Your message dated Sun, 02 Feb 2020 19:17:09 +0000 with message-id <[email protected]> and subject line Bug#946242: fixed in openssh 1:7.9p1-10+deb10u2 has caused the Debian Bug report #946242, regarding fatal: privsep_preauth: preauth child terminated by signal 31 to be marked as done.
This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what this message is talking about, this may indicate a serious mail system misconfiguration somewhere. Please contact [email protected] immediately.) -- 946242: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=946242 Debian Bug Tracking System Contact [email protected] with problems
--- Begin Message ---Package: openssh-server Version: 1:7.9p1-10+deb10u1 Severity: grave Justification: renders package unusable Dear Maintainer, *** Reporter, please consider answering these questions, where appropriate *** * What led up to the situation? apt upgrade lead to openssh-server * being unusable. * What exactly did you do (or not do) that was effective (or ineffective)? bug #941663 supposedly fixed this issue in the version I upgraded to but the symptom remains. Also tried installing 8.1 version but that did not fix the issue either. I am running a 3.16 kernel because a 4.x kernel is not supported on my hardware (AMD Geode LX processor). * What was the outcome of this action? no change * What outcome did you expect instead? to login *** End of the template - remove these template lines *** -- System Information: Debian Release: 10.2 APT prefers stable-debug APT policy: (500, 'stable-debug'), (500, 'stable') Architecture: i386 (i586) Kernel: Linux 3.16.0-4-586 Locale: LANG=en_US.UTF-8, LC_CTYPE=en_US.UTF-8 (charmap=UTF-8), LANGUAGE=en_US.UTF-8 (charmap=UTF-8) Shell: /bin/sh linked to /bin/dash Init: systemd (via /run/systemd/system) Versions of packages openssh-server depends on: ii adduser 3.118 ii debconf [debconf-2.0] 1.5.71 ii dpkg 1.19.7 ii libaudit1 1:2.8.4-3 ii libc6 2.28-10 ii libcom-err2 1.44.5-1+deb10u2 ii libgssapi-krb5-2 1.17-3 ii libkrb5-3 1.17-3 ii libpam-modules 1.3.1-5 ii libpam-runtime 1.3.1-5 ii libpam0g 1.3.1-5 ii libselinux1 2.8-1+b1 ii libssl1.1 1.1.1d-0+deb10u2 ii libsystemd0 241-7~deb10u2 ii libwrap0 7.6.q-28 ii lsb-base 10.2019051400 ii openssh-client 1:7.9p1-10+deb10u1 ii openssh-sftp-server 1:7.9p1-10+deb10u1 ii procps 2:3.3.15-2 ii ucf 3.0038+nmu1 ii zlib1g 1:1.2.11.dfsg-1 Versions of packages openssh-server recommends: ii libpam-systemd [logind] 241-7~deb10u2 ii ncurses-term 6.1+20181013-2+deb10u2 ii xauth 1:1.0.10-1 Versions of packages openssh-server suggests: pn molly-guard <none> pn monkeysphere <none> pn rssh <none> pn ssh-askpass <none> pn ufw <none> -- Configuration Files: /etc/default/ssh changed: SSHD_OPTS=-4 -- debconf information: * ssh/use_old_init_script: true * openssh-server/permit-root-login: true ssh/encrypted_host_key_but_no_keygen: openssh-server/password-authentication: false ssh/vulnerable_host_keys: ssh/new_config: true ssh/disable_cr_auth: false
--- End Message ---
--- Begin Message ---Source: openssh Source-Version: 1:7.9p1-10+deb10u2 We believe that the bug you reported is fixed in the latest version of openssh, which is due to be installed in the Debian FTP archive. A summary of the changes between this version and the previous one is attached. Thank you for reporting the bug, which will now be closed. If you have further comments please address them to [email protected], and the maintainer will reopen the bug report if appropriate. Debian distribution maintenance software pp. Colin Watson <[email protected]> (supplier of updated openssh package) (This message was generated automatically at their request; if you believe that there is a problem with it please contact the archive administrators by mailing [email protected]) -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 Format: 1.8 Date: Fri, 31 Jan 2020 20:55:34 +0000 Source: openssh Architecture: source Version: 1:7.9p1-10+deb10u2 Distribution: buster Urgency: medium Maintainer: Debian OpenSSH Maintainers <[email protected]> Changed-By: Colin Watson <[email protected]> Closes: 946242 Changes: openssh (1:7.9p1-10+deb10u2) buster; urgency=medium . * Apply upstream patch to deny (non-fatally) ipc in the seccomp sandbox, fixing failures with OpenSSL 1.1.1d and Linux < 3.19 on some architectures (closes: #946242). Note that this also drops the previous change to allow ipc on s390, since upstream has security concerns with that and it doesn't currently seem to be needed. Checksums-Sha1: 2b9c7534c265c8a6638142a822cc1f6176c4742f 3321 openssh_7.9p1-10+deb10u2.dsc 785050c5afc7b7684cb25013d897f500eebf9bc6 174016 openssh_7.9p1-10+deb10u2.debian.tar.xz Checksums-Sha256: bb8384534491eb1edba6c12a2d4f289e59abb4ec4795101d9655fae52e426dec 3321 openssh_7.9p1-10+deb10u2.dsc 2f8d81757e3050aab4ab735692c1b2d521cee54ec3987ef3b08fbaff84abf3c1 174016 openssh_7.9p1-10+deb10u2.debian.tar.xz Files: 4687cc10eb11fb78972061a2e5b4c219 3321 net standard openssh_7.9p1-10+deb10u2.dsc e235664e9191eb5a4b91f30c03c9de0a 174016 net standard openssh_7.9p1-10+deb10u2.debian.tar.xz -----BEGIN PGP SIGNATURE----- iQIzBAEBCAAdFiEErApP8SYRtvzPAcEROTWH2X2GUAsFAl40sJMACgkQOTWH2X2G UAsNKxAAl5wFADGKjunoJp1gm7DzAZCfQbYX4c4kyX4jbuQWgfRM/fHpSTjC3KQV oLpBm5rZ6kRCBGoj5G4qs5e3j7/m6tHPgwoAvVLOppFvhZWmqhLnHUfx9rBofMAH qu+tBmqjUOWQYRuZ7DJPs0mqSD9XnTWPOhqs7MF8GCApClc9oGiovNHPt9n4PwAp CB2AWjyO/sLxuaLtS35wNuJNd5Jsicco7u5pb/G6J79xyVRFT+XdAbtAtdF1xXzP mp7Zxj33Dl4qHrYcfkb83Jf07dvUDk2AiFz1SVu9q4Y/iZo5dcIF0SJmzGbuyrQ4 xWJp5G6eJ6THLYtY9JLXbzMORMZHQC1Z68rMm8XgArbjWn7SqdyvdbclCH7281WF ByQQqlnMTo7IzgTzGkZkDRxldt2TAtwEly2hGdZRAbg2MP9two3hQY9BskNpyg4L HVdU0I4mTpbHq69SThhFHO6koMT0SLCBVUZLcQt8i/bT9AC3OhoC/qppX8TEZYAi JAb9KuYHLGk+TtorxJNaI+F4EkCCLYO+pKdjdqyqosx0H6g714B6FvKgiwIIafGd Bo3AgmiYttHdjfBQgO6CbPWhgv1N9cdhCHmreYs9uOHKnux+vWI7pKlEbyYc7ntC JslHOuvXte3rO/21yCSocq0iSuDP6Z1BSYSm5ntXRqqgk36Bbas= =UY3j -----END PGP SIGNATURE-----
--- End Message ---

