Control: tag -1 upstream confirmed
Control: retitle -1 sscg FTBFS with OpenSSL 3.0.3

Adrian Bunk [2022-05-14  9:48 +0300]:
> https://buildd.debian.org/status/logs.php?pkg=sscg&ver=3.0.2-1%2Bb1
> 
> ...
>  1/10 generate_rsa_key_test FAIL              0.01s   killed by signal 11 
> SIGSEGV
> 04:32:21 MALLOC_PERTURB_=87 
> /<<PKGBUILDDIR>>/obj-x86_64-linux-gnu/generate_rsa_key_test

Trivially reproducible locally, see below. It still works with the previous
3.0.2-1 version, so this is a very recent regression.

I can't tell yet whether this is a bug in sscg or OpenSSL. Fedora still has
3.0.2, so Debian is just the first distro where we noticed.

I confirm this also still happens with current upstream main (02f0a22769a6).

| ❱❱❱ gdb ./generate_rsa_key_test
| Starting program: /var/home/martin/debian/sscg/b/generate_rsa_key_test
| [Thread debugging using libthread_db enabled]
| Using host libthread_db library "/lib/x86_64-linux-gnu/libthread_db.so.1".
| 
| Program received signal SIGSEGV, Segmentation fault.
| __strcasecmp_l_avx () at ../sysdeps/x86_64/multiarch/strcmp-sse42.S:141
| 141   ../sysdeps/x86_64/multiarch/strcmp-sse42.S: No such file or directory.
| (gdb) bt full
| #0  __strcasecmp_l_avx () at ../sysdeps/x86_64/multiarch/strcmp-sse42.S:141
| No locals.
| #1  0x00007ffff7d471df in EVP_PKEY_Q_keygen (libctx=libctx@entry=0x0, 
propq=propq@entry=0x0, type=type@entry=0x5555555560ef "RSA")
|     at ../crypto/evp/evp_lib.c:1172
|         args = {{gp_offset = 24, fp_offset = 32767, overflow_arg_area = 
0x7fffffffe6a0, reg_save_area = 0x7fffffffe650}}
|         bits = 93824992239747
|         name = <optimized out>
|         params = {{key = 0x0, data_type = 0, data = 0x0, data_size = 0, 
return_size = 0}, {key = 0x0, data_type = 0, data = 0x0,
|             data_size = 0, return_size = 0}}
|         ret = 0x0
|         __func__ = "EVP_PKEY_Q_keygen"
| #2  0x000055555555537f in sscg_generate_rsa_key 
(mem_ctx=mem_ctx@entry=0x555555559300, bits=bits@entry=512,
|     _key=_key@entry=0x7fffffffe6c8) at ../src/key.c:48
|         ret = <optimized out>
|         pkey = 0x0
|         tmp_ctx = 0x0
| #3  0x00005555555551b6 in main (argc=<optimized out>, argv=<optimized out>) 
at ../test/generate_rsa_key_test.c:46
|         ret = <optimized out>
|         pkey = 0xffffffffffffffff
|         j = <optimized out>
|         bits = {512, <optimized out>, <optimized out>, <optimized out>, 
<optimized out>}
|         tmp_ctx = 0x555555559300
| (gdb)

Thanks,

Martin

Reply via email to