Your message dated Wed, 23 Mar 2005 15:47:59 +0900
with message-id <[EMAIL PROTECTED]>
and subject line Bug#300162: [CAN-2004-1191]: Improper command checking for
CDs, allowing local users to conduct unauthorized writes to firmware
has caused the attached Bug report to be marked as done.
This mea
Your message dated Wed, 23 Mar 2005 13:57:06 +0900
with message-id <[EMAIL PROTECTED]>
and subject line Bug#299875: ppp: out-of-memory 30min after "LCP terminated by
peer"
has caused the attached Bug report to be marked as done.
This means that you claim that the problem has been dealt with.
If t
CAN-2005-0384 is fixed in kernel-source-2.6.8 2.6.8-15
and will be fixed in kernel-source-2.4.27 2.6.8-9
--
Horms
--
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]
For reference.
CAN-2005-0532 is fixed in kernel-source-2.6.8-14.
kernel-source-2.6.11 has the fix and thus
kernel-source-2.6.11-1 and beyond are not vulnerable.
kernel-source-2.4.27 does not seem to be vulnerable.
2.6.9 and 2.6.10 are no longer being updated by the kernel-team.
--
Horms
--
T
reassign 296700 kernel-source-2.4.27
thanks
On Thu, Feb 24, 2005 at 12:29:27AM -0600, Micah Anderson wrote:
> Package: kernel-source-2.6.8
> Version: 2.6.8-13
> Severity: normal
> Tags: security patch
>
> Hello,
>
CAN-2005-0204 is fixed in kernel-source-2.6.8-14 and
kernel-source-2.6.11-1.
It w
Your message dated Wed, 23 Mar 2005 10:55:09 +0900
with message-id <[EMAIL PROTECTED]>
and subject line Bug#300838: [CAN-2005-0210]: Netfilter in Linux kernel 2.6.8.1
allows remote attackers to cause a denial of service
has caused the attached Bug report to be marked as done.
This means that you
On Tue, Mar 22, 2005 at 11:01:04AM +0100, Florian Weimer wrote:
> The changelog entry for CAN-2005-0449 (in kernel-source-2.6.8) reads:
>
> * ipv4-fragment-queues-1.dpatch, ipv4-fragment-queues-2.dpatch,
> ipv4-fragment-queues-3.dpatch, ipv4-fragment-queues-4.dpatch:
> fix potential info
Accepted:
kernel-headers-2.6.8-2-386_2.6.8-15_i386.deb
to
pool/main/k/kernel-image-2.6.8-i386/kernel-headers-2.6.8-2-386_2.6.8-15_i386.deb
kernel-headers-2.6.8-2-686-smp_2.6.8-15_i386.deb
to
pool/main/k/kernel-image-2.6.8-i386/kernel-headers-2.6.8-2-686-smp_2.6.8-15_i386.deb
kernel-headers-2
kernel-image-2.6.8-i386_2.6.8-15_i386.changes uploaded successfully to localhost
along with the files:
kernel-image-2.6.8-i386_2.6.8-15.dsc
kernel-image-2.6.8-i386_2.6.8-15.tar.gz
kernel-headers-2.6.8-2_2.6.8-15_i386.deb
kernel-headers-2.6.8-2-686-smp_2.6.8-15_i386.deb
kernel-image-2.6.8-
Probably you are the uploader of the following file(s) in
the Debian upload queue directory:
kernel-image-2.6.8-i386_2.6.8-15.dsc
This looks like an upload, but a .changes file is missing, so the job
cannot be processed.
If no .changes file arrives within 22:02:00, the files will be deleted.
If
Hi Horms,
Thank you for your reply.
[...]
"Linux kernel image for version 2.4.27 on AMD K7"
Could that be revised as well to include the fact that it is 32bit and
supports AlthonXP/Athon/Duron
I expect other pages could do with this addtional information as well:
kernel-image-2.4.27-2-k7-smp
Yes,
kernel-image-2.6.8-i386_2.6.8-15.tar.gz has incorrect size; deleting it
Due to the errors above, the .changes file couldn't be processed.
Please fix the problems for the upload to happen.
Greetings,
Your Debian queue daemon
--
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject o
On Mar 22, Vytautas Germanavicius <[EMAIL PROTECTED]> wrote:
> Debian users still cannot use firewire devices: I plugged in digital
This is obviously not a big enough problem, or the kernel or libraw1394
maintainers would have fixed it by now.
--
ciao,
Marco
signature.asc
Description: Digita
On Tue, 22 Mar 2005 08:12:37 -0800, Steven Ihde wrote:
> Andres Salomon wrote:
>> time, that was just legacy. Second, prune-non-free was replaced w/ a more
>> generic ruby script (available in SVN, in trunk/scripts). This was used
>> to generate two .orig.tar.gzs: one for kernel-source-2.6.11, a
On Tue, 22 Mar 2005 15:47:51 -0500, Kyle McMartin wrote:
> [d-k copied about ABI[0] change]
>
> The current crop of 2.6.8 kernel images in unstable and testing are
> quite good, but a new upload is required to fix some security bugs
> and some hppa-related bugs.
>
> This is basically a call for
On Tue, Mar 22, 2005 at 03:50:15PM -0500, Joey Hess muttered these words:
> Eric Evans wrote:
> >
> > I have successfully installed Sarge on an identical machine, (Dell 2850,
> > Perc 4e/Di RAID adapter), using todays daily build[1].
> >
> > The megaraid2 module is loaded by both the installer, a
On Tue, Mar 22, 2005 at 03:47:51PM -0500, Kyle McMartin wrote:
> This is basically a call for suggestions for what I should backmerge
> to 2.6.8 from recent CVS. I will go through the parisc-linux-cvs archive
> again and try to pull what I can see, but I'd like a bit of help.
In case it wasn't alr
Eric Evans wrote:
>
> I have successfully installed Sarge on an identical machine, (Dell 2850,
> Perc 4e/Di RAID adapter), using todays daily build[1].
>
> The megaraid2 module is loaded by both the installer, and the installed
> kernel.
>
> http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=30076
[d-k copied about ABI[0] change]
The current crop of 2.6.8 kernel images in unstable and testing are
quite good, but a new upload is required to fix some security bugs
and some hppa-related bugs.
This is basically a call for suggestions for what I should backmerge
to 2.6.8 from recent CVS. I will
I assume you mean modprobe (instead of modinfo)?
--
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]
Accepted:
kernel-doc-2.6.8_2.6.8-15_all.deb
to pool/main/k/kernel-source-2.6.8/kernel-doc-2.6.8_2.6.8-15_all.deb
kernel-patch-debian-2.6.8_2.6.8-15_all.deb
to pool/main/k/kernel-source-2.6.8/kernel-patch-debian-2.6.8_2.6.8-15_all.deb
kernel-source-2.6.8_2.6.8-15.diff.gz
to pool/main/k/kernel
Your message dated Tue, 22 Mar 2005 11:18:11 -0500
with message-id <[EMAIL PROTECTED]>
and subject line Bug#280743: fixed in kernel-source-2.6.8 2.6.8-15
has caused the attached Bug report to be marked as done.
This means that you claim that the problem has been dealt with.
If this is not the case
Your message dated Tue, 22 Mar 2005 11:18:11 -0500
with message-id <[EMAIL PROTECTED]>
and subject line Bug#297203: fixed in kernel-source-2.6.8 2.6.8-15
has caused the attached Bug report to be marked as done.
This means that you claim that the problem has been dealt with.
If this is not the case
kernel-source-2.6.8_2.6.8-15_i386.changes uploaded successfully to localhost
along with the files:
kernel-source-2.6.8_2.6.8-15.dsc
kernel-source-2.6.8_2.6.8-15.diff.gz
kernel-patch-debian-2.6.8_2.6.8-15_all.deb
kernel-source-2.6.8_2.6.8-15_all.deb
kernel-tree-2.6.8_2.6.8-15_all.deb
ker
Andres Salomon wrote:
> time, that was just legacy. Second, prune-non-free was replaced w/ a more
> generic ruby script (available in SVN, in trunk/scripts). This was used
> to generate two .orig.tar.gzs: one for kernel-source-2.6.11, and another
Hi,
I'm not able to compile 2.6.11-1 on i386. I
Hi,
I would like to advise that kernel-source-2.4.27 is
vulnerable to CAN-2005-0449 and that the fix requires
an ABI change. This is the same situation as kernel-source-2.6.8,
and the patch is almost identical.
CAN-2005-0449 is a remotely exploitable bug that allows
carefully crafted packets to c
On Tue, Mar 22, 2005 at 09:06:19AM -0300, Humberto Massa wrote:
> And I believe that the Vancouver proposal, if implemented as intended up
> to now, will not only affect what Debian really *is*, but in some ways
> will *destroy* what Debian is.
Debian has already decided to destroy what it is by g
J. Grant wrote:
Hi Massa,
Thank you for your response.
Welcome. It seems to me that this is really a config mistake on your
part. You have put the
root=/dev/sda3 hda=ide-scsi
in the wrong place (you said it yourself that the hda=ide-scsi was an
addition by you).
The right place to put it is
Sven Luther wrote:
>Still i believe i have made some constructive proposals, and even if my
>first posts may have been a bit too aggressive, for which i apologize,
>or too many, i think it is also a prove of the passion which lies on
>this issue. Something which has the potential to affect many of
Your message dated Tue, 22 Mar 2005 15:33:02 +0900
with message-id <[EMAIL PROTECTED]>
and subject line Bug#295948: kernel-source-2.6.9: [CAN-2005-0449]
skb_checksum_help DoS
has caused the attached Bug report to be marked as done.
This means that you claim that the problem has been dealt with.
I
Your message dated Tue, 22 Mar 2005 19:54:48 +0900
with message-id <[EMAIL PROTECTED]>
and subject line Bug#295947: kernel-source-2.6.10: [CAN-2005-0449]
skb_checksum_help DoS
has caused the attached Bug report to be marked as done.
This means that you claim that the problem has been dealt with.
On Fri, Feb 18, 2005 at 12:17:47PM +0100, Djoume SALVETTI wrote:
> Package: kernel-source-2.6.8
> Severity: normal
>
>
> Good day,
>
> >From CAN-2005-0449 :
>
> | The netfilter/iptables module in Linux before 2.6.8.1 allows remote
> | attackers to cause a denial of service (kernel crash) or byp
On Sat, Mar 19, 2005 at 05:16:06PM +, J. Grant wrote:
>
> http://packages.debian.org/testing/base/kernel-image-2.4.27-2-k7 does
> not mention this is a 32bit only kernel, and also that AthlonXP are
> supported.
>
> The brief description on http://packages.debian.org/testing/base/
>
> is j
The changelog entry for CAN-2005-0449 (in kernel-source-2.6.8) reads:
* ipv4-fragment-queues-1.dpatch, ipv4-fragment-queues-2.dpatch,
ipv4-fragment-queues-3.dpatch, ipv4-fragment-queues-4.dpatch:
fix potential information leak by making fragment queues private.
CAN-2005-0449 (Joshua
Petter Reinholdtsen <[EMAIL PROTECTED]> wrote:
> [Sven Luther]
>> No, he is not, as far as i am concerned, unless he presents his
>> apologies first.
>
> For what? Commenting on your wast amount of email posted the last few
> days, and his suggestion that the amount of email could make the
> ftpm
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Upon further experimentation, I discovered taht I was in fact
apparently mistake with regard to unstable. 2.6.10-1-686-smp boots
with no problems, without requiring and ACPI/noapic nonsense. Still
don't have the requisite logs for the 2.6.8 boot up -
36 matches
Mail list logo