Re: Intel Vulnerability

2018-01-04 Thread Ozgur
05.01.2018, 10:16, "Yves-Alexis Perez" : > On Fri, 2018-01-05 at 10:07 +0300, Ozgur wrote: >>  I talked yesterday Debian kernel team and was a work on Debian kernel for >>  the latest stable, I think all users add to "x86_64_BUG_CPU_INSECURE" >>  parameter .config file and add "= y" added and rec

Bug#878018: marked as done (linux-image-4.9.0-3-amd64: Sound broken with snd_fm801)

2018-01-04 Thread Debian Bug Tracking System
Your message dated Fri, 5 Jan 2018 08:34:09 +0100 with message-id <20180105073408.fxzy75a2e7qum...@lorien.valinor.li> and subject line Re: Bug#878018: [solved]linux-image-4.9.0-3-amd64: Sound broken with snd_fm801 has caused the Debian Bug report #878018, regarding linux-image-4.9.0-3-amd64: Sound

Processed: tagging 856328, tagging 856328

2018-01-04 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org: > tags 856328 - buster sid Bug #856328 [nfs-utils] Fix nfs-mountd dependency on rpcbind Removed tag(s) buster and sid. > tags 856328 + upstream Bug #856328 [nfs-utils] Fix nfs-mountd dependency on rpcbind Added tag(s) upstream. > thanks Stopping pro

Re: Intel Vulnerability

2018-01-04 Thread Ozgur
05.01.2018, 00:23, "Yves-Alexis Perez" : > On Thu, 2018-01-04 at 20:51 +, joe.gha...@dell.com wrote: >>  Does anyone have any information about plans for releasing patches for the >>  Intel vulnerability issues for Debian Jessie and/or Stretch? Any information >>  would be really appreciated.

Re: Intel Vulnerability

2018-01-04 Thread Yves-Alexis Perez
On Fri, 2018-01-05 at 10:07 +0300, Ozgur wrote: > I talked yesterday Debian kernel team and was a work on Debian kernel for > the latest stable, I think all users add to "x86_64_BUG_CPU_INSECURE" > parameter .config file and add "= y" added and recompiled. Hi Ozgur, that's completely irrelevant.

linux-latest_80+deb9u3_multi.changes ACCEPTED into proposed-updates->stable-new

2018-01-04 Thread Debian FTP Masters
Mapping stable-security to proposed-updates. Accepted: -BEGIN PGP SIGNED MESSAGE- Hash: SHA512 Format: 1.8 Date: Thu, 04 Jan 2018 12:57:17 +0100 Source: linux-latest Binary: linux-source linux-doc linux-perf linux-image-alpha-generic linux-headers-alpha-generic linux-image-alpha-generic

linux_4.9.65-3+deb9u2_amd64.changes is NEW

2018-01-04 Thread Debian FTP Masters
Mapping stable-security to proposed-updates. binary:acpi-modules-4.9.0-5-686-di is NEW. binary:acpi-modules-4.9.0-5-686-pae-di is NEW. binary:acpi-modules-4.9.0-5-amd64-di is NEW. binary:affs-modules-4.9.0-5-4kc-malta-di is NEW. binary:affs-modules-4.9.0-5-5kc-malta-di is NEW. binary:affs-modules-4

Bug#886366: linux-headers-4.15.0-rc5-amd64: missing tools/objtool in /lib/modules/foo/build breaks DKMS modules builds

2018-01-04 Thread Luca Boccassi
Package: src:linux Version: 4.15~rc5-1~exp1 Severity: important Dear Maintainer, The new tools/ directory is currently symlinked from linux-kbuild-4.15 into linux-headers-common-4.15.0-rc5 (directory: /usr/src/linux- headers-4.15.0-rc5-common/tools ) but not into linux-headers-4.15.0- rc5-amd64 l

Re: Intel Vulnerability

2018-01-04 Thread alexandros
i have see only that for now https://newsroom.intel.com/news/intel-responds-to-security-research-findings/ Στις 04/01/2018 10:51 μμ, ο joe.gha...@dell.com έγραψε: > > ​Hi everyone, > > Does anyone have any information about plans for releasing patches for > the Intel vulnerability issues for

Re: Intel Vulnerability

2018-01-04 Thread Yves-Alexis Perez
On Thu, 2018-01-04 at 20:51 +, joe.gha...@dell.com wrote: > Does anyone have any information about plans for releasing patches for the > Intel vulnerability issues for Debian Jessie and/or Stretch? Any information > would be really appreciated. Hi Joe, we are currently in the process of relea

Intel Vulnerability

2018-01-04 Thread Joe.Ghalam
?Hi everyone, Does anyone have any information about plans for releasing patches for the Intel vulnerability issues for Debian Jessie and/or Stretch? Any information would be really appreciated. Thanks, Joe Ghalam

Bug#884116: linux-image-4.9.0-3-amd64: screen artifacts then crash without anyway to revert to console

2018-01-04 Thread Mathias Bavay
Package: src:linux Followup-For: Bug #884116 Dear Maintainer, Since sometimes between mid-November and mid-December, my whole system crashes within a few minutes after boot (90% of the time after less than 2 minutes). The screen gets various artifacts and the whole system is gone. There is no w

Bug#886349: initramfs-tools: Missing vmd driver in hook-functions

2018-01-04 Thread Mario.Limonciello
Package: initramfs-tools Version: 0.130 Severity: important Dear Maintainer, initramfs-tools is missing the Intel Volume Management Device (vmd.ko) that was included in kernel 4.9 and later. This sets up NVME disks in a separate PCI domain and is needed to access them when the system is configur

Bug#884601: "console=ttyAMA0,115200" --> "console=tty0"

2018-01-04 Thread Michael Stapelberg
Hi Matthias, Matthias Luescher writes: > I just faced a similar issue with the arm64 kernel > (linux-image-4.14.0-0.bpo.2-arm64). It booted fine with the 4.13 based > kernel but it failed after the upgrade to the above mentioned kernel. Since > I wanted to debug the stuff I took a closer look at

Bug#878221: linux-image-4.9.0-4-amd64: Screen flickers randomly with Radeon R9 270X since upgrade from 4.9.0-3 to 4.9.0-4

2018-01-04 Thread Paul Boekholt
Same issue. eDP-1 connected primary 1366x768+0+0 (normal left inverted right x axis y axis) 344mm x 193mm DP-1 connected 1920x1080+1366+0 (normal left inverted right x axis y axis) 480mm x 270mm 00:02.0 VGA compatible controller: Intel Corporation HD Graphics 5500 (rev 09) (prog-if 00 [VGA con

Bug#883413: linux-image-4.14.0-1-amd64: WARN_ON_ONCE in page_counter_cancel() in mm/page_counter.c

2018-01-04 Thread Chris Boot
On 30/12/17 23:24, Chris Boot wrote: > What makes me suspicious that these are related is that neither happens > with a 4.13 kernel, but I get both of these cgroup-related problems with > 4.14. > > I wouldn't mind trying to bisect this, but I haven't done that for many > years. Is there a nice way

Bug#882414: [src:linux] Oops: NULL pointer dereference - RIP: isci_task_abort_task+0x30/0x3e0 [isci]

2018-01-04 Thread Yves-Alexis Perez
On Sun, 26 Nov 2017 11:02:04 +0100 Salvatore Bonaccorso wrote: > Hi Martin, > > On Wed, Nov 22, 2017 at 02:04:48PM +0100, Martin Scharm wrote: > > Package: src:linux > > Version: 4.12.0-1 > > Severity: serious > > > > --- Please enter the report below this line. --- > > > > My Debian does not b