Bug#512410: openssh-server: sshd segfaults (suppose libc or libpam-mount related)
Package: openssh-server
Version: 1:5.1p1-5
Severity: normal
==> /var/log/syslog <==
Jan 20 11:14:36 x2goserver kernel: [12969.745101] sshd[31465]: segfault at 6fd7cbec ip b7af7ea9 sp bfa5b2e4 error 4 in libc-2.7.so[b7a89000+155000]
Jan 20 11:14:40 x2goserver modprobe: WARNING: Not loading blacklisted module ipv6
Jan 20 11:14:52 x2goserver kernel: [12988.077088] sshd[31518]: segfault at 7126cbec ip b7b16ea9 sp bfa79b04 error 4 in libc-2.7.so[b7aa8000+155000]
Jan 20 11:14:57 x2goserver kernel: [12993.564945] sshd[31532]: segfault at 715fbbec ip b7acdea9 sp bfc32cb4 error 4 in libc-2.7.so[b7a5f000+155000]
Jan 20 11:15:14 x2goserver kernel: [13011.537760] sshd[31615]: segfault at 7143bbec ip b7b91ea9 sp bfaf6b74 error 4 in libc-2.7.so[b7b23000+155000]
Jan 20 11:15:36 x2goserver kernel: [13036.492617] sshd[31591]: segfault at 7007dbec ip b7b71ea9 sp bfcd6d54 error 4 in libc-2.7.so[b7b03000+155000]
Jan 20 11:15:37 x2goserver kernel: [13038.017398] sshd[31713]: segfault at 70dc8bec ip b7af0ea9 sp bfa53ad4 error 4 in libc-2.7.so[b7a82000+155000]
Jan 20 16:22:16 x2goserver kernel: [33193.561581] sshd[7955]: segfault at 718a20e4 ip b7b60ea9 sp bffc5fd4 error 4 in libc-2.7.so[b7af2000+155000]
Jan 20 16:22:16 x2goserver kernel: [33193.562936] sshd[7959]: segfault at 70ee273c ip b7acbea9 sp bfd30d44 error 4 in libc-2.7.so[b7a5d000+155000]
....
==> /var/log/auth <==
Jan 20 16:32:44 x2goserver sshd[8604]: Closing connection to 192.168.X.Y port 1944
Jan 20 16:32:44 x2goserver sshd[8590]: debug1: PAM: cleanup
Jan 20 16:32:44 x2goserver sshd[8590]: debug1: PAM: deleting credentials
Jan 20 16:32:44 x2goserver sshd[8590]: debug1: PAM: closing session
Jan 20 16:32:44 x2goserver sshd[8590]: pam_unix(sshd:session): session closed for user test
==> /var/log/syslog <==
Jan 20 16:32:44 x2goserver kernel: [33878.085181] sshd[8590]: segfault at 7171de1c ip b7b05ea9 sp bf86a8f4 error 4 in libc-2.7.so[b7a97000+155000]
-- System Information:
Debian Release: 5.0
APT prefers testing
APT policy: (500, 'testing')
Architecture: i386 (i686)
Kernel: Linux 2.6.26-1-686 (SMP w/2 CPU cores)
Locale: LANG=de_DE.UTF-8, LC_CTYPE=de_DE.UTF-8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/bash
Versions of packages openssh-server depends on:
ii adduser 3.110 add and remove users and groups
ii debconf [debconf-2.0] 1.5.24 Debian configuration management sy
ii dpkg 1.14.24 Debian package management system
ii libc6 2.7-18 GNU C Library: Shared libraries
ii libcomerr2 1.41.3-1 common error description library
ii libkrb53 1.6.dfsg.4~beta1-5 MIT Kerberos runtime libraries
ii libpam-modules 1.0.1-5 Pluggable Authentication Modules f
ii libpam-runtime 1.0.1-5 Runtime support for the PAM librar
ii libpam0g 1.0.1-5 Pluggable Authentication Modules l
ii libselinux1 2.0.65-5 SELinux shared libraries
ii libssl0.9.8 0.9.8g-15 SSL shared libraries
ii libwrap0 7.6.q-16 Wietse Venema's TCP wrappers libra
ii lsb-base 3.2-20 Linux Standard Base 3.2 init scrip
ii openssh-blacklist 0.4.1 list of default blacklisted OpenSS
ii openssh-client 1:5.1p1-5 secure shell client, an rlogin/rsh
ii procps 1:3.2.7-9 /proc file system utilities
ii zlib1g 1:1.2.3.3.dfsg-12 compression library - runtime
Versions of packages openssh-server recommends:
ii openssh-blacklist-extra 0.4.1 list of non-default blacklisted Op
ii xauth 1:1.0.3-2 X authentication utility
Versions of packages openssh-server suggests:
pn molly-guard <none> (no description available)
pn rssh <none> (no description available)
pn ssh-askpass <none> (no description available)
-- debconf information:
ssh/vulnerable_host_keys:
ssh/new_config: true
* ssh/use_old_init_script: true
ssh/encrypted_host_key_but_no_keygen:
ssh/disable_cr_auth: false
Reply to: