Bug 1241227
Summary: | stalled gdm-session-worker after a bunch of tests | ||
---|---|---|---|
Product: | Red Hat Enterprise Linux 7 | Reporter: | Vladimir Benes <vbenes> |
Component: | gdm | Assignee: | Ray Strode [halfline] <rstrode> |
Status: | CLOSED ERRATA | QA Contact: | Desktop QE <desktop-qa-list> |
Severity: | medium | Docs Contact: | |
Priority: | unspecified | ||
Version: | 7.2 | CC: | angystardust, mdomonko, tlavigne |
Target Milestone: | rc | Keywords: | Regression, TestBlocker |
Target Release: | --- | ||
Hardware: | Unspecified | ||
OS: | Unspecified | ||
Whiteboard: | |||
Fixed In Version: | gdm-3.14.2-7.el7 | Doc Type: | Bug Fix |
Doc Text: | Story Points: | --- | |
Clone Of: | Environment: | ||
Last Closed: | 2015-11-19 07:16:05 UTC | Type: | Bug |
Regression: | --- | Mount Type: | --- |
Documentation: | --- | CRM: | |
Verified Versions: | Category: | --- | |
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
Cloudforms Team: | --- | Target Upstream Version: | |
Embargoed: |
Description
Vladimir Benes
2015-07-08 19:07:23 UTC
right should be all set now. This needed a few fixes backported from the 3.16 and master branches It looks far better, I've removed workarounds and tests are still running (100+ gdm restarts). Thanks! Since the problem described in this bug report should be resolved in a recent advisory, it has been closed with a resolution of ERRATA. For information on the advisory, and where to find the updated files, follow the link below. If the solution does not work for you, open a new bug report. https://rhn.redhat.com/errata/RHBA-2015-2216.html Sorry for the noise but it seems that the issue isn't fixed at all or maybe there was a regression in the last vesion of gdm (gdm-3.26.2.1). I know this bug report is about RHEL but I suppose that sooner or later gdm-2.26 will hit the RHEL repos. The issue is always reproducible by locking the screen, slide the screen to fill your password in the text-box, press [ESC] to undo the filling of the password. As you can see by grepping on the process list on my system, it's easy to create a local denial-of-service as a malicious user just by following the above sequence over and over again. Sooner or later i suppose a "too many open files" condition can be reached so that the user cannot login on the system. $ ps -ef | grep [g]dm-session-worker root 3278 16037 0 16:40 ? 00:00:00 gdm-session-worker [pam/gdm-password] root 3298 16037 0 16:40 ? 00:00:00 gdm-session-worker [pam/gdm-password] root 3316 16037 0 16:40 ? 00:00:00 gdm-session-worker [pam/gdm-password] root 3334 16037 0 16:40 ? 00:00:00 gdm-session-worker [pam/gdm-password] root 3367 16037 0 16:40 ? 00:00:00 gdm-session-worker [pam/gdm-password] root 3385 16037 0 16:40 ? 00:00:00 gdm-session-worker [pam/gdm-password] root 3406 16037 0 16:40 ? 00:00:00 gdm-session-worker [pam/gdm-password] root 3423 16037 0 16:40 ? 00:00:00 gdm-session-worker [pam/gdm-password] root 3489 16037 0 16:40 ? 00:00:00 gdm-session-worker [pam/gdm-password] root 15672 15668 0 01:13 ? 00:00:00 gdm-session-worker [pam/gdm-launch-environment] root 16037 15668 0 01:13 ? 00:00:01 gdm-session-worker [pam/gdm-fingerprint] root 21990 16037 0 17:00 ? 00:00:00 gdm-session-worker [pam/gdm-password] root 21991 16037 0 17:00 ? 00:00:00 gdm-session-worker [pam/gdm-fingerprint] root 22011 16037 0 17:00 ? 00:00:00 gdm-session-worker [pam/gdm-password] root 22029 16037 0 17:00 ? 00:00:00 gdm-session-worker [pam/gdm-password] root 22048 16037 0 17:00 ? 00:00:00 gdm-session-worker [pam/gdm-password] root 22068 16037 0 17:00 ? 00:00:00 gdm-session-worker [pam/gdm-password] root 22089 16037 0 17:00 ? 00:00:00 gdm-session-worker [pam/gdm-password] root 22108 16037 0 17:00 ? 00:00:00 gdm-session-worker [pam/gdm-password] root 22126 16037 0 17:00 ? 00:00:00 gdm-session-worker [pam/gdm-password] root 22143 16037 0 17:00 ? 00:00:00 gdm-session-worker [pam/gdm-password] root 22162 16037 0 17:00 ? 00:00:00 gdm-session-worker [pam/gdm-password] root 22186 16037 0 17:00 ? 00:00:00 gdm-session-worker [pam/gdm-password] root 22204 16037 0 17:00 ? 00:00:00 gdm-session-worker [pam/gdm-password] root 22222 16037 0 17:00 ? 00:00:00 gdm-session-worker [pam/gdm-password] root 22239 16037 0 17:00 ? 00:00:00 gdm-session-worker [pam/gdm-password] root 22262 16037 0 17:00 ? 00:00:00 gdm-session-worker [pam/gdm-password] root 22917 15668 0 01:18 ? 00:00:00 gdm-session-worker [pam/gdm-password] root 25673 16037 0 01:20 ? 00:00:00 gdm-session-worker [pam/gdm-password] root 25692 16037 0 01:20 ? 00:00:00 gdm-session-worker [pam/gdm-password] root 25712 16037 0 01:20 ? 00:00:00 gdm-session-worker [pam/gdm-password] root 25735 16037 0 01:20 ? 00:00:00 gdm-session-worker [pam/gdm-password] root 25755 16037 0 01:20 ? 00:00:00 gdm-session-worker [pam/gdm-password] root 25784 16037 0 01:20 ? 00:00:00 gdm-session-worker [pam/gdm-password] |