Your message dated Mon, 14 Mar 2005 08:32:38 -0500 with message-id <[EMAIL PROTECTED]> and subject line Bug#295626: fixed in kernel-source-2.6.8 2.6.8-14 has caused the attached Bug report to be marked as done.
This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what I am talking about this indicates a serious mail system misconfiguration somewhere. Please contact me immediately.) Debian bug tracking system administrator (administrator, Debian Bugs database) -------------------------------------- Received: (at submit) by bugs.debian.org; 2 Jan 2005 09:57:17 +0000 >From [EMAIL PROTECTED] Sun Jan 02 01:57:17 2005 Return-path: <[EMAIL PROTECTED]> Received: from tershal.beezly.org.uk [213.177.254.57] (Debian-exim) by spohr.debian.org with esmtp (Exim 3.35 1 (Debian)) id 1Cl2U9-0002hs-00; Sun, 02 Jan 2005 01:57:17 -0800 Received: from [10.0.0.212] (helo=[10.0.0.212]) by tershal.beezly.org.uk with esmtp (Exim 4.34) id 1Cl2U6-0003iz-8j for [EMAIL PROTECTED]; Sun, 02 Jan 2005 09:57:14 +0000 Subject: nis kills sparc64 From: Beezly <[EMAIL PROTECTED]> To: [EMAIL PROTECTED] Content-Type: text/plain Date: Sun, 02 Jan 2005 09:57:26 +0000 Message-Id: <[EMAIL PROTECTED]> Mime-Version: 1.0 X-Mailer: Evolution 2.1.2 Content-Transfer-Encoding: 7bit Delivered-To: [EMAIL PROTECTED] X-Spam-Checker-Version: SpamAssassin 2.60-bugs.debian.org_2004_03_25 (1.212-2003-09-23-exp) on spohr.debian.org X-Spam-Status: No, hits=-8.0 required=4.0 tests=BAYES_00,HAS_PACKAGE autolearn=no version=2.60-bugs.debian.org_2004_03_25 X-Spam-Level: Package: nis Version: 3.12-3 Severity: critical Installing the nis package on my E4500 kills the machine. It seems to stop the machine creating new processes althought it's difficult for me to tell as I have limited physical access to the machine. Doing apt-get install nis produces the following... gold:/usr/sbin# apt-get install nis Reading Package Lists... Done Building Dependency Tree... Done The following NEW packages will be installed: nis 0 upgraded, 1 newly installed, 0 to remove and 0 not upgraded. Need to get 235kB of archives. After unpacking 844kB of additional disk space will be used. Get:1 http://mirrors.shef.ac.uk testing/main nis 3.12-3 [235kB] Fetched 235kB in 4s (53.7kB/s) Preconfiguring packages ... Selecting previously deselected package nis. (Reading database ... 29539 files and directories currently installed.) Unpacking nis (from .../archives/nis_3.12-3_sparc.deb) ... Setting up nis (3.12-3) ... Setting NIS domainname to: beezly.org.uk Starting NIS services: ypbind The machine becomes inaccessible after loading ypbind and you cannot interrupt the terminal, however it IS still possible to ping the machine. ssh to the machine gets as far as opening a connection, but no further. Marked critical as it flattens my machine, every application and makes it unusable. Anything you want me to try out, please let me know although it can take me a while to get back to you... I have to drive over two hills to get to the machine! Cheers, Andrew --------------------------------------- Received: (at 295626-close) by bugs.debian.org; 14 Mar 2005 13:38:23 +0000 >From [EMAIL PROTECTED] Mon Mar 14 05:38:23 2005 Return-path: <[EMAIL PROTECTED]> Received: from newraff.debian.org [208.185.25.31] (mail) by spohr.debian.org with esmtp (Exim 3.35 1 (Debian)) id 1DApm2-0002Ih-00; Mon, 14 Mar 2005 05:38:22 -0800 Received: from katie by newraff.debian.org with local (Exim 3.35 1 (Debian)) id 1DApgU-0000jH-00; Mon, 14 Mar 2005 08:32:38 -0500 From: Andres Salomon <[EMAIL PROTECTED]> To: [EMAIL PROTECTED] X-Katie: $Revision: 1.55 $ Subject: Bug#295626: fixed in kernel-source-2.6.8 2.6.8-14 Message-Id: <[EMAIL PROTECTED]> Sender: Archive Administrator <[EMAIL PROTECTED]> Date: Mon, 14 Mar 2005 08:32:38 -0500 Delivered-To: [EMAIL PROTECTED] X-Spam-Checker-Version: SpamAssassin 2.60-bugs.debian.org_2005_01_02 (1.212-2003-09-23-exp) on spohr.debian.org X-Spam-Status: No, hits=-6.0 required=4.0 tests=BAYES_00,HAS_BUG_NUMBER autolearn=no version=2.60-bugs.debian.org_2005_01_02 X-Spam-Level: Source: kernel-source-2.6.8 Source-Version: 2.6.8-14 We believe that the bug you reported is fixed in the latest version of kernel-source-2.6.8, which is due to be installed in the Debian FTP archive: kernel-doc-2.6.8_2.6.8-14_all.deb to pool/main/k/kernel-source-2.6.8/kernel-doc-2.6.8_2.6.8-14_all.deb kernel-patch-debian-2.6.8_2.6.8-14_all.deb to pool/main/k/kernel-source-2.6.8/kernel-patch-debian-2.6.8_2.6.8-14_all.deb kernel-source-2.6.8_2.6.8-14.diff.gz to pool/main/k/kernel-source-2.6.8/kernel-source-2.6.8_2.6.8-14.diff.gz kernel-source-2.6.8_2.6.8-14.dsc to pool/main/k/kernel-source-2.6.8/kernel-source-2.6.8_2.6.8-14.dsc kernel-source-2.6.8_2.6.8-14_all.deb to pool/main/k/kernel-source-2.6.8/kernel-source-2.6.8_2.6.8-14_all.deb kernel-tree-2.6.8_2.6.8-14_all.deb to pool/main/k/kernel-source-2.6.8/kernel-tree-2.6.8_2.6.8-14_all.deb A summary of the changes between this version and the previous one is attached. Thank you for reporting the bug, which will now be closed. If you have further comments please address them to [EMAIL PROTECTED], and the maintainer will reopen the bug report if appropriate. Debian distribution maintenance software pp. Andres Salomon <[EMAIL PROTECTED]> (supplier of updated kernel-source-2.6.8 package) (This message was generated automatically at their request; if you believe that there is a problem with it please contact the archive administrators by mailing [EMAIL PROTECTED]) -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 Format: 1.7 Date: Mon, 14 Mar 2005 05:18:40 -0500 Source: kernel-source-2.6.8 Binary: kernel-source-2.6.8 kernel-doc-2.6.8 kernel-tree-2.6.8 kernel-patch-debian-2.6.8 Architecture: source all Version: 2.6.8-14 Distribution: unstable Urgency: high Maintainer: Debian kernel team <debian-kernel@lists.debian.org> Changed-By: Andres Salomon <[EMAIL PROTECTED]> Description: kernel-doc-2.6.8 - Linux kernel specific documentation for version 2.6.8 kernel-patch-debian-2.6.8 - Debian patches to Linux 2.6.8 kernel-source-2.6.8 - Linux kernel source for version 2.6.8 with Debian patches kernel-tree-2.6.8 - Linux kernel source tree for building Debian kernel images Closes: 295626 296700 Changes: kernel-source-2.6.8 (2.6.8-14) unstable; urgency=high . * Backport more scsi-ioctl fixes: add CMD_WARNED, remove dulicate safe_for_read(READ_BUFFER), add LOG_SENSE as read-ok and LOG_SELECT as write-ok, quieten scsi ioctl when asking for a lot of memory and failing. (Maximilian Attems) . * ia64-ptrace-speedup.dpatch Backport needed to form a base on top of which ia64-ptrace-fixes will apply. (dann frazier) . * [SECURITY] ia64-ptrace-fixes.dpatch Fix some corner cases in ia64 ptrace code; CAN-2005-0136 (dann frazier). . * [SECURITY] ia64-unwind-fix.dpatch unw_unwind_to_user sanity check; CAN-2005-0135 (dann frazier). . * Updated kernel-tree description from Martin F Krafft (Simon Horman) . * Updated apply script so it can handle point versions (Simon Horman) . * skb-reset-ip_summed.dpatch: resolve checksumming exploit in fragmented packet forwarding (Joshua Kwan) . * sparc64-nis-killer.dpatch: patch that fixes some compatibility functions that (as a side effect) caused NIS to flatten a sparc64 machine. closes: #295626 (Joshua Kwan) . * Turn ifeq into a shell construct to allow things to still work if the orig tarball is unavailable. (Joshua Kwan) . * au88x0-use-short-name.dpatch: Use CARD_SHORT_NAME in au88x0.c to allow card-specific driver names (CARD_SHORT_NAME is redefined by each driver.) (Joshua Kwan) . * proc-cmdline-mmput-leak.dpatch: [CAN-2004-1058] fix race that could allow user processes to read environment data from processes in the middle of spawning. (Joshua Kwan) . * 025-track_dummy_capability.dpatch, 027-track_dummy_capability.dpatch: [CAN-2004-1337] The dummy capabilities module wasn't keeping track of processes capabilities; so, when a capabilities module was loaded, all untracked processes would magically be given root capabilities. Backport from 2.6.10's kernel-source. (Joshua Kwan) . * setsid-race.dpatch: [CAN-2005-0178] fix setsid() race that could lead to a denial of service. (Joshua Kwan) . * outs.dpatch: [CAN-2005-0204] AMD64, allows local users to write to privileged IO ports via OUTS instruction. (Simon Horman) (closes: #296700) . * ipv4-fragment-queues-1.dpatch, ipv4-fragment-queues-2.dpatch, ipv4-fragment-queues-3.dpatch, ipv4-fragment-queues-4.dpatch: fix potential information leak by making fragment queues private. (Joshua Kwan, Simon Horman) . * sparc64-sb1500-clock-2.6.dpatch by David Miller: enable recognition of the clock chip on SunBlade 1500, it won't boot otherwise. (Jurij Smakov). . * 2.6.11.2 [SECURITY] epoll: return proper error on overflow condition (Maximilian Attems) . * nfs-O_DIRECT-fix.dpatch: [CAN-2005-0207] set some things to NULL in an error condition to prevent some nondeterministic behavior. (Joshua Kwan) . * [sparc] Added sparc-sunsab-serial-lockup.dpatch to eliminate the serial console lockup on machines with sunsab serial controller (Jurij Smakov). . * nls-table-overflow.dpatch: [CAN-2005-0177] NLS ASCII table should be 256 entries, not 128! (Joshua Kwan) . * [SECURITY] 109-binfmt_elf_loader_solar_designer_fixes.dpatch Fix from Solar Designer; the binfmt_elf load routines are returning incorrect values, and are not strict enough in checking the number of program headers (Andres Salomon). . * [SECURITY] 115-proc_file_read_nbytes_signedness_fix.dpatch Heap overflow fix in /proc; WDYBTGT3-1 on http://www.guninski.com/where_do_you_want_billg_to_go_today_3.html No CAN# assigned yet, afaik (Andres Salomon). . * [SECURITY] 116-n_tty_copy_from_read_buf_signedness_fixes.dpatch copy_from_read_buf() fix; WDYBTGT3-2 on http://www.guninski.com/where_do_you_want_billg_to_go_today_3.html No CAN#, yet (Andres Salomon). . * [SECURITY] 117-reiserfs_file_64bit_size_t_fixes.dpatch reiserfs integer fixes; WDYBTGT3-4 on http://www.guninski.com/where_do_you_want_billg_to_go_today_3.html (Andres Salomon). . * [SECURITY] 123-atm_get_addr_signedness_fix.dpatch Fix atm_get_addr()'s usage of its size arg, by making it unsigned. WDYBTGT3-3 on http://www.guninski.com/where_do_you_want_billg_to_go_today_3.html (Andres Salomon). . * 143-sysfs_write_file_signedness_problem.dpatch sysfs_write_file assigns the result of fill_write_buffer (which is signed and returns negative upon error) to an unsigned int. Clearly, bad and wrong.. (Andres Salomon) Files: 19017701efb72cca2e5dcd47328ca951 956 devel optional kernel-source-2.6.8_2.6.8-14.dsc 1657f46bafe414da9a01420c594d2c49 888287 devel optional kernel-source-2.6.8_2.6.8-14.diff.gz 9c7124b2b53852954e34177839663286 864716 devel optional kernel-patch-debian-2.6.8_2.6.8-14_all.deb e185dde5774f1ac1dbe069689dfe85cd 34922198 devel optional kernel-source-2.6.8_2.6.8-14_all.deb b38d4abcc09e2d018f46af59c23e9c18 27292 devel optional kernel-tree-2.6.8_2.6.8-14_all.deb b8b10533316d5c888ca74be2d047e1bd 6176440 doc optional kernel-doc-2.6.8_2.6.8-14_all.deb -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.0 (GNU/Linux) iD8DBQFCNY8k78o9R9NraMQRAl5ZAKCR5aZX+jDWo6QNKA3/3IIQ6eX+2wCffB+N eMyPoqKTGn6OItsGodNKCKc= =nK2I -----END PGP SIGNATURE----- -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]