lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <YVBYfQY94j7K39qc@kroah.com>
Date:   Sun, 26 Sep 2021 13:24:45 +0200
From:   Greg Kroah-Hartman <gregkh@...uxfoundation.org>
To:     Jari Ruusu <jariruusu@...tonmail.com>
Cc:     Salvatore Bonaccorso <carnil@...ian.org>,
        Sasha Levin <sashal@...nel.org>, linux-kernel@...r.kernel.org,
        stable@...r.kernel.org, Jiri Slaby <jirislaby@...nel.org>,
        Mauro Carvalho Chehab <mchehab+huawei@...nel.org>,
        Linus Torvalds <torvalds@...ux-foundation.org>,
        Aurelien Jarno <aurelien@...el32.net>
Subject: Re: glibc VETO for kernel version SUBLEVEL >= 255

On Sun, Sep 26, 2021 at 10:58:59AM +0000, Jari Ruusu wrote:
> On Sunday, September 26th, 2021 at 12:29, Greg Kroah-Hartman <gregkh@...uxfoundation.org> wrote:
> > On Sun, Sep 26, 2021 at 10:10:53AM +0200, Salvatore Bonaccorso wrote:
> > > Recently prompted due to https://bugs.debian.org/987266 the check was
> > > removed in the postinst script of libc in Debian:
> > > https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=987266 .
> >
> > Wonderful, thanks for pointing this out!
> > Jari, try asking whatever distro you are getting these rebuilt packages
> > from to update their scripts and all should be good.
> 
> It is/was mostly self-inflicted pain, using Rasbian distro userland and
> self-compiled kernel.org kernel.

Why use an older kernel tree on this device?  Rasbian seems to be on
4.19.y at the least right now, is there something in those older kernel
trees that you need?

thanks,

greg k-h

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ