Displaying 20 results from an estimated 1100 matches similar to: "Error with path names greater than 255 characters"
2001 Feb 12
1
openssh bugs in snapshot for nextstep (fwd)
I was sent this from Mark Miller. Should we be using MAXPATHLEN
instead of PATH_MAX in the upstream tree? Not all systems define
PATH_MAX.
- Ben
--- sftp-int.c.orig Sat Feb 10 13:56:08 2001
+++ sftp-int.c Sun Feb 11 23:33:26 2001
@@ -435,5 +435,5 @@
unsigned long n_arg;
Attrib a, *aa;
- char path_buf[PATH_MAX];
+ char path_buf[MAXPATHLEN];
path1 =
2001 Jan 04
0
patch for the HURD
This is a small/trivial patch to get HURD to _compile_ (I haven't gotten
PRNG to work yet) openssh. All it does is define MAXHOSTNAMELEN in
defines.h if it isn't already defined (there may need to be a library
loaded first, or you may want to incorporate that patch into canohost.c
instead of defines.h). Anyway, small patch for canohost.c and defines.h
because HURD doesn't use
2000 Jun 12
1
Openssh on SCO Openserver Release 5
Yo Andrew!
What version of Openssh are you trying?
RGDS
GARY
On Mon, 12 Jun 2000, Andrew McGill wrote:
> Date: Mon, 12 Jun 2000 15:26:53 +0200
> From: Andrew McGill <andrewm at datrix.co.za>
> To: djm at ibs.com.au
> Cc: gem at rellim.com
> Subject: Openssh on SCO Openserver Release 5
>
> Hi there
>
> Your e-mail address appears in the README for openssh,
2003 Aug 26
1
Tired of "filename too long"? Me too...
I assume there's some good reason for the way filenames are faithfully
maintained as temp files, but it's a little frustrating when you get
"filename too long" messages as a result... with no indication of what
file it was it's complaining about.
The obvious fix is to simply generate a tmpname and have done with it.
Possibly safer, truncate the filename, in case there's
2002 Jun 07
0
problem related to filename length
hi, all.
I had an problem with rsync-2.5.4/5 related to filename length.
On Linux box (kernel-2.4.18 + ext3 fs), filename length limits to
255byte, but rsync can't handle fn > (255 -9) byte. So I had an instant
hack to avoid this problem. Patch file attatched works fine in my case,
but I'm not sure that it is correct or not. Any suggestions ?
Please cc me, I'm not on this
1998 Oct 14
0
The poisoned NUL byte
Summary: you can exploit a single-byte buffer overrun to gain root privs.
When, half a day after releasing version 2.2beta37 of the Linux nfs server,
I received a message from Larry Doolittle telling me that it was still
vulnerable to the root exploit posted to bugtraq, I was ready to quit
hacking and start as a carpenter...
Tempting as that was, I didn''t, and started looking for the
2005 Jan 05
1
rsync filename heuristics
On 5 Jan 2005, Rusty Russell <rusty@rustcorp.com.au> wrote:
> On Tue, 2005-01-04 at 18:24 +0100, Robert Lemmen wrote:
> > hi rusty,
> >
> > i read on some webpage about rsync and debian that you wrote a patch to
> > rsync that let's it uses heuristics when deciding which local file to
> > use. could you tell me whether this is planned to be included in
2003 Feb 14
0
patch for krb4 authentization in openssh-3.5p1 on RH 8.0
Dear developers,
recently I tried to compile kerberos4 authentization support in
openssh-3.5p1 on Redhat 8.0, unfortunately autentization against
kerberos server in a kerberos4 realm doesn't work well, probably due to
the bug in auth-krb4.c. My colleague David Komanek wrote patch to this
file solving the problem, so credits goes to him. I'm sending this here,
believing that it can help
2002 Mar 27
2
rsync-2.5.4:backup.c possible bug
Hello,
I suspect a minor bug in the file rsync-2.5.4/backup.c line 206.
To identify too-long pathnames, it makes the following test:
if (strlen(backup_dir) + strlen(fname) > (MAXPATHLEN - 1))
I think that the constant subtracted off should be 2, to account both for
the forward-slash and for the trailing zero in the following snprintf
statement, line 211:
snprintf(keep_name, sizeof
2002 Jan 27
0
IdentityFile patch
By the way, I noticed in the previous IdentityFile patch I forgot to
expand tilde. I fixed this by making the change in ssh.c instead of
readconf.c, which is probably where it belongs, as far as the existing code
is concerned:
diff -ur openssh-3.0.2p1/auth.c openssh-3.0.2p1I/auth.c
--- openssh-3.0.2p1/auth.c Sun Nov 11 17:06:07 2001
+++ openssh-3.0.2p1I/auth.c Sun Jan 27 12:05:14 2002
@@ -44,7
2004 Jan 24
2
[PATCH] --links-depth for rsync
Hello,
about a year ago I ran into situation where there's a "metadirectory"
containing directories and symlinks to files. There was a need to mirror
the contents of files and directories gathered via symlinks to this
metadirectory, regular mirroring of the tree wouldn't do any good.
The attached patch gives the user ability to define how many symbolic
links rsync should follow
2002 Jan 27
1
[PATCH] Add user-dependent IdentityFile to OpenSSH-3.0.2p1
Here is a patch to allow private key files to be placed system wide (for
all users) in a secure (non-NFS) mounted location on systems where home
directories are NFS mounted. This is especially important for users who use
blank passphrases rather than ssh-agent (a good example of where this is
necessary is for tunnelling lpd through ssh on systems that run lpd as user
lp).
IdentityFile now accepts
2008 Jan 31
1
DO NOT REPLY [Bug 5235] New: buffer overflow in receive_file_entry
https://bugzilla.samba.org/show_bug.cgi?id=5235
Summary: buffer overflow in receive_file_entry
Product: rsync
Version: 2.6.9
Platform: Other
OS/Version: Linux
Status: NEW
Severity: normal
Priority: P3
Component: core
AssignedTo: wayned@samba.org
ReportedBy: rsync@ofdan.co.uk
2003 Oct 18
0
Added functionality --compare-file and --compare-auto
Recently various needs for multiple version handling were discussed
and I put forward a plan of mine. Subsequently the proposal for a
--compare-file=<FILE> switch had support, so I have implemented
this. I have also implemented an experimental --compare-auto which
decides which file to match against using a rule.
Instructions for patch:
1. Install rsync-2.5.6 source
2. "patch -p1
2003 Jan 18
0
[Patch] User-dependent IdentityFile
Here is the user-dependent IdentityFile patch for openssh3.5 (BSD version),
which allows private key files to be placed system wide (for all users) in
a secure (non-NFS) mounted location.
This addresses an important security hole on systems where home directories
are NFS mounted, particularly if there are users who use blank passphrases
(or when lpd is tunneled through ssh on systems running lpd
2001 Sep 30
0
Exclude sets generated with -C
Hi guys,
I recently stumbled across what I think is an rsync bug. The problem
was I was trying to rsync from one CVS checkout, to another, and was
using rsync -Cavz to do the job. In this CVS module, there happens to
be two sub-directories with the names of "core" and "tags"
respectively, which were ignored, since these names matched the
default CVS ignore list.
When rsync
2004 Sep 18
1
[LLVMdev] MAXPATHLEN' undeclared (first use this function)
Hi,
I get below error:
---------------------------------
In file included from /usr/local/build/llvm/lib/System/platform/Path.cpp:23,
from /usr/local/src/llvm/lib/System/Path.cpp:27:
/usr/local/build/llvm/lib/System/platform/../Unix/Path.cpp: In member
function
`bool llvm::sys::Path::create_directory(bool)':
/usr/local/build/llvm/lib/System/platform/../Unix/Path.cpp:343:
2012 Aug 21
5
[PATCH 1/2 v1] blkdrv: Add queue limits parameters for sg block drive
This patch adds some queue limit parameters into block drive. And inits them
for sg block drive. Some interfaces are also added for accessing them.
Signed-off-by: Cong Meng <mc at linux.vnet.ibm.com>
---
block/raw-posix.c | 58 +++++++++++++++++++++++++++++++++++++++++++++++++++++
block_int.h | 4 +++
blockdev.c | 15 +++++++++++++
hw/block-common.h | 3 ++
4 files
2012 Aug 21
5
[PATCH 1/2 v1] blkdrv: Add queue limits parameters for sg block drive
This patch adds some queue limit parameters into block drive. And inits them
for sg block drive. Some interfaces are also added for accessing them.
Signed-off-by: Cong Meng <mc at linux.vnet.ibm.com>
---
block/raw-posix.c | 58 +++++++++++++++++++++++++++++++++++++++++++++++++++++
block_int.h | 4 +++
blockdev.c | 15 +++++++++++++
hw/block-common.h | 3 ++
4 files
2011 Mar 10
3
[Bug 8001] New: buffer overflow in recv_file_entry (maxpathlen doesn't works)
https://bugzilla.samba.org/show_bug.cgi?id=8001
Summary: buffer overflow in recv_file_entry (maxpathlen doesn't
works)
Product: rsync
Version: 3.0.8
Platform: All
OS/Version: FreeBSD
Status: NEW
Severity: normal
Priority: P5
Component: core
AssignedTo: wayned at samba.org