[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

Bug#946242: marked as done (fatal: privsep_preauth: preauth child terminated by signal 31)



Your message dated Sun, 02 Feb 2020 19:17:09 +0000
with message-id <E1iyKk1-000J4O-N5@fasolo.debian.org>
and subject line Bug#946242: fixed in openssh 1:7.9p1-10+deb10u2
has caused the Debian Bug report #946242,
regarding fatal: privsep_preauth: preauth child terminated by signal 31
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact owner@bugs.debian.org
immediately.)


-- 
946242: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=946242
Debian Bug Tracking System
Contact owner@bugs.debian.org with problems
--- Begin Message ---
Package: openssh-server
Version: 1:7.9p1-10+deb10u1
Severity: grave
Justification: renders package unusable

Dear Maintainer,

*** Reporter, please consider answering these questions, where appropriate ***

   * What led up to the situation? apt upgrade lead to openssh-server
   * being unusable.
   * What exactly did you do (or not do) that was effective (or
     ineffective)?  bug #941663 supposedly fixed this issue in the
     version I upgraded to but the symptom remains. Also tried
     installing 8.1 version but that did not fix the issue either. I am
     running a 3.16 kernel because a 4.x kernel is not supported on my 
     hardware (AMD Geode LX processor).
   * What was the outcome of this action? no change
   * What outcome did you expect instead? to login

*** End of the template - remove these template lines ***


-- System Information:
Debian Release: 10.2
  APT prefers stable-debug
  APT policy: (500, 'stable-debug'), (500, 'stable')
Architecture: i386 (i586)

Kernel: Linux 3.16.0-4-586
Locale: LANG=en_US.UTF-8, LC_CTYPE=en_US.UTF-8 (charmap=UTF-8), LANGUAGE=en_US.UTF-8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/dash
Init: systemd (via /run/systemd/system)

Versions of packages openssh-server depends on:
ii  adduser                3.118
ii  debconf [debconf-2.0]  1.5.71
ii  dpkg                   1.19.7
ii  libaudit1              1:2.8.4-3
ii  libc6                  2.28-10
ii  libcom-err2            1.44.5-1+deb10u2
ii  libgssapi-krb5-2       1.17-3
ii  libkrb5-3              1.17-3
ii  libpam-modules         1.3.1-5
ii  libpam-runtime         1.3.1-5
ii  libpam0g               1.3.1-5
ii  libselinux1            2.8-1+b1
ii  libssl1.1              1.1.1d-0+deb10u2
ii  libsystemd0            241-7~deb10u2
ii  libwrap0               7.6.q-28
ii  lsb-base               10.2019051400
ii  openssh-client         1:7.9p1-10+deb10u1
ii  openssh-sftp-server    1:7.9p1-10+deb10u1
ii  procps                 2:3.3.15-2
ii  ucf                    3.0038+nmu1
ii  zlib1g                 1:1.2.11.dfsg-1

Versions of packages openssh-server recommends:
ii  libpam-systemd [logind]  241-7~deb10u2
ii  ncurses-term             6.1+20181013-2+deb10u2
ii  xauth                    1:1.0.10-1

Versions of packages openssh-server suggests:
pn  molly-guard   <none>
pn  monkeysphere  <none>
pn  rssh          <none>
pn  ssh-askpass   <none>
pn  ufw           <none>

-- Configuration Files:
/etc/default/ssh changed:
SSHD_OPTS=-4


-- debconf information:
* ssh/use_old_init_script: true
* openssh-server/permit-root-login: true
  ssh/encrypted_host_key_but_no_keygen:
  openssh-server/password-authentication: false
  ssh/vulnerable_host_keys:
  ssh/new_config: true
  ssh/disable_cr_auth: false

--- End Message ---
--- Begin Message ---
Source: openssh
Source-Version: 1:7.9p1-10+deb10u2

We believe that the bug you reported is fixed in the latest version of
openssh, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 946242@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Colin Watson <cjwatson@debian.org> (supplier of updated openssh package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmaster@ftp-master.debian.org)


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

Format: 1.8
Date: Fri, 31 Jan 2020 20:55:34 +0000
Source: openssh
Architecture: source
Version: 1:7.9p1-10+deb10u2
Distribution: buster
Urgency: medium
Maintainer: Debian OpenSSH Maintainers <debian-ssh@lists.debian.org>
Changed-By: Colin Watson <cjwatson@debian.org>
Closes: 946242
Changes:
 openssh (1:7.9p1-10+deb10u2) buster; urgency=medium
 .
   * Apply upstream patch to deny (non-fatally) ipc in the seccomp sandbox,
     fixing failures with OpenSSL 1.1.1d and Linux < 3.19 on some
     architectures (closes: #946242).  Note that this also drops the previous
     change to allow ipc on s390, since upstream has security concerns with
     that and it doesn't currently seem to be needed.
Checksums-Sha1:
 2b9c7534c265c8a6638142a822cc1f6176c4742f 3321 openssh_7.9p1-10+deb10u2.dsc
 785050c5afc7b7684cb25013d897f500eebf9bc6 174016 openssh_7.9p1-10+deb10u2.debian.tar.xz
Checksums-Sha256:
 bb8384534491eb1edba6c12a2d4f289e59abb4ec4795101d9655fae52e426dec 3321 openssh_7.9p1-10+deb10u2.dsc
 2f8d81757e3050aab4ab735692c1b2d521cee54ec3987ef3b08fbaff84abf3c1 174016 openssh_7.9p1-10+deb10u2.debian.tar.xz
Files:
 4687cc10eb11fb78972061a2e5b4c219 3321 net standard openssh_7.9p1-10+deb10u2.dsc
 e235664e9191eb5a4b91f30c03c9de0a 174016 net standard openssh_7.9p1-10+deb10u2.debian.tar.xz

-----BEGIN PGP SIGNATURE-----
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=UY3j
-----END PGP SIGNATURE-----

--- End Message ---

Reply to: