sometimes libpam-thinkfinger makes sudo crash

Bug #359590 reported by Marius Gedminas
8
This bug affects 1 person
Affects Status Importance Assigned to Milestone
thinkfinger (Ubuntu)
Confirmed
Undecided
Unassigned

Bug Description

This happened twice to me in Jaunty: I type sudo, type my password, press Enter, and get this error:

Password or swipe finger:
Warning: usb_bulk_read expected to read 0x40 (read 0x0 bytes).
*** glibc detected *** sudo: malloc(): memory corruption: 0x085b0dc8 ***
======= Backtrace: =========
/lib/tls/i686/cmov/libc.so.6[0xb7f2f276]
/lib/tls/i686/cmov/libc.so.6(__libc_malloc+0x95)[0xb7f309c5]
/lib/tls/i686/cmov/libc.so.6[0xb7f581db]
/lib/tls/i686/cmov/libc.so.6(opendir+0x63)[0xb7f58373]
/lib/libusb-0.1.so.4(usb_os_find_busses+0x22)[0xb803c472]
/lib/libusb-0.1.so.4(usb_find_busses+0x1f)[0xb80399bf]
/usr/local/lib/libthinkfinger.so.0[0xb8042791]
/usr/local/lib/libthinkfinger.so.0(libthinkfinger_verify+0x67)[0xb8042c97]
/lib/security/pam_thinkfinger.so[0xb80467e1]
/lib/tls/i686/cmov/libpthread.so.0[0xb7e564ff]
/lib/tls/i686/cmov/libc.so.6(clone+0x5e)[0xb7fa149e]
======= Memory map: ========
08048000-08063000 r-xp 00000000 08:03 170676 /usr/bin/sudo
08063000-08064000 r--p 0001a000 08:03 170676 /usr/bin/sudo
08064000-08065000 rw-p 0001b000 08:03 170676 /usr/bin/sudo
08065000-08068000 rw-p 08065000 00:00 0
085a8000-085ea000 rw-p 085a8000 00:00 0 [heap]
b6cfe000-b6d0b000 r-xp 00000000 08:03 1317056 /lib/libgcc_s.so.1
b6d0b000-b6d0c000 r--p 0000c000 08:03 1317056 /lib/libgcc_s.so.1
b6d0c000-b6d0d000 rw-p 0000d000 08:03 1317056 /lib/libgcc_s.so.1
b6d0d000-b6d0e000 ---p b6d0d000 00:00 0
b6d0e000-b750e000 rw-p b6d0e000 00:00 0
b750e000-b750f000 ---p b750e000 00:00 0
b750f000-b7d0f000 rw-p b750f000 00:00 0
b7d0f000-b7d11000 r-xp 00000000 08:03 165579 /usr/lib/libck-connector.so.0.0.0
b7d11000-b7d12000 r--p 00001000 08:03 165579 /usr/lib/libck-connector.so.0.0.0
b7d12000-b7d13000 rw-p 00002000 08:03 165579 /usr/lib/libck-connector.so.0.0.0
b7d13000-b7d49000 r-xp 00000000 08:03 4915372 /lib/libdbus-1.so.3.4.0
b7d49000-b7d4a000 r--p 00035000 08:03 4915372 /lib/libdbus-1.so.3.4.0
b7d4a000-b7d4b000 rw-p 00036000 08:03 4915372 /lib/libdbus-1.so.3.4.0
b7d4b000-b7db1000 r-xp 00000000 08:03 4915212 /lib/libgcrypt.so.11.4.4
b7db1000-b7db2000 r--p 00065000 08:03 4915212 /lib/libgcrypt.so.11.4.4
b7db2000-b7db4000 rw-p 00066000 08:03 4915212 /lib/libgcrypt.so.11.4.4
b7db4000-b7dc8000 r-xp 00000000 08:03 165752 /usr/lib/libecryptfs.so.0.0.0
b7dc8000-b7dc9000 r--p 00013000 08:03 165752 /usr/lib/libecryptfs.so.0.0.0
b7dc9000-b7dd0000 rw-p 00014000 08:03 165752 /usr/lib/libecryptfs.so.0.0.0
b7dea000-b7e02000 r-xp 00000000 08:03 1317066 /lib/libselinux.so.1
b7e02000-b7e03000 r--p 00017000 08:03 1317066 /lib/libselinux.so.1
b7e03000-b7e04000 rw-p 00018000 08:03 1317066 /lib/libselinux.so.1
b7e04000-b7e0d000 r-xp 00000000 08:03 4702422 /lib/tls/i686/cmov/libcrypt-2.9.so
b7e0d000-b7e0e000 r--p 00008000 08:03 4702422 /lib/tls/i686/cmov/libcrypt-2.9.so
b7e0e000-b7e0f000 rw-p 00009000 08:03 4702422 /lib/tls/i686/cmov/libcrypt-2.9.so
b7e0f000-b7e36000 rw-p b7e0f000 00:00 0
b7e36000-b7e38000 r-xp 00000000 08:03 4915253 /lib/security/pam_ck_connector.so
b7e38000-b7e39000 r--p 00001000 08:03 4915253 /lib/security/pam_ck_connector.so
b7e39000-b7e3a000 rw-p 00002000 08:03 4915253 /lib/security/pam_ck_connector.so
b7e3a000-b7e3d000 r-xp 00000000 08:03 4915861 /lib/security/pam_limits.so
b7e3d000-b7e3e000 r--p 00003000 08:03 4915861 /lib/security/pam_limits.so
b7e3e000-b7e3f000 rw-p 00004000 08:03 4915861 /lib/security/pam_limits.so
b7e3f000-b7e42000 r-xp 00000000 08:03 4915432 /lib/libgpg-error.so.0.3.0
b7e42000-b7e43000 rw-p 00002000 08:03 4915432 /lib/libgpg-error.so.0.3.0
b7e43000-b7e45000 r-xp 00000000 08:03 4915687 /lib/libpam_misc.so.0.81.3
b7e45000-b7e46000 r--p 00001000 08:03 4915687 /lib/libpam_misc.so.0.81.3
b7e46000-b7e47000 rw-p 00002000 08:03 4915687 /lib/libpam_misc.so.0.81.3
b7e47000-b7e49000 r-xp 00000000 08:03 1540185 /lib/libkeyutils-1.2.so
b7e49000-b7e4a000 r--p 00001000 08:03 1540185 /lib/libkeyutils-1.2.so
b7e4a000-b7e4b000 rw-p 00002000 08:03 1540185 /lib/libkeyutils-1.2.so
b7e4b000-b7e4e000 r-xp 00000000 08:03 4915701 /lib/security/pam_ecryptfs.so
b7e4e000-b7e4f000 r--p 00002000 08:03 4915701 /lib/security/pam_ecryptfs.so
b7e4Aborted

ProblemType: Bug
Architecture: i386
DistroRelease: Ubuntu 9.04
Package: libpam-thinkfinger 0.3+r118-0ubuntu4~ppa2
ProcEnviron:
 LC_CTYPE=lt_LT.UTF-8
 PATH=(custom, user)
 LANG=lt_LT.UTF-8
 SHELL=/bin/bash
SourcePackage: thinkfinger
Uname: Linux 2.6.28-11-generic i686
UnreportableReason: This is not a genuine Ubuntu package

Revision history for this message
Marius Gedminas (mgedmin) wrote :
Revision history for this message
Manny Vindiola (serialorder) wrote :

I can confirm this behavior

Changed in thinkfinger (Ubuntu):
status: New → Confirmed
To post a comment you must log in.
This report contains Public information  
Everyone can see this information.

Other bug subscribers

Remote bug watches

Bug watches keep track of this bug in other bug trackers.