Your message dated Sat, 31 Mar 2012 17:04:48 +0000
with message-id <[email protected]>
and subject line Bug#665836: fixed in openssl 1.0.1-3
has caused the Debian Bug report #665836,
regarding openssh-server: segfault error 6 in libcrypto.so.1.0.0
to be marked as done.
This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.
(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact [email protected]
immediately.)
--
665836: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=665836
Debian Bug Tracking System
Contact [email protected] with problems
--- Begin Message ---
Package: openssh-server
Version: 1:5.9p1-4
Severity: important
Dear Maintainer,
When connecting to my home machine while forwarding ports, I keep getting
segfaults in sshd whenever the forwarded ports are used. This includes
X forwarding. The errors that appear in my syslog look like this:
Mar 26 09:11:41 maru kernel: sshd[9320]: segfault at b8749000 ip b752f678 sp
bfde6de0 error 6 in libcrypto.so.1.0.0[b74c6000+1a3000]
Mar 26 09:11:52 maru kernel: sshd[10647]: segfault at b81fa008 ip b753b678 sp
bf9d42d0 error 6 in libcrypto.so.1.0.0[b74d2000+1a3000]
Mar 26 09:11:56 maru kernel: sshd[10680]: segfault at b8563000 ip b759b678 sp
bfdff0a0 error 6 in libcrypto.so.1.0.0[b7532000+1a3000]
-- System Information:
Debian Release: wheezy/sid
APT prefers unstable
APT policy: (102, 'unstable'), (101, 'experimental'), (99, 'testing'), (9,
'stable')
Architecture: i386 (i686)
Kernel: Linux 3.2.6 (SMP w/2 CPU cores)
Locale: LANG=C, LC_CTYPE=C (charmap=ANSI_X3.4-1968)
Shell: /bin/sh linked to /bin/bash
Versions of packages openssh-server depends on:
ii adduser 3.113+nmu1
ii debconf [debconf-2.0] 1.5.42
ii dpkg 1.16.2
ii libc6 2.13-27
ii libcomerr2 1.42.1-2
ii libgssapi-krb5-2 1.10+dfsg~beta1-2
ii libkrb5-3 1.10+dfsg~beta1-2
ii libpam-modules 1.1.3-7
ii libpam-runtime 1.1.3-7
ii libpam0g 1.1.3-7
ii libselinux1 2.1.9-2
ii libssl1.0.0 1.0.1-2
ii libwrap0 7.6.q-23
ii lsb-base 3.2+Debian31
ii openssh-client 1:5.9p1-4
ii procps 1:3.3.2-3
ii zlib1g 1:1.2.6.dfsg-2
Versions of packages openssh-server recommends:
ii openssh-blacklist 0.4.1
ii openssh-blacklist-extra 0.4.1
ii xauth 1:1.0.6-1
Versions of packages openssh-server suggests:
pn molly-guard <none>
pn monkeysphere <none>
pn rssh <none>
pn ssh-askpass-fullscreen [ssh-askpass] 0.3-3.1
pn ssh-askpass-gnome [ssh-askpass] 1:5.9p1-4
pn ufw <none>
-- debconf information:
ssh/insecure_rshd:
ssh/vulnerable_host_keys:
ssh/insecure_telnetd:
ssh/new_config: true
* ssh/use_old_init_script: true
ssh/disable_cr_auth: false
ssh/encrypted_host_key_but_no_keygen:
--- End Message ---
--- Begin Message ---
Source: openssl
Source-Version: 1.0.1-3
We believe that the bug you reported is fixed in the latest version of
openssl, which is due to be installed in the Debian FTP archive:
libcrypto1.0.0-udeb_1.0.1-3_amd64.udeb
to main/o/openssl/libcrypto1.0.0-udeb_1.0.1-3_amd64.udeb
libssl-dev_1.0.1-3_amd64.deb
to main/o/openssl/libssl-dev_1.0.1-3_amd64.deb
libssl-doc_1.0.1-3_all.deb
to main/o/openssl/libssl-doc_1.0.1-3_all.deb
libssl1.0.0-dbg_1.0.1-3_amd64.deb
to main/o/openssl/libssl1.0.0-dbg_1.0.1-3_amd64.deb
libssl1.0.0_1.0.1-3_amd64.deb
to main/o/openssl/libssl1.0.0_1.0.1-3_amd64.deb
openssl_1.0.1-3.debian.tar.gz
to main/o/openssl/openssl_1.0.1-3.debian.tar.gz
openssl_1.0.1-3.dsc
to main/o/openssl/openssl_1.0.1-3.dsc
openssl_1.0.1-3_amd64.deb
to main/o/openssl/openssl_1.0.1-3_amd64.deb
A summary of the changes between this version and the previous one is
attached.
Thank you for reporting the bug, which will now be closed. If you
have further comments please address them to [email protected],
and the maintainer will reopen the bug report if appropriate.
Debian distribution maintenance software
pp.
Kurt Roeckx <[email protected]> (supplier of updated openssl package)
(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing [email protected])
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512
Format: 1.8
Date: Sat, 31 Mar 2012 18:35:59 +0200
Source: openssl
Binary: openssl libssl1.0.0 libcrypto1.0.0-udeb libssl-dev libssl-doc
libssl1.0.0-dbg
Architecture: source all amd64
Version: 1.0.1-3
Distribution: unstable
Urgency: high
Maintainer: Debian OpenSSL Team <[email protected]>
Changed-By: Kurt Roeckx <[email protected]>
Description:
libcrypto1.0.0-udeb - crypto shared library - udeb (udeb)
libssl-dev - SSL development libraries, header files and documentation
libssl-doc - SSL development documentation documentation
libssl1.0.0 - SSL shared libraries
libssl1.0.0-dbg - Symbol tables for libssl and libcrypto
openssl - Secure Socket Layer (SSL) binary and related cryptographic tools
Closes: 665836
Changes:
openssl (1.0.1-3) unstable; urgency=high
.
* Fix crash in vpaes (Closes: #665836)
* use client version when deciding whether to send supported signature
algorithms extension
Checksums-Sha1:
eed8d74d0ee887c5a4d14365882ae4fe952967cc 2193 openssl_1.0.1-3.dsc
d2060242df45a57a7aea114cc6d7f939f8468c70 89679 openssl_1.0.1-3.debian.tar.gz
2a5b5d92354ed743d91083da531ea5a43a88cca2 1197410 libssl-doc_1.0.1-3_all.deb
92ebe4c439cb8e9dcac66047a4baf260839d8404 694632 openssl_1.0.1-3_amd64.deb
de30622b7dc76ee66f756c496a67f344e5fac3aa 1208684 libssl1.0.0_1.0.1-3_amd64.deb
8c864f8f026db1f4765cfadcac70734f91b1d988 771058
libcrypto1.0.0-udeb_1.0.1-3_amd64.udeb
22360ca5681f9e79825674e23963cca98de674c2 1693606 libssl-dev_1.0.1-3_amd64.deb
4aa5d92d04455469102271959f8755982d52ea47 2305578
libssl1.0.0-dbg_1.0.1-3_amd64.deb
Checksums-Sha256:
d99252533b23a20dbda69f7a052d33d4529577408a9cdb3c978db59bc989633d 2193
openssl_1.0.1-3.dsc
3f3282db92785f6857a5fda95ef87f31982186e4eb313b81e2e0b391ccf17bdd 89679
openssl_1.0.1-3.debian.tar.gz
6c21315bd3191faa6354ed01d761e5675d6a20be6bbc9c7893521d76ad19cd4d 1197410
libssl-doc_1.0.1-3_all.deb
0d46912d0c05802cad3538a4e2f7124aeb7cafd1a1dc50e4da7e1d7d41948859 694632
openssl_1.0.1-3_amd64.deb
d2f15739e73b324d2f202a4067806b19d346dc0b8595c254a169e72d712fad70 1208684
libssl1.0.0_1.0.1-3_amd64.deb
06950dddd3a44a544fd46016f6ecd7c9a9b60880a2018a3f03ccd0c9d1b82781 771058
libcrypto1.0.0-udeb_1.0.1-3_amd64.udeb
699013e5943a40511a51276fd275f600895dfc38010b92c53736ff3fa0fe9820 1693606
libssl-dev_1.0.1-3_amd64.deb
4afa92149f8e57ad9da4f138d0c272318fa0afa5171fa3708364d9e42552e6b4 2305578
libssl1.0.0-dbg_1.0.1-3_amd64.deb
Files:
f8c85aae4554264256a4bc2e75978393 2193 utils optional openssl_1.0.1-3.dsc
7c24b7f988060288a9bb0e096e72093f 89679 utils optional
openssl_1.0.1-3.debian.tar.gz
a65d10bf837e6cd238c20ebea21acae2 1197410 doc optional
libssl-doc_1.0.1-3_all.deb
f3320e9c219bc7528940cce81a55bc54 694632 utils optional
openssl_1.0.1-3_amd64.deb
f6a01055826f11c6836169402b40ffb6 1208684 libs important
libssl1.0.0_1.0.1-3_amd64.deb
674315eb044dfc1801e4210957b0f175 771058 debian-installer optional
libcrypto1.0.0-udeb_1.0.1-3_amd64.udeb
8f7d3aef5a2681faf9ff3640896edaa5 1693606 libdevel optional
libssl-dev_1.0.1-3_amd64.deb
4c6f049d70a5371ec9bfee663f386b0a 2305578 debug extra
libssl1.0.0-dbg_1.0.1-3_amd64.deb
Package-Type: udeb
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.12 (GNU/Linux)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=whgS
-----END PGP SIGNATURE-----
--- End Message ---