ports/72122: sudo 1.6.8p1 with pam-krb5 authentication causes segmentation fault

TANABE Hiroyasu h at cosat.com
Mon Sep 27 04:50:31 UTC 2004


>Number:         72122
>Category:       ports
>Synopsis:       sudo 1.6.8p1 with pam-krb5 authentication causes segmentation fault
>Confidential:   no
>Severity:       serious
>Priority:       high
>Responsible:    freebsd-ports-bugs
>State:          open
>Quarter:        
>Keywords:       
>Date-Required:
>Class:          sw-bug
>Submitter-Id:   current-users
>Arrival-Date:   Mon Sep 27 04:50:30 GMT 2004
>Closed-Date:
>Last-Modified:
>Originator:     TANABE Hiroyasu
>Release:        FreeBSD 4.10-RELEASE-p3 i386
>Organization:
>Environment:
System: FreeBSD mail.dmz.cosat.com 4.10-RELEASE-p3 FreeBSD 4.10-RELEASE-p3 #29: Tue Sep 21 09:43:10 JST 2004 root at mail.dmz.cosat.com:/usr/obj/usr/src/sys/COSATMAIL i386


	The machine is configuered with authorizing through pam and kerberos5
>Description:
	First time, sudo with correct password causes segmentation fault.
	But Continuing, when I runs sudo, it operates normally without password prompt.

	It didn't occur before sudo 1.6.8. (eg. 1.6.7p3)
>How-To-Repeat:
	# sysctl kern.sugid_coredump=1

	% sudo -k
	% sudo echo
	Password for h at COSAT.COM: 
	Segmentation fault (core dumped)

	% gdb sudo sudo.core
	(gdb) info stack
	#0  0x682f656d in ?? ()
	#1  0x2815bf23 in pam_sm_setcred () from /usr/lib/pam_krb5.so
	#2  0x2809723e in pam_getenvlist () from /usr/lib/libpam.so.1
	#3  0x280974e1 in _pam_dispatch () from /usr/lib/libpam.so.1
	#4  0x28096524 in pam_setcred () from /usr/lib/libpam.so.1
	#5  0x805234a in pam_prep_user (pw=0x8068080) at ./auth/pam.c:192
	#6  0x804e6e6 in runas_setup () at set_perms.c:433
	#7  0x804e5b1 in set_perms_suid (perm=6) at set_perms.c:194
	#8  0x804eec2 in main (argc=2, argv=0xbfbffb50, envp=0xbfbffb5c) at sudo.c:413

>Fix:

>Release-Note:
>Audit-Trail:
>Unformatted:



More information about the freebsd-ports-bugs mailing list