Package: libpam-umask
Version: 0.02
Severity: grave
Justification: renders package unusable

The latest libpam-umask (0.02) encounters a SIGSEGV (Segmentation fault)
that prevents all uses from logging in through any path that references
pam_umask.so in the PAM configuration.

This even effects "optional" entries in PAM configurations since
pam_umask.so seg-faults.

I had the following line in /etc/pam.d/common-session
        session    optional    pam_umask.so umask=0077

Commenting out this line allows users to log in again.


Below are ltrace and gdb output for the getty process when pam_umask
is enabled on the system.

Running getty through ltrace, and then attempting to log in produced
# ltrace /sbin/getty 38400 tty8
...
pam_start(0x804f1c9, 0xbfe1a2d0, 0x804f088, 0x8051618, 0)    = 0
pam_set_item(0x9242228, 4, 0x804ff87, 0x8051618, 0)          = 0
pam_set_item(0x9242228, 3, 0xbfe182d0, 0x8051618, 0)         = 0
pam_fail_delay(0x9242228, 0x2dc6c0, 0xbfe182d0, 0x8051618, 0) = 0
gethostname("server", 256)                                   = 0
snprintf("server login: ", 256, "%s login: ", "server")      = 14
pam_set_item(0x9242228, 9, 0xbfe17e50, 0xbfe17f50, 0)        = 0
pam_get_item(0x9242228, 2, 0xbfe17e48, 0xbfe17f50, 0)        = 0
pam_fail_delay(0x9242228, 0x2dc6c0, 0xbfe17e48, 0xbfe17f50, 0) = 0
pam_authenticate(0x9242228, 0, 0xbfe17e48, 0xbfe17f50, 0 <unfinished ...>
misc_conv(1, 0xbfe17d1c, 0xbfe17d28, 0, 0xb7f0a280)          = 0
<... pam_authenticate resumed> )                             = 0
pam_get_item(0x9242228, 2, 0xbfe17e48, 0xbfe17f50, 0)        = 0
getpwnam("michael")                                          = 0x4114c0b8
strcmp("MAIL_CHECK_ENAB", "FAILLOG_ENAB")                    = 1
strcmp("ERASECHAR", "FAILLOG_ENAB")                          = -1
strcmp("HUSHLOGIN_FILE", "FAILLOG_ENAB")                     = 1
strcmp("FTMP_FILE", "FAILLOG_ENAB")                          = 1
strcmp("FAIL_DELAY", "FAILLOG_ENAB")                         = 1
strcmp("FAILLOG_ENAB", "FAILLOG_ENAB")                       = 0
strcasecmp("yes", "yes")                                     = 0
open64("/var/log/faillog", 2, 0145)                          = 7
lseek64(7, 240000, 0, 0, 0x41021158)                         = 240000
read(7, "", 24)                                              = 24
lseek64(7, 240000, 0, 0, 0)                                  = 240000
write(7, "", 24)                                             = 24
close(7)                                                     = 0
alarm(0)                                                     = 58
pam_acct_mgmt(0x9242228, 0, 0, 0xbfe17f50, 0)                = 0
pam_get_item(0x9242228, 2, 0xbfe17e48, 0xbfe17f50, 0)        = 0
setpwent()                                                   = <void>
getpwnam("michael")                                          = 0x4114c0b8
setgid(10000)                                                = 0
initgroups(0x9249e5a, 10000, 0x4114c0b8, 0x4114c0b8, 0x4114c0b8) = 0
pam_setcred(0x9242228, 2, 0xbfe17e48, 0xbfe17f50, 0)         = 0
strcmp("MAIL_CHECK_ENAB", "HUSHLOGIN_FILE")                  = 1
strcmp("ERASECHAR", "HUSHLOGIN_FILE")                        = -1
strcmp("HUSHLOGIN_FILE", "HUSHLOGIN_FILE")                   = 0
snprintf("/home/michael/.hushlogin", 8192, "%s/%s", "/home/michael", 
".hushlogin") = 24
access("/home/michael/.hushlogin", 0)                        = -1
pam_open_session(0x9242228, 0, 0xbfe17e48, 0xbfe17f50, 0 <unfinished ...>
--- SIGSEGV (Segmentation fault) ---
+++ killed by SIGSEGV +++


Running getty through strace produced no interesting information.


Running getty through gdb, I obtained the following backtrace
(long runs of "0x00000000" are replaced with "...")

Program received signal SIGSEGV, Segmentation fault.
0x00126abe in ?? ()
(gdb) bt
#0  0x00126abe in ?? ()
#1  0x4114b8a8 in main_arena () from /lib/tls/i686/cmov/libc.so.6
#2  0x08048f00 in ?? ()
#3  0x00000000 in ?? ()
#4  0x4114c0b8 in buffer_size.0 () from /lib/tls/i686/cmov/libc.so.6
#5  0x00802b60 in ?? ()
#6  0x08143f80 in ?? ()
#7  0x0813f228 in ?? ()
#8  0xbff1d0d8 in ?? ()
#9  0x007fda1c in ?? ()
#10 0x0813f228 in ?? ()
#11 0x00000000 in ?? ()
#12 0x00000001 in ?? ()
#13 0x08143c10 in ?? ()
#14 0xb7f1f19c in ?? ()
#15 0x00000001 in ?? ()
#16 0x00000000 in ?? ()
#17 0x00000000 in ?? ()
#18 0x00000000 in ?? ()
#19 0x00000000 in ?? ()
#20 0x00000006 in ?? ()
#21 0x00000020 in ?? ()
#22 0xffffffe0 in ?? ()
#23 0x08051178 in ?? ()
#24 0x0000003c in ?? ()
#25 0x00802b60 in ?? ()
#26 0x00000000 in ?? ()
#27 0x00000000 in ?? ()
#28 0xbff1d0f8 in ?? ()
#29 0x007ff9fb in ?? ()
#30 0x0813f228 in ?? ()
#31 0x00000000 in ?? ()
#32 0x00000004 in ?? ()
#33 0xffffffe0 in ?? ()
#34 0x0813f228 in ?? ()
#35 0x4114c0b8 in buffer_size.0 () from /lib/tls/i686/cmov/libc.so.6
#36 0xbff1f5f8 in ?? ()
#37 0x0804addb in ?? ()
#38 0x0813f228 in ?? ()
#39 0x00000000 in ?? ()
#40 0xbff1d138 in ?? ()
#41 0xbff1d240 in ?? ()
#42 0x00000000 in ?? ()
#43 0x00000000 in ?? ()
#44 0x00000000 in ?? ()
#45 0x00000000 in ?? ()
#46 0x08146e58 in ?? ()
#47 0x00000001 in ?? ()
#48 0x00000005 in ?? ()
#49 0x00000003 in ?? ()
#50 0x00000000 in ?? ()
#51 0x00000000 in ?? ()
#52 0x0813f2d8 in ?? ()
#53 0x00000000 in ?? ()
#54 0x76726573 in ?? ()
#55 0x6c207265 in ?? ()
#56 0x6e69676f in ?? ()
#57 0x0000203a in ?? ()
#58 0x00000000 in ?? ()
...
#118 0x76726573 in ?? ()
#119 0x00007265 in ?? ()
#120 0x00000000 in ?? ()
...
#182 0x206e6f20 in ?? ()
#183 0x79747460 in ?? ()
#184 0x00002738 in ?? ()
#185 0x00000000 in ?? ()
...

-- System Information:
Debian Release: testing/unstable
  APT prefers unstable
  APT policy: (500, 'unstable'), (500, 'stable')
Architecture: i386 (i686)
Shell:  /bin/sh linked to /bin/bash
Kernel: Linux 2.6.12.3-execshield-k7
Locale: LANG=en_US.UTF-8, LC_CTYPE=en_US.UTF-8 (charmap=UTF-8)

Versions of packages libpam-umask depends on:
ii  libc6                       2.3.2.ds1-22 GNU C Library: Shared libraries an

libpam-umask recommends no packages.

-- no debconf information


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]

Reply via email to