On Monday 25 September 2006 15:48, Martin Schulze wrote: > -----BEGIN PGP SIGNED MESSAGE----- > Hash: SHA1 > > - > -------------------------------------------------------------------------- > Debian Security Advisory DSA 1184-1 [EMAIL PROTECTED] > http://www.debian.org/security/ Dann Frazier > September 25th, 2006 http://www.debian.org/security/faq > - > -------------------------------------------------------------------------- > > Package : kernel-source-2.6.8 > Vulnerability : several > Problem type : remote > Debian-specific: no > CVE IDs : CVE-2004-2660 CVE-2005-4798 CVE-2006-1052 CVE-2006-1343 > CVE-2006-1528 CVE-2006-1855 CVE-2006-1856 CVE-2006-2444 > CVE-2006-2446 CVE-2006-2935 CVE-2006-2936 CVE-2006-3468 > CVE-2006-3745 CVE-2006-4093 CVE-2006-4145 CVE-2006-4535 > CERT advisory : VU#681569 > BugTraq IDs : 17203 17830 18081 18099 18101 18105 18847 19033 19396 > 19562 19615 19666 20087 > > Several security related problems have been discovered in the Linux > kernel which may lead to a denial of service or even the execution of > arbitrary code. The Common Vulnerabilities and Exposures project > identifies the following problems: > snip > CVE-2006-4145 > > A bug in the Universal Disk Format (UDF) filesystem driver could > be exploited by a local user to cause a denial of service. > > The following matrix explains which kernel version for which > architecture fixes the problem mentioned above: > > stable (sarge) > Source 2.6.8-16sarge5 > Alpha architecture 2.6.8-16sarge5 > AMD64 architecture 2.6.8-16sarge5 > HP Precision architecture 2.6.8-6sarge5 > Intel IA-32 architecture 2.6.8-16sarge5 > Intel IA-64 architecture 2.6.8-14sarge5 > Motorola 680x0 architecture 2.6.8-4sarge5 > PowerPC architecture 2.6.8-12sarge5 > IBM S/390 2.6.8-5sarge5 > Sun Sparc architecture 2.6.8-15sarge5 > FAI 1.9.1sarge4 > > Due to some internal problems kernel packages for the S/390 are > missing and will be provided later. > > For the unstable distribution (sid) these problems have been fixed in > version 2.6.18-1. > > We recommend that you upgrade your kernel package and reboot the > machine. If you have built a custom kernel from the kernel source > package, you will need to rebuild to take advantage of these fixes. > snip
Hello, beginning with kernel-image-2.6.8-3-k7_2.6.8-16sarge5, I am no longer able to write files to a DVD-RAM with udf-filesystem which are bigger than 1G. When copying files greater than the mentioned size to the DVD-RAM, I get the error message "File size exceeded". Copying smaller files works. This problem also exists after upgrading to the latest kernel-image 2.6.8-15sarge6. When reverting back to the old kernel (kernel-image-2.6.8-3-k7_2.6.8-16sarge4) or when formatting the medium with an ext2-filesystem, the problem disappears, so this problem seems to be related to the udf-filesystem. I did a Google search and found a posting with the same problem which seems to affect Debian Etch testing only: http://groups.google.com/group/linux.debian.user/browse_thread/thread/1eab67989a25fe8a/b3c075459da58131?lnk=gst&q=file+size+exceeded+1GB I did not find anything related in the Debian Bug-tracker. Am I missing a parameter or option to be able to write files greater than 1GB to an udf-filesystem after upgrading? I am using this DVD-drive: HL-DT-STDVD-RAM GSA-H20L ulimit -a: core file size (blocks, -c) 0 data seg size (kbytes, -d) unlimited file size (blocks, -f) unlimited max locked memory (kbytes, -l) unlimited max memory size (kbytes, -m) unlimited open files (-n) 1024 pipe size (512 bytes, -p) 8 stack size (kbytes, -s) 8192 cpu time (seconds, -t) unlimited max user processes (-u) unlimited virtual memory (kbytes, -v) unlimited Please CC me as I am not subscribed to the list. Thank you for your attention. Omer Canitez -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]

