Your message dated Tue, 19 Jul 2005 02:32:58 -0400
with message-id <[EMAIL PROTECTED]>
and subject line Bug#318826: fixed in pam-umask 0.03
has caused the attached Bug report to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what I am
talking about this indicates a serious mail system misconfiguration
somewhere.  Please contact me immediately.)

Debian bug tracking system administrator
(administrator, Debian Bugs database)

--------------------------------------
Received: (at submit) by bugs.debian.org; 17 Jul 2005 23:35:17 +0000
>From [EMAIL PROTECTED] Sun Jul 17 16:35:17 2005
Return-path: <[EMAIL PROTECTED]>
Received: from sccrmhc11.comcast.net [204.127.202.55] 
        by spohr.debian.org with esmtp (Exim 3.36 1 (Debian))
        id 1DuIfF-000397-00; Sun, 17 Jul 2005 16:35:17 -0700
Received: from smtp.misumasu.dyndns.org (misumasu.dyndns.org[68.35.133.22])
          by comcast.net (sccrmhc11) with ESMTP
          id <2005071723344501100qi1one>; Sun, 17 Jul 2005 23:34:45 +0000
Received: by smtp.misumasu.dyndns.org (Postfix, from userid 10000)
        id AD95C1228C8; Sun, 17 Jul 2005 17:34:44 -0600 (MDT)
Content-Type: text/plain; charset="us-ascii"
MIME-Version: 1.0
Content-Transfer-Encoding: 7bit
From: Michael Berg <[EMAIL PROTECTED]>
To: Debian Bug Tracking System <[EMAIL PROTECTED]>
Subject: libpam-umask encounters a Segmentation fault - preventing login
X-Mailer: reportbug 3.15
Date: Sun, 17 Jul 2005 17:34:44 -0600
Message-Id: <[EMAIL PROTECTED]>
Delivered-To: [EMAIL PROTECTED]
X-Spam-Checker-Version: SpamAssassin 2.60-bugs.debian.org_2005_01_02 
        (1.212-2003-09-23-exp) on spohr.debian.org
X-Spam-Level: 
X-Spam-Status: No, hits=-8.0 required=4.0 tests=BAYES_00,HAS_PACKAGE 
        autolearn=no version=2.60-bugs.debian.org_2005_01_02

Package: libpam-umask
Version: 0.02
Severity: grave
Justification: renders package unusable

The latest libpam-umask (0.02) encounters a SIGSEGV (Segmentation fault)
that prevents all uses from logging in through any path that references
pam_umask.so in the PAM configuration.

This even effects "optional" entries in PAM configurations since
pam_umask.so seg-faults.

I had the following line in /etc/pam.d/common-session
        session    optional    pam_umask.so umask=0077

Commenting out this line allows users to log in again.


Below are ltrace and gdb output for the getty process when pam_umask
is enabled on the system.

Running getty through ltrace, and then attempting to log in produced
# ltrace /sbin/getty 38400 tty8
...
pam_start(0x804f1c9, 0xbfe1a2d0, 0x804f088, 0x8051618, 0)    = 0
pam_set_item(0x9242228, 4, 0x804ff87, 0x8051618, 0)          = 0
pam_set_item(0x9242228, 3, 0xbfe182d0, 0x8051618, 0)         = 0
pam_fail_delay(0x9242228, 0x2dc6c0, 0xbfe182d0, 0x8051618, 0) = 0
gethostname("server", 256)                                   = 0
snprintf("server login: ", 256, "%s login: ", "server")      = 14
pam_set_item(0x9242228, 9, 0xbfe17e50, 0xbfe17f50, 0)        = 0
pam_get_item(0x9242228, 2, 0xbfe17e48, 0xbfe17f50, 0)        = 0
pam_fail_delay(0x9242228, 0x2dc6c0, 0xbfe17e48, 0xbfe17f50, 0) = 0
pam_authenticate(0x9242228, 0, 0xbfe17e48, 0xbfe17f50, 0 <unfinished ...>
misc_conv(1, 0xbfe17d1c, 0xbfe17d28, 0, 0xb7f0a280)          = 0
<... pam_authenticate resumed> )                             = 0
pam_get_item(0x9242228, 2, 0xbfe17e48, 0xbfe17f50, 0)        = 0
getpwnam("michael")                                          = 0x4114c0b8
strcmp("MAIL_CHECK_ENAB", "FAILLOG_ENAB")                    = 1
strcmp("ERASECHAR", "FAILLOG_ENAB")                          = -1
strcmp("HUSHLOGIN_FILE", "FAILLOG_ENAB")                     = 1
strcmp("FTMP_FILE", "FAILLOG_ENAB")                          = 1
strcmp("FAIL_DELAY", "FAILLOG_ENAB")                         = 1
strcmp("FAILLOG_ENAB", "FAILLOG_ENAB")                       = 0
strcasecmp("yes", "yes")                                     = 0
open64("/var/log/faillog", 2, 0145)                          = 7
lseek64(7, 240000, 0, 0, 0x41021158)                         = 240000
read(7, "", 24)                                              = 24
lseek64(7, 240000, 0, 0, 0)                                  = 240000
write(7, "", 24)                                             = 24
close(7)                                                     = 0
alarm(0)                                                     = 58
pam_acct_mgmt(0x9242228, 0, 0, 0xbfe17f50, 0)                = 0
pam_get_item(0x9242228, 2, 0xbfe17e48, 0xbfe17f50, 0)        = 0
setpwent()                                                   = <void>
getpwnam("michael")                                          = 0x4114c0b8
setgid(10000)                                                = 0
initgroups(0x9249e5a, 10000, 0x4114c0b8, 0x4114c0b8, 0x4114c0b8) = 0
pam_setcred(0x9242228, 2, 0xbfe17e48, 0xbfe17f50, 0)         = 0
strcmp("MAIL_CHECK_ENAB", "HUSHLOGIN_FILE")                  = 1
strcmp("ERASECHAR", "HUSHLOGIN_FILE")                        = -1
strcmp("HUSHLOGIN_FILE", "HUSHLOGIN_FILE")                   = 0
snprintf("/home/michael/.hushlogin", 8192, "%s/%s", "/home/michael", 
".hushlogin") = 24
access("/home/michael/.hushlogin", 0)                        = -1
pam_open_session(0x9242228, 0, 0xbfe17e48, 0xbfe17f50, 0 <unfinished ...>
--- SIGSEGV (Segmentation fault) ---
+++ killed by SIGSEGV +++


Running getty through strace produced no interesting information.


Running getty through gdb, I obtained the following backtrace
(long runs of "0x00000000" are replaced with "...")

Program received signal SIGSEGV, Segmentation fault.
0x00126abe in ?? ()
(gdb) bt
#0  0x00126abe in ?? ()
#1  0x4114b8a8 in main_arena () from /lib/tls/i686/cmov/libc.so.6
#2  0x08048f00 in ?? ()
#3  0x00000000 in ?? ()
#4  0x4114c0b8 in buffer_size.0 () from /lib/tls/i686/cmov/libc.so.6
#5  0x00802b60 in ?? ()
#6  0x08143f80 in ?? ()
#7  0x0813f228 in ?? ()
#8  0xbff1d0d8 in ?? ()
#9  0x007fda1c in ?? ()
#10 0x0813f228 in ?? ()
#11 0x00000000 in ?? ()
#12 0x00000001 in ?? ()
#13 0x08143c10 in ?? ()
#14 0xb7f1f19c in ?? ()
#15 0x00000001 in ?? ()
#16 0x00000000 in ?? ()
#17 0x00000000 in ?? ()
#18 0x00000000 in ?? ()
#19 0x00000000 in ?? ()
#20 0x00000006 in ?? ()
#21 0x00000020 in ?? ()
#22 0xffffffe0 in ?? ()
#23 0x08051178 in ?? ()
#24 0x0000003c in ?? ()
#25 0x00802b60 in ?? ()
#26 0x00000000 in ?? ()
#27 0x00000000 in ?? ()
#28 0xbff1d0f8 in ?? ()
#29 0x007ff9fb in ?? ()
#30 0x0813f228 in ?? ()
#31 0x00000000 in ?? ()
#32 0x00000004 in ?? ()
#33 0xffffffe0 in ?? ()
#34 0x0813f228 in ?? ()
#35 0x4114c0b8 in buffer_size.0 () from /lib/tls/i686/cmov/libc.so.6
#36 0xbff1f5f8 in ?? ()
#37 0x0804addb in ?? ()
#38 0x0813f228 in ?? ()
#39 0x00000000 in ?? ()
#40 0xbff1d138 in ?? ()
#41 0xbff1d240 in ?? ()
#42 0x00000000 in ?? ()
#43 0x00000000 in ?? ()
#44 0x00000000 in ?? ()
#45 0x00000000 in ?? ()
#46 0x08146e58 in ?? ()
#47 0x00000001 in ?? ()
#48 0x00000005 in ?? ()
#49 0x00000003 in ?? ()
#50 0x00000000 in ?? ()
#51 0x00000000 in ?? ()
#52 0x0813f2d8 in ?? ()
#53 0x00000000 in ?? ()
#54 0x76726573 in ?? ()
#55 0x6c207265 in ?? ()
#56 0x6e69676f in ?? ()
#57 0x0000203a in ?? ()
#58 0x00000000 in ?? ()
...
#118 0x76726573 in ?? ()
#119 0x00007265 in ?? ()
#120 0x00000000 in ?? ()
...
#182 0x206e6f20 in ?? ()
#183 0x79747460 in ?? ()
#184 0x00002738 in ?? ()
#185 0x00000000 in ?? ()
...

-- System Information:
Debian Release: testing/unstable
  APT prefers unstable
  APT policy: (500, 'unstable'), (500, 'stable')
Architecture: i386 (i686)
Shell:  /bin/sh linked to /bin/bash
Kernel: Linux 2.6.12.3-execshield-k7
Locale: LANG=en_US.UTF-8, LC_CTYPE=en_US.UTF-8 (charmap=UTF-8)

Versions of packages libpam-umask depends on:
ii  libc6                       2.3.2.ds1-22 GNU C Library: Shared libraries an

libpam-umask recommends no packages.

-- no debconf information

---------------------------------------
Received: (at 318826-close) by bugs.debian.org; 19 Jul 2005 06:38:22 +0000
>From [EMAIL PROTECTED] Mon Jul 18 23:38:21 2005
Return-path: <[EMAIL PROTECTED]>
Received: from newraff.debian.org [208.185.25.31] (mail)
        by spohr.debian.org with esmtp (Exim 3.36 1 (Debian))
        id 1Dulk7-0004hV-00; Mon, 18 Jul 2005 23:38:15 -0700
Received: from katie by newraff.debian.org with local (Exim 3.35 1 (Debian))
        id 1Dulf0-0002rn-00; Tue, 19 Jul 2005 02:32:58 -0400
From: Tollef Fog Heen <[EMAIL PROTECTED]>
To: [EMAIL PROTECTED]
X-Katie: $Revision: 1.56 $
Subject: Bug#318826: fixed in pam-umask 0.03
Message-Id: <[EMAIL PROTECTED]>
Sender: Archive Administrator <[EMAIL PROTECTED]>
Date: Tue, 19 Jul 2005 02:32:58 -0400
Delivered-To: [EMAIL PROTECTED]
X-Spam-Checker-Version: SpamAssassin 2.60-bugs.debian.org_2005_01_02 
        (1.212-2003-09-23-exp) on spohr.debian.org
X-Spam-Level: 
X-Spam-Status: No, hits=-6.0 required=4.0 tests=BAYES_00,HAS_BUG_NUMBER 
        autolearn=no version=2.60-bugs.debian.org_2005_01_02

Source: pam-umask
Source-Version: 0.03

We believe that the bug you reported is fixed in the latest version of
pam-umask, which is due to be installed in the Debian FTP archive:

libpam-umask_0.03_i386.deb
  to pool/main/p/pam-umask/libpam-umask_0.03_i386.deb
pam-umask_0.03.dsc
  to pool/main/p/pam-umask/pam-umask_0.03.dsc
pam-umask_0.03.tar.gz
  to pool/main/p/pam-umask/pam-umask_0.03.tar.gz



A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to [EMAIL PROTECTED],
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Tollef Fog Heen <[EMAIL PROTECTED]> (supplier of updated pam-umask package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing [EMAIL PROTECTED])


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Format: 1.7
Date: Tue, 19 Jul 2005 08:12:35 +0200
Source: pam-umask
Binary: libpam-umask
Architecture: source i386
Version: 0.03
Distribution: unstable
Urgency: low
Maintainer: Tollef Fog Heen <[EMAIL PROTECTED]>
Changed-By: Tollef Fog Heen <[EMAIL PROTECTED]>
Description: 
 libpam-umask - adjust users' default umask using PAM
Closes: 318826
Changes: 
 pam-umask (0.03) unstable; urgency=low
 .
   * Fix segfault if no pam_umask file exists (Closes: #318826)
   * Fix off-by-one error in memory allocation
   * Don't log debug stuff usually
Files: 
 98dde6317e76fb62383eabbdf66c8a4f 511 admin optional pam-umask_0.03.dsc
 6c0e29ac0c88250d7c94314d708095b7 85865 admin optional pam-umask_0.03.tar.gz
 99542a57f64cb6902aa58cd236f8b877 4912 admin optional libpam-umask_0.03_i386.deb

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.1 (GNU/Linux)

iD8DBQFC3Jr4QSseMYF6mWoRAoZHAKCFv1hfVT1etcCX/aB3jytNsRgZfQCfZ/Iw
hdeRHkcUEMFuaUt9HZ2VPvo=
=nC1a
-----END PGP SIGNATURE-----


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]

Reply via email to