https://issues.apache.org/bugzilla/show_bug.cgi?id=56919
--- Comment #7 from Alex Bligh <[email protected]> --- Created attachment 31977 --> https://issues.apache.org/bugzilla/attachment.cgi?id=31977&action=edit Demonstration patch to work around the bug A minimum patch for this bug is attached. This swaps the SEGV for a memory leak, on the basis that a memory leak is probably less bad. I am neither sure this is suitable or a complete solution. The patch works as follows: the problem is that the address of certinfo_free is being stored somewhere deep in openssl. When modssl is dlclosed()'d and dlopen()'d again, the address of certinfo_free may change. openssl then calls the free function at its old location, and SEGV / illegal instruction ensues. By not providing a free function for the extra data, we avoid openssl calling anything. This appears to avoid the test case crashing, which at least means the problem is correctly identified. -- You are receiving this mail because: You are the assignee for the bug. --------------------------------------------------------------------- To unsubscribe, e-mail: [email protected] For additional commands, e-mail: [email protected]
