Debian Bug report logs - #347233
dbus-1 on sarge segfaults if a unpriviliged user run "lshal"

version graph

Package: libc6; Maintainer for libc6 is GNU Libc Maintainers <debian-glibc@lists.debian.org>; Source for libc6 is src:glibc (PTS, buildd, popcon).

Reported by: Volker Sauer <vsauer@dvs1.informatik.tu-darmstadt.de>

Date: Mon, 9 Jan 2006 16:03:02 UTC

Severity: important

Merged with 226515, 246288, 305316, 314480, 316914

Found in versions 2.3.2.ds1-10, 2.3.2.ds1-22

Fixed in version 2.3.5-3

Done: Jonathan Nieder <jrnieder@gmail.com>

Bug is archived. No further changes may be made.

Toggle useless messages

View this report as an mbox folder, status mbox, maintainer mbox


Report forwarded to debian-bugs-dist@lists.debian.org, D-Bus Maintainance Team <debian-dbus@fooishbar.org>:
Bug#347233; Package dbus-1. (full text, mbox, link).


Acknowledgement sent to Volker Sauer <vsauer@dvs1.informatik.tu-darmstadt.de>:
New Bug report received and forwarded. Copy sent to D-Bus Maintainance Team <debian-dbus@fooishbar.org>. (full text, mbox, link).


Message #5 received at submit@bugs.debian.org (full text, mbox, reply):

From: Volker Sauer <vsauer@dvs1.informatik.tu-darmstadt.de>
To: Debian Bug Tracking System <submit@bugs.debian.org>
Subject: dbus-1 on sarge segfaults if a unpriviliged user run "lshal"
Date: Mon, 09 Jan 2006 16:53:39 +0100
Package: dbus-1
Version: 0.23.4-1
Severity: grave
Justification: renders package unusable

Running lshal as root runs fine.
Running lshal as user gives:
	lshal version 0.4.7
	libhal.c 644 : Error connecting to system bus: No reply within specified time
	error: hal_initialize failed

After this, hald still runs but dbus-daemon-1 is gone.

Here's what /usr/bin/dbus-daemon-1 --system --nofork says when I run
"lshal" as a non-privilged user:

	berlin: ~ 11# /usr/bin/dbus-daemon-1 --system --nofork
	Segmentation fault
	berlin: ~ 12#

This is the strace of the daemon crashing:

[......]

[{fd=3, events=POLLIN, revents=POLLIN}, {fd=4, events=POLLIN}, {fd=6,
events=POLLIN}], 3, -1) = 1
gettimeofday({1136821879, 967986}, NULL) = 0
accept(3, {sa_family=AF_FILE, path="«"}, [2]) = 7
fcntl64(7, F_GETFD)                     = 0
fcntl64(7, F_SETFD, FD_CLOEXEC)         = 0
fcntl64(7, F_GETFL)                     = 0x2 (flags O_RDWR)
fcntl64(7, F_SETFL, O_RDWR|O_NONBLOCK)  = 0
rt_sigaction(SIGPIPE, {SIG_IGN}, {SIG_IGN}, 8) = 0
gettimeofday({1136821879, 968379}, NULL) = 0
gettimeofday({1136821879, 968418}, NULL) = 0
gettimeofday({1136821879, 968449}, NULL) = 0
poll([{fd=3, events=POLLIN}, {fd=4, events=POLLIN}, {fd=6,
events=POLLIN}, {fd=7, events=POLLIN, revents=POLLIN}], 4, 28103) = 1
gettimeofday({1136821879, 968512}, NULL) = 0
recvmsg(7, {msg_name(0)=NULL, msg_iov(1)=[{"\0", 1}], msg_controllen=0,
msg_flags=0}, 0) = 1
getsockopt(7, SOL_SOCKET, SO_PEERCRED, "\21\10\0\0\36+\0\0\347\3\0\0",
[12]) = 0
read(7, "AUTH EXTERNAL 3131303338\r\n", 2048) = 26
gettimeofday({1136821879, 968701}, NULL) = 0
poll([{fd=3, events=POLLIN}, {fd=4, events=POLLIN}, {fd=6,
events=POLLIN}, {fd=7, events=POLLOUT, revents=POLLOUT}], 4, 28103) = 1
gettimeofday({1136821879, 968765}, NULL) = 0
write(7, "OK\r\n", 4)                   = 4
gettimeofday({1136821879, 968925}, NULL) = 0
poll([{fd=3, events=POLLIN}, {fd=4, events=POLLIN}, {fd=6,
events=POLLIN}, {fd=7, events=POLLIN, revents=POLLIN}], 4, 28102) = 1
gettimeofday({1136821879, 968986}, NULL) = 0
read(7, "BEGIN\r\nl\1\0\0\200\0\0\0\0\0\0\0\1\0\0\0\1o\0\0\25\0"...,
2048) = 135
socket(PF_FILE, SOCK_STREAM, 0)         = 8
connect(8, {sa_family=AF_FILE, path="/var/run/.nscd_socket"}, 110) = 0
writev(8, [{"\2\0\0\0\1\0\0\0\6\0\0\0", 12}, {"11038\0", 6}], 2) = 18
read(8, "\2\0\0\0\1\0\0\0\7\0\0\0\16\0\0\0\36+\0\0\347\3\0\0 \0"..., 36)
= 36
read(8, "vsauer\0/ndcT7gL90ShI\0Volker Saue"..., 76) = 76
close(8)                                = 0
open("/etc/group", O_RDONLY)            = 8
fcntl64(8, F_GETFD)                     = 0
fcntl64(8, F_SETFD, FD_CLOEXEC)         = 0
_llseek(8, 0, [0], SEEK_CUR)            = 0
fstat64(8, {st_mode=S_IFREG|0644, st_size=723, ...}) = 0
mmap2(NULL, 723, PROT_READ, MAP_SHARED, 8, 0) = 0x40018000
_llseek(8, 723, [723], SEEK_SET)        = 0
open("/var/yp/binding/dvs1.informatik.tu-darmstadt.de.2", O_RDONLY) = 9
readv(9, [{"\377\377", 2}, {"\1\0\0\0\202S\246\201\3[\0\0", 12}], 2) =
14
socket(PF_INET, SOCK_DGRAM, IPPROTO_UDP) = 10
bind(10, {sa_family=AF_INET, sin_port=htons(988),
sin_addr=inet_addr("0.0.0.0")}, 16) = -1 EACCES (Permission denied)
ioctl(10, FIONBIO, [1])                 = 0
setsockopt(10, SOL_IP, IP_RECVERR, [1], 4) = 0
fcntl64(10, F_SETFD, FD_CLOEXEC)        = 0
close(9)                                = 0
close(10)                               = 0
socket(PF_INET, SOCK_STREAM, IPPROTO_TCP) = 9
bind(9, {sa_family=AF_INET, sin_port=htons(989),
sin_addr=inet_addr("0.0.0.0")}, 16) = -1 EACCES (Permission denied)
connect(9, {sa_family=AF_INET, sin_port=htons(111),
sin_addr=inet_addr("130.83.166.129")}, 16) = 0
write(9, "\200\0\0008\4\343\307\355\0\0\0\0\0\0\0\2\0\1\206\240\0"...,
60) = 60
poll([{fd=9, events=POLLIN, revents=POLLIN}], 1, 60000) = 1
read(9, "\200\0\0\34\4\343\307\355\0\0\0\1\0\0\0\0\0\0\0\0\0\0\0"...,
400) = 32
close(9)                                = 0
socket(PF_INET, SOCK_STREAM, IPPROTO_TCP) = 9
bind(9, {sa_family=AF_INET, sin_port=htons(990),
sin_addr=inet_addr("0.0.0.0")}, 16) = -1 EACCES (Permission denied)
connect(9, {sa_family=AF_INET, sin_port=htons(863),
sin_addr=inet_addr("130.83.166.129")}, 16) = 0
write(9, "\200\0\0\\_p\277\373\0\0\0\0\0\0\0\2\0\1\206\244\0\0\0"...,
96) = 96
poll([{fd=9, events=POLLIN, revents=POLLIN}], 1, 25000) = 1
read(9, "\0\0\17\234_p\277\373\0\0\0\1\0\0\0\0\0\0\0\0\0\0\0\0\0"...,
4000) = 2896
poll([{fd=9, events=POLLIN, revents=POLLIN}], 1, 25000) = 1
read(9, "n,cilia,fiege,haul,helbaoui,mant"..., 4000) = 1268
close(9)                                = 0
--- SIGSEGV (Segmentation fault) @ 0 (0) ---
+++ killed by SIGSEGV +++


This behaviour occurs in various machines inside our NIS-enviroment.


-- System Information:
Debian Release: 3.1
Architecture: i386 (i686)
Kernel: Linux 2.6.8-2-k7
Locale: LANG=de_DE@euro, LC_CTYPE=de_DE (charmap=ISO-8859-1)

Versions of packages dbus-1 depends on:
ii  adduser                     3.63         Add and remove users and groups
ii  debianutils                 2.8.4        Miscellaneous utilities specific t
ii  libc6                       2.3.2.ds1-22 GNU C Library: Shared libraries an
ii  libexpat1                   1.95.8-3     XML parsing C library - runtime li

-- no debconf information



Information forwarded to debian-bugs-dist@lists.debian.org, D-Bus Maintainance Team <debian-dbus@fooishbar.org>:
Bug#347233; Package dbus-1. (full text, mbox, link).


Acknowledgement sent to sjoerd@spring.luon.net (Sjoerd Simons):
Extra info received and forwarded to list. Copy sent to D-Bus Maintainance Team <debian-dbus@fooishbar.org>. (full text, mbox, link).


Message #10 received at 347233@bugs.debian.org (full text, mbox, reply):

From: sjoerd@spring.luon.net (Sjoerd Simons)
To: Volker Sauer <vsauer@dvs1.informatik.tu-darmstadt.de>, 347233@bugs.debian.org
Subject: Re: Bug#347233: dbus-1 on sarge segfaults if a unpriviliged user run "lshal"
Date: Thu, 12 Jan 2006 00:44:36 +0100
On Mon, Jan 09, 2006 at 04:53:39PM +0100, Volker Sauer wrote:
> Package: dbus-1
> Version: 0.23.4-1
> Severity: grave
> Justification: renders package unusable
> 
> Running lshal as root runs fine.
> Running lshal as user gives:
> 	lshal version 0.4.7
> 	libhal.c 644 : Error connecting to system bus: No reply within specified time
> 	error: hal_initialize failed
> 
> After this, hald still runs but dbus-daemon-1 is gone.
> 
> Here's what /usr/bin/dbus-daemon-1 --system --nofork says when I run
> "lshal" as a non-privilged user:
> 
> 	berlin: ~ 11# /usr/bin/dbus-daemon-1 --system --nofork
> 	Segmentation fault
> 	berlin: ~ 12#
> 
> This is the strace of the daemon crashing:

Are you using nis ?

  Sjoerd
-- 
God doesn't play dice.
		-- Albert Einstein



Information forwarded to debian-bugs-dist@lists.debian.org, D-Bus Maintainance Team <debian-dbus@fooishbar.org>:
Bug#347233; Package dbus-1. (full text, mbox, link).


Acknowledgement sent to Volker Sauer <vsauer@dvs1.informatik.tu-darmstadt.de>:
Extra info received and forwarded to list. Copy sent to D-Bus Maintainance Team <debian-dbus@fooishbar.org>. (full text, mbox, link).


Message #15 received at 347233@bugs.debian.org (full text, mbox, reply):

From: Volker Sauer <vsauer@dvs1.informatik.tu-darmstadt.de>
To: Sjoerd Simons <sjoerd@spring.luon.net>
Cc: 347233@bugs.debian.org
Subject: Re: Bug#347233: dbus-1 on sarge segfaults if a unpriviliged user run "lshal"
Date: Thu, 12 Jan 2006 09:22:06 +0100
[Message part 1 (text/plain, inline)]
On Do, 12 Jan 2006, Sjoerd Simons <sjoerd@spring.luon.net> wrote:
> 
> Are you using nis ?

Yes (I mentioned it after the strace).

Volker
-- 
Databases and Distributed Systems Group 
Computer Science Department, Darmstadt University of Technology
Hochschulstrasse 10, Room E118, D-64289 Darmstadt, Germany
Tel: 06151-166232 Email: vsauer@dvs1.informatik.tu-darmstadt.de
[signature.asc (application/pgp-signature, inline)]

Information forwarded to debian-bugs-dist@lists.debian.org, D-Bus Maintainance Team <debian-dbus@fooishbar.org>:
Bug#347233; Package dbus-1. (full text, mbox, link).


Acknowledgement sent to Sjoerd Simons <sjoerd@spring.luon.net>:
Extra info received and forwarded to list. Copy sent to D-Bus Maintainance Team <debian-dbus@fooishbar.org>. (full text, mbox, link).


Message #20 received at 347233@bugs.debian.org (full text, mbox, reply):

From: Sjoerd Simons <sjoerd@spring.luon.net>
To: Volker Sauer <vsauer@dvs1.informatik.tu-darmstadt.de>
Cc: 347233@bugs.debian.org, control@bugs.debian.org
Subject: Re: Bug#347233: dbus-1 on sarge segfaults if a unpriviliged user run "lshal"
Date: Thu, 12 Jan 2006 11:16:07 +0100
reassign 347233 libc6
severity 347233 important
merge 246288 347233
thanks,

On Thu, Jan 12, 2006 at 09:22:06AM +0100, Volker Sauer wrote:
> On Do, 12 Jan 2006, Sjoerd Simons <sjoerd@spring.luon.net> wrote:
> > 
> > Are you using nis ?
> 
> Yes (I mentioned it after the strace).

Sorry, i indeed missed the NIS comment. This is a known libc6 bug, so 
reassigning it to libc6.

  Sjoerd
-- 
The optimist thinks that this is the best of all possible worlds,
and the pessimist knows it.
		-- J. Robert Oppenheimer, "Bulletin of Atomic Scientists"



Bug reassigned from package `dbus-1' to `libc6'. Request was from Sjoerd Simons <sjoerd@spring.luon.net> to control@bugs.debian.org. (full text, mbox, link).


Severity set to `important'. Request was from Sjoerd Simons <sjoerd@spring.luon.net> to control@bugs.debian.org. (full text, mbox, link).


Merged 226515 246288 305316 314480 316914 347233. Request was from Sjoerd Simons <sjoerd@spring.luon.net> to control@bugs.debian.org. (full text, mbox, link).


Information forwarded to debian-bugs-dist@lists.debian.org, GNU Libc Maintainers <debian-glibc@lists.debian.org>:
Bug#347233; Package libc6. (full text, mbox, link).


Acknowledgement sent to Volker Sauer <vsauer@dvs1.informatik.tu-darmstadt.de>:
Extra info received and forwarded to list. Copy sent to GNU Libc Maintainers <debian-glibc@lists.debian.org>. (full text, mbox, link).


Message #31 received at 347233@bugs.debian.org (full text, mbox, reply):

From: Volker Sauer <vsauer@dvs1.informatik.tu-darmstadt.de>
To: Sjoerd Simons <sjoerd@spring.luon.net>
Cc: 347233@bugs.debian.org
Subject: Re: Bug#347233: dbus-1 on sarge segfaults if a unpriviliged user run "lshal"
Date: Thu, 12 Jan 2006 16:11:05 +0100
[Message part 1 (text/plain, inline)]
On Do, 12 Jan 2006, Sjoerd Simons <sjoerd@spring.luon.net> wrote:
> Sorry, i indeed missed the NIS comment. This is a known libc6 bug, so 
> reassigning it to libc6.

Changing /etc/nsswitch.conf from

group: compat

to

group: files nis

solves the problem.

Regards
Volker

-- 
Databases and Distributed Systems Group 
Computer Science Department, Darmstadt University of Technology
Hochschulstrasse 10, Room E118, D-64289 Darmstadt, Germany
Tel: 06151-166232 Email: vsauer@dvs1.informatik.tu-darmstadt.de
[signature.asc (application/pgp-signature, inline)]

Merged 226515 246288 305316 314480 316914 347233 369536. Request was from Pierre Habouzit <madcoder@debian.org> to control@bugs.debian.org. (full text, mbox, link).


Disconnected #369536 from all other report(s). Request was from Sergio Gelato <Sergio.Gelato@astro.su.se> to control@bugs.debian.org. (Fri, 13 Apr 2007 08:39:23 GMT) (full text, mbox, link).


No longer marked as found in versions glibc/2.3.6-9. Request was from Andreas Beckmann <anbe@debian.org> to control@bugs.debian.org. (Fri, 01 Nov 2013 01:21:10 GMT) (full text, mbox, link).


No longer marked as found in versions glibc/2.3.6-15. Request was from Andreas Beckmann <anbe@debian.org> to control@bugs.debian.org. (Fri, 01 Nov 2013 01:21:12 GMT) (full text, mbox, link).


Bug archived. Request was from Debbugs Internal Request <owner@bugs.debian.org> to internal_control@bugs.debian.org. (Fri, 29 Nov 2013 07:28:08 GMT) (full text, mbox, link).


Send a report that this bug log contains spam.


Debian bug tracking system administrator <owner@bugs.debian.org>. Last modified: Mon Nov 6 20:55:05 2017; Machine Name: beach

Debian Bug tracking system

Debbugs is free software and licensed under the terms of the GNU Public License version 2. The current version can be obtained from https://bugs.debian.org/debbugs-source/.

Copyright © 1999 Darren O. Benham, 1997,2003 nCipher Corporation Ltd, 1994-97 Ian Jackson, 2005-2017 Don Armstrong, and many other contributors.