https://issues.apache.org/bugzilla/show_bug.cgi?id=44975

           Summary: memory leak with mod_ssl and zlib compression
           Product: Apache httpd-2
           Version: 2.2.8
          Platform: PC
        OS/Version: Linux
            Status: NEW
          Severity: normal
          Priority: P2
         Component: mod_ssl
        AssignedTo: [email protected]
        ReportedBy: [EMAIL PROTECTED]


We have encountered an easily reproducible memory leak with Apache2 + mod_ssl
with zlib encryption enabled.

Reproducing the problem is as simple as running Apache-bench against a
vulnerable host:
  ab -n 10000 -c 20 -f tls1 https://vulnerable.host.example.com:443/

Vulnerable hosts seem to be (apache >= 2.2.4) + (openssl >= 0.9.8e).

Depending on how much memory is available on the server, you may need to scale
the value of -n up or down.  With 128MB in a virtual machine -n 1000 is enough
to manifest the problem.

On the client side, you will begin seeing:
  SSL handshake failed (5).
  SSL read failed - closing connection

On the server side under Linux, the kernel Out-of-memory (OOM) killer starts
reaping runaway Apache2 instances.
  Out of memory: kill process XXXX (apache2) 

This bug is being tracked in Ubuntu's bug tracker here:
  https://bugs.edge.launchpad.net/ubuntu/+source/apache2/+bug/224945

As this looks to be an issue with OpenSSL, it has been reported there as well:
  http://marc.info/?l=openssl-dev&m=121060672602371&w=2

:-Dustin


-- 
Configure bugmail: https://issues.apache.org/bugzilla/userprefs.cgi?tab=email
------- You are receiving this mail because: -------
You are the assignee for the bug.

---------------------------------------------------------------------
To unsubscribe, e-mail: [EMAIL PROTECTED]
For additional commands, e-mail: [EMAIL PROTECTED]

Reply via email to