You are viewing a plain text version of this content. The canonical link for it is here.
Posted to bugs@httpd.apache.org by bu...@apache.org on 2019/01/15 09:30:02 UTC

[Bug 63077] Memory leak if SSLUseStapling is on

https://bz.apache.org/bugzilla/show_bug.cgi?id=63077

--- Comment #1 from paolo <pa...@adnovum.ch> ---
Here the stacktrace of the leak:

==10180== 3,720 (32 direct, 3,688 indirect) bytes in 2 blocks are definitely
lost in loss record 207 of 247
==10180==    at 0x4C29BC3: malloc (vg_replace_malloc.c:299)
==10180==    by 0x525344D: CRYPTO_zalloc (in
/var/opt/openssl/lib/libcrypto.so.1.1)
==10180==    by 0x516D9F3: ASN1_item_ex_new (in
/var/opt/openssl/lib/libcrypto.so.1.1)
==10180==    by 0x516BCF6: ASN1_item_ex_d2i (in
/var/opt/openssl/lib/libcrypto.so.1.1)
==10180==    by 0x516BDC3: ASN1_item_d2i (in
/var/opt/openssl/lib/libcrypto.so.1.1)
==10180==    by 0x5154D9C: ASN1_d2i_bio (in
/var/opt/openssl/lib/libcrypto.so.1.1)
==10180==    by 0x48F780: read_response (ssl_util_ocsp.c:295)
==10180==    by 0x48F780: modssl_dispatch_ocsp_request (ssl_util_ocsp.c:334)
==10180==    by 0x48C7C0: stapling_renew_response (ssl_util_stapling.c:504)
==10180==    by 0x48C7C0: stapling_cb (ssl_util_stapling.c:802)
==10180==    by 0x4E95AFF: tls_post_process_client_hello (in
/var/opt/openssl/lib/libssl.so.1.1)
==10180==    by 0x4E851A5: state_machine (in
/var/opt/openssl/lib/libssl.so.1.1)
==10180==    by 0x4E70757: SSL_do_handshake (in
/var/opt/openssl/lib/libssl.so.1.1)
==10180==    by 0x47EE8D: ssl_io_filter_handshake (ssl_engine_io.c:1339)

-- 
You are receiving this mail because:
You are the assignee for the bug.
---------------------------------------------------------------------
To unsubscribe, e-mail: bugs-unsubscribe@httpd.apache.org
For additional commands, e-mail: bugs-help@httpd.apache.org