[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

Bug#295626: marked as done (nis kills sparc64)



Your message dated Mon, 14 Mar 2005 08:32:38 -0500
with message-id <E1DApgU-0000jH-00@newraff.debian.org>
and subject line Bug#295626: fixed in kernel-source-2.6.8 2.6.8-14
has caused the attached Bug report to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what I am
talking about this indicates a serious mail system misconfiguration
somewhere.  Please contact me immediately.)

Debian bug tracking system administrator
(administrator, Debian Bugs database)

--------------------------------------
Received: (at submit) by bugs.debian.org; 2 Jan 2005 09:57:17 +0000
>From beezly@beezly.org.uk Sun Jan 02 01:57:17 2005
Return-path: <beezly@beezly.org.uk>
Received: from tershal.beezly.org.uk [213.177.254.57] (Debian-exim)
	by spohr.debian.org with esmtp (Exim 3.35 1 (Debian))
	id 1Cl2U9-0002hs-00; Sun, 02 Jan 2005 01:57:17 -0800
Received: from [10.0.0.212] (helo=[10.0.0.212])
	by tershal.beezly.org.uk with esmtp (Exim 4.34)
	id 1Cl2U6-0003iz-8j
	for submit@bugs.debian.org; Sun, 02 Jan 2005 09:57:14 +0000
Subject: nis kills sparc64
From: Beezly <beezly@beezly.org.uk>
To: submit@bugs.debian.org
Content-Type: text/plain
Date: Sun, 02 Jan 2005 09:57:26 +0000
Message-Id: <1104659846.10074.7.camel@localhost.localdomain>
Mime-Version: 1.0
X-Mailer: Evolution 2.1.2 
Content-Transfer-Encoding: 7bit
Delivered-To: submit@bugs.debian.org
X-Spam-Checker-Version: SpamAssassin 2.60-bugs.debian.org_2004_03_25 
	(1.212-2003-09-23-exp) on spohr.debian.org
X-Spam-Status: No, hits=-8.0 required=4.0 tests=BAYES_00,HAS_PACKAGE 
	autolearn=no version=2.60-bugs.debian.org_2004_03_25
X-Spam-Level: 

Package: nis
Version: 3.12-3
Severity: critical

Installing the nis package on my E4500 kills the machine. It seems to
stop the machine creating new processes althought it's difficult for me
to tell as I have limited physical access to the machine.

Doing apt-get install nis produces the following...

gold:/usr/sbin# apt-get install nis
Reading Package Lists... Done
Building Dependency Tree... Done
The following NEW packages will be installed:
  nis
0 upgraded, 1 newly installed, 0 to remove and 0 not upgraded.
Need to get 235kB of archives.
After unpacking 844kB of additional disk space will be used.
Get:1 http://mirrors.shef.ac.uk testing/main nis 3.12-3 [235kB]
Fetched 235kB in 4s (53.7kB/s)
Preconfiguring packages ...
Selecting previously deselected package nis.
(Reading database ... 29539 files and directories currently installed.)
Unpacking nis (from .../archives/nis_3.12-3_sparc.deb) ...
Setting up nis (3.12-3) ...
Setting NIS domainname to: beezly.org.uk
Starting NIS services: ypbind

The machine becomes inaccessible after loading ypbind and you cannot
interrupt the terminal, however it IS still possible to ping the
machine. ssh to the machine gets as far as opening a connection, but no
further.

Marked critical as it flattens my machine, every application and makes
it unusable.

Anything you want me to try out, please let me know although it can take
me a while to get back to you... I have to drive over two hills to get
to the machine!

Cheers,

Andrew


---------------------------------------
Received: (at 295626-close) by bugs.debian.org; 14 Mar 2005 13:38:23 +0000
>From katie@ftp-master.debian.org Mon Mar 14 05:38:23 2005
Return-path: <katie@ftp-master.debian.org>
Received: from newraff.debian.org [208.185.25.31] (mail)
	by spohr.debian.org with esmtp (Exim 3.35 1 (Debian))
	id 1DApm2-0002Ih-00; Mon, 14 Mar 2005 05:38:22 -0800
Received: from katie by newraff.debian.org with local (Exim 3.35 1 (Debian))
	id 1DApgU-0000jH-00; Mon, 14 Mar 2005 08:32:38 -0500
From: Andres Salomon <dilinger@voxel.net>
To: 295626-close@bugs.debian.org
X-Katie: $Revision: 1.55 $
Subject: Bug#295626: fixed in kernel-source-2.6.8 2.6.8-14
Message-Id: <E1DApgU-0000jH-00@newraff.debian.org>
Sender: Archive Administrator <katie@ftp-master.debian.org>
Date: Mon, 14 Mar 2005 08:32:38 -0500
Delivered-To: 295626-close@bugs.debian.org
X-Spam-Checker-Version: SpamAssassin 2.60-bugs.debian.org_2005_01_02 
	(1.212-2003-09-23-exp) on spohr.debian.org
X-Spam-Status: No, hits=-6.0 required=4.0 tests=BAYES_00,HAS_BUG_NUMBER 
	autolearn=no version=2.60-bugs.debian.org_2005_01_02
X-Spam-Level: 

Source: kernel-source-2.6.8
Source-Version: 2.6.8-14

We believe that the bug you reported is fixed in the latest version of
kernel-source-2.6.8, which is due to be installed in the Debian FTP archive:

kernel-doc-2.6.8_2.6.8-14_all.deb
  to pool/main/k/kernel-source-2.6.8/kernel-doc-2.6.8_2.6.8-14_all.deb
kernel-patch-debian-2.6.8_2.6.8-14_all.deb
  to pool/main/k/kernel-source-2.6.8/kernel-patch-debian-2.6.8_2.6.8-14_all.deb
kernel-source-2.6.8_2.6.8-14.diff.gz
  to pool/main/k/kernel-source-2.6.8/kernel-source-2.6.8_2.6.8-14.diff.gz
kernel-source-2.6.8_2.6.8-14.dsc
  to pool/main/k/kernel-source-2.6.8/kernel-source-2.6.8_2.6.8-14.dsc
kernel-source-2.6.8_2.6.8-14_all.deb
  to pool/main/k/kernel-source-2.6.8/kernel-source-2.6.8_2.6.8-14_all.deb
kernel-tree-2.6.8_2.6.8-14_all.deb
  to pool/main/k/kernel-source-2.6.8/kernel-tree-2.6.8_2.6.8-14_all.deb



A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 295626@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Andres Salomon <dilinger@voxel.net> (supplier of updated kernel-source-2.6.8 package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmaster@debian.org)


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Format: 1.7
Date: Mon, 14 Mar 2005 05:18:40 -0500
Source: kernel-source-2.6.8
Binary: kernel-source-2.6.8 kernel-doc-2.6.8 kernel-tree-2.6.8 kernel-patch-debian-2.6.8
Architecture: source all
Version: 2.6.8-14
Distribution: unstable
Urgency: high
Maintainer: Debian kernel team <debian-kernel@lists.debian.org>
Changed-By: Andres Salomon <dilinger@voxel.net>
Description: 
 kernel-doc-2.6.8 - Linux kernel specific documentation for version 2.6.8
 kernel-patch-debian-2.6.8 - Debian patches to Linux 2.6.8
 kernel-source-2.6.8 - Linux kernel source for version 2.6.8 with Debian patches
 kernel-tree-2.6.8 - Linux kernel source tree for building Debian kernel images
Closes: 295626 296700
Changes: 
 kernel-source-2.6.8 (2.6.8-14) unstable; urgency=high
 .
   * Backport more scsi-ioctl fixes: add CMD_WARNED,  remove dulicate
     safe_for_read(READ_BUFFER), add LOG_SENSE as read-ok and
     LOG_SELECT as write-ok, quieten scsi ioctl when asking for
     a lot of memory and failing. (Maximilian Attems)
 .
   * ia64-ptrace-speedup.dpatch
     Backport needed to form a base on top of which ia64-ptrace-fixes will
     apply. (dann frazier)
 .
   * [SECURITY] ia64-ptrace-fixes.dpatch
     Fix some corner cases in ia64 ptrace code; CAN-2005-0136
     (dann frazier).
 .
   * [SECURITY] ia64-unwind-fix.dpatch
     unw_unwind_to_user sanity check; CAN-2005-0135
     (dann frazier).
 .
   * Updated kernel-tree description from Martin F Krafft
     (Simon Horman)
 .
   * Updated apply script so it can handle point versions
     (Simon Horman)
 .
   * skb-reset-ip_summed.dpatch: resolve checksumming exploit in
     fragmented packet forwarding (Joshua Kwan)
 .
   * sparc64-nis-killer.dpatch: patch that fixes some compatibility functions
     that (as a side effect) caused NIS to flatten a sparc64 machine.
     closes: #295626 (Joshua Kwan)
 .
   * Turn ifeq into a shell construct to allow things to still work if the orig
     tarball is unavailable. (Joshua Kwan)
 .
   * au88x0-use-short-name.dpatch: Use CARD_SHORT_NAME in au88x0.c to allow
     card-specific driver names (CARD_SHORT_NAME is redefined by each driver.)
     (Joshua Kwan)
 .
   * proc-cmdline-mmput-leak.dpatch: [CAN-2004-1058] fix race that could
     allow user processes to read environment data from processes in the
     middle of spawning. (Joshua Kwan)
 .
   * 025-track_dummy_capability.dpatch, 027-track_dummy_capability.dpatch:
     [CAN-2004-1337] The dummy capabilities module wasn't keeping track of
     processes capabilities; so, when a capabilities module was loaded,
     all untracked processes would magically be given root capabilities.
     Backport from 2.6.10's kernel-source. (Joshua Kwan)
 .
   * setsid-race.dpatch: [CAN-2005-0178] fix setsid() race that could lead
     to a denial of service. (Joshua Kwan)
 .
   * outs.dpatch: [CAN-2005-0204] AMD64, allows local users to write to
     privileged IO ports via OUTS instruction.
     (Simon Horman) (closes: #296700)
 .
   * ipv4-fragment-queues-1.dpatch, ipv4-fragment-queues-2.dpatch,
     ipv4-fragment-queues-3.dpatch, ipv4-fragment-queues-4.dpatch:
     fix potential information leak by making fragment queues private.
     (Joshua Kwan, Simon Horman)
 .
   * sparc64-sb1500-clock-2.6.dpatch by David Miller: enable recognition
     of the clock chip on SunBlade 1500, it won't boot otherwise.
     (Jurij Smakov).
 .
   * 2.6.11.2 [SECURITY] epoll: return proper error on overflow condition
     (Maximilian Attems)
 .
   * nfs-O_DIRECT-fix.dpatch: [CAN-2005-0207] set some things to NULL in
     an error condition to prevent some nondeterministic behavior.
     (Joshua Kwan)
 .
   * [sparc] Added sparc-sunsab-serial-lockup.dpatch to eliminate the serial
     console lockup on machines with sunsab serial controller (Jurij Smakov).
 .
   * nls-table-overflow.dpatch: [CAN-2005-0177] NLS ASCII table should be 256
     entries, not 128! (Joshua Kwan)
 .
   * [SECURITY] 109-binfmt_elf_loader_solar_designer_fixes.dpatch
     Fix from Solar Designer; the binfmt_elf load routines are returning
     incorrect values, and are not strict enough in checking the number of
     program headers (Andres Salomon).
 .
   * [SECURITY] 115-proc_file_read_nbytes_signedness_fix.dpatch
     Heap overflow fix in /proc; WDYBTGT3-1 on
     http://www.guninski.com/where_do_you_want_billg_to_go_today_3.html
     No CAN# assigned yet, afaik (Andres Salomon).
 .
   * [SECURITY] 116-n_tty_copy_from_read_buf_signedness_fixes.dpatch
     copy_from_read_buf() fix; WDYBTGT3-2 on
     http://www.guninski.com/where_do_you_want_billg_to_go_today_3.html
     No CAN#, yet (Andres Salomon).
 .
   * [SECURITY] 117-reiserfs_file_64bit_size_t_fixes.dpatch
     reiserfs integer fixes; WDYBTGT3-4 on
     http://www.guninski.com/where_do_you_want_billg_to_go_today_3.html
     (Andres Salomon).
 .
   * [SECURITY] 123-atm_get_addr_signedness_fix.dpatch
     Fix atm_get_addr()'s usage of its size arg, by making it
     unsigned.  WDYBTGT3-3 on
     http://www.guninski.com/where_do_you_want_billg_to_go_today_3.html
     (Andres Salomon).
 .
   * 143-sysfs_write_file_signedness_problem.dpatch
     sysfs_write_file assigns the result of fill_write_buffer (which is
     signed and returns negative upon error) to an unsigned int.  Clearly,
     bad and wrong.. (Andres Salomon)
Files: 
 19017701efb72cca2e5dcd47328ca951 956 devel optional kernel-source-2.6.8_2.6.8-14.dsc
 1657f46bafe414da9a01420c594d2c49 888287 devel optional kernel-source-2.6.8_2.6.8-14.diff.gz
 9c7124b2b53852954e34177839663286 864716 devel optional kernel-patch-debian-2.6.8_2.6.8-14_all.deb
 e185dde5774f1ac1dbe069689dfe85cd 34922198 devel optional kernel-source-2.6.8_2.6.8-14_all.deb
 b38d4abcc09e2d018f46af59c23e9c18 27292 devel optional kernel-tree-2.6.8_2.6.8-14_all.deb
 b8b10533316d5c888ca74be2d047e1bd 6176440 doc optional kernel-doc-2.6.8_2.6.8-14_all.deb

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.0 (GNU/Linux)

iD8DBQFCNY8k78o9R9NraMQRAl5ZAKCR5aZX+jDWo6QNKA3/3IIQ6eX+2wCffB+N
eMyPoqKTGn6OItsGodNKCKc=
=nK2I
-----END PGP SIGNATURE-----



Reply to: