Bug#848791: lshw causes a crash if executed with root permissions

2019-11-13 Thread Yuan-Chen Cheng
can't see crash in buster with lshw version 02.18.85-0.1.

I think we can close  this bug.


signature.asc
Description: This is a digitally signed message part


Bug#848791: lshw causes a crash if executed with root permissions

2016-12-19 Thread Vulpix
The bug report for clonezilla where I went first is here: 
https://sourceforge.net/p/clonezilla/discussion/Clonezilla_live/thread/4c57bfb1/ 
but they (likely correctly) directed me towards the linux distribution. 
This is debian.


The issue occurs on all current versions and is 100% reproducible.



Bug#848791: lshw causes a crash if executed with root permissions

2016-12-19 Thread LittleVulpix
Package: lshw
Version: 02.18-0.1
Severity: important

Dear Maintainer,

Running lshw with sudo or as root will cause a strange crash - the command 
prints a long bugcheck output stating "kernel memory exposure attempt detected" 
and causes user input to become impossible for some time. Eventually, it is 
possible to input characters again but they get multiplied randomly - for 
example if you type a single O, it will become 
O.

This was working previously. I suspect this has something to do with my 
platform which is a baytrail intel atom.

The LSHW package is a part of clonezilla procedure which is where I encountered 
the bug.

-- System Information:
Debian Release: stretch/sid
  APT prefers unstable
  APT policy: (500, 'unstable')
Architecture: i386 (i686)

Kernel: Linux 4.8.0-1-686-pae (SMP w/4 CPU cores)
Locale: LANG=en_US.UTF-8, LC_CTYPE=en_US.UTF-8 (charmap=UTF-8)
Shell: /bin/sh linked to /usr/bin/dash
Init: systemd (via /run/systemd/system)

Versions of packages lshw depends on:
ii  libc6   2.24-5
ii  libgcc1 1:6.2.1-4
ii  libstdc++6  6.2.1-4

Versions of packages lshw recommends:
ii  pciutils  1:3.3.1-1.1
ii  usbutils  1:007-4

lshw suggests no packages.

-- no debconf information