[Bugs] [Bug 1093692] Resource/Memory leak issues reported by Coverity.

bugzilla at redhat.com bugzilla at redhat.com
Tue Dec 9 07:10:49 UTC 2014


https://bugzilla.redhat.com/show_bug.cgi?id=1093692



--- Comment #3 from Anand Avati <aavati at redhat.com> ---
COMMIT: http://review.gluster.org/9208 committed in master by Kaushal M
(kaushal at redhat.com) 
------
commit 4aa63e28509eb47d293eddb4f61317d409598c23
Author: GauravKumarGarg <ggarg at redhat.com>
Date:   Fri Nov 28 12:02:20 2014 +0530

    glusterd: Coverity fix for string_overflow overrun

    In function glusterd_dump_peer() it is copying "input_key" into "key"
    buffer without checking the length which might cause string_overflow
    overrun. Similar problem with other coverity issue.
    With this fix it will copy "input_key" into "key" buffer by maximum
    length of buffer.

    Coverity CID: 1256171
    Coverity CID: 1256172
    Coverity CID: 1256174

    Change-Id: I4e092309d9503bd79ff82cf83ed5e8d758743453
    BUG: 1093692
    Signed-off-by: Gaurav Kumar Garg  ggarg <ggarg at redhat.com>
    Reviewed-on: http://review.gluster.org/9208
    Tested-by: Gluster Build System <jenkins at build.gluster.com>
    Reviewed-by: Atin Mukherjee <amukherj at redhat.com>
    Reviewed-by: Kaushal M <kaushal at redhat.com>

-- 
You are receiving this mail because:
You are on the CC list for the bug.
You are the assignee for the bug.


More information about the Bugs mailing list