* Tobias Frost:

> heres the last lines of the strace, reading of the password removed.
>
> stat64(".", {st_mode=S_IFDIR|0755, st_size=4096, ...}) = 0
> read(7, [EMAIL PROTECTED]'s password:
> (some lines removed)
> stat64("./sbin", {st_mode=S_IFDIR|0755, st_size=4096, ...}) = 0
> umask(0)                                = 022
> umask(022)                              = 0
> write(6, "\0", 1)                       = 1
> stat64("./sbin", {st_mode=S_IFDIR|0755, st_size=4096, ...}) = 0
> read(7, Segmentation fault
> "", 1)                          = 0
> --- SIGCHLD (Child exited) @ 0 (0) ---
> read(7, "", 1)                          = 0
> close(7)                                = 0
> waitpid(10650, [{WIFEXITED(s) && WEXITSTATUS(s) == 139}], 0) = 10650
> exit_group(1)                           = ?
> Process 10649 detached

Can you post a GDB stack trace?  You should be able to obtain this by
attaching gdb to the scp child process (with "gdb /usr/bin/scp PID")
while ssh prompts for the password.

Can you reproduce this with Debian's dropbear?



-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]

Reply via email to