[Bug 2097436] Re: Segmentation Fault in SSL_CTX_set_cipher_list on Kernel 6.8.0-1020-azure with OpenSSL 3.0
Adrien Nader
2097436 at bugs.launchpad.net
Thu Feb 6 15:24:19 UTC 2025
Thanks for the update. I've looked more at the logs and I'm very
surprised to see the following:
libgit2: 1.8.1 (sys:0.19.0 vendored)
libcurl: 8.9.0-DEV (sys:0.4.74+curl-8.9.0 vendored ssl:OpenSSL/1.1.1w)
ssl: OpenSSL 1.1.1w 11 Sep 2023
I guess that's from some binary install of rust-something.
It is incredibly far from a Ubuntu system: that libgit2 maybe matches
development Ubuntu from 3 months ago, libcurl would match development
Ubuntu from 6 months ago, and the openssl version never got close to
being included in Ubuntu as 1.1.1w was published in September 2023 and
Ubuntu switched to openssl 3.0 early 2022.
As far as I can tell, a) the system is so different from an actual
Ubuntu release that it would be difficult to say anything about it, b)
that openssl where a crash occurs is not from Ubuntu anyway.
--
You received this bug notification because you are a member of Ubuntu
Foundations Bugs, which is subscribed to openssl in Ubuntu.
https://bugs.launchpad.net/bugs/2097436
Title:
Segmentation Fault in SSL_CTX_set_cipher_list on Kernel
6.8.0-1020-azure with OpenSSL 3.0
Status in openssl package in Ubuntu:
New
Bug description:
I am experiencing a segmentation fault in the SSL_CTX_set_cipher_list
function from libssl.so.3 (OpenSSL 3.0) and rustc when running the
application bin/Runner.Listener run on kernel version
6.8.0-1020-azure. The issue does not occur on kernel version
6.1.68-2-stable. The bug also affects the DKMS build process for the
radxa-overlays kernel module, causing GCC to terminate with a
segmentation fault.
issues:
https://github.com/actions/runner-images/issues/11533
To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/openssl/+bug/2097436/+subscriptions
More information about the foundations-bugs
mailing list