| Summary: | unhide *brute Segmentation faults | ||
|---|---|---|---|
| Product: | Mageia | Reporter: | Bit Twister <bittwister2> |
| Component: | RPM Packages | Assignee: | Jani Välimaa <jani.valimaa> |
| Status: | REOPENED --- | QA Contact: | |
| Severity: | normal | ||
| Priority: | Normal | ||
| Version: | Cauldron | ||
| Target Milestone: | --- | ||
| Hardware: | All | ||
| OS: | Linux | ||
| Whiteboard: | |||
| Source RPM: | unhide-20210124-1.mga8.src.rpm | CVE: | |
| Status comment: | |||
|
Description
Bit Twister
2020-06-26 20:43:09 CEST
Bit Twister
2020-06-27 09:49:43 CEST
Source RPM:
unhide-20130526-7.mga8.src.rpm =>
unhide-20130526-8.mga8.src.rpm Sorry for leaving this.
Installing & trying unhide, it quckly looked like it segfaults only with 'brute' & 'checkbrute'.
$ sudo unhide -v brute
Unhide 20130526
...
Segmentation fault
$ sudo unhide -v checkbrute
Unhide 20130526
...
Segmentation fault
A couple of other tests I tried went to end.
Standard tests :
brute
proc
procall
procfs
quick
reverse
sys
Elementary tests :
checkbrute
checkchdir
checkgetaffinity
checkgetparam
checkgetpgid
checkgetprio
checkRRgetinterval
checkgetsched
checkgetsid
checkkill
checknoprocps
checkopendir
checkproc
checkquick
checkreaddir
checkreverse
checksysinfo
checksysinfo2
checksysinfo3
@ Bit Twister
Would you like to try more, and report back? I am behind with new bugs.
This software is extremely old, the current version committed Jun 20 2013, so presumably the fault goes back also.
Assigning to wally as the registered maintainer, who also did that old update.Summary:
unhide Segmentation faults =>
unhide *brute Segmentation faults (In reply to Lewis Smith from comment #1) > Sorry for leaving this. > Installing & trying unhide, it quckly looked like it segfaults only with > 'brute' & 'checkbrute'. > $ sudo unhide -v brute > Unhide 20130526 > ... > Segmentation fault > @ Bit Twister > Would you like to try more, and report back? I am behind with new bugs. > > This software is extremely old, the current version committed Jun 20 2013, Yup, but has been working well and process tables and whatnot have not changed that much. :) > so presumably the fault goes back also. Not sure I know what you mean about the fault going back. I have a cron job I have been using for years with unhide -d -m sys procall brute reverse > $_log_fn 2>&1 You are right. The fault does not "go back" to earlier Mageias.
I have just installed & tried hide [check]brute on Mageia 7, and it works fine. So the fault really is Cauldron only.
> Would you like to try more, and report back?
I was hoping you might explore (Cauldron) other 'unhide' tests to see whether it really is only [check]brute that crashes.
(In reply to Lewis Smith from comment #3) > I was hoping you might explore (Cauldron) other 'unhide' tests to see > whether it really is only [check]brute that crashes. no problem with the following tests. unhide -d -m sys procall reverse quick procfs proc # unhide --brute --procall --reverse --sys ran without crashing. Looking ok to me. Resolution:
(none) =>
FIXED *** Bug 28347 has been marked as a duplicate of this bug. *** Re-opening this because the problem has arisen again since the last update (it looks like): Jan 25 - new version 20210124 https://bugs.mageia.org/show_bug.cgi?id=28347#c4 > I wondered why it had been working since Feb 8 clean install, > then started crashing on test bed node (tb). So the previous version apparently worked. This is again with Jani. Resolution:
FIXED =>
(none) |