Devuan bug report logs - #113
auditctl segmentation fault

version graph

Package: auditd; Maintainer for auditd is (unknown); Source for auditd is src:audit.

Reported by: Mauro Rappa <maurorappa@aol.co.uk>

Date: Thu, 6 Jul 2017 11:33:01 UTC

Severity: normal

Tags: debian, jessie

Fixed in version 1:2.6.7-2

Done: Mark Hindley <mark@hindley.org.uk>

Forwarded to https://bugs.debian.org/859120

Full log


🔗 View this message in rfc822 format

MIME-Version: 1.0
X-Mailer: MIME-tools 5.509 (Entity 5.509)
X-Loop: owner@bugs.devuan.org
From: "Devuan bug Tracking System" <owner@bugs.devuan.org>
To: Mark Hindley <mark@hindley.org.uk>
Subject: bug#113: marked as done (auditctl segmentation fault)
Message-ID: <handler.113.D113.167342392315850.ackdone@bugs.devuan.org>
References: <Y75r4jwZNbH+/FnU@hindley.org.uk>
 <C4CF03D4-35CD-4FB4-8C29-FD6CABFA180E@aol.co.uk>
X-Devuan-PR-Message: closed 113
X-Devuan-PR-Package: auditd
X-Devuan-PR-Keywords: debian jessie
Reply-To: 113@bugs.devuan.org
Date: Wed, 11 Jan 2023 08:00:02 +0000
Content-Type: multipart/mixed; boundary="----------=_1673424002-15888-0"
[Message part 1 (text/plain, inline)]
Your message dated Wed, 11 Jan 2023 07:57:22 +0000
with message-id <Y75r4jwZNbH+/FnU@hindley.org.uk>
and subject line Fixed in Debian #859120
has caused the Devuan bug report #113,
regarding auditctl segmentation fault
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact owner@bugs.devuan.org
immediately.)


-- 
113: https://bugs.devuan.org/cgi/bugreport.cgi?bug=113
Devuan Bug Tracking System
Contact owner@bugs.devuan.org with problems
[Message part 2 (message/rfc822, inline)]
From: Mauro Rappa <maurorappa@aol.co.uk>
To: submit@bugs.devuan.org
Subject: auditctl segmentation fault
Date: Thu, 6 Jul 2017 12:11:26 +0100
Package: auditd                          
Version: 1:2.4-1+b1 

Hi,
Jessie throws a seg fault when running a simple command like:

root@devuan:~# auditctl -s
enabled 1
flag 1
pid 8393
rate_limit 0
backlog_limit 320
lost 0
backlog 0
Segmentation fault


Running a strace it seems it cannot handle the response form the socket (too big?)

root@devuan:~# strace auditctl -s
execve("/sbin/auditctl", ["auditctl", "-s"], [/* 12 vars */]) = 0
brk(0)                                  = 0x5623724d5000
access("/etc/ld.so.nohwcap", F_OK)      = -1 ENOENT (No such file or directory)
mmap(NULL, 8192, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_ANONYMOUS, -1, 0) = 0x7f3ed1135000
access("/etc/ld.so.preload", R_OK)      = -1 ENOENT (No such file or directory)
open("/etc/ld.so.cache", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0644, st_size=35244, ...}) = 0
mmap(NULL, 35244, PROT_READ, MAP_PRIVATE, 3, 0) = 0x7f3ed112c000
close(3)                                = 0
access("/etc/ld.so.nohwcap", F_OK)      = -1 ENOENT (No such file or directory)
open("/lib/x86_64-linux-gnu/libaudit.so.1", O_RDONLY|O_CLOEXEC) = 3
read(3, "\177ELF\2\1\1\0\0\0\0\0\0\0\0\0\3\0>\0\1\0\0\0\20*\0\0\0\0\0\0"..., 832) = 832
fstat(3, {st_mode=S_IFREG|0644, st_size=113024, ...}) = 0
mmap(NULL, 2249344, PROT_READ|PROT_EXEC, MAP_PRIVATE|MAP_DENYWRITE, 3, 0) = 0x7f3ed0cf1000
mprotect(0x7f3ed0d0b000, 2093056, PROT_NONE) = 0
mmap(0x7f3ed0f0a000, 12288, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_FIXED|MAP_DENYWRITE, 3, 0x19000) = 0x7f3ed0f0a000
mmap(0x7f3ed0f0d000, 37504, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_FIXED|MAP_ANONYMOUS, -1, 0) = 0x7f3ed0f0d000
close(3)                                = 0
access("/etc/ld.so.nohwcap", F_OK)      = -1 ENOENT (No such file or directory)
open("/lib/x86_64-linux-gnu/libauparse.so.0", O_RDONLY|O_CLOEXEC) = 3
read(3, "\177ELF\2\1\1\0\0\0\0\0\0\0\0\0\3\0>\0\1\0\0\0\220(\0\0\0\0\0\0"..., 832) = 832
fstat(3, {st_mode=S_IFREG|0644, st_size=88624, ...}) = 0
mmap(NULL, 2183984, PROT_READ|PROT_EXEC, MAP_PRIVATE|MAP_DENYWRITE, 3, 0) = 0x7f3ed0adb000
mprotect(0x7f3ed0af0000, 2093056, PROT_NONE) = 0
mmap(0x7f3ed0cef000, 8192, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_FIXED|MAP_DENYWRITE, 3, 0x14000) = 0x7f3ed0cef000
close(3)                                = 0
access("/etc/ld.so.nohwcap", F_OK)      = -1 ENOENT (No such file or directory)
open("/lib/x86_64-linux-gnu/libc.so.6", O_RDONLY|O_CLOEXEC) = 3
read(3, "\177ELF\2\1\1\3\0\0\0\0\0\0\0\0\3\0>\0\1\0\0\0P\34\2\0\0\0\0\0"..., 832) = 832
fstat(3, {st_mode=S_IFREG|0755, st_size=1738176, ...}) = 0
mmap(NULL, 4096, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_ANONYMOUS, -1, 0) = 0x7f3ed112b000
mmap(NULL, 3844640, PROT_READ|PROT_EXEC, MAP_PRIVATE|MAP_DENYWRITE, 3, 0) = 0x7f3ed0730000
mprotect(0x7f3ed08d1000, 2097152, PROT_NONE) = 0
mmap(0x7f3ed0ad1000, 24576, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_FIXED|MAP_DENYWRITE, 3, 0x1a1000) = 0x7f3ed0ad1000
mmap(0x7f3ed0ad7000, 14880, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_FIXED|MAP_ANONYMOUS, -1, 0) = 0x7f3ed0ad7000
close(3)                                = 0
mmap(NULL, 4096, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_ANONYMOUS, -1, 0) = 0x7f3ed112a000
mmap(NULL, 4096, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_ANONYMOUS, -1, 0) = 0x7f3ed1129000
arch_prctl(ARCH_SET_FS, 0x7f3ed112a700) = 0
mprotect(0x7f3ed0ad1000, 16384, PROT_READ) = 0
mprotect(0x7f3ed0f0a000, 8192, PROT_READ) = 0
mprotect(0x7f3ed0cef000, 4096, PROT_READ) = 0
mprotect(0x5623714e3000, 4096, PROT_READ) = 0
mprotect(0x7f3ed1137000, 4096, PROT_READ) = 0
munmap(0x7f3ed112c000, 35244)           = 0
geteuid()                               = 0
brk(0)                                  = 0x5623724d5000
brk(0x5623724f6000)                     = 0x5623724f6000
socket(PF_NETLINK, SOCK_RAW, NETLINK_AUDIT) = 3
fcntl(3, F_SETFD, FD_CLOEXEC)           = 0
sendto(3, "\20\0\0\0\350\3\5\0\1\0\0\0\0\0\0\0", 16, 0, {sa_family=AF_NETLINK, pid=0, groups=00000000}, 12) = 16
poll([{fd=3, events=POLLIN}], 1, 500)   = 1 ([{fd=3, revents=POLLIN}])
recvfrom(3, "$\0\0\0\2\0\0\0\1\0\0\0f\"\0\0\0\0\0\0\20\0\0\0\350\3\5\0\1\0\0\0"..., 8988, MSG_PEEK|MSG_DONTWAIT, {sa_family=AF_NETLINK, pid=0, groups=00000000}, [12]) = 36
recvfrom(3, "$\0\0\0\2\0\0\0\1\0\0\0f\"\0\0\0\0\0\0\20\0\0\0\350\3\5\0\1\0\0\0"..., 8988, MSG_DONTWAIT, {sa_family=AF_NETLINK, pid=0, groups=00000000}, [12]) = 36
select(4, [3], NULL, NULL, {0, 100000}) = 1 (in [3], left {0, 99995})
recvfrom(3, "8\0\0\0\350\3\0\0\1\0\0\0f\"\0\0\0\0\0\0\1\0\0\0\1\0\0\0\311 \0\0"..., 8988, MSG_DONTWAIT, {sa_family=AF_NETLINK, pid=0, groups=00000000}, [12]) = 56
fstat(1, {st_mode=S_IFCHR|0600, st_rdev=makedev(136, 0), ...}) = 0
mmap(NULL, 4096, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_ANONYMOUS, -1, 0) = 0x7f3ed1134000
write(1, "enabled 1\n", 10enabled 1
)             = 10
write(1, "flag 1\n", 7flag 1
)                 = 7
write(1, "pid 8393\n", 9pid 8393
)               = 9
write(1, "rate_limit 0\n", 13rate_limit 0
)          = 13
write(1, "backlog_limit 320\n", 18backlog_limit 320
)     = 18
write(1, "lost 0\n", 7lost 0
)                 = 7
write(1, "backlog 0\n", 10backlog 0
)             = 10
sendto(3, " \0\0\0\373\3\5\0\2\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0", 32, 0, {sa_family=AF_NETLINK, pid=0, groups=00000000}, 12) = 32
poll([{fd=3, events=POLLIN}], 1, 500)   = 1 ([{fd=3, revents=POLLIN}])
recvfrom(3, "$\0\0\0\2\0\0\0\2\0\0\0f\"\0\0\0\0\0\0 \0\0\0\373\3\5\0\2\0\0\0"..., 8988, MSG_PEEK|MSG_DONTWAIT, {sa_family=AF_NETLINK, pid=0, groups=00000000}, [12]) = 36
recvfrom(3, "$\0\0\0\2\0\0\0\2\0\0\0f\"\0\0\0\0\0\0 \0\0\0\373\3\5\0\2\0\0\0"..., 8988, MSG_DONTWAIT, {sa_family=AF_NETLINK, pid=0, groups=00000000}, [12]) = 36
select(4, [3], NULL, NULL, {0, 100000}) = 1 (in [3], left {0, 99990})
recvfrom(3, " \0\0\0\373\3\0\0\2\0\0\0f\"\0\0\1\0\0\0\377\377\377\377\0\0\0\0\0\0\0\0", 8988, MSG_DONTWAIT, {sa_family=AF_NETLINK, pid=0, groups=00000000}, [12]) = 32
--- SIGSEGV {si_signo=SIGSEGV, si_code=SEGV_MAPERR, si_addr=0x4} ---
+++ killed by SIGSEGV +++
Segmentation fault







[Message part 3 (message/rfc822, inline)]
From: Mark Hindley <mark@hindley.org.uk>
To: 113-done@bugs.devuan.org
Subject: Fixed in Debian #859120
Date: Wed, 11 Jan 2023 07:57:22 +0000
Version: 1:2.6.7-2

Send a report that this bug log contains spam.


Devuan BTS -- Powered by Debian bug tracking system
Copyright (C) 1999 Darren O. Benham,
1997,2003 nCipher Corporation Ltd, 1994-97 Ian Jackson,
2005-2017 Don Armstrong, and many other contributors.

Devuan Bugs Owner <owner@bugs.devuan.org>.
Last modified: Tue Apr 30 03:56:44 2024;