Package: openssl
Version: 1.1.1d-0+deb10u1
Severity: minor
Tags: upstream

Dear Maintainer,

Upgrading from openssl 1.1.1c-1 to openssl 1.1.1d-0+deb10u1 on Debian 
Buster breaks openssh login on systems running old kernels (3.16.x at 
least).

This is due to the missing getrandom syscall on those kernels and 
seccomp filter triggering on fallback implementation of the missing 
syscall, reverting to 1.1.1c-1 fixes the issue.

This is currently being discussed upstream at:
  https://github.com/openssl/openssl/issues/9984

It only affects old kernels so it's no big deal anyway.

Regards,
Sylvain

-- System Information:
Debian Release: 10.1
  APT prefers stable-updates
  APT policy: (500, 'stable-updates'), (500, 'stable')
Architecture: i386 (x86_64)

Kernel: Linux 3.16.74 (SMP w/4 CPU cores)
Kernel taint flags: TAINT_OOT_MODULE, TAINT_UNSIGNED_MODULE
Locale: LANG=en_US.UTF-8, LC_CTYPE=en_US.UTF-8 (charmap=UTF-8), 
LANGUAGE=en_US:en (charmap=UTF-8)
Shell: /bin/sh linked to /bin/dash
Init: sysvinit (via /sbin/init)

Versions of packages openssl depends on:
ii  libc6      2.28-10
ii  libssl1.1  1.1.1d-0+deb10u1

openssl recommends no packages.

Versions of packages openssl suggests:
ii  ca-certificates  20190110

-- no debconf information

Reply via email to