> On Sat, Jan 13, 2001 at 07:11:10PM -0500, David Arbogast wrote:
>
> > Dec 29 00:52:41 libsafe.so[16322]: detected an attempt to write
> > across stack boundary.
> > Dec 29 00:52:41 libsafe.so[16322]: terminating
> > /home/jamesb/src/openssl-0.9.6/apps/openssl
> > Dec 29 00:52:41 libsafe.so[16322]: overflow caused by memcpy()
>
> So what were you doing?  Using s_server/s_client?  If so, and you were
using
> SSL 2.0, this might be a bug that has already been fixed in current
> development versions (and in the 0.9.6-stable development branch).
> From CHANGES:
>
>   *) Increase s2->wbuf allocation by one byte in ssl2_new (ssl/s2_lib.c).
>      Otherwise do_ssl_write (ssl/s2_pkt.c) will write beyond buffer limits
>      when writing a 32767 byte record.
>      [Bodo Moeller; problem reported by Eric Day <[EMAIL PROTECTED]>]
>
>
> --
> Bodo Möller <[EMAIL PROTECTED]>
> PGP
http://www.informatik.tu-darmstadt.de/TI/Mitarbeiter/moeller/0x36d2c658.html
> * TU Darmstadt, Theoretische Informatik, Alexanderstr. 10, D-64283
Darmstadt
> * Tel. +49-6151-16-6628, Fax +49-6151-16-6036
> ______________________________________________________________________
> OpenSSL Project                                 http://www.openssl.org
> User Support Mailing List                    [EMAIL PROTECTED]
> Automated List Manager                           [EMAIL PROTECTED]

______________________________________________________________________
OpenSSL Project                                 http://www.openssl.org
User Support Mailing List                    [EMAIL PROTECTED]
Automated List Manager                           [EMAIL PROTECTED]

Reply via email to