We're seeing freeradius segfaults on 14 of our servers. I was able to reproduce the issue with a VM by flooding the server with requests from JRadius; when I did a backtrace with gdb, I got the following output:
iserv:~# gdb freeradius GNU gdb 6.8-debian Copyright (C) 2008 Free Software Foundation, Inc. License GPLv3+: GNU GPL version 3 or later <http://gnu.org/licenses/gpl.html> This is free software: you are free to change and redistribute it. There is NO WARRANTY, to the extent permitted by law. Type "show copying" and "show warranty" for details. This GDB was configured as "i486-linux-gnu"... (gdb) set args -f (gdb) run Starting program: /usr/sbin/freeradius -f [Thread debugging using libthread_db enabled] [New Thread 0xb74056b0 (LWP 15647)] [New Thread 0xb73b2b90 (LWP 15650)] [New Thread 0xb6bb1b90 (LWP 15651)] [New Thread 0xb63b0b90 (LWP 15652)] [New Thread 0xb5bafb90 (LWP 15653)] [New Thread 0xb53aeb90 (LWP 15654)] [New Thread 0xb4badb90 (LWP 15667)] [New Thread 0xb43acb90 (LWP 15668)] [New Thread 0xb3babb90 (LWP 15669)] [New Thread 0xb31ffb90 (LWP 15670)] [New Thread 0xb29feb90 (LWP 15671)] [New Thread 0xb21fdb90 (LWP 15672)] Program received signal SIGSEGV, Segmentation fault. [Switching to Thread 0xb43acb90 (LWP 15668)] 0xb748b942 in _IO_un_link () from /lib/i686/cmov/libc.so.6 (gdb) bt #0 0xb748b942 in _IO_un_link () from /lib/i686/cmov/libc.so.6 #1 0xb747e3c0 in fclose () from /lib/i686/cmov/libc.so.6 #2 0xb73bae26 in get_next (name=0xb43a9b7c "martin", ht=0x8faa940) at rlm_passwd.c:288 #3 0xb73bb08b in passwd_map (instance=0x8faa730, request=0x907e7b0) at rlm_passwd.c:541 #4 0x0806427c in modcall (component=1, c=0x8fa8d10, request=0x907e7b0) at modcall.c:297 #5 0x08060bdb in indexed_modcall (comp=1, idx=0, request=0x907e7b0) at modules.c:728 #6 0x0806102c in module_authorize (autz_type=0, request=0x907e7b0) at modules.c:1494 #7 0x0804f28f in rad_authenticate (request=0x907e7b0) at auth.c:567 #8 0xb73c6789 in eappeap_process (handler=0x90b3270, tls_session=0x8fea5b8) at peap.c:973 #9 0xb73c50e7 in eappeap_authenticate (arg=0x8fa8ac0, handler=0x90b3270) at rlm_eap_peap.c:260 #10 0xb73dae69 in eaptype_call (atype=0x8fa7a00, handler=0x90b3270) at eap.c:174 #11 0xb73db91d in eaptype_select (inst=0x8f9acc8, handler=0x90b3270) at eap.c:409 #12 0xb73d9e19 in eap_authenticate (instance=0x8f9acc8, request=0xb32c1410) at rlm_eap.c:319 #13 0x0806427c in modcall (component=0, c=0x8fac2c0, request=0xb32c1410) at modcall.c:297 #14 0x08060bdb in indexed_modcall (comp=0, idx=6, request=0xb32c1410) at modules.c:728 #15 0x08060fec in module_authenticate (auth_type=6, request=0xb32c1410) at modules.c:1502 #16 0x0804f964 in rad_authenticate (request=0xb32c1410) at auth.c:373 #17 0x080701d4 in radius_handle_request (request=0xb32c1410, fun=0x804efb0 <rad_authenticate>) at event.c:3774 #18 0x08067868 in request_handler_thread (arg=0x8ffbe70) at threads.c:525 #19 0xb77584c0 in start_thread () from /lib/i686/cmov/libpthread.so.0 #20 0xb750084e in clone () from /lib/i686/cmov/libc.so.6 (gdb) I believe that matches this bug, therefore I reopened it. -- System Information: Debian Release: 5.0.9 APT prefers oldstable APT policy: (500, 'oldstable') Architecture: i386 (i686) Kernel: Linux 2.6.26-2-686-bigmem (SMP w/1 CPU core) Locale: LANG=de_DE.UTF-8, LC_CTYPE=en_US.utf8 (charmap=UTF-8) Shell: /bin/sh linked to /bin/bash Versions of packages freeradius depends on: ii adduser 3.110 add and remove users and groups ii ca-certificates 20080809 Common CA certificates ii freeradius-common 2.1.10+dfsg-2~bpo50+1 FreeRADIUS common files ii libc6 2.7-18lenny7 GNU C Library: Shared libraries ii libfreeradius2 2.1.10+dfsg-2~bpo50+1 FreeRADIUS shared library ii libgdbm3 1.8.3-3 GNU dbm database routines (runtime ii libltdl7 2.2.6b-2~bpo50+1 A system independent dlopen wrappe ii libpam0g 1.0.1-5+lenny1 Pluggable Authentication Modules l ii libperl5.10 5.10.0-19lenny5 Shared Perl library ii libssl0.9.8 0.9.8g-15+lenny14 SSL shared libraries ii lsb-base 3.2-20 Linux Standard Base 3.2 init scrip ii python2.5 2.5.2-15+lenny1 An interactive high-level object-o ii ssl-cert 1.0.23 simple debconf wrapper for OpenSSL Versions of packages freeradius recommends: ii freeradius-utils 2.1.10+dfsg-2~bpo50+1 FreeRADIUS client utilities Versions of packages freeradius suggests: pn freeradius-krb5 <none> (no description -- To UNSUBSCRIBE, email to [email protected] with a subject of "unsubscribe". Trouble? Contact [email protected]

