Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <CANO7a6wNf7S_fSJSrVWaUNkURP32EukmeQEtN_bZJQskS3x05w@mail.gmail.com>
Date: Sun, 1 Jul 2012 12:46:12 +0530
From: Dhiru Kholia <dhiru.kholia@...il.com>
To: john-dev@...ts.openwall.com
Subject: Re: 1.7.9-jumbo-6

On Fri, Jun 29, 2012 at 9:33 PM, Erik Winkler <ewinkler@...ls.com> wrote:
>
>> In one of the email threads, I asked for a gdb backtrace. Any progress
>> on that? Did you try latest OpenSSL? Thanks.
>>
>
> Here is the backtrace:
>
> Reading symbols for shared libraries +++. done
> Benchmarking: SSH RSA/DSA (one 2048-bit RSA and one 1024-bit DSA key) [32/32]...
> Program received signal EXC_BAD_ACCESS, Could not access memory.
> Reason: KERN_INVALID_ADDRESS at address: 0xffd9d730
> 0x93ef0a78 in tiny_malloc_from_free_list ()
> (gdb) bt
> #0  0x93ef0a78 in tiny_malloc_from_free_list ()
> #1  0x93eea2ac in szone_malloc ()
> #2  0x93eea190 in malloc_zone_malloc ()
> #3  0x93eea0f0 in malloc ()
> #4  0x000e5430 in CRYPTO_malloc ()
> #5  0x0013b920 in lh_insert ()
> #6  0x000e71ec in CRYPTO_set_ex_data_implementation ()
> #7  0x000e775c in CRYPTO_free_ex_data ()
> #8  0x0012a5e0 in RSA_new_method ()
> #9  0x00129e50 in RSAPrivateKey_asn1_meth ()
> #10 0x001570fc in ASN1_template_new ()
> #11 0x00159b38 in ASN1_item_ex_d2i ()
> #12 0x0015a4ec in ASN1_item_d2i ()
> #13 0x00059e08 in PEM_do_header_safe ()
> #14 0x000bf888 in fmt_self_test ()
> #15 0x000b4b2c in benchmark_format ()
> #16 0x000b5494 in benchmark_all ()
> #17 0x000c35e4 in do_incremental_crack ()
> #18 0x000c44e8 in main ()
>
> Compiled with the latest OpenSSL (v1.0.1c), I get the following results with segfault:
>
> Reading symbols for shared libraries +++. done
> Benchmarking: SSH RSA/DSA (one 2048-bit RSA and one 1024-bit DSA key) [32/32]...
> Program received signal EXC_BAD_ACCESS, Could not access memory.
> Reason: KERN_INVALID_ADDRESS at address: 0xffd9d730
> 0x93ef0a78 in tiny_malloc_from_free_list ()
> (gdb) bt
> #0  0x93ef0a78 in tiny_malloc_from_free_list ()
> #1  0x93eea2ac in szone_malloc ()
> #2  0x93eea190 in malloc_zone_malloc ()
> #3  0x93eea0f0 in malloc ()
> #4  0x000e55e0 in CRYPTO_malloc ()
> #5  0x001545b0 in lh_insert ()
> #6  0x000e726c in CRYPTO_set_ex_data_implementation ()
> #7  0x000e77dc in CRYPTO_free_ex_data ()
> #8  0x00139220 in RSA_new_method ()
> #9  0x0013b790 in RSA_X931_hash_id ()
> #10 0x00175ac4 in ASN1_template_new ()
> #11 0x0017850c in ASN1_item_ex_d2i ()
> #12 0x00178ebc in ASN1_item_d2i ()
> #13 0x00059f28 in PEM_do_header_safe ()
> #14 0x000bf9a8 in fmt_self_test ()
> #15 0x000b4c4c in benchmark_format ()
> #16 0x000b55b4 in benchmark_all ()
> #17 0x000c3704 in do_incremental_crack ()
> #18 0x000c4608 in main ()

Do any of the previous versions of ssh format (use git to checkout old
versions) work on that machine?

I am writing a sample program to see if this is a bug in OpenSSL?

-- 
Cheers,
Dhiru

Powered by blists - more mailing lists

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.