[Bugs] [Bug 1093692] Resource/Memory leak issues reported by Coverity.
bugzilla at redhat.com
bugzilla at redhat.com
Tue Dec 9 07:10:49 UTC 2014
https://bugzilla.redhat.com/show_bug.cgi?id=1093692
--- Comment #3 from Anand Avati <aavati at redhat.com> ---
COMMIT: http://review.gluster.org/9208 committed in master by Kaushal M
(kaushal at redhat.com)
------
commit 4aa63e28509eb47d293eddb4f61317d409598c23
Author: GauravKumarGarg <ggarg at redhat.com>
Date: Fri Nov 28 12:02:20 2014 +0530
glusterd: Coverity fix for string_overflow overrun
In function glusterd_dump_peer() it is copying "input_key" into "key"
buffer without checking the length which might cause string_overflow
overrun. Similar problem with other coverity issue.
With this fix it will copy "input_key" into "key" buffer by maximum
length of buffer.
Coverity CID: 1256171
Coverity CID: 1256172
Coverity CID: 1256174
Change-Id: I4e092309d9503bd79ff82cf83ed5e8d758743453
BUG: 1093692
Signed-off-by: Gaurav Kumar Garg ggarg <ggarg at redhat.com>
Reviewed-on: http://review.gluster.org/9208
Tested-by: Gluster Build System <jenkins at build.gluster.com>
Reviewed-by: Atin Mukherjee <amukherj at redhat.com>
Reviewed-by: Kaushal M <kaushal at redhat.com>
--
You are receiving this mail because:
You are on the CC list for the bug.
You are the assignee for the bug.
More information about the Bugs
mailing list