Displaying 20 results from an estimated 20000 matches similar to: "String truncation problems on FreeBSD Sparc64"
2010 Apr 26
2
[LLVMdev] llvm for freebsd on sparc64
I am trying to build llvm on freebsd-8.0 on sparc64 CPU.
I patched sources because 'sparc' enum value in
include/llvm/ADT/Triple.h conflicts with gcc typedef 'sparc'.
This allowed llvm itself to build successfully.
But there is an error during gcc frontend compile:
Did not get a target machine! Triplet is sparc64-unknown-freebsd8.0
I think this is because in many places, like in
1999 Aug 03
3
RW 0.64.2 substring() string truncation?
Hi,
(First, apology for my earlier incorrectly addressed "subscribe"
post.)
Can somebody tell me what exactly is going on below. Basically, I am
running into some kind of "string truncation" problem when I try
to get a substring starting past the 8192nd character (see sample
session below). There doesn't appear to be any problem creating the
string, and nchar()
2010 Apr 26
0
[LLVMdev] llvm for freebsd on sparc64
We typically handle this by adding a "#undef sparc" in various places. For example see include/llvm/ADT/Triple.h which already has it. You'll probably need to add it to another header somewhere.
-Chris
On Apr 26, 2010, at 10:59 AM, Yuri wrote:
> I am trying to build llvm on freebsd-8.0 on sparc64 CPU.
> I patched sources because 'sparc' enum value in
>
2004 Mar 19
0
nmbd won't bind on FreeBSD 5.2-RELEASE sparc64
Hi,
I have had samba 3.0 running on my FreeBSD 5.2 sparc64 system for
a few weeks without any issues.
Recently I had to reboot, and now nmbd won't run. I have NOT changed
my config one bit.
I have verified nothing is bound to port 137 via netstat -an .
The error is as follows:
[2004/03/19 05:20:10, 0] lib/util_sock.c:open_socket_in(646)
bind failed on port 137 socket_addr =
2007 Oct 10
0
AST-2007-022: Buffer overflows in voicemail when using IMAP storage
Asterisk Project Security Advisory - AST-2007-022
+------------------------------------------------------------------------+
| Product | Asterisk |
|--------------------+---------------------------------------------------|
| Summary | Buffer overflows in voicemail when using IMAP |
| |
2007 Oct 10
0
AST-2007-022: Buffer overflows in voicemail when using IMAP storage
Asterisk Project Security Advisory - AST-2007-022
+------------------------------------------------------------------------+
| Product | Asterisk |
|--------------------+---------------------------------------------------|
| Summary | Buffer overflows in voicemail when using IMAP |
| |
2010 Apr 26
1
[LLVMdev] llvm for freebsd on sparc64
Chris Lattner wrote:
> We typically handle this by adding a "#undef sparc" in various places. For example see include/llvm/ADT/Triple.h which already has it. You'll probably need to add it to another header somewhere.
>
> -Chris
>
I can't find any 'undef' lines in include/llvm/ADT/Triple.h though. So I
guess I should add it.
But my question about
2008 Dec 10
0
AST-2008-012: Remote crash vulnerability in IAX2
Asterisk Project Security Advisory - AST-2008-012
+------------------------------------------------------------------------+
| Product | Asterisk |
|----------------------+-------------------------------------------------|
| Summary | Remote crash vulnerability in IAX2 |
2014 Jun 12
0
AST-2014-008: Denial of Service in PJSIP Channel Driver Subscriptions
Asterisk Project Security Advisory - AST-2014-008
Product Asterisk
Summary Denial of Service in PJSIP Channel Driver
Subscriptions
Nature of Advisory Denial of Service
Susceptibility Remote
2014 Sep 18
0
AST-2014-009: Remote crash based on malformed SIP subscription requests
Asterisk Project Security Advisory - AST-2014-009
Product Asterisk
Summary Remote crash based on malformed SIP subscription
requests
Nature of Advisory Remotely triggered crash of Asterisk
Susceptibility Remote
2008 Dec 10
0
AST-2008-012: Remote crash vulnerability in IAX2
Asterisk Project Security Advisory - AST-2008-012
+------------------------------------------------------------------------+
| Product | Asterisk |
|----------------------+-------------------------------------------------|
| Summary | Remote crash vulnerability in IAX2 |
2014 Jun 12
0
AST-2014-008: Denial of Service in PJSIP Channel Driver Subscriptions
Asterisk Project Security Advisory - AST-2014-008
Product Asterisk
Summary Denial of Service in PJSIP Channel Driver
Subscriptions
Nature of Advisory Denial of Service
Susceptibility Remote
2014 Sep 18
0
AST-2014-009: Remote crash based on malformed SIP subscription requests
Asterisk Project Security Advisory - AST-2014-009
Product Asterisk
Summary Remote crash based on malformed SIP subscription
requests
Nature of Advisory Remotely triggered crash of Asterisk
Susceptibility Remote
2015 Jul 10
2
RES: Can I use PJSIP_HEADER to read the SIP 183 message header?
Ok Mark Michelson.
Thank you very much! You answer tells me that I was in the wrong path trying to access information from SIP 183 message.
I need to find a way to let the callee pass information/data to the caller, even before accepting the call. That is, send data during the ringing time. And in my case, there will be more than one callee ringing at same time. As ASTERISK will not forward each
2010 Feb 25
0
AST-2010-003: Invalid parsing of ACL rules can compromise security
Asterisk Project Security Advisory - AST-2010-003
+------------------------------------------------------------------------+
| Product | Asterisk |
|--------------------+---------------------------------------------------|
| Summary | Invalid parsing of ACL rules can compromise |
| | security
2010 Feb 25
0
AST-2010-003: Invalid parsing of ACL rules can compromise security
Asterisk Project Security Advisory - AST-2010-003
+------------------------------------------------------------------------+
| Product | Asterisk |
|--------------------+---------------------------------------------------|
| Summary | Invalid parsing of ACL rules can compromise |
| | security
2007 Nov 08
0
AST-2007-024 - Fallacious security advisory spread on the Internet involving buffer overflow in Zaptel's sethdlc application
Asterisk Project Security Advisory - AST-2007-024
+------------------------------------------------------------------------+
| Product | Zaptel |
|--------------------+---------------------------------------------------|
| Summary | Potential buffer overflow from command line |
| |
2007 Nov 08
0
AST-2007-024 - Fallacious security advisory spread on the Internet involving buffer overflow in Zaptel's sethdlc application
Asterisk Project Security Advisory - AST-2007-024
+------------------------------------------------------------------------+
| Product | Zaptel |
|--------------------+---------------------------------------------------|
| Summary | Potential buffer overflow from command line |
| |
2014 Jan 15
2
[PATCH stable-only] virtio-net: fix build on m68k and sparc64
On Wed, Jan 15, 2014 at 09:36:13AM +0100, Geert Uytterhoeven wrote:
> On Wed, Jan 15, 2014 at 9:26 AM, Michael S. Tsirkin <mst at redhat.com> wrote:
> > As a result of backporting a bugfix, virtio_net started passing void *
> > to page_address, assuming that it will get silently converted to struct
> > page *. But this does not happen on architectures where page_address
2014 Jan 15
2
[PATCH stable-only] virtio-net: fix build on m68k and sparc64
On Wed, Jan 15, 2014 at 09:36:13AM +0100, Geert Uytterhoeven wrote:
> On Wed, Jan 15, 2014 at 9:26 AM, Michael S. Tsirkin <mst at redhat.com> wrote:
> > As a result of backporting a bugfix, virtio_net started passing void *
> > to page_address, assuming that it will get silently converted to struct
> > page *. But this does not happen on architectures where page_address