https://bugzilla.novell.com/show_bug.cgi?id=849377
https://bugzilla.novell.com/show_bug.cgi?id=849377#c8
--- Comment #8 from Marcus Meissner 2013-11-08 14:33:57 UTC ---
So it probably is in our compression selection patch :/
Index: openssl-1.0.1e/ssl/ssl_ciph.c
===================================================================
--- openssl-1.0.1e.orig/ssl/ssl_ciph.c
+++ openssl-1.0.1e/ssl/ssl_ciph.c
@@ -455,7 +455,11 @@ static void load_builtin_compressions(vo
MemCheck_off();
ssl_comp_methods=sk_SSL_COMP_new(sk_comp_cmp);
- if (ssl_comp_methods != NULL)
+
+ if( getenv("OPENSSL_NO_DEFAULT_ZLIB") == NULL)
+ setenv("OPENSSL_NO_DEFAULT_ZLIB", "yes", 1);
+
+ if (ssl_comp_methods != NULL && strncmp(
getenv("OPENSSL_NO_DEFAULT_ZLIB"), "no", 2) == 0)
{
comp=(SSL_COMP
*)OPENSSL_malloc(sizeof(SSL_COMP));
if (comp != NULL)
either setenv gets a NULL ptr acess, or getenv() returns NULL on the second
call.
can you install the debuginfos from:
http://download.opensuse.org/debug/update/12.2/
so:
libopenssl1_0_0-debuginfo , sudo-debuginfo, glibc-debuginfo
and get another backtrace?
--
Configure bugmail: https://bugzilla.novell.com/userprefs.cgi?tab=email
------- You are receiving this mail because: -------
You are on the CC list for the bug.