Your message dated Sat, 30 Aug 2008 07:52:21 +0000
with message-id <[EMAIL PROTECTED]>
and subject line Bug#410807: fixed in user-mode-linux 2.6.18-1um-2etch.22etch1
has caused the Debian Bug report #410807,
regarding linux-image-2.6.18-5-xen-686: kernel BUG at  
drivers/xen/core/evtchn.c:765!
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact [EMAIL PROTECTED]
immediately.)


-- 
410807: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=410807
Debian Bug Tracking System
Contact [EMAIL PROTECTED] with problems
--- Begin Message ---
Package: linux-image-2.6.18-5-xen-686
Version: 2.6.18.dfsg.1-13etch4
Severity: important

kernel BUG at drivers/xen/core/evtchn.c:765!
invalid opcode: 0000 [#1]
SMP
Modules linked in: nfs lockd nfs_acl sunrpc autofs4 xt_limit xt_tcpudp
xt_state ip_conntrack nfnetlink xt_multiport iptable_filter ip_tables
x_tables ipv6 dm_snapshot dm_mirror dm_mod lm85 hwmon_vid i2c_isa
i2c_i801 i2c_core ide_cd cdrom ide_core 8250_pci evdev pcspkr 8250
serial_core ext3 jbd mbcache processor
CPU:    0
EIP:    0061:[<c020c54a>]    Not tainted VLI
EFLAGS: 00010006   (2.6.18-5-xen-686 #1)
EIP is at irq_resume+0x30/0x28e
eax: 00000004   ebx: 00000000   ecx: 00000000   edx: 00000400
esi: 00000032   edi: 00000000   ebp: 00032000   esp: ca6b3ef8
ds: 007b   es: 007b   ss: 0069
Process suspend (pid: 21290, ti=ca6b2000 task=ca925aa0 task.ti=ca6b2000)
Stack: 00000000 c02cf4a0 c0dfc018 cd004000 cd004000 c101b360 c0d9b018
c1000000
      c0dfd340 2f271001 00000000 c02cf4a0 c0dfc018 2ec53067 00000000
      2ec53067
      00000000 f55f6000 cd004000 00000002 00000032 00000000
      00032000 c020cb15
      Call Trace:
      [<c020cb15>] gnttab_resume+0x96/0xad
      [<c020cd79>] map_pte_fn+0x0/0x96
      [<c020dbbb>] __do_suspend+0x296/0x3d7
      [<c0114817>] complete+0x2b/0x3d
      [<c020d925>] __do_suspend+0x0/0x3d7
      [<c012b619>] kthread+0xc0/0xeb
      [<c012b559>] kthread+0x0/0xeb
      [<c010293d>] kernel_thread_helper+0x5/0xb
      Code: c4 80 e8 ae f5 ff ff 31 d2 a1 84 09 2d c0 f0
      0f ab 90 80 08 00 00 42 81 fa 00 04 00 00 75 ea 31
      c0 83 3c 85 40 98 37 c0 00 74 08 <0f> 0b fd 02 92
      0a 2b c0 40 3d 00 01 00 00 75 e6 b8 40 de 37 c0
      EIP: [<c020c54a>] irq_resume+0x30/0x28e SS:ESP
      0069:ca6b3ef8

-- System Information:
Debian Release: 4.0
  APT prefers stable
  APT policy: (990, 'stable'), (111, 'testing'), (10, 'unstable')
Architecture: i386 (i686)
Shell:  /bin/sh linked to /bin/bash
Kernel: Linux 2.6.18-5-xen-686
Locale: [EMAIL PROTECTED], [EMAIL PROTECTED] (charmap=ISO-8859-15) (ignored: 
LC_ALL set to [EMAIL PROTECTED])

Versions of packages linux-image-2.6.18-5-xen-686 depends on:
ii  initramfs-tools    0.85h                 tools for generating an initramfs
ii  linux-modules-2.6. 2.6.18.dfsg.1-13etch4 Linux 2.6.18 modules on i686

Versions of packages linux-image-2.6.18-5-xen-686 recommends:
ii  libc6-xen              2.3.6.ds1-13etch2 GNU C Library: Shared libraries [X

-- no debconf information



--- End Message ---
--- Begin Message ---
Source: user-mode-linux
Source-Version: 2.6.18-1um-2etch.22etch1

We believe that the bug you reported is fixed in the latest version of
user-mode-linux, which is due to be installed in the Debian FTP archive:

user-mode-linux_2.6.18-1um-2etch.22etch1.diff.gz
  to 
pool/main/u/user-mode-linux/user-mode-linux_2.6.18-1um-2etch.22etch1.diff.gz
user-mode-linux_2.6.18-1um-2etch.22etch1.dsc
  to pool/main/u/user-mode-linux/user-mode-linux_2.6.18-1um-2etch.22etch1.dsc
user-mode-linux_2.6.18-1um-2etch.22etch1_i386.deb
  to 
pool/main/u/user-mode-linux/user-mode-linux_2.6.18-1um-2etch.22etch1_i386.deb



A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to [EMAIL PROTECTED],
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
dann frazier <[EMAIL PROTECTED]> (supplier of updated user-mode-linux package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing [EMAIL PROTECTED])


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Format: 1.7
Date: Wed,  6 Aug 2008 00:40:06 -0600
Source: user-mode-linux
Binary: user-mode-linux
Architecture: source i386
Version: 2.6.18-1um-2etch.22etch1
Distribution: stable-security
Urgency: high
Maintainer: User Mode Linux Maintainers <[EMAIL PROTECTED]>
Changed-By: dann frazier <[EMAIL PROTECTED]>
Description: 
 user-mode-linux - User-mode Linux (kernel)
Closes: 410807 479773
Changes: 
 user-mode-linux (2.6.18-1um-2etch.22etch1) stable-security; urgency=high
 .
   * Rebuild against linux-source-2.6.18_2.6.18.dfsg.1-22etch1:
     * bugfix/sctp-make-sure-n-sizeof-does-not-overflow.patch
       [SECURITY] Fix potential overflow condition in
       sctp_getsockopt_local_addrs_old
       See CVE-2008-2826
     * bugfix/esp-iv-in-linear-part-of-skb.patch
       [SECURITY] Avoid tripping BUG() in IPsec code when the first fragment
       of an ESP packet does not contain the entire ESP header and IV
       See CVE-2007-6282
     * bugfix/amd64-fix-zeroing-on-exception-in-copy_user.patch
       [SECURITY] [amd64] Fix potential information leak when a copy
       operation fails by properly zeroing out destination memory
       See CVE-2008-2729
     * bugfix/tty-fix-for-tty-operations-bugs.patch
       [SECURITY] Fix issues with tty operation handling in various drivers
       See CVE-2008-2812
     * bugfix/check-privileges-before-setting-mount-propagation.patch
       [SECURITY] Check CAP_SYS_ADMIN when changing mountpoint type
       See CVE-2008-2931
     * bugfix/x86-fix-copy_user.patch
       [SECURITY][amd64] Fix memory leak in the copy_user routine, see #490910.
       See CVE-2008-0598
   * Changes from 2.6.18.dfsg.1-22:
     * Merge in changes from 2.6.18.dfsg.1-18etch6
     * 3w-9xxx: Add 3ware 9690SA Backport (closes: #479773)
     * Backport http://xenbits.xensource.com/xen-unstable.hg?rev/914304b3a3da,
       fixing kernel BUG at drivers/xen/core/evtchn.c:481 (closes: #410807).
   * Changes from 2.6.18.dfsg.1-18etch6
     * bugfix/dccp-feature-length-check.patch
       [SECURITY] Validate feature length to avoid heap overflow
       See CVE-2008-2358
     * bugfix/asn1-ber-decoding-checks.patch
       [SECURITY] Validate lengths in ASN.1 decoding code to avoid
       heap overflow
       See CVE-2008-1673
Files: 
 5cb0d6498fdb81826ae87ed1505d3617 892 misc extra 
user-mode-linux_2.6.18-1um-2etch.22etch1.dsc
 03ca670996b8db498c46da96c6769b9a 17971 misc extra 
user-mode-linux_2.6.18-1um-2etch.22etch1.diff.gz
 4bad5f3d2a7179063d0a7e696def9402 25590314 misc extra 
user-mode-linux_2.6.18-1um-2etch.22etch1_i386.deb

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.9 (GNU/Linux)

iD8DBQFImU2chuANDBmkLRkRAq4FAJ4s1q9ehR7dnPQR6B67fII6pIYXYQCggC+Q
lokeCWmRRKjMjzOclRHBElA=
=GPb1
-----END PGP SIGNATURE-----



--- End Message ---

Reply via email to