Your message dated Sat, 13 Mar 2010 21:42:57 +0000
with message-id <e1nqz6n-0003v6...@ries.debian.org>
and subject line Bug#572266: fixed in libpam-ssh 1.92-11
has caused the Debian Bug report #572266,
regarding dovecot-common: dovecot-auth crashes with segfault
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
572266: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=572266
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Package: dovecot-common
Version: 1:1.2.10-1
Severity: important

On unstable with some bits (unrelated to dovecot) from Debian, dovecot-auth
crashes during password authentication (using local evolution as client):

Mar  2 09:35:48 hepcat dovecot: auth(default): worker-server(erich,127.0.0.1): 
Aborted: Worker process died unexpectedly
Mar  2 09:35:48 hepcat dovecot: dovecot: child 4865 (auth-worker) killed with 
signal 11 (core not dumped)

I tried setting it to allow core dumps, but did not succeed.
I am aware that this can well be in some library (that's why I tried to get a
coredump, to see where the segfault occurs)

My dovecot setup is quite simple - it's a workstation setup, so I only have
myself as user, and I only allow access from localhost, so no need to do any
bigger encryption or difficult mechanism. It should be using PAM.

-- System Information:
Debian Release: squeeze/sid
  APT prefers unstable
  APT policy: (500, 'unstable'), (1, 'experimental')
Architecture: i386 (i686)

Kernel: Linux 2.6.32-2-686 (SMP w/2 CPU cores)
Locale: LANG=de_DE.UTF-8, LC_CTYPE=de_DE.UTF-8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/dash

Versions of packages dovecot-common depends on:
ii  adduser                3.112             add and remove users and groups
ii  libbz2-1.0             1.0.5-4           high-quality block-sorting file co
ii  libc6                  2.10.2-6          Embedded GNU C Library: Shared lib
ii  libcomerr2             1.41.10-1         common error description library
ii  libdb4.8               4.8.26-1          Berkeley v4.8 Database Libraries [
ii  libgssapi-krb5-2       1.8+dfsg~alpha1-7 MIT Kerberos runtime libraries - k
ii  libk5crypto3           1.8+dfsg~alpha1-7 MIT Kerberos runtime libraries - C
ii  libkrb5-3              1.8+dfsg~alpha1-7 MIT Kerberos runtime libraries
ii  libldap-2.4-2          2.4.17-2.1        OpenLDAP libraries
ii  libmysqlclient16       5.1.44-2          MySQL database client library
ii  libpam-runtime         1.1.1-2           Runtime support for the PAM librar
ii  libpam0g               1.1.1-2           Pluggable Authentication Modules l
ii  libpq5                 8.4.2-2+b1        PostgreSQL C client library
ii  libsqlite3-0           3.6.22-1          SQLite 3 shared library
ii  libssl0.9.8            0.9.8m-2          SSL shared libraries
ii  openssl                0.9.8m-2          Secure Socket Layer (SSL) binary a
ii  ucf                    3.0025            Update Configuration File: preserv
ii  zlib1g                 1:1.2.3.4.dfsg-3  compression library - runtime

dovecot-common recommends no packages.

Versions of packages dovecot-common suggests:
pn  ntp                           <none>     (no description available)

-- no debconf information



--- End Message ---
--- Begin Message ---
Source: libpam-ssh
Source-Version: 1.92-11

We believe that the bug you reported is fixed in the latest version of
libpam-ssh, which is due to be installed in the Debian FTP archive:

libpam-ssh_1.92-11.debian.tar.gz
  to main/libp/libpam-ssh/libpam-ssh_1.92-11.debian.tar.gz
libpam-ssh_1.92-11.dsc
  to main/libp/libpam-ssh/libpam-ssh_1.92-11.dsc
libpam-ssh_1.92-11_i386.deb
  to main/libp/libpam-ssh/libpam-ssh_1.92-11_i386.deb



A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 572...@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Jens Peter Secher <j...@debian.org> (supplier of updated libpam-ssh package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmas...@debian.org)


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Format: 1.8
Date: Sat, 13 Mar 2010 15:43:25 +0100
Source: libpam-ssh
Binary: libpam-ssh
Architecture: source i386
Version: 1.92-11
Distribution: unstable
Urgency: low
Maintainer: Jens Peter Secher <j...@debian.org>
Changed-By: Jens Peter Secher <j...@debian.org>
Description: 
 libpam-ssh - Single sign-on via private SSH key
Closes: 572266
Changes: 
 libpam-ssh (1.92-11) unstable; urgency=low
 .
   * Pass a debian/pam_ssh.version to LD so that only pam_* symbols are
     exported, thanks to Erich Schubert and Timo Sirainen.
     (Closes: 572266)
Checksums-Sha1: 
 15451fd7b0808c3e8c0d9cb9ccb4ed3cbf08b401 1300 libpam-ssh_1.92-11.dsc
 a0fa7288e4f88ecd0bdae839198e384f23a09c83 20940 libpam-ssh_1.92-11.debian.tar.gz
 33c409c66515584b86e5abeab68a63897741a876 49414 libpam-ssh_1.92-11_i386.deb
Checksums-Sha256: 
 112c43dd3a09fe627c519a8c37794f3914d2532ae23a8c7cf6912231e3a82fd7 1300 
libpam-ssh_1.92-11.dsc
 2ef4cebbd5df65d7d2c2d143a7e957c9090f91392d0d95fc31ffb36adae5c55a 20940 
libpam-ssh_1.92-11.debian.tar.gz
 2664c0db602cf85457742b54a40bf60101a824b2eec176fc6edfc6c77756cf0f 49414 
libpam-ssh_1.92-11_i386.deb
Files: 
 281267670fbeabdf533cc6920896c754 1300 admin optional libpam-ssh_1.92-11.dsc
 5ced2b0bdb697f82682a503e5a313bde 20940 admin optional 
libpam-ssh_1.92-11.debian.tar.gz
 9990f978f2fca99d910fc9edaaf613f8 49414 admin optional 
libpam-ssh_1.92-11_i386.deb

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.10 (GNU/Linux)

iJwEAQECAAYFAkub9NYACgkQiFVdEFPVQL8ndQP5AclJIWKWb73IGz1iDZz8Uzaj
DH9OA6urHoX+dGKmxFYvwNYb0D2uEG3CbN/5jRakawzkq1J83FYtVd1W9ULb6Rjx
d7fnwYMffHg6zlf/k6lZcxreh5BmSvQE/VQ06Xcz8NupN8IiBK7vX7hZ0koiPCqc
aMIDkkwEoAjuR5Lx+R8=
=gs+V
-----END PGP SIGNATURE-----



--- End Message ---

Reply via email to