Displaying 20 results from an estimated 11000 matches similar to: "[Bug 750] "buffer_append_space: alloc 10506240 not supported" on AIX5 when attempting to use compression"
2002 Jul 01
3
3.4p1: 'buffer_append_space: alloc 10506240 not supported'
I have been trying to install 3.4p1 on a number of machines.
Servers on ia64 Linux, i386 Linux and SPARC Solaris are all working
like charms. On the other hand, I am having trouble at least with
HPUX 11, DEC OSF 5.1 and Unixware: on all those systems, sshd bails
out after authentication with an error in buffer_append_space.
Here is the output of sshd -d on the UnixWare machine
(uname -a:
2003 Sep 18
5
[Bug 679] fatal: buffer_append_space with compression enabled in putty
http://bugzilla.mindrot.org/show_bug.cgi?id=679
Summary: fatal: buffer_append_space with compression enabled in
putty
Product: Portable OpenSSH
Version: 3.7.1p1
Platform: Sparc
OS/Version: Solaris
Status: NEW
Severity: normal
Priority: P3
Component: sshd
AssignedTo: openssh-bugs
2005 Dec 07
4
[Bug 1131] buffer_append_space: alloc not supported Error with V 4.2p1
http://bugzilla.mindrot.org/show_bug.cgi?id=1131
Summary: buffer_append_space: alloc not supported Error with V
4.2p1
Product: Portable OpenSSH
Version: 4.2p1
Platform: Sparc
OS/Version: Solaris
Status: NEW
Keywords: help-wanted
Severity: normal
Priority: P3
Component: sftp
2005 Mar 22
1
Segmentation fault in buffer_append_space for AIX 5.3 for openssh-4.0p1
For AIX 53 ML01 I'm getting a "Segmentation fault in buffer_append_space at line 85 in file buffer.c" in sshd after typing my password for a new connection to the AIX 5.3 host. Line 85 is "if (buffer->offset == buffer->end) {". Is this caused by an old bug in buffer_append_space?
Regards
Rob v.d. Wal
2006 Mar 16
11
[Bug 1131] buffer_append_space: alloc not supported Error with V 4.2p1
http://bugzilla.mindrot.org/show_bug.cgi?id=1131
------- Comment #18 from cove at wildpackets.com 2006-03-17 09:06 -------
It could be a bug in cryptlib, but I had the same problem with libssh and the
first comment in this bug report is with a 3rd implementation.
debug2: load_server_config: filename /usr/local/etc/sshd_config
debug2: load_server_config: done config len = 292
debug2:
2003 Feb 24
1
[Bug 502] New: sshd fails when "Compression yes" set on HPUX
http://bugzilla.mindrot.org/show_bug.cgi?id=502
Summary: sshd fails when "Compression yes" set on HPUX
Product: Portable OpenSSH
Version: 3.5p1
Platform: HPPA
OS/Version: HP-UX
Status: NEW
Severity: normal
Priority: P2
Component: sshd
AssignedTo: openssh-unix-dev at mindrot.org
2006 Jan 11
0
[Bug 1131] buffer_append_space: alloc not supported Error with V 4.2p1
http://bugzilla.mindrot.org/show_bug.cgi?id=1131
------- Comment #4 from dtucker at zip.com.au 2006-01-11 23:07 -------
It sounds like either the client is sending a 10MB(!) packet, or there's some
bug some other place.
Does disabling compression (either by turning it off in the client or setting
Compression no in sshd_config) prevent the error?
------- You are receiving this mail
2008 Jan 01
3
[Bug 1425] New: buffer_append_space with rsync
https://bugzilla.mindrot.org/show_bug.cgi?id=1425
Summary: buffer_append_space with rsync
Classification: Unclassified
Product: Portable OpenSSH
Version: 4.7p1
Platform: Other
OS/Version: Linux
Status: NEW
Severity: normal
Priority: P2
Component: sshd
AssignedTo: bitbucket at mindrot.org
2006 Feb 14
15
[Bug 1131] buffer_append_space: alloc not supported Error with V 4.2p1
http://bugzilla.mindrot.org/show_bug.cgi?id=1131
------- Comment #5 from dtucker at zip.com.au 2006-02-14 22:17 -------
Also, what compiler did you use to compile OpenSSH? If you compile OpenSSH
(and openssl and zlib if possible) with optimization disabled (-O0) does the
error still occur?
------- You are receiving this mail because: -------
You are the assignee for the bug, or are
2003 Jan 20
1
Possible bug: Putty's psftp doesn't work when priv-sep is turned on
Hi List(s)
A customer of mine reported that sftp didn't work for them. It seems to
work just fine for me on that system, and after checking into it I
noticed that the customer used psftp, while I use sftp from either
cygwin or the linux version from openssh.
The openssh version of sftp works in all cases, priv-sep on or off.
However, the putty psftp breaks as soon as I turn on priv-sep
2002 Jul 01
0
Memory allocation gone awry with OpenSSH 3.(3,4)p1
Hello,
I have recently upgraded from an older version of OpenSSH to the
newer 3.3p1 (first) and now to 3.4p1 - because of the discovered
vulnerabilities. The default setting for these versions is to use
privilege separation, and this seems to trigger some weird bug with my
systems, causing sshd to consume memory until it barfs.
Details:
1. OpenSSH 3.3p1, privsep on, compression on:
2008 Sep 15
0
No subject
hello..
i am running openssh-3.7.1p2. on linux.It is working successfully..and daemon is running &client also connecting.But the problem is with the mips architecture when i connecting this server from remote syytem.?i got an error of buufer_get:trying to get more bytes 1 than buffer0.And client is not connecting from remote system.My out is as follows on my server
?in sshd main
before
2008 Sep 18
2
SSHD_PROBLEM
hello..
i am running openssh-3.7.1p2. on linux.It is working
successfully.and daemon is running &client also connecting.But the
problem is with the mips architecture when i connecting this server
from remote syytem. i got an error of buufer_get:trying to get more
bytes 1 than buffer0.And client is not connecting from remote system.My
out is as follows on my server
in sshd main
before
2003 Sep 16
1
OpenSSH Security Advisory: buffer.adv
This is the 1st revision of the Advisory.
This document can be found at: http://www.openssh.com/txt/buffer.adv
1. Versions affected:
All versions of OpenSSH's sshd prior to 3.7 contain a buffer
management error. It is uncertain whether this error is
potentially exploitable, however, we prefer to see bugs
fixed proactively.
2. Solution:
Upgrade to OpenSSH
2005 Feb 11
0
[Bug 896] Inproper Input buffer handleing
http://bugzilla.mindrot.org/show_bug.cgi?id=896
------- Additional Comments From dtucker at zip.com.au 2005-02-11 12:05 -------
Created an attachment (id=817)
--> (http://bugzilla.mindrot.org/attachment.cgi?id=817&action=view)
Hack client to reproduce problem in sshd.
After some discussion off-line with Chris Rapier, I am able to reproduce the
problem by in the server with a hacked
2007 Jul 26
1
Channel Handling Patch
The current code for channel.c creates an array of Channel structs
(initially set to NULL) which is then iterated through, in full, every
time a channel needs to be dealt with. If only one channel is in use,
which is relatively common, the code still loops through the entire array.
This patch creates a linked list of pointers to these structs and the
code steps through the linked list. Since
2006 Jan 26
2
SAMBA on AIX 5.1
I installed the binary from
http://us2.samba.org/samba/ftp/Binary_Packages/AIX/
Opt-samba-AIX5-3.0.21a.tar.gz
Installed fine but when I go to run the samba binaries, this is what I
get:
Can anyone help - thanks in advanced.
/opt/Samba/3.0.21a/sbin> ./nmbd -D &
[1] 544860
oldpetes: root] /opt/Samba/3.0.21a/sbin> exec(): 0509-036 Cannot load
program ./nmbd
2004 Jul 07
3
DynamicWindow Patch
We have developed a patch that enables changing the SSH window size
using the tcp window size as the source. This allows SSH to obtain
maximum use of the bandwidth on high BDP links.
We also have a page that describes the changes and performance.
http://www.psc.edu/~rapier/hpn-ssh/
The patch against CVS is included here.
Common subdirectories: src/usr.bin/ssh/CVS and ssh/CVS
diff -u
2004 Jul 14
1
New dynamic window patch (with limits)
As before, it is described on our website. This should apply fairly
cleanly to both portable and openbsd ssh.
http://www.psc.edu/networking/hpn-ssh/
Only in openssh-3.8.1p1-dynwindow: Makefile
diff -u openssh-3.8.1p1/buffer.c openssh-3.8.1p1-dynwindow/buffer.c
--- openssh-3.8.1p1/buffer.c 2003-11-21 07:56:47.000000000 -0500
+++ openssh-3.8.1p1-dynwindow/buffer.c 2004-07-12 07:49:29.000000000
2003 Sep 16
1
[alambert@quickfire.org: Heads up -- potential problems in 3.7, too? [Fwd: OpenSSH Security Advisory: buffer.adv]]
Is anybody aware of this?
-hc
----- Forwarded message from Alex Lambert <alambert@quickfire.org> -----
3.7.1 was just released.
Two patches for similar issues in a very short timeframe. Who do they
think they are -- Microsoft? <grin>
apl
-------- Original Message --------
Subject: OpenSSH Security Advisory: buffer.adv
Date: Wed, 17 Sep 2003 01:13:30 +0200
From: Markus Friedl