Resolving - this was fixed in 1.0.1k.
___
openssl-dev mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-dev
Hi,
in my process, I expecienced too many SSL_accept() crashed when processing
SSLv3 client request.
(gdb) info stack
#0 0xb76e3f7a in SSL_accept () from /lib/libssl.so.1.0.0
#1 0x in ?? ()
#2 0xb76e3f56 in SSL_accept () from /lib/libssl.so.1.0.0
#3 0xbfc2ff23 in ?? ()
#4
The first place to look is to see if your program has any pointers errors that
are overwriting memory.
Try something like valgrind or ASAN.
___
openssl-dev mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-dev
On Fri Jul 24 07:18:37 2015, murphy.z...@qq.com wrote:
Somehow the method became 0x0 when processing SSLv3. for now all
crashes occured with SSLv3 client requests. We have to disable SSLv2
and SSLv3 support in the process.
Could anyone help check what happened to make the method become 0x0
What openssl version/platform are you using?
$ openssl version
OpenSSL 1.0.1j 15 Oct 2014
Embedded environment based on x86
Regards,
Murphy.zhao
___
openssl-dev mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-dev
This transaction appears to have no content
binYAdydlKAnq.bin
Description: Binary data
bin67zpiQwKdm.bin
Description: Binary data
___
openssl-dev mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-dev
On Fri, Jul 24, 2015 at 10:25:04AM +, ice via RT wrote:
What openssl version/platform are you using?
$ openssl version
OpenSSL 1.0.1j 15 Oct 2014
You seem to be affected by CVE-2014-3569 that only affects the
1.0.1j version.
Kurt
___
On Fri, Jul 24, 2015 at 10:25:04AM +, ice via RT wrote:
What openssl version/platform are you using?
$ openssl version
OpenSSL 1.0.1j 15 Oct 2014
You seem to be affected by CVE-2014-3569 that only affects the
1.0.1j version.
Kurt
___