From: "Justin Mason" <[EMAIL PROTECTED]>
> -----BEGIN PGP SIGNED MESSAGE-----
> Hash: SHA1
>
>
> John Narron writes:
> > > -----Original Message-----
> > > From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED]
> > > -----BEGIN PGP SIGNED MESSAGE-----
> > > Hash: SHA1
> > >
> > >
> > > ah, so it does.
> > > http://article.gmane.org/gmane.mail.spam.spamassassin.general/70459
> > >
> > > so it couldn't be fixed with a simple 'ulimit -s unlimited'?
> > >
> >
> > Nope.  At least not on FreeBSD 5.4.  Far from being an expert on
FreeBSD,
> > but the stack size's hardlimit seems to be set in the kernel (the
MAXSSIZ
> > option).  By default its 65536 (64MB).  Increasing the MAXSSIZ, after
> > Recompiling and rebooting the new kernel to 131072 (128MB) helped, but
> > not enough to overcome this (in other words, it would get further
through
> > the $evalstr statement, but not completely).
> >
> > Again, I'm not really pointing my finger at spamassassin, just really
> > relaying the information out so people who have yet to encounter this
> > problem can find a way to fix it.  Its something in perl 5.8.7, but I
don't
> > know specifically what it is.  Another possible fix is for spamassassin
to
> > not 'eval' such a lengthy string.
>
> unfortunately, I'm not sure if there's a workable workaround for that.
>
> if you can come up with a pure-perl, non-spamassassin-based test case, it
> might be worth reporting it to the perl maintainers via "perlbug"...
> sounds like they've made some stack-size assumptions that are not
> valid on FreeBSD by default.
>
> - --j.

I am wondering if this somehow gets translated to the insecure dependency
errors on Linux with the evalstr operation. It sounds suspicious.

{^_^}


Reply via email to