Note: This bug is displayed in read-only format because the product is no longer active in Red Hat Bugzilla.
RHEL Engineering is moving the tracking of its product development work on RHEL 6 through RHEL 9 to Red Hat Jira (issues.redhat.com). If you're a Red Hat customer, please continue to file support cases via the Red Hat customer portal. If you're not, please head to the "RHEL project" in Red Hat Jira and file new tickets here. Individual Bugzilla bugs in the statuses "NEW", "ASSIGNED", and "POST" are being migrated throughout September 2023. Bugs of Red Hat partners with an assigned Engineering Partner Manager (EPM) are migrated in late September as per pre-agreed dates. Bugs against components "kernel", "kernel-rt", and "kpatch" are only migrated if still in "NEW" or "ASSIGNED". If you cannot log in to RH Jira, please consult article #7032570. That failing, please send an e-mail to the RH Jira admins at rh-issues@redhat.com to troubleshoot your issue as a user management inquiry. The email creates a ServiceNow ticket with Red Hat. Individual Bugzilla bugs that are migrated will be moved to status "CLOSED", resolution "MIGRATED", and set with "MigratedToJIRA" in "Keywords". The link to the successor Jira issue will be found under "Links", have a little "two-footprint" icon next to it, and direct you to the "RHEL project" in Red Hat Jira (issue links are of type "https://issues.redhat.com/browse/RHEL-XXXX", where "X" is a digit). This same link will be available in a blue banner at the top of the page informing you that that bug has been migrated.

Bug 1486653

Summary: mod_fcgid cause Segmentation fault error while doing large file uploads over HTTPS
Product: Red Hat Enterprise Linux 7 Reporter: Dasharath Masirkar <dmasirka>
Component: mod_fcgidAssignee: Luboš Uhliarik <luhliari>
Status: CLOSED CURRENTRELEASE QA Contact: BaseOS QE - Apps <qe-baseos-apps>
Severity: urgent Docs Contact:
Priority: urgent    
Version: 7.4CC: bnater, dmasirka, jkejda, jorton, luhliari, toneata
Target Milestone: rcKeywords: Patch, ZStream
Target Release: ---   
Hardware: Unspecified   
OS: Unspecified   
Whiteboard:
Fixed In Version: mod_fcgid-2.3.9-5.el7 Doc Type: If docs needed, set a value
Doc Text:
Story Points: ---
Clone Of:
: 1501307 1654200 (view as bug list) Environment:
Last Closed: 2018-04-11 10:10:55 UTC Type: Bug
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:
Bug Depends On:    
Bug Blocks: 1501307, 1654200    

Description Dasharath Masirkar 2017-08-30 10:08:32 UTC
Description of problem:
The customer is impacted by upstream bug https://bz.apache.org/bugzilla/show_bug.cgi?id=51747, When they upload 510 MB or larger size file it results in an Apache httpd process crashed (Segmentation fault). This only happens if SSL is enabled in Apache httpd configuration. If SSL is turned off then uploading files works as expected.

Version-Release number of selected component (if applicable):
mod_fcgid-2.3.9-4.el7

How reproducible:
Always

Steps to Reproduce:
Please refer reproducible steps from BZ https://bz.apache.org/bugzilla/show_bug.cgi?id=51747#c0

Actual results:
Apache httpd crash with Segmentation fault error

Expected results:
Apache httpd should allow uploading file larger than 512 MB even with SSL is enabled.

Additional info:
Please refer upstream bug https://bz.apache.org/bugzilla/show_bug.cgi?id=51747

Please is backtrace of the crash:
Program terminated with signal 11, Segmentation fault.
#0  apr_bucket_free (mem=mem@entry=0x0) at buckets/apr_buckets_alloc.c:194
194	    if (node->size == SMALL_NODE_SIZE) {
(gdb) bt
#0  apr_bucket_free (mem=mem@entry=0x0) at buckets/apr_buckets_alloc.c:194
#1  0x00007fc80d9db580 in file_bucket_read (e=0x7fc816883fd8, str=0x7ffff38120e8, len=0x7ffff38120e0, block=<optimized out>) at buckets/apr_buckets_file.c:125
#2  0x00007fc809d171d1 in proc_write_ipc (ipc_handle=ipc_handle@entry=0x7fc80fd2b858, output_brigade=output_brigade@entry=0x7fc80fd2b598) at fcgid_proc_unix.c:776
#3  0x00007fc809d100d2 in handle_request_ipc (location_ptr=<synthetic pointer>, bucket_ctx=0x7fc80fd2b858, output_brigade=0x7fc80fd2b598, role=1, r=0x7fc80fcac6c0)
    at fcgid_bridge.c:302
#4  handle_request (r=r@entry=0x7fc80fcac6c0, role=role@entry=1, cmd_conf=cmd_conf@entry=0x7fc80fcc2ab8, output_brigade=output_brigade@entry=0x7fc80fd2b598)
    at fcgid_bridge.c:488
#5  0x00007fc809d1048c in bridge_request (r=r@entry=0x7fc80fcac6c0, role=role@entry=1, cmd_conf=cmd_conf@entry=0x7fc80fcc2ab8) at fcgid_bridge.c:765
#6  0x00007fc809d0eca1 in fcgid_handler (r=0x7fc80fcac6c0) at mod_fcgid.c:290
#7  0x00007fc80e2e5690 in ap_run_handler (r=r@entry=0x7fc80fcac6c0) at config.c:169
#8  0x00007fc80e2e5bd9 in ap_invoke_handler (r=r@entry=0x7fc80fcac6c0) at config.c:439
#9  0x00007fc80e2fa00a in ap_process_async_request (r=r@entry=0x7fc80fcac6c0) at http_request.c:317
#10 0x00007fc80e2fa2e4 in ap_process_request (r=r@entry=0x7fc80fcac6c0) at http_request.c:363
#11 0x00007fc80e2f6c32 in ap_process_http_sync_connection (c=0x7fc80fca2d90) at http_core.c:190
#12 ap_process_http_connection (c=0x7fc80fca2d90) at http_core.c:231
#13 0x00007fc80e2eec90 in ap_run_process_connection (c=c@entry=0x7fc80fca2d90) at connection.c:41
#14 0x00007fc80e2ef078 in ap_process_connection (c=c@entry=0x7fc80fca2d90, csd=<optimized out>) at connection.c:202
#15 0x00007fc809f2380f in child_main (child_num_arg=child_num_arg@entry=2) at prefork.c:707
#16 0x00007fc809f23a55 in make_child (s=0x7fc80fad5310, slot=slot@entry=2) at prefork.c:810
#17 0x00007fc809f23ab6 in startup_children (number_to_start=3) at prefork.c:828
#18 0x00007fc809f247c0 in prefork_run (_pconf=<optimized out>, plog=0x7fc80fadb358, s=0x7fc80fad5310) at prefork.c:986
#19 0x00007fc80e2c9f6e in ap_run_mpm (pconf=pconf@entry=0x7fc80faae138, plog=0x7fc80fadb358, s=0x7fc80fad5310) at mpm_common.c:96
#20 0x00007fc80e2c2d76 in main (argc=8, argv=0x7ffff3817d38) at main.c:777

#2  0x00007fc809d171d1 in proc_write_ipc (ipc_handle=ipc_handle@entry=0x7fc80fd2b858, output_brigade=output_brigade@entry=0x7fc80fd2b598) at fcgid_proc_unix.c:776
        len = 0
        base = 0x0
        rv = <optimized out>
        vec = {{iov_base = 0x7fc816888848, iov_len = 8000}, {iov_base = 0x7fc81688a858, iov_len = 192}, {iov_base = 0x7fc813cb85e8, iov_len = 8}, {
            iov_base = 0x7fc81688c868, iov_len = 8000}, {iov_base = 0x7fc81688e878, iov_len = 192}, {iov_base = 0x7fc813cc3928, iov_len = 8}, {iov_base = 0x7fc816890888, 
            iov_len = 8000}, {iov_base = 0x7fc813cc32e8, iov_len = 8}}
        nvec = 7
        e = 0x7fc816883fd8