• Re: IMPORTANT: do NOT upgrade to new stable point release

    From Nate Bargmann@21:1/5 to All on Sat Dec 9 19:50:01 2023
    Thanks for the tip. I updated this morning well before any
    announcements and having seen this I rebooted into the 6.1.0-12 (6.1.52) package. Good thing old kernels are kept around.

    - Nate

    --
    "The optimist proclaims that we live in the best of all
    possible worlds. The pessimist fears this is true."
    Web: https://www.n0nb.us
    Projects: https://github.com/N0NB
    GPG fingerprint: 82D6 4F6B 0E67 CD41 F689 BBA6 FB2C 5130 D55A 8819


    -----BEGIN PGP SIGNATURE-----

    iF0EABECAB0WIQSC1k9rDmfNQfaJu6b7LFEw1VqIGQUCZXS2jQAKCRD7LFEw1VqI GVaUAJ44Cvsja7SPtSRxeSaNRo3t0WUZRgCdEdxeiAFkd2A9QJil1QRSe4tgg0E=
    =+Doq
    -----END PGP SIGNATURE-----

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Dan Ritter@21:1/5 to All on Sat Dec 9 19:30:01 2023
    https://fulda.social/@Ganneff/111551628003050712

    https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1057843

    The new kernel release is reported to contain an ext4 data
    corruption bug. It's prudent not to upgrade, or if you have
    started to upgrade, not to reboot, until a new kernel release
    is prepared.


    -dsr-

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From =?UTF-8?Q?Markus_Sch=C3=B6nhaber?=@21:1/5 to All on Sat Dec 9 20:00:01 2023
    09.12.23, 19:09 +0100, Dan Ritter:

    https://fulda.social/@Ganneff/111551628003050712

    https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1057843

    The new kernel release is reported to contain an ext4 data
    corruption bug. It's prudent not to upgrade, or if you have
    started to upgrade, not to reboot, until a new kernel release
    is prepared.

    Thank you very much for the hint, Dan!

    --
    Regards
    mks

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Alexis Grigoriou@21:1/5 to Dan Ritter on Sat Dec 9 20:10:01 2023
    On Sat, 2023-12-09 at 13:09 -0500, Dan Ritter wrote:


    The new kernel release is reported to contain an ext4 data
    corruption bug. It's prudent not to upgrade, or if you have
    started to upgrade, not to reboot, until a new kernel release
    is prepared.


    I just upgraded to Bookworm this morning. I did reboot a couple of
    times but there seems to be no problem (yet). Is there anything I
    should look for or do other than rebooting?

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Greg Wooledge@21:1/5 to All on Sat Dec 9 20:30:02 2023
    On Sat, Dec 09, 2023 at 07:18:20PM +0000, Michael Kjrling wrote:
    If you upgraded this morning, then I would expect that you are okay
    for now.

    That doesn't appear to be true.

    Per #5 in https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1057843
    the bug is present in kernel Debian package version 6.1.64-1. If you
    are on 6.1.55-1 (current Bookworm stable per last night) you _likely_
    aren't affected.

    This is the kernel I got this morning:

    ii linux-image-6.1.0-14-amd64 6.1.64-1 amd64 Linux 6.1 for 64-bit PCs (signed)

    This is the current result of looking for a newer one:

    0 upgraded, 0 newly installed, 0 to remove and 0 not upgraded.

    Based on the warnings given here, I rebooted to the prior kernel:

    unicorn:~$ uname -a
    Linux unicorn 6.1.0-13-amd64 #1 SMP PREEMPT_DYNAMIC Debian 6.1.55-1 (2023-09-29) x86_64 GNU/Linux

    I guess I'll wait and see what happens next.

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Michael =?utf-8?B?S2rDtnJsaW5n?=@21:1/5 to All on Sat Dec 9 20:20:01 2023
    On 9 Dec 2023 20:54 +0200, from alexis@nanoid.net (Alexis Grigoriou):
    I just upgraded to Bookworm this morning. I did reboot a couple of
    times but there seems to be no problem (yet). Is there anything I
    should look for or do other than rebooting?

    If you upgraded this morning, then I would expect that you are okay
    for now.

    Per #5 in https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1057843
    the bug is present in kernel Debian package version 6.1.64-1. If you
    are on 6.1.55-1 (current Bookworm stable per last night) you _likely_
    aren't affected. If you are on 6.1.55-1 (or earlier), just hold off on
    upgrades for now; and if you need to upgrade something else, take
    great care for now to ensure that no Linux kernel packages get
    upgraded to any version < 6.1.66, and preferably not < 6.1.66-1.

    For versions, check:

    * uname -v
    * dpkg -l linux-image-\*

    In that bug report thread, #21 lists 6.1.66 as fixed upstream, and #28 indicates that 6.1.66-1 includes the fix from upstream, and that it is
    being published.

    --
    Michael Kjörling 🔗 https://michael.kjorling.se “Remember when, on the Internet, nobody cared that you were a dog?”

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Richmond@21:1/5 to Greg Wooledge on Sat Dec 9 21:00:01 2023
    Greg Wooledge <greg@wooledge.org> writes:

    On Sat, Dec 09, 2023 at 07:18:20PM +0000, Michael Kjörling wrote:
    If you upgraded this morning, then I would expect that you are okay
    for now.

    That doesn't appear to be true.

    Per #5 in https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1057843
    the bug is present in kernel Debian package version 6.1.64-1. If you
    are on 6.1.55-1 (current Bookworm stable per last night) you _likely_
    aren't affected.

    This is the kernel I got this morning:

    ii linux-image-6.1.0-14-amd64 6.1.64-1 amd64 Linux 6.1 for 64-bit PCs (signed)

    This is the current result of looking for a newer one:

    0 upgraded, 0 newly installed, 0 to remove and 0 not upgraded.

    Based on the warnings given here, I rebooted to the prior kernel:

    unicorn:~$ uname -a Linux unicorn 6.1.0-13-amd64 #1 SMP
    PREEMPT_DYNAMIC Debian 6.1.55-1 (2023-09-29) x86_64 GNU/Linux

    I guess I'll wait and see what happens next.

    I upgraded some time today to a December kernel. I have now gone back to September 29 kernel. But is there a way to tell what if anything got
    corrupted? I am using a 32 bit system and ext4.

    I booted this:

    6.1.0-13-686-pae #1 SMP PREEMPT_DYNAMIC Debian 6.1.55-1 (2023-09-29)
    i686 GNU/Linux

    then:

    aptitude remove linux-image-6.1.0-14-686-pae

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Michael =?utf-8?B?S2rDtnJsaW5n?=@21:1/5 to All on Sat Dec 9 21:00:03 2023
    On 9 Dec 2023 14:26 -0500, from greg@wooledge.org (Greg Wooledge):
    If you upgraded this morning, then I would expect that you are okay
    for now.

    That doesn't appear to be true.

    Per #5 in https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1057843
    the bug is present in kernel Debian package version 6.1.64-1. If you
    are on 6.1.55-1 (current Bookworm stable per last night) you _likely_
    aren't affected.

    This is the kernel I got this morning:

    ii linux-image-6.1.0-14-amd64 6.1.64-1 amd64 Linux 6.1 for 64-bit PCs (signed)

    Alexis Grigoriou is in UTC+0200 per the email headers; you are in
    UTC-0500. Thus "this morning" is 7 hour later for you than for Alexis,
    only because of that.

    --
    Michael Kjörling 🔗 https://michael.kjorling.se “Remember when, on the Internet, nobody cared that you were a dog?”

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Joe@21:1/5 to 2695bd53d63c@ewoof.net on Sat Dec 9 22:20:01 2023
    On Sat, 9 Dec 2023 19:18:20 +0000
    Michael Kjörling <2695bd53d63c@ewoof.net> wrote:

    On 9 Dec 2023 20:54 +0200, from alexis@nanoid.net (Alexis Grigoriou):
    I just upgraded to Bookworm this morning. I did reboot a couple of
    times but there seems to be no problem (yet). Is there anything I
    should look for or do other than rebooting?

    If you upgraded this morning, then I would expect that you are okay
    for now.

    Per #5 in https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1057843
    the bug is present in kernel Debian package version 6.1.64-1. If you
    are on 6.1.55-1 (current Bookworm stable per last night) you _likely_
    aren't affected. If you are on 6.1.55-1 (or earlier), just hold off on upgrades for now; and if you need to upgrade something else, take
    great care for now to ensure that no Linux kernel packages get
    upgraded to any version < 6.1.66, and preferably not < 6.1.66-1.

    For versions, check:

    * uname -v
    * dpkg -l linux-image-\*

    In that bug report thread, #21 lists 6.1.66 as fixed upstream, and #28 indicates that 6.1.66-1 includes the fix from upstream, and that it is
    being published.


    It appears from the link in the bug report that 6.5.x kernels
    (sid/trixie) are not affected. Does anyone know otherwise?

    https://lore.kernel.org/stable/20231205122122.dfhhoaswsfscuhc3@quack3/

    Is the bug likely to affect all architectures? I have a Pi bookworm
    (armhf) on 6.1.63-1, with 6.1.58-1 also installed. I can probably roll
    back to 6.1.54-1 if necessary.

    --
    Joe

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Niall O'Reilly@21:1/5 to All on Sun Dec 10 17:00:02 2023
    On 9 Dec 2023, at 19:18, Michael Kjörling wrote:

    If you are on 6.1.55-1 (or earlier), just hold off on
    upgrades for now; and if you need to upgrade something else, take
    great care for now to ensure that no Linux kernel packages get
    upgraded to any version < 6.1.66, and preferably not < 6.1.66-1.

    TSM for this advice.

    As I'm not used to having to "take great care" like this, I would
    appreciate confirmation that what I've done is likely to be useful.

    I've dropped a file into /etc/apt/preferences.d/ containing
    the following text.

    Package: linux-image-amd64
    Pin: version 6.1.55-1
    Pin-Priority: 1100

    As I noticed that an upgrade to 6.1.64-1 was also in line for
    linux-libc-dev, I did the same for this package too.

    As a result, apt-cache policy is telling me

    linux-image-amd64:
    Installed: 6.1.55-1
    Candidate: 6.1.55-1
    Version table:
    6.1.64-1 500
    500 https://ftp.debian.org/debian bookworm/main amd64 Packages
    *** 6.1.55-1 1100
    100 /var/lib/dpkg/status
    6.1.52-1 500
    500 https://security.debian.org/debian-security bookworm-security/main amd64 Packages
    linux-libc-dev:
    Installed: 6.1.55-1
    Candidate: 6.1.55-1
    Version table:
    6.1.64-1 500
    500 https://ftp.debian.org/debian bookworm/main amd64 Packages
    *** 6.1.55-1 1100
    100 /var/lib/dpkg/status
    6.1.52-1 500
    500 https://security.debian.org/debian-security bookworm-security/main amd64 Packages

    Thanks in anticipation of a simple yes or no.

    Niall O'Reilly

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Gary Dale@21:1/5 to All on Sun Dec 10 18:00:01 2023
    On 2023-12-09 14:18, Michael Kjörling wrote:
    On 9 Dec 2023 20:54 +0200, from alexis@nanoid.net (Alexis Grigoriou):
    I just upgraded to Bookworm this morning. I did reboot a couple of
    times but there seems to be no problem (yet). Is there anything I
    should look for or do other than rebooting?
    If you upgraded this morning, then I would expect that you are okay
    for now.

    Per #5 in https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1057843
    the bug is present in kernel Debian package version 6.1.64-1. If you
    are on 6.1.55-1 (current Bookworm stable per last night) you _likely_
    aren't affected. If you are on 6.1.55-1 (or earlier), just hold off on upgrades for now; and if you need to upgrade something else, take
    great care for now to ensure that no Linux kernel packages get
    upgraded to any version < 6.1.66, and preferably not < 6.1.66-1.

    For versions, check:

    * uname -v
    * dpkg -l linux-image-\*

    In that bug report thread, #21 lists 6.1.66 as fixed upstream, and #28 indicates that 6.1.66-1 includes the fix from upstream, and that it is
    being published.

    Any idea when the fixed version will hit stable? With headless servers,
    it's a pain to downgrade to a previous kernel version.

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Curt@21:1/5 to Andrew M.A. Cater on Sun Dec 10 18:10:01 2023
    On 2023-12-10, Andrew M.A. Cater <amacater@einval.com> wrote:

    "Now" is almost exactly Sun 10 Dec 16:55:43 UTC 2023

    You mean in the Zulu Time Zone (as I am all at sea)?

    Andy
    (amacater@debian.org)



    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Andrew M.A. Cater@21:1/5 to Gary Dale on Sun Dec 10 18:00:01 2023
    On Sun, Dec 10, 2023 at 11:50:18AM -0500, Gary Dale wrote:
    On 2023-12-09 14:18, Michael Kjrling wrote:
    On 9 Dec 2023 20:54 +0200, from alexis@nanoid.net (Alexis Grigoriou):
    I just upgraded to Bookworm this morning. I did reboot a couple of
    times but there seems to be no problem (yet). Is there anything I
    should look for or do other than rebooting?
    If you upgraded this morning, then I would expect that you are okay
    for now.

    Per #5 in https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1057843
    the bug is present in kernel Debian package version 6.1.64-1. If you
    are on 6.1.55-1 (current Bookworm stable per last night) you _likely_ aren't affected. If you are on 6.1.55-1 (or earlier), just hold off on upgrades for now; and if you need to upgrade something else, take
    great care for now to ensure that no Linux kernel packages get
    upgraded to any version < 6.1.66, and preferably not < 6.1.66-1.

    For versions, check:

    * uname -v
    * dpkg -l linux-image-\*

    In that bug report thread, #21 lists 6.1.66 as fixed upstream, and #28 indicates that 6.1.66-1 includes the fix from upstream, and that it is being published.

    Any idea when the fixed version will hit stable? With headless servers, it's a pain to downgrade to a previous kernel version.


    Give them a little while: release team are working on it right now as I type

    I'm fairly sure they're pushing it out more or less immediately once they're sure that it's built correctly and synced to all the appropriate places to
    be further synced to mirrors

    "Now" is almost exactly Sun 10 Dec 16:55:43 UTC 2023

    Andy
    (amacater@debian.org)

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Andrew M.A. Cater@21:1/5 to Curt on Sun Dec 10 18:30:02 2023
    On Sun, Dec 10, 2023 at 05:09:15PM -0000, Curt wrote:
    On 2023-12-10, Andrew M.A. Cater <amacater@einval.com> wrote:

    "Now" is almost exactly Sun 10 Dec 16:55:43 UTC 2023

    You mean in the Zulu Time Zone (as I am all at sea)?

    Andy
    (amacater@debian.org)




    Not this again :) GMT (was) the world standard reference point from 1884
    and the Washington Conference (or thereabouts).

    For most purposes GMT +0000 == UTC (or UCT if you're Francophone) ==
    Zulu time (26 time zones to cope with half hour offsets - ?? go from A-Z??)
    == "military time" (if you're US military) and quite possibly NATO time.

    This fails with leap seconds, potentially, and also TAI astronomical time
    seems to be its own animal.

    Does this help?

    Andy
    (amacater@debian.org)



    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From tomas@tuxteam.de@21:1/5 to Andrew M.A. Cater on Sun Dec 10 18:30:02 2023
    On Sun, Dec 10, 2023 at 05:20:40PM +0000, Andrew M.A. Cater wrote:
    On Sun, Dec 10, 2023 at 05:09:15PM -0000, Curt wrote:
    On 2023-12-10, Andrew M.A. Cater <amacater@einval.com> wrote:

    "Now" is almost exactly Sun 10 Dec 16:55:43 UTC 2023

    You mean in the Zulu Time Zone (as I am all at sea)?

    Andy
    (amacater@debian.org)




    Not this again :) GMT (was) the world standard reference point from 1884
    and the Washington Conference (or thereabouts).

    For most purposes GMT +0000 == UTC (or UCT if you're Francophone) ==

    Actually this would be TUC ("Temps universel coordonné), while English
    would be CUT, but for once, they compromised on UTC [1] :-)

    Cheers

    [1] https://fr.wikipedia.org/wiki/UTC
    --
    t

    -----BEGIN PGP SIGNATURE-----

    iF0EABECAB0WIQRp53liolZD6iXhAoIFyCz1etHaRgUCZXX0VQAKCRAFyCz1etHa RgZYAJ9Cy8UyrCnmlwxYmzgv1ldHyUjkTQCfVGRDA8G5GzcTDVA4HlWVVPCZN2E=
    =7VIC
    -----END PGP SIGNATURE-----

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Greg Wooledge@21:1/5 to Curt on Sun Dec 10 18:30:02 2023
    On Sun, Dec 10, 2023 at 05:09:15PM -0000, Curt wrote:
    On 2023-12-10, Andrew M.A. Cater <amacater@einval.com> wrote:

    "Now" is almost exactly Sun 10 Dec 16:55:43 UTC 2023

    You mean in the Zulu Time Zone (as I am all at sea)?

    Use "date -u" to see current UTC time. That should be sufficient to
    let you know how long it has been since Andrew's "now".

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From John Hasler@21:1/5 to Andy on Sun Dec 10 18:40:01 2023
    Andy writes:
    This fails with leap seconds, potentially, and also TAI astronomical
    time seems to be its own animal.

    TAI isn't good enough for the astronomers. https://en.wikipedia.org/wiki/Terrestrial_Time

    --
    John Hasler
    john@sugarbit.com
    Elmwood, WI USA

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Gary Dale@21:1/5 to Greg Wooledge on Sun Dec 10 19:00:01 2023
    On 2023-12-10 12:24, Greg Wooledge wrote:
    On Sun, Dec 10, 2023 at 05:09:15PM -0000, Curt wrote:
    On 2023-12-10, Andrew M.A. Cater <amacater@einval.com> wrote:
    "Now" is almost exactly Sun 10 Dec 16:55:43 UTC 2023
    You mean in the Zulu Time Zone (as I am all at sea)?
    Use "date -u" to see current UTC time. That should be sufficient to
    let you know how long it has been since Andrew's "now".

    You're getting too complicated. The date stamp on his e-mail will
    display the correct local time (as you have set it) so I can see that he
    wrote it 30 minutes ago. That relative time is universal across time zones.

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Gary Dale@21:1/5 to Andrew M.A. Cater on Sun Dec 10 19:30:01 2023
    On 2023-12-10 11:56, Andrew M.A. Cater wrote:
    On Sun, Dec 10, 2023 at 11:50:18AM -0500, Gary Dale wrote:
    On 2023-12-09 14:18, Michael Kjörling wrote:
    On 9 Dec 2023 20:54 +0200, from alexis@nanoid.net (Alexis Grigoriou):
    I just upgraded to Bookworm this morning. I did reboot a couple of
    times but there seems to be no problem (yet). Is there anything I
    should look for or do other than rebooting?
    If you upgraded this morning, then I would expect that you are okay
    for now.

    Per #5 in https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1057843
    the bug is present in kernel Debian package version 6.1.64-1. If you
    are on 6.1.55-1 (current Bookworm stable per last night) you _likely_
    aren't affected. If you are on 6.1.55-1 (or earlier), just hold off on
    upgrades for now; and if you need to upgrade something else, take
    great care for now to ensure that no Linux kernel packages get
    upgraded to any version < 6.1.66, and preferably not < 6.1.66-1.

    For versions, check:

    * uname -v
    * dpkg -l linux-image-\*

    In that bug report thread, #21 lists 6.1.66 as fixed upstream, and #28
    indicates that 6.1.66-1 includes the fix from upstream, and that it is
    being published.

    Any idea when the fixed version will hit stable? With headless servers, it's >> a pain to downgrade to a previous kernel version.

    Give them a little while: release team are working on it right now as I type

    I'm fairly sure they're pushing it out more or less immediately once they're sure that it's built correctly and synced to all the appropriate places to
    be further synced to mirrors

    "Now" is almost exactly Sun 10 Dec 16:55:43 UTC 2023

    Andy
    (amacater@debian.org)

    Thanks. I logged into each of my headless servers and removed the
    problematic kernel then rebooted them so they are all at 6.1.0-13 now.

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Curt@21:1/5 to Gary Dale on Sun Dec 10 19:50:02 2023
    On 2023-12-10, Gary Dale <gary@extremeground.com> wrote:

    On 2023-12-10 12:24, Greg Wooledge wrote:
    On Sun, Dec 10, 2023 at 05:09:15PM -0000, Curt wrote:
    On 2023-12-10, Andrew M.A. Cater <amacater@einval.com> wrote:
    "Now" is almost exactly Sun 10 Dec 16:55:43 UTC 2023
    You mean in the Zulu Time Zone (as I am all at sea)?
    Use "date -u" to see current UTC time. That should be sufficient to
    let you know how long it has been since Andrew's "now".

    You're getting too complicated. The date stamp on his e-mail will
    display the correct local time (as you have set it) so I can see that he wrote it 30 minutes ago. That relative time is universal across time zones.



    It is the notion of simultaneity itself (the now of now) that is
    relative rather than universal.

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From tomas@tuxteam.de@21:1/5 to Nicholas Geovanis on Sun Dec 10 20:50:01 2023
    On Sun, Dec 10, 2023 at 01:36:52PM -0600, Nicholas Geovanis wrote:
    On Sun, Dec 10, 2023, 12:47 PM Curt <curty@free.fr> wrote:
    [...]

    It is the notion of simultaneity itself (the now of now) that is
    relative rather than universal.


    I thought metaphysics was off-topic for this group. Moderators!! :-)

    Hold on. Since Einstein this is plain old boring physics ;-P

    Cheers
    --
    t

    -----BEGIN PGP SIGNATURE-----

    iF0EABECAB0WIQRp53liolZD6iXhAoIFyCz1etHaRgUCZXYUHAAKCRAFyCz1etHa Rnm9AJ9055h1t7UQYg2nFL92/Hf8s/gIKQCeJw+5oMrgaARaEp0k2sEubqSn/+8=
    =9Hrk
    -----END PGP SIGNATURE-----

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Charles Curley@21:1/5 to Dan Ritter on Sun Dec 10 22:30:01 2023
    On Sat, 9 Dec 2023 13:09:23 -0500
    Dan Ritter <dsr@randomstring.org> wrote:

    https://fulda.social/@Ganneff/111551628003050712

    https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1057843

    The new kernel release is reported to contain an ext4 data
    corruption bug. It's prudent not to upgrade, or if you have
    started to upgrade, not to reboot, until a new kernel release
    is prepared.


    -dsr-


    It appears the new, repaired, kernel and minor version of Bookworm have
    landed. Now, who wants to live dangerously? :-)

    root@tiassa:~# apt update
    Get:1 http://security.debian.org/debian-security bookworm-security InRelease [48.0 kB]
    Get:2 http://deb.debian.org/debian bookworm InRelease [151 kB]
    Get:3 http://deb.debian.org/debian bookworm/main amd64 Packages [8,787 kB] Get:4 http://deb.debian.org/debian bookworm/main Translation-en [6,109 kB] Fetched 15.1 MB in 3s (4,432 kB/s)
    Reading package lists... Done
    Building dependency tree... Done
    Reading state information... Done
    38 packages can be upgraded. Run 'apt list --upgradable' to see them.
    N: Repository 'http://deb.debian.org/debian bookworm InRelease' changed its 'Version' value from '12.3' to '12.4'
    root@tiassa:~# apt list --upgradable
    Listing... Done

    libudev1/stable 252.19-1~deb12u1 amd64 [upgradable from: 252.17-1~deb12u1] linux-image-amd64/stable 6.1.66-1 amd64 [upgradable from: 6.1.55-1] linux-libc-dev/stable 6.1.66-1 amd64 [upgradable from: 6.1.55-1]

    root@tiassa:~#


    --
    Does anybody read signatures any more?

    https://charlescurley.com
    https://charlescurley.com/blog/

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Andrew M.A. Cater@21:1/5 to Charles Curley on Sun Dec 10 22:50:01 2023
    On Sun, Dec 10, 2023 at 02:27:38PM -0700, Charles Curley wrote:
    On Sat, 9 Dec 2023 13:09:23 -0500
    Dan Ritter <dsr@randomstring.org> wrote:

    https://fulda.social/@Ganneff/111551628003050712

    https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1057843

    The new kernel release is reported to contain an ext4 data
    corruption bug. It's prudent not to upgrade, or if you have
    started to upgrade, not to reboot, until a new kernel release
    is prepared.


    -dsr-


    It appears the new, repaired, kernel and minor version of Bookworm have landed. Now, who wants to live dangerously? :-)

    root@tiassa:~# apt update
    Get:1 http://security.debian.org/debian-security bookworm-security InRelease [48.0 kB]
    Get:2 http://deb.debian.org/debian bookworm InRelease [151 kB]
    Get:3 http://deb.debian.org/debian bookworm/main amd64 Packages [8,787 kB] Get:4 http://deb.debian.org/debian bookworm/main Translation-en [6,109 kB] Fetched 15.1 MB in 3s (4,432 kB/s)
    Reading package lists... Done
    Building dependency tree... Done
    Reading state information... Done
    38 packages can be upgraded. Run 'apt list --upgradable' to see them.
    N: Repository 'http://deb.debian.org/debian bookworm InRelease' changed its 'Version' value from '12.3' to '12.4'
    root@tiassa:~# apt list --upgradable
    Listing... Done

    libudev1/stable 252.19-1~deb12u1 amd64 [upgradable from: 252.17-1~deb12u1] linux-image-amd64/stable 6.1.66-1 amd64 [upgradable from: 6.1.55-1] linux-libc-dev/stable 6.1.66-1 amd64 [upgradable from: 6.1.55-1]

    root@tiassa:~#


    --
    Does anybody read signatures any more?

    https://charlescurley.com
    https://charlescurley.com/blog/


    I'd suggest apt-get update ; apt-get dist-upgrade or equivalent.

    There were a few other bug fixes as well in this point release but I
    think you've got the three major packages that changed.

    Base files also changed, obviously :)

    All the very best, as ever,

    Andy

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Michael =?utf-8?B?S2rDtnJsaW5n?=@21:1/5 to All on Mon Dec 11 17:50:01 2023
    On 11 Dec 2023 11:34 -0500, from gary@extremeground.com (Gary Dale):
    Pleased to note that 6.1.0-15 seems to have hit the mirrors now. I assume this is the fixed version.

    It certainly should be, but some people have reported other issues
    with the new 12.4 upgrade. See other recent posts to this list.

    --
    Michael Kjörling 🔗 https://michael.kjorling.se “Remember when, on the Internet, nobody cared that you were a dog?”

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Gary Dale@21:1/5 to Dan Ritter on Mon Dec 11 17:40:02 2023
    On 2023-12-09 13:09, Dan Ritter wrote:

    https://fulda.social/@Ganneff/111551628003050712

    https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1057843

    The new kernel release is reported to contain an ext4 data
    corruption bug. It's prudent not to upgrade, or if you have
    started to upgrade, not to reboot, until a new kernel release
    is prepared.


    -dsr-

    Pleased to note that 6.1.0-15 seems to have hit the mirrors now. I
    assume this is the fixed version.

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)