Debian Bug report logs -
#616667
X server crash due to "xauth generate" with large timeout
Reply or subscribe to this bug.
Toggle useless messages
Report forwarded
to debian-bugs-dist@lists.debian.org, Debian X Strike Force <debian-x@lists.debian.org>:
Bug#616667; Package xserver-xorg.
(Sun, 06 Mar 2011 12:36:04 GMT) (full text, mbox, link).
Acknowledgement sent
to Ian Jackson <ijackson@chiark.greenend.org.uk>:
New Bug report received and forwarded. Copy sent to Debian X Strike Force <debian-x@lists.debian.org>.
(Sun, 06 Mar 2011 12:36:05 GMT) (full text, mbox, link).
Message #5 received at submit@bugs.debian.org (full text, mbox, reply):
Package: xserver-xorg
Version: 1:7.5+8
To reproduce:
cp .Xauthority private/tmpfile
xauth -f private/tmpfile generate $DISPLAY . untrusted timeout 1000000000
Actual behaviour:
My X server died. The log message was:
X: ../../Xext/security.c:323: SecurityAuthorizationExpired: Assertion `pAuth->timer == timer' failed.
XIO: fatal IO error 11 (Resource temporarily unavailable) on X server ":0.0"
after 7385 requests (7224 known processed) with 0 events remaining.
Desired behaviour:
X auth cookie is replaced in private/tmpfile and X server does not
crash. Alternatively, an error message (eg, that the timeout is too
large, or that the X request failed).
I was trying to make an untrusted cookie which would not time out.
Unfortunately that does not appear to be possible. A timeout value of
1000000 seems to work; 10000000 crashes the server.
Ian.
Information forwarded
to debian-bugs-dist@lists.debian.org, Debian X Strike Force <debian-x@lists.debian.org>:
Bug#616667; Package xserver-xorg.
(Sun, 06 Mar 2011 13:39:06 GMT) (full text, mbox, link).
Acknowledgement sent
to Cyril Brulebois <kibi@debian.org>:
Extra info received and forwarded to list. Copy sent to Debian X Strike Force <debian-x@lists.debian.org>.
(Sun, 06 Mar 2011 13:39:06 GMT) (full text, mbox, link).
Message #10 received at 616667@bugs.debian.org (full text, mbox, reply):
[Message part 1 (text/plain, inline)]
severity 616667 important
reassign 616667 xserver-xorg-core
found 616667 2:1.7.7-11
user debian-x@lists.debian.org
usertag squeeze-candidate
thanks
Hi Ian,
Ian Jackson <ijackson@chiark.greenend.org.uk> (06/03/2011):
> Package: xserver-xorg
> Version: 1:7.5+8
>
> To reproduce:
> cp .Xauthority private/tmpfile
> xauth -f private/tmpfile generate $DISPLAY . untrusted timeout 1000000000
>
> Actual behaviour:
> My X server died. The log message was:
> X: ../../Xext/security.c:323: SecurityAuthorizationExpired: Assertion `pAuth->timer == timer' failed.
ouch. Tagging as something we might want to fix in squeeze (until it's
investigated anyway).
XIO: fatal IO error 11 (Resource temporarily unavailable) on X server ":0.0"
> after 7385 requests (7224 known processed) with 0 events remaining.
>
> Desired behaviour:
> X auth cookie is replaced in private/tmpfile and X server does not
> crash. Alternatively, an error message (eg, that the timeout is too
> large, or that the X request failed).
>
> I was trying to make an untrusted cookie which would not time out.
> Unfortunately that does not appear to be possible. A timeout value of
> 1000000 seems to work; 10000000 crashes the server.
With 2:1.9.99.903-1, I'm getting:
| -(cyril@talisker)-(/tmp)-()
| $ xauth -f private generate $DISPLAY . untrusted timeout 1000000000
| xauth: (argv):1: couldn't query Security extension on display ":42.0"
Will see if that's expected once I get some more info from a squeeze
system.
KiBi.
[signature.asc (application/pgp-signature, inline)]
Information forwarded
to debian-bugs-dist@lists.debian.org, Debian X Strike Force <debian-x@lists.debian.org>:
Bug#616667; Package xserver-xorg.
(Sun, 06 Mar 2011 13:39:08 GMT) (full text, mbox, link).
Acknowledgement sent
to Ian Jackson <ijackson@chiark.greenend.org.uk>:
Extra info received and forwarded to list. Copy sent to Debian X Strike Force <debian-x@lists.debian.org>.
(Sun, 06 Mar 2011 13:39:08 GMT) (full text, mbox, link).
Message #15 received at 616667@bugs.debian.org (full text, mbox, reply):
Cyril Brulebois writes ("Re: Bug#616667: X server crash due to "xauth generate" with large timeout"):
> With 2:1.9.99.903-1, I'm getting:
> | -(cyril@talisker)-(/tmp)-()
> | $ xauth -f private generate $DISPLAY . untrusted timeout 1000000000
> | xauth: (argv):1: couldn't query Security extension on display ":42.0"
>
> Will see if that's expected once I get some more info from a squeeze
> system.
"xauth generate" _replaces_ the cookie in the specified xauthority
file with an untrusted one. That error message is the one you get if
you _already_ have an untrusted cookie in your xauthority file - ie,
if you run "xauth generate" for the second time without running the
"cp" again.
If you ran xauth generate without the -f option then I'm afraid you
have busticated your session.
Of course it may be that that error message is also the one you get if
a fixed server rejects your big timeout, but that should be easy
enough to test ...
Ian.
Severity set to 'important' from 'normal'
Request was from Cyril Brulebois <kibi@debian.org>
to control@bugs.debian.org.
(Sun, 06 Mar 2011 13:39:10 GMT) (full text, mbox, link).
Bug No longer marked as found in versions xorg/1:7.5+8.
Request was from Cyril Brulebois <kibi@debian.org>
to control@bugs.debian.org.
(Sun, 06 Mar 2011 13:39:11 GMT) (full text, mbox, link).
Bug Marked as found in versions xorg-server/2:1.7.7-11.
Request was from Cyril Brulebois <kibi@debian.org>
to control@bugs.debian.org.
(Sun, 06 Mar 2011 13:39:12 GMT) (full text, mbox, link).
Information forwarded
to debian-bugs-dist@lists.debian.org, Debian X Strike Force <debian-x@lists.debian.org>:
Bug#616667; Package xserver-xorg-core.
(Sun, 06 Mar 2011 15:30:03 GMT) (full text, mbox, link).
Acknowledgement sent
to Cyril Brulebois <kibi@debian.org>:
Extra info received and forwarded to list. Copy sent to Debian X Strike Force <debian-x@lists.debian.org>.
(Sun, 06 Mar 2011 15:30:03 GMT) (full text, mbox, link).
Message #28 received at 616667@bugs.debian.org (full text, mbox, reply):
[Message part 1 (text/plain, inline)]
Ian Jackson <ijackson@chiark.greenend.org.uk> (06/03/2011):
> "xauth generate" _replaces_ the cookie in the specified xauthority
> file with an untrusted one. That error message is the one you get
> if you _already_ have an untrusted cookie in your xauthority file -
> ie, if you run "xauth generate" for the second time without running
> the "cp" again.
No. What I got was due to #599657, still affecting sid/experimental.
KiBi.
[signature.asc (application/pgp-signature, inline)]
Information forwarded
to debian-bugs-dist@lists.debian.org, Debian X Strike Force <debian-x@lists.debian.org>:
Bug#616667; Package xserver-xorg-core.
(Sun, 06 Mar 2011 19:48:05 GMT) (full text, mbox, link).
Acknowledgement sent
to Cyril Brulebois <kibi@debian.org>:
Extra info received and forwarded to list. Copy sent to Debian X Strike Force <debian-x@lists.debian.org>.
(Sun, 06 Mar 2011 19:48:05 GMT) (full text, mbox, link).
Message #33 received at 616667@bugs.debian.org (full text, mbox, reply):
[Message part 1 (text/plain, inline)]
forwarded 616667 https://bugs.freedesktop.org/show_bug.cgi?id=35066
thanks
Cyril Brulebois <kibi@debian.org> (06/03/2011):
> ouch. Tagging as something we might want to fix in squeeze (until
> it's investigated anyway).
Either I screwed up the analysis, or that's a bit silly. See the
upstream bug report for more info. Patches went to xorg-devel@ a few
seconds ago.
I guess the upcoming fixes will be backported to 1.7 and 1.9 branches,
so will probably land in r2 (xorg-server for r1 has already been
uploaded, I'm not sure we're going to have time to perform a new
upload just for that bug — or if it's worth it anyway).
KiBi.
[signature.asc (application/pgp-signature, inline)]
Information forwarded
to debian-bugs-dist@lists.debian.org, Debian X Strike Force <debian-x@lists.debian.org>:
Bug#616667; Package xserver-xorg-core.
(Wed, 21 Aug 2019 17:03:06 GMT) (full text, mbox, link).
Acknowledgement sent
to Andrei Gudkov <gudokk@gmail.com>:
Extra info received and forwarded to list. Copy sent to Debian X Strike Force <debian-x@lists.debian.org>.
(Wed, 21 Aug 2019 17:03:06 GMT) (full text, mbox, link).
Message #40 received at 616667@bugs.debian.org (full text, mbox, reply):
[Message part 1 (text/plain, inline)]
Hi guys,
[Message part 2 (text/html, inline)]
Send a report that this bug log contains spam.
Debian bug tracking system administrator <owner@bugs.debian.org>.
Last modified:
Sun Jul 30 21:49:32 2023;
Machine Name:
buxtehude
Debian Bug tracking system
Debbugs is free software and licensed under the terms of the GNU
Public License version 2. The current version can be obtained
from https://bugs.debian.org/debbugs-source/.
Copyright © 1999 Darren O. Benham,
1997,2003 nCipher Corporation Ltd,
1994-97 Ian Jackson,
2005-2017 Don Armstrong, and many other contributors.