|
Message-ID: <CANO7a6wNf7S_fSJSrVWaUNkURP32EukmeQEtN_bZJQskS3x05w@mail.gmail.com> Date: Sun, 1 Jul 2012 12:46:12 +0530 From: Dhiru Kholia <dhiru.kholia@...il.com> To: john-dev@...ts.openwall.com Subject: Re: 1.7.9-jumbo-6 On Fri, Jun 29, 2012 at 9:33 PM, Erik Winkler <ewinkler@...ls.com> wrote: > >> In one of the email threads, I asked for a gdb backtrace. Any progress >> on that? Did you try latest OpenSSL? Thanks. >> > > Here is the backtrace: > > Reading symbols for shared libraries +++. done > Benchmarking: SSH RSA/DSA (one 2048-bit RSA and one 1024-bit DSA key) [32/32]... > Program received signal EXC_BAD_ACCESS, Could not access memory. > Reason: KERN_INVALID_ADDRESS at address: 0xffd9d730 > 0x93ef0a78 in tiny_malloc_from_free_list () > (gdb) bt > #0 0x93ef0a78 in tiny_malloc_from_free_list () > #1 0x93eea2ac in szone_malloc () > #2 0x93eea190 in malloc_zone_malloc () > #3 0x93eea0f0 in malloc () > #4 0x000e5430 in CRYPTO_malloc () > #5 0x0013b920 in lh_insert () > #6 0x000e71ec in CRYPTO_set_ex_data_implementation () > #7 0x000e775c in CRYPTO_free_ex_data () > #8 0x0012a5e0 in RSA_new_method () > #9 0x00129e50 in RSAPrivateKey_asn1_meth () > #10 0x001570fc in ASN1_template_new () > #11 0x00159b38 in ASN1_item_ex_d2i () > #12 0x0015a4ec in ASN1_item_d2i () > #13 0x00059e08 in PEM_do_header_safe () > #14 0x000bf888 in fmt_self_test () > #15 0x000b4b2c in benchmark_format () > #16 0x000b5494 in benchmark_all () > #17 0x000c35e4 in do_incremental_crack () > #18 0x000c44e8 in main () > > Compiled with the latest OpenSSL (v1.0.1c), I get the following results with segfault: > > Reading symbols for shared libraries +++. done > Benchmarking: SSH RSA/DSA (one 2048-bit RSA and one 1024-bit DSA key) [32/32]... > Program received signal EXC_BAD_ACCESS, Could not access memory. > Reason: KERN_INVALID_ADDRESS at address: 0xffd9d730 > 0x93ef0a78 in tiny_malloc_from_free_list () > (gdb) bt > #0 0x93ef0a78 in tiny_malloc_from_free_list () > #1 0x93eea2ac in szone_malloc () > #2 0x93eea190 in malloc_zone_malloc () > #3 0x93eea0f0 in malloc () > #4 0x000e55e0 in CRYPTO_malloc () > #5 0x001545b0 in lh_insert () > #6 0x000e726c in CRYPTO_set_ex_data_implementation () > #7 0x000e77dc in CRYPTO_free_ex_data () > #8 0x00139220 in RSA_new_method () > #9 0x0013b790 in RSA_X931_hash_id () > #10 0x00175ac4 in ASN1_template_new () > #11 0x0017850c in ASN1_item_ex_d2i () > #12 0x00178ebc in ASN1_item_d2i () > #13 0x00059f28 in PEM_do_header_safe () > #14 0x000bf9a8 in fmt_self_test () > #15 0x000b4c4c in benchmark_format () > #16 0x000b55b4 in benchmark_all () > #17 0x000c3704 in do_incremental_crack () > #18 0x000c4608 in main () Do any of the previous versions of ssh format (use git to checkout old versions) work on that machine? I am writing a sample program to see if this is a bug in OpenSSL? -- Cheers, Dhiru
Powered by blists - more mailing lists
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.