Skip site navigation (1)Skip section navigation (2)
Date:      Tue, 05 Jul 2016 22:25:04 +0000
From:      bugzilla-noreply@freebsd.org
To:        freebsd-ports-bugs@FreeBSD.org
Subject:   [Bug 210859] security/openssl: Enabled ASM flag lead to shell environment corruption
Message-ID:  <bug-210859-13@https.bugs.freebsd.org/bugzilla/>

next in thread | raw e-mail | index | archive | help
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=3D210859

            Bug ID: 210859
           Summary: security/openssl: Enabled ASM flag lead to shell
                    environment corruption
           Product: Ports & Packages
           Version: Latest
          Hardware: amd64
                OS: Any
            Status: New
          Severity: Affects Only Me
          Priority: ---
         Component: Individual Port(s)
          Assignee: dinoex@FreeBSD.org
          Reporter: iron@mail.ua
          Assignee: dinoex@FreeBSD.org
             Flags: maintainer-feedback?(dinoex@FreeBSD.org)

Hello,

I use FreeBSD 10-STABLE. When security/openssl built with ASM flag enabled,=
 it
lead to random segfaults in each application which linked with libcrypto.so=
 or
libssl.so. At least dovecot2, exim, uwsgi, php5-openssl.

For example "git" which linked with /usr/local/lib/libcrypto.so.8:

openssl-1.0.2_14 with ASM flag enabled:
# git pull
git-remote-https: environment corrupt; missing value for SUDO_GID
error: Could not set GIT_DIR to '.git'
git-remote-https: environment corrupt; missing value for SUDO_GID
Already up-to-date.

openssl-1.0.2_14 without ASM flag enabled:
# git pull
Already up-to-date.

uwsgi won't start with the similar error.=20
exim segfaults when starting child process of mail delivery.

Thank you!

--=20
You are receiving this mail because:
You are the assignee for the bug.=



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?bug-210859-13>