bugzilla-daemon at mindrot.org
2024-May-12 14:19 UTC
[Bug 3690] New: sshd: root [priv] process sleeping leads to unprivileged child proc zombie
https://bugzilla.mindrot.org/show_bug.cgi?id=3690
Bug ID: 3690
Summary: sshd: root [priv] process sleeping leads to
unprivileged child proc zombie
Product: Portable OpenSSH
Version: -current
Hardware: All
OS: Linux
Status: NEW
Severity: normal
Priority: P5
Component: sshd
Assignee: unassigned-bugs at mindrot.org
Reporter: 546554688 at qq.com
Created attachment 3814
--> https://bugzilla.mindrot.org/attachment.cgi?id=3814&action=edit
deadlock process call stack
In the `sshd.c` file, the `grace_alarm_handler()` signal handling
function calls `sigdie()`, which in turn calls `sshsigdie()`, and
within this call, functions such as `shlogv()`, `do_log()`,
`{openlog(), syslog(), closelog()}` are invoked. Similarly, within the
main thread, the `privsep_preauth()` function calls
`monitor_child_preauth()`, which then calls `auth_log()`, and this also
results in calls to `{openlog(), syslog(), closelog()}`.
Since these functions are not async-signal-safe and they utilize a
global lock named `syslog_lock`, this can lead to a recursive deadlock
(AA lock). As a result, the pre-authentication process may end up in a
zombie state and fail to exit.
--
You are receiving this mail because:
You are watching the assignee of the bug.
bugzilla-daemon at mindrot.org
2024-May-12 14:21 UTC
[Bug 3690] sshd: root [priv] process sleeping leads to unprivileged child proc zombie
https://bugzilla.mindrot.org/show_bug.cgi?id=3690
linker <546554688 at qq.com> changed:
What |Removed |Added
----------------------------------------------------------------------------
CC| |546554688 at qq.com
--
You are receiving this mail because:
You are watching the assignee of the bug.
bugzilla-daemon at mindrot.org
2024-May-13 11:01 UTC
[Bug 3690] sshd: root [priv] process sleeping leads to unprivileged child proc zombie
https://bugzilla.mindrot.org/show_bug.cgi?id=3690
Damien Miller <djm at mindrot.org> changed:
What |Removed |Added
----------------------------------------------------------------------------
Status|NEW |RESOLVED
Resolution|--- |DUPLICATE
CC| |djm at mindrot.org
--- Comment #1 from Damien Miller <djm at mindrot.org> ---
*** This bug has been marked as a duplicate of bug 3598 ***
--
You are receiving this mail because:
You are watching the assignee of the bug.
You are watching someone on the CC list of the bug.
bugzilla-daemon at mindrot.org
2024-May-15 11:20 UTC
[Bug 3690] sshd: root [priv] process sleeping leads to unprivileged child proc zombie
https://bugzilla.mindrot.org/show_bug.cgi?id=3690
linker <546554688 at qq.com> changed:
What |Removed |Added
----------------------------------------------------------------------------
Version|-current |8.5p1
--
You are receiving this mail because:
You are watching someone on the CC list of the bug.
You are watching the assignee of the bug.
bugzilla-daemon at mindrot.org
2024-Jul-01 12:04 UTC
[Bug 3690] sshd: root [priv] process sleeping leads to unprivileged child proc zombie
https://bugzilla.mindrot.org/show_bug.cgi?id=3690
github at kalvdans.no-ip.org changed:
What |Removed |Added
----------------------------------------------------------------------------
CC| |github at kalvdans.no-ip.org
--
You are receiving this mail because:
You are watching someone on the CC list of the bug.
You are watching the assignee of the bug.
bugzilla-daemon at mindrot.org
2024-Jul-01 19:51 UTC
[Bug 3690] sshd: root [priv] process sleeping leads to unprivileged child proc zombie
https://bugzilla.mindrot.org/show_bug.cgi?id=3690
Alan D. Salewski <salewski at att.net> changed:
What |Removed |Added
----------------------------------------------------------------------------
CC| |salewski at att.net
--
You are receiving this mail because:
You are watching the assignee of the bug.
You are watching someone on the CC list of the bug.
Possibly Parallel Threads
- [Bug 3598] New: Dead lock of sshd and Defunct of sshd
- [Bug 2143] New: X11 forwarding for ipv4 is broken when ipv6 is disabled on the loopback interface
- [Bug 3379] New: Config parser only allows SetEnv once
- [Bug 2950] New: Store user runtime files in /run/user/ rather than in /tmp/
- [Bug 3438] New: env var that is SetEnv'ed multiple times in the same SetEnv directive, is sent/printed several times