Your message dated Sat, 31 Mar 2012 17:04:48 +0000
with message-id <[email protected]>
and subject line Bug#665836: fixed in openssl 1.0.1-3
has caused the Debian Bug report #665836,
regarding openssh-server: segfault error 6 in libcrypto.so.1.0.0
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact [email protected]
immediately.)


-- 
665836: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=665836
Debian Bug Tracking System
Contact [email protected] with problems
--- Begin Message ---
Package: openssh-server
Version: 1:5.9p1-4
Severity: important

Dear Maintainer,

When connecting to my home machine while forwarding ports, I keep getting
segfaults in sshd whenever the forwarded ports are used.  This includes
X forwarding.  The errors that appear in my syslog look like this:

Mar 26 09:11:41 maru kernel: sshd[9320]: segfault at b8749000 ip b752f678 sp 
bfde6de0 error 6 in libcrypto.so.1.0.0[b74c6000+1a3000]
Mar 26 09:11:52 maru kernel: sshd[10647]: segfault at b81fa008 ip b753b678 sp 
bf9d42d0 error 6 in libcrypto.so.1.0.0[b74d2000+1a3000]
Mar 26 09:11:56 maru kernel: sshd[10680]: segfault at b8563000 ip b759b678 sp 
bfdff0a0 error 6 in libcrypto.so.1.0.0[b7532000+1a3000]


-- System Information:
Debian Release: wheezy/sid
  APT prefers unstable
  APT policy: (102, 'unstable'), (101, 'experimental'), (99, 'testing'), (9, 
'stable')
Architecture: i386 (i686)

Kernel: Linux 3.2.6 (SMP w/2 CPU cores)
Locale: LANG=C, LC_CTYPE=C (charmap=ANSI_X3.4-1968)
Shell: /bin/sh linked to /bin/bash

Versions of packages openssh-server depends on:
ii  adduser                3.113+nmu1
ii  debconf [debconf-2.0]  1.5.42
ii  dpkg                   1.16.2
ii  libc6                  2.13-27
ii  libcomerr2             1.42.1-2
ii  libgssapi-krb5-2       1.10+dfsg~beta1-2
ii  libkrb5-3              1.10+dfsg~beta1-2
ii  libpam-modules         1.1.3-7
ii  libpam-runtime         1.1.3-7
ii  libpam0g               1.1.3-7
ii  libselinux1            2.1.9-2
ii  libssl1.0.0            1.0.1-2
ii  libwrap0               7.6.q-23
ii  lsb-base               3.2+Debian31
ii  openssh-client         1:5.9p1-4
ii  procps                 1:3.3.2-3
ii  zlib1g                 1:1.2.6.dfsg-2

Versions of packages openssh-server recommends:
ii  openssh-blacklist        0.4.1
ii  openssh-blacklist-extra  0.4.1
ii  xauth                    1:1.0.6-1

Versions of packages openssh-server suggests:
pn  molly-guard                           <none>
pn  monkeysphere                          <none>
pn  rssh                                  <none>
pn  ssh-askpass-fullscreen [ssh-askpass]  0.3-3.1
pn  ssh-askpass-gnome [ssh-askpass]       1:5.9p1-4
pn  ufw                                   <none>

-- debconf information:
  ssh/insecure_rshd:
  ssh/vulnerable_host_keys:
  ssh/insecure_telnetd:
  ssh/new_config: true
* ssh/use_old_init_script: true
  ssh/disable_cr_auth: false
  ssh/encrypted_host_key_but_no_keygen:



--- End Message ---
--- Begin Message ---
Source: openssl
Source-Version: 1.0.1-3

We believe that the bug you reported is fixed in the latest version of
openssl, which is due to be installed in the Debian FTP archive:

libcrypto1.0.0-udeb_1.0.1-3_amd64.udeb
  to main/o/openssl/libcrypto1.0.0-udeb_1.0.1-3_amd64.udeb
libssl-dev_1.0.1-3_amd64.deb
  to main/o/openssl/libssl-dev_1.0.1-3_amd64.deb
libssl-doc_1.0.1-3_all.deb
  to main/o/openssl/libssl-doc_1.0.1-3_all.deb
libssl1.0.0-dbg_1.0.1-3_amd64.deb
  to main/o/openssl/libssl1.0.0-dbg_1.0.1-3_amd64.deb
libssl1.0.0_1.0.1-3_amd64.deb
  to main/o/openssl/libssl1.0.0_1.0.1-3_amd64.deb
openssl_1.0.1-3.debian.tar.gz
  to main/o/openssl/openssl_1.0.1-3.debian.tar.gz
openssl_1.0.1-3.dsc
  to main/o/openssl/openssl_1.0.1-3.dsc
openssl_1.0.1-3_amd64.deb
  to main/o/openssl/openssl_1.0.1-3_amd64.deb



A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to [email protected],
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Kurt Roeckx <[email protected]> (supplier of updated openssl package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing [email protected])


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

Format: 1.8
Date: Sat, 31 Mar 2012 18:35:59 +0200
Source: openssl
Binary: openssl libssl1.0.0 libcrypto1.0.0-udeb libssl-dev libssl-doc 
libssl1.0.0-dbg
Architecture: source all amd64
Version: 1.0.1-3
Distribution: unstable
Urgency: high
Maintainer: Debian OpenSSL Team <[email protected]>
Changed-By: Kurt Roeckx <[email protected]>
Description: 
 libcrypto1.0.0-udeb - crypto shared library - udeb (udeb)
 libssl-dev - SSL development libraries, header files and documentation
 libssl-doc - SSL development documentation documentation
 libssl1.0.0 - SSL shared libraries
 libssl1.0.0-dbg - Symbol tables for libssl and libcrypto
 openssl    - Secure Socket Layer (SSL) binary and related cryptographic tools
Closes: 665836
Changes: 
 openssl (1.0.1-3) unstable; urgency=high
 .
   * Fix crash in vpaes (Closes: #665836)
   * use client version when deciding whether to send supported signature
     algorithms extension
Checksums-Sha1: 
 eed8d74d0ee887c5a4d14365882ae4fe952967cc 2193 openssl_1.0.1-3.dsc
 d2060242df45a57a7aea114cc6d7f939f8468c70 89679 openssl_1.0.1-3.debian.tar.gz
 2a5b5d92354ed743d91083da531ea5a43a88cca2 1197410 libssl-doc_1.0.1-3_all.deb
 92ebe4c439cb8e9dcac66047a4baf260839d8404 694632 openssl_1.0.1-3_amd64.deb
 de30622b7dc76ee66f756c496a67f344e5fac3aa 1208684 libssl1.0.0_1.0.1-3_amd64.deb
 8c864f8f026db1f4765cfadcac70734f91b1d988 771058 
libcrypto1.0.0-udeb_1.0.1-3_amd64.udeb
 22360ca5681f9e79825674e23963cca98de674c2 1693606 libssl-dev_1.0.1-3_amd64.deb
 4aa5d92d04455469102271959f8755982d52ea47 2305578 
libssl1.0.0-dbg_1.0.1-3_amd64.deb
Checksums-Sha256: 
 d99252533b23a20dbda69f7a052d33d4529577408a9cdb3c978db59bc989633d 2193 
openssl_1.0.1-3.dsc
 3f3282db92785f6857a5fda95ef87f31982186e4eb313b81e2e0b391ccf17bdd 89679 
openssl_1.0.1-3.debian.tar.gz
 6c21315bd3191faa6354ed01d761e5675d6a20be6bbc9c7893521d76ad19cd4d 1197410 
libssl-doc_1.0.1-3_all.deb
 0d46912d0c05802cad3538a4e2f7124aeb7cafd1a1dc50e4da7e1d7d41948859 694632 
openssl_1.0.1-3_amd64.deb
 d2f15739e73b324d2f202a4067806b19d346dc0b8595c254a169e72d712fad70 1208684 
libssl1.0.0_1.0.1-3_amd64.deb
 06950dddd3a44a544fd46016f6ecd7c9a9b60880a2018a3f03ccd0c9d1b82781 771058 
libcrypto1.0.0-udeb_1.0.1-3_amd64.udeb
 699013e5943a40511a51276fd275f600895dfc38010b92c53736ff3fa0fe9820 1693606 
libssl-dev_1.0.1-3_amd64.deb
 4afa92149f8e57ad9da4f138d0c272318fa0afa5171fa3708364d9e42552e6b4 2305578 
libssl1.0.0-dbg_1.0.1-3_amd64.deb
Files: 
 f8c85aae4554264256a4bc2e75978393 2193 utils optional openssl_1.0.1-3.dsc
 7c24b7f988060288a9bb0e096e72093f 89679 utils optional 
openssl_1.0.1-3.debian.tar.gz
 a65d10bf837e6cd238c20ebea21acae2 1197410 doc optional 
libssl-doc_1.0.1-3_all.deb
 f3320e9c219bc7528940cce81a55bc54 694632 utils optional 
openssl_1.0.1-3_amd64.deb
 f6a01055826f11c6836169402b40ffb6 1208684 libs important 
libssl1.0.0_1.0.1-3_amd64.deb
 674315eb044dfc1801e4210957b0f175 771058 debian-installer optional 
libcrypto1.0.0-udeb_1.0.1-3_amd64.udeb
 8f7d3aef5a2681faf9ff3640896edaa5 1693606 libdevel optional 
libssl-dev_1.0.1-3_amd64.deb
 4c6f049d70a5371ec9bfee663f386b0a 2305578 debug extra 
libssl1.0.0-dbg_1.0.1-3_amd64.deb
Package-Type: udeb

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.12 (GNU/Linux)
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=whgS
-----END PGP SIGNATURE-----



--- End Message ---

Reply via email to