Bug 173358
Summary: | glibc attempts to free an invalid pointer | ||
---|---|---|---|
Product: | Red Hat Enterprise Linux 4 | Reporter: | Nathan Ehresman <nehresma> |
Component: | glibc | Assignee: | Jakub Jelinek <jakub> |
Status: | CLOSED ERRATA | QA Contact: | Brian Brock <bbrock> |
Severity: | high | Docs Contact: | |
Priority: | medium | ||
Version: | 4.0 | CC: | poelstra |
Target Milestone: | --- | ||
Target Release: | --- | ||
Hardware: | i386 | ||
OS: | Linux | ||
Whiteboard: | |||
Fixed In Version: | RHBA-2006-0124 | Doc Type: | Bug Fix |
Doc Text: | Story Points: | --- | |
Clone Of: | Environment: | ||
Last Closed: | 2006-03-07 18:27:40 UTC | Type: | --- |
Regression: | --- | Mount Type: | --- |
Documentation: | --- | CRM: | |
Verified Versions: | Category: | --- | |
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
Cloudforms Team: | --- | Target Upstream Version: | |
Embargoed: | |||
Bug Depends On: | |||
Bug Blocks: | 168429 |
Description
Nathan Ehresman
2005-11-16 16:25:06 UTC
resbuf is just a function argument in md5, so doesn't live in .bss. But many non-reentrant functions using NSS call their static variables resbuf, e.g. fgetgrent fgetpwent fgetspent getaliasname getgrgid getgrnam gethstbyad gethstbynm gethstbynm2 getnetbyad getnetbynm getproto getprtname getpwnam getpwuid getrpcbyname getrpcbynumber getspnam getsrvbynm getsrvbypt sgetspent So, first of all, it would be interesting to know which one exactly it is. As you have libc.so.6 likely prelinked, you'd need to at least provide readelf -l /lib/tls/libc.so.6 | grep LOAD output (and exact NVR of glibc you are using, is that 2.3.4-2.13). Much better of course would be if you could get a backtrace. Say ulimit -c unlimited in the script/shell starting the program that triggers it. Once you get a core dump, installing ftp://people.redhat.com/jakub/glibc/2.3.4-2.13/ debuginfo packages could give more details in the backtrace. I have turned on core dumps now in the backup scripts as well as another script that I was seeing the ps error from occasionally. I'll keep an eye on it and report back once the error happens again. Thanks! FYI, here's the output from readelf: readelf -l /lib/tls/libc.so.6 | grep LOAD LOAD 0x000000 0x003e0000 0x003e0000 0x123991 0x123991 R E 0x1000 LOAD 0x1245e4 0x005045e4 0x005045e4 0x02a80 0x056d8 RW 0x1000 In that case 0x0050809c is resbuf static var in getpwuid. BTW, what NSS modules are you using? grep passwd: /etc/nsswitch.conf Are you using nscd? If so, this is likely http://sources.redhat.com/bugzilla/show_bug.cgi?id=1363 http://sources.redhat.com/cgi-bin/cvsweb.cgi/libc/ChangeLog.diff?cvsroot=glibc&r1=1.9536&r2=1.9537 http://sources.redhat.com/cgi-bin/cvsweb.cgi/libc/nscd/nscd_getpw_r.c.diff?cvsroot=glibc&r1=1.30&r2=1.31 I'm using the files and LDAP nss modules (in that order) on this machine. In answer to the second question, I am indeed using nscd on the machine to reduce the number of queries made to the LDAP server. I have shut down nscd for now to see if this helps things out as well. If it crashes again, hopefully I'll have a core dump to report back with. An advisory has been issued which should help the problem described in this bug report. This report is therefore being closed with a resolution of ERRATA. For more information on the solution and/or where to find the updated files, please follow the link below. You may reopen this bug report if the solution does not work for you. http://rhn.redhat.com/errata/RHBA-2006-0124.html An advisory has been issued which should help the problem described in this bug report. This report is therefore being closed with a resolution of ERRATA. For more information on the solution and/or where to find the updated files, please follow the link below. You may reopen this bug report if the solution does not work for you. http://rhn.redhat.com/errata/RHBA-2006-0124.html An advisory has been issued which should help the problem described in this bug report. This report is therefore being closed with a resolution of ERRATA. For more information on the solution and/or where to find the updated files, please follow the link below. You may reopen this bug report if the solution does not work for you. http://rhn.redhat.com/errata/RHBA-2006-0124.html |