[Bug 210859] security/openssl: Enabled ASM flag lead to shell environment corruption

bugzilla-noreply at freebsd.org bugzilla-noreply at freebsd.org
Tue Jul 5 22:25:04 UTC 2016


https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=210859

            Bug ID: 210859
           Summary: security/openssl: Enabled ASM flag lead to shell
                    environment corruption
           Product: Ports & Packages
           Version: Latest
          Hardware: amd64
                OS: Any
            Status: New
          Severity: Affects Only Me
          Priority: ---
         Component: Individual Port(s)
          Assignee: dinoex at FreeBSD.org
          Reporter: iron at mail.ua
          Assignee: dinoex at FreeBSD.org
             Flags: maintainer-feedback?(dinoex at FreeBSD.org)

Hello,

I use FreeBSD 10-STABLE. When security/openssl built with ASM flag enabled, it
lead to random segfaults in each application which linked with libcrypto.so or
libssl.so. At least dovecot2, exim, uwsgi, php5-openssl.

For example "git" which linked with /usr/local/lib/libcrypto.so.8:

openssl-1.0.2_14 with ASM flag enabled:
# git pull
git-remote-https: environment corrupt; missing value for SUDO_GID
error: Could not set GIT_DIR to '.git'
git-remote-https: environment corrupt; missing value for SUDO_GID
Already up-to-date.

openssl-1.0.2_14 without ASM flag enabled:
# git pull
Already up-to-date.

uwsgi won't start with the similar error. 
exim segfaults when starting child process of mail delivery.

Thank you!

-- 
You are receiving this mail because:
You are the assignee for the bug.


More information about the freebsd-ports-bugs mailing list