[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

Bug#946242: marked as done (fatal: privsep_preauth: preauth child terminated by signal 31)



Your message dated Sun, 12 Jan 2020 00:19:37 +0000
with message-id <E1iqQyf-000BEl-7a@fasolo.debian.org>
and subject line Bug#946242: fixed in openssh 1:8.1p1-5
has caused the Debian Bug report #946242,
regarding fatal: privsep_preauth: preauth child terminated by signal 31
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact owner@bugs.debian.org
immediately.)


-- 
946242: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=946242
Debian Bug Tracking System
Contact owner@bugs.debian.org with problems
--- Begin Message ---
Package: openssh-server
Version: 1:7.9p1-10+deb10u1
Severity: grave
Justification: renders package unusable

Dear Maintainer,

*** Reporter, please consider answering these questions, where appropriate ***

   * What led up to the situation? apt upgrade lead to openssh-server
   * being unusable.
   * What exactly did you do (or not do) that was effective (or
     ineffective)?  bug #941663 supposedly fixed this issue in the
     version I upgraded to but the symptom remains. Also tried
     installing 8.1 version but that did not fix the issue either. I am
     running a 3.16 kernel because a 4.x kernel is not supported on my 
     hardware (AMD Geode LX processor).
   * What was the outcome of this action? no change
   * What outcome did you expect instead? to login

*** End of the template - remove these template lines ***


-- System Information:
Debian Release: 10.2
  APT prefers stable-debug
  APT policy: (500, 'stable-debug'), (500, 'stable')
Architecture: i386 (i586)

Kernel: Linux 3.16.0-4-586
Locale: LANG=en_US.UTF-8, LC_CTYPE=en_US.UTF-8 (charmap=UTF-8), LANGUAGE=en_US.UTF-8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/dash
Init: systemd (via /run/systemd/system)

Versions of packages openssh-server depends on:
ii  adduser                3.118
ii  debconf [debconf-2.0]  1.5.71
ii  dpkg                   1.19.7
ii  libaudit1              1:2.8.4-3
ii  libc6                  2.28-10
ii  libcom-err2            1.44.5-1+deb10u2
ii  libgssapi-krb5-2       1.17-3
ii  libkrb5-3              1.17-3
ii  libpam-modules         1.3.1-5
ii  libpam-runtime         1.3.1-5
ii  libpam0g               1.3.1-5
ii  libselinux1            2.8-1+b1
ii  libssl1.1              1.1.1d-0+deb10u2
ii  libsystemd0            241-7~deb10u2
ii  libwrap0               7.6.q-28
ii  lsb-base               10.2019051400
ii  openssh-client         1:7.9p1-10+deb10u1
ii  openssh-sftp-server    1:7.9p1-10+deb10u1
ii  procps                 2:3.3.15-2
ii  ucf                    3.0038+nmu1
ii  zlib1g                 1:1.2.11.dfsg-1

Versions of packages openssh-server recommends:
ii  libpam-systemd [logind]  241-7~deb10u2
ii  ncurses-term             6.1+20181013-2+deb10u2
ii  xauth                    1:1.0.10-1

Versions of packages openssh-server suggests:
pn  molly-guard   <none>
pn  monkeysphere  <none>
pn  rssh          <none>
pn  ssh-askpass   <none>
pn  ufw           <none>

-- Configuration Files:
/etc/default/ssh changed:
SSHD_OPTS=-4


-- debconf information:
* ssh/use_old_init_script: true
* openssh-server/permit-root-login: true
  ssh/encrypted_host_key_but_no_keygen:
  openssh-server/password-authentication: false
  ssh/vulnerable_host_keys:
  ssh/new_config: true
  ssh/disable_cr_auth: false

--- End Message ---
--- Begin Message ---
Source: openssh
Source-Version: 1:8.1p1-5

We believe that the bug you reported is fixed in the latest version of
openssh, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 946242@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Colin Watson <cjwatson@debian.org> (supplier of updated openssh package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmaster@ftp-master.debian.org)


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

Format: 1.8
Date: Sat, 11 Jan 2020 23:55:03 +0000
Source: openssh
Architecture: source
Version: 1:8.1p1-5
Distribution: unstable
Urgency: medium
Maintainer: Debian OpenSSH Maintainers <debian-ssh@lists.debian.org>
Changed-By: Colin Watson <cjwatson@debian.org>
Closes: 946242
Changes:
 openssh (1:8.1p1-5) unstable; urgency=medium
 .
   * Apply upstream patches to allow clock_nanosleep() and variants in the
     seccomp sandbox, fixing failures with glibc 2.31.
   * Apply upstream patch to deny (non-fatally) ipc in the seccomp sandbox,
     fixing failures with OpenSSL 1.1.1d and Linux < 3.19 on some
     architectures (closes: #946242).
Checksums-Sha1:
 416b9a792df5167dfcfc7aee930af6fd9c5a3ba6 3316 openssh_8.1p1-5.dsc
 a0d2e4f5014b0c7420a6e32ae44adcb1373f4aae 173076 openssh_8.1p1-5.debian.tar.xz
Checksums-Sha256:
 9e3faf5dae122bc3ea7a5cff4a55e6af2bcdd6d77ab21f65b9e45e4872b56d13 3316 openssh_8.1p1-5.dsc
 a4a3b7580e5ddb22c07d64e8d72faf67cf65541207dd473717d4175d55590004 173076 openssh_8.1p1-5.debian.tar.xz
Files:
 50f206cf5b04641d4c33bf9badbc7140 3316 net standard openssh_8.1p1-5.dsc
 3815394fd58bed3b885b4c822b2b33ec 173076 net standard openssh_8.1p1-5.debian.tar.xz

-----BEGIN PGP SIGNATURE-----
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=Olg7
-----END PGP SIGNATURE-----

--- End Message ---

Reply to: