Activity log for bug #973741

Date Who What changed Old value New value Message
2012-04-04 20:35:46 Darik Horn bug added bug
2012-06-06 19:05:43 Launchpad Janitor s3cmd (Ubuntu): status New Confirmed
2012-06-07 17:49:38 Brett Anderson bug watch added http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=666405
2012-06-07 17:56:02 Brett Anderson bug watch added http://rt.openssl.org/Ticket/Display.html?id=2792
2012-06-07 17:56:02 Brett Anderson bug task added openssl
2012-06-07 18:27:50 Bug Watch Updater openssl: status Unknown Fix Released
2012-06-26 06:30:34 Ante Karamatić bug task added openssl (Ubuntu)
2012-06-26 06:30:45 Ante Karamatić openssl (Ubuntu): status New Confirmed
2012-06-26 06:30:52 Ante Karamatić s3cmd (Ubuntu): status Confirmed Invalid
2012-07-03 19:46:50 Matthias Lehmann bug added subscriber Matthias Lehmann
2012-07-26 07:28:36 Adam Gandelman bug added subscriber Adam Gandelman
2012-07-26 07:31:27 Adam Gandelman attachment added lp973741.debdiff https://bugs.launchpad.net/ubuntu/+source/s3cmd/+bug/973741/+attachment/3236667/+files/lp973741.debdiff
2012-07-26 07:31:52 Adam Gandelman summary s3cmd: segmentation fault for all https operations in libcrypto.so.1.0.0 [SRU] segmentation fault for all https operations in libcrypto.so.1.0.0
2012-07-26 07:45:04 Adam Gandelman description All `s3cmd` commands fail with a Segmentation Fault on Ubuntu 12.04 Precise Pangolin if `use_https = True` is set in the `$HOME/.s3cfg` file. $ apt-cache policy s3cmd s3cmd: Installed: 1.0.0-1 Candidate: 1.0.0-1 Version table: *** 1.0.0-1 0 500 http://us.archive.ubuntu.com/ubuntu/ precise/universe amd64 Packages 100 /var/lib/dpkg/status $ s3cmd du DEBUG: Updating Config.Config encoding -> UTF-8 DEBUG: Updating Config.Config follow_symlinks -> False DEBUG: Updating Config.Config verbosity -> 30 DEBUG: Unicodising 'du' using UTF-8 DEBUG: Command: du DEBUG: SignHeaders: 'GET\n\n\n\nx-amz-date:Wed, 04 Apr 2012 20:33:06 +0000\n/' DEBUG: CreateRequest: resource[uri]=/ DEBUG: SignHeaders: 'GET\n\n\n\nx-amz-date:Wed, 04 Apr 2012 20:33:06 +0000\n/' DEBUG: Processing request, please wait... DEBUG: get_hostname(None): s3.amazonaws.com DEBUG: format_uri(): / Segmentation fault $ gdb python GNU gdb (Ubuntu/Linaro 7.4-2012.02-0ubuntu2) 7.4-2012.02 Copyright (C) 2012 Free Software Foundation, Inc. License GPLv3+: GNU GPL version 3 or later <http://gnu.org/licenses/gpl.html> This is free software: you are free to change and redistribute it. There is NO WARRANTY, to the extent permitted by law. Type "show copying" and "show warranty" for details. This GDB was configured as "x86_64-linux-gnu". For bug reporting instructions, please see: <http://bugs.launchpad.net/gdb-linaro/>... Reading symbols from /usr/bin/python...(no debugging symbols found)...done. (gdb) run /usr/bin/s3cmd du Starting program: /usr/bin/python /usr/bin/s3cmd du [Thread debugging using libthread_db enabled] Using host libthread_db library "/lib/x86_64-linux-gnu/libthread_db.so.1". Program received signal SIGSEGV, Segmentation fault. 0x00007ffff721b031 in RC4 () from /lib/x86_64-linux-gnu/libcrypto.so.1.0.0 (gdb) backtrace #0 0x00007ffff721b031 in RC4 () from /lib/x86_64-linux-gnu/libcrypto.so.1.0.0 #1 0x00000000000000db in ?? () #2 0x000000000000009f in ?? () #3 0x0000000000ed91f0 in ?? () #4 0x00007ffff7281609 in ?? () from /lib/x86_64-linux-gnu/libcrypto.so.1.0.0 #5 0x00007ffff7583b0f in ?? () from /lib/x86_64-linux-gnu/libssl.so.1.0.0 #6 0x00007ffff757adb8 in ?? () from /lib/x86_64-linux-gnu/libssl.so.1.0.0 #7 0x00007ffff757b0e4 in ?? () from /lib/x86_64-linux-gnu/libssl.so.1.0.0 #8 0x000000000056f7ec in ?? () #9 0x0000000000562ad2 in PyEval_EvalFrameEx () #10 0x000000000056a166 in PyEval_EvalCodeEx () #11 0x000000000056312e in PyEval_EvalFrameEx () #12 0x000000000056a166 in PyEval_EvalCodeEx () #13 0x000000000056312e in PyEval_EvalFrameEx () #14 0x0000000000563070 in PyEval_EvalFrameEx () #15 0x000000000056a166 in PyEval_EvalCodeEx () #16 0x000000000056312e in PyEval_EvalFrameEx () #17 0x000000000056a166 in PyEval_EvalCodeEx () #18 0x000000000056312e in PyEval_EvalFrameEx () #19 0x0000000000563070 in PyEval_EvalFrameEx () #20 0x000000000056a166 in PyEval_EvalCodeEx () #21 0x000000000056312e in PyEval_EvalFrameEx () #22 0x000000000056a166 in PyEval_EvalCodeEx () #23 0x000000000056312e in PyEval_EvalFrameEx () #24 0x0000000000563070 in PyEval_EvalFrameEx () #25 0x0000000000563070 in PyEval_EvalFrameEx () #26 0x0000000000563070 in PyEval_EvalFrameEx () #27 0x0000000000563070 in PyEval_EvalFrameEx () #28 0x000000000056a166 in PyEval_EvalCodeEx () #29 0x000000000055f10b in ?? () #30 0x000000000055f9d4 in PyRun_FileExFlags () #31 0x000000000055fc41 in PyRun_SimpleFileExFlags () #32 0x000000000056102d in Py_Main () #33 0x00007ffff68e576d in __libc_start_main () from /lib/x86_64-linux-gnu/libc.so.6 #34 0x000000000041b971 in _start () [IMPACT] https operations that make use of openssl/libcrypto on specific legacy Intel CPUs results in SIGSEGV. This includes everything from utilities like wget and curl, to mail servers and everything in between. [TESTCASE] curl or wget a URL via the HTTPS, observe segfault. One user reports this is reproducible on Intel Xeon(TM) CPU 3.40GHz cpu family: 15. [DEVELOPMENT FIX] This bug has been fixed upstream since April 2012, see http://cvs.openssl.org/chngview?cn=22415. The upstream fix has been applied and fixed in Debain since openssl-1.0.1a-3, and in Ubuntu 12.10 since the 1.0.1c-3ubuntu1 sync. [Regression Potential] Low, relatively trivial patch that only uses 4_hmac_md56_cipher if the architecture is capable. >> Original Bug << All `s3cmd` commands fail with a Segmentation Fault on Ubuntu 12.04 Precise Pangolin if `use_https = True` is set in the `$HOME/.s3cfg` file. $ apt-cache policy s3cmd s3cmd:   Installed: 1.0.0-1   Candidate: 1.0.0-1   Version table:  *** 1.0.0-1 0         500 http://us.archive.ubuntu.com/ubuntu/ precise/universe amd64 Packages         100 /var/lib/dpkg/status $ s3cmd du DEBUG: Updating Config.Config encoding -> UTF-8 DEBUG: Updating Config.Config follow_symlinks -> False DEBUG: Updating Config.Config verbosity -> 30 DEBUG: Unicodising 'du' using UTF-8 DEBUG: Command: du DEBUG: SignHeaders: 'GET\n\n\n\nx-amz-date:Wed, 04 Apr 2012 20:33:06 +0000\n/' DEBUG: CreateRequest: resource[uri]=/ DEBUG: SignHeaders: 'GET\n\n\n\nx-amz-date:Wed, 04 Apr 2012 20:33:06 +0000\n/' DEBUG: Processing request, please wait... DEBUG: get_hostname(None): s3.amazonaws.com DEBUG: format_uri(): / Segmentation fault $ gdb python GNU gdb (Ubuntu/Linaro 7.4-2012.02-0ubuntu2) 7.4-2012.02 Copyright (C) 2012 Free Software Foundation, Inc. License GPLv3+: GNU GPL version 3 or later <http://gnu.org/licenses/gpl.html> This is free software: you are free to change and redistribute it. There is NO WARRANTY, to the extent permitted by law. Type "show copying" and "show warranty" for details. This GDB was configured as "x86_64-linux-gnu". For bug reporting instructions, please see: <http://bugs.launchpad.net/gdb-linaro/>... Reading symbols from /usr/bin/python...(no debugging symbols found)...done. (gdb) run /usr/bin/s3cmd du Starting program: /usr/bin/python /usr/bin/s3cmd du [Thread debugging using libthread_db enabled] Using host libthread_db library "/lib/x86_64-linux-gnu/libthread_db.so.1". Program received signal SIGSEGV, Segmentation fault. 0x00007ffff721b031 in RC4 () from /lib/x86_64-linux-gnu/libcrypto.so.1.0.0 (gdb) backtrace #0 0x00007ffff721b031 in RC4 () from /lib/x86_64-linux-gnu/libcrypto.so.1.0.0 #1 0x00000000000000db in ?? () #2 0x000000000000009f in ?? () #3 0x0000000000ed91f0 in ?? () #4 0x00007ffff7281609 in ?? () from /lib/x86_64-linux-gnu/libcrypto.so.1.0.0 #5 0x00007ffff7583b0f in ?? () from /lib/x86_64-linux-gnu/libssl.so.1.0.0 #6 0x00007ffff757adb8 in ?? () from /lib/x86_64-linux-gnu/libssl.so.1.0.0 #7 0x00007ffff757b0e4 in ?? () from /lib/x86_64-linux-gnu/libssl.so.1.0.0 #8 0x000000000056f7ec in ?? () #9 0x0000000000562ad2 in PyEval_EvalFrameEx () #10 0x000000000056a166 in PyEval_EvalCodeEx () #11 0x000000000056312e in PyEval_EvalFrameEx () #12 0x000000000056a166 in PyEval_EvalCodeEx () #13 0x000000000056312e in PyEval_EvalFrameEx () #14 0x0000000000563070 in PyEval_EvalFrameEx () #15 0x000000000056a166 in PyEval_EvalCodeEx () #16 0x000000000056312e in PyEval_EvalFrameEx () #17 0x000000000056a166 in PyEval_EvalCodeEx () #18 0x000000000056312e in PyEval_EvalFrameEx () #19 0x0000000000563070 in PyEval_EvalFrameEx () #20 0x000000000056a166 in PyEval_EvalCodeEx () #21 0x000000000056312e in PyEval_EvalFrameEx () #22 0x000000000056a166 in PyEval_EvalCodeEx () #23 0x000000000056312e in PyEval_EvalFrameEx () #24 0x0000000000563070 in PyEval_EvalFrameEx () #25 0x0000000000563070 in PyEval_EvalFrameEx () #26 0x0000000000563070 in PyEval_EvalFrameEx () #27 0x0000000000563070 in PyEval_EvalFrameEx () #28 0x000000000056a166 in PyEval_EvalCodeEx () #29 0x000000000055f10b in ?? () #30 0x000000000055f9d4 in PyRun_FileExFlags () #31 0x000000000055fc41 in PyRun_SimpleFileExFlags () #32 0x000000000056102d in Py_Main () #33 0x00007ffff68e576d in __libc_start_main () from /lib/x86_64-linux-gnu/libc.so.6 #34 0x000000000041b971 in _start ()
2012-07-26 07:46:10 Adam Gandelman bug added subscriber Ubuntu Stable Release Updates Team
2012-07-26 11:46:37 Marc Deslauriers bug added subscriber Ubuntu Sponsors Team
2012-07-26 11:47:06 Marc Deslauriers bug added subscriber Marc Deslauriers
2012-07-26 13:15:11 Clint Byrum openssl (Ubuntu): status Confirmed Fix Released
2012-07-26 13:15:20 Clint Byrum nominated for series Ubuntu Precise
2012-07-26 13:15:20 Clint Byrum bug task added openssl (Ubuntu Precise)
2012-07-26 13:15:20 Clint Byrum bug task added s3cmd (Ubuntu Precise)
2012-07-26 13:15:34 Clint Byrum s3cmd (Ubuntu Precise): status New Invalid
2012-07-26 13:15:39 Clint Byrum openssl (Ubuntu Precise): status New Confirmed
2012-07-26 13:15:43 Clint Byrum openssl (Ubuntu Precise): importance Undecided High
2012-07-26 13:19:13 Clint Byrum openssl (Ubuntu Precise): milestone ubuntu-12.04.1
2012-07-26 14:19:43 Clint Byrum summary [SRU] segmentation fault for all https operations in libcrypto.so.1.0.0 [SRU] segmentation fault for all https operations in libcrypto.so.1.0.0 on 'legacy' Intel Xeon CPUs
2012-07-26 14:27:55 Clint Byrum openssl (Ubuntu Precise): status Confirmed In Progress
2012-07-26 14:28:05 Clint Byrum openssl (Ubuntu Precise): assignee Adam Gandelman (gandelman-a)
2012-07-27 13:18:22 Clint Byrum removed subscriber Ubuntu Sponsors Team
2012-08-01 19:14:37 Clint Byrum tags hw-specific
2012-08-01 19:15:55 Clint Byrum openssl (Ubuntu Precise): status In Progress Fix Committed
2012-08-01 19:16:00 Clint Byrum bug added subscriber SRU Verification
2012-08-01 19:16:02 Clint Byrum tags hw-specific hw-specific verification-needed
2012-08-02 15:34:09 Nicola tags hw-specific verification-needed hw-specific verification-done verification-needed
2012-08-02 19:24:00 Adam Conrad tags hw-specific verification-done verification-needed hw-specific
2012-08-02 19:24:11 Adam Conrad openssl (Ubuntu Precise): status Fix Committed Confirmed
2012-08-02 21:31:28 Adam Gandelman attachment added lp973741-2.debdiff https://bugs.launchpad.net/ubuntu/+source/s3cmd/+bug/973741/+attachment/3246392/+files/lp973741-2.debdiff
2012-08-21 02:09:51 Adam Conrad openssl (Ubuntu Precise): status Confirmed Fix Committed
2012-08-21 02:09:56 Adam Conrad tags hw-specific hw-specific verification-needed
2012-08-23 13:59:39 Nicola tags hw-specific verification-needed hw-specific verification-done
2012-08-26 02:05:00 Stéphane Graber openssl (Ubuntu Precise): milestone ubuntu-12.04.1 ubuntu-12.04.2
2012-08-29 23:02:41 Adam Conrad removed subscriber Ubuntu Stable Release Updates Team
2012-08-29 23:03:09 Launchpad Janitor openssl (Ubuntu Precise): status Fix Committed Fix Released
2012-12-06 19:06:02 Richard Huddleston bug added subscriber Richard Huddleston
2012-12-30 10:47:10 Matthias Lehmann removed subscriber Matthias Lehmann
2013-07-28 04:55:59 Pebas bug added subscriber Pebas
2013-10-21 22:13:16 mmalmeida bug added subscriber mmalmeida