similar to: [Bug 750] "buffer_append_space: alloc 10506240 not supported" on AIX5 when attempting to use compression

Displaying 20 results from an estimated 11000 matches similar to: "[Bug 750] "buffer_append_space: alloc 10506240 not supported" on AIX5 when attempting to use compression"

2002 Jul 01
3
3.4p1: 'buffer_append_space: alloc 10506240 not supported'
I have been trying to install 3.4p1 on a number of machines. Servers on ia64 Linux, i386 Linux and SPARC Solaris are all working like charms. On the other hand, I am having trouble at least with HPUX 11, DEC OSF 5.1 and Unixware: on all those systems, sshd bails out after authentication with an error in buffer_append_space. Here is the output of sshd -d on the UnixWare machine (uname -a:
2003 Sep 18
5
[Bug 679] fatal: buffer_append_space with compression enabled in putty
http://bugzilla.mindrot.org/show_bug.cgi?id=679 Summary: fatal: buffer_append_space with compression enabled in putty Product: Portable OpenSSH Version: 3.7.1p1 Platform: Sparc OS/Version: Solaris Status: NEW Severity: normal Priority: P3 Component: sshd AssignedTo: openssh-bugs
2005 Dec 07
4
[Bug 1131] buffer_append_space: alloc not supported Error with V 4.2p1
http://bugzilla.mindrot.org/show_bug.cgi?id=1131 Summary: buffer_append_space: alloc not supported Error with V 4.2p1 Product: Portable OpenSSH Version: 4.2p1 Platform: Sparc OS/Version: Solaris Status: NEW Keywords: help-wanted Severity: normal Priority: P3 Component: sftp
2005 Mar 22
1
Segmentation fault in buffer_append_space for AIX 5.3 for openssh-4.0p1
For AIX 53 ML01 I'm getting a "Segmentation fault in buffer_append_space at line 85 in file buffer.c" in sshd after typing my password for a new connection to the AIX 5.3 host. Line 85 is "if (buffer->offset == buffer->end) {". Is this caused by an old bug in buffer_append_space? Regards Rob v.d. Wal
2006 Mar 16
11
[Bug 1131] buffer_append_space: alloc not supported Error with V 4.2p1
http://bugzilla.mindrot.org/show_bug.cgi?id=1131 ------- Comment #18 from cove at wildpackets.com 2006-03-17 09:06 ------- It could be a bug in cryptlib, but I had the same problem with libssh and the first comment in this bug report is with a 3rd implementation. debug2: load_server_config: filename /usr/local/etc/sshd_config debug2: load_server_config: done config len = 292 debug2:
2003 Feb 24
1
[Bug 502] New: sshd fails when "Compression yes" set on HPUX
http://bugzilla.mindrot.org/show_bug.cgi?id=502 Summary: sshd fails when "Compression yes" set on HPUX Product: Portable OpenSSH Version: 3.5p1 Platform: HPPA OS/Version: HP-UX Status: NEW Severity: normal Priority: P2 Component: sshd AssignedTo: openssh-unix-dev at mindrot.org
2006 Jan 11
0
[Bug 1131] buffer_append_space: alloc not supported Error with V 4.2p1
http://bugzilla.mindrot.org/show_bug.cgi?id=1131 ------- Comment #4 from dtucker at zip.com.au 2006-01-11 23:07 ------- It sounds like either the client is sending a 10MB(!) packet, or there's some bug some other place. Does disabling compression (either by turning it off in the client or setting Compression no in sshd_config) prevent the error? ------- You are receiving this mail
2008 Jan 01
3
[Bug 1425] New: buffer_append_space with rsync
https://bugzilla.mindrot.org/show_bug.cgi?id=1425 Summary: buffer_append_space with rsync Classification: Unclassified Product: Portable OpenSSH Version: 4.7p1 Platform: Other OS/Version: Linux Status: NEW Severity: normal Priority: P2 Component: sshd AssignedTo: bitbucket at mindrot.org
2006 Feb 14
15
[Bug 1131] buffer_append_space: alloc not supported Error with V 4.2p1
http://bugzilla.mindrot.org/show_bug.cgi?id=1131 ------- Comment #5 from dtucker at zip.com.au 2006-02-14 22:17 ------- Also, what compiler did you use to compile OpenSSH? If you compile OpenSSH (and openssl and zlib if possible) with optimization disabled (-O0) does the error still occur? ------- You are receiving this mail because: ------- You are the assignee for the bug, or are
2003 Jan 20
1
Possible bug: Putty's psftp doesn't work when priv-sep is turned on
Hi List(s) A customer of mine reported that sftp didn't work for them. It seems to work just fine for me on that system, and after checking into it I noticed that the customer used psftp, while I use sftp from either cygwin or the linux version from openssh. The openssh version of sftp works in all cases, priv-sep on or off. However, the putty psftp breaks as soon as I turn on priv-sep
2002 Jul 01
0
Memory allocation gone awry with OpenSSH 3.(3,4)p1
Hello, I have recently upgraded from an older version of OpenSSH to the newer 3.3p1 (first) and now to 3.4p1 - because of the discovered vulnerabilities. The default setting for these versions is to use privilege separation, and this seems to trigger some weird bug with my systems, causing sshd to consume memory until it barfs. Details: 1. OpenSSH 3.3p1, privsep on, compression on:
2008 Sep 15
0
No subject
hello.. i am running openssh-3.7.1p2. on linux.It is working successfully..and daemon is running &client also connecting.But the problem is with the mips architecture when i connecting this server from remote syytem.?i got an error of buufer_get:trying to get more bytes 1 than buffer0.And client is not connecting from remote system.My out is as follows on my server ?in sshd main before
2008 Sep 18
2
SSHD_PROBLEM
hello.. i am running openssh-3.7.1p2. on linux.It is working successfully.and daemon is running &client also connecting.But the problem is with the mips architecture when i connecting this server from remote syytem. i got an error of buufer_get:trying to get more bytes 1 than buffer0.And client is not connecting from remote system.My out is as follows on my server in sshd main before
2003 Sep 16
1
OpenSSH Security Advisory: buffer.adv
This is the 1st revision of the Advisory. This document can be found at: http://www.openssh.com/txt/buffer.adv 1. Versions affected: All versions of OpenSSH's sshd prior to 3.7 contain a buffer management error. It is uncertain whether this error is potentially exploitable, however, we prefer to see bugs fixed proactively. 2. Solution: Upgrade to OpenSSH
2005 Feb 11
0
[Bug 896] Inproper Input buffer handleing
http://bugzilla.mindrot.org/show_bug.cgi?id=896 ------- Additional Comments From dtucker at zip.com.au 2005-02-11 12:05 ------- Created an attachment (id=817) --> (http://bugzilla.mindrot.org/attachment.cgi?id=817&action=view) Hack client to reproduce problem in sshd. After some discussion off-line with Chris Rapier, I am able to reproduce the problem by in the server with a hacked
2007 Jul 26
1
Channel Handling Patch
The current code for channel.c creates an array of Channel structs (initially set to NULL) which is then iterated through, in full, every time a channel needs to be dealt with. If only one channel is in use, which is relatively common, the code still loops through the entire array. This patch creates a linked list of pointers to these structs and the code steps through the linked list. Since
2006 Jan 26
2
SAMBA on AIX 5.1
I installed the binary from http://us2.samba.org/samba/ftp/Binary_Packages/AIX/ Opt-samba-AIX5-3.0.21a.tar.gz Installed fine but when I go to run the samba binaries, this is what I get: Can anyone help - thanks in advanced. /opt/Samba/3.0.21a/sbin> ./nmbd -D & [1] 544860 oldpetes: root] /opt/Samba/3.0.21a/sbin> exec(): 0509-036 Cannot load program ./nmbd
2004 Jul 07
3
DynamicWindow Patch
We have developed a patch that enables changing the SSH window size using the tcp window size as the source. This allows SSH to obtain maximum use of the bandwidth on high BDP links. We also have a page that describes the changes and performance. http://www.psc.edu/~rapier/hpn-ssh/ The patch against CVS is included here. Common subdirectories: src/usr.bin/ssh/CVS and ssh/CVS diff -u
2004 Jul 14
1
New dynamic window patch (with limits)
As before, it is described on our website. This should apply fairly cleanly to both portable and openbsd ssh. http://www.psc.edu/networking/hpn-ssh/ Only in openssh-3.8.1p1-dynwindow: Makefile diff -u openssh-3.8.1p1/buffer.c openssh-3.8.1p1-dynwindow/buffer.c --- openssh-3.8.1p1/buffer.c 2003-11-21 07:56:47.000000000 -0500 +++ openssh-3.8.1p1-dynwindow/buffer.c 2004-07-12 07:49:29.000000000
2003 Sep 16
1
[alambert@quickfire.org: Heads up -- potential problems in 3.7, too? [Fwd: OpenSSH Security Advisory: buffer.adv]]
Is anybody aware of this? -hc ----- Forwarded message from Alex Lambert <alambert@quickfire.org> ----- 3.7.1 was just released. Two patches for similar issues in a very short timeframe. Who do they think they are -- Microsoft? <grin> apl -------- Original Message -------- Subject: OpenSSH Security Advisory: buffer.adv Date: Wed, 17 Sep 2003 01:13:30 +0200 From: Markus Friedl