John Livingston <john.a.livings...@boeing.com> writes: > We've just started seeing this bug on multiple hosts with the latest > openssh server in testing. Our systems use Kerberos/LDAP for > authentication; using a Kerberos ticket SSH functions perfectly, but if > the user enters a password, sshd will throw a general protection fault.
> Jun 4 14:47:05 hostname kernel: [1715075.968073] sshd[12681] general > protection > ip:7f323bf4af9a sp:7fff2caf2ae0 error:0 in > libc-2.13.so[7f323bed4000+17d000] > Jun 4 15:56:18 hostname kernel: [1719228.948070] sshd[32172] general > protection > ip:7f7de11d0f9a sp:7fff59021fb0 error:0 in > libc-2.13.so[7f7de115a000+17d000] Are you using libpam-krb5? If so, could you upgrade to the version just uploaded to unstable? The version in testing will segfault if krb5_init_context fails; the version in unstable will instead try to give you some sort of error message. A lot of people in Ubuntu are seeing issues with krb5_init_context failing. In a few cases, this has been tracked to /etc/krb5.conf mysteriously becoming mode 600 and unreadable by some processes. -- Russ Allbery (r...@debian.org) <http://www.eyrie.org/~eagle/> -- To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org