https://bugzilla.redhat.com/show_bug.cgi?id=2214534
Bug ID: 2214534
Summary: [abrt] sssd-common: __strcmp_avx2(): sssd_be killed by
SIGSEGV
Product: Fedora
Version: 38
Hardware: x86_64
Status: NEW
Whiteboard: abrt_hash:a07038fd78acc47fd66b266203cafebd50509e00;VAR
IANT_ID=workstation;
Component: sssd
Assignee: sssd-maintainers(a)lists.fedoraproject.org
Reporter: jortialc(a)redhat.com
QA Contact: extras-qa(a)fedoraproject.org
CC: abokovoy(a)redhat.com, atikhono(a)redhat.com,
jhrozek(a)redhat.com, lslebodn(a)redhat.com,
luk.claes(a)gmail.com, mzidek(a)redhat.com,
pbrezina(a)redhat.com, sbose(a)redhat.com,
ssorce(a)redhat.com,
sssd-maintainers(a)lists.fedoraproject.org
Target Milestone: ---
Classification: Fedora
Description of problem:
This happens when doing some privilege escalation like using sudo or the
authentication required dialog in Gnome
Version-Release number of selected component:
sssd-common-2.9.0-1.fc38
Additional info:
reporter: libreport-2.17.10
type: CCpp
reason: sssd_be killed by SIGSEGV
journald_cursor:
s=025af2782fd445c2a5eb791571c74138;i=250aa;b=61468fbb4dd141e9b488d260f287c4ef;m=69ee27e2a;t=5fd9e17d98e50;x=b86133abd50e6842
executable: /usr/libexec/sssd/sssd_be
cmdline: /usr/libexec/sssd/sssd_be --domain
ipa.redhat.com --uid 0 --gid
0 --logger=files
cgroup: 0::/system.slice/sssd.service
rootdir: /
uid: 0
kernel: 6.3.5-200.fc38.x86_64
package: sssd-common-2.9.0-1.fc38
runlevel: N 5
backtrace_rating: 4
crash_function: __strcmp_avx2
comment: This happens when doing some privilege escalation like using
sudo or the authentication required dialog in Gnome
Truncated backtrace:
Thread no. 1 (21 frames)
#0 __strcmp_avx2 at ../sysdeps/x86_64/multiarch/strcmp-avx2.S:283
#1 be_resolve_server_process at src/providers/data_provider_fo.c:691
#2 be_resolve_server_done at src/providers/data_provider_fo.c:557
#3 fo_resolve_service_server at src/providers/fail_over.c:1169
#4 _tevent_req_error at ../../tevent_req.c:221
#5 resolve_srv_done at src/providers/fail_over.c:1480
#6 fo_discover_srv_done at src/providers/fail_over_srv.c:141
#7 resolv_getsrv_done at src/resolv/async_resolv.c:1877
#8 qcallback at
/usr/src/debug/c-ares-1.19.1-1.fc38.x86_64/src/lib/ares_query.c:143
#9 end_query at
/usr/src/debug/c-ares-1.19.1-1.fc38.x86_64/src/lib/ares_process.c:1525
#10 process_answer at
/usr/src/debug/c-ares-1.19.1-1.fc38.x86_64/src/lib/ares_process.c:598
#11 read_udp_packets at
/usr/src/debug/c-ares-1.19.1-1.fc38.x86_64/src/lib/ares_process.c:548
#12 processfds at
/usr/src/debug/c-ares-1.19.1-1.fc38.x86_64/src/lib/ares_process.c:126
#13 tevent_common_invoke_fd_handler at ../../tevent_fd.c:142
#14 epoll_event_loop at ../../tevent_epoll.c:737
#15 epoll_event_loop_once at ../../tevent_epoll.c:938
#16 std_event_loop_once at ../../tevent_standard.c:110
#17 _tevent_loop_once at ../../tevent.c:823
#18 tevent_common_loop_wait at ../../tevent.c:949
#19 std_event_loop_wait at ../../tevent_standard.c:141
#20 server_loop at src/util/server.c:787
Potential duplicate: bug 1773488
--
You are receiving this mail because:
You are on the CC list for the bug.
You are the assignee for the bug.
https://bugzilla.redhat.com/show_bug.cgi?id=2214534
Report this comment as SPAM:
https://bugzilla.redhat.com/enter_bug.cgi?product=Bugzilla&format=rep...