[Pkg-utopia-maintainers] Bug#647747: Segfault is in libgnutls26

Matthieu Baechler matthieu.baechler at linagora.com
Mon Jun 18 10:18:02 UTC 2012


Same bug here with this stacktrace :

Program received signal SIGSEGV, Segmentation fault.
0x00007ffff57124cf in ?? () from /lib/x86_64-linux-gnu/libc.so.6
(gdb) bt
#0  0x00007ffff57124cf in ?? () from /lib/x86_64-linux-gnu/libc.so.6
#1  0x00007ffff1d8f6d9 in decrypt_data (schema=PBES2_3DES, 
    pkcs8_asn=<optimized out>, root=<optimized out>, password=0x0, 
    kdf_params=0x7fffffffcdb0, enc_params=0x7fffffffcde0, 
    decrypted_data=0x7fffffffcd40) at privkey_pkcs8.c:1628
#2  0x00007ffff1d9117c in decode_pkcs8_key (pkey=0xfe5d30,
password=0x0, 
    raw_key=0x7fffffffcd30) at privkey_pkcs8.c:912
#3  gnutls_x509_privkey_import_pkcs8 (key=0xfe5d30, data=<optimized
out>, 
    data at entry=0x7fffffffce40, format=<optimized out>, 
    format at entry=GNUTLS_X509_FMT_DER, password=password at entry=0x0, 
    flags=<optimized out>) at privkey_pkcs8.c:1221
#4  0x00007ffff6c1cd10 in crypto_verify_pkcs8
(data=data at entry=0x93b0c0, 
    is_encrypted=is_encrypted at entry=1, password=password at entry=0x0, 
    error=error at entry=0x0) at crypto_gnutls.c:465
#5  0x00007ffff6bf74ac in crypto_verify_private_key_data (
    contents=contents at entry=0xf53d20, password=password at entry=0x0, 
    error=error at entry=0x0) at crypto.c:740
#6  0x00007ffff6bf758c in crypto_verify_private_key (
    filename=filename at entry=0x1014140
"/home/matthieu/certificats/mbaechler.pem", password=password at entry=0x0,
error=error at entry=0x0) at crypto.c:775
#7  0x00007ffff6c01bf6 in nm_setting_802_1x_set_private_key
(self=0xb7eab0, 
    key_path=0x1014140 "/home/matthieu/certificats/mbaechler.pem", 
    password=0x0, scheme=NM_SETTING_802_1X_CK_SCHEME_PATH, 
    out_format=0x7fffffffcf4c, error=0x0) at nm-setting-8021x.c:1638
#8  0x00007fffe59fe6ed in is_pkcs12 ()
   from /usr/lib/NetworkManager/libnm-openvpn-properties.so
#9  0x00007fffe59f7440 in ?? ()
   from /usr/lib/NetworkManager/libnm-openvpn-properties.so
#10 0x00007ffff632c724 in g_closure_invoke ()
   from /usr/lib/x86_64-linux-gnu/libgobject-2.0.so.0
#11 0x00007ffff633d7b0 in ?? ()
   from /usr/lib/x86_64-linux-gnu/libgobject-2.0.so.0
#12 0x00007ffff634572c in g_signal_emit_valist ()
   from /usr/lib/x86_64-linux-gnu/libgobject-2.0.so.0
#13 0x00007ffff6345dd0 in g_signal_emit_by_name ()
   from /usr/lib/x86_64-linux-gnu/libgobject-2.0.so.0
#14 0x00007ffff742729a in ?? ()
from /usr/lib/x86_64-linux-gnu/libgtk-3.so.0
#15 0x00007ffff632c724 in g_closure_invoke ()
   from /usr/lib/x86_64-linux-gnu/libgobject-2.0.so.0
#16 0x00007ffff633d7b0 in ?? ()
   from /usr/lib/x86_64-linux-gnu/libgobject-2.0.so.0
#17 0x00007ffff634572c in g_signal_emit_valist ()
   from /usr/lib/x86_64-linux-gnu/libgobject-2.0.so.0
#18 0x00007ffff63458c2 in g_signal_emit ()
   from /usr/lib/x86_64-linux-gnu/libgobject-2.0.so.0
#19 0x00007ffff632ca03 in ?? ()
   from /usr/lib/x86_64-linux-gnu/libgobject-2.0.so.0
#20 0x00007ffff6345076 in g_signal_emit_valist ()
   from /usr/lib/x86_64-linux-gnu/libgobject-2.0.so.0
#21 0x00007ffff63458c2 in g_signal_emit ()
   from /usr/lib/x86_64-linux-gnu/libgobject-2.0.so.0
#22 0x00007ffff73bc23e in ?? ()
from /usr/lib/x86_64-linux-gnu/libgtk-3.so.0
#23 0x00007ffff70958f0 in ?? ()
from /usr/lib/x86_64-linux-gnu/libgdk-3.so.0
#24 0x00007ffff5e6ad9b in ?? ()
from /lib/x86_64-linux-gnu/libglib-2.0.so.0
#25 0x00007ffff5e6a205 in g_main_context_dispatch ()
   from /lib/x86_64-linux-gnu/libglib-2.0.so.0
#26 0x00007ffff5e6a538 in ?? ()
from /lib/x86_64-linux-gnu/libglib-2.0.so.0
#27 0x00007ffff5e6a932 in g_main_loop_run ()
   from /lib/x86_64-linux-gnu/libglib-2.0.so.0
#28 0x0000000000412493 in main ()

I'm attaching a fix for libgnutls26 to this email : when we try to
decode a password encrypted private key passing a null pointer as the
password, gnutls now return GNUTLS_E_DECRYPTION_FAILED.

The patch make my network-manager happy.


-- 
Matthieu Baechler <matthieu.baechler at linagora.com>
-------------- next part --------------
A non-text attachment was scrubbed...
Name: 21_segfault_on_null_password.diff
Type: text/x-patch
Size: 391 bytes
Desc: not available
URL: <http://lists.alioth.debian.org/pipermail/pkg-utopia-maintainers/attachments/20120618/a4bc74ff/attachment.bin>


More information about the Pkg-utopia-maintainers mailing list