Your message dated Tue, 13 Dec 2005 14:03:20 -0800
with message-id <[EMAIL PROTECTED]>
and subject line Bug#335912: fixed in openssl 0.9.8a-5
has caused the attached Bug report to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what I am
talking about this indicates a serious mail system misconfiguration
somewhere.  Please contact me immediately.)

Debian bug tracking system administrator
(administrator, Debian Bugs database)

--------------------------------------
Received: (at submit) by bugs.debian.org; 26 Oct 2005 17:31:37 +0000
>From [EMAIL PROTECTED] Wed Oct 26 10:31:37 2005
Return-path: <[EMAIL PROTECTED]>
Received: from (gk2green.dor.state.ma.us) [65.202.25.102] 
        by spohr.debian.org with smtp (Exim 3.36 1 (Debian))
        id 1EUp7g-0001sq-00; Wed, 26 Oct 2005 10:31:36 -0700
Received: from gatesgsdmz.dor.state.ma.us by gk2green.dor.state.ma.us
          via smtpd (for spohr.debian.org [140.211.166.43]) with SMTP; Wed, 26 
Oct 2005 13:31:36 -0400
Received: from dorscan2.dor.state.ma.us by gatesgsdmz.dor.state.ma.us
          via smtpd (for spohr.debian.org [140.211.166.43]) with ESMTP; Wed, 26 
Oct 2005 13:31:36 -0400
Message-Id: <[EMAIL PROTECTED]>
X-Authentication-Warning: curly.dor.state.ma.us: ron set sender to 
    [EMAIL PROTECTED] using -f
Content-Type: text/plain; charset="us-ascii"
MIME-Version: 1.0
Content-Transfer-Encoding: 7bit
From: Ron Murray <[EMAIL PROTECTED]>
To: Debian Bug Tracking System <[EMAIL PROTECTED]>
Subject: libssl0.9.8: openssl upgrade causes segfault on openssh client on
    sparc64
X-Mailer: reportbug 3.17
Date: Wed, 26 Oct 2005 13:31:03 -0400
Delivered-To: [EMAIL PROTECTED]
X-Spam-Checker-Version: SpamAssassin 2.60-bugs.debian.org_2005_01_02 
        (1.212-2003-09-23-exp) on spohr.debian.org
X-Spam-Level: 
X-Spam-Status: No, hits=-8.0 required=4.0 tests=BAYES_00,HAS_PACKAGE 
        autolearn=no version=2.60-bugs.debian.org_2005_01_02

Package: libssl0.9.8
Version: 0.9.8a-2
Severity: normal

After the libssl upgrade to 0.9.8a-2 yesterday, the ssh client
segfaults. Confusingly, it doesn't do it all the time, just most of
the time. Usually, I can get it to work by repeating the command until
it works.

Here's a gdb session, with backtrace:

> $ gdb /usr/bin/ssh
> GNU gdb 6.3-debian
> Copyright 2004 Free Software Foundation, Inc.
> GDB is free software, covered by the GNU General Public License, and
> you are
> welcome to change it and/or distribute copies of it under certain
> conditions.
> Type "show copying" to see the conditions.
> There is absolutely no warranty for GDB.  Type "show warranty" for
> details.
> This GDB was configured as "sparc-linux"...(no debugging symbols
> found)
> Using host libthread_db library "/lib/libthread_db.so.1".
> 
> (gdb) set args [EMAIL PROTECTED]
> (gdb) r
> Starting program: /usr/bin/ssh [EMAIL PROTECTED]
> (no debugging symbols found)
> (no debugging symbols found)
> (no debugging symbols found)
> (no debugging symbols found)
> (no debugging symbols found)
> (no debugging symbols found)
> (no debugging symbols found)
> (no debugging symbols found)
> (no debugging symbols found)
> (no debugging symbols found)
> (no debugging symbols found)
> (no debugging symbols found)
> (no debugging symbols found)
> (no debugging symbols found)
> (no debugging symbols found)
> (no debugging symbols found)
> (no debugging symbols found)
> (no debugging symbols found)
> (no debugging symbols found)
> (no debugging symbols found)
> 
> Program received signal SIGSEGV, Segmentation fault.
> ---Type <return> to continue, or q <return> to quit---
> 0x700ef194 in bn_sub_words () from /usr/lib/v9/libcrypto.so.0.9.8
> (gdb) bt
> #0  0x700ef194 in bn_sub_words () from /usr/lib/v9/libcrypto.so.0.9.8
> #1  0x700e8958 in bn_sub_part_words () from
> /usr/lib/v9/libcrypto.so.0.9.8
> #2  0x700e94d4 in bn_mul_recursive () from
> /usr/lib/v9/libcrypto.so.0.9.8
> #3  0x700e9384 in bn_mul_recursive () from
> /usr/lib/v9/libcrypto.so.0.9.8
> #4  0x700ea244 in BN_mul () from /usr/lib/v9/libcrypto.so.0.9.8
> #5  0x700f0770 in BN_mod_mul_montgomery () from
> /usr/lib/v9/libcrypto.so.0.9.8
> #6  0x700e6a30 in BN_mod_exp_mont_consttime ()
>    from /usr/lib/v9/libcrypto.so.0.9.8
> #7  0x7010a204 in DH_OpenSSL () from /usr/lib/v9/libcrypto.so.0.9.8
> #8  0x70109fcc in DH_generate_key () from
> /usr/lib/v9/libcrypto.so.0.9.8
> #9  0x00039b4c in error ()
> #10 0x00037078 in error ()
> #11 0x00034314 in error ()
> #12 0x00033ab4 in error ()
> #13 0x0001ee6c in ?? ()
> #14 0x0001ee6c in ?? ()
> Previous frame identical to this frame (corrupt stack?)
> (gdb) q
> The program is running.  Exit anyway? (y or n) y

I tried recompiling openssh, but got the same result.

 .....Ron

-- System Information:
Debian Release: testing/unstable
  APT prefers testing
  APT policy: (500, 'testing'), (500, 'stable')
Architecture: sparc (sparc64)
Shell:  /bin/sh linked to /bin/bash
Kernel: Linux 2.6.13.4-curly-0
Locale: LANG=C, LC_CTYPE=C (charmap=ANSI_X3.4-1968)

Versions of packages libssl0.9.8 depends on:
ii  debconf [debconf-2.0]         1.4.58     Debian configuration management sy
ii  libc6                         2.3.5-6    GNU C Library: Shared libraries an

libssl0.9.8 recommends no packages.

-- debconf information:
  libssl0.9.8/restart-services:

**********************************************************************
This email and any files transmitted with it are confidential and 
intended solely for the use of the individual or entity to whom they   
are addressed. If you have received this email in error please notify 
the system manager at postmaster at dor.state.ma.us.
**********************************************************************

---------------------------------------
Received: (at 335912-close) by bugs.debian.org; 13 Dec 2005 22:12:51 +0000
>From [EMAIL PROTECTED] Tue Dec 13 14:12:51 2005
Return-path: <[EMAIL PROTECTED]>
Received: from katie by spohr.debian.org with local (Exim 4.50)
        id 1EmIEy-00083R-G5; Tue, 13 Dec 2005 14:03:20 -0800
From: Kurt Roeckx <[EMAIL PROTECTED]>
To: [EMAIL PROTECTED]
X-Katie: $Revision: 1.60 $
Subject: Bug#335912: fixed in openssl 0.9.8a-5
Message-Id: <[EMAIL PROTECTED]>
Sender: Archive Administrator <[EMAIL PROTECTED]>
Date: Tue, 13 Dec 2005 14:03:20 -0800
X-Spam-Checker-Version: SpamAssassin 2.60-bugs.debian.org_2005_01_02 
        (1.212-2003-09-23-exp) on spohr.debian.org
X-Spam-Level: 
X-Spam-Status: No, hits=-6.0 required=4.0 tests=BAYES_00,HAS_BUG_NUMBER 
        autolearn=no version=2.60-bugs.debian.org_2005_01_02

Source: openssl
Source-Version: 0.9.8a-5

We believe that the bug you reported is fixed in the latest version of
openssl, which is due to be installed in the Debian FTP archive:

libcrypto0.9.8-udeb_0.9.8a-5_i386.udeb
  to pool/main/o/openssl/libcrypto0.9.8-udeb_0.9.8a-5_i386.udeb
libssl-dev_0.9.8a-5_i386.deb
  to pool/main/o/openssl/libssl-dev_0.9.8a-5_i386.deb
libssl0.9.8-dbg_0.9.8a-5_i386.deb
  to pool/main/o/openssl/libssl0.9.8-dbg_0.9.8a-5_i386.deb
libssl0.9.8_0.9.8a-5_i386.deb
  to pool/main/o/openssl/libssl0.9.8_0.9.8a-5_i386.deb
openssl_0.9.8a-5.diff.gz
  to pool/main/o/openssl/openssl_0.9.8a-5.diff.gz
openssl_0.9.8a-5.dsc
  to pool/main/o/openssl/openssl_0.9.8a-5.dsc
openssl_0.9.8a-5_i386.deb
  to pool/main/o/openssl/openssl_0.9.8a-5_i386.deb



A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to [EMAIL PROTECTED],
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Kurt Roeckx <[EMAIL PROTECTED]> (supplier of updated openssl package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing [EMAIL PROTECTED])


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Format: 1.7
Date: Tue, 13 Dec 2005 21:37:42 +0100
Source: openssl
Binary: libssl-dev openssl libssl0.9.8-dbg libcrypto0.9.8-udeb libssl0.9.8
Architecture: source i386
Version: 0.9.8a-5
Distribution: unstable
Urgency: low
Maintainer: Debian OpenSSL Team <[EMAIL PROTECTED]>
Changed-By: Kurt Roeckx <[EMAIL PROTECTED]>
Description: 
 libcrypto0.9.8-udeb - crypto shared library - udeb (udeb)
 libssl-dev - SSL development libraries, header files and documentation
 libssl0.9.8 - SSL shared libraries
 libssl0.9.8-dbg - Symbol tables for libssl and libcrypt
 openssl    - Secure Socket Layer (SSL) binary and related cryptographic tools
Closes: 335912
Changes: 
 openssl (0.9.8a-5) unstable; urgency=low
 .
   * Stop ssh from crashing randomly on sparc (Closes: #335912)
     Patch from upstream cvs.
Files: 
 38acf6b949857fc1065a54f602a13c58 796 utils optional openssl_0.9.8a-5.dsc
 286eeef9ae1171fd1627cf6856161bb2 32068 utils optional openssl_0.9.8a-5.diff.gz
 6f9e96e0d3ff6987c9180ab2d4915ad5 977350 utils optional 
openssl_0.9.8a-5_i386.deb
 0f528931adfca02c5c852cb8f4c348c2 2645012 libs important 
libssl0.9.8_0.9.8a-5_i386.deb
 dad0712f421df14f181ad8b601406f74 508512 debian-installer optional 
libcrypto0.9.8-udeb_0.9.8a-5_i386.udeb
 3cf344948886b244e5973542b3c769b5 2836502 libdevel optional 
libssl-dev_0.9.8a-5_i386.deb
 6264e0a60184bd9aa57ab18525ed7d75 5164294 libdevel extra 
libssl0.9.8-dbg_0.9.8a-5_i386.deb
Package-Type: udeb

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.1 (GNU/Linux)

iD8DBQFDnzl0QdwckHJElwsRAiyoAKC7iwAzM0YRxARMEle4fCKA6J9q+QCeK2ix
VMi/CD8AVxAWMzco7GL0lIw=
=TQuO
-----END PGP SIGNATURE-----


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]

Reply via email to