Bug#711154: [linux-image-amd64] touchpad becomes unresponsive, logs show bcm5974: bad trackpad package

2013-06-04 Thread Geoff Crompton
Package: linux-image-3.2.0-4-amd64 Version: 3.2.41-2+deb7u2 Severity: normal --- Please enter the report below this line. --- The touchpad on this MacBook Air sometimes becomes unresponsive. At these times the kernel log scrolls these messages whenever you drag your fingers across the touchpad:

Bug#703468: [3.2.35-2 - 3.2.39-1 regression] fails to boot on apple iMac

2013-04-16 Thread Geoff Crompton
On 12/04/13 17:13, Jonathan Nieder wrote: tags 703468 - moreinfo quit Geoff Crompton wrote: I ran the 'cherry-pick' command, and redid the make deb-pkg and dpkg -i steps. When I rebooted onto that kernel it worked fine. So it seems this patch fixes the 3.4.4 kernel. Beautiful. Let's take

Bug#703468: [3.2.35-2 - 3.2.39-1 regression] fails to boot on apple iMac

2013-04-11 Thread Geoff Crompton
On 11/04/13 10:54, Geoff Crompton wrote: I've also built a 3.2.39 kernel with some patches stripped. This kernel still does exhibit the problem, suggesting the patches I stripped out are not responsible. Those patches are: bugfix/x86/drm-i915-kick-any-firmware-framebuffers-before-claim.patch

Bug#703468: [3.2.35-2 - 3.2.39-1 regression] fails to boot on apple iMac

2013-04-10 Thread Geoff Crompton
On 10/04/13 16:35, Jonathan Nieder wrote: What's next? 3.6.9-1~experimental.1, to narrow down the range to search for a fix. The binary from snapshot.debian.org (linux-image-3.6-trunk-amd64) should install fine, or if you prefer to build from source then there are instructions at [1]. Thanks,

Bug#703468: linux-image-3.2.0-4-amd64 fails to boot on apple iMac

2013-03-19 Thread Geoff Crompton
-Encoding: 7bit From: Geoff Crompton geo...@trinity.unimelb.edu.au To: Debian Bug Tracking System sub...@bugs.debian.org Subject: linux-image-3.2.0-4-amd64: none X-Debbugs-Cc: none Package: src:linux Version: 3.2.35-2 Severity: normal Dear Maintainer, *** Please consider answering these questions

Bug#630788: linux-image-2.6.32-5-486: squeeze kernel doesn't include accept_ra=2 patch

2011-06-17 Thread Geoff Crompton
(hence this being a wishlist bug). This bug is my vote to get this patch into squeeze somehow (be that a squeeze-n-half kernel, or a cherry picked patch to a later squeeze kernel). I'll understand if you tag this wont-fix. Cheers, Geoff Crompton -- Package-specific info: ** Version: Linux version

svn /patch-tracking/

2006-08-01 Thread Geoff Crompton
? Thanks! -- Geoff Crompton Debian System Administrator Strategic Data +61 3 9340 9000 -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]

remotely exploitable buffer overflow

2006-03-21 Thread Geoff Crompton
Hi, Security focus list a remote buffer overflow vulnerability. http://www.securityfocus.com/bid/17178 I can't find a CVE for it yet, so I cant see if you've got it under control on your subversion patch tracking page. Do you think it likely that a DSA will get fast tracked for this? -- Geoff

Bug#354532: CAN-2005-2500: NFS ACL Protocol XDR remote DoS

2006-02-26 Thread Geoff Crompton
Package: kernel-image-2.6.8-i386 Severity: normal Seen at http://www.securityfocus.com/bid/14470, where they say Linux Kernel is affected by a remote denial of service vulnerability when handling XDR data for the nfsacl protocol. I've tried to work out if sarge is vulnerable. They say that it

Bug#328389: CAN-2005-2800: memory leak in scsi procfs leads to local DoS

2005-09-14 Thread Geoff Crompton
Package: kernel-source-2.6.8 Version: 2.6.8-16 Severity: important In http://www.securityfocus.com/bid/14790 a memory leak is reported in the linux kernel. They reference http://www.kernel.org/git/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commitdiff;h=729d70f5dfd663b44bca68a4479c96bde7e535d6

Bug#322237: ipt_recent patch

2005-09-14 Thread Geoff Crompton
Just FYI, this has been assigned CAN-2005-2802. -- Geoff Crompton Debian System Administrator Strategic Data +61 3 9340 9000 -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]

Bug#322237: ipt_recent patch

2005-09-14 Thread Geoff Crompton
Geoff Crompton wrote: Just FYI, this has been assigned CAN-2005-2802. Oops. Just noticed that this has actually been assigned CAN-2005-2872, which is the one that is actually referenced in all the debian kernel svn logs. Sorry! http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-2802

Bug#328395: CAN-2005-2801: ext2 ext3 xattr access control bypass

2005-09-14 Thread Geoff Crompton
Package: linux-2.6 Severity: important Ref http://www.securityfocus.com/bid/14793 The kernel team is aware of this issue, and fixes are in the kernel teams svn at svn.debian.org. I created this report so as I couldn't find this issue mentioned in the BTS. Please tag it with security and sarge.

Bug#322273: [CAN-2005-2456]: XFRM array index buffer overflow

2005-08-09 Thread Geoff Crompton
Package: kernel-source-2.6.8 Version: 2.6.8-16 Severity: critical Justification: root security hole SecurityFocus http://www.securityfocus.com/bid/14477 mentions an array index buffer overflow. In short, the suspect it can cause a denial of service attack, but aren't sure whether or not it

Bug#310804: kernel-source-2.6.8: CAN-2005-0356 RFC1323 spec DoS

2005-05-26 Thread Geoff Crompton
Package: kernel-source-2.6.8 Version: 2.6.8-15 Severity: important See http://www.securityfocus.com/bid/13676 for more information. In short, a DoS exists when a machine uses PAWS (Protection Against Wrapped Sequence Numbers). Quoting from securityfocus: The issue manifests if an attacker

Bug#303500: CAN-2005-0400: EXT2 File System Information Leak Vulnerability

2005-04-06 Thread Geoff Crompton
Package: kernel-source-2.6.8 Version: 2.6.8-15 Severity: normal Information leak in ext2 code. Quoting from USN-103-1: Mathieu Lafon discovered an information leak in the ext2 file system driver. When a new directory was created, the ext2 block written to disk was not initialized, so that

Bug#303498: CAN-2005-0749: Elf Binary Loading Local DoS

2005-04-06 Thread Geoff Crompton
Package: kernel-source-2.6.8 Version: 2.6.8-15 Severity: important SecurityFocus http://www.securityfocus.com/bid/12935/discussion/ has the following: It is reported that issue exists in the 'load_elf_library' function. Linux Kernel 2.6.11.5 and prior versions are affected by this issue.

Bug#303501: CAN-2005-0750: Bluetooth root exploit due to boundary checking

2005-04-06 Thread Geoff Crompton
Package: kernel-source-2.6.8 Version: 2.6.8-15 Severity: critical Justification: root security hole USN-103-1 says this: Ilja van Sprundel discovered that the bluez_sock_create() function did not check its protocol argument for negative values. A local attacker could exploit this to execute

Bug#302082: CAN-2005-0384: Linux Kernel PPP Driver Unspecified Remote Denial Of Service Vulnerability

2005-03-29 Thread Geoff Crompton
Package: kernel-source-2.6.8 Version: 2.6.8-15 Severity: important Quoting from the SecurityFocus item (bid 12810): Linux Kernel (Point-to-Point Protocol) PPP Driver is reported prone to an unspecified remote denial of service vulnerability. A successful attack can cause a denial of service

disc_send_ns() errors

2005-03-16 Thread Geoff Crompton
to allocate an skb. Thans! -- Geoff Crompton Debian System Administrator Strategic Data +61 3 9340 9000 -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]

Bug#299865: CAN-2005-0736: Boundary condition error in sys_epoll_wait

2005-03-16 Thread Geoff Crompton
Package: kernel-source-2.6.8 Version: 2.6.8-13 Severity: critical Justification: root security hole There is a local integer overflow vulnerability in the sys_epoll_wait() call. See following for detail: http://www.securityfocus.com/bid/12763/ Apologies if already reported. -- To UNSUBSCRIBE,