Bug#721702: Latest update generates SEGV in __strcmp_sse42() when parsing the enabled sites.

2013-09-16 Thread lilydjwg
Package: nginx-extras
Version: 1.4.1-3+b1
Followup-For: Bug #721702

Dear Maintainer,

The same segfault happens for me (at src/core/ngx_conf_file.c:305),
when the nginx parses an add_header instruction, the data from the pam
nginx module is incorrect: the third commands member has members data ==
0 but len != 0.

-- System Information:
Debian Release: jessie/sid
  APT prefers unstable
  APT policy: (500, 'unstable'), (1, 'experimental')
Architecture: amd64 (x86_64)

Kernel: Linux 3.2.0-4-amd64 (SMP w/1 CPU core)
Locale: LANG=zh_CN.UTF-8, LC_CTYPE=zh_CN.UTF-8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/dash

Versions of packages nginx-extras depends on:
ii  libc6   2.17-92+b1
ii  libexpat1   2.1.0-4
pn  libgd3  none
pn  libgeoip1   none
pn  liblua5.1-0 none
ii  libpam0g1.1.3-9
ii  libpcre31:8.31-2
pn  libperl5.18 none
ii  libssl1.0.0 1.0.1e-3
ii  libxml2 2.9.1+dfsg1-3
pn  libxslt1.1  none
ii  nginx-common1.4.1-3
ii  perl5.18.1-4
ii  perl-base [perlapi-5.18.1]  5.18.1-4
ii  zlib1g  1:1.2.8.dfsg-1

nginx-extras recommends no packages.

Versions of packages nginx-extras suggests:
pn  nginx-doc  none


-- 
To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#721702: Latest update generates SEGV in __strcmp_sse42() when parsing the enabled sites.

2013-09-16 Thread Christos Trochalakis

There was a bug in nginx-auth-pam module, it should be fixed with this patch:

http://anonscm.debian.org/gitweb/?p=collab-maint/nginx.git;a=commitdiff;h=bdf157e88


--
To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#721702: Latest update generates SEGV in __strcmp_sse42() when parsing the enabled sites.

2013-09-11 Thread James Cloos
Slavko the problem is incoming from the add_header directive
Slavko (at least for me)

Thanks.  I have confirmed that on my box as well.

It (using add_header to add a Via: header) used to work.

-JimC
-- 
James Cloos cl...@jhcloos.com OpenPGP: 1024D/ED7DAEA6


-- 
To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#721702: Latest update generates SEGV in __strcmp_sse42() when parsing the enabled sites.

2013-09-08 Thread Slavko
Hi,

I can confirm this error. After some investigation, the problem is
incoming from the add_header directive (at least for me). After
commenting out these directives, the nginx starts.

The error in syslog (with add_header enabled) is:

... nginx[12691]: segfault at 0 ip 7f736e41459a sp 7fff3cb8ee28
error 4 in libc-2.17.so[7f736e392000+1a2000]

The strange part is, that the expire directive (from the same module)
seems to work without problems.

The used versions:

ii  libc6:amd642.17-92+b1
ii  nginx-extras   1.4.1-3+b1

regards

-- 
Slavko
http://slavino.sk


signature.asc
Description: PGP signature


Bug#721702: Latest update generates SEGV in __strcmp_sse42() when parsing the enabled sites.

2013-09-03 Thread James Cloos
Package: nginx-extras
Version: 1.4.1-3+b1
Severity: important
File: nginx-extras

As of this update, nginx will not start due to a segv when parsing the configs.

Switching to nginx-full worked around the bug, but at the cost of loosing spdy
support.  (That module probably should be in full anyway)

The sks-recommended proxy blob seems to trigger the bug.  Eg:

location /pks {
proxy_pass http://127.0.0.1:11371;
proxy_set_header   Host $host:$server_port;
proxy_set_header   X-Forwarded-For  
$proxy_add_x_forwarded_for;
proxy_pass_header  Server;
add_header Via 1.1 keys.example.org:80 
(nginx);
proxy_ignore_client_abort  on;
}


-- System Information:
Debian Release: jessie/sid
  APT prefers unstable
  APT policy: (500, 'unstable'), (1, 'experimental')
Architecture: amd64 (x86_64)

Kernel: Linux 3.2.0-4-amd64 (SMP w/8 CPU cores)
Locale: LANG=en_US.UTF-8, LC_CTYPE=en_US.UTF-8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/dash


-- 
To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org