Bug 2214534 - [abrt] sssd-common: __strcmp_avx2(): sssd_be killed by SIGSEGV
Summary: [abrt] sssd-common: __strcmp_avx2(): sssd_be killed by SIGSEGV
Keywords:
Status: CLOSED EOL
Alias: None
Product: Fedora
Classification: Fedora
Component: sssd
Version: 38
Hardware: x86_64
OS: Unspecified
unspecified
unspecified
Target Milestone: ---
Assignee: sssd-maintainers
QA Contact: Fedora Extras Quality Assurance
URL: https://retrace.fedoraproject.org/faf...
Whiteboard: abrt_hash:a07038fd78acc47fd66b266203c...
Depends On:
Blocks:
TreeView+ depends on / blocked
 
Reported: 2023-06-13 09:35 UTC by Juan Orti
Modified: 2024-05-22 14:05 UTC (History)
11 users (show)

Fixed In Version:
Clone Of:
Environment:
Last Closed: 2024-05-22 14:05:59 UTC
Type: ---
Embargoed:


Attachments (Terms of Use)
File: proc_pid_status (1.36 KB, text/plain)
2023-06-13 09:35 UTC, Juan Orti
no flags Details
File: maps (3.98 KB, text/plain)
2023-06-13 09:35 UTC, Juan Orti
no flags Details
File: limits (1.29 KB, text/plain)
2023-06-13 09:35 UTC, Juan Orti
no flags Details
File: environ (487 bytes, text/plain)
2023-06-13 09:35 UTC, Juan Orti
no flags Details
File: open_fds (3.35 KB, text/plain)
2023-06-13 09:35 UTC, Juan Orti
no flags Details
File: mountinfo (3.90 KB, text/plain)
2023-06-13 09:35 UTC, Juan Orti
no flags Details
File: os_info (734 bytes, text/plain)
2023-06-13 09:35 UTC, Juan Orti
no flags Details
File: cpuinfo (2.85 KB, text/plain)
2023-06-13 09:35 UTC, Juan Orti
no flags Details
File: core_backtrace (6.90 KB, text/plain)
2023-06-13 09:35 UTC, Juan Orti
no flags Details
File: exploitable (81 bytes, text/plain)
2023-06-13 09:35 UTC, Juan Orti
no flags Details
File: dso_list (753 bytes, text/plain)
2023-06-13 09:35 UTC, Juan Orti
no flags Details
File: var_log_messages (259 bytes, text/plain)
2023-06-13 09:35 UTC, Juan Orti
no flags Details
File: backtrace (47.11 KB, text/plain)
2023-06-13 09:35 UTC, Juan Orti
no flags Details

Description Juan Orti 2023-06-13 09:35:03 UTC
Description of problem:
This happens when doing some privilege escalation like using sudo or the authentication required dialog in Gnome

Version-Release number of selected component:
sssd-common-2.9.0-1.fc38

Additional info:
reporter:       libreport-2.17.10
type:           CCpp
reason:         sssd_be killed by SIGSEGV
journald_cursor: s=025af2782fd445c2a5eb791571c74138;i=250aa;b=61468fbb4dd141e9b488d260f287c4ef;m=69ee27e2a;t=5fd9e17d98e50;x=b86133abd50e6842
executable:     /usr/libexec/sssd/sssd_be
cmdline:        /usr/libexec/sssd/sssd_be --domain ipa.redhat.com --uid 0 --gid 0 --logger=files
cgroup:         0::/system.slice/sssd.service
rootdir:        /
uid:            0
kernel:         6.3.5-200.fc38.x86_64
package:        sssd-common-2.9.0-1.fc38
runlevel:       N 5
backtrace_rating: 4
crash_function: __strcmp_avx2
comment:        This happens when doing some privilege escalation like using sudo or the authentication required dialog in Gnome

Truncated backtrace:
Thread no. 1 (21 frames)
 #0 __strcmp_avx2 at ../sysdeps/x86_64/multiarch/strcmp-avx2.S:283
 #1 be_resolve_server_process at src/providers/data_provider_fo.c:691
 #2 be_resolve_server_done at src/providers/data_provider_fo.c:557
 #3 fo_resolve_service_server at src/providers/fail_over.c:1169
 #4 _tevent_req_error at ../../tevent_req.c:221
 #5 resolve_srv_done at src/providers/fail_over.c:1480
 #6 fo_discover_srv_done at src/providers/fail_over_srv.c:141
 #7 resolv_getsrv_done at src/resolv/async_resolv.c:1877
 #8 qcallback at /usr/src/debug/c-ares-1.19.1-1.fc38.x86_64/src/lib/ares_query.c:143
 #9 end_query at /usr/src/debug/c-ares-1.19.1-1.fc38.x86_64/src/lib/ares_process.c:1525
 #10 process_answer at /usr/src/debug/c-ares-1.19.1-1.fc38.x86_64/src/lib/ares_process.c:598
 #11 read_udp_packets at /usr/src/debug/c-ares-1.19.1-1.fc38.x86_64/src/lib/ares_process.c:548
 #12 processfds at /usr/src/debug/c-ares-1.19.1-1.fc38.x86_64/src/lib/ares_process.c:126
 #13 tevent_common_invoke_fd_handler at ../../tevent_fd.c:142
 #14 epoll_event_loop at ../../tevent_epoll.c:737
 #15 epoll_event_loop_once at ../../tevent_epoll.c:938
 #16 std_event_loop_once at ../../tevent_standard.c:110
 #17 _tevent_loop_once at ../../tevent.c:823
 #18 tevent_common_loop_wait at ../../tevent.c:949
 #19 std_event_loop_wait at ../../tevent_standard.c:141
 #20 server_loop at src/util/server.c:787


Potential duplicate: bug 1773488

Comment 1 Juan Orti 2023-06-13 09:35:08 UTC
Created attachment 1970587 [details]
File: proc_pid_status

Comment 2 Juan Orti 2023-06-13 09:35:11 UTC
Created attachment 1970588 [details]
File: maps

Comment 3 Juan Orti 2023-06-13 09:35:13 UTC
Created attachment 1970589 [details]
File: limits

Comment 4 Juan Orti 2023-06-13 09:35:15 UTC
Created attachment 1970590 [details]
File: environ

Comment 5 Juan Orti 2023-06-13 09:35:18 UTC
Created attachment 1970591 [details]
File: open_fds

Comment 6 Juan Orti 2023-06-13 09:35:20 UTC
Created attachment 1970592 [details]
File: mountinfo

Comment 7 Juan Orti 2023-06-13 09:35:22 UTC
Created attachment 1970593 [details]
File: os_info

Comment 8 Juan Orti 2023-06-13 09:35:25 UTC
Created attachment 1970594 [details]
File: cpuinfo

Comment 9 Juan Orti 2023-06-13 09:35:26 UTC
Created attachment 1970595 [details]
File: core_backtrace

Comment 10 Juan Orti 2023-06-13 09:35:28 UTC
Created attachment 1970596 [details]
File: exploitable

Comment 11 Juan Orti 2023-06-13 09:35:31 UTC
Created attachment 1970597 [details]
File: dso_list

Comment 12 Juan Orti 2023-06-13 09:35:32 UTC
Created attachment 1970598 [details]
File: var_log_messages

Comment 13 Juan Orti 2023-06-13 09:35:35 UTC
Created attachment 1970599 [details]
File: backtrace

Comment 14 Alexey Tikhonov 2023-06-13 10:35:01 UTC
Pushed PR: https://github.com/SSSD/sssd/pull/6660

* `master`
    * 8a8869994745429b3f5535a5d0b91f1d0b2fa723 - fail_over: protect against a segmentation fault
* `sssd-2-9`
    * f63a54c3d89866949810d5bcdb09bf2edd3ced02 - fail_over: protect against a segmentation fault


This doesn't fix issue per se but should hopefully work around it at least.

Will be shipped as a rebase to sssd-2.9.1.

Comment 15 Aoife Moloney 2024-05-22 14:05:59 UTC
Fedora Linux 38 entered end-of-life (EOL) status on 2024-05-21.

Fedora Linux 38 is no longer maintained, which means that it
will not receive any further security or bug fix updates. As a result we
are closing this bug.

If you can reproduce this bug against a currently maintained version of Fedora Linux
please feel free to reopen this bug against that version. Note that the version
field may be hidden. Click the "Show advanced fields" button if you do not see
the version field.

If you are unable to reopen this bug, please file a new report against an
active release.

Thank you for reporting this bug and we are sorry it could not be fixed.


Note You need to log in before you can comment on or make changes to this bug.