path: root/xlators/protocol/server/src/server.c
diff options
authorAmar Tumballi <>2018-11-01 07:25:25 +0530
committerShyamsundar Ranganathan <>2018-11-05 18:50:59 +0000
commit74e8328d3f6901d6ba38a313965fe910c8411324 (patch)
tree4816063d412cf9e436da301fccf165485bf22e18 /xlators/protocol/server/src/server.c
parent2effe3b0d3fa51fc627c970353de2e326bcf1ef2 (diff)
all: fix the format string exceptions
Currently, there are possibilities in few places, where a user-controlled (like filename, program parameter etc) string can be passed as 'fmt' for printf(), which can lead to segfault, if the user's string contains '%s', '%d' in it. While fixing it, makes sense to make the explicit check for such issues across the codebase, by making the format call properly. Fixes: CVE-2018-14661 Fixes: bz#1644763 Change-Id: Ib547293f2d9eb618594cbff0df3b9c800e88bde4 Signed-off-by: Amar Tumballi <>
Diffstat (limited to 'xlators/protocol/server/src/server.c')
1 files changed, 1 insertions, 1 deletions
diff --git a/xlators/protocol/server/src/server.c b/xlators/protocol/server/src/server.c
index 4ec6fe8..8416b42 100644
--- a/xlators/protocol/server/src/server.c
+++ b/xlators/protocol/server/src/server.c
@@ -247,7 +247,7 @@ server_priv(xlator_t *this)
return 0;
gf_proc_dump_build_key(key, "xlator.protocol.server", "priv");
- gf_proc_dump_add_section(key);
+ gf_proc_dump_add_section("%s", key);
ret = pthread_mutex_trylock(&conf->mutex);
if (ret != 0)