Your message dated Sun, 12 Jan 2020 00:19:37 +0000
with message-id <e1iqqyf-000bel...@fasolo.debian.org>
and subject line Bug#946242: fixed in openssh 1:8.1p1-5
has caused the Debian Bug report #946242,
regarding fatal: privsep_preauth: preauth child terminated by signal 31
to be marked as done.
This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.
(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)
--
946242: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=946242
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Package: openssh-server
Version: 1:7.9p1-10+deb10u1
Severity: grave
Justification: renders package unusable
Dear Maintainer,
*** Reporter, please consider answering these questions, where appropriate ***
* What led up to the situation? apt upgrade lead to openssh-server
* being unusable.
* What exactly did you do (or not do) that was effective (or
ineffective)? bug #941663 supposedly fixed this issue in the
version I upgraded to but the symptom remains. Also tried
installing 8.1 version but that did not fix the issue either. I am
running a 3.16 kernel because a 4.x kernel is not supported on my
hardware (AMD Geode LX processor).
* What was the outcome of this action? no change
* What outcome did you expect instead? to login
*** End of the template - remove these template lines ***
-- System Information:
Debian Release: 10.2
APT prefers stable-debug
APT policy: (500, 'stable-debug'), (500, 'stable')
Architecture: i386 (i586)
Kernel: Linux 3.16.0-4-586
Locale: LANG=en_US.UTF-8, LC_CTYPE=en_US.UTF-8 (charmap=UTF-8),
LANGUAGE=en_US.UTF-8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/dash
Init: systemd (via /run/systemd/system)
Versions of packages openssh-server depends on:
ii adduser 3.118
ii debconf [debconf-2.0] 1.5.71
ii dpkg 1.19.7
ii libaudit1 1:2.8.4-3
ii libc6 2.28-10
ii libcom-err2 1.44.5-1+deb10u2
ii libgssapi-krb5-2 1.17-3
ii libkrb5-3 1.17-3
ii libpam-modules 1.3.1-5
ii libpam-runtime 1.3.1-5
ii libpam0g 1.3.1-5
ii libselinux1 2.8-1+b1
ii libssl1.1 1.1.1d-0+deb10u2
ii libsystemd0 241-7~deb10u2
ii libwrap0 7.6.q-28
ii lsb-base 10.2019051400
ii openssh-client 1:7.9p1-10+deb10u1
ii openssh-sftp-server 1:7.9p1-10+deb10u1
ii procps 2:3.3.15-2
ii ucf 3.0038+nmu1
ii zlib1g 1:1.2.11.dfsg-1
Versions of packages openssh-server recommends:
ii libpam-systemd [logind] 241-7~deb10u2
ii ncurses-term 6.1+20181013-2+deb10u2
ii xauth 1:1.0.10-1
Versions of packages openssh-server suggests:
pn molly-guard <none>
pn monkeysphere <none>
pn rssh <none>
pn ssh-askpass <none>
pn ufw <none>
-- Configuration Files:
/etc/default/ssh changed:
SSHD_OPTS=-4
-- debconf information:
* ssh/use_old_init_script: true
* openssh-server/permit-root-login: true
ssh/encrypted_host_key_but_no_keygen:
openssh-server/password-authentication: false
ssh/vulnerable_host_keys:
ssh/new_config: true
ssh/disable_cr_auth: false
--- End Message ---
--- Begin Message ---
Source: openssh
Source-Version: 1:8.1p1-5
We believe that the bug you reported is fixed in the latest version of
openssh, which is due to be installed in the Debian FTP archive.
A summary of the changes between this version and the previous one is
attached.
Thank you for reporting the bug, which will now be closed. If you
have further comments please address them to 946...@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.
Debian distribution maintenance software
pp.
Colin Watson <cjwat...@debian.org> (supplier of updated openssh package)
(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmas...@ftp-master.debian.org)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256
Format: 1.8
Date: Sat, 11 Jan 2020 23:55:03 +0000
Source: openssh
Architecture: source
Version: 1:8.1p1-5
Distribution: unstable
Urgency: medium
Maintainer: Debian OpenSSH Maintainers <debian-...@lists.debian.org>
Changed-By: Colin Watson <cjwat...@debian.org>
Closes: 946242
Changes:
openssh (1:8.1p1-5) unstable; urgency=medium
.
* Apply upstream patches to allow clock_nanosleep() and variants in the
seccomp sandbox, fixing failures with glibc 2.31.
* Apply upstream patch to deny (non-fatally) ipc in the seccomp sandbox,
fixing failures with OpenSSL 1.1.1d and Linux < 3.19 on some
architectures (closes: #946242).
Checksums-Sha1:
416b9a792df5167dfcfc7aee930af6fd9c5a3ba6 3316 openssh_8.1p1-5.dsc
a0d2e4f5014b0c7420a6e32ae44adcb1373f4aae 173076 openssh_8.1p1-5.debian.tar.xz
Checksums-Sha256:
9e3faf5dae122bc3ea7a5cff4a55e6af2bcdd6d77ab21f65b9e45e4872b56d13 3316
openssh_8.1p1-5.dsc
a4a3b7580e5ddb22c07d64e8d72faf67cf65541207dd473717d4175d55590004 173076
openssh_8.1p1-5.debian.tar.xz
Files:
50f206cf5b04641d4c33bf9badbc7140 3316 net standard openssh_8.1p1-5.dsc
3815394fd58bed3b885b4c822b2b33ec 173076 net standard
openssh_8.1p1-5.debian.tar.xz
-----BEGIN PGP SIGNATURE-----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=Olg7
-----END PGP SIGNATURE-----
--- End Message ---