Bug#550379: acknowledged by developer (closing 550379)

2009-10-18 Thread Michael S Gilbert
reopen 550379 severity 550379 wishlist thanks On Sun, 18 Oct 2009 23:50:04 +0100 Ben Hutchings wrote: > On Sun, 2009-10-18 at 18:18 -0400, Michael S Gilbert wrote: > [...] > > in one sentence, my request is for the linux-2.6 and linux-kbuild-2.6 > > *source* packages to be mer

Bug#550379: acknowledged by developer (closing 550379)

2009-10-18 Thread Michael S Gilbert
maybe there is also some confusion due to my use of the term "kbuild binary packages". i am referring to the linux-kbuild-$(uname -r) binary packages when i say that, not the plain old kbuild binary/source package. mike -- To UNSUBSCRIBE, email to debian-kernel-requ...@lists.debian.org with a

Bug#550379: acknowledged by developer (closing 550379)

2009-10-18 Thread Michael S Gilbert
On Sun, 18 Oct 2009 21:56:57 +0200 maximilian attems wrote: > On Sun, Oct 18, 2009 at 03:40:02PM -0400, Michael S Gilbert wrote: > > > # explanation given by maintainer > > > close 550379 > > > > there is no explanation in the bug logs. the close

Bug#550379: acknowledged by developer (closing 550379)

2009-10-18 Thread Michael S Gilbert
> # explanation given by maintainer > close 550379 there is no explanation in the bug logs. the closest thing to an explanation is: This is not possible for other reasons. where the 'other reasons' are never explained. if someone can state these reasons, i would be content to give this up i

Re: [Pkg-fglrx-devel] Auto-building out-of-tree kernel modules

2009-10-17 Thread Michael S Gilbert
On Sat, 17 Oct 2009 19:47:09 +0200 Patrick Matthäi wrote: > -BEGIN PGP SIGNED MESSAGE- > Hash: SHA1 > > Ben Hutchings schrieb: > >> Wasting time and bandwidth (fetching linux-headers etc)? Great... > > > > Building obscure modules for every kernel flavour on Debian's own > > auto-builders

Bug#550379: closed by Bastian Blank (Re: Bug#550379: linux-kbulid-2.6: embeds linux-2.6)

2009-10-09 Thread Michael S Gilbert
On Sat, 10 Oct 2009 03:03:06 +0200 Bastian Blank wrote: > On Fri, Oct 09, 2009 at 05:49:13PM -0400, Michael Gilbert wrote: > > > On Fri, Oct 09, 2009 at 02:04:20PM -0400, Michael Gilbert wrote: > > >> the linux-kbuild-2.6 source package includes portions of code from the > > >> linux-2.6 source pa

Re: rootkit not found by rkhunter

2009-10-04 Thread Michael S Gilbert
On Sun, 4 Oct 2009 12:10:04 -0400 Thomas Krichel wrote: > Michael S Gilbert writes > > > 'apt-get update && apt-get upgrade' followed by a reboot into the new > > kernel should bring you up to date. > > Since I just download the kernel last week I

Bug#529318: linux-2.6: CVE-2007-6514 smbfs information disclosure vulnerability

2009-08-13 Thread Michael S. Gilbert
On Thu, 13 Aug 2009 23:51:40 +0200 Moritz Muehlenhoff wrote: > On Mon, May 18, 2009 at 12:06:58PM -0400, Michael S. Gilbert wrote: > > Package: linux-2.6 > > Severity: important > > Tags: security > > > > Hi, > > > > The following CVE (Common Vuln

Bug#537409: info

2009-07-19 Thread Michael S Gilbert
while this bug is still open, would it make sense to disable the gcc option/optimization/bug/flaw that allows this vulnerability to exist? the "-fno-delete-null-pointer-checks" flag will completely disable this option kernel-wide [1]. obviously there is a tradeoff here. the null pointer optimizat

Bug#532376: this is CVE-2009-1389

2009-06-10 Thread Michael S. Gilbert
this is CVE-2009-1389. patches available[1]. [1] http://git.kernel.org/linus/fdd7b4c3302c93f6833e338903ea77245eb510b4 -- To UNSUBSCRIBE, email to debian-kernel-requ...@lists.debian.org with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org

Bug#532722: linux-2.6: CVE-2009-1914 local dos in /proc/iomem on sparc

2009-06-10 Thread Michael S Gilbert
Package: linux-2.6 Version: FILLINAFFECTEDVERSION Severity: important Tags: security , patch Hi, the following CVE (Common Vulnerabilities & Exposures) id was published for linux-2.6. CVE-2009-1914[0]: | The pci_register_iommu_region function in | arch/sparc/kernel/pci_common.c in the Linux kerne

Bug#532721: linux-2.6: CVE-2009-1385 dos in e1000 driver

2009-06-10 Thread Michael S Gilbert
Package: linux-2.6 Severity: important Version: 2.6.18.dfsg.1-24 (and newer) Tags: security , patch Hi, the following CVE (Common Vulnerabilities & Exposures) id was published for linux-2.6. CVE-2009-1385[0]: | Integer underflow in the e1000_clean_rx_irq function in | drivers/net/e1000/e1000_main

Bug#529342: linux-2.6: ipv6 potential denial-of-service

2009-05-18 Thread Michael S. Gilbert
Package: linux-2.6 Version: 2.6.26 Severity: important Tags: security patch Hi, The following CVE (Common Vulnerabilities & Exposures) id was published for linux-2.6. CVE-2009-1360[0]: | The __inet6_check_established function in net/ipv6/inet6_hashtables.c | in the Linux kernel before 2.6.29, wh

Bug#529326: linux-2.6: CVE-2009-0787 information disclosure in ecryptfs

2009-05-18 Thread Michael S. Gilbert
On Mon, 18 May 2009 11:52:04 -0600, dann frazier wrote: > On Mon, May 18, 2009 at 01:28:56PM -0400, Michael S. Gilbert wrote: > > Package: linux-2.6 > > Version: 2.6.26-15lenny2 > > Severity: important > > Tags: security > > > > Hi, > > > > Th

Bug#529326: patches

2009-05-18 Thread Michael S. Gilbert
tag 529326 patch thank you note that this affects the lenny and squeeze versions of the kernel (2.6.26). even though the kernel changelog says that this problem only affects 2.6.28, it actually affects any version before 2.6.28.9 that has ecryptfs. patches are available here: http://git.kernel.o

Bug#529326: linux-2.6: CVE-2009-0787 information disclosure in ecryptfs

2009-05-18 Thread Michael S. Gilbert
Package: linux-2.6 Version: 2.6.26-15lenny2 Severity: important Tags: security Hi, The following CVE (Common Vulnerabilities & Exposures) id was published for linux-2.6. CVE-2009-0787[0]: | The ecryptfs_write_metadata_to_contents function in the eCryptfs | functionality in the Linux kernel 2.6.2

Bug#529318: linux-2.6: CVE-2007-6514 smbfs information disclosure vulnerability

2009-05-18 Thread Michael S. Gilbert
Package: linux-2.6 Severity: important Tags: security Hi, The following CVE (Common Vulnerabilities & Exposures) id was published for linux-2.6. CVE-2007-6514[0]: | Apache HTTP Server, when running on Linux with a document root on a | Windows share mounted using smbfs, allows remote attackers to

Bug#524373: linux-2.6: /dev/mem rootkit vulnerability

2009-04-19 Thread Michael S. Gilbert
On Thu, 16 Apr 2009 23:50:54 -0600 dann frazier wrote: > > > The support for dynamically loadable kernel modules in Linux can be > > > abuses similarly. Does that make it a "grave security issue"? > > > > probably...at least until someone comes up with a secure way to do it. > > Oh, come on. >

Bug#524373: linux-2.6: /dev/mem rootkit vulnerability

2009-04-16 Thread Michael S. Gilbert
btw, redhat-based distros are thought to be invulnerable to these attacks due their incorporation of execshield (in particular, due to address space randomization). perhaps it's high time that debian consider doing the same? i know that execshield is not in the vanilla kernel, but when it comes to

Bug#524373: linux-2.6: /dev/mem rootkit vulnerability

2009-04-16 Thread Michael S. Gilbert
reopen 524373 thanks On Thu, 16 Apr 2009 16:53:38 -0400 Noah Meyerhans wrote: > On Thu, Apr 16, 2009 at 04:21:10PM -0400, Michael S. Gilbert wrote: > > > > i think that any flaw that allows an attacker to elevate his pwnage from > > root to hidden should always be consid

Bug#524373: linux-2.6: /dev/mem rootkit vulnerability

2009-04-16 Thread Michael S. Gilbert
On Thu, 16 Apr 2009 12:43:07 -0400, Noah Meyerhans wrote: > On Thu, Apr 16, 2009 at 11:55:05AM -0400, Michael S. Gilbert wrote: > > as seen in recent articles and discussions, the linux kernel is > > currently vulnerable to rootkit attacks via the /dev/mem device. one > >

Bug#524373: linux-2.6: /dev/mem rootkit vulnerability

2009-04-16 Thread Michael S. Gilbert
package: linux-2.6 severity: grave tags: security as seen in recent articles and discussions, the linux kernel is currently vulnerable to rootkit attacks via the /dev/mem device. one article [1] mentions that there is an existing patch for the problem, but does not link to it. perhaps this fix c

Bug#521482: linux-2.6: adopt hardening patches (execshield and grsecurity) into default kernel packages for squeeze

2009-03-27 Thread Michael S. Gilbert
package: linux-2.6 severity: wishlist tags: security there are now several security hardening kernel patches available in the debian archive (e.g. execshield and grsecurity). it would be great if these patches were incorporated into the default kernel packages. this would go a long way toward

Bug#447549: closed by Bastian Blank (Bug#447549: fixed in linux-2.6 2.6.29-1)

2009-03-24 Thread Michael S. Gilbert
Thanks to the debian and upstream kernel teams for fixing this longstanding bug! It's good to know that the process sometimes may take quite a bit of time, but it does work! Regards, Mike On Tue, 24 Mar 2009 21:12:05 +, Debian Bug Tracking System wrote: > > This is an automatic notification

Bug#447549: patch available

2009-01-19 Thread Michael S. Gilbert
tag 447549 patch thank you one of the upstream developers created a patch for this problem [1]. i assume that since this is so straightforward it will likely be applied to the vanilla kernel without too much hesitation (maybe in the 2.6.30 timeframe). i will watch the upstream list for a comm