for your contribution to Debian. Accepted: -BEGIN PGP SIGNED MESSAGE- Hash: SHA512 Format: 1.8 Date: Tue, 12 Dec 2023 13:16:20 +0100 Source: linux-signed-arm64 Architecture: source Version: 6.1.67+1 Distribution: bookworm-proposed-updates Urgency: medium Maintainer: Debian

linux-signed-amd64_6.1.67+1_source.changes ACCEPTED into proposed-updates

2023-12-13 Thread Debian FTP Masters
Thank you for your contribution to Debian. Accepted: -BEGIN PGP SIGNED MESSAGE- Hash: SHA512 Format: 1.8 Date: Tue, 12 Dec 2023 13:16:20 +0100 Source: linux-signed-amd64 Architecture: source Version: 6.1.67+1 Distribution: bookworm-proposed-updates Urgency: medium Maintainer: Debian

linux-signed-i386_6.1.67+1_source.changes is NEW

2023-12-13 Thread Debian FTP Masters
Mapping bookworm-proposed-updates to proposed-updates. binary:acpi-modules-6.1.0-16-686-di is NEW. binary:acpi-modules-6.1.0-16-686-pae-di is NEW. binary:ata-modules-6.1.0-16-686-di is NEW. binary:ata-modules-6.1.0-16-686-pae-di is NEW. binary:btrfs-modules-6.1.0-16-686-di is NEW.

Processing of linux-signed-i386_6.1.67+1_source.changes

2023-12-13 Thread Debian FTP Masters
linux-signed-i386_6.1.67+1_source.changes uploaded successfully to localhost along with the files: linux-signed-i386_6.1.67+1.dsc linux-signed-i386_6.1.67+1.tar.xz Greetings, Your Debian queue daemon (running on host usper.debian.org)

Bug#1055694: klibc-utils: Patch to fix cp warning

2023-12-13 Thread Florent 'Skia' Jacquet
Hi, There is a Merge Request on Salsa to fix this here (didn't test it yet): https://salsa.debian.org/kernel-team/klibc/-/merge_requests/12 Also, here is the corresponding Ubuntu bug: https://bugs.launchpad.net/ubuntu/+source/klibc/+bug/2046336 Cheers Skia

Bug#1058072: marked as done (linux-image-6.5.0-0.deb12.1-amd64: Backport 6.5 kernel for bookworm is very good)

2023-12-13 Thread Debian Bug Tracking System
Your message dated Wed, 13 Dec 2023 08:57:47 +0100 with message-id and subject line Re: Bug#1058072: linux-image-6.5.0-0.deb12.1-amd64: Backport 6.5 kernel for bookworm is very good has caused the Debian Bug report #1058072, regarding linux-image-6.5.0-0.deb12.1-amd64: Backport 6.5 kernel for

Bug#1058072: linux-image-6.5.0-0.deb12.1-amd64: Backport 6.5 kernel for bookworm is very good

2023-12-13 Thread Salvatore Bonaccorso
Hi, On Mon, Dec 11, 2023 at 07:58:54PM -0500, debian user wrote: > Package: src:linux > Version: 6.5.3-1~bpo12+1 > Severity: wishlist > Tags: upstream > > Dear Maintainer, > > $ uptime > 19:56:14 up 27 days, 8:01, 3 users, load average: 0.69, 0.49, 0.45 > > $ apt policy