Bug#465022: linux-image-2.6.24-1-xen-686: Does not work

2008-02-10 Thread William Pitcock
Package: linux-image-2.6.24-1-xen-686 Version: 2.6.24-3 Severity: important It'd be nice if this actually worked as the only other alternative is 2.6.18 from Etch. Instead what it does is start then sit there using 100% CPU. It doesn't even print debugging messages. This happens on Xen 3.2. --

Bug#464945: linux-image-2.6.18-6-686: Exploit for vmsplice work for linux-image-2.18-5-686 (CVE-2008-0009/10)

2008-02-10 Thread Stefan Fritsch
I also checked that linux-image-2.6.18-5-k7 2.6.18.dfsg.1-17 is vulnerable. signature.asc Description: This is a digitally signed message part.

Bug#464945: linux-image-2.6.18-6-686: Exploit for vmsplice work for linux-image-2.18-5-686 (CVE-2008-0009/10)

2008-02-10 Thread Stefan Fritsch
Just try explot from http://www.milw0rm.com/exploits/5092 at my linux-image-2.6.18-5-686 kernel. And it works. Please backport patch from 2.6.24.1 kernel (CVE-2008-0009/10). 2.6.24.1 does not fix the issue, see http://marc.info/?l=linux-kernelm=120262352612128w=2 I have also verified that

Bug#464945: linux-image-2.6.18-6-686: Exploit for vmsplice work for linux-image-2.18-5-686 (CVE-2008-0009/10)

2008-02-10 Thread Florian Weimer
* Vitaliy Okulov: Yep, im sure. Ah, okay, but I think this is not CVE-2008-0009 or CVE-2008-0010. -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]

Re: [kernel] r10458 - in dists/sid/linux-2.6/debian: . patches/features/all patches/series

2008-02-10 Thread Bastian Blank
On Sat, Feb 09, 2008 at 10:30:01AM +, Daniel Baumann wrote: Added patch from unionfs upstream to export release_open_intent symbol. And Linux upstream said what about this? It changes the ABI of vmlinux, so nack. Bastian -- Conquest is easy. Control is not. -- Kirk,

Bug#464945: linux-image-2.6.18-6-686: Exploit for vmsplice work for linux-image-2.18-5-686 (CVE-2008-0009/10)

2008-02-10 Thread Vitaliy Okulov
Yep, im sure. Copy of exploit: http://www.securityfocus.com/bid/27704/exploit [EMAIL PROTECTED]:~/coding/sample$ wget http://downloads.securityfocus.com/vulnerabilities/exploits/27704.c --12:25:09-- http://downloads.securityfocus.com/vulnerabilities/exploits/27704.c = `27704.c' Resolving

Bug#464945: linux-image-2.6.18-6-686: Exploit for vmsplice work for linux-image-2.18-5-686 (CVE-2008-0009/10)

2008-02-10 Thread Florian Weimer
* Vitaliy Okulov: Oh, just reread http://marc.info/?l=linux-kernelm=120262352612128w=2 Thereis no bugfix. Yes, it appears to be a different bug. -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]

Bug#464945: linux-image-2.6.18-6-686: Exploit for vmsplice work for linux-image-2.18-5-686 (CVE-2008-0009/10)

2008-02-10 Thread Vitaliy Okulov
Oh, just reread http://marc.info/?l=linux-kernelm=120262352612128w=2 Thereis no bugfix. Whait for Jens Axboe to fix this patch. 2008/2/10, Vitaliy Okulov [EMAIL PROTECTED]: Hm, maybe, but i read http://www.securityfocus.com/bid/27705/solution The vendor released version 2.6.24.1 to address

Bug#465022: marked as done (linux-image-2.6.24-1-xen-686: Does not work)

2008-02-10 Thread Debian Bug Tracking System
Your message dated Sun, 10 Feb 2008 11:01:14 +0100 with message-id [EMAIL PROTECTED] and subject line Bug#465022: linux-image-2.6.24-1-xen-686: Does not work has caused the attached Bug report to be marked as done. This means that you claim that the problem has been dealt with. If this is not the

Bug#464945: linux-image-2.6.18-6-686: Exploit for vmsplice work for linux-image-2.18-5-686 (CVE-2008-0009/10)

2008-02-10 Thread Vitaliy Okulov
Hm, maybe, but i read http://www.securityfocus.com/bid/27705/solution The vendor released version 2.6.24.1 to address these issues. Please see the references for more information. And then read http://kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.24.1where i found only 1 bugfix for vmsplice.

Bug#464962: immediate crash on boot on TM5800

2008-02-10 Thread maximilian attems
On Sat, 09 Feb 2008, Joey Hess wrote: As soon as the kernel is booted from grub, before it prints any normal messages, it crashes as follows: BUG: Int 6: CR2 EDI ESI 1000 EBP 0020 ESP c0373f54 EBX c03e5140 EDX 000C ECX EAX c034f3e0

Re: [kernel] r10458 - in dists/sid/linux-2.6/debian: . patches/features/all patches/series

2008-02-10 Thread Florian Lohoff
** Build finished at 20080210-0520 FAILED [dpkg-buildpackage died] Flo -- Florian Lohoff [EMAIL PROTECTED] +49-171-2280134 Those who would give up a little freedom to get a little security shall soon have neither - Benjamin Franklin signature.asc

Processed (with 5 errors): Re: Bug#464945: linux-image-2.6.18-6-686: Exploit for vmsplice work for linux-image-2.18-5-686 (CVE-2008-0009/10)

2008-02-10 Thread Debian Bug Tracking System
Processing commands for [EMAIL PROTECTED]: tags 464945 patch Bug#464945: linux-image-2.6.18-6-686: Exploit for vmsplice work for linux-image-2.18-5-686 (CVE-2008-0009/10) Tags were: security Bug#464953: linux-2.6: mmap() local root exploit Tags added: patch On Sun, Feb 10, 2008 at 03:19:20AM

Bug#464945: linux-image-2.6.18-6-686: Exploit for vmsplice work for linux-image-2.18-5-686 (CVE-2008-0009/10)

2008-02-10 Thread Bastian Blank
tags 464945 patch On Sun, Feb 10, 2008 at 03:19:20AM +0300, Okulov Vitaliy wrote: Just try explot from http://www.milw0rm.com/exploits/5092 at my linux-image-2.6.18-5-686 kernel. And it works. Please backport patch from 2.6.24.1 kernel (CVE-2008-0009/10). Preliminary patch, it includes more

Re: Bug#464945: linux-image-2.6.18-6-686: Exploit for vmsplice work for linux-image-2.18-5-686 (CVE-2008-0009/10)

2008-02-10 Thread Bastian Blank
On Sun, Feb 10, 2008 at 01:00:33PM +0100, Bastian Blank wrote: On Sun, Feb 10, 2008 at 03:19:20AM +0300, Okulov Vitaliy wrote: Just try explot from http://www.milw0rm.com/exploits/5092 at my linux-image-2.6.18-5-686 kernel. And it works. Please backport patch from 2.6.24.1 kernel

Bug#465070: redhat-cluster: [INTL:it] Italian debconf templates translation

2008-02-10 Thread Luca Monducci
Package: redhat-cluster Severity: wishlist Tags: patch l10n Please add the italian debconf templates translation (attached). Thanks, Luca it.po Description: Binary data

Re: [Pkg-cryptsetup-devel] Bug#464673: cryptsetup seems to try to load some padlock modules

2008-02-10 Thread David Härdeman
On Sun, Feb 10, 2008 at 01:58:34AM +0100, Jonas Meurer wrote: On 08/02/2008 Joachim Breitner wrote: I’m not sure about his. I am pretty sure the error messages came _after_ I entered the password the first time, but _before_ cryptsetup exits, which I noticed when I entered the password wrong

Bug#464032: force k7 users to start using 686

2008-02-10 Thread Michelle Konzack
Am 2008-02-05 04:10:33, schrieb [EMAIL PROTECTED]: Package: linux-image-k7 Apparently -k7 users should now start using -686 packages. However, without adjustments in the Depends, the effect will be -k7 users will start wondering after a few months why the haven't seen a new kernel during

Bug#464962: immediate crash on boot on TM5800

2008-02-10 Thread Joey Hess
maximilian attems wrote: i haven't yet compiled latest git21 (will do later today), in the menatime i have i386 snapshots of git15, can you try there the -686 http://charm.itp.tuwien.ac.at/~mattems/git15/ if upstream fixed this bug inbetween? Nope, still fails. -- see shy jo signature.asc

Bug#464958: too large to fit in flash on the nslu2

2008-02-10 Thread Joey Hess
Martin Michlmayr wrote: * Joey Hess [EMAIL PROTECTED] [2008-02-09 21:14]: -rw-r--r-- 1 root root 1337692 Feb 7 14:04 vmlinuz-2.6.24-1-ixp4xx The Kernel mtd block device on the nslu2 is 1310720 bytes. Are you sure about this? I'm pretty sure the official Debian images use 1441792

Bug#464958: too large to fit in flash on the nslu2

2008-02-10 Thread Martin Michlmayr
* Joey Hess [EMAIL PROTECTED] [2008-02-09 21:14]: -rw-r--r-- 1 root root 1337692 Feb 7 14:04 vmlinuz-2.6.24-1-ixp4xx The Kernel mtd block device on the nslu2 is 1310720 bytes. Are you sure about this? I'm pretty sure the official Debian images use 1441792 bytes for the Kernel partition.

Processed: tagging 251023

2008-02-10 Thread Debian Bug Tracking System
Processing commands for [EMAIL PROTECTED]: # Automatically generated email from bts, devscripts version 2.9.26 tags 251023 + pending Bug#251023: [PATCH] An initrd level patch for customized DSDT Tags were: wontfix patch Tags added: pending End of message, stopping processing here. Please

Bug#464958: too large to fit in flash on the nslu2

2008-02-10 Thread Martin Michlmayr
* Joey Hess [EMAIL PROTECTED] [2008-02-10 14:15]: Think I should try to flash the new kernel via upslug? Or flash a d-i image and then mount the disk and write the kernel to flash. -- Martin Michlmayr http://www.cyrius.com/ -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of

Processed: found in etch

2008-02-10 Thread Debian Bug Tracking System
Processing commands for [EMAIL PROTECTED]: found 464953 2.6.18.dfsg.1-17etch1 Bug#464953: linux-2.6: mmap() local root exploit Bug#464945: linux-image-2.6.18-6-686: Exploit for vmsplice work for linux-image-2.18-5-686 (CVE-2008-0009/10) Bug marked as found in version 2.6.18.dfsg.1-17etch1.

Bug#464953: Hotfix

2008-02-10 Thread Morten Hustveit
Hi, a modification of the exploit that finds the address of sys_vmsplice in the kernel (using /proc/kallsyms) and replaces the first byte with a RET instruction (using mmap of /dev/kmem) is available at http://www.ping.uio.no/~mortehu/disable-vmsplice-if-exploitable.c -- Morten Hustveit

Bug#464958: marked as done (too large to fit in flash on the nslu2)

2008-02-10 Thread Debian Bug Tracking System
Your message dated Sun, 10 Feb 2008 21:01:46 +0100 with message-id [EMAIL PROTECTED] and subject line Bug#464958: too large to fit in flash on the nslu2 has caused the attached Bug report to be marked as done. This means that you claim that the problem has been dealt with. If this is not the case

Bug#464958: too large to fit in flash on the nslu2

2008-02-10 Thread Joey Hess
Martin Michlmayr wrote: * Joey Hess [EMAIL PROTECTED] [2008-02-10 14:15]: Think I should try to flash the new kernel via upslug? Or flash a d-i image and then mount the disk and write the kernel to flash. Ok, I have a fixed partition size now, and of course it fits. mtd3: 0016

Bug#464958: too large to fit in flash on the nslu2

2008-02-10 Thread Gordon Farquharson
Hi Martin On Feb 10, 2008 1:01 PM, Martin Michlmayr [EMAIL PROTECTED] wrote: * Joey Hess [EMAIL PROTECTED] [2008-02-10 14:55]: mtd3: 0016 0002 Kernel OK, closing bug. User error: not using a standard MTD partition layout. It looks like we need to update

Processed: tagging 251023

2008-02-10 Thread Debian Bug Tracking System
Processing commands for [EMAIL PROTECTED]: # Automatically generated email from bts, devscripts version 2.10.13 tags 251023 - wontfix Bug#251023: [PATCH] An initrd level patch for customized DSDT Tags were: pending wontfix patch Tags removed: wontfix End of message, stopping processing here.

Bug#464953: (no subject)

2008-02-10 Thread Ari Pollak
Unofficial prebuilt packages are here: http://134.2.34.20/blank/debian/linux-2.6/ as referenced here: http://lists.debian.org/debian-kernel/2008/02/msg00363.html -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]

Bug#464958: too large to fit in flash on the nslu2

2008-02-10 Thread Martin Michlmayr
* Gordon Farquharson [EMAIL PROTECTED] [2008-02-10 14:08]: # Let's pad the kernel to 131072 * 10 + 1 so it will be rounded up # by slugimage to 131072 * 11, i.e. 11 blocks. util/arm/nslu2/pad $(TEMP)/$(KERNELNAME).nslu2 1310724 BTW, 1310724 seems to be 131072 * 10 + 4

Bug#464503: linux-image-2.6.24-1-amd64: Hangs on boot with SCSI/blkdev probing comm: scsi_scan_0

2008-02-10 Thread maximilian attems
On Fri, 08 Feb 2008, Guido Bozzetto wrote: The sistem is i386 archicture and not amd64. Please can you make a _i386.deb ? Thank you, Guido Bozzetto. http://charm.itp.tuwien.ac.at/~mattems/git15/ currently building git22, let me know on aboves.

Bug#464958: too large to fit in flash on the nslu2

2008-02-10 Thread Gordon Farquharson
Hi Martin On Feb 10, 2008 2:40 PM, Martin Michlmayr [EMAIL PROTECTED] wrote: BTW, 1310724 seems to be 131072 * 10 + 4 rather than +1 as the comment claims. I wonder why I made that mistake. I think that you chose 1310724 in the code because it needs to be divisible by 4 for devio to perform

Re: Bug#464945: linux-image-2.6.18-6-686: Exploit for vmsplice work for linux-image-2.18-5-686 (CVE-2008-0009/10)

2008-02-10 Thread Bastian Blank
On Sun, Feb 10, 2008 at 02:43:23PM +0100, Bastian Blank wrote: On Sun, Feb 10, 2008 at 01:00:33PM +0100, Bastian Blank wrote: On Sun, Feb 10, 2008 at 03:19:20AM +0300, Okulov Vitaliy wrote: Just try explot from http://www.milw0rm.com/exploits/5092 at my linux-image-2.6.18-5-686 kernel.

Bug#464953: hotfix possibly unstable?

2008-02-10 Thread Duncan Robertson
Just mentioning that the hotfix mentioned here: http://www.ping.uio.no/~mortehu/disable-vmsplice-if-exploitable.c appeared to have wedged (crashed hard, frozen) my machine, an otherwise very stable pentium 4 machine running 2.6.18-5-686 (with nvidia oldstable xorg proprietry drivers).

Bug#465169: linux-image-2.6.22-3-686: NFS causing a Null Pointer Oops that locks the machine up

2008-02-10 Thread Paul Logasa Bogen II
Package: linux-image-2.6.22-3-686 Version: 2.6.22-6 Severity: normal The machine will completely freeze up and the kern.log shows the following: Feb 9 22:23:29 twang kernel: BUG: unable to handle kernel NULL pointer dereference at virtual address 006e Feb 9 22:23:29 twang kernel:

Bug#464958: too large to fit in flash on the nslu2

2008-02-10 Thread Martin Michlmayr
* Gordon Farquharson [EMAIL PROTECTED] [2008-02-10 16:40]: BTW, 1310724 seems to be 131072 * 10 + 4 rather than +1 as the comment claims. I wonder why I made that mistake. I think that you chose 1310724 in the code because it needs to be divisible by 4 for devio to perform the endian swap