[Pkg-openssl-devel] Bug#243489: marked as done (openssl: "ca"
segfaults )
Debian Bug Tracking System
owner at bugs.debian.org
Thu Sep 22 13:34:01 UTC 2005
Your message dated Thu, 22 Sep 2005 14:36:36 +0200
with message-id <4332A554.5050804 at uni-mainz.de>
and subject line Bug#243489: openssl: "ca" segfaults
has caused the attached Bug report to be marked as done.
This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.
(NB: If you are a system administrator and have no idea what I am
talking about this indicates a serious mail system misconfiguration
somewhere. Please contact me immediately.)
Debian bug tracking system administrator
(administrator, Debian Bugs database)
--------------------------------------
Received: (at submit) by bugs.debian.org; 13 Apr 2004 11:08:37 +0000
>From nowick_c at epita.fr Tue Apr 13 04:08:37 2004
Return-path: <nowick_c at epita.fr>
Received: from deliver.epitech.net [163.5.0.25]
by spohr.debian.org with smtp (Exim 3.35 1 (Debian))
id 1BDLmP-0004jm-00; Tue, 13 Apr 2004 04:08:37 -0700
Received: from epita.fr ([10.42.1.60])
by deliver.epitech.net (SAVSMTP 3.1.2.35) with SMTP id M2004041313044429375
for <submit at bugs.debian.org>; Tue, 13 Apr 2004 13:04:44 +0200
Received: from tty (tty.epita.fr [10.42.22.31])
by epita.fr id i3DB83I04355 for submit at bugs.debian.org
EPITA Paris France Tue, 13 Apr 2004 13:08:03 +0200 (CEST)
Date: Tue, 13 Apr 2004 13:08:04 +0200
From: christophe nowicki <nowick_c at epita.fr>
To: submit at bugs.debian.org
Subject: openssl: "ca" segfaults
Message-ID: <20040413110804.GA11404 at tty.epita.fr>
Mime-Version: 1.0
Content-Type: multipart/mixed; boundary="J2SCkAp4GZ/dPZZf"
Content-Disposition: inline
User-Agent: Mutt/1.4i
Delivered-To: submit at bugs.debian.org
X-Spam-Checker-Version: SpamAssassin 2.60-bugs.debian.org_2004_03_25
(1.212-2003-09-23-exp) on spohr.debian.org
X-Spam-Status: No, hits=-7.0 required=4.0 tests=BAYES_00,HAS_PACKAGE
autolearn=no version=2.60-bugs.debian.org_2004_03_25
X-Spam-Level:
X-CrossAssassin-Score: 1
--J2SCkAp4GZ/dPZZf
Content-Type: text/plain; charset=us-ascii
Content-Disposition: inline
Package: openssl
Version: 0.9.7d-1
Severity: normal
Tags: patch
Hi Christoph,
Using openssl in interactive mode with the following
command generate a segfault :
OpenSSL> ca
Using configuration from /usr/lib/ssl/openssl.cnf
Error opening CA private key ./demoCA/private/cakey.pem
1340:error:0E06D06C:configuration file routines:NCONF_get_string:no
value:conf_l
ib.c:329:group=CA_default name=unique_subject
1340:error:02001002:system library:fopen:No such file or
directory:bss_file.c:27
6:fopen('./demoCA/private/cakey.pem','r')
1340:error:20074002:BIO routines:FILE_CTRL:system lib:bss_file.c:278:
unable to load CA private key
Program received signal SIGSEGV, Segmentation fault.
0x0807b56a in free_index ()
Backtrace information :
Program received signal SIGSEGV, Segmentation fault.
0x0807b56a in free_index ()
(gdb) bt
#0 0x0807b56a in free_index ()
You can fix this segfault with this small patch :
diff -dur openssl-0.9.7d/apps/ca.c openssl-0.9.7d-fixed/apps/ca.c
--- openssl-0.9.7d/apps/ca.c 2004-03-08 14:07:07.000000000 +0100
+++ openssl-0.9.7d-fixed/apps/ca.c 2004-04-13 12:35:31.000000000 +0200
@@ -1503,7 +1503,8 @@
if (free_key && key)
OPENSSL_free(key);
BN_free(serial);
- free_index(db);
+ if (db)
+ free_index(db);
EVP_PKEY_free(pkey);
X509_free(x509);
X509_CRL_free(crl);
Thanks
PJ : openssl-0.9.7d.patch
-- System Information:
Debian Release: testing/unstable
APT prefers testing
APT policy: (500, 'testing')
Architecture: i386 (i686)
Kernel: Linux 2.4.24-1-k7
Locale: LANG=C, LC_CTYPE=C
Versions of packages openssl depends on:
ii libc6 2.3.2.ds1-11 GNU C Library: Shared libraries an
ii libssl0.9.7 0.9.7d-1 SSL shared libraries
ii perl 5.8.3-3 Larry Wall's Practical Extraction
-- no debconf information
--
Meuuuhh elle fait la vache :)) _(__)_
Nowicki Christophe '-e e -'__,--.__)
17, rue Saint Exupery (o_o) )
77500 Chelles \. /___. |
Etudiant EPITECH Promo 2006 ||| _)/_)/
http://etud.epita.fr/~nowick_c/nowick_c.asc //_(/_(/_(
--J2SCkAp4GZ/dPZZf
Content-Type: text/plain; charset=us-ascii
Content-Disposition: attachment; filename="openssl-0.9.7d.patch"
diff -dur openssl-0.9.7d/apps/ca.c openssl-0.9.7d-fixed/apps/ca.c
--- openssl-0.9.7d/apps/ca.c 2004-03-08 14:07:07.000000000 +0100
+++ openssl-0.9.7d-fixed/apps/ca.c 2004-04-13 12:35:31.000000000 +0200
@@ -1503,7 +1503,8 @@
if (free_key && key)
OPENSSL_free(key);
BN_free(serial);
- free_index(db);
+ if (db)
+ free_index(db);
EVP_PKEY_free(pkey);
X509_free(x509);
X509_CRL_free(crl);
--J2SCkAp4GZ/dPZZf--
---------------------------------------
Received: (at 243489-done) by bugs.debian.org; 22 Sep 2005 12:37:49 +0000
>From martin at uni-mainz.de Thu Sep 22 05:37:49 2005
Return-path: <martin at uni-mainz.de>
Received: from mailgate1.verwaltung.uni-mainz.de (patty.verwaltung.uni-mainz.de) [134.93.144.165]
by spohr.debian.org with esmtp (Exim 3.36 1 (Debian))
id 1EIQKi-00031o-00; Thu, 22 Sep 2005 05:37:49 -0700
Received: from charlie.verwaltung.uni-mainz.de (root at charlie.verwaltung.uni-mainz.de [134.93.226.11])
by patty.verwaltung.uni-mainz.de (8.13.4/8.13.4/Debian-3) with ESMTP id j8MCajVu028933
(version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NOT);
Thu, 22 Sep 2005 14:36:45 +0200
Received: from [134.93.226.8] (woodstock.verwaltung.uni-mainz.de [134.93.226.8])
(authenticated bits=0)
by charlie.verwaltung.uni-mainz.de (8.13.4/8.13.4/Debian-3) with ESMTP id j8MCaihM027532
(version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NOT);
Thu, 22 Sep 2005 14:36:44 +0200
Message-ID: <4332A554.5050804 at uni-mainz.de>
Date: Thu, 22 Sep 2005 14:36:36 +0200
From: Christoph Martin <martin at uni-mainz.de>
User-Agent: Mozilla/5.0 (X11; U; Linux i686; de-DE; rv:1.7.6) Gecko/20050817 Thunderbird/1.0.2 Mnenhy/0.7.2.0
X-Accept-Language: de-DE, de, en-us, en
MIME-Version: 1.0
To: christophe nowicki <nowick_c at epita.fr>, 243489-done at bugs.debian.org
Subject: Re: Bug#243489: openssl: "ca" segfaults
References: <20040413110804.GA11404 at tty.epita.fr>
In-Reply-To: <20040413110804.GA11404 at tty.epita.fr>
X-Enigmail-Version: 0.91.0.0
Content-Type: multipart/signed; micalg=pgp-sha1;
protocol="application/pgp-signature";
boundary="------------enig4EDE1FEF02D209DD8C574153"
X-Virus-Scanned-From: mailgate1.verwaltung.uni-mainz.de
X-Spam-Scanned-From: mailgate1.verwaltung.uni-mainz.de
X-Scanned-By: MIMEDefang 2.51 on 134.93.226.4
Delivered-To: 243489-done at bugs.debian.org
X-Spam-Checker-Version: SpamAssassin 2.60-bugs.debian.org_2005_01_02
(1.212-2003-09-23-exp) on spohr.debian.org
X-Spam-Level:
X-Spam-Status: No, hits=-6.0 required=4.0 tests=BAYES_00,HAS_BUG_NUMBER
autolearn=no version=2.60-bugs.debian.org_2005_01_02
This is an OpenPGP/MIME signed message (RFC 2440 and 3156)
--------------enig4EDE1FEF02D209DD8C574153
Content-Type: text/plain; charset=ISO-8859-15
Content-Transfer-Encoding: 7bit
The problem seems to be fixed somewhere else from upstream. It is not
present in the current versions.
--
============================================================================
Christoph Martin, Leiter der EDV der Verwaltung, Uni-Mainz, Germany
Internet-Mail: Christoph.Martin at Uni-Mainz.DE
Telefon: +49-6131-3926337
Fax: +49-6131-3922856
--------------enig4EDE1FEF02D209DD8C574153
Content-Type: application/pgp-signature; name="signature.asc"
Content-Description: OpenPGP digital signature
Content-Disposition: attachment; filename="signature.asc"
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.1 (GNU/Linux)
Comment: Using GnuPG with Thunderbird - http://enigmail.mozdev.org
iD8DBQFDMqVcgeVih7XOVJcRAg3YAJ9i2fPEWUSzBLDpYdBxqClIdM44XQCfVSxy
Eiu5fZ3dapBybfb77FBaIB0=
=bq6m
-----END PGP SIGNATURE-----
--------------enig4EDE1FEF02D209DD8C574153--
More information about the Pkg-openssl-devel
mailing list