Bug 150647
Summary: | glibc detected free(): invalid next size (fast): 0x08bfc970 | ||
---|---|---|---|
Product: | Red Hat Enterprise Linux 4 | Reporter: | Milan Kerslager <milan.kerslager> |
Component: | glibc | Assignee: | Jakub Jelinek <jakub> |
Status: | CLOSED NOTABUG | QA Contact: | Brian Brock <bbrock> |
Severity: | medium | Docs Contact: | |
Priority: | medium | ||
Version: | 4.0 | ||
Target Milestone: | --- | ||
Target Release: | --- | ||
Hardware: | All | ||
OS: | Linux | ||
Whiteboard: | |||
Fixed In Version: | Doc Type: | Bug Fix | |
Doc Text: | Story Points: | --- | |
Clone Of: | Environment: | ||
Last Closed: | 2005-03-09 09:57:17 UTC | Type: | --- |
Regression: | --- | Mount Type: | --- |
Documentation: | --- | CRM: | |
Verified Versions: | Category: | --- | |
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
Cloudforms Team: | --- | Target Upstream Version: | |
Embargoed: |
Description
Milan Kerslager
2005-03-09 09:47:32 UTC
This is not a bug in glibc, but in the application that triggered it. glibc just reports that the application has broken memory allocation handling and terminates the process, as that can be a sign of exploit. If you run the program with MALLOC_CHECK_=0, these checks will be gone (unless the program is suid/sgid). The program should be run under valgrind or LD_PRELOAD=libefence.so.0 to find out where exactly its memory allocation handling is broken. Is this a new feature in glibc in compare to RHEL3's glibc? Yes, see RELEASE-NOTES: glibc o The version of glibc provided with Red Hat Enterprise Linux 4 performs additional internal sanity checks to prevent and detect data corruption as early as possible. By default, should corruption be detected, a message similar to the following will be displayed on standard error (or logged via syslog if stderr is not open): *** glibc detected *** double free or corruption: 0x0937d008 *** By default, the program that generated this error will also be killed; however, this (and whether or not an error message is generated) can be controlled via the MALLOC_CHECK_ environment variable. The following settings are supported: o 0 -- Do not generate an error message, and do not kill the program o 1 -- Generate an error message, but do not kill the program o 2 -- Do not generate an error message, but kill the program o 3 -- Generate an error message and kill the program Note If MALLOC_CHECK_ is explicitly set a value other than 0, this causes glibc to perform more tests that are more extensive than the default, and may impact performance. Should you have a program from a third party ISV that triggers these corruption checks and displays a message, you should file a defect report with the application's vendor, since this indicates a serious bug. Thank you for your exact and fast help. I did not make a connection between those two informations. So it seems that Samba from RHEL4 has a serious bug... |