Your message dated Mon, 31 Jan 2005 21:02:29 -0500
with message-id <[EMAIL PROTECTED]>
and subject line Bug#290566: fixed in quagga 0.98.1-1
has caused the attached Bug report to be marked as done.
This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.
(NB: If you are a system administrator and have no idea what I am
talking about this indicates a serious mail system misconfiguration
somewhere. Please contact me immediately.)
Debian bug tracking system administrator
(administrator, Debian Bugs database)
--------------------------------------
Received: (at submit) by bugs.debian.org; 14 Jan 2005 22:10:42 +0000
>From [EMAIL PROTECTED] Fri Jan 14 14:10:42 2005
Return-path: <[EMAIL PROTECTED]>
Received: from krishna.via.ecp.fr [138.195.130.71]
by spohr.debian.org with esmtp (Exim 3.35 1 (Debian))
id 1CpZeT-0005NE-00; Fri, 14 Jan 2005 14:10:41 -0800
Received: from localhost (localhost [127.0.0.1])
by krishna.via.ecp.fr (Postfix) with ESMTP id 890D5B6F5;
Fri, 14 Jan 2005 23:10:40 +0100 (CET)
Received: from krishna.via.ecp.fr ([127.0.0.1])
by localhost (krishna [127.0.0.1]) (amavisd-new, port 10024)
with ESMTP id 19152-96; Fri, 14 Jan 2005 23:10:40 +0100 (CET)
Received: from muscipula (muscipula152.via.ecp.fr [138.195.152.171])
by krishna.via.ecp.fr (Postfix) with ESMTP id 6BD91B613;
Fri, 14 Jan 2005 23:10:40 +0100 (CET)
Received: by muscipula (Postfix, from userid 1000)
id A7AD5D5EA3; Fri, 14 Jan 2005 23:13:38 +0100 (CET)
Content-Type: text/plain; charset="us-ascii"
MIME-Version: 1.0
Content-Transfer-Encoding: 7bit
From: 3 <[EMAIL PROTECTED]>
To: Debian Bug Tracking System <[EMAIL PROTECTED]>
Subject: quagga: ospfd assertion failed when sending fragmented IP
X-Mailer: reportbug 3.5
Date: Fri, 14 Jan 2005 23:13:37 +0100
Message-Id: <[EMAIL PROTECTED]>
X-Virus-Scanned: by amavisd-new-20030616-p10 (Debian) at via.ecp.fr
Delivered-To: [EMAIL PROTECTED]
X-Spam-Checker-Version: SpamAssassin 2.60-bugs.debian.org_2005_01_02
(1.212-2003-09-23-exp) on spohr.debian.org
X-Spam-Status: No, hits=-8.0 required=4.0 tests=BAYES_00,HAS_PACKAGE
autolearn=no version=2.60-bugs.debian.org_2005_01_02
X-Spam-Level:
Package: quagga
Version: 0.98.0-1
Severity: important
Ospfd fails when sending an IP paquet over the 1500 MTU limit.
Corresponding ospfd.log is :
2005/01/14 11:45:57 OSPF: Packet[DD]: Neighbor 138.195.157.81 Negotiation done
(Master).
2005/01/14 11:45:57 OSPF: Packet[DD]: Neighbor 138.195.157.17 Negotiation done
(Master).
2005/01/14 11:45:57 OSPF: nsm_change_state(138.195.157.81, Exchange -> Full):
scheduling new router-LSA origination
2005/01/14 11:45:57 OSPF: nsm_change_state(138.195.157.17, Exchange -> Full):
scheduling new router-LSA origination
2005/01/14 11:45:58 OSPF: DR-Election[1st]: Backup 138.195.152.171 2005/01/14
11:45:58 OSPF: DR-Election[1st]: DR 138.195.152.145 2005/01/14 11:45:58
OSPF: Packet[DD]: Neighbor 138.195.157.214 Negotiation done (Slave).
2005/01/14 11:45:58 OSPF: nsm_change_state(138.195.157.214, Exchange -> Full):
scheduling new router-LSA origination
2005/01/14 11:45:58 OSPF: ospf_make_md5_digest: length mismatch stream 1500
ospf_packet 1508
2005/01/14 11:45:58 OSPF: Assertion `op->length == stream_get_endp(op->s)'
failed in file ospf_packet.c, line 496, function ospf_write_frags
2005/01/14 11:45:58 OSPF: Backtrace for 8 stack frames:
2005/01/14 11:45:58 OSPF: [bt 0] /usr/lib/libzebra.so.0(zlog_backtrace+0x1f)
[0xb7f39832]
2005/01/14 11:45:58 OSPF: [bt 1]
/usr/lib/libzebra.so.0(_zlog_assert_failed+0x39) [0xb7f39a08]
2005/01/14 11:45:58 OSPF: [bt 2] /usr/lib/libospf.so.0(ospf_write_frags+0xda)
[0xb7f83abf]
2005/01/14 11:45:58 OSPF: [bt 3] /usr/lib/libospf.so.0(ospf_write+0x2c9)
[0xb7f83edd]
2005/01/14 11:45:58 OSPF: [bt 4] /usr/lib/libzebra.so.0(thread_call+0x52)
[0xb7f3195e]
2005/01/14 11:45:58 OSPF: [bt 5] /usr/lib/quagga/ospfd(main+0x2cf) [0x8049515]
2005/01/14 11:45:58 OSPF: [bt 6] /lib/tls/libc.so.6(__libc_start_main+0xf4)
[0xb7ba0904]
2005/01/14 11:45:58 OSPF: [bt 7] /usr/lib/quagga/ospfd [0x8049131]
-- System Information:
Debian Release: 3.1
APT prefers unstable
APT policy: (500, 'unstable')
Architecture: i386 (i686)
Kernel: Linux 2.6.10
Locale: LANG=C, LC_CTYPE=C (charmap=ANSI_X3.4-1968)
Versions of packages quagga depends on:
ii debconf 1.4.41 Debian configuration management sy
ii iproute 20041019-2 Professional tools to control the
ii libc6 2.3.2.ds1-20 GNU C Library: Shared libraries an
ii libcap1 1:1.10-14 support for getting/setting POSIX.
ii libncurses5 5.4-4 Shared libraries for terminal hand
ii libpam0g 0.76-22 Pluggable Authentication Modules l
ii libreadline4 4.3-15 GNU readline and history libraries
ii libsnmp5 5.1.2-6 NET SNMP (Simple Network Managemen
ii libssl0.9.7 0.9.7e-3 SSL shared libraries
ii logrotate 3.7-2 Log rotation utility
-- debconf information:
* quagga/upgrade_notes:
---------------------------------------
Received: (at 290566-close) by bugs.debian.org; 1 Feb 2005 02:08:09 +0000
>From [EMAIL PROTECTED] Mon Jan 31 18:08:09 2005
Return-path: <[EMAIL PROTECTED]>
Received: from newraff.debian.org [208.185.25.31] (mail)
by spohr.debian.org with esmtp (Exim 3.35 1 (Debian))
id 1CvnSb-0004kr-00; Mon, 31 Jan 2005 18:08:09 -0800
Received: from katie by newraff.debian.org with local (Exim 3.35 1 (Debian))
id 1CvnN7-0007DV-00; Mon, 31 Jan 2005 21:02:29 -0500
From: Christian Hammers <[EMAIL PROTECTED]>
To: [EMAIL PROTECTED]
X-Katie: $Revision: 1.55 $
Subject: Bug#290566: fixed in quagga 0.98.1-1
Message-Id: <[EMAIL PROTECTED]>
Sender: Archive Administrator <[EMAIL PROTECTED]>
Date: Mon, 31 Jan 2005 21:02:29 -0500
Delivered-To: [EMAIL PROTECTED]
X-Spam-Checker-Version: SpamAssassin 2.60-bugs.debian.org_2005_01_02
(1.212-2003-09-23-exp) on spohr.debian.org
X-Spam-Status: No, hits=-6.0 required=4.0 tests=BAYES_00,HAS_BUG_NUMBER
autolearn=no version=2.60-bugs.debian.org_2005_01_02
X-Spam-Level:
Source: quagga
Source-Version: 0.98.1-1
We believe that the bug you reported is fixed in the latest version of
quagga, which is due to be installed in the Debian FTP archive:
quagga-doc_0.98.1-1_all.deb
to pool/main/q/quagga/quagga-doc_0.98.1-1_all.deb
quagga_0.98.1-1.diff.gz
to pool/main/q/quagga/quagga_0.98.1-1.diff.gz
quagga_0.98.1-1.dsc
to pool/main/q/quagga/quagga_0.98.1-1.dsc
quagga_0.98.1-1_i386.deb
to pool/main/q/quagga/quagga_0.98.1-1_i386.deb
quagga_0.98.1.orig.tar.gz
to pool/main/q/quagga/quagga_0.98.1.orig.tar.gz
A summary of the changes between this version and the previous one is
attached.
Thank you for reporting the bug, which will now be closed. If you
have further comments please address them to [EMAIL PROTECTED],
and the maintainer will reopen the bug report if appropriate.
Debian distribution maintenance software
pp.
Christian Hammers <[EMAIL PROTECTED]> (supplier of updated quagga package)
(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing [EMAIL PROTECTED])
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
Format: 1.7
Date: Tue, 1 Feb 2005 02:01:27 +0100
Source: quagga
Binary: quagga quagga-doc
Architecture: source i386 all
Version: 0.98.1-1
Distribution: unstable
Urgency: medium
Maintainer: Christian Hammers <[EMAIL PROTECTED]>
Changed-By: Christian Hammers <[EMAIL PROTECTED]>
Description:
quagga - unoff. successor of the Zebra BGP/OSPF/RIP routing daemon
quagga-doc - documentation files for quagga
Closes: 290566 291509 292690
Changes:
quagga (0.98.1-1) unstable; urgency=medium
.
* New upstream version
"fixing a fatal OSPF + MD5 auth regression, and a non-fatal high-load
regression in bgpd which were present in the 0.98.0 release."
* Upstream version fixes bug in ospfd that could lead to crash when OSPF
packages had a MTU > 1500. Closes: #290566
* Added notice regarding capability kernel support to README.Debian
(thanks to Florian Weimer). Closes: #291509
* Changed permission setting in postinst script (thanks to Bastian Blank).
Closes: #292690
Files:
b9d7b5eeae08cf5bb042e622565165e9 704 net optional quagga_0.98.1-1.dsc
2262eebae593ef4b7739b16c66242c75 2001471 net optional quagga_0.98.1.orig.tar.gz
b4dd0f97c3e43e933f032974c959e81c 30180 net optional quagga_0.98.1-1.diff.gz
7170a6169e59f21022da00ebcd6620ea 482976 net optional
quagga-doc_0.98.1-1_all.deb
173585e216d6422e48de2b60139bd48b 1228810 net optional quagga_0.98.1-1_i386.deb
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.2.5 (GNU/Linux)
iEYEARECAAYFAkH+32gACgkQkR9K5oahGOZ3/gCgorR0D2BjTt4H1+w90NMWEhOC
YOwAoKRY1ZbAAjNXYRO+VTKFTH8ExAdO
=6Bwm
-----END PGP SIGNATURE-----
--
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]