Processed: Re: Bug#789121: segfaults in libc6 when accessing ssl keys and signatures

2015-06-26 Thread Debian Bug Tracking System
Processing control commands:

 severity 789121 important
Bug #789121 [claws-mail] segfaults in libc6 when accessing ssl keys and 
signatures
Severity set to 'important' from 'grave'

-- 
789121: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=789121
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems


--
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#789121: segfaults in libc6 when accessing ssl keys and signatures

2015-06-26 Thread Ricardo Mones
Control: severity 789121 important

Hi Andrea,

On Thu, Jun 18, 2015 at 03:31:33AM +0200, Andrea Lusuardi wrote:
 Package: claws-mail
 Version: 3.11.1-3
 Severity: grave

This severity is not correct with current bug info, I've readjusted it
to a more suitable value¹.

 Hi, since latest update claws-mail on my debian sid starts up
 correctly and i can access emails and even send one, until i try to
 fetch unread emails from any ssl/tls protected source, it then
 immediately segfaults. I am attaching some of the final strace output
 hoping this helps.  Thanks and let me know how i can help with the
 debugging, i have some experience with gdb and related.

Great, then please try to get a proper backtrace with gdb.

You can read upstream's page for help on debugging, which also
includes specifics for Debian:

http://www.claws-mail.org/faq/index.php/Debugging_Claws

thanks in advance,

¹ https://www.debian.org/Bugs/Developer.en.html#severities
-- 
  Ricardo Mones 
  ~
  Never send a human to do a machine's job.   Agent Smith



signature.asc
Description: Digital signature


Bug#789121: segfaults in libc6 when accessing ssl keys and signatures

2015-06-17 Thread Andrea Lusuardi
Package: claws-mail
Version: 3.11.1-3
Severity: grave

Hi,
since latest update claws-mail on my debian sid starts up correctly and i can 
access emails
and even send one, until i try to fetch unread emails from any ssl/tls 
protected source, it
then immediately segfaults. I am attaching some of the final strace output 
hoping this helps.
Thanks and let me know how i can help with the debugging, i have some 
experience with gdb and related.

recvmsg(4, 0x7ffd98850f30, 0)   = -1 EAGAIN (Resource temporarily 
unavailable)
poll([{fd=4, events=POLLIN}, {fd=5, events=POLLIN|POLLPRI}, {fd=6, 
events=POLLIN}, {fd=7, events=POLLIN}, {fd=8, events=POLLIN}, {fd=11, 
events=POLLIN}, {fd=13, events=POLLIN}, {fd=15, events=POLLIN|POLLOUT}], 8, 
42331) = 1 ([{fd=6, revents=POLLIN}])
recvmsg(4, 0x7ffd98850f30, 0)   = -1 EAGAIN (Resource temporarily 
unavailable)
poll([{fd=4, events=POLLIN}, {fd=5, events=POLLIN|POLLPRI}, {fd=6, 
events=POLLIN}, {fd=7, events=POLLIN}, {fd=8, events=POLLIN}, {fd=11, 
events=POLLIN}, {fd=13, events=POLLIN}, {fd=15, events=POLLIN|POLLOUT}], 8, 
42330) = 1 ([{fd=6, revents=POLLIN}])
read(6, \4\0\0\0\0\0\0\0, 16) = 8
recvmsg(4, 0x7ffd98850f30, 0)   = -1 EAGAIN (Resource temporarily 
unavailable)
poll([{fd=4, events=POLLIN}, {fd=5, events=POLLIN|POLLPRI}, {fd=6, 
events=POLLIN}, {fd=7, events=POLLIN}, {fd=8, events=POLLIN}, {fd=11, 
events=POLLIN}, {fd=13, events=POLLIN}, {fd=15, events=POLLIN|POLLOUT}], 8, 
42330) = 1 ([{fd=15, revents=POLLOUT}])
read(6, 0x7ffd988510e0, 16) = -1 EAGAIN (Resource temporarily 
unavailable)
write(6, \1\0\0\0\0\0\0\0, 8) = 8
getsockopt(15, SOL_SOCKET, SO_ERROR, [0], [4]) = 0
fstat(15, {st_mode=S_IFSOCK|0777, st_size=0, ...}) = 0
fcntl(15, F_GETFL)  = 0x802 (flags O_RDWR|O_NONBLOCK)
fcntl(15, F_GETFL)  = 0x802 (flags O_RDWR|O_NONBLOCK)
fcntl(15, F_SETFL, O_RDWR)  = 0
stat(/etc/pki/tls/certs/ca-bundle.crt, 0x7ffd98850ee0) = -1 ENOENT (No such 
file or directory)
stat(/etc/certs/ca-bundle.crt, 0x7ffd98850ee0) = -1 ENOENT (No such file or 
directory)
stat(/etc/ssl/ca-bundle.pem, 0x7ffd98850ee0) = -1 ENOENT (No such file or 
directory)
stat(/usr/share/ssl/certs/ca-bundle.crt, 0x7ffd98850ee0) = -1 ENOENT (No such 
file or directory)
stat(/etc/ssl/certs/ca-certificates.crt, {st_mode=S_IFREG|0644, 
st_size=286339, ...}) = 0
stat(/etc/pki/tls/certs/ca-bundle.crt, 0x7ffd98850ee0) = -1 ENOENT (No such 
file or directory)
stat(/etc/certs/ca-bundle.crt, 0x7ffd98850ee0) = -1 ENOENT (No such file or 
directory)
stat(/etc/ssl/ca-bundle.pem, 0x7ffd98850ee0) = -1 ENOENT (No such file or 
directory)
stat(/usr/share/ssl/certs/ca-bundle.crt, 0x7ffd98850ee0) = -1 ENOENT (No such 
file or directory)
stat(/etc/ssl/certs/ca-certificates.crt, {st_mode=S_IFREG|0644, 
st_size=286339, ...}) = 0
open(/etc/ssl/certs/ca-certificates.crt, O_RDONLY) = 18
fstat(18, {st_mode=S_IFREG|0644, st_size=286339, ...}) = 0
fstat(18, {st_mode=S_IFREG|0644, st_size=286339, ...}) = 0
mmap(NULL, 4096, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_ANONYMOUS, -1, 0) = 
0x7fad8b7f2000
lseek(18, 0, SEEK_CUR)  = 0
read(18, -BEGIN CERTIFICATE-\nMIIF..., 282624) = 282624
read(18, KZhcEmVeq5CSS2bf1XUS\nU1QYpt6K1rt..., 4096) = 3715
read(18, , 4096)  = 0
close(18)   = 0
munmap(0x7fad8b7f2000, 4096)= 0
clone(child_stack=0x7fad79691cf0, 
flags=CLONE_VM|CLONE_FS|CLONE_FILES|CLONE_SIGHAND|CLONE_THREAD|CLONE_SYSVSEM|CLONE_SETTLS|CLONE_PARENT_SETTID|CLONE_CHILD_CLEARTID,
 parent_tidptr=0x7fad796929d0, tls=0x7fad79692700, child_tidptr=0x7fad796929d0) 
= 27068
recvmsg(4, 0x7ffd98850d10, 0)   = -1 EAGAIN (Resource temporarily 
unavailable)
poll([{fd=4, events=POLLIN}, {fd=5, events=POLLIN|POLLPRI}, {fd=6, 
events=POLLIN}, {fd=7, events=POLLIN}, {fd=8, events=POLLIN}, {fd=11, 
events=POLLIN}, {fd=13, events=POLLIN}], 7, 0) = 1 ([{fd=6, revents=POLLIN}])
nanosleep({0, 5000}, 0x7ffd98850fe0) = 0
recvmsg(4, 0x7ffd98850d10, 0)   = -1 EAGAIN (Resource temporarily 
unavailable)
poll([{fd=4, events=POLLIN}, {fd=5, events=POLLIN|POLLPRI}, {fd=6, 
events=POLLIN}, {fd=7, events=POLLIN}, {fd=8, events=POLLIN}, {fd=11, 
events=POLLIN}, {fd=13, events=POLLIN}], 7, 0) = 1 ([{fd=6, revents=POLLIN}])
read(6, \1\0\0\0\0\0\0\0, 16) = 8
nanosleep({0, 5000},  unfinished ...
+++ killed by SIGSEGV +++
Segmentation fault


-- System Information:
Debian Release: stretch/sid
  APT prefers unstable
  APT policy: (500, 'unstable'), (500, 'testing'), (500, 'stable'), (1, 
'experimental')
Architecture: amd64 (x86_64)
Foreign Architectures: i386

Kernel: Linux 4.0.0-1-amd64 (SMP w/8 CPU cores)
Locale: LANG=it_IT, LC_CTYPE=it_IT (charmap=ISO-8859-1)
Shell: /bin/sh linked to /bin/dash
Init: systemd (via /run/systemd/system)

Versions of packages claws-mail depends on:
ii  libarchive13 3.1.2-11+b1
ii  libassuan0   2.2.1-1
ii  libatk1.0-0