Devuan bug report logs - #113
auditctl segmentation fault

Package: auditd; Reported by: Mauro Rappa <[email protected]>; Keywords: debian jessie; Done: Mark Hindley <[email protected]>; Maintainer for auditd is (unknown).

Message received at [email protected]:


Received: (at 113-done) by bugs.devuan.org; 11 Jan 2023 07:58:43 +0000
Return-Path: <[email protected]>
Delivered-To: [email protected]
Received: from email.devuan.org [2001:41d0:2:d06e::5c4:2612]
	by doc.devuan.org with IMAP (fetchmail-6.4.16)
	for <debbugs@localhost> (single-drop); Wed, 11 Jan 2023 07:58:43 +0000 (UTC)
Received: from email.devuan.org
	by email.devuan.org with LMTP
	id DdQMGeNrvmOVZAAAmSBk0A
	(envelope-from <[email protected]>)
	for <[email protected]>; Wed, 11 Jan 2023 07:57:23 +0000
Received: by email.devuan.org (Postfix, from userid 109)
	id 600F7B85; Wed, 11 Jan 2023 07:57:23 +0000 (UTC)
X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on email.devuan.org
X-Spam-Level: 
X-Spam-Status: No, score=0.4 required=5.0 tests=RDNS_DYNAMIC,SPF_PASS
	autolearn=no autolearn_force=no version=3.4.6
Received-SPF: Pass (mailfrom) identity=mailfrom; client-ip=193.36.131.86; helo=mx.hindley.org.uk; [email protected]; receiver=<UNKNOWN> 
Received: from mx.hindley.org.uk (193-36-131-86.cfwn.uk [193.36.131.86])
	by email.devuan.org (Postfix) with ESMTPS id 16CDF226
	for <[email protected]>; Wed, 11 Jan 2023 07:57:23 +0000 (UTC)
Received: from apollo.hindleynet ([192.168.1.3] helo=hindley.org.uk)
	by mx.hindley.org.uk with smtp (Exim 4.84_2)
	(envelope-from <[email protected]>)
	id 1pFVz8-0008Lu-8o
	for [email protected]; Wed, 11 Jan 2023 07:57:22 +0000
Received: (nullmailer pid 9015 invoked by uid 1000);
	Wed, 11 Jan 2023 07:57:22 -0000
Date: Wed, 11 Jan 2023 07:57:22 +0000
From: Mark Hindley <[email protected]>
To: [email protected]
Subject: Fixed in Debian #859120
Message-ID: <Y75r4jwZNbH+/[email protected]>
MIME-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Content-Disposition: inline
X-Debbugs-No-Ack: No Thanks

Version: 1:2.6.7-2

Notification sent to Mauro Rappa <[email protected]>:
bug acknowledged by developer. Full text available.
Reply sent to Mark Hindley <[email protected]>:
You have taken responsibility. Full text available.
Added tag(s) debian. Request was from Mark Hindley <[email protected]> to [email protected]. Full text available.
Set bug forwarded-to-address to 'https://bugs.debian.org/859120'. Request was from Mark Hindley <[email protected]> to [email protected]. Full text available.

Message received at [email protected]:


Received: (at 113) by bugs.devuan.org; 11 Jan 2023 07:42:11 +0000
Return-Path: <[email protected]>
Delivered-To: [email protected]
Received: from email.devuan.org [2001:41d0:2:d06e::5c4:2612]
	by doc.devuan.org with IMAP (fetchmail-6.4.16)
	for <debbugs@localhost> (single-drop); Wed, 11 Jan 2023 07:42:11 +0000 (UTC)
Received: from email.devuan.org
	by email.devuan.org with LMTP
	id iM2wHEtovmP7YwAAmSBk0A
	(envelope-from <[email protected]>)
	for <[email protected]>; Wed, 11 Jan 2023 07:42:03 +0000
Received: by email.devuan.org (Postfix, from userid 109)
	id 6FFCCB85; Wed, 11 Jan 2023 07:42:03 +0000 (UTC)
X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on email.devuan.org
X-Spam-Level: 
X-Spam-Status: No, score=0.4 required=5.0 tests=RDNS_DYNAMIC,SPF_PASS
	autolearn=no autolearn_force=no version=3.4.6
Received-SPF: Pass (mailfrom) identity=mailfrom; client-ip=193.36.131.86; helo=mx.hindley.org.uk; [email protected]; receiver=<UNKNOWN> 
Received: from mx.hindley.org.uk (193-36-131-86.cfwn.uk [193.36.131.86])
	by email.devuan.org (Postfix) with ESMTPS id 33FF6226
	for <[email protected]>; Wed, 11 Jan 2023 07:42:03 +0000 (UTC)
Received: from apollo.hindleynet ([192.168.1.3] helo=hindley.org.uk)
	by mx.hindley.org.uk with smtp (Exim 4.84_2)
	(envelope-from <[email protected]>)
	id 1pFVkH-0008Ef-To; Wed, 11 Jan 2023 07:42:02 +0000
Received: (nullmailer pid 4979 invoked by uid 1000);
	Wed, 11 Jan 2023 07:42:01 -0000
Date: Wed, 11 Jan 2023 07:42:01 +0000
From: Mark Hindley <[email protected]>
To: Mauro Rappa <[email protected]>, [email protected]
Subject: Re: bug#113: auditctl segmentation fault
Message-ID: <[email protected]>
References: <[email protected]>
MIME-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Content-Disposition: inline
In-Reply-To: <[email protected]>
X-Debbugs-No-Ack: No Thanks

Control: forwarded -1 https://bugs.debian.org/859120
Control: tags -1 debian

On Thu, Jul 06, 2017 at 12:11:26PM +0100, Mauro Rappa wrote:
> Package: auditd                          
> Version: 1:2.4-1+b1 
> 
> Hi,
> Jessie throws a seg fault when running a simple command like:

I think this is #859120 (fixed).

Mark

Information forwarded to [email protected], [email protected]:
bug#113; Package auditd. Full text available.
Tags added: jessie Request was from KatolaZ <[email protected]> to [email protected]. Full text available.

Message received at [email protected]:


Received: (at submit) by bugs.devuan.org; 6 Jul 2017 11:20:05 +0000
Return-Path: <[email protected]>
Delivered-To: [email protected]
Received: from mail.dyne.org [178.62.188.7]
	by fulcanelli with IMAP (fetchmail-6.3.26)
	for <debbugs@localhost> (single-drop); Thu, 06 Jul 2017 13:20:05 +0200 (CEST)
Received: from omr-m002e.mx.aol.com (omr-m002e.mx.aol.com [204.29.186.2])
	(using TLSv1 with cipher DHE-RSA-AES256-SHA (256/256 bits))
	(No client certificate requested)
	by tupac2.dyne.org (Postfix) with ESMTPS id 9A29318F91A
	for <[email protected]>; Thu,  6 Jul 2017 11:11:30 +0000 (UTC)
Authentication-Results: tupac2.dyne.org; dkim=pass
	reason="1024-bit key; unprotected key"
	header.d=mx.aol.co.uk [email protected] header.b=PSHg1d7w;
	dkim-adsp=none (unprotected policy); dkim-atps=neutral
Received: from mtaout-aad01.mx.aol.com (mtaout-aad01.mx.aol.com [172.26.127.225])
	by omr-m002e.mx.aol.com (Outbound Mail Relay) with ESMTP id B5D0B380009F
	for <[email protected]>; Thu,  6 Jul 2017 07:11:28 -0400 (EDT)
Received: from [192.168.68.110] (unknown [193.240.153.204])
	(using TLSv1 with cipher DHE-RSA-AES256-SHA (256/256 bits))
	(No client certificate requested)
	by mtaout-aad01.mx.aol.com (MUA/Third Party Client Interface) with ESMTPSA id 25EFD38000088
	for <[email protected]>; Thu,  6 Jul 2017 07:11:28 -0400 (EDT)
From: Mauro Rappa <[email protected]>
Content-Type: text/plain; charset=us-ascii
Content-Transfer-Encoding: quoted-printable
Mime-Version: 1.0 (Mac OS X Mail 10.3 \(3273\))
Subject: auditctl segmentation fault
Message-Id: <[email protected]>
Date: Thu, 6 Jul 2017 12:11:26 +0100
To: [email protected]
X-Mailer: Apple Mail (2.3273)
x-aol-global-disposition: G
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=mx.aol.co.uk;
	s=20150623; t=1499339488;
	bh=3mtp4s1nGj47y0BDWHRm/GDwiqqCC/eEb2xFJeLGmUY=;
	h=From:To:Subject:Message-Id:Date:Mime-Version:Content-Type;
	b=PSHg1d7wFg6Cue45dNPejeRepA6wK5ipHXjLfsVm+WqHfa6C724vgcIK8ZjdFGXcP
	 Q67kslTOFnjggygCHyucplcZkKblOBYbS5BiQAJDz4EqS7dJND8qtYBZnpSspHkBef
	 GwWyGEt7InY0fWXqeJUgHnMBdDAhmRcWDqFiFQ5k=
x-aol-sid: 3039ac1a7fe1595e1ae0598f
X-AOL-IP: 193.240.153.204
X-Spam-Status: No, score=-0.0 required=5.0 tests=DKIM_SIGNED,DKIM_VALID,
	FREEMAIL_FROM,RCVD_IN_DNSWL_NONE,RCVD_IN_MSPIKE_H3,RCVD_IN_MSPIKE_WL,SPF_PASS
	autolearn=disabled version=3.4.0
X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on tupac2

Package: auditd                         =20
Version: 1:2.4-1+b1=20

Hi,
Jessie throws a seg fault when running a simple command like:

root@devuan:~# auditctl -s
enabled 1
flag 1
pid 8393
rate_limit 0
backlog_limit 320
lost 0
backlog 0
Segmentation fault


Running a strace it seems it cannot handle the response form the socket =
(too big?)

root@devuan:~# strace auditctl -s
execve("/sbin/auditctl", ["auditctl", "-s"], [/* 12 vars */]) =3D 0
brk(0)                                  =3D 0x5623724d5000
access("/etc/ld.so.nohwcap", F_OK)      =3D -1 ENOENT (No such file or =
directory)
mmap(NULL, 8192, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_ANONYMOUS, -1, 0) =
=3D 0x7f3ed1135000
access("/etc/ld.so.preload", R_OK)      =3D -1 ENOENT (No such file or =
directory)
open("/etc/ld.so.cache", O_RDONLY|O_CLOEXEC) =3D 3
fstat(3, {st_mode=3DS_IFREG|0644, st_size=3D35244, ...}) =3D 0
mmap(NULL, 35244, PROT_READ, MAP_PRIVATE, 3, 0) =3D 0x7f3ed112c000
close(3)                                =3D 0
access("/etc/ld.so.nohwcap", F_OK)      =3D -1 ENOENT (No such file or =
directory)
open("/lib/x86_64-linux-gnu/libaudit.so.1", O_RDONLY|O_CLOEXEC) =3D 3
read(3, =
"\177ELF\2\1\1\0\0\0\0\0\0\0\0\0\3\0>\0\1\0\0\0\20*\0\0\0\0\0\0"..., =
832) =3D 832
fstat(3, {st_mode=3DS_IFREG|0644, st_size=3D113024, ...}) =3D 0
mmap(NULL, 2249344, PROT_READ|PROT_EXEC, MAP_PRIVATE|MAP_DENYWRITE, 3, =
0) =3D 0x7f3ed0cf1000
mprotect(0x7f3ed0d0b000, 2093056, PROT_NONE) =3D 0
mmap(0x7f3ed0f0a000, 12288, PROT_READ|PROT_WRITE, =
MAP_PRIVATE|MAP_FIXED|MAP_DENYWRITE, 3, 0x19000) =3D 0x7f3ed0f0a000
mmap(0x7f3ed0f0d000, 37504, PROT_READ|PROT_WRITE, =
MAP_PRIVATE|MAP_FIXED|MAP_ANONYMOUS, -1, 0) =3D 0x7f3ed0f0d000
close(3)                                =3D 0
access("/etc/ld.so.nohwcap", F_OK)      =3D -1 ENOENT (No such file or =
directory)
open("/lib/x86_64-linux-gnu/libauparse.so.0", O_RDONLY|O_CLOEXEC) =3D 3
read(3, =
"\177ELF\2\1\1\0\0\0\0\0\0\0\0\0\3\0>\0\1\0\0\0\220(\0\0\0\0\0\0"..., =
832) =3D 832
fstat(3, {st_mode=3DS_IFREG|0644, st_size=3D88624, ...}) =3D 0
mmap(NULL, 2183984, PROT_READ|PROT_EXEC, MAP_PRIVATE|MAP_DENYWRITE, 3, =
0) =3D 0x7f3ed0adb000
mprotect(0x7f3ed0af0000, 2093056, PROT_NONE) =3D 0
mmap(0x7f3ed0cef000, 8192, PROT_READ|PROT_WRITE, =
MAP_PRIVATE|MAP_FIXED|MAP_DENYWRITE, 3, 0x14000) =3D 0x7f3ed0cef000
close(3)                                =3D 0
access("/etc/ld.so.nohwcap", F_OK)      =3D -1 ENOENT (No such file or =
directory)
open("/lib/x86_64-linux-gnu/libc.so.6", O_RDONLY|O_CLOEXEC) =3D 3
read(3, =
"\177ELF\2\1\1\3\0\0\0\0\0\0\0\0\3\0>\0\1\0\0\0P\34\2\0\0\0\0\0"..., =
832) =3D 832
fstat(3, {st_mode=3DS_IFREG|0755, st_size=3D1738176, ...}) =3D 0
mmap(NULL, 4096, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_ANONYMOUS, -1, 0) =
=3D 0x7f3ed112b000
mmap(NULL, 3844640, PROT_READ|PROT_EXEC, MAP_PRIVATE|MAP_DENYWRITE, 3, =
0) =3D 0x7f3ed0730000
mprotect(0x7f3ed08d1000, 2097152, PROT_NONE) =3D 0
mmap(0x7f3ed0ad1000, 24576, PROT_READ|PROT_WRITE, =
MAP_PRIVATE|MAP_FIXED|MAP_DENYWRITE, 3, 0x1a1000) =3D 0x7f3ed0ad1000
mmap(0x7f3ed0ad7000, 14880, PROT_READ|PROT_WRITE, =
MAP_PRIVATE|MAP_FIXED|MAP_ANONYMOUS, -1, 0) =3D 0x7f3ed0ad7000
close(3)                                =3D 0
mmap(NULL, 4096, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_ANONYMOUS, -1, 0) =
=3D 0x7f3ed112a000
mmap(NULL, 4096, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_ANONYMOUS, -1, 0) =
=3D 0x7f3ed1129000
arch_prctl(ARCH_SET_FS, 0x7f3ed112a700) =3D 0
mprotect(0x7f3ed0ad1000, 16384, PROT_READ) =3D 0
mprotect(0x7f3ed0f0a000, 8192, PROT_READ) =3D 0
mprotect(0x7f3ed0cef000, 4096, PROT_READ) =3D 0
mprotect(0x5623714e3000, 4096, PROT_READ) =3D 0
mprotect(0x7f3ed1137000, 4096, PROT_READ) =3D 0
munmap(0x7f3ed112c000, 35244)           =3D 0
geteuid()                               =3D 0
brk(0)                                  =3D 0x5623724d5000
brk(0x5623724f6000)                     =3D 0x5623724f6000
socket(PF_NETLINK, SOCK_RAW, NETLINK_AUDIT) =3D 3
fcntl(3, F_SETFD, FD_CLOEXEC)           =3D 0
sendto(3, "\20\0\0\0\350\3\5\0\1\0\0\0\0\0\0\0", 16, 0, =
{sa_family=3DAF_NETLINK, pid=3D0, groups=3D00000000}, 12) =3D 16
poll([{fd=3D3, events=3DPOLLIN}], 1, 500)   =3D 1 ([{fd=3D3, =
revents=3DPOLLIN}])
recvfrom(3, =
"$\0\0\0\2\0\0\0\1\0\0\0f\"\0\0\0\0\0\0\20\0\0\0\350\3\5\0\1\0\0\0"..., =
8988, MSG_PEEK|MSG_DONTWAIT, {sa_family=3DAF_NETLINK, pid=3D0, =
groups=3D00000000}, [12]) =3D 36
recvfrom(3, =
"$\0\0\0\2\0\0\0\1\0\0\0f\"\0\0\0\0\0\0\20\0\0\0\350\3\5\0\1\0\0\0"..., =
8988, MSG_DONTWAIT, {sa_family=3DAF_NETLINK, pid=3D0, groups=3D00000000}, =
[12]) =3D 36
select(4, [3], NULL, NULL, {0, 100000}) =3D 1 (in [3], left {0, 99995})
recvfrom(3, =
"8\0\0\0\350\3\0\0\1\0\0\0f\"\0\0\0\0\0\0\1\0\0\0\1\0\0\0\311 \0\0"..., =
8988, MSG_DONTWAIT, {sa_family=3DAF_NETLINK, pid=3D0, groups=3D00000000}, =
[12]) =3D 56
fstat(1, {st_mode=3DS_IFCHR|0600, st_rdev=3Dmakedev(136, 0), ...}) =3D 0
mmap(NULL, 4096, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_ANONYMOUS, -1, 0) =
=3D 0x7f3ed1134000
write(1, "enabled 1\n", 10enabled 1
)             =3D 10
write(1, "flag 1\n", 7flag 1
)                 =3D 7
write(1, "pid 8393\n", 9pid 8393
)               =3D 9
write(1, "rate_limit 0\n", 13rate_limit 0
)          =3D 13
write(1, "backlog_limit 320\n", 18backlog_limit 320
)     =3D 18
write(1, "lost 0\n", 7lost 0
)                 =3D 7
write(1, "backlog 0\n", 10backlog 0
)             =3D 10
sendto(3, " =
\0\0\0\373\3\5\0\2\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0", 32, =
0, {sa_family=3DAF_NETLINK, pid=3D0, groups=3D00000000}, 12) =3D 32
poll([{fd=3D3, events=3DPOLLIN}], 1, 500)   =3D 1 ([{fd=3D3, =
revents=3DPOLLIN}])
recvfrom(3, "$\0\0\0\2\0\0\0\2\0\0\0f\"\0\0\0\0\0\0 =
\0\0\0\373\3\5\0\2\0\0\0"..., 8988, MSG_PEEK|MSG_DONTWAIT, =
{sa_family=3DAF_NETLINK, pid=3D0, groups=3D00000000}, [12]) =3D 36
recvfrom(3, "$\0\0\0\2\0\0\0\2\0\0\0f\"\0\0\0\0\0\0 =
\0\0\0\373\3\5\0\2\0\0\0"..., 8988, MSG_DONTWAIT, {sa_family=3DAF_NETLINK,=
 pid=3D0, groups=3D00000000}, [12]) =3D 36
select(4, [3], NULL, NULL, {0, 100000}) =3D 1 (in [3], left {0, 99990})
recvfrom(3, " =
\0\0\0\373\3\0\0\2\0\0\0f\"\0\0\1\0\0\0\377\377\377\377\0\0\0\0\0\0\0\0", =
8988, MSG_DONTWAIT, {sa_family=3DAF_NETLINK, pid=3D0, groups=3D00000000}, =
[12]) =3D 32
--- SIGSEGV {si_signo=3DSIGSEGV, si_code=3DSEGV_MAPERR, si_addr=3D0x4} =
---
+++ killed by SIGSEGV +++
Segmentation fault









Acknowledgement sent to Mauro Rappa <[email protected]>:
New bug report received and forwarded. Copy sent to [email protected]. Full text available.
Report forwarded to [email protected], [email protected]:
bug#113; Package auditd. Full text available.

Devuan BTS -- Powered by Debian bug tracking system
Copyright (C) 1999 Darren O. Benham,
1997 nCipher Corporation Ltd, 1994-97 Ian Jackson.

Devuan Bugs Owner <[email protected]>.
Last modified: Sat, 18 Jan 2025 04:39:02 UTC