From owner-svn-src-all@freebsd.org Wed Mar 9 20:40:08 2016 Return-Path: Delivered-To: svn-src-all@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:1900:2254:206a::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id 4CEA6AC9815; Wed, 9 Mar 2016 20:40:08 +0000 (UTC) (envelope-from dim@FreeBSD.org) Received: from tensor.andric.com (tensor.andric.com [IPv6:2001:7b8:3a7:1:2d0:b7ff:fea0:8c26]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client CN "tensor.andric.com", Issuer "COMODO RSA Domain Validation Secure Server CA" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id E5E7868A; Wed, 9 Mar 2016 20:40:07 +0000 (UTC) (envelope-from dim@FreeBSD.org) Received: from [IPv6:2001:7b8:3a7::dd44:f53f:bd83:81a6] (unknown [IPv6:2001:7b8:3a7:0:dd44:f53f:bd83:81a6]) (using TLSv1 with cipher ECDHE-RSA-AES256-SHA (256/256 bits)) (No client certificate requested) by tensor.andric.com (Postfix) with ESMTPSA id 5DD993E88D; Wed, 9 Mar 2016 21:40:03 +0100 (CET) Subject: Re: svn commit: r296465 - in releng/9.3: . crypto/openssl crypto/openssl/apps crypto/openssl/bugs crypto/openssl/crypto crypto/openssl/crypto/aes crypto/openssl/crypto/asn1 crypto/openssl/crypto/bf cry... Mime-Version: 1.0 (Mac OS X Mail 9.2 \(3112\)) Content-Type: multipart/signed; boundary="Apple-Mail=_AA17955F-1DCE-4BA2-B503-80692C2DCCA2"; protocol="application/pgp-signature"; micalg=pgp-sha1 X-Pgp-Agent: GPGMail 2.6b2 (ebbf3ef) From: Dimitry Andric In-Reply-To: <56DFEA05.6060501@delphij.net> Date: Wed, 9 Mar 2016 21:39:58 +0100 Cc: Antoine Brodin , Xin LI , Mathieu Arnold , Jung-Uk Kim , Bryan Drewery , Xin LI , "src-committers@freebsd.org" , "svn-src-all@freebsd.org" , svn-src-releng@freebsd.org Message-Id: <2E9527A1-C869-48DA-9554-2A96F1735F8C@FreeBSD.org> References: <201603071622.u27GMC4a082792@repo.freebsd.org> <9B6D673B7B15CCDC424E97A8@atuin.in.mat.cc> <56DEFD08.6050100@FreeBSD.org> <63FB9E5BBBF224CA12839457@ogg.in.absolight.net> <56DEFDF5.2040500@FreeBSD.org> <1E2DCDEE8775312979CE7D0B@ogg.in.absolight.net> <56DF0234.2090307@FreeBSD.org> <56DF025B.1090706@FreeBSD.org> <56DF0550.6000604@FreeBSD.org> <56DFEA05.6060501@delphij.net> To: Xin Li X-Mailer: Apple Mail (2.3112) X-Mailman-Approved-At: Wed, 09 Mar 2016 22:35:46 +0000 X-BeenThere: svn-src-all@freebsd.org X-Mailman-Version: 2.1.21 Precedence: list List-Id: "SVN commit messages for the entire src tree \(except for " user" and " projects" \)" List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Wed, 09 Mar 2016 20:40:08 -0000 --Apple-Mail=_AA17955F-1DCE-4BA2-B503-80692C2DCCA2 Content-Transfer-Encoding: quoted-printable Content-Type: text/plain; charset=us-ascii On 09 Mar 2016, at 10:16, Xin Li wrote: >=20 > FYI -- I can confirm that libcrypto is broken and have a reliable way = to > trigger it. >=20 > So far I was able to narrow down this to this change and here is a > temporary workaround (which will reintroduce CVE-2016-0702). >=20 > Cheers, > FWIW, before the workaround I get this from valgrind: =3D=3D10050=3D=3D Invalid read of size 8 =3D=3D10050=3D=3D at 0x6BA3438: MOD_EXP_CTIME_COPY_FROM_PREBUF = (bn_exp.c:585) =3D=3D10050=3D=3D by 0x6BA3438: BN_mod_exp_mont_consttime = (bn_exp.c:760) =3D=3D10050=3D=3D by 0x6B84AB7: ??? (dh_key.c:156) =3D=3D10050=3D=3D by 0x4E4550B: ssh_dh_gen_key (in = /usr/lib/private/libssh.so.5) =3D=3D10050=3D=3D by 0x42AEBF: kexgex_server (kexgexs.c:115) =3D=3D10050=3D=3D by 0x4E545FE: ssh_kex_input_kexinit (in = /usr/lib/private/libssh.so.5) =3D=3D10050=3D=3D by 0x4E54BBE: ssh_dispatch_run (in = /usr/lib/private/libssh.so.5) =3D=3D10050=3D=3D by 0x41085C: do_ssh2_kex (sshd.c:2559) =3D=3D10050=3D=3D by 0x41085C: main (sshd.c:2162) =3D=3D10050=3D=3D Address 0x2078f3580 is not stack'd, malloc'd or = (recently) free'd =3D=3D10050=3D=3D =3D=3D10050=3D=3D =3D=3D10050=3D=3D Process terminating with default action of signal 11 = (SIGSEGV): dumping core =3D=3D10050=3D=3D Access not within mapped region at address = 0x2078F3580 =3D=3D10050=3D=3D at 0x6BA3438: MOD_EXP_CTIME_COPY_FROM_PREBUF = (bn_exp.c:585) =3D=3D10050=3D=3D by 0x6BA3438: BN_mod_exp_mont_consttime = (bn_exp.c:760) =3D=3D10050=3D=3D by 0x6B84AB7: ??? (dh_key.c:156) =3D=3D10050=3D=3D by 0x4E4550B: ssh_dh_gen_key (in = /usr/lib/private/libssh.so.5) =3D=3D10050=3D=3D by 0x42AEBF: kexgex_server (kexgexs.c:115) =3D=3D10050=3D=3D by 0x4E545FE: ssh_kex_input_kexinit (in = /usr/lib/private/libssh.so.5) =3D=3D10050=3D=3D by 0x4E54BBE: ssh_dispatch_run (in = /usr/lib/private/libssh.so.5) =3D=3D10050=3D=3D by 0x41085C: do_ssh2_kex (sshd.c:2559) =3D=3D10050=3D=3D by 0x41085C: main (sshd.c:2162) =3D=3D10050=3D=3D If you believe this happened as a result of a stack =3D=3D10050=3D=3D overflow in your program's main thread (unlikely but =3D=3D10050=3D=3D possible), you can try to increase the size of the =3D=3D10050=3D=3D main thread stack using the --main-stacksize=3D flag. =3D=3D10050=3D=3D The main thread stack size used in this run was = 16777216. -Dimitry --Apple-Mail=_AA17955F-1DCE-4BA2-B503-80692C2DCCA2 Content-Transfer-Encoding: 7bit Content-Disposition: attachment; filename=signature.asc Content-Type: application/pgp-signature; name=signature.asc Content-Description: Message signed with OpenPGP using GPGMail -----BEGIN PGP SIGNATURE----- Version: GnuPG/MacGPG2 v2.0.29 iEYEARECAAYFAlbgiiIACgkQsF6jCi4glqO/TACg8wnXNM/4bSChip4c1XG9wN23 3z8AoM2kOpFsIa2xWLAACSnL39ad1plF =BCdJ -----END PGP SIGNATURE----- --Apple-Mail=_AA17955F-1DCE-4BA2-B503-80692C2DCCA2--