On 09.12.21 23:14, Stefan Fritsch wrote:
There is discussion and a fix for this issue at
https://lists.freedesktop.org/archives/nouveau/2021-December/039597.html
https://lists.freedesktop.org/archives/nouveau/2021-December/039609.html
The fix is in 5.15.13
There is discussion and a fix for this issue at
https://lists.freedesktop.org/archives/nouveau/2021-December/039597.html
https://lists.freedesktop.org/archives/nouveau/2021-December/039609.html
found 941122 4.19.67-2
thanks
We have also seen this with the 4.19 kernel in buster.
Links to Ubuntu bug reports and commits (but I have not verified that
these patches fix the issue):
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1836152
https://bugs.launchpad.net/ubuntu/+source/linux/
Hi,
by default, apache uses mmap, so probably mmap is broken on cifs. An
alternate workaround should be to set EnableMMAP off in the apache
config.
Cheers,
Stefan
Ping ?
I have opened a merge request
https://salsa.debian.org/kernel-team/linux/merge_requests/137
tags 884562 + patch
thanks
ping?
Is there any reason why this option cannot be enabled? It works for me.
Patch is attached.
Cheers,
Stefancommit ed6bb01ca53088401ddb7e17653e0a9b8bf8d9ee (HEAD -> master)
Author: Stefan Fritsch
Date: Sun Mar 3 13:40:49 2019 +0100
spdif
diff --gi
found 884562 4.16.5-1
thanks
Hi,
is there a reason why this has not been enabled or has it just slipped
through?
Cheers,
Stefan
package: src:linux
version: 4.9.65-3
severity: important
This is a follow-up to #857410 . CONFIG_SND_SOC_SPDIF is also required to make
spdif work on the cubietruck.
By accident I have not stopped using my self-compiled kernel and did not
notice that spdif does not actually work with the debian
It turns out that another module is needed to make it work. Adding these to
debian/config/armhf/config did the trick for me:
CONFIG_SND_SUN4I_SPDIF=m
CONFIG_SND_SOC_SPDIF=m
Since adding modules is unlikely to break anything: Is there a chance that
this can still be enabled for stretch?
Cheers
Source: linux
Version: 4.9.13-1
Severity: wishlist
Dear Maintainer,
please enable spdif support for cubietruck. Or is there a reason why it
cannot be enabled?
Cheers,
Stefan
On Thursday, 17 November 2016 22:55:07 CET Jose R R wrote:
> Please upgrade to version 4.8.7-1
> as it does not exhibit issue you mentioned in a default settings
It still happens with 4.8.7-1 for me.
But switching the cpu model from Broadwell to Westmere or core2duo fixes the
issue. Haswell and
Package: src:linux
Version: 4.8.5-1
Severity: important
Dear Maintainer,
I am running a stretch VM on a jessie KVM/qemu/libvirt host. After the
upgrade to 4.8.5 the system does not boot anymore. Booting the 4.7 kernel
works.
If I start normally, systemd hangs starting some early units (like
k
Package: src:linux
Version: 4.7.4-2
Severity: grave
Justification: renders package unusable
When booting with linux-image-4.7.0-1-amd64 4.7.4-2, one of my
filesystems fails to mount with:
ext4_iget:4476: inode #8: comm mount: checksum invalid
A fsck does not find any errors, though, and the moun
This still affects
linux-image-4.2.0-1-amd644.2.5-1
but it is fixed with
linux-image-4.3.0-rc7-amd64 4.3~rc7-1~exp1
Package: src:linux
Version: 4.2.3-2
Severity: important
Hi,
I cannot use KVM with 4.2, qemu loops with 100% CPU during seabios
initialization. Booting with the latest linux-image-4.1.0-2-amd64 fixes
the issue.
The simplest reproducer is
qemu-system-x86_64 --enable-kvm
but it happens with all k
On Thursday 09 May 2013, you wrote:
> On Thu, May 09, 2013 at 09:07:35AM +0200, Stefan Fritsch wrote:
> > I have two disks, one SSD and one HDD. There are to MD RAID1
> > volumes that each use one partition on the SSD and one on the
> > HDD.
> >
> > After the fir
Downgrading to 3.2 makes the issue go away again. So, definitely no
hardware problem.
--
To UNSUBSCRIBE, email to debian-kernel-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Archive: http://lists.debian.org/201305090942.45535...@sfritsch.
Package: src:linux
Version: 3.8.11-1
Severity: important
I have two disks, one SSD and one HDD. There are to MD RAID1 volumes
that each use one partition on the SSD and one on the HDD.
After the first reboot with 3.8, MD kicked the HDD's partitions from
both RAID devices. However, there were no
On Saturday 02 June 2012, Ben Hutchings wrote:
> On Sat, 2012-06-02 at 16:23 +0200, Stefan Fritsch wrote:
> > Package: linux-2.6
> > Severity: wishlist
> >
> > The seccomp filter code has this Linus' tree a while back and
> > will be in 3.5. It's a very
Package: linux-2.6
Severity: wishlist
The seccomp filter code has this Linus' tree a while back and will be in
3.5. It's a very usefult security feature that would be very nice to
have in wheezy.
Is it possible to backport it or do you consider it to be too intrusive?
--
To UNSUBSCRIBE, email
> > This looks more like a kernel bug to me
I am reassigning this to linux-image-2.6.26-2-686
--
To UNSUBSCRIBE, email to debian-kernel-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
-updates; urgency=low
+
+ * Non-maintainer upload by the security team.
+ * Fix several tmpfile race conditions, among them CVE-2008-4192 and
+CVE-2008-4579. (Closes: #496410)
+
+ -- Stefan Fritsch <[EMAIL PROTECTED]> Fri, 28 Nov 2008 19:15:39 +0100
+
redhat-cluster (2.20080801-4) un
here is the patch
--
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]
Hi,
please accept redhat-cluster 2.20080801-4+lenny1 which I have just
uploaded to testing-proposed-updates:
* Fix several tmpfile race conditions, among them CVE-2008-4192 and
CVE-2008-4579. (Closes: #496410)
Cheers,
Stefan
--
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subj
The new upstream version that fixes this bug introduces a lot of other
changes and doesn't seem acceptable for lenny.
Is anyone working on backporting the fix for a t-p-u upload? I can
probably do it later this week but I don't want to duplicate work.
Cheers,
Stefan
--
To UNSUBSCRIBE, emai
I also checked that linux-image-2.6.18-5-k7 2.6.18.dfsg.1-17 is
vulnerable.
signature.asc
Description: This is a digitally signed message part.
> Just try explot from http://www.milw0rm.com/exploits/5092 at my
> linux-image-2.6.18-5-686 kernel. And it works. Please backport patch
> from 2.6.24.1 kernel (CVE-2008-0009/10).
2.6.24.1 does not fix the issue, see
http://marc.info/?l=linux-kernel&m=120262352612128&w=2
I have also verified tha
I also tried linux-image-2.6.22-2-iop32x 2.6.22-4 from unstable. I get
the same error, though the message is slightly more verbose:
rpc-srv/tcp: nfsd: got error -14 when sending 140 bytes - shutting
down socket
nfsd: recvfrom returned errno 14
nfsd: non-standard errno: -14
--
To UNSUBSCRIBE,
Package: linux-image-2.6.18-5-iop32x
Version: 2.6.18.dfsg.1-13etch1
Severity: important
When transfering large amounts of data from another computer (nfs client) to my
Thecus N2100 (nfs server), I get "Input/output error" on the client and
"nfsd: non-standard errno: -14" in dmesg on the server (t
Package: linux-2.6
Severity: important
Tags: security
CVE-2006-0558:
perfmon (perfmon.c) in Linux kernel on IA64 architectures allows local
users to cause a denial of service (crash) by interrupting a task
while another process is accessing the mm_struct, which triggers a
BUG_ON action in the put_
Package: kernel-source-2.6.8
Version: 2.6.8-15
Severity: critical
Tags: security
CAN-2005-0916 reads:
AIO in the Linux kernel 2.6.11 on the PPC64 or IA64 architectures with
CONFIG_HUGETLB_PAGE enabled allows local users to cause a denial of
service (system panic) via a process that executes the i
Package: kernel-patch-powerpc-2.4.27
Version: 2.4.27-4
Severity: wishlist
For the tracking of the open security issues in testing [1], we need a
way to automatically determine for every kernel-image the exact
version of the kernel-source it was compiled with. The easiest way to
do this seems to b
Package: kernel-source-2.6.8
Version: 2.6.8-13
Severity: critical
Tags: security
Justification: root security hole
There is a race condition in the radeon driver which has been fixed
in 2.6.11-rc4. This is part of BID-12555:
http://www.securityfocus.com/bid/12555
The same code is already in 2.6.8
Package: kernel-source-2.6.8
Version: 2.6.8-13
Severity: grave
Tags: security
Justification: user security hole
"Signedness error in the copy_from_read_buf function in n_tty.c for
Linux kernel 2.6.10 and 2.6.11rc1 allows local users to read kernel
memory via a negative argument."
The offending co
Package: kernel-source-2.6.8
Version: 2.6.8-13
Severity: critical
Tags: security
Justification: root security hole
Cite:
" Linux kernel 2.6.10 and 2.6.11rc1-bk6 uses different size types
for offset arguments to the proc_file_read and locks_read_proc
functions, which leads to a heap-based buffer ov
Package: kernel-source-2.6.8
Version: 2.6.8-13
Severity: critical
Tags: security
Justification: root security hole
Cite:
"The atm_get_addr function in addr.c for Linux kernel 2.6.10 and 2.6.11 before
2.6.11-rc4
may allow local users to trigger a buffer overflow via negative arguments."
The offen
Package: kernel-source-2.6.8
Version: 2.6.8-13
Severity: critical
Tags: security
Justification: root security hole
Cite:
"The reiserfs_copy_from_user_to_file_region function in reiserfs/file.c for
Linux kernel
2.6.10 and 2.6.11 before 2.6.11-rc4, when running on 64-bit architectures, may
allow l
I am uneasy about closing a valid bug that has not been completely
fixed. But feel free to downgrade the importance/tags if you wish.
However, I would feel better if you fixed it for the arches where we
have a patch.
Thanks,
Stefan
--
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject
38 matches
Mail list logo