Your message dated Tue, 27 Aug 2024 05:47:09 +0000
with message-id <e1sip2r-009n6d...@fasolo.debian.org>
and subject line Bug#1079684: fixed in linux 6.1.106-3
has caused the Debian Bug report #1079684,
regarding Network errors on VM
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
1079684: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1079684
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Package: linux-image-6.1.0-24-cloud-amd64
Version: 6.1.106-2
Severity: serious
Tags: upstream
Forwarded: https://bugzilla.kernel.org/show_bug.cgi?id=219129

After the latest linux upgrade, the following message appear frequently
in /var/log/syslog:

        ens3: bad gso: type: 4, size: 1460

It seems real network issues have been noticed in some VMs we rebooted
on friday (they are now running the previous kernel).

The forwarded upstream issue seems to match.

Regards

taffit

Attachment: signature.asc
Description: PGP signature


--- End Message ---
--- Begin Message ---
Source: linux
Source-Version: 6.1.106-3
Done: Salvatore Bonaccorso <car...@debian.org>

We believe that the bug you reported is fixed in the latest version of
linux, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 1079...@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Salvatore Bonaccorso <car...@debian.org> (supplier of updated linux package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmas...@ftp-master.debian.org)


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

Format: 1.8
Date: Mon, 26 Aug 2024 21:47:39 +0200
Source: linux
Architecture: source
Version: 6.1.106-3
Distribution: bookworm
Urgency: medium
Maintainer: Debian Kernel Team <debian-ker...@lists.debian.org>
Changed-By: Salvatore Bonaccorso <car...@debian.org>
Closes: 1079684
Changes:
 linux (6.1.106-3) bookworm; urgency=medium
 .
   * udp: allow header check for dodgy GSO_UDP_L4 packets.
   * gso: fix dodgy bit handling for GSO_UDP_L4
   * net: more strict VIRTIO_NET_HDR_GSO_UDP_L4 validation
   * net: drop bad gso csum_start and offset in virtio_net_hdr (Closes: 
#1079684)
   * Bump ABI to 25
Checksums-Sha1:
 79b49bb91703928e69ae62af8bacf16e720d24cf 290930 linux_6.1.106-3.dsc
 a219546d455a652d00c94d9cbee0eae2a86e606b 1669432 linux_6.1.106-3.debian.tar.xz
 d4bbc2050b9c88048dc3d7af359d14e0fa84c6f7 7492 linux_6.1.106-3_source.buildinfo
Checksums-Sha256:
 991a5496320541a090dda8c6d97a34bd9f6f4bccfd6c42d4e0e7e6ba781f9641 290930 
linux_6.1.106-3.dsc
 edd237e3c03d49b3c8e815c4fbeb8ac6ff32dc03cd13be4c8d9c1df7e6f1b141 1669432 
linux_6.1.106-3.debian.tar.xz
 2a7f6c23638861c31dae9733f0bbb3458fad08c9cbdfb5fe7055c1c76e02a258 7492 
linux_6.1.106-3_source.buildinfo
Files:
 cf0e5ed6f6c29bf94145d4d967d8e6ef 290930 kernel optional linux_6.1.106-3.dsc
 ec3f59dcbad73f4e9b105337e2db04c0 1669432 kernel optional 
linux_6.1.106-3.debian.tar.xz
 fe0ac618fbbbb2ef4af5e88c710d2b98 7492 kernel optional 
linux_6.1.106-3_source.buildinfo
-----BEGIN PGP SIGNATURE-----

iQKmBAEBCgCQFiEERkRAmAjBceBVMd3uBUy48xNDz0QFAmbM3KBfFIAAAAAALgAo
aXNzdWVyLWZwckBub3RhdGlvbnMub3BlbnBncC5maWZ0aGhvcnNlbWFuLm5ldDQ2
NDQ0MDk4MDhDMTcxRTA1NTMxRERFRTA1NENCOEYzMTM0M0NGNDQSHGNhcm5pbEBk
ZWJpYW4ub3JnAAoJEAVMuPMTQ89EC1sP/AufDFJ/vl/KDNsRrC48i5DuX+O+DLjH
Ut9DIgkxFKbGKxk2n/7XbuW775OXKAa0ZVsT+rEqFE6N4wDKoy50FT9GqVNmxFhT
yXc5lk0WjHMvnT0bfmZwWMHWPDf+tOWqbobjWAIobvpOxIcIc6ZVhpqv28Rh88dJ
IZNYALTXCl0pA0V2kmO/dPBA40xO1ZjPR3Q4h+MrqULJoBFZdy/AketVTYH7eMdx
jRz9RPEEjpxfLrIyY+Q1uBWy+6tleUvsBX7HIIn09EXatFFAu84K+bVE8cJnQ7ZO
L5DB+AbD+/mG9NJWSjDZtIPDUN5vJAFBD8TqkVa92x9yTAFM/LY/TCyF3Dpn7Dw/
efYk08qBKm6am3nDTE8SUkMtSoghKsSaVGyB2Pp82xgAVUMq75kBP7Ln34K93ei7
G0DUNFbd+7ANzaWUZ7P14qgEklsoouozqukinFRqRdtmzmJ0HwMiu+1M/jDwomej
SLswGfjXkkz0pI8Pb4pIt/SDJjR0wa3kSYEpXy9BBVtO6D/TbcewXbXCE3F8TvZr
lC41RFgkfRobzyINL4SyyBLdNvLIvlmLhjt9g9ZoVSVrMi+Z+FEgoKeZxRoOjq3B
HxIGtUsAxSoGdWmkyS60nIRKK4ngjsKo3g2GP2Li82xxhriEm3jb06rMy0qptBkR
Lnw1v0iGltvH
=TX5/
-----END PGP SIGNATURE-----

Attachment: pgpMSyhDnh44r.pgp
Description: PGP signature


--- End Message ---

Reply via email to