> On Sat, Jan 13, 2001 at 07:11:10PM -0500, David Arbogast wrote: > > > Dec 29 00:52:41 libsafe.so[16322]: detected an attempt to write > > across stack boundary. > > Dec 29 00:52:41 libsafe.so[16322]: terminating > > /home/jamesb/src/openssl-0.9.6/apps/openssl > > Dec 29 00:52:41 libsafe.so[16322]: overflow caused by memcpy() > > So what were you doing? Using s_server/s_client? If so, and you were using > SSL 2.0, this might be a bug that has already been fixed in current > development versions (and in the 0.9.6-stable development branch). > From CHANGES: > > *) Increase s2->wbuf allocation by one byte in ssl2_new (ssl/s2_lib.c). > Otherwise do_ssl_write (ssl/s2_pkt.c) will write beyond buffer limits > when writing a 32767 byte record. > [Bodo Moeller; problem reported by Eric Day <[EMAIL PROTECTED]>] > > > -- > Bodo Möller <[EMAIL PROTECTED]> > PGP http://www.informatik.tu-darmstadt.de/TI/Mitarbeiter/moeller/0x36d2c658.html > * TU Darmstadt, Theoretische Informatik, Alexanderstr. 10, D-64283 Darmstadt > * Tel. +49-6151-16-6628, Fax +49-6151-16-6036 > ______________________________________________________________________ > OpenSSL Project http://www.openssl.org > User Support Mailing List [EMAIL PROTECTED] > Automated List Manager [EMAIL PROTECTED] ______________________________________________________________________ OpenSSL Project http://www.openssl.org User Support Mailing List [EMAIL PROTECTED] Automated List Manager [EMAIL PROTECTED]