Segfault with --list-secret-keys --show-photos

Thomas Henlich Thomas.Henlich at imm.tu-dresden.de
Sun Jun 2 21:12:01 CEST 2002


On Linux 2.2.19 i586, I get a segfault every time I start:
/tmp$ gpg --list-secret-keys --show-photos 
gpg: Warning: using insecure memory!
gpg: please see http://www.gnupg.org/faq.html for more information
/home/th/.gnupg/secring.gpg
---------------------------
sec  1024D/DB3033CB 2002-06-02 Test1 (test1) <test1 at test1>
uid                            test2 (test2) <test2 at test2>
uid                            test3 (test3) <test3 at test3>
uid                            [image of size 993]

gpg: Segmentation fault caught ... exiting
Segmentation fault
/tmp$ 

The secret key, as well as output and error messages of a GDB session, are
attached.

Regards,
 Thomas.

-- 
Thomas Henlich c/o Technische Universitaet Dresden
Institut fuer Maschinenelemente und Maschinenkonstruktion
D-01062 Dresden, Germany; Tel/Fax: +49(0)351 463 34232/37137
E-Mail: Thomas.Henlich at imm.tu-dresden.de
-------------- next part --------------
-----BEGIN PGP PRIVATE KEY BLOCK-----
Version: GnuPG v1.0.7 (GNU/Linux)
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=wNGi
-----END PGP PRIVATE KEY BLOCK-----
-------------- next part --------------
GNU gdb 4.18
Copyright 1998 Free Software Foundation, Inc.
GDB is free software, covered by the GNU General Public License, and you are
welcome to change it and/or distribute copies of it under certain conditions.
Type "show copying" to see the conditions.
There is absolutely no warranty for GDB.  Type "show warranty" for details.
This GDB was configured as "i386-suse-linux"...
(gdb) Starting program: /usr/src/gnupg-1.0.7/g10/gpg --list-secret-keys --show-photos --debug 0xffff

Program received signal SIGSEGV, Segmentation fault.
keyid_from_pk (pk=0x0, keyid=0xbffff040) at keyid.c:169
169	    if( pk->keyid[0] || pk->keyid[1] ) {
(gdb) 
-------------- next part --------------
gpg: reading options from `/home/th/.gnupg/options'
gpg: Warning: using insecure memory!
gpg: please see http://www.gnupg.org/faq.html for more information
gpg: DBG: fd_cache_open (/home/th/.gnupg/secring.gpg) not cached
gpg: DBG: iobuf-1.0: open `/home/th/.gnupg/secring.gpg' fd=5
gpg: DBG: iobuf-1.0: underflow: req=8192 got=2717 rc=0
gpg: DBG: parse_packet(iob=1): type=5 length=481 (search.keyring.c.962)
gpg: DBG: mpi_alloc(1024)
gpg: DBG: mpi_alloc_limb_space(1024)
gpg: DBG: mpi_alloc(160)
gpg: DBG: mpi_alloc_limb_space(160)
gpg: DBG: mpi_alloc(1024)
gpg: DBG: mpi_alloc_limb_space(1024)
gpg: DBG: mpi_alloc(1024)
gpg: DBG: mpi_alloc_limb_space(1024)
gpg: DBG: mpi_alloc(0)
gpg: DBG: free_packet() type=5
gpg: DBG: mpi_free
gpg: DBG: dummy m_size called
gpg: DBG: mpi_free_limb_space of size 0
gpg: DBG: mpi_free
gpg: DBG: dummy m_size called
gpg: DBG: mpi_free_limb_space of size 0
gpg: DBG: mpi_free
gpg: DBG: dummy m_size called
gpg: DBG: mpi_free_limb_space of size 0
gpg: DBG: mpi_free
gpg: DBG: dummy m_size called
gpg: DBG: mpi_free_limb_space of size 0
gpg: DBG: mpi_free
gpg: DBG: fd_cache_open (/home/th/.gnupg/secring.gpg) not cached
gpg: DBG: iobuf-2.0: open `/home/th/.gnupg/secring.gpg' fd=6
gpg: DBG: iobuf-2.0: underflow: req=8192 got=2717 rc=0
gpg: DBG: parse_packet(iob=2): type=5 length=481 (parse.keyring.c.382)
gpg: DBG: mpi_alloc(1024)
gpg: DBG: mpi_alloc_limb_space(1024)
gpg: DBG: mpi_alloc(160)
gpg: DBG: mpi_alloc_limb_space(160)
gpg: DBG: mpi_alloc(1024)
gpg: DBG: mpi_alloc_limb_space(1024)
gpg: DBG: mpi_alloc(1024)
gpg: DBG: mpi_alloc_limb_space(1024)
gpg: DBG: mpi_alloc(0)
gpg: DBG: parse_packet(iob=2): type=61 length=38 (new_ctb) (parse.keyring.c.382)
gpg: DBG: parse_packet(iob=2): type=61 length=38 (new_ctb) (parse.keyring.c.382)
gpg: DBG: parse_packet(iob=2): type=61 length=38 (new_ctb) (parse.keyring.c.382)
gpg: DBG: parse_packet(iob=2): type=13 length=27 (parse.keyring.c.382)
gpg: DBG: parse_packet(iob=2): type=2 length=89 (parse.keyring.c.382)
gpg: DBG: mpi_alloc(160)
gpg: DBG: mpi_alloc_limb_space(160)
gpg: DBG: mpi_alloc(160)
gpg: DBG: mpi_alloc_limb_space(160)
gpg: DBG: parse_packet(iob=2): type=12 length=2 (parse.keyring.c.382)
gpg: DBG: parse_packet(iob=2): type=13 length=27 (parse.keyring.c.382)
gpg: DBG: parse_packet(iob=2): type=2 length=92 (parse.keyring.c.382)
gpg: DBG: mpi_alloc(160)
gpg: DBG: mpi_alloc_limb_space(160)
gpg: DBG: mpi_alloc(160)
gpg: DBG: mpi_alloc_limb_space(160)
gpg: DBG: parse_packet(iob=2): type=12 length=2 (parse.keyring.c.382)
gpg: DBG: parse_packet(iob=2): type=13 length=27 (parse.keyring.c.382)
gpg: DBG: parse_packet(iob=2): type=2 length=92 (parse.keyring.c.382)
gpg: DBG: mpi_alloc(160)
gpg: DBG: mpi_alloc_limb_space(160)
gpg: DBG: mpi_alloc(160)
gpg: DBG: mpi_alloc_limb_space(160)
gpg: DBG: parse_packet(iob=2): type=12 length=2 (parse.keyring.c.382)
gpg: DBG: parse_packet(iob=2): type=17 length=1012 (new_ctb) (parse.keyring.c.382)
gpg: DBG: parse_packet(iob=2): type=2 length=92 (parse.keyring.c.382)
gpg: DBG: mpi_alloc(160)
gpg: DBG: mpi_alloc_limb_space(160)
gpg: DBG: mpi_alloc(160)
gpg: DBG: mpi_alloc_limb_space(160)
gpg: DBG: parse_packet(iob=2): type=12 length=2 (parse.keyring.c.382)
gpg: DBG: parse_packet(iob=2): type=7 length=343 (parse.keyring.c.382)
gpg: DBG: mpi_alloc(1024)
gpg: DBG: mpi_alloc_limb_space(1024)
gpg: DBG: mpi_alloc(32)
gpg: DBG: mpi_alloc_limb_space(32)
gpg: DBG: mpi_alloc(1024)
gpg: DBG: mpi_alloc_limb_space(1024)
gpg: DBG: mpi_alloc(0)
gpg: DBG: parse_packet(iob=2): type=61 length=38 (new_ctb) (parse.keyring.c.382)
gpg: DBG: parse_packet(iob=2): type=61 length=38 (new_ctb) (parse.keyring.c.382)
gpg: DBG: parse_packet(iob=2): type=61 length=38 (new_ctb) (parse.keyring.c.382)
gpg: DBG: parse_packet(iob=2): type=61 length=38 (new_ctb) (parse.keyring.c.382)
gpg: DBG: parse_packet(iob=2): type=61 length=38 (new_ctb) (parse.keyring.c.382)
gpg: DBG: parse_packet(iob=2): type=2 length=70 (parse.keyring.c.382)
gpg: DBG: mpi_alloc(160)
gpg: DBG: mpi_alloc_limb_space(160)
gpg: DBG: mpi_alloc(160)
gpg: DBG: mpi_alloc_limb_space(160)
gpg: DBG: parse_packet(iob=2): type=12 length=2 (parse.keyring.c.382)
gpg: DBG: iobuf-2.0: underflow: req=8192 got=0 rc=-1
gpg: DBG: /home/th/.gnupg/secring.gpg: close fd 6
gpg: DBG: fd_cache_close (/home/th/.gnupg/secring.gpg) new slot created
gpg: DBG: iobuf-2.0: underflow: eof
gpg: DBG: iobuf-2.0: close `(null)'


More information about the Gnupg-devel mailing list