httpd-bugs mailing list archives

Site index · List index
Message view « Date » · « Thread »
Top « Date » · « Thread »
From bugzi...@apache.org
Subject DO NOT REPLY [Bug 30134] - Segmentation fault in char_buffer_read when reverse proxying SSL
Date Wed, 11 Aug 2004 13:30:30 GMT
DO NOT REPLY TO THIS EMAIL, BUT PLEASE POST YOUR BUG 
RELATED COMMENTS THROUGH THE WEB INTERFACE AVAILABLE AT
<http://issues.apache.org/bugzilla/show_bug.cgi?id=30134>.
ANY REPLY MADE TO THIS MESSAGE WILL NOT BE COLLECTED AND 
INSERTED IN THE BUG DATABASE.

http://issues.apache.org/bugzilla/show_bug.cgi?id=30134

Segmentation fault in char_buffer_read when reverse proxying SSL





------- Additional Comments From jorton@redhat.com  2004-08-11 13:30 -------
This backtrace is a little strange:

#1  0xfeafef54 in char_buffer_read (buffer=0x1649ac,
    in=0x2000 <Address 0x2000 out of bounds>, inl=8192) at ssl_engine_io.c:348

which means either stack corruption by memcpy or in got passed in as a pointer
to address 8192 somehow.

Can you, from gdb against a core dump, check:

up 2 (into ssl_io_input_read)
print *inctx
info locals
print buf
print len

---------------------------------------------------------------------
To unsubscribe, e-mail: bugs-unsubscribe@httpd.apache.org
For additional commands, e-mail: bugs-help@httpd.apache.org


Mime
View raw message