Devuan bug report logs - #113
auditctl segmentation fault

version graph

Package: auditd; Maintainer for auditd is (unknown); Source for auditd is src:audit.

Reported by: Mauro Rappa <maurorappa@aol.co.uk>

Date: Thu, 6 Jul 2017 11:33:01 UTC

Severity: normal

Tags: debian, jessie

Fixed in version 1:2.6.7-2

Done: Mark Hindley <mark@hindley.org.uk>

Forwarded to https://bugs.debian.org/859120

Full log


🔗 View this message in rfc822 format

MIME-Version: 1.0
X-Mailer: MIME-tools 5.509 (Entity 5.509)
X-Loop: owner@bugs.devuan.org
From: "Devuan bug Tracking System" <owner@bugs.devuan.org>
To: Mauro Rappa <maurorappa@aol.co.uk>
Subject: bug#113 closed by Mark Hindley <mark@hindley.org.uk> (Fixed in
 Debian #859120)
Message-ID: <handler.113.D113.167342392315850.notifdone@bugs.devuan.org>
References: <Y75r4jwZNbH+/FnU@hindley.org.uk>
 <C4CF03D4-35CD-4FB4-8C29-FD6CABFA180E@aol.co.uk>
X-Devuan-PR-Message: they-closed 113
X-Devuan-PR-Package: auditd
X-Devuan-PR-Keywords: debian jessie
Reply-To: 113@bugs.devuan.org
Date: Wed, 11 Jan 2023 08:00:03 +0000
Content-Type: multipart/mixed; boundary="----------=_1673424003-15888-1"
[Message part 1 (text/plain, inline)]
This is an automatic notification regarding your bug report
which was filed against the auditd package:

#113: auditctl segmentation fault

It has been closed by Mark Hindley <mark@hindley.org.uk>.

Their explanation is attached below along with your original report.
If this explanation is unsatisfactory and you have not received a
better one in a separate message then please contact Mark Hindley <mark@hindley.org.uk> by
replying to this email.


-- 
113: https://bugs.devuan.org/cgi/bugreport.cgi?bug=113
Devuan Bug Tracking System
Contact owner@bugs.devuan.org with problems
[Message part 2 (message/rfc822, inline)]
From: Mark Hindley <mark@hindley.org.uk>
To: 113-done@bugs.devuan.org
Subject: Fixed in Debian #859120
Date: Wed, 11 Jan 2023 07:57:22 +0000
Version: 1:2.6.7-2
[Message part 3 (message/rfc822, inline)]
From: Mauro Rappa <maurorappa@aol.co.uk>
To: submit@bugs.devuan.org
Subject: auditctl segmentation fault
Date: Thu, 6 Jul 2017 12:11:26 +0100
Package: auditd                          
Version: 1:2.4-1+b1 

Hi,
Jessie throws a seg fault when running a simple command like:

root@devuan:~# auditctl -s
enabled 1
flag 1
pid 8393
rate_limit 0
backlog_limit 320
lost 0
backlog 0
Segmentation fault


Running a strace it seems it cannot handle the response form the socket (too big?)

root@devuan:~# strace auditctl -s
execve("/sbin/auditctl", ["auditctl", "-s"], [/* 12 vars */]) = 0
brk(0)                                  = 0x5623724d5000
access("/etc/ld.so.nohwcap", F_OK)      = -1 ENOENT (No such file or directory)
mmap(NULL, 8192, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_ANONYMOUS, -1, 0) = 0x7f3ed1135000
access("/etc/ld.so.preload", R_OK)      = -1 ENOENT (No such file or directory)
open("/etc/ld.so.cache", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0644, st_size=35244, ...}) = 0
mmap(NULL, 35244, PROT_READ, MAP_PRIVATE, 3, 0) = 0x7f3ed112c000
close(3)                                = 0
access("/etc/ld.so.nohwcap", F_OK)      = -1 ENOENT (No such file or directory)
open("/lib/x86_64-linux-gnu/libaudit.so.1", O_RDONLY|O_CLOEXEC) = 3
read(3, "\177ELF\2\1\1\0\0\0\0\0\0\0\0\0\3\0>\0\1\0\0\0\20*\0\0\0\0\0\0"..., 832) = 832
fstat(3, {st_mode=S_IFREG|0644, st_size=113024, ...}) = 0
mmap(NULL, 2249344, PROT_READ|PROT_EXEC, MAP_PRIVATE|MAP_DENYWRITE, 3, 0) = 0x7f3ed0cf1000
mprotect(0x7f3ed0d0b000, 2093056, PROT_NONE) = 0
mmap(0x7f3ed0f0a000, 12288, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_FIXED|MAP_DENYWRITE, 3, 0x19000) = 0x7f3ed0f0a000
mmap(0x7f3ed0f0d000, 37504, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_FIXED|MAP_ANONYMOUS, -1, 0) = 0x7f3ed0f0d000
close(3)                                = 0
access("/etc/ld.so.nohwcap", F_OK)      = -1 ENOENT (No such file or directory)
open("/lib/x86_64-linux-gnu/libauparse.so.0", O_RDONLY|O_CLOEXEC) = 3
read(3, "\177ELF\2\1\1\0\0\0\0\0\0\0\0\0\3\0>\0\1\0\0\0\220(\0\0\0\0\0\0"..., 832) = 832
fstat(3, {st_mode=S_IFREG|0644, st_size=88624, ...}) = 0
mmap(NULL, 2183984, PROT_READ|PROT_EXEC, MAP_PRIVATE|MAP_DENYWRITE, 3, 0) = 0x7f3ed0adb000
mprotect(0x7f3ed0af0000, 2093056, PROT_NONE) = 0
mmap(0x7f3ed0cef000, 8192, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_FIXED|MAP_DENYWRITE, 3, 0x14000) = 0x7f3ed0cef000
close(3)                                = 0
access("/etc/ld.so.nohwcap", F_OK)      = -1 ENOENT (No such file or directory)
open("/lib/x86_64-linux-gnu/libc.so.6", O_RDONLY|O_CLOEXEC) = 3
read(3, "\177ELF\2\1\1\3\0\0\0\0\0\0\0\0\3\0>\0\1\0\0\0P\34\2\0\0\0\0\0"..., 832) = 832
fstat(3, {st_mode=S_IFREG|0755, st_size=1738176, ...}) = 0
mmap(NULL, 4096, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_ANONYMOUS, -1, 0) = 0x7f3ed112b000
mmap(NULL, 3844640, PROT_READ|PROT_EXEC, MAP_PRIVATE|MAP_DENYWRITE, 3, 0) = 0x7f3ed0730000
mprotect(0x7f3ed08d1000, 2097152, PROT_NONE) = 0
mmap(0x7f3ed0ad1000, 24576, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_FIXED|MAP_DENYWRITE, 3, 0x1a1000) = 0x7f3ed0ad1000
mmap(0x7f3ed0ad7000, 14880, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_FIXED|MAP_ANONYMOUS, -1, 0) = 0x7f3ed0ad7000
close(3)                                = 0
mmap(NULL, 4096, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_ANONYMOUS, -1, 0) = 0x7f3ed112a000
mmap(NULL, 4096, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_ANONYMOUS, -1, 0) = 0x7f3ed1129000
arch_prctl(ARCH_SET_FS, 0x7f3ed112a700) = 0
mprotect(0x7f3ed0ad1000, 16384, PROT_READ) = 0
mprotect(0x7f3ed0f0a000, 8192, PROT_READ) = 0
mprotect(0x7f3ed0cef000, 4096, PROT_READ) = 0
mprotect(0x5623714e3000, 4096, PROT_READ) = 0
mprotect(0x7f3ed1137000, 4096, PROT_READ) = 0
munmap(0x7f3ed112c000, 35244)           = 0
geteuid()                               = 0
brk(0)                                  = 0x5623724d5000
brk(0x5623724f6000)                     = 0x5623724f6000
socket(PF_NETLINK, SOCK_RAW, NETLINK_AUDIT) = 3
fcntl(3, F_SETFD, FD_CLOEXEC)           = 0
sendto(3, "\20\0\0\0\350\3\5\0\1\0\0\0\0\0\0\0", 16, 0, {sa_family=AF_NETLINK, pid=0, groups=00000000}, 12) = 16
poll([{fd=3, events=POLLIN}], 1, 500)   = 1 ([{fd=3, revents=POLLIN}])
recvfrom(3, "$\0\0\0\2\0\0\0\1\0\0\0f\"\0\0\0\0\0\0\20\0\0\0\350\3\5\0\1\0\0\0"..., 8988, MSG_PEEK|MSG_DONTWAIT, {sa_family=AF_NETLINK, pid=0, groups=00000000}, [12]) = 36
recvfrom(3, "$\0\0\0\2\0\0\0\1\0\0\0f\"\0\0\0\0\0\0\20\0\0\0\350\3\5\0\1\0\0\0"..., 8988, MSG_DONTWAIT, {sa_family=AF_NETLINK, pid=0, groups=00000000}, [12]) = 36
select(4, [3], NULL, NULL, {0, 100000}) = 1 (in [3], left {0, 99995})
recvfrom(3, "8\0\0\0\350\3\0\0\1\0\0\0f\"\0\0\0\0\0\0\1\0\0\0\1\0\0\0\311 \0\0"..., 8988, MSG_DONTWAIT, {sa_family=AF_NETLINK, pid=0, groups=00000000}, [12]) = 56
fstat(1, {st_mode=S_IFCHR|0600, st_rdev=makedev(136, 0), ...}) = 0
mmap(NULL, 4096, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_ANONYMOUS, -1, 0) = 0x7f3ed1134000
write(1, "enabled 1\n", 10enabled 1
)             = 10
write(1, "flag 1\n", 7flag 1
)                 = 7
write(1, "pid 8393\n", 9pid 8393
)               = 9
write(1, "rate_limit 0\n", 13rate_limit 0
)          = 13
write(1, "backlog_limit 320\n", 18backlog_limit 320
)     = 18
write(1, "lost 0\n", 7lost 0
)                 = 7
write(1, "backlog 0\n", 10backlog 0
)             = 10
sendto(3, " \0\0\0\373\3\5\0\2\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0", 32, 0, {sa_family=AF_NETLINK, pid=0, groups=00000000}, 12) = 32
poll([{fd=3, events=POLLIN}], 1, 500)   = 1 ([{fd=3, revents=POLLIN}])
recvfrom(3, "$\0\0\0\2\0\0\0\2\0\0\0f\"\0\0\0\0\0\0 \0\0\0\373\3\5\0\2\0\0\0"..., 8988, MSG_PEEK|MSG_DONTWAIT, {sa_family=AF_NETLINK, pid=0, groups=00000000}, [12]) = 36
recvfrom(3, "$\0\0\0\2\0\0\0\2\0\0\0f\"\0\0\0\0\0\0 \0\0\0\373\3\5\0\2\0\0\0"..., 8988, MSG_DONTWAIT, {sa_family=AF_NETLINK, pid=0, groups=00000000}, [12]) = 36
select(4, [3], NULL, NULL, {0, 100000}) = 1 (in [3], left {0, 99990})
recvfrom(3, " \0\0\0\373\3\0\0\2\0\0\0f\"\0\0\1\0\0\0\377\377\377\377\0\0\0\0\0\0\0\0", 8988, MSG_DONTWAIT, {sa_family=AF_NETLINK, pid=0, groups=00000000}, [12]) = 32
--- SIGSEGV {si_signo=SIGSEGV, si_code=SEGV_MAPERR, si_addr=0x4} ---
+++ killed by SIGSEGV +++
Segmentation fault








Send a report that this bug log contains spam.


Devuan BTS -- Powered by Debian bug tracking system
Copyright (C) 1999 Darren O. Benham,
1997,2003 nCipher Corporation Ltd, 1994-97 Ian Jackson,
2005-2017 Don Armstrong, and many other contributors.

Devuan Bugs Owner <owner@bugs.devuan.org>.
Last modified: Tue Apr 30 03:41:37 2024;