Your message dated Sun, 10 May 2026 18:35:58 +0000
with message-id <[email protected]>
and subject line Bug#1135514: fixed in linux 6.1.170-3
has caused the Debian Bug report #1135514,
regarding icmp: detected local route for xx during ICMP sending (6.1.170-1 /
6.1.0-45-amd64, silent on 6.1.164-1 / 6.1.0-44-amd64)
to be marked as done.
This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.
(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact [email protected]
immediately.)
--
1135514: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1135514
Debian Bug Tracking System
Contact [email protected] with problems
--- Begin Message ---
Source: linux
Version: Regression introduced in 6.1.170-1 / 6.1.0-45-amd64
Severity: important
Dear Maintainer,
*** Reporter, please consider answering these questions, where appropriate ***
* What led up to the situation?
updating kernel via apt on 20260501
any ping from my host to a "down" host on my lan causes these messages to pile
up in the ring buffer
-- System Information:
Debian Release: 12.13
APT prefers oldstable-updates
APT policy: (500, 'oldstable-updates'), (500, 'oldstable-security'), (500,
'oldstable')
Architecture: amd64 (x86_64)
Foreign Architectures: i386
Kernel: Linux 6.1.0-44-amd64 (SMP w/4 CPU threads; PREEMPT)
Kernel taint flags: TAINT_FIRMWARE_WORKAROUND, TAINT_OOT_MODULE,
TAINT_UNSIGNED_MODULE
Locale: LANG=en_US.UTF-8, LC_CTYPE=en_US.UTF-8 (charmap=UTF-8), LANGUAGE not set
Shell: /bin/sh linked to /usr/bin/dash
Init: systemd (via /run/systemd/system)
LSM: AppArmor: enabled
--- End Message ---
--- Begin Message ---
Source: linux
Source-Version: 6.1.170-3
Done: Salvatore Bonaccorso <[email protected]>
We believe that the bug you reported is fixed in the latest version of
linux, which is due to be installed in the Debian FTP archive.
A summary of the changes between this version and the previous one is
attached.
Thank you for reporting the bug, which will now be closed. If you
have further comments please address them to [email protected],
and the maintainer will reopen the bug report if appropriate.
Debian distribution maintenance software
pp.
Salvatore Bonaccorso <[email protected]> (supplier of updated linux package)
(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing [email protected])
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512
Format: 1.8
Date: Fri, 08 May 2026 21:59:49 +0200
Source: linux
Architecture: source
Version: 6.1.170-3
Distribution: bookworm-security
Urgency: high
Maintainer: Debian Kernel Team <[email protected]>
Changed-By: Salvatore Bonaccorso <[email protected]>
Closes: 1135514
Changes:
linux (6.1.170-3) bookworm-security; urgency=high
.
* xfrm: esp: ipv4: fix up flags setting
* net: Fix icmp host relookup triggering ip_rt_bug (Closes: #1135514)
Checksums-Sha1:
38fd8c71b55be01dcd60e86d4511abbebc06d52a 399396 linux_6.1.170-3.dsc
9e84ce14c6ed41902623fc395b793c72dad2df55 1841740 linux_6.1.170-3.debian.tar.xz
374e15f800c75d978414af29fc2964bb6cbd3833 6992 linux_6.1.170-3_source.buildinfo
Checksums-Sha256:
03fb7bff881839fa29297adeade96dd8d7cd1edaaf2d03669220146d7a175478 399396
linux_6.1.170-3.dsc
25805b356526715f569ee3f0e123a567ff0791d68f097036b2dc7587f7c41c19 1841740
linux_6.1.170-3.debian.tar.xz
a4c5e66a4160ffb5b2e60782fb8fb8e7c2010e83b2efda1428ffe65d4fc4d90f 6992
linux_6.1.170-3_source.buildinfo
Files:
701b4c652c05897963f896753424a844 399396 kernel optional linux_6.1.170-3.dsc
7334f975f7ddf483e1e2705e3ff881ba 1841740 kernel optional
linux_6.1.170-3.debian.tar.xz
490f2205601370ec87d10bb700481e4f 6992 kernel optional
linux_6.1.170-3_source.buildinfo
-----BEGIN PGP SIGNATURE-----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=0xK1
-----END PGP SIGNATURE-----
pgpF7SnBTuZqp.pgp
Description: PGP signature
--- End Message ---