Bug#284477: Same with IBM Thinkcentre A50

2005-03-17 Thread Jacobo Tarrio
 The same thing happens with the IBM Thinkcentre A50, MT-M 8089-74G.

 With 2.6.8-2-686 it seizes: the clock starts jumping forward and backwards
(between 16:01 and 17:12, the time I discovered that), the screen blanks out
(since, suddenly, the system has spent 1 hour and 11 minutes idle ;-)), and
even simple commands take ages to execute. Finally, it hangs completely.

 Fun observation: if I launch a program from KDE's panel, the cursor gets
the bouncing icon, but it doesn't bounce; when I press any key it advances a
frame in its bouncing.

 These are the last messages in /var/log/syslog before starting with the
poltergeist thing:

[standard bootup messages]
Mar 16 16:11:06 pitagoras kernel: lp0: using parport0 (interrupt-driven).
Mar 16 16:11:06 pitagoras lpd[3107]: restarted
Mar 16 16:11:08 pitagoras postfix/postfix-script: starting the Postfix mail 
system
Mar 16 16:11:08 pitagoras postfix/master[3200]: daemon started -- version 2.1.5
Mar 16 16:11:08 pitagoras kernel: NET: Registered protocol family 10
Mar 16 16:11:08 pitagoras kernel: Disabled Privacy Extensions on device 
c02ff020(lo)
Mar 16 16:11:08 pitagoras kernel: IPv6 over IPv4 tunneling driver
Mar 16 16:11:09 pitagoras xfs: ignoring font path element 
/usr/lib/X11/fonts/cyrillic/ (unreadable)
Mar 16 16:11:09 pitagoras /usr/sbin/cron[3347]: (CRON) INFO (pidfile fd = 3)
Mar 16 16:11:09 pitagoras /usr/sbin/cron[3348]: (CRON) STARTUP (fork ok)
Mar 16 16:11:09 pitagoras /usr/sbin/cron[3348]: (CRON) INFO (Running @reboot 
jobs)
Mar 16 16:11:09 pitagoras xfs: ignoring font path element 
/usr/lib/X11/fonts/CID (unreadable)
Mar 16 16:11:10 pitagoras Xprt_64: No matching visual for __GLcontextMode with 
visual class = 0 (32775), nplanes = 8
Mar 16 16:11:11 pitagoras kernel: [drm] Initialized i830 1.3.2 20021108 on 
minor 0: Intel Corp. 82865G Integrated Graphics Device
Mar 16 16:11:11 pitagoras kernel: mtrr: base(0xf002) is not aligned on a 
size(0x80) boundary
Mar 16 16:11:16 pitagoras kdm_greet[3512]: Can't open default user face
Mar 16 16:11:19 pitagoras kernel: eth0: no IPv6 routers present
Mar 16 16:12:02 pitagoras gconfd (jtarrio-3672): comenzando (versión 2.8.1), 
pid 3672 usuario jtarrio
Mar 16 16:12:02 pitagoras gconfd (jtarrio-3672): Se resolvio la direccion 
xml:readonly:/etc/gconf/gconf.xml.mandatory a una fuente de configuracion de 
solo lectura en la posicion 0
Mar 16 16:12:02 pitagoras gconfd (jtarrio-3672): Se resolvio la direccion 
xml:readwrite:/home/jtarrio/.gconf a una fuente de configuracion escribible 
en la posicion 1
Mar 16 16:12:02 pitagoras gconfd (jtarrio-3672): Se resolvio la direccion 
xml:readonly:/etc/gconf/gconf.xml.defaults a una fuente de configuracion de 
solo lectura en la posicion 2
Mar 16 16:17:01 pitagoras /USR/SBIN/CRON[3682]: (root) CMD (   run-parts 
--report /etc/cron.hourly)
Mar 16 16:31:05 pitagoras -- MARK --
Mar 16 16:51:05 pitagoras -- MARK --

 I'd like to call your attention upon the messages at 16:11:10 and 16:11:11.
I believe they appear when X is loaded (for kdm). However, another
Thinkcentre we're temporarily using as a firewall, with no X, suffers from
the same ailment (in fact, it is the first one we noticed it on).

 I haven't seen 2.4.27-1-386 exhibit this behaviour yet. The equivalent 686
version is to be tested today (will report).

 A BIOS update is useless since the version on IBM's support pages is the
same one the computers came loaded with.

-- 
   Jacobo Tarrío | http://jacobo.tarrio.org/



Re: Bug#299875: ppp: out-of-memory 30min after LCP terminated by peer

2005-03-17 Thread Marco d'Itri
reassign 299875 kernel
retitle 299875 CAN-2005-0384: Remote Linux DoS on ppp servers
tag 299875 patch security
thanks

Paul Mackerras says that this bug affects all kernels (2.4 and 2.6) and
can be easily triggered remotely, but is only a CPU DoS.

from 2.6.11.4:

diff -Nru a/drivers/net/ppp_async.c b/drivers/net/ppp_async.c
--- a/drivers/net/ppp_async.c   2005-03-15 16:09:59 -08:00
+++ b/drivers/net/ppp_async.c   2005-03-15 16:09:59 -08:00
@@ -1000,7 +1000,7 @@
data += 4;
dlen -= 4;
/* data[0] is code, data[1] is length */
-   while (dlen = 2  dlen = data[1]) {
+   while (dlen = 2  dlen = data[1]  data[1] = 2) {
switch (data[0]) {
case LCP_MRU:
val = (data[2]  8) + data[3];

-- 
ciao,
Marco


signature.asc
Description: Digital signature


Processed: Re: Bug#299875: ppp: out-of-memory 30min after LCP terminated by peer

2005-03-17 Thread Debian Bug Tracking System
Processing commands for [EMAIL PROTECTED]:

 reassign 299875 kernel
Bug#299875: ppp: out-of-memory 30min after LCP terminated by peer
Bug reassigned from package `ppp' to `kernel'.

 retitle 299875 CAN-2005-0384: Remote Linux DoS on ppp servers
Bug#299875: ppp: out-of-memory 30min after LCP terminated by peer
Changed Bug title.

 tag 299875 patch security
Bug#299875: CAN-2005-0384: Remote Linux DoS on ppp servers
There were no tags set.
Tags added: patch, security

 thanks
Stopping processing here.

Please contact me if you need assistance.

Debian bug tracking system administrator
(administrator, Debian Bugs database)


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Processed: This bug is release critical IMO

2005-03-17 Thread Debian Bug Tracking System
Processing commands for [EMAIL PROTECTED]:

 severity 289690 serious
Bug#289690: (no subject)
Severity set to `serious'.

 thanks
Stopping processing here.

Please contact me if you need assistance.

Debian bug tracking system administrator
(administrator, Debian Bugs database)


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Bug#289690: This bug is release critical IMO

2005-03-17 Thread Raphael Hertzog
severity 289690 serious
thanks

This bug should really be fixed for sarge... releasing with broken Samba
support isn't an option.

I also encountered the bug on my side (with version 2.6.8-13 of the
kernel).

You must be able to find out the relevant change in the kernel bitkeeper
history, isn't it ?

As a starting point, you may contact the guy who posted that mail :
http://lwn.net/Articles/112514/?format=printable

Regards,
 Raphaël.




Bug#296901: marked as done (CAN-2005-0530: information disclosure because of signedness error in copy_from_read_buf)

2005-03-17 Thread Debian Bug Tracking System
Your message dated Thu, 17 Mar 2005 12:02:03 +0100
with message-id [EMAIL PROTECTED]
and subject line vulnerabilites fixed in kernel-source-2.6.8 (2.6.8-14)
has caused the attached Bug report to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what I am
talking about this indicates a serious mail system misconfiguration
somewhere.  Please contact me immediately.)

Debian bug tracking system administrator
(administrator, Debian Bugs database)

--
Received: (at submit) by bugs.debian.org; 25 Feb 2005 14:40:53 +
From [EMAIL PROTECTED] Fri Feb 25 06:40:52 2005
Return-path: [EMAIL PROTECTED]
Received: from mail-out.m-online.net [212.18.0.9] 
by spohr.debian.org with esmtp (Exim 3.35 1 (Debian))
id 1D4geC-0001ju-00; Fri, 25 Feb 2005 06:40:52 -0800
Received: from mail.m-online.net (svr20.m-online.net [192.168.3.148])
by mail-out.m-online.net (Postfix) with ESMTP id 930605DAD
for [EMAIL PROTECTED]; Fri, 25 Feb 2005 15:40:51 +0100 (CET)
Received: from k.local (ppp-82-135-14-157.mnet-online.de [82.135.14.157])
by mail.m-online.net (Postfix) with ESMTP id 8082056EB9
for [EMAIL PROTECTED]; Fri, 25 Feb 2005 15:40:51 +0100 (CET)
Received: from stf by k.local with local (Exim 4.44)
id 1D4geB-0005f5-Mb
for [EMAIL PROTECTED]; Fri, 25 Feb 2005 15:40:51 +0100
Content-Type: text/plain; charset=us-ascii
MIME-Version: 1.0
Content-Transfer-Encoding: 7bit
From: Stefan Fritsch [EMAIL PROTECTED]
To: Debian Bug Tracking System [EMAIL PROTECTED]
Subject: CAN-2005-0530: information disclosure because of signedness error in
 copy_from_read_buf
X-Mailer: reportbug 3.8
Date: Fri, 25 Feb 2005 15:40:51 +0100
Message-Id: [EMAIL PROTECTED]
Delivered-To: [EMAIL PROTECTED]
X-Spam-Checker-Version: SpamAssassin 2.60-bugs.debian.org_2005_01_02 
(1.212-2003-09-23-exp) on spohr.debian.org
X-Spam-Status: No, hits=-8.0 required=4.0 tests=BAYES_00,HAS_PACKAGE 
autolearn=no version=2.60-bugs.debian.org_2005_01_02
X-Spam-Level: 

Package: kernel-source-2.6.8
Version: 2.6.8-13
Severity: grave
Tags: security
Justification: user security hole

Signedness error in the copy_from_read_buf function in n_tty.c for
Linux kernel 2.6.10 and 2.6.11rc1 allows local users to read kernel
memory via a negative argument.

The offending code is also in 2.6.8 and 2.4.27.

A fix is at
http://linux.bkbits.net:8080/linux-2.6/[EMAIL PROTECTED]

Advisory at
http://marc.theaimsgroup.com/?l=full-disclosurem=110846727602817w=2

Please also fix 2.6.9 and 2.6.10


-- System Information:
Debian Release: 3.1
  APT prefers unstable
  APT policy: (500, 'unstable')
Architecture: i386 (i686)
Kernel: Linux 2.6.10-as2-stf-k-1
Locale: [EMAIL PROTECTED], [EMAIL PROTECTED] (charmap=ISO-8859-15)

Versions of packages kernel-source-2.6.8 depends on:
ii  binutils  2.15-5 The GNU assembler, linker and bina
ii  bzip2 1.0.2-5high-quality block-sorting file co
ii  coreutils [fileutils] 5.2.1-2The GNU core utilities
ii  fileutils 5.2.1-2The GNU file management utilities 

-- no debconf information

---
Received: (at 296901-done) by bugs.debian.org; 17 Mar 2005 11:02:41 +
From [EMAIL PROTECTED] Thu Mar 17 03:02:40 2005
Return-path: [EMAIL PROTECTED]
Received: from neo.t30.physik.tu-muenchen.de [129.187.137.8] 
by spohr.debian.org with esmtp (Exim 3.35 1 (Debian))
id 1DBslz-00012r-00; Thu, 17 Mar 2005 03:02:39 -0800
Received: from neo.t30.physik.tu-muenchen.de ([129.187.137.8] helo=localhost)
by neo.t30.physik.tu-muenchen.de with esmtp (Exim 3.35 #1 (Debian))
id 1DBslR-0004Ww-00; Thu, 17 Mar 2005 12:02:05 +0100
From: Stefan Fritsch [EMAIL PROTECTED]
To: Andres Salomon [EMAIL PROTECTED]
Subject: vulnerabilites fixed in kernel-source-2.6.8 (2.6.8-14)
Date: Thu, 17 Mar 2005 12:02:03 +0100
User-Agent: KMail/1.7.2
Cc: [EMAIL PROTECTED],
 [EMAIL PROTECTED],
 [EMAIL PROTECTED],
 [EMAIL PROTECTED],
 [EMAIL PROTECTED]
MIME-Version: 1.0
Content-Type: text/plain;
  charset=us-ascii
Content-Transfer-Encoding: 7bit
Content-Disposition: inline
Message-Id: [EMAIL PROTECTED]
Delivered-To: [EMAIL PROTECTED]
X-Spam-Checker-Version: SpamAssassin 2.60-bugs.debian.org_2005_01_02 
(1.212-2003-09-23-exp) on spohr.debian.org
X-Spam-Status: No, hits=-2.5 required=4.0 tests=BAYES_00,SUSPICIOUS_RECIPS 
autolearn=no version=2.60-bugs.debian.org_2005_01_02
X-Spam-Level: 
X-CrossAssassin-Score: 4

Hi!

Some of the fixes in 2.6.8-14 are missing CAN- and bug numbers. Maybe 
you can add the CAN-numbers to the changelog?

Cheers,
Stefan
==
  * 2.6.11.2 [SECURITY] epoll: return proper error on overflow 

Bug#296897: marked as done (CAN-2005-0532: Buffer overflow in reiserfs_copy_from_user... on 64bit arches)

2005-03-17 Thread Debian Bug Tracking System
Your message dated Thu, 17 Mar 2005 12:02:03 +0100
with message-id [EMAIL PROTECTED]
and subject line vulnerabilites fixed in kernel-source-2.6.8 (2.6.8-14)
has caused the attached Bug report to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what I am
talking about this indicates a serious mail system misconfiguration
somewhere.  Please contact me immediately.)

Debian bug tracking system administrator
(administrator, Debian Bugs database)

--
Received: (at submit) by bugs.debian.org; 25 Feb 2005 14:06:01 +
From [EMAIL PROTECTED] Fri Feb 25 06:06:01 2005
Return-path: [EMAIL PROTECTED]
Received: from mail-out.m-online.net [212.18.0.9] 
by spohr.debian.org with esmtp (Exim 3.35 1 (Debian))
id 1D4g6T-0001cw-00; Fri, 25 Feb 2005 06:06:01 -0800
Received: from mail.m-online.net (svr20.m-online.net [192.168.3.148])
by mail-out.m-online.net (Postfix) with ESMTP id B6F315A0D
for [EMAIL PROTECTED]; Fri, 25 Feb 2005 15:05:59 +0100 (CET)
Received: from k.local (ppp-82-135-14-157.mnet-online.de [82.135.14.157])
by mail.m-online.net (Postfix) with ESMTP id A277456E6A
for [EMAIL PROTECTED]; Fri, 25 Feb 2005 15:05:59 +0100 (CET)
Received: from stf by k.local with local (Exim 4.44)
id 1D4g6Q-0005ZB-JR
for [EMAIL PROTECTED]; Fri, 25 Feb 2005 15:05:58 +0100
Content-Type: text/plain; charset=us-ascii
MIME-Version: 1.0
Content-Transfer-Encoding: 7bit
From: Stefan Fritsch [EMAIL PROTECTED]
To: Debian Bug Tracking System [EMAIL PROTECTED]
Subject: CAN-2005-0532: Buffer overflow in reiserfs_copy_from_user... on 64bit 
arches
X-Mailer: reportbug 3.8
Date: Fri, 25 Feb 2005 15:05:58 +0100
Message-Id: [EMAIL PROTECTED]
Delivered-To: [EMAIL PROTECTED]
X-Spam-Checker-Version: SpamAssassin 2.60-bugs.debian.org_2005_01_02 
(1.212-2003-09-23-exp) on spohr.debian.org
X-Spam-Status: No, hits=-8.0 required=4.0 tests=BAYES_00,HAS_PACKAGE 
autolearn=no version=2.60-bugs.debian.org_2005_01_02
X-Spam-Level: 

Package: kernel-source-2.6.8
Version: 2.6.8-13
Severity: critical
Tags: security
Justification: root security hole

Cite:
The reiserfs_copy_from_user_to_file_region function in reiserfs/file.c for 
Linux kernel
2.6.10 and 2.6.11 before 2.6.11-rc4, when running on 64-bit architectures, may 
allow local
users to trigger a buffer overflow as a result of casting discrepancies between 
size_t and
int data types.

The offending code is also in 2.6.8. A fix is at
http://linux.bkbits.net:8080/linux-2.6/[EMAIL PROTECTED]

The original advisory is at
http://marc.theaimsgroup.com/?l=full-disclosurem=110846727602817w=2


Please fix 2.6.9 and 2.6.10 as well. I have also looked at 2.4.27 but couldn't 
find any
similar code.


-- System Information:
Debian Release: 3.1
  APT prefers unstable
  APT policy: (500, 'unstable')
Architecture: i386 (i686)

Versions of packages kernel-source-2.6.8 depends on:
ii  binutils  2.15-5 The GNU assembler, linker and bina
ii  bzip2 1.0.2-5high-quality block-sorting file co
ii  coreutils [fileutils] 5.2.1-2The GNU core utilities
ii  fileutils 5.2.1-2The GNU file management utilities 

-- no debconf information

---
Received: (at 296897-done) by bugs.debian.org; 17 Mar 2005 11:02:40 +
From [EMAIL PROTECTED] Thu Mar 17 03:02:40 2005
Return-path: [EMAIL PROTECTED]
Received: from neo.t30.physik.tu-muenchen.de [129.187.137.8] 
by spohr.debian.org with esmtp (Exim 3.35 1 (Debian))
id 1DBslz-00012r-00; Thu, 17 Mar 2005 03:02:39 -0800
Received: from neo.t30.physik.tu-muenchen.de ([129.187.137.8] helo=localhost)
by neo.t30.physik.tu-muenchen.de with esmtp (Exim 3.35 #1 (Debian))
id 1DBslR-0004Ww-00; Thu, 17 Mar 2005 12:02:05 +0100
From: Stefan Fritsch [EMAIL PROTECTED]
To: Andres Salomon [EMAIL PROTECTED]
Subject: vulnerabilites fixed in kernel-source-2.6.8 (2.6.8-14)
Date: Thu, 17 Mar 2005 12:02:03 +0100
User-Agent: KMail/1.7.2
Cc: [EMAIL PROTECTED],
 [EMAIL PROTECTED],
 [EMAIL PROTECTED],
 [EMAIL PROTECTED],
 [EMAIL PROTECTED]
MIME-Version: 1.0
Content-Type: text/plain;
  charset=us-ascii
Content-Transfer-Encoding: 7bit
Content-Disposition: inline
Message-Id: [EMAIL PROTECTED]
Delivered-To: [EMAIL PROTECTED]
X-Spam-Checker-Version: SpamAssassin 2.60-bugs.debian.org_2005_01_02 
(1.212-2003-09-23-exp) on spohr.debian.org
X-Spam-Status: No, hits=-2.5 required=4.0 tests=BAYES_00,SUSPICIOUS_RECIPS 
autolearn=no version=2.60-bugs.debian.org_2005_01_02
X-Spam-Level: 

Hi!

Some of the fixes in 2.6.8-14 are missing CAN- and bug numbers. Maybe 
you can add the CAN-numbers to the changelog?

Cheers,
Stefan

Bug#296899: marked as done (CAN-2005-0531: Buffer overflow in atm_get_addr)

2005-03-17 Thread Debian Bug Tracking System
Your message dated Thu, 17 Mar 2005 12:02:03 +0100
with message-id [EMAIL PROTECTED]
and subject line vulnerabilites fixed in kernel-source-2.6.8 (2.6.8-14)
has caused the attached Bug report to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what I am
talking about this indicates a serious mail system misconfiguration
somewhere.  Please contact me immediately.)

Debian bug tracking system administrator
(administrator, Debian Bugs database)

--
Received: (at submit) by bugs.debian.org; 25 Feb 2005 14:16:59 +
From [EMAIL PROTECTED] Fri Feb 25 06:16:59 2005
Return-path: [EMAIL PROTECTED]
Received: from mail-out.m-online.net [212.18.0.9] 
by spohr.debian.org with esmtp (Exim 3.35 1 (Debian))
id 1D4gH5-0003Oc-00; Fri, 25 Feb 2005 06:16:59 -0800
Received: from mail.m-online.net (svr20.m-online.net [192.168.3.148])
by mail-out.m-online.net (Postfix) with ESMTP id 2E53C5BA2
for [EMAIL PROTECTED]; Fri, 25 Feb 2005 15:16:58 +0100 (CET)
Received: from k.local (ppp-82-135-14-157.mnet-online.de [82.135.14.157])
by mail.m-online.net (Postfix) with ESMTP id 1D8B256E77
for [EMAIL PROTECTED]; Fri, 25 Feb 2005 15:16:58 +0100 (CET)
Received: from stf by k.local with local (Exim 4.44)
id 1D4gH4-0005ay-8m
for [EMAIL PROTECTED]; Fri, 25 Feb 2005 15:16:58 +0100
Content-Type: text/plain; charset=us-ascii
MIME-Version: 1.0
Content-Transfer-Encoding: 7bit
From: Stefan Fritsch [EMAIL PROTECTED]
To: Debian Bug Tracking System [EMAIL PROTECTED]
Subject: CAN-2005-0531: Buffer overflow in atm_get_addr
X-Mailer: reportbug 3.8
Date: Fri, 25 Feb 2005 15:16:58 +0100
Message-Id: [EMAIL PROTECTED]
Delivered-To: [EMAIL PROTECTED]
X-Spam-Checker-Version: SpamAssassin 2.60-bugs.debian.org_2005_01_02 
(1.212-2003-09-23-exp) on spohr.debian.org
X-Spam-Status: No, hits=-8.0 required=4.0 tests=BAYES_00,HAS_PACKAGE 
autolearn=no version=2.60-bugs.debian.org_2005_01_02
X-Spam-Level: 

Package: kernel-source-2.6.8
Version: 2.6.8-13
Severity: critical
Tags: security
Justification: root security hole

Cite:
The atm_get_addr function in addr.c for Linux kernel 2.6.10 and 2.6.11 before 
2.6.11-rc4
may allow local users to trigger a buffer overflow via negative arguments.

The offending code is also in 2.6.8 and 2.4.27.

Fix:
http://linux.bkbits.net:8080/linux-2.6/[EMAIL PROTECTED]

Advisory:
http://marc.theaimsgroup.com/?l=full-disclosurem=110846727602817w=2

Please fix also 2.6.9 and 2.6.10

-- System Information:
Debian Release: 3.1
  APT prefers unstable
  APT policy: (500, 'unstable')
Architecture: i386 (i686)

---
Received: (at 296899-done) by bugs.debian.org; 17 Mar 2005 11:02:40 +
From [EMAIL PROTECTED] Thu Mar 17 03:02:40 2005
Return-path: [EMAIL PROTECTED]
Received: from neo.t30.physik.tu-muenchen.de [129.187.137.8] 
by spohr.debian.org with esmtp (Exim 3.35 1 (Debian))
id 1DBslz-00012r-00; Thu, 17 Mar 2005 03:02:39 -0800
Received: from neo.t30.physik.tu-muenchen.de ([129.187.137.8] helo=localhost)
by neo.t30.physik.tu-muenchen.de with esmtp (Exim 3.35 #1 (Debian))
id 1DBslR-0004Ww-00; Thu, 17 Mar 2005 12:02:05 +0100
From: Stefan Fritsch [EMAIL PROTECTED]
To: Andres Salomon [EMAIL PROTECTED]
Subject: vulnerabilites fixed in kernel-source-2.6.8 (2.6.8-14)
Date: Thu, 17 Mar 2005 12:02:03 +0100
User-Agent: KMail/1.7.2
Cc: [EMAIL PROTECTED],
 [EMAIL PROTECTED],
 [EMAIL PROTECTED],
 [EMAIL PROTECTED],
 [EMAIL PROTECTED]
MIME-Version: 1.0
Content-Type: text/plain;
  charset=us-ascii
Content-Transfer-Encoding: 7bit
Content-Disposition: inline
Message-Id: [EMAIL PROTECTED]
Delivered-To: [EMAIL PROTECTED]
X-Spam-Checker-Version: SpamAssassin 2.60-bugs.debian.org_2005_01_02 
(1.212-2003-09-23-exp) on spohr.debian.org
X-Spam-Status: No, hits=-2.5 required=4.0 tests=BAYES_00,SUSPICIOUS_RECIPS 
autolearn=no version=2.60-bugs.debian.org_2005_01_02
X-Spam-Level: 
X-CrossAssassin-Score: 2

Hi!

Some of the fixes in 2.6.8-14 are missing CAN- and bug numbers. Maybe 
you can add the CAN-numbers to the changelog?

Cheers,
Stefan
==
  * 2.6.11.2 [SECURITY] epoll: return proper error on overflow 
condition
(Maximilian Attems)

#299865: CAN-2005-0736: Boundary condition error in sys_epoll_wait 



  * [SECURITY] 115-proc_file_read_nbytes_signedness_fix.dpatch
Heap overflow fix in /proc; WDYBTGT3-1 on
http://www.guninski.com/where_do_you_want_billg_to_go_today_3.html
No CAN# assigned yet, afaik (Andres Salomon).

#296900: CAN-2005-0529: Buffer overflow in proc_file_read 



  * [SECURITY] 116-n_tty_copy_from_read_buf_signedness_fixes.dpatch
copy_from_read_buf() fix; WDYBTGT3-2 on

Bug#299865: marked as done (CAN-2005-0736: Boundary condition error in sys_epoll_wait)

2005-03-17 Thread Debian Bug Tracking System
Your message dated Thu, 17 Mar 2005 12:02:03 +0100
with message-id [EMAIL PROTECTED]
and subject line vulnerabilites fixed in kernel-source-2.6.8 (2.6.8-14)
has caused the attached Bug report to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what I am
talking about this indicates a serious mail system misconfiguration
somewhere.  Please contact me immediately.)

Debian bug tracking system administrator
(administrator, Debian Bugs database)

--
Received: (at submit) by bugs.debian.org; 17 Mar 2005 00:32:02 +
From [EMAIL PROTECTED] Wed Mar 16 16:32:01 2005
Return-path: [EMAIL PROTECTED]
Received: from sdcarl02.strategicdata.com.au (sd01.mel.strategicdata.com.au) 
[203.214.67.82] 
by spohr.debian.org with esmtp (Exim 3.35 1 (Debian))
id 1DBivh-0003Lw-00; Wed, 16 Mar 2005 16:32:01 -0800
Received: from sd01 (localhost [127.0.0.1])
by mail-int.strategicdata.com.au (Postfix) with ESMTP id 7B058C000D65
for [EMAIL PROTECTED]; Thu, 17 Mar 2005 11:31:58 +1100 (EST)
Received: 
from sd01.mel.strategicdata.com.au (localhost [])
by localhost ([127.0.0.1]);
Thu, 17 Mar 2005 00:31:58 +
Received: from carthanach.mel.strategicdata.com.au 
(carthanach.mel.strategicdata.com.au [192.168.1.99])
by sd01.mel.strategicdata.com.au (Postfix) with SMTP id 4EE43C000D65
for [EMAIL PROTECTED]; Thu, 17 Mar 2005 11:31:58 +1100 (EST)
Received: by carthanach.mel.strategicdata.com.au (sSMTP sendmail emulation); 
Thu, 17 Mar 2005 11:31:58 +1100
From: Geoff Crompton [EMAIL PROTECTED]
Content-Type: text/plain; charset=us-ascii
MIME-Version: 1.0
Content-Transfer-Encoding: 7bit
To: Debian Bug Tracking System [EMAIL PROTECTED]
Subject: CAN-2005-0736: Boundary condition error in sys_epoll_wait
X-Mailer: reportbug 3.8
Date: Thu, 17 Mar 2005 11:31:58 +1100
Message-Id: [EMAIL PROTECTED]
Delivered-To: [EMAIL PROTECTED]
X-Spam-Checker-Version: SpamAssassin 2.60-bugs.debian.org_2005_01_02 
(1.212-2003-09-23-exp) on spohr.debian.org
X-Spam-Status: No, hits=-8.0 required=4.0 tests=BAYES_00,HAS_PACKAGE 
autolearn=no version=2.60-bugs.debian.org_2005_01_02
X-Spam-Level: 

Package: kernel-source-2.6.8
Version: 2.6.8-13
Severity: critical
Justification: root security hole

There is a local integer overflow vulnerability in the sys_epoll_wait()
call. See following for detail:
http://www.securityfocus.com/bid/12763/

Apologies if already reported.

---
Received: (at 299865-done) by bugs.debian.org; 17 Mar 2005 11:02:41 +
From [EMAIL PROTECTED] Thu Mar 17 03:02:41 2005
Return-path: [EMAIL PROTECTED]
Received: from neo.t30.physik.tu-muenchen.de [129.187.137.8] 
by spohr.debian.org with esmtp (Exim 3.35 1 (Debian))
id 1DBslz-00012r-00; Thu, 17 Mar 2005 03:02:39 -0800
Received: from neo.t30.physik.tu-muenchen.de ([129.187.137.8] helo=localhost)
by neo.t30.physik.tu-muenchen.de with esmtp (Exim 3.35 #1 (Debian))
id 1DBslR-0004Ww-00; Thu, 17 Mar 2005 12:02:05 +0100
From: Stefan Fritsch [EMAIL PROTECTED]
To: Andres Salomon [EMAIL PROTECTED]
Subject: vulnerabilites fixed in kernel-source-2.6.8 (2.6.8-14)
Date: Thu, 17 Mar 2005 12:02:03 +0100
User-Agent: KMail/1.7.2
Cc: [EMAIL PROTECTED],
 [EMAIL PROTECTED],
 [EMAIL PROTECTED],
 [EMAIL PROTECTED],
 [EMAIL PROTECTED]
MIME-Version: 1.0
Content-Type: text/plain;
  charset=us-ascii
Content-Transfer-Encoding: 7bit
Content-Disposition: inline
Message-Id: [EMAIL PROTECTED]
Delivered-To: [EMAIL PROTECTED]
X-Spam-Checker-Version: SpamAssassin 2.60-bugs.debian.org_2005_01_02 
(1.212-2003-09-23-exp) on spohr.debian.org
X-Spam-Status: No, hits=-2.5 required=4.0 tests=BAYES_00,SUSPICIOUS_RECIPS 
autolearn=no version=2.60-bugs.debian.org_2005_01_02
X-Spam-Level: 
X-CrossAssassin-Score: 5

Hi!

Some of the fixes in 2.6.8-14 are missing CAN- and bug numbers. Maybe 
you can add the CAN-numbers to the changelog?

Cheers,
Stefan
==
  * 2.6.11.2 [SECURITY] epoll: return proper error on overflow 
condition
(Maximilian Attems)

#299865: CAN-2005-0736: Boundary condition error in sys_epoll_wait 



  * [SECURITY] 115-proc_file_read_nbytes_signedness_fix.dpatch
Heap overflow fix in /proc; WDYBTGT3-1 on
http://www.guninski.com/where_do_you_want_billg_to_go_today_3.html
No CAN# assigned yet, afaik (Andres Salomon).

#296900: CAN-2005-0529: Buffer overflow in proc_file_read 



  * [SECURITY] 116-n_tty_copy_from_read_buf_signedness_fixes.dpatch
copy_from_read_buf() fix; WDYBTGT3-2 on
http://www.guninski.com/where_do_you_want_billg_to_go_today_3.html
No CAN#, yet (Andres Salomon).

#296901: CAN-2005-0530: information disclosure because of signedness 
error 

Re: short random freezes.

2005-03-17 Thread g . bonacci
On Tue, Mar 08, 2005 at 10:38:17AM +0100, [EMAIL PROTECTED] wrote:
 Greetings.
 
 I've been running sarge in the last year, and recently I performed
 an aptitude dist-upgrade that, among other packages, upgraded
 kernel-image-2.6.8-1-686 to kernel-image-2.6.8-2-686.
 
 Thereafter, my PCs and (non-critical) servers sometimes freeze for a
 short time (tipically about a second) during which keyboard, mouse and
 display seem inactive.  The frequency of freezes increases significantly
 under heavy load.
 
 This has usually no consequence on processes running, but seem to confuse
 real-time applications like mplayer. 
 
 I tried to isolate the problem by changing windowmanager, but to no
 effect. Now I would like to revert to the old kernel-image-2.6.8-1-686,
 and check whether the problem disappears.  But unfortunately, the deb
 seems to have already disappearded from the pool.
 
 Could you please tell me where to find the kernel-image-2.6.8-1-686
 package? 
 

Greetings. 

I assume that none of you could manage to find the time to even read my
previous message.  But in case someone actually did, he should know that
the problem has been filed as bug 294030 (package chrony), and maybe
the kernel is not involved at all.

g.b.


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Bug#271315: kernel-image-2.6.8-2-sparc64: Breaks Type5c keyboard, too

2005-03-17 Thread Lionel Elie Mamane
Package: kernel-image-2.6.8-2-sparc64
Version: 2.6.8-6
Followup-For: Bug #271315

I confirm hitting this bug with a Type 5c keyboard, on an UltraSparc
5, too. Keymap is completely baroque, e.g. the delete key acts as
enter, some Fn keys act as normal characters like u or n and
$DEITY knows what key activated caps lock.

2.4.27-2-sparc64 kernel works OK.

-- 
Lionel


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Bug#300083: kernel-image-2.6.8-powerpc: problemes with the clock on a mac mini

2005-03-17 Thread Nils Bruenggel
Package: kernel-image-2.6.8-powerpc
Version: 2.6.8-11
Severity: important


I have noticed that the clock in the evening differs about 15 min
from the actual time. My mac mini runs 24/7 with ntpdate running daily
to sync the clock.

I also noticed that hwclock does not work at all for example:

[ linapple ~ # ntpdate time.ethz.ch
17 Mar 16:11:00 ntpdate[21647]: step time server 129.132.97.15 offset
-25169.568464 sec
[ linapple ~ # date
Thu Mar 17 16:11:02 CET 2005
[ linapple ~ # hwclock --show
time in rtc is Thu Mar 17 23:10:37 2005
[ linapple ~ # date
Thu Mar 17 23:10:41 CET 2005


[ linapple ~ # hwclock --show sets the clock to the hwclcok, just
hwclcok does the same. I also cannot set the hwclock (--systohc).

-- System Information:
Debian Release: 3.1
  APT prefers testing
  APT policy: (500, 'testing')
Architecture: powerpc (ppc)
Kernel: Linux 2.6.8-powerpc
Locale: LANG=en_US, LC_CTYPE=en_US (charmap=ISO-8859-1)

Versions of packages kernel-image-2.6.8-powerpc depends on:
ii  initrd-tools  0.1.77 tools to create initrd image for p
ii  mkvmlinuz 13 create a kernel to boot a PowerPC 
ii  module-init-tools 3.2-pre1-2 tools for managing Linux kernel mo

-- no debconf information


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Bug#299567: lots o space

2005-03-17 Thread dann frazier
On Mon, 2005-03-14 at 22:16 -0800, Matt Taggart wrote:
 dann frazier writes...
 
  fyi, I have a patch to the kernel-image build system that would spit out
  a separate package w/ a debug kernel image  module set under /usr/lib.
  I did this in the 2.4.25 timeframe, and I was getting ~204M debug
  packages per flavor.  I don't know how big it would be for just the
  image (no modules).
 
 dannf, I assume flavor means each kernel-image source package and the 
 various kernel-image packages it delivers?

Yeah.

 That seems like quite a burden for the archive. I can think of a couple ways 
 to handle this,
 
 1) implement debug packages in the packaging, but don't build them as part of 
 the default build target. Put instructions in the source on which rule to use 
 to build your own. The oprofile package could refer users to these. This 
 would 
 mean each user who wanted them would need to build them which sucks, but this 
 is easily implemented.

Not a bad idea - seems like the initial support could go into kernel
package, and we could honor the DEB_BUILD_OPTIONS=debug env var.

-- 
dann frazier [EMAIL PROTECTED]



-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Bug#299865: CAN-2005-0736: Boundary condition error in sys_epoll_wait

2005-03-17 Thread Joey Hess
Geoff Crompton wrote:
 Package: kernel-source-2.6.8
 Version: 2.6.8-13
 Severity: critical
 Justification: root security hole
 
 There is a local integer overflow vulnerability in the sys_epoll_wait()
 call. See following for detail:
 http://www.securityfocus.com/bid/12763/
 
 Apologies if already reported.

This was already fixed in 2.6.8-14, although AFAIK we've get to get
the kernel-images built from it.

-- 
see shy jo


signature.asc
Description: Digital signature


Bug#299875: ppp: out-of-memory 30min after LCP terminated by peer

2005-03-17 Thread Christian Kujau
Justin Pryzby wrote:
 I assume that you have seen this:
   http://kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.11.4

yes i have*now*. obviously this was a security issue (CAN-2005-0384)
and i *guess* that's why the issue was not discussed in public. what pity
and what a waste of time in tracking this down when the security guys are
already on it and release a fix out-of-the-box.

 If not .. tag patch:)  In less than 100 lines, even!

yes, 2.6.11.4 is out including this fix. Marco d'Itri commented:

 Paul Mackerras says that this bug affects all kernels (2.4 and 2.6) and
 can be easily triggered remotely, but is only a CPU DoS.
--^

actually my problem was *not* about a CPU DoS but a (out-of)memory DoS.
cpu was spinning normally. and i was not able to tell the exact kernel
version when the problem started - instead my research led to the
assumption that the new ppp package was to blame.

well, i'm already compiling 2.6.11.4, i'll see what it gives.

thank you for your concern,
Christian.
-- 
BOFH excuse #188:

..disk or the processor is on fire.


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



HiSax/Kernel patch for ISDN card SITECOM PCI DC-105V2

2005-03-17 Thread Philippe Oerthel
Hello,

I have had some difficulties to get my ISDN card running (SITECOM PCI 
DC-105V2). Rasca [EMAIL PROTECTED], give me a useful solution :

http://mpx.freeshell.net/sitecom_dc105v2.html  :




Step by Step
The files you have to modify (from inside /usr/src): 
include/linux/pci_ids.h
drivers/isdn/hisax/config.c
drivers/isdn/hisax/hfc_pci.c
In pci_ids.h add the following two lines behind the line /* Vendors and
devices ..:
#define PCI_VENDOR_ID_SITECOM   0x182d
#define PCI_DEVICE_ID_DC105V2   0x3069

In config.c after the second appearance of the line #ifdef
CONFIG_HISAX_HFC_PCI add the line (you should see some kind of list
here):


{PCI_VENDOR_ID_SITECOM, PCI_DEVICE_ID_DC105V2, PCI_ANY_ID, PCI_ANY_ID},

In hfc_pci.c at the end of the id_list[] you have to add the following
line:


{PCI_VENDOR_ID_SITECOM, PCI_DEVICE_ID_DC105V2, Sitecom Europe B.V., DC-105 
V2},

And, of course ensure that in .config CONFIG_HISAX_HFC_PCI is
defined.. 
Recompile the kernel modules and install them. That's it. Now your
sitecom card should be recognized. 




I have try with a kernel image using kernel-source-2.4.27 (2.4.27-8), 
and it works.

Rasca told me that he has informed the HiSax team, but It would be great
to already have this patch in sarge (kernel-source / kernel-image).


Kind Regards

Philippe Oerthel


Some infos :

Linux version 2.4.27 ([EMAIL PROTECTED]) (version gcc 3.3.4 (Debian 
1:3.3.4-13)) #1 sam fév 26 22:57:40 CET 2005


:00:11.0 Network controller: SiteCom Europe BV ISDN PCI DC-105V2 
(rev 02)
Subsystem: SiteCom Europe BV ISDN PCI DC-105V2
Flags: bus master, medium devsel, latency 16, IRQ 10
I/O ports at fff0 [disabled] [size=8]
Memory at fff7f800 (32-bit, non-prefetchable) [size=256]
Capabilities: [40] Power Management version 1

HiSax: Linux Driver for passive ISDN cards
HiSax: Version 3.5 (module)
HiSax: Layer1 Revision 1.1.4.1
HiSax: Layer2 Revision 1.1.4.1
HiSax: TeiMgr Revision 1.1.4.1
HiSax: Layer3 Revision 1.1.4.1
HiSax: LinkLayer Revision 1.1.4.1
HiSax: Approval certification failed because of
HiSax: unauthorized source code changes
HiSax: Total 1 card defined
HiSax: Card 1 Protocol EDSS1 Id=line0 (0)
HiSax: HFC-PCI driver Rev. 1.1.4.1
HiSax: HFC-PCI card manufacturer: Sitecom Europe B.V. card name: DC-105
V2
HiSax: DSS1 Rev. 1.1.4.1
HiSax: 2 channels added
HiSax: MAX_WAITING_CALLS added
HiSax: debugging flags card 1 set to 4
HiSax: debugging flags card 1 set to 4
HiSax: debugging flags card 1 set to 4
HiSax: debugging flags card 1 set to 4
HiSax: debugging flags card 1 set to 4








Re: 2.6.11-1 status, ready for an upload this WE ?

2005-03-17 Thread Horms
On Fri, Mar 11, 2005 at 03:50:59PM +0100, Sven Luther wrote:
 Hello,
 
 I have looked at the 2.6.11 kernel status again, and it seems to me that from
 the remaining TODO items of the 2.6.10-2.6.11 porting, we had the following
 things still on TODO :
 
   1) the ia64 patch. Those will be dropped and new patches need to be
   provided. that can happen post -1 though, especially as there was no
   activity from the ia64 kernel guys yet.
 
   2) tg3 firmware pruning, and other stuff relative to the non-free firmware
   issue.
 
 And naturally any other stuff we would see happening, but none are really
 important as to block -1 i think.
 
 So i would like that we aim at a 2.6.11-1 upload somewhen this WE, maybe on
 sunday, does this sound possible ? Who is ready to upload 2.6.11-1
 kernel-images ? I will be able to provide powerpc images together with the
 kernel-source upload.
 
 Also, since this is not a sarge candidate kernel, the consensus on irc seems
 to be to not continue with the firmware module pruning, but to drop the
 modules altogether, and package them in non-free.
 
 I would suggest that we go at this in two ways, with maybe a temporary
 non-freeness in main :
 
   1) we package the plain 2.6.11 as provided by upstream in main and upload
   it. Those non-free firmware blobs are for the most part in main already, and
   it seems the RM (well ex-RM but he was RM back then), said that it was
   acceptable for sarge, so ...

Doesn't that mean that the non-free bits will live in the orig.tar.gz
forever? Is this a problem? If not is it a problem not to prune them
from the tree later, rather just not compile them?

-- 
Horms


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Re: Kernel files in Testing that probably shouldn't be there

2005-03-17 Thread Horms
Indeed they should not be there.
I guess the best thing to do is to file
a bug against the archive and then ping one 
of the ftp-masters.

On Fri, Mar 11, 2005 at 12:43:34PM -0600, Jeffrey Austen wrote:
 I noticed several kernel files in testing which probably should not be 
 there. Here is a list of files and reasons.
 
 === Missing kernel source 2.4.19
 kernel-patch-2.4.19-arm (20031211)   [1]
 
 === Missing kernel source 2.6.10
 kernel-headers-2.6.10-1 (2.6.10-1)
 kernel-headers-2.6.10-1-32 (2.6.10-1)
 kernel-headers-2.6.10-1-32-smp (2.6.10-1)
 kernel-headers-2.6.10-1-64 (2.6.10-1)
 kernel-headers-2.6.10-1-64-smp (2.6.10-1)
 kernel-headers-2.6.10-1-generic (2.6.10-1)
 kernel-headers-2.6.10-1-s390 (2.6.10-2)
 kernel-headers-2.6.10-1-s390x (2.6.10-2)
 kernel-headers-2.6.10-1-smp (2.6.10-1)
 kernel-image-2.6.10-1-32 (2.6.10-1)
 kernel-image-2.6.10-1-32-smp (2.6.10-1)
 kernel-image-2.6.10-1-64 (2.6.10-1)
 kernel-image-2.6.10-1-64-smp (2.6.10-1)
 kernel-image-2.6.10-1-generic (2.6.10-1)
 kernel-image-2.6.10-1-s390 (2.6.10-2)
 kernel-image-2.6.10-1-s390-tape (2.6.10-2)
 kernel-image-2.6.10-1-s390x (2.6.10-2)
 kernel-image-2.6.10-1-smp (2.6.10-1)
 kernel-patch-2.6.10-hppa (2.6.10-1)   [2]
 kernel-patch-2.6.10-s390 (2.6.10-2)   [2]
 
 [1] mentioned in http://lists.debian.org/debian-kernel/2005/02/msg00552.html
 [2] mentioned in http://lists.debian.org/debian-devel/2005/03/msg00512.html
 
 Jeff
 
 
 -- 
 To UNSUBSCRIBE, email to [EMAIL PROTECTED]
 with a subject of unsubscribe. Trouble? Contact 
 [EMAIL PROTECTED]

On Fri, Mar 11, 2005 at 12:52:08PM -0600, Jeffrey Austen wrote:
 I noticed several kernel files in unstable which probably should not be 
 there. Here is a list of files and reasons.
 
 === Missing kernel source 2.4.19
 kernel-patch-2.4.19-arm (20031211)
 
 === Missing kernel source 2.6.9
 kernel-headers-2.6.9-9 (2.6.9-4)
 kernel-headers-2.6.9-9-amd64-generic (2.6.9-4)
 kernel-headers-2.6.9-9-amd64-k8 (2.6.9-4)
 kernel-headers-2.6.9-9-amd64-k8-smp (2.6.9-4)
 kernel-headers-2.6.9-9-em64t-p4 (2.6.9-4)
 kernel-headers-2.6.9-9-em64t-p4-smp (2.6.9-4)
 kernel-image-2.6.9-9-amd64-generic (2.6.9-4)
 kernel-image-2.6.9-9-amd64-k8 (2.6.9-4)
 kernel-image-2.6.9-9-amd64-k8-smp (2.6.9-4)
 kernel-image-2.6.9-9-em64t-p4 (2.6.9-4)
 kernel-image-2.6.9-9-em64t-p4-smp (2.6.9-4)
 
 Jeff
 
 
 -- 
 To UNSUBSCRIBE, email to [EMAIL PROTECTED]
 with a subject of unsubscribe. Trouble? Contact 
 [EMAIL PROTECTED]


-- 
Horms


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Re: kernel-image-2.6.10-1-686-smp and kernel-image-2.6.10-9-amd64-k8-smp don't boot on dual-opteron

2005-03-17 Thread Horms
On Sat, Mar 12, 2005 at 10:42:41AM +0100, Bernd Herd wrote:
 Hallo,
 
 I'm running a dual-opteron box Celsius V810 with testing 
 kernel-image-2.6.8-2-686-smp  and kernel-image-2.6.8-10-amd64-k8-smp 
 does also work (just that X cannot find the mouse before I do cp -a 
 /.dev/psaux /dev/psaux.
 
 But both 2.8.10 smp Packages crash immediatly within a second after 
 loading the kernel. Somethink like killing interrupt handler.
 
 The powernow-k8 module does not work so I wanted to try the 2.6.10 
 Kernel to see if it is fixed.
 
 I don't feel an urging need to switch to 2.6.10, but since those 
 problems are not in the error database I thought I'd ask what to do 
 about it.
 
 I'm not reading this mailing list, so please CC on my E-Mail address.

Currently there is an effort to get a 2.6.11 package together.
Its in SVN for the game. Though I am not sure what the status
of the amd64 bits are.

-- 
Horms


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Bug#299204: This was broken by 06_ptrace-fix.dpatch

2005-03-17 Thread Horms
On Sun, Mar 13, 2005 at 05:38:33AM +0100, Thiemo Seufer wrote:
 tags 299204 +confirmed
 reassign 299204 kernel-patch-2.4.27-mips
 thanks
 
 This bug is generic for all debian mips/mipsel 2.4.27 kernels, caused
 by a broken patch. A fixed version is available in the debian-kernel
 SVN, I plan to wait with an upload for the updated debian source
 (2.4.27-9).

FYI, I am progressing on the kernel-source aspect of that upload, slowly.

-- 
Horms


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Bug#300162: [CAN-2004-1191]: Improper command checking for CDs, allowing local users to conduct unauthorized writes to firmware

2005-03-17 Thread Micah Anderson
Package: kernel-source-2.6.8
Version: 2.6.8-14
Severity: normal
Tags: security patch

Hello,

CAN-2004-1190 reads:

SUSE Linux before 9.1 and SUSE Linux Enterprise Server before 9 do not
properly check commands sent to CD devices that have been opened
read-only, which could allow local users to conduct unauthorized write
activities to modify the firmware of associated SCSI devices. 

The Suse Advisory is here:
http://www.novell.com/linux/security/advisories/2004_42_kernel.html

It unfortunately doesn't provide much detail, so I have been in
contact with the Suse security team to track down what this is, and
how they fixed it.

Apparantly there was a patched introduced in 2.6.8 to avoid firmware
overwrites happening with read-only opened /dev/cdrom devices. Some
burner programs opened those devices with O_RDONLY but then started to
burn or blank the CDs, but the more severe problem is that
unpriviledged users could destroy the firmware of SCSI related
devices, rendering the devices completely useless.

Although the fix was put into 2.6.8, it was found afterwards that
these were not a complete solution to the security problem, so there
were bug fixes done in later patches. Version 2.6.10 is completely
fixed, but there are some missing patches from 2.6.8 that leave this
unfixed in our 2.6.8, as far as I can determine.

According to the Suse security people, the details in the chagelog at
this location show what needs to be patched:

http://linux.bkbits.net:8080/linux-2.6/hist/drivers/block/scsi_ioctl.c

along with the thread on this subject here:

http://groups-beta.google.com/group/linux.kernel/browse_frm/thread/5cfe44b11c8a99c5/ed58b3d4b1cfa39b?q=scsi_ioctl+firmware#ed58b3d4b1cfa39b

Taking these two, I've compared our kernel-source-2.6.8 tree and found
that the following patches should be applied:

http://linux.bkbits.net:8080/linux-2.6/diffs/drivers/block/[EMAIL 
PROTECTED]/drivers/block/scsi_ioctl.c
http://linux.bkbits.net:8080/linux-2.6/diffs/drivers/block/[EMAIL 
PROTECTED]/drivers/block/scsi_ioctl.c
http://linux.bkbits.net:8080/linux-2.6/diffs/drivers/block/[EMAIL 
PROTECTED]/drivers/block/scsi_ioctl.c
http://linux.bkbits.net:8080/linux-2.6/diffs/drivers/block/[EMAIL 
PROTECTED]/drivers/block/scsi_ioctl.c

I should note that I do not fully understand this issue, I simply have
done the legwork to determine that these patches have not been applied
to kernel-source-2.6.8 and that according to Suse, the last relevant
patch for this issue is the 1.61 revision patch (the last one in the
list of four above). 

N.B.: There is one changeset in the bkbits.net site from 10 weeks ago, that has 
the
changelog entry, fix exploitable hole -- according to Suse, this is
misleading and incorrect (and is not included in the patches above).

Micah


-- System Information:
Debian Release: 3.1
  APT prefers unstable
  APT policy: (300, 'unstable')
Architecture: i386 (i686)
Kernel: Linux 2.6.10-1-k7
Locale: LANG=en_US.UTF-8, LC_CTYPE=en_US.UTF-8 (charmap=UTF-8)

Versions of packages kernel-source-2.6.8 depends on:
ii  binutils  2.15-5 The GNU assembler, linker and bina
ii  bzip2 1.0.2-5high-quality block-sorting file co
ii  coreutils [fileutils] 5.2.1-2The GNU core utilities
ii  fileutils 5.2.1-2The GNU file management utilities 

-- no debconf information


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Processed: retitle 300162 to [CAN-2004-1190]: Improper command checking for CDs, allowing local users to conduct unauthorized writes to firmware

2005-03-17 Thread Debian Bug Tracking System
Processing commands for [EMAIL PROTECTED]:

 # Automatically generated email from bts, devscripts version 2.8.11
 retitle 300162 [CAN-2004-1190]: Improper command checking for CDs, allowing 
 local users to conduct unauthorized writes to firmware
Bug#300162: [CAN-2004-1191]: Improper command checking for CDs, allowing local 
users to conduct unauthorized writes to firmware
Changed Bug title.


End of message, stopping processing here.

Please contact me if you need assistance.

Debian bug tracking system administrator
(administrator, Debian Bugs database)


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Bug#300163: [CAN-2004-1191]: Race condition could allow local users to read unauthorized memory from foreign memory pages.

2005-03-17 Thread Micah Anderson
Package: kernel-source-2.6.8
Version: 2.6.8-14
Severity: normal
Tags: security patch

CAN-2004-1191 reads:

Race condition ... when run on SMP systems that have more than 4GB of
memory, could allow local users to read unauthorized memory from
foreign memory pages. Apparantly it also allows remote attackers to
obtain sensitive information, caused by a vulnerability in the
smb_recv_trans2 function, could also send a specially-crafted TRANS2
SMB packet to cause a kernel memory leak.

More information about this is here:
http://www.novell.com/linux/security/advisories/2004_42_kernel.html
http://xforce.iss.net/xforce/xfdb/18137

2.6.8 needs both these patches:
http://linux.bkbits.net:8080/linux-2.6/[EMAIL PROTECTED]@1.1938.197.15
http://linux.bkbits.net:8080/linux-2.6/cset%4041e9a86bi4MvUzMJ8Ru62gdkFgHKtg

The second patch has been applied to Debian's kernel-source-2.6.8, but
the first is also needed.

Micah

-- System Information:
Debian Release: 3.1
  APT prefers unstable
  APT policy: (300, 'unstable')
Architecture: i386 (i686)
Kernel: Linux 2.6.10-1-k7
Locale: LANG=en_US.UTF-8, LC_CTYPE=en_US.UTF-8 (charmap=UTF-8)

Versions of packages kernel-source-2.6.8 depends on:
ii  binutils  2.15-5 The GNU assembler, linker and bina
ii  bzip2 1.0.2-5high-quality block-sorting file co
ii  coreutils [fileutils] 5.2.1-2The GNU core utilities
ii  fileutils 5.2.1-2The GNU file management utilities 

-- no debconf information


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Re: 2.6.11-1 status, ready for an upload this WE ?

2005-03-17 Thread Sven Luther
On Thu, Mar 17, 2005 at 05:09:38PM +0900, Horms wrote:
 On Fri, Mar 11, 2005 at 03:50:59PM +0100, Sven Luther wrote:
1) we package the plain 2.6.11 as provided by upstream in main and upload
it. Those non-free firmware blobs are for the most part in main already, 
  and
it seems the RM (well ex-RM but he was RM back then), said that it was
acceptable for sarge, so ...
 
 Doesn't that mean that the non-free bits will live in the orig.tar.gz
 forever? Is this a problem? If not is it a problem not to prune them
 from the tree later, rather just not compile them?

I am not sure, let's do the right thing with 2.6.11 and remove them, since i
doubt we can change 2.6.8 for now anyway.

Friendly,

Sven Luther


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]