Bug#512410: openssh-server: sshd segfaults (suppose libc or libpam-mount related)
John Livingston <John.A.Livingston@boeing.com> writes:
> We've just started seeing this bug on multiple hosts with the latest
> openssh server in testing. Our systems use Kerberos/LDAP for
> authentication; using a Kerberos ticket SSH functions perfectly, but if
> the user enters a password, sshd will throw a general protection fault.
> Jun 4 14:47:05 hostname kernel: [1715075.968073] sshd[12681] general
> protection
> ip:7f323bf4af9a sp:7fff2caf2ae0 error:0 in
> libc-2.13.so[7f323bed4000+17d000]
> Jun 4 15:56:18 hostname kernel: [1719228.948070] sshd[32172] general
> protection
> ip:7f7de11d0f9a sp:7fff59021fb0 error:0 in
> libc-2.13.so[7f7de115a000+17d000]
Are you using libpam-krb5? If so, could you upgrade to the version just
uploaded to unstable? The version in testing will segfault if
krb5_init_context fails; the version in unstable will instead try to give
you some sort of error message.
A lot of people in Ubuntu are seeing issues with krb5_init_context
failing. In a few cases, this has been tracked to /etc/krb5.conf
mysteriously becoming mode 600 and unreadable by some processes.
--
Russ Allbery (rra@debian.org) <http://www.eyrie.org/~eagle/>
Reply to: