Bug#1035282: firmware-brcm80211: broken symlinks: /lib/firmware/brcm/brcmfmac4356-sdio.*,*.txt -> brcmfmac4356-sdio.AP6356S.txt

2023-04-29 Thread Salvatore Bonaccorso
Hi, On Sun, Apr 30, 2023 at 03:18:08AM +0200, Andreas Beckmann wrote: > Package: firmware-brcm80211 > Version: 20230210-4 > Severity: serious > User: debian...@lists.debian.org > Usertags: piuparts > > Hi, > > during a test with piuparts I noticed your package ships (or creates) > a broken

Processed: found 1035282 in 20220913-1

2023-04-29 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org: > found 1035282 20220913-1 Bug #1035282 [firmware-brcm80211] firmware-brcm80211: broken symlinks: /lib/firmware/brcm/brcmfmac4356-sdio.*,*.txt -> brcmfmac4356-sdio.AP6356S.txt Marked as found in versions firmware-nonfree/20220913-1. > thanks

Processed: Re: Bug#905745: util-linux: tty hijacking possible in "su" via TIOCSTI ioctl

2023-04-29 Thread Debian Bug Tracking System
Processing control commands: > reassign -1 src:util-linux Bug #905745 [src:linux] util-linux: tty hijacking possible in "su" via TIOCSTI ioctl Bug reassigned from package 'src:linux' to 'src:util-linux'. Ignoring request to alter found versions of bug #905745 to the same values previously set

Re: Bug#905745: util-linux: tty hijacking possible in "su" via TIOCSTI ioctl

2023-04-29 Thread Salvatore Bonaccorso
Control: reassign -1 src:util-linux Hi Cris, On Sat, Apr 29, 2023 at 11:47:40PM +0200, Chris Hofstaedtler wrote: > Control: reassign -1 src:linux > Control: affects -1 src:util-linux > > Dear Kernel Maintainers, Security Team, > > * Sam Morris : > > Linux 6.2 introduces a sysctl

Bug#1035282: firmware-brcm80211: broken symlinks: /lib/firmware/brcm/brcmfmac4356-sdio.*,*.txt -> brcmfmac4356-sdio.AP6356S.txt

2023-04-29 Thread Andreas Beckmann
Package: firmware-brcm80211 Version: 20230210-4 Severity: serious User: debian...@lists.debian.org Usertags: piuparts Hi, during a test with piuparts I noticed your package ships (or creates) a broken symlink. >From the attached log (scroll to the bottom...): 0m14.9s ERROR: WARN: Broken

Bug#1035281: firmware-intel-sound: broken symlinks: /lib/firmware/intel/dsp_fw_*.bin -> avs/*/dsp_basefw.bin

2023-04-29 Thread Andreas Beckmann
Package: firmware-intel-sound Version: 20230310-1~exp1 Severity: serious User: debian...@lists.debian.org Usertags: piuparts Hi, during a test with piuparts I noticed your package ships (or creates) broken symlinks. >From the attached log (scroll to the bottom...): 0m13.1s ERROR: WARN: Broken

Bug#1035118: linux-base: Presence of GPG signatures in /boot causes wrong kernels to be listed with linux-version

2023-04-29 Thread abrasamji
Package: linux-base Version: 4.6 Severity: important X-Debbugs-Cc: debian.62...@simplelogin.com Dear Maintainer, Grub2 supports additional secure boot capabilities that are not commonly used but are required for security. These new features are being referenced in some security guides online.

Re: Bug#905745: util-linux: tty hijacking possible in "su" via TIOCSTI ioctl

2023-04-29 Thread Chris Hofstaedtler
Control: reassign -1 src:linux Control: affects -1 src:util-linux Dear Kernel Maintainers, Security Team, * Sam Morris : > Linux 6.2 introduces a sysctl dev.tty.legacy_tiocsti sysctl which can be > used to disable TIOCSTI. The default value of the sysctl is set at build > time with

Processed: Re: Bug#905745: util-linux: tty hijacking possible in "su" via TIOCSTI ioctl

2023-04-29 Thread Debian Bug Tracking System
Processing control commands: > reassign -1 src:linux Bug #905745 [util-linux] util-linux: tty hijacking possible in "su" via TIOCSTI ioctl Bug reassigned from package 'util-linux' to 'src:linux'. No longer marked as found in versions util-linux/2.32-0.4. Ignoring request to alter fixed versions

Re: Bug#1035101: Failed to detect HD if Intel RST-RAID is active

2023-04-29 Thread Thomas Viehweger
Apparently we have that option enabled in the regular linux package: debian/config/kernelarch-x86/config:CONFIG_INTEL_RST=m but the relevant module isn't shipped in any udebs: /lib/modules//kernel/drivers/platform/x86/intel/intel-rst.ko Would you be willing to test an unofficial

Re: Bug#1035101: Failed to detect HD if Intel RST-RAID is active

2023-04-29 Thread Cyril Brulebois
Hallo Thomas, and thanks for your report. Thomas Viehweger (2023-04-29): > Detect hard drives: [E] > > The Hard disk was not detected because Intel RST was configured in > RAID mode. > > Tried Ubuntu 23.04 installer which gives the correct hint. > > After configuring Intel RST to AHCI

Processed: reassign 1035097 to grub2-common, reassign 1031826 to src:linux

2023-04-29 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org: > reassign 1035097 grub2-common Bug #1035097 [grub-install] grub-install: efivars_set_variable fails due to dump-* files in /sys/firmware/efi/efivars Warning: Unknown package 'grub-install' Bug reassigned from package 'grub-install' to

Re: Bug#1033301: linux: arm64 kernel size increased from 31 to 39 MB, causing u-boot-rpi to fail

2023-04-29 Thread Salvatore Bonaccorso
Hi Aurelien, On Sat, Apr 29, 2023 at 09:50:57AM +0200, Aurelien Jarno wrote: > control: reassign -1 pahole/1.24-4 > control: retitle -1 pahole: BTF deduplication issues causing arm64 kernel > size increase > control: tag -1 + fixed-upstream > control: tag -1 + patch > control: affects -1

Processed: reassign 1033301 to pahole

2023-04-29 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org: > reassign 1033301 pahole 1.24-4 Bug #1033301 [src:linux] pahole: BTF deduplication issues causing arm64 kernel size increase Bug reassigned from package 'src:linux' to 'pahole'. No longer marked as found in versions linux/6.1.15-1. Ignoring

Processed (with 1 error): Re: linux: arm64 kernel size increased from 31 to 39 MB, causing u-boot-rpi to fail

2023-04-29 Thread Debian Bug Tracking System
Processing control commands: > reassign -1 pahole/1.24-4 Unknown command or malformed arguments to command. > retitle -1 pahole: BTF deduplication issues causing arm64 kernel size increase Bug #1033301 [src:linux] linux: arm64 kernel size increased from 31 to 39 MB, causing u-boot-rpi to fail

Re: linux: arm64 kernel size increased from 31 to 39 MB, causing u-boot-rpi to fail

2023-04-29 Thread Aurelien Jarno
control: reassign -1 pahole/1.24-4 control: retitle -1 pahole: BTF deduplication issues causing arm64 kernel size increase control: tag -1 + fixed-upstream control: tag -1 + patch control: affects -1 u-boot-rpi src:linux Hi, On 2023-03-21 23:11, Aurelien Jarno wrote: > Source: linux > Version: