Your message dated Fri, 23 Jan 2009 12:02:05 +0000
with message-id <e1lqkjd-0000ds...@ries.debian.org>
and subject line Bug#512654: fixed in kvm 83+dfsg-1
has caused the Debian Bug report #512654,
regarding [kvm] Security patch for CVE-2008-0928 causes serious regression
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
512654: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=512654
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Package: kvm
Version: 82+dfsg-1
Severity: serious

kvm versions from experimental cause serious problems with at least qcow2. When 
installing Windows XP on a fresh image, not even the partition can be created. 
On an existing image, kvm 82 causes serious corruptions in the disk image.

Using kvm 72 from unstable solves the problem (at least the partitioning part),
 as does building kvm-82 *without* patches/security/CVE-2008-0928-fedora.patch.


best,


Torsten


--- System information. ---
Architecture: i386
Kernel:       Linux 2.6.28-shl1

Debian Release: 5.0
  500 unstable        www.debian-multimedia.org 
  500 unstable        ftp.de.debian.org 
  500 unstable        emacs.orebokech.com 
  500 experimental    www.debian-multimedia.org 
    1 experimental    ftp.de.debian.org 

--- Package information. ---
Depends                       (Version) | Installed
=======================================-+-====================
libasound2                  (>> 1.0.18) | 1.0.18-1
libbrlapi0.5                            | 3.10~r3724-1+b1
libc6                        (>= 2.7-1) | 2.7-18
libgnutls26                (>= 2.5.9-0) | 2.6.3-1
libncurses5         (>= 5.6+20071006-3) | 5.7+20090117-1
libsdl1.2debian           (>= 1.2.10-1) | 1.2.13-4
libvdeplug2                             | 2.2.2-3
zlib1g                     (>= 1:1.1.4) | 1:1.2.3.3.dfsg-12
python                                  | 2.5.2-3
iproute                                 | 20080725-2
bridge-utils                            | 1.4-5


Attachment: signature.asc
Description: Dies ist ein digital signierter Nachrichtenteil


--- End Message ---
--- Begin Message ---
Source: kvm
Source-Version: 83+dfsg-1

We believe that the bug you reported is fixed in the latest version of
kvm, which is due to be installed in the Debian FTP archive:

kvm-dbg_83+dfsg-1_i386.deb
  to pool/main/k/kvm/kvm-dbg_83+dfsg-1_i386.deb
kvm-source_83+dfsg-1_all.deb
  to pool/main/k/kvm/kvm-source_83+dfsg-1_all.deb
kvm_83+dfsg-1.diff.gz
  to pool/main/k/kvm/kvm_83+dfsg-1.diff.gz
kvm_83+dfsg-1.dsc
  to pool/main/k/kvm/kvm_83+dfsg-1.dsc
kvm_83+dfsg-1_i386.deb
  to pool/main/k/kvm/kvm_83+dfsg-1_i386.deb
kvm_83+dfsg.orig.tar.gz
  to pool/main/k/kvm/kvm_83+dfsg.orig.tar.gz



A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 512...@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Jan Lübbe <jlue...@debian.org> (supplier of updated kvm package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmas...@debian.org)


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Format: 1.8
Date: Fri, 23 Jan 2009 12:17:13 +0100
Source: kvm
Binary: kvm kvm-source kvm-dbg
Architecture: source all i386
Version: 83+dfsg-1
Distribution: experimental
Urgency: low
Maintainer: Jan Lübbe <jlue...@debian.org>
Changed-By: Jan Lübbe <jlue...@debian.org>
Description: 
 kvm        - Full virtualization on x86 hardware
 kvm-dbg    - Debugging info for kvm
 kvm-source - Source for the KVM driver
Closes: 511914 512420 512654
Changes: 
 kvm (83+dfsg-1) experimental; urgency=low
 .
   * New upstream release (closes: #512420)
   * Disable security/CVE-2008-0928-fedora.patch, it causes corruption in
     qcow2 images (closes: #511914, #512654)
Checksums-Sha1: 
 98fb4ac87e4989f0c4055696568fa6b4c5f21719 1405 kvm_83+dfsg-1.dsc
 aee9589f9805df6c5f9700ba028971a85b79fc35 3609165 kvm_83+dfsg.orig.tar.gz
 9834ae698454b1a62cfc77ed34448848af36dc13 45146 kvm_83+dfsg-1.diff.gz
 acd7f1859aee824380a1ff95e7f5f4e56cd567cf 273062 kvm-source_83+dfsg-1_all.deb
 05bb65180499de9f63dbbcc6fdaf353c1b08c712 1132080 kvm_83+dfsg-1_i386.deb
 908331278c17ffc3c3c00c29776d2108af521ca7 1787236 kvm-dbg_83+dfsg-1_i386.deb
Checksums-Sha256: 
 27b15fae975f3661b9e9b0a32548eb2e55a1b29c25f6061e2ebdb4f3f25386b5 1405 
kvm_83+dfsg-1.dsc
 03c26b3c6317de114ad4d717b2326ed78a8030514809591f6929f4cb6c55e2c3 3609165 
kvm_83+dfsg.orig.tar.gz
 62fb9c106fac8c9b059b3c8e49bf64f5ccc5b1c8d9d47791191b1acdc33b4852 45146 
kvm_83+dfsg-1.diff.gz
 5c5504ff042c19d014d386577367a4a9ac3ade681c034b254100d73a2637b4e8 273062 
kvm-source_83+dfsg-1_all.deb
 b719f01c7d455483210d0f39503718b45dcaf3800041d212e4f8bb57ff9c35b2 1132080 
kvm_83+dfsg-1_i386.deb
 8dab6fff798acb47d7cc027d89a177a5af96660abf3d130364618bb63e66565b 1787236 
kvm-dbg_83+dfsg-1_i386.deb
Files: 
 a5f42922c508408654ed2c0a340569b7 1405 misc optional kvm_83+dfsg-1.dsc
 a40c00e18973b4454a419e08e03ed1a3 3609165 misc optional kvm_83+dfsg.orig.tar.gz
 790c395146e45ddf86eda98517332446 45146 misc optional kvm_83+dfsg-1.diff.gz
 c75fdf4f7b577742d0a1e45fbdbc3cea 273062 misc optional 
kvm-source_83+dfsg-1_all.deb
 091b04426ddeddd783dc5ee570fbd6a2 1132080 misc optional kvm_83+dfsg-1_i386.deb
 c5ce82aa4b5aad8891c4af88206b5672 1787236 misc extra kvm-dbg_83+dfsg-1_i386.deb

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.9 (GNU/Linux)

iEYEARECAAYFAkl5q5AACgkQioOL5NhIDy416wCg9YHEu+2vFp1iZHf3Q9zIPyge
hHsAnizp2BrxvAUpoH8pYly8/f1dsgnj
=KQoK
-----END PGP SIGNATURE-----



--- End Message ---

Reply via email to