Stack trace dor gssapi-with-mic

Dan Yefimov dan at nf15.lightwave.net.ru
Mon Apr 20 08:43:32 EST 2009


On 20.04.2009 1:52, Ted Creedon wrote:
>
> debug3: authmethod_is_enabled gssapi-with-mic
> debug1: Next authentication method: gssapi-with-mic
> *** glibc detected *** ssh: double free or corruption (!prev):
> 0x0000000000574b60 ***
> ======= Backtrace: =========
> /lib64/libc.so.6[0x2b790e29237e]
> /lib64/libc.so.6(__libc_free+0x6c)[0x2b790e29399c]
> /usr/lib64/libkrb5.so.3(krb5_free_cred_contents+0x6d)[0x2b790ddcf0cd]
> /usr/lib64/libkrb5.so.3(krb5_free_creds+0x9)[0x2b790ddcf139]
> /usr/lib64/libkrb5.so.3(krb5_free_tgt_creds+0x1d)[0x2b790ddcf16d]
> /usr/lib64/libkrb5.so.3(krb5_get_credentials+0x209)[0x2b790ddca299]
> /usr/lib64/libgssapi_krb5.so.2(krb5_gss_init_sec_context+0x998)[0x2b790dc7bd68]

According to above lines, the problem is in /usr/lib64/libkrb5.so.3. So the 
solution should be first upgrading Kerberos up to the latest available version, 
and if that doesn't help, digging into Kerberos source. Most probably the 
problem is that krb5_free_cred_contents() doesn't reset some pointer to NULL 
after calling free() on it's target.
-- 

Sincerely Your, Dan.


More information about the openssh-unix-dev mailing list