Segfault on OpenSSL engine initialisation when AES-NI is enabled

Bug #590639 reported by solik on 2010-06-07
This bug affects 12 people
Affects Status Importance Assigned to Milestone
Fix Released
openssl (Ubuntu)
Colin Watson
Colin Watson
Colin Watson

Bug Description

Binary package hint: apache2

Installed software:
apache2-mpm-prefork 2.2.14-5ubuntu8
php5 5.3.2-1ubuntu4.2
libapache2-mod-php5 5.3.2-1ubuntu4.2
php5-curl 5.3.2-1ubuntu4.2

Ubuntu version: Ubuntu 10.04 LTS

If php5-curl module enabled in the apache2 and access any page on this server with https:// regardless of URL and handler of this URL (php5 or simple static file), apache reset connection logging following in the error.log:

[Mon Jun 07 08:48:58 2010] [notice] Apache/2.2.14 (Ubuntu) DAV/2 SVN/1.6.6 PHP/5.3.2-1ubuntu4.2 with Suhosin-Patch mod_python/3.3.1 Python/2.6.5 mod_ssl/2.2.14 OpenSSL/0.9.8k configured -- resuming normal operations
[Mon Jun 07 08:49:10 2010] [notice] child pid 24120 exit signal Segmentation fault (11)
[Mon Jun 07 08:49:10 2010] [notice] child pid 24121 exit signal Segmentation fault (11)

This bug was appeared after upgrade from 9.10 to 10.04, nothing was changed in the configs, previous version of ubuntu working ok.

ProblemType: Bug
DistroRelease: Ubuntu 10.04
Package: apache2.2-bin 2.2.14-5ubuntu8
ProcVersionSignature: Ubuntu 2.6.32-22.35-generic
Uname: Linux 2.6.32-22-generic x86_64
Architecture: amd64
Date: Mon Jun 7 08:49:30 2010
ExecutablePath: /usr/lib/apache2/mpm-prefork/apache2
InstallationMedia: Ubuntu 9.10 "Karmic Koala" - Release amd64 (20091027)
 PATH=(custom, no user)
SourcePackage: apache2

solik (jankkhvej) wrote :
Chuck Short (zulcss) wrote :

Thank you for taking the time to report this bug and helping to make Ubuntu better. Please try to obtain a backtrace following the instructions at and upload the backtrace (as an attachment) to the bug report. This will greatly help us in tracking down your problem.

Changed in apache2 (Ubuntu):
importance: Undecided → Low
status: New → Incomplete
solik (jankkhvej) wrote :

Here is backtrace, thank you for instructions!

solik (jankkhvej) on 2010-06-09
Changed in apache2 (Ubuntu):
status: Incomplete → Confirmed
Changed in php:
status: New → Confirmed

I have the same configuration and also get the segmentation fault. I'd like just to add that the apache crashes even if any SSL page is accessed on that server, not only via php5-curl.

solik (jankkhvej) wrote :

Just checked it today after update and the bug is gone. All SSL pages works.
So, what should we do now? ;-)

solik (jankkhvej) wrote :

Miroslav Zacek: that's exactly what I've reported.

I checked it today and it is still there for me :-(

I checked the code and found that php5-curl in ext/curl/interface.c line 819 calls curl_global_init(CURL_GLOBAL_SSL). If I changed it to CURL_GLOBAL_NOTHING the apache didn't crash. So I followed this code through the libcurl to the openssl library and found out that if remove the initialisation of ENGINE_load_aesni (see debian/patches/aesni.patch line 2429) the php5 curl won't load https pages but the Apache won't segfault.

I have openssl, libssl0.9.8 and libssl-dev version 0.9.8k-7ubuntu8.

See openssl bug #2305

Greg Hanley (greg-s-hanley) wrote :

After reading through the comments on the openssl bug report ( ) the part about having a Core i7 caught my attention. I am having the same problem but only on one of my servers and not the other; both running 10.04_64 and updated to the same kernel. I have two VMware ESXi servers, one is running quad-core Xeon X5550s and the other is running hex-core Xeon X5650s (same generation as the i7s). I moved the VM that was working from the older server to the new, and when using ssl, Apache started seg faulting, having made no changes to the configuration.

Miroslav Zacek: It sounds like you have found the issue in openssl. Is there any other troubleshooting I can do to help?

Greg Hanley: it seems the bug was found and will be fixed in the next release of openssl. The reason why it is segfaulting on one machine and not the other is probably the fact that one CPU supports AES-NI and the other not. The problem is in multiple openssl initializations.

If you want to fix it before the official version comes there is a patch: Either use the patch or do the 2 small changes manually and recompile.

If you do not want to recompile, try to avoid multiple ssl initializations (e.g. in my case these were the apache mod-ssl and php5-curl), but this is not sure that it helps.

Miroslav: silly question; if the bug will be fixed in the next release of openssl, when should that release be available?

Zhang Huangbin (michaelbibby) wrote :

Any update on this issue?

Zhang Huangbin (michaelbibby) wrote :

Oops, i tested it in Ubuntu 10.04 (amd64) moment ago, seems it was fixed. at least it works well in iRedMail mail server solution, Thanks very much. :)

Fraid it's still an issue for me. Seems to resolve itself when removing php5-curl from the install.

It hasn't been fixed yet, unfortunately :-(

So here is a small howto for (k)ubuntu if you need to fix it (root privileges assumed):

1) create a directory somewhere, e.g. /usr/src/openssl, chdir there and run:
apt-get source openssl
apt-get build-dep openssl

2) edit ./openssl-0.9.8k/debian/patches/aesni.patch: on line 1956 change
+ ENGINE_add (toadd);
+ if (ENGINE_add (toadd))

3) edit /openssl-0.9.8k/crypto/engine/eng_all.c: on line 64 add this new line (as first row in the ENGINE_load_builtin_engines(void) function):

4) now build the packages (from /usr/src/openssl/openssl-0.9.8k)

5) Then you'll get new packages in /usr/src/openssl. Install libssl0.9.8_0.9.8k-7ubuntu8_*.deb and reboot (to test apache you do not need reboot, just restart apache). Be carefull on updates not to install the original version from the repositories.

In the previous howto in step 2 please note there is no semicolon at the end of the line after the change. This is correct!. On the following line 1957 there is a function call that should be executed only if ENGINE_add (toadd) returns true. If you keep the semicolon there the code will compile but segmentation errors persist.

Greg Hanley (greg-s-hanley) wrote :

Thanks for the step-by-step of patching the source Miroslav Zacek! It seems to have fixed the seg faulting I was getting.

Christie Koehler (christi3k) wrote :

Confirming that the patch posted by Miroslav Zacek works for me as well. Many thanks!

Ditto here. Now we wait for openssl to be updated :-)

solik (jankkhvej) wrote :

Thank you, Miroslav! Can't test it now, 'cause I'm switched to Mac OS X, but anyway, well done!

Jan Willem (jwknopper) wrote :

Thanks! This fixes the problem for me as well.

Wells Oliver (wells-submute) wrote :

Why is this marked as 'low' priority? Apache + SSL + curl is probably a very common combination. This is incredibly tedious..

Wells Oliver (wells-submute) wrote :

Also confirming that the patch from Miroslav worked for me. AWESOME!

Rhomboid (rhomboid) wrote :

Thanks Miroslav. That fixed it for me as well. I can't believe this hasn't been fixed.

My test environment was 32-bit so I missed this initially and then spent way too long trying to figure it out.

Colin Watson (cjwatson) on 2010-09-23
affects: apache2 (Ubuntu) → openssl (Ubuntu)
Changed in openssl (Ubuntu):
assignee: nobody → Colin Watson (cjwatson)
Changed in php:
status: Confirmed → Invalid
Colin Watson (cjwatson) on 2010-09-23
Changed in openssl (Ubuntu):
importance: Low → High
status: Confirmed → In Progress
Colin Watson (cjwatson) on 2010-09-23
Changed in openssl (Ubuntu Lucid):
status: New → In Progress
importance: Undecided → High
assignee: nobody → Colin Watson (cjwatson)
Changed in openssl (Ubuntu Maverick):
milestone: none → ubuntu-10.10
Changed in openssl (Ubuntu Lucid):
milestone: none → ubuntu-10.04.2
summary: - apache exit with signal Segmentation fault (11) on access to https:// if
- php5-curl enabled
+ Segfault on OpenSSL engine initialisation when AES-NI is enabled
Colin Watson (cjwatson) wrote :

I've uploaded a fix to lucid-proposed, waiting for approval. SRU team: apologies for the spurious diffs to Makefile and crypto/opensslconf.h - these just depend on what architecture you built the source package on, and it's difficult to make the package not do this.

Launchpad Janitor (janitor) wrote :

This bug was fixed in the package openssl - 0.9.8o-1ubuntu4

openssl (0.9.8o-1ubuntu4) maverick; urgency=low

  * Update AES-NI patch to openssl-0.9.8-aesni-modes-perlasm-win32-v4.patch
    from, fixing segfault
    on engine initialisation (LP: #590639).
 -- Colin Watson <email address hidden> Fri, 24 Sep 2010 12:20:49 +0100

Changed in openssl (Ubuntu Maverick):
status: In Progress → Fix Released

Accepted openssl into lucid-proposed, the package will build now and be available in a few hours. Please test and give feedback here. See for documentation how to enable and use -proposed. Thank you in advance!

Changed in openssl (Ubuntu Lucid):
status: In Progress → Fix Committed
tags: added: verification-needed
Greg Hanley (greg-s-hanley) wrote :

I installed the new proposed OpenSSL packages and it fixed my issues with apache2/mod_ssl/php5. The segmentation faults that I have been experiencing while using PHP extensions that also use openssl (in my case 'curl' and 'pgsql') are no longer an issue.

tags: added: verification-done
removed: verification-needed
Rhomboid (rhomboid) wrote :

Verified it's fixed for me too using the proposed update (apache2 SSL, calling PHP curl in turn to an SSL site).

Launchpad Janitor (janitor) wrote :

This bug was fixed in the package openssl - 0.9.8k-7ubuntu8.2

openssl (0.9.8k-7ubuntu8.2) lucid-proposed; urgency=low

  * Update AES-NI patch to openssl-0.9.8-aesni-modes-perlasm-win32-v4.patch
    from, fixing segfault
    on engine initialisation (LP: #590639).
 -- Colin Watson <email address hidden> Fri, 24 Sep 2010 12:25:28 +0100

Changed in openssl (Ubuntu Lucid):
status: Fix Committed → Fix Released
Changed in openssl:
status: Unknown → Confirmed
Changed in openssl:
status: Confirmed → Fix Released
To post a comment you must log in.
This report contains Public information  Edit
Everyone can see this information.

Other bug subscribers

Remote bug watches

Bug watches keep track of this bug in other bug trackers.