Re: [openssl-users] glibc detected *** xxx: double free or corruption (!prev): 0x097b8750
Hi Matt, It looks like handling crypto lock mechanism issue. I defined NO SRP. Now I am getting segmentation fault in CRYPTO_add_lock() function referencing NULL pointer. Please find GDB output below, (gdb) run ftp://x.x.x.x:sample.txt Starting program: /App/vikftp ftp://x.x.x.x:sample.txt Missing separate debuginfo for /lib/ld-linux.so.2 Missing separate debuginfo for /lib/libdl.so.2 Missing separate debuginfo for /lib/libpam.so.0 Missing separate debuginfo for /lib/libm.so.6 Missing separate debuginfo for /lib/libc.so.6 Missing separate debuginfo for /lib/libaudit.so.0 process 22287 is executing new program: /App/vikftp Missing separate debuginfo for /lib/ld-linux.so.2 Missing separate debuginfo for /lib/libdl.so.2 Missing separate debuginfo for /lib/libpam.so.0 Missing separate debuginfo for /lib/libm.so.6 Missing separate debuginfo for /lib/libc.so.6 Missing separate debuginfo for /lib/libaudit.so.0 Program received signal SIGSEGV, Segmentation fault. 0x08205766 in CRYPTO_add_lock (pointer=0x1011, amount=-1, type=3, file=0x85d0030 "/102d/s/tasn_utl.c", line=118) at /102d/s/cryptlib.c:624 624 ret = *pointer + amount; (gdb) bt #0 0x08205766 in CRYPTO_add_lock (pointer=0x1011, amount=-1, type=3, file=0x85d0030 "/102d/s/tasn_utl.c", line=118) at /102d/s/cryptlib.c:624 #1 0x08249d2a in asn1_do_lock (pval=0xff8eee90, op=-1, it=0x862cb1c) at /102d/s/tasn_utl.c:118 #2 0x08246ed5 in asn1_item_combine_free (pval=0xff8eee90, it=0x862cb1c, combine=0) at /102d/s/tasn_fre.c:146 #3 0x08246c40 in ASN1_item_free (val=0x1001, it=0x862cb1c) at /102d/s/tasn_fre.c:72 #4 0x0825eeea in X509_free (a=0x1001) at /102d/s/x_x509.c:143 #5 0x082ee677 in ssl_cert_clear_certs (c=0x872e4e0) at /102d/s/ssl_cert.c:431 #6 0x082ee7ed in ssl_cert_free (c=0x872e4e0) at /102d/s/ssl_cert.c:489 #7 0x0822f926 in SSL_free (s=0x872e340) at /102d/s/ssl_lib.c:627 #8 0x0816566c in closeConnection (pcx=0x86d8310, rsn=0x0, graceful=1 '\001') at /App/vikftp.c:10098 Please let me know if you have any solution. Thanks & Regards, Vikas On 7 Apr 2016 7:18 pm, "Vikas TM"wrote: Hi Matt, I was trying the patches available in the Internet. Due to that few blank lines might have added or removed. But no major change in the code. Thanks & Regards, Vikas On 7 Apr 2016 7:07 pm, "Matt Caswell" wrote: > > > On 07/04/16 14:23, Vikas TM wrote: > > Hi Mike > > > > > > I have integrated openSSL version 102d. While running secure FTP > > connection, I have encountered double free or corruption issue. > > Are you running 1.0.2d as downloaded from the OpenSSL website with no > other patches applied? The line numbers below do not match up with the > git copy of 1.0.2d. > > Matt > > > > > The TLS negotiation is successful and file is also getting transferred > > to partner machine. At the end while freeing all the memory, file > > transfer is ended with “double free or corruption issue”. I have tried > > almost all the patch available in internet. Please let me know if you > > any solution. > > > > > > > > Machine: Linux x86_64 > > > > Please find the GDB output below, > > > > > > > > Breakpoint 1, ssl3_free (s=0x8736430) at /102d/s/s3_lib.c:2995 > > > > 2995if (s == NULL || s->s3 == NULL) > > > > (gdb) n > > > > 3009ssl3_cleanup_key_block(s); > > > > (gdb) > > > > 3010if (s->s3->rbuf.buf != NULL) > > > > (gdb) > > > > 3011ssl3_release_read_buffer(s); > > > > (gdb) > > > > 3012if (s->s3->wbuf.buf != NULL) > > > > (gdb) > > > > 3013ssl3_release_write_buffer(s); > > > > (gdb) > > > > 3014if (s->s3->rrec.comp != NULL) > > > > (gdb) > > > > 3017if (s->s3->tmp.dh != NULL) > > > > (gdb) > > > > 3021if (s->s3->tmp.ecdh != NULL) > > > > (gdb) > > > > 3025if (s->s3->tmp.ca_names != NULL) > > > > (gdb) > > > > 3027if (s->s3->handshake_buffer) { > > > > (gdb) > > > > 3030if (s->s3->handshake_dgst) > > > > (gdb) > > > > 3031ssl3_free_digest_list(s); > > > > (gdb) > > > > 3033if (s->s3->alpn_selected) > > > > (gdb) > > > > 3038SSL_SRP_CTX_free(s); > > > > (gdb) > > > > > > > > 3042OPENSSL_cleanse(s->s3, sizeof *(s->s3)); > > > > (gdb) n > > > > 3047OPENSSL_free(s->s3); > > > > (gdb) p *(s->s3) > > > > $1 = {flags = 1447178013, delay_buf_pop_ret = -1332182677, read_sequence > > = "\311\343\376\032\067Ut\224", read_mac_secret_size = -557140059, > > > > read_mac_secret = "\363\t > > > 8Qk\206\242\277\335\377\034-?Rf{\221\253\300\337\353\016*Ge\204\244\265\307\332\363\003\031\060Ha{\226\262\317\355\f,=Obv\213\241\270\320\356\003\036:Wu\224\264\305\327\356\374", > > write_sequence = "\023)@Xq\213\246", , > > write_mac_secret_size = 1008532959, > > > > write_mac_secret = > > >
Re: [openssl-users] glibc detected *** xxx: double free or corruption (!prev): 0x097b8750
Hi Matt, I was trying the patches available in the Internet. Due to that few blank lines might have added or removed. But no major change in the code. Thanks & Regards, Vikas On 7 Apr 2016 7:07 pm, "Matt Caswell"wrote: > > > On 07/04/16 14:23, Vikas TM wrote: > > Hi Mike > > > > > > I have integrated openSSL version 102d. While running secure FTP > > connection, I have encountered double free or corruption issue. > > Are you running 1.0.2d as downloaded from the OpenSSL website with no > other patches applied? The line numbers below do not match up with the > git copy of 1.0.2d. > > Matt > > > > > The TLS negotiation is successful and file is also getting transferred > > to partner machine. At the end while freeing all the memory, file > > transfer is ended with “double free or corruption issue”. I have tried > > almost all the patch available in internet. Please let me know if you > > any solution. > > > > > > > > Machine: Linux x86_64 > > > > Please find the GDB output below, > > > > > > > > Breakpoint 1, ssl3_free (s=0x8736430) at /102d/s/s3_lib.c:2995 > > > > 2995if (s == NULL || s->s3 == NULL) > > > > (gdb) n > > > > 3009ssl3_cleanup_key_block(s); > > > > (gdb) > > > > 3010if (s->s3->rbuf.buf != NULL) > > > > (gdb) > > > > 3011ssl3_release_read_buffer(s); > > > > (gdb) > > > > 3012if (s->s3->wbuf.buf != NULL) > > > > (gdb) > > > > 3013ssl3_release_write_buffer(s); > > > > (gdb) > > > > 3014if (s->s3->rrec.comp != NULL) > > > > (gdb) > > > > 3017if (s->s3->tmp.dh != NULL) > > > > (gdb) > > > > 3021if (s->s3->tmp.ecdh != NULL) > > > > (gdb) > > > > 3025if (s->s3->tmp.ca_names != NULL) > > > > (gdb) > > > > 3027if (s->s3->handshake_buffer) { > > > > (gdb) > > > > 3030if (s->s3->handshake_dgst) > > > > (gdb) > > > > 3031ssl3_free_digest_list(s); > > > > (gdb) > > > > 3033if (s->s3->alpn_selected) > > > > (gdb) > > > > 3038SSL_SRP_CTX_free(s); > > > > (gdb) > > > > > > > > 3042OPENSSL_cleanse(s->s3, sizeof *(s->s3)); > > > > (gdb) n > > > > 3047OPENSSL_free(s->s3); > > > > (gdb) p *(s->s3) > > > > $1 = {flags = 1447178013, delay_buf_pop_ret = -1332182677, read_sequence > > = "\311\343\376\032\067Ut\224", read_mac_secret_size = -557140059, > > > > read_mac_secret = "\363\t > > > 8Qk\206\242\277\335\377\034-?Rf{\221\253\300\337\353\016*Ge\204\244\265\307\332\363\003\031\060Ha{\226\262\317\355\f,=Obv\213\241\270\320\356\003\036:Wu\224\264\305\327\356\374", > > write_sequence = "\023)@Xq\213\246", , > > write_mac_secret_size = 1008532959, > > > > write_mac_secret = > > > "M_r\206\243\261\310\340\371\023.Jg\205\260\304\325\347\373\016#9Ph\201\233\264\322\357\r,L]o\202\226\253\301\330\363\t#>Zw\225\264\324\345\374\n\036\063I`x\221\253\306\342\377\035<\\", > > server_random = > > > "m\177\222\246\273\321\350\000\031\063Nj\207\245\304\344\365\a\032.CYp\210\241\273\326\362\017-Ll", > > > > client_random = > > > "}\217\242\266\313\341\370\020)C^z\227\265\324\364\005\027*>Si\200\230\261\313\346\002\037=\\|", > > need_empty_fragments = -961372275, > > > > empty_fragment_done = 537457115, init_extra = -1972481223, rbuf = {buf > > = 0x4e4c5a7 , len = 1312433941, offset > > = -1466926749, > > > > left = 318168001}, wbuf = {buf = 0x8c6c4d2f > of bounds>, len = 3603083165, offset = 806879723, left = -1702993079}, > > rrec = { > > > > type = 351589815, length = 1581922085, off = 3097528691, data = > > 0x2206ebd1 , > > > > input = 0x9c7c5d3f , comp = > > 0xe6d2bfad , epoch = 1076367867, > > > > seq_num = "Ys\216\252\307\345\004$"}, wrec = {type = 1851410229, > > length = 3367016835, off = 840367073, data = 0xac8c6d4f > 0xac8c6d4f out of bounds>, > > > > input = 0xf6e2cfbd , comp = > > 0x5038210b , epoch = 3130950505, > > > > seq_num = "\327\365\024\064EWj~"}, alert_fragment = "\223\251", > > alert_fragment_len = 1109789681, handshake_fragment = "_}\234\274", > > > > handshake_fragment_len = 116580301, wnum = 1615343899, wpend_tot = > > -894528647, wpend_type = 1143211495, wpend_ret = -1904580779, > > > > wpend_buf = 0xe8d0b9a3 , > > handshake_buffer = 0x52361b01, handshake_dgst = 0xccac8d6f, > > change_cipher_spec = 369291229, > > > > warn_alert = 1884832043, fatal_alert = -625040503, alert_dispatch = > > 1412699639, send_alert = "ew", renegotiate = -119486029, > > total_renegotiations = 1648765713, > > > > num_renegotiations = -591618689, in_read_app_data = 638779373, > > client_opaque_prf_input = 0x8068513b, client_opaque_prf_input_len = > > 3939414937, > > > > server_opaque_prf_input = 0x64442507, server_opaque_prf_input_len = > > 2929362805, tmp = { > > > > cert_verify_md = > > >
Re: [openssl-users] glibc detected *** xxx: double free or corruption (!prev): 0x097b8750
On 07/04/16 14:23, Vikas TM wrote: > Hi Mike > > > I have integrated openSSL version 102d. While running secure FTP > connection, I have encountered double free or corruption issue. Are you running 1.0.2d as downloaded from the OpenSSL website with no other patches applied? The line numbers below do not match up with the git copy of 1.0.2d. Matt > > The TLS negotiation is successful and file is also getting transferred > to partner machine. At the end while freeing all the memory, file > transfer is ended with “double free or corruption issue”. I have tried > almost all the patch available in internet. Please let me know if you > any solution. > > > > Machine: Linux x86_64 > > Please find the GDB output below, > > > > Breakpoint 1, ssl3_free (s=0x8736430) at /102d/s/s3_lib.c:2995 > > 2995if (s == NULL || s->s3 == NULL) > > (gdb) n > > 3009ssl3_cleanup_key_block(s); > > (gdb) > > 3010if (s->s3->rbuf.buf != NULL) > > (gdb) > > 3011ssl3_release_read_buffer(s); > > (gdb) > > 3012if (s->s3->wbuf.buf != NULL) > > (gdb) > > 3013ssl3_release_write_buffer(s); > > (gdb) > > 3014if (s->s3->rrec.comp != NULL) > > (gdb) > > 3017if (s->s3->tmp.dh != NULL) > > (gdb) > > 3021if (s->s3->tmp.ecdh != NULL) > > (gdb) > > 3025if (s->s3->tmp.ca_names != NULL) > > (gdb) > > 3027if (s->s3->handshake_buffer) { > > (gdb) > > 3030if (s->s3->handshake_dgst) > > (gdb) > > 3031ssl3_free_digest_list(s); > > (gdb) > > 3033if (s->s3->alpn_selected) > > (gdb) > > 3038SSL_SRP_CTX_free(s); > > (gdb) > > > > 3042OPENSSL_cleanse(s->s3, sizeof *(s->s3)); > > (gdb) n > > 3047OPENSSL_free(s->s3); > > (gdb) p *(s->s3) > > $1 = {flags = 1447178013, delay_buf_pop_ret = -1332182677, read_sequence > = "\311\343\376\032\067Ut\224", read_mac_secret_size = -557140059, > > read_mac_secret = "\363\t > 8Qk\206\242\277\335\377\034-?Rf{\221\253\300\337\353\016*Ge\204\244\265\307\332\363\003\031\060Ha{\226\262\317\355\f,=Obv\213\241\270\320\356\003\036:Wu\224\264\305\327\356\374", > write_sequence = "\023)@Xq\213\246", , > write_mac_secret_size = 1008532959, > > write_mac_secret = > "M_r\206\243\261\310\340\371\023.Jg\205\260\304\325\347\373\016#9Ph\201\233\264\322\357\r,L]o\202\226\253\301\330\363\t#>Zw\225\264\324\345\374\n\036\063I`x\221\253\306\342\377\035<\\", > server_random = > "m\177\222\246\273\321\350\000\031\063Nj\207\245\304\344\365\a\032.CYp\210\241\273\326\362\017-Ll", > > client_random = > "}\217\242\266\313\341\370\020)C^z\227\265\324\364\005\027*>Si\200\230\261\313\346\002\037=\\|", > need_empty_fragments = -961372275, > > empty_fragment_done = 537457115, init_extra = -1972481223, rbuf = {buf > = 0x4e4c5a7 , len = 1312433941, offset > = -1466926749, > > left = 318168001}, wbuf = {buf = 0x8c6c4d2f of bounds>, len = 3603083165, offset = 806879723, left = -1702993079}, > rrec = { > > type = 351589815, length = 1581922085, off = 3097528691, data = > 0x2206ebd1 , > > input = 0x9c7c5d3f , comp = > 0xe6d2bfad , epoch = 1076367867, > > seq_num = "Ys\216\252\307\345\004$"}, wrec = {type = 1851410229, > length = 3367016835, off = 840367073, data = 0xac8c6d4f 0xac8c6d4f out of bounds>, > > input = 0xf6e2cfbd , comp = > 0x5038210b , epoch = 3130950505, > > seq_num = "\327\365\024\064EWj~"}, alert_fragment = "\223\251", > alert_fragment_len = 1109789681, handshake_fragment = "_}\234\274", > > handshake_fragment_len = 116580301, wnum = 1615343899, wpend_tot = > -894528647, wpend_type = 1143211495, wpend_ret = -1904580779, > > wpend_buf = 0xe8d0b9a3 , > handshake_buffer = 0x52361b01, handshake_dgst = 0xccac8d6f, > change_cipher_spec = 369291229, > > warn_alert = 1884832043, fatal_alert = -625040503, alert_dispatch = > 1412699639, send_alert = "ew", renegotiate = -119486029, > total_renegotiations = 1648765713, > > num_renegotiations = -591618689, in_read_app_data = 638779373, > client_opaque_prf_input = 0x8068513b, client_opaque_prf_input_len = > 3939414937, > > server_opaque_prf_input = 0x64442507, server_opaque_prf_input_len = > 2929362805, tmp = { > > cert_verify_md = > "\303\331\363\b!;Vr\217\255\314\354\375\017\"6Kax\220\251\303\336\362\029\065Tt\205\227\252\279\323\351\000\030\061Kf\202\237\263\336\321\r\037\062F[q\210\240\271\323\346\n'Ed\204\225\247\281\316\323\371\020(A[v\222\257\314\354\f\035/BVk\201\230\270\212\343\373\032\067Ut\224\248\267\312\336\363\t > 8Qk\206\242\277\335\377\034-?Rf{\221\253\300\337\353\016*Ge\204\244\265\307\332", > , > > finish_md = >
Re: [openssl-users] glibc detected *** xxx: double free or corruption (!prev): 0x097b8750
Hi Mike I have integrated openSSL version 102d. While running secure FTP connection, I have encountered double free or corruption issue. The TLS negotiation is successful and file is also getting transferred to partner machine. At the end while freeing all the memory, file transfer is ended with “double free or corruption issue”. I have tried almost all the patch available in internet. Please let me know if you any solution. Machine: Linux x86_64 Please find the GDB output below, Breakpoint 1, ssl3_free (s=0x8736430) at /102d/s/s3_lib.c:2995 2995if (s == NULL || s->s3 == NULL) (gdb) n 3009ssl3_cleanup_key_block(s); (gdb) 3010if (s->s3->rbuf.buf != NULL) (gdb) 3011ssl3_release_read_buffer(s); (gdb) 3012if (s->s3->wbuf.buf != NULL) (gdb) 3013ssl3_release_write_buffer(s); (gdb) 3014if (s->s3->rrec.comp != NULL) (gdb) 3017if (s->s3->tmp.dh != NULL) (gdb) 3021if (s->s3->tmp.ecdh != NULL) (gdb) 3025if (s->s3->tmp.ca_names != NULL) (gdb) 3027if (s->s3->handshake_buffer) { (gdb) 3030if (s->s3->handshake_dgst) (gdb) 3031ssl3_free_digest_list(s); (gdb) 3033if (s->s3->alpn_selected) (gdb) 3038SSL_SRP_CTX_free(s); (gdb) 3042OPENSSL_cleanse(s->s3, sizeof *(s->s3)); (gdb) n 3047OPENSSL_free(s->s3); (gdb) p *(s->s3) $1 = {flags = 1447178013, delay_buf_pop_ret = -1332182677, read_sequence = "\311\343\376\032\067Ut\224", read_mac_secret_size = -557140059, read_mac_secret = "\363\t 8Qk\206\242\277\335\377\034-?Rf{\221\253\300\337\353\016*Ge\204\244\265\307\332\363\003\031\060Ha{\226\262\317\355\f,=Obv\213\241\270\320\356\003\036:Wu\224\264\305\327\356\374", write_sequence = "\023)@Xq\213\246", , write_mac_secret_size = 1008532959, write_mac_secret = "M_r\206\243\261\310\340\371\023.Jg\205\260\304\325\347\373\016#9Ph\201\233\264\322\357\r,L]o\202\226\253\301\330\363\t#>Zw\225\264\324\345\374\n\036\063I`x\221\253\306\342\377\035<\\", server_random = "m\177\222\246\273\321\350\000\031\063Nj\207\245\304\344\365\a\032.CYp\210\241\273\326\362\017-Ll", client_random = "}\217\242\266\313\341\370\020)C^z\227\265\324\364\005\027*>Si\200\230\261\313\346\002\037=\\|", need_empty_fragments = -961372275, empty_fragment_done = 537457115, init_extra = -1972481223, rbuf = {buf = 0x4e4c5a7 , len = 1312433941, offset = -1466926749, left = 318168001}, wbuf = {buf = 0x8c6c4d2f , len = 3603083165, offset = 806879723, left = -1702993079}, rrec = { type = 351589815, length = 1581922085, off = 3097528691, data = 0x2206ebd1 , input = 0x9c7c5d3f , comp = 0xe6d2bfad , epoch = 1076367867, seq_num = "Ys\216\252\307\345\004$"}, wrec = {type = 1851410229, length = 3367016835, off = 840367073, data = 0xac8c6d4f , input = 0xf6e2cfbd , comp = 0x5038210b , epoch = 3130950505, seq_num = "\327\365\024\064EWj~"}, alert_fragment = "\223\251", alert_fragment_len = 1109789681, handshake_fragment = "_}\234\274", handshake_fragment_len = 116580301, wnum = 1615343899, wpend_tot = -894528647, wpend_type = 1143211495, wpend_ret = -1904580779, wpend_buf = 0xe8d0b9a3 , handshake_buffer = 0x52361b01, handshake_dgst = 0xccac8d6f, change_cipher_spec = 369291229, warn_alert = 1884832043, fatal_alert = -625040503, alert_dispatch = 1412699639, send_alert = "ew", renegotiate = -119486029, total_renegotiations = 1648765713, num_renegotiations = -591618689, in_read_app_data = 638779373, client_opaque_prf_input = 0x8068513b, client_opaque_prf_input_len = 3939414937, server_opaque_prf_input = 0x64442507, server_opaque_prf_input_len = 2929362805, tmp = { cert_verify_md = "\303\331\363\b!;Vr\217\255\314\354\375\017\"6Kax\220\251\303\336\362\029\065Tt\205\227\252\279\323\351\000\030\061Kf\202\237\263\336\321\r\037\062F[q\210\240\271\323\346\n'Ed\204\225\247\281\316\323\371\020(A[v\222\257\314\354\f\035/BVk\201\230\270\212\343\373\032\067Ut\224\248\267\312\336\363\t 8Qk\206\242\277\335\377\034-?Rf{\221\253\300\337\353\016*Ge\204\244\265\307\332", , finish_md = "\003\031\060Ha{\226\262\319\356\f,=Obv\213\241\270\478\351\003\036:Wu\224\268\365\327\352\376\023)@Xq\213\246\302\347\365\034Zw\225\264\327\345\364\n\036\063I`x\221\253\306\342\377\035<\\m\177\222\246\273\328\350\000\031\063Nj\207\245\304\344\365\a\032.", finish_md_len = -2005903037, peer_finish_md = "\241\273\326\366\017-Ll}\217\242\266\314\341\370\020)C^z\227\265\324\366\005\027*>Si\200\230\261\363\346\002\037=\\|\215\237\262\363\333\362\b 9Sn\212\247\305\344\004\025':Ncy\220\250\301\333\366\022/Ml\214\235\257\302\326\353\001\030\060Ic~\232\267\325\364\024%7J^s\211\240\270\321\353\006\"?]|\234\255\277\325\346\373\021(@Ys\216\252\307\345\004$5GZn\203\242\260", , peer_finish_md_len = 840367073, message_size = 2894884175, message_type = -152907843,
Re: [openssl-users] glibc detected *** xxx: double free or corruption (!prev): 0x097b8750
You'll need to rebuild your application and openssl with debugging symbols and no optimization, then run it inside gdb to produce a more useful stack trace. Since you don't include any context or source code snippets it isn't really possible to help. Can you produce a reduced test case with source code which reproduces the bug? As long as politics is the shadow cast on society by big business, the attenuation of the shadow will not change the substance. John Dewey: The Later Works, 1925-1953; Volume 6, pp. 163 On Feb 24, 2016 11:33 PM, "Vikas TM"wrote: > Hi, > > While running my application with openSSL 102d and I encountered double > free error or corruption. > > As per few threads suggestion, I have changed getpid() with pthread_self() > in CRYPTO_thread_id(). Still the result is same. > > Please let me know if any fix available to this issue. > > *** glibc detected *** xxx: double free or corruption (!prev): 0x097b8750 > *** > > === Backtrace: = > > /lib/libc.so.6[0x1768b6] > > /lib/libc.so.6(cfree+0x90)[0x179e00] > > xxx(CRYPTO_free+0x3a)[0x81b89be] > > xxx(ssl_cert_free+0x13f)[0x826fa23] > > xxx(SSL_free+0x14d)[0x81d7e08] > > Thanks & Regards, > Vikas > > -- > openssl-users mailing list > To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-users > > -- openssl-users mailing list To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-users
[openssl-users] glibc detected *** xxx: double free or corruption (!prev): 0x097b8750
Hi, While running my application with openSSL 102d and I encountered double free error or corruption. As per few threads suggestion, I have changed getpid() with pthread_self() in CRYPTO_thread_id(). Still the result is same. Please let me know if any fix available to this issue. *** glibc detected *** xxx: double free or corruption (!prev): 0x097b8750 *** === Backtrace: = /lib/libc.so.6[0x1768b6] /lib/libc.so.6(cfree+0x90)[0x179e00] xxx(CRYPTO_free+0x3a)[0x81b89be] xxx(ssl_cert_free+0x13f)[0x826fa23] xxx(SSL_free+0x14d)[0x81d7e08] Thanks & Regards, Vikas -- openssl-users mailing list To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-users