diff options
author | Susant Palai <spalai@redhat.com> | 2015-06-04 22:37:11 +0530 |
---|---|---|
committer | Vijay Bellur <vbellur@redhat.com> | 2015-06-13 01:13:56 -0700 |
commit | 1ea9c9a3d59d8c3ddf1e27e2939c136a4ed3c6e8 (patch) | |
tree | 3aa430681bf75467c2bd07ba58d994811505fc71 /tools | |
parent | 6b97f339169dd86a3c3aad9cff9b3da83a40a614 (diff) |
glusterd: Buffer overflow causing crash for glusterd
Problem: In GLUSTERD_GET_DEFRAG_PROCESS we are using PATH_MAX (4096)
as the max size of the input for target path, but we have allocated
NAME_MAX (255) size of buffer for the target.
Now this crash is not seen with source install, but is seen with RPMS.
The reason is _foritfy_fail. This check happens when _FORTIFY_SOURCE
flag is enabled. This option tries to figure out possible
overflow scenarios like the bug here and does crash the process.
Change-Id: I26261be85936d2e94a526fdcaa8d3249f8af11c3
BUG: 1228093
Signed-off-by: Susant Palai <spalai@redhat.com>
Reviewed-on: http://review.gluster.org/11090
Tested-by: Gluster Build System <jenkins@build.gluster.com>
Reviewed-by: N Balachandran <nbalacha@redhat.com>
Reviewed-by: Raghavendra G <rgowdapp@redhat.com>
Diffstat (limited to 'tools')
0 files changed, 0 insertions, 0 deletions