Your message dated Mon, 31 Jan 2005 21:02:29 -0500
with message-id <[EMAIL PROTECTED]>
and subject line Bug#290566: fixed in quagga 0.98.1-1
has caused the attached Bug report to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what I am
talking about this indicates a serious mail system misconfiguration
somewhere.  Please contact me immediately.)

Debian bug tracking system administrator
(administrator, Debian Bugs database)

--------------------------------------
Received: (at submit) by bugs.debian.org; 14 Jan 2005 22:10:42 +0000
>From [EMAIL PROTECTED] Fri Jan 14 14:10:42 2005
Return-path: <[EMAIL PROTECTED]>
Received: from krishna.via.ecp.fr [138.195.130.71] 
        by spohr.debian.org with esmtp (Exim 3.35 1 (Debian))
        id 1CpZeT-0005NE-00; Fri, 14 Jan 2005 14:10:41 -0800
Received: from localhost (localhost [127.0.0.1])
        by krishna.via.ecp.fr (Postfix) with ESMTP id 890D5B6F5;
        Fri, 14 Jan 2005 23:10:40 +0100 (CET)
Received: from krishna.via.ecp.fr ([127.0.0.1])
        by localhost (krishna [127.0.0.1]) (amavisd-new, port 10024)
        with ESMTP id 19152-96; Fri, 14 Jan 2005 23:10:40 +0100 (CET)
Received: from muscipula (muscipula152.via.ecp.fr [138.195.152.171])
        by krishna.via.ecp.fr (Postfix) with ESMTP id 6BD91B613;
        Fri, 14 Jan 2005 23:10:40 +0100 (CET)
Received: by muscipula (Postfix, from userid 1000)
        id A7AD5D5EA3; Fri, 14 Jan 2005 23:13:38 +0100 (CET)
Content-Type: text/plain; charset="us-ascii"
MIME-Version: 1.0
Content-Transfer-Encoding: 7bit
From: 3 <[EMAIL PROTECTED]>
To: Debian Bug Tracking System <[EMAIL PROTECTED]>
Subject: quagga: ospfd assertion failed when sending fragmented IP
X-Mailer: reportbug 3.5
Date: Fri, 14 Jan 2005 23:13:37 +0100
Message-Id: <[EMAIL PROTECTED]>
X-Virus-Scanned: by amavisd-new-20030616-p10 (Debian) at via.ecp.fr
Delivered-To: [EMAIL PROTECTED]
X-Spam-Checker-Version: SpamAssassin 2.60-bugs.debian.org_2005_01_02 
        (1.212-2003-09-23-exp) on spohr.debian.org
X-Spam-Status: No, hits=-8.0 required=4.0 tests=BAYES_00,HAS_PACKAGE 
        autolearn=no version=2.60-bugs.debian.org_2005_01_02
X-Spam-Level: 

Package: quagga
Version: 0.98.0-1
Severity: important


Ospfd fails when sending an IP paquet over the 1500 MTU limit.

Corresponding ospfd.log is :
2005/01/14 11:45:57 OSPF: Packet[DD]: Neighbor 138.195.157.81 Negotiation done 
(Master).
2005/01/14 11:45:57 OSPF: Packet[DD]: Neighbor 138.195.157.17 Negotiation done 
(Master).
2005/01/14 11:45:57 OSPF: nsm_change_state(138.195.157.81, Exchange -> Full): 
scheduling new router-LSA origination
2005/01/14 11:45:57 OSPF: nsm_change_state(138.195.157.17, Exchange -> Full): 
scheduling new router-LSA origination
2005/01/14 11:45:58 OSPF: DR-Election[1st]: Backup 138.195.152.171 2005/01/14 
11:45:58 OSPF: DR-Election[1st]: DR     138.195.152.145 2005/01/14 11:45:58 
OSPF: Packet[DD]: Neighbor 138.195.157.214 Negotiation done (Slave).
2005/01/14 11:45:58 OSPF: nsm_change_state(138.195.157.214, Exchange -> Full): 
scheduling new router-LSA origination
2005/01/14 11:45:58 OSPF: ospf_make_md5_digest: length mismatch stream 1500 
ospf_packet 1508
2005/01/14 11:45:58 OSPF: Assertion `op->length == stream_get_endp(op->s)' 
failed in file ospf_packet.c, line 496, function ospf_write_frags
2005/01/14 11:45:58 OSPF: Backtrace for 8 stack frames:
2005/01/14 11:45:58 OSPF: [bt 0] /usr/lib/libzebra.so.0(zlog_backtrace+0x1f) 
[0xb7f39832]
2005/01/14 11:45:58 OSPF: [bt 1] 
/usr/lib/libzebra.so.0(_zlog_assert_failed+0x39) [0xb7f39a08]
2005/01/14 11:45:58 OSPF: [bt 2] /usr/lib/libospf.so.0(ospf_write_frags+0xda) 
[0xb7f83abf]
2005/01/14 11:45:58 OSPF: [bt 3] /usr/lib/libospf.so.0(ospf_write+0x2c9) 
[0xb7f83edd]
2005/01/14 11:45:58 OSPF: [bt 4] /usr/lib/libzebra.so.0(thread_call+0x52) 
[0xb7f3195e]
2005/01/14 11:45:58 OSPF: [bt 5] /usr/lib/quagga/ospfd(main+0x2cf) [0x8049515]
2005/01/14 11:45:58 OSPF: [bt 6] /lib/tls/libc.so.6(__libc_start_main+0xf4) 
[0xb7ba0904]
2005/01/14 11:45:58 OSPF: [bt 7] /usr/lib/quagga/ospfd [0x8049131]

-- System Information:
Debian Release: 3.1
  APT prefers unstable
  APT policy: (500, 'unstable')
Architecture: i386 (i686)
Kernel: Linux 2.6.10
Locale: LANG=C, LC_CTYPE=C (charmap=ANSI_X3.4-1968)

Versions of packages quagga depends on:
ii  debconf                     1.4.41       Debian configuration management sy
ii  iproute                     20041019-2   Professional tools to control the 
ii  libc6                       2.3.2.ds1-20 GNU C Library: Shared libraries an
ii  libcap1                     1:1.10-14    support for getting/setting POSIX.
ii  libncurses5                 5.4-4        Shared libraries for terminal hand
ii  libpam0g                    0.76-22      Pluggable Authentication Modules l
ii  libreadline4                4.3-15       GNU readline and history libraries
ii  libsnmp5                    5.1.2-6      NET SNMP (Simple Network Managemen
ii  libssl0.9.7                 0.9.7e-3     SSL shared libraries
ii  logrotate                   3.7-2        Log rotation utility

-- debconf information:
* quagga/upgrade_notes:

---------------------------------------
Received: (at 290566-close) by bugs.debian.org; 1 Feb 2005 02:08:09 +0000
>From [EMAIL PROTECTED] Mon Jan 31 18:08:09 2005
Return-path: <[EMAIL PROTECTED]>
Received: from newraff.debian.org [208.185.25.31] (mail)
        by spohr.debian.org with esmtp (Exim 3.35 1 (Debian))
        id 1CvnSb-0004kr-00; Mon, 31 Jan 2005 18:08:09 -0800
Received: from katie by newraff.debian.org with local (Exim 3.35 1 (Debian))
        id 1CvnN7-0007DV-00; Mon, 31 Jan 2005 21:02:29 -0500
From: Christian Hammers <[EMAIL PROTECTED]>
To: [EMAIL PROTECTED]
X-Katie: $Revision: 1.55 $
Subject: Bug#290566: fixed in quagga 0.98.1-1
Message-Id: <[EMAIL PROTECTED]>
Sender: Archive Administrator <[EMAIL PROTECTED]>
Date: Mon, 31 Jan 2005 21:02:29 -0500
Delivered-To: [EMAIL PROTECTED]
X-Spam-Checker-Version: SpamAssassin 2.60-bugs.debian.org_2005_01_02 
        (1.212-2003-09-23-exp) on spohr.debian.org
X-Spam-Status: No, hits=-6.0 required=4.0 tests=BAYES_00,HAS_BUG_NUMBER 
        autolearn=no version=2.60-bugs.debian.org_2005_01_02
X-Spam-Level: 

Source: quagga
Source-Version: 0.98.1-1

We believe that the bug you reported is fixed in the latest version of
quagga, which is due to be installed in the Debian FTP archive:

quagga-doc_0.98.1-1_all.deb
  to pool/main/q/quagga/quagga-doc_0.98.1-1_all.deb
quagga_0.98.1-1.diff.gz
  to pool/main/q/quagga/quagga_0.98.1-1.diff.gz
quagga_0.98.1-1.dsc
  to pool/main/q/quagga/quagga_0.98.1-1.dsc
quagga_0.98.1-1_i386.deb
  to pool/main/q/quagga/quagga_0.98.1-1_i386.deb
quagga_0.98.1.orig.tar.gz
  to pool/main/q/quagga/quagga_0.98.1.orig.tar.gz



A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to [EMAIL PROTECTED],
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Christian Hammers <[EMAIL PROTECTED]> (supplier of updated quagga package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing [EMAIL PROTECTED])


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Format: 1.7
Date: Tue,  1 Feb 2005 02:01:27 +0100
Source: quagga
Binary: quagga quagga-doc
Architecture: source i386 all
Version: 0.98.1-1
Distribution: unstable
Urgency: medium
Maintainer: Christian Hammers <[EMAIL PROTECTED]>
Changed-By: Christian Hammers <[EMAIL PROTECTED]>
Description: 
 quagga     - unoff. successor of the Zebra BGP/OSPF/RIP routing daemon
 quagga-doc - documentation files for quagga
Closes: 290566 291509 292690
Changes: 
 quagga (0.98.1-1) unstable; urgency=medium
 .
   * New upstream version
     "fixing a fatal OSPF + MD5 auth regression, and a non-fatal high-load
      regression in bgpd which were present in the 0.98.0 release."
   * Upstream version fixes bug in ospfd that could lead to crash when OSPF
     packages had a MTU > 1500. Closes: #290566
   * Added notice regarding capability kernel support to README.Debian
     (thanks to Florian Weimer). Closes: #291509
   * Changed permission setting in postinst script (thanks to Bastian Blank).
     Closes: #292690
Files: 
 b9d7b5eeae08cf5bb042e622565165e9 704 net optional quagga_0.98.1-1.dsc
 2262eebae593ef4b7739b16c66242c75 2001471 net optional quagga_0.98.1.orig.tar.gz
 b4dd0f97c3e43e933f032974c959e81c 30180 net optional quagga_0.98.1-1.diff.gz
 7170a6169e59f21022da00ebcd6620ea 482976 net optional 
quagga-doc_0.98.1-1_all.deb
 173585e216d6422e48de2b60139bd48b 1228810 net optional quagga_0.98.1-1_i386.deb

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.2.5 (GNU/Linux)

iEYEARECAAYFAkH+32gACgkQkR9K5oahGOZ3/gCgorR0D2BjTt4H1+w90NMWEhOC
YOwAoKRY1ZbAAjNXYRO+VTKFTH8ExAdO
=6Bwm
-----END PGP SIGNATURE-----


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]

Reply via email to