https://bz.apache.org/bugzilla/show_bug.cgi?id=63077
--- Comment #1 from paolo <[email protected]> --- Here the stacktrace of the leak: ==10180== 3,720 (32 direct, 3,688 indirect) bytes in 2 blocks are definitely lost in loss record 207 of 247 ==10180== at 0x4C29BC3: malloc (vg_replace_malloc.c:299) ==10180== by 0x525344D: CRYPTO_zalloc (in /var/opt/openssl/lib/libcrypto.so.1.1) ==10180== by 0x516D9F3: ASN1_item_ex_new (in /var/opt/openssl/lib/libcrypto.so.1.1) ==10180== by 0x516BCF6: ASN1_item_ex_d2i (in /var/opt/openssl/lib/libcrypto.so.1.1) ==10180== by 0x516BDC3: ASN1_item_d2i (in /var/opt/openssl/lib/libcrypto.so.1.1) ==10180== by 0x5154D9C: ASN1_d2i_bio (in /var/opt/openssl/lib/libcrypto.so.1.1) ==10180== by 0x48F780: read_response (ssl_util_ocsp.c:295) ==10180== by 0x48F780: modssl_dispatch_ocsp_request (ssl_util_ocsp.c:334) ==10180== by 0x48C7C0: stapling_renew_response (ssl_util_stapling.c:504) ==10180== by 0x48C7C0: stapling_cb (ssl_util_stapling.c:802) ==10180== by 0x4E95AFF: tls_post_process_client_hello (in /var/opt/openssl/lib/libssl.so.1.1) ==10180== by 0x4E851A5: state_machine (in /var/opt/openssl/lib/libssl.so.1.1) ==10180== by 0x4E70757: SSL_do_handshake (in /var/opt/openssl/lib/libssl.so.1.1) ==10180== by 0x47EE8D: ssl_io_filter_handshake (ssl_engine_io.c:1339) -- You are receiving this mail because: You are the assignee for the bug. --------------------------------------------------------------------- To unsubscribe, e-mail: [email protected] For additional commands, e-mail: [email protected]
