[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

Bug#643817: marked as done (Fix for CVE-2011-2699 can result in crash in VM hosts)



Your message dated Mon, 16 Jan 2012 22:32:09 +0000
with message-id <E1Rmv61-0003Qp-0d@franck.debian.org>
and subject line Bug#643817: fixed in user-mode-linux 2.6.32-1um-4+39squeeze1
has caused the Debian Bug report #643817,
regarding Fix for CVE-2011-2699 can result in crash in VM hosts
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact owner@bugs.debian.org
immediately.)


-- 
643817: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=643817
Debian Bug Tracking System
Contact owner@bugs.debian.org with problems
--- Begin Message ---
Package: linux-2.6
Version: 2.6.32-36
Severity: serious
Tags: security patch

VM guests using the virtio_net driver may take advantage of UFO (UDP
fragmentation offload) which results in the VM host performing
fragmentation.  As discussed in
<http://thread.gmane.org/gmane.linux.kernel/1196272>, the new IPv6
fragment ID generator will crash in this case because the expected
routing context is missing.

No fix is yet available, so we should revert the original fix and
sort this out properly later.

Ben.

-- System Information:
Debian Release: wheezy/sid
  APT prefers unstable
  APT policy: (500, 'unstable'), (500, 'stable'), (1, 'experimental')
Architecture: i386 (x86_64)

Kernel: Linux 3.0.0-1-amd64 (SMP w/2 CPU cores)
Locale: LANG=en_GB.utf8, LC_CTYPE=en_GB.utf8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/dash



--- End Message ---
--- Begin Message ---
Source: user-mode-linux
Source-Version: 2.6.32-1um-4+39squeeze1

We believe that the bug you reported is fixed in the latest version of
user-mode-linux, which is due to be installed in the Debian FTP archive:

user-mode-linux_2.6.32-1um-4+39squeeze1.diff.gz
  to main/u/user-mode-linux/user-mode-linux_2.6.32-1um-4+39squeeze1.diff.gz
user-mode-linux_2.6.32-1um-4+39squeeze1.dsc
  to main/u/user-mode-linux/user-mode-linux_2.6.32-1um-4+39squeeze1.dsc
user-mode-linux_2.6.32-1um-4+39squeeze1_amd64.deb
  to main/u/user-mode-linux/user-mode-linux_2.6.32-1um-4+39squeeze1_amd64.deb



A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 643817@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
dann frazier <dannf@debian.org> (supplier of updated user-mode-linux package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmaster@debian.org)


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Format: 1.8
Date: Mon, 09 Jan 2012 21:17:41 +0100
Source: user-mode-linux
Binary: user-mode-linux
Architecture: source amd64
Version: 2.6.32-1um-4+39squeeze1
Distribution: stable-security
Urgency: high
Maintainer: User Mode Linux Maintainers <pkg-uml-pkgs@lists.alioth.debian.org>
Changed-By: dann frazier <dannf@debian.org>
Description: 
 user-mode-linux - User-mode Linux (kernel)
Closes: 630730 643817 644604 646132
Changes: 
 user-mode-linux (2.6.32-1um-4+39squeeze1) stable-security; urgency=high
 .
   * Rebuild against linux-source-2.6.32 (2.6.32-39squeeze1):
     * Revert "ipv6: make fragment identifications less predictable"
       (Closes: #643817).  This reopens CVE-2011-2699.
     * xen: Revert "xen: Use IRQF_FORCE_RESUME". Fixes live migration regression
       in 2.6.32.42. (Closes: #644604)
     * Really fix bugs in IPv6 forwarding with GRO/GSO (Closes: #630730):
       - e1000e,igb,igbvf,ixgbe: Fix IPv6 GSO type checks
       - ipv6: Add GSO support on forwarding path
     * [powerpc] vserver: Wire up syscall (Closes: #646132)
     * Restrict ioctl forwarding on partitions and logical volumes
       (CVE-2011-4127)
     * xfs: Fix possible memory corruption in xfs_readlink (CVE-2011-4077)
     * KEYS: Fix a NULL pointer deref in the user-defined key type
       (CVE-2011-4110)
     * [x86] KVM: Prevent starting PIT timers in the absence of irqchip support
       (CVE-2011-4622)
     * rose: Add length checks to CALL_REQUEST parsing (CVE-2011-4914)
Checksums-Sha1: 
 a6f7d69f53a6b754371acdc13409a1ca799795c9 2070 user-mode-linux_2.6.32-1um-4+39squeeze1.dsc
 ca3cc034a0887827619885ed26763e76c7729b93 18139 user-mode-linux_2.6.32-1um-4+39squeeze1.diff.gz
 d85517abd1817d4469f70ea8b8bb5a9ae727ddd9 7079036 user-mode-linux_2.6.32-1um-4+39squeeze1_amd64.deb
Checksums-Sha256: 
 14d4dded9aa3344e47a828638118fdc4fd4d13ec0c75337e420dffb16b184313 2070 user-mode-linux_2.6.32-1um-4+39squeeze1.dsc
 f055c0abb2023bd685d4043f6ca2418be4d997109362f191676ab9568378d13f 18139 user-mode-linux_2.6.32-1um-4+39squeeze1.diff.gz
 7e0ce42970fd47103b0760711d11df7dd3a6812e9bd535080fa09fed8c12b3f6 7079036 user-mode-linux_2.6.32-1um-4+39squeeze1_amd64.deb
Files: 
 13bd097b7a9c1a60deb2c69d074451a7 2070 kernel extra user-mode-linux_2.6.32-1um-4+39squeeze1.dsc
 fabd72c60cbe36d8ff066505e203753d 18139 kernel extra user-mode-linux_2.6.32-1um-4+39squeeze1.diff.gz
 9b80381cb184de7ea3d8dbf603326ac6 7079036 kernel extra user-mode-linux_2.6.32-1um-4+39squeeze1_amd64.deb

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.11 (GNU/Linux)
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=aToJ
-----END PGP SIGNATURE-----



--- End Message ---

Reply to: