Source: linux
Version: 6.7.7-1
Severity: grave
Justification: user security hole
Dear Maintainer,
(Opting for grave/usersec because naturally updated kernels
fix security vulnerabilities, but actually i think i can't update the
kernel and that's grave, security be damned.)
Observe:
$ sudo
Hello,
I made a test where I specified an empty field for --tpm2-pcrs instead
of default 7 and the luks partition is decrypted with the tpm.
I also made some test with other PCR values (1, 0) and it fails.
It seems to be related to the PCR binding and linux-image-6.7.7-amd64
since this problem
Processing commands for cont...@bugs.debian.org:
> retitle 1024149 linux: CVE-2024-26621: 32-bit mmap() puts large files at
> non-random address
Bug #1024149 {Done: Salvatore Bonaccorso } [src:linux]
linux-image-amd64: 32-bit mmap() puts large files at non-random address
Changed Bug title to
Processing commands for cont...@bugs.debian.org:
> # fixed with 4ef9ad19e176 mm: huge_memory: don't force huge page alignment on
> 32 bit
> close 1024149 6.7.7-1
Bug #1024149 [src:linux] linux-image-amd64: 32-bit mmap() puts large files at
non-random address
Marked as fixed in versions
On Mon, 4 Mar 2024 13:54:49 +0100 Bastian Blank
wrote:
> On Mon, Mar 04, 2024 at 11:28:12AM +, Luca Boccassi wrote:
> > > But we where talking about kernel modules.
> > There are kernel modules using BPF stuff? Never seen one, do you
have
> > an example?
>
> No idea, but they get linked BTF
Hi,
initramfs-tools hasn't seen an upload since 2022-07-12 and has several
open merge requests without response. Since I am maintaining initramfs-
tools in Ubuntu, I offer my help on initramfs-tools in Debian. In case I
became uploader, I would merge the fixes and uncontroversial changes and
cut
6 matches
Mail list logo