Your message dated Mon, 17 May 2004 02:03:40 -0400
with message-id <[EMAIL PROTECTED]>
and subject line Bug#247538: fixed in openssh 1:3.8.1p1-1
has caused the attached Bug report to be marked as done.
This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.
(NB: If you are a system administrator and have no idea what I am
talking about this indicates a serious mail system misconfiguration
somewhere. Please contact me immediately.)
Debian bug tracking system administrator
(administrator, Debian Bugs database)
--------------------------------------
Received: (at submit) by bugs.debian.org; 5 May 2004 18:25:18 +0000
>From [EMAIL PROTECTED] Wed May 05 11:25:18 2004
Return-path: <[EMAIL PROTECTED]>
Received: from nef.ens.fr [129.199.96.32]
by spohr.debian.org with esmtp (Exim 3.35 1 (Debian))
id 1BLR54-0007jZ-00; Wed, 05 May 2004 11:25:18 -0700
Received: from clipper.ens.fr (clipper-gw.ens.fr [129.199.1.22])
by nef.ens.fr (8.12.10/1.01.28121999) with ESMTP id i45IOkKx062292
for <[EMAIL PROTECTED]>; Wed, 5 May 2004 20:24:46 +0200 (CEST)
Received: from ([EMAIL PROTECTED]) by clipper.ens.fr (8.12.3/jb-1.1)
Date: Wed, 5 May 2004 20:24:44 +0200
From: Nicolas George <[EMAIL PROTECTED]>
To: [EMAIL PROTECTED]
Cc: [EMAIL PROTECTED], [EMAIL PROTECTED]
Subject: sshd: logout not recorded in utmp
Message-ID: <[EMAIL PROTECTED]>
Mime-Version: 1.0
Content-Type: multipart/signed; micalg=pgp-sha1;
protocol="application/pgp-signature"; boundary="qMm9M+Fa2AknHoGS"
Content-Disposition: inline
User-Agent: Mutt/1.4.2i
Delivered-To: [EMAIL PROTECTED]
X-Spam-Checker-Version: SpamAssassin 2.60-bugs.debian.org_2004_03_25
(1.212-2003-09-23-exp) on spohr.debian.org
X-Spam-Status: No, hits=-7.0 required=4.0 tests=BAYES_00,HAS_PACKAGE
autolearn=no version=2.60-bugs.debian.org_2004_03_25
X-Spam-Level:
X-CrossAssassin-Score: 1
--qMm9M+Fa2AknHoGS
Content-Type: text/plain; charset=us-ascii
Content-Disposition: inline
Package: ssh
Version: 1:3.8p1-3
Severity: important
When ssh creates a tty with a number greater than 999, it does not
remove it correctly from utmp. The problem is that ssh uses at one place
a 8-chars buffer while everywhere else it uses larger buffers: since
"pts/1234\0" is more than 8 chars long, it is truncated.
The problem shows probably on *very* loaded login servers, but it shows
also on 2.6.4+ kernels, where the tty numbers are never reused.
If the line
char line[8];
in loginrec.c:1357 becomes
char line[UT_LINESIZE];
that fixes the problem.
--qMm9M+Fa2AknHoGS
Content-Type: application/pgp-signature
Content-Disposition: inline
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.2.0 (SunOS)
iD8DBQFAmTFrsGPZlzblTJMRAjTEAJ9sz5DVMllEFoTFh8VpVuW+EfT8mACfdTZ2
x/SYGjg9Yu5iOb3KvU81UjM=
=f/4b
-----END PGP SIGNATURE-----
--qMm9M+Fa2AknHoGS--
---------------------------------------
Received: (at 247538-close) by bugs.debian.org; 17 May 2004 06:10:04 +0000
>From [EMAIL PROTECTED] Sun May 16 23:10:04 2004
Return-path: <[EMAIL PROTECTED]>
Received: from newraff.debian.org [208.185.25.31] (mail)
by spohr.debian.org with esmtp (Exim 3.35 1 (Debian))
id 1BPbK8-0003LL-00; Sun, 16 May 2004 23:10:04 -0700
Received: from rdonald by newraff.debian.org with local (Exim 3.35 1 (Debian))
id 1BPbDw-0005lg-00; Mon, 17 May 2004 02:03:40 -0400
From: Colin Watson <[EMAIL PROTECTED]>
To: [EMAIL PROTECTED]
X-Katie: lisa $Revision: 1.30 $
Subject: Bug#247538: fixed in openssh 1:3.8.1p1-1
Message-Id: <[EMAIL PROTECTED]>
Sender: Randall Donald <[EMAIL PROTECTED]>
Date: Mon, 17 May 2004 02:03:40 -0400
Delivered-To: [EMAIL PROTECTED]
X-Spam-Checker-Version: SpamAssassin 2.60-bugs.debian.org_2004_03_25
(1.212-2003-09-23-exp) on spohr.debian.org
X-Spam-Status: No, hits=-6.0 required=4.0 tests=BAYES_00,HAS_BUG_NUMBER
autolearn=no version=2.60-bugs.debian.org_2004_03_25
X-Spam-Level:
X-CrossAssassin-Score: 7
Source: openssh
Source-Version: 1:3.8.1p1-1
We believe that the bug you reported is fixed in the latest version of
openssh, which is due to be installed in the Debian FTP archive:
openssh-client-udeb_3.8.1p1-1_powerpc.udeb
to pool/main/o/openssh/openssh-client-udeb_3.8.1p1-1_powerpc.udeb
openssh-server-udeb_3.8.1p1-1_powerpc.udeb
to pool/main/o/openssh/openssh-server-udeb_3.8.1p1-1_powerpc.udeb
openssh_3.8.1p1-1.diff.gz
to pool/main/o/openssh/openssh_3.8.1p1-1.diff.gz
openssh_3.8.1p1-1.dsc
to pool/main/o/openssh/openssh_3.8.1p1-1.dsc
openssh_3.8.1p1.orig.tar.gz
to pool/main/o/openssh/openssh_3.8.1p1.orig.tar.gz
ssh_3.8.1p1-1_powerpc.deb
to pool/main/o/openssh/ssh_3.8.1p1-1_powerpc.deb
A summary of the changes between this version and the previous one is
attached.
Thank you for reporting the bug, which will now be closed. If you
have further comments please address them to [EMAIL PROTECTED],
and the maintainer will reopen the bug report if appropriate.
Debian distribution maintenance software
pp.
Colin Watson <[EMAIL PROTECTED]> (supplier of updated openssh package)
(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing [EMAIL PROTECTED])
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
Format: 1.7
Date: Tue, 11 May 2004 23:38:10 +0100
Source: openssh
Binary: ssh-askpass-gnome openssh-client-udeb ssh openssh-server-udeb
Architecture: source powerpc
Version: 1:3.8.1p1-1
Distribution: unstable
Urgency: low
Maintainer: Matthew Vernon <[EMAIL PROTECTED]>
Changed-By: Colin Watson <[EMAIL PROTECTED]>
Description:
openssh-client-udeb - Secure shell client for the Debian installer (udeb)
openssh-server-udeb - Secure shell server for the Debian installer (udeb)
ssh - Secure rlogin/rsh/rcp replacement (OpenSSH)
Closes: 211640 232333 238753 242808 244829 246068 247538
Changes:
openssh (1:3.8.1p1-1) unstable; urgency=low
.
* New upstream release.
- Use a longer buffer for tty names in utmp (closes: #247538).
* Make sure there's a newline at the end of sshd_config before adding
'UsePAM yes' (closes: #244829).
* Generate a new .orig.tar.gz without RFC.nroff, and remove
/usr/share/doc/ssh/RFC.gz (closes: #211640). It isn't DFSG-free and only
documents the obsolete SSH1 protocol, not to mention that it was never a
real RFC but only an Internet-Draft. It's available from
http://www.free.lp.se/bamse/draft-ylonen-ssh-protocol-00.txt if you want
it for some reason.
* Add openssh-client-udeb and openssh-server-udeb binary packages for use
in debian-installer. They still need libnss_files to be supplied in udeb
form by glibc.
* Work around lack of res_query weak alias in libresolv on amd64 (see
#242462, awaiting real fix upstream).
* Fix grammar in sshd(8) (closes: #238753).
* Add .desktop file and icon for ssh-askpass-gnome (closes: #232333).
* Update Polish debconf template translation (thanks, Emil Nowak;
closes: #242808).
* Add Turkish debconf template translation (thanks, Recai OktaÅ;
closes: #246068).
Files:
48e979343fe79fdddcce81a877b7113f 890 net standard openssh_3.8.1p1-1.dsc
9ce6f2fa5b2931ce2c4c25f3af9ad50d 795948 net standard
openssh_3.8.1p1.orig.tar.gz
79f711efd181e7f6a67925ecc406cabe 139831 net standard openssh_3.8.1p1-1.diff.gz
3984248fed7479a4bf15f8776dad3f75 728470 net standard ssh_3.8.1p1-1_powerpc.deb
5c26dc3f63f3b174608e9080069e1cf6 100740 debian-installer optional
openssh-client-udeb_3.8.1p1-1_powerpc.udeb
481d209ae63d29cf32a7630140775786 120712 debian-installer optional
openssh-server-udeb_3.8.1p1-1_powerpc.udeb
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.2.2 (GNU/Linux)
Comment: Colin Watson <[EMAIL PROTECTED]> -- Debian developer
iD8DBQFAoWRb9t0zAhD6TNERAnMiAJ94XBkqt8SReHjhwfIzPsawQUhiMgCdGUzK
vWUuAKi6g37QFrBzXlNOKaM=
=Qits
-----END PGP SIGNATURE-----