[Bugs] [Bug 1228093] Glusterd crash

bugzilla at redhat.com bugzilla at redhat.com
Sat Jun 13 08:13:59 UTC 2015


https://bugzilla.redhat.com/show_bug.cgi?id=1228093



--- Comment #5 from Anand Avati <aavati at redhat.com> ---
COMMIT: http://review.gluster.org/11090 committed in master by Vijay Bellur
(vbellur at redhat.com) 
------
commit 1ea9c9a3d59d8c3ddf1e27e2939c136a4ed3c6e8
Author: Susant Palai <spalai at redhat.com>
Date:   Thu Jun 4 22:37:11 2015 +0530

    glusterd: Buffer overflow causing crash for glusterd

    Problem: In GLUSTERD_GET_DEFRAG_PROCESS we are using PATH_MAX (4096)
    as the max size of the input for target path, but we have allocated
    NAME_MAX (255) size of buffer for the target.

    Now this crash is not seen with source install, but is seen with RPMS.
    The reason is _foritfy_fail. This check happens when _FORTIFY_SOURCE
    flag is enabled. This option tries to figure out possible
    overflow scenarios like the bug here and does crash the process.

    Change-Id: I26261be85936d2e94a526fdcaa8d3249f8af11c3
    BUG: 1228093
    Signed-off-by: Susant Palai <spalai at redhat.com>
    Reviewed-on: http://review.gluster.org/11090
    Tested-by: Gluster Build System <jenkins at build.gluster.com>
    Reviewed-by: N Balachandran <nbalacha at redhat.com>
    Reviewed-by: Raghavendra G <rgowdapp at redhat.com>

-- 
You are receiving this mail because:
You are on the CC list for the bug.
Unsubscribe from this bug https://bugzilla.redhat.com/token.cgi?t=2GnZ5PZUWr&a=cc_unsubscribe


More information about the Bugs mailing list