[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

Bug#651255: marked as done (ipv6: Fails to report all IPv6 addresses assigned to interface)



Your message dated Tue, 17 Jan 2012 18:17:09 +0000
with message-id <E1RnDan-0004G2-C5@franck.debian.org>
and subject line Bug#651255: fixed in user-mode-linux 2.6.32-1um-4+41
has caused the Debian Bug report #651255,
regarding ipv6: Fails to report all IPv6 addresses assigned to interface
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact owner@bugs.debian.org
immediately.)


-- 
651255: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=651255
Debian Bug Tracking System
Contact owner@bugs.debian.org with problems
--- Begin Message ---
Source: linux-2.6
Version: 2.6.32-39
Severity: important
Tags: security ipv6

We need to apply this bug fix:

commit bcd323262a94b14b84341982b90443a76a477861
Author: Eric Dumazet <eric.dumazet@gmail.com>
Date:   Mon Nov 9 07:40:17 2009 +0000

    ipv6: Allow inet6_dump_addr() to handle more than 64 addresses
    
    Apparently, inet6_dump_addr() is not able to handle more than
    64 ipv6 addresses per device. We must break from inner loops
    in case skb is full, or else cursor is put at the end of list.
    
    Signed-off-by: Eric Dumazet <eric.dumazet@gmail.com>
    Signed-off-by: David S. Miller <davem@davemloft.net>

Tagging this as 'security' because the system may accept connection
attempts to an address which doesn't appear to be assigned to it.

Ben.

-- System Information:
Debian Release: wheezy/sid
  APT prefers unstable
  APT policy: (500, 'unstable'), (500, 'stable'), (1, 'experimental')
Architecture: i386 (x86_64)

Kernel: Linux 3.1.0-1-amd64 (SMP w/2 CPU cores)
Locale: LANG=en_GB.utf8, LC_CTYPE=en_GB.utf8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/dash



--- End Message ---
--- Begin Message ---
Source: user-mode-linux
Source-Version: 2.6.32-1um-4+41

We believe that the bug you reported is fixed in the latest version of
user-mode-linux, which is due to be installed in the Debian FTP archive:

user-mode-linux_2.6.32-1um-4+41.diff.gz
  to main/u/user-mode-linux/user-mode-linux_2.6.32-1um-4+41.diff.gz
user-mode-linux_2.6.32-1um-4+41.dsc
  to main/u/user-mode-linux/user-mode-linux_2.6.32-1um-4+41.dsc
user-mode-linux_2.6.32-1um-4+41_amd64.deb
  to main/u/user-mode-linux/user-mode-linux_2.6.32-1um-4+41_amd64.deb



A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 651255@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
dann frazier <dannf@debian.org> (supplier of updated user-mode-linux package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmaster@debian.org)


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Format: 1.8
Date: Mon, 16 Jan 2012 15:10:25 -0700
Source: user-mode-linux
Binary: user-mode-linux
Architecture: source amd64
Version: 2.6.32-1um-4+41
Distribution: stable
Urgency: high
Maintainer: User Mode Linux Maintainers <pkg-uml-pkgs@lists.alioth.debian.org>
Changed-By: dann frazier <dannf@debian.org>
Description: 
 user-mode-linux - User-mode Linux (kernel)
Closes: 586494 633526 637234 637308 638172 641661 645308 647624 650160 650652 651255 651367 652857 653398 655049
Changes: 
 user-mode-linux (2.6.32-1um-4+41) stable; urgency=high
 .
   * Rebuild against linux-source-2.6.32 (2.6.32-41):
     * Add longterm releases 2.6.32.47 and 2.6.32.48, including:
       - atm: br2684: Fix oops due to skb->dev being NULL
       - md/linear: avoid corrupting structure while waiting for rcu_free to
         complete.
       - xen/smp: Warn user why they keel over - nosmp or noapic and what to use
         instead. (Closes: #637308)
       - md: Fix handling for devices from 2TB to 4TB in 0.90 metadata.
       - net/9p: fix client code to fail more gracefully on protocol error
       - fs/9p: Fid is not valid after a failed clunk.
       - TPM: Call tpm_transmit with correct size (CVE-2011-1161)
       - TPM: Zero buffer after copying to userspace (CVE-2011-1162)
       - libiscsi_tcp: fix LLD data allocation
       - cfg80211: Fix validation of AKM suites
       - USB: pid_ns: ensure pid is not freed during kill_pid_info_as_uid
       - kobj_uevent: Ignore if some listeners cannot handle message
         (Closes: #641661)
       - nfsd4: ignore WANT bits in open downgrade
       - [s390] KVM: check cpu_id prior to using it
       - cfq: merge cooperating cfq_queues
       - [x86] KVM: Reset tsc_timestamp on TSC writes (fixes guest performance
         regression introduced in 2.6.32-35)
       - ext4: fix BUG_ON() in ext4_ext_insert_extent()
       - ext2,ext3,ext4: don't inherit APPEND_FL or IMMUTABLE_FL for new inodes
       For the complete list of changes, see:
        http://www.kernel.org/pub/linux/kernel/v2.6/longterm/ChangeLog-2.6.32.47
        http://www.kernel.org/pub/linux/kernel/v2.6/longterm/ChangeLog-2.6.32.48
       and the bug report which this closes: #647624.
     * tg3: Fix I/O failures after chip reset (Closes: #645308; regression in
       2.6.32-36)
     * Add longterm release 2.6.32.49, including:
       - SCSI: st: fix race in st_scsi_execute_end
       - NFS/sunrpc: don't use a credential with extra groups.
       - netlink: validate NLA_MSECS length
       - hfs: add sanity check for file name length (CVE-2011-4330)
       - md/raid5: abort any pending parity operations when array fails.
       - mm: avoid null pointer access in vm_struct via /proc/vmallocinfo
       - ipv6: udp: fix the wrong headroom check (CVE-2011-4326)
       - USB: Fix Corruption issue in USB ftdi driver ftdi_sio.c
       For the complete list of changes, see:
        http://www.kernel.org/pub/linux/kernel/v2.6/longterm/ChangeLog-2.6.32.49
       and the bug report which this closes: #650160.
     * ipv6: Allow inet6_dump_addr() to handle more than 64 addresses
       (Closes: #651255)
     * Add longterm release 2.6.32.50, including:
       - PCI hotplug: shpchp: don't blindly claim non-AMD 0x7450 device IDs
         (see #638863)
       - sched, x86: Avoid unnecessary overflow in sched_clock
       - [x86] mpparse: Account for bus types other than ISA and PCI
         (Closes: #586494)
       For the complete list of changes, see:
        http://www.kernel.org/pub/linux/kernel/v2.6/longterm/ChangeLog-2.6.32.50
       and the bug report which this closes: #651367.
     * [vserver] Update patch to 2.6.32.48-vs2.3.0.36.29.8
       - nfs: Fix client uid/gid caching (Closes: #633526)
     * [x86] Add isci driver from Linux 3.1 (Closes: #652857)
       - libsas: fix definition of wideport, include local sas address
       - [x86] Introduce pci_map_biosrom()
     * Add longterm release 2.6.32.51, including:
       - percpu: fix chunk range calculation
       - xfrm: Fix key lengths for rfc3686(ctr(aes)) (Closes: #650652)
       - jbd/jbd2: validate sb->s_first in journal_get_superblock()
         (CVE-2011-4132)
       - Make taskstats require root access (CVE-2011-2494)
       - hfs: fix hfs_find_init() sb->ext_tree NULL ptr oops (CVE-2011-2203)
       - oprofile, x86: Fix nmi-unsafe callgraph support
       - ext4: avoid hangs in ext4_da_should_update_i_disksize()
     * xen: backport upstream (xen.git#xen/stable-2.6.32.y) fixes to event
       handling:
       - multiple fixes to PIRQ event channel handling (Closes: #638172)
       - setup IRQ before binding VIRQ to it.
       - correctly setup event channel mask for secondary CPUs on restore.
       - use locked set/clear bit when manipulating event channel masks.
       - ensure event channels are handled in a fair/round-robin order preventing
         lower numbered event channels from starving higher.
     * xen: blkback: don't fail empty barrier requests (Closes: #637234)
     * ipv6: make fragment identifications less predictable (CVE-2011-2699)
       - fix NULL dereference in udp6_ufo_fragment (see #643817)
     * Add longterm release 2.6.32.52:
       - Revert "clockevents: Set noop handler in clockevents_exchange_device()",
         included in stable update 2.6.32.50 (Closes: #653398)
     * Add longterm release 2.6.32.53, including:
       - cfq-iosched: fix cfq_cic_link() race confition
       For the complete list of changes, see:
        http://www.kernel.org/pub/linux/kernel/v2.6/longterm/ChangeLog-2.6.32.53
       and the bug report which this closes: #655049.
Checksums-Sha1: 
 f494d27c53a7b37ca3a4347b436edd3524e68c02 2030 user-mode-linux_2.6.32-1um-4+41.dsc
 b488267ef63e4218f70c47ee51b40502007b5233 19896 user-mode-linux_2.6.32-1um-4+41.diff.gz
 9f7914a7a62777ecf85299f2b72ede31753c8afd 7082050 user-mode-linux_2.6.32-1um-4+41_amd64.deb
Checksums-Sha256: 
 ba2f5619cd4026bd17a83d3b6a0eaed47b9c62bc0cf46ec3ddf56f1d23f5593b 2030 user-mode-linux_2.6.32-1um-4+41.dsc
 5ccf08629fadd90d1083e938c8000fa2499028bfb91f0914b673e4b031214942 19896 user-mode-linux_2.6.32-1um-4+41.diff.gz
 f84c0799d02381f79ccbf1b78d2704011eb5a1158b63d4a724cbbf6e771c3e67 7082050 user-mode-linux_2.6.32-1um-4+41_amd64.deb
Files: 
 99409f5e1cce01848a20d64c09487d7c 2030 kernel extra user-mode-linux_2.6.32-1um-4+41.dsc
 80d12b694c2947277796884f1d9c36cd 19896 kernel extra user-mode-linux_2.6.32-1um-4+41.diff.gz
 491732fc5e1e2a828e84767f691059a1 7082050 kernel extra user-mode-linux_2.6.32-1um-4+41_amd64.deb

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.11 (GNU/Linux)
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=JLYM
-----END PGP SIGNATURE-----



--- End Message ---

Reply to: