Bug 1003922 - openssh update kills sshd daemon with FATAL FIPS SELFTEST FAILURE
Summary: openssh update kills sshd daemon with FATAL FIPS SELFTEST FAILURE
Keywords:
Status: CLOSED ERRATA
Alias: None
Product: Red Hat Enterprise Linux 6
Classification: Red Hat
Component: openssl
Version: 6.5
Hardware: Unspecified
OS: Unspecified
unspecified
unspecified
Target Milestone: rc
: ---
Assignee: Tomas Mraz
QA Contact: Hubert Kario
URL:
Whiteboard:
Depends On: 1003296
Blocks:
TreeView+ depends on / blocked
 
Reported: 2013-09-03 14:10 UTC by Colin Walters
Modified: 2013-11-21 09:24 UTC (History)
6 users (show)

Fixed In Version: openssl-1.0.1e-10.el6
Doc Type: Bug Fix
Doc Text:
Clone Of: 1003296
Environment:
Last Closed: 2013-11-21 09:24:43 UTC
Target Upstream Version:


Attachments (Terms of Use)


Links
System ID Private Priority Status Summary Last Updated
Red Hat Product Errata RHBA-2013:1585 0 normal SHIPPED_LIVE openssl bug fix and enhancement update 2013-11-20 21:39:39 UTC

Description Colin Walters 2013-09-03 14:10:08 UTC
A rawhide update replacing openssh-6.2p2-5.fc20.x86_64 packages with those for openssh-6.2p2-6.1.fc21.x86_64 produced the following in logs:

sshd: fips.c(137): OpenSSL internal error, assertion failed: FATAL FIPS SELFTEST FAILURE

I get this with openssl-1.0.1e-9.el6 too.

Comment 1 Tomas Mraz 2013-09-03 14:20:28 UTC
This should be fixed with latest openssl packages.
openssl-1.0.1e-19.fc21
openssl-1.0.1e-10.el6

Comment 5 errata-xmlrpc 2013-11-21 09:24:43 UTC
Since the problem described in this bug report should be
resolved in a recent advisory, it has been closed with a
resolution of ERRATA.

For information on the advisory, and where to find the updated
files, follow the link below.

If the solution does not work for you, open a new bug report.

http://rhn.redhat.com/errata/RHBA-2013-1585.html


Note You need to log in before you can comment on or make changes to this bug.