summaryrefslogtreecommitdiffstats
path: root/xlators/cluster/ec/src/ec-common.c
diff options
context:
space:
mode:
authorSusant Palai <spalai@redhat.com>2015-06-04 22:37:11 +0530
committerVijay Bellur <vbellur@redhat.com>2015-06-18 18:30:28 -0700
commitf56b94d85ae5063ba9eb97c6ed07fc869f0e4b53 (patch)
tree6179a8bf563eafe74c21a76dc9a9b09f912bcdbc /xlators/cluster/ec/src/ec-common.c
parent0e358fa5f7190f84574824b5629835abf32823a3 (diff)
glusterd: Buffer overflow causing crash for glusterd
Backport of http://review.gluster.org/11090 Problem: In GLUSTERD_GET_DEFRAG_PROCESS we are using PATH_MAX (4096) as the max size of the input for target path, but we have allocated NAME_MAX (255) size of buffer for the target. Now this crash is not seen with source, but seen with RPMS. The reason is _foritfy_fail. This check happens when _FORTIFY_SOURCE is enabled. This option tries to figure out possible overflow scenarios like the bug here and does crash the process. BUG: 1227677 Change-Id: I50cf83cb60c640e46cc7a1a8d3a8321b9147fba9 Signed-off-by: Susant Palai <spalai@redhat.com> Reviewed-on: http://review.gluster.org/11091 Reviewed-by: Atin Mukherjee <amukherj@redhat.com> Tested-by: Gluster Build System <jenkins@build.gluster.com> Tested-by: NetBSD Build System <jenkins@build.gluster.org>
Diffstat (limited to 'xlators/cluster/ec/src/ec-common.c')
0 files changed, 0 insertions, 0 deletions