Displaying 20 results from an estimated 2000 matches similar to: "[Bug 2043] New: memleak in import_environments"
2014 Mar 04
0
[Bug 2208] New: memleak in servconf.c
https://bugzilla.mindrot.org/show_bug.cgi?id=2208
Bug ID: 2208
Summary: memleak in servconf.c
Product: Portable OpenSSH
Version: -current
Hardware: Other
OS: FreeBSD
Status: NEW
Severity: trivial
Priority: P5
Component: sshd
Assignee: unassigned-bugs at mindrot.org
2013 Apr 15
6
[Bug 2088] New: meoory leak in do_gen_krl()
https://bugzilla.mindrot.org/show_bug.cgi?id=2088
Bug ID: 2088
Summary: meoory leak in do_gen_krl()
Classification: Unclassified
Product: Portable OpenSSH
Version: 6.2p1
Hardware: All
OS: FreeBSD
Status: NEW
Severity: minor
Priority: P5
Component: ssh-keygen
Assignee:
2004 Feb 27
1
Minor Thread Bug In OpenSSH 3.8p1
There is a minor problem with the PAM support in OpenSSH 3.8p1. If you use
POSIX threads (as specified by defining USE_POSIX_THREADS) in auth-pam.c,
PAM authentication will fail in routine import_environments(). The purpose
of this routine is to import variables returned by do_pam_account() in
sshpam_thread(). However, those variable are only exported if USE_POSIX_THREADS
is NOT set.
2009 Feb 03
1
[Announce] Samba 3.2.8 Maintainance Release Available
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
================================================================
"Always keep an open mind and a
compassionate heart."
Phil Jackson
================================================================
Release Announcements
=====================
This is a bug fix release of the Samba 3.2 series.
Major enhancements included in
2009 Feb 03
1
[Announce] Samba 3.2.8 Maintainance Release Available
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
================================================================
"Always keep an open mind and a
compassionate heart."
Phil Jackson
================================================================
Release Announcements
=====================
This is a bug fix release of the Samba 3.2 series.
Major enhancements included in
2013 Jul 29
4
[Bug 2134] New: invalid prototype for get_last_login_time()
https://bugzilla.mindrot.org/show_bug.cgi?id=2134
Bug ID: 2134
Summary: invalid prototype for get_last_login_time()
Product: Portable OpenSSH
Version: 6.2p1
Hardware: Other
OS: FreeBSD
Status: NEW
Severity: enhancement
Priority: P5
Component: Build system
Assignee:
2013 Aug 02
9
[Bug 2139] New: re-exec fallback problem
https://bugzilla.mindrot.org/show_bug.cgi?id=2139
Bug ID: 2139
Summary: re-exec fallback problem
Product: Portable OpenSSH
Version: -current
Hardware: Other
OS: FreeBSD
Status: NEW
Severity: minor
Priority: P5
Component: sshd
Assignee: unassigned-bugs at mindrot.org
2003 Dec 07
0
[PATCH] Do PAM chauthtok via keyboard-interactive.
Hi All.
Attached is another patch that attempts to do pam_chauthtok() via SSH2
keyboard-interactive authentication. It now passes the results from the
authentication thread back to the monitor (based on a suggestion from
djm).
Because of this, it doesn't call do_pam_account twice and consequently
now works on AIX 5.2, which the previous version didn't. I haven't tested
it on any
2018 Apr 18
0
[cfe-dev] RFC: Implementing -fno-delete-null-pointer-checks in clang
On 18 April 2018 at 18:13, Manoj Gupta via cfe-dev
<cfe-dev at lists.llvm.org> wrote:
> Therefore, I would like to implement support for this flag (maybe with a
> different name),
I'd suggest -mdo-what-i-mean; the whole idea is horribly
underspecified, and basically rips up the LangRef in favour of a
nebulous set of good and bad optimizations (probably as dictated by
the ones that
2008 Aug 06
1
pid$target::malloc:entry does not work
In Solaris 10 6/06, etc. I used to do things like
pid$target::malloc:entry
{
ustack();
}
and got stack traces from my application calling malloc as expected. In
Solaris 10 8/07 I only see stack traces from functions inside libc
calling a function called lmalloc() but not my malloc calls:
ld.so.1`lmalloc
ld.so.1`tsort+0xb4
2008 Jan 19
0
Changes to 'org'
New branch 'org' available with the following commits:
commit 2ddba438108342502c59bc4f09d96118a59b5e33
Author: Benjamin Otte <otte at gnome.org>
Date: Sat Jan 19 03:27:03 2008 +0100
we need to clear the stylesheet reference if the style sheet dies before us
sems signals aren't the proper way to do this marshalling either
commit
2013 Oct 14
1
Provide AcceptEnv variables to a Linux PAM module?
I've been looking for a while and can't figure out for sure if variables
allowed by AcceptEnv are readable by a PAM module. I looked through the
openssh source code and found a few calls to pam_putenv(), which looks
like the relevant call, but I don't see anything that would copy over
AcceptEnv variables. Am I correct that the variables are not available
to PAM? I'm
2003 Oct 29
1
Environment set on PAM module is not visible to user
We're using an internal PAM module (Linux) that sets a few environment
variables using pam_putenv (on pam_sm_authenticate). In version 3.6.1p1i
such variables are visible to the user (as expected), but since 3.7p1
they are not...
Is this the expected behaviour?
Thanks in advance,
Jose
____________________________________________________________________________
Jose A. Rodriguez
2005 Apr 06
1
dovecot crashes
I'm getting these over and over again in my dovecot [CVS] logs. I'm
using PAM for authentication- something that worked a few weeks ago.
Apr 6 15:22:11 [PAM-env] Unknown PAM_ITEM: <XAUTHORITY>
Apr 6 15:22:11 [dovecot-auth] PAM pam_putenv: delete non-existent
entry; XAUTHORITY
dovecot: Apr 06 15:22:16 Warning: Killed with signal 2
dovecot: Apr 06 15:22:16 Error: child 25731 (imap)
2008 Jan 19
0
5 commits - libswfdec/swfdec_as_object.c libswfdec/swfdec_loader.c libswfdec/swfdec_style_sheet.c libswfdec/swfdec_text_field_movie_as.c libswfdec/swfdec_text_field_movie.c test/swfdec_test_test.c
libswfdec/swfdec_as_object.c | 3 +++
libswfdec/swfdec_loader.c | 8 +-------
libswfdec/swfdec_style_sheet.c | 3 ++-
libswfdec/swfdec_text_field_movie.c | 12 ++++++------
libswfdec/swfdec_text_field_movie_as.c | 4 ++++
test/swfdec_test_test.c | 1 +
6 files changed, 17 insertions(+), 14 deletions(-)
New commits:
commit
2007 Sep 05
1
VP6 issues in Swfdec
Hi,
I'm one of the Swfdec[1] Flash player developers. As you may be aware,
Flash uses VP6 as a possible video decoder.
Someone recently grabbed all of the videos at http://pown.alluc.org
and threw them at ffmpeg. Surprisingly, lots of them killed the vp6
decoder and in turn my browser.
I'll attached a series of patches for issues that I could fix myself,
and point out issues I could not
2020 Apr 28
2
Nontemporal memory accesses and fences
The current specification of the behavior of the !nontemporal attribute in LLVM, and the __builtin_nontemporal_* functions in Clang, is rather spartan and underspecified. In effect, it says the following things:
* Atomic !nontemporal has no defined semantics
* !nontemporal may use special instructions to save cache bandwidth, such as "MOVNT" on x86.
What is crucially lacking
2020 Oct 27
0
[ANNOUNCE] nftables 0.9.7 release
Hi!
The Netfilter project proudly presents:
nftables 0.9.7
This release contains fixes and new features available up to the Linux
kernel 5.10-rc1 release.
* Support for implicit chain, e.g.
table inet x {
chain y {
type filter hook input priority 0;
tcp dport 22 jump {
ip saddr { 127.0.0.0/8, 172.23.0.0/16, 192.168.13.0/24 }
2020 Apr 27
1
[PATCH v2] virtio-balloon: Disable free page reporting if page poison reporting is not enabled
On Mon, Apr 27, 2020 at 8:09 AM David Hildenbrand <david at redhat.com> wrote:
>
> On 27.04.20 16:58, Alexander Duyck wrote:
> > On Mon, Apr 27, 2020 at 1:08 AM David Hildenbrand <david at redhat.com> wrote:
> >>
> >> On 24.04.20 18:24, Alexander Duyck wrote:
> >>> From: Alexander Duyck <alexander.h.duyck at linux.intel.com>
>
2018 Apr 18
5
RFC: Implementing -fno-delete-null-pointer-checks in clang
Hi,
This is regarding support for -fno-delete-null-pointer-checks in clang (PR
9251).
Linux kernel uses this flag to keep null pointer checks from getting
optimized away. Since clang does not currently support this flag, it often
invites comments from kernel devs that clang is not yet *ready* to compile
Linux kernel.
I have also heard that developers working on firmware, bare-metal tools and