[Bug 272835] kinit(8) segmentation fault with openssl-3.0 in CURRENT
- Reply: bugzilla-noreply_a_freebsd.org: "[Bug 272835] kinit(8) segmentation fault with openssl-3.0 in CURRENT"
- Reply: bugzilla-noreply_a_freebsd.org: "[Bug 272835] kinit(8) segmentation fault with openssl-3.0 in CURRENT"
- Reply: bugzilla-noreply_a_freebsd.org: "[Bug 272835] kinit(8) segmentation fault with openssl-3.0 in CURRENT"
- Reply: bugzilla-noreply_a_freebsd.org: "[Bug 272835] kinit(8) segmentation fault with openssl-3.0 in CURRENT"
- Reply: bugzilla-noreply_a_freebsd.org: "[Bug 272835] kinit(8) segmentation fault with openssl-3.0 in CURRENT"
- Reply: bugzilla-noreply_a_freebsd.org: "[Bug 272835] kinit(8) segmentation fault with openssl-3.0 in CURRENT"
- Go to: [ bottom of page ] [ top of archives ] [ this month ]
Date: Mon, 31 Jul 2023 07:49:21 UTC
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=272835 Bug ID: 272835 Summary: kinit(8) segmentation fault with openssl-3.0 in CURRENT Product: Base System Version: CURRENT Hardware: amd64 OS: Any Status: New Severity: Affects Some People Priority: --- Component: bin Assignee: bugs@FreeBSD.org Reporter: Joerg.Pulz@frm2.tum.de kinit(8) segfaults after my recent upgrade to CURRENT with OpenSSL-3.0 - FreeBSD 14.0-CURRENT amd64 1400093 #0 main-n264294-09e5d91069d1 Looking at the core dump it happens here: frame #1: 0x000032ea670715c8 libkrb5.so.11`ARCFOUR_string_to_key(context=0x000051189c638000, enctype=KRB5_ENCTYPE_ARCFOUR_HMAC_MD5, password=<unavailable>, salt=krb5_salt @ 0x000032ea64595c30, opaque=<unavailable>, key=0x000051189c6b7fc0) at salt-arcfour.c:84:2 Looking at crypto/heimdal/lib/krb5/salt-arcfour.c it happens when calling openssl's EVP_DigestUpdate(): /* LE encoding */ for (i = 0; i < len; i++) { unsigned char p; p = (s[i] & 0xff); -> EVP_DigestUpdate (m, &p, 1); p = (s[i] >> 8) & 0xff; EVP_DigestUpdate (m, &p, 1); } Running from lldb(1) it seems that I end in crypto/openssl/crypto/evp/digest.c in EVP_DigestUpdate() in line 412: 410 /* Code below to be removed when legacy support is dropped. */ 411 legacy: 412 return ctx->update(ctx, data, count); Here ctx->update() is causing the segmentation fault. I'm not an openssl expert and have no clue what ctx->update should be and where it is coming from, so I'm at the end of the road here. -- You are receiving this mail because: You are the assignee for the bug.