[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

Bug#529165: marked as done (OOPS in bridging code)



Your message dated Tue, 23 Feb 2010 19:55:02 +0000
with message-id <E1Nk0qU-0003wa-Fr@ries.debian.org>
and subject line Bug#529165: fixed in fai-kernels 1.17+etch.26etch2
has caused the Debian Bug report #529165,
regarding OOPS in bridging code
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact owner@bugs.debian.org
immediately.)


-- 
529165: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=529165
Debian Bug Tracking System
Contact owner@bugs.debian.org with problems
--- Begin Message ---
Package: linux-2.6
Version: 2.6.18-1
Severity: important

Commit a10d567c89dfba90dde2e0515e25760fd74cde06 fixes an oops, which
was leading to crashes in a larger Xen environment.

Red Hat included the patch in one of their 2.6.18 kernels as well,
but I'm currently unable to find the Bugzilla ID.

It's already fixed upstream in our 2.6.24 and 2.6.26 stable kernels.

Cheers,
        Moritz

-- System Information:
Debian Release: squeeze/sid
  APT prefers unstable
  APT policy: (500, 'unstable')
Architecture: i386 (i686)

Kernel: Linux 2.6.29-2-686 (SMP w/1 CPU core)
Locale: LANG=C, LC_CTYPE=de_DE.ISO-8859-15@euro (charmap=ISO-8859-15)
Shell: /bin/sh linked to /bin/bash



--- End Message ---
--- Begin Message ---
Source: fai-kernels
Source-Version: 1.17+etch.26etch2

We believe that the bug you reported is fixed in the latest version of
fai-kernels, which is due to be installed in the Debian FTP archive:

fai-kernels_1.17+etch.26etch2.dsc
  to main/f/fai-kernels/fai-kernels_1.17+etch.26etch2.dsc
fai-kernels_1.17+etch.26etch2.tar.gz
  to main/f/fai-kernels/fai-kernels_1.17+etch.26etch2.tar.gz
fai-kernels_1.17+etch.26etch2_i386.deb
  to main/f/fai-kernels/fai-kernels_1.17+etch.26etch2_i386.deb



A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 529165@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
dann frazier <dannf@debian.org> (supplier of updated fai-kernels package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmaster@debian.org)


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Format: 1.7
Date: Mon, 22 Feb 2010 18:12:45 -0700
Source: fai-kernels
Binary: fai-kernels
Architecture: source i386
Version: 1.17+etch.26etch2
Distribution: oldstable-security
Urgency: high
Maintainer: Holger Levsen <holger@debian.org>
Changed-By: dann frazier <dannf@debian.org>
Description: 
 fai-kernels - special kernels for FAI (Fully Automatic Installation)
Closes: 520034 529165 562525
Changes: 
 fai-kernels (1.17+etch.26etch2) oldstable-security; urgency=high
 .
   * Rebuild against linux-source-2.6.18_2.6.18.dfsg.1-26etch2:
     * [s390] Revert syscall wrapping of execve() - 2.6.18 still
       has some in-kernel callers which bollocks up pt_regs.
       (Closes: #562525)
     * [SCSI] gdth: Prevent negative offsets in ioctl (CVE-2009-3080)
     * NFSv4: Fix a problem whereby a buggy server can oops the kernel
       (CVE-2009-3726)
     * isdn: hfc_usb: Fix read buffer overflow (CVE-2009-4005)
     * hfs: fix a potential buffer overflow (CVE-2009-4020)
     * fuse: prevent fuse_put_request on invalid pointer (CVE-2009-4021)
     * e1000: enhance frame fragment detection (CVE-2009-4536)
     * netfilter: ebtables: enforce CAP_NET_ADMIN (CVE-2010-0007)
     * connector: Delete buggy notification code. (CVE-2010-0410)
     * Fix potential crash with sys_move_pages (CVE-2010-0415)
     * futex: Handle user space corruption gracefully (CVE-2010-0622)
     * [s390] Fix missing capability check in z90crypt driver (CVE-2009-1883)
     * net ax25: Fix signed comparison in the sockopt handler (CVE-2009-2909)
     * fix information leak in llc_ui_getname (CVE-2009-3001)
     * net: fix information leak due to uninitialized structures in
       getname functions (CVE-2009-3002)
     * tc: Fix uninitialized kernel memory leak (CVE-2009-3228)
     * random: make get_random_int() more random (CVE-2009-3238)
     * NFSv4: fix open-create permissions, move iattr & verf attributes of
       struct nfsd4_open out of the union (CVE-2009-3286)
     * fs: pipe.c null pointer dereference (CVE-2009-3547)
     * netlink: fix typo in initialization (CVE-2009-3612)
     * AF_UNIX: Fix deadlock on connecting to shutdown socket (CVE-2009-3621)
     * [mips/mipsel] Fix errno on inexistent syscalls. (Closes: #520034).
     * bridge: Fix oops in port_carrier_check (closes: #529165)
Files: 
 c5c7bba391df430e71d7dc27ea45acf7 741 admin extra fai-kernels_1.17+etch.26etch2.dsc
 bb3ac85782d872546bd942f3bf0aa30b 60034 admin extra fai-kernels_1.17+etch.26etch2.tar.gz
 0eed3dcd4380efd470840c3a2ec95cea 5511954 admin extra fai-kernels_1.17+etch.26etch2_i386.deb

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.10 (GNU/Linux)

iD8DBQFLgzH9huANDBmkLRkRAqQfAKCVWg/xyIhnPOMuyWchL7iIfazi1QCdHv6l
HOBM+fhCaQS6stYXDIwILZQ=
=L+4T
-----END PGP SIGNATURE-----



--- End Message ---

Reply to: