[Pkg-openssl-devel] Bug#339532: marked as done (libssl0.9.8: reproducible segfault in bn_sub_words () at bn_asm.sparc.v8plus.S)

Debian Bug Tracking System owner at bugs.debian.org
Tue Dec 13 22:19:13 UTC 2005


Your message dated Tue, 13 Dec 2005 14:03:20 -0800
with message-id <E1EmIEy-00083R-G5 at spohr.debian.org>
and subject line Bug#335912: fixed in openssl 0.9.8a-5
has caused the attached Bug report to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what I am
talking about this indicates a serious mail system misconfiguration
somewhere.  Please contact me immediately.)

Debian bug tracking system administrator
(administrator, Debian Bugs database)

--------------------------------------
Received: (at submit) by bugs.debian.org; 16 Nov 2005 23:04:51 +0000
>From weasel at debian.org Wed Nov 16 15:04:51 2005
Return-path: <weasel at debian.org>
Received: from asteria.debian.or.at ([86.59.21.34] ident=postfix)
	by spohr.debian.org with esmtp (Exim 4.50)
	id 1EcWKh-0005aN-Eh
	for submit at bugs.debian.org; Wed, 16 Nov 2005 15:04:51 -0800
Received: from galaxy.palfrader.org (argos.campus-sbg.at [62.99.152.178])
	(using TLSv1 with cipher DHE-RSA-AES256-SHA (256/256 bits))
	(Client CN "galaxy.palfrader.org", Issuer "Peter Palfrader" (verified OK))
	by asteria.debian.or.at (Postfix) with ESMTP id 505B770CD1D;
	Thu, 17 Nov 2005 00:04:49 +0100 (CET)
Received: by galaxy.palfrader.org (Postfix, from userid 1000)
	id 86839400234; Thu, 17 Nov 2005 00:04:48 +0100 (CET)
Content-Type: text/plain; charset="us-ascii"
MIME-Version: 1.0
Content-Transfer-Encoding: 7bit
From: Peter Palfrader <weasel at debian.org>
To: Debian Bug Tracking System <submit at bugs.debian.org>
Subject: libssl0.9.8: reproducible segfault in bn_sub_words () at
 bn_asm.sparc.v8plus.S
X-Mailer: reportbug 3.17
Date: Thu, 17 Nov 2005 00:04:48 +0100
Message-Id: <20051116230448.86839400234 at galaxy.palfrader.org>
Delivered-To: submit at bugs.debian.org
X-Spam-Checker-Version: SpamAssassin 2.60-bugs.debian.org_2005_01_02 
	(1.212-2003-09-23-exp) on spohr.debian.org
X-Spam-Level: 
X-Spam-Status: No, hits=-8.0 required=4.0 tests=BAYES_00,HAS_PACKAGE 
	autolearn=no version=2.60-bugs.debian.org_2005_01_02

Package: libssl0.9.8
Version: 0.9.8a-4
Severity: normal

Hey,

on sparc64 the following snippet causes a segfault after a few
iterations (usually around i = 30).


#include <stdio.h>
#include <stdlib.h>
#include <openssl/dh.h>
#include <openssl/bn.h>

int main(int v, char **c)
{
  int which=-1, i;
  DH *dh;
  if (v!=2 || ((which=atoi(c[1]))<1 || which > 2)) {
    printf("I want 1 or 2 as an argument.\n");
    return 1;
  }
  printf("Running test %d\n",which);
  for (i=0; i < 10000; ++i) {
    if (!(i%1000)) { printf("...%d\n",i); }
    dh = DH_new();
    dh->g = BN_new();
    dh->p = get_rfc2409_prime_1024(NULL);
    BN_set_word(dh->g, 2);
    if (which == 2) {
      dh->length = 320;
    }
    DH_generate_key(dh);

    DH_free(dh);
  }
  return 0;
}

| maurice:/tmp/nick# ./a.out 1
| Running test 1
| ...0
| Segmentation fault
| maurice:/tmp/nick# ./a.out 2
| Running test 2
| ...0
| Segmentation fault

(gdb) bt
#0  bn_sub_words () at bn_asm.sparc.v8plus.S:555
#1  0x70228c20 in bn_sub_part_words (r=0x22b18, a=0x22930, b=0x22950, cl=7, dl=1) at bn_mul.c:87
#2  0x7022981c in bn_mul_recursive (r=0x22c80, a=0x22828, b=0x22930, n2=16, dna=0, dnb=-1, t=0x22af8) at bn_mul.c:437
#3  0x7022964c in bn_mul_recursive (r=0x22c00, a=0x227e8, b=0x228f0, n2=32, dna=0, dnb=-1, t=0x229f8) at bn_mul.c:499
#4  0x7022a50c in BN_mul (r=0x21074, a=0x21038, b=0x2104c, ctx=0x20f50) at bn_mul.c:1037
#5  0x70230a30 in BN_mod_mul_montgomery (r=0x21038, a=0x21038, b=0x2104c, mont=0x20d38, ctx=0x20f50) at bn_mont.c:89
#6  0x70226cf8 in BN_mod_exp_mont_consttime (rr=0x20f38, a=Variable "a" is not available.) at bn_exp.c:705
#7  0x7024a4c4 in generate_key (dh=0x21270) at dh_key.c:158
#8  0x7024a28c in DH_generate_key (dh=Variable "dh" is not available.) at dh_key.c:76
#9  0x000108f4 in main (v=2, c=0xeffff974) at x.c:24


When rebuilding openssl with the no-asm switch all is fine.

-- 
Peter

---------------------------------------
Received: (at 335912-close) by bugs.debian.org; 13 Dec 2005 22:12:51 +0000
>From katie at ftp-master.debian.org Tue Dec 13 14:12:51 2005
Return-path: <katie at ftp-master.debian.org>
Received: from katie by spohr.debian.org with local (Exim 4.50)
	id 1EmIEy-00083R-G5; Tue, 13 Dec 2005 14:03:20 -0800
From: Kurt Roeckx <kurt at roeckx.be>
To: 335912-close at bugs.debian.org
X-Katie: $Revision: 1.60 $
Subject: Bug#335912: fixed in openssl 0.9.8a-5
Message-Id: <E1EmIEy-00083R-G5 at spohr.debian.org>
Sender: Archive Administrator <katie at ftp-master.debian.org>
Date: Tue, 13 Dec 2005 14:03:20 -0800
X-Spam-Checker-Version: SpamAssassin 2.60-bugs.debian.org_2005_01_02 
	(1.212-2003-09-23-exp) on spohr.debian.org
X-Spam-Level: 
X-Spam-Status: No, hits=-6.0 required=4.0 tests=BAYES_00,HAS_BUG_NUMBER 
	autolearn=no version=2.60-bugs.debian.org_2005_01_02

Source: openssl
Source-Version: 0.9.8a-5

We believe that the bug you reported is fixed in the latest version of
openssl, which is due to be installed in the Debian FTP archive:

libcrypto0.9.8-udeb_0.9.8a-5_i386.udeb
  to pool/main/o/openssl/libcrypto0.9.8-udeb_0.9.8a-5_i386.udeb
libssl-dev_0.9.8a-5_i386.deb
  to pool/main/o/openssl/libssl-dev_0.9.8a-5_i386.deb
libssl0.9.8-dbg_0.9.8a-5_i386.deb
  to pool/main/o/openssl/libssl0.9.8-dbg_0.9.8a-5_i386.deb
libssl0.9.8_0.9.8a-5_i386.deb
  to pool/main/o/openssl/libssl0.9.8_0.9.8a-5_i386.deb
openssl_0.9.8a-5.diff.gz
  to pool/main/o/openssl/openssl_0.9.8a-5.diff.gz
openssl_0.9.8a-5.dsc
  to pool/main/o/openssl/openssl_0.9.8a-5.dsc
openssl_0.9.8a-5_i386.deb
  to pool/main/o/openssl/openssl_0.9.8a-5_i386.deb



A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 335912 at bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Kurt Roeckx <kurt at roeckx.be> (supplier of updated openssl package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmaster at debian.org)


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Format: 1.7
Date: Tue, 13 Dec 2005 21:37:42 +0100
Source: openssl
Binary: libssl-dev openssl libssl0.9.8-dbg libcrypto0.9.8-udeb libssl0.9.8
Architecture: source i386
Version: 0.9.8a-5
Distribution: unstable
Urgency: low
Maintainer: Debian OpenSSL Team <pkg-openssl-devel at lists.alioth.debian.org>
Changed-By: Kurt Roeckx <kurt at roeckx.be>
Description: 
 libcrypto0.9.8-udeb - crypto shared library - udeb (udeb)
 libssl-dev - SSL development libraries, header files and documentation
 libssl0.9.8 - SSL shared libraries
 libssl0.9.8-dbg - Symbol tables for libssl and libcrypt
 openssl    - Secure Socket Layer (SSL) binary and related cryptographic tools
Closes: 335912
Changes: 
 openssl (0.9.8a-5) unstable; urgency=low
 .
   * Stop ssh from crashing randomly on sparc (Closes: #335912)
     Patch from upstream cvs.
Files: 
 38acf6b949857fc1065a54f602a13c58 796 utils optional openssl_0.9.8a-5.dsc
 286eeef9ae1171fd1627cf6856161bb2 32068 utils optional openssl_0.9.8a-5.diff.gz
 6f9e96e0d3ff6987c9180ab2d4915ad5 977350 utils optional openssl_0.9.8a-5_i386.deb
 0f528931adfca02c5c852cb8f4c348c2 2645012 libs important libssl0.9.8_0.9.8a-5_i386.deb
 dad0712f421df14f181ad8b601406f74 508512 debian-installer optional libcrypto0.9.8-udeb_0.9.8a-5_i386.udeb
 3cf344948886b244e5973542b3c769b5 2836502 libdevel optional libssl-dev_0.9.8a-5_i386.deb
 6264e0a60184bd9aa57ab18525ed7d75 5164294 libdevel extra libssl0.9.8-dbg_0.9.8a-5_i386.deb
Package-Type: udeb

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.1 (GNU/Linux)

iD8DBQFDnzl0QdwckHJElwsRAiyoAKC7iwAzM0YRxARMEle4fCKA6J9q+QCeK2ix
VMi/CD8AVxAWMzco7GL0lIw=
=TQuO
-----END PGP SIGNATURE-----




More information about the Pkg-openssl-devel mailing list