[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

Bug#641945: marked as done (cups segfault authentication web interface)



Your message dated Fri, 4 Mar 2016 23:58:51 +0000
with message-id <[🔎] 04032016235455.6658e4eb7310@desktop.copernicus.demon.co.uk>
and subject line Re: Bug#641945: cups segfault authentication web interface
has caused the Debian Bug report #641945,
regarding cups segfault authentication web interface
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact owner@bugs.debian.org
immediately.)


-- 
641945: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=641945
Debian Bug Tracking System
Contact owner@bugs.debian.org with problems
--- Begin Message ---
Package: cups
Version: 1.4.4-7

If I try to carry out an action in the web interface that requires
authentication, e.g. pause the printer, cupsd daemon crashes:

read(26, "#\n# /etc/pam.d/common-session - "..., 4096) = 1222
read(26, "", 4096)                      = 0
close(26)                               = 0
munmap(0xb6f6b000, 4096)                = 0
read(19, "", 4096)                      = 0
close(19)                               = 0
munmap(0xb76ea000, 4096)                = 0
time(NULL)                              = 1316308526
getuid32()                              = 0
stat64("/etc/securetty", {st_mode=S_IFREG|0644, st_size=3828, ...}) = 0
open("/etc/securetty", O_RDONLY|O_LARGEFILE) = 19
fstat64(19, {st_mode=S_IFREG|0644, st_size=3828, ...}) = 0
mmap2(NULL, 4096, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_ANONYMOUS, -1,
0) = 0xb76ea000
read(19, "# /etc/securetty: list of termin"..., 4096) = 3828
read(19, "", 4096)                      = 0
close(19)                               = 0
munmap(0xb76ea000, 4096)                = 0
open("/etc/shadow", O_RDONLY|O_CLOEXEC) = 19
fstat64(19, {st_mode=S_IFREG|0640, st_size=773, ...}) = 0
mmap2(NULL, 4096, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_ANONYMOUS, -1,
0) = 0xb76ea000
read(19, "root:$6$LbfNrZ2k$44emahujzdjRq00"..., 4096) = 773
read(19, "", 4096)                      = 0
close(19)                               = 0
munmap(0xb76ea000, 4096)                = 0
geteuid32()                             = 0
open("/proc/filesystems", O_RDONLY|O_LARGEFILE) = 19
fstat64(19, {st_mode=S_IFREG|0444, st_size=0, ...}) = 0
mmap2(NULL, 4096, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_ANONYMOUS, -1,
0) = 0xb76ea000
read(19, "\text3\nnodev\tsysfs\nnodev\tproc\nnod"..., 1024) = 54
read(19, "", 1024)                      = 0
close(19)                               = 0
munmap(0xb76ea000, 4096)                = 0
open("/etc/pam_ldap.conf", O_RDONLY)    = 19
fstat64(19, {st_mode=S_IFREG|0644, st_size=8903, ...}) = 0
mmap2(NULL, 4096, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_ANONYMOUS, -1,
0) = 0xb76ea000
read(19, "###DEBCONF###\n# the configuratio"..., 4096) = 4096
read(19, "eating Unicode password and upda"..., 4096) = 4096
read(19, "At least one of these are requir"..., 4096) = 711
read(19, "", 4096)                      = 0
close(19)                               = 0
munmap(0xb76ea000, 4096)                = 0
gettimeofday({1316308526, 588329}, NULL) = 0
gettimeofday({1316308526, 588385}, NULL) = 0
--- SIGSEGV (Segmentation fault) @ 0 (0) ---
Process 16691 detached

I suspect this might have something to do with PAM LDAP. It works fine if I:

* authenticate as root instead of an LDAP user.

However still fails if I:

* disable TLS for LDAP NSS module.
* disable TLS for LDAP PAM module.
* Configure cups to use http instead of https.

So doesn't appear to be a TLS library issue.
-- 
Brian May <brian@microcomaustralia.com.au>



--- End Message ---
--- Begin Message ---
On Sun 18 Sep 2011 at 11:42:28 +1000, Brian May wrote:

Dear Debian User,
                                                                                                     
This bug report was submitted against a version of CUPS that is no longer
supported in Debian. Use of our limited, volunteer supported resources is best
served by not keeping around old, hardware-specific and inactive bugs for
longer than desirable, so the report is now being closed. Sorry for being
unable not to address the issue before now.

You may, of course, wish to review the reported problem. It would be
appreciated if any future investigation could be conducted using the testing or
unstable distributions, preferably the latter. If considered necessary, a new
bug report, possibly referencing this one, would be submitted. 

Thank you for your report.                                                        
                                                                                                                      
Regards,                                                                                                              
                                                                                                                      
Brian.

--- End Message ---

Reply to: