Devuan bug report logs - #113
auditctl segmentation fault

version graph

Package: auditd; Maintainer for auditd is (unknown); Source for auditd is src:audit.

Reported by: Mauro Rappa <maurorappa@aol.co.uk>

Date: Thu, 6 Jul 2017 11:33:01 UTC

Severity: normal

Tags: debian, jessie

Fixed in version 1:2.6.7-2

Done: Mark Hindley <mark@hindley.org.uk>

Forwarded to https://bugs.debian.org/859120

Reply or subscribe to this bug.

Toggle useless messages

View this report as an mbox folder, status mbox, maintainer mbox


Report forwarded to devuan-bugs@lists.dyne.org, owner@bugs.devuan.org:
bug#113; Package auditd. (full text, mbox, link).


Acknowledgement sent to Mauro Rappa <maurorappa@aol.co.uk>:
New bug report received and forwarded. Copy sent to owner@bugs.devuan.org. (full text, mbox, link).


Message #5 received at submit@bugs.devuan.org (full text, mbox, reply):

From: Mauro Rappa <maurorappa@aol.co.uk>
To: submit@bugs.devuan.org
Subject: auditctl segmentation fault
Date: Thu, 6 Jul 2017 12:11:26 +0100
Package: auditd                          
Version: 1:2.4-1+b1 

Hi,
Jessie throws a seg fault when running a simple command like:

root@devuan:~# auditctl -s
enabled 1
flag 1
pid 8393
rate_limit 0
backlog_limit 320
lost 0
backlog 0
Segmentation fault


Running a strace it seems it cannot handle the response form the socket (too big?)

root@devuan:~# strace auditctl -s
execve("/sbin/auditctl", ["auditctl", "-s"], [/* 12 vars */]) = 0
brk(0)                                  = 0x5623724d5000
access("/etc/ld.so.nohwcap", F_OK)      = -1 ENOENT (No such file or directory)
mmap(NULL, 8192, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_ANONYMOUS, -1, 0) = 0x7f3ed1135000
access("/etc/ld.so.preload", R_OK)      = -1 ENOENT (No such file or directory)
open("/etc/ld.so.cache", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0644, st_size=35244, ...}) = 0
mmap(NULL, 35244, PROT_READ, MAP_PRIVATE, 3, 0) = 0x7f3ed112c000
close(3)                                = 0
access("/etc/ld.so.nohwcap", F_OK)      = -1 ENOENT (No such file or directory)
open("/lib/x86_64-linux-gnu/libaudit.so.1", O_RDONLY|O_CLOEXEC) = 3
read(3, "\177ELF\2\1\1\0\0\0\0\0\0\0\0\0\3\0>\0\1\0\0\0\20*\0\0\0\0\0\0"..., 832) = 832
fstat(3, {st_mode=S_IFREG|0644, st_size=113024, ...}) = 0
mmap(NULL, 2249344, PROT_READ|PROT_EXEC, MAP_PRIVATE|MAP_DENYWRITE, 3, 0) = 0x7f3ed0cf1000
mprotect(0x7f3ed0d0b000, 2093056, PROT_NONE) = 0
mmap(0x7f3ed0f0a000, 12288, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_FIXED|MAP_DENYWRITE, 3, 0x19000) = 0x7f3ed0f0a000
mmap(0x7f3ed0f0d000, 37504, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_FIXED|MAP_ANONYMOUS, -1, 0) = 0x7f3ed0f0d000
close(3)                                = 0
access("/etc/ld.so.nohwcap", F_OK)      = -1 ENOENT (No such file or directory)
open("/lib/x86_64-linux-gnu/libauparse.so.0", O_RDONLY|O_CLOEXEC) = 3
read(3, "\177ELF\2\1\1\0\0\0\0\0\0\0\0\0\3\0>\0\1\0\0\0\220(\0\0\0\0\0\0"..., 832) = 832
fstat(3, {st_mode=S_IFREG|0644, st_size=88624, ...}) = 0
mmap(NULL, 2183984, PROT_READ|PROT_EXEC, MAP_PRIVATE|MAP_DENYWRITE, 3, 0) = 0x7f3ed0adb000
mprotect(0x7f3ed0af0000, 2093056, PROT_NONE) = 0
mmap(0x7f3ed0cef000, 8192, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_FIXED|MAP_DENYWRITE, 3, 0x14000) = 0x7f3ed0cef000
close(3)                                = 0
access("/etc/ld.so.nohwcap", F_OK)      = -1 ENOENT (No such file or directory)
open("/lib/x86_64-linux-gnu/libc.so.6", O_RDONLY|O_CLOEXEC) = 3
read(3, "\177ELF\2\1\1\3\0\0\0\0\0\0\0\0\3\0>\0\1\0\0\0P\34\2\0\0\0\0\0"..., 832) = 832
fstat(3, {st_mode=S_IFREG|0755, st_size=1738176, ...}) = 0
mmap(NULL, 4096, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_ANONYMOUS, -1, 0) = 0x7f3ed112b000
mmap(NULL, 3844640, PROT_READ|PROT_EXEC, MAP_PRIVATE|MAP_DENYWRITE, 3, 0) = 0x7f3ed0730000
mprotect(0x7f3ed08d1000, 2097152, PROT_NONE) = 0
mmap(0x7f3ed0ad1000, 24576, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_FIXED|MAP_DENYWRITE, 3, 0x1a1000) = 0x7f3ed0ad1000
mmap(0x7f3ed0ad7000, 14880, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_FIXED|MAP_ANONYMOUS, -1, 0) = 0x7f3ed0ad7000
close(3)                                = 0
mmap(NULL, 4096, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_ANONYMOUS, -1, 0) = 0x7f3ed112a000
mmap(NULL, 4096, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_ANONYMOUS, -1, 0) = 0x7f3ed1129000
arch_prctl(ARCH_SET_FS, 0x7f3ed112a700) = 0
mprotect(0x7f3ed0ad1000, 16384, PROT_READ) = 0
mprotect(0x7f3ed0f0a000, 8192, PROT_READ) = 0
mprotect(0x7f3ed0cef000, 4096, PROT_READ) = 0
mprotect(0x5623714e3000, 4096, PROT_READ) = 0
mprotect(0x7f3ed1137000, 4096, PROT_READ) = 0
munmap(0x7f3ed112c000, 35244)           = 0
geteuid()                               = 0
brk(0)                                  = 0x5623724d5000
brk(0x5623724f6000)                     = 0x5623724f6000
socket(PF_NETLINK, SOCK_RAW, NETLINK_AUDIT) = 3
fcntl(3, F_SETFD, FD_CLOEXEC)           = 0
sendto(3, "\20\0\0\0\350\3\5\0\1\0\0\0\0\0\0\0", 16, 0, {sa_family=AF_NETLINK, pid=0, groups=00000000}, 12) = 16
poll([{fd=3, events=POLLIN}], 1, 500)   = 1 ([{fd=3, revents=POLLIN}])
recvfrom(3, "$\0\0\0\2\0\0\0\1\0\0\0f\"\0\0\0\0\0\0\20\0\0\0\350\3\5\0\1\0\0\0"..., 8988, MSG_PEEK|MSG_DONTWAIT, {sa_family=AF_NETLINK, pid=0, groups=00000000}, [12]) = 36
recvfrom(3, "$\0\0\0\2\0\0\0\1\0\0\0f\"\0\0\0\0\0\0\20\0\0\0\350\3\5\0\1\0\0\0"..., 8988, MSG_DONTWAIT, {sa_family=AF_NETLINK, pid=0, groups=00000000}, [12]) = 36
select(4, [3], NULL, NULL, {0, 100000}) = 1 (in [3], left {0, 99995})
recvfrom(3, "8\0\0\0\350\3\0\0\1\0\0\0f\"\0\0\0\0\0\0\1\0\0\0\1\0\0\0\311 \0\0"..., 8988, MSG_DONTWAIT, {sa_family=AF_NETLINK, pid=0, groups=00000000}, [12]) = 56
fstat(1, {st_mode=S_IFCHR|0600, st_rdev=makedev(136, 0), ...}) = 0
mmap(NULL, 4096, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_ANONYMOUS, -1, 0) = 0x7f3ed1134000
write(1, "enabled 1\n", 10enabled 1
)             = 10
write(1, "flag 1\n", 7flag 1
)                 = 7
write(1, "pid 8393\n", 9pid 8393
)               = 9
write(1, "rate_limit 0\n", 13rate_limit 0
)          = 13
write(1, "backlog_limit 320\n", 18backlog_limit 320
)     = 18
write(1, "lost 0\n", 7lost 0
)                 = 7
write(1, "backlog 0\n", 10backlog 0
)             = 10
sendto(3, " \0\0\0\373\3\5\0\2\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0", 32, 0, {sa_family=AF_NETLINK, pid=0, groups=00000000}, 12) = 32
poll([{fd=3, events=POLLIN}], 1, 500)   = 1 ([{fd=3, revents=POLLIN}])
recvfrom(3, "$\0\0\0\2\0\0\0\2\0\0\0f\"\0\0\0\0\0\0 \0\0\0\373\3\5\0\2\0\0\0"..., 8988, MSG_PEEK|MSG_DONTWAIT, {sa_family=AF_NETLINK, pid=0, groups=00000000}, [12]) = 36
recvfrom(3, "$\0\0\0\2\0\0\0\2\0\0\0f\"\0\0\0\0\0\0 \0\0\0\373\3\5\0\2\0\0\0"..., 8988, MSG_DONTWAIT, {sa_family=AF_NETLINK, pid=0, groups=00000000}, [12]) = 36
select(4, [3], NULL, NULL, {0, 100000}) = 1 (in [3], left {0, 99990})
recvfrom(3, " \0\0\0\373\3\0\0\2\0\0\0f\"\0\0\1\0\0\0\377\377\377\377\0\0\0\0\0\0\0\0", 8988, MSG_DONTWAIT, {sa_family=AF_NETLINK, pid=0, groups=00000000}, [12]) = 32
--- SIGSEGV {si_signo=SIGSEGV, si_code=SEGV_MAPERR, si_addr=0x4} ---
+++ killed by SIGSEGV +++
Segmentation fault









Tags added: jessie Request was from KatolaZ <katolaz@freaknet.org> to control@bugs.devuan.org. (full text, mbox, link).


Information forwarded to devuan-bugs@lists.dyne.org, devuan-dev@lists.dyne.org:
bug#113; Package auditd. (Wed, 11 Jan 2023 07:44:01 GMT) (full text, mbox, link).


Message #10 received at 113@bugs.devuan.org (full text, mbox, reply):

From: Mark Hindley <mark@hindley.org.uk>
To: Mauro Rappa <maurorappa@aol.co.uk>, 113@bugs.devuan.org
Subject: Re: bug#113: auditctl segmentation fault
Date: Wed, 11 Jan 2023 07:42:01 +0000
Control: forwarded -1 https://bugs.debian.org/859120
Control: tags -1 debian

On Thu, Jul 06, 2017 at 12:11:26PM +0100, Mauro Rappa wrote:
> Package: auditd                          
> Version: 1:2.4-1+b1 
> 
> Hi,
> Jessie throws a seg fault when running a simple command like:

I think this is #859120 (fixed).

Mark

Set bug forwarded-to-address to 'https://bugs.debian.org/859120'. Request was from Mark Hindley <mark@hindley.org.uk> to 113-submit@bugs.devuan.org. (Wed, 11 Jan 2023 07:44:02 GMT) (full text, mbox, link).


Added tag(s) debian. Request was from Mark Hindley <mark@hindley.org.uk> to 113-submit@bugs.devuan.org. (Wed, 11 Jan 2023 07:44:02 GMT) (full text, mbox, link).


Reply sent to Mark Hindley <mark@hindley.org.uk>:
You have taken responsibility. (Wed, 11 Jan 2023 08:00:02 GMT) (full text, mbox, link).


Notification sent to Mauro Rappa <maurorappa@aol.co.uk>:
bug acknowledged by developer. (Wed, 11 Jan 2023 08:00:03 GMT) (full text, mbox, link).


Message #19 received at 113-done@bugs.devuan.org (full text, mbox, reply):

From: Mark Hindley <mark@hindley.org.uk>
To: 113-done@bugs.devuan.org
Subject: Fixed in Debian #859120
Date: Wed, 11 Jan 2023 07:57:22 +0000
Version: 1:2.6.7-2

Send a report that this bug log contains spam.


Devuan BTS -- Powered by Debian bug tracking system
Copyright (C) 1999 Darren O. Benham,
1997,2003 nCipher Corporation Ltd, 1994-97 Ian Jackson,
2005-2017 Don Armstrong, and many other contributors.

Devuan Bugs Owner <owner@bugs.devuan.org>.
Last modified: Sat Apr 20 14:19:07 2024;