Debian Bug report logs - #534706
libssl0.9.8: OPENSSL_cleanse() is reported as being thread-unsafe by helgrind

Package: openssl; Maintainer for openssl is Debian OpenSSL Team <pkg-openssl-devel@lists.alioth.debian.org>; Source for openssl is src:openssl.

Reported by: Russell Coker <russell@coker.com.au>

Date: Fri, 26 Jun 2009 14:00:01 UTC

Severity: normal

Reply or subscribe to this bug.

Toggle useless messages

View this report as an mbox folder, status mbox, maintainer mbox


Report forwarded to debian-bugs-dist@lists.debian.org, Debian OpenSSL Team <pkg-openssl-devel@lists.alioth.debian.org>:
Bug#534706; Package libssl0.9.8. (Fri, 26 Jun 2009 14:00:04 GMT) Full text and rfc822 format available.

Acknowledgement sent to Russell Coker <russell@coker.com.au>:
New Bug report received and forwarded. Copy sent to Debian OpenSSL Team <pkg-openssl-devel@lists.alioth.debian.org>. (Fri, 26 Jun 2009 14:00:04 GMT) Full text and rfc822 format available.

Message #5 received at submit@bugs.debian.org (full text, mbox):

From: Russell Coker <russell@coker.com.au>
To: Debian Bug Tracking System <submit@bugs.debian.org>
Subject: libssl0.9.8: OPENSSL_cleanse() is reported as being thread-unsafe by helgrind
Date: Fri, 26 Jun 2009 23:54:54 +1000
Package: libssl0.9.8
Version: 0.9.8g-15+lenny1
Severity: normal

==28427== Possible data race during read of size 1 at 0x55ef868 by thread #3
==28427==    at 0x52CFC41: OPENSSL_cleanse (mem_clr.c:67)
==28427==    by 0x533647F: EVP_MD_CTX_cleanup (digest.c:322)
==28427==    by 0x53367AF: EVP_DigestFinal (digest.c:221)
==28427==    by 0x40F1C3: CDKIMVerify::GetResults() (dkimverify.cpp:460)
==28427==    by 0x40378A: dkim_verify(int, char const*, int, unsigned char**, char***) (dkim-test.cpp:122)
==28427==    by 0x403D06: do_work(void*) (dkim-test.cpp:359)
==28427==    by 0x4C26ABF: mythread_wrapper (hg_intercepts.c:194)
==28427==    by 0x4E2FFC6: start_thread (in /lib/libpthread-2.7.so)
==28427==    by 0x5E8B5AC: clone (in /lib/libc-2.7.so)
==28427==  This conflicts with a previous write of size 1 by thread #2
==28427==    at 0x52CFC80: OPENSSL_cleanse (mem_clr.c:76)
==28427==    by 0x52CFBD4: CRYPTO_realloc_clean (mem.c:361)
==28427==    by 0x5325A97: BUF_MEM_grow_clean (buffer.c:149)
==28427==    by 0x53429E1: asn1_d2i_read_bio (a_d2i_fp.c:227)
==28427==    by 0x5342C40: ASN1_d2i_bio (a_d2i_fp.c:93)
==28427==    by 0x406A94: dk_end (domainkeys.c:1945)
==28427==    by 0x406D22: dk_eom (domainkeys.c:1982)
==28427==    by 0x4034CC: domainkeys_verify(int, char const*, int, unsigned char**, char***) (dkim-test.cpp:218)

The above is from running helgrind on my AMD64 system.

cleanse_ctr is a global variable which is both read and written by
OPENSSL_cleanse() without locking.  It probably doesn't matter much as it's
only used as a source of entropy for scrubbing memory prior to freeing it.
Can we flag this variable to be skipped by helgrind checks?

Also it would be good if the source could include a comment with a reference
to the research showing the need for such memory scrubbing.




Reply sent to Debian FTP Masters <ftpmaster@ftp-master.debian.org>:
You have taken responsibility. (Sat, 19 Nov 2011 09:51:27 GMT) Full text and rfc822 format available.

Notification sent to Russell Coker <russell@coker.com.au>:
Bug acknowledged by developer. (Sat, 19 Nov 2011 09:51:29 GMT) Full text and rfc822 format available.

Message #10 received at 534706-done@bugs.debian.org (full text, mbox):

From: Debian FTP Masters <ftpmaster@ftp-master.debian.org>
To: 351684-done@bugs.debian.org,394107-done@bugs.debian.org,431918-done@bugs.debian.org,511727-done@bugs.debian.org,520021-done@bugs.debian.org,524682-done@bugs.debian.org,526747-done@bugs.debian.org,534534-done@bugs.debian.org,534656-done@bugs.debian.org,534683-done@bugs.debian.org,534685-done@bugs.debian.org,534687-done@bugs.debian.org,534699-done@bugs.debian.org,534706-done@bugs.debian.org,534889-done@bugs.debian.org,534892-done@bugs.debian.org,536229-done@bugs.debian.org,546521-done@bugs.debian.org,556968-done@bugs.debian.org,557261-done@bugs.debian.org,561558-done@bugs.debian.org,645805-done@bugs.debian.org,
Cc: openssl098@packages.debian.org, openssl098@packages.qa.debian.org
Subject: Bug#641975: Removed package(s) from unstable
Date: Sat, 19 Nov 2011 09:44:37 +0000
Version: 0.9.8o-7+rm

Dear submitter,

as the package openssl098 has just been removed from the Debian archive
unstable we hereby close the associated bug reports.  We are sorry
that we couldn't deal with your issue properly.

For details on the removal, please see http://bugs.debian.org/641975

The version of this package that was in Debian prior to this removal
can still be found using http://snapshot.debian.org/.

This message was generated automatically; if you believe that there is
a problem with it please contact the archive administrators by mailing
ftpmaster@debian.org.

Debian distribution maintenance software
pp.
Luca Falavigna (the ftpmaster behind the curtain)




Bug No longer marked as fixed in versions 0.9.8o-7+rm and reopened. Request was from Debbugs Internal Request <owner@bugs.debian.org> to internal_control@bugs.debian.org. (Sat, 19 Nov 2011 10:57:49 GMT) Full text and rfc822 format available.

Bug reassigned from package 'libssl0.9.8' to 'openssl'. Request was from Kurt Roeckx <kurt@roeckx.be> to control@bugs.debian.org. (Sat, 19 Nov 2011 10:58:03 GMT) Full text and rfc822 format available.

Bug No longer marked as found in versions openssl/0.9.8g-15+lenny1. Request was from Kurt Roeckx <kurt@roeckx.be> to control@bugs.debian.org. (Sat, 19 Nov 2011 10:58:03 GMT) Full text and rfc822 format available.

Send a report that this bug log contains spam.


Debian bug tracking system administrator <owner@bugs.debian.org>. Last modified: Sun Apr 20 08:39:40 2014; Machine Name: beach.debian.org

Debian Bug tracking system
Copyright (C) 1999 Darren O. Benham, 1997,2003 nCipher Corporation Ltd, 1994-97 Ian Jackson.