Package: libpam-unix2
Version: 1.25-1
Severity: important

Until now, we had a problem: all applications using PAM for
authentication, like sshd, wdm and su, did crash with a segmentation
every time that a user did type a wrong password. This happened on amd64
machines with Debian "sarge" 3.1 (libc 2.3.2) and the latest pam_unix2
1.30 (and also with version 1.25). Note that it also happens on i386, but
the consequence is just a warning message.

Gdb did show that the crash happened because of the free() at
unix_auth.c:89 (_cleanup_message). It seems to free memory that was
previously allocated with 'alloca'. Is this right? Reading the man-page,
I have the impression that memory allocated with alloca is on the stack
and not on the heap and that therefore shouldn't be freed. I did
comment out that line, and now everything is fine. No more segmentation
faults...

I did send the above bug-report already upstream on the 2006-01-30 (without
an answer yet).

Cheers
David

-- System Information:
Debian Release: 3.1
Architecture: i386 (i686)
Kernel: Linux 2.6.15.1-ia32-isg-ee-sm-pxe-smp-1
Locale: LANG=en_US, LC_CTYPE=en_US (charmap=ISO-8859-1)

Versions of packages libpam-unix2 depends on:
ii  libc6                       2.3.2.ds1-22 GNU C Library: Shared libraries an
ii  libpam0g                    0.76-22      Pluggable Authentication Modules l
ii  libxcrypt1                  2.2-1        Crypt library for DES, MD5, and bl

-- no debconf information


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]

Reply via email to