Bug 2214534

Summary: [abrt] sssd-common: __strcmp_avx2(): sssd_be killed by SIGSEGV
Product: [Fedora] Fedora Reporter: Juan Orti Alcaine <jortialc>
Component: sssdAssignee: sssd-maintainers <sssd-maintainers>
Status: CLOSED EOL QA Contact: Fedora Extras Quality Assurance <extras-qa>
Severity: unspecified Docs Contact:
Priority: unspecified    
Version: 38CC: abokovoy, atikhono, jhrozek, jortialc, lslebodn, luk.claes, mzidek, pbrezina, sbose, ssorce, sssd-maintainers
Target Milestone: ---   
Target Release: ---   
Hardware: x86_64   
OS: Unspecified   
URL: https://retrace.fedoraproject.org/faf/reports/bthash/1c8394983ae5509bf7e9dad4db5db790e59b7a1
Whiteboard: abrt_hash:a07038fd78acc47fd66b266203cafebd50509e00;VARIANT_ID=workstation;
Fixed In Version: Doc Type: If docs needed, set a value
Doc Text:
Story Points: ---
Clone Of: Environment:
Last Closed: 2024-05-22 14:05:59 UTC Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:
Attachments:
Description Flags
File: proc_pid_status
none
File: maps
none
File: limits
none
File: environ
none
File: open_fds
none
File: mountinfo
none
File: os_info
none
File: cpuinfo
none
File: core_backtrace
none
File: exploitable
none
File: dso_list
none
File: var_log_messages
none
File: backtrace none

Description Juan Orti Alcaine 2023-06-13 09:35:03 UTC
Description of problem:
This happens when doing some privilege escalation like using sudo or the authentication required dialog in Gnome

Version-Release number of selected component:
sssd-common-2.9.0-1.fc38

Additional info:
reporter:       libreport-2.17.10
type:           CCpp
reason:         sssd_be killed by SIGSEGV
journald_cursor: s=025af2782fd445c2a5eb791571c74138;i=250aa;b=61468fbb4dd141e9b488d260f287c4ef;m=69ee27e2a;t=5fd9e17d98e50;x=b86133abd50e6842
executable:     /usr/libexec/sssd/sssd_be
cmdline:        /usr/libexec/sssd/sssd_be --domain ipa.redhat.com --uid 0 --gid 0 --logger=files
cgroup:         0::/system.slice/sssd.service
rootdir:        /
uid:            0
kernel:         6.3.5-200.fc38.x86_64
package:        sssd-common-2.9.0-1.fc38
runlevel:       N 5
backtrace_rating: 4
crash_function: __strcmp_avx2
comment:        This happens when doing some privilege escalation like using sudo or the authentication required dialog in Gnome

Truncated backtrace:
Thread no. 1 (21 frames)
 #0 __strcmp_avx2 at ../sysdeps/x86_64/multiarch/strcmp-avx2.S:283
 #1 be_resolve_server_process at src/providers/data_provider_fo.c:691
 #2 be_resolve_server_done at src/providers/data_provider_fo.c:557
 #3 fo_resolve_service_server at src/providers/fail_over.c:1169
 #4 _tevent_req_error at ../../tevent_req.c:221
 #5 resolve_srv_done at src/providers/fail_over.c:1480
 #6 fo_discover_srv_done at src/providers/fail_over_srv.c:141
 #7 resolv_getsrv_done at src/resolv/async_resolv.c:1877
 #8 qcallback at /usr/src/debug/c-ares-1.19.1-1.fc38.x86_64/src/lib/ares_query.c:143
 #9 end_query at /usr/src/debug/c-ares-1.19.1-1.fc38.x86_64/src/lib/ares_process.c:1525
 #10 process_answer at /usr/src/debug/c-ares-1.19.1-1.fc38.x86_64/src/lib/ares_process.c:598
 #11 read_udp_packets at /usr/src/debug/c-ares-1.19.1-1.fc38.x86_64/src/lib/ares_process.c:548
 #12 processfds at /usr/src/debug/c-ares-1.19.1-1.fc38.x86_64/src/lib/ares_process.c:126
 #13 tevent_common_invoke_fd_handler at ../../tevent_fd.c:142
 #14 epoll_event_loop at ../../tevent_epoll.c:737
 #15 epoll_event_loop_once at ../../tevent_epoll.c:938
 #16 std_event_loop_once at ../../tevent_standard.c:110
 #17 _tevent_loop_once at ../../tevent.c:823
 #18 tevent_common_loop_wait at ../../tevent.c:949
 #19 std_event_loop_wait at ../../tevent_standard.c:141
 #20 server_loop at src/util/server.c:787


Potential duplicate: bug 1773488

Comment 1 Juan Orti Alcaine 2023-06-13 09:35:08 UTC
Created attachment 1970587 [details]
File: proc_pid_status

Comment 2 Juan Orti Alcaine 2023-06-13 09:35:11 UTC
Created attachment 1970588 [details]
File: maps

Comment 3 Juan Orti Alcaine 2023-06-13 09:35:13 UTC
Created attachment 1970589 [details]
File: limits

Comment 4 Juan Orti Alcaine 2023-06-13 09:35:15 UTC
Created attachment 1970590 [details]
File: environ

Comment 5 Juan Orti Alcaine 2023-06-13 09:35:18 UTC
Created attachment 1970591 [details]
File: open_fds

Comment 6 Juan Orti Alcaine 2023-06-13 09:35:20 UTC
Created attachment 1970592 [details]
File: mountinfo

Comment 7 Juan Orti Alcaine 2023-06-13 09:35:22 UTC
Created attachment 1970593 [details]
File: os_info

Comment 8 Juan Orti Alcaine 2023-06-13 09:35:25 UTC
Created attachment 1970594 [details]
File: cpuinfo

Comment 9 Juan Orti Alcaine 2023-06-13 09:35:26 UTC
Created attachment 1970595 [details]
File: core_backtrace

Comment 10 Juan Orti Alcaine 2023-06-13 09:35:28 UTC
Created attachment 1970596 [details]
File: exploitable

Comment 11 Juan Orti Alcaine 2023-06-13 09:35:31 UTC
Created attachment 1970597 [details]
File: dso_list

Comment 12 Juan Orti Alcaine 2023-06-13 09:35:32 UTC
Created attachment 1970598 [details]
File: var_log_messages

Comment 13 Juan Orti Alcaine 2023-06-13 09:35:35 UTC
Created attachment 1970599 [details]
File: backtrace

Comment 14 Alexey Tikhonov 2023-06-13 10:35:01 UTC
Pushed PR: https://github.com/SSSD/sssd/pull/6660

* `master`
    * 8a8869994745429b3f5535a5d0b91f1d0b2fa723 - fail_over: protect against a segmentation fault
* `sssd-2-9`
    * f63a54c3d89866949810d5bcdb09bf2edd3ced02 - fail_over: protect against a segmentation fault


This doesn't fix issue per se but should hopefully work around it at least.

Will be shipped as a rebase to sssd-2.9.1.

Comment 15 Aoife Moloney 2024-05-22 14:05:59 UTC
Fedora Linux 38 entered end-of-life (EOL) status on 2024-05-21.

Fedora Linux 38 is no longer maintained, which means that it
will not receive any further security or bug fix updates. As a result we
are closing this bug.

If you can reproduce this bug against a currently maintained version of Fedora Linux
please feel free to reopen this bug against that version. Note that the version
field may be hidden. Click the "Show advanced fields" button if you do not see
the version field.

If you are unable to reopen this bug, please file a new report against an
active release.

Thank you for reporting this bug and we are sorry it could not be fixed.