You are viewing a plain text version of this content. The canonical link for it is here.
Posted to bugs@httpd.apache.org by bu...@apache.org on 2004/08/11 15:30:30 UTC

DO NOT REPLY [Bug 30134] - Segmentation fault in char_buffer_read when reverse proxying SSL

DO NOT REPLY TO THIS EMAIL, BUT PLEASE POST YOUR BUG 
RELATED COMMENTS THROUGH THE WEB INTERFACE AVAILABLE AT
<http://issues.apache.org/bugzilla/show_bug.cgi?id=30134>.
ANY REPLY MADE TO THIS MESSAGE WILL NOT BE COLLECTED AND 
INSERTED IN THE BUG DATABASE.

http://issues.apache.org/bugzilla/show_bug.cgi?id=30134

Segmentation fault in char_buffer_read when reverse proxying SSL





------- Additional Comments From jorton@redhat.com  2004-08-11 13:30 -------
This backtrace is a little strange:

#1  0xfeafef54 in char_buffer_read (buffer=0x1649ac,
    in=0x2000 <Address 0x2000 out of bounds>, inl=8192) at ssl_engine_io.c:348

which means either stack corruption by memcpy or in got passed in as a pointer
to address 8192 somehow.

Can you, from gdb against a core dump, check:

up 2 (into ssl_io_input_read)
print *inctx
info locals
print buf
print len

---------------------------------------------------------------------
To unsubscribe, e-mail: bugs-unsubscribe@httpd.apache.org
For additional commands, e-mail: bugs-help@httpd.apache.org