-
Notifications
You must be signed in to change notification settings - Fork 4.9k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
dotnet OpenSSL double free with Ubuntu 24.04 #109689
Comments
cc: @rzikm |
@pepone Would it be possible to share one of the dumps or create a minimal reproducible application which we can run locally to investigate the issue? |
I can upload the core, it is 247 MB just let me know where to upload.
That might be more difficult. For a non minimal test case you can use our repository and the provided dev container. It is just a matter of running |
It is currently running at 700+ iterations without crash, so getting a dump from you might speed up the process.
If there is no sensitive data involved, you can upload it to a cloud storage of your choice and send me a link to my work email (radekzikmund (at) microsoft.com). Or reach out to me and I will send you a one drive link where you can upload the dump. |
@rzikm attached a core dump to this issue zeroc-ice/ice#1745 (comment) |
Assigned to @krwq to finish triaging this. |
Talked with @rzikm offline. We'll put this in System.Net.Security for now so he can look at this further |
Tagging subscribers to this area: @dotnet/ncl, @bartonjs, @vcsjones |
Sorry, I was busy with other commitments, finally got time to figure this out. Your test code disposes SslStream sometime during handshake, or immediately afterwards, so at some point it may read garbage data here runtime/src/libraries/System.Net.Security/src/System/Net/CertificateValidationPal.Unix.cs Lines 57 to 76 in 4a8a95f
The chainStack safe handle does not keep the underlying data alive, as it is an interior pointer to containing SSL structure being kept alive by handle While SslStream should not be used concurrently from multiple threads, we also should ensure that such usage does not crash applications. The fix is to link the |
We are experiencing intermittent test failures involving SSL with zeroc-ice/ice for .NET. After investigating, I traced the issue to crashes in the .NET process, and I managed to collect a core dump:
The text was updated successfully, but these errors were encountered: