|
Bugzilla – Full Text Bug Listing |
| Summary: | OpenVPN/PAM "failed to map segment from shared object" after glibc update | ||
|---|---|---|---|
| Product: | [openSUSE] PUBLIC SUSE Linux Enterprise Server 15 SP4 | Reporter: | Georg Pfuetzenreuter <georg.pfuetzenreuter> |
| Component: | Basesystem | Assignee: | Andreas Schwab <schwab> |
| Status: | RESOLVED FIXED | QA Contact: | |
| Severity: | Critical | ||
| Priority: | P2 - High | CC: | bernet, felix.niederwanger, frede, georg.pfuetzenreuter, jkosina, jslaby, markus, meissner, Michael.Dobrovnik, mjambor, opensuse, Robert, schwab, vbabka |
| Version: | unspecified | ||
| Target Milestone: | --- | ||
| Hardware: | x86-64 | ||
| OS: | SLES 15 | ||
| Whiteboard: | |||
| Found By: | --- | Services Priority: | |
| Business Priority: | Blocker: | --- | |
| Marketing QA Status: | --- | IT Deployment: | --- |
|
Description
Georg Pfuetzenreuter
2023-10-03 09:36:03 UTC
/lib64/security/pam_unix.so contains segments with an alignment bigger than the pages size, so it surely triggers the new behaviour. That looks as if the number of vm segments approaches vm.max_map_count, when mprotect needs to split a vm segment. Can you please attach a dump of /proc/$PID/maps when the error happens? Hi Andreas, thanks for getting back. I will re-install the new version to re-introduce the behavior on Thursday and report back once it happens. Never mind, I was able to find a simple reproducer. *** Bug 1215805 has been marked as a duplicate of this bug. *** *** Bug 1215923 has been marked as a duplicate of this bug. *** *** Bug 1215992 has been marked as a duplicate of this bug. *** So we have now 5 people that have this problem 4 tickets are merged together and nobody cares about it? Can we at least set this to confirmed? I'd also like to know what happens. I stopped security updates an about 70 servers, because risking the login capability is really nothing I want to have beside the already know issue that IMAP wont work after the updates. SUSE-SU-2023:4110-1: An update that solves one vulnerability and has one security fix can now be installed. Category: security (important) Bug References: 1215286, 1215891 CVE References: CVE-2023-4813 Sources used: SUSE Linux Enterprise Micro for Rancher 5.3 (src): glibc-2.31-150300.63.1 SUSE Linux Enterprise Micro 5.3 (src): glibc-2.31-150300.63.1 SUSE Linux Enterprise Micro for Rancher 5.4 (src): glibc-2.31-150300.63.1 SUSE Linux Enterprise Micro 5.4 (src): glibc-2.31-150300.63.1 SUSE Linux Enterprise Micro 5.5 (src): glibc-2.31-150300.63.1 Basesystem Module 15-SP4 (src): glibc-2.31-150300.63.1 Basesystem Module 15-SP5 (src): glibc-2.31-150300.63.1 Development Tools Module 15-SP4 (src): glibc-2.31-150300.63.1, glibc-utils-src-2.31-150300.63.1 Development Tools Module 15-SP5 (src): glibc-2.31-150300.63.1, glibc-utils-src-2.31-150300.63.1 SUSE Linux Enterprise High Performance Computing ESPOS 15 SP3 (src): glibc-2.31-150300.63.1, glibc-utils-src-2.31-150300.63.1 SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (src): glibc-2.31-150300.63.1, glibc-utils-src-2.31-150300.63.1 SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (src): glibc-2.31-150300.63.1, glibc-utils-src-2.31-150300.63.1 SUSE Linux Enterprise Server for SAP Applications 15 SP3 (src): glibc-2.31-150300.63.1, glibc-utils-src-2.31-150300.63.1 SUSE Manager Proxy 4.2 (src): glibc-2.31-150300.63.1 SUSE Manager Retail Branch Server 4.2 (src): glibc-2.31-150300.63.1 SUSE Manager Server 4.2 (src): glibc-2.31-150300.63.1 SUSE Enterprise Storage 7.1 (src): glibc-2.31-150300.63.1, glibc-utils-src-2.31-150300.63.1 SUSE Linux Enterprise Micro 5.1 (src): glibc-2.31-150300.63.1 SUSE Linux Enterprise Micro 5.2 (src): glibc-2.31-150300.63.1 SUSE Linux Enterprise Micro for Rancher 5.2 (src): glibc-2.31-150300.63.1 NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination. Works for me --> no pam errors anymore (related to Bug 1215805 - keine Authentifizierung per dovecot nach update; PAM adding faulty module), what was the problem? the fix references: - dl-map-segment-align-munmap.patch: elf: Align argument of __munmap to page size (bsc#1215891, BZ #28676) so basically a previous fix was incorrect in regards to memory alignment which led to the failures yoiu saw Seems to work also for Leap 15.5 tnx. |