[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

Bug#993948: marked as done (kernel/amd64: system hang on HPE ProLiant BL460c Gen9)



Your message dated Sat, 25 Sep 2021 22:02:07 +0000
with message-id <E1mUFkF-000BoG-Or@fasolo.debian.org>
and subject line Bug#993948: fixed in linux 5.10.46-5
has caused the Debian Bug report #993948,
regarding kernel/amd64: system hang on HPE ProLiant BL460c Gen9
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact owner@bugs.debian.org
immediately.)


-- 
993948: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=993948
Debian Bug Tracking System
Contact owner@bugs.debian.org with problems
--- Begin Message ---
Package: src:linux
Version: 5.10

After upgrade to bullseyes' kernel, the system always hang after about 10 min
with an error from IML log

An Unrecoverable System Error (NMI) has occurred (Service Information:
0x00000008, 0x89480000)

Kernel 5.14 from experimental also has this problem.
Kernel 4.19 works fine.
Fedora 34 seems to be working well.

--
YunQiang Su

--- End Message ---
--- Begin Message ---
Source: linux
Source-Version: 5.10.46-5
Done: Salvatore Bonaccorso <carnil@debian.org>

We believe that the bug you reported is fixed in the latest version of
linux, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 993948@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Salvatore Bonaccorso <carnil@debian.org> (supplier of updated linux package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmaster@ftp-master.debian.org)


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

Format: 1.8
Date: Thu, 23 Sep 2021 22:35:21 +0200
Source: linux
Architecture: source
Version: 5.10.46-5
Distribution: bullseye-security
Urgency: high
Maintainer: Debian Kernel Team <debian-kernel@lists.debian.org>
Changed-By: Salvatore Bonaccorso <carnil@debian.org>
Closes: 993948 993978
Changes:
 linux (5.10.46-5) bullseye-security; urgency=high
 .
   * virtio_console: Assure used length from device is limited (CVE-2021-38160)
   * NFSv4: Initialise connection to the server in nfs4_alloc_client()
     (CVE-2021-38199)
   * tracing: Fix bug in rb_per_cpu_empty() that might cause deadloop.
     (CVE-2021-3679)
   * [poewrpc*] KVM: PPC: Book3S: Fix H_RTAS rets buffer overflow
     (CVE-2021-37576)
   * ovl: prevent private clone if bind mount is not allowed (CVE-2021-3732)
   * [x86] KVM: nSVM: avoid picking up unsupported bits from L2 in int_ctl
     (CVE-2021-3653)
   * [x86] KVM: nSVM: always intercept VMLOAD/VMSAVE when nested (CVE-2021-3656)
   * bpf: Fix integer overflow involving bucket_size (CVE-2021-38166)
   * ath: Use safer key clearing with key cache entries (CVE-2020-3702)
   * ath9k: Clear key cache explicitly on disabling hardware (CVE-2020-3702)
   * ath: Export ath_hw_keysetmac() (CVE-2020-3702)
   * ath: Modify ath_key_delete() to not need full key entry (CVE-2020-3702)
   * ath9k: Postpone key cache entry deletion for TXQ frames reference it
     (CVE-2020-3702)
   * btrfs: fix NULL pointer dereference when deleting device by invalid id
     (CVE-2021-3739)
   * net: qrtr: fix another OOB Read in qrtr_endpoint_post (CVE-2021-3743)
   * vt_kdsetmode: extend console locking (CVE-2021-3753)
   * ext4: fix race writing to an inline_data file while its xattrs are changing
     (CVE-2021-40490)
   * dccp: don't duplicate ccid when cloning dccp sock (CVE-2020-16119)
   * io_uring: ensure symmetry in handling iter types in loop_rw_iter()
     (CVE-2021-41073)
   * netfilter: nftables: avoid potential overflows on 32bit arches
   * netfilter: nf_tables: initialize set before expression setup
     (Closes: #993978)
   * netfilter: nftables: clone set element expression template
   * bnx2x: Fix enabling network interfaces without VFs (Closes: #993948)
Checksums-Sha1:
 d1458c7326ce4332617212e98a983ac139344ba1 195000 linux_5.10.46-5.dsc
 28d0ba1a26c98af40cd304a2dbbb9e7c03f2d172 121572512 linux_5.10.46.orig.tar.xz
 4085ce547e614c23d59041a078bc5652c0df1db5 4390148 linux_5.10.46-5.debian.tar.xz
 ff3a78a06e7ae519192ad245030dfa58acaa0b95 6274 linux_5.10.46-5_source.buildinfo
Checksums-Sha256:
 faddec22b3f6d13ec8b86f54449307c424252abe4b155672b28501dafb26474f 195000 linux_5.10.46-5.dsc
 bcd8edcbc6ed21d93dc138a754b1ac08329452c2ea509ae2a4071cd521da38a3 121572512 linux_5.10.46.orig.tar.xz
 89b2f8dae10a1b167b2579eab73ddef07b713bb3dd96ed566538031466bf5c81 4390148 linux_5.10.46-5.debian.tar.xz
 1837fad0a852eb9c0dd57fc023bb056b05bc131e6a02f85bf961b906b1cdf1c4 6274 linux_5.10.46-5_source.buildinfo
Files:
 7c32c30fb6f87698983b725febb45572 195000 kernel optional linux_5.10.46-5.dsc
 20074caf4bbf7773920f6e5f08beb771 121572512 kernel optional linux_5.10.46.orig.tar.xz
 7fbaae18cabdac77a69b9de7299807b8 4390148 kernel optional linux_5.10.46-5.debian.tar.xz
 eda90cb533c6861c00b15a0d70a656dc 6274 kernel optional linux_5.10.46-5_source.buildinfo

-----BEGIN PGP SIGNATURE-----
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=F4Sw
-----END PGP SIGNATURE-----

--- End Message ---

Reply to: