> [...@rfc1035.com - Sun Mar 28 14:59:50 2010]:
> 
> Hi. I compiled the current ntp release on a recent-ish amd64 Linux
> box. It links the libcrypto from 1.0.0beta. That was compiled and
> installed earlier: a "make test" just before OpenSSL was installed
> reported no errors. Here's the stack backtrace from gdb.
> 
> Please let me know if you want further info to find the bug.
> 
> gdb ntpd
> GNU gdb (GDB; openSUSE 11.1) 6.8.50.20081120-cvs
> Copyright (C) 2008 Free Software Foundation, Inc.
> License GPLv3+: GNU GPL version 3 or later
> <http://gnu.org/licenses/gpl.html
>  >
> This is free software: you are free to change and redistribute it.
> There is NO WARRANTY, to the extent permitted by law.  Type "show
> copying"
> and "show warranty" for details.
> This GDB was configured as "x86_64-suse-linux".
> For bug reporting instructions, please see:
> <http://bugs.opensuse.org/>...
> (gdb) run -n -g
> Starting program: /usr/src/local/ntp-4.2.6/ntpd/ntpd -n -g
> [Thread debugging using libthread_db enabled]
> 
> Program received signal SIGSEGV, Segmentation fault.
> 0x00007ffff78bdeb9 in EVP_PKEY_CTX_free () from /usr/local/lib/
> libcrypto.so.1.0.0
> Current language:  auto; currently asm
> (gdb) bt
> #0  0x00007ffff78bdeb9 in EVP_PKEY_CTX_free () from /usr/local/lib/
> libcrypto.so.1.0.0
> #1  0x00007ffff78b203f in EVP_MD_CTX_cleanup () from /usr/local/lib/
> libcrypto.so.1.0.0
> #2  0x00007ffff78b23e0 in EVP_DigestFinal () from /usr/local/lib/
> libcrypto.so.1.0.0
> #3  0x0000000000452499 in addr2refid (addr=0x6e7ac0) at
> a_md5encrypt.c:
> 135
> #4  0x000000000041069c in io_open_sockets () at ntp_io.c:843
> #5  0x00000000004078f2 in config_ntpd (ptree=0x6e76b0) at
> ntp_config.c:
> 3690
> #6  0x000000000040adf7 in getconfig (argc=0, argv=0x7fffffffe5c0) at
> ntp_config.c:3876
> #7  0x000000000041430a in ntpdmain (argc=0, argv=0x7fffffffe5a8) at
> ntpd.c:862
> #8  0x00007ffff7293586 in __libc_start_main () from /lib64/libc.so.6
> #9  0x0000000000405d79 in _start () at
> ../sysdeps/x86_64/elf/start.S:113
> (gdb) quit
> 
> 

A possibility is that you are compiling the application against the
OpenSSL 0.9.8 header files instead of the 1.0.0 ones. In particular I'd
expect a crash in EVP_PKEY_CTX_free() under those circumstances as it
would attempt to free up a garbage pointer.

Steve.
-- 
Dr Stephen N. Henson. OpenSSL project core developer.
Commercial tech support now available see: http://www.openssl.org

______________________________________________________________________
OpenSSL Project                                 http://www.openssl.org
Development Mailing List                       openssl-dev@openssl.org
Automated List Manager                           majord...@openssl.org

Reply via email to