general protection fault in libpam-heimdal/sshd
Bug #235170 reported by
Steven McCoy
This bug affects 1 person
Affects | Status | Importance | Assigned to | Milestone | |
---|---|---|---|---|---|
libpam-heimdal (Ubuntu) |
Confirmed
|
Undecided
|
Unassigned | ||
Bug Description
Binary package hint: libpam-heimdal
Ubuntu 8.04 _only_ on AMD64, i386 is _not affected_. SSHD crashes refusing client access with the following common-auth:
auth sufficient pam_krb5.so ccache=
auth sufficient pam_unix.so likeauth nullok_secure use_first_pass
auth required pam_deny.so
That's the Heimdal version of pam_krb5.so. Swapping the lines around makes the login work, with the crash only appearing on invalid login attempts.
auth sufficient pam_unix.so likeauth nullok_secure
auth sufficient pam_krb5.so ccache=
auth required pam_deny.so
Changed in libpam-heimdal: | |
status: | New → Confirmed |
To post a comment you must log in.
We are also seeing this problem at our organization. The machine in question is an AMD64 running the AMD64 server install of Ubuntu 8.04.
We have other machines that are AMD64 based but running the i386 server install without problems.
The above re-ordering of common-auth does not work around the problem in our environment, sshd still segfaults.