Your message dated Tue, 23 Feb 2010 20:20:24 +0000
with message-id <[email protected]>
and subject line Bug#529165: fixed in user-mode-linux 2.6.18-1um-2etch.26etch2
has caused the Debian Bug report #529165,
regarding OOPS in bridging code
to be marked as done.
This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.
(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact [email protected]
immediately.)
--
529165: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=529165
Debian Bug Tracking System
Contact [email protected] with problems
--- Begin Message ---
Package: linux-2.6
Version: 2.6.18-1
Severity: important
Commit a10d567c89dfba90dde2e0515e25760fd74cde06 fixes an oops, which
was leading to crashes in a larger Xen environment.
Red Hat included the patch in one of their 2.6.18 kernels as well,
but I'm currently unable to find the Bugzilla ID.
It's already fixed upstream in our 2.6.24 and 2.6.26 stable kernels.
Cheers,
Moritz
-- System Information:
Debian Release: squeeze/sid
APT prefers unstable
APT policy: (500, 'unstable')
Architecture: i386 (i686)
Kernel: Linux 2.6.29-2-686 (SMP w/1 CPU core)
Locale: LANG=C, lc_ctype=de_de.iso-8859...@euro (charmap=ISO-8859-15)
Shell: /bin/sh linked to /bin/bash
--- End Message ---
--- Begin Message ---
Source: user-mode-linux
Source-Version: 2.6.18-1um-2etch.26etch2
We believe that the bug you reported is fixed in the latest version of
user-mode-linux, which is due to be installed in the Debian FTP archive:
user-mode-linux_2.6.18-1um-2etch.26etch2.diff.gz
to main/u/user-mode-linux/user-mode-linux_2.6.18-1um-2etch.26etch2.diff.gz
user-mode-linux_2.6.18-1um-2etch.26etch2.dsc
to main/u/user-mode-linux/user-mode-linux_2.6.18-1um-2etch.26etch2.dsc
user-mode-linux_2.6.18-1um-2etch.26etch2_i386.deb
to main/u/user-mode-linux/user-mode-linux_2.6.18-1um-2etch.26etch2_i386.deb
A summary of the changes between this version and the previous one is
attached.
Thank you for reporting the bug, which will now be closed. If you
have further comments please address them to [email protected],
and the maintainer will reopen the bug report if appropriate.
Debian distribution maintenance software
pp.
dann frazier <[email protected]> (supplier of updated user-mode-linux package)
(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing [email protected])
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
Format: 1.7
Date: Mon, 22 Feb 2010 18:16:29 -0700
Source: user-mode-linux
Binary: user-mode-linux
Architecture: source i386
Version: 2.6.18-1um-2etch.26etch2
Distribution: oldstable-security
Urgency: high
Maintainer: User Mode Linux Maintainers <[email protected]>
Changed-By: dann frazier <[email protected]>
Description:
user-mode-linux - User-mode Linux (kernel)
Closes: 520034 529165 562525
Changes:
user-mode-linux (2.6.18-1um-2etch.26etch2) oldstable-security; urgency=high
.
* Rebuild against linux-source-2.6.18_2.6.18.dfsg.1-26etch2:
* [s390] Revert syscall wrapping of execve() - 2.6.18 still
has some in-kernel callers which bollocks up pt_regs.
(Closes: #562525)
* [SCSI] gdth: Prevent negative offsets in ioctl (CVE-2009-3080)
* NFSv4: Fix a problem whereby a buggy server can oops the kernel
(CVE-2009-3726)
* isdn: hfc_usb: Fix read buffer overflow (CVE-2009-4005)
* hfs: fix a potential buffer overflow (CVE-2009-4020)
* fuse: prevent fuse_put_request on invalid pointer (CVE-2009-4021)
* e1000: enhance frame fragment detection (CVE-2009-4536)
* netfilter: ebtables: enforce CAP_NET_ADMIN (CVE-2010-0007)
* connector: Delete buggy notification code. (CVE-2010-0410)
* Fix potential crash with sys_move_pages (CVE-2010-0415)
* futex: Handle user space corruption gracefully (CVE-2010-0622)
* [s390] Fix missing capability check in z90crypt driver (CVE-2009-1883)
* net ax25: Fix signed comparison in the sockopt handler (CVE-2009-2909)
* fix information leak in llc_ui_getname (CVE-2009-3001)
* net: fix information leak due to uninitialized structures in
getname functions (CVE-2009-3002)
* tc: Fix uninitialized kernel memory leak (CVE-2009-3228)
* random: make get_random_int() more random (CVE-2009-3238)
* NFSv4: fix open-create permissions, move iattr & verf attributes of
struct nfsd4_open out of the union (CVE-2009-3286)
* fs: pipe.c null pointer dereference (CVE-2009-3547)
* netlink: fix typo in initialization (CVE-2009-3612)
* AF_UNIX: Fix deadlock on connecting to shutdown socket (CVE-2009-3621)
* [mips/mipsel] Fix errno on inexistent syscalls. (Closes: #520034).
* bridge: Fix oops in port_carrier_check (closes: #529165)
Files:
c32b65bd3829d1d7349827e664cd9422 893 misc extra
user-mode-linux_2.6.18-1um-2etch.26etch2.dsc
c63ce16a717b7b40c92e8f3db5e9562b 20338 misc extra
user-mode-linux_2.6.18-1um-2etch.26etch2.diff.gz
c8263e70b1f6c46004502d2a561c5b3f 25603308 misc extra
user-mode-linux_2.6.18-1um-2etch.26etch2_i386.deb
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.10 (GNU/Linux)
iD8DBQFLg1EBhuANDBmkLRkRAj0TAJ0TwdGPWcVplcLjoCRHpuHOejLiQACeN/GS
j3MelIowjlOlADoYJE1UmVI=
=TqsM
-----END PGP SIGNATURE-----
--- End Message ---