Your message dated Mon, 9 Jan 2017 22:32:13 +0100
with message-id <[email protected]>
and subject line Re: libssl0.9.8: int_free_ex_data() is reported as having a 
race condition
has caused the Debian Bug report #534889,
regarding libssl0.9.8: int_free_ex_data() is reported as having a race condition
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact [email protected]
immediately.)


-- 
534889: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=534889
Debian Bug Tracking System
Contact [email protected] with problems
--- Begin Message ---
Package: libssl0.9.8
Version: 0.9.8g-15+lenny1
Severity: normal

==6373== Possible data race during read of size 8 at 0x6d2ad28 by thread #4
==6373==    at 0x52D1242: int_free_ex_data (ex_data.c:497)
==6373==    by 0x5318A9D: RSA_free (rsa_lib.c:225)
==6373==    by 0x533A200: EVP_PKEY_free (p_lib.c:479)
==6373==    by 0x40DDDE: SelectorInfo::~SelectorInfo() (dkimverify.cpp:1189)
==6373==    by 0x410946: CDKIMVerify::~CDKIMVerify() (new_allocator.h:118)
==6373==    by 0x4077D7: DKIMVerifyFree (dkim.cpp:223)

Above is the helgrind output from a test run on an AMD64 system.

        if((item = def_get_class(class_index)) == NULL)
                return;
        CRYPTO_r_lock(CRYPTO_LOCK_EX_DATA);
        mx = sk_CRYPTO_EX_DATA_FUNCS_num(item->meth);

The last line of the above code segment is ex_data.c:497.  Maybe if we obtained
a suitable lock before calling def_get_class() then this would be OK.



--- End Message ---
--- Begin Message ---
On 2009-06-28 09:39:50 [+1000], Russell Coker wrote:
> Package: libssl0.9.8
> Version: 0.9.8g-15+lenny1
> Severity: normal
> 
> ==6373== Possible data race during read of size 8 at 0x6d2ad28 by thread #4
> ==6373==    at 0x52D1242: int_free_ex_data (ex_data.c:497)
> ==6373==    by 0x5318A9D: RSA_free (rsa_lib.c:225)
> ==6373==    by 0x533A200: EVP_PKEY_free (p_lib.c:479)
> ==6373==    by 0x40DDDE: SelectorInfo::~SelectorInfo() (dkimverify.cpp:1189)
> ==6373==    by 0x410946: CDKIMVerify::~CDKIMVerify() (new_allocator.h:118)
> ==6373==    by 0x4077D7: DKIMVerifyFree (dkim.cpp:223)
> 
> Above is the helgrind output from a test run on an AMD64 system.
> 
>         if((item = def_get_class(class_index)) == NULL)
>                 return;
>         CRYPTO_r_lock(CRYPTO_LOCK_EX_DATA);
>         mx = sk_CRYPTO_EX_DATA_FUNCS_num(item->meth);
> 
> The last line of the above code segment is ex_data.c:497.  Maybe if we 
> obtained
> a suitable lock before calling def_get_class() then this would be OK.

as stated in other reports which were similar to this one: code changed
and its current usage (in the class code) looks / is valid.

Sebastian

--- End Message ---

Reply via email to