Your message dated Wed, 14 Jun 2006 03:47:10 -0700
with message-id <[EMAIL PROTECTED]>
and subject line Bug#228256: fixed in kernel-patch-exec-shield 1:2.6.16.0
has caused the attached Bug report to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what I am
talking about this indicates a serious mail system misconfiguration
somewhere.  Please contact me immediately.)

Debian bug tracking system administrator
(administrator, Debian Bugs database)

--- Begin Message ---
Package: kernel-patch-exec-shield
Version: 1:0.G4-2
Severity: wishlist

Exec shield should produce log message every time it kills process, just
like PaX does.  These logs make it easier to distinguish, which segfaults
would happen under normal kernel and which are specific to patched kernel,
especially when segfaults appear quite randomly.

th.

-- System Information:
Debian Release: testing/unstable
Architecture: i386
Kernel: Linux moche 2.4.24-debian #1 Sat Jan 17 16:50:12 CET 2004 i686
Locale: LANG=sk_SK, LC_CTYPE=sk_SK

Versions of packages kernel-patch-exec-shield depends on:
ii  bash                          2.05b-12   The GNU Bourne Again SHell
ii  grep-dctrl                    2.1.0      Grep Debian package information
ii  kernel-patch-acl              0.8.67-1   Extended attributes, and ACL kerne
ii  patch                         2.5.9-1    Apply a diff file to an original

-- no debconf information



--- End Message ---
--- Begin Message ---
Source: kernel-patch-exec-shield
Source-Version: 1:2.6.16.0

We believe that the bug you reported is fixed in the latest version of
kernel-patch-exec-shield, which is due to be installed in the Debian FTP 
archive:

kernel-patch-exec-shield_2.6.16.0.dsc
  to pool/main/k/kernel-patch-exec-shield/kernel-patch-exec-shield_2.6.16.0.dsc
kernel-patch-exec-shield_2.6.16.0.tar.gz
  to 
pool/main/k/kernel-patch-exec-shield/kernel-patch-exec-shield_2.6.16.0.tar.gz
kernel-patch-exec-shield_2.6.16.0_all.deb
  to 
pool/main/k/kernel-patch-exec-shield/kernel-patch-exec-shield_2.6.16.0_all.deb



A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to [EMAIL PROTECTED],
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Marcus Better <[EMAIL PROTECTED]> (supplier of updated kernel-patch-exec-shield 
package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing [EMAIL PROTECTED])


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Format: 1.7
Date: Wed, 14 Jun 2006 01:43:59 +0200
Source: kernel-patch-exec-shield
Binary: kernel-patch-exec-shield
Architecture: source all
Version: 1:2.6.16.0
Distribution: unstable
Urgency: low
Maintainer: Marcus Better <[EMAIL PROTECTED]>
Changed-By: Marcus Better <[EMAIL PROTECTED]>
Description: 
 kernel-patch-exec-shield - protection against stack smashing and other attacks
Closes: 228256
Changes: 
 kernel-patch-exec-shield (1:2.6.16.0) unstable; urgency=low
 .
   * New upstream patch for 2.6.16. Highlights:
     - New print-fatal signals kernel parameter. (Closes: 228256)
   * Bump standards-version to 3.7.2.
Files: 
 1e2e81072458da61b8d11f0fc1bee345 582 devel extra 
kernel-patch-exec-shield_2.6.16.0.dsc
 ac15749385d564e35090667b98a352b7 103678 devel extra 
kernel-patch-exec-shield_2.6.16.0.tar.gz
 c8bc90cc246406da927beff47b6fe099 107616 devel extra 
kernel-patch-exec-shield_2.6.16.0_all.deb

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.3 (GNU/Linux)

iD8DBQFEj+bdNFDtUT/MKpARAo3PAKC7W+pOhs59FuUuuxz1JxH1TCZwsgCgl1b0
ZJ0/1lHKYRFfDqsntn2evZY=
=0/ZU
-----END PGP SIGNATURE-----


--- End Message ---

Reply via email to