The error seems to be repeatable. After installing debugging symbols, the next run showed:
Invalid read of size 4 at asn1_der_coding (in /usr/lib/i386-linux-gnu/libtasn1.so.3.1.11) by _gnutls_x509_export_int_named (common.c:732) by _gnutls_x509_export_int (common.c:808) by gnutls_x509_crt_export (x509.c:2183) by _gnutls_x509_crt_to_gcert (gnutls_cert.c:861) by _gnutls_x509_raw_cert_to_gcert (gnutls_cert.c:827) by _gnutls_proc_cert_server_certificate (auth_cert.c:1021) by _gnutls_recv_server_certificate (gnutls_kx.c:729) by schan_InitializeSecurityContextW (schannel.c:728) by schan_InitializeSecurityContextA (schannel.c:775) by InitializeSecurityContextA (wrapper.c:282) by test_communication (schannel.c:671) by func_schannel (schannel.c:773) by run_test (test.h:556) by main (test.h:624) Address 0x45fafec is 20 bytes inside a block of size 22 alloc'd at malloc (vg_replace_malloc.c:236) by asn1_der_coding (in /usr/lib/i386-linux-gnu/libtasn1.so.3.1.11) by _gnutls_x509_export_int_named (common.c:732) by _gnutls_x509_export_int (common.c:808) by gnutls_x509_crt_export (x509.c:2183) by _gnutls_x509_crt_to_gcert (gnutls_cert.c:861) by _gnutls_x509_raw_cert_to_gcert (gnutls_cert.c:827) by _gnutls_proc_cert_server_certificate (auth_cert.c:1021) by _gnutls_recv_server_certificate (gnutls_kx.c:729) by schan_InitializeSecurityContextW (schannel.c:728) by schan_InitializeSecurityContextA (schannel.c:775) by InitializeSecurityContextA (wrapper.c:282) by test_communication (schannel.c:671) by func_schannel (schannel.c:773) by run_test (test.h:556) by main (test.h:624) Invalid read of size 4 at asn1_der_coding (in /usr/lib/i386-linux-gnu/libtasn1.so.3.1.11) by _gnutls_x509_export_int_named (common.c:732) by _gnutls_x509_export_int (common.c:808) by gnutls_x509_crt_export (x509.c:2183) by _gnutls_x509_crt_to_gcert (gnutls_cert.c:861) by _gnutls_x509_raw_cert_to_gcert (gnutls_cert.c:827) by _gnutls_proc_cert_server_certificate (auth_cert.c:1021) by _gnutls_recv_server_certificate (gnutls_kx.c:729) by schan_InitializeSecurityContextW (schannel.c:728) by schan_InitializeSecurityContextA (schannel.c:775) by InitializeSecurityContextA (wrapper.c:282) by test_communication (schannel.c:671) by func_schannel (schannel.c:773) by run_test (test.h:556) by main (test.h:624) Address 0x45fb068 is 8 bytes inside a block of size 10 alloc'd at malloc (vg_replace_malloc.c:236) by asn1_der_coding (in /usr/lib/i386-linux-gnu/libtasn1.so.3.1.11) by _gnutls_x509_export_int_named (common.c:732) by _gnutls_x509_export_int (common.c:808) by gnutls_x509_crt_export (x509.c:2183) by _gnutls_x509_crt_to_gcert (gnutls_cert.c:861) by _gnutls_x509_raw_cert_to_gcert (gnutls_cert.c:827) by _gnutls_proc_cert_server_certificate (auth_cert.c:1021) by _gnutls_recv_server_certificate (gnutls_kx.c:729) by schan_InitializeSecurityContextW (schannel.c:728) by schan_InitializeSecurityContextA (schannel.c:775) by InitializeSecurityContextA (wrapper.c:282) by test_communication (schannel.c:671) by func_schannel (schannel.c:773) by run_test (test.h:556) by main (test.h:624) Conditional jump or move depends on uninitialised value(s) at _gcry_mpi_print (mpicoder.c:583) by gcry_mpi_print (visibility.c:308) by ??? Uninitialised value was created by a stack allocation at _gnutls_gen_dh_common_client_kx (auth_dh_common.c:125)
