ports/72122: sudo 1.6.8p1 with pam-krb5 authentication causes segmentation fault
TANABE Hiroyasu
h at cosat.com
Mon Sep 27 04:50:31 UTC 2004
>Number: 72122
>Category: ports
>Synopsis: sudo 1.6.8p1 with pam-krb5 authentication causes segmentation fault
>Confidential: no
>Severity: serious
>Priority: high
>Responsible: freebsd-ports-bugs
>State: open
>Quarter:
>Keywords:
>Date-Required:
>Class: sw-bug
>Submitter-Id: current-users
>Arrival-Date: Mon Sep 27 04:50:30 GMT 2004
>Closed-Date:
>Last-Modified:
>Originator: TANABE Hiroyasu
>Release: FreeBSD 4.10-RELEASE-p3 i386
>Organization:
>Environment:
System: FreeBSD mail.dmz.cosat.com 4.10-RELEASE-p3 FreeBSD 4.10-RELEASE-p3 #29: Tue Sep 21 09:43:10 JST 2004 root at mail.dmz.cosat.com:/usr/obj/usr/src/sys/COSATMAIL i386
The machine is configuered with authorizing through pam and kerberos5
>Description:
First time, sudo with correct password causes segmentation fault.
But Continuing, when I runs sudo, it operates normally without password prompt.
It didn't occur before sudo 1.6.8. (eg. 1.6.7p3)
>How-To-Repeat:
# sysctl kern.sugid_coredump=1
% sudo -k
% sudo echo
Password for h at COSAT.COM:
Segmentation fault (core dumped)
% gdb sudo sudo.core
(gdb) info stack
#0 0x682f656d in ?? ()
#1 0x2815bf23 in pam_sm_setcred () from /usr/lib/pam_krb5.so
#2 0x2809723e in pam_getenvlist () from /usr/lib/libpam.so.1
#3 0x280974e1 in _pam_dispatch () from /usr/lib/libpam.so.1
#4 0x28096524 in pam_setcred () from /usr/lib/libpam.so.1
#5 0x805234a in pam_prep_user (pw=0x8068080) at ./auth/pam.c:192
#6 0x804e6e6 in runas_setup () at set_perms.c:433
#7 0x804e5b1 in set_perms_suid (perm=6) at set_perms.c:194
#8 0x804eec2 in main (argc=2, argv=0xbfbffb50, envp=0xbfbffb5c) at sudo.c:413
>Fix:
>Release-Note:
>Audit-Trail:
>Unformatted:
More information about the freebsd-ports-bugs
mailing list