Hi Martin,
Steve Langasek asked me to get in contact with you in regards
to kernel security updates for sarge. I am happy to report
that I and other members of the kernel team have been keeping
the kernel-source for both 2.4.27 and 2.6.8 up to date in SVN.
And as of yesterday afternoon I have no o
Package: kernel-source-2.6.8
Severity: grave
Tags: security patch
Justification: user security hole
http://kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.11.9
The relevent changes for this CAN appear to be solely in
./fs/binfmt_elf.c.
There is also a memset in ./drivers/char/drm/drm_ioctl.c whic
On Wed, 11 May 2005 10:21:53 -0400, Andres Salomon <[EMAIL PROTECTED]> said:
> I'd love to see the code you have so far. My plan was/is to use
> cdbs2 for the common kernel image stuff (code is available here:
> http://svn.debian.org/wsvn/build-common/trunk/?rev=0&sc=0). The
> main goals of cd
On Wed, 11 May 2005 19:40:15 +0300, Samuli Suominen wrote:
> Package: kernel-source-2.6.8
> Severity: grave
> Justification: user security hole
>
>
> A locally exploitable flaw has been found in the Linux ELF binary format
> loader's core dump function that allows local users to gain roo
Processing commands for [EMAIL PROTECTED]:
> reassign 286536 kernel
Bug#286536: kernel-image-2.6.9-9-amd64-k8: random lockups when using bridging
Warning: Unknown package 'kernel-image-2.6.9-9-amd64-k8'
Bug reassigned from package `kernel-image-2.6.9-9-amd64-k8' to `kernel'.
> --
Stopping process
Subject: ADT7467 bad fan speed: confirmed on iBook G4
Followup-For: Bug #296955
Package: kernel-image-2.6.10-powerpc
The fan speed is still different from 2.6.9 on 2.6.11. It does at least
not affect me negatively, so this might be intended.
This still looks strange to me:
adt746x: Lowering max t
Subject: Useless modules loaded: confirmed on iBook G4
Followup-For: Bug #305212
Package: kernel-image-2.6.11-powerpc
Version: 2.6.11-1
I get the same problem on an iBook G4. The modules are loaded and some
other program, it's not the kernel, wants to unload those on boot, but
this fails.
Strange
Processing commands for [EMAIL PROTECTED]:
> tags 308634 security
Bug#308634: kernel-source-2.6.8: A locally exploitable flaw to gain root.
There were no tags set.
Tags added: security
> thanks, control, and have a nice day
Stopping processing here.
Please contact me if you need assistance.
Deb
Package: kernel-build-2.6.8-powerpc
Version: 2.6.8-12
Severity: grave
Hello,
I tried to understand your packaging scheme and IMO you do it _wrong_.
a) kernel-build-KVERS on other architectures is a package with common
files. Your packages seem to play the role of kernel-headers-KVERS
packg
Package: kernel-source-2.6.8
Severity: grave
Justification: user security hole
A locally exploitable flaw has been found in the Linux ELF binary format
loader's core dump function that allows local users to gain root
privileges and also execute arbitrary code at kernel privilege level.
V
On Sat, 07 May 2005 19:55:39 -0300, Felipe Augusto van de Wiel (faw)
wrote:
[...]
>
> And another idea, dilinger could upload the packages
> to people.d.o, it can avoid the problem of uncertain about
> his Debian membership.
>
Yes, I should probably do that. As I'm in the process of movi
On Tue, 10 May 2005 23:59:31 -0500, Manoj Srivastava wrote:
[...]
>
> Tentatively, my plans are like this:
> a) Break up the /usr/share/kernel-package/rules file into smaller
> blocks, and move them into separate, modules like:
> /usr/share/kernel-package/include/BLAH.mk
>
>
Package: kernel-kbuild-2.6-3
Version: 2.6.8-2
Severity: important
Extra modules can't be built for an x86_64 kernels as the modpost linked
from the kernel-headers-2.6.8-11-em64t-p4-smp/scripts/mod directory is
looking for 32 bits ELF headers.
You can test this by using modpost on any x86_64 kerne
tags 304548 +pending
thanks
The fix for CAN-2005-1041 is in SVN for 2.6.8.
It was included in kernel-source-2.6.11 2.6.11-1
as part of the 2.6.11.5 patchset from upstream.
It is not present in 2.4.27.
--
Horms
--
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trou
Your message dated Wed, 11 May 2005 18:39:52 +0900
with message-id <[EMAIL PROTECTED]>
and subject line kernel-source-2.4.27: strncpy does not 0-pad destination on
some archs
has caused the attached Bug report to be marked as done.
This means that you claim that the problem has been dealt with.
I
tag 307552 +pending
thanks
I have added the fix for CAN-2005-1369 to SVN for 2.6.8.
It is also present in SVN for 2.6.11. 2.4.27 does not
appear to have these drivers.
--
Horms
--
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]
reassign 307553 kernel-source-2.6.11
tag 307553 +pending
thanks
The fix for CAN-2005-1368 is in SVN for 2.6.11.
The code that this bug manifests in is not present
in 2.6.8 or 2.4.27.
--
Horms
--
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAI
Processing commands for [EMAIL PROTECTED]:
> reassign 307553 kernel-source-2.6.11
Bug#307553: CAN-2005-1368: DoS possibility through inproper SMP race handling
in key_user_lookup()
Bug reassigned from package `kernel-source-2.6.8' to `kernel-source-2.6.11'.
> tag 307553 +pending
Bug#307553: CAN-
Processing commands for [EMAIL PROTECTED]:
> tags 304548 +pending
Bug#304548: CAN-2005-1041: DoS vulnerability in fib_seq_start()
Tags were: security
Tags added: pending
> thanks
Stopping processing here.
Please contact me if you need assistance.
Debian bug tracking system administrator
(admini
Processing commands for [EMAIL PROTECTED]:
> tag 307552 +pending
Bug#307552: CAN-2005-1369: DoS through user-writable sysfs nodes in it87 and
via686a drivers
Tags were: security
Tags added: pending
> thanks
Stopping processing here.
Please contact me if you need assistance.
Debian bug tracking
Processing commands for [EMAIL PROTECTED]:
> tag 305655 +pending
Bug#305655: CAN-2004-0790: TCP connection DoS through ICMP_QUENCH messages
Tags were: patch security
Tags added: pending
> --
Stopping processing here.
Please contact me if you need assistance.
Debian bug tracking system administr
Processing commands for [EMAIL PROTECTED]:
> tag 302705 +pending
Bug#302705: CAN-2005-0749: Potential DOS in elf_load_library()
Tags were: security
Tags added: pending
> --
Stopping processing here.
Please contact me if you need assistance.
Debian bug tracking system administrator
(administrato
Package: kernel-source-2.4.27
Version: 2.4.27-10
Severity: important
Tags: patch, security, pending
I got this from Moritz Muehlenhoff <[EMAIL PROTECTED]>:
http://www.redhat.com/support/errata/RHSA-2005-284.html This is
CAN-2005-0137 : Linux kernel 2.6 on Itanium (ia64) architectures
al
> Is this a custom build of the kernel? If so
> can you provide your .config, or better still
> try using one of the kernel-images on d.o.
Hi,
kernel images from Debian distribution seems to have much higher uptime. I
really have no cue what's wrong. There are no symoops, the kernel was just
froz
24 matches
Mail list logo