Note: This bug is displayed in read-only format because the product is no longer active in Red Hat Bugzilla.
RHEL Engineering is moving the tracking of its product development work on RHEL 6 through RHEL 9 to Red Hat Jira (issues.redhat.com). If you're a Red Hat customer, please continue to file support cases via the Red Hat customer portal. If you're not, please head to the "RHEL project" in Red Hat Jira and file new tickets here. Individual Bugzilla bugs in the statuses "NEW", "ASSIGNED", and "POST" are being migrated throughout September 2023. Bugs of Red Hat partners with an assigned Engineering Partner Manager (EPM) are migrated in late September as per pre-agreed dates. Bugs against components "kernel", "kernel-rt", and "kpatch" are only migrated if still in "NEW" or "ASSIGNED". If you cannot log in to RH Jira, please consult article #7032570. That failing, please send an e-mail to the RH Jira admins at rh-issues@redhat.com to troubleshoot your issue as a user management inquiry. The email creates a ServiceNow ticket with Red Hat. Individual Bugzilla bugs that are migrated will be moved to status "CLOSED", resolution "MIGRATED", and set with "MigratedToJIRA" in "Keywords". The link to the successor Jira issue will be found under "Links", have a little "two-footprint" icon next to it, and direct you to the "RHEL project" in Red Hat Jira (issue links are of type "https://issues.redhat.com/browse/RHEL-XXXX", where "X" is a digit). This same link will be available in a blue banner at the top of the page informing you that that bug has been migrated.

Bug 1152679

Summary: p11-kit killed by SIGSEGV
Product: Red Hat Enterprise Linux 6 Reporter: Aleš Mareček <amarecek>
Component: p11-kitAssignee: Stef Walter <stefw>
Status: CLOSED WONTFIX QA Contact: BaseOS QE Security Team <qe-baseos-security>
Severity: unspecified Docs Contact:
Priority: unspecified    
Version: 6.6CC: djasa, ksrot, qe-baseos-security, stefw
Target Milestone: rc   
Target Release: ---   
Hardware: All   
OS: Unspecified   
Whiteboard: abrt_hash:b57ba06cb0e9a6ec085ee413172afa4619202c17
Fixed In Version: Doc Type: If docs needed, set a value
Doc Text:
Story Points: ---
Clone Of: 1125965 Environment:
Last Closed: 2017-12-06 10:27:16 UTC Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:
Bug Depends On: 1125965    
Bug Blocks:    

Description Aleš Mareček 2014-10-14 16:38:30 UTC
+++ This bug was initially created as a clone of Bug #1125965 +++

Description of problem:
"p11-kit list-modules" and "modutil -dbdir sql:/etc/pki/nssdb" both fail with segfault time to time. I have loaded the p11-kit to nss:
-----------------------------------------------------------
  3. p11-kit
	library name: /usr/lib64/p11-kit-proxy.so
	 slots: 6 slots attached
	status: loaded

	 slot: /etc/pki/ca-trust/source
	token: System Trust

	 slot: /usr/share/pki/ca-trust-source
	token: Default Trust

	 slot: SSH Keys
	token: SSH Keys

	 slot: Secret Store
	token: Secret Store

	 slot: Gnome2 Key Storage
	token: Gnome2 Key Storage

	 slot: User Key Storage
	token: User Key Storage
-----------------------------------------------------------

and I have opencryptoki library loaded in p11-kit:


# cat /etc/pkcs11/modules/opencryptoki.module 
module: /usr/lib64/opencryptoki/libopencryptoki.so
critical: no

Version-Release number of selected component:
p11-kit-0.18.7-4.el7

Additional info:
reporter:       libreport-2.1.11
backtrace_rating: 3
cmdline:        p11-kit list-modules
executable:     /usr/bin/p11-kit
kernel:         3.10.0-123.4.4.el7.x86_64
runlevel:       N 5
type:           CCpp
uid:            16189

Comment 1 Aleš Mareček 2014-10-14 16:46:16 UTC
How to test instructions:
1. Install opencryptoki{,-libs}
2. cat <<EOF >/etc/pkcs11/modules/opencryptoki.module 
module: /usr/lib64/opencryptoki/libopencryptoki.so
critical: no
EOF
3. for I in $(seq 1 1 20); do p11-kit list-modules >/dev/null 2>&1; echo $?; done


Results:
0
Segmentation fault (core dumped)
139
Segmentation fault (core dumped)
139
Segmentation fault (core dumped)
139
0
0
Segmentation fault (core dumped)
139
0
0
Segmentation fault (core dumped)
139
0
0
0
Segmentation fault (core dumped)
139
Segmentation fault (core dumped)
139
Segmentation fault (core dumped)
139
0
0
Segmentation fault (core dumped)
139
Segmentation fault (core dumped)
139



Additional info:
Tested on Lenovo T430s

Comment 2 Jan Kurik 2017-12-06 10:27:16 UTC
Red Hat Enterprise Linux 6 is in the Production 3 Phase. During the Production 3 Phase, Critical impact Security Advisories (RHSAs) and selected Urgent Priority Bug Fix Advisories (RHBAs) may be released as they become available.

The official life cycle policy can be reviewed here:

http://redhat.com/rhel/lifecycle

This issue does not meet the inclusion criteria for the Production 3 Phase and will be marked as CLOSED/WONTFIX. If this remains a critical requirement, please contact Red Hat Customer Support to request a re-evaluation of the issue, citing a clear business justification. Note that a strong business justification will be required for re-evaluation. Red Hat Customer Support can be contacted via the Red Hat Customer Portal at the following URL:

https://access.redhat.com/