[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

Bug#895381: marked as done (rpc.gssd: WARNING: handle_gssd_upcall: failed to find uid in upcall string 'mech=krb5')



Your message dated Sat, 06 Apr 2019 16:49:01 +0000
with message-id <E1hCoV3-00055X-CJ@fasolo.debian.org>
and subject line Bug#895381: fixed in nfs-utils 1:1.3.4-2.5
has caused the Debian Bug report #895381,
regarding rpc.gssd: WARNING: handle_gssd_upcall: failed to find uid in upcall string 'mech=krb5'
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact owner@bugs.debian.org
immediately.)


-- 
895381: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=895381
Debian Bug Tracking System
Contact owner@bugs.debian.org with problems
--- Begin Message ---
Package: nfs-common
Version: 1:1.3.4-2.1
Severity: serious
Tags: fixed-upstream patch

One of my systems has logged
rpc.gssd[1168]: WARNING: handle_gssd_upcall: failed to find uid in upcall string 'mech=krb5'

This turns out to be a known problem, covered extensively in
https://bugzilla.redhat.com/show_bug.cgi?id=1419280

Please cherry-pick upstream commit 5ae8be8b6af1a0fdf2fa26051a05d4c04d028849
(and possibly 0a4f5e4daccdeba767b9ef36e30efbd7fd9a76d8 as well, although
I'd rate that at a lower severity).

--- End Message ---
--- Begin Message ---
Source: nfs-utils
Source-Version: 1:1.3.4-2.5

We believe that the bug you reported is fixed in the latest version of
nfs-utils, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 895381@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Bernd Zeimetz <bzed@debian.org> (supplier of updated nfs-utils package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmaster@ftp-master.debian.org)


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

Format: 1.8
Date: Sat, 06 Apr 2019 18:30:39 +0200
Source: nfs-utils
Architecture: source
Version: 1:1.3.4-2.5
Distribution: unstable
Urgency: medium
Maintainer: Debian kernel team <debian-kernel@lists.debian.org>
Changed-By: Bernd Zeimetz <bzed@debian.org>
Closes: 895381
Changes:
 nfs-utils (1:1.3.4-2.5) unstable; urgency=medium
 .
   * Non-maintainer upload.
 .
   [ Micha Lenk ]
   * [abaa2ab] handle_gssd_upcall: Fix failure to find uid in upcall string 'mech=krb5'
     by adding the suggested upstream commits as
     debian/patches/0010-gssd-replace-non-thread-safe-strtok-with-strsep.patch and
     debian/patches/0011-gssd-Duplicate-the-upcall-string-for-error-messages.patch.
     rpc.gssd: WARNING: handle_gssd_upcall: failed to find uid in upcall string 'mech=krb5'
     (Closes: #895381)
Checksums-Sha1:
 16b9db424f44eedb072bae11471e612c01baae14 2328 nfs-utils_1.3.4-2.5.dsc
 2c90c7f0694d3e4bc87018cbfaf7a0b639b65fe5 48552 nfs-utils_1.3.4-2.5.debian.tar.xz
 c4a336c6aeea90389b83240ee4eec96f2d90ac05 7984 nfs-utils_1.3.4-2.5_source.buildinfo
Checksums-Sha256:
 1c665d012e21a9f09e7b3c88e0dea30d7dedfb8c0cb3544cec4f67c5a627d47c 2328 nfs-utils_1.3.4-2.5.dsc
 2269f3902bab53941830aaf386c5b67bd4dff1e97697034ffb7c250ec530f553 48552 nfs-utils_1.3.4-2.5.debian.tar.xz
 b38193201297ef8184edcf4a7ef8118c2054e4bd4707d8974f3d4526214d9ea4 7984 nfs-utils_1.3.4-2.5_source.buildinfo
Files:
 3372d27d8149e6f5cb5b9eacb6917655 2328 net optional nfs-utils_1.3.4-2.5.dsc
 ec5284bf2280462b6bdc1bf321b28d69 48552 net optional nfs-utils_1.3.4-2.5.debian.tar.xz
 5a420a83e2709d4f2a9a08bf76f04838 7984 net optional nfs-utils_1.3.4-2.5_source.buildinfo

-----BEGIN PGP SIGNATURE-----
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=/guv
-----END PGP SIGNATURE-----

--- End Message ---

Reply to: