Bug 2359082
| Summary: | SIGILL from libcrypto.so.3.5.0 | ||
|---|---|---|---|
| Product: | [Fedora] Fedora | Reporter: | Dan Horák <dan> |
| Component: | openssl | Assignee: | Dmitry Belyavskiy <dbelyavs> |
| Status: | CLOSED ERRATA | QA Contact: | Fedora Extras Quality Assurance <extras-qa> |
| Severity: | high | Docs Contact: | |
| Priority: | unspecified | ||
| Version: | rawhide | CC: | crypto-team, dbelyavs, mspacek, mturk, praiskup, shebburn, suraj.ghimire7, tm |
| Target Milestone: | --- | Keywords: | Triaged |
| Target Release: | --- | Flags: | fedora-admin-xmlrpc:
mirror+
|
| Hardware: | ppc64le | ||
| OS: | Linux | ||
| Whiteboard: | |||
| Fixed In Version: | openssl-3.5.0-3.fc43 | Doc Type: | --- |
| Doc Text: | Story Points: | --- | |
| Clone Of: | Environment: | ||
| Last Closed: | 2025-04-16 17:24:58 UTC | Type: | --- |
| Regression: | --- | Mount Type: | --- |
| Documentation: | --- | CRM: | |
| Verified Versions: | Category: | --- | |
| oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
| Cloudforms Team: | --- | Target Upstream Version: | |
| Embargoed: | |||
| Bug Depends On: | |||
| Bug Blocks: | 1071880 | ||
|
Description
Dan Horák
2025-04-11 12:37:01 UTC
Could you please report this issue upstream? Our downstream patches don't touch assembler code ack, will do *** Bug 2359744 has been marked as a duplicate of this bug. *** Could you please try this build if the infrastructure wakes up https://koji.fedoraproject.org/koji/taskinfo?taskID=131563912 no more a SIGILL as far as I can tell, what change did you made? A build without this flag "enable-ec_nistp_64_gcc_128", as proposed in https://github.com/openssl/openssl/issues/27350 If you have anyone who knows ppc64le asm, it would be great to implement a proper fix - otherwise it would stay vulnerable to side-channel attacks (fixing them introduced this issue) FEDORA-2025-c31309a82b (openssl-3.5.0-3.fc43) has been submitted as an update to Fedora 43. https://bodhi.fedoraproject.org/updates/FEDORA-2025-c31309a82b (In reply to Dmitry Belyavskiy from comment #6) > A build without this flag "enable-ec_nistp_64_gcc_128", as proposed in > https://github.com/openssl/openssl/issues/27350 for the record, we need this change only in Fedora, RHEL 9+ requires Power9 or newer, so it's safe with the new implementation > If you have anyone who knows ppc64le asm, it would be great to implement a > proper fix - otherwise it would stay vulnerable to side-channel attacks > (fixing them introduced this issue) I will ask in the community, but it will be tough as it needs both Power ISA and security expertise ... And as I am not familiar with OpenSSL code, do you think it's possible to change OpenSSL in a way that the new safe implementation would be selected during runtime when Power9+ CPU is detected and and the unsafe one for Power8 (it's EOL hw anyway)? I believe OpenSSL is generally capable of such runtime selection. Probably this check should be made more strict:
if (OPENSSL_ppccap_P & PPC_MADD300)
see man openssl-env for slightly more details
FEDORA-2025-c31309a82b (openssl-3.5.0-3.fc43) has been pushed to the Fedora 43 stable repository. If problem still persists, please make note of it in this bug report. |