Package: openssh-server Version: 1:5.9p1-5 Followup-For: Bug #512410 We've just started seeing this bug on multiple hosts with the latest openssh server in testing. Our systems use Kerberos/LDAP for authentication; using a Kerberos ticket SSH functions perfectly, but if the user enters a password, sshd will throw a general protection fault.
Jun 4 14:47:05 hostname kernel: [1715075.968073] sshd[12681] general protection ip:7f323bf4af9a sp:7fff2caf2ae0 error:0 in libc-2.13.so[7f323bed4000+17d000] Jun 4 15:56:18 hostname kernel: [1719228.948070] sshd[32172] general protection ip:7f7de11d0f9a sp:7fff59021fb0 error:0 in libc-2.13.so[7f7de115a000+17d000] -- System Information: Debian Release: wheezy/sid APT prefers testing APT policy: (700, 'testing'), (600, 'unstable'), (500, 'experimental') Architecture: amd64 (x86_64) Kernel: Linux 3.2.0-2-amd64 (SMP w/4 CPU cores) Locale: LANG=en_US.UTF-8, LC_CTYPE=en_US.UTF-8 (charmap=UTF-8) Shell: /bin/sh linked to /bin/dash Versions of packages openssh-server depends on: ii adduser 3.113+nmu2 ii debconf [debconf-2.0] 1.5.43 ii dpkg 1.16.3 ii libc6 2.13-32 ii libcomerr2 1.42.2-2 ii libgssapi-krb5-2 1.10.1+dfsg-1 ii libkrb5-3 1.10.1+dfsg-1 ii libpam-modules 1.1.3-7.1 ii libpam-runtime 1.1.3-7.1 ii libpam0g 1.1.3-7.1 ii libselinux1 2.1.9-2 ii libssl1.0.0 1.0.1c-1 ii libwrap0 7.6.q-23 ii lsb-base 4.1+Debian4 ii openssh-client 1:5.9p1-5 ii procps 1:3.3.2-3 ii zlib1g 1:1.2.7.dfsg-11 Versions of packages openssh-server recommends: ii openssh-blacklist 0.4.1 ii openssh-blacklist-extra <none> ii xauth 1:1.0.7-1 Versions of packages openssh-server suggests: pn molly-guard <none> pn monkeysphere <none> pn rssh <none> pn ssh-askpass <none> pn ufw <none> -- debconf information: * ssh/use_old_init_script: true ssh/vulnerable_host_keys: ssh/encrypted_host_key_but_no_keygen: ssh/disable_cr_auth: false -- To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org