Bug#464953: follow up information

2008-02-10 Thread Duncan Robertson
Just following up reported problem with security patch has not re-occurred since rebooting (and rerunning fix), and no problem with 2 servers patched with disable-vmsplice-if-exploitable.c either. also I meant nvidia-kernel-legacy-96xx-2.6.18-5-686 not "oldstable" -- To UNSUBSCRIBE, email t

Bug#464958: too large to fit in flash on the nslu2

2008-02-10 Thread Martin Michlmayr
* Gordon Farquharson <[EMAIL PROTECTED]> [2008-02-10 16:40]: > > BTW, 1310724 seems to be 131072 * 10 + 4 rather than +1 as the comment > > claims. I wonder why I made that mistake. > > I think that you chose 1310724 in the code because it needs to be > divisible by 4 for devio to perform the end

Bug#465169: linux-image-2.6.22-3-686: NFS causing a Null Pointer Oops that locks the machine up

2008-02-10 Thread Paul Logasa Bogen II
Package: linux-image-2.6.22-3-686 Version: 2.6.22-6 Severity: normal The machine will completely freeze up and the kern.log shows the following: Feb 9 22:23:29 twang kernel: BUG: unable to handle kernel NULL pointer dereference at virtual address 006e Feb 9 22:23:29 twang kernel: printin

Bug#464953: hotfix possibly unstable?

2008-02-10 Thread Duncan Robertson
Just mentioning that the hotfix mentioned here: http://www.ping.uio.no/~mortehu/disable-vmsplice-if-exploitable.c appeared to have wedged (crashed hard, frozen) my machine, an otherwise very stable pentium 4 machine running 2.6.18-5-686 (with nvidia oldstable xorg proprietry drivers). noth

Re: Bug#464945: linux-image-2.6.18-6-686: Exploit for vmsplice work for linux-image-2.18-5-686 (CVE-2008-0009/10)

2008-02-10 Thread Bastian Blank
On Sun, Feb 10, 2008 at 02:43:23PM +0100, Bastian Blank wrote: > On Sun, Feb 10, 2008 at 01:00:33PM +0100, Bastian Blank wrote: > > On Sun, Feb 10, 2008 at 03:19:20AM +0300, Okulov Vitaliy wrote: > > > Just try explot from http://www.milw0rm.com/exploits/5092 at my > > > linux-image-2.6.18-5-686 ke

Bug#464958: too large to fit in flash on the nslu2

2008-02-10 Thread Gordon Farquharson
Hi Martin On Feb 10, 2008 2:40 PM, Martin Michlmayr <[EMAIL PROTECTED]> wrote: > BTW, 1310724 seems to be 131072 * 10 + 4 rather than +1 as the comment > claims. I wonder why I made that mistake. I think that you chose 1310724 in the code because it needs to be divisible by 4 for devio to perfo

Bug#464953: (no subject)

2008-02-10 Thread Ari Pollak
Unofficial prebuilt packages are here: http://134.2.34.20/blank/debian/linux-2.6/ as referenced here: http://lists.debian.org/debian-kernel/2008/02/msg00363.html -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]

Bug#464503: linux-image-2.6.24-1-amd64: Hangs on boot with SCSI/blkdev probing "comm: scsi_scan_0"

2008-02-10 Thread maximilian attems
On Fri, 08 Feb 2008, Guido Bozzetto wrote: > > The sistem is i386 archicture and not amd64. Please can you make a > _i386.deb ? > > Thank you, Guido Bozzetto. http://charm.itp.tuwien.ac.at/~mattems/git15/ currently building git22, let me know on aboves.

Bug#464958: too large to fit in flash on the nslu2

2008-02-10 Thread Martin Michlmayr
* Gordon Farquharson <[EMAIL PROTECTED]> [2008-02-10 14:08]: > # Let's pad the kernel to 131072 * 10 + 1 so it will be rounded up > # by slugimage to 131072 * 11, i.e. 11 blocks. > util/arm/nslu2/pad $(TEMP)/$(KERNELNAME).nslu2 1310724 BTW, 1310724 seems to be 131072 * 10 +

Processed: tagging 251023

2008-02-10 Thread Debian Bug Tracking System
Processing commands for [EMAIL PROTECTED]: > # Automatically generated email from bts, devscripts version 2.10.13 > tags 251023 - wontfix Bug#251023: [PATCH] An initrd level patch for customized DSDT Tags were: pending wontfix patch Tags removed: wontfix > End of message, stopping processing here

Bug#464958: too large to fit in flash on the nslu2

2008-02-10 Thread Gordon Farquharson
Hi Martin On Feb 10, 2008 1:01 PM, Martin Michlmayr <[EMAIL PROTECTED]> wrote: > * Joey Hess <[EMAIL PROTECTED]> [2008-02-10 14:55]: > > mtd3: 0016 0002 "Kernel" > > OK, closing bug. User error: not using a standard MTD partition > layout. It looks like we need to update installer/build/

Bug#464958: too large to fit in flash on the nslu2

2008-02-10 Thread Joey Hess
Martin Michlmayr wrote: > * Joey Hess <[EMAIL PROTECTED]> [2008-02-10 14:15]: > > Think I should try to flash the new kernel via upslug? > > Or flash a d-i image and then mount the disk and write the kernel to > flash. Ok, I have a fixed partition size now, and of course it fits. mtd3: 0016

Bug#464958: marked as done (too large to fit in flash on the nslu2)

2008-02-10 Thread Debian Bug Tracking System
Your message dated Sun, 10 Feb 2008 21:01:46 +0100 with message-id <[EMAIL PROTECTED]> and subject line Bug#464958: too large to fit in flash on the nslu2 has caused the attached Bug report to be marked as done. This means that you claim that the problem has been dealt with. If this is not the cas

Bug#464953: Hotfix

2008-02-10 Thread Morten Hustveit
Hi, a modification of the exploit that finds the address of sys_vmsplice in the kernel (using /proc/kallsyms) and replaces the first byte with a RET instruction (using mmap of /dev/kmem) is available at http://www.ping.uio.no/~mortehu/disable-vmsplice-if-exploitable.c -- Morten Hustveit --

Bug#464958: too large to fit in flash on the nslu2

2008-02-10 Thread Martin Michlmayr
* Joey Hess <[EMAIL PROTECTED]> [2008-02-10 14:15]: > Think I should try to flash the new kernel via upslug? Or flash a d-i image and then mount the disk and write the kernel to flash. -- Martin Michlmayr http://www.cyrius.com/ -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "

Processed: tagging 251023

2008-02-10 Thread Debian Bug Tracking System
Processing commands for [EMAIL PROTECTED]: > # Automatically generated email from bts, devscripts version 2.9.26 > tags 251023 + pending Bug#251023: [PATCH] An initrd level patch for customized DSDT Tags were: wontfix patch Tags added: pending > End of message, stopping processing here. Please c

Processed: found in etch

2008-02-10 Thread Debian Bug Tracking System
Processing commands for [EMAIL PROTECTED]: > found 464953 2.6.18.dfsg.1-17etch1 Bug#464953: linux-2.6: mmap() local root exploit Bug#464945: linux-image-2.6.18-6-686: Exploit for vmsplice work for linux-image-2.18-5-686 (CVE-2008-0009/10) Bug marked as found in version 2.6.18.dfsg.1-17etch1. > t

Bug#464962: immediate crash on boot on TM5800

2008-02-10 Thread Joey Hess
maximilian attems wrote: > i haven't yet compiled latest git21 (will do later today), in the > menatime i have i386 snapshots of git15, can you try there the -686 > http://charm.itp.tuwien.ac.at/~mattems/git15/ > if upstream fixed this bug inbetween? Nope, still fails. -- see shy jo signature.

Bug#464958: too large to fit in flash on the nslu2

2008-02-10 Thread Joey Hess
Martin Michlmayr wrote: > * Joey Hess <[EMAIL PROTECTED]> [2008-02-09 21:14]: > > -rw-r--r-- 1 root root 1337692 Feb 7 14:04 vmlinuz-2.6.24-1-ixp4xx > > > > The "Kernel" mtd block device on the nslu2 is 1310720 bytes. > > Are you sure about this? I'm pretty sure the official Debian images > us

Bug#464958: too large to fit in flash on the nslu2

2008-02-10 Thread Martin Michlmayr
* Joey Hess <[EMAIL PROTECTED]> [2008-02-09 21:14]: > -rw-r--r-- 1 root root 1337692 Feb 7 14:04 vmlinuz-2.6.24-1-ixp4xx > > The "Kernel" mtd block device on the nslu2 is 1310720 bytes. Are you sure about this? I'm pretty sure the official Debian images use 1441792 bytes for the Kernel partiti

Bug#464032: force k7 users to start using 686

2008-02-10 Thread Michelle Konzack
Am 2008-02-05 04:10:33, schrieb [EMAIL PROTECTED]: > Package: linux-image-k7 > > Apparently -k7 users should now start using -686 packages. > However, without adjustments in the Depends, the effect will be -k7 > users will start wondering after a few months why the haven't seen a > new kernel duri

Re: [Pkg-cryptsetup-devel] Bug#464673: cryptsetup seems to try to load some padlock modules

2008-02-10 Thread David Härdeman
On Sun, Feb 10, 2008 at 01:58:34AM +0100, Jonas Meurer wrote: On 08/02/2008 Joachim Breitner wrote: I’m not sure about his. I am pretty sure the error messages came _after_ I entered the password the first time, but _before_ cryptsetup exits, which I noticed when I entered the password wrong the

Bug#465070: redhat-cluster: [INTL:it] Italian debconf templates translation

2008-02-10 Thread Luca Monducci
Package: redhat-cluster Severity: wishlist Tags: patch l10n Please add the italian debconf templates translation (attached). Thanks, Luca it.po Description: Binary data

Re: Bug#464945: linux-image-2.6.18-6-686: Exploit for vmsplice work for linux-image-2.18-5-686 (CVE-2008-0009/10)

2008-02-10 Thread Bastian Blank
On Sun, Feb 10, 2008 at 01:00:33PM +0100, Bastian Blank wrote: > On Sun, Feb 10, 2008 at 03:19:20AM +0300, Okulov Vitaliy wrote: > > Just try explot from http://www.milw0rm.com/exploits/5092 at my > > linux-image-2.6.18-5-686 kernel. And it works. Please backport patch > > from 2.6.24.1 kernel (CVE

Re: [kernel] r10458 - in dists/sid/linux-2.6/debian: . patches/features/all patches/series

2008-02-10 Thread Florian Lohoff
lure: debian/rules build gave error exit status 2 ** Build finished at 20080210-0520 FAILED [dpkg-buildpackage died] Flo -- Florian Lohoff [EMAIL PROTECTED] +49-171-2280134 Those who would give up a little freedom to get a little sec

Processed (with 5 errors): Re: Bug#464945: linux-image-2.6.18-6-686: Exploit for vmsplice work for linux-image-2.18-5-686 (CVE-2008-0009/10)

2008-02-10 Thread Debian Bug Tracking System
Processing commands for [EMAIL PROTECTED]: > tags 464945 patch Bug#464945: linux-image-2.6.18-6-686: Exploit for vmsplice work for linux-image-2.18-5-686 (CVE-2008-0009/10) Tags were: security Bug#464953: linux-2.6: mmap() local root exploit Tags added: patch > On Sun, Feb 10, 2008 at 03:19:20AM

Bug#464945: linux-image-2.6.18-6-686: Exploit for vmsplice work for linux-image-2.18-5-686 (CVE-2008-0009/10)

2008-02-10 Thread Bastian Blank
tags 464945 patch On Sun, Feb 10, 2008 at 03:19:20AM +0300, Okulov Vitaliy wrote: > Just try explot from http://www.milw0rm.com/exploits/5092 at my > linux-image-2.6.18-5-686 kernel. And it works. Please backport patch > from 2.6.24.1 kernel (CVE-2008-0009/10). Preliminary patch, it includes more

Bug#464962: immediate crash on boot on TM5800

2008-02-10 Thread maximilian attems
On Sat, 09 Feb 2008, Joey Hess wrote: > As soon as the kernel is booted from grub, before it prints any normal > messages, it crashes as follows: > > BUG: Int 6: CR2 > EDI ESI 1000 EBP 0020 ESP c0373f54 > EBX c03e5140 EDX 000C ECX EAX c03

Bug#464945: linux-image-2.6.18-6-686: Exploit for vmsplice work for linux-image-2.18-5-686 (CVE-2008-0009/10)

2008-02-10 Thread Vitaliy Okulov
Oh, just reread http://marc.info/?l=linux-kernel&m=120262352612128&w=2 Thereis no bugfix. Whait for Jens Axboe to fix this patch. 2008/2/10, Vitaliy Okulov <[EMAIL PROTECTED]>: > > Hm, maybe, but i read http://www.securityfocus.com/bid/27705/solution > > "The vendor released version 2.6.24.1 to

Bug#465022: marked as done (linux-image-2.6.24-1-xen-686: Does not work)

2008-02-10 Thread Debian Bug Tracking System
Your message dated Sun, 10 Feb 2008 11:01:14 +0100 with message-id <[EMAIL PROTECTED]> and subject line Bug#465022: linux-image-2.6.24-1-xen-686: Does not work has caused the attached Bug report to be marked as done. This means that you claim that the problem has been dealt with. If this is not th

Bug#464945: linux-image-2.6.18-6-686: Exploit for vmsplice work for linux-image-2.18-5-686 (CVE-2008-0009/10)

2008-02-10 Thread Vitaliy Okulov
Hm, maybe, but i read http://www.securityfocus.com/bid/27705/solution "The vendor released version 2.6.24.1 to address these issues. Please see the references for more information." And then read http://kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.24.1where i found only 1 bugfix for vmsplice.

Bug#464945: linux-image-2.6.18-6-686: Exploit for vmsplice work for linux-image-2.18-5-686 (CVE-2008-0009/10)

2008-02-10 Thread Florian Weimer
* Vitaliy Okulov: > Oh, just reread http://marc.info/?l=linux-kernel&m=120262352612128&w=2 > > Thereis no bugfix. Yes, it appears to be a different bug. -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]

Bug#464945: linux-image-2.6.18-6-686: Exploit for vmsplice work for linux-image-2.18-5-686 (CVE-2008-0009/10)

2008-02-10 Thread Vitaliy Okulov
Yep, im sure. Copy of exploit: http://www.securityfocus.com/bid/27704/exploit [EMAIL PROTECTED]:~/coding/sample$ wget http://downloads.securityfocus.com/vulnerabilities/exploits/27704.c --12:25:09-- http://downloads.securityfocus.com/vulnerabilities/exploits/27704.c => `27704.c' Resolving downl

Re: [kernel] r10458 - in dists/sid/linux-2.6/debian: . patches/features/all patches/series

2008-02-10 Thread Bastian Blank
On Sat, Feb 09, 2008 at 10:30:01AM +, Daniel Baumann wrote: > Added patch from unionfs upstream to export release_open_intent symbol. And Linux upstream said what about this? It changes the ABI of vmlinux, so nack. Bastian -- Conquest is easy. Control is not. -- Kirk, "Mirro

Bug#464945: linux-image-2.6.18-6-686: Exploit for vmsplice work for linux-image-2.18-5-686 (CVE-2008-0009/10)

2008-02-10 Thread Florian Weimer
* Vitaliy Okulov: > Yep, im sure. Ah, okay, but I think this is not CVE-2008-0009 or CVE-2008-0010. -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]

Bug#464945: linux-image-2.6.18-6-686: Exploit for vmsplice work for linux-image-2.18-5-686 (CVE-2008-0009/10)

2008-02-10 Thread Stefan Fritsch
I also checked that linux-image-2.6.18-5-k7 2.6.18.dfsg.1-17 is vulnerable. signature.asc Description: This is a digitally signed message part.

Bug#464945: linux-image-2.6.18-6-686: Exploit for vmsplice work for linux-image-2.18-5-686 (CVE-2008-0009/10)

2008-02-10 Thread Florian Weimer
* Okulov Vitaliy: > Just try explot from http://www.milw0rm.com/exploits/5092 at my > linux-image-2.6.18-5-686 kernel. And it works. Please backport patch > from 2.6.24.1 kernel (CVE-2008-0009/10). Milw0rm is down. Are you sure the exploit is real? The vulnerable code is not present in the 2.6.

Bug#464945: linux-image-2.6.18-6-686: Exploit for vmsplice work for linux-image-2.18-5-686 (CVE-2008-0009/10)

2008-02-10 Thread Stefan Fritsch
> Just try explot from http://www.milw0rm.com/exploits/5092 at my > linux-image-2.6.18-5-686 kernel. And it works. Please backport patch > from 2.6.24.1 kernel (CVE-2008-0009/10). 2.6.24.1 does not fix the issue, see http://marc.info/?l=linux-kernel&m=120262352612128&w=2 I have also verified tha

Bug#465022: linux-image-2.6.24-1-xen-686: Does not work

2008-02-10 Thread William Pitcock
Package: linux-image-2.6.24-1-xen-686 Version: 2.6.24-3 Severity: important It'd be nice if this actually worked as the only other alternative is 2.6.18 from Etch. Instead what it does is start then sit there using 100% CPU. It doesn't even print debugging messages. This happens on Xen 3.2. -- S