CRYPTO_set_mem_functions() is broken
Affects | Status | Importance | Assigned to | Milestone | |
---|---|---|---|---|---|
OpenSSL |
Invalid
|
Unknown
|
|||
openssl (Ubuntu) |
Fix Released
|
Undecided
|
Joy Latten | ||
Xenial |
Fix Released
|
Undecided
|
Unassigned |
Bug Description
Description: Ubuntu 16.04 LTS
Release: 16.04
openssl:
Installed: 1.0.2g-1ubuntu4.1
Candidate: 1.0.2g-1ubuntu4.1
Version table:
*** 1.0.2g-1ubuntu4.1 500
500 http://
500 http://
100 /var/lib/
1.
500 http://
CRYPTO_
#0 CRYPTO_malloc (num=num@
line=
#1 0x00007ffff70596df in FIPS_drbg_new (type=type@entry=0, flags=flags@
at fips_drbg_lib.c:106
#2 0x00007ffff705aeb9 in FIPS_drbg_
dctx=
#3 0x00007ffff70595f0 in FIPS_drbg_init (dctx=dctx@
type=<optimized out>, flags=<optimized out>) at fips_drbg_lib.c:94
#4 0x00007ffff6fe38f3 in RAND_init_fips () at rand_lib.c:287
#5 0x00007ffff6f26f7a in OPENSSL_
#6 0x00007ffff7de74ea in call_init (l=<optimized out>, argc=argc@entry=1,
argv=
#7 0x00007ffff7de75fb in call_init (env=0x7fffffff
l=<optimized out>) at dl-init.c:30
#8 _dl_init (main_map=
env=
This doesn't happen in upstream OpenSSL or in Debian's OpenSSL. Looking at the patches, this is caused by FIPS_drbg_init() in openssl-
+ if (!(dctx->xflags & DRBG_FLAG_TEST)) {
+ if (!FIPS_
+ FIPSerr(
+ return 0;
+ }
+ }
I don't want any FIPS mode enabled though, so does it really even need to call RAND_init_fips() then?
Changed in openssl (Ubuntu): | |
assignee: | nobody → Joy Latten (j-latten) |
tags: | added: sts |
tags: |
added: verification-done removed: verification-needed |
Changed in openssl: | |
status: | Unknown → Invalid |
Looking into this...