Login
[x]
Log in using an account from:
Fedora Account System
Red Hat Associate
Red Hat Customer
Or login using a Red Hat Bugzilla account
Forgot Password
Login:
Hide Forgot
Create an Account
Red Hat Bugzilla – Attachment 224201 Details for
Bug 327451
sshd segfaults when thinkfinger is configured
[?]
New
Simple Search
Advanced Search
My Links
Browse
Requests
Reports
Current State
Search
Tabular reports
Graphical reports
Duplicates
Other Reports
User Changes
Plotly Reports
Bug Status
Bug Severity
Non-Defaults
|
Product Dashboard
Help
Page Help!
Bug Writing Guidelines
What's new
Browser Support Policy
5.0.4.rh83 Release notes
FAQ
Guides index
User guide
Web Services
Contact
Legal
This site requires JavaScript to be enabled to function correctly, please enable it.
output of sshd -d -d -d -D -e (plus a cut and paste of the stacktrace)
sshd_error (text/plain), 18.99 KB, created by
Moritz Baumann
on 2007-10-11 10:02:56 UTC
(
hide
)
Description:
output of sshd -d -d -d -D -e (plus a cut and paste of the stacktrace)
Filename:
MIME Type:
Creator:
Moritz Baumann
Created:
2007-10-11 10:02:56 UTC
Size:
18.99 KB
patch
obsolete
>debug2: load_server_config: filename /etc/ssh/sshd_config >debug2: load_server_config: done config len = 523 >debug2: parse_server_config: config /etc/ssh/sshd_config len 523 >debug3: /etc/ssh/sshd_config:15 setting Protocol 2 >debug3: /etc/ssh/sshd_config:33 setting SyslogFacility AUTHPRIV >debug3: /etc/ssh/sshd_config:60 setting PasswordAuthentication yes >debug3: /etc/ssh/sshd_config:64 setting ChallengeResponseAuthentication no >debug3: /etc/ssh/sshd_config:74 setting GSSAPIAuthentication yes >debug3: /etc/ssh/sshd_config:76 setting GSSAPICleanupCredentials yes >debug3: /etc/ssh/sshd_config:88 setting UsePAM yes >debug3: /etc/ssh/sshd_config:91 setting AcceptEnv LANG LC_CTYPE LC_NUMERIC LC_TIME LC_COLLATE LC_MONETARY LC_MESSAGES >debug3: /etc/ssh/sshd_config:92 setting AcceptEnv LC_PAPER LC_NAME LC_ADDRESS LC_TELEPHONE LC_MEASUREMENT >debug3: /etc/ssh/sshd_config:93 setting AcceptEnv LC_IDENTIFICATION LC_ALL >debug3: /etc/ssh/sshd_config:97 setting X11Forwarding yes >debug3: /etc/ssh/sshd_config:119 setting Subsystem sftp /usr/libexec/openssh/sftp-server >debug1: sshd version OpenSSH_4.5p1 >debug3: Not a RSA1 key file /etc/ssh/ssh_host_rsa_key. >debug1: read PEM private key done: type RSA >debug1: private host key: #0 type 1 RSA >debug3: Not a RSA1 key file /etc/ssh/ssh_host_dsa_key. >debug1: read PEM private key done: type DSA >debug1: private host key: #1 type 2 DSA >debug1: rexec_argv[0]='/usr/sbin/sshd' >debug1: rexec_argv[1]='-d' >debug1: rexec_argv[2]='-d' >debug1: rexec_argv[3]='-d' >debug1: rexec_argv[4]='-d' >debug1: rexec_argv[5]='-D' >debug1: rexec_argv[6]='-e' >debug2: fd 3 setting O_NONBLOCK >debug1: Bind to port 22 on ::. >Server listening on :: port 22. >debug2: fd 4 setting O_NONBLOCK >debug1: Bind to port 22 on 0.0.0.0. >Bind to port 22 on 0.0.0.0 failed: Address already in use. >debug3: fd 4 is not O_NONBLOCK >debug1: Server will not fork when running in debugging mode. >debug3: send_rexec_state: entering fd = 7 config len 523 >debug3: ssh_msg_send: type 0 >debug3: send_rexec_state: done >debug1: rexec start in 4 out 4 newsock 4 pipe -1 sock 7 >debug3: recv_rexec_state: entering fd = 5 >debug3: ssh_msg_recv entering >debug3: recv_rexec_state: done >debug2: parse_server_config: config rexec len 523 >debug3: rexec:15 setting Protocol 2 >debug3: rexec:33 setting SyslogFacility AUTHPRIV >debug3: rexec:60 setting PasswordAuthentication yes >debug3: rexec:64 setting ChallengeResponseAuthentication no >debug3: rexec:74 setting GSSAPIAuthentication yes >debug3: rexec:76 setting GSSAPICleanupCredentials yes >debug3: rexec:88 setting UsePAM yes >debug3: rexec:91 setting AcceptEnv LANG LC_CTYPE LC_NUMERIC LC_TIME LC_COLLATE LC_MONETARY LC_MESSAGES >debug3: rexec:92 setting AcceptEnv LC_PAPER LC_NAME LC_ADDRESS LC_TELEPHONE LC_MEASUREMENT >debug3: rexec:93 setting AcceptEnv LC_IDENTIFICATION LC_ALL >debug3: rexec:97 setting X11Forwarding yes >debug3: rexec:119 setting Subsystem sftp /usr/libexec/openssh/sftp-server >debug1: sshd version OpenSSH_4.5p1 >debug3: Not a RSA1 key file /etc/ssh/ssh_host_rsa_key. >debug1: read PEM private key done: type RSA >debug1: private host key: #0 type 1 RSA >debug3: Not a RSA1 key file /etc/ssh/ssh_host_dsa_key. >debug1: read PEM private key done: type DSA >debug1: private host key: #1 type 2 DSA >debug1: inetd sockets after dupping: 3, 3 >debug3: Normalising mapped IPv4 in IPv6 address >debug3: Normalising mapped IPv4 in IPv6 address >Connection from 129.132.10.89 port 50693 >debug1: Client protocol version 2.0; client software version OpenSSH_4.3 >debug1: match: OpenSSH_4.3 pat OpenSSH* >debug1: Enabling compatibility mode for protocol 2.0 >debug1: Local version string SSH-2.0-OpenSSH_4.5 >debug2: fd 3 setting O_NONBLOCK >debug3: privsep user:group 74:74 >debug1: permanently_set_uid: 74/74 >debug1: list_hostkey_types: ssh-rsa,ssh-dss >debug1: SSH2_MSG_KEXINIT sent >debug1: SSH2_MSG_KEXINIT received >debug2: kex_parse_kexinit: diffie-hellman-group-exchange-sha256,diffie-hellman-group-exchange-sha1,diffie-hellman-group14-sha1,diffie-hellman-group1-sha1 >debug2: kex_parse_kexinit: ssh-rsa,ssh-dss >debug2: kex_parse_kexinit: aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,arcfour128,arcfour256,arcfour,aes192-cbc,aes256-cbc,rijndael-cbc@lysator.liu.se,aes128-ctr,aes192-ctr,aes256-ctr >debug2: kex_parse_kexinit: aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,arcfour128,arcfour256,arcfour,aes192-cbc,aes256-cbc,rijndael-cbc@lysator.liu.se,aes128-ctr,aes192-ctr,aes256-ctr >debug2: kex_parse_kexinit: hmac-md5,hmac-sha1,hmac-ripemd160,hmac-ripemd160@openssh.com,hmac-sha1-96,hmac-md5-96 >debug2: kex_parse_kexinit: hmac-md5,hmac-sha1,hmac-ripemd160,hmac-ripemd160@openssh.com,hmac-sha1-96,hmac-md5-96 >debug2: kex_parse_kexinit: none,zlib@openssh.com >debug2: kex_parse_kexinit: none,zlib@openssh.com >debug2: kex_parse_kexinit: >debug2: kex_parse_kexinit: >debug2: kex_parse_kexinit: first_kex_follows 0 >debug2: Network child is on pid 4173 >debug3: preauth child monitor started >debug3: mm_request_receive entering >debug2: kex_parse_kexinit: reserved 0 >debug2: kex_parse_kexinit: diffie-hellman-group-exchange-sha1,diffie-hellman-group14-sha1,diffie-hellman-group1-sha1 >debug2: kex_parse_kexinit: ssh-rsa,ssh-dss >debug2: kex_parse_kexinit: aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,arcfour128,arcfour256,arcfour,aes192-cbc,aes256-cbc,rijndael-cbc@lysator.liu.se,aes128-ctr,aes192-ctr,aes256-ctr >debug2: kex_parse_kexinit: aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,arcfour128,arcfour256,arcfour,aes192-cbc,aes256-cbc,rijndael-cbc@lysator.liu.se,aes128-ctr,aes192-ctr,aes256-ctr >debug2: kex_parse_kexinit: hmac-md5,hmac-sha1,hmac-ripemd160,hmac-ripemd160@openssh.com,hmac-sha1-96,hmac-md5-96 >debug2: kex_parse_kexinit: hmac-md5,hmac-sha1,hmac-ripemd160,hmac-ripemd160@openssh.com,hmac-sha1-96,hmac-md5-96 >debug2: kex_parse_kexinit: none,zlib@openssh.com,zlib >debug2: kex_parse_kexinit: none,zlib@openssh.com,zlib >debug2: kex_parse_kexinit: >debug2: kex_parse_kexinit: >debug2: kex_parse_kexinit: first_kex_follows 0 >debug2: kex_parse_kexinit: reserved 0 >debug2: mac_init: found hmac-md5 >debug1: kex: client->server aes128-cbc hmac-md5 none >debug2: mac_init: found hmac-md5 >debug1: kex: server->client aes128-cbc hmac-md5 none >debug1: SSH2_MSG_KEX_DH_GEX_REQUEST received >debug3: mm_request_send entering: type 0 >debug3: mm_choose_dh: waiting for MONITOR_ANS_MODULI >debug3: mm_request_receive_expect entering: type 1 >debug3: mm_request_receive entering >debug3: monitor_read: checking request 0 >debug3: mm_answer_moduli: got parameters: 1024 1024 8192 >debug3: mm_request_send entering: type 1 >debug2: monitor_read: 0 used once, disabling now >debug3: mm_request_receive entering >debug3: mm_choose_dh: remaining 0 >debug1: SSH2_MSG_KEX_DH_GEX_GROUP sent >debug2: dh_gen_key: priv key bits set: 140/256 >debug2: bits set: 474/1024 >debug1: expecting SSH2_MSG_KEX_DH_GEX_INIT >debug2: bits set: 511/1024 >debug3: mm_key_sign entering >debug3: mm_request_send entering: type 5 >debug3: mm_key_sign: waiting for MONITOR_ANS_SIGN >debug3: mm_request_receive_expect entering: type 6 >debug3: monitor_read: checking request 5 >debug3: mm_answer_sign >debug3: mm_answer_sign: signature 0x80b3b0a8(271) >debug3: mm_request_send entering: type 6 >debug2: monitor_read: 5 used once, disabling now >debug3: mm_request_receive entering >debug1: SSH2_MSG_KEX_DH_GEX_REPLY sent >debug2: kex_derive_keys >debug2: set_newkeys: mode 1 >debug1: SSH2_MSG_NEWKEYS sent >debug1: expecting SSH2_MSG_NEWKEYS >debug2: set_newkeys: mode 0 >debug1: SSH2_MSG_NEWKEYS received >debug1: KEX done >debug1: userauth-request for user baumanmo service ssh-connection method none >debug1: attempt 0 failures 0 >debug3: mm_getpwnamallow entering >debug3: mm_request_send entering: type 7 >debug3: mm_getpwnamallow: waiting for MONITOR_ANS_PWNAM >debug3: mm_request_receive_expect entering: type 8 >debug3: monitor_read: checking request 7 >debug3: mm_answer_pwnamallow >debug3: Normalising mapped IPv4 in IPv6 address >debug3: Trying to reverse map address 129.132.10.89. >debug2: parse_server_config: config reprocess config len 523 >debug3: mm_answer_pwnamallow: sending MONITOR_ANS_PWNAM: 1 >debug3: mm_request_send entering: type 8 >debug2: monitor_read: 7 used once, disabling now >debug3: mm_request_receive entering >debug2: input_userauth_request: setting up authctxt for baumanmo >debug3: mm_start_pam entering >debug3: mm_request_send entering: type 46 >debug3: mm_inform_authserv entering >debug3: mm_request_send entering: type 3 >debug3: monitor_read: checking request 46 >debug3: mm_inform_authrole entering >debug3: mm_request_send entering: type 4 >debug2: input_userauth_request: try method none >debug1: PAM: setting PAM_RHOST to "ricochet.inf.ethz.ch" >debug1: PAM: setting PAM_TTY to "ssh" >debug2: monitor_read: 46 used once, disabling now >debug3: mm_request_receive entering >debug3: monitor_read: checking request 3 >debug3: mm_answer_authserv: service=ssh-connection, style= >debug2: monitor_read: 3 used once, disabling now >debug3: mm_request_receive entering >debug3: monitor_read: checking request 4 >debug3: mm_answer_authrole: role= >debug2: monitor_read: 4 used once, disabling now >debug3: mm_request_receive entering >debug1: userauth-request for user baumanmo service ssh-connection method publickey >debug1: attempt 1 failures 1 >debug2: input_userauth_request: try method publickey >debug1: test whether pkalg/pkblob are acceptable >debug3: mm_key_allowed entering >debug3: mm_request_send entering: type 21 >debug3: mm_key_allowed: waiting for MONITOR_ANS_KEYALLOWED >debug3: mm_request_receive_expect entering: type 22 >debug3: mm_request_receive entering >debug3: monitor_read: checking request 21 >debug3: mm_answer_keyallowed entering >debug3: mm_answer_keyallowed: key_from_blob: 0x80b42ff0 >debug1: temporarily_use_uid: 500/500 (e=0/0) >debug1: trying public key file /home/baumanmo/.ssh/authorized_keys >debug3: secure_filename: checking '/home/baumanmo/.ssh' >debug3: secure_filename: checking '/home/baumanmo' >debug3: secure_filename: terminating check at '/home/baumanmo' >debug1: matching key found: file /home/baumanmo/.ssh/authorized_keys, line 1 >Found matching DSA key: 68:b1:b5:1b:68:8c:d5:6f:02:a2:8d:b1:93:bc:53:38 >debug1: restore_uid: 0/0 >debug3: mm_answer_keyallowed: key 0x80b42ff0 is allowed >debug3: mm_request_send entering: type 22 >debug3: mm_request_receive entering >debug2: userauth_pubkey: authenticated 0 pkalg ssh-dss >Postponed publickey for baumanmo from 129.132.10.89 port 50693 ssh2 >debug1: userauth-request for user baumanmo service ssh-connection method password >debug1: attempt 2 failures 1 >debug2: input_userauth_request: try method password >debug3: mm_auth_password entering >debug3: mm_request_send entering: type 11 >debug3: mm_auth_password: waiting for MONITOR_ANS_AUTHPASSWORD >debug3: mm_request_receive_expect entering: type 12 >debug3: mm_request_receive entering >debug3: monitor_read: checking request 11 >debug3: PAM: sshpam_passwd_conv called with 1 messages >debug1: do_cleanup >*** glibc detected *** sshd: baumanmo [priv]: malloc(): memory corruption: 0x80b48988 *** >======= Backtrace: ========= >/lib/libc.so.6[0x46a583] >/lib/libc.so.6(__libc_malloc+0x7e)[0x46bebe] >/lib/libc.so.6[0x48dd33] >/lib/libc.so.6(opendir+0x63)[0x48de13] >/usr/lib/libusb-0.1.so.4(usb_os_find_busses+0x22)[0x5e04b2] >/usr/lib/libusb-0.1.so.4(usb_find_busses+0x1f)[0x5dd8ff] >/usr/lib/libthinkfinger.so.0[0x5c10cc] >/usr/lib/libthinkfinger.so.0[0x5c1792] >/usr/lib/libthinkfinger.so.0(libthinkfinger_verify+0x67)[0x5c1c87] >/lib/security/pam_thinkfinger.so[0x5be6bf] >/lib/libpthread.so.0[0x5c944b] >/lib/libc.so.6(clone+0x5e)[0x4d280e] >======= Memory map: ======== >00110000-0012b000 r-xp 00000000 fd:00 98343 /lib/ld-2.6.so >0012b000-0012c000 r-xp 0001a000 fd:00 98343 /lib/ld-2.6.so >0012c000-0012d000 rwxp 0001b000 fd:00 98343 /lib/ld-2.6.so >0012d000-0012e000 r-xp 0012d000 00:00 0 [vdso] >0012e000-00135000 r-xp 00000000 fd:00 98322 /lib/libwrap.so.0.7.6 >00135000-00136000 rwxp 00007000 fd:00 98322 /lib/libwrap.so.0.7.6 >00136000-00140000 r-xp 00000000 fd:00 99348 /lib/libpam.so.0.81.6 >00140000-00141000 rwxp 00009000 fd:00 99348 /lib/libpam.so.0.81.6 >00141000-00144000 r-xp 00000000 fd:00 98529 /lib/libdl-2.6.so >00144000-00145000 r-xp 00002000 fd:00 98529 /lib/libdl-2.6.so >00145000-00146000 rwxp 00003000 fd:00 98529 /lib/libdl-2.6.so >00146000-0015c000 r-xp 00000000 fd:00 98566 /lib/libselinux.so.1 >0015c000-0015e000 rwxp 00015000 fd:00 98566 /lib/libselinux.so.1 >0015e000-00171000 r-xp 00000000 fd:00 98381 /lib/libaudit.so.0.0.0 >00171000-00173000 rwxp 00012000 fd:00 98381 /lib/libaudit.so.0.0.0 >00173000-00183000 r-xp 00000000 fd:00 98730 /lib/libresolv-2.6.so >00183000-00184000 r-xp 0000f000 fd:00 98730 /lib/libresolv-2.6.so >00184000-00185000 rwxp 00010000 fd:00 98730 /lib/libresolv-2.6.so >00185000-00187000 rwxp 00185000 00:00 0 >00187000-002a4000 r-xp 00000000 fd:00 98519 /lib/libcrypto.so.0.9.8b >002a4000-002b7000 rwxp 0011c000 fd:00 98519 /lib/libcrypto.so.0.9.8b >002b7000-002ba000 rwxp 002b7000 00:00 0 >002ba000-002bc000 r-xp 00000000 fd:00 98744 /lib/libutil-2.6.so >002bc000-002bd000 r-xp 00001000 fd:00 98744 /lib/libutil-2.6.so >002bd000-002be000 rwxp 00002000 fd:00 98744 /lib/libutil-2.6.so >002be000-002d0000 r-xp 00000000 fd:00 98725 /lib/libz.so.1.2.3 >002d0000-002d1000 rwxp 00011000 fd:00 98725 /lib/libz.so.1.2.3 >002d1000-002e6000 r-xp 00000000 fd:00 98741 /lib/libnsl-2.6.so >002e6000-002e7000 r-xp 00014000 fd:00 98741 /lib/libnsl-2.6.so >002e7000-002e8000 rwxp 00015000 fd:00 98741 /lib/libnsl-2.6.so >002e8000-002ea000 rwxp 002e8000 00:00 0 >002ea000-002ef000 r-xp 00000000 fd:00 98731 /lib/libcrypt-2.6.so >002ef000-002f0000 r-xp 00004000 fd:00 98731 /lib/libcrypt-2.6.so >002f0000-002f1000 rwxp 00005000 fd:00 98731 /lib/libcrypt-2.6.so >002f1000-00318000 rwxp 002f1000 00:00 0 >00318000-00345000 r-xp 00000000 fd:06 1650757 /usr/lib/libgssapi_krb5.so.2.2 >00345000-00346000 rwxp 0002d000 fd:06 1650757 /usr/lib/libgssapi_krb5.so.2.2 >00346000-003d6000 r-xp 00000000 fd:06 1650756 /usr/lib/libkrb5.so.3.3 >003d6000-003d9000 rwxp 0008f000 fd:06 1650756 /usr/lib/libkrb5.so.3.3 >003d9000-003fe000 r-xp 00000000 fd:06 1650755 /usr/lib/libk5crypto.so.3.1 >003fe000-003ff000 rwxp 00025000 fd:06 1650755 /usr/lib/libk5crypto.so.3.1 >003ff000-00401000 r-xp 00000000 fd:00 98376 /lib/libcom_err.so.2.1 >00401000-00402000 rwxp 00001000 fd:00 98376 /lib/libcom_err.so.2.1 >00402000-00550000 r-xp 00000000 fd:00 98345 /lib/libc-2.6.so >00550000-00552000 r-xp 0014e000 fd:00 98345 /lib/libc-2.6.so >00552000-00553000 rwxp 00150000 fd:00 98345 /lib/libc-2.6.so >00553000-00556000 rwxp 00553000 00:00 0 >00556000-00591000 r-xp 00000000 fd:00 98611 /lib/libsepol.so.1 >00591000-00592000 rwxp 0003b000 fd:00 98611 /lib/libsepol.so.1 >00592000-0059c000 rwxp 00592000 00:00 0 >0059c000-005a3000 r-xp 00000000 fd:06 1650754 /usr/lib/libkrb5support.so.0.1 >005a3000-005a4000 rwxp 00006000 fd:06 1650754 /usr/lib/libkrb5support.so.0.1 >005a4000-005a6000 r-xp 00000000 fd:00 98732 /lib/libkeyutils-1.2.so >005a6000-005a7000 rwxp 00001000 fd:00 98732 /lib/libkeyutils-1.2.so >005a7000-005b1000 r-xp 00000000 fd:00 98344 /lib/libnss_files-2.6.so >005b1000-005b2000 r-xp 00009000 fd:00 98344 /lib/libnss_files-2.6.so >005b2000-005b3000 rwxp 0000a000 fd:00 98344 /lib/libnss_files-2.6.so >005b3000-005b7000 r-xp 00000000 fd:00 98342 /lib/libnss_dns-2.6.so >005b7000-005b8000 r-xp 00003000 fd:00 98342 /lib/libnss_dns-2.6.so >005b8000-005b9000 rwxp 00004000 fd:00 98342 /lib/libnss_dns-2.6.so >005b9000-005bc000 r-xp 00000000 fd:00 98471 /lib/security/pam_env.so >005bc000-005bd000 rwxp 00002000 fd:00 98471 /lib/security/pam_env.so >005bd000-005bf000 r-xp 00000000 fd:00 98559 /lib/security/pam_thinkfinger.so >005bf000-005c0000 rwxp 00002000 fd:00 98559 /lib/security/pam_thinkfinger.so >005c0000-005c3000 r-xp 00000000 fd:06 1650601 /usr/lib/libthinkfinger.so.0.0.0 >005c3000-005c4000 rwxp 00002000 fd:06 1650601 /usr/lib/libthinkfinger.so.0.0.0 >005c4000-005d8000 r-xp 00000000 fd:00 98728 /lib/libpthread-2.6.so >005d8000-005d9000 r-xp 00013000 fd:00 98728 /lib/libpthread-2.6.so >005d9000-005da000 rwxp 00014000 fd:00 98728 /lib/libpthread-2.6.so >005da000-005dc000 rwxp 005da000 00:00 0 >005dc000-005e2000 r-xp 00000000 fd:06 1650598 /usr/lib/libusb-0.1.so.4.4.4 >005e2000-005e4000 rwxp 00006000 fd:06 1650598 /usr/lib/libusb-0.1.so.4.4.4 >005e4000-005ef000 r-xp 00000000 fd:00 98507 /lib/security/pam_unix.so >005ef000-005f0000 rwxp 0000b000 fd:00 98507 /lib/security/pam_unix.so >005f0000-005fc000 rwxp 005f0000 00:00 0 >005fc000-00603000 r-xp 00000000 fd:06 1650265 /usr/lib/libcrack.so.2.8.0 >00603000-00604000 rwxp 00006000 fd:06 1650265 /usr/lib/libcrack.so.2.8.0 >00604000-00608000 rwxp 00604000 00:00 0 >00608000-0060b000 r-xp 00000000 fd:00 98501 /lib/security/pam_succeed_if.so >0060b000-0060c000 rwxp 00002000 fd:00 98501 /lib/security/pam_succeed_if.so >0060c000-0060d000 r-xp 00000000 fd:00 98469 /lib/security/pam_deny.so >0060d000-0060e000 rwxp 00000000 fd:00 98469 /lib/security/pam_deny.so >0060e000-0060f000 r-xp 00000000 fd:00 98490 /lib/security/pam_nologin.so >0060f000-00610000 rwxp 00000000 fd:00 98490 /lib/security/pam_nologin.so >00610000-00611000 r-xp 00000000 fd:00 98484 /lib/security/pam_localuser.so >00611000-00612000 rwxp 00000000 fd:00 98484 /lib/security/pam_localuser.so >00612000-00613000 r-xp 00000000 fd:00 98676 /lib/security/pam_permit.so >00613000-00614000 rwxp 00000000 fd:00 98676 /lib/security/pam_permit.so >00614000-00617000 r-xp 00000000 fd:00 98668 /lib/security/pam_cracklib.so >00617000-00618000 rwxp 00002000 fd:00 98668 /lib/security/pam_cracklib.so >00618000-0061c000 rwxp 00618000 00:00 0 >0061c000-0061d000 r-xp 00000000 fd:00 98480 /lib/security/pam_keyinit.so >0061d000-0061e000 rwxp 00001000 fd:00 98480 /lib/security/pam_keyinit.so >0061e000-00621000 r-xp 00000000 fd:00 98482 /lib/security/pam_limits.so >00621000-00622000 rwxp 00002000 fd:00 98482 /lib/security/pam_limits.so >00622000-00623000 r-xp 00000000 fd:00 98674 /lib/security/pam_loginuid.so >00623000-00624000 rwxp 00000000 fd:00 98674 /lib/security/pam_loginuid.so >00624000-0062f000 r-xp 00000000 fd:00 98729 /lib/libgcc_s-4.1.2-20070925.so.1 >0062f000-00630000 rwxp 0000a000 fd:00 98729 /lib/libgcc_s-4.1.2-20070925.so.1 >80000000-8005f000 r-xp 00000000 fd:06 557389 /usr/sbin/sshd >8005f000-80061000 rw-p 0005e000 fd:06 557389 /usr/sbin/sshd >80061000-80066000 rw-p 80061000 00:00 0 >80b36000-80b78000 rw-p 80b36000 00:00 0 >b69cd000-b69ce000 ---p b69cd000 00:00 0 >b69ce000-b73ce000 rw-p b69ce000 00:00 0 >b73ce000-b73cf000 ---p b73ce000 00:00 0 >b73cf000-b7dcf000 rw-p b73cf000 00:00 0 >b7dcf000-b7f0f000 rw-s 00000000 00:09 16428 /dev/zero (deleted) >b7f0f000-b7f15000 rw-p b7f0f000 00:00 0 >b7f21000-b7f31000 rw-s 00000000 00:09 16427 /dev/zero (deleted) >bfe4c000-bfe62000 rw-p bfe4c000 00:00 0 [stack] >Aborted >
You cannot view the attachment while viewing its details because your browser does not support IFRAMEs.
View the attachment on a separate page
.
View Attachment As Raw
Actions:
View
Attachments on
bug 327451
: 224201