Your message dated Tue, 18 Oct 2005 11:02:08 -0700
with message-id <[EMAIL PROTECTED]>
and subject line Bug#334502: fixed in openssl 0.9.8a-2
has caused the attached Bug report to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what I am
talking about this indicates a serious mail system misconfiguration
somewhere.  Please contact me immediately.)

Debian bug tracking system administrator
(administrator, Debian Bugs database)

--------------------------------------
Received: (at submit) by bugs.debian.org; 18 Oct 2005 11:10:42 +0000
>From [EMAIL PROTECTED] Tue Oct 18 04:10:42 2005
Return-path: <[EMAIL PROTECTED]>
Received: from imap.unet.univie.ac.at [131.130.221.38] 
        by spohr.debian.org with esmtp (Exim 3.36 1 (Debian))
        id 1ERpMf-0001Fq-00; Tue, 18 Oct 2005 04:10:41 -0700
Received: from rasputin.mpi.univie.ac.at (rasputin.mpi.univie.ac.at 
[131.130.30.227])
        by imap.unet.univie.ac.at (8.12.10/8.12.10) with ESMTP id 
j9IBAYFO070268;
        Tue, 18 Oct 2005 13:10:36 +0200
Message-Id: <[EMAIL PROTECTED]>
Content-Type: text/plain; charset="us-ascii"
MIME-Version: 1.0
Content-Transfer-Encoding: 7bit
From: Bastian Pfau <[EMAIL PROTECTED]>
To: Debian Bug Tracking System <[EMAIL PROTECTED]>
Subject: After upgrading libssl0.9.8 to 0.9.8a-1 sshd segfaults
X-Mailer: reportbug 3.17
Date: Tue, 18 Oct 2005 13:10:35 +0200
X-DCC-ZID-Univie-Metrics: mx8 4248; Body=2 Fuz1=2 Fuz2=2
Delivered-To: [EMAIL PROTECTED]
X-Spam-Checker-Version: SpamAssassin 2.60-bugs.debian.org_2005_01_02 
        (1.212-2003-09-23-exp) on spohr.debian.org
X-Spam-Level: 
X-Spam-Status: No, hits=-8.0 required=4.0 tests=BAYES_00,HAS_PACKAGE 
        autolearn=no version=2.60-bugs.debian.org_2005_01_02

Package: libssl0.9.8
Version: 0.9.8-3
Severity: normal


Hello,

after upgrading libssl0.9.8 from 0.9.8-3 to 0.9.8a-1 within a normal weekly 
"apt-get upgrade" procedure, sshd has failed with segfault:

# /etc/init.d/ssh start
# cat /var/log/messages
sshd[5399]: segfault at 0000000232795e4c rip 00002aaaaaf55817 rsp 
00007fffff9e95a8 error 4

Additionally kde refused to start. I was not able to find any error log.

I downgraded libssl0.9.8 to the old version 0.9.8-3 and now everything works 
again.

Thanks.

Bastian



-- System Information:
Debian Release: testing/unstable
  APT prefers unstable
  APT policy: (990, 'unstable'), (500, 'testing'), (500, 'stable')
Architecture: amd64 (x86_64)
Shell:  /bin/sh linked to /bin/bash
Kernel: Linux 2.6.12-1-amd64-k8
Locale: [EMAIL PROTECTED], [EMAIL PROTECTED] (charmap=ISO-8859-15)

Versions of packages libssl0.9.8 depends on:
ii  debconf [debconf-2.0]         1.4.58     Debian configuration management sy
ii  libc6                         2.3.5-7    GNU C Library: Shared libraries an
ii  libssl0.9.8                   0.9.8-3    SSL shared libraries

libssl0.9.8 recommends no packages.

-- debconf information excluded

---------------------------------------
Received: (at 334502-close) by bugs.debian.org; 18 Oct 2005 18:09:43 +0000
>From [EMAIL PROTECTED] Tue Oct 18 11:09:43 2005
Return-path: <[EMAIL PROTECTED]>
Received: from katie by spohr.debian.org with local (Exim 3.36 1 (Debian))
        id 1ERvmq-00015f-00; Tue, 18 Oct 2005 11:02:08 -0700
From: Kurt Roeckx <[EMAIL PROTECTED]>
To: [EMAIL PROTECTED]
X-Katie: $Revision: 1.56 $
Subject: Bug#334502: fixed in openssl 0.9.8a-2
Message-Id: <[EMAIL PROTECTED]>
Sender: Archive Administrator <[EMAIL PROTECTED]>
Date: Tue, 18 Oct 2005 11:02:08 -0700
Delivered-To: [EMAIL PROTECTED]
X-Spam-Checker-Version: SpamAssassin 2.60-bugs.debian.org_2005_01_02 
        (1.212-2003-09-23-exp) on spohr.debian.org
X-Spam-Level: 
X-Spam-Status: No, hits=-6.0 required=4.0 tests=BAYES_00,HAS_BUG_NUMBER 
        autolearn=no version=2.60-bugs.debian.org_2005_01_02
X-CrossAssassin-Score: 2

Source: openssl
Source-Version: 0.9.8a-2

We believe that the bug you reported is fixed in the latest version of
openssl, which is due to be installed in the Debian FTP archive:

libcrypto0.9.8-udeb_0.9.8a-2_i386.udeb
  to pool/main/o/openssl/libcrypto0.9.8-udeb_0.9.8a-2_i386.udeb
libssl-dev_0.9.8a-2_i386.deb
  to pool/main/o/openssl/libssl-dev_0.9.8a-2_i386.deb
libssl0.9.8-dbg_0.9.8a-2_i386.deb
  to pool/main/o/openssl/libssl0.9.8-dbg_0.9.8a-2_i386.deb
libssl0.9.8_0.9.8a-2_i386.deb
  to pool/main/o/openssl/libssl0.9.8_0.9.8a-2_i386.deb
openssl_0.9.8a-2.diff.gz
  to pool/main/o/openssl/openssl_0.9.8a-2.diff.gz
openssl_0.9.8a-2.dsc
  to pool/main/o/openssl/openssl_0.9.8a-2.dsc
openssl_0.9.8a-2_i386.deb
  to pool/main/o/openssl/openssl_0.9.8a-2_i386.deb



A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to [EMAIL PROTECTED],
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Kurt Roeckx <[EMAIL PROTECTED]> (supplier of updated openssl package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing [EMAIL PROTECTED])


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Format: 1.7
Date: Tue, 18 Oct 2005 19:05:53 +0200
Source: openssl
Binary: libssl-dev openssl libssl0.9.8-dbg libcrypto0.9.8-udeb libssl0.9.8
Architecture: source i386
Version: 0.9.8a-2
Distribution: unstable
Urgency: low
Maintainer: Debian OpenSSL Team <[EMAIL PROTECTED]>
Changed-By: Kurt Roeckx <[EMAIL PROTECTED]>
Description: 
 libcrypto0.9.8-udeb - crypto shared library - udeb (udeb)
 libssl-dev - SSL development libraries, header files and documentation
 libssl0.9.8 - SSL shared libraries
 libssl0.9.8-dbg - Symbol tables for libssl and libcrypt
 openssl    - Secure Socket Layer (SSL) binary and related cryptographic tools
Closes: 334501 334502 334542
Changes: 
 openssl (0.9.8a-2) unstable; urgency=low
 .
   * Add Build-Dependency on m4, since sparc needs it to generate
     it's assembler files.  (Closes: #334542)
   * Don't use rc4-x86_64.o on amd64 for now, it seems to be broken
     and causes a segfault.  (Closes: #334501, #334502)
Files: 
 96f514fa408dc8e762a57f19ed23783a 792 utils optional openssl_0.9.8a-2.dsc
 70c8c2f1116965b485041be4b546c502 30235 utils optional openssl_0.9.8a-2.diff.gz
 b90e699666be3377e2d98ca60c5fe8a3 976658 utils optional 
openssl_0.9.8a-2_i386.deb
 360d3deb2f39acbba274cc30c7c42c54 2645862 libs important 
libssl0.9.8_0.9.8a-2_i386.deb
 49683286137e7a2e9bb87d6218e1ab95 508528 debian-installer optional 
libcrypto0.9.8-udeb_0.9.8a-2_i386.udeb
 f79cd1894cc72878b351001a89feb87e 2835384 libdevel optional 
libssl-dev_0.9.8a-2_i386.deb
 de96d3ddf8e565e5e2201453b6cfb7f0 5151436 libdevel extra 
libssl0.9.8-dbg_0.9.8a-2_i386.deb
Package-Type: udeb

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.1 (GNU/Linux)

iD8DBQFDVTOvQdwckHJElwsRAm8NAJ4is279134MNoDvQYYxHxVJm7VNZwCdEl3Z
Mb/P/1rpmTaHyXP21Kh21HQ=
=uZFt
-----END PGP SIGNATURE-----


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]

Reply via email to