Your message dated Tue, 02 Dec 2008 23:32:03 +0000 with message-id <[EMAIL PROTECTED]> and subject line Bug#507194: fixed in libpam-mount 0.44-1+lenny3 has caused the Debian Bug report #507194, regarding expand_home() segfaults on <volume user="..."> to be marked as done.
This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what this message is talking about, this may indicate a serious mail system misconfiguration somewhere. Please contact [EMAIL PROTECTED] immediately.) -- 507194: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=507194 Debian Bug Tracking System Contact [EMAIL PROTECTED] with problems
--- Begin Message ---Package: libpam-mount Version: 0.44-1+lenny2 Severity: grave libpam-mount in lenny segfaults on trying to expand home directories in user="" attributes. I don't have the backtrace at hand (it's kind of hard to write mail when your $HOME cannot be mounted ;), but the problem is as follows: expandconfig() tries to call expand_home() on the mountpoint member of vpt. This field gets a low (text?) memory address, and dereferencing *path segfaults. Even if that worked, the later call free(path) would try to free an array, not a pointer. The broken code was introduced in -1+lenny2 in 08_expand_home_fix.dpatch with the fix for #502146. rdconf1.c: 86 bool expandconfig(const struct config *config) 87 { 88 const char *u = config->user; 89 struct vol *vpt; 90 91 HXlist_for_each_entry(vpt, &config->volume_list, list) { 92 if (!expand_home(u, &vpt->mountpoint) || 278 static bool expand_home(const char *user, char **path_pptr) 279 { 280 char *buf, *path = *path_pptr; 281 struct passwd *pe; 282 size_t size; 283 284 if (path == NULL) 285 return true; 286 if (*path != '~') <-- segfault 287 return true; 298 free(path); <-- tries to free an array 299 *path_pptr = buf; 300 return true; 301 } private.h: 51 struct vol { 68 char mountpoint[PATH_MAX + 1]; <-- not a pointer 72 }; Christoph -- [EMAIL PROTECTED] | http://www.df7cb.de/
signature.asc
Description: Digital signature
--- End Message ---
--- Begin Message ---Source: libpam-mount Source-Version: 0.44-1+lenny3 We believe that the bug you reported is fixed in the latest version of libpam-mount, which is due to be installed in the Debian FTP archive: libpam-mount_0.44-1+lenny3.diff.gz to pool/main/libp/libpam-mount/libpam-mount_0.44-1+lenny3.diff.gz libpam-mount_0.44-1+lenny3.dsc to pool/main/libp/libpam-mount/libpam-mount_0.44-1+lenny3.dsc libpam-mount_0.44-1+lenny3_amd64.deb to pool/main/libp/libpam-mount/libpam-mount_0.44-1+lenny3_amd64.deb A summary of the changes between this version and the previous one is attached. Thank you for reporting the bug, which will now be closed. If you have further comments please address them to [EMAIL PROTECTED], and the maintainer will reopen the bug report if appropriate. Debian distribution maintenance software pp. Bastian Kleineidam <[EMAIL PROTECTED]> (supplier of updated libpam-mount package) (This message was generated automatically at their request; if you believe that there is a problem with it please contact the archive administrators by mailing [EMAIL PROTECTED]) -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 Format: 1.8 Date: Wed, 03 Dec 2008 00:13:39 +0100 Source: libpam-mount Binary: libpam-mount Architecture: source amd64 Version: 0.44-1+lenny3 Distribution: testing-security Urgency: high Maintainer: Bastian Kleineidam <[EMAIL PROTECTED]> Changed-By: Bastian Kleineidam <[EMAIL PROTECTED]> Description: libpam-mount - PAM module that can mount volumes for a user session Closes: 507194 507199 507257 507592 Changes: libpam-mount (0.44-1+lenny3) testing-security; urgency=high . * Fix the expand_home segfault by using a much simpler patch for the expand_user() function. (Closes: #507199, #507257, #507592, #507194) Checksums-Sha1: f7bdc58325550adfa218c55b3f551d3e6013ac75 1249 libpam-mount_0.44-1+lenny3.dsc 9c8214c31b2555512624b210debb510544fdb8f9 25926 libpam-mount_0.44-1+lenny3.diff.gz 8e2393b2e8a55c56f1d5c69506d7bd49b982ebaf 105732 libpam-mount_0.44-1+lenny3_amd64.deb Checksums-Sha256: 40da725640fa6749068d4d6693aea2a6032cd6a0725710340f5bb17db077c80a 1249 libpam-mount_0.44-1+lenny3.dsc 4336eeae00ff0b92a544c83eb258232879f60a9a533ae3dffefe30cc286ebf99 25926 libpam-mount_0.44-1+lenny3.diff.gz c1dbb1b89674f9e9f6b4c1496253ca93099ab7c796c028ee8f0deebab3d7bbff 105732 libpam-mount_0.44-1+lenny3_amd64.deb Files: 43d2ac1c868803c174a6f6a1f39644ba 1249 admin extra libpam-mount_0.44-1+lenny3.dsc f19ebf88200b932b409da3d19a25ec94 25926 admin extra libpam-mount_0.44-1+lenny3.diff.gz 5d9bdc7b4b1ea52dc878e2e63241560d 105732 admin extra libpam-mount_0.44-1+lenny3_amd64.deb -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.9 (GNU/Linux) iEYEARECAAYFAkk1wioACgkQeBwlBDLsbz47LgCfVk6jCIYsvtE0NEJNXCJEqH7S QcMAn2A+KI8NkB/Vj+XeF9H0qxQik08h =1112 -----END PGP SIGNATURE-----
--- End Message ---

