Package: linux-image-3.2.0-4-amd64
Version: 3.2.41-2+deb7u2
Severity: normal
--- Please enter the report below this line. ---
The touchpad on this MacBook Air sometimes becomes unresponsive. At
these times the kernel log scrolls these messages whenever you drag your
fingers across the touchpad:
On 12/04/13 17:13, Jonathan Nieder wrote:
tags 703468 - moreinfo
quit
Geoff Crompton wrote:
I ran the 'cherry-pick' command, and redid the make deb-pkg and dpkg -i
steps. When I rebooted onto that kernel it worked fine. So it seems this
patch fixes the 3.4.4 kernel.
Beautiful. Let's take
On 11/04/13 10:54, Geoff Crompton wrote:
I've also built a 3.2.39 kernel with some patches stripped. This kernel
still does exhibit the problem, suggesting the patches I stripped out
are not responsible. Those patches are:
bugfix/x86/drm-i915-kick-any-firmware-framebuffers-before-claim.patch
On 10/04/13 16:35, Jonathan Nieder wrote:
What's next?
3.6.9-1~experimental.1, to narrow down the range to search for a fix.
The binary from snapshot.debian.org (linux-image-3.6-trunk-amd64)
should install fine, or if you prefer to build from source then there
are instructions at [1].
Thanks,
-Encoding: 7bit
From: Geoff Crompton geo...@trinity.unimelb.edu.au
To: Debian Bug Tracking System sub...@bugs.debian.org
Subject: linux-image-3.2.0-4-amd64: none
X-Debbugs-Cc: none
Package: src:linux
Version: 3.2.35-2
Severity: normal
Dear Maintainer,
*** Please consider answering these questions
(hence this being a wishlist bug).
This bug is my vote to get this patch into squeeze somehow (be that a
squeeze-n-half kernel, or a cherry picked patch to a later squeeze kernel).
I'll understand if you tag this wont-fix.
Cheers,
Geoff Crompton
-- Package-specific info:
** Version:
Linux version
?
Thanks!
--
Geoff Crompton
Debian System Administrator
Strategic Data
+61 3 9340 9000
--
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
Hi,
Security focus list a remote buffer overflow vulnerability.
http://www.securityfocus.com/bid/17178
I can't find a CVE for it yet, so I cant see if you've got it under
control on your subversion patch tracking page.
Do you think it likely that a DSA will get fast tracked for this?
--
Geoff
Package: kernel-image-2.6.8-i386
Severity: normal
Seen at http://www.securityfocus.com/bid/14470, where they say Linux Kernel
is affected by a remote denial of service vulnerability when handling XDR data
for the nfsacl protocol.
I've tried to work out if sarge is vulnerable. They say that it
Package: kernel-source-2.6.8
Version: 2.6.8-16
Severity: important
In http://www.securityfocus.com/bid/14790 a memory leak is reported in
the linux kernel.
They reference
http://www.kernel.org/git/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commitdiff;h=729d70f5dfd663b44bca68a4479c96bde7e535d6
Just FYI, this has been assigned CAN-2005-2802.
--
Geoff Crompton
Debian System Administrator
Strategic Data
+61 3 9340 9000
--
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
Geoff Crompton wrote:
Just FYI, this has been assigned CAN-2005-2802.
Oops. Just noticed that this has actually been assigned CAN-2005-2872,
which is the one that is actually referenced in all the debian kernel
svn logs. Sorry!
http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-2802
Package: linux-2.6
Severity: important
Ref http://www.securityfocus.com/bid/14793
The kernel team is aware of this issue, and fixes are in the kernel
teams svn at svn.debian.org.
I created this report so as I couldn't find this issue mentioned in the
BTS. Please tag it with security and sarge.
Package: kernel-source-2.6.8
Version: 2.6.8-16
Severity: critical
Justification: root security hole
SecurityFocus http://www.securityfocus.com/bid/14477 mentions an array index
buffer overflow.
In short, the suspect it can cause a denial of service attack, but
aren't sure whether or not it
Package: kernel-source-2.6.8
Version: 2.6.8-15
Severity: important
See http://www.securityfocus.com/bid/13676 for more information. In
short, a DoS exists when a machine uses PAWS (Protection Against Wrapped
Sequence Numbers).
Quoting from securityfocus:
The issue manifests if an attacker
Package: kernel-source-2.6.8
Version: 2.6.8-15
Severity: normal
Information leak in ext2 code. Quoting from USN-103-1:
Mathieu Lafon discovered an information leak in the ext2 file system
driver. When a new directory was created, the ext2 block written to
disk was not initialized, so that
Package: kernel-source-2.6.8
Version: 2.6.8-15
Severity: important
SecurityFocus http://www.securityfocus.com/bid/12935/discussion/ has the
following:
It is reported that issue exists in the 'load_elf_library' function.
Linux Kernel 2.6.11.5 and prior versions are affected by this issue.
Package: kernel-source-2.6.8
Version: 2.6.8-15
Severity: critical
Justification: root security hole
USN-103-1 says this:
Ilja van Sprundel discovered that the bluez_sock_create() function did
not check its protocol argument for negative values. A local
attacker could exploit this to execute
Package: kernel-source-2.6.8
Version: 2.6.8-15
Severity: important
Quoting from the SecurityFocus item (bid 12810):
Linux Kernel (Point-to-Point Protocol) PPP Driver is reported prone to
an unspecified remote denial of service vulnerability.
A successful attack can cause a denial of service
to allocate an skb.
Thans!
--
Geoff Crompton
Debian System Administrator
Strategic Data
+61 3 9340 9000
--
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
Package: kernel-source-2.6.8
Version: 2.6.8-13
Severity: critical
Justification: root security hole
There is a local integer overflow vulnerability in the sys_epoll_wait()
call. See following for detail:
http://www.securityfocus.com/bid/12763/
Apologies if already reported.
--
To UNSUBSCRIBE,
21 matches
Mail list logo