Bug#889129: .config:3186:warning: symbol value 'm' invalid for HW_RANDOM_TPM

2018-02-02 Thread Mathieu Malaterre
Source: linux Version: 4.14.13-1 Severity: minor User: debian-powe...@lists.debian.org Usertags: powerpc At least on my G4 Mac Mini, I can see: $ cp /boot/config-4.14.0-3-powerpc .config $ make savedefconfig scripts/kconfig/conf --savedefconfig=defconfig Kconfig .config:3186:warning: symbol valu

Bug#878221: linux-image-4.9.0-4-amd64: Screen flickers randomly with Radeon R9 270X since upgrade from 4.9.0-3 to 4.9.0-4

2018-02-02 Thread besy
Am 29.01.2018 um 17:44 schrieb Yves-Alexis Perez: > On Wed, 2017-10-11 at 11:05 +0200, Benjamin Sygnat wrote: >> - The screen (Dell U2415, resolution 1920x1200) which is connected to my AMD >> Radeon R9 270X (on DisplayPort-0) occasionally flickers every few seconds. >> The >> flickering appears t

Bug#878221: linux-image-4.9.0-4-amd64: Screen flickers randomly with Radeon R9 270X since upgrade from 4.9.0-3 to 4.9.0-4

2018-02-02 Thread besy
As a side note: I still have some older kernel version from stretch-backports on my PC. I tried it with the oldest one of these kernels. The problem doesn't occur with the kernel "4.12.0-0.bpo.2-amd64 #1 SMP Debian 4.12.13-1~bpo9+1 (2017-09-28) x86_64 GNU/Linux".

Processed: reassign 889146 to src:linux

2018-02-02 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org: > reassign 889146 src:linux 3.2.96-3 Bug #889146 [linux-image-3.2.0-5-amd64] smartctl - Read Device Identity failed Warning: Unknown package 'linux-image-3.2.0-5-amd64' Bug reassigned from package 'linux-image-3.2.0-5-amd64' to 'src:linux'. No longe

Processed: Re: Bug#886556: linux-image-4.15.0-rc5-amd64: NULL pointer dereference in ecc_gen_privkey [ecdh_generic] at boot

2018-02-02 Thread Debian Bug Tracking System
Processing control commands: > tags -1 + confirmed pending fixed-upstream Bug #886556 [src:linux] linux-image-4.15.0-rc5-amd64: NULL pointer dereference in ecc_gen_privkey [ecdh_generic] at boot Added tag(s) confirmed, pending, and fixed-upstream. -- 886556: https://bugs.debian.org/cgi-bin/bugr

Bug#886556: linux-image-4.15.0-rc5-amd64: NULL pointer dereference in ecc_gen_privkey [ecdh_generic] at boot

2018-02-02 Thread Salvatore Bonaccorso
Control: tags -1 + confirmed pending fixed-upstream Hi On Sun, Jan 07, 2018 at 06:23:40PM +0200, Mihai Basa wrote: > Package: src:linux > Version: 4.15~rc5-1~exp1 > Severity: important > Tags: patch > > On boot, a NULL pointer dereference is encountered in ecc_gen_privkey in > the ecdh_generic m

Re: enforce fs.protected_hardlinks in sysctl.d by default

2018-02-02 Thread Moritz Mühlenhoff
Antoine Beaupré wrote: > There are, however, people *not* running Debian-built kernels, and > sometimes for good reasons. This is a configuration that we should > still support. Is it supported, but it's also clearly documented that people need to enable this sysctl for custom kernels: https://www

Re: enforce fs.protected_hardlinks in sysctl.d by default

2018-02-02 Thread Antoine Beaupré
On 2018-02-02 21:25:31, Moritz Mühlenhoff wrote: > Antoine Beaupré wrote: >> There are, however, people *not* running Debian-built kernels, and >> sometimes for good reasons. This is a configuration that we should >> still support. > > Is it supported, but it's also clearly documented that people n

Re: Bug#889098: enforce fs.protected_hardlinks in sysctl.d by default

2018-02-02 Thread Craig Small
Hi Antoine (and kernel and security teams), Thanks for giving me the background as it's a kernel vulnerability not a Procps one I wasn't aware of it. The change to Procps is pretty simple but given that you need to be running a non Debian kernel without this parameter what's groups' opinion of t