Login
Log in using an SSO provider:
Fedora Account System
Red Hat Associate
Red Hat Customer
Login using a Red Hat Bugzilla account
Forgot Password
Create an Account
Red Hat Bugzilla – Attachment 93465 Details for
Bug 101800
OpenSSH server crashes when Kerberos 5 authentication is enabled and a non-root user login is attempted
Home
New
Search
Simple Search
Advanced Search
My Links
Browse
Requests
Reports
Current State
Search
Tabular reports
Graphical reports
Duplicates
Other Reports
User Changes
Plotly Reports
Bug Status
Bug Severity
Non-Defaults
Product Dashboard
Help
Page Help!
Bug Writing Guidelines
What's new
Browser Support Policy
5.0.4.rh92 Release notes
FAQ
Guides index
User guide
Web Services
Contact
Legal
[?]
This site requires JavaScript to be enabled to function correctly, please enable it.
GDB output for sshd (Red Hat Linux 8, openssh-server-3.4p1-4)
GDB output for sshd (Red Hat Linux 8, openssh-server-3.4p1-4).txt (text/plain), 8.09 KB, created by
Economou, Matthew
on 2003-08-06 23:33:35 UTC
(
hide
)
Description:
GDB output for sshd (Red Hat Linux 8, openssh-server-3.4p1-4)
Filename:
MIME Type:
Creator:
Economou, Matthew
Created:
2003-08-06 23:33:35 UTC
Size:
8.09 KB
patch
obsolete
># gdb `which sshd` >GNU gdb Red Hat Linux (5.2.1-4) >Copyright 2002 Free Software Foundation, Inc. >GDB is free software, covered by the GNU General Public License, and you are >welcome to change it and/or distribute copies of it under certain conditions. >Type "show copying" to see the conditions. >There is absolutely no warranty for GDB. Type "show warranty" for details. >This GDB was configured as "i386-redhat-linux"...(no debugging symbols found)... >(gdb) run -ddd -p 2022 >Starting program: /usr/sbin/sshd -ddd -p 2022 >debug1: sshd version OpenSSH_3.4p1 >debug3: Not a RSA1 key file /etc/ssh/ssh_host_rsa_key. >debug1: read PEM private key done: type RSA >debug1: private host key: #0 type 1 RSA >debug3: Not a RSA1 key file /etc/ssh/ssh_host_dsa_key. >debug1: read PEM private key done: type DSA >debug1: private host key: #1 type 2 DSA >socket: Address family not supported by protocol >debug1: Bind to port 2022 on 0.0.0.0. >Server listening on 0.0.0.0 port 2022. >debug1: Server will not fork when running in debugging mode. >Connection from 127.0.0.1 port 1055 >debug1: Client protocol version 2.0; client software version OpenSSH_3.4p1 >debug1: match: OpenSSH_3.4p1 pat OpenSSH* >Enabling compatibility mode for protocol 2.0 >debug1: Local version string SSH-2.0-OpenSSH_3.4p1 >debug2: Network child is on pid 1225 >debug3: preauth child monitor started >debug3: mm_request_receive entering >debug3: privsep user:group 74:74 >debug1: list_hostkey_types: ssh-rsa,ssh-dss >debug1: SSH2_MSG_KEXINIT sent >debug1: SSH2_MSG_KEXINIT received >debug2: kex_parse_kexinit: diffie-hellman-group-exchange-sha1,diffie-hellman-group1-sha1 >debug2: kex_parse_kexinit: ssh-rsa,ssh-dss >debug2: kex_parse_kexinit: aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,arcfour,aes192-cbc,aes256-cbc,rijndael-cbc@lysator.liu.se >debug2: kex_parse_kexinit: aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,arcfour,aes192-cbc,aes256-cbc,rijndael-cbc@lysator.liu.se >debug2: kex_parse_kexinit: hmac-md5,hmac-sha1,hmac-ripemd160,hmac-ripemd160@openssh.com,hmac-sha1-96,hmac-md5-96 >debug2: kex_parse_kexinit: hmac-md5,hmac-sha1,hmac-ripemd160,hmac-ripemd160@openssh.com,hmac-sha1-96,hmac-md5-96 >debug2: kex_parse_kexinit: none,zlib >debug2: kex_parse_kexinit: none,zlib >debug2: kex_parse_kexinit: >debug2: kex_parse_kexinit: >debug2: kex_parse_kexinit: first_kex_follows 0 >debug2: kex_parse_kexinit: reserved 0 >debug2: kex_parse_kexinit: diffie-hellman-group-exchange-sha1,diffie-hellman-group1-sha1 >debug2: kex_parse_kexinit: ssh-rsa,ssh-dss >debug2: kex_parse_kexinit: aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,arcfour,aes192-cbc,aes256-cbc,rijndael-cbc@lysator.liu.se >debug2: kex_parse_kexinit: aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,arcfour,aes192-cbc,aes256-cbc,rijndael-cbc@lysator.liu.se >debug2: kex_parse_kexinit: hmac-md5,hmac-sha1,hmac-ripemd160,hmac-ripemd160@openssh.com,hmac-sha1-96,hmac-md5-96 >debug2: kex_parse_kexinit: hmac-md5,hmac-sha1,hmac-ripemd160,hmac-ripemd160@openssh.com,hmac-sha1-96,hmac-md5-96 >debug2: kex_parse_kexinit: none >debug2: kex_parse_kexinit: none >debug2: kex_parse_kexinit: >debug2: kex_parse_kexinit: >debug2: kex_parse_kexinit: first_kex_follows 0 >debug2: kex_parse_kexinit: reserved 0 >debug2: mac_init: found hmac-md5 >debug1: kex: client->server aes128-cbc hmac-md5 none >debug2: mac_init: found hmac-md5 >debug1: kex: server->client aes128-cbc hmac-md5 none >debug1: SSH2_MSG_KEX_DH_GEX_REQUEST received >debug3: mm_request_send entering: type 0 >debug3: mm_choose_dh: waiting for MONITOR_ANS_MODULI >debug3: mm_request_receive_expect entering: type 1 >debug3: mm_request_receive entering >debug3: monitor_read: checking request 0 >debug3: mm_answer_moduli: got parameters: 1024 2048 8192 >debug3: mm_request_send entering: type 1 >debug2: monitor_read: 0 used once, disabling now >debug3: mm_request_receive entering >debug3: mm_choose_dh: remaining 0 >debug1: SSH2_MSG_KEX_DH_GEX_GROUP sent >debug1: dh_gen_key: priv key bits set: 145/256 >debug1: bits set: 1564/3191 >debug1: expecting SSH2_MSG_KEX_DH_GEX_INIT >debug1: bits set: 1608/3191 >debug3: mm_key_sign entering >debug3: mm_request_send entering: type 4 >debug3: monitor_read: checking request 4 >debug3: mm_answer_sign >debug3: mm_key_sign: waiting for MONITOR_ANS_SIGN >debug3: mm_request_receive_expect entering: type 5 >debug3: mm_request_receive entering >debug3: mm_answer_sign: signature 0x80a4e68(143) >debug3: mm_request_send entering: type 5 >debug1: SSH2_MSG_KEX_DH_GEX_REPLY sent >debug1: kex_derive_keys >debug1: newkeys: mode 1 >debug1: SSH2_MSG_NEWKEYS sent >debug1: waiting for SSH2_MSG_NEWKEYS >debug2: monitor_read: 4 used once, disabling now >debug3: mm_request_receive entering >debug1: newkeys: mode 0 >debug1: SSH2_MSG_NEWKEYS received >debug1: KEX done >debug1: userauth-request for user xenophon service ssh-connection method none >debug1: attempt 0 failures 0 >debug3: mm_getpwnamallow entering >debug3: mm_request_send entering: type 6 >debug3: mm_getpwnamallow: waiting for MONITOR_ANS_PWNAM >debug3: mm_request_receive_expect entering: type 7 >debug3: mm_request_receive entering >debug3: monitor_read: checking request 6 >debug3: mm_answer_pwnamallow >debug3: mm_answer_pwnamallow: sending MONITOR_ANS_PWNAM: 1 >debug3: mm_request_send entering: type 7 >debug2: monitor_read: 6 used once, disabling now >debug3: mm_request_receive entering >debug2: input_userauth_request: setting up authctxt for xenophon >debug3: mm_start_pam entering >debug3: mm_request_send entering: type 37 >debug3: mm_inform_authserv entering >debug3: mm_request_send entering: type 3 >debug2: input_userauth_request: try method none >debug3: mm_auth2_read_banner entering >debug3: mm_request_send entering: type 8 >debug3: mm_request_receive_expect entering: type 9 >debug3: mm_request_receive entering >debug3: monitor_read: checking request 37 >debug1: Starting up PAM with username "xenophon" >debug3: Trying to reverse map address 127.0.0.1. >debug1: PAM setting rhost to "localhost.localdomain" >debug2: monitor_read: 37 used once, disabling now >debug3: mm_request_receive entering >debug3: monitor_read: checking request 3 >debug3: mm_answer_authserv: service=ssh-connection, style= >debug2: monitor_read: 3 used once, disabling now >debug3: mm_request_receive entering >debug3: monitor_read: checking request 8 >debug3: mm_request_send entering: type 9 >debug2: monitor_read: 8 used once, disabling now >debug3: mm_request_receive entering >debug1: userauth_banner: sent >debug3: mm_auth_password entering >debug3: mm_request_send entering: type 10 >debug3: mm_auth_password: waiting for MONITOR_ANS_AUTHPASSWORD >debug3: mm_request_receive_expect entering: type 11 >debug3: mm_request_receive entering >debug3: monitor_read: checking request 10 > >Program received signal SIGSEGV, Segmentation fault. >0x40210618 in malloc_consolidate () from /lib/libc.so.6 >(gdb) backtrace >#0 0x40210618 in malloc_consolidate () from /lib/libc.so.6 >#1 0x4020fd85 in _int_malloc () from /lib/libc.so.6 >#2 0x4020f484 in malloc () from /lib/libc.so.6 >#3 0x40183442 in krb5_sendto_kdc () from /usr/kerberos/lib/libkrb5.so.3 >#4 0x4016c043 in send_as_request () from /usr/kerberos/lib/libkrb5.so.3 >#5 0x4016d260 in krb5_get_init_creds () from /usr/kerberos/lib/libkrb5.so.3 >#6 0x4016e6a4 in krb5_get_init_creds_password () from /usr/kerberos/lib/libkrb5.so.3 >#7 0x404ba36b in pam_sm_authenticate () from /lib/security/pam_krb5.so >#8 0x4001bba9 in _pam_dispatch_aux () from /lib/libpam.so.0 >#9 0x4001bd33 in _pam_dispatch () from /lib/libpam.so.0 >#10 0x400158df in pam_sm_chauthtok () from /lib/security/pam_stack.so >#11 0x40014c4e in pam_sm_authenticate () from /lib/security/pam_stack.so >#12 0x4001bba9 in _pam_dispatch_aux () from /lib/libpam.so.0 >#13 0x4001bd33 in _pam_dispatch () from /lib/libpam.so.0 >#14 0x4001d828 in pam_authenticate () from /lib/libpam.so.0 >#15 0x0805487a in strcpy () >#16 0x08054bbc in strcpy () >#17 0x08055619 in strcpy () >#18 0x0805f8b1 in strcpy () >#19 0x0805f090 in strcpy () >#20 0x0805ed55 in strcpy () >#21 0x0804d651 in strcpy () >#22 0x0804e750 in strcpy () >#23 0x401b74ed in __libc_start_main () from /lib/libc.so.6 >(gdb) quit >The program is running. Exit anyway? (y or n) y >debug1: Calling cleanup 0x8071320(0x0)
You cannot view the attachment while viewing its details because your browser does not support IFRAMEs.
View the attachment on a separate page
.
View Attachment As Raw
Actions:
View
Attachments on
bug 101800
: 93465