search for: __strlen_sse2

Displaying 7 results from an estimated 7 matches for "__strlen_sse2".

2017 Jan 04
3
dovecot-pigeonhole running external script ends with signal 11
...il, or you can run it as root): > > $ gdb --args /usr/lib/dovecot/lmtp I did so and it seems that libc.so.6 throws the error as I get the following result (as root): [New process 14843] Program received signal SIGSEGV, Segmentation fault. [Switching to process 14843] 0x00007ffff7241b71 in __strlen_sse2 () from /lib64/libc.so.6 bt full does not give me more than this #0 0x00007ffff7241b71 in __strlen_sse2 () from /lib64/libc.so.6 No symbol table info available. Cannot access memory at address 0x7fffffffd848 Then I installed debuginfo for glibc via debuginfo-install glibc-2.17-157.el7_3.1.x86_6...
2017 Jan 04
4
dovecot-pigeonhole running external script ends with signal 11
...lib/dovecot/lmtp >> I did so and it seems that libc.so.6 throws the error as I get the >> following result (as root): >> >> [New process 14843] >> Program received signal SIGSEGV, Segmentation fault. >> [Switching to process 14843] >> 0x00007ffff7241b71 in __strlen_sse2 () from /lib64/libc.so.6 >> >> bt full does not give me more than this >> >> #0 0x00007ffff7241b71 in __strlen_sse2 () from /lib64/libc.so.6 >> No symbol table info available. >> Cannot access memory at address 0x7fffffffd848 >> >> Then I installed d...
2017 Jan 04
0
dovecot-pigeonhole running external script ends with signal 11
...>> $ gdb --args /usr/lib/dovecot/lmtp > I did so and it seems that libc.so.6 throws the error as I get the > following result (as root): > > [New process 14843] > Program received signal SIGSEGV, Segmentation fault. > [Switching to process 14843] > 0x00007ffff7241b71 in __strlen_sse2 () from /lib64/libc.so.6 > > bt full does not give me more than this > > #0 0x00007ffff7241b71 in __strlen_sse2 () from /lib64/libc.so.6 > No symbol table info available. > Cannot access memory at address 0x7fffffffd848 > > Then I installed debuginfo for glibc via debuginfo...
2013 May 30
0
Re: ATTN: Denial of service attack possible on libguestfs 1.21.x, libguestfs.1.22.0
...mmit/fa6a76050d82894365dfe32916903ef7fee3ffcd This is appearently incomplete, bt from a 1.20.4: head -n 10 libguestfs: recv_from_daemon: 44 bytes: 20 00 f5 f5 | 00 00 00 04 | 00 00 00 7a | 00 00 00 01 | 00 12 34 24 | ... Program received signal SIGSEGV, Segmentation fault. 0x00007ffff69deae2 in __strlen_sse2 () from /lib64/libc.so.6 (gdb) bt #0 0x00007ffff69deae2 in __strlen_sse2 () from /lib64/libc.so.6 #1 0x00007ffff69de7e6 in strdup () from /lib64/libc.so.6 #2 0x00007ffff7b7936c in guestfs___safe_strdup (g=0x65da50, str=0x0) at alloc.c:96 #3 0x00007ffff7b8b65e in parse_suse_release (filename=&lt...
2017 Jan 03
3
dovecot-pigeonhole running external script ends with signal 11
Hi, I'm running a dovecot 2.2.26 (self compiled) on a Centos 7. I have a sieve script which should run an external script (in filter mode) that encrypts the mail using the users pub key. I configured 90-plugin.conf as follows plugin { sieve_plugins = sieve_extprograms sieve_extensions = +vnd.dovecot.filter sieve_filter_bin_dir = /etc/dovecot/sieve-filters
2013 May 28
6
ATTN: Denial of service attack possible on libguestfs 1.21.x, libguestfs.1.22.0
There's a denial of service attack possible from guests on any program that does inspection (eg. virt-inspector, many other virt-* tools, virt-v2v, OpenStack). The attack causes the host process to crash because of a double free. It's probably not exploitable (definitely not on Fedora because of the default memory hardening settings). This patch contains the fix and a reproducer:
2019 Mar 28
2
pigeonhole tests crashing in deleteheader.svtest
...r - :index :last' SUCCEEDED 8: Test 'Deleteheader - implicit keep' SUCCEEDED make: *** [Makefile:1190: tests/extensions/editheader/deleteheader.svtest] Segmentation fault (core dumped) Let me know if you need more debug information. Cheers Michal Hlavinka #0 0x00007f9924faea8a in __strlen_sse2 () from /lib64/libc.so.6 #1 0x00007f992514fdd2 in smtp_address_clone (pool=0x7f992528dce0 <static_system_pool>, src=src at entry=0x7ffd30eace10) at smtp-address.c:632 #2 0x000055f7330916b3 in testsuite_message_set_data (mail=0x55f73486f848) at testsuite-message.c:96 #3 0x000055f7330918b9...