Nach einem Update von Leap 15.5 auf Leap 15.6 wird encfs auf einem von zwei mit encfs verschlüsselten Verzeichnissen mit einem Segmentation fault beendet. Die Entschlüsselung des anderen Verzeichnisses funktioniert problemlos. Die Untersuchung des call-Stacks mit gdb ergab folgendes Ergebnis:
hph@beech:~> gdb /usr/bin/encfs /var/local/dumps/core.encfs.4691
GNU gdb (GDB; SUSE Linux Enterprise 15) 13.2
Copyright (C) 2023 Free Software Foundation, Inc.
License GPLv3+: GNU GPL version 3 or later <http://gnu.org/licenses/gpl.html>
This is free software: you are free to change and redistribute it.
There is NO WARRANTY, to the extent permitted by law.
Type "show copying" and "show warranty" for details.
This GDB was configured as "x86_64-suse-linux".
Type "show configuration" for configuration details.
For bug reporting instructions, please see:
<http://bugs.opensuse.org/>.
Find the GDB manual and other documentation resources online at:
<http://www.gnu.org/software/gdb/documentation/>.
For help, type "help".
Type "apropos word" to search for commands related to "word"...
Reading symbols from /usr/bin/encfs...
Reading symbols from /usr/lib/debug/usr/bin/encfs-1.9.5-bp156.3.7.x86_64.debug...
[New LWP 4691]
warning: Section `.reg-xstate/4691' in core file too small.
[Thread debugging using libthread_db enabled]
Using host libthread_db library "/lib64/libthread_db.so.1".
Core was generated by `encfs /server/customers/atis /home/hph/customers/atis'.
Program terminated with signal SIGSEGV, Segmentation fault.
warning: Section `.reg-xstate/4691' in core file too small.
#0 0x00007ff3c6de6b48 in EVP_CIPHER_CTX_set_key_length (c=0x561e69147d20, keylen=keylen@entry=32) at crypto/evp/evp_enc.c:1040
1040 if (c->cipher->prov != NULL) {
(gdb)
(gdb)
(gdb) bt
#0 0x00007ff3c6de6b48 in EVP_CIPHER_CTX_set_key_length (c=0x561e69147d20, keylen=keylen@entry=32) at crypto/evp/evp_enc.c:1040
#1 0x00007ff3c7e47b88 in encfs::initKey (key=std::shared_ptr<encfs::SSLKey> (use count 1, weak count 0) = {...}, _blockCipher=0x7ff3c70ccf80 <bf_cbc>, _streamCipher=0x7ff3c70cce80 <bf_cfb64>, _keySize=32)
at /usr/src/debug/encfs-1.9.5-bp156.3.7.x86_64/encfs/SSL_Cipher.cpp:365
#2 0x00007ff3c7e4e18c in encfs::SSL_Cipher::newKey (this=this@entry=0x561e69147bf0, password=password@entry=0x7ffd783965d0 "XXXXXXXXXXXXXXXX", passwdLength=passwdLength@entry=16,
iterationCount=@0x561e69147158: 406902, desiredDuration=<optimized out>, salt=0x561e69147650 "\123ѤD\f\123`\123\123\123\123\123\123\"N\123v\123\123E\123V", saltLen=20)
at /usr/src/debug/encfs-1.9.5-bp156.3.7.x86_64/encfs/SSL_Cipher.cpp:444
#3 0x00007ff3c7e3520c in encfs::EncFSConfig::makeKey (this=this@entry=0x561e69147090, password=password@entry=0x7ffd783965d0 "XXXXXXXXXXXXXXXX", passwdLen=16)
at /usr/src/debug/encfs-1.9.5-bp156.3.7.x86_64/encfs/FileUtils.cpp:1444
#4 0x00007ff3c7e3581c in encfs::EncFSConfig::getUserKey (this=0x561e69147090, useStdin=<optimized out>) at /usr/src/debug/encfs-1.9.5-bp156.3.7.x86_64/encfs/FileUtils.cpp:1474
#5 0x00007ff3c7e3bfc1 in encfs::initFS (ctx=ctx@entry=0x561e69146f10, opts=std::shared_ptr<encfs::EncFS_Opts> (use count 1, weak count 0) = {...})
at /usr/src/debug/encfs-1.9.5-bp156.3.7.x86_64/encfs/FileUtils.cpp:1664
#6 0x0000561e6796b0c0 in main (argc=<optimized out>, argv=<optimized out>) at /usr/src/debug/encfs-1.9.5-bp156.3.7.x86_64/encfs/main.cpp:741
(gdb)