Displaying 20 results from an estimated 10000 matches similar to: "buffer under/overrun w/ off-frequency sound card clock ?"
2005 Aug 17
1
overrun buffer
Hi all
I am getting this error, when running the command below from my workstation:
`--> sudo net rpc info -S SMBPDC
[2005/08/17 14:33:16, 0] rpc_parse/parse_prs.c:prs_mem_get(537)
prs_mem_get: reading data of size 14287078 would overrun buffer.
However, if I run the same command from the PDC itself, then it's ok:
.
ldapsmb-pdc:~# net rpc info
Domain Name: ILR
Domain SID:
2004 Nov 15
0
[SECURITY] CAN-2004-0882: Possible Buffer Overrun in smbd
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
Subject: Possible Buffer Overrun in smbd
CVE #: CAN-2004-0882
Affected
Versions: Samba 3.0.x <= 3.0.7
Summary: A possible buffer overrun in smbd could
lead to code execution by a remote user
Patch Availability
- ------------------
A patch for Samba 3.0.7 (samba-3.0.7-CAN-2004-0882.patch) is
available from
2001 Mar 21
0
[RHSA-2001:018-02] Updated sudo packages fixing buffer overrun available
---------------------------------------------------------------------
Red Hat, Inc. Red Hat Security Advisory
Synopsis: Updated sudo packages fixing buffer overrun available
Advisory ID: RHSA-2001:018-02
Issue date: 2001-02-23
Updated on: 2001-03-02
Product: Red Hat Linux
Keywords: sudo buffer overrun
Cross references:
2017 May 19
0
AST-2017-002: Buffer Overrun in PJSIP transaction layer
Asterisk Project Security Advisory - AST-2017-002
Product Asterisk
Summary Buffer Overrun in PJSIP transaction layer
Nature of Advisory Buffer Overrun/Crash
Susceptibility Remote Unauthenticated Sessions
Severity Critical
2004 Aug 06
2
Sound:Recording Overrun
Has anybody had this problem? I came in this morning and found my streamer down and this message flashing by on the console. "Sound: Recording Overrun"
I'm running Icecast 1.3.11 and the source is Liveice on Redhat 7.1 if that makes a difference.
<p>Just curious,
Matt
<p>--- >8 ----
List archives: http://www.xiph.org/archives/
icecast project homepage:
2015 Jun 25
3
[PATCH] Fix buffer overrun
When a forwarding specification ending in a slash ('\\') is used,
the function "parse_fwd_field" jumps over the '\0' char marking
the end of the string and keeps processing.
This patch checks for that condition.
-------------- next part --------------
A non-text attachment was scrubbed...
Name: 0001-Fix-buffer-overrun.patch
Type: application/text
Size: 850 bytes
Desc:
2020 Jul 30
0
[PATCH] virtio-blk: fix discard buffer overrun
On 2020/7/30 ??4:30, Jeffle Xu wrote:
> Before commit eded341c085b ("block: don't decrement nr_phys_segments for
> physically contigous segments") applied, the generic block layer may not
> guarantee that @req->nr_phys_segments equals the number of bios in the
> request. When limits. at max_discard_segments == 1 and the IO scheduler is
> set to scheduler except for
2001 Mar 21
0
[RHSA-2001:019-02] Updated sudo packages fixing buffer overrun available
---------------------------------------------------------------------
Red Hat, Inc. Red Hat Security Advisory
Synopsis: Updated sudo packages fixing buffer overrun available
Advisory ID: RHSA-2001:019-02
Issue date: 2001-02-23
Updated on: 2001-03-21
Product: Red Hat Powertools
Keywords: sudo buffer overrun
Cross references:
2007 Feb 05
0
[SAMBA-SECURITY] CVE-2007-0453: Buffer overrun in nss_winbind.so.1 on Solaris
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
==========================================================
==
== Subject: Buffer overrun in NSS host lookup Winbind
== library on Solaris
== CVE ID#: CVE-2007-0453
==
== Versions: Samba 3.0.21 - 3.0.23d (inclusive) running on
== Sun Solaris
==
== Summary: A potential overrun in the gethostbyname()
== and getipnodebyname() in the
2007 Feb 05
0
[SAMBA-SECURITY] CVE-2007-0453: Buffer overrun in nss_winbind.so.1 on Solaris
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
==========================================================
==
== Subject: Buffer overrun in NSS host lookup Winbind
== library on Solaris
== CVE ID#: CVE-2007-0453
==
== Versions: Samba 3.0.21 - 3.0.23d (inclusive) running on
== Sun Solaris
==
== Summary: A potential overrun in the gethostbyname()
== and getipnodebyname() in the
2003 Jun 03
0
Sound: Recording overrun
Hello All,
I've just been made aware of Asterisk and have installed it. Things seem
to be working: I can dial from the console the internal numbers and hear
the answerphone messages and do other interesting stuff.
however when I hangup the call I see a continuous stream of messages
saying "Sound: Recording overrun" appear on ALL my linux consoles and I
can't see what I'm
2004 Jul 01
0
Sound: Record Overrun
Hi,
When I dial into asterisk I set it up in extensions.conf so it will play
some messages, but when I dial in asterisk picks up but I hear no
sound. There is moments of silence where the audio should be playing
but I get nothing. I checked /var/log/messages to see what was wrong
and I got the following error:
Jun 29 20:46:33 eclipse kernel: Sound: Recording overrun
Does this mean
2007 Nov 15
0
[SECURITY] CVE-2007-4572 - GETDC mailslot processing buffer overrun in nmbd
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
==========================================================
==
== Subject: Stack buffer overflow in nmbd's logon
== request processing.
==
== CVE ID#: CVE-2007-4572
==
== Versions: Samba 3.0.0 - 3.0.26a (inclusive)
==
== Summary: Processing of specially crafted GETDC
== mailslot requests can result in a
2010 Jul 14
1
[PATCH] gfxboot: fix buffer overrun when loading kernel/initramfs
If the file size wasn't a multiple of 64KB, we could overwrite the next
entry in the malloc arena so reading the initramfs would fail.
Signed-off-by: Colin Watson <cjwatson at ubuntu.com>
---
com32/gfxboot/gfxboot.c | 3 ++-
1 files changed, 2 insertions(+), 1 deletions(-)
diff --git a/com32/gfxboot/gfxboot.c b/com32/gfxboot/gfxboot.c
index dd4d641..0fbfadd 100644
---
2007 Nov 15
0
[SECURITY] CVE-2007-4572 - GETDC mailslot processing buffer overrun in nmbd
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
==========================================================
==
== Subject: Stack buffer overflow in nmbd's logon
== request processing.
==
== CVE ID#: CVE-2007-4572
==
== Versions: Samba 3.0.0 - 3.0.26a (inclusive)
==
== Summary: Processing of specially crafted GETDC
== mailslot requests can result in a
2007 Dec 10
0
[SECURITY] Buffer overrun in send_mailslot()
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
==========================================================
==
== Subject: Boundary failure in GETDC mailslot
== processing can result in a buffer overrun
==
== CVE ID#: CVE-2007-6015
==
== Versions: Samba 3.0.0 - 3.0.27a (inclusive)
==
== Summary: Specifically crafted GETDC mailslot requests
== can trigger a
2006 Dec 05
2
prs_mem_get: buffer overrun
Hello all,
I repost this mail with a new subject line because on
the original one ("Unable to join domain from WNT4")
i've got no respnse.
version is 3.0.23d (the same happens with 3.0.21c )
running as a PDC
OS: Linux 2.6.11.4-21.14-smp, (from SuSE 9.3) on dual Opterons.
After upgrading from 3.0.11 to 3.0.23d, all Windows-NT4-sp6
machines were no longer DOMAIN-members - WinXP or
2002 Nov 20
0
error: prs_mem_get: reading data of size 60 would overrun buffer.
Hello everyone,
we try to use a server running linux in an NT-domain and get the error message
given in the subject-line. More details from the logfile and smb.conf are given below.
Can anyone give us a hint what the problem is?
(Of course...) The problem is very urgent for us.
Thanks a lot in advance.
Helmut Rickel
================= smb.conf ========================
[global]
2001 May 09
1
Buffer overrun using W2k.
We recently upgraded our NT4 Domain to Win2k.
We use Samba 2.0.7 running on Solaris 2.6 servers.
We are getting buffer overuns in the log files when running
'domain_client_validate' which appears to be due to extensive group
membership (SID History is not being used).
Are there any patches/fixes available to get round this problem?
Thankyou in anticipation.
Regards,
Rich Sprigg
2007 Dec 10
1
[SECURITY] Buffer overrun in send_mailslot()
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
==========================================================
==
== Subject: Boundary failure in GETDC mailslot
== processing can result in a buffer overrun
==
== CVE ID#: CVE-2007-6015
==
== Versions: Samba 3.0.0 - 3.0.27a (inclusive)
==
== Summary: Specifically crafted GETDC mailslot requests
== can trigger a