Your message dated Sun, 07 Feb 2016 22:43:10 +0000 with message-id <E1aSY2w-0006LU-8E@deadeye> and subject line Closing bugs assigned to linux-2.6 package has caused the Debian Bug report #746037, regarding linux-2.6: Mistake in CVE-2013-6382 fix for squeeze to be marked as done.
This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what this message is talking about, this may indicate a serious mail system misconfiguration somewhere. Please contact ow...@bugs.debian.org immediately.) -- 746037: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=746037 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems
--- Begin Message ---Package: linux-2.6 Version: 2.6.32-48squeeze5 Tags: security squeeze The current patch (bugfix/all/xfs-underflow-bug-in-xfs_attrlist_by_handle.patch) does not fix fs/xfs/linux-2.6/xfs_ioctl32.c properly.
smime.p7s
Description: S/MIME cryptographic signature
--- End Message ---
--- Begin Message ---Version: 3.4.1-1~experimental.1+rm Debian 6.0 Long Term Support has now ended, and the 'linux-2.6' source package will no longer be updated. This bug is being closed on the assumption that it does not affect the kernel versions in newer Debian releases. If you can still reproduce this bug in a newer release, please reopen the bug report and reassign it to 'src:linux' and the affected version of the package. You can find the package version for the running kernel by running: uname -v or the versions of all installed kernel packages by running: dpkg -l 'linux-image-[34]*' | grep ^.i and looking at the third column. I apologise that we weren't able to provide a specific resolution for this bug. Ben. -- Ben Hutchings - Debian developer, member of Linux kernel and LTS teams
--- End Message ---