[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

Bug#512410: openssh-server: sshd segfaults (suppose libc or libpam-mount related)



John Livingston <John.A.Livingston@boeing.com> writes:

> We've just started seeing this bug on multiple hosts with the latest
> openssh server in testing. Our systems use Kerberos/LDAP for
> authentication; using a Kerberos ticket SSH functions perfectly, but if
> the user enters a password, sshd will throw a general protection fault.

> Jun  4 14:47:05 hostname kernel: [1715075.968073] sshd[12681] general
> protection 
> ip:7f323bf4af9a sp:7fff2caf2ae0 error:0 in
> libc-2.13.so[7f323bed4000+17d000]
> Jun  4 15:56:18 hostname kernel: [1719228.948070] sshd[32172] general
> protection 
> ip:7f7de11d0f9a sp:7fff59021fb0 error:0 in
> libc-2.13.so[7f7de115a000+17d000]

Are you using libpam-krb5?  If so, could you upgrade to the version just
uploaded to unstable?  The version in testing will segfault if
krb5_init_context fails; the version in unstable will instead try to give
you some sort of error message.

A lot of people in Ubuntu are seeing issues with krb5_init_context
failing.  In a few cases, this has been tracked to /etc/krb5.conf
mysteriously becoming mode 600 and unreadable by some processes.

-- 
Russ Allbery (rra@debian.org)               <http://www.eyrie.org/~eagle/>



Reply to: