http://bugzilla.opensuse.org/show_bug.cgi?id=1068470 Bug ID: 1068470 Summary: Tumbleweed openssl 1.0.2m: osc co command hangs in libcrypto with https://api.opensuse.org Classification: openSUSE Product: openSUSE Tumbleweed Version: Current Hardware: Other OS: Other Status: NEW Severity: Normal Priority: P5 - None Component: Security Assignee: security-team@suse.de Reporter: sebastian.parschauer@suse.com QA Contact: qa-bugs@suse.de Found By: L3 Blocker: --- I'm trying to develop my latest Base:System/parted changes in a QEMU/KVM Tumbleweed VM with Leap 42.3 on bare metal. On Leap 42.3 it is no problem to use the command:
osc co Base:System/parted
But on Tumbleweed this command hangs reliably at a random file. As a workaround I always have to use:
iosc co openSUSE.org:Base:System/parted
instead. This is annoying. Networking in the VM is fine. I've already tried all variants of network driver virtualization. I've attached gdb to the hanging process and was able to locate the hang in libcrypto (openssl packages). Top of stack:
(gdb) bt #0 0x00007f17490b4df1 in __libc_read (fd=3, buf=buf@entry=0x55f2039abc73, nbytes=nbytes@entry=5) at ../sysdeps/unix/sysv/linux/read.c:26 #1 0x00007f1745d262de in read (__nbytes=5, __buf=0x55f2039abc73, __fd=<optimized out>) at /usr/include/bits/unistd.h:44 #2 sock_read (b=0x55f203951e10, out=0x55f2039abc73 "I\027\177", outl=5) at bss_sock.c:140 #3 0x00007f1745d24273 in BIO_read (b=0x55f203951e10, out=out@entry=0x55f2039abc73, outl=outl@entry=5) at bio_lib.c:210 #4 0x00007f174609703a in ssl3_read_n (s=0x55f2038b2530, n=5, max=<optimized out>, extend=<optimized out>) at s3_pkt.c:258 #5 0x00007f174609882d in ssl3_get_record (s=0x55f2038b2530) at s3_pkt.c:342 #6 ssl3_read_bytes (s=0x55f2038b2530, type=22, buf=0x55f2039a6710 "\001", len=4, peek=0) at s3_pkt.c:1234 #7 0x00007f1746099df9 in ssl3_get_message (s=0x55f2038b2530, st1=<optimized out>, stn=4385, mt=-1, max=20000, ok=0x7ffda749b074) at s3_both.c:371 #8 0x00007f174608d673 in ssl3_get_server_hello (s=s@entry=0x55f2038b2530) at s3_clnt.c:917 #9 0x00007f1746092641 in ssl3_connect (s=0x55f2038b2530) at s3_clnt.c:313 #10 0x00007f173d7c7502 in ssl_connect (ssl=ssl@entry=0x55f2038b2530, timeout=-1) at SWIG/_m2crypto_wrap.c:8232 #11 0x00007f173d7c761b in _wrap_ssl_connect (self=<optimized out>, args=<optimized out>) at SWIG/_m2crypto_wrap.c:19578 #12 0x00007f17493d1402 in PyEval_EvalFrameEx () from /usr/lib64/libpython2.7.so.1.0 #13 0x00007f17493d04e4 in PyEval_EvalCodeEx () from /usr/lib64/libpython2.7.so.1.0
$ rpm -q libopenssl1_0_0 libopenssl1_0_0-1.0.2m-1.1.x86_64 On Leap 42.3 there is version 1.0.2j-10.1. Please fix this! -- You are receiving this mail because: You are on the CC list for the bug.