Created attachment 684439 [details] Test program Description of problem: The OBJ_nid2obj() procedure (value declared as ASN1_OBJECT *) returns now a pointer to an object stored in a read-only section, causing a segfault if the caller tries to update some object field. Version-Release number of selected component (if applicable): 1.0.1c-7 How reproducible: Always in F18, not in F17 and before. Steps to Reproduce: 1. Compile and run the attachment nid2obj-bug.c: cc -g nid2obj-bug.c -lssl -lcrypto Actual results: Object address: 0xaabbccdd Segmentation fault (core dumped) Expected results: Object address: 0xddccbbaa Success Additional info: - Either OBJ_nid2obj() should be declared as const or it should work. - Calling OBJ_dup() on the result does not help because static objects are NOT duplicated :-( This bug is the cause of ocspd bug #901793 for which I'm in charge. Please fix or give me a hint. Thanks in advance.
I just noticed the test action is semantically erroneous. Although this may cause eventual real problems, this one just exhibited a real bug in ocspd. Thus this is not a blocker for me anymore and its importance is much lowered. Sorry for the noise.
I'd suggest reporting the bug upstream by simply mailing the description to rt.
Done, thanks for the advice. Closing.