Date: Tue, 05 Jul 2016 22:25:04 +0000 From: bugzilla-noreply@freebsd.org To: freebsd-ports-bugs@FreeBSD.org Subject: [Bug 210859] security/openssl: Enabled ASM flag lead to shell environment corruption Message-ID: <bug-210859-13@https.bugs.freebsd.org/bugzilla/>
next in thread | raw e-mail | index | archive | help
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=3D210859 Bug ID: 210859 Summary: security/openssl: Enabled ASM flag lead to shell environment corruption Product: Ports & Packages Version: Latest Hardware: amd64 OS: Any Status: New Severity: Affects Only Me Priority: --- Component: Individual Port(s) Assignee: dinoex@FreeBSD.org Reporter: iron@mail.ua Assignee: dinoex@FreeBSD.org Flags: maintainer-feedback?(dinoex@FreeBSD.org) Hello, I use FreeBSD 10-STABLE. When security/openssl built with ASM flag enabled,= it lead to random segfaults in each application which linked with libcrypto.so= or libssl.so. At least dovecot2, exim, uwsgi, php5-openssl. For example "git" which linked with /usr/local/lib/libcrypto.so.8: openssl-1.0.2_14 with ASM flag enabled: # git pull git-remote-https: environment corrupt; missing value for SUDO_GID error: Could not set GIT_DIR to '.git' git-remote-https: environment corrupt; missing value for SUDO_GID Already up-to-date. openssl-1.0.2_14 without ASM flag enabled: # git pull Already up-to-date. uwsgi won't start with the similar error.=20 exim segfaults when starting child process of mail delivery. Thank you! --=20 You are receiving this mail because: You are the assignee for the bug.=
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?bug-210859-13>