[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

Bug#544687: marked as done (libpam-unix2: forks numerous instances of unix2_chkpwd)



Your message dated Sun, 10 Jun 2012 21:44:16 +0000
with message-id <E1Sdpvk-0002kP-TZ@franck.debian.org>
and subject line Bug#544687: fixed in libpam-unix2 1:2.4.1-6
has caused the Debian Bug report #544687,
regarding libpam-unix2: forks numerous instances of unix2_chkpwd
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact owner@bugs.debian.org
immediately.)


-- 
544687: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=544687
Debian Bug Tracking System
Contact owner@bugs.debian.org with problems
--- Begin Message ---
Package: libpam-unix2
Version: 1:2.4.1-4
Severity: important

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

If an application with a UID greater than 0 tries to authenticate a user
using pam_unix2.so (e.g. gnome-screensaver or su) it starts to forks
numerous instances of the helper binary unix2_chkpwd:

  PID TTY      STAT   TIME COMMAND
   7690 pts/2    Ss     0:00 -bash
   12696 pts/2    SL+    0:00  \_ su - FidlerAnke
   12700 pts/2    SL+    0:00      \_ /sbin/unix2_chkpwd su FidlerAnke
   12730 pts/2    SL+    0:00          \_ /sbin/unix2_chkpwd su
   FidlerAnke
   12744 pts/2    SL+    0:00              \_ /sbin/unix2_chkpwd su
   FidlerAnke
   12766 pts/2    SL+    0:00                  \_ /sbin/unix2_chkpwd su
   FidlerAnke
   12810 pts/2    SL+    0:00                      \_ /sbin/unix2_chkpwd
   su FidlerAnke
   12813 pts/2    SL+    0:00                          \_
   /sbin/unix2_chkpwd su FidlerAnke
   12827 pts/2    SL+    0:00                              \_
   /sbin/unix2_chkpwd su FidlerAnke
   12834 pts/2    SL+    0:00                                  \_
   /sbin/unix2_chkpwd su FidlerAnke
   12860 pts/2    SL+    0:00                                      \_
   /sbin/unix2_chkpwd su FidlerAnke

Logging information after adding "debug" flag to pam_unix2.so:
su[13468]: pam_unix2(su:auth): pam_sm_authenticate() called
su[13468]: pam_unix2(su:auth): username=[FidlerAnke]
su[13468]: pam_unix2(su:auth): running helper binary
su[13468]: pam_unix2(su:auth): _unix2_run_helper_binary called.
unix2_chkpwd: pam_unix2(su:auth): pam_sm_authenticate() called
unix2_chkpwd: pam_unix2(su:auth): username=[FidlerAnke]
unix2_chkpwd: pam_unix2(su:auth): running helper binary
unix2_chkpwd: pam_unix2(su:auth): _unix2_run_helper_binary called.
unix2_chkpwd: pam_unix2(su:auth): pam_sm_authenticate() called
unix2_chkpwd: pam_unix2(su:auth): username=[FidlerAnke]
unix2_chkpwd: pam_unix2(su:auth): running helper binary
unix2_chkpwd: pam_unix2(su:auth): _unix2_run_helper_binary called.
unix2_chkpwd: pam_unix2(su:auth): pam_sm_authenticate() called
unix2_chkpwd: pam_unix2(su:auth): username=[FidlerAnke]
unix2_chkpwd: pam_unix2(su:auth): running helper binary
unix2_chkpwd: pam_unix2(su:auth): _unix2_run_helper_binary called.
unix2_chkpwd: pam_unix2(su:auth): pam_sm_authenticate() called
unix2_chkpwd: pam_unix2(su:auth): username=[FidlerAnke]
unix2_chkpwd: pam_unix2(su:auth): running helper binary
unix2_chkpwd: pam_unix2(su:auth): _unix2_run_helper_binary called.
unix2_chkpwd: pam_unix2(su:auth): pam_sm_authenticate() called
unix2_chkpwd: pam_unix2(su:auth): username=[FidlerAnke]
unix2_chkpwd: pam_unix2(su:auth): running helper binary
unix2_chkpwd: pam_unix2(su:auth): _unix2_run_helper_binary called.
unix2_chkpwd: pam_unix2(su:auth): pam_sm_authenticate() called
unix2_chkpwd: pam_unix2(su:auth): username=[FidlerAnke]
unix2_chkpwd: pam_unix2(su:auth): running helper binary
unix2_chkpwd: pam_unix2(su:auth): _unix2_run_helper_binary called.
unix2_chkpwd: pam_unix2(su:auth): pam_sm_authenticate() called
unix2_chkpwd: pam_unix2(su:auth): username=[FidlerAnke]
unix2_chkpwd: pam_unix2(su:auth): running helper binary
unix2_chkpwd: pam_unix2(su:auth): _unix2_run_helper_binary called.

... and so on.

- -- System Information:
Debian Release: squeeze/sid
  APT prefers unstable
  APT policy: (500, 'unstable'), (1, 'experimental')
Architecture: amd64 (x86_64)

Kernel: Linux 2.6.30-1-amd64 (SMP w/2 CPU cores)
Locale: LANG=de_AT.UTF-8, LC_CTYPE=de_AT.UTF-8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/bash

Versions of packages libpam-unix2 depends on:
ii  libc6                         2.9-26     GNU C Library: Shared libraries
ii  libpam0g                      1.1.0-2    Pluggable Authentication Modules l
ii  libxcrypt1                    1:2.4-1    Crypt library for DES, MD5, and bl

libpam-unix2 recommends no packages.

libpam-unix2 suggests no packages.

- -- no debconf information

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.9 (GNU/Linux)

iEYEARECAAYFAkqeWR0ACgkQeJ3z1zFMUGZN6gCeJJ0t2JVi8mSsuuROkDygDe61
loUAnAxEOyQbIxNnFGtFP1kEFs90Q7vq
=ugF/
-----END PGP SIGNATURE-----



--- End Message ---
--- Begin Message ---
Source: libpam-unix2
Source-Version: 1:2.4.1-6

We believe that the bug you reported is fixed in the latest version of
libpam-unix2, which is due to be installed in the Debian FTP archive:

libpam-unix2_2.4.1-6.debian.tar.gz
  to main/libp/libpam-unix2/libpam-unix2_2.4.1-6.debian.tar.gz
libpam-unix2_2.4.1-6.dsc
  to main/libp/libpam-unix2/libpam-unix2_2.4.1-6.dsc
libpam-unix2_2.4.1-6_i386.deb
  to main/libp/libpam-unix2/libpam-unix2_2.4.1-6_i386.deb



A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 544687@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Jakub Wilk <jwilk@debian.org> (supplier of updated libpam-unix2 package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmaster@debian.org)


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

Format: 1.8
Date: Sun, 10 Jun 2012 22:01:22 +0200
Source: libpam-unix2
Binary: libpam-unix2
Architecture: source i386
Version: 1:2.4.1-6
Distribution: unstable
Urgency: low
Maintainer: Debian QA Group <packages@qa.debian.org>
Changed-By: Jakub Wilk <jwilk@debian.org>
Description: 
 libpam-unix2 - Blowfish-capable PAM module
Closes: 544687
Changes: 
 libpam-unix2 (1:2.4.1-6) unstable; urgency=low
 .
   * QA upload.
   * Bump standards version to 3.9.3.
   * Avoid recursively forking unix2_chkpwd (closes: #544687). Thanks to
     Michael Fladischer for the bug report.
   * Add trigger file and postinst/postrm scripts to make unix2_chkpwd setuid
     root if nis is installed (see: #155583, #544687). Thanks to Christoph
     Pleger for the bug report.
   * Drop obsolete postrm snippet to clean after upgrades from etch.
   * Fix a typo in CPPFLAGS variable name.
Checksums-Sha1: 
 0fa5d373b3fb5e416bb1c7f74f8411e85b15a9b0 1851 libpam-unix2_2.4.1-6.dsc
 a16e00318a85bd751f32df0eba01c0b4d0604c2a 11091 libpam-unix2_2.4.1-6.debian.tar.gz
 5c0cb1c6b6decfbdeec55d6adb1f009e2f2682da 83342 libpam-unix2_2.4.1-6_i386.deb
Checksums-Sha256: 
 840923a289873f19bb26531feed8143a1c40e58266ade1b742dcf91564a3419d 1851 libpam-unix2_2.4.1-6.dsc
 393bd49531e21c37e109a4d989c4bca0d9bbe9d247ec3cb767f90af830719b6e 11091 libpam-unix2_2.4.1-6.debian.tar.gz
 06de1b9fbb87569cec4d6852b4b1a317229c5570a3e5544f9e7e8f1fdaccead5 83342 libpam-unix2_2.4.1-6_i386.deb
Files: 
 ce992db1ab5f62989825836f3513c74b 1851 admin extra libpam-unix2_2.4.1-6.dsc
 3d5c1163e5657ff50f40ce8f2f89a053 11091 admin extra libpam-unix2_2.4.1-6.debian.tar.gz
 214285f544aa3ffc42260ab3d0932216 83342 admin extra libpam-unix2_2.4.1-6_i386.deb

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.12 (GNU/Linux)
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=85Rs
-----END PGP SIGNATURE-----



--- End Message ---

Reply to: