new debian kernel

2003-08-14 Thread Martynas Domarkas
Hello, using debian kernel 2.4.18-11 on some servers, after "ps ax" command at the end of input I noticed "Segmentation fault" message. "strace ps ax" gave: open("/proc/1048/environ", O_RDONLY)= 7 read(7, +++ killed by SIGSEGV +++ Is it unsuccesfull patch for http://cve.mitre.org/cgi-bin/

Re: new debian kernel

2003-08-14 Thread Herbert Xu
Martynas Domarkas <[EMAIL PROTECTED]> wrote: > Hello, using debian kernel 2.4.18-11 on some servers, after "ps ax" > command at the end of input I noticed "Segmentation fault" message. > > "strace ps ax" gave: > > open("/proc/1048/environ", O_RDONLY)= 7 > read(7, > +++ killed by SIGSEGV ++

Re: new debian kernel

2003-08-14 Thread Martynas Domarkas
Yes it is fixed in kernel-source 2.4.18-13. However, due to another issue introduced by the security fix, you should download the latest kernels from http://auric.debian.org/~herbert/. Thanks for your answer. 2.4.18-12 works without segfaults. Is something wrong in 2.4.18-12 more? Is that local

Re: new debian kernel

2003-08-13 Thread Martynas Domarkas
Yes it is fixed in kernel-source 2.4.18-13. However, due to another issue introduced by the security fix, you should download the latest kernels from http://auric.debian.org/~herbert/. Thanks for your answer. 2.4.18-12 works without segfaults. Is something wrong in 2.4.18-12 more? Is that local

Re: new debian kernel

2003-08-13 Thread Herbert Xu
Martynas Domarkas <[EMAIL PROTECTED]> wrote: > Hello, using debian kernel 2.4.18-11 on some servers, after "ps ax" > command at the end of input I noticed "Segmentation fault" message. > > "strace ps ax" gave: > > open("/proc/1048/environ", O_RDONLY)= 7 > read(7, > +++ killed by SIGSEGV ++

new debian kernel

2003-08-13 Thread Martynas Domarkas
Hello, using debian kernel 2.4.18-11 on some servers, after "ps ax" command at the end of input I noticed "Segmentation fault" message. "strace ps ax" gave: open("/proc/1048/environ", O_RDONLY)= 7 read(7, +++ killed by SIGSEGV +++ Is it unsuccesfull patch for http://cve.mitre.org/cgi-bin/