https://issues.apache.org/bugzilla/show_bug.cgi?id=56919

--- Comment #7 from Alex Bligh <[email protected]> ---
Created attachment 31977
  --> https://issues.apache.org/bugzilla/attachment.cgi?id=31977&action=edit
Demonstration patch to work around the bug

A minimum patch for this bug is attached. This swaps the SEGV for a memory
leak, on the basis that a memory leak is probably less bad. I am neither sure
this is suitable or a complete solution.

The patch works as follows: the problem is that the address of certinfo_free is
being stored somewhere deep in openssl. When modssl is dlclosed()'d and
dlopen()'d again, the address of certinfo_free may change. openssl then calls
the free function at its old location, and SEGV / illegal instruction ensues.
By not providing a free function for the extra data, we avoid openssl calling
anything.

This appears to avoid the test case crashing, which at least means the problem
is correctly identified.

-- 
You are receiving this mail because:
You are the assignee for the bug.

---------------------------------------------------------------------
To unsubscribe, e-mail: [email protected]
For additional commands, e-mail: [email protected]

Reply via email to