[Bug 210859] security/openssl: Enabled ASM flag lead to shell environment corruption
bugzilla-noreply at freebsd.org
bugzilla-noreply at freebsd.org
Tue Jul 5 22:25:04 UTC 2016
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=210859
Bug ID: 210859
Summary: security/openssl: Enabled ASM flag lead to shell
environment corruption
Product: Ports & Packages
Version: Latest
Hardware: amd64
OS: Any
Status: New
Severity: Affects Only Me
Priority: ---
Component: Individual Port(s)
Assignee: dinoex at FreeBSD.org
Reporter: iron at mail.ua
Assignee: dinoex at FreeBSD.org
Flags: maintainer-feedback?(dinoex at FreeBSD.org)
Hello,
I use FreeBSD 10-STABLE. When security/openssl built with ASM flag enabled, it
lead to random segfaults in each application which linked with libcrypto.so or
libssl.so. At least dovecot2, exim, uwsgi, php5-openssl.
For example "git" which linked with /usr/local/lib/libcrypto.so.8:
openssl-1.0.2_14 with ASM flag enabled:
# git pull
git-remote-https: environment corrupt; missing value for SUDO_GID
error: Could not set GIT_DIR to '.git'
git-remote-https: environment corrupt; missing value for SUDO_GID
Already up-to-date.
openssl-1.0.2_14 without ASM flag enabled:
# git pull
Already up-to-date.
uwsgi won't start with the similar error.
exim segfaults when starting child process of mail delivery.
Thank you!
--
You are receiving this mail because:
You are the assignee for the bug.
More information about the freebsd-ports-bugs
mailing list