Bug#1000681: linux-image-5.15.0-1-amd64: 5.15 upgrade causes all apps to flicker

2022-01-08 Thread Stefan Fritsch
On 09.12.21 23:14, Stefan Fritsch wrote: There is discussion and a fix for this issue at https://lists.freedesktop.org/archives/nouveau/2021-December/039597.html https://lists.freedesktop.org/archives/nouveau/2021-December/039609.html The fix is in 5.15.13

Bug#1000681: linux-image-5.15.0-1-amd64: 5.15 upgrade causes all apps to flicker

2021-12-09 Thread Stefan Fritsch
There is discussion and a fix for this issue at https://lists.freedesktop.org/archives/nouveau/2021-December/039597.html https://lists.freedesktop.org/archives/nouveau/2021-December/039609.html

Bug#941122: e1000e is slooow for I219-LM

2019-10-01 Thread Stefan Fritsch
found 941122 4.19.67-2 thanks We have also seen this with the 4.19 kernel in buster. Links to Ubuntu bug reports and commits (but I have not verified that these patches fix the issue): https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1836152 https://bugs.launchpad.net/ubuntu/+source/linux/

Bug#900821: linux-image-4.9.0-6-amd64: apache reads wrong data over cifs filesystems served by samba

2019-04-21 Thread Stefan Fritsch
Hi, by default, apache uses mmap, so probably mmap is broken on cifs. An alternate workaround should be to set EnableMMAP off in the apache config. Cheers, Stefan

Bug#884562: Enable CONFIG_SND_SOC_SPDIF for cubietruck spdif

2019-04-05 Thread Stefan Fritsch
Ping ? I have opened a merge request https://salsa.debian.org/kernel-team/linux/merge_requests/137

Bug#884562: Enable CONFIG_SND_SOC_SPDIF for cubietruck spdif

2019-03-03 Thread Stefan Fritsch
tags 884562 + patch thanks ping? Is there any reason why this option cannot be enabled? It works for me. Patch is attached. Cheers, Stefancommit ed6bb01ca53088401ddb7e17653e0a9b8bf8d9ee (HEAD -> master) Author: Stefan Fritsch Date: Sun Mar 3 13:40:49 2019 +0100 spdif diff --gi

Bug#884562: Enable CONFIG_SND_SOC_SPDIF for cubietruck spdif

2018-05-13 Thread Stefan Fritsch
found 884562 4.16.5-1 thanks Hi, is there a reason why this has not been enabled or has it just slipped through? Cheers, Stefan

Bug#884562: linux-image-4.9.0-4-armmp-lp: Enable CONFIG_SND_SOC_SPDIF for cubietruck spdif

2017-12-16 Thread Stefan Fritsch
package: src:linux version: 4.9.65-3 severity: important This is a follow-up to #857410 . CONFIG_SND_SOC_SPDIF is also required to make spdif work on the cubietruck. By accident I have not stopped using my self-compiled kernel and did not notice that spdif does not actually work with the debian

Bug#857410: Enable spdif audio on cubietruck

2017-03-11 Thread Stefan Fritsch
It turns out that another module is needed to make it work. Adding these to debian/config/armhf/config did the trick for me: CONFIG_SND_SUN4I_SPDIF=m CONFIG_SND_SOC_SPDIF=m Since adding modules is unlikely to break anything: Is there a chance that this can still be enabled for stretch? Cheers

Bug#857410: armmp-lpae: Enable SND_SUN4I_SPDIF

2017-03-10 Thread Stefan Fritsch
Source: linux Version: 4.9.13-1 Severity: wishlist Dear Maintainer, please enable spdif support for cubietruck. Or is there a reason why it cannot be enabled? Cheers, Stefan

Bug#844446: linux-image-4.8.0-1-amd64: Fails to boot on qemu/kvm

2016-12-03 Thread Stefan Fritsch
On Thursday, 17 November 2016 22:55:07 CET Jose R R wrote: > Please upgrade to version 4.8.7-1 > as it does not exhibit issue you mentioned in a default settings It still happens with 4.8.7-1 for me. But switching the cpu model from Broadwell to Westmere or core2duo fixes the issue. Haswell and

Bug#844446: linux-image-4.8.0-1-amd64: Fails to boot on qemu/kvm

2016-11-15 Thread Stefan Fritsch
Package: src:linux Version: 4.8.5-1 Severity: important Dear Maintainer, I am running a stretch VM on a jessie KVM/qemu/libvirt host. After the upgrade to 4.8.5 the system does not boot anymore. Booting the 4.7 kernel works. If I start normally, systemd hangs starting some early units (like k

Bug#838544: ext4: ext4_iget:4476: inode #8: comm mount: checksum invalid

2016-09-21 Thread Stefan Fritsch
Package: src:linux Version: 4.7.4-2 Severity: grave Justification: renders package unusable When booting with linux-image-4.7.0-1-amd64 4.7.4-2, one of my filesystems fails to mount with: ext4_iget:4476: inode #8: comm mount: checksum invalid A fsck does not find any errors, though, and the moun

Bug#802926: linux-image-4.2.0-1-amd64: KVM hangs with 100% cpu on 4.2

2015-10-31 Thread Stefan Fritsch
This still affects linux-image-4.2.0-1-amd644.2.5-1 but it is fixed with linux-image-4.3.0-rc7-amd64 4.3~rc7-1~exp1

Bug#802926: linux-image-4.2.0-1-amd64: KVM hangs with 100% cpu on 4.2

2015-10-25 Thread Stefan Fritsch
Package: src:linux Version: 4.2.3-2 Severity: important Hi, I cannot use KVM with 4.2, qemu loops with 100% CPU during seabios initialization. Booting with the latest linux-image-4.1.0-2-amd64 fixes the issue. The simplest reproducer is qemu-system-x86_64 --enable-kvm but it happens with all k

Bug#707330: linux-image-3.8-1-amd64: Update to 3.8 causes MD RAID1 failure

2013-05-10 Thread Stefan Fritsch
On Thursday 09 May 2013, you wrote: > On Thu, May 09, 2013 at 09:07:35AM +0200, Stefan Fritsch wrote: > > I have two disks, one SSD and one HDD. There are to MD RAID1 > > volumes that each use one partition on the SSD and one on the > > HDD. > > > > After the fir

Bug#707330: linux-image-3.8-1-amd64: Update to 3.8 causes MD RAID1 failure

2013-05-09 Thread Stefan Fritsch
Downgrading to 3.2 makes the issue go away again. So, definitely no hardware problem. -- To UNSUBSCRIBE, email to debian-kernel-requ...@lists.debian.org with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org Archive: http://lists.debian.org/201305090942.45535...@sfritsch.

Bug#707330: linux-image-3.8-1-amd64: Update to 3.8 causes MD RAID1 failure

2013-05-09 Thread Stefan Fritsch
Package: src:linux Version: 3.8.11-1 Severity: important I have two disks, one SSD and one HDD. There are to MD RAID1 volumes that each use one partition on the SSD and one on the HDD. After the first reboot with 3.8, MD kicked the HDD's partitions from both RAID devices. However, there were no

Bug#675615: linux-2.6: Please backport seccomp-filter to wheezy

2012-06-07 Thread Stefan Fritsch
On Saturday 02 June 2012, Ben Hutchings wrote: > On Sat, 2012-06-02 at 16:23 +0200, Stefan Fritsch wrote: > > Package: linux-2.6 > > Severity: wishlist > > > > The seccomp filter code has this Linus' tree a while back and > > will be in 3.5. It's a very

Bug#675615: linux-2.6: Please backport seccomp-filter to wheezy

2012-06-02 Thread Stefan Fritsch
Package: linux-2.6 Severity: wishlist The seccomp filter code has this Linus' tree a while back and will be in 3.5. It's a very usefult security feature that would be very nice to have in wheezy. Is it possible to backport it or do you consider it to be too intrusive? -- To UNSUBSCRIBE, email

Bug#536497: Apache2 become unkillable after trying to stop it

2009-07-10 Thread Stefan Fritsch
> > This looks more like a kernel bug to me I am reassigning this to linux-image-2.6.26-2-686 -- To UNSUBSCRIBE, email to debian-kernel-requ...@lists.debian.org with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org

Bug#496410: redhat-cluster tmpfile fixes

2008-11-28 Thread Stefan Fritsch
-updates; urgency=low + + * Non-maintainer upload by the security team. + * Fix several tmpfile race conditions, among them CVE-2008-4192 and +CVE-2008-4579. (Closes: #496410) + + -- Stefan Fritsch <[EMAIL PROTECTED]> Fri, 28 Nov 2008 19:15:39 +0100 + redhat-cluster (2.20080801-4) un

Bug#496410: redhat-cluster tmpfile fixes

2008-11-28 Thread Stefan Fritsch
here is the patch -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]

Bug#496410: redhat-cluster tmpfile fixes

2008-11-28 Thread Stefan Fritsch
Hi, please accept redhat-cluster 2.20080801-4+lenny1 which I have just uploaded to testing-proposed-updates: * Fix several tmpfile race conditions, among them CVE-2008-4192 and CVE-2008-4579. (Closes: #496410) Cheers, Stefan -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subj

Bug#496410: The possibility of attack with the help of symlinks in some Debian packages

2008-11-18 Thread Stefan Fritsch
The new upstream version that fixes this bug introduces a lot of other changes and doesn't seem acceptable for lenny. Is anyone working on backporting the fix for a t-p-u upload? I can probably do it later this week but I don't want to duplicate work. Cheers, Stefan -- To UNSUBSCRIBE, emai

Bug#464945: linux-image-2.6.18-6-686: Exploit for vmsplice work for linux-image-2.18-5-686 (CVE-2008-0009/10)

2008-02-10 Thread Stefan Fritsch
I also checked that linux-image-2.6.18-5-k7 2.6.18.dfsg.1-17 is vulnerable. signature.asc Description: This is a digitally signed message part.

Bug#464945: linux-image-2.6.18-6-686: Exploit for vmsplice work for linux-image-2.18-5-686 (CVE-2008-0009/10)

2008-02-10 Thread Stefan Fritsch
> Just try explot from http://www.milw0rm.com/exploits/5092 at my > linux-image-2.6.18-5-686 kernel. And it works. Please backport patch > from 2.6.24.1 kernel (CVE-2008-0009/10). 2.6.24.1 does not fix the issue, see http://marc.info/?l=linux-kernel&m=120262352612128&w=2 I have also verified tha

Bug#445156: nfsd: non-standard errno: -14 when receiving large amounts of data via nfs

2007-10-03 Thread Stefan Fritsch
I also tried linux-image-2.6.22-2-iop32x 2.6.22-4 from unstable. I get the same error, though the message is slightly more verbose: rpc-srv/tcp: nfsd: got error -14 when sending 140 bytes - shutting down socket nfsd: recvfrom returned errno 14 nfsd: non-standard errno: -14 -- To UNSUBSCRIBE,

Bug#445156: nfsd: non-standard errno: -14 when receiving large amounts of data via nfs

2007-10-03 Thread Stefan Fritsch
Package: linux-image-2.6.18-5-iop32x Version: 2.6.18.dfsg.1-13etch1 Severity: important When transfering large amounts of data from another computer (nfs client) to my Thecus N2100 (nfs server), I get "Input/output error" on the client and "nfsd: non-standard errno: -14" in dmesg on the server (t

Bug#365375: CVE-2006-0558: Local DoS on IA64

2006-04-29 Thread Stefan Fritsch
Package: linux-2.6 Severity: important Tags: security CVE-2006-0558: perfmon (perfmon.c) in Linux kernel on IA64 architectures allows local users to cause a denial of service (crash) by interrupting a task while another process is accessing the mm_struct, which triggers a BUG_ON action in the put_

Bug#302352: kernel-source-2.6.8: possible local DoS in AIO on PPC64 and IA64 (CAN-2005-0916)

2005-03-31 Thread Stefan Fritsch
Package: kernel-source-2.6.8 Version: 2.6.8-15 Severity: critical Tags: security CAN-2005-0916 reads: AIO in the Linux kernel 2.6.11 on the PPC64 or IA64 architectures with CONFIG_HUGETLB_PAGE enabled allows local users to cause a denial of service (system panic) via a process that executes the i

Bug#302192: kernel-patch-powerpc-2.4.27: Please build-depend on exact kernel-tree-version

2005-03-30 Thread Stefan Fritsch
Package: kernel-patch-powerpc-2.4.27 Version: 2.4.27-4 Severity: wishlist For the tracking of the open security issues in testing [1], we need a way to automatically determine for every kernel-image the exact version of the kernel-source it was compiled with. The easiest way to do this seems to b

Bug#297203: kernel-source-2.6.8: race which could allow for privilege escalation on Radeon

2005-02-27 Thread Stefan Fritsch
Package: kernel-source-2.6.8 Version: 2.6.8-13 Severity: critical Tags: security Justification: root security hole There is a race condition in the radeon driver which has been fixed in 2.6.11-rc4. This is part of BID-12555: http://www.securityfocus.com/bid/12555 The same code is already in 2.6.8

Bug#296901: CAN-2005-0530: information disclosure because of signedness error in copy_from_read_buf

2005-02-25 Thread Stefan Fritsch
Package: kernel-source-2.6.8 Version: 2.6.8-13 Severity: grave Tags: security Justification: user security hole "Signedness error in the copy_from_read_buf function in n_tty.c for Linux kernel 2.6.10 and 2.6.11rc1 allows local users to read kernel memory via a negative argument." The offending co

Bug#296900: CAN-2005-0529: Buffer overflow in proc_file_read

2005-02-25 Thread Stefan Fritsch
Package: kernel-source-2.6.8 Version: 2.6.8-13 Severity: critical Tags: security Justification: root security hole Cite: " Linux kernel 2.6.10 and 2.6.11rc1-bk6 uses different size types for offset arguments to the proc_file_read and locks_read_proc functions, which leads to a heap-based buffer ov

Bug#296899: CAN-2005-0531: Buffer overflow in atm_get_addr

2005-02-25 Thread Stefan Fritsch
Package: kernel-source-2.6.8 Version: 2.6.8-13 Severity: critical Tags: security Justification: root security hole Cite: "The atm_get_addr function in addr.c for Linux kernel 2.6.10 and 2.6.11 before 2.6.11-rc4 may allow local users to trigger a buffer overflow via negative arguments." The offen

Bug#296897: CAN-2005-0532: Buffer overflow in reiserfs_copy_from_user... on 64bit arches

2005-02-25 Thread Stefan Fritsch
Package: kernel-source-2.6.8 Version: 2.6.8-13 Severity: critical Tags: security Justification: root security hole Cite: "The reiserfs_copy_from_user_to_file_region function in reiserfs/file.c for Linux kernel 2.6.10 and 2.6.11 before 2.6.11-rc4, when running on 64-bit architectures, may allow l

Bug#280492: kernel-source-2.4.27: strncpy does not 0-pad destination on some archs)

2005-01-18 Thread Stefan Fritsch
I am uneasy about closing a valid bug that has not been completely fixed. But feel free to downgrade the importance/tags if you wish. However, I would feel better if you fixed it for the arches where we have a patch. Thanks, Stefan -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject