bugzilla-daemon at mindrot.org
2022-Feb-25 18:53 UTC
[Bug 3396] New: openssh-8.9_p1 does not accept connections - invalid syscall=414
https://bugzilla.mindrot.org/show_bug.cgi?id=3396
Bug ID: 3396
Summary: openssh-8.9_p1 does not accept connections - invalid
syscall=414
Product: Portable OpenSSH
Version: 8.9p1
Hardware: ix86
OS: Linux
Status: NEW
Severity: critical
Priority: P5
Component: sshd
Assignee: unassigned-bugs at mindrot.org
Reporter: fierevere at ya.ru
After updating openssh to version 8.9p1 and restarting sshd it is
unable to complete connection/login process:
remote:
debug1: Local version string SSH-2.0-OpenSSH_8.8p1-hpn15v2
debug1: Remote protocol version 2.0, remote software version
OpenSSH_8.9p1-hpn15v2
debug1: compat_banner: match: OpenSSH_8.9p1-hpn15v2 pat OpenSSH* compat
0x04000000
...
debug1: SSH2_MSG_KEXINIT sent
debug1: SSH2_MSG_KEXINIT received
debug1: AUTH STATE IS 0
debug1: kex: algorithm: curve25519-sha256
debug1: kex: host key algorithm: ecdsa-sha2-nistp256
debug1: REQUESTED ENC.NAME is 'aes128-ctr'
debug1: REQUESTED MAC.NAME is 'umac-64-etm at openssh.com'
debug1: kex: server->client cipher: aes128-ctr MAC:
umac-64-etm at openssh.com compression: zlib at openssh.com
debug1: REQUESTED ENC.NAME is 'aes128-ctr'
debug1: REQUESTED MAC.NAME is 'umac-64-etm at openssh.com'
debug1: kex: client->server cipher: aes128-ctr MAC:
umac-64-etm at openssh.com compression: zlib at openssh.com
debug1: expecting SSH2_MSG_KEX_ECDH_REPLY
disconnect.
local dmesg:
[682483.482239] audit: type=1326 audit(1645779265.254:7): auid=0 uid=22
gid=22 ses=6 pid=6030 comm="sshd" exe="/usr/sbin/sshd"
sig=31
arch=40000003 syscall=414 compat=0 ip=0xb7f2d549 code=0x0
Initially reported vs Gentoo bugzilla
https://bugs.gentoo.org/834019
and been confirmed there (Also you might want to see build environment
basic details).
Affected - x86 (i686) architecture.
32 bit kernel+32 bit userland and 64 bit kernel with 32bit userland
64bit (amd64) arch is not affected.
Tested with HPN patch and without it, does not matter - the problem
persists.
--
You are receiving this mail because:
You are watching the assignee of the bug.
bugzilla-daemon at mindrot.org
2022-Feb-25 23:20 UTC
[Bug 3396] openssh-8.9_p1 does not accept connections - invalid syscall=414
https://bugzilla.mindrot.org/show_bug.cgi?id=3396
Patrick McLean <chutzpah at gentoo.org> changed:
What |Removed |Added
----------------------------------------------------------------------------
CC| |chutzpah at gentoo.org
--- Comment #1 from Patrick McLean <chutzpah at gentoo.org> ---
Created attachment 3574
--> https://bugzilla.mindrot.org/attachment.cgi?id=3574&action=edit
Allow ppoll_time64 in seccomp filter
This should fix it, I have no way to test since I am on amd64, which
does not seem to be affected.
--
You are receiving this mail because:
You are watching the assignee of the bug.
bugzilla-daemon at mindrot.org
2022-Feb-25 23:25 UTC
[Bug 3396] openssh-8.9_p1 does not accept connections - invalid syscall=414
https://bugzilla.mindrot.org/show_bug.cgi?id=3396
Colin Watson <cjwatson at debian.org> changed:
What |Removed |Added
----------------------------------------------------------------------------
CC| |cjwatson at debian.org
--- Comment #2 from Colin Watson <cjwatson at debian.org> ---
This was also reported as https://bugs.debian.org/1006445, with a very
similar patch. https://bugs.debian.org/1006463 reports that (as I
expected) armhf is also affected; I think it'll be on most or all
32-bit Linux architectures.
--
You are receiving this mail because:
You are watching the assignee of the bug.
bugzilla-daemon at mindrot.org
2022-Feb-26 03:48 UTC
[Bug 3396] openssh-8.9_p1 does not accept connections - invalid syscall=414
https://bugzilla.mindrot.org/show_bug.cgi?id=3396
Darren Tucker <dtucker at dtucker.net> changed:
What |Removed |Added
----------------------------------------------------------------------------
Blocks| |3395
Resolution|--- |FIXED
Status|NEW |RESOLVED
CC| |dtucker at dtucker.net
--- Comment #3 from Darren Tucker <dtucker at dtucker.net> ---
Thanks for the report. I have committed the patch and cherry picked it
into the V_8_9 branch, so it will be in the next release.
(In reply to Colin Watson from comment #2)> I think it'll be on most or all 32-bit Linux architectures.
Sigh. I actually have a 32bit ARM SBC running Debian in the test
systems in an attempt to catch this kind of thing, but it didn't. (I
suspect it's too old). Anyway I've added a Debian i386 VM to the test
set.
Referenced Bugs:
https://bugzilla.mindrot.org/show_bug.cgi?id=3395
[Bug 3395] Tracking bug for openssh-9.0
--
You are receiving this mail because:
You are watching the assignee of the bug.
You are watching someone on the CC list of the bug.
bugzilla-daemon at mindrot.org
2022-Feb-26 10:39 UTC
[Bug 3396] openssh-8.9_p1 does not accept connections - invalid syscall=414
https://bugzilla.mindrot.org/show_bug.cgi?id=3396 --- Comment #4 from Sylvia <fierevere at ya.ru> --- Patrick's patch suggested above works for me. Also see https://bugs.gentoo.org/834019#c11 -- You are receiving this mail because: You are watching someone on the CC list of the bug. You are watching the assignee of the bug.
bugzilla-daemon at mindrot.org
2022-Apr-08 02:12 UTC
[Bug 3396] openssh-8.9_p1 does not accept connections - invalid syscall=414
https://bugzilla.mindrot.org/show_bug.cgi?id=3396
Damien Miller <djm at mindrot.org> changed:
What |Removed |Added
----------------------------------------------------------------------------
Status|RESOLVED |CLOSED
--- Comment #5 from Damien Miller <djm at mindrot.org> ---
closing bug resolved during openssh-9.0 release cycle
--
You are receiving this mail because:
You are watching the assignee of the bug.
You are watching someone on the CC list of the bug.