Guest

Preview Tool

Cisco Bug: CSCul47361 - ASR5K - ssl_mark_and_payload_search_for_other_protocols()

Last Modified

Dec 25, 2016

Products (1)

  • Cisco ASR 5000 Series

Known Affected Releases

14.0(40)

Description (partial)

Symptom:
Problem Analysis:  
Issue is because of the corrupt certificate in an SSL payload. ADC's SSL decode logic is wrongly calculating the ?Common Name? length. Because of the wrong calculation, in function ssl_mark_and_payload_search_for_other_protocols() we are getting Segmentation Fault.

Conditions:
Fatal Signal 11: Segmentation fault
  PC: [f40de757/X] libp2p-1.50.50753.so/ssl_mark_and_payload_search_for_other_protocols()
  Faulty address: 0xe2d6d923
  Signal from: kernel
  Signal detail: address not mapped to object
  Process: card=7 cpu=1 arch=X pid=4834 cpu=~33% argv0=sessmgr
  Crash time: 2013-Oct-19+11:22:05 UTC
  Recent errno: 11 Resource temporarily unavailable
  Stack (27640@0xffff7000):
    [f40de757/X] libp2p-1.50.50753.so/ssl_mark_and_payload_search_for_other_protocols() sp=0xffff79c8
    [f4087c94/X] libp2p-1.50.50753.so/ipoque_detection_process_packet_slowpath() sp=0xffff7c08
    [f4088db3/X] libp2p-1.50.50753.so/ipoque_detection_process_packet() sp=0xffff7c38
    [f4137ddb/X] libp2p-1.50.50753.so/plugin_p2p_api_inspect() sp=0xffff7c88
    [07de77b6/X] acs_p2p_pkt_inspection() sp=0xffff7e28
    [07ac8d7b/X] _do_acsmgr_process_packet() sp=0xffff90d8
    [07ae8e1a/X] acsmgr_process_packet() sp=0xffff91a8
    [07aa31a9/X] acsmgr_analyze_packet() sp=0xffff93c8
    [07606960/X] acsmgr_data_receive_merge_mode() sp=0xffff9908
    [07a46706/X] acs_handle_datapath_events_from_sm_interface() sp=0xffff9958
    [03437d2d/X] sessmgr_sef_initiate_data_packet_ind() sp=0xffff99c8
    [03419d19/X] sessmgr_pcc_intf_send_data_packet_ind() sp=0xffff9a08
    [0597f5b8/X] sessmgr_pcc_fwd_packet() sp=0xffff9a58
    [0593aa13/X] sessmgr_ipv4_process_inet_pkt_part2_slow() sp=0xffffad08
    [0594dfce/X] sessmgr_ipv4_process_inet_pkt() sp=0xffffb288
    [03356992/X] sessmgr_ipv4_sfw_process_nat_packets() sp=0xffffb378
    [05a7eef1/X] sessmgr_med_ipv4_data_receive() sp=0xffffb3e8
    [058c4adf/X] sessmgr_med_data_receive() sp=0xffffd618
    [0a1e58a1/X] sn_loop_run() sp=0xffffdba8
    [0a00cc14/X] main() sp=0xffffdbe8
Bug details contain sensitive information and therefore require a Cisco.com account to be viewed.

Bug Details Include

  • Full Description (including symptoms, conditions and workarounds)
  • Status
  • Severity
  • Known Fixed Releases
  • Related Community Discussions
  • Number of Related Support Cases
Bug information is viewable for customers and partners who have a service contract. Registered users can view up to 200 bugs per month without a service contract.