[Bug 459265] Re: oops in gss_validate
** Changed in: linux Importance: Unknown => Medium -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/459265 Title: oops in gss_validate -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 459265] Re: oops in gss_validate
This bug was fixed in the package linux - 2.6.31-17.54 --- linux (2.6.31-17.54) karmic-proposed; urgency=low [ John Johansen ] * SAUCE: AppArmor: Fix oops after profile removal - LP: #475619 * SAUCE: AppArmor: Fix Oops when in apparmor_bprm_set_creds - LP: #437258 * SAUCE: AppArmor: Fix cap audit_caching preemption disabling - LP: #479102 * SAUCE: AppArmor: Fix refcounting bug causing leak of creds - LP: #479115 * SAUCE: AppArmor: Fix oops there is no tracer and doing unsafe transition. - LP: #480112 [ Leann Ogasawara ] * Revert "[Upstream] (drop after 2.6.31) usb-storage: Workaround devices with bogus sense size" - LP: #461556 * Revert "[Upstream] (drop after 2.6.31) Input: synaptics - add another Protege M300 to rate blacklist" - LP: #480144 [ Tim Gardner ] * [Config] udeb: Add squashfs to fs-core-modules - LP: #352615 [ Upstream Kernel Changes ] * Revert "e1000e: swap max hw supported frame size between 82574 and 82583" - LP: #461556 * Revert "drm/i915: Fix FDI M/N setting according with correct color depth" - LP: #480144 * Revert "agp/intel: Add B43 chipset support" - LP: #480144 * Revert "drm/i915: add B43 chipset support" - LP: #480144 * Revert "ACPI: Attach the ACPI device to the ACPI handle as early as possible" - LP: #327499, #480144 * SCSI: Retry ADD_TO_MLQUEUE return value for EH commands - LP: #461556 * SCSI: Fix protection scsi_data_buffer leak - LP: #461556 * SCSI: sg: Free data buffers after calling blk_rq_unmap_user - LP: #461556 * ARM: pxa: workaround errata #37 by not using half turbo switching - LP: #461556 * tracing/filters: Fix memory leak when setting a filter - LP: #461556 * x86/paravirt: Use normal calling sequences for irq enable/disable - LP: #461556 * USB: ftdi_sio: remove tty->low_latency - LP: #461556 * USB: ftdi_sio: remove unused rx_byte counter - LP: #461556 * USB: ftdi_sio: clean up read completion handler - LP: #461556 * USB: ftdi_sio: re-implement read processing - LP: #461556 * USB: pl2303: fix error characters not being reported to ldisc - LP: #461556 * USB: digi_acceleport: Fix broken unthrottle. - LP: #461556 * USB: serial: don't call release without attach - LP: #461556 * USB: option: Toshiba G450 device id - LP: #461556 * USB: ipaq: fix oops when device is plugged in - LP: #461556 * USB: cp210x: Add support for the DW700 UART - LP: #461556 * USB: Fix throttling in generic usbserial driver - LP: #461556 * USB: storage: When a device returns no sense data, call it a Hardware Error - LP: #400652, #461556 * arm, cris, mips, sparc, powerpc, um, xtensa: fix build with bash 4.0 - LP: #461556 * intel-iommu: Cope with broken HP DC7900 BIOS - LP: #461556 * futex: Detect mismatched requeue targets - LP: #461556 * futex: Fix wakeup race by setting TASK_INTERRUPTIBLE before queue_me() - LP: #461556 * tpm-fixup-pcrs-sysfs-file-update - LP: #461556 * TPM: fix pcrread - LP: #461556 * Bluetooth: Disconnect HIDRAW devices on disconnect - LP: #461556 * Bluetooth: Add extra device reference counting for connections - LP: #461556 * Bluetooth: Let HIDP grab the device reference for connections - LP: #461556 * connector: Keep the skb in cn_callback_data - LP: #461556 * connector: Provide the sender's credentials to the callback - LP: #461556 * connector: Removed the destruct_data callback since it is always kfree_skb() - LP: #461556 * dm/connector: Only process connector packages from privileged processes - LP: #461556 * dst/connector: Disallow unpliviged users to configure dst - LP: #461556 * pohmelfs/connector: Disallow unpliviged users to configure pohmelfs - LP: #461556 * uvesafb/connector: Disallow unpliviged users to send netlink packets - LP: #461556 * e1000e: swap max hw supported frame size between 82574 and 82583 - LP: #461556, #445572 * MAINTAINERS: Fix Riku Voipio's address - LP: #461556 * macintosh: Don't assume i2c device probing always succeeds - LP: #461556 * i2c: Hide probe errors caused by ACPI resource conflicts - LP: #461556 * ALSA: Don't assume i2c device probing always succeeds - LP: #461556 * bsdacct: switch credentials for writing to the accounting file - LP: #461556 * sysfs: Allow sysfs_notify_dirent to be called from interrupt context. - LP: #461556 * Staging: rt2860sta: prevent a panic when disabling when associated - LP: #461556, #404626 * usb-storage: Workaround devices with bogus sense size - LP: #461556, #446146 * iwlwifi: incorrect method used for finding valid OTP blocks - LP: #461556 * mac80211: fix vlan and optimise RX - LP: #461556 * tty: Make flush_to_ldisc() locking more robust - LP: #461556 * Linux 2.6.31.5 - LP: #461556 * fs: pipe.c n
[Bug 459265] Re: oops in gss_validate
** Tags added: verification-done ** Tags removed: verification-needed -- oops in gss_validate https://bugs.launchpad.net/bugs/459265 You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
Re: [Bug 459265] Re: oops in gss_validate
On Sun, 2009-12-13 at 12:23 +, Alex wrote: > @Brian Murrell > "aptitude changelog linux-image-2.6.31-17-generic" says: > > > * NFSv4: Fix two unbalanced put_rpccred() issues. > - LP: #459265, #480144 Indeed. I must have missed this the first time around. -- oops in gss_validate https://bugs.launchpad.net/bugs/459265 You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 459265] Re: oops in gss_validate
@Brian Murrell "aptitude changelog linux-image-2.6.31-17-generic" says: * NFSv4: Fix two unbalanced put_rpccred() issues. - LP: #459265, #480144 That is the fix, isn't it? @Martin Pitt I have been running this kernel for a few days now. Didn't experience any crashes since. -- oops in gss_validate https://bugs.launchpad.net/bugs/459265 You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 459265] Re: oops in gss_validate
I see the new kernel (2.6.31-17.54) in karmic-proposed, but I don't see anything in the changelog that indicates that it fixes this problem. Neither does this bug number show up as one of the fixed issues in the changelog nor does the changelog show that this is an upstream 2.6.31.6 kernel. -- oops in gss_validate https://bugs.launchpad.net/bugs/459265 You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 459265] Re: oops in gss_validate
Accepted linux into karmic-proposed, the package will build now and be available in a few hours. Please test and give feedback here. See https://wiki.ubuntu.com/Testing/EnableProposed for documentation how to enable and use -proposed. Thank you in advance! ** Tags added: verification-needed -- oops in gss_validate https://bugs.launchpad.net/bugs/459265 You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 459265] Re: oops in gss_validate
** Branch linked: lp:ubuntu/linux-fsl-imx51 -- oops in gss_validate https://bugs.launchpad.net/bugs/459265 You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 459265] Re: oops in gss_validate
** Branch linked: lp:ubuntu/linux-mvl-dove -- oops in gss_validate https://bugs.launchpad.net/bugs/459265 You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
Re: [Bug 459265] Re: oops in gss_validate
On Fri, 2009-11-27 at 04:50 +, Steve Langasek wrote: > > And the bug has been marked 'fix committed', implying that it will be pulled > into the next kernel SRU via 2.6.31.6. Great. Can't wait to get off of this 2.6.30 kernel. > Yes, it is. I guess my point was that it should not be. Using/exercising NFSv4 during a QA cycle should not be difficult -- quite simple in fact. It's the sort of thing that should be included into standard QA testing given how easily it can be done. No special tests even need be created for it. Just using it instead of (or rather in conjunction with) NFSv3, CIFS and local filesystems should be enough. -- oops in gss_validate https://bugs.launchpad.net/bugs/459265 You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
Re: [Bug 459265] Re: oops in gss_validate
On Thu, Nov 26, 2009 at 01:11:29PM -, Brian J. Murrell wrote: > Yup. IIRC that is based on 2.6.31.4 and the fix went into .6 (these are > upstream release versions, not Ubuntu package release versions). And the bug has been marked 'fix committed', implying that it will be pulled into the next kernel SRU via 2.6.31.6. > Surely NFS4 is not all that uncommon. Yes, it is. -- Steve Langasek Give me a lever long enough and a Free OS Debian Developer to set it on, and I can move the world. Ubuntu Developerhttp://www.debian.org/ slanga...@ubuntu.com vor...@debian.org -- oops in gss_validate https://bugs.launchpad.net/bugs/459265 You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
Re: [Bug 459265] Re: oops in gss_validate
On Thu, 2009-11-26 at 07:47 +, Wolfgang Granzer wrote: > It seems that the fix has not been integrated yet in Karmic. Right. > I have > updated to 2.6.31-15. However, the "gss_validate" problem remains. Yup. IIRC that is based on 2.6.31.4 and the fix went into .6 (these are upstream release versions, not Ubuntu package release versions). > Is there any reason why the fix has not been submitted for Karmic? Good question. > This > bug is really serious since it makes Karmic completely unusable if NFS4 > mounts are used. Indeed. What really puzzles me though is how does this kind of crap always seem to slip through the QA process? Are they not trying to exercise at least the most common functionality before calling a release "good"? Surely NFS4 is not all that uncommon. -- oops in gss_validate https://bugs.launchpad.net/bugs/459265 You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 459265] Re: oops in gss_validate
It seems that the fix has not been integrated yet in Karmic. I have updated to 2.6.31-15. However, the "gss_validate" problem remains. Is there any reason why the fix has not been submitted for Karmic? This bug is really serious since it makes Karmic completely unusable if NFS4 mounts are used. -- oops in gss_validate https://bugs.launchpad.net/bugs/459265 You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 459265] Re: oops in gss_validate
Does comment #3 mean we should see a fix for this in Karmic? -- oops in gss_validate https://bugs.launchpad.net/bugs/459265 You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 459265] Re: oops in gss_validate
Should be in Lucid. ** Changed in: linux (Ubuntu) Status: Triaged => Fix Released ** Changed in: linux (Ubuntu Karmic) Importance: Undecided => Medium ** Changed in: linux (Ubuntu Karmic) Status: New => Fix Committed ** Description changed: + SRU Justification: + + Impact: Unbalanced references caused use after free which result in an + oops. + + Fix: Patch coming in with 2.6.31.2 + + --- + As reported upstream, there is a regression in the 2.6.31 kernel with regard to GSS authenticated NFS mounts. I have run into this on the Karmic 2.6.31-14-generic #48-Ubuntu kernel. I can't see why this cannot and should not block the release of Karmic. For the benefit of this bug, the oops looks like: [253207.745918] BUG: unable to handle kernel NULL pointer dereference at 0010 [253207.749013] IP: [] gss_validate+0x7b/0x1d0 [auth_rpcgss] - [253207.753994] *pde = 94fb8067 - [253207.753994] Oops: [#1] SMP + [253207.753994] *pde = 94fb8067 + [253207.753994] Oops: [#1] SMP [253207.753994] last sysfs file: /sys/devices/pci:00/:00:0b.1/usb1/1-3/1-3:1.0/host6/target6:0:0/6:0:0:0/block/sde/sde1/stat [253207.753994] Modules linked in: xt_multiport binfmt_misc bridge stp bnep vboxnetflt vboxdrv tun des_generic cbc autofs4 video output rpcsec_gss_krb5 nfsd exportfs nfs lockd nfs_acl auth_rpcgss sunrpc nf_conntrack_ipv6 xt_hl ipt_LOG xt_limit ipt_REJECT xt_tcpudp x - [253207.842462] + [253207.842462] [253207.842462] Pid: 4036, comm: rpciod/1 Tainted: P (2.6.31-14-generic #48-Ubuntu) System Product Name [253207.842462] EIP: 0060:[] EFLAGS: 00010296 CPU: 1 [253207.842462] EIP is at gss_validate+0x7b/0x1d0 [auth_rpcgss] [253207.842462] EAX: 0004 EBX: ECX: f6abde80 EDX: f28128e4 [253207.842462] ESI: 0025 EDI: ec7b6fc4 EBP: f6abdea4 ESP: f6abde40 [253207.842462] DS: 007b ES: 007b FS: 00d8 GS: 00e0 SS: 0068 [253207.842462] Process rpciod/1 (pid: 4036, ti=f6abc000 task=f6a33ed0 task.ti=f6abc000) [253207.842462] Stack: [253207.842462] f6abde58 c049ca59 0001 0001 f28128e4 e43210c0 f6abde94 0004 [253207.842462] <0> f6abde8c c0121270 02020202 0004 0004 [253207.842462] <0> 0025 f28128e4 f6abde94 0004 0100 8503 ec7b6fc4 e43210c0 [253207.842462] Call Trace: [253207.842462] [] ? net_tx_action+0x59/0x130 [253207.842462] [] ? ack_apic_level+0x60/0x230 [253207.842462] [] ? rpcauth_checkverf+0x22/0x60 [sunrpc] [253207.842462] [] ? irq_exit+0x2f/0x70 [253207.842462] [] ? do_IRQ+0x50/0xc0 [253207.842462] [] ? rpc_verify_header+0x1af/0x5c0 [sunrpc] [253207.842462] [] ? common_interrupt+0x30/0x40 [253207.842462] [] ? call_decode+0x117/0x220 [sunrpc] [253207.842462] [] ? nfs4_xdr_dec_read+0x0/0x60 [nfs] [253207.842462] [] ? __rpc_execute+0x92/0x1f0 [sunrpc] [253207.842462] [] ? rpc_async_schedule+0xb/0x10 [sunrpc] [253207.842462] [] ? run_workqueue+0x6e/0x140 [253207.842462] [] ? rpc_async_schedule+0x0/0x10 [sunrpc] [253207.842462] [] ? worker_thread+0x88/0xe0 [253207.842462] [] ? autoremove_wake_function+0x0/0x40 [253207.842462] [] ? worker_thread+0x0/0xe0 [253207.842462] [] ? kthread+0x7c/0x90 [253207.842462] [] ? kthread+0x0/0x90 [253207.842462] [] ? kernel_thread_helper+0x7/0x10 - [253207.842462] Code: 55 b4 8b 40 64 0f c8 89 45 f0 8d 45 f0 89 45 e4 8d 45 e4 c7 45 e8 04 00 00 00 e8 31 cf fc ff 8b 55 ac 8d 4d dc 89 75 dc 89 55 e0 <8b> 43 10 8d 55 b4 e8 2a 11 00 00 3d 00 00 0c 00 74 6b 85 c0 75 + [253207.842462] Code: 55 b4 8b 40 64 0f c8 89 45 f0 8d 45 f0 89 45 e4 8d 45 e4 c7 45 e8 04 00 00 00 e8 31 cf fc ff 8b 55 ac 8d 4d dc 89 75 dc 89 55 e0 <8b> 43 10 8d 55 b4 e8 2a 11 00 00 3d 00 00 0c 00 74 6b 85 c0 75 [253207.842462] EIP: [] gss_validate+0x7b/0x1d0 [auth_rpcgss] SS:ESP 0068:f6abde40 [253207.842462] CR2: 0010 [253207.845072] ---[ end trace ad285e035a384c5f ]--- [253208.107509] BUG: unable to handle kernel NULL pointer dereference at 0010 [253208.107518] IP: [] gss_validate+0x7b/0x1d0 [auth_rpcgss] - [253208.107534] *pde = aee17067 - [253208.107537] Oops: [#2] SMP + [253208.107534] *pde = aee17067 + [253208.107537] Oops: [#2] SMP [253208.107540] last sysfs file: /sys/devices/pci:00/:00:0b.1/usb1/1-3/1-3:1.0/host6/target6:0:0/6:0:0:0/block/sde/sde1/stat [253208.107544] Modules linked in: xt_multiport binfmt_misc bridge stp bnep vboxnetflt vboxdrv tun des_generic cbc autofs4 video output rpcsec_gss_krb5 nfsd exportfs nfs lockd nfs_acl auth_rpcgss sunrpc nf_conntrack_ipv6 xt_hl ipt_LOG xt_limit ipt_REJECT xt_tcpudp x - [253208.107607] + [253208.107607] [253208.107611] Pid: 4033, comm: rpciod/0 Tainted: P D (2.6.31-14-generic #48-Ubuntu) System Product Name [253208.107614] EIP: 0060:[] EFLAGS: 00010296 CPU: 0 [253208.107620] EIP is at gss_validate+0x7b/0x1d0 [auth_rpcgss] [253208.107622] EAX: 0004 EBX:
[Bug 459265] Re: oops in gss_validate
** Also affects: linux (Ubuntu Karmic) Importance: Undecided Status: New -- oops in gss_validate https://bugs.launchpad.net/bugs/459265 You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 459265] Re: oops in gss_validate
** Changed in: linux Status: In Progress => Fix Released -- oops in gss_validate https://bugs.launchpad.net/bugs/459265 You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
Re: [Bug 459265] Re: oops in gss_validate
I have already build a Ubuntu x86 kernel including the patch from linux-kernel-bugs #14249. I have tested the kernel for about one week. Everything works fine. The "gss_validate" problem has been disappeared. -- oops in gss_validate https://bugs.launchpad.net/bugs/459265 You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 459265] Re: oops in gss_validate
Seems this should be resolved with the following upstream patch which is included in the upstream 2.6.31.6 stable patchset which the Ubuntu Kernel will pull in as a Stable Release Update. I'll try to build a test kernel in the meantime. Please stay tuned. ogasaw...@emiko:~/linux-2.6$ git show 141aeb9f26f9f12f1584c128ce8697cdffb046e7 commit 141aeb9f26f9f12f1584c128ce8697cdffb046e7 Author: Trond Myklebust Date: Mon Oct 26 08:09:46 2009 -0400 NFSv4: Fix two unbalanced put_rpccred() issues. ** Changed in: linux (Ubuntu) Importance: Undecided => Medium ** Changed in: linux (Ubuntu) Status: New => Triaged ** Tags added: 2.6.31.6 -- oops in gss_validate https://bugs.launchpad.net/bugs/459265 You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 459265] Re: oops in gss_validate
I have the same problem. We have about 30 clients that are running on Ubuntu and where the user homes are mounted via NFS4 (security enabled). Currently, we are not able to upgrade to Ubuntu 9.10 due to the problems with GSS authenticated NFS mounts. The old kernel 2.6.28 from Ubuntu 9.04 does also not work since it hangs during boot. Is it planned to integrate the patch from the kernel team? -- oops in gss_validate https://bugs.launchpad.net/bugs/459265 You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 459265] Re: oops in gss_validate
** Changed in: linux Status: Confirmed => In Progress -- oops in gss_validate https://bugs.launchpad.net/bugs/459265 You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 459265] Re: oops in gss_validate
There is a patch upstream which the kernel team is looking for tests of. I wonder if Ubuntu want to add their to their "sauce". -- oops in gss_validate https://bugs.launchpad.net/bugs/459265 You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 459265] Re: oops in gss_validate
** Changed in: linux Status: Unknown => Confirmed -- oops in gss_validate https://bugs.launchpad.net/bugs/459265 You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 459265] Re: oops in gss_validate
** Bug watch added: Linux Kernel Bug Tracker #14249 http://bugzilla.kernel.org/show_bug.cgi?id=14249 ** Also affects: linux via http://bugzilla.kernel.org/show_bug.cgi?id=14249 Importance: Unknown Status: Unknown -- oops in gss_validate https://bugs.launchpad.net/bugs/459265 You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs