[Bug 1777388] [NEW] Openalpr segfault in libtesseract provided in Bionic
Public bug reported: Openalpr segfault in libtesseract provided in Bionic. There already exists a fix for this issue https://github.com/tesseract-ocr/tesseract/commit/87635c1ecb2ddba0fa1484e57680090b8bb7ac87 Test application attached. Start it with alpr -c eu --config openalpr.conf segf.jpg ** Affects: tesseract (Ubuntu) Importance: Undecided Status: New ** Attachment added: "TestApp" https://bugs.launchpad.net/bugs/1777388/+attachment/5153870/+files/alpr_segf.tar.gz ** Description changed: Openalpr segfault in libtesseract provided in Bionic. There already exists a fix for this issue https://github.com/tesseract-ocr/tesseract/commit/87635c1ecb2ddba0fa1484e57680090b8bb7ac87 - Test application attached. Start it with `alpr -c eu --config - openalpr.conf segf.jpg` + Test application attached. Start it with + alpr -c eu --config openalpr.conf segf.jpg -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1777388 Title: Openalpr segfault in libtesseract provided in Bionic To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/tesseract/+bug/1777388/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 609290] Re: overlapping memcpy in ssl_io_input_read
Great. It's a very quick bugfix for this high importance bug - after 3 months from the known solutions. -- overlapping memcpy in ssl_io_input_read https://bugs.launchpad.net/bugs/609290 You received this bug notification because you are a member of Ubuntu Server Team, which is subscribed to apache2 in ubuntu. -- Ubuntu-server-bugs mailing list Ubuntu-server-bugs@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs
[Bug 609290] Re: overlapping memcpy in ssl_io_input_read
Great. It's a very quick bugfix for this high importance bug - after 3 months from the known solutions. -- overlapping memcpy in ssl_io_input_read https://bugs.launchpad.net/bugs/609290 You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 595116] Re: ssl error reading the headers
Yes. Fixing this bug is next in queue. See https://bugs.launchpad.net/ubuntu/lucid/+source/apache2/+bug/589611 -- ssl error reading the headers https://bugs.launchpad.net/bugs/595116 You received this bug notification because you are a member of Ubuntu Server Team, which is subscribed to apache2 in ubuntu. -- Ubuntu-server-bugs mailing list Ubuntu-server-bugs@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs
[Bug 595116] Re: ssl error reading the headers
Yes. Fixing this bug is next in queue. See https://bugs.launchpad.net/ubuntu/lucid/+source/apache2/+bug/589611 -- ssl error reading the headers https://bugs.launchpad.net/bugs/595116 You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 609290] Re: overlapping memcpy in ssl_io_input_read
Thx. Fixing this bug is next in queue. See https://bugs.launchpad.net/ubuntu/lucid/+source/apache2/+bug/589611 -- overlapping memcpy in ssl_io_input_read https://bugs.launchpad.net/bugs/609290 You received this bug notification because you are a member of Ubuntu Server Team, which is subscribed to apache2 in ubuntu. -- Ubuntu-server-bugs mailing list Ubuntu-server-bugs@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs
[Bug 609290] Re: overlapping memcpy in ssl_io_input_read
Thx. Fixing this bug is next in queue. See https://bugs.launchpad.net/ubuntu/lucid/+source/apache2/+bug/589611 -- overlapping memcpy in ssl_io_input_read https://bugs.launchpad.net/bugs/609290 You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 589611] Re: [SRU] client sent HTTP/1.1 request without hostname (see RFC2616 section 14.23)
2.2.14-5ubuntu8.2 doesn't contain fix for this bug. The patch is not accepted into lucid-proposed. -- [SRU] client sent HTTP/1.1 request without hostname (see RFC2616 section 14.23) https://bugs.launchpad.net/bugs/589611 You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 609290] Re: overlapping memcpy in ssl_io_input_read
Hello. Because ubuntu team is not able to release the bugfix over 1 month, I compiled patched mod_ssl. For those who want to try it, it's at http://engy.dyndns.org/mod_ssl.so -- overlapping memcpy in ssl_io_input_read https://bugs.launchpad.net/bugs/609290 You received this bug notification because you are a member of Ubuntu Server Team, which is subscribed to apache2 in ubuntu. -- Ubuntu-server-bugs mailing list Ubuntu-server-bugs@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs
[Bug 609290] Re: overlapping memcpy in ssl_io_input_read
They used patch from https://bugs.launchpad.net/ubuntu/+source/apache2/+bug/589611 comment #35, but it contains error - comment #14 from this bug. -- overlapping memcpy in ssl_io_input_read https://bugs.launchpad.net/bugs/609290 You received this bug notification because you are a member of Ubuntu Server Team, which is subscribed to apache2 in ubuntu. -- Ubuntu-server-bugs mailing list Ubuntu-server-bugs@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs
[Bug 595116] Re: ssl error reading the headers
** Changed in: apache2 (Ubuntu) Status: Fix Released = Invalid -- ssl error reading the headers https://bugs.launchpad.net/bugs/595116 You received this bug notification because you are a member of Ubuntu Server Team, which is subscribed to apache2 in ubuntu. -- Ubuntu-server-bugs mailing list Ubuntu-server-bugs@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs
[Bug 595116] Re: ssl error reading the headers
** Changed in: apache2 (Ubuntu) Status: Invalid = Confirmed ** Changed in: apache2 (Ubuntu Lucid) Status: Fix Committed = Confirmed -- ssl error reading the headers https://bugs.launchpad.net/bugs/595116 You received this bug notification because you are a member of Ubuntu Server Team, which is subscribed to apache2 in ubuntu. -- Ubuntu-server-bugs mailing list Ubuntu-server-bugs@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs
[Bug 609290] Re: overlapping memcpy in ssl_io_input_read
Hello. Because ubuntu team is not able to release the bugfix over 1 month, I compiled patched mod_ssl. For those who want to try it, it's at http://engy.dyndns.org/mod_ssl.so -- overlapping memcpy in ssl_io_input_read https://bugs.launchpad.net/bugs/609290 You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 609290] Re: overlapping memcpy in ssl_io_input_read
They used patch from https://bugs.launchpad.net/ubuntu/+source/apache2/+bug/589611 comment #35, but it contains error - comment #14 from this bug. -- overlapping memcpy in ssl_io_input_read https://bugs.launchpad.net/bugs/609290 You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 595116] Re: ssl error reading the headers
** Changed in: apache2 (Ubuntu) Status: Fix Released = Invalid -- ssl error reading the headers https://bugs.launchpad.net/bugs/595116 You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 595116] Re: ssl error reading the headers
** Changed in: apache2 (Ubuntu) Status: Invalid = Confirmed ** Changed in: apache2 (Ubuntu Lucid) Status: Fix Committed = Confirmed -- ssl error reading the headers https://bugs.launchpad.net/bugs/595116 You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 609290] Re: overlapping memcpy in ssl_io_input_read
2.2.14-5ubuntu8.2 doesn't contain fix for this bug. -- overlapping memcpy in ssl_io_input_read https://bugs.launchpad.net/bugs/609290 You received this bug notification because you are a member of Ubuntu Server Team, which is subscribed to apache2 in ubuntu. -- Ubuntu-server-bugs mailing list Ubuntu-server-bugs@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs
[Bug 595116] Re: ssl error reading the headers
2.2.14-5ubuntu8.2 doesn't contain fix for this bug. -- ssl error reading the headers https://bugs.launchpad.net/bugs/595116 You received this bug notification because you are a member of Ubuntu Server Team, which is subscribed to apache2 in ubuntu. -- Ubuntu-server-bugs mailing list Ubuntu-server-bugs@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs
[Bug 609290] Re: overlapping memcpy in ssl_io_input_read
2.2.14-5ubuntu8.2 doesn't contain fix for this bug. -- overlapping memcpy in ssl_io_input_read https://bugs.launchpad.net/bugs/609290 You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 595116] Re: ssl error reading the headers
2.2.14-5ubuntu8.2 doesn't contain fix for this bug. -- ssl error reading the headers https://bugs.launchpad.net/bugs/595116 You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 609290] Re: overlapping memcpy in ssl_io_input_read
It's my first debdiff, so I don't know if it is correct. ** Patch added: apache.debdiff http://launchpadlibrarian.net/53045267/apache.debdiff -- overlapping memcpy in ssl_io_input_read https://bugs.launchpad.net/bugs/609290 You received this bug notification because you are a member of Ubuntu Server Team, which is subscribed to apache2 in ubuntu. -- Ubuntu-server-bugs mailing list Ubuntu-server-bugs@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs
[Bug 609290] Re: overlapping memcpy in ssl_io_input_read
It's my first debdiff, so I don't know if it is correct. ** Patch added: apache.debdiff http://launchpadlibrarian.net/53045267/apache.debdiff -- overlapping memcpy in ssl_io_input_read https://bugs.launchpad.net/bugs/609290 You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 609290] Re: overlapping memcpy in ssl_io_input_read
I hope this will be fixed as soon as possible. It's very simple patch. -- overlapping memcpy in ssl_io_input_read https://bugs.launchpad.net/bugs/609290 You received this bug notification because you are a member of Ubuntu Server Team, which is subscribed to apache2 in ubuntu. -- Ubuntu-server-bugs mailing list Ubuntu-server-bugs@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs
[Bug 589611] Re: client sent HTTP/1.1 request without hostname (see RFC2616 section 14.23)
Yes it should not be marked as fixed. ** Changed in: apache2 (Ubuntu) Status: Fix Released = In Progress -- client sent HTTP/1.1 request without hostname (see RFC2616 section 14.23) https://bugs.launchpad.net/bugs/589611 You received this bug notification because you are a member of Ubuntu Server Team, which is subscribed to apache2 in ubuntu. -- Ubuntu-server-bugs mailing list Ubuntu-server-bugs@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs
[Bug 609290] Re: overlapping memcpy in ssl_io_input_read
I hope this will be fixed as soon as possible. It's very simple patch. -- overlapping memcpy in ssl_io_input_read https://bugs.launchpad.net/bugs/609290 You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 589611] Re: client sent HTTP/1.1 request without hostname (see RFC2616 section 14.23)
Yes it should not be marked as fixed. ** Changed in: apache2 (Ubuntu) Status: Fix Released = In Progress -- client sent HTTP/1.1 request without hostname (see RFC2616 section 14.23) https://bugs.launchpad.net/bugs/589611 You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 589611] Re: client sent HTTP/1.1 request without hostname (see RFC2616 section 14.23)
It's scheduled (apache) to backport this fix to 2.2.x branch http://svn.apache.org/viewvc/httpd/httpd/branches/2.2.x/STATUS?revision=979087view=markup Quick fix is to uninstall optimized libc library libc6-i686. -- client sent HTTP/1.1 request without hostname (see RFC2616 section 14.23) https://bugs.launchpad.net/bugs/589611 You received this bug notification because you are a member of Ubuntu Server Team, which is subscribed to apache2 in ubuntu. -- Ubuntu-server-bugs mailing list Ubuntu-server-bugs@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs
[Bug 589611] Re: client sent HTTP/1.1 request without hostname (see RFC2616 section 14.23)
It's scheduled (apache) to backport this fix to 2.2.x branch http://svn.apache.org/viewvc/httpd/httpd/branches/2.2.x/STATUS?revision=979087view=markup Quick fix is to uninstall optimized libc library libc6-i686. -- client sent HTTP/1.1 request without hostname (see RFC2616 section 14.23) https://bugs.launchpad.net/bugs/589611 You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 609290] Re: overlapping memcpy in ssl_io_input_read
Yes you are right. The bug was fixed in main trunk of apache but not in 2.2.x branch. memcpy-ssse3 has code for forward and reverse copy. Why? However, I suggest you add a debug statement to memcpy, to monitor overlapping calls, whether it's just the isolated case. Maybe some developers quietly ignore the note about overlapping in memcpy and then they are surprises. -- overlapping memcpy in ssl_io_input_read https://bugs.launchpad.net/bugs/609290 You received this bug notification because you are a member of Ubuntu Server Team, which is subscribed to apache2 in ubuntu. -- Ubuntu-server-bugs mailing list Ubuntu-server-bugs@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs
[Bug 609290] Re: Critical bug in memcpy-ssse3-rep.S
This test code should return always the same string but it doesn't. ** Description changed: Hello. I found a terrible bug in memory copy routine. Here is the code - movlLEN(%esp), %ecx - movlSRC(%esp), %eax - movlDEST(%esp), %edx + movlLEN(%esp), %ecx + movlSRC(%esp), %eax + movlDEST(%esp), %edx .. L(fwd_write_less32bytes): #ifndef USE_AS_MEMMOVE - cmp%dl, %al - BUG !!! - jbL(bk_write) + cmp%dl, %al - BUG !!! + jbL(bk_write) Assume, that I have an array of char AR and I want move data from AR[10] to AR[0] with length 47. Data should be copied in forward direction. Problem is when AR[10] overlaps 255 bytes boundary. For example address of AR[0] is 0x00F8 (EDX) and address of AR[10] is 0x0102 (EAX) then cmp %dl,%al return AL as smaller then DL and the data are copied in reverse direction that causes data corruption. - In reality it will cause problems on Ubuntu 10.04 mod_ssl in Apache with last updates installed (libc6: Installed: 2.11.1-0ubuntu7.2), which are sometimes unable to process the HTTP header because of malformed data, but may cause other unexpected behavior. + In reality it will cause problems on Ubuntu 10.04 mod_ssl in Apache with last updates installed (libc6: Installed: 2.11.1-0ubuntu7.2), which are sometimes unable to process the HTTP header because of malformed data, but may cause other unexpected behavior (bug #595116, bug #595855, bug #589611 and maybe others). I don't know if only this one file is affected by this bug. See GDB snapshot in attachment - Regards - Jiri Engelthaler + Regards + Jiri Engelthaler ** Attachment added: memcpy test http://launchpadlibrarian.net/52415329/memcpytest.c -- Critical bug in memcpy-ssse3-rep.S https://bugs.launchpad.net/bugs/609290 You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 609290] Re: Critical bug in memcpy-ssse3-rep.S
** Description changed: Hello. - I found a terrible bug in memory copy routine. Here is the code + I found a terrible bug in memory copy routine (eglibc-2.11.1/sysdeps/i386/i686/multiarch/memcpy-ssse3-rep.S and memcpy-ssse3.S). Here is the code movlLEN(%esp), %ecx movlSRC(%esp), %eax movlDEST(%esp), %edx .. L(fwd_write_less32bytes): #ifndef USE_AS_MEMMOVE cmp%dl, %al - BUG !!! jbL(bk_write) Assume, that I have an array of char AR and I want move data from AR[10] to AR[0] with length 47. Data should be copied in forward direction. Problem is when AR[10] overlaps 255 bytes boundary. For example address of AR[0] is 0x00F8 (EDX) and address of AR[10] is 0x0102 (EAX) then cmp %dl,%al return AL as smaller then DL and the data are copied in reverse direction that causes data corruption. In reality it will cause problems on Ubuntu 10.04 mod_ssl in Apache with last updates installed (libc6: Installed: 2.11.1-0ubuntu7.2), which are sometimes unable to process the HTTP header because of malformed data, but may cause other unexpected behavior (bug #595116, bug #595855, bug #589611 and maybe others). - I don't know if only this one file is affected by this bug. + I don't know if only this two files is affected by this bug. See GDB snapshot in attachment Regards Jiri Engelthaler -- Critical bug in memcpy-ssse3-rep.S https://bugs.launchpad.net/bugs/609290 You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 609290] Re: overlapping memcpy in ssl_io_input_read
Yes you are right. The bug was fixed in main trunk of apache but not in 2.2.x branch. memcpy-ssse3 has code for forward and reverse copy. Why? However, I suggest you add a debug statement to memcpy, to monitor overlapping calls, whether it's just the isolated case. Maybe some developers quietly ignore the note about overlapping in memcpy and then they are surprises. -- overlapping memcpy in ssl_io_input_read https://bugs.launchpad.net/bugs/609290 You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 595855] Re: proxying SSL throws errors
*** This bug is a duplicate of bug 589611 *** https://bugs.launchpad.net/bugs/589611 Maybe I found a solution (bug in memcpy routine) Bug #609290 -- proxying SSL throws errors https://bugs.launchpad.net/bugs/595855 You received this bug notification because you are a member of Ubuntu Server Team, which is subscribed to apache2 in ubuntu. -- Ubuntu-server-bugs mailing list Ubuntu-server-bugs@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs
[Bug 595116] Re: ssl error reading the headers
Maybe I found a solution (bug in memcpy routine) Bug #609290 -- ssl error reading the headers https://bugs.launchpad.net/bugs/595116 You received this bug notification because you are a member of Ubuntu Server Team, which is subscribed to apache2 in ubuntu. -- Ubuntu-server-bugs mailing list Ubuntu-server-bugs@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs
[Bug 609290] Re: Critical bug in memcpy-ssse3-rep.S
** Attachment added: GDB snapshot http://launchpadlibrarian.net/52396057/memcpybug.PNG -- Critical bug in memcpy-ssse3-rep.S https://bugs.launchpad.net/bugs/609290 You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 609290] [NEW] Critical bug in memcpy-ssse3-rep.S
Public bug reported: Hello. I found a terrible bug in memory copy routine. Here is the code movlLEN(%esp), %ecx movlSRC(%esp), %eax movlDEST(%esp), %edx .. L(fwd_write_less32bytes): #ifndef USE_AS_MEMMOVE cmp%dl, %al - BUG !!! jbL(bk_write) Assume, that I have an array of char AR and I want move data from AR[10] to AR[0] with length 47. Data should be copied in forward direction. Problem is when AR[10] overlaps 255 bytes boundary. For example address of AR[0] is 0x00F8 (EDX) and address of AR[10] is 0x0102 (EAX) then cmp %dl,%al return AL as smaller then DL and the data are copied in reverse direction that causes data corruption. In reality it will cause problems on Ubuntu 10.04 mod_ssl in Apache with last updates installed (libc6: Installed: 2.11.1-0ubuntu7.2), which are sometimes unable to process the HTTP header because of malformed data, but may cause other unexpected behavior. I don't know if only this one file is affected by this bug. See GDB snapshot in attachment Regards Jiri Engelthaler ** Affects: eglibc (Ubuntu) Importance: Undecided Status: New -- Critical bug in memcpy-ssse3-rep.S https://bugs.launchpad.net/bugs/609290 You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 595855] Re: proxying SSL throws errors
*** This bug is a duplicate of bug 589611 *** https://bugs.launchpad.net/bugs/589611 Maybe I found a solution (bug in memcpy routine) Bug #609290 -- proxying SSL throws errors https://bugs.launchpad.net/bugs/595855 You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 589611] Re: client sent HTTP/1.1 request without hostname (see RFC2616 section 14.23)
Maybe I found a solution (bug in memcpy routine) Bug #609290 -- client sent HTTP/1.1 request without hostname (see RFC2616 section 14.23) https://bugs.launchpad.net/bugs/589611 You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 595116] Re: ssl error reading the headers
Maybe I found a solution (bug in memcpy routine) Bug #609290 -- ssl error reading the headers https://bugs.launchpad.net/bugs/595116 You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs