Mark Hindley <[email protected]>
to [email protected]
.
Full text available.Received: (at 430) by bugs.devuan.org; 25 Apr 2020 17:10:03 +0000 Return-Path: <[email protected]> Delivered-To: [email protected] Received: from tupac3.dyne.org [195.169.149.119] by doc.devuan.org with IMAP (fetchmail-6.4.0.beta4) for <debbugs@localhost> (single-drop); Sat, 25 Apr 2020 17:10:03 +0000 (UTC) Received: from mx.hindley.org.uk (mohindley.plus.com [81.174.245.179]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by vm6.ganeti.dyne.org (Postfix) with ESMTPS id 818F0F60A42 for <[email protected]>; Sat, 25 Apr 2020 19:01:39 +0200 (CEST) Received: from apollo.hindleynet ([192.168.1.3] helo=hindley.org.uk) by mx.hindley.org.uk with smtp (Exim 4.84_2) (envelope-from <[email protected]>) id 1jSOBN-0004sf-Ex; Sat, 25 Apr 2020 18:01:37 +0100 Received: (nullmailer pid 25688 invoked by uid 1000); Sat, 25 Apr 2020 17:01:37 -0000 Date: Sat, 25 Apr 2020 18:01:37 +0100 From: Mark Hindley <[email protected]> To: [email protected], Brian <[email protected]> Subject: Re: ax.25 on kernels above 4.1 Message-ID: <[email protected]> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <1587829938.5468.38.camel@Asus> X-Debbugs-No-Ack: No Thanks X-IMAPbase: 1220827534 0000000207 X-UID: 207 User-Agent: Mutt/1.10.1 (2018-07-13) X-Spam-Status: No, score=0.0 required=5.0 tests=FAKE_REPLY_C,SPF_PASS autolearn=disabled version=3.4.2 X-Spam-Checker-Version: SpamAssassin 3.4.2 (2018-09-13) on tupac3.dyne.org Control: tags -1 debian On Sat, 25 Apr 2020 11:52:18 -0400 Brian <[email protected]> wrote: > Package: linux-image > Version: all above 4.1 Brian, Thanks for this. However the linux kernel packages are not forked in Devuan and we use the Debian packages directly. You would be better reporting this to bugs.debian.org. Thanks Mark
[email protected], [email protected]
:bug#430
; Package linux-image
.
Full text available.Received: (at submit) by bugs.devuan.org; 25 Apr 2020 16:00:02 +0000 Return-Path: <[email protected]> Delivered-To: [email protected] Received: from tupac3.dyne.org [195.169.149.119] by doc.devuan.org with IMAP (fetchmail-6.4.0.beta4) for <debbugs@localhost> (single-drop); Sat, 25 Apr 2020 16:00:02 +0000 (UTC) Received: from n1uro.ampr.org (n1uro.ampr.org [44.88.0.9]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by vm6.ganeti.dyne.org (Postfix) with ESMTPS id 83D26F60BEB for <[email protected]>; Sat, 25 Apr 2020 17:52:22 +0200 (CEST) Received: from n1uro.ampr.org (n1uro [44.88.0.9]) by n1uro.ampr.org (Postfix) with ESMTP id 13D4425FD8 for <[email protected]>; Sat, 25 Apr 2020 11:52:19 -0400 (EDT) Received: from [44.88.0.6] (portland.n1uro.ampr.org [44.88.0.6]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by n1uro.ampr.org (Postfix) with ESMTPS id CE34725EB6 for <[email protected]>; Sat, 25 Apr 2020 11:52:18 -0400 (EDT) Message-ID: <1587829938.5468.38.camel@Asus> Subject: ax.25 on kernels above 4.1 From: Brian <[email protected]> Reply-To: [email protected] To: [email protected] Date: Sat, 25 Apr 2020 11:52:18 -0400 Organization: Amateur Radio Services Content-Type: text/plain; charset="UTF-8" X-Mailer: Evolution 3.4.4-3 Mime-Version: 1.0 Content-Transfer-Encoding: 7bit X-AV-Checked: ClamAV using ClamSMTP X-Spam-Status: No, score=-0.7 required=5.0 tests=RCVD_IN_DNSWL_LOW, SPF_HELO_PASS,SPF_PASS autolearn=disabled version=3.4.2 X-Spam-Checker-Version: SpamAssassin 3.4.2 (2018-09-13) on tupac3.dyne.org Package: linux-image Version: all above 4.1 There's a critical bug in the ax.25 module that popped up beginning with kernel version 4.2 where if a user connected to a site using NetRom, the underlaying ax.25 virtual circuit fails to close thus leaving a zombie socket open and available for possible attack. This has been a known issue on the URONode email list for quite some time, and I'm the developer of the uronode package in your repositories. A fix was supplied by Marius YO2LOJ on the list: --- Let me explain the patch so maybe you can do it yourself, since the code will probably not work on a 5.x kernel... The target function is ax25_disconnect(ax25_cb *ax25, int reason). The function is in the file ax25_subr.c in the 4.9 version. the last part is an: if (ax25->sk != NULL) { (...the ax25 socket is closed here...) } This if catches only full ax25 connections, not the ones associated with netrom connections. So for netrom connections, we also need a socket deletion, so add to this if the following else: else { ax25_destroy_socket(ax25); } Maybe this helps get you going... Marius, YO2LOJ --- A weblink to his mail: https://n1uro.ampr.org/cgi-bin/mailman/private/uronode/2019-September/001284.html however it's only available to subscribers. -- If Confucius were alive today: "A computing device left in the OFF power state never crashes" ----- 73 de Brian N1URO IPv6 Certified SMTP: n1uro-at-n1uro.ampr.org
[email protected]
:[email protected]
.
Your message had a Version: pseudo-header with an invalid package version:
all above 4.1
please either use found or fixed to the control server with a correct version, or reply to this report indicating the correct version so the maintainer (or someone else) can correct it for you.
Full text available.
[email protected], [email protected]
:bug#430
; Package linux-image
.
Full text available.Devuan BTS -- Powered by Debian bug tracking system
Copyright (C) 1999 Darren O. Benham,
1997 nCipher Corporation Ltd,
1994-97 Ian Jackson.
Devuan Bugs Owner <[email protected]>.
Last modified:
Thu, 28 Nov 2024 06:39:01 UTC