Your message dated Thu, 15 Dec 2022 12:34:54 -0500
with message-id 
<cab4xwxxfxhjbkj58fbofnwgdkea-jyjbsk2gkxwxq96inz5...@mail.gmail.com>
and subject line Re: python3-cryptography: Core dump in buster openssl binding
has caused the Debian Bug report #985820,
regarding python3-cryptography: Core dump in buster openssl binding
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact [email protected]
immediately.)


-- 
985820: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=985820
Debian Bug Tracking System
Contact [email protected] with problems
--- Begin Message ---
Package: python3-cryptography
Version: 2.6.1-3+deb10u2
Severity: normal
Tags: security

A long-running, twisted-based server occasionally (days to weeks) gets aborted
when processing HTTPS requests.  Here's a basic core dump from an abort:

#0  __GI_raise (sig=sig@entry=6) at ../sysdeps/unix/sysv/linux/raise.c:50
#1  0x00007f604e0d2535 in __GI_abort () at abort.c:79
#2  0x00007f604e129508 in __libc_message (action=action@entry=do_abort,
    fmt=fmt@entry=0x7f604e23428d "%s\n") at ../sysdeps/posix/libc_fatal.c:181
#3  0x00007f604e12fc1a in malloc_printerr (
    str=str@entry=0x7f604e23243b "free(): invalid pointer") at malloc.c:5341
#4  0x00007f604e13142c in _int_free (av=<optimized out>, p=<optimized out>,
    have_lock=<optimized out>) at malloc.c:4165
#5  0x00007f604d77a9be in SSL_SESSION_free ()
   from /usr/lib/x86_64-linux-gnu/libssl.so.1.1
#6  0x00007f604d5ddc8c in OPENSSL_LH_doall_arg ()
   from /usr/lib/x86_64-linux-gnu/libcrypto.so.1.1
#7  0x00007f604d77bf57 in SSL_CTX_flush_sessions ()
   from /usr/lib/x86_64-linux-gnu/libssl.so.1.1
#8  0x00007f604d7924d3 in ?? () from /usr/lib/x86_64-linux-gnu/libssl.so.1.1
#9  0x00007f604d787e3e in ?? () from /usr/lib/x86_64-linux-gnu/libssl.so.1.1
#10 0x00007f604d773f34 in SSL_do_handshake ()
   from /usr/lib/x86_64-linux-gnu/libssl.so.1.1
#11 0x00007f604d12971c in ?? ()
   from 
/usr/lib/python3/dist-packages/cryptography/hazmat/bindings/_openssl.abi3.so
#12 0x00000000005ccba1 in _PyMethodDef_RawFastCallKeywords ()

This is about all I know at this point.  I've not yet managed to trigger this
on a development system.  On the operational system, I can live with
having a watchdog restart the service when it gets aborted, so I could
limp on until bullseye here.

On the other hand, an invalid free in openssl sounds a bit unnerving, and 
so I thought I'd report this and offer to at least install debug
packages and look more closely at the problem (disclaimer: as I may have 
to wait weeks until I'll get another abort, responses may be slow).

-- System Information:
Debian Release: 10.8
  APT prefers stable-updates
  APT policy: (500, 'stable-updates'), (500, 'stable'), (500, 'oldstable')
Architecture: amd64 (x86_64)

Kernel: Linux 4.19.0-9-amd64 (SMP w/16 CPU cores)
Locale: LANG=en_US, LC_CTYPE=en_US (charmap=UTF-8) (ignored: LC_ALL set to 
de_DE.UTF-8), LANGUAGE=en_US (charmap=UTF-8) (ignored: LC_ALL set to 
de_DE.UTF-8)
Shell: /bin/sh linked to /bin/dash
Init: sysvinit (via /sbin/init)
LSM: AppArmor: enabled

Versions of packages python3-cryptography depends on:
ii  libc6                                                2.28-10
ii  libssl1.1                                            1.1.1d-0+deb10u5
ii  python3                                              3.7.3-1
ii  python3-asn1crypto                                   0.24.0-1
ii  python3-cffi-backend [python3-cffi-backend-api-min]  1.12.2-1
pn  python3-cffi-backend-api-max                         <none>
ii  python3-six                                          1.12.0-1

python3-cryptography recommends no packages.

Versions of packages python3-cryptography suggests:
pn  python-cryptography-doc       <none>
pn  python3-cryptography-vectors  <none>

-- no debconf information

--- End Message ---
--- Begin Message ---
On Wed, 24 Mar 2021 11:13:38 +0100 Markus Demleitner
<[email protected]> wrote:
> Package: python3-cryptography
> Version: 2.6.1-3+deb10u2
> Severity: normal
> Tags: security
>
> A long-running, twisted-based server occasionally (days to weeks) gets aborted
> when processing HTTPS requests.  Here's a basic core dump from an abort:

buster i no longer supported by debian, but by the LTS team:
https://wiki.debian.org/LTS

closing

--- End Message ---

Reply via email to